Understanding quaternions and the Dirac belt trick (2010)

The Dirac belt trick is often employed in physics classrooms to show that a$2π$ rotation is not topologically equivalent to the absence of rotationwhereas a $4π$ rotation is, mirroring a key... | Continue reading


@arxiv.org | 26 days ago

Application of Cybernetic and Control Theory for a New Paradigm in Cybersecurity

A significant limitation of current cyber security research and techniques isits reactive and applied nature. This leads to a continuous 'cyber cycle' ofattackers scanning networks, developing... | Continue reading


@arxiv.org | 26 days ago

A new way to train AI systems could keep them safer from hackers

Deep-learning-based methods for different applications have been shownvulnerable to adversarial examples. These examples make deployment of suchmodels in safety-critical tasks questionable. Use... | Continue reading


@arxiv.org | 26 days ago

Artificial Stupidity

Public debate about AI is dominated by Frankenstein Syndrome, the fear thatAI will become superhuman and escape human control. Although superintelligenceis certainly a possibility, the interest... | Continue reading


@arxiv.org | 27 days ago

LeakyPick: IoT Audio Spy Detector

Manufacturers of smart home Internet of Things (IoT) devices are increasinglyadding voice assistant and audio monitoring features to a wide range of devicesincluding smart speakers, televisions,... | Continue reading


@arxiv.org | 27 days ago

Pixie: System for Recommending 3B Items to 200M Users in RealTime

User experience in modern content discovery applications critically dependson high-quality personalized recommendations. However, building systems thatprovide such recommendations presents a... | Continue reading


@arxiv.org | 27 days ago

Quantum Mechanics May Need Consciousness [pdf]

The assertion by Yu and Nikolic that the delayed choice quantum eraserexperiment of Kim et al. empirically falsifies theconsciousness-causes-collapse hypothesis of quantum mechanics is based on... | Continue reading


@arxiv.org | 27 days ago

Revealing the intermediate-mass black hole at the heart of NGC 404

We estimate the mass of the intermediate-mass black hole at the heart of thedwarf elliptical galaxy NGC 404 using Atacama Large Millimeter/submillimeterArray (ALMA) observations of the molecular... | Continue reading


@arxiv.org | 27 days ago

SRG/eROSITA uncovers the most X-ray luminous quasar at z6 with 9 photons

We report the discovery of X-ray emission from CFHQS J142952+544717, the mostdistant known radio-loud quasar at z=6.18, on Dec. 10--11, 2019 with theeROSITA telescope on board the SRG satellite... | Continue reading


@arxiv.org | 27 days ago

Scalable Gradients for Stochastic Differential Equations

The adjoint sensitivity method scalably computes gradients of solutions toordinary differential equations. We generalize this method to stochasticdifferential equations, allowing time-efficient... | Continue reading


@arxiv.org | 29 days ago

A New Direction in Firefighting Systems

Recent huge technological development of Unmanned Aerial Vehicles (UAVs) canprovide breakthrough means of fighting wildland fires. We propose an innovativeforest firefighting system based on the... | Continue reading


@arxiv.org | 29 days ago

Domain-Specific Multi-Level IR Rewriting for GPU

Traditional compilers operate on a single generic intermediate representation(IR). These IRs are usually low-level and close to machine instructions. As aresult, optimizations relying on... | Continue reading


@arxiv.org | 29 days ago

Global Decision-Making via Local Economic Transactions

This paper seeks to establish a framework for directing a society of simple,specialized, self-interested agents to solve what traditionally are posed asmonolithic single-agent sequential... | Continue reading


@arxiv.org | 1 month ago

Logarithmic Pruning Is All You Need

The Lottery Ticket Hypothesis is a conjecture that every large neural networkcontains a subnetwork that, when trained in isolation, achieves comparableperformance to the large network. An even... | Continue reading


@arxiv.org | 1 month ago

Neutral monism, perspectivism and the quantum dualism: An essay

Quantum mechanics in the Wigner-von Neumann interpretation is presented. Thisis characterized by 1) a quantum dualism between matter and consciousnessunified within an informational neutral... | Continue reading


@arxiv.org | 1 month ago

Neural programmer better than Quicksort

We study the problem of learning efficient algorithms that stronglygeneralize in the framework of neural program induction. By carefully designingthe input / output interfaces of the neural... | Continue reading


@arxiv.org | 1 month ago

Politeness Transfer: A Tag and Generate Approach

This paper introduces a new task of politeness transfer which involvesconverting non-polite sentences to polite sentences while preserving themeaning. We also provide a dataset of more than 1.39... | Continue reading


@arxiv.org | 1 month ago

You Only Look Once: Unified, Real-Time Object Detection

We present YOLO, a new approach to object detection. Prior work on objectdetection repurposes classifiers to perform detection. Instead, we frame objectdetection as a regression problem to... | Continue reading


@arxiv.org | 1 month ago

YOLO9000: Better, Faster, Stronger

We introduce YOLO9000, a state-of-the-art, real-time object detection systemthat can detect over 9000 object categories. First we propose variousimprovements to the YOLO detection method, both... | Continue reading


@arxiv.org | 1 month ago

Differences of OT/CRDT: General Transformation Frameworks, Co-Editor Consistency

OT (Operational Transformation) was invented for supporting real-timeco-editors in the late 1980s and has evolved to become a core technique used intoday's working co-editors and adopted in... | Continue reading


@arxiv.org | 1 month ago

DomainBed: In Search of Lost Domain Generalization

The goal of domain generalization algorithms is to predict well ondistributions different from those seen during training. While a myriad ofdomain generalization algorithms exist,... | Continue reading


@arxiv.org | 1 month ago

One of Everything: The Breakthrough Listen Exotica Catalog

We present Breakthrough Listen's "Exotica" Catalog as the centerpiece of ourefforts to expand the diversity of targets surveyed in the Search forExtraterrestrial Intelligence (SETI). As... | Continue reading


@arxiv.org | 1 month ago

Projectile Trajectory of Penguin's Faeces and Rectal Pressure Revisited

We discuss a trajectory of penguins' faeces after the powerful shooting dueto their strong rectal pressure. Practically, it is important to see how farfaeceses reach when penguins expel them... | Continue reading


@arxiv.org | 1 month ago

Dependent Types in Haskell: Theory and Practice (2016)[pdf]

Haskell, as implemented in the Glasgow Haskell Compiler (GHC), has beenadding new type-level programming features for some time. Many of thesefeatures---chiefly: generalized algebraic datatypes... | Continue reading


@arxiv.org | 1 month ago

Training Convolutional ReLU Neural Networks in Polynomial Time

We study training of Convolutional Neural Networks (CNNs) with ReLUactivations and introduce exact convex optimization formulations with apolynomial complexity with respect to the number of data... | Continue reading


@arxiv.org | 1 month ago

Early Warning Approach to Monitor Covid-19 with Digital Traces in Near Real-Time

Non-pharmaceutical interventions (NPIs) have been crucial in curbing COVID-19in the United States (US). Consequently, relaxing NPIs through a phasedre-opening of the US amid still-high levels of... | Continue reading


@arxiv.org | 1 month ago

Approaching Optimal Duplicate Detection in a Sliding Window [pdf]

Duplicate detection is the problem of identifying whether a given item haspreviously appeared in a (possibly infinite) stream of data, when only alimited amount of memory is available. ... | Continue reading


@arxiv.org | 1 month ago

Paradox with just self-reference [pdf]

If a semantically open language has no constraints on self-reference, one canshow there is a predicate which is both satisfied and unsatisfied by aself-referring term. The argument requires... | Continue reading


@arxiv.org | 1 month ago

ReversiSpec: Reversible Coherence Protocol for Defending Transient Attacks

The recent works such as InvisiSpec, SafeSpec, and Cleanup-Spec, amongothers, provided promising solutions to defend speculation induced (transient)attacks. However, they intro-duce delay either... | Continue reading


@arxiv.org | 1 month ago

Queues are Databases (1995)

Message-oriented-middleware (MOM) has become an small industry. MOM offersqueued transaction processing as an advance over pure client-server transactionprocessing. This note makes four points:... | Continue reading


@arxiv.org | 1 month ago

What is the state of neural network pruning?

Neural network pruning---the task of reducing the size of a network byremoving parameters---has been the subject of a great deal of work in recentyears. We provide a meta-analysis of the... | Continue reading


@arxiv.org | 1 month ago

Differentiate Everything with a Reversible Domain-Specific Language

Traditional machine instruction level reverse mode automatic differentiation(AD) faces the problem of having a space overhead that linear to time in orderto trace back the computational state,... | Continue reading


@arxiv.org | 1 month ago

Synthetic Data for Deep Learning

Synthetic data is an increasingly popular tool for training deep learningmodels, especially in computer vision but also in other areas. In this work, weattempt to provide a comprehensive survey... | Continue reading


@arxiv.org | 1 month ago

600B parameter Transformer trained by Google

Neural network scaling has been critical for improving the model quality inmany real-world machine learning applications with vast amounts of trainingdata and compute. Although this trend of... | Continue reading


@arxiv.org | 1 month ago

The nature of programming exercises [pdf]

There are countless reasons cited in scientific studies to explain thedifficulties in programming learning. The reasons range from the subject'scomplexity, the ineffective teaching and study... | Continue reading


@arxiv.org | 1 month ago

Show HN: Control of Sliding-Arm-Quadcopter with DynamicStructuralParameters

The conceptual design and flight controller of a novel kind of quadcopter arepresented. This design is capable of morphing the shape of the UAV duringflight to achieve position and attitude... | Continue reading


@arxiv.org | 1 month ago

DJB: Is the security of quantum cryptography guaranteed by the laws of physics?

It is often claimed that the security of quantum key distribution (QKD) isguaranteed by the laws of physics. However, this claim is content-free if theunderlying theoretical definition of QKD is... | Continue reading


@arxiv.org | 1 month ago

Articles downloaded from SciHub where cited 1.72 times more

Citations are often used as a metric of the impact of scientificpublications. Here, we examine how the number of downloads from Sci-hub as wellas various characteristics of publications and... | Continue reading


@arxiv.org | 1 month ago

Discovering Symbolic Models from Deep Learning with Inductive Biases

We develop a general approach to distill symbolic representations of alearned deep model by introducing strong inductive biases. We focus on GraphNeural Networks (GNNs). The technique works as... | Continue reading


@arxiv.org | 1 month ago

Using machine learning to classify story arcs into six basic shapes

Advances in computing power, natural language processing, and digitization oftext now make it possible to study a culture's evolution through its textsusing a "big data" lens. Our ability to... | Continue reading


@arxiv.org | 1 month ago

Pull out all the stops: Textual analysis via punctuation sequences

Whether enjoying the lucid prose of a favorite author or slogging throughsome other writer's cumbersome, heavy-set prattle (full of parentheses, emdashes, compound adjectives, and Oxford... | Continue reading


@arxiv.org | 1 month ago

Atmospheric Regimes and Trends on Exoplanets and Brown Dwarfs

A planetary atmosphere is the outer gas layer of a planet. Besides itsscientific significance among the first and most accessible planetary layersobserved from space, it is closely connected... | Continue reading


@arxiv.org | 1 month ago

On the role of the Michelson-Morley experiment: Einstein in Chicago [pdf]

Continue reading


@arxiv.org | 1 month ago

Simplify-Then-Translate:Automatic Preprocessing for BlackBox Machine Translation

Black-box machine translation systems have proven incredibly useful for avariety of applications yet by design are hard to adapt, tune to a specificdomain, or build on top of. In this work, we... | Continue reading


@arxiv.org | 1 month ago

The NetHack Learning Environment

Progress in Reinforcement Learning (RL) algorithms goes hand-in-hand with thedevelopment of challenging environments that test the limits of currentmethods. While existing RL environments are... | Continue reading


@arxiv.org | 1 month ago

LiteX: An open-source SoC builder and library based on Migen Python DSL

LiteX is a GitHub-hosted SoC builder / IP library and utilities that can beused to create SoCs and full FPGA designs. Besides being open-source and BSDlicensed, its originality lies in the fact... | Continue reading


@arxiv.org | 1 month ago

Collective Learning by Ensembles of Altruistic Diversifying Neural Networks

Combining the predictions of collections of neural networks often outperformsthe best single network. Such ensembles are typically trained independently,and their superior `wisdom of the crowd'... | Continue reading


@arxiv.org | 1 month ago

Learning to Classify Images Without Labels

Is it possible to automatically classify images without the use ofground-truth annotations? Or when even the classes themselves, are not a prioriknown? These remain important, and open questions... | Continue reading


@arxiv.org | 1 month ago