Z. Chen would like to thank P. Xu and M. Stienon for the useful discussions and suggestions that helped him improving this work. Y.-H. Sheng gives his warmest thanks to L. Hoevenaars, M. Crainic, I. Moerdijk and C. Zhu for their help and useful comm…

Omni-Lie algebroids are generalizations of Alan Weinstein's omni-Lie algebras. A Dirac structure in an omni-Lie algebroid $\dev E\oplus \jet E$ is ne…

We study the property of the $X(3872)$ meson by analyzing the $B\to K D\bar D^*$ and $B\to K J/\psi \pi^+\pi^-$ decay processes. The competition betw…

Hashing methods have attracted much attention for large scale image retrieval. Some deep hashing methods have achieved promising results by taking ad…

The hybrid relay selection (HRS) scheme, which adaptively chooses amplify-and-forward (AF) and decode-and-forward (DF) protocols, is very effective t…

In this paper, we introduce a novel regularization method called Adversarial Noise Layer (ANL), which significantly improve the CNN's generalization …

In the past decades, exactly recovering the intrinsic data structure from corrupted observations, which is known as robust principal component analys…

We construct a complete set of Wannier functions which are localized at both given positions and momenta. This allows us to introduce the quantum pha…

Feature extraction and matching are two crucial components in person Re-Identification (ReID). The large pose deformations and the complex view varia…

We report a Lagrangian study on the evolution of material surfaces in the K-type temporal transitional channel flow. Based on the Eulerian velocity f…

We propose a new neurally-inspired model that can learn to encode the global relationship context of visual events across time and space and to use t…

A streaming graph is a graph formed by a sequence of incoming edges with time stamps. Unlike static graphs, the streaming graph is highly dynamic and…

In this paper, we focus on the COM-type negative binomial distribution with three parameters, which belongs to COM-type $(a,b,0)$ class distributions…

Studying strategy update rules in the framework of evolutionary game theory, one can differentiate between imitation processes and aspiration-driven …

In this paper, we study the resource allocation problem for a single-cell non-orthogonal multiple access (NOMA) relay network where an OFDM amplify-a…

In this paper, we introduce Iterative Text Summarization (ITS), an iteration-based model for supervised extractive text summarization, inspired by th…

Sentiment analysis has various application scenarios in software engineering (SE), such as detecting developers' emotions in commit messages and iden…

We give the first deterministic fully polynomial-time approximation scheme (FPTAS) for computing the partition function of a two-state spin system on…

In this paper, we propose a method layering two independent BPSK symbol streams in parallel transmission through a single additive white Gaussian noi…

We study the properties of rotating accretion flows onto supermassive black holes (SMBHs) using axisymmetric two-dimensional hydrodynamical simulatio…

The peridynamic model of a solid does not involve spatial gradients of the displacement field and is therefore well suited for studying defect propag…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account