As these three theorems are equivalent to each other (see Section 3), it suffices to prove Theorem 3.7.

This paper concerns with a family of elliptic systems of linear elasticity with rapidly oscillating periodic coefficients, arising in the theory of h…

We present a feasible protocol to mimic topological Weyl semimetal phase in a small one-dimensional circuit-QED lattice. By modulating the photon hop…

Motivated by the next generation of gravitational wave (GW) detectors, we study the wave mechanics of a twisted light beam in the GW perturbed spacet…

Different from the conventional deep learning work based on an images content in computer vision, deep steganalysis is an art to detect the secret in…

Strongly interacting topological states in multi-particle quantum systems pose great challenges to both theory and experiment. Recently, bound states…

In recent years, image forensics has attracted more and more attention, and many forensic methods have been proposed for identifying image processing…

This paper is concerned with bounds on the maximum-likelihood (ML) decoding error probability of Reed-Solomon (RS) codes over additive white Gaussian…

Similar to variable selection in the linear regression model, selecting significant components in the popular additive regression model is of great i…

Mixed modes have been extensively observed in post-main-sequence stars by the Kepler and CoRoT space missions. The mixture of the p and g modes can b…

We present a novel method of integrating motion and appearance cues for foreground object segmentation in unconstrained videos. Unlike conventional m…

This paper aims at task-oriented action prediction, i.e., predicting a sequence of actions towards accomplishing a specific task under a certain scen…

A construction of big convolutional codes from short codes called block Markov superposition transmission (BMST) is proposed. The BMST is very simila…

Sparse inverse covariance selection is a fundamental problem for analyzing dependencies in high dimensional data. However, such a problem is difficul…

We use a strong-disorder renormalization group (SDRG) method and ground-state quantum Monte Carlo (QMC) simulations to study S=1/2 spin chains with r…

The deluge of networked data motivates the development of algorithms for computation- and communication-efficient information processing. In this con…

Person re-identification (re-id) suffers from a serious occlusion problem when applied to crowded public places. In this paper, we propose to retriev…

Point clouds data, as one kind of representation of 3D objects, are the most primitive output obtained by 3D sensors. Unlike 2D images, point clouds …

The emergence of high-dimensional data in various areas has brought new challenges to the ensemble clustering research. To deal with the curse of dim…

The success of neural summarization models stems from the meticulous encodings of source articles. To overcome the impediments of limited and sometim…

Age-of-information (AoI) is a novel metric that measures the freshness of information in status update scenarios. It is essential for real-time appli…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account