Zobrazeno 1 - 10
of 79 229
pro vyhledávání: '"A ip"'
Autor:
Zhou, Zijie, Lu, Zhaoqi, Wei, Xuekai, Chen, Rongqin, Zhang, Shenghui, Ip, Pak Lon, U, Leong Hou
Graph Neural Networks (GNNs) are widely used in graph data mining tasks. Traditional GNNs follow a message passing scheme that can effectively utilize local and structural information. However, the phenomena of over-smoothing and over-squashing limit
Externí odkaz:
http://arxiv.org/abs/2412.15302
Autor:
Zhao, J. -T., Zong, Q. -G., Liu, Z. -Y., Zhou, X. -Z., Wang, S., Ip, W. -H., Yue, C., Li, J. -H., Hao, Y. -X., Rankin, R., Degeling, A., Fu, S. -Y., Zou, H., Wang, Y. -F.
The absence of global magnetic fields is often cited to explain why Mars lacks a dense atmosphere. This line of thought is based on a prevailing theory that magnetic fields can shield the atmosphere from solar wind erosion. However, we present observ
Externí odkaz:
http://arxiv.org/abs/2410.00832
We apply multi-algorithm machine learning models to TESS 2-minute survey data from Sectors 1-72 to identify stellar flares. Models trained with Deep Neural Network, Random Forest, and XGBoost algorithms, respectively, utilized four flare light curve
Externí odkaz:
http://arxiv.org/abs/2409.02540
Deep neural networks are increasingly used as an effective way to represent control policies in a wide-range of learning-based control methods. For continuous-time optimal control problems (OCPs), which are central to many decision-making tasks, cont
Externí odkaz:
http://arxiv.org/abs/2409.00393
This study explores the emerging area of continual panoptic segmentation, highlighting three key balances. First, we introduce past-class backtrace distillation to balance the stability of existing knowledge with the adaptability to new information.
Externí odkaz:
http://arxiv.org/abs/2407.16354
Autor:
Nguyen, Khanh Duy, Lee, Woojoo, Dang, Jianchen, Wu, Tongyao, Berruto, Gabriele, Yan, Chenhui, Ip, Chi Ian Jess, Lin, Haoran, Gao, Qiang, Lee, Seng Huat, Yan, Binghai, Liu, Chaoxing, Mao, Zhiqiang, Zhang, Xiao-Xiao, Yang, Shuolong
The indirect exchange interaction between local magnetic moments via surface electrons has been long predicted to bolster the surface ferromagnetism in magnetic topological insulators (MTIs), which facilitates the quantum anomalous Hall effect. This
Externí odkaz:
http://arxiv.org/abs/2407.00281
We propose an efficient sensitivity analysis method for a wide class of colored noise-driven interacting particle systems (IPS). Our method is based on unperturbed simulations and significantly extends the Malliavin weight sampling method proposed by
Externí odkaz:
http://arxiv.org/abs/2406.11454
Autor:
Ip, Chi Ian Jess, Gao, Qiang, Nguyen, Khanhy Du, Yan, Chenhui, Yan, Gangbin, Hoenig, Eli, Marchese, Thomas S., Zhang, Minghao, Lee, Woojoo, Rokni, Hossein, Meng, Ying Shirley, Liu, Chong, Yang, Shuolong
Publikováno v:
Nano Letters 2024
Ultrathin topological insulator membranes are building blocks of exotic quantum matter. However, traditional epitaxy of these materials does not facilitate stacking in arbitrary orders, while mechanical exfoliation from bulk crystals is also challeng
Externí odkaz:
http://arxiv.org/abs/2405.13228
Autor:
Nishizawa, Hideki, Borraccini, Giacomo, Sasai, Takeo, Huang, Yue-Kai, Mano, Toru, Anazawa, Kazuya, Namiki, Masatoshi, Usui, Soichiroh, Matsumura, Tatsuya, Sone, Yoshiaki, Wang, Zehao, Okamoto, Seiji, Inoue, Takeru, Ip, Ezra, D'Amico, Andrea, Chen, Tingjun, Curri, Vittorio, Wang, Ting, Asahi, Koji, Takasugi, Koichi
We propose methods and an architecture to conduct measurements and optimize newly installed optical fiber line systems semi-automatically using integrated physics-aware technologies in a data center interconnection (DCI) transmission scenario. We dem
Externí odkaz:
http://arxiv.org/abs/2403.16281
Autor:
Halder, S., Bewong, M., Mahboubi, A., Jiang, Y., Islam, R., Islam, Z., Ip, R., Ahmed, E., Ramachandran, G., Babar, A.
Protecting software supply chains from malicious packages is paramount in the evolving landscape of software development. Attacks on the software supply chain involve attackers injecting harmful software into commonly used packages or libraries in a
Externí odkaz:
http://arxiv.org/abs/2402.07444