We present a phenomenological theory of scalar particles that transform as a sextet and an octet of QCD interactions. These particles may arise as li…

In this paper, we propose an uncertainty-aware learning from demonstration method by presenting a novel uncertainty estimation method utilizing a mix…

We study a model of information spreading on multiplex networks, in which agents interact through multiple interaction channels (layers), say online …

In this paper, we studied the demographic prediction task in retail business scenario as a multi-task learning problem. We proposed an Embedding Transformation with Attention (ETNA) model which transforms shared embeddings into task-specific embeddi…

Most companies utilize demographic information to develop their strategy in a market. However, such information is not available to most retail compa…

Existing open-domain question answering (QA) models are not suitable for real-time usage because they need to process several long documents on-deman…

In this work, we propose a Factorized Disentangler-Entangler Network (FDEN) that learns to decompose a latent representation into two mutually indepe…

The rise and fall of a research field is the cumulative outcome of its intrinsic scientific value and social coordination among scientists. The struc…

We introduce the sandpile model on multiplex networks with more than one type of edge and investigate its scaling and dynamical behaviors. We find th…

We describe a compact THz-pump and X-ray-probe beamline, based on an electron linac, for ultrafast time-resolved diffraction applications. Two high-e…

We study a classically scale-invariant model with an electroweak singlet scalar mediator together with a scalar dark matter multiplet of global $O(N)…

Functional data, with basic observational units being functions (e.g., curves, surfaces) varying over a continuum, are frequently encountered in vari…

We discuss the numerical solution methods available when solving for the steady-state density matrix of a time-independent open quantum optical syste…

In millimeter-wave communication systems with large-scale antenna arrays, conventional digital beamforming may not be cost-effective. A promising sol…

We reanalyze the factorization theorems for Drell-Yan process and for deep inelastic scattering near threshold, as constructed in the framework of th…

Recently, image-to-image translation has obtained significant attention. Among many, those approaches based on an exemplar image that contains the ta…

Knots are commonly found in molecular chains such as DNA and proteins, and they have been considered to be useful models for structural analysis of t…

Knots have been considered to be useful models for simulating molecular chains such as DNA and proteins. One quantity that we are interested on molec…

Let $\mbox{Len}(K)$ be the minimum length of a knot on the cubic lattice (namely the minimum length necessary to construct the knot in the cubic latt…

In this paper, an energy harvesting scheme for a multi-user multiple-input-multiple-output (MIMO) secrecy channel with artificial noise (AN) transmis…

In this paper, we first proposed an RHIBE scheme via history-preserving updates with O(ℓ) number of private key elements and update key elements by combining the BB-HIBE scheme and the BGW-PKBE scheme. Next, we proposed another RHIBE scheme via hist…

In identity-based encryption (IBE) systems, an efficient key delegation method to manage a large number of users and an efficient key revocation meth…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account