{"_id": [70], "label": "math.HO", "text": "Pure tone modes for a 5 3 elliptic drum. The paper exhibits several standing modes of a 5 3 elliptic drum computed using Mathieu functions. To match the boundary conditions, I used Newton's method on the appropriate modified Mathieu equation using the Squire Trapp formula for computing derivatives. I tabulate the requisite values of the parameter q for these low frequency modes."} {"_id": [21, 38, 15], "label": "math.CO cs.IT math.IT math.NT", "text": "Linear programming bounds for cliques in Paley graphs. The Lov ' a sz theta number is a semidefinite programming bound on the clique number of (the complement of) a given graph. Given a vertex transitive graph, every vertex belongs to a maximal clique, and so one can instead apply this semidefinite programming bound to the local graph. In the case of the Paley graph, the local graph is circulant, and so this bound reduces to a linear programming bound, allowing for fast computations. Impressively, the value of this program with Schrijver's nonnegativity constraint rivals the state of the art closed form bound recently proved by Hanson and Petridis. We conjecture that this linear programming bound improves on the Hanson Petridis bound infinitely often, and we derive the dual program to facilitate proving this conjecture."} {"_id": [35], "label": "math.RA", "text": "Generalized Zhou inverses in rings. We introduce and study a new class of generalized inverses in rings. An element a in a ring R has generalized Zhou inverse if there exists b in R such that bab b, b in comm 2(a), a n ab in sqrt J(R) for some n in Bbb N . We prove that a in R has generalized Zhou inverse if and only if there exists p p 2 in comm 2(a) such that a n p in sqrt J(R) for some n in Bbb N . Cline's formula and Jacobson's Lemma for generalized Zhou inverses are established. In particular, the Zhou inverse in a ring is characterized."} {"_id": [2, 14], "label": "cs.AI cs.HC", "text": "Explaining reputation assessments. Reputation is crucial to enabling human or software agents to select among alternative providers. Although several effective reputation assessment methods exist, they typically distil reputation into a numerical representation, with no accompanying explanation of the rationale behind the assessment. Such explanations would allow users or clients to make a richer assessment of providers, and tailor selection according to their preferences and current context. In this paper, we propose an approach to explain the rationale behind assessments from quantitative reputation models, by generating arguments that are combined to form explanations. Our approach adapts, extends and combines existing approaches for explaining decisions made using multi attribute decision models in the context of reputation. We present example argument templates, and describe how to select their parameters using explanation algorithms. Our proposal was evaluated by means of a user study, which followed an existing protocol. Our results give evidence that although explanations present a subset of the information of trust scores, they are sufficient to equally evaluate providers recommended based on their trust score. Moreover, when explanation arguments reveal implicit model information, they are less persuasive than scores."} {"_id": [1, 43, 59], "label": "cs.DB cs.LG cs.SI", "text": "Ingesting High Velocity Streaming Graphs from Social Media Sources. Many data science applications like social network analysis use graphs as their primary form of data. However, acquiring graph structured data from social media presents some interesting challenges. The first challenge is the high data velocity and bursty nature of the social media data. The second challenge is that the complex nature of the data makes the ingestion process expensive. If we want to store the streaming graph data in a graph database, we face a third challenge the database is very often unable to sustain the ingestion of high velocity, high burst data. We have developed an adaptive buffering mechanism and a graph compression technique that effectively mitigates the problem. A novel aspect of our method is that the adaptive buffering algorithm uses the data rate, the data content as well as the CPU resources of the database machine to determine an optimal data ingestion mechanism. We further show that an ingestion time graph compression strategy improves the efficiency of the data ingestion into the database. We have verified the efficacy of our ingestion optimization strategy through extensive experiments."} {"_id": [8, 11], "label": "physics.optics physics.app-ph", "text": "Low threshold anti Stokes Raman laser on chip. Raman lasers based on integrated silica whispering gallery mode resonant cavities have enabled numerous applications from telecommunications to biodetection. To overcome the intrinsically low Raman gain value of silica, these devices leverage their ultra high quality factors (Q), allowing sub mW stimulated Raman scattering (SRS) lasing thresholds to be achieved. A closely related nonlinear behavior to SRS is stimulated anti Stokes Raman scattering (SARS). This nonlinear optical process combines the pump photon with the SRS photon to generate an upconverted photon. Therefore, in order to achieve SARS, the efficiency of the SRS process must be high. As a result, achieving SARS in on chip resonant cavities has been challenging due to the low lasing efficiencies of these devices. In the present work, metal doped ultra high Q (Q 107) silica microcavity arrays are fabricated on chip. The metal dopant plays multiple roles in improving the device performance. It increases the Raman gain of the cavity material, and it decreases the optical mode area, thus increasing the circulating intensity. As a result, these devices have SRS lasing efficiencies that are over 10x larger than conventional silica microcavities while maintaining low lasing thresholds. This combination enables SARS to be generated with sub mW input powers and significantly improved anti Stokes Raman lasing efficiency."} {"_id": [25, 21], "label": "math.PR math.CO", "text": "The Horton Strahler Number of Conditioned Galton Watson Trees. The Horton Strahler number of a tree is a measure of its branching complexity it is also known in the literature as the register function. We show that for critical Galton Watson trees with finite variance conditioned to be of size n , the Horton Strahler number grows as frac 1 2 log 2 n in probability. We further define some generalizations of this number. Among these are the rigid Horton Strahler number and the k ary register function, for which we prove asymptotic results analogous to the standard case."} {"_id": [25], "label": "math.PR", "text": "Numerical study for the phase transition of the area interaction model. In this paper we present numerical analysis of the phase transition of the area interaction model, which is a standard model of Statistical Mechanics. The theoretical results are based on a recent paper by Dereudre Houdebert cite dereudre houdebert 2018 SharpTransitionWR which provides a complete phase diagram except on a bounded (implicit) domain. With our numerical analysis we give an approximative explicit description of this domain. This region is related to the theoretical function beta mapsto widetilde z c a( beta, 1) which is percolation threshold of the model, for given beta . We provide a numerical approximation of this function in order to fully understand the phase diagram. Furthermore our numerical results confirm the still unproven conjecture stating that non uniqueness holds if and only if z beta is large enough, with a value of the threshold obtained from the simulation of beta c simeq 1.726 ."} {"_id": [29], "label": "math.GR", "text": "Knapsack and the power word problem in solvable Baumslag Solitar groups. We prove that the power word problem for the solvable Baumslag Solitar groups mathsf BS (1,q) langle a,t mid t a t 1 a q rangle can be solved in mathsf TC 0 . In the power word problem, the input consists of group elements g 1, ldots, g d and binary encoded integers n 1, ldots, n d and it is asked whether g 1 n 1 cdots g d n d 1 holds. Moreover, we prove that the knapsack problem for mathsf BS (1,q) is mathsf NP complete. In the knapsack problem, the input consists of group elements g 1, ldots, g d,h and it is asked whether the equation g 1 x 1 cdots g d x d h has a solution in mathbb N d ."} {"_id": [6], "label": "physics.flu-dyn", "text": "Closed loop control of forced turbulent jets. Closed loop control of turbulent flows is a challenging problem with important practical and fundamental implications. We perform closed loop control of forced, turbulent jets based on a wave cancellation strategy. The study is motivated by the success of recent studies in applying wave cancellation to control instability waves in transitional boundary layers and free shear flows. Using a control law obtained through a system identification technique, we successfully implement wave cancellation based, closed loop control, achieving order of magnitude attenuations of velocity fluctuations. Control is shown to reduce fluctuation levels over an extensive streamwise range."} {"_id": [33], "label": "physics.ins-det", "text": "A Mixed Signal Large Dynamic Range Front End ASIC for High Capacitance Detectors. A 64 channel mixed mode ASIC, suitable for particle detectors of large dynamic range and high capacitance up to hundreds of pF, is presented here. Each channel features an analogue front end for signal amplification and filtering, and a mixed signal back end to digitise and store the signal information. The analogue part consists of a low input impedance programmable gain pre amplifier based on a regulated common gate (RCG) input stage, two shapers optimised for time and energy measurements. The back end part mainly includes discriminators, TDCs and ADCs, which are used to process the signal and encode both the time of arrival and the charge in the input signal with a fully digital output. The programmable gain of the front end (up to 400 fC input dynamic range) and the versatile back end allow the readout of different gaseous detectors like GEM, MicroMEGAS and MWPC. The ASIC is designed for an event rate up to 100 kHz per channel and a power consumption less than 9 mW channel, has been fabricated in a 110 nm CMOS technology."} {"_id": [25, 13], "label": "math.PR math.DS", "text": "Sensitivity of steady states in a degenerately damped stochastic Lorenz system. We study stability of solutions for a randomly driven and degenerately damped version of the Lorenz '63 model. Specifically, we prove that when damping is absent in one of the temperature components, the system possesses a unique invariant probability measure if and only if noise acts on the convection variable. On the other hand, if there is a positive growth term on the vertical temperature profile, we prove that there is no normalizable invariant state. Our approach relies on the derivation and analysis of non trivial Lyapunov functions which ensure positive recurrence or null recurrence transience of the dynamics."} {"_id": [49], "label": "math.OC", "text": "Convergence Analysis of Accelerated Stochastic Gradient Descent under the Growth Condition. We study the convergence of accelerated stochastic gradient descent for strongly convex objectives under the growth condition, which states that the variance of stochastic gradient is bounded by a multiplicative part that grows with the full gradient, and a constant additive part. Through the lens of the growth condition, we investigate four widely used accelerated methods Nesterov's accelerated method (NAM), robust momentum method (RMM), accelerated dual averaging method (ADAM), and implicit ADAM (iADAM). While these methods are known to improve the convergence rate of SGD under the condition that the stochastic gradient has bounded variance, it is not well understood how their convergence rates are affected by the multiplicative noise. In this paper, we show that these methods all converge to a neighborhood of the optimum with accelerated convergence rates (compared to SGD) even under the growth condition. In particular, NAM, RMM, iADAM enjoy acceleration only with a mild multiplicative noise, while ADAM enjoys acceleration even with a large multiplicative noise. Furthermore, we propose a generic tail averaged scheme that allows the accelerated rates of ADAM and iADAM to nearly attain the theoretical lower bound (up to a logarithmic factor in the variance term)."} {"_id": [46], "label": "math.AG", "text": "Non integrality of integrable over K \"ahler differential forms. We show that for a normal isolated singularity the module of square integrable regular differential forms of top degree is not integral over the module of K \"ahler differential forms. This is related to the fibre dimension of the Nash transform."} {"_id": [9], "label": "math.AP", "text": "A uniqueness result for 3D incompressible fluid rigid body interaction problem. We study a 3D nonlinear moving boundary fluid structure interaction problem describing the interaction of the fluid flow with a rigid body. The fluid flow is governed by 3D incompressible Navier Stokes equations, while the motion of the rigid body is described by a system of ordinary differential equations called Euler equations for the rigid body. The equations are fully coupled via dynamical and kinematic coupling conditions. We consider two different kinds of kinematic coupling conditions no slip and slip. In both cases we prove a generalization of the well known weak strong uniqueness result for the Navier Stokes equations to the fluid rigid body system. More precisely, we prove that weak solutions that additionally satisfy Prodi Serrin L r L s condition are unique in the class of Leray Hopf weak solutions."} {"_id": [40, 1], "label": "cs.IR cs.LG", "text": "Parameter Efficient Transfer from Sequential Behaviors for User Modeling and Recommendation. Inductive transfer learning has had a big impact on computer vision and NLP domains but has not been used in the area of recommender systems. Even though there has been a large body of research on generating recommendations based on modeling user item interaction sequences, few of them attempt to represent and transfer these models for serving downstream tasks where only limited data exists. In this paper, we delve on the task of effectively learning a single user representation that can be applied to a diversity of tasks, from cross domain recommendations to user profile predictions. Fine tuning a large pre trained network and adapting it to downstream tasks is an effective way to solve such tasks. However, fine tuning is parameter inefficient considering that an entire model needs to be re trained for every new task. To overcome this issue, we develop a parameter efficient transfer learning architecture, termed as PeterRec, which can be configured on the fly to various downstream tasks. Specifically, PeterRec allows the pre trained parameters to remain unaltered during fine tuning by injecting a series of re learned neural networks, which are small but as expressive as learning the entire network. We perform extensive experimental ablation to show the effectiveness of the learned user representation in five downstream tasks. Moreover, we show that PeterRec performs efficient transfer learning in multiple domains, where it achieves comparable or sometimes better performance relative to fine tuning the entire model parameters. Codes and datasets are available at https github.com fajieyuan sigir2020 peterrec."} {"_id": [1, 41], "label": "cs.LG cs.RO", "text": "Hyperparameters optimization for Deep Learning based emotion prediction for Human Robot Interaction. To enable humanoid robots to share our social space we need to develop technology for easy interaction with the robots using multiple modes such as speech, gestures and share our emotions with them. We have targeted this research towards addressing the core issue of emotion recognition problem which would require less computation resources and much lesser number of network hyperparameters which will be more adaptive to be computed on low resourced social robots for real time communication. More specifically, here we have proposed an Inception module based Convolutional Neural Network Architecture which has achieved improved accuracy of upto 6 improvement over the existing network architecture for emotion classification when combinedly tested over multiple datasets when tried over humanoid robots in real time. Our proposed model is reducing the trainable Hyperparameters to an extent of 94 as compared to vanilla CNN model which clearly indicates that it can be used in real time based application such as human robot interaction. Rigorous experiments have been performed to validate our methodology which is sufficiently robust and could achieve high level of accuracy. Finally, the model is implemented in a humanoid robot, NAO in real time and robustness of the model is evaluated."} {"_id": [9, 20], "label": "math.AP cs.NA math.NA", "text": "Boundary stabilization of a one dimensional wave equation by a switching time delay a theoretical and numerical study. This paper deals with the boundary stabilization problem of a one dimensional wave equation with a switching time delay in the boundary. We show that the problem is well posed in the sense of semigroups theory of linear operators. Then, we provide a theoretical and numerical study of the exponential stability of the system under an appropriate delay coefficient."} {"_id": [25], "label": "math.PR", "text": "Markov modulated generalized Ornstein Uhlenbeck processes and an application in risk theory. We derive the Markov modulated generalized Ornstein Uhlenbeck process by embedding a Markov modulated random recurrence equation in continuous time. The obtained process turns out to be the unique solution of a certain stochastic differential equation driven by a bivariate Markov additive process. We present this stochastic differential equation as well as its solution explicitely in terms of the driving Markov additive process. Moreover, we give necessary and sufficient conditions for strict stationarity of the Markov modulated generalized Ornstein Uhlenbeck process, and prove that its stationary distribution is given by the distribution of a specific exponential functional of Markov additive processes. Finally we propose an application of the Markov modulated generalized Ornstein Uhlenbeck process as Markov modulated risk model with stochastic investment. This generalizes Paulsen's risk process to a Markov switching environment. We derive a formula in this risk model that expresses the ruin probability in terms of the distribution of an exponential functional of a Markov additive process."} {"_id": [41, 1], "label": "cs.RO cs.LG", "text": "Autonomous Exploration Under Uncertainty via Deep Reinforcement Learning on Graphs. We consider an autonomous exploration problem in which a range sensing mobile robot is tasked with accurately mapping the landmarks in an a priori unknown environment efficiently in real time it must choose sensing actions that both curb localization uncertainty and achieve information gain. For this problem, belief space planning methods that forward simulate robot sensing and estimation may often fail in real time implementation, scaling poorly with increasing size of the state, belief and action spaces. We propose a novel approach that uses graph neural networks (GNNs) in conjunction with deep reinforcement learning (DRL), enabling decision making over graphs containing exploration information to predict a robot's optimal sensing action in belief space. The policy, which is trained in different random environments without human intervention, offers a real time, scalable decision making process whose high performance exploratory sensing actions yield accurate maps and high rates of information gain."} {"_id": [82, 51], "label": "q-bio.MN physics.bio-ph", "text": "Homeorhesis in Waddington's Landscape by Epigenetic Feedback Regulation. In multicellular organisms, cells differentiate into several distinct types during early development. Determination of each cellular state, along with the ratio of each cell type, as well as the developmental course during cell differentiation are highly regulated processes that are robust to noise and environmental perturbations throughout development. Waddington metaphorically depicted this robustness as the epigenetic landscape in which the robustness of each cellular state is represented by each valley in the landscape. This robustness is now conceptualized as an approach toward an attractor in a gene expression dynamical system. However, there is still an incomplete understanding of the origin of landscape change, which is accompanied by branching of valleys that corresponds to the differentiation process. Recent progress in developmental biology has unveiled the molecular processes involved in epigenetic modification, which will be a key to understanding the nature of slow landscape change. Nevertheless, the contribution of the interplay between gene expression and epigenetic modification to robust landscape changes, known as homeorhesis, remains elusive. Here, we introduce a theoretical model that combines epigenetic modification with gene expression dynamics driven by a regulatory network. In this model, epigenetic modification changes the feasibility of expression, i.e., the threshold for expression dynamics, and a slow positive feedback process from expression to the threshold level is introduced. Under such epigenetic feedback, several fixed point attractors with distinct expression patterns are generated hierarchically shaping the epigenetic landscape with successive branching of valleys. This theory provides a quantitative framework for explaining homeorhesis in development as postulated by Waddington, based on dynamical system theory with slow feedback reinforcement."} {"_id": [9], "label": "math.AP", "text": "Conjugate Transforms on Dyadic Group. In this paper we study the properties of the Lebesgue constant of the conjugate transforms. For conjugate Fej 'er means we will find necessary and sufficient condition on t for which the estimation E left vert widetilde sigma n left( t right) f right vert lesssim E left vert f right vert holds . We also prove that for dyadic irrational t , L log L is maximal Orlicz space for which the estimation E left vert widetilde sigma n left( t right) f right vert lesssim 1 E left( left vert f right vert log left vert f right vert right) is valid."} {"_id": [24, 21], "label": "math.MG math.CO", "text": "On the Colin de Verdiere graph number and penny graphs. The Colin de Verdiere number of graph G, denoted by mu(G), is a spectral invariant of G that is related to some of its topological properties. For example, mu(G) leq 3 iff G is planar. A penny graph is the contact graph of equal radii disks with disjoint interiors in the plane. In this note we prove lower bounds on mu(G) when the complement bar G is a penny graph."} {"_id": [0], "label": "cs.CV", "text": "Procedure Planning in Instructional Videos. In this paper, we study the problem of procedure planning in instructional videos, which can be seen as a step towards enabling autonomous agents to plan for complex tasks in everyday settings such as cooking. Given the current visual observation of the world and a visual goal, we ask the question \"What actions need to be taken in order to achieve the goal?\". The key technical challenge is to learn structured and plannable state and action spaces directly from unstructured videos. We address this challenge by proposing Dual Dynamics Networks (DDN), a framework that explicitly leverages the structured priors imposed by the conjugate relationships between states and actions in a learned plannable latent space. We evaluate our method on real world instructional videos. Our experiments show that DDN learns plannable representations that lead to better planning performance compared to existing planning approaches and neural network policies."} {"_id": [17], "label": "cs.DC", "text": "Benchmarking Parallelism in FaaS Platforms. Serverless computing has seen a myriad of work exploring its potential. Some systems tackle Function as a Service (FaaS) properties on automatic elasticity and scale to run highly parallel computing jobs. However, they focus on specific platforms and convey that their ideas can be extrapolated to any FaaS runtime. An important question arises do all FaaS platforms fit parallel computations? In this paper, we argue that not all of them provide the necessary means to host highly parallel applications. To validate our hypothesis, we create a comparative framework and categorize the architectures of four cloud FaaS offerings, emphasizing parallel performance. We attest and extend this description with an empirical experiment that consists in plotting in deep detail the evolution of a parallel computing job on each service. The analysis of our results evinces that FaaS is not inherently good for parallel computations and architectural differences across platforms are decisive to categorize their performance. A key insight is the importance of virtualization technologies and the scheduling approach of FaaS platforms. Parallelism improves with lighter virtualization and proactive scheduling due to finer resource allocation and faster elasticity. This causes some platforms like AWS and IBM to perform well for highly parallel computations, while others such as Azure present difficulties to achieve the required parallelism degree. Consequently, the information in this paper becomes of special interest to help users choose the most adequate infrastructure for their parallel applications."} {"_id": [64, 11, 94], "label": "physics.ed-ph physics.app-ph physics.soc-ph", "text": "Explosion analysis from images Trinity and Beirut. Images of an explosion can be used to study some of its physical properties. After reviewing the key aspects of the method originally developed to study the first nuclear detonation and analyzing the Trinity blast data, the method is applied to the Beirut explosion of August 2020 by using images from videos posted online. The applicability of the method is discussed and the process of selection, extraction, and analysis of the data is presented. The estimate for the energy yield of the Beirut explosion is found to be 2.3 1.1 1.1 TJ or 0.6 0.3 0.3 kt of TNT equivalent. The result is consistent with others recently appeared in the literature using different methods. Notice that this article includes content that some readers may find distressing."} {"_id": [26, 27, 29], "label": "math.RT math.CT math.GR", "text": "Axiomatic representation theory of finite groups by way of groupoids. We survey several notions of Mackey functors and biset functors found in the literature and prove some old and new theorems comparing them. While little here will surprise the experts, we draw a conceptual and unified picture by making systematic use of finite groupoids. This provides a road map for the various approaches to the axiomatic representation theory of finite groups, as well as some details which are hard to find in writing."} {"_id": [21, 38], "label": "math.CO math.NT", "text": "Difference Necklaces. An (a,b) difference necklace of length n is a circular arrangement of the integers 0, 1, 2, ldots , n 1 such that any two neighbours have absolute difference a or b . We prove that, subject to certain conditions on a and b , such arrangements exist, and provide recurrence relations for the number of (a,b) difference necklaces for ( a, b ) ( 1, 2 ) , ( 1, 3 ) , ( 2, 3 ) and ( 1, 4 ) . Using techniques similar to those employed for enumerating Hamiltonian cycles in certain families of graphs, we obtain these explicit recurrence relations and prove that the number of (a,b) difference necklaces of length n satisfies a linear recurrence relation for all permissible values a and b . Our methods generalize to necklaces where an arbitrary number of differences is allowed."} {"_id": [14, 39], "label": "cs.CY cs.HC", "text": "Beyond Our Behavior The GDPR and Humanistic Personalization. Personalization should take the human person seriously. This requires a deeper understanding of how recommender systems can shape both our self understanding and identity. We unpack key European humanistic and philosophical ideas underlying the General Data Protection Regulation (GDPR) and propose a new paradigm of humanistic personalization. Humanistic personalization responds to the IEEE's call for Ethically Aligned Design (EAD) and is based on fundamental human capacities and values. Humanistic personalization focuses on narrative accuracy the subjective fit between a person's self narrative and both the input (personal data) and output of a recommender system. In doing so, we re frame the distinction between implicit and explicit data collection as one of nonconscious (\"organismic\") behavior and conscious (\"reflective\") action. This distinction raises important ethical and interpretive issues related to agency, self understanding, and political participation. Finally, we discuss how an emphasis on narrative accuracy can reduce opportunities for epistemic injustice done to data subjects."} {"_id": [77, 70], "label": "math.HO math.LO", "text": "Aristotle' Relations An Interpretation in Combinatory Logic. The usual modelling of the syllogisms of the Organon by a calculus of classes does not include relations. Aristotle may however have envisioned them in the first two books as the category of relatives, where he allowed them to compose with themselves. Composition is the main operation in combinatory logic, which therefore offers itself for a new kind of modelling. The resulting calculus includes also composition of predicates by logical connectives."} {"_id": [62], "label": "cs.GT", "text": "Tight Bounds for the Price of Anarchy and Stability in Sequential Transportation Games. In this paper, we analyze a transportation game first introduced by Fotakis, Gourv es, and Monnot in 2017, where players want to be transported to a common destination as quickly as possible and, in order to achieve this goal, they have to choose one of the available buses. We introduce a sequential version of this game and provide bounds for the Sequential Price of Stability and the Sequential Price of Anarchy in both metric and non metric instances, considering three social cost functions the total traveled distance by all buses, the maximum distance traveled by a bus, and the sum of the distances traveled by all players (a new social cost function that we introduce). Finally, we analyze the Price of Stability and the Price of Anarchy for this new function in simultaneous transportation games."} {"_id": [9], "label": "math.AP", "text": "On the existence of global smooth solutions to the parabolic elliptic Keller Segel system with irregular initial data. We consider the parabolic elliptic Keller Segel system left begin aligned u t Delta u chi nabla cdot (u nabla v), 0 Delta v v u end aligned right. tag star in a smooth bounded domain Omega subseteq mathbb R n , n in mathbb N , with Neumann boundary conditions. We look at both chemotactic attraction ( chi 0 ) and repulsion ( chi 0 ) scenarios in two and three dimensions. The key feature of interest for the purposes of this paper is under which conditions said system still admits global classical solutions due to the smoothing properties of the Laplacian even if the initial data is very irregular. Regarding this, we show for initial data mu in mathcal M ( overline Omega ) that, if either begin align bullet n 2, , chi 0 , text or bullet n 2, , chi 0 , text and the initial mass is small or bullet n 3, , chi 0 , text and mu f in L p( Omega), p 1 end align holds, it is still possible to construct global classical solutions to ( star ), which are continuous in t 0 in the vague topology on M ( overline Omega ) ."} {"_id": [15], "label": "cs.IT math.IT", "text": "Algorithms for reconstruction over single and multiple deletion channels. Recent advances in DNA sequencing technology and DNA storage systems have rekindled the interest in deletion channels. Multiple recent works have looked at variants of sequence reconstruction over a single and over multiple deletion channels, a notoriously difficult problem due to its highly combinatorial nature. Although works in theoretical computer science have provided algorithms which guarantee perfect reconstruction with multiple independent observations from the deletion channel, they are only applicable in the large blocklength regime and more restrictively, when the number of observations is also large. Indeed, with only a few observations, perfect reconstruction of the input sequence may not even be possible in most cases. In such situations, maximum likelihood (ML) and maximum aposteriori (MAP) estimates for the deletion channels are natural questions that arise and these have remained open to the best of our knowledge. In this work, we take steps to answer the two aforementioned questions. Specifically 1. We show that solving for the ML estimate over the single deletion channel (which can be cast as a discrete optimization problem) is equivalent to solving its relaxation, a continuous optimization problem 2. We exactly compute the symbolwise posterior distributions (under some assumptions on the priors) for both the single as well as multiple deletion channels. As part of our contributions, we also introduce tools to visualize and analyze error events, which we believe could be useful in other related problems concerning deletion channels."} {"_id": [8], "label": "physics.optics", "text": "Interaction between coaxial dielectric disks enhances the Q factor. We study the behavior of resonant modes under variation of the distance between two coaxial dielectric disks and show an avoided crossing of resonances because of interaction between the disks. Owing to coaxial arrange of disks the consideration is separated by the azimuthal index m 0, 1, 2, ldots . In the present paper we consider the case m 0 . For a long enough distance the resonant modes can be classified as symmetric and antisymmetric hybridizations of the resonant modes of the isolated disk. With decreasing of the distance the interaction becomes stronger that gives rise to avoided crossing of different resonances of the isolated disk. That in turn enhances the Q factor of two disks by one order in magnitude compared to the Q factor of isolated disk."} {"_id": [21], "label": "math.CO", "text": "Linked partition ideals, directed graphs and q multi summations. Finding an Andrews Gordon type generating function identity for a linked partition ideal is difficult in most cases. In this paper, we will handle this problem in the setting of graph theory. With the generating function of directed graphs with an empty'' vertex, we then turn our attention to a q difference system. This q difference system eventually yields a factorization problem of a special type of column functional vectors involving q multi summations. Finally, using a recurrence relation satisfied by certain q multi summations, we are able to provide non computer assisted proofs of some Andrews Gordon type generating function identities. These proofs also have an interesting connection with binary trees."} {"_id": [3], "label": "cs.CL", "text": "Posterior GAN Towards Informative and Coherent Response Generation with Posterior Generative Adversarial Network. Neural conversational models learn to generate responses by taking into account the dialog history. These models are typically optimized over the query response pairs with a maximum likelihood estimation objective. However, the query response tuples are naturally loosely coupled, and there exist multiple responses that can respond to a given query, which leads the conversational model learning burdensome. Besides, the general dull response problem is even worsened when the model is confronted with meaningless response training instances. Intuitively, a high quality response not only responds to the given query but also links up to the future conversations, in this paper, we leverage the query response future turn triples to induce the generated responses that consider both the given context and the future conversations. To facilitate the modeling of these triples, we further propose a novel encoder decoder based generative adversarial learning framework, Posterior Generative Adversarial Network (Posterior GAN), which consists of a forward and a backward generative discriminator to cooperatively encourage the generated response to be informative and coherent by two complementary assessment perspectives. Experimental results demonstrate that our method effectively boosts the informativeness and coherence of the generated response on both automatic and human evaluation, which verifies the advantages of considering two assessment perspectives."} {"_id": [43], "label": "cs.DB", "text": "AFrame Extending DataFrames for Large Scale Modern Data Analysis (Extended Version). Analyzing the increasingly large volumes of data that are available today, possibly including the application of custom machine learning models, requires the utilization of distributed frameworks. This can result in serious productivity issues for \"normal\" data scientists. This paper introduces AFrame, a new scalable data analysis package powered by a Big Data management system that extends the data scientists' familiar DataFrame operations to efficiently operate on managed data at scale. AFrame is implemented as a layer on top of Apache AsterixDB, transparently scaling out the execution of DataFrame operations and machine learning model invocation through a parallel, shared nothing big data management system. AFrame incrementally constructs SQL queries and leverages AsterixDB's semistructured data management facilities, user defined function support, and live data ingestion support. In order to evaluate the proposed approach, this paper also introduces an extensible micro benchmark for use in evaluating DataFrame performance in both single node and distributed settings via a collection of representative analytic operations. This paper presents the architecture of AFrame, describes the underlying capabilities of AsterixDB that efficiently support modern data analytic operations, and utilizes the proposed benchmark to evaluate and compare the performance and support for large scale data analyses provided by alternative DataFrame libraries."} {"_id": [8, 33], "label": "physics.optics physics.ins-det", "text": "Hyperspectral terahertz microscopy via nonlinear ghost imaging. We experimentally demonstrate Time Resolved Nonlinear Ghost Imaging and its ability to perform hyperspectral imaging in difficult to access wavelength regions, such as the Terahertz domain. We operate by combining nonlinear quadratic sparse generation and nonlinear detection in the Fourier plane. We demonstrate that traditional time slice approaches are prone to essential limitations in near field imaging due to space time coupling, which is overcome by our technique. As a proof of concept of our implementation, we show that we can provide experimental access to hyperspectral images completely unrecoverable through standard fixed time methods."} {"_id": [65], "label": "cs.NI", "text": "Coordinated Container Migration and Base Station Handover in Mobile Edge Computing. Offloading computationally intensive tasks from mobile users (MUs) to a virtualized environment such as containers on a nearby edge server, can significantly reduce processing time and hence end to end (E2E) delay. However, when users are mobile, such containers need to be migrated to other edge servers located closer to the MUs to keep the E2E delay low. Meanwhile, the mobility of MUs necessitates handover among base stations in order to keep the wireless connections between MUs and base stations uninterrupted. In this paper, we address the joint problem of container migration and base station handover by proposing a coordinated migration handover mechanism, with the objective of achieving low E2E delay and minimizing service interruption. The mechanism determines the optimal destinations and time for migration and handover in a coordinated manner, along with a delta checkpoint technique that we propose. We implement a testbed edge computing system with our proposed coordinated migration handover mechanism, and evaluate the performance using real world applications implemented with Docker container (an industry standard). The results demonstrate that our mechanism achieves 30 40 lower service downtime and 13 22 lower E2E delay as compared to other mechanisms. Our work is instrumental in offering smooth user experience in mobile edge computing."} {"_id": [8], "label": "physics.optics", "text": "Scattering of partially coherent radiation by non Hermitian localized structures having Parity Time symmetry. A theoretical model based on two point scatterers is suggested to investigate scattering of partially coherent radiation by a non Hermitian localized structure, invariant under the simultaneous symmetry operations of parity inversion and time reversal. Within the first order Born approximation, and the formalism of classical coherence theory, the spectral density of the scattered field in the far zone is obtained analytically. We find that the unidirectional character of the scattered radiation, which is one of the principal effects present in non Hermitian structures, may be suppressed due to the coherence properties of the radiation without changing the geometry of the structure. Asymmetric spectral changes of the scattered radiation due to the non Hermitian character of the material are also observed."} {"_id": [3], "label": "cs.CL", "text": "XCOPA A Multilingual Dataset for Causal Commonsense Reasoning. In order to simulate human language capacity, natural language processing systems must be able to reason about the dynamics of everyday situations, including their possible causes and effects. Moreover, they should be able to generalise the acquired world knowledge to new languages, modulo cultural differences. Advances in machine reasoning and cross lingual transfer depend on the availability of challenging evaluation benchmarks. Motivated by both demands, we introduce Cross lingual Choice of Plausible Alternatives (XCOPA), a typologically diverse multilingual dataset for causal commonsense reasoning in 11 languages, which includes resource poor languages like Eastern Apur 'imac Quechua and Haitian Creole. We evaluate a range of state of the art models on this novel dataset, revealing that the performance of current methods based on multilingual pretraining and zero shot fine tuning falls short compared to translation based transfer. Finally, we propose strategies to adapt multilingual models to out of sample resource lean languages where only a small corpus or a bilingual dictionary is available, and report substantial improvements over the random baseline. The XCOPA dataset is freely available at github.com cambridgeltl xcopa."} {"_id": [65, 22], "label": "cs.NI cs.SE", "text": "An Elastic IoT Device Management Platform. With the recent advancement of technologies over the past year, IoT has become a paradigm in which devices communicate with each other and the cloud to achieve various applications in multidisciplinary fields. However, developing, deploying, and experimenting with IoT applications are still tedious, expensive, and time consuming due to the factors like heterogeneity of hardware and software. This is where an IoT testbed plays a vital role in aiding developers to test their applications without being deploying it to the target environment. In this paper, we present a testbed that is scalable for heterogeneous devices and mainly focused on a small scale and medium scale IoT application. This testbed would be best suited for testing applications which demand robust nature, remote monitoring and control, incorporation of heterogeneous devices, location tracking of devices, and easy troubleshooting with security and internet connectivity concerns. This testbed is also embraced with the feature to work limit access to the internet. A detailed explanation of the design and architecture of the proposed testbed is provided. We also present a conceptual prototype of the testbed and the results obtained on experimenting under various conditions."} {"_id": [13], "label": "math.DS", "text": "Subsums of Null Sequences A Survey and Open Questions. We give a survey on the different results involving the topological structure of subsums of null sequences."} {"_id": [49, 68, 21], "label": "math.CO cs.DM math.OC", "text": "An improved binary programming formulation for the secure domination problem. The secure domination problem, a variation of the domination problem with some important real world applications, is considered. Very few algorithmic attempts to solve this problem have been presented in literature, and the most successful to date is a binary programming formulation which is solved using CPLEX. A new binary programming formulation is proposed here which requires fewer constraints and fewer binary variables than the existing formulation. It is implemented in CPLEX, and tested on certain families of graphs that have previously been considered in the context of secure domination. It is shown that the runtime required for the new formulation to solve the instances is significantly less than that of the existing formulation. An extension of our formulation that solves the related, but further constrained, secure connected domination problem is also given to the best of the authors' knowledge, this is the first such formulation in literature."} {"_id": [38, 46], "label": "math.AG math.NT", "text": "Non Archimedean volumes of metrized nef line bundles. Let L be a line bundle on a proper, geometrically reduced scheme X over a non trivially valued non Archimedean field K . Roughly speaking, the non Archimedean volume of a continuous metric on the Berkovich analytification of L measures the asymptotic growth of the space of small sections of tensor powers of L . For a continuous semipositive metric on L in the sense of Zhang, we show first that the non Archimedean volume agrees with the energy. The existence of such a semipositive metric yields that L is nef. A second result is that the non Archimedean volume is differentiable at any semipositive continuous metric. These results are known when L is ample, and the purpose of this paper is to generalize them to the nef case. The method is based on a detailed study of the content and the volume of a finitely presented torsion module over the (possibly non noetherian) valuation ring of K ."} {"_id": [17, 15], "label": "cs.IT cs.DC math.IT", "text": "Collaborative Decoding of Polynomial Codes for Distributed Computation. We show that polynomial codes (and some related codes) used for distributed matrix multiplication are interleaved Reed Solomon codes and, hence, can be collaboratively decoded. We consider a fault tolerant setup where t worker nodes return erroneous values. For an additive random Gaussian error model, we show that for all t N K , errors can be corrected with probability 1. Further, numerical results show that in the presence of additive errors, when L Reed Solomon codes are collaboratively decoded, the numerical stability in recovering the error locator polynomial improves with increasing L ."} {"_id": [46], "label": "math.AG", "text": "A proof of S o rensen's conjecture on Hermitian surfaces. In this article we prove a conjecture formulated by A.B. Soerensen in 1991 on the maximal number of mathbb F q 2 rational points on the intersection of a non degenerate Hermitian surface and a surface of degree d le q."} {"_id": [43], "label": "cs.DB", "text": "To pipeline or not to pipeline, that is the question. In designing query processing primitives, a crucial design choice is the method for data transfer between two operators in a query plan. As we were considering this critical design mechanism for an in memory database system that we are building, we quickly realized that (surprisingly) there isn't a clear definition of this concept. Papers are full or ad hoc use of terms like pipelining and blocking, but as these terms are not crisply defined, it is hard to fully understand the results attributed to these concepts. To address this limitation, we introduce a clear terminology for how to think about data transfer between operators in a query pipeline. We show that there isn't a clear definition of pipelining and blocking, and that there is a full spectrum of techniques based on a simple concept called unit of transfer. Next, we develop an analytical model for inter operator communication, and highlight the key parameters that impact performance (for in memory database settings). Armed with this model, we then apply it to the system we are designing and highlight the insights we gathered from this exercise. We find that the gap between pipelining and non pipelining query execution, w.r.t. key factors such as performance and memory footprint is quite narrow, and thus system designers should likely rethink the notion of pipelining vs. blocking for in memory database systems."} {"_id": [9], "label": "math.AP", "text": "On a Repulsion Keller Segel System with a Logarithmic Sensitivity. In this paper, we study the initial boundary value problem of a repulsion Keller Segel system with a logarithmic sensitivity modeling the reinforced random walk. By establishing an energy dissipation identity, we prove the existence of classical solutions in two dimensions as well as existence of weak solutions in the three dimensional setting. Moreover, it is shown that the weak solutions enjoys an eventual regularity property, i.e., it becomes regular after certain time T 0 . An exponential convergence rate toward the spatially homogeneous steady states is obtained as well. We adopt a new approach developed recently by the author cite J19 to study the eventual regularity. The argument is based on observation of the exponential stability of constant solutions in scaling invariant spaces together with certain dissipative property of the global solutions in the same spaces."} {"_id": [34, 42], "label": "math.CV math.DG", "text": "Fridman Function, Injectivity Radius Function and Squeezing Function. Very recently, the Fridman function of a complex manifold X has been identified as a dual of the squeezing function of X . In this paper, we prove that the Fridman function for certain hyperbolic complex manifold X is bounded above by the injectivity radius function of X . This result also suggests us to use the Fridman function to extend the definition of uniform thickness to higher dimensional hyperbolic complex manifolds. We also establish an expression for the Fridman function (with respect to the Kobayashi metric) when X mathbb D diagup Gamma and Gamma is a torsion free discrete subgroup of isometries on the standard open unit disk mathbb D . Hence, explicit formulae of the Fridman functions for the annulus A r and the punctured disk mathbb D are derived. These are the first explicit non constant Fridman functions. Finally, we explore the boundary behaviour of the Fridman functions (with respect to the Kobayashi metric) and the squeezing functions for regular type hyperbolic Riemann surfaces and planar domains respectively."} {"_id": [25], "label": "math.PR", "text": "On distance covariance in metric and Hilbert spaces. Distance covariance is a measure of dependence between two random variables that take values in two, in general different, metric spaces, see Sz 'ekely, Rizzo and Bakirov (2007) and Lyons (2013). It is known that the distance covariance, and its generalization alpha distance covariance, can be defined in several different ways that are equivalent under some moment conditions. The present paper considers four such definitions and find minimal moment conditions for each of them, together with some partial results when these conditions are not satisfied. The paper also studies the special case when the variables are Hilbert space valued, and shows under weak moment conditions that two such variables are independent if and only if their ( alpha )distance covariance is 0 this extends results by Lyons (2013) and Dehling et al. (2018 ). The proof uses a new definition of distance covariance in the Hilbert space case, generalizing the definition for Euclidean spaces using characteristic functions by Sz 'ekely, Rizzo and Bakirov (2007)."} {"_id": [32, 17], "label": "cs.DC cs.DS", "text": "Deterministic Leader Election in Anonymous Radio Networks. We consider leader election in anonymous radio networks modeled as simple undirected connected graphs. Nodes communicate in synchronous rounds. Nodes are anonymous and execute the same deterministic algorithm, so symmetry can be broken only in one way by different wake up times of the nodes. In which situations is it possible to break symmetry and elect a leader using time as symmetry breaker? To answer this question, we consider configurations. A configuration is the underlying graph with nodes tagged by non negative integers with the following meaning. A node can either wake up spontaneously in the round shown on its tag, according to some global clock, or can be woken up hearing a message sent by one of its already awoken neighbours. The local clock of a node starts at its wakeup and nodes do not have access to the global clock determining their tags. A configuration is feasible if there exists a distributed algorithm that elects a leader for this configuration. Our main result is a complete algorithmic characterization of feasible configurations we design a centralized decision algorithm, working in polynomial time, whose input is a configuration and which decides if the configuration is feasible. We also provide a dedicated deterministic distributed leader election algorithm for each feasible configuration that elects a leader for this configuration in time O(n 2 sigma) , where n is the number of nodes and sigma is the difference between the largest and smallest tag of the configuration. We then prove that there cannot exist a universal deterministic distributed algorithm electing a leader for all feasible configurations. In fact, we show that such a universal algorithm cannot exist even for the class of 4 node feasible configurations. We also prove that a distributed version of our decision algorithm cannot exist."} {"_id": [3], "label": "cs.CL", "text": "Modeling Graph Structure via Relative Position for Text Generation from Knowledge Graphs. We present Graformer, a novel Transformer based encoder decoder architecture for graph to text generation. With our novel graph self attention, the encoding of a node relies on all nodes in the input graph not only direct neighbors facilitating the detection of global patterns. We represent the relation between two nodes as the length of the shortest path between them. Graformer learns to weight these node node relations differently for different attention heads, thus virtually learning differently connected views of the input graph. We evaluate Graformer on two popular graph to text generation benchmarks, AGENDA and WebNLG, where it achieves strong performance while using many fewer parameters than other approaches."} {"_id": [67], "label": "physics.atom-ph", "text": "Controlling the Photoelectric Effect in the Time Domain. When an atom or molecule absorbs a high energy photon, an electron is emitted with a well defined energy and a highly symmetric angular distribution, ruled by energy quantization and parity conservation. These rules seemingly break down when small quantum systems are exposed to short and intense light pulses, which raise the question of their universality for the simplest case of the photoelectric effect. Here we investigate the photoionization of helium by a sequence of attosecond pulses in the presence of a weak infrared dressing field. We continuously control the energy and introduce an asymmetry in the emission direction of the photoelectrons, thus contradicting well established quantum mechanical predictions. This control is possible due to an extreme temporal confinement of the light matter interaction. Our work extends time domain coherent control schemes to one of the fastest processes in nature, the photoelectric effect."} {"_id": [0, 41], "label": "cs.CV cs.RO", "text": "Trained Trajectory based Automated Parking System using Visual SLAM on Surround View Cameras. Automated Parking is becoming a standard feature in modern vehicles. Existing parking systems build a local map to be able to plan for maneuvering towards a detected slot. Next generation parking systems have an use case where they build a persistent map of the environment where the car is frequently parked, say for example, home parking or office parking. The pre built map helps in re localizing the vehicle better when its trying to park the next time. This is achieved by augmenting the parking system with a Visual SLAM pipeline and the feature is called trained trajectory parking in the automotive industry. In this paper, we discuss the use cases, design and implementation of a trained trajectory automated parking system. The proposed system is deployed on commercial vehicles and the consumer application is illustrated in url https youtu.be nRWF5KhyJZU . The focus of this paper is on the application and the details of vision algorithms are kept at high level."} {"_id": [0, 1, 3], "label": "cs.CL cs.CV cs.LG", "text": "MART Memory Augmented Recurrent Transformer for Coherent Video Paragraph Captioning. Generating multi sentence descriptions for videos is one of the most challenging captioning tasks due to its high requirements for not only visual relevance but also discourse based coherence across the sentences in the paragraph. Towards this goal, we propose a new approach called Memory Augmented Recurrent Transformer (MART), which uses a memory module to augment the transformer architecture. The memory module generates a highly summarized memory state from the video segments and the sentence history so as to help better prediction of the next sentence (w.r.t. coreference and repetition aspects), thus encouraging coherent paragraph generation. Extensive experiments, human evaluations, and qualitative analyses on two popular datasets ActivityNet Captions and YouCookII show that MART generates more coherent and less repetitive paragraph captions than baseline methods, while maintaining relevance to the input video events. All code is available open source at https github.com jayleicn recurrent transformer"} {"_id": [17, 19, 1], "label": "cs.CR cs.DC cs.LG", "text": "Policy Based Federated Learning. In this paper we present PoliFL, a decentralized, edge based framework that supports heterogeneous privacy policies for federated learning. We evaluate our system on three use cases that train models with sensitive user data collected by mobile phones predictive text, image classification, and notification engagement prediction on a Raspberry Pi edge device. We find that PoliFL is able to perform accurate model training and inference within reasonable resource and time budgets while also enforcing heterogeneous privacy policies."} {"_id": [39], "label": "cs.CY", "text": "Internet of Things based innovations in Saudi healthcare sector A methodological approach for investigating adoption issues. Using today's Internet network capacities, this technology has extended various benefits in healthcare sectors. For instance, existing studies already indicated that information technology applications with IoT based innovations may revolutionize the healthcare industry and subsequently help to improve the real time reporting of patients' health data. It should be noted that the adoption of IoT and its relevant interventions in the health sector has not been as fast as the uptake been observed in other industries. To tackle this issue, we develop a qualitative phenomenological approach for investigating factors that affect IoT adoption and its integration into healthcare service delivery in Saudi Arabia."} {"_id": [94], "label": "physics.ed-ph", "text": "Students taught by a first time instructor using active learning teaching strategies outperform students taught by a highly regarded traditional instructor. In this paper we put forth a model for physics course reform that uniquely uses proven, research based active learning strategies to help students improve their physics knowledge and problem solving skills. In this study, we compared the exam performance of students in two sections of the same introductory physics course. One section (the traditional section, N 258) was taught by an instructor who is highly regarded for his lectures, but did not use any active learning teaching strategies. The other section (the reformed section, N 217) was taught by an instructor who had never before taught a physics class but who was trained in physics and astronomy education research and who did use active learning teaching strategies. Students in the reformed section significantly outperformed students in the traditional section on common exam questions over the course of the semester, regardless of whether the question was conceptual or quantitative. This reform effort has been successful at improving students' learning and significantly increasing the department's use of active learning strategies at the introductory level and beyond."} {"_id": [41], "label": "cs.RO", "text": "Heterogeneous Fixed wing Aerial Vehicles for Resilient Coverage of an Area. This paper presents a distributed approach to provide persistent coverage of an arbitrarily shaped area using heterogeneous coverage of fixed wing unmanned aerial vehicles (UAVs), and to recover from simultaneous failures of multiple UAVs. The proposed approach discusses level homogeneous deployment and maintenance of a homogeneous fleet of fixed wing UAVs given the boundary information and the minimum loitering radius. The UAVs are deployed at different altitude levels to provide heterogeneous coverage and sensing. We use an efficient square packing method to deploy the UAVs, given the minimum loiter radius and the area boundary. The UAVs loiter over the circles inscribed over these packing squares in a synchronized motion to fulfill the full coverage objective. An top down hierarchy of the square packing, where each outer square (super square) is partitioned into four equal sized inner squares (sub square), is exploited to introduce resilience in the deployed UAV network. For a failed sub square UAV, a replacement neighbor is chosen considering the effective coverage and deployed to the corresponding super square at a higher altitude to recover full coverage, trading off with the quality of coverage of the sub area. This is a distributed approach as all the decision making is done within close range of the loss region, and it can be scaled and adapted to various large scale area and UAV configurations. Simulation results have been presented to illustrate and verify the applicability of the approach."} {"_id": [46], "label": "math.AG", "text": "Pointwise surjective presentations of stacks. We show that any stack mathfrak X of finite type over a Noetherian scheme has a presentation X rightarrow mathfrak X by a scheme of finite type such that X(F) rightarrow mathfrak X (F) is onto, for every finite or real closed field F . Under some additional conditions on mathfrak X , we show the same for all perfect fields. We prove similar results for (some) Henselian rings. We give two applications of the main result. One is to counting isomorphism classes of stacks over the rings mathbb Z p n the other is about the relation between real algebraic and Nash stacks."} {"_id": [34, 21], "label": "math.CO math.CV", "text": "A criterion for sharpness in tree enumeration and the asymptotic number of triangulations in Kuperberg's G2 spider. We prove a conjectured asymptotic formula of Kuperberg from the representation theory of the Lie algebra G 2 . Given a non negative sequence (a n) n geq 1 , the identity B(x) A(xB(x)) for generating functions A(x) 1 sum n geq 1 a n x n and B(x) 1 sum n geq 1 b n x n determines the number b n of rooted planar trees with n vertices such that each vertex having i children can have one of a i distinct colors. Kuperberg proved in cite Kuperberg that this identity holds in the case that b n dim text Inv G 2 (V( lambda 1) otimes n ) , where V( lambda 1) is the 7 dimensional fundamental representation of G 2 , and a n is the number of triangulations of a regular n gon such that each internal vertex has degree at least 6 . He also observed that limsup n to infty sqrt n a n leq 7 B(1 7) and conjectured that this estimate is sharp, or in terms of power series, that the radius of convergence of A(x) is exactly B(1 7) 7 . We prove this conjecture by introducing a new criterion for sharpness in the analogous estimate for general power series A(x) and B(x) satisfying B(x) A(xB(x)) . Moreover, by way of singularity analysis performed on a recently discovered generating function for B(x) , we significantly refine the conjecture by deriving an asymptotic formula for the sequence (a n) ."} {"_id": [3], "label": "cs.CL", "text": "Fine Grained Argument Unit Recognition and Classification. Prior work has commonly defined argument retrieval from heterogeneous document collections as a sentence level classification task. Consequently, argument retrieval suffers both from low recall and from sentence segmentation errors making it difficult for humans and machines to consume the arguments. In this work, we argue that the task should be performed on a more fine grained level of sequence labeling. For this, we define the task as Argument Unit Recognition and Classification (AURC). We present a dataset of arguments from heterogeneous sources annotated as spans of tokens within a sentence, as well as with a corresponding stance. We show that and how such difficult argument annotations can be effectively collected through crowdsourcing with high interannotator agreement. The new benchmark, AURC 8, contains up to 15 more arguments per topic as compared to annotations on the sentence level. We identify a number of methods targeted at AURC sequence labeling, achieving close to human performance on known domains. Further analysis also reveals that, contrary to previous approaches, our methods are more robust against sentence segmentation errors. We publicly release our code and the AURC 8 dataset."} {"_id": [0], "label": "cs.CV", "text": "Fast and Robust Face to Parameter Translation for Game Character Auto Creation. With the rapid development of Role Playing Games (RPGs), players are now allowed to edit the facial appearance of their in game characters with their preferences rather than using default templates. This paper proposes a game character auto creation framework that generates in game characters according to a player's input face photo. Different from the previous methods that are designed based on neural style transfer or monocular 3D face reconstruction, we re formulate the character auto creation process in a different point of view by predicting a large set of physically meaningful facial parameters under a self supervised learning paradigm. Instead of updating facial parameters iteratively at the input end of the renderer as suggested by previous methods, which are time consuming, we introduce a facial parameter translator so that the creation can be done efficiently through a single forward propagation from the face embeddings to parameters, with a considerable 1000x computational speedup. Despite its high efficiency, the interactivity is preserved in our method where users are allowed to optionally fine tune the facial parameters on our creation according to their needs. Our approach also shows better robustness than previous methods, especially for those photos with head pose variance. Comparison results and ablation analysis on seven public face verification datasets suggest the effectiveness of our method."} {"_id": [63], "label": "cs.DL", "text": "The differing meanings of indicators under different policy contexts. The case of internationalisation. In this chapter we build upon Moed's conceptual contributions on the importance of the policy context when using and interpreting scientometric indicators. We focus on the use of indicators in research evaluation regarding internationalisation policies. The globalization of higher education presents important challenges to institutions worldwide, which are confronted with tensions derived from the need to respond both, to their local necessities and demands while participating in global networks. In this context, indicators have served as measures for monitoring and enforcing internationalisation policies, in many cases interpreting them regardless of the policy context in which they are enforced. We will analyse three examples of indicators related to internationalisation. The first one is about international collaborations, under the assumption that a greater number of internationally co authored publications will benefit a national science system as it will result in higher citation impact. The second one relates to the promotion of English language as the dominant language of science. The third case analyses how different policy contexts shape the selection and construction of indicators, sometimes in a partial way which does not properly reflect the phenomenon under study. The examples illustrate that the interpretation and policy implications of the 'same' S T indicators differ depending on specific contexts."} {"_id": [34, 76, 23], "label": "math.FA math.CV math.SP", "text": "Localizable points in the support of a multiplier ideal and spectra of constrained operators. A unitarily invariant, complete Nevanlinna Pick kernel K on the unit ball determines a class of operators on Hilbert space called K contractions. We study those K contractions that are constrained, in the sense that they are annihilated by an ideal of multipliers. Our overarching goal is to identify various joint spectra of these constrained K contractions through the vanishing locus of their annihilators. Our methods are based around a careful analysis of a subset of the ball associated to the annihilator, which we call its support. For the functional models, we show how this support completely determines several natural joint spectra. The picture is more complicated for general K contractions, as their spectra can be properly contained in the support. Nevertheless, the \"localizable\" portion of the support always consists of spectral points. When the support is assumed to be small in an appropriate sense, we manage to effectively detect points of localizability."} {"_id": [9, 12, 23], "label": "math.CA math.AP math.FA", "text": "On Function Spaces with Mixed Norms A Survey. The targets of this article are threefold. The first one is to give a survey on the recent developments of function spaces with mixed norms, including mixed Lebesgue spaces, iterated weak Lebesgue spaces, weak mixed norm Lebesgue spaces and mixed Morrey spaces as well as anisotropic mixed norm Hardy spaces. The second one is to provide a detailed proof for a useful inequality about mixed Lebesgue norms and the Hardy Littlewood maximal operator and also to improve some known results on the maximal function characterizations of anisotropic mixed norm Hardy spaces and the boundedness of Calder 'on Zygmund operators from these anisotropic mixed norm Hardy spaces to themselves or to mixed Lebesgue spaces. The last one is to correct some errors and seal some gaps existing in the known articles."} {"_id": [64, 39], "label": "physics.soc-ph cs.CY", "text": "The Nature of Human Settlement Building an understanding of high performance city design. In an impending urban age where the majority of the world's population will live in cities, it is critical that we improve our understanding of the strengths and limitations of existing city designs to ensure they are safe, clean, can deliver health co benefits and importantly, are sustainable into the future. To enable this, a systematic and efficient means of performing inter and intra city comparisons based on urban form is required. Until now, methods for comparing cities have been limited by scalability, often reliant upon non standardised local input data that can be costly and difficult to obtain. To address this, we have developed a unique approach to determine the mix, distribution, and composition of neighbourhood types in cities based on dimensions of block size and regularity, sorted by a self organising map. We illustrate the utility of the method to provide an understanding of the underlying city morphology by overlaying spatially standardised city metrics such as air pollution and transport activity across a set of 1667 global cities with populations exceeding 300,000. The unique approach reports associations between specific mixes of neighbourhood typologies and quantities of moving vehicles (r 0.97), impervious surfaces (r 0.86), and air pollution levels (aerosol optical depth r 0.58 and NO 2 r 0.57). What this illustrates, is that this unique approach can identify the characteristics and neighbourhood mixes of well performing urban areas while also producing unique city fingerprints' that can be used to provide new metrics, insights, and drive improvements in city design for the future."} {"_id": [0], "label": "cs.CV", "text": "DADA A Large scale Benchmark and Model for Driver Attention Prediction in Accidental Scenarios. Driver attention prediction has recently absorbed increasing attention in traffic scene understanding and is prone to be an essential problem in vision centered and human like driving systems. This work, different from other attempts, makes an attempt to predict the driver attention in accidental scenarios containing normal, critical and accidental situations simultaneously. However, challenges tread on the heels of that because of the dynamic traffic scene, intricate and imbalanced accident categories. With the hypothesis that driver attention can provide a selective role of crash object for assisting driving accident detection or prediction, this paper designs a multi path semantic guided attentive fusion network (MSAFNet) that learns the spatio temporal semantic and scene variation in prediction. For fulfilling this, a large scale benchmark with 2000 video sequences (named as DADA 2000) is contributed with laborious annotation for driver attention (fixation, saccade, focusing time), accident objects intervals, as well as the accident categories, and superior performance to state of the arts are provided by thorough evaluations. As far as we know, this is the first comprehensive and quantitative study for the human eye sensing exploration in accidental scenarios. DADA 2000 is available at https github.com JWFangit LOTVS DADA."} {"_id": [46], "label": "math.AG", "text": "Arithmetic Characteristic Curves. For a split reductive group defined over a number field, we first introduce the notations of arithmetic torsors and arithmetic Higgs torsors. Then we construct arithmetic characteristic curves associated to arithmetic Higgs torsors, based on the Chevalley characteristic morphism and the existence of Chevalley basis for the associated Lie algebra. As to be expected, this work is motivated by the works of Beauville Narasimhan on spectral curves and Donagi Gaistgory on cameral curves in algebraic geometry. In the forthcoming papers, we will use arithmetic characteristic curves to construct arithmetic Hitchin fibrations and study the intersection homologies and perverse sheaves for the associated structures, following Ngo's approach to the fundamental lemma."} {"_id": [11], "label": "physics.app-ph", "text": "The Effect of Pitch Distance on the Statistics and Morphology of Through Silicon Via Extrusion. In this work, we investigated the effect of pitch distance on the statistical variation and morphology of extrusion in Cu TSVs and the underlying mechanisms. Extrusion statistics were obtained from TSV samples with two different pitch distances. A notable increase in the magnitude of extrusion was observed in vias with smaller pitch, yet the extrusion spread was largely unaffected. The morphologies of the extruded vias were characterized and categorized, and finite element analysis was carried out to study the effect of pitch distance on stress and deformation. The results suggested that the overlapping of stress fields from neighboring vias resulted in larger stress in the small pitch vias, which subsequently led to higher extrusion. The morphologies observed in the extruded vias were related to the operation of different deformation mechanisms under the combined effect of stress and microstructure. The statistical spread of via extrusion, which was similar in both groups of vias, was related to the stochastic nature of the via microstructure. By using a thin cap layer of Ta to suppress the vacancy sources at the via top surface, the adverse effect of the pitch distance was minimized and a pronounced reduction of extrusion was achieved in vias of both pitch distances."} {"_id": [41], "label": "cs.RO", "text": "A Unified Method for Solving Inverse, Forward, and Hybrid Manipulator Dynamics using Factor Graphs. This paper describes a unified method solving for inverse, forward, and hybrid dynamics problems for robotic manipulators with either open kinematic chains or closed kinematic loops based on factor graphs. Manipulator dynamics is considered to be a well studied problem, and various different algorithms have been developed to solve each type of dynamics problem. However, they are not easily explained in a unified and intuitive way. In this paper, we introduce factor graphs as a unifying graphical language in which not only to solve all types of dynamics problems, but also explain the classical dynamics algorithms in a unified framework."} {"_id": [26, 21], "label": "math.CO math.RT", "text": "(GL k x S n) modules and nabla of hook indexed Schur functions. The aim of this paper is to describe structural properties of spaces of diagonal rectangular harmonic polynomials in several sets (say k ) of n variables, both as GL k modules and S n modules. We construct explicit such modules associated to any hook shape partitions. For the two sets of variables case, we conjecture that the associated graded Frobenius characteristic corresponds to the effect of the operator Nabla on the corresponding hook indexed Schur function, up to a usual renormalization. We prove identities that give indirect support to this conjecture, and show that its restriction to one set of variables holds. We further give indications on how the several sets context gives a better understanding of questions regarding the structures of these modules and the links between them."} {"_id": [23], "label": "math.FA", "text": "Ring theoretic (in)finiteness in reduced products of Banach algebras. We study ring theoretic (in)finiteness properties such as emph Dedekind finiteness and emph proper infiniteness of ultraproducts (and more generally, reduced products) of Banach algebras. Whilst we characterise when an ultraproduct has these ring theoretic properties in terms of its underlying sequence of algebras, we find that, contrary to the C algebraic setting, it is not true in general that an ultraproduct has a ring theoretic finiteness property if and only if \"ultrafilter many\" of the underlying sequence of algebras have the same property. This might appear to violate the continuous model theoretic counterpart of L o 's's Theorem the reason it does not is that for a general Banach algebra, the ring theoretic properties we consider cannot be verified by considering a bounded subset of the algebra of emph fixed bound. For Banach algebras, we construct counter examples to show, for example, that each component Banach algebra can fail to be Dedekind finite while the ultraproduct is Dedekind finite, and we explain why such a counter example is not possible for C algebras. Finally the related notion of having textit stable rank one is also studied for ultraproducts."} {"_id": [41, 2], "label": "cs.RO cs.AI", "text": "Robot self other distinction active inference meets neural networks learning in a mirror. Self other distinction and self recognition are important skills for interacting with the world, as it allows humans to differentiate own actions from others and be self aware. However, only a selected group of animals, mainly high order mammals such as humans, has passed the mirror test, a behavioural experiment proposed to assess self recognition abilities. In this paper, we describe self recognition as a process that is built on top of body perception unconscious mechanisms. We present an algorithm that enables a robot to perform non appearance self recognition on a mirror and distinguish its simple actions from other entities, by answering the following question am I generating these sensations? The algorithm combines active inference, a theoretical model of perception and action in the brain, with neural network learning. The robot learns the relation between its actions and its body with the effect produced in the visual field and its body sensors. The prediction error generated between the models and the real observations during the interaction is used to infer the body configuration through free energy minimization and to accumulate evidence for recognizing its body. Experimental results on a humanoid robot show the reliability of the algorithm for different initial conditions, such as mirror recognition in any perspective, robot robot distinction and human robot differentiation."} {"_id": [36, 7], "label": "physics.chem-ph physics.comp-ph", "text": "Notes on density matrix perturbation theory. Density matrix perturbation theory (DMPT) is known as a promising alternative to the Rayleigh Schr \"odinger perturbation theory, in which the sum over state (SOS) is replaced by algorithms with perturbed density matrices as the input variables. In this article, we formulate and discuss three types of DMPT, with two of them based only on density matrices the approach of Kussmann and Ochsenfeld J. Chem. Phys.127, 054103 (2007) is reformulated via the Sylvester equation, and the recursive DMPT of A.M.N. Niklasson and M. Challacombe Phys. Rev. Lett. 92, 193001 (2004) is extended to the hole particle canonical purification (HPCP) from J. Chem. Phys. 144, 091102 (2016) . Comparison of the computational performances shows that the aformentioned methods outperform the standard SOS. The HPCP DMPT demonstrates stable convergence profiles but at a higher computational cost when compared to the original recursive polynomial method"} {"_id": [0, 41], "label": "cs.RO cs.CV", "text": "Cut and Paste Dataset Generation for Balancing Domain Gaps in Object Instance Detection. Training an object instance detector where only a few training object images are available is a challenging task. One solution is a cut and paste method that generates a training dataset by cutting object areas out of training images and pasting them onto other background images. A detector trained on a dataset generated with a cut and paste method suffers from the conventional domain shift problem, which stems from a discrepancy between the source domain (generated training dataset) and the target domain (real test dataset). Though state of the art domain adaptation methods are able to reduce this gap, it is limited because they do not consider the difference of domain gaps of foreground and background. In this study, we present that the conventional domain gap can be divided into two sub domain gaps for foreground and background. Then, we show that the original cut and paste approach suffers from a new domain gap problem, an unbalanced domain gaps, because it has two separate source domains for foreground and background, unlike the conventional domain shift problem. Then, we introduce an advanced cut and paste method to balance the unbalanced domain gaps by diversifying the foreground with GAN (generative adversarial network) generated seed images and simplifying the background using image processing techniques. Experimental results show that our method is effective for balancing domain gaps and improving the accuracy of object instance detection in a cluttered indoor environment using only a few seed images. Furthermore, we show that balancing domain gaps can improve the detection accuracy of state of the art domain adaptation methods."} {"_id": [15], "label": "cs.IT math.IT", "text": "Full Duplex MIMO OFDM Communication with Self Energy Recycling. This paper focuses on energy recycling in full duplex (FD) relaying multiple input multiple output orthogonal frequency division multiplexing (OFDM) communication. The loop self interference (SI) due to full duplexing is seen as an opportunity for the energy constrained relay node to replenish its energy requirement through wireless power transfer. In forwarding the source information to the destination, the FD relay can simultaneously harvest energy from the source wireless transmission and also through energy recycling from its own transmission. The objective is to maximize the overall spectral efficiency by designing the optimal power allocation over OFDM sub carriers and transmit antennas. Due to a large number of sub carriers, this design problem poses a large scale nonconvex optimization problem involving a few thousand variables of power allocation, which is very computationally challenging. A new path following algorithm is proposed, which converges to an optimal solution. This algorithm is very efficient since it is based on textit closed form calculations. Numerical results for a practical simulation setting show promising results by achieving high spectral efficiency."} {"_id": [38], "label": "math.NT", "text": "Efficient computation of BSD invariants in genus 2. Recently, all Birch and Swinnerton Dyer invariants, except for the order of Sha, have been computed for all curves of genus 2 contained in the L functions and Modular Forms Database. This report explains the improvements made to the implementation of the algorithm described in arXiv 1711.10409 that were needed to do the computation of the Tamagawa numbers and the real period in reasonable time. We also explain some of the more technical details of the algorithm, and give a brief overview of the methods used to compute the special value of the L function and the regulator."} {"_id": [56, 68, 21], "label": "math.CO cs.DM cs.LO", "text": "The birth of the contradictory component in random 2 SAT. We prove that, with high probability, the contradictory components of a random 2 SAT formula in the subcritical phase of the phase transition have only 3 regular kernels. This follows from the relation between these kernels and the complex component of a random graph in the subcritical phase. This partly settles the question about the structural similarity between the phase transitions in 2 SAT and random graphs. As a byproduct, we describe the technique that allows to obtain a full asymptotic expansion of the satisfiability in the subcritical phase. We also obtain the distribution of the number of contradictory variables and the structure of the spine in the subcritical phase."} {"_id": [21], "label": "math.CO", "text": "All 2 neighborly d polytopes with at most d 9 facets. We give a complete enumeration of all 2 neighborly d polytopes with d 9 and less facets. All of them are realized as 0 1 polytopes, except a 6 polytope P 6,10,15 with 10 vertices and 15 facets, and pyramids over P 6,10,15 . In particular, we update the lower bounds for the number of facets of a 2 neighborly d polytope P and showed that the number of facets of P is not less than the number of its vertices f 0(P) for f 0(P) le d 10 ."} {"_id": [12], "label": "math.CA", "text": "L p regularity for a class of averaging operators on the Heisenberg group. We prove L p comp to L p s boundedness for averaging operators associated to a class of curves in the Heisenberg group mathbb H 1 via L 2 estimates for related oscillatory integrals and Bourgain Demeter decoupling inequalities on the cone. We also construct a Sobolev space adapted to translations on the Heisenberg group to which these averaging operators map all L p functions boundedly."} {"_id": [93], "label": "physics.class-ph", "text": "Collision of two balls in a groove An interplay between translation and rotation. When two identical balls collide with equal inital speed on a horizontal groove, one can observe three trajectory types depending on the groove width. To explain this observation, we derive velocity diagrams of the balls motions from Newton's laws of translation and rotation and kinematics of rigid bodies in a three dimensional vectorial representation and compare them with experimental results. The velocity diagrams and an introduced determinant allow to discriminate between the trajectory types and to understand the interplay between translation and rotation after the collision of the balls."} {"_id": [21], "label": "math.CO", "text": "Generalized Catalan recurrences, Riordan arrays, elliptic curves, and orthogonal polynomials. We show that the Catalan Schroeder convolution recurrences and their higher order generalizations can be solved using Riordan arrays and the Catalan numbers. We investigate the Hankel transforms of many of the recurrence solutions, and indicate that Somos 4 sequences often arise. We exhibit relations between recurrences, Riordan arrays, elliptic curves and Somos 4 sequences. We furthermore indicate how one can associate a family of orthogonal polynomials to a point on an elliptic curve, whose moments are related to recurrence solutions."} {"_id": [42, 18, 13], "label": "math.DS math.DG math.GT", "text": "Counting periodic orbits of vector fields over smooth closed manifolds. We address the problem of counting periodic orbits of vector fields on smooth closed manifolds. The space of non constant periodic orbits is enlarged to a complete space by adding the ghost orbits, which are decorations of the zeros of vector fields. Associated with any compact and open subset Gamma of the moduli space of periodic and ghost orbits, we define an integer weight. When the vector field moves along a path, and Gamma deforms in a compact and open family, we show that the weight function stays constant. We also give a number of examples and computations, which illustrate the applications of our main theorem."} {"_id": [0, 1, 2, 39, 52], "label": "cs.CY cs.AI cs.CV cs.LG cs.MA", "text": "Research Directions in Democratizing Innovation through Design Automation, One Click Manufacturing Services and Intelligent Machines. The digitalization of manufacturing has created opportunities for consumers to customize products that fit their individualized needs which in turn would drive demand for manufacturing services. However, this pull based manufacturing system production of extremely low quantity and limitless variety for products is expensive to implement. New emerging technology in design automation driven by data driven computational design, manufacturing as a service marketplaces and digitally enabled micro factories holds promise towards democratization of innovation. In this paper, scientific, technology and infrastructure challenges are identified and if solved, the impact of these emerging technologies on product innovation and future factory organization is discussed."} {"_id": [2], "label": "cs.AI", "text": "Entropy, Computing and Rationality. Making decisions freely presupposes that there is some indeterminacy in the environment and in the decision making engine. The former is reflected on the behavioral changes due to communicating few changes indicate rigid environments productive changes manifest a moderate indeterminacy, but a large communicating effort with few productive changes characterize a chaotic environment. Hence, communicating, effective decision making and productive behavioral changes are related. The entropy measures the indeterminacy of the environment, and there is an entropy range in which communicating supports effective decision making. This conjecture is referred to here as the The Potential Productivity of Decisions. The computing engine that is causal to decision making should also have some indeterminacy. However, computations performed by standard Turing Machines are predetermined. To overcome this limitation an entropic mode of computing that is called here Relational Indeterminate is presented. Its implementation in a table format has been used to model an associative memory. The present theory and experiment suggest the Entropy Trade off There is an entropy range in which computing is effective but if the entropy is too low computations are too rigid and if it is too high computations are unfeasible. The entropy trade off of computing engines corresponds to the potential productivity of decisions of the environment. The theory is referred to an Interaction Oriented Cognitive Architecture. Memory, perception, action and thought involve a level of indeterminacy and decision making may be free in such degree. The overall theory supports an ecological view of rationality. The entropy of the brain has been measured in neuroscience studies and the present theory supports that the brain is an entropic machine. The paper is concluded with a number of predictions that may be tested empirically."} {"_id": [41, 49], "label": "cs.RO math.OC", "text": "Inducing Multi Convexity in Path Constrained Trajectory Optimization for Mobile Manipulators. In this paper, we propose a novel trajectory optimization algorithm for mobile manipulators under end effector path, collision avoidance and various kinematic constraints. Our key contribution lies in showing how this highly non linear and non convex problem can be solved as a sequence of convex unconstrained quadratic programs (QPs). This is achieved by reformulating the non linear constraints that arise out of manipulator kinematics and its coupling with the mobile base in a multi affine form. We then use techniques from Alternating Direction Method of Multipliers (ADMM) to formulate and solve the trajectory optimization problem. The proposed ADMM has two similar non convex steps. Importantly, a convex surrogate can be derived for each of them. We show how large parts of our optimization can be solved in parallel providing the possibility of exploiting multi core CPUs GPUs. We validate our trajectory optimization on different benchmark examples. Specifically, we highlight how it solves the cyclicity bottleneck and provides a holistic approach where diverse set of trajectories can be obtained by trading off different aspects of manipulator and mobile base motion."} {"_id": [4], "label": "cs.NE", "text": "Multi threaded Memory Efficient Crossover in C for Generational Genetic Programming. C code snippets from a multi core parallel memory efficient crossover for genetic programming are given. They may be adapted for separate generation evolutionary algorithms where large chromosomes or small RAM require no more than M (2 times nthreads) simultaneously active individuals."} {"_id": [6], "label": "physics.flu-dyn", "text": "The impact of porous walls on the rheology of suspensions. We study the effect of isotropic porous walls on a plane Couette flow laden with spherical and rigid particles. We perform a parametric study varying the volume fraction between 0 and 30 , the porosity between 0.3 and 0.9 and the non dimensional permeability between 0 and 7.9 times 10 3 We find that the porous walls induce a progressive decrease in the suspension effective viscosity as the wall permeability increases. This behavior is explained by the weakening of the wall blocking effect and by the appearance of a slip velocity at the interface of the porous medium, which reduces the shear rate in the channel. Therefore, particle rotation and the consequent velocity fluctuations in the two phases are dampened, leading to reduced particle interactions and particle stresses. Based on our numerical evidence, we provide a closed set of equations for the suspension viscosity, which can be used to estimate the suspension rheology in the presence of porous walls."} {"_id": [25], "label": "math.PR", "text": "Distribution Dependent Stochastic Differential Delay Equations in finite and infinite dimensions. We prove that distribution dependent (also called McKean Vlasov) stochastic delay equations of the form begin equation mathrm d X(t) b(t,X t, mathcal L X t ) mathrm d t sigma(t,X t, mathcal L X t ) mathrm d W(t) end equation have unique (strong) solutions in finite as well as infinite dimensional state spaces if the coefficients fulfill certain monotonicity assumptions."} {"_id": [36], "label": "physics.chem-ph", "text": "Localised Spin Rotations A Size Consistent Approach to Non Orthogonal Configuration Interaction. Current Non Orthogonal Configuration Interaction (NOCI) methods often use a set of Self Consistent Field (SCF) states selected based on chemical intuition. However, it may be challenging to track these SCF states across a dissociation profile and the NOCI states recovered may be spin contaminated. In this paper, we propose a method of applying spin rotation on symmetry broken UHF (sb UHF) states to generate a basis for NOCI. The dissociation of ethene was examined by localising spin rotation on each resulting carbene fragment. We show that this gives a size consistent description of its dissociation and results in spin pure states at all geometries. The dissociation was also studied with different orbitals, namely canonical UHF and Absolutely Localised Molecular Orbitals (ALMO). Furthermore, we demonstrate that the method can be used to restore spin symmetry of symmetry broken SCF wavefunctions for molecules of various sizes, marking an improvement over existing NOCI methods."} {"_id": [0], "label": "cs.CV", "text": "Efficient Multi Domain Network Learning by Covariance Normalization. The problem of multi domain learning of deep networks is considered. An adaptive layer is induced per target domain and a novel procedure, denoted covariance normalization (CovNorm), proposed to reduce its parameters. CovNorm is a data driven method of fairly simple implementation, requiring two principal component analyzes (PCA) and fine tuning of a mini adaptation layer. Nevertheless, it is shown, both theoretically and experimentally, to have several advantages over previous approaches, such as batch normalization or geometric matrix approximations. Furthermore, CovNorm can be deployed both when target datasets are available sequentially or simultaneously. Experiments show that, in both cases, it has performance comparable to a fully fine tuned network, using as few as 0.13 of the corresponding parameters per target domain."} {"_id": [67], "label": "physics.atom-ph", "text": "Two qubit entangling gates within arbitrarily long chains of trapped ions. Ion trap systems are a leading platform for large scale quantum computers. Trapped ion qubit crystals are fully connected and reconfigurable, owing to their long range Coulomb interaction that can be modulated with external optical forces. However, the spectral crowding of collective motional modes could pose a challenge to the control of such interactions for large numbers of qubits. Here, we show that high fidelity quantum gate operations are still possible with very large trapped ion crystals, simplifying the scaling of ion trap quantum computers. To this end, we present analytical work that determines how parallel entangling gates produce a crosstalk error that falls off as the inverse cube of the distance between the pairs. We also show experimental work demonstrating entangling gates on a fully connected chain of seventeen 171 rm Yb ions with fidelities as high as 97(1) ."} {"_id": [72, 17], "label": "cs.DC cs.PF", "text": "AI oriented Medical Workload Allocation for Hierarchical Cloud Edge Device Computing. In a hierarchically structured cloud edge device computing environment, workload allocation can greatly affect the overall system performance. This paper deals with AI oriented medical workload generated in emergency rooms (ER) or intensive care units (ICU) in metropolitan areas. The goal is to optimize AI workload allocation to cloud clusters, edge servers, and end devices so that minimum response time can be achieved in life saving emergency applications. In particular, we developed a new workload allocation method for the AI workload in distributed cloud edge device computing systems. An efficient scheduling and allocation strategy is developed in order to reduce the overall response time to satisfy multi patient demands. We apply several ICU AI workloads from a comprehensive edge computing benchmark Edge AIBench. The healthcare AI applications involved are short of breath alerts, patient phenotype classification, and life death threats. Our experimental results demonstrate the high efficiency and effectiveness in real life health care and emergency applications."} {"_id": [19, 39], "label": "cs.CY cs.CR", "text": "Taxonomy of Centralization in Public Blockchain Systems A Systematic Literature Review. Bitcoin introduced delegation of control over a monetary system from a select few to all who participate in that system. This delegation is known as the decentralization of controlling power and is a powerful security mechanism for the ecosystem. After the introduction of Bitcoin, the field of cryptocurrency has seen widespread attention from industry and academia, so much so that the original novel contribution of Bitcoin i.e. decentralization, may be overlooked, due to decentralizations assumed fundamental existence for the functioning of such cryptoassets. However recent studies have observed a trend of increased centralization in cryptocurrencies such as Bitcoin and Ethereum. As this increased centralization has an impact the security of the blockchain, it is crucial that it is measured, towards adequate control. This research derives an initial taxonomy of centralization present in decentralized blockchains through rigorous synthesis using a systematic literature review. This is followed by iterative refinement through expert interviews. We systematically analyzed 89 research papers published between 2009 and 2019. Our study contributes to the existing body of knowledge by highlighting the multiple definitions and measurements of centralization in the literature. We identify different aspects of centralization and propose an encompassing taxonomy of centralization concerns. This taxonomy is based on empirically observable and measurable characteristics. It consists of 13 aspects of centralization classified over six architectural layers Governance Network Consensus Incentive Operational and Application. We also discuss how the implications of centralization can vary depending on the aspects studied. We believe that this review and taxonomy provides a comprehensive overview of centralization in decentralized blockchains involving various conceptualizations and measures."} {"_id": [38, 15], "label": "math.NT cs.IT math.IT", "text": "Low c differential and c boomerang uniformity of the swapped inverse function. Modifying the binary inverse function in a variety of ways, like swapping two output points has been known to produce a 4 differential uniform permutation function. Recently, in cite Li19 it was shown that this swapped version of the inverse function has boomerang uniformity exactly 10 , if n equiv 0 pmod 6 , 8 , if n equiv 3 pmod 6 , and 6, if n not equiv 0 pmod 3 . Based upon the c differential notion we defined in cite EFRST20 and c boomerang uniformity from cite S20 , in this paper we characterize the c differential and c boomerang uniformity for the (0,1) swapped inverse function in characteristic 2 we show that for all c neq 1 , the c differential uniformity is upper bounded by 4 and the c boomerang uniformity by 5 with both bounds being attained for n geq 4 ."} {"_id": [14, 39], "label": "cs.CY cs.HC", "text": "Social Engagement versus Learning Engagement An Exploratory Study of FutureLearn Learners. Massive Open Online Courses (MOOCs) continue to see increasing enrolment, but only a small percent of enrolees completes the MOOCs. Whilst a lot of research has focused on predicting completion, there is little research analysing the ostensible contradiction between the MOOC's popularity and the apparent disengagement of learners. Specifically, it is important to analyse engagement not just in learning, but also from a social perspective. This is especially crucial, as MOOCs offer a growing amount of activities, which can be classified as social interactions. Thus, this study is particularly concerned with how learners interact with peers, along with their study progression in MOOCs. Additionally, unlike most existing studies that are mainly focused on learning outcomes, this study adopts a fine grained temporal approach to exploring how learners progress within a MOOC. The study was conducted on the less explored FutureLearn platform, which employs a social constructivist approach and promotes collaborative learning. The preliminary results suggest potential interesting fine grained predictive models for learner behaviour, involving weekly monitoring of social, non social behaviour of active students (further classified as completers and non completers)."} {"_id": [13], "label": "math.DS", "text": "Local and global dynamics of a fractional order predator prey system with habitat complexity and the corresponding discretized fractional order system. This paper is focused on local and global stability of a fractional order predator prey model with habitat complexity constructed in the Caputo sense and corresponding discrete fractional order system. Mathematical results like positivity and boundedness of the solutions in fractional order model is presented. Conditions for local and global stability of different equilibrium points are proved. It is shown that there may exist fractional order dependent instability through Hopf bifurcation for both fractional order and corresponding discrete systems. Dynamics of the discrete fractional order model is more complex and depends on both step length and fractional order. It shows Hopf bifurcation, flip bifurcation and more complex dynamics with respect to the step size. Several examples are presented to substantiate the analytical results."} {"_id": [35], "label": "math.RA", "text": "On Simple Direct Modules. Recently, in a series of papers \"simple\" versions of direct injective and direct projective modules have been investigated. These modules are termed as \"simple direct injective\" and \"simple direct projective\", respectively. In this paper, we give a complete characterization of the aforementioned modules over the ring of integers and over semilocal rings. The ring is semilocal if and only if every right module with zero Jacobson radical is simple direct projective. The rings whose simple direct injective right modules are simple direct projective are fully characterized. These are exactly the left perfect right H rings. The rings whose simple direct projective right modules are simple direct injective are right max rings. For a commutative Noetherian ring, we prove that simple direct projective modules are simple direct injective if and only if simple direct injective modules are simple direct projective if and only if the ring is Artinian. Various closure properties and some classes of modules that are simple direct injective (resp. projective) are given."} {"_id": [17, 28], "label": "cs.DC cs.CG", "text": "Parallel parametric linear programming solving, and application to polyhedral computations. Parametric linear programming is central in polyhedral computations and in certain control applications.We propose a task based scheme for parallelizing it, with quasi linear speedup over large problems."} {"_id": [0, 41], "label": "cs.CV cs.RO", "text": "Assistive Relative Pose Estimation for On orbit Assembly using Convolutional Neural Networks. Accurate real time pose estimation of spacecraft or object in space is a key capability necessary for on orbit spacecraft servicing and assembly tasks. Pose estimation of objects in space is more challenging than for objects on Earth due to space images containing widely varying illumination conditions, high contrast, and poor resolution in addition to power and mass constraints. In this paper, a convolutional neural network is leveraged to uniquely determine the translation and rotation of an object of interest relative to the camera. The main idea of using CNN model is to assist object tracker used in on space assembly tasks where only feature based method is always not sufficient. The simulation framework designed for assembly task is used to generate dataset for training the modified CNN models and, then results of different models are compared with measure of how accurately models are predicting the pose. Unlike many current approaches for spacecraft or object in space pose estimation, the model does not rely on hand crafted object specific features which makes this model more robust and easier to apply to other types of spacecraft. It is shown that the model performs comparable to the current feature selection methods and can therefore be used in conjunction with them to provide more reliable estimates."} {"_id": [36], "label": "physics.chem-ph", "text": "Polarized Raman Spectra and Complex Raman Tensors of Antiferromagnetic Semiconductor CrPS4. Chromium thiophosphate (CrPS4), a monoclinic crystal of C 2 3 space group, is a ternary layered semiconductor with an optical bandgap of 1.4 eV and exhibits antiferromagnetism below 36 K. Despite its potential in optoelectronic and magnetic applications, the symmetry of its lattice vibrations has not been systematically studied. In this work, we performed a polarized Raman spectroscopy of bulk CrPS4 using three different excitation wavelengths of 457, 514, and 633 nm. High quality crystals grown by the chemical vapor transport method were mechanically exfoliated or polished to expose three orthogonal crystallographic facets. Polarized Raman spectra were obtained in parallel and cross configurations by rotating samples about the surface normal to each of the facets. Among 33 Raman active modes (16 A and 17 B) at the Brillouin zone center, 19 (8) peaks observed in the parallel (cross) configuration were assigned as A (B) modes. Complex valued Raman tensors were determined for 7 major A modes using the angle dependent Raman spectra of the three facets. The results can also be used in determining the crystallographic orientations of CrPS4 unequivocally."} {"_id": [60], "label": "cs.AR", "text": "Exploiting RapidWright in the Automatic Generation of Application Specific FPGA Overlays. Overlay architectures implemented on FPGA devices have been proposed as a means to increase FPGA adoption in general purpose computing. They provide the benefits of software such as flexibility and programmability, thus making it easier to build dedicated compilers. However, existing overlays are generic, resource and power hungry with performance usually an order of magnitude lower than bare metal implementations. As a result, FPGA overlays have been confined to research and some niche applications. In this paper, we introduce Application Specific FPGA Overlays (AS Overlays), which can provide bare metal performance to FPGA overlays, thus opening doors for broader adoption. Our approach is based on the automatic extraction of hardware kernels from data flow applications. Extracted kernels are then leveraged for application specific generation of hardware accelerators. Reconfiguration of the overlay is done with RapidWright which allows to bypass the HDL design flow. Through prototyping, we demonstrated the viability and relevance of our approach. Experiments show a productivity improvement up to 20x compared to the state of the art FPGA overlays, while achieving over 1.33x higher Fmax than direct FPGA implementation and the possibility of lower resource and power consumption compared to bare metal."} {"_id": [46], "label": "math.AG", "text": "Tropical analogs of Milnor K groups and tropicalizations of Zariski Riemann spaces. As a step of a tropical approach to problems on algebraic classes of cohomology groups (such as the Hodge conjecture), in this paper, we introduce tropical analogs of (rational) Milnor K groups, and prove the existence of the Gersten resolution of their Zariski sheafification. Our result will be used to prove a tropical analog of the Hodge conjecture for smooth algebraic varieties over trivially valued fields in a subsequent paper."} {"_id": [2], "label": "cs.AI", "text": "Modeling Token level Uncertainty to Learn Unknown Concepts in SLU via Calibrated Dirichlet Prior RNN. One major task of spoken language understanding (SLU) in modern personal assistants is to extract semantic concepts from an utterance, called slot filling. Although existing slot filling models attempted to improve extracting new concepts that are not seen in training data, the performance in practice is still not satisfied. Recent research collected question and answer annotated data to learn what is unknown and should be asked, yet not practically scalable due to the heavy data collection effort. In this paper, we incorporate softmax based slot filling neural architectures to model the sequence uncertainty without question supervision. We design a Dirichlet Prior RNN to model high order uncertainty by degenerating as softmax layer for RNN model training. To further enhance the uncertainty modeling robustness, we propose a novel multi task training to calibrate the Dirichlet concentration parameters. We collect unseen concepts to create two test datasets from SLU benchmark datasets Snips and ATIS. On these two and another existing Concept Learning benchmark datasets, we show that our approach significantly outperforms state of the art approaches by up to 8.18 . Our method is generic and can be applied to any RNN or Transformer based slot filling models with a softmax layer."} {"_id": [47], "label": "math.AT", "text": "(Co)Homology Self closeness Numbers of Simply connected Spaces. The (co)homology self closeness number of a simply connected based CW complexes X is the minimal number k such that any self map f of X inducing an automorphism of the (co)homology groups for dimensions leq k is a self homotopy equivalence. These two numbers are homotopy invariants and have a close relation with the group of self homotopy equivalences. In this paper, we compare the (co)homology self closeness numbers of spaces in certain cofibrations, define the mod p (co)homology self closeness number of simply connected p local spaces with finitely generated homologies and study some properties of the (mod p ) (co)homology self closeness numbers."} {"_id": [9], "label": "math.AP", "text": "A fractional parabolic inverse problem involving a time dependent magnetic potential. We study a class of fractional parabolic equations involving a time dependent magnetic potential and formulate the corresponding inverse problem. We determine both the magnetic potential and the electric potential from the exterior partial measurements of the Dirichlet to Neumann map."} {"_id": [49, 20], "label": "math.OC cs.NA math.NA", "text": "Approximation of null controls for semilinear heat equations using a least squares approach. The null distributed controllability of the semilinear heat equation y t Delta y g(y) f ,1 omega , assuming that g satisfies the growth condition g(s) ( vert s vert log 3 2 (1 vert s vert)) rightarrow 0 as vert s vert rightarrow infty and that g prime in L infty loc ( mathbb R ) has been obtained by Fern 'andez Cara and Zuazua in 2000. The proof based on a fixed point argument makes use of precise estimates of the observability constant for a linearized heat equation. It does not provide however an explicit construction of a null control. Assuming that g prime in W s, infty ( mathbb R ) for one s in (0,1 , we construct an explicit sequence converging strongly to a null control for the solution of the semilinear equation. The method, based on a least squares approach, generalizes Newton type methods and guarantees the convergence whatever be the initial element of the sequence. In particular, after a finite number of iterations, the convergence is super linear with a rate equal to 1 s . Numerical experiments in the one dimensional setting support our analysis."} {"_id": [0], "label": "cs.CV", "text": "Appearance Shock Grammar for Fast Medial Axis Extraction from Real Images. We combine ideas from shock graph theory with more recent appearance based methods for medial axis extraction from complex natural scenes, improving upon the present best unsupervised method, in terms of efficiency and performance. We make the following specific contributions i) we extend the shock graph representation to the domain of real images, by generalizing the shock type definitions using local, appearance based criteria ii) we then use the rules of a Shock Grammar to guide our search for medial points, drastically reducing run time when compared to other methods, which exhaustively consider all points in the input image iii) we remove the need for typical post processing steps including thinning, non maximum suppression, and grouping, by adhering to the Shock Grammar rules while deriving the medial axis solution iv) finally, we raise some fundamental concerns with the evaluation scheme used in previous work and propose a more appropriate alternative for assessing the performance of medial axis extraction from scenes. Our experiments on the BMAX500 and SK LARGE datasets demonstrate the effectiveness of our approach. We outperform the present state of the art, excelling particularly in the high precision regime, while running an order of magnitude faster and requiring no post processing."} {"_id": [35], "label": "math.RA", "text": "On the Number of Gradings on Matrix Algebras. We determine the number of isomorphism classes of elementary gradings by a finite group on an algebra of upper block triangular matrices. As a consequence we prove that, for a finite abelian group G , the sequence of the numbers E(G,m) of isomorphism classes of elementary G gradings on the algebra M m ( mathbb F ) of m times m matrices with entries in a field mathbb F characterizes G . A formula for the number of isomorphism classes of gradings by a finite abelian group on an algebra of upper block triangular matrices over an algebraically closed field, with mild restrictions on its characteristic, is also provided. Finally, if G is a finite abelian group, mathbb F is an algebraically closed field and N(G,m) is the number of isomorphism classes of G gradings on M m ( mathbb F ) we prove that N(G,m) sim frac 1 left vert G right vert ! m left vert G right vert 1 sim E(G,m) ."} {"_id": [49], "label": "math.OC", "text": "Stochastic Linear Quadratic Optimal Control Problem A Reinforcement Learning Method. This paper applies a reinforcement learning (RL) method to solve infinite horizon continuous time stochastic linear quadratic problems, where drift and diffusion terms in the dynamics may depend on both the state and control. Based on Bellman's dynamic programming principle, an online RL algorithm is presented to attain the optimal control with just partial system information. This algorithm directly computes the optimal control rather than estimating the system coefficients and solving the related Riccati equation. It just requires local trajectory information, greatly simplifying the calculation processing. Two numerical examples are carried out to shed light on our theoretical findings."} {"_id": [58], "label": "q-bio.NC", "text": "Topological stability of the hippocampal spatial map and synaptic transience. Spatial awareness in mammals is based on internalized representations of the environment cognitive maps encoded by networks of spiking neurons. Although behavioral studies suggest that these maps can remain stable for long periods, it is also well known that the underlying networks of synaptic connections constantly change their architecture due to various forms of neuronal plasticity. This raises a principal question how can a dynamic network encode a stable map of space? In the following, we discuss some recent results obtained in this direction using an algebro topological modeling approach, which demonstrate that emergence of stable cognitive maps produced by networks with transient architectures is not only possible, but may be a generic phenomenon."} {"_id": [1, 3], "label": "cs.LG cs.CL", "text": "Evaluating Attribution Methods using White Box LSTMs. Interpretability methods for neural networks are difficult to evaluate because we do not understand the black box models typically used to test them. This paper proposes a framework in which interpretability methods are evaluated using manually constructed networks, which we call white box networks, whose behavior is understood a priori. We evaluate five methods for producing attribution heatmaps by applying them to white box LSTM classifiers for tasks based on formal languages. Although our white box classifiers solve their tasks perfectly and transparently, we find that all five attribution methods fail to produce the expected model explanations."} {"_id": [1, 85, 7], "label": "cs.LG physics.comp-ph physics.data-an", "text": "Weak Form Theory guided Neural Network (TgNN wf) for Deep Learning of Subsurface Single and Two phase Flow. Deep neural networks (DNNs) are widely used as surrogate models in geophysical applications incorporating theoretical guidance into DNNs has improved the generalizability. However, most of such approaches define the loss function based on the strong form of conservation laws (via partial differential equations, PDEs), which is subject to deteriorated accuracy when the PDE has high order derivatives or the solution has strong discontinuities. Herein, we propose a weak form theory guided neural network (TgNN wf), which incorporates the weak form formulation of the PDE into the loss function combined with data constraint and initial and boundary conditions regularizations to tackle the aforementioned difficulties. In the weak form, high order derivatives in the PDE can be transferred to the test functions by performing integration by parts, which reduces computational error. We use domain decomposition with locally defined test functions, which captures local discontinuity effectively. Two numerical cases demonstrate the superiority of the proposed TgNN wf over the strong form TgNN, including the hydraulic head prediction for unsteady state 2D single phase flow problems and the saturation profile prediction for 1D two phase flow problems. Results show that TgNN wf consistently has higher accuracy than TgNN, especially when strong discontinuity in the solution is present. TgNN wf also trains faster than TgNN when the number of integration subdomains is not too large ( 10,000). Moreover, TgNN wf is more robust to noises. Thus, the proposed TgNN wf paves the way for which a variety of deep learning problems in the small data regime can be solved more accurately and efficiently."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Domain Adaptation based Technique for Image Emotion Recognition using Pre trained Facial Expression Recognition Models. In this paper, a domain adaptation based technique for recognizing the emotions in images containing facial, non facial, and non human components has been proposed. We have also proposed a novel technique to explain the proposed system's predictions in terms of Intersection Score. Image emotion recognition is useful for graphics, gaming, animation, entertainment, and cinematography. However, well labeled large scale datasets and pre trained models are not available for image emotion recognition. To overcome this challenge, we have proposed a deep learning approach based on an attentional convolutional network that adapts pre trained facial expression recognition models. It detects the visual features of an image and performs emotion classification based on them. The experiments have been performed on the Flickr image dataset, and the images have been classified in 'angry,' 'happy,' 'sad,' and 'neutral' emotion classes. The proposed system has demonstrated better performance than the benchmark results with an accuracy of 63.87 for image emotion recognition. We have also analyzed the embedding plots for various emotion classes to explain the proposed system's predictions."} {"_id": [1, 3, 59], "label": "cs.CL cs.LG cs.SI", "text": "Low supervision urgency detection and transfer in short crisis messages. Humanitarian disasters have been on the rise in recent years due to the effects of climate change and socio political situations such as the refugee crisis. Technology can be used to best mobilize resources such as food and water in the event of a natural disaster, by semi automatically flagging tweets and short messages as indicating an urgent need. The problem is challenging not just because of the sparseness of data in the immediate aftermath of a disaster, but because of the varying characteristics of disasters in developing countries (making it difficult to train just one system) and the noise and quirks in social media. In this paper, we present a robust, low supervision social media urgency system that adapts to arbitrary crises by leveraging both labeled and unlabeled data in an ensemble setting. The system is also able to adapt to new crises where an unlabeled background corpus may not be available yet by utilizing a simple and effective transfer learning methodology. Experimentally, our transfer learning and low supervision approaches are found to outperform viable baselines with high significance on myriad disaster datasets."} {"_id": [11], "label": "physics.app-ph", "text": "The Software Defined Metasurfaces Concept and Electromagnetic Aspects. We present the concept and electromagnetic aspects of HyperSurFaces (HSFs), artificial, ultrathin structures with software controlled electromagnetic properties. The HSFs key unit is the metasurface, a plane with designed subwavelength features whose electromagnetic response can be tuned via voltage controlled continuously tunable electrical elements that provide local control of the surface impedance and advanced functionalities, such as tunable perfect absorption or wavefront manipulation. A nanonetwork of controllers enables software defined HSFs control related to the emerging Internet of Things paradigm."} {"_id": [3], "label": "cs.CL", "text": "A Large Scale Chinese Short Text Conversation Dataset. The advancements of neural dialogue generation models show promising results on modeling short text conversations. However, training such models usually needs a large scale high quality dialogue corpus, which is hard to access. In this paper, we present a large scale cleaned Chinese conversation dataset, LCCC, which contains a base version (6.8million dialogues) and a large version (12.0 million dialogues). The quality of our dataset is ensured by a rigorous data cleaning pipeline, which is built based on a set of rules and a classifier that is trained on manually annotated 110K dialogue pairs. We also release pre training dialogue models which are trained on LCCC base and LCCC large respectively. The cleaned dataset and the pre training models will facilitate the research of short text conversation modeling. All the models and datasets are available at https github.com thu coai CDial GPT."} {"_id": [3, 40, 59], "label": "cs.SI cs.CL cs.IR", "text": "Measuring University Impact Wikipedia approach. The impact of Universities on the social, economic and political landscape is one of the key directions in contemporary educational evaluation. In this paper, we discuss the new methodological technique that evaluates the impact of university based on popularity (number of page views) of their alumni's pages on Wikipedia. It allows revealing the alumni popularity dynamics and tracking its state. Preliminary analysis shows that the number of page views is higher for the contemporary persons that prove the perspectives of this approach. Then, universities were ranked based on the methodology and compared to the famous international university rankings ARWU and QS based only on alumni scales for the top 10 universities, there is an intersection of two universities (Columbia University, Stanford University). The correlation coefficients between different university rankings are provided in the paper. Finally, the ranking based on the alumni popularity was compared with the ranking of universities based on the popularity of their webpages on Wikipedia there is a strong connection between these indicators."} {"_id": [0, 1, 15], "label": "cs.CV cs.IT cs.LG math.IT", "text": "Information Bottleneck Approach to Salient Region Discovery. We propose a new method for learning image attention masks in a semi supervised setting based on the Information Bottleneck principle. Provided with a set of labeled images, the mask generation model is minimizing mutual information between the input and the masked image while maximizing the mutual information between the same masked image and the image label. In contrast with other approaches, our attention model produces a Boolean rather than a continuous mask, entirely concealing the information in masked out pixels. Using a set of synthetic datasets based on MNIST and CIFAR10 and the SVHN datasets, we demonstrate that our method can successfully attend to features known to define the image class."} {"_id": [1, 3, 59], "label": "cs.CL cs.LG cs.SI", "text": "CrisisBERT a Robust Transformer for Crisis Classification and Contextual Crisis Embedding. Classification of crisis events, such as natural disasters, terrorist attacks and pandemics, is a crucial task to create early signals and inform relevant parties for spontaneous actions to reduce overall damage. Despite crisis such as natural disasters can be predicted by professional institutions, certain events are first signaled by civilians, such as the recent COVID 19 pandemics. Social media platforms such as Twitter often exposes firsthand signals on such crises through high volume information exchange over half a billion tweets posted daily. Prior works proposed various crisis embeddings and classification using conventional Machine Learning and Neural Network models. However, none of the works perform crisis embedding and classification using state of the art attention based deep neural networks models, such as Transformers and document level contextual embeddings. This work proposes CrisisBERT, an end to end transformer based model for two crisis classification tasks, namely crisis detection and crisis recognition, which shows promising results across accuracy and f1 scores. The proposed model also demonstrates superior robustness over benchmark, as it shows marginal performance compromise while extending from 6 to 36 events with only 51.4 additional data points. We also proposed Crisis2Vec, an attention based, document level contextual embedding architecture for crisis embedding, which achieve better performance than conventional crisis embedding methods such as Word2Vec and GloVe. To the best of our knowledge, our works are first to propose using transformer based crisis classification and document level contextual crisis embedding in the literature."} {"_id": [40, 14], "label": "cs.IR cs.HC", "text": "Estimating Error and Bias in Offline Evaluation Results. Offline evaluations of recommender systems attempt to estimate users' satisfaction with recommendations using static data from prior user interactions. These evaluations provide researchers and developers with first approximations of the likely performance of a new system and help weed out bad ideas before presenting them to users. However, offline evaluation cannot accurately assess novel, relevant recommendations, because the most novel items were previously unknown to the user, so they are missing from the historical data and cannot be judged as relevant. We present a simulation study to estimate the error that such missing data causes in commonly used evaluation metrics in order to assess its prevalence and impact. We find that missing data in the rating or observation process causes the evaluation protocol to systematically mis estimate metric values, and in some cases erroneously determine that a popularity based recommender outperforms even a perfect personalized recommender. Substantial breakthroughs in recommendation quality, therefore, will be difficult to assess with existing offline techniques."} {"_id": [25], "label": "math.PR", "text": "On the probability distribution of the local times of diagonally operator self similar Gaussian fields with stationary increments. In this paper we study the local times of vector valued Gaussian fields that are diagonally operator self similar' and whose increments are stationary. Denoting the local time of such a Gaussian field around the spatial origin and over the temporal unit hypercube by Z , we show that there exists lambda in(0,1) such that under some quite weak conditions, lim n rightarrow infty frac sqrt n mathbb E (Z n) n lambda and lim x rightarrow infty frac log mathbb P (Z x) x frac 1 lambda both exist and are strictly positive (possibly infty ). Moreover, we show that if the underlying Gaussian field is strongly locally nondeterministic', the above limits will be finite as well. These results are then applied to establish similar statements for the intersection local times of diagonally operator self similar Gaussian fields with stationary increments."} {"_id": [62], "label": "cs.GT", "text": "Welfare Preserving varepsilon BIC to BIC Transformation with Negligible Revenue Loss. In this paper, we provide a transform from an varepsilon BIC mechanism into an exactly BIC mechanism without any loss of social welfare and with additive and negligible revenue loss. This is the first varepsilon BIC to BIC transformation that preserves welfare and provides negligible revenue loss. The revenue loss bound is tight given the requirement to maintain social welfare. Previous varepsilon BIC to BIC transformations preserve social welfare but have no revenue guarantee citep BeiHuang11 , or suffer welfare loss while incurring a revenue loss with both a multiplicative and an additive term, e.g., citet DasWeinberg12, Rubinstein18, Cai19 . The revenue loss achieved by our transformation is incomparable to these earlier approaches and can be significantly less. newnew Our approach is different from the previous replica surrogate matching methods and we directly make use of a directed and weighted type graph (induced by the types' regret), one for each agent. The transformation runs a emph fractional rotation step and a emph payment reducing step iteratively to make the mechanism Bayesian incentive compatible. We also analyze varepsilon expected ex post IC ( varepsilon EEIC) mechanisms citep DuettingFJLLP12 . We provide a welfare preserving transformation in this setting with the same revenue loss guarantee for uniform type distributions and give an impossibility result for non uniform distributions. We apply the transform to linear programming based and machine learning based methods of automated mechanism design."} {"_id": [3], "label": "cs.CL", "text": "Scalable Multilingual Frontend for TTS. This paper describes progress towards making a Neural Text to Speech (TTS) Frontend that works for many languages and can be easily extended to new languages. We take a Machine Translation (MT) inspired approach to constructing the frontend, and model both text normalization and pronunciation on a sentence level by building and using sequence to sequence (S2S) models. We experimented with training normalization and pronunciation as separate S2S models and with training a single S2S model combining both functions. For our language independent approach to pronunciation we do not use a lexicon. Instead all pronunciations, including context based pronunciations, are captured in the S2S model. We also present a language independent chunking and splicing technique that allows us to process arbitrary length sentences. Models for 18 languages were trained and evaluated. Many of the accuracy measurements are above 99 . We also evaluated the models in the context of end to end synthesis against our current production system."} {"_id": [26, 29, 38], "label": "math.RT math.GR math.NT", "text": "Representation of ax b group and Dirichlet Series. Let G be the ax b group. There are essentially two irreducible infinite dimensional unitary representations of G , ( mu, L 2( mathbb R )) and ( mu , L 2( mathbb R )) . In this paper, we give various characterizations about smooth vectors of mu and their Mellin transforms. Let f d be a linear sum of delta distributions supported on the the positive integers mathbb Z . We study the Mellin transform of the matrix coefficients mu f d, f (a) with f smooth. We express these Mellin transforms in terms of the Dirichlet series L(s, f d) . We determine a sufficient condition such that the generalized matrix coefficient mu f d, f is a locally integrable function and estimate the L 2 norms of mu f d, f over the Siegel set. We further derive an inequality which may potentially be used to study the Dirichlet series L(s, f d) ."} {"_id": [38], "label": "math.NT", "text": "A Partition Function Connected with the G \"ollnitz Gordon Identities. We use the celebrated circle method of Hardy and Ramanujan to develop convergent formulae for counting a restricted class of partitions that arise from the G \"ollnitz Gordon identities."} {"_id": [6], "label": "physics.flu-dyn", "text": "Retarded hydrodynamic interaction between two spheres immersed in a viscous incompressible fluid. Retarded or frequency dependent hydrodynamic interactions are relevant for velocity relaxation of colloidal particles immersed in a fluid, sufficiently close that their flow patterns interfere. The interactions are also important for periodic motions, such as occur in swimming. Analytic expressions are derived for the set of scalar mobility functions of a pair of spheres. Mutual hydrodynamic interactions are evaluated in one propagator approximation, characterized by a single Green function acting between the two spheres. Self mobility functions are evaluated in a two propagator approximation, characterized by a single reflection between the two spheres. The approximations should yield accurate results for intermediate and long distances between the spheres. Both translations and rotations are considered. For motions perpendicular to the line of centers there is translation rotation coupling. Extensive use is made of Fax 'en theorems which yield the hydrodynamic force and torque acting on a sphere in an incident oscillating flow."} {"_id": [18, 21], "label": "math.CO math.GT", "text": "On planar Cayley graphs and Kleinian groups. Let G be a finitely generated group acting faithfully and properly discontinuously by homeomorphisms on a planar surface X subseteq mathbb S 2 . We prove that G admits such an action that is in addition co compact, provided we can replace X by another surface Y subseteq mathbb S 2 . We also prove that if a group H has a finitely generated Cayley (multi )graph C covariantly embeddable in mathbb S 2 , then C can be chosen so as to have no infinite path on the boundary of a face. The proofs of these facts are intertwined, and the classes of groups they define coincide. In the orientation preserving case they are exactly the (isomorphism types of) finitely generated Kleinian function groups. We construct a finitely generated planar Cayley graph whose group is not in this class. In passing, we observe that the Freudenthal compactification of every planar surface is homeomorphic to the sphere."} {"_id": [22], "label": "cs.SE", "text": "Using Distributed Representation of Code for Bug Detection. Recent advances in neural modeling for bug detection have been very promising. More specifically, using snippets of code to create continuous vectors or textit embeddings has been shown to be very good at method name prediction and claimed to be efficient at other tasks, such as bug detection. However, to this end, the method has not been empirically tested for the latter. In this work, we use the Code2Vec model of Alon et al. to evaluate it for detecting off by one errors in Java source code. We define bug detection as a binary classification problem and train our model on a large Java file corpus containing likely correct code. In order to properly classify incorrect code, the model needs to be trained on false examples as well. To achieve this, we create likely incorrect code by making simple mutations to the original corpus. Our quantitative and qualitative evaluations show that an attention based model that uses a structural representation of code can be indeed successfully used for other tasks than method naming."} {"_id": [21], "label": "math.CO", "text": "The mixed metric dimension of flower snarks and wheels. New graph invariant, which is called mixed metric dimension, has been recently introduced. In this paper, exact results of mixed metric dimension on two special classes of graphs are found flower snarks J n and wheels W n . It is proved that mixed metric dimension for J 5 is equal to 5, while for higher dimensions it is constant and equal to 4. For W n , its mixed metric dimension is not constant, but it is equal to n when n geq 4 , while it is equal to 4, for n 3 ."} {"_id": [25], "label": "math.PR", "text": "Four New Forms of the Taylor Ito and Taylor Stratonovich Expansions and its Application to the High Order Strong Numerical Methods for Ito Stochastic Differential Equations. The problem of the Taylor Ito and Taylor Stratonovich expansions of the Ito stochastic processes in a neighborhood of a fixed moment of time is considered. The classical forms of the Taylor Ito and Taylor Stratonovich expansions are transformed to the four new representations, which includes the minimal sets of different types of iterated Ito and Stratonovich stochastic integrals. Therefore, these representations (the so called unified Taylor Ito and Taylor Stratonovich expansions) are more convenient for constructing of high order strong numerical methods for Ito stochastic differential equations. Explicit one step strong numerical schemes with the orders of convergence 1.0, 1.5, 2.0, 2.5, and 3.0 based on the unified Taylor Ito and Taylor Stratonovich expansions are derived. Effective mean square approximations of iterated Ito and Stratonovich stochastic integrals from these numerical schemes are constructed on the base of the multiple Fourier Legendre series with multiplicities 1 to 6."} {"_id": [25, 66], "label": "cs.CE math.PR", "text": "Effect of Load Path on Parameter Identification for Plasticity Models using Bayesian Methods. To evaluate the cyclic behavior under different loading conditions using the kinematic and isotropic hardening theory of steel, a Chaboche viscoplastic material model is employed. The parameters of a constitutive model are usually identified by minimization of the distance between model response and experimental data. However, measurement errors and differences in the specimens lead to deviations in the determined parameters. In this article, the Choboche model is used and a stochastic simulation technique is applied to generate artificial data which exhibit the same stochastic behavior as experimental data. Then the model parameters are identified by applying an estimation using Bayes's theorem. The Gauss Markov Kalman filter using functional approximation is introduced and employed to estimate the model parameters in the Bayesian setting. Identified parameters are compared with the true parameters in the simulation, and the efficiency of the identification method is discussed. In the end, the effect of the load path on parameter identification is investigated."} {"_id": [3], "label": "cs.CL", "text": "UPB at SemEval 2020 Task 11 Propaganda Detection with Domain Specific Trained BERT. Manipulative and misleading news have become a commodity for some online news outlets and these news have gained a significant impact on the global mindset of people. Propaganda is a frequently employed manipulation method having as goal to influence readers by spreading ideas meant to distort or manipulate their opinions. This paper describes our participation in the SemEval 2020, Task 11 Detection of Propaganda Techniques in News Articles competition. Our approach considers specializing a pre trained BERT model on propagandistic and hyperpartisan news articles, enabling it to create more adequate representations for the two subtasks, namely propaganda Span Identification (SI) and propaganda Technique Classification (TC). Our proposed system achieved a F1 score of 46.060 in subtask SI, ranking 5th in the leaderboard from 36 teams and a micro averaged F1 score of 54.302 for subtask TC, ranking 19th from 32 teams."} {"_id": [48, 77], "label": "cs.CC math.LO", "text": "Consistency of circuit lower bounds with bounded theories. Proving that there are problems in mathsf P mathsf NP that require boolean circuits of super linear size is a major frontier in complexity theory. While such lower bounds are known for larger complexity classes, existing results only show that the corresponding problems are hard on infinitely many input lengths. For instance, proving almost everywhere circuit lower bounds is open even for problems in mathsf MAEXP . Giving the notorious difficulty of proving lower bounds that hold for all large input lengths, we ask the following question Can we show that a large set of techniques cannot prove that mathsf NP is easy infinitely often? Motivated by this and related questions about the interaction between mathematical proofs and computations, we investigate circuit complexity from the perspective of logic. Among other results, we prove that for any parameter k geq 1 it is consistent with theory T that computational class mathcal C not subseteq textit i.o. mathrm SIZE (n k) , where (T, mathcal C ) is one of the pairs T mathsf T 1 2 and mathcal C mathsf P mathsf NP , T mathsf S 1 2 and mathcal C mathsf NP , T mathsf PV and mathcal C mathsf P . In other words, these theories cannot establish infinitely often circuit upper bounds for the corresponding problems. This is of interest because the weaker theory mathsf PV already formalizes sophisticated arguments, such as a proof of the PCP Theorem. These consistency statements are unconditional and improve on earlier theorems of KO17 and BM18 on the consistency of lower bounds with mathsf PV ."} {"_id": [56], "label": "cs.LO", "text": "A type theory for cartesian closed bicategories. We construct an internal language for cartesian closed bicategories. Precisely, we introduce a type theory modelling the structure of a cartesian closed bicategory and show that its syntactic model satisfies an appropriate universal property, thereby lifting the Curry Howard Lambek correspondence to the bicategorical setting. Our approach is principled and practical. Weak substitution structure is constructed using a bicategorification of the notion of abstract clone from universal algebra, and the rules for products and exponentials are synthesised from semantic considerations. The result is a type theory that employs a novel combination of 2 dimensional type theory and explicit substitution, and directly generalises the Simply Typed Lambda Calculus. This work is the first step in a programme aimed at proving coherence for cartesian closed bicategories."} {"_id": [13], "label": "math.DS", "text": "Magnetic billiards Non integrability for strong magnetic field Gutkin type examples. We consider magnetic billiards under a strong constant magnetic field. The purpose of this paper is two folded. We examine the question of existence of polynomial integral of billiard magnetic flow. We succeed to reduce this question to algebraic geometry test on existence of polynomial integral, which shows polynomial non integrability for all but finitely many values of the magnitude. In the second part of the paper we construct examples of magnetic billiards which have the so called delta Gutkin property, meaning that any Larmor circle entering the domain with angle delta exits the domain with the same angle delta . For ordinary Birkhoff billiard in the plane such examples were introduced by E. Gutkin and are very explicit. Our construction of Gutkin magnetic billiards relies on beautiful examples by F.Wegner of the so called Zindler curves, which are related to the problem of floating bodies in equilibrium, which goes back to S.Ulam. We prove that Gutkin magnetic billiard can be obtained as a parallel curve to a Wegner curve. Wegner curves can be written by elliptic functions in polar coordinates so the construction of magnetic Gutkin billiard is rather explicit but much more complicated."} {"_id": [0], "label": "cs.CV", "text": "Best Buddies Registration for Point Clouds. We propose new, and robust, loss functions for the point cloud registration problem. Our loss functions are inspired by the Best Buddies Similarity (BBS) measure that counts the number of mutual nearest neighbors between two point sets. This measure has been shown to be robust to outliers and missing data in the case of template matching for images. We present several algorithms, collectively named Best Buddy Registration (BBR), where each algorithm consists of optimizing one of these loss functions with Adam gradient descent. The loss functions differ in several ways, including the distance function used (point to point vs. point to plane), and how the BBS measure is combined with the actual distances between pairs of points. Experiments on various data sets, both synthetic and real, demonstrate the effectiveness of the BBR algorithms, showing that they are quite robust to noise, outliers, and distractors, and cope well with extremely sparse point clouds. One variant, BBR F, achieves state of the art accuracy in the registration of automotive lidar scans taken up to several seconds apart, from the KITTI and Apollo Southbay datasets."} {"_id": [59], "label": "cs.SI", "text": "Opinion Dynamics with Varying Susceptibility to Persuasion via Non Convex Local Search. A long line of work in social psychology has studied variations in people's susceptibility to persuasion the extent to which they are willing to modify their opinions on a topic. This body of literature suggests an interesting perspective on theoretical models of opinion formation by interacting parties in a network in addition to considering interventions that directly modify people's intrinsic opinions, it is also natural to consider interventions that modify people's susceptibility to persuasion. In this work, motivated by this fact we propose a new framework for social influence. Specifically, we adopt a popular model for social opinion dynamics, where each agent has some fixed innate opinion, and a resistance that measures the importance it places on its innate opinion agents influence one another's opinions through an iterative process. Under non trivial conditions, this iterative process converges to some equilibrium opinion vector. For the unbudgeted variant of the problem, the goal is to select the resistance of each agent (from some given range) such that the sum of the equilibrium opinions is minimized. We prove that the objective function is in general non convex. Hence, formulating the problem as a convex program as in an early version of this work (Abebe et al., KDD'18) might have potential correctness issues. We instead analyze the structure of the objective function, and show that any local optimum is also a global optimum, which is somehow surprising as the objective function might not be convex. Furthermore, we combine the iterative process and the local search paradigm to design very efficient algorithms that can solve the unbudgeted variant of the problem optimally on large scale graphs containing millions of nodes. Finally, we propose and evaluate experimentally a family of heuristics for the budgeted variation of the problem."} {"_id": [41], "label": "cs.RO", "text": "Experimental Evaluation of 3D LIDAR Camera Extrinsic Calibration. In this paper we perform an experimental comparison of three different target based 3D LIDAR camera calibration algorithms. We briefly elucidate the mathematical background behind each method and provide insights into practical aspects like ease of data collection for all of them. We extensively evaluate these algorithms on a sensor suite which consists multiple cameras and LIDARs by assessing their robustness to random initialization and by using metrics like Mean Line Re projection Error (MLRE) and Factory Stereo Calibration Error. We also show the effect of noisy sensor on the calibration result from all the algorithms and conclude with a note on which calibration algorithm should be used under what circumstances."} {"_id": [3], "label": "cs.CL", "text": "A Unified Dual view Model for Review Summarization and Sentiment Classification with Inconsistency Loss. Acquiring accurate summarization and sentiment from user reviews is an essential component of modern e commerce platforms. Review summarization aims at generating a concise summary that describes the key opinions and sentiment of a review, while sentiment classification aims to predict a sentiment label indicating the sentiment attitude of a review. To effectively leverage the shared sentiment information in both review summarization and sentiment classification tasks, we propose a novel dual view model that jointly improves the performance of these two tasks. In our model, an encoder first learns a context representation for the review, then a summary decoder generates a review summary word by word. After that, a source view sentiment classifier uses the encoded context representation to predict a sentiment label for the review, while a summary view sentiment classifier uses the decoder hidden states to predict a sentiment label for the generated summary. During training, we introduce an inconsistency loss to penalize the disagreement between these two classifiers. It helps the decoder to generate a summary to have a consistent sentiment tendency with the review and also helps the two sentiment classifiers learn from each other. Experiment results on four real world datasets from different domains demonstrate the effectiveness of our model."} {"_id": [32, 68], "label": "cs.DS cs.DM", "text": "Search Problems in Trees with Symmetries near optimal traversal strategies for individualization refinement algorithms. We define a search problem on trees that closely captures the backtracking behavior of all current practical graph isomorphism algorithms. Given two trees with colored leaves, the goal is to find two leaves of matching color, one in each of the trees. The trees are subject to an invariance property which promises that for every pair of leaves of equal color there must be a symmetry (or an isomorphism) that maps one leaf to the other. We describe a randomized algorithm with errors for which the number of visited leaves is quasilinear in the square root of the size of the smaller of the two trees. For inputs of bounded degree, we develop a Las Vegas algorithm with a similar running time. We prove that these results are optimal up to logarithmic factors. We show a lower bound for randomized algorithms on inputs of bounded degree that is the square root of the tree sizes. For inputs of unbounded degree, we show a linear lower bound for Las Vegas algorithms. For deterministic algorithms we can prove a linear bound even for inputs of bounded degree. This shows why randomized algorithms outperform deterministic ones. Our results explain why the randomized \"breadth first with intermixed experimental path\" search strategy of the isomorphism tool Traces (Piperno 2008) is often superior to the depth first search strategy of other tools such as nauty (McKay 1977) or bliss (Junttila, Kaski 2007). However, our algorithm also provides a new traversal strategy, which is theoretically near optimal with better worst case behavior than traversal strategies that have previously been used."} {"_id": [0, 41], "label": "cs.CV cs.RO", "text": "Multi Modal Hybrid Architecture for Pedestrian Action Prediction. Pedestrian behavior prediction is one of the major challenges for intelligent driving systems in urban environments. Pedestrians often exhibit a wide range of behaviors and adequate interpretations of those depend on various sources of information such as pedestrian appearance, states of other road users, the environment layout, etc. To address this problem, we propose a novel multi modal prediction algorithm that incorporates different sources of information captured from the environment to predict future crossing actions of pedestrians. The proposed model benefits from a hybrid learning architecture consisting of feedforward and recurrent networks for analyzing visual features of the environment and dynamics of the scene. Using the existing 2D pedestrian behavior benchmarks and a newly annotated 3D driving dataset, we show that our proposed model achieves state of the art performance in pedestrian crossing prediction."} {"_id": [8, 11], "label": "physics.app-ph physics.optics", "text": "Thresholdless transition to coherent emission at telecom wavelengths from coaxial nanolasers. The ongoing miniaturization of semiconductor lasers has enabled ultra low threshold devices and even provided a path to approach thresholdless lasing with linear input output characteristics. Such nanoscale lasers have initiated a discourse on the origin of the physical mechanisms involved and their boundaries, such as the required photon number, the importance of optimized light confinement in a resonator and mode density enhancement. Here, we investigate high beta metal clad coaxial nanolasers, which facilitate thresholdless lasing. We experimentally and theoretically investigate both the conventional lasing characteristics, as well as the photon statistics of the emitted light. While the former lacks adequate information to determine the threshold to coherent radiation, the latter reveals a finite threshold pump power. Our work clearly highlights an important and often misunderstood aspect of high beta lasers, namely that a thresholdless laser does have a finite threshold pump power and must not be confused with a hypothetical zero threshold laser."} {"_id": [50], "label": "physics.med-ph", "text": "Deep Learning of Diffuse Optical Tomography based on Time Domain Radiative Transfer Equation. Near infrared diffuse optical tomography (DOT) provides an imaging modality for the oxygenation of tissue. In this paper, we propose a novel machine learning algorithm based on time domain radiative transfer equation. We use temporal profiles of absorption measure for a two dimensional model of target tissue, which are calculated by solving time domain radiative transfer equation. Applying a long short term memory (LSTM) deep learning method, we find that we can specify positions of cancer cells with high accuracy rates. We demonstrate that the present algorithm can also predict multiple or extended cancer cells."} {"_id": [17, 20], "label": "math.NA cs.DC cs.NA", "text": "Distributed memory mathcal H matrix Algebra I Data Distribution and Matrix vector Multiplication. We introduce a data distribution scheme for mathcal H matrices and a distributed memory algorithm for mathcal H matrix vector multiplication. Our data distribution scheme avoids an expensive Omega(P 2) scheduling procedure used in previous work, where P is the number of processes, while data balancing is well preserved. Based on the data distribution, our distributed memory algorithm evenly distributes all computations among P processes and adopts a novel tree communication algorithm to reduce the latency cost. The overall complexity of our algorithm is O Big( frac N log N P alpha log P beta log 2 P Big) for mathcal H matrices under weak admissibility condition, where N is the matrix size, alpha denotes the latency, and beta denotes the inverse bandwidth. Numerically, our algorithm is applied to address both two and three dimensional problems of various sizes among various numbers of processes. On thousands of processes, good parallel efficiency is still observed."} {"_id": [16, 51], "label": "q-bio.QM physics.bio-ph", "text": "Improved fragment based movement with LRFragLib for all atom Ab initio protein folding. Fragment based assembly has been widely used in Ab initio protein folding simulation which can effectively reduce the conformational space and thus accelerate sampling. The efficiency of fragment based movement as well as the quality of fragment library determine whether the folding process can lead the free energy landscape to the global minimum and help the protein to reach near native folded state. We designed an improved fragment based movement, \"fragmove\", which substituted multiple backbone dihedral angles in every simulation step. This movement strategy was derived from the fragment library generated by LRFragLib, an effective fragment detection algorithm using logistic regression model. We show in replica exchange Monte Carlo (REMC) simulation that \"fragmove\", when compared with a set of existing movements in REMC, shows significant improved ability at increasing secondary and tertiary predicted model accuracy by 11.24 and 17.98 , respectively and reaching energy minima decreased by 5.72 . Our results demonstrate that this improved movement is more powerful to guide proteins faster to low energy regions of conformational space and promote folding efficiency and predicted model accuracy."} {"_id": [5], "label": "physics.plasm-ph", "text": "Low n global ideal MHD instabilities in CFETR baseline scenario. This article reports an evaluation on the linear ideal magnetohydrodynamic (MHD) stability of the China Fusion Engineering Test Reactor (CFETR) baseline scenario for various first wall locations. The initial value code NIMROD and eigen value code AEGIS are employed in this analysis. A good agreement is achieved between two codes in the growth rates of n 1 10 ideal MHD modes for various locations of the perfect conducting first wall. The higher n modes are dominated by ballooning modes and localized in the pedestal region, while the lower n modes have more prominent external kink components and broader mode profiles. The influences of plasma vacuum profile and wall shape are also examined using NIMROD. In presence of resistive wall, the low n ideal MHD instabilities are further studied using AEGIS. For the designed first wall location, the n 1 resistive wall mode (RWM) is found unstable, which could be fully stabilized by uniform toroidal rotation above 2.9 core Alfv 'en speed."} {"_id": [0], "label": "cs.CV", "text": "Shape Aware Complementary Task Learning for Multi Organ Segmentation. Multi organ segmentation in whole body computed tomography (CT) is a constant pre processing step which finds its application in organ specific image retrieval, radiotherapy planning, and interventional image analysis. We address this problem from an organ specific shape prior learning perspective. We introduce the idea of complementary task learning to enforce shape prior leveraging the existing target labels. We propose two complementary tasks namely i) distance map regression and ii) contour map detection to explicitly encode the geometric properties of each organ. We evaluate the proposed solution on the public VISCERAL dataset containing CT scans of multiple organs. We report a significant improvement of overall dice score from 0.8849 to 0.9018 due to the incorporation of complementary task learning."} {"_id": [41], "label": "cs.RO", "text": "RoboWalk Explicit Augmented Human Robot Dynamics Modeling for Design Optimization. Utilizing orthoses and exoskeleton technology in various applications and medical industries, particularly to help elderly and ordinary people in their daily activities is a new growing field for research institutes. In this paper, after introducing an assistive lower limb exoskeleton (RoboWalk), the dynamics models of both multi body kinematic tree structure human and robot is derived separately, using Newton's method. The obtained models are then verified by comparing the results with those of the Recursive Newton Euler Algorithms (RNEA). These models are then augmented to investigate the RoboWalk joint torques, and those of the human body, and also the floor reaction force of the complete system. Since RoboWalk is an under actuated robot, despite the assistive force, an undesirable disturbing force exerts to the human. So, optimization strategies are proposed to find an optimal design to maximize the assistive behavior of RoboWalk and reduce joint torques of the human body as a result. To this end, a human in the loop optimization algorithm will be used. The solution of this optimization problem is carried out by Particle Swarm Optimization (PSO) method. The designed analysis and the optimization results demonstrate the effectiveness of the proposed approaches, leading to the elimination of disturbing forces, lower torque demand for RoboWalk motors and lower weights."} {"_id": [28], "label": "cs.CG", "text": "Weighted Epsilon Nets. Motivated by recent work of Bukh and Nivasch on one sided varepsilon approximants, we introduce the notion of emph weighted varepsilon nets . It is a geometric notion of approximation for point sets in mathbb R d similar to varepsilon nets and varepsilon approximations, where it is stronger than the former and weaker than the latter. The main idea is that small sets can contain many points, whereas large sets must contain many points of the weighted varepsilon net. In this paper, we analyze weak weighted varepsilon nets with respect to convex sets and axis parallel boxes and give upper and lower bounds on varepsilon for weighted varepsilon nets of size two and three. Some of these bounds apply to classical varepsilon nets as well."} {"_id": [65], "label": "cs.NI", "text": "Cross layer Design and SDR Implementation of DSA, Backpressure Routing and Network Coding. A cross layer cognitive radio system is designed to support unicast and multicast traffic with integration of dynamic spectrum access (DSA), backpressure algorithm, and network coding for multi hop networking. The full protocol stack that operates with distributed coordination and local information exchange is implemented with software defined radios (SDRs) and assessed in a realistic test and evaluation (T E) system based on a network emulation testbed. Without a common control channel, each SDR performs neighborhood discovery, spectrum sensing and channel estimation, and executes a distributed extension of backpressure algorithm that optimizes the spectrum utility (that represents link rates and traffic congestion) with joint DSA and routing. The backpressure algorithm is extended to support multicast traffic with network coding deployed over virtual queues (for multicast destinations). In addition to full rank decoding at destinations, rank deficient decoding is also considered to reduce the delay. Cognitive network functionalities are programmed with GNU Radio and Python modules are developed for different layers. USRP radios are used as RF front ends. A wireless network T E system is presented to execute emulation tests, where radios communicate with each other through a wireless network emulator that controls physical channels according to path loss, fading, and topology effects. Emulation tests are presented for different topologies to evaluate the throughput, backlog and energy consumption. Results verify the SDR implementation and the joint effect of DSA, backpressure routing and network coding under realistic channel and radio hardware effects."} {"_id": [70], "label": "math.HO", "text": "On the history of ring geometry (with a thematical overview of literature). In this survey paper we give an historical and at the same time thematical overview of the development of ring geometry from its origin to the current state of the art. A comprehensive up to date list of literature is added with articles that treat ring geometry within the scope of incidence geometry."} {"_id": [40], "label": "cs.IR", "text": "A Deep Recurrent Survival Model for Unbiased Ranking. Position bias is a critical problem in information retrieval when dealing with implicit yet biased user feedback data. Unbiased ranking methods typically rely on causality models and debias the user feedback through inverse propensity weighting. While practical, these methods still suffer from two major problems. First, when inferring a user click, the impact of the contextual information, such as documents that have been examined, is often ignored. Second, only the position bias is considered but other issues resulted from user browsing behaviors are overlooked. In this paper, we propose an end to end Deep Recurrent Survival Ranking (DRSR), a unified framework to jointly model user's various behaviors, to (i) consider the rich contextual information in the ranking list and (ii) address the hidden issues underlying user behaviors, i.e., to mine observe pattern in queries without any click (non click queries), and to model tracking logs which cannot truly reflect the user browsing intents (untrusted observation). Specifically, we adopt a recurrent neural network to model the contextual information and estimates the conditional likelihood of user feedback at each position. We then incorporate survival analysis techniques with the probability chain rule to mathematically recover the unbiased joint probability of one user's various behaviors. DRSR can be easily incorporated with both point wise and pair wise learning objectives. The extensive experiments over two large scale industrial datasets demonstrate the significant performance gains of our model comparing with the state of the arts."} {"_id": [46, 38], "label": "math.NT math.AG", "text": "On the fibration method for rational points. We study weak approximation on rationally connected varieties under an assumption of strong approximation for a \"simple\" variety or under Schinzel's hypothesis. We also get some unconditional results."} {"_id": [36], "label": "physics.chem-ph", "text": "Intermolecular interactions in optical cavities an ab initio QED study. Intermolecular bonds are weak compared to covalent bonds, but they are strong enough to influence the properties of large molecular systems. In this work, we investigate how strong light matter coupling inside an optical cavity can modify these intermolecular forces. We perform a detailed comparison between currently available ab initio electron photon methodologies. The electromagnetic field inside the cavity can modulate the ground state properties of weakly bound complexes. Controlling the field polarization, the interactions can be stabilized or destabilized, and electron densities, dipole moments, and polarizabilities can be altered. We demonstrate that electron photon correlation is fundamental to describe intermolecular interactions in strong light matter coupling. This work proposes optical cavities as a novel tool to manipulate and control ground state properties, solvent effects, and intermolecular interactions for molecules and materials."} {"_id": [20], "label": "math.NA cs.NA", "text": "Block Term Tensor Decomposition Model Selection and Computation. The so called block term decomposition (BTD) tensor model has been recently receiving increasing attention due to its enhanced ability of representing systems and signals that are composed of emph blocks of rank higher than one, a scenario encountered in numerous and diverse applications. Its uniqueness and approximation have thus been thoroughly studied. Nevertheless, the challenging problem of estimating the BTD model structure, namely the number of block terms and their individual ranks, has only recently started to attract significant attention. In this paper, a novel method of BTD model selection and computation is proposed, based on the idea of imposing column sparsity emph jointly on the factors and in a emph hierarchical manner and estimating the ranks as the numbers of factor columns of non negligible magnitude. Following a block successive upper bound minimization (BSUM) approach for the proposed optimization problem is shown to result in an alternating hierarchical iteratively reweighted least squares (HIRLS) algorithm, which is fast converging and enjoys high computational efficiency, as it relies in its iterations on small sized sub problems with closed form solutions. Simulation results for both synthetic examples and a hyper spectral image de noising application are reported, which demonstrate the superiority of the proposed scheme over the state of the art in terms of success rate in rank estimation as well as computation time and rate of convergence."} {"_id": [0, 2], "label": "cs.CV cs.AI", "text": "H2O Net Self Supervised Flood Segmentation via Adversarial Domain Adaptation and Label Refinement. Accurate flood detection in near real time via high resolution, high latency satellite imagery is essential to prevent loss of lives by providing quick and actionable information. Instruments and sensors useful for flood detection are only available in low resolution, low latency satellites with region re visit periods of up to 16 days, making flood alerting systems that use such satellites unreliable. This work presents H2O Network, a self supervised deep learning method to segment floods from satellites and aerial imagery by bridging domain gap between low and high latency satellite and coarse to fine label refinement. H2O Net learns to synthesize signals highly correlative with water presence as a domain adaptation step for semantic segmentation in high resolution satellite imagery. Our work also proposes a self supervision mechanism, which does not require any hand annotation, used during training to generate high quality ground truth data. We demonstrate that H2O Net outperforms the state of the art semantic segmentation methods on satellite imagery by 10 and 12 pixel accuracy and mIoU respectively for the task of flood segmentation. We emphasize the generalizability of our model by transferring model weights trained on satellite imagery to drone imagery, a highly different sensor and domain."} {"_id": [42], "label": "math.DG", "text": "Projectively flat bundles and semi stable Higgs bundles. The Corlette Donaldson Hitchin Simpson's correspondence states that, on a compact K \"ahler manifold (X, omega ) , there is a one to one correspondence between the moduli space of semisimple flat complex vector bundles and the moduli space of poly stable Higgs bundles with vanishing Chern numbers. In this paper, we extend this correspondence to the projectively flat bundles case. We prove that there is an equivalence of categories between the category of omega semi stable (poly stable) Higgs bundles (E, overline partial E , phi ) with (2rc 2 (E) (r 1)c 1 2 (E)) cdot omega n 2 0 and the category of (semi simple) projectively flat bundles (E, D) with sqrt 1 F D alpha otimes mbox Id E for some real (1,1) form alpha . Furthermore, we also establish the above correspondence on some compact non K \"ahler manifolds. As its application, we obtain a vanishing theorem of characteristic classes of projectively flat bundles."} {"_id": [38], "label": "math.NT", "text": "The Hasse principle for random Fano hypersurfaces. It is known that the Brauer Manin obstruction to the Hasse principle is vacuous for smooth Fano hypersurfaces of dimension at least 3 over any number field. Moreover, for such varieties it follows from a general conjecture of Colliot Th 'el ene that the Brauer Manin obstruction to the Hasse principle should be the only one, so that the Hasse principle is expected to hold. Working over the field of rational numbers and ordering Fano hypersurfaces of fixed degree and dimension by height, we prove that almost every such hypersurface satisfies the Hasse principle provided that the dimension is at least 3 . This proves a conjecture of Poonen and Voloch in every case except for cubic surfaces."} {"_id": [12, 29], "label": "math.CA math.GR", "text": "Moment functions on groups. The main purpose of this work is to prove characterization theorems for generalized moment functions on groups. According one of the main results these are exponential polynomials that can be described with the aid of complete (exponential) Bell polynomials. These characterizations will be immediate consequences of our main result about the characterization of generalized moment functions of higher rank."} {"_id": [9], "label": "math.AP", "text": "On the orbital stability of a family of traveling waves for the cubic Schr \"o dinger equation on the Heisenberg group. We consider the focusing energy critical Schr \"o dinger equation on the Heisenberg group in the radial case i partial t u Delta mathbb H 1 u u 2u, quad Delta mathbb H 1 frac 1 4 ( partial x 2 partial y 2) (x 2 y 2) partial s 2, quad(t,x,y,s) in mathbb R times mathbb H 1, which is a model for non dispersive evolution equations. For this equation, existence of smooth global solutions and uniqueness of weak solutions in the energy space are open problems. We are interested in a family of ground state traveling waves parametrized by their speed beta in ( 1,1) . We show that the traveling waves of speed close to 1 present some orbital stability in the following sense. If the initial data is radial and close enough to one traveling wave, then there exists a global weak solution which stays close to the orbit of this traveling wave for all times. A similar result is proven for the limiting system associated to this equation."} {"_id": [24, 13, 21], "label": "math.MG math.CO math.DS", "text": "An aperiodic tile with edge to edge orientational matching rules. We present a single, connected tile which can tile the plane but only non periodically. The tile is hexagonal with edge markings, which impose simple rules as to how adjacent tiles are allowed to meet across edges. The first of these rules is a standard matching rule, that certain decorations match across edges. The second condition is a new type of matching rule, which allows tiles to meet only when certain decorations in a particular orientation are given the opposite charge. This forces the tiles to form a hierarchy of triangles, following a central idea of the Socolar Taylor tilings. However, the new edge to edge orientational matching rule forces this structure in a very different way, which allows for a surprisingly simple proof of aperiodicity. We show that the hull of all tilings satisfying our rules is uniquely ergodic and that almost all tilings in the hull belong to a minimal core of tilings generated by substitution. Identifying tilings which are charge flips of each other, these tilings are shown to have pure point dynamical spectrum and a regular model set structure."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "CASA NLU Context Aware Self Attentive Natural Language Understanding for Task Oriented Chatbots. Natural Language Understanding (NLU) is a core component of dialog systems. It typically involves two tasks intent classification (IC) and slot labeling (SL), which are then followed by a dialogue management (DM) component. Such NLU systems cater to utterances in isolation, thus pushing the problem of context management to DM. However, contextual information is critical to the correct prediction of intents and slots in a conversation. Prior work on contextual NLU has been limited in terms of the types of contextual signals used and the understanding of their impact on the model. In this work, we propose a context aware self attentive NLU (CASA NLU) model that uses multiple signals, such as previous intents, slots, dialog acts and utterances over a variable context window, in addition to the current user utterance. CASA NLU outperforms a recurrent contextual NLU baseline on two conversational datasets, yielding a gain of up to 7 on the IC task for one of the datasets. Moreover, a non contextual variant of CASA NLU achieves state of the art performance for IC task on standard public datasets Snips and ATIS."} {"_id": [27, 75, 69], "label": "math.KT math.CT math.QA", "text": "Categorified Chern character and cyclic cohomology. We examine Hopf cyclic cohomology in the same context as the analysis of the geometry of loop spaces LX in derived algebraic geometry and the resulting close relationship between S 1 equivariant quasi coherent sheaves on LX and D X modules. Furthermore, the Hopf setting serves as a toy case for the categorification of Chern character theory. More precisely, this examination naturally leads to a definition of mixed anti Yetter Drinfeld contramodules which reduces to that of the usual mixed complexes for the trivial Hopf algebra and generalizes the notion of stable anti Yetter Drinfeld contramodules that have thus far served as the coefficients for Hopf cyclic theories. The cohomology is then obtained as a Hom in this dg category between a Chern character object associated to an algebra and an arbitrary coefficient mixed anti Yetter Drinfeld contramodule."} {"_id": [21], "label": "math.CO", "text": "An elementary proof of a matrix tree theorem for directed graphs. We present an elementary proof of a generalization of Kirchoff's matrix tree theorem to directed, weighted graphs. The proof is based on a specific factorization of the Laplacian matrices associated to the graphs, which only involves the two incidence matrices that capture the graph's topology. We also point out how this result can be used to calculate principal eigenvectors of the Laplacian matrices."} {"_id": [60], "label": "cs.AR", "text": "Coordinated Management of Processor Configuration and Cache Partitioning to Optimize Energy under QoS Constraints. An effective way to improve energy efficiency is to throttle hardware resources to meet a certain performance target, specified as a QoS constraint, associated with all applications running on a multicore system. Prior art has proposed resource management (RM) frameworks in which the share of the last level cache (LLC) assigned to each processor and the voltage frequency (VF) setting for each processor is managed in a coordinated fashion to reduce energy. A drawback of such a scheme is that, while one core gives up LLC resources for another core, the performance drop must be compensated by a higher VF setting which leads to a quadratic increase in energy consumption. By allowing each core to be adapted to exploit instruction and memory level parallelism (ILP MLP), substantially higher energy savings are enabled. This paper proposes a coordinated RM for LLC partitioning, processor adaptation, and per core VF scaling. A first contribution is a systematic study of the resource trade offs enabled when trading between the three classes of resources in a coordinated fashion. A second contribution is a new RM framework that utilizes these trade offs to save more energy. Finally, a challenge to accurately model the impact of resource throttling on performance is to predict the amount of MLP with high accuracy. To this end, the paper contributes with a mechanism that estimates the effect of MLP over different processor configurations and LLC allocations. Overall, we show that up to 18 of energy, and on average 10 , can be saved using the proposed scheme."} {"_id": [20], "label": "math.NA cs.NA", "text": "Numerical integration of functions of a rapidly rotating phase. We present an algorithm for the efficient numerical evaluation of integrals of the form I( omega) int 0 1 F( x, mathrm e mathrm i omega x omega) , mathrm d x for sufficiently smooth but otherwise arbitrary F and omega gg 1 . The method is entirely \"black box\", i.e., does not require the explicit computation of moment integrals or other pre computations involving F . Its performance is uniform in the frequency omega . We prove that the method converges exponentially with respect to its order when F is analytic and give a numerical demonstration of its error characteristics."} {"_id": [38], "label": "math.NT", "text": "Squares in mathbb F p 2 and permutations involving primitive roots. Let p 2n 1 be an odd prime, and let zeta p 2 1 be a primitive (p 2 1) th root of unity in the algebraic closure overline mathbb Q p of mathbb Q p . We let g in mathbb Z p zeta p 2 1 be a primitive root modulo p mathbb Z p zeta p 2 1 with g equiv zeta p 2 1 pmod p mathbb Z p zeta p 2 1 . Let Delta equiv3 pmod4 be an arbitrary quadratic non residue modulo p in mathbb Z . By the Local Existence Theorem we know that mathbb Q p( sqrt Delta ) mathbb Q p( zeta p 2 1 ) . For all x in mathbb Z sqrt Delta and y in mathbb Z p zeta p 2 1 we use bar x and bar y to denote the elements x mod p mathbb Z sqrt Delta and y mod p mathbb Z p zeta p 2 1 respectively. If we set a k k sqrt Delta for 0 le k le p 1 , then we can view the sequence S overline a 0 2 , cdots, overline a 0 2n 2 , cdots, overline a p 1 2 , cdots, overline a p 1 2n 2 cdots, overline 1 2 , cdots, overline n 2 as a permutation sigma of the sequence S overline g 2 , overline g 4 , cdots, overline g p 2 1 . We determine the sign of sigma completely in this paper."} {"_id": [12], "label": "math.CA", "text": "A Cotlar Type Maximal Function Associated With Fourier Multipliers. We prove the L p boundedness of a maximal operator associated with a dyadic frequency decomposition of a Fourier multiplier, under a weak regularity assumption."} {"_id": [20], "label": "math.NA cs.NA", "text": "Phase field material point method for dynamic brittle fracture with isotropic and anisotropic surface energy. A novel phase field material point method is introduced for robust simulation of dynamic fracture in elastic media considering the most general case of anisotropic surface energy. Anisotropy is explicitly introduced through a properly defined crack density functional. The particular case of impact driven fracture is treated by employing a discrete field approach within the material point method setting. In this, the equations of motion and phase field governing equations are solved independently for each discrete field using a predictor corrector algorithm. Contact at the interface is resolved through frictional contact conditions. The proposed method is verified using analytical predictions. The influence of surface energy anisotropy and loading conditions on the resulting crack paths is assessed through a set of benchmark problems. Comparisons are made with the standard Phase Field Finite Element Method and experimental observations."} {"_id": [1, 2, 3, 39], "label": "cs.CY cs.AI cs.CL cs.LG", "text": "ValNorm Quantifies Semantics to Reveal Consistent Valence Biases Across Languages and Over Centuries. Word embeddings learn implicit biases from linguistic regularities captured by word co occurrence statistics. By extending methods that quantify human like biases in word embeddings, we introduceValNorm, a novel intrinsic evaluation task and method to quantify the valence dimension of affect in human rated word sets from social psychology. We apply ValNorm on static word embeddings from seven languages (Chinese, English, German, Polish, Portuguese, Spanish, and Turkish) and from historical English text spanning 200 years. ValNorm achieves consistently high accuracy in quantifying the valence of non discriminatory, non social group word sets. Specifically, ValNorm achieves a Pearson correlation of r 0.88 for human judgment scores of valence for 399 words collected to establish pleasantness norms in English. In contrast, we measure gender stereotypes using the same set of word embeddings and find that social biases vary across languages. Our results indicate that valence associations of non discriminatory, non social group words represent widely shared associations, in seven languages and over 200 years."} {"_id": [26, 21], "label": "math.CO math.RT", "text": "Normal Reflection Subgroups of Complex Reflection Groups. We study normal reflection subgroups of complex reflection groups. Our approach leads to a refinement of a theorem of Orlik and Solomon to the effect that the generating function for fixed space dimension over a reflection group is a product of linear factors involving generalized exponents. Our refinement gives a uniform proof and generalization of a recent theorem of the second author."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "DenoiSeg Joint Denoising and Segmentation. Microscopy image analysis often requires the segmentation of objects, but training data for this task is typically scarce and hard to obtain. Here we propose DenoiSeg, a new method that can be trained end to end on only a few annotated ground truth segmentations. We achieve this by extending Noise2Void, a self supervised denoising scheme that can be trained on noisy images alone, to also predict dense 3 class segmentations. The reason for the success of our method is that segmentation can profit from denoising, especially when performed jointly within the same network. The network becomes a denoising expert by seeing all available raw data, while co learning to segment, even if only a few segmentation labels are available. This hypothesis is additionally fueled by our observation that the best segmentation results on high quality (very low noise) raw data are obtained when moderate amounts of synthetic noise are added. This renders the denoising task non trivial and unleashes the desired co learning effect. We believe that DenoiSeg offers a viable way to circumvent the tremendous hunger for high quality training data and effectively enables few shot learning of dense segmentations."} {"_id": [1, 2, 3], "label": "cs.CL cs.AI cs.LG", "text": "Analyzing the Forgetting Problem in the Pretrain Finetuning of Dialogue Response Models. In this work, we study how the finetuning stage in the pretrain finetune framework changes the behavior of a pretrained neural language generator. We focus on the transformer encoder decoder model for the open domain dialogue response generation task. Our major finding is that after standard finetuning, the model forgets some of the important language generation skills acquired during large scale pretraining. We demonstrate the forgetting phenomenon through a set of detailed behavior analysis from the perspectives of knowledge transfer, context sensitivity, and function space projection. As a preliminary attempt to alleviate the forgetting problem, we propose an intuitive finetuning strategy named \"mix review\". We find that mix review effectively regularizes the finetuning process, and the forgetting problem is alleviated to some extent. Finally, we discuss interesting behavior of the resulting dialogue model and its implications."} {"_id": [6], "label": "physics.flu-dyn", "text": "Self similar analysis of a viscous heated Oberbeck Boussinesq flow system. The simplest model to couple the heat conduction and Navier Stokes equations together is the Oberbeck Boussinesq(OB)system which were investigated by E.N. Lorenz and opened the paradigm of chaos. In our former studies Chaos, Solitons and Fractals 78, 249 (2015), ibid, 103, 336 (2017) we derived analytic solutions for the velocity, pressure and temperature fields. Additionally, we gave a possible explanation of the Rayleigh B enard convection cells with the help of the self similar Ansatz. Now we generalize the OB hydrodynamical system, including a viscous source term in the heat conduction equation. Our results may attract the interest of various fields like micro or nanofluidics or climate studies."} {"_id": [57, 3, 14, 22], "label": "cs.HC cs.CL cs.PL cs.SE", "text": "Learning to Format Coq Code Using Language Models. Should the final right bracket in a record declaration be on a separate line? Should arguments to the rewrite tactic be separated by a single space? Coq code tends to be written in distinct manners by different people and teams. The expressiveness, flexibility, and extensibility of Coq's languages and notations means that Coq projects have a wide variety of recognizable coding styles, sometimes explicitly documented as conventions on naming and formatting. In particular, even inexperienced users can distinguish vernacular using the standard library and plain Ltac from idiomatic vernacular using the Mathematical Components (MathComp) library and SSReflect. While coding conventions are important for comprehension and maintenance, they are costly to document and enforce. Rule based formatters, such as Coq's beautifier, have limited flexibility and only capture small fractions of desired conventions in large verification projects. We believe that application of language models a class of Natural Language Processing (NLP) techniques for capturing regularities in corpora can provide a solution to this conundrum. More specifically, we believe that an approach based on automatically learning conventions from existing Coq code, and then suggesting idiomatic code to users in the proper context, can be superior to manual approaches and static analysis tools both in terms of effort and results. As a first step, we here outline initial models to learn and suggest space formatting in Coq files, with a preliminary implementation for Coq 8.10, and evaluated on a corpus based on MathComp 1.9.0 which comprises 164k lines of Coq code from four core projects."} {"_id": [36], "label": "physics.chem-ph", "text": "A time dependent density functional theory protocol for resonant inelastic X ray scattering calculations. We present a time dependent density functional theory (TDDFT) based approach to compute the light matter couplings between two different manifolds of excited states relative to a common ground state. These quantities are the necessary ingredients to solve the Kramers Heisenberg equation for resonant inelastic X ray scattering (RIXS) and several other types of two photon spectroscopies. The procedure is based on the pseudo wavefunction approach, where TDDFT eigenstates are treated as a configuration interaction wavefunction with single excitations, and on the restricted energy window approach, where a manifold of excited states can be rigorously defined based on the energies of the occupied molecular orbitals involved in the excitation process. We illustrate the applicability of the method by calculating the 2p4d RIXS maps of three representative Ruthenium complexes and comparing them to experimental results. The method is able to accurately capture all the experimental features in all three complexes, with relative energies correct to within 0.6 eV at the cost of two independent TDDFT calculations."} {"_id": [9, 42], "label": "math.DG math.AP", "text": "Area minimizing surfaces in homotopy classes in metric spaces. We introduce and study a notion of relative 1 homotopy type for Sobolev maps from a surface to a metric space spanning a given collection of Jordan curves. We use this to establish the existence and local H \"older regularity of area minimizing surfaces in a given relative 1 homotopy class in proper geodesic metric spaces admitting a local quadratic isoperimetric inequality. If the underlying space has trivial second homotopy group then relatively 1 homotopic maps are relatively homotopic. We also obtain an analog for closed surfaces in a given 1 homotopy class. Our theorems generalize and strengthen results of Lemaire, Jost, Schoen Yau, and Sacks Uhlenbeck."} {"_id": [0], "label": "cs.CV", "text": "MAAD Face A Massively Annotated Attribute Dataset for Face Images. Soft biometrics play an important role in face biometrics and related fields since these might lead to biased performances, threatens the user's privacy, or are valuable for commercial aspects. Current face databases are specifically constructed for the development of face recognition applications. Consequently, these databases contain large amount of face images but lack in the number of attribute annotations and the overall annotation correctness. In this work, we propose MAADFace, a new face annotations database that is characterized by the large number of its high quality attribute annotations. MAADFace is build on the VGGFace2 database and thus, consists of 3.3M faces of over 9k individuals. Using a novel annotation transfer pipeline that allows an accurate label transfer from multiple source datasets to a target dataset, MAAD Face consists of 123.9M attribute annotations of 47 different binary attributes. Consequently, it provides 15 and 137 times more attribute labels than CelebA and LFW. Our investigation on the annotation quality by three human evaluators demonstrated the superiority of the MAAD Face annotations over existing databases. Additionally, we make use of the large amount of high quality annotations from MAAD Face to study the viability of soft biometrics for recognition, providing insights about which attributes support genuine and imposter decisions. The MAAD Face annotations dataset is publicly available."} {"_id": [23], "label": "math.FA", "text": "Non squareness and local uniform non squareness properties of Orlicz Lorentz function spaces endowed with the Orlicz norm. In this paper the necessary and sufficient conditions were given for Orlicz Lorentz function space endowed with the Orlicz norm having non squareness and local uniform non squareness."} {"_id": [32, 40], "label": "cs.DS cs.IR", "text": "Space Efficient Algorithms for Breadth Depth Search. Continuing the recent trend, in this article we design several space efficient algorithms for two well known graph search methods. Both these search methods share the same name it breadth depth search (henceforth sf BDS ), although they work entirely in different fashion. The classical implementation for these graph search methods takes O(m n) time and O(n lg n) bits of space in the standard word RAM model (with word size being Theta( lg n) bits), where m and n denotes the number of edges and vertices of the input graph respectively. Our goal here is to beat the space bound of the classical implementations, and design o(n lg n) space algorithms for these search methods by paying little to no penalty in the running time. Note that our space bounds (i.e., with o(n lg n) bits of space) do not even allow us to explicitly store the required information to implement the classical algorithms, yet our algorithms visits and reports all the vertices of the input graph in correct order."} {"_id": [66], "label": "cs.CE", "text": "Multiscale Modeling of Elasto Plasticity in Heterogeneous Geomaterials Based on Continuum Micromechanics. In this paper, we investigate some micromechanical aspects of elasto plasticity in heterogeneous geomaterials. The aim is to upscale the elasto plastic behavior for a representative volume of the material which is indeed a very challenging task due to the irreversible deformations involved. Considering the plastic strains as eigen strains allows us to employ the powerful tools offered by Continuum Micromechanics which are mainly developed for upscaling of eigen stressed elastic media. The validity of such eigen strain based formulation of multiscale elasto plasticity is herein examined by comparing its predictions against Finite Element (FE) simulations."} {"_id": [29], "label": "math.GR", "text": "Separability Properties of Nilpotent mathbb Q x Powered Groups. In this paper we study conjugacy and subgroup separability properties in the class of nilpotent mathbb Q x powered groups. Many of the techniques used to study these properties in the context of ordinary nilpotent groups carry over naturally to this more general class. Among other results, we offer a generalization of a theorem due to G. Baumslag. The generalized version states that if G is a finitely mathbb Q x generated mathbb Q x torsion free nilpotent mathbb Q x powered group and H is a mathbb Q x isolated subgroup of G, then for any prime pi in mathbb Q x , bigcap i 1 infty G pi i H H."} {"_id": [58], "label": "q-bio.NC", "text": "A Technical Critique of Some Parts of the Free Energy Principle. We summarize the original formulation of the free energy principle, and highlight some technical issues. We discuss how these issues affect related results involving generalised coordinates and, where appropriate, mention consequences for and reveal, up to now unacknowledged, differences to newer formulations of the free energy principle. In particular, we reveal that various definitions of the \"Markov blanket\" proposed in different works are not equivalent. We show that crucial steps in the free energy argument which involve rewriting the equations of motion of systems with Markov blankets, are not generally correct without additional (previously unstated) assumptions. We prove by counterexample that the original free energy lemma, when taken at face value, is wrong. We show further that this free energy lemma, when it does hold, implies equality of variational density and ergodic conditional density. The interpretation in terms of Bayesian inference hinges on this point, and we hence conclude that it is not sufficiently justified. Additionally, we highlight that the variational densities presented in newer formulations of the free energy principle and lemma are parameterised by different variables than in older works, leading to a substantially different interpretation of the theory. Note that we only highlight some specific problems in the discussed publications. These problems do not rule out conclusively that the general ideas behind the free energy principle are worth pursuing."} {"_id": [49, 68, 21], "label": "math.CO cs.DM math.OC", "text": "Matchings, hypergraphs, association schemes, and semidefinite optimization. We utilize association schemes to analyze the quality of semidefinite programming (SDP) based convex relaxations of integral packing and covering polyhedra determined by matchings in hypergraphs. As a by product of our approach, we obtain bounds on the clique and stability numbers of some regular graphs reminiscent of classical bounds by Delsarte and Hoffman. We determine exactly or provide bounds on the performance of Lov ' a sz Schrijver SDP hierarchy, and illustrate the usefulness of obtaining commutative subschemes from non commutative schemes via contraction in this context."} {"_id": [0, 1, 2, 41], "label": "cs.CV cs.AI cs.LG cs.RO", "text": "Unsupervised Feature Learning for Event Data Direct vs Inverse Problem Formulation. Event based cameras record an asynchronous stream of per pixel brightness changes. As such, they have numerous advantages over the standard frame based cameras, including high temporal resolution, high dynamic range, and no motion blur. Due to the asynchronous nature, efficient learning of compact representation for event data is challenging. While it remains not explored the extent to which the spatial and temporal event \"information\" is useful for pattern recognition tasks. In this paper, we focus on single layer architectures. We analyze the performance of two general problem formulations the direct and the inverse, for unsupervised feature learning from local event data (local volumes of events described in space time). We identify and show the main advantages of each approach. Theoretically, we analyze guarantees for an optimal solution, possibility for asynchronous, parallel parameter update, and the computational complexity. We present numerical experiments for object recognition. We evaluate the solution under the direct and the inverse problem and give a comparison with the state of the art methods. Our empirical results highlight the advantages of both approaches for representation learning from event data. We show improvements of up to 9 in the recognition accuracy compared to the state of the art methods from the same class of methods."} {"_id": [11], "label": "physics.app-ph", "text": "Characterization of bulk nanobubbles formed by using a porous alumina film with ordered nanopores. Gaseous nanobubbles (NBs), with their unique physicochemical properties and promising applications, have become an important research topic. Generation of monodispersed bulk NBs with specified gas content remains a challenge. We developed a simple method for generating bulk NBs, using porous alumina films with ordered straight nano scaled holes. Different techniques, such as nanoparticle tracking analysis (NTA), atomic force microscopy (AFM), and infrared absorption spectroscopy (IRAS), are used to confirm NB formation. The NTA data demonstrates that the minimum size of the NBs formed is less than 100 nm, which is comparable to the diameter of nanoholes in the porous alumina film. By generating NBs with different gases, including CO2, O2, N2, Ar, and He, we discovered that the minimum size of NBs negatively correlated with the solubility of encapsulated gases in water. Due to the monodispersed size of NBs generated from the highly ordered porous alumina, we determined that NB size is distributed discretely with a uniform increment factor of sqrt(2). To explain the observed characteristic size distribution of NBs, we propose a simple model in which two NBs of the same size are assumed to preferentially coalesce. This characteristic bubble size distribution is useful for elucidating the basic characteristics of nanobubbles, such as the long term stability of NBs. This distribution can also be used to develop new applications of NBs, for example, nano scaled reaction fields through bubble coalescence."} {"_id": [14], "label": "cs.HC", "text": "When Social Sensing Meets Edge Computing Vision and Challenges. This paper overviews the state of the art, research challenges, and future opportunities in an emerging research direction Social Sensing based Edge Computing (SSEC). Social sensing has emerged as a new sensing application paradigm where measurements about the physical world are collected from humans or from devices on their behalf. The advent of edge computing pushes the frontier of computation, service, and data along the cloud to things continuum. The merging of these two technical trends generates a set of new research challenges that need to be addressed. In this paper, we first define the new SSEC paradigm that is motivated by a few underlying technology trends. We then present a few representative real world case studies of SSEC applications and several key research challenges that exist in those applications. Finally, we envision a few exciting research directions in future SSEC. We hope this paper will stimulate discussions of this emerging research direction in the community."} {"_id": [24, 21, 70], "label": "math.CO math.HO math.MG", "text": "Motivated exposition of the proof of the Tverberg Theorem. We present a motivated exposition of the proof of the following Tverberg Theorem For every integers d,r any (d 1)(r 1) 1 points in mathbb R d can be decomposed into r groups such that all the r convex hulls of the groups have a common point. The proof is by well known reduction to the B 'ar 'any Theorem. However, our exposition is easier to grasp because additional constructions (of an embedding mathbb R d subset mathbb R d 1 , of vectors varphi j,i and statement of the Bara 'ny Theorem) are not introduced in advance in a non motivated way, but naturally appear in an attempt to construct the required decomposition. This attempt is based on rewriting several equalities between vectors as one equality between vectors of higher dimension."} {"_id": [3], "label": "cs.CL", "text": "BanFakeNews A Dataset for Detecting Fake News in Bangla. Observing the damages that can be done by the rapid propagation of fake news in various sectors like politics and finance, automatic identification of fake news using linguistic analysis has drawn the attention of the research community. However, such methods are largely being developed for English where low resource languages remain out of the focus. But the risks spawned by fake and manipulative news are not confined by languages. In this work, we propose an annotated dataset of 50K news that can be used for building automated fake news detection systems for a low resource language like Bangla. Additionally, we provide an analysis of the dataset and develop a benchmark system with state of the art NLP techniques to identify Bangla fake news. To create this system, we explore traditional linguistic features and neural network based methods. We expect this dataset will be a valuable resource for building technologies to prevent the spreading of fake news and contribute in research with low resource languages."} {"_id": [5], "label": "physics.plasm-ph", "text": "Challenges and the next transformative steps in understanding plasma turbulence from the perspective of multi spacecraft measurements. We have become heavily reliant on electrical technologies, from power grids to GPS to wireless communication. Any disruption of these systems will have severe global consequences. A major natural hazard for such electrical disruption is caused by solar wind disturbances that have dramatic geospace impact.Estimates are that a solar storm of the magnitude of the 1859 Carrington Solar Superstorm would cause over 2 trillion in damage today. In July 23, 2012, we had a near miss of a solar Superstorm that could have broken the record of largest such storms at Earth. To enable pre emptive measures, developing accurate space weather forecasts is urgent. At the core of space weather forecasts is plasma physics, and kinetic turbulence, in particular. For example, the intense turbulence stirred up at the bow shock and foreshock have been shown to open up pathways for high velocity solar wind parcels to bypass the protective shield of the terrestrial magnetosphere and create disturbances in the ionosphere and lower atmosphere. A primary challenge in understanding kinetic turbulence and its global implications is its multi scale nature, spanning from electron scales to macro scales of the magnetosphere. Current four spacecraft missions with 3D formations, the Magnetospheric Multiscale (MMS) and Cluster, have made progress in our understanding of such turbulence. Yet the limitation of a fixed spacecraft formation size at a given time prohibits probing the multi scale nature as well as the dynamical evolution of the phenomena. A transformative leap in our understanding of turbulence is expected with in situ probes populating a 3D volume and forming multiple 'n hedrons (n 4)' in MHD to kinetic scales."} {"_id": [43], "label": "cs.DB", "text": "Fast Subgraph Matching by Exploiting Search Failures. Subgraph matching is a compute intensive problem that asks to enumerate all the isomorphic embeddings of a query graph within a data graph. This problem is generally solved with backtracking, which recursively evolves every possible partial embedding until it becomes an isomorphic embedding or is found unable to become it. While existing methods reduce the search space by analyzing graph structures before starting the backtracking, it is often ineffective for complex graphs. In this paper, we propose an efficient algorithm for subgraph matching that performs on the fly pruning during the backtracking. Our main idea is to learn from failure'. That is, our algorithm generates failure patterns when a partial embedding is found unable to become an isomorphic embedding. Then, in the subsequent process of the backtracking, our algorithm prunes partial embeddings matched with a failure pattern. This pruning does not change the result because failure patterns are designed to represent the conditions that never yield an isomorphic embedding. Additionally, we introduce an efficient representation of failure patterns for constant time pattern matching. The experimental results show that our method improves the performance by up to 10000 times than existing methods."} {"_id": [3], "label": "cs.CL", "text": "Where is the context? A critique of recent dialogue datasets. Recent dialogue datasets like MultiWOZ 2.1 and Taskmaster 1 constitute some of the most challenging tasks for present day dialogue models and, therefore, are widely used for system evaluation. We identify several issues with the above mentioned datasets, such as history independence, strong knowledge base dependence, and ambiguous system responses. Finally, we outline key desiderata for future datasets that we believe would be more suitable for the construction of conversational artificial intelligence."} {"_id": [38], "label": "math.NT", "text": "On the l.c.m. of shifted Fibonacci numbers. Let (F n) n geq 1 be the sequence of Fibonacci numbers. Guy and Matiyasevich proved that begin equation log operatorname lcm (F 1, F 2, dots, F n) sim frac 3 log alpha pi 2 cdot n 2 quad text as n to infty, end equation where operatorname lcm is the least common multiple and alpha big(1 sqrt 5 ) 2 is the golden ratio. We prove that for every periodic sequence mathbf s (s n) n geq 1 in 1, 1 there exists an effectively computable rational number C mathbf s 0 such that begin equation log operatorname lcm (F 3 s 3, F 4 s 4, dots, F n s n) sim frac 3 log alpha pi 2 cdot C mathbf s cdot n 2 , quad text as n to infty . end equation Moreover, we show that if (s n) n geq 1 is a sequence of independent uniformly distributed random variables in 1, 1 then begin equation mathbb E big log operatorname lcm (F 3 s 3, F 4 s 4, dots, F n s n) big sim frac 3 log alpha pi 2 cdot frac 15 operatorname Li 2(1 16) 2 cdot n 2 , quad text as n to infty , end equation where operatorname Li 2 is the dilogarithm function."} {"_id": [1, 6, 7], "label": "physics.flu-dyn cs.LG physics.comp-ph", "text": "Deep Neural Networks for Nonlinear Model Order Reduction of Unsteady Flows. Unsteady fluid systems are nonlinear high dimensional dynamical systems that may exhibit multiple complex phenomena both in time and space. Reduced Order Modeling (ROM) of fluid flows has been an active research topic in the recent decade with the primary goal to decompose complex flows to a set of features most important for future state prediction and control, typically using a dimensionality reduction technique. In this work, a novel data driven technique based on the power of deep neural networks for reduced order modeling of the unsteady fluid flows is introduced. An autoencoder network is used for nonlinear dimension reduction and feature extraction as an alternative for singular value decomposition (SVD). Then, the extracted features are used as an input for long short term memory network (LSTM) to predict the velocity field at future time instances. The proposed autoencoder LSTM method is compared with non intrusive reduced order models based on dynamic mode decomposition (DMD) and proper orthogonal decomposition (POD). Moreover, an autoencoder DMD algorithm is introduced for reduced order modeling, which uses the autoencoder network for dimensionality reduction rather than SVD rank truncation. Results show that the autoencoder LSTM method is considerably capable of predicting fluid flow evolution, where higher values for coefficient of determination R 2 are obtained using autoencoder LSTM compared to other models."} {"_id": [27, 29], "label": "math.GR math.CT", "text": "On the nonabelian cohomology with coefficients in a crossed module. This paper is concerned with the nonabelian cohomology of groups with coefficients in crossed modules. These objects were introduced by Dedecker and studied by Breen, Borovoi, Noohi and many others. In this paper we study several important objects that are classified by these cohomologies and for them we develop a theory similar to the Schreier obstruction theory of group extensions."} {"_id": [9], "label": "math.AP", "text": "Partial Regularity for Harmonic Maps into Spheres at a Singular or Degenerate Free Boundary. We prove partial regularity of weakly stationary harmonic maps with (partially) free boundary data on manifolds where the domain metric may degenerate or become singular along the free boundary at the rate d alpha for the distance function d from the boundary."} {"_id": [20], "label": "math.NA cs.NA", "text": "Convergence of a finite element method on a Bakhvalov type mesh for a singularly perturbed convection diffusion equation in 2D. A finite element method of any order is applied on a Bakhvalov type mesh to solve a singularly perturbed convection diffusion equation in 2D, whose solution exhibits exponential boundary layers. A uniform convergence of (almost) optimal order is proved by means of a carefully defined interpolant."} {"_id": [49, 2], "label": "cs.AI math.OC", "text": "Machine Learning in Airline Crew Pairing to Construct Initial Clusters for Dynamic Constraint Aggregation. The crew pairing problem (CPP) is generally modelled as a set partitioning problem where the flights have to be partitioned in pairings. A pairing is a sequence of flight legs separated by connection time and rest periods that starts and ends at the same base. Because of the extensive list of complex rules and regulations, determining whether a sequence of flights constitutes a feasible pairing can be quite difficult by itself, making CPP one of the hardest of the airline planning problems. In this paper, we first propose to improve the prototype Baseline solver of Desaulniers et al. (2020) by adding dynamic control strategies to obtain an efficient solver for large scale CPPs Commercial GENCOL DCA. These solvers are designed to aggregate the flights covering constraints to reduce the size of the problem. Then, we use machine learning (ML) to produce clusters of flights having a high probability of being performed consecutively by the same crew. The solver combines several advanced Operations Research techniques to assemble and modify these clusters, when necessary, to produce a good solution. We show, on monthly CPPs with up to 50 000 flights, that Commercial GENCOL DCA with clusters produced by ML based heuristics outperforms Baseline fed by initial clusters that are pairings of a solution obtained by rolling horizon with GENCOL. The reduction of solution cost averages between 6.8 and 8.52 , which is mainly due to the reduction in the cost of global constraints between 69.79 and 78.11 ."} {"_id": [38, 46], "label": "math.AG math.NT", "text": "Comparison of arithmetic Brauer groups with geometric Brauer groups. Let X be a projective and smooth variety over a field k . The goal of this paper is to prove that the cokernel of the canonical map Br(X) to Br(X k s ) G k has a finite exponent. Both groups are natural invariants arising from consideration of the Tate conjecture of divisors over X ."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Can AI Generate Love Advice? Toward Neural Answer Generation for Non Factoid Questions. Deep learning methods that extract answers for non factoid questions from QA sites are seen as critical since they can assist users in reaching their next decisions through conversations with AI systems. The current methods, however, have the following two problems (1) They can not understand the ambiguous use of words in the questions as word usage can strongly depend on the context. As a result, the accuracies of their answer selections are not good enough. (2) The current methods can only select from among the answers held by QA sites and can not generate new ones. Thus, they can not answer the questions that are somewhat different with those stored in QA sites. Our solution, Neural Answer Construction Model, tackles these problems as it (1) Incorporates the biases of semantics behind questions into word embeddings while also computing them regardless of the semantics. As a result, it can extract answers that suit the contexts of words used in the question as well as following the common usage of words across semantics. This improves the accuracy of answer selection. (2) Uses biLSTM to compute the embeddings of questions as well as those of the sentences often used to form answers. It then simultaneously learns the optimum combination of those sentences as well as the closeness between the question and those sentences. As a result, our model can construct an answer that corresponds to the situation that underlies the question it fills the gap between answer selection and generation and is the first model to move beyond the current simple answer selection model for non factoid QAs. Evaluations using datasets created for love advice stored in the Japanese QA site, Oshiete goo, indicate that our model achieves 20 higher accuracy in answer creation than the strong baselines. Our model is practical and has already been applied to the love advice service in Oshiete goo."} {"_id": [17, 43], "label": "cs.DB cs.DC", "text": "Cold Storage Data Archives More Than Just a Bunch of Tapes. The abundance of available sensor and derived data from large scientific experiments, such as earth observation programs, radio astronomy sky surveys, and high energy physics already exceeds the storage hardware globally fabricated per year. To that end, cold storage data archives are the often overlooked spearheads of modern big data analytics in scientific, data intensive application domains. While high performance data analytics has received much attention from the research community, the growing number of problems in designing and deploying cold storage archives has only received very little attention. In this paper, we take the first step towards bridging this gap in knowledge by presenting an analysis of four real world cold storage archives from three different application domains. In doing so, we highlight (i) workload characteristics that differentiate these archives from traditional, performance sensitive data analytics, (ii) design trade offs involved in building cold storage systems for these archives, and (iii) deployment trade offs with respect to migration to the public cloud. Based on our analysis, we discuss several other important research challenges that need to be addressed by the data management community."} {"_id": [18], "label": "math.GT", "text": "Ribbon cobordisms between lens spaces. We determine when there exists a ribbon rational homology cobordism between two connected sums of lens spaces, i.e. one without 3 handles. In particular, we show that if a lens space L admits a ribbon rational homology cobordism to a different lens space, then L must be homeomorphic to L(n,1) , up to orientation reversal. As an application, we classify ribbon chi concordances between connected sums of 2 bridge links. Our work builds on Lisca's work on embeddings of linear lattices."} {"_id": [65, 1], "label": "cs.NI cs.LG", "text": "Applying Machine Learning Techniques for Caching in Edge Networks A Comprehensive Survey. Edge networking is a complex and dynamic computing paradigm that aims to push cloud resources closer to the end user improving responsiveness and reducing backhaul traffic. User mobility, preferences, and content popularity are the dominant dynamic features of edge networks. Temporal and social features of content, such as the number of views and likes are leveraged to estimate the popularity of content from a global perspective. However, such estimates should not be mapped to an edge network with particular social and geographic characteristics. In next generation edge networks, i.e., 5G and beyond 5G, machine learning techniques can be applied to predict content popularity based on user preferences, cluster users based on similar content interests, and optimize cache placement and replacement strategies provided a set of constraints and predictions about the state of the network. These applications of machine learning can help identify relevant content for an edge network. This article investigates the application of machine learning techniques for in network caching in edge networks. We survey recent state of the art literature and formulate a comprehensive taxonomy based on (a) machine learning technique (method, objective, and features), (b) caching strategy (policy, location, and replacement), and (c) edge network (type and delivery strategy). A comparative analysis of the state of the art literature is presented with respect to the parameters identified in the taxonomy. Moreover, we debate research challenges and future directions for optimal caching decisions and the application of machine learning in edge networks."} {"_id": [40, 39], "label": "cs.IR cs.CY", "text": "CobWeb A Research Prototype for Exploring User Bias in Political Fact Checking. The effect of user bias in fact checking has not been explored extensively from a user experience perspective. We estimate the user bias as a function of the user's perceived reputation of the news sources (e.g., a user with liberal beliefs may tend to trust liberal sources). We build an interface to communicate the role of estimated user bias in the context of a fact checking task. We also explore the utility of helping users visualize their detected level of bias. 80 of the users of our system find that the presence of an indicator for user bias is useful in judging the veracity of a political claim."} {"_id": [0, 41], "label": "cs.RO cs.CV", "text": "LIBRE The Multiple 3D LiDAR Dataset. In this work, we present LIBRE LiDAR Benchmarking and Reference, a first of its kind dataset featuring 10 different LiDAR sensors, covering a range of manufacturers, models, and laser configurations. Data captured independently from each sensor includes three different environments and configurations static targets, where objects were placed at known distances and measured from a fixed position within a controlled environment adverse weather, where static obstacles were measured from a moving vehicle, captured in a weather chamber where LiDARs were exposed to different conditions (fog, rain, strong light) and finally, dynamic traffic, where dynamic objects were captured from a vehicle driven on public urban roads, multiple times at different times of the day, and including supporting sensors such as cameras, infrared imaging, and odometry devices. LIBRE will contribute to the research community to (1) provide a means for a fair comparison of currently available LiDARs, and (2) facilitate the improvement of existing self driving vehicles and robotics related software, in terms of development and tuning of LiDAR based perception algorithms."} {"_id": [18], "label": "math.GT", "text": "Introduction to Whitney Towers. These introductory notes on Whitney towers in 4 manifolds, as developed in collaboration with Jim Conant and Peter Teichner, are an expansion of three expository lectures given at the Winter Braids X conference February 2020 in Pisa, Italy. Topics presented include local manipulations of surfaces in 4 space, fundamental definitions related to Whitney towers and their associated trees, geometric Jacobi identities, the classification of order n twisted Whitney towers in the 4 ball and higher order Arf invariants, and low order Whitney towers on 2 spheres in 4 manifolds and related invariants."} {"_id": [56, 17, 47], "label": "cs.LO cs.DC math.AT", "text": "Directed Homotopy in Non Positively Curved Spaces. A semantics of concurrent programs can be given using precubical sets, in order to study (higher) commutations between the actions, thus encoding the \"geometry\" of the space of possible executions of the program. Here, we study the particular case of programs using only mutexes, which are the most widely used synchronization primitive. We show that in this case, the resulting programs have non positive curvature, a notion that we introduce and study here for precubical sets, and can be thought of as an algebraic analogue of the well known one for metric spaces. Using this it, as well as categorical rewriting techniques, we are then able to show that directed and non directed homotopy coincide for directed paths in these precubical sets. Finally, we study the geometric realization of precubical sets in metric spaces, to show that our conditions on precubical sets actually coincide with those for metric spaces. Since the category of metric spaces is not cocomplete, we are lead to work with generalized metric spaces and study some of their properties."} {"_id": [17], "label": "cs.DC", "text": "securePrune Secure block pruning in UTXO based blockchains using Accumulators. In this paper, we propose a scheme called securePrune for reducing the storage space of a full node and synchronization time of bootstrapping nodes joining the Peer to Peer (P2P) network in an Unspent Transaction Outputs (UTXO) based blockchain like bitcoin using RSA accumulators. The size of the bitcoin blockchain is growing linearly with transactions. We propose a new block structure to represent the state of a blockchain also called UTXO set by including an accumulator of a state in the block header and proofs of knowledge for inclusion and deletion of the transactions of the current block in the block. In our scheme, the miners periodically release a snapshot of the blockchain state. The other full nodes in the network, securely prune the historical blocks after attaining the required number of confirmations for the snapshot block, which in turn confirms the snapshot of the state through an accumulator specified in the block header and proofs inside the block. The secure and periodic pruning of the old blocks, reduce the synchronization time for a new node joining into the network. The simulation results demonstrate a significant reduction in the storage space of a full node and bootstrapping cost of the new nodes."} {"_id": [46], "label": "math.AG", "text": "Resolutions of surfaces with big cotangent bundle and A 2 singularities. We give a new criterion for when a resolution of a surface of general type with canonical singularities has big cotangent bundle and a new lower bound for the values of d for which there is a surface with big cotangent bundle that is deformation equivalent to a smooth hypersurface in mathbb P 3 of degree d ."} {"_id": [14], "label": "cs.HC", "text": "User Interactive Machine Learning Model for Identifying Structural Relationships of Code Features. Traditional machine learning based intelligent systems assist users by learning patterns in data and making recommendations. However, these systems are limited in that the user has little means of understanding the rationale behind the systems suggestions, communicating their own understanding of patterns, or correcting system behavior. In this project, we outline a model for intelligent software based on a human computer feedback loop. The Machine Learning (ML) systems recommendations are reviewed by the user, and in turn, this information shapes the systems decision making. Our model was applied to developing an HTML editor that integrates ML with user interaction to ascertain structural relationships between HTML document features and apply them for code completion. The editor utilizes the ID3 algorithm to build decision trees, sequences of rules for predicting code the user will type. The editor displays the decision trees rules in the Interactive Rules Interface System (IRIS), which allows developers to prioritize, modify, or delete them. These interactions alter the data processed by ID3, providing the developer some control over the autocomplete system. Validation indicates that, absent user interaction, the ML model is able to predict tags with 78.4 percent accuracy, attributes with 62.9 percent accuracy, and values with 12.8 percent accuracy. Based off of the results of the user study, user interaction with the rules interface corrects feature relationships missed or mistaken by the automated process, enhancing autocomplete accuracy and developer productivity. Additionally, interaction is proven to help developers work with greater awareness of code patterns. Our research demonstrates the viability of a software integration of machine intelligence with human feedback."} {"_id": [32], "label": "cs.DS", "text": "Planted Models for the Densest k Subgraph Problem. Given an undirected graph G , the Densest k subgraph problem (DkS) asks to compute a set S subset V of cardinality left lvert S right rvert leq k such that the weight of edges inside S is maximized. This is a fundamental NP hard problem whose approximability, inspite of many decades of research, is yet to be settled. The current best known approximation algorithm due to Bhaskara et al. (2010) computes a mathcal O left( n 1 4 epsilon right) approximation in time n mathcal O left(1 epsilon right) , for any epsilon 0 . We ask what are some \"easier\" instances of this problem? We propose some natural semi random models of instances with a planted dense subgraph, and study approximation algorithms for computing the densest subgraph in them. These models are inspired by the semi random models of instances studied for various other graph problems such as the independent set problem, graph partitioning problems etc. For a large range of parameters of these models, we get significantly better approximation factors for the Densest k subgraph problem. Moreover, our algorithm recovers a large part of the planted solution."} {"_id": [0], "label": "cs.CV", "text": "Robust Long Term Object Tracking via Improved Discriminative Model Prediction. We propose an improved discriminative model prediction method for robust long term tracking based on a pre trained short term tracker. The baseline pre trained short term tracker is SuperDiMP which combines the bounding box regressor of PrDiMP with the standard DiMP classifier. Our tracker RLT DiMP improves SuperDiMP in the following three aspects (1) Uncertainty reduction using random erasing To make our model robust, we exploit an agreement from multiple images after erasing random small rectangular areas as a certainty. And then, we correct the tracking state of our model accordingly. (2) Random search with spatio temporal constraints we propose a robust random search method with a score penalty applied to prevent the problem of sudden detection at a distance. (3) Background augmentation for more discriminative feature learning We augment various backgrounds that are not included in the search area to train a more robust model in the background clutter. In experiments on the VOT LT2020 benchmark dataset, the proposed method achieves comparable performance to the state of the art long term trackers. The source code is available at https github.com bismex RLT DIMP."} {"_id": [50, 11, 5], "label": "physics.app-ph physics.med-ph physics.plasm-ph", "text": "Atmospheric pressure plasma jets applied to cancerology correlating electrical configurations with in vivo toxicity and therapeutic efficiency. Two atmospheric pressure plasma jet devices a plasma gun and a plasma Tesla jet are compared in terms of safety and therapeutic efficiency to reduce the tumor volume progression of cholangiocarcinoma, i.e. a rare and very aggressive cancer emerging in biliary tree. For this, a three steps methodology is carried out. First, the two APPJ have been benchmarked in regard to their electrical and physico chemical properties while interacting with material targets dielectric plate, liquid sample, metal plate and an equivalent electrical circuit of human body. The propagation properties of the ionization wave interacting with these targets are discussed, in particular the profile of the related pulsed atmospheric plasma streams. In a second step, a dermal toxicity survey is performed so as to define an experimental operating window where plasma parameters can be changed without damaging healthy skin of mice during their exposure to plasma and without inducing any electrical hazards (burnings, ventricular fibrillation). Optimal conditions are identified discarding the conditions where slight alterations may be evidenced by histology (e.g. prenecrotic aspect of keratinocytes, alterations in the collagen structure). Hence, for the two APPJ plasma parameters these conditions are as follow duty cycle 14 , repetition frequency 30 kHz, magnitude 7 kV, gap 10 mm and exposure time 1 min. In a third step, the two plasma jets are utilized on cholangiocarcinoma xenograft tumor model developed in immunodeficient mice. The two devices are safe and a significant therapeutic efficiency is demonstrated with the plasma Tesla. In conclusion, we have developed a safe cold atmospheric plasma device with antitumoral properties in preclinical model of cholangiocarcinoma, opening the path for new anticancer treatment opportunities."} {"_id": [0], "label": "cs.CV", "text": "Utilizing the Instability in Weakly Supervised Object Detection. Weakly supervised object detection (WSOD) focuses on training object detector with only image level annotations, and is challenging due to the gap between the supervision and the objective. Most of existing approaches model WSOD as a multiple instance learning (MIL) problem. However, we observe that the result of MIL based detector is unstable, i.e., the most confident bounding boxes change significantly when using different initializations. We quantitatively demonstrate the instability by introducing a metric to measure it, and empirically analyze the reason of instability. Although the instability seems harmful for detection task, we argue that it can be utilized to improve the performance by fusing the results of differently initialized detectors. To implement this idea, we propose an end to end framework with multiple detection branches, and introduce a simple fusion strategy. We further propose an orthogonal initialization method to increase the difference between detection branches. By utilizing the instability, we achieve 52.6 and 48.0 mAP on the challenging PASCAL VOC 2007 and 2012 datasets, which are both the new state of the arts."} {"_id": [65], "label": "cs.NI", "text": "SCDP Systematic Rateless Coding for Efficient Data Transport in Data Centres (Complete Version). In this paper we propose SCDP, a general purpose data transport protocol for data centres that, in contrast to all other protocols proposed to date, supports efficient one to many and many to one communication, which is extremely common in modern data centres. SCDP does so without compromising on efficiency for short and long unicast flows. SCDP achieves this by integrating RaptorQ codes with receiver driven data transport, packet trimming and Multi Level Feedback Queuing (MLFQ) (1) RaptorQ codes enable efficient one to many and many to one data transport (2) on top of RaptorQ codes, receiver driven flow control, in combination with in network packet trimming, enable efficient usage of network resources as well as multi path transport and packet spraying for all transport modes. Incast and Outcast are eliminated (3) the systematic nature of RaptorQ codes, in combination with MLFQ, enable fast, decoding free completion of short flows. We extensively evaluate SCDP in a wide range of simulated scenarios with realistic data centre workloads. For one to many and many to one transport sessions, SCDP performs significantly better compared to NDP and PIAS. For short and long unicast flows, SCDP performs equally well or better compared to NDP and PIAS."} {"_id": [56, 37], "label": "cs.LO cs.FL", "text": "A small step approach to multi trace checking against interactions. Interaction models describe the exchange of messages between the different components of distributed systems. We have previously defined a small step operational semantics for interaction models. The paper extends this work by presenting an approach for checking the validity of multi traces against interaction models. A multi trace is a collection of traces (sequences of emissions and receptions), each representing a local view of the same global execution of the distributed system. We have formally proven our approach, studied its complexity, and implemented it in a prototype tool. Finally, we discuss some observability issues when testing distributed systems via the analysis of multi traces."} {"_id": [80], "label": "cs.SC", "text": "On some classes of irreducible polynomials. The aim of the paper is to produce new families of irreducible polynomials, generalizing previous results in the area. One example of our general result is that for a near separated polynomial, i.e., polynomials of the form F(x,y) f 1(x)f 2(y) f 2(x)f 1(y) , then F(x,y) r is always irreducible for any constant r different from zero. We also provide the biggest known family of HIP polynomials in several variables. These are polynomials p(x 1, ldots,x n) in K x 1, ldots,x n over a zero characteristic field K such that p(h 1(x 1), ldots,h n(x n)) is irreducible over K for every n tuple h 1(x 1), ldots,h n(x n) of non constant one variable polynomials over K . The results can also be applied to fields of positive characteristic, with some modifications."} {"_id": [3], "label": "cs.CL", "text": "Deepening Hidden Representations from Pre trained Language Models. Transformer based pre trained language models have proven to be effective for learning contextualized language representation. However, current approaches only take advantage of the output of the encoder's final layer when fine tuning the downstream tasks. We argue that only taking single layer's output restricts the power of pre trained representation. Thus we deepen the representation learned by the model by fusing the hidden representation in terms of an explicit HIdden Representation Extractor (HIRE), which automatically absorbs the complementary representation with respect to the output from the final layer. Utilizing RoBERTa as the backbone encoder, our proposed improvement over the pre trained models is shown effective on multiple natural language understanding tasks and help our model rival with the state of the art models on the GLUE benchmark."} {"_id": [38, 26, 46], "label": "math.RT math.AG math.NT", "text": "On the conjectures of Braverman Kazhdan. In this article we prove a conjecture of Braverman and Kazhdan in cite BK1 on acyclicity of rho Bessel sheaves on reductive groups in both ell adic and de Rham settings. We do so by establishing a vanishing conjecture proposed in cite C1 . As a corollary, we obtain a geometric construction of the non linear Fourier kernels for finite reductive groups as conjectured by Braverman and Kazhdan. The proof of the vanishing conjecture relies on the techniques developed in cite BFO on Drinfeld center of Harish Chandra bimodules and character D modules, and a construction of a class of character sheaves in mixed characteristic."} {"_id": [23], "label": "math.FA", "text": "On Caristi fixed point theorem for set valued mappings. The aim of this paper is to discuss Penot's problem on a generalization of Caristi's fixed point theorem. We settle this problem in the negative and we present some new theorems on the existence of fixed points of set valued mappings in ordered metric spaces."} {"_id": [67], "label": "physics.atom-ph", "text": "Microwave coherent spectroscopy of ultracold thulium atoms. Recently, the thulium atom was cooled down to the Bose Einstein condensation temperature, thus opening a pathway to quantum simulation with this atom. However, successful simulations require instruments to control and readout states of the atom as well as the ability to control the interaction between either different species or different states of the same type of species. In this paper, we provide an experimental demonstration of high fidelity (over 93 ) manipulation of the ground state magnetic sublevels of thulium, which utilizes a simple and efficient design of a microwave (MW) antenna. The coherence time and dephasing rate of the energetically highest hyperfine level of the ground state were also examined."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Learning aligned embeddings for semi supervised word translation using Maximum Mean Discrepancy. Word translation is an integral part of language translation. In machine translation, each language is considered a domain with its own word embedding. The alignment between word embeddings allows linking semantically equivalent words in multilingual contexts. Moreover, it offers a way to infer cross lingual meaning for words without a direct translation. Current methods for word embedding alignment are either supervised, i.e. they require known word pairs, or learn a cross domain transformation on fixed embeddings in an unsupervised way. Here we propose an end to end approach for word embedding alignment that does not require known word pairs. Our method, termed Word Alignment through MMD (WAM), learns embeddings that are aligned during sentence translation training using a localized Maximum Mean Discrepancy (MMD) constraint between the embeddings. We show that our method not only out performs unsupervised methods, but also supervised methods that train on known word translations."} {"_id": [0, 1, 2], "label": "cs.CV cs.AI cs.LG", "text": "Spatial Sampling Network for Fast Scene Understanding. We propose a network architecture to perform efficient scene understanding. This work presents three main novelties the first is an Improved Guided Upsampling Module that can replace in toto the decoder part in common semantic segmentation networks. Our second contribution is the introduction of a new module based on spatial sampling to perform Instance Segmentation. It provides a very fast instance segmentation, needing only thresholding as post processing step at inference time. Finally, we propose a novel efficient network design that includes the new modules and test it against different datasets for outdoor scene understanding. To our knowledge, our network is one of the themost efficient architectures for scene understanding published to date, furthermore being 8.6 more accurate than the fastest competitor on semantic segmentation and almost five times faster than the most efficient network for instance segmentation."} {"_id": [0, 2], "label": "cs.CV cs.AI", "text": "Bidirectional RNN based Few Shot Learning for 3D Medical Image Segmentation. Segmentation of organs of interest in 3D medical images is necessary for accurate diagnosis and longitudinal studies. Though recent advances using deep learning have shown success for many segmentation tasks, large datasets are required for high performance and the annotation process is both time consuming and labor intensive. In this paper, we propose a 3D few shot segmentation framework for accurate organ segmentation using limited training samples of the target organ annotation. To achieve this, a U Net like network is designed to predict segmentation by learning the relationship between 2D slices of support data and a query image, including a bidirectional gated recurrent unit (GRU) that learns consistency of encoded features between adjacent slices. Also, we introduce a transfer learning method to adapt the characteristics of the target image and organ by updating the model before testing with arbitrary support and query data sampled from the support data. We evaluate our proposed model using three 3D CT datasets with annotations of different organs. Our model yielded significantly improved performance over state of the art few shot segmentation models and was comparable to a fully supervised model trained with more target training data."} {"_id": [0, 1, 19], "label": "cs.CV cs.CR cs.LG", "text": "FoggySight A Scheme for Facial Lookup Privacy. Advances in deep learning algorithms have enabled better than human performance on face recognition tasks. In parallel, private companies have been scraping social media and other public websites that tie photos to identities and have built up large databases of labeled face images. Searches in these databases are now being offered as a service to law enforcement and others and carry a multitude of privacy risks for social media users. In this work, we tackle the problem of providing privacy from such face recognition systems. We propose and evaluate FoggySight, a solution that applies lessons learned from the adversarial examples literature to modify facial photos in a privacy preserving manner before they are uploaded to social media. FoggySight's core feature is a community protection strategy where users acting as protectors of privacy for others upload decoy photos generated by adversarial machine learning algorithms. We explore different settings for this scheme and find that it does enable protection of facial privacy including against a facial recognition service with unknown internals."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Classifying the classifier dissecting the weight space of neural networks. This paper presents an empirical study on the weights of neural networks, where we interpret each model as a point in a high dimensional space the neural weight space. To explore the complex structure of this space, we sample from a diverse selection of training variations (dataset, optimization procedure, architecture, etc.) of neural network classifiers, and train a large number of models to represent the weight space. Then, we use a machine learning approach for analyzing and extracting information from this space. Most centrally, we train a number of novel deep meta classifiers with the objective of classifying different properties of the training setup by identifying their footprints in the weight space. Thus, the meta classifiers probe for patterns induced by hyper parameters, so that we can quantify how much, where, and when these are encoded through the optimization process. This provides a novel and complementary view for explainable AI, and we show how meta classifiers can reveal a great deal of information about the training setup and optimization, by only considering a small subset of randomly selected consecutive weights. To promote further research on the weight space, we release the neural weight space (NWS) dataset a collection of 320K weight snapshots from 16K individually trained deep neural networks."} {"_id": [25, 23], "label": "math.PR math.FA", "text": "A new look at random projections of the cube and general product measures. A strong law of large numbers for d dimensional random projections of the n dimensional cube is derived. It shows that with respect to the Hausdorff distance a properly normalized random projection of 1,1 n onto mathbb R d almost surely converges to a centered d dimensional Euclidean ball of radius sqrt 2 pi , as n to infty . For every point inside this ball we determine the asymptotic number of vertices and the volume of the part of the cube projected close' to this point. Moreover, large deviations for random projections of general product measures are studied. Let nu otimes n be the n fold product measure of a Borel probability measure nu on mathbb R , and let I be uniformly distributed on the Stiefel manifold of orthogonal d frames in mathbb R n . It is shown that the sequence of random measures nu otimes n circ(n 1 2 I ) 1 , n in mathbb N , satisfies a large deviations principle with probability 1 . The rate function is explicitly identified in terms of the moment generating function of nu . At the heart of the proofs lies a transition trick which allows to replace the uniform projection by the Gaussian one. A number of concrete examples are discussed as well, including the uniform distributions on the cube 1,1 n and the discrete cube 1,1 n as a special cases."} {"_id": [56, 57], "label": "cs.PL cs.LO", "text": "Resource Analysis driven by (Conditional) Termination Proofs. When programs feature a complex control flow, existing techniques for resource analysis produce cost relation systems (CRS) whose cost functions retain the complex flow of the program and, consequently, might not be solvable into closed form upper bounds. This paper presents a novel approach to resource analysis that is driven by the result of a termination analysis. The fundamental idea is that the termination proof encapsulates the flows of the program which are relevant for the cost computation so that, by driving the generation of the CRS using the termination proof, we produce a linearly bounded CRS (LB CRS). A LB CRS is composed of cost functions that are guaranteed to be locally bounded by linear ranking functions and thus greatly simplify the process of CRS solving. We have built a new resource analysis tool, named MaxCore, that is guided by the VeryMax termination analyzer and uses CoFloCo and PUBS as CRS solvers. Our experimental results on the set of benchmarks from the Complexity and Termination Competition 2019 for C Integer programs show that MaxCore outperforms all other resource analysis tools. Under consideration for acceptance in TPLP."} {"_id": [31], "label": "q-bio.PE", "text": "Modeling the Epidemic Outbreak and Dynamics of COVID 19 in Croatia. The paper deals with a modeling of the ongoing epidemic caused by Coronavirus disease 2019 (COVID 19) on the closed territory of the Republic of Croatia. Using the official public information on the number of confirmed infected, recovered and deceased individuals, the modified SEIR compartmental model is developed to describe the underlying dynamics of the epidemic. Fitted modified SEIR model provides the prediction of the disease progression in the near future, considering strict control interventions by means of social distancing and quarantine for infected and at risk individuals introduced at the beginning of COVID 19 spread on February, 25th by Croatian Ministry of Health. Assuming the accuracy of provided data and satisfactory representativeness of the model used, the basic reproduction number is derived. Obtained results portray potential positive developments and justify the stringent precautionary measures introduced by the Ministry of Health."} {"_id": [15], "label": "cs.IT math.IT", "text": "Novel High Throughput Decoding Algorithms for Product and Staircase Codes based on Error and Erasure Decoding. Product codes (PCs) and staircase codes (SCCs) are conventionally decoded based on bounded distance decoding (BDD) of the component codes and iterating between row and column decoders. The performance of iterative BDD (iBDD) can be improved using soft aided (hybrid) algorithms. Among these, iBDD with combined reliability (iBDD CR) has been recently proposed for PCs, yielding sizeable performance gains at the expense of a minor increase in complexity compared to iBDD. In this paper, we first extend iBDD CR to SCCs. We then propose two novel decoding algorithms for PCs and SCCs which improve upon iBDD CR. The new algorithms use an extra decoding attempt based on error and erasure decoding of the component codes. The proposed algorithms require only the exchange of hard messages between component decoders, making them an attractive solution for ultra high throughput fiber optic systems. Simulation results show that our algorithms based on two decoding attempts achieve gains of up to 0.88 dB for both PCs and SCCs. This corresponds to a 33 optical reach enhancement over iBDD with bit interleaved coded modulation using 256 quadrature amplitude modulation."} {"_id": [1, 3, 59], "label": "cs.CL cs.LG cs.SI", "text": "comp syn Perceptually Grounded Word Embeddings with Color. Popular approaches to natural language processing create word embeddings based on textual co occurrence patterns, but often ignore embodied, sensory aspects of language. Here, we introduce the Python package comp syn, which provides grounded word embeddings based on the perceptually uniform color distributions of Google Image search results. We demonstrate that comp syn significantly enriches models of distributional semantics. In particular, we show that (1) comp syn predicts human judgments of word concreteness with greater accuracy and in a more interpretable fashion than word2vec using low dimensional word color embeddings, and (2) comp syn performs comparably to word2vec on a metaphorical vs. literal word pair classification task. comp syn is open source on PyPi and is compatible with mainstream machine learning Python packages. Our package release includes word color embeddings for over 40,000 English words, each associated with crowd sourced word concreteness judgments."} {"_id": [1, 20, 49], "label": "math.NA cs.LG cs.NA math.OC", "text": "Alternating minimization algorithms for graph regularized tensor completion. We consider a low rank tensor completion (LRTC) problem which aims to recover a tensor from incomplete observations. LRTC plays an important role in many applications such as signal processing, computer vision, machine learning, and neuroscience. A widely used approach is to combine the tensor completion data fitting term with a regularizer based on a convex relaxation of the multilinear ranks of the tensor. For the data fitting function, we model the tensor variable by using the Canonical Polyadic (CP) decomposition and for the low rank promoting regularization function, we consider a graph Laplacian based function which exploits correlations between the rows of the matrix unfoldings. For solving our LRTC model, we propose an efficient alternating minimization algorithm. Furthermore, based on the Kurdyka L ojasiewicz property, we show that the sequence generated by the proposed algorithm globally converges to a critical point of the objective function. Besides, an alternating direction method of multipliers algorithm is also developed for the LRTC model. Extensive numerical experiments on synthetic and real data indicate that the proposed algorithms are effective and efficient."} {"_id": [2, 4], "label": "cs.NE cs.AI", "text": "Empirical Study on the Benefits of Multiobjectivization for Solving Single Objective Problems. When dealing with continuous single objective problems, multimodality poses one of the biggest difficulties for global optimization. Local optima are often preventing algorithms from making progress and thus pose a severe threat. In this paper we analyze how single objective optimization can benefit from multiobjectivization by considering an additional objective. With the use of a sophisticated visualization technique based on the multi objective gradients, the properties of the arising multi objective landscapes are illustrated and examined. We will empirically show that the multi objective optimizer MOGSA is able to exploit these properties to overcome local traps. The performance of MOGSA is assessed on a testbed of several functions provided by the COCO platform. The results are compared to the local optimizer Nelder Mead."} {"_id": [21, 46], "label": "math.AG math.CO", "text": "Normal completions of toric varieties over rank one valuation rings and completions of Gamma admissible fans. We show that any normal toric variety over a rank one valuation ring admits an equivariant open embedding in a normal toric variety which is proper over the valuation ring, after a base change by a finite extension of valuation rings. If the value group Gamma is discrete or divisible then no base change is needed. We give explicit examples which show that existing methods do not produce such normal equivariant completions. Our approach is combinatorial and proceeds by showing that Gamma admissible fans admit Gamma admissible completions. In order to show this we prove a combinatorial analog of noetherian reduction which we believe will be of independent interest."} {"_id": [0], "label": "cs.CV", "text": "Vision at A Glance Interplay between Fine and Coarse Information Processing Pathways. Object recognition is often viewed as a feedforward, bottom up process in machine learning, but in real neural systems, object recognition is a complicated process which involves the interplay between two signal pathways. One is the parvocellular pathway (P pathway), which is slow and extracts fine features of objects the other is the magnocellular pathway (M pathway), which is fast and extracts coarse features of objects. It has been suggested that the interplay between the two pathways endows the neural system with the capacity of processing visual information rapidly, adaptively, and robustly. However, the underlying computational mechanisms remain largely unknown. In this study, we build a computational model to elucidate the computational advantages associated with the interactions between two pathways. Our model consists of two convolution neural networks one mimics the P pathway, referred to as FineNet, which is deep, has small size kernels, and receives detailed visual inputs the other mimics the M pathway, referred to as CoarseNet, which is shallow, has large size kernels, and receives low pass filtered or binarized visual inputs. The two pathways interact with each other via a Restricted Boltzmann Machine. We find that 1) FineNet can teach CoarseNet through imitation and improve its performance considerably 2) CoarseNet can improve the noise robustness of FineNet through association 3) the output of CoarseNet can serve as a cognitive bias to improve the performance of FineNet. We hope that this study will provide insight into understanding visual information processing and inspire the development of new object recognition architectures."} {"_id": [1, 39], "label": "cs.CY cs.LG", "text": "MASS UMAP Fast and accurate analog ensemble search in weather radar archive. The use of analogs similar weather patterns for weather forecasting and analysis is an established method in meteorology. The most challenging aspect of using this approach in the context of operational radar applications is to be able to perform a fast and accurate search for similar spatiotemporal precipitation patterns in a large archive of historical records. In this context, sequential pairwise search is too slow and computationally expensive. Here we propose an architecture to significantly speed up spatiotemporal analog retrieval by combining nonlinear geometric dimensionality reduction (UMAP) with the fastest known Euclidean search algorithm for time series (MASS) to find radar analogs in constant time, independently of the desired temporal length to match and the number of extracted analogs. We compare UMAP with Principal component analysis (PCA) and show that UMAP outperforms PCA for spatial MSE analog search with proper settings. Moreover, we show that MASS is 20 times faster than brute force search on the UMAP embeddings space. We test the architecture on a real dataset and show that it enables precise and fast operational analog ensemble search through more than 2 years of radar archive in less than 5 seconds on a single workstation."} {"_id": [0], "label": "cs.CV", "text": "Approaches of large scale images recognition with more than 50,000 categoris. Though current CV models have been able to achieve high levels of accuracy on small scale images classification dataset with hundreds or thousands of categories, many models become infeasible in computational or space consumption when it comes to large scale dataset with more than 50,000 categories. In this paper, we provide a viable solution for classifying large scale species datasets using traditional CV techniques such as.features extraction and processing, BOVW(Bag of Visual Words) and some statistical learning technics like Mini Batch K Means,SVM which are used in our works. And then mixed with a neural network model. When applying these techniques, we have done some optimization in time and memory consumption, so that it can be feasible for large scale dataset. And we also use some technics to reduce the impact of mislabeling data. We use a dataset with more than 50, 000 categories, and all operations are done on common computer with l 6GB RAM and a CPU of 3. OGHz. Our contributions are 1) analysis what problems may meet in the training processes, and presents several feasible ways to solve these problems. 2) Make traditional CV models combined with neural network models provide some feasible scenarios for training large scale classified datasets within the constraints of time and spatial resources."} {"_id": [48, 49, 1], "label": "math.OC cs.CC cs.LG", "text": "Complexity aspects of local minima and related notions. We consider the notions of (i) critical points, (ii) second order points, (iii) local minima, and (iv) strict local minima for multivariate polynomials. For each type of point, and as a function of the degree of the polynomial, we study the complexity of deciding (1) if a given point is of that type, and (2) if a polynomial has a point of that type. Our results characterize the complexity of these two questions for all degrees left open by prior literature. Our main contributions reveal that many of these questions turn out to be tractable for cubic polynomials. In particular, we present an efficiently checkable necessary and sufficient condition for local minimality of a point for a cubic polynomial. We also show that a local minimum of a cubic polynomial can be efficiently found by solving semidefinite programs of size linear in the number of variables. By contrast, we show that it is strongly NP hard to decide if a cubic polynomial has a critical point. We also prove that the set of second order points of any cubic polynomial is a spectrahedron, and conversely that any spectrahedron is the projection of the set of second order points of a cubic polynomial. In our final section, we briefly present a potential application of finding local minima of cubic polynomials to the design of a third order Newton method."} {"_id": [29], "label": "math.GR", "text": "Computability of finite quotients of finitely generated groups. We study systematically groups whose marked finite quotients form a recursive set. We give several definitions, and prove basic properties of this class of groups, and in particular emphasize the link between the growth of the depth function and solvability of the word problem. We give examples of infinitely presented groups whose finite quotients can be effectively enumerated. Finally, our main result is that a residually finite group can be even not recursively presented and still have computable finite quotients, and that, on the other hand, it can have solvable word problem while still not having computable finite quotients."} {"_id": [91], "label": "q-bio.GN", "text": "Immune Fingerprinting through Repertoire Similarity. Immune repertoires provide a unique fingerprint reflecting the immune history of individuals, with potential applications in precision medicine. However, the question of how personal that information is and how it can be used to identify individuals has not been explored. Here, we show that individuals can be uniquely identified from repertoires of just a few thousands lymphocytes. We present \"Immprint,\" a classifier using an information theoretic measure of repertoire similarity to distinguish pairs of repertoire samples coming from the same versus different individuals. Using published T cell receptor repertoires and statistical modeling, we tested its ability to identify individuals with great accuracy, including identical twins, by computing false positive and false negative rates 10 6 from samples composed of 10,000 T cells. We verified through longitudinal datasets and simulations that the method is robust to acute infections and the passage of time. These results emphasize the private and personal nature of repertoire data."} {"_id": [25], "label": "math.PR", "text": "Time fractional stochastic differential equation with random jumps. We prove the well posedness of variable order time fractional stochastic differential equations with jumps. Using a truncating argument, we do not assume any condition on the initial distribution and the integrability of the large jump term even though the solution is non Markovian. To get moment estimates, some extra assumptions are needed. As an application of moment estimates, we prove the H \"older regularity of the solutions."} {"_id": [65, 19], "label": "cs.CR cs.NI", "text": "Blockchain Powered Software Defined Network Enabled Networking Infrastructure for Cloud Management. Cloud architecture has become a valuable solution for different applications, such as big data analytics, due to its high degree of availability, scalability and strategic value. However, there still remain challenges in managing cloud architecture, in areas such as cloud security. In this paper, we exploit software defined networking (SDN) and blockchain technologies to secure cloud management platforms from a networking perspective. We develop a blockchain powered SDN enabled networking infrastructure in which the integration between blockchain based security and autonomy management layer and multi controller SDN networking layer is defined to enhance the integrity of the control and management messages. Furthermore, our proposed networking infrastructure also enables the autonomous bandwidth provisioning to enhance the availability of cloud architecture. In the simulation section, we evaluate the performance of our proposed blockchain powered SDN enabled networking infrastructure by considering different scenarios."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Coin flipper at eHealth KD Challenge 2019 Voting LSTMs for Key Phrases and Semantic Relation Identification Applied to Spanish eHealth Texts. This paper describes our approach presented for the eHealth KD 2019 challenge. Our participation was aimed at testing how far we could go using generic tools for Text Processing but, at the same time, using common optimization techniques in the field of Data Mining. The architecture proposed for both tasks of the challenge is a standard stacked 2 layer bi LSTM. The main particularities of our approach are (a) The use of a surrogate function of F1 as loss function to close the gap between the minimization function and the evaluation metric, and (b) The generation of an ensemble of models for generating predictions by majority vote. Our system ranked second with an F1 score of 62.18 in the main task by a narrow margin with the winner that scored 63.94 ."} {"_id": [3], "label": "cs.CL", "text": "Multi Channel Graph Neural Network for Entity Alignment. Entity alignment typically suffers from the issues of structural heterogeneity and limited seed alignments. In this paper, we propose a novel Multi channel Graph Neural Network model (MuGNN) to learn alignment oriented knowledge graph (KG) embeddings by robustly encoding two KGs via multiple channels. Each channel encodes KGs via different relation weighting schemes with respect to self attention towards KG completion and cross KG attention for pruning exclusive entities respectively, which are further combined via pooling techniques. Moreover, we also infer and transfer rule knowledge for completing two KGs consistently. MuGNN is expected to reconcile the structural differences of two KGs, and thus make better use of seed alignments. Extensive experiments on five publicly available datasets demonstrate our superior performance (5 Hits 1 up on average)."} {"_id": [25], "label": "math.PR", "text": "Infinite Horizon Stochastic Impulse Control with Delay and Random Coefficients. We study a class of infinite horizon impulse control problems with execution delay when the dynamics of the system is described by a general adapted stochastic process. The problem is solved by means of probabilistic tools relying on the notion of Snell envelope and infinite horizon reflected backward stochastic differential equations. This allows us to establish the existence of an optimal strategy over all admissible strategies."} {"_id": [56, 47], "label": "cs.LO math.AT", "text": "A Topological Application of Labelled Natural Deduction. We use a labelled deduction system based on the concept of computational paths (sequences of rewrites) as equalities between two terms of the same type. We also define a term rewriting system that is used to make computations between these computational paths, establishing equalities between equalities. We then proceed to show the main result here using this system to obtain the calculation of the fundamental group of the circle, of the torus and the real projective plane."} {"_id": [0], "label": "cs.CV", "text": "Cross domain Face Presentation Attack Detection via Multi domain Disentangled Representation Learning. Face presentation attack detection (PAD) has been an urgent problem to be solved in the face recognition systems. Conventional approaches usually assume the testing and training are within the same domain as a result, they may not generalize well into unseen scenarios because the representations learned for PAD may overfit to the subjects in the training set. In light of this, we propose an efficient disentangled representation learning for cross domain face PAD. Our approach consists of disentangled representation learning (DR Net) and multi domain learning (MD Net). DR Net learns a pair of encoders via generative models that can disentangle PAD informative features from subject discriminative features. The disentangled features from different domains are fed to MD Net which learns domain independent features for the final cross domain face PAD task. Extensive experiments on several public datasets validate the effectiveness of the proposed approach for cross domain PAD."} {"_id": [0], "label": "cs.CV", "text": "Attentive Deep Regression Networks for Real Time Visual Face Tracking in Video Surveillance. Visual face tracking is one of the most important tasks in video surveillance systems. However, due to the variations in pose, scale, expression, and illumination it is considered to be a difficult task. Recent studies show that deep learning methods have a significant potential in object tracking tasks and adaptive feature selection methods can boost their performance. Motivated by these, we propose an end to end attentive deep learning based tracker, that is build on top of the state of the art GOTURN tracker, for the task of real time visual face tracking in video surveillance. Our method outperforms the state of the art GOTURN and IVT trackers by very large margins and it achieves speeds that are very far beyond the requirements of real time tracking. Additionally, to overcome the scarce data problem in visual face tracking, we also provide bounding box annotations for the G1 and G2 sets of ChokePoint dataset and make it suitable for further studies in face tracking under surveillance conditions."} {"_id": [29], "label": "math.GR", "text": "On inverse submonoids of the monoid of almost monotone injective co finite partial selfmaps of positive integers. In this paper we study submonoids of the monoid mathscr I infty , Rsh ! ! ! nearrow ( mathbb N ) of almost monotone injective co finite partial selfmaps of positive integers mathbb N . Let mathscr I infty ! nearrow ( mathbb N ) be a submonoid of mathscr I infty , Rsh ! ! ! nearrow ( mathbb N ) which consists of cofinite monotone partial bijections of mathbb N and mathscr C mathbb N be a subsemigroup mathscr I infty , Rsh ! ! ! nearrow ( mathbb N ) which is generated by the partial shift n mapsto n 1 and its inverse partial map. We show that every automorphism of a full inverse subsemigroup of mathscr I infty ! nearrow ( mathbb N ) which contains the semigroup mathscr C mathbb N is the identity map. We construct a submonoid mathbf I mathbb N infty underline 1 of mathscr I infty , Rsh ! ! ! nearrow ( mathbb N ) with the following property if S is an inverse submonoid of mathscr I infty , Rsh ! ! ! nearrow ( mathbb N ) such that S contains mathbf I mathbb N infty underline 1 as a submonoid, then every non identity congruence mathfrak C on S is a group congruence. We show that if S is an inverse submonoid of mathscr I infty , Rsh ! ! ! nearrow ( mathbb N ) such that S contains mathscr C mathbb N as a submonoid then S is simple and the quotient semigroup S mathfrak C mathbf mg , where mathfrak C mathbf mg is minimum group congruence on S , is isomorphic to the additive group of integers. Also, we study topologizations of inverse submonoids of mathscr I infty , Rsh ! ! ! nearrow ( mathbb N ) which contain mathscr C mathbb N and embeddings of such semigroups into compact like topological semigroups."} {"_id": [21, 38], "label": "math.CO math.NT", "text": "On zero sum free sequences contained in random subsets of finite cyclic groups. Let C n be a cyclic group of order n . A sequence S of length ell over C n is a sequence S a 1 boldsymbol cdot a 2 boldsymbol cdot ldots boldsymbol cdot a ell of ell elements in C n , where a repetition of elements is allowed and their order is disregarded. We say that S is a zero sum sequence if Sigma i 1 ell a i 0 and that S is a zero sum free sequence if S contains no zero sum subsequence. Let R be a random subset of C n obtained by choosing each element in C n independently with probability p . Let N R n 1 k be the number of zero sum free sequences of length n 1 k in R . Also, let N R n 1 k,d be the number of zero sum free sequences of length n 1 k having d distinct elements in R . We obtain the expectation of N R n 1 k and N R n 1 k,d for 0 leq k leq big lfloor frac n 3 big rfloor . We also show a concentration result on N R n 1 k and N R n 1 k,d when k is fixed."} {"_id": [38], "label": "math.NT", "text": "New Rank Records For Elliptic Curves Having Rational Torsion. We present rank record breaking elliptic curves having torsion subgroups Z 2Z, Z 3Z, Z 4Z, Z 6Z, and Z 7Z."} {"_id": [49], "label": "math.OC", "text": "An Algorithm for the Separation Preserving Transition of Clusterings. The separability of clusters is one of the most desired properties in clustering. There is a wide range of settings in which different clusterings of the same data set appear. We are interested in applications where there is a need for an explicit, gradual transition of one separable clustering into another one. This transition should be a sequence of simple, natural steps that upholds separability of the clusters throughout. We design an algorithm for such a transition. We exploit the intimate connection of separability and linear programming over bounded shape partition and transportation polytopes separable clusterings lie on the boundary of partition polytopes, form a subset of the vertices of the corresponding transportation polytopes, and circuits of both polytopes are readily interpreted as sequential or cyclical exchanges of items between clusters. This allows for a natural approach to achieve the desired transition through a combination of two walks an edge walk between two so called radial clusterings in a transportation polytope, computed through an adaptation of classical tools of sensitivity analysis and parametric programming and a walk from a separable clustering to a corresponding radial clustering, computed through a tailored, iterative routine updating cluster sizes and re optimizing the cluster assignment of items."} {"_id": [3], "label": "cs.CL", "text": "Exclusive Hierarchical Decoding for Deep Keyphrase Generation. Keyphrase generation (KG) aims to summarize the main ideas of a document into a set of keyphrases. A new setting is recently introduced into this problem, in which, given a document, the model needs to predict a set of keyphrases and simultaneously determine the appropriate number of keyphrases to produce. Previous work in this setting employs a sequential decoding process to generate keyphrases. However, such a decoding method ignores the intrinsic hierarchical compositionality existing in the keyphrase set of a document. Moreover, previous work tends to generate duplicated keyphrases, which wastes time and computing resources. To overcome these limitations, we propose an exclusive hierarchical decoding framework that includes a hierarchical decoding process and either a soft or a hard exclusion mechanism. The hierarchical decoding process is to explicitly model the hierarchical compositionality of a keyphrase set. Both the soft and the hard exclusion mechanisms keep track of previously predicted keyphrases within a window size to enhance the diversity of the generated keyphrases. Extensive experiments on multiple KG benchmark datasets demonstrate the effectiveness of our method to generate less duplicated and more accurate keyphrases."} {"_id": [9], "label": "math.AP", "text": "Regularity for parabolic systems with critical growth in the gradient and applications. Motivated by problems arising in geometric flows, we prove several regularity results for systems of local and nonlocal equations, adapting to the parabolic case a neat argument due to Caffarelli. The geometric motivation of this work comes from recent works arising in the theory harmonic maps with free boundary in particular. We prove H \"older regularity of weak solutions."} {"_id": [0], "label": "cs.CV", "text": "Polarimetric Multi View Inverse Rendering. A polarization camera has great potential for 3D reconstruction since the angle of polarization (AoP) of reflected light is related to an object's surface normal. In this paper, we propose a novel 3D reconstruction method called Polarimetric Multi View Inverse Rendering (Polarimetric MVIR) that effectively exploits geometric, photometric, and polarimetric cues extracted from input multi view color polarization images. We first estimate camera poses and an initial 3D model by geometric reconstruction with a standard structure from motion and multi view stereo pipeline. We then refine the initial model by optimizing photometric and polarimetric rendering errors using multi view RGB and AoP images, where we propose a novel polarimetric rendering cost function that enables us to effectively constrain each estimated surface vertex's normal while considering four possible ambiguous azimuth angles revealed from the AoP measurement. Experimental results using both synthetic and real data demonstrate that our Polarimetric MVIR can reconstruct a detailed 3D shape without assuming a specific polarized reflection depending on the material."} {"_id": [49], "label": "math.OC", "text": "Second order analysis of an optimal control problem in a phase field tumor growth model with singular potentials and chemotaxis. This paper concerns a distributed optimal control problem for a tumor growth model of Cahn Hilliard type including chemotaxis with possibly singular potentials, where the control and state variables are nonlinearly coupled. First, we discuss the weak well posedness of the system under very general assumptions for the potentials, which may be singular and nonsmooth. Then, we establish the strong well posedness of the system in a reduced setting, which however admits the logarithmic potential this analysis will lay the foundation for the study of the corresponding optimal control problem. Concerning the optimization problem, we address the existence of minimizers and establish both first order necessary and second order sufficient conditions for optimality. The mathematically challenging second order analysis is completely performed here, after showing that the solution mapping is twice continuously differentiable between suitable Banach spaces via the implicit function theorem. Then, we completely identify the second order Fr 'echet derivative of the control to state operator and carry out a thorough and detailed investigation about the related properties."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "LNMap Departures from Isomorphic Assumption in Bilingual Lexicon Induction Through Non Linear Mapping in Latent Space. Most of the successful and predominant methods for bilingual lexicon induction (BLI) are mapping based, where a linear mapping function is learned with the assumption that the word embedding spaces of different languages exhibit similar geometric structures (i.e., approximately isomorphic). However, several recent studies have criticized this simplified assumption showing that it does not hold in general even for closely related languages. In this work, we propose a novel semi supervised method to learn cross lingual word embeddings for BLI. Our model is independent of the isomorphic assumption and uses nonlinear mapping in the latent space of two independently trained auto encoders. Through extensive experiments on fifteen (15) different language pairs (in both directions) comprising resource rich and low resource languages from two different datasets, we demonstrate that our method outperforms existing models by a good margin. Ablation studies show the importance of different model components and the necessity of non linear mapping."} {"_id": [34, 42, 46], "label": "math.AG math.CV math.DG", "text": "Deformations of Higher Page Analogues of partial bar partial Manifolds. We extend the notion of essential deformations from the case of the Iwasawa manifold, for which they were introduced recently by the first named author, to the general case of page 1 partial bar partial manifolds that were jointly introduced very recently by all three authors. We go on to obtain an analogue of the unobstructedness theorem of Bogomolov, Tian and Todorov for page 1 partial bar partial manifolds. As applications of this discussion, we study the small deformations of certain Nakamura solvmanifolds and reinterpret the cases of the Iwasawa manifold and its 5 dimensional analogue from this standpoint."} {"_id": [2, 62], "label": "cs.GT cs.AI", "text": "Signaling in Bayesian Network Congestion Games the Subtle Power of Symmetry. Network congestion games are a well understood model of multi agent strategic interactions. Despite their ubiquitous applications, it is not clear whether it is possible to design information structures to ameliorate the overall experience of the network users. We focus on Bayesian games with atomic players, where network vagaries are modeled via a (random) state of nature which determines the costs incurred by the players. A third party entity the sender can observe the realized state of the network and exploit this additional information to send a signal to each player. A natural question is the following is it possible for an informed sender to reduce the overall social cost via the strategic provision of information to players who update their beliefs rationally? The paper focuses on the problem of computing optimal ex ante persuasive signaling schemes, showing that symmetry is a crucial property for its solution. Indeed, we show that an optimal ex ante persuasive signaling scheme can be computed in polynomial time when players are symmetric and have affine cost functions. Moreover, the problem becomes NP hard when players are asymmetric, even in non Bayesian settings."} {"_id": [40, 1], "label": "cs.IR cs.LG", "text": "Modeling Document Interactions for Learning to Rank with Regularized Self Attention. Learning to rank is an important task that has been successfully deployed in many real world information retrieval systems. Most existing methods compute relevance judgments of documents independently, without holistically considering the entire set of competing documents. In this paper, we explore modeling documents interactions with self attention based neural networks. Although self attention networks have achieved state of the art results in many NLP tasks, we find empirically that self attention provides little benefit over baseline neural learning to rank architecture. To improve the learning of self attention weights, We propose simple yet effective regularization terms designed to model interactions between documents. Evaluations on publicly available Learning to Rank (LETOR) datasets show that training self attention network with our proposed regularization terms can significantly outperform existing learning to rank methods."} {"_id": [20, 12], "label": "math.NA cs.NA math.CA", "text": "A Lanczos like method for non autonomous linear ordinary differential equations. The time ordered exponential is defined as the function that solves a system of coupled first order linear differential equations with generally non constant coefficients. In spite of being at the heart of much system dynamics, control theory, and model reduction problems, the time ordered exponential function remains elusively difficult to evaluate. The Lanczos algorithm is a (symbolic) algorithm capable of evaluating it by producing a tridiagonalization of the original differential system. In this paper, we explain how the Lanczos algorithm is built from a generalization of Krylov subspaces, and we prove crucial properties, such as the matching moment property. A strategy for its numerical implementation is also outlined and will be subject of future investigation."} {"_id": [0], "label": "cs.CV", "text": "Depth Estimation from Monocular Images and Sparse Radar Data. In this paper, we explore the possibility of achieving a more accurate depth estimation by fusing monocular images and Radar points using a deep neural network. We give a comprehensive study of the fusion between RGB images and Radar measurements from different aspects and proposed a working solution based on the observations. We find that the noise existing in Radar measurements is one of the main key reasons that prevents one from applying the existing fusion methods developed for LiDAR data and images to the new fusion problem between Radar data and images. The experiments are conducted on the nuScenes dataset, which is one of the first datasets which features Camera, Radar, and LiDAR recordings in diverse scenes and weather conditions. Extensive experiments demonstrate that our method outperforms existing fusion methods. We also provide detailed ablation studies to show the effectiveness of each component in our method."} {"_id": [14, 39], "label": "cs.HC cs.CY", "text": "The Adaptability and Challenges of Autonomous Vehicles to Pedestrians in Urban China. China is the world's largest automotive market and is ambitious for autonomous vehicles (AVs) development. As one of the key goals of AVs, pedestrian safety is an important issue in China. Despite the rapid development of driverless technologies in recent years, there is a lack of researches on the adaptability of AVs to pedestrians. To fill the gap, this study would discuss the adaptability of current driverless technologies to China urban pedestrians by reviewing the latest researches. The paper firstly analyzed typical Chinese pedestrian behaviors and summarized the safety demands of pedestrians for AVs through articles and open database data, which are worked as the evaluation criteria. Then, corresponding driverless technologies are carefully reviewed. Finally, the adaptability would be given combining the above analyses. Our review found that autonomous vehicles have trouble in the occluded pedestrian environment and Chinese pedestrians do not accept AVs well. And more explorations should be conducted on standard human machine interaction, interaction information overload avoidance, occluded pedestrians detection and nation based receptivity research. The conclusions are very useful for motor corporations and driverless car researchers to place more attention on the complexity of the Chinese pedestrian environment, for transportation experts to protect pedestrian safety in the context of AVs, and for governors to think about making new pedestrians policies to welcome the upcoming driverless cars."} {"_id": [96, 53], "label": "q-fin.PM q-fin.RM", "text": "Quant Bust 2020. We explain in a nontechnical fashion why dollar neutral quant trading strategies, such as equities Statistical Arbitrage, suffered substantial losses (drawdowns) during the COVID 19 market selloff. We discuss (i) why these strategies work during \"normal\" times (ii) the market regimes when they work best and (iii) their limitations and the reasons for why they \"break\" during extreme market events. An accompanying appendix (with a link to freely accessible source code) includes backtests for various strategies, which put flesh on and illustrate the discussion in the main text."} {"_id": [18, 29, 47], "label": "math.GT math.AT math.GR", "text": "Equivariant Morse theory on Vietoris Rips complexes universal spaces for proper actions. We formalize an equivariant version of Bestvina Brady discrete Morse theory, and apply it to Vietoris Rips complexes in order to exhibit finite universal spaces for proper actions for all asymptotically CAT(0) groups."} {"_id": [0, 1, 2, 19], "label": "cs.CR cs.AI cs.CV cs.LG", "text": "Backdoor Attacks on the DNN Interpretation System. Interpretability is crucial to understand the inner workings of deep neural networks (DNNs) and many interpretation methods generate saliency maps that highlight parts of the input image that contribute the most to the prediction made by the DNN. In this paper we design a backdoor attack that alters the saliency map produced by the network for an input image only with injected trigger that is invisible to the naked eye while maintaining the prediction accuracy. The attack relies on injecting poisoned data with a trigger into the training data set. The saliency maps are incorporated in the penalty term of the objective function that is used to train a deep model and its influence on model training is conditioned upon the presence of a trigger. We design two types of attacks targeted attack that enforces a specific modification of the saliency map and untargeted attack when the importance scores of the top pixels from the original saliency map are significantly reduced. We perform empirical evaluation of the proposed backdoor attacks on gradient based and gradient free interpretation methods for a variety of deep learning architectures. We show that our attacks constitute a serious security threat when deploying deep learning models developed by untrusty sources. Finally, in the Supplement we demonstrate that the proposed methodology can be used in an inverted setting, where the correct saliency map can be obtained only in the presence of a trigger (key), effectively making the interpretation system available only to selected users."} {"_id": [65], "label": "cs.NI", "text": "5G New Radio Unlicensed Challenges and Evaluation. To meet the high demand for mobile data, the Third Generation Partnership Project (3GPP) established a set of standards known as 5G New Radio (5G NR). The architecture of 5G NR includes a flexible radio access network and a core network. 3GPP has also been working on a new radio access technology, called 5G NR Unlicensed (5G NR U), which aims at extending 5G NR to unlicensed bands. In this paper, we give an overview of the most recent 5G NR U design elements and discuss potential concerns, including fair coexistence with other unlicensed technologies such as Wi Fi. We use simulations to study coexistence between Wi Fi and 5G NR U systems. Our evaluation indicates that NR U often achieves higher throughput and lower delay than Wi Fi (802.11ac). The two systems experience different buffer occupancies and spectrum utilization statistics. We also discuss the improvements that NR U offers over LTE Licensed Assisted Access (LTE LAA)."} {"_id": [65, 19], "label": "cs.CR cs.NI", "text": "Robin A Web Security Tool. Thanks to the advance of technology, all kinds of applications are becoming more complete and capable of performing complex tasks that save much of our time. But to perform these tasks, applications require that some personal information are shared, for example credit card, bank accounts, email addresses, etc. All these data must be transferred securely between the final user and the institution application. Nonetheless, several applications might contain residual flaws that may be explored by criminals in order to steal users data. Hence, to help information security professionals and developers to perform penetration tests (pentests) on web applications, this paper presents Robin A Web Security Tool. The tool is also applied to a real case study in which a very dangerous vulnerability was found. This vulnerability is also described in this paper."} {"_id": [56, 62], "label": "cs.GT cs.LO", "text": "Qualitative Multi Objective Reachability for Ordered Branching MDPs. We study qualitative multi objective reachability problems for Ordered Branching Markov Decision Processes (OBMDPs), or equivalently context free MDPs, building on prior results for single target reachability on Branching Markov Decision Processes (BMDPs). We provide two separate algorithms for \"almost sure\" and \"limit sure\" multi target reachability for OBMDPs. Specifically, given an OBMDP, mathcal A , given a starting non terminal, and given a set of target non terminals K of size k K , our first algorithm decides whether the supremum probability, of generating a tree that contains every target non terminal in set K , is 1 . Our second algorithm decides whether there is a strategy for the player to almost surely (with probability 1 ) generate a tree that contains every target non terminal in set K . The two separate algorithms are needed we show that indeed, in this context, \"almost sure\" not \"limit sure\" for multi target reachability, meaning that there are OBMDPs for which the player may not have any strategy to achieve probability exactly 1 of reaching all targets in set K in the same generated tree, but may have a sequence of strategies that achieve probability arbitrarily close to 1 . Both algorithms run in time 2 O(k) cdot mathcal A O(1) , where mathcal A is the total bit encoding length of the given OBMDP, mathcal A . Hence they run in polynomial time when k is fixed, and are fixed parameter tractable with respect to k . Moreover, we show that even the qualitative almost sure (and limit sure) multi target reachability decision problem is in general NP hard, when the size k of the set K of target non terminals is not fixed."} {"_id": [40, 1, 3], "label": "cs.IR cs.CL cs.LG", "text": "Separate and Attend in Personal Email Search. In personal email search, user queries often impose different requirements on different aspects of the retrieved emails. For example, the query \"my recent flight to the US\" requires emails to be ranked based on both textual contents and recency of the email documents, while other queries such as \"medical history\" do not impose any constraints on the recency of the email. Recent deep learning to rank models for personal email search often directly concatenate dense numerical features (e.g., document age) with embedded sparse features (e.g., n gram embeddings). In this paper, we first show with a set of experiments on synthetic datasets that direct concatenation of dense and sparse features does not lead to the optimal search performance of deep neural ranking models. To effectively incorporate both sparse and dense email features into personal email search ranking, we propose a novel neural model, SepAttn. SepAttn first builds two separate neural models to learn from sparse and dense features respectively, and then applies an attention mechanism at the prediction level to derive the final prediction from these two models. We conduct a comprehensive set of experiments on a large scale email search dataset, and demonstrate that our SepAttn model consistently improves the search quality over the baseline models."} {"_id": [29], "label": "math.GR", "text": "The compression semigroup of the dual Vinberg cone. We investigate the semigroup associated to the dual Vinberg cone and prove its triple and Ol'shanski u i polar decompositions. Moreover, we show that the semigroup does not have the contraction property with respect to the canonical Riemannian metric on the cone."} {"_id": [38], "label": "math.NT", "text": "A generalization of the 3d distance theorem. Let P be a positive rational number. Call a function f mathbb R rightarrow mathbb R to have textit finite gaps property mod P if the following holds for any positive irrational alpha and positive integer M , when the values of f(m alpha) , 1 leq m leq M , are inserted mod P into the interval 0,P) and arranged in increasing order, the number of distinct gaps between successive terms is bounded by a constant k f which depends only on f . In this note, we prove a generalization of the 3d distance theorem of Chung and Graham. As a consequence, we show that a piecewise linear map with rational slopes and having only finitely many non differentiable points has finite gaps property mod P . We also show that if f is distance to the nearest integer function, then it has finite gaps property mod 1 with k f leq6 ."} {"_id": [22], "label": "cs.SE", "text": "A Framework and DataSet for Bugs in Ethereum Smart Contracts. Ethereum is the largest blockchain platform that supports smart contracts. Users deploy smart contracts by publishing the smart contract's bytecode to the blockchain. Since the data in the blockchain cannot be modified, even if these contracts contain bugs, it is not possible to patch deployed smart contracts with code updates. Moreover, there is currently neither a comprehensive classification framework for Ethereum smart contract bugs, nor detailed criteria for detecting bugs in smart contracts, making it difficult for developers to fully understand the negative effects of bugs and design new approaches to detect bugs. In this paper, to fill the gap, we first collect as many smart contract bugs as possible from multiple sources and divide these bugs into 9 categories by extending the IEEE Standard Classification for Software Anomalies. Then, we design the criteria for detecting each kind of bugs, and construct a dataset of smart contracts covering all kinds of bugs. With our framework and dataset, developers can learn smart contract bugs and develop new tools to detect and locate bugs in smart contracts. Moreover, we evaluate the state of the art tools for smart contract analysis with our dataset and obtain some interesting findings 1) Mythril, Slither and Remix are the most worthwhile combination of analysis tools. 2) There are still 10 kinds of bugs that cannot be detected by any analysis tool."} {"_id": [65], "label": "cs.NI", "text": "A Performance Perspective on Web Optimized Protocol Stacks TCP TLS HTTP 2 vs. QUIC. Existing performance comparisons of QUIC and TCP compared an optimized QUIC to an unoptimized TCP stack. By neglecting available TCP improvements inherently included in QUIC, comparisons do not shed light on the performance of current web stacks. In this paper, we can show that tuning TCP parameters is not negligible and directly yields significant improvements. Nevertheless, QUIC still outperforms even our tuned variant of TCP. This performance advantage is mostly caused by QUIC's reduced RTT design during connection establishment, and, in case of lossy networks due to its ability to circumvent head of line blocking."} {"_id": [72], "label": "cs.PF", "text": "Performance benefits of Intel(R) OptaneTM DC persistent memory for the parallel processing of large neuroimaging data. Open access neuroimaging datasets have reached petabyte scale, and continue to grow. The ability to leverage the entirety of these datasets is limited to a restricted number of labs with both the capacity and infrastructure to process the data. Whereas Big Data engines have significantly reduced application performance penalties with respect to data movement, their applied strategies (e.g. data locality, in memory computing and lazy evaluation) are not necessarily practical within neuroimaging workflows where intermediary results may need to be materialized to shared storage for post processing analysis. In this paper we evaluate the performance advantage brought by Intel(R) OptaneTM DC persistent memory for the processing of large neuroimaging datasets using the two available configurations modes Memory mode and App Direct mode. We employ a synthetic algorithm on the 76 GiB and 603 GiB BigBrain, as well as apply a standard neuroimaging application on the Consortium for Reliability and Reproducibility (CoRR) dataset using 25 and 96 parallel processes in both cases. Our results show that the performance of applications leveraging persistent memory is superior to that of other storage devices,with the exception of DRAM. This is the case in both Memory and App Direct mode and irrespective of the amount of data and parallelism. Furthermore, persistent memory in App Direct mode is believed to benefit from the use of DRAM as a cache for writing when output data is significantly smaller than available memory. We believe the use of persistent memory will be beneficial to both neuroimaging applications running on HPC or visualization of large, high resolution images."} {"_id": [17, 1, 15], "label": "cs.DC cs.IT cs.LG math.IT", "text": "Train Where the Data is A Case for Bandwidth Efficient Coded Training. Training a machine learning model is both compute and data intensive. Most of the model training is performed on high performance compute nodes and the training data is stored near these nodes for faster training. But there is a growing interest in enabling training near the data. For instance, mobile devices are rich sources of training data. It may not be feasible to consolidate the data from mobile devices into a cloud service, due to bandwidth and data privacy reasons. Training at mobile devices is however fraught with challenges. First mobile devices may join or leave the distributed setting, either voluntarily or due to environmental uncertainties, such as lack of power. Tolerating uncertainties is critical to the success of distributed mobile training. One proactive approach to tolerate computational uncertainty is to store data in a coded format and perform training on coded data. Encoding data is a challenging task since erasure codes require multiple devices to exchange their data to create a coded data partition, which places a significant bandwidth constraint. Furthermore, coded computing traditionally relied on a central node to encode and distribute data to all the worker nodes, which is not practical in a distributed mobile setting. In this paper, we tackle the uncertainty in distributed mobile training using a bandwidth efficient encoding strategy. We use a Random Linear Network coding (RLNC) which reduces the need to exchange data partitions across all participating mobile devices, while at the same time preserving the property of coded computing to tolerate uncertainties. We implement gradient descent for logistic regression and SVM to evaluate the effectiveness of our mobile training framework. We demonstrate a 50 reduction in total required communication bandwidth compared to MDS coded computation, one of the popular erasure codes."} {"_id": [46], "label": "math.AG", "text": "On the uniform K stability for some asymptotically log del Pezzo surfaces. Motivated by the problem for the existence of K \"ahler Einstein edge metrics, Cheltsov and Rubinstein conjectured the K polystability of asymptotically log Fano varieties with small cone angles when the anti log canonical divisors are not big. Cheltsov, Rubinstein and Zhang proved it affirmatively in dimension 2 with irreducible boundaries except for the type ( operatorname I.9B. n) with 1 leq n leq 6 . Unfortunately, recently, Fujita, Liu, S \"u ss, Zhang and Zhuang showed the non K polystability for some members of type ( operatorname I.9B. 1) and for some members of type ( operatorname I.9B. 2) . In this article, we show that Cheltsov Rubinstein's problem is true for all of the remaining cases. More precisely, we explicitly compute the delta invariant for asymptotically log del Pezzo surfaces of type ( operatorname I.9B. n) for all n geq 1 with small cone angles. As a consequence, we finish Cheltsov Rubinstein's problem in dimension 2 with irreducible boundaries."} {"_id": [37, 22], "label": "cs.SE cs.FL", "text": "A Language and Methodology based on Scenarios, Grammars and Views, for Administrative Business Processes Modelling. In Business Process Management (BPM), process modelling has been solved in various ways. However, there are no commonly accepted modelling tools (languages). Some of them are criticized for their inability to capture both the lifecycle, informational and organizational models of processes. For some others, process modelling is generally done using a single graph this does not facilitate modularity, maintenance and scalability. In addition, some of these languages are very general hence, their application to specific domain processes (such as administrative processes) is very complex. In this paper, we present a new language and a new methodology, dedicated to administrative process modelling. This language is based on a variant of attributed grammars and is able to capture the lifecycle, informational and organizational models of such processes. Also, it proposes a simple graphical formalism allowing to model each process's execution scenario as an annotated tree (modularity). In the new language, a particular emphasis is put on modelling (using \"views\") the perceptions that actors have on processes and their data."} {"_id": [11], "label": "physics.app-ph", "text": "Controllable Enhancements of Wi Fi Signals at Desired Locations Without Extra Energy Using Programmable Metasurface. We present for the first time an experimental demonstration on the energy allocation of commodity Wi Fi signals in a programmable and inexpensive way. To that end, we design an electronically programmable phase binary coding metasurface, working at the 2.4GHz Wi Fi frequency band, to manipulate dynamically and arbitrarily the spatial distribution of commodity Wi Fi signals. Meanwhile, an efficient algorithm is developed to find the optimal coding sequence of the programmable metasurface such that the spatial energy of commodity Wi Fi signals can be instantly controlled in a desirable way. Selected experimental results based on an IEEE 802.11n commercial Wi Fi protocol have been provided to demonstrate the performance of the developed proof of concept system in enhancing the commodity Wi Fi signals dynamically and arbitrarily. It could be expected that the proposed strategy will pave a promising way for wireless communications, future smart home, and so on."} {"_id": [14], "label": "cs.HC", "text": "Proceedings of the CHI 2019 Workshop on New Directions for the IoT Automate, Share, Build, and Care. This volume represents the proceedings of the CHI 2019 Workshop on New Directions for the IoT Automate, Share, Build, and Care."} {"_id": [49], "label": "math.OC", "text": "Model Based Event Triggered Control over Lossy Networks. The event triggered control problem over lossy communication networks is addressed in this paper. Although packet dropouts have been considered in the implementation of event triggered controllers, the assumption of protocols that employ acknowledgement messages persists. This paper provides an approach that relaxes such assumption. An event based controller is implemented at the sensor node of the networked and uncertain system and it transmits feedback measurements to the controller node at asynchronous time instants. The transmitted packets of information are subject to dropouts by the lossy network. We show that the uncertain system can be asymptotically stabilized, that a positive minimum inter event time exists, and that the proposed approach does not require acknowledgement messages."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Gastric histopathology image segmentation using a hierarchical conditional random field. For the Convolutional Neural Networks (CNNs) applied in the intelligent diagnosis of gastric cancer, existing methods mostly focus on individual characteristics or network frameworks without a policy to depict the integral information. Mainly, Conditional Random Field (CRF), an efficient and stable algorithm for analyzing images containing complicated contents, can characterize spatial relation in images. In this paper, a novel Hierarchical Conditional Random Field (HCRF) based Gastric Histopathology Image Segmentation (GHIS) method is proposed, which can automatically localize abnormal (cancer) regions in gastric histopathology images obtained by an optical microscope to assist histopathologists in medical work. This HCRF model is built up with higher order potentials, including pixel level and patch level potentials, and graph based post processing is applied to further improve its segmentation performance. Especially, a CNN is trained to build up the pixel level potentials and another three CNNs are fine tuned to build up the patch level potentials for sufficient spatial segmentation information. In the experiment, a hematoxylin and eosin (H E) stained gastric histopathological dataset with 560 abnormal images are divided into training, validation and test sets with a ratio of 1 1 2. Finally, segmentation accuracy, recall and specificity of 78.91 , 65.59 , and 81.33 are achieved on the test set. Our HCRF model demonstrates high segmentation performance and shows its effectiveness and future potential in the GHIS field."} {"_id": [0], "label": "cs.CV", "text": "ColorMapGAN Unsupervised Domain Adaptation for Semantic Segmentation Using Color Mapping Generative Adversarial Networks. Due to the various reasons such as atmospheric effects and differences in acquisition, it is often the case that there exists a large difference between spectral bands of satellite images collected from different geographic locations. The large shift between spectral distributions of training and test data causes the current state of the art supervised learning approaches to output unsatisfactory maps. We present a novel semantic segmentation framework that is robust to such shift. The key component of the proposed framework is Color Mapping Generative Adversarial Networks (ColorMapGAN), which can generate fake training images that are semantically exactly the same as training images, but whose spectral distribution is similar to the distribution of the test images. We then use the fake images and the ground truth for the training images to fine tune the already trained classifier. Contrary to the existing Generative Adversarial Networks (GANs), the generator in ColorMapGAN does not have any convolutional or pooling layers. It learns to transform the colors of the training data to the colors of the test data by performing only one element wise matrix multiplication and one matrix addition operations. Thanks to the architecturally simple but powerful design of ColorMapGAN, the proposed framework outperforms the existing approaches with a large margin in terms of both accuracy and computational complexity."} {"_id": [34, 13], "label": "math.DS math.CV", "text": "Stable manifolds of biholomorphisms in mathbb C n asymptotic to formal curves. Given a germ of biholomorphism F in mathrm Diff ( mathbb C n,0) with a formal invariant curve Gamma such that the multiplier of the restricted formal diffeomorphism F Gamma is a root of unity or satisfies (F Gamma)'(0) 1 , we prove that either Gamma is contained in the set of periodic points of F or there exists a finite family of stable manifolds of F where all the orbits are asymptotic to Gamma and whose union eventually contains every orbit asymptotic to Gamma . This result generalizes to the case where Gamma is a formal periodic curve."} {"_id": [41, 2], "label": "cs.RO cs.AI", "text": "Sample efficient Reinforcement Learning in Robotic Table Tennis. Reinforcement learning (RL) has achieved some impressive recent successes in various computer games and simulations. Most of these successes are based on having large numbers of episodes from which the agent can learn. In typical robotic applications, however, the number of feasible attempts is very limited. In this paper we present a sample efficient RL algorithm applied to the example of a table tennis robot. In table tennis every stroke is different, with varying placement, speed and spin. An accurate return therefore has to be found depending on a high dimensional continuous state space. To make learning in few trials possible the method is embedded into our robot system. In this way we can use a one step environment. The state space depends on the ball at hitting time (position, velocity, spin) and the action is the racket state (orientation, velocity) at hitting. An actor critic based deterministic policy gradient algorithm was developed for accelerated learning. Our approach performs competitively both in a simulation and on the real robot in a number of challenging scenarios. Accurate results are obtained without pre training in under 200 episodes of training. The video presenting our experiments is available at https youtu.be uRAtdoL6Wpw."} {"_id": [2], "label": "cs.AI", "text": "Learning Compositional Neural Programs for Continuous Control. We propose a novel solution to challenging sparse reward, continuous control problems that require hierarchical planning at multiple levels of abstraction. Our solution, dubbed AlphaNPI X, involves three separate stages of learning. First, we use off policy reinforcement learning algorithms with experience replay to learn a set of atomic goal conditioned policies, which can be easily repurposed for many tasks. Second, we learn self models describing the effect of the atomic policies on the environment. Third, the self models are harnessed to learn recursive compositional programs with multiple levels of abstraction. The key insight is that the self models enable planning by imagination, obviating the need for interaction with the world when learning higher level compositional programs. To accomplish the third stage of learning, we extend the AlphaNPI algorithm, which applies AlphaZero to learn recursive neural programmer interpreters. We empirically show that AlphaNPI X can effectively learn to tackle challenging sparse manipulation tasks, such as stacking multiple blocks, where powerful model free baselines fail."} {"_id": [35], "label": "math.RA", "text": "When mutually subisomorphic Baer modules are isomorphic. The Schr \" o der Bernstein Theorem for sets is well known. The question of whether two subisomorphic algebraic structures are isomorphic to each other, is of interest. An R module M is said to satisfy the Schr \" o der Bernstein (or SB) property if any pair of direct summands of M are isomorphic provided that each one is isomorphic to a direct summand of the other. A ring R (with an involution star ) is called a Baer (Baer star )ring if the right annihilator of every nonempty subset of R is generated by an idempotent (a projection). It is clear that every Baer star ring is a Baer ring. Kaplansky showed that Baer star rings satisfy the SB property. This motivated us to investigate whether any Baer ring satisfies the SB property. In this paper we carry out a study of this question and investigate when two subisomorphic Baer modules are isomorphic. Besides, we study extending modules which satisfy the SB property. We characterize a commutative domain R over which any pair of subisomorphic extending modules are isomorphic."} {"_id": [46], "label": "math.AG", "text": "Bounds on the Dimension of the Brill Noether Schemes of Rank Two Bundles. The aim of this note is to find upper bounds on the dimension of Brill Noether locus' inside the moduli space of rank two vector bundles on a smooth algebraic curve. We deduce some consequences of these bounds."} {"_id": [47], "label": "math.AT", "text": "On gauge groups over high dimensional manifolds and self equivalences of H spaces. Let Y be a pointed space and let mathcal E(Y r) be the group of based self equivalences of Y r , r geq 2 . For Y a homotopy commutative H group we construct a subgroup mathcal E mathrm Mat (Y r) of mathcal E(Y r) which has a group structure isomorphic to either GL r( mathbb Z) , or GL r( mathbb Z d) , d geq 2 . We classify principal bundles over connected sums of q sphere bundles over n spheres and use the group mathcal E mathrm Mat (Y r) to obtain homotopy decompositions of their gauge groups. Using these decompositions we give an integral classification, up to homotopy, of the gauge groups of principal SU(2) bundles over certain 2 connected 7 manifolds with torsion free homology."} {"_id": [14], "label": "cs.HC", "text": "Creativity on Paid Crowdsourcing Platforms. General purpose crowdsourcing platforms are increasingly being harnessed for creative work. The platforms' potential for creative work is clearly identified, but the workers' perspectives on such work have not been extensively documented. In this paper, we uncover what the workers have to say about creative work on paid crowdsourcing platforms. Through a quantitative and qualitative analysis of a questionnaire launched on two different crowdsourcing platforms, our results revealed clear differences between the workers on the platforms in both preferences and prior experience with creative work. We identify common pitfalls with creative work on crowdsourcing platforms, provide recommendations for requesters of creative work, and discuss the meaning of our findings within the broader scope of creativity oriented research. To the best of our knowledge, we contribute the first extensive worker oriented study of creative work on paid crowdsourcing platforms."} {"_id": [67], "label": "physics.atom-ph", "text": "Suppression of Three Body Loss Near a p Wave Resonance Due to Quasi 1D Confinement. We investigate the three body recombination rate of a Fermi gas of 6 Li atoms confined in quasi 1D near a p wave Feshbach resonance. We confirm that the quasi 1D loss rate constant K 3 follows the predicted threshold scaling law that K 3 is energy independent on resonance, and find consistency with the scaling law K 3 propto (k , a 1D ) 6 far from resonance Mehta et al. Phys. Rev. A 76, 022711 (2007) . Further we develop a theory based on Breit Wigner analysis that describes the loss feature for intermediate fields. Lastly we measure how the loss rate constant scales with transverse confinement and find that K 3 propto V L 1 , where V L is the lattice depth. Importantly, at our attainable transverse confinements and temperatures, we see a 74 fold suppression of the on resonant three body loss rate constant in quasi 1D compared to 3D. With significant further enhancement of the transverse confinement, this suppression may pave the way for realizing stable p wave superfluids."} {"_id": [21], "label": "math.CO", "text": "Palindromic length sequence of the ruler sequence and of the period doubling sequence. In this article, we study the palindromic length sequences of the ruler sequence and of the period doubling sequence. We give a precise formula of the palindromic length sequence of the first one and find a lower bound of the limit superior of the palindromic length sequence of the last one."} {"_id": [81, 17], "label": "cs.MS cs.DC", "text": "A parallel structured divide and conquer algorithm for symmetric tridiagonal eigenvalue problems. In this paper, a parallel structured divide and conquer (PSDC) eigensolver is proposed for symmetric tridiagonal matrices based on ScaLAPACK and a parallel structured matrix multiplication algorithm, called PSMMA. Computing the eigenvectors via matrix matrix multiplications is the most computationally expensive part of the divide and conquer algorithm, and one of the matrices involved in such multiplications is a rank structured Cauchy like matrix. By exploiting this particular property, PSMMA constructs the local matrices by using generators of Cauchy like matrices without any communication, and further reduces the computation costs by using a structured low rank approximation algorithm. Thus, both the communication and computation costs are reduced. Experimental results show that both PSMMA and PSDC are highly scalable and scale to 4096 processes at least. PSDC has better scalability than PHDC that was proposed in J. Comput. Appl. Math. 344 (2018) 512 520 and only scaled to 300 processes for the same matrices. Comparing with texttt PDSTEDC in ScaLAPACK, PSDC is always faster and achieves 1.4 x 1.6 x speedup for some matrices with few deflations. PSDC is also comparable with ELPA, with PSDC being faster than ELPA when using few processes and a little slower when using many processes."} {"_id": [50], "label": "physics.med-ph", "text": "Internal Dosimetry Assessment for Drinking the Groundwater of the Disi Aquifer. The quest for a better understanding of the cancer risk associated with drinking the radium contaminated groundwater of the Disi Aquifer in Jordan has become more urgent in recent years. To quantitively identify the health consequences attainable from the consumption of this groundwater source, internal dosimetry analysis was performed with emphasis on doses deliverable to bone surfaces. Moreover, the age dependent dose calculations performed in this study show that the most critical group is those who are below the age of 15, where we predict an increase in the risk of cancer by up to a factor of 5 as compared to adults. It is also demonstrated that radium radioactivity remains relatively constant in the bone even 10 years after ingestion. The whole body dose analysis concluded that it is a factor of 5 higher than what the WHO recommends as a limit."} {"_id": [0], "label": "cs.CV", "text": "Practical No box Adversarial Attacks against DNNs. The study of adversarial vulnerabilities of deep neural networks (DNNs) has progressed rapidly. Existing attacks require either internal access (to the architecture, parameters, or training set of the victim model) or external access (to query the model). However, both the access may be infeasible or expensive in many scenarios. We investigate no box adversarial examples, where the attacker can neither access the model information or the training set nor query the model. Instead, the attacker can only gather a small number of examples from the same problem domain as that of the victim model. Such a stronger threat model greatly expands the applicability of adversarial attacks. We propose three mechanisms for training with a very small dataset (on the order of tens of examples) and find that prototypical reconstruction is the most effective. Our experiments show that adversarial examples crafted on prototypical auto encoding models transfer well to a variety of image classification and face verification models. On a commercial celebrity recognition system held by clarifai.com, our approach significantly diminishes the average prediction accuracy of the system to only 15.40 , which is on par with the attack that transfers adversarial examples from a pre trained Arcface model."} {"_id": [1, 2], "label": "cs.AI cs.LG", "text": "Can ML predict the solution value for a difficult combinatorial problem?. We look at whether machine learning can predict the final objective function value of a difficult combinatorial optimisation problem from the input. Our context is the pattern reduction problem, one industrially important but difficult aspect of the cutting stock problem. Machine learning appears to have higher prediction accuracy than a na \"ive model, reducing mean absolute percentage error (MAPE) from 12.0 to 8.7 ."} {"_id": [0], "label": "cs.CV", "text": "Accurate Object Association and Pose Updating for Semantic SLAM. Current pandemic has caused the medical system to operate under high load. To relieve it, robots with high autonomy can be used to effectively execute contactless operations in hospitals and reduce cross infection between medical staff and patients. Although semantic Simultaneous Localization and Mapping (SLAM) technology can improve the autonomy of robots, semantic object association is still a problem that is worthy of being studied. The key to solving this problem is to correctly associate multiple object measurements of one object landmark by using semantic information, and to refine the pose of object landmark in real time. To this end, we propose a hierarchical object association strategy and a pose refinement approach. The former one consists of two levels, i.e., a short term object association and a global one. In the first level, we employ the multiple object tracking for short term object association, through which the incorrect association among objects whose locations are close and appearances are similar can be avoided. Moreover, the short term object association can provide more abundant object appearance and more robust estimation of object pose for the global object association in the second level. To refine the object pose in the map, we develop an approach to choose the optimal object pose from all object measurements associated with an object landmark. The proposed method is comprehensively evaluated on seven simulated hospital sequences1, a real hospital environment and the KITTI dataset. Experimental results show that our method has an obviously improvement in terms of robustness and accuracy for the object association and the trajectory estimation in the semantic SLAM."} {"_id": [13], "label": "math.DS", "text": "Alsed a Misiurewicz systems with place dependent probabilities. We consider systems of two specific piecewise linear homeomorphisms of the unit interval, so called the Alsed a Misiurewicz systems, and investigate the basic properties of Markov chains which arise when these two transformations are applied randomly with probabilities depending on the point of the interval. Though this iterated function system is not contracting in average and known methods do not apply, stability and the strong law of large numbers are proven."} {"_id": [34, 42], "label": "math.CV math.DG", "text": "A foliation of the ball by complete holomorphic discs. We show that the open unit ball mathbb B n of mathbb C n (n 1) admits a nonsingular holomorphic foliation by complete properly embedded holomorphic discs."} {"_id": [21], "label": "math.CO", "text": "Lattice polytopes from Schur and symmetric Grothendieck polynomials. Given a family of lattice polytopes, two common questions in Ehrhart Theory are determining when a polytope has the integer decomposition property and determining when a polytope is reflexive. While these properties are of independent interest, the confluence of these properties is a source of active investigation due to conjectures regarding the unimodality of the h ast polynomial. In this paper, we consider the Newton polytopes arising from two families of polynomials in algebraic combinatorics Schur polynomials and inflated symmetric Grothendieck polynomials. In both cases, we prove that these polytopes have the integer decomposition property by using the fact that both families of polynomials have saturated Newton polytope. Furthermore, in both cases, we provide a complete characterization of when these polytopes are reflexive. We conclude with some explicit formulas and unimodality implications of the h ast vector in the case of Schur polynomials."} {"_id": [49, 20], "label": "math.OC cs.NA math.NA", "text": "Low Rank plus Sparse Decomposition of Covariance Matrices using Neural Network Parametrization. This paper revisits the problem of decomposing a positive semidefinite matrix as a sum of a matrix with a given rank plus a sparse matrix. An immediate application can be found in portfolio optimization, when the matrix to be decomposed is the covariance between the different assets in the portfolio. Our approach consists in representing the low rank part of the solution as the product MM T , where M is a rectangular matrix of appropriate size, parametrized by the coefficients of a deep neural network. We then use a gradient descent algorithm to minimize an appropriate loss function over the parameters of the network. We deduce its convergence rate to a local optimum from the Lipschitz smoothness of our loss function. We show that the rate of convergence grows polynomially in the dimensions of the input, output, and the size of each of the hidden layers."} {"_id": [68, 38], "label": "math.NT cs.DM", "text": "Enumeration of irreducible and extended irreducible Goppa codes. We obtain upper bounds on the number of irreducible and extended irreducible Goppa codes over GF(p) of length q and q 1 , respectively defined by polynomials of degree r , where q p t and r geq 3 is a positive integer."} {"_id": [2, 52], "label": "cs.MA cs.AI", "text": "Arena A General Evaluation Platform and Building Toolkit for Multi Agent Intelligence. Learning agents that are not only capable of taking tests, but also innovating is becoming a hot topic in AI. One of the most promising paths towards this vision is multi agent learning, where agents act as the environment for each other, and improving each agent means proposing new problems for others. However, existing evaluation platforms are either not compatible with multi agent settings, or limited to a specific game. That is, there is not yet a general evaluation platform for research on multi agent intelligence. To this end, we introduce Arena, a general evaluation platform for multi agent intelligence with 35 games of diverse logics and representations. Furthermore, multi agent intelligence is still at the stage where many problems remain unexplored. Therefore, we provide a building toolkit for researchers to easily invent and build novel multi agent problems from the provided game set based on a GUI configurable social tree and five basic multi agent reward schemes. Finally, we provide Python implementations of five state of the art deep multi agent reinforcement learning baselines. Along with the baseline implementations, we release a set of 100 best agents teams that we can train with different training schemes for each game, as the base for evaluating agents with population performance. As such, the research community can perform comparisons under a stable and uniform standard. All the implementations and accompanied tutorials have been open sourced for the community at https sites.google.com view arena unity ."} {"_id": [7], "label": "physics.comp-ph", "text": "Generalized lattice Boltzmann method Modeling, analysis, and elements. In this paper, we first present a unified framework for the modelling of generalized lattice Boltzmann method (GLBM). We then conduct a comparison of the four popular analysis methods (Chapman Enskog analysis, Maxwell iteration, direct Taylor expansion and recurrence equations approaches) that have been used to obtain the macroscopic Navier Stokes equations and nonlinear convection diffusion equations from the GLBM, and show that from mathematical point of view, these four analysis methods are equivalent to each other. Finally, we give some elements that are needed in the implementation of the GLBM, and also find that some available LB models can be obtained from this GLBM."} {"_id": [9], "label": "math.AP", "text": "Non uniform dependence for Euler equations in Besov spaces. We prove the non uniform continuity of the data to solution map of the incompressible Euler equations in Besov spaces B p,q s , where the parameters p, q and s considered here are such that the local existence and uniqueness result holds."} {"_id": [2], "label": "cs.AI", "text": "Scaling up Hybrid Probabilistic Inference with Logical and Arithmetic Constraints via Message Passing. Weighted model integration (WMI) is a very appealing framework for probabilistic inference it allows to express the complex dependencies of real world problems where variables are both continuous and discrete, via the language of Satisfiability Modulo Theories (SMT), as well as to compute probabilistic queries with complex logical and arithmetic constraints. Yet, existing WMI solvers are not ready to scale to these problems. They either ignore the intrinsic dependency structure of the problem at all, or they are limited to too restrictive structures. To narrow this gap, we derive a factorized formalism of WMI enabling us to devise a scalable WMI solver based on message passing, MP WMI. Namely, MP WMI is the first WMI solver which allows to 1) perform exact inference on the full class of tree structured WMI problems 2) compute all marginal densities in linear time 3) amortize inference inter query. Experimental results show that our solver dramatically outperforms the existing WMI solvers on a large set of benchmarks."} {"_id": [20, 6], "label": "math.NA cs.NA physics.flu-dyn", "text": "A staggered grid multilevel incomplete LU for steady incompressible flows. Algorithms for studying transitions and instabilities in incompressible flows typically require the solution of linear systems with the full Jacobian matrix. Other popular approaches, like gradient based design optimization and fully implicit time integration, also require very robust solvers for this type of linear system. We present a parallel fully coupled multilevel incomplete factorization preconditioner for the 3D stationary incompressible Navier Stokes equations on a structured grid. The algorithm and software are based on the robust two level method developed by Wubs and Thies. In this paper, we identify some of the weak spots of the two level scheme and propose remedies such as a different domain partitioning and recursive application of the method. We apply the method to the well known 3D lid driven cavity benchmark problem, and demonstrate its superior robustness by comparing with a segregated SIMPLE type preconditioner."} {"_id": [9, 42], "label": "math.DG math.AP", "text": "Blow up profile for spinorial Yamabe type equation on S m . Motivated by recent progress on a spinorial analogue of the Yamabe problem in the geometric literature, we study a conformally invariant spinor field equation on the m sphere, m geq2 . Via variational methods, we study analytic aspects of the associated energy functional, culminating in a blow up analysis."} {"_id": [41], "label": "cs.RO", "text": "Bio mimetic Adaptive Force Position Control Using Fractal Impedance. The ability of animals to interact with complex dynamics is unmatched in robots. Especially important to the interaction performances is the online adaptation of body dynamics, which can be modeled as an impedance behaviour. However, the variable impedance controller still possesses a challenge in the current control frameworks due to the difficulties of retaining stability when adapting the controller gains. The fractal impedance controller has been recently proposed to solve this issue. However, it still has limitations such as sudden jumps in force when it starts to converge to the desired position and the lack of a force feedback loop. In this manuscript, two improvements are made to the control framework to solve these limitations. The force discontinuity has been addressed introducing a modulation of the impedance via a virtual antagonist that modulates the output force. The force tracking has been modeled after the parallel force position controller architecture. In contrast to traditional methods, the fractal impedance controller enables the implementation of a search algorithm on the force feedback to adapt its behaviour on the external environment instead of on relying on textit a priori knowledge of the external dynamics. Preliminary simulation results presented in this paper show the feasibility of the proposed approach, and it allows to evaluate the trade off that needs to be made when relying on the proposed controller for interaction. In conclusion, the proposed method mimics the behaviour of an agonist antagonist system adapting to unknown external dynamics, and it may find application in computational neuroscience, haptics, and interaction control."} {"_id": [1, 3, 4], "label": "cs.NE cs.CL cs.LG", "text": "Understanding LSTM a tutorial into Long Short Term Memory Recurrent Neural Networks. Long Short Term Memory Recurrent Neural Networks (LSTM RNN) are one of the most powerful dynamic classifiers publicly known. The network itself and the related learning algorithms are reasonably well documented to get an idea how it works. This paper will shed more light into understanding how LSTM RNNs evolved and why they work impressively well, focusing on the early, ground breaking publications. We significantly improved documentation and fixed a number of errors and inconsistencies that accumulated in previous publications. To support understanding we as well revised and unified the notation used."} {"_id": [9], "label": "math.AP", "text": "Uniqueness of solution for a nonlinear heterogeneous evolution dam problem. By choosing convenient test functions and using the method of doubling variables, we prove the uniqueness of the solution to a nonlinear evolution dam problem in an arbitrary heterogeneous porous medium of IR n with an impermeable horizontal bottom."} {"_id": [41], "label": "cs.RO", "text": "Dynamical System Segmentation for Information Measures in Motion. Motions carry information about the underlying task being executed. Previous work in human motion analysis suggests that complex motions may result from the composition of fundamental submovements called movemes. The existence of finite structure in motion motivates information theoretic approaches to motion analysis and robotic assistance. We define task embodiment as the amount of task information encoded in an agent's motions. By decoding task specific information embedded in motion, we can use task embodiment to create detailed performance assessments. We extract an alphabet of behaviors comprising a motion without textit a priori knowledge using a novel algorithm, which we call dynamical system segmentation. For a given task, we specify an optimal agent, and compute an alphabet of behaviors representative of the task. We identify these behaviors in data from agent executions, and compare their relative frequencies against that of the optimal agent using the Kullback Leibler divergence. We validate this approach using a dataset of human subjects (n 53) performing a dynamic task, and under this measure find that individuals receiving assistance better embody the task. Moreover, we find that task embodiment is a better predictor of assistance than integrated mean squared error."} {"_id": [52], "label": "cs.MA", "text": "Electing the Executive Branch. The executive branch, or government, is typically not elected directly by the people, but rather formed by another elected body or person such as the parliament or the president. As a result, its members are not directly accountable to the people, individually or as a group. We consider a scenario in which the members of the government are elected directly by the people, and wish to achieve proportionality while doing so. We propose a formal model consisting of k offices, each with its own disjoint set of candidates, and a set of voters who provide approval ballots for all offices. We wish to identify good aggregation rules that assign one candidate to each office. As using a simple majority vote for each office independently might result in disregarding minority preferences altogether, here we consider an adaptation of the greedy variant of Proportional Approval Voting (GreedyPAV) to our setting, and demonstrate through computer based simulations how voting for all offices together using this rule overcomes this weakness. We note that the approach is applicable also to a party that employs direct democracy, where party members elect the party's representatives in a coalition government."} {"_id": [1, 15], "label": "cs.LG cs.IT math.IT", "text": "HpGAN Sequence Search with Generative Adversarial Networks. Sequences play an important role in many engineering applications and systems. Searching sequences with desired properties has long been an interesting but also challenging research topic. This article proposes a novel method, called HpGAN, to search desired sequences algorithmically using generative adversarial networks (GAN). HpGAN is based on the idea of zero sum game to train a generative model, which can generate sequences with characteristics similar to the training sequences. In HpGAN, we design the Hopfield network as an encoder to avoid the limitations of GAN in generating discrete data. Compared with traditional sequence construction by algebraic tools, HpGAN is particularly suitable for intractable problems with complex objectives which prevent mathematical analysis. We demonstrate the search capabilities of HpGAN in two applications 1) HpGAN successfully found many different mutually orthogonal complementary code sets (MOCCS) and optimal odd length Z complementary pairs (OB ZCPs) which are not part of the training set. In the literature, both MOCSSs and OB ZCPs have found wide applications in wireless communications. 2) HpGAN found new sequences which achieve four times increase of signal to interference ratio benchmarked against the well known Legendre sequence of a mismatched filter (MMF) estimator in pulse compression radar systems. These sequences outperform those found by AlphaSeq."} {"_id": [49], "label": "math.OC", "text": "Strong duality for a problem of linear copositive programming. The paper is dedicated to the study of strong duality for a problem of linear copositive programming. Based on the recently introduced concept of the set of normalized immobile indices, an extended dual problem is deduced. The dual problem satisfies the strong duality relations and does not require any additional regularity assumptions such as constraint qualifications. The main difference with the previously obtained results consists in the fact that now the extended dual problem uses neither the immobile indices themselves nor the explicit information about the convex hull of these indices. The strong duality formulations presented in the paper have similar structure and properties as that proposed in the works of M. Ramana, L. Tuncel, and H. Wolkovicz, for semidefinite programming, but are obtained using different techniques."} {"_id": [26, 21], "label": "math.RT math.CO", "text": "A diagrammatic approach to string polytopes. We prove that for every complex classical group G the string polytope associated to a special reduced decomposition and any dominant integral weight lambda will be a lattice polytope if and only if the highest weight representation of the Lie algebra of G with highest weight lambda integrates to a representation of G itself. This affirms an earlier conjecture and shows that every partial flag variety of a complex classical group admits a flat projective degeneration to a Gorenstein Fano toric variety."} {"_id": [29], "label": "math.GR", "text": "Boolean lattices in finite alternating and symmetric groups. Given a group G and a subgroup H , we let mathcal O G(H) denote the lattice of subgroups of G containing H . This paper provides a classification of the subgroups H of G such that mathcal O G (H) is Boolean of rank at least 3 , when G is a finite alternating or symmetric group. Besides some sporadic examples and some twisted versions, there are two different types of such lattices. One type arises by taking stabilizers of chains of regular partitions, and the other type arises by taking stabilizers of chains of regular product structures. As an application, we prove in this case a conjecture on Boolean overgroup lattices, related to the dual Ore's theorem and to a problem of Kenneth Brown."} {"_id": [78, 21, 46], "label": "math.AG math.AC math.CO", "text": "Partition identities and application to infinite dimensional Groebner basis and viceversa. In the first part of this article, we consider a Groebner basis of the differential ideal x 1 2 with respect to \"the\" weighted lexicographical monomial order and show that its computation is related with an identity involving the partitions that appear in the first Rogers Ramanujan identity. We then prove that a Grobener basis of this ideal is not differentially finite in contrary with the case of \"the\" weighted reverse lexicographical order. In the second part, we give a simple and direct proof of a theorem of Nguyen Duc Tam about the Groaner basis of the differential ideal x 1y 1 we then obtain identities involving partitions with 2 colors."} {"_id": [9], "label": "math.AP", "text": "Nonlocal and nonlinear evolution equations in perforated domains. In this work we analyze the behavior of the solutions to nonlocal evolution equations of the form u t(x,t) int J(x y) u(y,t) , dy h epsilon(x) u(x,t) f(x,u(x,t)) with x in a perturbed domain Omega epsilon subset Omega which is thought as a fixed set Omega from where we remove a subset A epsilon called the holes. We choose an appropriated families of functions h epsilon in L infty in order to deal with both Neumann and Dirichlet conditions in the holes setting a Dirichlet condition outside Omega . Moreover, we take J as a non singular kernel and f as a nonlocal nonlinearity. Under the assumption that the characteristic functions of Omega epsilon have a weak limit, we study the limit of the solutions providing a nonlocal homogenized equation."} {"_id": [26], "label": "math.RT", "text": "Some deformations of the fibred biset category. We prove the well definedness of some deformations of the fibred biset category in characteristic zero. The method is to realize the fibred biset category and the deformations as the invariant parts of some categories whose compositions are given by simpler formulas. Those larger categories are constructed from a partial category of subcharacters by linearizing and introducing a cocycle."} {"_id": [49, 20, 85], "label": "math.OC cs.NA math.NA physics.data-an", "text": "Transition path theory for Langevin dynamics on manifold optimal control and data driven solver. We present a data driven point of view for rare events, which represent conformational transitions in biochemical reactions modeled by over damped Langevin dynamics on manifolds in high dimensions. We first reinterpret the transition state theory and the transition path theory from the optimal control viewpoint. Given point clouds sampled from a reaction dynamics, we construct a discrete Markov process based on an approximated Voronoi tesselation. We use the constructed Markov process to compute a discrete committor function whose level set automatically orders the point clouds. Then based on the committor function, an optimally controlled random walk on point clouds is constructed and utilized to efficiently sample transition paths, which become an almost sure event in O(1) time instead of a rare event in the original reaction dynamics. To compute the mean transition path efficiently, a local averaging algorithm based on the optimally controlled random walk is developed, which adapts the finite temperature string method to the controlled Monte Carlo samples. Numerical examples on sphere torus including a conformational transition for the alanine dipeptide in vacuum are conducted to illustrate the data driven solver for the transition path theory on point clouds. The mean transition path obtained via the controlled Monte Carlo simulations highly coincides with the computed dominant transition path in the transition path theory."} {"_id": [0], "label": "cs.CV", "text": "Superpixel Soup Monocular Dense 3D Reconstruction of a Complex Dynamic Scene. This work addresses the task of dense 3D reconstruction of a complex dynamic scene from images. The prevailing idea to solve this task is composed of a sequence of steps and is dependent on the success of several pipelines in its execution. To overcome such limitations with the existing algorithm, we propose a unified approach to solve this problem. We assume that a dynamic scene can be approximated by numerous piecewise planar surfaces, where each planar surface enjoys its own rigid motion, and the global change in the scene between two frames is as rigid as possible (ARAP). Consequently, our model of a dynamic scene reduces to a soup of planar structures and rigid motion of these local planar structures. Using planar over segmentation of the scene, we reduce this task to solving a \"3D jigsaw puzzle\" problem. Hence, the task boils down to correctly assemble each rigid piece to construct a 3D shape that complies with the geometry of the scene under the ARAP assumption. Further, we show that our approach provides an effective solution to the inherent scale ambiguity in structure from motion under perspective projection. We provide extensive experimental results and evaluation on several benchmark datasets. Quantitative comparison with competing approaches shows state of the art performance."} {"_id": [32], "label": "cs.DS", "text": "Efficient Constant Factor Approximate Enumeration of Minimal Subsets for Monotone Properties with Weight Constraints. A property Pi on a finite set U is emph monotone if for every X subseteq U satisfying Pi , every superset Y subseteq U of X also satisfies Pi . Many combinatorial properties can be seen as monotone properties. The problem of finding a minimum subset of U satisfying Pi is a central problem in combinatorial optimization. Although many approximate exact algorithms have been developed to solve this kind of problem on numerous properties, a solution obtained by these algorithms is often unsuitable for real world applications due to the difficulty of building accurate mathematical models on real world problems. A promising approach to overcome this difficulty is to emph enumerate multiple small solutions rather than to emph find a single small solution. To this end, given a weight function w U to mathbb N and an integer k , we devise algorithms that emph approximately enumerate all minimal subsets of U with weight at most k satisfying Pi for various monotone properties Pi , where \"approximate enumeration\" means that algorithms output all minimal subsets satisfying Pi whose weight at most k and may output some minimal subsets satisfying Pi whose weight exceeds k but is at most ck for some constant c ge 1 . These algorithms allow us to efficiently enumerate minimal vertex covers, minimal dominating sets in bounded degree graphs, minimal feedback vertex sets, minimal hitting sets in bounded rank hypergraphs, etc., of weight at most k with constant approximation factors."} {"_id": [15], "label": "cs.IT math.IT", "text": "Characterizing Linear Memory Rate Tradeoff of Coded Caching The (N,K) (3,3) Case. We consider the cache problem introduced by Maddah ali and Niesen 1 for the (N,K) (3,3) case, and use the computer aided approach to derive the tight linear memory rate trade off. Two lower bounds 10M 6R geq 15 and 5M 4R geq 9 are proved, which are non Shannon type. A coded linear scheme of point (M,R) (0.6,1.5) is constructed with the help of symmetry reduction and brute force search."} {"_id": [0], "label": "cs.CV", "text": "Partially Shared Variational Auto encoders for Unsupervised Domain Adaptation with Target Shift. This paper proposes a novel approach for unsupervised domain adaptation (UDA) with target shift. Target shift is a problem of mismatch in label distribution between source and target domains. Typically it appears as class imbalance in target domain. In practice, this is an important problem in UDA as we do not know labels in target domain datasets, we do not know whether or not its distribution is identical to that in the source domain dataset. Many traditional approaches achieve UDA with distribution matching by minimizing mean maximum discrepancy or adversarial training however these approaches implicitly assume a coincidence in the distributions and do not work under situations with target shift. Some recent UDA approaches focus on class boundary and some of them are robust to target shift, but they are only applicable to classification and not to regression. To overcome the target shift problem in UDA, the proposed method, partially shared variational autoencoders (PS VAEs), uses pair wise feature alignment instead of feature distribution matching. PS VAEs inter convert domain of each sample by a CycleGAN based architecture while preserving its label related content. To evaluate the performance of PS VAEs, we carried out two experiments UDA with class unbalanced digits datasets (classification), and UDA from synthesized data to real observation in human pose estimation (regression). The proposed method presented its robustness against the class imbalance in the classification task, and outperformed the other methods in the regression task with a large margin."} {"_id": [14], "label": "cs.HC", "text": "Wearable Haptics for Remote Social Walking. Walking is an essential activity for a healthy life, which becomes less tiring and more enjoyable if done together. Common difficulties we have in performing sufficient physical exercise, for instance the lack of motivation, can be overcome by exploiting its social aspect. However, our lifestyle sometimes makes it very difficult to find time together with others who live far away from us to go for a walk. In this paper we propose a novel system enabling people to have a 'remote social walk' by streaming the gait cadence between two persons walking in different places, increasing the sense of mutual presence. Vibrations provided at the users' ankles display the partner's sensation perceived during the heel strike. In order to achieve the aforementioned goal in a two users experiment, we envisaged a four step incremental validation process i) a single walker has to adapt the cadence with a virtual reference generated by a software ii) a single user is tasked to follow a predefined time varying gait cadence iii) a leader follower scenario in which the haptic actuation is mono directional iv) a peer to peer case with bi directional haptic communication. Careful experimental validation was conducted involving a total of 50 people, which confirmed the efficacy of our system in perceiving the partners' gait cadence in each of the proposed scenarios."} {"_id": [8], "label": "physics.optics", "text": "Soliton dynamics in microresonators with XPM induced negative thermo optic effect. Optical frequency comb generation in microresonators has attracted significant attention over the past decade, as it offers the promising potential for chip scale optical frequency synthesis, optical clocks and precise optical spectroscopy. However, accessing temporal dissipative Kerr soliton (DKSs) is known to be severely hampered by thermal effects. Furthermore, due to the degeneracy of soliton existence range with respect to soliton number, deterministically accessing single soliton state is another challenge. Here, we demonstrate stable and deterministic single soliton generation in AlN on sapphire platform via auxiliary laser pumping scheme without the requirement of fast control of the pump power and detuning. Moreover, we reveal the underlying physics of soliton switching in a dual pumped microcomb, which is fully described by the Lugiato Lefever equation. The switching process is attributed to cross phase modulation (XPM) induced degeneracy lifting of the soliton existence range, corresponding to an effective negative thermo optic effect."} {"_id": [34, 12], "label": "math.CA math.CV", "text": "Vi ete's fractal distributions and their momenta. Solutions of Schr \"oder Poincar 'e's polynomial equations f(az) P(f(z)) usually do not admit a simple closed form representation in terms of known standard functions. We show that there is a one to one correspondence between zeros of f and a set of discrete functions stable at infinity. The corresponding Vi ete type infinite products for zeros of f are also provided. This allows us to obtain a special kind of closed form representation for f based on the Weierstrass Hadamard factorization. From this representation, it is possible to derive explicit momenta formulas for zeros. We discuss also the rate of convergence of WH factorization and momenta formulas. Obtaining explicit closed form expressions is the main motivation for this work. Finally, all the branches of the multi valued function f 1 are computed explicitly."} {"_id": [2, 39], "label": "cs.CY cs.AI", "text": "Oxford Handbook on AI Ethics Book Chapter on Race and Gender. From massive face recognition based surveillance and machine learning based decision systems predicting crime recidivism rates, to the move towards automated health diagnostic systems, artificial intelligence (AI) is being used in scenarios that have serious consequences in people's lives. However, this rapid permeation of AI into society has not been accompanied by a thorough investigation of the sociopolitical issues that cause certain groups of people to be harmed rather than advantaged by it. For instance, recent studies have shown that commercial face recognition systems have much higher error rates for dark skinned women while having minimal errors on light skinned men. A 2016 ProPublica investigation uncovered that machine learning based tools that assess crime recidivism rates in the US are biased against African Americans. Other studies show that natural language processing tools trained on newspapers exhibit societal biases (e.g. finishing the analogy \"Man is to computer programmer as woman is to X\" by homemaker). At the same time, books such as Weapons of Math Destruction and Automated Inequality detail how people in lower socioeconomic classes in the US are subjected to more automated decision making tools than those who are in the upper class. Thus, these tools are most often used on people towards whom they exhibit the most bias. While many technical solutions have been proposed to alleviate bias in machine learning systems, we have to take a holistic and multifaceted approach. This includes standardization bodies determining what types of systems can be used in which scenarios, making sure that automated decision tools are created by people from diverse backgrounds, and understanding the historical and political factors that disadvantage certain groups who are subjected to these tools."} {"_id": [48], "label": "cs.CC", "text": "On P Versus NP. Consider a following NP problem DOUBLE CLIQUE (abbr. CLIQ 2 ) Given a natural number k 2 and a pair of two disjoint subgraphs of a fixed graph G decide whether each subgraph in question contains a k clique. We prove that CLIQ 2 can't be solved in polynomial time by a deterministic TM. Clearly this is equivalent to analogous claim related to the well known monotone problem CLIQUE (abbr. CLIQ), which infers mathbf P neq mathbf NP . Our proof of polynomial unsolvability of CLIQ 2 upgrades the well known \"monotone\" proof with respect to CLIQ. However note that problem CLIQ 2 is not monotone and it appears to be more complex than just iterated CLIQ, as the required subgraphs are mutually dependent (see also Remark 26 in the text)."} {"_id": [41], "label": "cs.RO", "text": "Trajectory Planning for Connected and Automated Vehicles Cruising, Lane Changing, and Platooning. Autonomy and connectivity are considered among the most promising technologies to improve safety, mobility, fuel and time consumption in transportation systems. Some of the fuel efficiency benefits of connected and automated vehicles (CAVs) can be realized through platooning. A platoon is a virtual train of CAVs that travel together following the platoon head, with small gaps between them. Vehicles may also reduce travel time by lane changing. In this paper, we devise an optimal control based trajectory planning model that can provide safe and efficient trajectories for the subject vehicle and can incorporate platooning and lane changing. We embed this trajectory planning model in a simulation framework to quantify its efficiency benefits as it relates to fuel consumption and travel time, in a dynamic traffic stream. Furthermore, we perform extensive numerical experiments to investigate whether, and the circumstances under which, the vehicles in upstream of the subject vehicle may also experience second hand fuel efficiency benefits."} {"_id": [9, 23], "label": "math.AP math.FA", "text": "On a hyper singular equation. The equation v v 0 int 0 t(t s) lambda 1 v(s)ds is considered, lambda neq 0, 1, 2... and v 0 is a smooth function rapidly decaying with all its derivatives. It is proved that the solution to this equation does exist, is unique and is smoother than the singular function t frac 5 4 ."} {"_id": [56], "label": "cs.LO", "text": "Core First Unit Propagation. Unit propagation (which is called also Boolean Constraint Propagation) has been an important component of every modern CDCL SAT solver since the CDCL solver was developed. In general, unit propagation is implemented by scanning sequentially every clause over a linear watch list. This paper presents a new unit propagation technique called core first unit propagation. The main idea is to prefer core clauses over non core ones during unit propagation, trying to generate a shorter learnt clause. Here, the core clause is defined as one with literal block distance less than or equal to 7. Empirical results show that core first unit propagation improves the performance of the winner of the SAT Competition 2018, MapleLCMDistChronoBT."} {"_id": [9], "label": "math.AP", "text": "A multi scale problem for viscous heat conducting fluids in fast rotation. In the present paper, we study the combined incompressible and fast rotation limits for the full Navier Stokes Fourier system with Coriolis, centrifugal and gravitational forces, in the regime of small Mach, Froude and Rossby numbers and for general ill prepared initial data. We consider both the isotropic scaling (where all the numbers have the same order of magnitude) and the multi scale case (where some effect is predominant with respect to the others). In the case when the Mach number is of higher order than the Rossby number, we prove that the limit dynamics is described by an incompressible Oberbeck Boussinesq system, where the velocity field is horizontal (according to the Taylor Proudman theorem), but vertical effects on the temperature equation are not negligible. Instead, when the Mach and Rossby numbers have the same order of magnitude, and in absence of the centrifugal force, we show convergence to a quasi geostrophic equation for a stream function of the limit velocity field, coupled with a transport diffusion equation for a new unknown, which links the target density and temperature profiles. The proof of the convergence is based on a compensated compactness argument. The key point is to identify some compactness properties hidden in the system of acoustic Poincar 'e waves. Compared to previous results, our method enables first of all to treat the whole range of parameters in the multi scale problem, and also to consider a low Froude number regime with the somehow critical choice Fr sqrt Ma , where Ma is the Mach number. This allows us to capture some (low) stratification effects in the limit."} {"_id": [0], "label": "cs.CV", "text": "Structural analogy from a Single Image Pair. The task of unsupervised image to image translation has seen substantial advancements in recent years through the use of deep neural networks. Typically, the proposed solutions learn the characterizing distribution of two large, unpaired collections of images, and are able to alter the appearance of a given image, while keeping its geometry intact. In this paper, we explore the capabilities of neural networks to understand image structure given only a single pair of images, A and B. We seek to generate images that are structurally aligned that is, to generate an image that keeps the appearance and style of B, but has a structural arrangement that corresponds to A. The key idea is to map between image patches at different scales. This enables controlling the granularity at which analogies are produced, which determines the conceptual distinction between style and content. In addition to structural alignment, our method can be used to generate high quality imagery in other conditional generation tasks utilizing images A and B only guided image synthesis, style and texture transfer, text translation as well as video translation. Our code and additional results are available in https github.com rmokady structural analogy ."} {"_id": [15], "label": "cs.IT math.IT", "text": "Spectral Bounds for Quasi Twisted Codes. New lower bounds on the minimum distance of quasi twisted codes over finite fields are proposed. They are based on spectral analysis and eigenvalues of polynomial matrices. They generalize the Semenov Trifonov and Zeh Ling bounds in a manner similar to how the Roos and shift bounds extend the BCH and HT bounds for cyclic codes."} {"_id": [17, 15], "label": "cs.IT cs.DC math.IT", "text": "Repair rate lower bounds for distributed storage. One of the primary objectives of a distributed storage system is to reliably store a large amount dsize of source data for a long duration using a large number N of unreliable storage nodes, each with capacity nsize . The storage overhead beta is the fraction of system capacity available beyond dsize , i.e., beta 1 frac dsize N cdot nsize . Storage nodes fail randomly over time and are replaced with initially empty nodes, and thus data is erased from the system at an average rate erate lambda cdot N cdot nsize , where 1 lambda is the average lifetime of a node before failure. To maintain recoverability of the source data, a repairer continually reads data over a network from nodes at some average rate rrate , and generates and writes data to nodes based on the read data. The main result is that, for any repairer, if the source data is recoverable at each point in time then it must be the case that rrate ge frac erate 2 cdot beta asymptotically as N goes to infinity and beta goes to zero. This inequality provides a fundamental lower bound on the average rate that any repairer needs to read data from the system in order to maintain recoverability of the source data."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Train, Sort, Explain Learning to Diagnose Translation Models. Evaluating translation models is a trade off between effort and detail. On the one end of the spectrum there are automatic count based methods such as BLEU, on the other end linguistic evaluations by humans, which arguably are more informative but also require a disproportionately high effort. To narrow the spectrum, we propose a general approach on how to automatically expose systematic differences between human and machine translations to human experts. Inspired by adversarial settings, we train a neural text classifier to distinguish human from machine translations. A classifier that performs and generalizes well after training should recognize systematic differences between the two classes, which we uncover with neural explainability methods. Our proof of concept implementation, DiaMaT, is open source. Applied to a dataset translated by a state of the art neural Transformer model, DiaMaT achieves a classification accuracy of 75 and exposes meaningful differences between humans and the Transformer, amidst the current discussion about human parity."} {"_id": [6], "label": "physics.flu-dyn", "text": "Optimising the flow through a concertinaed filtration membrane. Membrane filtration is a vital industrial process, with applications including air purification and blood filtration. In this paper, we study the optimal design for a concertinaed filtration membrane composed of angled porous membranes and dead ends. We examine how the filter performance depends on the angle, position, thickness, and permeance of the membrane, through a combination of numerical and asymptotic approaches, the latter in the limit of a slightly angled membrane. We find that, for a membrane of fixed angle and physical properties, there can exist multiple membrane positions that maximise the flux for an applied pressure difference. More generally, we show that while the maximal flux achievable depends on the membrane thickness and permeance, the optimal membrane configuration is always in one of two setups centred and diagonal across the full domain or angled and in the corner of the domain."} {"_id": [48, 21], "label": "cs.CC math.CO", "text": "The exact complexity of the Tutte polynomial. This is a survey on the exact complexity of computing the Tutte polynomial. It is the longer 2017 version of Chapter 25 of the CRC Handbook on the Tutte polynomial and related topics, edited by J. Ellis Monaghan and I. Moffatt, which is due to appear in the first quarter of 2020. In the version to be published in the Handbook the Sections 5 and 6 are shortened and made into a single section."} {"_id": [0], "label": "cs.CV", "text": "Augmented Parallel Pyramid Net for Attention Guided Pose Estimation. The target of human pose estimation is to determine body part or joint locations of each person from an image. This is a challenging problems with wide applications. To address this issue, this paper proposes an augmented parallel pyramid net with attention partial module and differentiable auto data augmentation. Technically, a parallel pyramid structure is proposed to compensate the loss of information. We take the design of parallel structure for reverse compensation. Meanwhile, the overall computational complexity does not increase. We further define an Attention Partial Module (APM) operator to extract weighted features from different scale feature maps generated by the parallel pyramid structure. Compared with refining through upsampling operator, APM can better capture the relationship between channels. At last, we proposed a differentiable auto data augmentation method to further improve estimation accuracy. We define a new pose search space where the sequences of data augmentations are formulated as a trainable and operational CNN component. Experiments corroborate the effectiveness of our proposed method. Notably, our method achieves the top 1 accuracy on the challenging COCO keypoint benchmark and the state of the art results on the MPII datasets."} {"_id": [0], "label": "cs.CV", "text": "Deep Weakly Supervised Domain Adaptation for Pain Localization in Videos. Automatic pain assessment has an important potential diagnostic value for populations that are incapable of articulating their pain experiences. As one of the dominating nonverbal channels for eliciting pain expression events, facial expressions has been widely investigated for estimating the pain intensity of individual. However, using state of the art deep learning (DL) models in real world pain estimation applications poses several challenges related to the subjective variations of facial expressions, operational capture conditions, and lack of representative training videos with labels. Given the cost of annotating intensity levels for every video frame, we propose a weakly supervised domain adaptation (WSDA) technique that allows for training 3D CNNs for spatio temporal pain intensity estimation using weakly labeled videos, where labels are provided on a periodic basis. In particular, WSDA integrates multiple instance learning into an adversarial deep domain adaptation framework to train an Inflated 3D CNN (I3D) model such that it can accurately estimate pain intensities in the target operational domain. The training process relies on weak target loss, along with domain loss and source loss for domain adaptation of the I3D model. Experimental results obtained using labeled source domain RECOLA videos and weakly labeled target domain UNBC McMaster videos indicate that the proposed deep WSDA approach can achieve significantly higher level of sequence (bag) level and frame (instance) level pain localization accuracy than related state of the art approaches."} {"_id": [65, 39], "label": "cs.CY cs.NI", "text": "When Wireless Communication Faces COVID 19 Combating the Pandemic and Saving the Economy. The year 2020 is experiencing a global health and economic crisis due to the COVID 19 pandemic. Countries across the world are using digital technologies to fight this global crisis. These digital technologies, in one way or another, strongly rely on the availability of wireless communication technologies. In this paper, we present the role of wireless communications in the COVID 19 pandemic from different perspectives. First, we show how these technologies are helping to combat this pandemic, including monitoring of the virus spread, enabling healthcare automation, and allowing virtual education and conferencing. Also, we show the importance of digital inclusiveness in the pandemic and possible solutions to connect the unconnected. Next, we discuss the challenges faced by wireless technologies, including privacy, security, and misinformation. Then, we present the importance of wireless communication technologies in the survival of the global economy, such as automation of industries and supply chain, e commerce, and supporting occupations that are at risk. Finally, we reveal that how the technologies developed during the pandemic can be helpful in the post pandemic era."} {"_id": [3], "label": "cs.CL", "text": "Breeding Gender aware Direct Speech Translation Systems. In automatic speech translation (ST), traditional cascade approaches involving separate transcription and translation steps are giving ground to increasingly competitive and more robust direct solutions. In particular, by translating speech audio data without intermediate transcription, direct ST models are able to leverage and preserve essential information present in the input (e.g. speaker's vocal characteristics) that is otherwise lost in the cascade framework. Although such ability proved to be useful for gender translation, direct ST is nonetheless affected by gender bias just like its cascade counterpart, as well as machine translation and numerous other natural language processing applications. Moreover, direct ST systems that exclusively rely on vocal biometric features as a gender cue can be unsuitable and potentially harmful for certain users. Going beyond speech signals, in this paper we compare different approaches to inform direct ST models about the speaker's gender and test their ability to handle gender translation from English into Italian and French. To this aim, we manually annotated large datasets with speakers' gender information and used them for experiments reflecting different possible real world scenarios. Our results show that gender aware direct ST solutions can significantly outperform strong but gender unaware direct ST models. In particular, the translation of gender marked words can increase up to 30 points in accuracy while preserving overall translation quality."} {"_id": [21], "label": "math.CO", "text": "Properties of sets of Subspaces with Constant Intersection Dimension. A (k,k t) SCID (set of Subspaces with Constant Intersection Dimension) is a set of k dimensional vector spaces that have pairwise intersections of dimension k t . Let mathcal C pi 1, ldots, pi n be a (k,k t) SCID. Define S langle pi 1, ldots, pi n rangle and I langle pi i cap pi j mid 1 leq i j leq n rangle . We establish several upper bounds for dim S dim I in different situations. We give a spectrum result for the case (n 1)(k t) leq k and for the case n leq frac q t(n eta) 1 q t 1 , giving examples of (k,k t) SCIDs reaching a large interval of values for dim S dim I ."} {"_id": [76], "label": "math.SP", "text": "Spectral data asymptotics for the matrix Sturm Liouville operator. The self adjoint matrix Sturm Liouville operator on a finite interval with a boundary condition in the general form is studied. We obtain asymptotic formulas for the eigenvalues and the weight matrices of the considered operator. These spectral characteristics play an important role in the inverse spectral theory. Our technique is based on analysis of analytic functions and on the contour integration in the complex plane of the spectral parameter. In addition, we adapt the obtained asymptotic formulas to the Sturm Liouville operators on a star shaped graph with two different types of matching conditions."} {"_id": [13], "label": "math.DS", "text": "A branched covering of degree 2 of the sphere with a completely invariant indecomposable continuum. We construct a branched covering of degree 2 of the sphere S 2 having a completely invariant indecomposable continuum K . The existence of such an object is not known for rational maps of the sphere."} {"_id": [40, 1], "label": "cs.IR cs.LG", "text": "Mend The Learning Approach, Not the Data Insights for Ranking E Commerce Products. Improved search quality enhances users' satisfaction, which directly impacts sales growth of an E Commerce (E Com) platform. Traditional Learning to Rank (LTR) algorithms require relevance judgments on products. In E Com, getting such judgments poses an immense challenge. In the literature, it is proposed to employ user feedback (such as clicks, add to basket (AtB) clicks and orders) to generate relevance judgments. It is done in two steps first, query product pair data are aggregated from the logs and then order rate etc are calculated for each pair in the logs. In this paper, we advocate counterfactual risk minimization (CRM) approach which circumvents the need of relevance judgements, data aggregation and is better suited for learning from logged data, i.e. contextual bandit feedback. Due to unavailability of public E Com LTR dataset, we provide textit Mercateo dataset from our platform. It contains more than 10 million AtB click logs and 1 million order logs from a catalogue of about 3.5 million products associated with 3060 queries. To the best of our knowledge, this is the first work which examines effectiveness of CRM approach in learning ranking model from real world logged data. Our empirical evaluation shows that our CRM approach learns effectively from logged data and beats a strong baseline ranker ( lambda MART) by a huge margin. Our method outperforms full information loss (e.g. cross entropy) on various deep neural network models. These findings demonstrate that by adopting CRM approach, E Com platforms can get better product search quality compared to full information approach. The code and dataset can be accessed at https github.com ecom research CRM LTR."} {"_id": [32, 17], "label": "cs.DS cs.DC", "text": "Tight Analysis of Asynchronous Rumor Spreading in Dynamic Networks. The asynchronous rumor algorithm spreading propagates a piece of information, the so called rumor, in a network. Starting with a single informed node, each node is associated with an exponential time clock with rate 1 and calls a random neighbor in order to possibly exchange the rumor. Spread time is the first time when all nodes of a network are informed with high probability. We consider spread time of the algorithm in any dynamic evolving network, mathcal G G (t) t 0 infty , which is a sequence of graphs exposed at discrete time step t 0,1 ldots . We observe that besides the expansion profile of a dynamic network, the degree distribution of nodes over time effect the spread time. We establish upper bounds for the spread time in terms of graph conductance and diligence. For a given connected simple graph G (V,E) , the diligence of cut set E(S, overline S ) is defined as rho(S) min u,v in E(S, overline S ) max bar d d u, bar d d v where d u is the degree of u and bar d is the average degree of nodes in the one side of the cut with smaller volume (i.e., mathtt vol (S) sum u in S d u ). The diligence of G is also defined as rho(G) min emptyset neq S subset V rho(S) . We show that the spread time of the algorithm in mathcal G is bounded by T , where T is the first time that sum t 0 T Phi(G (t) ) cdot rho(G (t) ) exceeds C log n , where Phi(G (t) ) denotes the conductance of G (t) and C is a specified constant. We also define the absolute diligence as overline rho (G) min u,v in E max 1 d u,1 d v and establish upper bound T for the spread time in terms of absolute diligence, which is the first time when sum t 0 T lceil Phi(G (t) ) rceil cdot overline rho (G (t) ) ge 2n . We present dynamic networks where the given upper bounds are almost tight."} {"_id": [9, 25], "label": "math.AP math.PR", "text": "Quasi invariant Gaussian measures for the cubic fourth order nonlinear Schr \"odinger equation in negative Sobolev spaces. We continue the study on the transport properties of the Gaussian measures on Sobolev spaces under the dynamics of the cubic fourth order nonlinear Schr \"odinger equation. By considering the renormalized equation, we extend the quasi invariance results in 30, 27 to Sobolev spaces of negative regularity. Our proof combines the approach introduced by Planchon, Tzvetkov, and Visciglia 35 with the normal form approach in 30, 27 ."} {"_id": [18, 29], "label": "math.GT math.GR", "text": "Relative Vertex Asphericity. Diagrammatic reducibility DR and its generalization vertex asphericity VA are combinatorial tools developed for detecting asphericity of a 2 complex. Here we present tests for a relative version of VA that apply to pairs of 2 complexes (L,K) , where K is a subcomplex of L . We show that a relative weight test holds for injective labeled oriented trees, implying that they are VA and hence aspherical. This strengthens a result obtained by the authors in 2017 and simplifies the original proof."} {"_id": [64], "label": "physics.soc-ph", "text": "Modeling cities. Cities are systems with a large number of constituents and agents interacting with each other and can be considered as emblematic of complex systems. Modeling these systems is a real challenge and triggered the interest of many disciplines such as quantitative geography, spatial economics, geomatics and urbanism, and more recently physics. (Statistical) Physics plays a major role by bringing tools and concepts able to bridge theory and empirical results, and we will illustrate this on some fundamental aspects of cities the growth of their surface area and their population, their spatial organization, and the spatial distribution of activities. We will present state of the art results and models but also open problems for which we still have a partial understanding and where physics approaches could be particularly helpful. We will end this short review with a discussion about the possibility of constructing a science of cities."} {"_id": [8], "label": "physics.optics", "text": "Hybrid CO mathrm 2 Ti sapphire laser with tunable pulse duration for mid infrared pump terahertz probe spectroscopy. Ultrafast optical excitation with intense mid infrared and terahertz pulses has emerged as a new tool to control materials dynamically. As most experiments are performed with femtosecond pulse excitation, typical lifetimes of most light induced phenomena in solids are of only few picoseconds. Yet, many scientific applications require longer drive pulses and lifetimes. Here, we describe a mid infrared pump terahertz probe setup based on a CO mathrm 2 laser seeded with 10.6 mathrm mu m wavelength pulses from an optical parametric amplifier, itself pumped by a Ti Al mathrm 2 O mathrm 3 laser. The output of the seeded CO mathrm 2 laser produces high power pulses of nanosecond duration, which are synchronized to the femtosecond laser. Hence, these pulses can be tuned in pulse duration by slicing their front and back edges with semiconductor plasma mirrors irradiated by replicas of the femtosecond seed laser pulses. Variable pulse lengths from 5 ps to 1.3 ns are achieved, and used in mid infrared pump, terahertz probe experiments with probe pulses generated and electro optically sampled by the femtosecond laser."} {"_id": [48, 32, 62], "label": "cs.GT cs.CC cs.DS", "text": "On Parameterized Complexity of Binary Networked Public Goods Game. In the Binary Networked Public Goods game, every player needs to decide if she participates in a public project whose utility is shared equally by the community. We study the problem of deciding if there exists a pure strategy Nash equilibrium (PSNE) in such games. The problem is already known to be NP complete. We provide fine grained analysis of this problem under the lens of parameterized complexity theory. We consider various natural graph parameters and show either W 1 hardness or exhibit an FPT algorithm. We finally exhibit some special graph classes, for example path, cycle, bi clique, complete graph, etc., which always have a PSNE if the utility function of the players are fully homogeneous."} {"_id": [38, 46], "label": "math.AG math.NT", "text": "Perfect points on genus one curves and consequences for supersingular K3 surfaces. We describe a method to show that certain elliptic surfaces do not admit purely inseparable multisections (equivalently, that genus one curves over function fields admit no points over the perfect closure of the base field) and use it to show that any non Jacobian elliptic structure on a very general supersingular K3 surface has no purely inseparable multisections. We also describe specific examples of such fibrations without purely inseparable multisections. Finally, we discuss the consequences for the claimed proof of the Artin conjecture on unirationality of supersingular K3 surfaces."} {"_id": [39], "label": "cs.CY", "text": "Evaluation Pattern on Refugee Crisis. For nowadays severe refugee issue, we primarily set up an evaluation pattern on refugee crisis. Then, we modify our model in the consideration that time and external factors. Besides, we propose a set of policy to facilitate migration movement on optimal route before discussing the extendibility of our model."} {"_id": [50], "label": "physics.med-ph", "text": "Ultrasound imaging with three dimensional full wave nonlinear acoustic simulations. Part 2 sources of image degradation in intercostal imaging. Fullwave simulations are applied to an intercostal imaging scenario to determine the sources of fundamental and harmonic image degradation with respect to aberration and reverberation. These simulations are based on Part I of this two part paper, which established the Fullwave simulation methods to generate realistic ultrasound images based directly on the first principles of wave propagation in the human body. The ultasound images are generated based on the first principles of propagation and reflection and they describe interplay between distributed aberration and reverberation clutter. Three imaging scenarios that would not be realizable in vivo are investigated in silico. First, the ribs were completely removed and replaced with fat. Then, the ribs were maintained in their anatomically correct configuration to yield a reference image. Finally the ribs were placed closer together in elevation. The propagation based B mode images show that of these three scenarios the second, anatomically correct configuration, has the best contrast to noise ratio. This is due to two competing effects. First the ribs effectively apodize the fundamental and harmonic beams by 3 5 dB. This effect alone would predict an improvement in image quality. However, the B mode image quality, measured by the contrast to noise ratio degrades by 8 . To explain these changes, it is shown that a second effect, multiple reverberation, must be taken into account. A point spread function analysis shows that when the ribs are placed closer together they generate significantly more reverberation clutter (by 2.4 to 2.9 dB), degrading the image quality even though the beamplot has lower sidelobes. In this intercostal imaging scenario the effects of the ribs on beam shape and reverberation are therefore in competition in terms of image quality and there is an optimal acoustic window that balances them out."} {"_id": [1, 15], "label": "cs.IT cs.LG math.IT", "text": "Power Control for Wireless VBR Video Streaming From Optimization to Reinforcement Learning. In this paper, we investigate the problem of power control for streaming variable bit rate (VBR) videos over wireless links. A system model involving a transmitter (e.g., a base station) that sends VBR video data to a receiver (e.g., a mobile user) equipped with a playout buffer is adopted, as used in dynamic adaptive streaming video applications. In this setting, we analyze power control policies considering the following two objectives 1) the minimization of the transmit power consumption, and 2) the minimization of the transmission completion time of the communication session. In order to play the video without interruptions, the power control policy should also satisfy the requirement that the VBR video data is delivered to the mobile user without causing playout buffer underflow or overflows. A directional water filling algorithm, which provides a simple and concise interpretation of the necessary optimality conditions, is identified as the optimal offline policy. Following this, two online policies are proposed for power control based on channel side information (CSI) prediction within a short time window. Dynamic programming is employed to implement the optimal offline and the initial online power control policies that minimize the transmit power consumption in the communication session. Subsequently, reinforcement learning (RL) based approach is employed for the second online power control policy. Via simulation results, we show that the optimal offline power control policy that minimizes the overall power consumption leads to substantial energy savings compared to the strategy of minimizing the time duration of video streaming. We also demonstrate that the RL algorithm performs better than the dynamic programming based online grouped water filling (GWF) strategy unless the channel is highly correlated."} {"_id": [18, 13], "label": "math.DS math.GT", "text": "Trees, length spectra for rational maps via barycentric extensions and Berkovich spaces. In this paper, we study the dynamics of degenerating sequences of rational maps on Riemann sphere hat mathbb C using mathbb R trees. Given a sequence of degenerating rational maps, we give two constructions for limiting dynamics on mathbb R trees one geometric and one algebraic. The geometric construction uses the ultralimit of rescalings of barycentric extensions of rational maps, while the algebraic construction uses the Berkovich space of complexified Robinson's field. We show the two approaches are equivalent. The limiting dynamics on the mathbb R tree are analogues to isometric group actions on mathbb R trees studied in Kleinian groups and Teichm \"uller theory. We use the limiting map to classify hyperbolic components of rational maps that admit degeneracies with bounded length spectra (multipliers)."} {"_id": [12, 20], "label": "math.CA cs.NA math.NA", "text": "Discretization by euler's method for regular lagrangian flow. This paper is concerned with the numerical analysis of the explicit Euler scheme for ordinary differential equations with non Lipschitz vector fields. We prove the convergence of the Euler scheme to regular lagrangian flow (Diperna Lions flows) which is the right concept of the solution in this context. Moreover, we show that order of convergence is frac 1 2 ."} {"_id": [42], "label": "math.DG", "text": "The preservability of the curvature adaptedness along the mean curvature flow. In this paper, we investigate the preservability of the curvature adaptedness along the mean curvature flow starting from a compact curvature adapted hypersurface in locally symmetric spaces, where the curvature adaptedness means that the shape operator and the normal Jacobi operator of the hypersurface commute."} {"_id": [93], "label": "physics.class-ph", "text": "The incremental bulk modulus, Young's modulus and Poisson's ratio in nonlinear isotropic elasticity physically reasonable response. An incremental (or tangent) bulk modulus for finite isotropic elasticity is defined which compares an increment in hydrostatic pressure with the corresponding increment in relative volume. Its positivity provides a stringent criterion for physically reasonable response involving the second derivatives of the strain energy function. Also, an average (or secant) bulk modulus is defined by comparing the current stress with the relative volume change. The positivity of this bulk modulus provides a physically reasonable response criterion less stringent than the former. The concept of incremental bulk modulus is extended to anisotropic elasticity. For states of uniaxial tension an incremental Poisson's ratio and an incremental Young's modulus are similarly defined for nonlinear isotropic elasticity and have properties similar to those of the incremental bulk modulus. The incremental Poisson's ratios for the isotropic constraints of incompressibility, Bell, Ericksen, and constant area are considered. The incremental moduli are all evaluated for a specific example of the compressible neo Hookean solid. Bounds on the ground state Lam ' e elastic moduli, assumed positive, are given which are sufficient to guarantee the positivity of the incremental bulk and Young's moduli for all strains. However, although the ground state Poisson's ratio is positive we find that the incremental Poisson's ratio becomes negative for large enough axial extensions."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Presence Only Geographical Priors for Fine Grained Image Classification. Appearance information alone is often not sufficient to accurately differentiate between fine grained visual categories. Human experts make use of additional cues such as where, and when, a given image was taken in order to inform their final decision. This contextual information is readily available in many online image collections but has been underutilized by existing image classifiers that focus solely on making predictions based on the image contents. We propose an efficient spatio temporal prior, that when conditioned on a geographical location and time, estimates the probability that a given object category occurs at that location. Our prior is trained from presence only observation data and jointly models object categories, their spatio temporal distributions, and photographer biases. Experiments performed on multiple challenging image classification datasets show that combining our prior with the predictions from image classifiers results in a large improvement in final classification performance."} {"_id": [71], "label": "math.SG", "text": "Local Symplectic Homology of Reeb Orbits. In this paper we prove two isomorphisms in the local symplectic homology of a simple, which is to say non iterated, isolated Reeb orbit. The isomorphisms are in S 1 equivariant and nonequivariant symplectic homology, relating the local Floer homology group of the orbit to that of the return map. The isomorphism we prove in S 1 equivariant symplectic homology can be stated succinctly as the local S 1 equivariant symplectic homology of a simple isolated Reeb orbit is isomorphic to the local Hamiltonian Floer homology of the return map. We also prove the equivalence of two different definitions of a Reeb orbit being a symplectically degenerate maximum."} {"_id": [47], "label": "math.AT", "text": "Stratified Homotopy Theory. A stratified space is a topological space together with a decomposition into strata corresponding to different types of singularities. Examples of such spaces appear everywhere in topology and geometry. The study of stratified spaces involves invariants such as intersection cohomology which are only invariants under stratification preserving homotopies. In this thesis, we study the homotopy theory of stratified spaces with respect to those stratified homotopies. To do so, we construct model categories for stratified spaces and we introduce new invariants to characterize them, the filtered homotopy groups. A stratified space can be seen as a topological space X together with a continuous map to a poset of strata X to P . We begin our study by restricting ourselves to the filtered case, where the poset of strata is fixed. We define the model category of filtered simplicial sets, show that it admits a description \" a la Kan\", and characterize its weak equivalences using the filtered homotopy groups. We deduce a proof of a filtered version of Whitehead theorem. We then construct a model category of filtered spaces. Its weak equivalences are the morphisms that induce isomorphisms on all filtered homotopy groups, and its fibrations satisfy a filtered version of Serre's lifting conditions. We show that it is Quillen equivalent to a category of diagrams of simplicial sets. We then work toward a comparison between the model categories of filtered simplicial sets and of filtered spaces. They are connected by a Quillen adjunction, similar to the classical Kan Quillen adjunction. We conjecture that it is in fact a Quillen equivalence. Lastly, working with the notion of Quillen bifibration, we show that there are model categories of stratified spaces and of stratified simplicial sets. We show that the two are related by an adjunction that preserve weak equivalences."} {"_id": [20], "label": "math.NA cs.NA", "text": "Interpolation and stability properties of low order face and edge virtual element spaces. We analyse the interpolation properties of 2D and 3D low order virtual element face and edge spaces, which generalize N 'ed 'elec and Raviart Thomas polynomials to polygonal polyhedral meshes. Moreover, we investigate the stability properties of the associated L 2 discrete bilinear forms, which typically appear in the virtual element discretization of problems in electromagnetism."} {"_id": [26, 35], "label": "math.RT math.RA", "text": "Almost Split Triangles and Morphisms Determined by Objects in Extriangulated Categories. Let ( mathfrak C , mathbb E , mathfrak s ) be an Ext finite, Krull Schmidt and k linear extriangulated category with k a commutative artinian ring. We define an additive subcategory mathfrak C r (respectively, mathfrak C l ) of mathfrak C in terms of the representable functors from the stable category of mathfrak C modulo mathfrak s injectives (respectively, mathfrak s projectives) to k modules, which consists of all mathfrak s projective (respectively, mathfrak s injective) objects and objects isomorphic to direct summands of finite direct sums of all third (respectively, first) terms of almost split mathfrak s triangles. We investigate the subcategories mathfrak C r and mathfrak C l in terms of morphisms determined by objects, and then give equivalent characterizations on the existence of almost split mathfrak s triangles."} {"_id": [46], "label": "math.AG", "text": "Mori dream K3 surfaces of Picard number four projective models and Cox rings. In this paper we study the geometry of the 14 families of K3 surfaces of Picard number four with finite automorphism group, whose N 'eron Severi lattices have been classified by E.B. Vinberg. We provide projective models, we identify the degrees of a generating set of the Cox ring and in some cases we prove the unirationality of the associated moduli space."} {"_id": [2, 59, 52, 14], "label": "cs.SI cs.AI cs.HC cs.MA", "text": "Competitive Balance in Team Sports Games. Competition is a primary driver of player satisfaction and engagement in multiplayer online games. Traditional matchmaking systems aim at creating matches involving teams of similar aggregated individual skill levels, such as Elo score or TrueSkill. However, team dynamics cannot be solely captured using such linear predictors. Recently, it has been shown that nonlinear predictors that target to learn probability of winning as a function of player and team features significantly outperforms these linear skill based methods. In this paper, we show that using final score difference provides yet a better prediction metric for competitive balance. We also show that a linear model trained on a carefully selected set of team and individual features achieves almost the performance of the more powerful neural network model while offering two orders of magnitude inference speed improvement. This shows significant promise for implementation in online matchmaking systems."} {"_id": [12], "label": "math.CA", "text": "On Descartes' rule of signs. A sequence of d 1 signs and beginning with a is called a em sign pattern (SP) . We say that the real polynomial P x d sum j 0 d 1 a jx j , a j neq 0 , defines the SP sigma ( ,sgn (a d 1 ) , ldots , sgn (a 0)) . By Descartes' rule of signs, for the quantity pos of positive (resp. neg of negative) roots of P , one has pos leq c (resp. neg leq p d c ), where c and p are the numbers of sign changes and sign preservations in sigma the numbers c pos and p neg are even. We say that P realizes the SP sigma with the pair (pos, neg) . For SPs with c 2 , we give some sufficient conditions for the (non)realizability of pairs (pos, neg) of the form (0,d 2k) , k 1 , ldots , (d 2) 2 ."} {"_id": [92, 15], "label": "cs.IT math.IT q-bio.BM", "text": "Thermodynamically Stable DNA Code Design using a Similarity Significance Model. DNA code design aims to generate a set of DNA sequences (codewords) with minimum likelihood of undesired hybridizations among sequences and their reverse complement (RC) pairs (cross hybridization). Inspired by the distinct hybridization affinities (or stabilities) of perfect double helix constructed by individual single stranded DNA (ssDNA) and its RC pair, we propose a novel similarity significance (SS) model to measure the similarity between DNA sequences. Particularly, instead of directly measuring the similarity of two sequences by any metric approach, the proposed SS works in a way to evaluate how more likely will the undesirable hybridizations occur over the desirable hybridizations in the presence of the two measured sequences and their RC pairs. With this SS model, we construct thermodynamically stable DNA codes subject to several combinatorial constraints using a sorting based algorithm. The proposed scheme results in DNA codes with larger code sizes and wider free energy gaps (hence better cross hybridization performance) compared to the existing methods."} {"_id": [8], "label": "physics.optics", "text": "Manipulating neutral particles in Bessel beams from rings, through fixed helices to 3D traps. The motion of neutral, polarizable atoms (also called neutral particles in this work) in the field of the Bessel beam is considered. It is shown in the numerical way, that the Bessel rings, i.e., the regions of high energy concentration can trap particles of positive polarizability (atoms in red detuned beams). This trapping occurs only in the plane perpendicular to the wave propagation, and the motion along the beam is unrestricted. When the beam is superposed with the plane wave of the same frequency propagating in the same direction, the particles are guided along helices, fixed in space. The shape of these helices depends on the parameters characterizing the electromagnetic fields but not on the initial state of guided particles. Depending on the vorticity of the Bessel beam, these helices can be made left or right handed. In the special case of zero vorticity, the helices get degenerated to the true, three dimensional rings, which can serve as 3D traps. The emerging structure of potential valleys can be applied to parallel guidance or capture several independent atoms, each in its own trap."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Automated machine vision enabled detection of movement disorders from hand drawn spirals. A widely used test for the diagnosis of Parkinson's disease (PD) and Essential tremor (ET) is hand drawn shapes,where the analysis is observationally performed by the examining neurologist. This method is subjective and is prone to bias amongst different physicians. Due to the similarities in the symptoms of the two diseases, they are often misdiagnosed.Studies which attempt to automate the process typically use digitized input, where the tablet or specialized equipment are not affordable in many clinical settings. This study uses a dataset of scanned pen and paper drawings and a convolutional neural network (CNN) to perform classification between PD, ET and control subjects. The discrimination accuracy of PD from controls was 98.2 . The discrimination accuracy of PD from ET and from controls was 92 . An ablation study was conducted and indicated that correct hyper parameter optimization can increases the accuracy up to 4.33 . Finally, the study indicates the viability of using a CNN enabled machine vision system to provide robust and accurate detection of movement disorders from hand drawn spirals."} {"_id": [47], "label": "math.AT", "text": "Real motivic and C 2 equivariant Mahowald invariants. We generalize the Mahowald invariant to the mathbb R motivic and C 2 equivariant settings. For all i 0 with i equiv 2,3 mod 4 , we show that the mathbb R motivic Mahowald invariant of (2 rho eta) i in pi 0,0 mathbb R (S 0,0 ) contains a lift of a certain element in Adams' classical v 1 periodic families, and for all i 0 , we show that the mathbb R motivic Mahowald invariant of eta i in pi i,i mathbb R (S 0,0 ) contains a lift of a certain element in Andrews' mathbb C motivic w 1 periodic families. We prove analogous results about the C 2 equivariant Mahowald invariants of (2 rho eta) i in pi 0,0 C 2 (S 0,0 ) and eta i in pi i,i C 2 (S 0,0 ) by leveraging connections between the classical, motivic, and equivariant stable homotopy categories. The infinite families we construct are some of the first periodic families of their kind studied in the mathbb R motivic and C 2 equivariant settings."} {"_id": [91, 51, 31], "label": "physics.bio-ph q-bio.GN q-bio.PE", "text": "Extreme antagonism arising from gene environment interactions. Antagonistic interactions in biological systems, which occur when one perturbation blunts the effect of another, are typically interpreted as evidence that the two perturbations impact the same cellular pathway or function. Yet, this interpretation ignores extreme antagonistic interactions wherein an otherwise deleterious perturbation compensates for the function lost due to a prior perturbation. Here, we report on gene environment interactions involving genetic mutations that are deleterious in a permissive environment but beneficial in a specific environment that restricts growth. These extreme antagonistic interactions constitute gene environment analogs of synthetic rescues previously observed for gene gene interactions. Our approach uses two independent adaptive evolution steps to address the lack of experimental methods to systematically identify such extreme interactions. We apply the approach to Escherichia coli by successively adapting it to defined glucose media without and with the antibiotic rifampicin. The approach identified multiple mutations that are beneficial in the presence of rifampicin and deleterious in its absence. The analysis of transcription shows that the antagonistic adaptive mutations repress a stringent response like transcriptional program, while non antagonistic mutations have an opposite transcriptional profile. Our approach represents a step toward the systematic characterization of extreme antagonistic gene drug interactions, which can be used to identify targets to select against antibiotic resistance."} {"_id": [33], "label": "physics.ins-det", "text": "A UV laser test bench for micro pattern gaseous detectors. UV lasers for the calibration of gaseous detectors have seen newfound employment with current generation micro pattern gaseous detectors (MPGDs), especially those devices not suitable for tests with traditional sources (e.g. cosmic rays or X ray beams) by design constraints. An apparatus made of a UV laser designed for the characterization of the fast timing MPGD (FTM) is here described, together with the measurements of gain curve and electron drift velocity performed on a prototype of Time Projection GEM (TPG) to validate the setup."} {"_id": [59, 39], "label": "cs.CY cs.SI", "text": "Dungeons for Science Mapping Belief Places and Spaces. Tabletop fantasy role playing games (TFRPGs) have existed in offline and online contexts for many decades, yet are rarely featured in scientific literature. This paper presents a case study where TFRPGs were used to generate and collect data for maps of belief environments using fiction co created by multiple small groups of online tabletop gamers. The affordances of TFRPGs allowed us to collect repeatable, targeted data in online field conditions. These data not only included terms that allowed us to build our maps, but also to explore nuanced ethical problems from a situated, collaborative perspective."} {"_id": [21, 46], "label": "math.CO math.AG", "text": "Basis shape loci and the positive Grassmannian. A basis shape locus takes as input data a zero nonzero pattern in an n times k matrix, which is equivalent to a presentation of a transversal matroid. The locus is defined as the set of points in the Grassmannian of k planes in mathbb R n which are the row space of a matrix with the prescribed zero nonzero pattern. We show that this locus depends only on the transversal matroid, not on the specific presentation. When a transversal matroid is a positroid, the closure of its basis shape locus is the associated positroid variety. We give a sufficient, and conjecturally necessary, condition for when a transversal matroid is a positroid. Finally, we discus applications to two programs for computing scattering amplitudes in mathcal N 4 SYM theory one trying to prove that projections of certain positroid cells triangulate the amplituhedron, and another using Wilson loop diagrams."} {"_id": [17, 52, 22, 57], "label": "cs.SE cs.DC cs.MA cs.PL", "text": "On Distributed Runtime Verification by Aggregate Computing. Runtime verification is a computing analysis paradigm based on observing a system at runtime (to check its expected behaviour) by means of monitors generated from formal specifications. Distributed runtime verification is runtime verification in connection with distributed systems it comprises both monitoring of distributed systems and using distributed systems for monitoring. Aggregate computing is a programming paradigm based on a reference computing machine that is the aggregate collection of devices that cooperatively carry out a computational process the details of behaviour, position and number of devices are largely abstracted away, to be replaced with a space filling computational environment. In this position paper we argue, by means of simple examples, that aggregate computing is particularly well suited for implementing distributed monitors. Our aim is to foster further research on how to generate aggregate computing monitors from suitable formal specifications."} {"_id": [32, 62], "label": "cs.DS cs.GT", "text": "Polyhedral value iteration for discounted games and energy games. We present a deterministic algorithm, solving discounted games with n nodes in n O(1) cdot (2 sqrt 2 ) n time. For bipartite discounted games our algorithm runs in n O(1) cdot 2 n time. Prior to our work no deterministic algorithm running in time 2 o(n log n) regardless of the discount factor was known. We call our approach polyhedral value iteration. We rely on a well known fact that the values of a discounted game can be found from the so called optimality equations. In the algorithm we consider a polyhedron obtained by relaxing optimality equations. We iterate points on the border of this polyhedron by moving each time along a carefully chosen shift as far as possible. This continues until the current point satisfies optimality equations. Our approach is heavily inspired by a recent algorithm of Dorfman et al. (ICALP 2019) for energy games. For completeness, we present their algorithm in terms of polyhedral value iteration. Our exposition, unlike the original algorithm, does not require edge weights to be integers and works for arbitrary real weights."} {"_id": [0], "label": "cs.CV", "text": "Visual search over billions of aerial and satellite images. We present a system for performing visual search over billions of aerial and satellite images. The purpose of visual search is to find images that are visually similar to a query image. We define visual similarity using 512 abstract visual features generated by a convolutional neural network that has been trained on aerial and satellite imagery. The features are converted to binary values to reduce data and compute requirements. We employ a hash based search using Bigtable, a scalable database service from Google Cloud. Searching the continental United States at 1 meter pixel resolution, corresponding to approximately 2 billion images, takes approximately 0.1 seconds. This system enables real time visual search over the surface of the earth, and an interactive demo is available at https search.descarteslabs.com."} {"_id": [18, 69], "label": "math.GT math.QA", "text": "Polynomial Invariants of Singular Knots and links. We generalize the notion of the quandle polynomial to the case of singquandles. We show that the singquandle polynomial is an invariant of finite singquandles. We also construct a singular link invariant from the singquandle polynomial and show that this new singular link invariant generalizes the singquandle counting invariant. In particular, using the new polynomial invariant, we can distinguish singular links with the same singquandle counting invariant."} {"_id": [31], "label": "q-bio.PE", "text": "Analyzing the World Wide Impact of Public Health Interventions on the Transmission Dynamics of COVID 19. We analyze changes in the reproduction number, R, of COVID 19 in response to public health interventions. Our results indicate that public health measures undertaken in China reduced R from 1.5 in January to 0.4 in mid March 2020. They also suggest, however, the limitations of isolation, quarantine, and large scale attempts to limit travel. While the world wide reproduction number briefly dropped below 1 as China implemented extensive public health measures, the introduction of the virus to other nations swiftly led to an increasing world wide average value of R. In Italy, the nation hardest hit following China, social distancing measures brought the local value of R down from 3.71 to 2.51. Nonetheless, the value of R in Italy persisted at levels well above 1, allowing for ongoing transmission. By mid March 2020, as COVID 19 spread in areas without extensive public health interventions in place, the world wide value of R increased to a level similar to that of late January."} {"_id": [64], "label": "physics.soc-ph", "text": "Generative models of simultaneously heavy tailed distributions of inter event times on nodes and edges. Intervals between discrete events representing human activities, as well as other types of events, often obey heavy tailed distributions, and their impacts on collective dynamics on networks such as contagion processes have been intensively studied. The literature supports that such heavy tailed distributions are present for inter event times associated with both individual nodes and individual edges in networks. However, the simultaneous presence of heavy tailed distributions of inter event times for nodes and edges is a non trivial phenomenon, and its origin has been elusive. In the present study, we propose a generative model and its variants to explain this phenomenon. We assume that each node independently transits between a high activity and low activity state according to a continuous time two state Markov process and that, for the main model, events on an edge occur at a high rate if and only if both end nodes of the edge are in the high activity state. In other words, two nodes interact frequently only when both nodes prefer to interact with others. The model produces distributions of inter event times for both individual nodes and edges that resemble heavy tailed distributions across some scales. It also produces positive correlation in consecutive inter event times, which is another stylized observation for empirical data of human activity. We expect that our modeling framework provides a useful benchmark for investigating dynamics on temporal networks driven by non Poissonian event sequences."} {"_id": [25, 49], "label": "math.PR math.OC", "text": "Optimal Stopping of Stochastic Transport Minimizing Submartingale Costs. Given a stochastic state process (X t) t and a real valued submartingale cost process (S t) t , we characterize optimal stopping times tau that minimize the expectation of S tau while realizing given initial and target distributions mu and nu , i.e., X 0 sim mu and X tau sim nu . A dual optimization problem is considered and shown to be attained under suitable conditions. The optimal solution of the dual problem then provides a contact set, which characterizes the location where optimal stopping can occur. The optimal stopping time is uniquely determined as the first hitting time of this contact set provided we assume a natural structural assumption on the pair (X t, S t) t , which generalizes the twist condition on the cost in optimal transport theory. This paper extends the Brownian motion settings studied in 15, 16 and deals with more general costs."} {"_id": [38], "label": "math.NT", "text": "Recurrences and Congruences for Higher order Geometric Polynomials and Related Numbers. We obtain new recurrence relations, an explicit formula, and convolution identities for higher order geometric polynomials. These relations generalize known results for geometric polynomials, and lead to congruences for higher order geometric polynomials, particularly for p Bernoulli numbers."} {"_id": [9], "label": "math.AP", "text": "Inviscid limit of the compressible Navier Stokes equations for asymptotically isothermal gases. We prove the existence of relative finite energy vanishing viscosity solutions of the one dimensional, isentropic Euler equations under the assumption of an asymptotically isothermal pressure law, that is, p( rho) rho O(1) in the limit rho to infty . This solution is obtained as the vanishing viscosity limit of classical solutions of the one dimensional, isentropic, compressible Navier Stokes equations. Our approach relies on the method of compensated compactness to pass to the limit rigorously in the nonlinear terms. Key to our strategy is the derivation of hyperbolic representation formulas for the entropy kernel and related quantities among others, a special entropy pair used to obtain higher uniform integrability estimates on the approximate solutions. Intricate bounding procedures relying on these representation formulas then yield the required compactness of the entropy dissipation measures. In turn, we prove that the Young measure generated by the classical solutions of the Navier Stokes equations reduces to a Dirac mass, from which we deduce the required convergence to a solution of the Euler equations."} {"_id": [23], "label": "math.FA", "text": "Sequence space representations for spaces of entire functions with rapid decay on strips. We obtain sequence space representations for a class of Fr 'echet spaces of entire functions with rapid decay on horizontal strips. In particular, we show that the projective Gelfand Shilov spaces Sigma 1 nu and Sigma nu 1 are isomorphic to Lambda infty (n 1 ( nu 1) ) for nu 0 ."} {"_id": [25, 23], "label": "math.PR math.FA", "text": "Rigidity of determinantal point processes on the unit disc with sub Bergman kernels. We give natural constructions of number rigid determinantal point processes on the unit disc mathbb D with sub Bergman kernels of the form K Lambda(z, w) sum n in Lambda (n 1) z n bar w n, quad z, w in mathbb D , with Lambda an infinite subset of the set of non negative integers. Our constructions are given both in a deterministic method and a probabilisitc method. In the deterministic method, our proofs involve the classical Bloch functions."} {"_id": [38], "label": "math.NT", "text": "Analogues of Alladi's formula over global function fields. In this paper, we show an analogue of Kural, McDonald and Sah's result on Alladi's formula for global function fields. Explicitly, we show that for a global function field K , if a set S of prime divisors has a natural density delta(S) within prime divisors, then lim n to infty sum substack 1 le deg D le n D in mathfrak D (K,S) frac mu(D) D delta(S), where mu(D) is the M \" o bius function on divisors and mathfrak D (K,S) is the set of all effective distinguishable divisors whose smallest prime factors are in S . As applications, we get the analogue of Dawsey's and Sweeting and Woo's results to the Chebotarev Density Theorem for function fields, and the analogue of Alladi's result to the Prime Polynomial Theorem for arithmetic progressions. We also display a connection between the M \"obius function and the Fourier coefficients of modular form associated to elliptic curves. The proof of our main theorem is similar to the approach in Kural et al.'s article."} {"_id": [49, 68], "label": "math.OC cs.DM", "text": "Continuous maximal covering location problems with interconnected facilities. In this paper we analyze a continuous version of the maximal covering location problem, in which the facilities are required to be interconnected by means of a graph structure in which two facilities are allowed to be linked if a given distance is not exceed. We provide a mathematical programming framework for the problem and different resolution strategies. First, we propose a Mixed Integer Non Linear Programming formulation, and derive properties of the problem that allow us to project the continuous variables out avoiding the nonlinear constraints, resulting in an equivalent pure integer programming formulation. Since the number of constraints in the integer programming formulation is large and the constraints are, in general, difficult to handle, we propose two branch cut approaches that avoid the complete enumeration of the constraints resulting in more efficient procedures. We report the results of an extensive battery of computational experiments comparing the performance of the different approaches."} {"_id": [29], "label": "math.GR", "text": "Finitely generated groups acting uniformly properly on hyperbolic space. We construct an uncountable sequence of groups acting uniformly properly on hyperbolic spaces. We show that only countably many of these groups can be virtually torsion free. This gives new examples of groups acting uniformly properly on hyperbolic spaces that are not virtually torsion free and cannot be subgroups of hyperbolic groups."} {"_id": [32, 21], "label": "cs.DS math.CO", "text": "Finding and counting permutations via CSPs. Permutation patterns and pattern avoidance have been intensively studied in combinatorics and computer science, going back at least to the seminal work of Knuth on stack sorting (1968). Perhaps the most natural algorithmic question in this area is deciding whether a given permutation of length n contains a given pattern of length k . In this work we give two new algorithms for this well studied problem, one whose running time is n k 4 o(k) , and a polynomial space algorithm whose running time is the better of O(1.6181 n) and O(n k 2 1 ) . These results improve the earlier best bounds of n 0.47k o(k) and O(1.79 n) due to Ahal and Rabinovich (2000) resp. Bruner and Lackner (2012) and are the fastest algorithms for the problem when k in Omega( log n ) . We show that both our new algorithms and the previous exponential time algorithms in the literature can be viewed through the unifying lens of constraint satisfaction. Our algorithms can also count, within the same running time, the number of occurrences of a pattern. We show that this result is close to optimal solving the counting problem in time f(k) cdot n o(k log k ) would contradict the exponential time hypothesis (ETH). For some special classes of patterns we obtain improved running times. We further prove that 3 increasing and 3 decreasing permutations can, in some sense, embed arbitrary permutations of almost linear length, which indicates that an algorithm with sub exponential running time is unlikely, even for patterns from these restricted classes."} {"_id": [0, 1, 28], "label": "cs.CV cs.CG cs.LG", "text": "Cyclic Functional Mapping Self supervised correspondence between non isometric deformable shapes. We present the first utterly self supervised network for dense correspondence mapping between non isometric shapes. The task of alignment in non Euclidean domains is one of the most fundamental and crucial problems in computer vision. As 3D scanners can generate highly complex and dense models, the mission of finding dense mappings between those models is vital. The novelty of our solution is based on a cyclic mapping between metric spaces, where the distance between a pair of points should remain invariant after the full cycle. As the same learnable rules that generate the point wise descriptors apply in both directions, the network learns invariant structures without any labels while coping with non isometric deformations. We show here state of the art results by a large margin for a variety of tasks compared to known self supervised and supervised methods."} {"_id": [45, 54], "label": "q-fin.PR q-fin.MF", "text": "Analysis on the Pricing model for a Discrete Coupon Bond with Early redemption provision by the Structural Approach. In this paper, using the structural approach is derived a mathematical model of the discrete coupon bond with the provision that allow the holder to demand early redemption at any coupon dates prior to the maturity and based on this model is provided some analysis including min max and gradient estimates of the bond price. Using these estimates the existence and uniqueness of the default boundaries and some relationships between the design parameters of the discrete coupon bond with early redemption provision are described. Then under some assumptions the existence and uniqueness of the early redemption boundaries is proved and the analytic formula of the bond price is provided using higher binary options. Finally for our bond is provided the analysis on the duration and credit spread, which are used widely in financial reality. Our works provide a design guide of the discrete coupon bond with the early redemption provision"} {"_id": [38], "label": "math.NT", "text": "Mean value of real characters using a double Dirichlet series. We study the double character sum sum limits substack m leq X, m odd sum limits substack n leq Y, n odd leg mn and its smoothly weighted counterpart. An asymptotic formula with power saving error term was obtained by Conrey, Farmer and Soundararajan by applying the Poisson summation formula. The result is interesting, because the main term involves a non smooth function. In this paper, we apply the inverse Mellin transform twice and study the resulting double integral that involves a double Dirichlet series. This method has two advantages it leads to a better error term, and the surprising main term naturally arises from three residues of the double Dirichlet series."} {"_id": [0], "label": "cs.CV", "text": "Dynamic Inference A New Approach Toward Efficient Video Action Recognition. Though action recognition in videos has achieved great success recently, it remains a challenging task due to the massive computational cost. Designing lightweight networks is a possible solution, but it may degrade the recognition performance. In this paper, we innovatively propose a general dynamic inference idea to improve inference efficiency by leveraging the variation in the distinguishability of different videos. The dynamic inference approach can be achieved from aspects of the network depth and the number of input video frames, or even in a joint input wise and network depth wise manner. In a nutshell, we treat input frames and network depth of the computational graph as a 2 dimensional grid, and several checkpoints are placed on this grid in advance with a prediction module. The inference is carried out progressively on the grid by following some predefined route, whenever the inference process comes across a checkpoint, an early prediction can be made depending on whether the early stop criteria meets. For the proof of concept purpose, we instantiate three dynamic inference frameworks using two well known backbone CNNs. In these instances, we overcome the drawback of limited temporal coverage resulted from an early prediction by a novel frame permutation scheme, and alleviate the conflict between progressive computation and video temporal relation modeling by introducing an online temporal shift module. Extensive experiments are conducted to thoroughly analyze the effectiveness of our ideas and to inspire future research efforts. Results on various datasets also evident the superiority of our approach."} {"_id": [25], "label": "math.PR", "text": "Persistence of hubs in growing random networks. We consider models of evolving networks mathcal G n n geq 0 modulated by two parameters an attachment function f mathbb N 0 to mathbb R and a (possibly random) attachment sequence m i i geq 1 . Starting with a single vertex, at each discrete step i geq 1 a new vertex v i enters the system with m i geq 1 edges which it sequentially connects to a pre existing vertex v in mathcal G i 1 with probability proportional to f( operatorname degree (v)) . We consider the problem of emergence of persistent hubs existence of a finite (a.s.) time n such that for all n geq n the identity of the maximal degree vertex (or in general the K largest degree vertices for K geq 1 ) does not change. We obtain general conditions on f and m i i geq 1 under which a persistent hub emerges, and also those under which a persistent hub fails to emerge. In the case of lack of persistence, for the specific case of trees ( m i equiv 1 for all i ), we derive asymptotics for the maximal degree and the index of the maximal degree vertex (time at which the vertex with current maximal degree entered the system) to understand the movement of the maximal degree vertex as the network evolves. A key role in the analysis is played by an inverse rate weighted martingale constructed from a continuous time embedding of the discrete time model. Asymptotics for this martingale, including concentration inequalities and moderate deviations, play a major role in the analysis of the model."} {"_id": [77], "label": "math.LO", "text": "Continuous Sentences Preserved Under Reduced Products. Answering a question of Cif 'u Lopes, we give a syntactic characterization of those continuous sentences that are preserved under reduced products of metric structures. In fact, we settle this question in the wider context of general structures as introduced by the second author."} {"_id": [13, 71], "label": "math.SG math.DS", "text": "The mathbb Z p mathbb Z equivariant product isomorphism in fixed point Floer cohomology. Let p geq 2 be a prime, and mathbb F p be the field with p elements. Extending a result of Seidel for p 2, we construct an isomorphism between the Floer cohomology of an exact or Hamiltonian symplectomorphism phi, with mathbb F p coefficients, and the mathbb Z p mathbb Z equivariant Tate Floer cohomology of its p th power phi p. The construction involves a Kaledin type quasi Frobenius map, as well as a mathbb Z p mathbb Z equivariant pants product an equivariant operation with p inputs and 1 output. Our method of proof involves a spectral sequence for the action filtration, and a local mathbb Z p mathbb Z equivariant coproduct providing an inverse on the E 2 page. This strategy has the advantage of accurately describing the effect of the isomorphism on filtration levels. We describe applications to the symplectic mapping class group, as well as develop Smith theory for the persistence module of a Hamiltonian diffeomorphism phi on symplectically aspherical symplectic manifolds. We illustrate the latter by giving a new proof of the celebrated no torsion theorem of Polterovich, and by relating the growth rate of the number of periodic points of the p k th iteration of phi and its distance to the identity. Along the way, we prove a sharpening of the classical Smith inequality for actions of mathbb Z p mathbb Z ."} {"_id": [49, 20, 6], "label": "math.NA cs.NA math.OC physics.flu-dyn", "text": "A unified framework to generate optimized compact finite difference schemes. A unified framework to derive optimized compact schemes for a uniform grid is presented. The optimal scheme coefficients are determined analytically by solving an optimization problem to minimize the spectral error subject to equality constraints that ensure specified order of accuracy. A rigorous stability analysis for the optimized schemes is also presented. We analytically prove the relation between order of a derivative and symmetry or skew symmetry of the optimal coefficients approximating it. We also show that other types of schemes e.g., spatially explicit, and biased finite differences, can be generated as special cases of the framework."} {"_id": [23], "label": "math.FA", "text": "Max plus convexity in Riesz spaces. We study max plus convexity in an Archimedean Riesz space E with an order unit un the definition of max plus convex sets is algebraic and we do not assume that E has an it a priori given topological structure. To the given unit un one can associate two equivalent norms norm cdot norm un and norm cdot norm hun on E the distance sf D hun on E associated to norm cdot norm hun is a geodesic distance for which max plus convex sets in E are geodesically closed sets. Under suitable assumptions, we establish max plus versions of some fixed points and continuous selection theorems that are well known for linear convex sets and we show that hyperspaces of compact max plus convex sets are Absolute Retracts."} {"_id": [1], "label": "cs.LG", "text": "Fast and Accurate Pseudoinverse with Sparse Matrix Reordering and Incremental Approach. How can we compute the pseudoinverse of a sparse feature matrix efficiently and accurately for solving optimization problems? A pseudoinverse is a generalization of a matrix inverse, which has been extensively utilized as a fundamental building block for solving linear systems in machine learning. However, an approximate computation, let alone an exact computation, of pseudoinverse is very time consuming due to its demanding time complexity, which limits it from being applied to large data. In this paper, we propose FastPI (Fast PseudoInverse), a novel incremental singular value decomposition (SVD) based pseudoinverse method for sparse matrices. Based on the observation that many real world feature matrices are sparse and highly skewed, FastPI reorders and divides the feature matrix and incrementally computes low rank SVD from the divided components. To show the efficacy of proposed FastPI, we apply them in real world multi label linear regression problems. Through extensive experiments, we demonstrate that FastPI computes the pseudoinverse faster than other approximate methods without loss of accuracy. and uses much less memory compared to full rank SVD based approach. Results imply that our method efficiently computes the low rank pseudoinverse of a large and sparse matrix that other existing methods cannot handle with limited time and space."} {"_id": [3], "label": "cs.CL", "text": "Dialectal Layers in West Iranian a Hierarchical Dirichlet Process Approach to Linguistic Relationships. This paper addresses a series of complex and unresolved issues in the historical phonology of West Iranian languages. The West Iranian languages (Persian, Kurdish, Balochi, and other languages) display a high degree of non Lautgesetzlich behavior. Most of this irregularity is undoubtedly due to language contact we argue, however, that an oversimplified view of the processes at work has prevailed in the literature on West Iranian dialectology, with specialists assuming that deviations from an expected outcome in a given non Persian language are due to lexical borrowing from some chronological stage of Persian. It is demonstrated that this qualitative approach yields at times problematic conclusions stemming from the lack of explicit probabilistic inferences regarding the distribution of the data Persian may not be the sole donor language additionally, borrowing at the lexical level is not always the mechanism that introduces irregularity. In many cases, the possibility that West Iranian languages show different reflexes in different conditioning environments remains under explored. We employ a novel Bayesian approach designed to overcome these problems and tease apart the different determinants of irregularity in patterns of West Iranian sound change. Our methodology allows us to provisionally resolve a number of outstanding questions in the literature on West Iranian dialectology concerning the dialectal affiliation of certain sound changes. We outline future directions for work of this sort."} {"_id": [20], "label": "math.NA cs.NA", "text": "Reconstructing the thermal phonon transmission coefficient at solid interfaces in the phonon transport equation. The ab initio model for heat propagation is the phonon transport equation, a Boltzmann like kinetic equation. When two materials are put side by side, the heat that propagates from one material to the other experiences thermal boundary resistance. Mathematically, it is represented by the reflection coefficient of the phonon transport equation on the interface of the two materials. This coefficient takes different values at different phonon frequencies, between different materials. In experiments scientists measure the surface temperature of one material to infer the reflection coefficient as a function of phonon frequency. In this article, we formulate this inverse problem in an optimization framework and apply the stochastic gradient descent (SGD) method for finding the optimal solution. We furthermore prove the maximum principle and show the Lipschitz continuity of the Fr 'echet derivative. These properties allow us to justify the application of SGD in this setup."} {"_id": [34, 13], "label": "math.DS math.CV", "text": "Exponential mixing property for automorphisms of compact K \"ahler manifolds. Let f be a holomorphic automorphism of a compact K \"ahler manifold. Assume moreover that f admits a unique maximal dynamic degree d p with only one eigenvalue of maximal modulus. Let mu be its equilibrium measure. In this paper, we prove that mu is exponentially mixing for all d.s.h. test functions."} {"_id": [20], "label": "math.NA cs.NA", "text": "A Krylov Schur like method for computing the best rank (r 1,r 2,r 3) approximation of large and sparse tensors. The paper is concerned with methods for computing the best low multilinear rank approximation of large and sparse tensors. Krylov type methods have been used for this problem here block versions are introduced. For the computation of partial eigenvalue and singular value decompositions of matrices the Krylov Schur (restarted Arnoldi) method is used. We describe a generalization of this method to tensors, for computing the best low multilinear rank approximation of large and sparse tensors. In analogy to the matrix case, the large tensor is only accessed in multiplications between the tensor and blocks of vectors, thus avoiding excessive memory usage. It is proved that, if the starting approximation is good enough, then the tensor Krylov Schur method is convergent. Numerical examples are given for synthetic tensors and sparse tensors from applications, which demonstrate that for most large problems the Krylov Schur method converges faster and more robustly than higher order orthogonal iteration."} {"_id": [64], "label": "physics.soc-ph", "text": "Robustness of football passing networks against continuous node and link removals. We can construct passing networks when we regard a player as a node and a pass as a link in football games. Thus, we can analyze the networks by using tools developed in network science. Among various metrics characterizing a network, centrality metrics have often been used to identify key players in a passing network. However, a tolerance to players being marked or passes being blocked in a passing network, namely the robustness of the network, has been poorly understood so far. Because the robustness of a passing network can be connected to the increase of ball possession, it would be deeply related to the outcome of a game. Here, we developed position dependent passing networks of 45 matches by 18 teams belonging to the Japan Professional Football League. Then, nodes or links were continuously removed from the passing networks by two removal methods so that we could evaluate the robustness of these networks against the removals. The results show that these passing networks commonly contain hubs (key players making passes). Then, we analyzed the most robust networks in detail and found that their full backs increase the robustness by often invoking a heavier emphasis on attack. Moreover, we showed that the robustness of the passing networks and the team performance have a positive correlation."} {"_id": [46, 78], "label": "math.AC math.AG", "text": "B 'ezoutians and injectivity of polynomial maps. We prove that an endomorphism f of affine space is injective on rational points if its B 'ezoutian is constant. Similarly, f is injective at a given rational point if its reduced B 'ezoutian is constant. We also show that if the Jacobian determinant of f is invertible, then f is injective at a given rational point if and only if its reduced B 'ezoutian is constant."} {"_id": [18], "label": "math.GT", "text": "A vanishing identity on adjoint Reidemeister torsions of twist knots. For a compact oriented 3 manifold with torus boundary the adjoint Reidemeister torsion is defined as a function on the mathrm SL 2( mathbb C ) character variety depending on a choice of a boundary curve. Under reasonable assumptions, it is conjectured that the adjoint torsion satisfies a certain type of vanishing identities. In this paper, we prove that the conjecture holds for all hyperbolic twist knot exteriors by using Jacobi's residue theorem."} {"_id": [65], "label": "cs.NI", "text": "Design and Implementation of a Wireless SensorNetwork for Agricultural Applications. We present the design and implementation of a shortest path tree based, energy efficient data collection wireless sensor network to sense various parameters in an agricultural farm using in house developed low cost sensors. Nodes follow a synchronized, periodic sleep wake up schedule to maximize the lifetime of the network. The implemented network consists of 24 sensor nodes in a 3 acre maize farm and its performance is captured by 7 snooper nodes for different data collection intervals 10 minutes, 1 hour and 3 hours. The almost static nature of wireless links in the farm motivated us to use the same tree for a long data collection period(3 days). The imbalance in energy consumption across nodes is observed to be very small and the network architecture uses easy to implement protocols to perform different network activities including handling of node failures. We present the results and analysis of extensive tests conducted on our implementation, which provide significant insights."} {"_id": [26, 21, 46], "label": "math.AG math.CO math.RT", "text": "Equivariant K theory and tangent spaces to Schubert varieties. Tangent spaces to Schubert varieties of type A were characterized by Lakshmibai and Seshadri. This result was extended to the other classical types by Lakshmibai. We give a uniform characterization of tangent spaces to Schubert varieties in cominuscule G P. Our results extend beyond cominuscule G P they describe the tangent space to any Schubert variety in G B at a point xB, where x is a cominuscule Weyl group element in the sense of Peterson. Our results also give partial information about the tangent space to any Schubert variety at any point. Our method is to describe the tangent spaces of Kazhdan Lusztig varieties, and then recover results for Schubert varieties. Our proof uses a relationship between weights of the tangent space of a variety with torus action, and factors of the class of the variety in torus equivariant K theory. The proof relies on a formula for Schubert classes in equivariant K theory due to Graham and Willems, as well as a theorem on subword complexes due to Knutson and Miller."} {"_id": [68, 21], "label": "math.CO cs.DM", "text": "On Generalized Regularity. Szemeredi's regularity lemma is one instance in a family of regularity lemmas, replacing the definition of density of a graph by a more general coefficient. Recently, Fan Chung proved another instance, a regularity lemma for clustering graphs, and asked whether good upper bounds could be derived for the quantitative estimates it supplies. We answer this question in the negative, for every generalized regularity lemma."} {"_id": [0], "label": "cs.CV", "text": "Efficient Video Semantic Segmentation with Labels Propagation and Refinement. This paper tackles the problem of real time semantic segmentation of high definition videos using a hybrid GPU CPU approach. We propose an Efficient Video Segmentation(EVS) pipeline that combines (i) On the CPU, a very fast optical flow method, that is used to exploit the temporal aspect of the video and propagate semantic information from one frame to the next. It runs in parallel with the GPU. (ii) On the GPU, two Convolutional Neural Networks A main segmentation network that is used to predict dense semantic labels from scratch, and a Refiner that is designed to improve predictions from previous frames with the help of a fast Inconsistencies Attention Module (IAM). The latter can identify regions that cannot be propagated accurately. We suggest several operating points depending on the desired frame rate and accuracy. Our pipeline achieves accuracy levels competitive to the existing real time methods for semantic image segmentation(mIoU above 60 ), while achieving much higher frame rates. On the popular Cityscapes dataset with high resolution frames (2048 x 1024), the proposed operating points range from 80 to 1000 Hz on a single GPU and CPU."} {"_id": [1, 53], "label": "q-fin.RM cs.LG", "text": "Improving Investment Suggestions for Peer to Peer (P2P) Lending via Integrating Credit Scoring into Profit Scoring. In the peer to peer (P2P) lending market, lenders lend the money to the borrowers through a virtual platform and earn the possible profit generated by the interest rate. From the perspective of lenders, they want to maximize the profit while minimizing the risk. Therefore, many studies have used machine learning algorithms to help the lenders identify the \"best\" loans for making investments. The studies have mainly focused on two categories to guide the lenders' investments one aims at minimizing the risk of investment (i.e., the credit scoring perspective) while the other aims at maximizing the profit (i.e., the profit scoring perspective). However, they have all focused on one category only and there is seldom research trying to integrate the two categories together. Motivated by this, we propose a two stage framework that incorporates the credit information into a profit scoring modeling. We conducted the empirical experiment on a real world P2P lending data from the US P2P market and used the Light Gradient Boosting Machine (lightGBM) algorithm in the two stage framework. Results show that the proposed two stage method could identify more profitable loans and thereby provide better investment guidance to the investors compared to the existing one stage profit scoring alone approach. Therefore, the proposed framework serves as an innovative perspective for making investment decisions in P2P lending."} {"_id": [82], "label": "q-bio.MN", "text": "Effect of transcription reinitiation in stochastic gene expression. Gene expression (GE) is an inherently random or stochastic or noisy process. The randomness in different steps of GE, e.g., transcription, translation, degradation, etc., leading to cell to cell variations in mRNA and protein levels. This variation appears in organisms ranging from microbes to metazoans. Stochastic gene expression has important consequences for cellular function. The random fluctuations in protein levels produce variability in cellular behavior. It is beneficial in some contexts and harmful to others. These situations include stress response, metabolism, development, cell cycle, circadian rhythms, and aging. Different model studies e.g., constitutive, two state, etc., reveal that the fluctuations in mRNA and protein levels arise from different steps of gene expression among which the steps in transcription have the maximum effect. The pulsatile mRNA production through RNAP II based reinitiation of transcription is an important part of gene transcription. Though, the effect of that process on mRNA and protein levels is very little known. The addition of any biochemical step in the constitutive or two state process generally decreases the mean and increases the Fano factor. In this study, we have shown that the RNAP II based reinitiation process in gene transcription can have different effects on both mean and Fano factor at mRNA levels in different model systems. It decreases the mean and Fano factor both at the mRNA levels in the constitutive network whereas in other networks it can simultaneously increase or decrease both quantities or it can have mixed effect at mRNA levels. We propose that a constitutive network with reinitiation behaves like a product independent negative feedback circuit whereas other networks behave as either product independent positive or negative or mixed feedback circuit."} {"_id": [9], "label": "math.AP", "text": "Invariant subspaces and exact solutions for some types of scalar and coupled time space fractional diffusion equations. We explain how the invariant subspace method can be extended to a scalar and coupled system of time space fractional partial differential equations. The effectiveness and applicability of the method have been illustrated through time space (i) fractional diffusion convection equation, (ii) fractional reaction diffusion equation, (iii) fractional diffusion equation with source term, (iv) two coupled system of the fractional diffusion equation, (v) two coupled system of fractional stationary transonic plane parallel gas flow equation and (vi) three coupled system of fractional Hirota Satsuma KdV equation. Also, we explicitly presented how to derive more than one exact solution of the equations as mentioned above using the invariant subspace method."} {"_id": [54, 30], "label": "q-fin.ST q-fin.MF", "text": "Implied and Realized Volatility A Study of Distributions and the Distribution of Difference. We study distributions of realized variance (squared realized volatility) and squared implied volatility, as represented by VIX and VXO indices. We find that Generalized Beta distribution provide the best fits. These fits are much more accurate for realized variance than for squared VIX and VXO possibly another indicator that the latter have deficiencies in predicting the former. We also show that there are noticeable differences between the distributions of the 1970 2017 realized variance and its 1990 2017 portion, for which VIX and VXO became available. This may be indicative of a feedback effect that implied volatility has on realized volatility. We also discuss the distribution of the difference between squared implied volatility and realized variance and show that, at the basic level, it is consistent with Pearson's correlations obtained from linear regression."} {"_id": [25], "label": "math.PR", "text": "Mean field limit of Age and Leaky Memory dependent Hawkes processes. We propose a mean field model of interacting point processes where each process has a memory of the time elapsed since its last event (age) and its recent past (leaky memory), generalizing Age dependent Hawkes processes. The model is motivated by interacting nonlinear Hawkes processes with Markovian self interaction and networks of spiking neurons with adaptation and short term synaptic plasticity. By proving propagation of chaos and using a path integral representation for the law of the limit process, we show that, in the mean field limit, the empirical measure of the system follows a multidimensional nonlocal transport equation."} {"_id": [46], "label": "math.AG", "text": "Periodic Higgs bundles over curves. In this article, we study periodic Higgs bundles and their applications. We obtain the following results i). an elliptic curve has infinitely many primes of supersingular reduction if and only if any periodic Higgs bundle over it is a direct sum of torsion line bundles ii). the uniformizing de Rham bundle attached to a generic projective hyperbolic curve is not one periodic, and it is motivic iff it admits a modular embedding (e.g. Shimura curves, triangle curves) iii). there is an explicit Deuring Eichler mass formula for the Newton jumping locus a Shimura curve of Hodge type. We propose the periodic Higgs conjecture, which would imply an arithmetic Simpson correspondence. The conjecture holds in rank one case."} {"_id": [1, 2, 3], "label": "cs.AI cs.CL cs.LG", "text": "Towards a Metric for Automated Conversational Dialogue System Evaluation and Improvement. We present \"AutoJudge\", an automated evaluation method for conversational dialogue systems. The method works by first generating dialogues based on self talk, i.e. dialogue systems talking to itself. Then, it uses human ratings on these dialogues to train an automated judgement model. Our experiments show that AutoJudge correlates well with the human ratings and can be used to automatically evaluate dialogue systems, even in deployed systems. In a second part, we attempt to apply AutoJudge to improve existing systems. This works well for re ranking a set of candidate utterances. However, our experiments show that AutoJudge cannot be applied as reward for reinforcement learning, although the metric can distinguish good from bad dialogues. We discuss potential reasons, but state here already that this is still an open question for further research."} {"_id": [8, 5, 7], "label": "physics.optics physics.comp-ph physics.plasm-ph", "text": "Efficient near field to far field transformations for quasinormal modes of optical cavities and plasmonic resonators. We describe an efficient near field to far field transformation for optical quasinormal modes, which are the dissipative modes of open cavities and plasmonic resonators with complex eigenfrequencies. As an application of the theory, we show how one can compute the reservoir modes (or regularized quasinormal modes) outside the resonator, which are essential to use in both classical and quantum optics. We subsequently demonstrate how to efficiently compute the quantum optical parameters necessary in the theory of quantized quasinormal modes Franke et al., Phys. Rev. Lett. 122, 213901 (2019) . To confirm the accuracy of our technique, we directly compare with a Dyson equation approach currently used in the literature (in regimes where this is possible), and demonstrate several order of magnitude improvement for the calculation run times. We also introduce an efficient pole approximation for computing the quantized quasinormal mode parameters, since they require an integration over a range of frequencies. Using this approach, we show how to compute regularized quasinormal modes and quantum optical parameters for a full 3D metal dimer in under one minute on a standard desktop computer. Our technique is exemplified by studying the quasinormal modes of metal dimers and a hybrid structure consisting of a gold dimer on top of a photonic crystal beam. In the latter example, we show how to compute the quantum optical parameters that describe a pronounced Fano resonance, using structural geometries that cannot practically be solved using a Dyson equation approach. All calculations for the spontaneous emission rates are confirmed with full dipole calculations in Maxwell's equations and are shown to be in excellent agreement."} {"_id": [12], "label": "math.CA", "text": "The explicit formula for solution of anomalous diffusion equation in the multi dimensional space. This paper intends on obtaining the explicit solution of n dimensional anomalous diffusion equation in the infinite domain with non zero initial condition and vanishing condition at infinity. It is shown that this equation can be derived from the parabolic integro differential equation with memory in which the kernel is t alpha E 1 alpha, 1 alpha ( t 1 alpha ), alpha in(0, 1), where E alpha, beta is the Mittag Liffler function. Based on Laplace and Fourier transforms the properties of the Fox H function and convolution theorem, explicit solution for anomalous diffusion equation is obtained."} {"_id": [9, 76, 23, 26, 29], "label": "math.FA math.AP math.GR math.RT math.SP", "text": "On the multiplier problem for the ball on graded Lie groups. In this note, we consider a non commutative analogy of the classical Fefferman multiplier problem for the ball. More precisely, if chi is the characteristic function of the unit interval I 0,1 , we investigate a family of differential operators mathcal R on a graded Lie group G, for which the multipliers chi( mathcal R ) are bounded on L p(G), if and only if p 2."} {"_id": [3], "label": "cs.CL", "text": "Taxonomical hierarchy of canonicalized relations from multiple Knowledge Bases. This work addresses two important questions pertinent to Relation Extraction (RE). First, what are all possible relations that could exist between any two given entity types? Second, how do we define an unambiguous taxonomical (is a) hierarchy among the identified relations? To address the first question, we use three resources Wikipedia Infobox, Wikidata, and DBpedia. This study focuses on relations between person, organization and location entity types. We exploit Wikidata and DBpedia in a data driven manner, and Wikipedia Infobox templates manually to generate lists of relations. Further, to address the second question, we canonicalize, filter, and combine the identified relations from the three resources to construct a taxonomical hierarchy. This hierarchy contains 623 canonical relations with highest contribution from Wikipedia Infobox followed by DBpedia and Wikidata. The generated relation list subsumes an average of 85 of relations from RE datasets when entity types are restricted."} {"_id": [77, 29], "label": "math.GR math.LO", "text": "Axiomatisability of the Class of Monolithic Groups in a Variety of Nilpotent Groups. The class of all subdirectly irreducible groups belonging to a variety generated by a finite nilpotent group can be axiomatised by a finite set of elementary sentences."} {"_id": [65, 62], "label": "cs.GT cs.NI", "text": "The Value of Information in Selfish Routing. Path selection by selfish agents has traditionally been studied by comparing social optima and equilibria in the Wardrop model, i.e., by investigating the Price of Anarchy in selfish routing. In this work, we refine and extend the traditional selfish routing model in order to answer questions that arise in emerging path aware Internet architectures. The model enables us to characterize the impact of different degrees of congestion information that users possess. Furthermore, it allows us to analytically quantify the impact of selfish routing, not only on users, but also on network operators. Based on our model, we show that the cost of selfish routing depends on the network topology, the perspective (users versus network operators), and the information that users have. Surprisingly, we show analytically and empirically that less information tends to lower the Price of Anarchy, almost to the optimum. Our results hence suggest that selfish routing has modest social cost even without the dissemination of path load information."} {"_id": [40, 1, 3], "label": "cs.CL cs.IR cs.LG", "text": "NutCracker at WNUT 2020 Task 2 Robustly Identifying Informative COVID 19 Tweets using Ensembling and Adversarial Training. We experiment with COVID Twitter BERT and RoBERTa models to identify informative COVID 19 tweets. We further experiment with adversarial training to make our models robust. The ensemble of COVID Twitter BERT and RoBERTa obtains a F1 score of 0.9096 (on the positive class) on the test data of WNUT 2020 Task 2 and ranks 1st on the leaderboard. The ensemble of the models trained using adversarial training also produces similar result."} {"_id": [49], "label": "math.OC", "text": "Utilizing the redundant constraints for the uplift payment elimination. A power market with non convexities may not have an equilibrium price for power that provides economic stability of the centralized dispatch outcome. In this case, the market players are entitled to receive the uplift payments that compensate the economic profit lost when following the centralized dispatch. We consider a special class of the (possibly non linear) redundant constraints that are redundant not only on the feasible set of the centralized dispatch optimization problem (and, therefore, do not change the centralized dispatch outcome) but also on the larger set obtained when the power balance constraint is relaxed. We show that the Lagrangian relaxation of these redundant constraints may reduce the uplift payments without changing the duality gap. For any given market price (or a pricing algorithm that sets the producer revenue as a function of its output volume) in a uninode multi period power market with fixed load, we explicitly construct a family of the redundant constraints that do not change the maximum profit of the producer and result in zero uplift payment. We show that the introduction and subsequent Lagrangian relaxation of just one redundant constraint in the centralized dispatch problem suffice to eliminate the uplift payments for all the producers. In the case of the convex hull pricing method, the introduction of these redundant constraints affects neither the duality gap nor the market price for power. The results can be straightforwardly generalized to a power market with the price sensitive load."} {"_id": [64], "label": "physics.soc-ph", "text": "On COVID 19 Modelling. This contribution analyzes the COVID 19 outbreak by comparably simple mathematical and numerical methods. The final goal is to predict the peak of the epidemic outbreak per country with a reliable technique. This is done by an algorithm motivated by standard SIR models and aligned with the standard data provided by the Johns Hopkins University. To reconstruct data for the unregistered Infected, the algorithm uses current values of the infection fatality rate and a data driven estimation of a specific form of the recovery rate. All other ingredients are data driven as well. Various examples of predictions are provided for illustration."} {"_id": [33, 11], "label": "physics.ins-det physics.app-ph", "text": "An Air Suspension to Demonstrate the Properties of Torsion Balances with Fibres of Zero Length. We report on the design and characterisation of an air bearing suspension that has been constructed to highlight the properties of torsion balances with fibres of zero length. A float is levitated on this suspension and its rotational and translational motion in the horizontal plane of the laboratory is controlled using magnetic actuators. We demonstrate the in situ electromagnetic tuning of the float's centre of buoyancy to an accuracy of pm 0.3 mm, which was limited by the noise in the air bearing. The rotational stiffness of the float, which is approximately zero by design, was also measured. We compare the observed behaviour of the float with the predictions of a detailed model of the statics of the float actuator system. Finally, we briefly discuss the application of these ideas and results to the construction of sensitive devices for the measurement of weak forces with short ranges."} {"_id": [0], "label": "cs.CV", "text": "Spatio temporal Tubelet Feature Aggregation and Object Linking in Videos. This paper addresses the problem of how to exploit spatio temporal information available in videos to improve the object detection precision. We propose a two stage object detector called FANet based on short term spatio temporal feature aggregation to give a first detection set, and long term object linking to refine these detections. Firstly, we generate a set of short tubelet proposals containing the object in N consecutive frames. Then, we aggregate RoI pooled deep features through the tubelet using a temporal pooling operator that summarizes the information with a fixed size output independent of the number of input frames. On top of that, we define a double head implementation that we feed with spatio temporal aggregated information for spatio temporal object classification, and with spatial information extracted from the current frame for object localization and spatial classification. Furthermore, we also specialize each head branch architecture to better perform in each task taking into account the input data. Finally, a long term linking method builds long tubes using the previously calculated short tubelets to overcome detection errors. We have evaluated our model in the widely used ImageNet VID dataset achieving a 80.9 mAP, which is the new state of the art result for single models. Also, in the challenging small object detection dataset USC GRAD STDdb, our proposal outperforms the single frame baseline by 5.4 mAP."} {"_id": [18, 21], "label": "math.GT math.CO", "text": "Algebraic k systems of curves. A collection Delta of simple closed curves on an orientable surface is an algebraic k system if the algebraic intersection number langle alpha, beta rangle is equal to k in absolute value for every alpha , beta in Delta distinct. Generalizing a theorem of MRT14 we compute that the maximum size of an algebraic k system of curves on a surface of genus g is 2g 1 when g ge 3 or k is odd, and 2g otherwise. To illustrate the tightness in our assumptions, we present a construction of curves pairwise geometrically intersecting twice whose size grows as g 2 ."} {"_id": [41], "label": "cs.RO", "text": "Variational Inference with Mixture Model Approximation Robotic Applications. We propose a method to approximate the distribution of robot configurations satisfying multiple objectives. Our approach uses variational inference, a popular method in Bayesian computation, which has several advantages over sampling based techniques. To be able to represent the complex and multimodal distribution of configurations, we propose to use a mixture model as approximate distribution, an approach that has gained popularity recently. In this work, we show the interesting properties of this approach and how it can be applied to a wide range of problems in robotics."} {"_id": [36, 7], "label": "physics.chem-ph physics.comp-ph", "text": "Isotope Effects in Liquid Water via Deep Potential Molecular Dynamics. A comprehensive microscopic understanding of ambient liquid water is a major challenge for ab initio simulations as it simultaneously requires an accurate quantum mechanical description of the underlying potential energy surface (PES) as well as extensive sampling of configuration space. Due to the presence of light atoms (e.g., H or D), nuclear quantum fluctuations lead to observable changes in the structural properties of liquid water (e.g., isotope effects), and therefore provide yet another challenge for ab initio approaches. In this work, we demonstrate that the combination of dispersion inclusive hybrid density functional theory (DFT), the Feynman discretized path integral (PI) approach, and machine learning (ML) constitutes a versatile ab initio based framework that enables extensive sampling of both thermal and nuclear quantum fluctuations on a quite accurate underlying PES. In particular, we employ the recently developed deep potential molecular dynamics (DPMD) model a neural network representation of the ab initio PES in conjunction with a PI approach based on the generalized Langevin equation (PIGLET) to investigate how isotope effects influence the structural properties of ambient liquid H 2 O and D 2 O. Through a detailed analysis of the interference differential cross sections as well as several radial and angular distribution functions, we demonstrate that this approach can furnish a semi quantitative prediction of these subtle isotope effects."} {"_id": [33], "label": "physics.ins-det", "text": "The Cesium Source Calibration and Monitoring System of the ATLAS Tile Calorimeter Design, Construction and Results. This article describes the design, construction and use of a calibration and monitoring system, based on movable 137Cs gamma ray sources, for the ATLAS Tile Calorimeter (TileCal). The sources, propelled by a water based liquid through tubes that traverse all the calorimeter's cells, produce signals that precisely characterise the response of each tile, thereby providing very granular and accurate data on the response of TileCal to particles. The system has been used to guide and control the quality of the optical instrumentation of all TileCal modules, to set and equalise the dynamic range of the response to physics data, and to set the energy scale of the readout system. In the ATLAS cavern, periodic measurements of the whole detector's response to 137Cs sources allow monitoring the uniformity and stability of all the calorimeter's cells as well as maintaining precise knowledge of its energy calibration. The design of the source hydraulic drive system's hardware and software, the data acquisition system and the data processing algorithms are described. Finally, the results of this two decade program are shown."} {"_id": [13], "label": "math.DS", "text": "Global phase amplitude description of oscillatory dynamics via the parameterization method. In this paper we use the parameterization method to provide a complete description of the dynamics of an n dimensional oscillator beyond the classical phase reduction. The parameterization method allows, via efficient algorithms, to obtain a parameterization of the attracting invariant manifold of the limit cycle in terms of the phase amplitude variables. The method has several advantages. It provides analytically a Fourier Taylor expansion of the parameterization up to any order, as well as a simplification of the dynamics that allows for a numerical globalization of the manifolds. Thus, one can obtain the local and global isochrons and isostables, including the slow attracting manifold, up to high accuracy, which offer a geometrical portrait of the oscillatory dynamics. Furthermore, it provides straightforwardly the infinitesimal Phase and Amplitude Response Functions, that is, the extended infinitesimal Phase and Amplitude Response Curves, which monitor the phase and amplitude shifts beyond the asymptotic state. Thus, the methodology presented yields an accurate description of the phase dynamics for perturbations not restricted to the limit cycle but to its attracting invariant manifold. Finally, we explore some strategies to reduce the dimension of the dynamics, including the reduction of the dynamics to the slow stable submanifold. We illustrate our methods by applying them to different three dimensional single neuron and neural population models in neuroscience."} {"_id": [0], "label": "cs.CV", "text": "Spatio Temporal Graph for Video Captioning with Knowledge Distillation. Video captioning is a challenging task that requires a deep understanding of visual scenes. State of the art methods generate captions using either scene level or object level information but without explicitly modeling object interactions. Thus, they often fail to make visually grounded predictions, and are sensitive to spurious correlations. In this paper, we propose a novel spatio temporal graph model for video captioning that exploits object interactions in space and time. Our model builds interpretable links and is able to provide explicit visual grounding. To avoid unstable performance caused by the variable number of objects, we further propose an object aware knowledge distillation mechanism, in which local object information is used to regularize global scene features. We demonstrate the efficacy of our approach through extensive experiments on two benchmarks, showing our approach yields competitive performance with interpretable predictions."} {"_id": [49, 1], "label": "math.OC cs.LG", "text": "Scalable Derivative Free Optimization for Nonlinear Least Squares Problems. Derivative free or zeroth order optimization (DFO) has gained recent attention for its ability to solve problems in a variety of application areas, including machine learning, particularly involving objectives which are stochastic and or expensive to compute. In this work, we develop a novel model based DFO method for solving nonlinear least squares problems. We improve on state of the art DFO by performing dimensionality reduction in the observational space using sketching methods, avoiding the construction of a full local model. Our approach has a per iteration computational cost which is linear in problem dimension in a big data regime, and numerical evidence demonstrates that, compared to existing software, it has dramatically improved runtime performance on overdetermined least squares problems."} {"_id": [56], "label": "cs.LO", "text": "Formula Transformers and Combinatorial Test Generators for Propositional Intuitionistic Theorem Provers. We develop combinatorial test generation algorithms for progressively more powerful theorem provers, covering formula languages ranging from the implicational fragment of intuitionistic logic to full intuitionistic propositional logic. Our algorithms support exhaustive and random generators for formulas of these logics. To provide known to be provable formulas, via the Curry Howard formulas as types correspondence, we use generators for typable lambda terms and combinator expressions. Besides generators for several classes of formulas, we design algorithms that restrict formula generation to canonical representatives among equiprovable formulas and introduce program transformations that reduce formulas to equivalent formulas of a simpler structure. The same transformations, when applied in reverse, create harder formulas that can catch soundness or incompleteness bugs. To test the effectiveness of the testing framework itself, we describe use cases for deriving lightweight theorem provers for several of these logics and for finding bugs in known theorem provers. Our Prolog implementation available at https github.com ptarau TypesAndProofs and a subset of formula generators and theorem provers, implemented in Python is available at https github.com ptarau PythonProvers. Keywords term and formula generation algorithms, Prolog based theorem provers, formulas as types, type inference and type inhabitation, combinatorial testing, finding bugs in theorem provers."} {"_id": [78], "label": "math.AC", "text": "Lyubeznik numbers, F modules and modules of generalized fractions. This paper presents an algorithm for calculation of the Lyubeznik numbers of a local ring which is a homomorphic image of a regular local ring R of prime characteristic. The methods used employ Lyubeznik's F modules over R , particularly his F finite F modules, and also the modules of generalized fractions of Sharp and Zakeri. It is shown that many modules of generalized fractions over R have natural structures as F modules these lead to F module structures on certain local cohomology modules over R , which are exploited, in conjunction with F module structures on injective R modules that result from work of Huneke and Sharp, to compute Lyubeznik numbers. The resulting algorithm has been implemented in Macaulay2."} {"_id": [0, 41], "label": "cs.RO cs.CV", "text": "On line and on board planning and perception for quadrupedal locomotion. We present a legged motion planning approach for quadrupedal locomotion over challenging terrain. We decompose the problem into body action planning and footstep planning. We use a lattice representation together with a set of defined body movement primitives for computing a body action plan. The lattice representation allows us to plan versatile movements that ensure feasibility for every possible plan. To this end, we propose a set of rules that define the footstep search regions and footstep sequence given a body action. We use Anytime Repairing A (ARA ) search that guarantees bounded suboptimal plans. Our main contribution is a planning approach that generates on line versatile movements. Experimental trials demonstrate the performance of our planning approach in a set of challenging terrain conditions. The terrain information and plans are computed on line and on board."} {"_id": [84], "label": "physics.acc-ph", "text": "Radiation instability of a relativistic electron beam into a split cavity resonator. The radiation instability in a split cavity asymmetric resonator is considered for the relativistic case. The space charge of an electron beam is taken into account. In the small signal approximation, the energy loss by particles passing through the resonator and the modulation of beam current are investigated. Based on analytical and numerical calculations, it is shown that the symmetric configuration of a split cavity resonator provides the highest rate of instability growth. It is shown that the beam modulation and the efficiency of energy transfer from particles to electromagnetic field decrease with the increase in the initial electron energy. The increase in beam density has a positive effect on the radiation instability growth. It is important to take into account the obtained results when developing generators of electromagnetic radiation and systems for modulating the beam current based on a split cavity resonator."} {"_id": [11], "label": "physics.app-ph", "text": "Crack initiation of printed lines predicted with digital image correlation. Printing of metallic films has been preferred for roll to roll processes over vacuum technologies due to faster processing times and lower processing costs. Films can be produced by depositing inks containing suspended metallic particles within a solvent and then heating the films to both remove the solvent and sinter the particles. The resulting printed structure, electrical and mechanical behavior of the printed films has been studied to better understand their electro mechanical response to loading and eventual brittle fracture. This study evaluated the electro mechanical behavior of 1.25 mu m printed Ag films using in situ resistance and in situ imaging methods. Digital image correlation was utilized with confocal laser scanning microscope images to better visualize crack initiation during tensile straining. This technique showed that cracks initiated earlier in the thicker areas of the film (crests) than in lower areas (troughs) because of a higher density of printing defects and the increased thickness."} {"_id": [49, 28], "label": "math.OC cs.CG", "text": "Short simplex paths in lattice polytopes. The goal of this paper is to design a simplex algorithm for linear programs on lattice polytopes that traces short' simplex paths from any given vertex to an optimal one. We consider a lattice polytope P contained in 0,k n and defined via m linear inequalities. Our first contribution is a simplex algorithm that reaches an optimal vertex by tracing a path along the edges of P of length in O(n 4 k log(nk) . The length of this path is independent from m and it is the best possible up to a polynomial function. In fact, it is only polynomially far from the worst case diameter, which roughly grows as a linear function in n and k . Motivated by the fact that most known lattice polytopes are defined via 0, pm 1 constraint matrices, our second contribution is an iterative algorithm which exploits the largest absolute value alpha of the entries in the constraint matrix. We show that the length of the simplex path generated by the iterative algorithm is in O(n 2k log(nk alpha)) . In particular, if alpha is bounded by a polynomial in n, k , then the length of the simplex path is in O(n 2k log(nk)) . For both algorithms, the number of arithmetic operations needed to compute the next vertex in the path is polynomial in n , m and log k . If k is polynomially bounded by n and m , the algorithm runs in strongly polynomial time."} {"_id": [72, 15], "label": "cs.IT cs.PF math.IT", "text": "Hardware and Interference Limited Cooperative CR NOMA Networks under Imperfect SIC and CSI. The conflation of cognitive radio (CR) and nonorthogonal multiple access (NOMA) concepts is a promising approach to fulfil the massive connectivity goals of future networks given the spectrum scarcity. Accordingly, this letter investigates the outage performance of imperfect cooperative CR NOMA networks under hardware impairments and interference. Our analysis is involved with the derivation of the end to end outage probability (OP) for secondary NOMA users by accounting for imperfect channel state information (CSI), as well as the residual interference caused by successive interference cancellation (SIC) errors and coexisting primary secondary users. The numerical results validated by Monte Carlo simulations show that CR NOMA network provides a superior outage performance over orthogonal multiple access. As imperfections become more significant, CR NOMA is observed to deliver relatively poor outage performance."} {"_id": [41], "label": "cs.RO", "text": "Benchmarking Tether based UAV Motion Primitives. This paper proposes and benchmarks two tether based motion primitives for tethered UAVs to execute autonomous flight with proprioception only. Tethered UAVs have been studied mainly due to power and safety considerations. Tether is either not included in the UAV motion (treated same as free flying UAV) or only in terms of station keeping and high speed steady flight. However, feedback from and control over the tether configuration could be utilized as a set of navigational tools for autonomous flight, especially in GPS denied environments and without vision based exteroception. In this work, two tether based motion primitives are proposed, which can enable autonomous flight of a tethered UAV. The proposed motion primitives are implemented on a physical tethered UAV for autonomous path execution with motion capture ground truth. The navigational performance is quantified and compared. The proposed motion primitives make tethered UAV a mobile and safe autonomous robot platform. The benchmarking results suggest appropriate usage of the two motion primitives for tethered UAVs with different path plans."} {"_id": [15], "label": "cs.IT math.IT", "text": "On Multiple Access in Queue Length Sensitive Systems. We consider transmission of packets over queue length sensitive unreliable links, where packets are randomly corrupted through a noisy channel whose transition probabilities are modulated by the queue length. The goal is to characterize the capacity of this channel. We particularly consider multiple access systems, where transmitters dispatch encoded symbols over a system that is a superposition of continuous time GI k GI 1 queues. A server receives and processes symbols in order of arrivals with queue length dependent noise. We first determine the capacity of single user queue length dependent channels. Further, we characterize the best and worst dispatch processes for GI M 1 queues and the best and worst service processes for M GI 1 queues. Then, the multiple access channel capacity is obtained using point processes. When the number of transmitters is large and each arrival process is sparse, the superposition of arrivals approaches a Poisson point process. In characterizing the Poisson approximation, we show that the capacity of the multiple access system converges to that of a single user M GI 1 queue length dependent system, and an upper bound on the convergence rate is obtained. This implies that the best and worst server behaviors of single user M GI 1 queues are preserved in the sparse multiple access case."} {"_id": [69], "label": "math.QA", "text": "Hairy graphs to ribbon graphs via a fixed source graph complex. We show that the hairy graph complex (HGC n,n ,d) appears as an associated graded complex of the oriented graph complex (OGC n 1 ,d) , subject to the filtration on the number of targets, or equivalently sources, called the fixed source graph complex. The fixed source graph complex (OGC 1,d 0) maps into the ribbon graph complex RGC , which models the moduli space of Riemann surfaces with marked points. The full differential d on the oriented graph complex OGC n 1 corresponds to the deformed differential d h on the hairy graph complex HGC n,n , where h adds a hair. This deformed complex (HGC n,n ,d h) is already known to be quasi isomorphic to standard Kontsevich's graph complex GC 2 n . This gives a new connection between the standard and the oriented version of Kontsevich's graph complex."} {"_id": [66], "label": "cs.CE", "text": "A two stage approach for beam hardening artifact reduction in low dose dental CBCT. This paper presents a two stage method for beam hardening artifact correction of dental cone beam computerized tomography (CBCT). The proposed artifact reduction method is designed to improve the quality of maxillofacial imaging, where soft tissue details are not required. Compared to standard CT, the additional difficulty of dental CBCT comes from the problems caused by offset detector, FOV truncation, and low signal to noise ratio due to low X ray irradiation. To address these problems, the proposed method primarily performs a sinogram adjustment in the direction of enhancing data consistency, considering the situation according to the FOV truncation and offset detector. This sinogram correction algorithm significantly reduces beam hardening artifacts caused by high density materials such as teeth, bones, and metal implants, while tending to amplify special types of noise. To suppress such noise, a deep convolutional neural network is complementarily used, where CT images adjusted by the sinogram correction are used as the input of the neural network. Numerous experiments validate that the proposed method successfully reduces beam hardening artifacts and, in particular, has the advantage of improving the image quality of teeth, associated with maxillofacial CBCT imaging."} {"_id": [9], "label": "math.AP", "text": "Deterministic particle approximation of aggregation diffusion equations on unbounded domains. We consider a one dimensional aggregation diffusion equation, which is the gradient flow in the Wasserstein space of a functional with competing attractive repulsive interactions. We prove that the fully deterministic particle approximations with piecewise constant densities introduced in cite Di Francesco Rosini starting from general bounded initial densities converge strongly in L 1 to bounded weak solutions of the PDE. In particular, the result is achieved in unbounded domains and for arbitrary nonnegative bounded initial densities, thus extending the results in cite Gosse Toscani, Matthes Osberger, Mathes Soellner (in which a no vacuum condition is required) and giving an alternative approach to cite Carrillo Craig Patacchini in the one dimensional case, including also subquadratic and superquadratic diffusions."} {"_id": [1, 2], "label": "cs.LG cs.AI", "text": "Multi Decoder Attention Model with Embedding Glimpse for Solving Vehicle Routing Problems. We present a novel deep reinforcement learning method to learn construction heuristics for vehicle routing problems. In specific, we propose a Multi Decoder Attention Model (MDAM) to train multiple diverse policies, which effectively increases the chance of finding good solutions compared with existing methods that train only one policy. A customized beam search strategy is designed to fully exploit the diversity of MDAM. In addition, we propose an Embedding Glimpse layer in MDAM based on the recursive nature of construction, which can improve the quality of each policy by providing more informative embeddings. Extensive experiments on six different routing problems show that our method significantly outperforms the state of the art deep learning based models."} {"_id": [25], "label": "math.PR", "text": "Volatility Estimation of General Gaussian Ornstein Uhlenbeck Process. In this article we study the asymptotic behaviour of the realized quadratic variation of a process int 0 t u s dG H s , where u is a beta H \"older continuous process with beta 1 H and G H is a self similar Gaussian process with parameters H in(0,3 4) . We prove almost sure convergence uniformly in time, and a stable weak convergence for the realized quadratic variation. As an application, we construct strongly consistent estimator for the integrated volatility parameter in a model driven by G H ."} {"_id": [6], "label": "physics.flu-dyn", "text": "Spectral analysis of mixing in 2D high Reynolds flows. We use spectral analysis of Eulerian and Lagrangian dynamics to study the advective mixing in an incompressible 2D bounded cavity flow. A significant property of such a rotational flow at high Reynolds numbers is that mixing in its core is slower than wall adjacent areas and corner eddies. We explain this property by considering the resonance between frequencies of unsteady motion captured by the Koopman spectral analysis of the velocity field and the circulation frequency of Lagrangian tracers in the mean flow. In high Reynolds rotational 2D flows, the vorticity in the rotational core is uniformly distributed, which leads to uniform distribution of circulation periods in the mean flow, i.e., the kinematics in the core of mean flow is like rigid body rotation. When this rigid\" core is exposed to velocity fluctuations arising from bifurcations at high Reynolds, it shows more resilience toward resonance in Lagrangian motion and hence mixes more slowly compared to other areas. We also show how our qualitative resonance argument extends to chaotic flows where the classical tools of dynamical systems are not applicable."} {"_id": [55], "label": "physics.geo-ph", "text": "Determining geopotential difference via relativistic precise point positioning time comparison A case study using simulated observations. According to general relativity theory (GRT), the geopotential difference (GD) can be determined by comparing the change in time difference between precise clocks using the precise point positioning (PPP) time transfer technique, referred to as the relativistic PPP time comparison approach. We focused on high precision time comparison between two precise clocks for determining the GD using the relativistic PPP time transfer,and conducted simulation experiments to validate the approach. In the experiments, we consider three cases to evaluate the performance of the approach using clocks with different stabilities, namely, the frequency stabilities of the clocks equipped at three selected ground stations are respectively (Case 1), (Case 2), and (Case 3) at time period. Conclusions are drawn from the experimental results. First, high precision clocks can significantly improve the accuracy for PPP time transfer, but the improvement is limited by measurement noises. Compared to Case 1, the long term stabilities of OPMT BRUX as well as PTBB BRUX are improved in Cases 2 and 3. The frequency stabilities of Cases 1 3 are approximately 4.28 10 16, 4.00 10 17, and 3.22 10 17 at 10 day averaging time for OPMT BRUX, respectively, and for PTBB BRUX, these values are approximately 3.73 10 16, 8.17 10 17, and 4.64 10 17. Second, the geopotential difference between any two stations can be determined at the decimeter level, with its accuracy being consistent with the stabilities of the time links in Cases 1 3. In Case 3, the determined geopotential differences between OPMT and BRUX deviate from the EIGEN 6C4 model values by 0.64 m2 s2 with an uncertainty of 1.11 m2 s2, whereas the deviation error between PTBB and BRUX is 0.76 m2 s2 with an uncertainty of 1.79 m2 s2. The approach proposed in this study can be also applied to testing GRT."} {"_id": [74], "label": "math.OA", "text": "Moves on k graphs preserving Morita equivalence. We initiate the program of extending to higher rank graphs ( k graphs) the geometric classification of directed graph C algebras, as completed in the 2016 paper of Eilers, Restorff, Ruiz, and Sorensen ERRS16 . To be precise, we identify four \"moves,\" or modifications, one can perform on a k graph Lambda , which leave invariant the Morita equivalence class of its C algebra C ( Lambda) . These moves insplitting, delay, sink deletion, and reduction are inspired by the moves for directed graphs described by Sorensen S o13 and Bates Pask BP04 . Because of this, our perspective on k graphs focuses on the underlying directed graph. We consequently include two new results, Theorem 2.3 and Lemma 2.9, about the relationship between a k graph and its underlying directed graph."} {"_id": [89, 13], "label": "q-bio.CB math.DS", "text": "A hybrid discrete continuum approach to model Turing pattern formation. Since its introduction in 1952, Turing's (pre )pattern theory (\"the chemical basis of morphogenesis\") has been widely applied to a number of areas in developmental biology. The related pattern formation models normally comprise a system of reaction diffusion equations for interacting chemical species (\"morphogens\"), whose heterogeneous distribution in some spatial domain acts as a template for cells to form some kind of pattern or structure through, for example, differentiation or proliferation induced by the chemical pre pattern. Here we develop a hybrid discrete continuum modelling framework for the formation of cellular patterns via the Turing mechanism. In this framework, a stochastic individual based model of cell movement and proliferation is combined with a reaction diffusion system for the concentrations of some morphogens. As an illustrative example, we focus on a model in which the dynamics of the morphogens are governed by an activator inhibitor system that gives rise to Turing pre patterns. The cells then interact with morphogens in their local area through either of two forms of chemically dependent cell action chemotaxis and chemically controlled proliferation. We begin by considering such a hybrid model posed on static spatial domains, and then turn to the case of growing domains. In both cases, we formally derive the corresponding deterministic continuum limit and show that that there is an excellent quantitative match between the spatial patterns produced by the stochastic individual based model and its deterministic continuum counterpart, when sufficiently large numbers of cells are considered. This paper is intended to present a proof of concept for the ideas underlying the modelling framework, with the aim to then apply the related methods to the study of specific patterning and morphogenetic processes in the future."} {"_id": [8], "label": "physics.optics", "text": "Do Truly Unidirectional Surface Plasmon Polaritons Exist?. In this work, we revisit the topic of surface waves on nonreciprocal plasmonic structures, and clarify whether strictly unidirectional surface plasmon polaritons are allowed to exist in this material platform. By investigating different three dimensional configurations and frequency regimes, we theoretically show that, while conventional surface magneto plasmons are not strictly unidirectional due to nonlocal effects, consistent with recent predictions made in the literature, another important class of one way surface plasmon polaritons, existing at an interface with an opaque isotropic material, robustly preserve their unidirectionality even in the presence of nonlocality, and for arbitrarily small levels of dissipation. We also investigate the extreme behavior of terminated unidirectional wave guiding structures, for both classes of surface waves, and discuss their counter intuitive implications."} {"_id": [8], "label": "physics.optics", "text": "Self sweeping ytterbium doped fiber laser based on a fiber saturable absorber. Generally speaking, the self sweeping effect relies on the dynamical grating formed in a gain fiber. Here, the normal self sweeping was generated in a pump free ytterbium doped fiber which serves as a fiber saturable absorber and is introduced to the laser cavity by a circulator in this experiment. The sweeping rate and the sweeping range alter as usual, both of which can be controlled by the pump power. Further, a new self pulse signal is observed and discussed in this work, which shows the difference of the self sweeping effects between active fiber and fiber saturable absorber."} {"_id": [49], "label": "math.OC", "text": "Regularisation, optimisation, subregularity. Regularisation theory in Banach spaces, and non norm squared regularisation even in finite dimensions, generally relies upon Bregman divergences to replace norm convergence. This is comparable to the extension of first order optimisation methods to Banach spaces. Bregman divergences can, however, be somewhat suboptimal in terms of descriptiveness. Using the concept of (strong) metric subregularity, previously used to prove the fast local convergence of optimisation methods, we show norm convergence in Banach spaces and for non norm squared regularisation. For problems such as total variation regularised image reconstruction, the metric subregularity reduces to a geometric condition on the ground truth flat areas in the ground truth have to compensate for the fidelity term not having second order growth within the kernel of the forward operator. Our approach to proving such regularisation results is based on optimisation formulations of inverse problems. As a side result of the regularisation theory that we develop, we provide regularisation complexity results for optimisation methods how many steps N delta of the algorithm do we have to take for the approximate solutions to converge as the corruption level delta searrow 0 ?"} {"_id": [9], "label": "math.AP", "text": "Non uniqueness in law for two dimensional Navier Stokes equations with diffusion weaker than a full Laplacian. We study the two dimensional Navier Stokes equations forced by random noise with a diffusive term generalized via a fractional Laplacian that has a positive exponent strictly less than one. Because intermittent jets are inherently three dimensional, we instead adapt the theory of intermittent form of the two dimensional stationary flows to the stochastic approach presented by Hofmanov acute mathrm a , Zhu Zhu (2019, arXiv 1912.11841 math.PR ) and prove its non uniqueness in law."} {"_id": [32, 17], "label": "cs.DS cs.DC", "text": "De(con)struction of the lazy F loop improving performance of Smith Waterman alignment. Striped variation of the Smith Waterman algorithm is known as extremely efficient and easily adaptable for the SIMD architectures. However, the potential for improvement has not been exhausted yet. The popular Lazy F loop heuristic requires additional memory access operations, and the worst case performance of the loop could be as bad as the nonvectorized version. We demonstrate the progression of the lazy F loop transformations that improve the loop performance, and ultimately eliminate the loop completely. Our algorithm achieves the best asymptotic performance of all scan based SW algorithms O(n p log(p)), and is very efficient in practice."} {"_id": [0], "label": "cs.CV", "text": "Basis Prediction Networks for Effective Burst Denoising with Large Kernels. Bursts of images exhibit significant self similarity across both time and space. This motivates a representation of the kernels as linear combinations of a small set of basis elements. To this end, we introduce a novel basis prediction network that, given an input burst, predicts a set of global basis kernels shared within the image and the corresponding mixing coefficients which are specific to individual pixels. Compared to state of the art techniques that output a large tensor of per pixel spatiotemporal kernels, our formulation substantially reduces the dimensionality of the network output. This allows us to effectively exploit comparatively larger denoising kernels, achieving both significant quality improvements (over 1dB PSNR) and faster run times over state of the art methods."} {"_id": [35, 29], "label": "math.RA math.GR", "text": "Inclusion among commutators of elementary subgroups. In the present paper we continue the study of the elementary commutator subgroups E(n,A),E(n,B) , where A and B are two sided ideals of an associative ring R , n ge 3 . First, we refine and expand a number of the auxiliary results, both classical ones, due to Bass, Stein, Mason, Stothers, Tits, Vaserstein, van der Kallen, Stepanov, as also some of the intermediate results in our joint works with Hazrat, and our own recent papers 40,41 . The gimmick of the present paper is an explicit triple congruence for elementary commutators t ij (ab),t ji (c) , where a,b,c belong to three ideals A,B,C of R . In particular, it provides a sharper counterpart of the three subgroups lemma at the level of ideals. We derive some further striking corollaries thereof, such as a complete description of generic lattice of commutator subgroups E(n,I r),E(n,I s) , new inclusions among multiple elementary commutator subgroups, etc."} {"_id": [9], "label": "math.AP", "text": "A new variant of the Optimised Schwarz Method for arbitrary non overlapping subdomain partitions. We consider a scalar wave propagation in harmonic regime modelled by Helmholtz equation with heterogeneous coefficients. Using the Multi Trace Formalism (MTF), we propose a new variant of the Optimized Schwarz Method (OSM) that can accomodate the presence of cross points in the subdomain partition. This leads to the derivation of a strongly coercive formulation of our Helmholtz problem posed on the union of all interfaces. The corresponding operator takes the form \"identity contraction\"."} {"_id": [43], "label": "cs.DB", "text": "A Synopses Data Engine for Interactive Extreme Scale Analytics. In this work, we detail the design and structure of a Synopses Data Engine (SDE) which combines the virtues of parallel processing and stream summarization towards delivering interactive analytics at extreme scale. Our SDE is built on top of Apache Flink and implements a synopsis as a service paradigm. In that it achieves (a) concurrently maintaining thousands of synopses of various types for thousands of streams on demand, (b) reusing maintained synopses among various concurrent workflows, (c) providing data summarization facilities even for cross (Big Data) platform workflows, (d) pluggability of new synopses on the fly, (e) increased potential for workflow execution optimization. The proposed SDE is useful for interactive analytics at extreme scales because it enables (i) enhanced horizontal scalability, i.e., not only scaling out the computation to a number of processing units available in a computer cluster, but also harnessing the processing load assigned to each by operating on carefully crafted data summaries, (ii) vertical scalability, i.e., scaling the computation to very high numbers of processed streams and (iii) federated scalability i.e., scaling the computation beyond single clusters and clouds by controlling the communication required to answer global queries posed over a number of potentially geo dispersed clusters."} {"_id": [1, 19], "label": "cs.CR cs.LG", "text": "Heterogeneous Gaussian Mechanism Preserving Differential Privacy in Deep Learning with Provable Robustness. In this paper, we propose a novel Heterogeneous Gaussian Mechanism (HGM) to preserve differential privacy in deep neural networks, with provable robustness against adversarial examples. We first relax the constraint of the privacy budget in the traditional Gaussian Mechanism from (0, 1 to (0, infty), with a new bound of the noise scale to preserve differential privacy. The noise in our mechanism can be arbitrarily redistributed, offering a distinctive ability to address the trade off between model utility and privacy loss. To derive provable robustness, our HGM is applied to inject Gaussian noise into the first hidden layer. Then, a tighter robustness bound is proposed. Theoretical analysis and thorough evaluations show that our mechanism notably improves the robustness of differentially private deep neural networks, compared with baseline approaches, under a variety of model attacks."} {"_id": [0], "label": "cs.CV", "text": "LIP Local Importance based Pooling. Spatial downsampling layers are favored in convolutional neural networks (CNNs) to downscale feature maps for larger receptive fields and less memory consumption. However, for discriminative tasks, there is a possibility that these layers lose the discriminative details due to improper pooling strategies, which could hinder the learning process and eventually result in suboptimal models. In this paper, we present a unified framework over the existing downsampling layers (e.g., average pooling, max pooling, and strided convolution) from a local importance view. In this framework, we analyze the issues of these widely used pooling layers and figure out the criteria for designing an effective downsampling layer. According to this analysis, we propose a conceptually simple, general, and effective pooling layer based on local importance modeling, termed as em Local Importance based Pooling (LIP). LIP can automatically enhance discriminative features during the downsampling procedure by learning adaptive importance weights based on inputs. Experiment results show that LIP consistently yields notable gains with different depths and different architectures on ImageNet classification. In the challenging MS COCO dataset, detectors with our LIP ResNets as backbones obtain a consistent improvement ( ge 1.4 ) over the vanilla ResNets, and especially achieve the current state of the art performance in detecting small objects under the single scale testing scheme."} {"_id": [8], "label": "physics.optics", "text": "Optically levitated rotor at its thermal limit of frequency stability. Optically levitated rotors are prime candidates for torque sensors whose precision is limited by the fluctuationsof the rotation frequency. In this work we investigate an optically levitated rotor at its fundamental thermal limitof frequency stability, where rotation frequency fluctuations arise solely due to coupling to the thermal bath."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Multimodal 3D Object Detection from Simulated Pretraining. The need for simulated data in autonomous driving applications has become increasingly important, both for validation of pretrained models and for training new models. In order for these models to generalize to real world applications, it is critical that the underlying dataset contains a variety of driving scenarios and that simulated sensor readings closely mimics real world sensors. We present the Carla Automated Dataset Extraction Tool (CADET), a novel tool for generating training data from the CARLA simulator to be used in autonomous driving research. The tool is able to export high quality, synchronized LIDAR and camera data with object annotations, and offers configuration to accurately reflect a real life sensor array. Furthermore, we use this tool to generate a dataset consisting of 10 000 samples and use this dataset in order to train the 3D object detection network AVOD FPN, with finetuning on the KITTI dataset in order to evaluate the potential for effective pretraining. We also present two novel LIDAR feature map configurations in Bird's Eye View for use with AVOD FPN that can be easily modified. These configurations are tested on the KITTI and CADET datasets in order to evaluate their performance as well as the usability of the simulated dataset for pretraining. Although insufficient to fully replace the use of real world data, and generally not able to exceed the performance of systems fully trained on real data, our results indicate that simulated data can considerably reduce the amount of training on real data required to achieve satisfactory levels of accuracy."} {"_id": [56, 68], "label": "cs.LO cs.DM", "text": "Approximate Evaluation of First Order Counting Queries. Kuske and Schweikardt introduced the very expressive first order counting logic FOC(P) to model database queries with counting operations. They showed that there is an efficient model checking algorithm on graphs with bounded degree, while Grohe and Schweikardt showed that probably no such algorithm exists for trees of bounded depth. We analyze the fragment FO( 0 ) of this logic. While we remove for example subtraction and comparison between two non atomic counting terms, this logic remains quite expressive We allow nested counting and comparison between counting terms and arbitrarily large numbers. Our main result is an approximation scheme of the model checking problem for FO( 0 ) that runs in linear fpt time on structures with bounded expansion. This scheme either gives the correct answer or says \"I do not know.\" The latter answer may only be given if small perturbations in the number symbols of the formula could make it both satisfied and unsatisfied. This is complemented by showing that exactly solving the model checking problem for FO( 0 ) is already hard on trees of bounded depth and just slightly increasing the expressiveness of FO( 0 ) makes even approximation hard on trees."} {"_id": [21], "label": "math.CO", "text": "On weak metric dimension of digraphs. Using the two way distance, we introduce the concepts of weak metric dimension of a strongly connected digraph Gamma . We first establish lower and upper bounds for the number of arcs in Gamma by using the diameter and weak metric dimension of Gamma , and characterize all digraphs attaining the lower or upper bound. Then we study a digraph with weak metric dimension 1 and classify all vertex transitive digraphs having weak metric dimension 1 . Finally, all digraphs of order n with weak metric dimension n 1 or n 2 are determined."} {"_id": [94], "label": "physics.ed-ph", "text": "An experiment to address conceptual difficulties in slipping and rolling problems. A bicycle wheel that was initially spinning freely was placed in contact with a rough surface and a digital film was made of its motion. Using Tracker software for video analysis, we obtained the velocity vectors for several points on the wheel, in the frame of reference of the laboratory as well as in a relative frame of reference having as its origin the wheel s center of mass. The velocity of the wheel s point of contact with the floor was also determined obtaining then a complete picture of the kinematic state of the wheel in both frames of reference. An empirical approach of this sort to problems in mechanics can contribute to overcoming the considerable difficulties they entail."} {"_id": [83], "label": "cs.MM", "text": "QoE driven Coupled Uplink and Downlink Rate Adaptation for 360 degree Video Live Streaming. 360 degree video provides an immersive 360 degree viewing experience and has been widely used in many areas. The 360 degree video live streaming systems involve capturing, compression, uplink (camera to video server) and downlink (video server to user) transmissions. However, few studies have jointly investigated such complex systems, especially the rate adaptation for the coupled uplink and downlink in the 360 degree video streaming under limited bandwidth constraints. In this letter, we propose a quality of experience (QoE) driven 360 degree video live streaming system, in which a video server performs rate adaptation based on the uplink and downlink bandwidths and information concerning each user's real time field of view (FOV). We formulate it as a nonlinear integer programming problem and propose an algorithm, which combines the Karush Kuhn Tucker (KKT) condition and branch and bound method, to solve it. The numerical results show that the proposed optimization model can improve users' QoE significantly in comparison with other baseline schemes."} {"_id": [17], "label": "cs.DC", "text": "Adapting Workflow Management Systems to BFT Blockchains The YAWL Example. Blockchain technology provides an auditable and tamper proof distributed storage infrastructure for information records. This can be leveraged to support distributed workflow management. Compared to proof of work consensus, popularized by Bitcoin and Ethereum, blockchains based on BFT (byzantine fault tolerance) ordering consensus trade scalability for immediacy and finality of consensus. This makes them easier to use as distribution infrastructure, as applications need not be adapted to deal with eventual consistency and delayed consensus of proof of work blockchains. Hence, applications such as workflow engines can be easily ported to such a blockchain infrastructure to take advantage of their decentralized integrity assurance and information distribution model. In this paper we describe how the YAWL workflow engine can be used on a BFT based blockchain infrastructure to enable collaborative workflows across different organizations."} {"_id": [0], "label": "cs.CV", "text": "Adversarial Machine Learning in Image Classification A Survey Towards the Defender's Perspective. Deep Learning algorithms have achieved the state of the art performance for Image Classification and have been used even in security critical applications, such as biometric recognition systems and self driving cars. However, recent works have shown those algorithms, which can even surpass the human capabilities, are vulnerable to adversarial examples. In Computer Vision, adversarial examples are images containing subtle perturbations generated by malicious optimization algorithms in order to fool classifiers. As an attempt to mitigate these vulnerabilities, numerous countermeasures have been constantly proposed in literature. Nevertheless, devising an efficient defense mechanism has proven to be a difficult task, since many approaches have already shown to be ineffective to adaptive attackers. Thus, this self containing paper aims to provide all readerships with a review of the latest research progress on Adversarial Machine Learning in Image Classification, however with a defender's perspective. Here, novel taxonomies for categorizing adversarial attacks and defenses are introduced and discussions about the existence of adversarial examples are provided. Further, in contrast to exisiting surveys, it is also given relevant guidance that should be taken into consideration by researchers when devising and evaluating defenses. Finally, based on the reviewed literature, it is discussed some promising paths for future research."} {"_id": [74], "label": "math.OA", "text": "The noncommutative ell 1 ell 2 inequality for Hilbert C modules and the exact constant. Let mathcal A be a unital C algebra. Then the theory of Hilbert C modules tells that begin align sum i 1 n (a ia i ) frac 1 2 leq sqrt n left( sum i 1 n a ia i right) frac 1 2 , quad forall n in mathbb N , forall a 1, dots, a n in mathcal A . end align By modifications of arguments of Botelho Andrade, Casazza, Cheng, and Tran given in 2019, for certain tuple x (a 1, dots, a n) in mathcal A n , we give a method to compute a positive element c x in the C algebra mathcal A such that the equality begin align sum i 1 n (a ia i ) frac 1 2 c x sqrt n left( sum i 1 n a ia i right) frac 1 2 . end align holds. We give an application for the integral of G. G. Kasparov. We also derive the formula for the exact constant for the continuous ell 1 ell 2 inequality."} {"_id": [24], "label": "math.MG", "text": "On some characterizations of convex polyhedra. This work provides two sufficient conditions in terms of sections or projections for a convex body to be a polytope. These conditions are necessary as well."} {"_id": [9], "label": "math.AP", "text": "Propagation of L p beta norm, 1 p le infty , for the system of Boltzmann equations for monatomic gas mixtures. With the existence and uniqueness of a vector value solution for the full non linear homogeneous Boltzmann system of equations describing multi component monatomic gas mixtures for binary interactions proved 8 , we present in this manuscript several properties for such a solution. We start by proving the gain of integrability of the gain term of the multispecies collision operator, extending the work done previously for the single species case 3 . In addition, we study the integrability properties of the multispecies collision operator as a bilinear form, revisiting and expanding the work done for a single gas 2 . With these estimates, together with a control by below for the loss term of the collision operator as in 8 , we develop the propagation for the polynomially and exponentially beta weighted L p beta norms for the vector value solution. Finally, we extend such L p beta norms propagation property to p infty ."} {"_id": [21], "label": "math.CO", "text": "Big Ramsey degrees in universal inverse limit structures. We build a collection of topological Ramsey spaces of trees giving rise to universal inverse limit structures, extending Zheng's work for the profinite graph to the setting of Fra \" i ss ' e classes of finite ordered binary relational structures with the Ramsey property. This work is based on the Halpern L \" a uchli theorem, but different from the Milliken space of strong subtrees. Based on these topological Ramsey spaces and the work of Huber Geschke Kojman on inverse limits of finite ordered graphs, we prove that for each such Fra \" i ss ' e class, its universal inverse limit structures has finite big Ramsey degrees under finite Baire measurable colourings. For finite ordered graphs, finite ordered k clique free graphs ( k geq 3 ), finite ordered oriented graphs, and finite ordered tournaments, we characterize the exact big Ramsey degrees."} {"_id": [0, 41, 1], "label": "cs.RO cs.CV cs.LG", "text": "Dynamics Learning with Cascaded Variational Inference for Multi Step Manipulation. The fundamental challenge of planning for multi step manipulation is to find effective and plausible action sequences that lead to the task goal. We present Cascaded Variational Inference (CAVIN) Planner, a model based method that hierarchically generates plans by sampling from latent spaces. To facilitate planning over long time horizons, our method learns latent representations that decouple the prediction of high level effects from the generation of low level motions through cascaded variational inference. This enables us to model dynamics at two different levels of temporal resolutions for hierarchical planning. We evaluate our approach in three multi step robotic manipulation tasks in cluttered tabletop environments given high dimensional observations. Empirical results demonstrate that the proposed method outperforms state of the art model based methods by strategically interacting with multiple objects."} {"_id": [34, 46], "label": "math.AG math.CV", "text": "General derivative Thomae formula for singular half periods. The paper develops the result of second Thomae theorem in hyperelliptic case. The main formula, called general Thomae formula, provides expressions for values at zero of the lowest non vanishing derivatives of theta functions with singular characteristics of arbitrary multiplicity in terms of branch points and period matrix. We call these values derivative theta constants. First and second Thomae formulas follow as particular cases. Some further results are derived. Matrices of second derivative theta constants (Hessian matrices of zero values of theta functions with characteristics of multiplicity two) have rank three in any genus. Similar result about the structure of order 3 tensor of third derivative theta constants is obtained, and a conjecture regarding higher multiplicities is made. As a byproduct a generalization of Bolza formulas are deduced."} {"_id": [65, 19], "label": "cs.CR cs.NI", "text": "MAC address anonymization for crowd counting. Research has shown that counting WiFi packets called probe requests (PRs) implicitly provides a proxy for the number of people in an area. In this paper, we discuss a crowd counting system involving WiFi sensors detecting PRs over the air, then extracting and anonymizing their media access control (MAC) addresses using a hash based approach. This paper discusses an anonymization procedure and shows time synchronization inaccuracies among sensors and hashing collision rates to be low enough to prevent anonymization from interfering with counting algorithms. In particular, we derive an approximation of the collision rate of uniformly distributed identifiers, with analytical error bounds."} {"_id": [6], "label": "physics.flu-dyn", "text": "Effect of axially varying sandpaper roughness on bubbly drag reduction in Taylor Couette turbulence. We experimentally investigate the influence of alternating rough and smooth walls on bubbly drag reduction (DR). We apply rough sandpaper bands of width s between 48.4 ,mm and 148.5 ,mm , and roughness height k 695 , mu m , around the smooth inner cylinder (IC) of the Twente Turbulent Taylor Couette facility. Between sandpaper bands, the IC is left uncovered over similar width s , resulting in alternating rough and smooth bands, a constant pattern in axial direction. We measure the DR in water that originates from introducing air bubbles to the fluid at (shear) Reynolds numbers textit Re s ranging from 0.5 times 10 6 to 1.8 times 10 6 . Results are compared to bubbly DR measurements with a completely smooth IC and an IC that is completely covered with sandpaper of the same roughness k . The outer cylinder is left smooth for all variations. Results are also compared to bubbly DR measurements where a smooth outer cylinder is rotating in opposite direction to the smooth IC. This counter rotation induces secondary flow structures that are very similar to those observed when the IC is composed of alternating rough and smooth bands. For the measurements with roughness, the bubbly DR is found to initially increase more strongly with textit Re s , before levelling off to reach a value that no longer depends on textit Re s . This is attributed to a more even axial distribution of the air bubbles, resulting from the increased turbulence intensity of the flow compared to flow over a completely smooth wall at the same textit Re s . The air bubbles are seen to accumulate at the rough wall sections in the flow. Here, locally, the drag is largest and so the drag reducing effect of the bubbles is felt strongest. Therefore, a larger maximum value of bubbly DR is found for the alternating rough and smooth walls compared to the completely rough wall."} {"_id": [4], "label": "cs.NE", "text": "On Inversely Proportional Hypermutations with Mutation Potential. Artificial Immune Systems (AIS) employing hypermutations with linear static mutation potential have recently been shown to be very effective at escaping local optima of combinatorial optimisation problems at the expense of being slower during the exploitation phase compared to standard evolutionary algorithms. In this paper we prove that considerable speed ups in the exploitation phase may be achieved with dynamic inversely proportional mutation potentials (IPM) and argue that the potential should decrease inversely to the distance to the optimum rather than to the difference in fitness. Afterwards we define a simple (1 1) Opt IA, that uses IPM hypermutations and ageing, for realistic applications where optimal solutions are unknown. The aim of the AIS is to approximate the ideal behaviour of the inversely proportional hypermutations better and better as the search space is explored. We prove that such desired behaviour, and related speed ups, occur for a well studied bimodal benchmark function called textsc TwoMax . Furthermore, we prove that the (1 1) Opt IA with IPM efficiently optimises a third bimodal function, textsc Cliff , by escaping its local optima while Opt IA with static potential cannot, thus requires exponential expected runtime in the distance between the cliff and the optimum."} {"_id": [29], "label": "math.GR", "text": "Conjugacy class sizes in arithmetic progression. Let rm cs (G) denote the set of conjugacy class sizes of a group G , and let rm cs (G) rm cs (G) setminus 1 be the sizes of non central classes. We prove three results. We classify all finite groups G with rm cs (G) a, a d, dots ,a rd an arithmetic progression with r geqslant 2 . (We show that rm cs (G) 1,2,3 .) Our most substantial result classifies all G with rm cs (G) 2,4,6 . Finally, we classify all groups G whose largest two non central conjugacy class sizes are coprime. (Here it is not obvious but it is true that rm cs (G) has two elements, and so is an arithmetic progression.)"} {"_id": [32, 28, 62, 68], "label": "cs.DS cs.CG cs.DM cs.GT", "text": "Online Geometric Discrepancy for Stochastic Arrivals with Applications to Envy Minimization. Consider a unit interval 0,1 in which n points arrive one by one independently and uniformly at random. On arrival of a point, the problem is to immediately and irrevocably color it in 1, 1 while ensuring that every interval a,b subseteq 0,1 is nearly balanced. We define emph discrepancy as the largest imbalance of any interval during the entire process. If all the arriving points were known upfront then we can color them alternately to achieve a discrepancy of 1 . What is the minimum possible expected discrepancy when we color the points online? We show that the discrepancy of the above problem is sub polynomial in n and that no algorithm can achieve a constant discrepancy. This is a substantial improvement over the trivial random coloring that only gets an widetilde O ( sqrt n) discrepancy. We then obtain similar results for a natural generalization of this problem to 2 dimensions where the points arrive uniformly at random in a unit square. This generalization allows us to improve recent results of Benade et al. cite BenadeKPP EC18 for the online envy minimization problem when the arrivals are stochastic."} {"_id": [2], "label": "cs.AI", "text": "Fuzzy C means based scenario bundling for stochastic service network design. Stochastic service network designs with uncertain demand represented by a set of scenarios can be modelled as a large scale two stage stochastic mixed integer program (SMIP). The progressive hedging algorithm (PHA) is a decomposition method for solving the resulting SMIP. The computational performance of the PHA can be greatly enhanced by decomposing according to scenario bundles instead of individual scenarios. At the heart of bundle based decomposition is the method for grouping the scenarios into bundles. In this paper, we present a fuzzy c means based scenario bundling method to address this problem. Rather than full membership of a bundle, which is typically the case in existing scenario bundling strategies such as k means, a scenario has partial membership in each of the bundles and can be assigned to more than one bundle in our method."} {"_id": [81], "label": "cs.MS", "text": "Scalable Local Timestepping on Octree Grids. Numerical solutions of hyperbolic partial differential equations(PDEs) are ubiquitous in science and engineering. Method of lines is a popular approach to discretize PDEs defined in spacetime, where space and time are discretized independently. When using explicit timesteppers on adaptive grids, the use of a global timestep size dictated by the finest grid spacing leads to inefficiencies in the coarser regions. Even though adaptive space discretizations are widely used in computational sciences, temporal adaptivity is less common due to its sophisticated nature. In this paper, we present highly scalable algorithms to enable local timestepping (LTS) for explicit timestepping schemes on fully adaptive octrees. We demonstrate the accuracy of our methods as well as the scalability of our framework across 16K cores in TACC's Frontera. We also present a speed up estimation model for LTS, which predicts the speedup compared to global timestepping (GTS) with an average of 0.1 relative error."} {"_id": [49], "label": "math.OC", "text": "A Greedy and Distributable Approach to the Lexicographic Bottleneck Assignment Problem with Conditions on Exactness. Solving the Lexicographic Bottleneck Assignment Problem (LexBAP) typically relies on centralised computation with order quartic complexity. We consider the Sequential Bottleneck Assignment Problem (SeqBAP), which yields a greedy solution to the LexBAP and discuss the relationship between the SeqBAP, the LexBAP, and the Bottleneck Assignment Problem (BAP). In particular, we reexamine tools used to analyse the structure of the BAP, and apply them to derive an algorithm that solves the SeqBAP with cubic complexity. We show that the set of solutions of the LexBAP is a subset of the solutions of the SeqBAP and analyse the conditions for which the solutions sets are identical. Furthermore, we provide a method to verify the satisfaction of these conditions. In cases where the conditions are satisfied, the proposed algorithm for solving the SeqBAP solves the LexBAP with computation that has lower complexity and can be distributed over a network of computing agents. The applicability of the approach is demonstrated with a case study where mobile robots are assigned to goal locations."} {"_id": [41], "label": "cs.RO", "text": "Reactive Navigation in Partially Familiar Planar Environments Using Semantic Perceptual Feedback. This paper solves the planar navigation problem by recourse to an online reactive scheme that exploits recent advances in SLAM and visual object recognition to recast prior geometric knowledge in terms of an offline catalogue of familiar objects. The resulting vector field planner guarantees convergence to an arbitrarily specified goal, avoiding collisions along the way with fixed but arbitrarily placed instances from the catalogue as well as completely unknown fixed obstacles so long as they are strongly convex and well separated. We illustrate the generic robustness properties of such deterministic reactive planners as well as the relatively modest computational cost of this algorithm by supplementing an extensive numerical study with physical implementation on both a wheeled and legged platform in different settings."} {"_id": [42], "label": "math.DG", "text": "The Index Conjecture for Symmetric Spaces. In 1980, Onishchik introduced the index of a Riemannian symmetric space as the minimal codimension of a (proper) totally geodesic submanifold. He calculated the index for symmetric spaces of rank less than or equal to 2, but for higher rank it was unclear how to tackle the problem. In earlier papers we developed several approaches to this problem, which allowed us to calculate the index for many symmetric spaces. Our systematic approach led to a conjecture for how to calculate the index. The purpose of this paper is to verify the conjecture."} {"_id": [18, 29], "label": "math.GT math.GR", "text": "Local simple connectedness of boundaries of hyperbolic groups. In this paper we prove a theorem describing the local topology of the boundary of a hyperbolic group in terms of its global topology the boundary is locally simply connected if and only if the complement of any point in the boundary is simply connected. This generalises a theorem of Bestvina and Mess."} {"_id": [26], "label": "math.RT", "text": "On finite generation of fiber ring of invariant jet differentials. We prove that the fiber ring of the space of invariant jet differentials of a projective manifold is finitely generated on the regular locus. Berczi Kirwan has partially worked out the question in cite BK however, our method is different and complementary. The analytic automorphism group of regular k jets of holomorphic curves on a projective variety X is a non reductive subgroup of the general linear group GL k mathbb C . In this case, the Chevalley theorem on the invariant polynomials in the fiber rings fails in general. Thus, the analysis of Cartan subalgebras of the Lie algebra and its Weyl group requires different methods. We employ some techniques of algebraic Lie groups (not necessarily reductive) together with basic results obtained in cite BK to prove the finite generation of the stalk ring at a regular point. We prove that the fibre ring of the space of invariant jet differentials of a projective manifold is finitely generated on the regular locus. The question has been partially worked out by Berczi Kirwan in cite BK , however our method is different and complementary. The analytic automorphism group of regular k jets of holomorphic curves on a projective variety X is a non reductive subgroup of the general linear group GL k mathbb C . In this case the Chevalley theorem on the invariant polynomials in the fiber rings fails in general. Thus the analysis of Cartan subalgebras of the Lie algebra and its Weyl group requires extra methods. We employ some methods of algebraic Lie groups (not necessarily reductive) together with basic results obtained in cite BK to prove the finite generation of the stalk ring at a regular point."} {"_id": [21], "label": "math.CO", "text": "Generalization of some results on list coloring and DP coloring. In this work, we introduce DPG coloring using the concepts of DP coloring and variable degeneracy to modify the proofs on the following papers (i) DP 3 coloring of planar graphs without 4 , 9 cycles and cycles of two lengths from 6, 7, 8 (R. Liu, S. Loeb, M. Rolek, Y. Yin, G. Yu, Graphs and Combinatorics 35(3) (2019) 695 705), (ii) Every planar graph without i cycles adjacent simultaneously to j cycles and k cycles is DP 4 colorable when i, j, k 3, 4, 5 (P. Sittitrai, K. Nakprasit, arXiv 1801.06760(2019) preprint), (iii) Every planar graph is 5 choosable (C. Thomassen, J. Combin. Theory Ser. B 62 (1994) 180 181). Using this modification, we obtain more results on list coloring, DP coloring, list forested coloring, and variable degeneracy."} {"_id": [17, 19], "label": "cs.CR cs.DC", "text": "Bit level Parallelization of 3DES Encryption on GPU. Triple DES (3DES) is a standard fundamental encryption algorithm, used in several electronic payment applications and web browsers. In this paper, we propose a parallel implementation of 3DES on GPU. Since 3DES encrypts data with 64 bit blocks, our approach considers each 64 bit block a kernel block and assign a separate thread to process each bit. Algorithm's permutation operations, XOR operations, and S box operations are done in parallel within these kernel blocks. The implementation benefits from the use of constant and shared memory types to optimize memory access. The results show an average 10.70x speed up against the baseline multi threaded CPU implementation. The implementation is publicly available at https github.com kaanfurkan35 3DES GPU"} {"_id": [26, 75, 21], "label": "math.CO math.KT math.RT", "text": "Enriched set valued P partitions and shifted stable Grothendieck polynomials. We introduce an enriched analogue of Lam and Pylyavskyy's theory of set valued P partitions. An an application, we construct a K theoretic version of Stembridge's Hopf algebra of peak quasisymmetric functions. We show that the symmetric part of this algebra is generated by Ikeda and Naruse's shifted stable Grothendieck polynomials. We give the first proof that the natural skew analogues of these power series are also symmetric. A central tool in our constructions is a \" K theoretic\" Hopf algebra of labeled posets, which may be of independent interest. Our results also lead to some new explicit formulas for the involution omega on the ring of symmetric functions."} {"_id": [38], "label": "math.NT", "text": "Duality of Weighted Sum Formulas of Alternating Multiple T Values. Recently, a new kind of multiple zeta value level two T( bf k ) (which is called multiple T values) was introduced and studied by Kaneko and Tsumura. In this paper, we define a kind of alternating version of multiple T values, and study several duality formulas of weighted sum formulas about alternating multiple T values by using the methods of iterated integral representations and series representations. Some special values of alternating multiple T values can also be obtained."} {"_id": [29], "label": "math.GR", "text": "Commutator length of powers in free products of groups. Given groups A and B , what is the minimal commutator length of the 2020th (for instance) power of an element g in A B not conjugate to elements of the free factors? The exhaustive answer to this question is still unknown, but we can give an almost answer this minimum is one of two numbers (simply depending on A and B ). Other similar problems are also considered."} {"_id": [20], "label": "math.NA cs.NA", "text": "Component by component digit by digit construction of good polynomial lattice rules in weighted Walsh spaces. We consider the efficient construction of polynomial lattice rules, which are special cases of so called quasi Monte Carlo (QMC) rules. These are of particular interest for the approximate computation of multivariate integrals where the dimension d may be in the hundreds or thousands. We study a construction method that assembles the generating vector, which is in this case a vector of polynomials over a finite field, of the polynomial lattice rule in a digit by digit (or, equivalently, coefficient by coefficient) fashion. As we will show, the integration error of the corresponding QMC rules achieves excellent convergence order, and, under suitable conditions, we can vanquish the curse of dimensionality by considering function spaces equipped with coordinate weights. The construction algorithm is based on a quality measure that is independent of the underlying smoothness of the function space and can be implemented in a fast manner (without the use of fast Fourier transformations). Furthermore, we illustrate our findings with extensive numerical results."} {"_id": [42, 76], "label": "math.DG math.SP", "text": "Sub Riemannian limit of the differential form heat kernels of contact manifolds. We study the behavior of the heat kernel of the Hodge Laplacian on a contact manifold endowed with a family of Riemannian metrics that blow up the directions transverse to the contact distribution. We apply this to analyze the behavior of global spectral invariants such as the eta invariant and the determinant of the Laplacian. In particular we prove that contact versions of the relative eta invariant and the relative analytic torsion are equal to their Riemannian analogues and hence topological."} {"_id": [25], "label": "math.PR", "text": "Limiting one point distribution of periodic TASEP. The relaxation time limit of the one point distribution of the spatially periodic totally asymmetric simple exclusion process is expected to be the universal one point distribution for the models in the KPZ universality class in a periodic domain. Unlike the infinite line case, the limiting one point distribution depends non trivially on the scaled time parameter. We study several properties of this distribution for the case of the periodic step and flat initial conditions. We show that the distribution changes from a Tracy Widom distribution in the small time limit to the Gaussian distribution in the large time limit, and also obtain right tail estimate for all time. Furthermore, we establish a connection to integrable differential equations such as the KP equation, coupled systems of mKdV and nonlinear heat equations, and the KdV equation."} {"_id": [1, 19], "label": "cs.CR cs.LG", "text": "Detecting malicious PDF using CNN. Malicious PDF files represent one of the biggest threats to computer security. To detect them, significant research has been done using handwritten signatures or machine learning based on manual feature extraction. Those approaches are both time consuming, require significant prior knowledge and the list of features has to be updated with each newly discovered vulnerability. In this work, we propose a novel algorithm that uses an ensemble of Convolutional Neural Network (CNN) on the byte level of the file, without any handcrafted features. We show, using a data set of 90000 files downloadable online, that our approach maintains a high detection rate (94 ) of PDF malware and even detects new malicious files, still undetected by most antiviruses. Using automatically generated features from our CNN network, and applying a clustering algorithm, we also obtain high similarity between the antiviruses' labels and the resulting clusters."} {"_id": [20], "label": "math.NA cs.NA", "text": "A numerical study of the jerky crack growth in elastoplastic materials with localized plasticity. We present a numerical implementation of a model of quasi static crack growth in linearly elastic perfectly plastic materials. We assume that the displacement is antiplane, and that the cracks and the plastic slips are localized on a prescribed path. We provide numerical evidence of the fact that the crack growth is intermittent, with jump characteristics that depend on the material properties."} {"_id": [42], "label": "math.DG", "text": "S 1 invariant Laplacian flow. The Laplacian flow is a geometric flow introduced by Bryant as a way for finding torsion free G 2 structures. If the flow is S 1 invariant then it descends to a flow of SU(3) structures on a 6 manifold. In this article we derive expressions for these evolution equations. In our search for examples we discover the first inhomogeneous shrinking solitons, which are also gradient. We also show that any compact non torsion free soliton admits no infinitesimal symmetry."} {"_id": [19], "label": "cs.CR", "text": "Protecting the stack with PACed canaries. Stack canaries remain a widely deployed defense against memory corruption attacks. Despite their practical usefulness, canaries are vulnerable to memory disclosure and brute forcing attacks. We propose PCan, a new approach based on ARMv8.3 A pointer authentication (PA), that uses dynamically generated canaries to mitigate these weaknesses and show that it provides more fine grained protection with minimal performance overhead."} {"_id": [42, 46], "label": "math.DG math.AG", "text": "Optimal lower bounds for Donaldson's J functional. In this paper we provide an explicit formula for the optimal lower bound of Donaldson's J functional, in the sense of finding explicitly the optimal constant in the definition of coercivity, which always exists and takes negative values in general. This constant is positive precisely if the J equation admits a solution, and the explicit formula has a number of applications. First, this leads to new existence criteria for constant scalar curvature K \"ahler (cscK) metrics in terms of Tian's alpha invariant. Moreover, we use the above formula to discuss Calabi dream manifolds and an analogous notion for the J equation, and show that for surfaces the optimal bound is an explicitly computable rational function which typically tends to minus infinity as the underlying class approaches the boundary of the K \"ahler cone, even when the underlying K \"ahler classes admit cscK metrics. As a final application we show that if the Lejmi Sz 'ekelyhidi conjecture holds, then the optimal bound coincides with its algebraic counterpart, the set of J semistable classes equals the closure of the set of uniformly J stable classes in the K \"ahler cone, and there exists an optimal degeneration for uniform J stability."} {"_id": [56, 2, 62], "label": "cs.GT cs.AI cs.LO", "text": "Exploiting Belief Bases for Building Rich Epistemic Structures. We introduce a semantics for epistemic logic exploiting a belief base abstraction. Differently from existing Kripke style semantics for epistemic logic in which the notions of possible world and epistemic alternative are primitive, in the proposed semantics they are non primitive but are defined from the concept of belief base. We show that this semantics allows us to define the universal epistemic model in a simpler and more compact way than existing inductive constructions of it. We provide (i) a number of semantic equivalence results for both the basic epistemic language with \"individual belief\" operators and its extension by the notion of \"only believing\", and (ii) a lower bound complexity result for epistemic logic model checking relative to the universal epistemic model."} {"_id": [49], "label": "math.OC", "text": "A Fully Stochastic Second Order Trust Region Method. A stochastic second order trust region method is proposed, which can be viewed as a second order extension of the trust region ish (TRish) algorithm proposed by Curtis et al. (INFORMS J. Optim. 1(3) 200 220, 2019). In each iteration, a search direction is computed by (approximately) solving a trust region subproblem defined by stochastic gradient and Hessian estimates. The algorithm has convergence guarantees for stochastic minimization in the fully stochastic regime, meaning that guarantees hold when each stochastic gradient is required merely to be an unbiased estimate of the true gradient with bounded variance and when the stochastic Hessian estimates are bounded uniformly in norm. The algorithm is also equipped with a worst case complexity guarantee in the nearly deterministic regime, i.e., when the stochastic gradient and Hessian estimates are very close in expectation to the true gradients and Hessians. The results of numerical experiments for training convolutional neural networks for image classification and training a recurrent neural network for time series forecasting are presented. These results show that the algorithm can outperform a stochastic gradient approach and the first order TRish algorithm in practice."} {"_id": [38, 23], "label": "math.NT math.FA", "text": "The second secant zeta function and its anti periodization evaluated at 1 sqrt n . The 2 periodic secant zeta function psi(r) and its 1 antiperiodization f(r) ( psi(r) psi(r 1)) 2 , arising from a fluid dynamics application, are investigated. In particular, their values at 1 sqrt n for positive integers n are determined, using a reformulation of an identity satisfied by psi as an Abel equation."} {"_id": [20], "label": "math.NA cs.NA", "text": "A Variational Finite Element Discretization of Compressible Flow. We present a finite element variational integrator for compressible flows. The numerical scheme is derived by discretizing, in a structure preserving way, the Lie group formulation of fluid dynamics on diffeomorphism groups and the associated variational principles. Given a triangulation on the fluid domain, the discrete group of diffeomorphisms is defined as a certain subgroup of the group of linear isomorphisms of a finite element space of functions. In this setting, discrete vector fields correspond to a certain subspace of the Lie algebra of this group. This subspace is shown to be isomorphic to a Raviart Thomas finite element space. The resulting finite element discretization corresponds to a weak form of the compressible fluid equation that doesn't seem to have been used in the finite element literature. It extends previous work done on incompressible flows and at the lowest order on compressible flows. We illustrate the conservation properties of the scheme with some numerical simulations."} {"_id": [9], "label": "math.AP", "text": "Blow up and global existence for solutions to the porous medium equation with reaction and fast decaying density. We are concerned with nonnegative solutions to the Cauchy problem for the porous medium equation with a variable density rho(x) and a power like reaction term u p with p 1 . The density decays it fast at infinity, in the sense that rho(x) sim x q as x to infty with q ge 2. In the case when q 2 , if p is bigger than m , we show that, for large enough initial data, solutions blow up in finite time and for small initial datum, solutions globally exist. On the other hand, in the case when q 2 , we show that existence of global in time solutions always prevails. The case of it slowly decaying density at infinity, i.e. q in 0,2) , is examined in 41 ."} {"_id": [12], "label": "math.CA", "text": "Smoothing theorems for Radon transforms over hypersurfaces and related operators. We extend the theorems of G1 on L p to L p s Sobolev improvement for translation invariant Radon and fractional singular Radon transforms over hypersurfaces, proving L p to L q s boundedness results for such operators. Here q geq p but s can be positive, negative, or zero. For many such operators we will have a triangle Z subset (0,1) times (0,1) times mathbb R such that one has L p to L q s boundedness for ( 1 over p , 1 over q , s) beneath Z , and in the case of Radon transforms one does not have L p to L q s boundedness for ( 1 over p , 1 over q , s) above the plane containing Z , thereby providing a Sobolev space improvement result which is sharp up to endpoints for ( 1 over p , 1 over q ) below Z . This triangle Z intersects the plane (x 1,x 2,x 3) x 3 0 , and therefore we also have an L p to L q improvement result that is also sharp up to endpoints for certain ranges of p and q ."} {"_id": [49], "label": "math.OC", "text": "The turnpike with lack of observability. We obtain turnpike results for optimal control problems with lack of stabilizability in the state equation and or detectability in the state term in the cost functional. We show how, under weakened stabilizability detectability conditions, terminal conditions may affect turnpike phenomena. Numerical simulations have been performed to illustrate the theoretical results."} {"_id": [0], "label": "cs.CV", "text": "DeepFake Detection by Analyzing Convolutional Traces. The Deepfake phenomenon has become very popular nowadays thanks to the possibility to create incredibly realistic images using deep learning tools, based mainly on ad hoc Generative Adversarial Networks (GAN). In this work we focus on the analysis of Deepfakes of human faces with the objective of creating a new detection method able to detect a forensics trace hidden in images a sort of fingerprint left in the image generation process. The proposed technique, by means of an Expectation Maximization (EM) algorithm, extracts a set of local features specifically addressed to model the underlying convolutional generative process. Ad hoc validation has been employed through experimental tests with naive classifiers on five different architectures (GDWCT, STARGAN, ATTGAN, STYLEGAN, STYLEGAN2) against the CELEBA dataset as ground truth for non fakes. Results demonstrated the effectiveness of the technique in distinguishing the different architectures and the corresponding generation process."} {"_id": [42], "label": "math.DG", "text": "The K \"ahler Ricci flow around complete bounded curvature K \"ahler metrics. We produce complete bounded curvature solutions to K \"ahler Ricci flow with existence time estimates, assuming only that the initial data is a smooth K metric uniformly equivalent to another complete bounded curvature K metric. We obtain related flow results for non smooth as well as degenerate initial conditions. We also obtain a stability result for complex space forms under the flow."} {"_id": [21], "label": "math.CO", "text": "Characterizing cospectral vertices via isospectral reduction. Two emerging topics in graph theory are the study of cospectral vertices of a graph, and the study of isospectral reductions of graphs. In this paper, we prove a fundamental relationship between these two areas, which is that two vertices of a graph are cospectral if and only if the isospectral reduction over these vertices has a nontrivial automorphism. It is well known that if two vertices of a graph are symmetric, i.e. if there exists a graph automorphism permuting these two vertices, then they are cospectral. This paper extends this result showing that any two cospectral vertices are symmetric in some reduced version of the graph. We also prove that two vertices are strongly cospectral if and only if they are cospectral and the isospectral reduction over these two vertices has simple eigenvalues. We further describe how these results can be used to construct new families of graphs with cospectral vertices."} {"_id": [19], "label": "cs.CR", "text": "A Survey of Published Attacks on Intel SGX. Intel Software Guard Extensions (SGX) provides a trusted execution environment (TEE) to run code and operate sensitive data. SGX provides runtime hardware protection where both code and data are protected even if other code components are malicious. However, recently many attacks targeting SGX have been identified and introduced that can thwart the hardware defence provided by SGX. In this paper we present a survey of all attacks specifically targeting Intel SGX that are known to the authors, to date. We categorized the attacks based on their implementation details into 7 different categories. We also look into the available defence mechanisms against identified attacks and categorize the available types of mitigations for each presented attack."} {"_id": [58], "label": "q-bio.NC", "text": "An interdisciplinary overview of developmental indices and behavioral measures of the minimal self. In this review paper we discuss the development of the minimal self in humans, the behavioural measures indicating the presence of different aspects of the minimal self, namely, body ownership and sense of agency, and also discuss robotics research investigating and developing these concepts in artificial agents. We investigate possible avenues for expanding the research in robotics to further explore the development of an artificial minimal self."} {"_id": [21, 77], "label": "math.LO math.CO", "text": "The automorphism group of the random poset does not admit a generic pair. We show that the conjugacy class of every pair of automoprhisms of the random poset is meager. This answers a question of Truss see also Kuske Truss."} {"_id": [2], "label": "cs.AI", "text": "Generalized Belief Function A new concept for uncertainty modelling and processing. In this paper, we generalize the belief function on complex plane from another point of view. We first propose a new concept of complex mass function based on the complex number, called complex basic belief assignment, which is a generalization of the traditional mass function in Dempster Shafer evidence theory. On the basis of the de nition of complex mass function, the belief function and plausibility function are generalized. In particular, when the complex mass function is degenerated from complex numbers to real numbers, the generalized belief and plausibility functions degenerate into the traditional belief and plausibility functions in DSE theory, respectively."} {"_id": [42], "label": "math.DG", "text": "Existence of B k alpha, beta Structures on C k Manifolds. In this paper we introduce B alpha, beta k manifolds as generalizations of the notion of smooth manifolds with G structure or with k bounded geometry. These are C k manifolds whose transition functions varphi ji varphi j circ varphi i 1 are such that partial mu varphi ji in B alpha(r) cap C k beta(r) for every vert mu vert r , where B (B r ) r in Gamma is some sequence of presheaves of Fr 'echet spaces endowed with further structures, Gamma subset mathbb Z geq0 is some parameter set and alpha, beta are functions. We present embedding theorems for the presheaf category of those structural presheaves B . The existence problem of B alpha, beta k structures on C k manifolds is studied and it is proved that under certain conditions on B , alpha and beta , the forgetful functor from C k manifolds to B alpha, beta k manifolds has adjoints."} {"_id": [49, 1, 25], "label": "math.OC cs.LG math.PR", "text": "Malicious Experts versus the multiplicative weights algorithm in online prediction. We consider a prediction problem with two experts and a forecaster. We assume that one of the experts is honest and makes correct prediction with probability mu at each round. The other one is malicious, who knows true outcomes at each round and makes predictions in order to maximize the loss of the forecaster. Assuming the forecaster adopts the classical multiplicative weights algorithm, we find upper and lower bounds for the value function of the malicious expert. Our results imply that the multiplicative weights algorithm cannot resist the corruption of malicious experts. We also show that an adaptive multiplicative weights algorithm is asymptotically optimal for the forecaster, and hence more resistant to the corruption of malicious experts."} {"_id": [78, 38], "label": "math.NT math.AC", "text": "Linear Permutations and their Compositional Inverses over mathbb F q n . The use of permutation polynomials has appeared, along to their compositional inverses, as a good choice in the implementation of cryptographic systems. Hence, there has been a demand for constructions of these polynomials which coefficients belong to a finite field. As a particular case of permutation polynomial, involution is highly desired since its compositional inverse is itself. In this work, we present an effective way of how to construct several linear permutation polynomials over mathbb F q n as well as their compositional inverses using a decomposition of displaystyle frac mathbb F q x left langle x n 1 right rangle based on its primitive idempotents. As a consequence, an immediate construction of involutions is presented."} {"_id": [49, 25], "label": "math.OC math.PR", "text": "An Introduction to Mean Field Games using probabilistic methods. This thesis is going to give a gentle introduction to Mean Field Games. It aims to produce a coherent text beginning for simple notions of deterministic control theory progressively to current Mean Field Games theory. The framework gradually extended form single agent stochastic control problems to multi agent stochastic differential mean field games. The concept of Nash Equilibrium is introduced to define a solution of the mean field game. To achieve considerable simplifications the number of agents goes to infinity and formulate this problem on the basis of McKean Vlasov theory for interacting particle systems. Furthermore, the problem at infinity is being solved by a variation of the Stochastic Maximum Principle and Forward Backward Stochastic Differential Equations. To elaborate more the Aiyagari macroeconomic model in continuous time is presented using MFGs techniques"} {"_id": [46], "label": "math.AG", "text": "ACM bundles of rank 2 on quartic hypersurfaces in mathbb P 3 and Lazarsfeld Mukai bundles. Let X be a smooth quartic hypersurface in mathbb P 3 . By the Brill Noether theory of curves on K3 surfaces, if a rank 2 aCM bundle on X is globally generated, then it is the Lazarsfeld Mukai bundle E C,Z associated with a smooth curve C on X and a base point free pencil Z on C . In this paper, we will focus on the classification of such bundles on X to investigate aCM bundles of rank 2 on X . Concretely, we will give a necessary condition for a rank 2 vector bundle of type E C,Z to be indecomposable initialized and aCM, in the case where the class of C in Pic( X ) is contained in the sublattice of rank 2 generated by the hyperplane class of X and a non trivial initialized aCM line bundle on X ."} {"_id": [55], "label": "physics.geo-ph", "text": "Double phase field formulation for mixed mode fracture in rocks. Cracking of rocks and rock like materials exhibits a rich variety of patterns where tensile (mode I) and shear (mode II) fractures are often interwoven. These mixed mode fractures are usually cohesive (quasi brittle) and frictional. Although phase field modeling is increasingly used for rock fracture simulation, no phase field formulation is available for cohesive and frictional mixed mode fracture. To address this shortfall, here we develop a double phase field formulation that employs two different phase fields to describe cohesive tensile fracture and frictional shear fracture individually. The formulation rigorously combines the two phase fields through three approaches (i) crack direction based decomposition of the strain energy into the tensile, shear, and pure compression parts, (ii) contact dependent calculation of the potential energy, and (iii) energy based determination of the dominant fracturing mode in each contact condition. We validate the proposed model, both qualitatively and quantitatively, with experimental data on mixed mode fracture in rocks. The validation results demonstrate that the double phase field model a combination of two quasi brittle phase field models allows one to directly use material strengths measured from experiments, unlike brittle phase field models for mixed mode fracture in rocks. Another standout feature of the double phase field model is that it can simulate, and naturally distinguish between, tensile and shear fractures without complex algorithms."} {"_id": [23], "label": "math.FA", "text": "On the functorial properties of the p analog of the Fourier Stieltjes algebras. In this paper, some known results will be generalized. Firstly, the idempotent theorem on the Fourier Stieltjes algebra will be promoted and linked to the p analog of such an algebra. Next, the p analog of the pi Fourier space introduced by Arsac will be given, and by taking advantage of the theory of ultra filters, the connection between the dual space of the algebra of p pseudofunctions and the p analog of the pi Fourier space, will be fully investigated. As the main result, one of the significant and applicable functorial properties of the p analog of the Fourier Stieltjes algebras will be achieved."} {"_id": [0], "label": "cs.CV", "text": "CoMoGCN Coherent Motion Aware Trajectory Prediction with Graph Representation. Forecasting human trajectories is critical for tasks such as robot crowd navigation and autonomous driving. Modeling social interactions is of great importance for accurate group wise motion prediction. However, most existing methods do not consider information about coherence within the crowd, but rather only pairwise interactions. In this work, we propose a novel framework, coherent motion aware graph convolutional network (CoMoGCN), for trajectory prediction in crowded scenes with group constraints. First, we cluster pedestrian trajectories into groups according to motion coherence. Then, we use graph convolutional networks to aggregate crowd information efficiently. The CoMoGCN also takes advantage of variational autoencoders to capture the multimodal nature of the human trajectories by modeling the distribution. Our method achieves state of the art performance on several different trajectory prediction benchmarks, and the best average performance among all benchmarks considered."} {"_id": [8], "label": "physics.optics", "text": "Anomalous Motion of Particle Levitated by Laguerre Gaussian beam. Laguerre Gaussian (LG) beam has orbital angular momentum (OAM). A particle trapped in an LG beam will rotate about the beam axis, due to the transfer of OAM. The rotation of the particle is usually in the same direction as that of the beam OAM. However, we discovere that when the LG beam is strongly focused, the rotation of the particle and the beam OAM might be in the opposite direction. This anomalous effect is caused by the negative torque on the particle exerted by the focused LG beam, which is similar to the optical pulling force in the linear case. We calculated the scattering force distribution of a micro particle trapped in an optical tweezers formed by the strongly focused LG beam, and showed that there exist stable trajectories of the particle that controlled by the negative torque. We proposed several necessary conditions for observing the counter intuitive trajectories. Our work reveals that the strongly trapped micro particle exhibits diversity of motion patterns."} {"_id": [68, 21], "label": "cs.DM math.CO", "text": "Oriented coloring of graphs with low maximum degree. Duffy et al. C. Duffy, G. MacGillivray, and 'E. Sopena, Oriented colourings of graphs with maximum degree three and four, Discrete Mathematics, 342(4), p. 959 974, 2019 recently considered the oriented chromatic number of connected oriented graphs with maximum degree 3 and 4 , proving it is at most 9 and 69 , respectively. In this paper, we improve these results by showing that the oriented chromatic number of non necessarily connected oriented graphs with maximum degree 3 (resp. 4 ) is at most 9 (resp. 26 ). The bound of 26 actually follows from a general result which determines properties of a target graph to be universal for graphs of bounded maximum degree. This generalization also allows us to get the upper bound of 90 (resp. 306 , 1322 ) for the oriented chromatic number of graphs with maximum degree 5 (resp. 6 , 7 )."} {"_id": [15], "label": "cs.IT math.IT", "text": "On the Spectral Efficiency for Massive MIMO Systems With Imperfect Spacial Covariance Information. This paper studies the impact of imperfect channel covariance information on the uplink (UL) and downlink (DL) spectral efficiencies (SEs) of a time division duplexed (TDD) massive multiple input multiple output (MIMO) system. We derive closed form expressions for the UL and DL average SEs by considering linear minimum mean squared (LMMSE) type and element wise LMMSE type channel estimation that represent LMMSE and element wise LMMSE with estimated covariance matrices, respectively. The closed form expressions of these average SEs are functions of the number of observations used for estimating the spatial covariance matrices of individual and contaminated channels of a target user, and thus enable us to select these key parameters to achieve the desired SE. We present a theoretical analysis of SE behavior for different values of these parameters, followed by simulations, which also demonstrate and validate this behavior. Specifically, we present the SEs computed using estimated covariance matrices and show the accurate agreement between the theoretical and simulated SEs as functions of the number of observations for estimating the covariance matrices of individual and contaminated channels of a user. We also compare these SEs across channel estimation techniques using analytical and simulation studies."} {"_id": [25], "label": "math.PR", "text": "Strong Solutions of Mean Field SDEs with irregular expectation functional in the drift. We analyze multi dimensional mean field stochastic differential equations where the drift depends on the law in form of a Lebesgue integral with respect to the pushforward measure of the solution. We show existence and uniqueness of Malliavin differentiable strong solutions for irregular drift coefficients, which in particular include the case where the drift depends on the cumulative distribution function of the solution. Moreover, we examine the solution as a function in its initial condition and introduce sufficient conditions on the drift to guarantee differentiability. Under these assumptions we then show that the Bismut Elworthy Li formula proposed in Bauer et al. (2018) holds in a strong sense, i.e. we give a probabilistic representation of the strong derivative with respect to the initial condition of expectation functionals of strong solutions to our type of mean field equations in one dimension."} {"_id": [0], "label": "cs.CV", "text": "Investigating and Exploiting Image Resolution for Transfer Learning based Skin Lesion Classification. Skin cancer is among the most common cancer types. Dermoscopic image analysis improves the diagnostic accuracy for detection of malignant melanoma and other pigmented skin lesions when compared to unaided visual inspection. Hence, computer based methods to support medical experts in the diagnostic procedure are of great interest. Fine tuning pre trained convolutional neural networks (CNNs) has been shown to work well for skin lesion classification. Pre trained CNNs are usually trained with natural images of a fixed image size which is typically significantly smaller than captured skin lesion images and consequently dermoscopic images are downsampled for fine tuning. However, useful medical information may be lost during this transformation. In this paper, we explore the effect of input image size on skin lesion classification performance of fine tuned CNNs. For this, we resize dermoscopic images to different resolutions, ranging from 64x64 to 768x768 pixels and investigate the resulting classification performance of three well established CNNs, namely DenseNet 121, ResNet 18, and ResNet 50. Our results show that using very small images (of size 64x64 pixels) degrades the classification performance, while images of size 128x128 pixels and above support good performance with larger image sizes leading to slightly improved classification. We further propose a novel fusion approach based on a three level ensemble strategy that exploits multiple fine tuned networks trained with dermoscopic images at various sizes. When applied on the ISIC 2017 skin lesion classification challenge, our fusion approach yields an area under the receiver operating characteristic curve of 89.2 and 96.6 for melanoma classification and seborrheic keratosis classification, respectively, outperforming state of the art algorithms."} {"_id": [0], "label": "cs.CV", "text": "Recurrent Deconvolutional Generative Adversarial Networks with Application to Text Guided Video Generation. This paper proposes a novel model for video generation and especially makes the attempt to deal with the problem of video generation from text descriptions, i.e., synthesizing realistic videos conditioned on given texts. Existing video generation methods cannot be easily adapted to handle this task well, due to the frame discontinuity issue and their text free generation schemes. To address these problems, we propose a recurrent deconvolutional generative adversarial network (RD GAN), which includes a recurrent deconvolutional network (RDN) as the generator and a 3D convolutional neural network (3D CNN) as the discriminator. The RDN is a deconvolutional version of conventional recurrent neural network, which can well model the long range temporal dependency of generated video frames and make good use of conditional information. The proposed model can be jointly trained by pushing the RDN to generate realistic videos so that the 3D CNN cannot distinguish them from real ones. We apply the proposed RD GAN to a series of tasks including conventional video generation, conditional video generation, video prediction and video classification, and demonstrate its effectiveness by achieving well performance."} {"_id": [0], "label": "cs.CV", "text": "Synthesizing Optical and SAR Imagery From Land Cover Maps and Auxiliary Raster Data. We synthesize both optical RGB and synthetic aperture radar (SAR) remote sensing images from land cover maps and auxiliary raster data using generative adversarial networks (GANs). In remote sensing, many types of data, such as digital elevation models (DEMs) or precipitation maps, are often not reflected in land cover maps but still influence image content or structure. Including such data in the synthesis process increases the quality of the generated images and exerts more control on their characteristics. Spatially adaptive normalization layers fuse both inputs and are applied to a full blown generator architecture consisting of encoder and decoder to take full advantage of the information content in the auxiliary raster data. Our method successfully synthesizes medium (10 m) and high (1 m) resolution images when trained with the corresponding data set. We show the advantage of data fusion of land cover maps and auxiliary information using mean intersection over unions (mIoUs), pixel accuracy, and Fr 'echet inception distances (FIDs) using pretrained U Net segmentation models. Handpicked images exemplify how fusing information avoids ambiguities in the synthesized images. By slightly editing the input, our method can be used to synthesize realistic changes, i.e., raising the water levels. The source code is available at https github.com gbaier rs img synth and we published the newly created high resolution dataset at https ieee dataport.org open access geonrw."} {"_id": [38], "label": "math.NT", "text": "The Arakelov Zhang pairing and Julia sets. The Arakelov Zhang pairing langle psi, phi rangle is a measure of the \"dynamical distance\" between two rational maps psi and phi defined over a number field K . It is defined in terms of local integrals on Berkovich space at each completion of K . We obtain a simple expression for the important case of the pairing with a power map, written in terms of integrals over Julia sets. Under certain disjointness conditions on Julia sets, our expression simplifies to a single canonical height term in general, this term is a lower bound. As applications of our method, we give bounds on the difference between the canonical height h phi and the standard Weil height h , and we prove a rigidity statement about polynomials that satisfy a strong form of good reduction."} {"_id": [40, 1, 2, 3], "label": "cs.IR cs.AI cs.CL cs.LG", "text": "Personalized Query Auto Completion Through a Lightweight Representation of the User Context. Query Auto Completion (QAC) is a widely used feature in many domains, including web and eCommerce search, suggesting full queries based on a prefix typed by the user. QAC has been extensively studied in the literature in the recent years, and it has been consistently shown that adding personalization features can significantly improve the performance of QAC. In this work we propose a novel method for personalized QAC that uses lightweight embeddings learnt through fastText. We construct an embedding for the user context queries, which are the last few queries issued by the user. We also use the same model to get the embedding for the candidate queries to be ranked. We introduce ranking features that compute the distance between the candidate queries and the context queries in the embedding space. These features are then combined with other commonly used QAC ranking features to learn a ranking model. We apply our method to a large eCommerce search engine (eBay) and show that the ranker with our proposed feature significantly outperforms the baselines on all of the offline metrics measured, which includes Mean Reciprocal Rank (MRR), Success Rate (SR), Mean Average Precision (MAP), and Normalized Discounted Cumulative Gain (NDCG). Our baselines include the Most Popular Completion (MPC) model as well as a ranking model without our proposed features. The ranking model with the proposed features results in a 20 30 improvement over the MPC model on all metrics. We obtain up to a 5 improvement over the baseline ranking model for all the sessions, which goes up to about 10 when we restrict to sessions that contain the user context. Moreover, our proposed features also significantly outperform text based personalization features studied in the literature before, and adding text based features on top of our proposed embedding based features results only in minor improvements."} {"_id": [8], "label": "physics.optics", "text": "Great Chiral Fluorescence from Optical Duality Silver Nanostructures Enabled by 3D Laser Printing. Featured by prominent flexibility and fidelity in producing sophisticated stereoscopic structures transdimensionally, three dimensional (3D) laser printing technique has vastly extended the toolkit for delivering diverse functional devices. Yet chiral nanoemitters heavily resorting to artificial structures that manifest efficient emission and tightly confined light mater interactions simultaneously remains alluring but dauntingly challenging for this technique at this moment. In this work, we assert the chiral photoluminescence is implemented from silver nanostructures of optical duality in one go via a twofold three dimensional laser printing scheme. Such laser printing protocol allows the highly desired duality by simultaneously producing uniformly distributed fluorescent silver nanoclusters and aggregated plasmonic silver nanoparticles to tightly confine chiral interactions at the nanoscale. A helical emitter of 550 nm helix diameter as fabricated has seen a record high luminescence anisotropic factor with the absolute value up to 0.58, which is two orders of magnitude greater than fluorescent chiral silver clusters. This method holds great promise for future versatile applications in chiroptical nanodevices."} {"_id": [2, 3], "label": "cs.CL cs.AI", "text": "Task Oriented Dialog Systems that Consider Multiple Appropriate Responses under the Same Context. Conversations have an intrinsic one to many property, which means that multiple responses can be appropriate for the same dialog context. In task oriented dialogs, this property leads to different valid dialog policies towards task completion. However, none of the existing task oriented dialog generation approaches takes this property into account. We propose a Multi Action Data Augmentation (MADA) framework to utilize the one to many property to generate diverse appropriate dialog responses. Specifically, we first use dialog states to summarize the dialog history, and then discover all possible mappings from every dialog state to its different valid system actions. During dialog system training, we enable the current dialog state to map to all valid system actions discovered in the previous process to create additional state action pairs. By incorporating these additional pairs, the dialog policy learns a balanced action distribution, which further guides the dialog model to generate diverse responses. Experimental results show that the proposed framework consistently improves dialog policy diversity, and results in improved response diversity and appropriateness. Our model obtains state of the art results on MultiWOZ."} {"_id": [90], "label": "physics.space-ph", "text": "Patch Size Evolution During Pulsating Aurora. We report both decreasing and increasing trends in the patch sizes during pulsating aurora events. About 150 pulsating auroral events over the Fennoscandian Lapland have been successfully analyzed for their average patch size, total patch area, and number of patches as a function of event time, typically 1 2 hr. An automatic routine has been developed to detect patches in the all sky camera images. In addition to events with decreasing and increasing average patch size evolution over the course of the pulsating aurora, events with no size trends and events with intermittently increasing and decreasing patch size trends were also found. In this study, we have analyzed a subset of events for which the average and total patch size systematically increase or decrease. The events with increasing patch size trend do not experience a decrease in the peak emission height, which was previously associated with the behavior of pulsating aurora precipitation. Furthermore, the events with increasing patch sizes have shorter lifetimes and twice as many substorm injected energetic electrons at geosynchronous orbit as the events with decreasing patch sizes. Half of the events with increasing patch sizes occur during substorm expansion phases, while a majority (64 ) of the ones with decreasing patch sizes take place during the recovery phase. These findings suggest that the visual appearance of pulsating aurora may be used as an indication of the pulsating aurora energy deposition to the atmosphere."} {"_id": [22], "label": "cs.SE", "text": "Warrior1 A Performance Sanitizer for C . This paper presents Warrior1, a tool that detects performance anti patterns in C libraries. Many programs are slowed down by many small inefficiencies. Large scale C applications are large, complex, and developed by large groups of engineers over a long period of time, which makes the task of identifying inefficiencies difficult. Warrior1 was designed to detect the numerous small performance issues that are the result of inefficient use of C libraries. The tool detects performance anti patterns such as map double lookup, vector reallocation, short lived objects, and lambda object capture by value. Warrior1 is implemented as an instrumented C standard library and an off line diagnostics tool. The tool is very effective in detecting issues. We demonstrate that the tool is able to find a wide range of performance anti patterns in a number of popular performance sensitive open source projects."} {"_id": [25], "label": "math.PR", "text": "Power Law Tails in a Fitness Driven Model for Biological Evolution. We study a discrete time stochastic process that can also be interpreted as a model for a viral evolution. A distinguishing feature of our process is power law tails due to dynamics that resembles preferential attachment models. In the model we study, a population is partitioned into sites, with each site labeled by a uniquely assigned real number in the interval 0,1 known as fitness. The population size is a discrete time transient birth and death process with probability p of birth and 1 p of death. The fitness is assigned at birth according to the following rule the new member of the population either \"mutates\" with probability r , creating a new site uniformly distributed on 0,1 or \"inherits\" with probability 1 r , joining an existing site with probability proportional to the site's size. At each death event, a member from the site with the lowest fitness is killed. The number of sites eventually tends to infinity if and only if pr 1 p . Under this assumption, we show that as time tends to infinity, the joint empirical measure of site size and fitness (proportion of population in sites of size and fitness in given ranges) converges a.s. to the product of a modified Yule distribution and the uniform distribution on (1 p) (pr),1 . Our approach is based on the method developed in cite similar but different . The model and the results were independently obtained by Roy and Tanemura in RT ."} {"_id": [65, 19], "label": "cs.CR cs.NI", "text": "Low Power IoT Communication Security On the Performance of DTLS and TLS 1.3. Similarly to elsewhere on the Internet, practical security in the Internet of Things (IoT) is achieved by combining an array of mechanisms, at work at all layers of the protocol stack, in system software, and in hardware. Standard protocols such as Datagram Transport Layer Security (DTLS 1.2) and Transport Layer Security (TLS 1.2) are often recommended to secure communications to from IoT devices. Recently, the TLS 1.3 standard was released and DTLS 1.3 is in the final stages of standardization. In this paper, we give an overview of version 1.3 of these protocols, and we provide the first experimental comparative performance analysis of different implementations and various configurations of these protocols, on real IoT devices based on low power microcontrollers. We show how different implementations lead to different compromises. We measure and compare bytes over the air, memory footprint, and energy consumption. We show that, when DTLS TLS 1.3 requires more resources than DTLS TLS 1.2, this additional overhead is quite reasonable. We also observe that, in some configurations, DTLS TLS 1.3 actually decreases overhead and resource consumption. All in all, our study indicates that there is still room to optimize the existing implementations of these protocols."} {"_id": [21], "label": "math.CO", "text": "The birational Lalanne Kreweras involution. The Lalanne Kreweras involution is an involution on the set of Dyck paths which combinatorially exhibits the symmetry of the number of valleys and major index statistics. We define piecewise linear and birational extensions of the Lalanne Kreweras involution. Actually, we show that the Lalanne Kreweras involution is a special case of a more general operator, called rowvacuation, which acts on the antichains of any graded poset. Rowvacuation, like the closely related and more studied rowmotion operator, is a composition of toggles. We obtain the piecewise linear and birational lifts of the Lalanne Kreweras involution by using the piecewise linear and birational toggles of Einstein and Propp. We show that the symmetry properties of the Lalanne Kreweras involution extend to these piecewise linear and birational lifts."} {"_id": [72, 19], "label": "cs.CR cs.PF", "text": "BlockSim An Extensible Simulation Tool for Blockchain Systems. Both in the design and deployment of blockchain solutions many performance impacting configuration choices need to be made. We introduce BlockSim, a framework and software tool to build and simulate discrete event dynamic systems models for blockchain systems. BlockSim is designed to support the analysis of a large variety of blockchains and blockchain deployments as well as a wide set of analysis questions. At the core of BlockSim is a Base Model, which contains the main model constructs common across various blockchain systems organized in three abstraction layers (network, consensus and incentives layer). The Base Model is usable for a wide variety of blockchain systems and can be extended easily to include system or deployment particulars. The BlockSim software tool provides a simulator that implements the Base Model in Python. This paper describes the Base Model, the simulator implementation, and the application of BlockSim to Bitcoin, Ethereum and other consensus algorithms. We validate BlockSim simulation results by comparison with performance results from actual systems and from other studies in the literature. We close the paper by a BlockSim simulation study of the impact of uncle blocks rewards on mining decentralization, for a variety of blockchain configurations."} {"_id": [9, 23], "label": "math.FA math.AP", "text": "Non homogeneous initial boundary value problems for the biharmonic Schr \"odinger equation on an interval. In this paper we consider the initial boundary value problem (IBVP) for the nonlinear biharmonic Schr \"odinger equation posed on a bounded interval (0,L) with non homogeneous Navier or Dirichlet boundary conditions, respectively. For Navier boundary IBVP, we set up its local well posedness if the initial data lies in H s(0, L) with s geq 0 and s neq n 1 2, n in mathbb N , and the boundary data are selected from the appropriate spaces with optimal regularities, i.e., the j th order data are chosen in H loc (s 3 j) 4 ( mathbb R ) , for j 0,2 . For Dirichlet boundary IBVP the corresponding local well posedness is obtained when s 10 7 and s neq n 1 2, n in mathbb N , and the boundary data are selected from the appropriate spaces with optimal regularities, i.e., the j th order data are chosen in H loc (s 3 j) 4 ( mathbb R ) , for j 0,1 ."} {"_id": [38, 34, 46, 47], "label": "math.AG math.AT math.CV math.NT", "text": "Analytical and number theoretical properties of the two dimensional sigma function. This survey is devoted to the classical and modern problems related to the entire function sigma( bf u lambda) , defined by a family of nonsingular algebraic curves of genus 2 , where bf u (u 1,u 3) and lambda ( lambda 4, lambda 6, lambda 8, lambda 10 ) . It is an analogue of the Weierstrass sigma function sigma(u g 2,g 3) of a family of elliptic curves. Logarithmic derivatives of order 2 and higher of the function sigma( bf u lambda) generate fields of hyperelliptic functions of bf u (u 1,u 3) on the Jacobians of curves with a fixed parameter vector lambda . We consider three Hurwitz series sigma( bf u lambda) sum m,n ge 0 a m,n ( lambda) frac u 1 mu 3 n m!n! , sigma( bf u lambda) sum k ge 0 xi k(u 1 lambda) frac u 3 k k! and sigma( bf u lambda) sum k ge 0 mu k(u 3 lambda) frac u 1 k k! . The survey is devoted to the number theoretic properties of the functions a m,n ( lambda) , xi k(u 1 lambda) and mu k(u 3 lambda) . It includes the latest results, which proofs use the fundamental fact that the function sigma ( bf u lambda) is determined by the system of four heat equations in a nonholonomic frame of six dimensional space."} {"_id": [20], "label": "math.NA cs.NA", "text": "Discontinuous Galerkin for the wave equation a simplified a priori error analysis. Standard discontinuous Galerkin methods, based on piecewise polynomials of degree qq geq 0 , are considered for temporal semi discretization for second order hyperbolic equations. The main goal of this paper is to present a simple and straight forward a priori error analysis of optimal order with minimal regularity requirement on the solution. Uniform norm in time error estimates are also proved for the constant and linear cases. To this end, energy identities and stability estimates of the discrete problem are proved for a slightly more general problem. These are used to prove optimal order a priori error estimates with minimal regularity requirement on the solution. The combination with the classic continuous Galerkin finite element discretization in space variable is used, to formulate a full discrete scheme. The a priori error analysis is presented. Numerical experiments are performed to verify the theoretical rate of convergence."} {"_id": [39], "label": "cs.CY", "text": "Using Data Mining for Infrastructure and Safety Violations Discovery in Cities. In city planning and maintenance, the abilty to quickly identify infrastructure violations such as missing or misplaced fire hydrants can be crucial for maintaining a safe city it can even save lives. In this work, we aim to provide an analysis of such violations, and to demonstrate the potential of data driven approaches for quickly locating and addressing them. We conduct an analytical study based upon data from the city of Beer Sheva's public records of fire hydrants, bomb shelters, and other public facilities. The result of our analysis are presented along with an interactive exploration tool, which allows for easy exploration and identification of different facilities around the city that viloate regulations."} {"_id": [0], "label": "cs.CV", "text": "Occluded Prohibited Items Detection an X ray Security Inspection Benchmark and De occlusion Attention Module. Security inspection often deals with a piece of baggage or suitcase where objects are heavily overlapped with each other, resulting in an unsatisfactory performance for prohibited items detection in X ray images. In the literature, there have been rare studies and datasets touching this important topic. In this work, we contribute the first high quality object detection dataset for security inspection, named Occluded Prohibited Items X ray (OPIXray) image benchmark. OPIXray focused on the widely occurred prohibited item \"cutter\", annotated manually by professional inspectors from the international airport. The test set is further divided into three occlusion levels to better understand the performance of detectors. Furthermore, to deal with the occlusion in X ray images detection, we propose the De occlusion Attention Module (DOAM), a plug and play module that can be easily inserted into and thus promote most popular detectors. Despite the heavy occlusion in X ray imaging, shape appearance of objects can be preserved well, and meanwhile different materials visually appear with different colors and textures. Motivated by these observations, our DOAM simultaneously leverages the different appearance information of the prohibited item to generate the attention map, which helps refine feature maps for the general detectors. We comprehensively evaluate our module on the OPIXray dataset, and demonstrate that our module can consistently improve the performance of the state of the art detection methods such as SSD, FCOS, etc, and significantly outperforms several widely used attention mechanisms. In particular, the advantages of DOAM are more significant in the scenarios with higher levels of occlusion, which demonstrates its potential application in real world inspections. The OPIXray benchmark and our model are released at https github.com OPIXray author OPIXray."} {"_id": [0], "label": "cs.CV", "text": "Multi Margin based Decorrelation Learning for Heterogeneous Face Recognition. Heterogeneous face recognition (HFR) refers to matching face images acquired from different domains with wide applications in security scenarios. This paper presents a deep neural network approach namely Multi Margin based Decorrelation Learning (MMDL) to extract decorrelation representations in a hyperspherical space for cross domain face images. The proposed framework can be divided into two components heterogeneous representation network and decorrelation representation learning. First, we employ a large scale of accessible visual face images to train heterogeneous representation network. The decorrelation layer projects the output of the first component into decorrelation latent subspace and obtains decorrelation representation. In addition, we design a multi margin loss (MML), which consists of quadruplet margin loss (QML) and heterogeneous angular margin loss (HAML), to constrain the proposed framework. Experimental results on two challenging heterogeneous face databases show that our approach achieves superior performance on both verification and recognition tasks, comparing with state of the art methods."} {"_id": [21], "label": "math.CO", "text": "Magnitude Homology, Diagonality, Medianness, K \"unneth and Mayer Vietoris. Magnitude homology of graphs is introduced by Hepworth and Willerton in arXiv 1505.04125 . Magnitude homology of arbitrary metric spaces by Leinster and Shulman in arXiv 1711.00802v2 . We verify that the K \"unneth and Mayer Vietoris formulas proved in arXiv 1505.04125 for graphs extend naturally to the metric setting. The same is done for the notion of diagonality, also originating from arXiv 1505.04125 . Stability of this notion under products, retracts, filtrations is verified, and as an application, it is shown that median spaces are diagonal in particular, any Menger convex median space has vanishing magnitude homology. Finally, we argue for a definition of magnitude homology in the context of \"betweenness spaces\" and develop some of its properties."} {"_id": [0], "label": "cs.CV", "text": "CAKES Channel wise Automatic KErnel Shrinking for Efficient 3D Networks. 3D Convolution Neural Networks (CNNs) have been widely applied to 3D scene understanding, such as video analysis and volumetric image recognition. However, 3D networks can easily lead to over parameterization which incurs expensive computation cost. In this paper, we propose Channel wise Automatic KErnel Shrinking (CAKES), to enable efficient 3D learning by shrinking standard 3D convolutions into a set of economic operations e.g., 1D, 2D convolutions. Unlike previous methods, CAKES performs channel wise kernel shrinkage, which enjoys the following benefits 1) enabling operations deployed in every layer to be heterogeneous, so that they can extract diverse and complementary information to benefit the learning process and 2) allowing for an efficient and flexible replacement design, which can be generalized to both spatial temporal and volumetric data. Further, we propose a new search space based on CAKES, so that the replacement configuration can be determined automatically for simplifying 3D networks. CAKES shows superior performance to other methods with similar model size, and it also achieves comparable performance to state of the art with much fewer parameters and computational costs on tasks including 3D medical imaging segmentation and video action recognition. Codes and models are available at https github.com yucornetto CAKES"} {"_id": [59], "label": "cs.SI", "text": "Hot Streaks on Social Media. Measuring the impact and success of human performance is common in various disciplines, including art, science, and sports. Quantifying impact also plays a key role on social media, where impact is usually defined as the reach of a user's content as captured by metrics such as the number of views, likes, retweets, or shares. In this paper, we study entire careers of Twitter users to understand properties of impact. We show that user impact tends to have certain characteristics First, impact is clustered in time, such that the most impactful tweets of a user appear close to each other. Second, users commonly have 'hot streaks' of impact, i.e., extended periods of high impact tweets. Third, impact tends to gradually build up before, and fall off after, a user's most impactful tweet. We attempt to explain these characteristics using various properties measured on social media, including the user's network, content, activity, and experience, and find that changes in impact are associated with significant changes in these properties. Our findings open interesting avenues for future research on virality and influence on social media."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Interpretable Entity Representations through Large Scale Typing. In standard methodology for natural language processing, entities in text are typically embedded in dense vector spaces with pre trained models. The embeddings produced this way are effective when fed into downstream models, but they require end task fine tuning and are fundamentally difficult to interpret. In this paper, we present an approach to creating entity representations that are human readable and achieve high performance on entity related tasks out of the box. Our representations are vectors whose values correspond to posterior probabilities over fine grained entity types, indicating the confidence of a typing model's decision that the entity belongs to the corresponding type. We obtain these representations using a fine grained entity typing model, trained either on supervised ultra fine entity typing data (Choi et al. 2018) or distantly supervised examples from Wikipedia. On entity probing tasks involving recognizing entity identity, our embeddings used in parameter free downstream models achieve competitive performance with ELMo and BERT based embeddings in trained models. We also show that it is possible to reduce the size of our type set in a learning based way for particular domains. Finally, we show that these embeddings can be post hoc modified through a small number of rules to incorporate domain knowledge and improve performance."} {"_id": [8], "label": "physics.optics", "text": "Dynamics of laterally coupled pairs of spin VCSELs. A newly developed normal mode model of laser dynamics in a generalised array of waveguides is applied to extend the spin flip model (SFM) to pairs of evanescently coupled spin VCSELS. The effect of high birefringence is explored, revealing new dynamics and regions of bistability. It is shown that optical switching of the polarisation states of the lasers may be controlled through the optical pump and that, under certain conditions, the polarisation of one laser may be switched by controlling the intensity and polarisation in the other."} {"_id": [9], "label": "math.AP", "text": "Groundstates and infinitely many high energy solutions to a class of nonlinear Schr \"odinger Poisson systems. We study a nonlinear Schr \" o dinger Poisson system which reduces to the nonlinear and nonlocal equation Delta u u lambda 2 left( frac 1 omega x N 2 star rho u 2 right) rho(x) u u q 1 u quad x in mathbb R N, where omega (N 2) mathbb S N 1 , lambda 0, q in(2,2 ast 1), rho mathbb R N to mathbb R is nonnegative and locally bounded, N 3,4,5 and 2 2N (N 2) is the critical Sobolev exponent. We prove existence and multiplicity of solutions working on a suitable finite energy space and under two separate assumptions which are compatible with instances where loss of compactness phenomena may occur."} {"_id": [64, 22, 39], "label": "cs.SE cs.CY physics.soc-ph", "text": "An Empirical Analysis of the Python Package Index (PyPI). In this research, we provide a comprehensive empirical summary of the Python Package Repository, PyPI, including both package metadata and source code covering 178,592 packages, 1,745,744 releases, 76,997 contributors, and 156,816,750 import statements. We provide counts and trends for packages, releases, dependencies, category classifications, licenses, and package imports, as well as authors, maintainers, and organizations. As one of the largest and oldest software repositories as of publication, PyPI provides insight not just into the Python ecosystem today, but also trends in software development and licensing more broadly over time. Within PyPI, we find that the growth of the repository has been robust under all measures, with a compound annual growth rate of 47 for active packages, 39 for new authors, and 61 for new import statements over the last 15 years. As with many similar social systems, we find a number of highly right skewed distributions, including the distribution of releases per package, packages and releases per author, imports per package, and size per package and release. However, we also find that most packages are contributed by single individuals, not multiple individuals or organizations. The data, methods, and calculations herein provide an anchor for public discourse on PyPI and serve as a foundation for future research on the Python software ecosystem."} {"_id": [23], "label": "math.FA", "text": "Full Lattice Convergence on Riesz Spaces. The full lattice convergence on a locally solid Riesz space is an abstraction of the topological, order, and relatively uniform convergences. We investigate four modifications of a full convergence mathbb c on a Riesz space. The first one produces a sequential convergence mathbb sc . The second makes an absolute mathbb c convergence and generalizes the absolute weak convergence. The third modification makes an unbounded mathbb c convergence and generalizes various unbounded convergences recently studied in the literature. The last one is applicable whenever mathbb c is a full convergence on a commutative l algebra and produces the multiplicative modification mathbb mc of mathbb c . We study general properties of full lattice convergence with emphasis on universally complete Riesz spaces and on Archimedean f algebras. The technique and results in this paper unify and extend those which were developed and obtained in recent literature on unbounded convergences."} {"_id": [49, 39], "label": "cs.CY math.OC", "text": "A perspective on how to conduct responsible anti human trafficking research in operations and analytics. Human trafficking, the commercial exploitation of individuals, is a gross violation of human rights and harms societies, economies, health and development. The related disciplines of Operations Management (OM), Analytics, and Operations Research (OR) are uniquely positioned to support trafficking prevention and intervention efforts by efficiently evaluating a plethora of decision alternatives, and providing quantitative, actionable insights. As operations and analytical efforts in the counter trafficking field emerge, it is imperative to grasp subtle yet distinctive nuances associated with human trafficking. This note is intended to inform those practitioners working in the field by highlighting key features of human trafficking activity. We grouped nine themes around three broad categories (1) representation of human trafficking, (2) consideration of survivors and communities, and (3) analytics related. These insights are derived from our collective experience in working in this area and substantiated by domain expertise."} {"_id": [11, 6], "label": "physics.app-ph physics.flu-dyn", "text": "A compact and efficient three dimensional microfluidic mixer. Microfluidic mixing is a fundamental functionality in most lab on a chip (LOC) systems,whereas realization of efficient mixing is challenging in microfluidic channels due to the small Reynolds numbers. Here, we design and fabricate a compact three dimensional (3D) micromixer to enable efficient mixing at various flow rates. The performance of the fabricated micromixer was examined using blue and red inks. The extreme flexibility in fabricating microfluidic structures of arbitrary 3D geometries using femtosecond laser micromachining allows us to tackle the major disadvantageous effects for optimizing the mixing efficiency."} {"_id": [0], "label": "cs.CV", "text": "Manifold Criterion Guided Transfer Learning via Intermediate Domain Generation. In many practical transfer learning scenarios, the feature distribution is different across the source and target domains (i.e. non i.i.d.). Maximum mean discrepancy (MMD), as a domain discrepancy metric, has achieved promising performance in unsupervised domain adaptation (DA). We argue that MMD based DA methods ignore the data locality structure, which, to some extent, would cause the negative transfer effect. The locality plays an important role in minimizing the nonlinear local domain discrepancy underlying the marginal distributions. For better exploiting the domain locality, a novel local generative discrepancy metric (LGDM) based intermediate domain generation learning called Manifold Criterion guided Transfer Learning (MCTL) is proposed in this paper. The merits of the proposed MCTL are four fold 1) the concept of manifold criterion (MC) is first proposed as a measure validating the distribution matching across domains, and domain adaptation is achieved if the MC is satisfied 2) the proposed MC can well guide the generation of the intermediate domain sharing similar distribution with the target domain, by minimizing the local domain discrepancy 3) a global generative discrepancy metric (GGDM) is presented, such that both the global and local discrepancy can be effectively and positively reduced 4) a simplified version of MCTL called MCTL S is presented under a perfect domain generation assumption for more generic learning scenario. Experiments on a number of benchmark visual transfer tasks demonstrate the superiority of the proposed manifold criterion guided generative transfer method, by comparing with other state of the art methods. The source code is available in https github.com wangshanshanCQU MCTL."} {"_id": [19], "label": "cs.CR", "text": "SAT hard Cyclic Logic Obfuscation for Protecting the IP in the Manufacturing Supply Chain. State of the art attacks against cyclic logic obfuscation use satisfiability solvers that are equipped with a set of cycle avoidance clauses. These cycle avoidance clauses are generated in a pre processing step and define various key combinations that could open or close cycles without making the circuit oscillating or stateful. In this paper, we show that this pre processing step has to generate cycle avoidance conditions on all cycles in a netlist, otherwise, a missing cycle could trap the solver in an infinite loop or make it exit with an incorrect key. Then, we propose several techniques by which the number of cycles is exponentially increased as a function of the number of inserted feedbacks. We further illustrate that when the number of feedbacks is increased, the pre processing step of the attack faces an exponential increase in complexity and runtime, preventing the correct composition of cycle avoidance clauses in a reasonable time. On the other hand, if the pre processing is not concluded, the attack formulated by the satisfiability solver will either get stuck or exit with an incorrect key. Hence, when the cyclic obfuscation under the conditions proposed in this paper is implemented, it would impose an exponentially difficult problem for the satisfiability solver based attacks."} {"_id": [40, 1, 4], "label": "cs.IR cs.LG cs.NE", "text": "A Troubling Analysis of Reproducibility and Progress in Recommender Systems Research. The design of algorithms that generate personalized ranked item lists is a central topic of research in the field of recommender systems. In the past few years, in particular, approaches based on deep learning (neural) techniques have become dominant in the literature. For all of them, substantial progress over the state of the art is claimed. However, indications exist of certain problems in today's research practice, e.g., with respect to the choice and optimization of the baselines used for comparison, raising questions about the published claims. In order to obtain a better understanding of the actual progress, we have tried to reproduce recent results in the area of neural recommendation approaches based on collaborative filtering. The worrying outcome of the analysis of these recent works all were published at prestigious scientific conferences between 2015 and 2018 is that 11 out of the 12 reproducible neural approaches can be outperformed by conceptually simple methods, e.g., based on the nearest neighbor heuristics. None of the computationally complex neural methods was actually consistently better than already existing learning based techniques, e.g., using matrix factorization or linear models. In our analysis, we discuss common issues in today's research practice, which, despite the many papers that are published on the topic, have apparently led the field to a certain level of stagnation."} {"_id": [83], "label": "cs.MM", "text": "Low Complexity Trellis Coded Quantization in Versatile Video Coding. The forthcoming Versatile Video Coding (VVC) standard adopts the trellis coded quantization, which leverages the delicate trellis graph to map the quantization candidates within one block into the optimal path. Despite the high compression efficiency, the complex trellis search with soft decision quantization may hinder the applications due to high complexity and low throughput capacity. To reduce the complexity, in this paper, we propose a low complexity trellis coded quantization scheme in a scientifically sound way with theoretical modeling of the rate and distortion. As such, the trellis departure point can be adaptively adjusted, and unnecessarily visited branches are accordingly pruned, leading to the shrink of total trellis stages and simplification of transition branches. Extensive experimental results on the VVC test model show that the proposed scheme is effective in reducing the encoding complexity by 11 and 5 with all intra and random access configurations, respectively, at the cost of only 0.11 and 0.05 BD Rate increase. Meanwhile, on average 24 and 27 quantization time savings can be achieved under all intra and random access configurations. Due to the excellent performance, the VVC test model has adopted one implementation of the proposed scheme."} {"_id": [15], "label": "cs.IT math.IT", "text": "Fundamental Structure of Optimal Cache Placement for Coded Caching with Nonuniform Demands. This paper studies the caching system of multiple cache enabled users with random demands. Under nonuniform file popularity, we thoroughly characterize the optimal uncoded cache placement structure for the coded caching scheme (CCS). Formulating the cache placement as an optimization problem to minimize the average delivery rate, we identify the file group structure in the optimal solution. We show that, regardless of the file popularity distribution, there are emph at most three file groups in the optimal cache placement , where files within a group have the same cache placement . We further characterize the complete structure of the optimal cache placement and obtain the closed form solution in each of the three file group structures. A simple algorithm is developed to obtain the final optimal cache placement by comparing a set of candidate closed form solutions computed in parallel. We provide insight into the file groups formed by the optimal cache placement. The optimal placement solution also indicates that coding between file groups may be explored during delivery, in contrast to the existing suboptimal file grouping schemes. Using the file group structure in the optimal cache placement for the CCS, we propose a new information theoretic converse bound for coded caching that is tighter than the existing best one. Moreover, we characterize the file subpacketization in the CCS with the optimal cache placement solution and show that the maximum subpacketization level in the worst case scales as mathcal O (2 K sqrt K ) for K users."} {"_id": [41, 52], "label": "cs.RO cs.MA", "text": "Heterogeneous Vehicle Routing and Teaming with Gaussian Distributed Energy Uncertainty. For robot swarms operating on complex missions in an uncertain environment, it is important that the decision making algorithm considers both heterogeneity and uncertainty. This paper presents a stochastic programming framework for the vehicle routing problem with stochastic travel energy costs and heterogeneous vehicles and tasks. We represent the heterogeneity as linear constraints, estimate the uncertain energy cost through Gaussian process regression, formulate this stochasticity as chance constraints or stochastic recourse costs, and then solve the stochastic programs using branch and cut algorithms to minimize the expected energy cost. The performance and practicality are demonstrated through extensive computational experiments and a practical test case."} {"_id": [40, 59, 3], "label": "cs.CL cs.IR cs.SI", "text": "ArCOV19 Rumors Arabic COVID 19 Twitter Dataset for Misinformation Detection. In this paper we introduce ArCOV19 Rumors, an Arabic COVID 19 Twitter dataset for misinformation detection composed of tweets containing claims from 27th January till the end of April 2020. We collected 138 verified claims, mostly from popular fact checking websites, and identified 9.4K relevant tweets to those claims. Tweets were manually annotated by veracity to support research on misinformation detection, which is one of the major problems faced during a pandemic. ArCOV19 Rumors supports two levels of misinformation detection over Twitter verifying free text claims (called claim level verification) and verifying claims expressed in tweets (called tweet level verification). Our dataset covers, in addition to health, claims related to other topical categories that were influenced by COVID 19, namely, social, politics, sports, entertainment, and religious. Moreover, we present benchmarking results for tweet level verification on the dataset. We experimented with SOTA models of versatile approaches that either exploit content, user profiles features, temporal features and propagation structure of the conversational threads for tweet verification."} {"_id": [84], "label": "physics.acc-ph", "text": "Longitudinal phase space synthesis with tailored 3D printable dielectric lined waveguides. Longitudinal phase space manipulation is a critical and necessary component for advanced acceleration concepts, radiation sources and improving performances of X ray free electron lasers. Here we present a simple and versatile method to semi arbitrarily shape the longitudinal phase space of a charged bunch by using wakefields generated in tailored dielectric lined waveguides. We apply the concept in simulation and provide examples for radiation generation and bunch compression. We finally discuss the manufacturing capabilities of a modern 3D printer and investigate how printing limitations, as well as the shape of the input LPS affect the performance of the device."} {"_id": [29, 78], "label": "math.GR math.AC", "text": "On Atomic Density of Numerical Semigroup Algebras. A numerical semigroup S is a cofinite, additively closed subset of the nonnegative integers that contains 0 . In this paper, we initiate the study of atomic density, an asymptotic measure of the proportion of irreducible elements in a given ring or semigroup, for semigroup algebras. It is known that the atomic density of the polynomial ring mathbb F q x is zero for any finite field mathbb F q we prove that the numerical semigroup algebra mathbb F q S also has atomic density zero for any numerical semigroup S . We also examine the particular algebra mathbb F 2 x 2,x 3 in more detail, providing a bound on the rate of convergence of the atomic density as well as a counting formula for irreducible polynomials using M \" o bius inversion, comparable to the formula for irreducible polynomials over a finite field mathbb F q ."} {"_id": [2, 4], "label": "cs.NE cs.AI", "text": "COEBA A Coevolutionary Bat Algorithm for Discrete Evolutionary Multitasking. Multitasking optimization is an emerging research field which has attracted lot of attention in the scientific community. The main purpose of this paradigm is how to solve multiple optimization problems or tasks simultaneously by conducting a single search process. The main catalyst for reaching this objective is to exploit possible synergies and complementarities among the tasks to be optimized, helping each other by virtue of the transfer of knowledge among them (thereby being referred to as Transfer Optimization). In this context, Evolutionary Multitasking addresses Transfer Optimization problems by resorting to concepts from Evolutionary Computation for simultaneous solving the tasks at hand. This work contributes to this trend by proposing a novel algorithmic scheme for dealing with multitasking environments. The proposed approach, coined as Coevolutionary Bat Algorithm, finds its inspiration in concepts from both co evolutionary strategies and the metaheuristic Bat Algorithm. We compare the performance of our proposed method with that of its Multifactorial Evolutionary Algorithm counterpart over 15 different multitasking setups, composed by eight reference instances of the discrete Traveling Salesman Problem. The experimentation and results stemming therefrom support the main hypothesis of this study the proposed Coevolutionary Bat Algorithm is a promising meta heuristic for solving Evolutionary Multitasking scenarios."} {"_id": [41, 14], "label": "cs.RO cs.HC", "text": "Enabling Humans to Plan Inspection Paths Using a Virtual Reality Interface. In this work, we investigate whether humans can manually generate high quality robot paths for optical inspections. Typically, automated algorithms are used to solve the inspection planning problem. The use of automated algorithms implies that specialized knowledge from users is needed to set up the algorithm. We aim to replace this need for specialized experience, by entrusting a non expert human user with the planning task. We augment this user with intuitive visualizations and interactions in virtual reality. To investigate if humans can generate high quality inspection paths, we perform a user study in which users from different experience categories, generate inspection paths with the proposed virtual reality interface. From our study, it can be concluded that users without experience can generate high quality inspection paths The median inspection quality of user generated paths ranged between 66 81 of the quality of a state of the art automated algorithm on various inspection planning scenarios. We noticed however, a sizable variation in the performance of users, which is a result of some typical user behaviors. These behaviors are discussed, and possible solutions are provided."} {"_id": [2, 3], "label": "cs.CL cs.AI", "text": "Transformers as Soft Reasoners over Language. Beginning with McCarthy's Advice Taker (1959), AI has pursued the goal of providing a system with explicit, general knowledge and having the system reason over that knowledge. However, expressing the knowledge in a formal (logical or probabilistic) representation has been a major obstacle to this research. This paper investigates a modern approach to this problem where the facts and rules are provided as natural language sentences, thus bypassing a formal representation. We train transformers to reason (or emulate reasoning) over these sentences using synthetically generated data. Our models, that we call RuleTakers, provide the first empirical demonstration that this kind of soft reasoning over language is learnable, can achieve high (99 ) accuracy, and generalizes to test data requiring substantially deeper chaining than seen during training (95 scores). We also demonstrate that the models transfer well to two hand authored rulebases, and to rulebases paraphrased into more natural language. These findings are significant as it suggests a new role for transformers, namely as limited \"soft theorem provers\" operating over explicit theories in language. This in turn suggests new possibilities for explainability, correctability, and counterfactual reasoning in question answering."} {"_id": [36, 7], "label": "physics.chem-ph physics.comp-ph", "text": "Dynamical reweighting methods for Markov models. Markov State Models (MSM) are widely used to elucidate dynamic properties of molecular systems from unbiased Molecular Dynamics (MD). However, the implementation of reweighting schemes for MSMs to analyze biased simulations, for example produced by enhanced sampling techniques, is still at an early stage of development. Several dynamical reweighing approaches have been proposed, which can be classified as approaches based on (i) Kramers rate theory, (ii) rescaling of the probability density flux, (iii) reweighting by formulating a likelihood function, (iv) path reweighting. We present the state of the art and discuss the methodological differences of these methods, their limitations and recent applications."} {"_id": [25], "label": "math.PR", "text": "Precise large deviations for dependent subexponential variables. In this paper we study precise large deviations for the partial sums of a stationary sequence with a subexponential marginal distribution. Our main focus is on distributions which either have a regularly varying or a lognormal type tail. We apply the results to prove limit theory for the maxima of the entries large sample covariance matrices."} {"_id": [19, 15], "label": "cs.CR cs.IT math.IT", "text": "On the Compositionality of Dynamic Leakage and Its Application to the Quantification Problem. Quantitative information flow (QIF) is traditionally defined as the expected value of information leakage over all feasible program runs and it fails to identify vulnerable programs where only limited number of runs leak large amount of information. As discussed in Bielova (2016), a good notion for dynamic leakage and an efficient way of computing the leakage are needed. To address this problem, the authors have already proposed two notions for dynamic leakage and a method of quantifying dynamic leakage based on model counting. Inspired by the work of Kawamoto et. al. (2017), this paper proposes two efficient methods for computing dynamic leakage, a compositional method along with the sequential structure of a program and a parallel computation based on the value domain decomposition. For the former, we also investigate both exact and approximated calculations. From the perspective of implementation, we utilize binary decision diagrams (BDDs) and deterministic decomposable negation normal forms (d DNNFs) to represent Boolean formulas in model counting. Finally, we show experimental results on several examples."} {"_id": [0], "label": "cs.CV", "text": "Better Patch Stitching for Parametric Surface Reconstruction. Recently, parametric mappings have emerged as highly effective surface representations, yielding low reconstruction error. In particular, the latest works represent the target shape as an atlas of multiple mappings, which can closely encode object parts. Atlas representations, however, suffer from one major drawback The individual mappings are not guaranteed to be consistent, which results in holes in the reconstructed shape or in jagged surface areas. We introduce an approach that explicitly encourages global consistency of the local mappings. To this end, we introduce two novel loss terms. The first term exploits the surface normals and requires that they remain locally consistent when estimated within and across the individual mappings. The second term further encourages better spatial configuration of the mappings by minimizing novel stitching error. We show on standard benchmarks that the use of normal consistency requirement outperforms the baselines quantitatively while enforcing better stitching leads to much better visual quality of the reconstructed objects as compared to the state of the art."} {"_id": [64, 59], "label": "cs.SI physics.soc-ph", "text": "Searching for small world and scale free behaviour in long term historical data of a real world power grid. In this paper the authors use the 70 year long historical dataset of the Hungarian power grid to perform complex network analysis, which is the first attempt to evaluate small world and scale free properties on long term real world data."} {"_id": [20, 6], "label": "math.NA cs.NA physics.flu-dyn", "text": "Efficient Reordered Nonlinear Gauss Seidel Solvers With Higher Order For Black Oil Models. The fully implicit method is the most commonly used approach to solve black oil problems in reservoir simulation. The method requires repeated linearization of large nonlinear systems and produces ill condi tioned linear systems. We present a strategy to reduce computational time that relies on two key ideas ( textit i ) a sequential formulation that decouples flow and transport into separate subproblems, and ( textit ii ) a highly efficient Gauss Seidel solver for the transport problems. This solver uses intercell fluxes to reorder the grid cells according to their upstream neighbors, and groups cells that are mutually dependent because of counter current flow into local clusters. The cells and local clusters can then be solved in sequence, starting from the inflow and moving gradually downstream, since each new cell or local cluster will only depend on upstream neighbors that have already been computed. Altogether, this gives optimal localization and control of the nonlinear solution process. This method has been successfully applied to real field problems using the standard first order finite volume discretization. Here, we extend the idea to first order dG methods on fully unstructured grids. We also demonstrate proof of concept for the reordering idea by applying it to the full simulation model of the Norne oil field, using a prototype variant of the open source OPM Flow simulator."} {"_id": [51], "label": "physics.bio-ph", "text": "Microalgal swimming signatures as indicators of neutral lipids production across growth phases. Microalgae have been shown as a potential bioresource for food, biofuel, and pharmaceutical products. During the growth phases with corresponding environmental conditions, microalgae accumulate different amounts of various metabolites. We quantified the lipid accumulation and analyzed swimming signatures (speed and trajectories) of the motile green alga, Dunaliella primolecta, during the lag exponential stationary growth cycle at different nutrient concentrations. We discovered significant changes in neutral lipid content and swimming signatures of microalgae across growth phases. The timing of the maximum swimming speed coincided with the maximum lipid content and both maxima occurred under nutrient stress at the stationary growth phase. Furthermore, the swimming trajectories of microalgae signal the growth phase and corresponding intracellular lipid accumulation. Our results provide the potential exploitation of microalgal swimming signatures as indicators for the cultivation conditions and the timing of microalgal harvest to maximize the lipid yield for biofuel production. The findings can also be implemented to explore the production of food and antibiotics from other microalgal metabolites with low energy cost."} {"_id": [60], "label": "cs.AR", "text": "DNNExplorer A Framework for Modeling and Exploring a Novel Paradigm of FPGA based DNN Accelerator. Existing FPGA based DNN accelerators typically fall into two design paradigms. Either they adopt a generic reusable architecture to support different DNN networks but leave some performance and efficiency on the table because of the sacrifice of design specificity. Or they apply a layer wise tailor made architecture to optimize layer specific demands for computation and resources but loose the scalability of adaptation to a wide range of DNN networks. To overcome these drawbacks, this paper proposes a novel FPGA based DNN accelerator design paradigm and its automation tool, called DNNExplorer, to enable fast exploration of various accelerator designs under the proposed paradigm and deliver optimized accelerator architectures for existing and emerging DNN networks. Three key techniques are essential for DNNExplorer's improved performance, better specificity, and scalability, including (1) a unique accelerator design paradigm with both high dimensional design space support and fine grained adjustability, (2) a dynamic design space to accommodate different combinations of DNN workloads and targeted FPGAs, and (3) a design space exploration (DSE) engine to generate optimized accelerator architectures following the proposed paradigm by simultaneously considering both FPGAs' computation and memory resources and DNN networks' layer wise characteristics and overall complexity. Experimental results show that, for the same FPGAs, accelerators generated by DNNExplorer can deliver up to 4.2x higher performances (GOP s) than the state of the art layer wise pipelined solutions generated by DNNBuilder for VGG like DNN with 38 CONV layers. Compared to accelerators with generic reusable computation units, DNNExplorer achieves up to 2.0x and 4.4x DSP efficiency improvement than a recently published accelerator design from academia (HybridDNN) and a commercial DNN accelerator IP (Xilinx DPU), respectively."} {"_id": [34], "label": "math.CV", "text": "On the difference of coefficients of univalent functions. For f in mathcal S , the class of normalized functions, analytic and univalent in the unit disk mathbb D and given by f(z) z sum n 2 infty a n z n for z in mathbb D , we give an upper bound for the coefficient difference a 4 a 3 when f in mathcal S . This provides an improved bound in the case n 3 of Grispan's 1976 general bound a n 1 a n le 3.61 dots . Other coefficients bounds, and bounds for the second and third Hankel determinants when f in mathcal S are found when either a 2 0, or a 3 0 ."} {"_id": [62], "label": "cs.GT", "text": "Adapting Stable Matchings to Evolving Preferences. Adaptivity to changing environments and constraints is key to success in modern society. We address this by proposing \"incrementalized versions\" of Stable Marriage and Stable Roommates. That is, we try to answer the following question for both problems, what is the computational cost of adapting an existing stable matching after some of the preferences of the agents have changed. While doing so, we also model the constraint that the new stable matching shall be not too different from the old one. After formalizing these incremental versions, we provide a fairly comprehensive picture of the computational complexity landscape of Incremental Stable Marriage and Incremental Stable Roommates. To this end, we exploit the parameters \"degree of change\" both in the input (difference between old and new preference profile) and in the output (difference between old and new stable matching). We obtain both hardness and tractability results, in particular showing a fixed parameter tractability result with respect to the parameter \"distance between old and new stable matching\"."} {"_id": [22], "label": "cs.SE", "text": "Predicting Breakdowns in Cloud Services (with SPIKE). Maintaining web services is a mission critical task where any down time means loss of revenue and reputation (of being a reliable service provider). In the current competitive web services market, such a loss of reputation causes extensive loss of future revenue. To address this issue, we developed SPIKE, a data mining tool which can predict upcoming service breakdowns, half an hour into the future. Such predictions let an organization alert and assemble the tiger team to address the problem (e.g. by reconfiguring cloud hardware in order to reduce the likelihood of that breakdown). SPIKE utilizes (a) regression tree learning (with CART) (b) synthetic minority over sampling (to handle how rare spikes are in our data) (c) hyperparameter optimization (to learn best settings for our local data) and (d) a technique we called \"topology sampling\" where training vectors are built from extensive details of an individual node plus summary details on all their neighbors. In the experiments reported here, SPIKE predicted service spikes 30 minutes into future with recalls and precision of 75 and above. Also, SPIKE performed relatively better than other widely used learning methods (neural nets, random forests, logistic regression)."} {"_id": [34, 23], "label": "math.CV math.FA", "text": "Semigroups of composition operators in analytic Morrey spaces. Analytic Morrey spaces belong to the class of function spaces which, like BMOA, are defined in terms of the degree of oscillation on the boundary of functions analytic in the unit disc. We consider semigroups of composition operators on these spaces and focus on the question of strong continuity. It is shown that these semigroups behave like on BMOA."} {"_id": [12, 23], "label": "math.FA math.CA", "text": "Uncertainty Principles for the Fourier and the Short Time Fourier Transforms. The aim of this paper is to establish a few uncertainty principles for the Fourier and the short time Fourier transforms. Also, we discuss an analogue of Donoho Stark uncertainty principle and provide some estimates for the size of the essential support of the short time Fourier transform."} {"_id": [80, 13, 46], "label": "math.DS cs.SC math.AG", "text": "Quadratization of ODEs Monomial vs. Non Monomial. Quadratization is a transform of a system of ODEs with polynomial right hand side into a system of ODEs with at most quadratic right hand side via the introduction of new variables. It has been recently used as a pre processing step for new model order reduction methods, so it is important to keep the number of new variables small. Several algorithms have been designed to search for a quadratization with the new variables being monomials in the original variables. To understand the limitations and potential ways of improving such algorithms, we study the following question can quadratizations with not necessarily monomial new variables produce a model of substantially smaller dimension than quadratization with only monomial new variables? To do this, we restrict our attention to scalar polynomial ODEs. Our first result is that a scalar polynomial ODE dot x p(x) a nx n a n 1 x n 1 ldots a 0 with n geqslant 5 and a n neq0 can be quadratized using exactly one new variable if and only if p(x frac a n 1 n cdot a n ) a nx n ax 2 bx for some a, b in mathbb C . In fact, the new variable can be taken z (x frac a n 1 n cdot a n ) n 1 . Our second result is that two non monomial new variables are enough to quadratize all degree 6 scalar polynomial ODEs. Based on these results, we observe that a quadratization with not necessarily monomial new variables can be much smaller than a monomial quadratization even for scalar ODEs. The main results of the paper have been discovered using computational methods of applied nonlinear algebra (Gr \"obner bases), and we describe these computations."} {"_id": [38], "label": "math.NT", "text": "Potential diagonalisability of pseudo Barsotti Tate representations. Previous work of Kisin and Gee proves potential diagonalisability of two dimensional Barsotti Tate representations of the Galois group of a finite extension K mathbb Q p . In this paper we build upon their work by relaxing the Barsotti Tate condition to one we call pseudo Barsotti Tate (which means that for certain embeddings kappa K rightarrow overline mathbb Q p we allow the kappa Hodge Tate weights to be contained in 0,p rather than 0,1 )."} {"_id": [21], "label": "math.CO", "text": "Enhancing the Erd H o s Lov 'asz Tihany Conjecture for graphs with independence number two. Let s ge2 and t ge2 be integers. A graph G is (s,t) emph splittable if V(G) can be partitioned into two sets S and T such that chi(G S ) geq s and chi(G T ) geq t . The well known Erd H o s Lov 'asz Tihany Conjecture from 1968 states that every graph G whose chromatic number chi(G) s t 1 is more than its clique number omega(G) is (s,t) splittable. In this paper, we prove an enhanced version of the Erd H o s Lov 'asz Tihany Conjecture for graphs with independence number two. That is, for every graph G with chi(G) s t 1 omega(G) 1 is (s,t 1) splittable. There are examples showing that this result is best possible."} {"_id": [0], "label": "cs.CV", "text": "Convolutions on Spherical Images. Applying convolutional neural networks to spherical images requires particular considerations. We look to the millennia of work on cartographic map projections to provide the tools to define an optimal representation of spherical images for the convolution operation. We propose a representation for deep spherical image inference based on the icosahedral Snyder equal area (ISEA) projection, a projection onto a geodesic grid, and show that it vastly exceeds the state of the art for convolution on spherical images, improving semantic segmentation results by 12.6 ."} {"_id": [26, 38], "label": "math.NT math.RT", "text": "Regular irreducible represntations of classical groups over finite quotient rings. A parametrization of irreducible representations associated with a regular adjoint orbit of a classical group over finite quotient rings of the ring of integer of a non dyadic non archimedean local field is presented. The parametrization is given by means of (a subset of) the character group of the centralizer of a representative of the regular adjoint orbit. Our method is based upon Weil representations over finite fields. More explicit parametrization in terms of tamely ramified extensions of the base field is given for the general linear group, the special linear group, the symplectic group and the orthogonal group."} {"_id": [9], "label": "math.AP", "text": "Stability results for nonlocal geometric evolutions and limit cases for fractional mean curvature flows. We introduce a notion of uniform convergence for local and nonlocal curvatures. Then, we propose an abstract method to prove the convergence of the corresponding geometric flows, within the level set formulation. We apply such a general theory to characterize the limits of s fractional mean curvature flows as s to 0 and s to 1 . In analogy with the s fractional mean curvature flows, we introduce the notion of s Riesz curvature flows and characterize its limit as s to 0 . Eventually, we discuss the limit behavior as r to 0 of the flow generated by a regularization of the r Minkowski content."} {"_id": [1, 20], "label": "cs.LG cs.NA math.NA", "text": "A feedforward neural network for modelling of average pressure frequency response. The Helmholtz equation has been used for modelling the sound pressure field under a harmonic load. Computing harmonic sound pressure fields by means of solving Helmholtz equation can quickly become unfeasible if one wants to study many different geometries for ranges of frequencies. We propose a machine learning approach, namely a feedforward dense neural network, for computing the average sound pressure over a frequency range. The data is generated with finite elements, by numerically computing the response of the average sound pressure, by an eigenmode decomposition of the pressure. We analyze the accuracy of the approximation and determine how much training data is needed in order to reach a certain accuracy in the predictions of the average pressure response."} {"_id": [3], "label": "cs.CL", "text": "Automatic Detection of Generated Text is Easiest when Humans are Fooled. Recent advancements in neural language modelling make it possible to rapidly generate vast amounts of human sounding text. The capabilities of humans and automatic discriminators to detect machine generated text have been a large source of research interest, but humans and machines rely on different cues to make their decisions. Here, we perform careful benchmarking and analysis of three popular sampling based decoding strategies top k , nucleus sampling, and untruncated random sampling and show that improvements in decoding methods have primarily optimized for fooling humans. This comes at the expense of introducing statistical abnormalities that make detection easy for automatic systems. We also show that though both human and automatic detector performance improve with longer excerpt length, even multi sentence excerpts can fool expert human raters over 30 of the time. Our findings reveal the importance of using both human and automatic detectors to assess the humanness of text generation systems."} {"_id": [41], "label": "cs.RO", "text": "Curved patch mapping and tracking for irregular terrain modeling Application to bipedal robot foot placement. Legged robots need to make contact with irregular surfaces, when operating in unstructured natural terrains. Representing and perceiving these areas to reason about potential contact between a robot and its surrounding environment, is still largely an open problem. This paper introduces a new framework to model and map local rough terrain surfaces, for tasks such as bipedal robot foot placement. The system operates in real time, on data from an RGB D and an IMU sensor. We introduce a set of parametrized patch models and an algorithm to fit them in the environment. Potential contacts are identified as bounded curved patches of approximately the same size as the robot's foot sole. This includes sparse seed point sampling, point cloud neighborhood search, and patch fitting and validation. We also present a mapping and tracking system, where patches are maintained in a local spatial map around the robot as it moves. A bio inspired sampling algorithm is introduced for finding salient contacts. We include a dense volumetric fusion layer for spatiotemporally tracking, using multiple depth data to reconstruct a local point cloud. We present experimental results on a mini biped robot that performs foot placements on rocks, implementing a 3D foothold perception system, that uses the developed patch mapping and tracking framework."} {"_id": [64], "label": "physics.soc-ph", "text": "On measuring two party partisan bias in unbalanced states. Assuming that partisan fairness and responsiveness are important aspects of redistricting, it is important to measure them. Many measures of partisan bias are satisfactory for states that are balanced with roughly equal proportions of voters for the two major parties. It has been less clear which metrics measure fairness robustly when the proportion of the vote is unbalanced by as little as 60 to 40 . We have addressed this by analyzing past election results for four states with Democratic preferences (CA, IL, MA, and MD), three states with Republican preferences (SC, TN, and TX) and comparing those to results for four nearly balanced states (CO, NC, OH, and PA). We used many past statewide elections in each state to build statistically precise seats for votes and rank for votes graphs to which many measures of partisan bias were applied. In addition to providing values of responsiveness, we find that five of the measures of bias provide mutually consistent values in all states, thereby providing a core of usable measures for unbalanced states. Although all five measures focus on different aspects of partisan bias, normalization of the values across the eleven states provides a suitable way to compare them, and we propose that their average provides a superior measure which we call composite bias. Regarding other measures, we find that the most seemingly plausible symmetry measure fails for unbalanced states. We also consider deviations from the proportionality ideal, but using it is difficult because the political geography of a state can entangle responsiveness with total partisan bias. We do not attempt to separate intentional partisan bias from the implicit bias that results from the interaction of the map drawing rules of a state and its political geography, on the grounds that redistricting should attempt to minimize total partisan bias whatever its provenance."} {"_id": [47], "label": "math.AT", "text": "Effective topological complexity of orientable surface groups. We use rewriting systems to spell out cup products in the (twisted) cohomology groups of a product of surface groups. This allows us to detect a non trivial obstruction bounding from below the effective topological complexity of an orientable surface with respect to its antipodal involution. Our estimates are at most one unit from being optimal, and are closely related to the (regular) topological complexity of non orientable surfaces."} {"_id": [32, 17], "label": "cs.DC cs.DS", "text": "Efficient Partial Snapshot Implementations. In this work, we propose the lambda scanner snapshot, a variation of the snapshot object, which supports any fixed amount of 0 lambda leq n different SCAN operations being active at any given time. Whenever lambda is equal to the number of processes n in the system, the lambda scanner object implements a multi scanner object, while in case that lambda is equal to 1 , the lambda scanner object implements a single scanner object. We present the lambda Snap snapshot object, a wait free lambda scanner snapshot implementation that has a step complexity of O( lambda) for UPDATE operations and O( lambda m) for SCAN operations. The space complexity of lambda Snap is O( lambda m) . lambda Snap provides a trade off between the step space complexity and the maximum number of SCAN operations that the system can afford to be active on any given point in time. The low space complexity that our implementations provide makes them more appealing in real system applications. Moreover, we provide a slightly modified version of the lambda Snap implementation, which is called partial lambda Snap , that is able to support dynamic partial scan operations. In such an object, processes can execute modified SCAN operations called PARTIAL SCAN that could obtain a part of the snapshot object avoiding to read the whole set of components. In this work, we first provide a simple single scanner version of lambda Snap , which is called 1 Snap . We provide 1 Snap just for presentation purposes, since it is simpler than lambda Snap . The UPDATE in 1 Snap has a step complexity of O(1) , while the SCAN has a step complexity of O(m) . This implementation uses O(m) CAS registers."} {"_id": [0], "label": "cs.CV", "text": "Ocular Recognition Databases and Competitions A Survey. The use of the iris and periocular region as biometric traits has been extensively investigated, mainly due to the singularity of the iris features and the use of the periocular region when the image resolution is not sufficient to extract iris information. In addition to providing information about an individual's identity, features extracted from these traits can also be explored to obtain other information such as the individual's gender, the influence of drug use, the use of contact lenses, spoofing, among others. This work presents a survey of the databases created for ocular recognition, detailing their protocols and how their images were acquired. We also describe and discuss the most popular ocular recognition competitions (contests), highlighting the submitted algorithms that achieved the best results using only iris trait and also fusing iris and periocular region information. Finally, we describe some relevant works applying deep learning techniques to ocular recognition and point out new challenges and future directions. Considering that there are a large number of ocular databases, and each one is usually designed for a specific problem, we believe this survey can provide a broad overview of the challenges in ocular biometrics."} {"_id": [0, 41], "label": "cs.CV cs.RO", "text": "PoseRBPF A Rao Blackwellized Particle Filter for 6D Object Pose Tracking. Tracking 6D poses of objects from videos provides rich information to a robot in performing different tasks such as manipulation and navigation. In this work, we formulate the 6D object pose tracking problem in the Rao Blackwellized particle filtering framework, where the 3D rotation and the 3D translation of an object are decoupled. This factorization allows our approach, called PoseRBPF, to efficiently estimate the 3D translation of an object along with the full distribution over the 3D rotation. This is achieved by discretizing the rotation space in a fine grained manner, and training an auto encoder network to construct a codebook of feature embeddings for the discretized rotations. As a result, PoseRBPF can track objects with arbitrary symmetries while still maintaining adequate posterior distributions. Our approach achieves state of the art results on two 6D pose estimation benchmarks. A video showing the experiments can be found at https youtu.be lE5gjzRKWuA"} {"_id": [72, 17, 66, 91], "label": "cs.CE cs.DC cs.PF q-bio.GN", "text": "Communication Efficient Jaccard Similarity for High Performance Distributed Genome Comparisons. The Jaccard similarity index is an important measure of the overlap of two sets, widely used in machine learning, computational genomics, information retrieval, and many other areas. We design and implement SimilarityAtScale, the first communication efficient distributed algorithm for computing the Jaccard similarity among pairs of large datasets. Our algorithm provides an efficient encoding of this problem into a multiplication of sparse matrices. Both the encoding and sparse matrix product are performed in a way that minimizes data movement in terms of communication and synchronization costs. We apply our algorithm to obtain similarity among all pairs of a set of large samples of genomes. This task is a key part of modern metagenomics analysis and an evergrowing need due to the increasing availability of high throughput DNA sequencing data. The resulting scheme is the first to enable accurate Jaccard distance derivations for massive datasets, using largescale distributed memory systems. We package our routines in a tool, called GenomeAtScale, that combines the proposed algorithm with tools for processing input sequences. Our evaluation on real data illustrates that one can use GenomeAtScale to effectively employ tens of thousands of processors to reach new frontiers in large scale genomic and metagenomic analysis. While GenomeAtScale can be used to foster DNA research, the more general underlying SimilarityAtScale algorithm may be used for high performance distributed similarity computations in other data analytics application domains."} {"_id": [0, 2], "label": "cs.CV cs.AI", "text": "Processsing Simple Geometric Attributes with Autoencoders. Image synthesis is a core problem in modern deep learning, and many recent architectures such as autoencoders and Generative Adversarial networks produce spectacular results on highly complex data, such as images of faces or landscapes. While these results open up a wide range of new, advanced synthesis applications, there is also a severe lack of theoretical understanding of how these networks work. This results in a wide range of practical problems, such as difficulties in training, the tendency to sample images with little or no variability, and generalisation problems. In this paper, we propose to analyse the ability of the simplest generative network, the autoencoder, to encode and decode two simple geometric attributes size and position. We believe that, in order to understand more complicated tasks, it is necessary to first understand how these networks process simple attributes. For the first property, we analyse the case of images of centred disks with variable radii. We explain how the autoencoder projects these images to and from a latent space of smallest possible dimension, a scalar. In particular, we describe a closed form solution to the decoding training problem in a network without biases, and show that during training, the network indeed finds this solution. We then investigate the best regularisation approaches which yield networks that generalise well. For the second property, position, we look at the encoding and decoding of Dirac delta functions, also known as one hot' vectors. We describe a hand crafted filter that achieves encoding perfectly, and show that the network naturally finds this filter during training. We also show experimentally that the decoding can be achieved if the dataset is sampled in an appropriate manner."} {"_id": [74, 75, 21, 24, 29], "label": "math.MG math.CO math.GR math.KT math.OA", "text": "On the structure of asymptotic expanders. In this paper, we use geometric tools to study the structure of asymptotic expanders and show that a sequence of asymptotic expanders always admits a \"uniform exhaustion by expanders\". It follows that asymptotic expanders cannot be coarsely embedded into any L p space, and that asymptotic expanders can be characterised in terms of their uniform Roe algebra. Moreover, we provide uncountably many new counterexamples to the coarse Baum Connes conjecture. These appear to be the first counterexamples that are not directly constructed by means of spectral gaps. Finally, we show that vertex transitive asymptotic expanders are actually expanders. In particular, this gives a C algebraic characterisation of expanders for vertex transitive graphs."} {"_id": [9], "label": "math.AP", "text": "Global properties of vector fields on compact Lie groups in Komatsu classes. In this paper we characterize completely the global hypoellipticity and global solvability in the sense of Komatsu (of Roumieu and Beurling types) of constant coefficients vector fields on compact Lie groups. We also analyze the influence of perturbations by lower order terms in the preservation of these properties."} {"_id": [17], "label": "cs.DC", "text": "FusionStitching Boosting Execution Efficiency of Memory Intensive Computations for DL Workloads. Performance optimization is the art of continuous seeking a harmonious mapping between the application domain and hardware. Recent years have witnessed a surge of deep learning (DL) applications in industry. Conventional wisdom for optimizing such workloads mainly focus on compute intensive ops (GEMM, Convolution, etc). Yet we show in this work, that the performance of memory intensive computations is vital to E2E performance in practical DL models. We propose emph FusionStitching , a optimization framework capable of fusing memory intensive emph elementwise , emph reduction and fine grained emph GEMM Batched GEMM ops, with or without data dependences, into large computation units, then mapping and transforming them into efficient GPU kernels. We formulate the fusion plan optimization as an integer linear programming (ILP) problem, and propose a set of empirical heuristics to reduce the combinatorial search space. In order to map optimized fusion plans to hardware, we propose a technique to effectively compose various groups of computations into a single GPU kernel, by fully leveraging on chip resources like scratchpads or registers. Experimental results on six benchmarks and four industry scale practical models are encouraging. Overall, emph FusionStitching can reach up to 5.7x speedup compared to Tensorflow baseline, and achieves 1.25x to 1.85x performance speedups compared to current state of the art, with 1.4x on average (geometric mean)."} {"_id": [21, 13], "label": "math.DS math.CO", "text": "Symbolic dynamical scales modes, orbitals, and transversals. We study classes of musical scales obtained from shift spaces in symbolic dynamics through the first symbol rule, which yields scales in any n TET tuning system. The modes are thought as elements of orbit equivalence classes of cyclic shift actions on languages, and we study their orbitals and transversals. We present explicit formulations of the generating functions that allow us to deduce the orbital and transversal dimensions of classes of musical scales generated by vertex shifts, for all n , in particular for the 12 TET tuning system."} {"_id": [17, 2, 52, 49], "label": "cs.AI cs.DC cs.MA math.OC", "text": "Leveraging Decentralized Artificial Intelligence to Enhance Resilience of Energy Networks. This paper reintroduces the notion of resilience in the context of recent issues originated from climate change triggered events including severe hurricanes and wildfires. A recent example is PG E's forced power outage to contain wildfire risk which led to widespread power disruption. This paper focuses on answering two questions who is responsible for resilience? and how to quantify the monetary value of resilience? To this end, we first provide preliminary definitions of resilience for power systems. We then investigate the role of natural hazards, especially wildfire, on power system resilience. Finally, we will propose a decentralized strategy for a resilient management system using distributed storage and demand response resources. Our proposed high fidelity model provides utilities, operators, and policymakers with a clearer picture for strategic decision making and preventive decisions."} {"_id": [56, 37], "label": "cs.LO cs.FL", "text": "Automatic Translation of tock CSP into Timed Automata. The process algebra tock CSP provides textual notations for modelling discrete time behaviours, with the support of various tools for verification. Similarly, automatic verification of Timed Automata (TA) is supported by the real time verification toolbox UPPAAL. TA and tock CSP differ in both modelling and verification approaches. For instance, liveness requirements are difficult to specify with the constructs of tock CSP, but they are easy to verify in UPPAAL. In this work, we translate tock CSP into TA to take advantage of UPPAAL. We have developed a translation technique and tool our work uses rules for translating tock CSP into a network of small TA, which address the complexity of capturing the compositionality of tock CSP . For validation, we use an experimental approach based on finite approximations to trace sets. We plan to use mathematical proof to establish the correctness of the rules that will cover an infinite set of traces."} {"_id": [20], "label": "math.NA cs.NA", "text": "Long time mathcal H s alpha stability of a classical scheme for Cahn Hilliard equation with polynomial nonlinearity. In this paper we investigate the long time stability of the implicit Euler scheme for the Cahn Hilliard equation with polynomial nonlinearity. The uniform estimates in H 1 and mathcal H s alpha ( s 1,2,3 ) spaces independent of the initial data and time discrete step sizes are derived for the numerical solution produced by this classical scheme with variable time step sizes.The uniform mathcal H 3 alpha bound is obtained on basis of the uniform H 1 estimate for the discrete chemical potential which is derived with the aid of the uniform discrete Gronwall lemma. A comparison with the estimates for the continuous in time dynamical system reveals that the classical implicit Euler method can completely preserve the long time behaviour of the underlying system. Such a long time behaviour is also demonstrated by the numerical experiments with the help of Fourier pseudospectral space approximation."} {"_id": [21], "label": "math.CO", "text": "On the chromatic number of almost stable general Kneser hypergraphs. Let n ge 1 and s ge 1 be integers. An almost s stable subset A of n 1, dots,n is a subset such that for any two distinct elements i, j in A , one has i j ge s . For a family cal F of non empty subsets of n and an integer r ge 2 , the chromatic number of the r uniform Kneser hypergraph mbox KG r( cal F ) , whose vertex set is cal F and whose edge set is the set of A 1, dots, A r of pairwise disjoint elements in cal F , has been studied extensively in the literature and Abyazi Sani and Alishahi were able to give a lower bound for it in terms of the equatable r colorability defect, mbox ecd r( cal F ) . In this article, the methods of Chen for the special family of all k subsets of n , are modified to give lower bounds for the chromatic number of almost stable general Kneser hypergraph mbox KG r( cal F s) in terms of mbox ecd s( cal F ) . Here cal F s is the collection of almost s stable elements of cal F . We also propose a generalization of a conjecture of Meunier."} {"_id": [10, 7], "label": "physics.ao-ph physics.comp-ph", "text": "Fast and Accurate Computation of Vertical Modes. The vertical modes of linearized equations of motion are widely used by the oceanographic community in numerous theoretical and observational contexts. However, the standard approach for solving the generalized eigenvalue problem using second order finite difference matrices produces O(1) errors for all but the few lowest modes, and increasing resolution quickly becomes too slow as the computational complexity of eigenvalue algorithms increase as O(n 3) . Existing methods are therefore inadequate for computing a full spectrum of internal waves, such as needed for initializing a numerical model with a full internal wave spectrum. Here we show that rewriting the eigenvalue problem in stretched coordinates and projecting onto Chebyshev polynomials results in substantially more accurate modes than finite differencing at a fraction of the computational cost. We also compute the surface quasigeostrophic modes using the same methods. All spectral and finite difference algorithms are made available in a suite of Matlab classes that have been validated against known analytical solutions in constant and exponential stratification."} {"_id": [77], "label": "math.LO", "text": "Denseness results in the theory of algebraic fields. We study when the property that a field is dense in its real and p adic closures is elementary in the language of rings and deduce that all models of the theory of algebraic fields have this property."} {"_id": [0], "label": "cs.CV", "text": "P3SGD Patient Privacy Preserving SGD for Regularizing Deep CNNs in Pathological Image Classification. Recently, deep convolutional neural networks (CNNs) have achieved great success in pathological image classification. However, due to the limited number of labeled pathological images, there are still two challenges to be addressed (1) overfitting the performance of a CNN model is undermined by the overfitting due to its huge amounts of parameters and the insufficiency of labeled training data. (2) privacy leakage the model trained using a conventional method may involuntarily reveal the private information of the patients in the training dataset. The smaller the dataset, the worse the privacy leakage. To tackle the above two challenges, we introduce a novel stochastic gradient descent (SGD) scheme, named patient privacy preserving SGD (P3SGD), which performs the model update of the SGD in the patient level via a large step update built upon each patient's data. Specifically, to protect privacy and regularize the CNN model, we propose to inject the well designed noise into the updates. Moreover, we equip our P3SGD with an elaborated strategy to adaptively control the scale of the injected noise. To validate the effectiveness of P3SGD, we perform extensive experiments on a real world clinical dataset and quantitatively demonstrate the superior ability of P3SGD in reducing the risk of overfitting. We also provide a rigorous analysis of the privacy cost under differential privacy. Additionally, we find that the models trained with P3SGD are resistant to the model inversion attack compared with those trained using non private SGD."} {"_id": [12, 20], "label": "math.CA cs.NA math.NA", "text": "Approximation of functions by linear summation methods in the Orlicz type spaces. Approximative properties of linear summation methods of Fourier series are considered in the Orlicz type spaces mathcal S M . In particular, in terms of approximations by such methods, constructive characteristics are obtained for classes of functions whose smoothness moduli do not exceed a certain majorant."} {"_id": [35], "label": "math.RA", "text": "Algebras with Laurent polynomial identity. In this article we shows some results about algebra with the group of units having special polynomial identity."} {"_id": [38], "label": "math.NT", "text": "Finite field extensions with the line or translate property for r primitive elements. Let r,n 1 be integers and q be any prime power q such that r mid q n 1 . We say that the extension mathbb F q n mathbb F q possesses the line property for r primitive elements property if, for every alpha, theta in mathbb F q n , such that mathbb F q n mathbb F q( theta) , there exists some x in mathbb F q , such that alpha( theta x) has multiplicative order (q n 1) r . We prove that, for sufficiently large prime powers q , mathbb F q n mathbb F q possesses the line property for r primitive elements. We also discuss the (weaker) translate property for extensions."} {"_id": [22], "label": "cs.SE", "text": "IBIR Bug Report driven Fault Injection. Much research on software engineering and software testing relies on experimental studies based on fault injection. Fault injection, however, is not often relevant to emulate real world software faults since it \"blindly\" injects large numbers of faults. It remains indeed challenging to inject few but realistic faults that target a particular functionality in a program. In this work, we introduce IBIR, a fault injection tool that addresses this challenge by exploring change patterns associated to user reported faults. To inject realistic faults, we create mutants by retargeting a bug report driven automated program repair system, i.e., reversing its code transformation templates. IBIR is further appealing in practice since it requires deep knowledge of neither of the code nor the tests, but just of the program's relevant bug reports. Thus, our approach focuses the fault injection on the feature targeted by the bug report. We assess IBIR by considering the Defects4J dataset. Experimental results show that our approach outperforms the fault injection performed by traditional mutation testing in terms of semantic similarity with the original bug, when applied at either system or class levels of granularity, and provides better, statistically significant, estimations of test effectiveness (fault detection). Additionally, when injecting 100 faults, IBIR injects faults that couple with the real ones in 36 of the cases, while mutants from mutation testing inject less than 1 . Overall, IBIR targets real functionality and injects realistic and diverse faults."} {"_id": [74, 29], "label": "math.OA math.GR", "text": "New examples of W and C superrigid groups. A group G is called W superrigid (resp. C superrigid) if it is completely recognizable from its von Neumann algebra L(G) (resp. reduced C algebra C r (G) ). Developing new technical aspects in Popa's deformation rigidity theory we introduce several new classes of W superrigid groups which appear as direct products, semidirect products with non amenable core and iterations of amalgamated free products and HNN extensions. As a byproduct we obtain new rigidity results in C algebra theory including additional examples of C superrigid groups and explicit computations of symmetries of reduced group C algebras."} {"_id": [49, 9, 23], "label": "math.OC math.AP math.FA", "text": "Solvability of an Operator Riccati Integral Equation in a Reflexive Banach Space. We show that if X is a reflexive Banach space, then a nonautonomous operator Riccati integral equation has a unique strongly continuous self adjoint nonnegative solution P(t) in mathcal L (X,X )"} {"_id": [3], "label": "cs.CL", "text": "Improving Zero Shot Translation by Disentangling Positional Information. Multilingual neural machine translation has shown the capability of directly translating between language pairs unseen in training, i.e. zero shot translation. Despite being conceptually attractive, it often suffers from low output quality. The difficulty of generalizing to new translation directions suggests the model representations are highly specific to those language pairs seen in training. We demonstrate that a main factor causing the language specific representations is the positional correspondence to input tokens. We show that this can be easily alleviated by removing residual connections in an encoder layer. With this modification, we gain up to 18.5 BLEU points on zero shot translation while retaining quality on supervised directions. The improvements are particularly prominent between related languages, where our proposed model outperforms pivot based translation. Moreover, our approach allows easy integration of new languages, which substantially expands translation coverage. By thorough inspections of the hidden layer outputs, we show that our approach indeed leads to more language independent representations."} {"_id": [11], "label": "physics.app-ph", "text": "On Chip Characterization of High Loss Liquids between 750 GHz and 1100 GHz. Terahertz spectroscopy is a promising tool for analyzing the picosecond dynamics of biomolecules, which is influenced by surrounding water molecules. However, water causes extreme losses to terahertz signals, preventing sensitive measurements at this frequency range. Here, we present sensitive on chip terahertz spectroscopy of highly lossy aqueous solutions using a vector network analyzer, contact probes, and a coplanar waveguide with a 0.1 mm wide microfluidic channel. The complex permittivities of various deionized water isopropyl alcohol concentration are extracted from a known reference measurement across the frequency range 750 1100 GHz and agrees well with literature data. The results prove the presented method as a high sensitive approach for on chip terahertz spectroscopy of high loss liquids, capable of resolving the permittivity of water."} {"_id": [32], "label": "cs.DS", "text": "Optimal Streaming Algorithms for Submodular Maximization with Cardinality Constraints. We study the problem of maximizing a non monotone submodular function subject to a cardinality constraint in the streaming model. Our main contribution is a single pass (semi )streaming algorithm that uses roughly O(k varepsilon 2) memory, where k is the size constraint. At the end of the stream, our algorithm post processes its data structure using any offline algorithm for submodular maximization, and obtains a solution whose approximation guarantee is frac alpha 1 alpha varepsilon , where alpha is the approximation of the offline algorithm. If we use an exact (exponential time) post processing algorithm, this leads to frac 1 2 varepsilon approximation (which is nearly optimal). If we post process with the algorithm of Buchbinder and Feldman (Math of OR 2019), that achieves the state of the art offline approximation guarantee of alpha 0.385 , we obtain 0.2779 approximation in polynomial time, improving over the previously best polynomial time approximation of 0.1715 due to Feldman et al. (NeurIPS 2018). It is also worth mentioning that our algorithm is combinatorial and deterministic, which is rare for an algorithm for non monotone submodular maximization, and enjoys a fast update time of O( frac log k log (1 alpha) varepsilon 2 ) per element."} {"_id": [26], "label": "math.RT", "text": "Stratification and duality for unipotent finite supergroup schemes. We survey some methods developed in a series of papers, for classifying localising subcategories of tensor triangulated categories. We illustrate these methods by proving a new theorem, providing such a classification in the case of the stable module category of a unipotent finite supergroup scheme."} {"_id": [40, 1, 3], "label": "cs.IR cs.CL cs.LG", "text": "Conformer Kernel with Query Term Independence for Document Retrieval. The Transformer Kernel (TK) model has demonstrated strong reranking performance on the TREC Deep Learning benchmark and can be considered to be an efficient (but slightly less effective) alternative to BERT based ranking models. In this work, we extend the TK architecture to the full retrieval setting by incorporating the query term independence assumption. Furthermore, to reduce the memory complexity of the Transformer layers with respect to the input sequence length, we propose a new Conformer layer. We show that the Conformer's GPU memory requirement scales linearly with input sequence length, making it a more viable option when ranking long documents. Finally, we demonstrate that incorporating explicit term matching signal into the model can be particularly useful in the full retrieval setting. We present preliminary results from our work in this paper."} {"_id": [32, 2, 39], "label": "cs.AI cs.CY cs.DS", "text": "From Checking to Inference Actual Causality Computations as Optimization Problems. Actual causality is increasingly well understood. Recent formal approaches, proposed by Halpern and Pearl, have made this concept mature enough to be amenable to automated reasoning. Actual causality is especially vital for building accountable, explainable systems. Among other reasons, causality reasoning is computationally hard due to the requirements of counterfactuality and the minimality of causes. Previous approaches presented either inefficient or restricted, and domain specific, solutions to the problem of automating causality reasoning. In this paper, we present a novel approach to formulate different notions of causal reasoning, over binary acyclic models, as optimization problems, based on quantifiable notions within counterfactual computations. We contribute and compare two compact, non trivial, and sound integer linear programming (ILP) and Maximum Satisfiability (MaxSAT) encodings to check causality. Given a candidate cause, both approaches identify what a minimal cause is. Also, we present an ILP encoding to infer causality without requiring a candidate cause. We show that both notions are efficiently automated. Using models with more than 8000 variables, checking is computed in a matter of seconds, with MaxSAT outperforming ILP in many cases. In contrast, inference is computed in a matter of minutes."} {"_id": [13], "label": "math.DS", "text": "J invariants for planar two center Stark Zeeman systems. In this paper, we introduce the notion of planar two center Stark Zeeman systems and define four J like invariants for their periodic orbits. The construction is based on a previous construction for planar one center Stark Zeeman system in Cieliebak Frauenfelder van Koert 2017 as well as Levi Civita and Birkhoff regularizations. We analyze the relationship among these invariants and show that they are largely independent, based on a new construction called interior connected sum."} {"_id": [0], "label": "cs.CV", "text": "GenScan A Generative Method for Populating Parametric 3D Scan Datasets. The availability of rich 3D datasets corresponding to the geometrical complexity of the built environments is considered an ongoing challenge for 3D deep learning methodologies. To address this challenge, we introduce GenScan, a generative system that populates synthetic 3D scan datasets in a parametric fashion. The system takes an existing captured 3D scan as an input and outputs alternative variations of the building layout including walls, doors, and furniture with corresponding textures. GenScan is a fully automated system that can also be manually controlled by a user through an assigned user interface. Our proposed system utilizes a combination of a hybrid deep neural network and a parametrizer module to extract and transform elements of a given 3D scan. GenScan takes advantage of style transfer techniques to generate new textures for the generated scenes. We believe our system would facilitate data augmentation to expand the currently limited 3D geometry datasets commonly used in 3D computer vision, generative design, and general 3D deep learning tasks."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Full Glow Fully conditional Glow for more realistic image generation. Autonomous agents, such as driverless cars, require large amounts of labeled visual data for their training. A viable approach for acquiring such data is training a generative model with collected real data, and then augmenting the collected real dataset with synthetic images from the model, generated with control of the scene layout and ground truth labeling. In this paper we propose Full Glow, a fully conditional Glow based architecture for generating plausible and realistic images of novel street scenes given a semantic segmentation map indicating the scene layout. Benchmark comparisons show our model to outperform recent works in terms of the semantic segmentation performance of a pretrained PSPNet. This indicates that images from our model are, to a higher degree than from other models, similar to real images of the same kinds of scenes and objects, making them suitable as training data for a visual semantic segmentation or object recognition system."} {"_id": [9], "label": "math.AP", "text": "On the first bifurcation point for a free boundary problem modeling small arterial plaque. Atherosclerosis occurs when plaque clogs the arteries. It is a leading cause of death in the United States and worldwide. In this paper, we study the bifurcation for a highly nonlinear and highly coupled PDE model of plaque formation in the early stage of atherosclerosis. The model involves LDL and HDL cholesterols, macrophage cells as well as foam cells, with the interface separating the plaque and blood flow region being a free boundary. We establish the first bifurcation point for the system corresponding to n 1 mode. The symmetry breaking stationary solution studied in this paper might be helpful in understanding why there exists arterial plaque that is often accumulated more on one side of the artery than the other."} {"_id": [40], "label": "cs.IR", "text": "Utilizing Human Memory Processes to Model Genre Preferences for Personalized Music Recommendations. In this paper, we introduce a psychology inspired approach to model and predict the music genre preferences of different groups of users by utilizing human memory processes. These processes describe how humans access information units in their memory by considering the factors of (i) past usage frequency, (ii) past usage recency, and (iii) the current context. Using a publicly available dataset of more than a billion music listening records shared on the music streaming platform Last.fm, we find that our approach provides significantly better prediction accuracy results than various baseline algorithms for all evaluated user groups, i.e., (i) low mainstream music listeners, (ii) medium mainstream music listeners, and (iii) high mainstream music listeners. Furthermore, our approach is based on a simple psychological model, which contributes to the transparency and explainability of the calculated predictions."} {"_id": [3], "label": "cs.CL", "text": "A Simple Global Neural Discourse Parser. Discourse parsing is largely dominated by greedy parsers with manually designed features, while global parsing is rare due to its computational expense. In this paper, we propose a simple chart based neural discourse parser that does not require any manually crafted features and is based on learned span representations only. To overcome the computational challenge, we propose an independence assumption between the label assigned to a node in the tree and the splitting point that separates its children, which results in tractable decoding. We empirically demonstrate that our model achieves the best performance among global parsers, and comparable performance to state of art greedy parsers, using only learned span representations."} {"_id": [55], "label": "physics.geo-ph", "text": "Transversely isotropic poroelastic behaviour of the Callovo Oxfordian claystone A set of stress dependent parameters. In the framework of a deep geological radioactive waste disposal in France, the hydromechanical properties of the designated host rock, the Callovo Oxfordian claystone (COx), are investigated in laboratory tests. Experiments presented in this study are carried out to determine several coefficients required within a transversely isotropic material model. They include isotropic compression tests, pore pressure tests, and deviatoric loading tests parallel and perpendicular to the bedding plane. We emphasize the adapted experimental devices and testing procedures, necessary to detect small strains under high pressures, on a material, which is sensitive to water and has a very low permeability. In particular, we discovered a significant decrease of elastic stiffness with decreasing effective stress, which was observed to be reversible. In both isotropic and deviatoric tests, a notable anisotropic strain response was found. The Young modulus parallel to bedding was about 1.8 times higher than the one perpendicular to the bedding plane. A notably low Poisson ratio perpendicular to the bedding plane with values between 0.1 and 0.2 was evidenced. While the anisotropy of the back calculated Biot coefficient was found to be low, a significant anisotropy of the Skempton coefficient was computed. The performed experiments provide an overdetermined set of material parameters at different stress levels. Using all determined parameters in a least square error regression scheme, seven independent elastic coefficients and their effective stress dependency are characterized. Parameters measured under isotropic loading are well represented by this set of coefficients, while the poroelastic framework with isotropic stress dependency is not sufficient to describe laboratory findings from triaxial loading."} {"_id": [11], "label": "physics.app-ph", "text": "Thermal null medium (TNM) a novel material to achieve feasible thermodynamics devices beyond conventional challenges. Recently, heat manipulation has gained the attention of scientific community due to its several applications. In this letter, based on transformation thermodynamic (TT) methodology, a novel material, which is called thermal null medium (TNM), is proposed that enables us to design various thermal functionalities such as thermal bending devices, arbitrary shape heat concentrators and omnidirectional thermal cloaks. In contrary to the conventional TT based conductivities, which are inhomogeneous and anisotropic, TNMs are homogeneous and easy to realize. In addition, the attained TNMs are independent of the device shape. That is if the geometry of the desired device is changed, there is no need to recalculate the necessitating conductivities. This feature of TNM will make it suitable for scenarios where re configurability is of utmost importance. Several numerical simulations are carried out to demonstrate the TNM capability and its applications in directional bending devices, heat concentrators and thermal cloaks. The proposed TNM could open a new avenue for potential applications in solar thermal panels and thermal electric devices."} {"_id": [8], "label": "physics.optics", "text": "Speckled cross spectral densities and their associated correlation singularities for a modern source of partially coherent x rays. We consider a realistic model for calculating the cross spectral density of partially coherent beams from an x ray undulator in a modern storage ring. This two point coherence function is seen to have a speckled structure associated with the presence of x ray coherence vortices and domain walls. Such cross spectral density speckle is associated with a network of spatial pairs of points for which there is zero correlation. X ray coherence vortices and domain walls are seen to emerge naturally as the number of coherent modes required increases. An understanding of the existence and nature of such correlation singularities enhances our ability to exploit partially coherent x ray radiation from new or upgraded synchrotron sources, for both imaging and diffraction applications."} {"_id": [21], "label": "math.CO", "text": "Tree containment and degree conditions. We survey results and open problems relating degree conditions with tree containment in graphs, random graphs, digraphs and hypergraphs, and their applications in Ramsey theory."} {"_id": [77], "label": "math.LO", "text": "On categories of o minimal structures. Our aim in this paper is to look at some transfer results in model theory (mainly in the context of o minimal structures) from the category theory viewpoint."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Improvement of Classification in One Stage Detector. RetinaNet proposed Focal Loss for classification task and improved one stage detectors greatly. However, there is still a gap between it and two stage detectors. We analyze the prediction of RetinaNet and find that the misalignment of classification and localization is the main factor. Most of predicted boxes, whose IoU with ground truth boxes are greater than 0.5, while their classification scores are lower than 0.5, which shows that the classification task still needs to be optimized. In this paper we proposed an object confidence task for this problem, and it shares features with classification task. This task uses IoUs between samples and ground truth boxes as targets, and it only uses losses of positive samples in training, which can increase loss weight of positive samples in classification task training. Also the joint of classification score and object confidence will be used to guide NMS. Our method can not only improve classification task, but also ease misalignment of classification and localization. To evaluate the effectiveness of this method, we show our experiments on MS COCO 2017 dataset. Without whistles and bells, our method can improve AP by 0.7 and 1.0 on COCO validation dataset with ResNet50 and ResNet101 respectively at same training configs, and it can achieve 38.4 AP with two times training time. Code is at http github.com chenzuge1 RetinaNet Conf.git."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Actor Critic Instance Segmentation. Most approaches to visual scene analysis have emphasised parallel processing of the image elements. However, one area in which the sequential nature of vision is apparent, is that of segmenting multiple, potentially similar and partially occluded objects in a scene. In this work, we revisit the recurrent formulation of this challenging problem in the context of reinforcement learning. Motivated by the limitations of the global max matching assignment of the ground truth segments to the recurrent states, we develop an actor critic approach in which the actor recurrently predicts one instance mask at a time and utilises the gradient from a concurrently trained critic network. We formulate the state, action, and the reward such as to let the critic model long term effects of the current prediction and incorporate this information into the gradient signal. Furthermore, to enable effective exploration in the inherently high dimensional action space of instance masks, we learn a compact representation using a conditional variational auto encoder. We show that our actor critic model consistently provides accuracy benefits over the recurrent baseline on standard instance segmentation benchmarks."} {"_id": [1, 84, 7], "label": "physics.comp-ph cs.LG physics.acc-ph", "text": "Physics informed Gaussian Process for Online Optimization of Particle Accelerators. High dimensional optimization is a critical challenge for operating large scale scientific facilities. We apply a physics informed Gaussian process (GP) optimizer to tune a complex system by conducting efficient global search. Typical GP models learn from past observations to make predictions, but this reduces their applicability to new systems where archive data is not available. Instead, here we use a fast approximate model from physics simulations to design the GP model. The GP is then employed to make inferences from sequential online observations in order to optimize the system. Simulation and experimental studies were carried out to demonstrate the method for online control of a storage ring. We show that the physics informed GP outperforms current routinely used online optimizers in terms of convergence speed, and robustness on this task. The ability to inform the machine learning model with physics may have wide applications in science."} {"_id": [3], "label": "cs.CL", "text": "Semi Supervised Spoken Language Understanding via Self Supervised Speech and Language Model Pretraining. Much recent work on Spoken Language Understanding (SLU) is limited in at least one of three ways models were trained on oracle text input and neglected ASR errors, models were trained to predict only intents without the slot values, or models were trained on a large amount of in house data. In this paper, we propose a clean and general framework to learn semantics directly from speech with semi supervision from transcribed or untranscribed speech to address these issues. Our framework is built upon pretrained end to end (E2E) ASR and self supervised language models, such as BERT, and fine tuned on a limited amount of target SLU data. We study two semi supervised settings for the ASR component supervised pretraining on transcribed speech, and unsupervised pretraining by replacing the ASR encoder with self supervised speech representations, such as wav2vec. In parallel, we identify two essential criteria for evaluating SLU models environmental noise robustness and E2E semantics evaluation. Experiments on ATIS show that our SLU framework with speech as input can perform on par with those using oracle text as input in semantics understanding, even though environmental noise is present and a limited amount of labeled semantics data is available for training."} {"_id": [25, 49], "label": "math.PR math.OC", "text": "On a solution to the Monge transport problem on the real line arising from the strictly concave case. It is well known that the optimal transport problem on the real line for the classical distance cost may not have a unique solution. In this paper we recover uniqueness by considering the transport problems where the costs are a power smaller than one of the distance, and letting this parameter tend to one. A complete construction of this solution that we call excursion coupling is given. This is reminiscent to the one in the convex case. It is also characterized as the solution of secondary transport problems. Moreover, a combinatoric geometric characterization of the routes used for this transport plan is provided."} {"_id": [43], "label": "cs.DB", "text": "Hierarchical Graph Matching Network for Graph Similarity Computation. Graph edit distance similarity is widely used in many tasks, such as graph similarity search, binary function analysis, and graph clustering. However, computing the exact graph edit distance (GED) or maximum common subgraph (MCS) between two graphs is known to be NP hard. In this paper, we propose the hierarchical graph matching network (HGMN), which learns to compute graph similarity from data. HGMN is motivated by the observation that two similar graphs should also be similar when they are compressed into more compact graphs. HGMN utilizes multiple stages of hierarchical clustering to organize a graph into successively more compact graphs. At each stage, the earth mover distance (EMD) is adopted to obtain a one to one mapping between the nodes in two graphs (on which graph similarity is to be computed), and a correlation matrix is also derived from the embeddings of the nodes in the two graphs. The correlation matrices from all stages are used as input for a convolutional neural network (CNN), which is trained to predict graph similarity by minimizing the mean squared error (MSE). Experimental evaluation on 4 datasets in different domains and 4 performance metrics shows that HGMN consistently outperforms existing baselines in the accuracy of graph similarity approximation."} {"_id": [61], "label": "q-fin.TR", "text": "An instantaneous market volatility estimation. Working on different aspects of algorithmic trading we empirically discovered a new market invariant. It links together the volatility of the instrument with its traded volume, the average spread and the volume in the order book. The invariant has been tested on different markets and different asset classes. In all cases we did not find significant violation of the invariant. The formula for the invariant was used for the volatility estimation, which we called the instantaneous volatility. Quantitative comparison showed that it reproduces realised volatility better than one day ahead GARCH(1,1) prediction. Because of the short term prediction nature, the instantaneous volatility could be used by algo developers, volatility traders and other market professionals."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Human centric Dialog Training via Offline Reinforcement Learning. How can we train a dialog model to produce better conversations by learning from human feedback, without the risk of humans teaching it harmful chat behaviors? We start by hosting models online, and gather human feedback from real time, open ended conversations, which we then use to train and improve the models using offline reinforcement learning (RL). We identify implicit conversational cues including language similarity, elicitation of laughter, sentiment, and more, which indicate positive human feedback, and embed these in multiple reward functions. A well known challenge is that learning an RL policy in an offline setting usually fails due to the lack of ability to explore and the tendency to make over optimistic estimates of future reward. These problems become even harder when using RL for language models, which can easily have a 20,000 action vocabulary and many possible reward functions. We solve the challenge by developing a novel class of offline RL algorithms. These algorithms use KL control to penalize divergence from a pre trained prior language model, and use a new strategy to make the algorithm pessimistic, instead of optimistic, in the face of uncertainty. We test the resulting dialog model with ratings from 80 users in an open domain setting and find it achieves significant improvements over existing deep offline RL approaches. The novel offline RL method is viable for improving any existing generative dialog model using a static dataset of human feedback."} {"_id": [72, 65, 39], "label": "cs.CY cs.NI cs.PF", "text": "adPerf Characterizing the Performance of Third party Ads. Monetizing websites and web apps through online advertising is widespread in the web ecosystem. The online advertising ecosystem nowadays forces publishers to integrate ads from these third party domains. On the one hand, this raises several privacy and security concerns that are actively studied in recent years. On the other hand, given the ability of today's browsers to load dynamic web pages with complex animations and Javascript, online advertising has also transformed and can have a significant impact on webpage performance. The performance cost of online ads is critical since it eventually impacts user satisfaction as well as their Internet bill and device energy consumption. In this paper, we apply an in depth and first of a kind performance evaluation of web ads. Unlike prior efforts that rely primarily on adblockers, we perform a fine grained analysis on the web browser's page loading process to demystify the performance cost of web ads. We aim to characterize the cost by every component of an ad, so the publisher, ad syndicate, and advertiser can improve the ad's performance with detailed guidance. For this purpose, we develop an infrastructure, adPerf, for the Chrome browser that classifies page loading workloads into ad related and main content at the granularity of browser activities (such as Javascript and Layout). Our evaluations show that online advertising entails more than 15 of browser page loading workload and approximately 88 of that is spent on JavaScript. We also track the sources and delivery chain of web ads and analyze performance considering the origin of the ad contents. We observe that 2 of the well known third party ad domains contribute to 35 of the ads performance cost and surprisingly, top news websites implicitly include unknown third party ads which in some cases build up to more than 37 of the ads performance cost."} {"_id": [46], "label": "math.AG", "text": "A pathological case of the C 1 conjecture in mixed characteristic. Let K be a field of characteristic 0. Fix integers r,d coprime with r geq 2 . Let X K be a smooth, projective, geometrically connected curve of genus g geq 2 defined over K. Assume there exists a line bundle L K on X K of degree d . In this article we prove the existence of a stable locally free sheaf on X K with rank r and determinant L K . This trivially proves the C 1 conjecture in mixed characteristic for the moduli space of stable locally free sheaves of fixed rank and determinant over a smooth, projective curve."} {"_id": [10], "label": "physics.ao-ph", "text": "Fractional Brownian Motions and their multifractal analysis applied to Parana river flow. A number of different analysis techniques have been used to analyze long term time series data from different rivers, starting with the determination of the Hurst coefficient. We summarize the concept of fractals, multifractals and Fractional Brownian Motion (FBM), and apply some such techniques to daily stream flow data from the Parana River recorded at Corrientes, Argentina, for 106 years. After determining the Hurst coefficient for the entire data set (H 0.76), we analyze the data for each of four seasons and draw the corresponding FBM graphs and their multifractal spectra (MFS). Three of the seasons are similar, but autumn is very different for both FBM and MFS. Based on the MFS results, we propose a number of indices for measuring variations in stream flow, and determine the values of the indices for the three similar seasons. The indices are based on important parameters of the multifractal spectra. The geometry of the spectra as well as the indices all indicate that Winter is the most stable season. This is in contrast to the Boxplot of seasonal stream flow data where Winter shows the largest variation. Thus, these indices provide insight into river flow stability, not detected in, and indeed contradictory to, that from basic statistical analysis."} {"_id": [9], "label": "math.AP", "text": "On stability of small solitons of the 1 D NLS with a trapping delta potential. We consider a Nonlinear Schr \"odinger Equation with a very general non linear term and with a trapping delta potential on the line. We then discuss the asymptotic behavior of all its small solutions, generalizing a recent result by Masaki et al. We give also a result of dispersion in the case of defocusing equations with a non trapping delta potential."} {"_id": [40, 3], "label": "cs.CL cs.IR", "text": "NEU at WNUT 2020 Task 2 Data Augmentation To Tell BERT That Death Is Not Necessarily Informative. Millions of people around the world are sharing COVID 19 related information on social media platforms. Since not all the information shared on the social media is useful, a machine learning system to identify informative posts can help users in finding relevant information. In this paper, we present a BERT classifier system for W NUT2020 Shared Task 2 Identification of Informative COVID 19 English Tweets. Further, we show that BERT exploits some easy signals to identify informative tweets, and adding simple patterns to uninformative tweets drastically degrades BERT performance. In particular, simply adding 10 deaths to tweets in dev set, reduces BERT F1 score from 92.63 to 7.28. We also propose a simple data augmentation technique that helps in improving the robustness and generalization ability of the BERT classifier."} {"_id": [25, 21, 15], "label": "cs.IT math.CO math.IT math.PR", "text": "On Non Interactive Simulation of Binary Random Variables. We leverage proof techniques Fourier analysis and an existing result in coding theory to derive new bounds for the problem of non interactive simulation of binary random variables. Previous bounds in the literature were derived by applying data processing inequalities concerning maximal correlation or hypercontractivity. We show that our bounds are sharp in some regimes. For a specific instance of problem parameters, our main result answers an open problem posed by E. Mossel in 2017. As by products of our analyses, various new properties of the average distance and distance enumerator of binary block codes are established."} {"_id": [64, 59], "label": "physics.soc-ph cs.SI", "text": "Interlayer link prediction in multiplex social networks an iterative degree penalty algorithm. Online social network (OSN) applications provide different experiences for example, posting a short text on Twitter and sharing photographs on Instagram. Multiple OSNs constitute a multiplex network. For privacy protection and usage purposes, accounts belonging to the same user in different OSNs may have different usernames, photographs, and introductions. Interlayer link prediction in multiplex network aims at identifying whether the accounts in different OSNs belong to the same person, which can aid in tasks including cybercriminal behavior modeling and customer interest analysis. Many real world OSNs exhibit a scale free degree distribution thus, neighbors with different degrees may exert different influences on the node matching degrees across different OSNs. We developed an iterative degree penalty (IDP) algorithm for interlayer link prediction in the multiplex network. First, we proposed a degree penalty principle that assigns a greater weight to a common matched neighbor with fewer connections. Second, we applied node adjacency matrix multiplication for efficiently obtaining the matching degree of all unmatched node pairs. Thereafter, we used the approved maximum value method to obtain the interlayer link prediction results from the matching degree matrix. Finally, the prediction results were inserted into the priori interlayer node pair set and the above processes were performed iteratively until all unmatched nodes in one layer were matched or all matching degrees of the unmatched node pairs were equal to 0. Experiments demonstrated that our advanced IDP algorithm significantly outperforms current network structure based methods when the multiplex network average degree and node overlapping rate are low."} {"_id": [2], "label": "cs.AI", "text": "The Counterfactual NESS Definition of Causation. In previous work with Joost Vennekens I proposed a definition of actual causation that is based on certain plausible principles, thereby allowing the debate on causation to shift away from its heavy focus on examples towards a more systematic analysis. This paper contributes to that analysis in two ways. First, I show that our definition is in fact a formalization of Wright's famous NESS definition of causation combined with a counterfactual difference making condition. This means that our definition integrates two highly influential approaches to causation that are claimed to stand in opposition to each other. Second, I modify our definition to offer a substantial improvement I weaken the difference making condition in such a way that it avoids the problematic analysis of cases of preemption. The resulting Counterfactual NESS definition of causation forms a natural compromise between counterfactual approaches and the NESS approach."} {"_id": [13], "label": "math.DS", "text": "Delta weakly mixing subsets along a collection of sequences of integers. In this paper, we propose a mild condition, named Condition ( ) , for collections of sequence of integers and show that for any measure preserving system the Pinsker sigma algebra is a characteristic sigma algebra for the averages along a collection satisfying Condition ( ) . We introduce the notion of Delta weakly mixing subsets along a collection of sequences of integers and show that positive topological entropy implies the existence of Delta weakly mixing subsets along a collection of \"good\" sequences. As a consequence, we show that positive topological entropy implies multi variant Li Yorke chaos along polynomial times of the shift prime numbers."} {"_id": [12], "label": "math.CA", "text": "New mixed recurrence relations of two variable orthogonal polynomials via differential operators. In this paper, we derive new recurrence relations for two variable orthogonal polynomials for example Jacobi polynomial, Bateman's polynomial and Legendre polynomial via two different differential operators Xi left( frac partial partial z sqrt w frac partial partial w right) and Delta left( frac 1 w frac partial partial z frac 1 z frac partial partial w right) . We also derive some special cases of our main results."} {"_id": [43], "label": "cs.DB", "text": "Facilitating SQL Query Composition and Analysis. Formulating efficient SQL queries requires several cycles of tuning and execution, particularly for inexperienced users. We examine methods that can accelerate and improve this interaction by providing insights about SQL queries prior to execution. We achieve this by predicting properties such as the query answer size, its run time, and error class. Unlike existing approaches, our approach does not rely on any statistics from the database instance or query execution plans. This is particularly important in settings with limited access to the database instance. Our approach is based on using data driven machine learning techniques that rely on large query workloads to model SQL queries and their properties. We evaluate the utility of neural network models and traditional machine learning models. We use two real world query workloads the Sloan Digital Sky Survey (SDSS) and the SQLShare query workload. Empirical results show that the neural network models are more accurate in predicting the query error class, achieving a higher F measure on classes with fewer samples as well as performing better on other problems such as run time and answer size prediction. These results are encouraging and confirm that SQL query workloads and data driven machine learning methods can be leveraged to facilitate query composition and analysis."} {"_id": [46], "label": "math.AG", "text": "The S n equivariant top weight Euler characteristic of M g,n . We prove a formula, conjectured by Zagier, for the S n equivariant Euler characteristic of the top weight cohomology of M g,n ."} {"_id": [23], "label": "math.FA", "text": "Truncation in Besov Morrey and Triebel Lizorkin Morrey spaces. We will prove that under certain conditions on the parameters the operators T f max(f,0) and Tf f are bounded mappings on the Triebel Lizorkin Morrey and Besov Morrey spaces. Moreover we will show that some of the conditions we mentioned before are also necessary. Furthermore we prove that for p u in many cases the Triebel Lizorkin Morrey spaces do not have the Fubini property."} {"_id": [38], "label": "math.NT", "text": "On one approach to modeling numeral systems. In this article, the operator approach to modeling numeral systems is introduced. This approach can be useful for coding information and providing computer protection. Certain examples of such numeral systems are considered. In addition, the pseudo binary representation is investigated. A description of further investigations of the author of this article is given."} {"_id": [15, 39], "label": "cs.CY cs.IT math.IT", "text": "Redesigning Telecommunication Engineering Courses with CDIO geared for Polytechnic Education. Whether in chemical, civil, mechanical, electrical, or their related engineering subdisciplines, remaining up to date in the subject matter is crucial. However, due to the pace of technological evolution, information and communications technology (ICT) fields of study are impacted with much higher consequences. Meanwhile, the curricula of higher educational institutes are struggling to catch up to this reality. In order to remain competitive, engineering schools ought to offer ICT related courses that are at once modern, relevant and ultimately beneficial for the employability of their graduates. In this spirit, we were recently mandated by our engineering school to develop and design telecommunication courses with great emphasis on (i) technological modernity, and (ii) experiential learning. To accomplish these objectives, we utilized the conceive, design, implement and operate (CDIO) framework, a modern engineering education initiative of which Sheridan is a member. In this article, we chronicle the steps we took to streamline and modernize the curriculum by outlining an effective methodology for course design and development with CDIO. We then provide examples of course update and design using the proposed methodology and highlight the lessons learned from this systematic curriculum development endeavor."} {"_id": [41], "label": "cs.RO", "text": "Combining Parameter Identification and Trajectory Optimization Real time Planning for Information Gain. Robotic systems often operate with uncertainties in their dynamics, for example, unknown inertial properties. Broadly, there are two approaches for controlling uncertain systems design robust controllers in spite of uncertainty, or characterize a system before attempting to control it. This paper proposes a middle ground approach, making trajectory progress while also accounting for gaining information about the system. More specifically, it combines excitation trajectories which are usually intended to optimize information gain for an estimator, with goal driven trajectory optimization metrics. For this purpose, a measure of information gain is incorporated (using the Fisher Information Matrix) in a real time planning framework to produce trajectories favorable for estimation. At the same time, the planner receives stable parameter updates from the estimator, enhancing the system model. An implementation of this learn as you go approach utilizing an Unscented Kalman Filter (UKF) and Nonlinear Model Predictive Controller (NMPC) is demonstrated in simulation. Results for cases with and without information gain and online parameter updates in the system model are presented."} {"_id": [63], "label": "cs.DL", "text": "The collaboration behavior of top scientists. The intention of this work is to analyze top scientists' collaboration behavior at the \"international\", \"domestic extramural\" and \"intramural\" levels, and compare it to that of their lesser performing colleagues. The field of observation consists of the entire faculty of the Italian academic system, and so the coauthorship of scientific publications by over 12,000 professors. The broader aim is to improve understanding of the causal nexus between research collaboration and performance. The analysis is thus longitudinal, over two successive five year periods. Results show a strong increase in the propensity to collaborate at domestic level (both extramural and intramural), however this is less for scientists who remain or become top, than it is for their lower performing colleagues. In contrast, the increase in international collaboration behavior is greater for scientists who become or remain top than it is for their peers. The increase in productivity by those who acquire top scientist status is due precisely to the greater average impact of the publications achieved in collaboration with foreign colleagues."} {"_id": [17], "label": "cs.DC", "text": "Performance Comparison Between OpenCV Built in CPU and GPU Functions on Image Processing Operations. Image Processing is a specialized area of Digital Signal Processing which contains various mathematical and algebraic operations such as matrix inversion, transpose of matrix, derivative, convolution, Fourier Transform etc. Operations like those require higher computational capabilities than daily usage purposes of computers. At that point, with increased image sizes and more complex operations, CPUs may be unsatisfactory since they use Serial Processing by default. GPUs are the solution that come up with greater speed compared to CPUs because of their Parallel Processing Computation nature. A parallel computing platform and programming model named CUDA was created by NVIDIA and implemented by the graphics processing units (GPUs) which were produced by them. In this paper, computing performance of some commonly used Image Processing operations will be compared on OpenCV's built in CPU and GPU functions that use CUDA."} {"_id": [0], "label": "cs.CV", "text": "Learning to Inpaint by Progressively Growing the Mask Regions. Image inpainting is one of the most challenging tasks in computer vision. Recently, generative based image inpainting methods have been shown to produce visually plausible images. However, they still have difficulties to generate the correct structures and colors as the masked region grows large. This drawback is due to the training stability issue of the generative models. This work introduces a new curriculum style training approach in the context of image inpainting. The proposed method increases the masked region size progressively in training time, during test time the user gives variable size and multiple holes at arbitrary locations. Incorporating such an approach in GANs may stabilize the training and provides better color consistencies and captures object continuities. We validate our approach on the MSCOCO and CelebA datasets. We report qualitative and quantitative comparisons of our training approach in different models."} {"_id": [70], "label": "math.HO", "text": "Continuity between Cauchy and Bolzano Issues of antecedents and priority. In a paper published in 1970, Grattan Guinness argued that Cauchy, in his 1821 book Cours d'Analyse, may have plagiarized Bolzano's book Rein analytischer Beweis (RB), first published in 1817. That paper was subsequently discredited in several works, but some of its assumptions still prevail today. In particular, it is usually considered that Cauchy did not develop his notion of the continuity of a function before Bolzano developed his in RB, and that both notions are essentially the same. We argue that both assumptions are incorrect, and that it is implausible that Cauchy's initial insight into that notion, which eventually evolved to an approach using infinitesimals, could have been borrowed from Bolzano's work. Furthermore, we account for Bolzano's interest in that notion and focus on his discussion of a definition by K \"astner (in Section 183 of his 1766 book), which the former seems to have misrepresented at least partially. Cauchy's treatment of continuity goes back at least to his 1817 course summaries, refuting a key component of Grattan Guinness' plagiarism hypothesis (that Cauchy may have lifted continuity from RB after reading it in a Paris library in 1818). We explore antecedents of Cauchy and Bolzano continuity in the writings of K \"astner and earlier authors."} {"_id": [0], "label": "cs.CV", "text": "Alleviating Over segmentation Errors by Detecting Action Boundaries. We propose an effective framework for the temporal action segmentation task, namely an Action Segment Refinement Framework (ASRF). Our model architecture consists of a long term feature extractor and two branches the Action Segmentation Branch (ASB) and the Boundary Regression Branch (BRB). The long term feature extractor provides shared features for the two branches with a wide temporal receptive field. The ASB classifies video frames with action classes, while the BRB regresses the action boundary probabilities. The action boundaries predicted by the BRB refine the output from the ASB, which results in a significant performance improvement. Our contributions are three fold (i) We propose a framework for temporal action segmentation, the ASRF, which divides temporal action segmentation into frame wise action classification and action boundary regression. Our framework refines frame level hypotheses of action classes using predicted action boundaries. (ii) We propose a loss function for smoothing the transition of action probabilities, and analyze combinations of various loss functions for temporal action segmentation. (iii) Our framework outperforms state of the art methods on three challenging datasets, offering an improvement of up to 13.7 in terms of segmental edit distance and up to 16.1 in terms of segmental F1 score. Our code will be publicly available soon."} {"_id": [49, 15], "label": "math.OC cs.IT math.IT", "text": "Local recovery bounds for prior support constrained Compressed Sensing. Prior support constrained compressed sensing has of late become popular due to its potential for applications. The existing results on recovery guarantees provide global recovery bounds in the sense that they deal with full support. However, in some applications, one might be interested in the recovery guarantees limited to the given prior support, such bounds may be termed as local recovery bounds. The present work proposes the local recovery guarantees and analyzes the conditions on associated parameters that make recovery error small."} {"_id": [11], "label": "physics.app-ph", "text": "Comparative Study of RF Sputtered Ba2(BiNb)O6 and Ba2Bi1.4Nb0.6 O6 thin films and Effect of Fluorine Doping in Their Photoelectrochemical (PEC) Performances. Bismuth based ternary oxide photocatalysts are of considerable interest in photoelectrochemical water splitting. Yet these oxides are highly stable in different environment, their relative inertness limits the available synthesis routes to obtain desired stoichiometry on the final product. This report describes a method to prepare barium bismuth niobate (specifically, Ba2(BiNb)O6 and Ba2Bi1.4Nb0.6 O6) target by sintering a mixture of individual oxides and successfully fabricate desired barium bismuth niobate thin film on TCO substrate. The surface morphology, physical, and chemical properties of thin film were systematically investigated. Compositional uniformity was obtained by sputtering in oxygen argon plasma environment and higher photocatalytic activities were observed after subsequent surface treatments. Sodium fluoride surface treatment further enhanced the photocurrent density and improved electrode stability against corrosion. This work further suggests a viable approach to improve the PEC performance of sputtered barium bismuth niobate by modulating their fundamental energy states."} {"_id": [65], "label": "cs.NI", "text": "On the Performance of the Spatial Reuse Operation in IEEE 802.11ax WLANs. The Spatial Reuse (SR) operation included in the IEEE 802.11ax 2020 (11ax) amendment aims at increasing the number of parallel transmissions in an Overlapping Basic Service Set (OBSS). However, many unknowns exist about the performance gains that can be achieved through SR. In this paper, we provide a brief introduction to the SR operation described in the IEEE 802.11ax (draft D4.0). Then, a simulation based implementation is provided in order to explore the performance gains of the SR operation. Our results show the potential of using SR in different scenarios covering multiple network densities and traffic loads. In particular, we observe significant improvements on the channel utilization when applying SR with respect to the default configuration, thus allowing to increase the throughput and reduce the delay. Interestingly, the highest improvements provided by the SR operation are observed in the most pessimistic situations in terms of network density and traffic load."} {"_id": [9], "label": "math.AP", "text": "Regularity for minimizers for functionals of double phase with variable exponents. The functionals of double phase type mathcal H (u) int left( Du p a(x) Du q right) dx, ( q p 1, a(x) geq 0) are introduced in the epoch making paper by Colombo Mingione for constants p and q , and investigated by them and Baroni. They obtained sharp regularity results for minimizers of such functionals. In this paper we treat the case that the exponents are functions of x and partly generalize their regularity results."} {"_id": [0], "label": "cs.CV", "text": "Real time Hair Segmentation and Recoloring on Mobile GPUs. We present a novel approach for neural network based hair segmentation from a single camera input specifically designed for real time, mobile application. Our relatively small neural network produces a high quality hair segmentation mask that is well suited for AR effects, e.g. virtual hair recoloring. The proposed model achieves real time inference speed on mobile GPUs (30 100 FPS, depending on the device) with high accuracy. We also propose a very realistic hair recoloring scheme. Our method has been deployed in major AR application and is used by millions of users."} {"_id": [1, 3, 39], "label": "cs.CL cs.CY cs.LG", "text": "Reducing Sentiment Bias in Language Models via Counterfactual Evaluation. Advances in language modeling architectures and the availability of large text corpora have driven progress in automatic text generation. While this results in models capable of generating coherent texts, it also prompts models to internalize social biases present in the training corpus. This paper aims to quantify and reduce a particular type of bias exhibited by language models bias in the sentiment of generated text. Given a conditioning context (e.g., a writing prompt) and a language model, we analyze if (and how) the sentiment of the generated text is affected by changes in values of sensitive attributes (e.g., country names, occupations, genders) in the conditioning context using a form of counterfactual evaluation. We quantify sentiment bias by adopting individual and group fairness metrics from the fair machine learning literature, and demonstrate that large scale models trained on two different corpora (news articles, and Wikipedia) exhibit considerable levels of bias. We then propose embedding and sentiment prediction derived regularization on the language model's latent representations. The regularizations improve fairness metrics while retaining comparable levels of perplexity and semantic similarity."} {"_id": [28], "label": "cs.CG", "text": "An Experimental Study of a 1 planarity Testing and Embedding Algorithm. The definition of 1 planar graphs naturally extends graph planarity, namely a graph is 1 planar if it can be drawn in the plane with at most one crossing per edge. Unfortunately, while testing graph planarity is solvable in linear time, deciding whether a graph is 1 planar is NP complete, even for restricted classes of graphs. Although several polynomial time algorithms have been described for recognizing specific subfamilies of 1 planar graphs, no implementations of general algorithms are available to date. We investigate the feasibility of a 1 planarity testing and embedding algorithm based on a backtracking strategy. While the experiments show that our approach can be successfully applied to graphs with up to 30 vertices, they also suggest the need of more sophisticated techniques to attack larger graphs. Our contribution provides initial indications that may stimulate further research on the design of practical approaches for the 1 planarity testing problem."} {"_id": [3], "label": "cs.CL", "text": "Using Natural Language Relations between Answer Choices for Machine Comprehension. When evaluating an answer choice for Reading Comprehension task, other answer choices available for the question and the answers of related questions about the same paragraph often provide valuable information. In this paper, we propose a method to leverage the natural language relations between the answer choices, such as entailment and contradiction, to improve the performance of machine comprehension. We use a stand alone question answering (QA) system to perform QA task and a Natural Language Inference (NLI) system to identify the relations between the choice pairs. Then we perform inference using an Integer Linear Programming (ILP) based relational framework to re evaluate the decisions made by the standalone QA system in light of the relations identified by the NLI system. We also propose a multitask learning model that learns both the tasks jointly."} {"_id": [65], "label": "cs.NI", "text": "An Efficient Requirement Aware Attachment Policy for Future Millimeter Wave Vehicular Networks. The automotive industry is rapidly evolving towards connected and autonomous vehicles, whose ever more stringent data traffic requirements might exceed the capacity of traditional technologies for vehicular networks. In this scenario, densely deploying millimeter wave (mmWave) base stations is a promising approach to provide very high transmission speeds to the vehicles. However, mmWave signals suffer from high path and penetration losses which might render the communication unreliable and discontinuous. Coexistence between mmWave and Long Term Evolution (LTE) communication systems has therefore been considered to guarantee increased capacity and robustness through heterogeneous networking. Following this rationale, we face the challenge of designing fair and efficient attachment policies in heterogeneous vehicular networks. Traditional methods based on received signal quality criteria lack consideration of the vehicle's individual requirements and traffic demands, and lead to suboptimal resource allocation across the network. In this paper we propose a Quality of Service (QoS) aware attachment scheme which biases the cell selection as a function of the vehicular service requirements, preventing the overload of transmission links. Our simulations demonstrate that the proposed strategy significantly improves the percentage of vehicles satisfying application requirements and delivers efficient and fair association compared to state of the art schemes."} {"_id": [32, 68, 21], "label": "math.CO cs.DM cs.DS", "text": "Independent Double Roman Domination on Block Graphs. Given a graph G (V,E) , f V rightarrow 0,1,2 is the Italian dominating function of G if f satisfies sum u in N(v) f(u) geq 2 when f(v) 0 . Denote w(f) sum v in V f(v) as the weight of f . Let V i v f(v) i ,i 0,1,2 , we call f the independent Italian dominating function if V 1 cup V 2 is an independent set. The independent Italian domination number of G is the minimum weight of independent Italian dominating function f , denoted by i I (G) . We equivalently transform the independent domination problem of the connected block graph G to the induced independent domination problem of its block cutpoint graph T , then a linear time algorithm is given to find i I (G) of any connected block graph G based on dynamic programming."} {"_id": [67], "label": "physics.atom-ph", "text": "Accuracy of the semiclassical picture of photoionization in intense laser fields. In the semiclassical picture of photoionization process in intense laser fields, the ionization rate solely depends on the amplitude of the electric field and the final photoelectron momentum corresponds to the instant of ionization of the photoelectron, however, this picture has never been checked rigorously. Recently an attosecond angular streaking technique based on this semiclassical perspective has been widely applied to temporal measurement of the atomic and molecular dynamics in intense laser fields. We use a Wigner distribution like function to calculate the time emission angle distribution, angular distribution and ionization time distribution for atomic ionization process in elliptically polarized few cycle laser fields. By comparing with semiclassical calculations, we find that the two methods always show discrepancies except in some specific cases and the offset angles are generally not consistent with the offset times of the ionization time distributions obtained by the two methods even when the non adiabatic effect is taken into account, indicating that the \"attoclock\" technique is in principle inaccurate. Moreover, calculations for linearly polarized laser fields also show similar discrepancies between two methods in the ionization time distribution. Our analysis indicates that the discrepancy between the semiclassical and quantum calculations can be attributed to correlation, i. e., temporal nonlocalization effect."} {"_id": [26, 12, 69], "label": "math.RT math.CA math.QA", "text": "Drinfeld isomorphisms from quantum Stokes matrices. In this paper, we show that the quantum Stokes matrices, of certain meromorphic linear system of ordinary differential equations, give rise to a family of Drinfeld isomorphisms from quantum groups to the undeformed universal enveloping algebra of frak gl (n) . In particular, we compute explicitly the Drinfeld isomorphisms corresponding to caterpillar points on the parameter space. Our computation unveils a relation between the asymptotics of confluent hypergeometric functions and the Gelfand Zeitlin subalgebras. As by products, we show that the Drinfeld isomorphisms at caterpillar points coincide with the Appel Gautam isomorphisms. Then by going to the semiclassical limit, we place the results in this paper into the context of Poisson geometry. As an application, we prove the conjecture of Appel and Gautam, i.e., their isomorphisms are canonical quantization of the Alekseev Meinrenken diffeomorphisms arising from the linearization problem in Poisson geometry."} {"_id": [36], "label": "physics.chem-ph", "text": "Vibrational Investigation of Nucleobases by Means of Divide and Conquer Semiclassical Dynamics. In this work we report a computational study of the vibrational features of four different nucleobases employing the divide and conquer semiclassical initial value representation molecular dynamics method. Calculations are performed on uracil, cytosine, thymine, and adenine. Results show that the overall accuracy with respect to experiments is within 20 wavenumbers, regardless of the dimensionality of the nucleobase. Vibrational estimates are accurate even in the complex case of cytosine, where two relevant conformers are taken into account. These results are promising in the perspective of future studies on more complex systems, such as nucleotides or nucleobase pairs."} {"_id": [14, 39], "label": "cs.CY cs.HC", "text": "Combating Misinformation in Bangladesh Roles and Responsibilities as Perceived by Journalists, Fact checkers, and Users. There has been a growing interest within CSCW community in understanding the characteristics of misinformation propagated through computational media, and the devising techniques to address the associated challenges. However, most work in this area has been concentrated on the cases in the western world leaving a major portion of this problem unaddressed that is situated in the Global South. This paper aims to broaden the scope of this discourse by focusing on this problem in the context of Bangladesh, a country in the Global South. The spread of misinformation on Facebook in Bangladesh, a country with a population over 163 million, has resulted in chaos, hate attacks, and killings. By interviewing journalists, fact checkers, in addition to surveying the general public, we analyzed the current state of verifying misinformation in Bangladesh. Our findings show that most people in the news audience' want the news media to verify the authenticity of online information that they see online. However, the newspaper journalists say that fact checking online information is not a part of their job, and it is also beyond their capacity given the amount of information being published online everyday. We further find that the voluntary fact checkers in Bangladesh are not equipped with sufficient infrastructural support to fill in this gap. We show how our findings are connected to some of the core concerns of CSCW community around social media, collaboration, infrastructural politics, and information inequality. From our analysis, we also suggest several pathways to increase the impact of fact checking efforts through collaboration, technology design, and infrastructure development."} {"_id": [13, 71], "label": "math.DS math.SG", "text": "Orbit Growth Of Contact Structures After Surgery. Investigation of the effects of a contact surgery construction and of invariance of contact homology reveals a rich new field of inquiry at the intersection of dynamical systems and contact geometry. We produce contact 3 flows not topologically orbit equivalent to any algebraic flow, including examples on many hyperbolic 3 manifolds, and we show how the surgery produces dynamical complexity for any Reeb flow compatible with the resulting contact structure. This includes exponential complexity when neither the surg ered flow nor the surgered manifold are hyperbolic. We also demonstrate the use in dynamics of contact homology, a powerful tool in contact geometry."} {"_id": [42, 18, 13], "label": "math.DG math.DS math.GT", "text": "Counting minimal surfaces in negatively curved 3 manifolds. We introduced an asymptotic quantity that counts area minimizing surfaces in negatively curved closed 3 manifolds and show that quantity to only be minimized, among all metrics of sectional curvature less than or equal 1, by the hyperbolic metric."} {"_id": [0], "label": "cs.CV", "text": "Automatic Nonrigid Histological Image Registration with Adaptive Multistep Algorithm. In this paper, we present a short description of the method proposed to ANHIR challenge organized jointly with the IEEE ISBI 2019 conference. We propose a method consisting of preprocessing, initial alignment, nonrigid registration algorithms and a method to automatically choose the best result. The method turned out to be robust (99.792 robustness) and accurate (0.38 average median rTRE). The main drawback of the proposed method is relatively high computation time. However, this aspect can be easily improved by cleaning the code and proposing a GPU implementation."} {"_id": [0, 2], "label": "cs.CV cs.AI", "text": "Proactive Pseudo Intervention Causally Informed Contrastive Learning For Interpretable Vision Models. Deep neural networks excel at comprehending complex visual signals, delivering on par or even superior performance to that of human experts. However, ad hoc visual explanations of model decisions often reveal an alarming level of reliance on exploiting non causal visual cues that strongly correlate with the target label in training data. As such, deep neural nets suffer compromised generalization to novel inputs collected from different sources, and the reverse engineering of their decision rules offers limited interpretability. To overcome these limitations, we present a novel contrastive learning strategy called it Proactive Pseudo Intervention (PPI) that leverages proactive interventions to guard against image features with no causal relevance. We also devise a novel causally informed salience mapping module to identify key image pixels to intervene, and show it greatly facilitates model interpretability. To demonstrate the utility of our proposals, we benchmark on both standard natural images and challenging medical image datasets. PPI enhanced models consistently deliver superior performance relative to competing solutions, especially on out of domain predictions and data integration from heterogeneous sources. Further, our causally trained saliency maps are more succinct and meaningful relative to their non causal counterparts."} {"_id": [18], "label": "math.GT", "text": "Recursively squeezable sets are squeezable. In work by Freedman F2 and Freedman Quinn FQ on the topology of 4 manifolds, null decompositions whose non singleton elements are, in the terminology of MOR , recursively starlike equivalent sets of filtration length 1 arise and are shown to be shrinkable. The main result of MOR is a general theorem covering these types of decompositions. It establishes the shrinkability of null decompositions whose non singleton elements are recursively starlike equivalent sets whose filtration lengths have a uniform finite upper bound. That result is the inspiration for this article. Here it is shown that the hypothesis of a uniform finite upper bound on filtration lengths is unnecessary. In outline notions of squeezable subsets and squashable subsets of a compact metric space are defined. It is observed that starlike equivalent sets are squeezable, and that any null decomposition of a compact metric space whose non singleton elements are squeezable is shrinkable. It is also proved that a set is squeezable if and only if it is squashable, and that every recursively squashable set is squashable. It follows that any null decomposition of a compact metric space whose non singleton elements are recursively squeezable is shrinkable. The latter theorem has as a corollary the main result of MOR with the hypothesis of a uniform finite upper bound on filtration lengths removed."} {"_id": [0], "label": "cs.CV", "text": "Few shot Font Generation with Localized Style Representations and Factorization. Automatic few shot font generation is a practical and widely studied problem because manual designs are expensive and sensitive to the expertise of designers. Existing few shot font generation methods aim to learn to disentangle the style and content element from a few reference glyphs, and mainly focus on a universal style representation for each font style. However, such approach limits the model in representing diverse local styles, and thus makes it unsuitable to the most complicated letter system, e.g., Chinese, whose characters consist of a varying number of components (often called \"radical\") with a highly complex structure. In this paper, we propose a novel font generation method by learning localized styles, namely component wise style representations, instead of universal styles. The proposed style representations enable us to synthesize complex local details in text designs. However, learning component wise styles solely from reference glyphs is infeasible in the few shot font generation scenario, when a target script has a large number of components, e.g., over 200 for Chinese. To reduce the number of reference glyphs, we simplify component wise styles by a product of component factor and style factor, inspired by low rank matrix factorization. Thanks to the combination of strong representation and a compact factorization strategy, our method shows remarkably better few shot font generation results (with only 8 reference glyph images) than other state of the arts, without utilizing strong locality supervision, e.g., location of each component, skeleton, or strokes. The source code is available at https github.com clovaai lffont."} {"_id": [0], "label": "cs.CV", "text": "Towards Digital Retina in Smart Cities A Model Generation, Utilization and Communication Paradigm. The digital retina in smart cities is to select what the City Eye tells the City Brain, and convert the acquired visual data from front end visual sensors to features in an intelligent sensing manner. By deploying deep learning and or handcrafted models in front end devices, the compact features can be extracted and subsequently delivered to back end cloud for search and advanced analytics. In this context, we propose a model generation, utilization, and communication paradigm, aiming to address a set of unique challenges for better artificial intelligence services in smart cities. In particular, we present an integrated multiple deep learning models reuse and prediction strategy, which greatly increases the feasibility of the digital retina in processing and analyzing the large scale visual data in smart cities. The promise of the proposed paradigm is demonstrated through a set of experiments."} {"_id": [29], "label": "math.GR", "text": "A Class of Efficient Presentations of Finite Simple Groups. We exhibit a new presentation of the (equilateral) Von Dyck groups D(2,3,n), n ge 3 , in terms of two generators of order n satisfying three relations, one of which is Artin's braid relation. By dropping the relation which fixes the order of the generators we obtain the universal covering groups of the corresponding Von Dyck groups. In the cases n 3, , 4, ,5 , these are respectively the double covers of the finite rotational tetrahedral, octahedral and icosahedral groups. When n ge 6 we obtain infinite covers of the corresponding infinite Von Dyck groups. The interesting cases arise for n ge 7 when these groups act as discrete groups of isometries of the hyperbolic plane. Imposing a suitable third relation we obtain a host of (efficient) presentations of finite simple Chevalley groups of type A 1 as well as the sporadic Janko group J 2 ."} {"_id": [2], "label": "cs.AI", "text": "User Intention Recognition and Requirement Elicitation Method for Conversational AI Services. In recent years, chat bot has become a new type of intelligent terminal to guide users to consume services. However, it is criticized most that the services it provides are not what users expect or most expect. This defect mostly dues to two problems, one is that the incompleteness and uncertainty of user's requirement expression caused by the information asymmetry, the other is that the diversity of service resources leads to the difficulty of service selection. Conversational bot is a typical mesh device, so the guided multi rounds Q A is the most effective way to elicit user requirements. Obviously, complex Q A with too many rounds is boring and always leads to bad user experience. Therefore, we aim to obtain user requirements as accurately as possible in as few rounds as possible. To achieve this, a user intention recognition method based on Knowledge Graph (KG) was developed for fuzzy requirement inference, and a requirement elicitation method based on Granular Computing was proposed for dialog policy generation. Experimental results show that these two methods can effectively reduce the number of conversation rounds, and can quickly and accurately identify the user intention."} {"_id": [34, 12, 23], "label": "math.FA math.CA math.CV", "text": "Functions of perturbed commuting dissipative operators. The main objective of the paper is to obtain sharp Lipschitz type estimates for the norm of operator differences f(L 1,M 1) f(L 2,M 2) for pairs (L 1,M 1) and (L 2,M 2) of commuting maximal dissipative operators. To obtain such estimates, we use double operator integrals with respect to semi spectral measures associated with the pairs (L 1,M 1) and (L 2,M 2) . Note that the situation is considerably more complicated than in the case of functions of two commuting contractions and to overcome difficulties we had to elaborate new techniques. We deduce from the main result H \"older type estimates for operator differences as well as their estimates in Schatten von Neumann norms."} {"_id": [2, 4], "label": "cs.NE cs.AI", "text": "Procedural Content Generation through Quality Diversity. Quality diversity (QD) algorithms search for a set of good solutions which cover a space as defined by behavior metrics. This simultaneous focus on quality and diversity with explicit metrics sets QD algorithms apart from standard single and multi objective evolutionary algorithms, as well as from diversity preservation approaches such as niching. These properties open up new avenues for artificial intelligence in games, in particular for procedural content generation. Creating multiple systematically varying solutions allows new approaches to creative human AI interaction as well as adaptivity. In the last few years, a handful of applications of QD to procedural content generation and game playing have been proposed we discuss these and propose challenges for future work."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Norm Based Curriculum Learning for Neural Machine Translation. A neural machine translation (NMT) system is expensive to train, especially with high resource settings. As the NMT architectures become deeper and wider, this issue gets worse and worse. In this paper, we aim to improve the efficiency of training an NMT by introducing a novel norm based curriculum learning method. We use the norm (aka length or module) of a word embedding as a measure of 1) the difficulty of the sentence, 2) the competence of the model, and 3) the weight of the sentence. The norm based sentence difficulty takes the advantages of both linguistically motivated and model based sentence difficulties. It is easy to determine and contains learning dependent features. The norm based model competence makes NMT learn the curriculum in a fully automated way, while the norm based sentence weight further enhances the learning of the vector representation of the NMT. Experimental results for the WMT'14 English German and WMT'17 Chinese English translation tasks demonstrate that the proposed method outperforms strong baselines in terms of BLEU score ( 1.17 1.56) and training speedup (2.22x 3.33x)."} {"_id": [69], "label": "math.QA", "text": "Finite symmetric tensor categories with the Chevalley property in characteristic 2 . We prove an analog of Deligne's theorem for finite symmetric tensor categories mathcal C with the Chevalley property over an algebraically closed field k of characteristic 2 . Namely, we prove that every such category mathcal C admits a symmetric fiber functor to the symmetric tensor category mathcal D of representations of the triangular Hopf algebra (k dd ( dd 2),1 ot 1 dd ot dd) . Equivalently, we prove that there exists a unique finite group scheme G in mathcal D such that mathcal C is symmetric tensor equivalent to Rep mathcal D (G) . Finally, we compute the group H 2 rm inv (A,K) of equivalence classes of twists for the group algebra K A of a finite abelian p group A over an arbitrary field K of characteristic p 0 , and the Sweedler cohomology groups H i rm Sw ( mathcal O (A),K) , i ge 1 , of the function algebra mathcal O (A) of A ."} {"_id": [1, 7], "label": "physics.comp-ph cs.LG", "text": "A nudged hybrid analysis and modeling approach for realtime wake vortex transport and decay prediction. We put forth a long short term memory (LSTM) nudging framework for the enhancement of reduced order models (ROMs) of fluid flows utilizing noisy measurements for air traffic improvements. Toward emerging applications of digital twins in aviation, the proposed approach allows for constructing a realtime predictive tool for wake vortex transport and decay systems. We build on the fact that in realistic application, there are uncertainties in initial and boundary conditions, model parameters, as well as measurements. Moreover, conventional nonlinear ROMs based on Galerkin projection (GROMs) suffer from imperfection and solution instabilities, especially for advection dominated flows with slow decay in the Kolmogorov width. In the presented LSTM nudging (LSTM N) approach, we fuse forecasts from a combination of imperfect GROM and uncertain state estimates, with sparse Eulerian sensor measurements to provide more reliable predictions in a dynamical data assimilation framework. We illustrate our concept by solving a two dimensional vorticity transport equation. We investigate the effects of measurements noise and state estimate uncertainty on the performance of the LSTM N behavior. We also demonstrate that it can sufficiently handle different levels of temporal and spatial measurement sparsity, and offer a huge potential in developing next generation digital twin technologies."} {"_id": [46], "label": "math.AG", "text": "An Algorithm to Find Rational Points on Elliptic Curves Related to the Concordant Form Problem. We derive an efficient algorithm to find solutions to Euler's concordant form problem and rational points on elliptic curves associated with this problem."} {"_id": [40, 1, 59, 52], "label": "cs.IR cs.LG cs.MA cs.SI", "text": "Clustering Based Collaborative Filtering Using an Incentivized Penalized User Model. Giving or recommending appropriate content based on the quality of experience is the most important and challenging issue in recommender systems. As collaborative filtering (CF) is one of the most prominent and popular techniques used for recommender systems, we propose a new clustering based CF (CBCF) method using an incentivized penalized user (IPU) model only with ratings given by users, which is thus easy to implement. We aim to design such a simple clustering based approach with no further prior information while improving the recommendation accuracy. To be precise, the purpose of CBCF with the IPU model is to improve recommendation performance such as precision, recall, and F 1 score by carefully exploiting different preferences among users. Specifically, we formulate a constrained optimization problem, in which we aim to maximize the recall (or equivalently F 1 score) for a given precision. To this end, users are divided into several clusters based on the actual rating data and Pearson correlation coefficient. Afterwards, we give each item an incentive penalty according to the preference tendency by users within the same cluster. Our experimental results show a significant performance improvement over the baseline CF scheme without clustering in terms of recall or F 1 score for a given precision."} {"_id": [3], "label": "cs.CL", "text": "Precise Task Formalization Matters in Winograd Schema Evaluations. Performance on the Winograd Schema Challenge (WSC), a respected English commonsense reasoning benchmark, recently rocketed from chance accuracy to 89 on the SuperGLUE leaderboard, with relatively little corroborating evidence of a correspondingly large improvement in reasoning ability. We hypothesize that much of this improvement comes from recent changes in task formalization the combination of input specification, loss function, and reuse of pretrained parameters by users of the dataset, rather than improvements in the pretrained model's reasoning ability. We perform an ablation on two Winograd Schema datasets that interpolates between the formalizations used before and after this surge, and find (i) framing the task as multiple choice improves performance by 2 6 points and (ii) several additional techniques, including the reuse of a pretrained language modeling head, can mitigate the model's extreme sensitivity to hyperparameters. We urge future benchmark creators to impose additional structure to minimize the impact of formalization decisions on reported results."} {"_id": [20], "label": "math.NA cs.NA", "text": "An accelerated, high order accurate direct solver for the Lippmann Schwinger equation for acoustic scattering in the plane. An efficient direct solver for solving the Lippmann Schwinger integral equation modeling acoustic scattering in the plane is presented. For a problem with N degrees of freedom, the solver constructs an approximate inverse in mathcal O (N 3 2 ) operations and then, given an incident field, can compute the scattered field in mathcal O (N log N) operations. The solver is based on a previously published direct solver for integral equations that relies on rank deficiencies in the off diagonal blocks specifically, the so called Hierarchically Block Separable format is used. The particular solver described here has been reformulated in a way that improves numerical stability and robustness, and exploits the particular structure of the kernel in the Lippmann Schwinger equation to accelerate the computation of an approximate inverse. The solver is coupled with a Nystr \"om discretization on a regular square grid, using a quadrature method developed by Ran Duan and Vladimir Rokhlin that attains high order accuracy despite the singularity in the kernel of the integral equation. A particularly efficient solver is obtained when the direct solver is run at four digits of accuracy, and is used as a preconditioner to GMRES, with each forwards application of the integral operators accelerated by the FFT. Extensive numerical experiments are presented that illustrate the high performance of the method in challenging environments. Using the 10 rm th order accurate version of the Duan Rokhlin quadrature rule, the scheme is capable of solving problems on domains that are over 500 wavelengths wide to residual error below 10 10 in a couple of hours on a workstation, using 26M degrees of freedom."} {"_id": [43], "label": "cs.DB", "text": "Approximate Queries and Representations for Large Data Sequences. Many new database application domains such as experimental sciences and medicine are characterized by large sequences as their main form of data. Using approximate representation can significantly reduce the required storage and search space. A good choice of representation, can support a broad new class of approximate queries, needed in these domains. These queries are concerned with application dependent features of the data as opposed to the actual sampled points. We introduce a new notion of generalized approximate queries and a general divide and conquer approach that supports them. This approach uses families of real valued functions as an approximate representation. We present an algorithm for realizing our technique, and the results of applying it to medical cardiology data. (Extended version is available in Tech Report CS 95 03, Dept of Computer Science, Brown University. http cs.brown.edu research pubs techreports reports CS 95 03.html)"} {"_id": [2], "label": "cs.AI", "text": "Impact of different belief facets on agents' decision a refined cognitive architecture to model the interaction between organisations' institutional characteristics and agents' behaviour. This paper presents a conceptual refinement of agent cognitive architecture inspired from the beliefs desires intentions (BDI) and the theory of planned behaviour (TPB) models, with an emphasis on different belief facets. This enables us to investigate the impact of personality and the way that an agent weights its internal beliefs and social sanctions on an agent's actions. The study also uses the concept of cognitive dissonance associated with the fairness of institutions to investigate the agents' behaviour. To showcase our model, we simulate two historical long distance trading societies, namely Armenian merchants of New Julfa and the English East India Company. The results demonstrate the importance of internal beliefs of agents as a pivotal aspect for following institutional rules."} {"_id": [9], "label": "math.AP", "text": "Sharp existence and classification results for nonlinear elliptic equations in mathbb R N setminus 0 with Hardy potential. For N geq 3 , by the seminal paper of Brezis and V 'eron (Arch. Rational Mech. Anal. 75(1) 1 6, 1980 81), no positive solutions of Delta u u q 0 in mathbb R N setminus 0 exist if q geq N (N 2) for 1 q N (N 2) the existence and profiles near zero of all positive C 1( mathbb R N setminus 0 ) solutions are given by Friedman and V 'eron (Arch. Rational Mech. Anal. 96(4) 359 387, 1986). In this paper, for every q 1 and theta in mathbb R , we prove that the nonlinear elliptic problem ( ) Delta u lambda , x 2 ,u x theta u q 0 in mathbb R N setminus 0 with u 0 has a C 1( mathbb R N setminus 0 ) solution if and only if lambda lambda , where lambda Theta(N 2 Theta) with Theta ( theta 2) (q 1) . We show that (a) if lambda (N 2) 2 4 , then U 0(x) ( lambda lambda ) 1 (q 1) x Theta is the only solution of ( ) and (b) if lambda lambda leq (N 2) 2 4 , then all solutions of ( ) are radially symmetric and their total set is U 0 cup U gamma,q, lambda gamma in (0, infty) . We give the precise behavior of U gamma,q, lambda near zero and at infinity, distinguishing between 1 q q N, theta and q max q N, theta ,1 , where q N, theta (N 2 theta 2) (N 2) . In addition, for theta leq 2 we settle the structure of the set of all positive solutions of ( ) in Omega setminus 0 , subject to u partial Omega 0 , where Omega is a smooth bounded domain containing zero, complementing the works of C i rstea (Mem. Amer. Math. Soc. 227, 2014) and Wei Du (J. Differential Equations 262(7) 3864 3886, 2017)."} {"_id": [21], "label": "math.CO", "text": "Chain Decompositions of q,t Catalan Numbers via Local Chains. The q,t Catalan number mathrm Cat n(q,t) enumerates integer partitions contained in an n times n triangle by their dinv and external area statistics. The paper LLL18 (Lee, Li, Loehr, SIAM J. Discrete Math. 32(2018)) proposed a new approach to understanding the symmetry property mathrm Cat n(q,t) mathrm Cat n(t,q) based on decomposing the set of all integer partitions into infinite chains. Each such global chain mathcal C mu has an opposite chain mathcal C mu these combine to give a new small slice of mathrm Cat n(q,t) that is symmetric in q and t . Here we advance the agenda of LLL18 by developing a new general method for building the global chains mathcal C mu from smaller elements called local chains. We define a local opposite property for local chains that implies the needed opposite property of the global chains. This local property is much easier to verify in specific cases compared to the corresponding global property. We apply this machinery to construct all global chains for partitions with deficit at most 11 . This proves that for all n , the terms in mathrm Cat n(q,t) of degree at least binom n 2 11 are symmetric in q and t ."} {"_id": [1, 4], "label": "cs.NE cs.LG", "text": "Improving Gradient Estimation in Evolutionary Strategies With Past Descent Directions. Evolutionary Strategies (ES) are known to be an effective black box optimization technique for deep neural networks when the true gradients cannot be computed, such as in Reinforcement Learning. We continue a recent line of research that uses surrogate gradients to improve the gradient estimation of ES. We propose a novel method to optimally incorporate surrogate gradient information. Our approach, unlike previous work, needs no information about the quality of the surrogate gradients and is always guaranteed to find a descent direction that is better than the surrogate gradient. This allows to iteratively use the previous gradient estimate as surrogate gradient for the current search point. We theoretically prove that this yields fast convergence to the true gradient for linear functions and show under simplifying assumptions that it significantly improves gradient estimates for general functions. Finally, we evaluate our approach empirically on MNIST and reinforcement learning tasks and show that it considerably improves the gradient estimation of ES at no extra computational cost."} {"_id": [48, 56, 77], "label": "cs.CC cs.LO math.LO", "text": "Automating Resolution is NP Hard. We show that the problem of finding a Resolution refutation that is at most polynomially longer than a shortest one is NP hard. In the parlance of proof complexity, Resolution is not automatizable unless P NP. Indeed, we show it is NP hard to distinguish between formulas that have Resolution refutations of polynomial length and those that do not have subexponential length refutations. This also implies that Resolution is not automatizable in subexponential time or quasi polynomial time unless NP is included in SUBEXP or QP, respectively."} {"_id": [56], "label": "cs.LO", "text": "On the construction of explosive relation algebras. Fork algebras are an extension of relation algebras obtained by extending the set of logical symbols with a binary operator called fork. This class of algebras was introduced by Haeberer and Veloso in the early 90's aiming at enriching relation algebra, an already successful language for program specification, with the capability of expressing some form of parallel computation. The further study of this class of algebras led to many meaningful results linked to interesting properties of relation algebras such as representability and finite axiomatizability, among others. Also in the 90's, Veloso introduced a subclass of relation algebras that are expansible to fork algebras, admitting a large number of non isomorphic expansions, referred to as explosive relation algebras. In this work we discuss some general techniques for constructing algebras of this type."} {"_id": [41, 1], "label": "cs.RO cs.LG", "text": "Jointly Learnable Behavior and Trajectory Planning for Self Driving Vehicles. The motion planners used in self driving vehicles need to generate trajectories that are safe, comfortable, and obey the traffic rules. This is usually achieved by two modules behavior planner, which handles high level decisions and produces a coarse trajectory, and trajectory planner that generates a smooth, feasible trajectory for the duration of the planning horizon. These planners, however, are typically developed separately, and changes in the behavior planner might affect the trajectory planner in unexpected ways. Furthermore, the final trajectory outputted by the trajectory planner might differ significantly from the one generated by the behavior planner, as they do not share the same objective. In this paper, we propose a jointly learnable behavior and trajectory planner. Unlike most existing learnable motion planners that address either only behavior planning, or use an uninterpretable neural network to represent the entire logic from sensors to driving commands, our approach features an interpretable cost function on top of perception, prediction and vehicle dynamics, and a joint learning algorithm that learns a shared cost function employed by our behavior and trajectory components. Experiments on real world self driving data demonstrate that jointly learned planner performs significantly better in terms of both similarity to human driving and other safety metrics, compared to baselines that do not adopt joint behavior and trajectory learning."} {"_id": [40, 3], "label": "cs.CL cs.IR", "text": "A Topological Method for Comparing Document Semantics. Comparing document semantics is one of the toughest tasks in both Natural Language Processing and Information Retrieval. To date, on one hand, the tools for this task are still rare. On the other hand, most relevant methods are devised from the statistic or the vector space model perspectives but nearly none from a topological perspective. In this paper, we hope to make a different sound. A novel algorithm based on topological persistence for comparing semantics similarity between two documents is proposed. Our experiments are conducted on a document dataset with human judges' results. A collection of state of the art methods are selected for comparison. The experimental results show that our algorithm can produce highly human consistent results, and also beats most state of the art methods though ties with NLTK."} {"_id": [34], "label": "math.CV", "text": "Squeezing function corresponding to polydisk. In the present article, we define squeezing function corresponding to polydisk and study its properties. We investigate relationship between squeezing fuction and squeezing function corresponding to polydisk."} {"_id": [14], "label": "cs.HC", "text": "Method Cards for Designing for Situational Impairment. Despite significant research that was influenced by Situationally Induced Impairments and Disabilities (SIIDs) to improve the accessibility of mobile technology, there is still lack of awareness on how to design for SIIDs. Designing for situational impairments does not only affect usability for people who have temporary or long term disabilities, but also for the \"ideal\" users who get impacted. Limited resources on how to design for situational impairments overlook inclusive interactions and hinder the creation of accessible technology. Thus, I am going to create method cards that can be used during the design process to figure out how to get designers to design for SIIDs. These method cards help us better understand how to improve the design process by addressing the subject of how to design in order to reduce SIIDs."} {"_id": [62], "label": "cs.GT", "text": "A Predictive Strategy for the Iterated Prisoner's Dilemma. The iterated prisoner's dilemma is a game that produces many counter intuitive and complex behaviors in a social environment, based on very simple basic rules. It illustrates that cooperation can be a good thing even in a competitive world, that individual fitness needs not to be the most important criteria of success, and that some strategies are very strong in a direct confrontation but could still perform poorly on average or are evolutionarily unstable. In this contribution, we present a strategy PREDICTOR which appears to be \"sentient\" and chooses to cooperate when playing against some strategies, but defects when playing against others, without the need to record \"tags\" for its opponents or an involved decision making mechanism. To be able to operate in the highly contextual environment, as modeled by the iterated prisoner's dilemma, PREDICTOR learns from its experience to choose optimal actions by modeling its opponent and predicting a (fictive) future. It is shown that PREDICTOR is an efficient strategy for playing the iterated prisoner's dilemma and is simple to implement. In a simulated and representative tournament, it achieves high average scores and wins the tournament for various parameter settings. PREDICTOR thereby relies on a brief phase of exploration to improve its model, and it can evolve morality from intrinsically selfish behavior."} {"_id": [26], "label": "math.RT", "text": "Nonrecursive canonical basis computations for low rank Kashiwara crystals of type A. For symmetric Kashiwara crystals of type A and rank e 2 , and for the canonical basis elements that we call external, corresponding to weights on the outer skin of the Kashiwara crystal, we construct the canonical basis elements in a non recursive manner. In particular, for a symmetric crystal with Lambda a Lambda 0 a Lambda 1 , we give formulae for the canonical basis elements for all the e regular multipartitions with defects either k(a k) or k(a k) 2a , for 0 leq k leq a ."} {"_id": [80, 82], "label": "q-bio.MN cs.SC", "text": "Analysis of the Conradi Kahle Algorithm for Detecting Binomiality on Biological Models. We analyze the Conradi Kahle Algorithm for detecting binomiality. We present experiments using two implementations of the algorithm in Macaulay2 and Maple on biological models and assess the performance of the algorithm on these models. We compare the two implementations with each other and with Gr \"obner bases computations up to their performance on these biological models."} {"_id": [80], "label": "cs.SC", "text": "Computing strong regular characteristic pairs with Groebner bases. The W characteristic set of a polynomial ideal is the minimal triangular set contained in the reduced lexicographical Groebner basis of the ideal. A pair (G,C) of polynomial sets is a strong regular characteristic pair if G is a reduced lexicographical Groebner basis, C is the W characteristic set of the ideal G , the saturated ideal sat(C) of C is equal to G , and C is regular. In this paper, we show that for any polynomial ideal I with given generators one can either detect that I is unit, or construct a strong regular characteristic pair (G,C) by computing Groebner bases such that I subseteq sat(C) G and sat(C) divides I, so the ideal I can be split into the saturated ideal sat(C) and the quotient ideal I sat(C). Based on this strategy of splitting by means of quotient and with Groebner basis and ideal computations, we devise a simple algorithm to decompose an arbitrary polynomial set F into finitely many strong regular characteristic pairs, from which two representations for the zeros of F are obtained one in terms of strong regular Groebner bases and the other in terms of regular triangular sets. We present some properties about strong regular characteristic pairs and characteristic decomposition and illustrate the proposed algorithm and its performance by examples and experimental results."} {"_id": [32, 48, 21], "label": "cs.DS cs.CC math.CO", "text": "Structural Parameterizations of Clique Coloring. A clique coloring of a graph is an assignment of colors to its vertices such that no maximal clique is monochromatic. We initiate the study of structural parameterizations of the Clique Coloring problem which asks whether a given graph has a clique coloring with q colors. For fixed q ge 2 , we give an mathcal O star (q tw ) time algorithm when the input graph is given together with one of its tree decompositions of width tw . We complement this result with a matching lower bound under the Strong Exponential Time Hypothesis. We furthermore show that (when the number of colors is unbounded) Clique Coloring is XP parameterized by clique width."} {"_id": [52], "label": "cs.MA", "text": "A Multi Agent based Approach for Simulating the Impact of Human Behaviours on Air Pollution. This paper presents a Multi Agent System (MAS) approach for designing an air pollution simulator. The aim is to simulate the concentration of air pollutants emitted from sources (e.g. factories) and to investigate the emergence of cooperation between the emission source managers and the impact this has on air quality. The emission sources are controlled by agents. The agents try to achieve their goals (i.e. increase production, which has the side effect of raising air pollution) and also cooperate with others agents by altering their emission rate according to the air quality. The agents play an adapted version of the evolutionary N Person Prisoners' Dilemma game in a non deterministic environment they have two decisions decrease or increase the emission. The rewards penalties are influenced by the pollutant concentration which is, in turn, determined using climatic parameters. In order to give predictions about the Plume Dispersion) model and an ANN (Artificial Neural Network) prediction model. The prediction is calculated using the dispersal information and real data about climatic parameters (wind speed, humidity, temperature and rainfall). Every agent cooperates with its neighbours that emit the same pollutant, and it learns how to adapt its strategy to gain more reward. When the pollution level exceeds the maximum allowed level, agents are penalised according to their participation. The system has been tested using real data from the region of Annaba (North East Algeria). It helped to investigate how the regulations enhance the cooperation and may help controlling the air quality. The designed system helps the environmental agencies to assess their air pollution controlling policies."} {"_id": [0, 1, 3], "label": "cs.CV cs.CL cs.LG", "text": "Trends in Integration of Vision and Language Research A Survey of Tasks, Datasets, and Methods. Interest in Artificial Intelligence (AI) and its applications has seen unprecedented growth in the last few years. This success can be partly attributed to the advancements made in the sub fields of AI such as machine learning, computer vision, and natural language processing. Much of the growth in these fields has been made possible with deep learning, a sub area of machine learning that uses artificial neural networks. This has created significant interest in the integration of vision and language. In this survey, we focus on ten prominent tasks that integrate language and vision by discussing their problem formulation, methods, existing datasets, evaluation measures, and compare the results obtained with corresponding state of the art methods. Our efforts go beyond earlier surveys which are either task specific or concentrate only on one type of visual content, i.e., image or video. Furthermore, we also provide some potential future directions in this field of research with an anticipation that this survey stimulates innovative thoughts and ideas to address the existing challenges and build new applications."} {"_id": [1, 22], "label": "cs.SE cs.LG", "text": "Software defect prediction with zero inflated Poisson models. In this work we apply several Poisson and zero inflated models for software defect prediction. We apply different functions from several R packages such as pscl, MASS, R2Jags and the recent glmmTMB. We test the functions using the Equinox dataset. The results show that Zero inflated models, fitted with either maximum likelihood estimation or with Bayesian approach, are slightly better than other models, using the AIC as selection criterion."} {"_id": [20], "label": "math.NA cs.NA", "text": "Fast isogeometric solvers for hyperbolic wave propagation problems. We use the alternating direction method to simulate implicit dynamics. ur spatial discretization uses isogeometric analysis. Namely, we simulate a (hyperbolic) wave propagation problem in which we use tensor product B splines in space and an implicit time marching method to fully discretize the problem. We approximate our discrete operator as a Kronecker product of one dimensional mass and stiffness matrices. As a result of this algebraic transformation, we can factorize the resulting system of equations in linear (i.e., O(N)) time at each step of the implicit method. We demonstrate the performance of our method in the model P wave propagation problem. We then extend it to simulate the linear elasticity problem once we decouple the vector problem using alternating triangular methods. We proof theoretically and experimentally the unconditional stability of both methods."} {"_id": [2, 3], "label": "cs.CL cs.AI", "text": "Book Success Prediction with Pretrained Sentence Embeddings and Readability Scores. Predicting the potential success of a book in advance is vital in many applications. This could help both publishers and readers in their decision making process whether or not a book is worth publishing and reading, respectively. In this paper, we propose a model that leverages pretrained sentence embeddings along with various readability scores for book success prediction. Unlike previous methods, the proposed method requires no count based, lexical, or syntactic features. Instead, we use a convolutional neural network over pretrained sentence embeddings and leverage different readability scores through a simple concatenation operation. Our proposed model outperforms strong baselines for this task by as large as 6.4 F1 score points. Moreover, our experiments show that according to our model, only the first 1K sentences are good enough to predict the potential success of books."} {"_id": [17], "label": "cs.DC", "text": "The Bloom Clock for Causality Testing. Testing for causality between events in distributed executions is a fundamental problem. Vector clocks solve this problem but do not scale well. The probabilistic Bloom clock can determine causality between events with lower space, time, and message space overhead than vector clock however, predictions suffer from false positives. We give the protocol for the Bloom clock based on Counting Bloom filters and study its properties including the probabilities of a positive outcome and a false positive. We show the results of extensive experiments to determine how these above probabilities vary as a function of the Bloom timestamps of the two events being tested, and to determine the accuracy, precision, and false positive rate of a slice of the execution containing events in the temporal proximity of each other. Based on these experiments, we make recommendations for the setting of the Bloom clock parameters. We postulate the causality spread hypothesis from the application's perspective to indicate whether Bloom clocks will be suitable for correct predictions with high confidence. The Bloom clock design can serve as a viable space , time , and message space efficient alternative to vector clocks if false positives can be tolerated by an application."} {"_id": [67], "label": "physics.atom-ph", "text": "Measurement of the radial matrix elements for the 6s 2S 1 2 rightarrow 7p 2P J transitions in cesium. We report measurements of the electric dipole matrix elements of the 133 Cs 6s , 2S 1 2 rightarrow 7p , 2P 1 2 and 6s , 2S 1 2 rightarrow 7p , 2P 3 2 transitions. Each of these determinations is based on direct, precise comparisons of the absorption coefficients between two absorption lines. For the langle 6s , 2S 1 2 r 7p , 2P 3 2 rangle matrix element, we measure the ratio of the absorption coefficient on this line with that of the D 1 transition, 6s , 2S 1 2 rightarrow 6p , 2P 1 2 . The matrix element of the D 1 line has been determined with high precision previously by many groups. For the langle 6s , 2S 1 2 r 7p , 2P 1 2 rangle matrix element, we measure the ratio of the absorption coefficient on this line with that of the 6s , 2S 1 2 rightarrow 7p , 2P 3 2 transition. Our results for these matrix elements are langle 6s , 2S 1 2 r 7p , 2P 3 2 rangle 0.57417 (57) a 0 and langle 6s , 2S 1 2 r 7p , 2P 1 2 rangle 0.27810 (45) a 0 . These measurements have implications for the interpretation of parity nonconservation in atoms."} {"_id": [0], "label": "cs.CV", "text": "RepGN Object Detection with Relational Proposal Graph Network. Region based object detectors achieve the state of the art performance, but few consider to model the relation of proposals. In this paper, we explore the idea of modeling the relationships among the proposals for object detection from the graph learning perspective. Specifically, we present relational proposal graph network (RepGN) which is defined on object proposals and the semantic and spatial relation modeled as the edge. By integrating our RepGN module into object detectors, the relation and context constraints will be introduced to the feature extraction of regions and bounding boxes regression and classification. Besides, we propose a novel graph cut based pooling layer for hierarchical coarsening of the graph, which empowers the RepGN module to exploit the inter regional correlation and scene description in a hierarchical manner. We perform extensive experiments on COCO object detection dataset and show promising results."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Shift R CNN Deep Monocular 3D Object Detection with Closed Form Geometric Constraints. We propose Shift R CNN, a hybrid model for monocular 3D object detection, which combines deep learning with the power of geometry. We adapt a Faster R CNN network for regressing initial 2D and 3D object properties and combine it with a least squares solution for the inverse 2D to 3D geometric mapping problem, using the camera projection matrix. The closed form solution of the mathematical system, along with the initial output of the adapted Faster R CNN are then passed through a final ShiftNet network that refines the result using our newly proposed Volume Displacement Loss. Our novel, geometrically constrained deep learning approach to monocular 3D object detection obtains top results on KITTI 3D Object Detection Benchmark, being the best among all monocular methods that do not use any pre trained network for depth estimation."} {"_id": [56, 57, 19], "label": "cs.CR cs.LO cs.PL", "text": "First Order Logic for Flow Limited Authorization. We present the Flow Limited Authorization First Order Logic (FLAFOL), a logic for reasoning about authorization decisions in the presence of information flow policies. We formalize the FLAFOL proof system, characterize its proof theoretic properties, and develop its security guarantees. In particular, FLAFOL is the first logic to provide a non interference guarantee while supporting all connectives of first order logic. Furthermore, this guarantee is the first to combine the notions of non interference from both authorization logic and information flow systems. All theorems in this paper are proven in Coq."} {"_id": [88, 36], "label": "physics.atm-clus physics.chem-ph", "text": "Structure determination of the tetracene dimer in helium nanodroplets using femtosecond strong field ionization. Dimers of tetracene molecules are formed inside helium nanodroplets and identified through covariance analysis of the emission directions of kinetic tetracene cations stemming from femtosecond laser induced Coulomb explosion. Next, the dimers are aligned in either one or three dimensions under field free conditions by a nonresonant, moderately intense laser pulse. The experimental angular covariance maps of the tetracene ions are compared to calculated covariance maps for seven different dimer conformations and found to be consistent with four of these. Additional measurements of the alignment dependent strong field ionization yield of the dimer narrows the possible conformations down to either a slipped parallel or parallel slightly rotated structure. According to our quantum chemistry calculations, these are the two most stable gas phase conformations of the dimer and one of them is favorable for singlet fission."} {"_id": [10], "label": "physics.ao-ph", "text": "Wave Triad with Forcings as a Nambu System. The dynamics of an ideal wave triad with real amplitudes has a well known Nambu representation with energy and enstrophy as conservation laws. Here we derive Nambu representations for systems with constant forcings. These equations have been applied to triads of Rossby Haurwitz waves in the atmosphere where they are forced with orography. The conservation laws are based on relations for the unforced amplitudes and a Hamiltonian given by the total energy plus terms involving the unforced amplitudes. The forcing of the unstable wavenumber causes a recharge cycle."} {"_id": [1, 2, 14, 39], "label": "cs.AI cs.CY cs.HC cs.LG", "text": "Mathematical decisions and non causal elements of explainable AI. The social implications of algorithmic decision making in sensitive contexts have generated lively debates among multiple stakeholders, such as moral and political philosophers, computer scientists, and the public. Yet, the lack of a common language and a conceptual framework for an appropriate bridging of the moral, technical, and political aspects of the debate prevents the discussion to be as effective as it can be. Social scientists and psychologists are contributing to this debate by gathering a wealth of empirical data, yet a philosophical analysis of the social implications of algorithmic decision making remains comparatively impoverished. In attempting to address this lacuna, this paper argues that a hierarchy of different types of explanations for why and how an algorithmic decision outcome is achieved can establish the relevant connection between the moral and technical aspects of algorithmic decision making. In particular, I offer a multi faceted conceptual framework for the explanations and the interpretations of algorithmic decisions, and I claim that this framework can lay the groundwork for a focused discussion among multiple stakeholders about the social implications of algorithmic decision making, as well as AI governance and ethics more generally."} {"_id": [25], "label": "math.PR", "text": "Existence and Approximations of Moments for Polling Systems under the Binomial Exhaustive Policy. We establish sufficient conditions for the existence of moments of the steady state queue in polling systems operating under the binomial exhaustive policy (BEP). We assume that the server switches between the different buffers according to a pre specified table, and that switchover times are incurred whenever the server moves from one buffer to the next. We further assume that customers arrive according to independent Poisson processes, and that the service and switchover times are independent random variables with general distributions. We then propose a simple scheme to approximate the moments, which is shown to be asymptotically exact as the switchover times grow without bound, and whose computation complexity does not grow with the order of the moment. Finally, we demonstrate that the proposed asymptotic approximation for the moments is related to the fluid limit under a large switchover time scaling thus, similar approximations can be easily derived for other server switching policies, by simply identifying the fluid limits under those controls. Numerical examples demonstrate the effectiveness of our approximations for the moments under BEP and under other policies, and their increased accuracy as the switchover times increase."} {"_id": [25], "label": "math.PR", "text": "An infinite dimensional representation of the Ray Knight theorems. The classical Ray Knight theorems for Brownian motion determine the law of its local time process either at the first hitting time of a given value a by the local time at the origin, or at the first hitting time of a given position b by Brownian motion. We extend these results by describing the local time process jointly for all a and all b, by means of stochastic integral with respect to an appropriate white noise. Our result applies to mu processes, and has an immediate application a mu process is the height process of a Feller continuous state branching process (CSBP) with immigration (Lambert 10 ), whereas a Feller CSBP with immigration satisfies a stochastic differential equation driven by a white noise (Dawson and Li 7 ) our result gives an explicit relation between these two descriptions and shows that the stochastic differential equation in question is a reformulation of Tanaka's formula."} {"_id": [78], "label": "math.AC", "text": "On the group of unit valued polynomial functions. Let R be a finite commutative ring with 1 ne 0 . The set mathcal F (R) of polynomial functions on R is a finite commutative ring with pointwise operations. Its group of units mathcal F (R) times is just the set of all unit valued polynomial functions, that is the set of polynomial functions which map R into its group of units. We show that mathcal P R(R x (x 2)) the group of polynomial permutations on the ring R x (x 2) , consisting of permutations represented by polynomials over R , is embedded in a semidirect product of mathcal F (R) times by mathcal P (R) the group of polynomial permutations on R . In particular, when R mathbb F q , we prove that mathcal P mathbb F q ( mathbb F q x (x 2)) cong mathcal P ( mathbb F q) ltimes theta mathcal F ( mathbb F q) times . Furthermore, we count unit valued polynomial functions pmod p n and obtain canonical representations for these functions."} {"_id": [25, 34, 12], "label": "math.CA math.CV math.PR", "text": "A note on analytic continuation of characteristic functions. We derive necessary and sufficient conditions for a continuous bounded function f R to C to be a characteristic function of a probability measure. The Cauchy transform K f of f is used as analytic continuation of f to the upper and lower half planes in C . The conditions depend on the behavior of K f(z) and its derivatives on the imaginary axis in C . The main results are given in terms of completely monotonic and absolutely monotonic functions."} {"_id": [66, 10, 20], "label": "cs.CE cs.NA math.NA physics.ao-ph", "text": "Semi Lagrangian Subgrid Reconstruction for Advection Dominant Multiscale Problems. We introduce a new framework of numerical multiscale methods for advection dominated problems motivated by climate sciences. Current numerical multiscale methods (MsFEM) work well on stationary elliptic problems but have difficulties when the model involves dominant lower order terms. Our idea to overcome the assocociated difficulties is a semi Lagrangian based reconstruction of subgrid variablity into a multiscale basis by solving many local inverse problems. Globally the method looks like a Eulerian method with multiscale stabilized basis. We show example runs in one and two dimensions and a comparison to standard methods to support our ideas and discuss possible extensions to other types of Galerkin methods, higher dimensions and nonlinear problems."} {"_id": [37], "label": "cs.FL", "text": "The hardest language for grammars with context operators. In 1973, Greibach (\"The hardest context free language\", SIAM J. Comp., 1973) constructed a context free language L 0 with the property that every context free language can be reduced to L 0 by a homomorphism, thus representing it as an inverse homomorphic image h 1 (L 0) . In this paper, a similar characterization is established for a family of grammars equipped with operators for referring to the left context of any substring, recently defined by Barash and Okhotin (\"An extension of context free grammars with one sided context specifications\", Inform. Comput., 2014). An essential step of the argument is a new normal form for grammars with context operators, in which every nonterminal symbol defines only strings of odd length in left contexts of even length the even odd normal form. The characterization is completed by showing that the language family defined by grammars with context operators is closed under inverse homomorphisms actually, it is closed under injective nondeterministic finite transductions."} {"_id": [21], "label": "math.CO", "text": "The regularity method for graphs with few 4 cycles. We develop a sparse graph regularity method that applies to graphs with few 4 cycles, including new counting and removal lemmas for 5 cycles in such graphs. Some applications include Every n vertex graph with no 5 cycle can be made triangle free by deleting o(n 3 2 ) edges. For r geq 3 , every n vertex r graph with girth greater than 5 has o(n 3 2 ) edges. Every subset of n without a nontrivial solution to the equation x 1 x 2 2x 3 x 4 3x 5 has size o( sqrt n ) ."} {"_id": [0, 1, 41], "label": "cs.CV cs.LG cs.RO", "text": "Masking by Moving Learning Distraction Free Radar Odometry from Pose Information. This paper presents an end to end radar odometry system which delivers robust, real time pose estimates based on a learned embedding space free of sensing artefacts and distractor objects. The system deploys a fully differentiable, correlation based radar matching approach. This provides the same level of interpretability as established scan matching methods and allows for a principled derivation of uncertainty estimates. The system is trained in a (self )supervised way using only previously obtained pose information as a training signal. Using 280km of urban driving data, we demonstrate that our approach outperforms the previous state of the art in radar odometry by reducing errors by up 68 whilst running an order of magnitude faster."} {"_id": [21, 15], "label": "cs.IT math.CO math.IT", "text": "Sticky polymatroids on at most five elements. The sticky polymatroid conjecture states that any two extensions of the polymatroid have an amalgam if and only if the polymatroid has no non modular pairs of flats. We show that the conjecture holds for polymatroids on five or less elements."} {"_id": [12], "label": "math.CA", "text": "On a functional inequality stemming from the Gr \"uss type inequalities. We study functional inequality of the form T(f,h) T(f,g)T(g,h) leq F(f,g)F(g,h) F(f,h) where T is a complex valued functional and F is a real valued map. Motivation for our studies comes from some generalizations of Gr \"uss inequality."} {"_id": [68, 21], "label": "math.CO cs.DM", "text": "Algorithmic coincidence classification of mesh patterns. We review and extend previous results on coincidence of mesh patterns. We introduce the notion of a force on a permutation pattern and apply it to the coincidence classification of mesh patterns, completing the classification up to size three. We also show that this concept can be used to enumerate classical permutation classes."} {"_id": [41], "label": "cs.RO", "text": "Multilevel Monte Carlo for Solving POMDPs Online. Planning under partial obervability is essential for autonomous robots. A principled way to address such planning problems is the Partially Observable Markov Decision Process (POMDP). Although solving POMDPs is computationally intractable, substantial advancements have been achieved in developing approximate POMDP solvers in the past two decades. However, computing robust solutions for systems with complex dynamics remain challenging. Most on line solvers rely on a large number of forward simulations and standard Monte Carlo methods to compute the expected outcomes of actions the robot can perform. For systems with complex dynamics, e.g., those with non linear dynamics that admit no closed form solution, even a single forward simulation can be prohibitively expensive. Of course, this issue exacerbates for problems with long planning horizons. This paper aims to alleviate the above difficulty. To this end, we propose a new on line POMDP solver, called Multilevel POMDP Planner (MLPP), that combines the commonly known Monte Carlo Tree Search with the concept of Multilevel Monte Carlo to speed up our capability in generating approximately optimal solutions for POMDPs with complex dynamics. Experiments on four different problems of POMDP based torque control, navigation and grasping indicate that MLPP substantially outperforms state of the art POMDP solvers."} {"_id": [25], "label": "math.PR", "text": "L 2 small ball asymptotics for a family of finite dimensional perturbations of Gaussian functions. In this article we study the small ball probabilities in L 2 norm for a family of finite dimensional perturbations of Gaussian functions. We define three types of perturbations non critical, partially critical and critical and derive small ball asymptotics for the perturbated process in terms of the small ball asymptotics for the original process. The natural examples of such perturbations appear in statistics in the study of empirical processes with estimated parameters (the so called Durbin's processes). We show that the Durbin's processes are critical perturbations of the Brownian bridge. Under some additional assumptions, general results can be simplified. As an example we find the exact L 2 small ball asymptotics for critical perturbations of the Green processes (the processes which covariance function is the Green function of the ordinary differential operator)."} {"_id": [78, 46], "label": "math.AG math.AC", "text": "Deformation and Unobstructedness of Determinantal Schemes. Let Hilb p(t) (P n) be the Hilbert scheme of closed subschemes of P n with Hilbert polynomial p(t) in Q t , and let W overline W( underline b underline a r) be the closure of the locus in Hilb p(t) (P n) of determinantal schemes defined by the vanishing of the (t r 1) times (t r 1) minors of some matrix mathcal A of size t times (t c 1) with ij enty a homogeneous form of degree a j b i and with r satisfying max 1,2 c le r t . W is an irreducible algebraic set. First of all, we compute an upper r independent bound for the dimension of W in terms of a j and b i which is sharp for r 1 . In the linear case ( a j 1, b i 0 ) and cases sufficiently close, we conjecture and to a certain degree prove that this bound is achieved for all r . Then, we study to what extent W is a generically smooth component of Hilb p(t) (P n) . Under some weak numerical assumptions on the integers a j and b i (or under some depth conditions) we conjecture and often prove that W is a generically smooth component. Moreover, we also study the depth of the normal module of the homogeneous coordinate ring of (X) in W and of a closely related module. We conjecture, and in some cases prove, that their codepth is often 1 (resp. r ). These results extend previous results on standard determinantal schemes to determinantal schemes i.e. previous results of the authors on W( underline b underline a 1) to W with 1 le r t and c ge 2 r . Finally, deformations of exterior powers of the cokernel of the map determined by mathcal A are studied and proven to be given as deformations of X subset P n if dim X ge 3 . The work contains many examples which illustrate the results obtained and a considerable number of open problems some of them are collected as conjectures in the final section."} {"_id": [55], "label": "physics.geo-ph", "text": "Enhancing strength of MICP treated sandy soils from micro to macro scale. Microbial Induced Calcium carbonate (CaCO3) Precipitation (MICP) has been extensively studied for soil improvement in geotechnical engineering. The properties of calcium carbonate crystals such as size and quantity affect the strength of MICP treated soil. This study demonstrates how the data from micro scale microfluidic experiments that examine the effects of injection intervals and concentration of cementation solution on the properties of calcium carbonate crystals can be used to optimise the MICP treatment of macro scale sand soil column experiments for effective strength enhancement. The micro scale experiments reveal that, due to Ostwald ripening, longer injection intervals allow smaller crystals to dissolve and reprecipitate into larger crystals regardless of the concentration of cementation solution. By applying this finding in the macro scale experiments, a treatment duration of 6 days, where injection intervals were 12 h, 24 h, and 48 h for cementation solution concentration of 0.25 M, 0.5 M and 1.0 M, respectively, was long enough to precipitate crystals large enough for effective strength enhancement. This was indicated by the fact that significantly higher soil strength and larger crystals were produced when treatment duration increased from 3 days to 6 days, but not when it increased from 6 days to 12 days."} {"_id": [32], "label": "cs.DS", "text": "Top k Connected Overlapping Densest Subgraphs in Dual Networks. Networks are largely used for modelling and analysing data and relations among them. Recently, it has been shown that the use of a single network may not be the optimal choice, since a single network may misses some aspects. Consequently, it has been proposed to use a pair of networks to better model all the aspects, and the main approach is referred to as dual networks (DNs). DNs are two related graphs (one weighted, the other unweighted) that share the same set of vertices and two different edge sets. In DNs is often interesting to extract common subgraphs among the two networks that are maximally dense in the conceptual network and connected in the physical one. The simplest instance of this problem is finding a common densest connected subgraph (DCS), while we here focus on the detection of the Top k Densest Connected subgraphs, i.e. a set k subgraphs having the largest density in the conceptual network which are also connected in the physical network. We formalise the problem and then we propose a heuristic to find a solution, since the problem is computationally hard. A set of experiments on synthetic and real networks is also presented to support our approach."} {"_id": [2], "label": "cs.AI", "text": "Basic concepts, definitions, and methods in D number theory. As a generalization of Dempster Shafer theory, D number theory (DNT) aims to provide a framework to deal with uncertain information with non exclusiveness and incompleteness. Although there are some advances on DNT in previous studies, however, they lack of systematicness, and many important issues have not yet been solved. In this paper, several crucial aspects in constructing a perfect and systematic framework of DNT are considered. At first the non exclusiveness in DNT is formally defined and discussed. Secondly, a method to combine multiple D numbers is proposed by extending previous exclusive conflict redistribution (ECR) rule. Thirdly, a new pair of belief and plausibility measures for D numbers are defined and many desirable properties are satisfied by the proposed measures. Fourthly, the combination of information incomplete D numbers is studied specially to show how to deal with the incompleteness of information in DNT. In this paper, we mainly give relative math definitions, properties, and theorems, concrete examples and applications will be considered in the future study."} {"_id": [0], "label": "cs.CV", "text": "Layer Wise Data Free CNN Compression. We present a computationally efficient method for compressing a trained neural network without using any data. We break the problem of data free network compression into independent layer wise compressions. We show how to efficiently generate layer wise training data, and how to precondition the network to maintain accuracy during layer wise compression. Our generic technique can be used with any compression method. We outperform related works for data free low bit width quantization on MobileNetV1, MobileNetV2, and ResNet18. We also demonstrate the efficacy of our layer wise method when applied to pruning. We outperform baselines in the low computation regime suitable for on device edge compression while using orders of magnitude less memory and compute time than comparable generative methods. In the high computation regime, we show how to combine our method with generative methods to improve upon state of the art performance for several networks."} {"_id": [49], "label": "math.OC", "text": "Robust Closed loop Model Predictive Control via System Level Synthesis. In this paper, we consider the robust closed loop model predictive control (MPC) of a linear time variant (LTV) system with norm bounded disturbances and LTV model uncertainty, wherein a series of constrained optimal control problems (OCPs) are solved. Guaranteeing robust feasibility of these OCPs is challenging due to disturbances perturbing the predicted states, and model uncertainty, both of which can render the closed loop system unstable. As such, a trade off between the numerical tractability and conservativeness of the solutions is often required. We use the System Level Synthesis (SLS) framework to reformulate these constrained OCPs over closed loop system responses, and show that this allows us to transparently account for norm bounded additive disturbances and LTV model uncertainty by computing robust state feedback policies. We further show that by exploiting the underlying linear fractional structure of the resulting robust OCPs, we can significantly reduce the conservativeness of existing SLS based and tube MPC based robust control methods while also improving computational efficiency. We conclude with numerical examples demonstrating the effectiveness of our methods."} {"_id": [9], "label": "math.AP", "text": "The third order Benjamin Ono equation on the torus well posedness, traveling waves and stability. We consider the third order Benjamin Ono equation on the torus partial t u partial x left( partial xx u frac 3 2 u H partial x u frac 3 2 H(u partial x u) u 3 right). We prove that for any t in mathbb R , the flow map continuously extends to H s r,0 ( mathbb T ) if s geq 0 , but does not admit a continuous extension to H s r,0 ( mathbb T ) if 0 s frac 1 2 . Moreover, we show that the extension is not weakly sequentially continuous in L 2 r,0 ( mathbb T ) . We then classify the traveling wave solutions for the third order Benjamin Ono equation in L 2 r,0 ( mathbb T ) and study their orbital stability."} {"_id": [26, 35, 29], "label": "math.RA math.GR math.RT", "text": "From examples to methods Two cases from the study of units in integral group rings. In this article, we review the proofs of the first Zassenhaus Conjecture on conjugacy of torsion units in integral group rings for the alternating groups of degree 5 and 6, by Luthar Passi and Hertweck. We describe how the study of these examples led to the development of two methods the HeLP method and the lattice method. We exhibit these methods and summarize some results which were achieved using them. We then apply these methods to the study of the first Zassenhaus conjecture for the alternating group of degree 7 where only one critical case remains open for a full answer. Along the way we show in examples how recently obtained results can be combined with the methods presented and collect open problems some of which could be attacked using these methods."} {"_id": [40, 1, 59], "label": "cs.SI cs.IR cs.LG", "text": "Uncovering Flaming Events on News Media in Social Media. Social networking sites (SNSs) facilitate the sharing of ideas and information through different types of feedback including publishing posts, leaving comments and other type of reactions. However, some comments or feedback on SNSs are inconsiderate and offensive, and sometimes this type of feedback has a very negative effect on a target user. The phenomenon known as flaming goes hand in hand with this type of posting that can trigger almost instantly on SNSs. Most popular users such as celebrities, politicians and news media are the major victims of the flaming behaviors and so detecting these types of events will be useful and appreciated. Flaming event can be monitored and identified by analyzing negative comments received on a post. Thus, our main objective of this study is to identify a way to detect flaming events in SNS using a sentiment prediction method. We use a deep Neural Network (NN) model that can identity sentiments of variable length sentences and classifies the sentiment of SNSs content (both comments and posts) to discover flaming events. Our deep NN model uses Word2Vec and FastText word embedding methods as its training to explore which method is the most appropriate. The labeled dataset for training the deep NN is generated using an enhanced lexicon based approach. Our deep NN model classifies the sentiment of a sentence into five classes Very Positive, Positive, Neutral, Negative and Very Negative. To detect flaming incidents, we focus only on the comments classified into the Negative and Very Negative classes. As a use case, we try to explore the flaming phenomena in the news media domain and therefore we focused on news items posted by three popular news media on Facebook (BBCNews, CNN and FoxNews) to train and test the model."} {"_id": [58], "label": "q-bio.NC", "text": "Comparison Against Task Driven Artificial Neural Networks Reveals Functional Organization of Mouse Visual Cortex. Partially inspired by features of computation in visual cortex, deep neural networks compute hierarchical representations of their inputs. While these networks have been highly successful in machine learning, it remains unclear to what extent they can aid our understanding of cortical function. Several groups have developed metrics that provide a quantitative comparison between representations computed by networks and representations measured in cortex. At the same time, neuroscience is well into an unprecedented phase of large scale data collection, as evidenced by projects such as the Allen Brain Observatory. Despite the magnitude of these efforts, in a given experiment only a fraction of units are recorded, limiting the information available about the cortical representation. Moreover, only a finite number of stimuli can be shown to an animal over the course of a realistic experiment. These limitations raise the question of how and whether metrics that compare representations of deep networks are meaningful on these datasets. Here, we empirically quantify the capabilities and limitations of these metrics due to limited image presentations and neuron samples. We find that the comparison procedure is robust to different choices of stimuli set and the level of subsampling that one might expect in a large scale brain survey with thousands of neurons. Using these results, we compare the representations measured in the Allen Brain Observatory in response to natural image presentations to deep neural network. We show that the visual cortical areas are relatively high order representations (in that they map to deeper layers of convolutional neural networks). Furthermore, we see evidence of a broad, more parallel organization rather than a sequential hierarchy, with the primary area VISp(V1) being lower order relative to the other areas."} {"_id": [93], "label": "physics.class-ph", "text": "A stress driven local nonlocal mixture model for Timoshenko nano beams. A well posed stress driven mixture is proposed for Timoshenko nano beams. The model is a convex combination of local and nonlocal phases and circumvents some problems of ill posedness emerged in strain driven Eringen like formulations for structures of nanotechnological interest. The nonlocal part of the mixture is the integral convolution between stress field and a bi exponential averaging kernel function characterized by a scale parameter. The stress driven mixture is equivalent to a differential problem equipped with constitutive boundary conditions involving bending and shear fields. Closed form solutions of Timoshenko nano beams for selected boundary and loading conditions are established by an effective analytical strategy. The numerical results exhibit a stiffening behavior in terms of scale parameter."} {"_id": [38], "label": "math.NT", "text": "Two Restricted ABC Conjectures. Ellenberg proved that the abc conjecture would follow if this conjecture were known for sums a b c such that D mid abc for some integer D . Mochizuki proved a theorem with an opposite restriction, that the full abc conjecture would follow if it were known for abc sums that are not highly divisible. We prove both theorems for general number fields."} {"_id": [10, 6], "label": "physics.ao-ph physics.flu-dyn", "text": "On the Dissipation Rate of Temperature Fluctuations in Stably Stratified Flows. In this study, we explore several integral and outer length scales of turbulence which can be formulated by using the dissipation of temperature fluctuations ( chi ) and other relevant variables. Our analyses directly lead to simple yet non trivial parameterizations for both chi and the structure parameter of temperature ( C T 2 ). For our purposes, we make use of high fidelity data from direct numerical simulations of stratified channel flows."} {"_id": [26], "label": "math.RT", "text": "Twisting operators and centralisers of Lie type groups over local rings. We extend the classical result asserting that the twisting operator preserves certain Deligne Lusztig character values for truncated formal power series along the way we discuss some properties of centralisers. This leads us to the construction of an action of mathrm GL n( mathbb F q pi pi r) on a Springer fibre intersected by Deligne Lusztig varieties we determine the primitivities of the induced cohomological representations for single cycles. The case of mathrm SL 2 over finite dual numbers is presented with a criterion on semisimple orbit representations."} {"_id": [33, 84, 5], "label": "physics.plasm-ph physics.acc-ph physics.ins-det", "text": "Evolution of longitudinal plasma density profiles in discharge capillaries for plasma wakefield accelerators. Precise characterization and tailoring of the spatial and temporal evolution of plasma density within plasma sources is critical for realizing high quality accelerated beams in plasma wakefield accelerators. The simultaneous use of two independent diagnostic techniques allowed the temporally and spatially resolved detection of plasma density with unprecedented sensitivity and enabled the characterization of the plasma temperature at local thermodynamic equilibrium in discharge capillaries. A common path two color laser interferometer for obtaining the average plasma density with a sensitivity of 2 times 10 15 cm 2 was developed together with a plasma emission spectrometer for analyzing spectral line broadening profiles with a resolution of 5 times 10 15 cm 3 . Both diagnostics show good agreement when applying the spectral line broadening analysis methodology of Gigosos and Carde n oso. Measured longitudinally resolved plasma density profiles exhibit a clear temporal evolution from an initial flat top to a Gaussian like shape in the first microseconds as material is ejected out from the capillary, deviating from the often desired flat top profile. For plasma with densities of 0.5 2.5 times 10 17 cm 3 , temperatures of 1 7 eV were indirectly measured. These measurements pave the way for highly detailed parameter tuning in plasma sources for particle accelerators and beam optics."} {"_id": [22], "label": "cs.SE", "text": "Formalism Driven Development of Decentralized Systems. Decentralized systems have been widely developed and applied to address security and privacy issues in centralized systems, especially since the advancement of distributed ledger technology. However, it is challenging to ensure their correct functioning with respect to their designs and minimize the technical risk before the delivery. Although formal methods have made significant progress over the past decades, a feasible solution based on formal methods from a development process perspective has not been well developed. In this paper, we formulate an iterative and incremental development process, named formalism driven development (FDD), for developing provably correct decentralized systems under the guidance of formal methods. We also present a framework named Seniz, to practicalize FDD with a new modeling language and scaffolds. Furthermore, we conduct case studies to demonstrate the effectiveness of FDD in practice with the support of Seniz."} {"_id": [56, 57], "label": "cs.LO cs.PL", "text": "Compositional theories for host core languages. The syntax of a host core language is spitted in two parts, representing respectively a emph host language H and a emph core language C, embedded in H. This idea is rooted in Benton's Linear non Linear formulation of Linear logic and allows a flexible management of data linearity, which is particularly useful in non classical computational paradigms. Moreover, the host core style can be viewed as a simplified notion of multi language programming, the process of software development in a heterogeneous programming language. In this paper, we present the typed calculus HC0, a minimal and flexible host core system that captures and standardizes common properties of an ideal class of host core languages. We provide a denotation in terms of enriched categories and we state a strong correspondence between syntax and semantics through the notion of emph internal language . The latter result provides some interesting characterizations of host core style, otherwise difficult to achieve. We also show discuss some concrete instances, extensions and specializations of HC0."} {"_id": [25], "label": "math.PR", "text": "Approximation of the Exit Probability of a Stable Markov Modulated Constrained Random Walk. Let X be the constrained random walk on mathbb Z 2 having increments (1,0) , ( 1,1) , (0, 1) with jump probabilities lambda(M k) , mu 1(M k) , and mu 2(M k) where M is an irreducible aperiodic finite state Markov chain. The process X represents the lengths of two tandem queues with arrival rate lambda(M k) , and service rates mu 1(M k) , and mu 2(M k) . We assume that the average arrival rate with respect to the stationary measure of M is less than the average service rates, i.e., X is assumed stable. Let tau n be the first time when the sum of the components of X equals n for the first time. Let Y be the random walk on mathbb Z times mathbb Z having increments ( 1,0) , (1,1) , (0, 1) with probabilities lambda(M k) , mu 1(M k) , and mu 2(M k) . Let tau be the first time the components of Y are equal. For x in mathbb R 2 , x(1) x(2) 1 , x(1) 0 , and x n lfloor nx rfloor , we show that P (n x n(1),x n(2)),m) ( tau infty) approximates P (x n,m) ( tau n tau 0) with exponentially vanishing relative error as n rightarrow infty . For the analysis we define a characteristic matrix in terms of the jump probabilities of (X,M). The 0 level set of the characteristic polynomial of this matrix defines the characteristic surface conjugate points on this surface and the associated eigenvectors of the characteristic matrix are used to define (sub super) harmonic functions which play a fundamental role both in our analysis and the computation approximation of P (y,m) ( tau infty)."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Online Meta Learning for Multi Source and Semi Supervised Domain Adaptation. Domain adaptation (DA) is the topical problem of adapting models from labelled source datasets so that they perform well on target datasets where only unlabelled or partially labelled data is available. Many methods have been proposed to address this problem through different ways to minimise the domain shift between source and target datasets. In this paper we take an orthogonal perspective and propose a framework to further enhance performance by meta learning the initial conditions of existing DA algorithms. This is challenging compared to the more widely considered setting of few shot meta learning, due to the length of the computation graph involved. Therefore we propose an online shortest path meta learning framework that is both computationally tractable and practically effective for improving DA performance. We present variants for both multi source unsupervised domain adaptation (MSDA), and semi supervised domain adaptation (SSDA). Importantly, our approach is agnostic to the base adaptation algorithm, and can be applied to improve many techniques. Experimentally, we demonstrate improvements on classic (DANN) and recent (MCD and MME) techniques for MSDA and SSDA, and ultimately achieve state of the art results on several DA benchmarks including the largest scale DomainNet."} {"_id": [0], "label": "cs.CV", "text": "Line Drawings of Natural Scenes Guide Visual Attention. Visual search is an important strategy of the human visual system for fast scene perception. The guided search theory suggests that the global layout or other top down sources of scenes play a crucial role in guiding object searching. In order to verify the specific roles of scene layout and regional cues in guiding visual attention, we executed a psychophysical experiment to record the human fixations on line drawings of natural scenes with an eye tracking system in this work. We collected the human fixations of ten subjects from 498 natural images and of another ten subjects from the corresponding 996 human marked line drawings of boundaries (two boundary maps per image) under free viewing condition. The experimental results show that with the absence of some basic features like color and luminance, the distribution of the fixations on the line drawings has a high correlation with that on the natural images. Moreover, compared to the basic cues of regions, subjects pay more attention to the closed regions of line drawings which are usually related to the dominant objects of the scenes. Finally, we built a computational model to demonstrate that the fixation information on the line drawings can be used to significantly improve the performances of classical bottom up models for fixation prediction in natural scenes. These results support that Gestalt features and scene layout are important cues for guiding fast visual object searching."} {"_id": [3], "label": "cs.CL", "text": "Learning Multi Party Turn Taking Models from Dialogue Logs. This paper investigates the application of machine learning (ML) techniques to enable intelligent systems to learn multi party turn taking models from dialogue logs. The specific ML task consists of determining who speaks next, after each utterance of a dialogue, given who has spoken and what was said in the previous utterances. With this goal, this paper presents comparisons of the accuracy of different ML techniques such as Maximum Likelihood Estimation (MLE), Support Vector Machines (SVM), and Convolutional Neural Networks (CNN) architectures, with and without utterance data. We present three corpora the first with dialogues from an American TV situated comedy (chit chat), the second with logs from a financial advice multi bot system and the third with a corpus created from the Multi Domain Wizard of Oz dataset (both are topic oriented). The results show (i) the size of the corpus has a very positive impact on the accuracy for the content based deep learning approaches and those models perform best in the larger datasets and (ii) if the dialogue dataset is small and topic oriented (but with few topics), it is sufficient to use an agent only MLE or SVM models, although slightly higher accuracies can be achieved with the use of the content of the utterances with a CNN model."} {"_id": [4], "label": "cs.NE", "text": "Fixed Target Runtime Analysis. Runtime analysis aims at contributing to our understanding of evolutionary algorithms through mathematical analyses of their runtimes. In the context of discrete optimization problems, runtime analysis classically studies the time needed to find an optimal solution. However, both from a practical and from a theoretical viewpoint, more fine grained performance measures are needed to gain a more detailed understanding of the main working principles and their resulting performance implications. Two complementary approaches have been suggested fixed budget analyses and fixed target analyses. In this work, we conduct an in depth study on the advantages and the limitations of fixed target analyses. We show that, different from fixed budget analyses, many classical methods from the runtime analysis of discrete evolutionary algorithms yield fixed target results without greater effort. We use this to conduct a number of new fixed target analyses. However, we also point out examples where an extension of existing runtime results to fixed target results is highly non trivial."} {"_id": [0], "label": "cs.CV", "text": "Boosting Object Recognition in Point Clouds by Saliency Detection. Object recognition in 3D point clouds is a challenging task, mainly when time is an important factor to deal with, such as in industrial applications. Local descriptors are an amenable choice whenever the 6 DoF pose of recognized objects should also be estimated. However, the pipeline for this kind of descriptors is highly time consuming. In this work, we propose an update to the traditional pipeline, by adding a preliminary filtering stage referred to as saliency boost. We perform tests on a standard object recognition benchmark by considering four keypoint detectors and four local descriptors, in order to compare time and recognition performance between the traditional pipeline and the boosted one. Results on time show that the boosted pipeline could turn out up to 5 times faster, with the recognition rate improving in most of the cases and exhibiting only a slight decrease in the others. These results suggest that the boosted pipeline can speed up processing time substantially with limited impacts or even benefits in recognition accuracy."} {"_id": [42, 75, 74, 47], "label": "math.KT math.AT math.DG math.OA", "text": "Topological K theory for discrete groups and Index theory. We give a complete solution, for discrete countable groups, to the problem of defining and computing a geometric pairing between the left hand side of the Baum Connes assembly map, given in terms of geometric cycles associated to proper actions on manifolds, and cyclic periodic cohomology of the group algebra. Indeed, for any such group Gamma (without any further assumptions on it) we construct an explicit morphism from the Left Hand side of the Baum Connes assembly map to the periodic cyclic homology of the group algebra. This morphism, called here the Chern Baum Connes assembly map, allows to give a proper and explicit formulation for a Chern Connes pairing with the periodic cyclic cohomology of the group algebra. Several theorems are needed to formulate the Chern Baum Connes assembly map. In particular we establish a delocalised Riemann Roch theorem, the wrong way functoriality for periodic delocalised cohomology for Gamma proper actions, the construction of a Chern morphism between the Left Hand side of Baum Connes and a delocalised cohomology group associated to Gamma which is an isomorphism once tensoring with mathbb C , and the construction of an explicit cohomological assembly map between the delocalised cohomology group associated to Gamma and the homology group H ( Gamma,F Gamma) . We then give an index theoretical formula for the above mentioned pairing (for any Gamma ) in terms of pairings of invariant forms, associated to geometric cycles and given in terms of delocalized Chern and Todd classes, and currents naturally associated to group cocycles using Burghelea's computation. As part of our results we prove that left Hand side group used in this paper is isomorphic to the usual analytic model for the left hand side of the assembly map."} {"_id": [25], "label": "math.PR", "text": "Fast reaction limit for Glauber Kawasaki dynamics with two components. We consider the Kawasaki dynamics of two types of particles under a killing effect on a d dimensional square lattice. Particles move with possibly different jump rates depending on their types. The killing effect acts when particles of different types meet at the same site. We show the existence of a limit under the diffusive space time scaling and suitably growing killing rate segregation of distinct types of particles does occur, and the evolution of the interface between the two distinct species is governed by the two phase Stefan problem. We apply the relative entropy method and combine it with some PDE techniques."} {"_id": [46], "label": "math.AG", "text": "Decomposable Jacobians. In this paper we give examples of smooth projective curves whose Jacobians are isogenus to a product of an arbitrarily high number of Jacobians"} {"_id": [68, 21], "label": "math.CO cs.DM", "text": "Meyniel's conjecture on graphs of bounded degree. The game of Cops and Robbers is a well known pursuit evasion game played on graphs. It has been proved cite bounded degree that cubic graphs can have arbitrarily large cop number c(G) , but the known constructions show only that the set c(G) mid G text cubic is unbounded. In this paper we prove that there are arbitrarily large subcubic graphs G whose cop number is at least n 1 2 o(1) where n V(G) . We also show that proving Meyniel's conjecture for graphs of bounded degree implies a weak Meyniel's conjecture for all graphs."} {"_id": [59, 39], "label": "cs.SI cs.CY", "text": "From Senseless Swarms to Smart Mobs Tuning Networks for Prosocial Behaviour. Social media have been seen to accelerate the spread of negative content such as disinformation and hate speech, often unleashing reckless herd mentality within networks, further aggravated by malicious entities using bots for amplification. So far, the response to this emerging global crisis has centred around social media platform companies making reactive moves that appear to have greater symbolic value than practical utility. These include taking down patently objectionable content or manually deactivating the accounts of bad actors, while leaving vast troves of negative content to circulate and perpetuate within social networks. Governments worldwide have thus sought to intervene using regulatory tools, with countries such as France, Germany and Singapore introducing laws to compel technology companies to take down or correct erroneous and harmful content. However, the relentless pace of technological progress enfeebles regulatory measures that seem fated for obsolescence."} {"_id": [15], "label": "cs.IT math.IT", "text": "Sublinear Latency for Simplified Successive Cancellation Decoding of Polar Codes. This work analyzes the latency of the simplified successive cancellation (SSC) decoding scheme for polar codes proposed by Alamdar Yazdi and Kschischang. It is shown that, unlike conventional successive cancellation decoding, where latency is linear in the block length, the latency of SSC decoding is sublinear. More specifically, the latency of SSC decoding is O(N 1 1 mu ) , where N is the block length and mu is the scaling exponent of the channel, which captures the speed of convergence of the rate to capacity. Numerical results demonstrate the tightness of the bound and show that most of the latency reduction arises from the parallel decoding of subcodes of rate 0 or 1 ."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Learning Continuous Image Representation with Local Implicit Image Function. How to represent an image? While the visual world is presented in a continuous manner, machines store and see the images in a discrete way with 2D arrays of pixels. In this paper, we seek to learn a continuous representation for images. Inspired by the recent progress in 3D reconstruction with implicit neural representation, we propose Local Implicit Image Function (LIIF), which takes an image coordinate and the 2D deep features around the coordinate as inputs, predicts the RGB value at a given coordinate as an output. Since the coordinates are continuous, LIIF can be presented in arbitrary resolution. To generate the continuous representation for images, we train an encoder with LIIF representation via a self supervised task with super resolution. The learned continuous representation can be presented in arbitrary resolution even extrapolate to x30 higher resolution, where the training tasks are not provided. We further show that LIIF representation builds a bridge between discrete and continuous representation in 2D, it naturally supports the learning tasks with size varied image ground truths and significantly outperforms the method with resizing the ground truths."} {"_id": [20], "label": "math.NA cs.NA", "text": "On weak convergence of Monge Ampere measures for discrete convex mesh functions. To a mesh function we associate the natural analogue of the Monge Ampere measure. The latter is shown to be equivalent to the Monge Ampere measure of the convex envelope. We prove that the uniform convergence to a bounded convex function of mesh functions implies the uniform convergence on compact subsets of their convex envelopes and hence the weak convergence of the associated Monge Ampere measures. We also give conditions for mesh functions to have a subsequence which converges uniformly to a convex function. Our result can be used to give alternate proofs of the convergence of some discretizations for the second boundary value problem for the Monge Ampere equation and was used for a recently proposed discretization of the latter. For mesh functions which are uniformly bounded and satisfy a convexity condition at the discrete level, we show that there is a subsequence which converges uniformly on compact subsets to a convex function. The convex envelopes of the mesh functions of the subsequence also converge uniformly on compact subsets. If in addition they agree with a continuous convex function on the boundary, the limit function is shown to satisfy the boundary condition strongly."} {"_id": [49], "label": "math.OC", "text": "A fast algorithm for quadratic resource allocation problems with nested constraints. We study the quadratic resource allocation problem and its variant with lower and upper constraints on nested sums of variables. This problem occurs in many applications, in particular battery scheduling within decentralized energy management (DEM) for smart grids. We present an algorithm for this problem that runs in O(n log n) time and, in contrast to existing algorithms for this problem, achieves this time complexity using relatively simple and easy to implement subroutines and data structures. This makes our algorithm very attractive for real life adaptation and implementation. Numerical comparisons of our algorithm with a subroutine for battery scheduling within an existing tool for DEM research indicates that our algorithm significantly reduces the overall execution time of the DEM system, especially when the battery is expected to be completely full or empty multiple times in the optimal schedule. Moreover, computational experiments with synthetic data show that our algorithm outperforms the currently most efficient algorithm by more than one order of magnitude. In particular, our algorithm is able to solves all considered instances with up to one million variables in less than 17 seconds on a personal computer."} {"_id": [6], "label": "physics.flu-dyn", "text": "Large eddy simulation probability density function simulations of the Cambridge turbulent stratified flame series under swirling conditions. The LES PDF methodology is applied to the Cambridge Sandia turbulent stratified flame series under swirling conditions. The methane air chemistry is represented by a 16 species reduced ARM1 mechanism, and the in situ adaptive tabulation method is adopted to accelerate the chemistry calculation. Effects of differential diffusion and heat loss through the bluffbody surface are taken into account. The simulations are conducted for premixed (SwB3), moderately and highly stratified (SwB7 and SwB11, respectively) cases under swirling conditions. The results from LES PDF simulations are compared with experimental measurements. The computed mean and r.m.s. profiles of velocity, temperature, equivalence ratio and mass fractions of species are in very good agreement with the measurements for all three conditions. Scatter plots and conditional means of species mole fractions and temperature are compared with the experimental data, where overall good consistency with the measurements is achieved. The recirculation zones are five times longer than those obtained under non swirling conditions. A low equivalence ratio high temperature region near the bluffbody is not captured in the computation, which is attributed to the insuffcient entrainment of downstream mixtures into the recirculation zone. The parametric studies show that the differential diffusion has a negligible effect on the mean and r.m.s. results, whereas the heat loss has a considerable effect on the temperature and CO profiles close to the bluffbody."} {"_id": [46, 77, 38], "label": "math.NT math.AG math.LO", "text": "Some functional transcendence results around the Schwarzian differential equation. This paper centers around proving variants of the Ax Lindemann Weierstrass (ALW) theorem for analytic functions which satisfy Schwarzian differential equations. In previous work, the authors proved the ALW theorem for the uniformizers of genus zero Fuchsian groups, and in this work, we generalize that result in several ways using a variety of techniques from model theory, galois theory and geometry."} {"_id": [9], "label": "math.AP", "text": "Analysis of micropolar fluids existence of potential microflow solutions, nearby global well posedness, and asymptotic stability. In this paper we concern ourselves with an incompressible, viscous, isotropic, and periodic micropolar fluid. We find that in the absence of forcing and microtorquing there exists an infinite family of well behaved solutions, which we call potential microflows, in which the fluid velocity vanishes identically, but the angular velocity of the microstructure is conservative and obeys a linear parabolic system. We then prove that nearby each potential microflow, the nonlinear equations of motion are well posed globally in time, and solutions are stable. Finally, we prove that in the absence of force and microtorque, solutions decay exponentially, and in the presence of force and microtorque obeying certain conditions, solutions have quantifiable decay rates."} {"_id": [15], "label": "cs.IT math.IT", "text": "A Practical Approach to Navigating the Tradeoff Between Privacy and Precise Utility. Due to the recent popularity of online social networks, coupled with people's propensity to disclose personal information in an effort to achieve certain gratifications, the problem of navigating the tradeoff between privacy and utility attracted a lot of recent interest and generated a rich body of research. A critical prerequisite to solving the problem is to appropriately capture the privacy and the utility aspects in the problem formulation. Most of the existing works' focus is on the notion of privacy, while utility loss is often treated as the undesirable but necessary distortion of the true data, introduced by the privacy mechanism. By contrast, we are interested in modelling utility differently, by associating it with specific attributes of a user, just like privacy is associated with specific private attributes in the literature. Our model of utility facilitates a better and more precise privacy mechanism, and achieves better privacy utility tradeoffs. We further incorporate into our problem formulation a practical constraint on acceptable loss in utility per unit gain in privacy, which allows users to customize the privacy mechanisms in order to account for the relative values that each user associates with their own privacy and utility. This paper discusses the intricacies of our utility model and the corresponding privacy utility tradeoff, and introduces a heuristic greedy algorithm to solve the problem."} {"_id": [25, 23], "label": "math.PR math.FA", "text": "On existence and uniqueness properties for solutions of stochastic fixed point equations. The Feynman Kac formula implies that every suitable classical solution of a semilinear Kolmogorov partial differential equation (PDE) is also a solution of a certain stochastic fixed point equation (SFPE). In this article we study such and related SFPEs. In particular, the main result of this work proves existence of unique solutions of certain SFPEs in a general setting. As an application of this main result we establish the existence of unique solutions of SFPEs associated with semilinear Kolmogorov PDEs with Lipschitz continuous nonlinearities even in the case where the associated semilinear Kolmogorov PDE does not possess a classical solution."} {"_id": [67], "label": "physics.atom-ph", "text": "Relativistic configuration interaction calculations of U I hyperfine constants. Neutral uranium (U I) is a very difficult atom for theoretical calculations due to a large number of valence electrons, six, strong valence valence and valence core correlations, high density of states, and relativistic effects. Configuration interaction many body perturbation theory (CI MBPT) can treat efficiently valence core correlations and relativistic effects, but because the formalism was developed for Dirac Hartree Fock (DHF) starting potential that does not contain valence electrons, quite large CI space is needed to compensate for 6 charge of such a potential. Much more efficient is relativistic configuration interaction (RCI) approach which uses relatively accurate starting DHF potential that includes some valence electrons to make the valence electron Hamiltonian diagonally dominated for some states. Here we report calculations of U I hyperfine constants of several low energy states using the RCI method with the starting potential that includes four f valence electrons. With this starting potential, it is possible to use the single configuration approximation or small basis sets to obtain quite accurate results for hyperfine structure constants. In fact, by scaling nuclear magnetic moment, the agreement for 5 levels was within 5 , and a new magnetic moment can be recommended 0.43(2). The method can be further developed to include more extensive data sets to improve accuracy and can be applied to other atoms and for calculations of other properties, for example, relevant to fundamental symmetry tests."} {"_id": [14], "label": "cs.HC", "text": "Reflection in Game Based Learning A Survey of Programming Games. Reflection is a critical aspect of the learning process. However, educational games tend to focus on supporting learning concepts rather than supporting reflection. While reflection occurs in educational games, the educational game design and research community can benefit from more knowledge of how to facilitate player reflection through game design. In this paper, we examine educational programming games and analyze how reflection is currently supported. We find that current approaches prioritize accuracy over the individual learning process and often only support reflection post gameplay. Our analysis identifies common reflective features, and we develop a set of open areas for future work. We discuss these promising directions towards engaging the community in developing more mechanics for reflection in educational games."} {"_id": [0], "label": "cs.CV", "text": "A Common Operating Picture Framework Leveraging Data Fusion and Deep Learning. Organizations are starting to realize of the combined power of data and data driven algorithmic models to gain insights, situational awareness, and advance their mission. A common challenge to gaining insights is connecting inherently different datasets. These datasets (e.g. geocoded features, video streams, raw text, social network data, etc.) per separate they provide very narrow answers however collectively they can provide new capabilities. In this work, we present a data fusion framework for accelerating solutions for Processing, Exploitation, and Dissemination (PED). Our platform is a collection of services that extract information from several data sources (per separate) by leveraging deep learning and other means of processing. This information is fused by a set of analytical engines that perform data correlations, searches, and other modeling operations to combine information from the disparate data sources. As a result, events of interest are detected, geolocated, logged, and presented into a common operating picture. This common operating picture allows the user to visualize in real time all the data sources, per separate and their collective cooperation. In addition, forensic activities have been implemented and made available through the framework. Users can review archived results and compare them to the most recent snapshot of the operational environment. In our first iteration we have focused on visual data (FMV, WAMI, CCTV PTZ Cameras, open source video, etc.) and AIS data streams (satellite and terrestrial sources). As a proof of concept, in our experiments we show how FMV detections can be combined with vessel tracking signals from AIS sources to confirm identity, tip and cue aerial reconnaissance, and monitor vessel activity in an area."} {"_id": [0, 2], "label": "cs.CV cs.AI", "text": "Skeleton based Approaches based on Machine Vision A Survey. Recently, skeleton based approaches have achieved rapid progress on the basis of great success in skeleton representation. Plenty of researches focus on solving specific problems according to skeleton features. Some skeleton based approaches have been mentioned in several overviews on object detection as a non essential part. Nevertheless, there has not been any thorough analysis of skeleton based approaches attentively. Instead of describing these techniques in terms of theoretical constructs, we devote to summarizing skeleton based approaches with regard to application fields and given tasks as comprehensively as possible. This paper is conducive to further understanding of skeleton based application and dealing with particular issues."} {"_id": [3], "label": "cs.CL", "text": "Morphological Segmentation Inside Out. Morphological segmentation has traditionally been modeled with non hierarchical models, which yield flat segmentations as output. In many cases, however, proper morphological analysis requires hierarchical structure especially in the case of derivational morphology. In this work, we introduce a discriminative, joint model of morphological segmentation along with the orthographic changes that occur during word formation. To the best of our knowledge, this is the first attempt to approach discriminative segmentation with a context free model. Additionally, we release an annotated treebank of 7454 English words with constituency parses, encouraging future research in this area."} {"_id": [58], "label": "q-bio.NC", "text": "Neuro PC Causal Functional Connectivity from Neural Dynamics. Functional connectome extends the anatomical connectome by capturing the relations between neurons according to their activity and interactions. When these relations are causal, the functional connectome maps how neural activity flows within neural circuits and provides the possibility for inference of functional neural pathways, such as sensory motor behavioral pathways. While there exist various information approaches for non causal estimations of the functional connectome, approaches that characterize the causal functional connectivity the causal relationships between neuronal time series, are scarce. In this work, we develop the Neuro PC algorithm which is a novel methodology for inferring the causal functional connectivity between neurons from multi dimensional time series, such as neuronal recordings. The core of our methodology relies on a novel adaptation of the PC algorithm, a state of the art method for statistical causal inference, to the multi dimensional time series of neural dynamics. We validate the performance of the method on network motifs with various interactions between their neurons simulated using continuous time artificial network of neurons. We then consider the application of the method to obtain the causal functional connectome for recent multi array electrophysiological recordings from the mouse visual cortex in the presence of different stimuli. We show how features of the mapping can be used for quantification of the similarities between neural responses subject to different stimuli."} {"_id": [18], "label": "math.GT", "text": "Adequate links in thickened surfaces and the generalized Tait conjectures. In this paper, we apply Kauffman bracket skein algebras to develop a theory of skein adequate links in thickened surfaces. We show that any alternating link diagram on a surface is skein adequate. We apply our theory to establish the first and second Tait conjectures for adequate links in thickened surfaces. Our notion of skein adequacy is broader and more powerful than the corresponding notions of adequacy previously considered for link diagrams in surfaces. For a link diagram D on a surface Sigma of minimal genus g( Sigma) , we show that rm span ( D Sigma) leq 4c(D) 4 D 4g( Sigma), where D Sigma is its skein bracket, D is the number of connected components of D , and c(D) is the number of crossings. This extends a classical result of Kauffman, Murasugi, and Thistlethwaite. We further show that the above inequality is an equality if and only if D is weakly alternating. This is a generalization of a well known result for classical links due to Thistlethwaite. Thus the skein bracket detects the crossing number for weakly alternating links. As an application, we show that the crossing number is additive under connected sum for adequate links in thickened surfaces."} {"_id": [1, 41], "label": "cs.LG cs.RO", "text": "Weighted Entropy Modification for Soft Actor Critic. We generalize the existing principle of the maximum Shannon entropy in reinforcement learning (RL) to weighted entropy by characterizing the state action pairs with some qualitative weights, which can be connected with prior knowledge, experience replay, and evolution process of the policy. We propose an algorithm motivated for self balancing exploration with the introduced weight function, which leads to state of the art performance on Mujoco tasks despite its simplicity in implementation."} {"_id": [49, 12], "label": "math.CA math.OC", "text": "Time varying vector norm and lower and upper bounds on the solutions of uniformly asymptotically stable linear systems. Based on the eigenvalue idea and the time varying weighted vector norm in state space we construct here the lower and upper bounds on the solutions of uniformly asymptotically stable linear systems. We generalize the known results for the linear time invariant systems to the linear time varying ones."} {"_id": [49], "label": "math.OC", "text": "Numerical Investigation of Traffic State Reconstruction and Control Using Connected Automated Vehicles. In this paper we present a numerical study on control and observation of traffic flow using Lagrangian measurements and actuators. We investigate the effect of some basic control and observation schemes using probe and actuated vehicles within the flow. The aim is to show the effect of the state reconstruction on the efficiency of the control, compared to the case using full information about the traffic. The effectiveness of the proposed state reconstruction and control algorithms is demonstrated in simulations. They show that control using the reconstructed state approaches the full information control when the gap between the connected vehicles is not too large, reducing the delay by more than 60 when the gap between the sensor vehicles is 1.25 km on average, compared to a delay reduction of almost 80 in the full information control case. It shows that the reconstruction is well achieved if the distance between two connected and autonomous vehicles is not too large (more than 1 vehicle per kilometer). We also show that it is possible to further improve the control performance by employing a simple adaptive probe vehicle selection scheme. Moreover, we propose a simple scheme for selecting which vehicles to use as sensors, in order to reduce the communication burden. Numerical simulations demonstrate that It also demonstrates that it is possible to reduce the communication burden using a triggering mechanism with with this triggering mechanism, the delay is reduced by around 65 , compared to a reduction of 72 if all connected vehicles are communicating at all times."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "More Embeddings, Better Sequence Labelers?. Recent work proposes a family of contextual embeddings that significantly improves the accuracy of sequence labelers over non contextual embeddings. However, there is no definite conclusion on whether we can build better sequence labelers by combining different kinds of embeddings in various settings. In this paper, we conduct extensive experiments on 3 tasks over 18 datasets and 8 languages to study the accuracy of sequence labeling with various embedding concatenations and make three observations (1) concatenating more embedding variants leads to better accuracy in rich resource and cross domain settings and some conditions of low resource settings (2) concatenating additional contextual sub word embeddings with contextual character embeddings hurts the accuracy in extremely low resource settings (3) based on the conclusion of (1), concatenating additional similar contextual embeddings cannot lead to further improvements. We hope these conclusions can help people build stronger sequence labelers in various settings."} {"_id": [1, 14], "label": "cs.HC cs.LG", "text": "Modeling Knowledge Acquisition from Multiple Learning Resource Types. Students acquire knowledge as they interact with a variety of learning materials, such as video lectures, problems, and discussions. Modeling student knowledge at each point during their learning period and understanding the contribution of each learning material to student knowledge are essential for detecting students' knowledge gaps and recommending learning materials to them. Current student knowledge modeling techniques mostly rely on one type of learning material, mainly problems, to model student knowledge growth. These approaches ignore the fact that students also learn from other types of material. In this paper, we propose a student knowledge model that can capture knowledge growth as a result of learning from a diverse set of learning resource types while unveiling the association between the learning materials of different types. Our multi view knowledge model (MVKM) incorporates a flexible knowledge increase objective on top of a multi view tensor factorization to capture occasional forgetting while representing student knowledge and learning material concepts in a lower dimensional latent space. We evaluate our model in different experiments toshow that it can accurately predict students' future performance, differentiate between knowledge gain in different student groups and concepts, and unveil hidden similarities across learning materials of different types."} {"_id": [25], "label": "math.PR", "text": "Perpetual Integral Functionals of Multidimensional Stochastic Processes. The paper is devoted to the existence of integral functionals int 0 infty f(X(t)) , mathrm d t for several classes of processes in mathbb R with d ge 3 . Some examples such as Brownian motion, fractional Brownian motion, compound Poisson process, Markov processes admitting densities of transitional probabilities are considered."} {"_id": [56, 57, 22], "label": "cs.PL cs.LO cs.SE", "text": "solc verify A Modular Verifier for Solidity Smart Contracts. We present solc verify, a source level verification tool for Ethereum smart contracts. Solc verify takes smart contracts written in Solidity and discharges verification conditions using modular program analysis and SMT solvers. Built on top of the Solidity compiler, solc verify reasons at the level of the contract source code, as opposed to the more common approaches that operate at the level of Ethereum bytecode. This enables solc verify to effectively reason about high level contract properties while modeling low level language semantics precisely. The contract properties, such as contract invariants, loop invariants, and function pre and post conditions, can be provided as annotations in the code by the developer. This enables automated, yet user friendly formal verification for smart contracts. We demonstrate solc verify by examining real world examples where our tool can effectively find bugs and prove correctness of non trivial properties with minimal user effort."} {"_id": [49, 20], "label": "math.OC cs.NA math.NA", "text": "Optimal Complexity and Certification of Bregman First Order Methods. We provide a lower bound showing that the O(1 k) convergence rate of the NoLips method (a.k.a. Bregman Gradient) is optimal for the class of functions satisfying the h smoothness assumption. This assumption, also known as relative smoothness, appeared in the recent developments around the Bregman Gradient method, where acceleration remained an open issue. On the way, we show how to constructively obtain the corresponding worst case functions by extending the computer assisted performance estimation framework of Drori and Teboulle (Mathematical Programming, 2014) to Bregman first order methods, and to handle the classes of differentiable and strictly convex functions."} {"_id": [1], "label": "cs.LG", "text": "The Impact of Isolation Kernel on Agglomerative Hierarchical Clustering Algorithms. Agglomerative hierarchical clustering (AHC) is one of the popular clustering approaches. Existing AHC methods, which are based on a distance measure, have one key issue it has difficulty in identifying adjacent clusters with varied densities, regardless of the cluster extraction methods applied on the resultant dendrogram. In this paper, we identify the root cause of this issue and show that the use of a data dependent kernel (instead of distance or existing kernel) provides an effective means to address it. We analyse the condition under which existing AHC methods fail to extract clusters effectively and the reason why the data dependent kernel is an effective remedy. This leads to a new approach to kernerlise existing hierarchical clustering algorithms such as existing traditional AHC algorithms, HDBSCAN, GDL and PHA. In each of these algorithms, our empirical evaluation shows that a recently introduced Isolation Kernel produces a higher quality or purer dendrogram than distance, Gaussian Kernel and adaptive Gaussian Kernel."} {"_id": [34, 42, 46], "label": "math.AG math.CV math.DG", "text": "A variational approach to the Hermitian Einstein metrics and the Quot scheme limit of Fubini Study metrics. This is a sequel of our paper arXiv 1809.08425 on the Quot scheme limit and variational properties of Donaldson's functional, which established its coercivity for slope stable holomorphic vector bundles over smooth projective varieties. Assuming that the coercivity is uniform in a certain sense, we provide a new proof of the Donaldson Uhlenbeck Yau theorem, in such a way that the analysis involved in the proof is elementary except for the asymptotic expansion of the Bergman kernel."} {"_id": [14, 39], "label": "cs.HC cs.CY", "text": "Capturing the Practices, Challenges, and Needs of Transportation Decision Makers. Transportation decision makers from government agencies play an important role in addressing the traffic network conditions, which in turn, have a major impact on the well being of citizens. The practices, challenges, and needs of this group of practitioners are less represented in the HCI literature. We address this gap through an interview study with 19 practitioners from Transports Qu 'ebec, a government agency responsible for transportation infrastructures in Qu 'ebec, Canada. We found that this group of decision makers can most benefit from research about data analysis tools and platforms that (1) provide information to support data quality awareness, (2) are interoperable with other tools in the complex workflow of the practitioners, and (3) support intuitive and customizable visual analytics. These implications can also be informative to the design of tools supporting other decision making tasks and domains."} {"_id": [21, 38], "label": "math.CO math.NT", "text": "Bounds of Trilinear and Trinomial Exponential Sums. We prove, for a sufficiently small subset mathcal A of a prime residue field, an estimate on the number of solutions to the equation (a 1 a 2)(a 3 a 4) (a 5 a 6)(a 7 a 8) with all variables in mathcal A . We then derive new bounds on trilinear exponential sums and on the total number of residues equaling the product of two differences of elements of mathcal A . We also prove a refined estimate on the number of collinear triples in a Cartesian product of multiplicative subgroups and derive stronger bounds for trilinear sums with all variables in multiplicative subgroups."} {"_id": [85], "label": "physics.data-an", "text": "GPS Fit Method for Paths of Non Drunken Sailors and its Connection to Entropy. Estimating the altimeters a cyclist has climbed from noisy GPS data is a challenging problem. In this article a method is proposed that assumes that a person locally takes the shortest path. This results in an algorithm that does not need smoothing parameters. Moreover, it turns out that this assumption allows one to find a similarity between entropy and likelihood which results to the introduction of an entropic force."} {"_id": [74, 23], "label": "math.FA math.OA", "text": "Towards characterizations of approximate Schauder frame and its duals for Banach spaces. We begin the study of characterizations of recently defined approximate Schauder frame (ASF) and its duals for separable Banach spaces. We show that, under some conditions, both ASF and its dual frames can be characterized for Banach spaces. We also give an operator theoretic characterization for similarity of ASFs. Our results encode the results of Holub, Li, Balan, Han, and Larson. We also address orthogonality of ASFs."} {"_id": [58, 2], "label": "q-bio.NC cs.AI", "text": "The growth and form of knowledge networks by kinesthetic curiosity. Throughout life, we might seek a calling, companions, skills, entertainment, truth, self knowledge, beauty, and edification. The practice of curiosity can be viewed as an extended and open ended search for valuable information with hidden identity and location in a complex space of interconnected information. Despite its importance, curiosity has been challenging to computationally model because the practice of curiosity often flourishes without specific goals, external reward, or immediate feedback. Here, we show how network science, statistical physics, and philosophy can be integrated into an approach that coheres with and expands the psychological taxonomies of specific diversive and perceptual epistemic curiosity. Using this interdisciplinary approach, we distill functional modes of curious information seeking as searching movements in information space. The kinesthetic model of curiosity offers a vibrant counterpart to the deliberative predictions of model based reinforcement learning. In doing so, this model unearths new computational opportunities for identifying what makes curiosity curious."} {"_id": [9, 76], "label": "math.AP math.SP", "text": "Non concentration and restriction bounds for Neumann eigenfunctions of piecewise C infty bounded planar domains. Let ( Omega,g) be a piecewise smooth, bounded convex domain in R 2 and consider L 2 normalized Neumann eigenfunctions phi lambda with eigenvalue lambda 2 and u lambda phi lambda partial Omega the associated Dirichlet data (ie. boundary restriction of phi lambda ). Our first main result (Theorem ref T non con ) is a small scale em non concentration estimate We prove that for em any x 0 in overline Omega , (including boundary corner points) and any delta in 0,1), phi h B(x 0, lambda delta ) cap Omega O( lambda delta 2 ). Our subsequent results involve applications of the nonconcentration estimate to upper bounds for L 2 restrictions of boundary eigenfunctions that are valid up to boundary corners. In particular, in Theorem ref dirichlet we prove that for any em flat boundary edge Gamma (possibly including corner points), the boundary restrictions u h phi h partial Omega satisfy the bounds u lambda L 2( Gamma) O epsilon ( lambda 1 4 epsilon ), for any epsilon 0. The exponent 1 4 is sharp and the result improves on the O( lambda 1 3 ) universal L 2 restriction bound for Neumann eigenfunctions due to Tataru cite Ta . The O( lambda 1 4 ) bound is also an extension to the boundary (including corner points) of well known interior L 2 restriction bounds of Burq Gerard Tzvetkov cite BGT along totally geodesic hypersurfaces."} {"_id": [46], "label": "math.AG", "text": "Matricial Proofs of Some Classical Results about Critical Point Location. The Gauss Lucas and B o cher Grace Marden theorems are classical results in the geometry of polynomials. Proofs of the these results are available in the literature, but the approaches are seemingly different. In this work, we show that these theorems can be proven in a unified theoretical framework utilizing matrix analysis (in particular, using the field of values and the differentiator of a matrix). In addition, we provide a useful variant of a well known result due to Siebeck."} {"_id": [57], "label": "cs.PL", "text": "Efficient global register allocation. In a compiler, an essential component is the register allocator. Two main algorithms have dominated implementations, graph coloring and linear scan, differing in how live values are modeled. Graph coloring uses an edge in an interference graph' to show that two values cannot reside in the same register. Linear scan numbers all values, creates intervals between definition and uses, and then intervals that do not overlap may be allocated to the same register. For both algorithms the liveness models are computed at considerable runtime and memory cost. Furthermore, these algorithms do little to improve code quality, where the target architecture and register coalescing are important concerns. We describe a new register allocation algorithm with lightweight implementation characteristics. The algorithm introduces a future active' set for values that will reside in a register later in the allocation. Registers are allocated and freed in the manner of linear scan, although other ordering heuristics could improve code quality or lower runtime cost. An advantageous property of the approach is an ability to make these trade offs. A key result is the future active' set can remove any liveness model for over 90 of instructions and 80 of methods. The major contribution is the allocation algorithm that, for example, solves an inability of the similarly motivated Treescan register allocator to look ahead of the instruction being allocated allowing an unconstrained allocation order, and an ability to better handle fixed registers and loop carried values. The approach also is not reliant on properties of SSA form, similar to the original linear scan work. An analysis is presented in a production compiler for Java code compiled through SSA form to Android dex files."} {"_id": [34, 12], "label": "math.CV math.CA", "text": "Weighted estimates of the Bergman projection with matrix weights. We establish a weighted inequality for the Bergman projection with matrix weights for a class of pseudoconvex domains. We extend a result of Aleman Constantin and obtain the following estimate for the weighted norm of P P L 2( Omega,W) leq C( mathcal B 2(W)) 2 . Here mathcal B 2(W) is the Bekoll 'e Bonami constant for the matrix weight W and C is a constant that is independent of the weight W but depends upon the dimension and the domain."} {"_id": [40], "label": "cs.IR", "text": "Double Wing Mixture of Experts for Streaming Recommendations. Streaming Recommender Systems (SRSs) commonly train recommendation models on newly received data only to address user preference drift, i.e., the changing user preferences towards items. However, this practice overlooks the long term user preferences embedded in historical data. More importantly, the common heterogeneity in data stream greatly reduces the accuracy of streaming recommendations. The reason is that different preferences (or characteristics) of different types of users (or items) cannot be well learned by a unified model. To address these two issues, we propose a Variational and Reservoir enhanced Sampling based Double Wing Mixture of Experts framework, called VRS DWMoE, to improve the accuracy of streaming recommendations. In VRS DWMoE, we first devise variational and reservoir enhanced sampling to wisely complement new data with historical data, and thus address the user preference drift issue while capturing long term user preferences. After that, we propose a Double Wing Mixture of Experts (DWMoE) model to first effectively learn heterogeneous user preferences and item characteristics, and then make recommendations based on them. Specifically, DWMoE contains two Mixture of Experts (MoE, an effective ensemble learning model) to learn user preferences and item characteristics, respectively. Moreover, the multiple experts in each MoE learn the preferences (or characteristics) of different types of users (or items) where each expert specializes in one underlying type. Extensive experiments demonstrate that VRS DWMoE consistently outperforms the state of the art SRSs."} {"_id": [62], "label": "cs.GT", "text": "Improved Lower Bounds for Truthful Scheduling. The problem of scheduling unrelated machines by a truthful mechanism to minimize the makespan was introduced in the seminal \"Algorithmic Mechanism Design\" paper by Nisan and Ronen. Nisan and Ronen showed that there is a truthful mechanism that provides an approximation ratio of min(m,n) , where n is the number of machines and m is the number of jobs. They also proved that no truthful mechanism can provide an approximation ratio better than 2 . Since then, the lower bound was improved to 1 sqrt 2 approx 2.41 by Christodoulou, Kotsoupias, and Vidali, and then to 1 phi approx 2.618 by Kotsoupias and Vidali. Very recently, the lower bound was improved to 2.755 by Giannakopoulos, Hammerl, and Pocas. In this paper we further improve the bound to 3 delta , for every constant delta 0 . Note that a gap between the upper bound and the lower bounds exists even when the number of machines and jobs is very small. In particular, the known 1 sqrt 2 lower bound requires at least 3 machines and 5 jobs. In contrast, we show a lower bound of 2.2055 that uses only 3 machines and 3 jobs and a lower bound of 1 sqrt 2 that uses only 3 machines and 4 jobs. For the case of two machines and two jobs we show a lower bound of 2 . Similar bounds for two machines and two jobs were known before but only via complex proofs that characterized all truthful mechanisms that provide a finite approximation ratio in this setting, whereas our new proof uses a simple and direct approach."} {"_id": [17, 15], "label": "cs.DC cs.IT math.IT", "text": "Synergy via Redundancy Adaptive Replication Strategies and Fundamental Limits. The maximum possible throughput (or the rate of job completion) of a multi server system is typically the sum of the service rates of individual servers. Recent work shows that launching multiple replicas of a job and canceling them as soon as one copy finishes can boost the throughput, especially when the service time distribution has high variability. This means that redundancy can, in fact, create synergy among servers such that their overall throughput is greater than the sum of individual servers. This work seeks to find the fundamental limit of the throughput boost achieved by job replication and the optimal replication policy to achieve it. While most previous works consider upfront replication policies, we expand the set of possible policies to delayed launch of replicas. The search for the optimal adaptive replication policy can be formulated as a Markov Decision Process, using which we propose two myopic replication policies, MaxRate and AdaRep, to adaptively replicate jobs. In order to quantify the optimality gap of these and other policies, we derive upper bounds on the service capacity, which provide fundamental limits on the throughput of queueing systems with redundancy."} {"_id": [84], "label": "physics.acc-ph", "text": "Real time Accelerator Diagnostic Tools for the MAX IV Storage Rings. In this paper, beam diagnostic and monitoring tools developed by the MAX IV Operations Group are discussed. In particular, new beam position monitoring and accelerator tunes visualization software tools, as well as tools that directly influence the beam quality and stability are introduced. An availability and downtime monitoring application is also presented."} {"_id": [3], "label": "cs.CL", "text": "Improved Zero shot Neural Machine Translation via Ignoring Spurious Correlations. Zero shot translation, translating between language pairs on which a Neural Machine Translation (NMT) system has never been trained, is an emergent property when training the system in multilingual settings. However, naive training for zero shot NMT easily fails, and is sensitive to hyper parameter setting. The performance typically lags far behind the more conventional pivot based approach which translates twice using a third language as a pivot. In this work, we address the degeneracy problem due to capturing spurious correlations by quantitatively analyzing the mutual information between language IDs of the source and decoded sentences. Inspired by this analysis, we propose to use two simple but effective approaches (1) decoder pre training (2) back translation. These methods show significant improvement (4 22 BLEU points) over the vanilla zero shot translation on three challenging multilingual datasets, and achieve similar or better results than the pivot based approach."} {"_id": [78, 46], "label": "math.AG math.AC", "text": "Smooth Hilbert schemes their classification and geometry. Closed subschemes in projective space with a fixed Hilbert polynomial are parametrized by a Hilbert scheme. We classify the smooth ones. We identify numerical conditions on a polynomial that completely determine when the Hilbert scheme is smooth. We also reinterpret these smooth Hilbert schemes as generalized partial flag varieties and describe the subschemes being parametrized."} {"_id": [43], "label": "cs.DB", "text": "Dash Scalable Hashing on Persistent Memory. Byte addressable persistent memory (PM) brings hash tables the potential of low latency, cheap persistence and instant recovery. The recent advent of Intel Optane DC Persistent Memory Modules (DCPMM) further accelerates this trend. Many new hash table designs have been proposed, but most of them were based on emulation and perform sub optimally on real PM. They were also piece wise and partial solutions that side step many important properties, in particular good scalability, high load factor and instant recovery. We present Dash, a holistic approach to building dynamic and scalable hash tables on real PM hardware with all the aforementioned properties. Based on Dash, we adapted two popular dynamic hashing schemes (extendible hashing and linear hashing). On a 24 core machine with Intel Optane DCPMM, we show that compared to state of the art, Dash enabled hash tables can achieve up to 3.9X higher performance with up to over 90 load factor and an instant recovery time of 57ms regardless of data size."} {"_id": [69], "label": "math.QA", "text": "Twisting finite dimensional modules for the q Onsager algebra mathcal O q via the Lusztig automorphism. The q Onsager algebra mathcal O q is defined by two generators A , A and two relations, called the q Dolan Grady relations. Recently P. Baseilhac and S. Kolb found an automorphism L of mathcal O q , that fixes A and sends A to a linear combination of A , A 2A , AA A , A A 2 . Let V denote an irreducible mathcal O q module of finite dimension at least two, on which each of A , A is diagonalizable. It is known that A , A act on V as a tridiagonal pair of q Racah type, giving access to four familiar elements K , B , K downarrow , B downarrow in rm End (V) that are used to compare the eigenspace decompositions for A , A on V . We display an invertible H in rm End (V) such that L(X) H 1 X H on V for all X in mathcal O q . We describe what happens when one of K , B , K downarrow , B downarrow is conjugated by H . For example H 1 KH a 1 A a 2 K 1 where a is a certain scalar that is used to describe the eigenvalues of A on V . We use the conjugation results to compare the eigenspace decompositions for A , A , L pm 1 (A ) on V . In this comparison we use the notion of an equitable triple this is a 3 tuple of elements in rm End (V) such that any two satisfy a q Weyl relation. Our comparison involves eight equitable triples. One of them is a A a 2 K , M 1 , K where M (a K a 1 B)(a a 1 ) 1 . The map M appears in earlier work of S. Bockting Conrad concerning the double lowering operator psi of a tridiagonal pair."} {"_id": [77, 23], "label": "math.FA math.LO", "text": "Intersections of ell p spaces in the Borel hierarchy. We show that if Y is one of the spaces ell q , c 0 , ell infty or textstyle bigcap p b ell p where 0 q,b infty , and the Fr ' e chet space textstyle bigcap p a ell p is contained in Y properly, then textstyle bigcap p a ell p first shows up in the Borel hierarchy of Y at the multiplicative class of the third level. In particular textstyle bigcap p a ell p is neither an F sigma nor a G delta subset of Y . This answers a question by Nestoridis. This result provides a natural example of a set in the third level of the Borel hierarchy and with its help we also give some examples in the fourth level."} {"_id": [32, 17, 41], "label": "cs.DC cs.DS cs.RO", "text": "Dispersion of Mobile Robots in the Global Communication Model. The dispersion problem on graphs asks k leq n robots placed initially arbitrarily on the nodes of an n node anonymous graph to reposition autonomously to reach a configuration in which each robot is on a distinct node of the graph. This problem is of significant interest due to its relationship to other fundamental robot coordination problems, such as exploration, scattering, load balancing etc. In this paper, we consider dispersion in the em global communication model where a robot can communicate with any other robot in the graph (but the graph is unknown to robots). We provide three novel deterministic algorithms, two for arbitrary graphs and one for arbitrary trees, in a synchronous setting where all robots perform their actions in every time step. For arbitrary graphs, our first algorithm is based on a DFS traversal and guarantees O( min(m,k Delta)) steps runtime using Theta( log ( max(k, Delta))) bits at each robot, where m is the number of edges and Delta is the maximum degree of the graph. The second algorithm for arbitrary graphs is based on a BFS traversal and guarantees O( max(D,k) Delta (D Delta)) steps runtime using O( max(D, Delta log k)) bits at each robot, where D is the diameter of the graph. The algorithm for arbitrary trees is also based on a BFS travesal and guarantees O(D max(D,k)) steps runtime using O( max(D, Delta log k)) bits at each robot. Our results are significant improvements compared to the existing results established in the em local communication model where a robot can communication only with other robots present at the same node. Particularly, the DFS based algorithm is optimal for both memory and time in constant degree arbitrary graphs. The BFS based algorithm for arbitrary trees is optimal with respect to runtime when k leq O(D) ."} {"_id": [1, 7], "label": "physics.comp-ph cs.LG", "text": "Online Change Point Detection in Molecular Dynamics With Optical Random Features. Proteins are made of atoms constantly fluctuating, but can occasionally undergo large scale changes. Such transitions are of biological interest, linking the structure of a protein to its function with a cell. Atomic level simulations, such as Molecular Dynamics (MD), are used to study these events. However, molecular dynamics simulations produce time series with multiple observables, while changes often only affect a few of them. Therefore, detecting conformational changes has proven to be challenging for most change point detection algorithms. In this work, we focus on the identification of such events given many noisy observables. In particular, we show that the No prior Knowledge Exponential Weighted Moving Average (NEWMA) algorithm can be used along optical hardware to successfully identify these changes in real time. Our method does not need to distinguish between the background of a protein and the protein itself. For larger simulations, it is faster than using traditional silicon hardware and has a lower memory footprint. This technique may enhance the sampling of the conformational space of molecules. It may also be used to detect change points in other sequential data with a large number of features."} {"_id": [2], "label": "cs.AI", "text": "Temporarily Unavailable Memory Inhibition in Cognitive and Computer Science. Inhibition is one of the core concepts in Cognitive Psychology. The idea of inhibitory mechanisms actively weakening representations in the human mind has inspired a great number of studies in various research domains. In contrast, Computer Science only recently has begun to consider inhibition as a second basic processing quality beside activation. Here, we review psychological research on inhibition in memory and link the gained insights with the current efforts in Computer Science of incorporating inhibitory principles for optimizing information retrieval in Personal Information Management. Four common aspects guide this review in both domains 1. The purpose of inhibition to increase processing efficiency. 2. Its relation to activation. 3. Its links to contexts. 4. Its temporariness. In summary, the concept of inhibition has been used by Computer Science for enhancing software in various ways already. Yet, we also identify areas for promising future developments of inhibitory mechanisms, particularly context inhibition."} {"_id": [26, 47], "label": "math.RT math.AT", "text": "Interleavings and Matchings as Representations. In order to better understand and to compare interleavings between persistence modules, we elaborate on the algebraic structure of interleavings in general settings. In particular, we provide a representation theoretic framework for interleavings, showing that the category of interleavings under a fixed translation is isomorphic to the representation category of what we call a shoelace. Using our framework, we show that any two interleavings of the same pair of persistence modules are themselves interleaved. Furthermore, in the special case of persistence modules over mathbb Z , we show that matchings between barcodes correspond to the interval decomposable interleavings."} {"_id": [57, 19], "label": "cs.CR cs.PL", "text": "Specifying a Cryptographical Protocol in Lustre and SCADE. We present SCADE and Lustre models of the Message Authenticator Algorithm (MAA), which is one of the first cryptographic functions for computing a message authentication code. The MAA was adopted between 1987 and 2001, in international standards (ISO 8730 and ISO 8731 2), to ensure the authenticity and integrity of banking transactions. This paper discusses the choices and the challenges of our MAA implementations. Our SCADE and Lustre models validate 201 official test vectors for the MAA."} {"_id": [21], "label": "math.CO", "text": "lambda quiddit 'e sur mathbb Z alpha avec alpha transcendant. As part of the study of Coxeter's friezes, M. Cuntz introduced the notion of irreducible lambda quiddity cycle. The objective of this note is to list all the irreducible lambda quiddity cycles on the ring mathbb Z alpha with alpha a transcendent complex number. Dans le cadre de l' 'etude des frises de Coxeter, M.Cuntz a introduit la notion de lambda quiddit 'e irr 'eductible. L'objectif de cette note est de lister toutes les lambda quiddit 'es irr 'eductibles sur l'anneau mathbb Z alpha dans le cas o u alpha est un nombre complexe transcendant."} {"_id": [1, 3, 39], "label": "cs.CL cs.CY cs.LG", "text": "Identifying Automatically Generated Headlines using Transformers. False information spread via the internet and social media influences public opinion and user activity, while generative models enable fake content to be generated faster and more cheaply than had previously been possible. In the not so distant future, identifying fake content generated by deep learning models will play a key role in protecting users from misinformation. To this end, a dataset containing human and computer generated headlines was created and a user study indicated that humans were only able to identify the fake headlines in 47.8 of the cases. However, the most accurate automatic approach, transformers, achieved an overall accuracy of 85.7 , indicating that content generated from language models can be filtered out accurately."} {"_id": [0], "label": "cs.CV", "text": "Clustered Multitask Nonnegative Matrix Factorization for Spectral Unmixing of Hyperspectral Data. In this paper, the new algorithm based on clustered multitask network is proposed to solve spectral unmixing problem in hyperspectral imagery. In the proposed algorithm, the clustered network is employed. Each pixel in the hyperspectral image considered as a node in this network. The nodes in the network are clustered using the fuzzy c means clustering method. Diffusion least mean square strategy has been used to optimize the proposed cost function. To evaluate the proposed method, experiments are conducted on synthetic and real datasets. Simulation results based on spectral angle distance, abundance angle distance and reconstruction error metrics illustrate the advantage of the proposed algorithm compared with other methods."} {"_id": [46], "label": "math.AG", "text": "On the Kodaira dimension of the moduli space of hyperelliptic curves with marked points. It is known that the moduli space overline mathcal H g,n of genus g stable hyperelliptic curves with n marked points is uniruled for n geq 4g 5 . In this paper we consider the complementary case and show that overline mathcal H g,n has non negative Kodaira dimension for n 4g 6 and is of general type for n geq 4g 7 . Important parts of our proof are the calculation of the canonical divisor and establishing that the singularities of overline mathcal H g,n do not establish adjunction conditions."} {"_id": [10, 93, 6], "label": "physics.flu-dyn physics.ao-ph physics.class-ph", "text": "Dispersive and non dispersive nonlinear long wave transformations Numerical and experimental results. The description of gravity waves propagating on the water surface is considered from a historical point of view, with specific emphasis on the development of a theoretical framework and equations of motion for long waves in shallow water. This provides the foundation for a subsequent discussion about tsunami wave propagation and run up on a sloping beach, and in particular the role of wave dispersion for this problem. Wave tank experiments show that wave dispersion can play a significant role for the propagation and wave transformation of wave signals that include some higher frequency components. However, the maximum run up height is less sensitive to dispersive effects, suggesting that run up height can be adequately calculated by use of non dispersive model equations."} {"_id": [34], "label": "math.CV", "text": "Complex and Quaternionic Cauchy formulas in Koch snowflakes. In this paper we derive a Cauchy integral formula for holomorphic and hyperholomorphic functions in domains bounded by a Koch snowflake in two and three dimensional setting."} {"_id": [34, 12], "label": "math.CV math.CA", "text": "The Cauchy Szeg H o Projection and its commutator for domains in mathbb C n with minimal smoothness Optimal bounds. Let D subset mathbb C n be a bounded, strongly pseudoconvex domain whose boundary bD satisfies the minimal regularity condition of class C 2 . A 2017 result of Lanzani and Stein states that the Cauchy Szeg H o projection mathcal S maps L p(bD, omega) to L p(bD, omega) continuously for any 1 p infty whenever the reference measure omega is a bounded, positive continuous multiple of induced Lebesgue measure. Here we show that mathcal S omega (defined with respect to any measure omega as above) satisfies explicit, optimal bounds in L p(bD, Omega p) , for any 1 p infty and for any Omega p in the maximal class of A p measures, that is Omega p psi p sigma where psi p is a Muckenhoupt A p weight and sigma is the induced Lebesgue measure. As an application, we characterize boundedness in L p(bD, Omega p) with explicit bounds , and compactness, of the commutator b, mathcal S omega for any A p measure Omega p , 1 p infty . We next introduce the notion of holomorphic Hardy spaces for A p measures, and we characterize boundedness and compactness in L 2(bD, Omega 2) of the commutator displaystyle b, mathcal S Omega 2 where mathcal S Omega 2 is the Cauchy Szeg H o projection defined with respect to any given A 2 measure Omega 2 . Earlier results rely upon an asymptotic expansion and subsequent pointwise estimates of the Cauchy Szeg H o kernel, but these are unavailable in our setting of minimal regularity of bD at the same time, recent techniques in Lanzani Stein 2017 that allow to handle domains with minimal regularity are not applicable to A p measures. It turns out that the method of quantitative extrapolation is an appropriate replacement for the missing tools."} {"_id": [0, 49, 1, 41], "label": "math.OC cs.CV cs.LG cs.RO", "text": "Nonparametric Continuous Sensor Registration. This paper develops a new mathematical framework that enables nonparametric joint semantic and geometric representation of continuous functions using data. The joint embedding is modeled by representing the processes in a reproducing kernel Hilbert space. The functions can be defined on arbitrary smooth manifolds where the action of a Lie group aligns them. The continuous functions allow the registration to be independent of a specific signal resolution. The framework is fully analytical with a closed form derivation of the Riemannian gradient and Hessian. We study a more specialized but widely used case where the Lie group acts on functions isometrically. We solve the problem by maximizing the inner product between two functions defined over data, while the continuous action of the rigid body motion Lie group is captured through the integration of the flow in the corresponding Lie algebra. Low dimensional cases are derived with numerical examples to show the generality of the proposed framework. The high dimensional derivation for the special Euclidean group acting on the Euclidean space showcases the point cloud registration and bird's eye view map registration abilities. An implementation of this framework for RGB D cameras outperforms the state of the art robust visual odometry and performs well in texture and structure scarce environments."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "DAG Net Double Attentive Graph Neural Network for Trajectory Forecasting. Understanding human motion behaviour is a critical task for several possible applications like self driving cars or social robots, and in general for all those settings where an autonomous agent has to navigate inside a human centric environment. This is non trivial because human motion is inherently multi modal given a history of human motion paths, there are many plausible ways by which people could move in the future. Additionally, people activities are often driven by goals, e.g. reaching particular locations or interacting with the environment. We address the aforementioned aspects by proposing a new recurrent generative model that considers both single agents' future goals and interactions between different agents. The model exploits a double attention based graph neural network to collect information about the mutual influences among different agents and to integrate it with data about agents' possible future objectives. Our proposal is general enough to be applied to different scenarios the model achieves state of the art results in both urban environments and also in sports applications."} {"_id": [50, 39], "label": "cs.CY physics.med-ph", "text": "Pain and Physical Activity Association in Critically Ill Patients. Critical care patients experience varying levels of pain during their stay in the intensive care unit, often requiring administration of analgesics and sedation. Such medications generally exacerbate the already sedentary physical activity profiles of critical care patients, contributing to delayed recovery. Thus, it is important not only to minimize pain levels, but also to optimize analgesic strategies in order to maximize mobility and activity of ICU patients. Currently, we lack an understanding of the relation between pain and physical activity on a granular level. In this study, we examined the relationship between nurse assessed pain scores and physical activity as measured using a wearable accelerometer device. We found that average, standard deviation, and maximum physical activity counts are significantly higher before high pain reports compared to before low pain reports during both daytime and nighttime, while percentage of time spent immobile was not significantly different between the two pain report groups. Clusters detected among patients using extracted physical activity features were significant in adjusted logistic regression analysis for prediction of pain report group."} {"_id": [65, 17], "label": "cs.DC cs.NI", "text": "Windowed Backoff Algorithms for WiFi Theory and Performance under Batched Arrivals. Binary exponential backoff (BEB) is a decades old algorithm for coordinating access to a shared channel. In modern networks, BEB plays an important role in WiFi (IEEE 802.11) and other wireless communication standards. Despite this track record, well known theoretical results indicate that under bursty traffic BEB yields poor makespan, and superior algorithms are possible. To date, the degree to which these findings impact performance in wireless networks has not been examined. To address this issue, we investigate one of the strongest cases against BEB a single burst batch of packets that simultaneously contend for access to a wireless channel. Using Network Simulator 3, we incorporate into IEEE 802.11g several newer algorithms that, while inspired by BEB, possess makespan guarantees that are theoretically superior. Surprisingly, we discover that these newer algorithms underperform BEB. Investigating further, we identify as the culprit a common abstraction regarding the cost of collisions. Our experimental results are complemented by analytical arguments that the number of collisions and not solely makespan is an important metric to optimize. We argue that these findings have implications for the design of backoff algorithms in wireless networks."} {"_id": [0], "label": "cs.CV", "text": "An Exploration of Target Conditioned Segmentation Methods for Visual Object Trackers. Visual object tracking is the problem of predicting a target object's state in a video. Generally, bounding boxes have been used to represent states, and a surge of effort has been spent by the community to produce efficient causal algorithms capable of locating targets with such representations. As the field is moving towards binary segmentation masks to define objects more precisely, in this paper we propose to extensively explore target conditioned segmentation methods available in the computer vision community, in order to transform any bounding box tracker into a segmentation tracker. Our analysis shows that such methods allow trackers to compete with recently proposed segmentation trackers, while performing quasi real time."} {"_id": [46], "label": "math.AG", "text": "Curves of maximal moduli on K3 surfaces. We prove that if X is a complex projective K3 surface and g 0 , then there exist infinitely many families of curves of geometric genus g on X with maximal, i.e., g dimensional, variation in moduli. In particular every K3 surface contains a curve of geometric genus 1 which moves in a non isotrivial family. This implies a conjecture of Huybrechts on constant cycle curves and gives an algebro geometric proof of a theorem of Kobayashi that a K3 surface has no global symmetric differential forms."} {"_id": [13], "label": "math.DS", "text": "Global dynamics of a competition diffusion system and application to a modified Leslie Gower model. We investigate the global dynamics of a special case of the classical Lotka Volterra competition diffusion system in spatially heterogeneous environment. This model indicates that the evolution of the density of the predator is independent of the density of the prey. Based on the principal spectral theory and the dynamics of the classical single species logistic model, we obtain the global dynamics of this competition diffusion system. As an application, under some suitable conditions we use the obtained results to prove the global stability of steady states and the persistence of the two species in a modified Leslie Gower model with diffusion in heterogeneous environment."} {"_id": [49], "label": "math.OC", "text": "Linearly Convergent Gradient Free Methods for Minimization of Parabolic Approximation. Finding the global minimum of non convex functions is one of the main and most difficult problems in modern optimization. In the first part of the paper, we consider a certain class of \"good\" non convex functions that can be bounded above and below by a parabolic function. We show that using only the zeroth order oracle, one can obtain the linear speed log left( frac 1 varepsilon right) of finding the global minimum on a cube. The second part of the paper looks at the nonconvex problem in a slightly different way. We assume that minimizing the quadratic function, but at the same time we have access to a zeroth order oracle with noise and this noise is proportional to the distance to the solution. Dealing with such noise assumptions for gradient free methods is new in the literature. We show that here it is also possible to achieve the linear rate of convergence."} {"_id": [81], "label": "cs.MS", "text": "Compressed Basis GMRES on High Performance GPUs. Krylov methods provide a fast and highly parallel numerical tool for the iterative solution of many large scale sparse linear systems. To a large extent, the performance of practical realizations of these methods is constrained by the communication bandwidth in all current computer architectures, motivating the recent investigation of sophisticated techniques to avoid, reduce, and or hide the message passing costs (in distributed platforms) and the memory accesses (in all architectures). This paper introduces a new communication reduction strategy for the (Krylov) GMRES solver that advocates for decoupling the storage format (i.e., the data representation in memory) of the orthogonal basis from the arithmetic precision that is employed during the operations with that basis. Given that the execution time of the GMRES solver is largely determined by the memory access, the datatype transforms can be mostly hidden, resulting in the acceleration of the iterative step via a lower volume of bits being retrieved from memory. Together with the special properties of the orthonormal basis (whose elements are all bounded by 1), this paves the road toward the aggressive customization of the storage format, which includes some floating point as well as fixed point formats with little impact on the convergence of the iterative process. We develop a high performance implementation of the \"compressed basis GMRES\" solver in the Ginkgo sparse linear algebra library and using a large set of test problems from the SuiteSparse matrix collection we demonstrate robustness and performance advantages on a modern NVIDIA V100 GPU of up to 50 over the standard GMRES solver that stores all data in IEEE double precision."} {"_id": [49], "label": "math.OC", "text": "The multi port berth allocation problem with speed optimization Exact methods and a cooperative game analysis. We consider a variant of the berth allocation problem i.e., the multi port berth allocation problem aimed at assigning berthing times and positions to vessels in container terminals. This variant involves optimizing vessel travel speeds between multiple ports, thereby exploiting the potentials of a collaboration between carriers (shipping lines) and terminal operators. Using a graph representation of the problem, we reformulate an existing mixed integer problem into a generalized set partitioning problem, in which each variable refers to a sequence of feasible berths in the ports that the vessel visits. By integrating column generation and cut separation in a branch and cut and price procedure, our proposed method is able to outperform commercial solvers in a set of benchmark instances and adapt better to larger instances. In addition, we apply cooperative game theory methods to efficiently distribute the savings resulting from a potential collaboration and show that both carriers and terminal operators would benefit from collaborating."} {"_id": [42], "label": "math.DG", "text": "How to construct all metric f K contact manifolds. We show that any compact metric f K contact, respectively S manifold is obtained from a compact K contact, respectively Sasakian manifold by an iteration of constructions of mapping tori, rotations, and type II deformations."} {"_id": [11], "label": "physics.app-ph", "text": "Transparent Metasurfaces Counteracting Fogging by Harnessing Sunlight. Surface fogging is a common phenomenon that can have significant and detrimental effects on surface transparency and visibility. It affects the performance in a wide range of applications including windows, windshields, electronic displays, cameras, mirrors, and eyewear. A host of ongoing research is aimed at combating this problem by understanding and developing stable and effective anti fogging coatings that are capable of handling a wide range of environmental challenges \"passively\" without consumption of electrical energy. Here we introduce an alternative approach employing sunlight to go beyond state of the art techniques such as superhydrophilic and superhydrophobic coatings by rationally engineering solar absorbing metasurfaces that maintain transparency, while upon illumination, induce localized heating to significantly delay the onset of surface fogging or decrease defogging time. For the same environmental conditions, we demonstrate that our metasurfaces are able to reduce defogging time by up to four fold and under supersaturated conditions inhibit the nucleation of condensate outperforming conventional state of the art approaches in terms of visibility retention. Our research illustrates a durable and environmentally sustainable approach to passive anti fogging and defogging for transparent surfaces. This work opens up the opportunity for large scale manufacturing that can be applied to a range of materials, including polymers and other flexible substrates."} {"_id": [46, 38], "label": "math.NT math.AG", "text": "Dwork crystals I. We present an elementary elaboration of Dwork's idea of explicit p adic limit formulas for zeta functions of toric hypersurfaces."} {"_id": [23], "label": "math.FA", "text": "Operator factorization of range space relations. Given two range space relations A and B in Hilbert spaces, we characterize the existence of a range space operator T such that A BT, respectively A TB."} {"_id": [15], "label": "cs.IT math.IT", "text": "Achieving Max Min Throughput in LoRa Networks. With growing popularity, LoRa networks are pivotally enabling Long Range connectivity to low cost and power constrained user equipments (UEs). Due to its wide coverage area, a critical issue is to effectively allocate wireless resources to support potentially massive UEs in the cell while resolving the prominent near far fairness problem for cell edge UEs, which is challenging to address due to the lack of tractable analytical model for the LoRa network and its practical requirement for low complexity and low overhead design. To achieve massive connectivity with fairness, we investigate the problem of maximizing the minimum throughput of all UEs in the LoRa network, by jointly designing high level policies of spreading factor (SF) allocation, power control, and duty cycle adjustment based only on average channel statistics and spatial UE distribution. By leveraging on the Poisson rain model along with tailored modifications to our considered LoRa network, we are able to account for channel fading, aggregate interference and accurate packet overlapping, and still obtain a tractable and yet accurate closed form formula for the packet success probability and hence throughput. We further propose an iterative balancing (IB) method to allocate the SFs in the cell such that the overall max min throughput can be achieved within the considered time period and cell area. Numerical results show that the proposed scheme with optimized design greatly alleviates the near far fairness issue, and significantly improves the cell edge throughput."} {"_id": [3], "label": "cs.CL", "text": "Capturing Global Informativeness in Open Domain Keyphrase Extraction. Open domain KeyPhrase Extraction (KPE) aims to extract keyphrases from documents without domain or quality restrictions, e.g., web pages with variant domains and qualities. Recently, neural methods have shown promising results in many KPE tasks due to their powerful capacity for modeling contextual semantics of the given documents. However, we empirically show that most neural KPE methods prefer to extract keyphrases with good phraseness, such as short and entity style n grams, instead of globally informative keyphrases from open domain documents. This paper presents JointKPE, an open domain KPE architecture built on pre trained language models, which can capture both local phraseness and global informativeness when extracting keyphrases. JointKPE learns to rank keyphrases by estimating their informativeness in the entire document and is jointly trained on the keyphrase chunking task to guarantee the phraseness of keyphrase candidates. Experiments on two large KPE datasets with diverse domains, OpenKP and KP20k, demonstrate the effectiveness of JointKPE on different pre trained variants in open domain scenarios. Further analyses reveal the significant advantages of JointKPE in predicting long and non entity keyphrases, which are challenging for previous neural KPE methods. Our code is publicly available at https github.com thunlp BERT KPE."} {"_id": [58], "label": "q-bio.NC", "text": "Implementing Inductive bias for different navigation tasks through diverse RNN attractors. Navigation is crucial for animal behavior and is assumed to require an internal representation of the external environment, termed a cognitive map. The precise form of this representation is often considered to be a metric representation of space. An internal representation, however, is judged by its contribution to performance on a given task, and may thus vary between different types of navigation tasks. Here we train a recurrent neural network that controls an agent performing several navigation tasks in a simple environment. To focus on internal representations, we split learning into a task agnostic pre training stage that modifies internal connectivity and a task specific Q learning stage that controls the network's output. We show that pre training shapes the attractor landscape of the networks, leading to either a continuous attractor, discrete attractors or a disordered state. These structures induce bias onto the Q Learning phase, leading to a performance pattern across the tasks corresponding to metric and topological regularities. By combining two types of networks in a modular structure, we could get better performance for both regularities. Our results show that, in recurrent networks, inductive bias takes the form of attractor landscapes which can be shaped by pre training and analyzed using dynamical systems methods. Furthermore, we demonstrate that non metric representations are useful for navigation tasks, and their combination with metric representation leads to flexibile multiple task learning."} {"_id": [3], "label": "cs.CL", "text": "Hierarchical Multi Task Natural Language Understanding for Cross domain Conversational AI HERMIT NLU. We present a new neural architecture for wide coverage Natural Language Understanding in Spoken Dialogue Systems. We develop a hierarchical multi task architecture, which delivers a multi layer representation of sentence meaning (i.e., Dialogue Acts and Frame like structures). The architecture is a hierarchy of self attention mechanisms and BiLSTM encoders followed by CRF tagging layers. We describe a variety of experiments, showing that our approach obtains promising results on a dataset annotated with Dialogue Acts and Frame Semantics. Moreover, we demonstrate its applicability to a different, publicly available NLU dataset annotated with domain specific intents and corresponding semantic roles, providing overall performance higher than state of the art tools such as RASA, Dialogflow, LUIS, and Watson. For example, we show an average 4.45 improvement in entity tagging F score over Rasa, Dialogflow and LUIS."} {"_id": [29], "label": "math.GR", "text": "A classification of the abelian minimal closed normal subgroups of locally compact second countable groups. We classify the locally compact second countable (l.c.s.c.) groups A that are abelian and topologically characteristically simple. All such groups A occur as the monolith of some soluble l.c.s.c. group G of derived length at most 3 with known exceptions (specifically, when A is mathbb Q n or its dual for some n in mathbb N ), we can take G to be compactly generated. This amounts to a classification of the possible isomorphism types of abelian chief factors of l.c.s.c. groups, which is of particular interest for the theory of compactly generated locally compact groups."} {"_id": [21, 37], "label": "cs.FL math.CO", "text": "The Intersection of 3 Maximal Submonids. Very little is known about the structure of the intersection of two k generated monoids of words, even for k 3 . Here we investigate the case of k maximal monoids, that is, monoids whose basis of cardinality k cannot be non trivially decomposed into at most k words. We characterize the intersection in the case of two 3 maximal monoids."} {"_id": [29, 46], "label": "math.GR math.AG", "text": "On geometry of some pseudo semisimple groups. Based on the work of Conrad Gabber Prasad, the paper deals with the geometry of particular pseudo semisimple groups, namely those which can be written as quotient of Weil restriction of semisimple groups. We establish that these groups are retract rational when their are split, and give results on their Picard groups."} {"_id": [1, 2, 3, 14], "label": "cs.CL cs.AI cs.HC cs.LG", "text": "Survey on Evaluation Methods for Dialogue Systems. In this paper we survey the methods and concepts developed for the evaluation of dialogue systems. Evaluation is a crucial part during the development process. Often, dialogue systems are evaluated by means of human evaluations and questionnaires. However, this tends to be very cost and time intensive. Thus, much work has been put into finding methods, which allow to reduce the involvement of human labour. In this survey, we present the main concepts and methods. For this, we differentiate between the various classes of dialogue systems (task oriented dialogue systems, conversational dialogue systems, and question answering dialogue systems). We cover each class by introducing the main technologies developed for the dialogue systems and then by presenting the evaluation methods regarding this class."} {"_id": [35], "label": "math.RA", "text": "A notion of rank for noncommutative quadratic forms on four generators. In this paper, we extend previous work, where a notion of rank, called mu rank, was proposed for noncommutative quadratic forms on two and three generators. In particular, we provide a definition of mu rank one and two for noncommutative quadratic forms on four generators."} {"_id": [15], "label": "cs.IT math.IT", "text": "Low Complexity Optimization of the Asymptotic Spectral Efficiency in Massive MIMO NOMA. Massive multiple input multiple output (MIMO) technology facilitates huge increases in the capacity of wireless channels, while non orthogonal multiple access (NOMA) addresses the problem of limited resources in traditional orthogonal multiple access (OMA) techniques, promising enhanced spectral efficiency. This work uses asymptotic capacity computation results to reduce the complexity of a power allocation algorithm for small scale MIMO NOMA, so that it may be applied for systems with massive MIMO arrays. The proposed method maximizes the sum capacity of the considered system, subject to power and performance constraints, and demonstrates greater accuracy than alternative approaches despite remaining low complexity for arbitrarily large antenna arrays."} {"_id": [34], "label": "math.CV", "text": "Criteria for univalence and quasiconformal extension for harmonic mappings on planar domains. If Omega is a simply connected domain in overline mathbb C then, according to the Ahlfors Gehring theorem, Omega is a quasidisk if and only if there exists a sufficient condition for the univalence of holomorphic functions in Omega in relation to the growth of their Schwarzian derivative. We extend this theorem to harmonic mappings by proving a univalence criterion on quasidisks. We also show that the mappings satisfying this criterion admit a homeomorphic extension to overline mathbb C and, under the additional assumption of quasiconformality in Omega , they admit a quasiconformal extension to overline mathbb C . The Ahlfors Gehring theorem has been extended to finitely connected domains Omega by Osgood, Beardon and Gehring, who showed that a Schwarzian criterion for univalence holds in Omega if and only if the components of partial Omega are either points or quasicircles. We generalize this theorem to harmonic mappings."} {"_id": [9], "label": "math.AP", "text": "A note about hardening free viscoelastic models in Maxwellian type rheologies at large strains. Maxwellian type rheological models of inelastic effects of creep type at large strains are revisited in relation to inelastic strain gradient theories. In particular, we observe that a dependence of the stored energy density on inelastic strain gradients may lead to spurious hardening effects, preventing the model from accommodating large inelastic slips. The main result of this paper is an alternative inelastic model of creep type, where higher order energy contribution is provided by the gradients of the elastic strain and of the plastic strain rate, thus preventing the onset of spurious hardening under large slips. The combination of Kelvin Voigt damping and Maxwellian creep results in a Jeffreys type rheological model. Existence of weak solutions is proved via a Faedo Galerkin approximation."} {"_id": [22], "label": "cs.SE", "text": "Building Confidence in Scientific Computing Software Via Assurance Cases. Assurance cases provide an organized and explicit argument for correctness. They can dramatically improve the certification of Scientific Computing Software (SCS). Assurance cases have already been effectively used for safety cases for real time systems. Their advantages for SCS include engaging domain experts, producing only necessary documentation, and providing evidence that can be verified replicated. This paper illustrates assurance cases for SCS through the correctness case for 3dfim , an existing Medical Imaging Application (MIA) for analyzing activity in the brain. This example was partly chosen because of recent concerns about the validity of fMRI (Functional Magnetic Resonance Imaging) studies. The example justifies the value of assurance cases for SCS, since the existing documentation is shown to have ambiguities and omissions, such as an incompletely defined ranking function and missing details on the coordinate system. A serious concern for 3dfim is identified running the software does not produce any warning about the necessity of using data that matches the parametric statistical model employed for the correlation calculations. Raising the bar for SCS in general, and MIA in particular, is both feasible and necessary when software impacts safety, an assurance case methodology (or an equivalently rigorous confidence building methodology) should be employed."} {"_id": [38, 21, 46], "label": "math.CO math.AG math.NT", "text": "The Elekes Szab ' o Problem and the Uniformity Conjecture. In this paper we give a conditional improvement to the Elekes Szab ' o problem over the rationals, assuming the Uniformity Conjecture. Our main result states that for F in mathbb Q x,y,z belonging to a particular family of polynomials, and any finite sets A, B, C subset mathbb Q with A B C n , we have Z(F) cap (A times B times C) ll n 2 frac 1 s . The value of the integer s is dependent on the polynomial F , but is always bounded by s leq 5 , and so even in the worst applicable case this gives a quantitative improvement on a bound of Raz, Sharir and de Zeeuw (arXiv 1504.05012). We give several applications to problems in discrete geometry and arithmetic combinatorics. For instance, for any set P subset mathbb Q 2 and any two points p 1,p 2 in mathbb Q 2 , we prove that at least one of the p i satisfies the bound p i p p in P gg P 3 5 , where cdot denotes Euclidean distance. This gives a conditional improvement to a result of Sharir and Solymosi (arXiv 1308.0814)."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Minimizing the Bag of Ngrams Difference for Non Autoregressive Neural Machine Translation. Non Autoregressive Neural Machine Translation (NAT) achieves significant decoding speedup through generating target words independently and simultaneously. However, in the context of non autoregressive translation, the word level cross entropy loss cannot model the target side sequential dependency properly, leading to its weak correlation with the translation quality. As a result, NAT tends to generate influent translations with over translation and under translation errors. In this paper, we propose to train NAT to minimize the Bag of Ngrams (BoN) difference between the model output and the reference sentence. The bag of ngrams training objective is differentiable and can be efficiently calculated, which encourages NAT to capture the target side sequential dependency and correlates well with the translation quality. We validate our approach on three translation tasks and show that our approach largely outperforms the NAT baseline by about 5.0 BLEU scores on WMT14 En leftrightarrow De and about 2.5 BLEU scores on WMT16 En leftrightarrow Ro."} {"_id": [18, 29], "label": "math.GT math.GR", "text": "Anosov representations, strongly convex cocompact groups and weak eigenvalue gaps. We provide characterizations of Anosov representations of word hyperbolic groups into real semisimple Lie groups in terms of equivariant limit maps, the Cartan property and the uniform gap summation property of cite GGKW . As an application we obtain a characterization of strongly convex cocompact subgroups of the projective linear group mathsf PGL (d, mathbb R ) . We also compute the H \"older exponent of the Anosov limit maps of an Anosov representation in terms of the Cartan and Lyapunov projection of the image."} {"_id": [8, 7], "label": "physics.optics physics.comp-ph", "text": "Controlling the Minimal Feature Sizes in Adjoint Optimization of Nanophotonic Devices Using B spline Surfaces. Adjoint optimization is an effective method in the inverse design of nanophotonic devices. In order to ensure the manufacturability, one would like to have control over the minimal feature sizes. Here we propose utilizing a level set method based on b spline surfaces in order to control the feature sizes. This approach is first used to design a wavelength demultiplexer. It is also used to implement a nanophotonic structure for artificial neural computing. In both cases, we show that the minimal feature sizes can be easily parameterized and controlled."} {"_id": [19], "label": "cs.CR", "text": "Non repudiable provenance for clinical decision support systems. Provenance templates are now a recognised methodology for the construction of data provenance records. Each template defines the provenance of a domain specific action in abstract form, which may then be instantiated as required by a single call to the provenance template service. As data reliability and trustworthiness becomes a critical issue in an increasing number of domains, there is a corresponding need to ensure that the provenance of that data is non repudiable. In this paper we contribute two new, complementary modules to our template model and implementation to produce non repudiable data provenance. The first, a module that traces the operation of the provenance template service itself, and records a provenance trace of the construction of an object level document, at the level of individual service calls. The second, a non repudiation module that generates evidence for the data recorded about each call, annotates the service trace accordingly, and submits a representation of that evidence to a provider agnostic notary service. We evaluate the applicability of our approach in the context of a clinical decision support system. We first define a policy to ensure the non repudiation of evidence with respect to a security threat analysis in order to demonstrate the suitability of our solution. We then select three use cases from within a particular system, Consult, with contrasting data provenance recording requirements and analyse the subsequent performance of our prototype implementation against three different notary providers."} {"_id": [8], "label": "physics.optics", "text": "Optimization of laser stabilization via self injection locking to WGM microresonator. Self injection locking is a dynamic phenomenon representing stabilization of the emission frequency of an oscillator with a passive cavity enabling frequency filtered coherent feedback to the oscillator cavity. For instance, self injection locking of a semiconductor laser to a high quality factor (high Q) whispering gallery mode (WGM) microresonator can result in multiple orders of magnitude reduction of the laser linewidth. The phenomenon was broadly studied in experiments, but its detailed theoretical model allowing improving the stabilization performance does not exist. In this paper we develop such a theory. We introduce five parameters identifying efficiency of the self injection locking in an experiment, comprising back scattering efficiency, phase delay between the laser and the high Q cavities, frequency detuning between the laser and the high Q cavities, the pump coupling efficiency, the optical path length between the laser and the microresonator. Our calculations show that the laser linewidth can be improved by two orders of magnitude compared with the case of not optimal self injection locking. We present recommendations on the experimental realization of the optimal self injection locking regime. The theoretical model provides deeper understanding of the self injection locking and benefits multiple practical applications of self injection locked oscillators."} {"_id": [65, 17, 2], "label": "cs.DC cs.AI cs.NI", "text": "Running Neural Networks on the NIC. In this paper we show that the data plane of commodity programmable (Network Interface Cards) NICs can run neural network inference tasks required by packet monitoring applications, with low overhead. This is particularly important as the data transfer costs to the host system and dedicated machine learning accelerators, e.g., GPUs, can be more expensive than the processing task itself. We design and implement our system N3IC on two different NICs and we show that it can greatly benefit three different network monitoring use cases that require machine learning inference as first class primitive. N3IC can perform inference for millions of network flows per second, while forwarding traffic at 40Gb s. Compared to an equivalent solution implemented on a general purpose CPU, N3IC can provide 100x lower processing latency, with 1.5x increase in throughput."} {"_id": [17], "label": "cs.DC", "text": "Optimal Load Allocation for Coded Distributed Computation in Heterogeneous Clusters. Recently, coding has been a useful technique to mitigate the effect of stragglers in distributed computing. However, coding in this context has been mainly explored under the assumption of homogeneous workers, although the real world computing clusters can be often composed of heterogeneous workers that have different computing capabilities. The uniform load allocation without the awareness of heterogeneity possibly causes a significant loss in latency. In this paper, we suggest the optimal load allocation for coded distributed computing with heterogeneous workers. Specifically, we focus on the scenario that there exist workers having the same computing capability, which can be regarded as a group for analysis. We rely on the lower bound on the expected latency and obtain the optimal load allocation by showing that our proposed load allocation achieves the minimum of the lower bound for a sufficiently large number of workers. From numerical simulations, when assuming the group heterogeneity, our load allocation reduces the expected latency by orders of magnitude over the existing load allocation scheme."} {"_id": [16, 20], "label": "math.NA cs.NA q-bio.QM", "text": "Stability analysis for a new model of multispecies convection diffusion reaction in poroelastic tissue. We perform the linear stability analysis for a new model for poromechanical processes with inertia (formulated in mixed form using the solid deformation, fluid pressure, and total pressure) interacting with diffusing and reacting solutes convected in the medium. We find parameter regions that lead to spatio temporal instabilities of the coupled system. The mutual dependences between deformation and diffusive patterns are of substantial relevance in the study of morphoelastic changes in biomaterials. We provide a set of computational examples in 2D and 3D (related to brain mechanobiology) that can be used to form a better understanding on how, and up to which extent, the deformations of the porous structure dictate the generation and suppression of spatial patterning dynamics, also related to the onset of mechano chemical waves."} {"_id": [40], "label": "cs.IR", "text": "Personalized Attraction Enhanced Sponsored Search with Multi task Learning. We study a novel problem of sponsored search (SS) for E Commerce platforms how we can attract query users to click product advertisements (ads) by presenting them features of products that attract them. This not only benefits merchants and the platform, but also improves user experience. The problem is challenging due to the following reasons (1) We need to carefully manipulate the ad content without affecting user search experience. (2) It is difficult to obtain users' explicit feedback of their preference in product features. (3) Nowadays, a great portion of the search traffic in E Commerce platforms is from their mobile apps (e.g., nearly 90 in Taobao). The situation would get worse in the mobile setting due to limited space. We are focused on the mobile setting and propose to manipulate ad titles by adding a few selling point keywords (SPs) to attract query users. We model it as a personalized attractive SP prediction problem and carry out both large scale offline evaluation and online A B tests in Taobao. The contributions include (1) We explore various exhibition schemes of SPs. (2) We propose a surrogate of user explicit feedback for SP preference. (3) We also explore multi task learning and various additional features to boost the performance. A variant of our best model has already been deployed in Taobao, leading to a 2 increase in revenue per thousand impressions and an opt out rate of merchants less than 4 ."} {"_id": [24], "label": "math.MG", "text": "On Hodge Riemann relations for translation invariant valuations. The Alesker product turns the space of smooth translation invariant valuations on convex bodies into a commutative associative unital algebra, satisfying Poincar 'e duality and the hard Lefschetz theorem. In this article, a version of the Hodge Riemann relations for the Alesker algebra is conjectured, and the conjecture is proved in two particular situations for even valuations, and for 1 homogeneous valuations. The latter result is then used to deduce a special case of the Aleksandrov Fenchel inequality. Finally, mixed versions of the hard Lefschetz theorem and of the Hodge Riemann relations are conjectured, and it is shown that the Aleksandrov Fenchel inequality follows from the latter in its full generality."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Training Flexible Depth Model by Multi Task Learning for Neural Machine Translation. The standard neural machine translation model can only decode with the same depth configuration as training. Restricted by this feature, we have to deploy models of various sizes to maintain the same translation latency, because the hardware conditions on different terminal devices (e.g., mobile phones) may vary greatly. Such individual training leads to increased model maintenance costs and slower model iterations, especially for the industry. In this work, we propose to use multi task learning to train a flexible depth model that can adapt to different depth configurations during inference. Experimental results show that our approach can simultaneously support decoding in 24 depth configurations and is superior to the individual training and another flexible depth model training method LayerDrop."} {"_id": [1], "label": "cs.LG", "text": "Predicting Playa Inundation Using a Long Short Term Memory Neural Network. In the Great Plains, playas are critical wetland habitats for migratory birds and a source of recharge for the agriculturally important High Plains aquifer. The temporary wetlands exhibit complex hydrology, filling rapidly via local rain storms and then drying through evaporation and groundwater infiltration. Using a long short term memory (LSTM) neural network to account for these complex processes, we modeled playa inundation for 71,842 playas in the Great Plains from 1984 2018. At the level of individual playas, the model achieved an F1 score of 0.538 on a withheld test set, displaying the ability to predict complex inundation patterns. When averaging over all the playas in the entire region, the model is able to very closely track inundation trends, even during periods of drought. Our results demonstrate potential for using LSTMs to model complex hydrological dynamics. Our modeling approach could be used to model playa inundation into the future under different climate scenarios to better understand how wetland habitats and groundwater will be impacted by changing climate."} {"_id": [26, 13, 74, 29], "label": "math.GR math.DS math.OA math.RT", "text": "Stationary characters on lattices of semisimple Lie groups. We show that stationary characters on irreducible lattices Gamma G of higher rank connected semisimple Lie groups are conjugation invariant, that is, they are genuine characters. This result has several applications in representation theory, operator algebras, ergodic theory and topological dynamics. In particular, we show that for any such irreducible lattice Gamma G , the left regular representation lambda Gamma is weakly contained in any weakly mixing representation pi . We prove that for any such irreducible lattice Gamma G , any uniformly recurrent subgroup (URS) of Gamma is finite, answering a question of Glasner Weiss. We also obtain a new proof of Peterson's character rigidity result for irreducible lattices Gamma G . The main novelty of our paper is a structure theorem for stationary actions of lattices on von Neumann algebras."} {"_id": [72, 17], "label": "cs.DC cs.PF", "text": "AI Tax The Hidden Cost of AI Data Center Applications. Artificial intelligence and machine learning are experiencing widespread adoption in industry and academia. This has been driven by rapid advances in the applications and accuracy of AI through increasingly complex algorithms and models this, in turn, has spurred research into specialized hardware AI accelerators. Given the rapid pace of advances, it is easy to forget that they are often developed and evaluated in a vacuum without considering the full application environment. This paper emphasizes the need for a holistic, end to end analysis of AI workloads and reveals the \"AI tax.\" We deploy and characterize Face Recognition in an edge data center. The application is an AI centric edge video analytics application built using popular open source infrastructure and ML tools. Despite using state of the art AI and ML algorithms, the application relies heavily on pre and post processing code. As AI centric applications benefit from the acceleration promised by accelerators, we find they impose stresses on the hardware and software infrastructure storage and network bandwidth become major bottlenecks with increasing AI acceleration. By specializing for AI applications, we show that a purpose built edge data center can be designed for the stresses of accelerated AI at 15 lower TCO than one derived from homogeneous servers and infrastructure."} {"_id": [0, 1, 41], "label": "cs.CV cs.LG cs.RO", "text": "Hierarchical Kinematic Human Mesh Recovery. We consider the problem of estimating a parametric model of 3D human mesh from a single image. While there has been substantial recent progress in this area with direct regression of model parameters, these methods only implicitly exploit the human body kinematic structure, leading to sub optimal use of the model prior. In this work, we address this gap by proposing a new technique for regression of human parametric model that is explicitly informed by the known hierarchical structure, including joint interdependencies of the model. This results in a strong prior informed design of the regressor architecture and an associated hierarchical optimization that is flexible to be used in conjunction with the current standard frameworks for 3D human mesh recovery. We demonstrate these aspects by means of extensive experiments on standard benchmark datasets, showing how our proposed new design outperforms several existing and popular methods, establishing new state of the art results. By considering joint interdependencies, our method is equipped to infer joints even under data corruptions, which we demonstrate by conducting experiments under varying degrees of occlusion."} {"_id": [14], "label": "cs.HC", "text": "Exploring the Design Space of Aesthetics with the Repertory Grid Technique. By optimizing aesthetics, graph diagrams can be generated that are easier to read and understand. However, the challenge lies in identifying suitable aesthetics. We present a novel approach based on repertory grids to explore the design space of aesthetics systematically. We applied our approach with three independent groups of participants to systematically identify graph aesthetics. In all three cases, we were able to reproduce the aesthetics with positively evaluated influence on readability without any prior knowledge. We also applied our approach to two and three dimensional domain specific software visualizations to demonstrate its versatility. In this case, we were also able to acquire several aesthetics that are relevant for perceiving the visualization."} {"_id": [75, 38, 47], "label": "math.KT math.AT math.NT", "text": "The Galois action on symplectic K theory. We study a symplectic variant of algebraic K theory of the integers, which comes equipped with a canonical action of the absolute Galois group of mathbf Q . We compute this action explicitly. The representations we see are extensions of Tate twists mathbf Z p(2k 1) by a trivial representation, and we characterize them by a universal property among such extensions. The key tool in the proof is the theory of complex multiplication for abelian varieties."} {"_id": [6], "label": "physics.flu-dyn", "text": "On viscid inviscid interactions of a pair of bubbles rising near the wall. Series of experiments on turbulent bubbly channel flows observed bubble clusters near the wall which can change large scale flow structures. To gain insights into clustering mechanisms, we study the interaction of a pair of spherical bubbles rising in a vertical channel through combined experiments and modeling. Experimental imaging identifies that pairwise bubbles of 1.0 mm diameter take two preferred configurations depending on their mutual distance side by side positions for a short distance ( S 5 ) and nearly inline, oblique positions for a long distance ( S 5 ), where S is the mutual distance normalized by the bubble radius. In the model, we formulate the motions of pairwise bubbles rising at Re O(100) . Analytical drag and lift, and semi empirical, spatio temporal stochastic forcing are employed to represent the mean acceleration and the fluctuation due to turbulent agitation, respectively. The model is validated against the experiment through comparing Lagrangian statistics of the bubbles. Simulations using this model identify two distinct timescales of interaction dynamics which elucidate the preferred configurations. For pairs initially in line, the trailing bubble rapidly escapes from the viscous wake of the leading bubble to take the oblique position. Outside of the wake, the trailing bubble travels on a curve line path with a slower velocity driven by potential interaction and horizontally approaches the leading bubble to become side by side. Moreover, statistical analysis identifies that the combination of the wake and the agitation can significantly accelerate the side by side clustering of in line pairs. These results indicate positive contributions of liquid viscosity and turbulence to the formation of bubble clusters."} {"_id": [8], "label": "physics.optics", "text": "Observation of geometric phase for unpolarized and partially polarized light fields. Geometric phase, owing to its topological nature and properties of fault tolerance, plays an important role in devising real world applications in both classical and quantum domain. For classical systems, geometric phase has been observed and studied so far for fully polarized light only. Using an interferometric experiment we demonstrate, for the first time, the existence of Pancharatnam Berry phase for states covering all empty space inside the Poincar 'e sphere namely the unpolarized and partially polarized light fields. The observed geometric phase is found identical to its fully polarized counterpart in excellent agreement with the theoretical predictions."} {"_id": [0, 41, 1], "label": "cs.RO cs.CV cs.LG", "text": "Scene recognition based on DNN and game theory with its applications in human robot interaction. Scene recognition model based on the DNN and game theory with its applications in human robot interaction is proposed in this paper. The use of deep learning methods in the field of scene recognition is still in its infancy, but has become an important trend in the future. As the innovative idea of the paper, we propose the following novelties. (1) In this paper, the image registration problem is transformed into a problem of minimum energy in Markov Random Field to finalize the image pre processing task. Game theory is used to find the optimal. (2) We select neighboring homogeneous sample features and the neighboring heterogeneous sample features for the extracted sample features to build a triple and modify the traditional neural network to propose the novel DNN for scene understanding. (3) The robot control is well combined to guide the robot vision for multiple tasks. The experiment is then conducted to validate the overall performance."} {"_id": [49, 42], "label": "math.DG math.OC", "text": "A dynamical approach to the Sard problem in Carnot groups. We introduce a dynamical systems approach for the study of the Sard problem in sub Riemannian Carnot groups. We show that singular curves can be obtained by concatenating trajectories of suitable dynamical systems. As an applications, we positively answer the Sard problem in some classes of Carnot groups."} {"_id": [36], "label": "physics.chem-ph", "text": "The covalent radii derived from the first principle data. We present a collection of covalent radii for the elements H, B, C, N, O, F, Si, P, S, Cl, Ge, As, Se, Br, derived from the recently introduced systematic non empirical dataset of the covalent bond lengths. As the underlying bond lengths dataset was built basing on 26050 molecular geometries and bond graphs data obtained from quantum chemical calculations with almost no input of empirical data, the presented covalent radii can be referred to as the first principle ones. The obtained first principle covalent radii are in good agreement with their empirical counterparts available in the literature. The distributions of deviations between the sum of proposed radii and the true bond lengths are analyzed in details, with emphasis put on the role of the electron delocalization on the bond lengths. Corrections to the additive covalent radii model due to the difference in the elements electronegativities are derived for both Pauling and Mulliken electronegativity scales."} {"_id": [0], "label": "cs.CV", "text": "TubeTK Adopting Tubes to Track Multi Object in a One Step Training Model. Multi object tracking is a fundamental vision problem that has been studied for a long time. As deep learning brings excellent performances to object detection algorithms, Tracking by Detection (TBD) has become the mainstream tracking framework. Despite the success of TBD, this two step method is too complicated to train in an end to end manner and induces many challenges as well, such as insufficient exploration of video spatial temporal information, vulnerability when facing object occlusion, and excessive reliance on detection results. To address these challenges, we propose a concise end to end model TubeTK which only needs one step training by introducing the bounding tube\" to indicate temporal spatial locations of objects in a short video clip. TubeTK provides a novel direction of multi object tracking, and we demonstrate its potential to solve the above challenges without bells and whistles. We analyze the performance of TubeTK on several MOT benchmarks and provide empirical evidence to show that TubeTK has the ability to overcome occlusions to some extent without any ancillary technologies like Re ID. Compared with other methods that adopt private detection results, our one stage end to end model achieves state of the art performances even if it adopts no ready made detection results. We hope that the proposed TubeTK model can serve as a simple but strong alternative for video based MOT task. The code and models are available at https github.com BoPang1996 TubeTK."} {"_id": [13], "label": "math.DS", "text": "Prevalent uniqueness in ergodic optimisation. One of the fundamental results of ergodic optimisation asserts that for any dynamical system on a compact metric space X and for any Banach space of continuous real valued functions on X which embeds densely in C(X) there exists a residual set of functions in that Banach space for which the maximising measure is unique. We extend this result by showing that this residual set is additionally prevalent, answering a question of J. Bochi and Y. Zhang."} {"_id": [66], "label": "cs.CE", "text": "Essential Scattering Applications for Everyone. Overview. ESCAPE is a free python package and framework for creating applications for simulating and fitting of X ray and neutron scattering data with current support for specular reflectivity, polarized neutron reflectometry, high resolution X ray diffraction, small angle scattering with future support for off specular scattering from structured samples with complicated morphology. Utilizing current features of Jupyter project, it allows to create highly customized applications in the format of notebooks. These notebooks, being shared with other users, can be used directly or started as web applications with graphical user interface. This paper is a brief overview of the core and scattering packages providing description of the major features with code examples. The following features make ESCAPE different from other projects independent from scattering applications core, which provides access to models building blocks like parameters, variables, functors, data objects, models and optimizers support of arithmetic operations and algebraic expressions on parameters and functors, offering models with complex dependencies of parameters math module with standard mathematical functors and special functors which perform numerical integration over variable or parameter, supplying customization of intensity model simultaneous fit of several models, also for models with different dimensions. Check our web site https escape app.net for further information."} {"_id": [16, 1], "label": "q-bio.QM cs.LG", "text": "Single participant structural connectivity matrices lead to greater accuracy in classification of participants than function in autism in MRI. In this work, we introduce a technique of deriving symmetric connectivity matrices from regional histograms of grey matter volume estimated from T1 weighted MRIs. We then validated the technique by inputting the connectivity matrices into a convolutional neural network (CNN) to classify between participants with autism and age , motion , and intracranial volume matched controls from six different databases (29,288 total connectomes, mean age 30.72, range 0.42 78.00, including 1555 subjects with autism). We compared this method to similar classifications of the same participants using fMRI connectivity matrices as well as univariate estimates of grey matter volumes. We further applied graph theoretical metrics on output class activation maps to identify areas of the matrices that the CNN preferentially used to make the classification, focusing particularly on hubs. Our results gave AUROCs of 0.7298 (69.71 accuracy) when classifying by only structural connectivity, 0.6964 (67.72 accuracy) when classifying by only functional connectivity, and 0.7037 (66.43 accuracy) when classifying by univariate grey matter volumes. Combining structural and functional connectivities gave an AUROC of 0.7354 (69.40 accuracy). Graph analysis of class activation maps revealed no distinguishable network patterns for functional inputs, but did reveal localized differences between groups in bilateral Heschl's gyrus and upper vermis for structural connectivity. This work provides a simple means of feature extraction for inputting large numbers of structural MRIs into machine learning models."} {"_id": [41], "label": "cs.RO", "text": "Curating Long term Vector Maps. Autonomous service mobile robots need to consistently, accurately, and robustly localize in human environments despite changes to such environments over time. Episodic non Markov Localization addresses the challenge of localization in such changing environments by classifying observations as arising from Long Term, Short Term, or Dynamic Features. However, in order to do so, EnML relies on an estimate of the Long Term Vector Map (LTVM) that does not change over time. In this paper, we introduce a recursive algorithm to build and update the LTVM over time by reasoning about visibility constraints of objects observed over multiple robot deployments. We use a signed distance function (SDF) to filter out observations of short term and dynamic features from multiple deployments of the robot. The remaining long term observations are used to build a vector map by robust local linear regression. The uncertainty in the resulting LTVM is computed via Monte Carlo resampling the observations arising from long term features. By combining occupancy grid based SDF filtering of observations with continuous space regression of the filtered observations, our proposed approach builds, updates, and amends LTVMs over time, reasoning about all observations from all robot deployments in an environment. We present experimental results demonstrating the accuracy, robustness, and compact nature of the extracted LTVMs from several long term robot datasets."} {"_id": [0, 1, 19], "label": "cs.CR cs.CV cs.LG", "text": "Digital Passport A Novel Technological Strategy for Intellectual Property Protection of Convolutional Neural Networks. In order to prevent deep neural networks from being infringed by unauthorized parties, we propose a generic solution which embeds a designated digital passport into a network, and subsequently, either paralyzes the network functionalities for unauthorized usages or maintain its functionalities in the presence of a verified passport. Such a desired network behavior is successfully demonstrated in a number of implementation schemes, which provide reliable, preventive and timely protections against tens of thousands of fake passport deceptions. Extensive experiments also show that the deep neural network performance under unauthorized usages deteriorate significantly (e.g. with 33 to 82 reductions of CIFAR10 classification accuracies), while networks endorsed with valid passports remain intact."} {"_id": [38], "label": "math.NT", "text": "On odd deficient perfect numbers with four distinct prime divisors. For a positive integer n , let sigma(n) denote the sum of the positive divisors of n . Let d be a proper divisor of n . We call n a deficient perfect number if sigma(n) 2n d . In this paper, we show that the only odd deficient perfect number with four distinct prime divisors is 3 2 cdot 7 2 cdot 11 2 cdot 13 2 ."} {"_id": [77], "label": "math.LO", "text": "A microscopic approach to Souslin tree construction, Part II. In Part I of this series, we presented the microscopic approach to Souslin tree constructions, and argued that all known diamondsuit based constructions of Souslin trees with various additional properties may be rendered as applications of our approach. In this paper, we show that constructions following the same approach may be carried out even in the absence of diamondsuit . In particular, we obtain a new weak sufficient condition for the existence of Souslin trees at the level of a strongly inaccessible cardinal. We also present a new construction of a Souslin tree with an ascent path, thereby increasing the consistency strength of such a tree's nonexistence from a Mahlo cardinal to a weakly compact cardinal. Section 2 of this paper is targeted at newcomers with minimal background. It offers a comprehensive exposition of the subject of constructing Souslin trees and the challenges involved."} {"_id": [70], "label": "math.HO", "text": "Translation of Tschebotarow's \"The Problem of Resolvents and Critical Manifolds\". This is an English translation of \"The Problem of Resolvents and Critical Manifolds\" by Tschebotarow Chebotarev. In this article, Chebotarev explains his work on resolvent problems using critical manifolds. The current ideas of resolvent degree and essential dimension arose out of the resolvent problems Chebotarev addresses here. Original abstract by Chebotarev \"This paper is devoted to the study of the problem of resolvents, i.e., the problem of finding the resolvent by a given equation, whose coefficients depend on several independent parameters, the number of parameters in the coefficients being as small as possible. The author connects the problem to the study of critical manifolds in the space of equation parameters.\""} {"_id": [1, 19], "label": "cs.CR cs.LG", "text": "Improving Robustness to Model Inversion Attacks via Mutual Information Regularization. This paper studies defense mechanisms against model inversion (MI) attacks a type of privacy attacks aimed at inferring information about the training data distribution given the access to a target machine learning model. Existing defense mechanisms rely on model specific heuristics or noise injection. While being able to mitigate attacks, existing methods significantly hinder model performance. There remains a question of how to design a defense mechanism that is applicable to a variety of models and achieves better utility privacy tradeoff. In this paper, we propose the Mutual Information Regularization based Defense (MID) against MI attacks. The key idea is to limit the information about the model input contained in the prediction, thereby limiting the ability of an adversary to infer the private training attributes from the model prediction. Our defense principle is model agnostic and we present tractable approximations to the regularizer for linear regression, decision trees, and neural networks, which have been successfully attacked by prior work if not attached with any defenses. We present a formal study of MI attacks by devising a rigorous game based definition and quantifying the associated information leakage. Our theoretical analysis sheds light on the inefficacy of DP in defending against MI attacks, which has been empirically observed in several prior works. Our experiments demonstrate that MID leads to state of the art performance for a variety of MI attacks, target models and datasets."} {"_id": [87], "label": "physics.pop-ph", "text": "Human Mars Mission Architecture Plan to Settle the Red Planet with 1000 People. Exploration is one of the attentive endeavor to mankind and a strategy for evolution. We have been incessantly reconnoitering our planet and universe from Mesopotamian era to modern era. The progression of rocketry and planetary science in past century engendered a futuristic window to explore Mars which have been a source of inspiration to hundreds of astronomers and scientists. Globally, it invigorated space exploration agencies to make expedition for planetary exploration to Mars and Human Mars Missions. Scientists and engineers have portrayed numerous Human Mars Mission proposals and plans but currently the design reference mission 5.0 of NASA is the only mission under study. Here we propose a mission architecture for permanent Human Mars Settlement with 1000 peoples with multiple launch of sufficient cargoes and scientific instruments"} {"_id": [1, 19], "label": "cs.CR cs.LG", "text": "MacLeR Machine Learning based Run Time Hardware Trojan Detection in Resource Constrained IoT Edge Devices. Traditional learning based approaches for run time Hardware Trojan detection require complex and expensive on chip data acquisition frameworks and thus incur high area and power overhead. To address these challenges, we propose to leverage the power correlation between the executing instructions of a microprocessor to establish a machine learning based run time Hardware Trojan (HT) detection framework, called MacLeR. To reduce the overhead of data acquisition, we propose a single power port current acquisition block using current sensors in time division multiplexing, which increases accuracy while incurring reduced area overhead. We have implemented a practical solution by analyzing multiple HT benchmarks inserted in the RTL of a system on chip (SoC) consisting of four LEON3 processors integrated with other IPs like vga lcd, RSA, AES, Ethernet, and memory controllers. Our experimental results show that compared to state of the art HT detection techniques, MacLeR achieves 10 better HT detection accuracy (i.e., 96.256 ) while incurring a 7x reduction in area and power overhead (i.e., 0.025 of the area of the SoC and 0.07 of the power of the SoC). In addition, we also analyze the impact of process variation and aging on the extracted power profiles and the HT detection accuracy of MacLeR. Our analysis shows that variations in fine grained power profiles due to the HTs are significantly higher compared to the variations in fine grained power profiles caused by the process variations (PV) and aging effects. Moreover, our analysis demonstrates that, on average, the HT detection accuracy drop in MacLeR is less than 1 and 9 when considering only PV and PV with worst case aging, respectively, which is 10x less than in the case of the state of the art ML based HT detection technique."} {"_id": [18, 29], "label": "math.GT math.GR", "text": "Mapping classes are almost determined by their finite quotient actions. Given any connected compact orientable surface, a pair of mapping classes are said to be procongruently conjugate if they induce a conjugate pair of outer automophisms on the profinite completion of the fundamental group of the surface. For example, this occurs if they induce conjugate outer automorphisms on every characteristic finite quotient of the fundamental group. In this paper, it is shown that every procongruent conjugacy class of mapping classes, as a subset of the surface mapping class group, is the disjoint union of at most finitely many conjugacy classes of mapping classes. For any pseudo Anosov mapping class of a connected closed orientable surface, several topological features are confirmed to depend only on the procongurent conjugacy class of the mapping class, including the stretching factor, the topological type of the prong singularities, the transverse orientability of the invariant foliations, and the isomorphism type of the symplectic Floer homology."} {"_id": [21, 46], "label": "math.CO math.AG", "text": "Schubert polynomial analogues for degenerate involutions. We survey the recent study of involution Schubert polynomials and a modest generalization that we call degenerate involution Schubert polynomials. We cite several conditions when (degenerate) involution Schubert polynomials have simple factorization formulae. Such polynomials can be computed by traversing through chains in certain weak order posets, and we provide explicit descriptions of such chains in weak order for involutions and degenerate involutions. As an application, we give several examples of how certain multiplicity free sums of Schubert polynomials factor completely into very simple linear factors."} {"_id": [2, 3], "label": "cs.CL cs.AI", "text": "Reducing Unintended Identity Bias in Russian Hate Speech Detection. Toxicity has become a grave problem for many online communities and has been growing across many languages, including Russian. Hate speech creates an environment of intimidation, discrimination, and may even incite some real world violence. Both researchers and social platforms have been focused on developing models to detect toxicity in online communication for a while now. A common problem of these models is the presence of bias towards some words (e.g. woman, black, jew) that are not toxic, but serve as triggers for the classifier due to model caveats. In this paper, we describe our efforts towards classifying hate speech in Russian, and propose simple techniques of reducing unintended bias, such as generating training data with language models using terms and words related to protected identities as context and applying word dropout to such words."} {"_id": [13], "label": "math.DS", "text": "On the number of limit cycles bifurcating from the linear center with an algebraic switching curve. This paper studies the family of piecewise linear differential systems in the plane with two pieces separated by a switching curve y x m , where m 1 is an arbitrary positive. By analysing the first order Melnikov function, we give an upper bound and an lower bound of the maximum number of limit cycles which bifurcate from the period annulus around the origin under polynomial perturbations of degree n . The results shows that the degree of switching curves affect the number of limit cycles."} {"_id": [22], "label": "cs.SE", "text": "Log based software monitoring a systematic mapping study. Modern software development and operations rely on monitoring to understand how systems behave in production. The data provided by application logs and runtime environment are essential to detect and diagnose undesired behavior and improve system reliability. However, despite the rich ecosystem around industry ready log solutions, monitoring complex systems and getting insights from log data remains a challenge. Researchers and practitioners have been actively working to address several challenges related to logs, e.g., how to effectively provide better tooling support for logging decisions to developers, how to effectively process and store log data, and how to extract insights from log data. A holistic view of the research effort on logging practices and automated log analysis is key to provide directions and disseminate the state of the art for technology transfer. In this paper, we study 108 papers (72 research track papers, 24 journals, and 12 industry track papers) from different communities (e.g., machine learning, software engineering, and systems) and structure the research field in light of the life cycle of log data. Our analysis shows that (1) logging is challenging not only in open source projects but also in industry, (2) machine learning is a promising approach to enable a contextual analysis of source code for log recommendation but further investigation is required to assess the usability of those tools in practice, (3) few studies approached efficient persistence of log data, and (4) there are open opportunities to analyze application logs and to evaluate state of the art log analysis techniques in a DevOps context."} {"_id": [56, 57, 68], "label": "cs.LO cs.DM cs.PL", "text": "A Constructive Formalization of the Weak Perfect Graph Theorem. The Perfect Graph Theorems are important results in graph theory describing the relationship between clique number omega(G) and chromatic number chi(G) of a graph G . A graph G is called emph perfect if chi(H) omega(H) for every induced subgraph H of G . The Strong Perfect Graph Theorem (SPGT) states that a graph is perfect if and only if it does not contain an odd hole (or an odd anti hole) as its induced subgraph. The Weak Perfect Graph Theorem (WPGT) states that a graph is perfect if and only if its complement is perfect. In this paper, we present a formal framework for working with finite simple graphs. We model finite simple graphs in the Coq Proof Assistant by representing its vertices as a finite set over a countably infinite domain. We argue that this approach provides a formal framework in which it is convenient to work with different types of graph constructions (or expansions) involved in the proof of the Lov ' a sz Replication Lemma (LRL), which is also the key result used in the proof of Weak Perfect Graph Theorem. Finally, we use this setting to develop a constructive formalization of the Weak Perfect Graph Theorem."} {"_id": [67], "label": "physics.atom-ph", "text": "Rapid production of defect free beryllium ion Coulomb crystals. Trapped atomic ions find wide applications ranging from precision measurement to quantum information science and quantum computing. Among the different atomic species employed, beryllium ions are widely used due to its light mass and convenient atomic structure. However, the ion loading process requires a high temperature for sufficient vapor pressure, generating undesirable gas load for the background vacuum and limiting the lifetime of a long ion chain. Here, we demonstrate a simple method to rapidly produce pure linear chains of beryllium ions with pulsed laser ablation, serving as a starting point for large scale quantum information processing. Our method is fast compared to thermal ovens reduces the vacuum load to only 10 ( 12) Torr level yields a short recovery time of a few seconds and also eliminates the need for a deep ultraviolet laser for photo ionization. In addition, we apply feedback control to obtain defect free ion arrays with desirable lengths."} {"_id": [63, 15], "label": "cs.IT cs.DL math.IT", "text": "Entropic Measures of Complexity in a New Medical Coding System. Background Transitioning from an old medical coding system to a new one can be challenging, especially when the two coding systems are significantly different. The US experienced such a transition in 2015. Objective This research aims to introduce entropic measures to help users prepare for the migration to a new medical coding system by identifying and focusing preparation initiatives on clinical concepts with more likelihood of transition challenges. Methods Two entropic measures of coding complexity are introduced. The first measure is a function of the variation in the alphabets of new codes. The second measure is based on the possible number of valid representations of an old code. Results A demonstration of how to implement the proposed techniques is carried out using the 2015 mappings between ICD 9 CM and ICD 10 CM PCS. The significance of the resulting entropic measures is discussed in the context of clinical concepts that were likely to pose challenges regarding documentation, coding errors, and longitudinal data comparisons. Conclusion The proposed entropic techniques are suitable to assess the complexity between any two medical coding systems where mappings or crosswalks exist. The more the entropy, the more likelihood of transition challenges. Users can utilize the suggested techniques as a guide to prioritize training efforts to improve documentation and increase the chances of accurate coding, code validity, and longitudinal data comparisons."} {"_id": [9], "label": "math.AP", "text": "On a class of singular nonlinear first order partial differential equations. In this paper, we consider a class of singular nonlinear first order partial differential equations t( partial u partial t) F(t,x,u, partial u partial x) with (t,x) in mathbb R times mathbb C under the assumption that F(t,x,z 1,z 2) is a function which is continuous in t and holomorphic in the other variables. Under suitable conditions, we determine all the solutions of this equation in a neighborhood of the origin."} {"_id": [58, 2], "label": "q-bio.NC cs.AI", "text": "A Neural Dynamic Model based on Activation Diffusion and a Micro Explanation for Cognitive Operations. The neural mechanism of memory has a very close relation with the problem of representation in artificial intelligence. In this paper a computational model was proposed to simulate the network of neurons in brain and how they process information. The model refers to morphological and electrophysiological characteristics of neural information processing, and is based on the assumption that neurons encode their firing sequence. The network structure, functions for neural encoding at different stages, the representation of stimuli in memory, and an algorithm to form a memory were presented. It also analyzed the stability and recall rate for learning and the capacity of memory. Because neural dynamic processes, one succeeding another, achieve a neuron level and coherent form by which information is represented and processed, it may facilitate examination of various branches of Artificial Intelligence, such as inference, problem solving, pattern recognition, natural language processing and learning. The processes of cognitive manipulation occurring in intelligent behavior have a consistent representation while all being modeled from the perspective of computational neuroscience. Thus, the dynamics of neurons make it possible to explain the inner mechanisms of different intelligent behaviors by a unified model of cognitive architecture at a micro level."} {"_id": [31], "label": "q-bio.PE", "text": "The ancient Operational Code is embedded in the amino acid substitution matrix and aaRS phylogenies. The underlying structure of the canonical amino acid substitution matrix (aaSM) is examined by considering stepwise improvements in the differential recognition of amino acids according to their chemical properties during the branching history of the two aminoacyl tRNA synthetase (aaRS) superfamilies. The evolutionary expansion of the genetic code is described by a simple parameterization of the aaSM, in which (i) the number of distinguishable amino acid types, (ii) the matrix dimension, and (iii) the number of parameters, each increases by one for each bifurcation in an aaRS phylogeny. Parameterized matrices corresponding to trees in which the size of an amino acid sidechain is the only discernible property behind its categorization as a substrate, exclusively for a Class I or II aaRS, provide a significantly better fit to empirically determined aaSM than trees with random bifurcation patterns. A second split between polar and nonpolar amino acids in each Class effects a vastly greater further improvement. The earliest Class separated epochs in the phylogenies of the aaRS reflect these enzymes' capability to distinguish tRNAs through the recognition of acceptor stem identity elements via the minor (Class I) and major (Class II) helical grooves, which is how the ancient Operational Code functioned. The advent of tRNA recognition using the anticodon loop supports the evolution of the optimal map of amino acid chemistry found in the later Genetic Code, an essentially digital categorization, in which polarity is the major functional property, compensating for the unrefined, haphazard differentiation of amino acids achieved by the Operational Code."} {"_id": [40, 1, 2, 3], "label": "cs.CL cs.AI cs.IR cs.LG", "text": "Efficient long distance relation extraction with DG SpanBERT. In natural language processing, relation extraction seeks to rationally understand unstructured text. Here, we propose a novel SpanBERT based graph convolutional network (DG SpanBERT) that extracts semantic features from a raw sentence using the pre trained language model SpanBERT and a graph convolutional network to pool latent features. Our DG SpanBERT model inherits the advantage of SpanBERT on learning rich lexical features from large scale corpus. It also has the ability to capture long range relations between entities due to the usage of GCN on dependency tree. The experimental results show that our model outperforms other existing dependency based and sequence based models and achieves a state of the art performance on the TACRED dataset."} {"_id": [26, 29], "label": "math.GR math.RT", "text": "A lower bound for the number of odd degree representations of a finite group. Let G be a finite group and P a Sylow 2 subgroup of G . We obtain both asymptotic and explicit bounds for the number of odd degree irreducible complex representations of G in terms of the size of the abelianization of P . To do so, we, on one hand, make use of the recent proof of the McKay conjecture for the prime 2 by Malle and Sp \" a th, and, on the other hand, prove lower bounds for the class number of the semidirect product of an odd order group acting on an abelian 2 group."} {"_id": [11, 6], "label": "physics.flu-dyn physics.app-ph", "text": "Enhancement of nucleate boiling by combining the effects of surface structure and mixed wettability A lattice Boltzmann study. The combination of microstructures and mixed wettability for enhancing nucleate boiling has attracted much attention in recent years. However, in the existing experimental and numerical studies, the tops of microstructures are entirely subjected to wettability modification, which makes the influences of mixed wettability dependant on the characteristic length of microstructures. In order to disclose the joint effects of surface structure and mixed wettability on nucleate boiling, in this work we propose an improved type of pillar textured surface with mixed wettability, in which the tops of square pillars are partially subjected to wettability modification. Numerical investigation of the boiling heat transfer performance on the improved mixed wettability surface is carried out using a three dimensional thermal multiphase lattice Boltzmann model. The numerical results show that the width of the wettability modified region plays an important role in the boiling performance of the improved mixed wettability surface and the best boiling performance is achieved in the situation that the width of the wettability modified region is sufficiently large but the bubble nucleated on the pillar top still does not interfere with the coalescence departure mechanism of the bubbles nucleated around the pillar, which optimizes the joint effects of surface structure and mixed wettability for enhancing nucleate boiling. The influences of the shape of the wettability modified region are also studied. Among the investigated shapes, the square is found to perform better than the other two shapes."} {"_id": [46], "label": "math.AG", "text": "Complex reflection groups and K3 surfaces I. We construct here many families of K3 surfaces that one can obtain as quotients of algebraic surfaces by some subgroups of the rank four complex reflection groups. We find in total 15 families with at worst ADE singularities. In particular we classify all the K3 surfaces that can be obtained as quotients by the derived subgroup of the previous complex reflection groups. We prove our results by using the geometry of the weighted projective spaces where these surfaces are embedded and the theory of Springer and Lehrer Springer on properties of complex reflection groups. This construction generalizes a previous construction by W. Barth and the second author."} {"_id": [49], "label": "math.OC", "text": "On the numerical solution of a time dependent shape optimization problem for the heat equation. This article is concerned with the solution of a time dependent shape identification problem. Specifically we consider the heat equation in a domain, which contains a time dependent inclusion of zero temperature. The objective is to detect this inclusion from the given temperature and heat flux at the exterior boundary of the domain. To this end, for a given temperature at the exterior boundary, the mismatch of the Neumann data is minimized. This time dependent shape optimization problem is then solved by a gradient based optimization method. Numerical results are presented which validate the present approach."} {"_id": [26], "label": "math.RT", "text": "On modular Harish Chandra series of finite unitary groups. In the modular representation theory of finite unitary groups when the characteristic ell of the ground field is a unitary prime, the hat mathfrak sl e crystal on level 2 Fock spaces graphically describes the Harish Chandra branching of unipotent representations restricted to the tower of unitary groups. However, how to determine the cuspidal support of an arbitrary unipotent representation has remained an open question. We show that for ell sufficiently large, the mathfrak sl infty crystal on the same level 2 Fock spaces provides the remaining piece of the puzzle for the full Harish Chandra branching rule."} {"_id": [48, 1, 2, 19], "label": "cs.CR cs.AI cs.CC cs.LG", "text": "Can Machine Learning Model with Static Features be Fooled an Adversarial Machine Learning Approach. The widespread adoption of smartphones dramatically increases the risk of attacks and the spread of mobile malware, especially on the Android platform. Machine learning based solutions have been already used as a tool to supersede signature based anti malware systems. However, malware authors leverage features from malicious and legitimate samples to estimate statistical difference in order to create adversarial examples. Hence, to evaluate the vulnerability of machine learning algorithms in malware detection, we propose five different attack scenarios to perturb malicious applications (apps). By doing this, the classification algorithm inappropriately fits the discriminant function on the set of data points, eventually yielding a higher misclassification rate. Further, to distinguish the adversarial examples from benign samples, we propose two defense mechanisms to counter attacks. To validate our attacks and solutions, we test our model on three different benchmark datasets. We also test our methods using various classifier algorithms and compare them with the state of the art data poisoning method using the Jacobian matrix. Promising results show that generated adversarial samples can evade detection with a very high probability. Additionally, evasive variants generated by our attack models when used to harden the developed anti malware system improves the detection rate up to 50 when using the Generative Adversarial Network (GAN) method."} {"_id": [0, 1, 2, 83], "label": "cs.CV cs.AI cs.LG cs.MM", "text": "Dependency aware Attention Control for Unconstrained Face Recognition with Image Sets. This paper targets the problem of image set based face verification and identification. Unlike traditional single media (an image or video) setting, we encounter a set of heterogeneous contents containing orderless images and videos. The importance of each image is usually considered either equal or based on their independent quality assessment. How to model the relationship of orderless images within a set remains a challenge. We address this problem by formulating it as a Markov Decision Process (MDP) in the latent space. Specifically, we first present a dependency aware attention control (DAC) network, which resorts to actor critic reinforcement learning for sequential attention decision of each image embedding to fully exploit the rich correlation cues among the unordered images. Moreover, we introduce its sample efficient variant with off policy experience replay to speed up the learning process. The pose guided representation scheme can further boost the performance at the extremes of the pose variation."} {"_id": [27], "label": "math.CT", "text": "Covariant Contravariant Homotopy Theories. Given a locally presentable category together with a suitable functorial cylinder object, we construct model structures which are sensitive to the direction' of the cylinder. We show that the Covariant and Contravariant model structures on simplicial sets as well as the coCartesian and Cartesian model structures on marked simplicial sets are examples of our formalism. In this setting, notions of final and initial maps and smooth and proper maps arise very naturally and we will identify these maps in the examples."} {"_id": [9], "label": "math.AP", "text": "Recent results for the Landau Lifshitz equation. We give a survey on some recent results concerning the Landau Lifshitz equation, a fundamental nonlinear PDE with a strong geometric content, describing the dynamics of the magnetization in ferromagnetic materials. We revisit the Cauchy problem for the anisotropic Landau Lifshitz equation, without dissipation, for smooth solutions, and also in the energy space in dimension one. We also examine two approximations of the Landau Lifshitz equation given by of the Sine Gordon equation and cubic Schr \"odinger equations, arising in certain singular limits of strong easy plane and easy axis anisotropy, respectively. Concerning localized solutions, we review the orbital and asymptotic stability problems for a sum of solitons in dimension one, exploiting the variational nature of the solitons in the hydrodynamical framework. Finally, we survey results concerning the existence, uniqueness and stability of self similar solutions (expanders and shrinkers) for the isotropic Landau Lifshitz equation with Gilbert term. Since expanders are associated with a singular initial condition with a jump discontinuity, we also review their well posedness in spaces linked to the BMO space."} {"_id": [8], "label": "physics.optics", "text": "On modifications of fundamental radiative processes in near zero index media of various dimensions. Spontaneous emission, stimulated emission and absorption are the three fundamental radiative processes describing light matter interactions. Here, we theoretically study the behaviour of these fundamental processes inside an unbounded medium exhibiting a vanishingly small refractive index, i.e., a near zero index (NZI) host medium. We present a generalized framework to study these processes and find that the spatial dimension of the NZI medium has profound effects on the nature of the fundamental radiative processes. Our formalism highlights the role of the number of available optical modes as well as the ability of an emitter to couple to these modes as a function of the dimension and the class of NZI media. We demonstrate that the fundamental radiative processes are inhibited in 3D homogeneous lossless zero index materials but may be strongly enhanced in a zero index medium of reduced dimensionality. Our findings have implications in thermal, nonlinear and quantum optics as well as in designing quantum metamaterials at optical or microwave frequencies."} {"_id": [38], "label": "math.NT", "text": "Numbers represented by restricted sums of four squares. In this paper, we prove some results of restricted sums of four squares using arithmetic of quaternions in the ring of Lipschitz integers. For example, we show that every nonnegative integer n can be written as x 2 y 2 z 2 t 2 where x,y,z,t are integers and x y 2z 2t is a square or a cube."} {"_id": [80, 1, 2], "label": "cs.LG cs.AI cs.SC", "text": "A Neuro Symbolic Method for Solving Differential and Functional Equations. When neural networks are used to solve differential equations, they usually produce solutions in the form of black box functions that are not directly mathematically interpretable. We introduce a method for generating symbolic expressions to solve differential equations while leveraging deep learning training methods. Unlike existing methods, our system does not require learning a language model over symbolic mathematics, making it scalable, compact, and easily adaptable for a variety of tasks and configurations. As part of the method, we propose a novel neural architecture for learning mathematical expressions to optimize a customizable objective. The system is designed to always return a valid symbolic formula, generating a useful approximation when an exact analytic solution to a differential equation is not or cannot be found. We demonstrate through examples how our method can be applied on a number of differential equations, often obtaining symbolic approximations that are useful or insightful. Furthermore, we show how the system can be effortlessly generalized to find symbolic solutions to other mathematical tasks, including integration and functional equations."} {"_id": [29], "label": "math.GR", "text": "Finite Permutation Groups with Few Orbits Under the Action on the Power Set. We study the orbits under the natural action of a permutation group G subseteq S n on the powerset mathscr P ( 1, dots , n ) . The permutation groups having exactly n 1 orbits on the powerset can be characterized as set transitive groups and were fully classified in cite BP55 . In this paper, we establish a general method that allows one to classify the permutation groups with n r set orbits for a given r , and apply it to integers 2 leq r leq 15 using the computer algebra system GAP."} {"_id": [0], "label": "cs.CV", "text": "Distribution Aware Coordinate Representation for Human Pose Estimation. While being the de facto standard coordinate representation in human pose estimation, heatmap is never systematically investigated in the literature, to our best knowledge. This work fills this gap by studying the coordinate representation with a particular focus on the heatmap. Interestingly, we found that the process of decoding the predicted heatmaps into the final joint coordinates in the original image space is surprisingly significant for human pose estimation performance, which nevertheless was not recognised before. In light of the discovered importance, we further probe the design limitations of the standard coordinate decoding method widely used by existing methods, and propose a more principled distribution aware decoding method. Meanwhile, we improve the standard coordinate encoding process (i.e. transforming ground truth coordinates to heatmaps) by generating accurate heatmap distributions for unbiased model training. Taking the two together, we formulate a novel Distribution Aware coordinate Representation of Keypoint (DARK) method. Serving as a model agnostic plug in, DARK significantly improves the performance of a variety of state of the art human pose estimation models. Extensive experiments show that DARK yields the best results on two common benchmarks, MPII and COCO, consistently validating the usefulness and effectiveness of our novel coordinate representation idea."} {"_id": [15], "label": "cs.IT math.IT", "text": "Sample Efficient Low Rank Phase Retrieval. This work studies the Low Rank Phase Retrieval (LRPR) problem recover an n times q rank r matrix X from y k A k top x k , k 1, 2,..., q , when each y k is an m length vector containing independent phaseless linear projections of x k . The different matrices A k are i.i.d. and each contains i.i.d. standard Gaussian entries. We obtain an improved guarantee for AltMinLowRaP, which is an Alternating Minimization solution to LRPR that was introduced and studied in our recent work. As long as the right singular vectors of X satisfy the incoherence assumption, we can show that the AltMinLowRaP estimate converges geometrically to X if the total number of measurements mq gtrsim nr 2 (r log(1 epsilon)) . In addition, we also need m gtrsim max(r, log q, log n) because of the specific asymmetric nature of our problem. Compared to our recent work, we improve the sample complexity of the AltMin iterations by a factor of r 2 , and that of the initialization by a factor of r . We also extend our result to the noisy case we prove stability to corruption by small additive noise."} {"_id": [26, 29], "label": "math.RT math.GR", "text": "On the little Weyl group of a real spherical space. In the present paper we further the study of the compression cone of a real spherical homogeneous space Z G H . In particular we provide a geometric construction of the little Weyl group of Z introduced recently by Knop and Kr \"otz. Our technique is based on a fine analysis of limits of conjugates of the subalgebra mathrm Lie (H) along one parameter subgroups in the Grassmannian of subspaces of mathrm Lie (G) . The little Weyl group is obtained as a finite reflection group generated by the reflections in the walls of the compression cone."} {"_id": [13, 71], "label": "math.SG math.DS", "text": "Reeb flows with small contact volume and large return time to a global section. We show that any co oriented closed contact manifold of dimension at least five admits a contact form such that the contact volume is arbitrarily small but the Reeb flow admits a global hypersurface of section with the property that the minimal period on the boundary of the hypersurface and the first return time in the interior of the hypersurface are bounded below. An immediate consequence of this statement is that every co oriented contact structure on any closed manifold admits a contact form with arbitrarily large systolic ratio. This generalizes the result of Abbondandolo et al. in dimension three to higher dimensions. The proof the main result is inductive and uses the result of Abbondandolo et al. on large systolic ratio in dimension three in its basis step. The essential construction in the proof relies on the Giroux correspondence in higher dimensions."} {"_id": [0, 1, 41], "label": "cs.CV cs.LG cs.RO", "text": "SSP Single Shot Future Trajectory Prediction. We propose a robust solution to future trajectory forecast, which can be practically applicable to autonomous agents in highly crowded environments. For this, three aspects are particularly addressed in this paper. First, we use composite fields to predict future locations of all road agents in a single shot, which results in a constant time complexity, regardless of the number of agents in the scene. Second, interactions between agents are modeled as a non local response, enabling spatial relationships between different locations to be captured temporally as well (i.e., in spatio temporal interactions). Third, the semantic context of the scene are modeled and take into account the environmental constraints that potentially influence the future motion. To this end, we validate the robustness of the proposed approach using the ETH, UCY, and SDD datasets and highlight its practical functionality compared to the current state of the art methods."} {"_id": [65, 17, 1], "label": "cs.DC cs.LG cs.NI", "text": "JSDoop and TensorFlow.js Volunteer Distributed Web Browser Based Neural Network Training. In 2019, around 57 of the population of the world has broadband access to the Internet. Moreover, there are 5.9 billion mobile broadband subscriptions, i.e., 1.3 subscriptions per user. So there is an enormous interconnected computational power held by users all around the world. Also, it is estimated that Internet users spend more than six and a half hours online every day. But in spite of being a great amount of time, those resources are idle most of the day. Therefore, taking advantage of them presents an interesting opportunity. In this study, we introduce JSDoop, a prototype implementation to profit from this opportunity. In particular, we propose a volunteer web browser based high performance computing library. JSdoop divides a problem into tasks and uses different queues to distribute the computation. Then, volunteers access the web page of the problem and start processing the tasks in their web browsers. We conducted a proof of concept using our proposal and TensorFlow.js to train a recurrent neural network that predicts text. We tested it in a computer cluster and with up to 32 volunteers. The experimental results show that training a neural network in distributed web browsers is feasible and accurate, has a high scalability, and it is an interesting area for research."} {"_id": [67], "label": "physics.atom-ph", "text": "Signatures of the orbital angular momentum of an infrared light beam in the two photon transition matrix element A step toward attosecond chronoscopy of photoionization. We present a theory of time resolved photoionisation in the presence of a vortex beam. In a pump probe setup, an extreme ultraviolet or an x ray pump pulse triggers ionization, which is probed by a synchronized infrared pulse with non zero orbital angular momentum. We show, how this property of the probe pulse affects the electron dynamics upon ionization, in a way that is independent of the initial and final angular momentum states of the ionizing system."} {"_id": [23], "label": "math.FA", "text": "Dilation in function spaces with general weights. In this paper, we present more regularity conditions which ensure the boundedness of dilation operators on Besov and Triebel Lizorkin spaces equiped with general weights."} {"_id": [76, 15], "label": "math.SP cs.IT math.IT", "text": "A New Proof of Hopf's Inequality Using a Complex Extension of the Hilbert Metric. It is well known from the Perron Frobenius theory that the spectral gap of a positive square matrix is positive. In this paper, we give a more quantitative characterization of the spectral gap. More specifically, using a complex extension of the Hilbert metric, we show that the so called spectral ratio of a positive square matrix is upper bounded by its Birkhoff contraction coefficient, which in turn yields a lower bound on its spectral gap."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Data Priming Network for Automatic Check Out. Automatic Check Out (ACO) receives increased interests in recent years. An important component of the ACO system is the visual item counting, which recognizes the categories and counts of the items chosen by the customers. However, the training of such a system is challenged by the domain adaptation problem, in which the training data are images from isolated items while the testing images are for collections of items. Existing methods solve this problem with data augmentation using synthesized images, but the image synthesis leads to unreal images that affect the training process. In this paper, we propose a new data priming method to solve the domain adaptation problem. Specifically, we first use pre augmentation data priming, in which we remove distracting background from the training images using the coarse to fine strategy and select images with realistic view angles by the pose pruning method. In the post augmentation step, we train a data priming network using detection and counting collaborative learning, and select more reliable images from testing data to fine tune the final visual item tallying network. Experiments on the large scale Retail Product Checkout (RPC) dataset demonstrate the superiority of the proposed method, i.e., we achieve 80.51 checkout accuracy compared with 56.68 of the baseline methods. The source codes can be found in https isrc.iscas.ac.cn gitlab research acm mm 2019 ACO."} {"_id": [26], "label": "math.RT", "text": "Abstract induced modules for reductive algebraic groups with Frobenius maps. Let bf G be a connected reductive algebraic group defined over a finite field mathbb F q of q elements, and bf B be a Borel subgroup of bf G defined over mathbb F q . Let Bbbk be a field and we assume that Bbbk bar mathbb F q when text char Bbbk text char mathbb F q . We show that the abstract induced module mathbb M ( theta) Bbbk bf G otimes Bbbk bf B theta (here Bbbk bf H is the group algebra of bf H over the field Bbbk and theta is a character of bf B over Bbbk ) has a composition series (of finite length) if text char Bbbk ne text char mathbb F q . In the case Bbbk bar mathbb F q and theta is a rational character, we give a necessary and sufficient condition for the existence of a composition series (of finite length) of mathbb M ( theta) . We determine all the composition factors whenever a composition series exists. Thus we obtain a large class of abstract infinite dimensional irreducible Bbbk bf G modules."} {"_id": [17], "label": "cs.DC", "text": "Work Stealing Simulator. We present in this paper a Work Stealing lightweight PYTHON simulator. Our simulator is used to execute an application (list of tasks with or without dependencies), on a multiple processors platform linked by specific topology. We first give an overview of the different variants of the work stealing algorithm, then we present the architecture of our light Work Stealing simulator. Its architecture facilitates the development of other types of applications and other topologies for interconnecting the processors. We present the use cases of the simulator and the different types of results."} {"_id": [49], "label": "math.OC", "text": "Time Fractional Optimal Control of Initial Value Problems on Time Scales. We investigate Optimal Control Problems (OCP) for fractional systems involving fractional time derivatives on time scales. The fractional time derivatives and integrals are considered, on time scales, in the Riemann Liouville sense. By using the Banach fixed point theorem, sufficient conditions for existence and uniqueness of solution to initial value problems described by fractional order differential equations on time scales are known. Here we consider a fractional OCP with a performance index given as a delta integral function of both state and control variables, with time evolving on an arbitrarily given time scale. Interpreting the Euler Lagrange first order optimality condition with an adjoint problem, defined by means of right Riemann Liouville fractional delta derivatives, we obtain an optimality system for the considered fractional OCP. For that, we first prove new fractional integration by parts formulas on time scales."} {"_id": [18], "label": "math.GT", "text": "Twisted Alexander polynomials of torus links. In this paper we give an explicit formula for the twisted Alexander polynomial of any torus link and show that it is a locally constant function on the SL(2, mathbb C) character variety. We also discuss similar things for the higher dimensional twisted Alexander polynomial and the Reidemeister torsion."} {"_id": [42], "label": "math.DG", "text": "Harmonic Gauss maps of submanifolds of arbitrary codimension of the Euclidean space and sphere and some applications. It is proved some results about existence and non existence of unit normal sections of submanifolds of the Euclidean space and sphere which associated Gauss maps are harmonic. Some applications to CMC hypersurfaces of the sphere and isoparametric submanifolds are obtained too."} {"_id": [28], "label": "cs.CG", "text": "Quadrilateral Mesh Generation II Meromorphic Quartic Differentials and Abel Jacobi Condition. This work discovers the equivalence relation between quadrilateral meshes and meromorphic quartic. Each quad mesh induces a conformal structure of the surface, and a meromorphic differential, where the configuration of singular vertices correspond to the configurations the poles and zeros (divisor) of the meroromorphic differential. Due to Riemann surface theory, the configuration of singularities of a quad mesh satisfies the Abel Jacobi condition. Inversely, if a satisfies the Abel Jacobi condition, then there exists a meromorphic quartic differential whose equals to the given one. Furthermore, if the meromorphic quadric differential is with finite, then it also induces a a quad mesh, the poles and zeros of the meromorphic differential to the singular vertices of the quad mesh. Besides the theoretic proofs, the computational algorithm for verification of Abel Jacobi condition is explained in details. Furthermore, constructive algorithm of meromorphic quartic differential on zero surfaces is proposed, which is based on the global algebraic representation of meromorphic. Our experimental results demonstrate the efficiency and efficacy of the algorithm. This opens up a direction for quad mesh generation using algebraic geometric approach."} {"_id": [47], "label": "math.AT", "text": "Mapping algebras and the Adams spectral sequence. The E 2 term of the Adams spectral sequence for mathbf Y may be described in terms of its cohomology E ast mathbf Y , together with the action of the primary operations E ast mathbf E on it, for ring spectra such as mathbf E mathbf H mathbb F p . We show how the higher terms of the spectral sequence can be similarly described in terms of the higher order truncated mathbf E mapping algebra for mathbf Y that is truncations of the function spectra operatorname Fun ( mathbf Y , mathbf M ) for various mathbf E modules mathbf M , equipped with the action of operatorname Fun ( mathbf M , mathbf M ') on them."} {"_id": [61, 30], "label": "q-fin.ST q-fin.TR", "text": "Comparing the market microstructure between two South African exchanges. We consider shared listings on two South African equity exchanges the Johannesburg Stock Exchange (JSE) and the A2X Exchange. A2X is an alternative exchange that provides for both shared listings and new listings within the financial market ecosystem of South Africa. From a science perspective it provides the opportunity to compare markets trading similar shares, in a similar regulatory and economic environment, but with vastly different liquidity, costs and business models. A2X currently has competitive settlement and transaction pricing when compared to the JSE, but the JSE has deeper liquidity. In pursuit of an empirical understanding of how these differences relate to their respective price response dynamics, we compare the distributions and auto correlations of returns on different time scales we compare price impact and master curves and we compare the cost of trading on each exchange. This allows us to empirically compare the two markets. We find that various stylised facts become similar as the measurement or sampling time scale increase. However, the same securities can have vastly different price responses irrespective of time scales. This is not surprising given the different liquidity and order book resilience. Here we demonstrate that direct costs dominate the cost of trading, and the importance of competitively positioning cost ceilings. Universality is crucial for being able to meaningfully compare cross exchange price responses, but in the case of A2X, it has yet to emerge in a meaningful way due to the infancy of the exchange making meaningful comparisons difficult."} {"_id": [25], "label": "math.PR", "text": "Integration by Parts and the KPZ Two Point Function. In this article we consider the KPZ fixed point starting from a two sided Brownian motion with an arbitrary diffusion coefficient. We apply the integration by parts formula from Malliavin calculus to establish a key relation between the two point (covariance) function of the spatial derivative process and the location of the maximum of an Airy process plus Brownian motion minus a parabola. Integration by parts also allows us to deduce the density of this location in terms of the second derivative of the variance of the KPZ fixed point. In the stationary regime, we find the same density related to limit fluctuations of a second class particle. We further develop an adaptation of Stein's method that implies asymptotic independence of the spatial derivative process from the initial data."} {"_id": [9, 12], "label": "math.CA math.AP", "text": "Mixed norm Strichartz type estimates for hypersurfaces in three dimensions. In their work IM16 I.A. Ikromov and D. M \" u ller proved the full range L p L 2 Fourier restriction estimates for a very general class of hypersurfaces in R 3 which includes the class of real analytic hypersurfaces. In this article we partly extend their results to the mixed norm case where the coordinates are split in two directions, one tangential and the other normal to the surface at a fixed given point. In particular, we resolve completely the adapted case and partly the non adapted case. In the non adapted case the case when the linear height h text lin ( phi) is below two is settled completely."} {"_id": [64, 59, 85], "label": "physics.data-an cs.SI physics.soc-ph", "text": "A class of randomized Subset Selection Methods for large complex networks. Most of the real world complex networks such as the Internet, World Wide Web and collaboration networks are huge and to infer their structure and dynamics one requires handling large connectivity (adjacency) matrices. Also, to find out the spectra of these networks, one needs to perform the EigenValue Decomposition(or Singular Value Decomposition for bipartite networks) of these large adjacency matrices or their Laplacian matrices. In the present work, we proposed randomized versions of the existing heuristics to infer the norm and the spectrum of the adjacency matrices. In an earlier work 1 , we used Subset Selection (SS) procedure to obtain the critical network structure which is smaller in size and retains the properties of original networks in terms of its Principal Singular Vector and eigenvalue spectra. We now present a few randomized versions of SS (RSS) and their time and space complexity calculation on various benchmark and real world networks. We find that the RSS based on using QR decomposition instead of SVD in deterministic SS is the fastest. We evaluate the correctness and the performance speed after running these randomized SS heuristics on test networks and comparing the results with deterministic counterpart reported earlier. We find the proposed methods can be used effectively in large and sparse networks they can be extended to analyse important network structure in dynamically evolving networks owing to their reduced time complexity."} {"_id": [35], "label": "math.RA", "text": "Symmetry of extending properties in nonsingular Utumi rings. This paper presents the right left symmetry of the CS and max min CS conditions on nonsingular rings, and generalization to nonsingular modules. We prove that a ring is right nonsingular right CS and left Utumi if and only if it is left nonsingular left CS and right Utumi. A nonsingular Utumi ring is right max (resp. right min, right max min) CS if and only if it is left min (resp. left max, left max min) CS. In addition, a semiprime nonsingular ring is right max min CS with finite right uniform dimension if and only if it is left max min CS with finite left uniform dimension."} {"_id": [35], "label": "math.RA", "text": "Non associative central extensions of null filiform associative algebras. We give the algebraic classification of alternative, left alternative, Jordan, bicommutative, left commutative, assosymmetric, Novikov and left symmetric central extensions of null filiform associative algebras."} {"_id": [8], "label": "physics.optics", "text": "Surface waves with negative phase velocity supported by temperature dependent hyperbolic materials. A numerical investigation was undertaken to elucidate the propagation of electromagnetic surface waves guided by the planar interface of two temperature sensitive materials. One partnering material was chosen to be isotropic and the other to be anisotropic. Both partnering materials were engineered composite materials, based on the temperature sensitive semiconductor InSb. At low temperatures the anisotropic partnering material is a non hyperbolic uniaxial material as the temperature is raised this material becomes a hyperbolic uniaxial material. At low temperatures, a solitary Dyakonov wave propagates along any specific direction in a range of directions parallel to the planar interface. At high temperatures, up to three different surface waves can propagate in certain directions parallel to the planar interface one of these surface waves propagates with negative phase velocity (NPV). At a fixed temperature, the range of directions for NPV propagation decreases uniformly in extent as the volume fraction of InSb in the isotropic partnering material decreases. At a fixed volume fraction of InSb in the isotropic partnering material, the angular range for NPV propagation varies substantially as the temperature varies."} {"_id": [54], "label": "q-fin.MF", "text": "Distributionally Robust XVA via Wasserstein Distance Part 2 Wrong Way Funding Risk. This paper investigates calculations of robust funding valuation adjustment (FVA) for over the counter (OTC) derivatives under distributional uncertainty using Wasserstein distance as the ambiguity measure. Wrong way funding risk can be characterized via the robust FVA formulation. The simpler dual formulation of the robust FVA optimization is derived. Next, some computational experiments are conducted to measure the additional FVA charge due to distributional uncertainty under a variety of portfolio and market configurations. Finally some suggestions for future work, such as robust capital valuation adjustment (KVA) and margin valuation adjustment (MVA), are discussed."} {"_id": [26, 38], "label": "math.NT math.RT", "text": "A Hecke Algebra on the Double Cover of a Chevalley Group Over mathbb Q 2 . We prove that a certain genuine Hecke algebra mathcal H on the non linear double cover of a simple, simply laced, simply connected, Chevalley group G over mathbb Q 2 admits a Bernstein presentation. This presentation has two consequences. First, the Bernstein component containing the genuine unramified principal series is equivalent to mathcal H mod. Second, mathcal H is isomorphic to the Iwahori Hecke algebra of the linear group G Z 2 , where Z 2 is the 2 torsion of the center of G . This isomorphism of Hecke algebras provides a correspondence between certain genuine unramified principal series of the double cover of G and the Iwahori unramified representations of the group G Z 2 ."} {"_id": [8], "label": "physics.optics", "text": "Terahertz Nonlinear Index Extraction via Full Phase Analysis. We experimentally show the spectrally averaged nonlinear refractive index and absorption coefficient for liquid water, water vapor, alpha pinene, and Si using a full phase analysis in the terahertz regime through a standard time domain spectrometer. Our results confirm that the nonlinear index of refraction of the liquid samples in this regime exceeds the near infrared optical nonlinear index by six orders of magnitude. In the case of liquid water and water vapor at atmospheric pressure, we find a nonlinear index of 7.8x10 10 cm 2 W and 6x10 11 cm 2 W respectively, which are both much larger than expected."} {"_id": [49, 9], "label": "math.OC math.AP", "text": "Halfspaces minimise nonlocal perimeter a proof via calibrations. We consider a nonlocal functional J K that may be regarded as a nonlocal version of the total variation. More precisely, for any measurable function u colon mathbb R d to mathbb R , we define J K(u) as the integral of weighted differences of u . The weight is encoded by a positive kernel K , possibly singular in the origin. We study the minimisation of this energy under prescribed boundary conditions, and we introduce a notion of calibration suited for this nonlocal problem. Our first result shows that the existence of a calibration is a sufficient condition for a function to be a minimiser. As an application of this criterion, we prove that halfspaces are the unique minimisers of J K in a ball, provided they are admissible competitors. Finally, we outline how to exploit the optimality of hyperplanes to recover a Gamma convergence result concerning the scaling limit of J K ."} {"_id": [64, 31], "label": "physics.soc-ph q-bio.PE", "text": "Role of bridge nodes in epidemic spreading Different regimes and crossovers. Power law behaviors are common in many disciplines, especially in network science. Real world networks, like disease spreading among people, are more likely to be interconnected communities, and show richer power law behaviors than isolated networks. In this paper, we look at the system of two communities which are connected by bridge links between a fraction r of bridge nodes, and study the effect of bridge nodes to the final state of the Susceptible Infected Recovered model, by mapping it to link percolation. By keeping a fixed average connectivity, but allowing different transmissibilities along internal and bridge links, we theoretically derive different power law asymptotic behaviors of the total fraction of the recovered R in the final state as r goes to zero, for different combinations of internal and bridge link transmissibilities. We also find crossover points where R follows different power law behaviors with r on both sides when the internal transmissibility is below but close to its critical value, for different bridge link transmissibilities. All of these power law behaviors can be explained through different mechanisms of how finite clusters in each community are connected into the giant component of the whole system, and enable us to pick effective epidemic strategies and to better predict their impacts."} {"_id": [25], "label": "math.PR", "text": "Rank of Sparse Bernoulli Matrices. Let A n be an n times n random matrix with i.i.d Bernoulli( p ) entries. For a fixed positive integer beta , suppose p satisfies frac log(n) n le p le c beta where c beta in ( 0, 1 2 ) is a beta dependentvalue. For t ge 0 , mathbb P left s n beta 1 (A) le t n 2 beta o mathfrak n (1) (pn) 7 right t ( 1 o mathfrak n (1) ) mathbb P bigg mbox either beta rows or beta columns of A n equal vec 0 bigg ."} {"_id": [22], "label": "cs.SE", "text": "An Empirical Study of User Support Tools in Open Source Software. End users positive response is essential for the success of any software. This is true for both commercial and Open Source Software (OSS). OSS is popular not only because of its availability, which is usually free but due to the user support it provides, generally through public platforms. The study model of this research establishes a relationship between OSS user support and available support tools. To conduct this research, we used a dataset of 100 OSS projects in different categories and examined five user support tools provided by different OSS projects. The results show that project trackers, user mailing lists, and updated versions have a significant role in gaining user support. However, we were unable to find a significant association between user support and documentation, as well as between user support and the troubleshooting guidelines provided by OSS projects."} {"_id": [0], "label": "cs.CV", "text": "Dependency Aware Filter Pruning. Convolutional neural networks (CNNs) are typically over parameterized, bringing considerable computational overhead and memory footprint in inference. Pruning a proportion of unimportant filters is an efficient way to mitigate the inference cost. For this purpose, identifying unimportant convolutional filters is the key to effective filter pruning. Previous work prunes filters according to either their weight norms or the corresponding batch norm scaling factors, while neglecting the sequential dependency between adjacent layers. In this paper, we further develop the norm based importance estimation by taking the dependency between the adjacent layers into consideration. Besides, we propose a novel mechanism to dynamically control the sparsity inducing regularization so as to achieve the desired sparsity. In this way, we can identify unimportant filters and search for the optimal network architecture within certain resource budgets in a more principled manner. Comprehensive experimental results demonstrate the proposed method performs favorably against the existing strong baseline on the CIFAR, SVHN, and ImageNet datasets. The training sources will be publicly available after the review process."} {"_id": [6], "label": "physics.flu-dyn", "text": "An improved mathematical model for the sedimentation of microplastic particles in a lid driven cavity with obstacle. In this paper, we developed a mathematical model for the sedimentation process of small particles in a lid driven cavity flow with an obstacle to model the transport of microplastic particles in rivers. A stationary incompressible Navier Stokes simulation at moderate Reynolds numbers provides the background flow field. Spherical particles are injected into this flow field and their equation of motion is solved to determine the number of particles that sediment on the surface of the obstacle. To capture the effect of typical biological organisms and biofilms on the bottom surface of river beds, the obstacle can exert an attraction force onto the particles. Various simulations and parameter studies are carried out to determine the influence of the obstacle geometry, particle densities, and the attraction force on the sedimentation process."} {"_id": [65, 17], "label": "cs.DC cs.NI", "text": "Efficient Complex Event Processing in Information centric Networking at the Edge. Information centric Networking (ICN) is an emerging Internet architecture that offers promising features, such as in network caching and named data addressing, to support the edge computing paradigm, in particular Internet of Things (IoT) applications. ICN can benefit from Complex Event Processing (CEP), which is an in network processing paradigm to specify and perform efficient query operations on data streams. However, integrating CEP into ICN is a challenging task due to the following reasons (1) typical ICN architectures do not provide support for forwarding and processing continuous data streams (2) IoT applications often need short response times and require robust event detection, which both are hard to accomplish using existing CEP systems. In this article, we present a novel network architecture, called INetCEP, for efficient CEP based in network processing as part of ICN. INetCEP enables efficient data processing in ICN by means of (1) a unified communication model that supports continuous data streams, (2) a meta query language for CEP to specify data processing operations in the data plane, and (3) query processing algorithms to resolve the specified operations. Our experimental results for two IoT use cases and datasets show that INetCEP offers very short response times of up to 73 mu s under high workload and is more than 15X faster in terms of forwarding events than the state of the art CEP system Flink. Furthermore, the delivery and processing of complex queries is around 32X faster than Flink and more than 100X faster than a naive pull based reference approach, while maintaining 100 accuracy."} {"_id": [32, 59], "label": "cs.DS cs.SI", "text": "Approximation of the Diagonal of a Laplacian's Pseudoinverse for Complex Network Analysis. The ubiquity of massive graph data sets in numerous applications requires fast algorithms for extracting knowledge from these data. We are motivated here by three electrical measures for the analysis of large small world graphs G (V, E) i.e., graphs with diameter in O( log V ) , which are abundant in complex network analysis. From a computational point of view, the three measures have in common that their crucial component is the diagonal of the graph Laplacian's pseudoinverse, L dagger . Computing diag (L dagger) exactly by pseudoinversion, however, is as expensive as dense matrix multiplication and the standard tools in practice even require cubic time. Moreover, the pseudoinverse requires quadratic space hardly feasible for large graphs. Resorting to approximation by, e.g., using the Johnson Lindenstrauss transform, requires the solution of O( log V epsilon 2) Laplacian linear systems to guarantee a relative error, which is still very expensive for large inputs. In this paper, we present a novel approximation algorithm that requires the solution of only one Laplacian linear system. The remaining parts are purely combinatorial mainly sampling uniform spanning trees, which we relate to diag (L dagger) via effective resistances. For small world networks, our algorithm obtains a pm epsilon approximation with high probability, in a time that is nearly linear in E and quadratic in 1 epsilon . Another positive aspect of our algorithm is its parallel nature due to independent sampling. We thus provide two parallel implementations of our algorithm one using OpenMP, one MPI OpenMP. In our experiments against the state of the art, our algorithm (i) yields more accurate results, (ii) is much faster and more memory efficient, and (iii) obtains good parallel speedups, in particular in the distributed setting."} {"_id": [9], "label": "math.AP", "text": "Codimension One Minimizers of Highly Amphiphilic Mixtures. We present a modified form of the Functionalized Cahn Hilliard (FCH) functional which models highly amphiphilic systems in solvent. A molecule is highly amphiphilic if the energy of a molecule isolated within the bulk solvent molecule is prohibitively high. For such systems once the amphiphilic molecules assemble into a structure it is very rare for a molecule to exchange back into the bulk. The highly amphiphilic FCH functional has a well with limited smoothness and admits compactly supported critical points. In the limit of molecular length epsilon approaches 0, we consider sequences with bounded energy whose support resides within an epsilon neighborhood of a fixed codimension one interface. We show that the FCH energy is uniformly bounded below, independent of epsilon 0, and identify assumptions on tangential variation of sequences that guarantee the existence of subsequences that converge to a weak solution of a rescaled bilayer profile equation, and show that sequences with limited tangential variation enjoy a lim inf inequality. For fixed codimension one interfaces we construct bounded energy sequences which converge to the bilayer profile and others with larger tangential variation which do not converge to the bilayer profile but whose limiting energy can violate the lim inf inequality, depending upon the energy parameters."} {"_id": [9], "label": "math.AP", "text": "Propagation dynamics of a reaction diffusion equation in a time periodic shifting environment. This paper concerns the nonautonomous reaction diffusion equation u t u xx ug(t,x ct,u), quad t 0,x in mathbb R , where c in mathbb R is the shifting speed, and the time periodic nonlinearity ug(t, xi,u) is asymptotically of KPP type as xi to infty and is negative as xi to infty . Under a subhomogeneity condition, we show that there is c 0 such that a unique forced time periodic wave exists if and only c c and it attracts other solutions in a certain sense according to the tail behavior of initial values. In the case where c ge c , the propagation dynamics resembles that of the limiting system as xi to pm infty , depending on the shifting direction."} {"_id": [2, 39], "label": "cs.AI cs.CY", "text": "Machine Education Designing semantically ordered and ontologically guided modular neural networks. The literature on machine teaching, machine education, and curriculum design for machines is in its infancy with sparse papers on the topic primarily focusing on data and model engineering factors to improve machine learning. In this paper, we first discuss selected attempts to date on machine teaching and education. We then bring theories and methodologies together from human education to structure and mathematically define the core problems in lesson design for machine education and the modelling approaches required to support the steps for machine education. Last, but not least, we offer an ontology based methodology to guide the development of lesson plans to produce transparent and explainable modular learning machines, including neural networks."} {"_id": [13], "label": "math.DS", "text": "Mean Ergodic Shadowing. We introduce and study a new variant of shadowing namely mean ergodic shadowing. We establish relationship of this variant with several other variants of shadowing. We show that a minimal system with shadowing cannot have mean ergodic shadowing. We give a necessary and sufficient condition for an orbital limit function to have mean ergodic shadowing property."} {"_id": [38], "label": "math.NT", "text": "Binary polynomial power sums vanishing at roots of unity. Let c 1(x),c 2(x),f 1(x),f 2(x) be polynomials with rational coefficients. With obvious exceptions, there can be at most finitely many roots of unity among the zeros of the polynomials c 1(x)f 1(x) n c 2(x)f 2(x) n with n 1,2 ldots . We estimate the orders of these roots of unity in terms of the degrees and the heights of the polynomials c i and f i ."} {"_id": [48], "label": "cs.CC", "text": "On the monotone complexity of the shift operator. We show that the complexity of minimal monotone circuits implementing a monotone version of the permutation operator on n boolean vectors of length q is Theta(qn log n) . In particular, we obtain an alternative way to prove the known complexity bound Theta(n log n) for the monotone shift operator on n boolean inputs."} {"_id": [24, 34], "label": "math.CV math.MG", "text": "On the continuous extension of Kobayashi isometries. We provide a sufficient condition for the continuous extension of isometries for the Kobayashi distance between bounded convex domains in complex Euclidean spaces having boundaries that are only slightly more regular than mathcal C 1 . This is a generalization of a recent result by A. Zimmer."} {"_id": [32], "label": "cs.DS", "text": "Fully Dynamic Maximal Independent Set in Expected Poly Log Update Time. In the fully dynamic maximal independent set (MIS) problem our goal is to maintain an MIS in a given graph G while edges are inserted and deleted from the graph. The first non trivial algorithm for this problem was presented by Assadi, Onak, Schieber, and Solomon STOC 2018 who obtained a deterministic fully dynamic MIS with O(m 3 4 ) update time. Later, this was independently improved by Du and Zhang and by Gupta and Khan arXiv 2018 to tilde O (m 2 3 ) update time. Du and Zhang arXiv 2018 also presented a randomized algorithm against an oblivious adversary with tilde O ( sqrt m ) update time. The current state of art is by Assadi, Onak, Schieber, and Solomon SODA 2019 who obtained randomized algorithms against oblivious adversary with tilde O ( sqrt n ) and tilde O (m 1 3 ) update times. In this paper, we propose a dynamic randomized algorithm against oblivious adversary with expected worst case update time of O( log 4n) . As a direct corollary, one can apply the black box reduction from a recent work by Bernstein, Forster, and Henzinger SODA 2019 to achieve O( log 6n) worst case update time with high probability. This is the first dynamic MIS algorithm with very fast update time of poly log."} {"_id": [38], "label": "math.NT", "text": "Super congruences concerning binomial coefficients and Ap 'ery like numbers. Let p be a prime with p 3 , and let a,b be two rational p integers. In this paper we present general congruences for sum k 0 p 1 binom ak binom 1 a k frac p k b pmod p 2 . For n 0,1,2, ldots let D n and b n be Domb and Almkvist Zudilin numbers, respectively. We also establish congruences for sum n 0 p 1 frac D n 16 n , quad sum n 0 p 1 frac D n 4 n , quad sum n 0 p 1 frac b n ( 3) n , quad sum n 0 p 1 frac b n ( 27) n pmod p 2 in terms of certain binary quadratic forms."} {"_id": [26, 46], "label": "math.RT math.AG", "text": "Lectures on the Geometry and Modular Representation Theory of Algebraic Groups. These notes provide a concise introduction to the representation theory of reductive algebraic groups in positive characteristic, with an emphasis on Lusztig's character formula and geometric representation theory. They are based on the first author's notes from a lecture series delivered by the second author at the Simons Centre for Geometry and Physics in August 2019. We intend them to complement more detailed treatments."} {"_id": [16, 1, 82], "label": "q-bio.QM cs.LG q-bio.MN", "text": "Recent Advances in Network based Methods for Disease Gene Prediction. Disease gene association through Genome wide association study (GWAS) is an arduous task for researchers. Investigating single nucleotide polymorphisms (SNPs) that correlate with specific diseases needs statistical analysis of associations. Considering the huge number of possible mutations, in addition to its high cost, another important drawback of GWAS analysis is the large number of false positives. Thus, researchers search for more evidence to cross check their results through different sources. To provide the researchers with alternative low cost disease gene association evidence, computational approaches come into play. Since molecular networks are able to capture complex interplay among molecules in diseases, they become one of the most extensively used data for disease gene association prediction. In this survey, we aim to provide a comprehensive and an up to date review of network based methods for disease gene prediction. We also conduct an empirical analysis on 14 state of the art methods. To summarize, we first elucidate the task definition for disease gene prediction. Secondly, we categorize existing network based efforts into network diffusion methods, traditional machine learning methods with handcrafted graph features and graph representation learning methods. Thirdly, an empirical analysis is conducted to evaluate the performance of the selected methods across seven diseases. We also provide distinguishing findings about the discussed methods based on our empirical analysis. Finally, we highlight potential research directions for future studies on disease gene prediction."} {"_id": [23], "label": "math.FA", "text": "Convolutors on mathcal S omega( mathbb R N) . In this paper we continue the study of the spaces mathcal O M, omega ( mathbb R N) and mathcal O C, omega ( mathbb R N) undertaken in 1 . We determine new representations of such spaces and we give some structure theorems for their dual spaces. Furthermore, we show that mathcal O ' C, omega ( mathbb R N) is the space of convolutors of the space mathcal S omega( mathbb R N) of the omega ultradifferentiable rapidly decreasing functions of Beurling type (in the sense of Braun, Meise and Taylor) and of its dual space mathcal S ' omega( mathbb R N) . We also establish that the Fourier transform is an isomorphism from mathcal O ' C, omega ( mathbb R N) onto mathcal O M, omega ( mathbb R N) . In particular, we prove that this isomorphism is topological when the former space is endowed with the strong operator lc topology induced by mathcal L b( mathcal S omega( mathbb R N)) and the last space is endowed with its natural lc topology."} {"_id": [3], "label": "cs.CL", "text": "Fast and Accurate Deep Bidirectional Language Representations for Unsupervised Learning. Even though BERT achieves successful performance improvements in various supervised learning tasks, applying BERT for unsupervised tasks still holds a limitation that it requires repetitive inference for computing contextual language representations. To resolve the limitation, we propose a novel deep bidirectional language model called Transformer based Text Autoencoder (T TA). The T TA computes contextual language representations without repetition and has benefits of the deep bidirectional architecture like BERT. In run time experiments on CPU environments, the proposed T TA performs over six times faster than the BERT based model in the reranking task and twelve times faster in the semantic similarity task. Furthermore, the T TA shows competitive or even better accuracies than those of BERT on the above tasks."} {"_id": [8, 11], "label": "physics.optics physics.app-ph", "text": "Color Tuning by Spontaneous Propagation of Gap Surface Plasmons in Epsilon Near Zero Nano Cavity. This work presents numerical and experimental results of plasmonic Metal Insulator optical nano cavities. The systems are composed of Silver as metal, polyvinylpyrrolidone or indium tin oxide or zinc oxide as insulator. The proposed nano cavities exhibit extraordinary effects as colors changing in function of the incident view angles, enhancement of the experimental real and imaginary parts of the pseudo dielectric constant, an extraordinary transmission of 50 and zero reflection for both polarizations at the resonant wavelengths. These results lead to the formation and propagation of surface plasmon polaritons and their hybridization in gap surface plasmons. The concurrence of these effects allow studying the Goos H \"anchen shift by exploiting the very narrow Delta and Psi ellipsometer parameters. Thank to their optical properties, the proposed nano cavities could be applied in several fields such tunable color filters, optics, photonics and sensing."} {"_id": [64], "label": "physics.soc-ph", "text": "The effect of interurban movements on the spatial distribution of population in China. Understanding how interurban movements can modify the spatial distribution of the population is important for transport planning but is also a fundamental ingredient for epidemic modeling. We focus here on vacation trips (for all transportation modes) during the Chinese Lunar New Year and compare the results for 2019 with the ones for 2020 where travel bans were applied for mitigating the spread of a novel coronavirus (COVID 19). We first show that these travel flows are broadly distributed and display both large temporal and spatial fluctuations, making their modeling very difficult. When flows are larger, they appear to be more dispersed over a larger number of origins and destinations, creating de facto hubs that can spread an epidemic at a large scale. These movements quickly induce (in about a week) a very strong population concentration in a small set of cities. We characterize quantitatively the return to the initial distribution by defining a pendular ratio which allows us to show that this dynamics is very slow and even stopped for the 2020 Lunar New Year due to travel restrictions. Travel restrictions obviously limit the spread of the diseases between different cities, but have thus the counter effect of keeping high concentration in a small set of cities, a priori favoring intra city spread, unless individual contacts are strongly limited. These results shed some light on how interurban movements modify the national distribution of populations, a crucial ingredient for devising effective control strategies at a national level."} {"_id": [73, 51, 6], "label": "q-bio.TO physics.bio-ph physics.flu-dyn", "text": "Pulmonary drug delivery and retention a computational study to identify plausible parameters based on a coupled airway mucus flow model. Pulmonary drug delivery systems rely on inhalation of drug laden aerosols produced from aerosol generators such as inhalers, nebulizers etc. On deposition, the drug molecules diffuse in the mucus layer and are also subjected to mucociliary advection which transports the drugs away from the initial deposition site. The availability of the drug at a particular region of the lung is, thus, determined by a balance between these two phenomena. A mathematical analysis of drug deposition and retention in the lungs is developed through a coupled mathematical model of aerosol transport in air as well as drug molecule transport in the mucus layer. The mathematical model is solved computationally to identify suitable conditions for the transport of drug laden aerosols to the deep lungs. This study identifies the conditions conducive for delivering drugs to the deep lungs which is crucial for achieving systemic drug delivery. The effect of different parameters on drug retention is also characterized for various regions of the lungs, which is important in determining the availability of the inhaled drugs at a target location. Our analysis confirms that drug delivery efficacy remains highest for aerosols in the size range of 1 5 mu m. Moreover, it is observed that amount of drugs deposited in the deep lung increases by a factor of 2 when the breathing time period is doubled, with respect to normal breathing, suggesting breath control as a means to increase the efficacy of drug delivery to the deep lung. A higher efficacy also reduces the drug load required to be inhaled to produce the same health effects and hence, can help in minimizing the side effects of a drug."} {"_id": [72, 1], "label": "cs.PF cs.LG", "text": "The Supermarket Model with Known and Predicted Service Times. The supermarket model refers to a system with a large number of queues, where new customers choose d queues at random and join the one with the fewest customers. This model demonstrates the power of even small amounts of choice, as compared to simply joining a queue chosen uniformly at random, for load balancing systems. In this work we perform simulation based studies to consider variations where service times for a customer are predicted, as might be done in modern settings using machine learning techniques or related mechanisms. Our primary takeaway is that using even seemingly weak predictions of service times can yield significant benefits over blind First In First Out queueing in this context. However, some care must be taken when using predicted service time information to both choose a queue and order elements for service within a queue while in many cases using the information for both choosing and ordering is beneficial, in many of our simulation settings we find that simply using the number of jobs to choose a queue is better when using predicted service times to order jobs in a queue. In our simulations, we evaluate both synthetic and real world workloads in the latter, service times are predicted by machine learning. Our results provide practical guidance for the design of real world systems moreover, we leave many natural theoretical open questions for future work, validating their relevance to real world situations."} {"_id": [9, 49], "label": "math.AP math.OC", "text": "Bilinear local controllability to the trajectories of the Fokker Planck equation with a localized control. This work is devoted to the control of the Fokker Planck equation, posed on a smooth bounded domain of R d, with a localized drift force. We prove that this equation is locally controllable to regular nonzero trajectories. Moreover, under some conditions, we explain how to reduce the number of controls around the reference control. The results are obtained thanks to a standard linearization method and the fictitious control method. The main novelties are twofold. First, the algebraic solvability is performed and used directly on the adjoint problem. We then prove a new Carleman inequality for the heat equation with a space time varying first order term the right hand side is the gradient of the solution localized on an open subset. We finally give an example of regular trajectory around which the Fokker Planck equation is not controllable with a reduced number of controls, to highlight that our conditions are relevant."} {"_id": [65], "label": "cs.NI", "text": "Driving Path Stability in VANETs. Vehicular Ad Hoc Network has attracted both research and industrial community due to its benefits in facilitating human life and enhancing the security and comfort. However, various issues have been faced in such networks such as information security, routing reliability, dynamic high mobility of vehicles, that influence the stability of communication. To overcome this issue, it is necessary to increase the routing protocols performances, by keeping only the stable path during the communication. The effective solutions that have been investigated in the literature are based on the link prediction to avoid broken links. In this paper, we propose a new solution based on machine learning concept for link prediction, using LR and Support Vector Regression (SVR) which is a variant of the Support Vector Machine (SVM) algorithm. SVR allows predicting the movements of the vehicles in the network which gives us a decision for the link state at a future time. We study the performance of SVR by comparing the generated prediction values against real movement traces of different vehicles in various mobility scenarios, and to show the effectiveness of the proposed method, we calculate the error rate. Finally, we compare this new SVR method with Lagrange interpolation solution."} {"_id": [25, 38], "label": "math.NT math.PR", "text": "The values of zeta functions composed by the Hurwitz and periodic zeta functions at integers. For s in mathbb C and 0 a 1 , let zeta (s,a) and rm Li s (e 2 pi ia ) be the Hurwitz and periodic zeta functions, repectively. For 0 a le 1 2 , put Z(s,a) zeta (s,a) zeta (s,1 a) , P(s,a) rm Li s (e 2 pi ia ) rm Li s (e 2 pi i(1 a) ) , Y(s,a) zeta (s,a) zeta (s,1 a) and O(s,a) i bigl( rm Li s (e 2 pi ia ) rm Li s (e 2 pi i(1 a) ) bigr) . Let n ge 0 be an integer and b r q , where q r 0 are coprime integers. In this paper, we prove that the values Z( n,b) , pi 2n 2 P(2n 2,b) , Y( n,b) and pi 2n 1 O(2n 1,b) are rational numbers, in addition, pi 2n 2 Z(2n 2,b) , P( n,b) , pi 2n 1 Y(2n 1,b) and O( n,b) are polynomials of cos (2 pi q) and sin (2 pi q) with rational coefficients. Furthermore, we show that Z( n,a) , pi 2n 2 P(2n 2,a) , Y( n,a) and pi 2n 1 O(2n 1,a) are polynomials of 0 a 1 with rational coefficient, in addition, pi 2n 2 Z(2n 2,a) , P( n,a) , pi 2n 1 Y(2n 1,a) and O( n,a) are rational functions of exp (2 pi ia) with rational coefficients. Note that the rational numbers, polynomials and rational functions mentioned above are given explicitly. Moreover, we show that P(s,a) equiv 0 for all 0 a 1 2 if and only if s is a negative even integer. We also prove similar assertions for Z(s,a) , Y(s,a) , O(s,a) and so on. In addition, we prove that the function Z(s, a ) appears as the spectral density of some stationary self similar Gaussian distributions."} {"_id": [64, 13], "label": "math.DS physics.soc-ph", "text": "Optimal Control Studies on Age Structural Modeling of COVID 19 in Presence of Saturated Medical Treatment of Holling Type III. In this study initially, we propose an age structured model and calculate the equilibrium points and basic reproduction number. Later we propose an optimal control problem to understand the roles of treatment in controlling the epidemic. From the Stability analysis we see that the infection free equilibrium remains asymptotically stable whenever R 0 1 and as R 0 crosses unity we have the infected equilibrium to be stable. From the sensitivity analysis parameters u 11 , b 1 , beta 1 , d 1 and mu were found to be sensitive. Findings from the Optimal Control studies suggests that the infection among the adult population(age geq 30) is least considering the second control u 12 whereas, when both the controls u 11 and u 12 are considered together the infectives is minimum in case of young populations(age leq 30 ). The cumulative infected population reduced the maximum when the second control was considered followed by considering both the controls together. The control u 12 was effective for mild epidemic (R 0 in(1, 2)) whereas control u 11 was found to be highly effective when epidemic was severe (R 0 in(2, 7)) for the population of age group ( leq 30) . Whereas for age group ( geq 30) the control u 12 was highly effective for the entire range of basic reproduction number. The effect of saturation level in treatment is also explored numerically."} {"_id": [41], "label": "cs.RO", "text": "Model free vision based shaping of deformable plastic materials. We address the problem of shaping deformable plastic materials using non prehensile actions. Shaping plastic objects is challenging, since they are difficult to model and to track visually. We study this problem, by using kinetic sand, a plastic toy material which mimics the physical properties of wet sand. Inspired by a pilot study where humans shape kinetic sand, we define two types of actions textit pushing the material from the sides and textit tapping from above. The chosen actions are executed with a robotic arm using image based visual servoing. From the current and desired view of the material, we define states based on visual features such as the outer contour shape and the pixel luminosity values. These are mapped to actions, which are repeated iteratively to reduce the image error until convergence is reached. For pushing, we propose three methods for mapping the visual state to an action. These include heuristic methods and a neural network, trained from human actions. We show that it is possible to obtain simple shapes with the kinetic sand, without explicitly modeling the material. Our approach is limited in the types of shapes it can achieve. A richer set of action types and multi step reasoning is needed to achieve more sophisticated shapes."} {"_id": [57], "label": "cs.PL", "text": "A Note On Compliance Relations And Fixed Points. We study compliance relations between behavioural contracts in a syntax independent setting based on Labelled Transition Systems. We introduce a fix point based family of compliance relations, and show that many compliance relations appearing in literature belong to this family."} {"_id": [16, 13, 31], "label": "q-bio.PE math.DS q-bio.QM", "text": "Finding Reproduction Numbers for Epidemic Models Predator Prey Models of Arbitrary Finite Dimension Using The Generalized Linear Chain Trick. Reproduction numbers, like the basic reproduction number mathcal R 0 , play an important role in the analysis and application of dynamic models, including contagion models and ecological population models. One difficulty in deriving these quantities is that they must be computed on a model by model basis, since it is typically impractical to obtain general reproduction number expressions applicable to a family of related models, especially if these are of different dimensions. For example, this is typically the case for SIR type infectious disease models derived using the linear chain trick (LCT). Here we show how to find general reproduction number expressions for such models families (which vary in their number of state variables) using the next generation operator approach in conjunction with the generalized linear chain trick (GLCT). We further show how the GLCT enables modelers to draw insights from these results by leveraging theory and intuition from continuous time Markov chains (CTMCs) and their absorption time distributions (i.e., phase type probability distributions). To do this, we first review the GLCT and other connections between mean field ODE model assumptions, CTMCs, and phase type distributions. We then apply this technique to find reproduction numbers for two sets of models a family of generalized SEIRS models of arbitrary finite dimension, and a generalized family of finite dimensional predator prey (Rosenzweig MacArthur type) models. These results highlight the utility of the GLCT for the derivation and analysis of mean field ODE models, especially when used in conjunction with theory from CTMCs and their associated phase type distributions."} {"_id": [0], "label": "cs.CV", "text": "Vehicle Trajectory Prediction in Crowded Highway Scenarios Using Bird Eye View Representations and CNNs. This paper describes a novel approach to perform vehicle trajectory predictions employing graphic representations. The vehicles are represented using Gaussian distributions into a Bird Eye View. Then the U net model is used to perform sequence to sequence predictions. This deep learning based methodology has been trained using the HighD dataset, which contains vehicles' detection in a highway scenario from aerial imagery. The problem is faced as an image to image regression problem training the network to learn the underlying relations between the traffic participants. This approach generates an estimation of the future appearance of the input scene, not trajectories or numeric positions. An extra step is conducted to extract the positions from the predicted representation with subpixel resolution. Different network configurations have been tested, and prediction error up to three seconds ahead is in the order of the representation resolution. The model has been tested in highway scenarios with more than 30 vehicles simultaneously in two opposite traffic flow streams showing good qualitative and quantitative results."} {"_id": [42], "label": "math.DG", "text": "Proof of Bishop's volume comparison theorem using singular soap bubbles. Bishop's volume comparison theorem states that a compact n manifold with Ricci curvature larger than the standard n sphere has less volume. While the traditional proof uses geodesic balls, we present another proof using isoperimetric hypersurfaces, also known as \"soap bubbles,\" which minimize area for a given volume. Curiously, isoperimetric hypersurfaces can have codimension 7 singularities, an interesting challenge we are forced to overcome."} {"_id": [21, 38], "label": "math.NT math.CO", "text": "Where do the maximum absolute q series coefficients of (1 q)(1 q 2)(1 q 3) dots(1 q n 1 )(1 q n) occur?. We used the MACH2 supercomputer to study coefficients in the q series expansion of (1 q)(1 q 2) dots(1 q n) , for all n leq 75000 . As a result, we were able to conjecture some periodic properties associated with the before unknown location of the maximum coefficient of these polynomials with odd n . Remarkably the observed period is 62,624."} {"_id": [40, 63], "label": "cs.IR cs.DL", "text": "Fast Search with Poor OCR. The indexing and searching of historical documents have garnered attention in recent years due to massive digitization efforts of important collections worldwide. Pure textual search in these corpora is a problem since optical character recognition (OCR) is infamous for performing poorly on such historical material, which often suffer from poor preservation. We propose a novel text based method for searching through noisy text. Our system represents words as vectors, projects queries and candidates obtained from the OCR into a common space, and ranks the candidates using a metric suited to nearest neighbor search. We demonstrate the practicality of our method on typewritten German documents from the WWII era."} {"_id": [17], "label": "cs.DC", "text": "MARS Multi Scalable Actor Critic Reinforcement Learning Scheduler. In this paper, we introduce a new scheduling algorithm MARS based on a cost aware multi scalable reinforcement learning approach, which serves as an intermediate layer between HPC resource manager and user application workflow, MARS ensembles the pre generated models from users workflows and decides on the most suitable strategy for optimization. A whole workflow application would be split into several optimized subtasks. Then based on a pre defined resource management plan. A reward will be generated after executing a scheduled task. Lastly, MARS updates the Deep Neural Network (DNN) model for future use. MARS is designed to be able to optimize the existing models through the reinforcement mechanism. MARS can adapt to the shortage of training samples and optimize the performance by itself, especially through combining the small tasks together or switching between pre built scheduling strategy such as Backfilling, SJF, etc, then choosing the most suitable approach. We tested MARS using different real world workflow traces. MARS can achieve between 5 60 better performance while comparing to the other approaches."} {"_id": [54], "label": "q-fin.MF", "text": "Asymptotic minimization of expected time to reach a large wealth level in an asset market game. We consider a stochastic game theoretic model of a discrete time asset market with short lived assets and endogenous asset prices. We prove that the strategy which invests in the assets proportionally to their expected relative payoffs asymptotically minimizes the expected time needed to reach a large wealth level. The result is obtained under the assumption that the relative asset payoffs and the growth rate of the total payoff during each time period are independent and identically distributed."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Towards Supervised and Unsupervised Neural Machine Translation Baselines for Nigerian Pidgin. Nigerian Pidgin is arguably the most widely spoken language in Nigeria. Variants of this language are also spoken across West and Central Africa, making it a very important language. This work aims to establish supervised and unsupervised neural machine translation (NMT) baselines between English and Nigerian Pidgin. We implement and compare NMT models with different tokenization methods, creating a solid foundation for future works."} {"_id": [42, 18, 13], "label": "math.DG math.DS math.GT", "text": "Entropy rigidity for finite volume strictly convex projective manifolds. We prove entropy rigidity for finite volume strictly convex projective manifolds in dimensions geq 3 , generalizing the work of arXiv 1708.03983 to the finite volume setting. The rigidity theorem uses the techniques of Besson, Courtois, and Gallot's entropy rigidity theorem. It implies uniform lower bounds on the volume of any finite volume strictly convex projective manifold in dimensions geq 3 ."} {"_id": [23], "label": "math.FA", "text": "On the Stampfli point of some operators and matrices. The center of mass of an operator A (denoted St( A ), and called in this paper as the em Stampfli point of A) was introduced by Stampfli in his Pacific J. Math (1970) paper as the unique lambda in mathbb C delivering the minimum value of the norm of A lambda I . We derive some results concerning the location of St( A ) for several classes of operators, including 2 by 2 block operator matrices with scalar diagonal blocks and 3 by 3 matrices with repeated eigenvalues. We also show that for almost normal A its Stampfli point lies in the convex hull of the spectrum, which is not the case in general. Some relations between the property St( A ) 0 and Roberts orthogonality of A to the identity operator are established."} {"_id": [41], "label": "cs.RO", "text": "Pose Estimation for Texture less Shiny Objects in a Single RGB Image Using Synthetic Training Data. In the industrial domain, the pose estimation of multiple texture less shiny parts is a valuable but challenging task. In this particular scenario, it is impractical to utilize keypoints or other texture information because most of them are not actual features of the target but the reflections of surroundings. Moreover, the similarity of color also poses a challenge in segmentation. In this article, we propose to divide the pose estimation process into three stages object detection, features detection and pose optimization. A convolutional neural network was utilized to perform object detection. Concerning the reliability of surface texture, we leveraged the contour information for estimating pose. Since conventional contour based methods are inapplicable to clustered metal parts due to the difficulties in segmentation, we use the dense discrete points along the metal part edges as semantic keypoints for contour detection. Afterward, we exploit both keypoint information and CAD model to calculate the 6D pose of each object in view. A typical implementation of deep learning methods not only requires a large amount of training data, but also relies on intensive human labor for labeling the datasets. Therefore, we propose an approach to generate datasets and label them automatically. Despite not using any real world photos for training, a series of experiments showed that the algorithm built on synthetic data perform well in the real environment."} {"_id": [49], "label": "math.OC", "text": "Timescale Separation in Autonomous Optimization. Autonomous optimization refers to the design of feedback controllers that steer a physical system to a steady state that solves a predefined, possibly constrained, optimization problem. As such, no exogenous control inputs such as setpoints or trajectories are required. Instead, these controllers are modeled after optimization algorithms that take the form of dynamical systems. The interconnection of this type of optimization dynamics with a physical system is however not guaranteed to be stable unless both dynamics act on sufficiently different timescales. In this paper, we quantify the required timescale separation and give prescriptions that can be directly used in the design of this type of feedback controllers. Using ideas from singular perturbation analysis, we derive stability bounds for different feedback laws that are based on common continuous time optimization schemes. In particular, we consider gradient descent and its variations, including projected gradient, and Newton gradient. We further give stability bounds for momentum methods and saddle point flows. Finally, we discuss how optimization algorithms like subgradient and accelerated gradient descent, while well behaved in offline settings, are unsuitable for autonomous optimization due to their general lack of robustness."} {"_id": [57, 1], "label": "cs.PL cs.LG", "text": "Array Languages Make Neural Networks Fast. Modern machine learning frameworks are complex they are typically organised in multiple layers each of which is written in a different language and they depend on a number of external libraries, but at their core they mainly consist of tensor operations. As array oriented languages provide perfect abstractions to implement tensor operations, we consider a minimalistic machine learning framework that is shallowly embedded in an array oriented language and we study its productivity and performance. We do this by implementing a state of the art Convolutional Neural Network (CNN) and compare it against implementations in TensorFlow and PyTorch two state of the art industrial strength frameworks. It turns out that our implementation is 2 and 3 times faster, even after fine tuning the TensorFlow and PyTorch to our hardware a 64 core GPU accelerated machine. The size of all three CNN specifications is the same, about 150 lines of code. Our mini framework is 150 lines of highly reusable hardware agnostic code that does not depend on external libraries. The compiler for a host array language automatically generates parallel code for a chosen architecture. The key to such a balance between performance and portability lies in the design of the array language in particular, the ability to express rank polymorphic operations concisely, yet being able to do optimisations across them. This design builds on very few assumptions, and it is readily transferable to other contexts offering a clean approach to high performance machine learning."} {"_id": [17], "label": "cs.DC", "text": "Inner For Loop for Speeding Up Blockchain Mining. In this paper, the authors propose to increase the efficiency of blockchain mining by using a population based approach. Blockchain relies on solving difficult mathematical problems as proof of work within a network before blocks are added to the chain. Brute force approach, advocated by some as the fastest algorithm for solving partial hash collisions and implemented in Bitcoin blockchain, implies exhaustive, sequential search. It involves incrementing the nonce (number) of the header by one, then taking a double SHA 256 hash at each instance and comparing it with a target value to ascertain if lower than that target. It excessively consumes both time and power. In this paper, the authors, therefore, suggest using an inner for loop for the population based approach. Comparison shows that it's a slightly faster approach than brute force, with an average speed advantage of about 1.67 or 3,420 iterations per second and 73 of the time performing better. Also, we observed that the more the total particles deployed, the better the performance until a pivotal point. Furthermore, a recommendation on taming the excessive use of power by networks, like Bitcoin's, by using penalty by consensus is suggested."} {"_id": [42], "label": "math.DG", "text": "Time analyticity for heat equation on gradient shrinking Ricci solitons. On a complete non compact gradient shrinking Ricci soliton, we prove the analyticity in time for smooth solutions of the heat equation with quadratic exponential growth in the space variable. This growth condition is sharp. As an application, we give a necessary and sufficient condition on the solvability of the backward heat equation in a class of functions with quadratic exponential growth."} {"_id": [59, 3, 14], "label": "cs.CL cs.HC cs.SI", "text": "Detecting Emerging Symptoms of COVID 19 using Context based Twitter Embeddings. In this paper, we present an iterative graph based approach for the detection of symptoms of COVID 19, the pathology of which seems to be evolving. More generally, the method can be applied to finding context specific words and texts (e.g. symptom mentions) in large imbalanced corpora (e.g. all tweets mentioning COVID 19). Given the novelty of COVID 19, we also test if the proposed approach generalizes to the problem of detecting Adverse Drug Reaction (ADR). We find that the approach applied to Twitter data can detect symptom mentions substantially before being reported by the Centers for Disease Control (CDC)."} {"_id": [49, 42, 13], "label": "math.DS math.DG math.OC", "text": "A Structurally Flat Triangular Form Based on the Extended Chained Form. In this paper, we present a structurally flat triangular form which is based on the extended chained form. We provide a complete geometric characterization of the proposed triangular form in terms of necessary and sufficient conditions for an affine input system with two inputs to be static feedback equivalent to this triangular form. This yields a sufficient condition for an affine input system to be flat."} {"_id": [41, 14], "label": "cs.RO cs.HC", "text": "RoomShift Room scale Dynamic Haptics for VR with Furniture moving Swarm Robots. RoomShift is a room scale dynamic haptic environment for virtual reality, using a small swarm of robots that can move furniture. RoomShift consists of nine shape changing robots Roombas with mechanical scissor lifts. These robots drive beneath a piece of furniture to lift, move and place it. By augmenting virtual scenes with physical objects, users can sit on, lean against, place and otherwise interact with furniture with their whole body just as in the real world. When the virtual scene changes or users navigate within it, the swarm of robots dynamically reconfigures the physical environment to match the virtual content. We describe the hardware and software implementation, applications in virtual tours and architectural design and interaction techniques."} {"_id": [25], "label": "math.PR", "text": "Minimal L p Densities with Prescribed Marginals. We derive sharp lower bounds for L p functions on the n dimensional unit hypercube in terms of their p th marginal moments. Such bounds are the unique solutions of a system of constrained nonlinear integral equations depending on the marginals. For square integrable functions, the bounds have an explicit expression in terms of the second marginals moments."} {"_id": [46], "label": "math.AG", "text": "Rationality of Fano threefolds over non closed fields. We give necessary and sufficient conditions for unirationality and rationality of Fano threefolds of geometric Picard rank 1 over an arbitrary field of zero characteristic."} {"_id": [84], "label": "physics.acc-ph", "text": "Design and operation of the air cooled beam dump for the extraction line of CERN's Proton Synchrotron Booster (PSB). A new beam dump has been designed, built, installed and operated to withstand the future proton beam extracted from the Proton Synchrotron Booster (PSB) in the framework of the LHC Injector Upgrade (LIU) Project at CERN, consisting of up to 1E14 protons per pulse at 2 GeV, foreseen after the machine upgrades planned for CERN's Long Shutdown 2 (2019 2020). In order to be able to efficiently dissipate the heat deposited by the primary beam, the new dump was designed as a cylindrical block assembly, made out of a copper alloy and cooled by forced airflow. In order to determine the energy density distribution deposited by the beam in the dump, Monte Carlo simulations were performed using the FLUKA code, and thermo mechanical analyses were carried out by importing the energy density into ANSYS. In addition, Computational Fluid Dynamics (CFD) simulations of the airflow were performed in order to accurately estimate the heat transfer convection coefficient on the surface of the dump. This paper describes the design process, highlights the constraints and challenges of integrating a new dump for increased beam power into the existing facility and provides data on the operation of the dump."} {"_id": [81, 7], "label": "physics.comp-ph cs.MS", "text": "Semi Lagrangian Vlasov simulation on GPUs. In this paper, our goal is to efficiently solve the Vlasov equation on GPUs. A semi Lagrangian discontinuous Galerkin scheme is used for the discretization. Such kinetic computations are extremely expensive due to the high dimensional phase space. The SLDG code, which is publicly available under the MIT license abstracts the number of dimensions and uses a shared codebase for both GPU and CPU based simulations. We investigate the performance of the implementation on a range of both Tesla (V100, Titan V, K80) and consumer (GTX 1080 Ti) GPUs. Our implementation is typically able to achieve a performance of approximately 470 GB s on a single GPU and 1600 GB s on four V100 GPUs connected via NVLink. This results in a speedup of about a factor of ten (comparing a single GPU with a dual socket Intel Xeon Gold node) and approximately a factor of 35 (comparing a single node with and without GPUs). In addition, we investigate the effect of single precision computation on the performance of the SLDG code and demonstrate that a template based dimension independent implementation can achieve good performance regardless of the dimensionality of the problem."} {"_id": [69], "label": "math.QA", "text": "Braid group actions for quantum symmetric pairs of type AIII AIV. In the present paper we construct braid group actions on quantum symmetric pair coideal subalgebras of type AIII AIV. This completes the proof of a conjecture by Kolb and Pellegrini in the case where the underlying Lie algebra is mathfrak sl n . The braid group actions are defined on the generators of the coideal subalgebras and the defining relations and braid relations are verified by explicit calculations."} {"_id": [24, 13, 38], "label": "math.DS math.MG math.NT", "text": "Singular Vectors on Fractals and Projections of Self similar Measures. Singular vectors are those for which the quality of rational approximations provided by Dirichlet's Theorem can be improved by arbitrarily small multiplicative constants. We provide an upper bound on the Hausdorff dimension of singular vectors lying on self similar fractals in mathbb R d satisfying the open set condition. The bound is in terms of quantities which are closely tied to Frostman exponents of projections of the Hausdorff measure supported on the fractal. Our bound is optimal in the sense that it agrees with the exact dimension of singular vectors obtained by Cheung and Chevallier when the fractal is trivial (i.e. has non empty interior). As a corollary, we show that if the fractal is the product of 2 copies of Cantor's middle thirds set or the attractor of a planar homogeneous irrational IFS, then the upper bound is 2 3 the dimension of the fractal. This addresses the upper bound part of a question raised by Bugeaud, Cheung and Chevallier. We apply our method in the setting of translation flows on flat surfaces to show that the dimension of non uniquely ergodic directions belonging to a fractal is at most 1 2 the dimension of the fractal."} {"_id": [46], "label": "math.AG", "text": "Moduli of Admissible Pairs for Arbitrary Dimension, II Functors and Moduli. Admissible pairs (( widetilde S, widetilde L), widetilde E) consisting of an N dimensional projective scheme widetilde S of certain class with a special ample invertible sheaf widetilde L and a locally free cal O widetilde S sheaf widetilde E are considered. An admissible pair can be produced in the procedure of a transformation (which is called a resolution) of a torsion free coherent sheaf E on a nonsingular N dimensional projective algebraic variety S to a locally free sheaf widetilde E on some projective scheme widetilde S . Notions of stability and semistability of admissible pairs and a moduli functor for semistable admissible pairs are introduced. Also the relation of the stability and semistability for admissible pairs to the classical stability and semistability for coherent sheaves under the resolution is examined. Morphisms between the moduli functor of admissible semistable pairs and the Gieseker Maruyama moduli functor (of semistable coherent torsion free sheaves) with the same Hilbert polynomial on a nonsingular N dimensional projective algebraic variety are constructed. Examining these morphisms it is shown that the moduli scheme for semistable admissible pairs (( widetilde S, widetilde L), widetilde E) is isomorphic to the Gieseker Maruyama moduli scheme for coherent sheaves. The considerations involve all the existing components of these moduli functors and of their corresponding moduli schemes. Bibliography 25 items."} {"_id": [20], "label": "math.NA cs.NA", "text": "Random geometries for optimal control PDE problems based on fictitious domain FEMS and cut elements. This work investigates an elliptic optimal control problem defined on uncertain domains and discretized by a fictitious domain finite element method and cut elements. Key ingredients of the study are to manage cases considering the usually computationally \"forbidden\" combination of poorly conditioned equation system matrices due to challenging geometries, optimal control searches with iterative methods, slow convergence to system solutions on deterministic and non deterministic level, and expensive remeshing due to geometrical changes. We overcome all these difficulties, utilizing the advantages of proper preconditioners adapted to unfitted mesh methods, improved types of Monte Carlo methods, and mainly employing the advantages of embedded FEMs, based on a fixed background mesh computed once even if geometrical changes are taking place. The sensitivity of the control problem is introduced in terms of random domains, employing a Quasi Monte Carlo method and emphasizing a deterministic target state. The variational discretization concept is adopted, optimal error estimates for the state, adjoint state, and control are derived that confirm the efficiency of the cut finite element method in challenging geometries. The performance of a multigrid scheme especially developed for unfitted finite element discretizations adapted to the optimal control problem is also tested. Some fundamental preconditioners are applied to the arising sparse linear systems coming from the discretization of the state and adjoint state variational forms in the spatial domain. The corresponding convergence rates along with the quality of the prescribed preconditioners are verified by numerical examples."} {"_id": [0, 1, 41], "label": "cs.CV cs.LG cs.RO", "text": "Domain Adaptation Through Task Distillation. Deep networks devour millions of precisely annotated images to build their complex and powerful representations. Unfortunately, tasks like autonomous driving have virtually no real world training data. Repeatedly crashing a car into a tree is simply too expensive. The commonly prescribed solution is simple learn a representation in simulation and transfer it to the real world. However, this transfer is challenging since simulated and real world visual experiences vary dramatically. Our core observation is that for certain tasks, such as image recognition, datasets are plentiful. They exist in any interesting domain, simulated or real, and are easy to label and extend. We use these recognition datasets to link up a source and target domain to transfer models between them in a task distillation framework. Our method can successfully transfer navigation policies between drastically different simulators ViZDoom, SuperTuxKart, and CARLA. Furthermore, it shows promising results on standard domain adaptation benchmarks."} {"_id": [36], "label": "physics.chem-ph", "text": "UV resistance of nucleosides an experimental approach. The emergence of life on Earth is a highly discussed but still unsolved question. Current research underlines the importance of environments within close proximity to the Earth's surface as they can solve long standing problems such as polymerization of nucleotides and phosphorylation of nucleosides. However, near surface settings, for example, ponds or ice shields, are prone to UV irradiation. We investigated the photosensitivity of uracil, uridine, adenosine, cytidine, and guanosine by using Raman microscopy. The samples were irradiated by a UV source with 150 mW cm textsuperscript 2 for 10 min. Uracil and uridine showed the highest photosensitivity, while adenosine, cytidine, and guanosine remained stable. The change of spectral features and ab initio quantum calculations indicate the formation of uracil's trans syn cyclobutane dimer during UV irradiation."} {"_id": [1, 2, 39], "label": "cs.LG cs.AI cs.CY", "text": "Learning Generalizable Physiological Representations from Large scale Wearable Data. To date, research on sensor equipped mobile devices has primarily focused on the purely supervised task of human activity recognition (walking, running, etc), demonstrating limited success in inferring high level health outcomes from low level signals, such as acceleration. Here, we present a novel self supervised representation learning method using activity and heart rate (HR) signals without semantic labels. With a deep neural network, we set HR responses as the supervisory signal for the activity data, leveraging their underlying physiological relationship. We evaluate our model in the largest free living combined sensing dataset (comprising more than 280,000 hours of wrist accelerometer wearable ECG data) and show that the resulting embeddings can generalize in various downstream tasks through transfer learning with linear classifiers, capturing physiologically meaningful, personalized information. For instance, they can be used to predict (higher than 70 AUC) variables associated with individuals' health, fitness and demographic characteristics, outperforming unsupervised autoencoders and common bio markers. Overall, we propose the first multimodal self supervised method for behavioral and physiological data with implications for large scale health and lifestyle monitoring."} {"_id": [32, 17], "label": "cs.DS cs.DC", "text": "Online Payment Network Design. Payment channels allow transactions between participants of the blockchain to be executed securely off chain, and thus provide a promising solution for the scalability problem of popular blockchains. We study the online network design problem for payment channels, assuming a central coordinator. We focus on a single channel, where the coordinator desires to maximize the number of accepted transactions under given capital constraints. Despite the simplicity of the problem, we present a flurry of impossibility results, both for deterministic and randomized algorithms against adaptive as well as oblivious adversaries."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Adaptive Loss aware Quantization for Multi bit Networks. We investigate the compression of deep neural networks by quantizing their weights and activations into multiple binary bases, known as multi bit networks (MBNs), which accelerate the inference and reduce the storage for the deployment on low resource mobile and embedded platforms. We propose Adaptive Loss aware Quantization (ALQ), a new MBN quantization pipeline that is able to achieve an average bitwidth below one bit without notable loss in inference accuracy. Unlike previous MBN quantization solutions that train a quantizer by minimizing the error to reconstruct full precision weights, ALQ directly minimizes the quantization induced error on the loss function involving neither gradient approximation nor full precision maintenance. ALQ also exploits strategies including adaptive bitwidth, smooth bitwidth reduction, and iterative trained quantization to allow a smaller network size without loss in accuracy. Experiment results on popular image datasets show that ALQ outperforms state of the art compressed networks in terms of both storage and accuracy. Code is available at https github.com zqu1992 ALQ"} {"_id": [11], "label": "physics.app-ph", "text": "GHz Dielectric Measurement of Powdery TiO. This study experimentally determines the dielectric properties of a powdery titanium (II) oxide (TiO) material within the microwave range (0.1 13.5 GHz). The properties were determined using a coaxial airline method using a TiO paraffin mixture at several loading fractions. A permittivity of 60 for volume fraction below 30 and 100 for volume fraction above were measured."} {"_id": [0], "label": "cs.CV", "text": "Semantic Guided Representation Enhancement for Self supervised Monocular Trained Depth Estimation. Self supervised depth estimation has shown its great effectiveness in producing high quality depth maps given only image sequences as input. However, its performance usually drops when estimating on border areas or objects with thin structures due to the limited depth representation ability. In this paper, we address this problem by proposing a semantic guided depth representation enhancement method, which promotes both local and global depth feature representations by leveraging rich contextual information. In stead of a single depth network as used in conventional paradigms, we propose an extra semantic segmentation branch to offer extra contextual features for depth estimation. Based on this framework, we enhance the local feature representation by sampling and feeding the point based features that locate on the semantic edges to an individual Semantic guided Edge Enhancement module (SEEM), which is specifically designed for promoting depth estimation on the challenging semantic borders. Then, we improve the global feature representation by proposing a semantic guided multi level attention mechanism, which enhances the semantic and depth features by exploring pixel wise correlations in the multi level depth decoding scheme. Extensive experiments validate the distinct superiority of our method in capturing highly accurate depth on the challenging image areas such as semantic category borders and thin objects. Both quantitative and qualitative experiments on KITTI show that our method outperforms the state of the art methods."} {"_id": [21], "label": "math.CO", "text": "The structure of I 4 free and triangle free binary matroids. A simple binary matroid is called I 4 free if none of its rank 4 flats are independent sets. These objects can be equivalently defined as the sets E of points in PG(n 1,2) for which E cap F is not a basis of F for any four dimensional flat F . We prove a decomposition theorem that exactly determines the structure of all I 4 free and triangle free matroids. In particular, our theorem implies that the I 4 free and triangle free matroids have critical number at most 2 ."} {"_id": [0, 41], "label": "cs.RO cs.CV", "text": "BIM assisted object recognition for the on site autonomous robotic assembly of discrete structures. Robots operating autonomous assembly applications in an unstructured environment require precise methods to locate the building components on site. However, the current available object detection systems are not well optimised for construction applications, due to the tedious setups incorporated for referencing an object to a system and inability to cope with the elements imperfections. In this paper, we propose a flexible object pose estimation framework to enable robots to autonomously handle building components on site with an error tolerance to build a specific design target without the need to sort or label them. We implemented an object recognition approach that uses the virtual representation model of all the objects found in a BIM model to autonomously search for the best matched objects in a scene. The design layout is used to guide the robot to grasp and manipulate the found elements to build the desired structure. We verify our proposed framework by testing it in an automatic discrete wall assembly workflow. Although the precision is not as expected, we analyse the possible reasons that might cause this imprecision, which paves the path for future improvements."} {"_id": [59], "label": "cs.SI", "text": "Non Bayesian Social Learning with Imperfect Private Signal Structure. As one of the classic models that describe the belief dynamics over social networks, a non Bayesian social learning model assumes that members in the network possess accurate signal knowledge through the process of Bayesian inference. In order to make the non Bayesian social learning model more applicable to human and animal societies, this paper extended this model by assuming the existence of private signal structure bias. Each social member in each time step uses an imperfect signal knowledge to form its Bayesian part belief and then incorporates its neighbors' beliefs into this Bayesian part belief to form a new belief report. First, we investigated the intrinsic learning ability of an isolated agent and deduced the conditions that the signal structure needs to satisfy for this isolated agent to make an eventually correct decision. According to these conditions, agents' signal structures were further divided into three different types, \"conservative,\" \"radical,\" and \"negative.\" Then, we switched the context from isolated agents to a connected network our propositions and simulations show that the conservative agents are the dominant force for the social network to learn the real state, while the other two types might prevent the network from successful learning. Although fragilities do exist in non Bayesian social learning mechanism, \"be more conservative\" and \"avoid overconfidence\" could be effective strategies for each agent in the real social networks to collectively improve social learning processes and results."} {"_id": [21], "label": "math.CO", "text": "The Inductive Graph Dimension from The Minimum Edge Clique Cover. In this paper we prove that the inductively defined graph dimension has a simple additive property under the join operation. The dimension of the join of two simple graphs is one plus the sum of the dimensions of the component graphs mathrm dim , (G 1 G 2) 1 mathrm dim , G 1 mathrm dim , G 2 . We use this formula to derive an expression for the inductive dimension of an arbitrary finite simple graph from its minimum edge clique cover. A corollary of the formula is that any arbitrary finite simple graph whose maximal cliques are all of order N has dimension N 1 . We finish by finding lower and upper bounds on the inductive dimension of a simple graph in terms of its clique number."} {"_id": [20, 7], "label": "physics.comp-ph cs.NA math.NA", "text": "A Unified Gas kinetic Scheme for Micro Flow Simulation Based on Linearized Kinetic Equation. The flow regime of micro flow varies from collisionless regime to hydrodynamic regime according to the Knudsen number. On the kinetic scale, the dynamics of micro flow can be described by the linearized kinetic equation. In the continuum regime, hydrodynamic equations such as linearized Navier Stokes equations and Euler equations can be derived from the linearized kinetic equation by the Chapman Enskog asymptotic analysis. In this paper, based on the linearized kinetic equation we are going to propose a unified gas kinetic scheme scheme (UGKS) for micro flow simulation, which is an effective multiscale scheme in the whole micro flow regime. The important methodology of UGKS is the following. Firstly, the evolution of microscopic distribution function is coupled with the evolution of macroscopic flow quantities. Secondly, the numerical flux of UGKS is constructed based on the integral solution of kinetic equation, which provides a genuinely multiscale and multidimensional numerical flux. The UGKS recovers the linear kinetic solution in the rarefied regime, and converges to the linear hydrodynamic solution in the continuum regime. An outstanding feature of UGKS is its capability of capturing the accurate viscous solution even when the cell size is much larger than the kinetic kinetic length scale, such as the capturing of the viscous boundary layer with a cell size ten times larger than the particle mean free path. Such a multiscale property is called unified preserving (UP) which has been studied in cite guo2019unified . In this paper, we are also going to give a mathematical proof for the UP property of UGKS."} {"_id": [1, 4, 22], "label": "cs.SE cs.LG cs.NE", "text": "Neural Bug Finding A Study of Opportunities and Challenges. Static analysis is one of the most widely adopted techniques to find software bugs before code is put in production. Designing and implementing effective and efficient static analyses is difficult and requires high expertise, which results in only a few experts able to write such analyses. This paper explores the opportunities and challenges of an alternative way of creating static bug detectors neural bug finding. The basic idea is to formulate bug detection as a classification problem, and to address this problem with neural networks trained on examples of buggy and non buggy code. We systematically study the effectiveness of this approach based on code examples labeled by a state of the art, static bug detector. Our results show that neural bug finding is surprisingly effective for some bug patterns, sometimes reaching a precision and recall of over 80 , but also that it struggles to understand some program properties obvious to a traditional analysis. A qualitative analysis of the results provides insights into why neural bug finders sometimes work and sometimes do not work. We also identify pitfalls in selecting the code examples used to train and validate neural bug finders, and propose an algorithm for selecting effective training data."} {"_id": [0], "label": "cs.CV", "text": "Relation Graph Network for 3D Object Detection in Point Clouds. Convolutional Neural Networks (CNNs) have emerged as a powerful strategy for most object detection tasks on 2D images. However, their power has not been fully realised for detecting 3D objects in point clouds directly without converting them to regular grids. Existing state of art 3D object detection methods aim to recognize 3D objects individually without exploiting their relationships during learning or inference. In this paper, we first propose a strategy that associates the predictions of direction vectors and pseudo geometric centers together leading to a win win solution for 3D bounding box candidates regression. Secondly, we propose point attention pooling to extract uniform appearance features for each 3D object proposal, benefiting from the learned direction features, semantic features and spatial coordinates of the object points. Finally, the appearance features are used together with the position features to build 3D object object relationship graphs for all proposals to model their co existence. We explore the effect of relation graphs on proposals' appearance features enhancement under supervised and unsupervised settings. The proposed relation graph network consists of a 3D object proposal generation module and a 3D relation module, makes it an end to end trainable network for detecting 3D object in point clouds. Experiments on challenging benchmarks ( SunRGB Dand ScanNet datasets ) of 3D point clouds show that our algorithm can perform better than the existing state of the art methods."} {"_id": [9, 42, 13], "label": "math.AP math.DG math.DS", "text": "The convolution algebra of Schwarz kernels on a singular foliation. Motivated by the study of H \"ormander's sums of squares operators and their generalizations, we define the convolution algebra of transverse distributions associated to a singular foliation. We prove that this algebra is represented as continuous linear operators on the spaces of smooth functions and generalized functions on the underlying manifold, and on the leaves and their holonomy covers. This generalizes Schwartz kernel operators to singular foliations. We also define the algebra of smoothing operators in this context and prove that it is a two sided ideal."} {"_id": [40, 1, 2, 3], "label": "cs.CL cs.AI cs.IR cs.LG", "text": "On Data Augmentation for Extreme Multi label Classification. In this paper, we focus on data augmentation for the extreme multi label classification (XMC) problem. One of the most challenging issues of XMC is the long tail label distribution where even strong models suffer from insufficient supervision. To mitigate such label bias, we propose a simple and effective augmentation framework and a new state of the art classifier. Our augmentation framework takes advantage of the pre trained GPT 2 model to generate label invariant perturbations of the input texts to augment the existing training data. As a result, it present substantial improvements over baseline models. Our contributions are two factored (1) we introduce a new state of the art classifier that uses label attention with RoBERTa and combine it with our augmentation framework for further improvement (2) we present a broad study on how effective are different augmentation methods in the XMC task."} {"_id": [24], "label": "math.MG", "text": "Characterizations of the sphere by means of visual cones an alternative proof of Matsuura's theorem. In this work we prove that if there exists a smooth convex body M in the Euclidean space mathbb R n , n geq 3 , contained in the interior of the unit ball mathbb S n 1 of mathbb R n , and point p in mathbb R n such that, for each point of mathbb S n 1 , M looks centrally symmetric and p appears as the centre, then M is an sphere."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "BERT Fine tuning For Arabic Text Summarization. Fine tuning a pretrained BERT model is the state of the art method for extractive abstractive text summarization, in this paper we showcase how this fine tuning method can be applied to the Arabic language to both construct the first documented model for abstractive Arabic text summarization and show its performance in Arabic extractive summarization. Our model works with multilingual BERT (as Arabic language does not have a pretrained BERT of its own). We show its performance in English corpus first before applying it to Arabic corpora in both extractive and abstractive tasks."} {"_id": [56, 57], "label": "cs.LO cs.PL", "text": "A Complete Approach to Loop Verification with Invariants and Summaries. Invariants are the predominant approach to verify the correctness of loops. As an alternative, loop contracts, which make explicit the premise and conclusion of the underlying induction proof, can sometimes capture correctness conditions more naturally. But despite this advantage, the second approach receives little attention overall, and the goal of this paper is to lift it out of its niche. We give the first comprehensive exposition of the theory of loop contracts, including a characterization of its completeness. We show concrete examples on standard algorithms that showcase their relative merits. Moreover, we demonstrate a novel constructive translation between the two approaches, which decouples the chosen specification approach from the verification backend."} {"_id": [20], "label": "math.NA cs.NA", "text": "A fast adaptive algorithm for scattering from a two dimensional radially symmetric potential. In the present paper we describe a simple black box algorithm for efficiently and accurately solving scattering problems related to the scattering of time harmonic waves from radially symmetric potentials in two dimensions. The method uses FFTs to convert the problem into a set of decoupled second kind Fredholm integral equations for the Fourier coefficients of the scattered field. Each of these integral equations are solved using scattering matrices, which exploit certain low rank properties of the integral operators associated with the integral equations. The performance of the algorithm is illustrated with several numerical examples including scattering from singular and discontinuous potentials. Finally, the above approach can be easily extended to time dependent problems. After outlining the necessary modifications we show numerical experiments illustrating the performance of the algorithm in this setting."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Rank over Class The Untapped Potential of Ranking in Natural Language Processing. Text classification has long been a staple within Natural Language Processing (NLP) with applications spanning across diverse areas such as sentiment analysis, recommender systems and spam detection. With such a powerful solution, it is often tempting to use it as the go to tool for all NLP problems since when you are holding a hammer, everything looks like a nail. However, we argue here that many tasks which are currently addressed using classification are in fact being shoehorned into a classification mould and that if we instead address them as a ranking problem, we not only improve the model, but we achieve better performance. We propose a novel end to end ranking approach consisting of a Transformer network responsible for producing representations for a pair of text sequences, which are in turn passed into a context aggregating network outputting ranking scores used to determine an ordering to the sequences based on some notion of relevance. We perform numerous experiments on publicly available datasets and investigate the applications of ranking in problems often solved using classification. In an experiment on a heavily skewed sentiment analysis dataset, converting ranking results to classification labels yields an approximately 22 improvement over state of the art text classification, demonstrating the efficacy of text ranking over text classification in certain scenarios."} {"_id": [1, 83], "label": "cs.MM cs.LG", "text": "Study on the Assessment of the Quality of Experience of Streaming Video. Dynamic adaptive streaming over HTTP provides the work of most multimedia services, however, the nature of this technology further complicates the assessment of the QoE (Quality of Experience). In this paper, the influence of various objective factors on the subjective estimation of the QoE of streaming video is studied. The paper presents standard and handcrafted features, shows their correlation and p Value of significance. VQA (Video Quality Assessment) models based on regression and gradient boosting with SRCC reaching up to 0.9647 on the validation subsample are proposed. The proposed regression models are adapted for applied applications (both with and without a reference video) the Gradient Boosting Regressor model is perspective for further improvement of the quality estimation model. We take SQoE III database, so far the largest and most realistic of its kind. The VQA (video quality assessment) models are available at https github.com AleksandrIvchenko QoE assesment"} {"_id": [1, 39], "label": "cs.CY cs.LG", "text": "Mining Student Responses to Infer Student Satisfaction Predictors. The identification and analysis of student satisfaction is a challenging issue. This is becoming increasingly important since a measure of student satisfaction is taken as an indication of how well a course has been taught. However, it remains a challenging problem as student satisfaction has various aspects. In this paper, we formulate the student satisfaction estimation as a prediction problem where we predict different levels of student satisfaction and infer the influential predictors related to course and instructor. We present five different aspects of student satisfaction in terms of 1) course content, 2) class participation, 3) achievement of initial expectations about the course, 4) relevancy towards professional development, and 5) if the course connects them and helps to explore the real world situations. We employ state of the art machine learning techniques to predict each of these aspects of student satisfaction levels. For our experiment, we utilize a large student evaluation dataset which includes student perception using different attributes related to courses and the instructors. Our experimental results and comprehensive analysis reveal that student satisfaction is more influenced by course attributes in comparison to instructor related attributes."} {"_id": [37], "label": "cs.FL", "text": "State Complexity of the Multiples of the Thue Morse Set. The Thue Morse set T is the set of those non negative integers whose binary expansions have an even number of 1. The name of this set comes from the fact that its characteristic sequence is given by the famous Thue Morse word abbabaabbaababba..., which is the fixed point starting with a of the word morphism sending a to ab and b to ba. The numbers in T are sometimes called the evil numbers. We obtain an exact formula for the state complexity (i.e. the number of states of its minimal automaton) of the multiplication by a constant of the Thue Morse set with respect to any integer base b which is a power of 2. Our proof is constructive and we are able to explicitly provide the minimal automaton of the language of all 2 p expansions of the set mT for any positive integers m and p. The used method is general for any b recognizable set of integers. As an application, we obtain a decision procedure running in quadratic time for the problem of deciding whether a given 2 p recognizable set is equal to some multiple of the Thue Morse set."} {"_id": [1], "label": "cs.LG", "text": "Joint Adaptive Graph and Structured Sparsity Regularization for Unsupervised Feature Selection. Feature selection is an important data preprocessing in data mining and machine learning which can be used to reduce the feature dimension without deteriorating model's performance. Since obtaining annotated data is laborious or even infeasible in many cases, unsupervised feature selection is more practical in reality. Though lots of methods for unsupervised feature selection have been proposed, these methods select features independently, thus it is no guarantee that the group of selected features is optimal. What's more, the number of selected features must be tuned carefully to obtain a satisfactory result. To tackle these problems, we propose a joint adaptive graph and structured sparsity regularization unsupervised feature selection (JASFS) method in this paper, in which a l 2,0 norm regularization term with respect to transformation matrix is imposed in the manifold learning for feature selection, and a graph regularization term is incorporated into the learning model to learn the local geometric structure of data adaptively. An efficient and simple iterative algorithm is designed to solve the proposed optimization problem with the analysis of computational complexity. After optimized, a subset of optimal features will be selected in group, and the number of selected features will be determined automatically. Experimental results on eight benchmarks demonstrate the effectiveness and efficiency of the proposed method compared with several state of the art approaches."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Task Programming Learning Data Efficient Behavior Representations. Specialized domain knowledge is often necessary to accurately annotate training sets for in depth analysis, but can be burdensome and time consuming to acquire from domain experts. This issue arises prominently in automated behavior analysis, in which agent movements or actions of interest are detected from video tracking data. To reduce annotation effort, we present TREBA a method to learn annotation sample efficient trajectory embedding for behavior analysis, based on multi task self supervised learning. The tasks in our method can be efficiently engineered by domain experts through a process we call \"task programming\", which uses programs to explicitly encode structured knowledge from domain experts. Total domain expert effort can be reduced by exchanging data annotation time for the construction of a small number of programmed tasks. We evaluate this trade off using data from behavioral neuroscience, in which specialized domain knowledge is used to identify behaviors. We present experimental results in three datasets across two domains mice and fruit flies. Using embeddings from TREBA, we reduce annotation burden by up to a factor of 10 without compromising accuracy compared to state of the art features. Our results thus suggest that task programming and self supervision can be an effective way to reduce annotation effort for domain experts."} {"_id": [11], "label": "physics.app-ph", "text": "Negative Capacitance Enables FinFET Scaling Beyond 3nm Node. A comprehensive study of the scaling of negative capacitance FinFET (NC FinFET) is conducted with TCAD. We show that the NC FinFET can be scaled to \"2.1nm node\" and almost \"1.5nm node\" that comes two nodes after the industry \"3nm node,\" which has 16nm Lg and is the last FinFET node according to the International Roadmap for Devices and Systems (IRDS). In addition, for the intervening nodes, NC FinFET can meet IRDS Ion and Ioff target at target beating VDD. The benefits of negative capacitance (NC) include improved subthreshold slope (SS), drain induced barrier lowering (DIBL), Vt roll off, transconductance over Id (Gm Id), output conductance over Id (Gd Id), and lower VDD. Further scaling may be achieved by improving capacitance matching between ferroelectric (FE) and dielectric (DE)."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "DeepHateExplainer Explainable Hate Speech Detection in Under resourced Bengali Language. The exponential growths of social media and micro blogging sites not only provide platforms for empowering freedom of expressions and individual voices, but also enables people to express anti social behaviour like online harassment, cyberbullying, and hate speech. Numerous works have been proposed to utilize textual data for social and anti social behaviour analysis, by predicting the contexts mostly for highly resourced languages like English. However, some languages are under resourced, e.g., South Asian languages like Bengali, that lack computational resources for accurate natural language processing (NLP). In this paper, we propose an explainable approach for hate speech detection from the under resourced Bengali language, which we called DeepHateExplainer. Bengali texts are first comprehensively preprocessed, before classifying them into political, personal, geopolitical, and religious hates using a neural ensemble method of transformer based neural architectures (i.e., monolingual Bangla BERT base, multilingual BERT cased uncased, and XLM RoBERTa). Important(most and least) terms are then identified using sensitivity analysis and layer wise relevance propagation(LRP), before providing human interpretable explanations. Finally, we compute comprehensiveness and sufficiency scores to measure the quality of explanations w.r.t faithfulness. Evaluations against machine learning (linear and tree based models) and neural networks (i.e., CNN, Bi LSTM, and Conv LSTM with word embeddings) baselines yield F1 scores of 78 , 91 , 89 , and 84 , for political, personal, geopolitical, and religious hates, respectively, outperforming both ML and DNN baselines."} {"_id": [78], "label": "math.AC", "text": "Covering classes and 1 tilting cotorsion pairs over commutative rings. We are interested in characterising the commutative rings for which a 1 tilting cotorsion pair ( mathcal A , mathcal T ) provides for covers, that is when the class mathcal A is a covering class. We use Hrbek's bijective correspondence between the 1 tilting cotorsion pairs over a commutative ring R and the faithful finitely generated Gabriel topologies on R . Moreover, we use results of Bazzoni Positselski, in particular a generalisation of Matlis equivalence and their characterisation of covering classes for 1 tilting cotorsion pairs arising from flat injective ring epimorphisms. Explicitly, if mathcal G is the Gabriel topology associated to the 1 tilting cotorsion pair ( mathcal A , mathcal T ) , and R mathcal G is the ring of quotients with respect to mathcal G , we show that if mathcal A is covering then mathcal G is a perfect localisation (in Stenstr \"om's sense) and the localisation R mathcal G has projective dimension at most one. Moreover, we show that mathcal A is covering if and only if both the localisation R mathcal G and the quotient rings R J are perfect rings for every J in mathcal G . Rings satisfying the latter two conditions are called mathcal G almost perfect."} {"_id": [32, 62], "label": "cs.DS cs.GT", "text": "Random Order Models. This chapter introduces the emph random order model in online algorithms. In this model, the input is chosen by an adversary, then randomly permuted before being presented to the algorithm. This reshuffling often weakens the power of the adversary and allows for improved algorithmic guarantees. We show such improvements for two broad classes of problems packing problems where we must pick a constrained set of items to maximize total value, and covering problems where we must satisfy given requirements at minimum total cost. We also discuss how random order model relates to other stochastic models used for non worst case competitive analysis."} {"_id": [13], "label": "math.DS", "text": "Hadamard type fractional time delay semilinear differential equations Delayed Mittag Leffler function approach. We propose a delayed Mittag Leffler type matrix function with logarithm, which is an extension of the classical Mittag Leffler type matrix function with logarithm and delayed Mittag Leffler type matrix function. With the help of the delayed Mittag Leffler type matrix function with logarithm, we give an explicit form a of solutions to nonhomogeneous Hadamard type fractional time delay linear differential equations. Moreover, we study existence uniqueness and stability in Ulam Hyers sense of the Hadamard type fractional time delay nonlinear equations."} {"_id": [11], "label": "physics.app-ph", "text": "Realizing an Isotropically Coercive Magnetic Layer for Memristive Applications by Analogy to Dry Friction. We investigate the possibility of realizing a spintronic memristive device based on the dependence of the tunnel conductance on the relative angle between the magnetization of the two magnetic electrodes in in plane magnetized tunnel junctions. For this, it is necessary to design a free layer whose magnetization can be stabilized along several or even any in plane direction between the parallel and the antiparallel magnetic configurations. We experimentally show that this can be achieved by exploiting antiferromagnet ferromagnet exchange interactions in a regime where the antiferromagnet is thin enough to induce enhanced coercivity and no exchange bias. The frustration of exchange interactions at the interfaces due to competing ferro and antiferromagnetic interactions is at the origin of an isotropic dissipation mechanism yielding isotropic coercivity. From a modeling point of view, it is shown that this isotropic dissipation can be described by a dry friction term in the Landau Lifshitz Gilbert equation. The influence of this dry friction term on the magnetization dynamics of an in plane magnetized layer submitted to a rotating in plane field is investigated both analytically and numerically. The possibility to control the free layer magnetization orientation in an in plane magnetized magnetic tunnel junction by using the spin transfer torque from an additional perpendicular polarizer is also investigated through macrospin simulation. It is shown that the memristor function can be achieved by the injection of current pulses through the stack in the presence of an in plane static field transverse to the reference layer magnetization, the aim of which is to limit the magnetization rotation between 0 deg and 180 deg ."} {"_id": [0, 1, 41], "label": "cs.CV cs.LG cs.RO", "text": "Inferring Spatial Uncertainty in Object Detection. The availability of real world datasets is the prerequisite for developing object detection methods for autonomous driving. While ambiguity exists in object labels due to error prone annotation process or sensor observation noises, current object detection datasets only provide deterministic annotations without considering their uncertainty. This precludes an in depth evaluation among different object detection methods, especially for those that explicitly model predictive probability. In this work, we propose a generative model to estimate bounding box label uncertainties from LiDAR point clouds, and define a new representation of the probabilistic bounding box through spatial distribution. Comprehensive experiments show that the proposed model represents uncertainties commonly seen in driving scenarios. Based on the spatial distribution, we further propose an extension of IoU, called the Jaccard IoU (JIoU), as a new evaluation metric that incorporates label uncertainty. Experiments on the KITTI and the Waymo Open Datasets show that JIoU is superior to IoU when evaluating probabilistic object detectors."} {"_id": [41], "label": "cs.RO", "text": "Occlusion Robust MVO Multimotion Estimation Through Occlusion Via Motion Closure. Visual motion estimation is an integral and well studied challenge in autonomous navigation. Recent work has focused on addressing multimotion estimation, which is especially challenging in highly dynamic environments. Such environments not only comprise multiple, complex motions but also tend to exhibit significant occlusion. Previous work in object tracking focuses on maintaining the integrity of object tracks but usually relies on specific appearance based descriptors or constrained motion models. These approaches are very effective in specific applications but do not generalize to the full multimotion estimation problem. This paper presents a pipeline for estimating multiple motions, including the camera egomotion, in the presence of occlusions. This approach uses an expressive motion prior to estimate the SE (3) trajectory of every motion in the scene, even during temporary occlusions, and identify the reappearance of motions through motion closure. The performance of this occlusion robust multimotion visual odometry (MVO) pipeline is evaluated on real world data and the Oxford Multimotion Dataset."} {"_id": [38], "label": "math.NT", "text": "An exponential Diophantine equation related to the difference of powers of two Fibonacci numbers. In this paper, we prove that there is no x 4 such that the difference of x th powers of two consecutive Fibonacci numbers greater than 0 is a Lucas number."} {"_id": [24, 21, 38], "label": "math.MG math.CO math.NT", "text": "Deciding multiple tiling by polygons in polynomial time. Suppose P is a symmetric convex polygon in the plane. We give a polynomial time algorithm that decides if P can tile the plane by transations at some level (not necessarily at level one this is multiple tiling). The main technical contribution is a polynomial time algorithm that selects, if this is possible, for each j 1,2, ldots,n one of two given vectors e j or tau j so that the selection spans a discrete additive subgroup."} {"_id": [9, 49, 62, 1], "label": "math.AP cs.GT cs.LG math.OC", "text": "Prediction with Expert Advice a PDE Perspective. This work addresses a classic problem of online prediction with expert advice. We assume an adversarial opponent, and we consider both the finite horizon and random stopping versions of this zero sum, two person game. Focusing on an appropriate continuum limit and using methods from optimal control, we characterize the value of the game as the viscosity solution of a certain nonlinear partial differential equation. The analysis also reveals the predictor's and the opponent's minimax optimal strategies. Our work provides, in particular, a continuum perspective on recent work of Gravin, Peres, and Sivan (Proc SODA 2016). Our techniques are similar to those of Kohn and Serfaty (Comm Pure Appl Math 2010), where scaling limits of some two person games led to elliptic or parabolic PDEs."} {"_id": [1], "label": "cs.LG", "text": "Prediction of Hemolysis Tendency of Peptides using a Reliable Evaluation Method. There are numerous peptides discovered through past decades, which exhibit antimicrobial and anti cancerous tendencies. Due to these reasons, peptides are supposed to be sound therapeutic candidates. Some peptides can pose low metabolic stability, high toxicity and high hemolity of peptides. This highlights the importance for evaluating hemolytic tendencies and toxicity of peptides, before using them for therapeutics. Traditional methods for evaluation of toxicity of peptides can be time consuming and costly. In this study, we have extracted peptides data (Hemo DB) from Database of Antimicrobial Activity and Structure of Peptides (DBAASP) based on certain hemolity criteria and we present a machine learning based method for prediction of hemolytic tendencies of peptides (i.e. Hemolytic or Non Hemolytic). Our model offers significant improvement on hemolity prediction benchmarks. we also propose a reliable clustering based train tests splitting method which ensures that no peptide in train set is more than 40 similar to any peptide in test set. Using this train test split, we can get reliable estimated of expected model performance on unseen data distribution or newly discovered peptides. Our model tests 0.9986 AUC ROC (Area Under Receiver Operating Curve) and 97.79 Accuracy on test set of Hemo DB using traditional random train test splitting method. Moreover, our model tests AUC ROC of 0.997 and Accuracy of 97.58 while using clustering based train test data split. Furthermore, we check our model on an unseen data distribution (at Hemo PI 3) and we recorded 0.8726 AUC ROC and 79.5 accuracy. Using the proposed method, potential therapeutic peptides can be screened, which may further in therapeutics and get reliable predictions for unseen amino acids distribution of peptides and newly discovered peptides."} {"_id": [16, 20], "label": "math.NA cs.NA q-bio.QM", "text": "On the two step estimation of the cross power spectrum for dynamical inverse problems. We consider the problem of reconstructing the cross power spectrum of an unobservable multivariate stochatic process from indirect measurements of a second multivariate stochastic process, related to the first one through a linear operator. In the two step approach, one would first compute a regularized reconstruction of the unobservable signal, and then compute an estimate of its cross power spectrum from the regularized solution. We investigate whether the optimal regularization parameter for reconstruction of the signal also gives the best estimate of the cross power spectrum. We show that the answer depends on the regularization method, and specifically we prove that, under a white Gaussian assumption (i) when regularizing with truncated SVD the optimal parameter is the same (ii) when regularizing with the Tikhonov method, the optimal parameter for the cross power spectrum is lower than half the optimal parameter for the signal. We also provide evidence that a one step approach would likely have better mathematical properties of the two step approach. Our results apply particularly to the brain connectivity estimation from magneto electro encephalographic recordings and provide a formal interpretation of recent empirical results."} {"_id": [29], "label": "math.GR", "text": "Paramedial quasigroups of prime and prime square order. We prove that, for every odd prime number p , there are 2p 1 paramedial quasigroups of order p and 6p 2 p 1 paramedial quasigroups of order p 2 , up to isomorphism. We present a complete list of those which are simple."} {"_id": [40, 1], "label": "cs.IR cs.LG", "text": "Representation Extraction and Deep Neural Recommendation for Collaborative Filtering. Many Deep Learning approaches solve complicated classification and regression problems by hierarchically constructing complex features from the raw input data. Although a few works have investigated the application of deep neural networks in recommendation domain, they mostly extract entity features by exploiting unstructured auxiliary data such as visual and textual information, and when it comes to using user item rating matrix, feature extraction is done by using matrix factorization. As matrix factorization has some limitations, some works have been done to replace it with deep neural network. but these works either need to exploit unstructured data such item's reviews or images, or are specially designed to use implicit data and don't take user item rating matrix into account. In this paper, we investigate the usage of novel representation learning algorithms to extract users and items representations from rating matrix, and offer a deep neural network for Collaborative Filtering. Our proposed approach is a modular algorithm consisted of two main phases REpresentation eXtraction and a deep neural NETwork (RexNet). Using two joint and parallel neural networks in RexNet enables it to extract a hierarchy of features for each entity in order to predict the degree of interest of users to items. The resulted predictions are then used for the final recommendation. Unlike other deep learning recommendation approaches, RexNet is not dependent to unstructured auxiliary data such as visual and textual information, instead, it uses only the user item rate matrix as its input. We evaluated RexNet in an extensive set of experiments against state of the art recommendation methods. The results show that RexNet significantly outperforms the baseline algorithms in a variety of data sets with different degrees of density."} {"_id": [0], "label": "cs.CV", "text": "SAMA VTOL A new unmanned aircraft system for remotely sensed data collection. In recent years, unmanned aircraft systems (UASs) are frequently used in many different applications of photogrammetry such as building damage monitoring, archaeological mapping and vegetation monitoring. In this paper, a new state of the art vertical take off and landing fixed wing UAS is proposed to robust photogrammetry missions, called SAMA VTOL. In this study, the capability of SAMA VTOL is investigated for generating orthophoto. The major stages are including designing, building and experimental scenario. First, a brief description of design and build is introduced. Next, an experiment was done to generate accurate orthophoto with minimum ground control points requirements. The processing step, which includes automatic aerial triangulation with camera calibration and model generation. In this regard, the Pix4Dmapper software was used to orientate the images, produce point clouds, creating digital surface model and generating orthophoto mosaic. Experimental results based on the test area covering 26.3 hectares indicate that our SAMA VTOL performs well in the orthophoto mosaic task."} {"_id": [37, 22], "label": "cs.SE cs.FL", "text": "Towards Readability Aspects of Probabilistic Mode Automata. This paper presents a new approach and design model targeting hybrid designer and operator defined performance budgets for timing and energy consumption. The approach is based on Petri Nets formalism. As the cognitive load is typically high while using formal methods, this increases the chances of mistakes. Our approach is focused on the readability aspects and aims to decrease the cognitive load of developers. We illustrate the proposed approach on example of a sample embedded multi media system, a modern digital camera."} {"_id": [7], "label": "physics.comp-ph", "text": "A Coupled lattice Boltzmann Multiparticle collision method for multi resolution hydrodynamics. In this work we discuss the coupling of two mesoscopic approaches for fluid dynamics, namely the lattice Boltzmann method (LB) and the multiparticle collision dynamics (MPCD) cite kapral2008multiparticle to design a new class of flexible and efficient multiscale schemes based on a dual representation of the fluid observables. At variance with other commonly used multigrid methods, mostly oriented to high Reynolds and turbulent flows, the present approach is designed to capture the physics at the smallest scales whenever the lattice Boltzmann alone falls short of providing the correct physical information due to a lack of resolution, as it occurs for example in thin films between interacting bubbles or droplets in microfluidic crystals. The coupling strategies employed to pass the hydrodynamic information between the LB and the MPCD are detailed and the algorithm is tested against the steady isothermal Poiseuille flow problem for different coupling configurations."} {"_id": [96], "label": "q-fin.PM", "text": "The Case for Long Only Agnostic Allocation Portfolios. We advocate the use of Agnostic Allocation for the construction of long only portfolios of stocks. We show that Agnostic Allocation Portfolios (AAPs) are a special member of a family of risk based portfolios that are able to mitigate certain extreme features (excess concentration, high turnover, strong exposure to low risk factors) of classical portfolio construction methods, while achieving similar performance. AAPs thus represent a very attractive alternative risk based portfolio construction framework that can be implemented in different situations, with or without an active trading signal."} {"_id": [0], "label": "cs.CV", "text": "Efficient Scene Text Detection with Textual Attention Tower. Scene text detection has received attention for years and achieved an impressive performance across various benchmarks. In this work, we propose an efficient and accurate approach to detect multioriented text in scene images. The proposed feature fusion mechanism allows us to use a shallower network to reduce the computational complexity. A self attention mechanism is adopted to suppress false positive detections. Experiments on public benchmarks including ICDAR 2013, ICDAR 2015 and MSRA TD500 show that our proposed approach can achieve better or comparable performances with fewer parameters and less computational cost."} {"_id": [13], "label": "math.DS", "text": "On a linearly damped 2 body problem. The usual equation for both motions of a single planet around the sun and electrons in the deterministic Rutherford Bohr atomic model is conservative with a singular potential at the origin. When a dissipation is added, new phenomena appear. It is shown that whenever the momentum is not zero, the moving particle does not reach the center in finite time and its displacement does not blow up either, even in the classical context where arbitrarily large velocities are allowed. Moreover we prove that all bounded solutions tend to 0 for t large, and some formal calculations suggest the existence of special orbits with an asymptotically spiraling exponentially fast convergence to the center."} {"_id": [9], "label": "math.AP", "text": "A Fisher KPP model with a fast diffusion line in periodic media. We treat a model of population dynamics in a periodic environment presenting a fast diffusion line. This phenomenon is modelled via a \"road field\" system, which is a system of coupled reaction diffusion equations set in domains of different dimensions. Here, we consider for the first time the case of a reaction term depending on a spatial variable in a periodic fashion, which is of great interest for both its mathematical difficulties and for its applications. We derive necessary and sufficient conditions for the survival of the species in terms of the sign of a suitable generalised principal eigenvalue. Moreover, we compare the long time behaviour of a population in the same environment without the fast diffusion line, finding that this element has no impact on the survival chances."} {"_id": [0], "label": "cs.CV", "text": "A Novel Teacher Student Learning Framework For Occluded Person Re Identification. Person re identification (re id) has made great progress in recent years, but occlusion is still a challenging problem which significantly degenerates the identification performance. In this paper, we design a teacher student learning framework to learn an occlusion robust model from the full body person domain to the occluded person domain. Notably, the teacher network only uses large scale full body person data to simulate the learning process of occluded person re id. Based on the teacher network, the student network then trains a better model by using inadequate real world occluded person data. In order to transfer more knowledge from the teacher network to the student network, we equip the proposed framework with a co saliency network and a cross domain simulator. The co saliency network extracts the backbone features, and two separated collaborative branches are followed by the backbone. One branch is a classification branch for identity recognition and the other is a co saliency branch for guiding the network to highlight meaningful parts without any manual annotation. The cross domain simulator generates artificial occlusions on full body person data under a growing probability so that the teacher network could train a cross domain model by observing more and more occluded cases. Experiments on four occluded person re id benchmarks show that our method outperforms other state of the art methods."} {"_id": [21], "label": "math.CO", "text": "Counting Phylogenetic Networks of level 1 and 2. Phylogenetic networks generalize phylogenetic trees, and have been introduced in order to describe evolution in the case of transfer of genetic material between coexisting species. There are many classes of phylogenetic networks, which can all be modeled as families of graphs with labeled leaves. In this paper, we focus on rooted and unrooted level k networks and provide enumeration formulas (exact and asymptotic) for rooted and unrooted level 1 and level 2 phylogenetic networks with a given number of leaves. We also prove that the distribution of some parameters of these networks (such as their number of cycles) are asymptotically normally distributed. These results are obtained by first providing a recursive description (also called combinatorial specification) of our networks, and by next applying classical methods of enumerative, symbolic and analytic combinatorics."} {"_id": [49], "label": "math.OC", "text": "A survey on sufficient optimality conditions for delayed optimal control problems. The aim of this work is to make a survey on recent sufficient optimality conditions for optimal control problems with time delays in both state and control variables. The results are obtained by transforming delayed optimal control problems into equivalent non delayed problems. Such approach allows to use standard theorems that ensure sufficient optimality conditions for non delayed optimal control problems. Examples are given with the purpose to illustrate the results."} {"_id": [69], "label": "math.QA", "text": "The Elliptic Drinfeld Center of a Premodular Category. Given a tensor category C, one constructs its Drinfeld center Z(C) which is a braided tensor category, having as objects pairs (X, lambda), where X in Obj(C) and lambda is a half braiding. For a premodular category C, we construct a new category Zel(C) which we call the Elliptic Drinfeld Center, which has objects (X, lambda1, lambda2), where the lambda i's are half braidings that satisfy some compatibility conditions. We discuss an SL2(Z) action on Zel(C) that is related to the anomaly appearing in Reshetikhin Turaev theory. This construction is motivated from the study of the extended Crane Yetter TQFT, in particular the category associated to the once punctured torus."} {"_id": [9], "label": "math.AP", "text": "Rigorous derivation of a linear sixth order thin film equation as a reduced model for thin fluid thin structure interaction problems. We analyze a linear 3D 3D fluid structure interaction problem between a thin layer of a viscous fluid and a thin elastic plate like structure with the aim of deriving a simplified reduced model. Based on suitable energy dissipation inequalities quantified in terms of two small parameters, thickness of the fluid layer and thickness of the elastic structure, we identify the right relation between the system coefficients and small parameters which eventually provide a reduced model on the vanishing limit. The reduced model is a linear sixth order thin film equation describing the out of plane displacement of the structure, which is justified in terms of weak convergence results relating its solution to the solutions of the original fluid structure interaction problem. Furthermore, approximate solutions to the fluid structure interaction problem are reconstructed from the reduced model and quantitative error estimates are obtained, which provide even strong convergence results."} {"_id": [4], "label": "cs.NE", "text": "Coevolution of Generative Adversarial Networks. Generative adversarial networks (GAN) became a hot topic, presenting impressive results in the field of computer vision. However, there are still open problems with the GAN model, such as the training stability and the hand design of architectures. Neuroevolution is a technique that can be used to provide the automatic design of network architectures even in large search spaces as in deep neural networks. Therefore, this project proposes COEGAN, a model that combines neuroevolution and coevolution in the coordination of the GAN training algorithm. The proposal uses the adversarial characteristic between the generator and discriminator components to design an algorithm using coevolution techniques. Our proposal was evaluated in the MNIST dataset. The results suggest the improvement of the training stability and the automatic discovery of efficient network architectures for GANs. Our model also partially solves the mode collapse problem."} {"_id": [35], "label": "math.RA", "text": "The condition for a cyclic code over Z4 of odd length to have a complementary dual. We show that a necessary and sufficient condition for a cyclic code C over Z4 of odd length to be an LCD code is that C (f(x)) where f is a self reciprocal polynomial in Z4 X ."} {"_id": [3], "label": "cs.CL", "text": "The Trumpiest Trump? Identifying a Subject's Most Characteristic Tweets. The sequence of documents produced by any given author varies in style and content, but some documents are more typical or representative of the source than others. We quantify the extent to which a given short text is characteristic of a specific person, using a dataset of tweets from fifteen celebrities. Such analysis is useful for generating excerpts of high volume Twitter profiles, and understanding how representativeness relates to tweet popularity. We first consider the related task of binary author detection (is x the author of text T?), and report a test accuracy of 90.37 for the best of five approaches to this problem. We then use these models to compute characterization scores among all of an author's texts. A user study shows human evaluators agree with our characterization model for all 15 celebrities in our dataset, each with p value 0.05. We use these classifiers to show surprisingly strong correlations between characterization scores and the popularity of the associated texts. Indeed, we demonstrate a statistically significant correlation between this score and tweet popularity (likes replies retweets) for 13 of the 15 celebrities in our study."} {"_id": [1, 2, 3], "label": "cs.CL cs.AI cs.LG", "text": "Affect Driven Dialog Generation. The majority of current systems for end to end dialog generation focus on response quality without an explicit control over the affective content of the responses. In this paper, we present an affect driven dialog system, which generates emotional responses in a controlled manner using a continuous representation of emotions. The system achieves this by modeling emotions at a word and sequence level using (1) a vector representation of the desired emotion, (2) an affect regularizer, which penalizes neutral words, and (3) an affect sampling method, which forces the neural network to generate diverse words that are emotionally relevant. During inference, we use a reranking procedure that aims to extract the most emotionally relevant responses using a human in the loop optimization process. We study the performance of our system in terms of both quantitative (BLEU score and response diversity), and qualitative (emotional appropriateness) measures."} {"_id": [50], "label": "physics.med-ph", "text": "Dual energy X ray dark field material decomposition. Dual energy imaging is a clinically well established technique that offers several advantages over conventional X ray imaging. By performing measurements with two distinct X ray spectra, differences in energy dependent attenuation are exploited to obtain material specific information. This information is used in various imaging applications to improve clinical diagnosis. In recent years, grating based X ray dark field imaging has received increasing attention in the imaging community. The X ray dark field signal originates from ultra small angle scattering within an object and thus provides information about the microstructure far below the spatial resolution of the imaging system. This property has led to a number of promising future imaging applications that are currently being investigated. However, different microstructures can hardly be distinguished with current X ray dark field imaging techniques, since the detected dark field signal only represents the total amount of ultra small angle scattering. To overcome these limitations, we present a novel concept called dual energy X ray dark field material decomposition, which transfers the basic material decomposition approach from attenuation based dual energy imaging to the dark field imaging modality. We develop a physical model and algorithms for dual energy dark field material decomposition and evaluate the proposed concept in experimental measurements. Our results suggest that by sampling the energy dependent dark field signal with two different X ray spectra, a decomposition into two different microstructured materials is possible. Similar to dual energy imaging, the additional microstructure specific information could be useful for clinical diagnosis."} {"_id": [46], "label": "math.AG", "text": "Field generators in two variables and birational endomorphisms of mathbb A 2 . This article is a survey of two subjects the first part is devoted to field generators in two variables, and the second to birational endomorphisms of the affine plane. Each one of these subjects originated in Abhyankar's seminar in Purdue University in the 1970s. Note that the part on field generators is more than a survey, since it contains a considerable amount of new material."} {"_id": [0], "label": "cs.CV", "text": "Context Aware Image Matting for Simultaneous Foreground and Alpha Estimation. Natural image matting is an important problem in computer vision and graphics. It is an ill posed problem when only an input image is available without any external information. While the recent deep learning approaches have shown promising results, they only estimate the alpha matte. This paper presents a context aware natural image matting method for simultaneous foreground and alpha matte estimation. Our method employs two encoder networks to extract essential information for matting. Particularly, we use a matting encoder to learn local features and a context encoder to obtain more global context information. We concatenate the outputs from these two encoders and feed them into decoder networks to simultaneously estimate the foreground and alpha matte. To train this whole deep neural network, we employ both the standard Laplacian loss and the feature loss the former helps to achieve high numerical performance while the latter leads to more perceptually plausible results. We also report several data augmentation strategies that greatly improve the network's generalization performance. Our qualitative and quantitative experiments show that our method enables high quality matting for a single natural image. Our inference codes and models have been made publicly available at https github.com hqqxyy Context Aware Matting."} {"_id": [42, 13], "label": "math.DG math.DS", "text": "Self focal points of ellipsoids of dimension geq 3 . A self focal point of a Riemannian manifold (M,g) is a point p so that every geodesic starting from p returns to p at some positive time. It is called a pole if all geodesics through p are closed, and a non polar self focal point if all geodesics loop back but not all are smoothly closed. Umbilic points of two dimensional tri axial ellipsoids are non polar self focal points. Little is known about existence of self focal points for Riemannian manifolds of dimension geq 3 . We prove that ellipsoids of dimension geq 3 with at least 4 distinct axes have no self focal points. Certain ellipsoids of dimension geq 3 with three distinct axes do have non polar self focal points. Ellipsoids with leq 2 distinct axes always have self focal points. Self focal points play an important role in the study of L infty norms of Laplace eigenfunctions. Our results imply that Laplace eigenfunctions on ellipsoids of dimension geq 3 with at least 4 distinct axes never achieve maximal sup norm growth."} {"_id": [40, 2, 3], "label": "cs.IR cs.AI cs.CL", "text": "NeuType A Simple and Effective Neural Network Approach for Predicting Missing Entity Type Information in Knowledge Bases. Knowledge bases store information about the semantic types of entities, which can be utilized in a range of information access tasks. This information, however, is often incomplete, due to new entities emerging on a daily basis. We address the task of automatically assigning types to entities in a knowledge base from a type taxonomy. Specifically, we present two neural network architectures, which take short entity descriptions and, optionally, information about related entities as input. Using the DBpedia knowledge base for experimental evaluation, we demonstrate that these simple architectures yield significant improvements over the current state of the art."} {"_id": [22], "label": "cs.SE", "text": "An Analysis of 35 Million Jobs of Travis CI. Travis CI handles automatically thousands of builds every day to, amongst other things, provide valuable feedback to thousands of open source developers. In this paper, we investigate Travis CI to firstly understand who is using it, and when they start to use it. Secondly, we investigate how the developers use Travis CI and finally, how frequently the developers change the Travis CI configurations. We observed during our analysis that the main users of Travis CI are corporate users such as Microsoft. And the programming languages used in Travis CI by those users do not follow the same popularity trend than on GitHub, for example, Python is the most popular language on Travis CI, but it is only the third one on GitHub. We also observe that Travis CI is set up on average seven days after the creation of the repository and the jobs are still mainly used (60 ) to run tests. And finally, we observe that 7.34 of the commits modify the Travis CI configuration. We share the biggest benchmark of Travis CI jobs (to our knowledge) it contains 35,793,144 jobs from 272,917 different GitHub projects."} {"_id": [1, 43], "label": "cs.DB cs.LG", "text": "A Survey of Data Quality Measurement and Monitoring Tools. High quality data is key to interpretable and trustworthy data analytics and the basis for meaningful data driven decisions. In practical scenarios, data quality is typically associated with data preprocessing, profiling, and cleansing for subsequent tasks like data integration or data analytics. However, from a scientific perspective, a lot of research has been published about the measurement (i.e., the detection) of data quality issues and different generally applicable data quality dimensions and metrics have been discussed. In this work, we close the gap between research into data quality measurement and practical implementations by investigating the functional scope of current data quality tools. With a systematic search, we identified 667 software tools dedicated to \"data quality\", from which we evaluated 13 tools with respect to three functionality areas (1) data profiling, (2) data quality measurement in terms of metrics, and (3) continuous data quality monitoring. We selected the evaluated tools with regard to pre defined exclusion criteria to ensure that they are domain independent, provide the investigated functions, and are evaluable freely or as trial. This survey aims at a comprehensive overview on state of the art data quality tools and reveals potential for their functional enhancement. Additionally, the results allow a critical discussion on concepts, which are widely accepted in research, but hardly implemented in any tool observed, for example, generally applicable data quality metrics."} {"_id": [9], "label": "math.AP", "text": "Bifurcation analysis of the Hardy Sobolev equation. In this paper, we prove existence of multiple non radial solutions to the Hardy Sobolev equation begin cases Delta u displaystyle frac gamma x 2 u displaystyle frac 1 x s u p s 2 u text in mathbb R N setminus 0 , u geq 0, end cases where N geq 3 , s in 0,2) , p s frac 2(N s) N 2 and gamma in ( infty, frac (N 2) 2 4) . We extend results of E.N. Dancer, F. Gladiali, M. Grossi, Proc. Roy. Soc. Edinburgh Sect. A 147 (2017) where only the case s 0 is considered. Moreover, thanks to monotonicity properties of the solutions, we separate two branches of non radial solutions."} {"_id": [33], "label": "physics.ins-det", "text": "Design of Millimeter wave Detector for Gyrotron Power Monitoring. The real time power monitoring of gyrotron is one of the key issues in the operation of electron cyclotron resonance heating system. The detector can be used for real time power monitoring. We analyzed the principle of diode detection and designed a D band wideband detector based on Schottky diode in this paper. The detector includes a waveguide to microstrip transition, a matching circuit, a diode, and a low pass filter. A novel waveguide to microstrip transition was developed based on probe coupling. A wideband lossy matching circuit was developed based on tapered line and series matching resistor. The simulation results show that when the input power is 30dBm at 140 GHz, the detection sensitivity is about 1600V W."} {"_id": [23], "label": "math.FA", "text": "Bilinear pseudo differential operators with Gevrey H \"ormander symbols. We consider bilinear pseudo differential operators whose symbols posses Gevrey type regularity and may have a sub exponential growth at infinity, together with all their derivatives. It is proved that those symbol classes can be described by the means of the short time Fourier transform and modulation spaces. Our first main result is the invariance property of the corresponding bilinear operators. Furthermore we prove the continuity of such operators when acting on modulation spaces. As a consequence, we derive their continuity on anisotropic Gelfand Shilov type spaces. We consider both Beurling and Roumieu type symbol classes and Gelfand Shilov spaces."} {"_id": [75, 38], "label": "math.KT math.NT", "text": "Voronoi complexes in higher dimensions, cohomology of GL N(Z) for N geq 8 and the triviality of K 8(Z) . We enumerate the low dimensional cells in the Voronoi cell complexes attached to the modular groups SL N(Z) and GL N(Z) for N 8,9,10,11 , using quotient sublattices techniques for N 8,9 and linear programming methods for higher dimensions. These enumerations allow us to compute some cohomology of these groups and prove that K 8(Z) 0 . We deduce from it new knowledge on the Kummer Vandiver conjecture."} {"_id": [20], "label": "math.NA cs.NA", "text": "Reinterpretation and Extension of Entropy Correction Terms for Residual Distribution and Discontinuous Galerkin Schemes Application to Structure Preserving Discretization. For the general class of residual distribution (RD) schemes, including many finite element (such as continuous discontinuous Galerkin) and flux reconstruction methods, an approach to construct entropy conservative dissipative semidiscretizations by adding suitable correction terms has been proposed by Abgrall (J. Comp. Phys. 372 pp. 640 666, 2018). In this work, the correction terms are characterized as solutions of certain optimization problems and are adapted to the SBP SAT framework, focusing on discontinuous Galerkin methods. Novel generalizations to entropy inequalities, multiple constraints, and kinetic energy preservation for the Euler equations are developed and tested in numerical experiments. For all of these optimization problems, explicit solutions are provided. Additionally, the correction approach is applied for the first time to obtain a fully discrete entropy conservative dissipative RD scheme. Here, the application of the deferred correction (DeC) method for the time integration is essential. This paper can be seen as describing a systematic method to construct structure preserving discretization, at least for the considered example."} {"_id": [25], "label": "math.PR", "text": "Generalized selection problem with L 'evy noise. Let A pm 0 , beta in(0,1) , and let Z ( alpha) be a strictly alpha stable L 'evy process with the jump measure nu( mathrm d z) (C mathbb I (0, infty) (z) C mathbb I ( infty,0) (z)) z 1 alpha , mathrm d z , alpha in (1,2) , C pm geq 0 , C C 0 . The selection problem for the model stochastic differential equation mathrm d bar X varepsilon (A mathbb I 0, infty) ( bar X varepsilon) A mathbb I ( infty,0) ( bar X varepsilon)) bar X varepsilon beta , mathrm d t varepsilon mathrm d Z ( alpha) states that in the small noise limit varepsilon to 0 , solutions bar X varepsilon converge weakly to the maximal or minimal solutions of the limiting non Lipschitzian ordinary differential equation mathrm d bar x (A mathbb I 0, infty) ( bar x) A mathbb I ( infty,0) ( bar x)) bar x beta , mathrm d t with probabilities bar p pm bar p pm( alpha,C C , beta, A A ) , see Pilipenko and Proske, Stat. Probab. Lett., 132 62 73, 2018 . In this paper we solve the generalized selection problem for the stochastic differential equation mathrm d X varepsilon a(X varepsilon) , mathrm d t varepsilon b(X varepsilon) , mathrm d Z whose dynamics in the vicinity of the origin in certain sense reminds of dynamics of the model equation. In particular we show that solutions X varepsilon also converge to the maximal or minimal solutions of the limiting irregular ordinary differential equation mathrm d x a(x) , mathrm d t with the same model selection probabilities bar p pm . This means that for a large class of irregular stochastic differential equations, the selection dynamics is completely determined by four local parameters of the drift and the jump measure."} {"_id": [12, 38], "label": "math.CA math.NT", "text": "Sur le minimum de la fonction de Brjuno. The Brjuno function attains a strict global minimum at the golden section."} {"_id": [18, 29, 47], "label": "math.GR math.AT math.GT", "text": "On the coverings of closed non orientable Euclidean manifolds mathcal B 3 and mathcal B 4 . There are only 10 Euclidean forms, that is flat closed three dimensional manifolds six are orientable mathcal G 1, dots, mathcal G 6 and four are non orientable mathcal B 1, dots, mathcal B 4 . The aim of this paper is to describe all types of n fold coverings over the non orientable Euclidean manifolds mathcal B 3 and mathcal B 4 , and calculate the numbers of non equivalent coverings of each type. The manifolds mathcal B 3 and mathcal B 4 are uniquely determined among non orientable forms by their homology groups H 1( mathcal B 3 ) ZZ 2 times ZZ 2 times ZZ and H 1( mathcal B 4 ) ZZ 4 times ZZ . We classify subgroups in the fundamental groups pi 1( mathcal B 3 ) and pi 1( mathcal B 4 ) up to isomorphism. Given index n , we calculate the numbers of subgroups and the numbers of conjugacy classes of subgroups for each isomorphism type and provide the Dirichlet generating functions for the above sequences."} {"_id": [12], "label": "math.CA", "text": "Asymptotics for Recurrence Coefficients of X1 Jacobi Polynomials and Christoffel Function. Computing asymptotics of the recurrence coefficients of X1 Jacobi polynomials we investigate the limit of Christoffel function. We also study the relation between the normalized counting measure based on the zeros of the modified average characteristic polynomial and the Christoffel function in limit. The proofs of corresponding theorems with respect to ordinary orthogonal polynomials are based on the three term recurrence relation. The main point is that exceptional orthogonal polynomials possess at least five term formulae and so the Christoffel Darboux formula also fails. It seems that these difficulties can be handled in combinatorial way."} {"_id": [25], "label": "math.PR", "text": "Limit profile for random transpositions. We present an improved version of Diaconis' upper bound lemma, which is used to compute the limiting value of the distance to stationarity. We then apply it to random transpositions studied by Diaconis and Shahshahani."} {"_id": [0], "label": "cs.CV", "text": "Face Verification via learning the kernel matrix. The kernel function is introduced to solve the nonlinear pattern recognition problem. The advantage of a kernel method often depends critically on a proper choice of the kernel function. A promising approach is to learn the kernel from data automatically. Over the past few years, some methods which have been proposed to learn the kernel have some limitations learning the parameters of some prespecified kernel function and so on. In this paper, the nonlinear face verification via learning the kernel matrix is proposed. A new criterion is used in the new algorithm to avoid inverting the possibly singular within class which is a computational problem. The experimental results obtained on the facial database XM2VTS using the Lausanne protocol show that the verification performance of the new method is superior to that of the primary method Client Specific Kernel Discriminant Analysis (CSKDA). The method CSKDA needs to choose a proper kernel function through many experiments, while the new method could learn the kernel from data automatically which could save a lot of time and have the robust performance."} {"_id": [0, 2], "label": "cs.CV cs.AI", "text": "Unsupervised Self training Algorithm Based on Deep Learning for Optical Aerial Images Change Detection. Optical aerial images change detection is an important task in earth observation and has been extensively investigated in the past few decades. Generally, the supervised change detection methods with superior performance require a large amount of labeled training data which is obtained by manual annotation with high cost. In this paper, we present a novel unsupervised self training algorithm (USTA) for optical aerial images change detection. The traditional method such as change vector analysis is used to generate the pseudo labels. We use these pseudo labels to train a well designed convolutional neural network. The network is used as a teacher to classify the original multitemporal images to generate another set of pseudo labels. Then two set of pseudo labels are used to jointly train a student network with the same structure as the teacher. The final change detection result can be obtained by the trained student network. Besides, we design an image filter to control the usage of change information in the pseudo labels in the training process of the network. The whole process of the algorithm is an unsupervised process without manually marked labels. Experimental results on the real datasets demonstrate competitive performance of our proposed method."} {"_id": [56, 2, 4], "label": "cs.AI cs.LO cs.NE", "text": "Completion Reasoning Emulation for the Description Logic EL . We present a new approach to integrating deep learning with knowledge based systems that we believe shows promise. Our approach seeks to emulate reasoning structure, which can be inspected part way through, rather than simply learning reasoner answers, which is typical in many of the black box systems currently in use. We demonstrate that this idea is feasible by training a long short term memory (LSTM) artificial neural network to learn EL reasoning patterns with two different data sets. We also show that this trained system is resistant to noise by corrupting a percentage of the test data and comparing the reasoner's and LSTM's predictions on corrupt data with correct answers."} {"_id": [41], "label": "cs.RO", "text": "MOZARD Multi Modal Localization for Autonomous Vehicles in Urban Outdoor Environments. Visually poor scenarios are one of the main sources of failure in visual localization systems in outdoor environments. To address this challenge, we present MOZARD, a multi modal localization system for urban outdoor environments using vision and LiDAR. By extending our preexisting key point based visual multi session local localization approach with the use of semantic data, an improved localization recall can be achieved across vastly different appearance conditions. In particular we focus on the use of curbstone information because of their broad distribution and reliability within urban environments. We present thorough experimental evaluations on several driving kilometers in challenging urban outdoor environments, analyze the recall and accuracy of our localization system and demonstrate in a case study possible failure cases of each subsystem. We demonstrate that MOZARD is able to bridge scenarios where our previous work VIZARD fails, hence yielding an increased recall performance, while a similar localization accuracy of 0.2m is achieved"} {"_id": [0, 1, 2, 3], "label": "cs.CV cs.AI cs.CL cs.LG", "text": "Deep Exemplar Networks for VQA and VQG. In this paper, we consider the problem of solving semantic tasks such as Visual Question Answering' (VQA), where one aims to answers related to an image and Visual Question Generation' (VQG), where one aims to generate a natural question pertaining to an image. Solutions for VQA and VQG tasks have been proposed using variants of encoder decoder deep learning based frameworks that have shown impressive performance. Humans however often show generalization by relying on exemplar based approaches. For instance, the work by Tversky and Kahneman suggests that humans use exemplars when making categorizations and decisions. In this work, we propose the incorporation of exemplar based approaches towards solving these problems. Specifically, we incorporate exemplar based approaches and show that an exemplar based module can be incorporated in almost any of the deep learning architectures proposed in the literature and the addition of such a block results in improved performance for solving these tasks. Thus, just as the incorporation of attention is now considered de facto useful for solving these tasks, similarly, incorporating exemplars also can be considered to improve any proposed architecture for solving this task. We provide extensive empirical analysis for the same through various architectures, ablations, and state of the art comparisons."} {"_id": [32, 49], "label": "cs.DS math.OC", "text": "Speeding up Linear Programming using Randomized Linear Algebra. Linear programming (LP) is an extremely useful tool and has been successfully applied to solve various problems in a wide range of areas, including operations research, engineering, economics, or even more abstract mathematical areas such as combinatorics. It is also used in many machine learning applications, such as ell 1 regularized SVMs, basis pursuit, nonnegative matrix factorization, etc. Interior Point Methods (IPMs) are one of the most popular methods to solve LPs both in theory and in practice. Their underlying complexity is dominated by the cost of solving a system of linear equations at each iteration. In this paper, we consider emph infeasible IPMs for the special case where the number of variables is much larger than the number of constraints. Using tools from Randomized Linear Algebra, we present a preconditioning technique that, when combined with the Conjugate Gradient iterative solver, provably guarantees that infeasible IPM algorithms (suitably modified to account for the error incurred by the approximate solver), converge to a feasible, approximately optimal solution, without increasing their iteration complexity. Our empirical evaluations verify our theoretical results on both real world and synthetic data."} {"_id": [3], "label": "cs.CL", "text": "Syntax Role for Neural Semantic Role Labeling. Semantic role labeling (SRL) is dedicated to recognizing the semantic predicate argument structure of a sentence. Previous studies in terms of traditional models have shown syntactic information can make remarkable contributions to SRL performance however, the necessity of syntactic information was challenged by a few recent neural SRL studies that demonstrate impressive performance without syntactic backbones and suggest that syntax information becomes much less important for neural semantic role labeling, especially when paired with recent deep neural network and large scale pre trained language models. Despite this notion, the neural SRL field still lacks a systematic and full investigation on the relevance of syntactic information in SRL, for both dependency and both monolingual and multilingual settings. This paper intends to quantify the importance of syntactic information for neural SRL in the deep learning framework. We introduce three typical SRL frameworks (baselines), sequence based, tree based, and graph based, which are accompanied by two categories of exploiting syntactic information syntax pruning based and syntax feature based. Experiments are conducted on the CoNLL 2005, 2009, and 2012 benchmarks for all languages available, and results show that neural SRL models can still benefit from syntactic information under certain conditions. Furthermore, we show the quantitative significance of syntax to neural SRL models together with a thorough empirical survey using existing models."} {"_id": [50], "label": "physics.med-ph", "text": "Transurethral ultrasound therapy of the prostate in the presence of calcifications A simulation study. Purpose Transurethral ultrasound therapy is an investigational treatment modality which could potentially be used for the localized treatment of prostate cancer. One of the limiting factors of this therapy is prostatic calcifications. These attenuate and reflect ultrasound and thus reduce the efficacy of the heating. The aim of this study is to investigate how prostatic calcifications affect therapeutic efficacy, and to identify the best sonication strategy when calcifications are present. Methods Realistic computational models were used on clinical patient data in order to simulate different therapeutic situations with naturally occurring calcifications as well as artificial calcifications of different sizes (1 10 mm) and distances (5 15 mm). Furthermore, different sonication strategies were tested in order to deliver therapy to the untreated tissue regions behind the calcifications. Results The presence of calcifications in front of the ultrasound field was found to increase the peak pressure by 100 on average while the maximum temperature only rose by 9 during a 20 s sonication. Losses in ultrasound energy were due to the relatively large acoustic impedance mismatch between the prostate tissue and the calcifications (1.63 vs 3.20 MRayl) and high attenuation coefficient (0.78 vs 2.64 dB MHz 1.1 cm), which together left untreated tissue regions behind the calcifications. In addition, elevated temperatures were seen in the region between the transducer and the calcifications. Lower sonication frequencies (1 4 MHz) were not able to penetrate through the calcifications effectively, but longer sonication durations (20 60 s) with selective transducer elements were effective in treating the tissue regions behind the calcifications."} {"_id": [39], "label": "cs.CY", "text": "Using Containers to Create More Interactive Online Training and Education Materials. Containers are excellent hands on learning environments for computing topics because they are customizable, portable, and reproducible. The Cornell University Center for Advanced Computing has developed the Cornell Virtual Workshop in high performance computing topics for many years, and we have always sought to make the materials as rich and interactive as possible. Toward the goal of building a more hands on experimental learning experience directly into web based online training environments, we developed the Cornell Container Runner Service, which allows online content developers to build container based interactive edit and run commands directly into their web pages. Using containers along with CCRS has the potential to increase learner engagement and outcomes."} {"_id": [0, 4], "label": "cs.CV cs.NE", "text": "A novel machine learning based framework for detection of Autism Spectrum Disorder (ASD). Computer vision and machine learning are the linchpin of field of automation. The medicine industry has adopted numerous methods to discover the root causes of many diseases in order to automate detection process. But, the biomarkers of Autism Spectrum Disorder (ASD) are still unknown, let alone automating its detection. Studies from the neuroscience domain highlighted the fact that corpus callosum and intracranial brain volume holds significant information for detection of ASD. Such results and studies are not tested and verified by scientists working in the domain of computer vision machine learning. Thus, in this study we have proposed a machine learning based framework for automatic detection of ASD using features extracted from corpus callosum and intracranial brain volume from ABIDE dataset. Corpus callosum and intracranial brain volume data is obtained from T1 weighted MRI scans. Our proposed framework first calculates weights of features extracted from Corpus callosum and intracranial brain volume data. This step ensures to utilize discriminative capabilities of only those features that will help in robust recognition of ASD. Then, conventional machine learning algorithm (conventional refers to algorithms other than deep learning) is applied on features that are most significant in terms of discriminative capabilities for recognition of ASD. Finally, for benchmarking and to verify potential of deep learning on analyzing neuroimaging data i.e. T1 weighted MRI scans, we have done experiment with state of the art deep learning architecture i.e. VGG16 . We have used transfer learning approach to use already trained VGG16 model for detection of ASD. This is done to help readers understand benefits and bottlenecks of using deep learning approach for analyzing neuroimaging data which is difficult to record in large enough quantity for deep learning."} {"_id": [66], "label": "cs.CE", "text": "An Artifact based Workflow for Finite Element Simulation Studies. Workflow support typically focuses on single simulation experiments. This is also the case for simulation based on finite element methods. If entire simulation studies shall be supported, flexible means for intertwining revising the model, collecting data, executing and analyzing experiments are required. Artifact based workflows present one means to support entire simulation studies, as has been shown for stochastic discrete event simulation. To adapt the approach to finite element methods, the set of artifacts, i.e., conceptual model, requirement, simulation model, and simulation experiment, and the constraints that apply are extended by new artifacts, such as geometrical model, input data, and simulation data. Artifacts, their life cycles, and constraints are revisited revealing features both types of simulation studies share and those they vary in. Also, the potential benefits of exploiting an artifact based workflow approach are shown based on a concrete simulation study. To those benefits belong guidance to systematically conduct simulation studies, reduction of effort by automatically executing specific steps, e.g., generating and executing convergence tests, and support for the automatic reporting of provenance."} {"_id": [20], "label": "math.NA cs.NA", "text": "The energy technique for the six step BDF method. In combination with the Grenander Szeg \"o theorem, we observe that a relaxed positivity condition on multipliers, milder than the basic fundamental requirement of the Nevanlinna Odeh multipliers that the sum of the absolute values of their components is strictly less than 1 , makes the energy technique applicable to the stability analysis of BDF methods for parabolic equations with selfadjoint elliptic part. This is particularly useful for the six step BDF method for which no Nevanlinna Odeh multiplier exists. We introduce multipliers satisfying the positivity property for the six step BDF method and establish stability of the method for parabolic equations."} {"_id": [42], "label": "math.DG", "text": "A geometric study of marginally trapped surfaces in space forms and Robertson Walker spacetimes an overview. A marginally trapped surface in a spacetime is a Riemannian surface whose mean curvature vector is lightlike at every point. In this paper we give an up to date overview of the differential geometric study of these surfaces in Minkowski, de Sitter, anti de Sitter and Robertson Walker spacetimes. We give the general local descriptions proven by Anciaux and his coworkers as well as the known classifications of marginally trapped surfaces satisfying one of the following additional geometric conditions having positive relative nullity, having parallel mean curvature vector field, having finite type Gauss map, being invariant under a one parameter group of ambient isometries, being isotropic, being pseudo umbilical. Finally, we provide examples of constant Gaussian curvature marginally trapped surfaces and state some open questions."} {"_id": [0], "label": "cs.CV", "text": "ExplAIn Explanatory Artificial Intelligence for Diabetic Retinopathy Diagnosis. In recent years, Artificial Intelligence (AI) has proven its relevance for medical decision support. However, the \"black box\" nature of successful AI algorithms still holds back their wide spread deployment. In this paper, we describe an eXplanatory Artificial Intelligence (XAI) that reaches the same level of performance as black box AI, for the task of classifying Diabetic Retinopathy (DR) severity using Color Fundus Photography (CFP). This algorithm, called ExplAIn, learns to segment and categorize lesions in images the final image level classification directly derives from these multivariate lesion segmentations. The novelty of this explanatory framework is that it is trained from end to end, with image supervision only, just like black box AI algorithms the concepts of lesions and lesion categories emerge by themselves. For improved lesion localization, foreground background separation is trained through self supervision, in such a way that occluding foreground pixels transforms the input image into a healthy looking image. The advantage of such an architecture is that automatic diagnoses can be explained simply by an image and or a few sentences. ExplAIn is evaluated at the image level and at the pixel level on various CFP image datasets. We expect this new framework, which jointly offers high classification performance and explainability, to facilitate AI deployment."} {"_id": [3], "label": "cs.CL", "text": "Zero shot Dependency Parsing with Pre trained Multilingual Sentence Representations. We investigate whether off the shelf deep bidirectional sentence representations trained on a massively multilingual corpus (multilingual BERT) enable the development of an unsupervised universal dependency parser. This approach only leverages a mix of monolingual corpora in many languages and does not require any translation data making it applicable to low resource languages. In our experiments we outperform the best CoNLL 2018 language specific systems in all of the shared task's six truly low resource languages while using a single system. However, we also find that (i) parsing accuracy still varies dramatically when changing the training languages and (ii) in some target languages zero shot transfer fails under all tested conditions, raising concerns on the 'universality' of the whole approach."} {"_id": [49], "label": "math.OC", "text": "Uncertainty aware demand management of water distribution networks in deregulated energy markets. We present an open source solution for the operational control of drinking water distribution networks which accounts for the inherent uncertainty in water demand and electricity prices in the day ahead market of a volatile deregulated economy. As increasingly more energy markets adopt this trading scheme, the operation of drinking water networks requires uncertainty aware control approaches that mitigate the effect of volatility and result in an economic and safe operation of the network that meets the consumers' need for uninterrupted water supply. We propose the use of scenario based stochastic model predictive control an advanced control methodology which comes at a considerable computation cost which is overcome by harnessing the parallelization capabilities of graphics processing units (GPUs) and using a massively parallelizable algorithm based on the accelerated proximal gradient method."} {"_id": [0], "label": "cs.CV", "text": "Road Curb Detection and Localization with Monocular Forward view Vehicle Camera. We propose a robust method for estimating road curb 3D parameters (size, location, orientation) using a calibrated monocular camera equipped with a fisheye lens. Automatic curb detection and localization is particularly important in the context of Advanced Driver Assistance System (ADAS), i.e. to prevent possible collision and damage of the vehicle's bumper during perpendicular and diagonal parking maneuvers. Combining 3D geometric reasoning with advanced vision based detection methods, our approach is able to estimate the vehicle to curb distance in real time with mean accuracy of more than 90 , as well as its orientation, height and depth. Our approach consists of two distinct components curb detection in each individual video frame and temporal analysis. The first part comprises of sophisticated curb edges extraction and parametrized 3D curb template fitting. Using a few assumptions regarding the real world geometry, we can thus retrieve the curb's height and its relative position w.r.t. the moving vehicle on which the camera is mounted. Support Vector Machine (SVM) classifier fed with Histograms of Oriented Gradients (HOG) is used for appearance based filtering out outliers. In the second part, the detected curb regions are tracked in the temporal domain, so as to perform a second pass of false positives rejection. We have validated our approach on a newly collected database of 11 videos under different conditions. We have used point wise LIDAR measurements and manual exhaustive labels as a ground truth."} {"_id": [0], "label": "cs.CV", "text": "To What Extent Does Downsampling, Compression, and Data Scarcity Impact Renal Image Analysis?. The condition of the Glomeruli, or filter sacks, in renal Direct Immunofluorescence (DIF) specimens is a critical indicator for diagnosing kidney diseases. A digital pathology system which digitizes a glass histology slide into a Whole Slide Image (WSI) and then automatically detects and zooms in on the glomeruli with a higher magnification objective will be extremely helpful for pathologists. In this paper, using glomerulus detection as the study case, we provide analysis and observations on several important issues to help with the development of Computer Aided Diagnostic (CAD) systems to process WSIs. Large image resolution, large file size, and data scarcity are always challenging to deal with. To this end, we first examine image downsampling rates in terms of their effect on detection accuracy. Second, we examine the impact of image compression. Third, we examine the relationship between the size of the training set and detection accuracy. To understand the above issues, experiments are performed on the state of the art detectors Faster R CNN, R FCN, Mask R CNN and SSD. Critical findings are observed (1) The best balance between detection accuracy, detection speed and file size is achieved at 8 times downsampling captured with a 40 times objective (2) compression which reduces the file size dramatically, does not necessarily have an adverse effect on overall accuracy (3) reducing the amount of training data to some extents causes a drop in precision but has a negligible impact on the recall (4) in most cases, Faster R CNN achieves the best accuracy in the glomerulus detection task. We show that the image file size of 40 times WSI images can be reduced by a factor of over 6000 with negligible loss of glomerulus detection accuracy."} {"_id": [21], "label": "math.CO", "text": "Proof of the Erd H o s Simonovits conjecture on walks. Let G n be a graph on n vertices and let w k(G n) denote the number of walks of length k in G n divided by n . Erd H o s and Simonovits conjectured that w k(G n) t geq w t(G n) k when k geq t and both t and k are odd. We prove this conjecture."} {"_id": [9], "label": "math.AP", "text": "The scattering matrix for 0th order pseudodifferential operators. We use microlocal radial estimates to prove the full limiting absorption principle for P , a self adjoint 0th order pseudodifferential operator satisfying hyperbolic dynamical assumptions as of Colin de Verdi ere and Saint Raymond. We define the scattering matrix for P omega with generic omega in mathbb R and show that the scattering matrix extends to a unitary operator on appropriate L 2 spaces. After conjugation with natural reference operators, the scattering matrix becomes a 0 th order Fourier integral operator with a canonical relation associated to the bicharacteristics of P omega . The operator P gives a microlocal model of internal waves in stratified fluids as illustrated in the paper of Colin de Verdi ere and Saint Raymond."} {"_id": [9], "label": "math.AP", "text": "Well posedness for the Cauchy problem of the modified Zakharov Kuznetsov equation. This paper is concerned with the Cauchy problem of the modified Zakharov Kuznetsov equation on mathbb R d . If d 2 , we prove the sharp estimate which implies local in time well posedness in the Sobolev space H s( mathbb R 2) for s geq 1 4 . If d geq 3 , by employing U p and V p spaces, we establish the small data global well posedness in the scaling critical Sobolev space H s c ( mathbb R d) where s c d 2 1 ."} {"_id": [15], "label": "cs.IT math.IT", "text": "Six constructions of asymptotically optimal codebooks via the character sums. In this paper, using additive characters of finite field, we find a codebook which is equivalent to the measurement matrix in 20 . The advantage of our construction is that it can be generalized naturally to construct the other five classes of codebooks using additive and multiplicative characters of finite field. We determine the maximal cross correlation amplitude of these codebooks by the properties of characters and character sums. We prove that all the codebooks we constructed are asymptotically optimal with respect to the Welch bound. The parameters of these codebooks are new."} {"_id": [9, 20], "label": "math.AP cs.NA math.NA", "text": "Gradient Flow Approach to the Calculation of Stationary States on Nonlinear Quantum Graphs. We introduce and implement a method to compute stationary states of nonlinear Schr ''odinger equations on metric graphs. Stationary states are obtained as local minimizers of the nonlinear Schr ''odinger energy at fixed mass. Our method is based on a normalized gradient flow for the energy (i.e. a gradient flow projected on a fixed mass sphere) adapted to the context of nonlinear quantum graphs. We first prove that, at the continuous level, the normalized gradient flow is well posed, mass preserving, energy diminishing and converges (at least locally) towards stationary states. We then establish the link between the continuous flow and its discretized version. We conclude by conducting a series of numerical experiments in model situations showing the good performance of the discrete flow to compute stationary states. Further experiments as well as detailed explanation of our numerical algorithm are given in a companion paper."} {"_id": [1, 2, 3, 22], "label": "cs.SE cs.AI cs.CL cs.LG", "text": "Deep Just In Time Inconsistency Detection Between Comments and Source Code. Natural language comments convey key aspects of source code such as implementation, usage, and pre and post conditions. Failure to update comments accordingly when the corresponding code is modified introduces inconsistencies, which is known to lead to confusion and software bugs. In this paper, we aim to detect whether a comment becomes inconsistent as a result of changes to the corresponding body of code, in order to catch potential inconsistencies just in time, i.e., before they are committed to a code base. To achieve this, we develop a deep learning approach that learns to correlate a comment with code changes. By evaluating on a large corpus of comment code pairs spanning various comment types, we show that our model outperforms multiple baselines by significant margins. For extrinsic evaluation, we show the usefulness of our approach by combining it with a comment update model to build a more comprehensive automatic comment maintenance system which can both detect and resolve inconsistent comments based on code changes."} {"_id": [0], "label": "cs.CV", "text": "Simultaneous Consensus Maximization and Model Fitting. Maximum consensus (MC) robust fitting is a fundamental problem in low level vision to process raw data. Typically, it firstly finds a consensus set of inliers and then fits a model on the consensus set. This work proposes a new formulation to achieve simultaneous maximum consensus and model estimation (MCME), which has two significant features compared with traditional MC robust fitting. First, it takes fitting residual into account in finding inliers, hence its lowest achievable residual in model fitting is lower than that of MC robust fitting. Second, it has an unconstrained formulation involving binary variables, which facilitates the use of the effective semidefinite relaxation (SDR) method to handle the underlying challenging combinatorial optimization problem. Though still nonconvex after SDR, it becomes biconvex in some applications, for which we use an alternating minimization algorithm to solve. Further, the sparsity of the problem is exploited in combination with low rank factorization to develop an efficient algorithm. Experiments show that MCME significantly outperforms RANSAC and deterministic approximate MC methods at high outlier ratios. Besides, in rotation and Euclidean registration, it also compares favorably with state of the art registration methods, especially in high noise and outliers. Code is available at textit https github.com FWen mcme.git ."} {"_id": [26, 35], "label": "math.RT math.RA", "text": "On the Free Jordan Algebras. A conjecture for the dimension and the character of the homogenous components of the free Jordan algebras is proposed. As a support of the conjecture, some numerical evidences are generated by a computer and some new theoretical results are proved. One of them is the cyclicity of the Jordan operad."} {"_id": [59], "label": "cs.SI", "text": "Into the Battlefield Quantifying and Modeling Intra community Conflicts in Online Discussion. In this work, we present a novel quantification of conflict in online discussion. Unlike previous studies on conflict dynamics, which model conflict as a binary phenomenon, our measure is continuous valued, which we validate with manually annotated ratings. We address a two way prediction task. Firstly, we predict the probable degree of conflict a news article will face from its audience. We employ multiple machine learning frameworks for this task using various features extracted from news articles. Secondly, given a pair of users and their interaction history, we predict if their future engagement will result in a conflict. We fuse textual and network based features together using a support vector machine which achieves an AUC of 0.89. Moreover, we implement a graph convolutional model which exploits engagement histories of users to predict whether a pair of users who never met each other before will have a conflicting interaction, with an AUC of 0.69. We perform our studies on a massive discussion dataset crawled from the Reddit news community, containing over 41k news articles and 5.5 million comments. Apart from the prediction tasks, our studies offer interesting insights on the conflict dynamics how users form clusters based on conflicting engagements, how different is the temporal nature of conflict over different online news forums, how is contribution of different language based features to induce conflict, etc. In short, our study paves the way towards new methods of exploration and modeling of conflict dynamics inside online discussion communities."} {"_id": [41, 2, 1], "label": "cs.RO cs.AI cs.LG", "text": "Towards Practical Multi Object Manipulation using Relational Reinforcement Learning. Learning robotic manipulation tasks using reinforcement learning with sparse rewards is currently impractical due to the outrageous data requirements. Many practical tasks require manipulation of multiple objects, and the complexity of such tasks increases with the number of objects. Learning from a curriculum of increasingly complex tasks appears to be a natural solution, but unfortunately, does not work for many scenarios. We hypothesize that the inability of the state of the art algorithms to effectively utilize a task curriculum stems from the absence of inductive biases for transferring knowledge from simpler to complex tasks. We show that graph based relational architectures overcome this limitation and enable learning of complex tasks when provided with a simple curriculum of tasks with increasing numbers of objects. We demonstrate the utility of our framework on a simulated block stacking task. Starting from scratch, our agent learns to stack six blocks into a tower. Despite using step wise sparse rewards, our method is orders of magnitude more data efficient and outperforms the existing state of the art method that utilizes human demonstrations. Furthermore, the learned policy exhibits zero shot generalization, successfully stacking blocks into taller towers and previously unseen configurations such as pyramids, without any further training."} {"_id": [53, 54], "label": "q-fin.RM q-fin.MF", "text": "Contingent Convertible Obligations and Financial Stability. This paper investigates whether a financial system can be made more stable if financial institutions share risk by exchanging contingent convertible (CoCo) debt obligations. The question is framed in a financial network model of debt and equity interlinkages with the addition of a variant of the CoCo that converts continuously when a bank's equity debt ratio drops to a trigger level. The main theoretical result is a complete characterization of the clearing problem for the interbank debt and equity at the maturity of the obligations. We then introduce stylized networks to study when introducing contingent convertible bonds improves financial stability, as well as specific networks for which contingent convertible bonds do not provide uniformly improved system performance. To return to the main question, we examine the EU financial network at the time of the 2011 EBA stress test to do comparative statics to study the implications of CoCo debt on financial stability. It is found that by replacing all unsecured interbank debt by standardized CoCo interbank debt securities, systemic risk in the EU will decrease and bank shareholder value will increase."} {"_id": [9, 23], "label": "math.FA math.AP", "text": "On the limit regularity in Sobolev and Besov scales related to approximation theory. We study the interrelation between the limit L p( Omega) Sobolev regularity overline s p of (classes of) functions on bounded Lipschitz domains Omega subseteq mathbb R d , d geq 2 , and the limit regularity overline alpha p within the corresponding adaptivity scale of Besov spaces B alpha tau, tau ( Omega) , where 1 tau alpha d 1 p and alpha 0 ( p 1 fixed). The former determines the convergence rate of uniform numerical methods, whereas the latter corresponds to the convergence rate of best N term approximation. We show how additional information on the Besov or Triebel Lizorkin regularity may be used to deduce upper bounds for overline alpha p in terms of overline s p simply by means of classical embeddings and the extension of complex interpolation to suitable classes of quasi Banach spaces due to Kalton, Mayboroda, and Mitrea (Contemp. Math. 445). The results are applied to the Poisson equation, to the p Poisson problem, and to the inhomogeneous stationary Stokes problem. In particular, we show that already established results on the Besov regularity for the Poisson equation are sharp. Keywords Non linear approximation, adaptive methods, Besov space, Triebel Lizorkin space, regularity of solutions, stationary Stokes equation, Poisson equation, p Poisson equation, Lipschitz domain."} {"_id": [65], "label": "cs.NI", "text": "Swarm based Drone as a Service (SDaaS) for Delivery. We propose a novel framework for composing Swarm based Drone as a Service (SDaaS) for delivery. Two composition approaches, i.e., sequential and parallel are designed considering the different behaviors of drone swarms. The proposed framework considers various constraints, e.g., recharging time and limited battery to meet delivery deadlines. We propose SDaaS composition algorithms using a modified A algorithm. A cooperative behavior model is incorporated to reduce recharging and waiting time in a delivery. Experimental results prove the efficiency of the proposed approach."} {"_id": [65, 83], "label": "cs.NI cs.MM", "text": "EdgeDASH Exploiting Network Assisted Adaptive Video Streaming for Edge Caching. While edge video caching has great potential to decrease the core network traffic as well as the users' experienced latency, it is often challenging to exploit the caches in current client driven video streaming solutions due to two key reasons. First, even those clients interested in the same content might request different quality levels as a video content is encoded into multiple qualities to match a wide range of network conditions and device capabilities. Second, the clients, who select the quality of the next chunk to request, are unaware of the cached content at the network edge. Hence, it becomes imperative to develop network side solutions to exploit caching. This can also mitigate some performance issues, in particular for the scenarios in which multiple video clients compete for some bottleneck capacity. In this paper, we propose a network side control logic running at a WiFi AP to facilitate the use of cached video content. In particular, an AP can assign a client station a different video quality than its request, in case the alternative quality provides a better utility. We formulate the quality assignment problem as an optimization problem and develop several heuristics with polynomial complexity. Compared to the baseline where the clients determine the quality adaptation, our proposals, referred to as EdgeDASH, offer higher video quality, higher cache hits, and lower stalling ratio which are essential for user's satisfaction. Our simulations show that EdgeDASH facilitates significant cache hits and decreases the buffer stalls only by changing the client's request by one quality level. Moreover, from our analysis, we conclude that the network assistance provides significant performance improvement, especially when the clients with identical interests compete for a bottleneck link's capacity."} {"_id": [6], "label": "physics.flu-dyn", "text": "Ability of the e TellTale sensor to detect flow features over wind turbine blades flow separation reattachment dynamics. Monitoring the flow features over wind turbine blades is a challenging task that has become more and more crucial. This paper is devoted to demonstrate the ability of the e TellTale sensor to detect the flow separation reattachment dynamics over wind turbine blades. This sensor is made of a strip with a strain gauge sensor at its base. The velocity field was acquired using TR PIV measurements over an oscillating thick blade section equipped with an e TellTale sensor. PIV images were post processed to detect movements of the strip, which was compared to movements of flow. Results show good agreement between the measured velocity field and movements of the strip regarding the separation reattachment dynamics."} {"_id": [20], "label": "math.NA", "text": "Optimal order finite element approximations for variable order time fractional diffusion equations. We study a fully discrete finite element method for variable order time fractional diffusion equations with a time dependent variable order. Optimal convergence estimates are proved with the first order accuracy in time (and second order accuracy in space) under the uniform or graded temporal mesh without full regularity assumptions of the solutions. Numerical experiments are presented to substantiate the analysis."} {"_id": [56, 57, 22], "label": "cs.SE cs.LO cs.PL", "text": "Lifting Datalog Based Analyses to Software Product Lines. Applying program analyses to Software Product Lines (SPLs) has been a fundamental research problem at the intersection of Product Line Engineering and software analysis. Different attempts have been made to \"lift\" particular product level analyses to run on the entire product line. In this paper, we tackle the class of Datalog based analyses (e.g., pointer and taint analyses), study the theoretical aspects of lifting Datalog inference, and implement a lifted inference algorithm inside the Souffl 'e Datalog engine. We evaluate our implementation on a set of benchmark product lines. We show significant savings in processing time and fact database size (billions of times faster on one of the benchmarks) compared to brute force analysis of each product individually."} {"_id": [0], "label": "cs.CV", "text": "Single Image Reflection Removal Exploiting Misaligned Training Data and Network Enhancements. Removing undesirable reflections from a single image captured through a glass window is of practical importance to visual computing systems. Although state of the art methods can obtain decent results in certain situations, performance declines significantly when tackling more general real world cases. These failures stem from the intrinsic difficulty of single image reflection removal the fundamental ill posedness of the problem, and the insufficiency of densely labeled training data needed for resolving this ambiguity within learning based neural network pipelines. In this paper, we address these issues by exploiting targeted network enhancements and the novel use of misaligned data. For the former, we augment a baseline network architecture by embedding context encoding modules that are capable of leveraging high level contextual clues to reduce indeterminacy within areas containing strong reflections. For the latter, we introduce an alignment invariant loss function that facilitates exploiting misaligned real world training data that is much easier to collect. Experimental results collectively show that our method outperforms the state of the art with aligned data, and that significant improvements are possible when using additional misaligned data."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Hierarchical Multitask Learning Approach for BERT. Recent works show that learning contextualized embeddings for words is beneficial for downstream tasks. BERT is one successful example of this approach. It learns embeddings by solving two tasks, which are masked language model (masked LM) and the next sentence prediction (NSP). The pre training of BERT can also be framed as a multitask learning problem. In this work, we adopt hierarchical multitask learning approaches for BERT pre training. Pre training tasks are solved at different layers instead of the last layer, and information from the NSP task is transferred to the masked LM task. Also, we propose a new pre training task bigram shift to encode word order information. We choose two downstream tasks, one of which requires sentence level embeddings (textual entailment), and the other requires contextualized embeddings of words (question answering). Due to computational restrictions, we use the downstream task data instead of a large dataset for the pre training to see the performance of proposed models when given a restricted dataset. We test their performance on several probing tasks to analyze learned embeddings. Our results show that imposing a task hierarchy in pre training improves the performance of embeddings."} {"_id": [26, 38], "label": "math.NT math.RT", "text": "On an inequality of Bushnell Henniart for Rankin Selberg conductors. We prove a division algebra analogue of an ultrametric inequality of Bushnell Henniart for Rankin Selberg conductors. Under the Jacquet Langlands correspondence, the two versions are equivalent."} {"_id": [81], "label": "cs.MS", "text": "Program Generation for Linear Algebra Using Multiple Layers of DSLs. Numerical software in computational science and engineering often relies on highly optimized building blocks from libraries such as BLAS and LAPACK, and while such libraries provide portable performance for a wide range of computing architectures, they still present limitations in terms of flexibility. We advocate a domain specific program generator capable of producing library routines tailored to the specific needs of the application in terms of sizes, interface, and target architecture."} {"_id": [41], "label": "cs.RO", "text": "SL1M Sparse L1 norm Minimization for contact planning on uneven terrain. One of the main challenges of planning legged locomotion in complex environments is the combinatorial contact selection problem. Recent contributions propose to use integer variables to represent which contact surface is selected, and then to rely on modern mixed integer (MI) optimization solvers to handle this combinatorial issue. To reduce the computational cost of MI, we exploit the sparsity properties of L1 norm minimization techniques to relax the contact planning problem into a feasibility linear program. Our approach accounts for kinematic reachability of the center of mass (COM) and of the contact effectors. We ensure the existence of a quasi static COM trajectory by restricting our plan to quasi flat contacts. For planning 10 steps with less than 10 potential contact surfaces for each phase, our approach is 50 to 100 times faster that its MI counterpart, which suggests potential applications for online contact re planning. The method is demonstrated in simulation with the humanoid robots HRP 2 and Talos over various scenarios."} {"_id": [12, 38], "label": "math.NT math.CA", "text": "Poissonian pair correlation on manifolds via the heat kernel. We define a notion of Poissonian pair correlation (PPC) for Riemannian manifolds without boundary and prove that PPC implies uniform distribution in this setting. This extends earlier work by Grepstad and Larcher, Aistleitner, Lachmann, and Pausinger, Steinerberger, and Marklof."} {"_id": [74, 23], "label": "math.OA math.FA", "text": "Amenable dynamical systems over locally compact groups. We establish several new characterizations of amenable W and C dynamical systems over arbitrary locally compact groups. In the W setting we show that amenability is equivalent to (1) a Reiter property and (2) the existence of a certain net of completely positive Herz Schur multipliers of (M,G, alpha) converging point weak to the identity of G bar ltimes M . In the C setting, we prove that amenability of (A,G, alpha) is equivalent to an analogous Herz Schur multiplier approximation of the identity of the reduced crossed product G ltimes A , as well as a particular case of the positive weak approximation property of B ' e dos and Conti (generalized the locally compact setting). When Z(A ) Z(A) , it follows that amenability is equivalent to the 1 positive approximation property of Exel and Ng. In particular, when A C 0(X) is commutative, amenability of (C 0(X),G, alpha) coincides with topological amenability the G space (G,X) . Our results answer 2 open questions from the literature one of Anantharaman Delaroche, and one from recent work of Buss Echterhoff Willett."} {"_id": [0], "label": "cs.CV", "text": "End to End Domain Adaptive Attention Network for Cross Domain Person Re Identification. Person re identification (re ID) remains challenging in a real world scenario, as it requires a trained network to generalise to totally unseen target data in the presence of variations across domains. Recently, generative adversarial models have been widely adopted to enhance the diversity of training data. These approaches, however, often fail to generalise to other domains, as existing generative person re identification models have a disconnect between the generative component and the discriminative feature learning stage. To address the on going challenges regarding model generalisation, we propose an end to end domain adaptive attention network to jointly translate images between domains and learn discriminative re id features in a single framework. To address the domain gap challenge, we introduce an attention module for image translation from source to target domains without affecting the identity of a person. More specifically, attention is directed to the background instead of the entire image of the person, ensuring identifying characteristics of the subject are preserved. The proposed joint learning network results in a significant performance improvement over state of the art methods on several benchmark datasets."} {"_id": [2], "label": "cs.AI", "text": "General Video Game Rule Generation. We introduce the General Video Game Rule Generation problem, and the eponymous software framework which will be used in a new track of the General Video Game AI (GVGAI) competition. The problem is, given a game level as input, to generate the rules of a game that fits that level. This can be seen as the inverse of the General Video Game Level Generation problem. Conceptualizing these two problems as separate helps breaking the very hard problem of generating complete games into smaller, more manageable subproblems. The proposed framework builds on the GVGAI software and thus asks the rule generator for rules defined in the Video Game Description Language. We describe the API, and three different rule generators a random, a constructive and a search based generator. Early results indicate that the constructive generator generates playable and somewhat interesting game rules but has a limited expressive range, whereas the search based generator generates remarkably diverse rulesets, but with an uneven quality."} {"_id": [9], "label": "math.AP", "text": "Hamilton Jacobi equations for optimal control on multidimensional junctions with entry costs. We consider an infinite horizon control problem for dynamics constrained to remain on a multidimensional junction with entry costs. We derive the associated system of Hamilton Jacobi equations (HJ), prove the comparison principle and that the value function of the optimal control problem is the unique viscosity solution of the HJ system. This is done under the usual strong controllability assumption and also under a weaker condition, coined 'moderate controllability assumption'."} {"_id": [78], "label": "math.AC", "text": "Binomial Edge Ideals of Generalized block graphs. We classify generalized block graphs whose binomial edge ideals admit a unique extremal Betti number. We prove that the Castelnuovo Mumford regularity of binomial edge ideals of generalized block graphs is bounded below by m(G) 1 , where m(G) is the number of minimal cut sets of the graph G and obtain an improved upper bound for the regularity in terms of the number of maximal cliques and pendant vertices of G ."} {"_id": [17, 82, 91], "label": "cs.DC q-bio.GN q-bio.MN", "text": "Communication Lower Bounds for Distributed Memory Computations for Mass Spectrometry based Omics Data. Mass spectrometry (MS) based omics data analysis require significant time and resources. To date, few parallel algorithms have been proposed for deducing peptides from mass spectrometry based data. However, these parallel algorithms were designed, and developed when the amount of data that needed to be processed was smaller in scale. In this paper, we prove that the communication bound that is reached by the emph existing parallel algorithms is Omega(mn 2r frac q p ) , where m and n are the dimensions of the theoretical database matrix, q and r are dimensions of spectra, and p is the number of processors. We further prove that communication optimal strategy with fast memory sqrt M mn frac 2qr p can achieve Omega( frac 2mnq p ) but is not achieved by any existing parallel proteomics algorithms till date. To validate our claim, we performed a meta analysis of published parallel algorithms, and their performance results. We show that sub optimal speedups with increasing number of processors is a direct consequence of not achieving the communication lower bounds. We further validate our claim by performing experiments which demonstrate the communication bounds that are proved in this paper. Consequently, we assert that next generation of emph provable , and demonstrated superior parallel algorithms are urgently needed for MS based large systems biology studies especially for meta proteomics, proteogenomic, microbiome, and proteomics for non model organisms. Our hope is that this paper will excite the parallel computing community to further investigate parallel algorithms for highly influential MS based omics problems."} {"_id": [7], "label": "physics.comp-ph", "text": "Wavefunctions from Energies Applications in simple potentials. A remarkable mathematical property somehow hidden and recently rediscovered allows obtaining the eigenvectors of a Hermitian matrix directly from their eigenvalues. That opens the possibility to get the wavefunctions from the spectrum, an elusive goal of many fields in physics. Here, the formula is assessed for simple potentials, recovering the theoretical wavefunctions within machine accuracy. A striking feature of this eigenvalue eigenvector relation is that it does not require knowing any of the entries of the working matrix. However, it requires the knowledge of the eigenvalues of the minor matrices (in which a row and a column have been deleted from the original matrix). We found a pattern in these sub matrices spectra, allowing to get the eigenvectors analytically. The physical information hidden behind this pattern is analyzed."} {"_id": [1, 58, 2], "label": "q-bio.NC cs.AI cs.LG", "text": "Is coding a relevant metaphor for building AI? A commentary on \"Is coding a relevant metaphor for the brain?\", by Romain Brette. Brette contends that the neural coding metaphor is an invalid basis for theories of what the brain does. Here, we argue that it is an insufficient guide for building an artificial intelligence that learns to accomplish short and long term goals in a complex, changing environment."} {"_id": [55], "label": "physics.geo-ph", "text": "Industrial applications of digital rock technology. This article provides an overview of the current state of digital rock technology, with emphasis on industrial applications. We show how imaging and image analysis can be applied for rock typing and modeling of end point saturations. Different methods to obtain a digital model of the pore space from pore scale images are presented, and the strengths and weaknesses of the different methods are discussed. We also show how imaging bridges the different subjects of geology, petrophysics and reservoir simulations, by being a common denominator for results in all these subjects. Network modeling is compared to direct simulations on grid models, and their respective strengths are discussed. Finally we present an example of digital rock technology applied to a sandstone oil reservoir. Results from digital rock modeling are compared to results from traditional laboratory experiments. We highlight the mutual benefits from conducting both traditional experiments and digital rock modeling."} {"_id": [77], "label": "math.LO", "text": "The consistency of arithmetic from a point of view of constructive tableau method with strong negation, Part I the system without complete induction. In this Part I, we shall prove the consistency of arithmetic without complete induction from a point of view of strong negation, using its embedding to the tableau system bf SN of constructive arithmetic with strong negation without complete induction, for which two types of cut elimination theorems hold. One is bf SN cut elimination theorem for the full system bf SN . The other is bf PCN cut elimination theorem for a proposed subsystem bf PCN of bf SN . The disjunction property and the E theorem (existence property) for bf SN are also proved. As a novelty, we shall give a simple proof of a restricted version of bf SN cut elimination theorem as an application of the disjunction property, using bf PCN cut elimination theorem."} {"_id": [21], "label": "math.CO", "text": "Integral flow and cycle chip firing on graphs. Motivated by the notion of chip firing on the dual graph of a planar graph, we consider integral flow chip firing' on an arbitrary graph G . The chip firing rule is governed by mathcal L (G) , the dual Laplacian of G determined by choosing a basis for the lattice of integral flows on G . We show that any graph admits such a basis so that mathcal L (G) is an M matrix, leading to a firing rule on these basis elements that is avalanche finite. This follows from a more general result on bases of integral lattices that may be of independent interest. Our results provide a notion of z superstable flow configurations that are in bijection with the set of spanning trees of G . We show that for planar graphs, as well as for the graphs K 5 and K 3,3 , one can find such a flow M basis that consists of cycles of the underlying graph. We consider the question for arbitrary graphs and address some open questions."} {"_id": [8, 33, 11], "label": "physics.ins-det physics.app-ph physics.optics", "text": "Integrated photonic characterization of single photon detectors for use in neuromorphic synapses. We show several techniques for using integrated photonic waveguide structures to simultaneously characterize multiple waveguide integrated superconducting nanowire detectors with a single fiber input. The first set of structures allows direct comparison of detector performance of waveguide integrated detectors with various widths and lengths. The second type of demonstrated integrated photonic structure allows us to achieve detection with a high dynamic range. This device allows a small number of detectors to count photons across many orders of magnitude in count rate. However, we find a stray light floor of 30 dB limits the dynamic range to three orders of magnitude. To assess the utility of the detectors for use in synapses in spiking neural systems, we measured the response with average incident photon numbers ranging from less than 10 3 to greater than 10 . The detector response is identical across this entire range, indicating that synaptic responses based on these detectors will be independent of the number of incident photons in a communication pulse. Such a binary response is ideal for communication in neural systems. We further demonstrate that the response has a linear dependence of output current pulse height on bias current with up to a factor of 1.7 tunability in pulse height. Throughout the work, we compare room temperature measurements to cryogenic measurements. The agreement indicates room temperature measurements can be used to determine important properties of the detectors."} {"_id": [17, 19], "label": "cs.CR cs.DC", "text": "An Analysis of Blockchain Consistency in Asynchronous Networks Deriving a Neat Bound. Formal analyses of blockchain protocols have received much attention recently. Consistency results of Nakamoto's blockchain protocol are often expressed in a quantity c , which denotes the expected number of network delays before some block is mined. With mu (resp., nu ) denoting the fraction of computational power controlled by benign miners (resp., the adversary), where mu nu 1 , we prove for the first time that to ensure the consistency property of Nakamoto's blockchain protocol in an asynchronous network, it suffices to have c to be just slightly greater than frac 2 mu ln ( mu nu) . Such a result is both neater and stronger than existing ones. In the proof, we formulate novel Markov chains which characterize the numbers of mined blocks in different rounds."} {"_id": [41], "label": "cs.RO", "text": "Evaluation of Skid Steering Kinematic Models for Subarctic Environments. In subarctic and arctic areas, large and heavy skid steered robots are preferred for their robustness and ability to operate on difficult terrain. State estimation, motion control and path planning for these robots rely on accurate odometry models based on wheel velocities. However, the state of the art odometry models for skid steer mobile robots (SSMRs) have usually been tested on relatively lightweight platforms. In this paper, we focus on how these models perform when deployed on a large and heavy (590 kg) SSMR. We collected more than 2 km of data on both snow and concrete. We compare the ideal differential drive, extended differential drive, radius of curvature based, and full linear kinematic models commonly deployed for SSMRs. Each of the models is fine tuned by searching their optimal parameters on both snow and concrete. We then discuss the relationship between the parameters, the model tuning, and the final accuracy of the models."} {"_id": [1], "label": "cs.LG", "text": "Faster Neural Network Training with Data Echoing. In the twilight of Moore's law, GPUs and other specialized hardware accelerators have dramatically sped up neural network training. However, earlier stages of the training pipeline, such as disk I O and data preprocessing, do not run on accelerators. As accelerators continue to improve, these earlier stages will increasingly become the bottleneck. In this paper, we introduce \"data echoing,\" which reduces the total computation used by earlier pipeline stages and speeds up training whenever computation upstream from accelerators dominates the training time. Data echoing reuses (or \"echoes\") intermediate outputs from earlier pipeline stages in order to reclaim idle capacity. We investigate the behavior of different data echoing algorithms on various workloads, for various amounts of echoing, and for various batch sizes. We find that in all settings, at least one data echoing algorithm can match the baseline's predictive performance using less upstream computation. We measured a factor of 3.25 decrease in wall clock time for ResNet 50 on ImageNet when reading training data over a network."} {"_id": [2, 3], "label": "cs.CL cs.AI", "text": "On the Potential of Lexico logical Alignments for Semantic Parsing to SQL Queries. Large scale semantic parsing datasets annotated with logical forms have enabled major advances in supervised approaches. But can richer supervision help even more? To explore the utility of fine grained, lexical level supervision, we introduce Squall, a dataset that enriches 11,276 WikiTableQuestions English language questions with manually created SQL equivalents plus alignments between SQL and question fragments. Our annotation enables new training possibilities for encoder decoder models, including approaches from machine translation previously precluded by the absence of alignments. We propose and test two methods (1) supervised attention (2) adopting an auxiliary objective of disambiguating references in the input queries to table columns. In 5 fold cross validation, these strategies improve over strong baselines by 4.4 execution accuracy. Oracle experiments suggest that annotated alignments can support further accuracy gains of up to 23.9 ."} {"_id": [46], "label": "math.AG", "text": "Slope Inequalities for fibrations of non maximal Albanese dimension. We study and obtain Slope inequalities for fibred irregular varieties of non maximal Albanese dimension. We give a comparison theorem between Clifford Severi and Slope inequalities for this type of fibrations. We also obtain a set of Slope inequalities considering the geometry of the Albanese map and the associated eventual maps."} {"_id": [9], "label": "math.AP", "text": "A Global Compact Result for a Fractional Elliptic Problem with Hardy term and critical non linearity on the whole space. In this paper, we deal with a fractional elliptic equation with critical Sobolev nonlinearity and Hardy term ( Delta) alpha u mu frac u x 2 alpha a(x) u u 2 2 u k(x) u q 2 u u , in ,H alpha( mathbb R N), where 2 q 2 , 0 alpha 1 , N 4 alpha , 2 2N (N 2 alpha) is the critical Sobolev exponent, a(x),k(x) in C( mathbb R N) . Through a compactness analysis of the functional associated to ( ) , we obtain the existence of positive solutions for ( ) under certain assumptions on a(x),k(x) ."} {"_id": [24, 18, 21], "label": "math.MG math.CO math.GT", "text": "Dual cyclic polytopes of convex planar polygons with fixed vertex angles. If we fix the angles at the vertices of a convex planar n gon, the lengths of its edges must satisfy two linear constraints in order for it to close up. If we also require unit perimeter, our vectors of n edge lengths form a convex polytope of dimension n 3 , each facet of which consists of those n gons in which the length of a particular edge has fallen to zero. Bavard and Ghys require unit area instead, which gives them a hyperbolic polytope. Those two polytopes are combinatorially equivalent, so either is fine for our purposes. Such a fixed angles polytope is combinatorially richer when the angles are well balanced. We say that fixed external angles are \"majority dominant\" when every consecutive string of more than half of them sums to more than pi . When n is odd, we show that the fixed angles polytope for any majority dominant angles is dual to the cyclic polytope C n 3 (n) . To extend that result to even n , we require that the angles also have \"dipole tie breaking\" None of the n strings of length n 2 sums to precisely pi , and the n 2 that sum to more than pi overlap as much as possible, all containing a particular angle. Fixing the vertex angles is uncommon, however people more often fix the edge lengths. That is harder, in part because fixed lengths n gons may not be convex, but mostly because fixing the lengths constrains the angles nonlinearly so the resulting moduli spaces, called \"polygon spaces\", are curved. Using Schwarz Christoffel maps, Kapovich and Millson show that the subset of that polygon space in which the n gons are convex and traversed counterclockwise is homeomorphic to the fixed angles polytope above, for those same fixed values. Each such subset is thus a topological polytope and it is dual cyclic whenever the fixed lengths are majority dominant and, for even n , have dipole tie breaking."} {"_id": [39], "label": "cs.CY", "text": "A traceability and auditing framework for electronic equipment reverse logistics based on blockchain the case of mobile phones. Human beings produce electronic waste (e waste) at an unprecedented pace. Mobile phones and other inter connected smart devices make a significant contribution to the generation of e waste. Reverse logistics (RL) activities play an essential role in managing mobile phones during their end of life. However, remanufacturing and or refurbishing of mobile phones might prove difficult not only from an operational point of view but also from a data management and privacy perspective (due to privacy related regulatory frameworks like the EU General Data Protection Regulation directive). In this paper, we propose a distributed trustless and secure framework for electronic equipment RL activities based on blockchain technology. We consider the remanufacturing refurbishing recovery option for mobile phones, and we develop an autonomous and effective back end data sharing architecture based on smart contracts blockchain technology for keeping track of all the remanufacturing refurbishing processes. For demonstrating the applicability of our approach, we develop a functional set of smart contracts and a local private blockchain. The benefits of our framework are further discussed, along with fruitful areas for future research."} {"_id": [9, 20], "label": "math.NA cs.NA math.AP", "text": "Flux stability for conservation laws with discontinuous flux and convergence rates of the front tracking method. We prove that adapted entropy solutions of scalar conservation laws with discontinuous flux are stable with respect to changes in the flux under the assumption that the flux is strictly monotone in u and the spatial dependency is piecewise constant with finitely many discontinuities. We use this stability result to prove a convergence rate for the front tracking method a numerical method which is widely used in the field of conservation laws with discontinuous flux. To the best of our knowledge, both of these results are the first of their kind in the literature on conservation laws with discontinuous flux. We also present numerical experiments verifying the convergence rate results and comparing numerical solutions computed with the front tracking method to finite volume approximations."} {"_id": [26, 71], "label": "math.SG math.RT", "text": "Action angle coordinates on coadjoint orbits and multiplicity free spaces from partial tropicalization. Coadjoint orbits and multiplicity free spaces of compact Lie groups are important examples of symplectic manifolds with Hamiltonian groups actions. Constructing action angle variables on these spaces is a challenging task. A fundamental result in the field is the Guillemin Sternberg construction of Gelfand Zeitlin integrable systems for the groups K U(n), SO(n) . Extending these results to groups of other types is one of the goals of this paper. Partial tropicalizations are Poisson spaces with constant Poisson bracket built using techniques of Poisson Lie theory and the geometric crystals of Berenstein Kazhdan. They provide a bridge between dual spaces of Lie algebras rm Lie (K) with linear Poisson brackets and polyhedral cones which parametrize the canonical bases of irreducible modules of G K mathbb C . We generalize the construction of partial tropicalizations to allow for arbitrary cluster charts, and apply it to questions in symplectic geometry. For each regular coadjoint orbit of a compact group K , we construct an exhaustion by symplectic embeddings of toric domains. As a by product we arrive at a conjectured formula for Gromov width of regular coadjoint orbits. We prove similar results for multiplicity free K spaces."} {"_id": [46, 38], "label": "math.NT math.AG", "text": "Siegel modular forms of degree three and invariants of ternary quartics. We determine the structure of the graded ring of Siegel modular forms of degree 3. It is generated by 19 modular forms, among which we identify a homogeneous system of parameters with 7 forms of weights 4, 12, 12, 14, 18, 20 and 30. We also give a complete dictionary between the Dixmier Ohno invariants of ternary quartics and the above generators."} {"_id": [33], "label": "physics.ins-det", "text": "Characterization of the new free air primary standard for medium energy X rays at CMI. In 2011 a decision was made by Czech Metrology Institute to build a free air ionization chamber (FAC) intended to be used as a primary standard of air kerma rate for medium energy X rays (photon energy from 40 to 300 keV, including mammography X ray qualities) in order to replace currently used secondary ionization chamber and to decrease the uncertainty of air kerma reference value. In period of 2013 2017, the FAC has been designed, manufactured and put into operation. Correction factors were measured or calculated by a Monte Carlo method. FAC performance was preliminary tested using a calibrated secondary chamber. Physical characteristics of the FAC are described and a summary of the correction factors with the uncertainty budget is presented."} {"_id": [46, 38], "label": "math.NT math.AG", "text": "Products and Polarizations of Super Isolated Abelian Varieties. In this paper we study super isolated abelian varieties, that is, abelian varieties over finite fields whose isogeny class contains a single isomorphism class. The goal of this paper is to (1) characterize whether a product of super isolated varieties is super isolated, and (2) characterize which super isolated abelian varieties admit principal polarizations, and how many up to polarized isomorphisms."} {"_id": [42, 20, 7], "label": "physics.comp-ph cs.NA math.DG math.NA", "text": "Non planar sensing skins for structural health monitoring based on electrical resistance tomography. Electrical resistance tomography (ERT) based distributed surface sensing systems, or sensing skins, offer alternative sensing techniques for structural health monitoring, providing capabilities for distributed sensing of, for example, damage, strain and temperature. Currently, however, the computational techniques utilized for sensing skins are limited to planar surfaces. In this paper, to overcome this limitation, we generalize the ERT based surface sensing to non planar surfaces covering arbitrarily shaped three dimensional structures We construct a framework in which we reformulate the image reconstruction problem of ERT using techniques of Riemannian geometry, and solve the resulting problem numerically. We test this framework in series of numerical and experimental studies. The results demonstrate that the feasibility of the proposed formulation and the applicability of ERT based sensing skins for non planar geometries."} {"_id": [31], "label": "q-bio.PE", "text": "The Impact of Public Safety Measures on the Spread of COVID 19 in the United States Assessed By Causal Model Based Projections of the Pandemic. The novel coronavirus, SARS CoV 2, and the disease it causes, COVID 19 was declared a pandemic on March 11, 2020 by the World Health Organization. Since then, the disease has spread all over the world, with the United States becoming the country with the highest number of cases. Governments around the world have undertaken varying degrees of public safety measures, including recommendations and ad campaigns for improved hygiene practices, enacting social distancing requirements and limiting large public gatherings, and stay at home orders and lockdowns. In the United States, while the response has varied greatly from state to state, we clearly see that the effect of these public safety measures is significant and, if these measures continue to remain in effect, or are expanded to a nationwide lockdown, the pandemic can be controlled and the disease likely overcome with mitigated consequences. In this paper, we model the spread of the novel coronavirus using a causal model. We find that, with continued lockdown measures, the United States can, according to this model, limit the total number of infections to 1.35 million and the total number of deaths to 72 thousand. A 60 day lockdown can save countless lives."} {"_id": [1, 19, 17, 39], "label": "cs.LG cs.CR cs.CY cs.DC", "text": "Privacy Guidelines for Contact Tracing Applications. Contact tracing is a very powerful method to implement and enforce social distancing to avoid spreading of infectious diseases. The traditional approach of contact tracing is time consuming, manpower intensive, dangerous and prone to error due to fatigue or lack of skill. Due to this there is an emergence of mobile based applications for contact tracing. These applications primarily utilize a combination of GPS based absolute location and Bluetooth based relative location remitted from user's smartphone to infer various insights. These applications have eased the task of contact tracing however, they also have severe implication on user's privacy, for example, mass surveillance, personal information leakage and additionally revealing the behavioral patterns of the user. This impact on user's privacy leads to trust deficit in these applications, and hence defeats their purpose. In this work we discuss the various scenarios which a contact tracing application should be able to handle. We highlight the privacy handling of some of the prominent contact tracing applications. Additionally, we describe the various threat actors who can disrupt its working, or misuse end user's data, or hamper its mass adoption. Finally, we present privacy guidelines for contact tracing applications from different stakeholder's perspective. To best of our knowledge, this is the first generic work which provides privacy guidelines for contact tracing applications."} {"_id": [56, 41, 2], "label": "cs.AI cs.LO cs.RO", "text": "Manipulation of Articulated Objects using Dual arm Robots via Answer Set Programming. The manipulation of articulated objects is of primary importance in Robotics, and can be considered as one of the most complex manipulation tasks. Traditionally, this problem has been tackled by developing ad hoc approaches, which lack flexibility and portability. In this paper we present a framework based on Answer Set Programming (ASP) for the automated manipulation of articulated objects in a robot control architecture. In particular, ASP is employed for representing the configuration of the articulated object, for checking the consistency of such representation in the knowledge base, and for generating the sequence of manipulation actions. The framework is exemplified and validated on the Baxter dual arm manipulator in a first, simple scenario. Then, we extend such scenario to improve the overall setup accuracy, and to introduce a few constraints in robot actions execution to enforce their feasibility. The extended scenario entails a high number of possible actions that can be fruitfully combined together. Therefore, we exploit macro actions from automated planning in order to provide more effective plans. We validate the overall framework in the extended scenario, thereby confirming the applicability of ASP also in more realistic Robotics settings, and showing the usefulness of macro actions for the robot based manipulation of articulated objects. Under consideration in Theory and Practice of Logic Programming (TPLP)."} {"_id": [41], "label": "cs.RO", "text": "Optimization Based Motion Planning for Multi Limbed Vertical Climbing Robots. Motion planning trajectories for a multi limbed robot to climb up walls requires a unique combination of constraints on torque, contact force, and posture. This paper focuses on motion planning for one particular setup wherein a six legged robot braces itself between two vertical walls and climbs vertically with end effectors that only use friction. Instead of motion planning with a single nonlinear programming (NLP) solver, we decoupled the problem into two parts with distinct physical meaning torso postures and contact forces. The first part can be formulated as either a mixed integer convex programming (MICP) or NLP problem, while the second part is formulated as a series of standard convex optimization problems. Variants of the two wall climbing problem e.g., obstacle avoidance, uneven surfaces, and angled walls, help verify the proposed method in simulation and experimentation."} {"_id": [20], "label": "math.NA cs.NA", "text": "Spectral Norm and Nuclear Norm of a Third Order Tensor. The spectral norm and the nuclear norm of a third order tensor play an important role in the tensor completion and recovery problem. We show that the spectral norm of a third order tensor is equal to the square root of the spectral norm of three positive semi definite biquadratic tensors, and the square roots of the nuclear norms of those three positive semi definite biquadratic tensors are lower bounds of the nuclear norm of that third order tensor. This provides a way to estimate and to evaluate the spectral norm and the nuclear norm of that third order tensor. Some upper and lower bounds for the spectral norm and nuclear norm of a third order tensor, by spectral radii and nuclear norms of some symmetric matrices, are presented."} {"_id": [1], "label": "cs.LG", "text": "Beyond Human Level Accuracy Computational Challenges in Deep Learning. Deep learning (DL) research yields accuracy and product improvements from both model architecture changes and scale larger data sets and models, and more computation. For hardware design, it is difficult to predict DL model changes. However, recent prior work shows that as dataset sizes grow, DL model accuracy and model size grow predictably. This paper leverages the prior work to project the dataset and model size growth required to advance DL accuracy beyond human level, to frontier targets defined by machine learning experts. Datasets will need to grow 33 971 times , while models will need to grow 6.6 456 times to achieve target accuracies. We further characterize and project the computational requirements to train these applications at scale. Our characterization reveals an important segmentation of DL training challenges for recurrent neural networks (RNNs) that contrasts with prior studies of deep convolutional networks. RNNs will have comparatively moderate operational intensities and very large memory footprint requirements. In contrast to emerging accelerator designs, large scale RNN training characteristics suggest designs with significantly larger memory capacity and on chip caches."} {"_id": [35, 69], "label": "math.QA math.RA", "text": "Examples of finite dimensional pointed Hopf algebras in positive characteristic. We present new examples of finite dimensional Nichols algebras over fields of positive characteristic. The corresponding braided vector spaces are not of diagonal type, admit a realization as Yetter Drinfeld modules over finite abelian groups and are analogous to braidings over fields of characteristic zero whose Nichols algebras have finite Gelfand Kirillov dimension described in arXiv 1606.02521. We obtain nex examples of finite dimensional pointed Hopf algebras by bosonization with group algebras of suitable finite abelian groups."} {"_id": [0], "label": "cs.CV", "text": "How semantic and geometric information mutually reinforce each other in ToF object localization. We propose a novel approach to localize a 3D object from the intensity and depth information images provided by a Time of Flight (ToF) sensor. Our method uses two CNNs. The first one uses raw depth and intensity images as input, to segment the floor pixels, from which the extrinsic parameters of the camera are estimated. The second CNN is in charge of segmenting the object of interest. As a main innovation, it exploits the calibration estimated from the prediction of the first CNN to represent the geometric depth information in a coordinate system that is attached to the ground, and is thus independent of the camera elevation. In practice, both the height of pixels with respect to the ground, and the orientation of normals to the point cloud are provided as input to the second CNN. Given the segmentation predicted by the second CNN, the object is localized based on point cloud alignment with a reference model. Our experiments demonstrate that our proposed two step approach improves segmentation and localization accuracy by a significant margin compared to a conventional CNN architecture, ignoring calibration and height maps, but also compared to PointNet ."} {"_id": [72, 65, 19], "label": "cs.NI cs.CR cs.PF", "text": "Me Love (SYN )Cookies SYN Flood Mitigation in Programmable Data Planes. The SYN flood attack is a common attack strategy on the Internet, which tries to overload services with requests leading to a Denial of Service (DoS). Highly asymmetric costs for connection setup putting the main burden on the attackee make SYN flooding an efficient and popular DoS attack strategy. Abusing the widely used TCP as an attack vector complicates the detection of malicious traffic and its prevention utilizing naive connection blocking strategies. Modern programmable data plane devices are capable of handling traffic in the 10 Gbit s range without overloading. We discuss how we can harness their performance to defend entire networks against SYN flood attacks. Therefore, we analyze different defense strategies, SYN authentication and SYN cookie, and discuss implementation difficulties when ported to different target data planes software, network processors, and FPGAs. We provide prototype implementations and performance figures for all three platforms. Further, we fully disclose the artifacts leading to the experiments described in this work."} {"_id": [40, 3], "label": "cs.IR cs.CL", "text": "Natural language technology and query expansion issues, state of the art and perspectives. The availability of an abundance of knowledge sources has spurred a large amount of effort in the development and enhancement of Information Retrieval techniques. Users information needs are expressed in natural language and successful retrieval is very much dependent on the effective communication of the intended purpose. Natural language queries consist of multiple linguistic features which serve to represent the intended search goal. Linguistic characteristics that cause semantic ambiguity and misinterpretation of queries as well as additional factors such as the lack of familiarity with the search environment affect the users ability to accurately represent their information needs, coined by the concept intention gap. The latter directly affects the relevance of the returned search results which may not be to the users satisfaction and therefore is a major issue impacting the effectiveness of information retrieval systems. Central to our discussion is the identification of the significant constituents that characterize the query intent and their enrichment through the addition of meaningful terms, phrases or even latent representations, either manually or automatically to capture their intended meaning. Specifically, we discuss techniques to achieve the enrichment and in particular those utilizing the information gathered from statistical processing of term dependencies within a document corpus or from external knowledge sources such as ontologies. We lay down the anatomy of a generic linguistic based query expansion framework and propose its module based decomposition, covering topical issues from query processing, information retrieval, computational linguistics and ontology engineering. For each of the modules we review state of the art solutions in the literature categorized and analyzed under the light of the techniques used."} {"_id": [39], "label": "cs.CY", "text": "Online Peer Assessment Datasets. Peer assessment experiments were conducted among first and second year students at the University of Trento. The experiments spanned an entire semester and were conducted in five computer science courses between 2013 and 2016. Peer assessment tasks included question and answer submission as well as answer evaluation tasks. The peer assessment datasets are complimented by the final scores of participating students for each course. Teachers were involved in filtering out questions submitted by students on a weekly basis. Selected questions were then used in subsequent peer assessment tasks. However, expert ratings are not included in the dataset. A major reason for this decision was that peer assessment tasks were designed with minimal teacher supervision in mind. Arguments in favour of this approach are presented. The datasets are designed in a manner that would allow their utilization in a variety of experiments. They are reported as parsable data structures that, with intermediate processing, can be moulded into NLP or ML ready datasets. Potential applications of interest include performance prediction and text similarity tasks."} {"_id": [72, 2], "label": "cs.PF cs.AI", "text": "Optimising energy and overhead for large parameter space simulations. Many systems require optimisation over multiple objectives, where objectives are characteristics of the system such as energy consumed or increase in time to perform the work. Optimisation is performed by selecting the best' set of input parameters to elicit the desired objectives. However, the parameter search space can often be far larger than can be searched in a reasonable time. Additionally, the objectives are often mutually exclusive leading to a decision being made as to which objective is more important or optimising over a combination of the objectives. This work is an application of a Genetic Algorithm to identify the Pareto frontier for finding the optimal parameter sets for all combinations of objectives. A Pareto frontier can be used to identify the sets of optimal parameters for which each is the best' for a given combination of objectives thus allowing decisions to be made with full knowledge. We demonstrate this approach for the HTC Sim simulation system in the case where a Reinforcement Learning scheduler is tuned for the two objectives of energy consumption and task overhead. Demonstrating that this approach can reduce the energy consumed by 36 over previously published work without significantly increasing the overhead."} {"_id": [42, 27], "label": "math.CT math.DG", "text": "Differential equations in a tangent category I Complete vector fields, flows, and exponentials. This paper describes how to define and work with differential equations in the abstract setting of tangent categories. The key notion is that of a curve object which is, for differential geometry, the structural analogue of a natural number object. A curve object is a preinitial object for dynamical systems dynamical systems may, in turn, be viewed as determining systems of differential equations. The unique map from the curve object to a dynamical system is a solution of the system, and a dynamical system is said to be complete when for all initial conditions there is a solution. A subtle issue concerns the question of when a dynamical system is complete, and the paper provides abstract conditions for this. This abstract formulation also allows new perspectives on topics such as commutative vector fields and flows. In addition, the stronger notion of a differential curve object, which is the centrepiece of the last section of the paper, has exponential maps and forms a differential exponential rig. This rig then, somewhat surprisingly, has an action on every differential object and bundle in the setting. In this manner, in a very strong sense, such a curve object plays the role of the real numbers in standard differential geometry."} {"_id": [25], "label": "math.PR", "text": "Probability of consensus in spatial opinion models with confidence threshold. This paper gives lower bounds for the probability of consensus for two spatially explicit stochastic opinion models. Both processes are characterized by two finite connected graphs, that we call respectively the spatial graph and the opinion graph. The former represents the social network describing how individuals interact, while the latter represents the topological structure of the opinion space. The representation of the opinions as a graph induces a distance between opinions which we use to measure disagreements. Individuals can only interact with their neighbors on the spatial graph, and each interaction results in a local change of opinion only if the two interacting individuals do not disagree too much, which is quantified using a confidence threshold. In the first model, called the imitation process, an update results in both neighbors having the exact same opinion, whereas in the second model, called the attraction process, an update results in the neighbors' opinions getting one unit closer. For both models, we derive a lower bound for the probability of consensus that holds for any finite connected spatial graph. For the imitation process, the lower bound for the probability of consensus also holds for any finite connected opinion graph, whereas for the attraction process, the lower bound only holds for a certain class of opinion graphs that includes finite integer lattices, regular trees and star like graphs."} {"_id": [34, 13], "label": "math.DS math.CV", "text": "Invariant escaping Fatou components with two rank 1 limit functions for automorphisms of mathbb C 2 . We construct automorphisms of mathbb C 2 , and more precisely transcendental H 'enon maps, with an invariant escaping Fatou component which has exactly two distinct limit functions, both of (generic) rank 1. We also prove a general growth lemma for the norm of points in orbits belonging to invariant escaping Fatou components for automorphisms of the form F(z,w) (g(z,w),z) with g(z,w) mathbb C 2 rightarrow mathbb C holomorphic."} {"_id": [9], "label": "math.AP", "text": "Regularity of a gradient flow generated by the anisotropic Landau de Gennes energy with a singular potential. In this paper we study a gradient flow generated by the Landau de Gennes free energy that describes nematic liquid crystal configurations in the space of Q tensors. This free energy density functional is composed of three quadratic terms as the elastic energy density part, and a singular potential in the bulk part that is considered as a natural enforcement of a physical constraint on the eigenvalues of Q . The system is a non diagonal parabolic system with a singular potential which trends to infinity logarithmically when the eigenvalues of Q approaches the physical boundary. We give a rigorous proof that for rather general initial data with possibly infinite free energy, the system has a unique strong solution after any positive time t 0 . Furthermore, this unique strong solution detaches from the physical boundary after a sufficiently large time T 0 . We also give estimate of the Hausdorff measure of the set where the solution touches the physical boundary and thus prove a partial regularity result of the solution in the intermediate stage (0,T 0) ."} {"_id": [42], "label": "math.DG", "text": "Geodesic lines in Nearly K \"ahler S 3 timesS 3. A nearly K \"ahler manifold is an almost Hermitian manifold with the weakened K \"ahler condition, that is, instead of being zero, the covariant derivative of the almost complex structure is skew symmetric. We give the explicit parameterization of geodesic lines on the nearly K \"ahler S 3 timesS 3."} {"_id": [0, 41, 1], "label": "cs.RO cs.CV cs.LG", "text": "Towards Learning to Detect and Predict Contact Events on Vision based Tactile Sensors. In essence, successful grasp boils down to correct responses to multiple contact events between fingertips and objects. In most scenarios, tactile sensing is adequate to distinguish contact events. Due to the nature of high dimensionality of tactile information, classifying spatiotemporal tactile signals using conventional model based methods is difficult. In this work, we propose to predict and classify tactile signal using deep learning methods, seeking to enhance the adaptability of the robotic grasp system to external event changes that may lead to grasping failure. We develop a deep learning framework and collect 6650 tactile image sequences with a vision based tactile sensor, and the neural network is integrated into a contact event based robotic grasping system. In grasping experiments, we achieved 52 increase in terms of object lifting success rate with contact detection, significantly higher robustness under unexpected loads with slip prediction compared with open loop grasps, demonstrating that integration of the proposed framework into robotic grasping system substantially improves picking success rate and capability to withstand external disturbances."} {"_id": [49], "label": "math.OC", "text": "A note on partial calmness for bilevel optimization problems with linearly structured lower level. Partial calmness is a celebrated but restrictive property of bilevel optimization problems whose presence opens a way to the derivation of Karush Kuhn Tucker type necessary optimality conditions in order to characterize local minimizers. In the past, sufficient conditions for the validity of partial calmness have been investigated. In this regard, the presence of a linearly structured lower level problem has turned out to be beneficial. However, the associated literature suffers from inaccurate results. In this note, we clarify some regarding erroneous statements and visualize the underlying issues with the aid of illustrative counterexamples."} {"_id": [1, 52], "label": "cs.MA cs.LG", "text": "An Elo based rating system for TopCoder SRM. We present an Elo based rating system for programming contests. We justify a definition of performance using the logarithm of a player's rank. We apply the definition to rating TopCoder SRM. We improve the accuracy, guided by experimental results. We compare results with SRM ratings."} {"_id": [0], "label": "cs.CV", "text": "SkyNet a Hardware Efficient Method for Object Detection and Tracking on Embedded Systems. Object detection and tracking are challenging tasks for resource constrained embedded systems. While these tasks are among the most compute intensive tasks from the artificial intelligence domain, they are only allowed to use limited computation and memory resources on embedded devices. In the meanwhile, such resource constrained implementations are often required to satisfy additional demanding requirements such as real time response, high throughput performance, and reliable inference accuracy. To overcome these challenges, we propose SkyNet, a hardware efficient neural network to deliver the state of the art detection accuracy and speed for embedded systems. Instead of following the common top down flow for compact DNN (Deep Neural Network) design, SkyNet provides a bottom up DNN design approach with comprehensive understanding of the hardware constraints at the very beginning to deliver hardware efficient DNNs. The effectiveness of SkyNet is demonstrated by winning the competitive System Design Contest for low power object detection in the 56th IEEE ACM Design Automation Conference (DAC SDC), where our SkyNet significantly outperforms all other 100 competitors it delivers 0.731 Intersection over Union (IoU) and 67.33 frames per second (FPS) on a TX2 embedded GPU and 0.716 IoU and 25.05 FPS on an Ultra96 embedded FPGA. The evaluation of SkyNet is also extended to GOT 10K, a recent large scale high diversity benchmark for generic object tracking in the wild. For state of the art object trackers SiamRPN and SiamMask, where ResNet 50 is employed as the backbone, implementations using our SkyNet as the backbone DNN are 1.60X and 1.73X faster with better or similar accuracy when running on a 1080Ti GPU, and 37.20X smaller in terms of parameter size for significantly better memory and storage footprint."} {"_id": [0], "label": "cs.CV", "text": "Adversarial Example in Remote Sensing Image Recognition. With the wide application of remote sensing technology in various fields, the accuracy and security requirements for remote sensing images (RSIs) recognition are also increasing. In recent years, due to the rapid development of deep learning in the field of image recognition, RSI recognition models based on deep convolution neural networks (CNNs) outperform traditional hand craft feature techniques. However, CNNs also pose security issues when they show their capability of accurate classification. By adding a very small variation of the adversarial perturbation to the input image, the CNN model can be caused to produce erroneous results with extremely high confidence, and the modification of the image is not perceived by the human eye. This added adversarial perturbation image is called an adversarial example, which poses a serious security problem for systems based on CNN model recognition results. This paper, for the first time, analyzes adversarial example problem of RSI recognition under CNN models. In the experiments, we used different attack algorithms to fool multiple high accuracy RSI recognition models trained on multiple RSI datasets. The results show that RSI recognition models are also vulnerable to adversarial examples, and the models with different structures trained on the same RSI dataset also have different vulnerabilities. For each RSI dataset, the number of features also affects the vulnerability of the model. Many features are good for defensive adversarial examples. Further, we find that the attacked class of RSI has an attack selectivity property. The misclassification of adversarial examples of the RSIs are related to the similarity of the original classes in the CNN feature space. In addition, adversarial examples in RSI recognition are of great significance for the security of remote sensing applications, showing a huge potential for future research."} {"_id": [49, 25], "label": "math.OC math.PR", "text": "A Finite Horizon Optimal Stochastic Impulse Control Problem with A Decision Lag. This paper studies an optimal stochastic impulse control problem in a finite horizon with a decision lag, by which we mean that after an impulse is made, a fixed number units of time has to be elapsed before the next impulse is allowed to be made. The continuity of the value function is proved. A suitable version of dynamic programming principle is established, which takes into account the dependence of state process on the elapsed time. The corresponding Hamilton Jacobi Bellman (HJB) equation is derived, which exhibit some special feature of the problem. The value function of this optimal impulse control problem is characterized as the unique viscosity solution to the corresponding HJB equation. An optimal impulse control is constructed provided the value function is given. Moreover, a limiting case with the waiting time approaching 0 is discussed."} {"_id": [14], "label": "cs.HC", "text": "Tactile Presentation of Network Data Text, Matrix or Diagram?. Visualisations are commonly used to understand social, biological and other kinds of networks. Currently, we do not know how to effectively present network data to people who are blind or have low vision (BLV). We ran a controlled study with 8 BLV participants comparing four tactile representations organic node link diagram, grid node link diagram, adjacency matrix and braille list. We found that the node link representations were preferred and more effective for path following and cluster identification while the matrix and list were better for adjacency tasks. This is broadly in line with findings for the corresponding visual representations."} {"_id": [41, 2, 14], "label": "cs.HC cs.AI cs.RO", "text": "An implementation of an imitation game with ASD children to learn nursery rhymes. Previous studies have suggested that being imitated by an adult is an effective intervention with children with autism and developmental delay. The purpose of this study is to investigate if an imitation game with a robot can arise interest from children and constitute an effective tool to be used in clinical activities. In this paper, we describe the design of our nursery rhyme imitation game, its implementation based on RGB image pose recognition and the preliminary tests we performed."} {"_id": [0, 83], "label": "cs.CV cs.MM", "text": "Preserving Semantic and Temporal Consistency for Unpaired Video to Video Translation. In this paper, we investigate the problem of unpaired video to video translation. Given a video in the source domain, we aim to learn the conditional distribution of the corresponding video in the target domain, without seeing any pairs of corresponding videos. While significant progress has been made in the unpaired translation of images, directly applying these methods to an input video leads to low visual quality due to the additional time dimension. In particular, previous methods suffer from semantic inconsistency (i.e., semantic label flipping) and temporal flickering artifacts. To alleviate these issues, we propose a new framework that is composed of carefully designed generators and discriminators, coupled with two core objective functions 1) content preserving loss and 2) temporal consistency loss. Extensive qualitative and quantitative evaluations demonstrate the superior performance of the proposed method against previous approaches. We further apply our framework to a domain adaptation task and achieve favorable results."} {"_id": [0], "label": "cs.CV", "text": "TW SMNet Deep Multitask Learning of Tele Wide Stereo Matching. In this paper, we introduce the problem of estimating the real world depth of elements in a scene captured by two cameras with different field of views, where the first field of view (FOV) is a Wide FOV (WFOV) captured by a wide angle lens, and the second FOV is contained in the first FOV and is captured by a tele zoom lens. We refer to the problem of estimating the inverse depth for the union of FOVs, while leveraging the stereo information in the overlapping FOV, as Tele Wide Stereo Matching (TW SM). We propose different deep learning solutions to the TW SM problem. Since the disparity is proportional to the inverse depth, we train stereo matching disparity estimation (SMDE) networks to estimate the disparity for the union WFOV. We further propose an end to end deep multitask tele wide stereo matching neural network (MT TW SMNet), which simultaneously learns the SMDE task for the overlapped Tele FOV and the single image inverse depth estimation (SIDE) task for the WFOV. Moreover, we design multiple methods for the fusion of the SMDE and SIDE networks. We evaluate the performance of TW SM on the popular KITTI and SceneFlow stereo datasets, and demonstrate its practicality by synthesizing the Bokeh effect on the WFOV from a tele wide stereo image pair."} {"_id": [1, 61], "label": "cs.LG q-fin.TR", "text": "Adversarial Attacks on Deep Algorithmic Trading Policies. Deep Reinforcement Learning (DRL) has become an appealing solution to algorithmic trading such as high frequency trading of stocks and cyptocurrencies. However, DRL have been shown to be susceptible to adversarial attacks. It follows that algorithmic trading DRL agents may also be compromised by such adversarial techniques, leading to policy manipulation. In this paper, we develop a threat model for deep trading policies, and propose two attack techniques for manipulating the performance of such policies at test time. Furthermore, we demonstrate the effectiveness of the proposed attacks against benchmark and real world DQN trading agents."} {"_id": [21], "label": "math.CO", "text": "Chromatic polynomials of 2 edge coloured graphs. Using the definition of colouring of 2 edge coloured graphs derived from 2 edge coloured graph homomorphism, we extend the definition of chromatic polynomial to 2 edge coloured graphs. We find closed forms for the first three coefficients of this polynomial that generalize the known results for the chromatic polynomial of a graph. We classify those 2 edge coloured graphs that have a chromatic polynomial equal to the chromatic polynomial of the underlying graph, when every vertex is incident to edges of both colours. Finally, we examine the behaviour of the roots of this polynomial, highlighting behaviours not seen in chromatic polynomials of graphs."} {"_id": [65, 68, 49], "label": "cs.NI cs.DM math.OC", "text": "Scheduling Algorithms for 5G Networks with Mid haul Capacity Constraints. We consider a virtualized RAN architecture for 5G networks where the Remote Units are connected to a central unit via a mid haul. To support high data rates, the midhaul is realized with a Passive Optical Network (PON). In this architecture, the data are stored at the central unit until the scheduler decides to transmit it through the mid haul to an appropriate remote unit, and then over the air at the same slot. We study an optimal scheduling problem that arises in this context. This problem has two key features. First, multiple cells must be scheduled simultaneously for efficient operation. Second, the interplay between the time varying wireless interface rates and the fixed capacity PON needs to be handled efficiently. In this paper, we take a comprehensive look at this resource allocation problem by formulating it as a utility maximization problem. Using combinatorial techniques, we derive useful structural properties of the optimal allocation and utilize these results to design polynomial time approximation algorithms and a pseudopolynomial time optimal algorithm. Finally, we numerically compare the performance of the proposed algorithms to heuristics which are natural generalizations of the ubiquitous Proportional Fair algorithm."} {"_id": [3], "label": "cs.CL", "text": "Facilitating Access to Multilingual COVID 19 Information via Neural Machine Translation. Every day, more people are becoming infected and dying from exposure to COVID 19. Some countries in Europe like Spain, France, the UK and Italy have suffered particularly badly from the virus. Others such as Germany appear to have coped extremely well. Both health professionals and the general public are keen to receive up to date information on the effects of the virus, as well as treatments that have proven to be effective. In cases where language is a barrier to access of pertinent information, machine translation (MT) may help people assimilate information published in different languages. Our MT systems trained on COVID 19 data are freely available for anyone to use to help translate information published in German, French, Italian, Spanish into English, as well as the reverse direction."} {"_id": [9, 20, 23], "label": "math.NA cs.NA math.AP math.FA", "text": "Numerical verification method for positive solutions of elliptic problems. The purpose of this paper is to propose methods for verifying the positivity of a weak solution u of an elliptic problem assuming H 1 0 error estimation left u hat u right H 0 1 leq rho given some numerical approximation hat u and an explicit error bound rho . We provide a sufficient condition for the solution to be positive and analyze the range of application of our method for elliptic problems with polynomial nonlinearities. We present numerical examples where our method is applied to some important problems."} {"_id": [9], "label": "math.AP", "text": "Unique weak solutions of the non resistive magnetohydrodynamic equations with fractional dissipation. This paper examines the uniqueness of weak solutions to the d dimensional magnetohydrodynamic (MHD) equations with the fractional dissipation ( Delta) alpha u and without the magnetic diffusion. Important progress has been made on the standard Laplacian dissipation case alpha 1 . This paper discovers that there are new phenomena with the case alpha 1 . The approach for alpha 1 can not be directly extended to alpha 1 . We establish that, for alpha 1 , any initial data (u 0, b 0) in the inhomogeneous Besov space B sigma 2, infty ( mathbb R d) with sigma 1 frac d 2 alpha leads to a unique local solution. For the case alpha ge 1 , u 0 in the homogeneous Besov space mathring B 1 frac d 2 2 alpha 2,1 ( mathbb R d) and b 0 in mathring B 1 frac d 2 alpha 2,1 ( mathbb R d) guarantees the existence and uniqueness. These regularity requirements appear to be optimal."} {"_id": [26, 38], "label": "math.NT math.RT", "text": "Repr 'e sentations cuspidales de GL(r,D) distingu 'e es par une involution int 'e rieure. Let n be a positive integer, F be a non Archimedean locally compact field of odd residue characteristic p and G be an inner form of GL(2n,F). This is a group of the form GL(r,D) for a positive integer r and division F algebra D of reduced degree d such that rd 2n. Let K be a quadratic extension of F in the algebra of matrices of size r with coefficients in D, and H be its centralizer in G. We study selfdual cuspidal representations of G and their distinction by H from the point of view of type theory. Given such a representation pi of G, we compute the value at 1 2 of the epsilon factor of the restriction of the Langlands parameter phi of pi to the Weil group of K, denoted e(K,phi). When F has characteristic 0, we deduce that pi is H distinguished if and only if phi is symplectic and e(K,phi) ( 1) r. This proves in this case a conjecture by Prasad and Takloo Bighash."} {"_id": [96], "label": "q-fin.PM", "text": "Critical Decisions for Asset Allocation via Penalized Quantile Regression. We extend the analysis of investment strategies derived from penalized quantile regression models, introducing alternative approaches to improve state textendash of textendash art asset allocation rules. First, we use a post textendash penalization procedure to deal with overshrinking and concentration issues. Second, we investigate whether and to what extent the performance changes when moving from convex to nonconvex penalty functions. Third, we compare different methods to select the optimal tuning parameter which controls the intensity of the penalization. Empirical analyses on real textendash world data show that these alternative methods outperform the simple LASSO. This evidence becomes stronger when focusing on the extreme risk, which is strictly linked to the quantile regression method."} {"_id": [68, 21, 38], "label": "cs.DM math.CO math.NT", "text": "Symmetric binary Steinhaus triangles and parity regular Steinhaus graphs. A binary Steinhaus triangle is a triangle of zeroes and ones that points down and with the same local rule as the Pascal triangle modulo 2. A binary Steinhaus triangle is said to be rotationally symmetric, horizontally symmetric or dihedrally symmetric if it is invariant under the 120 degrees rotation, the horizontal reflection or both, respectively. The first part of this paper is devoted to the study of linear subspaces of rotationally symmetric, horizontally symmetric and dihedrally symmetric binary Steinhaus triangles. We obtain simple explicit bases for each of them by using elementary properties of the binomial coefficients. A Steinhaus graph is a simple graph with an adjacency matrix whose upper triangular part is a binary Steinhaus triangle. A Steinhaus graph is said to be even or odd if all its vertex degrees are even or odd, respectively. One of the main results of this paper is the existence of an isomorphism between the linear subspace of even Steinhaus graphs and a certain linear subspace of dihedrally symmetric binary Steinhaus triangles. This permits us to give, in the second part of this paper, an explicit basis for even Steinhaus graphs and for the vector space of parity regular Steinhaus graphs i.e., the linear subspace of Steinhaus graphs that are even or odd. Finally, in the last part of this paper, we consider the generalized Pascal triangles, that are triangles of zeroes and ones, that point up now, and always with the same local rule as the Pascal triangle modulo 2. New simple bases for each linear subspace of symmetric generalized Pascal triangles are deduced from the results of the first part."} {"_id": [20], "label": "math.NA cs.NA", "text": "Lawson schemes for highly oscillatory stochastic differential equations and conservation of invariants. In this paper, we consider a class of stochastic midpoint and trapezoidal Lawson schemes for the numerical discretization of highly oscillatory stochastic differential equations. These Lawson schemes incorporate both the linear drift and diffusion terms in the exponential operator. We prove that the midpoint Lawson schemes preserve quadratic invariants and discuss this property as well for the trapezoidal Lawson scheme. Numerical experiments demonstrate that the integration error for highly oscillatory problems is smaller than that of some standard methods."} {"_id": [23], "label": "math.FA", "text": "Non convergence of the spherical harmonic expansion of gravitational potential below the Brillouin sphere the continuous case. For a singleton planet P with gravitational potential V , we show that for each varepsilon 0 there exists a planet P' with gravitational potential V' , with (P',V') \" varepsilon close\" to (P,V) (in an appropriate C 0 sense) for which the spherical harmonic expansion of V' does not extend more than a distance varepsilon below the Brillouin sphere of P' ."} {"_id": [65], "label": "cs.NI", "text": "Content Delivery Latency of Caching Strategies for Information Centric IoT. In network caching is a central aspect of Information Centric Networking (ICN). It enables the rapid distribution of content across the network, alleviating strain on content producers and reducing content delivery latencies. ICN has emerged as a promising candidate for use in the Internet of Things (IoT). However, IoT devices operate under severe constraints, most notably limited memory. This means that nodes cannot indiscriminately cache all content instead, there is a need for a caching strategy that decides what content to cache. Furthermore, many applications in the IoT space are timesensitive therefore, finding a caching strategy that minimises the latency between content request and delivery is desirable. In this paper, we evaluate a number of ICN caching strategies in regards to latency and hop count reduction using IoT devices in a physical testbed. We find that the topology of the network, and thus the routing algorithm used to generate forwarding information, has a significant impact on the performance of a given caching strategy. To the best of our knowledge, this is the first study that focuses on latency effects in ICN IoT caching while using real IoT hardware, and the first to explicitly discuss the link between routing algorithm, network topology, and caching effects."} {"_id": [74], "label": "math.OA", "text": "Structure of block quantum dynamical semigroups and their product systems. W. Paschke's version of Stinespring's theorem associates a Hilbert C module along with a generating vector to every completely positive map. Building on this, to every quantum dynamical semigroup (QDS) on a C algebra mathcal A one may associate an inclusion system E (E t) of Hilbert mathcal A mathcal A modules with a generating unit xi ( xi t) . Suppose mathcal B is a von Neumann algebra, consider M 2( mathcal B) , the von Neumann algebra of 2 times 2 matrices with entries from mathcal B . Suppose ( Phi t) t ge 0 with Phi t begin pmatrix phi t 1 psi t psi t phi t 2 end pmatrix , is a QDS on M 2(B) which acts block wise and let (E i t) t ge 0 be the inclusion system associated to the diagonal QDS ( phi i t) t ge 0 with the generating unit ( xi t i) t ge 0 , i 1,2. It is shown that there is a contractive (bilinear) morphism T (T t) t ge0 from (E 2 t) t ge 0 to (E 1 t) t ge 0 such that psi t(a) langle xi 1 t, T t a xi 2 t rangle for all a in mathcal B. We also prove that any contractive morphism between inclusion systems of von Neumann mathcal B mathcal B modules can be lifted as a morphism between the product systems generated by them. We observe that the E 0 dilation of a block quantum Markov semigroup (QMS) on a unital C algebra is again a semigroup of block maps."} {"_id": [40, 1], "label": "cs.IR cs.LG", "text": "Addressing Class Imbalance Problem in Personalized Ranking. Pairwise ranking models have been widely used to address recommendation problems. The basic idea is to learn the rank of users' preferred items through separating items into emph positive samples if user item interactions exist, and emph negative samples otherwise. Due to the limited number of observable interactions, pairwise ranking models face serious emph class imbalance issues. Our theoretical analysis shows that current sampling based methods cause the vertex level imbalance problem, which makes the norm of learned item embeddings towards infinite after a certain training iterations, and consequently results in vanishing gradient and affects the model inference results. We thus propose an efficient emph underline Vi tal underline N egative underline S ampler (VINS) to alleviate the class imbalance issue for pairwise ranking model, in particular for deep learning models optimized by gradient methods. The core of VINS is a bias sampler with reject probability that will tend to accept a negative candidate with a larger degree weight than the given positive item. Evaluation results on several real datasets demonstrate that the proposed sampling method speeds up the training procedure 30 to 50 for ranking models ranging from shallow to deep, while maintaining and even improving the quality of ranking results in top N item recommendation."} {"_id": [2], "label": "cs.AI", "text": "RBF HS Recursive Best First Hitting Set Search. Various model based diagnosis scenarios require the computation of most preferred fault explanations. Existing algorithms that are sound (i.e., output only actual fault explanations) and complete (i.e., can return all explanations), however, require exponential space to achieve this task. As a remedy, we propose two novel diagnostic search algorithms, called RBF HS (Recursive Best First Hitting Set Search) and HBF HS (Hybrid Best First Hitting Set Search), which build upon tried and tested techniques from the heuristic search domain. RBF HS can enumerate an arbitrary predefined finite number of fault explanations in best first order within linear space bounds, without sacrificing the desirable soundness or completeness properties. The idea of HBF HS is to find a trade off between runtime optimization and a restricted space consumption that does not exceed the available memory. In extensive experiments on real world diagnosis cases we compared our approaches to Reiter's HS Tree, a state of the art method that gives the same theoretical guarantees and is as general(ly applicable) as the suggested algorithms. For the computation of minimum cardinality fault explanations, we find that (1) RBF HS reduces memory requirements substantially in most cases by up to several orders of magnitude, (2) in more than a third of the cases, both memory savings and runtime savings are achieved, and (3) given the runtime overhead is significant, using HBF HS instead of RBF HS reduces the runtime to values comparable with HS Tree while keeping the used memory reasonably bounded. When computing most probable fault explanations, we observe that RBF HS tends to trade memory savings more or less one to one for runtime overheads. Again, HBF HS proves to be a reasonable remedy to cut down the runtime while complying with practicable memory bounds."} {"_id": [17], "label": "cs.DC", "text": "Verifying Strong Eventual Consistency in delta CRDTs. Conflict free replicated data types (CRDTs) are a natural structure with which to communicate information about a shared computation in a distributed setting where coordination overhead may not be tolerated, and individual participants are allowed to temporarily diverge from the overall computation. Within this setting, there are two classical approaches state and operation based CRDTs. The former define a commutative, associative, and idempotent join operation, and their states a monotone join semi lattice. State based CRDTs may be further distinguished into classical and delta state CRDTs. The former communicate their full state after each update, whereas the latter communicate only the changed state. Op based CRDTs communicate operations (not state), thus making their updates non idempotent. Whereas op based CRDTs require little information to be exchanged, they demand relatively strong network guarantees (exactly once message delivery), and state based CRDTs suffer the opposite problem. Both satisfy strong eventual consistency (SEC). We posit that delta state CRDTs both (1) require less communication overhead from payload size, and (2) tolerate relatively weak network environments, making them an ideal candidate for real world use of CRDTs. Our central intuition is a pair of reductions between state , delta state, and op based CRDTs. We formalize this intuition in the Isabelle interactive theorem prover and show that state based CRDTs achieve SEC. We present a relaxed network model in Isabelle and show that state based CRDTs still maintain SEC. Finally, we extend our work to show that delta state CRDTs maintain SEC when only communicating delta state fragments, even under relatively weak network conditions."} {"_id": [0, 1], "label": "cs.LG cs.CV", "text": "Exploring Vicinal Risk Minimization for Lightweight Out of Distribution Detection. Deep neural networks have found widespread adoption in solving complex tasks ranging from image recognition to natural language processing. However, these networks make confident mispredictions when presented with data that does not belong to the training distribution, i.e. out of distribution (OoD) samples. In this paper we explore whether the property of Vicinal Risk Minimization (VRM) to smoothly interpolate between different class boundaries helps to train better OoD detectors. We apply VRM to existing OoD detection techniques and show their improved performance. We observe that existing OoD detectors have significant memory and compute overhead, hence we leverage VRM to develop an OoD detector with minimal overheard. Our detection method introduces an auxiliary class for classifying OoD samples. We utilize mixup in two ways to implement Vicinal Risk Minimization. First, we perform mixup within the same class and second, we perform mixup with Gaussian noise when training the auxiliary class. Our method achieves near competitive performance with significantly less compute and memory overhead when compared to existing OoD detection techniques. This facilitates the deployment of OoD detection on edge devices and expands our understanding of Vicinal Risk Minimization for use in training OoD detectors."} {"_id": [0], "label": "cs.CV", "text": "Automatic sampling and training method for wood leaf classification based on tree terrestrial point cloud. Terrestrial laser scanning technology provides an efficient and accuracy solution for acquiring three dimensional information of plants. The leaf wood classification of plant point cloud data is a fundamental step for some forestry and biological research. An automatic sampling and training method for classification was proposed based on tree point cloud data. The plane fitting method was used for selecting leaf sample points and wood sample points automatically, then two local features were calculated for training and classification by using support vector machine (SVM) algorithm. The point cloud data of ten trees were tested by using the proposed method and a manual selection method. The average correct classification rate and kappa coefficient are 0.9305 and 0.7904, respectively. The results show that the proposed method had better efficiency and accuracy comparing to the manual selection method."} {"_id": [26], "label": "math.RT", "text": "bounded weight modules over the Lie superalgebra of Cartan W type. Let A m,n be the tensor product of the polynomial algebra in m even variables and the exterior algebra in n odd variables over the complex field C , and the Witt superalgebra W m,n be the Lie superalgebra of superderivations of A m,n . In this paper, we classify the non trivial simple bounded weight W m,n modules with respect to the standard Cartan algebra of W m,n . Any such module is a simple quotient of a tensor module F(P,L(V 1 otimes V 2)) for a simple weight module P over the Weyl superalgebra mathcal K m,n , a finite dimensional simple gl m module V 1 and a simple bounded gl n module V 2 ."} {"_id": [20], "label": "math.NA cs.NA", "text": "An adaptive finite element PML method for the open cavity scattering problems. Consider the electromagnetic scattering of a time harmonic plane wave by an open cavity which is embedded in a perfectly electrically conducting infinite ground plane. This paper is concerned with the numerical solutions of the transverse electric and magnetic polarizations of the open cavity scattering problems. In each polarization, the scattering problem is reduced equivalently into a boundary value problem of the two dimensional Helmholtz equation in a bounded domain by using the transparent boundary condition (TBC). An a posteriori estimate based adaptive finite element method with the perfectly matched layer (PML) technique is developed to solve the reduced problem. The estimate takes account both of the finite element approximation error and the PML truncation error, where the latter is shown to decay exponentially with respect to the PML medium parameter and the thickness of the PML layer. Numerical experiments are presented and compared with the adaptive finite element TBC method for both polarizations to illustrate the competitive behavior of the proposed method."} {"_id": [9], "label": "math.AP", "text": "Optimal control for the infinity obstacle problem. In this note, we show that a natural optimal control problem for the infty obstacle problem admits an optimal control which is also an optimal state. Moreover, we show the convergence of the minimal value of an optimal control problem for the p obstacle problem to the minimal value of our optimal control problem for the infty obstacle problem, as p to infty ."} {"_id": [49], "label": "math.OC", "text": "Asymptotic stabilization of a system of coupled n th order differential equations with potentially unbounded high frequency oscillating perturbations. This paper deals with an analysis and design of robust, state feedback control law uniform asymptotically stabilizing at origin the system consisting of coupled n th order ordinary differential equations in the presence of a non vanishing at x 0 or even unbounded on the time interval 0, infty) time varying high frequency oscillating perturbation w(t,x). The obtained results generalize and extend some known and now classical results in the control theory for a wider class of perturbations. Moreover, as is shown in the paper, there is no room for further generalization for w which is time dependent only, w w(t)."} {"_id": [1, 30], "label": "q-fin.ST cs.LG", "text": "Event Driven Learning of Systematic Behaviours in Stock Markets. It is reported that financial news, especially financial events expressed in news, provide information to investors' long short decisions and influence the movements of stock markets. Motivated by this, we leverage financial event streams to train a classification neural network that detects latent event stock linkages and stock markets' systematic behaviours in the U.S. stock market. Our proposed pipeline includes (1) a combined event extraction method that utilizes Open Information Extraction and neural co reference resolution, (2) a BERT ALBERT enhanced representation of events, and (3) an extended hierarchical attention network that includes attentions on event, news and temporal levels. Our pipeline achieves significantly better accuracies and higher simulated annualized returns than state of the art models when being applied to predicting Standard Poor 500, Dow Jones, Nasdaq indices and 10 individual stocks."} {"_id": [23], "label": "math.FA", "text": "AM modulus and Hausdorff measure of codimension one in metric measure spaces. Let Gamma(E) be the family of all paths which meet a set E in the metric measure space X . The set function E mapsto AM( Gamma(E)) defines the AM modulus measure in X where AM refers to the approximation modulus. We compare AM( Gamma(E)) to the Hausdorff measure co mathcal H 1(E) of codimension one in X and show that co mathcal H 1(E) approx AM( Gamma(E)) for Suslin sets E in X . This leads to a new characterization of sets of finite perimeter in X in terms of the AM modulus. We also study the level sets of BV functions and show that for a.e. t these sets have finite co mathcal H 1 measure. Most of the results are new also in mathbb R n ."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "SENTRY Selective Entropy Optimization via Committee Consistency for Unsupervised Domain Adaptation. Many existing approaches for unsupervised domain adaptation (UDA) focus on adapting under only data distribution shift and offer limited success under additional cross domain label distribution shift. Recent work based on self training using target pseudo labels has shown promise, but on challenging shifts pseudo labels may be highly unreliable, and using them for self training may cause error accumulation and domain misalignment. We propose Selective Entropy Optimization via Committee Consistency (SENTRY), a UDA algorithm that judges the reliability of a target instance based on its predictive consistency under a committee of random image transformations. Our algorithm then selectively minimizes predictive entropy to increase confidence on highly consistent target instances, while maximizing predictive entropy to reduce confidence on highly inconsistent ones. In combination with pseudo label based approximate target class balancing, our approach leads to significant improvements over the state of the art on 27 31 domain shifts from standard UDA benchmarks as well as benchmarks designed to stress test adaptation under label distribution shift."} {"_id": [24, 25, 12, 15], "label": "math.MG cs.IT math.CA math.IT math.PR", "text": "The maximum entropy of a metric space. We define a one parameter family of entropies, each assigning a real number to any probability measure on a compact metric space (or, more generally, a compact Hausdorff space with a notion of similarity between points). These entropies generalise the Shannon and R 'enyi entropies of information theory. We prove that on any space X, there is a single probability measure maximising all these entropies simultaneously. Moreover, all the entropies have the same maximum value the maximum entropy of X. As X is scaled up, the maximum entropy grows its asymptotics determine geometric information about X, including the volume and dimension. We also study the large scale limit of the maximising measure itself, arguing that it should be regarded as the canonical or uniform measure on X. Primarily we work not with entropy itself but its exponential, called diversity and (in its finite form) used as a measure of biodiversity. Our main theorem was first proved in the finite case by Leinster and Meckes."} {"_id": [3], "label": "cs.CL", "text": "Multi Stage Pre training for Low Resource Domain Adaptation. Transfer learning techniques are particularly useful in NLP tasks where a sizable amount of high quality annotated data is difficult to obtain. Current approaches directly adapt a pre trained language model (LM) on in domain text before fine tuning to downstream tasks. We show that extending the vocabulary of the LM with domain specific terms leads to further gains. To a bigger effect, we utilize structure in the unlabeled data to create auxiliary synthetic tasks, which helps the LM transfer to downstream tasks. We apply these approaches incrementally on a pre trained Roberta large LM and show considerable performance gain on three tasks in the IT domain Extractive Reading Comprehension, Document Ranking and Duplicate Question Detection."} {"_id": [15], "label": "cs.IT math.IT", "text": "Partially symmetric monomial codes. A framework of monomial codes is considered, which includes linear codes generated by the evaluation of certain monomials. Polar and Reed Muller codes are the two best known representatives of such codes and can be considered as two extreme cases. Reed Muller codes have a large automorphism group but their low complexity maximum likelihood decoding still remains an open problem. On the other hand, polar codes have much less symmetries but admit the efficient near ML decoding. We study the dependency between the code symmetries and the decoding efficiency. We introduce a new family of codes, partially symmetric monomial codes. These codes have a smaller group of symmetries than the Reed Muller codes and are in this sense \"between\" RM and polar codes. A lower bound on their parameters is introduced along with the explicit construction which achieves it. Structural properties of these codes are demonstrated and it is shown that they often have a recursive structure."} {"_id": [29], "label": "math.GR", "text": "Identities in Brandt semigroups, revisited. We present a new proof for the main claim made in the author's paper \"On the identity bases of Brandt semigroups\" (Ural. Gos. Univ. Mat. Zap. 14, no.1 (1985), 38 42) this claim provides an identity basis for an arbitrary Brandt semigroup over a group of finite exponent. We also show how to fill a gap in the original proof of the claim in loc. cit."} {"_id": [34], "label": "math.CV", "text": "Univalent functions with positive coefficients involving Touchard polynomials. The purpose of the present paper is to establish connections between various subclasses of analytic univalent functions by applying certain convolution operator involving Touchard polynomials. To be more precise, we investigate such connections with the classes of analytic univalent functions with positive coefficients in the open unit disk U."} {"_id": [92], "label": "q-bio.BM", "text": "The structure of N184K amyloidogenic variant of gelsolin highlights the role of the H bond network for protein stability and aggregation properties. Mutations in the gelsolin protein are responsible for a rare conformational disease known as AGel amyloidosis. Four of these mutations are hosted by the second domain of the protein (G2) D187N Y, G167R and N184K. The impact of the latter has been so far evaluated only by studies on the isolated G2. Here we report the characterization of full length gelsolin carrying the N184K mutation and compare the findings with those obtained on the wild type and the other variants. The crystallographic structure of the N184K variant in the Ca2 free conformation shows remarkable similarities with the wild type protein. Only minimal local rearrangements can be observed and the mutant is as efficient as the wild type in severing filamentous actin. However, thermal stability of the pathological variant is compromised in the Ca2 free conditions. These data suggest that the N to K substitution causes a local disruption of the H bond network in the core of the G2 domain. Such a subtle rearrangement of the connections does not lead to significant conformational changes but severely affects the stability of the protein."} {"_id": [85, 5], "label": "physics.plasm-ph physics.data-an", "text": "Novel inferences of ionisation recombination for particle power balance during detached discharges using deuterium Balmer line spectroscopy. The physics of divertor detachment is determined by divertor power, particle and momentum balance. This work provides a novel analysis technique of the Balmer line series to obtain a full particle power balance measurement of the divertor. This supplies new information to understand what controls the divertor target ion flux during detachment. Atomic deuterium excitation emission is separated from recombination quantitatively using Balmer series line ratios. This enables analysing those two components individually, providing ionisation recombination source sinks and hydrogenic power loss measurements. Probabilistic Monte Carlo techniques were employed to obtain full error propagation eventually resulting in probability density functions for each output variable. Both local and overall particle and power balance in the divertor are then obtained. These techniques and their assumptions have been verified by comparing the analysed synthetic diagnostic 'measurements' obtained from SOLPS simulation results for the same discharge. Power particle balance measurements have been obtained during attached and detached conditions on the TCV tokamak."} {"_id": [64, 39], "label": "cs.CY physics.soc-ph", "text": "Simulating and Evaluating Rebalancing Strategies for Dockless Bike Sharing Systems. Following the growth of dock based bike sharing systems as an eco friendly solution for transportation in urban areas, Dockless systems are revolutionizing the market for the increased flexibility they offer to users. Bike redistribution is a common approach to improve service, and there exists extensive research considering static and dynamic rebalancing strategies for dock based systems. We approach the dockless problem by defining abstract stations from trip start and end location frequency. This paper offers an optimizing Mixed Integer Program framework to model the effects of various bike repositioning strategies for dockless systems. We process 30 days worth of Singapore based dockless bike data from September 2017 to extract trips. Pairing our mixed integer program with a demand model built from the processed data, we unveil trends between fleet size, lost demand, and magnitude of repositioning proper to the repositioning strategy employed. We also show that increasing repositioning potential does not always improve service performance."} {"_id": [3], "label": "cs.CL", "text": "Stanza A Python Natural Language Processing Toolkit for Many Human Languages. We introduce Stanza, an open source Python natural language processing toolkit supporting 66 human languages. Compared to existing widely used toolkits, Stanza features a language agnostic fully neural pipeline for text analysis, including tokenization, multi word token expansion, lemmatization, part of speech and morphological feature tagging, dependency parsing, and named entity recognition. We have trained Stanza on a total of 112 datasets, including the Universal Dependencies treebanks and other multilingual corpora, and show that the same neural architecture generalizes well and achieves competitive performance on all languages tested. Additionally, Stanza includes a native Python interface to the widely used Java Stanford CoreNLP software, which further extends its functionality to cover other tasks such as coreference resolution and relation extraction. Source code, documentation, and pretrained models for 66 languages are available at https stanfordnlp.github.io stanza."} {"_id": [19], "label": "cs.CR", "text": "Towards end to end verifiable online voting adding verifiability to established voting systems. Online voting for independent elections is generally supported by trusted election providers. Typically these providers do not offer any way in which a voter can verify their vote, so the providers are trusted with ballot privacy and ensuring correctness. Despite the desire to offer online voting for political elections, this lack of transparency and verifiability is often seen as a significant barrier to the large scale adoption of online elections. Adding verifiability to an online election increases transparency and integrity, allowing voters to verify that their vote has been recorded correctly and included in the tally. However, replacing existing online systems with those that provide verifiable voting requires new algorithms and code to be deployed, and this presents a significant business risk to commercial election providers. In this paper we present the first step in an incremental approach which minimises the business risk but demonstrates the advantages of verifiability, by developing an implementation of key elements of a Selene based verifiability layer and adding it to an operational online voting system. Selene is a verifiable voting protocol that uses trackers to enable voters to confirm that their votes have been captured correctly while protecting voter anonymity. This results in a system where even the election authority running the system cannot change the result in an undetectable way, and gives stronger guarantees on the integrity of the election than were previously present. We explore the challenges presented by adding a verifiability layer to an operational system. We describe the results of two initial trials, which obtained that survey respondents found this form of verifiability easy to use and that they broadly appreciated it. We conclude by outlining the further steps in the road map towards the deployment of a fully trustworthy online voting system."} {"_id": [3], "label": "cs.CL", "text": "MS Ranker Accumulating Evidence from Potentially Correct Candidates for Answer Selection. As conventional answer selection (AS) methods generally match the question with each candidate answer independently, they suffer from the lack of matching information between the question and the candidate. To address this problem, we propose a novel reinforcement learning (RL) based multi step ranking model, named MS Ranker, which accumulates information from potentially correct candidate answers as extra evidence for matching the question with a candidate. In specific, we explicitly consider the potential correctness of candidates and update the evidence with a gating mechanism. Moreover, as we use a listwise ranking reward, our model learns to pay more attention to the overall performance. Experiments on two benchmarks, namely WikiQA and SemEval 2016 CQA, show that our model significantly outperforms existing methods that do not rely on external resources."} {"_id": [18, 26], "label": "math.GT math.RT", "text": "Dominating surface group representations into mathrm PSL 2 ( mathbb C ) in the relative representation variety. Let rho be a representation of the fundamental group of a punctured surface into mathrm PSL 2 ( mathbb C ) that is not Fuchsian. We prove that there exists a Fuchsian representation that strictly dominates rho in the simple length spectrum, and preserves the boundary lengths. This extends a result of Gueritaud Kassel Wolff to the case of mathrm PSL 2 ( mathbb C ) representations. Our proof involves straightening the pleated plane in mathbb H 3 determined by the Fock Goncharov coordinates of a framed representation, and applying strip deformations."} {"_id": [0], "label": "cs.CV", "text": "Segment as Points for Efficient Online Multi Object Tracking and Segmentation. Current multi object tracking and segmentation (MOTS) methods follow the tracking by detection paradigm and adopt convolutions for feature extraction. However, as affected by the inherent receptive field, convolution based feature extraction inevitably mixes up the foreground features and the background features, resulting in ambiguities in the subsequent instance association. In this paper, we propose a highly effective method for learning instance embeddings based on segments by converting the compact image representation to un ordered 2D point cloud representation. Our method generates a new tracking by points paradigm where discriminative instance embeddings are learned from randomly selected points rather than images. Furthermore, multiple informative data modalities are converted into point wise representations to enrich point wise features. The resulting online MOTS framework, named PointTrack, surpasses all the state of the art methods including 3D tracking methods by large margins (5.4 higher MOTSA and 18 times faster over MOTSFusion) with the near real time speed (22 FPS). Evaluations across three datasets demonstrate both the effectiveness and efficiency of our method. Moreover, based on the observation that current MOTS datasets lack crowded scenes, we build a more challenging MOTS dataset named APOLLO MOTS with higher instance density. Both APOLLO MOTS and our codes are publicly available at https github.com detectRecog PointTrack."} {"_id": [63], "label": "cs.DL", "text": "Publication Patterns' Changes due to the COVID 19 Pandemic A longitudinal and short term scientometric analysis. In recent months the COVID 19 (also known as SARS CoV 2 and Coronavirus) pandemic has spread throughout the world. In parallel, extensive scholarly research regarding various aspects of the pandemic has been published. In this work, we analyse the changes in biomedical publishing patterns due to the pandemic. We study the changes in the volume of publications in both peer reviewed journals and preprint servers, average time to acceptance of papers submitted to biomedical journals, international (co )authorship of these papers (expressed by diversity and volume), and the possible association between journal metrics and said changes. We study these possible changes using two approaches a short term analysis through which changes during the first six months of the outbreak are examined for both COVID 19 related papers and non COVID 19 related papers and a longitudinal approach through which changes are examined in comparison to the previous four years. Our results show that the pandemic has so far had a tremendous effect on all examined accounts of scholarly publications A sharp increase in publication volume has been witnessed and it can be almost entirely attributed to the pandemic a significantly faster mean time to acceptance for COVID 19 papers is apparent, and it has (partially) come at the expense of non COVID 19 papers and a significant reduction in international collaboration for COVID 19 papers has also been identified. As the pandemic continues to spread, these changes may cause a slow down in research in non COVID 19 biomedical fields and bring about a lower rate of international collaboration."} {"_id": [32, 68], "label": "cs.DS cs.DM", "text": "Fast Generation of Unlabelled Free Trees using Weight Sequences. In this paper, we introduce a new representation for ordered trees, the weight sequence representation. We then use this to construct new representations for both rooted trees and free trees, namely the canonical weight sequence representation. We construct algorithms for generating the weight sequence representations for all rooted and free trees of order n, and then add a number of modifications to improve the efficiency of the algorithms. Python implementations of the algorithms incorporate further improvements by using generators to avoid having to store the long lists of trees returned by the recursive calls, as well as caching the lists for rooted trees of small order, thereby eliminating many of the recursive calls. We further show how the algorithm can be modifed to generate adjacency list and adjacency matrix representations for free trees. We compared the run times of our Python implementation for generating free trees with the Python implementation of the well known WROM algorithm taken from NetworkX. The implementation of our algorithm is over four times as fast as the implementation of the WROM algorithm. The run times for generating adjacency lists and matrices are somewhat longer than those for weight sequences, but are still over three times as fast as the corresponding implementations of the WROM algorithm."} {"_id": [40], "label": "cs.IR", "text": "Unifying Online and Counterfactual Learning to Rank. Optimizing ranking systems based on user interactions is a well studied problem. State of the art methods for optimizing ranking systems based on user interactions are divided into online approaches that learn by directly interacting with users and counterfactual approaches that learn from historical interactions. Existing online methods are hindered without online interventions and thus should not be applied counterfactually. Conversely, counterfactual methods cannot directly benefit from online interventions. We propose a novel intervention aware estimator for both counterfactual and online Learning to Rank (LTR). With the introduction of the intervention aware estimator, we aim to bridge the online counterfactual LTR division as it is shown to be highly effective in both online and counterfactual scenarios. The estimator corrects for the effect of position bias, trust bias, and item selection bias by using corrections based on the behavior of the logging policy and on online interventions changes to the logging policy made during the gathering of click data. Our experimental results, conducted in a semi synthetic experimental setup, show that, unlike existing counterfactual LTR methods, the intervention aware estimator can greatly benefit from online interventions."} {"_id": [21], "label": "math.CO", "text": "Inclusion regions and bounds for the eigenvalues of matrices with a known eigenpair. Let ( lambda , v) be a known real eigenpair of a square real matrix A. In this paper it is shown how to locate the other eigenvalues of A in terms of the components of v. The obtained region is a union of Gershgorin discs of the second type recently introduced by the authors in a previous paper. Two cases are considered depending on whether or not some of the components of v are equal to zero. Upper bounds are obtained, in two different ways, for the largest eigenvalue in absolute value of A other than lambda . Detailed examples are provided. Although nonnegative irreducible matrices are somewhat emphasized, the main results in this paper are valid for any square real matrix."} {"_id": [25], "label": "math.PR", "text": "Links between Brownian processes, proportional increments and the last hitting times. In this short article, we will focus on the different links between some stochastic processes resulting from Brownian motion and two notions of probability theory (proportional increments and last hitting times)."} {"_id": [48, 32, 68], "label": "cs.CC cs.DM cs.DS", "text": "The directed 2 linkage problem with length constraints. The sc weak 2 linkage problem for digraphs asks for a given digraph and vertices s 1,s 2,t 1,t 2 whether D contains a pair of arc disjoint paths P 1,P 2 such that P i is an (s i,t i) path. This problem is NP complete for general digraphs but polynomially solvable for acyclic digraphs cite fortuneTCS10 . Recently it was shown cite bercziESA17 that if D is equipped with a weight function w on the arcs which satisfies that all edges have positive weight, then there is a polynomial algorithm for the variant of the weak 2 linkage problem when both paths have to be shortest paths in D . In this paper we consider the unit weight case and prove that for every pair constants k 1,k 2 , there is a polynomial algorithm which decides whether the input digraph D has a pair of arc disjoint paths P 1,P 2 such that P i is an (s i,t i) path and the length of P i is no more than d(s i,t i) k i , for i 1,2 , where d(s i,t i) denotes the length of the shortest (s i,t i) path. We prove that, unless the exponential time hypothesis (ETH) fails, there is no polynomial algorithm for deciding the existence of a solution P 1,P 2 to the sc weak 2 linkage problem where each path P i has length at most d(s i,t i) c log 1 epsilon n for some constant c . We also prove that the sc weak 2 linkage problem remains NP complete if we require one of the two paths to be a shortest path while the other path has no restriction on the length."} {"_id": [21, 47], "label": "math.CO math.AT", "text": "On the neighborhood complex of vec s stable Kneser graphs. In 2002, A. Bj \"orner and M. de Longueville showed the neighborhood complex of the 2 stable Kneser graph KG(n, k) 2 textit stab has the same homotopy type as the (n 2k) sphere. A short time ago, an analogous result about the homotopy type of the neighborhood complex of almost s stable Kneser graph has been announced by J. Oszt ' e nyi. Combining this result with the famous Lov ' a sz's topological lower bound on the chromatic number of graphs has been yielded a new way for determining the chromatic number of these graphs which was determined a bit earlier by P. Chen. In this paper we present a common generalization of the mentioned results. We will define the vec s stable Kneser graph KG(n, k) vec s textit stab as the induced subgraph of the Kneser graph KG(n, k) on vec s stable vertices. And we prove, for given an integer vector vec s (s 1, ldots, s k) and n geq sum i 1 k 1 s i 2 where s i geq2 for i neq k and s k in 1,2 , the neighborhood complex of KG(n, k) vec s textit stab is homotopy equivalent to the left(n sum i 1 k 1 s i 2 right) sphere. In particular, this implies that chi left( KG(n, k) vec s textit stab right) n sum i 1 k 1 s i for the mentioned parameters. Moreover, as a simple corollary of the previous result, we will determine the chromatic number of 3 stable kneser graphs with at most one error."} {"_id": [46], "label": "math.AG", "text": "Tautological algebra of the moduli space of semistable bundles on an elliptic curve. In this paper, our aim is to find the relations amongst the cohomology classes of Brill Noether subvarieties of the moduli space of semistable bundles over an elliptic curve. We obtain results similar to the Poincar 'e relations on a Jacobian variety."} {"_id": [3], "label": "cs.CL", "text": "Automatic Fact guided Sentence Modification. Online encyclopediae like Wikipedia contain large amounts of text that need frequent corrections and updates. The new information may contradict existing content in encyclopediae. In this paper, we focus on rewriting such dynamically changing articles. This is a challenging constrained generation task, as the output must be consistent with the new information and fit into the rest of the existing document. To this end, we propose a two step solution (1) We identify and remove the contradicting components in a target text for a given claim, using a neutralizing stance model (2) We expand the remaining text to be consistent with the given claim, using a novel two encoder sequence to sequence model with copy attention. Applied to a Wikipedia fact update dataset, our method successfully generates updated sentences for new claims, achieving the highest SARI score. Furthermore, we demonstrate that generating synthetic data through such rewritten sentences can successfully augment the FEVER fact checking training dataset, leading to a relative error reduction of 13 ."} {"_id": [21], "label": "math.CO", "text": "Equitable colorings of hypergraphs with few edges. The paper deals with an extremal problem concerning equitable colorings of uniform hyper graph. Recall that a vertex coloring of a hypergraph H is called proper if there are no monochro matic edges under this coloring. A hypergraph is said to be equitably r colorable if there is a proper coloring with r colors such that the sizes of any two color classes differ by at most one. In the present paper we prove that if the number of edges E(H) leq 0.01 left( frac n ln n right) frac r 1 r r n 1 then the hypergraph H is equitably r colorable provided r sqrt 5 ln n ."} {"_id": [62], "label": "cs.GT", "text": "Carrots or Sticks? The Effectiveness of Subsidies and Tolls in Congestion Games. Are rewards or penalties more effective in influencing user behavior? This work compares the effectiveness of subsidies and tolls in incentivizing users in congestion games. The predominantly studied method of influencing user behavior in network routing problems is to institute taxes which alter users' observed costs in a manner that causes their self interested choices to more closely align with a system level objective. Another feasible method to accomplish the same goal is to subsidize the users' actions that are preferable from a system level perspective. We show that, when users behave similarly and predictably, subsidies offer comparable performance guarantees to tolls while requiring smaller monetary transactions with users however, in the presence of unknown player heterogeneity, subsidies fail to offer the same performance as tolls. We further investigate these relationships in affine congestion games, deriving explicit performance bounds under optimal tolls and subsidies with and without user heterogeneity we show that the differences in performance can be significant."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Learning to Learn Personalised Human Activity Recognition Models. Human Activity Recognition (HAR) is the classification of human movement, captured using one or more sensors either as wearables or embedded in the environment (e.g. depth cameras, pressure mats). State of the art methods of HAR rely on having access to a considerable amount of labelled data to train deep architectures with many train able parameters. This becomes prohibitive when tasked with creating models that are sensitive to personal nuances in human movement, explicitly present when performing exercises. In addition, it is not possible to collect training data to cover all possible subjects in the target population. Accordingly, learning personalised models with few data remains an interesting challenge for HAR research. We present a meta learning methodology for learning to learn personalised HAR models for HAR with the expectation that the end user need only provides a few labelled data but can benefit from the rapid adaptation of a generic meta model. We introduce two algorithms, Personalised MAML and Personalised Relation Networks inspired by existing Meta Learning algorithms but optimised for learning HAR models that are adaptable to any person in health and well being applications. A comparative study shows significant performance improvements against the state of the art Deep Learning algorithms and the Few shot Meta Learning algorithms in multiple HAR domains."} {"_id": [32], "label": "cs.DS", "text": "Safety in s t Paths, Trails and Walks. Given a directed graph G and a pair of nodes s and t , an emph s t bridge of G is an edge whose removal breaks all s t paths of G (and thus appears in all s t paths). Computing all s t bridges of G is a basic graph problem, solvable in linear time. In this paper, we consider a natural generalisation of this problem, with the notion of \"safety\" from bioinformatics. We say that a walk W is emph safe with respect to a set mathcal W of s t walks, if W is a subwalk of all walks in mathcal W . We start by considering the maximal safe walks when mathcal W consists of all s t paths, all s t trails, or all s t walks of G . We show that the first two problems are immediate linear time generalisations of finding all s t bridges, while the third problem is more involved. In particular, we show that there exists a compact representation computable in linear time, that allows outputting all maximal safe walks in time linear in their length. We further generalise these problems, by assuming that safety is defined only with respect to a subset of emph visible edges. Here we prove a dichotomy between the s t paths and s t trails cases, and the s t walks case the former two are NP hard, while the latter is solvable with the same complexity as when all edges are visible. We also show that the same complexity results hold for the analogous generalisations of emph s t articulation points (nodes appearing in all s t paths). We thus obtain the best possible results for natural \"safety\" generalisations of these two fundamental graph problems. Moreover, our algorithms are simple and do not employ any complex data structures, making them ideal for use in practice."} {"_id": [34, 12], "label": "math.CV math.CA", "text": "F. Wiener's trick and an extremal problem for H p . For 0 p leq infty , let H p denote the classical Hardy space of the unit disc. We consider the extremal problem of maximizing the modulus of the k th Taylor coefficient of a function f in H p which satisfies f H p leq1 and f(0) t for some 0 leq t leq 1 . In particular, we provide a complete solution to this problem for k 1 and 0 p 1 . We also study F. Wiener's trick, which plays a crucial role in various coefficient related extremal problems for Hardy spaces."} {"_id": [0], "label": "cs.CV", "text": "Video Super resolution with Temporal Group Attention. Video super resolution, which aims at producing a high resolution video from its corresponding low resolution version, has recently drawn increasing attention. In this work, we propose a novel method that can effectively incorporate temporal information in a hierarchical way. The input sequence is divided into several groups, with each one corresponding to a kind of frame rate. These groups provide complementary information to recover missing details in the reference frame, which is further integrated with an attention module and a deep intra group fusion module. In addition, a fast spatial alignment is proposed to handle videos with large motion. Extensive results demonstrate the capability of the proposed model in handling videos with various motion. It achieves favorable performance against state of the art methods on several benchmark datasets."} {"_id": [39], "label": "cs.CY", "text": "Developing Excel Thought Leadership. Over a period of five years, the Institute of Chartered Accountants in England and Wales (ICAEW) has developed a suite of three 'thought leadership' papers surrounding good practice in spreadsheet use and spreadsheet work environments. We will review the history of these three papers, the key lessons which each has to teach, and discuss how the process of making them has helped ICAEW to develop its position in the field."} {"_id": [1, 2, 3], "label": "cs.CL cs.AI cs.LG", "text": "Say What I Want Towards the Dark Side of Neural Dialogue Models. Neural dialogue models have been widely adopted in various chatbot applications because of their good performance in simulating and generalizing human conversations. However, there exists a dark side of these models due to the vulnerability of neural networks, a neural dialogue model can be manipulated by users to say what they want, which brings in concerns about the security of practical chatbot services. In this work, we investigate whether we can craft inputs that lead a well trained black box neural dialogue model to generate targeted outputs. We formulate this as a reinforcement learning (RL) problem and train a Reverse Dialogue Generator which efficiently finds such inputs for targeted outputs. Experiments conducted on a representative neural dialogue model show that our proposed model is able to discover such desired inputs in a considerable portion of cases. Overall, our work reveals this weakness of neural dialogue models and may prompt further researches of developing corresponding solutions to avoid it."} {"_id": [20], "label": "math.NA cs.NA", "text": "Solving Schr \"odinger's equation by B spline collocation. B spline collocation techniques have been applied to Schr \"odinger's equation since the early 1970s, but one aspect that is noticeably missing from this literature is the use of Gaussian points (i.e., the zeros of Legendre polynomials) as the collocation points, which can significantly reduce approximation errors. Authors in the past have used equally spaced or nonlinearly distributed collocation points (noticing that the latter can increase approximation accuracy) but, strangely, have continued to avoid Gaussian collocation points. Using the methodology and computer routines provided by Carl de Boor's book A Practical Guide to Splines as a numerical laboratory', the present dissertation examines how the use of Gaussian points can interact with other features such as box size, mesh size and the order of polynomial approximants to affect the accuracy of approximations to Schr \"odinger's bound state wave functions for the electron in the hydrogen atom. We explore whether or not, and under what circumstances, B spline collocation at Gaussian points can produce more accurate approximations to Schr \"odinger's wave functions than equally spaced and nonlinearly distributed collocation points. We also apply B spline collocation at Gaussian points to a Schr \"odinger equation with cubic nonlinearity which has been used extensively in the past to study nonlinear phenomena. Our computer experiments show that collocation at Gaussian points can be a highly successful approach for the hydrogen atom, consistently superior to equally spaced collocation points and often superior to nonlinearly distributed collocation points. However, we do encounter some situations, typically when the mesh is quite coarse relative to the box size for the hydrogen atom, and also in the cubic Schr \"odinger equation case, in which nonlinearly distributed collocation points perform better than Gaussian collocation points."} {"_id": [38], "label": "math.NT", "text": "Sums of squares in S integers. In totally real number fields, we characterize the rings of S integers (obtained by inverting a rational integer m ) such that all their totally positive elements are represented as a sum of squares. We further obtain partial answers to the question when are all the totally positive algebraic integers that are divisible by m represented as a sum of squares?"} {"_id": [9, 23], "label": "math.AP math.FA", "text": "Identification of matrix diffusion coefficients in a parabolic PDE. We consider an inverse problem of identifying the diffusion coefficient in matrix form in a parabolic PDE. In 2006, Cao and Pereverzev, used a textit natural linearisation method for identifying a scalar valued diffusion coefficient in a parabolic PDE. In this paper, we make use of that idea for identifying a matrix valued coefficient, namely, using the notion of a weak solution for a parabolic PDE, we transform our non linear inverse problem into a problem of solving an ill posed operator equation where the operator depending on the data is linear. For the purpose of obtaining stable approximate solutions, Tikhonov regularization is employed, and error estimates under noisy data are derived. We have also showed the uniqueness of the solution of the inverse problem under some assumptions on the data and obtained explicit representation of adjoint of the linear operator involved. For the obtaining error estimates in the finite dimensional setting, Galerkin method is used, by defining orthogonal projections on the space of matrices with entries from L 2( O) , by making use of standard orthogonal projections on L 2( O) . For choosing the regularizing parameter, we used the adaptive technique, so that we have an order optimal rate of convergence. Finally, for the relaxed noisy data, we described a procedure for obtaining a smoothed version so as to obtain the error estimates."} {"_id": [9], "label": "math.AP", "text": "Critical Chirality in Elliptic Systems. We establish the regularity in 2 dimensions of L 2 solutions to critical elliptic systems in divergence form involving involution operators of finite W 1,2 energy."} {"_id": [2, 3], "label": "cs.CL cs.AI", "text": "A Multivariate Model for Representing Semantic Non compositionality. Semantically non compositional phrases constitute an intriguing research topic in Natural Language Processing. Semantic non compositionality the situation when the meaning of a phrase cannot be derived from the meaning of its components, is the main characteristic of such phrases, however, they bear other characteristics such as high statistical association and non substitutability. In this work, we present a model for identifying non compositional phrases that takes into account all of these characteristics. We show that the presented model remarkably outperforms the existing models of identifying non compositional phrases that mostly focus only on one of these characteristics."} {"_id": [56], "label": "cs.LO", "text": "A CDCL style calculus for solving non linear constraints. In this paper we propose a novel approach for checking satisfiability of non linear constraints over the reals, called ksmt. The procedure is based on conflict resolution in CDCL style calculus, using a composition of symbolical and numerical methods. To deal with the non linear components in case of conflicts we use numerically constructed restricted linearisations. This approach covers a large number of computable non linear real functions such as polynomials, rational or trigonometrical functions and beyond. A prototypical implementation has been evaluated on several non linear SMT LIB examples and the results have been compared with state of the art SMT solvers."} {"_id": [23], "label": "math.FA", "text": "A note on partially greedy bases in quasi Banach spaces. We continue with the study of greedy type bases in quasi Banach spaces started in 3 . In this paper, we study partially greedy bases focusing our attention in two main results Characterization of partially greedy bases in quasi Banach spaces in terms of quasi greediness and different conservative like properties. Given a C partially greedy basis in a quasi Banach space, there exists a \"renorming\" such that the basis is 1 partially greedy."} {"_id": [32, 68, 48, 21, 56], "label": "cs.LO cs.CC cs.DM cs.DS math.CO", "text": "On Testability of First Order Properties in Bounded Degree Graphs. We study property testing of properties that are definable in first order logic (FO) in the bounded degree graph and relational structure models. We show that any FO property that is defined by a formula with quantifier prefix exists forall is testable (i.e., testable with constant query complexity), while there exists an FO property that is expressible by a formula with quantifier prefix forall exists that is not testable. In the dense graph model, a similar picture is long known (Alon, Fischer, Krivelevich, Szegedy, Combinatorica 2000), despite the very different nature of the two models. In particular, we obtain our lower bound by a first order formula that defines a class of bounded degree expanders, based on zig zag products of graphs. We expect this to be of independent interest. We then prove testability of some first order properties that speak about isomorphism types of neighbourhoods, including testability of 1 neighbourhood freeness, and r neighbourhood freeness under a mild assumption on the degrees."} {"_id": [41, 1], "label": "cs.RO cs.LG", "text": "Learning from Suboptimal Demonstration via Self Supervised Reward Regression. Learning from Demonstration (LfD) seeks to democratize robotics by enabling non roboticist end users to teach robots to perform a task by providing a human demonstration. However, modern LfD techniques, e.g. inverse reinforcement learning (IRL), assume users provide at least stochastically optimal demonstrations. This assumption fails to hold in most real world scenarios. Recent attempts to learn from sub optimal demonstration leverage pairwise rankings and following the Luce Shepard rule. However, we show these approaches make incorrect assumptions and thus suffer from brittle, degraded performance. We overcome these limitations in developing a novel approach that bootstraps off suboptimal demonstrations to synthesize optimality parameterized data to train an idealized reward function. We empirically validate we learn an idealized reward function with 0.95 correlation with ground truth reward versus 0.75 for prior work. We can then train policies achieving 200 improvement over the suboptimal demonstration and 90 improvement over prior work. We present a physical demonstration of teaching a robot a topspin strike in table tennis that achieves 32 faster returns and 40 more topspin than user demonstration."} {"_id": [0], "label": "cs.CV", "text": "Canonical Voting Towards Robust Oriented Bounding Box Detection in 3D Scenes. 3D object detection has attracted much attention thanks to the advances in sensors and deep learning methods for point clouds. Current state of the art methods like VoteNet regress direct offset towards object centers and box orientations with an additional Multi Layer Perceptron network. Both their offset and orientation predictions are not accurate due to the fundamental difficulty in rotation classification. In the work, we disentangle the direct offset into Local Canonical Coordinates (LCC), box scales and box orientations. Only LCC and box scales are regressed, while box orientations are generated by a canonical voting scheme. Finally, an LCC aware back projection checking algorithm iteratively cuts out bounding boxes from the generated vote maps, with the elimination of false positives. Our model achieves state of the art performance on three standard real world benchmarks ScanNet, SceneNN and SUN RGB D. Our code is available on https github.com qq456cvb CanonicalVoting."} {"_id": [41], "label": "cs.RO", "text": "Socially Aware Crowd Navigation with Multimodal Pedestrian Trajectory Prediction for Autonomous Vehicles. Seamlessly operating an autonomous vehicle in a crowded pedestrian environment is a very challenging task. This is because human movement and interactions are very hard to predict in such environments. Recent work has demonstrated that reinforcement learning based methods have the ability to learn to drive in crowds. However, these methods can have very poor performance due to inaccurate predictions of the pedestrians' future state as human motion prediction has a large variance. To overcome this problem, we propose a new method, SARL SGAN KCE, that combines a deep socially aware attentive value network with a human multimodal trajectory prediction model to help identify the optimal driving policy. We also introduce a novel technique to extend the discrete action space with minimal additional computational requirements. The kinematic constraints of the vehicle are also considered to ensure smooth and safe trajectories. We evaluate our method against the state of art methods for crowd navigation and provide an ablation study to show that our method is safer and closer to human behaviour."} {"_id": [58], "label": "q-bio.NC", "text": "Great expectations in music violation of rhythmic expectancies elicits late frontal gamma activity nested in theta oscillations. Rhythm processing involves building expectations according to the hierarchical temporal structure of auditory events. Although rhythm processing has been addressed in the context of predictive coding, the properties of the oscillatory response in different cortical areas is still not clear. We explored the oscillatory properties of the neural response to rhythmic incongruence and explored the cross frequency coupling between multiple frequencies to provide links between the concepts of predictive coding and rhythm perception. We designed an experiment to investigate the neural response to rhythmic deviations in which the tone either arrived earlier than expected or the tone in the same metrical position was omitted. These two manipulations modulate the rhythmic structure differently, with the former creating a larger violation of the general structure of the musical stimulus than the latter. Both deviations resulted in an MMN response, whereas only the rhythmic deviant resulted in a subsequent P3a. Rhythmic deviants due to the early occurrence of a tone, but not omission deviants, elicited a late high gamma response (60 80 Hz) at the end of the P3a over the left frontal region, which, interestingly, correlated with the P3a amplitude over the same region and was also nested in theta oscillations. The timing of the elicited high frequency gamma oscillations related to rhythmic deviation suggests that it might be related to the update of the predictive neural model, corresponding to the temporal structure of the events in higher level cortical areas."} {"_id": [3], "label": "cs.CL", "text": "A Systematic Study of Leveraging Subword Information for Learning Word Representations. The use of subword level information (e.g., characters, character n grams, morphemes) has become ubiquitous in modern word representation learning. Its importance is attested especially for morphologically rich languages which generate a large number of rare words. Despite a steadily increasing interest in such subword informed word representations, their systematic comparative analysis across typologically diverse languages and different tasks is still missing. In this work, we deliver such a study focusing on the variation of two crucial components required for subword level integration into word representation models 1) segmentation of words into subword units, and 2) subword composition functions to obtain final word representations. We propose a general framework for learning subword informed word representations that allows for easy experimentation with different segmentation and composition components, also including more advanced techniques based on position embeddings and self attention. Using the unified framework, we run experiments over a large number of subword informed word representation configurations (60 in total) on 3 tasks (general and rare word similarity, dependency parsing, fine grained entity typing) for 5 languages representing 3 language types. Our main results clearly indicate that there is no \"one sizefits all\" configuration, as performance is both language and task dependent. We also show that configurations based on unsupervised segmentation (e.g., BPE, Morfessor) are sometimes comparable to or even outperform the ones based on supervised word segmentation."} {"_id": [46], "label": "math.AG", "text": "Log D modules and Index theorems. We study log D modules on smooth log pairs and construct a comparison theorem of log de Rham complexes. The proof uses Sabbah's generalized b functions. As applications, we deduce a log index theorem and a Riemann Roch type formula for perverse sheaves on smooth quasi projective varieties. The log index theorem naturally generalizes the Dubson Kashiwara index theorem on smooth projective varieties."} {"_id": [3], "label": "cs.CL", "text": "Knowledgeable Dialogue Reading Comprehension on Key Turns. Multi choice machine reading comprehension (MRC) requires models to choose the correct answer from candidate options given a passage and a question. Our research focuses dialogue based MRC, where the passages are multi turn dialogues. It suffers from two challenges, the answer selection decision is made without support of latently helpful commonsense, and the multi turn context may hide considerable irrelevant information. This work thus makes the first attempt to tackle those two challenges by extracting substantially important turns and utilizing external knowledge to enhance the representation of context. In this paper, the relevance of each turn to the question are calculated to choose key turns. Besides, terms related to the context and the question in a knowledge graph are extracted as external knowledge. The original context, question and external knowledge are encoded with the pre trained language model, then the language representation and key turns are combined together with a will designed mechanism to predict the answer. Experimental results on a DREAM dataset show that our proposed model achieves great improvements on baselines."} {"_id": [0], "label": "cs.CV", "text": "Generative PointNet Deep Energy Based Learning on Unordered Point Sets for 3D Generation, Reconstruction and Classification. We propose a generative model of unordered point sets, such as point clouds, in the form of an energy based model, where the energy function is parameterized by an input permutation invariant bottom up neural network. The energy function learns a coordinate encoding of each point and then aggregates all individual point features into an energy for the whole point cloud. We call our model the Generative PointNet because it can be derived from the discriminative PointNet. Our model can be trained by MCMC based maximum likelihood learning (as well as its variants), without the help of any assisting networks like those in GANs and VAEs. Unlike most point cloud generators that rely on hand crafted distance metrics, our model does not require any hand crafted distance metric for the point cloud generation, because it synthesizes point clouds by matching observed examples in terms of statistical properties defined by the energy function. Furthermore, we can learn a short run MCMC toward the energy based model as a flow like generator for point cloud reconstruction and interpolation. The learned point cloud representation can be useful for point cloud classification. Experiments demonstrate the advantages of the proposed generative model of point clouds."} {"_id": [5], "label": "physics.plasm-ph", "text": "Nonresonant Diffusion in Alpha Channeling. The gradient of fusion born alpha particles that arises in a fusion reactor can be exploited to amplify waves, which cool the alpha particles while diffusively extracting them from the reactor. The corresponding extraction of the resonant alpha particle charge has been suggested as a mechanism to drive rotation. By deriving a coupled linear quasilinear theory of alpha channeling, we show that, for a time growing wave with a purely poloidal wavevector, a current in the nonresonant ions cancels the resonant alpha particle current, preventing the rotation drive but fueling the fusion reaction."} {"_id": [38], "label": "math.NT", "text": "On the 4 rank of class groups of Dirichlet biquadratic fields. We show that for 100 of the odd, squarefree integers n 0 the 4 rank of text Cl ( mathbb Q (i, sqrt n )) is equal to omega 3(n) 1 , where omega 3 is the number of prime divisors of n that are 3 modulo 4 ."} {"_id": [49, 23], "label": "math.OC math.FA", "text": "On Differential Properties of Multifunctions Defined Implicitly by Set Valued Inclusions. In the present paper, several properties concerning generalized derivatives of multifunctions implicitly defined by set valued inclusions are studied by techniques of variational analysis. Set valued inclusions are problems formalizing the robust fulfilment of cone constraint systems, whose data are affected by a \"crude knowledge\" of uncertain elements, so they can not be casted in traditional generalized equations. The focus of this study in on the first order behaviour of the solution mapping associated with a parameterized set valued inclusion, starting with Lipschitzian properties and then considering its graphical derivative. In particular, a condition for the Aubin continuity of the solution mapping is established in terms of outer prederivative of the set valued mapping defining the inclusion. A large class of parameterized set valued inculsions is singled out, whose solution mapping turns out to be convex. Some relevant consequences on the graphical derivative are explored. In the absence of that, formulae for the inner and outer approximation of the graphical derivative are provided by means of prederivatives of the problem data. A representation useful to calculate the coderivative of the solution mapping is also obtained via the subdifferential of a merit function."} {"_id": [42], "label": "math.DG", "text": "Invariant Generalized Complex Structures on Partial Flag Manifolds. The aim of this paper is to classify all invariant generalized complex structure on a partial flag manifold mathbb F Theta with at most four isotropy summands. To classify them all we proved that an invariant generalized almost complex structure on mathbb F Theta is constant' in each component of the isotropy representation."} {"_id": [19, 39], "label": "cs.CR cs.CY", "text": "A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem. Internet of Things (IoT) provides the possibility for milliards of devices throughout the world to communicate with each other, and data is collected autonomously. The big data generated by the devices should be managed securely. Due to security challenges, like malicious nodes, many approaches cannot respond to these concerns. In this paper, a robust hybrid method, including encryption, is used as an efficient approach for resolving the RPL protocol concerns so that the devices are connected securely. Therefore, the proposed DSH RPL method for securing the RPL protocol comprises the four following phases The first phase creates a reliable RPL. The second phase detects the sinkhole attack. The third phase quarantines the detected malicious node, and the fourth phase transmits data through encryption. The simulation results show that the DSH RPL reduces the false positive rate more than 18.2 and 23.1 , and reduces the false negative rate more than 16.1 and 22.78 , it also increases the packet delivery rate more than 19.68 and 25.32 and increases the detection rate more than 26 and 31 compared to SecTrust RPL and IBOOS RPL."} {"_id": [41, 17], "label": "cs.RO cs.DC", "text": "Uniform Scattering of Robots on Alternate Nodes of a Grid. In this paper, we propose a distributed algorithm to uniformly scatter the robots along a grid, with robots on alternate nodes of this grid distribution. These homogeneous, autonomous mobile robots place themselves equidistant apart on the grid, which can be required for guarding or covering a geographical area by the robots. The robots operate by executing cycles of the states \"look compute move\". In the look phase, it looks to see the position of the other robots in the compute phase, it computes a destination to move to and then in the move phase, it moves to that computed destination. They do not interact by message passing and can recollect neither the past actions nor the looked data from the previous cycle, i.e., oblivious. The robots are semi synchronous, anonymous and have unlimited visibility. Eventually, the robots uniformly distribute themselves on alternate nodes of a grid, leaving the adjacent nodes of the grid vacant. The algorithm presented also assures no collision or deadlock among the robots."} {"_id": [38], "label": "math.NT", "text": "A new approach to gaps between zeta zeros. We study the value distribution of Dirichlet polynomials on the critical line Re(s) tfrac 1 2 . As a consequence, we prove a corollary on small consecutive gaps between zeros of the Riemann zeta function. We also examine the distribution of zeros under the so called alternative hypothesis and present a new approach to the problem of gaps between the zeros."} {"_id": [51, 92], "label": "physics.bio-ph q-bio.BM", "text": "InfleCS Clustering Free Energy Landscapes with Gaussian Mixtures. Free energy landscapes provide insights into conformational ensembles of biomolecules. In order to analyze these landscapes and elucidate mechanisms underlying conformational changes, there is a need to extract metastable states with limited noise. This has remained a formidable task, despite a plethora of existing clustering methods. We present InfleCS, a novel method for extracting well defined core states from free energy landscapes. The method is based on a Gaussian mixture free energy estimator and exploits the shape of the estimated density landscape. The core states that naturally arise from the clustering allow for detailed characterization of the conformational ensemble. The clustering quality is evaluated on three toy models with different properties, where the method is shown to consistently outperform other conventional and state of the art clustering methods. Finally, the method is applied to a temperature enhanced molecular dynamics simulation of Ca2 bound Calmodulin. Through the free energy landscape, we discover a pathway between a canonical and a compact state, revealing conformational changes driven by electrostatic interactions."} {"_id": [22], "label": "cs.SE", "text": "An Study of The Role of Software Project Manger in the Outcome of the Project. This paper describes an in depth analysis of successful and unsuccessful software Projects and the Role of Software Project Mangers in that success. One of the main reason in software project success is manager. Software houses are investing too much in this regard but the average ratio of software project failure is on the high side. Project managers experience, technical knowledge, and skills are not good enough for success in general. In this paper we have conducted a survey related to the approached used by different project managers, their methods and techniques, and the success ratio of their projects, and the steps they took during their projects. We will explore the core reasons of software project success and then will suggest key steps to be taken by the software project managers to deliver a successful software project."} {"_id": [9], "label": "math.AP", "text": "The global existence issue for the compressible Euler system with Poisson or Helmholtz couplings. We consider the Cauchy problem for the barotropic Euler system coupled to Helmholtz or Poisson equations, in the whole space. We assume that the initial density is small enough, and that the initial velocity is close to some reference vector field u0 such that the spectrum of Du0 is bounded away from zero. We prove the existence of a global unique solution with (fractional) Sobolev regularity, and algebraic time decay estimates. Our work extends the papers by D. Serre and M. Grassin 20, 21, 43 dedicated to the compressible Euler system without coupling and integer regularity exponents."} {"_id": [1, 2, 62], "label": "cs.AI cs.GT cs.LG", "text": "Learning in two player games between transparent opponents. We consider a scenario in which two reinforcement learning agents repeatedly play a matrix game against each other and update their parameters after each round. The agents' decision making is transparent to each other, which allows each agent to predict how their opponent will play against them. To prevent an infinite regress of both agents recursively predicting each other indefinitely, each agent is required to give an opponent independent response with some probability at least epsilon. Transparency also allows each agent to anticipate and shape the other agent's gradient step, i.e. to move to regions of parameter space in which the opponent's gradient points in a direction favourable to them. We study the resulting dynamics experimentally, using two algorithms from previous literature (LOLA and SOS) for opponent aware learning. We find that the combination of mutually transparent decision making and opponent aware learning robustly leads to mutual cooperation in a single shot prisoner's dilemma. In a game of chicken, in which both agents try to manoeuvre their opponent towards their preferred equilibrium, converging to a mutually beneficial outcome turns out to be much harder, and opponent aware learning can even lead to worst case outcomes for both agents. This highlights the need to develop opponent aware learning algorithms that achieve acceptable outcomes in social dilemmas involving an equilibrium selection problem."} {"_id": [39], "label": "cs.CY", "text": "Bluetooth Smartphone Apps Are they the most private and effective solution for COVID 19 contact tracing?. Many digital solutions mainly involving Bluetooth technology are being proposed for Contact Tracing Apps (CTA) to reduce the spread of COVID 19. Concerns have been raised regarding privacy, consent, uptake required in a given population, and the degree to which use of CTAs can impact individual behaviours. However, very few groups have taken a holistic approach and presented a combined solution. None has presented their CTA in such a way as to ensure that even the most suggestible member of our community does not become complacent and assume that CTA operates as an invisible shield, making us and our families impenetrable or immune to the disease. We propose to build on some of the digital solutions already under development that, with addition of a Bayesian model that predicts likelihood for infection supplemented by traditional symptom and contact tracing, that can enable us to reach 90 of a population. When combined with an effective communication strategy and social distancing, we believe solutions like the one proposed here can have a very beneficial effect on containing the spread of this pandemic."} {"_id": [81, 66, 17], "label": "cs.MS cs.CE cs.DC", "text": "AMReX Block Structured Adaptive Mesh Refinement for Multiphysics Applications. Block structured adaptive mesh refinement (AMR) provides the basis for the temporal and spatial discretization strategy for a number of ECP applications in the areas of accelerator design, additive manufacturing, astrophysics, combustion, cosmology, multiphase flow, and wind plant modelling. AMReX is a software framework that provides a unified infrastructure with the functionality needed for these and other AMR applications to be able to effectively and efficiently utilize machines from laptops to exascale architectures. AMR reduces the computational cost and memory footprint compared to a uniform mesh while preserving accurate descriptions of different physical processes in complex multi physics algorithms. AMReX supports algorithms that solve systems of partial differential equations (PDEs) in simple or complex geometries, and those that use particles and or particle mesh operations to represent component physical processes. In this paper, we will discuss the core elements of the AMReX framework such as data containers and iterators as well as several specialized operations to meet the needs of the application projects. In addition we will highlight the strategy that the AMReX team is pursuing to achieve highly performant code across a range of accelerator based architectures for a variety of different applications."} {"_id": [46, 78], "label": "math.AC math.AG", "text": "Componentwise linearity of projective varieties with almost maximal degree. The degree of a projective subscheme has an upper bound in term of the codimension and the reduction number. If a projective variety has an almost maximal degree, that is, the degree equals to the upper bound minus one, then its Betti table has been described explicitly. We build on this work by showing that for most of such varieties, the defining ideals are componentwise linear and in particular the componentwise linearity is suitable for classifying the Betti tables of such varieties. As an application, we compute the Betti table of all varieties with almost maximal degree and componentwise linear resolution."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "A Note on Deepfake Detection with Low Resources. Deepfakes are videos that include changes, quite often substituting face of a portrayed individual with a different face using neural networks. Even though the technology gained its popularity as a carrier of jokes and parodies it raises a serious threat to ones security via biometric impersonation or besmearing. In this paper we present two methods that allow detecting Deepfakes for a user without significant computational power. In particular, we enhance MesoNet by replacing the original activation functions allowing a nearly 1 improvement as well as increasing the consistency of the results. Moreover, we introduced and verified a new activation function Pish that at the cost of slight time overhead allows even higher consistency. Additionally, we present a preliminary results of Deepfake detection method based on Local Feature Descriptors (LFD), that allows setting up the system even faster and without resorting to GPU computation. Our method achieved Equal Error Rate of 0.28, with both accuracy and recall exceeding 0.7."} {"_id": [22], "label": "cs.SE", "text": "A Comprehensive Study of Bloated Dependencies in the Maven Ecosystem. Build automation tools and package managers have a profound influence on software development. They facilitate the reuse of third party libraries, support a clear separation between the application's code and its external dependencies, and automate several software development tasks. However, the wide adoption of these tools introduces new challenges related to dependency management. In this paper, we propose an original study of one such challenge the emergence of bloated dependencies. Bloated dependencies are libraries that the build tool packages with the application's compiled code but that are actually not necessary to build and run the application. This phenomenon artificially grows the size of the built binary and increases maintenance effort. We propose a tool, called DepClean, to analyze the presence of bloated dependencies in Maven artifacts. We analyze 9,639 Java artifacts hosted on Maven Central, which include a total of 723,444 dependency relationships. Our key result is that 75.1 of the analyzed dependency relationships are bloated. In other words, it is feasible to reduce the number of dependencies of Maven artifacts up to 1 4 of its current count. We also perform a qualitative study with 30 notable open source projects. Our results indicate that developers pay attention to their dependencies and are willing to remove bloated dependencies 18 21 answered pull requests were accepted and merged by developers, removing 131 dependencies in total."} {"_id": [36], "label": "physics.chem-ph", "text": "Porous carbon nanowire array for highly sensitive, biocompatible, reproducible surface enhanced Raman spectroscopy. Surface enhanced Raman spectroscopy (SERS) is a powerful tool for vibrational spectroscopy as it provides several orders of magnitude higher sensitivity than inherently weak spontaneous Raman scattering by exciting localized surface plasmon resonance (LSPR) on metal substrates. However, SERS is not very reliable, especially for use in life sciences, since it sacrifices reproducibility and biocompatibility due to its strong dependence on \"hot spots\" and large photothermal heat generation. Here we report a metal free (i.e., LSPR free), topologically tailored nanostructure composed of porous carbon nanowires in an array as a SERS substrate that addresses the decades old problem. Specifically, it offers not only high signal enhancement due to its strong broadband charge transfer resonance, but also extraordinarily high reproducibility or substrate to substrate, spot to spot, sample to sample, and time to time consistency in SERS spectrum due to the absence of hot spots and high compatibility to biomolecules due to its fluorescence quenching and negligible denaturation capabilities. These excellent properties make SERS suitable for practical use in diverse biomedical applications."} {"_id": [68, 21], "label": "cs.DM math.CO", "text": "Deciding whether a Lattice has an Orthonormal Basis is in co NP. We show that the problem of deciding whether a given Euclidean lattice L has an orthonormal basis is in NP and co NP. Since this is equivalent to saying that L is isomorphic to the standard integer lattice, this problem is a special form of the Lattice Isomorphism Problem, which is known to be in the complexity class SZK."} {"_id": [20], "label": "math.NA cs.NA", "text": "Properties of the LWR model with time delay. In this article, we investigate theoretical and numerical properties of the first order Lighthill Whitham Richards (LWR) traffic flow model with time delay. Since standard results from the literature are not directly applicable to the delayed model, we mainly focus on the numerical analysis of the proposed finite difference discretization. The simulation results also show that the delay model is able to capture Stop Go waves."} {"_id": [42], "label": "math.DG", "text": "The classification of ERP G2 structures on Lie groups. A complete classification of left invariant closed G2 structures on Lie groups which are extremally Ricci pinched, up to equivalence and scaling, is obtained. There are five of them, they are defined on five different completely solvable Lie groups and the G2 structure is exact in all cases except one, given by the only example in which the Lie group is unimodular."} {"_id": [64, 1, 31], "label": "physics.soc-ph cs.LG q-bio.PE", "text": "Backtesting the predictability of COVID 19. The advent of the COVID 19 pandemic has instigated unprecedented changes in many countries around the globe, putting a significant burden on the health sectors, affecting the macro economic conditions, and altering social interactions amongst the population. In response, the academic community has produced multiple forecasting models, approaches and algorithms to best predict the different indicators of COVID 19, such as the number of confirmed infected cases. Yet, researchers had little to no historical information about the pandemic at their disposal in order to inform their forecasting methods. Our work studies the predictive performance of models at various stages of the pandemic to better understand their fundamental uncertainty and the impact of data availability on such forecasts. We use historical data of COVID 19 infections from 253 regions from the period of 22nd January 2020 until 22nd June 2020 to predict, through a rolling window backtesting framework, the cumulative number of infected cases for the next 7 and 28 days. We implement three simple models to track the root mean squared logarithmic error in this 6 month span, a baseline model that always predicts the last known value of the cumulative confirmed cases, a power growth model and an epidemiological model called SEIRD. Prediction errors are substantially higher in early stages of the pandemic, resulting from limited data. Throughout the course of the pandemic, errors regress slowly, but steadily. The more confirmed cases a country exhibits at any point in time, the lower the error in forecasting future confirmed cases. We emphasize the significance of having a rigorous backtesting framework to accurately assess the predictive power of such models at any point in time during the outbreak which in turn can be used to assign the right level of certainty to these forecasts and facilitate better planning."} {"_id": [0], "label": "cs.CV", "text": "Topological signature for periodic motion recognition. In this paper, we present an algorithm that computes the topological signature for a given periodic motion sequence. Such signature consists of a vector obtained by persistent homology which captures the topological and geometric changes of the object that models the motion. Two topological signatures are compared simply by the angle between the corresponding vectors. With respect to gait recognition, we have tested our method using only the lowest fourth part of the body's silhouette. In this way, the impact of variations in the upper part of the body, which are very frequent in real scenarios, decreases considerably. We have also tested our method using other periodic motions such as running or jumping. Finally, we formally prove that our method is robust to small perturbations in the input data and does not depend on the number of periods contained in the periodic motion sequence."} {"_id": [12], "label": "math.CA", "text": "Pairs of foliations and Mattei Moussu's theorem. We prove a reduction of singularities for pairs of foliations by blowing up, and then investigate the analytic classification of the reduced models. Those reduced pairs of regular foliations are well understood. The case of a regular and a singular foliation is dealt with Mattei Moussu's Theorem for which we provide a new proof, avoiding Gronwall's inequality. We end up announcing results recently obtained by the first author in the case of a pair of reduced foliations sharing the same separatrices."} {"_id": [65], "label": "cs.NI", "text": "Evaluating BBRv2 on the Dropbox Edge Network. Nowadays, loss based TCP congestion controls in general and CUBIC specifically became the de facto standard for the Internet. BBR congestion control challenges the loss based approach by modeling the network based on estimated bandwidth and round trip time. At Dropbox, we've been using BBRv1 since 2017 and are accustomed to its pros and cons. BBRv2 introduces a set of improvements to network modeling (explicit loss targets and inflight limits) and fairness (differential probing and headroom for new flows.) In this paper, we go over experimental data gathered on the Dropbox Edge Network. We compare BBRv2 to BBRv1 and CUBIC showing that BBRv2 is a definite improvement over both of them. We also show that BBRv2 experimental results match its theoretical design principles."} {"_id": [17, 1], "label": "cs.DC cs.LG", "text": "Machine Learning Prediction of Gamer's Private Networks. The Gamer's Private Network (GPN) is a client server technology created by WTFast for making the network performance of online games faster and more reliable. GPN s use middle mile servers and proprietary algorithms to better connect online video game players to their game's servers across a wide area network. Online games are a massive entertainment market and network latency is a key aspect of a player's competitive edge. This market means many different approaches to network architecture are implemented by different competing companies and that those architectures are constantly evolving. Ensuring the optimal connection between a client of WTFast and the online game they wish to play is thus an incredibly difficult problem to automate. Using machine learning, we analyzed historical network data from GPN connections to explore the feasibility of network latency prediction which is a key part of optimization. Our next step will be to collect live data (including client server load, packet and port information and specific game state information) from GPN Minecraft servers and bots. We will use this information in a Reinforcement Learning model along with predictions about latency to alter the clients' and servers' configurations for optimal network performance. These investigations and experiments will improve the quality of service and reliability of GPN systems."} {"_id": [29], "label": "math.GR", "text": "Factorization of finite simple groups. We prove that all Mathieu groups, some linear, and unitary groups are factorizable."} {"_id": [2], "label": "cs.AI", "text": "Novelty Messages Filtering for Multi Agent Privacy preserving Planning. In multi agent planning, agents jointly compute a plan that achieves mutual goals, keeping certain information private to the individual agents. Agents' coordination is achieved through the transmission of messages. These messages can be a source of privacy leakage as they can permit a malicious agent to collect information about other agents' actions and search states. In this paper, we investigate the usage of novelty techniques in the context of (decentralised) multi agent privacy preserving planning, addressing the challenges related to the agents' privacy and performance. In particular, we show that the use of novelty based techniques can significantly reduce the number of messages transmitted among agents, better preserving their privacy and improving their performance. An experimental study analyses the effectiveness of our techniques and compares them with the state of the art. Finally, we evaluate the robustness of our approach, considering different delays in the transmission of messages as they would occur in overloaded networks, due for example to massive attacks or critical situations."} {"_id": [34, 76], "label": "math.SP math.CV", "text": "The inverse problem for a spectral asymmetry function of the Schr \"odinger operator on a finite interval. For the Schr \"odinger equation d 2 u dx 2 q(x)u lambda u on a finite x interval, there is defined an \"asymmetry function\" a( lambda q) , which is entire of order 1 2 and type 1 in lambda . Our main result identifies the classes of square integrable potentials q(x) that possess a common asymmetry function. For any given a( lambda) , there is one potential for each Dirichlet spectral sequence."} {"_id": [17], "label": "cs.DC", "text": "Exact Byzantine Consensus on Undirected Graphs under Local Broadcast Model. This paper considers the Byzantine consensus problem for nodes with binary inputs. The nodes are interconnected by a network represented as an undirected graph, and the system is assumed to be synchronous. Under the classical point to point communication model, it is well known 7 that the following two conditions are both necessary and sufficient to achieve Byzantine consensus among n nodes in the presence of up to f Byzantine faulty nodes n ge 3f 1 and vertex connectivity at least 2f 1 . In the classical point to point communication model, it is possible for a faulty node to equivocate, i.e., transmit conflicting information to different neighbors. Such equivocation is possible because messages sent by a node to one of its neighbors are not overheard by other neighbors. This paper considers the local broadcast model. In contrast to the point to point communication model, in the local broadcast model, messages sent by a node are received identically by all of its neighbors. Thus, under the local broadcast model, attempts by a node to send conflicting information can be detected by its neighbors. Under this model, we show that the following two conditions are both necessary and sufficient for Byzantine consensus vertex connectivity at least lfloor 3f 2 rfloor 1 and minimum node degree at least 2f . Observe that the local broadcast model results in a lower requirement for connectivity and the number of nodes n , as compared to the point to point communication model. We extend the above results to a hybrid model that allows some of the Byzantine faulty nodes to equivocate. The hybrid model bridges the gap between the point to point and local broadcast models, and helps to precisely characterize the trade off between equivocation and network requirements."} {"_id": [65, 1], "label": "cs.LG cs.NI", "text": "A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks. Measuring similarity between IP addresses is an important task in the daily operations of any enterprise network. Applications that depend on an IP similarity measure include measuring correlation between security alerts, building baselines for behavioral modelling, debugging network failures and tracking persistent attacks. However, IPs do not have a natural similarity measure by definition. Deep Learning architectures are a promising solution here since they are able to learn numerical representations for IPs directly from data, allowing various distance measures to be applied on the calculated representations. Current works have utilized Natural Language Processing (NLP) techniques for learning IP embeddings. However, these approaches have no proper way to handle out of vocabulary (OOV) IPs not seen during training. In this paper, we propose a novel approach for IP embedding using an adapted graph neural network (GNN) architecture. This approach has the advantages of working on the raw data, scalability and, most importantly, induction, i.e. the ability to measure similarity between previously unseen IPs. Using data from an enterprise network, our approach is able to identify similarities between local DNS servers and root DNS servers even though some of these machines are never encountered during the training phase."} {"_id": [49], "label": "math.OC", "text": "A Log Barrier Newton CG Method for Bound Constrained Optimization with Complexity Guarantees. We describe an algorithm based on a logarithmic barrier function, Newton's method, and linear conjugate gradients that obtains an approximate minimizer of a smooth function over the nonnegative orthant. We develop a bound on the complexity of the approach, stated in terms of the required accuracy and the cost of a single gradient evaluation of the objective function and or a matrix vector multiplication involving the Hessian of the objective. The approach can be implemented without explicit calculation or storage of the Hessian."} {"_id": [41, 59, 28], "label": "cs.RO cs.CG cs.SI", "text": "Realizability of Planar Point Embeddings from Angle Measurements. Localization of a set of nodes is an important and a thoroughly researched problem in robotics and sensor networks. This paper is concerned with the theory of localization from inner angle measurements. We focus on the challenging case where no anchor locations are known. Inspired by Euclidean distance matrices, we investigate when a set of inner angles corresponds to a realizable point set. In particular, we find linear and non linear constraints that are provably necessary, and we conjecture also sufficient for characterizing realizable angle sets. We confirm this in extensive numerical simulations, and we illustrate the use of these constraints for denoising angle measurements along with the reconstruction of a valid point set."} {"_id": [25, 44], "label": "math.PR q-fin.CP", "text": "Weak existence and uniqueness for affine stochastic Volterra equations with L1 kernels. We provide existence, uniqueness and stability results for affine stochastic Volterra equations with L 1 kernels and jumps. Such equations arise as scaling limits of branching processes in population genetics and self exciting Hawkes processes in mathematical finance. The strategy we adopt for the existence part is based on approximations using stochastic Volterra equations with L 2 kernels combined with a general stability result. Most importantly, we establish weak uniqueness using a duality argument on the Fourier Laplace transform via a deterministic Riccati Volterra integral equation. We illustrate the applicability of our results on Hawkes processes and a class of hyper rough Volterra Heston models with a Hurst index H in ( 1 2,1 2 ."} {"_id": [26, 35, 21], "label": "math.CO math.RA math.RT", "text": "Positroid varieties and cluster algebras. We show that the coordinate ring of an open positroid variety coincides with the cluster algebra associated to a Postnikov diagram. This confirms conjectures of Postnikov, Muller Speyer, and Leclerc, and generalizes results of Scott and Serhiyenko Sherman Bennett Williams."} {"_id": [8], "label": "physics.optics", "text": "Nanostructure modulated planar high spectral resolution spectro polarimeter. We present a planar spectro polarimeter based on Fabry P 'e rot cavities with embedded polarization sensitive high index nanostructures. A 7 mu m thick spectro polarimetric system for 3 spectral bands and 2 linear polarization states is experimentally demonstrated. Furthermore, an optimal design is theoretically proposed, estimating that a system with a bandwidth of 127 nm and a spectral resolution of 1 nm is able to reconstruct the first three Stokes parameters textcolor black with a signal to noise ratio of 13.14 dB with respect to the the shot noise limited SNR . The pixelated spectro polarimetric system can be directly integrated on a sensor, thus enabling applicability in a variety of miniaturized optical devices, including but not limited to satellites for Earth observation."} {"_id": [3], "label": "cs.CL", "text": "MCQA Multimodal Co attention Based Network for Question Answering. We present MCQA, a learning based algorithm for multimodal question answering. MCQA explicitly fuses and aligns the multimodal input (i.e. text, audio, and video), which forms the context for the query (question and answer). Our approach fuses and aligns the question and the answer within this context. Moreover, we use the notion of co attention to perform cross modal alignment and multimodal context query alignment. Our context query alignment module matches the relevant parts of the multimodal context and the query with each other and aligns them to improve the overall performance. We evaluate the performance of MCQA on Social IQ, a benchmark dataset for multimodal question answering. We compare the performance of our algorithm with prior methods and observe an accuracy improvement of 4 7 ."} {"_id": [0, 1, 14, 15], "label": "cs.HC cs.CV cs.IT cs.LG math.IT", "text": "An Information Theoretical Approach to the Information Capacity and Cost Effectiveness Evaluation of Color Palettes. Colors are used as effective tools of representing and transferring information. Number of colors in a palette is the direct arbiter of the information conveying capacity. Yet it should be well elaborated, since increasing the entropy by adding colors comes with its cost on decoding. Despite the possible effects upon diverse applications, a methodology for cost effectiveness evaluation of palettes seems deficient. In this work, this need is being addressed from an information theoretical perspective, via the articulated metrics and formulae. Besides, the proposed metrics are computed for some developed and known palettes, and observed results are evaluated."} {"_id": [15], "label": "cs.IT math.IT", "text": "On two conjectures about the intersection distribution. Recently, S. Li and A. Pott cite LP proposed a new concept of intersection distribution concerning the interaction between the graph (x,f(x)) x in F q of f and the lines in the classical affine plane AG(2,q) . Later, G. Kyureghyan, et al. cite KLP proceeded to consider the next simplest case and derive the intersection distribution for all degree three polynomials over F q with q both odd and even. They also proposed several conjectures in cite KLP . In this paper, we completely solve two conjectures in cite KLP . Namely, we prove two classes of power functions having intersection distribution v 0 (f) frac q(q 1) 3 , v 1 (f) frac q(q 1) 2 , v 2 (f) 0, v 3 (f) frac q(q 1) 6 . We mainly make use of the multivariate method and QM equivalence on 2 to 1 mappings. The key point of our proof is to consider the number of the solutions of some low degree equations."} {"_id": [93], "label": "physics.class-ph", "text": "Energy dissipation for hereditary and energy conservation for non local fractional wave equations. Using the method of a priori energy estimates, energy dissipation is proved for the class of hereditary fractional wave equations, obtained through the system of equations consisting of equation of motion, strain, and fractional order constitutive models, that include the distributed order constitutive law in which the integration is performed from zero to one generalizing all linear constitutive models of fractional and integer orders, as well as for the thermodynamically consistent fractional Burgers models, where the orders of fractional differentiation are up to the second order. In the case of non local fractional wave equations, obtained using non local constitutive models of Hooke and Eringen type in addition to the equation of motion and strain, a priori energy estimates yield the energy conservation, with the reinterpreted notion of the potential energy."} {"_id": [13, 31], "label": "q-bio.PE math.DS", "text": "Hive geometry shapes the recruitment rate of honeybee colonies. Honey bees make decisions regarding foraging and nest site selection in groups ranging from hundreds to thousands of individuals. To effectively make these decisions bees need to communicate within a spatially distributed group. However, the spatiotemporal dynamics of honey bee communication have been mostly overlooked in models of collective decisions, focusing primarily on mean field models of opinion dynamics. We analyze how the spatial properties of the nest or hive, and the movement of individuals with different belief states (uncommitted or committed) therein affect the rate of information transmission using spatially extended models of collective decision making within a hive. Honeybees waggle dance to recruit conspecifics with an intensity that is a threshold nonlinear function of the waggler concentration. Our models range from treating the hive as a chain of discrete patches to a continuous line (long narrow hive). The combination of population thresholded recruitment and compartmentalized populations generates tradeoffs between rapid information propagation with strong population dispersal and recruitment failures resulting from excessive population diffusion and also creates an effective colony level signal detection mechanism whereby recruitment to low quality objectives is blocked."} {"_id": [90], "label": "physics.space-ph", "text": "Effect of rectangular grooves and checkerboard patterns on the electron emission yield. The effect of rough structures on the electron emission under electron impact between 10 eV and 2 keV is investigated with a new version of the low energy electromagnetic model of GEANT4 (MicroElec). The inelastic scattering is modeled, thanks to the dielectric function theory and the Mott's model of partial waves to describe the elastic scattering. Secondary electron emission is modeled for grooved and checkerboard patterns of different dimensions for aluminum and silver. The analyses are performed according to two shape parameters h L and d L, h being the height, L the width of the structures, and d the spacing between two neighboring structures. The secondary electron emission is demonstrated to decrease when h L and d L ratios increase. When the height reaches 10 times the lateral dimensions, the electron emission yield is divided by two compared to that of a flat sample. The optimization of the two aspect ratios leads to a reduction of the electron emission yield of 80 for grooved patterns and of 98 for checkerboard patterns. This purely geometric effect is similar for aluminum and silver materials. A simple analytical model, capable of reproducing the effect on the electron emission yield of checkerboard and grooved patterns, is proposed. This model is found to be in good agreement with the Monte Carlo simulations and some experimental measurements performed in our irradiation facility."} {"_id": [4], "label": "cs.NE", "text": "Philosophy Guided Modelling and Implementation of Adaptation and Control in Complex Systems. Control was from its very beginning an important concept in cybernetics. Later on, with the works of W. Ross Ashby, for example, biological concepts such as adaptation were interpreted in the light of cybernetic systems theory. Adaptation is the process by which a system is capable of regulating or controlling itself in order to adapt to changes of its inner and outer environment maintaining a homeostatic state. In earlier works we have developed a system metamodel that on the one hand refers to cybernetic concepts such as structure, operation, and system, and on the other to the philosophy of individuation of Gilbert Simondon. The result is the so called allagmatic method that is capable of creating concrete models of systems such as artificial neural networks and cellular automata starting from abstract building blocks. In this paper, we add to our already existing method the cybernetic concepts of control and especially adaptation. In regard to the system metamodel, we rely again on philosophical theories, this time the philosophy of organism of Alfred N. Whitehead. We show how these new meta theoretical concepts are described formally and how they are implemented in program code. We also show what role they play in simple experiments. We conclude that philosophical abstract concepts help to better understand the process of creating computer models and their control and adaptation. In the outlook we discuss how the allagmatic method needs to be extended in order to cover the field of complex systems and Norbert Wiener's ideas on control."} {"_id": [52], "label": "cs.MA", "text": "Search for Smart Evaders with Sweeping Agents. Suppose that in a given planar circular region, there are some smart mobile evaders and we would like to find them using sweeping agents. We assume that the sweeping agents are in a line formation whose total length is 2r. We propose procedures for designing a sweeping process that ensures the successful completion of the task, thereby deriving conditions on the sweeping velocity of the linear formation and its path. Successful completion of the task means that evaders with a given limit on their velocity cannot escape the sweeping agents. A simpler task for the sweeping formation is the confinement of the evaders to their initial domain. The feasibility of completing these tasks depends on geometric and dynamic constraints that impose a lower bound on the velocity that the sweeper line formation must have. This critical velocity is derived to ensure the satisfaction of the confinement task. Increasing the velocity above the lower bound enables the agents to complete the search task as well. We present results on the total search time as a function of the sweeping velocity of the formation given the initial conditions on the size of the search region and the maximal velocity of the evaders."} {"_id": [9, 23], "label": "math.AP math.FA", "text": "Friedrichs type inequalities in arbitrary domains. First and second order inequalities of Friedrichs type for Sobolev functions in arbitrary domains are offered. The relevant inequalities involve optimal norms and constants that are independent of the geometry of the domain. Parallel inequalities for symmetric gradient Sobolev spaces of vector valued functions are also presented. The results are derived via general criteria established in our earlier contributions 4 and 5 ."} {"_id": [64, 13, 31], "label": "q-bio.PE math.DS physics.soc-ph", "text": "Spatio temporal predictive modeling framework for infectious disease spread. A novel predictive modeling framework for the spread of infectious diseases using high dimensional partial differential equations is developed and implemented. A scalar function representing the infected population is defined on a high dimensional space and its evolution over all directions is described by a population balance equation (PBE). New infections are introduced among the susceptible population from non quarantined infected population based on their interaction, adherence to distancing norms, hygiene levels and any other societal interventions. Moreover, recovery, death, immunity and all aforementioned parameters are modeled on the high dimensional space. To epitomize the capabilities and features of the above framework, prognostic estimates of Covid 19 spread using a six dimensional (time, 2D space, infection severity, duration of infection, and population age) PBE is presented. Further, scenario analysis for different policy interventions and population behavior is presented, throwing more insights into the spatio temporal spread of infections across disease age, intensity and age of population. These insights could be used for science informed policy planning."} {"_id": [20], "label": "math.NA cs.NA", "text": "L infty norm error estimates for HDG methods applied to the Poisson equation with an application to the Dirichlet boundary control problem. We prove quasi optimal L infty norm error estimates (up to logarithmic factors) for the solution of Poisson's problem by the standard Hybridizable Discontinuous Galerkin (HDG) method. Although such estimates are available for conforming and mixed finite element methods, this is the first proof for HDG. The method of proof is motivated by known L infty norm estimates for mixed finite elements. We show two applications the first is to prove optimal convergence rates for boundary flux estimates, and the second is to prove that numerically observed convergence rates for the solution of a Dirichlet boundary control problem are to be expected theoretically. Numerical examples show that the predicted rates are seen in practice."} {"_id": [54], "label": "q-fin.MF", "text": "Skewing Quanto with Simplicity. We present a simple and highly efficient analytical method for solving the Quanto Skew problem in Equities under a framework that accommodates both Equity and FX volatility skew consistently. Ease of implementation and extremely fast performance of this new approach should benefit a wide spectrum of market participants."} {"_id": [6], "label": "physics.flu-dyn", "text": "Boundary Layer Flow over a Moving Flat Plate in Jeffrey Fluid with Newtonian Heating. In this paper, a numerical analysis of boundary layer flow and heat transfer in Jeffrey fluid over a moving flat plate with Newtonian Heating have been presented. The governing partial differential equations were reduced to a transformed ordinary differential equation with the help of similarity transformation. Numerical solutions were obtained for these transformed ordinary differential equation by using the Runge Kutta Fehlberg method. The effect on the boundary layer flow and heat transfer behaviours of various parameters such as Deborah number lambda 2, relaxation time and retardation time ratio lambda , Newtonian heating parameter gamma , Prandtl number Pr and moving plate velocity parameter epsilon has been investigated. It is important to mention that the results obtained and reported here are impactful to the researchers working in this field and can be used in the future as a guideline and analysis context. Keywords Jeffrey Fluid, Newtonian Heating, Boundary Layer Flow, Moving plate"} {"_id": [0], "label": "cs.CV", "text": "Can WiFi Estimate Person Pose?. WiFi human sensing has achieved great progress in indoor localization, activity classification, etc. Retracing the development of these work, we have a natural question can WiFi devices work like cameras for vision applications? In this paper We try to answer this question by exploring the ability of WiFi on estimating single person pose. We use a 3 antenna WiFi sender and a 3 antenna receiver to generate WiFi data. Meanwhile, we use a synchronized camera to capture person videos for corresponding keypoint annotations. We further propose a fully convolutional network (FCN), termed WiSPPN, to estimate single person pose from the collected data and annotations. Evaluation on over 80k images (16 sites and 8 persons) replies aforesaid question with a positive answer. Codes have been made publicly available at https github.com geekfeiw WiSPPN."} {"_id": [38], "label": "math.NT", "text": "On a criterion for Catalan's Conjecture. We give a new proof of a theorem by P. Mihailescu which states that the equation x p y q 1 is unsolvable with x, y integral and p, q odd primes, unless the congruences p q equiv p pmod q 2 and q p equiv q pmod p 2 hold."} {"_id": [25, 42, 23], "label": "math.DG math.FA math.PR", "text": "Entropy dissipation for degenerate stochastic differential equations via sub Riemannian density manifold. We study the dynamical behavior of degenerate stochastic differential equations (SDEs). We select an auxiliary Fisher information functional as the Lyapunov functional. We conduct the Lyapunov exponential convergence analysis of degenerate SDEs in terms of generalized Fisher information and L 1 distances. We derive the convergence rate by the induced generalized Gamma z calculus. Examples of explicit rates are provided, including one dimensional degenerate SDEs, gradient drift diffusions in the Heisenberg group, displacement group, and Martinet sub Riemannian structure. The Lyapunov analysis is constructed from a second order calculus of Kullback Leibler divergence in density space with a sub Riemannian optimal transport type metric."} {"_id": [25], "label": "math.PR", "text": "Equi Energy sampling does not converge rapidly on the mean field Potts model with three colors close to the critical temperature. Equi Energy Sampling (EES, for short) is a method to speed up the convergence of the Metropolis chain, when the latter is slow. We show that there are still models like the mean field Potts model, where EES does not converge rapidly in certain temperature regimes. Indeed we will show that EES is slowly mixing on the mean field Potts model, in a regime below the critical temperature. Though we will concentrate on the Potts model with three colors, our arguments remain valid for any number of colors q ge 3 , if we adapt the temperature regime. For the situation of the mean field Potts model this answers a question posed in cite HuaKou ."} {"_id": [32], "label": "cs.DS", "text": "Even the Easiest(?) Graph Coloring Problem is not Easy in Streaming!. We study a graph coloring problem that is otherwise easy but becomes quite non trivial in the one pass streaming model. In contrast to previous graph coloring problems in streaming that try to find an assignment of colors to vertices, our main work is on estimating the number of conflicting or monochromatic edges given a coloring function that is streaming along with the graph we call the problem sc Conflict Est . The coloring function on a vertex can be read or accessed only when the vertex is revealed in the stream. If we need the color on a vertex that has streamed past, then that color, along with its vertex, has to be stored explicitly. We provide algorithms for a graph that is streaming in different variants of the one pass vertex arrival streaming model, viz. the sc Vertex Arrival ( sc VA ), Vertex Arrival With Degree Oracle ( sc VAdeg ), sc Vertex Arrival in Random Order ( sc VArand ) models, with special focus on the random order model. We also provide matching lower bounds for most of the cases. The mainstay of our work is in showing that the properties of a random order stream can be exploited to design streaming algorithms for estimating the number of conflicting edges. We have also obtained a lower bound, though not matching the upper bound, for the random order model. Among all the three models vis a vis this problem, we can show a clear separation of power in favor of the sc VArand model."} {"_id": [33, 84], "label": "physics.ins-det physics.acc-ph", "text": "A compact fine grained calorimeter for luminosity measurement at a linear collider. Based on a paper published in 2019 by the FCAL Collaboration, this talk is giving an update of the Collaboration's effort to design prototype of highly compact calorimeter to instrument the very forward region of a detector at future e e colliders. A luminometer prototype, based on sub millimeter thick detector planes, is tested with an electron beam of energy 1 5 GeV. The effective Moliere radius of the prototype comprising eight detector planes was measured to be (8.1 0.1 (stat.) 0.3 (syst.))mm, and the result is well reproduced by the Monte Carlo simulation."} {"_id": [20], "label": "math.NA cs.NA", "text": "First order continuous and discontinuous Galerkin moment models for a linear kinetic equation realizability preserving splitting scheme and numerical analysis. We derive a second order realizability preserving scheme for moment models for linear kinetic equations. We apply this scheme to the first order continuous and discontinuous models in slab and three dimensional geometry derived in a previous paper as well as the classical full moment M N models. We provide extensive numerical analysis as well as our code to show that the new class of models can compete or even outperform the full moment models in reasonable test cases."} {"_id": [9, 76], "label": "math.AP math.SP", "text": "A logarithmic improvement in the two point Weyl law for manifolds without conjugate points. In this paper, we study the two point Weyl Law for the Laplace Beltrami operator on a smooth, compact Riemannian manifold M with no conjugate points. That is, we find the asymptotic behavior of the Schwartz kernel, E lambda(x,y) , of the projection operator from L 2(M) onto the direct sum of eigenspaces with eigenvalue smaller than lambda 2 as lambda to infty . In the regime where x,y are restricted to a compact neighborhood of the diagonal in M times M , we obtain a uniform logarithmic improvement in the remainder of the asymptotic expansion for E lambda and its derivatives of all orders, which generalizes a result of B 'erard, who treated the on diagonal case E lambda(x,x) . When x,y avoid a compact neighborhood of the diagonal, we obtain this same improvement in an upper bound for E lambda . Our results imply that the rescaled covariance kernel of a monochromatic random wave locally converges in the C infty topology to a universal scaling limit at an inverse logarithmic rate."} {"_id": [42], "label": "math.DG", "text": "Twistor spaces on foliated manifolds. The theory of twistors on foliated manifolds is developed and the twistor space of the normal bundle is constructed. It is demonstrated that the classical constructions of the twistor theory lead to foliated objects and permit to formulate and prove foliated versions of some well known results on holomorphic mappings. Since any orbifold can be understood as the leaf space of a suitable defined Riemannian foliation we obtain orbifold versions of the classical results as a simple consequence of the results on foliated mappings."} {"_id": [29], "label": "math.GR", "text": "Coxeter quotients of the automorphism group of a Coxeter group. We show that for a large class mathcal W of Coxeter groups the following holds Given a group W Gamma in mathcal W , the automorphism group rm Aut (W Gamma) virtually surjects onto some infinite Coxeter group. In particular, the group rm Aut (W Gamma) is virtually indicable and therefore does not satisfy Kazhdan's property (T). Moreover, if W Gamma is not virtually abelian, then the group rm Aut (W Gamma) is large."} {"_id": [68, 21], "label": "math.CO cs.DM", "text": "Characterization and a 2D Visualization of B 0 VPG Cocomparability Graphs. B 0 VPG graphs are intersection graphs of vertical and horizontal line segments on a plane. Cohen, Golumbic, Trotter, and Wang Order, 2016 pose the question of characterizing B 0 VPG permutation graphs. We respond here by characterizing B 0 VPG cocomparability graphs. This characterization also leads to a polynomial time recognition and B 0 VPG drawing algorithm for the class. Our B 0 VPG drawing algorithm starts by fixing any one of the many posets P whose cocomparability graph is the input graph G . The drawing we obtain not only visualizes G in that one can distinguish comparable pairs from incomparable ones, but one can also identify which among a comparable pair is larger in P from this visualization."} {"_id": [17], "label": "cs.DC", "text": "Modularising Verification Of Durable Opacity. Non volatile memory (NVM), also known as persistent memory, is an emerging paradigm for memory that preserves its contents even after power loss. NVM is widely expected to become ubiquitous, and hardware architectures are already providing support for NVM programming. This has stimulated interest in the design of novel concepts ensuring correctness of concurrent programming abstractions in the face of persistency and in the development of associated verification approaches. Software transactional memory (STM) is a key programming abstraction that supports concurrent access to shared state. In a fashion similar to linearizability as the correctness condition for concurrent data structures, there is an established notion of correctness for STMs known as opacity. We have recently proposed durable opacity as the natural extension of opacity to a setting with non volatile memory. Together with this novel correctness condition, we designed a verification technique based on refinement. In this paper, we extend this work in two directions. First, we develop a durably opaque version of NOrec (no ownership records), an existing STM algorithm proven to be opaque. Second, we modularise our existing verification approach by separating the proof of durability of memory accesses from the proof of opacity. For NOrec, this allows us to re use an existing opacity proof and complement it with a proof of the durability of accesses to shared state."} {"_id": [15], "label": "cs.IT math.IT", "text": "Pruning and Quantizing Neural Belief Propagation Decoders. We consider near maximum likelihood (ML) decoding of short linear block codes. In particular, we propose a novel decoding approach based on neural belief propagation (NBP) decoding recently introduced by Nachmani et al. in which we allow a different parity check matrix in each iteration of the algorithm. The key idea is to consider NBP decoding over an overcomplete parity check matrix and use the weights of NBP as a measure of the importance of the check nodes (CNs) to decoding. The unimportant CNs are then pruned. In contrast to NBP, which performs decoding on a given fixed parity check matrix, the proposed pruning based neural belief propagation (PB NBP) typically results in a different parity check matrix in each iteration. For a given complexity in terms of CN evaluations, we show that PB NBP yields significant performance improvements with respect to NBP. We apply the proposed decoder to the decoding of a Reed Muller code, a short low density parity check (LDPC) code, and a polar code. PB NBP outperforms NBP decoding over an overcomplete parity check matrix by 0.27 0.31 dB while reducing the number of required CN evaluations by up to 97 . For the LDPC code, PB NBP outperforms conventional belief propagation with the same number of CN evaluations by 0.52 dB. We further extend the pruning concept to offset min sum decoding and introduce a pruning based neural offset min sum (PB NOMS) decoder, for which we jointly optimize the offsets and the quantization of the messages and offsets. We demonstrate performance 0.5 dB from ML decoding with 5 bit quantization for the Reed Muller code."} {"_id": [0], "label": "cs.CV", "text": "OVSNet Towards One Pass Real Time Video Object Segmentation. Video object segmentation aims at accurately segmenting the target object regions across consecutive frames. It is technically challenging for coping with complicated factors (e.g., shape deformations, occlusion and out of the lens). Recent approaches have largely solved them by using backforth re identification and bi directional mask propagation. However, their methods are extremely slow and only support offline inference, which in principle cannot be applied in real time. Motivated by this observation, we propose a efficient detection based paradigm for video object segmentation. We propose an unified One Pass Video Segmentation framework (OVS Net) for modeling spatial temporal representation in a unified pipeline, which seamlessly integrates object detection, object segmentation, and object re identification. The proposed framework lends itself to one pass inference that effectively and efficiently performs video object segmentation. Moreover, we propose a maskguided attention module for modeling the multi scale object boundary and multi level feature fusion. Experiments on the challenging DAVIS 2017 demonstrate the effectiveness of the proposed framework with comparable performance to the state of the art, and the great efficiency about 11.5 FPS towards pioneering real time work to our knowledge, more than 5 times faster than other state of the art methods."} {"_id": [49, 68, 21], "label": "cs.DM math.CO math.OC", "text": "Persistency of Linear Programming Relaxations for the Stable Set Problem. The Nemhauser Trotter theorem states that the standard linear programming (LP) formulation for the stable set problem has a remarkable property, also known as (weak) persistency for every optimal LP solution that assigns integer values to some variables, there exists an optimal integer solution in which these variables retain the same values. While the standard LP is defined by only non negativity and edge constraints, a variety of other LP formulations have been studied and one may wonder whether any of them has this property as well. We show that any other formulation that satisfies mild conditions cannot have the persistency property on all graphs, unless it is always equal to the stable set polytope."} {"_id": [72], "label": "cs.PF", "text": "The Multi Source Preemptive M PH 1 1 Queue with Packet Errors Exact Distribution of the Age of Information and Its Peak. Age of Information (AoI) and Peak AoI (PAoI) and their analytical models have recently drawn substantial amount of attention in information theory and wireless communications disciplines, in the context of qualitative assessment of information freshness in status update systems. We take a queueing theoretic approach and study a probabilistically preemptive bufferless M PH 1 1 queueing system with arrivals stemming from N separate information sources, with the aim of modeling a generic status update system. In this model, a new information packet arrival from source m is allowed to preempt a packet from source n in service, with a probability depending on n and m . To make the model even more general than the existing ones, for each of the information sources, we assume a distinct PH type service time distribution and a distinct packet error probability. Subsequently, we obtain the exact distributions of the AoI and PAoI for each of the information sources using matrix analytical algorithms and in particular the theory of Markov fluid queues and sample path arguments. This is in contrast with existing methods that rely on Stochastic Hybrid Systems (SHS) which obtain only the average values and in less general settings. Numerical examples are provided to validate the proposed approach as well as to give engineering insight on the impact of preemption probabilities on certain AoI and PAoI performance figures."} {"_id": [20], "label": "math.NA cs.NA", "text": "A convolution quadrature method for Maxwell's equations in dispersive media. We study the systematic numerical approximation of Maxwell's equations in dispersive media. Two discretization strategies are considered, one based on a traditional leapfrog time integration method and the other based on convolution quadrature. The two schemes are proven to be equivalent and to preserve the underlying energy dissipation structure of the problem. The second approach, however, is independent of the number of internal states and allows to handle rather general dispersive materials. Using ideas of fast and oblivious convolution quadrature, the method can be implemented efficiently."} {"_id": [41, 27, 13], "label": "math.CT cs.RO math.DS", "text": "Formal composition of hybrid systems. We develop a compositional framework for formal synthesis of hybrid systems using the language of category theory. More specifically, we provide mutually compatible tools for hierarchical, sequential, and independent parallel composition. In our framework, hierarchies of hybrid systems correspond to template anchor pairs, which we model as spans of subdividing and embedding semiconjugacies. Hierarchical composition of template anchor pairs corresponds to the composition of spans via pullback. To model sequential composition, we introduce \"directed hybrid systems,\" each of which flows from an initial subsystem to a final subsystem in a Conley theoretic sense. Sequential composition of directed systems is given by a pushout of graph embeddings, rewriting the continuous dynamics of the overlapping subsystem to prioritize the second directed system. Independent parallel composition corresponds to a categorical product with respect to semiconjugacy. To formalize the compatibility of these three types of composition, we construct a vertically cartesian double category of hybrid systems where the vertical morphisms are semiconjugacies, and the horizontal morphisms are directed hybrid systems."} {"_id": [25], "label": "math.PR", "text": "A Multiplicative Version of the Lindley Recursion. This paper presents an analysis of the stochastic recursion W i 1 V iW i Y i that can be interpreted as an autoregressive process of order 1, reflected at 0. We start our exposition by a discussion of the model's stability condition. Writing Y i B i A i , for independent sequences of non negative i.i.d. random variables A i i in N 0 and B i i in N 0 , and assuming V i i in N 0 is an i.i.d. sequence as well (independent of A i i in N 0 and B i i in N 0 ), we then consider three special cases (i) V i attains negative values only and B i has a rational LST, (ii) V i equals a positive value a with certain probability p in (0,1) and is negative otherwise, and both A i and B i have a rational LST, (iii) V i is uniformly distributed on 0,1 , and A i is exponentially distributed. In all three cases we derive transient and stationary results, where the transient results are in terms of the transform at a geometrically distributed epoch."} {"_id": [0], "label": "cs.CV", "text": "Efficient Attention Mechanism for Visual Dialog that can Handle All the Interactions between Multiple Inputs. It has been a primary concern in recent studies of vision and language tasks to design an effective attention mechanism dealing with interactions between the two modalities. The Transformer has recently been extended and applied to several bi modal tasks, yielding promising results. For visual dialog, it becomes necessary to consider interactions between three or more inputs, i.e., an image, a question, and a dialog history, or even its individual dialog components. In this paper, we present a neural architecture named Light weight Transformer for Many Inputs (LTMI) that can efficiently deal with all the interactions between multiple such inputs in visual dialog. It has a block structure similar to the Transformer and employs the same design of attention computation, whereas it has only a small number of parameters, yet has sufficient representational power for the purpose. Assuming a standard setting of visual dialog, a layer built upon the proposed attention block has less than one tenth of parameters as compared with its counterpart, a natural Transformer extension. The experimental results on the VisDial datasets validate the effectiveness of the proposed approach, showing improvements of the best NDCG score on the VisDial v1.0 dataset from 57.59 to 60.92 with a single model, from 64.47 to 66.53 with ensemble models, and even to 74.88 with additional finetuning. Our implementation code is available at https github.com davidnvq visdial."} {"_id": [49, 13, 9], "label": "math.OC math.AP math.DS", "text": "A model reference adaptive system approach for nonlinear online parameter identification. Dynamical systems, for instance in model predictive control, often contain unknown parameters, which must be determined during system operation. Online or on the fly parameter identification methods are therefore necessary. The challenge of online methods is that one must continuously estimate parameters as experimental data becomes available. The existing techniques in the context of time dependent partial differential equations exclude the case where the system depends nonlinearly on the parameters.Based on a model reference adaptive system approach, we present an online parameter identification method for nonlinear infinite dimensional evolutionary system."} {"_id": [0], "label": "cs.CV", "text": "Psychophysical Evaluation of Deep Re Identification Models. Pedestrian re identification (ReID) is the task of continuously recognising the sameindividual across time and camera views. Researchers of pedestrian ReID and theirGPUs spend enormous energy producing novel algorithms, challenging datasets,and readily accessible tools to successfully improve results on standard metrics.Yet practitioners in biometrics, surveillance, and autonomous driving have not re alized benefits that reflect these metrics. Different detections, slight occlusions,changes in perspective, and other banal perturbations render the best neural net works virtually useless. This work makes two contributions. First, we introducethe ReID community to a budding area of computer vision research in model eval uation. By adapting established principles of psychophysical evaluation from psy chology, we can quantify the performance degradation and begin research thatwill improve the utility of pedestrian ReID models not just their performance ontest sets. Second, we introduce NuscenesReID, a challenging new ReID datasetdesigned to reflect the real world autonomous vehicle conditions in which ReIDalgorithms are used. We show that, despite performing well on existing ReIDdatasets, most models are not robust to synthetic augmentations or to the morerealistic NuscenesReID data."} {"_id": [0], "label": "cs.CV", "text": "Do not Omit Local Minimizer a Complete Solution for Pose Estimation from 3D Correspondences. Estimating pose from given 3D correspondences, including point to point, point to line and point to plane correspondences, is a fundamental task in computer vision with many applications. We present a complete solution for this task, including a solution for the minimal problem and the least squares problem of this task. Previous works mainly focused on finding the global minimizer to address the least squares problem. However, existing works that show the ability to achieve global minimizer are still unsuitable for real time applications. Furthermore, as one of contributions of this paper, we prove that there exist ambiguous configurations for any number of lines and planes. These configurations have several solutions in theory, which makes the correct solution may come from a local minimizer. Our algorithm is efficient and able to reveal local minimizers. We employ the Cayley Gibbs Rodriguez (CGR) parameterization of the rotation to derive a general rational cost for the three cases of 3D correspondences. The main contribution of this paper is to solve the resulting equation system of the minimal problem and the first order optimality conditions of the least squares problem, both of which are of complicated rational forms. The central idea of our algorithm is to introduce intermediate unknowns to simplify the problem. Extensive experimental results show that our algorithm significantly outperforms previous algorithms when the number of correspondences is small. Besides, when the global minimizer is the solution, our algorithm achieves the same accuracy as previous algorithms that have guaranteed global optimality, but our algorithm is applicable to real time applications."} {"_id": [17], "label": "cs.DC", "text": "Atomic Cross Chain Swaps with Improved Space and Local Time Complexity. An effective atomic cross chain swap protocol is introduced by Herlihy Herlihy, 2018 as a distributed coordination protocol in order to exchange assets across multiple blockchains among multiple parties. An atomic cross chain swap protocol guarantees (1) if all parties conform to the protocol, then all assets are exchanged among parties, (2) even if some parties or coalitions of parties deviate from the protocol, no party conforming to the protocol suffers a loss, and (3) no coalition has an incentive to deviate from the protocol. Herlihy Herlihy, 2018 invented this protocol by using hashed timelock contracts. A cross chain swap is modeled as a directed graph D (V,A). Vertex set V denotes a set of parties and arc set A denotes a set of proposed asset transfers. Herlihy's protocol uses the graph topology and signature information to set appropriate hashed timelock contracts. The space complexity of the protocol (i.e., the total number of bits written in the blockchains in a swap) is O( A 2). The local time complexity of the protocol (i.e., the maximum execution time of a contract in a swap to transfer the corresponding asset) is O( V L ), where L is a feedback vertex set computed by the protocol. We propose a new atomic cross chain swap protocol which uses only signature information and improves the space complexity to O( A V ) and the local time complexity to O( V )."} {"_id": [17], "label": "cs.DC", "text": "FECBench A Holistic Interference aware Approach for Application Performance Modeling. Services hosted in multi tenant cloud platforms often encounter performance interference due to contention for non partitionable resources, which in turn causes unpredictable behavior and degradation in application performance. To grapple with these problems and to define effective resource management solutions for their services, providers often must expend significant efforts and incur prohibitive costs in developing performance models of their services under a variety of interference scenarios on different hardware. This is a hard problem due to the wide range of possible co located services and their workloads, and the growing heterogeneity in the runtime platforms including the use of fog and edge based resources, not to mention the accidental complexity in performing application profiling under a variety of scenarios. To address these challenges, we present FECBench, a framework to guide providers in building performance interference prediction models for their services without incurring undue costs and efforts. The contributions of the paper are as follows. First, we developed a technique to build resource stressors that can stress multiple system resources all at once in a controlled manner to gain insights about the interference on an application's performance. Second, to overcome the need for exhaustive application profiling, FECBench intelligently uses the design of experiments (DoE) approach to enable users to build surrogate performance models of their services. Third, FECBench maintains an extensible knowledge base of application combinations that create resource stresses across the multi dimensional resource design space. Empirical results using real world scenarios to validate the efficacy of FECBench show that the predicted application performance has a median error of only 7.6 across all test cases, with 5.4 in the best case and 13.5 in the worst case."} {"_id": [3], "label": "cs.CL", "text": "A Multi task Learning Approach for Named Entity Recognition using Local Detection. Named entity recognition (NER) systems that perform well require task related and manually annotated datasets. However, they are expensive to develop, and are thus limited in size. As there already exists a large number of NER datasets that share a certain degree of relationship but differ in content, it is important to explore the question of whether such datasets can be combined as a simple method for improving NER performance. To investigate this, we developed a novel locally detecting multitask model using FFNNs. The model relies on encoding variable length sequences of words into theoretically lossless and unique fixed size representations. We applied this method to several well known NER tasks and compared the results of our model to baseline models as well as other published results. As a result, we observed competitive performance in nearly all of the tasks."} {"_id": [26, 29], "label": "math.RT math.GR", "text": "Vanishing off subgroups and supercharacter theory products. In this paper, we study the vanishing off subgroups of supercharacters, and use these to determine several new characterizations of supercharacter theory products. In particular, we give a character theoretic characterization that allows us to conclude that one may determine if a supercharacter theory is a Delta product or ast product from the values of its corresponding supercharacters."} {"_id": [49, 52, 62], "label": "math.OC cs.GT cs.MA", "text": "Continuous time fully distributed generalized Nash equilibrium seeking for multi integrator agents. We consider strongly monotone games with convex separable coupling constraints, played by dynamical agents, in a partial decision information scenario. We start by designing continuous time fully distributed feedback controllers, based on consensus and primal dual gradient dynamics, to seek a generalized Nash equilibrium in networks of single integrator agents. Our first solution adopts a fixed gain, whose choice requires the knowledge of some global parameters of the game. To relax this requirement, we conceive a controller that can be tuned in a completely decentralized fashion, thanks to the use of uncoordinated integral adaptive weights. We further introduce algorithms specifically devised for generalized aggregative games. Finally, we adapt all our control schemes to deal with heterogeneous multi integrator agents and, in turn, with nonlinear feedback linearizable dynamical systems. For all the proposed dynamics, we show convergence to a variational equilibrium, by leveraging monotonicity properties and stability theory for projected dynamical systems."} {"_id": [62], "label": "cs.GT", "text": "No regret Learning in Price Competitions under Consumer Reference Effects. We study long run market stability for repeated price competitions between two firms, where consumer demand depends on firms' posted prices and consumers' price expectations called reference prices. Consumers' reference prices vary over time according to a memory based dynamic, which is a weighted average of all historical prices. We focus on the setting where firms are not aware of demand functions and how reference prices are formed but have access to an oracle that provides a measure of consumers' responsiveness to the current posted prices. We show that if the firms run no regret algorithms, in particular, online mirror descent(OMD), with decreasing step sizes, the market stabilizes in the sense that firms' prices and reference prices converge to a stable Nash Equilibrium (SNE). Interestingly, we also show that there exist constant step sizesunder which the market stabilizes. We further characterize the rate of convergence to the SNE for both decreasing and constant OMD step sizes."} {"_id": [81], "label": "cs.MS", "text": "Vectorization and Minimization of Memory Footprint for Linear High Order Discontinuous Galerkin Schemes. We present a sequence of optimizations to the performance critical compute kernels of the high order discontinuous Galerkin solver of the hyperbolic PDE engine ExaHyPE successively tackling bottlenecks due to SIMD operations, cache hierarchies and restrictions in the software design. Starting from a generic scalar implementation of the numerical scheme, our first optimized variant applies state of the art optimization techniques by vectorizing loops, improving the data layout and using Loop over GEMM to perform tensor contractions via highly optimized matrix multiplication functions provided by the LIBXSMM library. We show that memory stalls due to a memory footprint exceeding our L2 cache size hindered the vectorization gains. We therefore introduce a new kernel that applies a sum factorization approach to reduce the kernel's memory footprint and improve its cache locality. With the L2 cache bottleneck removed, we were able to exploit additional vectorization opportunities, by introducing a hybrid Array of Structure of Array data layout that solves the data layout conflict between matrix multiplications kernels and the point wise functions to implement PDE specific terms. With this last kernel, evaluated in a benchmark simulation at high polynomial order, only 2 of the floating point operations are still performed using scalar instructions and 22.5 of the available performance is achieved."} {"_id": [1, 2, 20, 13], "label": "cs.LG cs.AI cs.NA math.DS math.NA", "text": "Kinetics Informed Neural Networks. Chemical kinetics and reaction engineering consists of the phenomenological framework for the disentanglement of reaction mechanisms, optimization of reaction performance and the rational design of chemical processes. Here, we utilize feed forward artificial neural networks as basis functions to solve ordinary differential equations (ODEs) constrained by differential algebraic equations (DAEs) that describe microkinetic models (MKMs). We present an algebraic framework for the mathematical description and classification of reaction networks, types of elementary reaction, and chemical species. Under this framework, we demonstrate that the simultaneous training of neural nets and kinetic model parameters in a regularized multi objective optimization setting leads to the solution of the inverse problem through the estimation of kinetic parameters from synthetic experimental data. We analyze a set of scenarios to establish the extent to which kinetic parameters can be retrieved from transient kinetic data, and assess the robustness of the methodology with respect to statistical noise. This approach to inverse kinetic ODEs can assist in the elucidation of reaction mechanisms based on transient data."} {"_id": [9], "label": "math.AP", "text": "Scaling limits and stochastic homogenization for some nonlinear parabolic equations. The aim of this paper is twofold. The first is to study the asymptotics of a parabolically scaled, continuous and space time stationary in time version of the well known Funaki Spohn model in Statistical Physics. After a change of unknowns requiring the existence of a space time stationary eternal solution of a stochastically perturbed heat equation, the problem transforms to the qualitative homogenization of a uniformly elliptic, space time stationary, divergence form, nonlinear partial differential equation, the study of which is the second aim of the paper. An important step is the construction of correctors with the appropriate behavior at infinity."} {"_id": [9, 12, 13], "label": "math.CA math.AP math.DS", "text": "Fourier nonuniqueness sets for the hyperbola and the Perron Frobenius operators. Let Gamma be a smooth curve or finite disjoint union of smooth curves in the plane and Lambda be any subset of the plane. Let mathcal X( Gamma) be the space of all finite complex valued Borel measures in the plane which are supported on Gamma and are absolutely continuous with respect to the arc length measure on Gamma. Let mathcal AC ( Gamma, Lambda) mu in mathcal X ( Gamma) hat mu Lambda 0 , then we prove the following results begin enumerate (a) item For a rational perturbation of Lambda beta namely, Lambda beta theta left(( mathbb Z theta ) times 0 right) cup left( 0 times beta mathbb Z right), where theta 1 p , text for some p in mathbb N, and beta is a positive real, mathcal AC left( Gamma, Lambda beta theta right) is infinite dimensional whenever beta p. smallskip item For a rational perturbation of Lambda gamma namely, Lambda gamma theta left((2 mathbb Z 2 theta ) times 0 right) cup left( 0 times2 gamma mathbb Z right), where theta 1 q, text for some q in mathbb N, and gamma is a positive real, mathcal AC left( Gamma , Lambda gamma theta right) is infinite dimensional whenever gamma q. end enumerate"} {"_id": [34, 23], "label": "math.CV math.FA", "text": "Bergman Toeplitz operators between weighted L p spaces on weakly pseudoconvex domains. In this paper we study the Bergman Toeplitz operator T psi induced by psi(w) K Omega alpha (w,w)d Omega beta (w) with alpha, beta geq 0 acting from a weighted L p space L a p( Omega) to another one L a q( Omega) on a large class of pseudoconvex domains of finite type. In the case 1 p leq q infty , the following results are established Necessary and sufficient conditions for boundedness, which generalize the recent results obtained by Khanh, Liu and Thuc. Upper and lower estimates for essential norm, in particular, a criterion for compactness. A characterization of Schatten class membership of this operator on Hilbert space L 2( Omega) ."} {"_id": [21, 15], "label": "cs.IT math.CO math.IT", "text": "Improved List Decodability of Reed Solomon Codes via Tree Packings. This paper shows that there exist Reed Solomon (RS) codes, over large finite fields, that are combinatorially list decodable well beyond the Johnson radius, in fact almost achieving list decoding capacity. In particular, we show that for any epsilon in (0,1 there exist RS codes with rate Omega( frac epsilon log(1 epsilon) 1 ) that are list decodable from radius of 1 epsilon . We generalize this result to obtain a similar result on list recoverability of RS codes. Along the way we use our techniques to give a new proof of a result of Blackburn on optimal linear perfect hash matrices, and strengthen it to obtain a construction of strongly perfect hash matrices. To derive the results in this paper we show a surprising connection of the above problems to graph theory, and in particular to the tree packing theorem of Nash Williams and Tutte. En route to our results on RS codes, we prove a generalization of the tree packing theorem to hypergraphs (and we conjecture that an even stronger generalization holds). We hope that this generalization to hypergraphs will be of independent interest."} {"_id": [8, 11], "label": "physics.optics physics.app-ph", "text": "A compact single channel interferometer to study vortex beam propagation. We propose and demonstrate a single channel interferometer that can be used to study how vortex beams propagate. The interferometer consists of a multifunctional diffractive optical element (MDOE) synthesized by the spatial random multiplexing of a Fresnel zone plate and a spiral Fresnel zone plate with different focal lengths. The MDOE generates two co propagating beams, such that only the beam carrying orbital angular momentum is modulated by an annular stack of thin scatterers located at the focal plane of the Fresnel zone plate, while the other beam passes through the centre of the annulus without any modulation. The interference pattern is recorded at the focal plane of the spiral Fresnel zone plate. The scattering of vortex beams through stacks consisting of different number of thin scatterers was studied using the proposed optical setup. Conflicting results have been reported earlier on whether higher or lower charge beams suffer more deterioration. The proposed interferometer provides a relatively simple and compact means of experimentally studying propagation of vortex beams through scattering medium."} {"_id": [20], "label": "cs.NA", "text": "A compact high order Alternating Direction Implicit method for three dimensional acoustic wave equation with variable coefficient. Efficient and accurate numerical simulation of seismic wave propagation is important in various Geophysical applications such as seismic full waveform inversion (FWI) problem. However, due to the large size of the physical domain and requirement on low numerical dispersion, many existing numerical methods are inefficient for numerical modelling of seismic wave propagation in a heterogeneous media. Despite the great efforts that have been devoted during the past decades, it still remains a challenging task in the development of efficient and accurate finite difference method for the multi dimensional acoustic wave equation with variable velocity. In this paper, we proposed a Pad ' e approximation based finite difference scheme for solving the acoustic wave equation in three dimensional heterogeneous media. The new method is obtained by combining the Pad ' e approximation and a novel algebraic manipulation. The efficiency of the new algorithm is further improved through the Alternative Directional Implicit (ADI) method. The stability of the new algorithm has been theoretically proved by the energy method. The new method is conditionally stable with a better Courant Friedrichs Lewy condition (CFL) condition, which has been verified numerically. Extensive numerical examples have been solved, which demonstrated that the new method is accurate, efficient and stable."} {"_id": [41, 28], "label": "cs.CG cs.RO", "text": "On the snappability and singularity distance of frameworks with bars and triangular plates. In a recent article the author presented a method to measure the snapping capability shortly called snappability of bar joint frameworks based on the total elastic strain energy by computing the deformation of all bars using Hooke's law and the definition of Cauchy Engineering strain. Within the paper at hand, we extend this approach to isostatic frameworks composed of bars and triangular plates by using the physical concept of Green Lagrange strain. An intrinsic pseudometric based on the resulting total elastic strain energy density cannot only be used for evaluating the snappability but also for measuring the distance to the closest singular configuration. The presented methods are demonstrated on the basis of the 3 legged planar parallel manipulator."} {"_id": [0], "label": "cs.CV", "text": "Learning to Learn Relation for Important People Detection in Still Images. Humans can easily recognize the importance of people in social event images, and they always focus on the most important individuals. However, learning to learn the relation between people in an image, and inferring the most important person based on this relation, remains undeveloped. In this work, we propose a deep imPOrtance relatIon NeTwork (POINT) that combines both relation modeling and feature learning. In particular, we infer two types of interaction modules the person person interaction module that learns the interaction between people and the event person interaction module that learns to describe how a person is involved in the event occurring in an image. We then estimate the importance relations among people from both interactions and encode the relation feature from the importance relations. In this way, POINT automatically learns several types of relation features in parallel, and we aggregate these relation features and the person's feature to form the importance feature for important people classification. Extensive experimental results show that our method is effective for important people detection and verify the efficacy of learning to learn relations for important people detection."} {"_id": [38, 46], "label": "math.AG math.NT", "text": "A Note On Two Fiber Bundles and The Manifestations Of \"Shtuka\". In this note we intend to look at the moduli stacks for global G shtukas from a new perspective. We discuss a unifying interpretation of several moduli spaces (stacks) including moduli of global G shtukas and (a variant of the) moduli of Higgs bundles. We view these spaces (stacks) as different fibers of a family over a scheme (stack) locally of finite type. We discuss (a relative version of) the local model theory for this family. We also consider the Hecke stacks over the moduli stack of G shtukas and discuss the corresponding (motivic) Hecke operations."} {"_id": [49, 23], "label": "math.FA math.OC", "text": "Zero Duality Gap in View of Abstract Convexity. Using tools provided by the theory of abstract convexity, we extend conditions for zero duality gap to the context of nonconvex and nonsmooth optimization. Mimicking the classical setting, an abstract convex function is the upper envelope of a family of abstract affine functions (being conventional vertical translations of the abstract linear functions). We establish new conditions for zero duality gap under no topological assumptions on the space of abstract linear functions. In particular, we prove that the zero duality gap property can be fully characterized in terms of an inclusion involving (abstract) varepsilon subdifferentials. This result is new even for the classical convex setting. Endowing the space of abstract linear functions with the topology of pointwise convergence, we extend several fundamental facts of functional convex analysis. This includes (i) the classical Banach Alaoglu Bourbaki theorem (ii) the subdifferential sum rule, and (iii) a constraint qualification for zero duality gap which extends a fact established by Borwein, Burachik and Yao (2014) for the conventional convex case. As an application, we show with a specific example how our results can be exploited to show zero duality for a family of nonconvex, non differentiable problems."} {"_id": [0], "label": "cs.CV", "text": "Libra R CNN Towards Balanced Learning for Object Detection. Compared with model architectures, the training process, which is also crucial to the success of detectors, has received relatively less attention in object detection. In this work, we carefully revisit the standard training practice of detectors, and find that the detection performance is often limited by the imbalance during the training process, which generally consists in three levels sample level, feature level, and objective level. To mitigate the adverse effects caused thereby, we propose Libra R CNN, a simple but effective framework towards balanced learning for object detection. It integrates three novel components IoU balanced sampling, balanced feature pyramid, and balanced L1 loss, respectively for reducing the imbalance at sample, feature, and objective level. Benefitted from the overall balanced design, Libra R CNN significantly improves the detection performance. Without bells and whistles, it achieves 2.5 points and 2.0 points higher Average Precision (AP) than FPN Faster R CNN and RetinaNet respectively on MSCOCO."} {"_id": [9], "label": "math.AP", "text": "Asymptotic stability of small ground states for NLS under random perturbations. We consider the cubic Schr \"odinger equation on the euclidean space perturbed by a short range potential V . The presence of a negative simple eigenvalue for Delta V gives rise to a curve of small and localized nonlinear ground states that yield some time periodic solutions known to be asymptotically stable in the energy space. We study the persistence of these coherent states under rough perturbations. We shall construct a large measure set of small scaling supercritical solutions below the energy space that display some asymptotic stability behavior. The main difficulty is the need to handle the interactions of localized and dispersive terms in the modulation equations. To do so, we use a critical weighted strategy to combine probabilistic nonlinear estimates in critical spaces based on U p, V q (controlling higher order terms) with some local energy decay estimates (controlling lower order terms). We also revisit in the perturbed setting the analysis of B 'enyi, Oh and Pocovnicu on the probabilistic global well posedness and scattering for small supercritical initial data. We use a distorted Fourier transform and semiclassical functional calculus to generalize probabilistic and bilinear Strichartz estimates."} {"_id": [46, 47], "label": "math.AG math.AT", "text": "Applications to A1 enumerative geometry of the A1 degree. These are lecture notes from the conference Arithmetic Topology at the Pacific Institute of Mathematical Sciences on applications of Morel's A1 degree to questions in enumerative geometry. Additionally, we give a new dynamic interpretation of the A1 Milnor number inspired by the first named author's enrichment of dynamic intersection numbers."} {"_id": [0], "label": "cs.CV", "text": "EEV A Large Scale Dataset for Studying Evoked Expressions from Video. Videos can evoke a range of affective responses in viewers. The ability to predict evoked affect from a video, before viewers watch the video, can help in content creation and video recommendation. We introduce the Evoked Expressions from Videos (EEV) dataset, a large scale dataset for studying viewer responses to videos. Each video is annotated at 6 Hz with 15 continuous evoked expression labels, corresponding to the facial expression of viewers who reacted to the video. We use an expression recognition model within our data collection framework to achieve scalability. In total, there are 36.7 million annotations of viewer facial reactions to 23,574 videos (1,700 hours). We use a publicly available video corpus to obtain a diverse set of video content. We establish baseline performance on the EEV dataset using an existing multimodal recurrent model. Transfer learning experiments show an improvement in performance on the LIRIS ACCEDE video dataset when pre trained on EEV. We hope that the size and diversity of the EEV dataset will encourage further explorations in video understanding and affective computing. A subset of EEV is released at https github.com google research datasets eev."} {"_id": [78], "label": "math.AC", "text": "Test modules, weakly regular homomorphisms and complete intersection dimension. We prove that if a local ring admits a (pd )test module of finite complete intersection dimension, then it is a complete intersection ring. This answers, positively, a question proposed by Celikbas, Dao and Takahashi. To this aim, we first investigate another question raised by Celikbas and Sather Wagstaff concerning ascent properties of (pd )test complexes under weakly regular homomorphisms."} {"_id": [72], "label": "cs.PF", "text": "Finally, how many efficiencies supercomputers have? And, what do they measure?. Using an extremely large number of processing elements in computing systems leads to unexpected phenomena, such as different efficiencies of the same system for different tasks, that cannot be explained in the frame of classical computing paradigm. The simple non technical (but considering the temporal behavior of the components) model, introduced here, enables us to set up a frame and formalism, needed to explain those unexpected experiences around supercomputing. Introducing temporal behavior into computer science also explains why only the extreme scale computing enabled us to reveal the experienced limitations. The paper shows, that degradation of efficiency of parallelized sequential systems is a natural consequence of the classical computing paradigm, instead of being an engineering imperfectness. The workload, that supercomputers run, is much responsible for wasting energy, as well as limiting the size and type of tasks. Case studies provide insight, how different contributions compete for dominating the resulting payload performance of a computing system, and how enhancing the interconnection technology made computing communication to dominate in defining the efficiency of supercomputers. Our model also enables to derive predictions about supercomputer performance limitations for the near future, as well as it provides hints for enhancing supercomputer components. Phenomena experienced in large scale computing show interesting parallels with phenomena experienced in science, more than a century ago, and through their studying a modern science was developed."} {"_id": [59], "label": "cs.SI", "text": "Is this pofma? Analysing public opinion and misinformation in a COVID 19 Telegram group chat. We analyse a Singapore based COVID 19 Telegram group with more than 10,000 participants. First, we study the group's opinion over time, focusing on four dimensions participation, sentiment, topics, and psychological features. We find that engagement peaked when the Ministry of Health raised the disease alert level, but this engagement was not sustained. Second, we search for government identified misinformation in the group. We find that government identified misinformation is rare, and that messages discussing these pieces of misinformation express skepticism."} {"_id": [0, 3], "label": "cs.CV cs.CL", "text": "Neural Computing for Online Arabic Handwriting Character Recognition using Hard Stroke Features Mining. Online Arabic cursive character recognition is still a big challenge due to the existing complexities including Arabic cursive script styles, writing speed, writer mood and so forth. Due to these unavoidable constraints, the accuracy of online Arabic character's recognition is still low and retain space for improvement. In this research, an enhanced method of detecting the desired critical points from vertical and horizontal direction length of handwriting stroke features of online Arabic script recognition is proposed. Each extracted stroke feature divides every isolated character into some meaningful pattern known as tokens. A minimum feature set is extracted from these tokens for classification of characters using a multilayer perceptron with a back propagation learning algorithm and modified sigmoid function based activation function. In this work, two milestones are achieved firstly, attain a fixed number of tokens, secondly, minimize the number of the most repetitive tokens. For experiments, handwritten Arabic characters are selected from the OHASD benchmark dataset to test and evaluate the proposed method. The proposed method achieves an average accuracy of 98.6 comparable in state of art character recognition techniques."} {"_id": [6], "label": "physics.flu-dyn", "text": "How surfactants influence the drop size in sprays. Spraying is a widely used method to produce a liquid sheet that break up into droplets of a certain size distribution. When spraying simple liquids, it is known which experimental parameters determine the droplet size distribution. For many applications however, surfactants are added, producing a hitherto unknown effect on the droplet size distribution. Using two generic types of spraying nozzles, we sprayed solutions of different types of aqueous surfactants and measured the droplet size distribution of the sprays. We find that the breakup of surfactant solutions is similar to that of pure water but results in droplets that are on average smaller. The resulting droplet size distribution can be well described using the predictions for simple liquids provided that we replace the parameter of the equilibrium surface tension with the dynamic surface tension of the surfactant solution at a surface age of 20 ms, which is the characteristic time for destabilization and breakup of a liquid sheet. By rescaling them with the mean droplet size, the droplet size distributions of water and sprays with different concentrations of surfactants all collapse onto a single curve and can be well described using the compound Gamma function found previously for pure liquids."} {"_id": [0], "label": "cs.CV", "text": "Domain2Vec Domain Embedding for Unsupervised Domain Adaptation. Conventional unsupervised domain adaptation (UDA) studies the knowledge transfer between a limited number of domains. This neglects the more practical scenario where data are distributed in numerous different domains in the real world. The domain similarity between those domains is critical for domain adaptation performance. To describe and learn relations between different domains, we propose a novel Domain2Vec model to provide vectorial representations of visual domains based on joint learning of feature disentanglement and Gram matrix. To evaluate the effectiveness of our Domain2Vec model, we create two large scale cross domain benchmarks. The first one is TinyDA, which contains 54 domains and about one million MNIST style images. The second benchmark is DomainBank, which is collected from 56 existing vision datasets. We demonstrate that our embedding is capable of predicting domain similarities that match our intuition about visual relations between different domains. Extensive experiments are conducted to demonstrate the power of our new datasets in benchmarking state of the art multi source domain adaptation methods, as well as the advantage of our proposed model."} {"_id": [17], "label": "cs.DC", "text": "Criteria and Approaches for Virtualization on Modern FPGAs. Modern field programmable gate arrays (FPGAs) can produce high performance in a wide range of applications, and their computational capacity is becoming abundant in personal computers. Regardless of this fact, FPGA virtualization is an emerging research field. Nowadays, challenges of the research area come from not only technical difficulties but also from the ambiguous standards of virtualization. In this paper, we introduce novel criteria of FPGA virtualization and discuss several approaches to accomplish those criteria. In addition, we present and describe in detail the specific FPGA virtualization architecture that we developed on Intel Arria 10 FPGA. We evaluate our solution with a combination of applications and microbenchmarks. The result shows that our virtualization solution can provide a full abstraction of FPGA device in both user and developer perspective while maintaining a reasonable performance compared to native FPGA."} {"_id": [19, 15], "label": "cs.CR cs.IT math.IT", "text": "On the Information Privacy Model the Group and Composition Privacy. How to query a dataset in the way of preserving the privacy of individuals whose data is included in the dataset is an important problem. The information privacy model, a variant of Shannon's information theoretic model to the encryption systems, protects the privacy of an individual by controlling the amount of information of the individual's data obtained by each adversary from the query's output. This model also assumes that each adversary's uncertainty to the queried dataset is not so small in order to improve the data utility. In this paper, we prove some results to the group privacy and the composition privacy properties of this model, where the group privacy ensures a group of individuals' privacy is preserved, and where the composition privacy ensures multiple queries also preserve the privacy of an individual. Explicitly, we reduce the proof of the two properties to the estimation of the difference of two channel capacities. Our proofs are greatly benefited from some information theoretic tools and approaches."} {"_id": [65, 49], "label": "math.OC cs.NI", "text": "Service Network Design Problem with Capacity Demand Balancing. This paper addresses developing cost effective strategies to respond to excessive demand in the service network design problem in a multi period setting. The common assumption states that the capacity of freight carriers' assets is capable of handling all of the forecasted demand however, we assume that there are certain periods such as holiday season in which excessive demand is observed. The demand strictly exceeds the carrier's capacity even though, the average demand can be still fulfilled throughout the year. In this sense, we let the carrier has three options to respond to the demand Dispersing the demand with a penalty, leasing additional asset(s) temporarily, and outsourcing some capacity. We propose a modeling and solution approach that jointly incorporates asset management and sizing, outsourcing (3PLs), and earliness tardiness penalties. The objective is to minimize the overall operational costs by optimally selecting and scheduling the home fleet with respect to 'demand shifting' choices, selecting services from third parties, and routing the commodities on the designed network. We propose an arc based formulation as well as valid inequalities and present a comprehensive computational study on the randomly generated instances. The formulations with valid inequalities (VIs) outperform the regular formulation in obtaining tighter lower bounds. One set of VIs can improve the CPU time elapsed by 25 on medium instances that can be solved optimally within the time limit. Furthermore, we develop a custom multi phase dedicate merge and mix algorithm (DMaM) to solve CSSND problem with an emphasis of obtaining solutions as high quality as possible practically in a short time in the real world. DMaM has a promising potential to obtain solutions especially for very large instances whereas the commercial solver cannot initialize the B B algorithm due to excessive memory usage."} {"_id": [13], "label": "math.DS", "text": "Markovian Random Iterations of Maps. In this paper, we study Markovian random iterations of maps on standard measurable spaces. We establish a one to one correspondence between stationary measures and a certain class of invariant measures of a Markovian random iteration, extending a similar classical result of independent and identically distributed random iterations. As an application, we prove a local synchronization property for Markovian random iterations of homeomorphisms of the circle S 1 ."} {"_id": [14], "label": "cs.HC", "text": "Deaf, Hard of Hearing, and Hearing Perspectives on using Automatic Speech Recognition in Conversation. Many personal devices have transitioned from visual controlled interfaces to speech controlled interfaces to reduce costs and interactive friction, supported by the rapid growth in capabilities of speech controlled interfaces, e.g., Amazon Echo or Apple's Siri. A consequence is that people who are deaf or hard of hearing (DHH) may be unable to use these speech controlled devices. We show that deaf speech has a high error rate compared to hearing speech, in commercial speech controlled interfaces. Deaf speech had approximately a 78 word error rate (WER) compared to a hearing speech 18 WER. Our findings show that current speech controlled interfaces are not usable by DHH people. Based on our findings, significant advances in speech recognition software or alternative approaches will be needed for deaf use of speech controlled interfaces. We show that current speech controlled interfaces are not usable by DHH people."} {"_id": [67, 5], "label": "physics.atom-ph physics.plasm-ph", "text": "Hybrid subconfiguration average and level to level distorted wave treatment of electron impact single ionisation of W 15 and W 16 . Recently, we have demonstrated (Jin et al. 2020, J. Phys. B At. Mol. Opt. Phys. 53, 075201) that a hybrid subconfiguration average and level to level distorted wave treatment of electron impact single ionisation (EISI) of W 14 ions represents an accurate and manageable approach for the calculation of EISI cross sections of a complex ion. Here we demonstrate the more general validity of this approach by comparing hybrid cross sections for EISI of W 15 and W 16 with the recent experimental results of Schury et al. 2020, J. Phys. B At. Mol. Opt. Phys. 53, 015201). Our calculations also account for the resonant excitation double autoionisation (REDA) process which is important in the electron energy range 370 600 eV and for the possible presence of initially metastable ions in the experiment."} {"_id": [20], "label": "math.NA cs.NA", "text": "On compact 4th order finite difference schemes for the wave equation. We consider compact finite difference schemes of the 4th approximation order for an initial boundary value problem (IBVP) for the n dimensional non homogeneous wave equation, n geq 1 . Their construction is accomplished by both the classical Numerov approach and alternative technique based on averaging of the equation, together with further necessary improvements of the arising scheme for n geq 2 . The alternative technique is applicable to other types of PDEs including parabolic and time dependent Schr \" o dinger ones. The schemes are implicit and three point in each spatial direction and time and include a scheme with a splitting operator for n geq 2 . For n 1 and the mesh on characteristics, the 4th order scheme becomes explicit and close to an exact four point scheme. We present a conditional stability theorem covering the cases of stability in strong and weak energy norms with respect to both initial functions and free term in the equation. Its corollary ensures the 4th order error bound in the case of smooth solutions to the IBVP. The main schemes are generalized for non uniform rectangular meshes. We also give results of numerical experiments showing the sensitive dependence of the error orders in three norms on the weak smoothness order of the initial functions and free term and essential advantages over the 2nd approximation order schemes in the non smooth case as well."} {"_id": [49], "label": "math.OC", "text": "An inexact augmented Lagrangian method for nonsmooth optimization on Riemannian manifold. We consider a nonsmooth optimization problem on Riemannian manifold, whose objective function is the sum of a differentiable component and a nonsmooth convex function. We propose a manifold inexact augmented Lagrangian method (MIALM) for the considered problem. The problem is reformulated to a separable form. By utilizing the Moreau envelope, we get a smoothing subproblem at each iteration of the proposed method. Theoretically, under suitable assumptions, the convergence to critical point of the proposed method is established. In particular, under the condition of that the approximate global minimizer of the iteration subproblem could be obtained, we prove the convergence to global minimizer of the origin problem. Numerical experiments show that, the MIALM is a competitive method compared to some existing methods."} {"_id": [1, 20, 7], "label": "physics.comp-ph cs.LG cs.NA math.NA", "text": "Integrating Machine Learning with Physics Based Modeling. Machine learning is poised as a very powerful tool that can drastically improve our ability to carry out scientific research. However, many issues need to be addressed before this becomes a reality. This article focuses on one particular issue of broad interest How can we integrate machine learning with physics based modeling to develop new interpretable and truly reliable physical models? After introducing the general guidelines, we discuss the two most important issues for developing machine learning based physical models Imposing physical constraints and obtaining optimal datasets. We also provide a simple and intuitive explanation for the fundamental reasons behind the success of modern machine learning, as well as an introduction to the concurrent machine learning framework needed for integrating machine learning with physics based modeling. Molecular dynamics and moment closure of kinetic equations are used as examples to illustrate the main issues discussed. We end with a general discussion on where this integration will lead us to, and where the new frontier will be after machine learning is successfully integrated into scientific modeling."} {"_id": [93], "label": "physics.class-ph", "text": "Identification of second gradient elastic materials from planar hexagonal lattices. Part I Analytical derivation of equivalent constitutive tensors. A second gradient elastic (SGE) material is identified as the homogeneous solid equivalent to a periodic planar lattice characterized by a hexagonal unit cell, which is made up of three different linear elastic bars ordered in a way that the hexagonal symmetry is preserved and hinged at each node, so that the lattice bars are subject to pure axial strain while bending is excluded. Closed form expressions for the identified non local constitutive parameters are obtained by imposing the elastic energy equivalence between the lattice and the continuum solid, under remote displacement conditions having a dominant quadratic component. In order to generate equilibrated stresses, in the absence of body forces, the applied remote displacement has to be constrained, thus leading to the identification in a lq condensed' form of a higher order solid, so that imposition of further constraints becomes necessary to fully quantify the equivalent continuum. The identified SGE material reduces to an equivalent Cauchy material only in the limit of vanishing side length of hexagonal unit cell. The analysis of positive definiteness and symmetry of the equivalent constitutive tensors, the derivation of the second gradient elastic properties from those of the higher order solid in the lq condensed' definition, and a numerical validation of the identification scheme are deferred to Part II of this study."} {"_id": [3], "label": "cs.CL", "text": "The FRENK Datasets of Socially Unacceptable Discourse in Slovene and English. In this paper we present datasets of Facebook comment threads to mainstream media posts in Slovene and English developed inside the Slovene national project FRENK which cover two topics, migrants and LGBT, and are manually annotated for different types of socially unacceptable discourse (SUD). The main advantages of these datasets compared to the existing ones are identical sampling procedures, producing comparable data across languages and an annotation schema that takes into account six types of SUD and five targets at which SUD is directed. We describe the sampling and annotation procedures, and analyze the annotation distributions and inter annotator agreements. We consider this dataset to be an important milestone in understanding and combating SUD for both languages."} {"_id": [9], "label": "math.AP", "text": "Convergence problem of Schr \"odinger equation in Fourier Lebesgue spaces with rough data and random data. In this paper, we consider the convergence problem of Schr \"odinger equation. Firstly, we show the almost everywhere pointwise convergence of Schr \"odinger equation in Fourier Lebesgue spaces hat H frac 1 p , frac p 2 ( mathbb R )(4 leq p infty), hat H frac 3 s 1 p , frac 2p 3 ( mathbb R 2)(s 1 frac 1 3 ,3 leq p infty), hat H frac 2 s 1 p ,p ( mathbb R n)(s 1 frac n 2(n 1) ,2 leq p infty,n geq3) with rough data. Secondly, we show that the maximal function estimate related to one Schr \"odinger equation can fail with data in hat H s, frac p 2 ( mathbb R )(s frac 1 p ) . Finally, we show the stochastic continuity of Schr \"odinger equation with random data in hat L r ( mathbb R n)(2 leq r infty) almost surely. The main ingredients are Lemmas 2.4, 2.5, 3.2 3.4."} {"_id": [93], "label": "physics.class-ph", "text": "The pressure underneath a skate at rest. The pressure distribution is calculated underneath a skate which is pushed in the ice by the weight of a skater at rest. Due to the sharp edges of the skate the deformation is partly elastic and partly plastic. The ratio of the plastic and elastic contribution to the reaction force is determined. Using this ratio the deformation in ice with a finite hardness can be mapped on the problem of the deformation in a purely elastic medium with infinite hardness. Both the upright skate and the tilted position are exactly calculated."} {"_id": [29], "label": "math.GR", "text": "Relative Hyperbolicity of Graphical Small Cancellation Groups. A piece of a labelled graph Gamma defined by D. Gruber is a labelled path that embeds into Gamma in two essentially different ways. We prove that graphical Gr'( frac 1 6 ) small cancellation groups whose associated pieces have uniformly bounded length are relative hyperbolic. In fact, we show that the Cayley graph of such group presentation is asymptotically tree graded with respect to the collection of all embedded components of the defining graph Gamma , if and only if the pieces of Gamma are uniformly bounded. This implies the relative hyperbolicity by a result of C. Dru c t u, D. Osin and M. Sapir."} {"_id": [9], "label": "math.AP", "text": "Singular limits for compressible inviscid rotating fluids. We study singular limit for scaled barotropic Euler system modelling a rotating, compressible and inviscid fluid, where Mach and Rossby numbers are proportional to a small parameter epsilon . If the fluid is confined to an infinite slab, the limit behaviour is identified as a horizontal motion of an incompressible inviscid system that is analogous to the Euler system. We consider a very general class of solutions, named dissipative solution for the scaled compressible Euler systems and will show that it converges to a strong solution of that incompressible inviscid system."} {"_id": [57], "label": "cs.PL", "text": "Structural Contracts Contracts for Type Construction Dependent Types to Ensure Consistency of Extra Functional Reasoning. Targeting to use contract based design for the specification and refinement of extra functional properties, this research abstract suggests to use type constraints and dependent types to ensure correct and consistent top down decomposition of contracts with respect to a specifiable type constructor. For this, we summarize the composition problem and give a short draft of our approach, called Structural Contracts."} {"_id": [49], "label": "math.OC", "text": "On sample average approximation for two stage stochastic programs without relatively complete recourse. We investigate sample average approximation (SAA) for two stage stochastic programs without relatively complete recourse, i.e., for problems in which there are first stage feasible solutions that are not guaranteed to have a feasible recourse action. As a feasibility measure of the SAA solution, we consider the \"recourse likelihood\", which is the probability that the solution has a feasible recourse action. For epsilon in (0,1) , we demonstrate that the probability that a SAA solution has recourse likelihood below 1 epsilon converges to zero exponentially fast with the sample size. Next, we analyze the rate of convergence of optimal solutions of the SAA to optimal solutions of the true problem for problems with a finite feasible region, such as bounded integer programming problems. For problems with non finite feasible region, we propose modified \"padded\" SAA problems and demonstrate in two cases that such problems can yield, with high confidence, solutions that are certain to have a feasible recourse decision. Finally, we conduct a numerical study on a two stage resource planning problem that illustrates the results, and also suggests there may be room for improvement in some of the theoretical analysis."} {"_id": [59, 85], "label": "cs.SI physics.data-an", "text": "Exploring and comparing temporal clustering methods. Description of temporal networks and detection of dynamic communities have been hot topics of research for the last decade. However, no consensual answers to these challenges have been found due to the complexity of the task. Static communities are not well defined objects, and adding a temporal dimension renders the description even more difficult. In this article, we propose a coherent temporal clustering method the Best Combination of Local Communities (BCLC). Our method aims at finding a good balance between two conflicting objectives closely following the short time evolution by finding optimal partitions at each time step and temporal smoothness, which privileges historical continuity."} {"_id": [0], "label": "cs.CV", "text": "Structured Multimodal Attentions for TextVQA. In this paper, we propose an end to end structured multimodal attention (SMA) neural network to mainly solve the first two issues above. SMA first uses a structural graph representation to encode the object object, object text and text text relationships appearing in the image, and then designs a multimodal graph attention network to reason over it. Finally, the outputs from the above modules are processed by a global local attentional answering module to produce an answer splicing together tokens from both OCR and general vocabulary iteratively by following M4C. Our proposed model outperforms the SoTA models on TextVQA dataset and two tasks of ST VQA dataset among all models except pre training based TAP. Demonstrating strong reasoning ability, it also won first place in TextVQA Challenge 2020. We extensively test different OCR methods on several reasoning models and investigate the impact of gradually increased OCR performance on TextVQA benchmark. With better OCR results, different models share dramatic improvement over the VQA accuracy, but our model benefits most blessed by strong textual visual reasoning ability. To grant our method an upper bound and make a fair testing base available for further works, we also provide human annotated ground truth OCR annotations for the TextVQA dataset, which were not given in the original release. The code and ground truth OCR annotations for the TextVQA dataset are available at https github.com ChenyuGAO CS SMA"} {"_id": [12], "label": "math.CA", "text": "A constructive approach towards the Method of Solution Regions. In this work we develop the theory of solution regions with a constructive approach. We also extend the theory to the case of general linear conditions and provide various sets of sufficient hypotheses for existence and multiplicity results."} {"_id": [77, 70], "label": "math.HO math.LO", "text": "On mathematical realism and the applicability of hyperreals. We argue that Robinson's hyperreals have just as much claim to applicability as the garden variety reals. In a recent text, Easwaran and Towsner (ET) analyze the applicability of mathematical techniques in the sciences, and introduce a distinction between techniques that are applicable and those that are merely instrumental. Unfortunately the authors have not shown that their distinction is a clear and fruitful one, as the examples they provide are superficial and unconvincing. Moreover, their analysis is vitiated by a reliance on a naive version of object realism which has long been abandoned by most philosophical realists in favor of truth value realism. ET's argument against the applicability of hyperreals based on automorphisms of hyperreal models involves massaging the evidence and is similarly unconvincing. The purpose of the ET text is to argue that Robinson's infinitesimal analysis is merely instrumental rather than applicable. Yet in spite of Robinson's techniques being applied in physics, probability, and economics, ET don't bother to provide a meaningful analysis of even a single case in which these techniques are used. Instead, ET produce page after page of speculations mainly imitating Connesian chimera type arguments from first principles' against Robinson. In an earlier paper Easwaran endorsed real applicability of the sigma additivity of measures, whereas the ET text rejects real applicability of the axiom of choice, voicing a preference for ZF. Since it is consistent with ZF that the Lebesgue measure is not sigma additive, Easwaran is thereby walking back his earlier endorsement. We note a related inaccuracy in the textbook Measure Theory by Paul Halmos."} {"_id": [9, 20, 6], "label": "physics.flu-dyn cs.NA math.AP math.NA", "text": "Velocity of viscous fingers in miscible displacement. The paper investigates the linear growth of the mixing zone during polymer slug injection into a water reservoir. The velocities of the slug front and of the boundaries of the mixing zone are analyzed as key parameters. Using two different numerical methods (finite volumes and finite elements), the impact of the slug size, reservoir dimensions, Peclet number, and viscosity curve shape on the corresponding velocities is examined. Notwithstanding the realization of the solution by two computational schemes, the simulation results coincide with sufficient accuracy. The numerically obtained velocities are compared with theoretical estimates within the transverse flow equilibrium approximation and Koval model. Based on the comparison pattern, recommendations are presented on the use of specific analytical methods for estimating the growth rate of the mixing zone depending on the characteristics of the polymer."} {"_id": [52, 39], "label": "cs.CY cs.MA", "text": "BISTRO Berkeley Integrated System for Transportation Optimization. This article introduces BISTRO, a new open source transportation planning decision support system that uses an agent based simulation and optimization approach to anticipate and develop adaptive plans for possible technological disruptions and growth scenarios. The new framework was evaluated in the context of a machine learning competition hosted within Uber Technologies, Inc., in which over 400 engineers and data scientists participated. For the purposes of this competition, a benchmark model, based on the city of Sioux Falls, South Dakota, was adapted to the BISTRO framework. An important finding of this study was that in spite of rigorous analysis and testing done prior to the competition, the two top scoring teams discovered an unbounded region of the search space, rendering the solutions largely uninterpretable for the purposes of decision support. On the other hand, a follow on study aimed to fix the objective function, served to demonstrate BISTRO's utility as a human in the loop cyberphysical system one that uses scenario based optimization algorithms as a feedback mechanism to assist urban planners with iteratively refining objective function and constraints specification on intervention strategies such that the portfolio of transportation intervention strategy alternatives eventually chosen achieves high level regional planning goals developed through participatory stakeholder engagement practices."} {"_id": [3], "label": "cs.CL", "text": "Pre training Text Representations as Meta Learning. Pre training text representations has recently been shown to significantly improve the state of the art in many natural language processing tasks. The central goal of pre training is to learn text representations that are useful for subsequent tasks. However, existing approaches are optimized by minimizing a proxy objective, such as the negative log likelihood of language modeling. In this work, we introduce a learning algorithm which directly optimizes model's ability to learn text representations for effective learning of downstream tasks. We show that there is an intrinsic connection between multi task pre training and model agnostic meta learning with a sequence of meta train steps. The standard multi task learning objective adopted in BERT is a special case of our learning algorithm where the depth of meta train is zero. We study the problem in two settings unsupervised pre training and supervised pre training with different pre training objects to verify the generality of our approach.Experimental results show that our algorithm brings improvements and learns better initializations for a variety of downstream tasks."} {"_id": [21], "label": "math.CO", "text": "The edge metric dimension of the generalized Petersen graph P(n,3) is 4. It is known that the problem of computing the edge dimension of a graph is NP hard, and that the edge dimension of any generalized Petersen graph P(n,k) is at least 3. We prove that the graph P(n,3) has edge dimension 4 for n ge 11 , by showing semi combinatorially the nonexistence of an edge resolving set of order 3 and by constructing explicitly an edge resolving set of order 4."} {"_id": [1, 2, 3], "label": "cs.AI cs.CL cs.LG", "text": "Enhancing Text based Reinforcement Learning Agents with Commonsense Knowledge. In this paper, we consider the recent trend of evaluating progress on reinforcement learning technology by using text based environments and games as evaluation environments. This reliance on text brings advances in natural language processing into the ambit of these agents, with a recurring thread being the use of external knowledge to mimic and better human level performance. We present one such instantiation of agents that use commonsense knowledge from ConceptNet to show promising performance on two text based environments."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "AlignShift Bridging the Gap of Imaging Thickness in 3D Anisotropic Volumes. This paper addresses a fundamental challenge in 3D medical image processing how to deal with imaging thickness. For anisotropic medical volumes, there is a significant performance gap between thin slice (mostly 1mm) and thick slice (mostly 5mm) volumes. Prior arts tend to use 3D approaches for the thin slice and 2D approaches for the thick slice, respectively. We aim at a unified approach for both thin and thick slice medical volumes. Inspired by recent advances in video analysis, we propose AlignShift, a novel parameter free operator to convert theoretically any 2D pretrained network into thickness aware 3D network. Remarkably, the converted networks behave like 3D for the thin slice, nevertheless degenerate to 2D for the thick slice adaptively. The unified thickness aware representation learning is achieved by shifting and fusing aligned \"virtual slices\" as per the input imaging thickness. Extensive experiments on public large scale DeepLesion benchmark, consisting of 32K lesions for universal lesion detection, validate the effectiveness of our method, which outperforms previous state of the art by considerable margins without whistles and bells. More importantly, to our knowledge, this is the first method that bridges the performance gap between thin and thick slice volumes by a unified framework. To improve research reproducibility, our code in PyTorch is open source at https github.com M3DV AlignShift."} {"_id": [50, 85], "label": "physics.med-ph physics.data-an", "text": "Robust diffusion parametric mapping of motion corrupted data with a three dimensional convolutional neural network. Head motion is inevitable in the acquisition of diffusion weighted images, especially for certain motion prone subjects and for data gathering of advanced diffusion models with prolonged scan times. Deficient accuracy of motion correction cause deterioration in the quality of diffusion model reconstruction, thus affecting the derived measures. This results in either loss of data, or introducing bias in outcomes from data of different motion levels, or both. Hence minimizing motion effects and reutilizing motion contaminated data becomes vital to quantitative studies. We have previously developed a 3 dimensional hierarchical convolution neural network (3D H CNN) for robust diffusion kurtosis mapping from under sampled data. In this study, we propose to extend this method to motion contaminated data for robust recovery of diffusion model derived measures with a process of motion assessment and corrupted volume rejection. We validate the proposed pipeline in two in vivo datasets. Results from the first dataset of individual subjects show that all the diffusion tensor and kurtosis tensor derived measures from the new pipeline are minimally sensitive to motion effects, and are comparable to the motion free reference with as few as eight volumes retained from the motion contaminated data. Results from the second dataset of a group of children with attention deficit hyperactivity disorder demonstrate the ability of our approach in ameliorating spurious group differences due to head motion. This method shows great potential for exploiting some valuable but motion corrupted DWI data which are likely to be discarded otherwise, and applying to data with different motion level thus improving their utilization and statistic power."} {"_id": [34, 46], "label": "math.AG math.CV", "text": "Betti structures of hypergeometric equations. We study Betti structures in the solution complexes of confluent hypergeometric equations. We use the framework of enhanced ind sheaves and the irregular Riemann Hilbert correspondence of D'Agnolo Kashiwara. The main result is a group theoretic criterion that ensures that enhanced solutions of such systems are defined over certain subfields of the complex numbers. The proof uses a description of the hypergeometric systems as exponentially twisted Gauss Manin systems of certain Laurent polynomials."} {"_id": [9], "label": "math.AP", "text": "Gaussian lower bounds for the Boltzmann equation without cut off. The study of positivity of solutions to the Boltzmann equation goes back to Carleman (1933), and the initial argument of Carleman was developed byPulvirenti Wennberg (1997), the second author and Briant (2015). The appearance of a lower bound with Gaussian decay had however remained an open question for long range interactions (the so called non cutoff collision kernels). We answer this question and establish such Gaussian lower bound for solutions to the Boltzmann equation without cutoff, in the case of hard and moderately soft potentials, with spatial periodic conditions, and under the sole assumption that hydrodynamic quantities (local mass, local energy and local entropy density) remain bounded. The paper is mostly self contained, apart from the uniform upper bound on the solution established by the third author (2016)."} {"_id": [18, 47], "label": "math.GT math.AT", "text": "Controlled surgery and mathbb L homology. This paper presents an alternative approach to controlled surgery obstructions. The obstruction for a degree one normal map (f,b) M n rightarrow X n with control map q X n rightarrow B to complete controlled surgery is an element sigma c (f, b) in H n (B, mathbb L ) , where M n, X n are topological manifolds of dimension n geq 5 . Our proof uses essentially the geometrically defined mathbb L spectrum as described by Nicas (going back to Quinn) and some well known homotopy theory. We also outline the construction of the algebraically defined obstruction, and we explicitly describe the assembly map H n (B, mathbb L ) rightarrow L n ( pi 1 (B)) in terms of forms in the case n equiv 0 (4) . Finally, we explicitly determine the canonical map H n (B, mathbb L ) rightarrow H n (B, L 0) ."} {"_id": [59], "label": "cs.SI", "text": "Finding Key Structures in MMORPG Graph with Hierarchical Graph Summarization. What are the key structures existing in a large real world MMORPG (Massively Multiplayer Online Role Playing Game) graph? How can we compactly summarize an MMORPG graph with hierarchical node labels, considering consistent substructures at different levels of hierarchy? Recent MMORPGs generate complex interactions between entities inducing a heterogeneous graph where each entity has hierarchical labels. Succinctly summarizing a heterogeneous MMORPG graph is crucial to better understand its structure however it is a challenging task since it needs to handle complex interactions and hierarchical labels efficiently. Although there exist few methods to summarize a large scale graph, they do not deal with heterogeneous graphs with hierarchical node labels. We propose GSHL, a novel method that summarizes a heterogeneous graph with hierarchical labels. We formulate the encoding cost of hierarchical labels using MDL (Minimum Description Length). GSHL exploits the formulation to identify and segment subgraphs, and discovers compact and consistent structures in the graph. Experiments on a large real world MMORPG graph with multi million edges show that GSHL is a useful and scalable tool for summarizing the graph, finding important and interesting structures in the graph, and finding similar users."} {"_id": [9], "label": "math.AP", "text": "Simultaneous inversion for the fractional exponents in the space time fractional diffusion equation partial t beta u big( Delta big) alpha 2 u big( Delta big) gamma 2 u . In this article, we consider the space time fractional (nonlocal) equation characterizing the so called \"double scale\" anomalous diffusion partial t beta u(t, x) ( Delta) alpha 2 u(t,x) ( Delta) gamma 2 u(t,x) t 0, 1 x 1, where partial t beta is the Caputo fractional derivative of order beta in (0,1) and 0 alpha leq gamma 2. We consider a nonlocal inverse problem and show that the fractional exponents beta , alpha and gamma are determined uniquely by the data u(t, 0) g(t), 0 t leq T. The existence of the solution for the inverse problem is proved using the quasi solution method which is based on minimizing an error functional between the output data and the additional data. In this context, an input output mapping is defined and its continuity is established. The uniqueness of the solution for the inverse problem is proved by means of eigenfunction expansion of the solution of the forward problem and some basic properties of fractional Laplacian. A numerical method based on discretization of the minimization problem, namely the steepest descent method and a least squares approach, is proposed for the solution of the inverse problem. The numerical method determines the fractional exponents simultaneously. Finally, numerical examples with noise free and noisy data illustrate applicability and high accuracy of the proposed method."} {"_id": [49, 42], "label": "math.OC math.DG", "text": "Optimization on flag manifolds. A flag is a sequence of nested subspaces. Flags are ubiquitous in numerical analysis, arising in finite elements, multigrid, spectral, and pseudospectral methods for numerical PDE they arise in the form of Krylov subspaces in matrix computations, and as multiresolution analysis in wavelets constructions. They are common in statistics too principal component, canonical correlation, and correspondence analyses may all be viewed as methods for extracting flags from a data set. The main goal of this article is to develop the tools needed for optimizing over a set of flags, which is a smooth manifold called the flag manifold, and it contains the Grassmannian as the simplest special case. We will derive closed form analytic expressions for various differential geometric objects required for Riemannian optimization algorithms on the flag manifold introducing various systems of extrinsic coordinates that allow us to parameterize points, metrics, tangent spaces, geodesics, distance, parallel transport, gradients, Hessians in terms of matrices and matrix operations and thereby permitting us to formulate steepest descent, conjugate gradient, and Newton algorithms on the flag manifold using only standard numerical linear algebra."} {"_id": [9], "label": "math.AP", "text": "Asymptotic self similarity in diffusion equations with nonconstant radial limits at infinity. We study the long time behavior of localized solutions to linear or semilinear parabolic equations in the whole space mathbb R n , where n ge 2 , assuming that the diffusion matrix depends on the space variable x and has a finite limit along any ray as x to infty . Under suitable smallness conditions in the nonlinear case, we prove convergence to a self similar solution whose profile is entirely determined by the asymptotic diffusion matrix. Examples are given which show that the profile can be a rather general Gaussian like function, and that the approach to the self similar solution can be arbitrarily slow depending on the continuity and coercivity properties of the asymptotic matrix. The proof of our results relies on appropriate energy estimates for the diffusion equation in self similar variables. The new ingredient consists in estimating not only the difference w between the solution and the self similar profile, but also an antiderivative W obtained by solving a linear elliptic problem which involves w as a source term. Hence, a good part of our analysis is devoted to the study of linear elliptic equations whose coefficients are homogeneous of degree zero."} {"_id": [21], "label": "math.CO", "text": "Hamiltonicity of random subgraphs of the hypercube. We study Hamiltonicity in random subgraphs of the hypercube mathcal Q n . Our first main theorem is an optimal hitting time result. Consider the random process which includes the edges of mathcal Q n according to a uniformly chosen random ordering. Then, with high probability, as soon as the graph produced by this process has minimum degree 2k , it contains k edge disjoint Hamilton cycles, for any fixed k in mathbb N . Secondly, we obtain a perturbation result if H subseteq mathcal Q n satisfies delta(H) geq alpha n with alpha 0 fixed and we consider a random binomial subgraph mathcal Q n p of mathcal Q n with p in(0,1 fixed, then with high probability H cup mathcal Q n p contains k edge disjoint Hamilton cycles, for any fixed k in mathbb N . In particular, both results resolve a long standing conjecture, posed e.g. by Bollob 'as, that the threshold probability for Hamiltonicity in the random binomial subgraph of the hypercube equals 1 2 . Our techniques also show that, with high probability, for all fixed p in(0,1 the graph mathcal Q n p contains an almost spanning cycle. Our methods involve branching processes, the R \"odl nibble, and absorption."} {"_id": [66, 20, 7], "label": "math.NA cs.CE cs.NA physics.comp-ph", "text": "Accelerating frequency domain numerical methods for weakly nonlinear focused ultrasound using nested meshes. The numerical simulation of weakly nonlinear ultrasound is important in treatment planning for focused ultrasound (FUS) therapies. However, the large domain sizes and generation of higher harmonics at the focus make these problems extremely computationally demanding. Numerical methods typically employ a uniform mesh fine enough to resolve the highest harmonic present in the problem, leading to a very large number of degrees of freedom. This paper proposes a more efficient strategy in which each harmonic is approximated on a separate mesh, the size of which is proportional to the wavelength of the harmonic. The increase in resolution required to resolve a smaller wavelength is balanced by a reduction in the domain size. This nested meshing is feasible owing to the increasingly localised nature of higher harmonics near the focus. Numerical experiments are performed for FUS transducers in homogeneous media in order to determine the size of the meshes required to accurately represent the harmonics. In particular, a fast emph volume potential approach is proposed and employed to perform convergence experiments as the computation domain size is modified. This approach allows each harmonic to be computed via the evaluation of an integral over the domain. Discretising this integral using the midpoint rule allows the computations to be performed rapidly with the FFT. It is shown that at least an order of magnitude reduction in memory consumption and computation time can be achieved with nested meshing. Finally, it is demonstrated how to generalise this approach to inhomogeneous propagation domains."} {"_id": [3], "label": "cs.CL", "text": "ConvBERT Improving BERT with Span based Dynamic Convolution. Pre trained language models like BERT and its variants have recently achieved impressive performance in various natural language understanding tasks. However, BERT heavily relies on the global self attention block and thus suffers large memory footprint and computation cost. Although all its attention heads query on the whole input sequence for generating the attention map from a global perspective, we observe some heads only need to learn local dependencies, which means the existence of computation redundancy. We therefore propose a novel span based dynamic convolution to replace these self attention heads to directly model local dependencies. The novel convolution heads, together with the rest self attention heads, form a new mixed attention block that is more efficient at both global and local context learning. We equip BERT with this mixed attention design and build a ConvBERT model. Experiments have shown that ConvBERT significantly outperforms BERT and its variants in various downstream tasks, with lower training cost and fewer model parameters. Remarkably, ConvBERTbase model achieves 86.4 GLUE score, 0.7 higher than ELECTRAbase, while using less than 1 4 training cost. Code and pre trained models will be released."} {"_id": [56, 37], "label": "cs.LO cs.FL", "text": "Logic and Rational Languages of Scattered and Countable Series Parallel Posets. Let A be an alphabet and SP diamond(A) denote the class of all countable N free partially ordered sets labeled by A , in which chains are scattered linear orderings and antichains are finite. We characterize the rational languages of SP diamond(A) by means of logic. We define an extension of monadic second order logic by Presburger arithmetic, named P MSO, such that a language L of SP diamond(A) is rational if and only if L is the language of a sentence of P MSO, with effective constructions from one formalism to the other. As a corollary, the P MSO theory of SP diamond(A) is decidable."} {"_id": [6, 7], "label": "physics.flu-dyn physics.comp-ph", "text": "Linear, nonlinear and transitional regimes of second mode instability. The 2D second mode is a potent instability in hypersonic boundary layers (HBLs). We study its linear and nonlinear evolution, followed by its role in transition and eventual breakdown of the HBL into a fully turbulent state. Linear stability theory (LST) is utilized to identify the second mode wave through FS synchronization, which is then recreated in linearly and nonlinearly forced 2D direct numerical simulations (DNSs). The nonlinear DNS shows saturation of the fundamental frequency, and the resulting superharmonics induce tightly braided rope like'' patterns near the generalized inflection point (GIP). The instability exhibits a second region of growth constituted by the fundamental frequency, downstream of the primary envelope, which is absent in the linear scenario. Subsequent 3D DNS identifies this region to be crucial in amplifying oblique instabilities riding on the 2D second mode rollers''. This results in lambda vortices below the GIP, which are detached from the rollers'' in the inner boundary layer. Streamwise vortex stretching results in a localized peak in length scales inside the HBL, eventually forming haripin vortices. Spectral analyses track the transformation of harmonic peaks into a turbulent spectrum, and appearance of oblique modes at the fundamental frequency, which suggests that fundamental resonance is the most dominant mechanism of transition. Bispectrum reveals coupled nonlinear interactions between the fundamental and its superharmonics leading to spectral broadening, and traces of subharmonic resonance as well."} {"_id": [42], "label": "math.DG", "text": "A note on isometric immersions and differential equations which describe pseudospherical surfaces. In this paper, we provide families of second order non linear partial differential equations, describing pseudospherical surfaces (pss equations), with the property of having local isometric immersions in E 3, with principal curvatures depending on finite order jets of solutions of the differential equation. These equations occupy a particularly special place amongst pss equations, since a series of recent papers 2, 7, 11, 12, 13 , on several classes of pss equations, seemed to suggest that only the sine Gordon equation had the above property. Explicit examples are given, which include the short pulse equation and some generalizations."} {"_id": [9, 42], "label": "math.AP math.DG", "text": "A singular Moser Trudinger inequality for mean value zero functions in dimension two. Let Omega subset mathbb R 2 be a smooth bounded domain with 0 in partial Omega . In this paper, we prove that for any beta in(0,1) , the supremum sup u in W 1,2 ( Omega), int Omega u dx 0, int Om nabla u 2dx leq1 int Omega frac e 2 pi(1 beta) u 2 x 2 beta dx is finite and can be attained. This partially generalizes a well known work of Alice Chang and Paul Yang cite CY88 who have obtained the inequality when beta 0 ."} {"_id": [2, 22], "label": "cs.SE cs.AI", "text": "Interpreting Cloud Computer Vision Pain Points A Mining Study of Stack Overflow. Intelligent services are becoming increasingly more pervasive application developers want to leverage the latest advances in areas such as computer vision to provide new services and products to users, and large technology firms enable this via RESTful APIs. While such APIs promise an easy to integrate on demand machine intelligence, their current design, documentation and developer interface hides much of the underlying machine learning techniques that power them. Such APIs look and feel like conventional APIs but abstract away data driven probabilistic behaviour the implications of a developer treating these APIs in the same way as other, traditional cloud services, such as cloud storage, is of concern. The objective of this study is to determine the various pain points developers face when implementing systems that rely on the most mature of these intelligent services, specifically those that provide computer vision. We use Stack Overflow to mine indications of the frustrations that developers appear to face when using computer vision services, classifying their questions against two recent classification taxonomies (documentation related and general questions). We find that, unlike mature fields like mobile development, there is a contrast in the types of questions asked by developers. These indicate a shallow understanding of the underlying technology that empower such systems. We discuss several implications of these findings via the lens of learning taxonomies to suggest how the software engineering community can improve these services and comment on the nature by which developers use them."} {"_id": [19], "label": "cs.CR", "text": "Puncturable Encryption A Generic Construction from Delegatable Fully Key Homomorphic Encryption. Puncturable encryption (PE), proposed by Green and Miers at IEEE S P 2015, is a kind of public key encryption that allows recipients to revoke individual messages by repeatedly updating decryption keys without communicating with senders. PE is an essential tool for constructing many interesting applications, such as asynchronous messaging systems, forward secret zero round trip time protocols, public key watermarking schemes and forward secret proxy re encryptions. This paper revisits PEs from the observation that the puncturing property can be implemented as efficiently computable functions. From this view, we propose a generic PE construction from the fully key homomorphic encryption, augmented with a key delegation mechanism (DFKHE) from Boneh et al. at Eurocrypt 2014. We show that our PE construction enjoys the selective security under chosen plaintext attacks (that can be converted into the adaptive security with some efficiency loss) from that of DFKHE in the standard model. Basing on the framework, we obtain the first post quantum secure PE instantiation that is based on the learning with errors problem, selective secure under chosen plaintext attacks (CPA) in the standard model. We also discuss about the ability of modification our framework to support the unbounded number of ciphertext tags inspired from the work of Brakerski and Vaikuntanathan at CRYPTO 2016."} {"_id": [0, 1, 14], "label": "cs.HC cs.CV cs.LG", "text": "OREBA A Dataset for Objectively Recognizing Eating Behaviour and Associated Intake. Automatic detection of intake gestures is a key element of automatic dietary monitoring. Several types of sensors, including inertial measurement units (IMU) and video cameras, have been used for this purpose. The common machine learning approaches make use of the labeled sensor data to automatically learn how to make detections. One characteristic, especially for deep learning models, is the need for large datasets. To meet this need, we collected the Objectively Recognizing Eating Behavior and Associated Intake (OREBA) dataset. The OREBA dataset aims to provide comprehensive multi sensor data recorded during the course of communal meals for researchers interested in intake gesture detection. Two scenarios are included, with 100 participants for a discrete dish and 102 participants for a shared dish, totalling 9069 intake gestures. Available sensor data consists of synchronized frontal video and IMU with accelerometer and gyroscope for both hands. We report the details of data collection and annotation, as well as details of sensor processing. The results of studies on IMU and video data involving deep learning models are reported to provide a baseline for future research. Specifically, the best baseline models achieve performances of F 1 0.853 for the discrete dish using video and F 1 0.852 for the shared dish using inertial data."} {"_id": [3], "label": "cs.CL", "text": "Knowledge Graph Augmented Abstractive Summarization with Semantic Driven Cloze Reward. Sequence to sequence models for abstractive summarization have been studied extensively, yet the generated summaries commonly suffer from fabricated content, and are often found to be near extractive. We argue that, to address these issues, the summarizer should acquire semantic interpretation over input, e.g., via structured representation, to allow the generation of more informative summaries. In this paper, we present ASGARD, a novel framework for Abstractive Summarization with Graph Augmentation and semantic driven RewarD. We propose the use of dual encoders a sequential document encoder and a graph structured encoder to maintain the global context and local characteristics of entities, complementing each other. We further design a reward based on a multiple choice cloze test to drive the model to better capture entity interactions. Results show that our models produce significantly higher ROUGE scores than a variant without knowledge graph as input on both New York Times and CNN Daily Mail datasets. We also obtain better or comparable performance compared to systems that are fine tuned from large pretrained language models. Human judges further rate our model outputs as more informative and containing fewer unfaithful errors."} {"_id": [19], "label": "cs.CR", "text": "SERENIoT Collaborative Network Security Policy Management and Enforcement for Smart Homes. Network traffic whitelisting has emerged as a dominant approach for securing consumer IoT devices. However, determining what the whitelisted behavior of an IoT device should be remains an open challenge. Proposals to date have relied on manufacturers and trusted parties to provide whitelists, but these proposals require manufacturer involvement or placing trust in an additional stakeholder. Alternatively, locally monitoring devices can allow building whitelists of observed behavior, but devices may not exhaust their functionality set during the observation period, or the behavior may change following a software update which requires re training. This paper proposes a blockchain based system for determining whether an IoT device is behaving like other devices of the same type. Our system (SERENIoT, pronounced Serenity) overcomes the challenge of initially determining the correct behavior for a device. Nodes in the SERENIoT public blockchain submit summaries of the network behavior observed for connected IoT devices and build whitelists of behavior observed by the majority of nodes. Changes in behavior through software updates are automatically whitelisted once the update is broadly deployed. Through a proof of concept implementation of SERENIoT on a small Raspberry Pi IoT network and a large scale Amazon EC2 simulation, we evaluate the security, scalability, and performance of our system."} {"_id": [0, 19], "label": "cs.CR cs.CV", "text": "VideoDP A Universal Platform for Video Analytics with Differential Privacy. Massive amounts of video data are ubiquitously generated in personal devices and dedicated video recording facilities. Analyzing such data would be extremely beneficial in real world (e.g., urban traffic analysis, pedestrian behavior analysis, video surveillance). However, videos contain considerable sensitive information, such as human faces, identities and activities. Most of the existing video sanitization techniques simply obfuscate the video by detecting and blurring the region of interests (e.g., faces, vehicle plates, locations and timestamps) without quantifying and bounding the privacy leakage in the sanitization. In this paper, to the best of our knowledge, we propose the first differentially private video analytics platform (VideoDP) which flexibly supports different video analyses with rigorous privacy guarantee. Different from traditional noise injection based differentially private mechanisms, given the input video, VideoDP randomly generates a utility driven private video in which adding or removing any sensitive visual element (e.g., human, object) does not significantly affect the output video. Then, different video analyses requested by untrusted video analysts can be flexibly performed over the utility driven video while ensuring differential privacy. Finally, we conduct experiments on real videos, and the experimental results demonstrate that our VideoDP effectively functions video analytics with good utility."} {"_id": [19], "label": "cs.CR", "text": "Atomic Crosschain Transactions for Ethereum Private Sidechains. Public blockchains such as Ethereum and Bitcoin do not give enterprises the privacy they need for many of their business processes. Consequently consortiums are exploring private blockchains to keep their membership and transactions private. Ethereum Private Sidechains is a private blockchain technology which allows many blockchains to be operated in parallel. Communication is needed between Ethereum Private Sidechains to allow a function in a contract on one sidechain to execute function calls which return values from, or update the state of, another sidechain. We propose a crosschain technique which allows transactions to be executed atomically across sidechains, introduce a new mechanism for proving values across sidechains, describe a transaction locking mechanism which works in the context of blockchain to enable atomic transactions, and a methodology for providing a global time out across sidechains. We outline the programming model to be used with this technology and provide as an example, a variable amount atomic swap contract for exchanging value between sidechains. Although this paper presents Atomic Crosschain Transaction technology in the context of Ethereum Private Sidechains, we discuss how this technology can be readily applied to many blockchain systems to provide cross blockchain transactions."} {"_id": [8], "label": "physics.optics", "text": "Quantum two photon emission in a photonic cavity. We derive a new expression for the two photon spontaneous emission (TPSE) rate of an excited quantum emitter in the presence of arbitrary bodies in its vicinities. After investigating the influence of a perfectly conducting plate on the TPSE spectral distribution (Purcell effect), we demonstrate the equivalence of our expression with the more usual formula written in terms of the corresponding dyadic Green's function. We establish a general and convenient relation between the TPSE spectral distribution and the corresponding Purcell factors of the system. Next, we consider an emitter close to a dielectric medium and show that, in the near field regime, the TPSE spectral distribution is substantially enhanced and changes abruptly at the resonance frequencies. Finally, motivated by the suppression that may occur in the one photon spontaneous emission of an excited atom between two parallel conducting plates, we discuss the TPSE for this same situation and show that complete suppression can never occur for s rightarrow s transitions."} {"_id": [3], "label": "cs.CL", "text": "Cloze driven Pretraining of Self attention Networks. We present a new approach for pretraining a bi directional transformer model that provides significant performance gains across a variety of language understanding problems. Our model solves a cloze style word reconstruction task, where each word is ablated and must be predicted given the rest of the text. Experiments demonstrate large performance gains on GLUE and new state of the art results on NER as well as constituency parsing benchmarks, consistent with the concurrently introduced BERT model. We also present a detailed analysis of a number of factors that contribute to effective pretraining, including data domain and size, model capacity, and variations on the cloze objective."} {"_id": [56, 52], "label": "cs.MA cs.LO", "text": "Tractable reasoning about Agent Programming in Dynamic Preference Logic. While several BDI logics have been proposed in the area of Agent Programming, it is not clear how these logics are connected to the agent programs they are supposed to specify. More yet, the reasoning problems in these logics, being based on modal logic, are not tractable in general, limiting their usage to tackle real world problems. In this work, we use of Dynamic Preference Logic to provide a semantic foundation to BDI agent programming languages and investigate tractable expressive fragments of this logic to reason about agent programs. With that, we aim to provide a way of implementing semantically grounded agent programming languages with tractable reasoning cycles."} {"_id": [25, 12], "label": "math.PR math.CA", "text": "On random Fourier Hermite transform. Motivated by the work of Z. Liu and S. Liu, we have introduced random Fourier Hermite transform sum n 0 infty c n A n( omega) lambda n phi n (t) , where c n are Fourier Hermite coefficient of a function f in L p ( infty, infty) , A n( omega) are specific type of random variables associated with symmetric stable process X(s, omega) of index gamma , frac 4 3 gamma leq 2 , lambda n are the eigen values of the conventional Fourier transform and phi n (t) are n th order normalized Hermite Gaussian function. It is shown that this series converges to a stochastic integral, whose existence is also proved . Random fractional Fourier transform sum n 0 infty c n A n( omega) lambda n alpha phi n (t) of rational order alpha is also introduced."} {"_id": [19], "label": "cs.CR", "text": "Side Channel Aware Fuzzing. Software testing is becoming a critical part of the development cycle of embedded devices, enabling vulnerability detection. A well studied approach of software testing is fuzz testing (fuzzing), during which mutated input is sent to an input processing software while its behavior is monitored. The goal is to identify faulty states in the program, triggered by malformed inputs. Even though this technique is widely performed, fuzzing cannot be applied to embedded devices to its full extent. Due to the lack of adequately powerful I O capabilities or an operating system the feedback needed for fuzzing cannot be acquired. In this paper we present and evaluate a new approach to extract feedback for fuzzing on embedded devices using information the power consumption leaks. Side channel aware fuzzing is a threefold process that is initiated by sending an input to a target device and measuring its power consumption. First, we extract features from the power traces of the target device using machine learning algorithms. Subsequently, we use the features to reconstruct the code structure of the analyzed firmware. In the final step we calculate a score for the input, which is proportional to the code coverage. We carry out our proof of concept by fuzzing synthetic software and a light weight AES implementation running on an ARM Cortex M4 microcontroller. Our results show that the power side channel carries information relevant for fuzzing."} {"_id": [49], "label": "math.OC", "text": "Fuller singularities for generic control affine systems with an even number of controls. In this article we study how bad can be the singularities of a time optimal trajectory of a generic control affine system. In the case where the control is scalar and belongs to a closed interval it was recently shown in 6 that singularities cannot be, generically, worse than finite order accumulations of Fuller points, with order of accumulation lower than a bound depending only on the dimension of the manifold where the system is set. We extend here such a result to the case where the control has an even number of scalar components and belongs to a closed ball."} {"_id": [0], "label": "cs.CV", "text": "Graph Neural Networks for UnsupervisedDomain Adaptation of Histopathological ImageAnalytics. Annotating histopathological images is a time consuming andlabor intensive process, which requires broad certificated pathologistscarefully examining large scale whole slide images from cells to tissues.Recent frontiers of transfer learning techniques have been widely investi gated for image understanding tasks with limited annotations. However,when applied for the analytics of histology images, few of them can effec tively avoid the performance degradation caused by the domain discrep ancy between the source training dataset and the target dataset, suchas different tissues, staining appearances, and imaging devices. To thisend, we present a novel method for the unsupervised domain adaptationin histopathological image analysis, based on a backbone for embeddinginput images into a feature space, and a graph neural layer for propa gating the supervision signals of images with labels. The graph model isset up by connecting every image with its close neighbors in the embed ded feature space. Then graph neural network is employed to synthesizenew feature representation from every image. During the training stage,target samples with confident inferences are dynamically allocated withpseudo labels. The cross entropy loss function is used to constrain thepredictions of source samples with manually marked labels and targetsamples with pseudo labels. Furthermore, the maximum mean diversityis adopted to facilitate the extraction of domain invariant feature repre sentations, and contrastive learning is exploited to enhance the categorydiscrimination of learned features. In experiments of the unsupervised do main adaptation for histopathological image classification, our methodachieves state of the art performance on four public datasets"} {"_id": [35, 15], "label": "cs.IT math.IT math.RA", "text": "Primitive Idempotents and Constacyclic Codes over Finite Chain Rings. Let R be a commutative local finite ring. In this paper, we construct the complete set of pairwise orthogonal primitive idempotents of R X g where g is a regular polynomial in R X . We use this set to decompose the ring R X g and to give the structure of constacyclic codes over finite chain rings. This allows us to describe generators of the dual code mathcal C bot of a constacyclic code mathcal C and to characterize non trivial self dual constacyclic codes over finite chain rings."} {"_id": [38], "label": "math.NT", "text": "A note on prime number races and zero free regions for L functions. Let chi be a real and non principal Dirichlet character, L(s, chi) its Dirichlet L function and let p be a generic prime number. We prove the following result If for some 0 leq sigma 1 the partial sums sum p leq x chi(p)p sigma change sign only for a finite number of x , then there exists epsilon 0 such that L(s, chi) has no zeros in the half plane Re(s) 1 epsilon ."} {"_id": [0], "label": "cs.CV", "text": "Hausdorff Point Convolution with Geometric Priors. Without a shape aware response, it is hard to characterize the 3D geometry of a point cloud efficiently with a compact set of kernels. In this paper, we advocate the use of Hausdorff distance as a shape aware distance measure for calculating point convolutional responses. The technique we present, coined Hausdorff Point Convolution (HPC), is shape aware. We show that HPC constitutes a powerful point feature learning with a rather compact set of only four types of geometric priors as kernels. We further develop a HPC based deep neural network (HPC DNN). Task specific learning can be achieved by tuning the network weights for combining the shortest distances between input and kernel point sets. We also realize hierarchical feature learning by designing a multi kernel HPC for multi scale feature encoding. Extensive experiments demonstrate that HPC DNN outperforms strong point convolution baselines (e.g., KPConv), achieving 2.8 mIoU performance boost on S3DIS and 1.5 on SemanticKITTI for semantic segmentation task."} {"_id": [32], "label": "cs.DS", "text": "Low rank binary matrix approximation in column sum norm. We consider ell 1 Rank r Approximation over GF(2), where for a binary m times n matrix bf A and a positive integer r , one seeks a binary matrix bf B of rank at most r , minimizing the column sum norm bf A bf B 1 . We show that for every varepsilon in (0, 1) , there is a randomized (1 varepsilon) approximation algorithm for ell 1 Rank r Approximation over GF(2) of running time m O(1) n O(2 4r cdot varepsilon 4 ) . This is the first polynomial time approximation scheme (PTAS) for this problem."} {"_id": [17, 19, 1], "label": "cs.CR cs.DC cs.LG", "text": "Federated Learning in Adversarial Settings. Federated Learning enables entities to collaboratively learn a shared prediction model while keeping their training data locally. It prevents data collection and aggregation and, therefore, mitigates the associated privacy risks. However, it still remains vulnerable to various security attacks where malicious participants aim at degrading the generated model, inserting backdoors, or inferring other participants' training data. This paper presents a new federated learning scheme that provides different trade offs between robustness, privacy, bandwidth efficiency, and model accuracy. Our scheme uses biased quantization of model updates and hence is bandwidth efficient. It is also robust against state of the art backdoor as well as model degradation attacks even when a large proportion of the participant nodes are malicious. We propose a practical differentially private extension of this scheme which protects the whole dataset of participating entities. We show that this extension performs as efficiently as the non private but robust scheme, even with stringent privacy requirements but are less robust against model degradation and backdoor attacks. This suggests a possible fundamental trade off between Differential Privacy and robustness."} {"_id": [2, 4], "label": "cs.NE cs.AI", "text": "Evolving Self supervised Neural Networks Autonomous Intelligence from Evolved Self teaching. This paper presents a technique called evolving self supervised neural networks neural networks that can teach themselves, intrinsically motivated, without external supervision or reward. The proposed method presents some sort of paradigm shift, and differs greatly from both traditional gradient based learning and evolutionary algorithms in that it combines the metaphor of evolution and learning, more specifically self learning, together, rather than treating these phenomena alternatively. I simulate a multi agent system in which neural networks are used to control autonomous foraging agents with little domain knowledge. Experimental results show that only evolved self supervised agents can demonstrate some sort of intelligent behaviour, but not evolution or self learning alone. Indications for future work on evolving intelligence are also presented."} {"_id": [32], "label": "cs.DS", "text": "An Asymptotic Lower Bound for Online Vector Bin Packing. We consider the online vector bin packing problem where n items specified by d dimensional vectors must be packed in the fewest number of identical d dimensional bins. Azar et al. (STOC'13) showed that for any online algorithm A , there exist instances I, such that A(I) , the number of bins used by A to pack I , is Omega(d log 2 d) times OPT(I) , the minimal number of bins to pack I . However in those instances, OPT(I) was only O( log d) , which left open the possibility of improved algorithms with better asymptotic competitive ratio when OPT(I) gg d . We rule this out by showing that for any arbitrary function q( cdot) and any randomized online algorithm A , there exist instances I such that E A(I) geq c cdot d log 3d cdot OPT(I) q(d) , for some universal constant c ."} {"_id": [32], "label": "cs.DS", "text": "Breaking the 2 n barrier for 5 coloring and 6 coloring. The coloring problem (i.e., computing the chromatic number of a graph) can be solved in O (2 n) time, as shown by Bj \"orklund, Husfeldt and Koivisto in 2009. For k 3,4 , better algorithms are known for the k coloring problem. 3 coloring can be solved in O(1.33 n) time (Beigel and Eppstein, 2005) and 4 coloring can be solved in O(1.73 n) time (Fomin, Gaspers and Saurabh, 2007). Surprisingly, for k 4 no improvements over the general O (2 n) are known. We show that both 5 coloring and 6 coloring can also be solved in O left( left(2 varepsilon right) n right) time for some varepsilon 0 . As a crucial step, we obtain an exponential improvement for computing the chromatic number of a very large family of graphs. In particular, for any constants Delta, alpha 0 , the chromatic number of graphs with at least alpha cdot n vertices of degree at most Delta can be computed in O left( left(2 varepsilon right) n right) time, for some varepsilon varepsilon Delta, alpha 0 . This statement generalizes previous results for bounded degree graphs (Bj \"orklund, Husfeldt, Kaski, and Koivisto, 2010) and graphs with bounded average degree (Golovnev, Kulikov and Mihajilin, 2016). We generalize the aforementioned statement to List Coloring, for which no previous improvements are known even for the case bounded degree graphs."} {"_id": [17], "label": "cs.DC", "text": "Crisis Probabilistically Self Organizing Total Order in Unstructured P2P Networks. A framework for asynchronous, signature free, fully local and probabilistically converging total order algorithms is developed, that may survive in high entropy, unstructured Peer to Peer networks with near optimal communication efficiency. Regarding the natural boundaries of the CAP theorem, Crisis chooses different compromises for consistency and availability, depending on the severity of the attack. The family is parameterized by a few constants and external functions called voting weight, incentivation punishement, difficulty oracle and quorum selector. These functions are necessary to fine tune the dynamics and very different long term behavior might appear, depending on any actual choice."} {"_id": [10, 6], "label": "physics.ao-ph physics.flu-dyn", "text": "Modeling the impact of dilution on the microbial degradation time of dispersed oil in marine environments. Dispersants aid the breakup of crude oil masses and increase the available interfacial surface area for bacteria to degrade insoluble hydrocarbons in the marine environment. However, this common view neglects key aspects of the microscale interactions between bacteria and oil droplets, particularly the encounters between these elements that are required for degradation to occur. This chapter discusses a biophysical model for hydrocarbon consumption of suspended oil droplets under conditions of rapid dilution that occur in natural environments. Based on the model, which includes typical biological growth parameters, dilution is found to produce an effective delay in the onset of biodegradation by approximately a week. The steady and rapid reduction in oil concertation, due to dilution, is found to outpace the production of oil degrading bacteria that result from colonization of degrading oil droplets, maintaining the process in an encounter limited state. This mechanistic model provides a baseline for better understanding of microscale biodegradation in dilute oil environments and can help inform the design of mitigation strategies in marine systems."} {"_id": [50], "label": "physics.med-ph", "text": "Improving MRI's slice selectivity in the presence of strong, metal derived inhomogeneities. Purpose To develop schemes that deliver faithful 2D slices near field heterogeneities of the kind arising from non ferromagnetic metal implants, with reduced artifacts and shorter scan times. Methods An excitation scheme relying on cross term spatio temporal encoding (xSPEN) was used as basis for developing the new inhomogeneity insensitive, slice selective pulse scheme. The resulting Fully refOCUSED cross term SPatiotemporal ENcoding (FOCUSED xSPEN) approach involved four adiabatic sweeps. The method was evaluated in silico, in vitro and in vivo using mice models, and compared against a number of existing and of novel alternatives based on both conventional and swept RF pulses, including an analogous method based on LASER's selectivity spatial selectivity. Results Calculations and experiments confirmed that multi sweep derivatives of xSPEN and LASER can deliver localized excitation profiles, centered at the intended positions and endowed with enhanced immunity to B0 and B1 distortions. This, however, is achieved at the expense of higher SAR than non swept counterparts. Furthermore, single shot FOCUSED xSPEN and LASER profiles covered limited off resonance ranges. This could be extended to bands covering arbitrary off resonance values with uniform slice widths, by looping the experiments over a number of scans possessing suitable transmission and reception offsets. Conclusions A series of novel approaches were introduced to select slices near metals, delivering robustness against Bo and B1 field inhomogeneities."} {"_id": [9], "label": "math.AP", "text": "Efficient invariant energy quadratization and scalar auxiliary variable approaches without bounded below restriction for phase field models. Recently introduced invariant energy quadratization (IEQ) and scalar auxiliary variable (SAV) approaches have proven to be very powerful ways to construct energy stable schemes for phase field models. Both methods require an assumption which the energy potential or energy is bounded from below. Under this assumption, a positive constant C need to be added to keep the square root reasonable. However, it seems that it maybe more reasonable in both physics and mathematics if the energy potential or energy is arbitrary. Furthermore, if the bounded value from below is not obvious exactly, we are not easy to give a proper constant C before calculation. In this paper, by adding a positive preserving function ( M( phi) in IEQ and E 0( phi) in SAV ) instead of the positive constant in square root, we can improve this situation. The main contribution of this article is we proved that the positive preserving function can always be found for polynomial type F( phi) . We also proved the unconditional energy stability for all semi discrete schemes carefully and rigorously. A comparative study of classical IEQ, SAV, MIEQ and MSAV approaches is considered to show the accuracy and efficiency. Finally, we present various 2D numerical simulations to demonstrate the stability and"} {"_id": [12], "label": "math.CA", "text": "On some analytic properties of tempered fractional calculus. We consider the integral and derivative operators of tempered fractional calculus, and examine their analytic properties. We discover connections with the classical Riemann Liouville fractional calculus and demonstrate how the operators may be used to obtain special functions such as hypergeometric and Appell's functions. We also prove an analogue of Taylor's theorem and some integral inequalities to enrich the mathematical theory of tempered fractional calculus."} {"_id": [0], "label": "cs.CV", "text": "Fast Color Constancy with Patch wise Bright Pixels. In this paper, a learning free color constancy algorithm called the Patch wise Bright Pixels (PBP) is proposed. In this algorithm, an input image is first downsampled and then cut equally into a few patches. After that, according to the modified brightness of each patch, a proper fraction of brightest pixels in the patch is selected. Finally, Gray World (GW) based methods are applied to the selected bright pixels to estimate the illuminant of the scene. Experiments on NUS 8 Camera Dataset show that the PBP algorithm outperforms the state of the art learning free methods as well as a broad range of learning based ones. In particular, PBP processes a 1080 p image within two milliseconds, which is hundreds of times faster than the existing learning free ones. Our algorithm offers a potential solution to the full screen smart phones whose screen to body ratio is 100 ."} {"_id": [11], "label": "physics.app-ph", "text": "Realistic non local refrigeration engine based on Coulomb coupled systems. Employing Coulomb coupled systems, we demonstrate a cryogenic non local refrigeration engine, that circumvents the need for a change in the energy resolved system to reservoir coupling, demanded by the recently proposed non local refrigerators. We demonstrate that an intentionally introduced energy difference between the ground states of adjacent tunnel coupled quantum dots, associated with Coulomb coupling, is sufficient to extract heat from a remote target reservoir. Investigating the performance and operating regime using quantum master equation (QME) approach, we point out to some crucial aspects of the proposed refrigeration engine. In particular, we demonstrate that the maximum cooling power for the proposed set up is limited to about 70 of the optimal design. Proceeding further, we point out that to achieve a target reservoir temperature, lower compared to the average temperature of the current path, the applied voltage must be greater than a given threshold voltage V TH , that increases with decrease in the target reservoir temperature. In addition, we demonstrate that the maximum cooling power, as well as the coefficient of performance deteriorates as one approaches a lower target reservoir temperature. The novelty of the proposed refrigeration engine is the integration of fabrication simplicity along with descent cooling power. The idea proposed in this paper may pave the way towards the realization of efficient non local cryogenic refrigeration systems."} {"_id": [56], "label": "cs.LO", "text": "Combining nondeterminism, probability, and termination equational and metric reasoning. We study monads resulting from the combination of nondeterministic and probabilistic behaviour with the possibility of termination, which is essential in program semantics. Our main contributions are presentation results for the monads, providing equational reasoning tools for establishing equivalences and distances of programs."} {"_id": [25, 23], "label": "math.FA math.PR", "text": "One class of continuous functions related to Engel series and having complicated local properties. We construct and study the class of continuous on 0, 1 functions with continuum set of peculiarities (singular, nowhere monotonic, and non differentiable functions are among them). The representative of this class is the function defined by the Engel representation of argument and some convergent real series. We study local and global properties of this function structural, extremal, differential, integral, and fractal properties."} {"_id": [9], "label": "math.AP", "text": "The Weyl law of transmission eigenvalues and the completeness of generalized transmission eigenfunctions. The transmission problem is a system of two second order elliptic equations of two unknowns equipped with the Cauchy data on the boundary. After four decades of research motivated by scattering theory, the spectral properties of this problem are now known to depend on a type of contrast between coefficients near the boundary. Previously, we established the discreteness of eigenvalues for a large class of anisotropic coefficients which is related to the celebrated complementing conditions due to Agmon, Douglis, and Nirenberg. In this work, we establish the Weyl law for the eigenvalues and the completeness of the generalized eigenfunctions for this class of coefficients under an additional mild assumption on the continuity of the coefficients. The analysis is new and based on the L p regularity theory for the transmission problem established here. It also involves a subtle application of the spectral theory for the Hilbert Schmidt operators. Our work extends largely known results in the literature which are mainly devoted to the isotropic case with C infty coefficients."} {"_id": [2, 39], "label": "cs.CY cs.AI", "text": "Antitrust and Artificial Intelligence (AAI) Antitrust Vigilance Lifecycle and AI Legal Reasoning Autonomy. There is an increasing interest in the entwining of the field of antitrust with the field of Artificial Intelligence (AI), frequently referred to jointly as Antitrust and AI (AAI) in the research literature. This study focuses on the synergies entangling antitrust and AI, doing so to extend the literature by proffering the primary ways that these two fields intersect, consisting of (1) the application of antitrust to AI, and (2) the application of AI to antitrust. To date, most of the existing research on this intermixing has concentrated on the former, namely the application of antitrust to AI, entailing how the marketplace will be altered by the advent of AI and the potential for adverse antitrust behaviors arising accordingly. Opting to explore more deeply the other side of this coin, this research closely examines the application of AI to antitrust and establishes an antitrust vigilance lifecycle to which AI is predicted to be substantively infused for purposes of enabling and bolstering antitrust detection, enforcement, and post enforcement monitoring. Furthermore, a gradual and incremental injection of AI into antitrust vigilance is anticipated to occur as significant advances emerge amidst the Levels of Autonomy (LoA) for AI Legal Reasoning (AILR)."} {"_id": [5], "label": "physics.plasm-ph", "text": "Transition from no ELM response to pellet ELM triggering during pedestal build up insights from extended MHD simulations. Pellet ELM triggering is a well established scheme for decreasing the time between two successive ELM crashes below its natural value. Reliable ELM pacing has been demonstrated experimentally in several devices increasing the ELM frequency considerably. However, it was also shown that the frequency cannot be increased arbitrarily due to a so called lag time. During this time after a preceding natural or triggered ELM crash, neither a natural ELM crash occurs nor the triggering of an ELM crash by pellet injection is possible. For this article, pellet ELM triggering simulations are advanced beyond previous studies in two ways. Firstly, realistic ExB and diamagnetic background flows are included. And secondly, the pellet is injected at different stages of the pedestal build up. This allows to recover the lag time for the first time in simulations and investigate it in detail. A series of non linear extended MHD simulations is performed to investigate the plasma dynamics resulting from an injection at different time points during the pedestal build up. The experimentally observed lag time is qualitatively reproduced well. In particular, a sharp transition is observed between the regime where no ELMs can be triggered and the regime where pellet injection causes an ELM crash. Via variations of pellet parameters and injection time, the two regimes are studied and compared in detail revealing pronounced differences in the non linear dynamics. The toroidal mode spectrum is significantly broader when an ELM crash is triggered enhancing the stochasticity and therefore also the losses of thermal energy along magnetic field lines. In the heat fluxes to the divertor targets, pronounced toroidal asymmetries are observed. In case of high injection velocities leading to deep penetration, also the excitation of core modes like the 2 1 neoclassical tearing mode is observed."} {"_id": [22], "label": "cs.SE", "text": "Efficiently Finding Higher Order Mutants. Higher order mutation has the potential for improving major drawbacks of traditional first order mutation, such as by simulating more realistic faults or improving test optimization techniques. Despite interest in studying promising higher order mutants, such mutants are difficult to find due to the exponential search space of mutation combinations. State of the art approaches rely on genetic search, which is often incomplete and expensive due to its stochastic nature. First, we propose a novel way of finding a complete set of higher order mutants by using variational execution, a technique that can, in many cases, explore large search spaces completely and often efficiently. Second, we use the identified complete set of higher order mutants to study their characteristics. Finally, we use the identified characteristics to design and evaluate a new search strategy, independent of variational execution, that is highly effective at finding higher order mutants even in large code bases."} {"_id": [1], "label": "cs.LG", "text": "SCC an efficient deep reinforcement learning agent mastering the game of StarCraft II. AlphaStar, the AI that reaches GrandMaster level in StarCraft II, is a remarkable milestone demonstrating what deep reinforcement learning can achieve in complex Real Time Strategy (RTS) games. However, the complexities of the game, algorithms and systems, and especially the tremendous amount of computation needed are big obstacles for the community to conduct further research in this direction. We propose a deep reinforcement learning agent, StarCraft Commander (SCC). With order of magnitude less computation, it demonstrates top human performance defeating GrandMaster players in test matches and top professional players in a live event. Moreover, it shows strong robustness to various human strategies and discovers novel strategies unseen from human plays. In this paper, we will share the key insights and optimizations on efficient imitation learning and reinforcement learning for StarCraft II full game."} {"_id": [16, 50], "label": "physics.med-ph q-bio.QM", "text": "Influence of Rotator Cuff Integrity on Loading and Kinematics Before and After Reverse Shoulder Arthroplasty. Reverse Shoulder Arthroplasty (RSA) has become a very common procedure for shoulder joint replacement, even for scenarios where an anatomical reconstruction would traditionally be used. In this study, we investigate joint reaction forces and scapular kinematics for rotator cuff tears of different tendons with and without a reverse prosthesis. Available motion capture data during anterior flexion was input to a finite element musculoskeletal shoulder model, and muscle activations were computed using inverse dynamics. The model was validated with respect to in vivo glenohumeral joint reaction force (JRF) measurements, and also compared to existing clinical and biomechanical data. Simulations were carried out for the intact joint as well as for various tendons involved in a rotator cuff tear superior (supraspinatus), superior anterior (supraspinatus and subscapularis), and superior posterior (supraspinatus, infraspinatus and teres minor). Each rotator cuff tear condition was repeated after shifting the humerus and the glenohumeral joint center of rotation to simulate the effect of a reverse prosthesis. Changes in compressive, shear, and total JRF were analysed, along with scapular upward rotation. The model compared favourably to in vivo measurements, and existing clinical and biomechanical knowledge. Simulated JRF lie in the ranges of in vivo JRF measurements and shows a linear increase past 90 degree flexion. Implanting a reverse prosthesis with a functional rotator cuff or with an isolated supraspinatus tear led to over 2 times higher compressive force component than with massive rotator cuff tears (superior anterior or superior posterior). Such higher compression forces might increase the risk of wear and implant fracture."} {"_id": [0], "label": "cs.CV", "text": "Face Frontalization Based on Robustly Fitting a Deformable Shape Model to 3D Landmarks. Face frontalization consists of synthesizing a frontally viewed face from an arbitrarily viewed one. The main contribution of this paper is a robust face alignment method that enables pixel to pixel warping. The method simultaneously estimates the rigid transformation (scale, rotation, and translation) and the non rigid deformation between two 3D point sets a set of 3D landmarks extracted from an arbitrary viewed face, and a set of 3D landmarks parameterized by a frontally viewed deformable face model. An important merit of the proposed method is its ability to deal both with noise (small perturbations) and with outliers (large errors). We propose to model inliers and outliers with the generalized Student's t probability distribution function, a heavy tailed distribution that is immune to non Gaussian errors in the data. We describe in detail the associated expectation maximization (EM) algorithm that alternates between the estimation of (i) the rigid parameters, (ii) the deformation parameters, and (iii) the Student t distribution parameters. We also propose to use the zero mean normalized cross correlation, between a frontalized face and the corresponding ground truth frontally viewed face, to evaluate the performance of frontalization. To this end, we use a dataset that contains pairs of profile viewed and frontally viewed faces. This evaluation, based on direct image to image comparison, stands in contrast with indirect evaluation, based on analyzing the effect of frontalization on face recognition."} {"_id": [78, 21, 46], "label": "math.AG math.AC math.CO", "text": "The matroid stratification of the Hilbert scheme of points on P 1. Given a homogeneous ideal I in a polynomial ring over a field, one may record, for each degree d and for each polynomial f in I d , the set of monomials in f with nonzero coefficients. These data collectively form the tropicalization of I . Tropicalizing ideals induces a \"matroid stratification\" on any (multigraded) Hilbert scheme. Very little is known about the structure of these stratifications. In this paper, we explore many examples of matroid strata, including some with interesting combinatorial structure, and give a convenient way of visualizing them. We show that the matroid stratification in the Hilbert scheme of points ( mathbb P 1) k is generated by all Schur polynomials in k variables. We end with an application to the T graph problem of ( mathbb A 2) n classifying this graph is a longstanding open problem, and we establish the existence of an infinite class of edges."} {"_id": [25, 12], "label": "math.CA math.PR", "text": "Real zeros of random trigonometric polynomials with pairwise equal blocks of coefficients. It is well known that the expected number of real zeros of a random cosine polynomial V n(x) sum j 0 n a j cos (j x) , x in (0,2 pi) , with the a j being standard Gaussian i.i.d. random variables is asymptotically 2n sqrt 3 . On the other hand, some of the previous works on the random cosine polynomials with dependent coefficients show that such polynomials have at least 2n sqrt 3 expected real zeros lying in one period. In this paper we investigate two classes of random cosine polynomials with pairwise equal blocks of coefficients. First, we prove that a random cosine polynomial with the blocks of coefficients being of a fixed length and satisfying A 2j A 2j 1 possesses the same expected real zeros as the classical case. Afterwards, we study a case containing only two equal blocks of coefficients, and show that in this case significantly more real zeros should be expected compared to those of the classical case."} {"_id": [15], "label": "cs.IT math.IT", "text": "The Courtade Kumar Most Informative Boolean Function Conjecture and a Symmetrized Li M 'edard Conjecture are Equivalent. We consider the Courtade Kumar most informative Boolean function conjecture for balanced functions, as well as a conjecture by Li and M 'edard that dictatorship functions also maximize the L alpha norm of T pf for 1 leq alpha leq2 where T p is the noise operator and f is a balanced Boolean function. By using a result due to Laguerre from the 1880's, we are able to bound how many times an L alpha norm related quantity can cross zero as a function of alpha , and show that these two conjectures are essentially equivalent."} {"_id": [1], "label": "cs.LG", "text": "SHOT VAE Semi supervised Deep Generative Models With Label aware ELBO Approximations. Semi supervised variational autoencoders (VAEs) have obtained strong results, but have also encountered the challenge that good ELBO values do not always imply accurate inference results. In this paper, we investigate and propose two causes of this problem (1) The ELBO objective cannot utilize the label information directly. (2) A bottleneck value exists and continuing to optimize ELBO after this value will not improve inference accuracy. On the basis of the experiment results, we propose SHOT VAE to address these problems without introducing additional prior knowledge. The SHOT VAE offers two contributions (1) A new ELBO approximation named smooth ELBO that integrates the label predictive loss into ELBO. (2) An approximation based on optimal interpolation that breaks the ELBO value bottleneck by reducing the margin between ELBO and the data likelihood. The SHOT VAE achieves good performance with a 25.30 error rate on CIFAR 100 with 10k labels and reduces the error rate to 6.11 on CIFAR 10 with 4k labels."} {"_id": [0], "label": "cs.CV", "text": "A Hybrid Framework for Matching Printing Design Files to Product Photos. We propose a real time image matching framework, which is hybrid in the sense that it uses both hand crafted features and deep features obtained from a well tuned deep convolutional network. The matching problem, which we concentrate on, is specific to a certain application, that is, printing design to product photo matching. Printing designs are any kind of template image files, created using a design tool, thus are perfect image signals. However, photographs of a printed product suffer many unwanted effects, such as uncontrolled shooting angle, uncontrolled illumination, occlusions, printing deficiencies in color, camera noise, optic blur, et cetera. For this purpose, we create an image set that includes printing design and corresponding product photo pairs with collaboration of an actual printing facility. Using this image set, we benchmark various hand crafted and deep features for matching performance and propose a framework in which deep learning is utilized with highest contribution, but without disabling real time operation using an ordinary desktop computer."} {"_id": [59, 21, 39], "label": "cs.SI cs.CY math.CO", "text": "Mathematics of Nested Districts The Case of Alaska. In eight states, a \"nesting rule\" requires that each state Senate district be exactly composed of two adjacent state House districts. In this paper we investigate the potential impacts of these nesting rules with a focus on Alaska, where Republicans have a 2 3 majority in the Senate while a Democratic led coalition controls the House. Treating the current House plan as fixed and considering all possible pairings, we find that the choice of pairings alone can create a swing of 4 5 seats out of 20 against recent voting patterns, which is similar to the range observed when using a Markov chain procedure to generate plans without the nesting constraint. The analysis enables other insights into Alaska districting, including the partisan latitude available to districters with and without strong rules about nesting and contiguity."} {"_id": [1, 15], "label": "cs.IT cs.LG math.IT", "text": "R ' e nyi Entropy Bounds on the Active Learning Cost Performance Tradeoff. Semi supervised classification, one of the most prominent fields in machine learning, studies how to combine the statistical knowledge of the often abundant unlabeled data with the often limited labeled data in order to maximize overall classification accuracy. In this context, the process of actively choosing the data to be labeled is referred to as active learning. In this paper, we initiate the non asymptotic analysis of the optimal policy for semi supervised classification with actively obtained labeled data. Considering a general Bayesian classification model, we provide the first characterization of the jointly optimal active learning and semi supervised classification policy, in terms of the cost performance tradeoff driven by the label query budget (number of data items to be labeled) and overall classification accuracy. Leveraging recent results on the R 'enyi Entropy, we derive tight information theoretic bounds on such active learning cost performance tradeoff."} {"_id": [60], "label": "cs.AR", "text": "Instructional Level Parallelism. This paper is a review of the developments in Instruction level parallelism. It takes into account all the changes made in speeding up the execution. The various drawbacks and dependencies due to pipelining are discussed and various solutions to overcome them are also incorporated. It goes ahead in the last section to explain where is the new research leading us."} {"_id": [0, 1, 2], "label": "cs.CV cs.AI cs.LG", "text": "Learning Loss for Test Time Augmentation. Data augmentation has been actively studied for robust neural networks. Most of the recent data augmentation methods focus on augmenting datasets during the training phase. At the testing phase, simple transformations are still widely used for test time augmentation. This paper proposes a novel instance level test time augmentation that efficiently selects suitable transformations for a test input. Our proposed method involves an auxiliary module to predict the loss of each possible transformation given the input. Then, the transformations having lower predicted losses are applied to the input. The network obtains the results by averaging the prediction results of augmented inputs. Experimental results on several image classification benchmarks show that the proposed instance aware test time augmentation improves the model's robustness against various corruptions."} {"_id": [2], "label": "cs.AI", "text": "TripMD Driving patterns investigation via Motif Analysis. Processing driving data and investigating driving behavior has been receiving an increasing interest in the last decades, with applications ranging from car insurance pricing to policy making. A common strategy to analyze driving behavior is to study the maneuvers being performance by the driver. In this paper, we propose TripMD, a system that extracts the most relevant driving patterns from sensor recordings (such as acceleration) and provides a visualization that allows for an easy investigation. Additionally, we test our system using the UAH DriveSet dataset, a publicly available naturalistic driving dataset. We show that (1) our system can extract a rich number of driving patterns from a single driver that are meaningful to understand driving behaviors and (2) our system can be used to identify the driving behavior of an unknown driver from a set of drivers whose behavior we know."} {"_id": [9], "label": "math.AP", "text": "A singularity as a break point for the multiplicity of solutions to quasilinear elliptic problems. We study a boundary value elliptic problem having a lower order nonlinear term with subquadratic growth in the gradient of the solution and possibly singular when the solution vanishes. If the singularity is mild enough (and even in the absence of the singularity), we prove an existence and multiplicity result. On the contrary, we prove an existence and uniqueness result for strong singularities."} {"_id": [1, 19], "label": "cs.CR cs.LG", "text": "Privacy Enhancing Context Authentication from Location Sensitive Data. This paper proposes a new privacy enhancing, context aware user authentication system, ConSec, which uses a transformation of general location sensitive data, such as GPS location, barometric altitude and noise levels, collected from the user's device, into a representation based on locality sensitive hashing (LSH). The resulting hashes provide a dimensionality reduction of the underlying data, which we leverage to model users' behaviour for authentication using machine learning. We present how ConSec supports learning from categorical and numerical data, while addressing a number of on device and network based threats. ConSec is implemented subsequently for the Android platform and evaluated using data collected from 35 users, which is followed by a security and privacy analysis. We demonstrate that LSH presents a useful approach for context authentication from location sensitive data without directly utilising plain measurements."} {"_id": [21], "label": "math.CO", "text": "Isomorphic Bisections of Cubic Graphs. Graph partitioning, or the dividing of a graph into two or more parts based on certain conditions, arises naturally throughout discrete mathematics, and problems of this kind have been studied extensively. In the 1990s, Ando conjectured that the vertices of every cubic graph can be partitioned into two parts that induce isomorphic subgraphs. Using probabilistic methods together with delicate recolouring arguments, we prove Ando's conjecture for large connected graphs."} {"_id": [65], "label": "cs.NI", "text": "Critical Study of Markovian Approaches for Batch Arrival Modeling in IEEE 802.15.4 based Networks. The transient non stationary nature of network reaction to batch arrivals has led to complex models in order to estimate the network quantities of interest. In this report we focus on the IEEE 802.15.4 standard MAC layer and try to deeply study the current approaches in modeling the network reaction to one shot data arrivals. In addition to the general description of models, we mention the positive and negative points in each case proposing possible alternations which could improve the accuracy of the models."} {"_id": [21, 38], "label": "math.CO math.NT", "text": "Glaisher's Partition problem. We generalize the well known Glaisher partition bijection result. For given positive integers n, d, both greater than 1, we provide a rich family of bijections between the set of partitions of n where at least one part is divisible by d, and the set of partitions where at least one part appears d or more times."} {"_id": [0, 2], "label": "cs.AI cs.CV", "text": "Unveiling Class Labeling Structure for Universal Domain Adaptation. As a more practical setting for unsupervised domain adaptation, Universal Domain Adaptation (UDA) is recently introduced, where the target label set is unknown. One of the big challenges in UDA is how to determine the common label set shared by source and target domains, as there is simply no labeling available in the target domain. In this paper, we employ a probabilistic approach for locating the common label set, where each source class may come from the common label set with a probability. In particular, we propose a novel approach for evaluating the probability of each source class from the common label set, where this probability is computed by the prediction margin accumulated over the whole target domain. Then, we propose a simple universal adaptation network (S UAN) by incorporating the probabilistic structure for the common label set. Finally, we analyse the generalization bound focusing on the common label set and explore the properties on the target risk for UDA. Extensive experiments indicate that S UAN works well in different UDA settings and outperforms the state of the art methods by large margins."} {"_id": [14], "label": "cs.HC", "text": "WatchOut A Road Safety Extension for Pedestrians on a Public Windshield Display. We conducted a field study to investigate whether public windshield displays are applicable as an additional interactive digital road safety warning sign. We focused on investigating the acceptance and usability of our novel public windshield display and its potential use for future applications. The study has shown that users are open minded to the idea of an extraverted windshield display regardless the use case, whether it is used for safety purposes or different content. Contrary to our hypothesis most people assumed they would mistrust the system if it were as well established as traffic lights and primarily rely on their own perception."} {"_id": [0, 1], "label": "cs.LG cs.CV", "text": "Adaptive Hierarchical Decomposition of Large Deep Networks. Deep learning has recently demonstrated its ability to rival the human brain for visual object recognition. As datasets get larger, a natural question to ask is if existing deep learning architectures can be extended to handle the 50 K classes thought to be perceptible by a typical human. Most deep learning architectures concentrate on splitting diverse categories, while ignoring the similarities amongst them. This paper introduces a framework that automatically analyzes and configures a family of smaller deep networks as a replacement to a singular, larger network. Class similarities guide the creation of a family from course to fine classifiers which solve categorical problems more effectively than a single large classifier. The resulting smaller networks are highly scalable, parallel and more practical to train, and achieve higher classification accuracy. This paper also proposes a method to adaptively select the configuration of the hierarchical family of classifiers using linkage statistics from overall and sub classification confusion matrices. Depending on the number of classes and the complexity of the problem, a deep learning model is selected and the complexity is determined. Numerous experiments on network classes, layers, and architecture configurations validate our results."} {"_id": [64, 59], "label": "physics.soc-ph cs.SI", "text": "Differences in structure and dynamics of networks retrieved from dark and public web forums. Humans make decisions based on the information they obtain from several major sources, among which the comments of others in Internet forums play an increasing role. Such forums cover a wide spectrum of topics and represent an essential tool in choosing the best products, manipulating views or optimizing our decisions regarding a number of aspects of our everyday life. However, many forums have extremely controversial topics and contents including those which radicalize the readers or spread information about dangerous products and ideas (e.g., drugs, weapons or aggressive ideologies). These just mentioned activities are taking place mainly on the so called \"dark web\" allowing the hiding of the identity of members using dark forums. We use network theoretical approaches to analyze the data we obtained by studying the connectivity features of the members and the threads within a wide selection of forums (including dark and semi dark) and establish several characteristic behavioral patterns. Our findings reveal both common and rather different features in the two types of behavior. In particular, we show that the various distributions of quantities, like the activity of the commenters, the dynamics of the threads (defined using their lifetime) or the degree distributions corresponding to the three major types of forums we have investigated display characteristic deviations. This knowledge can be useful, for example, in identifying an activity typical for the dark web when it appears on the public web (since the public web can be accessed and used much more easily)."} {"_id": [0], "label": "cs.CV", "text": "Multi adversarial Faster RCNN for Unrestricted Object Detection. Conventional object detection methods essentially suppose that the training and testing data are collected from a restricted target domain with expensive labeling cost. For alleviating the problem of domain dependency and cumbersome labeling, this paper proposes to detect objects in an unrestricted environment by leveraging domain knowledge trained from an auxiliary source domain with sufficient labels. Specifically, we propose a multi adversarial Faster RCNN (MAF) framework for unrestricted object detection, which inherently addresses domain disparity minimization for domain adaptation in feature representation. The paper merits are in three fold 1) With the idea that object detectors often becomes domain incompatible when image distribution resulted domain disparity appears, we propose a hierarchical domain feature alignment module, in which multiple adversarial domain classifier submodules for layer wise domain feature confusion are designed 2) An information invariant scale reduction module (SRM) for hierarchical feature map resizing is proposed for promoting the training efficiency of adversarial domain adaptation 3) In order to improve the domain adaptability, the aggregated proposal features with detection results are feed into a proposed weighted gradient reversal layer (WGRL) for characterizing hard confused domain samples. We evaluate our MAF on unrestricted tasks, including Cityscapes, KITTI, Sim10k, etc. and the experiments show the state of the art performance over the existing detectors."} {"_id": [41], "label": "cs.RO", "text": "Enabling Commercial Autonomous Space Robotic Explorers. In contrast to manned missions, the application of autonomous robots for space exploration missions decreases the safety concerns of the exploration missions while extending the exploration distance since returning transportation is not necessary for robotics missions. In addition, the employment of robots in these missions also decreases mission complexities and costs because there is no need for onboard life support systems robots can withstand and operate in harsh conditions, for instance, extreme temperature, pressure, and radiation, where humans cannot survive. In this article, we introduce environments on Mars, review the existing autonomous driving techniques deployed on Earth, as well as explore technologies required to enable future commercial autonomous space robotic explorers. Last but not least, we also present that one of the urgent technical challenges for autonomous space explorers, namely, computing power onboard."} {"_id": [9], "label": "math.AP", "text": "Stability of transonic contact discontinuity for two dimensional steady compressible Euler flows in a finitely long nozzle. We consider the stability of transonic contact discontinuity for the two dimensional steady compressible Euler flows in a finitely long nozzle. This is the first work on the mixed type problem of transonic flows across a contact discontinuity as a free boundary in nozzles. We start with the Euler Lagrangian transformation to straighten the contact discontinuity in the new coordinates. However, the upper nozzle wall in the subsonic region depending on the mass flux becomes a free boundary after the transformation. Then we develop new ideas and techniques to solve the free boundary problem in three steps (1) we fix the free boundary and generate a new iteration scheme to solve the corresponding fixed boundary value problem of the hyperbolic elliptic mixed type by building some powerful estimates for both the first order hyperbolic equation and a second order nonlinear elliptic equation in a Lipschitz domain (2) we update the new free boundary by constructing a mapping that has a fixed point (3) we establish via the inverse Lagrangian coordinates transformation that the original free interface problem admits a unique piecewise smooth transonic solution near the background state, which consists of a smooth subsonic flow and a smooth supersonic flow with a contact discontinuity."} {"_id": [83, 19], "label": "cs.CR cs.MM", "text": "Reliability of Power System Frequency on Times Stamping Digital Recordings. Power system frequency could be captured by digital recordings and extracted to compare with a reference database for forensic time stamp verification. It is known as the electric network frequency (ENF) criterion, enabled by the properties of random fluctuation and intra grid consistency. In essence, this is a task of matching a short random sequence within a long reference, and the reliability of this criterion is mainly concerned with whether this match could be unique and correct. In this paper, we comprehensively analyze the factors affecting the reliability of ENF matching, including length of test recording, length of reference, temporal resolution, and signal to noise ratio (SNR). For synthetic analysis, we incorporate the first order autoregressive (AR) ENF model and propose an efficient time frequency domain (TFD) noisy ENF synthesis method. Then, the reliability analysis schemes for both synthetic and real world data are respectively proposed. Through a comprehensive study we reveal that while the SNR is an important external factor to determine whether time stamp verification is viable, the length of test recording is the most important inherent factor, followed by the length of reference. However, the temporal resolution has little impact on the matching process."} {"_id": [3], "label": "cs.CL", "text": "Memformer A Memory Augmented Transformer for Sequence Modeling. Transformers have reached remarkable success in sequence modeling. However, these models have efficiency issues as they need to store all the history token level representations as memory. We present Memformer, an efficient neural network for sequence modeling, that utilizes an external dynamic memory to encode and retrieve past information. Our model achieves linear time complexity and constant memory space complexity when processing long sequences. We also propose a new optimization scheme, memory replay back propagation (MRBP), which promotes long range back propagation through time with a significantly reduced memory requirement. Experimental results show that Memformer has achieved comparable performance compared to the baselines by using 8.1x less memory space and 3.2x faster on inference. Analysis of the attention pattern shows that our external memory slots can encode and retain important information through timesteps."} {"_id": [42, 18], "label": "math.DG math.GT", "text": "Disks area minimizing in mean convex Riemannian n manifolds. We prove the validity of an inequality involving a mean of the area and the length of the boundary of immersed disks whose boundaries are homotopically non trivial curves in an oriented compact manifold which possesses convex mean curvature boundary, positive escalar curvature and admits a map to mathbb D 2 times T n with nonzero degree, where mathbb D 2 is a disk and T n is an n dimensional torus. We also prove a rigidity result for the equality case when the boundary is totally geodesic. This can be viewed as a partial generalization of a result due to Lucas Ambr 'ozio in cite AMB to higher dimensions."} {"_id": [21], "label": "math.CO", "text": "A new face iterator for polyhedra and more general finite locally branched lattices. We discuss a new memory efficient depth first algorithm and its implementation that iterates over all elements of a finite locally branched lattice. This algorithm can be applied to face lattices of polyhedra and to various generalizations such as finite polyhedral complexes and subdivisions of manifolds, extended tight spans and closed sets of matroids. Its practical implementation is very fast compared to state of the art implementations of previously considered algorithms. Based on recent work of Bruns, Garc 'ia S 'anchez, O'Neill and Wilburne, we apply this algorithm to prove Wilf's conjecture for all numerical semigroups of multiplicity 19 by iterating through the faces of the Kunz cone and identifying the possible bad faces and then checking that these do not yield counterexamples to Wilf's conjecture."} {"_id": [25], "label": "math.PR", "text": "Non integrable stable approximation by Stein's method. We develop Stein's method for alpha stable approximation with alpha in(0,1 , continuing the recent line of research by Xu cite lihu and Chen, Nourdin and Xu cite C N X in the case alpha in(1,2). The main results include an intrinsic upper bound for the error of the approximation in a variant of Wasserstein distance that involves the characterizing differential operators for stable distributions, and an application to the generalized central limit theorem. Due to the lack of first moment for the approximating sequence in the latter result, we appeal to an additional truncation procedure and investigate fine regularity properties of the solution to Stein's equation."} {"_id": [38], "label": "math.NT", "text": "Galois deformation spaces with a sparsity of automorphic points. Let k mathbb F p denote a finite field. For any split connected reductive group G W(k) and certain CM number fields F , we deform certain Galois representations overline rho Gal( overline F F) to G(k) to continuous families X overline rho of Galois representations Gal( overline F F) to G( overline mathbb Q p ) lifting overline rho such that the space of points of X overline rho which are geometric (in the sense of the Fontaine Mazur conjecture) with parallel Hodge Tate weights has positive codimension in X overline rho . Thus the set of points in X overline rho which could (conjecturally) be associated to automorphic forms is sparse. This generalizes a result of Calegari and Mazur for F mathbb Q quadratic imaginary and G GL 2 . The sparsity of automorphic points for F a CM field contrasts with the situation when F is a totally real field, where automorphic points are often provably dense."} {"_id": [31], "label": "q-bio.PE", "text": "The Fitness Value of Information with Delayed Phenotype Switching Optimal Performance with Imperfect Sensing. The ability of organisms to accurately sense their environment and respond accordingly is critical for evolutionary success. However, exactly how the sensory ability influences fitness is a topic of active research, while the necessity of a time delay between when unreliable environmental cues are sensed and when organisms can mount a response has yet to be explored at any length. Accounting for this delay in phenotype response in models of population growth, we find that a critical error probability can exist under certain environmental conditions an organism with a sensory system with any error probability less than the critical value can achieve the same long term growth rate as an organism with a perfect sensing system. We also observe a trade off between the evolutionary value of sensory information and robustness to error, mediated by the rate at which the phenotype distribution relaxes to steady state. The existence of the critical error probability could have several important evolutionary consequences, primarily that sensory systems operating at the non zero critical error probability may be evolutionarily optimal."} {"_id": [9], "label": "math.AP", "text": "Global solutions for random vorticity equations perturbed by gradient dependent noise, in two and three dimensions. The aim of this work is to prove an existence and uniqueness result of Kato Fujita type for the Navier Stokes equations, in vorticity form, in 2 D and 3 D , perturbed by a gradient type multiplicative Gaussian noise (for sufficiently small initial vorticity). These equations are considered in order to model hydrodynamic turbulence. The approach was motivated by a recent result by V. Barbu and the second named author in cite b1 , that treats the stochastic 3D Navier Stokes equations, in vorticity form, perturbed by linear multiplicative Gaussian noise. More precisely, the equation is transformed to a random nonlinear parabolic equation, as in cite b1 , but the transformation is different and adapted to our gradient type noise. Then global unique existence results are proved for the transformed equation, while for the original stochastic Navier Stokes equations, existence of a solution adapted to the Brownian filtration is obtained up to some stopping time."} {"_id": [18, 42], "label": "math.GT math.DG", "text": "Equivariant Cerf theory and perturbative SU(n) Casson invariants. We develop an equivariant Cerf theory for Morse functions on finite dimensional manifolds with group actions, and adapt the technique to the infinite dimensional setting to study the moduli space of perturbed flat SU(n) connections. As a consequence, we prove the existence of perturbative SU(n) Casson invariants on integer homology spheres for all n ge 3 , and write down an explicit formula when n 4 . This generalizes the previous works of Boden and Herald."} {"_id": [0, 40], "label": "cs.CV cs.IR", "text": "Cross Modal Hierarchical Modelling for Fine Grained Sketch Based Image Retrieval. Sketch as an image search query is an ideal alternative to text in capturing the fine grained visual details. Prior successes on fine grained sketch based image retrieval (FG SBIR) have demonstrated the importance of tackling the unique traits of sketches as opposed to photos, e.g., temporal vs. static, strokes vs. pixels, and abstract vs. pixel perfect. In this paper, we study a further trait of sketches that has been overlooked to date, that is, they are hierarchical in terms of the levels of detail a person typically sketches up to various extents of detail to depict an object. This hierarchical structure is often visually distinct. In this paper, we design a novel network that is capable of cultivating sketch specific hierarchies and exploiting them to match sketch with photo at corresponding hierarchical levels. In particular, features from a sketch and a photo are enriched using cross modal co attention, coupled with hierarchical node fusion at every level to form a better embedding space to conduct retrieval. Experiments on common benchmarks show our method to outperform state of the arts by a significant margin."} {"_id": [42, 75, 74], "label": "math.KT math.DG math.OA", "text": "An equivariant orbifold index for proper actions. For a proper, cocompact action by a locally compact group of the form H times G , with H compact, we define an H times G equivariant index of H transversally elliptic operators, which takes values in KK (C H, C G) . This simultaneously generalises the Baum Connes analytic assembly map, Atiyah's index of transversally elliptic operators, and Kawasaki's orbifold index. This index also generalises the assembly map to elliptic operators on orbifolds. In the special case where the manifold in question is a real semisimple Lie group, G is a cocompact lattice and H is a maximal compact subgroup, we realise the Dirac induction map from the Connes Kasparov conjecture as a Kasparov product and obtain an index theorem for Spin Dirac operators on compact locally symmetric spaces."} {"_id": [15], "label": "cs.IT math.IT", "text": "Edge removal in undirected networks. The edge removal problem asks whether the removal of a lambda capacity edge from a given network can decrease the communication rate between source terminal pairs by more than lambda . In this short manuscript, we prove that for undirected networks, removing a lambda capacity edge decreases the rate by O( lambda) . Through previously known reductive arguments, here newly applied to undirected networks, our result implies that the zero error capacity region of an undirected network equals its vanishing error capacity region. Whether it is possible to prove similar results for directed networks remains an open question."} {"_id": [33, 50], "label": "physics.ins-det physics.med-ph", "text": "PETALO Time of Flight PET with liquid xenon. The fast scintillation decay time and the high scintillation yield of liquid xenon makes it an appropriate material for nuclear medicine. Moreover, being a continuous medium with a uniform response, liquid xenon allows one to avoid most of the geometrical distortions of conventional detectors based on scintillating crystals. In this paper, we describe how these properties have motivated the development of a novel concept for positron emission tomography scanners with Time Of Flight measurement, which uses liquid xenon as a scintillating material and silicon photomultipliers as sensors. Monte Carlo studies have indicated that this technology would provide a very good intrinsic time resolution, of around 70 ps. Moreover, being liquid xenon transparent to UV and blue wavelengths, both scintillation and Cherenkov light can be exploited. While the former can be used for energy measurements, the latter is a prompt signal (of a few picoseconds), which provides a very precise time measurement. Monte Carlo simulations point to a time resolution of 30 50 ps obtained using Cherenkov light. A first prototype is being built to demonstrate the high energy, spatial and time resolution of this concept, using a ring of around 30 cm of internal diameter and a depth of 3 cm instrumented with VUV sensitive silicon photomultipliers."} {"_id": [49], "label": "math.OC", "text": "Operational Valuation for Energy Storage under Multi stage Price Uncertainties. This paper presents an analytical method for calculating the operational value of an energy storage device under multi stage price uncertainties. Our solution calculates the storage value function from price distribution functions directly instead of sampling discrete scenarios, offering improved modeling accuracy over tail distribution events such as price spikes and negative prices. The analytical algorithm offers very high computational efficiency in solving multi stage stochastic programming for energy storage and can easily be implemented within any software and hardware platform, while numerical simulation results show the proposed method is up to 100,000 times faster than a benchmark stochastic dual dynamic programming solver even in small test cases. Case studies are included to demonstrate the impact of price variability on the valuation results, and a battery charging example using historical prices for New York City."} {"_id": [6], "label": "physics.flu-dyn", "text": "Investigation of condensation shocks and re entrant jet dynamics in a cavitating nozzle flow by Large Eddy Simulation. Cloud cavitation is related to an intrinsic instability where clouds are shed periodically. The shedding process is initiated either by the motion of a liquid re entrant jet or a condensation shock. Cloud cavitation in nozzles interacts with the flow field in the nozzle, the mass flow and the spray break up, and causes erosion damage. For nozzle geometries cloud shedding and the associated processes have not yet been studied in detail. In this paper, we investigate the process of cloud cavitation shedding, the re entrant jet and condensation shocks in a scaled up generic step nozzle with injection into gas using implicit Large Eddy Simulations (LES). For modeling of the cavitating liquid we employ a barotropic equilibrium cavitation model, embedded in a homogeneous multi component mixture model. Full compressibility of all components is taken into account to resolve the effects of collapsing vapor structures. We carry out simulations of two operating points exhibiting different cavitation regimes. The time resolved, three dimensional simulation results cover several shedding cycles and provide deeper insight into the flow field. Our results show that at lower cavitation numbers, shedding is initiated by condensation shocks, which has not yet been reported for nozzle flows with a constant cross section. We analyze the cavitation dynamics and the shedding cycles of both operating points. Based on our observations we propose modifications to established schematics of the cloud shedding process. Additionally, we analyze the near wall upstream flow in and underneath the vapor sheet and possible driving mechanism behind the formation of the re entrant jet."} {"_id": [12], "label": "math.CA", "text": "Initial L 2 times cdots times L 2 bounds for multilinear operators. The L p boundedness theory of convolution operators is linebreak based on an initial L 2 to L 2 estimate derived from the Fourier transform. The corresponding theory of multilinear operators lacks such a simple initial estimate in view of the unavailability of Plancherel's identity in this setting, and up to now it has not been clear what a natural initial estimate might be. In this work we achieve exactly this goal, i.e., obtain an initial L 2 times cdots times L 2 to L 2 m estimate for general building blocks of m linear multiplier operators. We apply this result to deduce analogous bounds for multilinear rough singular integrals, multipliers of H \"ormander type, and multipliers whose derivatives satisfy qualitative estimates."} {"_id": [18], "label": "math.GT", "text": "Stable integral simplicial volume of 3 manifolds. We show that non elliptic prime 3 manifolds satisfy integral approximation for the simplicial volume, i.e., that their simplicial volume equals the stable integral simplicial volume. The proof makes use of integral foliated simplicial volume and tools from ergodic theory."} {"_id": [0], "label": "cs.CV", "text": "SOSNet Second Order Similarity Regularization for Local Descriptor Learning. Despite the fact that Second Order Similarity (SOS) has been used with significant success in tasks such as graph matching and clustering, it has not been exploited for learning local descriptors. In this work, we explore the potential of SOS in the field of descriptor learning by building upon the intuition that a positive pair of matching points should exhibit similar distances with respect to other points in the embedding space. Thus, we propose a novel regularization term, named Second Order Similarity Regularization (SOSR), that follows this principle. By incorporating SOSR into training, our learned descriptor achieves state of the art performance on several challenging benchmarks containing distinct tasks ranging from local patch retrieval to structure from motion. Furthermore, by designing a von Mises Fischer distribution based evaluation method, we link the utilization of the descriptor space to the matching performance, thus demonstrating the effectiveness of our proposed SOSR. Extensive experimental results, empirical evidence, and in depth analysis are provided, indicating that SOSR can significantly boost the matching performance of the learned descriptor."} {"_id": [1, 3, 4], "label": "cs.CL cs.LG cs.NE", "text": "Memory Augmented Recurrent Neural Networks Can Learn Generalized Dyck Languages. We introduce three memory augmented Recurrent Neural Networks (MARNNs) and explore their capabilities on a series of simple language modeling tasks whose solutions require stack based mechanisms. We provide the first demonstration of neural networks recognizing the generalized Dyck languages, which express the core of what it means to be a language with hierarchical structure. Our memory augmented architectures are easy to train in an end to end fashion and can learn the Dyck languages over as many as six parenthesis pairs, in addition to two deterministic palindrome languages and the string reversal transduction task, by emulating pushdown automata. Our experiments highlight the increased modeling capacity of memory augmented models over simple RNNs, while inflecting our understanding of the limitations of these models."} {"_id": [38, 46], "label": "math.AG math.NT", "text": "Reconstruction anab 'elienne du squelette des courbes analytiques. In this work we bring to light some anabelian behaviours of analytic curves in the setting of Berkovich geometry. We show more precisely that the knowledge of the tempered fundamental group of some curves that we call analytically anabelian determines their analytic skeletons as graphs. The tempered fundamental group of a Berkovich space, introduced by Andr 'e, enabled Mochizuki to prove the first result of anabelian geometry in Berkovich geometry concerning analytifications of algebraic hyperbolic curves over overline mathbb Q p . To that end, Mochizuki developed the categorical language of semi graphs of anabelio \"ids and tempero \"ids. Our work consists in associating a graph of anabelio \"ids to a Berkovich curve equipped with a minimal triangulation and in adapting the results of Mochizuki in order to recover the analytic skeleton of the curve. The novelty of this anabelian result in Berkovich geometry is that the curves we are interested in are not supposed anymore to be of algebraic nature. We show for example that the famous Drinfeld half plane is an analytically anabelian curve."} {"_id": [3], "label": "cs.CL", "text": "DoQA Accessing Domain Specific FAQs via Conversational QA. The goal of this work is to build conversational Question Answering (QA) interfaces for the large body of domain specific information available in FAQ sites. We present DoQA, a dataset with 2,437 dialogues and 10,917 QA pairs. The dialogues are collected from three Stack Exchange sites using the Wizard of Oz method with crowdsourcing. Compared to previous work, DoQA comprises well defined information needs, leading to more coherent and natural conversations with less factoid questions and is multi domain. In addition, we introduce a more realistic information retrieval(IR) scenario where the system needs to find the answer in any of the FAQ documents. The results of an existing, strong, system show that, thanks to transfer learning from a Wikipedia QA dataset and fine tuning on a single FAQ domain, it is possible to build high quality conversational QA systems for FAQs without in domain training data. The good results carry over into the more challenging IR scenario. In both cases, there is still ample room for improvement, as indicated by the higher human upperbound."} {"_id": [12], "label": "math.CA", "text": "Direct and inverse theorems of approximation of functions in weighted Orlicz type spaces with variable exponent. In weighted Orlicz type spaces mathcal S scriptstyle mathbf p, , mu with a variable summation exponent, the direct and inverse approximation theorems are proved in terms of best approximations of functions and moduli of smoothness of fractional order. It is shown that the constant obtained in the inverse approximation theorem is in a certain sense the best. Some applications of the results are also proposed. In particular, the constructive characteristics of functional classes defined by such moduli of smoothness are given. Equivalence between moduli of smoothness and certain Peetre K functionals is shown in the spaces mathcal S scriptstyle mathbf p, , mu ."} {"_id": [18], "label": "math.GT", "text": "Properties of minimal charts and their applications VI the graph Gamma m 1 in a chart Gamma of type (m 2,3,2) . Let Gamma be a chart, and we denote by Gamma m the union of all the edges of label m . A chart Gamma is of type (m 2,3,2) if w( Gamma) 7 , w( Gamma m cap Gamma m 1 ) 2 , w( Gamma m 1 cap Gamma m 2 ) 3 , and w( Gamma m 2 cap Gamma m 3 ) 2 where w(G) is the number of white vertices in G . In this paper, we prove that if there is a minimal chart Gamma of type (m 2,3,2) , then each of Gamma m 1 and Gamma m 2 contains one of three kinds of graphs. In the next paper, we shall prove that there is no minimal chart of type (m 2,3,2) ."} {"_id": [11], "label": "physics.app-ph", "text": "Forward and inverse acoustic scattering problems involving the mass density. This investigation is concerned with the 2D acoustic scattering problem of a plane wave propagating in a non lossy fluid host and soliciting a linear, isotropic, macroscopically homogeneous, lossy, flat plane layer in which the mass density and wavespeed are different from those of the host. The focus is on the inverse problem of the retrieval of either the layer mass density or the real part of the layer wavespeed. The data is the transmitted pressure field, obtained by simulation (resolution of the forward problem) in exact, explicit form via separation of variables. Another form of this solution, which is exact and more explicit in terms of the mass density contrast (between the host and layer), is obtained by a domain integral method. A perturbation technique enables this solution to be cast as a series of powers of the mass density contrast, the first three terms of which are employed as the trial models in the treatment of the inverse problem. The aptitude of these models to retrieve the mass density contrast and real part of the layer wavespeed is demonstrated both theoretically and numerically. Keywords 2D acoustics, forward scattering, inverse scattering, domain integral equation, constant mass density assumption, small density contrast, retrieval accuracy"} {"_id": [20, 12, 38], "label": "math.NT cs.NA math.CA math.NA", "text": "Primes in arithmetic progressions and semidefinite programming. Assuming the generalized Riemann hypothesis, we give asymptotic bounds on the size of intervals that contain primes from a given arithmetic progression using the approach developed by Carneiro, Milinovich and Soundararajan Comment. Math. Helv. 94, no. 3 (2019) . For this we extend the Guinand Weil explicit formula over all Dirichlet characters modulo q geq 3 , and we reduce the associated extremal problems to convex optimization problems that can be solved numerically via semidefinite programming."} {"_id": [74, 12, 23], "label": "math.OA math.CA math.FA", "text": "Pointwise convergence of noncommutative Fourier series. This paper is devoted to the study of pointwise convergence of Fourier series for group von Neumann algebras and quantum groups. It is well known that a number of approximation properties of groups can be interpreted as summation methods and mean convergence of the associated noncommutative Fourier series. Based on this framework, this paper studies the refined counterpart of pointwise convergence of these Fourier series. As a key ingredient, we develop a noncommutative bootstrap method and establish a general criterion of maximal inequalities for approximate identities of noncommutative Fourier multipliers. Based on this criterion, we prove that for any countable discrete amenable group, there exists a sequence of finitely supported positive definite functions tending to 1 pointwise, so that the associated Fourier multipliers on noncommutative L p spaces satisfy the pointwise convergence for all p 1 . In a similar fashion, we also obtain results for a large subclass of groups (as well as quantum groups) with the Haagerup property and the weak amenability. We also consider the analogues of Fej ' e r and Bochner Riesz means in the noncommutative setting. Our approach heavily relies on the noncommutative ergodic theory in conjunction with abstract constructions of Markov semigroups, inspired by quantum probability and geometric group theory. Finally, we also obtain as a byproduct the dimension free bounds of the noncommutative Hardy Littlewood maximal inequalities associated with convex bodies."} {"_id": [32, 62], "label": "cs.GT cs.DS", "text": "A Matroid Generalization of the Super Stable Matching Problem. A super stable matching, which was introduced by Irving, is a solution concept in a variant of the stable matching problem in which the preferences may contain ties. Irving proposed a polynomial time algorithm for the problem of finding a super stable matching if a super stable matching exists. In this paper, we consider a matroid generalization of a super stable matching. We call our generalization of a super stable matching a super stable common independent set. This can be considered as a generalization of the matroid generalization of a stable matching for strict preferences proposed by Fleiner. We propose a polynomial time algorithm for the problem of finding a super stable common independent set if a super stable common independent set exists."} {"_id": [0], "label": "cs.CV", "text": "GSTO Gated Scale Transfer Operation for Multi Scale Feature Learning in Pixel Labeling. Existing CNN based methods for pixel labeling heavily depend on multi scale features to meet the requirements of both semantic comprehension and detail preservation. State of the art pixel labeling neural networks widely exploit conventional scale transfer operations, i.e., up sampling and down sampling to learn multi scale features. In this work, we find that these operations lead to scale confused features and suboptimal performance because they are spatial invariant and directly transit all feature information cross scales without spatial selection. To address this issue, we propose the Gated Scale Transfer Operation (GSTO) to properly transit spatial filtered features to another scale. Specifically, GSTO can work either with or without extra supervision. Unsupervised GSTO is learned from the feature itself while the supervised one is guided by the supervised probability matrix. Both forms of GSTO are lightweight and plug and play, which can be flexibly integrated into networks or modules for learning better multi scale features. In particular, by plugging GSTO into HRNet, we get a more powerful backbone (namely GSTO HRNet) for pixel labeling, and it achieves new state of the art results on the COCO benchmark for human pose estimation and other benchmarks for semantic segmentation including Cityscapes, LIP and Pascal Context, with negligible extra computational cost. Moreover, experiment results demonstrate that GSTO can also significantly boost the performance of multi scale feature aggregation modules like PPM and ASPP. Code will be made available at https github.com VDIGPKU GSTO."} {"_id": [56, 77], "label": "math.LO cs.LO", "text": "On Herbrand Skeletons. Herbrand's theorem plays an important role both in proof theory and in computer science. Given a Herbrand skeleton, which is basically a number specifying the count of disjunctions of the matrix, we would like to get a computable bound on the size of terms which make the disjunction into a quasitautology. This is an important problem in logic, specifically in the complexity of proofs. In computer science, specifically in automated theorem proving, one hopes for an algorithm which avoids the guesses of existential substitution axioms involved in proving a theorem. Herbrand's theorem forms the very basis of automated theorem proving where for a given number n we would like to have an algorithm which finds the terms in the n disjunctions of matrices solely from the shape of the matrix. The main result of this paper is that both problems have negative solutions."} {"_id": [2, 14], "label": "cs.HC cs.AI", "text": "Chatbots as conversational healthcare services. Chatbots are emerging as a promising platform for accessing and delivering healthcare services. The evidence is in the growing number of publicly available chatbots aiming at taking an active role in the provision of prevention, diagnosis, and treatment services. This article takes a closer look at how these emerging chatbots address design aspects relevant to healthcare service provision, emphasizing the Human AI interaction aspects and the transparency in AI automation and decision making."} {"_id": [49, 23], "label": "math.OC math.FA", "text": "Quantitatively Hyper Positive Real Functions. Hyper Positive real, matrix valued, rational functions are associated with absolute stability (the Lurie problem). Here, quantitative subsets of Hyper positive functions, related through nested inclusions, are introduced. Structurally, this family of functions turns out to be matrix convex and closed under inversion. A state space characterization of these functions, through a corresponding Kalman Yakubovich Popov Lemma is given. Technically, the classical Linear Matrix Inclusions, associated with passive systems, are here substituted by Quadratic Matrix Inclusions."} {"_id": [78], "label": "math.AC", "text": "Closed neighborhood ideal of a graph. We introduce a family of squarefree monomial ideals associated to finite simple graphs, whose monomial generators correspond to closed neighborhood of vertices of the underlying graph. Any such ideal is called the closed neighborhood ideal of the graph. We study some algebraic invariants of these ideals like Castelnuovo Mumford regularity and projective dimension and present some combinatorial descriptions for these invariants in terms of graph invariants."} {"_id": [21, 29], "label": "math.GR math.CO", "text": "Co Prime Order graph of a finite abelian Group and Dihedral Group. The textbf Co Prime Order Graph Theta (G) of a given finite group is a simple undirected graph whose vertex set is the group G itself, and any two vertexes x,y in Theta (G) are adjacent if and only if gcd(o(x),o(y)) 1 or prime. In this paper, we find a precise formula to count the degree of a vertex in the Co Prime Order graph of a finite abelian group or Dihedral group D n .We also investigate the Laplacian spectrum of the Co Prime Order Graph Theta (G) when G is finite abelian p group, mathbb Z p t times mathbb Z q s or Dihedral group D p n . Key Words and Phrases Co Prime Order graph,finite abelian group,Dihedral group, Laplacian spectrum."} {"_id": [35, 20], "label": "math.RA cs.NA math.NA", "text": "Density of diagonalizable matrices in sets of structured matrices defined from indefinite scalar products. For an (indefinite) scalar product x,y B x HBy for B pm B H in Gl n( mathbb C ) on mathbb C n times mathbb C n we show that the set of diagonalizable matrices is dense in the set of all B selfadjoint, B skewadjoint, B unitary and B normal matrices."} {"_id": [22], "label": "cs.SE", "text": "Mining Message Flows from System on Chip Execution Traces. Comprehensive and well defined specifications are necessary to perform rigorous and thorough validation of system on chip (SoC) designs. Message flows specify how components of an SoC design communicate and coordinate with each other to realize various system functions. Message flow specifications are essential for efficient system level validation and debug for SoC designs. However, in practice such specifications are usually not available, often ambiguous, incomplete, or even contain errors. This paper addresses that problem by proposing a specification mining framework, FlowMiner, that automatically extracts message flows from SoC execution traces, which, unlike software traces, show a high degree of concurrency. A set of inference rules and optimization techniques are presented to improve mining performance and reduce mining complexity. Evaluation of this framework in several experiments shows promising results."} {"_id": [0, 19], "label": "cs.CV cs.CR", "text": "Revisiting the Threat Space for Vision based Keystroke Inference Attacks. A vision based keystroke inference attack is a side channel attack in which an attacker uses an optical device to record users on their mobile devices and infer their keystrokes. The threat space for these attacks has been studied in the past, but we argue that the defining characteristics for this threat space, namely the strength of the attacker, are outdated. Previous works do not study adversaries with vision systems that have been trained with deep neural networks because these models require large amounts of training data and curating such a dataset is expensive. To address this, we create a large scale synthetic dataset to simulate the attack scenario for a keystroke inference attack. We show that first pre training on synthetic data, followed by adopting transfer learning techniques on real life data, increases the performance of our deep learning models. This indicates that these models are able to learn rich, meaningful representations from our synthetic data and that training on the synthetic data can help overcome the issue of having small, real life datasets for vision based key stroke inference attacks. For this work, we focus on single keypress classification where the input is a frame of a keypress and the output is a predicted key. We are able to get an accuracy of 95.6 after pre training a CNN on our synthetic data and training on a small set of real life data in an adversarial domain adaptation framework. Source Code for Simulator https github.com jlim13 keystroke inference attack synthetic dataset generator"} {"_id": [21, 15], "label": "cs.IT math.CO math.IT", "text": "A Comparison of Empirical Tree Entropies. Whereas for strings, higher order empirical entropy is the standard entropy measure, several different notions of empirical entropy for trees have been proposed in the past, notably label entropy, degree entropy, conditional versions of the latter two, and empirical entropy of trees (here, called label shape entropy). In this paper, we carry out a systematic comparison of these entropy measures. We underpin our theoretical investigations by experimental results with real XML data."} {"_id": [75, 27, 78], "label": "math.AC math.CT math.KT", "text": "Matrix factorizations for self orthogonal categories of modules. For a commutative ring S and self orthogonal subcategory mathsf C of mathsf Mod (S) , we consider matrix factorizations whose modules belong to mathsf C . Let f in S be a regular element. If f is M regular for every M in mathsf C , we show there is a natural embedding of the homotopy category of mathsf C factorizations of f into a corresponding homotopy category of totally acyclic complexes. Moreover, we prove this is an equivalence if mathsf C is the category of projective or flat cotorsion S modules. Dually, using divisibility in place of regularity, we observe there is a parallel equivalence when mathsf C is the category of injective S modules."} {"_id": [38, 15], "label": "cs.IT math.IT math.NT", "text": "Linear Complexity of A Family of Binary pq 2 periodic Sequences From Euler Quotients. We first introduce a family of binary pq 2 periodic sequences based on the Euler quotients modulo pq , where p and q are two distinct odd primes and p divides q 1 . The minimal polynomials and linear complexities are determined for the proposed sequences provided that 2 q 1 not equiv 1 mod q 2 . The results show that the proposed sequences have high linear complexities."} {"_id": [41, 2, 52], "label": "cs.RO cs.AI cs.MA", "text": "Efficient Large Scale Multi Drone Delivery Using Transit Networks. We consider the problem of controlling a large fleet of drones to deliver packages simultaneously across broad urban areas. To conserve energy, drones hop between public transit vehicles (e.g., buses and trams). We design a comprehensive algorithmic framework that strives to minimize the maximum time to complete any delivery. We address the multifaceted complexity of the problem through a two layer approach. First, the upper layer assigns drones to package delivery sequences with a near optimal polynomial time task allocation algorithm. Then, the lower layer executes the allocation by periodically routing the fleet over the transit network while employing efficient bounded suboptimal multi agent pathfinding techniques tailored to our setting. Experiments demonstrate the efficiency of our approach on settings with up to 200 drones, 5000 packages, and transit networks with up to 8000 stops in San Francisco and Washington DC. Our results show that the framework computes solutions typically within a few seconds on commodity hardware, and that drones travel up to 360 of their flight range with public transit."} {"_id": [24, 18, 29], "label": "math.GR math.GT math.MG", "text": "Largest hyperbolic actions and quasi parabolic actions in groups. The set of equivalence classes of cobounded actions of a group on different hyperbolic metric spaces carries a natural partial order. The resulting poset thus gives rise to a notion of the \"best\" hyperbolic action of a group as the largest element of this poset, if such an element exists. We call such an action a largest hyperbolic action. While hyperbolic groups admit largest hyperbolic actions, we give evidence in this paper that this phenomenon is rare for non hyperbolic groups. In particular, we prove that many families of groups of geometric origin do not have largest hyperbolic actions, including for instance many 3 manifold groups and most mapping class groups. Our proofs use the quasi trees of metric spaces of Bestvina Bromberg Fujiwara, among other tools. In addition, we give a complete characterization of the poset of hyperbolic actions of Anosov mapping torus groups, and we show that mapping class groups of closed surfaces of genus at least two have hyperbolic actions which are comparable only to the trivial action."} {"_id": [70], "label": "math.HO", "text": "Twenty Female Mathematicians. In this explanatory work, we make an attempt to briefly discuss the work and technical achievements of twenty female mathematicians. The work may be useful as a historical resource, but there is very little biography or history, and the primary focus is on the mathematics. In fact, the main use will probably be for a student who is coming to a new area of mathematics for the first time and needs an overview of some of the key results and references viewed through the work of one of that area's main contributors. The work of the following mathematicians is discussed Sofia Kovalevskaya, Emmy Noether, Mary Cartwright, Julia Robinson, Olga Ladyzhenska, Yvonne Choquet Bruhat, Olga Oleinik, Charlotte Fischer, Karen Uhlenbeck, Krystyna Kuperberg, Nicole Tomczak Jaegermann, Dusa McDuff, Karen Vogtmann, Carolyn Gordon, Frances Kirwan, Leila Schneps, Claire Voisin, Olga Holtz, Maryam Mirzakhani and Maryna Viazowska. There is a website based on this document (https tusindfryd.github.io twenty female mathematicians ) created by Dominika G 'oral. Changes, corrections, and additions can be suggested at the website, but the website is currently not being actively maintained, so any suggestions for corrections and changes will be made to the document instead. The research areas of the mathematicians in question can be found at the website."} {"_id": [46], "label": "math.AG", "text": "On p power freeness in positive characteristic. In this note, we study base point freeness up to taking p power, which we will call p power freeness. We first establish some criteria for p power freeness as analogues of criteria for semi ampleness. We then apply these results to three dimensional birational geometry."} {"_id": [26, 38], "label": "math.RT math.NT", "text": "The endoscopic fundamental lemma for unitary Friedberg Jacquet periods. We prove the endoscopic fundamental lemma for the Lie algebra of the symmetric space U(2n) U(n) times U(n) , where U(n) denotes a unitary group of rank n . This is the first major step in the stabilization of the relative trace formula associated to the U(n) times U(n) periods of automorphic forms on U(2n) ."} {"_id": [1, 17], "label": "cs.LG cs.DC", "text": "Fast Convergent Federated Learning. Federated learning has emerged recently as a promising solution for distributing machine learning tasks through modern networks of mobile devices. Recent studies have obtained lower bounds on the expected decrease in model loss that is achieved through each round of federated learning. However, convergence generally requires a large number of communication rounds, which induces delay in model training and is costly in terms of network resources. In this paper, we propose a fast convergent federated learning algorithm, called FOLB, which performs intelligent sampling of devices in each round of model training to optimize the expected convergence speed. We first theoretically characterize a lower bound on improvement that can be obtained in each round if devices are selected according to the expected improvement their local models will provide to the current global model. Then, we show that FOLB obtains this bound through uniform sampling by weighting device updates according to their gradient information. FOLB is able to handle both communication and computation heterogeneity of devices by adapting the aggregations according to estimates of device's capabilities of contributing to the updates. We evaluate FOLB in comparison with existing federated learning algorithms and experimentally show its improvement in trained model accuracy, convergence speed, and or model stability across various machine learning tasks and datasets."} {"_id": [11, 36, 84], "label": "physics.chem-ph physics.acc-ph physics.app-ph", "text": "Electron stimulated desorption from molecular ices in the sub keV regime. Electron stimulated desorption (ESD) of cryosorbed molecules on surfaces is a process of relevance to fields as varied as vacuum dynamics in accelerators and astrochemistry. While desorption from such molecular systems induced by keV electrons and fast ions has been extensively studied, the sub keV electron regime is comparatively little known. We measured and quantified electron stimulated desorption from molecular ice systems (layers of N 2 , CO, CO 2 , Ar and H 2 O D 2 O condensed at cryogenic temperatures) in the 150 2000 eV electron energy range. In this regime stopping power is no longer sufficient to explain the electron energy dependence of ESD yields. We introduce the notion of desorption relevant depth, which characterizes the transition between two energy deposition regimes near the surface. We then apply this notion to the different systems, showing how ESD in the sub keV regime can for example reveal the differences in species diffusion in crystalline and porous amorphous CO 2 ices."} {"_id": [56], "label": "cs.LO", "text": "A complete equational axiomatisation of partial differentiation. We formalise the well known rules of partial differentiation in a version of equational logic with function variables and binding constructs. We prove the resulting theory is complete with respect to polynomial interpretations. The proof makes use of Severi's interpolation theorem that all multivariate Hermite problems are solvable. We also present a number of related results, such as decidability and equational completeness."} {"_id": [40, 59], "label": "cs.IR cs.SI", "text": "Understanding Echo Chambers in E commerce Recommender Systems. Personalized recommendation benefits users in accessing contents of interests effectively. Current research on recommender systems mostly focuses on matching users with proper items based on user interests. However, significant efforts are missing to understand how the recommendations influence user preferences and behaviors, e.g., if and how recommendations result in textit echo chambers . Extensive efforts have been made in examining the phenomenon in online media and social network systems. Meanwhile, there are growing concerns that recommender systems might lead to the self reinforcing of user's interests due to narrowed exposure of items, which may be the potential cause of echo chamber. In this paper, we aim to analyze the echo chamber phenomenon in Alibaba Taobao one of the largest e commerce platforms in the world. Echo chamber means the effect of user interests being reinforced through repeated exposure to similar contents. Based on the definition, we examine the presence of echo chamber in two steps. First, we explore whether user interests have been reinforced. Second, we check whether the reinforcement results from the exposure of similar contents. Our evaluations are enhanced with robust metrics, including cluster validity and statistical significance. Experiments are performed on extensive collections of real world data consisting of user clicks, purchases, and browse logs from Alibaba Taobao. Evidence suggests the tendency of echo chamber in user click behaviors, while it is relatively mitigated in user purchase behaviors. Insights from the results guide the refinement of recommendation algorithms in real world e commerce systems."} {"_id": [24, 23], "label": "math.FA math.MG", "text": "A note on the weak and pointwise convergence of BV functions. We study pointwise convergence properties of weakly converging sequences u i i in mathbb N in mathrm BV ( mathbb R n) . We show that, after passage to a suitable subsequence (not relabeled), we have pointwise convergence u i (x) to u (x) of the precise representatives for all x in mathbb R n setminus E , where the exceptional set E subset mathbb R n has on the one hand Hausdorff dimension at most n 1 , and is on the other hand also negligible with respect to the Cantor part of D u . Furthermore, we discuss the optimality of these results."} {"_id": [19], "label": "cs.CR", "text": "EventWarden A Decentralized Event driven Proxy Service for Outsourcing Arbitrary Transactions in Ethereum like Blockchains. Transactions represent a fundamental component in blockchains as they are the primary means for users to change the blockchain state. Current blockchain systems such as Bitcoin and Ethereum require users to constantly observe the state changes of interest or the events taking place in a blockchain and requires the user to explicitly release the required transactions to respond to the observed events in the blockchain. This paper proposes EventWarden, a decentralized event driven proxy service for users to outsource transactions in Ethereum like blockchains. EventWarden employs a novel combination of smart contracts and blockchain logs. EventWarden allows a user to create a proxy smart contract that specifies an interested event and also reserves an arbitrary transaction to release. Upon observing the occurrence of the prescribed event, anyone in the Blockchain network can call the proxy contract to earn the service fee reserved in the contract by proving to the contract that the event has been recorded into blockchain logs, which then automatically triggers the proxy contract to release the reserved transaction. We show that the reserved transaction can only get released from the proxy contract when the prescribed event has taken place. We also demonstrate that as long as a single member in the Blockchain network is incentivized by the service fee to call the proxy contract after the prescribed event has taken place, the reserved transaction is guaranteed to get released. We implement EventWarden over the Ethereum official test network. The results demonstrate that EventWarden is effective and is ready to use in practice."} {"_id": [78], "label": "math.AC", "text": "On derived functors of graded local cohomology modules II. Let R K X 1, ldots, X n where K is a field of characteristic zero, and let A n(K) be the n th Weyl algebra over K . We give standard grading on R and A n(K) . Let I , J be homogeneous ideals of R . Let M H i I(R) and N H j J(R) for some i, j . We show that Ext A n(K) nu (M,N) is concentrated in degree zero for all nu geq 0 , i.e., Ext A n(K) nu (M,N) l 0 for l neq0 . This proves a conjecture stated in part I of this paper."} {"_id": [26], "label": "math.RT", "text": "Essential orders on stratified algebras with duality and mathcal S subcategories in mathcal O . We prove uniqueness of the essential order for stratified algebras having simple preserving duality, generalizing a recent result of Coulembier for quasi hereditary algebras. We apply this to classify, up to equivalence, regular integral blocks of mathcal S subcategories in the BGG category mathcal O . We also describe various homological invariants of these blocks."} {"_id": [32, 21], "label": "cs.DS math.CO", "text": "An O(n) time algorithm for finding Hamilton cycles with high probability. We design a randomized algorithm that finds a Hamilton cycle in mathcal O (n) time with high probability in a random graph G n,p with edge probability p ge C log n n . This closes a gap left open in a seminal paper by Angluin and Valiant from 1979."} {"_id": [41, 14], "label": "cs.RO cs.HC", "text": "DronePick Object Picking and Delivery Teleoperation with the Drone Controlled by a Wearable Tactile Display. We report on the teleoperation system DronePick which provides remote object picking and delivery by a human controlled quadcopter. The main novelty of the proposed system is that the human user continuously gets the visual and haptic feedback for accurate teleoperation. DronePick consists of a quadcopter equipped with a magnetic grabber, a tactile glove with finger motion tracking sensor, hand tracking system, and the Virtual Reality (VR) application. The human operator teleoperates the quadcopter by changing the position of the hand. The proposed vibrotactile patterns representing the location of the remote object relative to the quadcopter are delivered to the glove. It helps the operator to determine when the quadcopter is right above the object. When the \"pick\" command is sent by clasping the hand in the glove, the quadcopter decreases its altitude and the magnetic grabber attaches the target object. The whole scenario is in parallel simulated in VR. The air flow from the quadcopter and the relative positions of VR objects help the operator to determine the exact position of the delivered object to be picked. The experiments showed that the vibrotactile patterns were recognized by the users at the high recognition rates the average 99 recognition rate and the average 2.36s recognition time. The real life implementation of DronePick featuring object picking and delivering to the human was developed and tested."} {"_id": [32, 40], "label": "cs.DS cs.IR", "text": "Algorithms for finding k in k means. k means Clustering requires as input the exact value of k , the number of clusters. Two challenges are open (i) Is there a data determined definition of k which is provably correct and (ii) Is there a polynomial time algorithm to find k from data ? This paper provides the first affirmative answers to both these questions. As common in the literature, we assume that the data admits an unknown Ground Truth (GT) clustering with cluster centers separated. This assumption alone is not sufficient to answer Yes to (i). We assume a novel, but natural second constraint called no tight sub cluster (NTSC) which stipulates that no substantially large subset of a GT cluster can be \"tighter\" (in a sense we define) than the cluster. Our yes answer to (i) and (ii) are under these two deterministic assumptions. We also give polynomial time algorithm to identify k . Our algorithm relies on NTSC to peel off one cluster at a time by identifying points which are tightly packed. We are also able to show that our algorithm(s) apply to data generated by mixtures of Gaussians and more generally to mixtures of sub Gaussian pdf's and hence are able to find the number of components of the mixture from data. To our knowledge, previous results for these specialized settings as well, assume generally that k is given besides the data."} {"_id": [50], "label": "physics.med-ph", "text": "A Feasibility Study on Deep Learning Based Radiotherapy Dose Calculation. Purpose Various dose calculation algorithms are available for radiation therapy for cancer patients. However, these algorithms are faced with the tradeoff between efficiency and accuracy. The fast algorithms are generally less accurate, while the accurate dose engines are often time consuming. In this work, we try to resolve this dilemma by exploring deep learning (DL) for dose calculation. Methods We developed a new radiotherapy dose calculation engine based on a modified Hierarchically Densely Connected U net (HD U net) model and tested its feasibility with prostate intensity modulated radiation therapy (IMRT) cases. Mapping from an IMRT fluence map domain to a 3D dose domain requires a deep neural network of complicated architecture and a huge training dataset. To solve this problem, we first project the fluence maps to the dose domain using a modified ray tracing algorithm, and then we use the HD U net to map the ray tracing dose distribution into an accurate dose distribution calculated using a collapsed cone convolution superposition (CS) algorithm. Results It takes about one second to compute a 3D dose distribution for a typical 7 field prostate IMRT plan, which can be further reduced to achieve real time dose calculation by optimizing the network. For all eight testing patients, evaluation with Gamma Index and various clinical goals for IMRT optimization shows that the DL dose distributions are clinically identical to the CS dose distributions. Conclusions We have shown the feasibility of using DL for calculating radiotherapy dose distribution with high accuracy and efficiency."} {"_id": [3], "label": "cs.CL", "text": "Duluth at SemEval 2020 Task 7 Using Surprise as a Key to Unlock Humorous Headlines. We use pretrained transformer based language models in SemEval 2020 Task 7 Assessing the Funniness of Edited News Headlines. Inspired by the incongruity theory of humor, we use a contrastive approach to capture the surprise in the edited headlines. In the official evaluation, our system gets 0.531 RMSE in Subtask 1, 11th among 49 submissions. In Subtask 2, our system gets 0.632 accuracy, 9th among 32 submissions."} {"_id": [8, 11], "label": "physics.optics physics.app-ph", "text": "Photonic dissipation control for Kerr soliton generation in strongly Raman active media. Microcavity solitons enable miniaturized coherent frequency comb sources. However, the formation of microcavity solitons can be disrupted by stimulated Raman scattering (SRS), particularly in the emerging crystalline microcomb materials with high Raman gain. Here, we propose and implement dissipation control tailoring the energy dissipation of selected cavity modes to purposely raise lower the threshold of Raman lasing in a strongly Raman active lithium niobate microring resonator, and realize on demand soliton mode locking or Raman lasing. Numerical simulations are carried out to confirm our analyses and agree well with experiment results. Our work demonstrates an effective approach to address strong SRS for microcavity soliton generation."} {"_id": [3], "label": "cs.CL", "text": "Suggestion Mining from Online Reviews using ULMFiT. In this paper we present our approach and the system description for Sub Task A of SemEval 2019 Task 9 Suggestion Mining from Online Reviews and Forums. Given a sentence, the task asks to predict whether the sentence consists of a suggestion or not. Our model is based on Universal Language Model Fine tuning for Text Classification. We apply various pre processing techniques before training the language and the classification model. We further provide detailed analysis of the results obtained using the trained model. Our team ranked 10th out of 34 participants, achieving an F1 score of 0.7011. We publicly share our implementation at https github.com isarth SemEval9 MIDAS"} {"_id": [40, 1], "label": "cs.LG cs.IR", "text": "Hotel Recommendation System Based on User Profiles and Collaborative Filtering. Nowadays, people start to use online reservation systems to plan their vacations since they have vast amount of choices available. Selecting when and where to go from this large scale options is getting harder. In addition, sometimes consumers can miss the better options due to the wealth of information to be found on the online reservation systems. In this sense, personalized services such as recommender systems play a crucial role in decision making. Two traditional recommendation techniques are content based and collaborative filtering. While both methods have their advantages, they also have certain disadvantages, some of which can be solved by combining both techniques to improve the quality of the recommendation. The resulting system is known as a hybrid recommender system. This paper presents a new hybrid hotel recommendation system that has been developed by combining content based and collaborative filtering approaches that recommends customer the hotel they need and save them from time loss."} {"_id": [20, 7], "label": "math.NA cs.NA physics.comp-ph", "text": "A matrix free Discontinuous Galerkin method for the time dependent Maxwell equations in unbounded domains. A Discontinuous Galerkin (DG) Finite Element Method (FEM) approach for the 3D time dependent Maxwell equations in unbounded domains is presented. The method (implemented in the FEM library NGsolve) is based on the covariant transformation of a modal orthogonal polynomial basis, originally defined on a reference simplex. The approach leads to an explicit time stepping scheme for which the mass matrix to be inverted is at most d ! times !d block diagonal (in d ! !2,3 spatial dimensions) while the matrix which discretizes the curl operators on the right hand side of the system is a small reference matrix, independent from geometric properties of mesh elements. Furthermore, we show that the introduced optimizations are preserved when unbounded domains are also included in the formulation through a complex stretching based approach."} {"_id": [9, 12, 13], "label": "math.CA math.AP math.DS", "text": "Regularized variational principles for the perturbed Kepler problem. The goal of the paper is to develop a method that will combine the use of variational techniques with regularization methods in order to study existence and multiplicity results for the periodic and the Dirichlet problem associated to the perturbed Kepler system ddot x frac x x 3 p(t), quad x in mathbb R d, where d geq 1 , and p mathbb R to mathbb R d is smooth and T periodic, T 0 . The existence of critical points for the action functional associated to the problem is proved via a non local change of variables inspired by Levi Civita and Kustaanheimo Stiefel techniques. As an application we will prove that the perturbed Kepler problem has infinitely many generalized T periodic solutions for d 2 and d 3 , without any symmetry assumptions on p ."} {"_id": [3, 63], "label": "cs.DL cs.CL", "text": "A Corpus of Adpositional Supersenses for Mandarin Chinese. Adpositions are frequent markers of semantic relations, but they are highly ambiguous and vary significantly from language to language. Moreover, there is a dearth of annotated corpora for investigating the cross linguistic variation of adposition semantics, or for building multilingual disambiguation systems. This paper presents a corpus in which all adpositions have been semantically annotated in Mandarin Chinese to the best of our knowledge, this is the first Chinese corpus to be broadly annotated with adposition semantics. Our approach adapts a framework that defined a general set of supersenses according to ostensibly language independent semantic criteria, though its development focused primarily on English prepositions (Schneider et al., 2018). We find that the supersense categories are well suited to Chinese adpositions despite syntactic differences from English. On a Mandarin translation of The Little Prince, we achieve high inter annotator agreement and analyze semantic correspondences of adposition tokens in bitext."} {"_id": [42], "label": "math.DG", "text": "A local systolic inequality and Gromov's filling area conjecture. The article treats some questions around Gromov's filling area conjecture. It intended to show that any filling with volume 2 pi would not be attained and to show a local systolic inequality, implying an a priori lower estimate on the total volume. The proof of both assertions, the second of which is wrong, suffered from a computational mistake."} {"_id": [82], "label": "q-bio.MN", "text": "Glycolytic pyruvate kinase moonlighting activities in DNA replication initiation and elongation. Cells have evolved a metabolic control of DNA replication to respond to a wide range of nutritional conditions. Accumulating data suggest that this poorly understood control depends, at least in part, on Central Carbon Metabolism (CCM). In Bacillus subtilis , the glycolytic pyruvate kinase (PykA) is intricately linked to replication. This 585 amino acid long enzyme comprises a catalytic (Cat) domain that binds to phosphoenolpyruvate (PEP) and ADP to produce pyruvate and ATP, and a C terminal domain of unknown function. Interestingly, the C terminal domain termed PEPut interacts with Cat and is homologous a domain that, in other metabolic enzymes, are phosphorylated at a conserved TSH motif at the expense of PEP and ATP to drive sugar import and catalytic or regulatory activities. To gain insights into the role of PykA in replication, DNA synthesis was analyzed in various Cat and PEPut mutants grown in a medium where the metabolic activity of PykA is dispensable for growth. Measurements of replication parameters ( ori ter ratio, C period and fork speed) and of the pyruvate kinase activity showed that PykA mutants exhibit replication defects resulting from side chain modifications in the PykA protein rather than from a reduction of its metabolic activity. Interestingly, Cat and PEPut have distinct commitments in replication while Cat impacts positively and negatively replication fork speed, PEPut stimulates initiation through a process depending on Cat PEPut interaction and growth conditions. Residues binding to PEP and ADP in Cat, stabilizing the Cat PEPut interaction and belonging to the TSH motif of PEPut were found important for the commitment of PykA in replication. In vitro , PykA affects the activities of replication enzymes (the polymerase DnaE, helicase DnaC and primase DnaG) essential for initiation and elongation and genetically linked to pykA . Our results thus connect replication initiation and elongation to CCM metabolites (PEP, ATP and ADP), critical Cat and PEPut residues and to multiple links between PykA and the replication enzymes DnaE, DnaC and DnaG. We propose that PykA is endowed with a moonlighting activity that senses the concentration of signaling metabolites and interacts with replication enzymes to convey information on the cellular metabolic state to the replication machinery and adjust replication initiation and elongation to metabolism. This defines a new type of replication regulator proposed to be part of the metabolic control that gates replication in the cell cycle."} {"_id": [36, 7], "label": "physics.chem-ph physics.comp-ph", "text": "Solvent reaction coordinate for an S N 2 reaction. We study the prototypical SN2 reaction Cl CH 3 Cl to CH 3 Cl Cl in water using quantum mechanics molecular mechanics (QM MM) computer simulations with transition path sampling and inertial likelihood maximization. We have identified a new solvent coordinate to complement the original atom exchange coordinate used in the classic analysis by Chandrasekhar, Smith, and Jorgensen Ref1 . The new solvent coordinate quantifies instantaneous solvent induced polarization relative to the equilibrium average charge density at each point along the reaction pathway. On the basis of likelihood scores and committor distributions, the new solvent coordinate improves upon the description of solvent dynamical effects relative to previously proposed solvent coordinates. However, it does not increase the transmission coefficient or the accuracy of a transition state theory rate calculation."} {"_id": [0], "label": "cs.CV", "text": "Texture and Structure Two view Classification of Images. Textural and structural features can be regraded as \"two view\" feature sets. Inspired by the recent progress in multi view learning, we propose a novel two view classification method that models each feature set and optimizes the process of merging these views efficiently. Examples of implementation of this approach in classification of real world data are presented, with special emphasis on medical images. We firstly decompose fully textured images into two layers of representation, corresponding to natural stochastic textures (NST) and structural layer, respectively. The structural, edge and curve type, information is mostly represented by the local spatial phase, whereas, the pure NST has random phase and is characterized by Gaussianity and self similarity. Therefore, the NST is modeled by the 2D self similar process, fractional Brownian motion (fBm). The Hurst parameter, characteristic of fBm, specifies the roughness or irregularity of the texture. This leads us to its estimation and implementation along other features extracted from the structure layer, to build the \"two view\" features sets used in our classification scheme. A shallow neural net (NN) is exploited to execute the process of merging these feature sets, in a straightforward and efficient manner."} {"_id": [38], "label": "math.NT", "text": "Algebraicity of special L values attached to Siegel Jacobi modular forms. In this work we obtain algebraicity results on special L values attached to Siegel Jacobi modular forms. Our method relies on a generalization of the doubling method to the Jacobi group obtained in our previous work, and on introducing a notion of near holomorphy for Siegel Jacobi modular forms. Some of our results involve also holomorphic projection, which we obtain by using Siegel Jacobi Poincar 'e series of exponential type."} {"_id": [46], "label": "math.AG", "text": "Cohomology and the Brauer groups of diagonal surfaces. We present a method for calculating the Brauer group of a surface given by a diagonal equation in the projective space. For diagonal quartic surfaces with coefficients in Q we determine the Brauer groups over Q and Q(i)."} {"_id": [15], "label": "cs.IT math.IT", "text": "Secure Groupcast Extra Entropic Structure and Linear Feasibility. In the secure groupcast problem, a transmitter wants to securely groupcast a message with the maximum rate to the first N of K receivers by broadcasting with the minimum bandwidth, where the K receivers are each equipped with a key variable from a known joint distribution. Examples are provided to prove that different instances of secure groupcast that have the same entropic structure, i.e., the same entropy for all subsets of the key variables, can have different maximum groupcast rates and different minimum broadcast bandwidth. Thus, extra entropic structure matters for secure groupcast. Next, the maximum groupcast rate is explored when the key variables are generic linear combinations of a basis set of independent key symbols, i.e., the keys lie in generic subspaces. The maximum groupcast rate is characterized when the dimension of each key subspace is either small or large, i.e., the extreme regimes. For the intermediate regime, various interference alignment schemes originated from wireless interference networks, such as eigenvector based and asymptotic schemes, are shown to be useful."} {"_id": [17, 43], "label": "cs.DC cs.DB", "text": "Comprehensive Framework of RDMA enabled Concurrency Control Protocols. In this paper, we develop RCC, the first unified and comprehensive RDMA enabled distributed transaction processing framework supporting six serializable concurrency control protocols not only the classical protocols NOWAIT, WAITDIE, and OCC, but also more advanced MVCC and SUNDIAL, and even CALVIN, the deterministic concurrency control protocol. Our goal is to unbiasedly compare the protocols in a common execution environment with the concurrency control protocol being the only changeable component. We focus on the correct and efficient implementation using key techniques, such as co routines, outstanding requests, and doorbell batching, with two sided and one sided communication primitives. Based on RCC, we get the deep insights that cannot be obtained by any existing systems. Most importantly, we obtain the execution stage latency breakdowns with one sided and two sided primitive for each protocol, which are analyzed to develop more efficient hybrid implementations. Our results show that three hybrid designs are indeed better than both one sided and two sided implementations by up to 17.8 . We believe that RCC is a significant advance over the state of the art it can both provide performance insights and be used as the common infrastructure for fast prototyping new implementations."} {"_id": [18, 46], "label": "math.AG math.GT", "text": "Arithmeticity of the monodromy of the Wiman Edge pencil. The em Wiman Edge pencil is the universal family Cs mathcal B of projective, genus 6 , complex algebraic curves admitting a faithful action of the icosahedral group Af 5 . The goal of this paper is to prove that the monodromy of Cs mathcal B is commensurable with a Hilbert modular group in particular is arithmetic. We then give a modular interpretation of this, as well as a uniformization of mathcal B ."} {"_id": [64, 59], "label": "cs.SI physics.soc-ph", "text": "Predicting Evacuation Decisions using Representations of Individuals' Pre Disaster Web Search Behavior. Predicting the evacuation decisions of individuals before the disaster strikes is crucial for planning first response strategies. In addition to the studies on post disaster analysis of evacuation behavior, there are various works that attempt to predict the evacuation decisions beforehand. Most of these predictive methods, however, require real time location data for calibration, which are becoming much harder to obtain due to the rising privacy concerns. Meanwhile, web search queries of anonymous users have been collected by web companies. Although such data raise less privacy concerns, they have been under utilized for various applications. In this study, we investigate whether web search data observed prior to the disaster can be used to predict the evacuation decisions. More specifically, we utilize a \"session based query encoder\" that learns the representations of each user's web search behavior prior to evacuation. Our proposed approach is empirically tested using web search data collected from users affected by a major flood in Japan. Results are validated using location data collected from mobile phones of the same set of users as ground truth. We show that evacuation decisions can be accurately predicted (84 ) using only the users' pre disaster web search data as input. This study proposes an alternative method for evacuation prediction that does not require highly sensitive location data, which can assist local governments to prepare effective first response strategies."} {"_id": [0], "label": "cs.CV", "text": "Deep Comprehensive Correlation Mining for Image Clustering. Recent developed deep unsupervised methods allow us to jointly learn representation and cluster unlabelled data. These deep clustering methods mainly focus on the correlation among samples, e.g., selecting high precision pairs to gradually tune the feature representation, which neglects other useful correlations. In this paper, we propose a novel clustering framework, named deep comprehensive correlation mining(DCCM), for exploring and taking full advantage of various kinds of correlations behind the unlabeled data from three aspects 1) Instead of only using pair wise information, pseudo label supervision is proposed to investigate category information and learn discriminative features. 2) The features' robustness to image transformation of input space is fully explored, which benefits the network learning and significantly improves the performance. 3) The triplet mutual information among features is presented for clustering problem to lift the recently discovered instance level deep mutual information to a triplet level formation, which further helps to learn more discriminative features. Extensive experiments on several challenging datasets show that our method achieves good performance, e.g., attaining 62.3 clustering accuracy on CIFAR 10, which is 10.1 higher than the state of the art results."} {"_id": [32, 21], "label": "cs.DS math.CO", "text": "A remark on approximating permanents of positive definite matrices. Let A be an n times n positive definite Hermitian matrix with all eigenvalues between 1 and 2. We represent the permanent of A as the integral of some explicit log concave function on Bbb R 2n . Consequently, there is a fully polynomial randomized approximation scheme (FPRAS) for the permanent of A ."} {"_id": [9], "label": "math.AP", "text": "Elliptic problems with nonclassical boundary conditions in an extended Sobolev scale. We consider elliptic problems with nonclassical boundary conditions that contain additional unknown functions on the border of the domain of the elliptic equation and also contain boundary operators of higher orders with respect to the order of this equation. We investigate the solvability of the indicated problems and properties of their solutions in an extended Sobolev scale. It consists of Hilbert generalized Sobolev spaces for which the order of regularity is a general radial function mathrm RO varying in the sense of Avakumovi ' c at infinity. We establish a theorem on the Fredholm property of the indicated problems on appropriate pairs of these spaces and theorems on the regularity and a priori estimate of the generalized solutions to the problems. We obtain exact sufficient conditions for components of these solutions to be continuously differentiable."} {"_id": [0], "label": "cs.CV", "text": "Attributes Aware Face Generation with Generative Adversarial Networks. Recent studies have shown remarkable success in face image generations. However, most of the existing methods only generate face images from random noise, and cannot generate face images according to the specific attributes. In this paper, we focus on the problem of face synthesis from attributes, which aims at generating faces with specific characteristics corresponding to the given attributes. To this end, we propose a novel attributes aware face image generator method with generative adversarial networks called AFGAN. Specifically, we firstly propose a two path embedding layer and self attention mechanism to convert binary attribute vector to rich attribute features. Then three stacked generators generate 64 times 64 , 128 times 128 and 256 times 256 resolution face images respectively by taking the attribute features as input. In addition, an image attribute matching loss is proposed to enhance the correlation between the generated images and input attributes. Extensive experiments on CelebA demonstrate the superiority of our AFGAN in terms of both qualitative and quantitative evaluations."} {"_id": [25, 42, 9], "label": "math.PR math.AP math.DG", "text": "The entropy method under curvature dimension conditions in the spirit of Bakry 'Emery in the discrete setting of Markov chains. We consider continuous time (not necessarily finite) Markov chains on discrete spaces and identify a curvature dimension inequality, the condition CD Upsilon( kappa, infty) , which serves as a natural analogue of the classical Bakry 'Emery condition CD( kappa, infty) in several respects. In particular, it is tailor made to the classical approach of proofing the modified logarithmic Sobolev inequality via computing and estimating the second time derivative of the entropy along the heat flow generated by the generator of the Markov chain. We prove that curvature bounds in the sense of CD Upsilon are preserved under tensorization, discuss links to other notions of discrete curvature and consider a variety of examples including complete graphs, the hypercube and birth death processes. We further consider power type entropies and determine, in the same spirit, a natural CD condition which leads to Beckner inequalities. The CD Upsilon condition is also shown to be compatible with the diffusive setting, in the sense that corresponding hybrid processes enjoy a tensorization property."} {"_id": [16, 17, 7], "label": "physics.comp-ph cs.DC q-bio.QM", "text": "Enabling Simulation of High Dimensional Micro Macro Biophysical Models through Hybrid CPU and Multi GPU Parallelism. Micro macro models provide a powerful tool to study the relationship between microscale mechanisms and emergent macroscopic behavior. However, the detailed microscopic modeling may require tracking and evolving a high dimensional configuration space at high computational cost. In this work, we present a parallel algorithm for simulation a high dimensional micro macro model of a gliding motility assay. We utilize a holistic approach aligning the data residency and simulation scales with the hybrid CPU and multi GPU hardware. With a combination of algorithmic modifications, GPU optimizations, and scaling to multiple GPUs, we achieve speedup factors of up to 27 over our previous hybrid CPU GPU implementation and up to 540 over our single threaded implementation. This approach enables micro macro simulations of higher complexity and resolution than would otherwise be feasible."} {"_id": [65], "label": "cs.NI", "text": "The multifractal load balancing method. The load balancing system, built on the basis of a subsystem load balancer and subsystem control and monitoring that closely interact with each other was propose in work. This system is presented as a queuing system with priority service discipline. In the described queuing system parallel processing flow applications occur in the multiple serving devices and successive junction of them into unified stream is done. The method of multifractal load balancing is submited on the basis of the developed system of load balancing."} {"_id": [72, 65], "label": "cs.NI cs.PF", "text": "Performance of RPL in Healthcare Wireless Sensor Network. The new advances of the Internet of Things (IoT) technology can be utilized to promote service delivery in several real life applications such as healthcare systems. The Routing Protocol for Low Power and Loss Network (RPL) is a routing protocol designed to serve as a proper routing protocol for packets in Wireless Sensor Networks (WSN). Among the most prominent issues exist in the RPL protocol are packet loss within the WSN and sensors power consumption especially in healthcare WSNs. Multiple Objective Functions (OF) in RPL intended to find the routes from source nodes to a destination node. This paper presents an evaluation to discover which OF is more efficient for a WSN in a healthcare scenario where the Packet Delivery Ratio (PDR) of WSN and the sensors' power consumption are prominent concerns. Expected transmission Count (ETX) and Objective Function Zero (OF0) of RPL were examined in various network densities and network topologies such as the grid and random topology. The simulation outcomes revealed that the OF0 is more efficient regarding the PDR and power consumption compared to the ETX in random"} {"_id": [83, 14], "label": "cs.MM cs.HC", "text": "Rhythm Dungeon A Blockchain based Music Roguelike Game. Rhythm Dungeon is a rhythm game which leverages the blockchain as a shared open database. During the gaming session, the player explores a roguelike dungeon by inputting specific sequences in time to music rhythm. By integrating smart contract to the game program, the enemies through the venture are generated from other games which share the identical blockchain. On the other hand, the player may upload their characters at the end of their journey, so that their own character may appear in other games and make an influence. Rhythm Dungeon is designed and implemented to show the potential of decentralized gaming experience, which utilizes the blockchain to provide asynchronous interactions among massive players."} {"_id": [0, 1, 2], "label": "cs.LG cs.AI cs.CV", "text": "A Unified Approach to Interpreting and Boosting Adversarial Transferability. In this paper, we use the interaction inside adversarial perturbations to explain and boost the adversarial transferability. We discover and prove the negative correlation between the adversarial transferability and the interaction inside adversarial perturbations. The negative correlation is further verified through different DNNs with various inputs. Moreover, this negative correlation can be regarded as a unified perspective to understand current transferability boosting methods. To this end, we prove that some classic methods of enhancing the transferability essentially decease interactions inside adversarial perturbations. Based on this, we propose to directly penalize interactions during the attacking process, which significantly improves the adversarial transferability."} {"_id": [88], "label": "physics.atm-clus", "text": "Ignition of a helium nanoplasma by x ray multiple ionization of a heavy rare gas core. The dynamics of an x ray ionized two component core shell nanosystem is probed using doped helium (He) nanodroplets. First, a soft x ray pump pulse selectively inner shell ionizes the core cluster formed of heavier rare gas atoms, causing electron migration from the He shell to the highly charged core. This ignites a He nanoplasma which is then driven by an intense near infrared probe pulse. The ultrafast charge redistribution, evidenced by the rise of He and He 2 ion yields from the nanoplasma within 70 fs, leads to strong damping of the core cluster expansion. Thus, He droplets act as efficient tampers that reduce the radiation damage of embedded nanostructures, a property that could be exploited for improving coherent diffraction images."} {"_id": [0, 41, 1], "label": "cs.RO cs.CV cs.LG", "text": "Accurate Vision based Manipulation through Contact Reasoning. Planning contact interactions is one of the core challenges of many robotic tasks. Optimizing contact locations while taking dynamics into account is computationally costly and, in environments that are only partially observable, executing contact based tasks often suffers from low accuracy. We present an approach that addresses these two challenges for the problem of vision based manipulation. First, we propose to disentangle contact from motion optimization. Thereby, we improve planning efficiency by focusing computation on promising contact locations. Second, we use a hybrid approach for perception and state estimation that combines neural networks with a physically meaningful state representation. In simulation and real world experiments on the task of planar pushing, we show that our method is more efficient and achieves a higher manipulation accuracy than previous vision based approaches."} {"_id": [73], "label": "q-bio.TO", "text": "A tractable mathematical model for tissue growth. Using formal asymptotic methods we derive a free boundary problem representing one of the simplest mathematical descriptions of the growth and death of a tumour or other biological tissue. The mathematical model takes the form of a closed interface evolving via forced mean curvature flow (together with a kinetic under cooling' regularisation) where the forcing depends on the solution of a PDE that holds in the domain enclosed by the interface. We perform linear stability analysis and derive a diffuse interface approximation of the model. Finite element discretisations of two closely related models are presented, together with computational results comparing the approximate solutions."} {"_id": [20], "label": "math.NA cs.NA", "text": "Adaptive Importance Sampling based Neural Network framework for Reliability and Sensitivity Prediction for Variable Stiffness Composite Laminates with hybrid uncertainties. In this work, we propose to leverage the advantages of both the Artificial Neural Network (ANN) based Second Order Reliability Method (SORM) and Importance sampling to yield an Adaptive Importance Sampling based ANN, with specific application towards failure probability and sensitivity estimates of Variable Stiffness Composite Laminate (VSCL) plates, in the presence of multiple independent geometric and material uncertainties. The performance function for the case studies is defined based on the fundamental frequency of the VSCL plate. The accuracy in both the reliability estimates and sensitivity studies using the proposed method were found to be in close agreement with that obtained using the ANN based brute force MCS method, with a significant computational savings of 95 . Moreover, the importance of taking into account the randomness in ply thickness for failure probability estimates is also highlighted quantitatively under the sensitivity studies section."} {"_id": [0], "label": "cs.CV", "text": "Action Duration Prediction for Segment Level Alignment of Weakly Labeled Videos. This paper focuses on weakly supervised action alignment, where only the ordered sequence of video level actions is available for training. We propose a novel Duration Network, which captures a short temporal window of the video and learns to predict the remaining duration of a given action at any point in time with a level of granularity based on the type of that action. Further, we introduce a Segment Level Beam Search to obtain the best alignment, that maximizes our posterior probability. Segment Level Beam Search efficiently aligns actions by considering only a selected set of frames that have more confident predictions. The experimental results show that our alignments for long videos are more robust than existing models. Moreover, the proposed method achieves state of the art results in certain cases on the popular Breakfast and Hollywood Extended datasets."} {"_id": [12], "label": "math.CA", "text": "Partial solutions to several conjectures on completely monotonic degrees for remainders in asymptotic expansions of the digamma function. Motivated by several conjectures posed in the paper \"F. Qi and A. Q. Liu, Completely monotonic degrees for a difference between the logarithmic and psi functions, J. Comput. Appl. Math., vol. 361, pp. 366 371 (2019) available online at https doi.org 10.1016 j.cam.2019.05.001\", the authors compute several completely monotonic degrees of the remainders in the asymptotic expansions of the logarithm of the gamma function and in the asymptotic expansions of the logarithm of the digamma function."} {"_id": [0], "label": "cs.CV", "text": "Training Quantized Neural Networks with a Full precision Auxiliary Module. In this paper, we seek to tackle a challenge in training low precision networks the notorious difficulty in propagating gradient through a low precision network due to the non differentiable quantization function. We propose a solution by training the low precision network with a fullprecision auxiliary module. Specifically, during training, we construct a mix precision network by augmenting the original low precision network with the full precision auxiliary module. Then the augmented mix precision network and the low precision network are jointly optimized. This strategy creates additional full precision routes to update the parameters of the low precision model, thus making the gradient back propagates more easily. At the inference time, we discard the auxiliary module without introducing any computational complexity to the low precision network. We evaluate the proposed method on image classification and object detection over various quantization approaches and show consistent performance increase. In particular, we achieve near lossless performance to the full precision model by using a 4 bit detector, which is of great practical value."} {"_id": [21], "label": "math.CO", "text": "Hamiltonian and Pseudo Hamiltonian Cycles and Fillings In Simplicial Complexes. We introduce and study a d dimensional generalization of Hamiltonian cycles in graphs the Hamiltonian d cycles in K n d (the complete simplicial d complex over a vertex set of size n ). Those are the simple d cycles of a complete rank, or, equivalently, of size 1 n 1 choose d . The discussion is restricted to the fields F 2 and Q . For d 2 , we characterize the n 's for which Hamiltonian 2 cycles exist. For d 3 it is shown that Hamiltonian 3 cycles exist for infinitely many n 's. In general, it is shown that there always exist simple d cycles of size n 1 choose d O(n d 3 ) . All the above results are constructive. Our approach naturally extends to (and in fact, involves) d fillings, generalizing the notion of T joins in graphs. Given a (d 1) cycle Z d 1 in K n d , F is its d filling if partial F Z d 1 . We call a d filling Hamiltonian if it is acyclic and of a complete rank, or, equivalently, is of size n 1 choose d . If a Hamiltonian d cycle Z over F 2 contains a d simplex sigma , then Z setminus sigma is a a Hamiltonian d filling of partial sigma (a closely related fact is also true for cycles over Q ). Thus, the two notions are closely related. Most of the above results about Hamiltonian d cycles hold for Hamiltonian d fillings as well."} {"_id": [68], "label": "cs.DM", "text": "Integer Programming Approaches to Balanced Connected k Partition. We address the problem of partitioning a vertex weighted connected graph into k connected subgraphs that have similar weights, for a fixed integer k geq 2 . This problem, known as the emph balanced connected k partition problem ( BCP k ), is defined as follows. Given a connected graph G with nonnegative weights on the vertices, find a partition V i i 1 k of V(G) such that each class V i induces a connected subgraph of G , and the weight of a class with the minimum weight is as large as possible. It is known that BCP k is NP hard even on bipartite graphs and on interval graphs. It has been largely investigated under different approaches and perspectives. On the practical side, BCP k is used to model many applications arising in police patrolling, image processing, cluster analysis, operating systems and robotics. We propose three integer linear programming formulations for the balanced connected k partition problem. The first one contains only binary variables and a potentially large number of constraints that are separable in polynomial time. Some polyhedral results on this formulation, when all vertices have unit weight, are also presented. The other formulations are based on flows and have a polynomial number of constraints and variables. Preliminary computational experiments have shown that the proposed formulations outperform the other formulations presented in the literature."} {"_id": [20], "label": "math.NA cs.NA", "text": "HMG Homogeneous multigrid for HDG. We introduce a homogeneous multigrid method in the sense that it uses the same HDG discretization scheme for Poisson's equation on all levels. In particular, we construct a stable injection operator and prove optimal convergence of the method under the assumption of elliptic regularity. Numerical experiments underline our analytical findings."} {"_id": [38], "label": "math.NT", "text": "M \"obius orthogonality of sequences with maximal entropy. We prove that strongly b multiplicative functions of modulus 1 along squares are asymptotically orthogonal to the M \"obius function. This provides examples of sequences having maximal entropy and satisfying this property."} {"_id": [12], "label": "math.CA", "text": "Lobachevsky type Formulas via Fourier Analysis. Recently renewed interest in the Lobachevsky type integrals and interesting identities involving the cardinal sine motivate an extension of the classical Parseval formula involving both periodic and non periodic functions. We develop a version of the Parseval formula that is often more practical in applications and illustrate its use by extending recent results on Lobachevsky type integrals. Some previously known, interesting identities are re proved in a more transparent manner and new formulas for integrals involving cardinal sine and Bessel functions are given."} {"_id": [65, 19], "label": "cs.CR cs.NI", "text": "Towards Generating Benchmark Datasets for Worm Infection Studies. Worm origin identification and propagation path reconstruction are among the essential problems in digital forensics. Until now, several methods have been proposed for this purpose. However, evaluating these methods is a big challenge because there are no suitable datasets containing both normal background traffic and worm traffic to evaluate these methods. In this paper, we investigate different methods of generating such datasets and suggest a technique for this purpose. ReaSE is a tool for the creation of realistic simulation environments. However, it needs some modifications to be suitable for generating the datasets. So we make required modifications to it. Then, we generate several datasets for Slammer, Code Red I, Code Red II and modified versions of these worms in different scenarios using our technique and make them publicly available."} {"_id": [3], "label": "cs.CL", "text": "Generating an Overview Report over Many Documents. How to efficiently generate an accurate, well structured overview report (ORPT) over thousands of related documents is challenging. A well structured ORPT consists of sections of multiple levels (e.g., sections and subsections). None of the existing multi document summarization (MDS) algorithms is directed toward this task. To overcome this obstacle, we present NDORGS (Numerous Documents' Overview Report Generation Scheme) that integrates text filtering, keyword scoring, single document summarization (SDS), topic modeling, MDS, and title generation to generate a coherent, well structured ORPT. We then devise a multi criteria evaluation method using techniques of text mining and multi attribute decision making on a combination of human judgments, running time, information coverage, and topic diversity. We evaluate ORPTs generated by NDORGS on two large corpora of documents, where one is classified and the other unclassified. We show that, using Saaty's pairwise comparison 9 point scale and under TOPSIS, the ORPTs generated on SDS's with the length of 20 of the original documents are the best overall on both datasets."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "ClusterFace Joint Clustering and Classification for Set Based Face Recognition. Deep learning technology has enabled successful modeling of complex facial features when high quality images are available. Nonetheless, accurate modeling and recognition of human faces in real world scenarios on the wild' or under adverse conditions remains an open problem. When unconstrained faces are mapped into deep features, variations such as illumination, pose, occlusion, etc., can create inconsistencies in the resultant feature space. Hence, deriving conclusions based on direct associations could lead to degraded performance. This rises the requirement for a basic feature space analysis prior to face recognition. This paper devises a joint clustering and classification scheme which learns deep face associations in an easy to hard way. Our method is based on hierarchical clustering where the early iterations tend to preserve high reliability. The rationale of our method is that a reliable clustering result can provide insights on the distribution of the feature space, that can guide the classification that follows. Experimental evaluations on three tasks, face verification, face identification and rank order search, demonstrates better or competitive performance compared to the state of the art, on all three experiments."} {"_id": [68, 21], "label": "math.CO cs.DM", "text": "Green functions of Energized complexes. If h is a ring valued function on a simplicial complex G we can define two matrices L and g, where the matrix entries are the h energy of homoclinic intersections. We know that the sum over all h values on G is equal to the sum of the Green matrix entries g(x,y). We also have already seen that that the determinants of L or g are both the product of the h(x). In the case where h(x) is the parity of dimension, the sum of the energy values was the standard Euler characteristic and the determinant was a unit. If h(x) was the unit in the ring then L,g are integral quadratic forms which are isospectral and inverse matrices of each other. We prove here that the quadratic energy expression summing over all pairs h(x) h(y) of intersecting sets is a signed sum of squares of Green function entries. The quadratic energy expression is Wu characteristic in the case when h is dimension parity. For general h, the quadratic energy expression resembles an Ising Heisenberg type interaction. The conjugate of g is the inverse of L if h takes unit values in a normed ring or in the group of unitary operators in an operator algebra."} {"_id": [89, 20], "label": "math.NA cs.NA q-bio.CB", "text": "A Conservative Finite Element ALE Scheme for Mass Conserving Reaction Diffusion Equations on Evolving Two Dimensional Domains. Mass conservative reaction diffusion systems have recently been proposed as a general framework to describe intracellular pattern formation. These systems have been used to model the conformational switching of proteins as they cycle from an inactive state in the cell cytoplasm, to an active state at the cell membrane. The active state then acts as input to downstream effectors. The paradigm of activation by recruitment to the membrane underpins a range of biological pathways including G protein signalling, growth control through Ras and PI 3 kinase, and cell polarity through Rac and Rho all activate their targets by recruiting them from the cytoplasm to the membrane. Global mass conservation lies at the heart of these models reflecting the property that the total number of active and inactive forms, and targets, remains constant. Here we present a conservative arbitrary Lagrangian Eulerian (ALE) finite element method for the approximate solution of systems of bulk surface reaction diffusion equations on an evolving two dimensional domain. Fundamental to the success of the method is the robust generation of bulk and surface meshes. For this purpose, we use a moving mesh partial differential equation (MMPDE) approach. Global conservation of the fully discrete finite element solution is established independently of the ALE velocity field and the time step size. The developed method is applied to model problems with known analytical solutions these experiments indicate that the method is second order accurate and globally conservative. The method is further applied to a model of a single cell migrating in the presence of an external chemotactic signal."} {"_id": [49, 25], "label": "math.OC math.PR", "text": "Viscosity Solutions to Second Order Path Dependent Hamilton Jacobi Bellman Equations and Applications. In this article, a notion of viscosity solutions is introduced for second order path dependent Hamilton Jacobi Bellman (PHJB) equations associated with optimal control problems for path dependent stochastic differential equations. We identify the value functional of optimal control problems as unique viscosity solution to the associated PHJB equations. We also show that our notion of viscosity solutions is consistent with the corresponding notion of classical solutions, and satisfies a stability property. Applications to backward stochastic Hamilton Jacobi Bellman equations are also given."} {"_id": [0, 41, 52], "label": "cs.CV cs.MA cs.RO", "text": "Pose Assisted Multi Camera Collaboration for Active Object Tracking. Active Object Tracking (AOT) is crucial to many visionbased applications, e.g., mobile robot, intelligent surveillance. However, there are a number of challenges when deploying active tracking in complex scenarios, e.g., target is frequently occluded by obstacles. In this paper, we extend the single camera AOT to a multi camera setting, where cameras tracking a target in a collaborative fashion. To achieve effective collaboration among cameras, we propose a novel Pose Assisted Multi Camera Collaboration System, which enables a camera to cooperate with the others by sharing camera poses for active object tracking. In the system, each camera is equipped with two controllers and a switcher The vision based controller tracks targets based on observed images. The pose based controller moves the camera in accordance to the poses of the other cameras. At each step, the switcher decides which action to take from the two controllers according to the visibility of the target. The experimental results demonstrate that our system outperforms all the baselines and is capable of generalizing to unseen environments. The code and demo videos are available on our website https sites.google.com view pose assistedcollaboration."} {"_id": [41], "label": "cs.RO", "text": "Analysis of Obstacle based Probabilistic RoadMap Method using Geometric Probability. Sampling based planners have been successful in robot motion planning, with many degrees of freedom, but still remain ineffective in the presence of narrow passages within the configuration space. There exist several heuristics, which generate samples in the critical regions and improve the efficiency of probabilistic roadmap planners. In this paper, we present an evaluation of success probability of one such heuristic method, called obstacle based probabilistic roadmap planners or OBPRM, using geometric probability theory. The result indicates that the probability of success of generating free sample points around the surface of the n dimensional configuration space obstacle is directly proportional to the surface area of the obstacles."} {"_id": [13, 29], "label": "math.GR math.DS", "text": "Amenability of Bounded Automata Groups on Infinite Alphabets. We study the action of groups generated by bounded activity automata with infinite alphabets on their orbital Schreier graphs. We introduce an amenability criterion for such groups based on the recurrence of the first level action. This criterion is a natural extension of the result that all groups generated by bounded activity automata with finite alphabets are amenable. Our motivation comes from the investigation of iterated monodromy groups of entire functions."} {"_id": [20], "label": "math.NA cs.NA", "text": "Sparse spectral methods for partial differential equations on spherical caps. In recent years, sparse spectral methods for solving partial differential equations have been derived using hierarchies of classical orthogonal polynomials on intervals, disks, disk slices and triangles. In this work we extend the methodology to a hierarchy of non classical multivariate orthogonal polynomials on spherical caps. The entries of discretisations of partial differential operators can be effectively computed using formulae in terms of (non classical) univariate orthogonal polynomials. We demonstrate the results on partial differential equations involving the spherical Laplacian and biharmonic operators, showing spectral convergence."} {"_id": [20], "label": "math.NA cs.NA", "text": "A Non Standard Finite Difference Scheme for MHD Boundary Layer Fluid Flow. This paper deals with a non standard finite difference scheme defined on a quasi uniform mesh for approximate solutions of the MHD boundary layer flow of an incompressible fluid past a flat plate for a wide range of the magnetic parameter. The obtained numerical results are compared with those available in the literature. We show how to improve the obtained numerical results via a mesh refinement and a Richardson extrapolation."} {"_id": [21], "label": "math.CO", "text": "Minimal colorings for properly colored subgraphs in complete graphs. Let pr(K n , G) be the maximum number of colors in an edge coloring of K n with no properly colored copy of G . In this paper, we show that pr(K n , G) ex(n, mathcal G' ) o(n 2 ), where mathcal G' G M M text is a matching of G . Furthermore, we determine the value of pr(K n , P l ) for l ge 27 and n ge 2l 3 and the exact value of pr(K n , G) , where G is C 5 , C 6 and K 4 , respectively. Also, we give an upper bound and a lower bound of pr(K n , K 2,3 ) ."} {"_id": [1, 2, 3], "label": "cs.CL cs.AI cs.LG", "text": "Out of the Echo Chamber Detecting Countering Debate Speeches. An educated and informed consumption of media content has become a challenge in modern times. With the shift from traditional news outlets to social media and similar venues, a major concern is that readers are becoming encapsulated in \"echo chambers\" and may fall prey to fake news and disinformation, lacking easy access to dissenting views. We suggest a novel task aiming to alleviate some of these concerns that of detecting articles that most effectively counter the arguments and not just the stance made in a given text. We study this problem in the context of debate speeches. Given such a speech, we aim to identify, from among a set of speeches on the same topic and with an opposing stance, the ones that directly counter it. We provide a large dataset of 3,685 such speeches (in English), annotated for this relation, which hopefully would be of general interest to the NLP community. We explore several algorithms addressing this task, and while some are successful, all fall short of expert human performance, suggesting room for further research. All data collected during this work is freely available for research."} {"_id": [32, 43], "label": "cs.DB cs.DS", "text": "Random Sampling for Group By Queries. Random sampling has been widely used in approximate query processing on large databases, due to its potential to significantly reduce resource usage and response times, at the cost of a small approximation error. We consider random sampling for answering the ubiquitous class of group by queries, which first group data according to one or more attributes, and then aggregate within each group after filtering through a predicate. The challenge with group by queries is that a sampling method cannot focus on optimizing the quality of a single answer (e.g. the mean of selected data), but must simultaneously optimize the quality of a set of answers (one per group). We present CVOPT, a query and data driven sampling framework for a set of group by queries. To evaluate the quality of a sample, CVOPT defines a metric based on the norm (e.g. ell 2 or ell infty ) of the coefficients of variation (CVs) of different answers, and constructs a stratified sample that provably optimizes the metric. CVOPT can handle group by queries on data where groups have vastly different statistical characteristics, such as frequencies, means, or variances. CVOPT jointly optimizes for multiple aggregations and multiple group by clauses, and provides a way to prioritize specific groups or aggregates. It can be tuned to cases when partial information about a query workload is known, such as a data warehouse where queries are scheduled to run periodically. Our experimental results show that CVOPT outperforms current state of the art on sample quality and estimation accuracy for group by queries. On a set of queries on two real world data sets, CVOPT yields relative errors that are 5x smaller than competing approaches, under the same space budget."} {"_id": [49], "label": "math.OC", "text": "Bi fidelity Stochastic Gradient Descent for Structural Optimization under Uncertainty. The presence of uncertainty in material properties and geometry of a structure is ubiquitous. The design of robust engineering structures, therefore, needs to incorporate uncertainty in the optimization process. Stochastic gradient descent (SGD) method can alleviate the cost of optimization under uncertainty, which includes statistical moments of quantities of interest in the objective and constraints. However, the design may change considerably during the initial iterations of the optimization process which impedes the convergence of the traditional SGD method and its variants. In this paper, we present two SGD based algorithms, where the computational cost is reduced by employing a low fidelity model in the optimization process. In the first algorithm, most of the stochastic gradient calculations are performed on the low fidelity model and only a handful of gradients from the high fidelity model are used per iteration, resulting in an improved convergence. In the second algorithm, we use gradients from low fidelity models to be used as control variate, a variance reduction technique, to reduce the variance in the search direction. These two bi fidelity algorithms are illustrated first with a conceptual example. Then, the convergence of the proposed bi fidelity algorithms is studied with two numerical examples of shape and topology optimization and compared to popular variants of the SGD method that do not use low fidelity models. The results show that the proposed use of a bi fidelity approach for the SGD method can improve the convergence. Two analytical proofs are also provided that show the linear convergence of these two algorithms under appropriate assumptions."} {"_id": [35, 77], "label": "math.LO math.RA", "text": "Some stable non elementary classes of modules. Fisher Fis75 and Baur Bau75 showed independently in the seventies that if T is a complete first order theory extending the theory of modules, then the class of models of T with pure embeddings is stable. In Maz4, 2.12 , it is asked if the same is true for any abstract elementary class (K, leq p) such that K is a class of modules and leq p is the pure submodule relation. In this paper we give some instances where this is true textbf Theorem. Assume R is an associative ring with unity. Let (K, leq p) be an AEC such that K subseteq R text Mod and K is closed under finite direct sums, then If K is closed under pure injective envelopes, then (K, leq p) is lambda stable for every lambda geq LS(K) such that lambda R aleph 0 lambda . If K is closed under pure submodules and pure epimorphic images, then (K, leq p) is lambda stable for every lambda such that lambda R aleph 0 lambda . Assume R is Von Neumann regular. If K is closed under submodules and has arbitrarily large models, then (K, leq p) is lambda stable for every lambda such that lambda R aleph 0 lambda . As an application of these results we give new characterizations of noetherian rings, pure semisimple rings, dedekind domains, and fields via superstability. Moreover, we show how these results can be used to show a link between being good in the stability hierarchy and being good in the axiomatizability hierarchy. Another application is the existence of universal models with respect to pure embeddings in several classes of modules. Among them, the class of flat modules and the class of injective torsion modules."} {"_id": [93], "label": "physics.class-ph", "text": "Configurational forces and nonlinear structural dynamics. Configurational, or Eshelby like, forces are shown to strongly influence the nonlinear dynamics of an elastic rod constrained with a frictionless sliding sleeve at one end and with an attached mass at the other end. The configurational force, generated at the sliding sleeve constraint and proportional to the square of the bending moment realized there, has been so far investigated only under quasi static setting and is now confirmed (through a variational argument) to be present within a dynamic framework. The deep influence of configurational forces on the dynamics is shown both theoretically (through the development of a dynamic nonlinear model in which the rod is treated as a nonlinear spring, obeying the Euler elastica, with negligible inertia) and experimentally (through a specifically designed experimental set up). During the nonlinear dynamics, the elastic rod may slip alternatively in and out from the sliding sleeve, becoming a sort of nonlinear oscillator displaying a motion eventually ending with the rod completely injected into or completely ejected from the sleeve. The present results may find applications in the dynamics of compliant and extensible devices, for instance, to guide the movement of a retractable and flexible robot arm."} {"_id": [0], "label": "cs.CV", "text": "Computer Stereo Vision for Autonomous Driving. As an important component of autonomous systems, autonomous car perception has had a big leap with recent advances in parallel computing architectures. With the use of tiny but full feature embedded supercomputers, computer stereo vision has been prevalently applied in autonomous cars for depth perception. The two key aspects of computer stereo vision are speed and accuracy. They are both desirable but conflicting properties, as the algorithms with better disparity accuracy usually have higher computational complexity. Therefore, the main aim of developing a computer stereo vision algorithm for resource limited hardware is to improve the trade off between speed and accuracy. In this chapter, we introduce both the hardware and software aspects of computer stereo vision for autonomous car systems. Then, we discuss four autonomous car perception tasks, including 1) visual feature detection, description and matching, 2) 3D information acquisition, 3) object detection recognition and 4) semantic image segmentation. The principles of computer stereo vision and parallel computing on multi threading CPU and GPU architectures are then detailed."} {"_id": [1], "label": "cs.LG", "text": "An Evaluation of Classification Methods for 3D Printing Time Series Data. Additive Manufacturing presents a great application area for Machine Learning because of the vast volume of data generated and the potential to mine this data to control outcomes. In this paper we present preliminary work on classifying infrared time series data representing melt pool temperature in a metal 3D printing process. Our ultimate objective is to use this data to predict process outcomes (e.g. hardness, porosity, surface roughness). In the work presented here we simply show that there is a signal in this data that can be used for the classification of different components and stages of the AM process. In line with other Machine Learning research on time series classification we use k Nearest Neighbour classifiers. The results we present suggests that Dynamic Time Warping is an effective distance measure compared with alternatives for 3D printing data of this type."} {"_id": [48, 68], "label": "cs.DM cs.CC", "text": "The Computational Complexity of Finding Temporal Paths under Waiting Time Constraints. Computing a (short) path between two vertices is one of the most fundamental primitives in graph algorithmics. In recent years, the study of paths in temporal graphs, that is, graphs where the vertex set is fixed but the edge set changes over time, gained more and more attention. A path is time respecting, or temporal, if it uses edges with non decreasing time stamps. We investigate a basic constraint for temporal paths, where the time spent at each vertex must not exceed a given duration Delta , referred to as Delta restless temporal paths. This constraint arises naturally in the modeling of real world processes like packet routing in communication networks and infection transmission routes of diseases where recovery confers lasting resistance. While finding temporal paths without waiting time restrictions is known to be doable in polynomial time, we show that the \"restless variant\" of this problem becomes computationally hard even in very restrictive settings. For example, it is W 1 hard when parameterized by the distance to disjoint path of the underlying graph, which implies W 1 hardness for many other parameters like feedback vertex number and pathwidth. A natural question is thus whether the problem becomes tractable in some natural settings. We explore several natural parameterizations, presenting FPT algorithms for three kinds of parameters (1) output related parameters (here, the maximum length of the path), (2) classical parameters applied to the underlying graph (e.g., feedback edge number), and (3) a new parameter called timed feedback vertex number, which captures finer grained temporal features of the input temporal graph, and which may be of interest beyond this work."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Spatio Temporal Analysis of Facial Actions using Lifecycle Aware Capsule Networks. Most state of the art approaches for Facial Action Unit (AU) detection rely upon evaluating facial expressions from static frames, encoding a snapshot of heightened facial activity. In real world interactions, however, facial expressions are usually more subtle and evolve in a temporal manner requiring AU detection models to learn spatial as well as temporal information. In this paper, we focus on both spatial and spatio temporal features encoding the temporal evolution of facial AU activation. For this purpose, we propose the Action Unit Lifecycle Aware Capsule Network (AULA Caps) that performs AU detection using both frame and sequence level features. While at the frame level the capsule layers of AULA Caps learn spatial feature primitives to determine AU activations, at the sequence level, it learns temporal dependencies between contiguous frames by focusing on relevant spatio temporal segments in the sequence. The learnt feature capsules are routed together such that the model learns to selectively focus more on spatial or spatio temporal information depending upon the AU lifecycle. The proposed model is evaluated on the commonly used BP4D and GFT benchmark datasets obtaining state of the art results on both the datasets."} {"_id": [0], "label": "cs.CV", "text": "Exemplar Guided Face Image Super Resolution without Facial Landmarks. Nowadays, due to the ubiquitous visual media there are vast amounts of already available high resolution (HR) face images. Therefore, for super resolving a given very low resolution (LR) face image of a person it is very likely to find another HR face image of the same person which can be used to guide the process. In this paper, we propose a convolutional neural network (CNN) based solution, namely GWAInet, which applies super resolution (SR) by a factor 8x on face images guided by another unconstrained HR face image of the same person with possible differences in age, expression, pose or size. GWAInet is trained in an adversarial generative manner to produce the desired high quality perceptual image results. The utilization of the HR guiding image is realized via the use of a warper subnetwork that aligns its contents to the input image and the use of a feature fusion chain for the extracted features from the warped guiding image and the input image. In training, the identity loss further helps in preserving the identity related features by minimizing the distance between the embedding vectors of SR and HR ground truth images. Contrary to the current state of the art in face super resolution, our method does not require facial landmark points for its training, which helps its robustness and allows it to produce fine details also for the surrounding face region in a uniform manner. Our method GWAInet produces photo realistic images in upscaling factor 8x and outperforms state of the art in quantitative terms and perceptual quality."} {"_id": [19, 60], "label": "cs.CR cs.AR", "text": "Memory Aware Denial of Service Attacks on Shared Cache in Multicore Real Time Systems. In this paper, we identify that memory performance plays a crucial role in the feasibility and effectiveness for performing denial of service attacks on shared cache. Based on this insight, we introduce new cache DoS attacks, which can be mounted from the user space and can cause extreme worst case execution time (WCET) impacts to cross core victims even if the shared cache is partitioned by taking advantage of the platform's memory address mapping information and HugePage support. We deploy these enhanced attacks on two popular embedded out of order multicore platforms using both synthetic and real world benchmarks. The proposed DoS attacks achieve up to 111X WCET increases on the tested platforms."} {"_id": [20], "label": "math.NA cs.NA", "text": "Functional Tucker approximation using Chebyshev interpolation. This work is concerned with approximating a trivariate function defined on a tensor product domain via function evaluations. Combining tensorized Chebyshev interpolation with a Tucker decomposition of low multilinear rank yields function approximations that can be computed and stored very efficiently. The existing Chebfun3 algorithm Hashemi and Trefethen, SIAM J. Sci. Comput., 39 (2017) uses a similar format but the construction of the approximation proceeds indirectly, via a so called slice Tucker decomposition. As a consequence, Chebfun3 sometimes uses unnecessarily many function evaluation and does not fully benefit from the potential of the Tucker decomposition to reduce, sometimes dramatically, the computational cost. We propose a novel algorithm Chebfun3F that utilizes univariate fibers instead of bivariate slices to construct the Tucker decomposition. Chebfun3F reduces the cost for the approximation for nearly all functions considered, typically by 75 , and sometimes by over 98 ."} {"_id": [0], "label": "cs.CV", "text": "Deep Image to Video Adaptation and Fusion Networks for Action Recognition. Existing deep learning methods for action recognition in videos require a large number of labeled videos for training, which is labor intensive and time consuming. For the same action, the knowledge learned from different media types, e.g., videos and images, may be related and complementary. However, due to the domain shifts and heterogeneous feature representations between videos and images, the performance of classifiers trained on images may be dramatically degraded when directly deployed to videos. In this paper, we propose a novel method, named Deep Image to Video Adaptation and Fusion Networks (DIVAFN), to enhance action recognition in videos by transferring knowledge from images using video keyframes as a bridge. The DIVAFN is a unified deep learning model, which integrates domain invariant representations learning and cross modal feature fusion into a unified optimization framework. Specifically, we design an efficient cross modal similarities metric to reduce the modality shift among images, keyframes and videos. Then, we adopt an autoencoder architecture, whose hidden layer is constrained to be the semantic representations of the action class names. In this way, when the autoencoder is adopted to project the learned features from different domains to the same space, more compact, informative and discriminative representations can be obtained. Finally, the concatenation of the learned semantic feature representations from these three autoencoders are used to train the classifier for action recognition in videos. Comprehensive experiments on four real world datasets show that our method outperforms some state of the art domain adaptation and action recognition methods."} {"_id": [1, 2, 17], "label": "cs.LG cs.AI cs.DC", "text": "Improving Accuracy of Federated Learning in Non IID Settings. Federated Learning (FL) is a decentralized machine learning protocol that allows a set of participating agents to collaboratively train a model without sharing their data. This makes FL particularly suitable for settings where data privacy is desired. However, it has been observed that the performance of FL is closely tied with the local data distributions of agents. Particularly, in settings where local data distributions vastly differ among agents, FL performs rather poorly with respect to the centralized training. To address this problem, we hypothesize the reasons behind the performance degradation, and develop some techniques to address these reasons accordingly. In this work, we identify four simple techniques that can improve the performance of trained models without incurring any additional communication overhead to FL, but rather, some light computation overhead either on the client, or the server side. In our experimental analysis, combination of our techniques improved the validation accuracy of a model trained via FL by more than 12 with respect to our baseline. This is about 5 less than the accuracy of the model trained on centralized data."} {"_id": [17], "label": "cs.DC", "text": "Partitionable Asynchronous Cryptocurrency Blockchain. We consider operation of blockchain based cryptocurrency in case of partitioning. We define the Partitionable Blockchain Consensus Problem. The problem may have an interesting solution if the partitions proceed independently by splitting accounts. We prove that this problem is not solvable in the asynchronous system. The peers in the two partitions may not agree on the last jointly mined block or, alternatively, on the starting point of independent concurrent computation. We introduce a family of detectors that enable a solution. We establish the relationship between detectors. We present the algorithm that solves the Partitionable Blockchain Consensus Problem using our detectors. We extend our solution to multiple splits, message loss and to partition merging. We simulate and evaluate the performance of detectors, discuss the implementation of the detectors and future work."} {"_id": [10, 6], "label": "physics.flu-dyn physics.ao-ph", "text": "A discussion on \"Numerical computations of resonant sloshing using the modified isoAdvector method and the buoyancy modified turbulence closure model\" Appl. Ocean Res. (2019), 93, article no. 101829, doi 10.1016.j.apor.2019.05.014 . A discussion on Li et al. (2019) Numerical computations of resonant sloshing using the modified isoAdvector method and the buoyancy modified turbulence closure model. Appl. Ocean Res. 93, article no. 101829, DOI 10.1016.j.apor.2019.05.014 is provided. Some mis characterizations regarding the work of Larsen and Fuhrman (2018) On the over production of turbulence beneath surface waves using Reynolds averaged Navier Stokes models. J. Fluid Mech. 853, 419 460, DOI 10.1017 jfm.2018.577 , on stabilizing two equation turbulence closures beneath surface waves, are clarified."} {"_id": [1, 19, 59], "label": "cs.LG cs.CR cs.SI", "text": "Suspicious Massive Registration Detection via Dynamic Heterogeneous Graph Neural Networks. Massive account registration has raised concerns on risk management in e commerce companies, especially when registration increases rapidly within a short time frame. To monitor these registrations constantly and minimize the potential loss they might incur, detecting massive registration and predicting their riskiness are necessary. In this paper, we propose a Dynamic Heterogeneous Graph Neural Network framework to capture suspicious massive registrations (DHGReg). We first construct a dynamic heterogeneous graph from the registration data, which is composed of a structural subgraph and a temporal subgraph. Then, we design an efficient architecture to predict suspicious benign accounts. Our proposed model outperforms the baseline models and is computationally efficient in processing a dynamic heterogeneous graph constructed from a real world dataset. In practice, the DHGReg framework would benefit the detection of suspicious registration behaviors at an early stage."} {"_id": [13, 68, 21], "label": "cs.DM math.CO math.DS", "text": "Low Complexity Tilings of the Plane. A two dimensional configuration is a coloring of the infinite grid Z 2 with finitely many colors. For a finite subset D of Z 2, the D patterns of a configuration are the colored patterns of shape D that appear in the configuration. The number of distinct D patterns of a configuration is a natural measure of its complexity. A configuration is considered having low complexity with respect to shape D if the number of distinct D patterns is at most D , the size of the shape. This extended abstract is a short review of an algebraic method to study periodicity of such low complexity configurations."} {"_id": [21, 38], "label": "math.CO math.NT", "text": "On multi interpolated multiple zeta values. In this note we introduce multi interpolated multiple zeta values. We provide a basic decomposition of these objects involving ordered partitions. We also obtain identities for special instances of multi interpolated multiple zeta values zeta vec t ( s k) , generalizing earlier results. Moreover, we introduce a product for multi interpolated multiple zeta values."} {"_id": [22], "label": "cs.SE", "text": "Recommendation of Move Method Refactoring Using Path Based Representation of Code. Software refactoring plays an important role in increasing code quality. One of the most popular refactoring types is the Move Method refactoring. It is usually applied when a method depends more on members of other classes than on its own original class. Several approaches have been proposed to recommend Move Method refactoring automatically. Most of them are based on heuristics and have certain limitations (e.g., they depend on the selection of metrics and manually defined thresholds). In this paper, we propose an approach to recommend Move Method refactoring based on a path based representation of code called code2vec that is able to capture the syntactic structure and semantic information of a code fragment. We use this code representation to train a machine learning classifier suggesting to move methods to more appropriate classes. We evaluate the approach on two publicly available datasets a manually compiled dataset of well known open source projects and a synthetic dataset with automatically injected code smell instances. The results show that our approach is capable of recommending accurate refactoring opportunities and outperforms JDeodorant and JMove, which are state of the art tools in this field."} {"_id": [15], "label": "cs.IT math.IT", "text": "Private Function Computation for Noncolluding Coded Databases. Private computation in a distributed storage system (DSS) is a generalization of the private information retrieval (PIR) problem. In such setting a user wishes to compute a function of f messages stored in n noncolluding coded databases, i.e., databases storing data encoded with an n,k linear storage code, while revealing no information about the desired function to the databases. We consider the problem of private polynomial computation (PPC). In PPC, a user wishes to compute a multivariate polynomial of degree at most g over f variables (or messages) stored in multiple databases. First, we consider the private computation of polynomials of degree g 1 , i.e., private linear computation (PLC) for coded databases. In PLC, a user wishes to compute a linear combination over the f messages while keeping the coefficients of the desired linear combination hidden from the database. For a linearly encoded DSS, we present a capacity achieving PLC scheme and show that the PLC capacity, which is the ratio of the desired amount of information and the total amount of downloaded information, matches the maximum distance separable coded capacity of PIR for a large class of linear storage codes. Then, we consider private computation of higher degree polynomials, i.e., g 1 . For this setup, we construct two novel PPC schemes. In the first scheme, we consider Reed Solomon coded databases with Lagrange encoding, which leverages ideas from recently proposed star product PIR and Lagrange coded computation. The second scheme considers the special case of coded databases with systematic Lagrange encoding. Both schemes yield improved rates, while asymptotically, as f rightarrow infty , the systematic scheme gives a significantly better computation retrieval rate compared to all known schemes up to some storage code rate that depends on the maximum degree of the candidate polynomials."} {"_id": [41], "label": "cs.RO", "text": "Object RPE Dense 3D Reconstruction and Pose Estimation with Convolutional Neural Networks for Warehouse Robots. We present an approach for recognizing all objects in a scene and estimating their full pose from an accurate 3D instance aware semantic reconstruction using an RGB D camera. Our framework couples convolutional neural networks (CNNs) and a state of the art dense Simultaneous Localisation and Mapping (SLAM) system, ElasticFusion, to achieve both high quality semantic reconstruction as well as robust 6D pose estimation for relevant objects. While the main trend in CNN based 6D pose estimation has been to infer object's position and orientation from single views of the scene, our approach explores performing pose estimation from multiple viewpoints, under the conjecture that combining multiple predictions can improve the robustness of an object detection system. The resulting system is capable of producing high quality object aware semantic reconstructions of room sized environments, as well as accurately detecting objects and their 6D poses. The developed method has been verified through experimental validation on the YCB Video dataset and a newly collected warehouse object dataset. Experimental results confirmed that the proposed system achieves improvements over state of the art methods in terms of surface reconstruction and object pose prediction. Our code and video are available at https sites.google.com view object rpe."} {"_id": [6], "label": "physics.flu-dyn", "text": "Particle resolved simulations of shock induced flow through particle clouds at different Reynolds numbers. This study investigates the Reynolds number dependence of shock induced flow through particle layers at 10 volume fraction, using ensemble averaged results from particle resolved large eddy simulations. The advantage of using large eddy simulations to study this problem is that they capture the strong velocity shears and flow separation caused by the no slip condition at the particle surfaces. The shock particle cloud interaction produces a reflected shock wave, whose strength increases with decreasing particle Reynolds number. This results in important changes to the flow field that enters the particle cloud. The results show an approximate proportionality between the mean flow velocity and the flow fluctuation magnitudes. Maximum particle drag forces are in excellent agreement with previous inviscid studies, and we complement these results with statistics of time averaged particle forces as well as the variation of temporal oscillations. The results of this work provides a basis for development of improved simplified dispersed flow models."} {"_id": [13], "label": "math.DS", "text": "Regionally proximal relation of order d along arithmetic progressions and nilsystems. The regionally proximal relation of order d along arithmetic progressions, namely bf AP d for d in N , is introduced and investigated. It turns out that if (X,T) is a topological dynamical system with bf AP d Delta , then each ergodic measure of (X,T) is isomorphic to a d step pro nilsystem, and thus (X,T) has zero entropy. Moreover, it is shown that if (X,T) is a strictly ergodic distal system with the property that the maximal topological and measurable d step pro nilsystems are isomorphic, then bf AP d bf RP d for each d in mathbb N . It follows that for a minimal infty pro nilsystem, bf AP d bf RP d for each d in mathbb N . An example which is a strictly ergodic distal system with discrete spectrum whose maximal equicontinuous factor is not isomorphic to the Kronecker factor is constructed."} {"_id": [20, 85, 6], "label": "math.NA cs.NA physics.data-an physics.flu-dyn", "text": "Randomized methods to characterize large scale vortical flow network. We demonstrate the effective use of randomized methods for linear algebra to perform network based analysis of complex vortical flows. Network theoretic approaches can reveal the connectivity structures among a set of vortical elements and analyze their collective dynamics. These approaches have recently been generalized to analyze high dimensional turbulent flows, for which network computations can become prohibitively expensive. In this work, we propose efficient methods to approximate network quantities, such as the leading eigendecomposition of the adjacency matrix, using randomized methods. Specifically, we use the Nystr \"om method to approximate the leading eigenvalues and eigenvectors, achieving significant computational savings and reduced memory requirements. The effectiveness of the proposed technique is demonstrated on two high dimensional flow fields two dimensional flow past an airfoil and two dimensional turbulence. We find that quasi uniform column sampling outperforms uniform column sampling, while both feature the same computational complexity."} {"_id": [26, 21], "label": "math.RT math.CO", "text": "On the cohomology of line bundles over certain flag schemes II. Over a field K of characteristic p , let Z be the incidence variety in mathbb P d times ( mathbb P d) and let mathcal L be the restriction to Z of the line bundle mathcal O ( n d) boxtimes mathcal O (n) , where n p f with 0 leq f leq p 2 . We prove that H d(Z, mathcal L ) is the simple operatorname GL d 1 module corresponding to the partition lambda 0 (p 1 f,p 1,f 1) . When f 0 , using the first author's description of H d(Z, mathcal L ) and Jantzen's sum formula, we obtain as a by product that the sum of the monomial symmetric functions m lambda , for all partitions lambda of 2p 1 less than (p 1,p 1,1) in the dominance order, is the alternating sum of the Schur functions S p 1,p 1 i,1 i 1 for i 0, dots,p 2 ."} {"_id": [0], "label": "cs.CV", "text": "Domain Specific Embedding Network for Zero Shot Recognition. Zero Shot Learning (ZSL) seeks to recognize a sample from either seen or unseen domain by projecting the image data and semantic labels into a joint embedding space. However, most existing methods directly adapt a well trained projection from one domain to another, thereby ignoring the serious bias problem caused by domain differences. To address this issue, we propose a novel Domain Specific Embedding Network (DSEN) that can apply specific projections to different domains for unbiased embedding, as well as several domain constraints. In contrast to previous methods, the DSEN decomposes the domain shared projection function into one domain invariant and two domain specific sub functions to explore the similarities and differences between two domains. To prevent the two specific projections from breaking the semantic relationship, a semantic reconstruction constraint is proposed by applying the same decoder function to them in a cycle consistency way. Furthermore, a domain division constraint is developed to directly penalize the margin between real and pseudo image features in respective seen and unseen domains, which can enlarge the inter domain difference of visual features. Extensive experiments on four public benchmarks demonstrate the effectiveness of DSEN with an average of 9.2 improvement in terms of harmonic mean. The code is available in url https github.com mboboGO DSEN for GZSL ."} {"_id": [0], "label": "cs.CV", "text": "Order Matters Shuffling Sequence Generation for Video Prediction. Predicting future frames in natural video sequences is a new challenge that is receiving increasing attention in the computer vision community. However, existing models suffer from severe loss of temporal information when the predicted sequence is long. Compared to previous methods focusing on generating more realistic contents, this paper extensively studies the importance of sequential order information for video generation. A novel Shuffling sEquence gEneration network (SEE Net) is proposed that can learn to discriminate unnatural sequential orders by shuffling the video frames and comparing them to the real video sequence. Systematic experiments on three datasets with both synthetic and real world videos manifest the effectiveness of shuffling sequence generation for video prediction in our proposed model and demonstrate state of the art performance by both qualitative and quantitative evaluations. The source code is available at https github.com andrewjywang SEENet."} {"_id": [34], "label": "math.CV", "text": "Extremal problems for vanishing functions in Bergman spaces. We prove two sharp estimates for the subspace of a standard weighted Bergman space that consists of functions vanishing at a given point (with prescribed multiplicity)."} {"_id": [59], "label": "cs.SI", "text": "Convergence Behaviour of Bystanders An Analysis of 2016 Munich Shooting Twitter Crisis Communication. While convergence behaviour archetypes can explain behaviour of individuals who actively converge on and participate in crises, less is known about individuals who converge on an event and choose to remain passive i.e. \"bystanders\". Bystanders are important, because of their proximity to an event and their function as an \"eye witness\". To investigate the role of bystanders in crisis communications we analysed Twitter communication generated from the 2016 Munich Shooting event. Our findings revealed the impassive convergence behaviour archetype could influence an event as a passive and rational \"eye witness\", by gathering and sharing information close to where the event is occurring."} {"_id": [3], "label": "cs.CL", "text": "A Dataset for Statutory Reasoning in Tax Law Entailment and Question Answering. Legislation can be viewed as a body of prescriptive rules expressed in natural language. The application of legislation to facts of a case we refer to as statutory reasoning, where those facts are also expressed in natural language. Computational statutory reasoning is distinct from most existing work in machine reading, in that much of the information needed for deciding a case is declared exactly once (a law), while the information needed in much of machine reading tends to be learned through distributional language statistics. To investigate the performance of natural language understanding approaches on statutory reasoning, we introduce a dataset, together with a legal domain text corpus. Straightforward application of machine reading models exhibits low out of the box performance on our questions, whether or not they have been fine tuned to the legal domain. We contrast this with a hand constructed Prolog based system, designed to fully solve the task. These experiments support a discussion of the challenges facing statutory reasoning moving forward, which we argue is an interesting real world task that can motivate the development of models able to utilize prescriptive rules specified in natural language."} {"_id": [47], "label": "math.AT", "text": "Comparing Dualities in the K(n) local Category. In their work on the period map and the dualizing sheaf for Lubin Tate space, Gross and the second author wrote down an equivalence between the Spanier Whitehead and Brown Comenetz duals of certain type n complexes in the K(n) local category at large primes. In the culture of the time, these results were accessible to educated readers, but this seems no longer to be the case therefore, in this note we give the details. Because we are at large primes, the key result is algebraic in the Picard group of Lubin Tate space, two important invertible sheaves become isomorphic modulo p ."} {"_id": [18], "label": "math.GT", "text": "Khovanov homology and cobordisms between split links. In this paper, we study the (in)sensitivity of the Khovanov functor to four dimensional linking of surfaces. We prove that if L and L' are split links, and C is a cobordism between L and L' that is the union of disjoint (but possibly linked) cobordisms between the components of L and the components of L' , then the map on Khovanov homology induced by C is completely determined by the maps induced by the individual components of C and does not detect the linking between the components. As a corollary, we prove that a strongly homotopy ribbon concordance (i.e., a concordance whose complement can be built with only 1 and 2 handles) induces an injection on Khovanov homology, which generalizes a result of the second author and Zemke. Additionally, we show that a non split link cannot be ribbon concordant to a split link."} {"_id": [20, 6, 7], "label": "math.NA cs.NA physics.comp-ph physics.flu-dyn", "text": "Fully Discrete Explicit Locally Entropy Stable Schemes for the Compressible Euler and Navier Stokes Equations. Recently, relaxation methods have been developed to guarantee the preservation of a single global functional of the solution of an ordinary differential equation. Here, we generalize this approach to guarantee local entropy inequalities for finitely many convex functionals (entropies) and apply the resulting methods to the compressible Euler and Navier Stokes equations. Based on the unstructured hp adaptive SSDC framework of entropy conservative or dissipative semidiscretizations using summation by parts and simultaneous approximation term operators, we develop the first discretizations for compressible computational fluid dynamics that are primary conservative, locally entropy stable in the fully discrete sense under a usual CFL condition, explicit except for the parallelizable solution of a single scalar equation per element, and arbitrarily high order accurate in space and time. We demonstrate the accuracy and the robustness of the fully discrete explicit locally entropy stable solver for a set of test cases of increasing complexity."} {"_id": [13], "label": "math.DS", "text": "Analytic maps of parabolic and elliptic type with trivial centralisers. We prove that for a dense set of irrational numbers alpha , the analytic centraliser of the map e 2 pi i alpha z z 2 near 0 is trivial. We also prove that some analytic circle diffeomorphisms in the Arnold family, with irrational rotation numbers, have trivial centralisers. These provide the first examples of such maps with trivial centralisers."} {"_id": [0], "label": "cs.CV", "text": "Revisiting Feature Alignment for One stage Object Detection. Recently, one stage object detectors gain much attention due to their simplicity in practice. Its fully convolutional nature greatly reduces the difficulty of training and deployment compared with two stage detectors which require NMS and sorting for the proposal stage. However, a fundamental issue lies in all one stage detectors is the misalignment between anchor boxes and convolutional features, which significantly hinders the performance of one stage detectors. In this work, we first reveal the deep connection between the widely used im2col operator and the RoIAlign operator. Guided by this illuminating observation, we propose a RoIConv operator which aligns the features and its corresponding anchors in one stage detection in a principled way. We then design a fully convolutional AlignDet architecture which combines the flexibility of learned anchors and the preciseness of aligned features. Specifically, our AlignDet achieves a state of the art mAP of 44.1 on the COCO test dev with ResNeXt 101 backbone."} {"_id": [65, 15], "label": "cs.IT cs.NI math.IT", "text": "Predictive Control and Communication Co Design A Gaussian Process Regression Approach. While Remote control over wireless connections is a key enabler for scalable control systems consisting of multiple actuator sensor pairs, i.e., control systems, it entails two technical challenges. Due to the lack of wireless resources, only a limited number of control systems can be served, making the state observations outdated. Further, even after scheduling, the state observations received through wireless channels are distorted, hampering control stability. To address these issues, in this article we propose a scheduling algorithm that guarantees the age of information (AoI) of the last received states. Meanwhile, for non scheduled sensor actuator pairs, we propose a machine learning (ML) aided predictive control algorithm, in which states are predicted using a Gaussian process regression (GPR). Since the GPR prediction credibility decreases with the AoI of the input data, both predictive control and AoI based scheduler should be co designed. Hence, we formulate a joint scheduling and transmission power optimization via the Lyapunov optimization framework. Numerical simulations corroborate that the proposed co designed predictive control and AoI based scheduling achieves lower control errors, compared to a benchmark scheme using a round robin scheduler without state prediction."} {"_id": [19], "label": "cs.CR", "text": "LaKSA A Probabilistic Proof of Stake Protocol. We present Large scale Known committee Stake based Agreement (LaKSA), a chain based Proof of Stake protocol that is dedicated, but not limited, to cryptocurrencies. LaKSA minimizes interactions between nodes through lightweight committee voting, resulting in a simpler, more robust, and more scalable proposal than competing systems. It also mitigates other drawbacks of previous systems, such as high reward variance and long confirmation times. LaKSA can support large numbers of nodes by design, and provides probabilistic safety guarantees in which a client makes commit decisions by calculating the probability that a transaction is reverted based on its blockchain view. We present a thorough analysis of LaKSA and report on its implementation and evaluation. Furthermore, our new technique of proving safety can be applied more broadly to other Proof of Stake protocols."} {"_id": [65, 17, 2], "label": "cs.DC cs.AI cs.NI", "text": "6G White Paper on Edge Intelligence. In this white paper we provide a vision for 6G Edge Intelligence. Moving towards 5G and beyond the future 6G networks, intelligent solutions utilizing data driven machine learning and artificial intelligence become crucial for several real world applications including but not limited to, more efficient manufacturing, novel personal smart device environments and experiences, urban computing and autonomous traffic settings. We present edge computing along with other 6G enablers as a key component to establish the future 2030 intelligent Internet technologies as shown in this series of 6G White Papers. In this white paper, we focus in the domains of edge computing infrastructure and platforms, data and edge network management, software development for edge, and real time and distributed training of ML AI algorithms, along with security, privacy, pricing, and end user aspects. We discuss the key enablers and challenges and identify the key research questions for the development of the Intelligent Edge services. As a main outcome of this white paper, we envision a transition from Internet of Things to Intelligent Internet of Intelligent Things and provide a roadmap for development of 6G Intelligent Edge."} {"_id": [29], "label": "math.GR", "text": "An Algorithm for Constructing All Supercharacter Theories of a Finite Group. In 2008, Diaconis annd Isaacs introduced the notion of a supercharacter theory of a finite group in which supercharacters replace with irreducible characters and superclasses by conjugacy classes. In this paper, we introduce an algorithm for constructing supercharacter theories of a finite group by which all supercharacter theories of groups containing up to 14 conjugacy classes are calculated."} {"_id": [42], "label": "math.DG", "text": "Sharp upper bounds on the length of the shortest closed geodesic on complete punctured spheres of finite area. We establish sharp universal upper bounds on the length of the shortest closed geodesic on a punctured sphere with three or four ends endowed with a complete Riemannian metric of finite area. These sharp curvature free upper bounds are expressed in terms of the area of the punctured sphere. In both cases, we describe the extremal metrics, which are modeled on the Calabi Croke sphere or the tetrahedral sphere. We also extend these optimal inequalities for reversible and non necessarily reversible Finsler metrics. In this setting, we obtain optimal bounds for spheres with a larger number of punctures. Finally, we present a roughly asymptotically optimal upper bound on the length of the shortest closed geodesic for spheres surfaces with a large number of punctures in terms of the area."} {"_id": [1], "label": "cs.LG", "text": "Fast Automatic Feature Selection for Multi Period Sliding Window Aggregate in Time Series. As one of the most well known artificial feature sampler, the sliding window is widely used in scenarios where spatial and temporal information exists, such as computer vision, natural language process, data stream, and time series. Among which time series is common in many scenarios like credit card payment, user behavior, and sensors. General feature selection for features extracted by sliding window aggregate calls for time consuming iteration to generate features, and then traditional feature selection methods are employed to rank them. The decision of key parameter, i.e. the period of sliding windows, depends on the domain knowledge and calls for trivial. Currently, there is no automatic method to handle the sliding window aggregate features selection. As the time consumption of feature generation with different periods and sliding windows is huge, it is very hard to enumerate them all and then select them. In this paper, we propose a general framework using Markov Chain to solve this problem. This framework is very efficient and has high accuracy, such that it is able to perform feature selection on a variety of features and period options. We show the detail by 2 common sliding windows and 3 types of aggregation operators. And it is easy to extend more sliding windows and aggregation operators in this framework by employing existing theory about Markov Chain."} {"_id": [48], "label": "cs.CC", "text": "Hardness of Bichromatic Closest Pair with Jaccard Similarity. Consider collections mathcal A and mathcal B of red and blue sets, respectively. Bichromatic Closest Pair is the problem of finding a pair from mathcal A times mathcal B that has similarity higher than a given threshold according to some similarity measure. Our focus here is the classic Jaccard similarity textbf a cap textbf b textbf a cup textbf b for ( textbf a , textbf b ) in mathcal A times mathcal B . We consider the approximate version of the problem where we are given thresholds j 1 j 2 and wish to return a pair from mathcal A times mathcal B that has Jaccard similarity higher than j 2 if there exists a pair in mathcal A times mathcal B with Jaccard similarity at least j 1 . The classic locality sensitive hashing (LSH) algorithm of Indyk and Motwani (STOC '98), instantiated with the MinHash LSH function of Broder et al., solves this problem in tilde O(n 2 delta ) time if j 1 ge j 2 1 delta . In particular, for delta Omega(1) , the approximation ratio j 1 j 2 1 j 2 delta increases polynomially in 1 j 2 . In this paper we give a corresponding hardness result. Assuming the Orthogonal Vectors Conjecture (OVC), we show that there cannot be a general solution that solves the Bichromatic Closest Pair problem in O(n 2 Omega(1) ) time for j 1 j 2 1 j 2 o(1) . Specifically, assuming OVC, we prove that for any delta 0 there exists an varepsilon 0 such that Bichromatic Closest Pair with Jaccard similarity requires time Omega(n 2 delta ) for any choice of thresholds j 2 j 1 1 delta , that satisfy j 1 le j 2 1 varepsilon ."} {"_id": [27, 13, 46], "label": "math.AG math.CT math.DS", "text": "Asymptotic shifting numbers in triangulated categories. We introduce invariants, called shifting numbers, that measure the asymptotic amount by which an autoequivalence of a triangulated category translates inside the category. The invariants are analogous to Poincare translation numbers that are widely used in dynamical systems. We additionally establish that in some examples the shifting numbers provide a quasimorphism on the group of autoequivalences. Additionally, we relate our shifting numbers to the entropy function introduced by Dimitrov, Haiden, Katzarkov, and Kontsevich."} {"_id": [77], "label": "math.LO", "text": "The definability of the extender sequence mathbb E from mathbb E upharpoonright aleph 1 in L mathbb E . Let M be an iterable fine structural mouse. We prove that if E in M and M models E is a countably complete short extender whose support is a cardinal theta and mathcal H theta subseteq mathrm Ult (V,E) '' then E is in the extender sequence mathbb E M of M . We also prove other related facts, and use them to establish that if kappa is an uncountable cardinal of M and ( kappa ) M exists in M then ( mathcal H kappa ) M satisfies the Axiom of Global Choice. We then prove that if M satisfies the Power Set Axiom then mathbb E M is definable over the universe of M from the parameter X mathbb E M upharpoonright aleph 1 M , and therefore M satisfies Every set is mathrm OD X ''. We also prove various local versions of this fact in which M has a largest cardinal, and a version for generic extensions of M . As a consequence, for example, the minimal proper class mouse with a Woodin limit of Woodin cardinals models V mathrm HOD ''. This adapts to many other similar examples. We also describe a simplified approach to Mitchell Steel fine structure, which does away with the parameters u n ."} {"_id": [42], "label": "math.DG", "text": "Deformation of the scalar curvature and the mean curvature. On a compact manifold M with boundary partial M , we study the problem of prescribing the scalar curvature in M and the mean curvature on the boundary partial M simultaneously. To do this, we introduce the notion of singular metric, which is inspired by the early work of Fischer Marsden in 18 and Lin Yuan in 23 for closed manifold. We show that we can prescribe the scalar curvature and the mean curvature simultaneously for generic scalar flat manifolds with minimal boundary. We also prove some rigidity results for the flat manifolds with totally geodesic boundary."} {"_id": [25, 68, 21, 38], "label": "math.CO cs.DM math.NT math.PR", "text": "Covariance within Random Integer Compositions. Fix a positive integer N . Select an additive composition xi of N uniformly out of 2 N 1 possibilities. The interplay between the number of parts in xi and the maximum part in xi is our focus. It is not surprising that correlations rho(N) between these quantities are negative we earlier gave inconclusive evidence that lim N to infty rho(N) is strictly less than zero. A proof of this result would imply asymptotic dependence. We now retract our presumption in such an unforeseen outcome. Similar experimental findings apply when xi is a 1 free composition, i.e., possessing only parts geq 2 ."} {"_id": [2, 3], "label": "cs.CL cs.AI", "text": "Spying on your neighbors Fine grained probing of contextual embeddings for information about surrounding words. Although models using contextual word embeddings have achieved state of the art results on a host of NLP tasks, little is known about exactly what information these embeddings encode about the context words that they are understood to reflect. To address this question, we introduce a suite of probing tasks that enable fine grained testing of contextual embeddings for encoding of information about surrounding words. We apply these tasks to examine the popular BERT, ELMo and GPT contextual encoders, and find that each of our tested information types is indeed encoded as contextual information across tokens, often with near perfect recoverability but the encoders vary in which features they distribute to which tokens, how nuanced their distributions are, and how robust the encoding of each feature is to distance. We discuss implications of these results for how different types of models breakdown and prioritize word level context information when constructing token embeddings."} {"_id": [0], "label": "cs.CV", "text": "Adaptive confidence thresholding for monocular depth estimation. Self supervised monocular depth estimation has become an appealing solution to the lack of ground truth labels, but its reconstruction loss often produces over smoothed results across object boundaries and is incapable of handling occlusion explicitly. In this paper, we propose a new approach to leverage pseudo ground truth depth maps of stereo images generated from self supervised stereo matching methods. The confidence map of the pseudo ground truth depth map is estimated to mitigate performance degeneration by inaccurate pseudo depth maps. To cope with the prediction error of the confidence map itself, we also leverage the threshold network that learns the threshold dynamically conditioned on the pseudo depth maps. The pseudo depth labels filtered out by the thresholded confidence map are used to supervise the monocular depth network. Furthermore, we propose the probabilistic framework that refines the monocular depth map with the help of its uncertainty map through the pixel adaptive convolution (PAC) layer. Experimental results demonstrate superior performance to state of the art monocular depth estimation methods. Lastly, we exhibit that the proposed threshold learning can also be used to improve the performance of existing confidence estimation approaches."} {"_id": [58, 4], "label": "q-bio.NC cs.NE", "text": "Adaptive control for hindlimb locomotion in a simulated mouse through temporal cerebellar learning. Human beings and other vertebrates show remarkable performance and efficiency in locomotion, but the functioning of their biological control systems for locomotion is still only partially understood. The basic patterns and timing for locomotion are provided by a central pattern generator (CPG) in the spinal cord. The cerebellum is known to play an important role in adaptive locomotion. Recent studies have given insights into the error signals responsible for driving the cerebellar adaptation in locomotion. However, the question of how the cerebellar output influences the gait remains unanswered. We hypothesize that the cerebellar correction is applied to the pattern formation part of the CPG. Here, a bio inspired control system for adaptive locomotion of the musculoskeletal system of the mouse is presented, where a cerebellar like module adapts the step time by using the double support interlimb asymmetry as a temporal teaching signal. The control system is tested on a simulated mouse in a split belt treadmill setup similar to those used in experiments with real mice. The results show adaptive locomotion behavior in the interlimb parameters similar to that seen in humans and mice. The control system adaptively decreases the double support asymmetry that occurs due to environmental perturbations in the split belt protocol."} {"_id": [46, 78], "label": "math.AC math.AG", "text": "Canonical Hilbert Burch matrices for power series. Sets of zero dimensional ideals in the polynomial ring k x,y that share the same leading term ideal with respect to a given term ordering are known to be affine spaces called Gr \"obner cells. Conca Valla and Constantinescu parametrize such Gr \"obner cells in terms of certain canonical Hilbert Burch matrices for the lexicographical and degree lexicographical term orderings, respectively. In this paper, we give a parametrization of (x,y) primary ideals in Gr \"obner cells which is compatible with the local structure of such ideals. More precisely, we extend previous results to the local setting by defining a notion of canonical Hilbert Burch matrices of zero dimensional ideals in the power series ring k x,y with a given leading term ideal with respect to a local term ordering."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Reinforced Curriculum Learning on Pre trained Neural Machine Translation Models. The competitive performance of neural machine translation (NMT) critically relies on large amounts of training data. However, acquiring high quality translation pairs requires expert knowledge and is costly. Therefore, how to best utilize a given dataset of samples with diverse quality and characteristics becomes an important yet understudied question in NMT. Curriculum learning methods have been introduced to NMT to optimize a model's performance by prescribing the data input order, based on heuristics such as the assessment of noise and difficulty levels. However, existing methods require training from scratch, while in practice most NMT models are pre trained on big data already. Moreover, as heuristics, they do not generalize well. In this paper, we aim to learn a curriculum for improving a pre trained NMT model by re selecting influential data samples from the original training set and formulate this task as a reinforcement learning problem. Specifically, we propose a data selection framework based on Deterministic Actor Critic, in which a critic network predicts the expected change of model performance due to a certain sample, while an actor network learns to select the best sample out of a random batch of samples presented to it. Experiments on several translation datasets show that our method can further improve the performance of NMT when original batch training reaches its ceiling, without using additional new training data, and significantly outperforms several strong baseline methods."} {"_id": [23], "label": "math.FA", "text": "Parameterized Wasserstein mean with its properties. A new least squares mean of positive definite matrices for the divergence associated with the sandwiched quasi relative entropy has been introduced. It generalizes the well known Wasserstein mean for covariance matrices of Gaussian distributions with mean zero, so we call it the parameterized Wasserstein mean. We investigate in this article norm inequality of the parameterized Wasserstein mean, give its bounds with respect to the Loewner order, and show the extended version of Lie Trotter Kato formula for the parameterized Wasserstein mean. Finally we show the log majorzation properties of the parameterized Wasserstein mean by using the Cartan mean."} {"_id": [0], "label": "cs.CV", "text": "Survey on Reliable Deep Learning Based Person Re Identification Models Are We There Yet?. Intelligent video surveillance (IVS) is currently an active research field in computer vision and machine learning and provides useful tools for surveillance operators and forensic video investigators. Person re identification (PReID) is one of the most critical problems in IVS, and it consists of recognizing whether or not an individual has already been observed over a camera in a network. Solutions to PReID have myriad applications including retrieval of video sequences showing an individual of interest or even pedestrian tracking over multiple camera views. Different techniques have been proposed to increase the performance of PReID in the literature, and more recently researchers utilized deep neural networks (DNNs) given their compelling performance on similar vision problems and fast execution at test time. Given the importance and wide range of applications of re identification solutions, our objective herein is to discuss the work carried out in the area and come up with a survey of state of the art DNN models being used for this task. We present descriptions of each model along with their evaluation on a set of benchmark datasets. Finally, we show a detailed comparison among these models, which are followed by some discussions on their limitations that can work as guidelines for future research."} {"_id": [78], "label": "math.AC", "text": "Free differential Galois groups. We study the structure of the absolute differential Galois group of a rational function field over an algebraically closed field of characteristic zero. In particular, we relate the behavior of differential embedding problems to the condition that the absolute differential Galois group is free as a proalgebraic group. Building on this, we prove Matzat's freeness conjecture in the case that the field of constants is algebraically closed of countably infinite transcendence degree over the rationals. This is the first known case of the twenty year old conjecture."} {"_id": [3], "label": "cs.CL", "text": "Towards Multimodal Response Generation with Exemplar Augmentation and Curriculum Optimization. Recently, variational auto encoder (VAE) based approaches have made impressive progress on improving the diversity of generated responses. However, these methods usually suffer the cost of decreased relevance accompanied by diversity improvements. In this paper, we propose a novel multimodal response generation framework with exemplar augmentation and curriculum optimization to enhance relevance and diversity of generated responses. First, unlike existing VAE based models that usually approximate a simple Gaussian posterior distribution, we present a Gaussian mixture posterior distribution (i.e, multimodal) to further boost response diversity, which helps capture complex semantics of responses. Then, to ensure that relevance does not decrease while diversity increases, we fully exploit similar examples (exemplars) retrieved from the training data into posterior distribution modeling to augment response relevance. Furthermore, to facilitate the convergence of Gaussian mixture prior and posterior distributions, we devise a curriculum optimization strategy to progressively train the model under multiple training criteria from easy to hard. Experimental results on widely used SwitchBoard and DailyDialog datasets demonstrate that our model achieves significant improvements compared to strong baselines in terms of diversity and relevance."} {"_id": [49, 20], "label": "math.OC math.NA", "text": "A numerical approach for solving fractional optimal control problems using modified hat functions. We introduce a numerical method, based on modified hat functions, for solving a class of fractional optimal control problems. In our scheme, the control and the fractional derivative of the state function are considered as linear combinations of the modified hat functions. The fractional derivative is considered in the Caputo sense while the Riemann Liouville integral operator is used to give approximations for the state function and some of its derivatives. To this aim, we use the fractional order integration operational matrix of the modified hat functions and some properties of the Caputo derivative and Riemann Liouville integral operators. Using results of the considered basis functions, solving the fractional optimal control problem is reduced to the solution of a system of nonlinear algebraic equations. An error bound is proved for the approximate optimal value of the performance index obtained by the proposed method. The method is then generalized for solving a class of fractional optimal control problems with inequality constraints. The most important advantages of our method are easy implementation, simple operations, and elimination of numerical integration. Some illustrative examples are considered to demonstrate the effectiveness and accuracy of the proposed technique."} {"_id": [9, 25, 6], "label": "math.AP math.PR physics.flu-dyn", "text": "A stochastic approach to enhanced diffusion. We provide examples of initial data which saturate the enhanced diffusion rates proved for general shear flows which are H \" o lder regular or Lipschitz continuous with critical points, and for regular circular flows, establishing the sharpness of those results. Our proof makes use of a probabilistic interpretation of the dissipation of solutions to the advection diffusion equation."} {"_id": [19], "label": "cs.CR", "text": "Padding Ain't Enough Assessing the Privacy Guarantees of Encrypted DNS. DNS over TLS (DoT) and DNS over HTTPS (DoH) encrypt DNS to guard user privacy by hiding DNS resolutions from passive adversaries. Yet, past attacks have shown that encrypted DNS is still sensitive to traffic analysis. As a consequence, RFC 8467 proposes to pad messages prior to encryption, which heavily reduces the characteristics of encrypted traffic. In this paper, we show that padding alone is insufficient to counter DNS traffic analysis. We propose a novel traffic analysis method that combines size and timing information to infer the websites a user visits purely based on encrypted and padded DNS traces. To this end, we model DNS sequences that capture the complexity of websites that usually trigger dozens of DNS resolutions instead of just a single DNS transaction. A closed world evaluation based on the Alexa top 10k websites reveals that attackers can deanonymize at least half of the test traces in 80.2 of all websites, and even correctly label all traces for 32.0 of the websites. Our findings undermine the privacy goals of state of the art message padding strategies in DoT DoH. We conclude by showing that successful mitigations to such attacks have to remove the entropy of inter arrival timings between query responses."} {"_id": [32, 17], "label": "cs.DS cs.DC", "text": "On the Use of Randomness in Local Distributed Graph Algorithms. We attempt to better understand randomization in local distributed graph algorithms by exploring how randomness is used and what we can gain from it We first ask the question of how much randomness is needed to obtain efficient randomized algorithms. We show that for all locally checkable problems for which polylog n time randomized algorithms exist, there are such algorithms even if either (I) there is a only a single (private) independent random bit in each polylog n neighborhood of the graph, (II) the (private) bits of randomness of different nodes are only polylog n wise independent, or (III) there are only polylog n bits of global shared randomness (and no private randomness). Second, we study how much we can improve the error probability of randomized algorithms. For all locally checkable problems for which polylog n time randomized algorithms exist, we show that there are such algorithms that succeed with probability 1 n 2 varepsilon( log log n) 2 and more generally T round algorithms, for T geq polylog n , that succeed with probability 1 n 2 varepsilon log 2T . We also show that polylog n time randomized algorithms with success probability 1 2 2 log varepsilon n for some varepsilon 0 can be derandomized to polylog n time deterministic algorithms. Both of the directions mentioned above, reducing the amount of randomness and improving the success probability, can be seen as partial derandomization of existing randomized algorithms. In all the above cases, we also show that any significant improvement of our results would lead to a major breakthrough, as it would imply significantly more efficient deterministic distributed algorithms for a wide class of problems."} {"_id": [1, 2, 39], "label": "cs.CY cs.AI cs.LG", "text": "Scaling up Psychology via Scientific Regret Minimization A Case Study in Moral Decisions. Do large datasets provide value to psychologists? Without a systematic methodology for working with such datasets, there is a valid concern that analyses will produce noise artifacts rather than true effects. In this paper, we offer a way to enable researchers to systematically build models and identify novel phenomena in large datasets. One traditional approach is to analyze the residuals of models the biggest errors they make in predicting the data to discover what might be missing from those models. However, once a dataset is sufficiently large, machine learning algorithms approximate the true underlying function better than the data, suggesting instead that the predictions of these data driven models should be used to guide model building. We call this approach \"Scientific Regret Minimization\" (SRM) as it focuses on minimizing errors for cases that we know should have been predictable. We demonstrate this methodology on a subset of the Moral Machine dataset, a public collection of roughly forty million moral decisions. Using SRM, we found that incorporating a set of deontological principles that capture dimensions along which groups of agents can vary (e.g. sex and age) improves a computational model of human moral judgment. Furthermore, we were able to identify and independently validate three interesting moral phenomena criminal dehumanization, age of responsibility, and asymmetric notions of responsibility."} {"_id": [32, 19], "label": "cs.CR cs.DS", "text": "Representing and Reasoning about Dynamic Code. Dynamic code, i.e., code that is created or modified at runtime, is ubiquitous in today's world. The behavior of dynamic code can depend on the logic of the dynamic code generator in subtle and non obvious ways, with significant security implications, e.g., JIT compiler bugs can lead to exploitable vulnerabilities in the resulting JIT compiled code. Existing approaches to program analysis do not provide adequate support for reasoning about such behavioral relationships. This paper takes a first step in addressing this problem by describing a program representation and a new notion of dependency that allows us to reason about dependency and information flow relationships between the dynamic code generator and the generated dynamic code. Experimental results show that analyses based on these concepts are able to capture properties of dynamic code that cannot be identified using traditional program analyses."} {"_id": [16, 92], "label": "q-bio.QM q-bio.BM", "text": "Weighted persistent homology for osmolyte molecular aggregation and hydrogen bonding network analysis. It has long been observed that trimethylamin N oxide (TMAO) and urea demonstrate dramatically different properties in a protein folding process. Even with the enormous theoretical and experimental research work of the two osmolytes, various aspects of their underlying mechanisms still remain largely elusive. In this paper, we propose to use the weighted persistent homology to systematically study the osmolytes molecular aggregation and their hydrogen bonding network from a local topological perspective. We consider two weighted models, i.e., localized persistent homology (LPH) and interactive persistent homology (IPH). From the localized persistent homology models, we have found that TMAO and urea have very different local topology. TMAO shows local network structures. With the concentration increase, the circle elements in these networks show a clear increase in their total numbers and a decrease in their relative sizes. In contrast, urea shows two types of local topological patterns, i.e., local clusters around 6 AA and a few global circle elements at around 12 AA. From the interactive persistent homology models, it has been found that our persistent radial distribution function (PRDF) from the global scale IPH has same physical properties as the traditional radial distribution function (RDF). Moreover, PRDFs from the local scale IPH can also be generated and used to characterize the local interaction information. Other than the clear difference of the first peak value of PRDFs at filtration size 4 AA, TMAO and urea also shows very different behaviors at the second peak region from filtration size 5 AA to 10 AA."} {"_id": [46], "label": "math.AG", "text": "Algebraic cycles on Todorov surfaces of type (2,12) . We focus on Voisin's conjecture on 0 cycles on the self product of surfaces of geometric genus one, which arises in the context of the Bloch Beilinson filtration conjecture. We verify this conjecture for the family of Todorov surfaces of type (2,12) , giving an explicit description of this family as quotient surfaces of the complete intersection of four quadrics in mathbb P 6 . We give some motivic applications."} {"_id": [9], "label": "math.AP", "text": "Global well posedness for the fifth order KdV equation in H 1 ( mathbb R ) . We prove global well posedness of the fifth order Korteweg de Vries equation on the real line for initial data in H 1 ( mathbb R ) . By comparison, the optimal regularity for well posedness on the torus is known to be L 2( mathbb R mathbb Z ) . In order to prove this result, we develop a strategy for integrating the local smoothing effect into the method of commuting flows introduced previously in the context of KdV. It is this synthesis that allows us to go beyond the known threshold on the torus."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "iCaps An Interpretable Classifier via Disentangled Capsule Networks. We propose an interpretable Capsule Network, iCaps, for image classification. A capsule is a group of neurons nested inside each layer, and the one in the last layer is called a class capsule, which is a vector whose norm indicates a predicted probability for the class. Using the class capsule, existing Capsule Networks already provide some level of interpretability. However, there are two limitations which degrade its interpretability 1) the class capsule also includes classification irrelevant information, and 2) entities represented by the class capsule overlap. In this work, we address these two limitations using a novel class supervised disentanglement algorithm and an additional regularizer, respectively. Through quantitative and qualitative evaluations on three datasets, we demonstrate that the resulting classifier, iCaps, provides a prediction along with clear rationales behind it with no performance degradation."} {"_id": [38], "label": "math.NT", "text": "Proof of Kaneko Tsumura Conjecture on Triple T Values. Many mathbb Q linear relations exist between multiple zeta values, the most interesting of which are various weighted sum formulas. In this paper, we generalized these to Euler sums and some other variants of multiple zeta values by considering the generating functions of the Euler sums. Through this approach we are able to re prove a few known formulas, confirm a conjecture of Kaneko and Tsumura on triple T values, and discover many new identities."} {"_id": [46], "label": "math.AG", "text": "Fourier Mukai transforms and stable sheaves on Weierstrass elliptic surfaces. On a Weierstra ss elliptic surface X , we define a limit' of Bridgeland stability conditions, denoted as Z l stability, by moving the polarisation towards the fiber direction in the ample cone while keeping the volume of the polarisation fixed. We describe conditions under which a slope stable torsion free sheaf is taken by a Fourier Mukai transform to a Z l stable object, and describe a modification upon which a Z l semistable object is taken by the inverse Fourier Mukai transform to a slope semistable torsion free sheaf. We also study wall crossing for Bridgeland stability, and show that 1 dimensional twisted Gieseker semistable sheaves are taken by a Fourier Mukai transform to Bridgeland semistable objects."} {"_id": [20], "label": "math.NA cs.NA", "text": "The Best Uniform Rational Approximation Applications to Solving Equations Involving Fractional powers of Elliptic Operators. In this paper we consider one particular mathematical problem of this large area of fractional powers of self adjoined elliptic operators, defined either by Dunford Taylor like integrals or by the representation through the spectrum of the elliptic operator. Due to the mathematical modeling of various non local phenomena using such operators recently a number of numerical methods for solving equations involving operators of fractional order were introduced, studied, and tested. Here we consider the discrete counterpart of such problems obtained from finite difference or finite element approximations of the corresponding elliptic problems. In this report we provide all necessary information regarding the best uniform rational approximation (BURA) r k, alpha (t) P k(t) Q k(t) of t alpha on delta, 1 for various alpha , delta , and k . The results are presented in 160 tables containing the coefficients of P k(t) and Q k(t) , the zeros and the poles of r k, alpha (t) , the extremal point of the error t alpha r k, alpha (t) , the representation of r k, alpha (t) in terms of partial fractions, etc. Moreover, we provide links to the files with the data that characterize r k, alpha (t) which are available with enough significant digits so one can use them in his her own computations."} {"_id": [21], "label": "math.CO", "text": "The e positivity of two families of (claw, 2K 2) free graphs. Motivated by Stanley's conjecture about the e positivity of claw free incomparability graphs, Hamel and her collaborators studied the e positivity of (claw, H) free graphs, where H is a four vertex graph. In this paper we establish the e positivity of generalized pyramid graphs and 2K 2 free unit interval graphs, which are two important families of (claw, 2K 2) free graphs. Hence we affirmatively solve one problem proposed by Hamel, Ho a ng and Tuero, and another problem considered by Foley, Ho a ng and Merkel."} {"_id": [11], "label": "physics.app-ph", "text": "Extreme Low Frequency Ultrathin Acoustic Absorbing Metasurface. We introduce a multi coiled acoustic metasurface providing a quasi perfect absorption (reaching 99.99 in experiments) at extremely low frequency of 50 Hz, and simultaneously featuring an ultrathin thickness down to lambda 527 (1.3 cm). In contrast to the state of the art, this original conceived multi coiled metasurface offers additional degrees of freedom capable to tune the acoustic impedance effectively without increasing the total thickness. We provide analytical derivation, numerical simulation and experimental demonstrations for this unique absorber concept, and discuss its physical mechanism which breaks the quarter wavelength resonator theory. Furthermore, based on the same conceptual approach, we propose a broadband lowfrequency metasurface absorber by coupling unit cells exhibiting different properties."} {"_id": [1], "label": "cs.LG", "text": "Predictive Process Model Monitoring using Recurrent Neural Networks. The field of predictive process monitoring focuses on modelling future characteristics of running business process instances, typically by either predicting the outcome of particular objectives (e.g. completion (time), cost), or next in sequence prediction (e.g. what is the next activity to execute). This paper introduces Processes As Movies (PAM), a technique that provides a middle ground between these predictive monitoring. It does so by capturing declarative process constraints between activities in various windows of a process execution trace, which represent a declarative process model at subsequent stages of execution. This high dimensional representation of a process model allows the application of predictive modelling on how such constraints appear and vanish throughout a process' execution. Various recurrent neural network topologies tailored to high dimensional input are used to model the process model evolution with windows as time steps, including encoder decoder long short term memory networks, and convolutional long short term memory networks. Results show that these topologies are very effective in terms of accuracy and precision to predict a process model's future state, which allows process owners to simultaneously verify what linear temporal logic rules hold in a predicted process window (objective based), and verify what future execution traces are allowed by all the constraints together (trace based)."} {"_id": [8], "label": "physics.optics", "text": "Plasmon lifetime enhancement in a bright dark mode coupled system. Metallic nanoparticles can localize the incident light to hotspots as plasmon oscillations, where the intensity can be increased up to four orders of magnitude. Even though the lifetime of plasmons are typically short, it can be increased via interactions with quantum emitters, e.g. spaser nano lasers. However, molecules can bleach in days. Here, we study the lifetime enhancement of plasmon excitations due to the coupling with longer lifetime dark plasmon modes. Exact solutions of the 3D Maxwell equations, i.e. FDTD, demonstrates that the lifetime of the coupled system increases, as also predicted by a basic oscillator model. We report an optimum bright dark plasmon mode coupling, where lifetime enhancement becomes maximum, and show that no precise positioning of the nanostructures is required to obtain enhanced lifetime."} {"_id": [42], "label": "math.DG", "text": "Some Rigidity Results on Complete Finsler Manifolds. We provide an extension of Obata's theorem to Finsler geometry and establish some rigidity results based on a second order differential equation. Mainly, we prove that every complete connected Finsler manifold of positive constant flag curvature is isometrically homeomorphic to an Euclidean sphere endowed with a certain Finsler metric and vice versa. Based on these results, we present a classification of Finsler manifolds which admit a transnormal function. Specifically, we show that if a complete Finsler manifold admits a transnormal function with exactly two critical points, then it is homeomorphic to a sphere."} {"_id": [55], "label": "physics.geo-ph", "text": "Bath's law, correlations and magnitude distributions. The empirical Bath's law is derived from the magnitude difference statistical distribution of earthquake pairs. The pair distribution related to earthquake correlations is presented. The single event distribution of dynamically correlated earthquakes is derived, by means of the geometric growth model of energy accumulation in the focal region. The dynamical correlations may account, at least partially, for the roll off effect in the Gutenberg Richter distributions. The seismic activity which accompanies a main shock, including both the aftershocks and the foreshocks, can be viewed as fluctuations in magnitude. The extension of the magnitude difference to negative values leads to a vanishing mean value of the fluctuations and to the standard deviation as a measure of these fluctuations. It is suggested that the standard deviation of the magnitude difference is the average difference in magnitude between the main shock and its largest aftershock (foreshock), thus providing an insight into the nature and the origin of the Bath's law. It is shown that moderate magnitude doublets may be viewed as Bath partners. Deterministic time magnitude correlations of the accompanying seismic activity are also presented."} {"_id": [3], "label": "cs.CL", "text": "Effective Context and Fragment Feature Usage for Named Entity Recognition. In this paper, we explore a new approach to named entity recognition (NER) with the goal of learning from context and fragment features more effectively, contributing to the improvement of overall recognition performance. We use the recent fixed size ordinally forgetting encoding (FOFE) method to fully encode each sentence fragment and its left right contexts into a fixed size representation. Next, we organize the context and fragment features into groups, and feed each feature group to dedicated fully connected layers. Finally, we merge each group's final dedicated layers and add a shared layer leading to a single output. The outcome of our experiments show that, given only tokenized text and trained word embeddings, our system outperforms our baseline models, and is competitive to the state of the arts of various well known NER tasks."} {"_id": [25, 21], "label": "math.PR math.CO", "text": "Normal limit laws for vertex degrees in randomly grown hooking networks and bipolar networks. We consider two types of random networks grown in blocks. Hooking networks are grown from a set of graphs as blocks, each with a labelled vertex called a hook. At each step in the growth of the network, a vertex called a latch is chosen from the hooking network and a copy of one of the blocks is attached by fusing its hook with the latch. Bipolar networks are grown from a set of directed graphs as blocks, each with a single source and a single sink. At each step in the growth of the network, an arc is chosen and is replaced with a copy of one of the blocks. Using P 'olya urns, we prove normal limit laws for the degree distributions of both networks. We extend previous results by allowing for more than one block in the growth of the networks and by studying arbitrarily large degrees."} {"_id": [69], "label": "math.QA", "text": "Fusion products of twisted modules in permutation orbifolds. Let V be a vertex operator algebra, k a positive integer and sigma a permutation automorphism of the vertex operator algebra V otimes k . In this paper, we determine the fusion product of any V otimes k module with any sigma twisted V otimes k module."} {"_id": [15], "label": "cs.IT math.IT", "text": "A Survey on Spatial Modulation in Emerging Wireless Systems Research Progresses and Applications. Spatial modulation (SM) is an innovative and promising digital modulation technology that strikes an appealing trade off between spectral efficiency and energy efficiency with a simple design philosophy. SM enjoys plenty of benefits and shows great potential to fulfill the requirements of future wireless communications. The key idea behind SM is to convey additional information typically through the ON OFF states of transmit antennas and simultaneously save the implementation cost by reducing the number of radio frequency chains. As a result, the SM concept can have widespread effects on diverse applications and can be applied in other signal domains such as frequency time code angle domain or even across multiple domains. This survey provides a comprehensive overview of the latest results and progresses in SM research. Specifically, the fundamental principles, variants of system design, and enhancements of SM are described in detail. Furthermore, the integration of the SM family with other promising techniques, applications to emerging communication systems, and extensions to new signal domains are also extensively studied."} {"_id": [8], "label": "physics.optics", "text": "An Analytical and Rigorous Method for Analysis of an Array of Magnetically Biased Graphene Ribbons. A sheet of graphene under magnetic bias attains anisotropic surface conductivity, opening the door for realizing compact devices such as Faraday rotators, isolators and circulators. In this paper, an accurate and analytical method is proposed for a periodic array of graphene ribbons under magnetic bias. The method is based on integral equations governing the induced surface currents on the coplanar array of graphene ribbons. For subwavelength size ribbons subjected to normally incident plane waves, the current distribution is derived leading to analytical expressions for the reflection transmission coefficients. The results obtained are in excellent agreement with full wave simulations and predict resonant spectral effects that cannot be accounted for by existing semi analytical methods. Finally, we extract an analytical, closed form solution for the Faraday rotation of magnetically biased graphene ribbons. In contrast to previous studies, this paper presents a fast, precise and reliable technique for analyzing magnetically biased array of graphene ribbons, which are one of the most popular graphene based structures."} {"_id": [96], "label": "q-fin.PM", "text": "Advanced Strategies of Portfolio Management in the Heston Market Model. There is a great number of factors to take into account when building and managing an investment portfolio. It is widely believed that a proper set up of the portfolio combined with a good, robust management strategy is the key to successful investment. In this paper, we aim at an analysis of two aspects that may have an impact on investment performance diversity of assets and inclusion of cash in the portfolio. We also propose two new management strategies based on the MACD and RSI factors known from technical analysis. Monte Carlo simulations within the Heston model of a market are used to perform numerical experiments."} {"_id": [58], "label": "q-bio.NC", "text": "State dependent regulation of cortical processing speed via gain modulation. To thrive in dynamic environments, animals must be capable of rapidly and flexibly adapting behavioral responses to a changing context and internal state. Examples of behavioral flexibility include faster stimulus responses when attentive and slower responses when distracted. Contextual or state dependent modulations may occur early in the cortical hierarchy and may be implemented via top down projections from cortico cortical or neuromodulatory pathways. However, the computational mechanisms mediating the effects of such projections are not known. Here, we introduce a theoretical framework to classify the effects of cell type specific top down perturbations on the information processing speed of cortical circuits. Our theory demonstrates that perturbation effects on stimulus processing can be predicted by intrinsic gain modulation, which controls the timescale of the circuit dynamics. Our theory leads to counter intuitive effects such as improved performance with increased input variance. We tested the model predictions using large scale electrophysiological recordings from the visual hierarchy in freely running mice, where we found that a decrease in single cell intrinsic gain during locomotion led to an acceleration of visual processing. Our results establish a novel theory of cell type specific perturbations, applicable to top down modulation as well as optogenetic and pharmacological manipulations. Our theory links connectivity, dynamics, and information processing via gain modulation."} {"_id": [27], "label": "math.CT", "text": "A pretorsion theory for the category of all categories. A pretorsion theory for the category of all categories is presented. The associated prekernels and precokernels are calculated for every functor."} {"_id": [68, 21], "label": "math.CO cs.DM", "text": "Dynamic list coloring of 1 planar graphs. A graph is k planar if it can be drawn in the plane so that each edge is crossed at most k times. Typically, the class of 1 planar graphs is among the most investigated graph families within the so called \"beyond planar graphs\". A dynamic ell list coloring of a graph is a proper coloring so that each vertex receives a color from a list of ell distinct candidate colors assigned to it, and meanwhile, there are at least two colors appearing in the neighborhood of every vertex of degree at least two. In this paper, we prove that each 1 planar graph has a dynamic 11 list coloring. Moreover, we show a relationship between the dynamic coloring of 1 planar graphs and the proper coloring of 2 planar graphs, which states that the dynamic (list) chromatic number of the class of 1 planar graphs is at least the (list) chromatic number of the class of 2 planar graphs."} {"_id": [0, 1, 3], "label": "cs.CV cs.CL cs.LG", "text": "Visual Semantic Embedding Model Informed by Structured Knowledge. We propose a novel approach to improve a visual semantic embedding model by incorporating concept representations captured from an external structured knowledge base. We investigate its performance on image classification under both standard and zero shot settings. We propose two novel evaluation frameworks to analyse classification errors with respect to the class hierarchy indicated by the knowledge base. The approach is tested using the ILSVRC 2012 image dataset and a WordNet knowledge base. With respect to both standard and zero shot image classification, our approach shows superior performance compared with the original approach, which uses word embeddings."} {"_id": [64, 59], "label": "physics.soc-ph cs.SI", "text": "The Fractional Preferential Attachment Scale Free Network Model. Many networks generated by nature have two generic properties they are formed in the process of preferential attachment and they are scale free. Considering these features, by interfering with mechanism of the preferential attachment , we propose a generalisation of the Barab 'asi Albert model the 'Fractional Preferential Attachment' (FPA) scale free network model that generates networks with time independent degree distributions p(k) sim k gamma with degree exponent 2 gamma leq3 (where gamma 3 corresponds to the typical value of the BA model). In the FPA model, the element controlling the network properties is the f parameter, where f in (0,1 rangle . Depending on the different values of f parameter, we study the statistical properties of the numerically generated networks. We investigate the topological properties of FPA networks such as degree distribution, degree correlation (network assortativity), clustering coefficient, average node degree, network diameter, average shortest path length and features of fractality. We compare the obtained values with the results for various synthetic and real world networks. It is found that, depending on f , the FPA model generates networks with parameters similar to the real world networks. Furthermore, it is shown that f parameter has a significant impact on, among others, degree distribution and degree correlation of generated networks. Therefore, the FPA scale free network model can be an interesting alternative to existing network models. In addition, it turns out that, regardless of the value of f , FPA networks are not fractal."} {"_id": [44, 45, 54], "label": "q-fin.CP q-fin.MF q-fin.PR", "text": "Sig SDEs model for quantitative finance. Mathematical models, calibrated to data, have become ubiquitous to make key decision processes in modern quantitative finance. In this work, we propose a novel framework for data driven model selection by integrating a classical quantitative setup with a generative modelling approach. Leveraging the properties of the signature, a well known path transform from stochastic analysis that recently emerged as leading machine learning technology for learning time series data, we develop the Sig SDE model. Sig SDE provides a new perspective on neural SDEs and can be calibrated to exotic financial products that depend, in a non linear way, on the whole trajectory of asset prices. Furthermore, we our approach enables to consistently calibrate under the pricing measure mathbb Q and real world measure mathbb P . Finally, we demonstrate the ability of Sig SDE to simulate future possible market scenarios needed for computing risk profiles or hedging strategies. Importantly, this new model is underpinned by rigorous mathematical analysis, that under appropriate conditions provides theoretical guarantees for convergence of the presented algorithms."} {"_id": [25], "label": "math.PR", "text": "Large deviations for random walks on Lie groups. We study large deviations for random walks on Lie groups defined by sigma n n exp( frac1nX 1) cdots exp( frac1nX n) , where X n n geq1 is an i.i.d sequence of bounded random variables in the Lie algebra mathfrak g . We follow a similar approach as in the proof of large deviations for geodesic random walks as given in Ver19 . This approach makes it possible to simply rescale the increments of the random walk, without having to resort to dilations in order to reduce the influence of higher order commutators. Finally, we will apply this large deviation result to the Lie group of stochastic matrices."} {"_id": [43], "label": "cs.DB", "text": "Progressive Cleaning and Mining of Uncertain Smart Water Meter Data. Several municipalities have recently installed wireless 'smart' water meters that allow functionalities such as demand response, leak alerts, identification of characteristic demand patterns, and detailed consumption analysis. To achieve these benefits, the meter data needs to be error free, which is not necessarily available in practice, due to 'dirtiness' or 'uncertainty' of data, which is mostly unavoidable. The focus of this paper is to investigate practical solutions to mine uncertain data for reliable results and to evaluate the impact of dirty data on filters. This evaluation would eventually lead to valuable information, which can be used for educated decision making on water planning strategies. We perform a systematic study of the errors existing in a large scale smart water meter deployments, which is helpful to better understand the nature of errors. Identifying customers contributing to a load peak is used as the main filter. The filter outputs are then combined with the domain expert knowledge to evaluate their accuracy and validity and also to look for potential errors. After discovering each error, we analyze its trails in the data and track back its source, which would eventually lead to the removal of the error or dealing with it accordingly. This procedure is applied progressively to ensure that all detectable errors are discovered and characterized in the data model. We evaluate the performance of the proposed approach using the smart water meter consumption data obtained from the City of Abbotsford, British Columbia, Canada. We present the results of both unprocessed and cleaned data and analyze, in detail, the sensitivity of the selected filter to the errors."} {"_id": [56, 2], "label": "cs.AI cs.LO", "text": "Sampling and Learning for Boolean Function. In this article, we continue our study on universal learning machine by introducing new tools. We first discuss boolean function and boolean circuit, and we establish one set of tools, namely, fitting extremum and proper sampling set. We proved the fundamental relationship between proper sampling set and complexity of boolean circuit. Armed with this set of tools, we then introduce much more effective learning strategies. We show that with such learning strategies and learning dynamics, universal learning can be achieved, and requires much less data."} {"_id": [52], "label": "cs.MA", "text": "Dealing with uncertainty in agent based models for short term predictions. Agent based models (ABM) are gaining traction as one of the most powerful modelling tools within the social sciences. They are particularly suited to simulating complex systems. Despite many methodological advances within ABM, one of the major drawbacks is their inability to incorporate real time data to make accurate short term predictions. This paper presents an approach that allows ABMs to be dynamically optimised. Through a combination of parameter calibration and data assimilation (DA), the accuracy of model based predictions using ABM in real time is increased. We use the exemplar of a bus route system to explore these methods. The bus route ABMs developed in this research are examples of ABMs that can be dynamically optimised by a combination of parameter calibration and DA. The proposed model and framework can also be used in an passenger information system, or in an Intelligent Transport Systems to provide forecasts of bus locations and arrival times."} {"_id": [50, 20, 55], "label": "math.NA cs.NA physics.geo-ph physics.med-ph", "text": "Inbetweening auto animation via Fokker Planck dynamics and thresholding. We propose an equilibrium driven deformation algorithm (EDDA) to simulate the inbetweening transformations starting from an initial image to an equilibrium image, which covers images varying from a greyscale type to a colorful type on plane or manifold. The algorithm is based on Fokker Planck dynamics on manifold, which automatically cooperates positivity, unconditional stability, mass conservation law, exponentially convergence and also the manifold structure suggested by dataset. The thresholding scheme is adapted for the sharp interface dynamics and is used to achieve the finite time convergence. Using EDDA, three challenging examples, (I) facial aging process, (II) coronavirus disease 2019 (COVID 19) invading treatment process, and (III) continental evolution process are conducted efficiently."} {"_id": [21], "label": "math.CO", "text": "Sequences in Dihedral Groups with Distinct Partial Products. Given a subset S of the non identity elements of the dihedral group of order 2m , is it possible to order the elements of S so that the partial products are distinct? This is equivalent to the sequenceability of the group when S 2m 1 and so it is known that the answer is yes in this case if and only if m 4 . We show that the answer is yes when S leq 9 and m is an odd prime other than 3, when S 2m 2 and m is even or prime, and when S 2m 2 for many instances of the problem when m is odd and composite. We also consider the problem in the more general setting of arbitrary non abelian groups and discuss connections between this work and the concept of strong sequenceability."} {"_id": [34], "label": "math.CV", "text": "L p theory for Cauchy transform on the unit disk. Let mathbb D be the unit disk and varphi in L p( mathbb D , mathrm d A) , where 1 leq p leq infty . For z in mathbb D , the Cauchy transform on mathbb D , denote by mathcal P , is defined as follows mathcal P varphi (z) int mathbb D left( frac varphi(w) w z frac z overline varphi(w) 1 bar w z right) mathrm d A(w). The Beurling transform on mathbb D , denote by mathcal H , is now defined as the z derivative of mathcal P . In this paper, by using Hardy's type inequalities and Bessel functions, we show that mathcal P L 2 to L 2 alpha approx1.086 , where alpha is a solution to the equation 2J 0(2 alpha) alpha J 1(2 alpha) 0 , and J 0 , J 1 are Bessel functions. Moreover, for p 2 , by using Taylor expansion, Parseval's formula and hypergeometric functions, we also prove that mathcal P L p to L infty 2( Gamma(2 q) Gamma 2(2 frac q 2 )) 1 q , where q p (p 1) is the conjugate exponent of p , and Gamma is the Gamma function. Finally, applying the same techniques developed in this paper, we show that the Beurling transform mathcal H acts as an isometry of L 2( mathbb D , mathrm d A) ."} {"_id": [0], "label": "cs.CV", "text": "TexturePose Supervising Human Mesh Estimation with Texture Consistency. This work addresses the problem of model based human pose estimation. Recent approaches have made significant progress towards regressing the parameters of parametric human body models directly from images. Because of the absence of images with 3D shape ground truth, relevant approaches rely on 2D annotations or sophisticated architecture designs. In this work, we advocate that there are more cues we can leverage, which are available for free in natural images, i.e., without getting more annotations, or modifying the network architecture. We propose a natural form of supervision, that capitalizes on the appearance constancy of a person among different frames (or viewpoints). This seemingly insignificant and often overlooked cue goes a long way for model based pose estimation. The parametric model we employ allows us to compute a texture map for each frame. Assuming that the texture of the person does not change dramatically between frames, we can apply a novel texture consistency loss, which enforces that each point in the texture map has the same texture value across all frames. Since the texture is transferred in this common texture map space, no camera motion computation is necessary, or even an assumption of smoothness among frames. This makes our proposed supervision applicable in a variety of settings, ranging from monocular video, to multi view images. We benchmark our approach against strong baselines that require the same or even more annotations that we do and we consistently outperform them. Simultaneously, we achieve state of the art results among model based pose estimation approaches in different benchmarks. The project website with videos, results, and code can be found at https seas.upenn.edu pavlakos projects texturepose."} {"_id": [9, 20, 13], "label": "math.AP cs.NA math.DS math.NA", "text": "Continuum limit of p Laplacian evolution problems on graphs L q graphons and sparse graphs. In this paper we study continuum limits of the discretized p Laplacian evolution problem on sparse graphs with homogeneous Neumann boundary conditions. This extends the results of 24 to a far more general class of kernels, possibly singular, and graph sequences whose limit are the so called L q graphons. More precisely, we derive a bound on the distance between two continuous in time trajectories defined by two different evolution systems (i.e. with different kernels, second member and initial data). Similarly, we provide a bound in the case that one of the trajectories is discrete in time and the other is continuous. In turn, these results lead us to establish error estimates of the full discretization of the p Laplacian problem on sparse random graphs. In particular, we provide rate of convergence of solutions for the discrete models to the solution of the continuous problem as the number of vertices grows."} {"_id": [56, 1, 2, 19], "label": "cs.CR cs.AI cs.LG cs.LO", "text": "Quantitative Verification of Neural Networks And its Security Applications. Neural networks are increasingly employed in safety critical domains. This has prompted interest in verifying or certifying logically encoded properties of neural networks. Prior work has largely focused on checking existential properties, wherein the goal is to check whether there exists any input that violates a given property of interest. However, neural network training is a stochastic process, and many questions arising in their analysis require probabilistic and quantitative reasoning, i.e., estimating how many inputs satisfy a given property. To this end, our paper proposes a novel and principled framework to quantitative verification of logical properties specified over neural networks. Our framework is the first to provide PAC style soundness guarantees, in that its quantitative estimates are within a controllable and bounded error from the true count. We instantiate our algorithmic framework by building a prototype tool called NPAQ that enables checking rich properties over binarized neural networks. We show how emerging security analyses can utilize our framework in 3 concrete point applications quantifying robustness to adversarial inputs, efficacy of trojan attacks, and fairness bias of given neural networks."} {"_id": [32, 68], "label": "cs.DS cs.DM", "text": "A Faster Parameterized Algorithm for Temporal Matching. A temporal graph is a sequence of graphs (called layers) over the same vertex set describing a graph topology which is subject to discrete changes over time. A Delta temporal matching M is a set of time edges (e,t) (an edge e paired up with a point in time t ) such that for all distinct time edges (e,t),(e',t') in M we have that e and e' do not share an endpoint, or the time labels t and t' are at least Delta time units apart. Mertzios et al. STACS '20 provided a 2 O( Delta nu) cdot mathcal G O(1) time algorithm to compute the maximum size of a Delta temporal matching in a temporal graph mathcal G , where mathcal G denotes the size of mathcal G , and nu is the Delta vertex cover number of mathcal G . The Delta vertex cover number is the minimum number nu such that the classical vertex cover number of the union of any Delta consecutive layers of the temporal graph is upper bounded by nu . We show an improved algorithm to compute a Delta temporal matching of maximum size with a running time of Delta O( nu) cdot mathcal G and hence provide an exponential speedup in terms of Delta ."} {"_id": [0, 1], "label": "cs.LG cs.CV", "text": "Attention based Neural Bag of Features Learning for Sequence Data. In this paper, we propose 2D Attention (2DA), a generic attention formulation for sequence data, which acts as a complementary computation block that can detect and focus on relevant sources of information for the given learning objective. The proposed attention module is incorporated into the recently proposed Neural Bag of Feature (NBoF) model to enhance its learning capacity. Since 2DA acts as a plug in layer, injecting it into different computation stages of the NBoF model results in different 2DA NBoF architectures, each of which possesses a unique interpretation. We conducted extensive experiments in financial forecasting, audio analysis as well as medical diagnosis problems to benchmark the proposed formulations in comparison with existing methods, including the widely used Gated Recurrent Units. Our empirical analysis shows that the proposed attention formulations can not only improve performances of NBoF models but also make them resilient to noisy data."} {"_id": [9], "label": "math.AP", "text": "An isoperimetric problem with a competing nonlocal singular term. In this paper, we investigate the minimization of a functional in which the usual perimeter is competing with a nonlocal singular term comparable (but not necessarily equal to) a fractional perimeter. The motivation for this problem is a cell motility model introduced in some previous work by the first author. We establish several facts about global minimizers with a volume constraint. In particular we prove that minimizers exist and are radially symmetric for small mass, while minimizers cannot be radially symmetric for large mass. For large mass, we prove that the minimizing sequences either split into smaller sets that drift to infinity or develop fingers of a prescribed width. Finally, we connect these two alternatives to a related minimization problem for the optimal constant in a classical interpolation inequality (a Gagliardo Nirenberg type inequality for fractional perimeter)."} {"_id": [67], "label": "physics.atom-ph", "text": "Loss rates for high n , 49 lesssim n lesssim150 , 5sns( 3 S 1 ) Rydberg atoms excited in an 84 Sr Bose Einstein condensate. Measurements of the loss rates for strontium n 3 S 1 Rydberg atoms excited in a dense BEC are presented for values of principal quantum number n in the range 49 lesssim n lesssim 150 and local atom densities of sim1 to 3 times10 14 cm 3 . Two main processes contribute to loss, associative ionization and state changing. The relative importance of these two loss channels is investigated and their n and density dependences are discussed using a model in which Rydberg atom loss is presumed to involve a close collision between the Rydberg core ion and ground state atoms. The present measurements are compared to earlier results obtained using rubidium Rydberg atoms. For both species the observed loss rates are sizable, sim10 5 10 6 s 1 , and limit the time scales over which measurements involving Rydberg atoms immersed in quantum degenerate gases can be conducted."} {"_id": [3], "label": "cs.CL", "text": "An Empirical Investigation Towards Efficient Multi Domain Language Model Pre training. Pre training large language models has become a standard in the natural language processing community. Such models are pre trained on generic data (e.g. BookCorpus and English Wikipedia) and often fine tuned on tasks in the same domain. However, in order to achieve state of the art performance on out of domain tasks such as clinical named entity recognition and relation extraction, additional in domain pre training is required. In practice, staged multi domain pre training presents performance deterioration in the form of catastrophic forgetting (CF) when evaluated on a generic benchmark such as GLUE. In this paper we conduct an empirical investigation into known methods to mitigate CF. We find that elastic weight consolidation provides best overall scores yielding only a 0.33 drop in performance across seven generic tasks while remaining competitive in bio medical tasks. Furthermore, we explore gradient and latent clustering based data selection techniques to improve coverage when using elastic weight consolidation and experience replay methods."} {"_id": [15], "label": "cs.IT math.IT", "text": "Efficient Design of Subblock Energy Constrained Codes and Sliding Window Constrained Codes. The subblock energy constrained codes (SECCs) and sliding window constrained codes (SWCCs) have recently attracted attention due to various applications in communcation systems such as simultaneous energy and information transfer. In a SECC, each codewod is divided into smaller non overlapping windows, called subblocks, and every subblock is constrained to carry sufficient energy. In a SWCC, the energy constraint is enforced over every window. In this work, we focus on the binary channel, where sufficient energy is achieved theoretically by using relatively high weight codes, and study SECCs and SWCCs under more general constraints, namely bounded SECCs and bounded SWCCs. We propose two methods to construct such codes with low redundancy and linear time complexity, based on Knuth's balancing technique and sequence replacement technique. For certain codes parameters, our methods incur only one redundant bit. We also impose the minimum distance constraint for error correction capability of the designed codes, which helps to reduce the error propagation during decoding as well."} {"_id": [65, 19], "label": "cs.NI cs.CR", "text": "Position paper A systematic framework for categorising IoT device fingerprinting mechanisms. The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to fingerprint them, for example in order to detect if there are misbehaving or even malicious IoT devices in one's network. The aim of this paper is to provide a systematic categorisation of machine learning augmented techniques that can be used for fingerprinting IoT devices. This can serve as a baseline for comparing various IoT fingerprinting mechanisms, so that network administrators can choose one or more mechanisms that are appropriate for monitoring and maintaining their network. We carried out an extensive literature review of existing papers on fingerprinting IoT devices paying close attention to those with machine learning features. This is followed by an extraction of important and comparable features among the mechanisms outlined in those papers. As a result, we came up with a key set of terminologies that are relevant both in the fingerprinting context and in the IoT domain. This enabled us to construct a framework called IDWork, which can be used for categorising existing IoT fingerprinting mechanisms in a way that will facilitate a coherent and fair comparison of these mechanisms. We found that the majority of the IoT fingerprinting mechanisms take a passive approach mainly through network sniffing instead of being intrusive and interactive with the device of interest. Additionally, a significant number of the surveyed mechanisms employ both static and dynamic approaches, in order to benefit from complementary features that can be more robust against certain attacks such as spoofing and replay attacks."} {"_id": [0, 1, 4], "label": "cs.CV cs.LG cs.NE", "text": "Deep Network Ensemble Learning applied to Image Classification using CNN Trees. Traditional machine learning approaches may fail to perform satisfactorily when dealing with complex data. In this context, the importance of data mining evolves w.r.t. building an efficient knowledge discovery and mining framework. Ensemble learning is aimed at integration of fusion, modeling and mining of data into a unified model. However, traditional ensemble learning methods are complex and have optimization or tuning problems. In this paper, we propose a simple, sequential, efficient, ensemble learning approach using multiple deep networks. The deep network used in the ensembles is ResNet50. The model draws inspiration from binary decision classification trees. The proposed approach is compared against the baseline viz. the single classifier approach i.e. using a single multiclass ResNet50 on the ImageNet and Natural Images datasets. Our approach outperforms the baseline on all experiments on the ImageNet dataset. Code is available in https github.com mueedhafiz1982 CNNTreeEnsemble.git"} {"_id": [40], "label": "cs.IR", "text": "Let's measure run time! Extending the IR replicability infrastructure to include performance aspects. Establishing a docker based replicability infrastructure offers the community a great opportunity measuring the run time of information retrieval systems. The time required to present query results to a user is paramount to the users satisfaction. Recent advances in neural IR re ranking models put the issue of query latency at the forefront. They bring a complex trade off between performance and effectiveness based on a myriad of factors the choice of encoding model, network architecture, hardware acceleration and many others. The best performing models (currently using the BERT transformer model) run orders of magnitude more slowly than simpler architectures. We aim to broaden the focus of the neural IR community to include performance considerations to sustain the practical applicability of our innovations. In this position paper we supply our argument with a case study exploring the performance of different neural re ranking models. Finally, we propose to extend the OSIRRC docker based replicability infrastructure with two performance focused benchmark scenarios."} {"_id": [0, 1, 4], "label": "cs.NE cs.CV cs.LG", "text": "Neuroevolution in Deep Neural Networks Current Trends and Future Challenges. A variety of methods have been applied to the architectural configuration and learning or training of artificial deep neural networks (DNN). These methods play a crucial role in the success or failure of the DNN for most problems and applications. Evolutionary Algorithms (EAs) are gaining momentum as a computationally feasible method for the automated optimisation and training of DNNs. Neuroevolution is a term which describes these processes of automated configuration and training of DNNs using EAs. While many works exist in the literature, no comprehensive surveys currently exist focusing exclusively on the strengths and limitations of using neuroevolution approaches in DNNs. Prolonged absence of such surveys can lead to a disjointed and fragmented field preventing DNNs researchers potentially adopting neuroevolutionary methods in their own research, resulting in lost opportunities for improving performance and wider application within real world deep learning problems. This paper presents a comprehensive survey, discussion and evaluation of the state of the art works on using EAs for architectural configuration and training of DNNs. Based on this survey, the paper highlights the most pertinent current issues and challenges in neuroevolution and identifies multiple promising future research directions."} {"_id": [68, 49, 85, 21, 25], "label": "math.PR cs.DM math.CO math.OC physics.data-an", "text": "The Pendulum Arrangement Maximizing the Escape Time of Heterogeneous Random Walks. We identify a fundamental phenomenon of heterogeneous one dimensional random walks the escape (traversal) time is maximized when the heterogeneity in transition probabilities forms a pyramid like potential barrier. This barrier corresponds to a distinct arrangement of transition probabilities, sometimes referred to as the pendulum arrangement. We reduce this problem to a sum over products, combinatorial optimization problem, proving that this unique structure always maximizes the escape time. This general property may influence studies in epidemiology, biology, and computer science to better understand escape time behavior and construct intruder resilient networks."} {"_id": [3], "label": "cs.CL", "text": "Automatic Spanish Translation of the SQuAD Dataset for Multilingual Question Answering. Recently, multilingual question answering became a crucial research topic, and it is receiving increased interest in the NLP community. However, the unavailability of large scale datasets makes it challenging to train multilingual QA systems with performance comparable to the English ones. In this work, we develop the Translate Align Retrieve (TAR) method to automatically translate the Stanford Question Answering Dataset (SQuAD) v1.1 to Spanish. We then used this dataset to train Spanish QA systems by fine tuning a Multilingual BERT model. Finally, we evaluated our QA models with the recently proposed MLQA and XQuAD benchmarks for cross lingual Extractive QA. Experimental results show that our models outperform the previous Multilingual BERT baselines achieving the new state of the art value of 68.1 F1 points on the Spanish MLQA corpus and 77.6 F1 and 61.8 Exact Match points on the Spanish XQuAD corpus. The resulting, synthetically generated SQuAD es v1.1 corpora, with almost 100 of data contained in the original English version, to the best of our knowledge, is the first large scale QA training resource for Spanish."} {"_id": [41, 28, 62], "label": "cs.CG cs.GT cs.RO", "text": "Escaping an Infinitude of Lions. We consider the following game played in the Euclidean plane There is any countable set of unit speed lions and one fast man who can run with speed 1 varepsilon for some value varepsilon 0 . Can the man survive? We answer the question in the affirmative for any varepsilon 0 ."} {"_id": [13], "label": "math.DS", "text": "Proof of the exact overlaps conjecture for systems with algebraic contractions. We establish the exact overlaps conjecture for iterated functions systems on the real line with algebraic contractions and arbitrary translations."} {"_id": [25], "label": "math.PR", "text": "Random Matrices from Linear Codes and Wigner's Semicircle Law II. Recently we considered a class of random matrices obtained by choosing distinct codewords at random from linear codes over finite fields and proved that under some natural algebraic conditions their empirical spectral distribution converges to Wigner's semicircle law as the length of the codes goes to infinity. One of the conditions is that the dual distance of the codes is at least 5. In this paper, employing more advanced techniques related to Stieltjes transform, we show that the dual distance being at least 5 is sufficient to ensure the convergence, and the convergence rate is of the form n beta for some 0 beta 1 , where n is the length of the code."} {"_id": [9], "label": "math.AP", "text": "Equivalence of conditions on initial data below the ground state to NLS with a repulsive inverse power potential. In this paper, we consider the nonlinear Schr \"odinger equation with a repulsive inverse power potential. First, we show that some global well posedness results and \"blow up or grow up\" results below the ground state without the potential. Then, we prove equivalence of the conditions on the initial data below the ground state without potential. We note that recently, we established existence of a radial ground state and characterized it by the virial functional for NLS with a general potential in two or higher space dimensions in 8 . Then, we also prove a global well posedness result and a \"blow up or grow up\" result below the radial ground state with a repulsive inverse power potential obtained in 8 ."} {"_id": [25], "label": "math.PR", "text": "Dynamics of continuous time Markov chains with applications. This paper contributes an in depth study of properties of continuous time Markov chains (CTMCs) on non negative integer lattices N 0 d , with particular interest in one dimensional CTMCs with polynomial transitions rates. Such stochastic processes are abundant in applications, in particular in biology. We characterize the structure of the state space of general CTMCs on N 0 d in terms of the set of jump vectors and their corresponding transition rate functions. For CTMCs on N 0 with polynomial transition rate functions, we provide threshold criteria in terms of easily computable parameters for various dynamical properties such as explosivity, recurrence, transience, certain absorption, positive null recurrence, implosivity, and existence and non existence of moments of hitting times. In particular, simple sufficient conditions for exponential ergodicity of stationary distributions and quasi stationary distributions are obtained, and the few gap cases are well illustrated by examples. Subtle differences in conditions for different dynamical properties are revealed in terms of examples. Finally, we apply our results to stochastic reaction networks, an extended class of branching processes, a general bursty single cell stochastic gene expression model, and population processes which are not birth death processes."} {"_id": [32, 28], "label": "cs.DS cs.CG", "text": "Pattern Matching in Doubling Spaces. We consider the problem of matching a metric space (X,d X) of size k with a subspace of a metric space (Y,d Y) of size n geq k , assuming that these two spaces have constant doubling dimension delta . More precisely, given an input parameter rho geq 1 , the rho distortion problem is to find a one to one mapping from X to Y that distorts distances by a factor at most rho . We first show by a reduction from k clique that, in doubling dimension log 2 3 , this problem is NP hard and W 1 hard. Then we provide a near linear time approximation algorithm for fixed k Given an approximation ratio 0 varepsilon leq 1 , and a positive instance of the rho distortion problem, our algorithm returns a solution to the (1 varepsilon) rho distortion problem in time ( rho varepsilon) O(1) n log n . We also show how to extend these results to the minimum distortion problem in doubling spaces We prove the same hardness results, and for fixed k , we give a (1 varepsilon) approximation algorithm running in time ( dist (X,Y) varepsilon) O(1) n 2 log n , where dist (X,Y) denotes the minimum distortion between X and Y ."} {"_id": [17], "label": "cs.DC", "text": "Scalable Consensus Protocols for PoW based Blockchain and blockDAG. In this paper, we propose two models for scaling the transaction throughput in Proof of Work (PoW) based blockchain networks. In the first approach, a mathematical model has derived for optimal transaction throughput for PoW based longest chain rule blockchain. In this approach, the blockchain Peer to Peer (P2P) network is considered as Erd \"os R 'enyi random network topology. This approach is however limited by the block creation rate, the results suggest that the rate beyond an optimal point can result in unfairness in the system. The second approach is a new consensus protocol proposed by considering the ledger as a Directed Acyclic Graph (DAG) called blockDAG instead of a chain of blocks. In this framework, we follow a two step strategy that makes the system robust enough to handle the double spend attacks. The first step involves the development of an unsupervised learning graph clustering algorithm for separating the blocks created by an attacker. In the second step, the attackers blocks are eliminated and the remaining blocks are arranged in topological order by honest clients which makes the blockDAG system suitable for smart contract applications found in Internet of Things (IoT) services. The Simulation results demonstrate a significant improvement in the transaction throughput compared to bitcoin."} {"_id": [68], "label": "cs.DM", "text": "On the Parameterized Complexity Of Grid Contraction. For a family of graphs mathcal G , the mathcal G textsc Contraction problem takes as an input a graph G and an integer k , and the goal is to decide if there exists F subseteq E(G) of size at most k such that G F belongs to mathcal G . Here, G F is the graph obtained from G by contracting all the edges in F . In this article, we initiate the study of textsc Grid Contraction from the parameterized complexity point of view. We present a fixed parameter tractable algorithm, running in time c k cdot V(G) mathcal O (1) , for this problem. We complement this result by proving that unless ETH fails, there is no algorithm for textsc Grid Contraction with running time c o(k) cdot V(G) mathcal O (1) . We also present a polynomial kernel for this problem."} {"_id": [8, 36], "label": "physics.chem-ph physics.optics", "text": "Generalized phase sensitivity of directional bond breaking in laser molecule interaction. We establish a generalized picture of the phase sensitivity of laser induced directional bond breaking using the H 2 molecule as the example. We show that the well known proton ejection anisotropy measured with few cycle pulses arises as an amplitude modulation of an intrinsic anisotropy that is sensitive to the laser phase at the ionization time and determined by the molecule's electronic structure. Our work furthermore reveals a strong electron proton correlation that may open up a new approach to experimentally accessing the laser sub cycle intramolecular electron dynamics also in large molecules."} {"_id": [56], "label": "cs.LO", "text": "A Stricter Heap Separating Points To Logic. Dynamic memory issues are hard to locate and may cost much of a development project's efforts and was repeatedly reported similarly afterwards independently by different persons. Verification as one formal method may proof a given program's heap matches a specified dynamic behaviour. Dynamic (or heap) memory, is the region within main memory that is manipulated by program statements like alloc, free and pointer manipulation during program execution. Usually, heap memory is allocated for problems where the amount of used memory is unknown prior to execution. Regions within the heap may be related \"somehow\" with each other, often, but not always, by pointers containing absolute addresses of related heap cells. The data structure described by all valid pointer variables manifests heap graphs. A heap graph is a directed connected simple graph within the dynamic memory which may contain cycles, and where each vertex represents an unique memory address and every edge links two heap vertices. The heap graph must be pointed by at least one variable from the local stack or a chain of other heap graphs which is finally pointed by at least one stacked variable. Heap vertices may not overlap. A heap formula expresses the assertion on dynamic memory and can either be a heaplet, or a recursively defined heap spatial or logical formula."} {"_id": [3], "label": "cs.CL", "text": "CAPT Contrastive Pre Training for Learning Denoised Sequence Representations. Pre trained self supervised models such as BERT have achieved striking success in learning sequence representations, especially for natural language processing. These models typically corrupt the given sequences with certain types of noise, such as masking, shuffling, or substitution, and then try to recover the original input. However, such pre training approaches are prone to learning representations that are covariant with the noise, leading to the discrepancy between the pre training and fine tuning stage. To remedy this, we present ContrAstive Pre Training (CAPT) to learn noise invariant sequence representations. The proposed CAPT encourages the consistency between representations of the original sequence and its corrupted version via unsupervised instance wise training signals. In this way, it not only alleviates the pretrain finetune discrepancy induced by the noise of pre training, but also aids the pre trained model in better capturing global semantics of the input via more effective sentence level supervision. Different from most prior work that focuses on a particular modality, comprehensive empirical evidence on 11 natural language understanding and cross modal tasks illustrates that CAPT is applicable for both language and vision language tasks, and obtains surprisingly consistent improvement, including 0.6 absolute gain on GLUE benchmarks and 0.8 absolute increment on text NLVR 2 ."} {"_id": [94], "label": "physics.ed-ph", "text": "Developing Careers in Physics Perspectives of Particle Physics Researchers from the VBScan network at various stages of their careers. Outlooks of particle physics researchers on their careers and the general challenges in establishing their careers over different career stages are surveyed using a questionnaire distributed to participants in an ERC funded research network, \"VBScan\". The respondents displayed a great deal of insight into what is needed for a career in academia, or more specifically particle physics, though they also did not downplay the element of \"luck\". Some notable differences between career levels could be observed in problems raised and attitudes towards careers."} {"_id": [1, 25], "label": "cs.LG math.PR", "text": "Strong Log Concavity Does Not Imply Log Submodularity. We disprove a recent conjecture regarding discrete distributions and their generating polynomials stating that strong log concavity implies log submodularity."} {"_id": [22], "label": "cs.SE", "text": "Towards Bridging the Gap between Control and Self Adaptive System Properties. Two of the main paradigms used to build adaptive software employ different types of properties to capture relevant aspects of the system's run time behavior. On the one hand, control systems consider properties that concern static aspects like stability, as well as dynamic properties that capture the transient evolution of variables such as settling time. On the other hand, self adaptive systems consider mostly non functional properties that capture concerns such as performance, reliability, and cost. In general, it is not easy to reconcile these two types of properties or identify under which conditions they constitute a good fit to provide run time guarantees. There is a need of identifying the key properties in the areas of control and self adaptation, as well as of characterizing and mapping them to better understand how they relate and possibly complement each other. In this paper, we take a first step to tackle this problem by (1) identifying a set of key properties in control theory, (2) illustrating the formalization of some of these properties employing temporal logic languages commonly used to engineer self adaptive software systems, and (3) illustrating how to map key properties that characterize self adaptive software systems into control properties, leveraging their formalization in temporal logics. We illustrate the different steps of the mapping on an exemplar case in the cloud computing domain and conclude with identifying open challenges in the area."} {"_id": [20, 7], "label": "math.NA cs.NA physics.comp-ph", "text": "A fully coupled numerical model of thermo hydro mechanical processes and fracture contact mechanics in porous media. A range of phenomena in the subsurface is characterised by the interplay between coupled thermal, hydraulic and mechanical processes and deforming structures such as fractures. Modelling subsurface dynamics can provide valuable phenomenological understanding, but requires models which faithfully represent the dynamics involved these models, therefore are themselves highly complex. This paper presents a mixed dimensional thermo hydro mechanical model designed to capture the process structure interplay using a discrete fracture matrix framework. It incorporates tightly coupled thermo hydro mechanical processes based on laws for momentum, mass and entropy in subdomains representing the matrix and the lower dimensional fractures and fracture intersections. The deformation of explicitly represented fractures is modelled by contact mechanics relations and a Coulomb friction law, with particular attention on coupling of fracture dilation to the governing equations in both fractures and matrix. The model is discretised using multi point finite volumes for the balance equations and a semismooth Newton scheme for the contact conditions and is implemented in the open source fracture simulation toolbox PorePy. Finally, simulation studies demonstrate the model's convergence, investigate process structure coupling effects, explore different fracture dilation models and show an application of the model to a 3d geothermal pressure stimulation and long term cooling scenario."} {"_id": [9], "label": "math.AP", "text": "Strauss exponent for semilinear wave equations with scattering space dependent damping. It is believed or conjectured that the semilinear wave equations with scattering space dependent damping admit the Strauss critical exponent, see Ikehata Todorova Yordanov cite ITY (the bottom in page 2) and Nishihara Sobajima Wakasugi cite N2 (conjecture iii in page 4). In this work, we are devoted to showing the conjecture is true at least when the decay rate of the space dependent variable coefficients before the damping is larger than 2. Also, if the nonlinear term depends only on the derivative of the solution, we may prove the upper bound of the lifespan is the same as that of the solution of the corresponding problem without damping. This shows in another way the lq lq hyperbolicity\" of the equation."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Improving Dialogue Breakdown Detection with Semi Supervised Learning. Building user trust in dialogue agents requires smooth and consistent dialogue exchanges. However, agents can easily lose conversational context and generate irrelevant utterances. These situations are called dialogue breakdown, where agent utterances prevent users from continuing the conversation. Building systems to detect dialogue breakdown allows agents to recover appropriately or avoid breakdown entirely. In this paper we investigate the use of semi supervised learning methods to improve dialogue breakdown detection, including continued pre training on the Reddit dataset and a manifold based data augmentation method. We demonstrate the effectiveness of these methods on the Dialogue Breakdown Detection Challenge (DBDC) English shared task. Our submissions to the 2020 DBDC5 shared task place first, beating baselines and other submissions by over 12 accuracy. In ablations on DBDC4 data from 2019, our semi supervised learning methods improve the performance of a baseline BERT model by 2 accuracy. These methods are applicable generally to any dialogue task and provide a simple way to improve model performance."} {"_id": [13], "label": "math.DS", "text": "Direct proof of unconditional asymptotic consensus in the Hegselmann Krause model with transmission type delay. We present a direct proof of asymptotic consensus in the nonlinear Hegselmann Krause model with transmission type delay, where the communication weights depend on the particle distance in phase space. Our approach is based on an explicit estimate of the shrinkage of the group diameter on finite time intervals and avoids the usage of Lyapunov type functionals or results from nonnegative matrix theory. It works for both the original formulation of the model with communication weights scaled by the number of agents, and the modification with weights normalized a'la Motsch Tadmor. We pose only minimal assumptions on the model parameters. In particular, we only assume global positivity of the influence function, without imposing any conditions on its decay rate or monotonicity. Moreover, our result holds for any length of the delay."} {"_id": [42], "label": "math.DG", "text": "The Entropy of Ricci Flows with Type I Scalar Curvature Bounds. In this paper, we extend the theory of Ricci flows satisfying a Type I scalar curvature condition at a finite time singularity. In Bam16 , Bamler showed that a Type I rescaling procedure will produce a singular shrinking gradient Ricci soliton with singularities of codimension 4. We prove that the entropy of a conjugate heat kernel based at the singular time converges to the soliton entropy of the singular soliton, and use this to characterize the singular set of the Ricci flow solution in terms of a heat kernel density function. This generalizes results previously only known with the stronger assumption of a Type I curvature bound. We also show that in dimension 4, the singular Ricci soliton is smooth away from finitely many points, which are conical smooth orbifold singularities"} {"_id": [42, 46], "label": "math.DG math.AG", "text": "Convergence of volume forms on a family of log Calabi Yau varieties to a non Archimedean measure. We study the convergence of volume forms on a degenerating holomorphic family of log Calabi Yau varieties to a non Archimedean measure, extending a result of Boucksom and Jonsson. More precisely, let (X,B) be a holomorphic family of sub log canonical, log Calabi Yau complex varieties parameterized by the punctured unit disk. Let eta be a meromorphic volume form on X with poles along B . We show that the (possibly infinite) measures induced by the restriction of the eta to a fiber converge to a measure on the Berkovich analytification as we approach the puncture. The convergence takes place on a hybrid space, which is obtained by filling in the space X setminus B with the aforementioned Berkovich space over the puncture."} {"_id": [17, 19, 68], "label": "cs.CR cs.DC cs.DM", "text": "A Distributed Computing Perspective of Unconditionally Secure Information Transmission in Russian Cards Problems. The problem of A privately transmitting information to B by a public announcement overheard by an eavesdropper C is considered. To do so by a deterministic protocol, their inputs must be correlated. Dependent inputs are represented using a deck of cards. There is a publicly known signature (a,b,c) , where n a b c r , and A gets a cards, B gets b cards, and C gets c cards, out of the deck of n cards. Using a deterministic protocol, A decides its announcement based on her hand. Using techniques from coding theory, Johnson graphs, and additive number theory, a novel perspective inspired by distributed computing theory is provided, to analyze the amount of information that A needs to send, while preventing C from learning a single card of her hand. In one extreme, the generalized Russian cards problem, B wants to learn all of A 's cards, and in the other, B wishes to learn something about A 's hand."} {"_id": [58], "label": "q-bio.NC", "text": "Latent dynamical variables produce signatures of spatiotemporal criticality in large biological systems. Understanding the activity of large populations of neurons is difficult due to the combinatorial complexity of possible cell cell interactions. To reduce the complexity, coarse graining had been previously applied to experimental neural recordings, which showed over two decades of scaling in free energy, activity variance, eigenvalue spectra, and correlation time, hinting that the mouse hippocampus operates in a critical regime. We model the experiment by simulating conditionally independent binary neurons coupled to a small number of long timescale stochastic fields and then replicating the coarse graining procedure and analysis. This reproduces the experimentally observed scalings, suggesting that they may arise from coupling the neural population activity to latent dynamic stimuli. Further, parameter sweeps for our model suggest that emergence of scaling requires most of the cells in a population to couple to the latent stimuli, predicting that even the celebrated place cells must also respond to non place stimuli."} {"_id": [0], "label": "cs.CV", "text": "Active Crowd Counting with Limited Supervision. To learn a reliable people counter from crowd images, head center annotations are normally required. Annotating head centers is however a laborious and tedious process in dense crowds. In this paper, we present an active learning framework which enables accurate crowd counting with limited supervision given a small labeling budget, instead of randomly selecting images to annotate, we first introduce an active labeling strategy to annotate the most informative images in the dataset and learn the counting model upon them. The process is repeated such that in every cycle we select the samples that are diverse in crowd density and dissimilar to previous selections. In the last cycle when the labeling budget is met, the large amount of unlabeled data are also utilized a distribution classifier is introduced to align the labeled data with unlabeled data furthermore, we propose to mix up the distribution labels and latent representations of data in the network to particularly improve the distribution alignment in between training samples. We follow the popular density estimation pipeline for crowd counting. Extensive experiments are conducted on standard benchmarks i.e. ShanghaiTech, UCF CC 50, MAll, TRANCOS, and DCC. By annotating limited number of images (e.g. 10 of the dataset), our method reaches levels of performance not far from the state of the art which utilize full annotations of the dataset."} {"_id": [1, 2, 3], "label": "cs.LG cs.AI cs.CL", "text": "Quantifying Attention Flow in Transformers. In the Transformer model, \"self attention\" combines information from attended embeddings into the representation of the focal embedding in the next layer. Thus, across layers of the Transformer, information originating from different tokens gets increasingly mixed. This makes attention weights unreliable as explanations probes. In this paper, we consider the problem of quantifying this flow of information through self attention. We propose two methods for approximating the attention to input tokens given attention weights, attention rollout and attention flow, as post hoc methods when we use attention weights as the relative relevance of the input tokens. We show that these methods give complementary views on the flow of information, and compared to raw attention, both yield higher correlations with importance scores of input tokens obtained using an ablation method and input gradients."} {"_id": [68], "label": "cs.DM", "text": "On optimal ordering in the optimal stopping problem. In the classical optimal stopping problem, a player is given a sequence of random variables X 1 ldots X n with known distributions. After observing the realization of X i , the player can either accept the observed reward from X i and stop, or reject the observed reward from X i and continue to observe the next variable X i 1 in the sequence. Under any fixed ordering of the random variables, an optimal stopping policy, one that maximizes the player's expected reward, is given by the solution of a simple dynamic program. In this paper, we investigate the relatively less studied question of selecting the order in which the random variables should be observed so as to maximize the expected reward at the stopping time. To demonstrate the benefits of order selection, we prove a novel prophet inequality showing that, when the support of each random variable has size at most 2, the optimal ordering can achieve an expected reward that is within a factor of 1.25 of the expected hindsight maximum this is an improvement over the corresponding factor of 2 for the worst case ordering. We also provide a simple O(n 2) algorithm for finding an optimal ordering in this case. Perhaps surprisingly, we demonstrate that a slightly more general case each random variable X i is restricted to have 3 point support of form 0, m i, 1 is NP hard, and provide an FPTAS for that case."} {"_id": [32, 49, 2], "label": "cs.DS cs.AI math.OC", "text": "On combinatorial optimization for dominating sets (literature survey, new models). The paper focuses on some versions of connected dominating set problems basic problems and multicriteria problems. A literature survey on basic problem formulations and solving approaches is presented. The basic connected dominating set problems are illustrated by simplifyed numerical examples. New integer programming formulations of dominating set problems (with multiset estimates) are suggested."} {"_id": [90], "label": "physics.space-ph", "text": "In Orbit Aerodynamic Coefficient Measurements using SOAR (Satellite for Orbital Aerodynamics Research). The Satellite for Orbital Aerodynamics Research (SOAR) is a CubeSat mission, due to be launched in 2021, to investigate the interaction between different materials and the atmospheric flow regime in very low Earth orbits (VLEO). Improving knowledge of the gas surface interactions at these altitudes and identification of novel materials that can minimise drag or improve aerodynamic control are important for the design of future spacecraft that can operate in lower altitude orbits. Such satellites may be smaller and cheaper to develop or can provide improved Earth observation data or communications link budgets and latency. Using precise orbit and attitude determination information and the measured atmospheric flow characteristics the forces and torques experienced by the satellite in orbit can be studied and estimates of the aerodynamic coefficients calculated. This paper presents the scientific concept and design of the SOAR mission. The methodology for recovery of the aerodynamic coefficients from the measured orbit, attitude, and in situ atmospheric data using a least squares orbit determination and free parameter fitting process is described and the experimental uncertainty of the resolved aerodynamic coefficients is estimated. The presented results indicate that the combination of the satellite design and experimental methodology are capable of clearly illustrating the variation of drag and lift coefficient for differing surface incidence angle. The lowest uncertainties for the drag coefficient measurement are found at approximately 300 km, whilst the measurement of lift coefficient improves for reducing orbital altitude to 200 km."} {"_id": [22], "label": "cs.SE", "text": "Java Decompiler Diversity and its Application to Meta decompilation. During compilation from Java source code to bytecode, some information is irreversibly lost. In other words, compilation and decompilation of Java code is not symmetric. Consequently, decompilation, which aims at producing source code from bytecode, relies on strategies to reconstruct the information that has been lost. Different Java decompilers use distinct strategies to achieve proper decompilation. In this work, we hypothesize that the diverse ways in which bytecode can be decompiled has a direct impact on the quality of the source code produced by decompilers. In this paper, we assess the strategies of eight Java decompilers with respect to three quality indicators syntactic correctness, syntactic distortion and semantic equivalence modulo inputs. Our results show that no single modern decompiler is able to correctly handle the variety of bytecode structures coming from real world programs. The highest ranking decompiler in this study produces syntactically correct, and semantically equivalent code output for 84 , respectively 78 , of the classes in our dataset. Our results demonstrate that each decompiler correctly handles a different set of bytecode classes. We propose a new decompiler called Arlecchino that leverages the diversity of existing decompilers. To do so, we merge partial decompilation into a new one based on compilation errors. Arlecchino handles 37.6 of bytecode classes that were previously handled by no decompiler. We publish the sources of this new bytecode decompiler."} {"_id": [9], "label": "math.AP", "text": "Existence of a Stationary Navier Stokes Flow Past a Rigid Body, with Application to Starting Problem in Higher Dimensions. We consider the large time behavior of the Navier Stokes flow past a rigid body in mathbb R n with n geq 3 . We first construct a small stationary solution possessing the optimal summability at spatial infinity, which is the same as that of the Oseen fundamental solution. When the translational velocity of the body gradually increases and is maintained after a certain finite time, we then show that the nonstationary fluid motion converges to the stationary solution corresponding to a small terminal velocity of the body as time t rightarrow infty in L q with q in n, infty . This is called Finn's starting problem and the three dimensional case was affirmatively solved by Galdi, Heywood and Shibata (1997). The present paper extends their result to the case of higher dimensions. Even for the three dimensional case, our theorem provides new convergence rate, that is determined by the summability of the stationary solution at infinity and seems to be sharp."} {"_id": [32], "label": "cs.DS", "text": "Simplifying Activity on Edge Graphs. We formalize the simplification of activity on edge graphs used for visualizing project schedules, where the vertices of the graphs represent project milestones, and the edges represent either tasks of the project or timing constraints between milestones. In this framework, a timeline of the project can be constructed as a leveled drawing of the graph, where the levels of the vertices represent the time at which each milestone is scheduled to happen. We focus on the following problem given an activity on edge graph representing a project, find an equivalent activity on edge graph (one with the same critical paths) that has the minimum possible number of milestone vertices among all equivalent activity on edge graphs. We provide a polynomial time algorithm for solving this graph minimization problem."} {"_id": [46], "label": "math.AG", "text": "Toric varieties from cyclic matrix semigroups. We present and expand some existing results on the Zariski closure of cyclic groups and semigroups of matrices. We show that, with the exclusion of isolated points, their irreducible components are toric varieties. Additionally, we demonstrate how every toric variety can be realized as the Zariski closure of a cyclic matrix group. Our paper includes a number of explicit examples and a note on existing computational results."} {"_id": [35], "label": "math.RA", "text": "On some combinatorial properties of generalized cluster algebras. In this paper, we prove some combinatorial results on generalized cluster algebras. To be more precisely, we prove that (i) the seeds of a generalized cluster algebra mathcal A( mathcal S) whose clusters contain particular cluster variables form a connected subgraph of the exchange graph of mathcal A( mathcal S) (ii) there exists a bijection from the set of cluster variables of a generalized cluster algebra to the set of cluster variables of another generalized cluster algebra, if their initial exchange matrices satisfying a mild condition. Moreover, this bijection preserves the set of clusters of these two generalized cluster algebras. As applications of the second result, we prove some properties of the components of the d vectors of a generalized cluster algebra and we give a characterization for the clusters of a generalized cluster algebra."} {"_id": [64, 62, 31], "label": "physics.soc-ph cs.GT q-bio.PE", "text": "Punishing defectors and rewarding cooperators Do people discriminate between genders?. Do people discriminate between men and women when they have the option to punish defectors or reward cooperators? Here we report on four pre registered experiments, that shed some light on this question. Study 1 (N 544) shows that people do not discriminate between genders when they have the option to punish (reward) defectors (cooperators) in a one shot prisoner's dilemma with third party punishment reward. Study 2 (N 253) extends Study 1 to a different method of punishing rewarding participants are asked to rate the behaviour of a defector cooperator on a scale of 1 to 5 stars. In this case too, we find that people do not discriminate between genders. Study 3a (N 331) and Study 3b (N 310) conceptually replicate Study 2 with a slightly different gender manipulation. These latter studies show that, in situations where they do not have specific beliefs about the gender of the defector cooperator's partner, neither men nor women discriminate between genders."} {"_id": [21], "label": "math.CO", "text": "Transport of patterns by Burge transpose. We take the first steps in developing a theory of transport of patterns from Fishburn permutations to (modified) ascent sequences. Given a set of pattern avoiding Fishburn permutations, we provide an explicit construction for the basis of the corresponding set of modified ascent sequences. Our approach is in fact more general and can transport patterns between permutations and equivalence classes of so called Cayley permutations. This transport of patterns relies on a simple operation we call the Burge transpose. It operates on certain biwords called Burge words. Moreover, using mesh patterns on Cayley permutations, we present an alternative view of the transport of patterns as a Wilf equivalence between subsets of Cayley permutations. We also highlight a connection with primitive ascent sequences."} {"_id": [9, 25], "label": "math.AP math.PR", "text": "Probabilistic Analysis of Replicator Mutator Equations. This paper introduces a general class of Replicator Mutator equations on a multi dimensional fitness space. We establish a novel probabilistic representation of weak solutions of the equation by using the theory of Fockker Planck Kolmogorov (FPK) equations and a martingale extraction approach. The examples with closed form probabilistic solutions for different fitness functions considered in the existing literature are provided. We also construct a particle system and prove a general convergence result to any solution to the FPK equation associated with the extended Replicator Mutator equation with respect to a Wasserstein like distance adapted to our probabilistic framework."} {"_id": [0, 41, 2], "label": "cs.AI cs.CV cs.RO", "text": "Non monotonic Logical Reasoning Guiding Deep Learning for Explainable Visual Question Answering. State of the art algorithms for many pattern recognition problems rely on deep network models. Training these models requires a large labeled dataset and considerable computational resources. Also, it is difficult to understand the working of these learned models, limiting their use in some critical applications. Towards addressing these limitations, our architecture draws inspiration from research in cognitive systems, and integrates the principles of commonsense logical reasoning, inductive learning, and deep learning. In the context of answering explanatory questions about scenes and the underlying classification problems, the architecture uses deep networks for extracting features from images and for generating answers to queries. Between these deep networks, it embeds components for non monotonic logical reasoning with incomplete commonsense domain knowledge, and for decision tree induction. It also incrementally learns and reasons with previously unknown constraints governing the domain's states. We evaluated the architecture in the context of datasets of simulated and real world images, and a simulated robot computing, executing, and providing explanatory descriptions of plans. Experimental results indicate that in comparison with an end to end'' architecture of deep networks, our architecture provides better accuracy on classification problems when the training dataset is small, comparable accuracy with larger datasets, and more accurate answers to explanatory questions. Furthermore, incremental acquisition of previously unknown constraints improves the ability to answer explanatory questions, and extending non monotonic logical reasoning to support planning and diagnostics improves the reliability and efficiency of computing and executing plans on a simulated robot."} {"_id": [19], "label": "cs.CR", "text": "SurFi Detecting Surveillance Camera Looping Attacks with Wi Fi Channel State Information (Extended Version). The proliferation of surveillance cameras has greatly improved the physical security of many security critical properties including buildings, stores, and homes. However, recent surveillance camera looping attacks demonstrate new security threats adversaries can replay a seemingly benign video feed of a place of interest while trespassing or stealing valuables without getting caught. Unfortunately, such attacks are extremely difficult to detect in real time due to cost and implementation constraints. In this paper, we propose SurFi to detect these attacks in real time by utilizing commonly available Wi Fi signals. In particular, we leverage that channel state information (CSI) from Wi Fi signals also perceives human activities in the place of interest in addition to surveillance cameras. SurFi processes and correlates the live video feeds and the Wi Fi CSI signals to detect any mismatches that would identify the presence of the surveillance camera looping attacks. SurFi does not require the deployment of additional infrastructure because Wi Fi transceivers are easily found in the urban indoor environment. We design and implement the SurFi system and evaluate its effectiveness in detecting surveillance camera looping attacks. Our evaluation demonstrates that SurFi effectively identifies attacks with up to an attack detection accuracy of 98.8 and 0.1 false positive rate"} {"_id": [38], "label": "math.NT", "text": "A note on isotropic discrepancy and spectral test of lattice point sets. We show that the isotropic discrepancy of a lattice point set can be bounded from below and from above in terms of the spectral test of the corresponding integration lattice. From this we deduce that the isotropic discrepancy of any N element lattice point set in 0,1) d is at least of order N 1 d . This order of magnitude is best possible for lattice point sets in dimension d ."} {"_id": [47], "label": "math.AT", "text": "On the mod 2 cohomology of some 2 Postnikov towers. The present note presents some results about the mod 2 cohomology, modulo nilpotent elements elements of the fiber E of a decomposable map psi K(Z, 2) rightarrow K(Z 2, p). This is more an announcement and a brief description of the tools that are used Lannes' T functor and the Eilenberg Moore spectral sequence."} {"_id": [25], "label": "math.PR", "text": "An Extension of the Cardioid Distributions on Circle. A new family of distributions on the circle is introduced which are a generalization of the Cardioid distributions. The elementary properties such as mean, variance and the characteristic function are computed. The distribution is either unimodal or bimodal. The modes are computed. The symmetry of the distribution is characterized. The parameters are shown to be canonic (i.e. uniquely determined by the distribution). We also show that this new family is a subset of distributions whose Fourier series has degree at most 2 and study the implications of this property."} {"_id": [40, 1, 59], "label": "cs.SI cs.IR cs.LG", "text": "EGGS A Flexible Approach to Relational Modeling of Social Network Spam. Social networking websites face a constant barrage of spam, unwanted messages that distract, annoy, and even defraud honest users. These messages tend to be very short, making them difficult to identify in isolation. Furthermore, spammers disguise their messages to look legitimate, tricking users into clicking on links and tricking spam filters into tolerating their malicious behavior. Thus, some spam filters examine relational structure in the domain, such as connections among users and messages, to better identify deceptive content. However, even when it is used, relational structure is often exploited in an incomplete or ad hoc manner. In this paper, we present Extended Group based Graphical models for Spam (EGGS), a general purpose method for classifying spam in online social networks. Rather than labeling each message independently, we group related messages together when they have the same author, the same content, or other domain specific connections. To reason about related messages, we combine two popular methods stacked graphical learning (SGL) and probabilistic graphical models (PGM). Both methods capture the idea that messages are more likely to be spammy when related messages are also spammy, but they do so in different ways SGL uses sequential classifier predictions and PGMs use probabilistic inference. We apply our method to four different social network domains. EGGS is more accurate than an independent model in most experimental settings, especially when the correct label is uncertain. For the PGM implementation, we compare Markov logic networks to probabilistic soft logic and find that both work well with neither one dominating, and the combination of SGL and PGMs usually performs better than either on its own."} {"_id": [32, 1], "label": "cs.DS cs.LG", "text": "Nearly Linear Time, Parallelizable Algorithms for Non Monotone Submodular Maximization. We study parallelizable algorithms for maximization of a submodular function, not necessarily monotone, with respect to a cardinality constraint k . We improve the best approximation factor achieved by an algorithm that has optimal adaptivity and query complexity, up to logarithmic factors in the size n of the ground set, from 0.039 epsilon to 0.193 epsilon . We provide two algorithms the first has approximation ratio 1 6 epsilon , adaptivity O( log n ) , and query complexity O( n log k ) , while the second has approximation ratio 0.193 epsilon , adaptivity O( log 2 n ) , and query complexity O(n log k) . Heuristic versions of our algorithms are empirically validated to use a low number of adaptive rounds and total queries while obtaining solutions with high objective value in comparison with state of the art approximation algorithms, including continuous algorithms that use the multilinear extension."} {"_id": [7], "label": "physics.comp-ph", "text": "An improved non reflecting outlet boundary condition for weakly compressible SPH. Implementation of an outlet boundary condition is challenging in the context of the weakly compressible Smoothed Particle Hydrodynamics method. We perform a systematic numerical study of several of the available techniques for the outlet boundary condition. We propose a new hybrid approach that combines a characteristics based method with a simpler frozen particle (do nothing) technique to accurately satisfy the outlet boundary condition in the context of wind tunnel like simulations. In addition, we suggest some improvements to the do nothing approach. We introduce a new suite of test problems that make it possible to compare these techniques carefully. We then simulate the flow past a backward facing step and circular cylinder. The proposed method allows us to obtain accurate results with an order of magnitude less particles than those presented in recent research. We provide a completely open source implementation and a reproducible manuscript."} {"_id": [77], "label": "math.LO", "text": "Degree spectra for transcendence in fields. We show that for both the unary relation of transcendence and the finitary relation of algebraic independence on a field, the degree spectra of these relations may consist of any single computably enumerable Turing degree, or of those c.e. degrees above an arbitrary fixed Delta 0 2 degree. In other cases, these spectra may be characterized by the ability to enumerate an arbitrary Sigma 0 2 set. This is the first proof that a computable field can fail to have a computable copy with a computable transcendence basis."} {"_id": [1, 3], "label": "cs.CL cs.LG", "text": "Transfer Learning and Distant Supervision for Multilingual Transformer Models A Study on African Languages. Multilingual transformer models like mBERT and XLM RoBERTa have obtained great improvements for many NLP tasks on a variety of languages. However, recent works also showed that results from high resource languages could not be easily transferred to realistic, low resource scenarios. In this work, we study trends in performance for different amounts of available resources for the three African languages Hausa, isiXhosa and Yor ub 'a on both NER and topic classification. We show that in combination with transfer learning or distant supervision, these models can achieve with as little as 10 or 100 labeled sentences the same performance as baselines with much more supervised training data. However, we also find settings where this does not hold. Our discussions and additional experiments on assumptions such as time and hardware restrictions highlight challenges and opportunities in low resource learning."} {"_id": [17, 2], "label": "cs.DC cs.AI", "text": "A Scenario Based Development Framework for Autonomous Driving. This article summarizes the research progress of scenario based testing and development technology for autonomous vehicles. We systematically analyzed previous research works and proposed the definition of scenario, the elements of the scenario ontology, the data source of the scenario, the processing method of the scenario data, and scenario based V Model. Moreover, we summarized the automated test scenario construction method by random scenario generation and dangerous scenario generation."} {"_id": [42], "label": "math.DG", "text": "Geometric calculus on pseudo Riemannian manifolds. This article provides a pedagogically oriented introduction to geometric (Clifford) calculus on pseudo Riemannian manifolds. Unlike usual approaches to the topic, which rely on embedding the geometric algebra either within a tensor algebra or within a vector manifold framework, here we define geometric calculus directly, by elementary methods. In particular we use an axiomatic approach that directly parallels textbook introductions to general relativity and pseudo Riemannian geometry, so that no structure outside the metrical Clifford bundle of the manifold need be introduced. On this basis we develop the full theory of differential calculus for vector, multivector, and tensor fields."} {"_id": [74, 27], "label": "math.CT math.OA", "text": "The universal property of infinite direct sums in C categories and W categories. When formulating universal properties for objects in a dagger category, one usually expects a universal property to characterize the universal object up to unique unitary isomorphism. We observe that this is automatically the case in the important special case of C categories, provided that one uses enrichment in Banach spaces. We then formulate such a universal property for infinite direct sums in C categories, and prove the equivalence with the existing definition due to Ghez, Lima and Roberts in the case of W categories. These infinite direct sums specialize to the usual ones in the category of Hilbert spaces, and more generally in any W category of normal representations of a W algebra. Finding a universal property for the more general case of direct integrals remains an open problem."} {"_id": [3], "label": "cs.CL", "text": "Transition based Semantic Dependency Parsing with Pointer Networks. Transition based parsers implemented with Pointer Networks have become the new state of the art in dependency parsing, excelling in producing labelled syntactic trees and outperforming graph based models in this task. In order to further test the capabilities of these powerful neural networks on a harder NLP problem, we propose a transition system that, thanks to Pointer Networks, can straightforwardly produce labelled directed acyclic graphs and perform semantic dependency parsing. In addition, we enhance our approach with deep contextualized word embeddings extracted from BERT. The resulting system not only outperforms all existing transition based models, but also matches the best fully supervised accuracy to date on the SemEval 2015 Task 18 English datasets among previous state of the art graph based parsers."} {"_id": [19], "label": "cs.CR", "text": "Highway to HAL Open Sourcing the First Extendable Gate Level Netlist Reverse Engineering Framework. Since hardware oftentimes serves as the root of trust in our modern interconnected world, malicious hardware manipulations constitute a ubiquitous threat in the context of the Internet of Things (IoT). Hardware reverse engineering is a prevalent technique to detect such manipulations. Over the last years, an active research community has significantly advanced the field of hardware reverse engineering. Notably, many open research questions regarding the extraction of functionally correct netlists from Field Programmable Gate Arrays (FPGAs) or Application Specific Integrated Circuits (ASICs) have been tackled. In order to facilitate further analysis of recovered netlists, a software framework is required, serving as the foundation for specialized algorithms. Currently, no such framework is publicly available. Therefore, we provide the first open source gate library agnostic framework for gate level netlist analysis. In this positional paper, we demonstrate the workflow of our modular framework HAL on the basis of two case studies and provide profound insights on its technical foundations."} {"_id": [9], "label": "math.AP", "text": "Generalized principal eigenvalues of convex nonlinear elliptic operators in mathbb R N . We study the generalized eigenvalue problem in mathbb R N for a general convex nonlinear elliptic operator which is locally elliptic and positively 1 homogeneous. Generalizing article of Berestycki and Rossi in Comm. Pure Appl. Math. 68 (2015), no. 6, 1014 1065 we consider three different notions of generalized eigenvalues and compare them. We also discuss the maximum principles and uniqueness of principal eigenfunctions."} {"_id": [3], "label": "cs.CL", "text": "Robust Machine Translation with Domain Sensitive Pseudo Sources Baidu OSU WMT19 MT Robustness Shared Task System Report. This paper describes the machine translation system developed jointly by Baidu Research and Oregon State University for WMT 2019 Machine Translation Robustness Shared Task. Translation of social media is a very challenging problem, since its style is very different from normal parallel corpora (e.g. News) and also include various types of noises. To make it worse, the amount of social media parallel corpora is extremely limited. In this paper, we use a domain sensitive training method which leverages a large amount of parallel data from popular domains together with a little amount of parallel data from social media. Furthermore, we generate a parallel dataset with pseudo noisy source sentences which are back translated from monolingual data using a model trained by a similar domain sensitive way. We achieve more than 10 BLEU improvement in both En Fr and Fr En translation compared with the baseline methods."} {"_id": [65], "label": "cs.NI", "text": "Adaptive In network Collaborative Caching for Enhanced Ensemble Deep Learning at Edge. To enhance the quality and speed of data processing and protect the privacy and security of the data, edge computing has been extensively applied to support data intensive intelligent processing services at edge. Among these data intensive services, ensemble learning based services can in natural leverage the distributed computation and storage resources at edge devices to achieve efficient data collection, processing, analysis. Collaborative caching has been applied in edge computing to support services close to the data source, in order to take the limited resources at edge devices to support high performance ensemble learning solutions. To achieve this goal, we propose an adaptive in network collaborative caching scheme for ensemble learning at edge. First, an efficient data representation structure is proposed to record cached data among different nodes. In addition, we design a collaboration scheme to facilitate edge nodes to cache valuable data for local ensemble learning, by scheduling local caching according to a summarization of data representations from different edge nodes. Our extensive simulations demonstrate the high performance of the proposed collaborative caching scheme, which significantly reduces the learning latency and the transmission overhead."} {"_id": [0], "label": "cs.CV", "text": "Evaluation of the Spatio Temporal features and GAN for Micro expression Recognition System. Owing to the development and advancement of artificial intelligence, numerous works were established in the human facial expression recognition system. Meanwhile, the detection and classification of micro expressions are attracting attentions from various research communities in the recent few years. In this paper, we first review the processes of a conventional optical flow based recognition system, which comprised of facial landmarks annotations, optical flow guided images computation, features extraction and emotion class categorization. Secondly, a few approaches have been proposed to improve the feature extraction part, such as exploiting GAN to generate more image samples. Particularly, several variations of optical flow are computed in order to generate optimal images to lead to high recognition accuracy. Next, GAN, a combination of Generator and Discriminator, is utilized to generate new \"fake\" images to increase the sample size. Thirdly, a modified state of the art Convolutional neural networks is proposed. To verify the effectiveness of the the proposed method, the results are evaluated on spontaneous micro expression databases, namely SMIC, CASME II and SAMM. Both the F1 score and accuracy performance metrics are reported in this paper."} {"_id": [2], "label": "cs.AI", "text": "Fast Compliance Checking with General Vocabularies. We address the problem of complying with the GDPR while processing and transferring personal data on the web. For this purpose we introduce an extensible profile of OWL2 for representing data protection policies. With this language, a company's data usage policy can be checked for compliance with data subjects' consent and with a formalized fragment of the GDPR by means of subsumption queries. The outer structure of the policies is restricted in order to make compliance checking highly scalable, as required when processing high frequency data streams or large data volumes. However, the vocabularies for specifying policy properties can be chosen rather freely from expressive Horn fragments of OWL2. We exploit IBQ reasoning to integrate specialized reasoners for the policy language and the vocabulary's language. Our experiments show that this approach significantly improves performance."} {"_id": [88, 36, 7], "label": "physics.atm-clus physics.chem-ph physics.comp-ph", "text": "Ultrafast transfer and transient entrapment of photoexcited Mg electron in Mg C60. Electron relaxation is studied in endofullerene Mg C60, after an initial localized photoexcitation in Mg, by nonadiabtic molecular dynamics simulations. To ensure reliability, two methods are used i) an independent particle approach with a DFT description of the ground state and ii) HF ground state with many body effects for the excited state dynamics. Both methods exhibit similar relaxation times leading to an ultrafast decay and charge transfer from Mg to C60 within tens of femtoseconds. Method (i) further elicits a robust transient trap of the transferred electron that can delay the electron hole recombination. Results shall motivate experiments to probe these ultrafast processes by two photon transient absorption spectroscopy in gas phase, in solution, or as thin films."} {"_id": [0, 1, 2], "label": "cs.LG cs.AI cs.CV", "text": "MimicNorm Weight Mean and Last BN Layer Mimic the Dynamic of Batch Normalization. Substantial experiments have validated the success of Batch Normalization (BN) Layer in benefiting convergence and generalization. However, BN requires extra memory and float point calculation. Moreover, BN would be inaccurate on micro batch, as it depends on batch statistics. In this paper, we address these problems by simplifying BN regularization while keeping two fundamental impacts of BN layers, i.e., data decorrelation and adaptive learning rate. We propose a novel normalization method, named MimicNorm, to improve the convergence and efficiency in network training. MimicNorm consists of only two light operations, including modified weight mean operations (subtract mean values from weight parameter tensor) and one BN layer before loss function (last BN layer). We leverage the neural tangent kernel (NTK) theory to prove that our weight mean operation whitens activations and transits network into the chaotic regime like BN layer, and consequently, leads to an enhanced convergence. The last BN layer provides autotuned learning rates and also improves accuracy. Experimental results show that MimicNorm achieves similar accuracy for various network structures, including ResNets and lightweight networks like ShuffleNet, with a reduction of about 20 memory consumption. The code is publicly available at https github.com Kid key MimicNorm."} {"_id": [25], "label": "math.PR", "text": "The N stars network evolution model. A new network evolution model is introduced in this paper. The model is based on co operations of N units. The units are the nodes of the network and the co operations are indicated by directed links. At each evolution step N units co operate which formally means that they form a directed N star subgraph. At each step either a new unit joins to the network and it co operates with N 1 old units or N old units co operate. During the evolution both preferential attachment and uniform choice are applied. Asymptotic power law distributions are obtained both for the in degrees and the out degrees."} {"_id": [65, 1], "label": "cs.NI cs.LG", "text": "DeePCCI Deep Learning based Passive Congestion Control Identification. Transport protocols use congestion control to avoid overloading a network. Nowadays, different congestion control variants exist that influence performance. Studying their use is thus relevant, but it is hard to identify which variant is used. While passive identification approaches exist, these require detailed domain knowledge and often also rely on outdated assumptions about how congestion control operates and what data is accessible. We present DeePCCI, a passive, deep learning based congestion control identification approach which does not need any domain knowledge other than training traffic of a congestion control variant. By only using packet arrival data, it is also directly applicable to encrypted (transport header) traffic. DeePCCI is therefore more easily extendable and can also be used with QUIC."} {"_id": [56, 2, 80], "label": "cs.LO cs.AI cs.SC", "text": "Intuitionistic Linear Temporal Logics. We consider intuitionistic variants of linear temporal logic with next', until' and release' based on expanding posets partial orders equipped with an order preserving transition function. This class of structures gives rise to a logic which we denote iltl , and by imposing additional constraints we obtain the logics itlb of persistent posets and itlht of here and there temporal logic, both of which have been considered in the literature. We prove that iltl has the effective finite model property and hence is decidable, while itlb does not have the finite model property. We also introduce notions of bounded bisimulations for these logics and use them to show that the until' and release' operators are not definable in terms of each other, even over the class of persistent posets."} {"_id": [20], "label": "math.NA cs.NA", "text": "A development of Lagrange interpolation, Part I Theory. In this work, we introduce the new class of functions which can use to solve the nonlinear linear multi dimensional differential equations. Based on these functions, a numerical method is provided which is called the Developed Lagrange Interpolation (DLI). For this, firstly, we define the new class of the functions, called the Developed Lagrange Functions (DLFs), which satisfy in the Kronecker Delta at the collocation points. Then, for the DLFs, the first order derivative operational matrix of textbf D (1) is obtained, and a recurrence relation is provided to compute the high order derivative operational matrices of textbf D (m) , m in mathbb N that is, we develop the theorem of the derivative operational matrices of the classical Lagrange polynomials for the DLFs and show that the relation of textbf D (m) ( textbf D (1) ) m for the DLFs is not established and is developable. Finally, we develop the error analysis of the classical Lagrange interpolation for the developed Lagrange interpolation. Finally, for demonstrating the convergence and efficiency of the DLI, some well known differential equations, which are applicable in applied sciences, have been investigated based upon the various choices of the points of interpolation collocation."} {"_id": [34, 12, 23], "label": "math.CA math.CV math.FA", "text": "Reconstruction of Bandlimited Functions from Space Time Samples. For a wide family of even kernels varphi u, u in I , we describe discrete sets Lambda such that every bandlimited signal f can be reconstructed from the space time samples (f ast varphi u)( lambda), lambda in Lambda, u in I ."} {"_id": [49, 46], "label": "math.AG math.OC", "text": "The phaseless rank of a matrix. We consider the problem of finding the smallest rank of a complex matrix whose absolute values of the entries are given. We call this minimum the phaseless rank of the matrix of the entrywise absolute values. In this paper we study this quantity, extending a classic result of Camion and Hoffman and connecting it to the study of amoebas of determinantal varieties and of semidefinite representations of convex sets. As a consequence, we prove that the set of maximal minors of a matrix of indeterminates form an amoeba basis for the ideal they define, and we attain a new upper bound on the complex semidefinite extension complexity of polytopes, dependent only on their number of vertices and facets. We also highlight the connections between the notion of phaseless rank and the problem of finding large sets of complex equiangular lines or mutually unbiased bases."} {"_id": [40], "label": "cs.IR", "text": "Aspect based Academic Search using Domain specific KB. Academic search engines allow scientists to explore related work relevant to a given query. Often, the user is also aware of the \"aspect\" to retrieve a relevant document. In such cases, existing search engines can be used by expanding the query with terms describing that aspect. However, this approach does not guarantee good results since plain keyword matches do not always imply relevance. To address this issue, we define and solve a novel academic search task, called \"aspect based retrieval\", which allows the user to specify the aspect along with the query to retrieve a ranked list of relevant documents. The primary idea is to estimate a language model for the aspect as well as the query using a domain specific knowledge base and use a mixture of the two to determine the relevance of the article. Our evaluation of the results over the Open Research Corpus dataset shows that our method outperforms keyword based expansion of query with aspect with and without relevance feedback."} {"_id": [21], "label": "math.CO", "text": "width k Eulerian polynomials of type A and B and its Gamma positivity. We define some generalizations of the classical descent and inversion statistics on signed permutations that arise from the work of Sack and Ulfarsson 20 and called after width k descents and width k inversionsof type A in Davis's work 8 . Using the aforementioned new statistics, we derive some new generalizations of Eulerian polynomials of type A, B and D. It should also be noticed that we establish the Gamma positivity of the \"width k\" Eulerian polynomials and we give a combinatorial interpretation of finite sequences associated to these new polynomials using quasisymmetric functions and P partition in Petersen's work 18 ."} {"_id": [33, 11], "label": "physics.app-ph physics.ins-det", "text": "High Sensitivity Hybrid PbS CQD TMDC Photodetectors up to 2 mu m. Recent approaches to develop infrared photodetectors characterized by high sensitivities, broadband spectral coverage, easy integration with silicon electronics and low cost have been based on hybrid structures of transition metal dichalcogenides (TMDCs) and PbS colloidal quantum dots (CQDs). However, to date, such photodetectors have been reported with high sensitivity up to 1.5 mu m. Here we extend the spectral coverage of this technology towards 2 mu m demonstrating for the first time compelling performance with responsivities 1400 A W at 1.8 mu m with 1V bias and detectivities as high as 10 12 Jones at room temperature. To do this we studied two TMDC materials as a carrier transport layer, tungsten disulfide (WS 2 ) and molybdenum disulfide (MoS 2 ) and demonstrate that WS 2 based hybrid photodetectors outperform those of MoS 2 due to a more adequate band alignment that favors carrier transfer from the CQDs."} {"_id": [3], "label": "cs.CL", "text": "Contextual Recurrent Units for Cloze style Reading Comprehension. Recurrent Neural Networks (RNN) are known as powerful models for handling sequential data, and especially widely utilized in various natural language processing tasks. In this paper, we propose Contextual Recurrent Units (CRU) for enhancing local contextual representations in neural networks. The proposed CRU injects convolutional neural networks (CNN) into the recurrent units to enhance the ability to model the local context and reducing word ambiguities even in bi directional RNNs. We tested our CRU model on sentence level and document level modeling NLP tasks sentiment classification and reading comprehension. Experimental results show that the proposed CRU model could give significant improvements over traditional CNN or RNN models, including bidirectional conditions, as well as various state of the art systems on both tasks, showing its promising future of extensibility to other NLP tasks as well."} {"_id": [20], "label": "math.NA cs.NA", "text": "Modeling and simulation of large scale Systems a systematic comparison of modeling paradigms. A trend across most areas where simulation driven development is used is the ever increasing size and complexity of the systems under consideration, pushing established methods of modeling and simulation towards their limits. This paper complements existing surveys on large scale modeling and simulation of physical systems by conducting expert surveys. We conducted a two stage empirical survey in order to investigate research needs, current challenges as well as promising modeling and simulation paradigms. Furthermore, we applied the analytic hierarchy process method to prioritise the strengths and weakness of different modeling paradigms. The results of this study show that experts consider acausal modeling techniques to be suitable for modeling large scale systems, while causal techniques are considered less suitable."} {"_id": [8, 11, 93], "label": "physics.app-ph physics.class-ph physics.optics", "text": "Asymmetric frequency conversion with acoustic non Hermitian space time varying metamaterial. Space time modulated metamaterials support extraordinary rich applications, such as parametric amplification, frequency conversion and non reciprocal transmission. However, experimental realization of space time modulation is highly non trivial, hindering many interesting physics that are theoretically predicted to be experimentally demonstrated. Here, based on the proposed virtualized metamaterials with software defined impulse response, we experimentally realize non Hermitian space time varying metamaterials for efficient and asymmetric frequency conversion by allowing material gain and loss to be tailor made and balanced in the time domain. In the application of frequency conversion, the combination of space time varying capability and non Hermiticity allows us to diminish the main band through gain loss balance and to increase the efficiency of side band conversion at the same time. In addition, our approach of software defined metamaterials is flexible to realize the analogy of quantum interference in an acoustic system with design capability. Applying an additional modulation phase delay between different atoms allows to control such interference to get asymmetric amplification in frequency conversion."} {"_id": [38], "label": "math.NT", "text": "Common divisors of totients of polynomial sequences. Motivated by a question of Venkataramana, we consider the greatest common divisor of phi(f(n)) where f is a primitive polynomial with integer coefficients, and n ranges over all natural numbers. Assuming Schinzel's hypothesis, we establish that this gcd may be bounded just in terms of the degree of the polynomial f . Unconditionally we establish such a bound for quadratic polynomials, as well as polynomials that split completely into linear factors. The paper also addresses a question of Calegari, and establishes that there are infinitely many n such that n 2 1 is not divisible by any prime equiv 1 bmod 2 m provided m is a large fixed integer."} {"_id": [0, 41], "label": "cs.RO cs.CV", "text": "Research on dynamic target detection and tracking system of hexapod robot. Dynamic target detection and target tracking are hot issues in the field of image. In order to explore its application value in the field of mobile robot, a dynamic target detection and tracking system is designed based on hexapod robot. Firstly, the dynamic target detection method is introduced with region merging and adaptive external point filtering based on motion compensation method. This method achieves the accurate compensation of the moving background through symmetric matching and adaptive external point filtering, and achieves complete detection of non rigid objects by region merging. Secondly, the application of target tracking algorithm based on KCF in hexapod robot platform is studied, and the Angle tracking of moving target is realized by adaptive adjustment of tracking speed. The last, the architecture of robot monitoring system is designed, which consists of operator, processor, hexapod robot and vision sensor, and the moving object detection and tracking algorithm proposed in this paper is applied to the system. The experimental results show that the improved algorithm can effectively detect and track the moving target when applied to the system of the mobile hexapod robot."} {"_id": [32, 21], "label": "cs.DS math.CO", "text": "Engineering Data Reduction for Nested Dissection. Many applications rely on time intensive matrix operations, such as factorization, which can be sped up significantly for large sparse matrices by interpreting the matrix as a sparse graph and computing a node ordering that minimizes the so called fill in. In this paper, we engineer new data reduction rules for the minimum fill in problem, which significantly reduce the size of the graph while producing an equivalent (or near equivalent) instance. By applying both new and existing data reduction rules exhaustively before nested dissection, we obtain improved quality and at the same time large improvements in running time on a variety of instances. Our overall algorithm outperforms the state of the art significantly it not only yields better elimination orders, but it does so significantly faster than previously possible. For example, on road networks, where nested dissection algorithms are typically used as a preprocessing step for shortest path computations, our algorithms are on average six times faster than Metis while computing orderings with less fill in."} {"_id": [26, 21], "label": "math.RT math.CO", "text": "The reflection representation in the homology of subword order. We investigate the homology representation of the symmetric group on rank selected subposets of subword order. We show that the homology module for words of bounded length, over an alphabet of size n, decomposes into a sum of tensor powers of the S n irreducible S (n 1,1) indexed by the partition (n 1,1), recovering, as a special case, a theorem of Bj \"orner and Stanley for words of length at most k. For arbitrary ranks we show that the homology is an integer combination of positive tensor powers of the reflection representation S (n 1,1) , and conjecture that this combination is nonnegative. We uncover a curious duality in homology in the case when one rank is deleted. We prove that the action on the rank selected chains of subword order is a nonnegative integer combination of tensor powers of S (n 1,1) , and show that its Frobenius characteristic is h positive and supported on the set T 1 (n) h lambda lambda (n r, 1 r), r ge 1 . Our most definitive result describes the Frobenius characteristic of the homology for an arbitrary set of ranks, plus or minus one copy of the Schur function s (n 1,1) , as an integer combination of the set T 2 (n) h lambda lambda (n r, 1 r), r ge 2 . We conjecture that this combination is nonnegative, establishing this fact for particular cases."} {"_id": [17], "label": "cs.DC", "text": "Workflow Management on BFT Blockchains. Blockchain technology has been proposed as a new infrastructure technology for a wide variety of novel applications. Blockchains provide an immutable record of transactions, making them useful when business actors do not trust each other. Their distributed nature makes them suitable for inter organizational applications. However, proof of work based blockchains are computationally inefficient and do not provide final consensus, although they scale well to large networks. In contrast, blockchains built around Byzantine Fault Tolerance (BFT) algorithms are more efficient and provide immediate and final consensus, but do not scale well to large networks. We argue that this makes them well suited for workflow management applications that typically include no more than a few dozen participants but require final consensus. In this paper, we discuss architectural options and present a prototype implementation of a BFT blockchain based workflow management system (WfMS)."} {"_id": [36], "label": "physics.chem-ph", "text": "Singlet fission for quantum information and quantum computing The parallel JDE model. Singlet fission is a photoconversion process that generates a doubly excited, maximally spin entangled pair state. This state has applications to quantum information and computing that are only beginning to be realized. In this article, we construct and analyze a spin exciton hamiltonian to describe the dynamics of the two triplet state. We find the selection rules that connect the doubly excited, spin singlet state to the manifold of quintet states and comment on the mechanism and conditions for the transition into formally independent triplets. For adjacent dimers that are oriented and immobilized in an inert host, singlet fission can be strongly state selective. We make predictions for electron paramagnetic resonance experiments and re assign some transitions from recent literature. Our results give conditions for which magnetic resonance pulses can drive transitions between optically polarized magnetic sublevels of the two exciton states, making it possible to realize quantum gates at room temperature in these systems."} {"_id": [1], "label": "cs.LG", "text": "Detecting Backdoors in Neural Networks Using Novel Feature Based Anomaly Detection. This paper proposes a new defense against neural network backdooring attacks that are maliciously trained to mispredict in the presence of attacker chosen triggers. Our defense is based on the intuition that the feature extraction layers of a backdoored network embed new features to detect the presence of a trigger and the subsequent classification layers learn to mispredict when triggers are detected. Therefore, to detect backdoors, the proposed defense uses two synergistic anomaly detectors trained on clean validation data the first is a novelty detector that checks for anomalous features, while the second detects anomalous mappings from features to outputs by comparing with a separate classifier trained on validation data. The approach is evaluated on a wide range of backdoored networks (with multiple variations of triggers) that successfully evade state of the art defenses. Additionally, we evaluate the robustness of our approach on imperceptible perturbations, scalability on large scale datasets, and effectiveness under domain shift. This paper also shows that the defense can be further improved using data augmentation."} {"_id": [40, 2], "label": "cs.IR cs.AI", "text": "Non Linear Multiple Field Interactions Neural Document Ranking. Ranking tasks are usually based on the text of the main body of the page and the actions (clicks) of users on the page. There are other elements that could be leveraged to better contextualise the ranking experience (e.g. text in other fields, query made by the user, images, etc). We present one of the first in depth analyses of field interaction for multiple field ranking in two separate datasets. While some works have taken advantage of full document structure, some aspects remain unexplored. In this work we build on previous analyses to show how query field interactions, non linear field interactions, and the architecture of the underlying neural model affect performance."} {"_id": [0], "label": "cs.CV", "text": "Non target Structural Displacement Measurement Using Reference Frame Based Deepflow. Structural displacement is crucial for structural health monitoring, although it is very challenging to measure in field conditions. Most existing displacement measurement methods are costly, labor intensive, and insufficiently accurate for measuring small dynamic displacements. Computer vision (CV) based methods incorporate optical devices with advanced image processing algorithms to accurately, cost effectively, and remotely measure structural displacement with easy installation. However, non target based CV methods are still limited by insufficient feature points, incorrect feature point detection, occlusion, and drift induced by tracking error accumulation. This paper presents a reference frame based Deepflow algorithm integrated with masking and signal filtering for non target based displacement measurements. The proposed method allows the user to select points of interest for images with a low gradient for displacement tracking and directly calculate displacement without drift accumulated by measurement error. The proposed method is experimentally validated on a cantilevered beam under ambient and occluded test conditions. The accuracy of the proposed method is compared with that of a reference laser displacement sensor for validation. The significant advantage of the proposed method is its flexibility in extracting structural displacement in any region on structures that do not have distinct natural features."} {"_id": [20], "label": "math.NA cs.NA", "text": "Parameter robust Uzawa type iterative methods for double saddle point problems arising in Biot's consolidation and multiple network poroelasticity models. This work is concerned with the iterative solution of systems of quasi static multiple network poroelasticity (MPET) equations describing flow in elastic porous media that is permeated by single or multiple fluid networks. Here, the focus is on a three field formulation of the problem in which the displacement field of the elastic matrix and, additionally, one velocity field and one pressure field for each of the n ge 1 fluid networks are the unknown physical quantities. Generalizing Biot's model of consolidation, which is obtained for n 1 , the MPET equations for n ge1 exhibit a double saddle point structure. The proposed approach is based on a framework of augmenting and splitting this three by three block system in such a way that the resulting block Gauss Seidel preconditioner defines a fully decoupled iterative scheme for the flux , pressure , and displacement fields. In this manner, one obtains an augmented Lagrangian Uzawa type method, the analysis of which is the main contribution of this work. The parameter robust uniform linear convergence of this fixed point iteration is proved by showing that its rate of contraction is strictly less than one independent of all physical and discretization parameters. The theoretical results are confirmed by a series of numerical tests that compare the new fully decoupled scheme to the very popular partially decoupled fixed stress split iterative method, which decouples only flow the flux and pressure fields remain coupled in this case from the mechanics problem. We further test the performance of the block triangular preconditioner defining the new scheme when used to accelerate the GMRES algorithm."} {"_id": [0], "label": "cs.CV", "text": "Convolutional Hierarchical Attention Network for Query Focused Video Summarization. Previous approaches for video summarization mainly concentrate on finding the most diverse and representative visual contents as video summary without considering the user's preference. This paper addresses the task of query focused video summarization, which takes user's query and a long video as inputs and aims to generate a query focused video summary. In this paper, we consider the task as a problem of computing similarity between video shots and query. To this end, we propose a method, named Convolutional Hierarchical Attention Network (CHAN), which consists of two parts feature encoding network and query relevance computing module. In the encoding network, we employ a convolutional network with local self attention mechanism and query aware global attention mechanism to learns visual information of each shot. The encoded features will be sent to query relevance computing module to generate queryfocused video summary. Extensive experiments on the benchmark dataset demonstrate the competitive performance and show the effectiveness of our approach."} {"_id": [15], "label": "cs.IT math.IT", "text": "Performance Analysis of Reversible Binding Receptor Based Decode and Forward Relay in Molecular Communication Systems. Molecular communication (MC) allows nanomachines to communicate and cooperate with each other in a fluid environment. The diffusion based MC is popular but is easily constrained by the transmit distance due to the severe attenuation of molecule concentrations. In this letter, we present a decode and forward (DF) relay strategy for the reversible binding receptor in the diffusion based MC system. The time varying spatial distribution of the information molecules based on the reversible association and dissociation between ligand and receptor at the surface of receiver is characterized. An analytical expression for the evaluation of expected error probability is derived, and the key factors impacting on the performance are exploited. Results show that with a constant molecular budget, the proposal can improve the performance significantly, and the performance gain can be enhanced by optimizing the position of the relay node and the number of molecules assigned to the source node."} {"_id": [20], "label": "math.NA cs.NA", "text": "A comparison of limited memory Krylov methods for Stieltjes functions of Hermitian matrices. Given a limited amount of memory and a target accuracy, we propose and compare several polynomial Krylov methods for the approximation of f(A)b, the action of a Stieltjes matrix function of a large Hermitian matrix on a vector. Using new error bounds and estimates, as well as existing results, we derive predictions of the practical performance of the methods, and rank them accordingly. As by products, we derive new results on inexact Krylov iterations for matrix functions in order to allow for a fair comparison of rational Krylov methods with polynomial inner solves."} {"_id": [49], "label": "math.OC", "text": "Interpreting the dual Riccati equation through the LQ reproducing kernel. In this study, we provide an interpretation of the dual differential Riccati equation of Linear Quadratic (LQ) optimal control problems. Adopting a novel viewpoint, we show that LQ optimal control can be seen as a regression problem over the space of controlled trajectories, and that the latter has a very natural structure as a reproducing kernel Hilbert space (RKHS). The dual Riccati equation then describes the evolution of the values of the LQ reproducing kernel when the initial time changes. This unveils new connections between control theory and kernel methods, a field widely used in machine learning."} {"_id": [2], "label": "cs.AI", "text": "Learning Non Markovian Reward Models in MDPs. There are situations in which an agent should receive rewards only after having accomplished a series of previous tasks. In other words, the reward that the agent receives is non Markovian. One natural and quite general way to represent history dependent rewards is via a Mealy machine a finite state automaton that produces output sequences (rewards in our case) from input sequences (state action observations in our case). In our formal setting, we consider a Markov decision process (MDP) that models the dynamic of the environment in which the agent evolves and a Mealy machine synchronised with this MDP to formalise the non Markovian reward function. While the MDP is known by the agent, the reward function is unknown from the agent and must be learnt. Learning non Markov reward functions is a challenge. Our approach to overcome this challenging problem is a careful combination of the Angluin's L active learning algorithm to learn finite automata, testing techniques for establishing conformance of finite model hypothesis and optimisation techniques for computing optimal strategies in Markovian (immediate) reward MDPs. We also show how our framework can be combined with classical heuristics such as Monte Carlo Tree Search. We illustrate our algorithms and a preliminary implementation on two typical examples for AI."} {"_id": [1, 2, 83, 14], "label": "cs.HC cs.AI cs.LG cs.MM", "text": "Interpolating GANs to Scaffold Autotelic Creativity. The latent space modeled by generative adversarial networks (GANs) represents a large possibility space. By interpolating categories generated by GANs, it is possible to create novel hybrid images. We present \"Meet the Ganimals,\" a casual creator built on interpolations of BigGAN that can generate novel, hybrid animals called ganimals by efficiently searching this possibility space. Like traditional casual creators, the system supports a simple creative flow that encourages rapid exploration of the possibility space. Users can discover new ganimals, create their own, and share their reactions to aesthetic, emotional, and morphological characteristics of the ganimals. As users provide input to the system, the system adapts and changes the distribution of categories upon which ganimals are generated. As one of the first GAN based casual creators, Meet the Ganimals is an example how casual creators can leverage human curation and citizen science to discover novel artifacts within a large possibility space."} {"_id": [95], "label": "cs.OS", "text": "Reproducible Execution of POSIX Programs with DiOS. In this paper, we describe DiOS, a lightweight model operating system which can be used to execute programs that make use of POSIX APIs. Such executions are fully reproducible running the same program with the same inputs twice will result in two exactly identical instruction traces, even if the program uses threads for parallelism. DiOS is implemented almost entirely in portable C and C although its primary platform is DiVM, a verification oriented virtual machine, it can be configured to also run in KLEE, a symbolic executor. Finally, it can be compiled into machine code to serve as a user mode kernel. Additionally, DiOS is modular and extensible. Its various components can be combined to match both the capabilities of the underlying platform and to provide services required by a particular program. New components can be added to cover additional system calls or APIs. The experimental evaluation has two parts. DiOS is first evaluated as a component of a program verification platform based on DiVM. In the second part, we consider its portability and modularity by combining it with the symbolic executor KLEE."} {"_id": [0], "label": "cs.CV", "text": "Self supervised Contrastive Video Speech Representation Learning for Ultrasound. In medical imaging, manual annotations can be expensive to acquire and sometimes infeasible to access, making conventional deep learning based models difficult to scale. As a result, it would be beneficial if useful representations could be derived from raw data without the need for manual annotations. In this paper, we propose to address the problem of self supervised representation learning with multi modal ultrasound video speech raw data. For this case, we assume that there is a high correlation between the ultrasound video and the corresponding narrative speech audio of the sonographer. In order to learn meaningful representations, the model needs to identify such correlation and at the same time understand the underlying anatomical features. We designed a framework to model the correspondence between video and audio without any kind of human annotations. Within this framework, we introduce cross modal contrastive learning and an affinity aware self paced learning scheme to enhance correlation modelling. Experimental evaluations on multi modal fetal ultrasound video and audio show that the proposed approach is able to learn strong representations and transfers well to downstream tasks of standard plane detection and eye gaze prediction."} {"_id": [38, 46, 47], "label": "math.AG math.AT math.NT", "text": "Cohomology of the Universal Abelian Surface with Applications to Arithmetic Statistics. The moduli stack mathcal A 2 of principally polarized abelian surfaces comes equipped with the universal abelian surface pi mathcal X 2 to mathcal A 2 . The fiber of pi over a point corresponding to an abelian surface A in mathcal A 2 is A itself. We determine the ell adic cohomology of mathcal X 2 as a Galois representation. Similarly, we consider the bundles mathcal X 2 n to mathcal A 2 and mathcal X 2 operatorname Sym (n) to mathcal A 2 for all n geq 1 , where the fiber over a point corresponding to an abelian surface A is A n and operatorname Sym n A respectively. We describe how to compute the ell adic cohomology of mathcal X 2 n and mathcal X 2 operatorname Sym (n) and explicitly calculate it in low degrees for all n and in all degrees for n 2 . These results yield new information regarding the arithmetic statistics on abelian surfaces, including an exact calculation of the expected value and variance as well as asymptotics for higher moments of the number of mathbf F q points."} {"_id": [15], "label": "cs.IT math.IT", "text": "Weak Noise Modulation Estimation of Vector Parameters. We address the problem of modulating a parameter onto a power limited signal, transmitted over a discrete time Gaussian channel and estimating this parameter at the receiver. Continuing an earlier work, where the optimal trade off between the weak noise estimation performance and the outage probability (threshold effect breakdown) was studied for a single (scalar) parameter, here we extend the derivation of the weak noise estimation performance to the case of a multi dimensional vector parameter. This turns out to be a non trivial extension, that provides a few insights and it has some interesting implications, which are discussed in depth. Several modifications and extensions of the basic setup are also studied and discussed."} {"_id": [0], "label": "cs.CV", "text": "Facial Expression Phoenix (FePh) An Annotated Sequenced Dataset for Facial and Emotion Specified Expressions in Sign Language. Facial expressions are important parts of both gesture and sign language recognition systems. Despite the recent advances in both fields, annotated facial expression datasets in the context of sign language are still scarce resources. In this manuscript, we introduce an annotated sequenced facial expression dataset in the context of sign language, comprising over 3000 facial images extracted from the daily news and weather forecast of the public tv station PHOENIX. Unlike the majority of currently existing facial expression datasets, FePh provides sequenced semi blurry facial images with different head poses, orientations, and movements. In addition, in the majority of images, identities are mouthing the words, which makes the data more challenging. To annotate this dataset we consider primary, secondary, and tertiary dyads of seven basic emotions of \"sad\", \"surprise\", \"fear\", \"angry\", \"neutral\", \"disgust\", and \"happy\". We also considered the \"None\" class if the image's facial expression could not be described by any of the aforementioned emotions. Although we provide FePh as a facial expression dataset of signers in sign language, it has a wider application in gesture recognition and Human Computer Interaction (HCI) systems."} {"_id": [17], "label": "cs.DC", "text": "Developing a Process in Architecting Microservice Infrastructure with Docker, Kubernetes, and Istio. As an application usage grows, its owner scales up vertically by replacing old machines with more powerful ones. This methodology is expensive and leads to resource waste. In response to the business needs, internet giants have developed the microservice architecture, which lets developers divide up their application into smaller units that can be hosted on multiple machines, thus enabling horizontal scale up. We propose a triphasic incremental process to transform a traditional application into a microservice application that guarantees stability during the operation. Then we demonstrated such methodology in a prototype microservice application based on an existing monolithic application. First, the developer splits a monolithic application into atomic services and aggregated services. Second, these services are packaged, containerized, and then deployed on Kubernetes. During this stage, Istio is deployed on the Kubernetes cluster to establish pod level communications, delegate traffic flows and filter requests, and enable the autoscaler. Other external add ons, such as database connections, are defined in service entry. In the last stage, we developed an algorithm guideline to minimize inter service calls by compiling all needed calls into a list and perform one finalized call. Although it increases memory usage, it avoided the wait time incurred during interservice calls. We then investigated managing configurations using config maps, recommended a pipeline being developed to perform automatic rollover."} {"_id": [49], "label": "math.OC", "text": "Using Submodularity within Column Generation to Solve the Flight to Gate Assignment Problem. In this paper, we provide a column generation based approach for solving the airport flight to gate assignment problem, where the goal is to minimize the on ground portion of arrival delays by optimally assigning each scheduled flight to a compatible gate. Specifically, we use a set covering formulation for the master problem and decompose the pricing problem such that each gate is the basis for an independent pricing problem to be solved for assignment patterns with negative reduced costs. We use a combination of an approximation algorithm based on the submodularity of the underlying set and dynamic programming algorithms to solve the independent pricing problems. To the best of our knowledge, this is the first use of submodularity property to efficiently solve pricing problems and improve the performance of column generation algorithm. We show that the dynamic programming algorithm is pseudo polynomial when there are integer inputs. We also design and employ a rolling horizon method and block decomposition algorithm to solve large sized instances. Finally, we perform extensive computational experiments to validate the performance of our approach."} {"_id": [46], "label": "math.AG", "text": "Effective cones of cycles on products of projective bundles over curves. Let X mathbb P (E 1) times C mathbb P (E 2) where C is a smooth curve and E 1 , E 2 are vector bundles over C .In this paper we compute the pseudo effective cones of higher codimension cycles on X ."} {"_id": [22], "label": "cs.SE", "text": "A framework to semantify BPMN models using DEMO business transaction pattern. BPMN is a specification language widely used by industry and researchers for business process modeling and execution. It defines clearly how to articulate its concepts, but do not provide mechanism to represent the semantics of the produced models. This paper addresses the problem of how to improve the expressiveness of BPMN models, proposing a definition for the semantics of a business process within a BPMN model, and improving the completeness of the models in a systematic manner, so that models can describe far more situations with few extra managed complexity. We conceive a framework based on the business transaction patterns available in the enterprise ontology body of knowledge to prescribe the foundations of semantic BPMN models. A tool has been developed to automate the framework. Then, two industrial proof of concepts are used to measure its coverage, both positive and negative, and to argue about our proposal's usefulness. After that, the proposal is compared with others using a systematic literature review. A full BPMN pattern is proposed encompassing the happy flow, the declinations, the rejections and the revocations, without adding any new element to the BPMN specification. A software tool has been developed, and made publicly available, to support the automatic generation of the BPMN models from the proposed patterns. Our semantified BPMN pattern allowed the identification of a large amount of implicit, and other not implemented, situations in both proof of concepts. It is concluded that the usage of a semantic solution, grounded on a sound pattern, allows the systematic enrichment of the BPMN models with a bounded effort. Moreover, to simplify the BPMN executable models' implementation, its elements could be classified as implicit, explicit, or not implemented yet. Finally, related work indicates that this work is demanded, but no full solutions are available."} {"_id": [9], "label": "math.AP", "text": "Asymptotic behavior for the long range nonlinear Schr \"odinger equation on star graph with the Kirchhoff boundary condition. We consider the cubic nonlinear Schr \" o dinger equation on the star graph with the Kirchhoff boundary condition. We prove modified scattering for the final state problem and the initial value problem. Moreover, we also consider the failure of scattering for the Schr \" o dinger equation with power type long range nonlinearities. These results are extension of the results for NLS on the one dimensional Euclidean space."} {"_id": [1, 2], "label": "cs.LG cs.AI", "text": "Reinforcement Learning for Learning of Dynamical Systems in Uncertain Environment a Tutorial. In this paper, a review of model free reinforcement learning for learning of dynamical systems in uncertain environments has discussed. For this purpose, the Markov Decision Process (MDP) will be reviewed. Furthermore, some learning algorithms such as Temporal Difference (TD) learning, Q Learning, and Approximate Q learning as model free algorithms which constitute the main part of this article have been investigated, and benefits and drawbacks of each algorithm will be discussed. The discussed concepts in each section are explaining with details and examples."} {"_id": [41, 37, 22], "label": "cs.RO cs.FL cs.SE", "text": "Offline Runtime Verification of Safety Requirements using CSP. Dynamic formal verification is a key tool for providing ongoing confidence that a system is meeting its requirements while in use, especially when paired with static formal verification before the system is in use. This paper presents a workflow and Runtime Verification (RV) toolchain, Varanus, and their application to an industrial case study. Using the workflow we manually derive a Communicating Sequential Processes (CSP) model from natural language safety requirements documents, which Varanus uses as the monitor oracle. This reuse of the model means that the monitor oracle does not have to be developed separately, risking inconsistencies between it and the model for static verification. The approach is demonstrated by the offline RV of a teleoperated manipulation system, called MASCOT, which enables remote operations inside the Joint European Torus (JET) fusion reactor. We describe our model of the MASCOT safety design documents (including how the modelling process revealed an underspecification in the design) and evaluate the Varanus toolchain's utility. The workflow and tool provide validation of the safety documents, traceability of the safety properties from the documentation to the system, and a verified oracle for RV."} {"_id": [72, 17, 60, 1], "label": "cs.DC cs.AR cs.LG cs.PF", "text": "Time Based Roofline for Deep Learning Performance Analysis. Deep learning applications are usually very compute intensive and require a long run time for training and inference. This has been tackled by researchers from both hardware and software sides, and in this paper, we propose a Roofline based approach to performance analysis to facilitate the optimization of these applications. This approach is an extension of the Roofline model widely used in traditional high performance computing applications, and it incorporates both compute bandwidth complexity and run time in its formulae to provide insights into deep learning specific characteristics. We take two sets of representative kernels, 2D convolution and long short term memory, to validate and demonstrate the use of this new approach, and investigate how arithmetic intensity, cache locality, auto tuning, kernel launch overhead, and Tensor Core usage can affect performance. Compared to the common ad hoc approach, this study helps form a more systematic way to analyze code performance and identify optimization opportunities for deep learning applications."} {"_id": [32, 68], "label": "cs.DS cs.DM", "text": "Subexponential parameterized algorithms and kernelization on almost chordal graphs. We study the algorithmic properties of the graph class Chordal ke, that is, graphs that can be turned into a chordal graph by adding at most k edges or, equivalently, the class of graphs of fill in at most k. We discover that a number of fundamental intractable optimization problems being parameterized by k admit subexponential algorithms on graphs from Chordal ke. We identify a large class of optimization problems on Chordal ke that admit algorithms with the typical running time 2 O( sqrt k log k) cdot n O(1) . Examples of the problems from this class are finding an independent set of maximum weight, finding a feedback vertex set or an odd cycle transversal of minimum weight, or the problem of finding a maximum induced planar subgraph. On the other hand, we show that for some fundamental optimization problems, like finding an optimal graph coloring or finding a maximum clique, are FPT on Chordal ke when parameterized by k but do not admit subexponential in k algorithms unless ETH fails. Besides subexponential time algorithms, the class of Chordal ke graphs appears to be appealing from the perspective of kernelization (with parameter k). While it is possible to show that most of the weighted variants of optimization problems do not admit polynomial in k kernels on Chordal ke graphs, this does not exclude the existence of Turing kernelization and kernelization for unweighted graphs. In particular, we construct a polynomial Turing kernel for Weighted Clique on Chordal ke graphs. For (unweighted) Independent Set we design polynomial kernels on two interesting subclasses of Chordal ke, namely, Interval ke and Split ke graphs."} {"_id": [15], "label": "cs.IT math.IT", "text": "An explicit expression for Euclidean self dual cyclic codes of length 2 k over Galois ring rm GR (4,m) . For any positive integers m and k , existing literature only determines the number of all Euclidean self dual cyclic codes of length 2 k over the Galois ring rm GR (4,m) , such as in Des. Codes Cryptogr. (2012) 63 105 112 . Using properties for Kronecker products of matrices of a specific type and column vectors of these matrices, we give a simple and efficient method to construct all these self dual cyclic codes precisely. On this basis, we provide an explicit expression to accurately represent all distinct Euclidean self dual cyclic codes of length 2 k over rm GR (4,m) , using combination numbers. As an application, we list all distinct Euclidean self dual cyclic codes over rm GR (4,m) of length 2 k explicitly, for k 4,5,6 ."} {"_id": [63], "label": "cs.DL", "text": "Common Library 1.0 A Corpus of Victorian Novels Reflecting the Population in Terms of Publication Year and Author Gender. Research in 19th century book history, sociology of literature, and quantitative literary history is blocked by the absence of a collection of novels which captures the diversity of literary production. We introduce a corpus of 75 Victorian novels sampled from a 15,322 record bibliography of novels published between 1837 and 1901 in the British Isles. This corpus, the Common Library, is distinctive in the following way the shares of novels in the corpus associated with sociologically important subgroups match the shares in the broader population. For example, the proportion of novels written by women in 1880s in the corpus is approximately the same as in the population. Although we do not, in this particular paper, claim that the corpus is a representative sample in the familiar sense a sample is representative if \"characteristics of interest in the population can be estimated from the sample with a known degree of accuracy\" (Lohr 2010, p. 3) we are confident that the corpus will be useful to researchers. This is because existing corpora frequently convenience samples are conspicuously misaligned with the population of published novels. They tend to over represent novels published in specific periods and novels by men. The Common Library may be used alongside or in place of these non representative convenience corpora."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "Teacher Student Competition for Unsupervised Domain Adaptation. With the supervision from source domain only in class level, existing unsupervised domain adaptation (UDA) methods mainly learn the domain invariant representations from a shared feature extractor, which causes the source bias problem. This paper proposes an unsupervised domain adaptation approach with Teacher Student Competition (TSC). In particular, a student network is introduced to learn the target specific feature space, and we design a novel competition mechanism to select more credible pseudo labels for the training of student network. We introduce a teacher network with the structure of existing conventional UDA method, and both teacher and student networks compete to provide target pseudo labels to constrain every target sample's training in student network. Extensive experiments demonstrate that our proposed TSC framework significantly outperforms the state of the art domain adaptation methods on Office 31 and ImageCLEF DA benchmarks."} {"_id": [29, 21, 38], "label": "math.CO math.GR math.NT", "text": "High symmetric n polygons. The present article includes the enumeration of n polygons with a certain symmetry property For an even number n of vertices, we count the n polygons with frac n 2 symmetry axes. In addition, if n is a power of 2, we show the relation to the perfect numbers."} {"_id": [0], "label": "cs.CV", "text": "Aggregation Cross Entropy for Sequence Recognition. In this paper, we propose a novel method, aggregation cross entropy (ACE), for sequence recognition from a brand new perspective. The ACE loss function exhibits competitive performance to CTC and the attention mechanism, with much quicker implementation (as it involves only four fundamental formulas), faster inference back propagation (approximately O(1) in parallel), less storage requirement (no parameter and negligible runtime memory), and convenient employment (by replacing CTC with ACE). Furthermore, the proposed ACE loss function exhibits two noteworthy properties (1) it can be directly applied for 2D prediction by flattening the 2D prediction into 1D prediction as the input and (2) it requires only characters and their numbers in the sequence annotation for supervision, which allows it to advance beyond sequence recognition, e.g., counting problem. The code is publicly available at https github.com summerlvsong Aggregation Cross Entropy."} {"_id": [22], "label": "cs.SE", "text": "TBar Revisiting Template based Automated Program Repair. We revisit the performance of template based APR to build comprehensive knowledge about the effectiveness of fix patterns, and to highlight the importance of complementary steps such as fault localization or donor code retrieval. To that end, we first investigate the literature to collect, summarize and label recurrently used fix patterns. Based on the investigation, we build TBar, a straightforward APR tool that systematically attempts to apply these fix patterns to program bugs. We thoroughly evaluate TBar on the Defects4J benchmark. In particular, we assess the actual qualitative and quantitative diversity of fix patterns, as well as their effectiveness in yielding plausible or correct patches. Eventually, we find that, assuming a perfect fault localization, TBar correctly plausibly fixes 74 101 bugs. Replicating a standard and practical pipeline of APR assessment, we demonstrate that TBar correctly fixes 43 bugs from Defects4J, an unprecedented performance in the literature (including all approaches, i.e., template based, stochastic mutation based or synthesis based APR)."} {"_id": [4], "label": "cs.NE", "text": "Genetic Random Weight Change Algorithm for the Learning of Multilayer Neural Networks. A new method to improve the performance of Random weight change (RWC) algorithm based on a simple genetic algorithm, namely, Genetic random weight change (GRWC) is proposed. It is to find the optimal values of global minima via learning. In contrast to Random Weight Change (RWC), GRWC contains an effective optimization procedure which are good at exploring a large and complex space in an intellectual strategies influenced by the GA RWC synergy. By implementing our simple GA in RWC we achieve an astounding accuracy of finding global minima."} {"_id": [3], "label": "cs.CL", "text": "Show or Tell? Demonstration is More Robust to Changes in Shared Perception than Explanation. Successful teaching entails a complex interaction between a teacher and a learner. The teacher must select and convey information based on what they think the learner perceives and believes. Teaching always involves misaligned beliefs, but studies of pedagogy often focus on situations where teachers and learners share perceptions. Nonetheless, a teacher and learner may not always experience or attend to the same aspects of the environment. Here, we study how misaligned perceptions influence communication. We hypothesize that the efficacy of different forms of communication depends on the shared perceptual state between teacher and learner. We develop a cooperative teaching game to test whether concrete mediums (demonstrations, or \"showing\") are more robust than abstract ones (language, or \"telling\") when the teacher and learner are not perceptually aligned. We find evidence that (1) language based teaching is more affected by perceptual misalignment, but (2) demonstration based teaching is less likely to convey nuanced information. We discuss implications for human pedagogy and machine learning."} {"_id": [2, 39], "label": "cs.CY cs.AI", "text": "Smart technology in the classroom a systematic review.Prospects for algorithmic accountability. Artificial intelligence (AI) algorithms have emerged in the educational domain as a tool to make learning more efficient. Different applications for mastering particular skills, learning new languages, and tracking their progress are used by children. What is the impact on children from using this smart technology? We conducted a systematic review to understand the state of the art. We explored the literature in several sub disciplines wearables, child psychology, AI and education, school surveillance, and accountability. Our review identified the need for more research for each established topic. We managed to find both positive and negative effects of using wearables, but cannot conclude if smart technology use leads to lowering the young children's performance. Based on our insights we propose a framework to effectively identify accountability for smart technology in education."} {"_id": [65, 15], "label": "cs.NI cs.IT math.IT", "text": "Flexible Functional Split and Power Control for Energy Harvesting Cloud Radio Access Networks. Functional split is a promising technique to flexibly balance the processing cost at remote ends and the fronthaul rate in cloud radio access networks (C RAN). By harvesting renewable energy, remote radio units (RRUs) can save grid power and be flexibly deployed. However, the randomness of energy arrival poses a major design challenge. To maximize the throughput under the average fronthaul rate constraint in C RAN with renewable powered RRUs, we first study the offline problem of selecting the optimal functional split modes and the corresponding durations, jointly with the transmission power. We find that between successive energy arrivals, at most two functional split modes should be selected. Then the optimal online problem is formulated as an Markov decision process (MDP). To deal with the curse of dimensionality of solving MDP, we further analyze the special case with one instance of energy arrival and two candidate functional split modes as inspired by the offline solution, and then a heuristic online policy is proposed. Numerical results show that with flexible functional split, the throughput can be significantly improved compared with fixed functional split. Also, the proposed heuristic online policy has similar performance with the optimal online one, as validated by simulations."} {"_id": [36], "label": "physics.chem-ph", "text": "Which oxidation state of uranium and thorium as point defects in xenotime is favorable?. Relativistic study of xenotime, YPO 4 , containing atoms thorium and uranium as point defects is performed in the framework of cluster model with using the compound tunable embedding potential (CTEP) method proposed by us recently. The Y (PO 4 ) 6 Y' 22 O' 104 cluster for xenotime is considered, in which central part, Y (PO 4 ) 6 15 , is the main cluster, whereas outermost 22 atoms of yttrium and 104 atoms of oxygen are treated as its environment and compose electron free CTEP with the total charge of 15 . The P and O atoms of the orthophosphate groups nearest to the central Y atom are treated at all electron level. The central Y, its substitutes, Th and U, together with environmental Y atoms are described within different versions of the generalized relativistic pseudopotential method. Correctness of our cluster and CTEP models, constructed in the paper, is justified by comparing the Y O and P O bond lengths with corresponding periodic structure values of the ypo4 crystal, both experimental and theoretical. Using this cluster model, chemical properties of solitary point defects, X U, Th, in xenotime are analyzed. It has been shown that the oxidation state 3 is energetically more profitable than 4 not only for thorium but for uranium as well ( Delta E approx 5 eV) despite the notably higher ionic radius of U 3 compared to Y 3 , whereas ionic radii of U 4 and Y 3 are close. This leads to notable local deformation of crystal geometry around the U 3 impurity in xenotime and contradicts to widespread opinion about favorite oxidation state of uranium in such kind of minerals."} {"_id": [15], "label": "cs.IT math.IT", "text": "Context Aware Information Lapse for Timely Status Updates in Remote Control Systems. Emerging applications in Internet of Things (IoT), such as remote monitoring and control, extensively rely on timely status updates. Age of Information (AoI) has been proposed to characterize the freshness of information in status update systems. However, it only considers the time elapsed since the generation of the latest packet, and is incapable of capturing other critical information in remote control systems, such as the stochastic evolution and the importance of the source status. In order to evaluate the timeliness of status updates in remote control systems, we propose a context aware metric, namely the context aware information lapse. The context aware information lapse characterizes both the stochastic evolution of the source status and the context aware importance of the status. In this paper, the minimization of average context aware lapse in a multi user system is considered, and a corresponding user scheduling policy is proposed based on Lyapunov optimization. Numerical results show that compared to AoI based policy, the context aware lapse based policy can achieve a substantial improvement in terms of error threshold violation probability and control performance."} {"_id": [21], "label": "math.CO", "text": "Restricted online Ramsey numbers of matchings and trees. Consider a two player game between players Builder and Painter. Painter begins the game by picking a coloring of the edges of K n , which is hidden from Builder. In each round, Builder points to an edge and Painter reveals its color. Builder's goal is to locate a particular monochromatic structure in Painter's coloring by revealing the color of as few edges as possible. The fewest number of turns required for Builder to win this game is known as the restricted online Ramsey number. In this paper, we consider the situation where this \"particular monochromatic structure\" is a large matching or a large tree. We show that in any t coloring of E(K n) , Builder can locate a monochromatic matching on at least n t 1 over t 1 edges by revealing at most O(n log t) edges. We show also that in any 3 coloring of E(K n) , Builder can locate a monochromatic tree on at least n 2 vertices by revealing at most 5n edges."} {"_id": [75, 27, 46, 47], "label": "math.AG math.AT math.CT math.KT", "text": "The universal six functor formalism. We prove that Morel Voevodsky's stable mathbb A 1 homotopy theory affords the universal six functor formalism."} {"_id": [3], "label": "cs.CL", "text": "Decomposing predictability Semantic feature overlap between words and the dynamics of reading for meaning. The present study uses a computational approach to examine the role of semantic constraints in normal reading. This methodology avoids confounds inherent in conventional measures of predictability, allowing for theoretically deeper accounts of semantic processing. We start from a definition of associations between words based on the significant log likelihood that two words co occur frequently together in the sentences of a large text corpus. Direct associations between stimulus words were controlled, and semantic feature overlap between prime and target words was manipulated by their common associates. The stimuli consisted of sentences of the form pronoun, verb, article, adjective and noun, followed by a series of closed class words, e. g. \"She rides the grey elephant on one of her many exploratory voyages\". The results showed that verb noun overlap reduces single and first fixation durations of the target noun and adjective noun overlap reduces go past durations. A dynamic spreading of activation account suggests that associates of the prime words take some time to become activated The verb can act on the target noun's early eye movement measures presented three words later, while the adjective is presented immediately prior to the target, which induces sentence re examination after a difficult adjective noun semantic integration."} {"_id": [75, 38], "label": "math.NT math.KT", "text": "Describing all multivariable functional equations of dilogarithms. We prove quite general statements about functional equations in any number of variables for the dilogarithms defined by Bloch Wigner, Rogers, and Coleman, showing that they follow from certain 5 term and 2 term relations in a precise way. Unlike many other references, we use arbitrary coefficients, do not ignore any torsion, and get sharp results. For the Bloch Wigner dilogarithm, we also consider complex conjugation, and for Coleman's p adic dilogarithm we show independence of the branch."} {"_id": [2, 3], "label": "cs.AI cs.CL", "text": "Variational Reward Estimator Bottleneck Learning Robust Reward Estimator for Multi Domain Task Oriented Dialog. Despite its notable success in adversarial learning approaches to multi domain task oriented dialog system, training the dialog policy via adversarial inverse reinforcement learning often fails to balance the performance of the policy generator and reward estimator. During optimization, the reward estimator often overwhelms the policy generator and produces excessively uninformative gradients. We proposes the Variational Reward estimator Bottleneck (VRB), which is an effective regularization method that aims to constrain unproductive information flows between inputs and the reward estimator. The VRB focuses on capturing discriminative features, by exploiting information bottleneck on mutual information. Empirical results on a multi domain task oriented dialog dataset demonstrate that the VRB significantly outperforms previous methods."} {"_id": [1], "label": "cs.LG", "text": "Deep Low Shot Learning for Biological Image Classification and Visualization from Limited Training Samples. Predictive modeling is useful but very challenging in biological image analysis due to the high cost of obtaining and labeling training data. For example, in the study of gene interaction and regulation in Drosophila embryogenesis, the analysis is most biologically meaningful when in situ hybridization (ISH) gene expression pattern images from the same developmental stage are compared. However, labeling training data with precise stages is very time consuming even for evelopmental biologists. Thus, a critical challenge is how to build accurate computational models for precise developmental stage classification from limited training samples. In addition, identification and visualization of developmental landmarks are required to enable biologists to interpret prediction results and calibrate models. To address these challenges, we propose a deep two step low shot learning framework to accurately classify ISH images using limited training images. Specifically, to enable accurate model training on limited training samples, we formulate the task as a deep low shot learning problem and develop a novel two step learning approach, including data level learning and feature level learning. We use a deep residual network as our base model and achieve improved performance in the precise stage prediction task of ISH images. Furthermore, the deep model can be interpreted by computing saliency maps, which consist of pixel wise contributions of an image to its prediction result. In our task, saliency maps are used to assist the identification and visualization of developmental landmarks. Our experimental results show that the proposed model can not only make accurate predictions, but also yield biologically meaningful interpretations. We anticipate our methods to be easily generalizable to other biological image classification tasks with small training datasets."} {"_id": [26, 21, 46], "label": "math.RT math.AG math.CO", "text": "An intrinsic characterization of cofree representations of reductive groups. We formulate and partially verify a conjecture characterizing cofree representations of connected reductive groups. As we explain, this conjecture may be viewed as a natural generalization of the Chevalley Shepard Todd theorem from the case of finite groups to the case of connected reductive groups."} {"_id": [65], "label": "cs.NI", "text": "Novel Backoff Mechanism for Mitigation of Congestion in DSRC Broadcast. Due to the recent re allocation of the 5.9 GHz band by the US Federal Communications Commission (FCC), it will be inevitable that dedicated short range communications (DSRC) and cellular vehicle to everything (C V2X), two representative technologies for V2X, have to address coexistence. Especially, the distributed nature of DSRC makes it not trivial to control congestions due to an asynchronous structure, which makes it inefficient to disseminate a controlling signal. To this end, we propose a method to \"lighten\" a distributed V2X networking. Technically, it is to allocate the backoff counter according to the level of an accident risk to which a vehicle is temporarily exposed. We provide an analysis framework based on a spatiotemporal analysis. The numerical results show the improvement in the successful delivery of basic safety messages (BSMs)."} {"_id": [1, 13, 62], "label": "cs.GT cs.LG math.DS", "text": "Fictitious play in zero sum stochastic games. We present a novel variant of fictitious play dynamics combining classical fictitious play with Q learning for stochastic games and analyze its convergence properties in two player zero sum stochastic games. Our dynamics involves players forming beliefs on the opponent strategy and their own continuation payoff (Q function), and playing a greedy best response by using the estimated continuation payoffs. Players update their beliefs from observations of opponent actions. A key property of the learning dynamics is that update of the beliefs on Q functions occurs at a slower timescale than update of the beliefs on strategies. We show both in the model based and model free cases (without knowledge of player payoff functions and state transition probabilities), the beliefs on strategies converge to a stationary mixed Nash equilibrium of the zero sum stochastic game."} {"_id": [64, 59, 31], "label": "physics.soc-ph cs.SI q-bio.PE", "text": "Economy Versus Disease Spread Reopening Mechanisms for COVID 19. We study mechanisms for reopening economic activities that explore the trade off between containing the spread of COVID 19 and maximizing economic impact. This is of current importance as many organizations, cities, and states are formulating reopening strategies. Our mechanisms, referred to as group scheduling, are based on partitioning the population into groups and scheduling each group on appropriate days with possible gaps (when all are quarantined). Each group interacts with no other group and, importantly, any person who is symptomatic in a group is quarantined. Specifically, our mechanisms are characterized by three parameters (g,d,t) , where g is the number of groups, d is the number of days a group is continuously scheduled, and t is the gap between cycles. We show that our mechanisms effectively trade off economic activity for more effective control of the COVID 19 virus. In particular, we show that the (2,5,0) mechanism, which partitions the population into two groups that alternatively work for five days each, flat lines the number of COVID 19 cases quite effectively, while still maintaining economic activity at 70 of pre COVID 19 level. We also study mechanisms such as (2,3,2) and (3,3,0) that achieve a somewhat lower economic output (about 50 ) at the cost of more aggressive control of the virus these could be applicable in situations when the disease spread is more rampant in the population. We demonstrate the efficacy of our mechanisms by theoretical analysis and extensive experimental simulations on various epidemiological models. Our mechanisms prove beneficial just by regulating human interactions. Moreover, our results show that if the disease transmission (reproductive) rate is made lower by following social distancing, mask wearing, and other public health guidelines, it can further increase the efficacy of our mechanisms."} {"_id": [3], "label": "cs.CL", "text": "A Probabilistic Generative Model of Linguistic Typology. In the principles and parameters framework, the structural features of languages depend on parameters that may be toggled on or off, with a single parameter often dictating the status of multiple features. The implied covariance between features inspires our probabilisation of this line of linguistic inquiry we develop a generative model of language based on exponential family matrix factorisation. By modelling all languages and features within the same architecture, we show how structural similarities between languages can be exploited to predict typological features with near perfect accuracy, outperforming several baselines on the task of predicting held out features. Furthermore, we show that language embeddings pre trained on monolingual text allow for generalisation to unobserved languages. This finding has clear practical and also theoretical implications the results confirm what linguists have hypothesised, i.e. that there are significant correlations between typological features and languages."} {"_id": [1, 2, 3], "label": "cs.CL cs.AI cs.LG", "text": "Span Selection Pre training for Question Answering. BERT (Bidirectional Encoder Representations from Transformers) and related pre trained Transformers have provided large gains across many language understanding tasks, achieving a new state of the art (SOTA). BERT is pre trained on two auxiliary tasks Masked Language Model and Next Sentence Prediction. In this paper we introduce a new pre training task inspired by reading comprehension to better align the pre training from memorization to understanding. Span Selection Pre Training (SSPT) poses cloze like training instances, but rather than draw the answer from the model's parameters, it is selected from a relevant passage. We find significant and consistent improvements over both BERT BASE and BERT LARGE on multiple reading comprehension (MRC) datasets. Specifically, our proposed model has strong empirical evidence as it obtains SOTA results on Natural Questions, a new benchmark MRC dataset, outperforming BERT LARGE by 3 F1 points on short answer prediction. We also show significant impact in HotpotQA, improving answer prediction F1 by 4 points and supporting fact prediction F1 by 1 point and outperforming the previous best system. Moreover, we show that our pre training approach is particularly effective when training data is limited, improving the learning curve by a large amount."} {"_id": [3], "label": "cs.CL", "text": "TuringAdvice A Generative and Dynamic Evaluation of Language Use. We propose TuringAdvice, a new challenge task and dataset for language understanding models. Given a written situation that a real person is currently facing, a model must generate helpful advice in natural language. Our evaluation framework tests a fundamental aspect of human language understanding our ability to use language to resolve open ended situations by communicating with each other. Empirical results show that today's models struggle at TuringAdvice, even multibillion parameter models finetuned on 600k in domain training examples. The best model, a finetuned T5, writes advice that is at least as helpful as human written advice in only 14 of cases a much larger non finetunable GPT3 model does even worse at 4 . This low performance reveals language understanding errors that are hard to spot outside of a generative setting, showing much room for progress."} {"_id": [93, 5, 6, 87], "label": "physics.plasm-ph physics.class-ph physics.flu-dyn physics.pop-ph", "text": "Rotational properties of annulus dusty plasma in a strong magnetic field. The collective dynamics of annulus dusty plasma formed between a co centric conducting (non conducting) disk and ring configuration is studied in a strongly magnetized radio frequency (rf) discharge. A superconducting electromagnet is used to introduce a homogeneous magnetic field to the dusty plasma medium. In absence of the magnetic field, dust grains exhibit thermal motion around their equilibrium position. The dust grains start to rotate in anticlockwise direction with increasing magnetic field (B 0.02 T), and the constant value of the angular frequency at various strengths of magnetic field confirms the rigid body rotation. The angular frequency of dust grains linearly increases up to a threshold magnetic field (B 0.6 T) and after that its value remains nearly constant in a certain range of magnetic field. Further increase in magnetic field (B 1 T) lowers the angular frequency. Low value of angular frequency is expected by reducing the width of annulus dusty plasma or the input rf power. The azimuthal ion drag force due to the magnetic field is assumed to be the energy source which drives the rotational motion. The resultant radial electric field in the presence of magnetic field determines the direction of rotation. The variation of floating (plasma) potential across the annular region at given magnetic field explains the rotational properties of the annulus dusty plasma in the presence of magnetic field."} {"_id": [38], "label": "math.NT", "text": "Sup norms of newforms on GL 2 with highly ramified central character. Recently, the problem of bounding the sup norms of L 2 normalized cuspidal automorphic newforms phi on text GL 2 in the level aspect has received much attention. However at the moment strong upper bounds are only available if the central character chi of phi is not too highly ramified. In this paper, we establish a uniform upper bound in the level aspect for general chi . If the level N is a square, our result reduces to phi infty ll N frac14 epsilon , at least under the Ramanujan Conjecture. In particular, when chi has conductor N , this improves upon the previous best known bound phi infty ll N frac12 epsilon in this setup (due to Saha 14 ) and matches a lower bound due to Templier 18 , thus our result is essentially optimal in this case."} {"_id": [1, 3, 4], "label": "cs.CL cs.LG cs.NE", "text": "The Unreasonable Effectiveness of Transformer Language Models in Grammatical Error Correction. Recent work on Grammatical Error Correction (GEC) has highlighted the importance of language modeling in that it is certainly possible to achieve good performance by comparing the probabilities of the proposed edits. At the same time, advancements in language modeling have managed to generate linguistic output, which is almost indistinguishable from that of human generated text. In this paper, we up the ante by exploring the potential of more sophisticated language models in GEC and offer some key insights on their strengths and weaknesses. We show that, in line with recent results in other NLP tasks, Transformer architectures achieve consistently high performance and provide a competitive baseline for future machine learning models."} {"_id": [0, 1, 28], "label": "cs.CV cs.CG cs.LG", "text": "Improving Augmentation and Evaluation Schemes for Semantic Image Synthesis. Despite data augmentation being a de facto technique for boosting the performance of deep neural networks, little attention has been paid to developing augmentation strategies for generative adversarial networks (GANs). To this end, we introduce a novel augmentation scheme designed specifically for GAN based semantic image synthesis models. We propose to randomly warp object shapes in the semantic label maps used as an input to the generator. The local shape discrepancies between the warped and non warped label maps and images enable the GAN to learn better the structural and geometric details of the scene and thus to improve the quality of generated images. While benchmarking the augmented GAN models against their vanilla counterparts, we discover that the quantification metrics reported in the previous semantic image synthesis studies are strongly biased towards specific semantic classes as they are derived via an external pre trained segmentation network. We therefore propose to improve the established semantic image synthesis evaluation scheme by analyzing separately the performance of generated images on the biased and unbiased classes for the given segmentation network. Finally, we show strong quantitative and qualitative improvements obtained with our augmentation scheme, on both class splits, using state of the art semantic image synthesis models across three different datasets. On average across COCO Stuff, ADE20K and Cityscapes datasets, the augmented models outperform their vanilla counterparts by 3 mIoU and 10 FID points."} {"_id": [19], "label": "cs.CR", "text": "A \"Final\" Security Bug. This article discusses a fixed critical security bug in Google Tink's Ed25519 Java implementation. The bug allows remote attackers to extract the private key with only two Ed25519 signatures. The vulnerability comes from the misunderstanding of what \"final\" in Java programming language means. The bug was discovered during security review before Google Tink was officially released. It reinforces the challenge in writing safe cryptographic code and the importance of the security review process even for the code written by professional cryptographers."} {"_id": [24, 25], "label": "math.PR math.MG", "text": "Random cones in high dimensions I Donoho Tanner and Cover Efron cones. Two models of random cones in high dimensions are considered, together with their duals. The Donoho Tanner random cone D n,d can be defined as the positive hull of n independent d dimensional Gaussian random vectors. The Cover Efron random cone C n,d is essentially defined as the same positive hull, conditioned on the event that it is not the whole space. We consider expectations of various combinatorial and geometric functionals of these random cones and prove that they satisfy limit theorems, as d and n tend to infinity in a suitably coordinated way. This includes, for example, large deviation principles and central as well as non central limit theorems for the expected number of k faces and the k th conic intrinsic volumes, as n , d and possibly also k tend to infinity simultaneously. Furthermore, we determine the precise high dimensional asymptotic behaviour of the expected statistical dimension for both models of random cones, uncovering thereby another high dimensional phase transition. As an application, limit theorems for the number of k faces of high dimensional polytopes generated by random Gale diagrams are discussed as well."} {"_id": [29], "label": "math.GR", "text": "Conjugacy classes of p elements and normal p complements. In this paper, we study the structure of finite groups with a large number of conjugacy classes of p elements for some prime p . As consequences, we obtain some new criteria for the existence of normal p complements in finite groups."} {"_id": [24, 25], "label": "math.PR math.MG", "text": "Does a central limit theorem hold for the k skeleton of Poisson hyperplanes in hyperbolic space?. Poisson processes in the space of (d 1) dimensional totally geodesic subspaces (hyperplanes) in a d dimensional hyperbolic space of constant curvature 1 are studied. The k dimensional Hausdorff measure of their k skeleton is considered. Explicit formulas for first and second order quantities restricted to bounded observation windows are obtained. The central limit problem for the k dimensional Hausdorff measure of the k skeleton is approached in two different set ups (i) for a fixed window and growing intensities, and (ii) for fixed intensity and growing spherical windows. While in case (i) the central limit theorem is valid for all d geq 2 , it is shown that in case (ii) the central limit theorem holds for d in 2,3 and fails if d geq 4 and k d 1 or if d geq 7 and for general k . Also rates of convergence are studied and multivariate central limit theorems are obtained. Moreover, the situation in which the intensity and the spherical window are growing simultaneously is discussed. In the background are the Malliavin Stein method for normal approximation and the combinatorial moment structure of Poisson U statistics as well as tools from hyperbolic integral geometry."} {"_id": [2, 3], "label": "cs.CL cs.AI", "text": "A BERT based Distractor Generation Scheme with Multi tasking and Negative Answer Training Strategies. In this paper, we investigate the following two limitations for the existing distractor generation (DG) methods. First, the quality of the existing DG methods are still far from practical use. There is still room for DG quality improvement. Second, the existing DG designs are mainly for single distractor generation. However, for practical MCQ preparation, multiple distractors are desired. Aiming at these goals, in this paper, we present a new distractor generation scheme with multi tasking and negative answer training strategies for effectively generating textit multiple distractors. The experimental results show that (1) our model advances the state of the art result from 28.65 to 39.81 (BLEU 1 score) and (2) the generated multiple distractors are diverse and show strong distracting power for multiple choice question."} {"_id": [14], "label": "cs.HC", "text": "How to Support Users in Understanding Intelligent Systems? Structuring the Discussion. The opaque nature of many intelligent systems violates established usability principles and thus presents a challenge for human computer interaction. Research in the field therefore highlights the need for transparency, scrutability, intelligibility, interpretability and explainability, among others. While all of these terms carry a vision of supporting users in understanding intelligent systems, the underlying notions and assumptions about users and their interaction with the system often remain unclear. We review the literature in HCI through the lens of implied user questions to synthesise a conceptual framework integrating user mindsets, user involvement, and knowledge outcomes to reveal, differentiate and classify current notions in prior work. This framework aims to resolve conceptual ambiguity in the field and enables researchers to clarify their assumptions and become aware of those made in prior work. We thus hope to advance and structure the dialogue in the HCI research community on supporting users in understanding intelligent systems."} {"_id": [42, 46], "label": "math.DG math.AG", "text": "Surfaces containing two parabolas through each point. We prove (under some technical assumptions) that each surface in mathbb R 3 containing two arcs of parabolas with axes parallel to Oz through each point has a parametrization left( frac P(u,v) R(u,v) , frac Q(u,v) R(u,v) , frac Z(u,v) R 2(u,v) right) for some P,Q,R,Z in mathbb R u,v such that P,Q,R have degree at most 1 in u and v , and Z has degree at most 2 in u and v . The proof is based on the observation that one can consider a parabola with vertical axis as an isotropic circle this allows us to use methods of the recent work by M. Skopenkov and R. Krasauskas in which all surfaces containing two Euclidean circles through each point are classified. Such approach also allows us to find a similar parametrization for the surfaces in mathbb R 3 containing two arbitrary isotropic circles through each point (under the same technical assumptions). Finally, we get some results concerning the top view (the projection along the Oz axis) of the surfaces in question."} {"_id": [2, 3, 14], "label": "cs.CL cs.AI cs.HC", "text": "AI Powered Text Generation for Harmonious Human Machine Interaction Current State and Future Directions. In the last two decades, the landscape of text generation has undergone tremendous changes and is being reshaped by the success of deep learning. New technologies for text generation ranging from template based methods to neural network based methods emerged. Meanwhile, the research objectives have also changed from generating smooth and coherent sentences to infusing personalized traits to enrich the diversification of newly generated content. With the rapid development of text generation solutions, one comprehensive survey is urgent to summarize the achievements and track the state of the arts. In this survey paper, we present the general systematical framework, illustrate the widely utilized models and summarize the classic applications of text generation."} {"_id": [16], "label": "q-bio.QM", "text": "Positive HBs antigen in the absence of hepatitis B virus infection. French recommendations for the screening of hepatitis B virus (HBV) infection were updated in 2019 with the association of three markers HBs Ag, anti HBs Ab and anti HBc Ab. These three markers allow identification of infected patients, vaccinated patients and patients who have been in contact with HBV. A positive HBs Ag is usually associated with HBV infection but this interpretation must take into account the clinical context. In particular, the absence of anti HBc Ab, normal ALAT levels and the absence of jaundice can be associated with recent HBV vaccination or false positive HBs Ag. Recent HBV vaccination can usually be confirmed by patient questioning, while confirmatory tests are useful to detect false positive HBs Ag. If necessary, a second sample can be requested to confirm the interpretation."} {"_id": [0], "label": "cs.CV", "text": "Towards Optimal Structured CNN Pruning via Generative Adversarial Learning. Structured pruning of filters or neurons has received increased focus for compressing convolutional neural networks. Most existing methods rely on multi stage optimizations in a layer wise manner for iteratively pruning and retraining which may not be optimal and may be computation intensive. Besides, these methods are designed for pruning a specific structure, such as filter or block structures without jointly pruning heterogeneous structures. In this paper, we propose an effective structured pruning approach that jointly prunes filters as well as other structures in an end to end manner. To accomplish this, we first introduce a soft mask to scale the output of these structures by defining a new objective function with sparsity regularization to align the output of baseline and network with this mask. We then effectively solve the optimization problem by generative adversarial learning (GAL), which learns a sparse soft mask in a label free and an end to end manner. By forcing more scaling factors in the soft mask to zero, the fast iterative shrinkage thresholding algorithm (FISTA) can be leveraged to fast and reliably remove the corresponding structures. Extensive experiments demonstrate the effectiveness of GAL on different datasets, including MNIST, CIFAR 10 and ImageNet ILSVRC 2012. For example, on ImageNet ILSVRC 2012, the pruned ResNet 50 achieves 10.88 Top 5 error and results in a factor of 3.7x speedup. This significantly outperforms state of the art methods."} {"_id": [20, 7], "label": "physics.comp-ph cs.NA math.NA", "text": "Efficient high order accurate staggered semi implicit discontinuous Galerkin methods for natural convection problems. We propose a new family of high order staggered semi implicit discontinuous Galerkin (DG) methods for the simulation of natural convection problems. Assuming small temperature fluctuations, the Boussinesq approximation is valid and the flow can simply be modeled by the incompressible Navier Stokes equations coupled with a transport equation for the temperature and a buoyancy source term in the momentum equation. Our numerical scheme is developed starting from the work presented in TD14 , in which the spatial domain is discretized using a face based staggered unstructured mesh. For the computation of the advection and diffusion terms, two different algorithms are presented i) a purely Eulerian explicit upwind type scheme and ii) a semi Lagrangian approach. The first methodology leads to a conservative scheme whose major drawback is the time step restriction imposed by the CFL stability condition. On the contrary, computational efficiency can be notably improved relying on a semi Lagrangian approach. This method leads to an unconditionally stable scheme if the diffusive terms are discretized implicitly. Once the advection and diffusion contributions have been computed, the pressure Poisson equation is solved and the velocity is updated. As a second model for the computation of buoyancy driven flows, we also consider the full compressible Navier Stokes equations. The staggered semi implicit DG method first proposed in TD17 for all Mach number flows is properly extended to account for the gravity source terms arising in the momentum and energy conservation laws. The validity and the robustness of our novel class of staggered semi implicit DG schemes is assessed at the aid of several classical benchmark problems, showing in all cases a good agreement with available numerical reference data. Finally, a detailed comparison between the incompressible and the compressible solver is presented."} {"_id": [1, 2, 4], "label": "cs.LG cs.AI cs.NE", "text": "A Reinforcement Learning Approach for Rebalancing Electric Vehicle Sharing Systems. This paper proposes a reinforcement learning approach for nightly offline rebalancing operations in free floating electric vehicle sharing systems (FFEVSS). Due to sparse demand in a network, FFEVSS require relocation of electrical vehicles (EVs) to charging stations and demander nodes, which is typically done by a group of drivers. A shuttle is used to pick up and drop off drivers throughout the network. The objective of this study is to solve the shuttle routing problem to finish the rebalancing work in the minimal time. We consider a reinforcement learning framework for the problem, in which a central controller determines the routing policies of a fleet of multiple shuttles. We deploy a policy gradient method for training recurrent neural networks and compare the obtained policy results with heuristic solutions. Our numerical studies show that unlike the existing solutions in the literature, the proposed methods allow to solve the general version of the problem with no restrictions on the urban EV network structure and charging requirements of EVs. Moreover, the learned policies offer a wide range of flexibility resulting in a significant reduction in the time needed to rebalance the network."} {"_id": [13], "label": "math.DS", "text": "Highly irregular orbits for subshifts of finite type large intersections and emergence. In their recent paper KNS2019 , the first author, S. Kiriki, and T. Soma introduced a concept of pointwise emergence to measure the complexity of irregular orbits. They constructed a residual subset of the full shift with high pointwise emergence. In this paper we consider the set of points with high pointwise emergence for topologically mixing subshifts of finite type. We show that this set has full topological entropy, full Hausdorff dimension, and full topological pressure for any H \"older continuous potential. Furthermore, we show that this set belongs to a certain class of sets with large intersection property. This is a natural generalization of FP2011 to pointwise emergence and Carath 'eodory dimension."} {"_id": [49, 20], "label": "math.OC cs.NA math.NA", "text": "An L 2 T error bound for time limited balanced truncation. Model order reduction (MOR) is often applied to spatially discretized partial differential equations to reduce their order and hence decrease computational complexity. A reduced system can be obtained, e.g., by time limited balanced truncation, a method that aims to construct an accurate reduced order model on a given finite time interval 0, T . This particular balancing related MOR technique is studied in this paper. An L 2 T error bound based on the truncated time limited singular values is proved and is the main result of this paper. The derived error bound converges (as T rightarrow infty ) to the well known mathcal H infty error bound of unrestricted balanced truncation, a scheme that is used to construct a good reduced system on the entire time line. The techniques within the proofs of this paper can also be applied to unrestricted balanced truncation so that a relatively short time domain proof of the mathcal H infty error bound is found here."} {"_id": [0], "label": "cs.CV", "text": "Tigris Architecture and Algorithms for 3D Perception in Point Clouds. Machine perception applications are increasingly moving toward manipulating and processing 3D point cloud. This paper focuses on point cloud registration, a key primitive of 3D data processing widely used in high level tasks such as odometry, simultaneous localization and mapping, and 3D reconstruction. As these applications are routinely deployed in energy constrained environments, real time and energy efficient point cloud registration is critical. We present Tigris, an algorithm architecture co designed system specialized for point cloud registration. Through an extensive exploration of the registration pipeline design space, we find that, while different design points make vastly different trade offs between accuracy and performance, KD tree search is a common performance bottleneck, and thus is an ideal candidate for architectural specialization. While KD tree search is inherently sequential, we propose an acceleration amenable data structure and search algorithm that exposes different forms of parallelism of KD tree search in the context of point cloud registration. The co designed accelerator systematically exploits the parallelism while incorporating a set of architectural techniques that further improve the accelerator efficiency. Overall, Tigris achieves 77.2 times speedup and 7.4 times power reduction in KD tree search over an RTX 2080 Ti GPU, which translates to a 41.7 registration performance improvements and 3.0 times power reduction."} {"_id": [2, 62], "label": "cs.GT cs.AI", "text": "Exploiting No Regret Algorithms in System Design. We investigate a repeated two player zero sum game setting where the column player is also a designer of the system, and has full control on the design of the payoff matrix. In addition, the row player uses a no regret algorithm to efficiently learn how to adapt their strategy to the column player's behaviour over time in order to achieve good total payoff. The goal of the column player is to guide her opponent to pick a mixed strategy which is favourable for the system designer. Therefore, she needs to (i) design an appropriate payoff matrix A whose unique minimax solution contains the desired mixed strategy of the row player and (ii) strategically interact with the row player during a sequence of plays in order to guide her opponent to converge to that desired behaviour. To design such a payoff matrix, we propose a novel solution that provably has a unique minimax solution with the desired behaviour. We also investigate a relaxation of this problem where uniqueness is not required, but all the minimax solutions have the same mixed strategy for the row player. Finally, we propose a new game playing algorithm for the system designer and prove that it can guide the row player, who may play a emph stable no regret algorithm, to converge to a minimax solution."} {"_id": [3], "label": "cs.CL", "text": "Urdu English Machine Transliteration using Neural Networks. Machine translation has gained much attention in recent years. It is a sub field of computational linguistic which focus on translating text from one language to other language. Among different translation techniques, neural network currently leading the domain with its capabilities of providing a single large neural network with attention mechanism, sequence to sequence and long short term modelling. Despite significant progress in domain of machine translation, translation of out of vocabulary words(OOV) which include technical terms, named entities, foreign words are still a challenge for current state of art translation systems, and this situation becomes even worse while translating between low resource languages or languages having different structures. Due to morphological richness of a language, a word may have different meninges in different context. In such scenarios, translation of word is not only enough in order provide the correct quality translation. Transliteration is a way to consider the context of word sentence during translation. For low resource language like Urdu, it is very difficult to have find parallel corpus for transliteration which is large enough to train the system. In this work, we presented transliteration technique based on Expectation Maximization (EM) which is un supervised and language independent. Systems learns the pattern and out of vocabulary (OOV) words from parallel corpus and there is no need to train it on transliteration corpus explicitly. This approach is tested on three models of statistical machine translation (SMT) which include phrasebased, hierarchical phrase based and factor based models and two models of neural machine translation which include LSTM and transformer model."} {"_id": [3], "label": "cs.CL", "text": "MoverScore Text Generation Evaluating with Contextualized Embeddings and Earth Mover Distance. A robust evaluation metric has a profound impact on the development of text generation systems. A desirable metric compares system output against references based on their semantics rather than surface forms. In this paper we investigate strategies to encode system and reference texts to devise a metric that shows a high correlation with human judgment of text quality. We validate our new metric, namely MoverScore, on a number of text generation tasks including summarization, machine translation, image captioning, and data to text generation, where the outputs are produced by a variety of neural and non neural systems. Our findings suggest that metrics combining contextualized representations with a distance measure perform the best. Such metrics also demonstrate strong generalization capability across tasks. For ease of use we make our metrics available as web service."} {"_id": [4], "label": "cs.NE", "text": "Haploid Diploid Evolution Nature's Memetic Algorithm. This paper uses a recent explanation for the fundamental haploid diploid lifecycle of eukaryotic organisms to present a new memetic algorithm that differs from all previous known work using diploid representations. A form of the Baldwin effect has been identified as inherent to the evolutionary mechanisms of eukaryotes and a simplified version is presented here which maintains such behaviour. Using a well known abstract tuneable model, it is shown that varying fitness landscape ruggedness varies the benefit of haploid diploid algorithms. Moreover, the methodology is applied to optimise the targeted delivery of a therapeutic compound utilizing nano particles to cancerous tumour cells with the multicellular simulator PhysiCell."} {"_id": [1], "label": "cs.LG", "text": "Learning Graph Neural Networks with Approximate Gradient Descent. The first provably efficient algorithm for learning graph neural networks (GNNs) with one hidden layer for node information convolution is provided in this paper. Two types of GNNs are investigated, depending on whether labels are attached to nodes or graphs. A comprehensive framework for designing and analyzing convergence of GNN training algorithms is developed. The algorithm proposed is applicable to a wide range of activation functions including ReLU, Leaky ReLU, Sigmod, Softplus and Swish. It is shown that the proposed algorithm guarantees a linear convergence rate to the underlying true parameters of GNNs. For both types of GNNs, sample complexity in terms of the number of nodes or the number of graphs is characterized. The impact of feature dimension and GNN structure on the convergence rate is also theoretically characterized. Numerical experiments are further provided to validate our theoretical analysis."} {"_id": [34, 12], "label": "math.CA math.CV", "text": "The orthogonal complement of the Hilbert space associated to holomorphic Hermite polynomials. We study the orthogonal complement of the Hilbert subspace considered by by van Eijndhoven and Meyers in J. Math. Anal. Appl. 146 (1990), no. 1, 89 98 and associated to holomorphic Hermite polynomials. A polyanalytic orthonormal basis is given and the explicit expressions of the corresponding reproducing kernel functions and Segal Bargmann integral transforms are provided."} {"_id": [49], "label": "math.OC", "text": "A Note on Optimization Formulations of Markov Decision Processes. This note summarizes the optimization formulations used in the study of Markov decision processes. We consider both the discounted and undiscounted processes under the standard and the entropy regularized settings. For each setting, we first summarize the primal, dual, and primal dual problems of the linear programming formulation. We then detail the connections between these problems and other formulations for Markov decision processes such as the Bellman equation and the policy gradient method."} {"_id": [9, 20], "label": "math.AP cs.NA math.NA", "text": "Numerical study of Zakharov Kuznetsov equations in two dimensions. We present a detailed numerical study of solutions to the (generalized) Zakharov Kuznetsov equation in two spatial dimensions with various power nonlinearities. In the L 2 subcritical case, numerical evidence is presented for the stability of solitons and the soliton resolution for generic initial data. In the L 2 critical and supercritical cases, solitons appear to be unstable against both dispersion and blow up. It is conjectured that blow up happens in finite time and that blow up solutions have some resemblance of being self similar, i.e., the blow up core forms a rightward moving self similar type rescaled profile with the blow up happening at infinity in the critical case and at a finite location in the supercritical case. In the L 2 critical case, the blow up appears to be similar to the one in the L 2 critical generalized Korteweg de Vries equation with the profile being a dynamically rescaled soliton."} {"_id": [6], "label": "physics.flu-dyn", "text": "On Richtmyer Meshkov unstable dynamics of three dimensional interfacial coherent structures with time dependent acceleration. Richtmyer Meshkov instability (RMI) plays an important role in many areas of science and engineering, from supernovae and fusion to scramjets and nano fabrication. Classical Richtmyer Meshkov instability is induced by a steady shock and impulsive acceleration, whereas in realistic environments the acceleration is usually variable. We focus on RMI induced by acceleration with power law time dependence and apply group theory to solve the long standing problem. For early time dynamics, we find the dependence of the growth rate on the initial conditions and show that it is independent of the acceleration parameters. For late time dynamics, we find a continuous family of regular asymptotic solutions, including their curvature, velocity, Fourier amplitudes, and interfacial shear, and we study their stability. For each solution, the interface dynamics is directly linked to the interfacial shear, the non equilibrium velocity field has intense fluid motion near the interface and effectively no motion in the bulk. The quasi invariance of the fastest stable solution suggests that nonlinear coherent dynamics in RMI is characterized by two macroscopic length scales the wavelength and the amplitude, in agreement with observations. The properties of a number of special solutions are outlined, these being respectively, the Atwood, Taylor, convergence, minimum shear, and critical bubbles, among others. We also elaborate new theory benchmarks for future experiments and simulations."} {"_id": [0, 83], "label": "cs.CV cs.MM", "text": "The Blessing and the Curse of the Noise behind Facial Landmark Annotations. The evolving algorithms for 2D facial landmark detection empower people to recognize faces, analyze facial expressions, etc. However, existing methods still encounter problems of unstable facial landmarks when applied to videos. Because previous research shows that the instability of facial landmarks is caused by the inconsistency of labeling quality among the public datasets, we want to have a better understanding of the influence of annotation noise in them. In this paper, we make the following contributions 1) we propose two metrics that quantitatively measure the stability of detected facial landmarks, 2) we model the annotation noise in an existing public dataset, 3) we investigate the influence of different types of noise in training face alignment neural networks, and propose corresponding solutions. Our results demonstrate improvements in both accuracy and stability of detected facial landmarks."} {"_id": [26, 21], "label": "math.RT math.CO", "text": "Blocks of Ariki Koike algebras as a superlevel set for the weight function. We study a natural generalisation of Fayers's definition of the weight of a multipartition. In level one we prove that the set of all blocks, where the size of the partition varies, can be seen as a 0 superlevel set for the generalised weight function. In higher levels, we use the notion of core block, as introduced by Fayers, to prove that the set of blocks contains a superlevel set (with infinite cardinality) for the generalised weight function. We apply the result in level one to study a shift operation on partitions."} {"_id": [21], "label": "math.CO", "text": "On cyclic Schur positive sets of permutation. We introduce a notion of em cyclic Schur positivity for sets of permutations, which naturally extends the classical notion of Schur positivity, and it involves the existence of a bijection from permutations to standard Young tableaux that preserves the cyclic descent set. Cyclic Schur positive sets of permutations are always Schur positive, but the converse does not hold, as exemplified by inverse descent classes, Knuth classes and conjugacy classes. In this paper we show that certain classes of permutations invariant under either horizontal or vertical rotation are cyclic Schur positive. The proof unveils a new equidistribution phenomenon of descent sets on permutations, provides affirmative solutions to conjectures from 9 and 2 , and yields new examples of Schur positive sets."} {"_id": [0], "label": "cs.CV", "text": "Apache Spark Accelerated Deep Learning Inference for Large Scale Satellite Image Analytics. The shear volumes of data generated from earth observation and remote sensing technologies continue to make major impact leaping key geospatial applications into the dual data and compute intensive era. As a consequence, this rapid advancement poses new computational and data processing challenges. We implement a novel remote sensing data flow (RESFlow) for advanced machine learning and computing with massive amounts of remotely sensed imagery. The core contribution is partitioning massive amount of data based on the spectral and semantic characteristics for distributed imagery analysis. RESFlow takes advantage of both a unified analytics engine for large scale data processing and the availability of modern computing hardware to harness the acceleration of deep learning inference on expansive remote sensing imagery. The framework incorporates a strategy to optimize resource utilization across multiple executors assigned to a single worker. We showcase its deployment across computationally and data intensive on pixel level labeling workloads. The pipeline invokes deep learning inference at three stages during deep feature extraction, deep metric mapping, and deep semantic segmentation. The tasks impose compute intensive and GPU resource sharing challenges motivating for a parallelized pipeline for all execution steps. By taking advantage of Apache Spark, Nvidia DGX1, and DGX2 computing platforms, we demonstrate unprecedented compute speed ups for deep learning inference on pixel labeling workloads processing 21,028 Terrabytes of imagery data and delivering an output maps at area rate of 5.245sq.km sec, amounting to 453,168 sq.km day reducing a 28 day workload to 21 hours."} {"_id": [49], "label": "math.OC", "text": "Stochastic Gradient Descent with Polyak's Learning Rate. Stochastic gradient descent (SGD) for strongly convex functions converges at the rate bO(1 k) . However, achieving good results in practice requires tuning the parameters (for example the learning rate) of the algorithm. In this paper we propose a generalization of the Polyak step size, used for subgradient methods, to Stochastic gradient descent. We prove a non asymptotic convergence at the rate bO(1 k) with a rate constant which can be better than the corresponding rate constant for optimally scheduled SGD. We demonstrate that the method is effective in practice, and on convex optimization problems and on training deep neural networks, and compare to the theoretical rate."} {"_id": [0, 1], "label": "cs.CV cs.LG", "text": "A CNN Framenwork Based on Line Annotations for Detecting Nematodes in Microscopic Images. Plant parasitic nematodes cause damage to crop plants on a global scale. Robust detection on image data is a prerequisite for monitoring such nematodes, as well as for many biological studies involving the nematode C. elegans, a common model organism. Here, we propose a framework for detecting worm shaped objects in microscopic images that is based on convolutional neural networks (CNNs). We annotate nematodes with curved lines along the body, which is more suitable for worm shaped objects than bounding boxes. The trained model predicts worm skeletons and body endpoints. The endpoints serve to untangle the skeletons from which segmentation masks are reconstructed by estimating the body width at each location along the skeleton. With light weight backbone networks, we achieve 75.85 precision, 73.02 recall on a potato cyst nematode data set and 84.20 precision, 85.63 recall on a public C. elegans data set."} {"_id": [5], "label": "physics.plasm-ph", "text": "Pulsed RF Schemes for Tearing Mode Stabilization. The RF stabilization of tearing modes with current condensation has the potential to increase stabilization efficiency and loosen power localization requirements. Such benefits stem from the cooperative feedback between the RF deposition and resulting island temperature perturbation governed by diffusion. A self consistent treatment of the damping of an rf ray as it traverses the island shows that low damping scenarios can require unfavorably high powers to overcome initial power leakage and effectively capitalize on the nonlinear effect. In this work it is demonstrated that for such regimes,modulated stabilization schemes can achieve significant improvements in heating and current drive contributions to stabilization for the same average power as a continuous wave scheme. The impact of modulation frequency and duty cycle on the performance is explored, the results of which suggest modulation strategies in which the pulsing periods are kept on the order of a diffusive time."} {"_id": [17, 41], "label": "cs.DC cs.RO", "text": "Infinite Grid Exploration by Disoriented Robots. We deal with a set of autonomous robots moving on an infinite grid. Those robots are opaque, have limited visibility capabilities, and run using synchronous Look Compute Move cycles. They all agree on a common chirality, but have no global compass. Finally, they may use lights of different colors, but except from that, robots have neither persistent memories, nor communication mean. We consider the infinite grid exploration (IGE) problem. For this problem we give two impossibility results and three algorithms, including one which is optimal in terms of number of robots. In more detail, we first show that two robots are not sufficient in our settings to solve the problem, even when robots have a common coordinate system. We then show that if the robots' coordinate systems are not self consistent, three or four robots are not sufficient to solve the problem. Finally, we present three algorithms that solve the IGE problem in various settings. The first algorithm uses six robots with constant colors and a visibility range of one. The second one uses the minimum number of robots, i.e., five, as well as five modifiable colors, still under visibility one. The last algorithm requires seven oblivious anonymous robots, yet assuming visibility two. Notice that the two last algorithms also satisfy achieve exclusiveness."} {"_id": [0], "label": "cs.CV", "text": "Incomplete Descriptor Mining with Elastic Loss for Person Re Identification. In this paper, we propose a novel person Re ID model, Consecutive Batch DropBlock Network (CBDB Net), to capture the attentive and robust person descriptor for the person Re ID task. The CBDB Net contains two novel designs the Consecutive Batch DropBlock Module (CBDBM) and the Elastic Loss (EL). In the Consecutive Batch DropBlock Module (CBDBM), we firstly conduct uniform partition on the feature maps. And then, we independently and continuously drop each patch from top to bottom on the feature maps, which can output multiple incomplete feature maps. In the training stage, these multiple incomplete features can better encourage the Re ID model to capture the robust person descriptor for the Re ID task. In the Elastic Loss (EL), we design a novel weight control item to help the Re ID model adaptively balance hard sample pairs and easy sample pairs in the whole training process. Through an extensive set of ablation studies, we verify that the Consecutive Batch DropBlock Module (CBDBM) and the Elastic Loss (EL) each contribute to the performance boosts of CBDB Net. We demonstrate that our CBDB Net can achieve the competitive performance on the three standard person Re ID datasets (the Market 1501, the DukeMTMC Re ID, and the CUHK03 dataset), three occluded Person Re ID datasets (the Occluded DukeMTMC, the Partial REID, and the Partial iLIDS dataset), and a general image retrieval dataset (In Shop Clothes Retrieval dataset)."} {"_id": [0], "label": "cs.CV", "text": "Attentive CT Lesion Detection Using Deep Pyramid Inference with Multi Scale Booster. Accurate lesion detection in computer tomography (CT) slices benefits pathologic organ analysis in the medical diagnosis process. More recently, it has been tackled as an object detection problem using the Convolutional Neural Networks (CNNs). Despite the achievements from off the shelf CNN models, the current detection accuracy is limited by the inability of CNNs on lesions at vastly different scales. In this paper, we propose a Multi Scale Booster (MSB) with channel and spatial attention integrated into the backbone Feature Pyramid Network (FPN). In each pyramid level, the proposed MSB captures fine grained scale variations by using Hierarchically Dilated Convolutions (HDC). Meanwhile, the proposed channel and spatial attention modules increase the network's capability of selecting relevant features response for lesion detection. Extensive experiments on the DeepLesion benchmark dataset demonstrate that the proposed method performs superiorly against state of the art approaches."} {"_id": [49, 53], "label": "math.OC q-fin.RM", "text": "On the equivalence between Value at Risk and Expected Shortfall in non concave optimization. This paper studies an optimal asset allocation problem for a surplus driven financial institution facing a Value at Risk (VaR) or an Expected Shortfall (ES) constraint corresponding to a non concave optimization problem under constraints. We obtain the closed form optimal wealth with the ES constraint as well as with the VaR constraint respectively, and explicitly calculate the optimal trading strategy for constant relative risk aversion (CRRA) utility functions. We find that both VaR and ES based regulation can effectively reduce the probability of default for a surplus driven financial institution. However, the liability holders' benefits cannot be fully protected under either VaR or ES based regulation. In addition, we show that the VaR and ES based regulation can induce the same optimal portfolio choice for a surplus driven financial institution. This differs from the conclusion drawn in Basak and Shapiro 2001 where the financial institution aims at maximizing the expected utility of the total assets, and ES provides better loss protection."} {"_id": [14], "label": "cs.HC", "text": "Towards Better Driver Safety Empowering Personal Navigation Technologies with Road Safety Awareness. Recent research has found that navigation systems usually assume that all roads are equally safe, directing drivers to dangerous routes, which led to catastrophic consequences. To address this problem, this paper aims to begin the process of adding road safety awareness to navigation systems. To do so, we first created a definition for road safety that navigation systems can easily understand by adapting well established safety standards from transportation studies. Based on this road safety definition, we then developed a machine learning based road safety classifier that predicts the safety level for road segments using a diverse feature set constructed only from large scale publicly available geographic data. Evaluations in four different countries show that our road safety classifier achieves satisfactory performance. Finally, we discuss the factors to consider when extending our road safety classifier to other regions and potential new safety designs enabled by our road safety predictions."} {"_id": [0, 41, 1], "label": "cs.RO cs.CV cs.LG", "text": "PyRep Bringing V REP to Deep Robot Learning. PyRep is a toolkit for robot learning research, built on top of the virtual robotics experimentation platform (V REP). Through a series of modifications and additions, we have created a tailored version of V REP built with robot learning in mind. The new PyRep toolkit offers three improvements (1) a simple and flexible API for robot control and scene manipulation, (2) a new rendering engine, and (3) speed boosts upwards of 10,000x in comparison to the previous Python Remote API. With these improvements, we believe PyRep is the ideal toolkit to facilitate rapid prototyping of learning algorithms in the areas of reinforcement learning, imitation learning, state estimation, mapping, and computer vision."} {"_id": [6], "label": "physics.flu-dyn", "text": "Validation strategy of reduced order two fluid flow models based on a hierarchy of direct numerical simulations. Whereas direct numerical simulation (DNS) have reached a high level of description in the field of atomization processes, they are not yet able to cope with industrial needs since they lack resolution and are too costly. Predictive simulations relying on reduced order modeling have become mandatory for applications ranging from cryotechnic to aeronautic combustion chamber liquid injection. Two fluid models provide a good basis in order to conduct such simulations, even if recent advances allow to refine subscale modeling using geometrical variables in order to reach a unified model including separate phases and disperse phase descriptions based on high order moment methods. The simulation of such models has to rely on dedicated numerical methods and still lacks assessment of its predictive capabilities. The present paper constitutes a building block of the investigation of a hierarchy of test cases designed to be amenable to DNS while close enough to industrial configurations, for which we propose a comparison of two fluid compressible simulations with DNS data bases. We focus in the present contribution on an air assisted water atomization using a planar liquid sheet injector. Qualitative and quantitative comparisons with incompressible DNS allow us to identify and analyze strength and weaknesses of the reduced order modeling and numerical approach in this specific configuration and set a framework for more refined models since they already provide a very interesting level of comparison on averaged quantities."} {"_id": [27, 46], "label": "math.AG math.CT", "text": "Automorphisms of categories of schemes. Given two schemes S and S' , we prove that every equivalence between mathbf Sch S and mathbf Sch S' comes from a unique isomorphism between S and S' . This eliminates all Noetherian and finite type hypotheses from a result of Mochizuki and fully answers a programme set out by Brandenburg in a series of questions on MathOverflow in 2011."} {"_id": [22], "label": "cs.SE", "text": "Isolating Real Time Safety Critical Embedded Systems via SGX based Lightweight Virtualization. A promising approach for designing critical embedded systems is based on virtualization technologies and multi core platforms. These enable the deployment of both real time and general purpose systems with different criticalities in a single host. Integrating virtualization while also meeting the real time and isolation requirements is non trivial, and poses significant challenges especially in terms of certification. In recent years, researchers proposed hardware assisted solutions to face issues coming from virtualization, and recently the use of Operating System (OS) virtualization as a more lightweight approach. Industries are hampered in leveraging this latter type of virtualization despite the clear benefits it introduces, such as reduced overhead, higher scalability, and effortless certification since there is still lack of approaches to address drawbacks. In this position paper, we propose the usage of Intel's CPU security extension, namely SGX, to enable the adoption of enclaves based on unikernel, a flavor of OS level virtualization, in the context of real time systems. We present the advantages of leveraging both the SGX isolation and the unikernel features in order to meet the requirements of safety critical real time systems and ease the certification process."} {"_id": [9], "label": "math.AP", "text": "On Blow up solutions to the nonlinear Schr \"odinger equation in the exterior of a convex obstacle. In this paper, we consider the Schr \"odinger equation with a mass supercritical focusing nonlinearity, in the exterior of a smooth, compact, convex obstacle of R d with Dirichlet boundary conditions. We prove that solutions with negative energy blow up in finite time. Assuming furthermore that the nonlinearity is energy subcritical, we also prove (under additional symmetry conditions) blow up with the same optimal ground state criterion than in the work of Holmer and Roudenko on R d . The classical proof of Glassey, based on the concavity of the variance, fails in the exterior of an obstacle because of the appearance of boundary terms with an unfavorable sign in the second derivative of the variance. The main idea of our proof is to introduce a new modified variance which is bounded from below and strictly concave for the solutions that we consider."} {"_id": [11], "label": "physics.app-ph", "text": "Distributed Kerr Nonlinearity in a Coherent All Optical Fiber Ring Reservoir Computer. We investigate, both numerically and experimentally, the usefulness of a distributed nonlinearity in a passive coherent photonic reservoir computer. This computing system is based on a passive coherent optical fiber ring cavity in which part of the nonlinearities are realized by the Kerr nonlinearity. Linear coherent reservoirs can solve difficult tasks but are aided by nonlinear components in their input or output layer. Here, we compare the impact of nonlinear transformations of information in the reservoir input layer, its bulk the fiber ring cavity and its readout layer. For the injection of data into the reservoir, we compare a linear input mapping to the nonlinear transfer function of a Mach Zehnder modulator. For the reservoir bulk, we quantify the impact of the optical Kerr effect. For the readout layer we compare a linear output to a quadratic output implemented by a photodiode. We find that optical nonlinearities in the reservoir itself, such as the optical Kerr nonlinearity studied in the present work, enhance the task solving capability of the reservoir. This suggests that such nonlinearities will play a key role in future coherent all optical reservoir computers."} {"_id": [49], "label": "math.OC", "text": "Optimal Generation and Transmission Expansion Planning Addressing Short Term Constraints with Co optimization of Energy and Reserves. The penetration of variable renewable energy (VRE) in electrical systems has changed the way the expansion planning is treated. This kind of resource has great variability in small amounts of time, which makes it important to represent hourly constraints that require chronology. Besides that, the generation reserves should also be adjusted in order to capture the intermittent effect, and since many countries use rapid thermal plants as part of these reserves, unit commitment and ramp constraint have also become more significant. In this paper, we propose a MILP expansion planning model that can represent hourly time steps while maintaining reasonable computational times, where both investment and operation problems are simultaneously solved. Because the planning horizons are long (decades), the resolution of the entire horizon in a single optimization problem would be computationally infeasible for large real systems, making it necessary, therefore, to apply a horizon decomposition heuristic in smaller sub horizons, and use the representation of typical days and seasons to reduces the size of the problem."} {"_id": [40, 1, 59], "label": "cs.IR cs.LG cs.SI", "text": "Deep Collaborative Filtering with Multi Aspect Information in Heterogeneous Networks. Recently, recommender systems play a pivotal role in alleviating the problem of information overload. Latent factor models have been widely used for recommendation. Most existing latent factor models mainly utilize the interaction information between users and items, although some recently extended models utilize some auxiliary information to learn a unified latent factor for users and items. The unified latent factor only represents the characteristics of users and the properties of items from the aspect of purchase history. However, the characteristics of users and the properties of items may stem from different aspects, e.g., the brand aspect and category aspect of items. Moreover, the latent factor models usually use the shallow projection, which cannot capture the characteristics of users and items well. In this paper, we propose a Neural network based Aspect level Collaborative Filtering model (NeuACF) to exploit different aspect latent factors. Through modelling the rich object properties and relations in recommender system as a heterogeneous information network, NeuACF first extracts different aspect level similarity matrices of users and items respectively through different meta paths, and then feeds an elaborately designed deep neural network with these matrices to learn aspect level latent factors. Finally, the aspect level latent factors are fused for the top N recommendation. Moreover, to fuse information from different aspects more effectively, we further propose NeuACF to fuse aspect level latent factors with self attention mechanism. Extensive experiments on three real world datasets show that NeuACF and NeuACF significantly outperform both existing latent factor models and recent neural network models."} {"_id": [46], "label": "math.AG", "text": "Lagrangian tens of planes, Enriques surfaces and holomorphic symplectic fourfolds. The Fano models of Enriques surfaces produce a family of tens of mutually intersecting planes in mathbf P 5 with a 10 dimensional moduli space. The latter is linked to several 10 dimensional moduli spaces parametrizing other types of objects a) cubic fourfolds containing the tens of planes, b) Beauville Donagi holomorphically symplectic fourfolds, and c) double EPW sextics. The varieties in b) parametrize lines on cubic fourfolds from a). The double EPW sextics are associated, via O'Grady's construction, to Lagrangian subspaces of the Pl \"ucker space of the Grassmannian Gr(2, mathbf P 5) spanned by 10 mutually intersecting planes in mathbf P 5 . These links imply the irreducibility of the moduli space of supermarked Enriques surfaces, where a supermarking is a choice of a minimal generating system of the Picard group of the surface. Also some results are obtained on the variety of tens of mutually intersecting planes, not necessarily associated to Fano models of Enriques surfaces."} {"_id": [17], "label": "cs.DC", "text": "StreamFlow cross breeding cloud with HPC. Workflows are among the most commonly used tools in a variety of execution environments. Many of them target a specific environment few of them make it possible to execute an entire workflow in different environments, e.g. Kubernetes and batch clusters. We present a novel approach to workflow execution, called StreamFlow, that complements the workflow graph with the declarative description of potentially complex execution environments, and that makes it possible the execution onto multiple sites not sharing a common data space. StreamFlow is then exemplified on a novel bioinformatics pipeline for single cell transcriptomic data analysis workflow."} {"_id": [21], "label": "math.CO", "text": "On the joint distribution of cyclic valleys and excedances over conjugacy classes of mathfrak S n . We derive a formula expressing the joint distribution of the cyclic valley number and excedance number statistics over a fixed conjugacy class of the symmetric group in terms of Eulerian polynomials. Our proof uses a slight extension of Sun and Wang's cyclic valley hopping action as well as a formula of Brenti. Along the way, we give a new proof for the gamma positivity of the excedance number distribution over any fixed conjugacy class along with a combinatorial interpretation of the gamma coefficients."} {"_id": [3], "label": "cs.CL", "text": "A Neural Topic Attention Model for Medical Term Abbreviation Disambiguation. Automated analysis of clinical notes is attracting increasing attention. However, there has not been much work on medical term abbreviation disambiguation. Such abbreviations are abundant, and highly ambiguous, in clinical documents. One of the main obstacles is the lack of large scale, balance labeled data sets. To address the issue, we propose a few shot learning approach to take advantage of limited labeled data. Specifically, a neural topic attention model is applied to learn improved contextualized sentence representations for medical term abbreviation disambiguation. Another vital issue is that the existing scarce annotations are noisy and missing. We re examine and correct an existing dataset for training and collect a test set to evaluate the models fairly especially for rare senses. We train our model on the training set which contains 30 abbreviation terms as categories (on average, 479 samples and 3.24 classes in each term) selected from a public abbreviation disambiguation dataset, and then test on a manually created balanced dataset (each class in each term has 15 samples). We show that enhancing the sentence representation with topic information improves the performance on small scale unbalanced training datasets by a large margin, compared to a number of baseline models."} {"_id": [0], "label": "cs.CV", "text": "Reusing Discriminators for Encoding Towards Unsupervised Image to Image Translation. Unsupervised image to image translation is a central task in computer vision. Current translation frameworks will abandon the discriminator once the training process is completed. This paper contends a novel role of the discriminator by reusing it for encoding the images of the target domain. The proposed architecture, termed as NICE GAN, exhibits two advantageous patterns over previous approaches First, it is more compact since no independent encoding component is required Second, this plug in encoder is directly trained by the adversary loss, making it more informative and trained more effectively if a multi scale discriminator is applied. The main issue in NICE GAN is the coupling of translation with discrimination along the encoder, which could incur training inconsistency when we play the min max game via GAN. To tackle this issue, we develop a decoupled training strategy by which the encoder is only trained when maximizing the adversary loss while keeping frozen otherwise. Extensive experiments on four popular benchmarks demonstrate the superior performance of NICE GAN over state of the art methods in terms of FID, KID, and also human preference. Comprehensive ablation studies are also carried out to isolate the validity of each proposed component. Our codes are available at https github.com alpc91 NICE GAN pytorch."} {"_id": [22], "label": "cs.SE", "text": "Enhancing Python Compiler Error Messages via Stack Overflow. Background Compilers tend to produce cryptic and uninformative error messages, leaving programmers confused and requiring them to spend precious time to resolve the underlying error. To find help, programmers often take to online question and answer forums such as Stack Overflow to start discussion threads about the errors they encountered. Aims We conjecture that information from Stack Overflow threads which discuss compiler errors can be automatically collected and repackaged to provide programmers with enhanced compiler error messages, thus saving programmers' time and energy. Method We present Pycee, a plugin integrated with the popular Sublime Text IDE to provide enhanced compiler error messages for the Python programming language. Pycee automatically queries Stack Overflow to provide customised and summarised information within the IDE. We evaluated two Pycee variants through a think aloud user study during which 16 programmers completed Python programming tasks while using Pycee. Results The majority of participants agreed that Pycee was helpful while completing the study tasks. When compared to a baseline relying on the official Python documentation to enhance compiler error messages, participants generally preferred Pycee in terms of helpfulness, citing concrete suggestions for fixes and example code as major benefits. Conclusions Our results confirm that data from online sources such as Stack Overflow can be successfully used to automatically enhance compiler error messages. Our work opens up venues for future work to further enhance compiler error messages as well as to automatically reuse content from Stack Overflow for other aspects of programming."} {"_id": [21, 15], "label": "cs.IT math.CO math.IT", "text": "Equivalence Relations for Computing Permutation Polynomials. We present a new technique for computing permutation polynomials based on equivalence relations. The equivalence relations are defined by expanded normalization operations and new functions that map permutation polynomials (PPs) to other PPs. Our expanded normalization applies to almost all PPs, including when the characteristic of the finite field divides the degree of the polynomial. The equivalence relations make it possible to reduce the size of the space, when doing an exhaustive search. As a result, we have been able to compute almost all permutation polynomials of degree d at most 10 over GF(q) , where q is at most 97. We have also been able to compute nPPs of degrees 11 and 12 in a few cases. The techniques apply to arbitrary q and d . In addition, the equivalence relations allow the set all PPs for a given degree and a given field GF(q) to be succinctly described by their representative nPPs. We give several tables at the end of the paper listing the representative nPPs ( ie the equivalence classes) for several values of q and d . We also give several new lower bounds for M(n,D) , the maximum number of permutations on n symbols with pairwise Hamming distance D , mostly derived from our results on PPs."} {"_id": [42, 46], "label": "math.AG math.DG", "text": "Openness of K semistability for Fano varieties. In this paper, we prove the openness of K semistability in families of log Fano pairs by showing that the stability threshold is a constructible function on the fibers. We also prove that any special test configuration arises from a log canonical place of a bounded complement and establish properties of any minimizer of the stability threshold."} {"_id": [40, 3], "label": "cs.CL cs.IR", "text": "LiSSS A toy corpus of Spanish Literary Sentences for Emotions detection. In this work we present a new small data set in Computational Creativity (CC) field, the Spanish Literary Sentences for emotions detection corpus (LISSS). We address this corpus of literary sentences in order to evaluate or design algorithms of emotions classification and detection. We have constitute this corpus by manually classifying the sentences in a set of emotions Love, Fear, Happiness, Anger and Sadness Pain. We also present some baseline classification algorithms applied on our corpus. The LISSS corpus will be available to the community as a free resource to evaluate or create CC like algorithms."} {"_id": [0, 1, 2], "label": "cs.CV cs.AI cs.LG", "text": "ASMFS Adaptive Similarity based Multi modality Feature Selection for Classification of Alzheimer's Disease. With the increasing amounts of high dimensional heterogeneous data to be processed, multi modality feature selection has become an important research direction in medical image analysis. Traditional methods usually depict the data structure using fixed and predefined similarity matrix for each modality separately, without considering the potential relationship structure across different modalities. In this paper, we propose a novel multi modality feature selection method, which performs feature selection and local similarity learning simultaniously. Specially, a similarity matrix is learned by jointly considering different imaging modalities. And at the same time, feature selection is conducted by imposing sparse l 2, 1 norm constraint. The effectiveness of our proposed joint learning method can be well demonstrated by the experimental results on Alzheimer's Disease Neuroimaging Initiative (ADNI) dataset, which outperforms existing the state of the art multi modality approaches."} {"_id": [49, 1], "label": "math.OC cs.LG", "text": "Online Convex Optimization Perspective for Learning from Dynamically Revealed Preferences. We study the problem of online learning (OL) from revealed preferences a learner wishes to learn a non strategic agent's private utility function through observing the agent's utility maximizing actions in a changing environment. We adopt an online inverse optimization setup, where the learner observes a stream of agent's actions in an online fashion and the learning performance is measured by regret associated with a loss function. We first characterize a special but broad class of agent's utility functions, then utilize this structure in designing a new convex loss function. We establish that the regret with respect to our new loss function also bounds the regret with respect to all other usual loss functions in the literature. This allows us to design a flexible OL framework that enables a unified treatment of loss functions and supports a variety of online convex optimization algorithms. We demonstrate with theoretical and empirical evidence that our framework based on the new loss function (in particular online Mirror Descent) has significant advantages in terms of regret performance and solution time over other OL algorithms from the literature and bypasses the previous technical assumptions as well."} {"_id": [2, 3], "label": "cs.AI cs.CL", "text": "Graph Pattern Entity Ranking Model for Knowledge Graph Completion. Knowledge graphs have evolved rapidly in recent years and their usefulness has been demonstrated in many artificial intelligence tasks. However, knowledge graphs often have lots of missing facts. To solve this problem, many knowledge graph embedding models have been developed to populate knowledge graphs and these have shown outstanding performance. However, knowledge graph embedding models are so called black boxes, and the user does not know how the information in a knowledge graph is processed and the models can be difficult to interpret. In this paper, we utilize graph patterns in a knowledge graph to overcome such problems. Our proposed model, the it graph pattern entity ranking model (GRank), constructs an entity ranking system for each graph pattern and evaluates them using a ranking measure. By doing so, we can find graph patterns which are useful for predicting facts. Then, we perform link prediction tasks on standard datasets to evaluate our GRank method. We show that our approach outperforms other state of the art approaches such as ComplEx and TorusE for standard metrics such as HITS it n and MRR. Moreover, our model is easily interpretable because the output facts are described by graph patterns."} {"_id": [7], "label": "physics.comp-ph", "text": "Scale Space Splatting Reforming Spacetime for the Cross Scale Exploration of Integral Measures in Molecular Dynamics. Understanding large amounts of spatiotemporal data from particle based simulations, such as molecular dynamics, often relies on the computation and analysis of aggregate measures. These, however, by virtue of aggregation, hide structural information about the space time localization of the studied phenomena. This leads to degenerate cases where the measures fail to capture distinct behaviour. In order to drill into these aggregate values, we propose a multi scale visual exploration technique. Our novel representation, based on partial domain aggregation, enables the construction of a continuous scale space for discrete datasets and the simultaneous exploration of scales in both space and time. We link these two scale spaces in a scale space space time cube and model linked views as orthogonal slices through this cube, thus enabling the rapid identification of spatio temporal patterns at multiple scales. To demonstrate the effectiveness of our approach, we showcase an advanced exploration of a protein ligand simulation."} {"_id": [9], "label": "math.AP", "text": "On uniqueness of dissipative solutions to the isentropic Euler system. The dissipative solutions can be seen as a convenient generalization of the concept of weak solution to the isentropic Euler system. They can be seen as expectations of the Young measures associated to a suitable measure valued solution of the problem. We show that dissipative solutions coincide with weak solutions starting from the same initial data on condition that bf (i) the weak solution enjoys certain Besov regularity bf (ii) the symmetric velocity gradient of the weak solution satisfies a one sided Lipschitz bound."} {"_id": [15], "label": "cs.IT math.IT", "text": "Improved Coding over Sets for DNA Based Data Storage. Error correcting codes over sets, with applications to DNA storage, are studied. The DNA storage channel receives a set of sequences, and produces a corrupted version of the set, including sequence loss, symbol substitution, symbol insertion deletion, and limited magnitude errors in symbols. Various parameter regimes are studied. New bounds on code parameters are provided, which improve upon known bounds. New codes are constructed, at times matching the bounds up to lower or der terms or small constant factors."} {"_id": [11], "label": "physics.app-ph", "text": "BAlN alloy for enhanced two dimensional electron gas characteristics of GaN based high electron mobility transistor. The emerging wide bandgap BAlN alloys have potentials for improved III nitride power devices including high electron mobility transistor (HEMT). Yet few relevant studies have been carried. In this work, we have investigated the use of the B0.14Al0.86N alloy as part or entirety of the interlayer between the GaN buffer and the AlGaN barrier in the conventional GaN based high electron mobility transistor (HEMT). The numerical results show considerable improvement of the two dimensional electron gas (2DEG) concentration with small 2DEG leakage into the ternary layer by replacing the conventional AlN interlayer by either the B0.14Al0.86N interlayer or the B0.14Al0.86N AlN hybrid interlayer. Consequently, the transfer characteristics can be improved. The saturation current can be enhanced as well. For instance, the saturation currents for HEMTs with the 0.5 nm B0.14Al0.86N 0.5 nm AlN hybrid interlayer and the 1 nm B0.14Al0.86N interlayer are 5.8 and 2.2 higher than that for the AlN interlayer when VGS Vth 3 V."} {"_id": [32], "label": "cs.DS", "text": "Scheduling with a processing time oracle. In this paper we study a single machine scheduling problem with the objective of minimizing the sum of completion times. Each of the given jobs is either short or long. However the processing times are initially hidden to the algorithm, but can be tested. This is done by executing a processing time oracle, which reveals the processing time of a given job. Each test occupies a time unit in the schedule, therefore the algorithm must decide for which jobs it will call the processing time oracle. The objective value of the resulting schedule is compared with the objective value of an optimal schedule, which is computed using full information. The resulting competitive ratio measures the price of hidden processing times, and the goal is to design an algorithm with minimal competitive ratio. Two models are studied in this paper. In the non adaptive model, the algorithm needs to decide beforehand which jobs to test, and which jobs to execute untested. However in the adaptive model, the algorithm can make these decisions adaptively depending on the outcomes of the job tests. In both models we provide optimal polynomial time algorithms following a two phase strategy, which consist of a first phase where jobs are tested, and a second phase where jobs are executed obliviously. Experiments give strong evidence that optimal algorithms have this structure. Proving this property is left as an open problem."} {"_id": [0], "label": "cs.CV", "text": "TextSR Content Aware Text Super Resolution Guided by Recognition. Scene text recognition has witnessed rapid development with the advance of convolutional neural networks. Nonetheless, most of the previous methods may not work well in recognizing text with low resolution which is often seen in natural scene images. An intuitive solution is to introduce super resolution techniques as pre processing. However, conventional super resolution methods in the literature mainly focus on reconstructing the detailed texture of natural images, which typically do not work well for text due to the unique characteristics of text. To tackle these problems, in this work, we propose a content aware text super resolution network to generate the information desired for text recognition. In particular, we design an end to end network that can perform super resolution and text recognition simultaneously. Different from previous super resolution methods, we use the loss of text recognition as the Text Perceptual Loss to guide the training of the super resolution network, and thus it pays more attention to the text content, rather than the irrelevant background area. Extensive experiments on several challenging benchmarks demonstrate the effectiveness of our proposed method in restoring a sharp high resolution image from a small blurred one, and show that the recognition performance clearly boosts up the performance of text recognizer. To our knowledge, this is the first work focusing on text super resolution. Code will be released in https github.com xieenze TextSR."} {"_id": [29], "label": "math.GR", "text": "A modified proof for Higman's embedding theorem. We suggest a modified and briefer version for the proof of Higman's embedding theorem stating that a finitely generated group can be embedded in a finitely presented group if and only if it is recursively presented. In particular, we shorten the main part of original proof establishing characterization of recursive relations in terms of benign subgroups in free groups. Also, some technical lemmas on homomorphisms are replaced by simple combinatorial observations on words in free constructions."} {"_id": [21], "label": "math.CO", "text": "Minimum degree conditions for the existence of cycles of all lengths modulo k in graphs. Thomassen, in 1983, conjectured that for a positive integer k , every 2 connected non bipartite graph of minimum degree at least k 1 contains cycles of all lengths modulo k . In this paper, we settle this conjecture affirmatively."} {"_id": [2, 4], "label": "cs.NE cs.AI", "text": "Going Deeper With Directly Trained Larger Spiking Neural Networks. Spiking neural networks (SNNs) are promising in a bio plausible coding for spatio temporal information and event driven signal processing, which is very suited for energy efficient implementation in neuromorphic hardware. However, the unique working mode of SNNs makes them more difficult to train than traditional networks. Currently, there are two main routes to explore the training of deep SNNs with high performance. The first is to convert a pre trained ANN model to its SNN version, which usually requires a long coding window for convergence and cannot exploit the spatio temporal features during training for solving temporal tasks. The other is to directly train SNNs in the spatio temporal domain. But due to the binary spike activity of the firing function and the problem of gradient vanishing or explosion, current methods are restricted to shallow architectures and thereby difficult in harnessing large scale datasets (e.g. ImageNet). To this end, we propose a threshold dependent batch normalization (tdBN) method based on the emerging spatio temporal backpropagation, termed \"STBP tdBN\", enabling direct training of a very deep SNN and the efficient implementation of its inference on neuromorphic hardware. With the proposed method and elaborated shortcut connection, we significantly extend directly trained SNNs from a shallow structure ( 10 layer) to a very deep structure (50 layers). Furthermore, we theoretically analyze the effectiveness of our method based on \"Block Dynamical Isometry\" theory. Finally, we report superior accuracy results including 93.15 on CIFAR 10, 67.8 on DVS CIFAR10, and 67.05 on ImageNet with very few timesteps. To our best knowledge, it's the first time to explore the directly trained deep SNNs with high performance on ImageNet."} {"_id": [25], "label": "math.PR", "text": "Density of the signature process of fBm. We study the density of the signature of fractional Brownian motions with parameter H 1 4 . In particular, we prove existence, smoothness, global Gaussian upper bounds and Varadhan's type asymptotics for this density. A key result is that the estimates on the density we obtain are controlled by the Carnot Carath 'eodory distance of the group."} {"_id": [3], "label": "cs.CL", "text": "Keywords lie far from the mean of all words in local vector space. Keyword extraction is an important document process that aims at finding a small set of terms that concisely describe a document's topics. The most popular state of the art unsupervised approaches belong to the family of the graph based methods that build a graph of words and use various centrality measures to score the nodes (candidate keywords). In this work, we follow a different path to detect the keywords from a text document by modeling the main distribution of the document's words using local word vector representations. Then, we rank the candidates based on their position in the text and the distance between the corresponding local vectors and the main distribution's center. We confirm the high performance of our approach compared to strong baselines and state of the art unsupervised keyword extraction methods, through an extended experimental study, investigating the properties of the local representations."} {"_id": [42], "label": "math.DG", "text": "A new proof of a classical result on the topology of orientable connected and compact surfaces by means of the Bochner technique. As an application of the Bochner formula, we prove that if a 2 dimensional Riemannian manifold admits a non trivial smooth tangent vector field X then its Gauss curvature is the divergence of a tangent vector field, constructed from X , defined on the open subset out the zeroes of X . Thanks to the Whitney embedding theorem and a standard approximation procedure, as a consequence, we give a new proof of the following well known fact if on an orientable, connected and compact 2 dimensional smooth manifold there exists a continuous tangent vector field with no zeroes, then the manifold is diffeomorphic (or equivalently homeomorphic) to a torus."} {"_id": [29, 23], "label": "math.FA math.GR", "text": "Invariant Integrals on Topological Groups. We generalize the fixed point property for discrete groups acting on convex cones given by Monod in cite monod to topological groups. At first, we focus on describing this fixed point property from a functional point of view, and then we look at the class of groups that have it. Finally, we go through some applications of this fixed point property. To accomplish these tasks, we introduce a new class of normed Riesz spaces that depend on group representation."} {"_id": [65], "label": "cs.NI", "text": "Long Lived LoRa Prolonging the Lifetime of a LoRa Network. Prolonging the network lifetime is a major consideration in many Internet of Things applications. In this paper, we study maximizing the network lifetime of an energy harvesting LoRa network. Such a network is characterized by heterogeneous recharging capabilities across the nodes that is not taken into account in existing work. We propose a link layer protocol to achieve a long lived LoRa network which dynamically enables the nodes with depleting batteries to exploit the superfluous energy of the neighboring nodes with affluent batteries by letting a depleting node offload its packets to an affluent node. By exploiting the LoRa's capability of adjusting multiple transmission parameters, we enable low cost offloading by depleting nodes instead of high cost direct forwarding. Such offloading requires synchronization of wake up times as well as transmission parameters between the two nodes which also need to be selected dynamically. The proposed protocol addresses these challenges and prolongs the lifetime of a LoRa network through three novel techniques. (1) We propose a lightweight medium access control protocol for peer to peer communication to enable packet offloading which circumvents the synchronization overhead between the two nodes. (2) We propose an intuitive heuristic method for effective parameter selections for different modes (conventional vs. offloading). (3) We analyze the energy overhead of offloading and, based on it, the protocol dynamically selects affluent and depleting nodes while ensuring that an affluent node is not overwhelmed by the depleting ones. Simulations in NS 3 as well as real experiments show that our protocol can increase the network lifetime up to 4 times while maintaining the same throughput compared to traditional LoRa network."} {"_id": [32, 1], "label": "cs.DS cs.LG", "text": "Efficiently Estimating Erdos Renyi Graphs with Node Differential Privacy. We give a simple, computationally efficient, and node differentially private algorithm for estimating the parameter of an Erdos Renyi graph that is, estimating p in a G(n,p) with near optimal accuracy. Our algorithm nearly matches the information theoretically optimal exponential time algorithm for the same problem due to Borgs et al. (FOCS 2018). More generally, we give an optimal, computationally efficient, private algorithm for estimating the edge density of any graph whose degree distribution is concentrated on a small interval."} {"_id": [9, 20], "label": "math.NA cs.NA math.AP", "text": "An adaptive central upwind scheme on quadtree grids for variable density shallow water equations. Minimizing computational cost is one of the major challenges in the modelling and numerical analysis of hydrodynamics, and one of the ways to achieve this is by the use of quadtree grids. In this paper, we present an adaptive scheme on quadtree grids for variable density shallow water equations. A scheme for the coupled system is developed based on the well balanced positivity preserving central upwind scheme proposed in 18 . The scheme is capable of exactly preserving \"lake at rest\" steady states. A continuous piecewise bi linear interpolation of the bottom topography function is used to achieve higher order in space in order to preserve the positivity of water depth for the point values of each computational cell. Necessary conditions are checked to be able to preserve the positivity of water depth and density, and to ensure the achievement of a stable numerical scheme. At each timestep, local gradients are examined to find new seeding points to locally refine coarsen the computational grid."} {"_id": [65, 17], "label": "cs.NI cs.DC", "text": "Blockchain of Things (BCoT) The Fusion of Blockchain and IoT Technologies. Blockchain, as well as Internet of Things (IoT), is considered as two major disruptive emerging technologies. However, both of them suffer from innate technological limitations to some extent. IoT requires strengthening its security features while Blockchain inherently possesses them due to its extensive use of cryptographic mechanisms and Blockchain, in an inverted manner, needs contributions from the distributed nodes for its P2P (Peer to Peer) consensus model while IoT rudimentarily embodies them within its architecture. This chapter, therefore, acutely dissects the viability, along with prospective challenges, of incorporating Blockchain with IoT technologies,inducing the notion of Blockchain of Things (BCoT), as well as the benefits such consolidation can offer."} {"_id": [9], "label": "math.AP", "text": "Minimality of the ball for a model of charged liquid droplets. We deduce that charged liquid droplets minimizing Debye H \"uckel type free energy are spherical in the small charge regime. The variational model was proposed by Muratov and Novaga in 2016 to avoid the ill posedness of the classical one. By combining a recent (partial) regularity result with Selection Principle of Cicalese and Leonardi, we prove that the ball is the unique minimizer in the small charge regime."} {"_id": [3], "label": "cs.CL", "text": "MathQA Towards Interpretable Math Word Problem Solving with Operation Based Formalisms. We introduce a large scale dataset of math word problems and an interpretable neural math problem solver that learns to map problems to operation programs. Due to annotation challenges, current datasets in this domain have been either relatively small in scale or did not offer precise operational annotations over diverse problem types. We introduce a new representation language to model precise operation programs corresponding to each math problem that aim to improve both the performance and the interpretability of the learned models. Using this representation language, our new dataset, MathQA, significantly enhances the AQuA dataset with fully specified operational programs. We additionally introduce a neural sequence to program model enhanced with automatic problem categorization. Our experiments show improvements over competitive baselines in our MathQA as well as the AQuA dataset. The results are still significantly lower than human performance indicating that the dataset poses new challenges for future research. Our dataset is available at https math qa.github.io math QA"} {"_id": [8], "label": "physics.optics", "text": "Crown structured optical harmonics. At levels of laser intensity below threshold for multiphoton ionization, the parametric generation of optical harmonics in gases and other isotropic media is subject to selection rules with origins in angular momentum conservation. The recently developed optics of vector polarization modes provides an unprecedented opportunity to exploit these principles in the production of high harmonic beams with distinctive forms of transverse intensity profile, comprising discrete sub wavelength filaments in crown like arrays. A detailed analysis of the fundamental electrodynamics elicits the mechanism, and delivers results illustrating the transverse structures and spatial dimensions of harmonic output that can be achieved."} {"_id": [18], "label": "math.GT", "text": "A Projective Representation of the Modular Group. Quantum Teichmuller theory assigns invariants to three manifolds via projective representations of mapping class groups derived from the representation of a noncommutative torus. Here, we focus on a representation of the simplest non commutative torus which remains fixed by all elements of the mapping class group of the torus, SL 2( mathbb Z ) . Also known as the modular group. We use this representation to associate a matrix to each element of SL 2( mathbb Z ) we then compute the trace and determinant of the associated matrix."} {"_id": [32], "label": "cs.DS", "text": "Approximate bi criteria search by efficient representation of subsets of the Pareto optimal frontier. We consider the bi criteria shortest path problem where we want to compute shortest paths on a graph that simultaneously balance two cost functions. While this problem has numerous applications, there is usually no path minimizing both cost functions simultaneously. Thus, we typically consider the set of paths where no path is strictly better then the others in both cost functions, a set called the Pareto optimal frontier. Unfortunately, the size of this set may be exponential in the number of graph vertices and the general problem is NP hard. While existing schemes to approximate this set exist, they may be slower than exact approaches when applied to relatively small instances and running them on graphs with even a moderate number of nodes is often impractical. The crux of the problem lies in how to efficiently approximate the Pareto optimal frontier. Our key insight is that the Pareto optimal frontier can be approximated using pairs of paths. This simple observation allows us to run a best first search while efficiently and effectively pruning away intermediate solutions in order to obtain an approximation of the Pareto frontier for any given approximation factor. We compared our approach with an adaptation of BOA , the state of the art algorithm for computing exact solutions to the bi criteria shortest path problem. Our experiments show that as the problem becomes harder, the speedup obtained becomes more pronounced. Specifically, on large roadmaps, we obtain an average speedup of more than times 8.5 and a maximal speedup of over times 148 ."} {"_id": [44, 53], "label": "q-fin.CP q-fin.RM", "text": "What is the Minimal Systemic Risk in Financial Exposure Networks?. Management of systemic risk in financial markets is traditionally associated with setting (higher) capital requirements for market participants. There are indications that while equity ratios have been increased massively since the financial crisis, systemic risk levels might not have lowered, but even increased. It has been shown that systemic risk is to a large extent related to the underlying network topology of financial exposures. A natural question arising is how much systemic risk can be eliminated by optimally rearranging these networks and without increasing capital requirements. Overlapping portfolios with minimized systemic risk which provide the same market functionality as empirical ones have been studied by pichler2018 . Here we propose a similar method for direct exposure networks, and apply it to cross sectional interbank loan networks, consisting of 10 quarterly observations of the Austrian interbank market. We show that the suggested framework rearranges the network topology, such that systemic risk is reduced by a factor of approximately 3.5, and leaves the relevant economic features of the optimized network and its agents unchanged. The presented optimization procedure is not intended to actually re configure interbank markets, but to demonstrate the huge potential for systemic risk management through rearranging exposure networks, in contrast to increasing capital requirements that were shown to have only marginal effects on systemic risk poledna2017 . Ways to actually incentivize a self organized formation toward optimal network configurations were introduced in thurner2013 and poledna2016 . For regulatory policies concerning financial market stability the knowledge of minimal systemic risk for a given economic environment can serve as a benchmark for monitoring actual systemic risk in markets."} {"_id": [18, 71], "label": "math.SG math.GT", "text": "Algebraic and Giroux torsion in higher dimensional contact manifolds. We construct examples in any odd dimension of contact manifolds with finite and non zero algebraic torsion (in the sense of Latschev Wendl), which are therefore tight and do not admit strong symplectic fillings. We prove that Giroux torsion implies algebraic 1 torsion in any odd dimension, which proves a conjecture by Massot Niederkrueger Wendl. These results are part of the author's PhD thesis."} {"_id": [49, 21], "label": "math.OC math.CO", "text": "The Integrated Vehicle and Pollster Routing Problem. The National Statistics Bureau of Ecuador carries out monthly polls to monitor the evolution of an economic indicator called \"Consumer Price Index\", which measures the consumer prices of basic commodities. A set of stores is selected to apply these polls. Further, a set of vehicles transports pollsters from the headquarters of the bureau to the stores to perform this activity. Moreover, pollsters move between stores using pedestrian paths or using a vehicle to shorten the travel time. This paper introduces the Integrated Vehicle and Pollster Routing Problem alongside an integer program to model the integrated task of scheduling visits of pollsters to selected stores, as well as routing the vehicle fleet used to transport them. Results on the computational complexity of the aforementioned problem, a three phase algorithm, and computational experience based on real world instances are provided."} {"_id": [2], "label": "cs.AI", "text": "Every Action Based Sensor. In studying robots and planning problems, a basic question is what is the minimal information a robot must obtain to guarantee task completion. Erdmann's theory of action based sensors is a classical approach to characterizing fundamental information requirements. That approach uses a plan to derive a type of virtual sensor which prescribes actions that make progress toward a goal. We show that the established theory is incomplete the previous method for obtaining such sensors, using backchained plans, overlooks some sensors. Furthermore, there are plans, that are guaranteed to achieve goals, where the existing methods are unable to provide any action based sensor. We identify the underlying feature common to all such plans. Then, we show how to produce action based sensors even for plans where the existing treatment is inadequate, although for these cases they have no single canonical sensor. Consequently, the approach is generalized to produce sets of sensors. Finally, we show also that this is a complete characterization of action based sensors for planning problems and discuss how an action based sensor translates into the traditional conception of a sensor."} {"_id": [93], "label": "physics.class-ph", "text": "Interaction between Surface Waves on Wire Lines. This paper investigates the coupling properties between surface waves on parallel wires. Finite Element Method (FEM) based and analytical models are developed for both single wire Sommerfeld and Goubau lines. Starting with the Sommerfeld type wave, we derive the analytical expression based on the assumption that the two wire surface wave is a superposition of the two surface waves on the individual wires. Models are validated via measurements and a comparison study conducted between the analytic and the FEM based computations for coupled Sommerfeld type lines. We then investigate the coupling between two Goubau lines with the FEM model. The measurement and calculations show remarkable agreement. The FEM based and the analytical models match remarkably well too. The results exhibit new properties of favourable effects on surface waves propagation over multiple conductors. The short range behaviour of the coupled wires and consequently the existence of an optimum separation of coupled wires, is one of the most significant findings of this paper. We comment on the relevance of our results especially in relation to applications of high bandwidth demands and immanent cross coupling effects."} {"_id": [77, 23], "label": "math.LO math.FA", "text": "Unilateral weighted shifts on ell 2 . Given a unilateral shift B w (determined by a bounded sequence w ), a sequence x in ell 2 is \"hypercyclic\" for w iff the forward iterates of x under B w are dense in ell 2 . We show that it is possible to make the set of x in ell 2 which are simultaneously hypercyclic for all w in a fixed W subseteq ell infty arbitrarily complicated by choosing W appropriately."} {"_id": [9], "label": "math.AP", "text": "On solutions related to FitzHugh Rinzel type model. A ternary autonomous dynamical system of FitzHugh Rinzel type is analyzed. The system, at start, is reduced to a nonlinear integro differential equation. The fundamental solution H(x,t) is explicitly determined and the initial value problem is analyzed in the whole space. The solution is expressed by means of an integral equation involving H(x,t) . Moreover, adding an extra control term, explicit solutions are achieved."} {"_id": [49, 20], "label": "math.OC cs.NA math.NA", "text": "Shape optimization for superconductors governed by H(curl) elliptic variational inequalities. This paper is devoted to the theoretical and numerical study of an optimal design problem in high temperature superconductivity (HTS). The shape optimization problem is to find an optimal superconductor shape which minimizes a certain cost functional under a given target on the electric field over a specific domain of interest. For the governing PDE model, we consider an elliptic curl curl variational inequality (VI) of the second kind with an L1 type nonlinearity. In particular, the non smooth VI character and the involved H(curl) structure make the corresponding shape sensitivity analysis challenging. To tackle the non smoothness, a penalized dual VI formulation is proposed, leading to the G a teaux differentiability of the corresponding dual variable mapping. This property allows us to derive the distributed shape derivative of the cost functional through rigorous shape calculus on the basis of the averaged adjoint method. The developed shape derivative turns out to be uniformly stable with respect to the penalization parameter, and strong convergence of the penalized problem is guaranteed. Based on the achieved theoretical findings, we propose 3D numerical solutions, realized using a level set algorithm and a Newton method with the Nedelec edge element discretization. Numerical results indicate a favourable and efficient performance of the proposed approach for a specific HTS application in superconducting shielding."} {"_id": [9], "label": "math.AP", "text": "The Optimal Gradient Estimates for Perfect Conductivity Problem with C 1, alpha inclusions. In high contrast composite materials, the electric field concentration is a common phenomenon when two inclusions are close to touch. It is important from an engineering point of view to study the dependence of the electric field on the distance between two adjacent inclusions. In this paper, we derive the upper and lower bounds of the gradient of solutions to the conductivity problem where two perfectly conducting inclusions are located very close to each other. To be specific, we extend the known results of Bao Li Yin (ARMA 2009) in two folds First, we weaken the smoothness of the inclusions from C 2, alpha to C 1, alpha . To obtain an pointwise upper bound of the gradient, we follow an iteration technique developed by Bao Li Li (ARMA 2015), who mainly deal with the system of linear elasticity. However, when the inclusions are of C 1, alpha , we can not use W 2,p estimates for elliptic equations any more. In order to overcome this new difficulty, we take advantage of De Giorgi Nash estimates and Campanato's approach to apply an adapted version of the iteration technique with respect to the energy. A lower bound in the shortest line between two inclusions is also obtained to show the optimality of the blow up rate. Second, when two inclusions are only convex but not strictly convex, we prove that blow up does not occur any more. Moreover, the establishment of the relationship between the blow up rate of the gradient and the order of the convexity of the inclusions reveals the mechanism of such concentration phenomenon."} {"_id": [3], "label": "cs.CL", "text": "Robust Neural Machine Translation with Doubly Adversarial Inputs. Neural machine translation (NMT) often suffers from the vulnerability to noisy perturbations in the input. We propose an approach to improving the robustness of NMT models, which consists of two parts (1) attack the translation model with adversarial source examples (2) defend the translation model with adversarial target inputs to improve its robustness against the adversarial source inputs.For the generation of adversarial inputs, we propose a gradient based method to craft adversarial examples informed by the translation loss over the clean inputs.Experimental results on Chinese English and English German translation tasks demonstrate that our approach achieves significant improvements ( 2.8 and 1.6 BLEU points) over Transformer on standard clean benchmarks as well as exhibiting higher robustness on noisy data."} {"_id": [21], "label": "math.CO", "text": "Three Affine SL(2,8) Unitals. operatorname SL (2,q) unitals are unitals of order q admitting a regular action of operatorname SL (2,q) on the complement of some block. We introduce three non classical affine operatorname SL (2,8) unitals and their full automorphism groups. Each of those three affine unitals can be completed to at least two non isomorphic unitals, leading to six pairwise non isomorphic unitals of order 8 ."} {"_id": [19], "label": "cs.CR", "text": "Password authenticated Decentralized Identities. Password authenticated identities, where users establish username password pairs with individual servers and use them later on for authentication, is the most widespread user authentication method over the Internet. Although they are simple, user friendly, and broadly adopted, they offer insecure authentication and position server operators as trusted parties, giving them full control over users' identities. To mitigate these limitations, many identity systems have embraced public key cryptography and the concept of decentralization. All these systems, however, require users to create and manage public private keypairs. Unfortunately, users usually do not have the required knowledge and resources to properly handle their cryptographic secrets, which arguably contributed to failures of many end user focused public key infrastructures (PKIs). In fact, as for today, no end user PKI, able to authenticate users to web servers, has a significant adoption rate. In this paper, we propose Password authenticated Decentralized Identities (PDIDs), an identity and authentication framework where users can register their self sovereign username password pairs and use them as universal credentials. Our system provides global namespace, human meaningful usernames, and resilience against username collision attacks. A user's identity can be used to authenticate the user to any server without revealing that server anything about the password, such that no offline dictionary attacks are possible against the password. We analyze PDIDs and implement it using existing infrastructures and tools. We report on our implementation and evaluation."} {"_id": [49], "label": "math.OC", "text": "On the Observability of Attitude with Single Direction Measurements. The attitude of a rigid body evolves on the three dimensional special orthogonal group, and it is often estimated by measuring reference directions, such as gravity or magnetic field, using an onboard sensor. As a single direction measurement provides a two dimensional constraint, it has been widely accepted that at least two non parallel reference directions should be measured, or the reference direction should change over time, to determine the attitude completely. This paper uncovers an intriguing fact that the attitude can actually be estimated by using multiple measurements of a single, fixed reference direction, provided that the angular velocity and the direction measurements are resolved in appropriate frames, respectively. More specifically, after recognizing that the attitude uncertainties propagated over the left trivialized stochastic kinematics are distinct from those over the right trivialized one, stochastic attitude observability with single direction measurements is formulated by an information theoretic analysis. These are further illustrated by numerical simulations and experiments."} {"_id": [0, 1, 2, 41, 52], "label": "cs.AI cs.CV cs.LG cs.MA cs.RO", "text": "Visual Hide and Seek. We train embodied agents to play Visual Hide and Seek where a prey must navigate in a simulated environment in order to avoid capture from a predator. We place a variety of obstacles in the environment for the prey to hide behind, and we only give the agents partial observations of their environment using an egocentric perspective. Although we train the model to play this game from scratch, experiments and visualizations suggest that the agent learns to predict its own visibility in the environment. Furthermore, we quantitatively analyze how agent weaknesses, such as slower speed, effect the learned policy. Our results suggest that, although agent weaknesses make the learning problem more challenging, they also cause more useful features to be learned. Our project website is available at http www.cs.columbia.edu bchen visualhideseek ."} {"_id": [0], "label": "cs.CV", "text": "Self supervised Training of Proposal based Segmentation via Background Prediction. While supervised object detection methods achieve impressive accuracy, they generalize poorly to images whose appearance significantly differs from the data they have been trained on. To address this in scenarios where annotating data is prohibitively expensive, we introduce a self supervised approach to object detection and segmentation, able to work with monocular images captured with a moving camera. At the heart of our approach lies the observation that segmentation and background reconstruction are linked tasks, and the idea that, because we observe a structured scene, background regions can be re synthesized from their surroundings, whereas regions depicting the object cannot. We therefore encode this intuition as a self supervised loss function that we exploit to train a proposal based segmentation network. To account for the discrete nature of object proposals, we develop a Monte Carlo based training strategy that allows us to explore the large space of object proposals. Our experiments demonstrate that our approach yields accurate detections and segmentations in images that visually depart from those of standard benchmarks, outperforming existing self supervised methods and approaching weakly supervised ones that exploit large annotated datasets."} {"_id": [48, 23], "label": "math.FA cs.CC", "text": "Matrix and tensor rigidity and L p approximation. In this paper we apply methods originated in Complexity theory to some problems of Approximation. We notice that the construction of Alman and Williams that disproves the rigidity of Walsh Hadamard matrices, provides good ell p approximation for p 2 . It follows that the first n functions of Walsh system can be approximated with an error n delta by a linear space of dimension n 1 delta d n 1 delta ( w 1, ldots,w n , L p 0,1 ) le n delta , quad p in 1,2), delta delta(p) 0. We do not know if this is possible for the trigonometric system. We show that the algebraic method of Alon Frankl R \"odl for bounding the number of low signum rank matrices, works for tensors almost all signum tensors have large signum rank and can't be ell 1 approximated by low rank tensors. This implies lower bounds for Theta m the error of m term approximation of multivariate functions by sums of tensor products u 1(x 1) cdots u d(x d) . In particular, for the set of trigonometric polynomials with spectrum in prod j 1 d n j,n j and of norm t infty le 1 we have Theta m( mathcal T(n 1, ldots,n d) infty,L 1 pi, pi d) ge c 1(d) 0, quad m le c 2(d) frac prod n j max n j . Sharp bounds follow for classes of dominated mixed smoothness Theta m(W (r,r, ldots,r) p,L q 0,1 d) asymp m frac rd d 1 , quad mbox 2 le p le infty, 1 le q le 2."} {"_id": [22], "label": "cs.SE", "text": "Characterization and Automatic Update of Deprecated Machine Learning API Usages. Due to the rise of AI applications, machine learning libraries have become far more accessible, with Python being the most common programming language to write them. Machine learning libraries tend to be updated periodically, which may deprecate existing APIs, making it necessary for developers to update their usages. However, updating usages of deprecated APIs are typically not a priority for developers, leading to widespread usages of deprecated APIs which expose library users to vulnerability issues. In this paper, we built a tool to automate these updates. We first conducted an empirical study to seek a better understanding on how updates of deprecated machine learning API usages in Python can be done. The study involved a dataset of 112 deprecated APIs from Scikit Learn, TensorFlow, and PyTorch. We found dimensions of deprecated API migration related to its update operation (i.e., the required operation to perform the migration), API mapping (i.e., the number of deprecated and its corresponding updated APIs),and context dependency (i.e., whether we need to consider surrounding contexts when performing the migration). Guided by the findings on our empirical study, we created MLCatchUp, a tool to automate the update of Python deprecated API usage that automatically infers the API migration transformation through comparison of the deprecated and updated API signatures. These transformations are expressed in a Domain Specific Language (DSL). We evaluated MLCatchUp using test dataset containing 258 files with 514 API usages that we collected from public GitHub repositories. In this evaluation, MLCatchUp achieves a precision of 86.19 . We further improve the precision of MLCatchUp by adding a feature that allows it to accept additional user input to specify the transformation constraints in the DSL for context dependent API migration, where MLCatchUp achieves a precision of 93.58 ."} {"_id": [5], "label": "physics.plasm-ph", "text": "Laser Wake Field Collider. Recently NAano Plasmonic, Laser Inertial Fusion Experiments (NAPLIFE) were proposed, as an improved way to achieve laser driven fusion. The improvement is the combination of two basic research discoveries (i) The possibility of detonations on space time hyper surfaces with time like normal (i.e. simultaneous detonation in a whole volume) and (ii) to increase this volume to the whole target, by regulating the laser light absorption using nano shells or nano rods as antennas. These principles can be realized in an in line, one dimensional configuration, in the simplest way with two opposing laser beams as in particle colliders. Such, opposing laser beam experiments were also performed recently. Here we study the consequences of the Laser Wake Field Acceleration (LWFA) if we experience it in a colliding laser beam set up. These studies can be applied to laser driven fusion, but also to other rapid phase transition, combustion, or ignition studies in other materials."} {"_id": [46, 38], "label": "math.NT math.AG", "text": "Abhyankar's Inertia Conjecture for Some Sporadic Groups. This paper verifies Abhyankar's Inertia Conjecture for certain sporadic groups G in particular characteristics by showing that all possible inertia groups occur for G Galois covers of the affine line. For a larger set of sporadic groups, all but finitely many possible ramification invariants are shown to occur. In particular, we prove that all but eight of the possible ramification invariants are realizable for text M 11 Galois covers of the affine line."}