The Unreasonable Ineffectiveness of Mathematics in Biology

This paper discusses, from a mathematician's point of view, the thesisformulated by Israel Gelfand, one of the greatest mathematicians of the 20thcentury, and one of the pioneers of mathematical... | Continue reading


@arxiv.org | 3 years ago

Behavior Trees in Robotics and AI

A Behavior Tree (BT) is a way to structure the switching between differenttasks in an autonomous agent, such as a robot or a virtual entity in a computergame. BTs are a very efficient way of... | Continue reading


@arxiv.org | 3 years ago

Galactic internet made possible by star gravitational lensing

Galactic Internet may already exist, if all stars are exploited asgravitational lenses. In fact, the gravitational lens of the Sun is awell-known astrophysical phenomenon predicted by Einstein's... | Continue reading


@arxiv.org | 3 years ago

Explanation in Artificial Intelligence

There has been a recent resurgence in the area of explainable artificialintelligence as researchers and practitioners seek to make their algorithmsmore understandable. Much of this research is... | Continue reading


@arxiv.org | 3 years ago

Dynamic Kernel Matching for Non-Conforming Data: A Study of T-Cell Receptors

Most statistical classifiers are designed to find patterns in data wherenumbers fit into rows and columns, like in a spreadsheet, but many kinds ofdata do not conform to this structure. To... | Continue reading


@arxiv.org | 3 years ago

Proof of Federated Learning: A Novel Energy-Recycling Consensus Algorithm

Proof of work (PoW), the most popular consensus mechanism for Blockchain,requires ridiculously large amounts of energy but without any useful outcomebeyond determining accounting rights among... | Continue reading


@arxiv.org | 3 years ago

Is It Enough to Optimize CNN Architectures on ImageNet?

An implicit but pervasive hypothesis of modern computer vision research isthat convolutional neural network (CNN) architectures that perform better onImageNet will also perform better on other... | Continue reading


@arxiv.org | 3 years ago

The Transformer Network for the Traveling Salesman Problem

The Traveling Salesman Problem (TSP) is the most popular and most studiedcombinatorial problem, starting with von Neumann in 1951. It has driven thediscovery of several optimization techniques... | Continue reading


@arxiv.org | 3 years ago

Passive conversion of UV images into the visible using perovskite nanocrystals

We demonstrate a passive down-conversion imaging system that convertsbroadband ultraviolet light to narrow-band green light while preserving thedirectionality of rays, and thus enabling direct... | Continue reading


@arxiv.org | 3 years ago

Minorities of less than 3% regular individuals can overturn social conventions

How can minorities of regular individuals overturn social conventions?Theoretical and empirical studies have proposed that when a committed minorityreaches a critical group size-ranging from 10%... | Continue reading


@arxiv.org | 3 years ago

P = NP Provable in Pa

We show that it is provable in PA that there is an arithmetically definablesequence $\{ϕ_{n}:n \in ω\}$ of $Π^{0}_{2}$-sentences, such that - PRA+$\{ϕ_{n}:n \in ω\}$ is... | Continue reading


@arxiv.org | 3 years ago

Reality as a Vector in Hilbert Space by Sean M. Carroll

I defend the extremist position that the fundamental ontology of the worldconsists of a vector in Hilbert space evolving according to the Schrödingerequation. The laws of physics are... | Continue reading


@arxiv.org | 3 years ago

Swarms of soldier crabs can implement logical gates (2012)

Soldier crabs Mictyris guinotae exhibit pronounced swarming behaviour. Theswarms of the crabs tolerant of perturbations. In computer models andlaboratory experiments we demonstrate that swarms... | Continue reading


@arxiv.org | 3 years ago

Factoring 2048 RSA integers in 177 days with 13436 qubits and multimode memory

We analyze the performance of a quantum computer architecture combining asmall processor and a storage unit. By focusing on integer factorization, weshow a reduction by several orders of... | Continue reading


@arxiv.org | 3 years ago

Phrase-Based Tokenization for Low-Resourced Neural Machine Translation

Building effective neural machine translation (NMT) models for verylow-resourced and morphologically rich African indigenous languages is an openchallenge. Besides the issue of finding available... | Continue reading


@arxiv.org | 3 years ago

6.9 InterStellar Objects per year should pass within 1 AU of the Sun

1I/'Oumuamua (or 1I) and 2I/Borisov (or 2I), the first InterStellar Objects(ISOs) discovered passing through the solar system, have opened up entirely newareas of exobody research. Finding... | Continue reading


@arxiv.org | 3 years ago

Im2Vec: Synthesizing Vector Graphics Without Vector Supervision

Vector graphics are widely used to represent fonts, logos, digital artworks,and graphic designs. But, while a vast body of work has focused on generativealgorithms for raster images, only a... | Continue reading


@arxiv.org | 3 years ago

Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks

Large pre-trained language models have been shown to store factual knowledgein their parameters, and achieve state-of-the-art results when fine-tuned ondownstream NLP tasks. However, their... | Continue reading


@arxiv.org | 3 years ago

Exploitation and Sanitization of Hidden Data in PDF Files

Organizations publish and share more and more electronic documents like PDFfiles. Unfortunately, most organizations are unaware that these documents cancompromise sensitive information like... | Continue reading


@arxiv.org | 3 years ago

“This Browser Is Lightning Fast”: Effects of Messaging on Perceived Performance [pdf]

Continue reading


@arxiv.org | 3 years ago

Exposing GAN-Generated Faces Using Inconsistent Corneal Specular Highlights

Sophisticated generative adversary network (GAN) models are now able tosynthesize highly realistic human faces that are difficult to discern from realones visually. In this work, we show that... | Continue reading


@arxiv.org | 3 years ago

Cellular Automata Theory and Physics (1999)

A new paradigm for the unification of physics is described. It is calledCellular Automata (CA) theory, which is the most massively parallel computermodel currently known to science. We maintain... | Continue reading


@arxiv.org | 3 years ago

2020 CD3 [pdf] temporary orbiter of the Earth–Moon system

Any near-Earth object (NEO) following an Earth-like orbit may eventually becaptured by Earth's gravity during low-velocity encounters. This theoreticalpossibility was first attested during the... | Continue reading


@arxiv.org | 3 years ago

The Effects of Message Content on Perceived Performance

With technical performance being similar for various web browsers, improvinguser perceived performance is integral to optimizing browser quality. Weinvestigated the importance of priming, which... | Continue reading


@arxiv.org | 3 years ago

Neural networks for geophysicists and application to seismic data interpretation

Neural-networks have seen a surge of interest for the interpretation ofseismic images during the last few years. Network-based learning methods canprovide fast and accurate automatic... | Continue reading


@arxiv.org | 3 years ago

JavaScript-less sidechannel browser fingerprinting

The "eternal war in cache" has reached browsers, with multiple cache-basedside-channel attacks and countermeasures being suggested. A common approach forcountermeasures is to disable or restrict... | Continue reading


@arxiv.org | 3 years ago

Near-Optimal Decremental SSSP in Dense Weighted Digraphs

In the decremental Single-Source Shortest Path problem (SSSP), we are given aweighted directed graph $G=(V,E,w)$ undergoing edge deletions and a sourcevertex $r \in V$; let $n = |V|, m = |E|$... | Continue reading


@arxiv.org | 3 years ago

Deep learning, machine vision in agriculture in 2021. ArXiv:2103.04893

Over the past decade, unprecedented progress in the development of neuralnetworks influenced dozens of different industries, including weed recognitionin the agro-industrial sector. The use of... | Continue reading


@arxiv.org | 3 years ago

Complete Proof of the Collatz Conjecture

The \textit{Collatz's conjecture} is an unsolved problem in mathematics. Itis named after Lothar Collatz in 1973. The conjecture also known as Syrucuseconjecture or problem. Take any positive... | Continue reading


@arxiv.org | 3 years ago

Catala: A Programming Language for the Law

Law at large underpins modern society, codifying and governing many aspectsof citizens' daily lives. Oftentimes, law is subject to interpretation, debateand challenges throughout various courts... | Continue reading


@arxiv.org | 3 years ago

Excitement about photonic quantum computing

Growing interest in quantum computing for practical applications has led to asurge in the availability of programmable machines for executing quantumalgorithms. Present day photonic quantum... | Continue reading


@arxiv.org | 3 years ago

On dark stars, Planck cores and the nature of dark matter

Dark stars are compact massive objects, described by Einstein gravitationalfield equations with matter. The type we consider possesses no event horizon,instead, there is a deep gravitational... | Continue reading


@arxiv.org | 3 years ago

M6: A Chinese Multimodal Pretrainer

In this work, we construct the largest dataset for multimodal pretraining inChinese, which consists of over 1.9TB images and 292GB texts that cover a widerange of domains. We propose a... | Continue reading


@arxiv.org | 3 years ago

Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect

We introduce the first microarchitectural side channel attacks that leveragecontention on the CPU ring interconnect. There are two challenges that make ituniquely difficult to exploit this... | Continue reading


@arxiv.org | 3 years ago

Hardware Acceleration of Fully Quantized Bert for Efficient NLP

BERT is the most recent Transformer-based model that achievesstate-of-the-art performance in various NLP tasks. In this paper, weinvestigate the hardware acceleration of BERT on FPGA for edge... | Continue reading


@arxiv.org | 3 years ago

Thermodynamics of Gambling Demons (2021)

We introduce and realize demons that follow a customary gambling strategy tostop a nonequilibrium process at stochastic times. We derive second-law-likeinequalities for the average work done in... | Continue reading


@arxiv.org | 3 years ago

WER we are and WER we think we are

Natural language processing of conversational speech requires theavailability of high-quality transcripts. In this paper, we express ourskepticism towards the recent reports of very low Word... | Continue reading


@arxiv.org | 3 years ago

Data Leverage: Empowering the Public in Its Relationship with Tech Companies

Many powerful computing technologies rely on implicit and explicit datacontributions from the public. This dependency suggests a potential source ofleverage for the public in its relationship... | Continue reading


@arxiv.org | 3 years ago

Reverse-Bayes methods: a review of recent technical advances [pdf]

It is now widely accepted that the standard inferential toolkit used by thescientific research community -- null-hypothesis significance testing (NHST) --is not fit for purpose. Yet despite the... | Continue reading


@arxiv.org | 3 years ago

Ribbon filter: practically smaller than Bloom and Xor

Filter data structures over-approximate a set of hashable keys, i.e. setmembership queries may incorrectly come out positive. A filter with falsepositive rate $f \in (0,1]$ is known to require... | Continue reading


@arxiv.org | 3 years ago

Out of Distribution Generalization in Machine Learning

Machine learning has achieved tremendous success in a variety of domains inrecent years. However, a lot of these success stories have been in places wherethe training and the testing... | Continue reading


@arxiv.org | 3 years ago

Longevity is the key factor in the search for technosignatures

It is well-known that the chances of success of SETI depend on the longevityof technological civilizations or, more broadly, on the duration of the signsof their existence, or technosignatures.... | Continue reading


@arxiv.org | 3 years ago

Cname tracking's a disaster. uBlock Origin blocks it in FF. Chrome users are SOL

Online tracking is a whack-a-mole game between trackers who build andmonetize behavioral user profiles through intrusive data collection, andanti-tracking mechanisms, deployed as a browser... | Continue reading


@arxiv.org | 3 years ago

The Future of the Arecibo Observatory: The Next Generation Arecibo Telescope

The Arecibo Observatory (AO) is a multidisciplinary research and educationfacility that is recognized worldwide as a leading facility in astronomy,planetary, and atmospheric and space sciences.... | Continue reading


@arxiv.org | 3 years ago

Who Can Find My Devices? Security and Privacy of Apple's Bluetooth Tracking

Overnight, Apple has turned its hundreds-of-million-device ecosystem into theworld's largest crowd-sourced location tracking network called offline finding(OF). OF leverages online finder... | Continue reading


@arxiv.org | 3 years ago

Silly rules enable reinforcement learning agents to cooperate

How can societies learn to enforce and comply with social norms? Here weinvestigate the learning dynamics and emergence of compliance and enforcementof social norms in a foraging game,... | Continue reading


@arxiv.org | 3 years ago

Mixture of Volumetric Primitives for Efficient Neural Rendering

Real-time rendering and animation of humans is a core function in games,movies, and telepresence applications. Existing methods have a number ofdrawbacks we aim to address with our work.... | Continue reading


@arxiv.org | 3 years ago

Silent Data Corruptions at Scale

Silent Data Corruption (SDC) can have negative impact on large-scaleinfrastructure services. SDCs are not captured by error reporting mechanismswithin a Central Processing Unit (CPU) and hence... | Continue reading


@arxiv.org | 3 years ago