diff --git a/.nojekyll b/.nojekyll new file mode 100644 index 00000000..e69de29b diff --git a/404.html b/404.html new file mode 100644 index 00000000..7547b188 --- /dev/null +++ b/404.html @@ -0,0 +1,333 @@ + + + + + + + + + + + + + + + + + + arxiv-paper-daily + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ +
+
+ +
+ + + + + + +
+ + +
+ +
+ + + + + + +
+
+ + + +
+
+
+ + + + +
+
+
+ + + +
+
+
+ + + +
+
+
+ + + +
+
+ +

404 - Not found

+ +
+
+ + +
+ +
+ + + +
+
+
+
+ + + + + + + + + \ No newline at end of file diff --git a/assets/images/favicon.png b/assets/images/favicon.png new file mode 100644 index 00000000..1cf13b9f Binary files /dev/null and b/assets/images/favicon.png differ diff --git a/assets/javascripts/bundle.220ee61c.min.js b/assets/javascripts/bundle.220ee61c.min.js new file mode 100644 index 00000000..116072a1 --- /dev/null +++ b/assets/javascripts/bundle.220ee61c.min.js @@ -0,0 +1,29 @@ +"use strict";(()=>{var Ci=Object.create;var gr=Object.defineProperty;var Ri=Object.getOwnPropertyDescriptor;var ki=Object.getOwnPropertyNames,Ht=Object.getOwnPropertySymbols,Hi=Object.getPrototypeOf,yr=Object.prototype.hasOwnProperty,nn=Object.prototype.propertyIsEnumerable;var rn=(e,t,r)=>t in e?gr(e,t,{enumerable:!0,configurable:!0,writable:!0,value:r}):e[t]=r,P=(e,t)=>{for(var r in t||(t={}))yr.call(t,r)&&rn(e,r,t[r]);if(Ht)for(var r of Ht(t))nn.call(t,r)&&rn(e,r,t[r]);return e};var on=(e,t)=>{var r={};for(var n in e)yr.call(e,n)&&t.indexOf(n)<0&&(r[n]=e[n]);if(e!=null&&Ht)for(var n of Ht(e))t.indexOf(n)<0&&nn.call(e,n)&&(r[n]=e[n]);return r};var Pt=(e,t)=>()=>(t||e((t={exports:{}}).exports,t),t.exports);var Pi=(e,t,r,n)=>{if(t&&typeof t=="object"||typeof t=="function")for(let o of ki(t))!yr.call(e,o)&&o!==r&&gr(e,o,{get:()=>t[o],enumerable:!(n=Ri(t,o))||n.enumerable});return e};var yt=(e,t,r)=>(r=e!=null?Ci(Hi(e)):{},Pi(t||!e||!e.__esModule?gr(r,"default",{value:e,enumerable:!0}):r,e));var sn=Pt((xr,an)=>{(function(e,t){typeof xr=="object"&&typeof an!="undefined"?t():typeof define=="function"&&define.amd?define(t):t()})(xr,function(){"use strict";function e(r){var n=!0,o=!1,i=null,s={text:!0,search:!0,url:!0,tel:!0,email:!0,password:!0,number:!0,date:!0,month:!0,week:!0,time:!0,datetime:!0,"datetime-local":!0};function a(O){return!!(O&&O!==document&&O.nodeName!=="HTML"&&O.nodeName!=="BODY"&&"classList"in O&&"contains"in O.classList)}function f(O){var Qe=O.type,De=O.tagName;return!!(De==="INPUT"&&s[Qe]&&!O.readOnly||De==="TEXTAREA"&&!O.readOnly||O.isContentEditable)}function c(O){O.classList.contains("focus-visible")||(O.classList.add("focus-visible"),O.setAttribute("data-focus-visible-added",""))}function u(O){O.hasAttribute("data-focus-visible-added")&&(O.classList.remove("focus-visible"),O.removeAttribute("data-focus-visible-added"))}function p(O){O.metaKey||O.altKey||O.ctrlKey||(a(r.activeElement)&&c(r.activeElement),n=!0)}function m(O){n=!1}function d(O){a(O.target)&&(n||f(O.target))&&c(O.target)}function h(O){a(O.target)&&(O.target.classList.contains("focus-visible")||O.target.hasAttribute("data-focus-visible-added"))&&(o=!0,window.clearTimeout(i),i=window.setTimeout(function(){o=!1},100),u(O.target))}function v(O){document.visibilityState==="hidden"&&(o&&(n=!0),Y())}function Y(){document.addEventListener("mousemove",N),document.addEventListener("mousedown",N),document.addEventListener("mouseup",N),document.addEventListener("pointermove",N),document.addEventListener("pointerdown",N),document.addEventListener("pointerup",N),document.addEventListener("touchmove",N),document.addEventListener("touchstart",N),document.addEventListener("touchend",N)}function B(){document.removeEventListener("mousemove",N),document.removeEventListener("mousedown",N),document.removeEventListener("mouseup",N),document.removeEventListener("pointermove",N),document.removeEventListener("pointerdown",N),document.removeEventListener("pointerup",N),document.removeEventListener("touchmove",N),document.removeEventListener("touchstart",N),document.removeEventListener("touchend",N)}function N(O){O.target.nodeName&&O.target.nodeName.toLowerCase()==="html"||(n=!1,B())}document.addEventListener("keydown",p,!0),document.addEventListener("mousedown",m,!0),document.addEventListener("pointerdown",m,!0),document.addEventListener("touchstart",m,!0),document.addEventListener("visibilitychange",v,!0),Y(),r.addEventListener("focus",d,!0),r.addEventListener("blur",h,!0),r.nodeType===Node.DOCUMENT_FRAGMENT_NODE&&r.host?r.host.setAttribute("data-js-focus-visible",""):r.nodeType===Node.DOCUMENT_NODE&&(document.documentElement.classList.add("js-focus-visible"),document.documentElement.setAttribute("data-js-focus-visible",""))}if(typeof window!="undefined"&&typeof document!="undefined"){window.applyFocusVisiblePolyfill=e;var t;try{t=new CustomEvent("focus-visible-polyfill-ready")}catch(r){t=document.createEvent("CustomEvent"),t.initCustomEvent("focus-visible-polyfill-ready",!1,!1,{})}window.dispatchEvent(t)}typeof document!="undefined"&&e(document)})});var cn=Pt(Er=>{(function(e){var t=function(){try{return!!Symbol.iterator}catch(c){return!1}},r=t(),n=function(c){var u={next:function(){var p=c.shift();return{done:p===void 0,value:p}}};return r&&(u[Symbol.iterator]=function(){return u}),u},o=function(c){return encodeURIComponent(c).replace(/%20/g,"+")},i=function(c){return decodeURIComponent(String(c).replace(/\+/g," "))},s=function(){var c=function(p){Object.defineProperty(this,"_entries",{writable:!0,value:{}});var m=typeof p;if(m!=="undefined")if(m==="string")p!==""&&this._fromString(p);else if(p instanceof c){var d=this;p.forEach(function(B,N){d.append(N,B)})}else if(p!==null&&m==="object")if(Object.prototype.toString.call(p)==="[object Array]")for(var h=0;hd[0]?1:0}),c._entries&&(c._entries={});for(var p=0;p1?i(d[1]):"")}})})(typeof global!="undefined"?global:typeof window!="undefined"?window:typeof self!="undefined"?self:Er);(function(e){var t=function(){try{var o=new e.URL("b","http://a");return o.pathname="c d",o.href==="http://a/c%20d"&&o.searchParams}catch(i){return!1}},r=function(){var o=e.URL,i=function(f,c){typeof f!="string"&&(f=String(f)),c&&typeof c!="string"&&(c=String(c));var u=document,p;if(c&&(e.location===void 0||c!==e.location.href)){c=c.toLowerCase(),u=document.implementation.createHTMLDocument(""),p=u.createElement("base"),p.href=c,u.head.appendChild(p);try{if(p.href.indexOf(c)!==0)throw new Error(p.href)}catch(O){throw new Error("URL unable to set base "+c+" due to "+O)}}var m=u.createElement("a");m.href=f,p&&(u.body.appendChild(m),m.href=m.href);var d=u.createElement("input");if(d.type="url",d.value=f,m.protocol===":"||!/:/.test(m.href)||!d.checkValidity()&&!c)throw new TypeError("Invalid URL");Object.defineProperty(this,"_anchorElement",{value:m});var h=new e.URLSearchParams(this.search),v=!0,Y=!0,B=this;["append","delete","set"].forEach(function(O){var Qe=h[O];h[O]=function(){Qe.apply(h,arguments),v&&(Y=!1,B.search=h.toString(),Y=!0)}}),Object.defineProperty(this,"searchParams",{value:h,enumerable:!0});var N=void 0;Object.defineProperty(this,"_updateSearchParams",{enumerable:!1,configurable:!1,writable:!1,value:function(){this.search!==N&&(N=this.search,Y&&(v=!1,this.searchParams._fromString(this.search),v=!0))}})},s=i.prototype,a=function(f){Object.defineProperty(s,f,{get:function(){return this._anchorElement[f]},set:function(c){this._anchorElement[f]=c},enumerable:!0})};["hash","host","hostname","port","protocol"].forEach(function(f){a(f)}),Object.defineProperty(s,"search",{get:function(){return this._anchorElement.search},set:function(f){this._anchorElement.search=f,this._updateSearchParams()},enumerable:!0}),Object.defineProperties(s,{toString:{get:function(){var f=this;return function(){return f.href}}},href:{get:function(){return this._anchorElement.href.replace(/\?$/,"")},set:function(f){this._anchorElement.href=f,this._updateSearchParams()},enumerable:!0},pathname:{get:function(){return this._anchorElement.pathname.replace(/(^\/?)/,"/")},set:function(f){this._anchorElement.pathname=f},enumerable:!0},origin:{get:function(){var f={"http:":80,"https:":443,"ftp:":21}[this._anchorElement.protocol],c=this._anchorElement.port!=f&&this._anchorElement.port!=="";return this._anchorElement.protocol+"//"+this._anchorElement.hostname+(c?":"+this._anchorElement.port:"")},enumerable:!0},password:{get:function(){return""},set:function(f){},enumerable:!0},username:{get:function(){return""},set:function(f){},enumerable:!0}}),i.createObjectURL=function(f){return o.createObjectURL.apply(o,arguments)},i.revokeObjectURL=function(f){return o.revokeObjectURL.apply(o,arguments)},e.URL=i};if(t()||r(),e.location!==void 0&&!("origin"in e.location)){var n=function(){return e.location.protocol+"//"+e.location.hostname+(e.location.port?":"+e.location.port:"")};try{Object.defineProperty(e.location,"origin",{get:n,enumerable:!0})}catch(o){setInterval(function(){e.location.origin=n()},100)}}})(typeof global!="undefined"?global:typeof window!="undefined"?window:typeof self!="undefined"?self:Er)});var qr=Pt((Mt,Nr)=>{/*! + * clipboard.js v2.0.11 + * https://clipboardjs.com/ + * + * Licensed MIT © Zeno Rocha + */(function(t,r){typeof Mt=="object"&&typeof Nr=="object"?Nr.exports=r():typeof define=="function"&&define.amd?define([],r):typeof Mt=="object"?Mt.ClipboardJS=r():t.ClipboardJS=r()})(Mt,function(){return function(){var e={686:function(n,o,i){"use strict";i.d(o,{default:function(){return Ai}});var s=i(279),a=i.n(s),f=i(370),c=i.n(f),u=i(817),p=i.n(u);function m(j){try{return document.execCommand(j)}catch(T){return!1}}var d=function(T){var E=p()(T);return m("cut"),E},h=d;function v(j){var T=document.documentElement.getAttribute("dir")==="rtl",E=document.createElement("textarea");E.style.fontSize="12pt",E.style.border="0",E.style.padding="0",E.style.margin="0",E.style.position="absolute",E.style[T?"right":"left"]="-9999px";var H=window.pageYOffset||document.documentElement.scrollTop;return E.style.top="".concat(H,"px"),E.setAttribute("readonly",""),E.value=j,E}var Y=function(T,E){var H=v(T);E.container.appendChild(H);var I=p()(H);return m("copy"),H.remove(),I},B=function(T){var E=arguments.length>1&&arguments[1]!==void 0?arguments[1]:{container:document.body},H="";return typeof T=="string"?H=Y(T,E):T instanceof HTMLInputElement&&!["text","search","url","tel","password"].includes(T==null?void 0:T.type)?H=Y(T.value,E):(H=p()(T),m("copy")),H},N=B;function O(j){"@babel/helpers - typeof";return typeof Symbol=="function"&&typeof Symbol.iterator=="symbol"?O=function(E){return typeof E}:O=function(E){return E&&typeof Symbol=="function"&&E.constructor===Symbol&&E!==Symbol.prototype?"symbol":typeof E},O(j)}var Qe=function(){var T=arguments.length>0&&arguments[0]!==void 0?arguments[0]:{},E=T.action,H=E===void 0?"copy":E,I=T.container,q=T.target,Me=T.text;if(H!=="copy"&&H!=="cut")throw new Error('Invalid "action" value, use either "copy" or "cut"');if(q!==void 0)if(q&&O(q)==="object"&&q.nodeType===1){if(H==="copy"&&q.hasAttribute("disabled"))throw new Error('Invalid "target" attribute. Please use "readonly" instead of "disabled" attribute');if(H==="cut"&&(q.hasAttribute("readonly")||q.hasAttribute("disabled")))throw new Error(`Invalid "target" attribute. You can't cut text from elements with "readonly" or "disabled" attributes`)}else throw new Error('Invalid "target" value, use a valid Element');if(Me)return N(Me,{container:I});if(q)return H==="cut"?h(q):N(q,{container:I})},De=Qe;function $e(j){"@babel/helpers - typeof";return typeof Symbol=="function"&&typeof Symbol.iterator=="symbol"?$e=function(E){return typeof E}:$e=function(E){return E&&typeof Symbol=="function"&&E.constructor===Symbol&&E!==Symbol.prototype?"symbol":typeof E},$e(j)}function Ei(j,T){if(!(j instanceof T))throw new TypeError("Cannot call a class as a function")}function tn(j,T){for(var E=0;E0&&arguments[0]!==void 0?arguments[0]:{};this.action=typeof I.action=="function"?I.action:this.defaultAction,this.target=typeof I.target=="function"?I.target:this.defaultTarget,this.text=typeof I.text=="function"?I.text:this.defaultText,this.container=$e(I.container)==="object"?I.container:document.body}},{key:"listenClick",value:function(I){var q=this;this.listener=c()(I,"click",function(Me){return q.onClick(Me)})}},{key:"onClick",value:function(I){var q=I.delegateTarget||I.currentTarget,Me=this.action(q)||"copy",kt=De({action:Me,container:this.container,target:this.target(q),text:this.text(q)});this.emit(kt?"success":"error",{action:Me,text:kt,trigger:q,clearSelection:function(){q&&q.focus(),window.getSelection().removeAllRanges()}})}},{key:"defaultAction",value:function(I){return vr("action",I)}},{key:"defaultTarget",value:function(I){var q=vr("target",I);if(q)return document.querySelector(q)}},{key:"defaultText",value:function(I){return vr("text",I)}},{key:"destroy",value:function(){this.listener.destroy()}}],[{key:"copy",value:function(I){var q=arguments.length>1&&arguments[1]!==void 0?arguments[1]:{container:document.body};return N(I,q)}},{key:"cut",value:function(I){return h(I)}},{key:"isSupported",value:function(){var I=arguments.length>0&&arguments[0]!==void 0?arguments[0]:["copy","cut"],q=typeof I=="string"?[I]:I,Me=!!document.queryCommandSupported;return q.forEach(function(kt){Me=Me&&!!document.queryCommandSupported(kt)}),Me}}]),E}(a()),Ai=Li},828:function(n){var o=9;if(typeof Element!="undefined"&&!Element.prototype.matches){var i=Element.prototype;i.matches=i.matchesSelector||i.mozMatchesSelector||i.msMatchesSelector||i.oMatchesSelector||i.webkitMatchesSelector}function s(a,f){for(;a&&a.nodeType!==o;){if(typeof a.matches=="function"&&a.matches(f))return a;a=a.parentNode}}n.exports=s},438:function(n,o,i){var s=i(828);function a(u,p,m,d,h){var v=c.apply(this,arguments);return u.addEventListener(m,v,h),{destroy:function(){u.removeEventListener(m,v,h)}}}function f(u,p,m,d,h){return typeof u.addEventListener=="function"?a.apply(null,arguments):typeof m=="function"?a.bind(null,document).apply(null,arguments):(typeof u=="string"&&(u=document.querySelectorAll(u)),Array.prototype.map.call(u,function(v){return a(v,p,m,d,h)}))}function c(u,p,m,d){return function(h){h.delegateTarget=s(h.target,p),h.delegateTarget&&d.call(u,h)}}n.exports=f},879:function(n,o){o.node=function(i){return i!==void 0&&i instanceof HTMLElement&&i.nodeType===1},o.nodeList=function(i){var s=Object.prototype.toString.call(i);return i!==void 0&&(s==="[object NodeList]"||s==="[object HTMLCollection]")&&"length"in i&&(i.length===0||o.node(i[0]))},o.string=function(i){return typeof i=="string"||i instanceof String},o.fn=function(i){var s=Object.prototype.toString.call(i);return s==="[object Function]"}},370:function(n,o,i){var s=i(879),a=i(438);function f(m,d,h){if(!m&&!d&&!h)throw new Error("Missing required arguments");if(!s.string(d))throw new TypeError("Second argument must be a String");if(!s.fn(h))throw new TypeError("Third argument must be a Function");if(s.node(m))return c(m,d,h);if(s.nodeList(m))return u(m,d,h);if(s.string(m))return p(m,d,h);throw new TypeError("First argument must be a String, HTMLElement, HTMLCollection, or NodeList")}function c(m,d,h){return m.addEventListener(d,h),{destroy:function(){m.removeEventListener(d,h)}}}function u(m,d,h){return Array.prototype.forEach.call(m,function(v){v.addEventListener(d,h)}),{destroy:function(){Array.prototype.forEach.call(m,function(v){v.removeEventListener(d,h)})}}}function p(m,d,h){return a(document.body,m,d,h)}n.exports=f},817:function(n){function o(i){var s;if(i.nodeName==="SELECT")i.focus(),s=i.value;else if(i.nodeName==="INPUT"||i.nodeName==="TEXTAREA"){var a=i.hasAttribute("readonly");a||i.setAttribute("readonly",""),i.select(),i.setSelectionRange(0,i.value.length),a||i.removeAttribute("readonly"),s=i.value}else{i.hasAttribute("contenteditable")&&i.focus();var f=window.getSelection(),c=document.createRange();c.selectNodeContents(i),f.removeAllRanges(),f.addRange(c),s=f.toString()}return s}n.exports=o},279:function(n){function o(){}o.prototype={on:function(i,s,a){var f=this.e||(this.e={});return(f[i]||(f[i]=[])).push({fn:s,ctx:a}),this},once:function(i,s,a){var f=this;function c(){f.off(i,c),s.apply(a,arguments)}return c._=s,this.on(i,c,a)},emit:function(i){var s=[].slice.call(arguments,1),a=((this.e||(this.e={}))[i]||[]).slice(),f=0,c=a.length;for(f;f{"use strict";/*! + * escape-html + * Copyright(c) 2012-2013 TJ Holowaychuk + * Copyright(c) 2015 Andreas Lubbe + * Copyright(c) 2015 Tiancheng "Timothy" Gu + * MIT Licensed + */var rs=/["'&<>]/;Yo.exports=ns;function ns(e){var t=""+e,r=rs.exec(t);if(!r)return t;var n,o="",i=0,s=0;for(i=r.index;i0&&i[i.length-1])&&(c[0]===6||c[0]===2)){r=0;continue}if(c[0]===3&&(!i||c[1]>i[0]&&c[1]=e.length&&(e=void 0),{value:e&&e[n++],done:!e}}};throw new TypeError(t?"Object is not iterable.":"Symbol.iterator is not defined.")}function W(e,t){var r=typeof Symbol=="function"&&e[Symbol.iterator];if(!r)return e;var n=r.call(e),o,i=[],s;try{for(;(t===void 0||t-- >0)&&!(o=n.next()).done;)i.push(o.value)}catch(a){s={error:a}}finally{try{o&&!o.done&&(r=n.return)&&r.call(n)}finally{if(s)throw s.error}}return i}function D(e,t,r){if(r||arguments.length===2)for(var n=0,o=t.length,i;n1||a(m,d)})})}function a(m,d){try{f(n[m](d))}catch(h){p(i[0][3],h)}}function f(m){m.value instanceof et?Promise.resolve(m.value.v).then(c,u):p(i[0][2],m)}function c(m){a("next",m)}function u(m){a("throw",m)}function p(m,d){m(d),i.shift(),i.length&&a(i[0][0],i[0][1])}}function pn(e){if(!Symbol.asyncIterator)throw new TypeError("Symbol.asyncIterator is not defined.");var t=e[Symbol.asyncIterator],r;return t?t.call(e):(e=typeof Ee=="function"?Ee(e):e[Symbol.iterator](),r={},n("next"),n("throw"),n("return"),r[Symbol.asyncIterator]=function(){return this},r);function n(i){r[i]=e[i]&&function(s){return new Promise(function(a,f){s=e[i](s),o(a,f,s.done,s.value)})}}function o(i,s,a,f){Promise.resolve(f).then(function(c){i({value:c,done:a})},s)}}function C(e){return typeof e=="function"}function at(e){var t=function(n){Error.call(n),n.stack=new Error().stack},r=e(t);return r.prototype=Object.create(Error.prototype),r.prototype.constructor=r,r}var It=at(function(e){return function(r){e(this),this.message=r?r.length+` errors occurred during unsubscription: +`+r.map(function(n,o){return o+1+") "+n.toString()}).join(` + `):"",this.name="UnsubscriptionError",this.errors=r}});function Ve(e,t){if(e){var r=e.indexOf(t);0<=r&&e.splice(r,1)}}var Ie=function(){function e(t){this.initialTeardown=t,this.closed=!1,this._parentage=null,this._finalizers=null}return e.prototype.unsubscribe=function(){var t,r,n,o,i;if(!this.closed){this.closed=!0;var s=this._parentage;if(s)if(this._parentage=null,Array.isArray(s))try{for(var a=Ee(s),f=a.next();!f.done;f=a.next()){var c=f.value;c.remove(this)}}catch(v){t={error:v}}finally{try{f&&!f.done&&(r=a.return)&&r.call(a)}finally{if(t)throw t.error}}else s.remove(this);var u=this.initialTeardown;if(C(u))try{u()}catch(v){i=v instanceof It?v.errors:[v]}var p=this._finalizers;if(p){this._finalizers=null;try{for(var m=Ee(p),d=m.next();!d.done;d=m.next()){var h=d.value;try{ln(h)}catch(v){i=i!=null?i:[],v instanceof It?i=D(D([],W(i)),W(v.errors)):i.push(v)}}}catch(v){n={error:v}}finally{try{d&&!d.done&&(o=m.return)&&o.call(m)}finally{if(n)throw n.error}}}if(i)throw new It(i)}},e.prototype.add=function(t){var r;if(t&&t!==this)if(this.closed)ln(t);else{if(t instanceof e){if(t.closed||t._hasParent(this))return;t._addParent(this)}(this._finalizers=(r=this._finalizers)!==null&&r!==void 0?r:[]).push(t)}},e.prototype._hasParent=function(t){var r=this._parentage;return r===t||Array.isArray(r)&&r.includes(t)},e.prototype._addParent=function(t){var r=this._parentage;this._parentage=Array.isArray(r)?(r.push(t),r):r?[r,t]:t},e.prototype._removeParent=function(t){var r=this._parentage;r===t?this._parentage=null:Array.isArray(r)&&Ve(r,t)},e.prototype.remove=function(t){var r=this._finalizers;r&&Ve(r,t),t instanceof e&&t._removeParent(this)},e.EMPTY=function(){var t=new e;return t.closed=!0,t}(),e}();var Sr=Ie.EMPTY;function jt(e){return e instanceof Ie||e&&"closed"in e&&C(e.remove)&&C(e.add)&&C(e.unsubscribe)}function ln(e){C(e)?e():e.unsubscribe()}var Le={onUnhandledError:null,onStoppedNotification:null,Promise:void 0,useDeprecatedSynchronousErrorHandling:!1,useDeprecatedNextContext:!1};var st={setTimeout:function(e,t){for(var r=[],n=2;n0},enumerable:!1,configurable:!0}),t.prototype._trySubscribe=function(r){return this._throwIfClosed(),e.prototype._trySubscribe.call(this,r)},t.prototype._subscribe=function(r){return this._throwIfClosed(),this._checkFinalizedStatuses(r),this._innerSubscribe(r)},t.prototype._innerSubscribe=function(r){var n=this,o=this,i=o.hasError,s=o.isStopped,a=o.observers;return i||s?Sr:(this.currentObservers=null,a.push(r),new Ie(function(){n.currentObservers=null,Ve(a,r)}))},t.prototype._checkFinalizedStatuses=function(r){var n=this,o=n.hasError,i=n.thrownError,s=n.isStopped;o?r.error(i):s&&r.complete()},t.prototype.asObservable=function(){var r=new F;return r.source=this,r},t.create=function(r,n){return new xn(r,n)},t}(F);var xn=function(e){ie(t,e);function t(r,n){var o=e.call(this)||this;return o.destination=r,o.source=n,o}return t.prototype.next=function(r){var n,o;(o=(n=this.destination)===null||n===void 0?void 0:n.next)===null||o===void 0||o.call(n,r)},t.prototype.error=function(r){var n,o;(o=(n=this.destination)===null||n===void 0?void 0:n.error)===null||o===void 0||o.call(n,r)},t.prototype.complete=function(){var r,n;(n=(r=this.destination)===null||r===void 0?void 0:r.complete)===null||n===void 0||n.call(r)},t.prototype._subscribe=function(r){var n,o;return(o=(n=this.source)===null||n===void 0?void 0:n.subscribe(r))!==null&&o!==void 0?o:Sr},t}(x);var Et={now:function(){return(Et.delegate||Date).now()},delegate:void 0};var wt=function(e){ie(t,e);function t(r,n,o){r===void 0&&(r=1/0),n===void 0&&(n=1/0),o===void 0&&(o=Et);var i=e.call(this)||this;return i._bufferSize=r,i._windowTime=n,i._timestampProvider=o,i._buffer=[],i._infiniteTimeWindow=!0,i._infiniteTimeWindow=n===1/0,i._bufferSize=Math.max(1,r),i._windowTime=Math.max(1,n),i}return t.prototype.next=function(r){var n=this,o=n.isStopped,i=n._buffer,s=n._infiniteTimeWindow,a=n._timestampProvider,f=n._windowTime;o||(i.push(r),!s&&i.push(a.now()+f)),this._trimBuffer(),e.prototype.next.call(this,r)},t.prototype._subscribe=function(r){this._throwIfClosed(),this._trimBuffer();for(var n=this._innerSubscribe(r),o=this,i=o._infiniteTimeWindow,s=o._buffer,a=s.slice(),f=0;f0?e.prototype.requestAsyncId.call(this,r,n,o):(r.actions.push(this),r._scheduled||(r._scheduled=ut.requestAnimationFrame(function(){return r.flush(void 0)})))},t.prototype.recycleAsyncId=function(r,n,o){var i;if(o===void 0&&(o=0),o!=null?o>0:this.delay>0)return e.prototype.recycleAsyncId.call(this,r,n,o);var s=r.actions;n!=null&&((i=s[s.length-1])===null||i===void 0?void 0:i.id)!==n&&(ut.cancelAnimationFrame(n),r._scheduled=void 0)},t}(Wt);var Sn=function(e){ie(t,e);function t(){return e!==null&&e.apply(this,arguments)||this}return t.prototype.flush=function(r){this._active=!0;var n=this._scheduled;this._scheduled=void 0;var o=this.actions,i;r=r||o.shift();do if(i=r.execute(r.state,r.delay))break;while((r=o[0])&&r.id===n&&o.shift());if(this._active=!1,i){for(;(r=o[0])&&r.id===n&&o.shift();)r.unsubscribe();throw i}},t}(Dt);var Oe=new Sn(wn);var M=new F(function(e){return e.complete()});function Vt(e){return e&&C(e.schedule)}function Cr(e){return e[e.length-1]}function Ye(e){return C(Cr(e))?e.pop():void 0}function Te(e){return Vt(Cr(e))?e.pop():void 0}function zt(e,t){return typeof Cr(e)=="number"?e.pop():t}var pt=function(e){return e&&typeof e.length=="number"&&typeof e!="function"};function Nt(e){return C(e==null?void 0:e.then)}function qt(e){return C(e[ft])}function Kt(e){return Symbol.asyncIterator&&C(e==null?void 0:e[Symbol.asyncIterator])}function Qt(e){return new TypeError("You provided "+(e!==null&&typeof e=="object"?"an invalid object":"'"+e+"'")+" where a stream was expected. You can provide an Observable, Promise, ReadableStream, Array, AsyncIterable, or Iterable.")}function zi(){return typeof Symbol!="function"||!Symbol.iterator?"@@iterator":Symbol.iterator}var Yt=zi();function Gt(e){return C(e==null?void 0:e[Yt])}function Bt(e){return un(this,arguments,function(){var r,n,o,i;return $t(this,function(s){switch(s.label){case 0:r=e.getReader(),s.label=1;case 1:s.trys.push([1,,9,10]),s.label=2;case 2:return[4,et(r.read())];case 3:return n=s.sent(),o=n.value,i=n.done,i?[4,et(void 0)]:[3,5];case 4:return[2,s.sent()];case 5:return[4,et(o)];case 6:return[4,s.sent()];case 7:return s.sent(),[3,2];case 8:return[3,10];case 9:return r.releaseLock(),[7];case 10:return[2]}})})}function Jt(e){return C(e==null?void 0:e.getReader)}function U(e){if(e instanceof F)return e;if(e!=null){if(qt(e))return Ni(e);if(pt(e))return qi(e);if(Nt(e))return Ki(e);if(Kt(e))return On(e);if(Gt(e))return Qi(e);if(Jt(e))return Yi(e)}throw Qt(e)}function Ni(e){return new F(function(t){var r=e[ft]();if(C(r.subscribe))return r.subscribe(t);throw new TypeError("Provided object does not correctly implement Symbol.observable")})}function qi(e){return new F(function(t){for(var r=0;r=2;return function(n){return n.pipe(e?A(function(o,i){return e(o,i,n)}):de,ge(1),r?He(t):Dn(function(){return new Zt}))}}function Vn(){for(var e=[],t=0;t=2,!0))}function pe(e){e===void 0&&(e={});var t=e.connector,r=t===void 0?function(){return new x}:t,n=e.resetOnError,o=n===void 0?!0:n,i=e.resetOnComplete,s=i===void 0?!0:i,a=e.resetOnRefCountZero,f=a===void 0?!0:a;return function(c){var u,p,m,d=0,h=!1,v=!1,Y=function(){p==null||p.unsubscribe(),p=void 0},B=function(){Y(),u=m=void 0,h=v=!1},N=function(){var O=u;B(),O==null||O.unsubscribe()};return y(function(O,Qe){d++,!v&&!h&&Y();var De=m=m!=null?m:r();Qe.add(function(){d--,d===0&&!v&&!h&&(p=$r(N,f))}),De.subscribe(Qe),!u&&d>0&&(u=new rt({next:function($e){return De.next($e)},error:function($e){v=!0,Y(),p=$r(B,o,$e),De.error($e)},complete:function(){h=!0,Y(),p=$r(B,s),De.complete()}}),U(O).subscribe(u))})(c)}}function $r(e,t){for(var r=[],n=2;ne.next(document)),e}function K(e,t=document){return Array.from(t.querySelectorAll(e))}function z(e,t=document){let r=ce(e,t);if(typeof r=="undefined")throw new ReferenceError(`Missing element: expected "${e}" to be present`);return r}function ce(e,t=document){return t.querySelector(e)||void 0}function _e(){return document.activeElement instanceof HTMLElement&&document.activeElement||void 0}function tr(e){return L(b(document.body,"focusin"),b(document.body,"focusout")).pipe(ke(1),l(()=>{let t=_e();return typeof t!="undefined"?e.contains(t):!1}),V(e===_e()),J())}function Xe(e){return{x:e.offsetLeft,y:e.offsetTop}}function Kn(e){return L(b(window,"load"),b(window,"resize")).pipe(Ce(0,Oe),l(()=>Xe(e)),V(Xe(e)))}function rr(e){return{x:e.scrollLeft,y:e.scrollTop}}function dt(e){return L(b(e,"scroll"),b(window,"resize")).pipe(Ce(0,Oe),l(()=>rr(e)),V(rr(e)))}var Yn=function(){if(typeof Map!="undefined")return Map;function e(t,r){var n=-1;return t.some(function(o,i){return o[0]===r?(n=i,!0):!1}),n}return function(){function t(){this.__entries__=[]}return Object.defineProperty(t.prototype,"size",{get:function(){return this.__entries__.length},enumerable:!0,configurable:!0}),t.prototype.get=function(r){var n=e(this.__entries__,r),o=this.__entries__[n];return o&&o[1]},t.prototype.set=function(r,n){var o=e(this.__entries__,r);~o?this.__entries__[o][1]=n:this.__entries__.push([r,n])},t.prototype.delete=function(r){var n=this.__entries__,o=e(n,r);~o&&n.splice(o,1)},t.prototype.has=function(r){return!!~e(this.__entries__,r)},t.prototype.clear=function(){this.__entries__.splice(0)},t.prototype.forEach=function(r,n){n===void 0&&(n=null);for(var o=0,i=this.__entries__;o0},e.prototype.connect_=function(){!Wr||this.connected_||(document.addEventListener("transitionend",this.onTransitionEnd_),window.addEventListener("resize",this.refresh),va?(this.mutationsObserver_=new MutationObserver(this.refresh),this.mutationsObserver_.observe(document,{attributes:!0,childList:!0,characterData:!0,subtree:!0})):(document.addEventListener("DOMSubtreeModified",this.refresh),this.mutationEventsAdded_=!0),this.connected_=!0)},e.prototype.disconnect_=function(){!Wr||!this.connected_||(document.removeEventListener("transitionend",this.onTransitionEnd_),window.removeEventListener("resize",this.refresh),this.mutationsObserver_&&this.mutationsObserver_.disconnect(),this.mutationEventsAdded_&&document.removeEventListener("DOMSubtreeModified",this.refresh),this.mutationsObserver_=null,this.mutationEventsAdded_=!1,this.connected_=!1)},e.prototype.onTransitionEnd_=function(t){var r=t.propertyName,n=r===void 0?"":r,o=ba.some(function(i){return!!~n.indexOf(i)});o&&this.refresh()},e.getInstance=function(){return this.instance_||(this.instance_=new e),this.instance_},e.instance_=null,e}(),Gn=function(e,t){for(var r=0,n=Object.keys(t);r0},e}(),Jn=typeof WeakMap!="undefined"?new WeakMap:new Yn,Xn=function(){function e(t){if(!(this instanceof e))throw new TypeError("Cannot call a class as a function.");if(!arguments.length)throw new TypeError("1 argument required, but only 0 present.");var r=ga.getInstance(),n=new La(t,r,this);Jn.set(this,n)}return e}();["observe","unobserve","disconnect"].forEach(function(e){Xn.prototype[e]=function(){var t;return(t=Jn.get(this))[e].apply(t,arguments)}});var Aa=function(){return typeof nr.ResizeObserver!="undefined"?nr.ResizeObserver:Xn}(),Zn=Aa;var eo=new x,Ca=$(()=>k(new Zn(e=>{for(let t of e)eo.next(t)}))).pipe(g(e=>L(ze,k(e)).pipe(R(()=>e.disconnect()))),X(1));function he(e){return{width:e.offsetWidth,height:e.offsetHeight}}function ye(e){return Ca.pipe(S(t=>t.observe(e)),g(t=>eo.pipe(A(({target:r})=>r===e),R(()=>t.unobserve(e)),l(()=>he(e)))),V(he(e)))}function bt(e){return{width:e.scrollWidth,height:e.scrollHeight}}function ar(e){let t=e.parentElement;for(;t&&(e.scrollWidth<=t.scrollWidth&&e.scrollHeight<=t.scrollHeight);)t=(e=t).parentElement;return t?e:void 0}var to=new x,Ra=$(()=>k(new IntersectionObserver(e=>{for(let t of e)to.next(t)},{threshold:0}))).pipe(g(e=>L(ze,k(e)).pipe(R(()=>e.disconnect()))),X(1));function sr(e){return Ra.pipe(S(t=>t.observe(e)),g(t=>to.pipe(A(({target:r})=>r===e),R(()=>t.unobserve(e)),l(({isIntersecting:r})=>r))))}function ro(e,t=16){return dt(e).pipe(l(({y:r})=>{let n=he(e),o=bt(e);return r>=o.height-n.height-t}),J())}var cr={drawer:z("[data-md-toggle=drawer]"),search:z("[data-md-toggle=search]")};function no(e){return cr[e].checked}function Ke(e,t){cr[e].checked!==t&&cr[e].click()}function Ue(e){let t=cr[e];return b(t,"change").pipe(l(()=>t.checked),V(t.checked))}function ka(e,t){switch(e.constructor){case HTMLInputElement:return e.type==="radio"?/^Arrow/.test(t):!0;case HTMLSelectElement:case HTMLTextAreaElement:return!0;default:return e.isContentEditable}}function Ha(){return L(b(window,"compositionstart").pipe(l(()=>!0)),b(window,"compositionend").pipe(l(()=>!1))).pipe(V(!1))}function oo(){let e=b(window,"keydown").pipe(A(t=>!(t.metaKey||t.ctrlKey)),l(t=>({mode:no("search")?"search":"global",type:t.key,claim(){t.preventDefault(),t.stopPropagation()}})),A(({mode:t,type:r})=>{if(t==="global"){let n=_e();if(typeof n!="undefined")return!ka(n,r)}return!0}),pe());return Ha().pipe(g(t=>t?M:e))}function le(){return new URL(location.href)}function ot(e){location.href=e.href}function io(){return new x}function ao(e,t){if(typeof t=="string"||typeof t=="number")e.innerHTML+=t.toString();else if(t instanceof Node)e.appendChild(t);else if(Array.isArray(t))for(let r of t)ao(e,r)}function _(e,t,...r){let n=document.createElement(e);if(t)for(let o of Object.keys(t))typeof t[o]!="undefined"&&(typeof t[o]!="boolean"?n.setAttribute(o,t[o]):n.setAttribute(o,""));for(let o of r)ao(n,o);return n}function fr(e){if(e>999){let t=+((e-950)%1e3>99);return`${((e+1e-6)/1e3).toFixed(t)}k`}else return e.toString()}function so(){return location.hash.substring(1)}function Dr(e){let t=_("a",{href:e});t.addEventListener("click",r=>r.stopPropagation()),t.click()}function Pa(e){return L(b(window,"hashchange"),e).pipe(l(so),V(so()),A(t=>t.length>0),X(1))}function co(e){return Pa(e).pipe(l(t=>ce(`[id="${t}"]`)),A(t=>typeof t!="undefined"))}function Vr(e){let t=matchMedia(e);return er(r=>t.addListener(()=>r(t.matches))).pipe(V(t.matches))}function fo(){let e=matchMedia("print");return L(b(window,"beforeprint").pipe(l(()=>!0)),b(window,"afterprint").pipe(l(()=>!1))).pipe(V(e.matches))}function zr(e,t){return e.pipe(g(r=>r?t():M))}function ur(e,t={credentials:"same-origin"}){return ue(fetch(`${e}`,t)).pipe(fe(()=>M),g(r=>r.status!==200?Ot(()=>new Error(r.statusText)):k(r)))}function We(e,t){return ur(e,t).pipe(g(r=>r.json()),X(1))}function uo(e,t){let r=new DOMParser;return ur(e,t).pipe(g(n=>n.text()),l(n=>r.parseFromString(n,"text/xml")),X(1))}function pr(e){let t=_("script",{src:e});return $(()=>(document.head.appendChild(t),L(b(t,"load"),b(t,"error").pipe(g(()=>Ot(()=>new ReferenceError(`Invalid script: ${e}`))))).pipe(l(()=>{}),R(()=>document.head.removeChild(t)),ge(1))))}function po(){return{x:Math.max(0,scrollX),y:Math.max(0,scrollY)}}function lo(){return L(b(window,"scroll",{passive:!0}),b(window,"resize",{passive:!0})).pipe(l(po),V(po()))}function mo(){return{width:innerWidth,height:innerHeight}}function ho(){return b(window,"resize",{passive:!0}).pipe(l(mo),V(mo()))}function bo(){return G([lo(),ho()]).pipe(l(([e,t])=>({offset:e,size:t})),X(1))}function lr(e,{viewport$:t,header$:r}){let n=t.pipe(ee("size")),o=G([n,r]).pipe(l(()=>Xe(e)));return G([r,t,o]).pipe(l(([{height:i},{offset:s,size:a},{x:f,y:c}])=>({offset:{x:s.x-f,y:s.y-c+i},size:a})))}(()=>{function e(n,o){parent.postMessage(n,o||"*")}function t(...n){return n.reduce((o,i)=>o.then(()=>new Promise(s=>{let a=document.createElement("script");a.src=i,a.onload=s,document.body.appendChild(a)})),Promise.resolve())}var r=class extends EventTarget{constructor(n){super(),this.url=n,this.m=i=>{i.source===this.w&&(this.dispatchEvent(new MessageEvent("message",{data:i.data})),this.onmessage&&this.onmessage(i))},this.e=(i,s,a,f,c)=>{if(s===`${this.url}`){let u=new ErrorEvent("error",{message:i,filename:s,lineno:a,colno:f,error:c});this.dispatchEvent(u),this.onerror&&this.onerror(u)}};let o=document.createElement("iframe");o.hidden=!0,document.body.appendChild(this.iframe=o),this.w.document.open(),this.w.document.write(` + + + + + + + + + + + + + + + + + + +
+ +
+ + + + + + +
+ + +
+ +
+ + + + + + +
+
+ + + +
+
+
+ + + + +
+
+
+ + + +
+
+
+ + + +
+
+
+ + + +
+
+ + + + + + + +

Brand

+ +

brand

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Publish DateTitleAuthorsPDFCodeAbstract
2023-07-24Multipoint fishnet Feynman diagrams: sequential splittingFrancesco Aprile et.al.2307.12984v1nullWe study fishnet Feynman diagrams defined by a certain triangulation of a planar n-gon, with massless scalars propagating along and across the cuts. Our solution theory uses the technique of Separation of Variables, in combination with the theory of symmetric polynomials and Mellin space. The n-point split-ladders are solved by a recursion where all building blocks are made fully explicit. In particular, we find an elegant formula for the coefficient functions of the light-cone leading logs. When the diagram grows into a fishnet, we obtain new results exploiting a Cauchy identity decomposition of the measure over separated variables. This leads to an elementary proof of the Basso-Dixon formula at 4-points, while at n-points it provides a natural OPE-like stratification of the diagram. Finally, we propose an independent approach based on ``stampede" combinatorics to study the light-cone behaviour of the diagrams as the partition function of a certain vertex model.
2023-07-24Learning Dense Correspondences between Photos and SketchesXuanchen Lu et.al.2307.12967v1nullHumans effortlessly grasp the connection between sketches and real-world objects, even when these sketches are far from realistic. Moreover, human sketch understanding goes beyond categorization -- critically, it also entails understanding how individual elements within a sketch correspond to parts of the physical world it represents. What are the computational ingredients needed to support this ability? Towards answering this question, we make two contributions: first, we introduce a new sketch-photo correspondence benchmark, $\textit{PSC6k}$, containing 150K annotations of 6250 sketch-photo pairs across 125 object categories, augmenting the existing Sketchy dataset with fine-grained correspondence metadata. Second, we propose a self-supervised method for learning dense correspondences between sketch-photo pairs, building upon recent advances in correspondence learning for pairs of photos. Our model uses a spatial transformer network to estimate the warp flow between latent representations of a sketch and photo extracted by a contrastive learning-based ConvNet backbone. We found that this approach outperformed several strong baselines and produced predictions that were quantitatively consistent with other warp-based methods. However, our benchmark also revealed systematic differences between predictions of the suite of models we tested and those of humans. Taken together, our work suggests a promising path towards developing artificial systems that achieve more human-like understanding of visual images at different levels of abstraction. Project page: https://photo-sketch-correspondence.github.io
2023-07-24GridMM: Grid Memory Map for Vision-and-Language NavigationZihan Wang et.al.2307.12907v2linkVision-and-language navigation (VLN) enables the agent to navigate to a remote location following the natural language instruction in 3D environments. To represent the previously visited environment, most approaches for VLN implement memory using recurrent states, topological maps, or top-down semantic maps. In contrast to these approaches, we build the top-down egocentric and dynamically growing Grid Memory Map (i.e., GridMM) to structure the visited environment. From a global perspective, historical observations are projected into a unified grid map in a top-down view, which can better represent the spatial relations of the environment. From a local perspective, we further propose an instruction relevance aggregation method to capture fine-grained visual clues in each grid region. Extensive experiments are conducted on both the REVERIE, R2R, SOON datasets in the discrete environments, and the R2R-CE dataset in the continuous environments, showing the superiority of our proposed method.
2023-07-24Monodromy kernels for strata of translation surfacesRiccardo Giannini et.al.2307.12901v1nullThe non-hyperelliptic connected components of the strata of translation surfaces are conjectured to be orbifold classifying spaces for some groups commensurable to some mapping class groups. The topological monodromy map of the non-hyperelliptic components projects naturally to the mapping class group of the underlying punctured surface and is an obvious candidate to test commensurability. In the present article, we prove that for the components $\mathcal{H}(3,1)$ and $\mathcal{H}^{nh}(4)$ in genus 3 the monodromy map fails to demonstrate the conjectured commensurability. In particular, building on work of Wajnryb, we prove that the kernels of the monodromy maps for $\mathcal{H}(3,1)$ and $\mathcal{H}^{nh}(4)$ are large, as they contain a non-abelian free group of rank $2$
2023-07-24SoK: Design, Vulnerabilities and Defense of Cryptocurrency WalletsYimika Erinle et.al.2307.12874v2nullThe rapid growth of decentralized digital currencies, enabled by blockchain technology, has ushered in a new era of peer-to-peer transactions, revolutionizing the global economy. Cryptocurrency wallets, serving as crucial endpoints for these transactions, have become increasingly prevalent. However, the escalating value and usage of these wallets also expose them to significant security risks and challenges. This research aims to comprehensively explore the security aspects of cryptocurrency wallets. It provides a taxonomy of wallet types, analyzes their design and implementation, identifies common vulnerabilities and attacks, and discusses defense mechanisms and mitigation strategies. The taxonomy covers custodial, non-custodial, hot, and cold wallets, highlighting their unique characteristics and associated security considerations. The security analysis scrutinizes the theoretical and practical aspects of wallet design, while assessing the efficacy of existing security measures and protocols. Notable wallet attacks, such as Binance, Mt. Gox are examined to understand their causes and consequences. Furthermore, the paper surveys defense mechanisms, transaction monitoring, evaluating their effectiveness in mitigating threats.
2023-07-24A quantitative theoretical model of the boson peak based on stringlet excitationsCunyuan Jiang et.al.2307.12839v1nullThe boson peak (BP), a low-energy excess in the vibrational density of states over the phonon Debye contribution, is usually identified as one of the distinguishing features between ordered crystals and amorphous solid materials. Despite decades of efforts, its microscopic origin still remains a mystery and a consensus on its theoretical derivation has not yet been achieved. Recently, it has been proposed, and corroborated with simulations, that the BP might stem from intrinsic localized modes which involve string-like excitations ("stringlets") having a one-dimensional (1D) nature. In this work, we build on a theoretical framework originally proposed by Lund that describes the localized modes as 1D vibrating strings, but we specify the stringlet size distribution to be exponential, as observed in independent simulation studies. We show that a generalization of this framework provides an analytically prediction for the BP frequency $\omega_{BP}$ in the temperature regime well below the glass transition temperature in both 2D and 3D amorphous systems. The final result involves no free parameters and is in quantitative agreement with prior simulation observations. Additionally, this stringlet theory of the BP naturally reproduces the softening of the BP frequency upon heating and offers an analytical explanation for the experimentally observed scaling with the shear modulus in the glass state and changes in this scaling in cooled liquids. Finally, the theoretical analysis highlights the existence of a strong damping for the stringlet modes at finite temperature which leads to a large low-frequency contribution to the 3D vibrational density of states, as observed in both experiments and simulations.
2023-07-24Exposing the Troublemakers in Described Object DetectionChi Xie et.al.2307.12813v1linkDetecting objects based on language descriptions is a popular task that includes Open-Vocabulary object Detection (OVD) and Referring Expression Comprehension (REC). In this paper, we advance them to a more practical setting called Described Object Detection (DOD) by expanding category names to flexible language expressions for OVD and overcoming the limitation of REC to only grounding the pre-existing object. We establish the research foundation for DOD tasks by constructing a Description Detection Dataset ($D^3$), featuring flexible language expressions and annotating all described objects without omission. By evaluating previous SOTA methods on $D^3$, we find some troublemakers that fail current REC, OVD, and bi-functional methods. REC methods struggle with confidence scores, rejecting negative instances, and multi-target scenarios, while OVD methods face constraints with long and complex descriptions. Recent bi-functional methods also do not work well on DOD due to their separated training procedures and inference strategies for REC and OVD tasks. Building upon the aforementioned findings, we propose a baseline that largely improves REC methods by reconstructing the training data and introducing a binary classification sub-task, outperforming existing methods. Data and code is available at https://github.com/shikras/d-cube.
2023-07-24Imperfect CSI: A Key Factor of Uncertainty to Over-the-Air Federated LearningJiacheng Yao et.al.2307.12793v1nullOver-the-air computation (AirComp) has recently been identified as a prominent technique to enhance communication efficiency of wireless federated learning (FL). This letter investigates the impact of channel state information (CSI) uncertainty at the transmitter on an AirComp enabled FL (AirFL) system with the truncated channel inversion strategy. To characterize the performance of the AirFL system, the weight divergence with respect to the ideal aggregation is analytically derived to evaluate learning performance loss. We explicitly reveal that the weight divergence deteriorates as $\mathcal{O}(1/\rho^2)$ as the level of channel estimation accuracy $\rho$ vanishes, and also has a decay rate of $\mathcal{O}(1/K^2)$ with the increasing number of participating devices, $K$. Building upon our analytical results, we formulate the channel truncation threshold optimization problem to adapt to different $\rho$, which can be solved optimally. Numerical results verify the analytical results and show that a lower truncation threshold is preferred with more accurate CSI.
2023-07-24Ni-O-Ag catalyst enables 103-m2 artificial photosynthesis with >16% solar-to-chemical energy conversion efficiencyYaguang Li et.al.2307.12783v1nullHerein, NiO nanosheets supported with Ag single atoms are synthesized for photothermal CO2 hydrogenation to achieve 1065 mmol g-1 h-1 of CO production rate under 1 sun irradiation, revealing the unparalleled weak sunlight driven reverse water-gas shift reaction (RWGS) activity. This performance is attributed to the coupling effect of Ag-O-Ni sites to enhance the hydrogenation of CO2 and weaken the CO adsorption, resulting in 1434 mmol g-1 h-1 of CO yield at 300 degree, surpassing any low-temperature RWGS performances ever reported. Building on this, we integrated the 2D Ni1Ag0.02O1 supported photothermal RWGS with commercial photovoltaic electrolytic water splitting, leading to the realization of 103 m2 scale artificial photosynthesis system with a daily CO yield of 18.70 m3, a photochemical energy conversion efficiency of >16%, over 90% H2 ultilazation efficiency, outperforming other types of artificial photosynthesis. The results of this research chart a promising course for designing practical, natural sunlight-driven artificial photosynthesis systems and highly efficient platinum-free CO2 hydrogenation catalysts. This work is a significant step towards harnessing solar energy more efficiently and sustainably, opening exciting possibilities for future research and development in this area.
2023-07-24First look at data from the 13-antenna setup of GRANDProto300 in northwest ChinaPeng-Xiong Ma et.al.2307.12769v1nullThe Giant Radio Array for Neutrino Detection (GRAND) is an envisioned observatory of ultra-high-energy neutrinos, cosmic rays, and gamma rays, with energies above 100 PeV. GRAND targets the radio signals emitted by extensive air showers induced by the interaction of ultra-high-energy particles in the atmosphere, using an array of 200,000 radio antennas split into sub-arrays deployed worldwide. GRANDProto13 (GP13) is a 13-antenna demonstrator array deployed in February 2023 in the Gansu province of China, as a precursor for GRANDProto300, which will validate the detection principle of the GRAND experiment. Its goal is to measure the radio background present at the site, validate the design of the detection units and develop an autonomous radio trigger for air showers. We will describe GP13 and its operation, and show preliminary results on noise monitoring.
2023-07-24Code-Switched Urdu ASR for Noisy Telephonic Environment using Data Centric Approach with Hybrid HMM and CNN-TDNNMuhammad Danyal Khan et.al.2307.12759v1nullCall Centers have huge amount of audio data which can be used for achieving valuable business insights and transcription of phone calls is manually tedious task. An effective Automated Speech Recognition system can accurately transcribe these calls for easy search through call history for specific context and content allowing automatic call monitoring, improving QoS through keyword search and sentiment analysis. ASR for Call Center requires more robustness as telephonic environment are generally noisy. Moreover, there are many low-resourced languages that are on verge of extinction which can be preserved with help of Automatic Speech Recognition Technology. Urdu is the $10^{th}$ most widely spoken language in the world, with 231,295,440 worldwide still remains a resource constrained language in ASR. Regional call-center conversations operate in local language, with a mix of English numbers and technical terms generally causing a "code-switching" problem. Hence, this paper describes an implementation framework of a resource efficient Automatic Speech Recognition/ Speech to Text System in a noisy call-center environment using Chain Hybrid HMM and CNN-TDNN for Code-Switched Urdu Language. Using Hybrid HMM-DNN approach allowed us to utilize the advantages of Neural Network with less labelled data. Adding CNN with TDNN has shown to work better in noisy environment due to CNN's additional frequency dimension which captures extra information from noisy speech, thus improving accuracy. We collected data from various open sources and labelled some of the unlabelled data after analysing its general context and content from Urdu language as well as from commonly used words from other languages, primarily English and were able to achieve WER of 5.2% with noisy as well as clean environment in isolated words or numbers as well as in continuous spontaneous speech.
2023-07-24The ro-vibrational $ν_2$ mode spectrum of methane investigated by ultrabroadband coherent Raman spectroscopyFrancesco Mazza et.al.2307.12740v1nullWe present the first experimental application of coherent Raman spectroscopy (CRS) on the ro-vibrational $\nu_2$ mode spectrum of methane (CH$_4$). Ultrabroadband femtosecond/picosecond (fs/ps) CRS is performed in the molecular fingerprint region from 1100 to 2000 cm$^{-1}$, employing fs laser-induced filamentation as the supercontinuum generation mechanism to provide the ultrabroadband excitation pulses. We introduce a time-domain model of the CH$_4$ $\nu_2$ CRS spectrum, including all five ro-vibrational branches allowed by the selection rules $\Delta v = 1$, $\Delta J = 0$, $\pm1$, $\pm2$; the model includes collisional linewidths, computed according to a modified exponential gap scaling law and validated experimentally. The use of ultrabroadband CRS for in situ monitoring of the CH$_4$ chemistry is demonstrated in a laboratory CH$_4$/air diffusion flame: CRS measurements in the fingerprint region, performed across the laminar flame front, allow the simultaneous detection of molecular oxygen (O$_2$), carbon dioxide (CO$_2$), and molecular hydrogen (H$_2$), along with CH$_4$. Fundamental physicochemical processes, such as H$_2$ production via CH$_4$ pyrolysis, are observed through the Raman spectra of these chemical species. In addition, we demonstrate ro-vibrational CH$_4\nu_2$ CRS thermometry, and we validate it against CO$_2$ CRS measurements. The present technique offers an interesting diagnostics approach to in situ measurement of CH$_4$-rich environments, e.g., in plasma reactors for CH$_4$ pyrolysis and H$_2$ production.
2023-07-24Safety monitoring under stealthy sensor injection attacks using reachable setsCédric Escudero et.al.2307.12715v1nullStealthy sensor injection attacks are serious threats for industrial plants as they can compromise the plant's integrity without being detected by traditional fault detectors. In this manuscript, we study the possibility of revealing the presence of such attacks by monitoring only the control input. This approach consists in computing an ellipsoidal bound of the input reachable set. When the control input does not belong to this set, this means that a stealthy sensor injection attack is driving the plant to critical states. The problem of finding this ellipsoidal bound is posed as a convex optimization problem (convex cost with Linear Matrix Inequalities constraints). Our monitoring approach is tested in simulation.
2023-07-24Rates in almost sure invariance principle for nonuniformly hyperbolic mapsC Cuny et.al.2307.12714v1nullWe prove the Almost Sure Invariance Principle (ASIP) with close to optimal error rates for nonuniformly hyperbolic maps. We do not assume exponential contraction along stable leaves, therefore our result covers in particular slowly mixing invertible dynamical systems as Bunimovich flowers, billiards with flat points as in Chernov and Zhang (2005) and Wojtkowski' (1990) system of two falling balls. For these examples, the ASIP is a new result, not covered by prior works for various reasons, notably because in absence of exponential contraction along stable leaves, it is challenging to employ the so-called Sinai's trick (Sinai 1972, Bowen 1975) of reducing a nonuniformly hyperbolic system to a nonuniformly expanding one. Our strategy follows our previous papers on the ASIP for nonuniformly expanding maps, where we build a semiconjugacy to a specific renewal Markov shift and adapt the argument of Berkes, Liu and Wu (2014). The main difference is that now the Markov shift is two-sided, the observables depend on the full trajectory, both the future and the past.
2023-07-24Leveraging Large Language Models (LLMs) for Process Mining (Technical Report)Alessandro Berti et.al.2307.12701v1nullThis technical report describes the intersection of process mining and large language models (LLMs), specifically focusing on the abstraction of traditional and object-centric process mining artifacts into textual format. We introduce and explore various prompting strategies: direct answering, where the large language model directly addresses user queries; multi-prompt answering, which allows the model to incrementally build on the knowledge obtained through a series of prompts; and the generation of database queries, facilitating the validation of hypotheses against the original event log. Our assessment considers two large language models, GPT-4 and Google's Bard, under various contextual scenarios across all prompting strategies. Results indicate that these models exhibit a robust understanding of key process mining abstractions, with notable proficiency in interpreting both declarative and procedural process models. In addition, we find that both models demonstrate strong performance in the object-centric setting, which could significantly propel the advancement of the object-centric process mining discipline. Additionally, these models display a noteworthy capacity to evaluate various concepts of fairness in process mining. This opens the door to more rapid and efficient assessments of the fairness of process mining event logs, which has significant implications for the field. The integration of these large language models into process mining applications may open new avenues for exploration, innovation, and insight generation in the field.
2023-07-24Safe asynchronous mixed-choice for timed interactionsJonah Pears et.al.2307.12688v1nullMixed-choice has long been barred from models of asynchronous communication since it compromises key properties of communicating finite-state machines. Session types inherit this restriction, which precludes them from fully modelling timeouts -- a key programming feature to handle failures. To address this deficiency, we present (binary) TimeOut Asynchronous Session Types ({TOAST}) as an extension to (binary) asynchronous timed session types to permit mixed-choice. {TOAST} deploy timing constraints to regulate the use of mixed-choice so as to preserve communication safety. We provide a new behavioural semantics for {TOAST} which guarantees progress in the presence of mixed-choice. Building upon {TOAST}, we provide a calculus featuring process timers which is capable of modelling timeouts using a $\mathtt{receive\text{-}after}$ pattern, much like Erlang, and informally illustrate the correspondence with TOAST specifications.
2023-07-24Exact Global Control of Small Divisors in Rational Normal FormJianjun Liu et.al.2307.12652v1nullRational normal form is a powerful tool to deal with Hamiltonian partial differential equations without external parameters. In this paper, we build rational normal form with exact global control of small divisors. As an application to nonlinear Schr\"{o}dinger equations in Gevrey spaces, we prove sub-exponentially long time stability results for generic small initial data.
2023-07-24Execution at RISC: Stealth JOP Attacks on RISC-V ApplicationsLoïc Buckwell et.al.2307.12648v1nullRISC-V is a recently developed open instruction set architecture gaining a lot of attention. To achieve a lasting security on these systems and design efficient countermeasures, a better understanding of vulnerabilities to novel and potential future attacks is mandatory. This paper demonstrates that RISC-V is sensible to Jump-Oriented Programming, a class of complex code-reuse attacks. We provide an analysis of new dispatcher gadgets we discovered, and show how they can be used together in order to build a stealth attack, bypassing existing protections. A proof-of-concept attack is implemented on an embedded web server compiled for RISC-V, in which we introduced a vulnerability, allowing an attacker to remotely read an arbitrary file from the host machine.
2023-07-24Remote Bio-Sensing: Open Source Benchmark Framework for Fair Evaluation of rPPGDae Yeol Kim et.al.2307.12644v1linkRemote Photoplethysmography (rPPG) is a technology that utilizes the light absorption properties of hemoglobin, captured via camera, to analyze and measure blood volume pulse (BVP). By analyzing the measured BVP, various physiological signals such as heart rate, stress levels, and blood pressure can be derived, enabling applications such as the early prediction of cardiovascular diseases. rPPG is a rapidly evolving field as it allows the measurement of vital signals using camera-equipped devices without the need for additional devices such as blood pressure monitors or pulse oximeters, and without the assistance of medical experts. Despite extensive efforts and advances in this field, serious challenges remain, including issues related to skin color, camera characteristics, ambient lighting, and other sources of noise, which degrade performance accuracy. We argue that fair and evaluable benchmarking is urgently required to overcome these challenges and make any meaningful progress from both academic and commercial perspectives. In most existing work, models are trained, tested, and validated only on limited datasets. Worse still, some studies lack available code or reproducibility, making it difficult to fairly evaluate and compare performance. Therefore, the purpose of this study is to provide a benchmarking framework to evaluate various rPPG techniques across a wide range of datasets for fair evaluation and comparison, including both conventional non-deep neural network (non-DNN) and deep neural network (DNN) methods. GitHub URL: https://github.com/remotebiosensing/rppg.
2023-07-24Spectral Observations and Modeling of a Solar White-light Flare Observed by CHASEDe-Chao Song et.al.2307.12641v1nullThe heating mechanisms of solar white-light flares remain unclear. We present an X1.0 white-light flare on 2022 October 2 (SOL2022-10-02T20:25) observed by the Chinese \ha\ Solar Explorer (CHASE) that provides two-dimensional spectra in the visible light for the full solar disk with a seeing-free condition. The flare shows a prominent enhancement of $\sim$40\% in the photospheric \fe\ line at 6569.2 \AA, and the nearby continuum also exhibits a maximum enhancement of $\sim$40\%. For the continuum near the \fe\ line at 6173 \AA\ from the Helioseismic and Magnetic Imager (HMI) on board the Solar Dynamics Observatory (SDO), it is enhanced up to $\sim$20\%. At the white-light kernels, the \fe\ line at 6569.2 \AA\ has a symmetric Gaussian profile that is still in absorption and the H$\alpha$ line at 6562.8 \AA\ displays a very broad emission profile with a central reversal plus a red or blue asymmetry. The white-light kernels are co-spatial with the microwave footpoint sources observed by the Expanded Owens Valley Solar Array (EOVSA) and the time profile of the white-light emission matches that of the hard X-ray emission above 30 keV from the Gamma-ray Burst Monitor (GBM) on Fermi. These facts indicate that the white-light emission is qualitatively related to a nonthermal electron beam. We also perform a radiative hydrodynamic simulation with the electron beam parameters constrained by the hard X-ray observations from Fermi/GBM. The result reveals that the white-light enhancement cannot be well explained by a pure electron-beam heating together with its induced radiative backwarming but may need additional heating sources such as \alfven\ waves.
2023-07-24GRB 221009A: revealing a hidden afterglow during the prompt emission phase with Fermi-GBM observationsHai-Ming Zhang et.al.2307.12623v1nullRecently, LHAASO reported the detection of brightest-of-all-time GRB 221009A, revealing the early onset of a TeV afterglow. However, there is no evidence of afterglow emission at such early time at other wavelengths. Here we report the discovery of a hidden afterglow component during the prompt emission phase with Fermi Gamma-Ray Burst Monitor (GBM) observations. We analyze the spectral evolution of the X-ray/$\gamma$-ray emission of GRB 221009A measured by GBM during the dips of two prompt emission pulses (i.e., intervals $T_{0}+[300-328]\rm~s$ and $T_{0}+[338-378]\rm~s$, where $T_0$ is the GBM trigger time). We find that the spectra at the dips transit from the Band function to a power-law function, indicating a transition from the prompt emission to the afterglow. After $\sim T_{0}+ 660 \rm~s$, the spectrum is well described by a power-law function and the afterglow becomes dominant. Remarkably, the underlying afterglow emission at the dips smoothly connect with the afterglow after $\sim T_{0}+ 660 \rm~s$. The entire afterglow emission measured by GBM can be fitted by a power-law function $F\sim t^{-0.95\pm0.05}$, where $t$ is the time since the first main pulse at $T^*=T_0+226~{\rm s}$, consistent with the TeV afterglow decay measured by LHAASO. The start time of this power-law decay indicates that the afterglow peak of GRB 221009A should be earlier than $T_{0}+300 \rm ~s$. We also test the possible presence of a jet break in the early afterglow light curve, finding that both the jet break model and single power-law decay model are consistent with the GBM data. The two models can not be distinguished with the GBM data alone because the inferred jet break time is quite close to the end of GBM observations.
2023-07-24Phase Match for Out-of-Distribution GeneralizationChengming Hu et.al.2307.12622v1nullThe Fourier transform, serving as an explicit decomposition method for visual signals, has been employed to explain the out-of-distribution generalization behaviors of Convolutional Neural Networks (CNNs). Previous research and empirical studies have indicated that the amplitude spectrum plays a decisive role in CNN recognition, but it is susceptible to disturbance caused by distribution shifts. On the other hand, the phase spectrum preserves highly-structured spatial information, which is crucial for visual representation learning. In this paper, we aim to clarify the relationships between Domain Generalization (DG) and the frequency components by introducing a Fourier-based structural causal model. Specifically, we interpret the phase spectrum as semi-causal factors and the amplitude spectrum as non-causal factors. Building upon these observations, we propose Phase Match (PhaMa) to address DG problems. Our method introduces perturbations on the amplitude spectrum and establishes spatial relationships to match the phase components. Through experiments on multiple benchmarks, we demonstrate that our proposed method achieves state-of-the-art performance in domain generalization and out-of-distribution robustness tasks.
2023-07-24CTVIS: Consistent Training for Online Video Instance SegmentationKaining Ying et.al.2307.12616v1linkThe discrimination of instance embeddings plays a vital role in associating instances across time for online video instance segmentation (VIS). Instance embedding learning is directly supervised by the contrastive loss computed upon the contrastive items (CIs), which are sets of anchor/positive/negative embeddings. Recent online VIS methods leverage CIs sourced from one reference frame only, which we argue is insufficient for learning highly discriminative embeddings. Intuitively, a possible strategy to enhance CIs is replicating the inference phase during training. To this end, we propose a simple yet effective training strategy, called Consistent Training for Online VIS (CTVIS), which devotes to aligning the training and inference pipelines in terms of building CIs. Specifically, CTVIS constructs CIs by referring inference the momentum-averaged embedding and the memory bank storage mechanisms, and adding noise to the relevant embeddings. Such an extension allows a reliable comparison between embeddings of current instances and the stable representations of historical instances, thereby conferring an advantage in modeling VIS challenges such as occlusion, re-identification, and deformation. Empirically, CTVIS outstrips the SOTA VIS models by up to +5.0 points on three VIS benchmarks, including YTVIS19 (55.1% AP), YTVIS21 (50.1% AP) and OVIS (35.5% AP). Furthermore, we find that pseudo-videos transformed from images can train robust models surpassing fully-supervised ones.
2023-07-24BonnBot-I: A Precise Weed Management and Crop Monitoring PlatformAlireza Ahmadi et.al.2307.12588v1nullCultivation and weeding are two of the primary tasks performed by farmers today. A recent challenge for weeding is the desire to reduce herbicide and pesticide treatments while maintaining crop quality and quantity. In this paper we introduce BonnBot-I a precise weed management platform which can also performs field monitoring. Driven by crop monitoring approaches which can accurately locate and classify plants (weed and crop) we further improve their performance by fusing the platform available GNSS and wheel odometry. This improves tracking accuracy of our crop monitoring approach from a normalized average error of 8.3% to 3.5%, evaluated on a new publicly available corn dataset. We also present a novel arrangement of weeding tools mounted on linear actuators evaluated in simulated environments. We replicate weed distributions from a real field, using the results from our monitoring approach, and show the validity of our work-space division techniques which require significantly less movement (a 50% reduction) to achieve similar results. Overall, BonnBot-I is a significant step forward in precise weed management with a novel method of selectively spraying and controlling weeds in an arable field
2023-07-24Understanding the Governance Challenges of Public Libraries Subscribing to Digital Content DistributorsYunhee Shim et.al.2307.12569v1nullAs popular demand for digital information increases, public libraries are increasingly turning to commercial digital content distribution services to save curation time and costs. These services let libraries subscribe to pre-configured digital content packages that become instantly available wholesale to their patrons. However, these packages often contain content that does not align with the library's curation policy. We conducted interviews with 15 public librarians in the US to examine their experiences with subscribing to digital distribution services. We found that the subscribing libraries face many digital governance challenges, including the sub-par quality of received content, a lack of control in the curation process, and a limited understanding of how distribution services operate. We draw from prior HCI and social media moderation literature to contextualize and examine these challenges. Building upon our findings, we suggest how digital distributors, libraries, and lawmakers could improve digital distribution services in library settings. We offer recommendations for co-constructing a robust digital content curation policy and discuss how librarian's cooperation and well-deployed content moderation mechanisms could help enforce that policy. Our work informs the utility of future content moderation research that bridges the fields of CSCW and library science.
2023-07-24Monitoring Cascading Changes of Resources in the Kubernetes Control PlaneTomoyuki Ehira et.al.2307.12567v1nullKubernetes is a container management system that has many automated functionalities. Those functionalities are managed by configuring objects and resources in the control plane. Since most objects change their state depending on other objects' states, a change propagates to other objects in a chain. As cluster availability is influenced by the time required for these cascading changes, it is essential to make the propagations measurable and shed light on the behavior of the Kubernetes control plane. However, it is not easy because each object constantly monitors other objects' status and acts autonomously in response to their changes to play its role. In this paper, we propose a measurement system that outputs objects' change logs published from the API server in the control plane and assists in analyzing the time of cascading changes between objects by utilizing the relationships among resources. With a practical change scenario, our system is confirmed that it can measure change propagation times within a cascading change. Also, measurements on the system itself showed it has a small CPU and memory footprint.
2023-07-24Towards Video Anomaly Retrieval from Video Anomaly Detection: New Benchmarks and ModelPeng Wu et.al.2307.12545v1nullVideo anomaly detection (VAD) has been paid increasing attention due to its potential applications, its current dominant tasks focus on online detecting anomalies% at the frame level, which can be roughly interpreted as the binary or multiple event classification. However, such a setup that builds relationships between complicated anomalous events and single labels, e.g., ``vandalism'', is superficial, since single labels are deficient to characterize anomalous events. In reality, users tend to search a specific video rather than a series of approximate videos. Therefore, retrieving anomalous events using detailed descriptions is practical and positive but few researches focus on this. In this context, we propose a novel task called Video Anomaly Retrieval (VAR), which aims to pragmatically retrieve relevant anomalous videos by cross-modalities, e.g., language descriptions and synchronous audios. Unlike the current video retrieval where videos are assumed to be temporally well-trimmed with short duration, VAR is devised to retrieve long untrimmed videos which may be partially relevant to the given query. To achieve this, we present two large-scale VAR benchmarks, UCFCrime-AR and XDViolence-AR, constructed on top of prevalent anomaly datasets. Meanwhile, we design a model called Anomaly-Led Alignment Network (ALAN) for VAR. In ALAN, we propose an anomaly-led sampling to focus on key segments in long untrimmed videos. Then, we introduce an efficient pretext task to enhance semantic associations between video-text fine-grained representations. Besides, we leverage two complementary alignments to further match cross-modal contents. Experimental results on two benchmarks reveal the challenges of VAR task and also demonstrate the advantages of our tailored method.
2023-07-24Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research DirectionsZhonghui Li et.al.2307.12490v1nullOver the past few decades, significant progress has been made in quantum information technology, from theoretical studies to experimental demonstrations. Revolutionary quantum applications are now in the limelight, showcasing the advantages of quantum information technology and becoming a research hotspot in academia and industry. To enable quantum applications to have a more profound impact and wider application, the interconnection of multiple quantum nodes through quantum channels becomes essential. Building an entanglement-assisted quantum network, capable of realizing quantum information transmission between these quantum nodes, is the primary goal. However, entanglement-assisted quantum networks are governed by the unique laws of quantum mechanics, such as the superposition principle, the no-cloning theorem, and quantum entanglement, setting them apart from classical networks. Consequently, fundamental efforts are required to establish entanglement-assisted quantum networks. While some insightful surveys have paved the way for entanglement-assisted quantum networks, most of these studies focus on enabling technologies and quantum applications, neglecting critical network issues. In response, this paper presents a comprehensive survey of entanglement-assisted quantum networks. Alongside reviewing fundamental mechanics and enabling technologies, the paper provides a detailed overview of the network structure, working principles, and development stages, highlighting the differences from classical networks. Additionally, the challenges of building wide-area entanglement-assisted quantum networks are addressed. Furthermore, the paper emphasizes open research directions, including architecture design, entanglement-based network issues, and standardization, to facilitate the implementation of future entanglement-assisted quantum networks.
2023-07-24Understanding Large Language Model Based Fuzz Driver GenerationCen Zhang et.al.2307.12469v1nullFuzz drivers are a necessary component of API fuzzing. However, automatically generating correct and robust fuzz drivers is a difficult task. Compared to existing approaches, LLM-based (Large Language Model) generation is a promising direction due to its ability to operate with low requirements on consumer programs, leverage multiple dimensions of API usage information, and generate human-friendly output code. Nonetheless, the challenges and effectiveness of LLM-based fuzz driver generation remain unclear. To address this, we conducted a study on the effects, challenges, and techniques of LLM-based fuzz driver generation. Our study involved building a quiz with 86 fuzz driver generation questions from 30 popular C projects, constructing precise effectiveness validation criteria for each question, and developing a framework for semi-automated evaluation. We designed five query strategies, evaluated 36,506 generated fuzz drivers. Furthermore, the drivers were compared with manually written ones to obtain practical insights. Our evaluation revealed that: while the overall performance was promising (passing 91% of questions), there were still practical challenges in filtering out the ineffective fuzz drivers for large scale application; basic strategies achieved a decent correctness rate (53%), but struggled with complex API-specific usage questions. In such cases, example code snippets and iterative queries proved helpful; while LLM-generated drivers showed competent fuzzing outcomes compared to manually written ones, there was still significant room for improvement, such as incorporating semantic oracles for logical bugs detection.
2023-07-23Drift Models on Complex Projective Space for Electron-Nuclear Double ResonanceHenrik Wiechers et.al.2307.12414v1nullENDOR spectroscopy is an important tool to determine the complicated three-dimensional structure of biomolecules and in particular enables measurements of intramolecular distances. Usually, spectra are determined by averaging the data matrix, which does not take into account the significant thermal drifts that occur in the measurement process. In contrast, we present an asymptotic analysis for the homoscedastic drift model, a pioneering parametric model that achieves striking model fits in practice and allows both hypothesis testing and confidence intervals for spectra. The ENDOR spectrum and an orthogonal component are modeled as an element of complex projective space, and formulated in the framework of generalized Fr\'echet means. To this end, two general formulations of strong consistency for set-valued Fr\'echet means are extended and subsequently applied to the homoscedastic drift model to prove strong consistency. Building on this, central limit theorems for the ENDOR spectrum are shown. Furthermore, we extend applicability by taking into account a phase noise contribution leading to the heteroscedastic drift model. Both drift models offer improved signal-to-noise ratio over pre-existing models.
+ + + + + + + + +
+
+ + +
+ +
+ + + +
+
+
+
+ + + + + + + + + \ No newline at end of file diff --git a/index.html b/index.html new file mode 100644 index 00000000..6bc60fd0 --- /dev/null +++ b/index.html @@ -0,0 +1,698 @@ + + + + + + + + + + + + + + + + + + + + arxiv-paper-daily + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ +
+ + + + + + +
+ + +
+ +
+ + + + + + +
+
+ + + +
+
+
+ + + + +
+
+
+ + + +
+
+
+ + + +
+
+
+ + + +
+
+ + + + + + + +

arxiv-daily latest papers around arxiv paper daily template

+

Automated deployment @ 2023-07-26 09:41:49 Asia/Shanghai

+
+

Welcome to contribute! Add your topics and keywords in topic.yml. +You can also view historical data through the storage.

+
+

brand

+

brand

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Publish DateTitleAuthorsPDFCodeAbstract
2023-07-24Multipoint fishnet Feynman diagrams: sequential splittingFrancesco Aprile et.al.2307.12984v1nullWe study fishnet Feynman diagrams defined by a certain triangulation of a planar n-gon, with massless scalars propagating along and across the cuts. Our solution theory uses the technique of Separation of Variables, in combination with the theory of symmetric polynomials and Mellin space. The n-point split-ladders are solved by a recursion where all building blocks are made fully explicit. In particular, we find an elegant formula for the coefficient functions of the light-cone leading logs. When the diagram grows into a fishnet, we obtain new results exploiting a Cauchy identity decomposition of the measure over separated variables. This leads to an elementary proof of the Basso-Dixon formula at 4-points, while at n-points it provides a natural OPE-like stratification of the diagram. Finally, we propose an independent approach based on ``stampede" combinatorics to study the light-cone behaviour of the diagrams as the partition function of a certain vertex model.
2023-07-24Learning Dense Correspondences between Photos and SketchesXuanchen Lu et.al.2307.12967v1nullHumans effortlessly grasp the connection between sketches and real-world objects, even when these sketches are far from realistic. Moreover, human sketch understanding goes beyond categorization -- critically, it also entails understanding how individual elements within a sketch correspond to parts of the physical world it represents. What are the computational ingredients needed to support this ability? Towards answering this question, we make two contributions: first, we introduce a new sketch-photo correspondence benchmark, $\textit{PSC6k}$, containing 150K annotations of 6250 sketch-photo pairs across 125 object categories, augmenting the existing Sketchy dataset with fine-grained correspondence metadata. Second, we propose a self-supervised method for learning dense correspondences between sketch-photo pairs, building upon recent advances in correspondence learning for pairs of photos. Our model uses a spatial transformer network to estimate the warp flow between latent representations of a sketch and photo extracted by a contrastive learning-based ConvNet backbone. We found that this approach outperformed several strong baselines and produced predictions that were quantitatively consistent with other warp-based methods. However, our benchmark also revealed systematic differences between predictions of the suite of models we tested and those of humans. Taken together, our work suggests a promising path towards developing artificial systems that achieve more human-like understanding of visual images at different levels of abstraction. Project page: https://photo-sketch-correspondence.github.io
2023-07-24GridMM: Grid Memory Map for Vision-and-Language NavigationZihan Wang et.al.2307.12907v2linkVision-and-language navigation (VLN) enables the agent to navigate to a remote location following the natural language instruction in 3D environments. To represent the previously visited environment, most approaches for VLN implement memory using recurrent states, topological maps, or top-down semantic maps. In contrast to these approaches, we build the top-down egocentric and dynamically growing Grid Memory Map (i.e., GridMM) to structure the visited environment. From a global perspective, historical observations are projected into a unified grid map in a top-down view, which can better represent the spatial relations of the environment. From a local perspective, we further propose an instruction relevance aggregation method to capture fine-grained visual clues in each grid region. Extensive experiments are conducted on both the REVERIE, R2R, SOON datasets in the discrete environments, and the R2R-CE dataset in the continuous environments, showing the superiority of our proposed method.
2023-07-24Monodromy kernels for strata of translation surfacesRiccardo Giannini et.al.2307.12901v1nullThe non-hyperelliptic connected components of the strata of translation surfaces are conjectured to be orbifold classifying spaces for some groups commensurable to some mapping class groups. The topological monodromy map of the non-hyperelliptic components projects naturally to the mapping class group of the underlying punctured surface and is an obvious candidate to test commensurability. In the present article, we prove that for the components $\mathcal{H}(3,1)$ and $\mathcal{H}^{nh}(4)$ in genus 3 the monodromy map fails to demonstrate the conjectured commensurability. In particular, building on work of Wajnryb, we prove that the kernels of the monodromy maps for $\mathcal{H}(3,1)$ and $\mathcal{H}^{nh}(4)$ are large, as they contain a non-abelian free group of rank $2$
2023-07-24SoK: Design, Vulnerabilities and Defense of Cryptocurrency WalletsYimika Erinle et.al.2307.12874v2nullThe rapid growth of decentralized digital currencies, enabled by blockchain technology, has ushered in a new era of peer-to-peer transactions, revolutionizing the global economy. Cryptocurrency wallets, serving as crucial endpoints for these transactions, have become increasingly prevalent. However, the escalating value and usage of these wallets also expose them to significant security risks and challenges. This research aims to comprehensively explore the security aspects of cryptocurrency wallets. It provides a taxonomy of wallet types, analyzes their design and implementation, identifies common vulnerabilities and attacks, and discusses defense mechanisms and mitigation strategies. The taxonomy covers custodial, non-custodial, hot, and cold wallets, highlighting their unique characteristics and associated security considerations. The security analysis scrutinizes the theoretical and practical aspects of wallet design, while assessing the efficacy of existing security measures and protocols. Notable wallet attacks, such as Binance, Mt. Gox are examined to understand their causes and consequences. Furthermore, the paper surveys defense mechanisms, transaction monitoring, evaluating their effectiveness in mitigating threats.
2023-07-24A quantitative theoretical model of the boson peak based on stringlet excitationsCunyuan Jiang et.al.2307.12839v1nullThe boson peak (BP), a low-energy excess in the vibrational density of states over the phonon Debye contribution, is usually identified as one of the distinguishing features between ordered crystals and amorphous solid materials. Despite decades of efforts, its microscopic origin still remains a mystery and a consensus on its theoretical derivation has not yet been achieved. Recently, it has been proposed, and corroborated with simulations, that the BP might stem from intrinsic localized modes which involve string-like excitations ("stringlets") having a one-dimensional (1D) nature. In this work, we build on a theoretical framework originally proposed by Lund that describes the localized modes as 1D vibrating strings, but we specify the stringlet size distribution to be exponential, as observed in independent simulation studies. We show that a generalization of this framework provides an analytically prediction for the BP frequency $\omega_{BP}$ in the temperature regime well below the glass transition temperature in both 2D and 3D amorphous systems. The final result involves no free parameters and is in quantitative agreement with prior simulation observations. Additionally, this stringlet theory of the BP naturally reproduces the softening of the BP frequency upon heating and offers an analytical explanation for the experimentally observed scaling with the shear modulus in the glass state and changes in this scaling in cooled liquids. Finally, the theoretical analysis highlights the existence of a strong damping for the stringlet modes at finite temperature which leads to a large low-frequency contribution to the 3D vibrational density of states, as observed in both experiments and simulations.
2023-07-24Exposing the Troublemakers in Described Object DetectionChi Xie et.al.2307.12813v1linkDetecting objects based on language descriptions is a popular task that includes Open-Vocabulary object Detection (OVD) and Referring Expression Comprehension (REC). In this paper, we advance them to a more practical setting called Described Object Detection (DOD) by expanding category names to flexible language expressions for OVD and overcoming the limitation of REC to only grounding the pre-existing object. We establish the research foundation for DOD tasks by constructing a Description Detection Dataset ($D^3$), featuring flexible language expressions and annotating all described objects without omission. By evaluating previous SOTA methods on $D^3$, we find some troublemakers that fail current REC, OVD, and bi-functional methods. REC methods struggle with confidence scores, rejecting negative instances, and multi-target scenarios, while OVD methods face constraints with long and complex descriptions. Recent bi-functional methods also do not work well on DOD due to their separated training procedures and inference strategies for REC and OVD tasks. Building upon the aforementioned findings, we propose a baseline that largely improves REC methods by reconstructing the training data and introducing a binary classification sub-task, outperforming existing methods. Data and code is available at https://github.com/shikras/d-cube.
2023-07-24Imperfect CSI: A Key Factor of Uncertainty to Over-the-Air Federated LearningJiacheng Yao et.al.2307.12793v1nullOver-the-air computation (AirComp) has recently been identified as a prominent technique to enhance communication efficiency of wireless federated learning (FL). This letter investigates the impact of channel state information (CSI) uncertainty at the transmitter on an AirComp enabled FL (AirFL) system with the truncated channel inversion strategy. To characterize the performance of the AirFL system, the weight divergence with respect to the ideal aggregation is analytically derived to evaluate learning performance loss. We explicitly reveal that the weight divergence deteriorates as $\mathcal{O}(1/\rho^2)$ as the level of channel estimation accuracy $\rho$ vanishes, and also has a decay rate of $\mathcal{O}(1/K^2)$ with the increasing number of participating devices, $K$. Building upon our analytical results, we formulate the channel truncation threshold optimization problem to adapt to different $\rho$, which can be solved optimally. Numerical results verify the analytical results and show that a lower truncation threshold is preferred with more accurate CSI.
2023-07-24Ni-O-Ag catalyst enables 103-m2 artificial photosynthesis with >16% solar-to-chemical energy conversion efficiencyYaguang Li et.al.2307.12783v1nullHerein, NiO nanosheets supported with Ag single atoms are synthesized for photothermal CO2 hydrogenation to achieve 1065 mmol g-1 h-1 of CO production rate under 1 sun irradiation, revealing the unparalleled weak sunlight driven reverse water-gas shift reaction (RWGS) activity. This performance is attributed to the coupling effect of Ag-O-Ni sites to enhance the hydrogenation of CO2 and weaken the CO adsorption, resulting in 1434 mmol g-1 h-1 of CO yield at 300 degree, surpassing any low-temperature RWGS performances ever reported. Building on this, we integrated the 2D Ni1Ag0.02O1 supported photothermal RWGS with commercial photovoltaic electrolytic water splitting, leading to the realization of 103 m2 scale artificial photosynthesis system with a daily CO yield of 18.70 m3, a photochemical energy conversion efficiency of >16%, over 90% H2 ultilazation efficiency, outperforming other types of artificial photosynthesis. The results of this research chart a promising course for designing practical, natural sunlight-driven artificial photosynthesis systems and highly efficient platinum-free CO2 hydrogenation catalysts. This work is a significant step towards harnessing solar energy more efficiently and sustainably, opening exciting possibilities for future research and development in this area.
2023-07-24First look at data from the 13-antenna setup of GRANDProto300 in northwest ChinaPeng-Xiong Ma et.al.2307.12769v1nullThe Giant Radio Array for Neutrino Detection (GRAND) is an envisioned observatory of ultra-high-energy neutrinos, cosmic rays, and gamma rays, with energies above 100 PeV. GRAND targets the radio signals emitted by extensive air showers induced by the interaction of ultra-high-energy particles in the atmosphere, using an array of 200,000 radio antennas split into sub-arrays deployed worldwide. GRANDProto13 (GP13) is a 13-antenna demonstrator array deployed in February 2023 in the Gansu province of China, as a precursor for GRANDProto300, which will validate the detection principle of the GRAND experiment. Its goal is to measure the radio background present at the site, validate the design of the detection units and develop an autonomous radio trigger for air showers. We will describe GP13 and its operation, and show preliminary results on noise monitoring.
2023-07-24Code-Switched Urdu ASR for Noisy Telephonic Environment using Data Centric Approach with Hybrid HMM and CNN-TDNNMuhammad Danyal Khan et.al.2307.12759v1nullCall Centers have huge amount of audio data which can be used for achieving valuable business insights and transcription of phone calls is manually tedious task. An effective Automated Speech Recognition system can accurately transcribe these calls for easy search through call history for specific context and content allowing automatic call monitoring, improving QoS through keyword search and sentiment analysis. ASR for Call Center requires more robustness as telephonic environment are generally noisy. Moreover, there are many low-resourced languages that are on verge of extinction which can be preserved with help of Automatic Speech Recognition Technology. Urdu is the $10^{th}$ most widely spoken language in the world, with 231,295,440 worldwide still remains a resource constrained language in ASR. Regional call-center conversations operate in local language, with a mix of English numbers and technical terms generally causing a "code-switching" problem. Hence, this paper describes an implementation framework of a resource efficient Automatic Speech Recognition/ Speech to Text System in a noisy call-center environment using Chain Hybrid HMM and CNN-TDNN for Code-Switched Urdu Language. Using Hybrid HMM-DNN approach allowed us to utilize the advantages of Neural Network with less labelled data. Adding CNN with TDNN has shown to work better in noisy environment due to CNN's additional frequency dimension which captures extra information from noisy speech, thus improving accuracy. We collected data from various open sources and labelled some of the unlabelled data after analysing its general context and content from Urdu language as well as from commonly used words from other languages, primarily English and were able to achieve WER of 5.2% with noisy as well as clean environment in isolated words or numbers as well as in continuous spontaneous speech.
2023-07-24The ro-vibrational $ν_2$ mode spectrum of methane investigated by ultrabroadband coherent Raman spectroscopyFrancesco Mazza et.al.2307.12740v1nullWe present the first experimental application of coherent Raman spectroscopy (CRS) on the ro-vibrational $\nu_2$ mode spectrum of methane (CH$_4$). Ultrabroadband femtosecond/picosecond (fs/ps) CRS is performed in the molecular fingerprint region from 1100 to 2000 cm$^{-1}$, employing fs laser-induced filamentation as the supercontinuum generation mechanism to provide the ultrabroadband excitation pulses. We introduce a time-domain model of the CH$_4$ $\nu_2$ CRS spectrum, including all five ro-vibrational branches allowed by the selection rules $\Delta v = 1$, $\Delta J = 0$, $\pm1$, $\pm2$; the model includes collisional linewidths, computed according to a modified exponential gap scaling law and validated experimentally. The use of ultrabroadband CRS for in situ monitoring of the CH$_4$ chemistry is demonstrated in a laboratory CH$_4$/air diffusion flame: CRS measurements in the fingerprint region, performed across the laminar flame front, allow the simultaneous detection of molecular oxygen (O$_2$), carbon dioxide (CO$_2$), and molecular hydrogen (H$_2$), along with CH$_4$. Fundamental physicochemical processes, such as H$_2$ production via CH$_4$ pyrolysis, are observed through the Raman spectra of these chemical species. In addition, we demonstrate ro-vibrational CH$_4\nu_2$ CRS thermometry, and we validate it against CO$_2$ CRS measurements. The present technique offers an interesting diagnostics approach to in situ measurement of CH$_4$-rich environments, e.g., in plasma reactors for CH$_4$ pyrolysis and H$_2$ production.
2023-07-24Safety monitoring under stealthy sensor injection attacks using reachable setsCédric Escudero et.al.2307.12715v1nullStealthy sensor injection attacks are serious threats for industrial plants as they can compromise the plant's integrity without being detected by traditional fault detectors. In this manuscript, we study the possibility of revealing the presence of such attacks by monitoring only the control input. This approach consists in computing an ellipsoidal bound of the input reachable set. When the control input does not belong to this set, this means that a stealthy sensor injection attack is driving the plant to critical states. The problem of finding this ellipsoidal bound is posed as a convex optimization problem (convex cost with Linear Matrix Inequalities constraints). Our monitoring approach is tested in simulation.
2023-07-24Rates in almost sure invariance principle for nonuniformly hyperbolic mapsC Cuny et.al.2307.12714v1nullWe prove the Almost Sure Invariance Principle (ASIP) with close to optimal error rates for nonuniformly hyperbolic maps. We do not assume exponential contraction along stable leaves, therefore our result covers in particular slowly mixing invertible dynamical systems as Bunimovich flowers, billiards with flat points as in Chernov and Zhang (2005) and Wojtkowski' (1990) system of two falling balls. For these examples, the ASIP is a new result, not covered by prior works for various reasons, notably because in absence of exponential contraction along stable leaves, it is challenging to employ the so-called Sinai's trick (Sinai 1972, Bowen 1975) of reducing a nonuniformly hyperbolic system to a nonuniformly expanding one. Our strategy follows our previous papers on the ASIP for nonuniformly expanding maps, where we build a semiconjugacy to a specific renewal Markov shift and adapt the argument of Berkes, Liu and Wu (2014). The main difference is that now the Markov shift is two-sided, the observables depend on the full trajectory, both the future and the past.
2023-07-24Leveraging Large Language Models (LLMs) for Process Mining (Technical Report)Alessandro Berti et.al.2307.12701v1nullThis technical report describes the intersection of process mining and large language models (LLMs), specifically focusing on the abstraction of traditional and object-centric process mining artifacts into textual format. We introduce and explore various prompting strategies: direct answering, where the large language model directly addresses user queries; multi-prompt answering, which allows the model to incrementally build on the knowledge obtained through a series of prompts; and the generation of database queries, facilitating the validation of hypotheses against the original event log. Our assessment considers two large language models, GPT-4 and Google's Bard, under various contextual scenarios across all prompting strategies. Results indicate that these models exhibit a robust understanding of key process mining abstractions, with notable proficiency in interpreting both declarative and procedural process models. In addition, we find that both models demonstrate strong performance in the object-centric setting, which could significantly propel the advancement of the object-centric process mining discipline. Additionally, these models display a noteworthy capacity to evaluate various concepts of fairness in process mining. This opens the door to more rapid and efficient assessments of the fairness of process mining event logs, which has significant implications for the field. The integration of these large language models into process mining applications may open new avenues for exploration, innovation, and insight generation in the field.
2023-07-24Safe asynchronous mixed-choice for timed interactionsJonah Pears et.al.2307.12688v1nullMixed-choice has long been barred from models of asynchronous communication since it compromises key properties of communicating finite-state machines. Session types inherit this restriction, which precludes them from fully modelling timeouts -- a key programming feature to handle failures. To address this deficiency, we present (binary) TimeOut Asynchronous Session Types ({TOAST}) as an extension to (binary) asynchronous timed session types to permit mixed-choice. {TOAST} deploy timing constraints to regulate the use of mixed-choice so as to preserve communication safety. We provide a new behavioural semantics for {TOAST} which guarantees progress in the presence of mixed-choice. Building upon {TOAST}, we provide a calculus featuring process timers which is capable of modelling timeouts using a $\mathtt{receive\text{-}after}$ pattern, much like Erlang, and informally illustrate the correspondence with TOAST specifications.
2023-07-24Exact Global Control of Small Divisors in Rational Normal FormJianjun Liu et.al.2307.12652v1nullRational normal form is a powerful tool to deal with Hamiltonian partial differential equations without external parameters. In this paper, we build rational normal form with exact global control of small divisors. As an application to nonlinear Schr\"{o}dinger equations in Gevrey spaces, we prove sub-exponentially long time stability results for generic small initial data.
2023-07-24Execution at RISC: Stealth JOP Attacks on RISC-V ApplicationsLoïc Buckwell et.al.2307.12648v1nullRISC-V is a recently developed open instruction set architecture gaining a lot of attention. To achieve a lasting security on these systems and design efficient countermeasures, a better understanding of vulnerabilities to novel and potential future attacks is mandatory. This paper demonstrates that RISC-V is sensible to Jump-Oriented Programming, a class of complex code-reuse attacks. We provide an analysis of new dispatcher gadgets we discovered, and show how they can be used together in order to build a stealth attack, bypassing existing protections. A proof-of-concept attack is implemented on an embedded web server compiled for RISC-V, in which we introduced a vulnerability, allowing an attacker to remotely read an arbitrary file from the host machine.
2023-07-24Remote Bio-Sensing: Open Source Benchmark Framework for Fair Evaluation of rPPGDae Yeol Kim et.al.2307.12644v1linkRemote Photoplethysmography (rPPG) is a technology that utilizes the light absorption properties of hemoglobin, captured via camera, to analyze and measure blood volume pulse (BVP). By analyzing the measured BVP, various physiological signals such as heart rate, stress levels, and blood pressure can be derived, enabling applications such as the early prediction of cardiovascular diseases. rPPG is a rapidly evolving field as it allows the measurement of vital signals using camera-equipped devices without the need for additional devices such as blood pressure monitors or pulse oximeters, and without the assistance of medical experts. Despite extensive efforts and advances in this field, serious challenges remain, including issues related to skin color, camera characteristics, ambient lighting, and other sources of noise, which degrade performance accuracy. We argue that fair and evaluable benchmarking is urgently required to overcome these challenges and make any meaningful progress from both academic and commercial perspectives. In most existing work, models are trained, tested, and validated only on limited datasets. Worse still, some studies lack available code or reproducibility, making it difficult to fairly evaluate and compare performance. Therefore, the purpose of this study is to provide a benchmarking framework to evaluate various rPPG techniques across a wide range of datasets for fair evaluation and comparison, including both conventional non-deep neural network (non-DNN) and deep neural network (DNN) methods. GitHub URL: https://github.com/remotebiosensing/rppg.
2023-07-24Spectral Observations and Modeling of a Solar White-light Flare Observed by CHASEDe-Chao Song et.al.2307.12641v1nullThe heating mechanisms of solar white-light flares remain unclear. We present an X1.0 white-light flare on 2022 October 2 (SOL2022-10-02T20:25) observed by the Chinese \ha\ Solar Explorer (CHASE) that provides two-dimensional spectra in the visible light for the full solar disk with a seeing-free condition. The flare shows a prominent enhancement of $\sim$40\% in the photospheric \fe\ line at 6569.2 \AA, and the nearby continuum also exhibits a maximum enhancement of $\sim$40\%. For the continuum near the \fe\ line at 6173 \AA\ from the Helioseismic and Magnetic Imager (HMI) on board the Solar Dynamics Observatory (SDO), it is enhanced up to $\sim$20\%. At the white-light kernels, the \fe\ line at 6569.2 \AA\ has a symmetric Gaussian profile that is still in absorption and the H$\alpha$ line at 6562.8 \AA\ displays a very broad emission profile with a central reversal plus a red or blue asymmetry. The white-light kernels are co-spatial with the microwave footpoint sources observed by the Expanded Owens Valley Solar Array (EOVSA) and the time profile of the white-light emission matches that of the hard X-ray emission above 30 keV from the Gamma-ray Burst Monitor (GBM) on Fermi. These facts indicate that the white-light emission is qualitatively related to a nonthermal electron beam. We also perform a radiative hydrodynamic simulation with the electron beam parameters constrained by the hard X-ray observations from Fermi/GBM. The result reveals that the white-light enhancement cannot be well explained by a pure electron-beam heating together with its induced radiative backwarming but may need additional heating sources such as \alfven\ waves.
2023-07-24GRB 221009A: revealing a hidden afterglow during the prompt emission phase with Fermi-GBM observationsHai-Ming Zhang et.al.2307.12623v1nullRecently, LHAASO reported the detection of brightest-of-all-time GRB 221009A, revealing the early onset of a TeV afterglow. However, there is no evidence of afterglow emission at such early time at other wavelengths. Here we report the discovery of a hidden afterglow component during the prompt emission phase with Fermi Gamma-Ray Burst Monitor (GBM) observations. We analyze the spectral evolution of the X-ray/$\gamma$-ray emission of GRB 221009A measured by GBM during the dips of two prompt emission pulses (i.e., intervals $T_{0}+[300-328]\rm~s$ and $T_{0}+[338-378]\rm~s$, where $T_0$ is the GBM trigger time). We find that the spectra at the dips transit from the Band function to a power-law function, indicating a transition from the prompt emission to the afterglow. After $\sim T_{0}+ 660 \rm~s$, the spectrum is well described by a power-law function and the afterglow becomes dominant. Remarkably, the underlying afterglow emission at the dips smoothly connect with the afterglow after $\sim T_{0}+ 660 \rm~s$. The entire afterglow emission measured by GBM can be fitted by a power-law function $F\sim t^{-0.95\pm0.05}$, where $t$ is the time since the first main pulse at $T^*=T_0+226~{\rm s}$, consistent with the TeV afterglow decay measured by LHAASO. The start time of this power-law decay indicates that the afterglow peak of GRB 221009A should be earlier than $T_{0}+300 \rm ~s$. We also test the possible presence of a jet break in the early afterglow light curve, finding that both the jet break model and single power-law decay model are consistent with the GBM data. The two models can not be distinguished with the GBM data alone because the inferred jet break time is quite close to the end of GBM observations.
2023-07-24Phase Match for Out-of-Distribution GeneralizationChengming Hu et.al.2307.12622v1nullThe Fourier transform, serving as an explicit decomposition method for visual signals, has been employed to explain the out-of-distribution generalization behaviors of Convolutional Neural Networks (CNNs). Previous research and empirical studies have indicated that the amplitude spectrum plays a decisive role in CNN recognition, but it is susceptible to disturbance caused by distribution shifts. On the other hand, the phase spectrum preserves highly-structured spatial information, which is crucial for visual representation learning. In this paper, we aim to clarify the relationships between Domain Generalization (DG) and the frequency components by introducing a Fourier-based structural causal model. Specifically, we interpret the phase spectrum as semi-causal factors and the amplitude spectrum as non-causal factors. Building upon these observations, we propose Phase Match (PhaMa) to address DG problems. Our method introduces perturbations on the amplitude spectrum and establishes spatial relationships to match the phase components. Through experiments on multiple benchmarks, we demonstrate that our proposed method achieves state-of-the-art performance in domain generalization and out-of-distribution robustness tasks.
2023-07-24CTVIS: Consistent Training for Online Video Instance SegmentationKaining Ying et.al.2307.12616v1linkThe discrimination of instance embeddings plays a vital role in associating instances across time for online video instance segmentation (VIS). Instance embedding learning is directly supervised by the contrastive loss computed upon the contrastive items (CIs), which are sets of anchor/positive/negative embeddings. Recent online VIS methods leverage CIs sourced from one reference frame only, which we argue is insufficient for learning highly discriminative embeddings. Intuitively, a possible strategy to enhance CIs is replicating the inference phase during training. To this end, we propose a simple yet effective training strategy, called Consistent Training for Online VIS (CTVIS), which devotes to aligning the training and inference pipelines in terms of building CIs. Specifically, CTVIS constructs CIs by referring inference the momentum-averaged embedding and the memory bank storage mechanisms, and adding noise to the relevant embeddings. Such an extension allows a reliable comparison between embeddings of current instances and the stable representations of historical instances, thereby conferring an advantage in modeling VIS challenges such as occlusion, re-identification, and deformation. Empirically, CTVIS outstrips the SOTA VIS models by up to +5.0 points on three VIS benchmarks, including YTVIS19 (55.1% AP), YTVIS21 (50.1% AP) and OVIS (35.5% AP). Furthermore, we find that pseudo-videos transformed from images can train robust models surpassing fully-supervised ones.
2023-07-24BonnBot-I: A Precise Weed Management and Crop Monitoring PlatformAlireza Ahmadi et.al.2307.12588v1nullCultivation and weeding are two of the primary tasks performed by farmers today. A recent challenge for weeding is the desire to reduce herbicide and pesticide treatments while maintaining crop quality and quantity. In this paper we introduce BonnBot-I a precise weed management platform which can also performs field monitoring. Driven by crop monitoring approaches which can accurately locate and classify plants (weed and crop) we further improve their performance by fusing the platform available GNSS and wheel odometry. This improves tracking accuracy of our crop monitoring approach from a normalized average error of 8.3% to 3.5%, evaluated on a new publicly available corn dataset. We also present a novel arrangement of weeding tools mounted on linear actuators evaluated in simulated environments. We replicate weed distributions from a real field, using the results from our monitoring approach, and show the validity of our work-space division techniques which require significantly less movement (a 50% reduction) to achieve similar results. Overall, BonnBot-I is a significant step forward in precise weed management with a novel method of selectively spraying and controlling weeds in an arable field
2023-07-24Understanding the Governance Challenges of Public Libraries Subscribing to Digital Content DistributorsYunhee Shim et.al.2307.12569v1nullAs popular demand for digital information increases, public libraries are increasingly turning to commercial digital content distribution services to save curation time and costs. These services let libraries subscribe to pre-configured digital content packages that become instantly available wholesale to their patrons. However, these packages often contain content that does not align with the library's curation policy. We conducted interviews with 15 public librarians in the US to examine their experiences with subscribing to digital distribution services. We found that the subscribing libraries face many digital governance challenges, including the sub-par quality of received content, a lack of control in the curation process, and a limited understanding of how distribution services operate. We draw from prior HCI and social media moderation literature to contextualize and examine these challenges. Building upon our findings, we suggest how digital distributors, libraries, and lawmakers could improve digital distribution services in library settings. We offer recommendations for co-constructing a robust digital content curation policy and discuss how librarian's cooperation and well-deployed content moderation mechanisms could help enforce that policy. Our work informs the utility of future content moderation research that bridges the fields of CSCW and library science.
2023-07-24Monitoring Cascading Changes of Resources in the Kubernetes Control PlaneTomoyuki Ehira et.al.2307.12567v1nullKubernetes is a container management system that has many automated functionalities. Those functionalities are managed by configuring objects and resources in the control plane. Since most objects change their state depending on other objects' states, a change propagates to other objects in a chain. As cluster availability is influenced by the time required for these cascading changes, it is essential to make the propagations measurable and shed light on the behavior of the Kubernetes control plane. However, it is not easy because each object constantly monitors other objects' status and acts autonomously in response to their changes to play its role. In this paper, we propose a measurement system that outputs objects' change logs published from the API server in the control plane and assists in analyzing the time of cascading changes between objects by utilizing the relationships among resources. With a practical change scenario, our system is confirmed that it can measure change propagation times within a cascading change. Also, measurements on the system itself showed it has a small CPU and memory footprint.
2023-07-24Towards Video Anomaly Retrieval from Video Anomaly Detection: New Benchmarks and ModelPeng Wu et.al.2307.12545v1nullVideo anomaly detection (VAD) has been paid increasing attention due to its potential applications, its current dominant tasks focus on online detecting anomalies% at the frame level, which can be roughly interpreted as the binary or multiple event classification. However, such a setup that builds relationships between complicated anomalous events and single labels, e.g., ``vandalism'', is superficial, since single labels are deficient to characterize anomalous events. In reality, users tend to search a specific video rather than a series of approximate videos. Therefore, retrieving anomalous events using detailed descriptions is practical and positive but few researches focus on this. In this context, we propose a novel task called Video Anomaly Retrieval (VAR), which aims to pragmatically retrieve relevant anomalous videos by cross-modalities, e.g., language descriptions and synchronous audios. Unlike the current video retrieval where videos are assumed to be temporally well-trimmed with short duration, VAR is devised to retrieve long untrimmed videos which may be partially relevant to the given query. To achieve this, we present two large-scale VAR benchmarks, UCFCrime-AR and XDViolence-AR, constructed on top of prevalent anomaly datasets. Meanwhile, we design a model called Anomaly-Led Alignment Network (ALAN) for VAR. In ALAN, we propose an anomaly-led sampling to focus on key segments in long untrimmed videos. Then, we introduce an efficient pretext task to enhance semantic associations between video-text fine-grained representations. Besides, we leverage two complementary alignments to further match cross-modal contents. Experimental results on two benchmarks reveal the challenges of VAR task and also demonstrate the advantages of our tailored method.
2023-07-24Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research DirectionsZhonghui Li et.al.2307.12490v1nullOver the past few decades, significant progress has been made in quantum information technology, from theoretical studies to experimental demonstrations. Revolutionary quantum applications are now in the limelight, showcasing the advantages of quantum information technology and becoming a research hotspot in academia and industry. To enable quantum applications to have a more profound impact and wider application, the interconnection of multiple quantum nodes through quantum channels becomes essential. Building an entanglement-assisted quantum network, capable of realizing quantum information transmission between these quantum nodes, is the primary goal. However, entanglement-assisted quantum networks are governed by the unique laws of quantum mechanics, such as the superposition principle, the no-cloning theorem, and quantum entanglement, setting them apart from classical networks. Consequently, fundamental efforts are required to establish entanglement-assisted quantum networks. While some insightful surveys have paved the way for entanglement-assisted quantum networks, most of these studies focus on enabling technologies and quantum applications, neglecting critical network issues. In response, this paper presents a comprehensive survey of entanglement-assisted quantum networks. Alongside reviewing fundamental mechanics and enabling technologies, the paper provides a detailed overview of the network structure, working principles, and development stages, highlighting the differences from classical networks. Additionally, the challenges of building wide-area entanglement-assisted quantum networks are addressed. Furthermore, the paper emphasizes open research directions, including architecture design, entanglement-based network issues, and standardization, to facilitate the implementation of future entanglement-assisted quantum networks.
2023-07-24Understanding Large Language Model Based Fuzz Driver GenerationCen Zhang et.al.2307.12469v1nullFuzz drivers are a necessary component of API fuzzing. However, automatically generating correct and robust fuzz drivers is a difficult task. Compared to existing approaches, LLM-based (Large Language Model) generation is a promising direction due to its ability to operate with low requirements on consumer programs, leverage multiple dimensions of API usage information, and generate human-friendly output code. Nonetheless, the challenges and effectiveness of LLM-based fuzz driver generation remain unclear. To address this, we conducted a study on the effects, challenges, and techniques of LLM-based fuzz driver generation. Our study involved building a quiz with 86 fuzz driver generation questions from 30 popular C projects, constructing precise effectiveness validation criteria for each question, and developing a framework for semi-automated evaluation. We designed five query strategies, evaluated 36,506 generated fuzz drivers. Furthermore, the drivers were compared with manually written ones to obtain practical insights. Our evaluation revealed that: while the overall performance was promising (passing 91% of questions), there were still practical challenges in filtering out the ineffective fuzz drivers for large scale application; basic strategies achieved a decent correctness rate (53%), but struggled with complex API-specific usage questions. In such cases, example code snippets and iterative queries proved helpful; while LLM-generated drivers showed competent fuzzing outcomes compared to manually written ones, there was still significant room for improvement, such as incorporating semantic oracles for logical bugs detection.
2023-07-23Drift Models on Complex Projective Space for Electron-Nuclear Double ResonanceHenrik Wiechers et.al.2307.12414v1nullENDOR spectroscopy is an important tool to determine the complicated three-dimensional structure of biomolecules and in particular enables measurements of intramolecular distances. Usually, spectra are determined by averaging the data matrix, which does not take into account the significant thermal drifts that occur in the measurement process. In contrast, we present an asymptotic analysis for the homoscedastic drift model, a pioneering parametric model that achieves striking model fits in practice and allows both hypothesis testing and confidence intervals for spectra. The ENDOR spectrum and an orthogonal component are modeled as an element of complex projective space, and formulated in the framework of generalized Fr\'echet means. To this end, two general formulations of strong consistency for set-valued Fr\'echet means are extended and subsequently applied to the homoscedastic drift model to prove strong consistency. Building on this, central limit theorems for the ENDOR spectrum are shown. Furthermore, we extend applicability by taking into account a phase noise contribution leading to the heteroscedastic drift model. Both drift models offer improved signal-to-noise ratio over pre-existing models.
+ + + + + + + + +
+
+ + +
+ +
+ + + +
+
+
+
+ + + + + + + + + \ No newline at end of file diff --git a/search/search_index.json b/search/search_index.json new file mode 100644 index 00000000..0f106db2 --- /dev/null +++ b/search/search_index.json @@ -0,0 +1 @@ +{"config":{"lang":["en","ja"],"separator":"[\\s\\-]+","pipeline":["stopWordFilter"]},"docs":[{"location":"","title":"arxiv-daily latest papers around arxiv paper daily template","text":"

Automated deployment @ 2023-07-26 09:41:49 Asia/Shanghai

Welcome to contribute! Add your topics and keywords in topic.yml. You can also view historical data through the storage.

"},{"location":"#brand","title":"brand","text":""},{"location":"#brand_1","title":"brand","text":"Publish Date Title Authors PDF Code Abstract 2023-07-24 Multipoint fishnet Feynman diagrams: sequential splitting Francesco Aprile et.al. 2307.12984v1 null We study fishnet Feynman diagrams defined by a certain triangulation of a planar n-gon, with massless scalars propagating along and across the cuts. Our solution theory uses the technique of Separation of Variables, in combination with the theory of symmetric polynomials and Mellin space. The n-point split-ladders are solved by a recursion where all building blocks are made fully explicit. In particular, we find an elegant formula for the coefficient functions of the light-cone leading logs. When the diagram grows into a fishnet, we obtain new results exploiting a Cauchy identity decomposition of the measure over separated variables. This leads to an elementary proof of the Basso-Dixon formula at 4-points, while at n-points it provides a natural OPE-like stratification of the diagram. Finally, we propose an independent approach based on ``stampede\" combinatorics to study the light-cone behaviour of the diagrams as the partition function of a certain vertex model. 2023-07-24 Learning Dense Correspondences between Photos and Sketches Xuanchen Lu et.al. 2307.12967v1 null Humans effortlessly grasp the connection between sketches and real-world objects, even when these sketches are far from realistic. Moreover, human sketch understanding goes beyond categorization -- critically, it also entails understanding how individual elements within a sketch correspond to parts of the physical world it represents. What are the computational ingredients needed to support this ability? Towards answering this question, we make two contributions: first, we introduce a new sketch-photo correspondence benchmark, $\\textit{PSC6k}$, containing 150K annotations of 6250 sketch-photo pairs across 125 object categories, augmenting the existing Sketchy dataset with fine-grained correspondence metadata. Second, we propose a self-supervised method for learning dense correspondences between sketch-photo pairs, building upon recent advances in correspondence learning for pairs of photos. Our model uses a spatial transformer network to estimate the warp flow between latent representations of a sketch and photo extracted by a contrastive learning-based ConvNet backbone. We found that this approach outperformed several strong baselines and produced predictions that were quantitatively consistent with other warp-based methods. However, our benchmark also revealed systematic differences between predictions of the suite of models we tested and those of humans. Taken together, our work suggests a promising path towards developing artificial systems that achieve more human-like understanding of visual images at different levels of abstraction. Project page: https://photo-sketch-correspondence.github.io 2023-07-24 GridMM: Grid Memory Map for Vision-and-Language Navigation Zihan Wang et.al. 2307.12907v2 link Vision-and-language navigation (VLN) enables the agent to navigate to a remote location following the natural language instruction in 3D environments. To represent the previously visited environment, most approaches for VLN implement memory using recurrent states, topological maps, or top-down semantic maps. In contrast to these approaches, we build the top-down egocentric and dynamically growing Grid Memory Map (i.e., GridMM) to structure the visited environment. From a global perspective, historical observations are projected into a unified grid map in a top-down view, which can better represent the spatial relations of the environment. From a local perspective, we further propose an instruction relevance aggregation method to capture fine-grained visual clues in each grid region. Extensive experiments are conducted on both the REVERIE, R2R, SOON datasets in the discrete environments, and the R2R-CE dataset in the continuous environments, showing the superiority of our proposed method. 2023-07-24 Monodromy kernels for strata of translation surfaces Riccardo Giannini et.al. 2307.12901v1 null The non-hyperelliptic connected components of the strata of translation surfaces are conjectured to be orbifold classifying spaces for some groups commensurable to some mapping class groups. The topological monodromy map of the non-hyperelliptic components projects naturally to the mapping class group of the underlying punctured surface and is an obvious candidate to test commensurability. In the present article, we prove that for the components $\\mathcal{H}(3,1)$ and $\\mathcal{H}^{nh}(4)$ in genus 3 the monodromy map fails to demonstrate the conjectured commensurability. In particular, building on work of Wajnryb, we prove that the kernels of the monodromy maps for $\\mathcal{H}(3,1)$ and $\\mathcal{H}^{nh}(4)$ are large, as they contain a non-abelian free group of rank $2$ 2023-07-24 SoK: Design, Vulnerabilities and Defense of Cryptocurrency Wallets Yimika Erinle et.al. 2307.12874v2 null The rapid growth of decentralized digital currencies, enabled by blockchain technology, has ushered in a new era of peer-to-peer transactions, revolutionizing the global economy. Cryptocurrency wallets, serving as crucial endpoints for these transactions, have become increasingly prevalent. However, the escalating value and usage of these wallets also expose them to significant security risks and challenges. This research aims to comprehensively explore the security aspects of cryptocurrency wallets. It provides a taxonomy of wallet types, analyzes their design and implementation, identifies common vulnerabilities and attacks, and discusses defense mechanisms and mitigation strategies. The taxonomy covers custodial, non-custodial, hot, and cold wallets, highlighting their unique characteristics and associated security considerations. The security analysis scrutinizes the theoretical and practical aspects of wallet design, while assessing the efficacy of existing security measures and protocols. Notable wallet attacks, such as Binance, Mt. Gox are examined to understand their causes and consequences. Furthermore, the paper surveys defense mechanisms, transaction monitoring, evaluating their effectiveness in mitigating threats. 2023-07-24 A quantitative theoretical model of the boson peak based on stringlet excitations Cunyuan Jiang et.al. 2307.12839v1 null The boson peak (BP), a low-energy excess in the vibrational density of states over the phonon Debye contribution, is usually identified as one of the distinguishing features between ordered crystals and amorphous solid materials. Despite decades of efforts, its microscopic origin still remains a mystery and a consensus on its theoretical derivation has not yet been achieved. Recently, it has been proposed, and corroborated with simulations, that the BP might stem from intrinsic localized modes which involve string-like excitations (\"stringlets\") having a one-dimensional (1D) nature. In this work, we build on a theoretical framework originally proposed by Lund that describes the localized modes as 1D vibrating strings, but we specify the stringlet size distribution to be exponential, as observed in independent simulation studies. We show that a generalization of this framework provides an analytically prediction for the BP frequency $\\omega_{BP}$ in the temperature regime well below the glass transition temperature in both 2D and 3D amorphous systems. The final result involves no free parameters and is in quantitative agreement with prior simulation observations. Additionally, this stringlet theory of the BP naturally reproduces the softening of the BP frequency upon heating and offers an analytical explanation for the experimentally observed scaling with the shear modulus in the glass state and changes in this scaling in cooled liquids. Finally, the theoretical analysis highlights the existence of a strong damping for the stringlet modes at finite temperature which leads to a large low-frequency contribution to the 3D vibrational density of states, as observed in both experiments and simulations. 2023-07-24 Exposing the Troublemakers in Described Object Detection Chi Xie et.al. 2307.12813v1 link Detecting objects based on language descriptions is a popular task that includes Open-Vocabulary object Detection (OVD) and Referring Expression Comprehension (REC). In this paper, we advance them to a more practical setting called Described Object Detection (DOD) by expanding category names to flexible language expressions for OVD and overcoming the limitation of REC to only grounding the pre-existing object. We establish the research foundation for DOD tasks by constructing a Description Detection Dataset ($D^3$), featuring flexible language expressions and annotating all described objects without omission. By evaluating previous SOTA methods on $D^3$, we find some troublemakers that fail current REC, OVD, and bi-functional methods. REC methods struggle with confidence scores, rejecting negative instances, and multi-target scenarios, while OVD methods face constraints with long and complex descriptions. Recent bi-functional methods also do not work well on DOD due to their separated training procedures and inference strategies for REC and OVD tasks. Building upon the aforementioned findings, we propose a baseline that largely improves REC methods by reconstructing the training data and introducing a binary classification sub-task, outperforming existing methods. Data and code is available at https://github.com/shikras/d-cube. 2023-07-24 Imperfect CSI: A Key Factor of Uncertainty to Over-the-Air Federated Learning Jiacheng Yao et.al. 2307.12793v1 null Over-the-air computation (AirComp) has recently been identified as a prominent technique to enhance communication efficiency of wireless federated learning (FL). This letter investigates the impact of channel state information (CSI) uncertainty at the transmitter on an AirComp enabled FL (AirFL) system with the truncated channel inversion strategy. To characterize the performance of the AirFL system, the weight divergence with respect to the ideal aggregation is analytically derived to evaluate learning performance loss. We explicitly reveal that the weight divergence deteriorates as $\\mathcal{O}(1/\\rho^2)$ as the level of channel estimation accuracy $\\rho$ vanishes, and also has a decay rate of $\\mathcal{O}(1/K^2)$ with the increasing number of participating devices, $K$. Building upon our analytical results, we formulate the channel truncation threshold optimization problem to adapt to different $\\rho$, which can be solved optimally. Numerical results verify the analytical results and show that a lower truncation threshold is preferred with more accurate CSI. 2023-07-24 Ni-O-Ag catalyst enables 103-m2 artificial photosynthesis with >16% solar-to-chemical energy conversion efficiency Yaguang Li et.al. 2307.12783v1 null Herein, NiO nanosheets supported with Ag single atoms are synthesized for photothermal CO2 hydrogenation to achieve 1065 mmol g-1 h-1 of CO production rate under 1 sun irradiation, revealing the unparalleled weak sunlight driven reverse water-gas shift reaction (RWGS) activity. This performance is attributed to the coupling effect of Ag-O-Ni sites to enhance the hydrogenation of CO2 and weaken the CO adsorption, resulting in 1434 mmol g-1 h-1 of CO yield at 300 degree, surpassing any low-temperature RWGS performances ever reported. Building on this, we integrated the 2D Ni1Ag0.02O1 supported photothermal RWGS with commercial photovoltaic electrolytic water splitting, leading to the realization of 103 m2 scale artificial photosynthesis system with a daily CO yield of 18.70 m3, a photochemical energy conversion efficiency of >16%, over 90% H2 ultilazation efficiency, outperforming other types of artificial photosynthesis. The results of this research chart a promising course for designing practical, natural sunlight-driven artificial photosynthesis systems and highly efficient platinum-free CO2 hydrogenation catalysts. This work is a significant step towards harnessing solar energy more efficiently and sustainably, opening exciting possibilities for future research and development in this area. 2023-07-24 First look at data from the 13-antenna setup of GRANDProto300 in northwest China Peng-Xiong Ma et.al. 2307.12769v1 null The Giant Radio Array for Neutrino Detection (GRAND) is an envisioned observatory of ultra-high-energy neutrinos, cosmic rays, and gamma rays, with energies above 100 PeV. GRAND targets the radio signals emitted by extensive air showers induced by the interaction of ultra-high-energy particles in the atmosphere, using an array of 200,000 radio antennas split into sub-arrays deployed worldwide. GRANDProto13 (GP13) is a 13-antenna demonstrator array deployed in February 2023 in the Gansu province of China, as a precursor for GRANDProto300, which will validate the detection principle of the GRAND experiment. Its goal is to measure the radio background present at the site, validate the design of the detection units and develop an autonomous radio trigger for air showers. We will describe GP13 and its operation, and show preliminary results on noise monitoring. 2023-07-24 Code-Switched Urdu ASR for Noisy Telephonic Environment using Data Centric Approach with Hybrid HMM and CNN-TDNN Muhammad Danyal Khan et.al. 2307.12759v1 null Call Centers have huge amount of audio data which can be used for achieving valuable business insights and transcription of phone calls is manually tedious task. An effective Automated Speech Recognition system can accurately transcribe these calls for easy search through call history for specific context and content allowing automatic call monitoring, improving QoS through keyword search and sentiment analysis. ASR for Call Center requires more robustness as telephonic environment are generally noisy. Moreover, there are many low-resourced languages that are on verge of extinction which can be preserved with help of Automatic Speech Recognition Technology. Urdu is the $10^{th}$ most widely spoken language in the world, with 231,295,440 worldwide still remains a resource constrained language in ASR. Regional call-center conversations operate in local language, with a mix of English numbers and technical terms generally causing a \"code-switching\" problem. Hence, this paper describes an implementation framework of a resource efficient Automatic Speech Recognition/ Speech to Text System in a noisy call-center environment using Chain Hybrid HMM and CNN-TDNN for Code-Switched Urdu Language. Using Hybrid HMM-DNN approach allowed us to utilize the advantages of Neural Network with less labelled data. Adding CNN with TDNN has shown to work better in noisy environment due to CNN's additional frequency dimension which captures extra information from noisy speech, thus improving accuracy. We collected data from various open sources and labelled some of the unlabelled data after analysing its general context and content from Urdu language as well as from commonly used words from other languages, primarily English and were able to achieve WER of 5.2% with noisy as well as clean environment in isolated words or numbers as well as in continuous spontaneous speech. 2023-07-24 The ro-vibrational $\u03bd_2$ mode spectrum of methane investigated by ultrabroadband coherent Raman spectroscopy Francesco Mazza et.al. 2307.12740v1 null We present the first experimental application of coherent Raman spectroscopy (CRS) on the ro-vibrational $\\nu_2$ mode spectrum of methane (CH$_4$). Ultrabroadband femtosecond/picosecond (fs/ps) CRS is performed in the molecular fingerprint region from 1100 to 2000 cm$^{-1}$, employing fs laser-induced filamentation as the supercontinuum generation mechanism to provide the ultrabroadband excitation pulses. We introduce a time-domain model of the CH$_4$ $\\nu_2$ CRS spectrum, including all five ro-vibrational branches allowed by the selection rules $\\Delta v = 1$, $\\Delta J = 0$, $\\pm1$, $\\pm2$; the model includes collisional linewidths, computed according to a modified exponential gap scaling law and validated experimentally. The use of ultrabroadband CRS for in situ monitoring of the CH$_4$ chemistry is demonstrated in a laboratory CH$_4$/air diffusion flame: CRS measurements in the fingerprint region, performed across the laminar flame front, allow the simultaneous detection of molecular oxygen (O$_2$), carbon dioxide (CO$_2$), and molecular hydrogen (H$_2$), along with CH$_4$. Fundamental physicochemical processes, such as H$_2$ production via CH$_4$ pyrolysis, are observed through the Raman spectra of these chemical species. In addition, we demonstrate ro-vibrational CH$_4\\nu_2$ CRS thermometry, and we validate it against CO$_2$ CRS measurements. The present technique offers an interesting diagnostics approach to in situ measurement of CH$_4$-rich environments, e.g., in plasma reactors for CH$_4$ pyrolysis and H$_2$ production. 2023-07-24 Safety monitoring under stealthy sensor injection attacks using reachable sets C\u00e9dric Escudero et.al. 2307.12715v1 null Stealthy sensor injection attacks are serious threats for industrial plants as they can compromise the plant's integrity without being detected by traditional fault detectors. In this manuscript, we study the possibility of revealing the presence of such attacks by monitoring only the control input. This approach consists in computing an ellipsoidal bound of the input reachable set. When the control input does not belong to this set, this means that a stealthy sensor injection attack is driving the plant to critical states. The problem of finding this ellipsoidal bound is posed as a convex optimization problem (convex cost with Linear Matrix Inequalities constraints). Our monitoring approach is tested in simulation. 2023-07-24 Rates in almost sure invariance principle for nonuniformly hyperbolic maps C Cuny et.al. 2307.12714v1 null We prove the Almost Sure Invariance Principle (ASIP) with close to optimal error rates for nonuniformly hyperbolic maps. We do not assume exponential contraction along stable leaves, therefore our result covers in particular slowly mixing invertible dynamical systems as Bunimovich flowers, billiards with flat points as in Chernov and Zhang (2005) and Wojtkowski' (1990) system of two falling balls. For these examples, the ASIP is a new result, not covered by prior works for various reasons, notably because in absence of exponential contraction along stable leaves, it is challenging to employ the so-called Sinai's trick (Sinai 1972, Bowen 1975) of reducing a nonuniformly hyperbolic system to a nonuniformly expanding one. Our strategy follows our previous papers on the ASIP for nonuniformly expanding maps, where we build a semiconjugacy to a specific renewal Markov shift and adapt the argument of Berkes, Liu and Wu (2014). The main difference is that now the Markov shift is two-sided, the observables depend on the full trajectory, both the future and the past. 2023-07-24 Leveraging Large Language Models (LLMs) for Process Mining (Technical Report) Alessandro Berti et.al. 2307.12701v1 null This technical report describes the intersection of process mining and large language models (LLMs), specifically focusing on the abstraction of traditional and object-centric process mining artifacts into textual format. We introduce and explore various prompting strategies: direct answering, where the large language model directly addresses user queries; multi-prompt answering, which allows the model to incrementally build on the knowledge obtained through a series of prompts; and the generation of database queries, facilitating the validation of hypotheses against the original event log. Our assessment considers two large language models, GPT-4 and Google's Bard, under various contextual scenarios across all prompting strategies. Results indicate that these models exhibit a robust understanding of key process mining abstractions, with notable proficiency in interpreting both declarative and procedural process models. In addition, we find that both models demonstrate strong performance in the object-centric setting, which could significantly propel the advancement of the object-centric process mining discipline. Additionally, these models display a noteworthy capacity to evaluate various concepts of fairness in process mining. This opens the door to more rapid and efficient assessments of the fairness of process mining event logs, which has significant implications for the field. The integration of these large language models into process mining applications may open new avenues for exploration, innovation, and insight generation in the field. 2023-07-24 Safe asynchronous mixed-choice for timed interactions Jonah Pears et.al. 2307.12688v1 null Mixed-choice has long been barred from models of asynchronous communication since it compromises key properties of communicating finite-state machines. Session types inherit this restriction, which precludes them from fully modelling timeouts -- a key programming feature to handle failures. To address this deficiency, we present (binary) TimeOut Asynchronous Session Types ({TOAST}) as an extension to (binary) asynchronous timed session types to permit mixed-choice. {TOAST} deploy timing constraints to regulate the use of mixed-choice so as to preserve communication safety. We provide a new behavioural semantics for {TOAST} which guarantees progress in the presence of mixed-choice. Building upon {TOAST}, we provide a calculus featuring process timers which is capable of modelling timeouts using a $\\mathtt{receive\\text{-}after}$ pattern, much like Erlang, and informally illustrate the correspondence with TOAST specifications. 2023-07-24 Exact Global Control of Small Divisors in Rational Normal Form Jianjun Liu et.al. 2307.12652v1 null Rational normal form is a powerful tool to deal with Hamiltonian partial differential equations without external parameters. In this paper, we build rational normal form with exact global control of small divisors. As an application to nonlinear Schr\\\"{o}dinger equations in Gevrey spaces, we prove sub-exponentially long time stability results for generic small initial data. 2023-07-24 Execution at RISC: Stealth JOP Attacks on RISC-V Applications Lo\u00efc Buckwell et.al. 2307.12648v1 null RISC-V is a recently developed open instruction set architecture gaining a lot of attention. To achieve a lasting security on these systems and design efficient countermeasures, a better understanding of vulnerabilities to novel and potential future attacks is mandatory. This paper demonstrates that RISC-V is sensible to Jump-Oriented Programming, a class of complex code-reuse attacks. We provide an analysis of new dispatcher gadgets we discovered, and show how they can be used together in order to build a stealth attack, bypassing existing protections. A proof-of-concept attack is implemented on an embedded web server compiled for RISC-V, in which we introduced a vulnerability, allowing an attacker to remotely read an arbitrary file from the host machine. 2023-07-24 Remote Bio-Sensing: Open Source Benchmark Framework for Fair Evaluation of rPPG Dae Yeol Kim et.al. 2307.12644v1 link Remote Photoplethysmography (rPPG) is a technology that utilizes the light absorption properties of hemoglobin, captured via camera, to analyze and measure blood volume pulse (BVP). By analyzing the measured BVP, various physiological signals such as heart rate, stress levels, and blood pressure can be derived, enabling applications such as the early prediction of cardiovascular diseases. rPPG is a rapidly evolving field as it allows the measurement of vital signals using camera-equipped devices without the need for additional devices such as blood pressure monitors or pulse oximeters, and without the assistance of medical experts. Despite extensive efforts and advances in this field, serious challenges remain, including issues related to skin color, camera characteristics, ambient lighting, and other sources of noise, which degrade performance accuracy. We argue that fair and evaluable benchmarking is urgently required to overcome these challenges and make any meaningful progress from both academic and commercial perspectives. In most existing work, models are trained, tested, and validated only on limited datasets. Worse still, some studies lack available code or reproducibility, making it difficult to fairly evaluate and compare performance. Therefore, the purpose of this study is to provide a benchmarking framework to evaluate various rPPG techniques across a wide range of datasets for fair evaluation and comparison, including both conventional non-deep neural network (non-DNN) and deep neural network (DNN) methods. GitHub URL: https://github.com/remotebiosensing/rppg. 2023-07-24 Spectral Observations and Modeling of a Solar White-light Flare Observed by CHASE De-Chao Song et.al. 2307.12641v1 null The heating mechanisms of solar white-light flares remain unclear. We present an X1.0 white-light flare on 2022 October 2 (SOL2022-10-02T20:25) observed by the Chinese \\ha\\ Solar Explorer (CHASE) that provides two-dimensional spectra in the visible light for the full solar disk with a seeing-free condition. The flare shows a prominent enhancement of $\\sim$40\\% in the photospheric \\fe\\ line at 6569.2 \\AA, and the nearby continuum also exhibits a maximum enhancement of $\\sim$40\\%. For the continuum near the \\fe\\ line at 6173 \\AA\\ from the Helioseismic and Magnetic Imager (HMI) on board the Solar Dynamics Observatory (SDO), it is enhanced up to $\\sim$20\\%. At the white-light kernels, the \\fe\\ line at 6569.2 \\AA\\ has a symmetric Gaussian profile that is still in absorption and the H$\\alpha$ line at 6562.8 \\AA\\ displays a very broad emission profile with a central reversal plus a red or blue asymmetry. The white-light kernels are co-spatial with the microwave footpoint sources observed by the Expanded Owens Valley Solar Array (EOVSA) and the time profile of the white-light emission matches that of the hard X-ray emission above 30 keV from the Gamma-ray Burst Monitor (GBM) on Fermi. These facts indicate that the white-light emission is qualitatively related to a nonthermal electron beam. We also perform a radiative hydrodynamic simulation with the electron beam parameters constrained by the hard X-ray observations from Fermi/GBM. The result reveals that the white-light enhancement cannot be well explained by a pure electron-beam heating together with its induced radiative backwarming but may need additional heating sources such as \\alfven\\ waves. 2023-07-24 GRB 221009A: revealing a hidden afterglow during the prompt emission phase with Fermi-GBM observations Hai-Ming Zhang et.al. 2307.12623v1 null Recently, LHAASO reported the detection of brightest-of-all-time GRB 221009A, revealing the early onset of a TeV afterglow. However, there is no evidence of afterglow emission at such early time at other wavelengths. Here we report the discovery of a hidden afterglow component during the prompt emission phase with Fermi Gamma-Ray Burst Monitor (GBM) observations. We analyze the spectral evolution of the X-ray/$\\gamma$-ray emission of GRB 221009A measured by GBM during the dips of two prompt emission pulses (i.e., intervals $T_{0}+[300-328]\\rm~s$ and $T_{0}+[338-378]\\rm~s$, where $T_0$ is the GBM trigger time). We find that the spectra at the dips transit from the Band function to a power-law function, indicating a transition from the prompt emission to the afterglow. After $\\sim T_{0}+ 660 \\rm~s$, the spectrum is well described by a power-law function and the afterglow becomes dominant. Remarkably, the underlying afterglow emission at the dips smoothly connect with the afterglow after $\\sim T_{0}+ 660 \\rm~s$. The entire afterglow emission measured by GBM can be fitted by a power-law function $F\\sim t^{-0.95\\pm0.05}$, where $t$ is the time since the first main pulse at $T^*=T_0+226~{\\rm s}$, consistent with the TeV afterglow decay measured by LHAASO. The start time of this power-law decay indicates that the afterglow peak of GRB 221009A should be earlier than $T_{0}+300 \\rm ~s$. We also test the possible presence of a jet break in the early afterglow light curve, finding that both the jet break model and single power-law decay model are consistent with the GBM data. The two models can not be distinguished with the GBM data alone because the inferred jet break time is quite close to the end of GBM observations. 2023-07-24 Phase Match for Out-of-Distribution Generalization Chengming Hu et.al. 2307.12622v1 null The Fourier transform, serving as an explicit decomposition method for visual signals, has been employed to explain the out-of-distribution generalization behaviors of Convolutional Neural Networks (CNNs). Previous research and empirical studies have indicated that the amplitude spectrum plays a decisive role in CNN recognition, but it is susceptible to disturbance caused by distribution shifts. On the other hand, the phase spectrum preserves highly-structured spatial information, which is crucial for visual representation learning. In this paper, we aim to clarify the relationships between Domain Generalization (DG) and the frequency components by introducing a Fourier-based structural causal model. Specifically, we interpret the phase spectrum as semi-causal factors and the amplitude spectrum as non-causal factors. Building upon these observations, we propose Phase Match (PhaMa) to address DG problems. Our method introduces perturbations on the amplitude spectrum and establishes spatial relationships to match the phase components. Through experiments on multiple benchmarks, we demonstrate that our proposed method achieves state-of-the-art performance in domain generalization and out-of-distribution robustness tasks. 2023-07-24 CTVIS: Consistent Training for Online Video Instance Segmentation Kaining Ying et.al. 2307.12616v1 link The discrimination of instance embeddings plays a vital role in associating instances across time for online video instance segmentation (VIS). Instance embedding learning is directly supervised by the contrastive loss computed upon the contrastive items (CIs), which are sets of anchor/positive/negative embeddings. Recent online VIS methods leverage CIs sourced from one reference frame only, which we argue is insufficient for learning highly discriminative embeddings. Intuitively, a possible strategy to enhance CIs is replicating the inference phase during training. To this end, we propose a simple yet effective training strategy, called Consistent Training for Online VIS (CTVIS), which devotes to aligning the training and inference pipelines in terms of building CIs. Specifically, CTVIS constructs CIs by referring inference the momentum-averaged embedding and the memory bank storage mechanisms, and adding noise to the relevant embeddings. Such an extension allows a reliable comparison between embeddings of current instances and the stable representations of historical instances, thereby conferring an advantage in modeling VIS challenges such as occlusion, re-identification, and deformation. Empirically, CTVIS outstrips the SOTA VIS models by up to +5.0 points on three VIS benchmarks, including YTVIS19 (55.1% AP), YTVIS21 (50.1% AP) and OVIS (35.5% AP). Furthermore, we find that pseudo-videos transformed from images can train robust models surpassing fully-supervised ones. 2023-07-24 BonnBot-I: A Precise Weed Management and Crop Monitoring Platform Alireza Ahmadi et.al. 2307.12588v1 null Cultivation and weeding are two of the primary tasks performed by farmers today. A recent challenge for weeding is the desire to reduce herbicide and pesticide treatments while maintaining crop quality and quantity. In this paper we introduce BonnBot-I a precise weed management platform which can also performs field monitoring. Driven by crop monitoring approaches which can accurately locate and classify plants (weed and crop) we further improve their performance by fusing the platform available GNSS and wheel odometry. This improves tracking accuracy of our crop monitoring approach from a normalized average error of 8.3% to 3.5%, evaluated on a new publicly available corn dataset. We also present a novel arrangement of weeding tools mounted on linear actuators evaluated in simulated environments. We replicate weed distributions from a real field, using the results from our monitoring approach, and show the validity of our work-space division techniques which require significantly less movement (a 50% reduction) to achieve similar results. Overall, BonnBot-I is a significant step forward in precise weed management with a novel method of selectively spraying and controlling weeds in an arable field 2023-07-24 Understanding the Governance Challenges of Public Libraries Subscribing to Digital Content Distributors Yunhee Shim et.al. 2307.12569v1 null As popular demand for digital information increases, public libraries are increasingly turning to commercial digital content distribution services to save curation time and costs. These services let libraries subscribe to pre-configured digital content packages that become instantly available wholesale to their patrons. However, these packages often contain content that does not align with the library's curation policy. We conducted interviews with 15 public librarians in the US to examine their experiences with subscribing to digital distribution services. We found that the subscribing libraries face many digital governance challenges, including the sub-par quality of received content, a lack of control in the curation process, and a limited understanding of how distribution services operate. We draw from prior HCI and social media moderation literature to contextualize and examine these challenges. Building upon our findings, we suggest how digital distributors, libraries, and lawmakers could improve digital distribution services in library settings. We offer recommendations for co-constructing a robust digital content curation policy and discuss how librarian's cooperation and well-deployed content moderation mechanisms could help enforce that policy. Our work informs the utility of future content moderation research that bridges the fields of CSCW and library science. 2023-07-24 Monitoring Cascading Changes of Resources in the Kubernetes Control Plane Tomoyuki Ehira et.al. 2307.12567v1 null Kubernetes is a container management system that has many automated functionalities. Those functionalities are managed by configuring objects and resources in the control plane. Since most objects change their state depending on other objects' states, a change propagates to other objects in a chain. As cluster availability is influenced by the time required for these cascading changes, it is essential to make the propagations measurable and shed light on the behavior of the Kubernetes control plane. However, it is not easy because each object constantly monitors other objects' status and acts autonomously in response to their changes to play its role. In this paper, we propose a measurement system that outputs objects' change logs published from the API server in the control plane and assists in analyzing the time of cascading changes between objects by utilizing the relationships among resources. With a practical change scenario, our system is confirmed that it can measure change propagation times within a cascading change. Also, measurements on the system itself showed it has a small CPU and memory footprint. 2023-07-24 Towards Video Anomaly Retrieval from Video Anomaly Detection: New Benchmarks and Model Peng Wu et.al. 2307.12545v1 null Video anomaly detection (VAD) has been paid increasing attention due to its potential applications, its current dominant tasks focus on online detecting anomalies% at the frame level, which can be roughly interpreted as the binary or multiple event classification. However, such a setup that builds relationships between complicated anomalous events and single labels, e.g., ``vandalism'', is superficial, since single labels are deficient to characterize anomalous events. In reality, users tend to search a specific video rather than a series of approximate videos. Therefore, retrieving anomalous events using detailed descriptions is practical and positive but few researches focus on this. In this context, we propose a novel task called Video Anomaly Retrieval (VAR), which aims to pragmatically retrieve relevant anomalous videos by cross-modalities, e.g., language descriptions and synchronous audios. Unlike the current video retrieval where videos are assumed to be temporally well-trimmed with short duration, VAR is devised to retrieve long untrimmed videos which may be partially relevant to the given query. To achieve this, we present two large-scale VAR benchmarks, UCFCrime-AR and XDViolence-AR, constructed on top of prevalent anomaly datasets. Meanwhile, we design a model called Anomaly-Led Alignment Network (ALAN) for VAR. In ALAN, we propose an anomaly-led sampling to focus on key segments in long untrimmed videos. Then, we introduce an efficient pretext task to enhance semantic associations between video-text fine-grained representations. Besides, we leverage two complementary alignments to further match cross-modal contents. Experimental results on two benchmarks reveal the challenges of VAR task and also demonstrate the advantages of our tailored method. 2023-07-24 Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions Zhonghui Li et.al. 2307.12490v1 null Over the past few decades, significant progress has been made in quantum information technology, from theoretical studies to experimental demonstrations. Revolutionary quantum applications are now in the limelight, showcasing the advantages of quantum information technology and becoming a research hotspot in academia and industry. To enable quantum applications to have a more profound impact and wider application, the interconnection of multiple quantum nodes through quantum channels becomes essential. Building an entanglement-assisted quantum network, capable of realizing quantum information transmission between these quantum nodes, is the primary goal. However, entanglement-assisted quantum networks are governed by the unique laws of quantum mechanics, such as the superposition principle, the no-cloning theorem, and quantum entanglement, setting them apart from classical networks. Consequently, fundamental efforts are required to establish entanglement-assisted quantum networks. While some insightful surveys have paved the way for entanglement-assisted quantum networks, most of these studies focus on enabling technologies and quantum applications, neglecting critical network issues. In response, this paper presents a comprehensive survey of entanglement-assisted quantum networks. Alongside reviewing fundamental mechanics and enabling technologies, the paper provides a detailed overview of the network structure, working principles, and development stages, highlighting the differences from classical networks. Additionally, the challenges of building wide-area entanglement-assisted quantum networks are addressed. Furthermore, the paper emphasizes open research directions, including architecture design, entanglement-based network issues, and standardization, to facilitate the implementation of future entanglement-assisted quantum networks. 2023-07-24 Understanding Large Language Model Based Fuzz Driver Generation Cen Zhang et.al. 2307.12469v1 null Fuzz drivers are a necessary component of API fuzzing. However, automatically generating correct and robust fuzz drivers is a difficult task. Compared to existing approaches, LLM-based (Large Language Model) generation is a promising direction due to its ability to operate with low requirements on consumer programs, leverage multiple dimensions of API usage information, and generate human-friendly output code. Nonetheless, the challenges and effectiveness of LLM-based fuzz driver generation remain unclear. To address this, we conducted a study on the effects, challenges, and techniques of LLM-based fuzz driver generation. Our study involved building a quiz with 86 fuzz driver generation questions from 30 popular C projects, constructing precise effectiveness validation criteria for each question, and developing a framework for semi-automated evaluation. We designed five query strategies, evaluated 36,506 generated fuzz drivers. Furthermore, the drivers were compared with manually written ones to obtain practical insights. Our evaluation revealed that: while the overall performance was promising (passing 91% of questions), there were still practical challenges in filtering out the ineffective fuzz drivers for large scale application; basic strategies achieved a decent correctness rate (53%), but struggled with complex API-specific usage questions. In such cases, example code snippets and iterative queries proved helpful; while LLM-generated drivers showed competent fuzzing outcomes compared to manually written ones, there was still significant room for improvement, such as incorporating semantic oracles for logical bugs detection. 2023-07-23 Drift Models on Complex Projective Space for Electron-Nuclear Double Resonance Henrik Wiechers et.al. 2307.12414v1 null ENDOR spectroscopy is an important tool to determine the complicated three-dimensional structure of biomolecules and in particular enables measurements of intramolecular distances. Usually, spectra are determined by averaging the data matrix, which does not take into account the significant thermal drifts that occur in the measurement process. In contrast, we present an asymptotic analysis for the homoscedastic drift model, a pioneering parametric model that achieves striking model fits in practice and allows both hypothesis testing and confidence intervals for spectra. The ENDOR spectrum and an orthogonal component are modeled as an element of complex projective space, and formulated in the framework of generalized Fr\\'echet means. To this end, two general formulations of strong consistency for set-valued Fr\\'echet means are extended and subsequently applied to the homoscedastic drift model to prove strong consistency. Building on this, central limit theorems for the ENDOR spectrum are shown. Furthermore, we extend applicability by taking into account a phase noise contribution leading to the heteroscedastic drift model. Both drift models offer improved signal-to-noise ratio over pre-existing models."},{"location":"brand/brand/","title":"Brand","text":""},{"location":"brand/brand/#brand","title":"brand","text":"Publish Date Title Authors PDF Code Abstract 2023-07-24 Multipoint fishnet Feynman diagrams: sequential splitting Francesco Aprile et.al. 2307.12984v1 null We study fishnet Feynman diagrams defined by a certain triangulation of a planar n-gon, with massless scalars propagating along and across the cuts. Our solution theory uses the technique of Separation of Variables, in combination with the theory of symmetric polynomials and Mellin space. The n-point split-ladders are solved by a recursion where all building blocks are made fully explicit. In particular, we find an elegant formula for the coefficient functions of the light-cone leading logs. When the diagram grows into a fishnet, we obtain new results exploiting a Cauchy identity decomposition of the measure over separated variables. This leads to an elementary proof of the Basso-Dixon formula at 4-points, while at n-points it provides a natural OPE-like stratification of the diagram. Finally, we propose an independent approach based on ``stampede\" combinatorics to study the light-cone behaviour of the diagrams as the partition function of a certain vertex model. 2023-07-24 Learning Dense Correspondences between Photos and Sketches Xuanchen Lu et.al. 2307.12967v1 null Humans effortlessly grasp the connection between sketches and real-world objects, even when these sketches are far from realistic. Moreover, human sketch understanding goes beyond categorization -- critically, it also entails understanding how individual elements within a sketch correspond to parts of the physical world it represents. What are the computational ingredients needed to support this ability? Towards answering this question, we make two contributions: first, we introduce a new sketch-photo correspondence benchmark, $\\textit{PSC6k}$, containing 150K annotations of 6250 sketch-photo pairs across 125 object categories, augmenting the existing Sketchy dataset with fine-grained correspondence metadata. Second, we propose a self-supervised method for learning dense correspondences between sketch-photo pairs, building upon recent advances in correspondence learning for pairs of photos. Our model uses a spatial transformer network to estimate the warp flow between latent representations of a sketch and photo extracted by a contrastive learning-based ConvNet backbone. We found that this approach outperformed several strong baselines and produced predictions that were quantitatively consistent with other warp-based methods. However, our benchmark also revealed systematic differences between predictions of the suite of models we tested and those of humans. Taken together, our work suggests a promising path towards developing artificial systems that achieve more human-like understanding of visual images at different levels of abstraction. Project page: https://photo-sketch-correspondence.github.io 2023-07-24 GridMM: Grid Memory Map for Vision-and-Language Navigation Zihan Wang et.al. 2307.12907v2 link Vision-and-language navigation (VLN) enables the agent to navigate to a remote location following the natural language instruction in 3D environments. To represent the previously visited environment, most approaches for VLN implement memory using recurrent states, topological maps, or top-down semantic maps. In contrast to these approaches, we build the top-down egocentric and dynamically growing Grid Memory Map (i.e., GridMM) to structure the visited environment. From a global perspective, historical observations are projected into a unified grid map in a top-down view, which can better represent the spatial relations of the environment. From a local perspective, we further propose an instruction relevance aggregation method to capture fine-grained visual clues in each grid region. Extensive experiments are conducted on both the REVERIE, R2R, SOON datasets in the discrete environments, and the R2R-CE dataset in the continuous environments, showing the superiority of our proposed method. 2023-07-24 Monodromy kernels for strata of translation surfaces Riccardo Giannini et.al. 2307.12901v1 null The non-hyperelliptic connected components of the strata of translation surfaces are conjectured to be orbifold classifying spaces for some groups commensurable to some mapping class groups. The topological monodromy map of the non-hyperelliptic components projects naturally to the mapping class group of the underlying punctured surface and is an obvious candidate to test commensurability. In the present article, we prove that for the components $\\mathcal{H}(3,1)$ and $\\mathcal{H}^{nh}(4)$ in genus 3 the monodromy map fails to demonstrate the conjectured commensurability. In particular, building on work of Wajnryb, we prove that the kernels of the monodromy maps for $\\mathcal{H}(3,1)$ and $\\mathcal{H}^{nh}(4)$ are large, as they contain a non-abelian free group of rank $2$ 2023-07-24 SoK: Design, Vulnerabilities and Defense of Cryptocurrency Wallets Yimika Erinle et.al. 2307.12874v2 null The rapid growth of decentralized digital currencies, enabled by blockchain technology, has ushered in a new era of peer-to-peer transactions, revolutionizing the global economy. Cryptocurrency wallets, serving as crucial endpoints for these transactions, have become increasingly prevalent. However, the escalating value and usage of these wallets also expose them to significant security risks and challenges. This research aims to comprehensively explore the security aspects of cryptocurrency wallets. It provides a taxonomy of wallet types, analyzes their design and implementation, identifies common vulnerabilities and attacks, and discusses defense mechanisms and mitigation strategies. The taxonomy covers custodial, non-custodial, hot, and cold wallets, highlighting their unique characteristics and associated security considerations. The security analysis scrutinizes the theoretical and practical aspects of wallet design, while assessing the efficacy of existing security measures and protocols. Notable wallet attacks, such as Binance, Mt. Gox are examined to understand their causes and consequences. Furthermore, the paper surveys defense mechanisms, transaction monitoring, evaluating their effectiveness in mitigating threats. 2023-07-24 A quantitative theoretical model of the boson peak based on stringlet excitations Cunyuan Jiang et.al. 2307.12839v1 null The boson peak (BP), a low-energy excess in the vibrational density of states over the phonon Debye contribution, is usually identified as one of the distinguishing features between ordered crystals and amorphous solid materials. Despite decades of efforts, its microscopic origin still remains a mystery and a consensus on its theoretical derivation has not yet been achieved. Recently, it has been proposed, and corroborated with simulations, that the BP might stem from intrinsic localized modes which involve string-like excitations (\"stringlets\") having a one-dimensional (1D) nature. In this work, we build on a theoretical framework originally proposed by Lund that describes the localized modes as 1D vibrating strings, but we specify the stringlet size distribution to be exponential, as observed in independent simulation studies. We show that a generalization of this framework provides an analytically prediction for the BP frequency $\\omega_{BP}$ in the temperature regime well below the glass transition temperature in both 2D and 3D amorphous systems. The final result involves no free parameters and is in quantitative agreement with prior simulation observations. Additionally, this stringlet theory of the BP naturally reproduces the softening of the BP frequency upon heating and offers an analytical explanation for the experimentally observed scaling with the shear modulus in the glass state and changes in this scaling in cooled liquids. Finally, the theoretical analysis highlights the existence of a strong damping for the stringlet modes at finite temperature which leads to a large low-frequency contribution to the 3D vibrational density of states, as observed in both experiments and simulations. 2023-07-24 Exposing the Troublemakers in Described Object Detection Chi Xie et.al. 2307.12813v1 link Detecting objects based on language descriptions is a popular task that includes Open-Vocabulary object Detection (OVD) and Referring Expression Comprehension (REC). In this paper, we advance them to a more practical setting called Described Object Detection (DOD) by expanding category names to flexible language expressions for OVD and overcoming the limitation of REC to only grounding the pre-existing object. We establish the research foundation for DOD tasks by constructing a Description Detection Dataset ($D^3$), featuring flexible language expressions and annotating all described objects without omission. By evaluating previous SOTA methods on $D^3$, we find some troublemakers that fail current REC, OVD, and bi-functional methods. REC methods struggle with confidence scores, rejecting negative instances, and multi-target scenarios, while OVD methods face constraints with long and complex descriptions. Recent bi-functional methods also do not work well on DOD due to their separated training procedures and inference strategies for REC and OVD tasks. Building upon the aforementioned findings, we propose a baseline that largely improves REC methods by reconstructing the training data and introducing a binary classification sub-task, outperforming existing methods. Data and code is available at https://github.com/shikras/d-cube. 2023-07-24 Imperfect CSI: A Key Factor of Uncertainty to Over-the-Air Federated Learning Jiacheng Yao et.al. 2307.12793v1 null Over-the-air computation (AirComp) has recently been identified as a prominent technique to enhance communication efficiency of wireless federated learning (FL). This letter investigates the impact of channel state information (CSI) uncertainty at the transmitter on an AirComp enabled FL (AirFL) system with the truncated channel inversion strategy. To characterize the performance of the AirFL system, the weight divergence with respect to the ideal aggregation is analytically derived to evaluate learning performance loss. We explicitly reveal that the weight divergence deteriorates as $\\mathcal{O}(1/\\rho^2)$ as the level of channel estimation accuracy $\\rho$ vanishes, and also has a decay rate of $\\mathcal{O}(1/K^2)$ with the increasing number of participating devices, $K$. Building upon our analytical results, we formulate the channel truncation threshold optimization problem to adapt to different $\\rho$, which can be solved optimally. Numerical results verify the analytical results and show that a lower truncation threshold is preferred with more accurate CSI. 2023-07-24 Ni-O-Ag catalyst enables 103-m2 artificial photosynthesis with >16% solar-to-chemical energy conversion efficiency Yaguang Li et.al. 2307.12783v1 null Herein, NiO nanosheets supported with Ag single atoms are synthesized for photothermal CO2 hydrogenation to achieve 1065 mmol g-1 h-1 of CO production rate under 1 sun irradiation, revealing the unparalleled weak sunlight driven reverse water-gas shift reaction (RWGS) activity. This performance is attributed to the coupling effect of Ag-O-Ni sites to enhance the hydrogenation of CO2 and weaken the CO adsorption, resulting in 1434 mmol g-1 h-1 of CO yield at 300 degree, surpassing any low-temperature RWGS performances ever reported. Building on this, we integrated the 2D Ni1Ag0.02O1 supported photothermal RWGS with commercial photovoltaic electrolytic water splitting, leading to the realization of 103 m2 scale artificial photosynthesis system with a daily CO yield of 18.70 m3, a photochemical energy conversion efficiency of >16%, over 90% H2 ultilazation efficiency, outperforming other types of artificial photosynthesis. The results of this research chart a promising course for designing practical, natural sunlight-driven artificial photosynthesis systems and highly efficient platinum-free CO2 hydrogenation catalysts. This work is a significant step towards harnessing solar energy more efficiently and sustainably, opening exciting possibilities for future research and development in this area. 2023-07-24 First look at data from the 13-antenna setup of GRANDProto300 in northwest China Peng-Xiong Ma et.al. 2307.12769v1 null The Giant Radio Array for Neutrino Detection (GRAND) is an envisioned observatory of ultra-high-energy neutrinos, cosmic rays, and gamma rays, with energies above 100 PeV. GRAND targets the radio signals emitted by extensive air showers induced by the interaction of ultra-high-energy particles in the atmosphere, using an array of 200,000 radio antennas split into sub-arrays deployed worldwide. GRANDProto13 (GP13) is a 13-antenna demonstrator array deployed in February 2023 in the Gansu province of China, as a precursor for GRANDProto300, which will validate the detection principle of the GRAND experiment. Its goal is to measure the radio background present at the site, validate the design of the detection units and develop an autonomous radio trigger for air showers. We will describe GP13 and its operation, and show preliminary results on noise monitoring. 2023-07-24 Code-Switched Urdu ASR for Noisy Telephonic Environment using Data Centric Approach with Hybrid HMM and CNN-TDNN Muhammad Danyal Khan et.al. 2307.12759v1 null Call Centers have huge amount of audio data which can be used for achieving valuable business insights and transcription of phone calls is manually tedious task. An effective Automated Speech Recognition system can accurately transcribe these calls for easy search through call history for specific context and content allowing automatic call monitoring, improving QoS through keyword search and sentiment analysis. ASR for Call Center requires more robustness as telephonic environment are generally noisy. Moreover, there are many low-resourced languages that are on verge of extinction which can be preserved with help of Automatic Speech Recognition Technology. Urdu is the $10^{th}$ most widely spoken language in the world, with 231,295,440 worldwide still remains a resource constrained language in ASR. Regional call-center conversations operate in local language, with a mix of English numbers and technical terms generally causing a \"code-switching\" problem. Hence, this paper describes an implementation framework of a resource efficient Automatic Speech Recognition/ Speech to Text System in a noisy call-center environment using Chain Hybrid HMM and CNN-TDNN for Code-Switched Urdu Language. Using Hybrid HMM-DNN approach allowed us to utilize the advantages of Neural Network with less labelled data. Adding CNN with TDNN has shown to work better in noisy environment due to CNN's additional frequency dimension which captures extra information from noisy speech, thus improving accuracy. We collected data from various open sources and labelled some of the unlabelled data after analysing its general context and content from Urdu language as well as from commonly used words from other languages, primarily English and were able to achieve WER of 5.2% with noisy as well as clean environment in isolated words or numbers as well as in continuous spontaneous speech. 2023-07-24 The ro-vibrational $\u03bd_2$ mode spectrum of methane investigated by ultrabroadband coherent Raman spectroscopy Francesco Mazza et.al. 2307.12740v1 null We present the first experimental application of coherent Raman spectroscopy (CRS) on the ro-vibrational $\\nu_2$ mode spectrum of methane (CH$_4$). Ultrabroadband femtosecond/picosecond (fs/ps) CRS is performed in the molecular fingerprint region from 1100 to 2000 cm$^{-1}$, employing fs laser-induced filamentation as the supercontinuum generation mechanism to provide the ultrabroadband excitation pulses. We introduce a time-domain model of the CH$_4$ $\\nu_2$ CRS spectrum, including all five ro-vibrational branches allowed by the selection rules $\\Delta v = 1$, $\\Delta J = 0$, $\\pm1$, $\\pm2$; the model includes collisional linewidths, computed according to a modified exponential gap scaling law and validated experimentally. The use of ultrabroadband CRS for in situ monitoring of the CH$_4$ chemistry is demonstrated in a laboratory CH$_4$/air diffusion flame: CRS measurements in the fingerprint region, performed across the laminar flame front, allow the simultaneous detection of molecular oxygen (O$_2$), carbon dioxide (CO$_2$), and molecular hydrogen (H$_2$), along with CH$_4$. Fundamental physicochemical processes, such as H$_2$ production via CH$_4$ pyrolysis, are observed through the Raman spectra of these chemical species. In addition, we demonstrate ro-vibrational CH$_4\\nu_2$ CRS thermometry, and we validate it against CO$_2$ CRS measurements. The present technique offers an interesting diagnostics approach to in situ measurement of CH$_4$-rich environments, e.g., in plasma reactors for CH$_4$ pyrolysis and H$_2$ production. 2023-07-24 Safety monitoring under stealthy sensor injection attacks using reachable sets C\u00e9dric Escudero et.al. 2307.12715v1 null Stealthy sensor injection attacks are serious threats for industrial plants as they can compromise the plant's integrity without being detected by traditional fault detectors. In this manuscript, we study the possibility of revealing the presence of such attacks by monitoring only the control input. This approach consists in computing an ellipsoidal bound of the input reachable set. When the control input does not belong to this set, this means that a stealthy sensor injection attack is driving the plant to critical states. The problem of finding this ellipsoidal bound is posed as a convex optimization problem (convex cost with Linear Matrix Inequalities constraints). Our monitoring approach is tested in simulation. 2023-07-24 Rates in almost sure invariance principle for nonuniformly hyperbolic maps C Cuny et.al. 2307.12714v1 null We prove the Almost Sure Invariance Principle (ASIP) with close to optimal error rates for nonuniformly hyperbolic maps. We do not assume exponential contraction along stable leaves, therefore our result covers in particular slowly mixing invertible dynamical systems as Bunimovich flowers, billiards with flat points as in Chernov and Zhang (2005) and Wojtkowski' (1990) system of two falling balls. For these examples, the ASIP is a new result, not covered by prior works for various reasons, notably because in absence of exponential contraction along stable leaves, it is challenging to employ the so-called Sinai's trick (Sinai 1972, Bowen 1975) of reducing a nonuniformly hyperbolic system to a nonuniformly expanding one. Our strategy follows our previous papers on the ASIP for nonuniformly expanding maps, where we build a semiconjugacy to a specific renewal Markov shift and adapt the argument of Berkes, Liu and Wu (2014). The main difference is that now the Markov shift is two-sided, the observables depend on the full trajectory, both the future and the past. 2023-07-24 Leveraging Large Language Models (LLMs) for Process Mining (Technical Report) Alessandro Berti et.al. 2307.12701v1 null This technical report describes the intersection of process mining and large language models (LLMs), specifically focusing on the abstraction of traditional and object-centric process mining artifacts into textual format. We introduce and explore various prompting strategies: direct answering, where the large language model directly addresses user queries; multi-prompt answering, which allows the model to incrementally build on the knowledge obtained through a series of prompts; and the generation of database queries, facilitating the validation of hypotheses against the original event log. Our assessment considers two large language models, GPT-4 and Google's Bard, under various contextual scenarios across all prompting strategies. Results indicate that these models exhibit a robust understanding of key process mining abstractions, with notable proficiency in interpreting both declarative and procedural process models. In addition, we find that both models demonstrate strong performance in the object-centric setting, which could significantly propel the advancement of the object-centric process mining discipline. Additionally, these models display a noteworthy capacity to evaluate various concepts of fairness in process mining. This opens the door to more rapid and efficient assessments of the fairness of process mining event logs, which has significant implications for the field. The integration of these large language models into process mining applications may open new avenues for exploration, innovation, and insight generation in the field. 2023-07-24 Safe asynchronous mixed-choice for timed interactions Jonah Pears et.al. 2307.12688v1 null Mixed-choice has long been barred from models of asynchronous communication since it compromises key properties of communicating finite-state machines. Session types inherit this restriction, which precludes them from fully modelling timeouts -- a key programming feature to handle failures. To address this deficiency, we present (binary) TimeOut Asynchronous Session Types ({TOAST}) as an extension to (binary) asynchronous timed session types to permit mixed-choice. {TOAST} deploy timing constraints to regulate the use of mixed-choice so as to preserve communication safety. We provide a new behavioural semantics for {TOAST} which guarantees progress in the presence of mixed-choice. Building upon {TOAST}, we provide a calculus featuring process timers which is capable of modelling timeouts using a $\\mathtt{receive\\text{-}after}$ pattern, much like Erlang, and informally illustrate the correspondence with TOAST specifications. 2023-07-24 Exact Global Control of Small Divisors in Rational Normal Form Jianjun Liu et.al. 2307.12652v1 null Rational normal form is a powerful tool to deal with Hamiltonian partial differential equations without external parameters. In this paper, we build rational normal form with exact global control of small divisors. As an application to nonlinear Schr\\\"{o}dinger equations in Gevrey spaces, we prove sub-exponentially long time stability results for generic small initial data. 2023-07-24 Execution at RISC: Stealth JOP Attacks on RISC-V Applications Lo\u00efc Buckwell et.al. 2307.12648v1 null RISC-V is a recently developed open instruction set architecture gaining a lot of attention. To achieve a lasting security on these systems and design efficient countermeasures, a better understanding of vulnerabilities to novel and potential future attacks is mandatory. This paper demonstrates that RISC-V is sensible to Jump-Oriented Programming, a class of complex code-reuse attacks. We provide an analysis of new dispatcher gadgets we discovered, and show how they can be used together in order to build a stealth attack, bypassing existing protections. A proof-of-concept attack is implemented on an embedded web server compiled for RISC-V, in which we introduced a vulnerability, allowing an attacker to remotely read an arbitrary file from the host machine. 2023-07-24 Remote Bio-Sensing: Open Source Benchmark Framework for Fair Evaluation of rPPG Dae Yeol Kim et.al. 2307.12644v1 link Remote Photoplethysmography (rPPG) is a technology that utilizes the light absorption properties of hemoglobin, captured via camera, to analyze and measure blood volume pulse (BVP). By analyzing the measured BVP, various physiological signals such as heart rate, stress levels, and blood pressure can be derived, enabling applications such as the early prediction of cardiovascular diseases. rPPG is a rapidly evolving field as it allows the measurement of vital signals using camera-equipped devices without the need for additional devices such as blood pressure monitors or pulse oximeters, and without the assistance of medical experts. Despite extensive efforts and advances in this field, serious challenges remain, including issues related to skin color, camera characteristics, ambient lighting, and other sources of noise, which degrade performance accuracy. We argue that fair and evaluable benchmarking is urgently required to overcome these challenges and make any meaningful progress from both academic and commercial perspectives. In most existing work, models are trained, tested, and validated only on limited datasets. Worse still, some studies lack available code or reproducibility, making it difficult to fairly evaluate and compare performance. Therefore, the purpose of this study is to provide a benchmarking framework to evaluate various rPPG techniques across a wide range of datasets for fair evaluation and comparison, including both conventional non-deep neural network (non-DNN) and deep neural network (DNN) methods. GitHub URL: https://github.com/remotebiosensing/rppg. 2023-07-24 Spectral Observations and Modeling of a Solar White-light Flare Observed by CHASE De-Chao Song et.al. 2307.12641v1 null The heating mechanisms of solar white-light flares remain unclear. We present an X1.0 white-light flare on 2022 October 2 (SOL2022-10-02T20:25) observed by the Chinese \\ha\\ Solar Explorer (CHASE) that provides two-dimensional spectra in the visible light for the full solar disk with a seeing-free condition. The flare shows a prominent enhancement of $\\sim$40\\% in the photospheric \\fe\\ line at 6569.2 \\AA, and the nearby continuum also exhibits a maximum enhancement of $\\sim$40\\%. For the continuum near the \\fe\\ line at 6173 \\AA\\ from the Helioseismic and Magnetic Imager (HMI) on board the Solar Dynamics Observatory (SDO), it is enhanced up to $\\sim$20\\%. At the white-light kernels, the \\fe\\ line at 6569.2 \\AA\\ has a symmetric Gaussian profile that is still in absorption and the H$\\alpha$ line at 6562.8 \\AA\\ displays a very broad emission profile with a central reversal plus a red or blue asymmetry. The white-light kernels are co-spatial with the microwave footpoint sources observed by the Expanded Owens Valley Solar Array (EOVSA) and the time profile of the white-light emission matches that of the hard X-ray emission above 30 keV from the Gamma-ray Burst Monitor (GBM) on Fermi. These facts indicate that the white-light emission is qualitatively related to a nonthermal electron beam. We also perform a radiative hydrodynamic simulation with the electron beam parameters constrained by the hard X-ray observations from Fermi/GBM. The result reveals that the white-light enhancement cannot be well explained by a pure electron-beam heating together with its induced radiative backwarming but may need additional heating sources such as \\alfven\\ waves. 2023-07-24 GRB 221009A: revealing a hidden afterglow during the prompt emission phase with Fermi-GBM observations Hai-Ming Zhang et.al. 2307.12623v1 null Recently, LHAASO reported the detection of brightest-of-all-time GRB 221009A, revealing the early onset of a TeV afterglow. However, there is no evidence of afterglow emission at such early time at other wavelengths. Here we report the discovery of a hidden afterglow component during the prompt emission phase with Fermi Gamma-Ray Burst Monitor (GBM) observations. We analyze the spectral evolution of the X-ray/$\\gamma$-ray emission of GRB 221009A measured by GBM during the dips of two prompt emission pulses (i.e., intervals $T_{0}+[300-328]\\rm~s$ and $T_{0}+[338-378]\\rm~s$, where $T_0$ is the GBM trigger time). We find that the spectra at the dips transit from the Band function to a power-law function, indicating a transition from the prompt emission to the afterglow. After $\\sim T_{0}+ 660 \\rm~s$, the spectrum is well described by a power-law function and the afterglow becomes dominant. Remarkably, the underlying afterglow emission at the dips smoothly connect with the afterglow after $\\sim T_{0}+ 660 \\rm~s$. The entire afterglow emission measured by GBM can be fitted by a power-law function $F\\sim t^{-0.95\\pm0.05}$, where $t$ is the time since the first main pulse at $T^*=T_0+226~{\\rm s}$, consistent with the TeV afterglow decay measured by LHAASO. The start time of this power-law decay indicates that the afterglow peak of GRB 221009A should be earlier than $T_{0}+300 \\rm ~s$. We also test the possible presence of a jet break in the early afterglow light curve, finding that both the jet break model and single power-law decay model are consistent with the GBM data. The two models can not be distinguished with the GBM data alone because the inferred jet break time is quite close to the end of GBM observations. 2023-07-24 Phase Match for Out-of-Distribution Generalization Chengming Hu et.al. 2307.12622v1 null The Fourier transform, serving as an explicit decomposition method for visual signals, has been employed to explain the out-of-distribution generalization behaviors of Convolutional Neural Networks (CNNs). Previous research and empirical studies have indicated that the amplitude spectrum plays a decisive role in CNN recognition, but it is susceptible to disturbance caused by distribution shifts. On the other hand, the phase spectrum preserves highly-structured spatial information, which is crucial for visual representation learning. In this paper, we aim to clarify the relationships between Domain Generalization (DG) and the frequency components by introducing a Fourier-based structural causal model. Specifically, we interpret the phase spectrum as semi-causal factors and the amplitude spectrum as non-causal factors. Building upon these observations, we propose Phase Match (PhaMa) to address DG problems. Our method introduces perturbations on the amplitude spectrum and establishes spatial relationships to match the phase components. Through experiments on multiple benchmarks, we demonstrate that our proposed method achieves state-of-the-art performance in domain generalization and out-of-distribution robustness tasks. 2023-07-24 CTVIS: Consistent Training for Online Video Instance Segmentation Kaining Ying et.al. 2307.12616v1 link The discrimination of instance embeddings plays a vital role in associating instances across time for online video instance segmentation (VIS). Instance embedding learning is directly supervised by the contrastive loss computed upon the contrastive items (CIs), which are sets of anchor/positive/negative embeddings. Recent online VIS methods leverage CIs sourced from one reference frame only, which we argue is insufficient for learning highly discriminative embeddings. Intuitively, a possible strategy to enhance CIs is replicating the inference phase during training. To this end, we propose a simple yet effective training strategy, called Consistent Training for Online VIS (CTVIS), which devotes to aligning the training and inference pipelines in terms of building CIs. Specifically, CTVIS constructs CIs by referring inference the momentum-averaged embedding and the memory bank storage mechanisms, and adding noise to the relevant embeddings. Such an extension allows a reliable comparison between embeddings of current instances and the stable representations of historical instances, thereby conferring an advantage in modeling VIS challenges such as occlusion, re-identification, and deformation. Empirically, CTVIS outstrips the SOTA VIS models by up to +5.0 points on three VIS benchmarks, including YTVIS19 (55.1% AP), YTVIS21 (50.1% AP) and OVIS (35.5% AP). Furthermore, we find that pseudo-videos transformed from images can train robust models surpassing fully-supervised ones. 2023-07-24 BonnBot-I: A Precise Weed Management and Crop Monitoring Platform Alireza Ahmadi et.al. 2307.12588v1 null Cultivation and weeding are two of the primary tasks performed by farmers today. A recent challenge for weeding is the desire to reduce herbicide and pesticide treatments while maintaining crop quality and quantity. In this paper we introduce BonnBot-I a precise weed management platform which can also performs field monitoring. Driven by crop monitoring approaches which can accurately locate and classify plants (weed and crop) we further improve their performance by fusing the platform available GNSS and wheel odometry. This improves tracking accuracy of our crop monitoring approach from a normalized average error of 8.3% to 3.5%, evaluated on a new publicly available corn dataset. We also present a novel arrangement of weeding tools mounted on linear actuators evaluated in simulated environments. We replicate weed distributions from a real field, using the results from our monitoring approach, and show the validity of our work-space division techniques which require significantly less movement (a 50% reduction) to achieve similar results. Overall, BonnBot-I is a significant step forward in precise weed management with a novel method of selectively spraying and controlling weeds in an arable field 2023-07-24 Understanding the Governance Challenges of Public Libraries Subscribing to Digital Content Distributors Yunhee Shim et.al. 2307.12569v1 null As popular demand for digital information increases, public libraries are increasingly turning to commercial digital content distribution services to save curation time and costs. These services let libraries subscribe to pre-configured digital content packages that become instantly available wholesale to their patrons. However, these packages often contain content that does not align with the library's curation policy. We conducted interviews with 15 public librarians in the US to examine their experiences with subscribing to digital distribution services. We found that the subscribing libraries face many digital governance challenges, including the sub-par quality of received content, a lack of control in the curation process, and a limited understanding of how distribution services operate. We draw from prior HCI and social media moderation literature to contextualize and examine these challenges. Building upon our findings, we suggest how digital distributors, libraries, and lawmakers could improve digital distribution services in library settings. We offer recommendations for co-constructing a robust digital content curation policy and discuss how librarian's cooperation and well-deployed content moderation mechanisms could help enforce that policy. Our work informs the utility of future content moderation research that bridges the fields of CSCW and library science. 2023-07-24 Monitoring Cascading Changes of Resources in the Kubernetes Control Plane Tomoyuki Ehira et.al. 2307.12567v1 null Kubernetes is a container management system that has many automated functionalities. Those functionalities are managed by configuring objects and resources in the control plane. Since most objects change their state depending on other objects' states, a change propagates to other objects in a chain. As cluster availability is influenced by the time required for these cascading changes, it is essential to make the propagations measurable and shed light on the behavior of the Kubernetes control plane. However, it is not easy because each object constantly monitors other objects' status and acts autonomously in response to their changes to play its role. In this paper, we propose a measurement system that outputs objects' change logs published from the API server in the control plane and assists in analyzing the time of cascading changes between objects by utilizing the relationships among resources. With a practical change scenario, our system is confirmed that it can measure change propagation times within a cascading change. Also, measurements on the system itself showed it has a small CPU and memory footprint. 2023-07-24 Towards Video Anomaly Retrieval from Video Anomaly Detection: New Benchmarks and Model Peng Wu et.al. 2307.12545v1 null Video anomaly detection (VAD) has been paid increasing attention due to its potential applications, its current dominant tasks focus on online detecting anomalies% at the frame level, which can be roughly interpreted as the binary or multiple event classification. However, such a setup that builds relationships between complicated anomalous events and single labels, e.g., ``vandalism'', is superficial, since single labels are deficient to characterize anomalous events. In reality, users tend to search a specific video rather than a series of approximate videos. Therefore, retrieving anomalous events using detailed descriptions is practical and positive but few researches focus on this. In this context, we propose a novel task called Video Anomaly Retrieval (VAR), which aims to pragmatically retrieve relevant anomalous videos by cross-modalities, e.g., language descriptions and synchronous audios. Unlike the current video retrieval where videos are assumed to be temporally well-trimmed with short duration, VAR is devised to retrieve long untrimmed videos which may be partially relevant to the given query. To achieve this, we present two large-scale VAR benchmarks, UCFCrime-AR and XDViolence-AR, constructed on top of prevalent anomaly datasets. Meanwhile, we design a model called Anomaly-Led Alignment Network (ALAN) for VAR. In ALAN, we propose an anomaly-led sampling to focus on key segments in long untrimmed videos. Then, we introduce an efficient pretext task to enhance semantic associations between video-text fine-grained representations. Besides, we leverage two complementary alignments to further match cross-modal contents. Experimental results on two benchmarks reveal the challenges of VAR task and also demonstrate the advantages of our tailored method. 2023-07-24 Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions Zhonghui Li et.al. 2307.12490v1 null Over the past few decades, significant progress has been made in quantum information technology, from theoretical studies to experimental demonstrations. Revolutionary quantum applications are now in the limelight, showcasing the advantages of quantum information technology and becoming a research hotspot in academia and industry. To enable quantum applications to have a more profound impact and wider application, the interconnection of multiple quantum nodes through quantum channels becomes essential. Building an entanglement-assisted quantum network, capable of realizing quantum information transmission between these quantum nodes, is the primary goal. However, entanglement-assisted quantum networks are governed by the unique laws of quantum mechanics, such as the superposition principle, the no-cloning theorem, and quantum entanglement, setting them apart from classical networks. Consequently, fundamental efforts are required to establish entanglement-assisted quantum networks. While some insightful surveys have paved the way for entanglement-assisted quantum networks, most of these studies focus on enabling technologies and quantum applications, neglecting critical network issues. In response, this paper presents a comprehensive survey of entanglement-assisted quantum networks. Alongside reviewing fundamental mechanics and enabling technologies, the paper provides a detailed overview of the network structure, working principles, and development stages, highlighting the differences from classical networks. Additionally, the challenges of building wide-area entanglement-assisted quantum networks are addressed. Furthermore, the paper emphasizes open research directions, including architecture design, entanglement-based network issues, and standardization, to facilitate the implementation of future entanglement-assisted quantum networks. 2023-07-24 Understanding Large Language Model Based Fuzz Driver Generation Cen Zhang et.al. 2307.12469v1 null Fuzz drivers are a necessary component of API fuzzing. However, automatically generating correct and robust fuzz drivers is a difficult task. Compared to existing approaches, LLM-based (Large Language Model) generation is a promising direction due to its ability to operate with low requirements on consumer programs, leverage multiple dimensions of API usage information, and generate human-friendly output code. Nonetheless, the challenges and effectiveness of LLM-based fuzz driver generation remain unclear. To address this, we conducted a study on the effects, challenges, and techniques of LLM-based fuzz driver generation. Our study involved building a quiz with 86 fuzz driver generation questions from 30 popular C projects, constructing precise effectiveness validation criteria for each question, and developing a framework for semi-automated evaluation. We designed five query strategies, evaluated 36,506 generated fuzz drivers. Furthermore, the drivers were compared with manually written ones to obtain practical insights. Our evaluation revealed that: while the overall performance was promising (passing 91% of questions), there were still practical challenges in filtering out the ineffective fuzz drivers for large scale application; basic strategies achieved a decent correctness rate (53%), but struggled with complex API-specific usage questions. In such cases, example code snippets and iterative queries proved helpful; while LLM-generated drivers showed competent fuzzing outcomes compared to manually written ones, there was still significant room for improvement, such as incorporating semantic oracles for logical bugs detection. 2023-07-23 Drift Models on Complex Projective Space for Electron-Nuclear Double Resonance Henrik Wiechers et.al. 2307.12414v1 null ENDOR spectroscopy is an important tool to determine the complicated three-dimensional structure of biomolecules and in particular enables measurements of intramolecular distances. Usually, spectra are determined by averaging the data matrix, which does not take into account the significant thermal drifts that occur in the measurement process. In contrast, we present an asymptotic analysis for the homoscedastic drift model, a pioneering parametric model that achieves striking model fits in practice and allows both hypothesis testing and confidence intervals for spectra. The ENDOR spectrum and an orthogonal component are modeled as an element of complex projective space, and formulated in the framework of generalized Fr\\'echet means. To this end, two general formulations of strong consistency for set-valued Fr\\'echet means are extended and subsequently applied to the homoscedastic drift model to prove strong consistency. Building on this, central limit theorems for the ENDOR spectrum are shown. Furthermore, we extend applicability by taking into account a phase noise contribution leading to the heteroscedastic drift model. Both drift models offer improved signal-to-noise ratio over pre-existing models."}]} \ No newline at end of file diff --git a/sitemap.xml b/sitemap.xml new file mode 100644 index 00000000..0f8724ef --- /dev/null +++ b/sitemap.xml @@ -0,0 +1,3 @@ + + + \ No newline at end of file diff --git a/sitemap.xml.gz b/sitemap.xml.gz new file mode 100644 index 00000000..17e477ac Binary files /dev/null and b/sitemap.xml.gz differ