Combinatorial Bandits generalize multi-armed bandits, where k out of n arms are chosen at each round and the sum of the rewards is gained. We address…

If particles interact according to isotropic pair potentials that favor multiple length scales, in principle a large variety of different complex str…

The recent empirical success of unsupervised cross-domain mapping algorithms, between two domains that share common characteristics, is not well-supp…

The short Gamma-Ray Burst, GRB170817A, that followed the binary neutron star merger gravitational waves signal, GW170817, is not a usual sGRB. It is …

We consider the problem of online set cover with delay (SCD) suggested by Carrasco, Pruhs, Stein and Verschae and resolve various of their open probl…

Gene translation is the process in which intracellular macro-molecules, called ribosomes, decode genetic information in the mRNA chain into the corre…

This section contains a relatively detailed sketch of the proof of Theorem 1.8; The full proof will be provided in the full version of this paper.

The emerging theory of graph limits exhibits an interesting analytic perspective on graphs, showing that many important concepts and tools in graph t…

We prove that the discrete harmonic function corresponding to smooth Dirichlet boundary conditions on orthodiagonal maps, that is, plane graphs havin…

Empirical evidence suggests that neural networks with ReLU activations generalize better with over-parameterization. However, there is currently no t…

Optimization problem with quadratic equality constraints are prevalent in machine learning. Indeed, two important examples are Canonical Correlation …

The Subtree Isomorphism problem asks whether a given tree is contained in another given tree. The problem is of fundamental importance and has been s…

We consider the problem of estimating an unbiased and reference-free ab-inito model for non-symmetric molecules from images generated by single-parti…

Steady-state solutions of the Poisson-Nernst-Planck model are studied in the asymptotic limit of large, but finite domains. By using asymptotic match…

We continue our program of describing hadrons as rotating strings with massive endpoints. In this paper we propose models of baryons and confront the…

While there are optimal TSP solvers, as well as recent learning-based approaches, the generalization of the TSP to the Multiple Traveling Salesmen Pr…

We generalize an approach from a 1960 paper by Ljunggren, leading to a practical algorithm that determines the set of $N > \operatorname{deg}(c) + \o…

In this work, the Coulomb mixing and the isospin mixing in the ground states of even-even nuclei are evaluated in perturbation theory. The calculatio…

We use persistence modules and their corresponding barcodes to quantitatively distinguish between different fiberwise star-shaped domains in the cota…

Distributed protocols such as Paxos play an important role in many computer systems. Therefore, a bug in a distributed protocol may have tremendous e…

Supervised machine learning algorithms, especially in the medical domain, are affected by considerable ambiguity in expert markings. In this study we…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account