id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
3
62.8k
title
stringlengths
1
382
comments
stringlengths
1
1.15k
journal-ref
stringlengths
1
557
doi
stringlengths
7
153
report-no
stringlengths
1
509
categories
stringlengths
5
125
license
stringclasses
9 values
abstract
stringlengths
6
6.09k
versions
listlengths
1
187
update_date
timestamp[s]date
2007-05-23 00:00:00
2025-04-21 00:00:00
authors_parsed
sequencelengths
1
2.83k
2504.11695
Huangyuan Su
Isabel Papadimitriou, Huangyuan Su, Thomas Fel, Naomi Saphra, Sham Kakade, Stephanie Gil
Interpreting the Linear Structure of Vision-language Model Embedding Spaces
null
null
null
null
cs.CV cs.MM
http://creativecommons.org/licenses/by/4.0/
Vision-language models encode images and text in a joint space, minimizing the distance between corresponding image and text pairs. How are language and images organized in this joint space, and how do the models encode meaning and modality? To investigate this, we train and release sparse autoencoders (SAEs) on the embedding spaces of four vision-language models (CLIP, SigLIP, SigLIP2, and AIMv2). SAEs approximate model embeddings as sparse linear combinations of learned directions, or "concepts". We find that, compared to other methods of linear feature learning, SAEs are better at reconstructing the real embeddings, while also able to retain the most sparsity. Retraining SAEs with different seeds or different data diet leads to two findings: the rare, specific concepts captured by the SAEs are liable to change drastically, but we also show that the key commonly-activating concepts extracted by SAEs are remarkably stable across runs. Interestingly, while most concepts are strongly unimodal in activation, we find they are not merely encoding modality per se. Many lie close to - but not entirely within - the subspace defining modality, suggesting that they encode cross-modal semantics despite their unimodal usage. To quantify this bridging behavior, we introduce the Bridge Score, a metric that identifies concept pairs which are both co-activated across aligned image-text inputs and geometrically aligned in the shared space. This reveals that even unimodal concepts can collaborate to support cross-modal integration. We release interactive demos of the SAEs for all models, allowing researchers to explore the organization of the concept spaces. Overall, our findings uncover a sparse linear structure within VLM embedding spaces that is shaped by modality, yet stitched together through latent bridges-offering new insight into how multimodal meaning is constructed.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 01:40:06 GMT" } ]
2025-04-17T00:00:00
[ [ "Papadimitriou", "Isabel", "" ], [ "Su", "Huangyuan", "" ], [ "Fel", "Thomas", "" ], [ "Saphra", "Naomi", "" ], [ "Kakade", "Sham", "" ], [ "Gil", "Stephanie", "" ] ]
2504.11696
Kuiyuan Ding
Kuiyuan Ding, Caili Guo, Yang Yang, Wuxia Hu and Yonina C. Eldar
A New Paradigm of User-Centric Wireless Communication Driven by Large Language Models
8 pages, 5 figures
null
null
null
cs.NI cs.IR cs.SY eess.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The next generation of wireless communications seeks to deeply integrate artificial intelligence (AI) with user-centric communication networks, with the goal of developing AI-native networks that more accurately address user requirements. The rapid development of large language models (LLMs) offers significant potential in realizing these goals. However, existing efforts that leverage LLMs for wireless communication often overlook the considerable gap between human natural language and the intricacies of real-world communication systems, thus failing to fully exploit the capabilities of LLMs. To address this gap, we propose a novel LLM-driven paradigm for wireless communication that innovatively incorporates the nature language to structured query language (NL2SQL) tool. Specifically, in this paradigm, user personal requirements is the primary focus. Upon receiving a user request, LLMs first analyze the user intent in terms of relevant communication metrics and system parameters. Subsequently, a structured query language (SQL) statement is generated to retrieve the specific parameter values from a high-performance real-time database. We further utilize LLMs to formulate and solve an optimization problem based on the user request and the retrieved parameters. The solution to this optimization problem then drives adjustments in the communication system to fulfill the user's requirements. To validate the feasibility of the proposed paradigm, we present a prototype system. In this prototype, we consider user-request centric semantic communication (URC-SC) system in which a dynamic semantic representation network at the physical layer adapts its encoding depth to meet user requirements. Additionally, two LLMs are employed to analyze user requests and generate SQL statements, respectively. Simulation results demonstrate the effectiveness.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 01:43:36 GMT" } ]
2025-04-17T00:00:00
[ [ "Ding", "Kuiyuan", "" ], [ "Guo", "Caili", "" ], [ "Yang", "Yang", "" ], [ "Hu", "Wuxia", "" ], [ "Eldar", "Yonina C.", "" ] ]
2504.11697
Shunlin Huang
Shunlin Huang, Peng Wang, Yilin Xu, Jun Liu, and Ruxin Li
Fractional spatiotemporal optical vortices
null
null
null
null
physics.optics quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spatiotemporal optical vortices (STOVs) with spiral phase in the space-time domain, which carry intrinsic transverse orbital angular momentum (OAM), introduce a new degree of freedom to light beams and exhibit unique properties. While integer and fractional spatial vortices have been extensively studied and widely applied, and research on integer STOVs have grown prosperously, fractional STOVs (FSTOVs), classified as STOVs with fractional spiral phases are rarely explored due to the challenges in characterizing rapidly varying spatiotemporal phases. Furthermore, approaches for the rapid recognition of FSTOVs are lacking. Herein, we experimentally and theoretically demonstrate the generation of FSTOVs in the far field. The generation, evolution, and diffraction rules of FSTOVs are revealed. Furthermore, a self-referential method for the rapid recognition of FSTOVs based on the energy ratio between the two end lobes of their diffraction patterns is proposed. This work will promote the development of the theory of light with transverse OAM, and open new opportunities for the applications of STOV, such as STOV-based optical communication and quantum information.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 01:47:39 GMT" } ]
2025-04-17T00:00:00
[ [ "Huang", "Shunlin", "" ], [ "Wang", "Peng", "" ], [ "Xu", "Yilin", "" ], [ "Liu", "Jun", "" ], [ "Li", "Ruxin", "" ] ]
2504.11698
Xingwu Ji
Xingwu Ji, Haochen Niu, Dexin Duan, Rendong Ying, Fei Wen, Peilin Liu
An Online Adaptation Method for Robust Depth Estimation and Visual Odometry in the Open World
11 pages, 14 figures
null
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, learning-based robotic navigation systems have gained extensive research attention and made significant progress. However, the diversity of open-world scenarios poses a major challenge for the generalization of such systems to practical scenarios. Specifically, learned systems for scene measurement and state estimation tend to degrade when the application scenarios deviate from the training data, resulting to unreliable depth and pose estimation. Toward addressing this problem, this work aims to develop a visual odometry system that can fast adapt to diverse novel environments in an online manner. To this end, we construct a self-supervised online adaptation framework for monocular visual odometry aided by an online-updated depth estimation module. Firstly, we design a monocular depth estimation network with lightweight refiner modules, which enables efficient online adaptation. Then, we construct an objective for self-supervised learning of the depth estimation module based on the output of the visual odometry system and the contextual semantic information of the scene. Specifically, a sparse depth densification module and a dynamic consistency enhancement module are proposed to leverage camera poses and contextual semantics to generate pseudo-depths and valid masks for the online adaptation. Finally, we demonstrate the robustness and generalization capability of the proposed method in comparison with state-of-the-art learning-based approaches on urban, in-house datasets and a robot platform. Code is publicly available at: https://github.com/jixingwu/SOL-SLAM.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 01:48:10 GMT" } ]
2025-04-17T00:00:00
[ [ "Ji", "Xingwu", "" ], [ "Niu", "Haochen", "" ], [ "Duan", "Dexin", "" ], [ "Ying", "Rendong", "" ], [ "Wen", "Fei", "" ], [ "Liu", "Peilin", "" ] ]
2504.11699
Rui Xue
Rui Xue, Tianfu Wu
H$^3$GNNs: Harmonizing Heterophily and Homophily in GNNs via Joint Structural Node Encoding and Self-Supervised Learning
null
null
null
null
cs.LG cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph Neural Networks (GNNs) struggle to balance heterophily and homophily in representation learning, a challenge further amplified in self-supervised settings. We propose H$^3$GNNs, an end-to-end self-supervised learning framework that harmonizes both structural properties through two key innovations: (i) Joint Structural Node Encoding. We embed nodes into a unified space combining linear and non-linear feature projections with K-hop structural representations via a Weighted Graph Convolution Network(WGCN). A cross-attention mechanism enhances awareness and adaptability to heterophily and homophily. (ii) Self-Supervised Learning Using Teacher-Student Predictive Architectures with Node-Difficulty Driven Dynamic Masking Strategies. We use a teacher-student model, the student sees the masked input graph and predicts node features inferred by the teacher that sees the full input graph in the joint encoding space. To enhance learning difficulty, we introduce two novel node-predictive-difficulty-based masking strategies. Experiments on seven benchmarks (four heterophily datasets and three homophily datasets) confirm the effectiveness and efficiency of H$^3$GNNs across diverse graph types. Our H$^3$GNNs achieves overall state-of-the-art performance on the four heterophily datasets, while retaining on-par performance to previous state-of-the-art methods on the three homophily datasets.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 01:51:25 GMT" } ]
2025-04-17T00:00:00
[ [ "Xue", "Rui", "" ], [ "Wu", "Tianfu", "" ] ]
2504.11700
Xiao-Dong Cao
Xiao-Dong Cao and Chao-Jiang Xu and Yan Xu
The Gevrey Gelfand-Shilov regularizing effect of the Landau equation with soft potential
26 pages
null
null
null
math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the Cauchy problem for the spatially inhomogeneous Landau equation with soft potential in the perturbative framework around the Maxwellian distribution. Under a smallness assumption on the initial datum with exponential decay in the velocity variable, we establish the optimal Gevrey Gelfand-Shilov regularizing effect for the solution to the Cauchy problem.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 01:53:13 GMT" } ]
2025-04-17T00:00:00
[ [ "Cao", "Xiao-Dong", "" ], [ "Xu", "Chao-Jiang", "" ], [ "Xu", "Yan", "" ] ]
2504.11701
Yaohui Fang
Yaohui Fang and Xingce Wang
Non-uniform Point Cloud Upsampling via Local Manifold Distribution
null
null
null
null
cs.CV math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing learning-based point cloud upsampling methods often overlook the intrinsic data distribution charac?teristics of point clouds, leading to suboptimal results when handling sparse and non-uniform point clouds. We propose a novel approach to point cloud upsampling by imposing constraints from the perspective of manifold distributions. Leveraging the strong fitting capability of Gaussian functions, our method employs a network to iteratively optimize Gaussian components and their weights, accurately representing local manifolds. By utilizing the probabilistic distribution properties of Gaussian functions, we construct a unified statistical manifold to impose distribution constraints on the point cloud. Experimental results on multiple datasets demonstrate that our method generates higher-quality and more uniformly distributed dense point clouds when processing sparse and non-uniform inputs, outperforming state-of-the-art point cloud upsampling techniques.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 01:54:33 GMT" } ]
2025-04-17T00:00:00
[ [ "Fang", "Yaohui", "" ], [ "Wang", "Xingce", "" ] ]
2504.11702
Dorottya Zelenyanszki
Dorottya Zelenyanszki, Zhe Hou, Kamanashis Biswas, Vallipuram Muthukkumarasamy
Clustering and analysis of user behaviour in blockchain: A case study of Planet IX
15 pages, 8 figures, submitted to Blockchain: Research and Applications
null
null
null
cs.LG cs.CR
http://creativecommons.org/licenses/by/4.0/
Decentralised applications (dApps) that run on public blockchains have the benefit of trustworthiness and transparency as every activity that happens on the blockchain can be publicly traced through the transaction data. However, this introduces a potential privacy problem as this data can be tracked and analysed, which can reveal user-behaviour information. A user behaviour analysis pipeline was proposed to present how this type of information can be extracted and analysed to identify separate behavioural clusters that can describe how users behave in the game. The pipeline starts with the collection of transaction data, involving smart contracts, that is collected from a blockchain-based game called Planet IX. Both the raw transaction information and the transaction events are considered in the data collection. From this data, separate game actions can be formed and those are leveraged to present how and when the users conducted their in-game activities in the form of user flows. An extended version of these user flows also presents how the Non-Fungible Tokens (NFTs) are being leveraged in the user actions. The latter is given as input for a Graph Neural Network (GNN) model to provide graph embeddings for these flows which then can be leveraged by clustering algorithms to cluster user behaviours into separate behavioural clusters. We benchmark and compare well-known clustering algorithms as a part of the proposed method. The user behaviour clusters were analysed and visualised in a graph format. It was found that behavioural information can be extracted regarding the users that belong to these clusters. Such information can be exploited by malicious users to their advantage. To demonstrate this, a privacy threat model was also presented based on the results that correspond to multiple potentially affected areas.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 01:57:33 GMT" } ]
2025-04-17T00:00:00
[ [ "Zelenyanszki", "Dorottya", "" ], [ "Hou", "Zhe", "" ], [ "Biswas", "Kamanashis", "" ], [ "Muthukkumarasamy", "Vallipuram", "" ] ]
2504.11703
Tianneng Shi
Tianneng Shi, Jingxuan He, Zhun Wang, Linyu Wu, Hongwei Li, Wenbo Guo, Dawn Song
Progent: Programmable Privilege Control for LLM Agents
null
null
null
null
cs.CR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LLM agents are an emerging form of AI systems where large language models (LLMs) serve as the central component, utilizing a diverse set of tools to complete user-assigned tasks. Despite their great potential, LLM agents pose significant security risks. When interacting with the external world, they may encounter malicious commands from attackers, leading to the execution of dangerous actions. A promising way to address this is by enforcing the principle of least privilege: allowing only essential actions for task completion while blocking unnecessary ones. However, achieving this is challenging, as it requires covering diverse agent scenarios while preserving both security and utility. We introduce Progent, the first privilege control mechanism for LLM agents. At its core is a domain-specific language for flexibly expressing privilege control policies applied during agent execution. These policies provide fine-grained constraints over tool calls, deciding when tool calls are permissible and specifying fallbacks if they are not. This enables agent developers and users to craft suitable policies for their specific use cases and enforce them deterministically to guarantee security. Thanks to its modular design, integrating Progent does not alter agent internals and requires only minimal changes to agent implementation, enhancing its practicality and potential for widespread adoption. To automate policy writing, we leverage LLMs to generate policies based on user queries, which are then updated dynamically for improved security and utility. Our extensive evaluation shows that it enables strong security while preserving high utility across three distinct scenarios or benchmarks: AgentDojo, ASB, and AgentPoison. Furthermore, we perform an in-depth analysis, showcasing the effectiveness of its core components and the resilience of its automated policy generation against adaptive attacks.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 01:58:40 GMT" } ]
2025-04-17T00:00:00
[ [ "Shi", "Tianneng", "" ], [ "He", "Jingxuan", "" ], [ "Wang", "Zhun", "" ], [ "Wu", "Linyu", "" ], [ "Li", "Hongwei", "" ], [ "Guo", "Wenbo", "" ], [ "Song", "Dawn", "" ] ]
2504.11704
Marina Danilevsky
Marina Danilevsky, Kristjan Greenewald, Chulaka Gunasekara, Maeda Hanafi, Lihong He, Yannis Katsis, Krishnateja Killamsetty, Yatin Nandwani, Lucian Popa, Dinesh Raghu, Frederick Reiss, Vraj Shah, Khoi-Nguyen Tran, Huaiyu Zhu, Luis Lastras
A Library of LLM Intrinsics for Retrieval-Augmented Generation
null
null
null
null
cs.AI
http://creativecommons.org/licenses/by/4.0/
In the developer community for large language models (LLMs), there is not yet a clean pattern analogous to a software library, to support very large scale collaboration. Even for the commonplace use case of Retrieval-Augmented Generation (RAG), it is not currently possible to write a RAG application against a well-defined set of APIs that are agreed upon by different LLM providers. Inspired by the idea of compiler intrinsics, we propose some elements of such a concept through introducing a library of LLM Intrinsics for RAG. An LLM intrinsic is defined as a capability that can be invoked through a well-defined API that is reasonably stable and independent of how the LLM intrinsic itself is implemented. The intrinsics in our library are released as LoRA adapters on HuggingFace, and through a software interface with clear structured input/output characteristics on top of vLLM as an inference platform, accompanied in both places with documentation and code. This article describes the intended usage, training details, and evaluations for each intrinsic, as well as compositions of multiple intrinsics.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:02:22 GMT" } ]
2025-04-17T00:00:00
[ [ "Danilevsky", "Marina", "" ], [ "Greenewald", "Kristjan", "" ], [ "Gunasekara", "Chulaka", "" ], [ "Hanafi", "Maeda", "" ], [ "He", "Lihong", "" ], [ "Katsis", "Yannis", "" ], [ "Killamsetty", "Krishnateja", "" ], [ "Nandwani", "Yatin", "" ], [ "Popa", "Lucian", "" ], [ "Raghu", "Dinesh", "" ], [ "Reiss", "Frederick", "" ], [ "Shah", "Vraj", "" ], [ "Tran", "Khoi-Nguyen", "" ], [ "Zhu", "Huaiyu", "" ], [ "Lastras", "Luis", "" ] ]
2504.11705
Adriano D'Alessandro
Adriano D'Alessandro, Ali Mahdavi-Amiri and Ghassan Hamarneh
Learning What NOT to Count
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Few/zero-shot object counting methods reduce the need for extensive annotations but often struggle to distinguish between fine-grained categories, especially when multiple similar objects appear in the same scene. To address this limitation, we propose an annotation-free approach that enables the seamless integration of new fine-grained categories into existing few/zero-shot counting models. By leveraging latent generative models, we synthesize high-quality, category-specific crowded scenes, providing a rich training source for adapting to new categories without manual labeling. Our approach introduces an attention prediction network that identifies fine-grained category boundaries trained using only synthetic pseudo-annotated data. At inference, these fine-grained attention estimates refine the output of existing few/zero-shot counting networks. To benchmark our method, we further introduce the FGTC dataset, a taxonomy-specific fine-grained object counting dataset for natural images. Our method substantially enhances pre-trained state-of-the-art models on fine-grained taxon counting tasks, while using only synthetic data. Code and data to be released upon acceptance.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:05:47 GMT" } ]
2025-04-17T00:00:00
[ [ "D'Alessandro", "Adriano", "" ], [ "Mahdavi-Amiri", "Ali", "" ], [ "Hamarneh", "Ghassan", "" ] ]
2504.11706
Ralihe R. Villagr\'an
Carlos A. Alfaro, Teresa I. Hoekstra-Mendoza, Juan Pablo Serrano and Ralihe R. Villagr\'an
The characterization of graphs with two trivial distance ideals
null
null
null
null
math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The distance ideals of graphs are algebraic invariants that generalize the Smith normal form (SNF) and the spectrum of several distance matrices associated with a graph. In general, distance ideals are not monotone under taking induced subgraphs. However, in [7] the characterizations of connected graphs with one trivial distance ideal over $\mathbb{Z}[X]$ and over $\mathbb{Q}[X]$ were obtained in terms of induced subgraphs, where $X$ is a set of variables indexed by the vertices. Later, in [3], the first attempt was made to characterize the family of connected graphs with at most two trivial distance ideals over $\mathbb{Z}[X]$. There, it was proven that these graphs are $\{ \mathcal {F},\textsf{odd-holes}_{7}\}$-free, where $\textsf{odd-holes}_{7}$ consists of the odd cycles of length at least seven and $\mathcal{F}$ is a set of sixteen graphs. Here, we give a characterization of the $\{\mathcal{F},\textsf{odd-holes}_{7}\}$-free graphs and prove that the $\{\mathcal{F},\textsf{odd-holes}_{7}\}$-free graphs are precisely the graphs with at most two trivial distance ideals over $\mathbb{Z}[X]$. As byproduct, we also find that the determinant of the distance matrix of a connected bipartite graph is even, this suggests that it is possible to extend, to connected bipartite graphs, the Graham-Pollak-Lov\'asz celebrated formula $\det(D(T_{n+1}))=(-1)^nn2^{n-1}$, and the Hou-Woo result stating that $\text{SNF}(D(T_{n+1}))=\textsf{I}_2\oplus 2\textsf{I}_{n-2}\oplus (2n)$, for any tree $T_{n+1}$ with $n+1$ vertices. Finally, we also give the characterizations of graphs with at most two trivial distance ideals over $\mathbb{Q}[X]$, and the graphs with at most two trivial distance univariate ideals.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:09:44 GMT" } ]
2025-04-17T00:00:00
[ [ "Alfaro", "Carlos A.", "" ], [ "Hoekstra-Mendoza", "Teresa I.", "" ], [ "Serrano", "Juan Pablo", "" ], [ "Villagrán", "Ralihe R.", "" ] ]
2504.11707
Muhammad Shahid Muneer
Muhammad Shahid Muneer, Simon S. Woo
Towards Safe Synthetic Image Generation On the Web: A Multimodal Robust NSFW Defense and Million Scale Dataset
Short Paper The Web Conference
null
10.1145/3701716.3715526
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
In the past years, we have witnessed the remarkable success of Text-to-Image (T2I) models and their widespread use on the web. Extensive research in making T2I models produce hyper-realistic images has led to new concerns, such as generating Not-Safe-For-Work (NSFW) web content and polluting the web society. To help prevent misuse of T2I models and create a safer web environment for users features like NSFW filters and post-hoc security checks are used in these models. However, recent work unveiled how these methods can easily fail to prevent misuse. In particular, adversarial attacks on text and image modalities can easily outplay defensive measures. %Exploiting such leads to the growing concern of preventing adversarial attacks on text and image modalities. Moreover, there is currently no robust multimodal NSFW dataset that includes both prompt and image pairs and adversarial examples. This work proposes a million-scale prompt and image dataset generated using open-source diffusion models. Second, we develop a multimodal defense to distinguish safe and NSFW text and images, which is robust against adversarial attacks and directly alleviates current challenges. Our extensive experiments show that our model performs well against existing SOTA NSFW detection methods in terms of accuracy and recall, drastically reducing the Attack Success Rate (ASR) in multimodal adversarial attack scenarios. Code: https://github.com/shahidmuneer/multimodal-nsfw-defense.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:10:42 GMT" } ]
2025-04-17T00:00:00
[ [ "Muneer", "Muhammad Shahid", "" ], [ "Woo", "Simon S.", "" ] ]
2504.11709
Junyong Shin
Junyong Shin, Yongjeong Oh, Jinsung Park, Joohyuk Park, Yo-Seb Jeon
ESC-MVQ: End-to-End Semantic Communication With Multi-Codebook Vector Quantization
null
null
null
null
eess.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel end-to-end digital semantic communication framework based on multi-codebook vector quantization (VQ), referred to as ESC-MVQ. Unlike prior approaches that rely on end-to-end training with a specific power or modulation scheme, often under a particular channel condition, ESC-MVQ models a channel transfer function as parallel binary symmetric channels (BSCs) with trainable bit-flip probabilities. Building on this model, ESC-MVQ jointly trains multiple VQ codebooks and their associated bit-flip probabilities with a single encoder-decoder pair. To maximize inference performance when deploying ESC-MVQ in digital communication systems, we devise an optimal communication strategy that jointly optimizes codebook assignment, adaptive modulation, and power allocation. To this end, we develop an iterative algorithm that selects the most suitable VQ codebook for semantic features and flexibly allocates power and modulation schemes across the transmitted symbols. Simulation results demonstrate that ESC-MVQ, using a single encoder-decoder pair, outperforms existing digital semantic communication methods in both performance and memory efficiency, offering a scalable and adaptive solution for realizing digital semantic communication in diverse channel conditions.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:12:57 GMT" } ]
2025-04-17T00:00:00
[ [ "Shin", "Junyong", "" ], [ "Oh", "Yongjeong", "" ], [ "Park", "Jinsung", "" ], [ "Park", "Joohyuk", "" ], [ "Jeon", "Yo-Seb", "" ] ]
2504.11710
Michael Barnsley
Michael F. Barnsley and Corey de Wit
Tilings from Tops of Overlapping Iterated Function Systems
null
null
null
null
math.DS
http://creativecommons.org/licenses/by/4.0/
The top of the attractor $A$ of a hyperbolic iterated function system $\left\{ f_{i}:\mathbb{R}^{n}\rightarrow\mathbb{R}^{n}|i=1,2,\dots,M\right\} $ is defined and used to extend self-similar tilings to overlapping systems. The theory interprets expressions of the form $\lim_{k\rightarrow\infty}f_{j_{1}}^{-1}f_{j_{2}}^{-1}\dots f_{j_{k}} ^{-1}(\left\{ top(f_{i_{1}}f_{i_{2}}\dots f_{i_{k+1}}(A))|i_{1}i_{2}\dots i_{k+1}\in\{1,2,\dots,M\}^{k+1}\right\} )$ to yield tilings of $\mathbb{R}^{n}$. Examples include systems of finite type, tilings related to aperiodic monotiles, and ones where there are infinitely many distinct but related prototiles.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:16:39 GMT" } ]
2025-04-17T00:00:00
[ [ "Barnsley", "Michael F.", "" ], [ "de Wit", "Corey", "" ] ]
2504.11712
Umananda Dev Goswami
Swaraj Pratim Sarmah and Umananda Dev Goswami
Ultra-high energy cosmic rays with UFA-15 source model in Bumblebee gravity theory
17 pages, 12 figures
null
null
null
astro-ph.HE
http://creativecommons.org/licenses/by/4.0/
We explore the effects of Bumblebee gravity on the propagation of ultra-high energy cosmic rays (UHECRs) using astrophysical sources modeled in the Unger-Farrar-Anchordoqui (UFA) framework (2015), which includes star formation rate (SFR), gamma-ray bursts (GRBs), and active galactic nuclei (AGN). We compute the density enhancement factor for various source separation distances ($d_\text{s}$s) up to 100 Mpc within the Bumblebee gravity scenario. Additionally, we calculate the CRs flux and their suppression, comparing the results with observational data from the Pierre Auger Observatory (PAO) and the Telescope Array through $\chi^2$ and $\chi_\text{red}^2$ analysis for the flux and Levenberg-Marquardt algorithm for suppression. The anisotropy in CRs arrival directions is examined, with corresponding $\chi^2$ and $\chi_\text{red}^2$ values obtained from the PAO surface detector data (SD 750 and SD 1500). Finally, we present skymaps of flux and anisotropy under different model assumptions, providing insights into the observational signatures of UHECRs in Bumblebee gravity. Our results show that increasing the Bumblebee gravity parameter $l$ enhances the density factor $\xi$, particularly at low energies, highlighting Lorentz violation's impact on CRs' propagation. Larger $d_\text{s}$ values amplify deviations from the $\Lambda$CDM model, with AGN sources dominating at high energies and GRB/SFR sources at lower energies. The skymaps indicate the structured flux patterns at large $d_\text{s}$ and structured anisotropy at higher energies.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:17:30 GMT" } ]
2025-04-17T00:00:00
[ [ "Sarmah", "Swaraj Pratim", "" ], [ "Goswami", "Umananda Dev", "" ] ]
2504.11714
Karthik Shivashankar
Karthik Shivashankar, Antonio Martini
Unravelling Technical debt topics through Time, Programming Languages and Repository
null
null
null
null
cs.SE cs.LG
http://creativecommons.org/licenses/by/4.0/
This study explores the dynamic landscape of Technical Debt (TD) topics in software engineering by examining its evolution across time, programming languages, and repositories. Despite the extensive research on identifying and quantifying TD, there remains a significant gap in understanding the diversity of TD topics and their temporal development. To address this, we have conducted an explorative analysis of TD data extracted from GitHub issues spanning from 2015 to September 2023. We employed BERTopic for sophisticated topic modelling. This study categorises the TD topics and tracks their progression over time. Furthermore, we have incorporated sentiment analysis for each identified topic, providing a deeper insight into the perceptions and attitudes associated with these topics. This offers a more nuanced understanding of the trends and shifts in TD topics through time, programming language, and repository.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:20:56 GMT" } ]
2025-04-17T00:00:00
[ [ "Shivashankar", "Karthik", "" ], [ "Martini", "Antonio", "" ] ]
2504.11715
Frederic Latremoliere
Carla Farsi and Frederic Latremoliere
Continuity for the spectral propinquity of the Dirac operators associated with an analytic path of Riemannian metrics
15 pages
null
null
null
math.OA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that a polynomial path of Riemannian metrics on a closed spin manifold induces a continuous field in the spectral propinquity of metric spectral triples.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:34:00 GMT" } ]
2025-04-17T00:00:00
[ [ "Farsi", "Carla", "" ], [ "Latremoliere", "Frederic", "" ] ]
2504.11716
Nityanand Rai
Nityanand Rai
A Technical Survey of Sparse Linear Solvers in Electronic Design Automation
null
null
null
null
math.NA cs.NA cs.PF
http://creativecommons.org/licenses/by/4.0/
Sparse linear system solvers ($Ax=b$) are critical computational kernels in Electronic Design Automation (EDA), underpinning vital simulations for modern IC and system design. Applications like power integrity verification and electrothermal analysis fundamentally solve large-scale, sparse algebraic systems from Modified Nodal Analysis (MNA) or Finite Element/Volume Method (FEM/FVM) discretizations of PDEs. Problem dimensions routinely reach $10^6-10^9$ unknowns, escalating towards $10^{10}$+ for full-chip power grids \cite{Tsinghua21}, demanding stringent solver scalability, low memory footprint, and efficiency. This paper surveys predominant sparse solver paradigms in EDA: direct factorization methods (LU, Cholesky), iterative Krylov subspace methods (CG, GMRES, BiCGSTAB), and multilevel multigrid techniques. We examine their mathematical foundations, convergence, conditioning sensitivity, implementation aspects (storage formats CSR/CSC, fill-in mitigation via reordering), the critical role of preconditioning for ill-conditioned systems \cite{SaadIterative, ComparisonSolversArxiv}, and multigrid's potential optimal $O(N)$ complexity \cite{TrottenbergMG}. Solver choice critically depends on the performance impact of frequent matrix updates (e.g., transient/non-linear), where iterative/multigrid methods often amortize costs better than direct methods needing repeated factorization \cite{SaadIterative}. We analyze trade-offs in runtime complexity, memory needs, numerical robustness, parallel scalability (MPI, OpenMP, GPU), and precision (FP32/FP64). Integration into EDA tools for system-level multiphysics is discussed, with pseudocode illustrations. The survey concludes by emphasizing the indispensable nature and ongoing evolution of sparse solvers for designing and verifying complex electronic systems.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:34:21 GMT" } ]
2025-04-17T00:00:00
[ [ "Rai", "Nityanand", "" ] ]
2504.11718
Selim Sukhtaiev
Fritz Gesztesy and Selim Sukhtaiev
Some Remarks On Krein--von Neumann Extensions
arXiv admin note: substantial text overlap with arXiv:1203.5713
null
null
null
math.SP
http://creativecommons.org/licenses/by/4.0/
We survey various properties of Krein--von Neumann extensions $S_K$ and the reduced Krein--von Neumann operator $\hatt S_K$ in connection with a strictly positive (symmetric) operator $S$ with nonzero deficiency indices. In particular, we focus on the resolvents of $S_K$ and $\hatt S_K$ and of the trace ideal properties of the resolvent of $\hatt S_K$, and make some comparisons with the corresponding properties of the resolvent of the Friedrichs extension $S_F$. We also recall a parametrization of all nonnegative self-adjoint extensions of $S$ and various Krein-type resolvent formulas for any two relatively prime self-adjoint extensions of $S$, utilizing a Donoghue-type $M$-operator (i.e., an energy parameter dependent Dirichlet-to-Neumann-type map).
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:42:58 GMT" } ]
2025-04-17T00:00:00
[ [ "Gesztesy", "Fritz", "" ], [ "Sukhtaiev", "Selim", "" ] ]
2504.11719
Chao Zhang
Ying Li and Chao Zhang
Equivalence between Superharmonic functions and renormalized solutions for the equations with $(p, q)$-growth
null
null
null
null
math.AP
http://creativecommons.org/licenses/by/4.0/
We establish the equivalence between superharmonic functions and locally renormalized solutions for the elliptic measure data problems with $(p, q)$-growth. By showing that locally renormalized solutions are essentially bounded below and using Wolff potential estimates, we extend the results of [T. Kilpel\"{a}inen, T. Kuusi, A. Tuhola-Kujanp\"{a}\"{a}, Superharmonic functions are locally renormalized solutions, Ann. Inst. H. Poincar\'{e} C Anal. Non Lin\'{e}aire, 2011] to a broader class of problems. Our work provides the first equivalence result between locally renormalized solutions and superharmonic functions for the nonstandard growth equations.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:44:48 GMT" } ]
2025-04-17T00:00:00
[ [ "Li", "Ying", "" ], [ "Zhang", "Chao", "" ] ]
2504.11720
Nicholas Pritchard
Nicholas J. Pritchard, Andreas Wicenec, Richard Dodson and Mohammed Bennamoun
Polarisation-Inclusive Spiking Neural Networks for Real-Time RFI Detection in Modern Radio Telescopes
4 pages, 4 tables, accepted at URSI AP-RASC 2025
null
null
null
cs.NE astro-ph.IM
http://creativecommons.org/licenses/by/4.0/
Radio Frequency Interference (RFI) is a known growing challenge for radio astronomy, intensified by increasing observatory sensitivity and prevalence of orbital RFI sources. Spiking Neural Networks (SNNs) offer a promising solution for real-time RFI detection by exploiting the time-varying nature of radio observation and neuron dynamics together. This work explores the inclusion of polarisation information in SNN-based RFI detection, using simulated data from the Hydrogen Epoch of Reionisation Array (HERA) instrument and provides power usage estimates for deploying SNN-based RFI detection on existing neuromorphic hardware. Preliminary results demonstrate state-of-the-art detection accuracy and highlight possible extensive energy-efficiency gains.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:45:00 GMT" } ]
2025-04-17T00:00:00
[ [ "Pritchard", "Nicholas J.", "" ], [ "Wicenec", "Andreas", "" ], [ "Dodson", "Richard", "" ], [ "Bennamoun", "Mohammed", "" ] ]
2504.11721
Pavel Shevchenko V
Daisuke Murakami, Pavel V. Shevchenko, Tomoko Matsui, Aleksandar Arandjelovi\'c, Tor A. Myrvoll
Climate-economy projections under shared socioeconomic pathways and net-zero scenarios
null
null
null
null
econ.GN q-fin.EC
http://creativecommons.org/licenses/by/4.0/
We examine future trajectories of the social cost of carbon, global temperatures, and carbon concentrations using the cost-benefit Dynamic Integrated Climate-Economy (DICE) model calibrated to the five Shared Socioeconomic Pathways (SSPs) under two mitigation scenarios: achieving net-zero carbon emissions by 2050 and by 2100. The DICE model is calibrated to align industrial and land-use carbon emissions with projections from six leading process-based integrated assessment models (IAMs): IMAGE, MESSAGE--GLOBIOM, AIM/CGE, GCAM, REMIND--MAgPIE and WITCH--GLOBIOM. We find that even with aggressive mitigation (net-zero by 2050), global temperatures are projected to exceed $2^\circ\text{C}$ above preindustrial levels by 2100, with estimates ranging from $2.5^\circ\text{C}$ to $2.7^\circ\text{C}$ across all SSPs and IAMs considered. Under the more lenient mitigation scenario (net-zero by 2100), global temperatures are projected to rise to between $3^\circ\text{C}$ and $3.7^\circ\text{C}$ by 2100. Additionally, the social cost of carbon is estimated to increase from approximately USD 30--50 in 2025 to USD 250--400 in 2100.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:48:18 GMT" } ]
2025-04-17T00:00:00
[ [ "Murakami", "Daisuke", "" ], [ "Shevchenko", "Pavel V.", "" ], [ "Matsui", "Tomoko", "" ], [ "Arandjelović", "Aleksandar", "" ], [ "Myrvoll", "Tor A.", "" ] ]
2504.11722
He Xu
Siqing Chen, He Xua, Xueyu Zhang, Zhen Ma
Inversion of biological strategies in engineering technology: in case underwater soft robot
26 pages, 8 figures
null
null
null
cs.RO
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper proposes a biomimetic design framework based on biological strategy inversion, aiming to systematically map solutions evolved in nature to the engineering field. By constructing a "Function-Behavior-Feature-Environment" (F-B-Cs in E) knowledge model, combined with natural language processing (NLP) and multi-criteria decision-making methods, it achieves efficient conversion from biological strategies to engineering solutions. Using underwater soft robot design as a case study, the effectiveness of the framework in optimizing drive mechanisms, power distribution, and motion pattern design is verified. This research provides scalable methodological support for interdisciplinary biomimetic innovation.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:48:28 GMT" } ]
2025-04-17T00:00:00
[ [ "Chen", "Siqing", "" ], [ "Xua", "He", "" ], [ "Zhang", "Xueyu", "" ], [ "Ma", "Zhen", "" ] ]
2504.11723
Paul Denny
Paul Denny and Viraj Kumar and Stephen MacNeil and James Prather and Juho Leinonen
Probing the Unknown: Exploring Student Interactions with Probeable Problems at Scale in Introductory Programming
Accepted at ITiCSE 2025
null
10.1145/3724363.3729093
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Introductory programming courses often rely on small code-writing exercises that have clearly specified problem statements. This limits opportunities for students to practice how to clarify ambiguous requirements -- a critical skill in real-world programming. In addition, the emerging capabilities of large language models (LLMs) to produce code from well-defined specifications may harm student engagement with traditional programming exercises. This study explores the use of ``Probeable Problems'', automatically gradable tasks that have deliberately vague or incomplete specifications. Such problems require students to submit test inputs, or `probes', to clarify requirements before implementation. Through analysis of over 40,000 probes in an introductory course, we identify patterns linking probing behaviors to task success. Systematic strategies, such as thoroughly exploring expected behavior before coding, resulted in fewer incorrect code submissions and correlated with course success. Feedback from nearly 1,000 participants highlighted the challenges and real-world relevance of these tasks, as well as benefits to critical thinking and metacognitive skills. Probeable Problems are easy to set up and deploy at scale, and help students recognize and resolve uncertainties in programming problems.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:50:00 GMT" } ]
2025-04-17T00:00:00
[ [ "Denny", "Paul", "" ], [ "Kumar", "Viraj", "" ], [ "MacNeil", "Stephen", "" ], [ "Prather", "James", "" ], [ "Leinonen", "Juho", "" ] ]
2504.11724
Zuhuang Chen
Yangyang Si, Ningbo Fan, Yongqi Dong, Zhen Ye, Shiqing Deng, Yijie Li, Chao Zhou, Qibin Zeng, Lu You, Yimei Zhu, Zhenlin Luo, Sujit Das, Laurent Bellaiche, Bin Xu, Huajun Liu, Zuhuang Chen
Ideal antiferroelectricity with large digital electrostrain in PbZrO3 epitaxial thin films
22pages, 5 figures
null
null
null
cond-mat.mtrl-sci physics.app-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Antiferroelectrics exhibit reversible antipolar-polar phase transitions under electric fields, yielding large electrostrain suitable for electromechanical devices. Nevertheless, in thin-film form, the antiferroelectric behavior is often obscured by competing ferroic orders, resulting in slanted hysteresis loops with undesired remnant polarization, subsequently posing challenges in obtaining ideal antiferroelectricity and understanding their intrinsic electrical behavior. Here, atomistic models for controllable antiferroelectric-ferroelectric phase transition pathways are unveiled along specific crystallographic directions. Guided by the anisotropic phase transition and orientation design, we achieved ideal antiferroelectricity with square double hysteresis loop, large saturated polarization (~60 {\mu}C/cm2), near-zero remnant polarization, fast response time (~75 ns), and near-fatigue-free performance (~10^10 cycles) in (111)P-oriented PbZrO3 epitaxial thin films. Moreover, a bipolar and frequency-independent digital electrostrain (~0.83%) were demonstrated in this architype antiferroelectric system. In-situ X-ray diffraction studies further reveal that the large digital electrostrain results from intrinsic field-induced antiferroelectric-ferroelectric structural transition. This work demonstrates the anisotropic phase transition mechanism and ideal antiferroelectricity with large digital electrostrain in antiferroelectric thin films, offering a new avenue for applications of antiferroelectricity in nanoelectromechanical systems.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:55:31 GMT" } ]
2025-04-17T00:00:00
[ [ "Si", "Yangyang", "" ], [ "Fan", "Ningbo", "" ], [ "Dong", "Yongqi", "" ], [ "Ye", "Zhen", "" ], [ "Deng", "Shiqing", "" ], [ "Li", "Yijie", "" ], [ "Zhou", "Chao", "" ], [ "Zeng", "Qibin", "" ], [ "You", "Lu", "" ], [ "Zhu", "Yimei", "" ], [ "Luo", "Zhenlin", "" ], [ "Das", "Sujit", "" ], [ "Bellaiche", "Laurent", "" ], [ "Xu", "Bin", "" ], [ "Liu", "Huajun", "" ], [ "Chen", "Zuhuang", "" ] ]
2504.11725
Scott Dawson
Scott T. M. Dawson, Jaime Prado Zayas, Barbara Lopez-Doriga
Sparsity-promoting methods for isolating dominant linear amplification mechanisms in wall-bounded flows
28 pages, 8 figures
null
null
null
physics.flu-dyn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work proposes a method to identify and isolate the physical mechanisms that are responsible for linear energy amplification in fluid flows. This is achieved by applying a sparsity-promoting methodology to the resolvent form of the governing equations, solving an optimization problem that balances retaining the amplification properties of the original operator with minimizing the number of terms retained in the simplified sparse model. This results in simplified operators that often have very similar pseudospectral properties as the original equations. The method is demonstrated on both incompressible and compressible wall-bounded parallel shear flows, where the results obtained from the proposed method appear to be consistent with known mechanisms and simplifying assumptions, such as the lift-up mechanism, and (for the compressible case) Morkovin's hypothesis and the strong Reynolds analogy. This provides a framework for the application of this method to problems for which knowledge of pertinent amplification mechanisms is less established.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 02:59:01 GMT" } ]
2025-04-17T00:00:00
[ [ "Dawson", "Scott T. M.", "" ], [ "Zayas", "Jaime Prado", "" ], [ "Lopez-Doriga", "Barbara", "" ] ]
2504.11726
Yunzhe Li
Yunzhe Li, Facheng Hu, Hongzi Zhu, Shifan Zhang, Liang Zhang, Shan Chang and Minyi Guo
Saga: Capturing Multi-granularity Semantics from Massive Unlabelled IMU Data for User Perception
2025 IEEE 45th International Conference on Distributed Computing Systems (ICDCS)
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inertial measurement units (IMUs), have been prevalently used in a wide range of mobile perception applications such as activity recognition and user authentication, where a large amount of labelled data are normally required to train a satisfactory model. However, it is difficult to label micro-activities in massive IMU data due to the hardness of understanding raw IMU data and the lack of ground truth. In this paper, we propose a novel fine-grained user perception approach, called Saga, which only needs a small amount of labelled IMU data to achieve stunning user perception accuracy. The core idea of Saga is to first pre-train a backbone feature extraction model, utilizing the rich semantic information of different levels embedded in the massive unlabelled IMU data. Meanwhile, for a specific downstream user perception application, Bayesian Optimization is employed to determine the optimal weights for pre-training tasks involving different semantic levels. We implement Saga on five typical mobile phones and evaluate Saga on three typical tasks on three IMU datasets. Results show that when only using about 100 training samples per class, Saga can achieve over 90% accuracy of the full-fledged model trained on over ten thousands training samples with no additional system overhead.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:03:42 GMT" } ]
2025-04-17T00:00:00
[ [ "Li", "Yunzhe", "" ], [ "Hu", "Facheng", "" ], [ "Zhu", "Hongzi", "" ], [ "Zhang", "Shifan", "" ], [ "Zhang", "Liang", "" ], [ "Chang", "Shan", "" ], [ "Guo", "Minyi", "" ] ]
2504.11727
Ronan Smith
Ronan Smith, Gregor Bortsnar, Vittorio Di Trapani, Ginevra Lautizi, Ludovic Broche, Lukas Helfen, Daniel Bull, Richard Boardman, S. Mark Spearing, Ian Sinclair, Mark Mavrogordato, and Pierre Thibault
Contrast Enhancement of Barely Visible Impact Damage using Speckle-Based Dark-Field Radiography
null
null
null
null
physics.app-ph
http://creativecommons.org/licenses/by-nc-nd/4.0/
Barely visible impact damage (BVID) can cause serious issue for composite structures, due to sub-surface damage seriously reducing the strength of the material without showing easily detectable surface signs. Dark-field imaging measures ultra-small angle scattering caused by microscopic features within samples. It is sensitive to damage in composite materials which would otherwise be invisible in conventional radiography. Here we demonstrate BVID detection with speckle-based dark-field imaging, a technique requiring only sandpaper (to create the speckle-pattern) in addition to a conventional X-ray imaging setup to extract the dark-field imaging. We demonstrate that the technique is capable of detecting both matrix cracking and delaminations by imaging materials susceptible to these failure mechanisms.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:04:16 GMT" } ]
2025-04-17T00:00:00
[ [ "Smith", "Ronan", "" ], [ "Bortsnar", "Gregor", "" ], [ "Di Trapani", "Vittorio", "" ], [ "Lautizi", "Ginevra", "" ], [ "Broche", "Ludovic", "" ], [ "Helfen", "Lukas", "" ], [ "Bull", "Daniel", "" ], [ "Boardman", "Richard", "" ], [ "Spearing", "S. Mark", "" ], [ "Sinclair", "Ian", "" ], [ "Mavrogordato", "Mark", "" ], [ "Thibault", "Pierre", "" ] ]
2504.11729
Jason Ning
Jiahong Ning, Pengyan Zhu, Ce Zheng, Gary Lee, Sumei Sun, Tingting Yang
EdgePrompt: A Distributed Key-Value Inference Framework for LLMs in 6G Networks
null
null
null
null
eess.SP
http://creativecommons.org/publicdomain/zero/1.0/
As sixth-generation (6G) networks advance, large language models (LLMs) are increasingly integrated into 6G infrastructure to enhance network management and intelligence. However, traditional LLMs architecture struggle to meet the stringent latency and security requirements of 6G, especially as the increasing in sequence length leads to greater task complexity. This paper proposes Edge-Prompt, a cloud-edge collaborative framework based on a hierarchical attention splicing mechanism. EdgePrompt employs distributed key-value (KV) pair optimization techniques to accelerate inference and adapt to network conditions. Additionally, to reduce the risk of data leakage, EdgePrompt incorporates a privacy preserving strategy by isolating sensitive information during processing. Experiments on public dataset show that EdgePrompt effectively improves the inference throughput and reduces the latency, which provides a reliable solution for LLMs deployment in 6G environments.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:07:07 GMT" } ]
2025-04-17T00:00:00
[ [ "Ning", "Jiahong", "" ], [ "Zhu", "Pengyan", "" ], [ "Zheng", "Ce", "" ], [ "Lee", "Gary", "" ], [ "Sun", "Sumei", "" ], [ "Yang", "Tingting", "" ] ]
2504.11730
Hailu Kuang
Bingquan Jin, Hailu Kuang, Xiaoqi Li
Blockchain Application in Metaverse: A Review
19 pages, 9 figures
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
In recent years, the term Metaverse emerged as one of the most compelling concepts, captivating the interest of international companies such as Tencent, ByteDance, Microsoft, and Facebook. These company recognized the Metaverse as a pivotal element for future success and have since made significant investments in this area. The Metaverse is still in its developmental stages, requiring the integration and advancement of various technologies to bring its vision to life. One of the key technologies associated with the Metaverse is blockchain, known for its decentralization, security, trustworthiness, and ability to manage time-series data. These characteristics align perfectly with the ecosystem of the Metaverse, making blockchain foundational for its security and infrastructure. This paper introduces both blockchain and the Metaverse ecosystem while exploring the application of the blockchain within the Metaverse, including decentralization, consensus mechanisms, hash algorithms, timestamping, smart contracts, distributed storage, distributed ledgers, and non-fungible tokens (NFTs) to provide insights for researchers investigating these topics.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:07:35 GMT" } ]
2025-04-17T00:00:00
[ [ "Jin", "Bingquan", "" ], [ "Kuang", "Hailu", "" ], [ "Li", "Xiaoqi", "" ] ]
2504.11731
Olivier Shelbaya Dr.
Emma Ghelfi, Alexander Katrusiak, Rick Baartman, Wojtek Fedorko, Oliver Kester, Giordano Kogler Anele, Olivier Shelbaya, Defne Tanyer
Bayesian Optimization for Ion Beam Centroid Correction
10 pages, 9 figures, 3 tables. Bayesian optimization applied to ion beam centroid tuning
null
10.1063/5.0233169
null
physics.acc-ph physics.app-ph
http://creativecommons.org/licenses/by/4.0/
An activity of the TRIUMF automatic beam tuning program, the Bayesian optimization for Ion Steering, BOIS, method has been developed to perform corrective centroid steering of beams at the TRIUMF ISAC facility. BOIS exclusively controls the steerers for centroid correction after the transverse optics have been set according to theory. The method is fully online, easy to deploy, and has been tested in low energy and postaccelerated beams at ISAC, achieving results comparable to human operators. scaleBOIS and boundBOIS are naive proof of concept solutions to preferably select beam paths with minimal steering. Repeatable and robust automated steering reduces reliance on operator expertise and operational overhead, ensuring reliable beam delivery to the experiments and thereby supporting TRIUMF's scientific mission.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:10:54 GMT" } ]
2025-04-17T00:00:00
[ [ "Ghelfi", "Emma", "" ], [ "Katrusiak", "Alexander", "" ], [ "Baartman", "Rick", "" ], [ "Fedorko", "Wojtek", "" ], [ "Kester", "Oliver", "" ], [ "Anele", "Giordano Kogler", "" ], [ "Shelbaya", "Olivier", "" ], [ "Tanyer", "Defne", "" ] ]
2504.11732
Jilan Xu
Jilan Xu, Yifei Huang, Baoqi Pei, Junlin Hou, Qingqiu Li, Guo Chen, Yuejie Zhang, Rui Feng, Weidi Xie
EgoExo-Gen: Ego-centric Video Prediction by Watching Exo-centric Videos
ICLR 2025
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Generating videos in the first-person perspective has broad application prospects in the field of augmented reality and embodied intelligence. In this work, we explore the cross-view video prediction task, where given an exo-centric video, the first frame of the corresponding ego-centric video, and textual instructions, the goal is to generate futur frames of the ego-centric video. Inspired by the notion that hand-object interactions (HOI) in ego-centric videos represent the primary intentions and actions of the current actor, we present EgoExo-Gen that explicitly models the hand-object dynamics for cross-view video prediction. EgoExo-Gen consists of two stages. First, we design a cross-view HOI mask prediction model that anticipates the HOI masks in future ego-frames by modeling the spatio-temporal ego-exo correspondence. Next, we employ a video diffusion model to predict future ego-frames using the first ego-frame and textual instructions, while incorporating the HOI masks as structural guidance to enhance prediction quality. To facilitate training, we develop an automated pipeline to generate pseudo HOI masks for both ego- and exo-videos by exploiting vision foundation models. Extensive experiments demonstrate that our proposed EgoExo-Gen achieves better prediction performance compared to previous video prediction models on the Ego-Exo4D and H2O benchmark datasets, with the HOI masks significantly improving the generation of hands and interactive objects in the ego-centric videos.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:12:39 GMT" } ]
2025-04-17T00:00:00
[ [ "Xu", "Jilan", "" ], [ "Huang", "Yifei", "" ], [ "Pei", "Baoqi", "" ], [ "Hou", "Junlin", "" ], [ "Li", "Qingqiu", "" ], [ "Chen", "Guo", "" ], [ "Zhang", "Yuejie", "" ], [ "Feng", "Rui", "" ], [ "Xie", "Weidi", "" ] ]
2504.11734
Xiang Tang
Xiang Tang, Ruotong Li, Xiaopeng Fan
Recent Advance in 3D Object and Scene Generation: A Survey
34 pages, 6 figures
null
null
null
cs.GR cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, the demand for 3D content has grown exponentially with intelligent upgrading of interactive media, extended reality (XR), and Metaverse industries. In order to overcome the limitation of traditional manual modeling approaches, such as labor-intensive workflows and prolonged production cycles, revolutionary advances have been achieved through the convergence of novel 3D representation paradigms and artificial intelligence generative technologies. In this survey, we conduct a systematically review of the cutting-edge achievements in static 3D object and scene generation, as well as establish a comprehensive technical framework through systematic categorization. Specifically, we initiate our analysis with mainstream 3D object representations, followed by in-depth exploration of two principal technical pathways in object generation: data-driven supervised learning methods and deep generative model-based approaches. Regarding scene generation, we focus on three dominant paradigms: layout-guided compositional synthesis, 2D prior-based scene generation, and rule-driven modeling. Finally, we critically examine persistent challenges in 3D generation and propose potential research directions for future investigation. This survey aims to provide readers with a structured understanding of state-of-the-art 3D generation technologies while inspiring researchers to undertake more exploration in this domain.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:22:06 GMT" } ]
2025-04-17T00:00:00
[ [ "Tang", "Xiang", "" ], [ "Li", "Ruotong", "" ], [ "Fan", "Xiaopeng", "" ] ]
2504.11735
Ningyu He
Xiaohui Hu, Ningyu He, Haoyu Wang
WalletProbe: A Testing Framework for Browser-based Cryptocurrency Wallet Extensions
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
Serving as the first touch point for users to the cryptocurrency world, cryptocurrency wallets allow users to manage, receive, and transmit digital assets on blockchain networks and interact with emerging decentralized finance (DeFi) applications. Unfortunately, cryptocurrency wallets have always been the prime targets for attackers, and incidents of wallet breaches have been reported from time to time. Although some recent studies have characterized the vulnerabilities and scams related to wallets, they have generally been characterized in coarse granularity, overlooking potential risks inherent in detailed designs of cryptocurrency wallets, especially from perspectives including user interaction and advanced features. To fill the void, in this paper, we present a fine-grained security analysis on browser-based cryptocurrency wallets. To pinpoint security issues of components in wallets, we design WalletProbe, a mutation-based testing framework based on visual-level oracles. We have identified 13 attack vectors that can be abused by attackers to exploit cryptocurrency wallets and exposed 21 concrete attack strategies. By applying WalletProbe on 39 widely-adopted browser-based wallet extensions, we astonishingly figure out all of them can be abused to steal crypto assets from innocent users. Identified potential attack vectors were reported to wallet developers timely and 26 issues have been patched already. It is, hence, urgent for our community to take action to mitigate threats related to cryptocurrency wallets. We promise to release all code and data to promote the development of the community.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:24:30 GMT" } ]
2025-04-17T00:00:00
[ [ "Hu", "Xiaohui", "" ], [ "He", "Ningyu", "" ], [ "Wang", "Haoyu", "" ] ]
2504.11736
Yoritaka Iwata
Yoritaka Iwata, Hiroyasu Ejiri, Shahariar Sarkar
Low-energy neutrino responses for 71Ga by electron capture rates, charge exchange reactions and shell model calculations
submitted
null
null
null
nucl-th hep-ph nucl-ex
http://creativecommons.org/licenses/by/4.0/
Weak Gamow-Teller (GT) responses for low-lying states in ${}^{71}\mathrm{Ga}$ are crucial for studying low-energy solar neutrinos and the Ga anomaly, i.e., the possible transition to the sterile state. The responses for the ground state, the first excited state, and the second excited state are evaluated for the first time using the experimental electron capture rates, the experimental charge exchange reaction (CER) rates corrected for the tensor-interaction effect and the theoretical interacting shell model (ISM) calculations. The contributions from the two excited states to the solar and ${}^{51}\mathrm{Cr}$ neutrinos are found to be $4.2 \pm 1.2\%$ of that for the ground state. This is slightly larger than the ISM values but little smaller than the CER values without corrections for the tensor interaction effect. The Ga anomaly is far beyond the uncertainty of the obtained nuclear responses.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:30:19 GMT" } ]
2025-04-17T00:00:00
[ [ "Iwata", "Yoritaka", "" ], [ "Ejiri", "Hiroyasu", "" ], [ "Sarkar", "Shahariar", "" ] ]
2504.11737
Qian Ding
Qian Ding and Dirk Englund
Hardware Co-Designed Optimal Control for Programmable Atomic Quantum Processors via Reinforcement Learning
14 pages, 4 figures
null
null
null
quant-ph
http://creativecommons.org/licenses/by/4.0/
Developing scalable, fault-tolerant atomic quantum processors requires precise control over large arrays of optical beams. This remains a major challenge due to inherent imperfections in classical control hardware, such as inter-channel crosstalk and beam leakage. In this work, we introduce a hardware co-designed intelligent quantum control framework to address these limitations. We construct a mathematical model of the photonic control hardware, integrate it into the quantum optimal control (QOC) framework, and apply reinforcement learning (RL) techniques to discover optimal control strategies. We demonstrate that the proposed framework enables robust, high-fidelity parallel single-qubit gate operations under realistic control conditions, where each atom is individually addressed by an optical beam. Specifically, we implement and benchmark three optimization strategies: a classical hybrid Self-Adaptive Differential Evolution-Adam (SADE-Adam) optimizer, a conventional RL approach based on Proximal Policy Optimization (PPO), and a novel end-to-end differentiable RL method. Using SADE-Adam as a baseline, we find that while PPO performance degrades as system complexity increases, the end-to-end differentiable RL consistently achieves gate fidelities above 99.9$\%$, exhibits faster convergence, and maintains robustness under varied channel crosstalk strength and randomized dynamic control imperfections.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:30:40 GMT" } ]
2025-04-17T00:00:00
[ [ "Ding", "Qian", "" ], [ "Englund", "Dirk", "" ] ]
2504.11738
Xingyong Zhang
Lijuan Kang, Xingyong Zhang, Cuiling Liu
Infinitely many solutions for an instantaneous and non-instantaneous fourth-order differential system with local assumptions
null
null
null
null
math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate a class of fourth-order differential systems with instantaneous and non-instantaneous impulses. Our technical approach is mainly based on a variant of Clark's theorem without the global assumptions. Under locally subquadratic growth conditions imposed on the nonlinear terms $f_i(t,u)$ and impulsive terms $I_i$, combined with perturbations governed by arbitrary continuous functions of small coefficient $\varepsilon$, we establish the existence of multiple small solutions. Specifically, the system exhibits infinitely many solutions in the case where $\varepsilon=0$.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:32:13 GMT" } ]
2025-04-17T00:00:00
[ [ "Kang", "Lijuan", "" ], [ "Zhang", "Xingyong", "" ], [ "Liu", "Cuiling", "" ] ]
2504.11739
Bingjie Gao
Bingjie Gao, Xinyu Gao, Xiaoxue Wu, Yujie Zhou, Yu Qiao, Li Niu, Xinyuan Chen, Yaohui Wang
The Devil is in the Prompts: Retrieval-Augmented Prompt Optimization for Text-to-Video Generation
accepted by CVPR2025
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The evolution of Text-to-video (T2V) generative models, trained on large-scale datasets, has been marked by significant progress. However, the sensitivity of T2V generative models to input prompts highlights the critical role of prompt design in influencing generative outcomes. Prior research has predominantly relied on Large Language Models (LLMs) to align user-provided prompts with the distribution of training prompts, albeit without tailored guidance encompassing prompt vocabulary and sentence structure nuances. To this end, we introduce \textbf{RAPO}, a novel \textbf{R}etrieval-\textbf{A}ugmented \textbf{P}rompt \textbf{O}ptimization framework. In order to address potential inaccuracies and ambiguous details generated by LLM-generated prompts. RAPO refines the naive prompts through dual optimization branches, selecting the superior prompt for T2V generation. The first branch augments user prompts with diverse modifiers extracted from a learned relational graph, refining them to align with the format of training prompts via a fine-tuned LLM. Conversely, the second branch rewrites the naive prompt using a pre-trained LLM following a well-defined instruction set. Extensive experiments demonstrate that RAPO can effectively enhance both the static and dynamic dimensions of generated videos, demonstrating the significance of prompt optimization for user-provided prompts. Project website: \href{https://whynothaha.github.io/Prompt_optimizer/RAPO.html}{GitHub}.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:33:25 GMT" } ]
2025-04-17T00:00:00
[ [ "Gao", "Bingjie", "" ], [ "Gao", "Xinyu", "" ], [ "Wu", "Xiaoxue", "" ], [ "Zhou", "Yujie", "" ], [ "Qiao", "Yu", "" ], [ "Niu", "Li", "" ], [ "Chen", "Xinyuan", "" ], [ "Wang", "Yaohui", "" ] ]
2504.11740
Pamela Shaw
Pamela A Shaw, Susan Gruber, Brian D. Williamson, Rishi Desai, Susan M. Shortreed, Chloe Krakauer, Jennifer C. Nelson, Mark J. van der Laan
A cautionary note for plasmode simulation studies in the setting of causal inference
55 pages, 6 tables, 2 figures, 8 supplemental tables, 4 supplemental figures
null
null
null
stat.ME
http://creativecommons.org/licenses/by/4.0/
Plasmode simulation has become an important tool for evaluating the operating characteristics of different statistical methods in complex settings, such as pharmacoepidemiological studies of treatment effectiveness using electronic health records (EHR) data. These studies provide insight into how estimator performance is impacted by challenges including rare events, small sample size, etc., that can indicate which among a set of methods performs best in a real-world dataset. Plasmode simulation combines data resampled from a real-world dataset with synthetic data to generate a known truth for an estimand in realistic data. There are different potential plasmode strategies currently in use. We compare two popular plasmode simulation frameworks. We provide numerical evidence and a theoretical result, which shows that one of these frameworks can cause certain estimators to incorrectly appear overly biased with lower than nominal confidence interval coverage. Detailed simulation studies using both synthetic and real-world EHR data demonstrate that these pitfalls remain at large sample sizes and when analyzing data from a randomized controlled trial. We conclude with guidance for the choice of a plasmode simulation approach that maintains good theoretical properties to allow a fair evaluation of statistical methods while also maintaining the desired similarity to real data.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:36:27 GMT" } ]
2025-04-17T00:00:00
[ [ "Shaw", "Pamela A", "" ], [ "Gruber", "Susan", "" ], [ "Williamson", "Brian D.", "" ], [ "Desai", "Rishi", "" ], [ "Shortreed", "Susan M.", "" ], [ "Krakauer", "Chloe", "" ], [ "Nelson", "Jennifer C.", "" ], [ "van der Laan", "Mark J.", "" ] ]
2504.11741
Yiyou Sun
Yiyou Sun and Georgia Zhou and Hao Wang and Dacheng Li and Nouha Dziri and Dawn Song
Climbing the Ladder of Reasoning: What LLMs Can-and Still Can't-Solve after SFT?
null
null
null
null
cs.AI cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent supervised fine-tuning (SFT) approaches have significantly improved language models' performance on mathematical reasoning tasks, even when models are trained at a small scale. However, the specific capabilities enhanced through such fine-tuning remain poorly understood. In this paper, we conduct a detailed analysis of model performance on the AIME24 dataset to understand how reasoning capabilities evolve. We discover a ladder-like structure in problem difficulty, categorize questions into four tiers (Easy, Medium, Hard, and Extremely Hard (Exh)), and identify the specific requirements for advancing between tiers. We find that progression from Easy to Medium tier requires adopting an R1 reasoning style with minimal SFT (500-1K instances), while Hard-level questions suffer from frequent model's errors at each step of the reasoning chain, with accuracy plateauing at around 65% despite logarithmic scaling. Exh-level questions present a fundamentally different challenge; they require unconventional problem-solving skills that current models uniformly struggle with. Additional findings reveal that carefully curated small-scale datasets offer limited advantage-scaling dataset size proves far more effective. Our analysis provides a clearer roadmap for advancing language model capabilities in mathematical reasoning.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:39:38 GMT" } ]
2025-04-17T00:00:00
[ [ "Sun", "Yiyou", "" ], [ "Zhou", "Georgia", "" ], [ "Wang", "Hao", "" ], [ "Li", "Dacheng", "" ], [ "Dziri", "Nouha", "" ], [ "Song", "Dawn", "" ] ]
2504.11743
Shengjin Sun
Sheng-Jin Sun, Shuang-Xi Yi, Yuan-Chuan Zou, Yu-Peng Yang, Ying Qin, Qing-Wen Tang, Fa-Yin Wang
Constraining the initial Lorentz factor of gamma-ray bursts under different circumburst mediums
9 pages, 3 figures, 2 tables; Accepted for publication in Journal of High Energy Astrophysics
null
null
null
astro-ph.HE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The initial Lorentz factor ($\Gamma_{\text{0}}$) plays a crucial role in uncovering the physical characteristics of gamma-ray bursts (GRBs). Previous studies have indicated that the ambient medium density index $k$ for GRBs falls in the range of 0 - 2, rather than exactly equal to 0 (homogeneous interstellar ambient) or 2 (typical stellar wind). In this work, we aim to constrain the $\Gamma_0$ of GRBs considering their distinct circumburst medium. We select a total of 33 GRBs for our analysis, comprising 7 X-ray GRBs and 26 optical GRBs. Subsequently, by utilizing the deceleration time of fireball $t_{\rm p}$, we derive the $\Gamma_0$ for the 33 GRBs assuming the radiation efficiency of $\eta =$ 0.2. The inferred initial Lorentz factor was found to be from 50 to 500, consistent with previous studies. We then investigate the correlation between the $\Gamma_0$ and the isotropic energy $E_{\rm \gamma,iso}$ (as well as the mean isotropic luminosity $L_{\rm \gamma,iso}$), finding very tight correlations between them, i.e., $\Gamma_0$ $\propto$ $E^{0.24}_{\rm \gamma,iso,52}$ ($\Gamma_0$ $\propto$ $L^{0.20}_{\rm \gamma,iso.49}$) with $\eta$=0.2. Additionally, we verify the correlation among $\Gamma_0$, the isotropic energy $E_{\rm \gamma,iso}$ (or $L_{\rm \gamma,iso}$) and the peak energy $E_{\rm{p,z}}$, i.e., $E_{\rm \gamma,iso,52}$ $\propto$ $\Gamma^{1.36}_0$$E^{0.82}_{\rm{p,z}}$ ($L_{\rm \gamma,iso,49}$ $\propto$ $\Gamma^{1.05}_0$$E^{0.66}_{\rm{p,z}}$) under the same radiation efficiency ($\eta$=0.2).
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:46:39 GMT" } ]
2025-04-17T00:00:00
[ [ "Sun", "Sheng-Jin", "" ], [ "Yi", "Shuang-Xi", "" ], [ "Zou", "Yuan-Chuan", "" ], [ "Yang", "Yu-Peng", "" ], [ "Qin", "Ying", "" ], [ "Tang", "Qing-Wen", "" ], [ "Wang", "Fa-Yin", "" ] ]
2504.11744
Luning Zhang
Jiahui Shang, Luning Zhang and Zhongxiang Zheng
From Cyber Threat to Data Shield: Constructing Provably Secure File Erasure with Repurposed Ransomware Cryptography
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ransomware has emerged as a persistent cybersecurity threat,leveraging robust encryption schemes that often remain unbroken even after public disclosure of source code. Motivated by the technical resilience of such mechanisms, this paper presents SEER (Secure and Efficient Encryption-based Erasure via Ransomware), a provably secure file destruction system that repurposes ransomware encryption for legitimate data erasure tasks. SEER integrates the triple-encryption design of the Babuk ransomware family, including Curve25519-based key exchange,SHA-256-based key derivation, and the Sosemanuk stream cipher, to construct a layered key management architecture. It tightly couples encryption and key destruction by securely erasing session keys immediately after use. Experimental results on an ESXI platform demonstrate that SEER achieves four orders of magnitude performance improvement over the DoD 5220.22 standard. The proposed system further ensures provable security through both theoretical foundations and practical validation, offering an efficient and resilient solution for the secure destruction of sensitive data.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:47:17 GMT" } ]
2025-04-17T00:00:00
[ [ "Shang", "Jiahui", "" ], [ "Zhang", "Luning", "" ], [ "Zheng", "Zhongxiang", "" ] ]
2504.11745
Jinglong Zhu
Xiaotong Xie, Hiroyuki Umeeda, Jinglong Zhu
$D^0-\bar{D}^0$ mixing in the Dyson-Schwinger approach
21 pages, 2 figures, 3 tables
null
null
null
hep-ph hep-ex
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In view of difficulty to reproduce observables in the $D^0-\bar{D}^0$ mixing via the operator product expansion, we discuss the Dyson-Schwinger approach to this process. Formulated by the parameterization of quark propagators, SU(3) breaking relevant to charm mixing is evaluated in such a way that properly takes account of dynamical chiral symmetry breaking. The $\bar{D}^0\to D^0$ transition is discussed in the vacuum-insertion approximation with locality of the light valence-quark field, represented by the decay constant of $D^0$ meson as well as relevant momentum integrals. It is found that dimensionless mass-difference observable in this approach leads to $|x|=(1.3-2.9)\times 10^{-3}$, the order of magnitude comparable to the HFLAV data, and thereby offering a certain improvement as a theoretical framework.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:49:44 GMT" } ]
2025-04-17T00:00:00
[ [ "Xie", "Xiaotong", "" ], [ "Umeeda", "Hiroyuki", "" ], [ "Zhu", "Jinglong", "" ] ]
2504.11746
Rami Z. E. Alsaberi Dr.
Rami Z. E. Alsaberi, Miroslav D. Filipovic, Hidetoshi Sano, Shi Dai, Frank Haberl, Patrick J. Kavanagh, Denis Leahy, Pierre Maggi, Gavin Rowell, Manami Sasaki, Ivo R. Seitenzahl, Dejan Urosevic, Jeffrey Payne, Zachary J. Smeaton, and Sanja Lazarevic
A New Radio Continuum Study of the Large Magellanic Cloud Supernova Remnant MC SNR J0519-6902
12 pages, 10 figures, The paper has been accepted for publication in PASA. arXiv admin note: text overlap with arXiv:2310.16533
null
null
null
astro-ph.HE
http://creativecommons.org/licenses/by/4.0/
We present a new radio continuum study of the Large Magellanic Cloud supernova remnant (SNR) MC SNR J0519-6902. With a diameter of ~8 pc, this SNR shows a radio ring-like morphology with three bright regions toward the north, east, and south. Its linear polarisation is prominent with average values of 5 +- 1% and 6 +- 1% at 5500 and 9000 MHz, and we find a spectral index of -0.62 +- 0.02 , typical of a young SNR. The average rotation measure is estimated at -124 +- 83 rad m-2 and the magnetic field strength at ~11 muG. We also estimate an equipartition magnetic field of 72 +- 5 muG and minimum explosion energy of Emin = 2.6x1048 erg. Finally, we identified an H I cloud that may be associated with MC SNR J0519-6902, located in the southeastern part of the remnant, along with a potential wind-bubble cavity.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:51:27 GMT" } ]
2025-04-17T00:00:00
[ [ "Alsaberi", "Rami Z. E.", "" ], [ "Filipovic", "Miroslav D.", "" ], [ "Sano", "Hidetoshi", "" ], [ "Dai", "Shi", "" ], [ "Haberl", "Frank", "" ], [ "Kavanagh", "Patrick J.", "" ], [ "Leahy", "Denis", "" ], [ "Maggi", "Pierre", "" ], [ "Rowell", "Gavin", "" ], [ "Sasaki", "Manami", "" ], [ "Seitenzahl", "Ivo R.", "" ], [ "Urosevic", "Dejan", "" ], [ "Payne", "Jeffrey", "" ], [ "Smeaton", "Zachary J.", "" ], [ "Lazarevic", "Sanja", "" ] ]
2504.11747
Jiang-Tao Yuan
Cai-Hong Wang, Jiang-Tao Yuan, Ying-Hui Yang, Mao-Sheng Li, Shao-Ming Fei and Zhi-Hao Ma
Detectors for local discrimination of sets of generalized Bell states
10 pages, 2 figures,7 tables
Physical Review A 111, 042408 (2025)
10.1103/PhysRevA.111.042408
null
quant-ph math-ph math.MP
http://creativecommons.org/licenses/by/4.0/
A fundamental problem in quantum information processing is the discrimination among a set of orthogonal quantum states of a composite system under local operations and classical communication (LOCC). Corresponding to the LOCC indistinguishable sets of four ququad-ququad orthogonal maximally entangled states (MESs) constructed by Yu et al. [Phys. Rev. Lett. 109, 020506 (2012)], the maximum commutative sets (MCSs) were introduced as detectors for the local distinguishability of the set of generalized Bell states (GBSs), for which the detectors are sufficient to determine the LOCC distinguishability. In this work, we show how to determine all the detectors for a given GBS set. We construct also several 4-GBS sets without detectors, most of which are one-way LOCC indistinguishable and only one is one-way LOCC distinguishable, indicating that the detectors are not necessary for LOCC distinguishability. Furthermore, we show that for 4-GBS sets in quantum system $\mathbb{C}^{6}\otimes\mathbb{C}^{6}$, the detectors are almost necessary for one-way LOCC distinguishability, except for one set in the sense of local unitary equivalence. The problem of one-way LOCC discrimination of 4-GBS sets in $\mathbb{C}^{6}\otimes\mathbb{C}^{6}$ is completely resolved.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:55:53 GMT" } ]
2025-04-17T00:00:00
[ [ "Wang", "Cai-Hong", "" ], [ "Yuan", "Jiang-Tao", "" ], [ "Yang", "Ying-Hui", "" ], [ "Li", "Mao-Sheng", "" ], [ "Fei", "Shao-Ming", "" ], [ "Ma", "Zhi-Hao", "" ] ]
2504.11748
Christopher Xu
Christopher Y. Xu, Jack Yan, Kathleen Lum, and Justin K. Yim
Steerable rolling of a 1-DoF robot using an internal pendulum
2 pages, submitted to 2nd Unconventional Robots Workshop: Rethinking Robotic Systems Beyond Convention at IEEE ICRA 2025
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
We present ROCK (Rolling One-motor Controlled rocK), a 1 degree-of-freedom robot consisting of a round shell and an internal pendulum. An uneven shell surface enables steering by using only the movement of the pendulum, allowing for mechanically simple designs that may be feasible to scale to large quantities or small sizes. We train a control policy using reinforcement learning in simulation and deploy it onto the robot to complete a rectangular trajectory.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 03:59:30 GMT" } ]
2025-04-17T00:00:00
[ [ "Xu", "Christopher Y.", "" ], [ "Yan", "Jack", "" ], [ "Lum", "Kathleen", "" ], [ "Yim", "Justin K.", "" ] ]
2504.11749
Zongye Zhang
Zongye Zhang, Wenrui Cai, Qingjie Liu, Yunhong Wang
SkeletonX: Data-Efficient Skeleton-based Action Recognition via Cross-sample Feature Aggregation
Accepted by IEEE Transactions on Multimedia (TMM). 13 pages, 7 figures, 11 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While current skeleton action recognition models demonstrate impressive performance on large-scale datasets, their adaptation to new application scenarios remains challenging. These challenges are particularly pronounced when facing new action categories, diverse performers, and varied skeleton layouts, leading to significant performance degeneration. Additionally, the high cost and difficulty of collecting skeleton data make large-scale data collection impractical. This paper studies one-shot and limited-scale learning settings to enable efficient adaptation with minimal data. Existing approaches often overlook the rich mutual information between labeled samples, resulting in sub-optimal performance in low-data scenarios. To boost the utility of labeled data, we identify the variability among performers and the commonality within each action as two key attributes. We present SkeletonX, a lightweight training pipeline that integrates seamlessly with existing GCN-based skeleton action recognizers, promoting effective training under limited labeled data. First, we propose a tailored sample pair construction strategy on two key attributes to form and aggregate sample pairs. Next, we develop a concise and effective feature aggregation module to process these pairs. Extensive experiments are conducted on NTU RGB+D, NTU RGB+D 120, and PKU-MMD with various GCN backbones, demonstrating that the pipeline effectively improves performance when trained from scratch with limited data. Moreover, it surpasses previous state-of-the-art methods in the one-shot setting, with only 1/10 of the parameters and much fewer FLOPs. The code and data are available at: https://github.com/zzysteve/SkeletonX
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:01:42 GMT" } ]
2025-04-17T00:00:00
[ [ "Zhang", "Zongye", "" ], [ "Cai", "Wenrui", "" ], [ "Liu", "Qingjie", "" ], [ "Wang", "Yunhong", "" ] ]
2504.11750
Prabhu Vellaisamy
Prabhu Vellaisamy, Thomas Labonte, Sourav Chakraborty, Matt Turner, Samantika Sury, and John Paul Shen
Characterizing and Optimizing LLM Inference Workloads on CPU-GPU Coupled Architectures
Accepted for ISPASS 2025
null
null
null
cs.DC cs.AI cs.AR cs.PF
http://creativecommons.org/licenses/by/4.0/
Large language model (LLM)-based inference workloads increasingly dominate data center costs and resource utilization. Therefore, understanding the inference workload characteristics on evolving CPU-GPU coupled architectures is crucial for optimization. This paper presents an in-depth analysis of LLM inference behavior on loosely-coupled (PCIe A100/H100) and closely-coupled (GH200) systems. We analyze performance dynamics using fine-grained operator-to-kernel trace analysis, facilitated by our novel profiler SKIP and metrics like Total Kernel Launch and Queuing Time (TKLQT). Results show that closely-coupled (CC) GH200 significantly outperforms loosely-coupled (LC) systems at large batch sizes, achieving 1.9x-2.7x faster prefill latency for Llama 3.2-1B. However, our analysis also reveals that GH200 remains CPU-bound up to 4x larger batch sizes than LC systems. In this extended CPU-bound region, we identify the performance characteristics of the Grace CPU as a key factor contributing to higher inference latency at low batch sizes on GH200. We demonstrate that TKLQT accurately identifies this CPU/GPU-bound transition point. Based on this analysis, we further show that kernel fusion offers significant potential to mitigate GH200's low-batch latency bottleneck by reducing kernel launch overhead. This detailed kernel-level characterization provides critical insights for optimizing diverse CPU-GPU coupling strategies. This work is an initial effort, and we plan to explore other major AI/DL workloads that demand different degrees of CPU-GPU heterogeneous architectures.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:02:39 GMT" } ]
2025-04-17T00:00:00
[ [ "Vellaisamy", "Prabhu", "" ], [ "Labonte", "Thomas", "" ], [ "Chakraborty", "Sourav", "" ], [ "Turner", "Matt", "" ], [ "Sury", "Samantika", "" ], [ "Shen", "John Paul", "" ] ]
2504.11753
Artbazar Galtbayar
Artbazar Galtbayar, Kenji Yajima
The $L^p$-boundedness of wave operators for 4-th order Schr\"odinger operators on $\mathbb{R}^2$, I
null
null
null
null
math-ph math.MP
http://creativecommons.org/licenses/by-nc-nd/4.0/
We prove that high energy parts of wave operators for fourth order Schr\"odinger operators $H=\Delta^2 + V(x)$ in $\mathbb{R}^2$ are bounded in $L^p(\mathbb{R}^2)$ for $p\in(1,\infty)$.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:10:47 GMT" } ]
2025-04-17T00:00:00
[ [ "Galtbayar", "Artbazar", "" ], [ "Yajima", "Kenji", "" ] ]
2504.11754
Bo Yang
Zihui Zhang, Yafei Yang, Hongtao Wen, Bo Yang
GrabS: Generative Embodied Agent for 3D Object Segmentation without Scene Supervision
ICLR 2025 Spotlight. Code and data are available at: https://github.com/vLAR-group/GrabS
null
null
null
cs.CV cs.AI cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the hard problem of 3D object segmentation in complex point clouds without requiring human labels of 3D scenes for supervision. By relying on the similarity of pretrained 2D features or external signals such as motion to group 3D points as objects, existing unsupervised methods are usually limited to identifying simple objects like cars or their segmented objects are often inferior due to the lack of objectness in pretrained features. In this paper, we propose a new two-stage pipeline called GrabS. The core concept of our method is to learn generative and discriminative object-centric priors as a foundation from object datasets in the first stage, and then design an embodied agent to learn to discover multiple objects by querying against the pretrained generative priors in the second stage. We extensively evaluate our method on two real-world datasets and a newly created synthetic dataset, demonstrating remarkable segmentation performance, clearly surpassing all existing unsupervised methods.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:13:53 GMT" } ]
2025-04-17T00:00:00
[ [ "Zhang", "Zihui", "" ], [ "Yang", "Yafei", "" ], [ "Wen", "Hongtao", "" ], [ "Yang", "Bo", "" ] ]
2504.11755
Kandulapati Sriram
SD Gouse, M. V. R. Abhishek, K. Sriram
Asymmetric Cross-Correlation functions with delays in Sco X-1: Evidence of possible Jet triggering
Accepted in Astrophysics & Space Science (Ap&SS) Journal
null
null
null
astro-ph.HE
http://creativecommons.org/licenses/by/4.0/
The formation and origin of Jets from Z sources are not well understood, although an X-ray-radio correlation has been observed. We analyzed a few observations of Sco X-1 using the Rossi X-ray Timing Experiment Satellite. Out of the 17 observations, 5 showed lags of a few 10s of seconds with an asymmetry in the CCF between the soft and hard bands in their cross-correlation function (CCF) analysis. Interestingly, during these observations, a ballistic-type radio jet of Ultra-relativistic(UR) nature was reported. The observed lags and associated cross-correlation coefficients were validated using simulations. The rest of the 12 observations' CCFs were symmetric, and their associated Power Density Spectrum (PDS) displayed Normal Branch(NBO)/Normal + Horizontal Branch Oscillations(NBO+HBO). The X-ray spectral study of 2 obs. where radio core emission was seen with abrupt variation in both PDS and CCF showed a black-body flux variation of 10-20%, but no spectral parameter varied. We suggest that the ballistic jet caused a disturbance in the inner accretion region, viz., the Boundary Layer plausibly along with the Corona, that caused the lags observed in the CCFs along with the absence of any oscillatory features in the PDS tracing only a flat-topped noise. Whereas the regions with no lags showed a persistent NBO/NBO+HBO feature, suggesting a steady accretion flow. Although the UR jet can't be related to NBO or HBO, we suggest it could be related to the phenomena that cause NBO since the majority of PDSs displayed NBO. We also constrain the inner accretion region size to 20-30 km, which is responsible for the accretion ejecta in Sco X-1.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:18:21 GMT" } ]
2025-04-17T00:00:00
[ [ "Gouse", "SD", "" ], [ "Abhishek", "M. V. R.", "" ], [ "Sriram", "K.", "" ] ]
2504.11756
Lixiang Chen
Lixiang Chen, Yuxing Han, Yu Chen, Xing Chen, Chengcheng Yang, Weining Qian
AQETuner: Reliable Query-level Configuration Tuning for Analytical Query Engines
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern analytical query engines (AQEs) are essential for large-scale data analysis and processing. These systems usually provide numerous query-level tunable knobs that significantly affect individual query performance. While several studies have explored automatic DBMS configuration tuning, they have several limitations to handle query-level tuning. Firstly, they fail to capture how knobs influence query plans, which directly affect query performance. Secondly, they overlook query failures during the tuning processing, resulting in low tuning efficiency. Thirdly, they struggle with cold-start problems for new queries, leading to prolonged tuning time. To address these challenges, we propose AQETuner, a novel Bayesian Optimization-based system tailored for reliable query-level knob tuning in AQEs. AQETuner first applies the attention mechanisms to jointly encode the knobs and plan query, effectively identifying the impact of knobs on plan nodes. Then, AQETuner employs a dual-task Neural Process to predict both query performance and failures, leveraging their interactions to guide the tuning process. Furthermore, AQETuner utilizes Particle Swarm Optimization to efficiently generate high-quality samples in parallel during the initial tuning stage for the new queries. Experimental results show that AQETuner significantly outperforms existing methods, reducing query latency by up to 23.7% and query failures by up to 51.2%.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:18:25 GMT" } ]
2025-04-17T00:00:00
[ [ "Chen", "Lixiang", "" ], [ "Han", "Yuxing", "" ], [ "Chen", "Yu", "" ], [ "Chen", "Xing", "" ], [ "Yang", "Chengcheng", "" ], [ "Qian", "Weining", "" ] ]
2504.11757
Pradeep Singh Ph.D.
Pradeep Singh, Ashutosh Kumar, Sutirtha Ghosh, Hrishit B P, Balasubramanian Raman
Dynamics and Computational Principles of Echo State Networks: A Mathematical Perspective
100 pages, 17 tables, 41 figures
null
null
null
cs.LG cs.NE
http://creativecommons.org/licenses/by/4.0/
Reservoir computing (RC) represents a class of state-space models (SSMs) characterized by a fixed state transition mechanism (the reservoir) and a flexible readout layer that maps from the state space. It is a paradigm of computational dynamical systems that harnesses the transient dynamics of high-dimensional state spaces for efficient processing of temporal data. Rooted in concepts from recurrent neural networks, RC achieves exceptional computational power by decoupling the training of the dynamic reservoir from the linear readout layer, thereby circumventing the complexities of gradient-based optimization. This work presents a systematic exploration of RC, addressing its foundational properties such as the echo state property, fading memory, and reservoir capacity through the lens of dynamical systems theory. We formalize the interplay between input signals and reservoir states, demonstrating the conditions under which reservoirs exhibit stability and expressive power. Further, we delve into the computational trade-offs and robustness characteristics of RC architectures, extending the discussion to their applications in signal processing, time-series prediction, and control systems. The analysis is complemented by theoretical insights into optimization, training methodologies, and scalability, highlighting open challenges and potential directions for advancing the theoretical underpinnings of RC.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:28:05 GMT" } ]
2025-04-17T00:00:00
[ [ "Singh", "Pradeep", "" ], [ "Kumar", "Ashutosh", "" ], [ "Ghosh", "Sutirtha", "" ], [ "P", "Hrishit B", "" ], [ "Raman", "Balasubramanian", "" ] ]
2504.11758
The Anh Bui
The Anh Bui
Hardy spaces, Campanato spaces and higher order Riesz transforms associated with Bessel operators
35 pages. arXiv admin note: text overlap with arXiv:2504.09867
null
null
null
math.CA
http://creativecommons.org/licenses/by/4.0/
Let $\nu = (\nu_1, \ldots, \nu_n) \in (-1/2, \infty)^n$, with $n \ge 1$, and let $\Delta_\nu$ be the multivariate Bessel operator defined by \[ \Delta_{\nu} = -\sum_{j=1}^n\left( \frac{\partial^2}{\partial x_j^2} - \frac{\nu_j^2 - 1/4}{x_j^2} \right). \] In this paper, we develop the theory of Hardy spaces and BMO-type spaces associated with the Bessel operator $\Delta_\nu$. We then study the higher-order Riesz transforms associated with $\Delta_\nu$. First, we show that these transforms are Calder\'on-Zygmund operators. We further prove that they are bounded on the Hardy spaces and BMO-type spaces associated with $\Delta_\nu$.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:34:41 GMT" } ]
2025-04-17T00:00:00
[ [ "Bui", "The Anh", "" ] ]
2504.11759
Ziyu Xu
Ziyu Xu and Aaditya Ramdas
Bringing closure to FDR control: beating the e-Benjamini-Hochberg procedure
11 pages, 1 figure
null
null
null
stat.ME math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
False discovery rate (FDR) has been a key metric for error control in multiple hypothesis testing, and many methods have developed for FDR control across a diverse cross-section of settings and applications. We develop a closure principle for all FDR controlling procedures, i.e., we provide a characterization based on e-values for all admissible FDR controlling procedures. We leverage this idea to formulate the closed eBH procedure, a (usually strict) improvement over the eBH procedure for FDR control when provided with e-values. We demonstrate the practical performance of closed eBH in simulations.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:36:12 GMT" } ]
2025-04-17T00:00:00
[ [ "Xu", "Ziyu", "" ], [ "Ramdas", "Aaditya", "" ] ]
2504.11760
Cliff Joslyn
Robert E. Green, Cliff A. Joslyn, Audun Myers, Michael G. Rawson, Michael R. Robinson
The Topological Structures of the Orders of Hypergraphs
null
null
null
Information release PNNL-SA-210092
math.CO math.AT math.CT
http://creativecommons.org/licenses/by/4.0/
We provide first a categorical exploration of, and then completion of the mapping of the relationships among, three fundamental perspectives on binary relations: as the incidence matrices of hypergraphs, as the formal contexts of concept lattices, and as specifying topological cosheaves of simplicial (Dowker) complexes on simplicial (Dowker) complexes. We provide an integrative, functorial framework combining previously known with three new results: 1) given a binary relation, there are order isomorphisms among the bounded edge order of the intersection complexes of its dual hypergraphs and its concept lattice; 2) the concept lattice of a context is an isomorphism invariant of the Dowker cosheaf (of abstract simplicial complexes) of that context; and 3) a novel Dowker cosheaf (of chain complexes) of a relation is an isomorphism invariant of the concept lattice of the context that generalizes Dowker's original homological result. We illustrate these concepts throughout with a running example, and demonstrate relationships to past results.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:40:12 GMT" } ]
2025-04-17T00:00:00
[ [ "Green", "Robert E.", "" ], [ "Joslyn", "Cliff A.", "" ], [ "Myers", "Audun", "" ], [ "Rawson", "Michael G.", "" ], [ "Robinson", "Michael R.", "" ] ]
2504.11761
Masahiro Tanaka
Masahiro Tanaka
Delayed Acceptance Markov Chain Monte Carlo for Robust Bayesian Analysis
null
null
null
null
stat.CO
http://creativecommons.org/licenses/by/4.0/
This study introduces a computationally efficient algorithm, delayed acceptance Markov chain Monte Carlo (DA-MCMC), designed to improve posterior simulation in quasi-Bayesian inference. Quasi-Bayesian methods, which do not require fully specifying a probabilistic model, are often computationally expensive owing to the need to evaluate the inverse and determinant of large covariance matrices. DA-MCMC addresses this challenge by employing a two-stage process: In the first stage, proposals are screened using an approximate posterior, whereas a final acceptance or rejection decision is made in the second stage based on the exact target posterior. This reduces the need for costly matrix computations, thereby improving efficiency without sacrificing accuracy. We demonstrate the effectiveness of DA-MCMC through applications to both synthetic and real data. The results demonstrate that, although DA-MCMC slightly reduces the effective sample size per iteration compared with the standard MCMC, it achieves substantial improvement in terms of effective sample size per second, approximately doubling the efficiency. This makes DA-MCMC particularly useful for cases where posterior simulation is computationally intensive. Thus, the DA-MCMC algorithm offers a significant advancement in computational efficiency for quasi-Bayesian inference, making it a valuable tool for robust Bayesian analysis.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:40:17 GMT" } ]
2025-04-17T00:00:00
[ [ "Tanaka", "Masahiro", "" ] ]
2504.11762
Ruijuan Xiao
Zicun Li, Xinguo Ren, Jinbin Li, Ruijuan Xiao and Hong Li
Gas-solid Reaction Dynamics on Li$_6$PS$_5$Cl Surfaces: A Case Study of the Influence of CO$_2$ and CO$_2$/O$_2$ Atmospheres Using AIMD and MLFF Simulations
null
null
null
null
physics.chem-ph cond-mat.mtrl-sci
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, rapid progress has been made in solid-state lithium batteries. Among various technologies, coating the surface of electrodes or electrolytes has proven to be an effective method to enhance interfacial stability and improve battery cycling performance. Recent experimental studies showed that gas-solid reactions offer a convenient approach to form modified coating layers on the solid electrolyte. Here, we performed computational simulations to investigate this surface reaction process. Specifically, we simulated the gas-solid reactions of Li$_6$PS$_5$Cl(LPSC) solid-state electrolytes in pure CO$_2$ and in mixed CO$_2$/O$_2$ atmospheres using ab-initio molecular dynamics (AIMD) and machine-learning force fields (MLFF)-accelerated molecular dynamics (MD) approaches. In the former case, LPSC surfaces primarily form Li$_2$CO$_2$S because it is difficult to dissociate another oxygen atom from the second CO$_2$ molecule. While in CO$_2$/O$_2$ mixed atmosphere, O$_2$ molecules preferentially adsorb onto LPSC, which supplies oxygen sites for subsequent CO$_2$ adsorption to form carbonate -CO$_3$ units. This reaction pathway ultimately generates an interfacial product dominated by Li$_2$CO$_3$. These coatings exhibit distinct electronic and ionic conductivity characteristics, allowing the possibility to control coating compositions and configurations by adjusting the gas-solid reactions. Key criteria for applying this strategy are extracted from the current research.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:45:40 GMT" } ]
2025-04-17T00:00:00
[ [ "Li", "Zicun", "" ], [ "Ren", "Xinguo", "" ], [ "Li", "Jinbin", "" ], [ "Xiao", "Ruijuan", "" ], [ "Li", "Hong", "" ] ]
2504.11763
Aoran Liu
Aoran Liu, Kun Hu, Clinton Mo, Changyang Li, Zhiyong Wang
Extended Short- and Long-Range Mesh Learning for Fast and Generalized Garment Simulation
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
3D garment simulation is a critical component for producing cloth-based graphics. Recent advancements in graph neural networks (GNNs) offer a promising approach for efficient garment simulation. However, GNNs require extensive message-passing to propagate information such as physical forces and maintain contact awareness across the entire garment mesh, which becomes computationally inefficient at higher resolutions. To address this, we devise a novel GNN-based mesh learning framework with two key components to extend the message-passing range with minimal overhead, namely the Laplacian-Smoothed Dual Message-Passing (LSDMP) and the Geodesic Self-Attention (GSA) modules. LSDMP enhances message-passing with a Laplacian features smoothing process, which efficiently propagates the impact of each vertex to nearby vertices. Concurrently, GSA introduces geodesic distance embeddings to represent the spatial relationship between vertices and utilises attention mechanisms to capture global mesh information. The two modules operate in parallel to ensure both short- and long-range mesh modelling. Extensive experiments demonstrate the state-of-the-art performance of our method, requiring fewer layers and lower inference latency.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:56:01 GMT" } ]
2025-04-17T00:00:00
[ [ "Liu", "Aoran", "" ], [ "Hu", "Kun", "" ], [ "Mo", "Clinton", "" ], [ "Li", "Changyang", "" ], [ "Wang", "Zhiyong", "" ] ]
2504.11764
SunHyun Youn
Sun-Hyun Youn
Probing the Abyss of the Quantum Vacuum: A Quest for Fluctuation-Free Domains
18pages, 6 figures
null
null
null
quant-ph
http://creativecommons.org/licenses/by-nc-nd/4.0/
The modification of electromagnetic vacuum fluctuations by boundary conditions is a fundamental prediction of quantum electrodynamics (QED). However, direct experimental verification in the optical regime is hindered by the need for sub-wavelength spatial resolution. Here, we present a novel approach to indirectly probe the spatial distribution of vacuum fluctuations by leveraging radio-frequency (RF) measurements of thermal noise. At RF frequencies, thermal noise, which occupies the same electromagnetic modes as vacuum fluctuations and is similarly shaped by boundary conditions, dominates the single-photon energy. By precisely characterizing the spatial distribution of thermal noise near a conducting boundary, we infer the corresponding modification of vacuum modes and, consequently, the vacuum fluctuations themselves. Our experimental setup, employing coaxial cables and RF splitters to mimic optical mirrors and beam splitters, enables controlled manipulation of boundary conditions and precise thermal noise measurements. We observe a reduction in thermal noise near the conducting boundary, providing indirect evidence for the theoretically predicted suppression of vacuum fluctuations. This work establishes a new experimental framework for investigating QED effects in constrained environments, with potential implications for quantum-limited precision measurements, such as gravitational wave detection and intensity-stabilized light sources. This RF approach circumvents the limitations of optical techniques and opens new avenues for exploring fundamental quantum phenomena.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:59:14 GMT" } ]
2025-04-17T00:00:00
[ [ "Youn", "Sun-Hyun", "" ] ]
2504.11765
Hyungwoo Lee
Hyungwoo Lee (1), Kihyun Kim (1), Jinwoo Kim (1), Jungmin So (1), Myung-Hoon Cha (2), Hong-Yeon Kim (2), James J. Kim (3), Youngjae Kim (1) ((1) Dept. of Computer Science and Engineering, Sogang University, Seoul, Republic of Korea, (2) ETRI, Daejeon, Republic of Korea, (3) Soteria Inc)
Shared Disk KV Cache Management for Efficient Multi-Instance Inference in RAG-Powered LLMs
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent large language models (LLMs) face increasing inference latency as input context length and model size continue to grow. In particular, the retrieval-augmented generation (RAG) technique, which enhances LLM responses by incorporating external knowledge, exacerbates this issue by significantly increasing the number of input tokens. This expansion in token length leads to a substantial rise in computational overhead, particularly during the prefill stage, resulting in prolonged time-to-first-token (TTFT). To address this issue, this paper proposes a method to reduce TTFT by leveraging a disk-based key-value (KV) cache to lessen the computational burden during the prefill stage. We also introduce a disk-based shared KV cache management system, called Shared RAG-DCache, for multi-instance LLM RAG service environments. This system, together with an optimal system configuration, improves both throughput and latency under given resource constraints. Shared RAG-DCache exploits the locality of documents related to user queries in RAG, as well as the queueing delay in LLM inference services. It proactively generates and stores disk KV caches for query-related documents and shares them across multiple LLM instances to enhance inference performance. In experiments on a single host equipped with 2 GPUs and 1 CPU, Shared RAG-DCache achieved a 15~71% increase in throughput and up to a 12~65% reduction in latency, depending on the resource configuration.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 04:59:18 GMT" } ]
2025-04-17T00:00:00
[ [ "Lee", "Hyungwoo", "" ], [ "Kim", "Kihyun", "" ], [ "Kim", "Jinwoo", "" ], [ "So", "Jungmin", "" ], [ "Cha", "Myung-Hoon", "" ], [ "Kim", "Hong-Yeon", "" ], [ "Kim", "James J.", "" ], [ "Kim", "Youngjae", "" ] ]
2504.11766
Shinji Ohno
Shinji Ohno and Yuuki Sasaki
On cohomogeneity one hyperpolar actions related to $G_{2}$
null
null
null
null
math.DG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cohomogeneity one actions on irreducible Riemannian symmetric spaces of compact type are classified into three cases: Hermann actions, actions induced by the linear isotropy representation of a Riemannian symmetric space of rank 2, and exceptional actions. In this paper, we consider exceptional actions related to the exceptional compact Lie group $G_{2}$ and investigate some properties of their orbits as Riemannian submanifolds. In particular, we examine the principal curvatures of principal orbits and classify principal orbits that are minimal, austere, weakly reflective, and proper biharmonic.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:03:19 GMT" } ]
2025-04-17T00:00:00
[ [ "Ohno", "Shinji", "" ], [ "Sasaki", "Yuuki", "" ] ]
2504.11767
Qinyan Shen
Qinyan Shen, Karl Gregory, Xianzheng Huang
Post-selection Inference in Regression Models for Group Testing Data
null
Biometrics. 2024 Jul 1;80(3):ujae101
10.1093/biomtc/ujae101
null
stat.ME
http://creativecommons.org/licenses/by/4.0/
We develop methodology for valid inference after variable selection in logistic regression when the responses are partially observed, that is, when one observes a set of error-prone testing outcomes instead of the true values of the responses. Aiming at selecting important covariates while accounting for missing information in the response data, we apply the expectation-maximization algorithm to compute maximum likelihood estimators subject to LASSO penalization. Subsequent to variable selection, we make inferences on the selected covariate effects by extending post-selection inference methodology based on the polyhedral lemma. Empirical evidence from our extensive simulation study suggests that our post-selection inference results are more reliable than those from naive inference methods that use the same data to perform variable selection and inference without adjusting for variable selection.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:08:57 GMT" } ]
2025-04-17T00:00:00
[ [ "Shen", "Qinyan", "" ], [ "Gregory", "Karl", "" ], [ "Huang", "Xianzheng", "" ] ]
2504.11768
Kabeer Manali Rahul
Kabeer Manali Rahul
Representability theorems via metric techniques
null
null
null
null
math.AG math.CT
http://creativecommons.org/licenses/by/4.0/
We prove new Brown representability theorems for triangulated categories using metric techniques as introduced in the work of Neeman. In the setting of algebraic geometry, this gives us new representability theorems for homological and cohomological functors on the bounded derived category of coherent sheaves. To prove this result, we introduce a generalisation of the notion of an approximable triangulated category.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:11:38 GMT" } ]
2025-04-17T00:00:00
[ [ "Rahul", "Kabeer Manali", "" ] ]
2504.11769
Xuefen Chi
Yuchao Dang, Xuefen Chi
Sliding Block Martingale based Multi-hop Delay QoS Analysis
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-nd/4.0/
With the growing density of wireless networks and demand for multi-hop transmissions, precise delay Quality of Service (QoS) analysis has become a critical challenge. This paper introduces a multi-hop delay QoS analysis framework based on the sliding block martingale, addressing the loose boundary issue of prior methods that rely on service process martingales and min-plus transformations. By constructing a sliding block martingale with a window, we capture both long-term trends and short-term fluctuations in the backlog, eliminating the reliance on the generalized incremental property. The framework redefines delay unreliability events using cascading attributes, deriving a more compact Delay Unreliability Probability Boundary (DUPB). To improve the efficiency of solving the key parameter $\theta$, we propose a Micrometric Intervals based Supermartingale Upcrossing Estimate Theorem, quantifying the upper bound of event occurrence frequency to constrain the solution space of $\theta$. Simulations based on the 3GPP UMa/UMi channel model validate the framework's effectiveness. Results show that in 2-7 hop scenarios, the maximum deviation between theoretical boundaries and Monte Carlo simulations is $4.116 \times 10^{-5}$, with a lower RMSE than existing methods. Iteration count and CPU time for solving $\theta$ are reduced by $59\%-72\%$ and $60.6\%-70.5\%$, respectively, improving analysis efficiency. Furthermore, the derived minimum service rate for multi-hop queues offers a valuable reference for resource allocation. The framework demonstrates high accuracy, scalability, and practicality in complex multi-hop networks.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:13:53 GMT" } ]
2025-04-17T00:00:00
[ [ "Dang", "Yuchao", "" ], [ "Chi", "Xuefen", "" ] ]
2504.11770
Takashi Morita
Takashi Morita and Timothy J. O'Donnell
Unsupervised Classification of English Words Based on Phonological Information: Discovery of Germanic and Latinate Clusters
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cross-linguistically, native words and loanwords follow different phonological rules. In English, for example, words of Germanic and Latinate origin exhibit different stress patterns, and a certain syntactic structure is exclusive to Germanic verbs. When seeing them as a cognitive model, however, such etymology-based generalizations face challenges in terms of learnability, since the historical origins of words are presumably inaccessible information for general language learners. In this study, we present computational evidence indicating that the Germanic-Latinate distinction in the English lexicon is learnable from the phonotactic information of individual words. Specifically, we performed an unsupervised clustering on corpus-extracted words, and the resulting word clusters largely aligned with the etymological distinction. The model-discovered clusters also recovered various linguistic generalizations documented in the previous literature regarding the corresponding etymological classes. Moreover, our findings also uncovered previously unrecognized features of the quasi-etymological clusters, offering novel hypotheses for future experimental studies.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:20:08 GMT" } ]
2025-04-17T00:00:00
[ [ "Morita", "Takashi", "" ], [ "O'Donnell", "Timothy J.", "" ] ]
2504.11771
Shuyue Fu
Shuyue Fu and Yihan Peng and Shengping Gong and Peng Shi
Design and Continuation of Nonlinear Teardrop Hovering Formation along the Near Rectilinear Halo Orbit
null
null
null
null
math.OC
http://creativecommons.org/licenses/by-nc-nd/4.0/
This short communication is devoted to the design and continuation of a teardrop hovering formation along the Near Rectilinear Halo orbit and provides further insights into future on-orbit services in the cislunar space. First, we extend the concept of the teardrop hovering formation to scenarios along the Near Rectilinear Halo orbit in the Earth-Moon circular restricted three-body problem. Then, we develop two methods for designing these formations based on the nonlinear model for relative motion. The first method addresses the design of the teardrop hovering formations with relatively short revisit distances, while the second method continues hovering trajectories from short to longer revisit distances. In particular, new continuation method is developed to meet the design requirements of this new scenario. Simulation results verify the effectiveness of the proposed methods, and a near-natural teardrop hovering formation is achieved by considering the dynamical properties near the NRHO. Comparisons between design results obtained using linear and nonlinear models further strengthen the necessity of using the nonlinear model.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:20:48 GMT" } ]
2025-04-17T00:00:00
[ [ "Fu", "Shuyue", "" ], [ "Peng", "Yihan", "" ], [ "Gong", "Shengping", "" ], [ "Shi", "Peng", "" ] ]
2504.11772
Kabeer Manali Rahul
Kabeer Manali Rahul
Admissible subcategories and metric techniques
null
null
null
null
math.AG math.CT
http://creativecommons.org/licenses/by/4.0/
In this work, we provide a way of constructing new semiorthogonal decompositions using metric techniques (\`a la Neeman). Given a semiorthogonal decomposition on a category with a special kind of metric, which we call a compressible metric, we can construct new semiorthogonal decomposition on a category constructed from the given one using the aforementioned metric. In the algebro-geometric setting, this gives us a way of producing new semiorthogonal decompositions on various small triangulated categories associated to a scheme, if we are given one. In the general setting, the work is related to that of Sun-Zhang, while its applications to algebraic geometry are related to the work of Bondarko and Kuznetsov-Shinder.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:24:55 GMT" } ]
2025-04-17T00:00:00
[ [ "Rahul", "Kabeer Manali", "" ] ]
2504.11773
Yiran Wang
Yiran Wang, Jiaqi Li, Chaoyi Hong, Ruibo Li, Liusheng Sun, Xiao Song, Zhe Wang, Zhiguo Cao, Guosheng Lin
TacoDepth: Towards Efficient Radar-Camera Depth Estimation with One-stage Fusion
Accepted by CVPR 2025 (Oral Presentation)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Radar-Camera depth estimation aims to predict dense and accurate metric depth by fusing input images and Radar data. Model efficiency is crucial for this task in pursuit of real-time processing on autonomous vehicles and robotic platforms. However, due to the sparsity of Radar returns, the prevailing methods adopt multi-stage frameworks with intermediate quasi-dense depth, which are time-consuming and not robust. To address these challenges, we propose TacoDepth, an efficient and accurate Radar-Camera depth estimation model with one-stage fusion. Specifically, the graph-based Radar structure extractor and the pyramid-based Radar fusion module are designed to capture and integrate the graph structures of Radar point clouds, delivering superior model efficiency and robustness without relying on the intermediate depth results. Moreover, TacoDepth can be flexible for different inference modes, providing a better balance of speed and accuracy. Extensive experiments are conducted to demonstrate the efficacy of our method. Compared with the previous state-of-the-art approach, TacoDepth improves depth accuracy and processing speed by 12.8% and 91.8%. Our work provides a new perspective on efficient Radar-Camera depth estimation.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:25:04 GMT" } ]
2025-04-17T00:00:00
[ [ "Wang", "Yiran", "" ], [ "Li", "Jiaqi", "" ], [ "Hong", "Chaoyi", "" ], [ "Li", "Ruibo", "" ], [ "Sun", "Liusheng", "" ], [ "Song", "Xiao", "" ], [ "Wang", "Zhe", "" ], [ "Cao", "Zhiguo", "" ], [ "Lin", "Guosheng", "" ] ]
2504.11774
Ziyue Shen
Keke Gai, Ziyue Shen, Jing Yu, Liehuang Zhu, Qi Wu
PCDiff: Proactive Control for Ownership Protection in Diffusion Models with Watermark Compatibility
null
null
null
null
cs.CR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the growing demand for protecting the intellectual property (IP) of text-to-image diffusion models, we propose PCDiff -- a proactive access control framework that redefines model authorization by regulating generation quality. At its core, PCDIFF integrates a trainable fuser module and hierarchical authentication layers into the decoder architecture, ensuring that only users with valid encrypted credentials can generate high-fidelity images. In the absence of valid keys, the system deliberately degrades output quality, effectively preventing unauthorized exploitation.Importantly, while the primary mechanism enforces active access control through architectural intervention, its decoupled design retains compatibility with existing watermarking techniques. This satisfies the need of model owners to actively control model ownership while preserving the traceability capabilities provided by traditional watermarking approaches.Extensive experimental evaluations confirm a strong dependency between credential verification and image quality across various attack scenarios. Moreover, when combined with typical post-processing operations, PCDIFF demonstrates powerful performance alongside conventional watermarking methods. This work shifts the paradigm from passive detection to proactive enforcement of authorization, laying the groundwork for IP management of diffusion models.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:28:50 GMT" } ]
2025-04-17T00:00:00
[ [ "Gai", "Keke", "" ], [ "Shen", "Ziyue", "" ], [ "Yu", "Jing", "" ], [ "Zhu", "Liehuang", "" ], [ "Wu", "Qi", "" ] ]
2504.11775
Tianhe Zhang
Tianhe Zhang, Suhan Liu, Peng Shi
Discrimination-free Insurance Pricing with Privatized Sensitive Attributes
null
null
null
null
stat.ML cs.CY cs.LG q-fin.RM
http://creativecommons.org/licenses/by/4.0/
Fairness has emerged as a critical consideration in the landscape of machine learning algorithms, particularly as AI continues to transform decision-making across societal domains. To ensure that these algorithms are free from bias and do not discriminate against individuals based on sensitive attributes such as gender and race, the field of algorithmic bias has introduced various fairness concepts, along with methodologies to achieve these notions in different contexts. Despite the rapid advancement, not all sectors have embraced these fairness principles to the same extent. One specific sector that merits attention in this regard is insurance. Within the realm of insurance pricing, fairness is defined through a distinct and specialized framework. Consequently, achieving fairness according to established notions does not automatically ensure fair pricing in insurance. In particular, regulators are increasingly emphasizing transparency in pricing algorithms and imposing constraints on insurance companies on the collection and utilization of sensitive consumer attributes. These factors present additional challenges in the implementation of fairness in pricing algorithms. To address these complexities and comply with regulatory demands, we propose an efficient method for constructing fair models that are tailored to the insurance domain, using only privatized sensitive attributes. Notably, our approach ensures statistical guarantees, does not require direct access to sensitive attributes, and adapts to varying transparency requirements, addressing regulatory demands while ensuring fairness in insurance pricing.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:29:11 GMT" } ]
2025-04-17T00:00:00
[ [ "Zhang", "Tianhe", "" ], [ "Liu", "Suhan", "" ], [ "Shi", "Peng", "" ] ]
2504.11776
Shih-Ying Hsu
Shih-Ying Hsu, Sheng-Yuan Liu, Xunchuan Liu, Pak Shing Li, Tie Liu, Dipen Sahu, Kenichi Tatematsu, Shanghuo Li, Naomi Hirano, Chin-Fei Lee, Sheng-Jun Lin
ALMASOP. Detection of Turbulence-induced Mass Assembly Shocks in Starless Cores
12 pages, 4+1 figures, accepted by ApJL
null
null
null
astro-ph.SR astro-ph.GA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Star formation is a series of mass assembly processes and starless cores, those cold and dense condensations in molecular clouds, play a pivotal role as initial seeds of stars. With only a limited sample of known starless cores, however, the origin and growth of such stellar precursors had not been well characterized previously. Meanwhile, the recent discovery of CH$_3$OH emission, which is generally associated with desorbed icy mantle in warm regions, particularly at the periphery of starless cores also remains puzzling. We present sensitive ALMA (Band~3) observations (at 3~mm) toward a sample of newly identified starless cores in the Orion Molecular Cloud. The spatially resolved images distinctly indicate that the observed CH$_3$OH and N$_2$H$^+$ emission associated with these cores are morphologically anti-correlated and kinematically offset from each other. We postulate that the CH$_3$OH emission highlights the desorption of icy mantle by shocks resulting from gas piling onto dense cores in the filaments traced by N$_2$H$^+$. Our magnetohydrodynamic (MHD) simulations of star formation in turbulent clouds combined with radiative transfer calculations and imaging simulations successfully reproduced the observed signatures and reaffirmed the above scenario at work. Our result serves as an intriguing and exemplary illustration, a snapshot in time, of the dynamic star-forming processes in turbulent clouds. The results offer compelling insights into the mechanisms governing the growth of starless cores and the presence of gas-phase complex organic molecules associated with these cores.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:31:03 GMT" } ]
2025-04-17T00:00:00
[ [ "Hsu", "Shih-Ying", "" ], [ "Liu", "Sheng-Yuan", "" ], [ "Liu", "Xunchuan", "" ], [ "Li", "Pak Shing", "" ], [ "Liu", "Tie", "" ], [ "Sahu", "Dipen", "" ], [ "Tatematsu", "Kenichi", "" ], [ "Li", "Shanghuo", "" ], [ "Hirano", "Naomi", "" ], [ "Lee", "Chin-Fei", "" ], [ "Lin", "Sheng-Jun", "" ] ]
2504.11777
Yongpei Ma
Yongpei Ma, Pengyu Wang, Adam Dunn, Usman Naseem, Jinman Kim
Bridging the Semantic Gaps: Improving Medical VQA Consistency with LLM-Augmented Question Sets
The first two listed authors contributed equally to this work
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Medical Visual Question Answering (MVQA) systems can interpret medical images in response to natural language queries. However, linguistic variability in question phrasing often undermines the consistency of these systems. To address this challenge, we propose a Semantically Equivalent Question Augmentation (SEQA) framework, which leverages large language models (LLMs) to generate diverse yet semantically equivalent rephrasings of questions. Specifically, this approach enriches linguistic diversity while preserving semantic meaning. We further introduce an evaluation metric, Total Agreement Rate with Semantically Equivalent Input and Correct Answer (TAR-SC), which assesses a model's capability to generate consistent and correct responses to semantically equivalent linguistic variations. In addition, we also propose three other diversity metrics - average number of QA items per image (ANQI), average number of questions per image with the same answer (ANQA), and average number of open-ended questions per image with the same semantics (ANQS). Using the SEQA framework, we augmented the benchmarked MVQA public datasets of SLAKE, VQA-RAD, and PathVQA. As a result, all three datasets achieved significant improvements by incorporating more semantically equivalent questions: ANQI increased by an average of 86.1, ANQA by 85.1, and ANQS by 46. Subsequent experiments evaluate three MVQA models (M2I2, MUMC, and BiomedGPT) under both zero-shot and fine-tuning settings on the enhanced datasets. Experimental results in MVQA datasets show that fine-tuned models achieve an average accuracy improvement of 19.35%, while our proposed TAR-SC metric shows an average improvement of 11. 61%, indicating a substantial enhancement in model consistency.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:31:18 GMT" } ]
2025-04-17T00:00:00
[ [ "Ma", "Yongpei", "" ], [ "Wang", "Pengyu", "" ], [ "Dunn", "Adam", "" ], [ "Naseem", "Usman", "" ], [ "Kim", "Jinman", "" ] ]
2504.11778
Haiyang Chen
Haiyang Chen, Fo-Hong Wang, Qiang Gao, Xue-Jian Gao, Zhenhua Chen, Yaobo Huang, Kam Tuen Law, Xiao Yan Xu, Peng Chen
Spectroscopic evidence for possible quantum spin liquid behavior in a two-dimensional Mott insulator
null
Phys. Rev. Lett. 134, 066402 (2025)
10.1103/PhysRevLett.134.066402
null
cond-mat.str-el
http://creativecommons.org/licenses/by/4.0/
Mott insulators with localized magnetic moments will exhibit a quantum spin liquid (QSL) state when the quantum fluctuations are strong enough to suppress the ordering of the spins. Such an entangled state will give rise to collective excitations, in which spin and charge information are carried separately. Our angle-resolved photoemission spectroscopy (ARPES) measurements on single-layer 1T-TaS2 show a flat band around the zone center and a gap opening of about 200 meV in the low temperature, indicating 2D Mott insulating nature in the system. This flat band is dispersionless in momentum space but shows anomalously broad width around the zone center and the spectral weight decays rapidly as momentum increases. The observation is described as a spectral continuum from electron fractionalization, corroborated by a low energy effective model.The intensity of the flat band is reduced by surface doping with magnetic adatoms and the gap is closing, a result from the interaction between spin impurities coupled with spinons and the chargons, which gives rise to a charge redistribution. Doping with nonmagnetic impurities behaves differently as the chemical potential shift dominates. These findings provide insight into the QSL states of strongly correlated electrons on 2D triangular lattices.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:31:42 GMT" } ]
2025-04-17T00:00:00
[ [ "Chen", "Haiyang", "" ], [ "Wang", "Fo-Hong", "" ], [ "Gao", "Qiang", "" ], [ "Gao", "Xue-Jian", "" ], [ "Chen", "Zhenhua", "" ], [ "Huang", "Yaobo", "" ], [ "Law", "Kam Tuen", "" ], [ "Xu", "Xiao Yan", "" ], [ "Chen", "Peng", "" ] ]
2504.11779
Qishun Wang
Qishun Wang, Zhengzheng Tu, Chenglong Li, Bo Jiang
Multimodal Spatio-temporal Graph Learning for Alignment-free RGBT Video Object Detection
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
RGB-Thermal Video Object Detection (RGBT VOD) can address the limitation of traditional RGB-based VOD in challenging lighting conditions, making it more practical and effective in many applications. However, similar to most RGBT fusion tasks, it still mainly relies on manually aligned multimodal image pairs. In this paper, we propose a novel Multimodal Spatio-temporal Graph learning Network (MSGNet) for alignment-free RGBT VOD problem by leveraging the robust graph representation learning model. Specifically, we first design an Adaptive Partitioning Layer (APL) to estimate the corresponding regions of the Thermal image within the RGB image (high-resolution), achieving a preliminary inexact alignment. Then, we introduce the Spatial Sparse Graph Learning Module (S-SGLM) which employs a sparse information passing mechanism on the estimated inexact alignment to achieve reliable information interaction between different modalities. Moreover, to fully exploit the temporal cues for RGBT VOD problem, we introduce Hybrid Structured Temporal Modeling (HSTM), which involves a Temporal Sparse Graph Learning Module (T-SGLM) and Temporal Star Block (TSB). T-SGLM aims to filter out some redundant information between adjacent frames by employing the sparse aggregation mechanism on the temporal graph. Meanwhile, TSB is dedicated to achieving the complementary learning of local spatial relationships. Extensive comparative experiments conducted on both the aligned dataset VT-VOD50 and the unaligned dataset UVT-VOD2024 demonstrate the effectiveness and superiority of our proposed method. Our project will be made available on our website for free public access.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:32:59 GMT" } ]
2025-04-17T00:00:00
[ [ "Wang", "Qishun", "" ], [ "Tu", "Zhengzheng", "" ], [ "Li", "Chenglong", "" ], [ "Jiang", "Bo", "" ] ]
2504.11780
Maria Spichkova
Maria Spichkova, Hina Lee, Kevin Iwan, Madeleine Zwart, Yuwon Yoon, Xiaohan Qin
Agile Retrospectives: What went well? What didn't go well? What should we do?
Preprint. Accepted to the 20th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2025). Final version to be published by SCITEPRESS, http://www.scitepress.org
null
null
null
cs.SE cs.AI
http://creativecommons.org/licenses/by-nc-nd/4.0/
In Agile/Scrum software development, the idea of retrospective meetings (retros) is one of the core elements of the project process. In this paper, we present our work in progress focusing on two aspects: analysis of potential usage of generative AI for information interaction within retrospective meetings, and visualisation of retros' information to software development teams. We also present our prototype tool RetroAI++, focusing on retros-related functionalities.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:33:35 GMT" } ]
2025-04-17T00:00:00
[ [ "Spichkova", "Maria", "" ], [ "Lee", "Hina", "" ], [ "Iwan", "Kevin", "" ], [ "Zwart", "Madeleine", "" ], [ "Yoon", "Yuwon", "" ], [ "Qin", "Xiaohan", "" ] ]
2504.11781
Guanchun Wang
Guanchun Wang, Xiangrong Zhang, Yifei Zhang, Zelin Peng, Tianyang Zhang, Xu Tang, and Licheng Jiao
ACMamba: Fast Unsupervised Anomaly Detection via An Asymmetrical Consensus State Space Model
15 pages, 9 figures
null
null
null
cs.CV cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Unsupervised anomaly detection in hyperspectral images (HSI), aiming to detect unknown targets from backgrounds, is challenging for earth surface monitoring. However, current studies are hindered by steep computational costs due to the high-dimensional property of HSI and dense sampling-based training paradigm, constraining their rapid deployment. Our key observation is that, during training, not all samples within the same homogeneous area are indispensable, whereas ingenious sampling can provide a powerful substitute for reducing costs. Motivated by this, we propose an Asymmetrical Consensus State Space Model (ACMamba) to significantly reduce computational costs without compromising accuracy. Specifically, we design an asymmetrical anomaly detection paradigm that utilizes region-level instances as an efficient alternative to dense pixel-level samples. In this paradigm, a low-cost Mamba-based module is introduced to discover global contextual attributes of regions that are essential for HSI reconstruction. Additionally, we develop a consensus learning strategy from the optimization perspective to simultaneously facilitate background reconstruction and anomaly compression, further alleviating the negative impact of anomaly reconstruction. Theoretical analysis and extensive experiments across eight benchmarks verify the superiority of ACMamba, demonstrating a faster speed and stronger performance over the state-of-the-art.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:33:42 GMT" } ]
2025-04-17T00:00:00
[ [ "Wang", "Guanchun", "" ], [ "Zhang", "Xiangrong", "" ], [ "Zhang", "Yifei", "" ], [ "Peng", "Zelin", "" ], [ "Zhang", "Tianyang", "" ], [ "Tang", "Xu", "" ], [ "Jiao", "Licheng", "" ] ]
2504.11782
Si-Sheng Young
Chia-Hsiang Lin and Si-Sheng Young
HyperKING: Quantum-Classical Generative Adversarial Networks for Hyperspectral Image Restoration
19 pages, 15 figures, accepted by IEEE Transactions on Geoscience and Remote Sensing
null
null
null
eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum machine intelligence starts showing its impact on satellite remote sensing (SRS). Also, recent literature exhibits that quantum generative intelligences encompass superior potential than their classical counterpart, motivating us to develop quantum generative adversarial networks (GANs) for SRS. However, existing quantum GANs are restricted by the limited quantum bit (qubit) resources of current quantum computers and process merely a small 2x2 grayscale image, far from being applicable to SRS. Recently, the novel concept of hybrid quantum-classical GAN, a quantum generator with a classical discriminator, has upgraded the order to 28x28 (still grayscale), whereas it is still insufficient for SRS. This motivates us to design a radically new hybrid framework, where both generator and discriminator are hybrid architectures. We demonstrate this feasibility, leading to a breakthrough of processing 128x128 hyperspectral images for SRS. Specifically, we design the quantum part with mathematically provable quantum full expressibility (FE) to address core signal processing tasks, wherein the FE property allows the quantum network to realize any valid quantum operator with appropriate training. The classical part, composed of convolutional layers, treats the read-in (compressing the optical information into limited qubits) and read-out (addressing the quantum collapse effect) procedures. The proposed innovative hybrid quantum GAN, named Hyperspectral Knot-like IntelligeNt dIscrimiNator and Generator (HyperKING), where knot partly symbolizes the quantum entanglement and partly the compressed quantum domain in the central part of the network architecture. HyperKING significantly surpasses the classical approaches in hyperspectral tensor completion, mixed noise removal (about 3dB improvement), and blind source separation results.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:35:06 GMT" } ]
2025-04-17T00:00:00
[ [ "Lin", "Chia-Hsiang", "" ], [ "Young", "Si-Sheng", "" ] ]
2504.11783
Dawei Wang
Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin, Jian Sun, Dan Li
The Digital Cybersecurity Expert: How Far Have We Come?
To appear in the IEEE Symposium on Security and Privacy (IEEE S&P) 2025, San Francisco, CA, USA
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing deployment of large language models (LLMs) in the cybersecurity domain underscores the need for effective model selection and evaluation. However, traditional evaluation methods often overlook specific cybersecurity knowledge gaps that contribute to performance limitations. To address this, we develop CSEBenchmark, a fine-grained cybersecurity evaluation framework based on 345 knowledge points expected of cybersecurity experts. Drawing from cognitive science, these points are categorized into factual, conceptual, and procedural types, enabling the design of 11,050 tailored multiple-choice questions. We evaluate 12 popular LLMs on CSEBenchmark and find that even the best-performing model achieves only 85.42% overall accuracy, with particular knowledge gaps in the use of specialized tools and uncommon commands. Different LLMs have unique knowledge gaps. Even large models from the same family may perform poorly on knowledge points where smaller models excel. By identifying and addressing specific knowledge gaps in each LLM, we achieve up to an 84% improvement in correcting previously incorrect predictions across three existing benchmarks for two cybersecurity tasks. Furthermore, our assessment of each LLM's knowledge alignment with specific cybersecurity roles reveals that different models align better with different roles, such as GPT-4o for the Google Senior Intelligence Analyst and Deepseek-V3 for the Amazon Privacy Engineer. These findings underscore the importance of aligning LLM selection with the specific knowledge requirements of different cybersecurity roles for optimal performance.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:36:28 GMT" } ]
2025-04-17T00:00:00
[ [ "Wang", "Dawei", "" ], [ "Zhou", "Geng", "" ], [ "Li", "Xianglong", "" ], [ "Bai", "Yu", "" ], [ "Chen", "Li", "" ], [ "Qin", "Ting", "" ], [ "Sun", "Jian", "" ], [ "Li", "Dan", "" ] ]
2504.11784
Xiao HaoYun
Junwei Zhou, HaoYun Xiao, Jianwen Xi and Qiuzhen Lin
DALC: Distributed Arithmetic Coding Aided by Linear Codes
7 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed Arithmetic Coding (DAC) has emerged as a feasible solution to the Slepian-Wolf problem, particularly in scenarios with non-stationary sources and for data sequences with lengths ranging from small to medium. Due to the inherent decoding ambiguity in DAC, the number of candidate paths grows exponentially with the increase in source length. To select the correct decoding path from the set of candidates, DAC decoders utilize the Maximum A Posteriori (MAP) metric to rank the decoding sequences, outputting the path with the highest MAP metric as the decoding result of the decoder. However, this method may still inadvertently output incorrect paths that have a MAP metric higher than the correct decoding path, despite not being the correct decoding path. To address the issue, we propose Distributed Arithmetic Coding Aided by Linear Codes (DALC), which employs linear codes to constrain the decoding process, thereby eliminating some incorrect paths and preserving the correct one. During the encoding phase, DALC generates the parity bits of the linear code for encoding the source data. In the decoding phase, each path in the set of candidate paths is verified in descending order according to the MAP metric until a path that meets the verification criteria is encountered, which is then outputted as the decoding result. DALC enhances the decoding performance of DAC by excluding candidate paths that do not meet the constraints imposed by linear codes. Our experimental results demonstrate that DALC reduces the Bit Error Rate(BER), with especially improvements in skewed source data scenarios.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:36:52 GMT" } ]
2025-04-17T00:00:00
[ [ "Zhou", "Junwei", "" ], [ "Xiao", "HaoYun", "" ], [ "Xi", "Jianwen", "" ], [ "Lin", "Qiuzhen", "" ] ]
2504.11785
Qiang Gao
Qiang Gao, Xiaoyan Zhang
Ground state and multiple normalized solutions of quasilinear Schr\"odinger equations in the $L^2$-supercritical case and the Sobolev critical case
null
null
null
null
math.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is devoted to studying the existence of normalized solutions for the following quasilinear Schr\"odinger equation \begin{equation*} \begin{aligned} -\Delta u-u\Delta u^2 +\lambda u=|u|^{p-2}u \quad\mathrm{in}\ \mathbb{R}^{N}, \end{aligned} \end{equation*} where $N=3,4$, $\lambda$ appears as a Lagrange multiplier and $p \in (4+\frac{4}{N},2\cdot2^*]$. The solutions correspond to critical points of the energy functional subject to the $L^2$-norm constraint $\int_{\mathbb{R}^N}|u|^2dx=a^2>0$. In the Sobolev critical case $p=2\cdot 2^*$, the energy functional has no critical point. As for $L^2$-supercritical case $p \in (4+\frac{4}{N},2\cdot2^*)$: on the one hand, taking into account Pohozaev manifold and perturbation method, we obtain the existence of ground state normalized solutions for the non-radial case; on the other hand, we get the existence of infinitely many normalized solutions in $H^1_r(\mathbb{R}^N)$. Moreover, our results cover several relevant existing results. And in the end, we get the asymptotic properties of energy as $a$ tends to $+\infty$ and $a$ tends to $0^+$.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:37:28 GMT" } ]
2025-04-17T00:00:00
[ [ "Gao", "Qiang", "" ], [ "Zhang", "Xiaoyan", "" ] ]
2504.11786
Keunsoo Heo
Sang-Jun Park, Keun-Soo Heo, Dong-Hee Shin, Young-Han Son, Ji-Hye Oh, Tae-Eui Kam
DART: Disease-aware Image-Text Alignment and Self-correcting Re-alignment for Trustworthy Radiology Report Generation
The IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2025
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
The automatic generation of radiology reports has emerged as a promising solution to reduce a time-consuming task and accurately capture critical disease-relevant findings in X-ray images. Previous approaches for radiology report generation have shown impressive performance. However, there remains significant potential to improve accuracy by ensuring that retrieved reports contain disease-relevant findings similar to those in the X-ray images and by refining generated reports. In this study, we propose a Disease-aware image-text Alignment and self-correcting Re-alignment for Trustworthy radiology report generation (DART) framework. In the first stage, we generate initial reports based on image-to-text retrieval with disease-matching, embedding both images and texts in a shared embedding space through contrastive learning. This approach ensures the retrieval of reports with similar disease-relevant findings that closely align with the input X-ray images. In the second stage, we further enhance the initial reports by introducing a self-correction module that re-aligns them with the X-ray images. Our proposed framework achieves state-of-the-art results on two widely used benchmarks, surpassing previous approaches in both report generation and clinical efficacy metrics, thereby enhancing the trustworthiness of radiology reports.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:39:08 GMT" } ]
2025-04-17T00:00:00
[ [ "Park", "Sang-Jun", "" ], [ "Heo", "Keun-Soo", "" ], [ "Shin", "Dong-Hee", "" ], [ "Son", "Young-Han", "" ], [ "Oh", "Ji-Hye", "" ], [ "Kam", "Tae-Eui", "" ] ]
2504.11787
Souradeep Bhattacharya
Souradeep Bhattacharya and Kanak Saha
The AstroSat UV Deep Field South. III. Evolution of the UV Luminosity Function and Luminosity Density from z~0.8-0.4
7 pages, 5 figures, 1 table, Accepted for publication in MNRAS Letters. arXiv admin note: text overlap with arXiv:2310.01903
null
null
null
astro-ph.GA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We characterise the rest-frame 1500 \r{A} UV luminosity Function (UVLF) from deep AstroSat/UVIT F154W and N242W imaging in the Great Observatories Origins Survey South (GOODS-S) deep field. The UVLFs are constructed and subsequently characterised with fitted Schechter function parameters from FUV observations at z$<0.13$ and NUV observations in seven redshift bins in z~0.8-0.4. The UVLF slope ($\alpha$) and characteristic magnitude ($M^*$) are consistent with previous determinations for this redshift range based on AstroSat/UVIT GOODS-North observations, as well as with those from Galaxy evolution Explorer and Hubble Space Telescope observations. However, differences in the normalisation factor ($\phi_{*}$) are present for UVLFs for some redshift bins. We compute the UV luminosity density, $\rho_{\rm UV}$, combining our determined UVLF parameters with literature determinations out to z$\sim10$. The $\rho_{\rm UV}$ trend with redshift implies the rapid increase in cosmic star formation till its peak at z$\sim3$ (cosmic noon) followed by a slow decline till present day. Both the initial increase in cosmic star formation and subsequent decline are found to be more rapid than previous determinations.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:40:32 GMT" } ]
2025-04-17T00:00:00
[ [ "Bhattacharya", "Souradeep", "" ], [ "Saha", "Kanak", "" ] ]
2504.11788
Zhisong Zhang
Zhisong Zhang, Tianqing Fang, Kaixin Ma, Wenhao Yu, Hongming Zhang, Haitao Mi, Dong Yu
Enhancing Web Agents with Explicit Rollback Mechanisms
null
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
With recent advancements in large language models, web agents have been greatly improved. However, dealing with complex and dynamic web environments requires more advanced planning and search abilities. Previous studies usually adopt a greedy one-way search strategy, which may struggle to recover from erroneous states. In this work, we enhance web agents with an explicit rollback mechanism, enabling the agent to revert back to a previous state in its navigation trajectory. This mechanism gives the model the flexibility to directly control the search process, leading to an effective and efficient web navigation method. We conduct experiments on two live web navigation benchmarks with zero-shot and fine-tuning settings. The results demonstrate the effectiveness of our proposed approach.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:41:20 GMT" } ]
2025-04-17T00:00:00
[ [ "Zhang", "Zhisong", "" ], [ "Fang", "Tianqing", "" ], [ "Ma", "Kaixin", "" ], [ "Yu", "Wenhao", "" ], [ "Zhang", "Hongming", "" ], [ "Mi", "Haitao", "" ], [ "Yu", "Dong", "" ] ]
2504.11789
Andrea Davini Mr.
Andrea Davini and Hitoshi Ishii
The vanishing discount problem for nonlocal Hamilton-Jacobi equations
45 pages
null
null
Roma01.Math
math.AP math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish a convergence result for the vanishing discount problem in the context of nonlocal HJ equations. We consider a fairly general class of discounted first-order and convex HJ equations which incorporate an integro-differential operator posed on the $d$-dimensional torus, and we show that the solutions converge to a specific critical solution as the discount factor tends to zero. Our approach relies on duality techniques for nonlocal convex HJ equations, building upon Hahn-Banach separation theorems to develop a generalized notion of Mather measure. The results are applied to a specific class of convex and superlinear Hamiltonians.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:42:24 GMT" } ]
2025-04-17T00:00:00
[ [ "Davini", "Andrea", "" ], [ "Ishii", "Hitoshi", "" ] ]
2504.11790
Philipp del Hougne
Philipp del Hougne
Virtual VNA 3.1: Non-Coherent-Detection-Based Non-Reciprocal Scattering Matrix Estimation Leveraging a Tunable Load Network
9 pages including 6 figures
null
null
null
physics.app-ph eess.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We refine the recently introduced "Virtual VNA 3.0" technique to remove the need for coherent detection. The resulting "Virtual VNA 3.1" technique can unambiguously estimate the full scattering matrix of a non-reciprocal, linear, passive, time-invariant device under test (DUT) with $N$ monomodal ports using an $N_\mathrm{A}$-channel coherent wavefront generator and an $N_\mathrm{A}$-channel non-coherent detector, where $N_\mathrm{A}<N$. Waves are injected and received only via a fixed set of $N_\mathrm{A}$ "accessible" DUT ports while the remaining $N_\mathrm{S}$ "not-directly-accessible" DUT ports are terminated by a specific tunable load network. To resolve all ambiguities, an additional modified setup is required in which waves are injected and received via a known $2N_\mathrm{A}$-port system connected to the DUT's accessible ports. We experimentally validate our method for $N_\mathrm{A}=N_\mathrm{S}=4$ considering a non-reciprocal eight-port circuit as DUT. By eliminating the need for coherent detection, our work reduces the hardware complexity which may facilitate applications to large-scale or higher-frequency systems. Additionally, our work provides fundamental insights into the minimal requirements to fully and unambiguously characterize a non-reciprocal DUT.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:42:51 GMT" } ]
2025-04-17T00:00:00
[ [ "del Hougne", "Philipp", "" ] ]
2504.11791
Adil Jueid
A. Hammad, Adil Jueid
Progress in ${\cal CP}$ violating top-Higgs coupling at the LHC with Machine Learning
19 pages, 4 figures. Invited Review
null
null
CTPU-PTC-25-08
hep-ph
http://creativecommons.org/licenses/by/4.0/
A precise measurement of the top-Higgs coupling is essential in particle physics, as it offers a powerful probe of potential new physics beyond the Standard Model (BSM), particularly scenarios involving ${\cal CP}$ violation, which is a key condition in addressing the problem of baryon asymmetry of the universe. In this article, we review the recent progress in the studies of the the top-Higgs coupling at the Large Hadron Collider (LHC). We briefly highlight the recent Machine Learning (ML) algorithms being used and their role in constraining the ${\cal CP}$ phase of the top-Higgs coupling with an emphasis on the future potential of beyond-the-traditional methods such as transformers and heterogeneous graphs in these studies.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:46:16 GMT" } ]
2025-04-17T00:00:00
[ [ "Hammad", "A.", "" ], [ "Jueid", "Adil", "" ] ]
2504.11792
Md Sultan Al Nahian
Md Sultan Al Nahian, Chris Delcher, Daniel Harris, Peter Akpunonu and Ramakanth Kavuluru
Large Language Models for Drug Overdose Prediction from Longitudinal Medical Records
null
null
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability to predict drug overdose risk from a patient's medical records is crucial for timely intervention and prevention. Traditional machine learning models have shown promise in analyzing longitudinal medical records for this task. However, recent advancements in large language models (LLMs) offer an opportunity to enhance prediction performance by leveraging their ability to process long textual data and their inherent prior knowledge across diverse tasks. In this study, we assess the effectiveness of Open AI's GPT-4o LLM in predicting drug overdose events using patients' longitudinal insurance claims records. We evaluate its performance in both fine-tuned and zero-shot settings, comparing them to strong traditional machine learning methods as baselines. Our results show that LLMs not only outperform traditional models in certain settings but can also predict overdose risk in a zero-shot setting without task-specific training. These findings highlight the potential of LLMs in clinical decision support, particularly for drug overdose risk prediction.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 05:52:22 GMT" } ]
2025-04-17T00:00:00
[ [ "Nahian", "Md Sultan Al", "" ], [ "Delcher", "Chris", "" ], [ "Harris", "Daniel", "" ], [ "Akpunonu", "Peter", "" ], [ "Kavuluru", "Ramakanth", "" ] ]
2504.11794
R. Henry Liu
R. Henry Liu, Boryana Hadzhiyska, Simone Ferraro, Sownak Bose, C\'esar Hern\'andez-Aguayo
Fast Baryonic Field Painting for Sunyaev-Zel'dovich Analyses: Transfer Function vs. Hybrid Effective Field Theory
13 pages, 8 figures, comments welcome
null
null
null
astro-ph.CO
http://creativecommons.org/licenses/by/4.0/
We present two approaches for "painting" baryonic properties relevant to the Sunyaev-Zel'dovich (SZ) effect - optical depth and Compton-$y$ - onto 3-dimensional $N$-body simulations, using the MillenniumTNG suite as a benchmark. The goal of these methods is to produce fast and accurate reconstruction methods to aid future analyses of baryonic feedback using the SZ effect. The first approach employs a Gaussian Process emulator to model the SZ quantities via a transfer function, while the second utilizes Hybrid Effective Field Theory (HEFT) to reproduce these quantities within the simulation. Our analysis involves comparing both methods to the true MillenniumTNG optical depth and Compton-$y$ fields using several metrics, including the cross-correlation coefficient, power spectrum, and power spectrum error. Additionally, we assess how well the reconstructed fields correlate with dark matter haloes across various mass thresholds. The results indicate that the transfer function method yields more accurate reconstructions for fields with initially high correlations ($r \approx 1$), such as between the optical depth and dark matter fields. Conversely, the HEFT-based approach proves more effective in enhancing correlations for fields with weaker initial correlations ($r \sim 0.5$), such as between the Compton-$y$ and dark matter fields. Lastly, we discuss extensions of our methods to improve the reconstruction performance at the field level.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:00:21 GMT" } ]
2025-04-17T00:00:00
[ [ "Liu", "R. Henry", "" ], [ "Hadzhiyska", "Boryana", "" ], [ "Ferraro", "Simone", "" ], [ "Bose", "Sownak", "" ], [ "Hernández-Aguayo", "César", "" ] ]
2504.11795
Sitong Wang
Sitong Wang, Samia Menon, Dingzeyu Li, Xiaojuan Ma, Richard Zemel, Lydia B. Chilton
Schemex: Interactive Structural Abstraction from Examples with Contrastive Refinement
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Each type of creative or communicative work is underpinned by an implicit structure. People learn these structures from examples - a process known in cognitive science as schema induction. However, inducing schemas is challenging, as structural patterns are often obscured by surface-level variation. We present Schemex, an interactive visual workflow that scaffolds schema induction through clustering, abstraction, and contrastive refinement. Schemex supports users through visual representations and interactive exploration that connect abstract structures to concrete examples, promoting transparency, adaptability, and effective human-AI collaboration. In our user study, participants reported significantly greater insight and confidence in the schemas developed with Schemex compared to those created using a baseline of an AI reasoning model. We conclude by discussing the broader implications of structural abstraction and contrastive refinement across domains.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:02:31 GMT" } ]
2025-04-17T00:00:00
[ [ "Wang", "Sitong", "" ], [ "Menon", "Samia", "" ], [ "Li", "Dingzeyu", "" ], [ "Ma", "Xiaojuan", "" ], [ "Zemel", "Richard", "" ], [ "Chilton", "Lydia B.", "" ] ]
2504.11796
Yasuhiro Fukuma
Kazuki Shintaku, Arun Jacob Mathew, Akihisa Iwamoto, Mojtaba Mohammadi, Hiroyuki Awano, Hironori Asada, Yasuhiro Fukuma
Efficient spin-orbit torque driven magnetization switching of GdFe using phosphorus-implanted platinum layers
null
null
null
null
cond-mat.mtrl-sci
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capability of the spin-orbit torque (SOT) generated via phenomena such as the spin Hall effect in heavy metals, in switching the magnetization of an adjacent magnetic material, has been studied extensively over the last decade. The efficiency of SOT generation is commonly quantified in terms of the spin Hall angle {\theta}_SH. In this work, we demonstrate experimentally that implanting platinum (Pt) with phosphorus (P), resulting in Pt (P) d, where d denotes the implantation dose, increases {\theta}_SH by a factor of 7, from 0.06 (d = 0) to 0.43 (d = 10*10^16 ions/cm^2). The enhanced {\theta}_SH, along with factors such as perpendicular magnetic anisotropy and resistivity, lead to reduction of the critical current density for switching the perpendicular magnetization of ferrimagnetic rare earth-transition metal alloy Gd26Fe74, by a factor of nearly 27, from 4.0*1011 A/m^2 (d = 0) to 1.5*10^10 A/m^2 (d = 10*10^16 ions/cm^2). Further, the switching current density at zero thermal fluctuations and thermal stability factor were evaluated and found to be 2.0*10^10 A/m^2 and 61.4 (d = 10*10^16 ions/cm^2), with the latter being sufficiently above the required threshold for commercial memory applications. Our results suggest that Pt (P) could be a strong candidate in realizing efficient SOT driven magnetization switching leading to the development of improved memory and logic devices in the future.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:03:53 GMT" } ]
2025-04-17T00:00:00
[ [ "Shintaku", "Kazuki", "" ], [ "Mathew", "Arun Jacob", "" ], [ "Iwamoto", "Akihisa", "" ], [ "Mohammadi", "Mojtaba", "" ], [ "Awano", "Hiroyuki", "" ], [ "Asada", "Hironori", "" ], [ "Fukuma", "Yasuhiro", "" ] ]
2504.11797
Yongxin Xiong
Yongxin Xiong, Heng Wu, Yifei Li, Xiongfei Wang
Analysis of Power Swing Characteristics of Grid-Forming VSC System Considering the Current Limitation Mode
null
null
null
null
eess.SY cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates power swing characteristics of grid-forming voltage source converter (GFM-VSC) systems considering the current limitation mode in both non-inertial and inertial GFM-VSC systems. Following grid faults, non-inertial GFM-VSC systems can re-synchronize with the grid but may experience significant power swings driven by its control dynamics, while inertial GFM-VSC systems may exhibit loss of synchronization (LOS), characterized by the divergence of the output angle in the active power control loop. These behaviours are different from conventional synchronous generator (SG)-based systems, where power swings are typically characterized by physical angle deviations among power sources. Based on these findings, this paper explores the performance of traditional impedance-based swing detection schemes in GFM-VSC systems. The theoretical analysis is validated through various simulations using the PSCAD/EMTDC platform, covering both single and multi-machine system scenarios.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:07:43 GMT" } ]
2025-04-17T00:00:00
[ [ "Xiong", "Yongxin", "" ], [ "Wu", "Heng", "" ], [ "Li", "Yifei", "" ], [ "Wang", "Xiongfei", "" ] ]
2504.11798
Tianyi Zhang
Chao Yuan, Tianyi Zhang, Guanglin Niu
Neighbor-Based Feature and Index Enhancement for Person Re-Identification
Comment: This paper has been accepted for publication in the 2025 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Person re-identification (Re-ID) aims to match the same pedestrian in a large gallery with different cameras and views. Enhancing the robustness of the extracted feature representations is a main challenge in Re-ID. Existing methods usually improve feature representation by improving model architecture, but most methods ignore the potential contextual information, which limits the effectiveness of feature representation and retrieval performance. Neighborhood information, especially the potential information of multi-order neighborhoods, can effectively enrich feature expression and improve retrieval accuracy, but this has not been fully explored in existing research. Therefore, we propose a novel model DMON-ARO that leverages latent neighborhood information to enhance both feature representation and index performance. Our approach is built on two complementary modules: Dynamic Multi-Order Neighbor Modeling (DMON) and Asymmetric Relationship Optimization (ARO). The DMON module dynamically aggregates multi-order neighbor relationships, allowing it to capture richer contextual information and enhance feature representation through adaptive neighborhood modeling. Meanwhile, ARO refines the distance matrix by optimizing query-to-gallery relationships, improving the index accuracy. Extensive experiments on three benchmark datasets demonstrate that our approach achieves performance improvements against baseline models, which illustrate the effectiveness of our model. Specifically, our model demonstrates improvements in Rank-1 accuracy and mAP. Moreover, this method can also be directly extended to other re-identification tasks.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:13:20 GMT" } ]
2025-04-17T00:00:00
[ [ "Yuan", "Chao", "" ], [ "Zhang", "Tianyi", "" ], [ "Niu", "Guanglin", "" ] ]
2504.11799
Nicholas Funai
Nicholas Funai
Gaussian states in quantum field theory: Exact representations of relative phase in superpositions of Gaussian states
14 pages (11 + 3 pages of Appendices). 2 figures. RevTeX 4.2
null
null
null
quant-ph gr-qc hep-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gaussian quantum mechanics is a powerful tool regularly used in quantum optics to model linear and quadratic Hamiltonians efficiently. Recent interest in qubit-CV hybrid models has revealed a simple, yet important gap in our knowledge, namely, how to fully manipulate superpositions of Gaussian states. In this paper, we show how to faithfully represent a quadratic Gaussian state in the Fock basis. Specifically, we evaluate the phase necessary to equate the unitary representation of a zero-mean Gaussian state with its Fock representation. This allows for the coherent manipulation of superpositions of Gaussian states, especially the evaluation of expectation values from these superposed states. We then use this method to model a simple quantum field theory communication protocol using quadratic detectors in a regime that has previously been impossible to solve. The result presented in this paper is expected to become increasingly relevant with hybrid-CV systems, especially in the strong-coupling regime.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:13:36 GMT" } ]
2025-04-17T00:00:00
[ [ "Funai", "Nicholas", "" ] ]
2504.11800
Shubo Li
Shubo Li, Ran Li, Kaihao Wang, Zixiang Jia, Xiaoyue Cao, Carlos S. Frenk, Fangzhou Jiang, Aristeidis Amvrosiadis, Shaun Cole, Qiuhan He, Samuel C. Lange, Richard Massey, James W. Nightingale, Andrew Robertson, Maximilian von Wietersheim-Kramsta, and Xianghao Ma
The "Little Dark Dot": Evidence for Self-Interacting Dark Matter in the Strong Lens SDSSJ0946+1006?
15 pages, 10 figures
null
null
null
astro-ph.GA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous studies, based on precise modeling of a gravitationally lensing image, have identified what may be a extremely compact, dark perturber in the well-known lensing system SDSSJ0946+1006 (the "Jackpot"). Its remarkable compactness challenges the standard cold dark matter (CDM) paradigm. In this paper, we explore whether such a compact perturber could be explained as a core-collapsed halo described by the self-interacting dark matter (SIDM) model. Using the isothermal Jeans method, we compute the density profiles of core-collapsed halos across a range of masses. Our comparison with observations indicates that only a core-collapsed halo with a total mass of approximately $10^{11}~{\rm M_{\odot}}$ could produce an inner density profile and mass enclosed within 1 kpc that is consistent with observational data. However, such a massive dark matter halo should host a galaxy detectable by prior Hubble imaging, which is not observed. Thus, the core-collapsed SIDM halo model struggles to fully account for the exotic nature of the "little dark dot" in the "Jackpot" lens.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:16:51 GMT" } ]
2025-04-17T00:00:00
[ [ "Li", "Shubo", "" ], [ "Li", "Ran", "" ], [ "Wang", "Kaihao", "" ], [ "Jia", "Zixiang", "" ], [ "Cao", "Xiaoyue", "" ], [ "Frenk", "Carlos S.", "" ], [ "Jiang", "Fangzhou", "" ], [ "Amvrosiadis", "Aristeidis", "" ], [ "Cole", "Shaun", "" ], [ "He", "Qiuhan", "" ], [ "Lange", "Samuel C.", "" ], [ "Massey", "Richard", "" ], [ "Nightingale", "James W.", "" ], [ "Robertson", "Andrew", "" ], [ "von Wietersheim-Kramsta", "Maximilian", "" ], [ "Ma", "Xianghao", "" ] ]
2504.11801
Jaesung Song
Jaesung Song, Young-Ik Sohn
Ultra-fast and accurate multimode waveguide design based on dataset-based eigenmode expansion method
null
null
null
null
physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a dataset-based photonic simulation framework for multimode waveguide design, enabling ultra-fast simulations with high accuracy. Compared to conventional approaches, our method offers two to three orders of magnitude speed-up in complex multimode waveguide designs. Based on this approach, we demonstrate a silicon multimode waveguide bend with an effective radius of $30\,\mu\mathrm{m}$ under one second, with accuracy validated against commercial 3D finite-difference time-domain method. We further explore its utility for device optimization by designing a $20\,\mu \mathrm{m}$-radius, arbitrary power splitting ratio bends through thousands of optimization iterations, completed in just 68 minutes on a standard desktop CPU. This framework enables the rapid design and engineering of large-scale multimode photonic devices, making computationally intensive simulations more accessible to many photonic circuit designers.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:17:19 GMT" } ]
2025-04-17T00:00:00
[ [ "Song", "Jaesung", "" ], [ "Sohn", "Young-Ik", "" ] ]
2504.11802
Pavel Chapovsky
Pavel L. Chapovsky
On the photon energy conservation in stimulated emission. Experiment
8 pages, 3 figures
null
null
null
physics.atom-ph quant-ph
http://creativecommons.org/licenses/by-nc-nd/4.0/
Quantum electrodynamics predicts identity of incident and emitted photons in stimulated emission. This fundamental law is important to test experimentally. In this work stimulated emission in GaAs semiconductor amplifier was investigated and positive frequency shift of the amplified beam was detected. In relative units this frequency shift was found equal $\Delta\nu/\nu = (+1.7 \pm 0.2)\cdot10^{-18}$. This indicates violation of the photon energy conservation in stimulated emission.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:17:28 GMT" } ]
2025-04-17T00:00:00
[ [ "Chapovsky", "Pavel L.", "" ] ]
2504.11803
Ilia Derkach
Ilia Derkach
R\'esum\'e abstractif \`a partir d'une transcription audio
35 pages, in French language, 8 tables, 6 figures
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Currently, large language models are gaining popularity, their achievements are used in many areas, ranging from text translation to generating answers to queries. However, the main problem with these new machine learning algorithms is that training such models requires large computing resources that only large IT companies have. To avoid this problem, a number of methods (LoRA, quantization) have been proposed so that existing models can be effectively fine-tuned for specific tasks. In this paper, we propose an E2E (end to end) audio summarization model using these techniques. In addition, this paper examines the effectiveness of these approaches to the problem under consideration and draws conclusions about the applicability of these methods.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:24:49 GMT" } ]
2025-04-17T00:00:00
[ [ "Derkach", "Ilia", "" ] ]
2504.11804
Yevgen Kotukh V
Gennady Khalimov, Yevgen Kotukh
Advanced MST3 Encryption scheme based on generalized Suzuki 2-groups
null
null
null
null
cs.CR math.GR
http://creativecommons.org/licenses/by/4.0/
This article presents a method for enhancing the encryption algorithm in the MST3 cryptosystem for generalized Suzuki 2-groups. The conventional MST cryptosystem based on Suzuki groups utilizes logarithmic signatures (LS) restricted to the center of the group, resulting in an expansive array of logarithmic signatures. We propose an encryption scheme based on multi-parameter non-commutative groups, specifically selecting multi-parameter generalized Suzuki 2-groups as the group construction framework. In our approach, the logarithmic signature extends across the entire group, with cipher security dependent on the group order. This design enables the development of encryption optimized for implementation efficiency determined by logarithmic signature size while maintaining robust security through appropriate key sizes and the finite field of group representation. The primary innovation in our encryption implementation lies in the sequential de-encapsulation of keys from ciphertext using logarithmic signatures and associated keys. The security evaluation of the cipher relies on attack complexity analysis, which is quantified through comprehensive key enumeration methodologies.
[ { "version": "v1", "created": "Wed, 16 Apr 2025 06:32:45 GMT" } ]
2025-04-17T00:00:00
[ [ "Khalimov", "Gennady", "" ], [ "Kotukh", "Yevgen", "" ] ]