In this section we present two protocols. Our protocols are based on pairwise independent generators and unbalanced expanders with near-optimal expansion. Here different rounds use different random bits. In contrast to O(nlogn) random bits per round…

We study gossip algorithms for the rumor spreading problem which asks one node to deliver a rumor to all nodes in an unknown network. We present the …

We will investigate the scenario in which the Standard Model (SM) Higgs sector and its 2-doublet extension (called the Two Higgs Doublet Model or 2HD…

The feedback arc (vertex) set problem, shortened FASP (FVSP), is to transform a given multi digraph $G=(V,E)$ into an acyclic graph by deleting as fe…

In this section, we consider a different model that tries to capture the effect that agents prefer certain outcomes to uncertain ones. It is inspired by similar models in game theory and penalizes variance of random variables. Rather than reflecting…

We study the price of anarchy of mechanisms in the presence of risk-averse agents. Previous work has focused on agents with quasilinear utilities, po…

Aims: Probe the high-energy ($>$60 MeV) emission from the black hole X-ray binary system, Cygnus X-1, and investigate its origin. Methods: We analyse…

Learning a joint language-visual embedding has a number of very appealing properties and can result in variety of practical application, including na…

Together with the development of more accurate methods in Computer Vision and Natural Language Understanding, holistic architectures that answer on q…

We study the problem of inverse reinforcement learning (IRL) with the added twist that the learner is assisted by a helpful teacher. More formally, w…

We propose a method for automatically answering questions about images by bringing together recent advances from natural language processing and comp…

Real-time simultaneous tracking of hands manipulating and interacting with external objects has many potential applications in augmented reality, tan…

The Cherenkov Telescope Array will provide unprecedented sensitivity and angular resolution to gamma rays across orders of magnitude in energy. Above…

In this paper we consider kernelization for problems on d-degenerate graphs, i.e. graphs such that any subgraph contains a vertex of degree at most $…

The H.E.S.S. experiment entered its phase II with the addition of a new, large telescope named CT 5 that was added to the centre of the existing arra…

The TeV gamma-ray point source HESSJ1832-093 remains unidentified despite extensive multi-wavelength studies. The gamma-ray emission could originate …

Learning the parameters of complex probabilistic-relational models from labeled training data is a standard technique in machine learning, which has …

Best-fit values of recent global analyzes of neutrino data imply large solar neutrino mixing, vanishing U_{e3} and a non-maximal atmospheric neutrino…

In order to solve partial differential equations numerically and accurately, a high order spatial discretization is usually needed. Model order reduc…

Incremental stability is a property of dynamical and control systems, requiring the uniform asymptotic stability of every trajectory, rather than tha…

The detection of gamma rays in the very-high-energy (VHE) energy range (100 GeV--100 TeV) provides a direct view of the parent population of ultra-re…

We prove polynomial upper bounds of geometric Ramsey numbers of pathwidth-2 outerplanar triangulations in both convex and general cases. We also prov…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account