This paper discusses, from a mathematician's point of view, the thesisformulated by Israel Gelfand, one of the greatest mathematicians of the 20thcentury, and one of the pioneers of mathematical... | Continue reading
A Behavior Tree (BT) is a way to structure the switching between differenttasks in an autonomous agent, such as a robot or a virtual entity in a computergame. BTs are a very efficient way of... | Continue reading
Galactic Internet may already exist, if all stars are exploited asgravitational lenses. In fact, the gravitational lens of the Sun is awell-known astrophysical phenomenon predicted by Einstein's... | Continue reading
There has been a recent resurgence in the area of explainable artificialintelligence as researchers and practitioners seek to make their algorithmsmore understandable. Much of this research is... | Continue reading
Most statistical classifiers are designed to find patterns in data wherenumbers fit into rows and columns, like in a spreadsheet, but many kinds ofdata do not conform to this structure. To... | Continue reading
Proof of work (PoW), the most popular consensus mechanism for Blockchain,requires ridiculously large amounts of energy but without any useful outcomebeyond determining accounting rights among... | Continue reading
An implicit but pervasive hypothesis of modern computer vision research isthat convolutional neural network (CNN) architectures that perform better onImageNet will also perform better on other... | Continue reading
The Traveling Salesman Problem (TSP) is the most popular and most studiedcombinatorial problem, starting with von Neumann in 1951. It has driven thediscovery of several optimization techniques... | Continue reading
We demonstrate a passive down-conversion imaging system that convertsbroadband ultraviolet light to narrow-band green light while preserving thedirectionality of rays, and thus enabling direct... | Continue reading
How can minorities of regular individuals overturn social conventions?Theoretical and empirical studies have proposed that when a committed minorityreaches a critical group size-ranging from 10%... | Continue reading
We show that it is provable in PA that there is an arithmetically definablesequence $\{ϕ_{n}:n \in ω\}$ of $Π^{0}_{2}$-sentences, such that - PRA+$\{ϕ_{n}:n \in ω\}$ is... | Continue reading
I defend the extremist position that the fundamental ontology of the worldconsists of a vector in Hilbert space evolving according to the Schrödingerequation. The laws of physics are... | Continue reading
Soldier crabs Mictyris guinotae exhibit pronounced swarming behaviour. Theswarms of the crabs tolerant of perturbations. In computer models andlaboratory experiments we demonstrate that swarms... | Continue reading
We analyze the performance of a quantum computer architecture combining asmall processor and a storage unit. By focusing on integer factorization, weshow a reduction by several orders of... | Continue reading
Building effective neural machine translation (NMT) models for verylow-resourced and morphologically rich African indigenous languages is an openchallenge. Besides the issue of finding available... | Continue reading
1I/'Oumuamua (or 1I) and 2I/Borisov (or 2I), the first InterStellar Objects(ISOs) discovered passing through the solar system, have opened up entirely newareas of exobody research. Finding... | Continue reading
Vector graphics are widely used to represent fonts, logos, digital artworks,and graphic designs. But, while a vast body of work has focused on generativealgorithms for raster images, only a... | Continue reading
Large pre-trained language models have been shown to store factual knowledgein their parameters, and achieve state-of-the-art results when fine-tuned ondownstream NLP tasks. However, their... | Continue reading
Organizations publish and share more and more electronic documents like PDFfiles. Unfortunately, most organizations are unaware that these documents cancompromise sensitive information like... | Continue reading
Sophisticated generative adversary network (GAN) models are now able tosynthesize highly realistic human faces that are difficult to discern from realones visually. In this work, we show that... | Continue reading
A new paradigm for the unification of physics is described. It is calledCellular Automata (CA) theory, which is the most massively parallel computermodel currently known to science. We maintain... | Continue reading
Any near-Earth object (NEO) following an Earth-like orbit may eventually becaptured by Earth's gravity during low-velocity encounters. This theoreticalpossibility was first attested during the... | Continue reading
With technical performance being similar for various web browsers, improvinguser perceived performance is integral to optimizing browser quality. Weinvestigated the importance of priming, which... | Continue reading
Neural-networks have seen a surge of interest for the interpretation ofseismic images during the last few years. Network-based learning methods canprovide fast and accurate automatic... | Continue reading
The "eternal war in cache" has reached browsers, with multiple cache-basedside-channel attacks and countermeasures being suggested. A common approach forcountermeasures is to disable or restrict... | Continue reading
In the decremental Single-Source Shortest Path problem (SSSP), we are given aweighted directed graph $G=(V,E,w)$ undergoing edge deletions and a sourcevertex $r \in V$; let $n = |V|, m = |E|$... | Continue reading
Over the past decade, unprecedented progress in the development of neuralnetworks influenced dozens of different industries, including weed recognitionin the agro-industrial sector. The use of... | Continue reading
The \textit{Collatz's conjecture} is an unsolved problem in mathematics. Itis named after Lothar Collatz in 1973. The conjecture also known as Syrucuseconjecture or problem. Take any positive... | Continue reading
Law at large underpins modern society, codifying and governing many aspectsof citizens' daily lives. Oftentimes, law is subject to interpretation, debateand challenges throughout various courts... | Continue reading
Growing interest in quantum computing for practical applications has led to asurge in the availability of programmable machines for executing quantumalgorithms. Present day photonic quantum... | Continue reading
Dark stars are compact massive objects, described by Einstein gravitationalfield equations with matter. The type we consider possesses no event horizon,instead, there is a deep gravitational... | Continue reading
In this work, we construct the largest dataset for multimodal pretraining inChinese, which consists of over 1.9TB images and 292GB texts that cover a widerange of domains. We propose a... | Continue reading
We introduce the first microarchitectural side channel attacks that leveragecontention on the CPU ring interconnect. There are two challenges that make ituniquely difficult to exploit this... | Continue reading
BERT is the most recent Transformer-based model that achievesstate-of-the-art performance in various NLP tasks. In this paper, weinvestigate the hardware acceleration of BERT on FPGA for edge... | Continue reading
We introduce and realize demons that follow a customary gambling strategy tostop a nonequilibrium process at stochastic times. We derive second-law-likeinequalities for the average work done in... | Continue reading
Natural language processing of conversational speech requires theavailability of high-quality transcripts. In this paper, we express ourskepticism towards the recent reports of very low Word... | Continue reading
Many powerful computing technologies rely on implicit and explicit datacontributions from the public. This dependency suggests a potential source ofleverage for the public in its relationship... | Continue reading
It is now widely accepted that the standard inferential toolkit used by thescientific research community -- null-hypothesis significance testing (NHST) --is not fit for purpose. Yet despite the... | Continue reading
Filter data structures over-approximate a set of hashable keys, i.e. setmembership queries may incorrectly come out positive. A filter with falsepositive rate $f \in (0,1]$ is known to require... | Continue reading
Machine learning has achieved tremendous success in a variety of domains inrecent years. However, a lot of these success stories have been in places wherethe training and the testing... | Continue reading
It is well-known that the chances of success of SETI depend on the longevityof technological civilizations or, more broadly, on the duration of the signsof their existence, or technosignatures.... | Continue reading
Online tracking is a whack-a-mole game between trackers who build andmonetize behavioral user profiles through intrusive data collection, andanti-tracking mechanisms, deployed as a browser... | Continue reading
The Arecibo Observatory (AO) is a multidisciplinary research and educationfacility that is recognized worldwide as a leading facility in astronomy,planetary, and atmospheric and space sciences.... | Continue reading
Overnight, Apple has turned its hundreds-of-million-device ecosystem into theworld's largest crowd-sourced location tracking network called offline finding(OF). OF leverages online finder... | Continue reading
How can societies learn to enforce and comply with social norms? Here weinvestigate the learning dynamics and emergence of compliance and enforcementof social norms in a foraging game,... | Continue reading
Real-time rendering and animation of humans is a core function in games,movies, and telepresence applications. Existing methods have a number ofdrawbacks we aim to address with our work.... | Continue reading
Silent Data Corruption (SDC) can have negative impact on large-scaleinfrastructure services. SDCs are not captured by error reporting mechanismswithin a Central Processing Unit (CPU) and hence... | Continue reading