Zobrazeno 1 - 10
of 3 449
pro vyhledávání: '"Wagner David"'
In this letter, we demonstrate for the first time that the moment expansion for an ultrarelativistic gas undergoing Bjorken flow diverges. We then show how this series can be resummed using the Borel-Pad\'e method and use this to determine the single
Externí odkaz:
http://arxiv.org/abs/2411.06267
Autor:
Sahu, Ricky, Marriott, Eric, Siegel, Ethan, Wagner, David, Uzan, Flore, Yang, Troy, Javed, Asim
With U.S. healthcare spending approaching $5T (NHE Fact Sheet 2024), and 25% of it estimated to be wasteful (Waste in the US the health care system: estimated costs and potential for savings, n.d.), the need to better predict risk and optimal patient
Externí odkaz:
http://arxiv.org/abs/2409.13000
Autor:
Wagner, David
In this work, the equations of dissipative relativistic spin hydrodynamics based on quantum kinetic theory are derived. Employing the inverse-Reynolds dominance (IReD) approach, a resummation scheme based on a power counting in Knudsen and inverse Re
Externí odkaz:
http://arxiv.org/abs/2409.07143
Current LLMs are generally aligned to follow safety requirements and tend to refuse toxic prompts. However, LLMs can fail to refuse toxic prompts or be overcautious and refuse benign examples. In addition, state-of-the-art toxicity detectors have low
Externí odkaz:
http://arxiv.org/abs/2405.18822
Retrieval-augmented generation (RAG) has been shown vulnerable to retrieval corruption attacks: an attacker can inject malicious passages into retrieval results to induce inaccurate responses. In this paper, we propose RobustRAG as the first defense
Externí odkaz:
http://arxiv.org/abs/2405.15556
Autor:
Kaya, Yigitcan, Chen, Yizheng, Saha, Shoumik, Pierazzi, Fabio, Cavallaro, Lorenzo, Wagner, David, Dumitras, Tudor
Machine learning is widely used for malware detection in practice. Prior behavior-based detectors most commonly rely on traces of programs executed in controlled sandboxes. However, sandbox traces are unavailable to the last line of defense offered b
Externí odkaz:
http://arxiv.org/abs/2405.06124
Publikováno v:
Phys.Rev.Res. 6 (2024) 4, 043103
We show that, in ideal-spin hydrodynamics, the components of the spin tensor follow damped wave equations. The damping rate is related to nonlocal collisions of the particles in the fluid, which enter at first order in $\hbar$ in a semi-classical exp
Externí odkaz:
http://arxiv.org/abs/2405.00533
The concept of a fully interlacing matrix of formal power series with real coefficients is introduced. This concept extends and strengthens that of an interlacing sequence of real-rooted polynomials with nonnegative coefficients, in the special case
Externí odkaz:
http://arxiv.org/abs/2404.12989
Autor:
Ding, Yangruibo, Fu, Yanjun, Ibrahim, Omniyyah, Sitawarin, Chawin, Chen, Xinyun, Alomair, Basel, Wagner, David, Ray, Baishakhi, Chen, Yizheng
In the context of the rising interest in code language models (code LMs) and vulnerability detection, we study the effectiveness of code LMs for detecting vulnerabilities. Our analysis reveals significant shortcomings in existing vulnerability datase
Externí odkaz:
http://arxiv.org/abs/2403.18624
Autor:
Francis, Paul, Wagner, David
The purpose of anonymizing structured data is to protect the privacy of individuals in the data while retaining the statistical properties of the data. There is a large body of work that examines anonymization vulnerabilities. Focusing on strong anon
Externí odkaz:
http://arxiv.org/abs/2403.06595