id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-05-16 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2309.08705 | Linus Hamann | Linus Hamann, Si Ying Lee | Torsion Vanishing for Some Shimura Varieties | v4 | null | null | null | math.NT math.AG | http://creativecommons.org/licenses/by/4.0/ | We generalize the torsion vanishing results of Caraiani-Scholze and
Koshikawa. Our results apply to the cohomology of general Shimura varieties
$(\mathbf{G},X)$ of PEL type $A$ or $C$, localized at a suitable maximal ideal
$\mathfrak{m}$ in the spherical Hecke algebra at primes $p$ such that
$\mathbf{G}_{\mathbb{Q}_{p}}$ is a group for which we know the Fargues-Scholze
local Langlands correspondence is the semi-simplification of a suitably nice
local Langlands correspondence. This is accomplished by combining Koshikawa's
technique, the theory of geometric Eisenstein series over the Fargues-Fontaine
curve, the work of Santos describing the structure of the fibers of the
minimally and toroidally compactified Hodge-Tate period morphism for general
PEL type Shimura varieties of type $A$ or $C$, and ideas developed by Zhang on
comparing Hecke correspondences on the moduli stack of $G$-bundles with the
cohomology of Shimura varieties. In the process, we also establish a
description of the generic part of the cohomology that bears resemblance to the
work of Xiao-Zhu. Moreover, we also construct a filtration on the compactly
supported cohomology that differs from Manotovan's filtration in the case that
the Shimura variety is non-compact, allowing us to circumvent some of the
circumlocutions taken by Cariani-Scholze. Our method showcases a very general
strategy for proving such torsion vanishing results, and should bear even more
fruit once the inputs are generalized. Motivated by this, we formulate an even
more general torsion vanishing conjecture.
| [
{
"version": "v1",
"created": "Fri, 15 Sep 2023 18:52:53 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Dec 2023 02:09:04 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Sep 2024 17:58:10 GMT"
},
{
"version": "v4",
"created": "Wed, 14 May 2025 20:38:39 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Hamann",
"Linus",
""
],
[
"Lee",
"Si Ying",
""
]
] |
2309.14218 | Thomas J. Haines | Thomas J. Haines | Cellular pavings of fibers of convolution morphisms | 24 pages. Minor error corrected with the addition of Lemma 7.2. Lemma
7.3 added. Material on triviality of morphisms added to section 5. Minor
changes in notation. Published version | \'Epijournal de G\'eom\'etrie Alg\'ebrique, Volume 9 (2025),
Article no. 9 | null | null | math.AG math.RT | http://creativecommons.org/licenses/by-sa/4.0/ | This article proves, in the case of split groups over arbitrary fields, that
all fibers of convolution morphisms attached to parahoric affine flag varieties
are paved by products of affine lines and affine lines minus a point. This
applies in particular to the affine Grassmannian and to the convolution
morphisms in the context of the geometric Satake correspondence. The second
part of the article extends these results over $\mathbb Z$. Those in turn
relate to the recent work of Cass-van den Hove-Scholbach on the geometric
Satake equivalence for integral motives, and provide some alternative proofs
for some of their results.
| [
{
"version": "v1",
"created": "Mon, 25 Sep 2023 15:23:11 GMT"
},
{
"version": "v2",
"created": "Thu, 2 May 2024 14:50:36 GMT"
},
{
"version": "v3",
"created": "Sun, 8 Sep 2024 20:25:43 GMT"
},
{
"version": "v4",
"created": "Thu, 15 May 2025 03:01:21 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Haines",
"Thomas J.",
""
]
] |
2309.16723 | Ilmari Kangasniemi | Ilmari Kangasniemi and Jani Onninen | Corrigendum to "On the heterogeneous distortion inequality" | Corrects an error affecting Lemma 7.2 and Theorem 1.3. of our article
[arXiv:2102.03471]. We recover Theorem 1.3. 10 pages, 1 figure | Math. Ann. 389, 2037-2047 (2024) | 10.1007/s00208-023-02728-1 | null | math.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We correct an error in [I. Kangasniemi, and J. Onninen, On the heterogeneous
distortion inequality. Math. Ann. 384 (2022), no. 3-4, 1275-1308.]
| [
{
"version": "v1",
"created": "Fri, 22 Sep 2023 17:52:57 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Kangasniemi",
"Ilmari",
""
],
[
"Onninen",
"Jani",
""
]
] |
2310.03445 | Clemens Kupke | Ezra Schoen, Jade Master, Clemens Kupke | Relative fixed points of functors | 26 pages | null | null | null | math.CT cs.LO | http://creativecommons.org/licenses/by/4.0/ | We show how the relatively initial or relatively terminal fixed points for a
well-behaved functor $F$ form a pair of adjoint functors between $F$-coalgebras
and $F$-algebras. We use the language of locally presentable categories to find
sufficient conditions for existence of this adjunction. We show that relative
fixed points may be characterized as (co)equalizers of the free (co)monad on
$F$. In particular, when $F$ is a polynomial functor on $\mathsf{Set}$ the
relative fixed points are a quotient or subset of the free term algebra or the
cofree term coalgebra. We give examples of the relative fixed points for
polynomial functors and an example which is the Sierpinski carpet. Lastly, we
prove a general preservation result for relative fixed points.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2023 10:31:57 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 16:04:46 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Schoen",
"Ezra",
""
],
[
"Master",
"Jade",
""
],
[
"Kupke",
"Clemens",
""
]
] |
2310.09406 | Dawid Paszko | Dawid Paszko, Dominic C. Rose, Marzena H. Szyma\'nska, Arijeet Pal | Edge modes and symmetry-protected topological states in open quantum
systems | 21 pages, 10 figures | PRX Quantum 5, 030304 (2024) | 10.1103/PRXQuantum.5.030304 | null | quant-ph cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Topological order offers possibilities for processing quantum information
which can be immune to imperfections. However, the question of its stability
out of equilibrium is relevant for experiments, where coupling to an
environment is unavoidable. In this work we demonstrate the robustness of
certain aspects of $Z_2 \times Z_2$ symmetry-protected topological (SPT) order
against a wide class of dissipation channels in the Lindblad and quantum
trajectory formalisms of an open quantum system. This is illustrated using the
one-dimensional $ZXZ$ cluster Hamiltonian along with Pauli-string jump
operators. We show that certain choices of dissipation retaining strong
symmetries support a steady-state manifold consisting of two non-local logical
qubits, and for Hamiltonian perturbations preserving the global symmetry,
states in this manifold remain metastable. In contrast, this metastability is
destroyed upon breaking the above-mentioned symmetry. While the localized edge
qubits of the cluster Hamiltonian are not conserved by the Lindbladian
evolution, they do correspond to weak symmetries and thus retain a memory of
their initial state at all times in the quantum trajectories. We utilize this
feature to construct protocols to retrieve the quantum information either by
monitoring jumps or error mitigation. Our work thus proposes a novel framework
to study the dynamics of dissipative SPT phases and opens the possibility of
engineering entangled states relevant to quantum information processing.
| [
{
"version": "v1",
"created": "Fri, 13 Oct 2023 21:09:52 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 15:55:23 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Paszko",
"Dawid",
""
],
[
"Rose",
"Dominic C.",
""
],
[
"Szymańska",
"Marzena H.",
""
],
[
"Pal",
"Arijeet",
""
]
] |
2310.11711 | Zhi Zhang | Zhi Zhang, Kyle Ritscher, Oscar Hernan Madrid Padilla | Risk Bounds for Quantile Additive Trend Filtering | 9 pages, 4 figures, published in AISTATS 2025 (PMLR Vol. 258) | Proceedings of the 28th International Conference on Artificial
Intelligence and Statistics (AISTATS) 2025, PMLR 258, pp. 4735-4743, 2025 | null | null | math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates risk bounds for quantile additive trend filtering, a
method gaining increasing significance in the realms of additive trend
filtering and quantile regression. We investigate the constrained version of
quantile trend filtering within additive models, considering both fixed and
growing input dimensions. In the fixed dimension case, we discover an error
rate that mirrors the non-quantile minimax rate for additive trend filtering,
featuring the main term $n^{-2r/(2r+1)}V^{2/(2r+1)}$, when the underlying
quantile function is additive, with components whose $(r-1)$th derivatives are
of bounded variation by $V$. In scenarios with a growing input dimension $d$,
quantile additive trend filtering introduces a polynomial factor of
$d^{(2r+2)/(2r+1)}$. This aligns with the non-quantile variant, featuring a
linear factor $d$, particularly pronounced for larger $r$ values. Additionally,
we propose a practical algorithm for implementing quantile trend filtering
within additive models, using dimension-wise backfitting. We conduct
experiments with evenly spaced data points or data that samples from a uniform
distribution in the interval $[0,1]$, applying distinct component functions and
introducing noise from normal and heavy-tailed distributions. Our findings
confirm the estimator's convergence as $n$ increases and its superiority,
particularly in heavy-tailed distribution scenarios. These results deepen our
understanding of additive trend filtering models in quantile settings, offering
valuable insights for practical applications and future research.
| [
{
"version": "v1",
"created": "Wed, 18 Oct 2023 04:59:11 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 06:15:27 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Zhang",
"Zhi",
""
],
[
"Ritscher",
"Kyle",
""
],
[
"Padilla",
"Oscar Hernan Madrid",
""
]
] |
2310.12915 | Gauhar Abbas | Gauhar Abbas | The standard HVM | Accepted version in Mod.Phys.Lett.A | Mod.Phys.Lett.A 40 (2025) 17n18, 2550056 | 10.1142/S0217732325500567 | null | hep-ph hep-ex | http://creativecommons.org/licenses/by/4.0/ | We discuss a standard hierarchical VEVs model which predicts the leptonic
mixing angles in terms of the Cabibbo angle, and masses of strange and charm
quarks as $\sin \theta_{12}^\ell \geq 1 - 2 \sin \theta_{12}$, $\sin
\theta_{23}^\ell \geq 1 - \sin \theta_{12}$, and $\sin \theta_{13}^\ell \geq
\sin \theta_{12} - \frac{m_s}{m_c}$ for the normal mass ordering of neutrinos.
This results in very precise predictions of the leptonic mixing angles given by
$\sin \theta_{12}^\ell = 0.55 \pm 0.00134 $, $\sin \theta_{23}^\ell = 0.775 \pm
0.00067 $, and $\sin \theta_{13}^\ell = 0.1413 - 0.1509 $. Furthermore, we
predict neutrinos to be the Dirac kind disfavouring the inverted mass
hierarchy. The standard hierarchical VEVs model predicts a possible new class
of the dark matter candidate, named as neutrinic dark matter.
| [
{
"version": "v1",
"created": "Thu, 19 Oct 2023 17:07:35 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Dec 2024 16:15:28 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Mar 2025 05:01:55 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Abbas",
"Gauhar",
""
]
] |
2310.14279 | Tatsumasa Suzuki | Tatsumasa Suzuki | On the Ozsv\'ath-Szab\'o $d$-invariants for almost simple linear graphs | 34 pages, 6 figures, The title is changed | null | null | null | math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Karakurt and \c{S}avk calculate the Ozsv\'ath-Szab\'o $d$-invariant for
Brieskorn homology $3$-spheres where surgery diagrams can be expressed as
almost simple linear graphs. In this paper, we introduce a refiniment of
Karakurt and \c{S}avk's formula for these $d$-invariants. We also introduce
infinite examples of inequalities that appear in this refinement in which the
equality holds, and infinite examples in which it does not hold. We also
discuss an application to knot concordance group.
| [
{
"version": "v1",
"created": "Sun, 22 Oct 2023 12:13:53 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 12:58:56 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Suzuki",
"Tatsumasa",
""
]
] |
2310.16116 | Georgios Valogiannis | Georgios Valogiannis, Sihan Yuan, Cora Dvorkin | Precise Cosmological Constraints from BOSS Galaxy Clustering with a
Simulation-Based Emulator of the Wavelet Scattering Transform | 27 pages, 17 figures, 4 tables. Updated to match version accepted in
PRD. v3: Updated funding information | Phys. Rev. D 109.103503 (2024) | 10.1103/PhysRevD.109.103503 | null | astro-ph.CO astro-ph.GA astro-ph.IM hep-ph physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We perform a reanalysis of the BOSS CMASS DR12 galaxy dataset using a
simulation-based emulator for the Wavelet Scattering Transform (WST)
coefficients. Moving beyond our previous works, which laid the foundation for
the first galaxy clustering application of this estimator, we construct a
neural net-based emulator for the cosmological dependence of the WST
coefficients and the 2-point correlation function multipoles, trained from the
state-of-the-art suite of \textsc{AbacusSummit} simulations combined with a
flexible Halo Occupation Distribution (HOD) galaxy model. In order to confirm
the accuracy of our pipeline, we subject it to a series of thorough internal
and external mock parameter recovery tests, before applying it to reanalyze the
CMASS observations in the redshift range $0.46<z<0.57$. We find that a joint
WST + 2-point correlation function likelihood analysis allows us to obtain
marginalized 1$\sigma$ errors on the $\Lambda$CDM parameters that are tighter
by a factor of $2.5-6$, compared to the 2-point correlation function, and by a
factor of $1.4-2.5$ compared to the WST-only results. This corresponds to a
competitive $0.9\%$, $2.3\%$ and $1\%$ level of determination for parameters
$\omega_c$, $\sigma_8$ $\&$ $n_s$, respectively, and also to a $0.7\%$ $\&$
$2.5 \%$ constraint on derived parameters h and $f(z)\sigma_8(z)$, in agreement
with the \textit{Planck} 2018 results. Our results reaffirm the constraining
power of the WST and highlight the exciting prospect of employing higher-order
statistics in order to fully exploit the power of upcoming Stage-IV
spectroscopic observations.
| [
{
"version": "v1",
"created": "Tue, 24 Oct 2023 18:33:11 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Apr 2024 20:28:23 GMT"
},
{
"version": "v3",
"created": "Wed, 14 May 2025 21:43:01 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Valogiannis",
"Georgios",
""
],
[
"Yuan",
"Sihan",
""
],
[
"Dvorkin",
"Cora",
""
]
] |
2310.18195 | Jiyu Chen | Jiyu Chen, Francesco Petocchi, Viktor Christiansson, and Philipp
Werner | Nature of the photo-induced metallic state in monoclinic VO$_2$ | null | Phys. Rev. B 109, L201101 (2024) | 10.1103/PhysRevB.109.L201101 | null | cond-mat.str-el | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The metal-insulator transition of VO$_2$, which in equilibrium is associated
with a structural phase transition, has been intensively studied for decades.
In particular, it is challenging to disentangle the role of Mott physics from
dimerization effects in the insulating phase. Femtosecond time-resolved
experiments showed that optical excitations can induce a transient metallic
state in the dimerized phase, which is distinct from the known equilibrium
phases. In this study, we combine non-equilibrium cluster dynamical mean-field
theory with realistic first principles modeling to clarify the nature of this
laser-induced metallic state. We show that the doublon-holon production by
laser pulses with polarization along the V-V dimers and the subsequent
inter-orbital reshuffling of the photo-carriers leads to a population of
orbital-mixed states and the filling of the gap. The photo-induced metal state
is qualitatively similar to a hot electronic state in the dimerized structure,
and does not involve a collapse of the Mott gap.
| [
{
"version": "v1",
"created": "Fri, 27 Oct 2023 15:08:53 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Chen",
"Jiyu",
""
],
[
"Petocchi",
"Francesco",
""
],
[
"Christiansson",
"Viktor",
""
],
[
"Werner",
"Philipp",
""
]
] |
2310.20378 | Milton Ruiz | Ver\'onica Villa-Ortega, Ana Lorenzo-Medina, Juan Calder\'on Bustillo,
Milton Ruiz, Davide Guerra, Pablo Cerd\'a-Duran, Jos\'e A. Font | Self-consistent treatment of thermal effects in neutron-star
post-mergers: observational implications for third-generation
gravitational-wave detectors | 10 pages, 5 Figures. Matches published version | Phys. Rev. D 111, 103030 (2025) | 10.1103/PhysRevD.111.103030 | null | gr-qc astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | We assess the impact of accurate, self-consistent modelling of thermal
effects in neutron-star merger remnants in the context of third-generation
gravitational-wave detectors. This is done through the usage, in Bayesian model
selection experiments, of numerical-relativity simulations of binary neutron
star (BNS) mergers modelled through: a) nuclear, finite-temperature (or
``tabulated'') equations of state (EoSs), and b) their simplifed piecewise (or
``hybrid'') representation. These cover four different EoSs, namely SLy4, DD2,
HShen and LS220. Our analyses make direct use of the Newman-Penrose scalar
$\psi_4$ outputted by numerical simulations. Considering a detector network
formed by three Cosmic Explorers, we show that differences in the
gravitational-wave emission predicted by the two models are detectable with a
natural logarithmic Bayes Factor $\log{\cal{B}}\geq 5$ at average distances of
$d_L \simeq 50$Mpc, reaching $d_L \simeq 100$Mpc for source inclinations $\iota
\leq 0.8$, regardless of the EoS. This impact is most pronounced for the HShen
EoS. For low inclinations, only the DD2 EoS prevents the detectability of such
modelling differences at $d_L \simeq 150$Mpc. Our results suggest that the
usage a self-consistent treatment of thermal effects is crucial for
third-generation gravitational wave detectors.
| [
{
"version": "v1",
"created": "Tue, 31 Oct 2023 11:37:23 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 13:11:23 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Villa-Ortega",
"Verónica",
""
],
[
"Lorenzo-Medina",
"Ana",
""
],
[
"Bustillo",
"Juan Calderón",
""
],
[
"Ruiz",
"Milton",
""
],
[
"Guerra",
"Davide",
""
],
[
"Cerdá-Duran",
"Pablo",
""
],
[
"Font",
"José A.",
""
]
] |
2311.02505 | Doron Puder | Gil Alon, Gady Kozma, Doron Puder | On the Aldous-Caputo Spectral Gap Conjecture for Hypergraphs | 32 pages + 9 pages of Appendix containing code in SageMath.
Incorporated referees' remarks. To appear in Math. Proc. Cambridge Phil. Soc | null | null | null | math.GR math.CO math.PR math.RT | http://creativecommons.org/licenses/by-nc-sa/4.0/ | In their celebrated paper (arXiv:0906.1238), Caputo, Liggett and Richthammer
proved Aldous' conjecture and showed that for an arbitrary finite graph, the
spectral gap of the interchange process is equal to the spectral gap of the
underlying random walk. A crucial ingredient in the proof was the Octopus
Inequality - a certain inequality of operators in the group ring
$\mathbb{R}[\mathrm{Sym}_n]$ of the symmetric group. Here we generalize the
Octopus Inequality and apply it to generalize the Caputo-Liggett-Richthammer
Theorem to certain hypergraphs, proving some cases of a conjecture of Caputo.
| [
{
"version": "v1",
"created": "Sat, 4 Nov 2023 20:51:01 GMT"
},
{
"version": "v2",
"created": "Wed, 14 May 2025 21:13:24 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Alon",
"Gil",
""
],
[
"Kozma",
"Gady",
""
],
[
"Puder",
"Doron",
""
]
] |
2311.03541 | Michael Baake | Michael Baake (Bielefeld), Franz G\"ahler (Bielefeld), Philipp Gohlke
(Lund) | Orbit separation dimension as complexity measure for primitive inflation
tilings | 29 pages, 1 figure, minor revisions and updates | null | 10.1017/etds.2025.18 | null | math.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Orbit separation dimension (OSD), previously introduced as amorphic
complexity, is a powerful complexity measure for topological dynamical systems
with pure-point spectrum. Here, we develop methods and tools for it that allow
a systematic application to translation dynamical systems of tiling spaces that
are generated by primitive inflation rules. These systems share many nice
properties that permit the explicit computation of the OSD, thus providing a
rich class of examples with non-trivial OSD.
| [
{
"version": "v1",
"created": "Mon, 6 Nov 2023 21:24:43 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 11:50:52 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Baake",
"Michael",
"",
"Bielefeld"
],
[
"Gähler",
"Franz",
"",
"Bielefeld"
],
[
"Gohlke",
"Philipp",
"",
"Lund"
]
] |
2311.04229 | Amir Salimi | Amir Salimi, Sunil Vasu Kalmady, Abram Hindle, Osmar Zaiane, Padma
Kaul | Exploring Best Practices for ECG Pre-Processing in Machine Learning | null | null | null | null | eess.SP cs.LG | http://creativecommons.org/licenses/by/4.0/ | In this work we search for best practices in pre-processing of
Electrocardiogram (ECG) signals in order to train better classifiers for the
diagnosis of heart conditions. State of the art machine learning algorithms
have achieved remarkable results in classification of some heart conditions
using ECG data, yet there appears to be no consensus on pre-processing best
practices. Is this lack of consensus due to different conditions and
architectures requiring different processing steps for optimal performance? Is
it possible that state of the art deep-learning models have rendered
pre-processing unnecessary? In this work we apply down-sampling, normalization,
and filtering functions to 3 different multi-label ECG datasets and measure
their effects on 3 different high-performing time-series classifiers. We find
that sampling rates as low as 50Hz can yield comparable results to the commonly
used 500Hz. This is significant as smaller sampling rates will result in
smaller datasets and models, which require less time and resources to train.
Additionally, despite their common usage, we found min-max normalization to be
slightly detrimental overall, and band-passing to make no measurable
difference. We found the blind approach to pre-processing of ECGs for
multi-label classification to be ineffective, with the exception of sample rate
reduction which reliably reduces computational resources, but does not increase
accuracy.
| [
{
"version": "v1",
"created": "Thu, 2 Nov 2023 20:29:15 GMT"
},
{
"version": "v2",
"created": "Wed, 14 May 2025 19:49:48 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Salimi",
"Amir",
""
],
[
"Kalmady",
"Sunil Vasu",
""
],
[
"Hindle",
"Abram",
""
],
[
"Zaiane",
"Osmar",
""
],
[
"Kaul",
"Padma",
""
]
] |
2311.08043 | Pierre-Fran\c{c}ois De Plaen | Pierre-Fran\c{c}ois De Plaen, Nicola Marinello, Marc Proesmans, Tinne
Tuytelaars, Luc Van Gool | Contrastive Learning for Multi-Object Tracking with Transformers | WACV 2024 | null | 10.1109/WACV57701.2024.00672 | null | cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The DEtection TRansformer (DETR) opened new possibilities for object
detection by modeling it as a translation task: converting image features into
object-level representations. Previous works typically add expensive modules to
DETR to perform Multi-Object Tracking (MOT), resulting in more complicated
architectures. We instead show how DETR can be turned into a MOT model by
employing an instance-level contrastive loss, a revised sampling strategy and a
lightweight assignment method. Our training scheme learns object appearances
while preserving detection capabilities and with little overhead. Its
performance surpasses the previous state-of-the-art by +2.6 mMOTA on the
challenging BDD100K dataset and is comparable to existing transformer-based
methods on the MOT17 dataset.
| [
{
"version": "v1",
"created": "Tue, 14 Nov 2023 10:07:52 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"De Plaen",
"Pierre-François",
""
],
[
"Marinello",
"Nicola",
""
],
[
"Proesmans",
"Marc",
""
],
[
"Tuytelaars",
"Tinne",
""
],
[
"Van Gool",
"Luc",
""
]
] |
2311.08168 | Ben Chugg | Ben Chugg, Hongjian Wang, Aaditya Ramdas | Time-Uniform Confidence Spheres for Means of Random Vectors | 52 pages; 3 figures. Published in Transactions on Machine Learning
Research | null | null | null | math.ST cs.IT math.IT stat.ME stat.ML stat.TH | http://creativecommons.org/licenses/by/4.0/ | We study sequential mean estimation in $\mathbb{R}^d$. In particular, we
derive time-uniform confidence spheres -- confidence sphere sequences (CSSs) --
which contain the mean of random vectors with high probability simultaneously
across all sample sizes. Our results include a dimension-free CSS for
log-concave random vectors, a dimension-free CSS for sub-Gaussian random
vectors, and CSSs for sub-$\psi$ random vectors (which includes sub-gamma,
sub-Poisson, and sub-exponential distributions). Many of our results are
optimal. For sub-Gaussian distributions we also provide a CSS which tracks a
time-varying mean, generalizing Robbins' mixture approach to the multivariate
setting. Finally, we provide several CSSs for heavy-tailed random vectors (two
moments only). Our bounds hold under a martingale assumption on the mean and do
not require that the observations be iid. Our work is based on PAC-Bayesian
theory and inspired by an approach of Catoni and Giulini.
| [
{
"version": "v1",
"created": "Tue, 14 Nov 2023 13:49:46 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Feb 2024 03:53:39 GMT"
},
{
"version": "v3",
"created": "Wed, 2 Oct 2024 17:15:02 GMT"
},
{
"version": "v4",
"created": "Thu, 20 Feb 2025 22:10:26 GMT"
},
{
"version": "v5",
"created": "Wed, 14 May 2025 19:40:21 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Chugg",
"Ben",
""
],
[
"Wang",
"Hongjian",
""
],
[
"Ramdas",
"Aaditya",
""
]
] |
2311.10543 | Tony Lindeberg | Tony Lindeberg | Unified theory for joint covariance properties under geometric image
transformations for spatio-temporal receptive fields according to the
generalized Gaussian derivative model for visual receptive fields | 46 pages, 19 figures. Note: From version 4, this paper considers a
different form of joint composition of the geometric image transformations
than in the earlier versions | null | null | null | cs.CV q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The influence of natural image transformations on receptive field responses
is crucial for modelling visual operations in computer vision and biological
vision. In this regard, covariance properties with respect to geometric image
transformations in the earliest layers of the visual hierarchy are essential
for expressing robust image operations, and for formulating invariant visual
operations at higher levels.
This paper defines and proves a set of joint covariance properties for
spatio-temporal receptive fields in terms of spatio-temporal derivative
operators applied to spatio-temporally smoothed image data under compositions
of spatial scaling transformations, spatial affine transformations, Galilean
transformations and temporal scaling transformations. Specifically, the derived
relations show how the parameters of the receptive fields need to be
transformed, in order to match the output from spatio-temporal receptive fields
under composed spatio-temporal image transformations.
For this purpose, we also fundamentally extend the notion of scale-normalized
derivatives to affine-normalized derivatives, that are computed based on
spatial smoothing with affine Gaussian kernels, and analyze the covariance
properties of the resulting affine-normalized derivatives for the affine group
as well as for important subgroups thereof.
We conclude with a geometric analysis, showing how the derived joint
covariance properties make it possible to relate or match spatio-temporal
receptive field responses, when observing, possibly moving, local surface
patches from different views, under locally linearized perspective or
projective transformations, as well as when observing different instances of
spatio-temporal events, that may occur either faster or slower between
different views of similar spatio-temporal events.
| [
{
"version": "v1",
"created": "Fri, 17 Nov 2023 14:10:55 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Nov 2023 09:50:24 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Nov 2023 06:10:17 GMT"
},
{
"version": "v4",
"created": "Fri, 26 Apr 2024 13:43:04 GMT"
},
{
"version": "v5",
"created": "Thu, 2 May 2024 07:15:14 GMT"
},
{
"version": "v6",
"created": "Mon, 8 Jul 2024 13:45:34 GMT"
},
{
"version": "v7",
"created": "Thu, 11 Jul 2024 14:19:52 GMT"
},
{
"version": "v8",
"created": "Mon, 20 Jan 2025 09:25:22 GMT"
},
{
"version": "v9",
"created": "Thu, 15 May 2025 06:54:39 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Lindeberg",
"Tony",
""
]
] |
2311.11333 | Jinyu Guo | Jinyu Guo, Haizhong Li, Chao Xia | Stable $(r+1)$-th capillary hypersurfaces | 31 pages,2 figures,to appear in Rev.Mat.Iberoam | null | null | null | math.DG math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a new definition of stable $(r+1)$-th capillary
hypersurfaces from variational perspective for any $1\leq r\leq n-1$. More
precisely, we define stable $(r+1)$-th capillary hypersurfaces to be smooth
local minimizers of a new energy functional under volume-preserving and contact
angle-preserving variations. Using the new concept of the stable $(r+1)$-th
capillary hypersurfaces, we generalize the stability results of Souam
\cite{Souam} in a Euclidean half-space and Guo-Wang-Xia \cite{GWX} in a
horoball in hyperbolic space for capillary hypersurface to $(r+1)$-th capillary
hypersurface case.
| [
{
"version": "v1",
"created": "Sun, 19 Nov 2023 14:21:37 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 07:46:05 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Guo",
"Jinyu",
""
],
[
"Li",
"Haizhong",
""
],
[
"Xia",
"Chao",
""
]
] |
2311.13590 | Katarzyna Paluch | Katarzyna Paluch | Triangle-free 2-matchings | null | null | null | null | cs.DS cs.DM | http://creativecommons.org/licenses/by/4.0/ | We consider the problem of finding a maximum size triangle-free $2$-matching
in a graph $G=(V,E)$. A (simple) $2$-matching is any subset of the edges such
that each vertex is incident to at most two edges from the subset. The first
polynomial time algorithm for this problem was given by Hartvigsen in 1984 in
his PhD thesis and its improved version has been recently published in a
journal. We present a different, significantly simpler algorithm with a
relatively short proof of correctness. Our algorithm with running time
$O(|V||E|)$ is additionally faster than the one by Hartvigsen having running
time $O(|V|^3|E|^2)$.
It has been proven before that for any triangle-free $2$-matching $M$ which
is not maximum the graph contains an $M$-augmenting path, whose application to
$M$ results in a bigger triangle-free $2$-matching. A new observation is that
the search for an augmenting path $P$ can be restricted to so-called {\em
amenable} paths that go through any triangle $t$ contained in $P\cup M$ a
limited number of times. Amenable paths can be characterised with the aid of
{\em half-edges}. A {\em half-edge} of edge $e$ is, informally speaking, a half
of $e$ containing exactly one of its endpoints. Each half-edge serves also as a
{\em hinge} - a connector between one pair of edges on an alternating path. To
find an amenable augmenting path we thus dynamically remove and re-add
half-edges to forbid or allow some edges to be followed by certain others.
The existence of amenable augmenting paths follows from our decomposition
theorem for triangle-free $2$-matchings. This decomposition theorem is largely
the same as the decomposition from versions 1-6 of this paper and is moreover
simpler and stronger than the one given by Kobayashi and Noguchi.
| [
{
"version": "v1",
"created": "Wed, 22 Nov 2023 18:52:51 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jan 2024 20:12:38 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Jan 2024 20:14:13 GMT"
},
{
"version": "v4",
"created": "Thu, 1 Feb 2024 18:40:07 GMT"
},
{
"version": "v5",
"created": "Thu, 18 Apr 2024 17:46:27 GMT"
},
{
"version": "v6",
"created": "Fri, 7 Jun 2024 17:30:53 GMT"
},
{
"version": "v7",
"created": "Thu, 18 Jul 2024 17:27:34 GMT"
},
{
"version": "v8",
"created": "Mon, 23 Dec 2024 15:50:42 GMT"
},
{
"version": "v9",
"created": "Thu, 15 May 2025 13:43:47 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Paluch",
"Katarzyna",
""
]
] |
2311.14435 | Georgii Mikriukov | Georgii Mikriukov, Gesina Schwalbe, Korinna Bade | Local Concept Embeddings for Analysis of Concept Distributions in Vision
DNN Feature Spaces | This is the authors accepted manuscript of the article accepted for
publication in the International Journal of Computer Vision (IJCV). The final
version will be available via SpringerLink upon publication. To cite this
work please refer to the final journal version once published | null | 10.1007/s11263-025-02446-y | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | Insights into the learned latent representations are imperative for verifying
deep neural networks (DNNs) in critical computer vision (CV) tasks. Therefore,
state-of-the-art supervised Concept-based eXplainable Artificial Intelligence
(C-XAI) methods associate user-defined concepts like ``car'' each with a single
vector in the DNN latent space (concept embedding vector). In the case of
concept segmentation, these linearly separate between activation map pixels
belonging to a concept and those belonging to background. Existing methods for
concept segmentation, however, fall short of capturing implicitly learned
sub-concepts (e.g., the DNN might split car into ``proximate car'' and
``distant car''), and overlap of user-defined concepts (e.g., between ``bus''
and ``truck''). In other words, they do not capture the full distribution of
concept representatives in latent space. For the first time, this work shows
that these simplifications are frequently broken and that distribution
information can be particularly useful for understanding DNN-learned notions of
sub-concepts, concept confusion, and concept outliers. To allow exploration of
learned concept distributions, we propose a novel local concept analysis
framework. Instead of optimizing a single global concept vector on the complete
dataset, it generates a local concept embedding (LoCE) vector for each
individual sample. We use the distribution formed by LoCEs to explore the
latent concept distribution by fitting Gaussian mixture models (GMMs),
hierarchical clustering, and concept-level information retrieval and outlier
detection. Despite its context sensitivity, our method's concept segmentation
performance is competitive to global baselines. Analysis results are obtained
on three datasets and six diverse vision DNN architectures, including vision
transformers (ViTs).
| [
{
"version": "v1",
"created": "Fri, 24 Nov 2023 12:22:00 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Nov 2024 12:48:38 GMT"
},
{
"version": "v3",
"created": "Sun, 30 Mar 2025 15:12:08 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Mikriukov",
"Georgii",
""
],
[
"Schwalbe",
"Gesina",
""
],
[
"Bade",
"Korinna",
""
]
] |
2312.00859 | Alexandre Benatti | Alexandre Benatti, Luciano da F. Costa | Random Walks Performed by Topologically-Specific Agents on Complex
Networks | 21 pages, 15 figures | null | null | null | physics.soc-ph cs.GR | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Random walks by single-node agents have been systematically conducted on
various types of complex networks in order to investigate how their topologies
can affect the dynamics of the agents. However, by fitting any network node,
these agents do not engage in topological interactions with the network. In the
present work, we describe random walks on complex networks performed by agents
that are actually small graphs. These agents can only occupy admissible
portions of the network onto which they fit topologically, hence their name
being taken as topologically-specific agents. These agents are also allowed to
move to adjacent subgraphs in the network, which have each node adjacent to a
distinct original respective node of the agent. Given a network and a specific
agent, it is possible to obtain a respective associated network, in which each
node corresponds to a possible instance of the agent and the edges indicate
adjacent positions. Associated networks are obtained and studied respectively
to three types of topologically-specific agents (triangle, square, and slashed
square) considering three types of complex networks (geometrical,
Erd\H{o}s-R\'enyi, and Barab\'asi-Albert). Uniform random walks are also
performed on these structures, as well as networks respectively obtained by
removing the five nodes with the highest degree, and studied in terms of the
number of covered nodes along the walks. Several results are reported and
discussed, including the fact that substantially distinct associated networks
can be obtained for each of the three considered agents and for varying average
node degrees. Respectively to the coverage of the networks by uniform random
walks, the square agent led to the most effective coverage of the nodes,
followed by the triangle and slashed square agents. In addition, the geometric
network turned out to be less effectively covered.
| [
{
"version": "v1",
"created": "Fri, 1 Dec 2023 17:09:44 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 14:16:16 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Benatti",
"Alexandre",
""
],
[
"Costa",
"Luciano da F.",
""
]
] |
2312.01797 | Peng Wang Dr. | Hengjia Xiao, Peng Wang, Mingzhe Yu, Mattia Robbiani | LLM A*: Human in the Loop Large Language Models Enabled A* Search for
Robotics | 7 figures, 8 pages | null | null | null | cs.RO cs.AI cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This research focuses on how Large Language Models (LLMs) can help with
(path) planning for mobile embodied agents such as robots, in a
human-in-the-loop and interactive manner. A novel framework named LLM A*, aims
to leverage the commonsense of LLMs, and the utility-optimal A* is proposed to
facilitate few-shot near-optimal path planning. Prompts are used for two main
purposes: 1) to provide LLMs with essential information like environments,
costs, heuristics, etc.; 2) to communicate human feedback on intermediate
planning results to LLMs. This approach takes human feedback on board and
renders the entire planning process transparent (akin to a `white box') to
humans. Moreover, it facilitates code-free path planning, thereby fostering the
accessibility and inclusiveness of artificial intelligence techniques to
communities less proficient in coding. Comparative analysis against A* and RL
demonstrates that LLM A* exhibits greater efficiency in terms of search space
and achieves paths comparable to A* while outperforming RL. The interactive
nature of LLM A* also makes it a promising tool for deployment in collaborative
human-robot tasks. Codes and Supplemental Materials can be found at GitHub:
https://github.com/speedhawk/LLM-A-.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2023 10:37:58 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Jun 2024 18:50:52 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 11:25:13 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Xiao",
"Hengjia",
""
],
[
"Wang",
"Peng",
""
],
[
"Yu",
"Mingzhe",
""
],
[
"Robbiani",
"Mattia",
""
]
] |
2312.06375 | Nisarg Chadha | Nisarg Chadha, Subroto Mukerjee | Vortical currents and reciprocal relations for transport coefficients in
the electron hydrodynamic regime | 6+5 Pages | Phys. Rev. Lett. 134 (19), 196301(2025) | 10.1103/PhysRevLett.134.196301 | null | cond-mat.mes-hall cond-mat.stat-mech cond-mat.str-el | http://creativecommons.org/licenses/by/4.0/ | We investigate the hydrodynamic regime in metals with momentum-conserving
electron-electron scattering. The conservation of momentum results in
well-defined dynamics whose effects we investigate via the relevant continuity
equations. We find anomalous contributions to the charge and heat transport
currents arising from gradients of the velocity field in a semiclassical
treatment with a Berry curvature. These contributions are non-vanishing for
systems lacking inversion symmetry, and the corresponding transport
coefficients do not obey the standard Onsager reciprocity relations. Instead,
we show that the response coefficients relating the currents to the stress
tensor obey independent reciprocity relations with the stress tensor and thus
exhibit cross-tensor effects of charge and heat transport with the momentum
transport. The Berry curvature contribution to the stress magnetization tensor
is also derived.
| [
{
"version": "v1",
"created": "Mon, 11 Dec 2023 13:33:06 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Apr 2024 13:00:30 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Apr 2024 11:10:01 GMT"
},
{
"version": "v4",
"created": "Thu, 15 May 2025 14:46:40 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Chadha",
"Nisarg",
""
],
[
"Mukerjee",
"Subroto",
""
]
] |
2312.11873 | Jingbang Chen | Jingbang Chen, Jiangqi Dai, Qiuyang Mang, Qingyu Shi, Tingqiang Xu | Nearly Optimal Internal Dictionary Matching | 25 pages | null | null | null | cs.DS | http://creativecommons.org/licenses/by/4.0/ | We study the internal dictionary matching (IDM) problem where a dictionary
$\mathcal{D}$ containing $d$ substrings of a text $T$ is given, and each query
concerns the occurrences of patterns in $\mathcal{D}$ in another substring of
$T$. We propose a novel $O(n)$-sized data structure named Basic Substring
Structure (BASS) where $n$ is the length of the text $T.$ With BASS, we are
able to handle all types of queries in the IDM problem in nearly optimal query
and preprocessing time. Specifically, our results include:
$\bullet$ The first algorithm that answers the CountDistinct query in
$\tilde{O}(1)$ time with $\tilde{O}(n+d)$ preprocessing, where we need to
compute the number of distinct patterns that exist in $T[l,r]$. Previously, the
best result was $\tilde{O}(m)$ time per query after $\tilde{O}(n^2/m+d)$ or
$\tilde{O}(nd/m+d)$ preprocessing, where $m$ is a chosen parameter.
$\bullet$ Faster algorithms for two other types of internal queries. We
improve the runtime for (1) Occurrence counting (Count) queries to $O(\log
n/\log\log n)$ time per query with $O(n+d\sqrt{\log n})$ preprocessing from
$O(\log^2 n/\log\log n)$ time per query with $O(n\log n/\log \log n+d\log^{3/2}
n)$ preprocessing. (2) Distinct pattern reporting (ReportDistinct) queries to
$O(1+|\text{output}|)$ time per query from $O(\log n+|\text{output}|)$ per
query.
In addition, we match the optimal runtime in the remaining two types of
queries, pattern existence (Exists), and occurrence reporting (Report). We also
show that BASS is more generally applicable to other internal query problems.
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2023 05:59:16 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Jul 2024 12:29:21 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 05:58:28 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Chen",
"Jingbang",
""
],
[
"Dai",
"Jiangqi",
""
],
[
"Mang",
"Qiuyang",
""
],
[
"Shi",
"Qingyu",
""
],
[
"Xu",
"Tingqiang",
""
]
] |
2312.12356 | Krist\'of Kanalas | Christian Esp\'indola, Krist\'of Kanalas | Every theory is eventually of presheaf type | null | Theory and Applications of Categories, Vol. 44, 2025, No. 12, pp
344-371 | null | null | math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a detailed and self-contained introduction to the theory of $\lambda
$-toposes and prove the following: 1) A $\lambda $-separable $\lambda $-topos
has enough $\lambda $-points. 2) The classifying $\lambda $-topos of a $\kappa
$-site $(\mathcal{C},E)$ is a presheaf topos (assuming $\kappa \vartriangleleft
\lambda =\lambda ^{<\lambda }$, $|\mathcal{C}|,|E|<\lambda $).
| [
{
"version": "v1",
"created": "Tue, 19 Dec 2023 17:37:54 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Feb 2025 18:41:17 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Espíndola",
"Christian",
""
],
[
"Kanalas",
"Kristóf",
""
]
] |
2312.15124 | Weijie Xiong | Weijie Xiong, Giorgio Facelli, Mehrad Sahebi, Owen Agnel, Thiparat
Chotibut, Supanut Thanasilp, Zo\"e Holmes | On fundamental aspects of quantum extreme learning machines | 20+21 pages, 9+2 figures | Quantum Mach. Intell. 7, 20 (2025) | 10.1007/s42484-025-00239-7 | null | quant-ph cs.ET cs.LG stat.ML | http://creativecommons.org/licenses/by/4.0/ | Quantum Extreme Learning Machines (QELMs) have emerged as a promising
framework for quantum machine learning. Their appeal lies in the rich feature
map induced by the dynamics of a quantum substrate - the quantum reservoir -
and the efficient post-measurement training via linear regression. Here we
study the expressivity of QELMs by decomposing the prediction of QELMs into a
Fourier series. We show that the achievable Fourier frequencies are determined
by the data encoding scheme, while Fourier coefficients depend on both the
reservoir and the measurement. Notably, the expressivity of QELMs is
fundamentally limited by the number of Fourier frequencies and the number of
observables, while the complexity of the prediction hinges on the reservoir. As
a cautionary note on scalability, we identify four sources that can lead to the
exponential concentration of the observables as the system size grows
(randomness, hardware noise, entanglement, and global measurements) and show
how this can turn QELMs into useless input-agnostic oracles. In particular, our
result on the reservoir-induced concentration strongly indicates that quantum
reservoirs drawn from a highly random ensemble make QELM models unscalable. Our
analysis elucidates the potential and fundamental limitations of QELMs, and
lays the groundwork for systematically exploring quantum reservoir systems for
other machine learning tasks.
| [
{
"version": "v1",
"created": "Sat, 23 Dec 2023 00:35:23 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Sep 2024 15:08:48 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Xiong",
"Weijie",
""
],
[
"Facelli",
"Giorgio",
""
],
[
"Sahebi",
"Mehrad",
""
],
[
"Agnel",
"Owen",
""
],
[
"Chotibut",
"Thiparat",
""
],
[
"Thanasilp",
"Supanut",
""
],
[
"Holmes",
"Zoë",
""
]
] |
2401.00204 | Ya-Ze Cheng | Ya-Ze Cheng, Wen-Hao Wu, Yan Cao | Electromagnetic Radiation from Binary Stars Mediated by Ultralight
Scalar | 30 pages, 5 figures, 2 tables | Int.J.Mod.Phys.D 34 (2025) 05, 2550022 | 10.1142/S0218271825500221 | null | astro-ph.CO hep-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the electromagnetic (EM) dipole radiation flux from an eccentric
Keplerian binary endowed with scalar charges, in the presence of scalar-photon
coupling $\phi A_\mu A^\mu$ or $\phi F_{\mu\nu}F^{\mu\nu}$. The scalar
radiation is suppressed for orbital frequency below the scalar mass, while the
scalar-mediated indirect EM radiation survives. We examine the constraints
imposed on the scalar-photon and scalar-charge couplings by the current
observational data of pulsar binaries, in case that the scalar charge is given
by the muon number. The general extensions of the calculation to the quadrupole
order and hyperbolic orbit are also discussed.
| [
{
"version": "v1",
"created": "Sat, 30 Dec 2023 11:07:57 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jan 2024 12:36:46 GMT"
},
{
"version": "v3",
"created": "Thu, 30 May 2024 16:35:03 GMT"
},
{
"version": "v4",
"created": "Mon, 1 Jul 2024 11:08:31 GMT"
},
{
"version": "v5",
"created": "Thu, 27 Mar 2025 14:15:06 GMT"
},
{
"version": "v6",
"created": "Thu, 15 May 2025 11:07:14 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Cheng",
"Ya-Ze",
""
],
[
"Wu",
"Wen-Hao",
""
],
[
"Cao",
"Yan",
""
]
] |
2401.11832 | Rosangela Coelho | Marcelo Pillonetto, Anderson Queiroz, Ros\^angela Coelho | Acoustic Disturbance Sensing Level Detection for ASD Diagnosis and
Intelligibility Enhancement | 4 pages, 3 figures, 2 tables | null | null | null | eess.AS cs.SD | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The acoustic sensitivity of Autism Spectrum Disorder (ASD) individuals highly
impacts their intelligibility in noisy urban environments. In this Letter, the
disturbance sensing level is examined with perceptual listening tests that
demonstrate the impact of their append High Internal Noise (HIN) profile on
intelligibility. This particular sensing level is then proposed as additional
aid to ASD diagnosis. In this Letter, a novel intelligibility enhancement
scheme is also introduced for ASD particular circumstances. For this proposal,
harmonic features estimated from speech signal frames are considered as center
frequencies of auditory filterbanks. A gain factor is further applied to the
output of the filtered samples. The experimental results demonstrate that the
proposal improved the acoustic intelligibility of ASD and Neurotypicals (NT)
people considering four acoustic noises at different signal-to-noise ratios.
| [
{
"version": "v1",
"created": "Mon, 22 Jan 2024 10:48:37 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jul 2024 15:24:03 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 09:26:43 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Pillonetto",
"Marcelo",
""
],
[
"Queiroz",
"Anderson",
""
],
[
"Coelho",
"Rosângela",
""
]
] |
2401.14066 | Nisha Huang | Nisha Huang, Weiming Dong, Yuxin Zhang, Fan Tang, Ronghui Li,
Chongyang Ma, Xiu Li, Tong-Yee Lee, Changsheng Xu | CreativeSynth: Cross-Art-Attention for Artistic Image Synthesis with
Multimodal Diffusion | null | null | null | null | cs.CV cs.AI | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Although remarkable progress has been made in image style transfer, style is
just one of the components of artistic paintings. Directly transferring
extracted style features to natural images often results in outputs with
obvious synthetic traces. This is because key painting attributes including
layout, perspective, shape, and semantics often cannot be conveyed and
expressed through style transfer. Large-scale pretrained text-to-image
generation models have demonstrated their capability to synthesize a vast
amount of high-quality images. However, even with extensive textual
descriptions, it is challenging to fully express the unique visual properties
and details of paintings. Moreover, generic models often disrupt the overall
artistic effect when modifying specific areas, making it more complicated to
achieve a unified aesthetic in artworks. Our main novel idea is to integrate
multimodal semantic information as a synthesis guide into artworks, rather than
transferring style to the real world. We also aim to reduce the disruption to
the harmony of artworks while simplifying the guidance conditions.
Specifically, we propose an innovative multi-task unified framework called
CreativeSynth, based on the diffusion model with the ability to coordinate
multimodal inputs. CreativeSynth combines multimodal features with customized
attention mechanisms to seamlessly integrate real-world semantic content into
the art domain through Cross-Art-Attention for aesthetic maintenance and
semantic fusion. We demonstrate the results of our method across a wide range
of different art categories, proving that CreativeSynth bridges the gap between
generative models and artistic expression. Code and results are available at
https://github.com/haha-lisa/CreativeSynth.
| [
{
"version": "v1",
"created": "Thu, 25 Jan 2024 10:42:09 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jan 2024 05:58:09 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 10:04:37 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Huang",
"Nisha",
""
],
[
"Dong",
"Weiming",
""
],
[
"Zhang",
"Yuxin",
""
],
[
"Tang",
"Fan",
""
],
[
"Li",
"Ronghui",
""
],
[
"Ma",
"Chongyang",
""
],
[
"Li",
"Xiu",
""
],
[
"Lee",
"Tong-Yee",
""
],
[
"Xu",
"Changsheng",
""
]
] |
2401.16114 | Elena Agliari | Elena Agliari and Domenico Luongo and Alberto Fachechi | A spectral approach to Hebbian-like neural networks | null | null | 10.1016/j.amc.2024.128689 | Roma01.Math.MP | math-ph cond-mat.dis-nn math.MP | http://creativecommons.org/licenses/by/4.0/ | We consider the Hopfield neural network as a model of associative memory and
we define its neuronal interaction matrix $\mathbf{J}$ as a function of a set
of $K \times M$ binary vectors $\{\mathbf{\xi}^{\mu, A}
\}_{\mu=1,...,K}^{A=1,...,M}$ representing a sample of the reality that we want
to retrieve. In particular, any item $\mathbf{\xi}^{\mu, A}$ is meant as a
corrupted version of an unknown ground pattern $\mathbf{\zeta}^{\mu}$, that is
the target of our retrieval process. We consider and compare two definitions
for $\mathbf{J}$, referred to as supervised and unsupervised, according to
whether the class $\mu$, each example belongs to, is unveiled or not, also,
these definitions recover the paradigmatic Hebb's rule under suitable limits.
The spectral properties of the resulting matrices are studied and used to
inspect the retrieval capabilities of the related models as a function of their
control parameters.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2024 12:39:37 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Agliari",
"Elena",
""
],
[
"Luongo",
"Domenico",
""
],
[
"Fachechi",
"Alberto",
""
]
] |
2401.16627 | Borja Genoves Guzman | Borja Genoves Guzman, Maximo Morales Cespedes, Victor P. Gil Jimenez,
Ana Garcia Armada, Maite Brandt-Pearce | Resource allocation exploiting reflective surfaces to minimize the
outage probability in VLC | null | B. G. Guzman, M. M. Cespedes, V. P. Gil Jimenez, A. G. Armada and
M. Brandt-Pearce, "Resource allocation exploiting reflective surfaces to
minimize the outage probability in VLC," in IEEE Transactions on Wireless
Communications, 2025 | 10.1109/TWC.2025.3547648 | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visible light communication (VLC) is a technology that complements radio
frequency (RF) to fulfill the ever-increasing demand for wireless data traffic.
The ubiquity of light-emitting diodes (LEDs), exploited as transmitters,
increases the VLC market penetration and positions it as one of the most
promising technologies to alleviate the spectrum scarcity of RF. However, VLC
deployment is hindered by blockage causing connectivity outages in the presence
of obstacles. Recently, optical reconfigurable intelligent surfaces (ORISs)
have been considered to mitigate this problem. While prior works exploit ORISs
for data or secrecy rate maximization, this paper studies the optimal placement
of mirrors and ORISs, and the LED power allocation, for jointly minimizing the
outage probability while keeping the lighting standards. We describe an optimal
outage minimization framework and present solvable heuristics. We provide
extensive numerical results and show that the use of ORISs may reduce the
outage probability by up to 67% with respect to a no-mirror scenario and
provide a gain of hundreds of kbit/J in optical energy efficiency with respect
to the presented benchmark.
| [
{
"version": "v1",
"created": "Mon, 29 Jan 2024 23:56:02 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 08:21:56 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Guzman",
"Borja Genoves",
""
],
[
"Cespedes",
"Maximo Morales",
""
],
[
"Jimenez",
"Victor P. Gil",
""
],
[
"Armada",
"Ana Garcia",
""
],
[
"Brandt-Pearce",
"Maite",
""
]
] |
2402.02278 | Jianqi Liu | Jianqi Liu | Borel-type subalgebras of the lattice vertex operator algebra | null | J. Pure Appl. Alg. (2025) | null | null | math.QA math.RT | http://creativecommons.org/licenses/by/4.0/ | In this paper, we introduce and study new classes of sub-vertex operator
algebras of the lattice vertex operator algebras (VOAs), which we call the
conic, Borel, and parabolic-type subVOAs. These CFT-type VOAs, which are not
necessarily strongly finitely generated, satisfy properties similar to the
usual Borel and parabolic subalgebras of a Lie algebra. For the lowest-rank
nontrivial example of Borel-type subVOA $V_{B}$ of $V_{\Z\al}$, we explicitly
determine its Zhu's algebra $A(V_B)$ in terms of generators and relations.
| [
{
"version": "v1",
"created": "Sat, 3 Feb 2024 22:18:50 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Aug 2024 17:52:50 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Nov 2024 00:40:43 GMT"
},
{
"version": "v4",
"created": "Thu, 15 May 2025 15:51:57 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Liu",
"Jianqi",
""
]
] |
2402.07097 | Kaito Kobayashi | Kaito Kobayashi and Yukitoshi Motome | Quantum reservoir probing of quantum phase transitions | 15 pages, 9 figures | null | 10.1038/s41467-025-58751-0 | null | quant-ph cond-mat.quant-gas cond-mat.stat-mech cond-mat.str-el | http://creativecommons.org/licenses/by/4.0/ | Quantum phase transitions are highly remarkable phenomena manifesting in
quantum many-body systems. However, their precise identifications in
equilibrium systems pose significant theoretical and experimental challenges.
Thus far, dynamical detection protocols employing global quantum quenches have
been proposed, wherein transitions are discerned via global nonequilibrium
excitations. In this work, we demonstrate that quantum phase transitions can be
detected through localized out-of-equilibrium excitations induced by local
quantum quenches. While the resulting dynamics after the quench is influenced
by both the local quench operation and the intrinsic dynamics of the quantum
system, the effects of the former are exclusively extracted using the
cutting-edge framework called quantum reservoir probing (QRP). Through the QRP,
we find that the impacts of the local quenches vary across different quantum
phases and are significantly suppressed by quantum fluctuations amplified near
quantum critical points; consequently, phase boundaries are precisely
delineated. We demonstrate that the QRP can detect quantum phase transitions in
the paradigmatic integrable and nonintegrable quantum spin systems, and even
topological quantum phase transitions, all within the identical framework
employing local quantum quenches and single-site observables.
| [
{
"version": "v1",
"created": "Sun, 11 Feb 2024 03:53:01 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Jun 2024 07:44:29 GMT"
},
{
"version": "v3",
"created": "Sun, 23 Mar 2025 09:39:26 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Kobayashi",
"Kaito",
""
],
[
"Motome",
"Yukitoshi",
""
]
] |
2402.08969 | Weijie Du | Weijie Du and James P. Vary | Systematic many-fermion Hamiltonian input scheme and spectral
calculations on quantum computers | We welcome comments | null | 10.1016/j.physletb.2025.139548 | Phys. Lett. B Volume 866,139548, July 2025 | quant-ph nucl-th | http://creativecommons.org/licenses/by/4.0/ | We present a novel input scheme for general second-quantized Hamiltonians of
relativistic or non-relativistic many-fermion systems. This input scheme
incorporates the fermionic anticommutation relations, particle number
variations, and respects the symmetries of the Hamiltonian. Based on our input
scheme, we propose a hybrid quantum-classical framework for spectral
calculations on future quantum hardwares. We provide explicit circuit designs
and the associated gate cost. We demonstrate our hybrid framework by solving
the low-lying spectra of ${^{42}}$Ca and ${^{46}}$Ca. Our input scheme provides
new pathways to solving the spectra and dynamics of the relativistic and
nonrelativistic many-fermion systems via first-principles approaches.
| [
{
"version": "v1",
"created": "Wed, 14 Feb 2024 06:29:32 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Oct 2024 02:55:24 GMT"
},
{
"version": "v3",
"created": "Tue, 13 May 2025 07:26:41 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Du",
"Weijie",
""
],
[
"Vary",
"James P.",
""
]
] |
2402.10295 | Matteo Baggioli | Kun Zhao, Matteo Baggioli, Wen-Sheng Xu, Jack F. Douglas, Yun-Jiang
Wang | Atomistic mechanisms of dynamics in a two-dimensional dodecagonal
quasicrystal | v2: matching the published version to appear in JCP | null | null | null | cond-mat.mtrl-sci cond-mat.soft | http://creativecommons.org/licenses/by/4.0/ | Quasicrystals have been observed in a variety of materials ranging from metal
alloys to block copolymers. However, their structural and dynamical properties
cannot be readily described in terms of conventional solid-state models of
liquids and solids. We may expect the dynamics of this specific class of
quasicrystalline materials to be more like glass-forming liquids in the sense
of exhibiting large fluctuations in the local mobility ("dynamic
heterogeneity") and non-Arrhenius temperature dependence of relaxation and
diffusion. In this work, we investigate a model dodecagonal quasicrystal
material in two dimensions (2D) using molecular dynamics (MD) simulations, with
a focus on heterogeneous dynamics and non-Arrhenius relaxation and diffusion.
As observed in glass-forming liquids and heated crystals, we observe a
two-stage relaxation dynamics in the self-intermediate scattering function
$F_s(k,t)$ of our quasicrystal material. It involves a fast $\beta$-relaxation
and $\alpha$ relaxation process having a highly temperature dependent
relaxation time whose activation energy varies in concert with the extent of
string-like collective motion, a phenomenon recognized to occur in
glass-forming liquids at low temperatures and crystalline materials at elevated
temperatures. After examining the dynamics of our dodecagonal quasicrystalline
material in great detail, we conclude that the dynamics of these materials more
closely resembles observations on metallic glass-forming liquids than
crystalline materials.
| [
{
"version": "v1",
"created": "Thu, 15 Feb 2024 19:53:30 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 08:27:16 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Zhao",
"Kun",
""
],
[
"Baggioli",
"Matteo",
""
],
[
"Xu",
"Wen-Sheng",
""
],
[
"Douglas",
"Jack F.",
""
],
[
"Wang",
"Yun-Jiang",
""
]
] |
2402.11543 | Inna Koberman | Dov Shirtz, Inna Koberman, Aviad Elyashar, Rami Puzis, and Yuval
Elovici | Enhancing Energy Sector Resilience: Integrating Security by Design
Principles | 66 pages, 2 figures, version 2 | null | null | null | cs.CR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Security by design, Sbd is a concept for developing and maintaining systems
that are, to the greatest extent possible, free from security vulnerabilities
and impervious to security attacks. In addition to technical aspects, such as
how to develop a robust industrial control systems hardware, software,
communication product, etc., SbD includes also soft aspects, such as
organizational managerial attitude and behavior, and employee awareness. Under
the Sbd concept, systems, ICS in our context, will be considered more
trustworthy by users. User's trust in the systems will be derived from the
meticulous adherence to the SbD processes and policies. In accordance with the
SbD concept, security is considered. Security measures are implemented, at
every stage of the product and systems development life cycle, rather than
afterwards. This document presents the security requirements for the
implementation of the SbD in industrial control systems. The information
presented does not negate any existing security and cyber security standards,
etc. Instead, we strongly recommend that organizations should implement and
comply with those standards and best practices. Security by design is not a
one-time process. It starts at the very beginning of the products of the system
design and continues through all its lifecycle. Due to the benefits of the SbD,
higher level of security, and robustness to cyber attacks, all organizations
associated with the energy sector should strive to establish an ecosystem. The
requirements presented in this document may be perceived as burdensome by
organizations. However, strict compliance with the requirements and existing
security standards and best practices, including continuous monitoring, as
specified in this document, is essential to realize an ecosystem driven and
protected by the SbD
| [
{
"version": "v1",
"created": "Sun, 18 Feb 2024 11:04:22 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 07:50:00 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Shirtz",
"Dov",
""
],
[
"Koberman",
"Inna",
""
],
[
"Elyashar",
"Aviad",
""
],
[
"Puzis",
"Rami",
""
],
[
"Elovici",
"Yuval",
""
]
] |
2402.13883 | Peter Horvathy | Peng-Ming Zhang and Peter Horvathy | Isospin precession in non-Abelian Aharonov-Bohm scattering | affiliation corrected | null | null | null | hep-th math-ph math.MP quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The concept of pseudoclassical isospin is illustrated by the non-Abelian
Aharonov-Bohm effect proposed by Wu and Yang in 1975. The spatial motion is
free however the isospin precesses when the enclosed magnetic flux and the
incoming particle's isosopin are not parallel. The non-Abelian phase factor
$\mathfrak{F}$ of Wu and Yang acts on the isospin as an S-matrix. The
scattering becomes side-independent when the enclosed flux is quantized,
${\Phi}_N=N\Phi_0$ with $N$ an integer. The gauge group $SU(2)$ is an internal
symmetry and generates conserved charges only when the flux is quantized, which
then splits into two series: for $N=2k$ $SU(2)$ acts trivially but for $N=1+2k$
the implementation is twisted. The orbital and the internal angular momenta are
separately conserved. The double rotational symmetry is broken to $SO(2)\times
SO(2)$ when $N$ odd. For unquantized flux there are no internal symmetries, the
charge is not conserved and protons can be turned into neutrons.
| [
{
"version": "v1",
"created": "Wed, 21 Feb 2024 15:50:56 GMT"
},
{
"version": "v2",
"created": "Sat, 28 Sep 2024 16:41:17 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 06:15:24 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Zhang",
"Peng-Ming",
""
],
[
"Horvathy",
"Peter",
""
]
] |
2402.14422 | Shunsuke Nishimura | Shunsuke Nishimura, Moeta Tsukamoto, Kento Sasaki, and Kensuke
Kobayashi | Investigations of optical aberration on quantum diamond microscopy
toward high spatial resolution and sensitivity | null | null | 10.1063/5.0204566 | null | physics.optics cond-mat.other | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum diamond microscopy (QDM), which employs nitrogen-vacancy (NV) center
ensembles, is a promising approach to quantitatively imaging magnetic fields
with both high resolution that approaches the diffraction limit and a wide
field of view. The commonly adopted setups of QDM capture the photoluminescence
through transparent diamonds, which inevitably entail aberrations -- optical
errors that degrade the optical resolution and contrast of the obtainable
image. In this study, we delve into the impact of optical aberrations, focusing
on their dependence on diamond thickness. We first introduce a rigorous model
[Richards et al., Braat et al.] of diffraction that incorporates aberrations,
producing the NV center optical image. We confirm that this model accurately
reproduces the confocal images of single NV centers obtained at various depths
in diamonds. Extending this model to a wide-field microscope, we find that the
model also accurately reproduces the USAF 1951 resolution test chart obtained
through diamonds of various thicknesses. Based on these investigations, we
quantitatively assess the consequent resolution constraints and propose
thinning the diamond as a viable solution. We present a robust method to
quantitatively ascertain resolution in optical systems influenced by
aberrations caused by ray transmission through diamonds. For instance, for a
typical microscope with an objective lens of NA = 0.7, the diffraction limit is
achievable through diamonds that are 30 {\mu}m thick, and a resolution of 1
{\mu}m is obtained through diamonds that are 100 {\mu}m thick. Those results
opens up avenues for enhanced performance in QDM. The Julia package used to
calculate the vectorial PSFs is available at VectorPSFs.jl.
| [
{
"version": "v1",
"created": "Thu, 22 Feb 2024 10:10:25 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 14:25:25 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Nishimura",
"Shunsuke",
""
],
[
"Tsukamoto",
"Moeta",
""
],
[
"Sasaki",
"Kento",
""
],
[
"Kobayashi",
"Kensuke",
""
]
] |
2402.15760 | Hyobin Yoo | Daesung Park, Changwon Park, Kunihiro Yananose, Eunjung Ko, Byunghyun
Kim, Rebecca Engelke, Xi Zhang, Konstantin Davydov, Matthew Green, Hyun-Mi
Kim, Sang Hwa Park, Jae Heon Lee, Seul-Gi Kim, Hyeongkeun Kim, Kenji
Watanabe, Takashi Taniguchi, Sang Mo Yang, Ke Wang, Philip Kim, Young-Woo
Son, Hyobin Yoo | Unconventional domain tessellations in moir\'e-of-moir\'e lattices | null | null | null | null | cond-mat.mtrl-sci | http://creativecommons.org/licenses/by/4.0/ | Imposing incommensurable periodicity on the periodic atomic lattice can lead
to complex structural phases consisting of locally periodic structure bounded
by topological defects. Twisted trilayer graphene (TTG) is an ideal material
platform to study the interplay between different atomic periodicities, which
can be tuned by twist angles between the layers, leading to moir\'e-of-moir\'e
lattices. Interlayer and intralayer interactions between two interfaces in TTG
transform this moir\'e-of-moir\'e lattice into an intricate network of domain
structures at small twist angles, which can harbor exotic electronic behaviors.
Here we report a complete structural phase diagram of TTG with atomic scale
lattice reconstruction. Using transmission electron microscopy combined with a
new interatomic potential simulation, we show several large-scale moir\'e
lattices, including triangular, kagome, and a corner-shared hexagram-shaped
domain pattern. Each domain is bounded by a two-dimensional network of domain
wall lattices. In the limit of small twist angles, two competing structural
orders-rhombohedral and Bernal stackings-with a slight energy difference, cause
unconventional lattice reconstruction with spontaneous symmetry breaking and
nematic instability, highlighting the importance of long-range interlayer
interactions across entire van der Waals layers. The diverse tessellation of
distinct domains, whose topological network can be tuned by the adjustment of
the twist angles, establishes TTG as a platform for exploring the interplay
between emerging quantum properties and controllable nontrivial lattices.
| [
{
"version": "v1",
"created": "Sat, 24 Feb 2024 08:17:15 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 16:13:45 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Park",
"Daesung",
""
],
[
"Park",
"Changwon",
""
],
[
"Yananose",
"Kunihiro",
""
],
[
"Ko",
"Eunjung",
""
],
[
"Kim",
"Byunghyun",
""
],
[
"Engelke",
"Rebecca",
""
],
[
"Zhang",
"Xi",
""
],
[
"Davydov",
"Konstantin",
""
],
[
"Green",
"Matthew",
""
],
[
"Kim",
"Hyun-Mi",
""
],
[
"Park",
"Sang Hwa",
""
],
[
"Lee",
"Jae Heon",
""
],
[
"Kim",
"Seul-Gi",
""
],
[
"Kim",
"Hyeongkeun",
""
],
[
"Watanabe",
"Kenji",
""
],
[
"Taniguchi",
"Takashi",
""
],
[
"Yang",
"Sang Mo",
""
],
[
"Wang",
"Ke",
""
],
[
"Kim",
"Philip",
""
],
[
"Son",
"Young-Woo",
""
],
[
"Yoo",
"Hyobin",
""
]
] |
2402.16589 | Philipp Zilk | Thomas Apel, Philipp Zilk | Isogeometric analysis of the Laplace eigenvalue problem on circular
sectors: Regularity properties, graded meshes & variational crimes | 35 pages, 19 figures | null | 10.1016/j.camwa.2024.09.018 | null | math.NA cs.NA math.AP | http://creativecommons.org/publicdomain/zero/1.0/ | The Laplace eigenvalue problem on circular sectors has eigenfunctions with
corner singularities. Standard methods may produce suboptimal approximation
results. To address this issue, a novel numerical algorithm that enhances
standard isogeometric analysis is proposed in this paper by using a
single-patch graded mesh refinement scheme. Numerical tests demonstrate optimal
convergence rates for both the eigenvalues and eigenfunctions. Furthermore, the
results show that smooth splines possess a superior approximation constant
compared to their $C^0$-continuous counterparts for the lower part of the
Laplace spectrum. This is an extension of previous findings about excellent
spectral approximation properties of smooth splines on rectangular domains to
circular sectors. In addition, graded meshes prove to be particularly
advantageous for an accurate approximation of a limited number of eigenvalues.
The novel algorithm applied here has a drawback in the singularity of the
isogeometric parameterization. It results in some basis functions not belonging
to the solution space of the corresponding weak problem, which is considered a
variational crime. However, the approach proves to be robust. Finally, a
hierarchical mesh structure is presented to avoid anisotropic elements, omit
redundant degrees of freedom and keep the number of basis functions
contributing to the variational crime constant, independent of the mesh size.
Numerical results validate the effectiveness of hierarchical mesh grading for
the simulation of eigenfunctions with and without corner singularities.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2024 14:11:20 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Apel",
"Thomas",
""
],
[
"Zilk",
"Philipp",
""
]
] |
2402.16908 | Guohua Hu | Lekai Song, Pengyu Liu, Jingfang Pei, Yang Liu, Songwei Liu, Shengbo
Wang, Leonard W. T. Ng, Tawfique Hasan, Kong-Pang Pun, Shuo Gao, Guohua Hu | Lightweight, error-tolerant edge detection using memristor-enabled
stochastic logics | null | null | 10.1038/s41467-025-59872-2 | null | cs.ET cond-mat.mtrl-sci cs.LG eess.IV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The demand for efficient edge vision has spurred the interest in developing
stochastic computing approaches for performing image processing tasks.
Memristors with inherent stochasticity readily introduce probability into the
computations and thus enable stochastic image processing computations. Here, we
present a stochastic computing approach for edge detection, a fundamental image
processing technique, facilitated with memristor-enabled stochastic logics.
Specifically, we integrate the memristors with logic circuits and harness the
stochasticity from the memristors to realize compact stochastic logics for
stochastic number encoding and processing. The stochastic numbers, exhibiting
well-regulated probabilities and correlations, can be processed to perform
logic operations with statistical probabilities. This can facilitate
lightweight stochastic edge detection for edge visual scenarios characterized
with high-level noise errors. As a practical demonstration, we implement a
hardware stochastic Roberts cross operator using the stochastic logics, and
prove its exceptional edge detection performance, remarkably, with 95% less
computational cost while withstanding 50% bit-flip errors. The results
underscore the great potential of our stochastic edge detection approach in
developing lightweight, error-tolerant edge vision hardware and systems for
autonomous driving, virtual/augmented reality, medical imaging diagnosis,
industrial automation, and beyond.
| [
{
"version": "v1",
"created": "Sun, 25 Feb 2024 06:23:02 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Mar 2024 07:05:55 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Song",
"Lekai",
""
],
[
"Liu",
"Pengyu",
""
],
[
"Pei",
"Jingfang",
""
],
[
"Liu",
"Yang",
""
],
[
"Liu",
"Songwei",
""
],
[
"Wang",
"Shengbo",
""
],
[
"Ng",
"Leonard W. T.",
""
],
[
"Hasan",
"Tawfique",
""
],
[
"Pun",
"Kong-Pang",
""
],
[
"Gao",
"Shuo",
""
],
[
"Hu",
"Guohua",
""
]
] |
2402.16923 | Enrico Formenti | Alberto Dennunzio and Enrico Formenti and Luciano Margara and Sara
Riva | On solving basic equations over the semiring of functional digraphs | Performed all changes and fixes asked by the reviewers | null | null | null | cs.DM math.CO | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Endowing the set of functional graphs (FGs) with the sum (disjoint union of
graphs) and product (standard direct product on graphs) operations induces on
FGs a structure of a commutative semiring R. The operations on R can be
naturally extended to the set of univariate polynomials R[X] over R. This paper
provides a polynomial time algorithm for deciding if equations of the type AX=B
have solutions when A is just a single cycle and B a set of cycles of identical
size. We also prove a similar complexity result for some variants of the
previous equation.
| [
{
"version": "v1",
"created": "Mon, 26 Feb 2024 10:18:49 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Oct 2024 11:06:12 GMT"
},
{
"version": "v3",
"created": "Sun, 13 Oct 2024 08:10:56 GMT"
},
{
"version": "v4",
"created": "Thu, 15 May 2025 16:00:01 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Dennunzio",
"Alberto",
""
],
[
"Formenti",
"Enrico",
""
],
[
"Margara",
"Luciano",
""
],
[
"Riva",
"Sara",
""
]
] |
2402.17629 | Peter Horvathy | P A Horvathy | Prequantisation from the path integral viewpoint | Slightly reworded, rearranged and extended version of one originally
published in the Proceedings of the {\sl Int. Conf. on Diff. Geom. Meths. in
Math. Phys.}, Clausthal'1980, Doebner (ed). Springer Lecture Notes in Math.
\textbf{905}, p.197-206 (1982). Marseille preprint CPT-80-P-1230. 14 pages, 2
figures | Springer Lecture Notes in Math. \textbf{905}, p.197-206 (1982) | null | Marseille preprint CPT-80-P-1230 | math-ph math.MP quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The quantum mechanically admissible definitions of the factor
$\exp\big[(i/\hbar)S(\gamma)\big]$ in the Feynman integral are put in bijection
with the prequantisations of Kostant and Souriau. The different allowed
expressions of this factor -- the inequivalent prequantisations -- are
classified. The theory is illustrated by the Aharonov-Bohm experiment and by
identical particles.
| [
{
"version": "v1",
"created": "Tue, 27 Feb 2024 15:57:04 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 06:31:16 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Horvathy",
"P A",
""
]
] |
2402.18983 | Sung-Soo Byun | Sung-Soo Byun, Seong-Mi Seo, Meng Yang | Free energy expansions of a conditional GinUE and large deviations of
the smallest eigenvalue of the LUE | 40 pages, 7 figures; v2 41 pages, 7 figures, references and
associated text added; v3 43 pages, 8 figures, extended proof of Lemma 3.8 | null | null | null | math-ph math.CV math.MP math.PR | http://creativecommons.org/licenses/by/4.0/ | We consider a planar Coulomb gas ensemble of size $N$ with the inverse
temperature $\beta=2$ and external potential $Q(z)=|z|^2-2c \log|z-a|$, where
$c>0$ and $a \in \mathbb{C}$. Equivalently, this model can be realised as $N$
eigenvalues of the complex Ginibre matrix of size $(c+1) N \times (c+1) N$
conditioned to have deterministic eigenvalue $a$ with multiplicity $cN$.
Depending on the values of $c$ and $a$, the droplet reveals a phase transition:
it is doubly connected in the post-critical regime and simply connected in the
pre-critical regime. In both regimes, we derive precise large-$N$ expansions of
the free energy up to the $O(1)$ term, providing a non-radially symmetric
example that confirms the Zabrodin-Wiegmann conjecture made for general planar
Coulomb gas ensembles. As a consequence, our results provide asymptotic
behaviours of moments of the characteristic polynomial of the complex Ginibre
matrix, where the powers are of order $O(N)$. Furthermore, by combining with a
duality formula, we obtain precise large deviation probabilities of the
smallest eigenvalue of the Laguerre unitary ensemble. Our proof is based on a
refined Riemann-Hilbert analysis for planar orthogonal polynomials using the
partial Schlesinger transform.
| [
{
"version": "v1",
"created": "Thu, 29 Feb 2024 09:38:37 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Mar 2024 04:36:45 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 11:46:20 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Byun",
"Sung-Soo",
""
],
[
"Seo",
"Seong-Mi",
""
],
[
"Yang",
"Meng",
""
]
] |
2403.02006 | Seungjae Lee | Seungjae Lee, Lucas Braun, Frieder B\"onisch, Malte Schr\"oder, Moritz
Th\"umler, and Marc Timme | Complexified Synchrony | null | Chaos 1 May 2024; 34 (5): 053141 | 10.1063/5.0205897 | null | nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Kuramoto model and its generalizations have been broadly employed to
characterize and mechanistically understand various collective dynamical
phenomena, especially the emergence of synchrony among coupled oscillators.
Despite almost five decades of research, many questions remain open, in
particular for finite-size systems. Here, we generalize recent work [Phys. Rev.
Lett. 130, 187201 (2023)] on the finite-size Kuramoto model with its state
variables analytically continued to the complex domain and also complexify its
system parameters. Intriguingly, systems of two units with purely imaginary
coupling do not actively synchronize even for arbitrarily large magnitudes of
the coupling strengths, $|K| \rightarrow \infty$, but exhibit conservative
dynamics with asynchronous rotations or librations for all $|K|$. For generic
complex coupling, both, traditional phase-locked states and asynchronous states
generalize to complex locked states, fixed points off the real subspace that
exist even for arbitrarily weak coupling. We analyze a new collective mode of
rotations exhibiting finite, yet arbitrarily large rotation numbers. Numerical
simulations for large networks indicate a novel form of discontinuous phase
transition. We close by pointing to a range of exciting questions for future
research.
| [
{
"version": "v1",
"created": "Mon, 4 Mar 2024 13:04:06 GMT"
},
{
"version": "v2",
"created": "Wed, 8 May 2024 07:26:49 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Lee",
"Seungjae",
""
],
[
"Braun",
"Lucas",
""
],
[
"Bönisch",
"Frieder",
""
],
[
"Schröder",
"Malte",
""
],
[
"Thümler",
"Moritz",
""
],
[
"Timme",
"Marc",
""
]
] |
2403.02060 | Tianbo Chen | Tianbo Chen | Expectile Periodograms | null | null | null | null | stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a novel periodogram-like function, called the expectile
periodogram, for modeling spectral features of time series and detecting hidden
periodicities. The expectile periodogram is constructed from trigonometric
expectile regression, in which a specially designed check function is used to
substitute the squared $l_2$ norm that leads to the ordinary periodogram. The
expectile periodogram retains the key properties of the ordinary periodogram as
a frequency-domain representation of serial dependence in time series, while
offering a more comprehensive understanding by examining the data across the
entire range of expectile levels. We establish the asymptotic theory and
investigate the relationship between the expectile periodogram and the so
called expectile spectrum. Simulations demonstrate the efficiency of the
expectile periodogram in the presence of hidden periodicities. Finally, by
leveraging the inherent two-dimensional nature of the expectile periodogram, we
train a deep learning (DL) model to classify earthquake waveform data.
Remarkably, our approach outperforms alternative periodogram-based methods in
terms of classification accuracy.
| [
{
"version": "v1",
"created": "Mon, 4 Mar 2024 14:01:11 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Nov 2024 07:00:04 GMT"
},
{
"version": "v3",
"created": "Wed, 14 May 2025 18:42:09 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Chen",
"Tianbo",
""
]
] |
2403.02591 | Sung Hoon Choi | Sung Hoon Choi, Donggyu Kim | Matrix-based Prediction Approach for Intraday Instantaneous Volatility
Vector | null | null | null | null | econ.EM | http://creativecommons.org/licenses/by/4.0/ | In this paper, we introduce a novel method for predicting intraday
instantaneous volatility based on Ito semimartingale models using
high-frequency financial data. Several studies have highlighted stylized
volatility time series features, such as interday auto-regressive dynamics and
the intraday U-shaped pattern. To accommodate these volatility features, we
propose an interday-by-intraday instantaneous volatility matrix process that
can be decomposed into low-rank conditional expected instantaneous volatility
and noise matrices. To predict the low-rank conditional expected instantaneous
volatility matrix, we propose the Two-sIde Projected-PCA (TIP-PCA) procedure.
We establish asymptotic properties of the proposed estimators and conduct a
simulation study to assess the finite sample performance of the proposed
prediction method. Finally, we apply the TIP-PCA method to an out-of-sample
instantaneous volatility vector prediction study using high-frequency data from
the S&P 500 index and 11 sector index funds.
| [
{
"version": "v1",
"created": "Tue, 5 Mar 2024 02:07:51 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Dec 2024 16:03:38 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 02:08:47 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Choi",
"Sung Hoon",
""
],
[
"Kim",
"Donggyu",
""
]
] |
2403.06637 | Junpeng Zhou | Junpeng Zhou, Xiying Yuan | Tur\'{a}n problems for star-path forests in hypergraphs | Accepted to Discrete Mathematics | null | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An $r$-uniform hypergraph ($r$-graph for short) is linear if any two edges
intersect at most one vertex. Let $\mathcal{F}$ be a given family of
$r$-graphs. An $r$-graph $H$ is called $\mathcal{F}$-free if $H$ does not
contain any member of $\mathcal{F}$ as a subgraph. The Tur\'{a}n number of
$\mathcal{F}$ is the maximum number of edges in any $\mathcal{F}$-free
$r$-graph on $n$ vertices, and the linear Tur\'{a}n number of $\mathcal{F}$ is
defined as the Tur\'{a}n number of $\mathcal{F}$ in linear host hypergraphs. An
$r$-uniform linear path $P^r_\ell$ of length $\ell$ is an $r$-graph with edges
$e_1,\dots,e_\ell$ such that $|V(e_i)\cap V(e_j)|=1$ if $|i-j|=1$, and
$V(e_i)\cap V(e_j)=\emptyset$ for $i\neq j$ otherwise. Gy\'{a}rf\'{a}s et al.
[\textit{European J. Combin.} (2022) 103435] obtained an upper bound for the
linear Tur\'{a}n number of $P_\ell^3$. In this paper, an upper bound for the
linear Tur\'{a}n number of $P_\ell^r$ is obtained, which generalizes the known
result of $P_\ell^3$ to any $P_\ell^r$. Furthermore, some results for the
linear Tur\'{a}n number and Tur\'{a}n number of several linear star-path
forests are obtained.
| [
{
"version": "v1",
"created": "Mon, 11 Mar 2024 11:52:26 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 14:33:06 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Zhou",
"Junpeng",
""
],
[
"Yuan",
"Xiying",
""
]
] |
2403.07547 | Jungho Lee | Jungho Lee, Dogyoon Lee, Minhyeok Lee, Donghyung Kim, Sangyoun Lee | SMURF: Continuous Dynamics for Motion-Deblurring Radiance Fields | CVPRW 2025, Neural Fields Beyond Conventional Cameras, Project Page:
https://jho-yonsei.github.io/SMURF/ | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Neural radiance fields (NeRF) has attracted considerable attention for their
exceptional ability in synthesizing novel views with high fidelity. However,
the presence of motion blur, resulting from slight camera movements during
extended shutter exposures, poses a significant challenge, potentially
compromising the quality of the reconstructed 3D scenes. To effectively handle
this issue, we propose sequential motion understanding radiance fields (SMURF),
a novel approach that models continuous camera motion and leverages the
explicit volumetric representation method for robustness to motion-blurred
input images. The core idea of the SMURF is continuous motion blurring kernel
(CMBK), a module designed to model a continuous camera movements for processing
blurry inputs. Our model is evaluated against benchmark datasets and
demonstrates state-of-the-art performance both quantitatively and
qualitatively.
| [
{
"version": "v1",
"created": "Tue, 12 Mar 2024 11:32:57 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 08:57:01 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Lee",
"Jungho",
""
],
[
"Lee",
"Dogyoon",
""
],
[
"Lee",
"Minhyeok",
""
],
[
"Kim",
"Donghyung",
""
],
[
"Lee",
"Sangyoun",
""
]
] |
2403.08971 | Corrine Elliott PhD | Corrine F Elliott, James PC Duncan, Tiffany M Tang, Merle Behr, Karl
Kumbier, and Bin Yu | Designing a Data Science simulation with MERITS: A Primer | 31 pages (main text); 1 figure; 2 tables; James PC Duncan, Tiffany M
Tang: Authors contributed equally to this manuscript; Merle Behr, Karl
Kumbier: Authors contributed equally to this manuscript | null | null | null | stat.CO | http://creativecommons.org/licenses/by/4.0/ | Simulations play a crucial role in the modern scientific process. Yet despite
(or due to) this ubiquity, the Data Science community shares neither a
comprehensive definition for a "high-quality" study nor a consolidated guide to
designing one. Inspired by the Predictability-Computability-Stability (PCS)
framework for 'veridical' Data Science, we propose six MERITS that a simulation
study should satisfy. (Modularity and Efficiency support the computability of a
study, encouraging clean and flexible implementation. Realism and Stability
address the conceptualization of the research problem: How well does a study
predict reality, such that its conclusions generalize to new data/contexts?
Finally, Intuitiveness and Transparency encourage good communication and
trustworthiness of study design and results.) Drawing an analogy between
simulation and cooking, we moreover offer (a) a conceptual framework for
thinking about the anatomy of a simulation 'recipe'; (b) a baker's dozen in
guidelines to aid the Data Science practitioner in designing one; and (c) a
case study demonstrating the practical utility of our framework by using it to
autopsy a preexisting simulation study. With this "PCS primer" for high-quality
Data Science simulation, we seek to distill and enrich the best practices of
simulation across disciplines into a cohesive recipe for trustworthy, veridical
Data Science.
| [
{
"version": "v1",
"created": "Wed, 13 Mar 2024 21:32:14 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 05:16:07 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Elliott",
"Corrine F",
""
],
[
"Duncan",
"James PC",
""
],
[
"Tang",
"Tiffany M",
""
],
[
"Behr",
"Merle",
""
],
[
"Kumbier",
"Karl",
""
],
[
"Yu",
"Bin",
""
]
] |
2403.10248 | Wojciech G\'orecki | Wojciech G\'orecki, Xi Lu, Chiara Macchiavello, Lorenzo Maccone | Mutual Information Bounded by Fisher Information | Compared to the previous version, several typos have been corrected
and more references have been added | Phys. Rev. Research 7, L022013 (2025) | 10.1103/PhysRevResearch.7.L022013 | null | quant-ph math-ph math.MP | http://creativecommons.org/licenses/by/4.0/ | We derive a general upper bound to mutual information in terms of the Fisher
information. The bound may be further used to derive a lower bound for the
Bayesian quadratic cost. These two provide alternatives to other inequalities
in the literature (e.g.~the van Trees inequality) that are useful also for
cases where the latter ones give trivial bounds. We then generalize them to the
quantum case, where they bound the Holevo information in terms of the quantum
Fisher information. We illustrate the usefulness of our bounds with a case
study in quantum phase estimation. Here, they allow us to adapt to mutual
information (useful for global strategies where the prior plays an important
role) the known and highly nontrivial bounds for the Fisher information in the
presence of noise. The results are also useful in the context of quantum
communication, both for continuous and discrete alphabets.
| [
{
"version": "v1",
"created": "Fri, 15 Mar 2024 12:35:35 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jul 2024 12:05:30 GMT"
},
{
"version": "v3",
"created": "Tue, 4 Mar 2025 10:54:17 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Górecki",
"Wojciech",
""
],
[
"Lu",
"Xi",
""
],
[
"Macchiavello",
"Chiara",
""
],
[
"Maccone",
"Lorenzo",
""
]
] |
2403.17525 | Sicong Zang | Sicong Zang, Zhijun Fang | Equipping Sketch Patches with Context-Aware Positional Encoding for
Graphic Sketch Representation | null | null | 10.1016/j.cviu.2025.104385 | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | When benefiting graphic sketch representation with sketch drawing orders,
recent studies have linked sketch patches as graph edges by drawing orders in
accordance to a temporal-based nearest neighboring strategy. However, such
constructed graph edges may be unreliable, since the contextual relationships
between patches may be inconsistent with the sequential positions in drawing
orders, due to variants of sketch drawings. In this paper, we propose a
variant-drawing-protected method by equipping sketch patches with context-aware
positional encoding (PE) to make better use of drawing orders for sketch
learning. We introduce a sinusoidal absolute PE to embed the sequential
positions in drawing orders, and a learnable relative PE to encode the unseen
contextual relationships between patches. Both types of PEs never attend the
construction of graph edges, but are injected into graph nodes to cooperate
with the visual patterns captured from patches. After linking nodes by semantic
proximity, during message aggregation via graph convolutional networks, each
node receives both semantic features from patches and contextual information
from PEs from its neighbors, which equips local patch patterns with global
contextual information, further obtaining drawing-order-enhanced sketch
representations. Experimental results indicate that our method significantly
improves sketch healing and controllable sketch synthesis. The source codes
could be found at https://github.com/SCZang/DC-gra2seq.
| [
{
"version": "v1",
"created": "Tue, 26 Mar 2024 09:26:12 GMT"
},
{
"version": "v2",
"created": "Tue, 13 May 2025 07:25:01 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Zang",
"Sicong",
""
],
[
"Fang",
"Zhijun",
""
]
] |
2403.19320 | G\'erald Tenenbaum | R\'egis de la Bret\`eche and G\'erald Tenenbaum | Mean values of arithmetic functions and application to sums of powers | null | null | null | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide new upper bounds for sums of certain arithmetic functions in many
variables at polynomial arguments and, exploiting recent progress on the
mean-value of the Erd\H os-Hooley $\Delta$-function, we derive lower bounds for
the cardinality of those integers not exceeding a given limit that are
expressible as some sums of powers.
| [
{
"version": "v1",
"created": "Thu, 28 Mar 2024 11:23:16 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Apr 2024 21:31:02 GMT"
},
{
"version": "v3",
"created": "Tue, 28 Jan 2025 14:34:45 GMT"
},
{
"version": "v4",
"created": "Tue, 15 Apr 2025 13:51:52 GMT"
},
{
"version": "v5",
"created": "Thu, 15 May 2025 16:30:05 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"de la Bretèche",
"Régis",
""
],
[
"Tenenbaum",
"Gérald",
""
]
] |
2404.00664 | Vladimir Kozlov | Vladimir Kozlov | On non-uniqueness of solitary waves on two-dimensional rotational flow | 27 pages. arXiv admin note: text overlap with arXiv:2311.15336 | null | null | null | math.AP math.DS | http://creativecommons.org/licenses/by/4.0/ | We consider solitary water waves on a rotational, unidirectional flow in a
two-dimensional channel of finite depth. Ovsyannikov has conjectured in 1983
that the solitary wave is uniquely determined by the Bernoulli constant, mass
flux and by the flow force. This conjecture was disproved by Plotnikov in 1992
for the ir-rotational flow. In this paper we show that this conjecture is wrong
also for rotational flows. Moreover we prove that in any neighborhood of the
first bifurcation point on the branch of solitary waves, approaching the
extreme wave, there are infinitely many pairs of solitary waves corresponding
to the same Bernoulli constant. We give a description of the structure of this
set of pairs. The proof is based on a bifurcation analysis of the global branch
of solitary waves which is of independent interest.
| [
{
"version": "v1",
"created": "Sun, 31 Mar 2024 12:17:33 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Dec 2024 20:19:39 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 05:09:47 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Kozlov",
"Vladimir",
""
]
] |
2404.03080 | Yanpeng Ye | Yanpeng Ye, Jie Ren, Shaozhou Wang, Yuwei Wan, Imran Razzak, Bram
Hoex, Haofen Wang, Tong Xie, Wenjie Zhang | Construction and Application of Materials Knowledge Graph in
Multidisciplinary Materials Science via Large Language Model | Accepted by 38th Conference on Neural Information Processing Systems
(NeurIPS 2024) | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Knowledge in materials science is widely dispersed across extensive
scientific literature, posing significant challenges to the efficient discovery
and integration of new materials. Traditional methods, often reliant on costly
and time-consuming experimental approaches, further complicate rapid
innovation. Addressing these challenges, the integration of artificial
intelligence with materials science has opened avenues for accelerating the
discovery process, though it also demands precise annotation, data extraction,
and traceability of information. To tackle these issues, this article
introduces the Materials Knowledge Graph (MKG), which utilizes advanced natural
language processing techniques integrated with large language models to extract
and systematically organize a decade's worth of high-quality research into
structured triples, contains 162,605 nodes and 731,772 edges. MKG categorizes
information into comprehensive labels such as Name, Formula, and Application,
structured around a meticulously designed ontology, thus enhancing data
usability and integration. By implementing network-based algorithms, MKG not
only facilitates efficient link prediction but also significantly reduces
reliance on traditional experimental methods. This structured approach not only
streamlines materials research but also lays the groundwork for more
sophisticated science knowledge graphs.
| [
{
"version": "v1",
"created": "Wed, 3 Apr 2024 21:46:14 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Jun 2024 10:04:05 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Sep 2024 13:46:20 GMT"
},
{
"version": "v4",
"created": "Wed, 14 May 2025 15:35:26 GMT"
},
{
"version": "v5",
"created": "Thu, 15 May 2025 02:03:46 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Ye",
"Yanpeng",
""
],
[
"Ren",
"Jie",
""
],
[
"Wang",
"Shaozhou",
""
],
[
"Wan",
"Yuwei",
""
],
[
"Razzak",
"Imran",
""
],
[
"Hoex",
"Bram",
""
],
[
"Wang",
"Haofen",
""
],
[
"Xie",
"Tong",
""
],
[
"Zhang",
"Wenjie",
""
]
] |
2404.03295 | Andrea Coladangelo | Boyang Chen, Andrea Coladangelo, Or Sattath | The power of a single Haar random state: constructing and separating
quantum pseudorandomness | A previous version claimed to lift the isometry oracle separation to
a unitary oracle separation. The proof was incorrect, and that claim has now
been downgraded to a "parametrized" unitary oracle separation | null | null | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we focus on the following question: what are the cryptographic
implications of having access to an oracle that provides a single Haar random
quantum state? We find that the study of such a model sheds light on several
aspects of the notion of quantum pseudorandomness.
Pseudorandom states (PRS) are a family of states for which it is hard to
distinguish between polynomially many copies of either a state sampled
uniformly from the family or a Haar random state. A weaker notion, called
single-copy pseudorandom states (1PRS), satisfies this property with respect to
a single copy. We obtain the following results:
1. First, we show, perhaps surprisingly, that 1PRS (as well as
bit-commitments) exist relative to an oracle that provides a single Haar random
state.
2. Second, we build on this result to show the existence of an isometry
oracle relative to which 1PRS exist, but PRS do not.
Taken together, our contributions yield one of the first black-box
separations between central notions of quantum pseudorandomness, and introduce
a new framework to study black-box separations between various inherently
quantum primitives.
| [
{
"version": "v1",
"created": "Thu, 4 Apr 2024 08:36:44 GMT"
},
{
"version": "v2",
"created": "Mon, 6 May 2024 06:04:06 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Oct 2024 16:58:01 GMT"
},
{
"version": "v4",
"created": "Thu, 15 May 2025 17:41:38 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Chen",
"Boyang",
""
],
[
"Coladangelo",
"Andrea",
""
],
[
"Sattath",
"Or",
""
]
] |
2404.03332 | Vilhelm Agdur | Vilhelm Agdur | A classification of overlapping clustering schemes for hypergraphs | 31 pages, 11 figures | null | null | null | math.CO cs.SI math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Community detection in graphs is a problem that is likely to be relevant
whenever network data appears, and consequently the problem has received much
attention with many different methods and algorithms applied. However, many of
these methods are hard to study theoretically, and they optimise for somewhat
different goals. A general and rigorous account of the problem and possible
methods remains elusive.
We study the problem of finding overlapping clusterings of hypergraphs,
continuing the line of research started by Carlsson and M\'emoli (2013) of
classifying clustering schemes as functors. We extend their notion of
representability to the overlapping case, showing that any representable
overlapping clustering scheme is excisive and functorial, and any excisive and
functorial clustering scheme is isomorphic to a representable clustering
scheme.
We also note that, for simple graphs, any representable clustering scheme is
computable in polynomial time on graphs of bounded expansion, with an exponent
determined by the maximum independence number of a graph in the representing
set. This result also applies to non-overlapping representable clustering
schemes, and so may be of independent interest.
| [
{
"version": "v1",
"created": "Thu, 4 Apr 2024 10:00:35 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 15:07:53 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Agdur",
"Vilhelm",
""
]
] |
2404.03976 | Lars Fritz | Abe Alexander and Lars Fritz | A theoretical framework for fees in AMMs | null | null | null | null | q-fin.ST | http://creativecommons.org/licenses/by/4.0/ | In the ever evolving landscape of decentralized finance automated market
makers (AMMs) play a key role: they provide a market place for trading assets
in a decentralized manner. For so-called bluechip pairs, arbitrage activity
provides a major part of the revenue generation of AMMs but also a major source
of loss due to the so-called informed orderflow. Finding ways to minimize those
losses while still keeping uninformed trading activity alive is a major problem
in the field. In this paper we will investigate the mechanics of said arbitrage
and try to understand how AMMs can maximize the revenue creation or in other
words minimize the losses. To that end, we model the dynamics of arbitrage
activity for a concrete implementation of a pool and study its sensitivity to
the choice of fee aiming to maximize the value retention. We manage to map the
ensuing dynamics to that of a random walk with a specific reward scheme that
provides a convenient starting point for further studies.
| [
{
"version": "v1",
"created": "Fri, 5 Apr 2024 09:16:39 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Jun 2024 15:29:55 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Jun 2024 05:36:27 GMT"
},
{
"version": "v4",
"created": "Wed, 14 May 2025 20:19:00 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Alexander",
"Abe",
""
],
[
"Fritz",
"Lars",
""
]
] |
2404.04918 | Gang Chen | Gang Chen, Fanyi Yang, Zheyuan Zhang | Superclosenes error estimates for the div least-squares finite element
method on elliptic problems | null | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we provide some error estimates for the div least-squares
finite element method on elliptic problems. The main contribution is presenting
a complete error analysis, which improves the current \emph{state-of-the-art}
results. The error estimates for both the scalar and the flux variables are
established by specially designed dual arguments with the help of two
projections: elliptic projection and H(div) projection, which are crucial to
supercloseness estimates. In most cases, $H^3$ regularity is omitted to get the
optimal convergence rate for vector and scalar unknowns, and most of our
results require a lower regularity for the vector variable than the scalar.
Moreover, a series of supercloseness results are proved, which are \emph{never
seen} in the previous work of least-squares finite element methods.
| [
{
"version": "v1",
"created": "Sun, 7 Apr 2024 11:04:38 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 08:53:45 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Chen",
"Gang",
""
],
[
"Yang",
"Fanyi",
""
],
[
"Zhang",
"Zheyuan",
""
]
] |
2404.05799 | Brij Mohan | Brij Mohan, Rajeev Gangwar, Tanmoy Pandit, Mohit Lal Bera, Maciej
Lewenstein, and Manabendra Nath Bera | Coherent heat transfer leads to genuine quantum enhancement in the
performances of continuous engines | Close to the published version | Phys. Rev. Applied 23, 044050 (2025) | 10.1103/PhysRevApplied.23.044050 | null | quant-ph cond-mat.mes-hall cond-mat.stat-mech physics.app-ph physics.optics | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conventional continuous quantum heat engines with incoherent heat transfer
perform poorly as they exploit two-body interactions between the system and hot
or cold baths, thus having limited capability to outperform their classical
counterparts. We introduce distinct continuous quantum heat engines that
utilize coherent heat transfer with baths, yielding genuine quantum enhancement
in performance. These coherent engines consist of one qutrit system and two
photonic baths and enable coherent heat transfer via two-photon transitions
involving three-body interactions between the system and hot and cold baths. We
demonstrate that coherent engines deliver significantly higher power output
with much greater reliability, i.e., lower signal-to-noise ratio of the power,
by hundreds of folds over their incoherent counterparts. Importantly, coherent
engines can operate close to or at the maximal achievable reliability allowed
by the quantum thermodynamic uncertainty relation. Moreover, coherent engines
manifest more nonclassical features than incoherent engines because they
violate the classical thermodynamic uncertainty relation by a greater amount
and for a wider range of parameters. These genuine enhancements in the
performance of coherent engines are directly attributed to their capacity to
harness higher energetic coherence for the resonant driving case. The
experimental feasibility of coherent engines and the improved understanding of
how quantum properties can enhance performance may find applications in
quantum-enabled technologies.
| [
{
"version": "v1",
"created": "Mon, 8 Apr 2024 18:01:11 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 14:20:18 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Mohan",
"Brij",
""
],
[
"Gangwar",
"Rajeev",
""
],
[
"Pandit",
"Tanmoy",
""
],
[
"Bera",
"Mohit Lal",
""
],
[
"Lewenstein",
"Maciej",
""
],
[
"Bera",
"Manabendra Nath",
""
]
] |
2404.06102 | Sanna Normo | S. Normo, D. E. Morosan, E. K. J. Kilpua, J. Pomoell | Estimating the lateral speed of a fast shock driven by a coronal mass
ejection at the location of solar radio emissions | 9 pages, 10 figures | null | 10.1051/0004-6361/202449277 | null | astro-ph.SR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fast coronal mass ejections (CMEs) can drive shock waves capable of
accelerating electrons to high energies. These shock-accelerated electrons act
as sources of electromagnetic radiation, often in the form of solar radio
bursts. Recent findings suggest that radio imaging of solar radio bursts can
provide a means to estimate the lateral expansion of CMEs and associated shocks
in the low corona. Our aim is to estimate the expansion speed of a CME-driven
shock at the locations of radio emission using 3D reconstructions of the shock
wave from multiple viewpoints. We estimated the 3D location of radio emission
using radio imaging from the Nan\c{c}ay Radioheliograph and the 3D location of
the shock. The 3D shock was reconstructed using white-light and extreme
ultraviolet images of the CME from the Solar Terrestrial Relations Observatory,
Solar Dynamics Observatory, and the Solar and Heliospheric Observatory. The
lateral expansion speed of the CME-driven shock at the electron acceleration
locations was then estimated using the approximate 3D locations of the radio
emission on the surface of the shock. The radio bursts associated with the CME
were found to reside at the flank of the expanding CME-driven shock. We
identified two prominent radio sources at two different locations and found
that the lateral speed of the shock was in the range of
$800-1000\,\mathrm{km\,s^{-1}}$ at these locations. Such a high speed during
the early stages of the eruption already indicates the presence of a fast shock
in the low corona. We also found a larger ratio between the radial and lateral
expansion speed compared to values obtained higher up in the corona. The high
shock speed obtained is indicative of a fast acceleration during the initial
stage of the eruption. This acceleration is most likely one of the key
parameters contributing to the presence of metric radio emissions, such as type
II radio bursts.
| [
{
"version": "v1",
"created": "Tue, 9 Apr 2024 08:08:22 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Normo",
"S.",
""
],
[
"Morosan",
"D. E.",
""
],
[
"Kilpua",
"E. K. J.",
""
],
[
"Pomoell",
"J.",
""
]
] |
2404.06672 | Boris Veytsman | Andrew Nesbitt and Boris Veytsman and Daniel Mietchen and Eva Maxfield
Brown and James Howison and Jo\~ao Felipe Pimentel and Laurent
H\`ebert-Dufresne and Stephan Druskat | Biomedical Open Source Software: Crucial Packages and Hidden Heroes | null | null | null | null | cs.SE cs.CY | http://creativecommons.org/licenses/by/4.0/ | Despite the importance of scientific software for research, it is often not
formally recognized and rewarded. This is especially true for foundation
libraries, which are used by the software packages visible to the users, being
``hidden'' themselves. The funders and other organizations need to understand
the complex network of computer programs that the modern research relies upon.
In this work we used CZ Software Mentions Dataset to map the dependencies of
the software used in biomedical papers and find the packages critical to the
software ecosystems. We propose the centrality metrics for the network of
software dependencies, analyze three ecosystems (PyPi, CRAN, Bioconductor) and
determine the packages with the highest centrality.
| [
{
"version": "v1",
"created": "Wed, 10 Apr 2024 01:22:02 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Dec 2024 22:31:21 GMT"
},
{
"version": "v3",
"created": "Wed, 14 May 2025 21:28:00 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Nesbitt",
"Andrew",
""
],
[
"Veytsman",
"Boris",
""
],
[
"Mietchen",
"Daniel",
""
],
[
"Brown",
"Eva Maxfield",
""
],
[
"Howison",
"James",
""
],
[
"Pimentel",
"João Felipe",
""
],
[
"Hèbert-Dufresne",
"Laurent",
""
],
[
"Druskat",
"Stephan",
""
]
] |
2404.10656 | Zach Walsh | Matthew Baker, Oliver Lorscheid, Zach Walsh, Tianyi Zhang | The foundation of generalized parallel connections, 2-sums, and
segment-cosegment exchanges of matroids | 35 pages. v2: Added more background information and made minor
expository changes | null | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that, under suitable hypotheses, the foundation of a generalized
parallel connection of matroids is the relative tensor product of the
foundations. Using this result, we show that the foundation of a 2-sum of
matroids is the absolute tensor product of the foundations, and that the
foundation of a matroid is invariant under segment-cosegment exchange.
| [
{
"version": "v1",
"created": "Tue, 16 Apr 2024 15:34:00 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 13:04:34 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Baker",
"Matthew",
""
],
[
"Lorscheid",
"Oliver",
""
],
[
"Walsh",
"Zach",
""
],
[
"Zhang",
"Tianyi",
""
]
] |
2404.12182 | Jaume Carbonell | Jaume Carbonell1, Vladimir Karmanov, Ekaterina Kupriyanova, Hagop
Sazdjian | Abnormal solutions of Bethe--Salpeter equation with massless and massive
exchanges | 19 pages, 8 figures. Talk given at Workshop Critical Stability, ECT*
oct 2023. To appear in Few-Body Systems | Few-Body Syst. 65, 56 (2024) | 10.1007/s00601-024-01928-y | null | hep-ph cond-mat.str-el nucl-th quant-ph | http://creativecommons.org/publicdomain/zero/1.0/ | We summarize the main properties of the so called ''abnormal solutions'' of
the Wick--Cutkosky model, i.e. two massive scalar particles interacting via
massless scalar exchange ("photons"), within the Bethe--Salpeter equation.
These solutions do not exist in the non-relativistic limit, in spite of having
very small binding energies. They present a genuine many-body character
dominated by photons, with a norm of the valence constituent wave function
(two-body norm) that vanishes in the limit of zero binding energy.
We present new results concerning the massive-exchange case, in particular
determine under which conditions is it possible to obtain such peculiar
solutions without spoiling the model by tachyonic states ($M^2<0$).
| [
{
"version": "v1",
"created": "Thu, 18 Apr 2024 13:41:14 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Carbonell1",
"Jaume",
""
],
[
"Karmanov",
"Vladimir",
""
],
[
"Kupriyanova",
"Ekaterina",
""
],
[
"Sazdjian",
"Hagop",
""
]
] |
2404.12300 | Laurie Williams | Laurie Williams (North Carolina State University), Sammy Migues
(Imbricate Security), Jamie Boote (Synopsys), Ben Hutchison (Synopsys) | Proactive Software Supply Chain Risk Management Framework (P-SSCRM) | 17 pages, 3 figures, 2 tables, will not be submitted to a conference | null | null | null | cs.CR | http://creativecommons.org/licenses/by-sa/4.0/ | The Proactive Software Supply Chain Risk Management Framework (P SSCRM)
described in this document is designed to help you understand and plan a secure
software supply chain risk management initiative. P SSCRM was created through a
process of understanding and analyzing real world data from nine industry
leading software supply chain risk management initiatives as well as through
the analysis and unification of ten government and industry documents,
frameworks, and standards. Although individual methodologies and standards
differ, many initiatives and standards share common ground. P SSCRM describes
this common ground and presents a model for understanding, quantifying, and
developing a secure software supply chain risk management program and
determining where your organization's existing efforts stand when contrasted
with other real world software supply chain risk management initiatives.
| [
{
"version": "v1",
"created": "Thu, 18 Apr 2024 16:24:26 GMT"
},
{
"version": "v2",
"created": "Mon, 5 May 2025 17:41:32 GMT"
},
{
"version": "v3",
"created": "Tue, 6 May 2025 15:59:26 GMT"
},
{
"version": "v4",
"created": "Thu, 15 May 2025 17:52:00 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Williams",
"Laurie",
"",
"North Carolina State University"
],
[
"Migues",
"Sammy",
"",
"Imbricate Security"
],
[
"Boote",
"Jamie",
"",
"Synopsys"
],
[
"Hutchison",
"Ben",
"",
"Synopsys"
]
] |
2404.12636 | Boyang Yang | Boyang Yang, Haoye Tian, Jiadong Ren, Hongyu Zhang, Jacques Klein,
Tegawend\'e F. Bissyand\'e, Claire Le Goues, Shunfu Jin | MORepair: Teaching LLMs to Repair Code via Multi-Objective Fine-tuning | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Within the realm of software engineering, specialized tasks on code, such as
program repair, present unique challenges, necessitating fine-tuning Large
language models~(LLMs) to unlock state-of-the-art performance. Fine-tuning
approaches proposed in the literature for LLMs on program repair tasks
generally overlook the need to reason about the logic behind code changes,
beyond syntactic patterns in the data. High-performing fine-tuning experiments
also usually come at very high computational costs. With MORepair, we propose a
novel perspective on the learning focus of LLM fine-tuning for program repair:
we not only adapt the LLM parameters to the syntactic nuances of the task of
code transformation (objective 1), but we also specifically fine-tune the LLM
with respect to the logical reason behind the code change in the training data
(objective 2). Such a multi-objective fine-tuning will instruct LLMs to
generate high-quality patches. We apply MORepair to fine-tune four open-source
LLMs with different sizes and architectures. Experimental results on
function-level and repository-level repair benchmarks show that the implemented
fine-tuning effectively boosts LLM repair performance by 11.4% to 56.0%. We
further show that our fine-tuning strategy yields superior performance compared
to the state-of-the-art approaches, including standard fine-tuning,
Fine-tune-CoT, and RepairLLaMA.
| [
{
"version": "v1",
"created": "Fri, 19 Apr 2024 05:36:21 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Apr 2024 06:21:39 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 08:49:58 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Yang",
"Boyang",
""
],
[
"Tian",
"Haoye",
""
],
[
"Ren",
"Jiadong",
""
],
[
"Zhang",
"Hongyu",
""
],
[
"Klein",
"Jacques",
""
],
[
"Bissyandé",
"Tegawendé F.",
""
],
[
"Goues",
"Claire Le",
""
],
[
"Jin",
"Shunfu",
""
]
] |
2404.12875 | Mikel Fern\'andez Barbat | Mikel F. Barbat, J\"urgen Schaffner-Bielich and Laura Tolos | Comprehensive study of compact stars with dark matter | 13 pages, 10 figures, published revised version | Phys. Rev. D 110 (2024) 023013 | 10.1103/PhysRevD.110.023013 | null | astro-ph.HE nucl-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a comprehensive study of compact stars admixed with non-self
annihilating self-interacting fermionic dark matter, delineating the dependence
on the nuclear equation of state by considering the two limiting parametrized
equations of state for neutron star matter obtained by smoothly matching the
low-density chiral effective theory and the high-density perturbative QCD.
These two parametrizations are the limiting cases of a wide variety of smooth
equations of state, i.e. the softest and stiffest possible one without a phase
transition, that generate masses and radii compatible with 2M$_\odot$
observations and the tidal constraint from GW170817. With an exhaustive
analysis of the possible stable mass-radius configurations, we determine the
quantity of dark matter contained in stars with masses and radii compatible
with the aforementioned astrophysical constraints. We find that for dark
particle masses of a few tenths of GeV, the dark core collapses and no stable
solutions are found for the two limiting ordinary matter equations of state.
For lower masses, the dark matter fraction is limited to 10%, being at most 1%
for masses ranging from 0.1 to 10 GeV for the limiting soft nuclear equation of
state. For the limiting stiff nuclear equation of state, the dark matter
fraction can reach values of more than 10%, but the dark particle mass is being
constrained to 0.3 GeV and 10 GeV for the weak self-interacting case and has to
be at least 5 GeV for the strong self-interacting one. For dark particle masses
of less than 0.1 GeV, stable neutron star configurations should have less than
1% of self-interacting dark matter to be compatible with the constraint of the
tidal deformability from GW170817 for the two limiting ordinary matter
equations of state studied.
| [
{
"version": "v1",
"created": "Fri, 19 Apr 2024 13:25:22 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jul 2024 22:27:26 GMT"
},
{
"version": "v3",
"created": "Mon, 12 May 2025 15:02:21 GMT"
},
{
"version": "v4",
"created": "Thu, 15 May 2025 12:20:18 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Barbat",
"Mikel F.",
""
],
[
"Schaffner-Bielich",
"Jürgen",
""
],
[
"Tolos",
"Laura",
""
]
] |
2404.15222 | Anna Zhigun | Mabel Lizzy Rajendran and Anna Zhigun | Local well-posedness for a novel nonlocal model for cell-cell adhesion
via receptor binding | null | null | null | null | math.AP | http://creativecommons.org/licenses/by/4.0/ | Local well-posedness is established for a highly nonlocal nonlinear
diffusion-adhesion system for bounded initial values with small support.
Macroscopic systems of this kind were previously obtained by the authors
through upscaling in [32] and can account for the effect of microscopic
receptor binding dynamics in cell-cell adhesion. The system analysed here
couples an integro-PDE featuring degenerate diffusion of the porous media type
and nonlocal adhesion with a novel nonlinear integral equation. The approach is
based on decoupling the system and using Banach's fixed point theorem to solve
each of the two equations individually and subsequently the entire system. The
main challenge of the implementation lies in selecting a suitable framework.
One of the key results is the local well-posedness for the integral equation
with a Radon measure as a parameter. The analysis of this equation utilizes the
Kantorovich-Rubinstein norm, marking the first application of this norm in
handling a nonlinear integral equation.
| [
{
"version": "v1",
"created": "Tue, 23 Apr 2024 16:54:18 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Jun 2024 14:25:20 GMT"
},
{
"version": "v3",
"created": "Thu, 6 Feb 2025 09:38:27 GMT"
},
{
"version": "v4",
"created": "Fri, 25 Apr 2025 06:49:05 GMT"
},
{
"version": "v5",
"created": "Sun, 4 May 2025 15:24:08 GMT"
},
{
"version": "v6",
"created": "Thu, 15 May 2025 13:39:25 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Rajendran",
"Mabel Lizzy",
""
],
[
"Zhigun",
"Anna",
""
]
] |
2404.17785 | Yizhe Xiong | Yizhe Xiong, Xiansheng Chen, Xin Ye, Hui Chen, Zijia Lin, Haoran Lian,
Zhenpeng Su, Wei Huang, Jianwei Niu, Jungong Han, Guiguang Ding | Temporal Scaling Law for Large Language Models | Preprint, Currently under review | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, Large Language Models (LLMs) have been widely adopted in a wide
range of tasks, leading to increasing attention towards the research on how
scaling LLMs affects their performance. Existing works, termed Scaling Laws,
have discovered that the final test loss of LLMs scales as power-laws with
model size, computational budget, and dataset size. However, the temporal
change of the test loss of an LLM throughout its pre-training process remains
unexplored, though it is valuable in many aspects, such as selecting better
hyperparameters \textit{directly} on the target LLM. In this paper, we propose
the novel concept of Temporal Scaling Law, studying how the test loss of an LLM
evolves as the training steps scale up. In contrast to modeling the test loss
as a whole in a coarse-grained manner, we break it down and dive into the
fine-grained test loss of each token position, and further develop a dynamic
hyperbolic-law. Afterwards, we derive the much more precise temporal scaling
law by studying the temporal patterns of the parameters in the dynamic
hyperbolic-law. Results on both in-distribution (ID) and out-of-distribution
(OOD) validation datasets demonstrate that our temporal scaling law accurately
predicts the test loss of LLMs across training steps. Our temporal scaling law
has broad practical applications. First, it enables direct and efficient
hyperparameter selection on the target LLM, such as data mixture proportions.
Secondly, viewing the LLM pre-training dynamics from the token position
granularity provides some insights to enhance the understanding of LLM
pre-training.
| [
{
"version": "v1",
"created": "Sat, 27 Apr 2024 05:49:11 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Jun 2024 11:06:01 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 02:48:26 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Xiong",
"Yizhe",
""
],
[
"Chen",
"Xiansheng",
""
],
[
"Ye",
"Xin",
""
],
[
"Chen",
"Hui",
""
],
[
"Lin",
"Zijia",
""
],
[
"Lian",
"Haoran",
""
],
[
"Su",
"Zhenpeng",
""
],
[
"Huang",
"Wei",
""
],
[
"Niu",
"Jianwei",
""
],
[
"Han",
"Jungong",
""
],
[
"Ding",
"Guiguang",
""
]
] |
2404.18703 | Fa Peng Huang | Aidi Yang, Fa Peng Huang | Detectability of the Phase Transition Gravitational Waves in the DFSZ
axion Model | Published version in Journal of Cosmology and Astroparticle
Physics,36 pages, 6 figures, 4 tables | JCAP05(2025)028 | 10.1088/1475-7516/2025/05/028 | null | hep-ph | http://creativecommons.org/licenses/by/4.0/ | In recent years, an increasing number of studies have focused on using
gravitational waves to explore axions and the dynamics of Peccei-Quinn symmetry
breaking at high energy scales in the early universe. To accurately quantify
the capability of specific gravitational wave experiments to probe the axion
properties, it is crucial to perform precise calculations of gravitational wave
signals based on given axion models and to conduct detailed detectability
analysis tailored to the experimental configurations. Therefore, in this work,
we consider the widely-studied DFSZ axion model and, for the first time,
perform precise calculations of the phase transition dynamics parameters and
associated gravitational wave signals. Our results demonstrate that the DFSZ
model allows a strong first-order phase transition for the Peccei-Quinn
symmetry-breaking process at high energy scales exceeding
$10^{9}~\mathrm{GeV}$. Moreover, by calculating the signal-to-noise ratio of
the gravitational waves and comparing it with the thresholds of the Cosmic
Explorer detector, we find that these signals are observable by the Cosmic
Explorer with the energy scale range from $10^9~\mathrm{GeV}$ to
$10^{12}~\mathrm{GeV}$. Notably, through Fisher Matrix analysis, we find that
if Cosmic Explorer detectors observe these gravitational waves, the bubble wall
velocity will be the first parameter to be determined. This study demonstrates
that gravitational wave detection offers a powerful approach to investigating
axion dynamics complementary to other experiments.
| [
{
"version": "v1",
"created": "Mon, 29 Apr 2024 13:54:51 GMT"
},
{
"version": "v2",
"created": "Mon, 20 May 2024 15:10:41 GMT"
},
{
"version": "v3",
"created": "Thu, 31 Oct 2024 11:34:38 GMT"
},
{
"version": "v4",
"created": "Fri, 14 Mar 2025 09:26:22 GMT"
},
{
"version": "v5",
"created": "Thu, 15 May 2025 08:49:01 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Yang",
"Aidi",
""
],
[
"Huang",
"Fa Peng",
""
]
] |
2404.19155 | Calvin McPhail-Snyder | Calvin McPhail-Snyder | Octahedral coordinates from the Wirtinger presentation | 18 pages + bibliography. Published version, with minor wording
changes in the last paragraph on page 4 | null | null | null | math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $\rho$ be a representation of a knot group (or more generally, the
fundamental group of a tangle complement) into
$\operatorname{SL}_2(\mathbb{C})$ expressed in terms of the Wirtinger
generators of a diagram $D$. This diagram also determines an ideal
triangulation of the complement called the octahedral decomposition. $\rho$
induces a hyperbolic structure on the complement of $D$, and in this note we
give a direct algebraic formula for the geometric parameters of the octahedral
decomposition induced by this structure. Our formula gives a new, explicit
criterion for whether $\rho$ occurs as a critical point of the diagram's
Neumann-Zagier--Yokota potential function.
| [
{
"version": "v1",
"created": "Mon, 29 Apr 2024 23:37:18 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 11:10:27 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"McPhail-Snyder",
"Calvin",
""
]
] |
2404.19497 | Xinjian Yan | Xinjian Yan, Xinwei Lee, Ningyi Xie, Yoshiyuki Saito, Leo Kurosawa,
Nobuyoshi Asai, Dongsheng Cai and Hoong Chuin Lau | Light Cone Cancellation for Variational Quantum Eigensolver Ansatz | null | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Variational Quantum Algorithms (VQAs) represent a class of algorithms that
utilize a hybrid approach, combining classical and quantum computing
techniques. In this approach, classical computers serve as optimizers that
update circuit parameters to find approximate solutions to complex problems. In
this study, we apply a method known as Light Cone Cancellation (LCC) to
optimize variational circuits, effectively reducing the required number of
qubits and gates for circuit simulation. We then evaluate the performance of
LCC on one of the VQAs -- the Variational Quantum Eigensolver (VQE) -- to
address the Max-Cut problem. Compared with the Quantum Approximate Optimization
Algorithm (QAOA), VQE offers greater degrees of freedom and brings better
performance at lower circuit depths. By applying LCC to VQE, we can shift the
complexity of circuit simulation from the number of qubits to the number of
edges in the graph, i.e., from exponential time to polynomial time. This
enables us to solve large problems with up to 100 vertices without actually
simulating the entire circuit. From demonstration results on 7-qubit and
27-qubit fake backends, we show that LCC yields higher approximation ratios
than those cases without LCC, implying that the effect of noise is reduced when
LCC is applied.
| [
{
"version": "v1",
"created": "Tue, 30 Apr 2024 12:31:03 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Dec 2024 04:08:11 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 06:50:44 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Yan",
"Xinjian",
""
],
[
"Lee",
"Xinwei",
""
],
[
"Xie",
"Ningyi",
""
],
[
"Saito",
"Yoshiyuki",
""
],
[
"Kurosawa",
"Leo",
""
],
[
"Asai",
"Nobuyoshi",
""
],
[
"Cai",
"Dongsheng",
""
],
[
"Lau",
"Hoong Chuin",
""
]
] |
2405.00730 | Masato Kimura Dr. | Vina Apriliani, Masato Kimura, and Hiroshi Ohtsuka | Two-step minimization approach to an $L^\infty$-constrained variational
problem with a generalized potential | 12 pages | The Science Reports of Kanazawa University, 67, pp.57-68 (2024) | null | null | math.AP | http://creativecommons.org/licenses/by/4.0/ | We study a variational problem on $H^1({\mathbb R})$ under an
$L^\infty$-constraint related to Sobolev-type inequalities for a class of
generalized potentials, including $L^p$-potentials, non-positive potentials,
and signed Radon measures. We establish various essential tools for this
variational problem, including the decomposition principle, the comparison
principle, and the perturbation theorem, which are the basis of the two-step
minimization method. As for their applications, we present precise results for
minimizers of minimization problems, such as the study of potentials of Dirac's
delta measure type and the analysis of trapped modes in potential wells.
| [
{
"version": "v1",
"created": "Sun, 28 Apr 2024 03:29:50 GMT"
},
{
"version": "v2",
"created": "Tue, 21 May 2024 05:58:41 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Apriliani",
"Vina",
""
],
[
"Kimura",
"Masato",
""
],
[
"Ohtsuka",
"Hiroshi",
""
]
] |
2405.00922 | Nooshin Yousefzadeh Hosseini | Nooshin Yousefzadeh, Rahul Sengupta, Yashaswi Karnati, Anand
Rangarajan, Sanjay Ranka | MTDT: A Multi-Task Deep Learning Digital Twin | 8 pages, 2 figures, 4 tables | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traffic congestion has significant impacts on both the economy and the
environment. Measures of Effectiveness (MOEs) have long been the standard for
evaluating traffic intersections' level of service and operational efficiency.
However, the scarcity of traditional high-resolution loop detector data (ATSPM)
presents challenges in accurately measuring MOEs or capturing the intricate
spatiotemporal characteristics inherent in urban intersection traffic. To
address this challenge, we present a comprehensive intersection traffic flow
simulation that utilizes a multi-task learning paradigm. This approach combines
graph convolutions for primary estimating lane-wise exit and inflow with time
series convolutions for secondary assessing multi-directional queue lengths and
travel time distribution through any arbitrary urban traffic intersection.
Compared to existing deep learning methodologies, the proposed Multi-Task Deep
Learning Digital Twin (MTDT) distinguishes itself through its adaptability to
local temporal and spatial features, such as signal timing plans, intersection
topology, driving behaviors, and turning movement counts. We also show the
benefit of multi-task learning in the effectiveness of individual traffic
simulation tasks. Furthermore, our approach facilitates sequential computation
and provides complete parallelization through GPU implementation. This not only
streamlines the computational process but also enhances scalability and
performance.
| [
{
"version": "v1",
"created": "Thu, 2 May 2024 00:34:10 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 03:16:20 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Yousefzadeh",
"Nooshin",
""
],
[
"Sengupta",
"Rahul",
""
],
[
"Karnati",
"Yashaswi",
""
],
[
"Rangarajan",
"Anand",
""
],
[
"Ranka",
"Sanjay",
""
]
] |
2405.01182 | Luca Scrucca | Luca Scrucca and Dimitris Karlis | A Model-Based Approach to Shot Charts Estimation in Basketball | null | null | 10.1007/s00180-025-01599-1 | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | Shot charts in basketball analytics provide an indispensable tool for
evaluating players' shooting performance by visually representing the
distribution of field goal attempts across different court locations. However,
conventional methods often overlook the bounded nature of the basketball court,
leading to inaccurate representations, particularly along the boundaries and
corners. In this paper, we propose a novel model-based approach to shot chart
estimation and visualization that explicitly considers the physical boundaries
of the basketball court. By employing Gaussian mixtures for bounded data, our
methodology allows to obtain more accurate estimation of shot density
distributions for both made and missed shots. Bayes' rule is then applied to
derive estimates for the probability of successful shooting from any given
locations, and to identify the regions with the highest expected scores. To
illustrate the efficacy of our proposal, we apply it to data from the 2022-23
NBA regular season, showing its usefulness through detailed analyses of shot
patterns for two prominent players.
| [
{
"version": "v1",
"created": "Thu, 2 May 2024 11:11:29 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Scrucca",
"Luca",
""
],
[
"Karlis",
"Dimitris",
""
]
] |
2405.01225 | Michael Szell | Henrik Wolf, Ane Rahbek Vier{\o}, Michael Szell | CoolWalks: Assessing the potential of shaded routing for active mobility
in urban street networks | Main text: 14 pages, 6 figures. SI: 8 pages, 4 figures | Scientific Reports 15, 14911 (2025) | 10.1038/s41598-025-97200-2 | null | physics.soc-ph cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Walking is the most sustainable form of urban mobility, but is compromised by
uncomfortable or unhealthy sun exposure, which is an increasing problem due to
global warming. Shade from buildings can provide cooling and protection for
pedestrians, but the extent of this potential benefit is unknown. Here we
explore the potential for shaded walking, using building footprints and street
networks from both synthetic and real cities. We introduce a route choice model
with a sun avoidance parameter $\alpha$ and define the CoolWalkability metric
to measure opportunities for walking in shade. We derive analytically that on a
regular grid with constant building heights, CoolWalkability is independent of
$\alpha$, and that the grid provides no CoolWalkability benefit for
shade-seeking individuals compared to the shortest path. However, variations in
street geometry and building heights create such benefits. We further uncover
that the potential for shaded routing differs between grid-like and irregular
street networks, forms local clusters, and is sensitive to the mapped network
geometry. Our research identifies the limitations and potential of shade for
cool, active travel, and is a first step towards a rigorous understanding of
shade provision for sustainable mobility in cities.
| [
{
"version": "v1",
"created": "Thu, 2 May 2024 12:09:08 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Wolf",
"Henrik",
""
],
[
"Vierø",
"Ane Rahbek",
""
],
[
"Szell",
"Michael",
""
]
] |
2405.01893 | Kostiantyn Yershov V. | Kostiantyn V. Yershov, Volodymyr P. Kravchuk, Maria Daghofer, and
Jeroen van den Brink | Fluctuation induced piezomagnetism in local moment altermagnets | null | Phys. Rev. B 110, 144421 (2024) | 10.1103/PhysRevB.110.144421 | null | cond-mat.str-el | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It was recently discovered that, depending on their symmetries, collinear
antiferromagnets may break spin degeneracy in momentum space, even in absence
of spin-orbit coupling. Such systems, dubbed altermagnets, have electronic
bands with a spin-momentum texture set mainly by the combined crystal-magnetic
symmetry. This discovery motivates the question which novel physical properties
derive from altermagnetic order. Here we show that one consequence of
altermagnetic order is a fluctuation-driven piezomagnetic response. Using two
Heisenberg models of d-wave altermagnets, a checkerboard one and one for
rutiles, we determine the fluctuation induced piezomagnetic coefficients
considering temperature induced transversal spin fluctuations. We establish in
addition that magnetic fluctuations induce an anisotropic thermal spin
conductivity.
| [
{
"version": "v1",
"created": "Fri, 3 May 2024 07:30:17 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Sep 2024 07:56:23 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Yershov",
"Kostiantyn V.",
""
],
[
"Kravchuk",
"Volodymyr P.",
""
],
[
"Daghofer",
"Maria",
""
],
[
"Brink",
"Jeroen van den",
""
]
] |
2405.03689 | Sanjay Subramanian | Sanjay Subramanian, Evonne Ng, Lea M\"uller, Dan Klein, Shiry Ginosar,
and Trevor Darrell | Pose Priors from Language Models | CVPR 2025 | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Language is often used to describe physical interaction, yet most 3D human
pose estimation methods overlook this rich source of information. We bridge
this gap by leveraging large multimodal models (LMMs) as priors for
reconstructing contact poses, offering a scalable alternative to traditional
methods that rely on human annotations or motion capture data. Our approach
extracts contact-relevant descriptors from an LMM and translates them into
tractable losses to constrain 3D human pose optimization. Despite its
simplicity, our method produces compelling reconstructions for both two-person
interactions and self-contact scenarios, accurately capturing the semantics of
physical and social interactions. Our results demonstrate that LMMs can serve
as powerful tools for contact prediction and pose estimation, offering an
alternative to costly manual human annotations or motion capture data. Our code
is publicly available at https://prosepose.github.io.
| [
{
"version": "v1",
"created": "Mon, 6 May 2024 17:59:36 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 14:35:43 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Subramanian",
"Sanjay",
""
],
[
"Ng",
"Evonne",
""
],
[
"Müller",
"Lea",
""
],
[
"Klein",
"Dan",
""
],
[
"Ginosar",
"Shiry",
""
],
[
"Darrell",
"Trevor",
""
]
] |
2405.04760 | Hanxiang Xu | Hanxiang Xu, Shenao Wang, Ningke Li, Kailong Wang, Yanjie Zhao, Kai
Chen, Ting Yu, Yang Liu and Haoyu Wang | Large Language Models for Cyber Security: A Systematic Literature Review | 56 pages,6 figures | null | null | null | cs.CR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rapid advancement of Large Language Models (LLMs) has opened up new
opportunities for leveraging artificial intelligence in various domains,
including cybersecurity. As the volume and sophistication of cyber threats
continue to grow, there is an increasing need for intelligent systems that can
automatically detect vulnerabilities, analyze malware, and respond to attacks.
In this survey, we conduct a comprehensive review of the literature on the
application of LLMs in cybersecurity (LLM4Security). By comprehensively
collecting over 30K relevant papers and systematically analyzing 127 papers
from top security and software engineering venues, we aim to provide a holistic
view of how LLMs are being used to solve diverse problems across the
cybersecurity domain. Through our analysis, we identify several key findings.
First, we observe that LLMs are being applied to a wide range of cybersecurity
tasks, including vulnerability detection, malware analysis, network intrusion
detection, and phishing detection. Second, we find that the datasets used for
training and evaluating LLMs in these tasks are often limited in size and
diversity, highlighting the need for more comprehensive and representative
datasets. Third, we identify several promising techniques for adapting LLMs to
specific cybersecurity domains, such as fine-tuning, transfer learning, and
domain-specific pre-training. Finally, we discuss the main challenges and
opportunities for future research in LLM4Security, including the need for more
interpretable and explainable models, the importance of addressing data privacy
and security concerns, and the potential for leveraging LLMs for proactive
defense and threat hunting. Overall, our survey provides a comprehensive
overview of the current state-of-the-art in LLM4Security and identifies several
promising directions for future research.
| [
{
"version": "v1",
"created": "Wed, 8 May 2024 02:09:17 GMT"
},
{
"version": "v2",
"created": "Thu, 9 May 2024 08:10:54 GMT"
},
{
"version": "v3",
"created": "Sat, 27 Jul 2024 14:04:11 GMT"
},
{
"version": "v4",
"created": "Thu, 15 May 2025 07:33:07 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Xu",
"Hanxiang",
""
],
[
"Wang",
"Shenao",
""
],
[
"Li",
"Ningke",
""
],
[
"Wang",
"Kailong",
""
],
[
"Zhao",
"Yanjie",
""
],
[
"Chen",
"Kai",
""
],
[
"Yu",
"Ting",
""
],
[
"Liu",
"Yang",
""
],
[
"Wang",
"Haoyu",
""
]
] |
2405.05279 | James Worrell | Pavol Kebis, Florian Luca, Joel Ouaknine, Andrew Scoones, James
Worrell | Transcendence for Pisot Morphic Words over an Algebraic Base | arXiv admin note: text overlap with arXiv:2308.13657 | null | null | null | math.NT cs.FL | http://creativecommons.org/licenses/by/4.0/ | It is known that for a uniform morphic sequence
$\boldsymbol u = \langle u_n\rangle_{n=0}^\infty$ and an algebraic
number $\beta$ such that $|\beta|>1$, the number
$[\![\boldsymbol{u} ]\!]_\beta:=\sum_{n=0}^\infty
\frac{u_n}{\beta^n}$ either lies in $\mathbb Q(\beta)$ or is
transcendental. In this paper we show a similar
rational-transcendental dichotomy for sequences defined by
irreducible Pisot morphisms. Subject to the Pisot conjecture (an
irreducible Pisot morphism has pure discrete spectrum), we
generalise the latter result to arbitrary finite alphabets. In
certain cases we are able to show transcendence of
$[\![\boldsymbol{u}]\!]_{\beta}$ outright. In particular, for
$k\geq 2$, if $\boldsymbol u$ is the $k$-bonacci word then
$[\![\boldsymbol{u}]\!]_{\beta}$ is transcendental.
| [
{
"version": "v1",
"created": "Mon, 6 May 2024 12:20:15 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 17:32:11 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Kebis",
"Pavol",
""
],
[
"Luca",
"Florian",
""
],
[
"Ouaknine",
"Joel",
""
],
[
"Scoones",
"Andrew",
""
],
[
"Worrell",
"James",
""
]
] |
2405.06957 | Uwe Borghoff | Aline Werro, Christian Nitzl and Uwe M. Borghoff | On the Role of Intelligence and Business Wargaming in Developing
Foresight | 18 pages, 3 figures. The authors declare no potential conflicts of
interest | Technology Analysis & Strategic Management (2025), Routledge | 10.1080/09537325.2025.2506122 | null | cs.CY | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Business wargaming is a central tool for developing sustaining strategies. It
transfers the benefits of traditional wargaming to the business environment.
However, building wargames that support the process of decision-making for
strategy require respective intelligence. This paper investigates the role of
intelligence in the process of developing strategic foresight. The focus is on
how intelligence is developed and how it relates to business wargaming. The
so-called intelligence cycle is the basis and reference of our investigation.
The conceptual part of the paper combines the theoretical background from
military, business as well as serious gaming. To elaborate on some of the
lessons learned, we examine specific business wargames both drawn from the
literature and conducted by us at the Center for Intelligence and Security
Studies (CISS). It is shown that business wargaming can make a significant
contribution to the transformation of data to intelligence by supporting the
intelligence cycle in two crucial phases. Furthermore, it brings together
business intelligence (BI) and competitive intelligence (CI) and it bridges the
gap to a company's strategy by either testing or developing a new strategy. We
were also able to confirm this finding based on the business wargame we
conducted at a major semiconductor manufacturer.
| [
{
"version": "v1",
"created": "Sat, 11 May 2024 08:48:14 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Werro",
"Aline",
""
],
[
"Nitzl",
"Christian",
""
],
[
"Borghoff",
"Uwe M.",
""
]
] |
2405.07281 | Chongjun Ouyang | Zhenqiao Cheng, Nanxi Li, Jianchi Zhu, Chongjun Ouyang, and Xingqi
Zhang | Exploiting Movable Antennas in Multicast Communications | 7 pages | null | null | null | eess.SP | http://creativecommons.org/licenses/by/4.0/ | This article investigates the integration of movable antennas (MAs) into
multicast communication systems. By discretizing the motion of the MAs, a novel
MA-assisted multicast transmission architecture is formulated. An alternating
optimization (AO) algorithm based on successive convex approximation is
proposed to optimize the transmit beamforming and antenna positions. To gain
further insights, the two-user case is examined, and a closed-form expression
for the optimal beamformer is derived. On this basis, a low-complexity greedy
search algorithm is developed to optimize the placement of the MAs.
Furthermore, under the assumption of a line-of-sight propagation environment, a
branch-and-bound algorithm is designed to determine the globally optimal
antenna configuration with reduced complexity compared to exhaustive search.
Numerical simulations confirm that the proposed methods effectively enhance the
achievable multicast rate.
| [
{
"version": "v1",
"created": "Sun, 12 May 2024 13:07:36 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 11:34:57 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Cheng",
"Zhenqiao",
""
],
[
"Li",
"Nanxi",
""
],
[
"Zhu",
"Jianchi",
""
],
[
"Ouyang",
"Chongjun",
""
],
[
"Zhang",
"Xingqi",
""
]
] |
2405.07555 | Jiongjie Wang | Jiongjie Wang and Jiang Xiao | Interpreting S-Parameter Spectra in Coupled Resonant Systems: The Role
of Probing Configurations | 5 pages, 5 figures | null | 10.1364/OE.551120 | null | cond-mat.mes-hall | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The S-parameter $S_{21}$ is widely used to characterize the resonant
properties of various systems. However, we demonstrates that the reliability of
$S_{21}$ as a true indicator of system resonances depends heavily on the
specific probing setup employed. While point-probe or weak probes preserve the
integrity of the $S_{21}$ spectrum and accurately reflect system resonances,
multi-point and strong probes can introduce significant discrepancies. These
discrepancies can manifest as misleading features such as repulsive level
anti-crossing or attractive level crossing, even in systems that are
fundamentally uncoupled. This highlights the critical importance of selecting
appropriate probing techniques to ensure a precise evaluation of system
resonances.
| [
{
"version": "v1",
"created": "Mon, 13 May 2024 08:34:43 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Wang",
"Jiongjie",
""
],
[
"Xiao",
"Jiang",
""
]
] |
2405.07714 | Wen Shang | Wen Shang, Yuan Liao, Vasilis Friderikos, Halim Yanikomeroglu | Joint Robotic Aerial Base Station Deployment and Wireless Backhauling in
6G Multi-hop Networks | This version reflects the conference publication in 2025 IEEE
Wireless Communications and Networking Conference (WCNC), with a minor
modified title and text content. The conference is:"Integrated Robotic Aerial
Base Stations Deployment and Backhaul Design in 6G Multihop Networks," 2025
IEEE WCNC doi: 10.1109/WCNC61545.2025.10978194 | null | 10.1109/WCNC61545.2025.10978194 | null | cs.NI | http://creativecommons.org/licenses/by/4.0/ | Due to their ability to anchor into tall urban landforms, such as lampposts
or street lights, robotic aerial base stations (RABSs) can create a
hyper-flexible wireless multi-hop heterogeneous network to meet the forthcoming
green, densified, and dynamic network deployment to support, inter alia, high
data rates. In this work, we propose a network infrastructure that can
concurrently support the wireless backhaul link capacity and access link
traffic demand in the millimeter-wave (mmWave) frequency band. The RABSs
grasping locations, resource blocks (RBs) assignment, and route flow control
are simultaneously optimized to maximize the served traffic demands. Robotic
base stations capitalize on the fact that traffic distribution varies
considerably across both time and space within a given geographical area.
Hence, they are able to relocate to suitable locations, i.e., 'follow' the
traffic demand as it unfolds to increase the overall network efficiency. To
tackle the curse of dimensionality of the proposed mixed-integer linear
problem, we propose a greedy algorithm to obtain a competitive solution with
low computational complexity. Compared to baseline models, which are
heterogeneous networks with randomly deployed fixed small cells and
pre-allocated RBs for wireless access and backhaul links, a wide set of
numerical investigations reveals that robotic base stations could improve the
served traffic demand. Specifically, the proposed mode serves at most 65\% more
traffic demand compared to an equal number of deployed fixed small cells.
| [
{
"version": "v1",
"created": "Mon, 13 May 2024 13:02:50 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 13:15:56 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Shang",
"Wen",
""
],
[
"Liao",
"Yuan",
""
],
[
"Friderikos",
"Vasilis",
""
],
[
"Yanikomeroglu",
"Halim",
""
]
] |
2405.09264 | Marcel Kempf | Marcel Kempf and Nikolas Gauder and Benedikt Jaeger and Johannes
Zirngibl and Georg Carle | A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights | Presented at the 2024 IFIP Networking Conference (IFIP Networking) | null | 10.23919/IFIPNetworking62109.2024.10619916 | null | cs.NI cs.CR | http://creativecommons.org/licenses/by-nc-sa/4.0/ | QUIC is a new network protocol standardized in 2021. It was designed to
replace the TCP/TLS stack and is based on UDP. The most current web standard
HTTP/3 is specifically designed to use QUIC as transport protocol. QUIC claims
to provide secure and fast transport with low-latency connection establishment,
flow and congestion control, reliable delivery, and stream multiplexing. To
achieve the security goals, QUIC enforces the usage of TLS 1.3. It uses
authenticated encryption with additional data (AEAD) algorithms to not only
protect the payload but also parts of the header. The handshake relies on
asymmetric cryptography, which will be broken with the introduction of powerful
quantum computers, making the use of post-quantum cryptography inevitable. This
paper presents a detailed evaluation of the impact of cryptography on QUIC
performance. The high-performance QUIC implementations LSQUIC, quiche, and
MsQuic are evaluated under different aspects. We break symmetric cryptography
down to the different security features. To be able to isolate the impact of
cryptography, we implemented a NOOP AEAD algorithm which leaves plaintext
unaltered. We show that QUIC performance increases by 10 to 20% when removing
packet protection. The header protection has negligible impact on performance,
especially for AES ciphers. We integrate post-quantum cryptographic algorithms
into QUIC, demonstrating its feasibility without major changes to the QUIC
libraries by using a TLS library that implements post-quantum algorithms.
Kyber, Dilithium, and FALCON are promising candidates for post-quantum secure
QUIC, as they have a low impact on the handshake duration. Algorithms like
SPHINCS+ with larger key sizes or more complex calculations significantly
impact the handshake duration and cause additional issues in our measurements.
| [
{
"version": "v1",
"created": "Wed, 15 May 2024 11:27:28 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Kempf",
"Marcel",
""
],
[
"Gauder",
"Nikolas",
""
],
[
"Jaeger",
"Benedikt",
""
],
[
"Zirngibl",
"Johannes",
""
],
[
"Carle",
"Georg",
""
]
] |
2405.09513 | Theodoros Soultanis | Theodoros Soultanis, Kiril Maltsev, Andreas Bauswein, Katerina
Chatziioannou, Friedrich K. Roepke, Nikolaos Stergioulas | Gravitational-wave model for neutron star merger remnants with
supervised learning | 21 pages, 13 figures, Published in Phys. Rev. D on Jan 2, 2025 | Phys. Rev. D 111, 023002 - Published 2 January, 2025 | 10.1103/PhysRevD.111.023002 | null | astro-ph.HE gr-qc | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a time-domain model for the gravitational waves emitted by
equal-mass binary neutron star merger remnants for a fixed equation of state.
We construct a large set of numerical relativity simulations for a single
equation of state consistent with current constraints, totaling 157 equal-mass
binary neutron star merger configurations. The gravitational-wave model is
constructed using the supervised learning method of K-nearest neighbor
regression. As a first step toward developing a general model with supervised
learning methods that accounts for the dependencies on equation of state and
the binary masses of the system, we explore the impact of the size of the
dataset on the model. We assess the accuracy of the model for a varied dataset
size and number density in total binary mass. Specifically, we consider five
training sets of $\{ 20,40, 60, 80, 100\}$ simulations uniformly distributed in
total binary mass. We evaluate the resulting models in terms of faithfulness
using a test set of 30 additional simulations that are not used during training
and which are equidistantly spaced in total binary mass. The models achieve
faithfulness with maximum values in the range of $0.980$ to $0.995$. We assess
our models simulating signals observed by the three-detector network of
Advanced LIGO-Virgo. We find that all models with training sets of size equal
to or larger than $40$ achieve an unbiased measurement of the main
gravitational-wave frequency. We confirm that our results do not depend
qualitatively on the choice of the (fixed) equation of state. We conclude that
training sets, with a minimum size of $40$ simulations, or a number density of
approximately $11$ simulations per $0.1\,M_\odot$ of total binary mass, suffice
for the construction of faithful templates for the post-merger signal for a
single equation of state and equal-mass binaries (abbreviated).
| [
{
"version": "v1",
"created": "Wed, 15 May 2024 17:06:57 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 17:15:40 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Soultanis",
"Theodoros",
""
],
[
"Maltsev",
"Kiril",
""
],
[
"Bauswein",
"Andreas",
""
],
[
"Chatziioannou",
"Katerina",
""
],
[
"Roepke",
"Friedrich K.",
""
],
[
"Stergioulas",
"Nikolaos",
""
]
] |
2405.09628 | Pratik Nandy | Pratik Nandy, Apollonas S. Matsoukas-Roubeas, Pablo Mart\'inez-Azcona,
Anatoly Dymarsky, Adolfo del Campo | Quantum Dynamics in Krylov Space: Methods and Applications | Invited review article in Physics Reports, v3: few sections added,
typos corrected, refs added. Published version in Physics Reports | 10.1016/j.physrep.2025.05.001 | null | RIKEN-iTHEMS-Report-24 | quant-ph cond-mat.stat-mech cond-mat.str-el hep-th nlin.CD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The dynamics of quantum systems unfolds within a subspace of the state space
or operator space, known as the Krylov space. This review presents the use of
Krylov subspace methods to provide an efficient description of quantum
evolution and quantum chaos, with emphasis on nonequilibrium phenomena of
many-body systems with a large Hilbert space. It provides a comprehensive
update of recent developments, focused on the quantum evolution of operators in
the Heisenberg picture as well as pure and mixed states. It further explores
the notion of Krylov complexity and associated metrics as tools for quantifying
operator growth, their bounds by generalized quantum speed limits, the
universal operator growth hypothesis, and its relation to quantum chaos,
scrambling, and generalized coherent states. A comparison of several
generalizations of the Krylov construction for open quantum systems is
presented. A closing discussion addresses the application of Krylov subspace
methods in quantum field theory, holography, integrability, quantum control,
and quantum computing, as well as current open problems.
| [
{
"version": "v1",
"created": "Wed, 15 May 2024 18:00:09 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jun 2024 17:53:01 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 07:39:48 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Nandy",
"Pratik",
""
],
[
"Matsoukas-Roubeas",
"Apollonas S.",
""
],
[
"Martínez-Azcona",
"Pablo",
""
],
[
"Dymarsky",
"Anatoly",
""
],
[
"del Campo",
"Adolfo",
""
]
] |
2405.10604 | Nandan Roy | Chonticha Kritpetch, Nandan Roy and Narayan Banerjee | Interacting dark sector: a dynamical system perspective | 19 pages, 8 figures | null | 10.1103/PhysRevD.111.103501 | null | gr-qc astro-ph.CO | http://creativecommons.org/licenses/by/4.0/ | We investigate the interaction between the dark sectors from the point of
view of a dynamical system analysis. A general setup for interacting dark
energy models that incorporates both quintessence and phantom fields through a
switch parameter, allowing an interaction in the dark sectors, has been
considered. In the first part of our analysis, we have not assumed any specific
form of the interaction, and in the second part, we invoked examples in a
general framework of the interaction. The potentials of the scalar field are
classified into two broad classes of potentials: exponential and
non-exponential. We identify the potential late-time attractors of the system,
which have a complete dark energy domination. From our analysis, it is evident
there could be an interaction between the dark sector. The interaction, if any,
weakens over time. We find for the quintessence field the transfer of energy
from dark matter to dark energy can flip the direction, and on the contrary,
for the phantom field, it is only from dark matter to dark energy.
| [
{
"version": "v1",
"created": "Fri, 17 May 2024 07:59:11 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 05:29:04 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Kritpetch",
"Chonticha",
""
],
[
"Roy",
"Nandan",
""
],
[
"Banerjee",
"Narayan",
""
]
] |
2405.10769 | Zehao Su | Zehao Su, Helene Charlotte Rytgaard, Henrik Ravn, Frank Eriksson | Efficient estimation of the target population average treatment effect
from multi-source data | null | null | null | null | stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider estimation of the target population average treatment effect
(TATE) when outcome information is unavailable. Instead, we observe the outcome
in multiple source populations and wish to combine the treatment effects
therein to make inference on the TATE. In contrast to existing works that
assume transportability on the conditional distribution of potential outcomes
or conditional treatment-specific means, we work under a weaker form of effect
transportability. Following the framework for causally interpretable
meta-analysis, we assume transportability of conditional average treatment
effects across multiple populations, which may hold with fewer standardization
variables. Under this assumption, we derive the semiparametric efficiency bound
of the TATE and characterize a class of doubly robust and asymptotically linear
estimators. Within this class, an efficient estimator assigns optimal weights
to observations from different data sources. Additionally, we suggest
estimators of a low-dimensional summary of effect heterogeneity in the target
population. We illustrate the use of the proposed estimators on a multicentre
weight management clinical trial for semaglutide, a glucagon-like peptide-1
receptor agonist, on overweight or obese patients. Using outcome information
from other regions, we estimate the weight loss effect of semaglutide in the
United States subgroup.
| [
{
"version": "v1",
"created": "Fri, 17 May 2024 13:28:55 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 12:54:41 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Su",
"Zehao",
""
],
[
"Rytgaard",
"Helene Charlotte",
""
],
[
"Ravn",
"Henrik",
""
],
[
"Eriksson",
"Frank",
""
]
] |
2405.11247 | Udi Aharon | Udi Aharon, Ran Dubin, Amit Dvir and Chen Hajaj | A Classification-by-Retrieval Framework for Few-Shot Anomaly Detection
to Detect API Injection Attacks | 15 pages, 10 figures, 5 tables | Computers & Security, Volume 140, December 2024, Article 104249 | 10.1016/j.cose.2024.104249 | null | cs.CR | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Application Programming Interface (API) Injection attacks refer to the
unauthorized or malicious use of APIs, which are often exploited to gain access
to sensitive data or manipulate online systems for illicit purposes.
Identifying actors that deceitfully utilize an API poses a demanding problem.
Although there have been notable advancements and contributions in the field of
API security, there remains a significant challenge when dealing with attackers
who use novel approaches that don't match the well-known payloads commonly seen
in attacks. Also, attackers may exploit standard functionalities
unconventionally and with objectives surpassing their intended boundaries.
Thus, API security needs to be more sophisticated and dynamic than ever, with
advanced computational intelligence methods, such as machine learning models
that can quickly identify and respond to abnormal behavior. In response to
these challenges, we propose a novel unsupervised few-shot anomaly detection
framework composed of two main parts: First, we train a dedicated generic
language model for API based on FastText embedding. Next, we use Approximate
Nearest Neighbor search in a classification-by-retrieval approach. Our
framework allows for training a fast, lightweight classification model using
only a few examples of normal API requests. We evaluated the performance of our
framework using the CSIC 2010 and ATRDF 2023 datasets. The results demonstrate
that our framework improves API attack detection accuracy compared to the
state-of-the-art (SOTA) unsupervised anomaly detection baselines.
| [
{
"version": "v1",
"created": "Sat, 18 May 2024 10:15:31 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Sep 2024 15:31:13 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Aharon",
"Udi",
""
],
[
"Dubin",
"Ran",
""
],
[
"Dvir",
"Amit",
""
],
[
"Hajaj",
"Chen",
""
]
] |
2405.11258 | Udi Aharon | Udi Aharon, Revital Marbel, Ran Dubin, Amit Dvir, and Chen Hajaj | RoBERTa-Augmented Synthesis for Detecting Malicious API Requests | 14 pages, 3 figures, 6 tables | null | null | null | cs.CR | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Web applications and APIs face constant threats from malicious actors seeking
to exploit vulnerabilities for illicit gains. To defend against these threats,
it is essential to have anomaly detection systems that can identify a variety
of malicious behaviors. However, a significant challenge in this area is the
limited availability of training data. Existing datasets often do not provide
sufficient coverage of the diverse API structures, parameter formats, and usage
patterns encountered in real-world scenarios. As a result, models trained on
these datasets often struggle to generalize and may fail to detect less common
or emerging attack vectors. To enhance detection accuracy and robustness, it is
crucial to access larger and more representative datasets that capture the true
variability of API traffic. To address this, we introduce a GAN-inspired
learning framework that extends limited API traffic datasets through targeted,
domain-aware synthesis. Drawing on techniques from Natural Language Processing
(NLP), our approach leverages Transformer-based architectures, particularly
RoBERTa, to enhance the contextual representation of API requests and generate
realistic synthetic samples aligned with security-specific semantics. We
evaluate our framework on two benchmark datasets, CSIC 2010 and ATRDF 2023, and
compare it with a previous data augmentation technique to assess the importance
of domain-specific synthesis. In addition, we apply our augmented data to
various anomaly detection models to evaluate its impact on classification
performance. Our method achieves up to a 4.94% increase in F1 score on CSIC
2010 and up to 21.10% on ATRDF 2023. The source codes of this work are
available at https://github.com/ArielCyber/GAN-API.
| [
{
"version": "v1",
"created": "Sat, 18 May 2024 11:10:45 GMT"
},
{
"version": "v2",
"created": "Thu, 8 May 2025 10:28:06 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 12:52:49 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Aharon",
"Udi",
""
],
[
"Marbel",
"Revital",
""
],
[
"Dubin",
"Ran",
""
],
[
"Dvir",
"Amit",
""
],
[
"Hajaj",
"Chen",
""
]
] |
2405.11752 | Zihao Wang | Zihao Wang, Zhe Wu | Towards Foundation Model for Chemical Reactor Modeling: Meta-Learning
with Physics-Informed Adaptation | Chemical Engineering Research and Design | null | null | null | cs.CE cs.LG | http://creativecommons.org/licenses/by/4.0/ | Developing accurate models for chemical reactors is often challenging due to
the complexity of reaction kinetics and process dynamics. Traditional
approaches require retraining models for each new system, limiting
generalizability and efficiency. In this work, we take a step toward foundation
models for chemical reactor modeling by introducing a neural network framework
that generalizes across diverse reactor types and rapidly adapts to new
chemical processes. Our approach leverages meta-learning to pretrain the model
on a broad set of reactor dynamics, enabling efficient adaptation to unseen
reactions with minimal data. To further enhance generalizability, we
incorporate physics-informed fine-tuning, ensuring physically consistent
adaptation to new reactor conditions. Our framework is evaluated across three
integer-order fundamental reactor types - continuous stirred tank reactors,
batch reactors, and plug flow reactors - demonstrating superior few-shot
adaptation compared to conventional data-driven, physics-informed, and transfer
learning approaches. By combining meta-learning with physics-informed
adaptation, this work lays the foundation for a generalizable modeling
framework, advancing the development of foundation models for chemical
engineering applications. Source code is available at
https://github.com/killingbear999/chemical-reactor-foundation-model.
| [
{
"version": "v1",
"created": "Mon, 20 May 2024 03:26:58 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Oct 2024 08:29:20 GMT"
},
{
"version": "v3",
"created": "Thu, 15 May 2025 14:08:49 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Wang",
"Zihao",
""
],
[
"Wu",
"Zhe",
""
]
] |
2405.12961 | Sebastian Ibarraran | Shriram Chennakesavalu, Frank Hu, Sebastian Ibarraran, Grant M.
Rotskoff | Aligning Transformers with Continuous Feedback via Energy Rank Alignment | null | null | null | null | cs.LG cs.AI physics.chem-ph q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Searching through chemical space is an exceptionally challenging problem
because the number of possible molecules grows combinatorially with the number
of atoms. Large, autoregressive models trained on databases of chemical
compounds have yielded powerful generators, but we still lack robust strategies
for generating molecules with desired properties. This molecular search problem
closely resembles the "alignment" problem for large language models, though for
many chemical tasks we have a specific and easily evaluable reward function.
Here, we introduce an algorithm called energy rank alignment (ERA) that
leverages an explicit reward function to produce a gradient-based objective
that we use to optimize autoregressive policies. We show theoretically that
this algorithm is closely related to proximal policy optimization (PPO) and
direct preference optimization (DPO), but has a minimizer that converges to an
ideal Gibbs-Boltzmann distribution with the reward playing the role of an
energy function. Furthermore, this algorithm is highly scalable, does not
require reinforcement learning, and performs well relative to DPO when the
number of preference observations per pairing is small. We deploy this approach
to align molecular transformers and protein language models to generate
molecules and protein sequences, respectively, with externally specified
properties and find that it does so robustly, searching through diverse parts
of chemical space.
| [
{
"version": "v1",
"created": "Tue, 21 May 2024 17:35:20 GMT"
},
{
"version": "v2",
"created": "Wed, 14 May 2025 20:23:34 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Chennakesavalu",
"Shriram",
""
],
[
"Hu",
"Frank",
""
],
[
"Ibarraran",
"Sebastian",
""
],
[
"Rotskoff",
"Grant M.",
""
]
] |
2405.14703 | Noam Zeilberger | Paul-Andr\'e Melli\`es, Noam Zeilberger | The categorical contours of the Chomsky-Sch\"utzenberger representation
theorem | null | null | null | null | math.CT cs.FL cs.LO | http://creativecommons.org/licenses/by/4.0/ | We develop fibrational perspectives on context-free grammars and on
nondeterministic finite-state automata over categories and operads. A
generalized CFG is a functor from a free colored operad (aka multicategory)
generated by a pointed finite species into an arbitrary base operad: this
encompasses classical CFGs by taking the base to be a certain operad
constructed from a free monoid, as an instance of a more general construction
of an \emph{operad of spliced arrows} $\mathcal{W}\,\mathcal{C}$ for any
category $\mathcal{C}$. A generalized NFA is a functor from an arbitrary
bipointed category or pointed operad satisfying the unique lifting of
factorizations and finite fiber properties: this encompasses classical word
automata and tree automata without $\epsilon$-transitions, but also automata
over non-free categories and operads. We show that generalized context-free and
regular languages satisfy suitable generalizations of many of the usual closure
properties, and in particular we give a simple conceptual proof that
context-free languages are closed under intersection with regular languages.
Finally, we observe that the splicing functor $\mathcal{W} : Cat \to Oper$
admits a left adjoint $\mathcal{C}: Oper \to Cat$, which we call the
\emph{contour category} construction since the arrows of
$\mathcal{C}\,\mathcal{O}$ have a geometric interpretation as oriented contours
of operations of $\mathcal{O}$. A direct consequence of the contour / splicing
adjunction is that every pointed finite species induces a universal CFG
generating a language of \emph{tree contour words.} This leads us to a
generalization of the Chomsky-Sch\"utzenberger Representation Theorem,
establishing that a subset of a homset $L \subseteq \mathcal{C}(A,B)$ is a CFL
of arrows if and only if it is a functorial image of the intersection of a
$\mathcal{C}$-chromatic tree contour language with a regular language.
| [
{
"version": "v1",
"created": "Fri, 29 Dec 2023 12:09:35 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Nov 2024 15:24:42 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Mar 2025 16:46:11 GMT"
},
{
"version": "v4",
"created": "Thu, 15 May 2025 12:55:28 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Melliès",
"Paul-André",
""
],
[
"Zeilberger",
"Noam",
""
]
] |
2405.14850 | Filip \v{Z}ivanovi\'c | Szil\'ard Szab\'o, Filip \v{Z}ivanovi\'c | Floer-theoretic filtration on Painlev\'e Hitchin systems | 22 pages, 5 figures, minor corrections, made exposition clearer | null | null | null | math.AG math.SG | http://creativecommons.org/licenses/by/4.0/ | We classify equivariant $\mathbb{C}^*$-actions on moduli spaces of Higgs
bundles corresponding to the Painlev\'e equations. Using this, we compute the
Floer-theoretic filtrations on the cohomology of these spaces, introduced by
Ritter and the second author in arXiv:2304.13026. We compare it with the
``$P=W$'' and the filtration obtained by multiplicities of the irreducible
components of the nilpotent cone, ultimately deducing that the Floer-theoretic
filtration coincides with the multiplicity filtration, for all 2-dimensional
Higgs moduli.
| [
{
"version": "v1",
"created": "Thu, 23 May 2024 17:56:47 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 17:40:34 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Szabó",
"Szilárd",
""
],
[
"Živanović",
"Filip",
""
]
] |
2405.15523 | Igor Shilov | Igor Shilov, Matthieu Meeus, Yves-Alexandre de Montjoye | The Mosaic Memory of Large Language Models | null | null | null | null | cs.CL cs.LG | http://creativecommons.org/licenses/by/4.0/ | As Large Language Models (LLMs) become widely adopted, understanding how they
learn from, and memorize, training data becomes crucial. Memorization in LLMs
is widely assumed to only occur as a result of sequences being repeated in the
training data. Instead, we show that LLMs memorize by assembling information
from similar sequences, a phenomena we call mosaic memory. We show major LLMs
to exhibit mosaic memory, with fuzzy duplicates contributing to memorization as
much as 0.8 of an exact duplicate and even heavily modified sequences
contributing substantially to memorization. Despite models display reasoning
capabilities, we somewhat surprisingly show memorization to be predominantly
syntactic rather than semantic. We finally show fuzzy duplicates to be
ubiquitous in real-world data, untouched by deduplication techniques. Taken
together, our results challenge widely held beliefs and show memorization to be
a more complex, mosaic process, with real-world implications for privacy,
confidentiality, model utility and evaluation.
| [
{
"version": "v1",
"created": "Fri, 24 May 2024 13:05:05 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 10:18:58 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Shilov",
"Igor",
""
],
[
"Meeus",
"Matthieu",
""
],
[
"de Montjoye",
"Yves-Alexandre",
""
]
] |
2405.17067 | Dixuan Wang | Dixuan Wang, Yanda Li, Junyuan Jiang, Zepeng Ding, Ziqin Luo, Guochao
Jiang, Jiaqing Liang, Deqing Yang | Tokenization Matters! Degrading Large Language Models through
Challenging Their Tokenization | null | null | null | null | cs.CL cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Large Language Models (LLMs) have shown remarkable capabilities in language
understanding and generation. Nonetheless, it was also witnessed that LLMs tend
to produce inaccurate responses to specific queries. This deficiency can be
traced to the tokenization step LLMs must undergo, which is an inevitable
limitation inherent to all LLMs. In fact, incorrect tokenization is the
critical point that hinders LLMs in understanding the input precisely, thus
leading to unsatisfactory output. This defect is more obvious in Chinese
scenarios. To demonstrate this flaw of LLMs, we construct an adversarial
dataset, named as $\textbf{ADT (Adversarial Dataset for Tokenizer)}$, which
draws upon the vocabularies of various open-source LLMs to challenge LLMs'
tokenization. ADT consists of two subsets: the manually constructed ADT-Human
and the automatically generated ADT-Auto. Our empirical results reveal that our
ADT is highly effective on challenging the tokenization of leading LLMs,
including GPT-4o, Llama-3, Deepseek-R1 and so on, thus degrading these LLMs'
capabilities. Moreover, our method of automatic data generation has been proven
efficient and robust, which can be applied to any open-source LLMs. In this
paper, we substantially investigate LLMs' vulnerability in terms of challenging
their token segmentation, which will shed light on the subsequent research of
improving LLMs' capabilities through optimizing their tokenization process and
algorithms.
| [
{
"version": "v1",
"created": "Mon, 27 May 2024 11:39:59 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 15:57:32 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Wang",
"Dixuan",
""
],
[
"Li",
"Yanda",
""
],
[
"Jiang",
"Junyuan",
""
],
[
"Ding",
"Zepeng",
""
],
[
"Luo",
"Ziqin",
""
],
[
"Jiang",
"Guochao",
""
],
[
"Liang",
"Jiaqing",
""
],
[
"Yang",
"Deqing",
""
]
] |
2405.17265 | Luca Scrucca | Luca Scrucca | Assessing uncertainty in Gaussian mixtures-based entropy estimation | null | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | Entropy estimation plays a crucial role in various fields, such as
information theory, statistical data science, and machine learning. However,
traditional entropy estimation methods often struggle with complex data
distributions. Mixture-based estimation of entropy has been recently proposed
and gained attention due to its ease of use and accuracy. This paper presents a
novel approach to quantify the uncertainty associated with this mixture-based
entropy estimation method using weighted likelihood bootstrap. Unlike standard
methods, our approach leverages the underlying mixture structure by assigning
random weights to observations in a weighted likelihood bootstrap procedure,
leading to more accurate uncertainty estimation. The generation of weights is
also investigated, leading to the proposal of using weights obtained from a
specific Dirichlet distribution which, in conjunction with centered percentile
intervals, yields the optimal setting to ensure empirical coverage closer to
the nominal level. Extensive simulation studies comparing different resampling
strategies are presented and results discussed. The proposed approach is
illustrated by analyzing the log-returns of daily Gold prices at COMEX for the
years 2014--2022, and the Net Rating scores, an advanced statistic used in
basketball analytics, for NBA teams with reference to the 2022/23 regular
season.
| [
{
"version": "v1",
"created": "Mon, 27 May 2024 15:23:54 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 08:03:52 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Scrucca",
"Luca",
""
]
] |
2405.18418 | Nicklas Hansen | Nicklas Hansen, Jyothir S V, Vlad Sobal, Yann LeCun, Xiaolong Wang,
Hao Su | Hierarchical World Models as Visual Whole-Body Humanoid Controllers | Code and videos at https://nicklashansen.com/rlpuppeteer | null | null | null | cs.LG cs.CV cs.RO | http://creativecommons.org/licenses/by/4.0/ | Whole-body control for humanoids is challenging due to the high-dimensional
nature of the problem, coupled with the inherent instability of a bipedal
morphology. Learning from visual observations further exacerbates this
difficulty. In this work, we explore highly data-driven approaches to visual
whole-body humanoid control based on reinforcement learning, without any
simplifying assumptions, reward design, or skill primitives. Specifically, we
propose a hierarchical world model in which a high-level agent generates
commands based on visual observations for a low-level agent to execute, both of
which are trained with rewards. Our approach produces highly performant control
policies in 8 tasks with a simulated 56-DoF humanoid, while synthesizing
motions that are broadly preferred by humans.
| [
{
"version": "v1",
"created": "Tue, 28 May 2024 17:57:23 GMT"
},
{
"version": "v2",
"created": "Fri, 31 May 2024 17:03:00 GMT"
},
{
"version": "v3",
"created": "Wed, 14 May 2025 18:27:05 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Hansen",
"Nicklas",
""
],
[
"S",
"Jyothir",
"V"
],
[
"Sobal",
"Vlad",
""
],
[
"LeCun",
"Yann",
""
],
[
"Wang",
"Xiaolong",
""
],
[
"Su",
"Hao",
""
]
] |
2406.00367 | Md. Mostafizer Rahman | Md. Mostafizer Rahman, Ariful Islam Shiplu, Yutaka Watanobe, and Md.
Ashad Alam | RoBERTa-BiLSTM: A Context-Aware Hybrid Model for Sentiment Analysis | null | null | null | null | cs.CL cs.AI cs.CE | http://creativecommons.org/licenses/by/4.0/ | Effectively analyzing the comments to uncover latent intentions holds immense
value in making strategic decisions across various domains. However, several
challenges hinder the process of sentiment analysis including the lexical
diversity exhibited in comments, the presence of long dependencies within the
text, encountering unknown symbols and words, and dealing with imbalanced
datasets. Moreover, existing sentiment analysis tasks mostly leveraged
sequential models to encode the long dependent texts and it requires longer
execution time as it processes the text sequentially. In contrast, the
Transformer requires less execution time due to its parallel processing nature.
In this work, we introduce a novel hybrid deep learning model, RoBERTa-BiLSTM,
which combines the Robustly Optimized BERT Pretraining Approach (RoBERTa) with
Bidirectional Long Short-Term Memory (BiLSTM) networks. RoBERTa is utilized to
generate meaningful word embedding vectors, while BiLSTM effectively captures
the contextual semantics of long-dependent texts. The RoBERTa-BiLSTM hybrid
model leverages the strengths of both sequential and Transformer models to
enhance performance in sentiment analysis. We conducted experiments using
datasets from IMDb, Twitter US Airline, and Sentiment140 to evaluate the
proposed model against existing state-of-the-art methods. Our experimental
findings demonstrate that the RoBERTa-BiLSTM model surpasses baseline models
(e.g., BERT, RoBERTa-base, RoBERTa-GRU, and RoBERTa-LSTM), achieving accuracies
of 80.74%, 92.36%, and 82.25% on the Twitter US Airline, IMDb, and Sentiment140
datasets, respectively. Additionally, the model achieves F1-scores of 80.73%,
92.35%, and 82.25% on the same datasets, respectively.
| [
{
"version": "v1",
"created": "Sat, 1 Jun 2024 08:59:46 GMT"
},
{
"version": "v2",
"created": "Thu, 15 May 2025 01:38:21 GMT"
}
] | 2025-05-16T00:00:00 | [
[
"Rahman",
"Md. Mostafizer",
""
],
[
"Shiplu",
"Ariful Islam",
""
],
[
"Watanobe",
"Yutaka",
""
],
[
"Alam",
"Md. Ashad",
""
]
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.