id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
sequence |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2503.17436 | Cristian Cioflan | Lars Kr\"oger, Cristian Cioflan, Victor Kartsch and Luca Benini | On-Device Federated Continual Learning on RISC-V-based Ultra-Low-Power
SoC for Intelligent Nano-Drone Swarms | 2 pages, 2 tables, 1 figure. Accepted as a poster at the RISC-V
Summit Europe 2025 | null | null | null | cs.LG cs.CV cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | RISC-V-based architectures are paving the way for efficient On-Device
Learning (ODL) in smart edge devices. When applied across multiple nodes, ODL
enables the creation of intelligent sensor networks that preserve data privacy.
However, developing ODL-capable, battery-operated embedded platforms presents
significant challenges due to constrained computational resources and limited
device lifetime, besides intrinsic learning issues such as catastrophic
forgetting. We face these challenges by proposing a regularization-based
On-Device Federated Continual Learning algorithm tailored for multiple
nano-drones performing face recognition tasks. We demonstrate our approach on a
RISC-V-based 10-core ultra-low-power SoC, optimizing the ODL computational
requirements. We improve the classification accuracy by 24% over naive
fine-tuning, requiring 178 ms per local epoch and 10.5 s per global epoch,
demonstrating the effectiveness of the architecture for this task.
| [
{
"version": "v1",
"created": "Fri, 21 Mar 2025 15:53:57 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 23:02:42 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Kröger",
"Lars",
""
],
[
"Cioflan",
"Cristian",
""
],
[
"Kartsch",
"Victor",
""
],
[
"Benini",
"Luca",
""
]
] |
2503.17614 | Jung Keun Ahn | Woo Seung Jung, Yudai Ichikawa, Byung Min Kang, Jung Keun Ahn, Sung
Wook Choi, Manami Fujita, Takeshi Harada, Shoichi Hasegawa, Shuhei Hayakawa,
Sang Hoon Hwang, Kenneth Hicks, Ken'ichi Imai, Yuji Ishikawa, Shunsuke
Kajikawa, Kento Kamada, Shin Hyung Kim, Tomomasa Kitaoka, Jaeyong Lee, Jong
Won Lee, Koji Miwa, Taito Morino, Fumiya Oura, Hiroyuki Sako, Tamao Sakao,
Masayoshi Saito, Susumu Sato, Hirokazu Tamura, Kiyoshi Tanida, Toshiyuki
Takahashi, Mifuyu Ukai, Shunsuke Wada, Takeshi O. Yamamoto, Seongbae Yang | Cross section Measurements for $^{12}$C$(K^-, K^+\Xi^-)$ and
$^{12}$C$(K^-, K^+\Lambda\Lambda)$ Reactions at 1.8 GeV$/c$ | null | null | null | null | nucl-ex hep-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a measurement of the production of $\Xi^-$ and $\Lambda\Lambda$ in
the $^{12}$C$(K^-, K^+)$ reaction at an incident beam momentum of 1.8
GeV/$\mathit{c}$, based on high-statistics data from J-PARC E42. The cross
section for the $^{12}$C$(K^-, K^+\Xi^-)$ reaction, compared to the inclusive
$^{12}$C$(K^-, K^+)$ reaction cross section, indicates that the $\Xi^-$
escaping probability peaks at 70\% in the energy region of $E_\Xi=$100 to 150
MeV above the $\Xi^-$ emission threshold. A classical approach using eikonal
approximation shows that the total cross sections for $\Xi^-$ inelastic
scattering ranges between 42 mb and 23 mb in the $\Xi^-$ momentum range from
0.4 to 0.6 GeV/c. Furthermore, based on the relative cross section for the
$^{12}$C$(K^-, K^+\Lambda\Lambda)$ reaction, the total cross section for
$\Xi^-p\to\Lambda\Lambda$ is estimated in the same approach to vary between 2.2
mb and 1.0 mb in the momentum range of 0.40 to 0.65 GeV/c. Specifically, a
cross section of 1.0 mb in the momentum range of 0.5 to 0.6 GeV/c imposes a
constraint on the upper bound of the decay width of the $\Xi^-$ particle in
infinite nuclear matter, revealing $\Gamma_\Xi< \sim 0.6$ MeV.
| [
{
"version": "v1",
"created": "Sat, 22 Mar 2025 02:20:23 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 02:33:57 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Jung",
"Woo Seung",
""
],
[
"Ichikawa",
"Yudai",
""
],
[
"Kang",
"Byung Min",
""
],
[
"Ahn",
"Jung Keun",
""
],
[
"Choi",
"Sung Wook",
""
],
[
"Fujita",
"Manami",
""
],
[
"Harada",
"Takeshi",
""
],
[
"Hasegawa",
"Shoichi",
""
],
[
"Hayakawa",
"Shuhei",
""
],
[
"Hwang",
"Sang Hoon",
""
],
[
"Hicks",
"Kenneth",
""
],
[
"Imai",
"Ken'ichi",
""
],
[
"Ishikawa",
"Yuji",
""
],
[
"Kajikawa",
"Shunsuke",
""
],
[
"Kamada",
"Kento",
""
],
[
"Kim",
"Shin Hyung",
""
],
[
"Kitaoka",
"Tomomasa",
""
],
[
"Lee",
"Jaeyong",
""
],
[
"Lee",
"Jong Won",
""
],
[
"Miwa",
"Koji",
""
],
[
"Morino",
"Taito",
""
],
[
"Oura",
"Fumiya",
""
],
[
"Sako",
"Hiroyuki",
""
],
[
"Sakao",
"Tamao",
""
],
[
"Saito",
"Masayoshi",
""
],
[
"Sato",
"Susumu",
""
],
[
"Tamura",
"Hirokazu",
""
],
[
"Tanida",
"Kiyoshi",
""
],
[
"Takahashi",
"Toshiyuki",
""
],
[
"Ukai",
"Mifuyu",
""
],
[
"Wada",
"Shunsuke",
""
],
[
"Yamamoto",
"Takeshi O.",
""
],
[
"Yang",
"Seongbae",
""
]
] |
2503.17891 | Fatma Nisa Bostanc{\i} | F. Nisa Bostanc{\i}, O\u{g}uzhan Canpolat, Ataberk Olgun, \.Ismail
Emir Y\"uksel, Konstantinos Kanellopoulos, Mohammad Sadrosadati, A. Giray
Ya\u{g}l{\i}k\c{c}{\i}, Onur Mutlu | Understanding and Mitigating Side and Covert Channel Vulnerabilities
Introduced by RowHammer Defenses | This work was submitted to ISCA 2025 on November 22, 2024 | null | null | null | cs.CR cs.AR | http://creativecommons.org/licenses/by/4.0/ | DRAM chips are vulnerable to read disturbance phenomena (e.g., RowHammer and
RowPress), where repeatedly accessing or keeping open a DRAM row causes
bitflips in nearby rows. Attackers leverage RowHammer bitflips in real systems
to take over systems and leak data. Consequently, many prior works propose
mitigations, including recent DDR specifications introducing new mitigations
(e.g., PRAC and RFM). For robust operation, it is critical to analyze other
security implications of RowHammer mitigations. Unfortunately, no prior work
analyzes the timing covert and side channel vulnerabilities introduced by
RowHammer mitigations.
This paper presents the first analysis and evaluation of timing covert and
side channel vulnerabilities introduced by state-of-the-art RowHammer
mitigations. We demonstrate that RowHammer mitigations' preventive actions have
two fundamental features that enable timing channels. First, preventive actions
reduce DRAM bandwidth availability, resulting in longer memory latencies.
Second, preventive actions can be triggered on demand depending on memory
access patterns.
We introduce LeakyHammer, a new class of attacks that leverage the RowHammer
mitigation-induced memory latency differences to establish communication
channels and leak secrets. First, we build two covert channel attacks
exploiting two state-of-the-art RowHammer mitigations, achieving 38.6 Kbps and
48.6 Kbps channel capacity. Second, we demonstrate a website fingerprinting
attack that identifies visited websites based on the RowHammer-preventive
actions they cause. We propose and evaluate two countermeasures against
LeakyHammer and show that fundamentally mitigating LeakyHammer induces large
overheads in highly RowHammer-vulnerable systems. We believe and hope our work
can enable and aid future work on designing robust systems against RowHammer
mitigation-based side and covert channels.
| [
{
"version": "v1",
"created": "Sun, 23 Mar 2025 00:26:47 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 16:34:57 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Bostancı",
"F. Nisa",
""
],
[
"Canpolat",
"Oğuzhan",
""
],
[
"Olgun",
"Ataberk",
""
],
[
"Yüksel",
"İsmail Emir",
""
],
[
"Kanellopoulos",
"Konstantinos",
""
],
[
"Sadrosadati",
"Mohammad",
""
],
[
"Yağlıkçı",
"A. Giray",
""
],
[
"Mutlu",
"Onur",
""
]
] |
2503.18869 | Rui Xie | Rui Xie, Asad Ul Haq, Linsen Ma, Yunhua Fang, Zirak Burzin Engineer,
Liu Liu, Tong Zhang | Reimagining Memory Access for LLM Inference: Compression-Aware Memory
Controller Design | 9 pages, 11 figures | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The efficiency of Large Language Model~(LLM) inference is often constrained
by substantial memory bandwidth and capacity demands. Existing techniques, such
as pruning, quantization, and mixture of experts/depth, reduce memory capacity
and/or bandwidth consumption at the cost of slight degradation in inference
quality. This paper introduces a design solution that further alleviates memory
bottlenecks by enhancing the on-chip memory controller in AI accelerators to
achieve two main objectives: (1) significantly reducing memory capacity and
bandwidth usage through lossless block compression~(e.g., LZ4 and ZSTD) of
model weights and key-value (KV) cache without compromising inference quality,
and (2) enabling memory bandwidth and energy consumption to scale
proportionally with context-dependent dynamic quantization. These goals are
accomplished by equipping the on-chip memory controller with mechanisms to
improve fine-grained bit-level accessibility and compressibility of weights and
KV cache through LLM-aware configuration of in-memory placement and
representation. Experimental results on publicly available LLMs demonstrate the
effectiveness of this approach, showing memory footprint reductions of 25.2\%
for model weights and 46.9\% for KV cache. In addition, our hardware prototype
at 4\,GHz and 32 lanes (7\,nm) achieves 8\,TB/s throughput with a modest area
overhead (under 3.8\,mm\(^2\)), which underscores the viability of LLM-aware
memory control as a key to efficient large-scale inference.
| [
{
"version": "v1",
"created": "Mon, 24 Mar 2025 16:44:32 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Mar 2025 17:48:14 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Apr 2025 22:13:07 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Xie",
"Rui",
""
],
[
"Haq",
"Asad Ul",
""
],
[
"Ma",
"Linsen",
""
],
[
"Fang",
"Yunhua",
""
],
[
"Engineer",
"Zirak Burzin",
""
],
[
"Liu",
"Liu",
""
],
[
"Zhang",
"Tong",
""
]
] |
2503.19250 | Charlie Wu | Charlie Wu | Minimal Energy Local Systems on Curves | fixed typos and added some references, results are unchanged; 33
pages, comments welcome! | null | null | null | math.AG math.GT | http://creativecommons.org/licenses/by/4.0/ | Let $\Sigma_{g,d}$ an orientable topological surface of genus $g$ with $d$
punctures. When $g = 0$, Deroin and Tholozan studied the class of supra-maximal
representations $\pi_1(\Sigma_{0,d})\to \mathrm{PSL}_2(\mathbb{R})$, and they
showed that the supra-maximal representations form a compact component of a
real relative character variety. We study a collection of rank $n$ local
systems on $\Sigma_{g,d}$ which we call of minimal energy. These are
generalizations of supra-maximal representations, and underlie polarizable
complex variations of Hodge structure for any choice of complex structure on
$\Sigma_{g,d}$. Like the supra-maximal representations, the minimal energy
local systems form a compact connected component of a real relative character
variety.
We show that when the local monodromy data around the punctures is chosen to
be unitary and generic, and the relative character variety is nonempty, these
minimal energy local systems always exist. When $g > 0$ we show that the
minimal energy local systems come from unitary representations of
$\pi_1(\Sigma_{g,d})$. If $g = 0$ we show that they do not always come from
unitary representations, and we study their structure in general.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2025 01:20:58 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 20:04:00 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Wu",
"Charlie",
""
]
] |
2503.20003 | Diana Prado Lopes Aude Craik | Diana P. L. Aude Craik | An entanglement protocol to measure atomic parity violation at sub 0.1%
precision | Text and Fig. 2 updated for clarity and to match version submitted to
journal | null | null | null | quant-ph hep-ex physics.atom-ph | http://creativecommons.org/licenses/by/4.0/ | This paper proposes a scheme to measure atomic parity violation (APV) in
barium ions at <0.1% precision. The scheme is based on using multi-ion
entangled states to common-mode reject parity-conserving systematic shifts and
selectively detect a parity-violating vector light shift. This measurement
protocol eliminates the need to suppress a leading systematic by 11 orders of
magnitude, as is required in the single-ion measurement scheme [N. Fortson,
Phys. Rev. Lett. 70, 2383 (1993)]. Furthermore, the protocol can be combined
with the use of integrated photonic waveguides in an architecture that is
scalable to large ion numbers, with a proportional increase in measurement
precision.
| [
{
"version": "v1",
"created": "Tue, 25 Mar 2025 18:43:16 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 15:53:14 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Craik",
"Diana P. L. Aude",
""
]
] |
2503.20140 | Isaac Goldbring | Nicol\'as Cuervo Ovalle, Isaac Goldbring, and Netanel Levi | The Schr\"oder-Bernstein property for operators on Hilbert spaces | 8 pages; third draft. The main theorem was improved to cover
operators on nonseparable Hilbert spaces. Comments still welcome! | null | null | null | math.LO math.FA math.SP | http://creativecommons.org/licenses/by/4.0/ | We establish that the complete theory of a Hilbert space equipped with a
normal operator has the Schr\"oder-Bernstein property. This answers a question
of Argoty, Berenstein, and the first-named author. We also prove an analogous
statement for unbounded self-adjoint operators.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2025 01:11:43 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Mar 2025 00:22:08 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Apr 2025 21:53:48 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Ovalle",
"Nicolás Cuervo",
""
],
[
"Goldbring",
"Isaac",
""
],
[
"Levi",
"Netanel",
""
]
] |
2503.20443 | Antonio De Benedittis | Antonio De Benedittis, Pasquale Migliozzi, Carlos Maximiliano Mollo,
Andreino Simonelli, Daniele Vivolo | Light exposure and temperature effects on quantum efficiency of bialkali
metal photomultipier tubes | 14 pages, 17 figures | null | null | null | physics.ins-det | http://creativecommons.org/licenses/by-nc-sa/4.0/ | In astroparticle experiments, photomultiplier tubes are crucial for detecting
Cherenkov radiation emitted by charged particles, owing to their exceptional
sensitivity to low-intensity light, which is essential for studying high-energy
phenomena associated with astrophysical neutrinos. However, due to their high
sensitivity, PMTs are vulnerable to significant damage to their photocathode
coating when exposed to intense light and/or high temperatures. Although this
scenario is rare under controlled conditions, it can become relevant in
experiments with prolonged exposure to sunlight and elevated temperatures.
This study presents an analysis of the damage threshold and recovery time of
photomultipliers with bialkali metal coatings. The investigation involved
measuring the quantum efficiency of the PMTs before and after exposure to a
xenon lamp for varying durations, simulating sunlight exposure over several
days. Additionally, quantum efficiency was assessed before and after the PMTs
were subjected to thermal stress, providing an evaluation of their performance
under different thermal conditions.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2025 11:19:33 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 10:15:41 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"De Benedittis",
"Antonio",
""
],
[
"Migliozzi",
"Pasquale",
""
],
[
"Mollo",
"Carlos Maximiliano",
""
],
[
"Simonelli",
"Andreino",
""
],
[
"Vivolo",
"Daniele",
""
]
] |
2503.20507 | Rakesh Nadig | Rakesh Nadig, Vamanan Arulchelvan, Rahul Bera, Taha Shahroodi,
Gagandeep Singh, Andreas Kakolyris, Mohammad Sadrosadati, Jisung Park, Onur
Mutlu | Harmonia: A Multi-Agent Reinforcement Learning Approach to Data
Placement and Migration in Hybrid Storage Systems | null | null | null | null | cs.AR cs.DC cs.LG | http://creativecommons.org/licenses/by/4.0/ | Hybrid storage systems (HSS) combine multiple storage devices with diverse
characteristics to achieve high performance and capacity at low cost. The
performance of an HSS highly depends on the effectiveness of two key policies:
(1) the data-placement policy, which determines the best-fit storage device for
incoming data, and (2) the data-migration policy, which rearranges stored data
across the devices to sustain high HSS performance. Prior works focus on
improving only data placement or only data migration in HSS, which leads to
relatively low HSS performance. Unfortunately, no prior work tries to optimize
both policies together. Our goal is to design a holistic data-management
technique that optimizes both data-placement and data-migration policies to
fully exploit the potential of an HSS, and thus significantly improve system
performance. We demonstrate the need for multiple reinforcement learning (RL)
agents to accomplish our goal. We propose Harmonia, a multi-agent RL-based
data-management technique that employs two lightweight autonomous RL agents, a
data-placement agent and a data-migration agent, which adapt their policies for
the current workload and HSS configuration, and coordinate with each other to
improve overall HSS performance. We evaluate Harmonia on a real HSS with up to
four heterogeneous and diverse storage devices. Our evaluation using 17
data-intensive workloads on performance-optimized (cost-optimized) HSS with two
storage devices shows that, on average, Harmonia outperforms the
best-performing prior approach by 49.5% (31.7%). On an HSS with three (four)
devices, Harmonia outperforms the best-performing prior work by 37.0% (42.0%).
Harmonia's performance benefits come with low latency (240ns for inference) and
storage overheads (206 KiB in DRAM for both RL agents together). We will
open-source Harmonia's implementation to aid future research on HSS.
| [
{
"version": "v1",
"created": "Wed, 26 Mar 2025 12:47:52 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 16:55:45 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Nadig",
"Rakesh",
""
],
[
"Arulchelvan",
"Vamanan",
""
],
[
"Bera",
"Rahul",
""
],
[
"Shahroodi",
"Taha",
""
],
[
"Singh",
"Gagandeep",
""
],
[
"Kakolyris",
"Andreas",
""
],
[
"Sadrosadati",
"Mohammad",
""
],
[
"Park",
"Jisung",
""
],
[
"Mutlu",
"Onur",
""
]
] |
2503.21979 | Size Wu | Size Wu, Wenwei Zhang, Lumin Xu, Sheng Jin, Zhonghua Wu, Qingyi Tao,
Wentao Liu, Wei Li, Chen Change Loy | Harmonizing Visual Representations for Unified Multimodal Understanding
and Generation | null | null | null | null | cs.CV | http://creativecommons.org/licenses/by-sa/4.0/ | Unifying visual understanding and generation within a single multimodal
framework remains a significant challenge, as the two inherently heterogeneous
tasks require representations at different levels of granularity. Current
approaches that utilize vector quantization (VQ) or variational autoencoders
(VAE) for unified visual representation prioritize intrinsic imagery features
over semantics, compromising understanding performance. In this work, we take
inspiration from masked image modelling (MIM) that learns rich semantics via a
mask-and-reconstruct pre-training and its successful extension to masked
autoregressive (MAR) image generation. A preliminary study on the MAR encoder's
representation reveals exceptional linear probing accuracy and precise feature
response to visual concepts, which indicates MAR's potential for visual
understanding tasks beyond its original generation role. Based on these
insights, we present \emph{Harmon}, a unified autoregressive framework that
harmonizes understanding and generation tasks with a shared MAR encoder.
Through a three-stage training procedure that progressively optimizes
understanding and generation capabilities, Harmon achieves state-of-the-art
image generation results on the GenEval, MJHQ30K and WISE benchmarks while
matching the performance of methods with dedicated semantic encoders (e.g.,
Janus) on image understanding benchmarks. Our code and models will be available
at https://github.com/wusize/Harmon.
| [
{
"version": "v1",
"created": "Thu, 27 Mar 2025 20:50:38 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 04:26:58 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Wu",
"Size",
""
],
[
"Zhang",
"Wenwei",
""
],
[
"Xu",
"Lumin",
""
],
[
"Jin",
"Sheng",
""
],
[
"Wu",
"Zhonghua",
""
],
[
"Tao",
"Qingyi",
""
],
[
"Liu",
"Wentao",
""
],
[
"Li",
"Wei",
""
],
[
"Loy",
"Chen Change",
""
]
] |
2503.22160 | Yu-Fan Zheng | Yu-fan Zheng, Bin Chen | Structure of Carrollian (conformal) superalgebra | 43 pages, 5 figures, citations added | null | null | null | hep-th | http://creativecommons.org/licenses/by/4.0/ | In this work, we investigate possible supersymmetric extensions of the
Carrollian algebra and the Carrollian conformal algebra in both $d=4$ and
$d=3$. For the super-Carrollian algebra in $d=4$, we identify multiple
admissible structures, depending on the representations of the supercharges
with respect to the Carrollian rotation. Some of these structures can be
derived by taking the speed of light $c\to 0$ limit from super-Poincar\'e
algebra, but others are completely novel. In the conformal case, we demonstrate
that the nontrivial Carrollian superconformal algebras for $d=4$ and $d=3$ are
isomorphic to super-Poincar\'e algebra of $d=5$ and $d=4$ respectively.
Remarkably, neither of these constructions requires R-symmetry to ensure the
algebraic closure. Furthermore, we discover two distinct classes of
super-BMS$_4$ algebras, i.e. one singlet super-BMS$_4$ algebra and two
multiplet chiral super-BMS$_4$ algebras. The singlet case arises from extending
the $3$D Carrollian superconformal algebra, whereas the multiplet cases do not
admit this pathology due to their finite-dimensional subalgebra containing
supercharges with conformal dimension $\Delta=\pm\frac{3}{2}$.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2025 05:53:26 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 09:31:22 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Zheng",
"Yu-fan",
""
],
[
"Chen",
"Bin",
""
]
] |
2504.00021 | Arpita Vats | Rahul Raja, Arpita Vats | FUSE : A Ridge and Random Forest-Based Metric for Evaluating MT in
Indigenous Languages | NACCL 2025 | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | This paper presents the winning submission of the RaaVa team to the
AmericasNLP 2025 Shared Task 3 on Automatic Evaluation Metrics for Machine
Translation (MT) into Indigenous Languages of America, where our system ranked
first overall based on average Pearson correlation with the human annotations.
We introduce Feature-Union Scorer (FUSE) for Evaluation, FUSE integrates Ridge
regression and Gradient Boosting to model translation quality. In addition to
FUSE, we explore five alternative approaches leveraging different combinations
of linguistic similarity features and learning paradigms. FUSE Score highlights
the effectiveness of combining lexical, phonetic, semantic, and fuzzy token
similarity with learning-based modeling to improve MT evaluation for
morphologically rich and low-resource languages. MT into Indigenous languages
poses unique challenges due to polysynthesis, complex morphology, and
non-standardized orthography. Conventional automatic metrics such as BLEU, TER,
and ChrF often fail to capture deeper aspects like semantic adequacy and
fluency. Our proposed framework, formerly referred to as FUSE, incorporates
multilingual sentence embeddings and phonological encodings to better align
with human evaluation. We train supervised models on human-annotated
development sets and evaluate held-out test data. Results show that FUSE
consistently achieves higher Pearson and Spearman correlations with human
judgments, offering a robust and linguistically informed solution for MT
evaluation in low-resource settings.
| [
{
"version": "v1",
"created": "Fri, 28 Mar 2025 06:58:55 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 05:42:09 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Raja",
"Rahul",
""
],
[
"Vats",
"Arpita",
""
]
] |
2504.01143 | Ariel A. P\'erez | Rodrigo Lecaros, Juan L\'opez-R\'ios, Ariel A. P\'erez | Lipschitz stability in inverse problems for semi-discrete parabolic
operators | null | null | null | null | math.AP | http://creativecommons.org/licenses/by/4.0/ | This work addresses an inverse problem for a semi-discrete parabolic
equation, which consists of identifying the right-hand side of the equation
based on solution measurements at an intermediate time and within a spatial
subdomain. This result can be applied to establish a stability estimate for the
spatially dependent potential function. Our approach relies on a novel
semi-discrete Carleman estimate, whose parameter is constrained by the mesh
size. As a consequence of the discrete terms arising in the Carleman
inequality, this method naturally introduces an error term related to the
solution's initial condition.
| [
{
"version": "v1",
"created": "Tue, 1 Apr 2025 19:27:10 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 14:45:06 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Lecaros",
"Rodrigo",
""
],
[
"López-Ríos",
"Juan",
""
],
[
"Pérez",
"Ariel A.",
""
]
] |
2504.01500 | Gustaf Lorentzon | Elias Jarlebring, Gustaf Lorentzon | The Polynomial Set Associated with a Fixed Number of Matrix-Matrix
Multiplications | 23 pages, 1 figure, 1 table | null | null | null | math.NA cs.NA | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We consider the problem of computing matrix polynomials $p(X)$, where $X$ is
a large dense matrix, with as few matrix-matrix multiplications as possible.
More precisely, let $\Pi_{2^{m}}^*$ represent the set of polynomials computable
with $m$ matrix-matrix multiplications, but with an arbitrary number of matrix
additions and scaling operations. We characterize this set through a tabular
parameterization. By deriving equivalence transformations of the tabular
representation, we establish new methods that can be used to construct elements
of $\Pi_{2^{m}}^*$ and determine general properties of the set. The
transformations allow us to eliminate variables and prove that the dimension is
bounded by $m^2$. Numerical simulations suggest that this is a sharp bound.
Consequently, we have identified a parameterization that, to the best of our
knowledge, is the first minimal parameterization. We also conduct a study using
computational tools from algebraic geometry to determine the largest degree $d$
such that all polynomials of that degree belong to $\Pi_{2^{m}}^*$, or its
closure. In many cases, the computational setup is constructive in the sense
that it can also be used to determine a specific evaluation scheme for a given
polynomial.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2025 08:51:58 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 21:26:58 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Jarlebring",
"Elias",
""
],
[
"Lorentzon",
"Gustaf",
""
]
] |
2504.01528 | Izumi Seno | Izumi Seno and Shu-ichiro Inutsuka | Analytical and Numerical Linear Analyses of Convection Revisited | 16 pages, 22 figures, accepted for Physics of Fluids | Physics of Fluids 1 April 2025 | 10.1063/5.0263373 | 37 (4): 044118 | physics.flu-dyn astro-ph.GA | http://creativecommons.org/licenses/by/4.0/ | We conduct linear analyses of convection in domains larger than the
temperature scale height. We employ both analytical and numerical methods in
these analyses. In the case excluding all dissipation, the typical time scale
of convection is determined by the free fall time over the temperature scale
height. We quantitatively show the condition for the Boussinesq and
Wentzel-Kramers-Brillouin (WKB) approximations to be applicable. We provide a
reassessment of the critical Rayleigh number, a key indicator of convection,
and show that WKB approximation tends to underestimate the critical Rayleigh
number, particularly when the temperature scale height is comparable to or
smaller than the domain height. We show clear explanation why both thermal
conduction and viscosity are required for stabilizing negative entropy gradient
medium.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2025 09:13:31 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Apr 2025 01:31:52 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Seno",
"Izumi",
""
],
[
"Inutsuka",
"Shu-ichiro",
""
]
] |
2504.01801 | Zhijun Wang | Zhijun Wang, Jiahuan Li, Hao Zhou, Rongxiang Weng, Jingang Wang, Xin
Huang, Xue Han, Junlan Feng, Chao Deng, Shujian Huang | Investigating and Scaling up Code-Switching for Multilingual Language
Model Pre-Training | null | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Large language models (LLMs) exhibit remarkable multilingual capabilities
despite the extreme language imbalance in the pre-training data. In this paper,
we closely examine the reasons behind this phenomenon, focusing on the
pre-training corpus. We find that the existence of code-switching, alternating
between different languages within a context, is key to multilingual
capabilities. We conduct an analysis to investigate code-switching in the
pre-training corpus, examining its presence and categorizing it into four types
within two quadrants. We then assess its impact on multilingual performance.
These types of code-switching data are unbalanced in proportions and
demonstrate different effects on facilitating language transfer. To better
explore the power of code-switching for language alignment during pre-training,
we investigate the strategy of synthetic code-switching. We continuously scale
up the synthetic code-switching data and observe remarkable improvements in
both benchmarks and representation space. Extensive experiments indicate that
incorporating synthetic code-switching data enables better language alignment
and generalizes well to high, medium, and low-resource languages with
pre-training corpora of varying qualities.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2025 15:09:58 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 06:19:26 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Wang",
"Zhijun",
""
],
[
"Li",
"Jiahuan",
""
],
[
"Zhou",
"Hao",
""
],
[
"Weng",
"Rongxiang",
""
],
[
"Wang",
"Jingang",
""
],
[
"Huang",
"Xin",
""
],
[
"Han",
"Xue",
""
],
[
"Feng",
"Junlan",
""
],
[
"Deng",
"Chao",
""
],
[
"Huang",
"Shujian",
""
]
] |
2504.01889 | Honghao Jing | Honghao Jing | On SYZ mirrors of Hirzebruch surfaces | 50 pages. v2: Added several references | null | null | null | math.SG math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Strominger-Yau-Zaslow (SYZ) approach to mirror symmetry constructs a
mirror space and a superpotential from the data of a Lagrangian torus fibration
on a K\"ahler manifold with effective first Chern class. For K\"ahler manifolds
whose first Chern class is not nef, the SYZ construction is further complicated
by the presence of additional holomorphic discs with non-positive Maslov index.
In this paper, we study SYZ mirror symmetry for two of the simplest toric
examples: the non-Fano Hirzebruch surfaces F_3 and F_4. For F_3, we determine
the SYZ mirror associated to generic perturbations of the complex structure,
and demonstrate that the SYZ mirror depends on the choice of perturbation. For
F_4, we determine the SYZ mirror for a specific perturbation of complex
structure, where the mirror superpotential is an explicit infinite Laurent
series. Finally, we relate this superpotential to those arising from other
perturbations of F_4 via a scattering diagram.
| [
{
"version": "v1",
"created": "Wed, 2 Apr 2025 16:49:05 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 12:50:43 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Jing",
"Honghao",
""
]
] |
2504.02407 | Ruitong Xiao | Xiaohui Sun, Ruitong Xiao, Jianye Mo, Bowen Wu, Qun Yu, Baoxun Wang | F5R-TTS: Improving Flow-Matching based Text-to-Speech with Group
Relative Policy Optimization | null | null | null | null | cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present F5R-TTS, a novel text-to-speech (TTS) system that integrates Group
Relative Policy Optimization (GRPO) into a flow-matching based architecture. By
reformulating the deterministic outputs of flow-matching TTS into probabilistic
Gaussian distributions, our approach enables seamless integration of
reinforcement learning algorithms. During pretraining, we train a
probabilistically reformulated flow-matching based model which is derived from
F5-TTS with an open-source dataset. In the subsequent reinforcement learning
(RL) phase, we employ a GRPO-driven enhancement stage that leverages dual
reward metrics: word error rate (WER) computed via automatic speech recognition
and speaker similarity (SIM) assessed by verification models. Experimental
results on zero-shot voice cloning demonstrate that F5R-TTS achieves
significant improvements in both speech intelligibility (a 29.5% relative
reduction in WER) and speaker similarity (a 4.6% relative increase in SIM
score) compared to conventional flow-matching based TTS systems. Audio samples
are available at https://frontierlabs.github.io/F5R.
| [
{
"version": "v1",
"created": "Thu, 3 Apr 2025 08:57:15 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Apr 2025 02:53:57 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Apr 2025 10:49:31 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Sun",
"Xiaohui",
""
],
[
"Xiao",
"Ruitong",
""
],
[
"Mo",
"Jianye",
""
],
[
"Wu",
"Bowen",
""
],
[
"Yu",
"Qun",
""
],
[
"Wang",
"Baoxun",
""
]
] |
2504.03732 | Nika Mansouri Ghiasi | Nika Mansouri Ghiasi, Talu G\"uloglu, Harun Mustafa, Can Firtina,
Konstantina Koliogeorgi, Konstantinos Kanellopoulos, Haiyu Mao, Rakesh Nadig,
Mohammad Sadrosadati, Jisung Park, Onur Mutlu | SAGe: A Lightweight Algorithm-Architecture Co-Design for Mitigating the
Data Preparation Bottleneck in Large-Scale Genome Analysis | null | null | null | null | cs.AR cs.DC q-bio.GN | http://creativecommons.org/licenses/by/4.0/ | Given the exponentially growing volumes of genomic data, there are extensive
efforts to accelerate genome analysis. We demonstrate a major bottleneck that
greatly limits and diminishes the benefits of state-of-the-art genome analysis
accelerators: the data preparation bottleneck, where genomic data is stored in
compressed form and needs to be decompressed and formatted first before an
accelerator can operate on it. To mitigate this bottleneck, we propose SAGe, an
algorithm-architecture co-design for highly-compressed storage and
high-performance access of large-scale genomic data. SAGe overcomes the
challenges of mitigating the data preparation bottleneck while maintaining high
compression ratios (comparable to genomic-specific compression algorithms) at
low hardware cost. This is enabled by leveraging key features of genomic
datasets to co-design (i) a new (de)compression algorithm, (ii) hardware, (iii)
storage data layout, and (iv) interface commands to access storage. SAGe stores
data in structures that can be rapidly interpreted and decompressed by
efficient streaming accesses and lightweight hardware. To achieve high
compression ratios using only these lightweight structures, SAGe exploits
unique features of genomic data. We show that SAGe can be seamlessly integrated
with a broad range of genome analysis hardware accelerators to mitigate their
data preparation bottlenecks. Our results demonstrate that SAGe improves the
average end-to-end performance and energy efficiency of two state-of-the-art
genome analysis accelerators by 3.0x-32.1x and 18.8x-49.6x, respectively,
compared to when the accelerators rely on state-of-the-art decompression tools.
| [
{
"version": "v1",
"created": "Mon, 31 Mar 2025 23:36:26 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 22:43:40 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Ghiasi",
"Nika Mansouri",
""
],
[
"Güloglu",
"Talu",
""
],
[
"Mustafa",
"Harun",
""
],
[
"Firtina",
"Can",
""
],
[
"Koliogeorgi",
"Konstantina",
""
],
[
"Kanellopoulos",
"Konstantinos",
""
],
[
"Mao",
"Haiyu",
""
],
[
"Nadig",
"Rakesh",
""
],
[
"Sadrosadati",
"Mohammad",
""
],
[
"Park",
"Jisung",
""
],
[
"Mutlu",
"Onur",
""
]
] |
2504.04060 | Yuhao Wang | Yuhao Wang, Heyang Liu, Ziyang Cheng, Ronghua Wu, Qunshan Gu, Yanfeng
Wang, Yu Wang | VocalNet: Speech LLM with Multi-Token Prediction for Faster and
High-Quality Generation | null | null | null | null | cs.CL cs.AI cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Speech large language models (LLMs) have emerged as a prominent research
focus in speech processing. We introduce VocalNet-1B and VocalNet-8B, a series
of high-performance, low-latency speech LLMs enabled by a scalable and
model-agnostic training framework designed for real-time voice interaction.
Central to our contribution is the first application of multi-token prediction
(MTP) to speech LLMs. This approach represents a paradigm shift from standard
next-token prediction (NTP), offering simultaneous improvements in generation
speed and quality. Informed by analysis of MTP's effect on speech generation
and experimental comparisons, we designed a straightforward and highly
effective MTP implementation. Experiments demonstrate that VocalNet performs on
par with mainstream Omni LLMs even with limited training data, and
significantly surpasses existing open-source speech LLMs. To foster
reproducibility and community advancement, all model weights, inference code,
training data, and framework implementations have been made publicly available
at https://github.com/SJTU-OmniAgent/VocalNet
| [
{
"version": "v1",
"created": "Sat, 5 Apr 2025 04:57:12 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 07:59:31 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Wang",
"Yuhao",
""
],
[
"Liu",
"Heyang",
""
],
[
"Cheng",
"Ziyang",
""
],
[
"Wu",
"Ronghua",
""
],
[
"Gu",
"Qunshan",
""
],
[
"Wang",
"Yanfeng",
""
],
[
"Wang",
"Yu",
""
]
] |
2504.04251 | Alberto Martin-Lopez | Davide Molinelli, Alberto Martin-Lopez, Elliott Zackrone, Beyza Eken,
Michael D. Ernst, Mauro Pezz\`e | Tratto: A Neuro-Symbolic Approach to Deriving Axiomatic Test Oracles | Accepted for publication at ISSTA 2025 | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents Tratto, a neuro-symbolic approach that generates
assertions (boolean expressions) that can serve as axiomatic oracles, from
source code and documentation. The symbolic module of Tratto takes advantage of
the grammar of the programming language, the unit under test, and the context
of the unit (its class and available APIs) to restrict the search space of the
tokens that can be successfully used to generate valid oracles. The neural
module of Tratto uses transformers fine-tuned for both deciding whether to
output an oracle or not and selecting the next lexical token to incrementally
build the oracle from the set of tokens returned by the symbolic module. Our
experiments show that Tratto outperforms the state-of-the-art axiomatic oracle
generation approaches, with 73% accuracy, 72% precision, and 61% F1-score,
largely higher than the best results of the symbolic and neural approaches
considered in our study (61%, 62%, and 37%, respectively). Tratto can generate
three times more axiomatic oracles than current symbolic approaches, while
generating 10 times less false positives than GPT4 complemented with few-shot
learning and Chain-of-Thought prompting.
| [
{
"version": "v1",
"created": "Sat, 5 Apr 2025 19:14:35 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 09:50:44 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Molinelli",
"Davide",
""
],
[
"Martin-Lopez",
"Alberto",
""
],
[
"Zackrone",
"Elliott",
""
],
[
"Eken",
"Beyza",
""
],
[
"Ernst",
"Michael D.",
""
],
[
"Pezzè",
"Mauro",
""
]
] |
2504.04360 | Jie Zhu | Jie Zhu, Yujun Zhu, Ju Ming, Max D. Gunzburger | Splitting Method for Stochastic Navier-Stokes Equations | pages 30 | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the two-dimensional stochastic steady-state
Navier-Stokes(NS) equations with additive random noise. We introduce an
innovative splitting method that decomposes the stochastic NS equations into a
deterministic NS component and a stochastic equation. We rigorously analyze the
proposed splitting method from the perspectives of equivalence, stability,
existence and uniqueness of the solution. We also propose a modified splitting
scheme, which simplified the stochastic equation by omitting its nonlinear
terms. A detailed analysis of the solution properties for this modified
approach is provided. Additionally, we discuss the statistical errors with both
the original splitting format and the modified scheme. Our theoretical and
numerical studies demonstrate that the equivalent splitting scheme exhibits
significantly enhanced stability compared to the original stochastic NS
equations, enabling more effective handling of nonlinear characteristics.
Several numerical experiments were performed to compare the statistical errors
of the splitting method and the modified splitting method. Notably, the
deterministic NS equation in the splitting method does not require repeated
solving, and the stochastic equation in the modified scheme is free of
nonlinear terms. These features make the modified splitting method particularly
advantageous for large-scale computations, as it significantly improves
computational efficiency without compromising accuracy.
| [
{
"version": "v1",
"created": "Sun, 6 Apr 2025 05:15:40 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Apr 2025 12:24:31 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Apr 2025 17:06:46 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Zhu",
"Jie",
""
],
[
"Zhu",
"Yujun",
""
],
[
"Ming",
"Ju",
""
],
[
"Gunzburger",
"Max D.",
""
]
] |
2504.05138 | Haoran Zhang | Haoran Zhang, Zejun Gong, Zekai Li, Marie Siew, Carlee Joe-Wong,
Rachid El-Azouzi | Towards Optimal Heterogeneous Client Sampling in Multi-Model Federated
Learning | 29 pages with full proofs | null | null | null | cs.LG cs.DC | http://creativecommons.org/licenses/by/4.0/ | Federated learning (FL) allows edge devices to collaboratively train models
without sharing local data. As FL gains popularity, clients may need to train
multiple unrelated FL models, but communication constraints limit their ability
to train all models simultaneously. While clients could train FL models
sequentially, opportunistically having FL clients concurrently train different
models -- termed multi-model federated learning (MMFL) -- can reduce the
overall training time. Prior work uses simple client-to-model assignments that
do not optimize the contribution of each client to each model over the course
of its training. Prior work on single-model FL shows that intelligent client
selection can greatly accelerate convergence, but na\"ive extensions to MMFL
can violate heterogeneous resource constraints at both the server and the
clients. In this work, we develop a novel convergence analysis of MMFL with
arbitrary client sampling methods, theoretically demonstrating the strengths
and limitations of previous well-established gradient-based methods. Motivated
by this analysis, we propose MMFL-LVR, a loss-based sampling method that
minimizes training variance while explicitly respecting communication limits at
the server and reducing computational costs at the clients. We extend this to
MMFL-StaleVR, which incorporates stale updates for improved efficiency and
stability, and MMFL-StaleVRE, a lightweight variant suitable for low-overhead
deployment. Experiments show our methods improve average accuracy by up to
19.1% over random sampling, with only a 5.4% gap from the theoretical optimum
(full client participation).
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 14:43:17 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Apr 2025 03:29:49 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Apr 2025 18:13:21 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Zhang",
"Haoran",
""
],
[
"Gong",
"Zejun",
""
],
[
"Li",
"Zekai",
""
],
[
"Siew",
"Marie",
""
],
[
"Joe-Wong",
"Carlee",
""
],
[
"El-Azouzi",
"Rachid",
""
]
] |
2504.05223 | Henrik Ebel | Torben Schiz, Henrik Ebel | Reducing the Communication of Distributed Model Predictive Control:
Autoencoders and Formation Control | 24 pages, 15 figures | null | null | null | eess.SY cs.DC cs.RO cs.SY | http://creativecommons.org/licenses/by/4.0/ | Communication remains a key factor limiting the applicability of distributed
model predictive control (DMPC) in realistic settings, despite advances in
wireless communication. DMPC schemes can require an overwhelming amount of
information exchange between agents as the amount of data depends on the length
of the predication horizon, for which some applications require a significant
length to formally guarantee nominal asymptotic stability. This work aims to
provide an approach to reduce the communication effort of DMPC by reducing the
size of the communicated data between agents. Using an autoencoder, the
communicated data is reduced by the encoder part of the autoencoder prior to
communication and reconstructed by the decoder part upon reception within the
distributed optimization algorithm that constitutes the DMPC scheme. The choice
of a learning-based reduction method is motivated by structure inherent to the
data, which results from the data's connection to solutions of optimal control
problems. The approach is implemented and tested at the example of formation
control of differential-drive robots, which is challenging for
optimization-based control due to the robots' nonholonomic constraints, and
which is interesting due to the practical importance of mobile robotics. The
applicability of the proposed approach is presented first in form of a
simulative analysis showing that the resulting control performance yields a
satisfactory accuracy. In particular, the proposed approach outperforms the
canonical naive way to reduce communication by reducing the length of the
prediction horizon. Moreover, it is shown that numerical experiments conducted
on embedded computation hardware, with real distributed computation and
wireless communication, work well with the proposed way of reducing
communication even in practical scenarios in which full communication fails.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 16:10:52 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 17:47:12 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Schiz",
"Torben",
""
],
[
"Ebel",
"Henrik",
""
]
] |
2504.05490 | Sasan Vakili | Sasan Vakili, Manuel Mazo Jr., and Peyman Mohajerin Esfahani | Optimal Bayesian Affine Estimator and Active Learning for the Wiener
Model | 23 pages, 4 figures | null | null | null | cs.LG cs.SY eess.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a Bayesian estimation framework for Wiener models,
focusing on learning nonlinear output functions under known linear state
dynamics. We derive a closed-form optimal affine estimator for the unknown
parameters, characterized by the so-called "dynamic basis statistics" (DBS).
Several features of the proposed estimator are studied, including Bayesian
unbiasedness, closed-form posterior statistics, error monotonicity in
trajectory length, and consistency condition (also known as persistent
excitation). In the special case of Fourier basis functions, we demonstrate
that the closed-form description is computationally available, as the Fourier
DBS enjoys explicit expressions. Furthermore, we identify an inherent
inconsistency in the Fourier bases for single-trajectory measurements,
regardless of the input excitation. Leveraging the closed-form estimation
error, we develop an active learning algorithm synthesizing input signals to
minimize estimation error. Numerical experiments validate the efficacy of our
approach, showing significant improvements over traditional regularized
least-squares methods.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 20:36:06 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 21:58:45 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Vakili",
"Sasan",
""
],
[
"Mazo",
"Manuel",
"Jr."
],
[
"Esfahani",
"Peyman Mohajerin",
""
]
] |
2504.06042 | Xu Shi | Xu Shi, Rufeng Xiao, Rujun Jiang | An Adaptive Algorithm for Bilevel Optimization on Riemannian Manifolds | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing methods for solving Riemannian bilevel optimization (RBO) problems
require prior knowledge of the problem's first- and second-order information
and curvature parameter of the Riemannian manifold to determine step sizes,
which poses practical limitations when these parameters are unknown or
computationally infeasible to obtain. In this paper, we introduce the Adaptive
Riemannian Hypergradient Descent (AdaRHD) algorithm for solving RBO problems.
To our knowledge, AdaRHD is the first method to incorporate a fully adaptive
step size strategy that eliminates the need for problem-specific parameters in
RBO problem resolution. We prove that AdaRHD achieves an
$\mathcal{O}(1/\epsilon)$ iteration complexity for finding an
$\epsilon$-stationary point, thus matching the complexity of existing
non-adaptive methods. Furthermore, we demonstrate that substituting exponential
mappings with retraction mappings maintains the same complexity bound.
Experiments demonstrate that AdaRHD achieves comparable performance to existing
non-adaptive approaches while exhibiting greater robustness.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2025 13:42:18 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 13:29:25 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Shi",
"Xu",
""
],
[
"Xiao",
"Rufeng",
""
],
[
"Jiang",
"Rujun",
""
]
] |
2504.06116 | Davide Sferrazza | Davide Sferrazza, Gabriele Berton, Gabriele Trivigno, Carlo Masone | To Match or Not to Match: Revisiting Image Matching for Reliable Visual
Place Recognition | CVPRW 2025 | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Visual Place Recognition (VPR) is a critical task in computer vision,
traditionally enhanced by re-ranking retrieval results with image matching.
However, recent advancements in VPR methods have significantly improved
performance, challenging the necessity of re-ranking. In this work, we show
that modern retrieval systems often reach a point where re-ranking can degrade
results, as current VPR datasets are largely saturated. We propose using image
matching as a verification step to assess retrieval confidence, demonstrating
that inlier counts can reliably predict when re-ranking is beneficial. Our
findings shift the paradigm of retrieval pipelines, offering insights for more
robust and adaptive VPR systems. The code is available at
https://github.com/FarInHeight/To-Match-or-Not-to-Match.
| [
{
"version": "v1",
"created": "Tue, 8 Apr 2025 15:10:10 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 07:44:36 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Sferrazza",
"Davide",
""
],
[
"Berton",
"Gabriele",
""
],
[
"Trivigno",
"Gabriele",
""
],
[
"Masone",
"Carlo",
""
]
] |
2504.06537 | Shihang Lu | Shihang Lu, Fan Liu, Yifeng Xiong, Zhen Du, Yuanhao Cui, Shuangyang
Li, Weijie Yuan, Jie Yang, and Shi Jin | Sensing With Random Communication Signals | 8 pages, 5 figures, submitted to an IEEE Journal | null | 10.1109/MNET.2025.3562144 | null | eess.SP | http://creativecommons.org/licenses/by-sa/4.0/ | Communication-centric Integrated Sensing and Communication (ISAC) has been
recognized as a promising methodology to implement wireless sensing
functionality over existing network architectures, due to its
cost-effectiveness and backward compatibility to legacy cellular systems.
However, the inherent randomness of the communication signal may incur huge
fluctuations in sensing capabilities, leading to unfavorable detection and
estimation performance. To address this issue, we elaborate on random ISAC
signal processing methods in this article, aiming at improving the sensing
performance without unduly deteriorating the communication functionality.
Specifically, we commence by discussing the fundamentals of sensing with random
communication signals, including the performance metrics and optimal ranging
waveforms. Building on these concepts, we then present a general framework for
random ISAC signal transmission, followed by an in-depth exploration of
time-domain pulse shaping, frequency-domain constellation shaping, and
spatial-domain precoding methods. We provide a comprehensive overview of each
of these topics, including models, results, and design guidelines. Finally, we
conclude this article by identifying several promising research directions for
random ISAC signal transmission.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 02:27:18 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Lu",
"Shihang",
""
],
[
"Liu",
"Fan",
""
],
[
"Xiong",
"Yifeng",
""
],
[
"Du",
"Zhen",
""
],
[
"Cui",
"Yuanhao",
""
],
[
"Li",
"Shuangyang",
""
],
[
"Yuan",
"Weijie",
""
],
[
"Yang",
"Jie",
""
],
[
"Jin",
"Shi",
""
]
] |
2504.06621 | Haoran Ma | Gang Bao, Jun Lai and Haoran Ma | Computation of shape Taylor expansions | null | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Shape derivative is an important analytical tool for studying scattering
problems involving perturbations in scatterers. Many applications, including
inverse scattering, optimal design, and uncertainty quantification, are based
on shape derivatives. However, computing high order shape derivatives is
challenging due to the complexity of shape calculus. This work introduces a
comprehensive method for computing shape Taylor expansions in two dimensions
using recurrence formulas. The approach is developed under sound-soft,
sound-hard, impedance, and transmission boundary conditions. Additionally, we
apply the shape Taylor expansion to uncertainty quantification in wave
scattering, enabling high order moment estimation for the scattered field under
random boundary perturbations. Numerical examples are provided to illustrate
the effectiveness of the shape Taylor expansion in achieving high order
approximations.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 06:42:21 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 02:49:20 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Bao",
"Gang",
""
],
[
"Lai",
"Jun",
""
],
[
"Ma",
"Haoran",
""
]
] |
2504.06814 | Yunlu Shu | Yunlu Shu, Jiaxin Jiang, Lei Shi, Tianyu Wang | Revisit Gradient Descent for Geodesically Convex Optimization | null | null | null | null | math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a seminal work of Zhang and Sra, gradient descent methods for geodesically
convex optimization were comprehensively studied. In particular, based on a
refined use of the triangle comparison theorem of Toponogov, Zhang and Sra
derived a comparison inequality that relates the current iterate, the next
iterate and the optimum point. Since their seminal work, numerous follow-ups
have studied different downstream usages of their comparison lemma. However,
all results along this line relies on strong assumptions, such as bounded
domain assumption or curvature bounded below assumption.
In this work, we introduce the concept of quasilinearization to optimization,
presenting a novel framework for analyzing geodesically convex optimization. By
leveraging this technique, we establish state-of-the-art convergence rates --
for both deterministic and stochastic settings -- under substantially weaker
assumptions than previously required.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 12:08:43 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 06:01:09 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Shu",
"Yunlu",
""
],
[
"Jiang",
"Jiaxin",
""
],
[
"Shi",
"Lei",
""
],
[
"Wang",
"Tianyu",
""
]
] |
2504.06948 | Dekuan Dong | Dekuan Dong, Yingzhou Li, and Jungong Xue | An improved quantum algorithm for linear autonomous differential
equations via Pad\'e approximation | 50 pages, 15 figures | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | We propose a novel quantum algorithm for solving linear autonomous ordinary
differential equations (ODEs) using the Pad\'e approximation. For linear
autonomous ODEs, the discretized solution can be represented by a product of
matrix exponentials. The proposed algorithm approximates the matrix exponential
by the diagonal Pad\'e approximation, which is then encoded into a large,
block-sparse linear system and solved via quantum linear system algorithms
(QLSA). The detailed quantum circuit is given based on quantum oracle access to
the matrix, the inhomogeneous term, and the initial state. The complexity of
the proposed algorithm is analyzed. Compared to the method based on Taylor
approximation, which approximates the matrix exponential using a $k$-th order
Taylor series, the proposed algorithm improves the approximation order $k$ from
two perspectives: 1) the explicit complexity dependency on $k$ is improved, and
2) a smaller $k$ suffices for the same precision. Numerical experiments
demonstrate the advantages of the proposed algorithm comparing to other related
algorithms.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 14:54:27 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 03:24:32 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Dong",
"Dekuan",
""
],
[
"Li",
"Yingzhou",
""
],
[
"Xue",
"Jungong",
""
]
] |
2504.07003 | Konstantinos Tzirakis | Georgia Karali, Konstantinos Tzirakis, Israel Michael Sigal | The FitzHugh-Nagumo system on undulated cylinders: spontaneous
symmetrization and effective system | 31 pages | Journal of Nonlinear Science, Volume 35, article number 64, (2025) | 10.1007/s00332-025-10152-9 | null | math.AP | http://creativecommons.org/licenses/by-nc-nd/4.0/ | We consider the FitzHugh-Nagumo system on undulated cylindrical surfaces
modeling nerve axons. We show that for sufficiently small radii and for initial
conditions close to radially symmetrical ones, (i) the solutions converge to
their radial averages, and (ii) the latter averages can be approximated by
solutions of a 1+1 dimensional ('radial') system (the effective system)
involving the surface radius function in its coefficients. This perhaps
explains why solutions of the original 1+1 dimensional FitzHugh-Nagumo system
agree so well with experimental data on electrical impulse propagation.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 16:22:58 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Karali",
"Georgia",
""
],
[
"Tzirakis",
"Konstantinos",
""
],
[
"Sigal",
"Israel Michael",
""
]
] |
2504.07307 | Jingxin Zhan | Jingxin Zhan, Yuchen Xin, Zhihua Zhang | Follow-the-Perturbed-Leader Approaches Best-of-Both-Worlds for the m-Set
Semi-Bandit Problems | null | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a common case of the combinatorial semi-bandit problem, the
$m$-set semi-bandit, where the learner exactly selects $m$ arms from the total
$d$ arms. In the adversarial setting, the best regret bound, known to be
$\mathcal{O}(\sqrt{nmd})$ for time horizon $n$, is achieved by the well-known
Follow-the-Regularized-Leader (FTRL) policy. However, this requires to
explicitly compute the arm-selection probabilities via optimizing problems at
each time step and sample according to them. This problem can be avoided by the
Follow-the-Perturbed-Leader (FTPL) policy, which simply pulls the $m$ arms that
rank among the $m$ smallest (estimated) loss with random perturbation. In this
paper, we show that FTPL with a Fr\'echet perturbation also enjoys the near
optimal regret bound $\mathcal{O}(\sqrt{nmd\log(d)})$ in the adversarial
setting and approaches best-of-both-world regret bounds, i.e., achieves a
logarithmic regret for the stochastic setting.
| [
{
"version": "v1",
"created": "Wed, 9 Apr 2025 22:07:01 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 15:16:03 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Zhan",
"Jingxin",
""
],
[
"Xin",
"Yuchen",
""
],
[
"Zhang",
"Zhihua",
""
]
] |
2504.07344 | Gunhee Park | Gunhee Park, Johnnie Gray, Garnet Kin-Lic Chan | Simulating quantum dynamics in two-dimensional lattices with tensor
network influence functional belief propagation | 16 pages, 18 figures | null | null | null | quant-ph cond-mat.str-el physics.comp-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Describing nonequilibrium quantum dynamics remains a significant
computational challenge due to the growth of spatial entanglement. The tensor
network influence functional (TN-IF) approach mitigates this problem for
computing the time evolution of local observables by encoding the subsystem's
influence functional path integral as a matrix product state (MPS), thereby
shifting the resource governing computational cost from spatial entanglement to
temporal entanglement. We extend the applicability of the TN-IF method to
two-dimensional lattices by demonstrating its construction on tree lattices and
proposing a belief propagation (BP) algorithm for the TN-IF, termed influence
functional BP (IF-BP), to simulate local observable dynamics on arbitrary
graphs. Even though the BP algorithm introduces uncontrolled approximation
errors on arbitrary graphs, it provides an accurate description for locally
tree-like lattices. Numerical simulations of the kicked Ising model on a
heavy-hex lattice, motivated by a recent quantum experiment, highlight the
effectiveness of the IF-BP method, which demonstrates superior performance in
capturing long-time dynamics where traditional tensor network state-based
methods struggle. Our results further reveal that the temporal entanglement
entropy (TEE) only grows logarithmically with time for this model, resulting in
a polynomial computational cost for the whole method. We further construct a
cluster expansion of IF-BP to introduce loop correlations beyond the BP
approximation, providing a systematic correction to the IF-BP estimate. We
demonstrate the power of the cluster expansion of the IF-BP in simulating the
quantum quench dynamics of the 2D transverse field Ising model, obtaining
numerical results that improve on the state-of-the-art.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 00:04:32 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2025 20:59:56 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Park",
"Gunhee",
""
],
[
"Gray",
"Johnnie",
""
],
[
"Chan",
"Garnet Kin-Lic",
""
]
] |
2504.07481 | Tian Xie | Tian Xie, Menghui Jiang, Huanfeng Shen, Huifang Li, Chao Zeng, Jun Ma,
Guanhao Zhang, Liangpei Zhang | A Mechanism-Learning Deeply Coupled Model for Remote Sensing Retrieval
of Global Land Surface Temperature | null | null | null | null | physics.ao-ph cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Land surface temperature (LST) retrieval from remote sensing data is pivotal
for analyzing climate processes and surface energy budgets. However, LST
retrieval is an ill-posed inverse problem, which becomes particularly severe
when only a single band is available. In this paper, we propose a deeply
coupled framework integrating mechanistic modeling and machine learning to
enhance the accuracy and generalizability of single-channel LST retrieval.
Training samples are generated using a physically-based radiative transfer
model and a global collection of 5810 atmospheric profiles. A physics-informed
machine learning framework is proposed to systematically incorporate the first
principles from classical physical inversion models into the learning workflow,
with optimization constrained by radiative transfer equations. Global
validation demonstrated a 30% reduction in root-mean-square error versus
standalone methods. Under extreme humidity, the mean absolute error decreased
from 4.87 K to 2.29 K (53% improvement). Continental-scale tests across five
continents confirmed the superior generalizability of this model.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 06:19:01 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Apr 2025 01:42:47 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Apr 2025 13:51:47 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Xie",
"Tian",
""
],
[
"Jiang",
"Menghui",
""
],
[
"Shen",
"Huanfeng",
""
],
[
"Li",
"Huifang",
""
],
[
"Zeng",
"Chao",
""
],
[
"Ma",
"Jun",
""
],
[
"Zhang",
"Guanhao",
""
],
[
"Zhang",
"Liangpei",
""
]
] |
2504.07483 | Tianyu Li | Bo Wang, Tianyu Li, Ruishi Li, Umang Mathur, Prateek Saxena | Program Skeletons for Automated Program Translation | Accepted by PLDI 2025 (46th ACM SIGPLAN Conference on Programming
Language Design and Implementation) | null | 10.1145/3729287 | null | cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Translating software between programming languages is a challenging task, for
which automated techniques have been elusive and hard to scale up to larger
programs. A key difficulty in cross-language translation is that one has to
re-express the intended behavior of the source program into idiomatic
constructs of a different target language. This task needs abstracting away
from the source language-specific details, while keeping the overall
functionality the same. In this work, we propose a novel and systematic
approach for making such translation amenable to automation based on a
framework we call program skeletons. A program skeleton retains the high-level
structure of the source program by abstracting away and effectively summarizing
lower-level concrete code fragments, which can be mechanically translated to
the target programming language. A skeleton, by design, permits many different
ways of filling in the concrete implementation for fragments, which can work in
conjunction with existing data-driven code synthesizers. Most importantly,
skeletons can conceptually enable sound decomposition, i.e., if each individual
fragment is correctly translated, taken together with the mechanically
translated skeleton, the final translated program is deemed to be correct as a
whole. We present a prototype system called Skel embodying the idea of
skeleton-based translation from Python to JavaScript. Our results show
promising scalability compared to prior works. For 9 real-world Python
programs, some with more than about 1k lines of code, 95% of their code
fragments can be automatically translated, while about 5% require manual
effort. All the final translations are correct with respect to whole-program
test suites.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 06:25:17 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 12:49:11 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Wang",
"Bo",
""
],
[
"Li",
"Tianyu",
""
],
[
"Li",
"Ruishi",
""
],
[
"Mathur",
"Umang",
""
],
[
"Saxena",
"Prateek",
""
]
] |
2504.07559 | Atsushi Nishizawa | Atsushi Nishizawa, Atsushi Taruya, Yoshiaki Himemoto | Axion dark matter search from terrestrial magnetic fields at extremely
low frequencies | 19 pages, 12 figures, minor changes | null | null | YITP-25-55 | hep-ph astro-ph.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The natural environment of the Earth can act as a sensitive detector for dark
matter in ultralight axions. When axions with masses between
$1\times10^{-15}\,{\rm eV}$ and $1\times10^{-13}\,{\rm eV}$ pass through the
Earth, they interact with the global geomagnetic field, generating
electromagnetic (EM) waves in the extremely low-frequency range
($0.3$--$30\,{\rm Hz}$) through axion-photon coupling. This paper is one of a
series of companion papers for~\cite{Taruya:2025zql}, focusing on the data
analysis method and search results for an axion signal. Utilizing the
theoretical predictions of axion-induced EM spectra from a companion study, we
analyzed long-term observational data of terrestrial magnetic fields in this
frequency band to search for axion-induced signals. Our analysis identified 65
persistent signal candidates with a signal-to-noise ratio (SNR) greater than 3.
Aside from these candidates, we placed a new upper bound on the axion-photon
coupling parameter, significantly refining the previous constraint from CAST by
at most two orders of magnitude down to $g_{a\gamma} \lesssim 4\times10^{-13}
\,{\rm GeV}^{-1}$ for the axion mass around $3 \times 10^{-14}\,{\rm eV}$.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 08:40:39 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 01:22:18 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Nishizawa",
"Atsushi",
""
],
[
"Taruya",
"Atsushi",
""
],
[
"Himemoto",
"Yoshiaki",
""
]
] |
2504.07677 | Jiyong Oh Dr. | Hye-Min Won, Jieun Lee, Jiyong Oh | Localization Meets Uncertainty: Uncertainty-Aware Multi-Modal
Localization | 13 pages, 6 figures | null | null | null | cs.RO cs.CV | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Reliable localization is critical for robot navigation in complex indoor
environments. In this paper, we propose an uncertainty-aware localization
method that enhances the reliability of localization outputs without modifying
the prediction model itself. This study introduces a percentile-based rejection
strategy that filters out unreliable 3-DoF pose predictions based on aleatoric
and epistemic uncertainties the network estimates. We apply this approach to a
multi-modal end-to-end localization that fuses RGB images and 2D LiDAR data,
and we evaluate it across three real-world datasets collected using a
commercialized serving robot. Experimental results show that applying stricter
uncertainty thresholds consistently improves pose accuracy. Specifically, the
mean position error is reduced by 41.0%, 56.7%, and 69.4%, and the mean
orientation error by 55.6%, 65.7%, and 73.3%, when applying 90%, 80%, and 70%
thresholds, respectively. Furthermore, the rejection strategy effectively
removes extreme outliers, resulting in better alignment with ground truth
trajectories. To the best of our knowledge, this is the first study to
quantitatively demonstrate the benefits of percentile-based uncertainty
rejection in multi-modal end-to-end localization tasks. Our approach provides a
practical means to enhance the reliability and accuracy of localization systems
in real-world deployments.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 12:07:24 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 11:34:10 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Won",
"Hye-Min",
""
],
[
"Lee",
"Jieun",
""
],
[
"Oh",
"Jiyong",
""
]
] |
2504.07690 | Michele Andreoli | Michele Andreoli | Perihelion precession in non-Newtonian central potentials | Accepted for publication in Astrophysics and Space Science,
SpringerNature | null | null | null | astro-ph.EP gr-qc | http://creativecommons.org/licenses/by-sa/4.0/ | High order corrections to the perihelion precession are obtained in
non-Newtonian central potentials, via complex analysis techniques. The result
is an exact series expansion whose terms, for a perturbation of the form
$\delta V=\frac{\gamma}{r^{s}}$, are calculated in closed form. To validate the
method, the series is applied to the specific case of s=3, and the results are
compared with those presented in literature, which are relate to the
Schwarzschild metric. As a further test, a numerical simulation was carried out
for the case where s=4. The algebraic calculations and numerical simulations
were carried out via software with symbolic capabilities.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 12:22:34 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Apr 2025 15:54:47 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Apr 2025 06:11:51 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Andreoli",
"Michele",
""
]
] |
2504.07758 | Shuangfan Zhou | Shuangfan Zhou, Chu Zhou, Youwei Lyu, Heng Guo, Zhanyu Ma, Boxin Shi
and Imari Sato | PIDSR: Complementary Polarized Image Demosaicing and Super-Resolution | CVPR 2025 | null | null | null | cs.CV eess.IV | http://creativecommons.org/licenses/by/4.0/ | Polarization cameras can capture multiple polarized images with different
polarizer angles in a single shot, bringing convenience to polarization-based
downstream tasks. However, their direct outputs are color-polarization filter
array (CPFA) raw images, requiring demosaicing to reconstruct full-resolution,
full-color polarized images; unfortunately, this necessary step introduces
artifacts that make polarization-related parameters such as the degree of
polarization (DoP) and angle of polarization (AoP) prone to error. Besides,
limited by the hardware design, the resolution of a polarization camera is
often much lower than that of a conventional RGB camera. Existing polarized
image demosaicing (PID) methods are limited in that they cannot enhance
resolution, while polarized image super-resolution (PISR) methods, though
designed to obtain high-resolution (HR) polarized images from the demosaicing
results, tend to retain or even amplify errors in the DoP and AoP introduced by
demosaicing artifacts. In this paper, we propose PIDSR, a joint framework that
performs complementary Polarized Image Demosaicing and Super-Resolution,
showing the ability to robustly obtain high-quality HR polarized images with
more accurate DoP and AoP from a CPFA raw image in a direct manner. Experiments
show our PIDSR not only achieves state-of-the-art performance on both synthetic
and real data, but also facilitates downstream tasks.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 13:56:33 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 13:13:39 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Zhou",
"Shuangfan",
""
],
[
"Zhou",
"Chu",
""
],
[
"Lyu",
"Youwei",
""
],
[
"Guo",
"Heng",
""
],
[
"Ma",
"Zhanyu",
""
],
[
"Shi",
"Boxin",
""
],
[
"Sato",
"Imari",
""
]
] |
2504.07796 | Julius Fergy Rabago | Elmehdi Cherrat and Lekbir Afraites and Julius Fergy Tiongson Rabago | Numerical solution by shape optimization method to an inverse shape
problem in multi-dimensional advection-diffusion problem with space dependent
coefficients | null | null | null | null | math.OC cs.NA math.NA | http://creativecommons.org/licenses/by/4.0/ | This work focuses on numerically solving a shape identification problem
related to advection-diffusion processes with space-dependent coefficients
using shape optimization techniques. Two boundary-type cost functionals are
considered, and their corresponding variations with respect to shapes are
derived using the adjoint method, employing the chain rule approach. This
involves firstly utilizing the material derivative of the state system and
secondly using its shape derivative. Subsequently, an alternating direction
method of multipliers (ADMM) combined with the Sobolev-gradient-descent
algorithm is applied to stably solve the shape reconstruction problem.
Numerical experiments in two and three dimensions are conducted to demonstrate
the feasibility of the methods.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 14:36:56 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Apr 2025 09:00:43 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Apr 2025 13:19:29 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Cherrat",
"Elmehdi",
""
],
[
"Afraites",
"Lekbir",
""
],
[
"Rabago",
"Julius Fergy Tiongson",
""
]
] |
2504.07883 | Stefan Enzner | Stefan Enzner and Jan Berges and Arne Schobert and Dongjin Oh and
Mingu Kang and Riccardo Comin and Ronny Thomale and Tim O. Wehling and
Domenico Di Sante and Giorgio Sangiovanni | Phonon fluctuation diagnostics: Origin of charge order in AV$_3$Sb$_5$
kagome metals | 13 pages, 11 figures | null | null | null | cond-mat.str-el cond-mat.mtrl-sci cond-mat.supr-con | http://creativecommons.org/licenses/by/4.0/ | The microsopic origin of the charge-density wave (CDW) in AV$_3$Sb$_5$ (A =
K, Rb, Cs) kagome metals remains a longstanding question, often revolving
around electron-phonon coupling and purely electronic mechanisms involving Van
Hove scenarios, nesting, and sublattice interference. To reveal the processes
driving the CDW transition, we combine ab-initio calculations analysis of the
phonon self-energy and angle-resolved photoemission spectroscopy (ARPES). Our
momentum-resolved study, supported by ARPES data, reveals that lattice
instabilities in the V-135 family of kagome metals appear to also be driven by
electronic states far from high-symmetry points, where these states exhibit the
strongest coupling with the phonon modes responsible for the CDW distortion.
Footing on an interpretation scheme based on phonon fluctuation diagnostics,
our work challenges and revises theories that so far have exclusively
attributed CDW formation to nesting effects close to the Fermi level.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 15:55:41 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 15:52:03 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Enzner",
"Stefan",
""
],
[
"Berges",
"Jan",
""
],
[
"Schobert",
"Arne",
""
],
[
"Oh",
"Dongjin",
""
],
[
"Kang",
"Mingu",
""
],
[
"Comin",
"Riccardo",
""
],
[
"Thomale",
"Ronny",
""
],
[
"Wehling",
"Tim O.",
""
],
[
"Di Sante",
"Domenico",
""
],
[
"Sangiovanni",
"Giorgio",
""
]
] |
2504.07902 | Sabir Ramazanov Dr. | E. Babichev, I. Dankovsky, D. Gorbunov, S. Ramazanov, A. Vikman | Biased domain walls: faster annihilation, weaker gravitational waves | 24 pages, 11 figures; more results of numerical simulations added,
fits to GW spectral shapes updated; conclusions unchanged | null | null | null | hep-ph astro-ph.CO hep-th | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the evolution of domain wall networks and their phenomenological
implications in a model of a real scalar $\chi$, where a $Z_2$-symmetry is
slightly broken by a potential bias $V_{bias}$. It is demonstrated that the
latter triggers domain wall annihilation considerably earlier than previously
thought. Namely, we observe that the scaling relation $t_{ann} \propto
1/V^{2/3}_{bias}$ for the annihilation time $t_{ann}$ fits to the simulation
data better than a commonly assumed $t_{ann} \propto 1/V_{bias}$. As a result,
the energy density of gravitational waves produced by the network of biased
domain walls, for a given tiny $V_{bias}$, is suppressed compared to naive
expectations. The spectral shape of gravitational waves is similar to that
resulting from unbiased domain walls, but with more power in the
close-to-maximum ultraviolet part. In the far ultraviolet region, the spectrum
of gravitational waves becomes nearly flat; such a plateau has been recognised
earlier in the case of unbiased walls. In our investigation we mainly focus on
the symmetry breaking potential $V_{breaking} \propto \chi^3$, and argue that
no significant modifications of the domain walls evolution take place if one
includes higher powers of $\chi$.
| [
{
"version": "v1",
"created": "Thu, 10 Apr 2025 16:26:08 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 09:48:42 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Babichev",
"E.",
""
],
[
"Dankovsky",
"I.",
""
],
[
"Gorbunov",
"D.",
""
],
[
"Ramazanov",
"S.",
""
],
[
"Vikman",
"A.",
""
]
] |
2504.07989 | Raj Dandekar | Nirvan Patil, Malhar Abhay Inamdar, Agnivo Gosai, Guruprasad Pathak,
Anish Joshi, Aryan Sagavekar, Anish Joshirao, Raj Dandekar, Rajat Dandekar,
Sreedath Panat | Regional Tiny Stories: Using Small Models to Compare Language Learning
and Tokenizer Performance | 34 pages, 24 figures, 16 tables | null | null | null | cs.CL cs.AI | http://creativecommons.org/licenses/by/4.0/ | Small Language Models (SLMs) offer efficient alternatives to LLMs for
specific domains. The 2023 TinyStories study developed an English dataset that
allows SLMs with 1 to 10 million parameters to produce coherent outputs. Our
research expands this framework by translating the original dataset into Indian
languages and creating synthetic data using LLMs. We focus on Hindi, Marathi,
and Bengali, evaluating SLMs for regional language processing and understanding
linguistic complexity. We show that SLMs efficiently process regional languages
with significantly fewer parameters than LLMs, providing a complementary
framework for ``inference based evaluation" of tokenization strategies and
linguistic complexity. Our analysis shows that language-specific tokenizers
outperform general-purpose ones for Indian languages. Empirical validations,
supported by information-theoretic and morphological analyses, provides
fundamental understanding behind the better performance of Hindi models over
Marathi and Bengali. Additionally, we show that synthetic datasets outperform
translated content for training SLMs. Correlation analyses reveal
cross-linguistic patterns and language-specific relationships between
creativity, grammatical precision, and narrative completeness. These findings
advance both the practical application of SLMs to underserved languages and our
theoretical understanding of neural language development.
| [
{
"version": "v1",
"created": "Mon, 7 Apr 2025 10:33:14 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 05:18:24 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Patil",
"Nirvan",
""
],
[
"Inamdar",
"Malhar Abhay",
""
],
[
"Gosai",
"Agnivo",
""
],
[
"Pathak",
"Guruprasad",
""
],
[
"Joshi",
"Anish",
""
],
[
"Sagavekar",
"Aryan",
""
],
[
"Joshirao",
"Anish",
""
],
[
"Dandekar",
"Raj",
""
],
[
"Dandekar",
"Rajat",
""
],
[
"Panat",
"Sreedath",
""
]
] |
2504.08365 | Xueping Zhang | Xueping Zhang, Yaxiong Chen, Ruilin Yao, Yunfei Zi, Shengwu Xiong | Location-Oriented Sound Event Localization and Detection with Spatial
Mapping and Regression Localization | null | null | null | null | cs.SD eess.AS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Sound Event Localization and Detection (SELD) combines the Sound Event
Detection (SED) with the corresponding Direction Of Arrival (DOA). Recently,
adopted event oriented multi-track methods affect the generality in polyphonic
environments due to the limitation of the number of tracks. To enhance the
generality in polyphonic environments, we propose Spatial Mapping and
Regression Localization for SELD (SMRL-SELD). SMRL-SELD segments the 3D spatial
space, mapping it to a 2D plane, and a new regression localization loss is
proposed to help the results converge toward the location of the corresponding
event. SMRL-SELD is location-oriented, allowing the model to learn event
features based on orientation. Thus, the method enables the model to process
polyphonic sounds regardless of the number of overlapping events. We conducted
experiments on STARSS23 and STARSS22 datasets and our proposed SMRL-SELD
outperforms the existing SELD methods in overall evaluation and polyphony
environments.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 09:00:53 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 04:59:09 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Zhang",
"Xueping",
""
],
[
"Chen",
"Yaxiong",
""
],
[
"Yao",
"Ruilin",
""
],
[
"Zi",
"Yunfei",
""
],
[
"Xiong",
"Shengwu",
""
]
] |
2504.08681 | Gilles Pag\`es | Harald Luschgy and Gilles Pag\`es | Locally optimal Functional Quantization | 6 pages | null | null | null | math.PR | http://creativecommons.org/licenses/by/4.0/ | In this note we demonstrate that locally optimal functional quantizers for
probability distributions on a Banach space lying in the support of $P$ behave
exactly like globally optimal functional quantizers in terms of
stationarity/self-consistency.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 16:42:27 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 07:47:48 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Luschgy",
"Harald",
""
],
[
"Pagès",
"Gilles",
""
]
] |
2504.08733 | Jano\v{s} Vidali | Jano\v{s} Vidali | Eigenspace embeddings of imprimitive association schemes | null | null | null | null | math.CO | http://creativecommons.org/licenses/by-sa/4.0/ | For a given symmetric association scheme $\mathcal{A}$ and its eigenspace
$S_j$ there exists a mapping of vertices of $\mathcal{A}$ to unit vectors of
$S_j$, known as the spherical representation of $\mathcal{A}$ in $S_j$, such
that the inner products of these vectors only depend on the relation between
the corresponding vertices; furthermore, these inner products only depend on
the parameters of $\mathcal{A}$. We consider parameters of imprimitive
association schemes listed as open cases in the list of parameters for
quotient-polynomial graphs recently published by Herman and Maleki, and study
embeddings of their substructures into some eigenspaces consistent with
spherical representations of the putative association schemes. Using this, we
obtain nonexistence for two parameter sets for $4$-class association schemes
and one parameter sets for a $5$-class association scheme passing all
previously known feasibility conditions, as well as uniqueness for two
parameter sets for $5$-class association schemes.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 17:58:47 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 15:36:58 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Vidali",
"Janoš",
""
]
] |
2504.08920 | Nicolas Garrel | Nicolas Garrel | Witt invariants of quaternionic forms | 18 pages | null | null | null | math.RA | http://creativecommons.org/licenses/by/4.0/ | We describe all Witt invariants of anti-hermitian forms over a quaternion
algebra with its canonical involution, and in particular all Witt invariants of
orthogonal groups $O(A,\sigma)$ where $(A,\sigma)$ is an central simple algebra
with orthogonal involution and $A$ has index $2$. They are combinations of
appropriately defined $\lambda$-powers, similarly to the case of quadratic
forms, but the module of invariants is no longer free over those operations.
The method involves extending the scalars to a generic splitting field of $A$,
and controlling the residues of the invariants with respect to valuations
coming from closed points in the Severi-Brauer variety.
| [
{
"version": "v1",
"created": "Fri, 11 Apr 2025 19:01:26 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 10:05:23 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Garrel",
"Nicolas",
""
]
] |
2504.09025 | Nam Nguyen | Nam Nguyen, Thuan Nguyen, Thinh Nguyen, Bella Bose | Universal Rate-Distortion-Classification Representations for Lossy
Compression | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In lossy compression, Wang et al. [1] recently introduced the
rate-distortion-perception-classification function, which supports multi-task
learning by jointly optimizing perceptual quality, classification accuracy, and
reconstruction fidelity. Building on the concept of a universal encoder
introduced in [2], we investigate the universal representations that enable a
broad range of distortion-classification tradeoffs through a single shared
encoder coupled with multiple task-specific decoders. We establish, through
both theoretical analysis and numerical experiments, that for Gaussian source
under mean squared error (MSE) distortion, the entire distortion-classification
tradeoff region can be achieved using a single universal encoder. For general
sources, we characterize the achievable region and identify conditions under
which encoder reuse results in negligible distortion penalty. The experimental
result on the MNIST dataset further supports our theoretical findings. We show
that universal encoders can obtain distortion performance comparable to
task-specific encoders. These results demonstrate the practicality and
effectiveness of the proposed universal framework in multi-task compression
scenarios.
| [
{
"version": "v1",
"created": "Sat, 12 Apr 2025 00:43:59 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 01:54:20 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Nguyen",
"Nam",
""
],
[
"Nguyen",
"Thuan",
""
],
[
"Nguyen",
"Thinh",
""
],
[
"Bose",
"Bella",
""
]
] |
2504.09192 | Zhiyong Wang | Zhiyong Wang | Towards More Efficient, Robust, Instance-adaptive, and Generalizable
Online Learning | Ph.D. Thesis | null | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | The primary goal of my Ph.D. study is to develop provably efficient and
practical algorithms for data-driven online sequential decision-making under
uncertainty. My work focuses on reinforcement learning (RL), multi-armed
bandits, and their applications, including recommendation systems, computer
networks, video analytics, and large language models (LLMs). Online learning
methods, such as bandits and RL, have demonstrated remarkable success - ranging
from outperforming human players in complex games like Atari and Go to
advancing robotics, recommendation systems, and fine-tuning LLMs. Despite these
successes, many established algorithms rely on idealized models that can fail
under model misspecifications or adversarial perturbations, particularly in
settings where accurate prior knowledge of the underlying model class is
unavailable or where malicious users operate within dynamic systems. These
challenges are pervasive in real-world applications, where robust and adaptive
solutions are critical. Furthermore, while worst-case guarantees provide
theoretical reliability, they often fail to capture instance-dependent
performance, which can lead to more efficient and practical solutions. Another
key challenge lies in generalizing to new, unseen environments, a crucial
requirement for deploying these methods in dynamic and unpredictable settings.
To address these limitations, my research aims to develop more efficient,
robust, instance-adaptive, and generalizable online learning algorithms for
both reinforcement learning and bandits. Towards this end, I focus on
developing more efficient, robust, instance-adaptive, and generalizable for
both general reinforcement learning (RL) and bandits.
| [
{
"version": "v1",
"created": "Sat, 12 Apr 2025 12:17:20 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 02:02:31 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Wang",
"Zhiyong",
""
]
] |
2504.09397 | Dinh-Quan Tran | Dinh-Quan Tran, Peter J. Olver | Continuous Revival of the Periodic Schr\"{o}dinger Equation with
Piecewise $C^2$ Potential | Made minor corrections and added figures. 21 pages, 24 figures.
Comments are welcome! | null | null | null | math.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we investigate the revivals of the one-dimensional periodic
Schr\"odinger equation with a piecewise $C^2$ potential function. As has been
observed through numerical simulations of the equation with various initial
data and potential functions, the solution, while remaining fractalized at
irrational times, exhibits a form of revival at rational times. The goal is to
prove that the solution at these rational times is given by a finite linear
combination of translations and dilations of the initial datum, plus an
additional continuous term, which we call "continuous revival". In pursuit of
this result, we present a review of relevant properties of the periodic
Schr\"odinger equation as an eigenvalue problem, including asymptotic results
on both the eigenvalues and eigenfunctions.
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2025 01:43:50 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 17:22:04 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Tran",
"Dinh-Quan",
""
],
[
"Olver",
"Peter J.",
""
]
] |
2504.09448 | Lin Zhu | Lin Zhu, Xinbing Wang, Chenghu Zhou, Nanyang Ye | Bayesian Cross-Modal Alignment Learning for Few-Shot Out-of-Distribution
Generalization | Accepted by AAAI2023 | null | null | null | cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Recent advances in large pre-trained models showed promising results in
few-shot learning. However, their generalization ability on two-dimensional
Out-of-Distribution (OoD) data, i.e., correlation shift and diversity shift,
has not been thoroughly investigated. Researches have shown that even with a
significant amount of training data, few methods can achieve better performance
than the standard empirical risk minimization method (ERM) in OoD
generalization. This few-shot OoD generalization dilemma emerges as a
challenging direction in deep neural network generalization research, where the
performance suffers from overfitting on few-shot examples and OoD
generalization errors. In this paper, leveraging a broader supervision source,
we explore a novel Bayesian cross-modal image-text alignment learning method
(Bayes-CAL) to address this issue. Specifically, the model is designed as only
text representations are fine-tuned via a Bayesian modelling approach with
gradient orthogonalization loss and invariant risk minimization (IRM) loss. The
Bayesian approach is essentially introduced to avoid overfitting the base
classes observed during training and improve generalization to broader unseen
classes. The dedicated loss is introduced to achieve better image-text
alignment by disentangling the causal and non-casual parts of image features.
Numerical experiments demonstrate that Bayes-CAL achieved state-of-the-art OoD
generalization performances on two-dimensional distribution shifts. Moreover,
compared with CLIP-like models, Bayes-CAL yields more stable generalization
performances on unseen classes. Our code is available at
https://github.com/LinLLLL/BayesCAL.
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2025 06:13:37 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 10:59:00 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Zhu",
"Lin",
""
],
[
"Wang",
"Xinbing",
""
],
[
"Zhou",
"Chenghu",
""
],
[
"Ye",
"Nanyang",
""
]
] |
2504.09597 | Zhixuan Pan | Zhixuan Pan, Shaowen Wang, Jian Li | Understanding LLM Behaviors via Compression: Data Generation, Knowledge
Acquisition and Scaling Laws | null | null | null | null | cs.AI cs.IT cs.LG math.IT | http://creativecommons.org/licenses/by/4.0/ | Large Language Models (LLMs) have demonstrated remarkable capabilities across
numerous tasks, yet principled explanations for their underlying mechanisms and
several phenomena, such as scaling laws, hallucinations, and related behaviors,
remain elusive. In this work, we revisit the classical relationship between
compression and prediction, grounded in Kolmogorov complexity and Shannon
information theory, to provide deeper insights into LLM behaviors. By
leveraging the Kolmogorov Structure Function and interpreting LLM compression
as a two-part coding process, we offer a detailed view of how LLMs acquire and
store information across increasing model and data scales -- from pervasive
syntactic patterns to progressively rarer knowledge elements. Motivated by this
theoretical perspective and natural assumptions inspired by Heap's and Zipf's
laws, we introduce a simplified yet representative hierarchical data-generation
framework called the Syntax-Knowledge model. Under the Bayesian setting, we
show that prediction and compression within this model naturally lead to
diverse learning and scaling behaviors of LLMs. In particular, our theoretical
analysis offers intuitive and principled explanations for both data and model
scaling laws, the dynamics of knowledge acquisition during training and
fine-tuning, factual knowledge hallucinations in LLMs. The experimental results
validate our theoretical predictions.
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2025 14:31:52 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Apr 2025 16:53:17 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Apr 2025 15:18:42 GMT"
},
{
"version": "v4",
"created": "Tue, 22 Apr 2025 14:11:33 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Pan",
"Zhixuan",
""
],
[
"Wang",
"Shaowen",
""
],
[
"Li",
"Jian",
""
]
] |
2504.09697 | Kenan Tang | Kenan Tang, Yanhong Li, Yao Qin | SPICE: A Synergistic, Precise, Iterative, and Customizable Image Editing
Workflow | 24 pages, 21 figures. Figure 9(b) has been accepted by CVPR AI Art
Gallery 2025 | null | null | null | cs.GR cs.CV cs.LG | http://creativecommons.org/licenses/by/4.0/ | Recent prompt-based image editing models have demonstrated impressive
prompt-following capability at structural editing tasks. However, existing
models still fail to perform local edits, follow detailed editing prompts, or
maintain global image quality beyond a single editing step. To address these
challenges, we introduce SPICE, a training-free workflow that accepts arbitrary
resolutions and aspect ratios, accurately follows user requirements, and
improves image quality consistently during more than 100 editing steps. By
synergizing the strengths of a base diffusion model and a Canny edge ControlNet
model, SPICE robustly handles free-form editing instructions from the user.
SPICE outperforms state-of-the-art baselines on a challenging realistic
image-editing dataset consisting of semantic editing (object addition, removal,
replacement, and background change), stylistic editing (texture changes), and
structural editing (action change) tasks. Not only does SPICE achieve the
highest quantitative performance according to standard evaluation metrics, but
it is also consistently preferred by users over existing image-editing methods.
We release the workflow implementation for popular diffusion model Web UIs to
support further research and artistic exploration.
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2025 19:13:04 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Tang",
"Kenan",
""
],
[
"Li",
"Yanhong",
""
],
[
"Qin",
"Yao",
""
]
] |
2504.09723 | Yuxuan Lu | Dakuo Wang, Ting-Yao Hsu, Yuxuan Lu, Hansu Gu, Limeng Cui, Yaochen
Xie, William Headean, Bingsheng Yao, Akash Veeragouni, Jiapeng Liu, Sreyashi
Nag, Jessie Wang | AgentA/B: Automated and Scalable Web A/BTesting with Interactive LLM
Agents | null | null | null | null | cs.HC cs.CL | http://creativecommons.org/licenses/by-nc-nd/4.0/ | A/B testing experiment is a widely adopted method for evaluating UI/UX design
decisions in modern web applications. Yet, traditional A/B testing remains
constrained by its dependence on the large-scale and live traffic of human
participants, and the long time of waiting for the testing result. Through
formative interviews with six experienced industry practitioners, we identified
critical bottlenecks in current A/B testing workflows. In response, we present
AgentA/B, a novel system that leverages Large Language Model-based autonomous
agents (LLM Agents) to automatically simulate user interaction behaviors with
real webpages. AgentA/B enables scalable deployment of LLM agents with diverse
personas, each capable of navigating the dynamic webpage and interactively
executing multi-step interactions like search, clicking, filtering, and
purchasing. In a demonstrative controlled experiment, we employ AgentA/B to
simulate a between-subject A/B testing with 1,000 LLM agents Amazon.com, and
compare agent behaviors with real human shopping behaviors at a scale. Our
findings suggest AgentA/B can emulate human-like behavior patterns.
| [
{
"version": "v1",
"created": "Sun, 13 Apr 2025 21:10:56 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 23:57:49 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Wang",
"Dakuo",
""
],
[
"Hsu",
"Ting-Yao",
""
],
[
"Lu",
"Yuxuan",
""
],
[
"Gu",
"Hansu",
""
],
[
"Cui",
"Limeng",
""
],
[
"Xie",
"Yaochen",
""
],
[
"Headean",
"William",
""
],
[
"Yao",
"Bingsheng",
""
],
[
"Veeragouni",
"Akash",
""
],
[
"Liu",
"Jiapeng",
""
],
[
"Nag",
"Sreyashi",
""
],
[
"Wang",
"Jessie",
""
]
] |
2504.09809 | Zhimin Li | Zhimin Li, Haichao Miao, Xinyuan Yan, Valerio Pascucci, Matthew
Berger, Shusen Liu | See or Recall: A Sanity Check for the Role of Vision in Solving
Visualization Question Answer Tasks with Multimodal LLMs | null | null | null | null | cs.HC cs.AI | http://creativecommons.org/licenses/by/4.0/ | Recent developments in multimodal large language models (MLLM) have equipped
language models to reason about vision and language jointly. This permits MLLMs
to both perceive and answer questions about data visualization across a variety
of designs and tasks. Applying MLLMs to a broad range of visualization tasks
requires us to properly evaluate their capabilities, and the most common way to
conduct evaluation is through measuring a model's visualization reasoning
capability, analogous to how we would evaluate human understanding of
visualizations (e.g., visualization literacy). However, we found that in the
context of visualization question answering (VisQA), how an MLLM perceives and
reasons about visualizations can be fundamentally different from how humans
approach the same problem. During the evaluation, even without visualization,
the model could correctly answer a substantial portion of the visualization
test questions, regardless of whether any selection options were provided. We
hypothesize that the vast amount of knowledge encoded in the language model
permits factual recall that supersedes the need to seek information from the
visual signal. It raises concerns that the current VisQA evaluation may not
fully capture the models' visualization reasoning capabilities. To address
this, we propose a comprehensive sanity check framework that integrates a
rule-based decision tree and a sanity check table to disentangle the effects of
"seeing" (visual processing) and "recall" (reliance on prior knowledge). This
validates VisQA datasets for evaluation, highlighting where models are truly
"seeing", positively or negatively affected by the factual recall, or relying
on inductive biases for question answering. Our study underscores the need for
careful consideration in designing future visualization understanding studies
when utilizing MLLMs.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 02:19:28 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 20:52:11 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Li",
"Zhimin",
""
],
[
"Miao",
"Haichao",
""
],
[
"Yan",
"Xinyuan",
""
],
[
"Pascucci",
"Valerio",
""
],
[
"Berger",
"Matthew",
""
],
[
"Liu",
"Shusen",
""
]
] |
2504.09865 | Isabel Gallegos | Isabel O. Gallegos, Chen Shani, Weiyan Shi, Federico Bianchi, Izzy
Gainsburg, Dan Jurafsky, Robb Willer | Labeling Messages as AI-Generated Does Not Reduce Their Persuasive
Effects | null | null | null | null | cs.CY cs.AI cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | As generative artificial intelligence (AI) enables the creation and
dissemination of information at massive scale and speed, it is increasingly
important to understand how people perceive AI-generated content. One prominent
policy proposal requires explicitly labeling AI-generated content to increase
transparency and encourage critical thinking about the information, but prior
research has not yet tested the effects of such labels. To address this gap, we
conducted a survey experiment (N=1601) on a diverse sample of Americans,
presenting participants with an AI-generated message about several public
policies (e.g., allowing colleges to pay student-athletes), randomly assigning
whether participants were told the message was generated by (a) an expert AI
model, (b) a human policy expert, or (c) no label. We found that messages were
generally persuasive, influencing participants' views of the policies by 9.74
percentage points on average. However, while 94.6% of participants assigned to
the AI and human label conditions believed the authorship labels, labels had no
significant effects on participants' attitude change toward the policies,
judgments of message accuracy, nor intentions to share the message with others.
These patterns were robust across a variety of participant characteristics,
including prior knowledge of the policy, prior experience with AI, political
party, education level, or age. Taken together, these results imply that, while
authorship labels would likely enhance transparency, they are unlikely to
substantially affect the persuasiveness of the labeled content, highlighting
the need for alternative strategies to address challenges posed by AI-generated
information.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 04:22:39 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 02:47:23 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Gallegos",
"Isabel O.",
""
],
[
"Shani",
"Chen",
""
],
[
"Shi",
"Weiyan",
""
],
[
"Bianchi",
"Federico",
""
],
[
"Gainsburg",
"Izzy",
""
],
[
"Jurafsky",
"Dan",
""
],
[
"Willer",
"Robb",
""
]
] |
2504.09940 | Guowen Li | Guowen Li, Xintong Liu, Shilei Cao, Haoyuan Liang, Mengxuan Chen,
Lixian Zhang, Jinxiao Zhang, Jiuke Wang, Meng Jin, Juepeng Zheng, Haohuan Fu | TianQuan-Climate: A Subseasonal-to-Seasonal Global Weather Model via
Incorporate Climatology State | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Subseasonal forecasting serves as an important support for Sustainable
Development Goals (SDGs), such as climate challenges, agricultural yield and
sustainable energy production. However, subseasonal forecasting is a complex
task in meteorology due to dissipating initial conditions and delayed external
forces. Although AI models are increasingly pushing the boundaries of this
forecasting limit, they face two major challenges: error accumulation and
Smoothness. To address these two challenges, we propose Climate Furnace
Subseasonal-to-Seasonal (TianQuan-Climate), a novel machine learning model
designed to provide global daily mean forecasts up to 45 days, covering five
upper-air atmospheric variables at 13 pressure levels and two surface
variables. Our proposed TianQuan-Climate has two advantages: 1) it utilizes a
multi-model prediction strategy to reduce system error impacts in long-term
subseasonal forecasts; 2) it incorporates a Content Fusion Module for
climatological integration and extends ViT with uncertainty blocks (UD-ViT) to
improve generalization by learning from uncertainty. We demonstrate the
effectiveness of TianQuan-Climate on benchmarks for weather forecasting and
climate projections within the 15 to 45-day range, where TianQuan-Climate
outperforms existing numerical and AI methods.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 07:02:34 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2025 14:16:48 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Apr 2025 02:29:49 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Li",
"Guowen",
""
],
[
"Liu",
"Xintong",
""
],
[
"Cao",
"Shilei",
""
],
[
"Liang",
"Haoyuan",
""
],
[
"Chen",
"Mengxuan",
""
],
[
"Zhang",
"Lixian",
""
],
[
"Zhang",
"Jinxiao",
""
],
[
"Wang",
"Jiuke",
""
],
[
"Jin",
"Meng",
""
],
[
"Zheng",
"Juepeng",
""
],
[
"Fu",
"Haohuan",
""
]
] |
2504.09944 | Alex Cowan | Alex Cowan | On the mean value of $\mathrm{GL}_1$ and $\mathrm{GL}_2$ $L$-functions,
with applications to murmurations | null | null | null | null | math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We determine the mean value of $L$-functions attached to quadratic twists of
automorphic representations on $\mathrm{GL}_1$ or $\mathrm{GL}_2$ in large
regions of the critical strip. In the case of $\mathrm{GL}_1$, we go on to
exhibit a recently discovered type of fine structure called "murmurations"
unconditionally for all of our families. Our main tool is a new variant of the
approximate functional equation imbued with a mechanism for dynamically
rebalancing error terms while preserving holomorphicity.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 07:09:40 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 20:56:55 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Cowan",
"Alex",
""
]
] |
2504.10027 | Yi Cui | Yi Cui, Rong Yu, and Weiqiang Yu | Deconfined Quantum Critical Point: A Review of Progress | Review article, to appear in Chinese Physics Letters | Chin. Phys. Lett. 42 047503 (2025) | 10.1088/0256-307X/42/4/047503 | null | cond-mat.str-el | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Deconfined quantum critical points (DQCPs) have been proposed as a class of
continuous quantum phase transitions occurring between two ordered phases with
distinct symmetry-breaking patterns, beyond the conventional framework of
Landau-Ginzburg-Wilson (LGW) theory. At the DQCP, the system exhibits emergent
gauge fields, fractionalized excitations, and enhanced symmetries. Here we
review recent theoretical and experimental progress on exploring DQCPs in
condensed matter systems. We first introduce theoretical advancements in the
study of DQCPs over the past twenty years, particularly in magnetic models on
square lattices, honeycomb lattices, kagome lattices, and one-dimensional spin
chains. We then discuss recent progress on experimental realization of DQCP in
quantum magnetic systems. Experimentally, the Shastry-Sutherland model,
realized in SrCu$_2$(BO$_3$)$_2$, offers a particularly promising platform for
realizing DQCPs. The magnetic frustration inherent to this model drives phase
transitions between two distinct symmetry-breaking states: a valence bond solid
(VBS) phase and a N\'{e}el antiferromagnetic phase. Remarkably,
SrCu$_2$(BO$_3$)$_2$ has provided the first experimental evidence of a
proximate DQCP through a field-induced Bose-Einstein condensation,
transitioning from the VBS state to the N\'{e}el state. Nevertheless, the
direct experimental realization of a DQCP remains a significant challenge.
Despite this, it offers a promising platform for exploring emergent phenomena
through quantum phase transition in low-dimensional quantum systems.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 09:31:58 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Cui",
"Yi",
""
],
[
"Yu",
"Rong",
""
],
[
"Yu",
"Weiqiang",
""
]
] |
2504.10088 | Gyanendra Kumar Verma | Gyanendra K. Verma, Nupur Patanker and Abhay Kumar Singh | Code size constraints in b-symbol read channels: A bound analysis | null | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by/4.0/ | In classical coding theory, error-correcting codes are designed to protect
against errors occurring at individual symbol positions in a codeword. However,
in practical storage and communication systems, errors often affect multiple
adjacent symbols rather than single symbols independently. To address this,
symbol-pair read channels were introduced \cite{Yuval2011}, and later
generalized to $b$-symbol read channels \cite{yaakobi2016} to better model such
error patterns. $b$-Symbol read channels generalize symbol-pair read channels
to account for clustered errors in modern storage and communication systems. By
developing bounds and efficient codes, researchers improve data reliability in
applications such as storage devices, wireless networks, and DNA-based storage.
Given integers $q$, $n$, $d$, and $b \geq 2$, let $A_b(n,d,q)$ denote the
largest possible code size for which there exists a $q$-ary code of length $n$
with minimum $b$-symbol distance at least $d$. In \cite{chen2022}, various
upper and lower bounds on $A_b(n,d,q)$ are given for $b=2$. In this paper, we
generalize some of these bounds to the $b$-symbol read channels for $b>2$ and
present several new bounds on $A_b(n,d,q)$. In particular, we establish the
linear programming bound, a recurrence relation on $A_b(n,d,q)$, the Johnson
bound (even), the restricted Johnson bound, the Gilbert-Varshamov-type bound,
and the Elias bound for the metric of symbols $b$, $b\geq 2$. Furthermore, we
provide examples demonstrating that the Gilbert-Varshamov bound we establish
offers a stronger lower bound than the one presented in \cite{Song2018}.
Additionally, we introduce an alternative approach to deriving the
Sphere-packing and Plotkin bounds.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 10:47:31 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 08:44:22 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Verma",
"Gyanendra K.",
""
],
[
"Patanker",
"Nupur",
""
],
[
"Singh",
"Abhay Kumar",
""
]
] |
2504.10114 | Tatsuya Kaneko | Tatsuya Kaneko, Masataka Kakoi, Kazuhiko Kuroki | $t$-$J$ model for strongly correlated two-orbital systems: Application
to bilayer nickelate superconductors | 20 pages, 8 figures | null | null | null | cond-mat.str-el cond-mat.supr-con | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive a $t$-$J$ model applicable to strongly correlated two-orbital
systems including bilayer nickelate superconductors. Using the Schrieffer-Wolff
transformation, we exclude the doubly occupied states raising the on-site
Coulomb energy and derive resulting spin interactions from the two-orbital
Hubbard model. We also introduce effective interactions attributed to the
interorbital Coulomb interaction. To adapt the effective model to bilayer
nickelates that exhibit high-temperature superconductivity, we quantitatively
evaluate the strengths of the spin interactions based on the hopping parameters
in La$_3$Ni$_2$O$_7$. Considering the evaluated effective interactions, we
propose a simplified $t$-$J$ model for bilayer nickelate superconductors.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 11:25:29 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 06:36:22 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Kaneko",
"Tatsuya",
""
],
[
"Kakoi",
"Masataka",
""
],
[
"Kuroki",
"Kazuhiko",
""
]
] |
2504.10150 | Chen Zhang | Chen Zhang, Bo Hu, Weidong Chen, Zhendong Mao | HistLLM: A Unified Framework for LLM-Based Multimodal Recommendation
with User History Encoding and Compression | We want to withdraw this paper and revise its experimental details.
The revised version will be uploaded after further verification | null | null | null | cs.IR cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While large language models (LLMs) have proven effective in leveraging
textual data for recommendations, their application to multimodal
recommendation tasks remains relatively underexplored. Although LLMs can
process multimodal information through projection functions that map visual
features into their semantic space, recommendation tasks often require
representing users' history interactions through lengthy prompts combining text
and visual elements, which not only hampers training and inference efficiency
but also makes it difficult for the model to accurately capture user
preferences from complex and extended prompts, leading to reduced
recommendation performance. To address this challenge, we introduce HistLLM, an
innovative multimodal recommendation framework that integrates textual and
visual features through a User History Encoding Module (UHEM), compressing
multimodal user history interactions into a single token representation,
effectively facilitating LLMs in processing user preferences. Extensive
experiments demonstrate the effectiveness and efficiency of our proposed
mechanism.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 12:01:11 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 02:41:47 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Zhang",
"Chen",
""
],
[
"Hu",
"Bo",
""
],
[
"Chen",
"Weidong",
""
],
[
"Mao",
"Zhendong",
""
]
] |
2504.10284 | Weiqi Wang Mr. | Weiqi Wang, Jiefu Ou, Yangqiu Song, Benjamin Van Durme, Daniel
Khashabi | Can LLMs Generate Tabular Summaries of Science Papers? Rethinking the
Evaluation Protocol | null | null | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Literature review tables are essential for summarizing and comparing
collections of scientific papers. We explore the task of generating tables that
best fulfill a user's informational needs given a collection of scientific
papers. Building on recent work (Newman et al., 2024), we extend prior
approaches to address real-world complexities through a combination of
LLM-based methods and human annotations. Our contributions focus on three key
challenges encountered in real-world use: (i) User prompts are often
under-specified; (ii) Retrieved candidate papers frequently contain irrelevant
content; and (iii) Task evaluation should move beyond shallow text similarity
techniques and instead assess the utility of inferred tables for
information-seeking tasks (e.g., comparing papers). To support reproducible
evaluation, we introduce ARXIV2TABLE, a more realistic and challenging
benchmark for this task, along with a novel approach to improve literature
review table generation in real-world scenarios. Our extensive experiments on
this benchmark show that both open-weight and proprietary LLMs struggle with
the task, highlighting its difficulty and the need for further advancements.
Our dataset and code are available at https://github.com/JHU-CLSP/arXiv2Table.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 14:52:28 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 03:09:56 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Wang",
"Weiqi",
""
],
[
"Ou",
"Jiefu",
""
],
[
"Song",
"Yangqiu",
""
],
[
"Van Durme",
"Benjamin",
""
],
[
"Khashabi",
"Daniel",
""
]
] |
2504.10305 | Fedor Vylegzhanin | Fedor Vylegzhanin and Yakov Veryovkin | Commutator subalgebra of the Lie algebra associated with a right-angled
Coxeter group | 16 pages. v2: Theorem 3.5 generalised; Section 6 rewritten, fixing
the proof of Theorem 7.2 | null | null | null | math.GR math.AT | http://creativecommons.org/licenses/by/4.0/ | We study the graded Lie algebra $L(RC_K)$ associated with the lower central
series of a right-angled Coxeter group $RC_K$. We prove that its commutator
subalgebra is a quotient of the polynomial ring over an auxiliary Lie
subalgebra $N_K$ of the graph Lie algebra $L_K$, and conjecture that the
quotient map is an isomorphism. The epimorphism is defined in terms of a new
operation in the associated Lie algebra, which corresponds to the squaring and
has an analogue in homotopy theory.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 15:13:49 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 13:34:45 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Vylegzhanin",
"Fedor",
""
],
[
"Veryovkin",
"Yakov",
""
]
] |
2504.10601 | William Gyory | Ra\'ul A. Brice\~no, William Gyory, Thomas Iadecola, Srimoyee Sen | Simulating lattice fermion doubling with a Floquet drive | 6 pages, 1 figure, supplemental material (6 pages) | null | null | null | hep-lat cond-mat.mes-hall hep-th nucl-th quant-ph | http://creativecommons.org/licenses/by/4.0/ | We consider a recently discovered mathematical correspondence between the
spectra of a naively discretized lattice fermion and that of a periodically
driven (i.e., Floquet) quantum system and turn it into an infrared equivalence
between the two systems. The equivalence can be framed as a duality relation,
allowing us to simulate a two-flavor discrete-time fermion theory on the
lattice side, where the two flavors arise from time discretization, using a
single-flavor fermion theory on the Floquet side. Our demonstration establishes
an equivalence between (i) the fermion content, (ii) the correlation functions,
and consequently (iii) observables of the two theories in the infrared. We also
show how interactions may be incorporated into this equivalence.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 18:01:40 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 01:39:56 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Briceño",
"Raúl A.",
""
],
[
"Gyory",
"William",
""
],
[
"Iadecola",
"Thomas",
""
],
[
"Sen",
"Srimoyee",
""
]
] |
2504.10621 | Chase Hatcher | Chase Hatcher, Lily Donis, Adrienne Traxler, Madison Swirtz, Camila
Manni, Justin Gutzwa, Charles Henderson, Ram\'on Barthelemy | Egocentric Mixed-Methods SNA: Analyzing Interviews with Women and/or
Queer and LGBT+ Ph.D. Physicists | null | null | null | null | physics.ed-ph | http://creativecommons.org/licenses/by/4.0/ | Social network analysis (SNA) has been widely used in physics education
research (PER) in recent years, but mostly in a limited range of the available
modalities. This paper describes a unique approach to egocentric, mixed-methods
SNA applied to qualitative network data obtained from 100 interviews with women
and/or queer professional physicists. We focus on our methods for obtaining
quantitative network data from these qualitative sources and present novel
techniques for analysis of the networks. We also examine the ways in which
egocentric and mixed-methods SNA techniques are aligned with critical methods
and well-suited to the study of difference, non-normativity, and experiences of
marginalization in physics spaces and communities. We explore the limitations
and potential applications of these methods and situate this work in the larger
context of our study of these interviews. This work bridges a methodological
gap between SNA and qualitative work on identity in PER and begins to develop
our understanding of the way gender and sexual minority physicists experience
support.
| [
{
"version": "v1",
"created": "Mon, 14 Apr 2025 18:21:30 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 17:02:01 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Hatcher",
"Chase",
""
],
[
"Donis",
"Lily",
""
],
[
"Traxler",
"Adrienne",
""
],
[
"Swirtz",
"Madison",
""
],
[
"Manni",
"Camila",
""
],
[
"Gutzwa",
"Justin",
""
],
[
"Henderson",
"Charles",
""
],
[
"Barthelemy",
"Ramón",
""
]
] |
2504.10852 | Xuesong Li | Pengxiao Han, Changkun Ye, Jinguang Tong, Cuicui Jiang, Jie Hong, Li
Fang, Xuesong Li | Enhancing Features in Long-tailed Data Using Large Vision Model | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Language-based foundation models, such as large language models (LLMs) or
large vision-language models (LVLMs), have been widely studied in long-tailed
recognition. However, the need for linguistic data is not applicable to all
practical tasks. In this study, we aim to explore using large vision models
(LVMs) or visual foundation models (VFMs) to enhance long-tailed data features
without any language information. Specifically, we extract features from the
LVM and fuse them with features in the baseline network's map and latent space
to obtain the augmented features. Moreover, we design several prototype-based
losses in the latent space to further exploit the potential of the augmented
features. In the experimental section, we validate our approach on two
benchmark datasets: ImageNet-LT and iNaturalist2018.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 04:21:50 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 12:31:32 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Han",
"Pengxiao",
""
],
[
"Ye",
"Changkun",
""
],
[
"Tong",
"Jinguang",
""
],
[
"Jiang",
"Cuicui",
""
],
[
"Hong",
"Jie",
""
],
[
"Fang",
"Li",
""
],
[
"Li",
"Xuesong",
""
]
] |
2504.10870 | Apurva Tiwari | Apurva Tiwari, Jason Iaconis, Jezer Jojo, Sayonee Ray, Martin
Roetteler, Chris Hill, Jay Pathak | Algorithmic Advances Towards a Realizable Quantum Lattice Boltzmann
Method | 11 pages, 11 figures | null | null | null | quant-ph cs.ET physics.comp-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The Quantum Lattice Boltzmann Method (QLBM) is one of the most promising
approaches for realizing the potential of quantum computing in simulating
computational fluid dynamics. Many recent works mostly focus on classical
simulation, and rely on full state tomography. Several key algorithmic issues
like observable readout, data encoding, and impractical circuit depth remain
unsolved. As a result, these are not directly realizable on any quantum
hardware. We present a series of novel algorithmic advances which allow us to
implement the QLBM algorithm, for the first time, on a quantum computer.
Hardware results for the time evolution of a 2D Gaussian initial density
distribution subject to a uniform advection-diffusion field are presented.
Furthermore, 3D simulation results are presented for particular non-uniform
advection fields, devised so as to avoid the problem of diminishing probability
of success due to repeated post-selection operations required for multiple
timesteps. We demonstrate the evolution of an initial quantum state governed by
the advection-diffusion equation, accounting for the iterative nature of the
explicit QLBM algorithm. A tensor network encoding scheme is used to represent
the initial condition supplied to the advection-diffusion equation,
significantly reducing the two-qubit gate count affording a shorter circuit
depth. Further reductions are made in the collision and streaming operators.
Collectively, these advances give a path to realizing more practical, 2D and 3D
QLBM applications with non-trivial velocity fields on quantum hardware.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 05:02:41 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Tiwari",
"Apurva",
""
],
[
"Iaconis",
"Jason",
""
],
[
"Jojo",
"Jezer",
""
],
[
"Ray",
"Sayonee",
""
],
[
"Roetteler",
"Martin",
""
],
[
"Hill",
"Chris",
""
],
[
"Pathak",
"Jay",
""
]
] |
2504.10897 | Prashanti Priya Angara | Prashanti Priya Angara, Emily Martins, Ulrike Stege, Hausi M\"uller | SCOOP: A Quantum-Computing Framework for Constrained Combinatorial
Optimization | 11 pages,4 figures, 1 table | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | While the ultimate goal of solving computationally intractable problems is to
find a provably optimal solutions, practical constraints of real-world
scenarios often necessitate focusing on efficiently obtaining high-quality,
near-optimal solutions. The Quantum Approximate Optimization Algorithm (QAOA)
is a state-of-the-art hybrid quantum-classical approach for tackling these
challenging problems that are encoded using quadratic and higher-order
unconstrained binary optimization problems (QUBO and HUBO). We present SCOOP, a
novel QAOA-based framework for solving constrained optimization problems. SCOOP
transforms a constrained problem into an unconstrained counterpart, forming
SCOOP problem twins. The QAOA quantum algorithm operates on the unconstrained
twin to identify potential optimal and near-optimal solutions. Effective
classical post-processing reduces the solution set to the constrained problem
space. Our SCOOP approach is solution-enhanced, objective-function-compatible,
and scalable. We demonstrate the framework on three NP-hard problems, Minimum
Dominating Set, Minimum Maximal Matching, and Minimum Set Cover appearing in
practical application domains such as resource allocation, communication
networks, and machine learning. We validate SCOOP's feasibility and
effectiveness on Xanadu PennyLane simulators.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 06:17:23 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 23:41:31 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Angara",
"Prashanti Priya",
""
],
[
"Martins",
"Emily",
""
],
[
"Stege",
"Ulrike",
""
],
[
"Müller",
"Hausi",
""
]
] |
2504.10915 | Rajesh Ranjan | Rajesh Ranjan, Shailja Gupta, Surya Narayan Singh | LOKA Protocol: A Decentralized Framework for Trustworthy and Ethical AI
Agent Ecosystems | 4 Figures, 1 Table | null | null | null | cs.MA cs.AI cs.CY | http://creativecommons.org/licenses/by-nc-sa/4.0/ | The rise of autonomous AI agents, capable of perceiving, reasoning, and
acting independently, signals a profound shift in how digital ecosystems
operate, govern, and evolve. As these agents proliferate beyond centralized
infrastructures, they expose foundational gaps in identity, accountability, and
ethical alignment. Three critical questions emerge: Identity: Who or what is
the agent? Accountability: Can its actions be verified, audited, and trusted?
Ethical Consensus: Can autonomous systems reliably align with human values and
prevent harmful emergent behaviors? We present the novel LOKA Protocol (Layered
Orchestration for Knowledgeful Agents), a unified, systems-level architecture
for building ethically governed, interoperable AI agent ecosystems. LOKA
introduces a proposed Universal Agent Identity Layer (UAIL) for decentralized,
verifiable identity; intent-centric communication protocols for semantic
coordination across diverse agents; and a Decentralized Ethical Consensus
Protocol (DECP) that could enable agents to make context-aware decisions
grounded in shared ethical baselines. Anchored in emerging standards such as
Decentralized Identifiers (DIDs), Verifiable Credentials (VCs), and
post-quantum cryptography, LOKA proposes a scalable, future-resilient blueprint
for multi-agent AI governance. By embedding identity, trust, and ethics into
the protocol layer itself, LOKA proposes the foundation for a new era of
responsible, transparent, and autonomous AI ecosystems operating across digital
and physical domains.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 06:51:35 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 02:59:48 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Ranjan",
"Rajesh",
""
],
[
"Gupta",
"Shailja",
""
],
[
"Singh",
"Surya Narayan",
""
]
] |
2504.10972 | Yihang Liu | Yihang Liu, Lianghua He, Ying Wen, Longzhen Yang, Hongzhou Chen | AFiRe: Anatomy-Driven Self-Supervised Learning for Fine-Grained
Representation in Radiographic Images | null | null | 10.1609/aaai.v39i18.34091 | null | cs.CV | http://creativecommons.org/licenses/by/4.0/ | Current self-supervised methods, such as contrastive learning, predominantly
focus on global discrimination, neglecting the critical fine-grained anatomical
details required for accurate radiographic analysis. To address this challenge,
we propose an Anatomy-driven self-supervised framework for enhancing
Fine-grained Representation in radiographic image analysis (AFiRe). The core
idea of AFiRe is to align the anatomical consistency with the unique
token-processing characteristics of Vision Transformer. Specifically, AFiRe
synergistically performs two self-supervised schemes: (i) Token-wise
anatomy-guided contrastive learning, which aligns image tokens based on
structural and categorical consistency, thereby enhancing fine-grained
spatial-anatomical discrimination; (ii) Pixel-level anomaly-removal
restoration, which particularly focuses on local anomalies, thereby refining
the learned discrimination with detailed geometrical information. Additionally,
we propose Synthetic Lesion Mask to enhance anatomical diversity while
preserving intra-consistency, which is typically corrupted by traditional data
augmentations, such as Cropping and Affine transformations. Experimental
results show that AFiRe: (i) provides robust anatomical discrimination,
achieving more cohesive feature clusters compared to state-of-the-art
contrastive learning methods; (ii) demonstrates superior generalization,
surpassing 7 radiography-specific self-supervised methods in multi-label
classification tasks with limited labeling; and (iii) integrates fine-grained
information, enabling precise anomaly detection using only image-level
annotations.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 08:29:54 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 08:38:33 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Liu",
"Yihang",
""
],
[
"He",
"Lianghua",
""
],
[
"Wen",
"Ying",
""
],
[
"Yang",
"Longzhen",
""
],
[
"Chen",
"Hongzhou",
""
]
] |
2504.11035 | Hannah Correia | Hannah E. Correia | A conceptual synthesis of causal assumptions for causal discovery and
inference | Withdrawn for incorporation as supplementary material in a broader
collaborative manuscript; integration will be reflected in a new preprint | null | null | null | stat.ME q-bio.QM stat.AP stat.OT | http://creativecommons.org/licenses/by-nc-nd/4.0/ | This work presents a conceptual synthesis of causal discovery and inference
frameworks, with a focus on how foundational assumptions -- causal sufficiency,
causal faithfulness, and the causal Markov condition -- are formalized and
operationalized across methodological traditions. Through structured tables and
comparative summaries, I map core assumptions, tasks, and analytical choices
from multiple causal frameworks, highlighting their connections and
differences. The synthesis provides practical guidance for researchers
designing causal studies, especially in settings where observational or
experimental constraints challenge standard approaches. This guide spans all
phases of causal analysis, including question formulation, formalization of
background knowledge, selection of appropriate frameworks, choice of study
design or algorithm, and interpretation. It is intended as a tool to support
rigorous causal reasoning across diverse empirical domains.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 09:58:06 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 18:55:20 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Correia",
"Hannah E.",
""
]
] |
2504.11086 | Fernando M\'ario de Oliveira Filho | Christine Bachoc, Bram Bekker, Philippe Moustrou, Fernando M\'ario de
Oliveira Filho | Obtuse almost-equiangular sets | 29 pages; fixed problem with references from previous version | null | null | null | math.CO math.MG math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For $t \in [-1, 1)$, a set of points on the $(n-1)$-dimensional unit sphere
is called $t$-almost equiangular if among any three distinct points there is a
pair with inner product $t$. We propose a semidefinite programming upper bound
for the maximum cardinality $\alpha(n, t)$ of such a set based on an extension
of the Lov\'asz theta number to hypergraphs. This bound is at least as good as
previously known bounds and for many values of $n$ and $t$ it is better.
We also refine existing spectral methods to show that $\alpha(n, t) \leq
2(n+1)$ for all $n$ and $t \leq 0$, with equality only at $t = -1/n$. This
allows us to show the uniqueness of the optimal construction at $t = -1/n$ for
$n \leq 5$ and to enumerate all possible constructions for $n \leq 3$ and $t
\leq 0$.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 11:32:46 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 11:21:59 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Bachoc",
"Christine",
""
],
[
"Bekker",
"Bram",
""
],
[
"Moustrou",
"Philippe",
""
],
[
"Filho",
"Fernando Mário de Oliveira",
""
]
] |
2504.11116 | Jeonggyu Huh | Jeonggyu Huh, Jaegi Jeon, Hyeng Keun Koo | Breaking the Dimensional Barrier: A Pontryagin-Guided Direct Policy
Optimization for Continuous-Time Multi-Asset Portfolio | null | null | null | null | q-fin.PM q-fin.CP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Solving large-scale, continuous-time portfolio optimization problems
involving numerous assets and state-dependent dynamics has long been challenged
by the curse of dimensionality. Traditional dynamic programming and PDE-based
methods, while rigorous, typically become computationally intractable beyond
few state variables (3~6 limit in prior studies). To overcome this critical
barrier, we introduce the Pontryagin-Guided Direct Policy Optimization (PG-DPO)
framework. PG-DPO leverages Pontryagin's Maximum Principle (PMP) and
backpropagation-through-time (BPTT) to guide neural network policies, handling
exogenous states without dense grids. This PMP-guided approach holds potential
for a broad class of sufficiently regular continuous-time control problems.
Crucially, our computationally efficient "Two-Stage" variant exploits rapidly
stabilizing BPTT costate estimates, converting them into near-optimal
Pontryagin controls after only a short warm-up, significantly reducing training
overhead. This enables a breakthrough in scalability: numerical experiments
show PG-DPO successfully tackles problems with dimensions previously considered
far out of reach (up to 50 assets and 10 state variables). The framework
delivers near-optimal policies, offering a practical and powerful alternative
for high-dimensional continuous-time portfolio choice.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 12:03:14 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 10:59:52 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Huh",
"Jeonggyu",
""
],
[
"Jeon",
"Jaegi",
""
],
[
"Koo",
"Hyeng Keun",
""
]
] |
2504.11392 | Mohamed ElKabbash | Mohamed ElKabbash | Probing General Relativity-Induced Decoherence Using an on-chip Sagnac
Interferometer | null | null | null | null | physics.optics quant-ph | http://creativecommons.org/licenses/by/4.0/ | The intersection of quantum mechanics and general relativity remains an open
frontier in fundamental physics, with few experimentally accessible phenomena
connecting the two. Recent theoretical proposals suggest that relativistic
proper time can act as a source of decoherence in quantum systems, providing a
testable overlap between the two theories. Here, we propose a chip-integrated
Sagnac interferometer where rotation induces a proper time difference between
clockwise and counterclockwise single-photon paths. When this time delay
exceeds the photon's coherence time, interference visibility is predicted to
decrease, offering a direct signature of relativistic time dilation-induced
decoherence. We theoretically derive the proper time difference arising from
the Sagnac effect and estimate that for a loop radius of 18.9 cm and a rotation
speed of 1000 rad/s, decoherence should occur for single-photon wavepackets
with a coherence time of 10 femtoseconds. We also present a practical chip
design that accommodates the required high-speed mechanical rotation and
includes an all-optical readout scheme to eliminate wiring constraints. This
approach enables a stable, on-chip implementation using realistic parameters,
with rotation speed serving as a continuously tunable knob to control
decoherence. Our platform opens a new route for experimentally probing the
interplay between quantum coherence and relativistic proper time in a scalable
and compact form.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 17:01:16 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 05:17:04 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"ElKabbash",
"Mohamed",
""
]
] |
2504.11403 | Qiutong Wang | Qiutong Wang | Counting irreducible representations of general linear groups and
unitary groups | null | null | null | null | math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $G$ be a general linear group over $\BR$, $\BC$, or $\BH$, or a real
unitary group. In this paper, we precisely describe the number of isomorphism
classes of irreducible Casselman-Wallach representations of $G$ with a given
infinitesimal character and a given associated variety, expressed in terms of
certain combinatorial data called painted Young diagrams and assigned Young
diagrams.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 17:18:20 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 10:32:56 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Wang",
"Qiutong",
""
]
] |
2504.11445 | Hengkai Ding | Hengkai Ding, Yiping Shu, Yun Chen, Nan Li, Xiaoyue Cao, James
Nightingale, Qiuhan He, Lei Wang and Hui Li | Pixel-level modelling of group-scale strong lens CASSOWARY 19 | 25 pages, 9 figures, 3 tables, accepted for publication in RAA | null | null | null | astro-ph.GA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the first high-precision model for the group-scale strong lensing
system CASSOWARY 19 (CSWA19), utilising images from the Hubble Space Telescope
(HST). Sixteen member galaxies identified via the red-sequence method, and the
main halo, all modelled as the dual Pseudo Isothermal Elliptical profile
(dPIE), are incorporated into a parametric lens model alongside an external
shear field. To model the system, we adopt the PyAutoLens software package,
employing a progressive search chain strategy for realizing the transition of
source model from multiple S\'ersic profiles to a brightness-adaptive
pixelization, which uses 1000 pixels in the source plane to reconstruct the
background source corresponding to 177,144 image pixels in the image plane. Our
results indicate that the total mass within the Einstein radius is
$M_{\theta_\mathrm{E}}$ $\approx 1.41\times10^{13}$M$_{\odot}$ and the average
slope of the total mass density $\rho (r)\propto r^{-\gamma}$ is
$\tilde{\gamma}=1.33$ within the effective radius. This slope is shallower than
those measured in galaxies and groups but is closer to those of galaxy
clusters. In addition, our approach successfully resolves the two merging
galaxies in the background source and yields a total magnification of
$\mu=103.18^{+0.23}_{-0.19}$, which is significantly higher than the outcomes
from previous studies of CSWA19. In summary, our research demonstrates the
effectiveness of the brightness-adaptive pixelization source reconstruction
technique for modelling group-scale strong lensing systems. It can serve as a
technical reference for future investigations into pixel-level modelling of the
group- and cluster-scale strong lensing systems.
| [
{
"version": "v1",
"created": "Tue, 15 Apr 2025 17:56:11 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Apr 2025 12:26:12 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Apr 2025 10:28:07 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Ding",
"Hengkai",
""
],
[
"Shu",
"Yiping",
""
],
[
"Chen",
"Yun",
""
],
[
"Li",
"Nan",
""
],
[
"Cao",
"Xiaoyue",
""
],
[
"Nightingale",
"James",
""
],
[
"He",
"Qiuhan",
""
],
[
"Wang",
"Lei",
""
],
[
"Li",
"Hui",
""
]
] |
2504.11676 | Wenshuai Hu | Wenshuai Hu and Guanghua Ji | Maximum bound principle for Q-tensor gradient flow with low regularity
integrators | 33 pages,60 figures | null | null | null | math.NA cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate low-regularity integrator (LRI) methods for the Q-tensor model
governing nematic liquid-crystalline semilinear parabolic equation. First- and
second-order temporal discretizations are developed using Duhamel's formula,
and we rigorously prove that both schemes preserve the maximum bound principle
(MBP) and energy dissipation under minimal regularity requirements. Optimal
convergence rates are established for the proposed methods. Numerical
experiments validate the theoretical findings, demonstrating that the
eigenvalues of Q remain strictly confined within the physical range
(-1/3},2/3).
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 00:22:05 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 04:52:04 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Hu",
"Wenshuai",
""
],
[
"Ji",
"Guanghua",
""
]
] |
2504.11759 | Ziyu Xu | Ziyu Xu and Lasse Fischer and Aaditya Ramdas | Bringing closure to FDR control: beating the e-Benjamini-Hochberg
procedure | 18 pages, 1 figure | null | null | null | stat.ME math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | False discovery rate (FDR) has been a key metric for error control in
multiple hypothesis testing, and many methods have developed for FDR control
across a diverse cross-section of settings and applications. We develop a
closure principle for all FDR controlling procedures, i.e., we provide a
characterization based on e-values for all admissible FDR controlling
procedures. A general version of this closure principle can recover any
multiple testing error metric and allows one to choose the error metric
post-hoc. We leverage this idea to formulate the closed eBH procedure, a
(usually strict) improvement over the eBH procedure for FDR control when
provided with e-values. This also yields a closed BY procedure that dominates
the Benjamini-Yekutieli (BY) procedure for FDR control with arbitrarily
dependent p-values, thus proving that the latter is inadmissibile. We
demonstrate the practical performance of our new procedures in simulations.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 04:36:12 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 04:56:11 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Xu",
"Ziyu",
""
],
[
"Fischer",
"Lasse",
""
],
[
"Ramdas",
"Aaditya",
""
]
] |
2504.11867 | Xingyu Li | Qi Liu, Yanchen Liu, Ruifeng Li, Chenhong Cao, Yufeng Li, Xingyu Li,
Peng Wang, Runhan Feng, Shiyang Bu | MDHP-Net: Detecting an Emerging Time-exciting Threat in IVN | This work was intended as a replacement of arXiv:2411.10258 and any
subsequent updates will appear there | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The integration of intelligent and connected technologies in modern vehicles,
while offering enhanced functionalities through Electronic Control Unit (ECU)
and interfaces like OBD-II and telematics, also exposes the vehicle's
in-vehicle network (IVN) to potential cyberattacks. Unlike prior work, we
identify a new time-exciting threat model against IVN. These attacks inject
malicious messages that exhibit a time-exciting effect, gradually manipulating
network traffic to disrupt vehicle operations and compromise safety-critical
functions. We systematically analyze the characteristics of the threat:
dynamism, time-exciting impact, and low prior knowledge dependency. To validate
its practicality, we replicate the attack on a real Advanced Driver Assistance
System via Controller Area Network (CAN), exploiting Unified Diagnostic Service
vulnerabilities and proposing four attack strategies. While CAN's integrity
checks mitigate attacks, Ethernet migration (e.g., DoIP/SOME/IP) introduces new
surfaces. We further investigate the feasibility of time-exciting threat under
SOME/IP. To detect time-exciting threat, we introduce MDHP-Net, leveraging
Multi-Dimentional Hawkes Process (MDHP) and temporal and message-wise feature
extracting structures. Meanwhile, to estimate MDHP parameters, we developed the
first GPU-optimized gradient descent solver for MDHP (MDHP-GDS). These modules
significantly improves the detection rate under time-exciting attacks in
multi-ECU IVN system. To address data scarcity, we release STEIA9, the first
open-source dataset for time-exciting attacks, covering 9 Ethernet-based attack
scenarios. Extensive experiments on STEIA9 (9 attack scenarios) show MDHP-Net
outperforms 3 baselines, confirming attack feasibility and detection efficacy.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 08:41:24 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 01:20:29 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Liu",
"Qi",
""
],
[
"Liu",
"Yanchen",
""
],
[
"Li",
"Ruifeng",
""
],
[
"Cao",
"Chenhong",
""
],
[
"Li",
"Yufeng",
""
],
[
"Li",
"Xingyu",
""
],
[
"Wang",
"Peng",
""
],
[
"Feng",
"Runhan",
""
],
[
"Bu",
"Shiyang",
""
]
] |
2504.11907 | Gabriele Calzolari | Gabriele Calzolari (1), Vidya Sumathy (1), Christoforos Kanellakis
(1), George Nikolakopoulos (1) ((1) Lule{\aa} University of Technology) | A Graph-Based Reinforcement Learning Approach with Frontier Potential
Based Reward for Safe Cluttered Environment Exploration | 6 pages, 4 figures, submitted to the 2025 IEEE/RSJ International
Conference on Intelligent Robots and Systems (IROS 2025) | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Autonomous exploration of cluttered environments requires efficient
exploration strategies that guarantee safety against potential collisions with
unknown random obstacles. This paper presents a novel approach combining a
graph neural network-based exploration greedy policy with a safety shield to
ensure safe navigation goal selection. The network is trained using
reinforcement learning and the proximal policy optimization algorithm to
maximize exploration efficiency while reducing the safety shield interventions.
However, if the policy selects an infeasible action, the safety shield
intervenes to choose the best feasible alternative, ensuring system
consistency. Moreover, this paper proposes a reward function that includes a
potential field based on the agent's proximity to unexplored regions and the
expected information gain from reaching them. Overall, the approach
investigated in this paper merges the benefits of the adaptability of
reinforcement learning-driven exploration policies and the guarantee ensured by
explicit safety mechanisms. Extensive evaluations in simulated environments
demonstrate that the approach enables efficient and safe exploration in
cluttered environments.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 09:31:14 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 12:15:25 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Calzolari",
"Gabriele",
"",
"Luleå University of Technology"
],
[
"Sumathy",
"Vidya",
"",
"Luleå University of Technology"
],
[
"Kanellakis",
"Christoforos",
"",
"Luleå University of Technology"
],
[
"Nikolakopoulos",
"George",
"",
"Luleå University of Technology"
]
] |
2504.11932 | Rintaro Karashima | Rintaro Karashima and Hiroyasu Inoue | Technological Complexity Based on Japanese Patent Data | null | null | null | null | cs.SI | http://creativecommons.org/licenses/by/4.0/ | As international competition intensifies in technologies, nations need to
identify key technologies to foster innovation. However, the identification is
difficult because a technology is independent, therefore has complex nature.
Here, this study aims to assess patent technological fields by applying
Technological Complexity Index from a corporate perspective, addressing its
underutilization in Japan despite its potential. By utilizing carefully
processed patent data from fiscal years 1981 to 2010, we analyze the bipartite
network which consists of 1,938 corporations and 35 or 124 technological
fields. Our findings provide quantitative characteristics of ubiquity and
sophistication for patent fields, the detailed technological trends that
reflect the social context, and methodological stability for policymakers and
researchers, contributing to targeted innovation strategies in Japan.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 10:12:00 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 05:11:47 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Karashima",
"Rintaro",
""
],
[
"Inoue",
"Hiroyasu",
""
]
] |
2504.11972 | Xanh Ho Thi | Xanh Ho, Jiahao Huang, Florian Boudin, and Akiko Aizawa | LLM-as-a-Judge: Reassessing the Performance of LLMs in Extractive QA | 17 pages; code and data are available at
https://github.com/Alab-NII/llm-judge-extract-qa | null | null | null | cs.CL | http://creativecommons.org/licenses/by/4.0/ | Extractive reading comprehension question answering (QA) datasets are
typically evaluated using Exact Match (EM) and F1-score, but these metrics
often fail to fully capture model performance. With the success of large
language models (LLMs), they have been employed in various tasks, including
serving as judges (LLM-as-a-judge). In this paper, we reassess the performance
of QA models using LLM-as-a-judge across four reading comprehension QA
datasets. We examine different families of LLMs and various answer types to
evaluate the effectiveness of LLM-as-a-judge in these tasks. Our results show
that LLM-as-a-judge is highly correlated with human judgments and can replace
traditional EM/F1 metrics. By using LLM-as-a-judge, the correlation with human
judgments improves significantly, from 0.22 (EM) and 0.40 (F1-score) to 0.85.
These findings confirm that EM and F1 metrics underestimate the true
performance of the QA models. While LLM-as-a-judge is not perfect for more
difficult answer types (e.g., job), it still outperforms EM/F1, and we observe
no bias issues, such as self-preference, when the same model is used for both
the QA and judgment tasks.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:08:46 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 05:04:40 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Ho",
"Xanh",
""
],
[
"Huang",
"Jiahao",
""
],
[
"Boudin",
"Florian",
""
],
[
"Aizawa",
"Akiko",
""
]
] |
2504.12060 | David Rasmussen Lolck | Nairen Cao, Vincent Cohen-Addad, Euiwoong Lee, Shi Li, David Rasmussen
Lolck, Alantha Newman, Mikkel Thorup, Lukas Vogl, Shuyi Yan, Hanwen Zhang | Static to Dynamic Correlation Clustering | null | null | null | null | cs.DS | http://creativecommons.org/licenses/by/4.0/ | Correlation clustering is a well-studied problem, first proposed by Bansal,
Blum, and Chawla [BBC04]. The input is an unweighted, undirected graph. The
problem is to cluster the vertices so as to minimizing the number of edges
between vertices in different clusters and missing edges between vertices
inside the same cluster. This problem has a wide application in data mining and
machine learning. We introduce a general framework that transforms existing
static correlation clustering algorithms into fully-dynamic ones that work
against an adaptive adversary.
We show how to apply our framework to known efficient correlation clustering
algorithms, starting from the classic $3$-approximate Pivot algorithm from
[ACN08]. Applied to the most recent near-linear $1.437$-approximation algorithm
from [CCL+25], we get a $1.437$-approximation fully-dynamic algorithm that
works with worst-case constant update time. The original static algorithm gets
its approximation factor with constant probability, and we get the same against
an adaptive adversary in the sense that for any given update step not known to
our algorithm, our solution is a $1.437$-approximation with constant
probability when we reach this update.
Previous dynamic algorithms had approximation factors around $3$ in
expectation, and they could only handle an oblivious adversary.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 13:13:16 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 12:54:09 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Cao",
"Nairen",
""
],
[
"Cohen-Addad",
"Vincent",
""
],
[
"Lee",
"Euiwoong",
""
],
[
"Li",
"Shi",
""
],
[
"Lolck",
"David Rasmussen",
""
],
[
"Newman",
"Alantha",
""
],
[
"Thorup",
"Mikkel",
""
],
[
"Vogl",
"Lukas",
""
],
[
"Yan",
"Shuyi",
""
],
[
"Zhang",
"Hanwen",
""
]
] |
2504.12157 | Xiaojun Ye | Xiaojun Ye, Chun Wang, Yiren Song, Sheng Zhou, Liangcheng Li, Jiajun
Bu | FocusedAD: Character-centric Movie Audio Description | Code and Demo link: https://github.com/Thorin215/FocusedAD | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Movie Audio Description (AD) aims to narrate visual content during
dialogue-free segments, particularly benefiting blind and visually impaired
(BVI) audiences. Compared with general video captioning, AD demands
plot-relevant narration with explicit character name references, posing unique
challenges in movie understanding.To identify active main characters and focus
on storyline-relevant regions, we propose FocusedAD, a novel framework that
delivers character-centric movie audio descriptions. It includes: (i) a
Character Perception Module(CPM) for tracking character regions and linking
them to names; (ii) a Dynamic Prior Module(DPM) that injects contextual cues
from prior ADs and subtitles via learnable soft prompts; and (iii) a Focused
Caption Module(FCM) that generates narrations enriched with plot-relevant
details and named characters. To overcome limitations in character
identification, we also introduce an automated pipeline for building character
query banks. FocusedAD achieves state-of-the-art performance on multiple
benchmarks, including strong zero-shot results on MAD-eval-Named and our newly
proposed Cinepile-AD dataset. Code and data will be released at
https://github.com/Thorin215/FocusedAD .
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 15:04:14 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 12:25:51 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Ye",
"Xiaojun",
""
],
[
"Wang",
"Chun",
""
],
[
"Song",
"Yiren",
""
],
[
"Zhou",
"Sheng",
""
],
[
"Li",
"Liangcheng",
""
],
[
"Bu",
"Jiajun",
""
]
] |
2504.12198 | Kevin Carter-Fenk | Kevin Carter-Fenk | Diagrammatic Simplification of Linearized Coupled Cluster Theory | 11 pages, 6 figures | null | null | null | physics.chem-ph | http://creativecommons.org/licenses/by/4.0/ | Linearized Coupled Cluster Doubles (LinCCD) often provides near-singular
energies in small-gap systems that exhibit static correlation. This has been
attributed to the lack of quadratic $T_2^2$ terms that typically balance out
small energy denominators in the CCD amplitude equations. Herein, I show that
exchange contributions to ring and crossed-ring contractions (not small
denominators per se) cause the divergent behavior of LinCC(S)D approaches.
Rather than omitting exchange terms, I recommend a regular and size-consistent
method that retains only linear ladder diagrams. As LinCCD and configuration
interaction doubles (CID) equations are isomorphic, this also implies that
simplification (rather than quadratic extensions) of CID amplitude equations
can lead to a size-consistent theory. Linearized ladder CCD (LinLCCD) is robust
in statically-correlated systems and can be made
$O(n_{\text{occ}}^4n_{\text{vir}}^2)$ with a hole-hole approximation. The
relationship between LinLCCD and random-phase approximation sets the stage for
the development of next-generation double-hybrid density functionals that can
describe static correlation.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 15:48:33 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 14:57:56 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Carter-Fenk",
"Kevin",
""
]
] |
2504.12362 | Azam Gholami | S. Gore, I. Gholami, S.O. Ahmed, T. Doskhozhina, S.V.R. Ambadipudi,
A.J. Bae and A. Gholami | Boundary Effects and Oxygen Deficiency-Driven Pattern Transitions in
Algal Bioconvection | null | null | null | null | physics.flu-dyn physics.bio-ph | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Suspensions of motile microorganisms can spontaneously give rise to large
scale fluid motion, known as bioconvection, which is characterized by dense,
cell-rich downwelling plumes interspersed with broad upwelling regions. In this
study, we investigate bioconvection in shallow suspensions of Chlamydomonas
reinhardtii cells confined within spiral-shaped boundaries, combining detailed
experimental observations with three dimensional simulations. Under open
liquid-air interface conditions, cells accumulate near the surface due to
negative gravitaxis, forming spiral shaped density patterns that subsequently
fragment into lattice-like structures and give rise to downwelling plumes.
Space-time analyses reveal coherent rotational dynamics, with inward moving
patterns near the spiral core and bidirectional motion farther from the center.
Introducing confinement by sealing the top boundary with an air impermeable
transparent wall triggers striking transitions in the bioconvection patterns,
driven by oxygen depletion: initially stable structures reorganize into new
patterns with reduced characteristic wavelengths. Complementary 3D simulations,
based on the incompressible Navier-Stokes equations and incorporating negative
buoyancy and active stress from swimming cells, capture the initial pattern
formation and its subsequent instability, reproducing the fragmentation of
spiral-shaped accumulations into downwelling plumes and the emergence of strong
vortical flows, nearly an order of magnitude faster than individual cell
swimming speeds. However, these models do not capture the oxygen-driven pattern
transitions observed experimentally. Our findings reveal that confinement
geometry, oxygen dynamics, and metabolic transitions critically govern
bioconvection pattern evolution, offering new strategies to control microbial
self-organization and flow through environmental and geometric design.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 11:25:04 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Apr 2025 10:23:41 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Gore",
"S.",
""
],
[
"Gholami",
"I.",
""
],
[
"Ahmed",
"S. O.",
""
],
[
"Doskhozhina",
"T.",
""
],
[
"Ambadipudi",
"S. V. R.",
""
],
[
"Bae",
"A. J.",
""
],
[
"Gholami",
"A.",
""
]
] |
2504.12391 | Yuri Nikolayevsky | Yuri Nikolayevsky and Wolfgang Ziller | Non-singular geodesic orbit nilmanifolds | null | null | null | null | math.DG math.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Riemannian manifold is called a geodesic orbit manifolds, GO for short, if
any geodesic is an orbit of a one-parameter group of isometries. By a result of
C.Gordon, a non-flat GO nilmanifold is necessarily a two-step nilpotent Lie
group with a left-invariant metric. We give a complete classification of
non-singular GO nilmanifolds. Besides previously known examples, there are new
families with 3-dimensional center, and two one-parameter families of
dimensions 14 and 15.
| [
{
"version": "v1",
"created": "Wed, 16 Apr 2025 18:01:05 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 06:16:27 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Nikolayevsky",
"Yuri",
""
],
[
"Ziller",
"Wolfgang",
""
]
] |
2504.12675 | Pengtao Dang | Pengtao Dang, Tingbo Guo, Melissa Fishel, Guang Lin, Wenzhuo Wu, Sha
Cao, Chi Zhang | Physics Informed Constrained Learning of Dynamics from Static Data | 39 pages, 10 figures | null | null | null | cs.LG physics.bio-ph q-bio.MN | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A physics-informed neural network (PINN) models the dynamics of a system by
integrating the governing physical laws into the architecture of a neural
network. By enforcing physical laws as constraints, PINN overcomes challenges
with data scarsity and potentially high dimensionality. Existing PINN
frameworks rely on fully observed time-course data, the acquisition of which
could be prohibitive for many systems. In this study, we developed a new PINN
learning paradigm, namely Constrained Learning, that enables the approximation
of first-order derivatives or motions using non-time course or partially
observed data. Computational principles and a general mathematical formulation
of Constrained Learning were developed. We further introduced MPOCtrL (Message
Passing Optimization-based Constrained Learning) an optimization approach
tailored for the Constrained Learning framework that strives to balance the
fitting of physical models and observed data. Its code is available at github
link: https://github.com/ptdang1001/MPOCtrL Experiments on synthetic and
real-world data demonstrated that MPOCtrL can effectively detect the nonlinear
dependency between observed data and the underlying physical properties of the
system. In particular, on the task of metabolic flux analysis, MPOCtrL
outperforms all existing data-driven flux estimators.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 06:06:53 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 05:57:01 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Dang",
"Pengtao",
""
],
[
"Guo",
"Tingbo",
""
],
[
"Fishel",
"Melissa",
""
],
[
"Lin",
"Guang",
""
],
[
"Wu",
"Wenzhuo",
""
],
[
"Cao",
"Sha",
""
],
[
"Zhang",
"Chi",
""
]
] |
2504.12822 | Folkert M\"uller-Hoissen | Folkert M\"uller-Hoissen and Rusuo Ye | Miura transformation in bidifferential calculus and a vectorial Darboux
transformation for the Fokas-Lenells equation | 25 pages, 5 figures, minor amendments in the second version | null | null | null | nlin.SI math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using a general result of bidifferential calculus and recent results of other
authors, a vectorial binary Darboux transformation is derived for the first
member of the "negative" part of the potential Kaup-Newell hierarchy, which is
a system of two coupled Fokas-Lenells equations. Miura transformations are
found from the latter to the first member of the negative part of the AKNS
hierarchy and also to its "pseudodual". The reduction to the Fokas-Lenells
equation is implemented and exact solutions with a plane wave seed generated.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 10:32:39 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 11:45:40 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Müller-Hoissen",
"Folkert",
""
],
[
"Ye",
"Rusuo",
""
]
] |
2504.12867 | Guanrou Yang | Guanrou Yang, Chen Yang, Qian Chen, Ziyang Ma, Wenxi Chen, Wen Wang,
Tianrui Wang, Yifan Yang, Zhikang Niu, Wenrui Liu, Fan Yu, Zhihao Du, Zhifu
Gao, ShiLiang Zhang, Xie Chen | EmoVoice: LLM-based Emotional Text-To-Speech Model with Freestyle Text
Prompting | null | null | null | null | eess.AS cs.AI cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human speech goes beyond the mere transfer of information; it is a profound
exchange of emotions and a connection between individuals. While Text-to-Speech
(TTS) models have made huge progress, they still face challenges in controlling
the emotional expression in the generated speech. In this work, we propose
EmoVoice, a novel emotion-controllable TTS model that exploits large language
models (LLMs) to enable fine-grained freestyle natural language emotion
control, and a phoneme boost variant design that makes the model output phoneme
tokens and audio tokens in parallel to enhance content consistency, inspired by
chain-of-thought (CoT) and chain-of-modality (CoM) techniques. Besides, we
introduce EmoVoice-DB, a high-quality 40-hour English emotion dataset featuring
expressive speech and fine-grained emotion labels with natural language
descriptions. EmoVoice achieves state-of-the-art performance on the English
EmoVoice-DB test set using only synthetic training data, and on the Chinese
Secap test set using our in-house data. We further investigate the reliability
of existing emotion evaluation metrics and their alignment with human
perceptual preferences, and explore using SOTA multimodal LLMs GPT-4o-audio and
Gemini to assess emotional speech. Demo samples are available at
https://yanghaha0908.github.io/EmoVoice/. Dataset, code, and checkpoints will
be released.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 11:50:04 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Apr 2025 08:18:11 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Apr 2025 02:09:12 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Yang",
"Guanrou",
""
],
[
"Yang",
"Chen",
""
],
[
"Chen",
"Qian",
""
],
[
"Ma",
"Ziyang",
""
],
[
"Chen",
"Wenxi",
""
],
[
"Wang",
"Wen",
""
],
[
"Wang",
"Tianrui",
""
],
[
"Yang",
"Yifan",
""
],
[
"Niu",
"Zhikang",
""
],
[
"Liu",
"Wenrui",
""
],
[
"Yu",
"Fan",
""
],
[
"Du",
"Zhihao",
""
],
[
"Gao",
"Zhifu",
""
],
[
"Zhang",
"ShiLiang",
""
],
[
"Chen",
"Xie",
""
]
] |
2504.12875 | Phung Lai | Phung Lai, Guanxiong Liu, NhatHai Phan, Issa Khalil, Abdallah
Khreishah, Xintao Wu | A Client-level Assessment of Collaborative Backdoor Poisoning in Non-IID
Federated Learning | null | 2025 International Conference on Distributed Computing Systems
(ICDCS) | null | null | cs.LG | http://creativecommons.org/licenses/by/4.0/ | Federated learning (FL) enables collaborative model training using
decentralized private data from multiple clients. While FL has shown robustness
against poisoning attacks with basic defenses, our research reveals new
vulnerabilities stemming from non-independent and identically distributed
(non-IID) data among clients. These vulnerabilities pose a substantial risk of
model poisoning in real-world FL scenarios.
To demonstrate such vulnerabilities, we develop a novel collaborative
backdoor poisoning attack called CollaPois. In this attack, we distribute a
single pre-trained model infected with a Trojan to a group of compromised
clients. These clients then work together to produce malicious gradients,
causing the FL model to consistently converge towards a low-loss region
centered around the Trojan-infected model. Consequently, the impact of the
Trojan is amplified, especially when the benign clients have diverse local data
distributions and scattered local gradients. CollaPois stands out by achieving
its goals while involving only a limited number of compromised clients, setting
it apart from existing attacks. Also, CollaPois effectively avoids noticeable
shifts or degradation in the FL model's performance on legitimate data samples,
allowing it to operate stealthily and evade detection by advanced robust FL
algorithms.
Thorough theoretical analysis and experiments conducted on various benchmark
datasets demonstrate the superiority of CollaPois compared to state-of-the-art
backdoor attacks. Notably, CollaPois bypasses existing backdoor defenses,
especially in scenarios where clients possess diverse data distributions.
Moreover, the results show that CollaPois remains effective even when involving
a small number of compromised clients. Notably, clients whose local data is
closely aligned with compromised clients experience higher risks of backdoor
infections.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 12:03:02 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Apr 2025 20:19:21 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Lai",
"Phung",
""
],
[
"Liu",
"Guanxiong",
""
],
[
"Phan",
"NhatHai",
""
],
[
"Khalil",
"Issa",
""
],
[
"Khreishah",
"Abdallah",
""
],
[
"Wu",
"Xintao",
""
]
] |
2504.12876 | XinXin Qi | XinXin Qi, Hao Sun | A two-component dark matter model with $Z_2 \times Z_4$ symmetry | null | null | null | null | hep-ph | http://creativecommons.org/licenses/by/4.0/ | We consider a two-component dark matter model with $Z_2 \times Z_4$ symmetry,
where a singlet scalar $S$ and a Majorana fermion $\chi$ are introduced as dark
matter candidates. We also introduce another singlet scalar $S_0$ with a
non-zero vacuum expectation value to the SM so that the fermion dark matter can
obtain mass after spontaneous symmetry breaking. We have a new Higgs boson in
the model and in the case of the decoupling limit, the fermion dark matter
production is only determined by $S$ and the new Higgs boson. The mass
hierarchy of these new particles can make a difference in the reaction rate of
dark matter annihilation processes, contributing to different viable parameter
spaces for different mass orderings. We randomly scanned the parameter space
with six various cases under relic density constraint and found that when
$\chi$ is the lightest among the dark sector, $\chi$ production is generated
via the so-called forbidden channels. Moreover, we consider the combined limits
arising from Higgs invisible decay, dark matter relic density and direct
detection constraints. Within the chosen parameter space, direct detection
results put the most stringent constraint, and we have a more flexible value
for the scalar dark matter mass when the mass of $\chi$ is not smaller than the
new Higgs boson mass.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 12:04:13 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 01:51:48 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Qi",
"XinXin",
""
],
[
"Sun",
"Hao",
""
]
] |
2504.12915 | Ebrahim Norouzi | Ebrahim Norouzi, Sven Hertling, Harald Sack | ConExion: Concept Extraction with Large Language Models | null | null | null | null | cs.CL cs.IR | http://creativecommons.org/licenses/by/4.0/ | In this paper, an approach for concept extraction from documents using
pre-trained large language models (LLMs) is presented. Compared with
conventional methods that extract keyphrases summarizing the important
information discussed in a document, our approach tackles a more challenging
task of extracting all present concepts related to the specific domain, not
just the important ones. Through comprehensive evaluations of two widely used
benchmark datasets, we demonstrate that our method improves the F1 score
compared to state-of-the-art techniques. Additionally, we explore the potential
of using prompts within these models for unsupervised concept extraction. The
extracted concepts are intended to support domain coverage evaluation of
ontologies and facilitate ontology learning, highlighting the effectiveness of
LLMs in concept extraction tasks. Our source code and datasets are publicly
available at https://github.com/ISE-FIZKarlsruhe/concept_extraction.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 13:05:14 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 11:11:50 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Norouzi",
"Ebrahim",
""
],
[
"Hertling",
"Sven",
""
],
[
"Sack",
"Harald",
""
]
] |
2504.12977 | Maksim Vishnevskiy | Maksim Vishnevskiy | A Phenomenological Approach to Analyzing User Queries in IT Systems
Using Heidegger's Fundamental Ontology | 12 pages, no figures | null | 10.5281/Zenodo.15241370 | null | cs.SE cs.AI cs.CL cs.HC | http://creativecommons.org/licenses/by/4.0/ | This paper presents a novel research analytical IT system grounded in Martin
Heidegger's Fundamental Ontology, distinguishing between beings (das Seiende)
and Being (das Sein). The system employs two modally distinct, descriptively
complete languages: a categorical language of beings for processing user inputs
and an existential language of Being for internal analysis. These languages are
bridged via a phenomenological reduction module, enabling the system to analyze
user queries (including questions, answers, and dialogues among IT
specialists), identify recursive and self-referential structures, and provide
actionable insights in categorical terms. Unlike contemporary systems limited
to categorical analysis, this approach leverages Heidegger's phenomenological
existential analysis to uncover deeper ontological patterns in query
processing, aiding in resolving logical traps in complex interactions, such as
metaphor usage in IT contexts. The path to full realization involves
formalizing the language of Being by a research team based on Heidegger's
Fundamental Ontology; given the existing completeness of the language of
beings, this reduces the system's computability to completeness, paving the way
for a universal query analysis tool. The paper presents the system's
architecture, operational principles, technical implementation, use
cases--including a case based on real IT specialist dialogues--comparative
evaluation with existing tools, and its advantages and limitations.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 14:29:25 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Vishnevskiy",
"Maksim",
""
]
] |
2504.12988 | Yannis Montreuil | Yannis Montreuil, Axel Carlier, Lai Xing Ng, Wei Tsang Ooi | Why Ask One When You Can Ask $k$? Two-Stage Learning-to-Defer to the
Top-$k$ Experts | null | null | null | null | cs.LG stat.ML | http://creativecommons.org/licenses/by-nc-nd/4.0/ | Learning-to-Defer (L2D) enables decision-making systems to improve
reliability by selectively deferring uncertain predictions to more competent
agents. However, most existing approaches focus exclusively on single-agent
deferral, which is often inadequate in high-stakes scenarios that require
collective expertise. We propose Top-$k$ Learning-to-Defer, a generalization of
the classical two-stage L2D framework that allocates each query to the $k$ most
confident agents instead of a single one. To further enhance flexibility and
cost-efficiency, we introduce Top-$k(x)$ Learning-to-Defer, an adaptive
extension that learns the optimal number of agents to consult for each query,
based on input complexity, agent competency distributions, and consultation
costs. For both settings, we derive a novel surrogate loss and prove that it is
Bayes-consistent and $(\mathcal{R}, \mathcal{G})$-consistent, ensuring
convergence to the Bayes-optimal allocation. Notably, we show that the
well-established model cascades paradigm arises as a restricted instance of our
Top-$k$ and Top-$k(x)$ formulations. Extensive experiments across diverse
benchmarks demonstrate the effectiveness of our framework on both
classification and regression tasks.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 14:50:40 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 07:02:20 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Montreuil",
"Yannis",
""
],
[
"Carlier",
"Axel",
""
],
[
"Ng",
"Lai Xing",
""
],
[
"Ooi",
"Wei Tsang",
""
]
] |
2504.13083 | Liran Shirizly | Liran Shirizly, Dekel Meirom, Malcolm Carroll and Haggai Landa | Feedforward suppression of readout-induced faults in quantum error
correction | v2 contain small fixes | null | null | null | quant-ph | http://creativecommons.org/licenses/by/4.0/ | We propose a method to reduce readout-induced faults, applicable in settings
like quantum error correction with repeated measurement cycles. The method
consists of an adaptive readout sequence conditioned on each check qubit's
readout result from the previous cycle. For readout errors, correlated
preparation errors and measurement-induced leakage that are stronger in a
particular qubit state, this feedforward protocol can suppress the physical
qubit errors. Focusing on a simple realization of conditionally flipping (by an
X gate) the state of check qubits before their measurement, we investigate the
effect of such state-dependent errors using simulations in the setup of a
low-density parity check code. We show that the suggested protocol can reduce
both logical errors and decoding time, two important aspects of fault-tolerant
quantum computations.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 16:50:26 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 12:13:31 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Shirizly",
"Liran",
""
],
[
"Meirom",
"Dekel",
""
],
[
"Carroll",
"Malcolm",
""
],
[
"Landa",
"Haggai",
""
]
] |
2504.13273 | Jacob Dorn | Jacob Dorn | How Much Weak Overlap Can Doubly Robust T-Statistics Handle? | null | null | null | null | econ.EM math.ST stat.ME stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the presence of sufficiently weak overlap, it is known that no regular
root-n-consistent estimators exist and standard estimators may fail to be
asymptotically normal. This paper shows that a thresholded version of the
standard doubly robust estimator is asymptotically normal with well-calibrated
Wald confidence intervals even when constructed using nonparametric estimates
of the propensity score and conditional mean outcome. The analysis implies a
cost of weak overlap in terms of black-box nuisance rates, borne when the
semiparametric bound is infinite, and the contribution of outcome smoothness to
the outcome regression rate, which is incurred even when the semiparametric
bound is finite. As a byproduct of this analysis, I show that under weak
overlap, the optimal global regression rate is the same as the optimal
pointwise regression rate, without the usual polylogarithmic penalty. The
high-level conditions yield new rules of thumb for thresholding in practice. In
simulations, thresholded AIPW can exhibit moderate overrejection in small
samples, but I am unable to reject a null hypothesis of exact coverage in large
samples. In an empirical application, the clipped AIPW estimator that targets
the standard average treatment effect yields similar precision to a heuristic
10% fixed-trimming approach that changes the target sample.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 18:32:49 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2025 01:53:10 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Dorn",
"Jacob",
""
]
] |
2504.13336 | Lea Kunkel | Lea Kunkel, Mathias Trabs | On the minimax optimality of Flow Matching through the connection to
kernel density estimation | null | null | null | null | stat.ML cs.LG math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Flow Matching has recently gained attention in generative modeling as a
simple and flexible alternative to diffusion models, the current state of the
art. While existing statistical guarantees adapt tools from the analysis of
diffusion models, we take a different perspective by connecting Flow Matching
to kernel density estimation. We first verify that the kernel density estimator
matches the optimal rate of convergence in Wasserstein distance up to
logarithmic factors, improving existing bounds for the Gaussian kernel. Based
on this result, we prove that for sufficiently large networks, Flow Matching
also achieves the optimal rate up to logarithmic factors, providing a
theoretical foundation for the empirical success of this method. Finally, we
provide a first justification of Flow Matching's effectiveness in
high-dimensional settings by showing that rates improve when the target
distribution lies on a lower-dimensional linear subspace.
| [
{
"version": "v1",
"created": "Thu, 17 Apr 2025 21:06:41 GMT"
}
] | 2025-04-23T00:00:00 | [
[
"Kunkel",
"Lea",
""
],
[
"Trabs",
"Mathias",
""
]
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.