id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-05-16 00:00:00
authors_parsed
sequencelengths
1
2.83k
2309.08705
Linus Hamann
Linus Hamann, Si Ying Lee
Torsion Vanishing for Some Shimura Varieties
v4
null
null
null
math.NT math.AG
http://creativecommons.org/licenses/by/4.0/
We generalize the torsion vanishing results of Caraiani-Scholze and Koshikawa. Our results apply to the cohomology of general Shimura varieties $(\mathbf{G},X)$ of PEL type $A$ or $C$, localized at a suitable maximal ideal $\mathfrak{m}$ in the spherical Hecke algebra at primes $p$ such that $\mathbf{G}_{\mathbb{Q}_{p}}$ is a group for which we know the Fargues-Scholze local Langlands correspondence is the semi-simplification of a suitably nice local Langlands correspondence. This is accomplished by combining Koshikawa's technique, the theory of geometric Eisenstein series over the Fargues-Fontaine curve, the work of Santos describing the structure of the fibers of the minimally and toroidally compactified Hodge-Tate period morphism for general PEL type Shimura varieties of type $A$ or $C$, and ideas developed by Zhang on comparing Hecke correspondences on the moduli stack of $G$-bundles with the cohomology of Shimura varieties. In the process, we also establish a description of the generic part of the cohomology that bears resemblance to the work of Xiao-Zhu. Moreover, we also construct a filtration on the compactly supported cohomology that differs from Manotovan's filtration in the case that the Shimura variety is non-compact, allowing us to circumvent some of the circumlocutions taken by Cariani-Scholze. Our method showcases a very general strategy for proving such torsion vanishing results, and should bear even more fruit once the inputs are generalized. Motivated by this, we formulate an even more general torsion vanishing conjecture.
[ { "version": "v1", "created": "Fri, 15 Sep 2023 18:52:53 GMT" }, { "version": "v2", "created": "Sun, 3 Dec 2023 02:09:04 GMT" }, { "version": "v3", "created": "Mon, 9 Sep 2024 17:58:10 GMT" }, { "version": "v4", "created": "Wed, 14 May 2025 20:38:39 GMT" } ]
2025-05-16T00:00:00
[ [ "Hamann", "Linus", "" ], [ "Lee", "Si Ying", "" ] ]
2309.14218
Thomas J. Haines
Thomas J. Haines
Cellular pavings of fibers of convolution morphisms
24 pages. Minor error corrected with the addition of Lemma 7.2. Lemma 7.3 added. Material on triviality of morphisms added to section 5. Minor changes in notation. Published version
\'Epijournal de G\'eom\'etrie Alg\'ebrique, Volume 9 (2025), Article no. 9
null
null
math.AG math.RT
http://creativecommons.org/licenses/by-sa/4.0/
This article proves, in the case of split groups over arbitrary fields, that all fibers of convolution morphisms attached to parahoric affine flag varieties are paved by products of affine lines and affine lines minus a point. This applies in particular to the affine Grassmannian and to the convolution morphisms in the context of the geometric Satake correspondence. The second part of the article extends these results over $\mathbb Z$. Those in turn relate to the recent work of Cass-van den Hove-Scholbach on the geometric Satake equivalence for integral motives, and provide some alternative proofs for some of their results.
[ { "version": "v1", "created": "Mon, 25 Sep 2023 15:23:11 GMT" }, { "version": "v2", "created": "Thu, 2 May 2024 14:50:36 GMT" }, { "version": "v3", "created": "Sun, 8 Sep 2024 20:25:43 GMT" }, { "version": "v4", "created": "Thu, 15 May 2025 03:01:21 GMT" } ]
2025-05-16T00:00:00
[ [ "Haines", "Thomas J.", "" ] ]
2309.16723
Ilmari Kangasniemi
Ilmari Kangasniemi and Jani Onninen
Corrigendum to "On the heterogeneous distortion inequality"
Corrects an error affecting Lemma 7.2 and Theorem 1.3. of our article [arXiv:2102.03471]. We recover Theorem 1.3. 10 pages, 1 figure
Math. Ann. 389, 2037-2047 (2024)
10.1007/s00208-023-02728-1
null
math.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We correct an error in [I. Kangasniemi, and J. Onninen, On the heterogeneous distortion inequality. Math. Ann. 384 (2022), no. 3-4, 1275-1308.]
[ { "version": "v1", "created": "Fri, 22 Sep 2023 17:52:57 GMT" } ]
2025-05-16T00:00:00
[ [ "Kangasniemi", "Ilmari", "" ], [ "Onninen", "Jani", "" ] ]
2310.03445
Clemens Kupke
Ezra Schoen, Jade Master, Clemens Kupke
Relative fixed points of functors
26 pages
null
null
null
math.CT cs.LO
http://creativecommons.org/licenses/by/4.0/
We show how the relatively initial or relatively terminal fixed points for a well-behaved functor $F$ form a pair of adjoint functors between $F$-coalgebras and $F$-algebras. We use the language of locally presentable categories to find sufficient conditions for existence of this adjunction. We show that relative fixed points may be characterized as (co)equalizers of the free (co)monad on $F$. In particular, when $F$ is a polynomial functor on $\mathsf{Set}$ the relative fixed points are a quotient or subset of the free term algebra or the cofree term coalgebra. We give examples of the relative fixed points for polynomial functors and an example which is the Sierpinski carpet. Lastly, we prove a general preservation result for relative fixed points.
[ { "version": "v1", "created": "Thu, 5 Oct 2023 10:31:57 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 16:04:46 GMT" } ]
2025-05-16T00:00:00
[ [ "Schoen", "Ezra", "" ], [ "Master", "Jade", "" ], [ "Kupke", "Clemens", "" ] ]
2310.09406
Dawid Paszko
Dawid Paszko, Dominic C. Rose, Marzena H. Szyma\'nska, Arijeet Pal
Edge modes and symmetry-protected topological states in open quantum systems
21 pages, 10 figures
PRX Quantum 5, 030304 (2024)
10.1103/PRXQuantum.5.030304
null
quant-ph cond-mat.stat-mech
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Topological order offers possibilities for processing quantum information which can be immune to imperfections. However, the question of its stability out of equilibrium is relevant for experiments, where coupling to an environment is unavoidable. In this work we demonstrate the robustness of certain aspects of $Z_2 \times Z_2$ symmetry-protected topological (SPT) order against a wide class of dissipation channels in the Lindblad and quantum trajectory formalisms of an open quantum system. This is illustrated using the one-dimensional $ZXZ$ cluster Hamiltonian along with Pauli-string jump operators. We show that certain choices of dissipation retaining strong symmetries support a steady-state manifold consisting of two non-local logical qubits, and for Hamiltonian perturbations preserving the global symmetry, states in this manifold remain metastable. In contrast, this metastability is destroyed upon breaking the above-mentioned symmetry. While the localized edge qubits of the cluster Hamiltonian are not conserved by the Lindbladian evolution, they do correspond to weak symmetries and thus retain a memory of their initial state at all times in the quantum trajectories. We utilize this feature to construct protocols to retrieve the quantum information either by monitoring jumps or error mitigation. Our work thus proposes a novel framework to study the dynamics of dissipative SPT phases and opens the possibility of engineering entangled states relevant to quantum information processing.
[ { "version": "v1", "created": "Fri, 13 Oct 2023 21:09:52 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 15:55:23 GMT" } ]
2025-05-16T00:00:00
[ [ "Paszko", "Dawid", "" ], [ "Rose", "Dominic C.", "" ], [ "Szymańska", "Marzena H.", "" ], [ "Pal", "Arijeet", "" ] ]
2310.11711
Zhi Zhang
Zhi Zhang, Kyle Ritscher, Oscar Hernan Madrid Padilla
Risk Bounds for Quantile Additive Trend Filtering
9 pages, 4 figures, published in AISTATS 2025 (PMLR Vol. 258)
Proceedings of the 28th International Conference on Artificial Intelligence and Statistics (AISTATS) 2025, PMLR 258, pp. 4735-4743, 2025
null
null
math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates risk bounds for quantile additive trend filtering, a method gaining increasing significance in the realms of additive trend filtering and quantile regression. We investigate the constrained version of quantile trend filtering within additive models, considering both fixed and growing input dimensions. In the fixed dimension case, we discover an error rate that mirrors the non-quantile minimax rate for additive trend filtering, featuring the main term $n^{-2r/(2r+1)}V^{2/(2r+1)}$, when the underlying quantile function is additive, with components whose $(r-1)$th derivatives are of bounded variation by $V$. In scenarios with a growing input dimension $d$, quantile additive trend filtering introduces a polynomial factor of $d^{(2r+2)/(2r+1)}$. This aligns with the non-quantile variant, featuring a linear factor $d$, particularly pronounced for larger $r$ values. Additionally, we propose a practical algorithm for implementing quantile trend filtering within additive models, using dimension-wise backfitting. We conduct experiments with evenly spaced data points or data that samples from a uniform distribution in the interval $[0,1]$, applying distinct component functions and introducing noise from normal and heavy-tailed distributions. Our findings confirm the estimator's convergence as $n$ increases and its superiority, particularly in heavy-tailed distribution scenarios. These results deepen our understanding of additive trend filtering models in quantile settings, offering valuable insights for practical applications and future research.
[ { "version": "v1", "created": "Wed, 18 Oct 2023 04:59:11 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 06:15:27 GMT" } ]
2025-05-16T00:00:00
[ [ "Zhang", "Zhi", "" ], [ "Ritscher", "Kyle", "" ], [ "Padilla", "Oscar Hernan Madrid", "" ] ]
2310.12915
Gauhar Abbas
Gauhar Abbas
The standard HVM
Accepted version in Mod.Phys.Lett.A
Mod.Phys.Lett.A 40 (2025) 17n18, 2550056
10.1142/S0217732325500567
null
hep-ph hep-ex
http://creativecommons.org/licenses/by/4.0/
We discuss a standard hierarchical VEVs model which predicts the leptonic mixing angles in terms of the Cabibbo angle, and masses of strange and charm quarks as $\sin \theta_{12}^\ell \geq 1 - 2 \sin \theta_{12}$, $\sin \theta_{23}^\ell \geq 1 - \sin \theta_{12}$, and $\sin \theta_{13}^\ell \geq \sin \theta_{12} - \frac{m_s}{m_c}$ for the normal mass ordering of neutrinos. This results in very precise predictions of the leptonic mixing angles given by $\sin \theta_{12}^\ell = 0.55 \pm 0.00134 $, $\sin \theta_{23}^\ell = 0.775 \pm 0.00067 $, and $\sin \theta_{13}^\ell = 0.1413 - 0.1509 $. Furthermore, we predict neutrinos to be the Dirac kind disfavouring the inverted mass hierarchy. The standard hierarchical VEVs model predicts a possible new class of the dark matter candidate, named as neutrinic dark matter.
[ { "version": "v1", "created": "Thu, 19 Oct 2023 17:07:35 GMT" }, { "version": "v2", "created": "Wed, 11 Dec 2024 16:15:28 GMT" }, { "version": "v3", "created": "Thu, 6 Mar 2025 05:01:55 GMT" } ]
2025-05-16T00:00:00
[ [ "Abbas", "Gauhar", "" ] ]
2310.14279
Tatsumasa Suzuki
Tatsumasa Suzuki
On the Ozsv\'ath-Szab\'o $d$-invariants for almost simple linear graphs
34 pages, 6 figures, The title is changed
null
null
null
math.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Karakurt and \c{S}avk calculate the Ozsv\'ath-Szab\'o $d$-invariant for Brieskorn homology $3$-spheres where surgery diagrams can be expressed as almost simple linear graphs. In this paper, we introduce a refiniment of Karakurt and \c{S}avk's formula for these $d$-invariants. We also introduce infinite examples of inequalities that appear in this refinement in which the equality holds, and infinite examples in which it does not hold. We also discuss an application to knot concordance group.
[ { "version": "v1", "created": "Sun, 22 Oct 2023 12:13:53 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 12:58:56 GMT" } ]
2025-05-16T00:00:00
[ [ "Suzuki", "Tatsumasa", "" ] ]
2310.16116
Georgios Valogiannis
Georgios Valogiannis, Sihan Yuan, Cora Dvorkin
Precise Cosmological Constraints from BOSS Galaxy Clustering with a Simulation-Based Emulator of the Wavelet Scattering Transform
27 pages, 17 figures, 4 tables. Updated to match version accepted in PRD. v3: Updated funding information
Phys. Rev. D 109.103503 (2024)
10.1103/PhysRevD.109.103503
null
astro-ph.CO astro-ph.GA astro-ph.IM hep-ph physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We perform a reanalysis of the BOSS CMASS DR12 galaxy dataset using a simulation-based emulator for the Wavelet Scattering Transform (WST) coefficients. Moving beyond our previous works, which laid the foundation for the first galaxy clustering application of this estimator, we construct a neural net-based emulator for the cosmological dependence of the WST coefficients and the 2-point correlation function multipoles, trained from the state-of-the-art suite of \textsc{AbacusSummit} simulations combined with a flexible Halo Occupation Distribution (HOD) galaxy model. In order to confirm the accuracy of our pipeline, we subject it to a series of thorough internal and external mock parameter recovery tests, before applying it to reanalyze the CMASS observations in the redshift range $0.46<z<0.57$. We find that a joint WST + 2-point correlation function likelihood analysis allows us to obtain marginalized 1$\sigma$ errors on the $\Lambda$CDM parameters that are tighter by a factor of $2.5-6$, compared to the 2-point correlation function, and by a factor of $1.4-2.5$ compared to the WST-only results. This corresponds to a competitive $0.9\%$, $2.3\%$ and $1\%$ level of determination for parameters $\omega_c$, $\sigma_8$ $\&$ $n_s$, respectively, and also to a $0.7\%$ $\&$ $2.5 \%$ constraint on derived parameters h and $f(z)\sigma_8(z)$, in agreement with the \textit{Planck} 2018 results. Our results reaffirm the constraining power of the WST and highlight the exciting prospect of employing higher-order statistics in order to fully exploit the power of upcoming Stage-IV spectroscopic observations.
[ { "version": "v1", "created": "Tue, 24 Oct 2023 18:33:11 GMT" }, { "version": "v2", "created": "Tue, 16 Apr 2024 20:28:23 GMT" }, { "version": "v3", "created": "Wed, 14 May 2025 21:43:01 GMT" } ]
2025-05-16T00:00:00
[ [ "Valogiannis", "Georgios", "" ], [ "Yuan", "Sihan", "" ], [ "Dvorkin", "Cora", "" ] ]
2310.18195
Jiyu Chen
Jiyu Chen, Francesco Petocchi, Viktor Christiansson, and Philipp Werner
Nature of the photo-induced metallic state in monoclinic VO$_2$
null
Phys. Rev. B 109, L201101 (2024)
10.1103/PhysRevB.109.L201101
null
cond-mat.str-el
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The metal-insulator transition of VO$_2$, which in equilibrium is associated with a structural phase transition, has been intensively studied for decades. In particular, it is challenging to disentangle the role of Mott physics from dimerization effects in the insulating phase. Femtosecond time-resolved experiments showed that optical excitations can induce a transient metallic state in the dimerized phase, which is distinct from the known equilibrium phases. In this study, we combine non-equilibrium cluster dynamical mean-field theory with realistic first principles modeling to clarify the nature of this laser-induced metallic state. We show that the doublon-holon production by laser pulses with polarization along the V-V dimers and the subsequent inter-orbital reshuffling of the photo-carriers leads to a population of orbital-mixed states and the filling of the gap. The photo-induced metal state is qualitatively similar to a hot electronic state in the dimerized structure, and does not involve a collapse of the Mott gap.
[ { "version": "v1", "created": "Fri, 27 Oct 2023 15:08:53 GMT" } ]
2025-05-16T00:00:00
[ [ "Chen", "Jiyu", "" ], [ "Petocchi", "Francesco", "" ], [ "Christiansson", "Viktor", "" ], [ "Werner", "Philipp", "" ] ]
2310.20378
Milton Ruiz
Ver\'onica Villa-Ortega, Ana Lorenzo-Medina, Juan Calder\'on Bustillo, Milton Ruiz, Davide Guerra, Pablo Cerd\'a-Duran, Jos\'e A. Font
Self-consistent treatment of thermal effects in neutron-star post-mergers: observational implications for third-generation gravitational-wave detectors
10 pages, 5 Figures. Matches published version
Phys. Rev. D 111, 103030 (2025)
10.1103/PhysRevD.111.103030
null
gr-qc astro-ph.HE
http://creativecommons.org/licenses/by/4.0/
We assess the impact of accurate, self-consistent modelling of thermal effects in neutron-star merger remnants in the context of third-generation gravitational-wave detectors. This is done through the usage, in Bayesian model selection experiments, of numerical-relativity simulations of binary neutron star (BNS) mergers modelled through: a) nuclear, finite-temperature (or ``tabulated'') equations of state (EoSs), and b) their simplifed piecewise (or ``hybrid'') representation. These cover four different EoSs, namely SLy4, DD2, HShen and LS220. Our analyses make direct use of the Newman-Penrose scalar $\psi_4$ outputted by numerical simulations. Considering a detector network formed by three Cosmic Explorers, we show that differences in the gravitational-wave emission predicted by the two models are detectable with a natural logarithmic Bayes Factor $\log{\cal{B}}\geq 5$ at average distances of $d_L \simeq 50$Mpc, reaching $d_L \simeq 100$Mpc for source inclinations $\iota \leq 0.8$, regardless of the EoS. This impact is most pronounced for the HShen EoS. For low inclinations, only the DD2 EoS prevents the detectability of such modelling differences at $d_L \simeq 150$Mpc. Our results suggest that the usage a self-consistent treatment of thermal effects is crucial for third-generation gravitational wave detectors.
[ { "version": "v1", "created": "Tue, 31 Oct 2023 11:37:23 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 13:11:23 GMT" } ]
2025-05-16T00:00:00
[ [ "Villa-Ortega", "Verónica", "" ], [ "Lorenzo-Medina", "Ana", "" ], [ "Bustillo", "Juan Calderón", "" ], [ "Ruiz", "Milton", "" ], [ "Guerra", "Davide", "" ], [ "Cerdá-Duran", "Pablo", "" ], [ "Font", "José A.", "" ] ]
2311.02505
Doron Puder
Gil Alon, Gady Kozma, Doron Puder
On the Aldous-Caputo Spectral Gap Conjecture for Hypergraphs
32 pages + 9 pages of Appendix containing code in SageMath. Incorporated referees' remarks. To appear in Math. Proc. Cambridge Phil. Soc
null
null
null
math.GR math.CO math.PR math.RT
http://creativecommons.org/licenses/by-nc-sa/4.0/
In their celebrated paper (arXiv:0906.1238), Caputo, Liggett and Richthammer proved Aldous' conjecture and showed that for an arbitrary finite graph, the spectral gap of the interchange process is equal to the spectral gap of the underlying random walk. A crucial ingredient in the proof was the Octopus Inequality - a certain inequality of operators in the group ring $\mathbb{R}[\mathrm{Sym}_n]$ of the symmetric group. Here we generalize the Octopus Inequality and apply it to generalize the Caputo-Liggett-Richthammer Theorem to certain hypergraphs, proving some cases of a conjecture of Caputo.
[ { "version": "v1", "created": "Sat, 4 Nov 2023 20:51:01 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 21:13:24 GMT" } ]
2025-05-16T00:00:00
[ [ "Alon", "Gil", "" ], [ "Kozma", "Gady", "" ], [ "Puder", "Doron", "" ] ]
2311.03541
Michael Baake
Michael Baake (Bielefeld), Franz G\"ahler (Bielefeld), Philipp Gohlke (Lund)
Orbit separation dimension as complexity measure for primitive inflation tilings
29 pages, 1 figure, minor revisions and updates
null
10.1017/etds.2025.18
null
math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Orbit separation dimension (OSD), previously introduced as amorphic complexity, is a powerful complexity measure for topological dynamical systems with pure-point spectrum. Here, we develop methods and tools for it that allow a systematic application to translation dynamical systems of tiling spaces that are generated by primitive inflation rules. These systems share many nice properties that permit the explicit computation of the OSD, thus providing a rich class of examples with non-trivial OSD.
[ { "version": "v1", "created": "Mon, 6 Nov 2023 21:24:43 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 11:50:52 GMT" } ]
2025-05-16T00:00:00
[ [ "Baake", "Michael", "", "Bielefeld" ], [ "Gähler", "Franz", "", "Bielefeld" ], [ "Gohlke", "Philipp", "", "Lund" ] ]
2311.04229
Amir Salimi
Amir Salimi, Sunil Vasu Kalmady, Abram Hindle, Osmar Zaiane, Padma Kaul
Exploring Best Practices for ECG Pre-Processing in Machine Learning
null
null
null
null
eess.SP cs.LG
http://creativecommons.org/licenses/by/4.0/
In this work we search for best practices in pre-processing of Electrocardiogram (ECG) signals in order to train better classifiers for the diagnosis of heart conditions. State of the art machine learning algorithms have achieved remarkable results in classification of some heart conditions using ECG data, yet there appears to be no consensus on pre-processing best practices. Is this lack of consensus due to different conditions and architectures requiring different processing steps for optimal performance? Is it possible that state of the art deep-learning models have rendered pre-processing unnecessary? In this work we apply down-sampling, normalization, and filtering functions to 3 different multi-label ECG datasets and measure their effects on 3 different high-performing time-series classifiers. We find that sampling rates as low as 50Hz can yield comparable results to the commonly used 500Hz. This is significant as smaller sampling rates will result in smaller datasets and models, which require less time and resources to train. Additionally, despite their common usage, we found min-max normalization to be slightly detrimental overall, and band-passing to make no measurable difference. We found the blind approach to pre-processing of ECGs for multi-label classification to be ineffective, with the exception of sample rate reduction which reliably reduces computational resources, but does not increase accuracy.
[ { "version": "v1", "created": "Thu, 2 Nov 2023 20:29:15 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 19:49:48 GMT" } ]
2025-05-16T00:00:00
[ [ "Salimi", "Amir", "" ], [ "Kalmady", "Sunil Vasu", "" ], [ "Hindle", "Abram", "" ], [ "Zaiane", "Osmar", "" ], [ "Kaul", "Padma", "" ] ]
2311.08043
Pierre-Fran\c{c}ois De Plaen
Pierre-Fran\c{c}ois De Plaen, Nicola Marinello, Marc Proesmans, Tinne Tuytelaars, Luc Van Gool
Contrastive Learning for Multi-Object Tracking with Transformers
WACV 2024
null
10.1109/WACV57701.2024.00672
null
cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
The DEtection TRansformer (DETR) opened new possibilities for object detection by modeling it as a translation task: converting image features into object-level representations. Previous works typically add expensive modules to DETR to perform Multi-Object Tracking (MOT), resulting in more complicated architectures. We instead show how DETR can be turned into a MOT model by employing an instance-level contrastive loss, a revised sampling strategy and a lightweight assignment method. Our training scheme learns object appearances while preserving detection capabilities and with little overhead. Its performance surpasses the previous state-of-the-art by +2.6 mMOTA on the challenging BDD100K dataset and is comparable to existing transformer-based methods on the MOT17 dataset.
[ { "version": "v1", "created": "Tue, 14 Nov 2023 10:07:52 GMT" } ]
2025-05-16T00:00:00
[ [ "De Plaen", "Pierre-François", "" ], [ "Marinello", "Nicola", "" ], [ "Proesmans", "Marc", "" ], [ "Tuytelaars", "Tinne", "" ], [ "Van Gool", "Luc", "" ] ]
2311.08168
Ben Chugg
Ben Chugg, Hongjian Wang, Aaditya Ramdas
Time-Uniform Confidence Spheres for Means of Random Vectors
52 pages; 3 figures. Published in Transactions on Machine Learning Research
null
null
null
math.ST cs.IT math.IT stat.ME stat.ML stat.TH
http://creativecommons.org/licenses/by/4.0/
We study sequential mean estimation in $\mathbb{R}^d$. In particular, we derive time-uniform confidence spheres -- confidence sphere sequences (CSSs) -- which contain the mean of random vectors with high probability simultaneously across all sample sizes. Our results include a dimension-free CSS for log-concave random vectors, a dimension-free CSS for sub-Gaussian random vectors, and CSSs for sub-$\psi$ random vectors (which includes sub-gamma, sub-Poisson, and sub-exponential distributions). Many of our results are optimal. For sub-Gaussian distributions we also provide a CSS which tracks a time-varying mean, generalizing Robbins' mixture approach to the multivariate setting. Finally, we provide several CSSs for heavy-tailed random vectors (two moments only). Our bounds hold under a martingale assumption on the mean and do not require that the observations be iid. Our work is based on PAC-Bayesian theory and inspired by an approach of Catoni and Giulini.
[ { "version": "v1", "created": "Tue, 14 Nov 2023 13:49:46 GMT" }, { "version": "v2", "created": "Thu, 29 Feb 2024 03:53:39 GMT" }, { "version": "v3", "created": "Wed, 2 Oct 2024 17:15:02 GMT" }, { "version": "v4", "created": "Thu, 20 Feb 2025 22:10:26 GMT" }, { "version": "v5", "created": "Wed, 14 May 2025 19:40:21 GMT" } ]
2025-05-16T00:00:00
[ [ "Chugg", "Ben", "" ], [ "Wang", "Hongjian", "" ], [ "Ramdas", "Aaditya", "" ] ]
2311.10543
Tony Lindeberg
Tony Lindeberg
Unified theory for joint covariance properties under geometric image transformations for spatio-temporal receptive fields according to the generalized Gaussian derivative model for visual receptive fields
46 pages, 19 figures. Note: From version 4, this paper considers a different form of joint composition of the geometric image transformations than in the earlier versions
null
null
null
cs.CV q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The influence of natural image transformations on receptive field responses is crucial for modelling visual operations in computer vision and biological vision. In this regard, covariance properties with respect to geometric image transformations in the earliest layers of the visual hierarchy are essential for expressing robust image operations, and for formulating invariant visual operations at higher levels. This paper defines and proves a set of joint covariance properties for spatio-temporal receptive fields in terms of spatio-temporal derivative operators applied to spatio-temporally smoothed image data under compositions of spatial scaling transformations, spatial affine transformations, Galilean transformations and temporal scaling transformations. Specifically, the derived relations show how the parameters of the receptive fields need to be transformed, in order to match the output from spatio-temporal receptive fields under composed spatio-temporal image transformations. For this purpose, we also fundamentally extend the notion of scale-normalized derivatives to affine-normalized derivatives, that are computed based on spatial smoothing with affine Gaussian kernels, and analyze the covariance properties of the resulting affine-normalized derivatives for the affine group as well as for important subgroups thereof. We conclude with a geometric analysis, showing how the derived joint covariance properties make it possible to relate or match spatio-temporal receptive field responses, when observing, possibly moving, local surface patches from different views, under locally linearized perspective or projective transformations, as well as when observing different instances of spatio-temporal events, that may occur either faster or slower between different views of similar spatio-temporal events.
[ { "version": "v1", "created": "Fri, 17 Nov 2023 14:10:55 GMT" }, { "version": "v2", "created": "Mon, 20 Nov 2023 09:50:24 GMT" }, { "version": "v3", "created": "Thu, 23 Nov 2023 06:10:17 GMT" }, { "version": "v4", "created": "Fri, 26 Apr 2024 13:43:04 GMT" }, { "version": "v5", "created": "Thu, 2 May 2024 07:15:14 GMT" }, { "version": "v6", "created": "Mon, 8 Jul 2024 13:45:34 GMT" }, { "version": "v7", "created": "Thu, 11 Jul 2024 14:19:52 GMT" }, { "version": "v8", "created": "Mon, 20 Jan 2025 09:25:22 GMT" }, { "version": "v9", "created": "Thu, 15 May 2025 06:54:39 GMT" } ]
2025-05-16T00:00:00
[ [ "Lindeberg", "Tony", "" ] ]
2311.11333
Jinyu Guo
Jinyu Guo, Haizhong Li, Chao Xia
Stable $(r+1)$-th capillary hypersurfaces
31 pages,2 figures,to appear in Rev.Mat.Iberoam
null
null
null
math.DG math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new definition of stable $(r+1)$-th capillary hypersurfaces from variational perspective for any $1\leq r\leq n-1$. More precisely, we define stable $(r+1)$-th capillary hypersurfaces to be smooth local minimizers of a new energy functional under volume-preserving and contact angle-preserving variations. Using the new concept of the stable $(r+1)$-th capillary hypersurfaces, we generalize the stability results of Souam \cite{Souam} in a Euclidean half-space and Guo-Wang-Xia \cite{GWX} in a horoball in hyperbolic space for capillary hypersurface to $(r+1)$-th capillary hypersurface case.
[ { "version": "v1", "created": "Sun, 19 Nov 2023 14:21:37 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 07:46:05 GMT" } ]
2025-05-16T00:00:00
[ [ "Guo", "Jinyu", "" ], [ "Li", "Haizhong", "" ], [ "Xia", "Chao", "" ] ]
2311.13590
Katarzyna Paluch
Katarzyna Paluch
Triangle-free 2-matchings
null
null
null
null
cs.DS cs.DM
http://creativecommons.org/licenses/by/4.0/
We consider the problem of finding a maximum size triangle-free $2$-matching in a graph $G=(V,E)$. A (simple) $2$-matching is any subset of the edges such that each vertex is incident to at most two edges from the subset. The first polynomial time algorithm for this problem was given by Hartvigsen in 1984 in his PhD thesis and its improved version has been recently published in a journal. We present a different, significantly simpler algorithm with a relatively short proof of correctness. Our algorithm with running time $O(|V||E|)$ is additionally faster than the one by Hartvigsen having running time $O(|V|^3|E|^2)$. It has been proven before that for any triangle-free $2$-matching $M$ which is not maximum the graph contains an $M$-augmenting path, whose application to $M$ results in a bigger triangle-free $2$-matching. A new observation is that the search for an augmenting path $P$ can be restricted to so-called {\em amenable} paths that go through any triangle $t$ contained in $P\cup M$ a limited number of times. Amenable paths can be characterised with the aid of {\em half-edges}. A {\em half-edge} of edge $e$ is, informally speaking, a half of $e$ containing exactly one of its endpoints. Each half-edge serves also as a {\em hinge} - a connector between one pair of edges on an alternating path. To find an amenable augmenting path we thus dynamically remove and re-add half-edges to forbid or allow some edges to be followed by certain others. The existence of amenable augmenting paths follows from our decomposition theorem for triangle-free $2$-matchings. This decomposition theorem is largely the same as the decomposition from versions 1-6 of this paper and is moreover simpler and stronger than the one given by Kobayashi and Noguchi.
[ { "version": "v1", "created": "Wed, 22 Nov 2023 18:52:51 GMT" }, { "version": "v2", "created": "Tue, 16 Jan 2024 20:12:38 GMT" }, { "version": "v3", "created": "Mon, 22 Jan 2024 20:14:13 GMT" }, { "version": "v4", "created": "Thu, 1 Feb 2024 18:40:07 GMT" }, { "version": "v5", "created": "Thu, 18 Apr 2024 17:46:27 GMT" }, { "version": "v6", "created": "Fri, 7 Jun 2024 17:30:53 GMT" }, { "version": "v7", "created": "Thu, 18 Jul 2024 17:27:34 GMT" }, { "version": "v8", "created": "Mon, 23 Dec 2024 15:50:42 GMT" }, { "version": "v9", "created": "Thu, 15 May 2025 13:43:47 GMT" } ]
2025-05-16T00:00:00
[ [ "Paluch", "Katarzyna", "" ] ]
2311.14435
Georgii Mikriukov
Georgii Mikriukov, Gesina Schwalbe, Korinna Bade
Local Concept Embeddings for Analysis of Concept Distributions in Vision DNN Feature Spaces
This is the authors accepted manuscript of the article accepted for publication in the International Journal of Computer Vision (IJCV). The final version will be available via SpringerLink upon publication. To cite this work please refer to the final journal version once published
null
10.1007/s11263-025-02446-y
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
Insights into the learned latent representations are imperative for verifying deep neural networks (DNNs) in critical computer vision (CV) tasks. Therefore, state-of-the-art supervised Concept-based eXplainable Artificial Intelligence (C-XAI) methods associate user-defined concepts like ``car'' each with a single vector in the DNN latent space (concept embedding vector). In the case of concept segmentation, these linearly separate between activation map pixels belonging to a concept and those belonging to background. Existing methods for concept segmentation, however, fall short of capturing implicitly learned sub-concepts (e.g., the DNN might split car into ``proximate car'' and ``distant car''), and overlap of user-defined concepts (e.g., between ``bus'' and ``truck''). In other words, they do not capture the full distribution of concept representatives in latent space. For the first time, this work shows that these simplifications are frequently broken and that distribution information can be particularly useful for understanding DNN-learned notions of sub-concepts, concept confusion, and concept outliers. To allow exploration of learned concept distributions, we propose a novel local concept analysis framework. Instead of optimizing a single global concept vector on the complete dataset, it generates a local concept embedding (LoCE) vector for each individual sample. We use the distribution formed by LoCEs to explore the latent concept distribution by fitting Gaussian mixture models (GMMs), hierarchical clustering, and concept-level information retrieval and outlier detection. Despite its context sensitivity, our method's concept segmentation performance is competitive to global baselines. Analysis results are obtained on three datasets and six diverse vision DNN architectures, including vision transformers (ViTs).
[ { "version": "v1", "created": "Fri, 24 Nov 2023 12:22:00 GMT" }, { "version": "v2", "created": "Mon, 4 Nov 2024 12:48:38 GMT" }, { "version": "v3", "created": "Sun, 30 Mar 2025 15:12:08 GMT" } ]
2025-05-16T00:00:00
[ [ "Mikriukov", "Georgii", "" ], [ "Schwalbe", "Gesina", "" ], [ "Bade", "Korinna", "" ] ]
2312.00859
Alexandre Benatti
Alexandre Benatti, Luciano da F. Costa
Random Walks Performed by Topologically-Specific Agents on Complex Networks
21 pages, 15 figures
null
null
null
physics.soc-ph cs.GR
http://creativecommons.org/licenses/by-nc-nd/4.0/
Random walks by single-node agents have been systematically conducted on various types of complex networks in order to investigate how their topologies can affect the dynamics of the agents. However, by fitting any network node, these agents do not engage in topological interactions with the network. In the present work, we describe random walks on complex networks performed by agents that are actually small graphs. These agents can only occupy admissible portions of the network onto which they fit topologically, hence their name being taken as topologically-specific agents. These agents are also allowed to move to adjacent subgraphs in the network, which have each node adjacent to a distinct original respective node of the agent. Given a network and a specific agent, it is possible to obtain a respective associated network, in which each node corresponds to a possible instance of the agent and the edges indicate adjacent positions. Associated networks are obtained and studied respectively to three types of topologically-specific agents (triangle, square, and slashed square) considering three types of complex networks (geometrical, Erd\H{o}s-R\'enyi, and Barab\'asi-Albert). Uniform random walks are also performed on these structures, as well as networks respectively obtained by removing the five nodes with the highest degree, and studied in terms of the number of covered nodes along the walks. Several results are reported and discussed, including the fact that substantially distinct associated networks can be obtained for each of the three considered agents and for varying average node degrees. Respectively to the coverage of the networks by uniform random walks, the square agent led to the most effective coverage of the nodes, followed by the triangle and slashed square agents. In addition, the geometric network turned out to be less effectively covered.
[ { "version": "v1", "created": "Fri, 1 Dec 2023 17:09:44 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 14:16:16 GMT" } ]
2025-05-16T00:00:00
[ [ "Benatti", "Alexandre", "" ], [ "Costa", "Luciano da F.", "" ] ]
2312.01797
Peng Wang Dr.
Hengjia Xiao, Peng Wang, Mingzhe Yu, Mattia Robbiani
LLM A*: Human in the Loop Large Language Models Enabled A* Search for Robotics
7 figures, 8 pages
null
null
null
cs.RO cs.AI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This research focuses on how Large Language Models (LLMs) can help with (path) planning for mobile embodied agents such as robots, in a human-in-the-loop and interactive manner. A novel framework named LLM A*, aims to leverage the commonsense of LLMs, and the utility-optimal A* is proposed to facilitate few-shot near-optimal path planning. Prompts are used for two main purposes: 1) to provide LLMs with essential information like environments, costs, heuristics, etc.; 2) to communicate human feedback on intermediate planning results to LLMs. This approach takes human feedback on board and renders the entire planning process transparent (akin to a `white box') to humans. Moreover, it facilitates code-free path planning, thereby fostering the accessibility and inclusiveness of artificial intelligence techniques to communities less proficient in coding. Comparative analysis against A* and RL demonstrates that LLM A* exhibits greater efficiency in terms of search space and achieves paths comparable to A* while outperforming RL. The interactive nature of LLM A* also makes it a promising tool for deployment in collaborative human-robot tasks. Codes and Supplemental Materials can be found at GitHub: https://github.com/speedhawk/LLM-A-.
[ { "version": "v1", "created": "Mon, 4 Dec 2023 10:37:58 GMT" }, { "version": "v2", "created": "Thu, 20 Jun 2024 18:50:52 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 11:25:13 GMT" } ]
2025-05-16T00:00:00
[ [ "Xiao", "Hengjia", "" ], [ "Wang", "Peng", "" ], [ "Yu", "Mingzhe", "" ], [ "Robbiani", "Mattia", "" ] ]
2312.06375
Nisarg Chadha
Nisarg Chadha, Subroto Mukerjee
Vortical currents and reciprocal relations for transport coefficients in the electron hydrodynamic regime
6+5 Pages
Phys. Rev. Lett. 134 (19), 196301(2025)
10.1103/PhysRevLett.134.196301
null
cond-mat.mes-hall cond-mat.stat-mech cond-mat.str-el
http://creativecommons.org/licenses/by/4.0/
We investigate the hydrodynamic regime in metals with momentum-conserving electron-electron scattering. The conservation of momentum results in well-defined dynamics whose effects we investigate via the relevant continuity equations. We find anomalous contributions to the charge and heat transport currents arising from gradients of the velocity field in a semiclassical treatment with a Berry curvature. These contributions are non-vanishing for systems lacking inversion symmetry, and the corresponding transport coefficients do not obey the standard Onsager reciprocity relations. Instead, we show that the response coefficients relating the currents to the stress tensor obey independent reciprocity relations with the stress tensor and thus exhibit cross-tensor effects of charge and heat transport with the momentum transport. The Berry curvature contribution to the stress magnetization tensor is also derived.
[ { "version": "v1", "created": "Mon, 11 Dec 2023 13:33:06 GMT" }, { "version": "v2", "created": "Mon, 29 Apr 2024 13:00:30 GMT" }, { "version": "v3", "created": "Tue, 30 Apr 2024 11:10:01 GMT" }, { "version": "v4", "created": "Thu, 15 May 2025 14:46:40 GMT" } ]
2025-05-16T00:00:00
[ [ "Chadha", "Nisarg", "" ], [ "Mukerjee", "Subroto", "" ] ]
2312.11873
Jingbang Chen
Jingbang Chen, Jiangqi Dai, Qiuyang Mang, Qingyu Shi, Tingqiang Xu
Nearly Optimal Internal Dictionary Matching
25 pages
null
null
null
cs.DS
http://creativecommons.org/licenses/by/4.0/
We study the internal dictionary matching (IDM) problem where a dictionary $\mathcal{D}$ containing $d$ substrings of a text $T$ is given, and each query concerns the occurrences of patterns in $\mathcal{D}$ in another substring of $T$. We propose a novel $O(n)$-sized data structure named Basic Substring Structure (BASS) where $n$ is the length of the text $T.$ With BASS, we are able to handle all types of queries in the IDM problem in nearly optimal query and preprocessing time. Specifically, our results include: $\bullet$ The first algorithm that answers the CountDistinct query in $\tilde{O}(1)$ time with $\tilde{O}(n+d)$ preprocessing, where we need to compute the number of distinct patterns that exist in $T[l,r]$. Previously, the best result was $\tilde{O}(m)$ time per query after $\tilde{O}(n^2/m+d)$ or $\tilde{O}(nd/m+d)$ preprocessing, where $m$ is a chosen parameter. $\bullet$ Faster algorithms for two other types of internal queries. We improve the runtime for (1) Occurrence counting (Count) queries to $O(\log n/\log\log n)$ time per query with $O(n+d\sqrt{\log n})$ preprocessing from $O(\log^2 n/\log\log n)$ time per query with $O(n\log n/\log \log n+d\log^{3/2} n)$ preprocessing. (2) Distinct pattern reporting (ReportDistinct) queries to $O(1+|\text{output}|)$ time per query from $O(\log n+|\text{output}|)$ per query. In addition, we match the optimal runtime in the remaining two types of queries, pattern existence (Exists), and occurrence reporting (Report). We also show that BASS is more generally applicable to other internal query problems.
[ { "version": "v1", "created": "Tue, 19 Dec 2023 05:59:16 GMT" }, { "version": "v2", "created": "Sat, 6 Jul 2024 12:29:21 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 05:58:28 GMT" } ]
2025-05-16T00:00:00
[ [ "Chen", "Jingbang", "" ], [ "Dai", "Jiangqi", "" ], [ "Mang", "Qiuyang", "" ], [ "Shi", "Qingyu", "" ], [ "Xu", "Tingqiang", "" ] ]
2312.12356
Krist\'of Kanalas
Christian Esp\'indola, Krist\'of Kanalas
Every theory is eventually of presheaf type
null
Theory and Applications of Categories, Vol. 44, 2025, No. 12, pp 344-371
null
null
math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a detailed and self-contained introduction to the theory of $\lambda $-toposes and prove the following: 1) A $\lambda $-separable $\lambda $-topos has enough $\lambda $-points. 2) The classifying $\lambda $-topos of a $\kappa $-site $(\mathcal{C},E)$ is a presheaf topos (assuming $\kappa \vartriangleleft \lambda =\lambda ^{<\lambda }$, $|\mathcal{C}|,|E|<\lambda $).
[ { "version": "v1", "created": "Tue, 19 Dec 2023 17:37:54 GMT" }, { "version": "v2", "created": "Mon, 24 Feb 2025 18:41:17 GMT" } ]
2025-05-16T00:00:00
[ [ "Espíndola", "Christian", "" ], [ "Kanalas", "Kristóf", "" ] ]
2312.15124
Weijie Xiong
Weijie Xiong, Giorgio Facelli, Mehrad Sahebi, Owen Agnel, Thiparat Chotibut, Supanut Thanasilp, Zo\"e Holmes
On fundamental aspects of quantum extreme learning machines
20+21 pages, 9+2 figures
Quantum Mach. Intell. 7, 20 (2025)
10.1007/s42484-025-00239-7
null
quant-ph cs.ET cs.LG stat.ML
http://creativecommons.org/licenses/by/4.0/
Quantum Extreme Learning Machines (QELMs) have emerged as a promising framework for quantum machine learning. Their appeal lies in the rich feature map induced by the dynamics of a quantum substrate - the quantum reservoir - and the efficient post-measurement training via linear regression. Here we study the expressivity of QELMs by decomposing the prediction of QELMs into a Fourier series. We show that the achievable Fourier frequencies are determined by the data encoding scheme, while Fourier coefficients depend on both the reservoir and the measurement. Notably, the expressivity of QELMs is fundamentally limited by the number of Fourier frequencies and the number of observables, while the complexity of the prediction hinges on the reservoir. As a cautionary note on scalability, we identify four sources that can lead to the exponential concentration of the observables as the system size grows (randomness, hardware noise, entanglement, and global measurements) and show how this can turn QELMs into useless input-agnostic oracles. In particular, our result on the reservoir-induced concentration strongly indicates that quantum reservoirs drawn from a highly random ensemble make QELM models unscalable. Our analysis elucidates the potential and fundamental limitations of QELMs, and lays the groundwork for systematically exploring quantum reservoir systems for other machine learning tasks.
[ { "version": "v1", "created": "Sat, 23 Dec 2023 00:35:23 GMT" }, { "version": "v2", "created": "Fri, 27 Sep 2024 15:08:48 GMT" } ]
2025-05-16T00:00:00
[ [ "Xiong", "Weijie", "" ], [ "Facelli", "Giorgio", "" ], [ "Sahebi", "Mehrad", "" ], [ "Agnel", "Owen", "" ], [ "Chotibut", "Thiparat", "" ], [ "Thanasilp", "Supanut", "" ], [ "Holmes", "Zoë", "" ] ]
2401.00204
Ya-Ze Cheng
Ya-Ze Cheng, Wen-Hao Wu, Yan Cao
Electromagnetic Radiation from Binary Stars Mediated by Ultralight Scalar
30 pages, 5 figures, 2 tables
Int.J.Mod.Phys.D 34 (2025) 05, 2550022
10.1142/S0218271825500221
null
astro-ph.CO hep-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the electromagnetic (EM) dipole radiation flux from an eccentric Keplerian binary endowed with scalar charges, in the presence of scalar-photon coupling $\phi A_\mu A^\mu$ or $\phi F_{\mu\nu}F^{\mu\nu}$. The scalar radiation is suppressed for orbital frequency below the scalar mass, while the scalar-mediated indirect EM radiation survives. We examine the constraints imposed on the scalar-photon and scalar-charge couplings by the current observational data of pulsar binaries, in case that the scalar charge is given by the muon number. The general extensions of the calculation to the quadrupole order and hyperbolic orbit are also discussed.
[ { "version": "v1", "created": "Sat, 30 Dec 2023 11:07:57 GMT" }, { "version": "v2", "created": "Tue, 30 Jan 2024 12:36:46 GMT" }, { "version": "v3", "created": "Thu, 30 May 2024 16:35:03 GMT" }, { "version": "v4", "created": "Mon, 1 Jul 2024 11:08:31 GMT" }, { "version": "v5", "created": "Thu, 27 Mar 2025 14:15:06 GMT" }, { "version": "v6", "created": "Thu, 15 May 2025 11:07:14 GMT" } ]
2025-05-16T00:00:00
[ [ "Cheng", "Ya-Ze", "" ], [ "Wu", "Wen-Hao", "" ], [ "Cao", "Yan", "" ] ]
2401.11832
Rosangela Coelho
Marcelo Pillonetto, Anderson Queiroz, Ros\^angela Coelho
Acoustic Disturbance Sensing Level Detection for ASD Diagnosis and Intelligibility Enhancement
4 pages, 3 figures, 2 tables
null
null
null
eess.AS cs.SD
http://creativecommons.org/licenses/by-nc-sa/4.0/
The acoustic sensitivity of Autism Spectrum Disorder (ASD) individuals highly impacts their intelligibility in noisy urban environments. In this Letter, the disturbance sensing level is examined with perceptual listening tests that demonstrate the impact of their append High Internal Noise (HIN) profile on intelligibility. This particular sensing level is then proposed as additional aid to ASD diagnosis. In this Letter, a novel intelligibility enhancement scheme is also introduced for ASD particular circumstances. For this proposal, harmonic features estimated from speech signal frames are considered as center frequencies of auditory filterbanks. A gain factor is further applied to the output of the filtered samples. The experimental results demonstrate that the proposal improved the acoustic intelligibility of ASD and Neurotypicals (NT) people considering four acoustic noises at different signal-to-noise ratios.
[ { "version": "v1", "created": "Mon, 22 Jan 2024 10:48:37 GMT" }, { "version": "v2", "created": "Thu, 11 Jul 2024 15:24:03 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 09:26:43 GMT" } ]
2025-05-16T00:00:00
[ [ "Pillonetto", "Marcelo", "" ], [ "Queiroz", "Anderson", "" ], [ "Coelho", "Rosângela", "" ] ]
2401.14066
Nisha Huang
Nisha Huang, Weiming Dong, Yuxin Zhang, Fan Tang, Ronghui Li, Chongyang Ma, Xiu Li, Tong-Yee Lee, Changsheng Xu
CreativeSynth: Cross-Art-Attention for Artistic Image Synthesis with Multimodal Diffusion
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Although remarkable progress has been made in image style transfer, style is just one of the components of artistic paintings. Directly transferring extracted style features to natural images often results in outputs with obvious synthetic traces. This is because key painting attributes including layout, perspective, shape, and semantics often cannot be conveyed and expressed through style transfer. Large-scale pretrained text-to-image generation models have demonstrated their capability to synthesize a vast amount of high-quality images. However, even with extensive textual descriptions, it is challenging to fully express the unique visual properties and details of paintings. Moreover, generic models often disrupt the overall artistic effect when modifying specific areas, making it more complicated to achieve a unified aesthetic in artworks. Our main novel idea is to integrate multimodal semantic information as a synthesis guide into artworks, rather than transferring style to the real world. We also aim to reduce the disruption to the harmony of artworks while simplifying the guidance conditions. Specifically, we propose an innovative multi-task unified framework called CreativeSynth, based on the diffusion model with the ability to coordinate multimodal inputs. CreativeSynth combines multimodal features with customized attention mechanisms to seamlessly integrate real-world semantic content into the art domain through Cross-Art-Attention for aesthetic maintenance and semantic fusion. We demonstrate the results of our method across a wide range of different art categories, proving that CreativeSynth bridges the gap between generative models and artistic expression. Code and results are available at https://github.com/haha-lisa/CreativeSynth.
[ { "version": "v1", "created": "Thu, 25 Jan 2024 10:42:09 GMT" }, { "version": "v2", "created": "Tue, 30 Jan 2024 05:58:09 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 10:04:37 GMT" } ]
2025-05-16T00:00:00
[ [ "Huang", "Nisha", "" ], [ "Dong", "Weiming", "" ], [ "Zhang", "Yuxin", "" ], [ "Tang", "Fan", "" ], [ "Li", "Ronghui", "" ], [ "Ma", "Chongyang", "" ], [ "Li", "Xiu", "" ], [ "Lee", "Tong-Yee", "" ], [ "Xu", "Changsheng", "" ] ]
2401.16114
Elena Agliari
Elena Agliari and Domenico Luongo and Alberto Fachechi
A spectral approach to Hebbian-like neural networks
null
null
10.1016/j.amc.2024.128689
Roma01.Math.MP
math-ph cond-mat.dis-nn math.MP
http://creativecommons.org/licenses/by/4.0/
We consider the Hopfield neural network as a model of associative memory and we define its neuronal interaction matrix $\mathbf{J}$ as a function of a set of $K \times M$ binary vectors $\{\mathbf{\xi}^{\mu, A} \}_{\mu=1,...,K}^{A=1,...,M}$ representing a sample of the reality that we want to retrieve. In particular, any item $\mathbf{\xi}^{\mu, A}$ is meant as a corrupted version of an unknown ground pattern $\mathbf{\zeta}^{\mu}$, that is the target of our retrieval process. We consider and compare two definitions for $\mathbf{J}$, referred to as supervised and unsupervised, according to whether the class $\mu$, each example belongs to, is unveiled or not, also, these definitions recover the paradigmatic Hebb's rule under suitable limits. The spectral properties of the resulting matrices are studied and used to inspect the retrieval capabilities of the related models as a function of their control parameters.
[ { "version": "v1", "created": "Mon, 29 Jan 2024 12:39:37 GMT" } ]
2025-05-16T00:00:00
[ [ "Agliari", "Elena", "" ], [ "Luongo", "Domenico", "" ], [ "Fachechi", "Alberto", "" ] ]
2401.16627
Borja Genoves Guzman
Borja Genoves Guzman, Maximo Morales Cespedes, Victor P. Gil Jimenez, Ana Garcia Armada, Maite Brandt-Pearce
Resource allocation exploiting reflective surfaces to minimize the outage probability in VLC
null
B. G. Guzman, M. M. Cespedes, V. P. Gil Jimenez, A. G. Armada and M. Brandt-Pearce, "Resource allocation exploiting reflective surfaces to minimize the outage probability in VLC," in IEEE Transactions on Wireless Communications, 2025
10.1109/TWC.2025.3547648
null
eess.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visible light communication (VLC) is a technology that complements radio frequency (RF) to fulfill the ever-increasing demand for wireless data traffic. The ubiquity of light-emitting diodes (LEDs), exploited as transmitters, increases the VLC market penetration and positions it as one of the most promising technologies to alleviate the spectrum scarcity of RF. However, VLC deployment is hindered by blockage causing connectivity outages in the presence of obstacles. Recently, optical reconfigurable intelligent surfaces (ORISs) have been considered to mitigate this problem. While prior works exploit ORISs for data or secrecy rate maximization, this paper studies the optimal placement of mirrors and ORISs, and the LED power allocation, for jointly minimizing the outage probability while keeping the lighting standards. We describe an optimal outage minimization framework and present solvable heuristics. We provide extensive numerical results and show that the use of ORISs may reduce the outage probability by up to 67% with respect to a no-mirror scenario and provide a gain of hundreds of kbit/J in optical energy efficiency with respect to the presented benchmark.
[ { "version": "v1", "created": "Mon, 29 Jan 2024 23:56:02 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 08:21:56 GMT" } ]
2025-05-16T00:00:00
[ [ "Guzman", "Borja Genoves", "" ], [ "Cespedes", "Maximo Morales", "" ], [ "Jimenez", "Victor P. Gil", "" ], [ "Armada", "Ana Garcia", "" ], [ "Brandt-Pearce", "Maite", "" ] ]
2402.02278
Jianqi Liu
Jianqi Liu
Borel-type subalgebras of the lattice vertex operator algebra
null
J. Pure Appl. Alg. (2025)
null
null
math.QA math.RT
http://creativecommons.org/licenses/by/4.0/
In this paper, we introduce and study new classes of sub-vertex operator algebras of the lattice vertex operator algebras (VOAs), which we call the conic, Borel, and parabolic-type subVOAs. These CFT-type VOAs, which are not necessarily strongly finitely generated, satisfy properties similar to the usual Borel and parabolic subalgebras of a Lie algebra. For the lowest-rank nontrivial example of Borel-type subVOA $V_{B}$ of $V_{\Z\al}$, we explicitly determine its Zhu's algebra $A(V_B)$ in terms of generators and relations.
[ { "version": "v1", "created": "Sat, 3 Feb 2024 22:18:50 GMT" }, { "version": "v2", "created": "Mon, 12 Aug 2024 17:52:50 GMT" }, { "version": "v3", "created": "Wed, 6 Nov 2024 00:40:43 GMT" }, { "version": "v4", "created": "Thu, 15 May 2025 15:51:57 GMT" } ]
2025-05-16T00:00:00
[ [ "Liu", "Jianqi", "" ] ]
2402.07097
Kaito Kobayashi
Kaito Kobayashi and Yukitoshi Motome
Quantum reservoir probing of quantum phase transitions
15 pages, 9 figures
null
10.1038/s41467-025-58751-0
null
quant-ph cond-mat.quant-gas cond-mat.stat-mech cond-mat.str-el
http://creativecommons.org/licenses/by/4.0/
Quantum phase transitions are highly remarkable phenomena manifesting in quantum many-body systems. However, their precise identifications in equilibrium systems pose significant theoretical and experimental challenges. Thus far, dynamical detection protocols employing global quantum quenches have been proposed, wherein transitions are discerned via global nonequilibrium excitations. In this work, we demonstrate that quantum phase transitions can be detected through localized out-of-equilibrium excitations induced by local quantum quenches. While the resulting dynamics after the quench is influenced by both the local quench operation and the intrinsic dynamics of the quantum system, the effects of the former are exclusively extracted using the cutting-edge framework called quantum reservoir probing (QRP). Through the QRP, we find that the impacts of the local quenches vary across different quantum phases and are significantly suppressed by quantum fluctuations amplified near quantum critical points; consequently, phase boundaries are precisely delineated. We demonstrate that the QRP can detect quantum phase transitions in the paradigmatic integrable and nonintegrable quantum spin systems, and even topological quantum phase transitions, all within the identical framework employing local quantum quenches and single-site observables.
[ { "version": "v1", "created": "Sun, 11 Feb 2024 03:53:01 GMT" }, { "version": "v2", "created": "Tue, 11 Jun 2024 07:44:29 GMT" }, { "version": "v3", "created": "Sun, 23 Mar 2025 09:39:26 GMT" } ]
2025-05-16T00:00:00
[ [ "Kobayashi", "Kaito", "" ], [ "Motome", "Yukitoshi", "" ] ]
2402.08969
Weijie Du
Weijie Du and James P. Vary
Systematic many-fermion Hamiltonian input scheme and spectral calculations on quantum computers
We welcome comments
null
10.1016/j.physletb.2025.139548
Phys. Lett. B Volume 866,139548, July 2025
quant-ph nucl-th
http://creativecommons.org/licenses/by/4.0/
We present a novel input scheme for general second-quantized Hamiltonians of relativistic or non-relativistic many-fermion systems. This input scheme incorporates the fermionic anticommutation relations, particle number variations, and respects the symmetries of the Hamiltonian. Based on our input scheme, we propose a hybrid quantum-classical framework for spectral calculations on future quantum hardwares. We provide explicit circuit designs and the associated gate cost. We demonstrate our hybrid framework by solving the low-lying spectra of ${^{42}}$Ca and ${^{46}}$Ca. Our input scheme provides new pathways to solving the spectra and dynamics of the relativistic and nonrelativistic many-fermion systems via first-principles approaches.
[ { "version": "v1", "created": "Wed, 14 Feb 2024 06:29:32 GMT" }, { "version": "v2", "created": "Fri, 18 Oct 2024 02:55:24 GMT" }, { "version": "v3", "created": "Tue, 13 May 2025 07:26:41 GMT" } ]
2025-05-16T00:00:00
[ [ "Du", "Weijie", "" ], [ "Vary", "James P.", "" ] ]
2402.10295
Matteo Baggioli
Kun Zhao, Matteo Baggioli, Wen-Sheng Xu, Jack F. Douglas, Yun-Jiang Wang
Atomistic mechanisms of dynamics in a two-dimensional dodecagonal quasicrystal
v2: matching the published version to appear in JCP
null
null
null
cond-mat.mtrl-sci cond-mat.soft
http://creativecommons.org/licenses/by/4.0/
Quasicrystals have been observed in a variety of materials ranging from metal alloys to block copolymers. However, their structural and dynamical properties cannot be readily described in terms of conventional solid-state models of liquids and solids. We may expect the dynamics of this specific class of quasicrystalline materials to be more like glass-forming liquids in the sense of exhibiting large fluctuations in the local mobility ("dynamic heterogeneity") and non-Arrhenius temperature dependence of relaxation and diffusion. In this work, we investigate a model dodecagonal quasicrystal material in two dimensions (2D) using molecular dynamics (MD) simulations, with a focus on heterogeneous dynamics and non-Arrhenius relaxation and diffusion. As observed in glass-forming liquids and heated crystals, we observe a two-stage relaxation dynamics in the self-intermediate scattering function $F_s(k,t)$ of our quasicrystal material. It involves a fast $\beta$-relaxation and $\alpha$ relaxation process having a highly temperature dependent relaxation time whose activation energy varies in concert with the extent of string-like collective motion, a phenomenon recognized to occur in glass-forming liquids at low temperatures and crystalline materials at elevated temperatures. After examining the dynamics of our dodecagonal quasicrystalline material in great detail, we conclude that the dynamics of these materials more closely resembles observations on metallic glass-forming liquids than crystalline materials.
[ { "version": "v1", "created": "Thu, 15 Feb 2024 19:53:30 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 08:27:16 GMT" } ]
2025-05-16T00:00:00
[ [ "Zhao", "Kun", "" ], [ "Baggioli", "Matteo", "" ], [ "Xu", "Wen-Sheng", "" ], [ "Douglas", "Jack F.", "" ], [ "Wang", "Yun-Jiang", "" ] ]
2402.11543
Inna Koberman
Dov Shirtz, Inna Koberman, Aviad Elyashar, Rami Puzis, and Yuval Elovici
Enhancing Energy Sector Resilience: Integrating Security by Design Principles
66 pages, 2 figures, version 2
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/4.0/
Security by design, Sbd is a concept for developing and maintaining systems that are, to the greatest extent possible, free from security vulnerabilities and impervious to security attacks. In addition to technical aspects, such as how to develop a robust industrial control systems hardware, software, communication product, etc., SbD includes also soft aspects, such as organizational managerial attitude and behavior, and employee awareness. Under the Sbd concept, systems, ICS in our context, will be considered more trustworthy by users. User's trust in the systems will be derived from the meticulous adherence to the SbD processes and policies. In accordance with the SbD concept, security is considered. Security measures are implemented, at every stage of the product and systems development life cycle, rather than afterwards. This document presents the security requirements for the implementation of the SbD in industrial control systems. The information presented does not negate any existing security and cyber security standards, etc. Instead, we strongly recommend that organizations should implement and comply with those standards and best practices. Security by design is not a one-time process. It starts at the very beginning of the products of the system design and continues through all its lifecycle. Due to the benefits of the SbD, higher level of security, and robustness to cyber attacks, all organizations associated with the energy sector should strive to establish an ecosystem. The requirements presented in this document may be perceived as burdensome by organizations. However, strict compliance with the requirements and existing security standards and best practices, including continuous monitoring, as specified in this document, is essential to realize an ecosystem driven and protected by the SbD
[ { "version": "v1", "created": "Sun, 18 Feb 2024 11:04:22 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 07:50:00 GMT" } ]
2025-05-16T00:00:00
[ [ "Shirtz", "Dov", "" ], [ "Koberman", "Inna", "" ], [ "Elyashar", "Aviad", "" ], [ "Puzis", "Rami", "" ], [ "Elovici", "Yuval", "" ] ]
2402.13883
Peter Horvathy
Peng-Ming Zhang and Peter Horvathy
Isospin precession in non-Abelian Aharonov-Bohm scattering
affiliation corrected
null
null
null
hep-th math-ph math.MP quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The concept of pseudoclassical isospin is illustrated by the non-Abelian Aharonov-Bohm effect proposed by Wu and Yang in 1975. The spatial motion is free however the isospin precesses when the enclosed magnetic flux and the incoming particle's isosopin are not parallel. The non-Abelian phase factor $\mathfrak{F}$ of Wu and Yang acts on the isospin as an S-matrix. The scattering becomes side-independent when the enclosed flux is quantized, ${\Phi}_N=N\Phi_0$ with $N$ an integer. The gauge group $SU(2)$ is an internal symmetry and generates conserved charges only when the flux is quantized, which then splits into two series: for $N=2k$ $SU(2)$ acts trivially but for $N=1+2k$ the implementation is twisted. The orbital and the internal angular momenta are separately conserved. The double rotational symmetry is broken to $SO(2)\times SO(2)$ when $N$ odd. For unquantized flux there are no internal symmetries, the charge is not conserved and protons can be turned into neutrons.
[ { "version": "v1", "created": "Wed, 21 Feb 2024 15:50:56 GMT" }, { "version": "v2", "created": "Sat, 28 Sep 2024 16:41:17 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 06:15:24 GMT" } ]
2025-05-16T00:00:00
[ [ "Zhang", "Peng-Ming", "" ], [ "Horvathy", "Peter", "" ] ]
2402.14422
Shunsuke Nishimura
Shunsuke Nishimura, Moeta Tsukamoto, Kento Sasaki, and Kensuke Kobayashi
Investigations of optical aberration on quantum diamond microscopy toward high spatial resolution and sensitivity
null
null
10.1063/5.0204566
null
physics.optics cond-mat.other
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum diamond microscopy (QDM), which employs nitrogen-vacancy (NV) center ensembles, is a promising approach to quantitatively imaging magnetic fields with both high resolution that approaches the diffraction limit and a wide field of view. The commonly adopted setups of QDM capture the photoluminescence through transparent diamonds, which inevitably entail aberrations -- optical errors that degrade the optical resolution and contrast of the obtainable image. In this study, we delve into the impact of optical aberrations, focusing on their dependence on diamond thickness. We first introduce a rigorous model [Richards et al., Braat et al.] of diffraction that incorporates aberrations, producing the NV center optical image. We confirm that this model accurately reproduces the confocal images of single NV centers obtained at various depths in diamonds. Extending this model to a wide-field microscope, we find that the model also accurately reproduces the USAF 1951 resolution test chart obtained through diamonds of various thicknesses. Based on these investigations, we quantitatively assess the consequent resolution constraints and propose thinning the diamond as a viable solution. We present a robust method to quantitatively ascertain resolution in optical systems influenced by aberrations caused by ray transmission through diamonds. For instance, for a typical microscope with an objective lens of NA = 0.7, the diffraction limit is achievable through diamonds that are 30 {\mu}m thick, and a resolution of 1 {\mu}m is obtained through diamonds that are 100 {\mu}m thick. Those results opens up avenues for enhanced performance in QDM. The Julia package used to calculate the vectorial PSFs is available at VectorPSFs.jl.
[ { "version": "v1", "created": "Thu, 22 Feb 2024 10:10:25 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 14:25:25 GMT" } ]
2025-05-16T00:00:00
[ [ "Nishimura", "Shunsuke", "" ], [ "Tsukamoto", "Moeta", "" ], [ "Sasaki", "Kento", "" ], [ "Kobayashi", "Kensuke", "" ] ]
2402.15760
Hyobin Yoo
Daesung Park, Changwon Park, Kunihiro Yananose, Eunjung Ko, Byunghyun Kim, Rebecca Engelke, Xi Zhang, Konstantin Davydov, Matthew Green, Hyun-Mi Kim, Sang Hwa Park, Jae Heon Lee, Seul-Gi Kim, Hyeongkeun Kim, Kenji Watanabe, Takashi Taniguchi, Sang Mo Yang, Ke Wang, Philip Kim, Young-Woo Son, Hyobin Yoo
Unconventional domain tessellations in moir\'e-of-moir\'e lattices
null
null
null
null
cond-mat.mtrl-sci
http://creativecommons.org/licenses/by/4.0/
Imposing incommensurable periodicity on the periodic atomic lattice can lead to complex structural phases consisting of locally periodic structure bounded by topological defects. Twisted trilayer graphene (TTG) is an ideal material platform to study the interplay between different atomic periodicities, which can be tuned by twist angles between the layers, leading to moir\'e-of-moir\'e lattices. Interlayer and intralayer interactions between two interfaces in TTG transform this moir\'e-of-moir\'e lattice into an intricate network of domain structures at small twist angles, which can harbor exotic electronic behaviors. Here we report a complete structural phase diagram of TTG with atomic scale lattice reconstruction. Using transmission electron microscopy combined with a new interatomic potential simulation, we show several large-scale moir\'e lattices, including triangular, kagome, and a corner-shared hexagram-shaped domain pattern. Each domain is bounded by a two-dimensional network of domain wall lattices. In the limit of small twist angles, two competing structural orders-rhombohedral and Bernal stackings-with a slight energy difference, cause unconventional lattice reconstruction with spontaneous symmetry breaking and nematic instability, highlighting the importance of long-range interlayer interactions across entire van der Waals layers. The diverse tessellation of distinct domains, whose topological network can be tuned by the adjustment of the twist angles, establishes TTG as a platform for exploring the interplay between emerging quantum properties and controllable nontrivial lattices.
[ { "version": "v1", "created": "Sat, 24 Feb 2024 08:17:15 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 16:13:45 GMT" } ]
2025-05-16T00:00:00
[ [ "Park", "Daesung", "" ], [ "Park", "Changwon", "" ], [ "Yananose", "Kunihiro", "" ], [ "Ko", "Eunjung", "" ], [ "Kim", "Byunghyun", "" ], [ "Engelke", "Rebecca", "" ], [ "Zhang", "Xi", "" ], [ "Davydov", "Konstantin", "" ], [ "Green", "Matthew", "" ], [ "Kim", "Hyun-Mi", "" ], [ "Park", "Sang Hwa", "" ], [ "Lee", "Jae Heon", "" ], [ "Kim", "Seul-Gi", "" ], [ "Kim", "Hyeongkeun", "" ], [ "Watanabe", "Kenji", "" ], [ "Taniguchi", "Takashi", "" ], [ "Yang", "Sang Mo", "" ], [ "Wang", "Ke", "" ], [ "Kim", "Philip", "" ], [ "Son", "Young-Woo", "" ], [ "Yoo", "Hyobin", "" ] ]
2402.16589
Philipp Zilk
Thomas Apel, Philipp Zilk
Isogeometric analysis of the Laplace eigenvalue problem on circular sectors: Regularity properties, graded meshes & variational crimes
35 pages, 19 figures
null
10.1016/j.camwa.2024.09.018
null
math.NA cs.NA math.AP
http://creativecommons.org/publicdomain/zero/1.0/
The Laplace eigenvalue problem on circular sectors has eigenfunctions with corner singularities. Standard methods may produce suboptimal approximation results. To address this issue, a novel numerical algorithm that enhances standard isogeometric analysis is proposed in this paper by using a single-patch graded mesh refinement scheme. Numerical tests demonstrate optimal convergence rates for both the eigenvalues and eigenfunctions. Furthermore, the results show that smooth splines possess a superior approximation constant compared to their $C^0$-continuous counterparts for the lower part of the Laplace spectrum. This is an extension of previous findings about excellent spectral approximation properties of smooth splines on rectangular domains to circular sectors. In addition, graded meshes prove to be particularly advantageous for an accurate approximation of a limited number of eigenvalues. The novel algorithm applied here has a drawback in the singularity of the isogeometric parameterization. It results in some basis functions not belonging to the solution space of the corresponding weak problem, which is considered a variational crime. However, the approach proves to be robust. Finally, a hierarchical mesh structure is presented to avoid anisotropic elements, omit redundant degrees of freedom and keep the number of basis functions contributing to the variational crime constant, independent of the mesh size. Numerical results validate the effectiveness of hierarchical mesh grading for the simulation of eigenfunctions with and without corner singularities.
[ { "version": "v1", "created": "Mon, 26 Feb 2024 14:11:20 GMT" } ]
2025-05-16T00:00:00
[ [ "Apel", "Thomas", "" ], [ "Zilk", "Philipp", "" ] ]
2402.16908
Guohua Hu
Lekai Song, Pengyu Liu, Jingfang Pei, Yang Liu, Songwei Liu, Shengbo Wang, Leonard W. T. Ng, Tawfique Hasan, Kong-Pang Pun, Shuo Gao, Guohua Hu
Lightweight, error-tolerant edge detection using memristor-enabled stochastic logics
null
null
10.1038/s41467-025-59872-2
null
cs.ET cond-mat.mtrl-sci cs.LG eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The demand for efficient edge vision has spurred the interest in developing stochastic computing approaches for performing image processing tasks. Memristors with inherent stochasticity readily introduce probability into the computations and thus enable stochastic image processing computations. Here, we present a stochastic computing approach for edge detection, a fundamental image processing technique, facilitated with memristor-enabled stochastic logics. Specifically, we integrate the memristors with logic circuits and harness the stochasticity from the memristors to realize compact stochastic logics for stochastic number encoding and processing. The stochastic numbers, exhibiting well-regulated probabilities and correlations, can be processed to perform logic operations with statistical probabilities. This can facilitate lightweight stochastic edge detection for edge visual scenarios characterized with high-level noise errors. As a practical demonstration, we implement a hardware stochastic Roberts cross operator using the stochastic logics, and prove its exceptional edge detection performance, remarkably, with 95% less computational cost while withstanding 50% bit-flip errors. The results underscore the great potential of our stochastic edge detection approach in developing lightweight, error-tolerant edge vision hardware and systems for autonomous driving, virtual/augmented reality, medical imaging diagnosis, industrial automation, and beyond.
[ { "version": "v1", "created": "Sun, 25 Feb 2024 06:23:02 GMT" }, { "version": "v2", "created": "Wed, 20 Mar 2024 07:05:55 GMT" } ]
2025-05-16T00:00:00
[ [ "Song", "Lekai", "" ], [ "Liu", "Pengyu", "" ], [ "Pei", "Jingfang", "" ], [ "Liu", "Yang", "" ], [ "Liu", "Songwei", "" ], [ "Wang", "Shengbo", "" ], [ "Ng", "Leonard W. T.", "" ], [ "Hasan", "Tawfique", "" ], [ "Pun", "Kong-Pang", "" ], [ "Gao", "Shuo", "" ], [ "Hu", "Guohua", "" ] ]
2402.16923
Enrico Formenti
Alberto Dennunzio and Enrico Formenti and Luciano Margara and Sara Riva
On solving basic equations over the semiring of functional digraphs
Performed all changes and fixes asked by the reviewers
null
null
null
cs.DM math.CO
http://creativecommons.org/licenses/by-nc-nd/4.0/
Endowing the set of functional graphs (FGs) with the sum (disjoint union of graphs) and product (standard direct product on graphs) operations induces on FGs a structure of a commutative semiring R. The operations on R can be naturally extended to the set of univariate polynomials R[X] over R. This paper provides a polynomial time algorithm for deciding if equations of the type AX=B have solutions when A is just a single cycle and B a set of cycles of identical size. We also prove a similar complexity result for some variants of the previous equation.
[ { "version": "v1", "created": "Mon, 26 Feb 2024 10:18:49 GMT" }, { "version": "v2", "created": "Thu, 10 Oct 2024 11:06:12 GMT" }, { "version": "v3", "created": "Sun, 13 Oct 2024 08:10:56 GMT" }, { "version": "v4", "created": "Thu, 15 May 2025 16:00:01 GMT" } ]
2025-05-16T00:00:00
[ [ "Dennunzio", "Alberto", "" ], [ "Formenti", "Enrico", "" ], [ "Margara", "Luciano", "" ], [ "Riva", "Sara", "" ] ]
2402.17629
Peter Horvathy
P A Horvathy
Prequantisation from the path integral viewpoint
Slightly reworded, rearranged and extended version of one originally published in the Proceedings of the {\sl Int. Conf. on Diff. Geom. Meths. in Math. Phys.}, Clausthal'1980, Doebner (ed). Springer Lecture Notes in Math. \textbf{905}, p.197-206 (1982). Marseille preprint CPT-80-P-1230. 14 pages, 2 figures
Springer Lecture Notes in Math. \textbf{905}, p.197-206 (1982)
null
Marseille preprint CPT-80-P-1230
math-ph math.MP quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The quantum mechanically admissible definitions of the factor $\exp\big[(i/\hbar)S(\gamma)\big]$ in the Feynman integral are put in bijection with the prequantisations of Kostant and Souriau. The different allowed expressions of this factor -- the inequivalent prequantisations -- are classified. The theory is illustrated by the Aharonov-Bohm experiment and by identical particles.
[ { "version": "v1", "created": "Tue, 27 Feb 2024 15:57:04 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 06:31:16 GMT" } ]
2025-05-16T00:00:00
[ [ "Horvathy", "P A", "" ] ]
2402.18983
Sung-Soo Byun
Sung-Soo Byun, Seong-Mi Seo, Meng Yang
Free energy expansions of a conditional GinUE and large deviations of the smallest eigenvalue of the LUE
40 pages, 7 figures; v2 41 pages, 7 figures, references and associated text added; v3 43 pages, 8 figures, extended proof of Lemma 3.8
null
null
null
math-ph math.CV math.MP math.PR
http://creativecommons.org/licenses/by/4.0/
We consider a planar Coulomb gas ensemble of size $N$ with the inverse temperature $\beta=2$ and external potential $Q(z)=|z|^2-2c \log|z-a|$, where $c>0$ and $a \in \mathbb{C}$. Equivalently, this model can be realised as $N$ eigenvalues of the complex Ginibre matrix of size $(c+1) N \times (c+1) N$ conditioned to have deterministic eigenvalue $a$ with multiplicity $cN$. Depending on the values of $c$ and $a$, the droplet reveals a phase transition: it is doubly connected in the post-critical regime and simply connected in the pre-critical regime. In both regimes, we derive precise large-$N$ expansions of the free energy up to the $O(1)$ term, providing a non-radially symmetric example that confirms the Zabrodin-Wiegmann conjecture made for general planar Coulomb gas ensembles. As a consequence, our results provide asymptotic behaviours of moments of the characteristic polynomial of the complex Ginibre matrix, where the powers are of order $O(N)$. Furthermore, by combining with a duality formula, we obtain precise large deviation probabilities of the smallest eigenvalue of the Laguerre unitary ensemble. Our proof is based on a refined Riemann-Hilbert analysis for planar orthogonal polynomials using the partial Schlesinger transform.
[ { "version": "v1", "created": "Thu, 29 Feb 2024 09:38:37 GMT" }, { "version": "v2", "created": "Wed, 27 Mar 2024 04:36:45 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 11:46:20 GMT" } ]
2025-05-16T00:00:00
[ [ "Byun", "Sung-Soo", "" ], [ "Seo", "Seong-Mi", "" ], [ "Yang", "Meng", "" ] ]
2403.02006
Seungjae Lee
Seungjae Lee, Lucas Braun, Frieder B\"onisch, Malte Schr\"oder, Moritz Th\"umler, and Marc Timme
Complexified Synchrony
null
Chaos 1 May 2024; 34 (5): 053141
10.1063/5.0205897
null
nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Kuramoto model and its generalizations have been broadly employed to characterize and mechanistically understand various collective dynamical phenomena, especially the emergence of synchrony among coupled oscillators. Despite almost five decades of research, many questions remain open, in particular for finite-size systems. Here, we generalize recent work [Phys. Rev. Lett. 130, 187201 (2023)] on the finite-size Kuramoto model with its state variables analytically continued to the complex domain and also complexify its system parameters. Intriguingly, systems of two units with purely imaginary coupling do not actively synchronize even for arbitrarily large magnitudes of the coupling strengths, $|K| \rightarrow \infty$, but exhibit conservative dynamics with asynchronous rotations or librations for all $|K|$. For generic complex coupling, both, traditional phase-locked states and asynchronous states generalize to complex locked states, fixed points off the real subspace that exist even for arbitrarily weak coupling. We analyze a new collective mode of rotations exhibiting finite, yet arbitrarily large rotation numbers. Numerical simulations for large networks indicate a novel form of discontinuous phase transition. We close by pointing to a range of exciting questions for future research.
[ { "version": "v1", "created": "Mon, 4 Mar 2024 13:04:06 GMT" }, { "version": "v2", "created": "Wed, 8 May 2024 07:26:49 GMT" } ]
2025-05-16T00:00:00
[ [ "Lee", "Seungjae", "" ], [ "Braun", "Lucas", "" ], [ "Bönisch", "Frieder", "" ], [ "Schröder", "Malte", "" ], [ "Thümler", "Moritz", "" ], [ "Timme", "Marc", "" ] ]
2403.02060
Tianbo Chen
Tianbo Chen
Expectile Periodograms
null
null
null
null
stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a novel periodogram-like function, called the expectile periodogram, for modeling spectral features of time series and detecting hidden periodicities. The expectile periodogram is constructed from trigonometric expectile regression, in which a specially designed check function is used to substitute the squared $l_2$ norm that leads to the ordinary periodogram. The expectile periodogram retains the key properties of the ordinary periodogram as a frequency-domain representation of serial dependence in time series, while offering a more comprehensive understanding by examining the data across the entire range of expectile levels. We establish the asymptotic theory and investigate the relationship between the expectile periodogram and the so called expectile spectrum. Simulations demonstrate the efficiency of the expectile periodogram in the presence of hidden periodicities. Finally, by leveraging the inherent two-dimensional nature of the expectile periodogram, we train a deep learning (DL) model to classify earthquake waveform data. Remarkably, our approach outperforms alternative periodogram-based methods in terms of classification accuracy.
[ { "version": "v1", "created": "Mon, 4 Mar 2024 14:01:11 GMT" }, { "version": "v2", "created": "Wed, 6 Nov 2024 07:00:04 GMT" }, { "version": "v3", "created": "Wed, 14 May 2025 18:42:09 GMT" } ]
2025-05-16T00:00:00
[ [ "Chen", "Tianbo", "" ] ]
2403.02591
Sung Hoon Choi
Sung Hoon Choi, Donggyu Kim
Matrix-based Prediction Approach for Intraday Instantaneous Volatility Vector
null
null
null
null
econ.EM
http://creativecommons.org/licenses/by/4.0/
In this paper, we introduce a novel method for predicting intraday instantaneous volatility based on Ito semimartingale models using high-frequency financial data. Several studies have highlighted stylized volatility time series features, such as interday auto-regressive dynamics and the intraday U-shaped pattern. To accommodate these volatility features, we propose an interday-by-intraday instantaneous volatility matrix process that can be decomposed into low-rank conditional expected instantaneous volatility and noise matrices. To predict the low-rank conditional expected instantaneous volatility matrix, we propose the Two-sIde Projected-PCA (TIP-PCA) procedure. We establish asymptotic properties of the proposed estimators and conduct a simulation study to assess the finite sample performance of the proposed prediction method. Finally, we apply the TIP-PCA method to an out-of-sample instantaneous volatility vector prediction study using high-frequency data from the S&P 500 index and 11 sector index funds.
[ { "version": "v1", "created": "Tue, 5 Mar 2024 02:07:51 GMT" }, { "version": "v2", "created": "Thu, 5 Dec 2024 16:03:38 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 02:08:47 GMT" } ]
2025-05-16T00:00:00
[ [ "Choi", "Sung Hoon", "" ], [ "Kim", "Donggyu", "" ] ]
2403.06637
Junpeng Zhou
Junpeng Zhou, Xiying Yuan
Tur\'{a}n problems for star-path forests in hypergraphs
Accepted to Discrete Mathematics
null
null
null
math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An $r$-uniform hypergraph ($r$-graph for short) is linear if any two edges intersect at most one vertex. Let $\mathcal{F}$ be a given family of $r$-graphs. An $r$-graph $H$ is called $\mathcal{F}$-free if $H$ does not contain any member of $\mathcal{F}$ as a subgraph. The Tur\'{a}n number of $\mathcal{F}$ is the maximum number of edges in any $\mathcal{F}$-free $r$-graph on $n$ vertices, and the linear Tur\'{a}n number of $\mathcal{F}$ is defined as the Tur\'{a}n number of $\mathcal{F}$ in linear host hypergraphs. An $r$-uniform linear path $P^r_\ell$ of length $\ell$ is an $r$-graph with edges $e_1,\dots,e_\ell$ such that $|V(e_i)\cap V(e_j)|=1$ if $|i-j|=1$, and $V(e_i)\cap V(e_j)=\emptyset$ for $i\neq j$ otherwise. Gy\'{a}rf\'{a}s et al. [\textit{European J. Combin.} (2022) 103435] obtained an upper bound for the linear Tur\'{a}n number of $P_\ell^3$. In this paper, an upper bound for the linear Tur\'{a}n number of $P_\ell^r$ is obtained, which generalizes the known result of $P_\ell^3$ to any $P_\ell^r$. Furthermore, some results for the linear Tur\'{a}n number and Tur\'{a}n number of several linear star-path forests are obtained.
[ { "version": "v1", "created": "Mon, 11 Mar 2024 11:52:26 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 14:33:06 GMT" } ]
2025-05-16T00:00:00
[ [ "Zhou", "Junpeng", "" ], [ "Yuan", "Xiying", "" ] ]
2403.07547
Jungho Lee
Jungho Lee, Dogyoon Lee, Minhyeok Lee, Donghyung Kim, Sangyoun Lee
SMURF: Continuous Dynamics for Motion-Deblurring Radiance Fields
CVPRW 2025, Neural Fields Beyond Conventional Cameras, Project Page: https://jho-yonsei.github.io/SMURF/
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Neural radiance fields (NeRF) has attracted considerable attention for their exceptional ability in synthesizing novel views with high fidelity. However, the presence of motion blur, resulting from slight camera movements during extended shutter exposures, poses a significant challenge, potentially compromising the quality of the reconstructed 3D scenes. To effectively handle this issue, we propose sequential motion understanding radiance fields (SMURF), a novel approach that models continuous camera motion and leverages the explicit volumetric representation method for robustness to motion-blurred input images. The core idea of the SMURF is continuous motion blurring kernel (CMBK), a module designed to model a continuous camera movements for processing blurry inputs. Our model is evaluated against benchmark datasets and demonstrates state-of-the-art performance both quantitatively and qualitatively.
[ { "version": "v1", "created": "Tue, 12 Mar 2024 11:32:57 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 08:57:01 GMT" } ]
2025-05-16T00:00:00
[ [ "Lee", "Jungho", "" ], [ "Lee", "Dogyoon", "" ], [ "Lee", "Minhyeok", "" ], [ "Kim", "Donghyung", "" ], [ "Lee", "Sangyoun", "" ] ]
2403.08971
Corrine Elliott PhD
Corrine F Elliott, James PC Duncan, Tiffany M Tang, Merle Behr, Karl Kumbier, and Bin Yu
Designing a Data Science simulation with MERITS: A Primer
31 pages (main text); 1 figure; 2 tables; James PC Duncan, Tiffany M Tang: Authors contributed equally to this manuscript; Merle Behr, Karl Kumbier: Authors contributed equally to this manuscript
null
null
null
stat.CO
http://creativecommons.org/licenses/by/4.0/
Simulations play a crucial role in the modern scientific process. Yet despite (or due to) this ubiquity, the Data Science community shares neither a comprehensive definition for a "high-quality" study nor a consolidated guide to designing one. Inspired by the Predictability-Computability-Stability (PCS) framework for 'veridical' Data Science, we propose six MERITS that a simulation study should satisfy. (Modularity and Efficiency support the computability of a study, encouraging clean and flexible implementation. Realism and Stability address the conceptualization of the research problem: How well does a study predict reality, such that its conclusions generalize to new data/contexts? Finally, Intuitiveness and Transparency encourage good communication and trustworthiness of study design and results.) Drawing an analogy between simulation and cooking, we moreover offer (a) a conceptual framework for thinking about the anatomy of a simulation 'recipe'; (b) a baker's dozen in guidelines to aid the Data Science practitioner in designing one; and (c) a case study demonstrating the practical utility of our framework by using it to autopsy a preexisting simulation study. With this "PCS primer" for high-quality Data Science simulation, we seek to distill and enrich the best practices of simulation across disciplines into a cohesive recipe for trustworthy, veridical Data Science.
[ { "version": "v1", "created": "Wed, 13 Mar 2024 21:32:14 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 05:16:07 GMT" } ]
2025-05-16T00:00:00
[ [ "Elliott", "Corrine F", "" ], [ "Duncan", "James PC", "" ], [ "Tang", "Tiffany M", "" ], [ "Behr", "Merle", "" ], [ "Kumbier", "Karl", "" ], [ "Yu", "Bin", "" ] ]
2403.10248
Wojciech G\'orecki
Wojciech G\'orecki, Xi Lu, Chiara Macchiavello, Lorenzo Maccone
Mutual Information Bounded by Fisher Information
Compared to the previous version, several typos have been corrected and more references have been added
Phys. Rev. Research 7, L022013 (2025)
10.1103/PhysRevResearch.7.L022013
null
quant-ph math-ph math.MP
http://creativecommons.org/licenses/by/4.0/
We derive a general upper bound to mutual information in terms of the Fisher information. The bound may be further used to derive a lower bound for the Bayesian quadratic cost. These two provide alternatives to other inequalities in the literature (e.g.~the van Trees inequality) that are useful also for cases where the latter ones give trivial bounds. We then generalize them to the quantum case, where they bound the Holevo information in terms of the quantum Fisher information. We illustrate the usefulness of our bounds with a case study in quantum phase estimation. Here, they allow us to adapt to mutual information (useful for global strategies where the prior plays an important role) the known and highly nontrivial bounds for the Fisher information in the presence of noise. The results are also useful in the context of quantum communication, both for continuous and discrete alphabets.
[ { "version": "v1", "created": "Fri, 15 Mar 2024 12:35:35 GMT" }, { "version": "v2", "created": "Wed, 17 Jul 2024 12:05:30 GMT" }, { "version": "v3", "created": "Tue, 4 Mar 2025 10:54:17 GMT" } ]
2025-05-16T00:00:00
[ [ "Górecki", "Wojciech", "" ], [ "Lu", "Xi", "" ], [ "Macchiavello", "Chiara", "" ], [ "Maccone", "Lorenzo", "" ] ]
2403.17525
Sicong Zang
Sicong Zang, Zhijun Fang
Equipping Sketch Patches with Context-Aware Positional Encoding for Graphic Sketch Representation
null
null
10.1016/j.cviu.2025.104385
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When benefiting graphic sketch representation with sketch drawing orders, recent studies have linked sketch patches as graph edges by drawing orders in accordance to a temporal-based nearest neighboring strategy. However, such constructed graph edges may be unreliable, since the contextual relationships between patches may be inconsistent with the sequential positions in drawing orders, due to variants of sketch drawings. In this paper, we propose a variant-drawing-protected method by equipping sketch patches with context-aware positional encoding (PE) to make better use of drawing orders for sketch learning. We introduce a sinusoidal absolute PE to embed the sequential positions in drawing orders, and a learnable relative PE to encode the unseen contextual relationships between patches. Both types of PEs never attend the construction of graph edges, but are injected into graph nodes to cooperate with the visual patterns captured from patches. After linking nodes by semantic proximity, during message aggregation via graph convolutional networks, each node receives both semantic features from patches and contextual information from PEs from its neighbors, which equips local patch patterns with global contextual information, further obtaining drawing-order-enhanced sketch representations. Experimental results indicate that our method significantly improves sketch healing and controllable sketch synthesis. The source codes could be found at https://github.com/SCZang/DC-gra2seq.
[ { "version": "v1", "created": "Tue, 26 Mar 2024 09:26:12 GMT" }, { "version": "v2", "created": "Tue, 13 May 2025 07:25:01 GMT" } ]
2025-05-16T00:00:00
[ [ "Zang", "Sicong", "" ], [ "Fang", "Zhijun", "" ] ]
2403.19320
G\'erald Tenenbaum
R\'egis de la Bret\`eche and G\'erald Tenenbaum
Mean values of arithmetic functions and application to sums of powers
null
null
null
null
math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide new upper bounds for sums of certain arithmetic functions in many variables at polynomial arguments and, exploiting recent progress on the mean-value of the Erd\H os-Hooley $\Delta$-function, we derive lower bounds for the cardinality of those integers not exceeding a given limit that are expressible as some sums of powers.
[ { "version": "v1", "created": "Thu, 28 Mar 2024 11:23:16 GMT" }, { "version": "v2", "created": "Sat, 6 Apr 2024 21:31:02 GMT" }, { "version": "v3", "created": "Tue, 28 Jan 2025 14:34:45 GMT" }, { "version": "v4", "created": "Tue, 15 Apr 2025 13:51:52 GMT" }, { "version": "v5", "created": "Thu, 15 May 2025 16:30:05 GMT" } ]
2025-05-16T00:00:00
[ [ "de la Bretèche", "Régis", "" ], [ "Tenenbaum", "Gérald", "" ] ]
2404.00664
Vladimir Kozlov
Vladimir Kozlov
On non-uniqueness of solitary waves on two-dimensional rotational flow
27 pages. arXiv admin note: text overlap with arXiv:2311.15336
null
null
null
math.AP math.DS
http://creativecommons.org/licenses/by/4.0/
We consider solitary water waves on a rotational, unidirectional flow in a two-dimensional channel of finite depth. Ovsyannikov has conjectured in 1983 that the solitary wave is uniquely determined by the Bernoulli constant, mass flux and by the flow force. This conjecture was disproved by Plotnikov in 1992 for the ir-rotational flow. In this paper we show that this conjecture is wrong also for rotational flows. Moreover we prove that in any neighborhood of the first bifurcation point on the branch of solitary waves, approaching the extreme wave, there are infinitely many pairs of solitary waves corresponding to the same Bernoulli constant. We give a description of the structure of this set of pairs. The proof is based on a bifurcation analysis of the global branch of solitary waves which is of independent interest.
[ { "version": "v1", "created": "Sun, 31 Mar 2024 12:17:33 GMT" }, { "version": "v2", "created": "Wed, 11 Dec 2024 20:19:39 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 05:09:47 GMT" } ]
2025-05-16T00:00:00
[ [ "Kozlov", "Vladimir", "" ] ]
2404.03080
Yanpeng Ye
Yanpeng Ye, Jie Ren, Shaozhou Wang, Yuwei Wan, Imran Razzak, Bram Hoex, Haofen Wang, Tong Xie, Wenjie Zhang
Construction and Application of Materials Knowledge Graph in Multidisciplinary Materials Science via Large Language Model
Accepted by 38th Conference on Neural Information Processing Systems (NeurIPS 2024)
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
Knowledge in materials science is widely dispersed across extensive scientific literature, posing significant challenges to the efficient discovery and integration of new materials. Traditional methods, often reliant on costly and time-consuming experimental approaches, further complicate rapid innovation. Addressing these challenges, the integration of artificial intelligence with materials science has opened avenues for accelerating the discovery process, though it also demands precise annotation, data extraction, and traceability of information. To tackle these issues, this article introduces the Materials Knowledge Graph (MKG), which utilizes advanced natural language processing techniques integrated with large language models to extract and systematically organize a decade's worth of high-quality research into structured triples, contains 162,605 nodes and 731,772 edges. MKG categorizes information into comprehensive labels such as Name, Formula, and Application, structured around a meticulously designed ontology, thus enhancing data usability and integration. By implementing network-based algorithms, MKG not only facilitates efficient link prediction but also significantly reduces reliance on traditional experimental methods. This structured approach not only streamlines materials research but also lays the groundwork for more sophisticated science knowledge graphs.
[ { "version": "v1", "created": "Wed, 3 Apr 2024 21:46:14 GMT" }, { "version": "v2", "created": "Tue, 4 Jun 2024 10:04:05 GMT" }, { "version": "v3", "created": "Mon, 30 Sep 2024 13:46:20 GMT" }, { "version": "v4", "created": "Wed, 14 May 2025 15:35:26 GMT" }, { "version": "v5", "created": "Thu, 15 May 2025 02:03:46 GMT" } ]
2025-05-16T00:00:00
[ [ "Ye", "Yanpeng", "" ], [ "Ren", "Jie", "" ], [ "Wang", "Shaozhou", "" ], [ "Wan", "Yuwei", "" ], [ "Razzak", "Imran", "" ], [ "Hoex", "Bram", "" ], [ "Wang", "Haofen", "" ], [ "Xie", "Tong", "" ], [ "Zhang", "Wenjie", "" ] ]
2404.03295
Andrea Coladangelo
Boyang Chen, Andrea Coladangelo, Or Sattath
The power of a single Haar random state: constructing and separating quantum pseudorandomness
A previous version claimed to lift the isometry oracle separation to a unitary oracle separation. The proof was incorrect, and that claim has now been downgraded to a "parametrized" unitary oracle separation
null
null
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we focus on the following question: what are the cryptographic implications of having access to an oracle that provides a single Haar random quantum state? We find that the study of such a model sheds light on several aspects of the notion of quantum pseudorandomness. Pseudorandom states (PRS) are a family of states for which it is hard to distinguish between polynomially many copies of either a state sampled uniformly from the family or a Haar random state. A weaker notion, called single-copy pseudorandom states (1PRS), satisfies this property with respect to a single copy. We obtain the following results: 1. First, we show, perhaps surprisingly, that 1PRS (as well as bit-commitments) exist relative to an oracle that provides a single Haar random state. 2. Second, we build on this result to show the existence of an isometry oracle relative to which 1PRS exist, but PRS do not. Taken together, our contributions yield one of the first black-box separations between central notions of quantum pseudorandomness, and introduce a new framework to study black-box separations between various inherently quantum primitives.
[ { "version": "v1", "created": "Thu, 4 Apr 2024 08:36:44 GMT" }, { "version": "v2", "created": "Mon, 6 May 2024 06:04:06 GMT" }, { "version": "v3", "created": "Mon, 7 Oct 2024 16:58:01 GMT" }, { "version": "v4", "created": "Thu, 15 May 2025 17:41:38 GMT" } ]
2025-05-16T00:00:00
[ [ "Chen", "Boyang", "" ], [ "Coladangelo", "Andrea", "" ], [ "Sattath", "Or", "" ] ]
2404.03332
Vilhelm Agdur
Vilhelm Agdur
A classification of overlapping clustering schemes for hypergraphs
31 pages, 11 figures
null
null
null
math.CO cs.SI math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community detection in graphs is a problem that is likely to be relevant whenever network data appears, and consequently the problem has received much attention with many different methods and algorithms applied. However, many of these methods are hard to study theoretically, and they optimise for somewhat different goals. A general and rigorous account of the problem and possible methods remains elusive. We study the problem of finding overlapping clusterings of hypergraphs, continuing the line of research started by Carlsson and M\'emoli (2013) of classifying clustering schemes as functors. We extend their notion of representability to the overlapping case, showing that any representable overlapping clustering scheme is excisive and functorial, and any excisive and functorial clustering scheme is isomorphic to a representable clustering scheme. We also note that, for simple graphs, any representable clustering scheme is computable in polynomial time on graphs of bounded expansion, with an exponent determined by the maximum independence number of a graph in the representing set. This result also applies to non-overlapping representable clustering schemes, and so may be of independent interest.
[ { "version": "v1", "created": "Thu, 4 Apr 2024 10:00:35 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 15:07:53 GMT" } ]
2025-05-16T00:00:00
[ [ "Agdur", "Vilhelm", "" ] ]
2404.03976
Lars Fritz
Abe Alexander and Lars Fritz
A theoretical framework for fees in AMMs
null
null
null
null
q-fin.ST
http://creativecommons.org/licenses/by/4.0/
In the ever evolving landscape of decentralized finance automated market makers (AMMs) play a key role: they provide a market place for trading assets in a decentralized manner. For so-called bluechip pairs, arbitrage activity provides a major part of the revenue generation of AMMs but also a major source of loss due to the so-called informed orderflow. Finding ways to minimize those losses while still keeping uninformed trading activity alive is a major problem in the field. In this paper we will investigate the mechanics of said arbitrage and try to understand how AMMs can maximize the revenue creation or in other words minimize the losses. To that end, we model the dynamics of arbitrage activity for a concrete implementation of a pool and study its sensitivity to the choice of fee aiming to maximize the value retention. We manage to map the ensuing dynamics to that of a random walk with a specific reward scheme that provides a convenient starting point for further studies.
[ { "version": "v1", "created": "Fri, 5 Apr 2024 09:16:39 GMT" }, { "version": "v2", "created": "Mon, 10 Jun 2024 15:29:55 GMT" }, { "version": "v3", "created": "Wed, 12 Jun 2024 05:36:27 GMT" }, { "version": "v4", "created": "Wed, 14 May 2025 20:19:00 GMT" } ]
2025-05-16T00:00:00
[ [ "Alexander", "Abe", "" ], [ "Fritz", "Lars", "" ] ]
2404.04918
Gang Chen
Gang Chen, Fanyi Yang, Zheyuan Zhang
Superclosenes error estimates for the div least-squares finite element method on elliptic problems
null
null
null
null
math.NA cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we provide some error estimates for the div least-squares finite element method on elliptic problems. The main contribution is presenting a complete error analysis, which improves the current \emph{state-of-the-art} results. The error estimates for both the scalar and the flux variables are established by specially designed dual arguments with the help of two projections: elliptic projection and H(div) projection, which are crucial to supercloseness estimates. In most cases, $H^3$ regularity is omitted to get the optimal convergence rate for vector and scalar unknowns, and most of our results require a lower regularity for the vector variable than the scalar. Moreover, a series of supercloseness results are proved, which are \emph{never seen} in the previous work of least-squares finite element methods.
[ { "version": "v1", "created": "Sun, 7 Apr 2024 11:04:38 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 08:53:45 GMT" } ]
2025-05-16T00:00:00
[ [ "Chen", "Gang", "" ], [ "Yang", "Fanyi", "" ], [ "Zhang", "Zheyuan", "" ] ]
2404.05799
Brij Mohan
Brij Mohan, Rajeev Gangwar, Tanmoy Pandit, Mohit Lal Bera, Maciej Lewenstein, and Manabendra Nath Bera
Coherent heat transfer leads to genuine quantum enhancement in the performances of continuous engines
Close to the published version
Phys. Rev. Applied 23, 044050 (2025)
10.1103/PhysRevApplied.23.044050
null
quant-ph cond-mat.mes-hall cond-mat.stat-mech physics.app-ph physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional continuous quantum heat engines with incoherent heat transfer perform poorly as they exploit two-body interactions between the system and hot or cold baths, thus having limited capability to outperform their classical counterparts. We introduce distinct continuous quantum heat engines that utilize coherent heat transfer with baths, yielding genuine quantum enhancement in performance. These coherent engines consist of one qutrit system and two photonic baths and enable coherent heat transfer via two-photon transitions involving three-body interactions between the system and hot and cold baths. We demonstrate that coherent engines deliver significantly higher power output with much greater reliability, i.e., lower signal-to-noise ratio of the power, by hundreds of folds over their incoherent counterparts. Importantly, coherent engines can operate close to or at the maximal achievable reliability allowed by the quantum thermodynamic uncertainty relation. Moreover, coherent engines manifest more nonclassical features than incoherent engines because they violate the classical thermodynamic uncertainty relation by a greater amount and for a wider range of parameters. These genuine enhancements in the performance of coherent engines are directly attributed to their capacity to harness higher energetic coherence for the resonant driving case. The experimental feasibility of coherent engines and the improved understanding of how quantum properties can enhance performance may find applications in quantum-enabled technologies.
[ { "version": "v1", "created": "Mon, 8 Apr 2024 18:01:11 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 14:20:18 GMT" } ]
2025-05-16T00:00:00
[ [ "Mohan", "Brij", "" ], [ "Gangwar", "Rajeev", "" ], [ "Pandit", "Tanmoy", "" ], [ "Bera", "Mohit Lal", "" ], [ "Lewenstein", "Maciej", "" ], [ "Bera", "Manabendra Nath", "" ] ]
2404.06102
Sanna Normo
S. Normo, D. E. Morosan, E. K. J. Kilpua, J. Pomoell
Estimating the lateral speed of a fast shock driven by a coronal mass ejection at the location of solar radio emissions
9 pages, 10 figures
null
10.1051/0004-6361/202449277
null
astro-ph.SR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fast coronal mass ejections (CMEs) can drive shock waves capable of accelerating electrons to high energies. These shock-accelerated electrons act as sources of electromagnetic radiation, often in the form of solar radio bursts. Recent findings suggest that radio imaging of solar radio bursts can provide a means to estimate the lateral expansion of CMEs and associated shocks in the low corona. Our aim is to estimate the expansion speed of a CME-driven shock at the locations of radio emission using 3D reconstructions of the shock wave from multiple viewpoints. We estimated the 3D location of radio emission using radio imaging from the Nan\c{c}ay Radioheliograph and the 3D location of the shock. The 3D shock was reconstructed using white-light and extreme ultraviolet images of the CME from the Solar Terrestrial Relations Observatory, Solar Dynamics Observatory, and the Solar and Heliospheric Observatory. The lateral expansion speed of the CME-driven shock at the electron acceleration locations was then estimated using the approximate 3D locations of the radio emission on the surface of the shock. The radio bursts associated with the CME were found to reside at the flank of the expanding CME-driven shock. We identified two prominent radio sources at two different locations and found that the lateral speed of the shock was in the range of $800-1000\,\mathrm{km\,s^{-1}}$ at these locations. Such a high speed during the early stages of the eruption already indicates the presence of a fast shock in the low corona. We also found a larger ratio between the radial and lateral expansion speed compared to values obtained higher up in the corona. The high shock speed obtained is indicative of a fast acceleration during the initial stage of the eruption. This acceleration is most likely one of the key parameters contributing to the presence of metric radio emissions, such as type II radio bursts.
[ { "version": "v1", "created": "Tue, 9 Apr 2024 08:08:22 GMT" } ]
2025-05-16T00:00:00
[ [ "Normo", "S.", "" ], [ "Morosan", "D. E.", "" ], [ "Kilpua", "E. K. J.", "" ], [ "Pomoell", "J.", "" ] ]
2404.06672
Boris Veytsman
Andrew Nesbitt and Boris Veytsman and Daniel Mietchen and Eva Maxfield Brown and James Howison and Jo\~ao Felipe Pimentel and Laurent H\`ebert-Dufresne and Stephan Druskat
Biomedical Open Source Software: Crucial Packages and Hidden Heroes
null
null
null
null
cs.SE cs.CY
http://creativecommons.org/licenses/by/4.0/
Despite the importance of scientific software for research, it is often not formally recognized and rewarded. This is especially true for foundation libraries, which are used by the software packages visible to the users, being ``hidden'' themselves. The funders and other organizations need to understand the complex network of computer programs that the modern research relies upon. In this work we used CZ Software Mentions Dataset to map the dependencies of the software used in biomedical papers and find the packages critical to the software ecosystems. We propose the centrality metrics for the network of software dependencies, analyze three ecosystems (PyPi, CRAN, Bioconductor) and determine the packages with the highest centrality.
[ { "version": "v1", "created": "Wed, 10 Apr 2024 01:22:02 GMT" }, { "version": "v2", "created": "Wed, 25 Dec 2024 22:31:21 GMT" }, { "version": "v3", "created": "Wed, 14 May 2025 21:28:00 GMT" } ]
2025-05-16T00:00:00
[ [ "Nesbitt", "Andrew", "" ], [ "Veytsman", "Boris", "" ], [ "Mietchen", "Daniel", "" ], [ "Brown", "Eva Maxfield", "" ], [ "Howison", "James", "" ], [ "Pimentel", "João Felipe", "" ], [ "Hèbert-Dufresne", "Laurent", "" ], [ "Druskat", "Stephan", "" ] ]
2404.10656
Zach Walsh
Matthew Baker, Oliver Lorscheid, Zach Walsh, Tianyi Zhang
The foundation of generalized parallel connections, 2-sums, and segment-cosegment exchanges of matroids
35 pages. v2: Added more background information and made minor expository changes
null
null
null
math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that, under suitable hypotheses, the foundation of a generalized parallel connection of matroids is the relative tensor product of the foundations. Using this result, we show that the foundation of a 2-sum of matroids is the absolute tensor product of the foundations, and that the foundation of a matroid is invariant under segment-cosegment exchange.
[ { "version": "v1", "created": "Tue, 16 Apr 2024 15:34:00 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 13:04:34 GMT" } ]
2025-05-16T00:00:00
[ [ "Baker", "Matthew", "" ], [ "Lorscheid", "Oliver", "" ], [ "Walsh", "Zach", "" ], [ "Zhang", "Tianyi", "" ] ]
2404.12182
Jaume Carbonell
Jaume Carbonell1, Vladimir Karmanov, Ekaterina Kupriyanova, Hagop Sazdjian
Abnormal solutions of Bethe--Salpeter equation with massless and massive exchanges
19 pages, 8 figures. Talk given at Workshop Critical Stability, ECT* oct 2023. To appear in Few-Body Systems
Few-Body Syst. 65, 56 (2024)
10.1007/s00601-024-01928-y
null
hep-ph cond-mat.str-el nucl-th quant-ph
http://creativecommons.org/publicdomain/zero/1.0/
We summarize the main properties of the so called ''abnormal solutions'' of the Wick--Cutkosky model, i.e. two massive scalar particles interacting via massless scalar exchange ("photons"), within the Bethe--Salpeter equation. These solutions do not exist in the non-relativistic limit, in spite of having very small binding energies. They present a genuine many-body character dominated by photons, with a norm of the valence constituent wave function (two-body norm) that vanishes in the limit of zero binding energy. We present new results concerning the massive-exchange case, in particular determine under which conditions is it possible to obtain such peculiar solutions without spoiling the model by tachyonic states ($M^2<0$).
[ { "version": "v1", "created": "Thu, 18 Apr 2024 13:41:14 GMT" } ]
2025-05-16T00:00:00
[ [ "Carbonell1", "Jaume", "" ], [ "Karmanov", "Vladimir", "" ], [ "Kupriyanova", "Ekaterina", "" ], [ "Sazdjian", "Hagop", "" ] ]
2404.12300
Laurie Williams
Laurie Williams (North Carolina State University), Sammy Migues (Imbricate Security), Jamie Boote (Synopsys), Ben Hutchison (Synopsys)
Proactive Software Supply Chain Risk Management Framework (P-SSCRM)
17 pages, 3 figures, 2 tables, will not be submitted to a conference
null
null
null
cs.CR
http://creativecommons.org/licenses/by-sa/4.0/
The Proactive Software Supply Chain Risk Management Framework (P SSCRM) described in this document is designed to help you understand and plan a secure software supply chain risk management initiative. P SSCRM was created through a process of understanding and analyzing real world data from nine industry leading software supply chain risk management initiatives as well as through the analysis and unification of ten government and industry documents, frameworks, and standards. Although individual methodologies and standards differ, many initiatives and standards share common ground. P SSCRM describes this common ground and presents a model for understanding, quantifying, and developing a secure software supply chain risk management program and determining where your organization's existing efforts stand when contrasted with other real world software supply chain risk management initiatives.
[ { "version": "v1", "created": "Thu, 18 Apr 2024 16:24:26 GMT" }, { "version": "v2", "created": "Mon, 5 May 2025 17:41:32 GMT" }, { "version": "v3", "created": "Tue, 6 May 2025 15:59:26 GMT" }, { "version": "v4", "created": "Thu, 15 May 2025 17:52:00 GMT" } ]
2025-05-16T00:00:00
[ [ "Williams", "Laurie", "", "North Carolina State University" ], [ "Migues", "Sammy", "", "Imbricate Security" ], [ "Boote", "Jamie", "", "Synopsys" ], [ "Hutchison", "Ben", "", "Synopsys" ] ]
2404.12636
Boyang Yang
Boyang Yang, Haoye Tian, Jiadong Ren, Hongyu Zhang, Jacques Klein, Tegawend\'e F. Bissyand\'e, Claire Le Goues, Shunfu Jin
MORepair: Teaching LLMs to Repair Code via Multi-Objective Fine-tuning
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within the realm of software engineering, specialized tasks on code, such as program repair, present unique challenges, necessitating fine-tuning Large language models~(LLMs) to unlock state-of-the-art performance. Fine-tuning approaches proposed in the literature for LLMs on program repair tasks generally overlook the need to reason about the logic behind code changes, beyond syntactic patterns in the data. High-performing fine-tuning experiments also usually come at very high computational costs. With MORepair, we propose a novel perspective on the learning focus of LLM fine-tuning for program repair: we not only adapt the LLM parameters to the syntactic nuances of the task of code transformation (objective 1), but we also specifically fine-tune the LLM with respect to the logical reason behind the code change in the training data (objective 2). Such a multi-objective fine-tuning will instruct LLMs to generate high-quality patches. We apply MORepair to fine-tune four open-source LLMs with different sizes and architectures. Experimental results on function-level and repository-level repair benchmarks show that the implemented fine-tuning effectively boosts LLM repair performance by 11.4% to 56.0%. We further show that our fine-tuning strategy yields superior performance compared to the state-of-the-art approaches, including standard fine-tuning, Fine-tune-CoT, and RepairLLaMA.
[ { "version": "v1", "created": "Fri, 19 Apr 2024 05:36:21 GMT" }, { "version": "v2", "created": "Mon, 22 Apr 2024 06:21:39 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 08:49:58 GMT" } ]
2025-05-16T00:00:00
[ [ "Yang", "Boyang", "" ], [ "Tian", "Haoye", "" ], [ "Ren", "Jiadong", "" ], [ "Zhang", "Hongyu", "" ], [ "Klein", "Jacques", "" ], [ "Bissyandé", "Tegawendé F.", "" ], [ "Goues", "Claire Le", "" ], [ "Jin", "Shunfu", "" ] ]
2404.12875
Mikel Fern\'andez Barbat
Mikel F. Barbat, J\"urgen Schaffner-Bielich and Laura Tolos
Comprehensive study of compact stars with dark matter
13 pages, 10 figures, published revised version
Phys. Rev. D 110 (2024) 023013
10.1103/PhysRevD.110.023013
null
astro-ph.HE nucl-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a comprehensive study of compact stars admixed with non-self annihilating self-interacting fermionic dark matter, delineating the dependence on the nuclear equation of state by considering the two limiting parametrized equations of state for neutron star matter obtained by smoothly matching the low-density chiral effective theory and the high-density perturbative QCD. These two parametrizations are the limiting cases of a wide variety of smooth equations of state, i.e. the softest and stiffest possible one without a phase transition, that generate masses and radii compatible with 2M$_\odot$ observations and the tidal constraint from GW170817. With an exhaustive analysis of the possible stable mass-radius configurations, we determine the quantity of dark matter contained in stars with masses and radii compatible with the aforementioned astrophysical constraints. We find that for dark particle masses of a few tenths of GeV, the dark core collapses and no stable solutions are found for the two limiting ordinary matter equations of state. For lower masses, the dark matter fraction is limited to 10%, being at most 1% for masses ranging from 0.1 to 10 GeV for the limiting soft nuclear equation of state. For the limiting stiff nuclear equation of state, the dark matter fraction can reach values of more than 10%, but the dark particle mass is being constrained to 0.3 GeV and 10 GeV for the weak self-interacting case and has to be at least 5 GeV for the strong self-interacting one. For dark particle masses of less than 0.1 GeV, stable neutron star configurations should have less than 1% of self-interacting dark matter to be compatible with the constraint of the tidal deformability from GW170817 for the two limiting ordinary matter equations of state studied.
[ { "version": "v1", "created": "Fri, 19 Apr 2024 13:25:22 GMT" }, { "version": "v2", "created": "Tue, 9 Jul 2024 22:27:26 GMT" }, { "version": "v3", "created": "Mon, 12 May 2025 15:02:21 GMT" }, { "version": "v4", "created": "Thu, 15 May 2025 12:20:18 GMT" } ]
2025-05-16T00:00:00
[ [ "Barbat", "Mikel F.", "" ], [ "Schaffner-Bielich", "Jürgen", "" ], [ "Tolos", "Laura", "" ] ]
2404.15222
Anna Zhigun
Mabel Lizzy Rajendran and Anna Zhigun
Local well-posedness for a novel nonlocal model for cell-cell adhesion via receptor binding
null
null
null
null
math.AP
http://creativecommons.org/licenses/by/4.0/
Local well-posedness is established for a highly nonlocal nonlinear diffusion-adhesion system for bounded initial values with small support. Macroscopic systems of this kind were previously obtained by the authors through upscaling in [32] and can account for the effect of microscopic receptor binding dynamics in cell-cell adhesion. The system analysed here couples an integro-PDE featuring degenerate diffusion of the porous media type and nonlocal adhesion with a novel nonlinear integral equation. The approach is based on decoupling the system and using Banach's fixed point theorem to solve each of the two equations individually and subsequently the entire system. The main challenge of the implementation lies in selecting a suitable framework. One of the key results is the local well-posedness for the integral equation with a Radon measure as a parameter. The analysis of this equation utilizes the Kantorovich-Rubinstein norm, marking the first application of this norm in handling a nonlinear integral equation.
[ { "version": "v1", "created": "Tue, 23 Apr 2024 16:54:18 GMT" }, { "version": "v2", "created": "Sun, 30 Jun 2024 14:25:20 GMT" }, { "version": "v3", "created": "Thu, 6 Feb 2025 09:38:27 GMT" }, { "version": "v4", "created": "Fri, 25 Apr 2025 06:49:05 GMT" }, { "version": "v5", "created": "Sun, 4 May 2025 15:24:08 GMT" }, { "version": "v6", "created": "Thu, 15 May 2025 13:39:25 GMT" } ]
2025-05-16T00:00:00
[ [ "Rajendran", "Mabel Lizzy", "" ], [ "Zhigun", "Anna", "" ] ]
2404.17785
Yizhe Xiong
Yizhe Xiong, Xiansheng Chen, Xin Ye, Hui Chen, Zijia Lin, Haoran Lian, Zhenpeng Su, Wei Huang, Jianwei Niu, Jungong Han, Guiguang Ding
Temporal Scaling Law for Large Language Models
Preprint, Currently under review
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, Large Language Models (LLMs) have been widely adopted in a wide range of tasks, leading to increasing attention towards the research on how scaling LLMs affects their performance. Existing works, termed Scaling Laws, have discovered that the final test loss of LLMs scales as power-laws with model size, computational budget, and dataset size. However, the temporal change of the test loss of an LLM throughout its pre-training process remains unexplored, though it is valuable in many aspects, such as selecting better hyperparameters \textit{directly} on the target LLM. In this paper, we propose the novel concept of Temporal Scaling Law, studying how the test loss of an LLM evolves as the training steps scale up. In contrast to modeling the test loss as a whole in a coarse-grained manner, we break it down and dive into the fine-grained test loss of each token position, and further develop a dynamic hyperbolic-law. Afterwards, we derive the much more precise temporal scaling law by studying the temporal patterns of the parameters in the dynamic hyperbolic-law. Results on both in-distribution (ID) and out-of-distribution (OOD) validation datasets demonstrate that our temporal scaling law accurately predicts the test loss of LLMs across training steps. Our temporal scaling law has broad practical applications. First, it enables direct and efficient hyperparameter selection on the target LLM, such as data mixture proportions. Secondly, viewing the LLM pre-training dynamics from the token position granularity provides some insights to enhance the understanding of LLM pre-training.
[ { "version": "v1", "created": "Sat, 27 Apr 2024 05:49:11 GMT" }, { "version": "v2", "created": "Sun, 16 Jun 2024 11:06:01 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 02:48:26 GMT" } ]
2025-05-16T00:00:00
[ [ "Xiong", "Yizhe", "" ], [ "Chen", "Xiansheng", "" ], [ "Ye", "Xin", "" ], [ "Chen", "Hui", "" ], [ "Lin", "Zijia", "" ], [ "Lian", "Haoran", "" ], [ "Su", "Zhenpeng", "" ], [ "Huang", "Wei", "" ], [ "Niu", "Jianwei", "" ], [ "Han", "Jungong", "" ], [ "Ding", "Guiguang", "" ] ]
2404.18703
Fa Peng Huang
Aidi Yang, Fa Peng Huang
Detectability of the Phase Transition Gravitational Waves in the DFSZ axion Model
Published version in Journal of Cosmology and Astroparticle Physics,36 pages, 6 figures, 4 tables
JCAP05(2025)028
10.1088/1475-7516/2025/05/028
null
hep-ph
http://creativecommons.org/licenses/by/4.0/
In recent years, an increasing number of studies have focused on using gravitational waves to explore axions and the dynamics of Peccei-Quinn symmetry breaking at high energy scales in the early universe. To accurately quantify the capability of specific gravitational wave experiments to probe the axion properties, it is crucial to perform precise calculations of gravitational wave signals based on given axion models and to conduct detailed detectability analysis tailored to the experimental configurations. Therefore, in this work, we consider the widely-studied DFSZ axion model and, for the first time, perform precise calculations of the phase transition dynamics parameters and associated gravitational wave signals. Our results demonstrate that the DFSZ model allows a strong first-order phase transition for the Peccei-Quinn symmetry-breaking process at high energy scales exceeding $10^{9}~\mathrm{GeV}$. Moreover, by calculating the signal-to-noise ratio of the gravitational waves and comparing it with the thresholds of the Cosmic Explorer detector, we find that these signals are observable by the Cosmic Explorer with the energy scale range from $10^9~\mathrm{GeV}$ to $10^{12}~\mathrm{GeV}$. Notably, through Fisher Matrix analysis, we find that if Cosmic Explorer detectors observe these gravitational waves, the bubble wall velocity will be the first parameter to be determined. This study demonstrates that gravitational wave detection offers a powerful approach to investigating axion dynamics complementary to other experiments.
[ { "version": "v1", "created": "Mon, 29 Apr 2024 13:54:51 GMT" }, { "version": "v2", "created": "Mon, 20 May 2024 15:10:41 GMT" }, { "version": "v3", "created": "Thu, 31 Oct 2024 11:34:38 GMT" }, { "version": "v4", "created": "Fri, 14 Mar 2025 09:26:22 GMT" }, { "version": "v5", "created": "Thu, 15 May 2025 08:49:01 GMT" } ]
2025-05-16T00:00:00
[ [ "Yang", "Aidi", "" ], [ "Huang", "Fa Peng", "" ] ]
2404.19155
Calvin McPhail-Snyder
Calvin McPhail-Snyder
Octahedral coordinates from the Wirtinger presentation
18 pages + bibliography. Published version, with minor wording changes in the last paragraph on page 4
null
null
null
math.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $\rho$ be a representation of a knot group (or more generally, the fundamental group of a tangle complement) into $\operatorname{SL}_2(\mathbb{C})$ expressed in terms of the Wirtinger generators of a diagram $D$. This diagram also determines an ideal triangulation of the complement called the octahedral decomposition. $\rho$ induces a hyperbolic structure on the complement of $D$, and in this note we give a direct algebraic formula for the geometric parameters of the octahedral decomposition induced by this structure. Our formula gives a new, explicit criterion for whether $\rho$ occurs as a critical point of the diagram's Neumann-Zagier--Yokota potential function.
[ { "version": "v1", "created": "Mon, 29 Apr 2024 23:37:18 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 11:10:27 GMT" } ]
2025-05-16T00:00:00
[ [ "McPhail-Snyder", "Calvin", "" ] ]
2404.19497
Xinjian Yan
Xinjian Yan, Xinwei Lee, Ningyi Xie, Yoshiyuki Saito, Leo Kurosawa, Nobuyoshi Asai, Dongsheng Cai and Hoong Chuin Lau
Light Cone Cancellation for Variational Quantum Eigensolver Ansatz
null
null
null
null
quant-ph
http://creativecommons.org/licenses/by/4.0/
Variational Quantum Algorithms (VQAs) represent a class of algorithms that utilize a hybrid approach, combining classical and quantum computing techniques. In this approach, classical computers serve as optimizers that update circuit parameters to find approximate solutions to complex problems. In this study, we apply a method known as Light Cone Cancellation (LCC) to optimize variational circuits, effectively reducing the required number of qubits and gates for circuit simulation. We then evaluate the performance of LCC on one of the VQAs -- the Variational Quantum Eigensolver (VQE) -- to address the Max-Cut problem. Compared with the Quantum Approximate Optimization Algorithm (QAOA), VQE offers greater degrees of freedom and brings better performance at lower circuit depths. By applying LCC to VQE, we can shift the complexity of circuit simulation from the number of qubits to the number of edges in the graph, i.e., from exponential time to polynomial time. This enables us to solve large problems with up to 100 vertices without actually simulating the entire circuit. From demonstration results on 7-qubit and 27-qubit fake backends, we show that LCC yields higher approximation ratios than those cases without LCC, implying that the effect of noise is reduced when LCC is applied.
[ { "version": "v1", "created": "Tue, 30 Apr 2024 12:31:03 GMT" }, { "version": "v2", "created": "Mon, 9 Dec 2024 04:08:11 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 06:50:44 GMT" } ]
2025-05-16T00:00:00
[ [ "Yan", "Xinjian", "" ], [ "Lee", "Xinwei", "" ], [ "Xie", "Ningyi", "" ], [ "Saito", "Yoshiyuki", "" ], [ "Kurosawa", "Leo", "" ], [ "Asai", "Nobuyoshi", "" ], [ "Cai", "Dongsheng", "" ], [ "Lau", "Hoong Chuin", "" ] ]
2405.00730
Masato Kimura Dr.
Vina Apriliani, Masato Kimura, and Hiroshi Ohtsuka
Two-step minimization approach to an $L^\infty$-constrained variational problem with a generalized potential
12 pages
The Science Reports of Kanazawa University, 67, pp.57-68 (2024)
null
null
math.AP
http://creativecommons.org/licenses/by/4.0/
We study a variational problem on $H^1({\mathbb R})$ under an $L^\infty$-constraint related to Sobolev-type inequalities for a class of generalized potentials, including $L^p$-potentials, non-positive potentials, and signed Radon measures. We establish various essential tools for this variational problem, including the decomposition principle, the comparison principle, and the perturbation theorem, which are the basis of the two-step minimization method. As for their applications, we present precise results for minimizers of minimization problems, such as the study of potentials of Dirac's delta measure type and the analysis of trapped modes in potential wells.
[ { "version": "v1", "created": "Sun, 28 Apr 2024 03:29:50 GMT" }, { "version": "v2", "created": "Tue, 21 May 2024 05:58:41 GMT" } ]
2025-05-16T00:00:00
[ [ "Apriliani", "Vina", "" ], [ "Kimura", "Masato", "" ], [ "Ohtsuka", "Hiroshi", "" ] ]
2405.00922
Nooshin Yousefzadeh Hosseini
Nooshin Yousefzadeh, Rahul Sengupta, Yashaswi Karnati, Anand Rangarajan, Sanjay Ranka
MTDT: A Multi-Task Deep Learning Digital Twin
8 pages, 2 figures, 4 tables
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traffic congestion has significant impacts on both the economy and the environment. Measures of Effectiveness (MOEs) have long been the standard for evaluating traffic intersections' level of service and operational efficiency. However, the scarcity of traditional high-resolution loop detector data (ATSPM) presents challenges in accurately measuring MOEs or capturing the intricate spatiotemporal characteristics inherent in urban intersection traffic. To address this challenge, we present a comprehensive intersection traffic flow simulation that utilizes a multi-task learning paradigm. This approach combines graph convolutions for primary estimating lane-wise exit and inflow with time series convolutions for secondary assessing multi-directional queue lengths and travel time distribution through any arbitrary urban traffic intersection. Compared to existing deep learning methodologies, the proposed Multi-Task Deep Learning Digital Twin (MTDT) distinguishes itself through its adaptability to local temporal and spatial features, such as signal timing plans, intersection topology, driving behaviors, and turning movement counts. We also show the benefit of multi-task learning in the effectiveness of individual traffic simulation tasks. Furthermore, our approach facilitates sequential computation and provides complete parallelization through GPU implementation. This not only streamlines the computational process but also enhances scalability and performance.
[ { "version": "v1", "created": "Thu, 2 May 2024 00:34:10 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 03:16:20 GMT" } ]
2025-05-16T00:00:00
[ [ "Yousefzadeh", "Nooshin", "" ], [ "Sengupta", "Rahul", "" ], [ "Karnati", "Yashaswi", "" ], [ "Rangarajan", "Anand", "" ], [ "Ranka", "Sanjay", "" ] ]
2405.01182
Luca Scrucca
Luca Scrucca and Dimitris Karlis
A Model-Based Approach to Shot Charts Estimation in Basketball
null
null
10.1007/s00180-025-01599-1
null
stat.ME
http://creativecommons.org/licenses/by/4.0/
Shot charts in basketball analytics provide an indispensable tool for evaluating players' shooting performance by visually representing the distribution of field goal attempts across different court locations. However, conventional methods often overlook the bounded nature of the basketball court, leading to inaccurate representations, particularly along the boundaries and corners. In this paper, we propose a novel model-based approach to shot chart estimation and visualization that explicitly considers the physical boundaries of the basketball court. By employing Gaussian mixtures for bounded data, our methodology allows to obtain more accurate estimation of shot density distributions for both made and missed shots. Bayes' rule is then applied to derive estimates for the probability of successful shooting from any given locations, and to identify the regions with the highest expected scores. To illustrate the efficacy of our proposal, we apply it to data from the 2022-23 NBA regular season, showing its usefulness through detailed analyses of shot patterns for two prominent players.
[ { "version": "v1", "created": "Thu, 2 May 2024 11:11:29 GMT" } ]
2025-05-16T00:00:00
[ [ "Scrucca", "Luca", "" ], [ "Karlis", "Dimitris", "" ] ]
2405.01225
Michael Szell
Henrik Wolf, Ane Rahbek Vier{\o}, Michael Szell
CoolWalks: Assessing the potential of shaded routing for active mobility in urban street networks
Main text: 14 pages, 6 figures. SI: 8 pages, 4 figures
Scientific Reports 15, 14911 (2025)
10.1038/s41598-025-97200-2
null
physics.soc-ph cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Walking is the most sustainable form of urban mobility, but is compromised by uncomfortable or unhealthy sun exposure, which is an increasing problem due to global warming. Shade from buildings can provide cooling and protection for pedestrians, but the extent of this potential benefit is unknown. Here we explore the potential for shaded walking, using building footprints and street networks from both synthetic and real cities. We introduce a route choice model with a sun avoidance parameter $\alpha$ and define the CoolWalkability metric to measure opportunities for walking in shade. We derive analytically that on a regular grid with constant building heights, CoolWalkability is independent of $\alpha$, and that the grid provides no CoolWalkability benefit for shade-seeking individuals compared to the shortest path. However, variations in street geometry and building heights create such benefits. We further uncover that the potential for shaded routing differs between grid-like and irregular street networks, forms local clusters, and is sensitive to the mapped network geometry. Our research identifies the limitations and potential of shade for cool, active travel, and is a first step towards a rigorous understanding of shade provision for sustainable mobility in cities.
[ { "version": "v1", "created": "Thu, 2 May 2024 12:09:08 GMT" } ]
2025-05-16T00:00:00
[ [ "Wolf", "Henrik", "" ], [ "Vierø", "Ane Rahbek", "" ], [ "Szell", "Michael", "" ] ]
2405.01893
Kostiantyn Yershov V.
Kostiantyn V. Yershov, Volodymyr P. Kravchuk, Maria Daghofer, and Jeroen van den Brink
Fluctuation induced piezomagnetism in local moment altermagnets
null
Phys. Rev. B 110, 144421 (2024)
10.1103/PhysRevB.110.144421
null
cond-mat.str-el
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It was recently discovered that, depending on their symmetries, collinear antiferromagnets may break spin degeneracy in momentum space, even in absence of spin-orbit coupling. Such systems, dubbed altermagnets, have electronic bands with a spin-momentum texture set mainly by the combined crystal-magnetic symmetry. This discovery motivates the question which novel physical properties derive from altermagnetic order. Here we show that one consequence of altermagnetic order is a fluctuation-driven piezomagnetic response. Using two Heisenberg models of d-wave altermagnets, a checkerboard one and one for rutiles, we determine the fluctuation induced piezomagnetic coefficients considering temperature induced transversal spin fluctuations. We establish in addition that magnetic fluctuations induce an anisotropic thermal spin conductivity.
[ { "version": "v1", "created": "Fri, 3 May 2024 07:30:17 GMT" }, { "version": "v2", "created": "Thu, 12 Sep 2024 07:56:23 GMT" } ]
2025-05-16T00:00:00
[ [ "Yershov", "Kostiantyn V.", "" ], [ "Kravchuk", "Volodymyr P.", "" ], [ "Daghofer", "Maria", "" ], [ "Brink", "Jeroen van den", "" ] ]
2405.03689
Sanjay Subramanian
Sanjay Subramanian, Evonne Ng, Lea M\"uller, Dan Klein, Shiry Ginosar, and Trevor Darrell
Pose Priors from Language Models
CVPR 2025
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Language is often used to describe physical interaction, yet most 3D human pose estimation methods overlook this rich source of information. We bridge this gap by leveraging large multimodal models (LMMs) as priors for reconstructing contact poses, offering a scalable alternative to traditional methods that rely on human annotations or motion capture data. Our approach extracts contact-relevant descriptors from an LMM and translates them into tractable losses to constrain 3D human pose optimization. Despite its simplicity, our method produces compelling reconstructions for both two-person interactions and self-contact scenarios, accurately capturing the semantics of physical and social interactions. Our results demonstrate that LMMs can serve as powerful tools for contact prediction and pose estimation, offering an alternative to costly manual human annotations or motion capture data. Our code is publicly available at https://prosepose.github.io.
[ { "version": "v1", "created": "Mon, 6 May 2024 17:59:36 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 14:35:43 GMT" } ]
2025-05-16T00:00:00
[ [ "Subramanian", "Sanjay", "" ], [ "Ng", "Evonne", "" ], [ "Müller", "Lea", "" ], [ "Klein", "Dan", "" ], [ "Ginosar", "Shiry", "" ], [ "Darrell", "Trevor", "" ] ]
2405.04760
Hanxiang Xu
Hanxiang Xu, Shenao Wang, Ningke Li, Kailong Wang, Yanjie Zhao, Kai Chen, Ting Yu, Yang Liu and Haoyu Wang
Large Language Models for Cyber Security: A Systematic Literature Review
56 pages,6 figures
null
null
null
cs.CR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rapid advancement of Large Language Models (LLMs) has opened up new opportunities for leveraging artificial intelligence in various domains, including cybersecurity. As the volume and sophistication of cyber threats continue to grow, there is an increasing need for intelligent systems that can automatically detect vulnerabilities, analyze malware, and respond to attacks. In this survey, we conduct a comprehensive review of the literature on the application of LLMs in cybersecurity (LLM4Security). By comprehensively collecting over 30K relevant papers and systematically analyzing 127 papers from top security and software engineering venues, we aim to provide a holistic view of how LLMs are being used to solve diverse problems across the cybersecurity domain. Through our analysis, we identify several key findings. First, we observe that LLMs are being applied to a wide range of cybersecurity tasks, including vulnerability detection, malware analysis, network intrusion detection, and phishing detection. Second, we find that the datasets used for training and evaluating LLMs in these tasks are often limited in size and diversity, highlighting the need for more comprehensive and representative datasets. Third, we identify several promising techniques for adapting LLMs to specific cybersecurity domains, such as fine-tuning, transfer learning, and domain-specific pre-training. Finally, we discuss the main challenges and opportunities for future research in LLM4Security, including the need for more interpretable and explainable models, the importance of addressing data privacy and security concerns, and the potential for leveraging LLMs for proactive defense and threat hunting. Overall, our survey provides a comprehensive overview of the current state-of-the-art in LLM4Security and identifies several promising directions for future research.
[ { "version": "v1", "created": "Wed, 8 May 2024 02:09:17 GMT" }, { "version": "v2", "created": "Thu, 9 May 2024 08:10:54 GMT" }, { "version": "v3", "created": "Sat, 27 Jul 2024 14:04:11 GMT" }, { "version": "v4", "created": "Thu, 15 May 2025 07:33:07 GMT" } ]
2025-05-16T00:00:00
[ [ "Xu", "Hanxiang", "" ], [ "Wang", "Shenao", "" ], [ "Li", "Ningke", "" ], [ "Wang", "Kailong", "" ], [ "Zhao", "Yanjie", "" ], [ "Chen", "Kai", "" ], [ "Yu", "Ting", "" ], [ "Liu", "Yang", "" ], [ "Wang", "Haoyu", "" ] ]
2405.05279
James Worrell
Pavol Kebis, Florian Luca, Joel Ouaknine, Andrew Scoones, James Worrell
Transcendence for Pisot Morphic Words over an Algebraic Base
arXiv admin note: text overlap with arXiv:2308.13657
null
null
null
math.NT cs.FL
http://creativecommons.org/licenses/by/4.0/
It is known that for a uniform morphic sequence $\boldsymbol u = \langle u_n\rangle_{n=0}^\infty$ and an algebraic number $\beta$ such that $|\beta|>1$, the number $[\![\boldsymbol{u} ]\!]_\beta:=\sum_{n=0}^\infty \frac{u_n}{\beta^n}$ either lies in $\mathbb Q(\beta)$ or is transcendental. In this paper we show a similar rational-transcendental dichotomy for sequences defined by irreducible Pisot morphisms. Subject to the Pisot conjecture (an irreducible Pisot morphism has pure discrete spectrum), we generalise the latter result to arbitrary finite alphabets. In certain cases we are able to show transcendence of $[\![\boldsymbol{u}]\!]_{\beta}$ outright. In particular, for $k\geq 2$, if $\boldsymbol u$ is the $k$-bonacci word then $[\![\boldsymbol{u}]\!]_{\beta}$ is transcendental.
[ { "version": "v1", "created": "Mon, 6 May 2024 12:20:15 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 17:32:11 GMT" } ]
2025-05-16T00:00:00
[ [ "Kebis", "Pavol", "" ], [ "Luca", "Florian", "" ], [ "Ouaknine", "Joel", "" ], [ "Scoones", "Andrew", "" ], [ "Worrell", "James", "" ] ]
2405.06957
Uwe Borghoff
Aline Werro, Christian Nitzl and Uwe M. Borghoff
On the Role of Intelligence and Business Wargaming in Developing Foresight
18 pages, 3 figures. The authors declare no potential conflicts of interest
Technology Analysis & Strategic Management (2025), Routledge
10.1080/09537325.2025.2506122
null
cs.CY
http://creativecommons.org/licenses/by-nc-sa/4.0/
Business wargaming is a central tool for developing sustaining strategies. It transfers the benefits of traditional wargaming to the business environment. However, building wargames that support the process of decision-making for strategy require respective intelligence. This paper investigates the role of intelligence in the process of developing strategic foresight. The focus is on how intelligence is developed and how it relates to business wargaming. The so-called intelligence cycle is the basis and reference of our investigation. The conceptual part of the paper combines the theoretical background from military, business as well as serious gaming. To elaborate on some of the lessons learned, we examine specific business wargames both drawn from the literature and conducted by us at the Center for Intelligence and Security Studies (CISS). It is shown that business wargaming can make a significant contribution to the transformation of data to intelligence by supporting the intelligence cycle in two crucial phases. Furthermore, it brings together business intelligence (BI) and competitive intelligence (CI) and it bridges the gap to a company's strategy by either testing or developing a new strategy. We were also able to confirm this finding based on the business wargame we conducted at a major semiconductor manufacturer.
[ { "version": "v1", "created": "Sat, 11 May 2024 08:48:14 GMT" } ]
2025-05-16T00:00:00
[ [ "Werro", "Aline", "" ], [ "Nitzl", "Christian", "" ], [ "Borghoff", "Uwe M.", "" ] ]
2405.07281
Chongjun Ouyang
Zhenqiao Cheng, Nanxi Li, Jianchi Zhu, Chongjun Ouyang, and Xingqi Zhang
Exploiting Movable Antennas in Multicast Communications
7 pages
null
null
null
eess.SP
http://creativecommons.org/licenses/by/4.0/
This article investigates the integration of movable antennas (MAs) into multicast communication systems. By discretizing the motion of the MAs, a novel MA-assisted multicast transmission architecture is formulated. An alternating optimization (AO) algorithm based on successive convex approximation is proposed to optimize the transmit beamforming and antenna positions. To gain further insights, the two-user case is examined, and a closed-form expression for the optimal beamformer is derived. On this basis, a low-complexity greedy search algorithm is developed to optimize the placement of the MAs. Furthermore, under the assumption of a line-of-sight propagation environment, a branch-and-bound algorithm is designed to determine the globally optimal antenna configuration with reduced complexity compared to exhaustive search. Numerical simulations confirm that the proposed methods effectively enhance the achievable multicast rate.
[ { "version": "v1", "created": "Sun, 12 May 2024 13:07:36 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 11:34:57 GMT" } ]
2025-05-16T00:00:00
[ [ "Cheng", "Zhenqiao", "" ], [ "Li", "Nanxi", "" ], [ "Zhu", "Jianchi", "" ], [ "Ouyang", "Chongjun", "" ], [ "Zhang", "Xingqi", "" ] ]
2405.07555
Jiongjie Wang
Jiongjie Wang and Jiang Xiao
Interpreting S-Parameter Spectra in Coupled Resonant Systems: The Role of Probing Configurations
5 pages, 5 figures
null
10.1364/OE.551120
null
cond-mat.mes-hall
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The S-parameter $S_{21}$ is widely used to characterize the resonant properties of various systems. However, we demonstrates that the reliability of $S_{21}$ as a true indicator of system resonances depends heavily on the specific probing setup employed. While point-probe or weak probes preserve the integrity of the $S_{21}$ spectrum and accurately reflect system resonances, multi-point and strong probes can introduce significant discrepancies. These discrepancies can manifest as misleading features such as repulsive level anti-crossing or attractive level crossing, even in systems that are fundamentally uncoupled. This highlights the critical importance of selecting appropriate probing techniques to ensure a precise evaluation of system resonances.
[ { "version": "v1", "created": "Mon, 13 May 2024 08:34:43 GMT" } ]
2025-05-16T00:00:00
[ [ "Wang", "Jiongjie", "" ], [ "Xiao", "Jiang", "" ] ]
2405.07714
Wen Shang
Wen Shang, Yuan Liao, Vasilis Friderikos, Halim Yanikomeroglu
Joint Robotic Aerial Base Station Deployment and Wireless Backhauling in 6G Multi-hop Networks
This version reflects the conference publication in 2025 IEEE Wireless Communications and Networking Conference (WCNC), with a minor modified title and text content. The conference is:"Integrated Robotic Aerial Base Stations Deployment and Backhaul Design in 6G Multihop Networks," 2025 IEEE WCNC doi: 10.1109/WCNC61545.2025.10978194
null
10.1109/WCNC61545.2025.10978194
null
cs.NI
http://creativecommons.org/licenses/by/4.0/
Due to their ability to anchor into tall urban landforms, such as lampposts or street lights, robotic aerial base stations (RABSs) can create a hyper-flexible wireless multi-hop heterogeneous network to meet the forthcoming green, densified, and dynamic network deployment to support, inter alia, high data rates. In this work, we propose a network infrastructure that can concurrently support the wireless backhaul link capacity and access link traffic demand in the millimeter-wave (mmWave) frequency band. The RABSs grasping locations, resource blocks (RBs) assignment, and route flow control are simultaneously optimized to maximize the served traffic demands. Robotic base stations capitalize on the fact that traffic distribution varies considerably across both time and space within a given geographical area. Hence, they are able to relocate to suitable locations, i.e., 'follow' the traffic demand as it unfolds to increase the overall network efficiency. To tackle the curse of dimensionality of the proposed mixed-integer linear problem, we propose a greedy algorithm to obtain a competitive solution with low computational complexity. Compared to baseline models, which are heterogeneous networks with randomly deployed fixed small cells and pre-allocated RBs for wireless access and backhaul links, a wide set of numerical investigations reveals that robotic base stations could improve the served traffic demand. Specifically, the proposed mode serves at most 65\% more traffic demand compared to an equal number of deployed fixed small cells.
[ { "version": "v1", "created": "Mon, 13 May 2024 13:02:50 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 13:15:56 GMT" } ]
2025-05-16T00:00:00
[ [ "Shang", "Wen", "" ], [ "Liao", "Yuan", "" ], [ "Friderikos", "Vasilis", "" ], [ "Yanikomeroglu", "Halim", "" ] ]
2405.09264
Marcel Kempf
Marcel Kempf and Nikolas Gauder and Benedikt Jaeger and Johannes Zirngibl and Georg Carle
A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights
Presented at the 2024 IFIP Networking Conference (IFIP Networking)
null
10.23919/IFIPNetworking62109.2024.10619916
null
cs.NI cs.CR
http://creativecommons.org/licenses/by-nc-sa/4.0/
QUIC is a new network protocol standardized in 2021. It was designed to replace the TCP/TLS stack and is based on UDP. The most current web standard HTTP/3 is specifically designed to use QUIC as transport protocol. QUIC claims to provide secure and fast transport with low-latency connection establishment, flow and congestion control, reliable delivery, and stream multiplexing. To achieve the security goals, QUIC enforces the usage of TLS 1.3. It uses authenticated encryption with additional data (AEAD) algorithms to not only protect the payload but also parts of the header. The handshake relies on asymmetric cryptography, which will be broken with the introduction of powerful quantum computers, making the use of post-quantum cryptography inevitable. This paper presents a detailed evaluation of the impact of cryptography on QUIC performance. The high-performance QUIC implementations LSQUIC, quiche, and MsQuic are evaluated under different aspects. We break symmetric cryptography down to the different security features. To be able to isolate the impact of cryptography, we implemented a NOOP AEAD algorithm which leaves plaintext unaltered. We show that QUIC performance increases by 10 to 20% when removing packet protection. The header protection has negligible impact on performance, especially for AES ciphers. We integrate post-quantum cryptographic algorithms into QUIC, demonstrating its feasibility without major changes to the QUIC libraries by using a TLS library that implements post-quantum algorithms. Kyber, Dilithium, and FALCON are promising candidates for post-quantum secure QUIC, as they have a low impact on the handshake duration. Algorithms like SPHINCS+ with larger key sizes or more complex calculations significantly impact the handshake duration and cause additional issues in our measurements.
[ { "version": "v1", "created": "Wed, 15 May 2024 11:27:28 GMT" } ]
2025-05-16T00:00:00
[ [ "Kempf", "Marcel", "" ], [ "Gauder", "Nikolas", "" ], [ "Jaeger", "Benedikt", "" ], [ "Zirngibl", "Johannes", "" ], [ "Carle", "Georg", "" ] ]
2405.09513
Theodoros Soultanis
Theodoros Soultanis, Kiril Maltsev, Andreas Bauswein, Katerina Chatziioannou, Friedrich K. Roepke, Nikolaos Stergioulas
Gravitational-wave model for neutron star merger remnants with supervised learning
21 pages, 13 figures, Published in Phys. Rev. D on Jan 2, 2025
Phys. Rev. D 111, 023002 - Published 2 January, 2025
10.1103/PhysRevD.111.023002
null
astro-ph.HE gr-qc
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a time-domain model for the gravitational waves emitted by equal-mass binary neutron star merger remnants for a fixed equation of state. We construct a large set of numerical relativity simulations for a single equation of state consistent with current constraints, totaling 157 equal-mass binary neutron star merger configurations. The gravitational-wave model is constructed using the supervised learning method of K-nearest neighbor regression. As a first step toward developing a general model with supervised learning methods that accounts for the dependencies on equation of state and the binary masses of the system, we explore the impact of the size of the dataset on the model. We assess the accuracy of the model for a varied dataset size and number density in total binary mass. Specifically, we consider five training sets of $\{ 20,40, 60, 80, 100\}$ simulations uniformly distributed in total binary mass. We evaluate the resulting models in terms of faithfulness using a test set of 30 additional simulations that are not used during training and which are equidistantly spaced in total binary mass. The models achieve faithfulness with maximum values in the range of $0.980$ to $0.995$. We assess our models simulating signals observed by the three-detector network of Advanced LIGO-Virgo. We find that all models with training sets of size equal to or larger than $40$ achieve an unbiased measurement of the main gravitational-wave frequency. We confirm that our results do not depend qualitatively on the choice of the (fixed) equation of state. We conclude that training sets, with a minimum size of $40$ simulations, or a number density of approximately $11$ simulations per $0.1\,M_\odot$ of total binary mass, suffice for the construction of faithful templates for the post-merger signal for a single equation of state and equal-mass binaries (abbreviated).
[ { "version": "v1", "created": "Wed, 15 May 2024 17:06:57 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 17:15:40 GMT" } ]
2025-05-16T00:00:00
[ [ "Soultanis", "Theodoros", "" ], [ "Maltsev", "Kiril", "" ], [ "Bauswein", "Andreas", "" ], [ "Chatziioannou", "Katerina", "" ], [ "Roepke", "Friedrich K.", "" ], [ "Stergioulas", "Nikolaos", "" ] ]
2405.09628
Pratik Nandy
Pratik Nandy, Apollonas S. Matsoukas-Roubeas, Pablo Mart\'inez-Azcona, Anatoly Dymarsky, Adolfo del Campo
Quantum Dynamics in Krylov Space: Methods and Applications
Invited review article in Physics Reports, v3: few sections added, typos corrected, refs added. Published version in Physics Reports
10.1016/j.physrep.2025.05.001
null
RIKEN-iTHEMS-Report-24
quant-ph cond-mat.stat-mech cond-mat.str-el hep-th nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dynamics of quantum systems unfolds within a subspace of the state space or operator space, known as the Krylov space. This review presents the use of Krylov subspace methods to provide an efficient description of quantum evolution and quantum chaos, with emphasis on nonequilibrium phenomena of many-body systems with a large Hilbert space. It provides a comprehensive update of recent developments, focused on the quantum evolution of operators in the Heisenberg picture as well as pure and mixed states. It further explores the notion of Krylov complexity and associated metrics as tools for quantifying operator growth, their bounds by generalized quantum speed limits, the universal operator growth hypothesis, and its relation to quantum chaos, scrambling, and generalized coherent states. A comparison of several generalizations of the Krylov construction for open quantum systems is presented. A closing discussion addresses the application of Krylov subspace methods in quantum field theory, holography, integrability, quantum control, and quantum computing, as well as current open problems.
[ { "version": "v1", "created": "Wed, 15 May 2024 18:00:09 GMT" }, { "version": "v2", "created": "Wed, 5 Jun 2024 17:53:01 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 07:39:48 GMT" } ]
2025-05-16T00:00:00
[ [ "Nandy", "Pratik", "" ], [ "Matsoukas-Roubeas", "Apollonas S.", "" ], [ "Martínez-Azcona", "Pablo", "" ], [ "Dymarsky", "Anatoly", "" ], [ "del Campo", "Adolfo", "" ] ]
2405.10604
Nandan Roy
Chonticha Kritpetch, Nandan Roy and Narayan Banerjee
Interacting dark sector: a dynamical system perspective
19 pages, 8 figures
null
10.1103/PhysRevD.111.103501
null
gr-qc astro-ph.CO
http://creativecommons.org/licenses/by/4.0/
We investigate the interaction between the dark sectors from the point of view of a dynamical system analysis. A general setup for interacting dark energy models that incorporates both quintessence and phantom fields through a switch parameter, allowing an interaction in the dark sectors, has been considered. In the first part of our analysis, we have not assumed any specific form of the interaction, and in the second part, we invoked examples in a general framework of the interaction. The potentials of the scalar field are classified into two broad classes of potentials: exponential and non-exponential. We identify the potential late-time attractors of the system, which have a complete dark energy domination. From our analysis, it is evident there could be an interaction between the dark sector. The interaction, if any, weakens over time. We find for the quintessence field the transfer of energy from dark matter to dark energy can flip the direction, and on the contrary, for the phantom field, it is only from dark matter to dark energy.
[ { "version": "v1", "created": "Fri, 17 May 2024 07:59:11 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 05:29:04 GMT" } ]
2025-05-16T00:00:00
[ [ "Kritpetch", "Chonticha", "" ], [ "Roy", "Nandan", "" ], [ "Banerjee", "Narayan", "" ] ]
2405.10769
Zehao Su
Zehao Su, Helene Charlotte Rytgaard, Henrik Ravn, Frank Eriksson
Efficient estimation of the target population average treatment effect from multi-source data
null
null
null
null
stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider estimation of the target population average treatment effect (TATE) when outcome information is unavailable. Instead, we observe the outcome in multiple source populations and wish to combine the treatment effects therein to make inference on the TATE. In contrast to existing works that assume transportability on the conditional distribution of potential outcomes or conditional treatment-specific means, we work under a weaker form of effect transportability. Following the framework for causally interpretable meta-analysis, we assume transportability of conditional average treatment effects across multiple populations, which may hold with fewer standardization variables. Under this assumption, we derive the semiparametric efficiency bound of the TATE and characterize a class of doubly robust and asymptotically linear estimators. Within this class, an efficient estimator assigns optimal weights to observations from different data sources. Additionally, we suggest estimators of a low-dimensional summary of effect heterogeneity in the target population. We illustrate the use of the proposed estimators on a multicentre weight management clinical trial for semaglutide, a glucagon-like peptide-1 receptor agonist, on overweight or obese patients. Using outcome information from other regions, we estimate the weight loss effect of semaglutide in the United States subgroup.
[ { "version": "v1", "created": "Fri, 17 May 2024 13:28:55 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 12:54:41 GMT" } ]
2025-05-16T00:00:00
[ [ "Su", "Zehao", "" ], [ "Rytgaard", "Helene Charlotte", "" ], [ "Ravn", "Henrik", "" ], [ "Eriksson", "Frank", "" ] ]
2405.11247
Udi Aharon
Udi Aharon, Ran Dubin, Amit Dvir and Chen Hajaj
A Classification-by-Retrieval Framework for Few-Shot Anomaly Detection to Detect API Injection Attacks
15 pages, 10 figures, 5 tables
Computers & Security, Volume 140, December 2024, Article 104249
10.1016/j.cose.2024.104249
null
cs.CR
http://creativecommons.org/licenses/by-nc-nd/4.0/
Application Programming Interface (API) Injection attacks refer to the unauthorized or malicious use of APIs, which are often exploited to gain access to sensitive data or manipulate online systems for illicit purposes. Identifying actors that deceitfully utilize an API poses a demanding problem. Although there have been notable advancements and contributions in the field of API security, there remains a significant challenge when dealing with attackers who use novel approaches that don't match the well-known payloads commonly seen in attacks. Also, attackers may exploit standard functionalities unconventionally and with objectives surpassing their intended boundaries. Thus, API security needs to be more sophisticated and dynamic than ever, with advanced computational intelligence methods, such as machine learning models that can quickly identify and respond to abnormal behavior. In response to these challenges, we propose a novel unsupervised few-shot anomaly detection framework composed of two main parts: First, we train a dedicated generic language model for API based on FastText embedding. Next, we use Approximate Nearest Neighbor search in a classification-by-retrieval approach. Our framework allows for training a fast, lightweight classification model using only a few examples of normal API requests. We evaluated the performance of our framework using the CSIC 2010 and ATRDF 2023 datasets. The results demonstrate that our framework improves API attack detection accuracy compared to the state-of-the-art (SOTA) unsupervised anomaly detection baselines.
[ { "version": "v1", "created": "Sat, 18 May 2024 10:15:31 GMT" }, { "version": "v2", "created": "Sun, 15 Sep 2024 15:31:13 GMT" } ]
2025-05-16T00:00:00
[ [ "Aharon", "Udi", "" ], [ "Dubin", "Ran", "" ], [ "Dvir", "Amit", "" ], [ "Hajaj", "Chen", "" ] ]
2405.11258
Udi Aharon
Udi Aharon, Revital Marbel, Ran Dubin, Amit Dvir, and Chen Hajaj
RoBERTa-Augmented Synthesis for Detecting Malicious API Requests
14 pages, 3 figures, 6 tables
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-nd/4.0/
Web applications and APIs face constant threats from malicious actors seeking to exploit vulnerabilities for illicit gains. To defend against these threats, it is essential to have anomaly detection systems that can identify a variety of malicious behaviors. However, a significant challenge in this area is the limited availability of training data. Existing datasets often do not provide sufficient coverage of the diverse API structures, parameter formats, and usage patterns encountered in real-world scenarios. As a result, models trained on these datasets often struggle to generalize and may fail to detect less common or emerging attack vectors. To enhance detection accuracy and robustness, it is crucial to access larger and more representative datasets that capture the true variability of API traffic. To address this, we introduce a GAN-inspired learning framework that extends limited API traffic datasets through targeted, domain-aware synthesis. Drawing on techniques from Natural Language Processing (NLP), our approach leverages Transformer-based architectures, particularly RoBERTa, to enhance the contextual representation of API requests and generate realistic synthetic samples aligned with security-specific semantics. We evaluate our framework on two benchmark datasets, CSIC 2010 and ATRDF 2023, and compare it with a previous data augmentation technique to assess the importance of domain-specific synthesis. In addition, we apply our augmented data to various anomaly detection models to evaluate its impact on classification performance. Our method achieves up to a 4.94% increase in F1 score on CSIC 2010 and up to 21.10% on ATRDF 2023. The source codes of this work are available at https://github.com/ArielCyber/GAN-API.
[ { "version": "v1", "created": "Sat, 18 May 2024 11:10:45 GMT" }, { "version": "v2", "created": "Thu, 8 May 2025 10:28:06 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 12:52:49 GMT" } ]
2025-05-16T00:00:00
[ [ "Aharon", "Udi", "" ], [ "Marbel", "Revital", "" ], [ "Dubin", "Ran", "" ], [ "Dvir", "Amit", "" ], [ "Hajaj", "Chen", "" ] ]
2405.11752
Zihao Wang
Zihao Wang, Zhe Wu
Towards Foundation Model for Chemical Reactor Modeling: Meta-Learning with Physics-Informed Adaptation
Chemical Engineering Research and Design
null
null
null
cs.CE cs.LG
http://creativecommons.org/licenses/by/4.0/
Developing accurate models for chemical reactors is often challenging due to the complexity of reaction kinetics and process dynamics. Traditional approaches require retraining models for each new system, limiting generalizability and efficiency. In this work, we take a step toward foundation models for chemical reactor modeling by introducing a neural network framework that generalizes across diverse reactor types and rapidly adapts to new chemical processes. Our approach leverages meta-learning to pretrain the model on a broad set of reactor dynamics, enabling efficient adaptation to unseen reactions with minimal data. To further enhance generalizability, we incorporate physics-informed fine-tuning, ensuring physically consistent adaptation to new reactor conditions. Our framework is evaluated across three integer-order fundamental reactor types - continuous stirred tank reactors, batch reactors, and plug flow reactors - demonstrating superior few-shot adaptation compared to conventional data-driven, physics-informed, and transfer learning approaches. By combining meta-learning with physics-informed adaptation, this work lays the foundation for a generalizable modeling framework, advancing the development of foundation models for chemical engineering applications. Source code is available at https://github.com/killingbear999/chemical-reactor-foundation-model.
[ { "version": "v1", "created": "Mon, 20 May 2024 03:26:58 GMT" }, { "version": "v2", "created": "Wed, 23 Oct 2024 08:29:20 GMT" }, { "version": "v3", "created": "Thu, 15 May 2025 14:08:49 GMT" } ]
2025-05-16T00:00:00
[ [ "Wang", "Zihao", "" ], [ "Wu", "Zhe", "" ] ]
2405.12961
Sebastian Ibarraran
Shriram Chennakesavalu, Frank Hu, Sebastian Ibarraran, Grant M. Rotskoff
Aligning Transformers with Continuous Feedback via Energy Rank Alignment
null
null
null
null
cs.LG cs.AI physics.chem-ph q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Searching through chemical space is an exceptionally challenging problem because the number of possible molecules grows combinatorially with the number of atoms. Large, autoregressive models trained on databases of chemical compounds have yielded powerful generators, but we still lack robust strategies for generating molecules with desired properties. This molecular search problem closely resembles the "alignment" problem for large language models, though for many chemical tasks we have a specific and easily evaluable reward function. Here, we introduce an algorithm called energy rank alignment (ERA) that leverages an explicit reward function to produce a gradient-based objective that we use to optimize autoregressive policies. We show theoretically that this algorithm is closely related to proximal policy optimization (PPO) and direct preference optimization (DPO), but has a minimizer that converges to an ideal Gibbs-Boltzmann distribution with the reward playing the role of an energy function. Furthermore, this algorithm is highly scalable, does not require reinforcement learning, and performs well relative to DPO when the number of preference observations per pairing is small. We deploy this approach to align molecular transformers and protein language models to generate molecules and protein sequences, respectively, with externally specified properties and find that it does so robustly, searching through diverse parts of chemical space.
[ { "version": "v1", "created": "Tue, 21 May 2024 17:35:20 GMT" }, { "version": "v2", "created": "Wed, 14 May 2025 20:23:34 GMT" } ]
2025-05-16T00:00:00
[ [ "Chennakesavalu", "Shriram", "" ], [ "Hu", "Frank", "" ], [ "Ibarraran", "Sebastian", "" ], [ "Rotskoff", "Grant M.", "" ] ]
2405.14703
Noam Zeilberger
Paul-Andr\'e Melli\`es, Noam Zeilberger
The categorical contours of the Chomsky-Sch\"utzenberger representation theorem
null
null
null
null
math.CT cs.FL cs.LO
http://creativecommons.org/licenses/by/4.0/
We develop fibrational perspectives on context-free grammars and on nondeterministic finite-state automata over categories and operads. A generalized CFG is a functor from a free colored operad (aka multicategory) generated by a pointed finite species into an arbitrary base operad: this encompasses classical CFGs by taking the base to be a certain operad constructed from a free monoid, as an instance of a more general construction of an \emph{operad of spliced arrows} $\mathcal{W}\,\mathcal{C}$ for any category $\mathcal{C}$. A generalized NFA is a functor from an arbitrary bipointed category or pointed operad satisfying the unique lifting of factorizations and finite fiber properties: this encompasses classical word automata and tree automata without $\epsilon$-transitions, but also automata over non-free categories and operads. We show that generalized context-free and regular languages satisfy suitable generalizations of many of the usual closure properties, and in particular we give a simple conceptual proof that context-free languages are closed under intersection with regular languages. Finally, we observe that the splicing functor $\mathcal{W} : Cat \to Oper$ admits a left adjoint $\mathcal{C}: Oper \to Cat$, which we call the \emph{contour category} construction since the arrows of $\mathcal{C}\,\mathcal{O}$ have a geometric interpretation as oriented contours of operations of $\mathcal{O}$. A direct consequence of the contour / splicing adjunction is that every pointed finite species induces a universal CFG generating a language of \emph{tree contour words.} This leads us to a generalization of the Chomsky-Sch\"utzenberger Representation Theorem, establishing that a subset of a homset $L \subseteq \mathcal{C}(A,B)$ is a CFL of arrows if and only if it is a functorial image of the intersection of a $\mathcal{C}$-chromatic tree contour language with a regular language.
[ { "version": "v1", "created": "Fri, 29 Dec 2023 12:09:35 GMT" }, { "version": "v2", "created": "Thu, 14 Nov 2024 15:24:42 GMT" }, { "version": "v3", "created": "Wed, 19 Mar 2025 16:46:11 GMT" }, { "version": "v4", "created": "Thu, 15 May 2025 12:55:28 GMT" } ]
2025-05-16T00:00:00
[ [ "Melliès", "Paul-André", "" ], [ "Zeilberger", "Noam", "" ] ]
2405.14850
Filip \v{Z}ivanovi\'c
Szil\'ard Szab\'o, Filip \v{Z}ivanovi\'c
Floer-theoretic filtration on Painlev\'e Hitchin systems
22 pages, 5 figures, minor corrections, made exposition clearer
null
null
null
math.AG math.SG
http://creativecommons.org/licenses/by/4.0/
We classify equivariant $\mathbb{C}^*$-actions on moduli spaces of Higgs bundles corresponding to the Painlev\'e equations. Using this, we compute the Floer-theoretic filtrations on the cohomology of these spaces, introduced by Ritter and the second author in arXiv:2304.13026. We compare it with the ``$P=W$'' and the filtration obtained by multiplicities of the irreducible components of the nilpotent cone, ultimately deducing that the Floer-theoretic filtration coincides with the multiplicity filtration, for all 2-dimensional Higgs moduli.
[ { "version": "v1", "created": "Thu, 23 May 2024 17:56:47 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 17:40:34 GMT" } ]
2025-05-16T00:00:00
[ [ "Szabó", "Szilárd", "" ], [ "Živanović", "Filip", "" ] ]
2405.15523
Igor Shilov
Igor Shilov, Matthieu Meeus, Yves-Alexandre de Montjoye
The Mosaic Memory of Large Language Models
null
null
null
null
cs.CL cs.LG
http://creativecommons.org/licenses/by/4.0/
As Large Language Models (LLMs) become widely adopted, understanding how they learn from, and memorize, training data becomes crucial. Memorization in LLMs is widely assumed to only occur as a result of sequences being repeated in the training data. Instead, we show that LLMs memorize by assembling information from similar sequences, a phenomena we call mosaic memory. We show major LLMs to exhibit mosaic memory, with fuzzy duplicates contributing to memorization as much as 0.8 of an exact duplicate and even heavily modified sequences contributing substantially to memorization. Despite models display reasoning capabilities, we somewhat surprisingly show memorization to be predominantly syntactic rather than semantic. We finally show fuzzy duplicates to be ubiquitous in real-world data, untouched by deduplication techniques. Taken together, our results challenge widely held beliefs and show memorization to be a more complex, mosaic process, with real-world implications for privacy, confidentiality, model utility and evaluation.
[ { "version": "v1", "created": "Fri, 24 May 2024 13:05:05 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 10:18:58 GMT" } ]
2025-05-16T00:00:00
[ [ "Shilov", "Igor", "" ], [ "Meeus", "Matthieu", "" ], [ "de Montjoye", "Yves-Alexandre", "" ] ]
2405.17067
Dixuan Wang
Dixuan Wang, Yanda Li, Junyuan Jiang, Zepeng Ding, Ziqin Luo, Guochao Jiang, Jiaqing Liang, Deqing Yang
Tokenization Matters! Degrading Large Language Models through Challenging Their Tokenization
null
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large Language Models (LLMs) have shown remarkable capabilities in language understanding and generation. Nonetheless, it was also witnessed that LLMs tend to produce inaccurate responses to specific queries. This deficiency can be traced to the tokenization step LLMs must undergo, which is an inevitable limitation inherent to all LLMs. In fact, incorrect tokenization is the critical point that hinders LLMs in understanding the input precisely, thus leading to unsatisfactory output. This defect is more obvious in Chinese scenarios. To demonstrate this flaw of LLMs, we construct an adversarial dataset, named as $\textbf{ADT (Adversarial Dataset for Tokenizer)}$, which draws upon the vocabularies of various open-source LLMs to challenge LLMs' tokenization. ADT consists of two subsets: the manually constructed ADT-Human and the automatically generated ADT-Auto. Our empirical results reveal that our ADT is highly effective on challenging the tokenization of leading LLMs, including GPT-4o, Llama-3, Deepseek-R1 and so on, thus degrading these LLMs' capabilities. Moreover, our method of automatic data generation has been proven efficient and robust, which can be applied to any open-source LLMs. In this paper, we substantially investigate LLMs' vulnerability in terms of challenging their token segmentation, which will shed light on the subsequent research of improving LLMs' capabilities through optimizing their tokenization process and algorithms.
[ { "version": "v1", "created": "Mon, 27 May 2024 11:39:59 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 15:57:32 GMT" } ]
2025-05-16T00:00:00
[ [ "Wang", "Dixuan", "" ], [ "Li", "Yanda", "" ], [ "Jiang", "Junyuan", "" ], [ "Ding", "Zepeng", "" ], [ "Luo", "Ziqin", "" ], [ "Jiang", "Guochao", "" ], [ "Liang", "Jiaqing", "" ], [ "Yang", "Deqing", "" ] ]
2405.17265
Luca Scrucca
Luca Scrucca
Assessing uncertainty in Gaussian mixtures-based entropy estimation
null
null
null
null
stat.ME
http://creativecommons.org/licenses/by/4.0/
Entropy estimation plays a crucial role in various fields, such as information theory, statistical data science, and machine learning. However, traditional entropy estimation methods often struggle with complex data distributions. Mixture-based estimation of entropy has been recently proposed and gained attention due to its ease of use and accuracy. This paper presents a novel approach to quantify the uncertainty associated with this mixture-based entropy estimation method using weighted likelihood bootstrap. Unlike standard methods, our approach leverages the underlying mixture structure by assigning random weights to observations in a weighted likelihood bootstrap procedure, leading to more accurate uncertainty estimation. The generation of weights is also investigated, leading to the proposal of using weights obtained from a specific Dirichlet distribution which, in conjunction with centered percentile intervals, yields the optimal setting to ensure empirical coverage closer to the nominal level. Extensive simulation studies comparing different resampling strategies are presented and results discussed. The proposed approach is illustrated by analyzing the log-returns of daily Gold prices at COMEX for the years 2014--2022, and the Net Rating scores, an advanced statistic used in basketball analytics, for NBA teams with reference to the 2022/23 regular season.
[ { "version": "v1", "created": "Mon, 27 May 2024 15:23:54 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 08:03:52 GMT" } ]
2025-05-16T00:00:00
[ [ "Scrucca", "Luca", "" ] ]
2405.18418
Nicklas Hansen
Nicklas Hansen, Jyothir S V, Vlad Sobal, Yann LeCun, Xiaolong Wang, Hao Su
Hierarchical World Models as Visual Whole-Body Humanoid Controllers
Code and videos at https://nicklashansen.com/rlpuppeteer
null
null
null
cs.LG cs.CV cs.RO
http://creativecommons.org/licenses/by/4.0/
Whole-body control for humanoids is challenging due to the high-dimensional nature of the problem, coupled with the inherent instability of a bipedal morphology. Learning from visual observations further exacerbates this difficulty. In this work, we explore highly data-driven approaches to visual whole-body humanoid control based on reinforcement learning, without any simplifying assumptions, reward design, or skill primitives. Specifically, we propose a hierarchical world model in which a high-level agent generates commands based on visual observations for a low-level agent to execute, both of which are trained with rewards. Our approach produces highly performant control policies in 8 tasks with a simulated 56-DoF humanoid, while synthesizing motions that are broadly preferred by humans.
[ { "version": "v1", "created": "Tue, 28 May 2024 17:57:23 GMT" }, { "version": "v2", "created": "Fri, 31 May 2024 17:03:00 GMT" }, { "version": "v3", "created": "Wed, 14 May 2025 18:27:05 GMT" } ]
2025-05-16T00:00:00
[ [ "Hansen", "Nicklas", "" ], [ "S", "Jyothir", "V" ], [ "Sobal", "Vlad", "" ], [ "LeCun", "Yann", "" ], [ "Wang", "Xiaolong", "" ], [ "Su", "Hao", "" ] ]
2406.00367
Md. Mostafizer Rahman
Md. Mostafizer Rahman, Ariful Islam Shiplu, Yutaka Watanobe, and Md. Ashad Alam
RoBERTa-BiLSTM: A Context-Aware Hybrid Model for Sentiment Analysis
null
null
null
null
cs.CL cs.AI cs.CE
http://creativecommons.org/licenses/by/4.0/
Effectively analyzing the comments to uncover latent intentions holds immense value in making strategic decisions across various domains. However, several challenges hinder the process of sentiment analysis including the lexical diversity exhibited in comments, the presence of long dependencies within the text, encountering unknown symbols and words, and dealing with imbalanced datasets. Moreover, existing sentiment analysis tasks mostly leveraged sequential models to encode the long dependent texts and it requires longer execution time as it processes the text sequentially. In contrast, the Transformer requires less execution time due to its parallel processing nature. In this work, we introduce a novel hybrid deep learning model, RoBERTa-BiLSTM, which combines the Robustly Optimized BERT Pretraining Approach (RoBERTa) with Bidirectional Long Short-Term Memory (BiLSTM) networks. RoBERTa is utilized to generate meaningful word embedding vectors, while BiLSTM effectively captures the contextual semantics of long-dependent texts. The RoBERTa-BiLSTM hybrid model leverages the strengths of both sequential and Transformer models to enhance performance in sentiment analysis. We conducted experiments using datasets from IMDb, Twitter US Airline, and Sentiment140 to evaluate the proposed model against existing state-of-the-art methods. Our experimental findings demonstrate that the RoBERTa-BiLSTM model surpasses baseline models (e.g., BERT, RoBERTa-base, RoBERTa-GRU, and RoBERTa-LSTM), achieving accuracies of 80.74%, 92.36%, and 82.25% on the Twitter US Airline, IMDb, and Sentiment140 datasets, respectively. Additionally, the model achieves F1-scores of 80.73%, 92.35%, and 82.25% on the same datasets, respectively.
[ { "version": "v1", "created": "Sat, 1 Jun 2024 08:59:46 GMT" }, { "version": "v2", "created": "Thu, 15 May 2025 01:38:21 GMT" } ]
2025-05-16T00:00:00
[ [ "Rahman", "Md. Mostafizer", "" ], [ "Shiplu", "Ariful Islam", "" ], [ "Watanobe", "Yutaka", "" ], [ "Alam", "Md. Ashad", "" ] ]