We present a new analysis of Kerr-Newman-deSitter black holes in terms of thermodynamic quantities that are defined in the observable portion of the …

Accurate and reliable predictions of infectious disease dynamics can be valuable to public health organizations that plan interventions to decrease o…

We use a variational principle to derive a mathematical model for a nematic electrolyte in which the liquid crystalline component is described in ter…

This paper presents an advanced DAG-based algorithm for datapath synthesis that targets area minimization using logic-level resource sharing. The pro…

Cloud spot markets rent VMs for a variable price that is typically much lower than the price of on-demand VMs, which makes them attractive for a wide…

We introduce exactly solvable gapless quantum systems in $d$ dimensions that support symmetry protected topological (SPT) edge modes. Our constructio…

Current techniques for formally verifying circuits implemented in Galois field (GF) arithmetic are limited to those with a known irreducible polynomi…

Source coding is the canonical problem of data compression in information theory. In a {\em locally encodable} source coding, each compressed bit dep…

In this work we use the framework of effective field theory to couple Einstein's gravity to scalar electrodynamics and determine the renormalization …

Sports broadcasters inject drama into play-by-play commentary by building team and player narratives through subjective analyses and anecdotes. Prior…

Supermassive black holes (SMBHs) can capture and tidally disrupt stars or sub-stellar objects orbiting nearby. The detections of Sw J1644+57-like eve…

For a network of stochastic units trained on a reinforcement learning task, one biologically plausible way of learning is to treat each unit as a rei…

We present a 1.1~mm census of dense cores in the Mon~R2 Giant Molecular Cloud with the AzTEC instrument on the Large Millimeter Telescope (LMT). We d…

On an evolving graph that is continuously updated by a high-velocity stream of edges, how can one efficiently maintain if two vertices are connected?…

Compressive sensing (CS) has attracted significant attention in parameter estimation tasks, where parametric dictionaries (PDs) collect signal observ…

We estimate the intra-option policy gradient using REINFORCE Differentiating the inter-option policy objective with respect to θ gives us the intra-option policy gradient as

The option-critic paper and several variants have successfully demonstrated the use of the options framework proposed by Barto et al to scale learnin…

We report on the results of the E06-014 experiment performed at Jefferson Lab in Hall A, where a precision measurement of the twist-3 matrix element …

Gate camouflaging is a known security enhancement technique that tries to thwart reverse engineering by hiding the functions of gates or the connecti…

By signing up you accept our content policy

Already have an account? Sign in

No a member yet? Create an account