id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 3
62.8k
| title
stringlengths 1
382
| comments
stringlengths 1
1.15k
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 7
153
⌀ | report-no
stringlengths 1
509
⌀ | categories
stringlengths 5
125
| license
stringclasses 9
values | abstract
stringlengths 6
6.09k
| versions
listlengths 1
187
| update_date
timestamp[s]date 2007-05-23 00:00:00
2025-04-25 00:00:00
| authors_parsed
sequencelengths 1
2.83k
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2504.11662 | Pedro Rito PhD | Marcos Mendes, Gon\c{c}alo Perna, Pedro Rito, Duarte Raposo, Susana
Sargento | Real-time Object and Event Detection Service through Computer Vision and
Edge Computing | 30th ITS World Congress, Dubai, UAE, 16-20 September 2024 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | The World Health Organization suggests that road traffic crashes cost
approximately 518 billion dollars globally each year, which accounts for 3% of
the gross domestic product for most countries. Most fatal road accidents in
urban areas involve Vulnerable Road Users (VRUs). Smart cities environments
present innovative approaches to combat accidents involving cutting-edge
technologies, that include advanced sensors, extensive datasets, Machine
Learning (ML) models, communication systems, and edge computing. This paper
proposes a strategy and an implementation of a system for road monitoring and
safety for smart cities, based on Computer Vision (CV) and edge computing.
Promising results were obtained by implementing vision algorithms and tracking
using surveillance cameras, that are part of a Smart City testbed, the Aveiro
Tech City Living Lab (ATCLL). The algorithm accurately detects and tracks cars,
pedestrians, and bicycles, while predicting the road state, the distance
between moving objects, and inferring on collision events to prevent
collisions, in near real-time.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 23:11:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Mendes",
"Marcos",
""
],
[
"Perna",
"Gonçalo",
""
],
[
"Rito",
"Pedro",
""
],
[
"Raposo",
"Duarte",
""
],
[
"Sargento",
"Susana",
""
]
] |
2504.11663 | Brenner Rego | Brenner S. Rego and Guilherme V. Raffo and Marco H. Terra and Joseph
K. Scott | Reachability Analysis of Nonlinear Discrete-Time Systems Using
Polyhedral Relaxations and Constrained Zonotopes | 6 pages, 2 figures. This is a preprint of the paper presented at the
63rd IEEE Conference on Decision and Control (CDC 2024). arXiv admin note:
text overlap with arXiv:2504.00130 | null | 10.1109/CDC56724.2024.10886592 | null | eess.SY cs.SY math.OC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This paper presents a novel algorithm for reachability analysis of nonlinear
discrete-time systems. The proposed method combines constrained zonotopes (CZs)
with polyhedral relaxations of factorable representations of nonlinear
functions to propagate CZs through nonlinear functions, which is normally done
using conservative linearization techniques. The new propagation method
provides better approximations than those resulting from linearization
procedures, leading to significant improvements in the computation of reachable
sets in comparison to other CZ methods from the literature. Numerical examples
highlight the advantages of the proposed algorithm.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 23:19:36 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Rego",
"Brenner S.",
""
],
[
"Raffo",
"Guilherme V.",
""
],
[
"Terra",
"Marco H.",
""
],
[
"Scott",
"Joseph K.",
""
]
] |
2504.11665 | Ryan Greenough | Ryan Greenough, Kohei Murakami, Jan Kleissl, and Adil Khurram | Optimal SVI-Weighted PSPS Decisions with Decision-Dependent Outage
Uncertainty | 10 pages, 7 figures, and 3 tables | null | null | null | eess.SY cs.SY math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Public Safety Power Shutoffs (PSPS) are a pre-emptive strategy to mitigate
the wildfires caused by power system malfunction. System operators implement
PSPS to balance wildfire mitigation efforts through de-energization of
transmission lines against the risk of widespread blackouts modeled with load
shedding.
Existing approaches do not incorporate decision-dependent wildfire-driven
failure probabilities, as modeling outage scenario probabilities requires
incorporating high-order polynomial terms in the objective. This paper uses
distribution shaping to develop an efficient MILP problem representation of the
distributionally robust PSPS problem. Building upon the author's prior work,
the wildfire risk of operating a transmission line is a function of the
probability of a wildfire-driven outage and its subsequent expected impact in
acres burned.
A day-ahead unit commitment and line de-energization PSPS framework is used
to assess the trade-off between total cost and wildfire risk at different
levels of distributional robustness, parameterized by a level of distributional
dissimilarity $\kappa$. We perform simulations on the IEEE RTS 24-bus test
system.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 23:31:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Greenough",
"Ryan",
""
],
[
"Murakami",
"Kohei",
""
],
[
"Kleissl",
"Jan",
""
],
[
"Khurram",
"Adil",
""
]
] |
2504.11666 | Tomokazu Kashio | Yoshinosuke Hirakawa, Tomokazu Kashio, Ryutaro Sekigawa, Naoaki
Takada, Shuji Yamamoto | A note on the second supplementary law of rational power residue symbols | 17 pages | null | null | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As a natural generalization of the Legendre symbol, the $q$-th power residue
symbol $(a/p)_q$ is defined for primes $p$ and $q$ with $p\equiv 1 \bmod q$. In
this paper, we generalize the second supplementary law by providing an explicit
condition for $(q/p)_q = 1$, when $p$ has a special form $p = \sum_{i=0}^{q-1}
m^i n^{q-1-i}$. This condition is expressed in terms of the polylogarithm
$\mathrm{Li}_{1-q}(x)$ of negative index. Our proof relies on an argument
similar to Lemmermeyer's proof of Euler's conjectures for cubic residue.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 23:32:33 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Hirakawa",
"Yoshinosuke",
""
],
[
"Kashio",
"Tomokazu",
""
],
[
"Sekigawa",
"Ryutaro",
""
],
[
"Takada",
"Naoaki",
""
],
[
"Yamamoto",
"Shuji",
""
]
] |
2504.11667 | Cemil Vahapoglu | Cemil Vahapoglu and Timothy J. O'Shea and Wan Liu and Tamoghna Roy and
Sennur Ulukus | Transformer-Driven Neural Beamforming with Imperfect CSI in Urban Macro
Wireless Channels | null | null | null | null | cs.IT cs.LG eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The literature is abundant with methodologies focusing on using transformer
architectures due to their prominence in wireless signal processing and their
capability to capture long-range dependencies via attention mechanisms. In
particular, depthwise separable convolutions enhance parameter efficiency for
the process of high-dimensional data characteristics of MIMO systems. In this
work, we introduce a novel unsupervised deep learning framework that integrates
depthwise separable convolutions and transformers to generate beamforming
weights under imperfect channel state information (CSI) for a multi-user
single-input multiple-output (MU-SIMO) system in dense urban environments. The
primary goal is to enhance throughput by maximizing sum-rate while ensuring
reliable communication. Spectral efficiency and block error rate (BLER) are
considered as performance metrics. Experiments are carried out under various
conditions to compare the performance of the proposed NNBF framework against
baseline methods zero-forcing beamforming (ZFBF) and minimum mean square error
(MMSE) beamforming. Experimental results demonstrate the superiority of the
proposed framework over the baseline techniques.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 23:41:24 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Vahapoglu",
"Cemil",
""
],
[
"O'Shea",
"Timothy J.",
""
],
[
"Liu",
"Wan",
""
],
[
"Roy",
"Tamoghna",
""
],
[
"Ulukus",
"Sennur",
""
]
] |
2504.11668 | David Moss | David J. Moss | Integrated photonics incorporating 2D materials for practical
applications | 66 pages, 9 figures, 367 references | Applied Physics Letters Photonics Volume 10, (2025) | 10.1063/5.0249703 | null | physics.optics physics.app-ph | http://creativecommons.org/licenses/by/4.0/ | On-chip integration of 2D materials with exceptional optical properties
provides an attractive solution for next-generation photonic integrated
circuits to address the limitations of conventional bulk integrated platforms.
Over the past two decades, significant advancements have been made in the
interdisciplinary field of 2D material integrated photonics, greatly narrowing
the gap between laboratory research and industrial applications. In this paper,
we provide a perspective on the developments of this field towards industrial
manufacturing and commercialization. First, we review recent progress towards
commercialization. Next, we provide an overview of cutting-edge fabrication
techniques, which are categorized into large-scale integration, precise
patterning, dynamic tuning, and device packaging. Both the advantages and
limitations of these techniques are discussed in relation to industrial
manufacturing. Finally, we highlight some important issues related to
commercialization, including fabrication standards, recycling, service life,
and environmental implications.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 23:41:58 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Moss",
"David J.",
""
]
] |
2504.11669 | Amirhossein Dadashzadeh | Amirhossein Dadashzadeh, Parsa Esmati, Majid Mirmehdi | Co-STAR: Collaborative Curriculum Self-Training with Adaptive
Regularization for Source-Free Video Domain Adaptation | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent advances in Source-Free Unsupervised Video Domain Adaptation (SFUVDA)
leverage vision-language models to enhance pseudo-label generation. However,
challenges such as noisy pseudo-labels and over-confident predictions limit
their effectiveness in adapting well across domains. We propose Co-STAR, a
novel framework that integrates curriculum learning with collaborative
self-training between a source-trained teacher and a contrastive
vision-language model (CLIP). Our curriculum learning approach employs a
reliability-based weight function that measures bidirectional prediction
alignment between the teacher and CLIP, balancing between confident and
uncertain predictions. This function preserves uncertainty for difficult
samples, while prioritizing reliable pseudo-labels when the predictions from
both models closely align. To further improve adaptation, we propose Adaptive
Curriculum Regularization, which modifies the learning priority of samples in a
probabilistic, adaptive manner based on their confidence scores and prediction
stability, mitigating overfitting to noisy and over-confident samples.
Extensive experiments across multiple video domain adaptation benchmarks
demonstrate that Co-STAR consistently outperforms state-of-the-art SFUVDA
methods. Code is available at: https://github.com/Plrbear/Co-Star
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 23:47:35 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Dadashzadeh",
"Amirhossein",
""
],
[
"Esmati",
"Parsa",
""
],
[
"Mirmehdi",
"Majid",
""
]
] |
2504.11670 | Sijie Cheng | Sijie Cheng and Narayanan Rengaswamy | Adaptive Error Correction for Entanglement Distillation | null | null | null | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum network applications impose a variety of requirements on entanglement
resources in terms of rate, fidelity, latency, and more. The repeaters in the
quantum network must combine good methods for entanglement generation,
effective entanglement distillation, and smart routing protocols to satisfy
these application requirements. In this work, we focus on quantum error
correction-based entanglement distillation in a linear chain of quantum
repeaters. While conventional approaches reuse the same distillation scheme
over multiple hop lengths after entanglement swaps, we propose a novel adaptive
error correction scheme that boosts end-to-end metrics. Specifically, depending
on the network operation point, we adapt the code used in distillation over
successive rounds to monotonically increase the rate while also improving
fidelity. We demonstrate the effectiveness of this strategy using three codes:
[[9,1,3]], [[9,2,3]], [[9,3,3]]. We compare the performance of four different
protocols that combine the codes in different ways, where we define a new
performance metric, efficiency, that incorporates both overall rate and
fidelity. While we highlight our innovation under minimal assumptions on noise,
the method can be easily generalized to realistic network settings. By
combining our approach with good entanglement generation methods and smart
routing protocols, we can achieve application requirements in a systematic,
resource-efficient, way.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 23:52:25 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Cheng",
"Sijie",
""
],
[
"Rengaswamy",
"Narayanan",
""
]
] |
2504.11671 | Ji Ma | Ji Ma | Steering Prosocial AI Agents: Computational Basis of LLM's Decision
Making in Social Simulation | null | null | null | null | cs.AI cs.CY cs.LG econ.GN q-fin.EC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Large language models (LLMs) increasingly serve as human-like decision-making
agents in social science and applied settings. These LLM-agents are typically
assigned human-like characters and placed in real-life contexts. However, how
these characters and contexts shape an LLM's behavior remains underexplored.
This study proposes and tests methods for probing, quantifying, and modifying
an LLM's internal representations in a Dictator Game -- a classic behavioral
experiment on fairness and prosocial behavior. We extract ``vectors of variable
variations'' (e.g., ``male'' to ``female'') from the LLM's internal state.
Manipulating these vectors during the model's inference can substantially alter
how those variables relate to the model's decision-making. This approach offers
a principled way to study and regulate how social concepts can be encoded and
engineered within transformer-based models, with implications for alignment,
debiasing, and designing AI agents for social simulations in both academic and
commercial applications.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:02:28 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ma",
"Ji",
""
]
] |
2504.11672 | Shaaban M. Shaaban | M. Lazar, R.A. L\'opez, S.M. Shaaban, S.Poedts, H. Fichtner | Extended scenarios for solar radio emissions with downshifted electron
beam plasma excitations | Submitted for publications at JGR: Space Physics | null | null | null | astro-ph.SR astro-ph.HE physics.plasm-ph physics.space-ph | http://creativecommons.org/licenses/by/4.0/ | First-principle studies of radiative processes aimed at explaining the origin
of type II and type III solar radio bursts raise questions on the implications
of downshifted electron beam plasma excitations with frequency (slightly) below
the plasma frequency ($\omega\lesssim\omega_{pe}$) in the generation of radio
emissions. Unlike the beam-induced Langmuir waves ($\omega \gtrsim
\omega_{pe}$) in the standard radio emission plasma model, the primary wave
excitations of cooler and/or denser beams have predominantly downshifted
frequencies. Broadbands of such downshifted excitations are also confirmed by
in situ observations in association with terrestrial foreshock and electron
beams (in contrast to narrowband Langmuir waves), but their involvement in
radiative processes has not been examined so far. We revisit three radiative
scenarios specific to downshifted primary excitations, and the results
demonstrate their direct or indirect involvement in plasma radio emission.
Downshifted excitations of an electron beam primarily play an indirect role,
contributing to the relaxation to a plateau-on-tail still able to induce
Langmuir beam waves that satisfy conditions for nonlinear wave-wave
interactions leading to free radio waves. At longer time scales, the primary
excitations can become predominantly downshifted, and then directly couple with
the secondary (backscattered) Langmuir waves to generate the second harmonic of
radio emissions. Two counterbeams are more efficient and lead to faster
radiative mechanisms, involving counterpropagating downshifted excitations,
which couple to each other and generate intense, broadband and isotropic radio
spectra of downshifted second harmonics. Such a long-lasting (second) radio
harmonic can thus be invoked to distinguish regimes with downshifted ($\omega
\gtrsim \omega_{pe}$) primary excitations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:09:40 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Lazar",
"M.",
""
],
[
"López",
"R. A.",
""
],
[
"Shaaban",
"S. M.",
""
],
[
"Poedts",
"S.",
""
],
[
"Fichtner",
"H.",
""
]
] |
2504.11673 | Suhong Moon | Minwoo Kang, Suhong Moon, Seung Hyeong Lee, Ayush Raj, Joseph Suh,
David M. Chan | Higher-Order Binding of Language Model Virtual Personas: a Study on
Approximating Political Partisan Misperceptions | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Large language models (LLMs) are increasingly capable of simulating human
behavior, offering cost-effective ways to estimate user responses during the
early phases of survey design. While previous studies have examined whether
models can reflect individual opinions or attitudes, we argue that a
\emph{higher-order} binding of virtual personas requires successfully
approximating not only the opinions of a user as an identified member of a
group, but also the nuanced ways in which that user perceives and evaluates
those outside the group. In particular, faithfully simulating how humans
perceive different social groups is critical for applying LLMs to various
political science studies, including timely topics on polarization dynamics,
inter-group conflict, and democratic backsliding. To this end, we propose a
novel methodology for constructing virtual personas with synthetic user
``backstories" generated as extended, multi-turn interview transcripts. Our
generated backstories are longer, rich in detail, and consistent in
authentically describing a singular individual, compared to previous methods.
We show that virtual personas conditioned on our backstories closely replicate
human response distributions (up to an 87\% improvement as measured by
Wasserstein Distance) and produce effect sizes that closely match those
observed in the original studies. Altogether, our work extends the
applicability of LLMs beyond estimating individual self-opinions, enabling
their use in a broader range of human studies.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:10:34 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Kang",
"Minwoo",
""
],
[
"Moon",
"Suhong",
""
],
[
"Lee",
"Seung Hyeong",
""
],
[
"Raj",
"Ayush",
""
],
[
"Suh",
"Joseph",
""
],
[
"Chan",
"David M.",
""
]
] |
2504.11674 | Sicong Pan | Sicong Pan, Liren Jin, Xuying Huang, Cyrill Stachniss, Marija
Popovi\'c and Maren Bennewitz | DM-OSVP++: One-Shot View Planning Using 3D Diffusion Models for Active
RGB-Based Object Reconstruction | null | null | null | null | cs.RO cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Active object reconstruction is crucial for many robotic applications. A key
aspect in these scenarios is generating object-specific view configurations to
obtain informative measurements for reconstruction. One-shot view planning
enables efficient data collection by predicting all views at once, eliminating
the need for time-consuming online replanning. Our primary insight is to
leverage the generative power of 3D diffusion models as valuable prior
information. By conditioning on initial multi-view images, we exploit the
priors from the 3D diffusion model to generate an approximate object model,
serving as the foundation for our view planning. Our novel approach integrates
the geometric and textural distributions of the object model into the view
planning process, generating views that focus on the complex parts of the
object to be reconstructed. We validate the proposed active object
reconstruction system through both simulation and real-world experiments,
demonstrating the effectiveness of using 3D diffusion priors for one-shot view
planning.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:14:52 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Pan",
"Sicong",
""
],
[
"Jin",
"Liren",
""
],
[
"Huang",
"Xuying",
""
],
[
"Stachniss",
"Cyrill",
""
],
[
"Popović",
"Marija",
""
],
[
"Bennewitz",
"Maren",
""
]
] |
2504.11675 | Lwin Khin Shar Dr | Biniam Fisseha Demissie and Yan Naing Tun and Lwin Khin Shar and
Mariano Ceccato | VLM-Fuzz: Vision Language Model Assisted Recursive Depth-first Search
Exploration for Effective UI Testing of Android Apps | null | null | null | null | cs.SE | http://creativecommons.org/licenses/by/4.0/ | Testing Android apps effectively requires a systematic exploration of the
app's possible states by simulating user interactions and system events. While
existing approaches have proposed several fuzzing techniques to generate
various text inputs and trigger user and system events for UI state
exploration, achieving high code coverage remains a significant challenge in
Android app testing. The main challenges are (1) reasoning about the complex
and dynamic layout of UI screens; (2) generating required inputs/events to deal
with certain widgets like pop-ups; and (3) coordination between current test
inputs and previous inputs to avoid getting stuck in the same UI screen without
improving test coverage. To address these problems, we propose a novel,
automated fuzzing approach called VLM-Fuzz for effective UI testing of Android
apps. We present a novel heuristic-based depth-first search (DFS) exploration
algorithm, assisted with a vision language model (VLM), to effectively explore
the UI states of the app. We use static analysis to analyze the Android
Manifest file and the runtime UI hierarchy XML to extract the list of
components, intent-filters and interactive UI widgets. VLM is used to reason
about complex UI layout and widgets on an on-demand basis. Based on the inputs
from static analysis, VLM, and the current UI state, we use some heuristics to
deal with the above-mentioned challenges. We evaluated VLM-Fuzz based on a
benchmark containing 59 apps obtained from a recent work and compared it
against two state-of-the-art approaches: APE and DeepGUI. VLM-Fuzz outperforms
the best baseline by 9.0%, 3.7%, and 2.1% in terms of class coverage, method
coverage, and line coverage, respectively. We also ran VLM-Fuzz on 80 recent
Google Play apps (i.e., updated in 2024). VLM-Fuzz detected 208 unique crashes
in 24 apps, which have been reported to respective developers.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:19:31 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Demissie",
"Biniam Fisseha",
""
],
[
"Tun",
"Yan Naing",
""
],
[
"Shar",
"Lwin Khin",
""
],
[
"Ceccato",
"Mariano",
""
]
] |
2504.11677 | Matthew Gillespie | Matthew Gillespie | An Ideal Correspondence Result for Crossed Products by Quantum Groups | 34 pages | null | null | null | math.OA | http://creativecommons.org/licenses/by/4.0/ | Given a weak Kac system with duality $(\mathcal{H},V,U)$ arising from regular
$\mathrm{C}^{*}$-algebraic locally compact quantum group
$(\mathcal{G},\Delta)$, a $\mathrm{C}^{*}$-algebra $A$, and a sufficiently
well-behaved coaction $\alpha$, we construct natural lattice isomorphisms from
the coaction invariant ideals of $A$ to the dual coaction invariant ideals of
full and reduced crossed products associated to $(\mathcal{H},V,U)$. In
particular, these lattice isomorphisms are determined by either the maximality
or normality of the coaction $\alpha$. This result directly generalizes the
main theorem of Gillespie, Kaliszewski, Quigg, and Williams in
arXiv:2406.06780, which in turn generalized an older ideal correspondence
result of Gootman and Lazar for locally compact amenable groups. Throughout, we
also develop basic conventions and motivate through elementary examples how
crossed product $\mathrm{C}^{*}$-algebras by quantum groups generalize the
classical crossed product theory.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:27:25 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gillespie",
"Matthew",
""
]
] |
2504.11678 | Roberta Pascazio | Roberta Pascazio (1 and 2), Qian Chen (1,2 and 3), Haoming Howard Li
(1 and 2), Aaron D. Kaplan (2), Kristin A. Persson (1 and 2) ((1) University
of California, Berkeley, (2) Lawrence Berkeley National Laboratory (3),
Toyota Research Institute of North America) | Towards High-Voltage Cathodes for Zinc-Ion Batteries: Discovery Pipeline
and Material Design Rules | null | null | null | null | cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Efficient energy storage systems are crucial to address the intermittency of
renewable energy sources. As multivalent batteries, Zn-ion batteries (ZIBs),
while inherently low voltage, offer a promising low cost alternative to Li-ion
batteries due to viable use of zinc as the anode. However, to maximize the
potential impact of ZIBs, rechargable cathodes with improved Zn diffusion are
needed. To better understand the chemical and structural factors influencing
Zn-ion mobility within battery electrode materials, we employ a high-throughput
computational screening approach to systematically evaluate candidate
intercalation hosts for ZIB cathodes, expanding the chemical search space on
empty intercalation hosts that do not contain Zn. We leverage a high-throughput
screening funnel to identify promising cathodes in ZIBs, integrating screening
criteria with DFT-based calculations of Zn$^{2+}$ intercalation and diffusion
inside the host materials. Using this data, we identify the design principles
that favor Zn-ion mobility in candidate cathode materials. Building on previous
work on divalent ion cathodes, this study broadens the chemical space for
next-generation multivalent energy storage systems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:28:04 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Pascazio",
"Roberta",
"",
"1 and 2"
],
[
"Chen",
"Qian",
"",
"1,2 and 3"
],
[
"Li",
"Haoming Howard",
"",
"1 and 2"
],
[
"Kaplan",
"Aaron D.",
"",
"1 and 2"
],
[
"Persson",
"Kristin A.",
"",
"1 and 2"
]
] |
2504.11679 | Jagat Kafle | Jagat Kafle, James Y-K. Cho, Quentin Changeat | Radiative Flux from a High-Resolution Atmospheric Dynamics Simulation of
a Hot-Jupiter for JWST and Ariel | null | null | null | null | astro-ph.EP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present medium-wave ($\sim$0.5~$\mu$m to $\sim$13~$\mu$m) radiative flux
distributions and spectra derived from high-resolution atmospheric dynamics
simulations of an exoplanet \WASPP. This planet serves to illustrate several
important features. Assuming different chemical compositions for its atmosphere
(e.g., H$_2$/He only and $Z \in \{1, 12\}$ times solar metallicity), the
outgoing radiative flux is computed using full radiative transfer that folds in
the James Webb Space Telescope (JWST) and Ariel instrument characteristics. We
find that the observed variability depends strongly on the the assumed
chemistry and the instrument wavelength range, hence the probed altitude of the
atmosphere. With H$_2$/He only, the flux and variability originate near the
10$^5$~Pa level; with solar and higher metallicity, $\sim$10$^3$~Pa level is
probed, and the variability is distinguishably reduced. Our calculations show
that JWST and Ariel have the sensitivity to capture the atmospheric variability
of exoplanets like \WASPP, depending on the metallicity -- both in repeated
eclipse and phase-curve observations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:33:26 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Kafle",
"Jagat",
""
],
[
"Cho",
"James Y-K.",
""
],
[
"Changeat",
"Quentin",
""
]
] |
2504.11680 | Jiguang Sun | Bo Gong, Takumi Sato, Jiguang Sun, Xinming Wu | FEM-DtN-SIM Method for Computing Resonances of Schr\"{o}dinger Operators | null | null | null | null | math.NA cs.NA | http://creativecommons.org/licenses/by/4.0/ | The study of resonances of the Schr\"{o}dinger operator has a long-standing
tradition in mathematical physics. Extensive theoretical investigations have
explored the proximity of resonances to the real axis, their distribution, and
bounds on the counting functions. However, computational results beyond one
dimension remain scarce due to the nonlinearity of the problem and the
unbounded nature of the domain. We propose a novel approach that integrates
finite elements, Dirichlet-to-Neumann (DtN) mapping, and the spectral indicator
method. The DtN mapping, imposed on the boundary of a truncated computational
domain, enforces the outgoing condition. Finite elements allow for the
efficient handling of complicated potential functions. The spectral indicator
method effectively computes (complex) eigenvalues of the resulting nonlinear
algebraic system without introducing spectral pollution. The viability of this
approach is demonstrated through a range of numerical examples.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:34:11 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gong",
"Bo",
""
],
[
"Sato",
"Takumi",
""
],
[
"Sun",
"Jiguang",
""
],
[
"Wu",
"Xinming",
""
]
] |
2504.11681 | Shixun Wu | Shixun Wu, Yujia Zhai, Huangliang Dai, Hairui Zhao, Yue Zhu, Haiyang
Hu, and Zizhong Chen | TurboFNO: High-Performance Fourier Neural Operator with Fused
FFT-GEMM-iFFT on GPU | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fourier Neural Operators (FNO) are widely used for learning partial
differential equation solution operators. However, FNO lacks architecture-aware
optimizations,with its Fourier layers executing FFT, filtering, GEMM, zero
padding, and iFFT as separate stages, incurring multiple kernel launches and
significant global memory traffic. We propose TurboFNO, the first fully fused
FFT-GEMM-iFFT GPU kernel with built-in FFT optimizations. We first develop FFT
and GEMM kernels from scratch, achieving performance comparable to or faster
than the closed-source SOTA cuBLAS and cuFFT. Additionally, our FFT kernel
integrates a built-in high-frequency truncation, input zero-padding, and
pruning feature to avoid additional memory copy kernels. To fuse the FFT and
GEMM workloads, we propose an FFT variant in which a single thread block
iterates over the hidden dimension, aligning with the $k$-loop in GEMM.
Additionally, we design two shared memory swizzling patterns to achieve 100\%
memory bank utilization when forwarding FFT output to GEMM and enabling the
iFFT to retrieve GEMM results directly from shared memory.Experimental result
on an NVIDIA A100 GPU shows TurboFNO outperforms PyTorch, cuBLAS, and cuFFT by
up to 150\%.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:41:18 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wu",
"Shixun",
""
],
[
"Zhai",
"Yujia",
""
],
[
"Dai",
"Huangliang",
""
],
[
"Zhao",
"Hairui",
""
],
[
"Zhu",
"Yue",
""
],
[
"Hu",
"Haiyang",
""
],
[
"Chen",
"Zizhong",
""
]
] |
2504.11682 | Rikuto Oiwa | Rikuto Oiwa and Hiroaki Kusunose | Predominant Electronic Order Parameter for Structural Chirality -- Role
of Spinless Electronic Toroidal Multipoles | null | null | null | null | cond-mat.mtrl-sci | http://creativecommons.org/licenses/by/4.0/ | We discuss predominant order parameters for structural chirality, and
demonstrate that time-reversal-even axial-quadrupole plays a key role in
stabilizing a chiral structure. Using the symmetry-adapted closest Wannier
model of the trigonal Te and Se, we quantify the evolution of the
spin-independent (spinless) and spin-dependent (spinful) electric toroidal (ET)
(axial) multipole moments across the transition from an achiral to a chiral
structure. Our results clearly identify that a spin-independent off-diagonal
real hopping between $p$ orbitals, which corresponds to the bond-cluster
spinless ET quadrupole of $(3z^{2}-r^{2})$ type $G_{u}$, is the predominant
order parameter in stabilizing helical structures. We further elucidate that
the above itinerant spinless ET quadrupole induces a monopole-like orbital
angular momentum texture in the momentum space, which can be observed via
circular-dichroism in soft x-ray photoemission spectroscopy measurement. Our
findings highlight a critical role of the orbital angular momentum in chiral
materials rather than less dominant spin angular momentum arising from the
relativistic spin-orbit coupling.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:42:03 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Oiwa",
"Rikuto",
""
],
[
"Kusunose",
"Hiroaki",
""
]
] |
2504.11683 | Prasenjit Das | Sayantan Mondal and Prasenjit Das | Velocity Distribution and Diffusion of an Athermal Inertial
Run-and-Tumble Particle in a Shear-Thinning Medium | 20 Pages, 7 Figures, Accepted to Physics of Fluids | null | null | null | cond-mat.stat-mech cond-mat.soft | http://creativecommons.org/publicdomain/zero/1.0/ | We study the dynamics of an athermal inertial active particle moving in a
shear-thinning medium in $d=1$. The viscosity of the medium is modeled using a
Coulomb-tanh function, while the activity is represented by an asymmetric
dichotomous noise with strengths $-\Delta$ and $\mu\Delta$, transitioning
between these states at a rate $\lambda$. Starting from the Fokker-Planck~(FP)
equation for the time-dependent probability distributions $P(v,-\Delta,t)$ and
$P(v,\mu\Delta,t)$ of the particle's velocity $v$ at time $t$, moving under the
influence of active forces $-\Delta$ and $\mu\Delta$ respectively, we
analytically derive the steady-state velocity distribution function $P_s(v)$,
explicitly dependent on $\mu$. Also, we obtain a quadrature expression for the
effective diffusion coefficient $D_e$ for the symmetric active force
case~($\mu=1$). For a given $\Delta$ and $\mu$, we show that $P_s(v)$ exhibits
multiple transitions as $\lambda$ is varied. Subsequently, we numerically
compute $P_s(v)$, the mean-squared velocity $\langle v^2\rangle(t)$, and the
diffusion coefficient $D_e$ by solving the particle's equation of motion, all
of which show excellent agreement with the analytical results in the
steady-state. Finally, we examine the universal nature of the transitions in
$P_s(v)$ by considering an alternative functional form of medium's viscosity
that also capture the shear-thinning behavior.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:52:27 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Mondal",
"Sayantan",
""
],
[
"Das",
"Prasenjit",
""
]
] |
2504.11684 | Martin R. Bridson | Martin R. Bridson | Chasing finite shadows of infinite groups through geometry | 30 pages, 4 figures. To appear in the Proceedings of 9ECM, the
European Congress of Mathematics in Sevilla, 2024 | null | null | null | math.GR math.GT | http://creativecommons.org/licenses/by/4.0/ | There are many situations in geometry and group theory where it is natural,
convenient or necessary to explore infinite groups via their actions on finite
objects, i.e. via the finite quotients of the group. But how much understanding
can one really gain about an infinite group by examining its finite images?
Which properties of the group can one recognise, and when does the set of
finite images determine the group completely? How hard is it to decide what the
finite images of a given infinite group are?
These notes follow my plenary lecture at the ECM in Sevilla, July 2024. The
goal of the lecture was to sketch some of the rich history of the preceding
problems and to present results that illustrate how the field surrounding these
questions has been transformed in recent years by input from low-dimensional
topology and the study of non-positively curved spaces.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:01:05 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Bridson",
"Martin R.",
""
]
] |
2504.11685 | Pooja Siwach | Ashutosh Singh, Pooja Siwach, P. Arumugam | Quantum simulations of nuclear resonances with variational methods | 15 pages, 13 figures | null | null | LLNL-JRNL-2004830-DRAFT | quant-ph nucl-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The many-body nature of nuclear physics problems poses significant
computational challenges. These challenges become even more pronounced when
studying the resonance states of nuclear systems, which are governed by the
non-Hermitian Hamiltonian. Quantum computing, particularly for quantum
many-body systems, offers a promising alternative, especially within the
constraints of current noisy intermediate-scale quantum (NISQ) devices. This
work aims to simulate nuclear resonances using quantum algorithms by developing
a variational framework compatible with non-Hermitian Hamiltonians and
implementing it fully on a quantum simulator. We employ the complex scaling
technique to extract resonance positions classically and adapt it for quantum
simulations using a two-step algorithm. First, we transform the non-Hermitian
Hamiltonian into a Hermitian form by using the energy variance as a cost
function within a variational framework. Second, we perform theta-trajectory
calculations to determine optimal resonance positions in the complex energy
plane. To address resource constraints on NISQ devices, we utilize Gray Code
(GC) encoding to reduce qubit requirements. We first validate our approach
using a schematic potential model that mimics a nuclear potential, successfully
reproducing known resonance energies with high fidelity. We then extend the
method to a more realistic alpha-alpha nuclear potential and compute the
resonance energies with a basis size of 16, using only four qubits. This study
demonstrates, for the first time, that the complete theta-trajectory method can
be implemented on a quantum computer without relying on any classical input
beyond the Hamiltonian. The results establish a scalable and efficient quantum
framework for simulating resonance phenomena in nuclear systems. This work
represents a significant step toward quantum simulations of open quantum
systems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:01:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Singh",
"Ashutosh",
""
],
[
"Siwach",
"Pooja",
""
],
[
"Arumugam",
"P.",
""
]
] |
2504.11686 | Yiran He | Yiran He, Yun Cao, Bowen Yang, Zeyu Zhang | Can GPT tell us why these images are synthesized? Empowering Multimodal
Large Language Models for Forensics | 12 pages, 11 figures, 13IHMMSec2025 | null | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rapid development of generative AI facilitates content creation and makes
image manipulation easier and more difficult to detect. While multimodal Large
Language Models (LLMs) have encoded rich world knowledge, they are not
inherently tailored for combating AI-generated Content (AIGC) and struggle to
comprehend local forgery details. In this work, we investigate the application
of multimodal LLMs in forgery detection. We propose a framework capable of
evaluating image authenticity, localizing tampered regions, providing evidence,
and tracing generation methods based on semantic tampering clues. Our method
demonstrates that the potential of LLMs in forgery analysis can be effectively
unlocked through meticulous prompt engineering and the application of few-shot
learning techniques. We conduct qualitative and quantitative experiments and
show that GPT4V can achieve an accuracy of 92.1% in Autosplice and 86.3% in
LaMa, which is competitive with state-of-the-art AIGC detection methods. We
further discuss the limitations of multimodal LLMs in such tasks and propose
potential improvements.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:02:46 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"He",
"Yiran",
""
],
[
"Cao",
"Yun",
""
],
[
"Yang",
"Bowen",
""
],
[
"Zhang",
"Zeyu",
""
]
] |
2504.11687 | Christian Aganze | Christian Aganze, Vedant Chandra, Risa H. Wechsler, Ting S. Li, Sergey
E. Koposov, Leandro Beraldo Silva, Andreia Carrillo, Alexander H. Riley,
Monica Valluri, Oleg Y. Gnedin, Mairead Heiger, Constance Rockosi, Raymond
Carlberg, Amanda Bystr\"om, Namitha Kizhuprakkat, Mika Lambert, Bokyoung Kim,
Gustavo Medina Toledo, Carlos Allende Prieto, Jessica Nicole Aguilar, Steven
Ahlen, Davide Bianchi, David Brooks, Todd T. Claybaugh, Andrew P. Cooper,
Axel de la Macorra, Arjun Dey, Peter Doel, Jaime E. Forero-Romero, Enrique
Gazta\~naga, Satya A. Gontcho, Gaston Gutierrez, Mustapha Ishak, Theodore
Kisner, Anthony Kremin, Ofer Lahav, Martin Landriau, Laurent Le Guillou,
Aaron Meisner, Ramon Miquel, Nathalie Palanque-Delabrouille, Francisco Prada,
Ignasi P\'erez-R\`afols, Graziano Rossi, Eusebio Sanchez, Michael Schubnell,
David Sprayberry, Gregory Tarl\'e, Benjamin A. Weaver, Hu Zou | The Cocytos Stream: A Disrupted Globular Cluster from our Last Major
Merger? | To be submitted to ApJ, comments welcome | null | null | null | astro-ph.GA astro-ph.SR | http://creativecommons.org/licenses/by/4.0/ | The census of stellar streams and dwarf galaxies in the Milky Way provides
direct constraints on galaxy formation models and the nature of dark matter.
The DESI Milky Way survey (with a footprint of 14,000$~deg{^2}$ and a depth of
$r<19$ mag) delivers the largest sample of distant metal-poor stars compared to
previous optical fiber-fed spectroscopic surveys. This makes DESI an ideal
survey to search for previously undetected streams and dwarf galaxies. We
present a detailed characterization of the Cocytos stream, which was
re-discovered using a clustering analysis with a catalog of giants in the DESI
year 3 data, supplemented with Magellan/MagE spectroscopy. Our analysis reveals
a relatively metal-rich ([Fe/H]$=-1.3$) and thick stream (width$=1.5^\circ$) at
a heliocentric distance of $\approx 25$ kpc, with an internal velocity
dispersion of 6.5-9 km s$^{-1}$. The stream's metallicity, radial orbit, and
proximity to the Virgo stellar overdensities suggest that it is most likely a
disrupted globular cluster that came in with the Gaia-Enceladus merger. We also
confirm its association with the Pyxis globular cluster. Our result showcases
the ability of wide-field spectroscopic surveys to kinematically discover faint
disrupted dwarfs and clusters, enabling constraints on the dark matter
distribution in the Milky Way.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:05:10 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Aganze",
"Christian",
""
],
[
"Chandra",
"Vedant",
""
],
[
"Wechsler",
"Risa H.",
""
],
[
"Li",
"Ting S.",
""
],
[
"Koposov",
"Sergey E.",
""
],
[
"Silva",
"Leandro Beraldo",
""
],
[
"Carrillo",
"Andreia",
""
],
[
"Riley",
"Alexander H.",
""
],
[
"Valluri",
"Monica",
""
],
[
"Gnedin",
"Oleg Y.",
""
],
[
"Heiger",
"Mairead",
""
],
[
"Rockosi",
"Constance",
""
],
[
"Carlberg",
"Raymond",
""
],
[
"Byström",
"Amanda",
""
],
[
"Kizhuprakkat",
"Namitha",
""
],
[
"Lambert",
"Mika",
""
],
[
"Kim",
"Bokyoung",
""
],
[
"Toledo",
"Gustavo Medina",
""
],
[
"Prieto",
"Carlos Allende",
""
],
[
"Aguilar",
"Jessica Nicole",
""
],
[
"Ahlen",
"Steven",
""
],
[
"Bianchi",
"Davide",
""
],
[
"Brooks",
"David",
""
],
[
"Claybaugh",
"Todd T.",
""
],
[
"Cooper",
"Andrew P.",
""
],
[
"de la Macorra",
"Axel",
""
],
[
"Dey",
"Arjun",
""
],
[
"Doel",
"Peter",
""
],
[
"Forero-Romero",
"Jaime E.",
""
],
[
"Gaztañaga",
"Enrique",
""
],
[
"Gontcho",
"Satya A.",
""
],
[
"Gutierrez",
"Gaston",
""
],
[
"Ishak",
"Mustapha",
""
],
[
"Kisner",
"Theodore",
""
],
[
"Kremin",
"Anthony",
""
],
[
"Lahav",
"Ofer",
""
],
[
"Landriau",
"Martin",
""
],
[
"Guillou",
"Laurent Le",
""
],
[
"Meisner",
"Aaron",
""
],
[
"Miquel",
"Ramon",
""
],
[
"Palanque-Delabrouille",
"Nathalie",
""
],
[
"Prada",
"Francisco",
""
],
[
"Pérez-Ràfols",
"Ignasi",
""
],
[
"Rossi",
"Graziano",
""
],
[
"Sanchez",
"Eusebio",
""
],
[
"Schubnell",
"Michael",
""
],
[
"Sprayberry",
"David",
""
],
[
"Tarlé",
"Gregory",
""
],
[
"Weaver",
"Benjamin A.",
""
],
[
"Zou",
"Hu",
""
]
] |
2504.11688 | Tarik Dzanic | Tarik Dzanic, Tzanio Kolev, and Ketan Mittal | A method for bounding high-order finite element functions: Applications
to mesh validity and bounds-preserving limiters | null | null | null | null | math.NA cs.NA physics.flu-dyn | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We introduce a novel method for bounding high-order multi-dimensional
polynomials in finite element approximations. The method involves precomputing
optimal piecewise-linear bounding boxes for polynomial basis functions, which
can then be used to locally bound any combination of these basis functions.
This approach can be applied to any element/basis type at any approximation
order, can provide local (i.e., subcell) extremum bounds to a desired level of
accuracy, and can be evaluated efficiently on-the-fly in simulations.
Furthermore, we show that this approach generally yields more accurate bounds
in comparison to traditional methods based on convex hull properties (e.g.,
Bernstein polynomials). The efficacy of this technique is shown in applications
such as mesh validity checks and optimization for high-order curved meshes,
where positivity of the element Jacobian determinant can be ensured throughout
the entire element, and continuously bounds-preserving limiters for hyperbolic
systems, which can enforce maximum principle bounds across the entire solution
polynomial.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:06:48 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Dzanic",
"Tarik",
""
],
[
"Kolev",
"Tzanio",
""
],
[
"Mittal",
"Ketan",
""
]
] |
2504.11689 | Pooja Siwach | Nifeeya Singh, Pooja Siwach, P. Arumugam | Advancing quantum simulations of nuclear shell model with
noise-resilient protocols | 21 pages | null | null | LLNL-JRNL-2004731-DRAFT | quant-ph nucl-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Some of the computational limitations in solving the nuclear many-body
problem could be overcome by utilizing quantum computers. The nuclear
shell-model calculations providing deeper insights into the properties of
atomic nuclei, is one such case with high demand for resources as the size of
the Hilbert space grows exponentially with the number of particles involved.
Quantum algorithms are being developed to overcome these challenges and advance
such calculations. To develop quantum circuits for the nuclear shell-model,
leveraging the capabilities of noisy intermediate-scale quantum (NISQ) devices.
We aim to minimize resource requirements (specifically in terms of qubits and
gates) and strive to reduce the impact of noise by employing relevant
mitigation techniques. We achieve noise resilience by designing an optimized
ansatz for the variational quantum eigensolver (VQE) based on Givens rotations
and incorporating qubit-ADAPT-VQE in combination with variational quantum
deflation (VQD) to compute ground and excited states incorporating the
zero-noise extrapolation mitigation technique. Furthermore, the qubit
requirements are significantly reduced by mapping the basis states to qubits
using Gray code encoding and generalizing transformations of fermionic
operators to efficiently represent manybody states. By employing the
noise-resilient protocols, we achieve the ground and excited state energy
levels of 38Ar and 6Li with better accuracy. These energy levels are presented
for noiseless simulations, noisy conditions, and after applying noise
mitigation techniques. Results are compared for Jordan Wigner and Gray code
encoding using VQE, qubit-ADAPT-VQE, and VQD. Our work highlights the potential
of noise-resilient protocols to leverage the full potential of NISQ devices in
scaling the nuclear shell model calculations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:13:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Singh",
"Nifeeya",
""
],
[
"Siwach",
"Pooja",
""
],
[
"Arumugam",
"P.",
""
]
] |
2504.11690 | Nuren Shuchi | Nuren Z. Shuchi, Tyler J. Adams, Naz F. Tumpa, Dustin Louisos, Glenn
D. Boreman, Michael G. Walter, Tino Hofmann | Infrared Imaging of Photochromic Contrast in Thiazolothiazole-Embedded
Polymer Films | 7 pages, 3 figures | null | null | null | physics.optics cond-mat.mtrl-sci cond-mat.soft | http://creativecommons.org/licenses/by/4.0/ | The increasing demand for optical technologies with dynamic spectral control
has driven interest in chromogenic materials, particularly for applications in
tunable infrared metasurfaces. Phase-change materials such as vanadium dioxide
and germanium-antimony-tellurium, for instance, have been widely used in the
infrared regime. However, their reliance on thermal and electrical tuning
introduces challenges such as high power consumption, limited emissivity
tuning, and slow modulation speeds. Photochromic materials may offer an
alternative approach to dynamic infrared metasurfaces, potentially overcoming
these limitations through rapid, light-induced changes in optical properties.
This manuscript explores the potential of thiazolothiazole-embedded polymers,
known for their reversible photochromic transitions and strong infrared
absorption changes, for tunable infrared metasurfaces. The material exhibits
low absorption and a strong photochromic contrast in the spectral range from
1500 cm-1 to 1700 cm-1, making it suitable for dynamic infrared light control.
This manuscript reports on infrared imaging experiments demonstrating
photochromic contrast in thiazolothiazole-embedded polymer and thereby provides
compelling evidence for their potential applications for dynamic infrared
metasurfaces.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:16:43 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shuchi",
"Nuren Z.",
""
],
[
"Adams",
"Tyler J.",
""
],
[
"Tumpa",
"Naz F.",
""
],
[
"Louisos",
"Dustin",
""
],
[
"Boreman",
"Glenn D.",
""
],
[
"Walter",
"Michael G.",
""
],
[
"Hofmann",
"Tino",
""
]
] |
2504.11691 | Guanghua Chi | Guanghua Chi, Guy J. Abel, Drew Johnston, Eugenia Giraudy, Mike Bailey | Measuring Global Migration Flows using Online Data | null | null | null | null | cs.CY stat.AP | http://creativecommons.org/licenses/by/4.0/ | Existing estimates of human migration are limited in their scope,
reliability, and timeliness, prompting the United Nations and the Global
Compact on Migration to call for improved data collection. Using privacy
protected records from three billion Facebook users, we estimate
country-to-country migration flows at monthly granularity for 181 countries,
accounting for selection into Facebook usage. Our estimates closely match
high-quality measures of migration where available but can be produced nearly
worldwide and with less delay than alternative methods. We estimate that 39.1
million people migrated internationally in 2022 (0.63% of the population of the
countries in our sample). Migration flows significantly changed during the
COVID-19 pandemic, decreasing by 64% before rebounding in 2022 to a pace 24%
above the pre-crisis rate. We also find that migration from Ukraine increased
tenfold in the wake of the Russian invasion. To support research and policy
interventions, we will release these estimates publicly through the
Humanitarian Data Exchange.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:19:26 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chi",
"Guanghua",
""
],
[
"Abel",
"Guy J.",
""
],
[
"Johnston",
"Drew",
""
],
[
"Giraudy",
"Eugenia",
""
],
[
"Bailey",
"Mike",
""
]
] |
2504.11692 | Jie Chen | Jie Chen, Xianbin Wang, and Dusit Niyato | Beyond ISAC: Toward Integrated Heterogeneous Service Provisioning via
Elastic Multi-Dimensional Multiple Access | null | null | null | null | cs.IT eess.SP math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Integrated heterogeneous service provisioning (IHSP) is a promising paradigm
that is designed to concurrently support a variety of heterogeneous services,
extending beyond sensing and communication to meet the diverse needs of
emerging applications. However, a primary challenge of IHSP is addressing the
conflicts between multiple competing service demands under constrained
resources. In this paper, we overcome this challenge by the joint use of two
novel elastic design strategies: compromised service value assessment and
flexible multi-dimensional resource multiplexing. Consequently, we propose a
value-prioritized elastic multi-dimensional multiple access (MDMA) mechanism
for IHSP systems. First, we modify the Value-of-Service (VoS) metric by
incorporating elastic parameters to characterize user-specific tolerance and
compromise in response to various performance degradations under constrained
resources. This VoS metric serves as the foundation for prioritizing services
and enabling effective fairness service scheduling among concurrent competing
demands. Next, we adapt the MDMA to elastically multiplex services using
appropriate multiple access schemes across different resource domains. This
protocol leverages user-specific interference tolerances and cancellation
capabilities across different domains to reduce resource-demanding conflicts
and co-channel interference within the same domain. Then, we maximize the
system's VoS by jointly optimizing MDMA design and power allocation. Since this
problem is non-convex, we propose a monotonic optimization-assisted dynamic
programming (MODP) algorithm to obtain its optimal solution. Additionally, we
develop the VoS-prioritized successive convex approximation (SCA) algorithm to
efficiently find its suboptimal solution. Finally, simulations are presented to
validate the effectiveness of the proposed designs.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:21:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chen",
"Jie",
""
],
[
"Wang",
"Xianbin",
""
],
[
"Niyato",
"Dusit",
""
]
] |
2504.11693 | Zhenjing Liu | Zhenjing Liu, Qian Mao, Varun Kamboj, Rishabh Kothari, Paul Miller,
Kate Reidy, Adri C. T. van Duin, R. Jaramillo, Frances M. Ross | Epitaxial formation of ultrathin HfO2 on graphene by sequential
oxidation | null | null | null | null | cond-mat.mtrl-sci cond-mat.mes-hall | http://creativecommons.org/licenses/by/4.0/ | We demonstrate the formation of epitaxial, ultrathin hafnia (HfO2) on
graphene. Monoclinic hafnia (m-HfO2) forms as the end of a series of sequential
oxidation reactions. Starting from Hf metal grown epitaxially on graphene,
oxidation leads first to an amorphous suboxide (a-HfOx), then to a crystalline,
hexagonal suboxide (h-HfOx) in epitaxial relationship with the substrate, and
finally to m-HfO2 that is also epitaxial. We use scanning transmission electron
microscopy to characterize the epitaxial relationships and to investigate the
structure of h-HfOx. We propose a series of displacive transformations that
relate the different crystalline phases and are consistent with the observed
epitaxial relationships with the graphene substrate. ReaxFF based reactive
molecular dynamics simulations confirm our model of the oxide phase sequencing,
and illustrate the role of graphene in promoting oxide crystallization. Our
results suggest a way to achieve heteroepitaxial integration of
high-performance, crystalline dielectrics with two dimensional (2D)
semiconductors with an atomically sharp interface, which is also relevant to
hafnia phase engineering.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:24:48 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Liu",
"Zhenjing",
""
],
[
"Mao",
"Qian",
""
],
[
"Kamboj",
"Varun",
""
],
[
"Kothari",
"Rishabh",
""
],
[
"Miller",
"Paul",
""
],
[
"Reidy",
"Kate",
""
],
[
"van Duin",
"Adri C. T.",
""
],
[
"Jaramillo",
"R.",
""
],
[
"Ross",
"Frances M.",
""
]
] |
2504.11694 | Aziz Burak G\"ulen | Aziz Burak G\"ulen, Facundo M\'emoli, Amit Patel | $\ell^p$-Stability of Weighted Persistence Diagrams | null | null | null | null | math.AT | http://creativecommons.org/publicdomain/zero/1.0/ | We introduce the concept of weighted persistence diagrams and develop a
functorial pipeline for constructing them from finite metric measure spaces.
This builds upon an existing functorial framework for generating classical
persistence diagrams from finite pseudo-metric spaces. To quantify differences
between weighted persistence diagrams, we define the $p$-edit distance for
$p\in [1,\infty]$, and-focusing on the weighted Vietoris-Rips filtration-we
establish that these diagrams are stable with respect to the
$p$-Gromov-Wasserstein distance as a direct consequence of functoriality. In
addition, we present an Optimal Transport-inspired formulation of the $p$-edit
distance, enhancing its conceptual clarity. Finally, we explore the
discriminative power of weighted persistence diagrams, demonstrating advantages
over their unweighted counterparts.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:34:29 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gülen",
"Aziz Burak",
""
],
[
"Mémoli",
"Facundo",
""
],
[
"Patel",
"Amit",
""
]
] |
2504.11695 | Huangyuan Su | Isabel Papadimitriou, Huangyuan Su, Thomas Fel, Naomi Saphra, Sham
Kakade, Stephanie Gil | Interpreting the Linear Structure of Vision-language Model Embedding
Spaces | null | null | null | null | cs.CV cs.MM | http://creativecommons.org/licenses/by/4.0/ | Vision-language models encode images and text in a joint space, minimizing
the distance between corresponding image and text pairs. How are language and
images organized in this joint space, and how do the models encode meaning and
modality? To investigate this, we train and release sparse autoencoders (SAEs)
on the embedding spaces of four vision-language models (CLIP, SigLIP, SigLIP2,
and AIMv2). SAEs approximate model embeddings as sparse linear combinations of
learned directions, or "concepts". We find that, compared to other methods of
linear feature learning, SAEs are better at reconstructing the real embeddings,
while also able to retain the most sparsity. Retraining SAEs with different
seeds or different data diet leads to two findings: the rare, specific concepts
captured by the SAEs are liable to change drastically, but we also show that
the key commonly-activating concepts extracted by SAEs are remarkably stable
across runs. Interestingly, while most concepts are strongly unimodal in
activation, we find they are not merely encoding modality per se. Many lie
close to - but not entirely within - the subspace defining modality, suggesting
that they encode cross-modal semantics despite their unimodal usage. To
quantify this bridging behavior, we introduce the Bridge Score, a metric that
identifies concept pairs which are both co-activated across aligned image-text
inputs and geometrically aligned in the shared space. This reveals that even
unimodal concepts can collaborate to support cross-modal integration. We
release interactive demos of the SAEs for all models, allowing researchers to
explore the organization of the concept spaces. Overall, our findings uncover a
sparse linear structure within VLM embedding spaces that is shaped by modality,
yet stitched together through latent bridges-offering new insight into how
multimodal meaning is constructed.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:40:06 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Papadimitriou",
"Isabel",
""
],
[
"Su",
"Huangyuan",
""
],
[
"Fel",
"Thomas",
""
],
[
"Saphra",
"Naomi",
""
],
[
"Kakade",
"Sham",
""
],
[
"Gil",
"Stephanie",
""
]
] |
2504.11696 | Kuiyuan Ding | Kuiyuan Ding, Caili Guo, Yang Yang, Wuxia Hu and Yonina C. Eldar | A New Paradigm of User-Centric Wireless Communication Driven by Large
Language Models | 8 pages, 5 figures | null | null | null | cs.NI cs.IR cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The next generation of wireless communications seeks to deeply integrate
artificial intelligence (AI) with user-centric communication networks, with the
goal of developing AI-native networks that more accurately address user
requirements. The rapid development of large language models (LLMs) offers
significant potential in realizing these goals. However, existing efforts that
leverage LLMs for wireless communication often overlook the considerable gap
between human natural language and the intricacies of real-world communication
systems, thus failing to fully exploit the capabilities of LLMs. To address
this gap, we propose a novel LLM-driven paradigm for wireless communication
that innovatively incorporates the nature language to structured query language
(NL2SQL) tool. Specifically, in this paradigm, user personal requirements is
the primary focus. Upon receiving a user request, LLMs first analyze the user
intent in terms of relevant communication metrics and system parameters.
Subsequently, a structured query language (SQL) statement is generated to
retrieve the specific parameter values from a high-performance real-time
database. We further utilize LLMs to formulate and solve an optimization
problem based on the user request and the retrieved parameters. The solution to
this optimization problem then drives adjustments in the communication system
to fulfill the user's requirements. To validate the feasibility of the proposed
paradigm, we present a prototype system. In this prototype, we consider
user-request centric semantic communication (URC-SC) system in which a dynamic
semantic representation network at the physical layer adapts its encoding depth
to meet user requirements. Additionally, two LLMs are employed to analyze user
requests and generate SQL statements, respectively. Simulation results
demonstrate the effectiveness.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:43:36 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ding",
"Kuiyuan",
""
],
[
"Guo",
"Caili",
""
],
[
"Yang",
"Yang",
""
],
[
"Hu",
"Wuxia",
""
],
[
"Eldar",
"Yonina C.",
""
]
] |
2504.11697 | Shunlin Huang | Shunlin Huang, Peng Wang, Yilin Xu, Jun Liu, and Ruxin Li | Fractional spatiotemporal optical vortices | null | null | null | null | physics.optics quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spatiotemporal optical vortices (STOVs) with spiral phase in the space-time
domain, which carry intrinsic transverse orbital angular momentum (OAM),
introduce a new degree of freedom to light beams and exhibit unique properties.
While integer and fractional spatial vortices have been extensively studied and
widely applied, and research on integer STOVs have grown prosperously,
fractional STOVs (FSTOVs), classified as STOVs with fractional spiral phases
are rarely explored due to the challenges in characterizing rapidly varying
spatiotemporal phases. Furthermore, approaches for the rapid recognition of
FSTOVs are lacking. Herein, we experimentally and theoretically demonstrate the
generation of FSTOVs in the far field. The generation, evolution, and
diffraction rules of FSTOVs are revealed. Furthermore, a self-referential
method for the rapid recognition of FSTOVs based on the energy ratio between
the two end lobes of their diffraction patterns is proposed. This work will
promote the development of the theory of light with transverse OAM, and open
new opportunities for the applications of STOV, such as STOV-based optical
communication and quantum information.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:47:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Huang",
"Shunlin",
""
],
[
"Wang",
"Peng",
""
],
[
"Xu",
"Yilin",
""
],
[
"Liu",
"Jun",
""
],
[
"Li",
"Ruxin",
""
]
] |
2504.11698 | Xingwu Ji | Xingwu Ji, Haochen Niu, Dexin Duan, Rendong Ying, Fei Wen, Peilin Liu | An Online Adaptation Method for Robust Depth Estimation and Visual
Odometry in the Open World | 11 pages, 14 figures | null | null | null | cs.RO cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, learning-based robotic navigation systems have gained extensive
research attention and made significant progress. However, the diversity of
open-world scenarios poses a major challenge for the generalization of such
systems to practical scenarios. Specifically, learned systems for scene
measurement and state estimation tend to degrade when the application scenarios
deviate from the training data, resulting to unreliable depth and pose
estimation. Toward addressing this problem, this work aims to develop a visual
odometry system that can fast adapt to diverse novel environments in an online
manner. To this end, we construct a self-supervised online adaptation framework
for monocular visual odometry aided by an online-updated depth estimation
module. Firstly, we design a monocular depth estimation network with
lightweight refiner modules, which enables efficient online adaptation. Then,
we construct an objective for self-supervised learning of the depth estimation
module based on the output of the visual odometry system and the contextual
semantic information of the scene. Specifically, a sparse depth densification
module and a dynamic consistency enhancement module are proposed to leverage
camera poses and contextual semantics to generate pseudo-depths and valid masks
for the online adaptation. Finally, we demonstrate the robustness and
generalization capability of the proposed method in comparison with
state-of-the-art learning-based approaches on urban, in-house datasets and a
robot platform. Code is publicly available at:
https://github.com/jixingwu/SOL-SLAM.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:48:10 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ji",
"Xingwu",
""
],
[
"Niu",
"Haochen",
""
],
[
"Duan",
"Dexin",
""
],
[
"Ying",
"Rendong",
""
],
[
"Wen",
"Fei",
""
],
[
"Liu",
"Peilin",
""
]
] |
2504.11699 | Rui Xue | Rui Xue, Tianfu Wu | H$^3$GNNs: Harmonizing Heterophily and Homophily in GNNs via Joint
Structural Node Encoding and Self-Supervised Learning | null | null | null | null | cs.LG cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph Neural Networks (GNNs) struggle to balance heterophily and homophily in
representation learning, a challenge further amplified in self-supervised
settings. We propose H$^3$GNNs, an end-to-end self-supervised learning
framework that harmonizes both structural properties through two key
innovations: (i) Joint Structural Node Encoding. We embed nodes into a unified
space combining linear and non-linear feature projections with K-hop structural
representations via a Weighted Graph Convolution Network(WGCN). A
cross-attention mechanism enhances awareness and adaptability to heterophily
and homophily. (ii) Self-Supervised Learning Using Teacher-Student Predictive
Architectures with Node-Difficulty Driven Dynamic Masking Strategies. We use a
teacher-student model, the student sees the masked input graph and predicts
node features inferred by the teacher that sees the full input graph in the
joint encoding space. To enhance learning difficulty, we introduce two novel
node-predictive-difficulty-based masking strategies. Experiments on seven
benchmarks (four heterophily datasets and three homophily datasets) confirm the
effectiveness and efficiency of H$^3$GNNs across diverse graph types. Our
H$^3$GNNs achieves overall state-of-the-art performance on the four heterophily
datasets, while retaining on-par performance to previous state-of-the-art
methods on the three homophily datasets.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:51:25 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Xue",
"Rui",
""
],
[
"Wu",
"Tianfu",
""
]
] |
2504.11700 | Xiao-Dong Cao | Xiao-Dong Cao and Chao-Jiang Xu and Yan Xu | The Gevrey Gelfand-Shilov regularizing effect of the Landau equation
with soft potential | 26 pages | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the Cauchy problem for the spatially inhomogeneous Landau
equation with soft potential in the perturbative framework around the
Maxwellian distribution. Under a smallness assumption on the initial datum with
exponential decay in the velocity variable, we establish the optimal Gevrey
Gelfand-Shilov regularizing effect for the solution to the Cauchy problem.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:53:13 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Cao",
"Xiao-Dong",
""
],
[
"Xu",
"Chao-Jiang",
""
],
[
"Xu",
"Yan",
""
]
] |
2504.11701 | Yaohui Fang | Yaohui Fang and Xingce Wang | Non-uniform Point Cloud Upsampling via Local Manifold Distribution | null | null | null | null | cs.CV math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing learning-based point cloud upsampling methods often overlook the
intrinsic data distribution charac?teristics of point clouds, leading to
suboptimal results when handling sparse and non-uniform point clouds. We
propose a novel approach to point cloud upsampling by imposing constraints from
the perspective of manifold distributions. Leveraging the strong fitting
capability of Gaussian functions, our method employs a network to iteratively
optimize Gaussian components and their weights, accurately representing local
manifolds. By utilizing the probabilistic distribution properties of Gaussian
functions, we construct a unified statistical manifold to impose distribution
constraints on the point cloud. Experimental results on multiple datasets
demonstrate that our method generates higher-quality and more uniformly
distributed dense point clouds when processing sparse and non-uniform inputs,
outperforming state-of-the-art point cloud upsampling techniques.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:54:33 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Fang",
"Yaohui",
""
],
[
"Wang",
"Xingce",
""
]
] |
2504.11702 | Dorottya Zelenyanszki | Dorottya Zelenyanszki, Zhe Hou, Kamanashis Biswas, Vallipuram
Muthukkumarasamy | Clustering and analysis of user behaviour in blockchain: A case study of
Planet IX | 15 pages, 8 figures, submitted to Blockchain: Research and
Applications | null | null | null | cs.LG cs.CR | http://creativecommons.org/licenses/by/4.0/ | Decentralised applications (dApps) that run on public blockchains have the
benefit of trustworthiness and transparency as every activity that happens on
the blockchain can be publicly traced through the transaction data. However,
this introduces a potential privacy problem as this data can be tracked and
analysed, which can reveal user-behaviour information. A user behaviour
analysis pipeline was proposed to present how this type of information can be
extracted and analysed to identify separate behavioural clusters that can
describe how users behave in the game. The pipeline starts with the collection
of transaction data, involving smart contracts, that is collected from a
blockchain-based game called Planet IX. Both the raw transaction information
and the transaction events are considered in the data collection. From this
data, separate game actions can be formed and those are leveraged to present
how and when the users conducted their in-game activities in the form of user
flows. An extended version of these user flows also presents how the
Non-Fungible Tokens (NFTs) are being leveraged in the user actions. The latter
is given as input for a Graph Neural Network (GNN) model to provide graph
embeddings for these flows which then can be leveraged by clustering algorithms
to cluster user behaviours into separate behavioural clusters. We benchmark and
compare well-known clustering algorithms as a part of the proposed method. The
user behaviour clusters were analysed and visualised in a graph format. It was
found that behavioural information can be extracted regarding the users that
belong to these clusters. Such information can be exploited by malicious users
to their advantage. To demonstrate this, a privacy threat model was also
presented based on the results that correspond to multiple potentially affected
areas.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:57:33 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zelenyanszki",
"Dorottya",
""
],
[
"Hou",
"Zhe",
""
],
[
"Biswas",
"Kamanashis",
""
],
[
"Muthukkumarasamy",
"Vallipuram",
""
]
] |
2504.11703 | Tianneng Shi | Tianneng Shi, Jingxuan He, Zhun Wang, Linyu Wu, Hongwei Li, Wenbo Guo,
Dawn Song | Progent: Programmable Privilege Control for LLM Agents | null | null | null | null | cs.CR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | LLM agents are an emerging form of AI systems where large language models
(LLMs) serve as the central component, utilizing a diverse set of tools to
complete user-assigned tasks. Despite their great potential, LLM agents pose
significant security risks. When interacting with the external world, they may
encounter malicious commands from attackers, leading to the execution of
dangerous actions. A promising way to address this is by enforcing the
principle of least privilege: allowing only essential actions for task
completion while blocking unnecessary ones. However, achieving this is
challenging, as it requires covering diverse agent scenarios while preserving
both security and utility.
We introduce Progent, the first privilege control mechanism for LLM agents.
At its core is a domain-specific language for flexibly expressing privilege
control policies applied during agent execution. These policies provide
fine-grained constraints over tool calls, deciding when tool calls are
permissible and specifying fallbacks if they are not. This enables agent
developers and users to craft suitable policies for their specific use cases
and enforce them deterministically to guarantee security. Thanks to its modular
design, integrating Progent does not alter agent internals and requires only
minimal changes to agent implementation, enhancing its practicality and
potential for widespread adoption. To automate policy writing, we leverage LLMs
to generate policies based on user queries, which are then updated dynamically
for improved security and utility. Our extensive evaluation shows that it
enables strong security while preserving high utility across three distinct
scenarios or benchmarks: AgentDojo, ASB, and AgentPoison. Furthermore, we
perform an in-depth analysis, showcasing the effectiveness of its core
components and the resilience of its automated policy generation against
adaptive attacks.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 01:58:40 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shi",
"Tianneng",
""
],
[
"He",
"Jingxuan",
""
],
[
"Wang",
"Zhun",
""
],
[
"Wu",
"Linyu",
""
],
[
"Li",
"Hongwei",
""
],
[
"Guo",
"Wenbo",
""
],
[
"Song",
"Dawn",
""
]
] |
2504.11704 | Marina Danilevsky | Marina Danilevsky, Kristjan Greenewald, Chulaka Gunasekara, Maeda
Hanafi, Lihong He, Yannis Katsis, Krishnateja Killamsetty, Yatin Nandwani,
Lucian Popa, Dinesh Raghu, Frederick Reiss, Vraj Shah, Khoi-Nguyen Tran,
Huaiyu Zhu, Luis Lastras | A Library of LLM Intrinsics for Retrieval-Augmented Generation | null | null | null | null | cs.AI | http://creativecommons.org/licenses/by/4.0/ | In the developer community for large language models (LLMs), there is not yet
a clean pattern analogous to a software library, to support very large scale
collaboration. Even for the commonplace use case of Retrieval-Augmented
Generation (RAG), it is not currently possible to write a RAG application
against a well-defined set of APIs that are agreed upon by different LLM
providers. Inspired by the idea of compiler intrinsics, we propose some
elements of such a concept through introducing a library of LLM Intrinsics for
RAG. An LLM intrinsic is defined as a capability that can be invoked through a
well-defined API that is reasonably stable and independent of how the LLM
intrinsic itself is implemented. The intrinsics in our library are released as
LoRA adapters on HuggingFace, and through a software interface with clear
structured input/output characteristics on top of vLLM as an inference
platform, accompanied in both places with documentation and code. This article
describes the intended usage, training details, and evaluations for each
intrinsic, as well as compositions of multiple intrinsics.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:02:22 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Danilevsky",
"Marina",
""
],
[
"Greenewald",
"Kristjan",
""
],
[
"Gunasekara",
"Chulaka",
""
],
[
"Hanafi",
"Maeda",
""
],
[
"He",
"Lihong",
""
],
[
"Katsis",
"Yannis",
""
],
[
"Killamsetty",
"Krishnateja",
""
],
[
"Nandwani",
"Yatin",
""
],
[
"Popa",
"Lucian",
""
],
[
"Raghu",
"Dinesh",
""
],
[
"Reiss",
"Frederick",
""
],
[
"Shah",
"Vraj",
""
],
[
"Tran",
"Khoi-Nguyen",
""
],
[
"Zhu",
"Huaiyu",
""
],
[
"Lastras",
"Luis",
""
]
] |
2504.11705 | Adriano D'Alessandro | Adriano D'Alessandro, Ali Mahdavi-Amiri and Ghassan Hamarneh | Learning What NOT to Count | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Few/zero-shot object counting methods reduce the need for extensive
annotations but often struggle to distinguish between fine-grained categories,
especially when multiple similar objects appear in the same scene. To address
this limitation, we propose an annotation-free approach that enables the
seamless integration of new fine-grained categories into existing few/zero-shot
counting models. By leveraging latent generative models, we synthesize
high-quality, category-specific crowded scenes, providing a rich training
source for adapting to new categories without manual labeling. Our approach
introduces an attention prediction network that identifies fine-grained
category boundaries trained using only synthetic pseudo-annotated data. At
inference, these fine-grained attention estimates refine the output of existing
few/zero-shot counting networks. To benchmark our method, we further introduce
the FGTC dataset, a taxonomy-specific fine-grained object counting dataset for
natural images. Our method substantially enhances pre-trained state-of-the-art
models on fine-grained taxon counting tasks, while using only synthetic data.
Code and data to be released upon acceptance.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:05:47 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"D'Alessandro",
"Adriano",
""
],
[
"Mahdavi-Amiri",
"Ali",
""
],
[
"Hamarneh",
"Ghassan",
""
]
] |
2504.11706 | Ralihe R. Villagr\'an | Carlos A. Alfaro, Teresa I. Hoekstra-Mendoza, Juan Pablo Serrano and
Ralihe R. Villagr\'an | The characterization of graphs with two trivial distance ideals | null | null | null | null | math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The distance ideals of graphs are algebraic invariants that generalize the
Smith normal form (SNF) and the spectrum of several distance matrices
associated with a graph. In general, distance ideals are not monotone under
taking induced subgraphs. However, in [7] the characterizations of connected
graphs with one trivial distance ideal over $\mathbb{Z}[X]$ and over
$\mathbb{Q}[X]$ were obtained in terms of induced subgraphs, where $X$ is a set
of variables indexed by the vertices. Later, in [3], the first attempt was made
to characterize the family of connected graphs with at most two trivial
distance ideals over $\mathbb{Z}[X]$. There, it was proven that these graphs
are $\{ \mathcal {F},\textsf{odd-holes}_{7}\}$-free, where
$\textsf{odd-holes}_{7}$ consists of the odd cycles of length at least seven
and $\mathcal{F}$ is a set of sixteen graphs. Here, we give a characterization
of the $\{\mathcal{F},\textsf{odd-holes}_{7}\}$-free graphs and prove that the
$\{\mathcal{F},\textsf{odd-holes}_{7}\}$-free graphs are precisely the graphs
with at most two trivial distance ideals over $\mathbb{Z}[X]$. As byproduct, we
also find that the determinant of the distance matrix of a connected bipartite
graph is even, this suggests that it is possible to extend, to connected
bipartite graphs, the Graham-Pollak-Lov\'asz celebrated formula
$\det(D(T_{n+1}))=(-1)^nn2^{n-1}$, and the Hou-Woo result stating that
$\text{SNF}(D(T_{n+1}))=\textsf{I}_2\oplus 2\textsf{I}_{n-2}\oplus (2n)$, for
any tree $T_{n+1}$ with $n+1$ vertices. Finally, we also give the
characterizations of graphs with at most two trivial distance ideals over
$\mathbb{Q}[X]$, and the graphs with at most two trivial distance univariate
ideals.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:09:44 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Alfaro",
"Carlos A.",
""
],
[
"Hoekstra-Mendoza",
"Teresa I.",
""
],
[
"Serrano",
"Juan Pablo",
""
],
[
"Villagrán",
"Ralihe R.",
""
]
] |
2504.11707 | Muhammad Shahid Muneer | Muhammad Shahid Muneer, Simon S. Woo | Towards Safe Synthetic Image Generation On the Web: A Multimodal Robust
NSFW Defense and Million Scale Dataset | Short Paper The Web Conference | null | 10.1145/3701716.3715526 | null | cs.CV cs.AI | http://creativecommons.org/licenses/by/4.0/ | In the past years, we have witnessed the remarkable success of Text-to-Image
(T2I) models and their widespread use on the web. Extensive research in making
T2I models produce hyper-realistic images has led to new concerns, such as
generating Not-Safe-For-Work (NSFW) web content and polluting the web society.
To help prevent misuse of T2I models and create a safer web environment for
users features like NSFW filters and post-hoc security checks are used in these
models. However, recent work unveiled how these methods can easily fail to
prevent misuse. In particular, adversarial attacks on text and image modalities
can easily outplay defensive measures. %Exploiting such leads to the growing
concern of preventing adversarial attacks on text and image modalities.
Moreover, there is currently no robust multimodal NSFW dataset that includes
both prompt and image pairs and adversarial examples. This work proposes a
million-scale prompt and image dataset generated using open-source diffusion
models. Second, we develop a multimodal defense to distinguish safe and NSFW
text and images, which is robust against adversarial attacks and directly
alleviates current challenges. Our extensive experiments show that our model
performs well against existing SOTA NSFW detection methods in terms of accuracy
and recall, drastically reducing the Attack Success Rate (ASR) in multimodal
adversarial attack scenarios. Code:
https://github.com/shahidmuneer/multimodal-nsfw-defense.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:10:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Muneer",
"Muhammad Shahid",
""
],
[
"Woo",
"Simon S.",
""
]
] |
2504.11709 | Junyong Shin | Junyong Shin, Yongjeong Oh, Jinsung Park, Joohyuk Park, Yo-Seb Jeon | ESC-MVQ: End-to-End Semantic Communication With Multi-Codebook Vector
Quantization | null | null | null | null | eess.SP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a novel end-to-end digital semantic communication
framework based on multi-codebook vector quantization (VQ), referred to as
ESC-MVQ. Unlike prior approaches that rely on end-to-end training with a
specific power or modulation scheme, often under a particular channel
condition, ESC-MVQ models a channel transfer function as parallel binary
symmetric channels (BSCs) with trainable bit-flip probabilities. Building on
this model, ESC-MVQ jointly trains multiple VQ codebooks and their associated
bit-flip probabilities with a single encoder-decoder pair. To maximize
inference performance when deploying ESC-MVQ in digital communication systems,
we devise an optimal communication strategy that jointly optimizes codebook
assignment, adaptive modulation, and power allocation. To this end, we develop
an iterative algorithm that selects the most suitable VQ codebook for semantic
features and flexibly allocates power and modulation schemes across the
transmitted symbols. Simulation results demonstrate that ESC-MVQ, using a
single encoder-decoder pair, outperforms existing digital semantic
communication methods in both performance and memory efficiency, offering a
scalable and adaptive solution for realizing digital semantic communication in
diverse channel conditions.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:12:57 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shin",
"Junyong",
""
],
[
"Oh",
"Yongjeong",
""
],
[
"Park",
"Jinsung",
""
],
[
"Park",
"Joohyuk",
""
],
[
"Jeon",
"Yo-Seb",
""
]
] |
2504.11710 | Michael Barnsley | Michael F. Barnsley and Corey de Wit | Tilings from Tops of Overlapping Iterated Function Systems | null | null | null | null | math.DS | http://creativecommons.org/licenses/by/4.0/ | The top of the attractor $A$ of a hyperbolic iterated function system
$\left\{ f_{i}:\mathbb{R}^{n}\rightarrow\mathbb{R}^{n}|i=1,2,\dots,M\right\} $
is defined and used to extend self-similar tilings to overlapping systems. The
theory interprets expressions of the form
$\lim_{k\rightarrow\infty}f_{j_{1}}^{-1}f_{j_{2}}^{-1}\dots f_{j_{k}}
^{-1}(\left\{ top(f_{i_{1}}f_{i_{2}}\dots f_{i_{k+1}}(A))|i_{1}i_{2}\dots
i_{k+1}\in\{1,2,\dots,M\}^{k+1}\right\} )$ to yield tilings of
$\mathbb{R}^{n}$. Examples include systems of finite type, tilings related to
aperiodic monotiles, and ones where there are infinitely many distinct but
related prototiles.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:16:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Barnsley",
"Michael F.",
""
],
[
"de Wit",
"Corey",
""
]
] |
2504.11712 | Umananda Dev Goswami | Swaraj Pratim Sarmah and Umananda Dev Goswami | Ultra-high energy cosmic rays with UFA-15 source model in Bumblebee
gravity theory | 17 pages, 12 figures | null | null | null | astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | We explore the effects of Bumblebee gravity on the propagation of ultra-high
energy cosmic rays (UHECRs) using astrophysical sources modeled in the
Unger-Farrar-Anchordoqui (UFA) framework (2015), which includes star formation
rate (SFR), gamma-ray bursts (GRBs), and active galactic nuclei (AGN). We
compute the density enhancement factor for various source separation distances
($d_\text{s}$s) up to 100 Mpc within the Bumblebee gravity scenario.
Additionally, we calculate the CRs flux and their suppression, comparing the
results with observational data from the Pierre Auger Observatory (PAO) and the
Telescope Array through $\chi^2$ and $\chi_\text{red}^2$ analysis for the flux
and Levenberg-Marquardt algorithm for suppression. The anisotropy in CRs
arrival directions is examined, with corresponding $\chi^2$ and
$\chi_\text{red}^2$ values obtained from the PAO surface detector data (SD 750
and SD 1500). Finally, we present skymaps of flux and anisotropy under
different model assumptions, providing insights into the observational
signatures of UHECRs in Bumblebee gravity. Our results show that increasing the
Bumblebee gravity parameter $l$ enhances the density factor $\xi$, particularly
at low energies, highlighting Lorentz violation's impact on CRs' propagation.
Larger $d_\text{s}$ values amplify deviations from the $\Lambda$CDM model, with
AGN sources dominating at high energies and GRB/SFR sources at lower energies.
The skymaps indicate the structured flux patterns at large $d_\text{s}$ and
structured anisotropy at higher energies.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:17:30 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Sarmah",
"Swaraj Pratim",
""
],
[
"Goswami",
"Umananda Dev",
""
]
] |
2504.11714 | Karthik Shivashankar | Karthik Shivashankar, Antonio Martini | Unravelling Technical debt topics through Time, Programming Languages
and Repository | null | null | null | null | cs.SE cs.LG | http://creativecommons.org/licenses/by/4.0/ | This study explores the dynamic landscape of Technical Debt (TD) topics in
software engineering by examining its evolution across time, programming
languages, and repositories. Despite the extensive research on identifying and
quantifying TD, there remains a significant gap in understanding the diversity
of TD topics and their temporal development. To address this, we have conducted
an explorative analysis of TD data extracted from GitHub issues spanning from
2015 to September 2023. We employed BERTopic for sophisticated topic modelling.
This study categorises the TD topics and tracks their progression over time.
Furthermore, we have incorporated sentiment analysis for each identified topic,
providing a deeper insight into the perceptions and attitudes associated with
these topics. This offers a more nuanced understanding of the trends and shifts
in TD topics through time, programming language, and repository.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:20:56 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shivashankar",
"Karthik",
""
],
[
"Martini",
"Antonio",
""
]
] |
2504.11715 | Frederic Latremoliere | Carla Farsi and Frederic Latremoliere | Continuity for the spectral propinquity of the Dirac operators
associated with an analytic path of Riemannian metrics | 15 pages | null | null | null | math.OA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that a polynomial path of Riemannian metrics on a closed spin
manifold induces a continuous field in the spectral propinquity of metric
spectral triples.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:34:00 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Farsi",
"Carla",
""
],
[
"Latremoliere",
"Frederic",
""
]
] |
2504.11716 | Nityanand Rai | Nityanand Rai | A Technical Survey of Sparse Linear Solvers in Electronic Design
Automation | null | null | null | null | math.NA cs.NA cs.PF | http://creativecommons.org/licenses/by/4.0/ | Sparse linear system solvers ($Ax=b$) are critical computational kernels in
Electronic Design Automation (EDA), underpinning vital simulations for modern
IC and system design. Applications like power integrity verification and
electrothermal analysis fundamentally solve large-scale, sparse algebraic
systems from Modified Nodal Analysis (MNA) or Finite Element/Volume Method
(FEM/FVM) discretizations of PDEs. Problem dimensions routinely reach
$10^6-10^9$ unknowns, escalating towards $10^{10}$+ for full-chip power grids
\cite{Tsinghua21}, demanding stringent solver scalability, low memory
footprint, and efficiency. This paper surveys predominant sparse solver
paradigms in EDA: direct factorization methods (LU, Cholesky), iterative Krylov
subspace methods (CG, GMRES, BiCGSTAB), and multilevel multigrid techniques. We
examine their mathematical foundations, convergence, conditioning sensitivity,
implementation aspects (storage formats CSR/CSC, fill-in mitigation via
reordering), the critical role of preconditioning for ill-conditioned systems
\cite{SaadIterative, ComparisonSolversArxiv}, and multigrid's potential optimal
$O(N)$ complexity \cite{TrottenbergMG}. Solver choice critically depends on the
performance impact of frequent matrix updates (e.g., transient/non-linear),
where iterative/multigrid methods often amortize costs better than direct
methods needing repeated factorization \cite{SaadIterative}. We analyze
trade-offs in runtime complexity, memory needs, numerical robustness, parallel
scalability (MPI, OpenMP, GPU), and precision (FP32/FP64). Integration into EDA
tools for system-level multiphysics is discussed, with pseudocode
illustrations. The survey concludes by emphasizing the indispensable nature and
ongoing evolution of sparse solvers for designing and verifying complex
electronic systems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:34:21 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Rai",
"Nityanand",
""
]
] |
2504.11718 | Selim Sukhtaiev | Fritz Gesztesy and Selim Sukhtaiev | Some Remarks On Krein--von Neumann Extensions | arXiv admin note: substantial text overlap with arXiv:1203.5713 | null | null | null | math.SP | http://creativecommons.org/licenses/by/4.0/ | We survey various properties of Krein--von Neumann extensions $S_K$ and the
reduced Krein--von Neumann operator $\hatt S_K$ in connection with a strictly
positive (symmetric) operator $S$ with nonzero deficiency indices. In
particular, we focus on the resolvents of $S_K$ and $\hatt S_K$ and of the
trace ideal properties of the resolvent of $\hatt S_K$, and make some
comparisons with the corresponding properties of the resolvent of the
Friedrichs extension $S_F$. We also recall a parametrization of all nonnegative
self-adjoint extensions of $S$ and various Krein-type resolvent formulas for
any two relatively prime self-adjoint extensions of $S$, utilizing a
Donoghue-type $M$-operator (i.e., an energy parameter dependent
Dirichlet-to-Neumann-type map).
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:42:58 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gesztesy",
"Fritz",
""
],
[
"Sukhtaiev",
"Selim",
""
]
] |
2504.11719 | Chao Zhang | Ying Li and Chao Zhang | Equivalence between Superharmonic functions and renormalized solutions
for the equations with $(p, q)$-growth | null | null | null | null | math.AP | http://creativecommons.org/licenses/by/4.0/ | We establish the equivalence between superharmonic functions and locally
renormalized solutions for the elliptic measure data problems with $(p,
q)$-growth. By showing that locally renormalized solutions are essentially
bounded below and using Wolff potential estimates, we extend the results of [T.
Kilpel\"{a}inen, T. Kuusi, A. Tuhola-Kujanp\"{a}\"{a}, Superharmonic functions
are locally renormalized solutions, Ann. Inst. H. Poincar\'{e} C Anal. Non
Lin\'{e}aire, 2011] to a broader class of problems. Our work provides the first
equivalence result between locally renormalized solutions and superharmonic
functions for the nonstandard growth equations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:44:48 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Li",
"Ying",
""
],
[
"Zhang",
"Chao",
""
]
] |
2504.11720 | Nicholas Pritchard | Nicholas J. Pritchard, Andreas Wicenec, Richard Dodson and Mohammed
Bennamoun | Polarisation-Inclusive Spiking Neural Networks for Real-Time RFI
Detection in Modern Radio Telescopes | 4 pages, 4 tables, accepted at URSI AP-RASC 2025 | null | null | null | cs.NE astro-ph.IM | http://creativecommons.org/licenses/by/4.0/ | Radio Frequency Interference (RFI) is a known growing challenge for radio
astronomy, intensified by increasing observatory sensitivity and prevalence of
orbital RFI sources. Spiking Neural Networks (SNNs) offer a promising solution
for real-time RFI detection by exploiting the time-varying nature of radio
observation and neuron dynamics together. This work explores the inclusion of
polarisation information in SNN-based RFI detection, using simulated data from
the Hydrogen Epoch of Reionisation Array (HERA) instrument and provides power
usage estimates for deploying SNN-based RFI detection on existing neuromorphic
hardware. Preliminary results demonstrate state-of-the-art detection accuracy
and highlight possible extensive energy-efficiency gains.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:45:00 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Pritchard",
"Nicholas J.",
""
],
[
"Wicenec",
"Andreas",
""
],
[
"Dodson",
"Richard",
""
],
[
"Bennamoun",
"Mohammed",
""
]
] |
2504.11721 | Pavel Shevchenko V | Daisuke Murakami, Pavel V. Shevchenko, Tomoko Matsui, Aleksandar
Arandjelovi\'c, Tor A. Myrvoll | Climate-economy projections under shared socioeconomic pathways and
net-zero scenarios | null | null | null | null | econ.GN q-fin.EC | http://creativecommons.org/licenses/by/4.0/ | We examine future trajectories of the social cost of carbon, global
temperatures, and carbon concentrations using the cost-benefit Dynamic
Integrated Climate-Economy (DICE) model calibrated to the five Shared
Socioeconomic Pathways (SSPs) under two mitigation scenarios: achieving
net-zero carbon emissions by 2050 and by 2100. The DICE model is calibrated to
align industrial and land-use carbon emissions with projections from six
leading process-based integrated assessment models (IAMs): IMAGE,
MESSAGE--GLOBIOM, AIM/CGE, GCAM, REMIND--MAgPIE and WITCH--GLOBIOM. We find
that even with aggressive mitigation (net-zero by 2050), global temperatures
are projected to exceed $2^\circ\text{C}$ above preindustrial levels by 2100,
with estimates ranging from $2.5^\circ\text{C}$ to $2.7^\circ\text{C}$ across
all SSPs and IAMs considered. Under the more lenient mitigation scenario
(net-zero by 2100), global temperatures are projected to rise to between
$3^\circ\text{C}$ and $3.7^\circ\text{C}$ by 2100. Additionally, the social
cost of carbon is estimated to increase from approximately USD 30--50 in 2025
to USD 250--400 in 2100.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:48:18 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Murakami",
"Daisuke",
""
],
[
"Shevchenko",
"Pavel V.",
""
],
[
"Matsui",
"Tomoko",
""
],
[
"Arandjelović",
"Aleksandar",
""
],
[
"Myrvoll",
"Tor A.",
""
]
] |
2504.11722 | He Xu | Siqing Chen, He Xua, Xueyu Zhang, Zhen Ma | Inversion of biological strategies in engineering technology: in case
underwater soft robot | 26 pages, 8 figures | null | null | null | cs.RO | http://creativecommons.org/licenses/by-nc-sa/4.0/ | This paper proposes a biomimetic design framework based on biological
strategy inversion, aiming to systematically map solutions evolved in nature to
the engineering field. By constructing a
"Function-Behavior-Feature-Environment" (F-B-Cs in E) knowledge model, combined
with natural language processing (NLP) and multi-criteria decision-making
methods, it achieves efficient conversion from biological strategies to
engineering solutions. Using underwater soft robot design as a case study, the
effectiveness of the framework in optimizing drive mechanisms, power
distribution, and motion pattern design is verified. This research provides
scalable methodological support for interdisciplinary biomimetic innovation.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:48:28 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chen",
"Siqing",
""
],
[
"Xua",
"He",
""
],
[
"Zhang",
"Xueyu",
""
],
[
"Ma",
"Zhen",
""
]
] |
2504.11723 | Paul Denny | Paul Denny and Viraj Kumar and Stephen MacNeil and James Prather and
Juho Leinonen | Probing the Unknown: Exploring Student Interactions with Probeable
Problems at Scale in Introductory Programming | Accepted at ITiCSE 2025 | null | 10.1145/3724363.3729093 | null | cs.HC cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Introductory programming courses often rely on small code-writing exercises
that have clearly specified problem statements. This limits opportunities for
students to practice how to clarify ambiguous requirements -- a critical skill
in real-world programming. In addition, the emerging capabilities of large
language models (LLMs) to produce code from well-defined specifications may
harm student engagement with traditional programming exercises. This study
explores the use of ``Probeable Problems'', automatically gradable tasks that
have deliberately vague or incomplete specifications. Such problems require
students to submit test inputs, or `probes', to clarify requirements before
implementation. Through analysis of over 40,000 probes in an introductory
course, we identify patterns linking probing behaviors to task success.
Systematic strategies, such as thoroughly exploring expected behavior before
coding, resulted in fewer incorrect code submissions and correlated with course
success. Feedback from nearly 1,000 participants highlighted the challenges and
real-world relevance of these tasks, as well as benefits to critical thinking
and metacognitive skills. Probeable Problems are easy to set up and deploy at
scale, and help students recognize and resolve uncertainties in programming
problems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:50:00 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Denny",
"Paul",
""
],
[
"Kumar",
"Viraj",
""
],
[
"MacNeil",
"Stephen",
""
],
[
"Prather",
"James",
""
],
[
"Leinonen",
"Juho",
""
]
] |
2504.11724 | Zuhuang Chen | Yangyang Si, Ningbo Fan, Yongqi Dong, Zhen Ye, Shiqing Deng, Yijie Li,
Chao Zhou, Qibin Zeng, Lu You, Yimei Zhu, Zhenlin Luo, Sujit Das, Laurent
Bellaiche, Bin Xu, Huajun Liu, Zuhuang Chen | Ideal antiferroelectricity with large digital electrostrain in PbZrO3
epitaxial thin films | 22pages, 5 figures | null | null | null | cond-mat.mtrl-sci physics.app-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Antiferroelectrics exhibit reversible antipolar-polar phase transitions under
electric fields, yielding large electrostrain suitable for electromechanical
devices. Nevertheless, in thin-film form, the antiferroelectric behavior is
often obscured by competing ferroic orders, resulting in slanted hysteresis
loops with undesired remnant polarization, subsequently posing challenges in
obtaining ideal antiferroelectricity and understanding their intrinsic
electrical behavior. Here, atomistic models for controllable
antiferroelectric-ferroelectric phase transition pathways are unveiled along
specific crystallographic directions. Guided by the anisotropic phase
transition and orientation design, we achieved ideal antiferroelectricity with
square double hysteresis loop, large saturated polarization (~60 {\mu}C/cm2),
near-zero remnant polarization, fast response time (~75 ns), and
near-fatigue-free performance (~10^10 cycles) in (111)P-oriented PbZrO3
epitaxial thin films. Moreover, a bipolar and frequency-independent digital
electrostrain (~0.83%) were demonstrated in this architype antiferroelectric
system. In-situ X-ray diffraction studies further reveal that the large digital
electrostrain results from intrinsic field-induced
antiferroelectric-ferroelectric structural transition. This work demonstrates
the anisotropic phase transition mechanism and ideal antiferroelectricity with
large digital electrostrain in antiferroelectric thin films, offering a new
avenue for applications of antiferroelectricity in nanoelectromechanical
systems.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:55:31 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Si",
"Yangyang",
""
],
[
"Fan",
"Ningbo",
""
],
[
"Dong",
"Yongqi",
""
],
[
"Ye",
"Zhen",
""
],
[
"Deng",
"Shiqing",
""
],
[
"Li",
"Yijie",
""
],
[
"Zhou",
"Chao",
""
],
[
"Zeng",
"Qibin",
""
],
[
"You",
"Lu",
""
],
[
"Zhu",
"Yimei",
""
],
[
"Luo",
"Zhenlin",
""
],
[
"Das",
"Sujit",
""
],
[
"Bellaiche",
"Laurent",
""
],
[
"Xu",
"Bin",
""
],
[
"Liu",
"Huajun",
""
],
[
"Chen",
"Zuhuang",
""
]
] |
2504.11725 | Scott Dawson | Scott T. M. Dawson, Jaime Prado Zayas, Barbara Lopez-Doriga | Sparsity-promoting methods for isolating dominant linear amplification
mechanisms in wall-bounded flows | 28 pages, 8 figures | null | null | null | physics.flu-dyn | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work proposes a method to identify and isolate the physical mechanisms
that are responsible for linear energy amplification in fluid flows. This is
achieved by applying a sparsity-promoting methodology to the resolvent form of
the governing equations, solving an optimization problem that balances
retaining the amplification properties of the original operator with minimizing
the number of terms retained in the simplified sparse model. This results in
simplified operators that often have very similar pseudospectral properties as
the original equations. The method is demonstrated on both incompressible and
compressible wall-bounded parallel shear flows, where the results obtained from
the proposed method appear to be consistent with known mechanisms and
simplifying assumptions, such as the lift-up mechanism, and (for the
compressible case) Morkovin's hypothesis and the strong Reynolds analogy. This
provides a framework for the application of this method to problems for which
knowledge of pertinent amplification mechanisms is less established.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 02:59:01 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Dawson",
"Scott T. M.",
""
],
[
"Zayas",
"Jaime Prado",
""
],
[
"Lopez-Doriga",
"Barbara",
""
]
] |
2504.11726 | Yunzhe Li | Yunzhe Li, Facheng Hu, Hongzi Zhu, Shifan Zhang, Liang Zhang, Shan
Chang and Minyi Guo | Saga: Capturing Multi-granularity Semantics from Massive Unlabelled IMU
Data for User Perception | 2025 IEEE 45th International Conference on Distributed Computing
Systems (ICDCS) | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inertial measurement units (IMUs), have been prevalently used in a wide range
of mobile perception applications such as activity recognition and user
authentication, where a large amount of labelled data are normally required to
train a satisfactory model. However, it is difficult to label micro-activities
in massive IMU data due to the hardness of understanding raw IMU data and the
lack of ground truth. In this paper, we propose a novel fine-grained user
perception approach, called Saga, which only needs a small amount of labelled
IMU data to achieve stunning user perception accuracy. The core idea of Saga is
to first pre-train a backbone feature extraction model, utilizing the rich
semantic information of different levels embedded in the massive unlabelled IMU
data. Meanwhile, for a specific downstream user perception application,
Bayesian Optimization is employed to determine the optimal weights for
pre-training tasks involving different semantic levels. We implement Saga on
five typical mobile phones and evaluate Saga on three typical tasks on three
IMU datasets. Results show that when only using about 100 training samples per
class, Saga can achieve over 90% accuracy of the full-fledged model trained on
over ten thousands training samples with no additional system overhead.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:03:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Li",
"Yunzhe",
""
],
[
"Hu",
"Facheng",
""
],
[
"Zhu",
"Hongzi",
""
],
[
"Zhang",
"Shifan",
""
],
[
"Zhang",
"Liang",
""
],
[
"Chang",
"Shan",
""
],
[
"Guo",
"Minyi",
""
]
] |
2504.11727 | Ronan Smith | Ronan Smith, Gregor Bortsnar, Vittorio Di Trapani, Ginevra Lautizi,
Ludovic Broche, Lukas Helfen, Daniel Bull, Richard Boardman, S. Mark
Spearing, Ian Sinclair, Mark Mavrogordato, and Pierre Thibault | Contrast Enhancement of Barely Visible Impact Damage using Speckle-Based
Dark-Field Radiography | null | null | null | null | physics.app-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Barely visible impact damage (BVID) can cause serious issue for composite
structures, due to sub-surface damage seriously reducing the strength of the
material without showing easily detectable surface signs. Dark-field imaging
measures ultra-small angle scattering caused by microscopic features within
samples. It is sensitive to damage in composite materials which would otherwise
be invisible in conventional radiography. Here we demonstrate BVID detection
with speckle-based dark-field imaging, a technique requiring only sandpaper (to
create the speckle-pattern) in addition to a conventional X-ray imaging setup
to extract the dark-field imaging. We demonstrate that the technique is capable
of detecting both matrix cracking and delaminations by imaging materials
susceptible to these failure mechanisms.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:04:16 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Smith",
"Ronan",
""
],
[
"Bortsnar",
"Gregor",
""
],
[
"Di Trapani",
"Vittorio",
""
],
[
"Lautizi",
"Ginevra",
""
],
[
"Broche",
"Ludovic",
""
],
[
"Helfen",
"Lukas",
""
],
[
"Bull",
"Daniel",
""
],
[
"Boardman",
"Richard",
""
],
[
"Spearing",
"S. Mark",
""
],
[
"Sinclair",
"Ian",
""
],
[
"Mavrogordato",
"Mark",
""
],
[
"Thibault",
"Pierre",
""
]
] |
2504.11729 | Jason Ning | Jiahong Ning, Pengyan Zhu, Ce Zheng, Gary Lee, Sumei Sun, Tingting
Yang | EdgePrompt: A Distributed Key-Value Inference Framework for LLMs in 6G
Networks | null | null | null | null | eess.SP | http://creativecommons.org/publicdomain/zero/1.0/ | As sixth-generation (6G) networks advance, large language models (LLMs) are
increasingly integrated into 6G infrastructure to enhance network management
and intelligence. However, traditional LLMs architecture struggle to meet the
stringent latency and security requirements of 6G, especially as the increasing
in sequence length leads to greater task complexity. This paper proposes
Edge-Prompt, a cloud-edge collaborative framework based on a hierarchical
attention splicing mechanism. EdgePrompt employs distributed key-value (KV)
pair optimization techniques to accelerate inference and adapt to network
conditions. Additionally, to reduce the risk of data leakage, EdgePrompt
incorporates a privacy preserving strategy by isolating sensitive information
during processing. Experiments on public dataset show that EdgePrompt
effectively improves the inference throughput and reduces the latency, which
provides a reliable solution for LLMs deployment in 6G environments.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:07:07 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ning",
"Jiahong",
""
],
[
"Zhu",
"Pengyan",
""
],
[
"Zheng",
"Ce",
""
],
[
"Lee",
"Gary",
""
],
[
"Sun",
"Sumei",
""
],
[
"Yang",
"Tingting",
""
]
] |
2504.11730 | Hailu Kuang | Bingquan Jin, Hailu Kuang, Xiaoqi Li | Blockchain Application in Metaverse: A Review | 19 pages, 9 figures | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | In recent years, the term Metaverse emerged as one of the most compelling
concepts, captivating the interest of international companies such as Tencent,
ByteDance, Microsoft, and Facebook. These company recognized the Metaverse as a
pivotal element for future success and have since made significant investments
in this area. The Metaverse is still in its developmental stages, requiring the
integration and advancement of various technologies to bring its vision to
life. One of the key technologies associated with the Metaverse is blockchain,
known for its decentralization, security, trustworthiness, and ability to
manage time-series data. These characteristics align perfectly with the
ecosystem of the Metaverse, making blockchain foundational for its security and
infrastructure. This paper introduces both blockchain and the Metaverse
ecosystem while exploring the application of the blockchain within the
Metaverse, including decentralization, consensus mechanisms, hash algorithms,
timestamping, smart contracts, distributed storage, distributed ledgers, and
non-fungible tokens (NFTs) to provide insights for researchers investigating
these topics.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:07:35 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Jin",
"Bingquan",
""
],
[
"Kuang",
"Hailu",
""
],
[
"Li",
"Xiaoqi",
""
]
] |
2504.11731 | Olivier Shelbaya Dr. | Emma Ghelfi, Alexander Katrusiak, Rick Baartman, Wojtek Fedorko,
Oliver Kester, Giordano Kogler Anele, Olivier Shelbaya, Defne Tanyer | Bayesian Optimization for Ion Beam Centroid Correction | 10 pages, 9 figures, 3 tables. Bayesian optimization applied to ion
beam centroid tuning | null | 10.1063/5.0233169 | null | physics.acc-ph physics.app-ph | http://creativecommons.org/licenses/by/4.0/ | An activity of the TRIUMF automatic beam tuning program, the Bayesian
optimization for Ion Steering, BOIS, method has been developed to perform
corrective centroid steering of beams at the TRIUMF ISAC facility. BOIS
exclusively controls the steerers for centroid correction after the transverse
optics have been set according to theory. The method is fully online, easy to
deploy, and has been tested in low energy and postaccelerated beams at ISAC,
achieving results comparable to human operators. scaleBOIS and boundBOIS are
naive proof of concept solutions to preferably select beam paths with minimal
steering. Repeatable and robust automated steering reduces reliance on operator
expertise and operational overhead, ensuring reliable beam delivery to the
experiments and thereby supporting TRIUMF's scientific mission.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:10:54 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ghelfi",
"Emma",
""
],
[
"Katrusiak",
"Alexander",
""
],
[
"Baartman",
"Rick",
""
],
[
"Fedorko",
"Wojtek",
""
],
[
"Kester",
"Oliver",
""
],
[
"Anele",
"Giordano Kogler",
""
],
[
"Shelbaya",
"Olivier",
""
],
[
"Tanyer",
"Defne",
""
]
] |
2504.11732 | Jilan Xu | Jilan Xu, Yifei Huang, Baoqi Pei, Junlin Hou, Qingqiu Li, Guo Chen,
Yuejie Zhang, Rui Feng, Weidi Xie | EgoExo-Gen: Ego-centric Video Prediction by Watching Exo-centric Videos | ICLR 2025 | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Generating videos in the first-person perspective has broad application
prospects in the field of augmented reality and embodied intelligence. In this
work, we explore the cross-view video prediction task, where given an
exo-centric video, the first frame of the corresponding ego-centric video, and
textual instructions, the goal is to generate futur frames of the ego-centric
video. Inspired by the notion that hand-object interactions (HOI) in
ego-centric videos represent the primary intentions and actions of the current
actor, we present EgoExo-Gen that explicitly models the hand-object dynamics
for cross-view video prediction. EgoExo-Gen consists of two stages. First, we
design a cross-view HOI mask prediction model that anticipates the HOI masks in
future ego-frames by modeling the spatio-temporal ego-exo correspondence. Next,
we employ a video diffusion model to predict future ego-frames using the first
ego-frame and textual instructions, while incorporating the HOI masks as
structural guidance to enhance prediction quality. To facilitate training, we
develop an automated pipeline to generate pseudo HOI masks for both ego- and
exo-videos by exploiting vision foundation models. Extensive experiments
demonstrate that our proposed EgoExo-Gen achieves better prediction performance
compared to previous video prediction models on the Ego-Exo4D and H2O benchmark
datasets, with the HOI masks significantly improving the generation of hands
and interactive objects in the ego-centric videos.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:12:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Xu",
"Jilan",
""
],
[
"Huang",
"Yifei",
""
],
[
"Pei",
"Baoqi",
""
],
[
"Hou",
"Junlin",
""
],
[
"Li",
"Qingqiu",
""
],
[
"Chen",
"Guo",
""
],
[
"Zhang",
"Yuejie",
""
],
[
"Feng",
"Rui",
""
],
[
"Xie",
"Weidi",
""
]
] |
2504.11734 | Xiang Tang | Xiang Tang, Ruotong Li, Xiaopeng Fan | Recent Advance in 3D Object and Scene Generation: A Survey | 34 pages, 6 figures | null | null | null | cs.GR cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, the demand for 3D content has grown exponentially with
intelligent upgrading of interactive media, extended reality (XR), and
Metaverse industries. In order to overcome the limitation of traditional manual
modeling approaches, such as labor-intensive workflows and prolonged production
cycles, revolutionary advances have been achieved through the convergence of
novel 3D representation paradigms and artificial intelligence generative
technologies. In this survey, we conduct a systematically review of the
cutting-edge achievements in static 3D object and scene generation, as well as
establish a comprehensive technical framework through systematic
categorization. Specifically, we initiate our analysis with mainstream 3D
object representations, followed by in-depth exploration of two principal
technical pathways in object generation: data-driven supervised learning
methods and deep generative model-based approaches. Regarding scene generation,
we focus on three dominant paradigms: layout-guided compositional synthesis, 2D
prior-based scene generation, and rule-driven modeling. Finally, we critically
examine persistent challenges in 3D generation and propose potential research
directions for future investigation. This survey aims to provide readers with a
structured understanding of state-of-the-art 3D generation technologies while
inspiring researchers to undertake more exploration in this domain.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:22:06 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Tang",
"Xiang",
""
],
[
"Li",
"Ruotong",
""
],
[
"Fan",
"Xiaopeng",
""
]
] |
2504.11735 | Ningyu He | Xiaohui Hu, Ningyu He, Haoyu Wang | WalletProbe: A Testing Framework for Browser-based Cryptocurrency Wallet
Extensions | null | null | null | null | cs.CR | http://creativecommons.org/licenses/by/4.0/ | Serving as the first touch point for users to the cryptocurrency world,
cryptocurrency wallets allow users to manage, receive, and transmit digital
assets on blockchain networks and interact with emerging decentralized finance
(DeFi) applications. Unfortunately, cryptocurrency wallets have always been the
prime targets for attackers, and incidents of wallet breaches have been
reported from time to time. Although some recent studies have characterized the
vulnerabilities and scams related to wallets, they have generally been
characterized in coarse granularity, overlooking potential risks inherent in
detailed designs of cryptocurrency wallets, especially from perspectives
including user interaction and advanced features. To fill the void, in this
paper, we present a fine-grained security analysis on browser-based
cryptocurrency wallets. To pinpoint security issues of components in wallets,
we design WalletProbe, a mutation-based testing framework based on visual-level
oracles. We have identified 13 attack vectors that can be abused by attackers
to exploit cryptocurrency wallets and exposed 21 concrete attack strategies. By
applying WalletProbe on 39 widely-adopted browser-based wallet extensions, we
astonishingly figure out all of them can be abused to steal crypto assets from
innocent users. Identified potential attack vectors were reported to wallet
developers timely and 26 issues have been patched already. It is, hence, urgent
for our community to take action to mitigate threats related to cryptocurrency
wallets. We promise to release all code and data to promote the development of
the community.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:24:30 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Hu",
"Xiaohui",
""
],
[
"He",
"Ningyu",
""
],
[
"Wang",
"Haoyu",
""
]
] |
2504.11736 | Yoritaka Iwata | Yoritaka Iwata, Hiroyasu Ejiri, Shahariar Sarkar | Low-energy neutrino responses for 71Ga by electron capture rates, charge
exchange reactions and shell model calculations | submitted | null | null | null | nucl-th hep-ph nucl-ex | http://creativecommons.org/licenses/by/4.0/ | Weak Gamow-Teller (GT) responses for low-lying states in ${}^{71}\mathrm{Ga}$
are crucial for studying low-energy solar neutrinos and the Ga anomaly, i.e.,
the possible transition to the sterile state. The responses for the ground
state, the first excited state, and the second excited state are evaluated for
the first time using the experimental electron capture rates, the experimental
charge exchange reaction (CER) rates corrected for the tensor-interaction
effect and the theoretical interacting shell model (ISM) calculations. The
contributions from the two excited states to the solar and ${}^{51}\mathrm{Cr}$
neutrinos are found to be $4.2 \pm 1.2\%$ of that for the ground state. This is
slightly larger than the ISM values but little smaller than the CER values
without corrections for the tensor interaction effect. The Ga anomaly is far
beyond the uncertainty of the obtained nuclear responses.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:30:19 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Iwata",
"Yoritaka",
""
],
[
"Ejiri",
"Hiroyasu",
""
],
[
"Sarkar",
"Shahariar",
""
]
] |
2504.11737 | Qian Ding | Qian Ding and Dirk Englund | Hardware Co-Designed Optimal Control for Programmable Atomic Quantum
Processors via Reinforcement Learning | 14 pages, 4 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | Developing scalable, fault-tolerant atomic quantum processors requires
precise control over large arrays of optical beams. This remains a major
challenge due to inherent imperfections in classical control hardware, such as
inter-channel crosstalk and beam leakage. In this work, we introduce a hardware
co-designed intelligent quantum control framework to address these limitations.
We construct a mathematical model of the photonic control hardware, integrate
it into the quantum optimal control (QOC) framework, and apply reinforcement
learning (RL) techniques to discover optimal control strategies. We demonstrate
that the proposed framework enables robust, high-fidelity parallel single-qubit
gate operations under realistic control conditions, where each atom is
individually addressed by an optical beam. Specifically, we implement and
benchmark three optimization strategies: a classical hybrid Self-Adaptive
Differential Evolution-Adam (SADE-Adam) optimizer, a conventional RL approach
based on Proximal Policy Optimization (PPO), and a novel end-to-end
differentiable RL method. Using SADE-Adam as a baseline, we find that while PPO
performance degrades as system complexity increases, the end-to-end
differentiable RL consistently achieves gate fidelities above 99.9$\%$,
exhibits faster convergence, and maintains robustness under varied channel
crosstalk strength and randomized dynamic control imperfections.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:30:40 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ding",
"Qian",
""
],
[
"Englund",
"Dirk",
""
]
] |
2504.11738 | Xingyong Zhang | Lijuan Kang, Xingyong Zhang, Cuiling Liu | Infinitely many solutions for an instantaneous and non-instantaneous
fourth-order differential system with local assumptions | null | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate a class of fourth-order differential systems with
instantaneous and non-instantaneous impulses. Our technical approach is mainly
based on a variant of Clark's theorem without the global assumptions. Under
locally subquadratic growth conditions imposed on the nonlinear terms
$f_i(t,u)$ and impulsive terms $I_i$, combined with perturbations governed by
arbitrary continuous functions of small coefficient $\varepsilon$, we establish
the existence of multiple small solutions. Specifically, the system exhibits
infinitely many solutions in the case where $\varepsilon=0$.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:32:13 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Kang",
"Lijuan",
""
],
[
"Zhang",
"Xingyong",
""
],
[
"Liu",
"Cuiling",
""
]
] |
2504.11739 | Bingjie Gao | Bingjie Gao, Xinyu Gao, Xiaoxue Wu, Yujie Zhou, Yu Qiao, Li Niu,
Xinyuan Chen, Yaohui Wang | The Devil is in the Prompts: Retrieval-Augmented Prompt Optimization for
Text-to-Video Generation | accepted by CVPR2025 | null | null | null | cs.CV cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The evolution of Text-to-video (T2V) generative models, trained on
large-scale datasets, has been marked by significant progress. However, the
sensitivity of T2V generative models to input prompts highlights the critical
role of prompt design in influencing generative outcomes. Prior research has
predominantly relied on Large Language Models (LLMs) to align user-provided
prompts with the distribution of training prompts, albeit without tailored
guidance encompassing prompt vocabulary and sentence structure nuances. To this
end, we introduce \textbf{RAPO}, a novel \textbf{R}etrieval-\textbf{A}ugmented
\textbf{P}rompt \textbf{O}ptimization framework. In order to address potential
inaccuracies and ambiguous details generated by LLM-generated prompts. RAPO
refines the naive prompts through dual optimization branches, selecting the
superior prompt for T2V generation. The first branch augments user prompts with
diverse modifiers extracted from a learned relational graph, refining them to
align with the format of training prompts via a fine-tuned LLM. Conversely, the
second branch rewrites the naive prompt using a pre-trained LLM following a
well-defined instruction set. Extensive experiments demonstrate that RAPO can
effectively enhance both the static and dynamic dimensions of generated videos,
demonstrating the significance of prompt optimization for user-provided
prompts. Project website:
\href{https://whynothaha.github.io/Prompt_optimizer/RAPO.html}{GitHub}.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:33:25 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gao",
"Bingjie",
""
],
[
"Gao",
"Xinyu",
""
],
[
"Wu",
"Xiaoxue",
""
],
[
"Zhou",
"Yujie",
""
],
[
"Qiao",
"Yu",
""
],
[
"Niu",
"Li",
""
],
[
"Chen",
"Xinyuan",
""
],
[
"Wang",
"Yaohui",
""
]
] |
2504.11740 | Pamela Shaw | Pamela A Shaw, Susan Gruber, Brian D. Williamson, Rishi Desai, Susan
M. Shortreed, Chloe Krakauer, Jennifer C. Nelson, Mark J. van der Laan | A cautionary note for plasmode simulation studies in the setting of
causal inference | 55 pages, 6 tables, 2 figures, 8 supplemental tables, 4 supplemental
figures | null | null | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | Plasmode simulation has become an important tool for evaluating the operating
characteristics of different statistical methods in complex settings, such as
pharmacoepidemiological studies of treatment effectiveness using electronic
health records (EHR) data. These studies provide insight into how estimator
performance is impacted by challenges including rare events, small sample size,
etc., that can indicate which among a set of methods performs best in a
real-world dataset. Plasmode simulation combines data resampled from a
real-world dataset with synthetic data to generate a known truth for an
estimand in realistic data. There are different potential plasmode strategies
currently in use. We compare two popular plasmode simulation frameworks. We
provide numerical evidence and a theoretical result, which shows that one of
these frameworks can cause certain estimators to incorrectly appear overly
biased with lower than nominal confidence interval coverage. Detailed
simulation studies using both synthetic and real-world EHR data demonstrate
that these pitfalls remain at large sample sizes and when analyzing data from a
randomized controlled trial. We conclude with guidance for the choice of a
plasmode simulation approach that maintains good theoretical properties to
allow a fair evaluation of statistical methods while also maintaining the
desired similarity to real data.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:36:27 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shaw",
"Pamela A",
""
],
[
"Gruber",
"Susan",
""
],
[
"Williamson",
"Brian D.",
""
],
[
"Desai",
"Rishi",
""
],
[
"Shortreed",
"Susan M.",
""
],
[
"Krakauer",
"Chloe",
""
],
[
"Nelson",
"Jennifer C.",
""
],
[
"van der Laan",
"Mark J.",
""
]
] |
2504.11741 | Yiyou Sun | Yiyou Sun and Georgia Zhou and Hao Wang and Dacheng Li and Nouha Dziri
and Dawn Song | Climbing the Ladder of Reasoning: What LLMs Can-and Still Can't-Solve
after SFT? | null | null | null | null | cs.AI cs.CL cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent supervised fine-tuning (SFT) approaches have significantly improved
language models' performance on mathematical reasoning tasks, even when models
are trained at a small scale. However, the specific capabilities enhanced
through such fine-tuning remain poorly understood. In this paper, we conduct a
detailed analysis of model performance on the AIME24 dataset to understand how
reasoning capabilities evolve. We discover a ladder-like structure in problem
difficulty, categorize questions into four tiers (Easy, Medium, Hard, and
Extremely Hard (Exh)), and identify the specific requirements for advancing
between tiers. We find that progression from Easy to Medium tier requires
adopting an R1 reasoning style with minimal SFT (500-1K instances), while
Hard-level questions suffer from frequent model's errors at each step of the
reasoning chain, with accuracy plateauing at around 65% despite logarithmic
scaling. Exh-level questions present a fundamentally different challenge; they
require unconventional problem-solving skills that current models uniformly
struggle with. Additional findings reveal that carefully curated small-scale
datasets offer limited advantage-scaling dataset size proves far more
effective. Our analysis provides a clearer roadmap for advancing language model
capabilities in mathematical reasoning.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:39:38 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Sun",
"Yiyou",
""
],
[
"Zhou",
"Georgia",
""
],
[
"Wang",
"Hao",
""
],
[
"Li",
"Dacheng",
""
],
[
"Dziri",
"Nouha",
""
],
[
"Song",
"Dawn",
""
]
] |
2504.11743 | Shengjin Sun | Sheng-Jin Sun, Shuang-Xi Yi, Yuan-Chuan Zou, Yu-Peng Yang, Ying Qin,
Qing-Wen Tang, Fa-Yin Wang | Constraining the initial Lorentz factor of gamma-ray bursts under
different circumburst mediums | 9 pages, 3 figures, 2 tables; Accepted for publication in Journal of
High Energy Astrophysics | null | null | null | astro-ph.HE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The initial Lorentz factor ($\Gamma_{\text{0}}$) plays a crucial role in
uncovering the physical characteristics of gamma-ray bursts (GRBs). Previous
studies have indicated that the ambient medium density index $k$ for GRBs falls
in the range of 0 - 2, rather than exactly equal to 0 (homogeneous interstellar
ambient) or 2 (typical stellar wind). In this work, we aim to constrain the
$\Gamma_0$ of GRBs considering their distinct circumburst medium. We select a
total of 33 GRBs for our analysis, comprising 7 X-ray GRBs and 26 optical GRBs.
Subsequently, by utilizing the deceleration time of fireball $t_{\rm p}$, we
derive the $\Gamma_0$ for the 33 GRBs assuming the radiation efficiency of
$\eta =$ 0.2. The inferred initial Lorentz factor was found to be from 50 to
500, consistent with previous studies. We then investigate the correlation
between the $\Gamma_0$ and the isotropic energy $E_{\rm \gamma,iso}$ (as well
as the mean isotropic luminosity $L_{\rm \gamma,iso}$), finding very tight
correlations between them, i.e., $\Gamma_0$ $\propto$ $E^{0.24}_{\rm
\gamma,iso,52}$ ($\Gamma_0$ $\propto$ $L^{0.20}_{\rm \gamma,iso.49}$) with
$\eta$=0.2. Additionally, we verify the correlation among $\Gamma_0$, the
isotropic energy $E_{\rm \gamma,iso}$ (or $L_{\rm \gamma,iso}$) and the peak
energy $E_{\rm{p,z}}$, i.e., $E_{\rm \gamma,iso,52}$ $\propto$
$\Gamma^{1.36}_0$$E^{0.82}_{\rm{p,z}}$ ($L_{\rm \gamma,iso,49}$ $\propto$
$\Gamma^{1.05}_0$$E^{0.66}_{\rm{p,z}}$) under the same radiation efficiency
($\eta$=0.2).
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:46:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Sun",
"Sheng-Jin",
""
],
[
"Yi",
"Shuang-Xi",
""
],
[
"Zou",
"Yuan-Chuan",
""
],
[
"Yang",
"Yu-Peng",
""
],
[
"Qin",
"Ying",
""
],
[
"Tang",
"Qing-Wen",
""
],
[
"Wang",
"Fa-Yin",
""
]
] |
2504.11744 | Luning Zhang | Jiahui Shang, Luning Zhang and Zhongxiang Zheng | From Cyber Threat to Data Shield: Constructing Provably Secure File
Erasure with Repurposed Ransomware Cryptography | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ransomware has emerged as a persistent cybersecurity threat,leveraging robust
encryption schemes that often remain unbroken even after public disclosure of
source code. Motivated by the technical resilience of such mechanisms, this
paper presents SEER (Secure and Efficient Encryption-based Erasure via
Ransomware), a provably secure file destruction system that repurposes
ransomware encryption for legitimate data erasure tasks. SEER integrates the
triple-encryption design of the Babuk ransomware family, including
Curve25519-based key exchange,SHA-256-based key derivation, and the Sosemanuk
stream cipher, to construct a layered key management architecture. It tightly
couples encryption and key destruction by securely erasing session keys
immediately after use. Experimental results on an ESXI platform demonstrate
that SEER achieves four orders of magnitude performance improvement over the
DoD 5220.22 standard. The proposed system further ensures provable security
through both theoretical foundations and practical validation, offering an
efficient and resilient solution for the secure destruction of sensitive data.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:47:17 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shang",
"Jiahui",
""
],
[
"Zhang",
"Luning",
""
],
[
"Zheng",
"Zhongxiang",
""
]
] |
2504.11745 | Jinglong Zhu | Xiaotong Xie, Hiroyuki Umeeda, Jinglong Zhu | $D^0-\bar{D}^0$ mixing in the Dyson-Schwinger approach | 21 pages, 2 figures, 3 tables | null | null | null | hep-ph hep-ex | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In view of difficulty to reproduce observables in the $D^0-\bar{D}^0$ mixing
via the operator product expansion, we discuss the Dyson-Schwinger approach to
this process. Formulated by the parameterization of quark propagators, SU(3)
breaking relevant to charm mixing is evaluated in such a way that properly
takes account of dynamical chiral symmetry breaking. The $\bar{D}^0\to D^0$
transition is discussed in the vacuum-insertion approximation with locality of
the light valence-quark field, represented by the decay constant of $D^0$ meson
as well as relevant momentum integrals. It is found that dimensionless
mass-difference observable in this approach leads to $|x|=(1.3-2.9)\times
10^{-3}$, the order of magnitude comparable to the HFLAV data, and thereby
offering a certain improvement as a theoretical framework.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:49:44 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Xie",
"Xiaotong",
""
],
[
"Umeeda",
"Hiroyuki",
""
],
[
"Zhu",
"Jinglong",
""
]
] |
2504.11746 | Rami Z. E. Alsaberi Dr. | Rami Z. E. Alsaberi, Miroslav D. Filipovic, Hidetoshi Sano, Shi Dai,
Frank Haberl, Patrick J. Kavanagh, Denis Leahy, Pierre Maggi, Gavin Rowell,
Manami Sasaki, Ivo R. Seitenzahl, Dejan Urosevic, Jeffrey Payne, Zachary J.
Smeaton, and Sanja Lazarevic | A New Radio Continuum Study of the Large Magellanic Cloud Supernova
Remnant MC SNR J0519-6902 | 12 pages, 10 figures, The paper has been accepted for publication in
PASA. arXiv admin note: text overlap with arXiv:2310.16533 | null | null | null | astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | We present a new radio continuum study of the Large Magellanic Cloud
supernova remnant (SNR) MC SNR J0519-6902. With a diameter of ~8 pc, this SNR
shows a radio ring-like morphology with three bright regions toward the north,
east, and south. Its linear polarisation is prominent with average values of 5
+- 1% and 6 +- 1% at 5500 and 9000 MHz, and we find a spectral index of -0.62
+- 0.02 , typical of a young SNR. The average rotation measure is estimated at
-124 +- 83 rad m-2 and the magnetic field strength at ~11 muG. We also estimate
an equipartition magnetic field of 72 +- 5 muG and minimum explosion energy of
Emin = 2.6x1048 erg. Finally, we identified an H I cloud that may be associated
with MC SNR J0519-6902, located in the southeastern part of the remnant, along
with a potential wind-bubble cavity.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:51:27 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Alsaberi",
"Rami Z. E.",
""
],
[
"Filipovic",
"Miroslav D.",
""
],
[
"Sano",
"Hidetoshi",
""
],
[
"Dai",
"Shi",
""
],
[
"Haberl",
"Frank",
""
],
[
"Kavanagh",
"Patrick J.",
""
],
[
"Leahy",
"Denis",
""
],
[
"Maggi",
"Pierre",
""
],
[
"Rowell",
"Gavin",
""
],
[
"Sasaki",
"Manami",
""
],
[
"Seitenzahl",
"Ivo R.",
""
],
[
"Urosevic",
"Dejan",
""
],
[
"Payne",
"Jeffrey",
""
],
[
"Smeaton",
"Zachary J.",
""
],
[
"Lazarevic",
"Sanja",
""
]
] |
2504.11747 | Jiang-Tao Yuan | Cai-Hong Wang, Jiang-Tao Yuan, Ying-Hui Yang, Mao-Sheng Li, Shao-Ming
Fei and Zhi-Hao Ma | Detectors for local discrimination of sets of generalized Bell states | 10 pages, 2 figures,7 tables | Physical Review A 111, 042408 (2025) | 10.1103/PhysRevA.111.042408 | null | quant-ph math-ph math.MP | http://creativecommons.org/licenses/by/4.0/ | A fundamental problem in quantum information processing is the discrimination
among a set of orthogonal quantum states of a composite system under local
operations and classical communication (LOCC). Corresponding to the LOCC
indistinguishable sets of four ququad-ququad orthogonal maximally entangled
states (MESs) constructed by Yu et al. [Phys. Rev. Lett. 109, 020506 (2012)],
the maximum commutative sets (MCSs) were introduced as detectors for the local
distinguishability of the set of generalized Bell states (GBSs), for which the
detectors are sufficient to determine the LOCC distinguishability. In this
work, we show how to determine all the detectors for a given GBS set. We
construct also several 4-GBS sets without detectors, most of which are one-way
LOCC indistinguishable and only one is one-way LOCC distinguishable, indicating
that the detectors are not necessary for LOCC distinguishability. Furthermore,
we show that for 4-GBS sets in quantum system
$\mathbb{C}^{6}\otimes\mathbb{C}^{6}$, the detectors are almost necessary for
one-way LOCC distinguishability, except for one set in the sense of local
unitary equivalence. The problem of one-way LOCC discrimination of 4-GBS sets
in $\mathbb{C}^{6}\otimes\mathbb{C}^{6}$ is completely resolved.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:55:53 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Cai-Hong",
""
],
[
"Yuan",
"Jiang-Tao",
""
],
[
"Yang",
"Ying-Hui",
""
],
[
"Li",
"Mao-Sheng",
""
],
[
"Fei",
"Shao-Ming",
""
],
[
"Ma",
"Zhi-Hao",
""
]
] |
2504.11748 | Christopher Xu | Christopher Y. Xu, Jack Yan, Kathleen Lum, and Justin K. Yim | Steerable rolling of a 1-DoF robot using an internal pendulum | 2 pages, submitted to 2nd Unconventional Robots Workshop: Rethinking
Robotic Systems Beyond Convention at IEEE ICRA 2025 | null | null | null | cs.RO | http://creativecommons.org/licenses/by/4.0/ | We present ROCK (Rolling One-motor Controlled rocK), a 1 degree-of-freedom
robot consisting of a round shell and an internal pendulum. An uneven shell
surface enables steering by using only the movement of the pendulum, allowing
for mechanically simple designs that may be feasible to scale to large
quantities or small sizes. We train a control policy using reinforcement
learning in simulation and deploy it onto the robot to complete a rectangular
trajectory.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 03:59:30 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Xu",
"Christopher Y.",
""
],
[
"Yan",
"Jack",
""
],
[
"Lum",
"Kathleen",
""
],
[
"Yim",
"Justin K.",
""
]
] |
2504.11749 | Zongye Zhang | Zongye Zhang, Wenrui Cai, Qingjie Liu, Yunhong Wang | SkeletonX: Data-Efficient Skeleton-based Action Recognition via
Cross-sample Feature Aggregation | Accepted by IEEE Transactions on Multimedia (TMM). 13 pages, 7
figures, 11 tables | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While current skeleton action recognition models demonstrate impressive
performance on large-scale datasets, their adaptation to new application
scenarios remains challenging. These challenges are particularly pronounced
when facing new action categories, diverse performers, and varied skeleton
layouts, leading to significant performance degeneration. Additionally, the
high cost and difficulty of collecting skeleton data make large-scale data
collection impractical. This paper studies one-shot and limited-scale learning
settings to enable efficient adaptation with minimal data. Existing approaches
often overlook the rich mutual information between labeled samples, resulting
in sub-optimal performance in low-data scenarios. To boost the utility of
labeled data, we identify the variability among performers and the commonality
within each action as two key attributes. We present SkeletonX, a lightweight
training pipeline that integrates seamlessly with existing GCN-based skeleton
action recognizers, promoting effective training under limited labeled data.
First, we propose a tailored sample pair construction strategy on two key
attributes to form and aggregate sample pairs. Next, we develop a concise and
effective feature aggregation module to process these pairs. Extensive
experiments are conducted on NTU RGB+D, NTU RGB+D 120, and PKU-MMD with various
GCN backbones, demonstrating that the pipeline effectively improves performance
when trained from scratch with limited data. Moreover, it surpasses previous
state-of-the-art methods in the one-shot setting, with only 1/10 of the
parameters and much fewer FLOPs. The code and data are available at:
https://github.com/zzysteve/SkeletonX
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:01:42 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zhang",
"Zongye",
""
],
[
"Cai",
"Wenrui",
""
],
[
"Liu",
"Qingjie",
""
],
[
"Wang",
"Yunhong",
""
]
] |
2504.11750 | Prabhu Vellaisamy | Prabhu Vellaisamy, Thomas Labonte, Sourav Chakraborty, Matt Turner,
Samantika Sury, and John Paul Shen | Characterizing and Optimizing LLM Inference Workloads on CPU-GPU Coupled
Architectures | Accepted for ISPASS 2025 | null | null | null | cs.DC cs.AI cs.AR cs.PF | http://creativecommons.org/licenses/by/4.0/ | Large language model (LLM)-based inference workloads increasingly dominate
data center costs and resource utilization. Therefore, understanding the
inference workload characteristics on evolving CPU-GPU coupled architectures is
crucial for optimization. This paper presents an in-depth analysis of LLM
inference behavior on loosely-coupled (PCIe A100/H100) and closely-coupled
(GH200) systems. We analyze performance dynamics using fine-grained
operator-to-kernel trace analysis, facilitated by our novel profiler SKIP and
metrics like Total Kernel Launch and Queuing Time (TKLQT). Results show that
closely-coupled (CC) GH200 significantly outperforms loosely-coupled (LC)
systems at large batch sizes, achieving 1.9x-2.7x faster prefill latency for
Llama 3.2-1B. However, our analysis also reveals that GH200 remains CPU-bound
up to 4x larger batch sizes than LC systems. In this extended CPU-bound region,
we identify the performance characteristics of the Grace CPU as a key factor
contributing to higher inference latency at low batch sizes on GH200. We
demonstrate that TKLQT accurately identifies this CPU/GPU-bound transition
point. Based on this analysis, we further show that kernel fusion offers
significant potential to mitigate GH200's low-batch latency bottleneck by
reducing kernel launch overhead. This detailed kernel-level characterization
provides critical insights for optimizing diverse CPU-GPU coupling strategies.
This work is an initial effort, and we plan to explore other major AI/DL
workloads that demand different degrees of CPU-GPU heterogeneous architectures.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:02:39 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Vellaisamy",
"Prabhu",
""
],
[
"Labonte",
"Thomas",
""
],
[
"Chakraborty",
"Sourav",
""
],
[
"Turner",
"Matt",
""
],
[
"Sury",
"Samantika",
""
],
[
"Shen",
"John Paul",
""
]
] |
2504.11753 | Artbazar Galtbayar | Artbazar Galtbayar, Kenji Yajima | The $L^p$-boundedness of wave operators for 4-th order Schr\"odinger
operators on $\mathbb{R}^2$, I | null | null | null | null | math-ph math.MP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We prove that high energy parts of wave operators for fourth order
Schr\"odinger operators $H=\Delta^2 + V(x)$ in $\mathbb{R}^2$ are bounded in
$L^p(\mathbb{R}^2)$ for $p\in(1,\infty)$.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:10:47 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Galtbayar",
"Artbazar",
""
],
[
"Yajima",
"Kenji",
""
]
] |
2504.11754 | Bo Yang | Zihui Zhang, Yafei Yang, Hongtao Wen, Bo Yang | GrabS: Generative Embodied Agent for 3D Object Segmentation without
Scene Supervision | ICLR 2025 Spotlight. Code and data are available at:
https://github.com/vLAR-group/GrabS | null | null | null | cs.CV cs.AI cs.LG cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the hard problem of 3D object segmentation in complex point clouds
without requiring human labels of 3D scenes for supervision. By relying on the
similarity of pretrained 2D features or external signals such as motion to
group 3D points as objects, existing unsupervised methods are usually limited
to identifying simple objects like cars or their segmented objects are often
inferior due to the lack of objectness in pretrained features. In this paper,
we propose a new two-stage pipeline called GrabS. The core concept of our
method is to learn generative and discriminative object-centric priors as a
foundation from object datasets in the first stage, and then design an embodied
agent to learn to discover multiple objects by querying against the pretrained
generative priors in the second stage. We extensively evaluate our method on
two real-world datasets and a newly created synthetic dataset, demonstrating
remarkable segmentation performance, clearly surpassing all existing
unsupervised methods.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:13:53 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Zhang",
"Zihui",
""
],
[
"Yang",
"Yafei",
""
],
[
"Wen",
"Hongtao",
""
],
[
"Yang",
"Bo",
""
]
] |
2504.11755 | Kandulapati Sriram | SD Gouse, M. V. R. Abhishek, K. Sriram | Asymmetric Cross-Correlation functions with delays in Sco X-1: Evidence
of possible Jet triggering | Accepted in Astrophysics & Space Science (Ap&SS) Journal | null | null | null | astro-ph.HE | http://creativecommons.org/licenses/by/4.0/ | The formation and origin of Jets from Z sources are not well understood,
although an X-ray-radio correlation has been observed. We analyzed a few
observations of Sco X-1 using the Rossi X-ray Timing Experiment Satellite. Out
of the 17 observations, 5 showed lags of a few 10s of seconds with an asymmetry
in the CCF between the soft and hard bands in their cross-correlation function
(CCF) analysis. Interestingly, during these observations, a ballistic-type
radio jet of Ultra-relativistic(UR) nature was reported. The observed lags and
associated cross-correlation coefficients were validated using simulations. The
rest of the 12 observations' CCFs were symmetric, and their associated Power
Density Spectrum (PDS) displayed Normal Branch(NBO)/Normal + Horizontal Branch
Oscillations(NBO+HBO). The X-ray spectral study of 2 obs. where radio core
emission was seen with abrupt variation in both PDS and CCF showed a black-body
flux variation of 10-20%, but no spectral parameter varied. We suggest that the
ballistic jet caused a disturbance in the inner accretion region, viz., the
Boundary Layer plausibly along with the Corona, that caused the lags observed
in the CCFs along with the absence of any oscillatory features in the PDS
tracing only a flat-topped noise. Whereas the regions with no lags showed a
persistent NBO/NBO+HBO feature, suggesting a steady accretion flow. Although
the UR jet can't be related to NBO or HBO, we suggest it could be related to
the phenomena that cause NBO since the majority of PDSs displayed NBO. We also
constrain the inner accretion region size to 20-30 km, which is responsible for
the accretion ejecta in Sco X-1.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:18:21 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gouse",
"SD",
""
],
[
"Abhishek",
"M. V. R.",
""
],
[
"Sriram",
"K.",
""
]
] |
2504.11756 | Lixiang Chen | Lixiang Chen, Yuxing Han, Yu Chen, Xing Chen, Chengcheng Yang, Weining
Qian | AQETuner: Reliable Query-level Configuration Tuning for Analytical Query
Engines | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Modern analytical query engines (AQEs) are essential for large-scale data
analysis and processing. These systems usually provide numerous query-level
tunable knobs that significantly affect individual query performance. While
several studies have explored automatic DBMS configuration tuning, they have
several limitations to handle query-level tuning. Firstly, they fail to capture
how knobs influence query plans, which directly affect query performance.
Secondly, they overlook query failures during the tuning processing, resulting
in low tuning efficiency. Thirdly, they struggle with cold-start problems for
new queries, leading to prolonged tuning time. To address these challenges, we
propose AQETuner, a novel Bayesian Optimization-based system tailored for
reliable query-level knob tuning in AQEs. AQETuner first applies the attention
mechanisms to jointly encode the knobs and plan query, effectively identifying
the impact of knobs on plan nodes. Then, AQETuner employs a dual-task Neural
Process to predict both query performance and failures, leveraging their
interactions to guide the tuning process. Furthermore, AQETuner utilizes
Particle Swarm Optimization to efficiently generate high-quality samples in
parallel during the initial tuning stage for the new queries. Experimental
results show that AQETuner significantly outperforms existing methods, reducing
query latency by up to 23.7% and query failures by up to 51.2%.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:18:25 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Chen",
"Lixiang",
""
],
[
"Han",
"Yuxing",
""
],
[
"Chen",
"Yu",
""
],
[
"Chen",
"Xing",
""
],
[
"Yang",
"Chengcheng",
""
],
[
"Qian",
"Weining",
""
]
] |
2504.11757 | Pradeep Singh Ph.D. | Pradeep Singh, Ashutosh Kumar, Sutirtha Ghosh, Hrishit B P,
Balasubramanian Raman | Dynamics and Computational Principles of Echo State Networks: A
Mathematical Perspective | 100 pages, 17 tables, 41 figures | null | null | null | cs.LG cs.NE | http://creativecommons.org/licenses/by/4.0/ | Reservoir computing (RC) represents a class of state-space models (SSMs)
characterized by a fixed state transition mechanism (the reservoir) and a
flexible readout layer that maps from the state space. It is a paradigm of
computational dynamical systems that harnesses the transient dynamics of
high-dimensional state spaces for efficient processing of temporal data. Rooted
in concepts from recurrent neural networks, RC achieves exceptional
computational power by decoupling the training of the dynamic reservoir from
the linear readout layer, thereby circumventing the complexities of
gradient-based optimization. This work presents a systematic exploration of RC,
addressing its foundational properties such as the echo state property, fading
memory, and reservoir capacity through the lens of dynamical systems theory. We
formalize the interplay between input signals and reservoir states,
demonstrating the conditions under which reservoirs exhibit stability and
expressive power. Further, we delve into the computational trade-offs and
robustness characteristics of RC architectures, extending the discussion to
their applications in signal processing, time-series prediction, and control
systems. The analysis is complemented by theoretical insights into
optimization, training methodologies, and scalability, highlighting open
challenges and potential directions for advancing the theoretical underpinnings
of RC.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:28:05 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Singh",
"Pradeep",
""
],
[
"Kumar",
"Ashutosh",
""
],
[
"Ghosh",
"Sutirtha",
""
],
[
"P",
"Hrishit B",
""
],
[
"Raman",
"Balasubramanian",
""
]
] |
2504.11758 | The Anh Bui | The Anh Bui | Hardy spaces, Campanato spaces and higher order Riesz transforms
associated with Bessel operators | 35 pages. arXiv admin note: text overlap with arXiv:2504.09867 | null | null | null | math.CA | http://creativecommons.org/licenses/by/4.0/ | Let $\nu = (\nu_1, \ldots, \nu_n) \in (-1/2, \infty)^n$, with $n \ge 1$, and
let $\Delta_\nu$ be the multivariate Bessel operator defined by
\[
\Delta_{\nu} = -\sum_{j=1}^n\left( \frac{\partial^2}{\partial x_j^2} -
\frac{\nu_j^2 - 1/4}{x_j^2} \right).
\]
In this paper, we develop the theory of Hardy spaces and BMO-type spaces
associated with the Bessel operator $\Delta_\nu$. We then study the
higher-order Riesz transforms associated with $\Delta_\nu$. First, we show that
these transforms are Calder\'on-Zygmund operators. We further prove that they
are bounded on the Hardy spaces and BMO-type spaces associated with
$\Delta_\nu$.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:34:41 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Bui",
"The Anh",
""
]
] |
2504.11761 | Masahiro Tanaka | Masahiro Tanaka | Delayed Acceptance Markov Chain Monte Carlo for Robust Bayesian Analysis | null | null | null | null | stat.CO | http://creativecommons.org/licenses/by/4.0/ | This study introduces a computationally efficient algorithm, delayed
acceptance Markov chain Monte Carlo (DA-MCMC), designed to improve posterior
simulation in quasi-Bayesian inference. Quasi-Bayesian methods, which do not
require fully specifying a probabilistic model, are often computationally
expensive owing to the need to evaluate the inverse and determinant of large
covariance matrices. DA-MCMC addresses this challenge by employing a two-stage
process: In the first stage, proposals are screened using an approximate
posterior, whereas a final acceptance or rejection decision is made in the
second stage based on the exact target posterior. This reduces the need for
costly matrix computations, thereby improving efficiency without sacrificing
accuracy. We demonstrate the effectiveness of DA-MCMC through applications to
both synthetic and real data. The results demonstrate that, although DA-MCMC
slightly reduces the effective sample size per iteration compared with the
standard MCMC, it achieves substantial improvement in terms of effective sample
size per second, approximately doubling the efficiency. This makes DA-MCMC
particularly useful for cases where posterior simulation is computationally
intensive. Thus, the DA-MCMC algorithm offers a significant advancement in
computational efficiency for quasi-Bayesian inference, making it a valuable
tool for robust Bayesian analysis.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:40:17 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Tanaka",
"Masahiro",
""
]
] |
2504.11762 | Ruijuan Xiao | Zicun Li, Xinguo Ren, Jinbin Li, Ruijuan Xiao and Hong Li | Gas-solid Reaction Dynamics on Li$_6$PS$_5$Cl Surfaces: A Case Study of
the Influence of CO$_2$ and CO$_2$/O$_2$ Atmospheres Using AIMD and MLFF
Simulations | null | null | null | null | physics.chem-ph cond-mat.mtrl-sci | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, rapid progress has been made in solid-state lithium
batteries. Among various technologies, coating the surface of electrodes or
electrolytes has proven to be an effective method to enhance interfacial
stability and improve battery cycling performance. Recent experimental studies
showed that gas-solid reactions offer a convenient approach to form modified
coating layers on the solid electrolyte. Here, we performed computational
simulations to investigate this surface reaction process. Specifically, we
simulated the gas-solid reactions of Li$_6$PS$_5$Cl(LPSC) solid-state
electrolytes in pure CO$_2$ and in mixed CO$_2$/O$_2$ atmospheres using
ab-initio molecular dynamics (AIMD) and machine-learning force fields
(MLFF)-accelerated molecular dynamics (MD) approaches. In the former case, LPSC
surfaces primarily form Li$_2$CO$_2$S because it is difficult to dissociate
another oxygen atom from the second CO$_2$ molecule. While in CO$_2$/O$_2$
mixed atmosphere, O$_2$ molecules preferentially adsorb onto LPSC, which
supplies oxygen sites for subsequent CO$_2$ adsorption to form carbonate
-CO$_3$ units. This reaction pathway ultimately generates an interfacial
product dominated by Li$_2$CO$_3$. These coatings exhibit distinct electronic
and ionic conductivity characteristics, allowing the possibility to control
coating compositions and configurations by adjusting the gas-solid reactions.
Key criteria for applying this strategy are extracted from the current
research.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:45:40 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Li",
"Zicun",
""
],
[
"Ren",
"Xinguo",
""
],
[
"Li",
"Jinbin",
""
],
[
"Xiao",
"Ruijuan",
""
],
[
"Li",
"Hong",
""
]
] |
2504.11763 | Aoran Liu | Aoran Liu, Kun Hu, Clinton Mo, Changyang Li, Zhiyong Wang | Extended Short- and Long-Range Mesh Learning for Fast and Generalized
Garment Simulation | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | 3D garment simulation is a critical component for producing cloth-based
graphics. Recent advancements in graph neural networks (GNNs) offer a promising
approach for efficient garment simulation. However, GNNs require extensive
message-passing to propagate information such as physical forces and maintain
contact awareness across the entire garment mesh, which becomes computationally
inefficient at higher resolutions. To address this, we devise a novel GNN-based
mesh learning framework with two key components to extend the message-passing
range with minimal overhead, namely the Laplacian-Smoothed Dual Message-Passing
(LSDMP) and the Geodesic Self-Attention (GSA) modules. LSDMP enhances
message-passing with a Laplacian features smoothing process, which efficiently
propagates the impact of each vertex to nearby vertices. Concurrently, GSA
introduces geodesic distance embeddings to represent the spatial relationship
between vertices and utilises attention mechanisms to capture global mesh
information. The two modules operate in parallel to ensure both short- and
long-range mesh modelling. Extensive experiments demonstrate the
state-of-the-art performance of our method, requiring fewer layers and lower
inference latency.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:56:01 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Liu",
"Aoran",
""
],
[
"Hu",
"Kun",
""
],
[
"Mo",
"Clinton",
""
],
[
"Li",
"Changyang",
""
],
[
"Wang",
"Zhiyong",
""
]
] |
2504.11764 | SunHyun Youn | Sun-Hyun Youn | Probing the Abyss of the Quantum Vacuum: A Quest for Fluctuation-Free
Domains | 18pages, 6 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The modification of electromagnetic vacuum fluctuations by boundary
conditions is a fundamental prediction of quantum electrodynamics (QED).
However, direct experimental verification in the optical regime is hindered by
the need for sub-wavelength spatial resolution. Here, we present a novel
approach to indirectly probe the spatial distribution of vacuum fluctuations by
leveraging radio-frequency (RF) measurements of thermal noise. At RF
frequencies, thermal noise, which occupies the same electromagnetic modes as
vacuum fluctuations and is similarly shaped by boundary conditions, dominates
the single-photon energy. By precisely characterizing the spatial distribution
of thermal noise near a conducting boundary, we infer the corresponding
modification of vacuum modes and, consequently, the vacuum fluctuations
themselves. Our experimental setup, employing coaxial cables and RF splitters
to mimic optical mirrors and beam splitters, enables controlled manipulation of
boundary conditions and precise thermal noise measurements. We observe a
reduction in thermal noise near the conducting boundary, providing indirect
evidence for the theoretically predicted suppression of vacuum fluctuations.
This work establishes a new experimental framework for investigating QED
effects in constrained environments, with potential implications for
quantum-limited precision measurements, such as gravitational wave detection
and intensity-stabilized light sources. This RF approach circumvents the
limitations of optical techniques and opens new avenues for exploring
fundamental quantum phenomena.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:59:14 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Youn",
"Sun-Hyun",
""
]
] |
2504.11765 | Hyungwoo Lee | Hyungwoo Lee (1), Kihyun Kim (1), Jinwoo Kim (1), Jungmin So (1),
Myung-Hoon Cha (2), Hong-Yeon Kim (2), James J. Kim (3), Youngjae Kim (1)
((1) Dept. of Computer Science and Engineering, Sogang University, Seoul,
Republic of Korea, (2) ETRI, Daejeon, Republic of Korea, (3) Soteria Inc) | Shared Disk KV Cache Management for Efficient Multi-Instance Inference
in RAG-Powered LLMs | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent large language models (LLMs) face increasing inference latency as
input context length and model size continue to grow. In particular, the
retrieval-augmented generation (RAG) technique, which enhances LLM responses by
incorporating external knowledge, exacerbates this issue by significantly
increasing the number of input tokens. This expansion in token length leads to
a substantial rise in computational overhead, particularly during the prefill
stage, resulting in prolonged time-to-first-token (TTFT). To address this
issue, this paper proposes a method to reduce TTFT by leveraging a disk-based
key-value (KV) cache to lessen the computational burden during the prefill
stage. We also introduce a disk-based shared KV cache management system, called
Shared RAG-DCache, for multi-instance LLM RAG service environments. This
system, together with an optimal system configuration, improves both throughput
and latency under given resource constraints. Shared RAG-DCache exploits the
locality of documents related to user queries in RAG, as well as the queueing
delay in LLM inference services. It proactively generates and stores disk KV
caches for query-related documents and shares them across multiple LLM
instances to enhance inference performance. In experiments on a single host
equipped with 2 GPUs and 1 CPU, Shared RAG-DCache achieved a 15~71% increase in
throughput and up to a 12~65% reduction in latency, depending on the resource
configuration.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:59:18 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Lee",
"Hyungwoo",
""
],
[
"Kim",
"Kihyun",
""
],
[
"Kim",
"Jinwoo",
""
],
[
"So",
"Jungmin",
""
],
[
"Cha",
"Myung-Hoon",
""
],
[
"Kim",
"Hong-Yeon",
""
],
[
"Kim",
"James J.",
""
],
[
"Kim",
"Youngjae",
""
]
] |
2504.11766 | Shinji Ohno | Shinji Ohno and Yuuki Sasaki | On cohomogeneity one hyperpolar actions related to $G_{2}$ | null | null | null | null | math.DG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cohomogeneity one actions on irreducible Riemannian symmetric spaces of
compact type are classified into three cases: Hermann actions, actions induced
by the linear isotropy representation of a Riemannian symmetric space of rank
2, and exceptional actions. In this paper, we consider exceptional actions
related to the exceptional compact Lie group $G_{2}$ and investigate some
properties of their orbits as Riemannian submanifolds. In particular, we
examine the principal curvatures of principal orbits and classify principal
orbits that are minimal, austere, weakly reflective, and proper biharmonic.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:03:19 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Ohno",
"Shinji",
""
],
[
"Sasaki",
"Yuuki",
""
]
] |
2504.11767 | Qinyan Shen | Qinyan Shen, Karl Gregory, Xianzheng Huang | Post-selection Inference in Regression Models for Group Testing Data | null | Biometrics. 2024 Jul 1;80(3):ujae101 | 10.1093/biomtc/ujae101 | null | stat.ME | http://creativecommons.org/licenses/by/4.0/ | We develop methodology for valid inference after variable selection in
logistic regression when the responses are partially observed, that is, when
one observes a set of error-prone testing outcomes instead of the true values
of the responses. Aiming at selecting important covariates while accounting for
missing information in the response data, we apply the expectation-maximization
algorithm to compute maximum likelihood estimators subject to LASSO
penalization. Subsequent to variable selection, we make inferences on the
selected covariate effects by extending post-selection inference methodology
based on the polyhedral lemma. Empirical evidence from our extensive simulation
study suggests that our post-selection inference results are more reliable than
those from naive inference methods that use the same data to perform variable
selection and inference without adjusting for variable selection.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:08:57 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Shen",
"Qinyan",
""
],
[
"Gregory",
"Karl",
""
],
[
"Huang",
"Xianzheng",
""
]
] |
2504.11768 | Kabeer Manali Rahul | Kabeer Manali Rahul | Representability theorems via metric techniques | null | null | null | null | math.AG math.CT | http://creativecommons.org/licenses/by/4.0/ | We prove new Brown representability theorems for triangulated categories
using metric techniques as introduced in the work of Neeman. In the setting of
algebraic geometry, this gives us new representability theorems for homological
and cohomological functors on the bounded derived category of coherent sheaves.
To prove this result, we introduce a generalisation of the notion of an
approximable triangulated category.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:11:38 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Rahul",
"Kabeer Manali",
""
]
] |
2504.11769 | Xuefen Chi | Yuchao Dang, Xuefen Chi | Sliding Block Martingale based Multi-hop Delay QoS Analysis | null | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-nd/4.0/ | With the growing density of wireless networks and demand for multi-hop
transmissions, precise delay Quality of Service (QoS) analysis has become a
critical challenge. This paper introduces a multi-hop delay QoS analysis
framework based on the sliding block martingale, addressing the loose boundary
issue of prior methods that rely on service process martingales and min-plus
transformations. By constructing a sliding block martingale with a window, we
capture both long-term trends and short-term fluctuations in the backlog,
eliminating the reliance on the generalized incremental property. The framework
redefines delay unreliability events using cascading attributes, deriving a
more compact Delay Unreliability Probability Boundary (DUPB). To improve the
efficiency of solving the key parameter $\theta$, we propose a Micrometric
Intervals based Supermartingale Upcrossing Estimate Theorem, quantifying the
upper bound of event occurrence frequency to constrain the solution space of
$\theta$. Simulations based on the 3GPP UMa/UMi channel model validate the
framework's effectiveness. Results show that in 2-7 hop scenarios, the maximum
deviation between theoretical boundaries and Monte Carlo simulations is $4.116
\times 10^{-5}$, with a lower RMSE than existing methods. Iteration count and
CPU time for solving $\theta$ are reduced by $59\%-72\%$ and $60.6\%-70.5\%$,
respectively, improving analysis efficiency. Furthermore, the derived minimum
service rate for multi-hop queues offers a valuable reference for resource
allocation. The framework demonstrates high accuracy, scalability, and
practicality in complex multi-hop networks.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:13:53 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Dang",
"Yuchao",
""
],
[
"Chi",
"Xuefen",
""
]
] |
2504.11770 | Takashi Morita | Takashi Morita and Timothy J. O'Donnell | Unsupervised Classification of English Words Based on Phonological
Information: Discovery of Germanic and Latinate Clusters | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cross-linguistically, native words and loanwords follow different
phonological rules. In English, for example, words of Germanic and Latinate
origin exhibit different stress patterns, and a certain syntactic structure is
exclusive to Germanic verbs. When seeing them as a cognitive model, however,
such etymology-based generalizations face challenges in terms of learnability,
since the historical origins of words are presumably inaccessible information
for general language learners. In this study, we present computational evidence
indicating that the Germanic-Latinate distinction in the English lexicon is
learnable from the phonotactic information of individual words. Specifically,
we performed an unsupervised clustering on corpus-extracted words, and the
resulting word clusters largely aligned with the etymological distinction. The
model-discovered clusters also recovered various linguistic generalizations
documented in the previous literature regarding the corresponding etymological
classes. Moreover, our findings also uncovered previously unrecognized features
of the quasi-etymological clusters, offering novel hypotheses for future
experimental studies.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:20:08 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Morita",
"Takashi",
""
],
[
"O'Donnell",
"Timothy J.",
""
]
] |
2504.11771 | Shuyue Fu | Shuyue Fu and Yihan Peng and Shengping Gong and Peng Shi | Design and Continuation of Nonlinear Teardrop Hovering Formation along
the Near Rectilinear Halo Orbit | null | null | null | null | math.OC | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This short communication is devoted to the design and continuation of a
teardrop hovering formation along the Near Rectilinear Halo orbit and provides
further insights into future on-orbit services in the cislunar space. First, we
extend the concept of the teardrop hovering formation to scenarios along the
Near Rectilinear Halo orbit in the Earth-Moon circular restricted three-body
problem. Then, we develop two methods for designing these formations based on
the nonlinear model for relative motion. The first method addresses the design
of the teardrop hovering formations with relatively short revisit distances,
while the second method continues hovering trajectories from short to longer
revisit distances. In particular, new continuation method is developed to meet
the design requirements of this new scenario. Simulation results verify the
effectiveness of the proposed methods, and a near-natural teardrop hovering
formation is achieved by considering the dynamical properties near the NRHO.
Comparisons between design results obtained using linear and nonlinear models
further strengthen the necessity of using the nonlinear model.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:20:48 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Fu",
"Shuyue",
""
],
[
"Peng",
"Yihan",
""
],
[
"Gong",
"Shengping",
""
],
[
"Shi",
"Peng",
""
]
] |
2504.11772 | Kabeer Manali Rahul | Kabeer Manali Rahul | Admissible subcategories and metric techniques | null | null | null | null | math.AG math.CT | http://creativecommons.org/licenses/by/4.0/ | In this work, we provide a way of constructing new semiorthogonal
decompositions using metric techniques (\`a la Neeman). Given a semiorthogonal
decomposition on a category with a special kind of metric, which we call a
compressible metric, we can construct new semiorthogonal decomposition on a
category constructed from the given one using the aforementioned metric. In the
algebro-geometric setting, this gives us a way of producing new semiorthogonal
decompositions on various small triangulated categories associated to a scheme,
if we are given one. In the general setting, the work is related to that of
Sun-Zhang, while its applications to algebraic geometry are related to the work
of Bondarko and Kuznetsov-Shinder.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:24:55 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Rahul",
"Kabeer Manali",
""
]
] |
2504.11773 | Yiran Wang | Yiran Wang, Jiaqi Li, Chaoyi Hong, Ruibo Li, Liusheng Sun, Xiao Song,
Zhe Wang, Zhiguo Cao, Guosheng Lin | TacoDepth: Towards Efficient Radar-Camera Depth Estimation with
One-stage Fusion | Accepted by CVPR 2025 (Oral Presentation) | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Radar-Camera depth estimation aims to predict dense and accurate metric depth
by fusing input images and Radar data. Model efficiency is crucial for this
task in pursuit of real-time processing on autonomous vehicles and robotic
platforms. However, due to the sparsity of Radar returns, the prevailing
methods adopt multi-stage frameworks with intermediate quasi-dense depth, which
are time-consuming and not robust. To address these challenges, we propose
TacoDepth, an efficient and accurate Radar-Camera depth estimation model with
one-stage fusion. Specifically, the graph-based Radar structure extractor and
the pyramid-based Radar fusion module are designed to capture and integrate the
graph structures of Radar point clouds, delivering superior model efficiency
and robustness without relying on the intermediate depth results. Moreover,
TacoDepth can be flexible for different inference modes, providing a better
balance of speed and accuracy. Extensive experiments are conducted to
demonstrate the efficacy of our method. Compared with the previous
state-of-the-art approach, TacoDepth improves depth accuracy and processing
speed by 12.8% and 91.8%. Our work provides a new perspective on efficient
Radar-Camera depth estimation.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:25:04 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Wang",
"Yiran",
""
],
[
"Li",
"Jiaqi",
""
],
[
"Hong",
"Chaoyi",
""
],
[
"Li",
"Ruibo",
""
],
[
"Sun",
"Liusheng",
""
],
[
"Song",
"Xiao",
""
],
[
"Wang",
"Zhe",
""
],
[
"Cao",
"Zhiguo",
""
],
[
"Lin",
"Guosheng",
""
]
] |
2504.11774 | Ziyue Shen | Keke Gai, Ziyue Shen, Jing Yu, Liehuang Zhu, Qi Wu | PCDiff: Proactive Control for Ownership Protection in Diffusion Models
with Watermark Compatibility | null | null | null | null | cs.CR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the growing demand for protecting the intellectual property (IP) of
text-to-image diffusion models, we propose PCDiff -- a proactive access control
framework that redefines model authorization by regulating generation quality.
At its core, PCDIFF integrates a trainable fuser module and hierarchical
authentication layers into the decoder architecture, ensuring that only users
with valid encrypted credentials can generate high-fidelity images. In the
absence of valid keys, the system deliberately degrades output quality,
effectively preventing unauthorized exploitation.Importantly, while the primary
mechanism enforces active access control through architectural intervention,
its decoupled design retains compatibility with existing watermarking
techniques. This satisfies the need of model owners to actively control model
ownership while preserving the traceability capabilities provided by
traditional watermarking approaches.Extensive experimental evaluations confirm
a strong dependency between credential verification and image quality across
various attack scenarios. Moreover, when combined with typical post-processing
operations, PCDIFF demonstrates powerful performance alongside conventional
watermarking methods. This work shifts the paradigm from passive detection to
proactive enforcement of authorization, laying the groundwork for IP management
of diffusion models.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 05:28:50 GMT"
}
] | 2025-04-17T00:00:00 | [
[
"Gai",
"Keke",
""
],
[
"Shen",
"Ziyue",
""
],
[
"Yu",
"Jing",
""
],
[
"Zhu",
"Liehuang",
""
],
[
"Wu",
"Qi",
""
]
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.