1273993 results (page 121 of 50960)
-
A Filtered MgNet Solver For Radiative Transfer Equations
Conventional numerical solvers for the radiative transfer equation (RTE) exhibit severe sensitivity to medium parameters. To address this, we propose an operator learning framework that approximates the RTE solution map as a function of material properties. The core architecture, MgNet, preserves the solution operator framework established by recursive skeleton factorization (RSF) but substitutes …
-
MotionHiFlow: Text-to-motion via hierarchical flow matching
Text-to-motion generation aims to generate 3D human motions that are tightly aligned with the input text while remaining physically plausible and rich in fine-grained detail. Although recent approaches can produce complex and natural movements, they usually operate at only one temporal scale, which limits both semantic alignment and temporal coherence. Inspired by the fact that complex motions are…
-
Small Language Model Helps Resolve Semantic Ambiguity of LLM Prompt
Large language models (LLMs) are increasingly utilized in various complex reasoning tasks due to their excellent instruction following capability. However, the model's performance is highly dependent on the open-ended characteristics of the users' input prompt. Natural prompts often do not follow proper syntactic rules, which creates ambiguous queries that yield multiple interpretations. Such ambi…
-
An Interactive Graphical Tool to Check the Coarray Continuity of Two-Fold Redundant Sparse Arrays (TFRSAs) Under Single Sensor Failures
Two-fold redundant sparse arrays possess inbuilt redundancy to tackle single-element failures. This property enables them to perform accurate direction of arrival (DOA) estimation even during single sensor faults. However, recent literature suggests that some TFRSAs suffer from hidden dependencies whereby a single sensor fault at peculiar positions within the array cause discontinuities (holes) in…
-
Explicit integral representations and quantitative bounds for two-layer ReLU networks
An approach to construct explicit integral representations for two-layer ReLU networks is presented, which provides relatively simple representations for any multivariate polynomial. Quantitative bounds are provided for a particular, sharpened ReLU integral representation, which involves a harmonic extension and a projection. The bounds demonstrate that functions can be approximated with $L^{2}(\m…
-
Knowledge Lever Risk Management for Software Engineering: A Stochastic Framework for Mitigating Knowledge Loss
Software engineering (SE) organizations operate in a knowledge-intensive domain where critical assets -- architectural expertise, design rationale, and system intuition -- are overwhelmingly tacit and volatile. The departure of key contributors or the decay of undocumented decisions can severely impair project velocity and software quality. While conventional SE risk management optimized for sched…
-
Why Architecture Choice Matters in Symbolic Regression
Symbolic regression discovers mathematical formulas from data. Some methods fix a tree of operators, assign learnable weights, and train by gradient descent. The tree's structure, which determines what operators and variables appear at each position, is chosen once and applied to every target. This paper tests whether that choice affects which targets are actually recovered. Three structures are c…
-
Scalable LLM-based Coding of Dialogue in Healthcare Simulation: Balancing Coding Performance, Processing Time, and Environmental Impact
Research shows that dialogue, the interactive process through which participants articulate their thinking, plays a central role in constructing shared understanding, coordinating action, and shaping learning outcomes in teams. Analysing dialogue content has been central to advancing team learning theory and informing the design of computer-supported collaborative learning environments, yet this p…
-
Robust Operation of Distribution Networks: Generalized Uncertainty Modelling in Confidence-Level-Based Information Gap Decision
This paper studies the robust optimal operation of distribution networks (DNs) under renewable generation and load demand uncertainties, seeking an improved trade-off between robustness and economic performance. Building upon information gap decision theory (IGDT), a generalized uncertainty modelling is proposed to enhance the expressiveness of the uncertainty characterization. The proposed modell…
-
AI-Assisted Code Review as a Scaffold for Code Quality and Self-Regulated Learning: An Experience Report
Code review is central to software engineering education but hard to scale in capstone projects due to tight deadlines, uneven peer feedback, and limited prior experience. We investigate an LLM-as-reviewer integrated directly into GitHub pull requests (human-in-the-loop) across two cohorts (more than 100 students, 2023--2024). Using a mixed-methods design -- GitHub data, reflective reports, and a …
-
Ground measurements of the gravitational redshift questioned:re-establishing the physical bases
Motivated by alleged inconsistencies in the scientific and educational literature, Asenbaum, Overstreet and Kasevic \href{https://doi.org/10.1088/1402-4896/ad340c}{(2024)} aim to clarify some fundamental concepts in the physics of gravitation. To this end they reexamine the first experimental measurement of the gravitational redshift by Pound and Rebka in 1960, claiming that it did not in fact mea…
-
BridgeACT: Bridging Human Demonstrations to Robot Actions via Unified Tool-Target Affordances
Learning robot manipulation from human videos is appealing due to the scale and diversity of human demonstrations, but transferring such demonstrations to executable robot behavior remains challenging. Prior work either relies on robot data for downstream adaptation or learns affordance representations that remain at the perception level and do not directly support real-world execution. We present…
-
PrivacyAssist: A User-Centric Agent Framework for Detecting Privacy Inconsistencies in Android Apps
Mobile apps offer significant benefits, but their privacy protections often remain ineffective and confusing for users. While prior work mainly analyzes app privacy vulnerabilities, few approaches help users understand, set, and enforce their privacy preferences. This paper presents PrivacyAssist, a multi-agent LLM-based platform that detects inconsistencies between user-granted permissions and de…
-
Micro-Expression-Aware Avatar Fingerprinting via Inter-Frame Feature Differencing
Avatar fingerprinting, i.e., verifying who drives a synthetic talking-head video rather than whether it is real, is a critical safeguard for authorized use of face-reenactment technology. Existing methods rely on a fixed, non-differentiable landmark extraction stage that prevents the fingerprinting model from being optimized end-to-end from raw pixels. We propose a preprocessing-free system built …
-
Leaky-Coaxial Pinching-Antenna System with Adjustable Slot Apertures
As a practical physical implementation of pinching-antenna systems, leaky coaxial cable (LCX) enables distributed radiation in more general wireless environments, particularly for lower-frequency applications. In this paper, a leaky-coaxial pinching-antenna system, referred to as the LCX pinching-antenna system, is investigated, and adjustable slot apertures are introduced, such that the slot size…
-
Semantic Denial of Service in LLM-controlled robots
Safety-oriented instruction-following is supposed to keep LLM-controlled robots safe. We show it also creates an availability attack surface. By injecting short safety-plausible phrases (1-5 tokens) into a robots audio channel, an adversary can trigger the models safety reasoning to halt or disrupt execution without jailbreaking the model or overriding its policy. In the embodied setting, this is …
-
Training Machine Learning Models on Encrypted Data: A Privacy-Preserving Framework using Homomorphic Encryption
The use of Machine Learning (ML) for data-driven decision-making often relies on access to sensitive datasets, which introduces privacy challenges. Traditional encryption methods protect data at rest or in transit but fail to secure it during processing, exposing it to unauthorized access. Homomorphic encryption emerges as a transformative solution, enabling computations on encrypted data without …
-
Spectro-Temporal Modulation Representation Framework for Human-Imitated Speech Detection
Human-imitated speech poses a greater challenge than AI-generated speech for both human listeners and automatic detection systems. Unlike AI-generated speech, which often contains artifacts, over-smoothed spectra, or robotic cues, imitated speech is produced naturally by humans, thereby preserving a higher degree of naturalness that makes imitation-based speech forgery significantly more challengi…
-
sumoITScontrol: Traffic Controller Collection for SUMO Traffic Simulations
Reliable benchmarking is essential for progress in intelligent traffic control research. While microscopic traffic simulators such as SUMO enable detailed modelling of individual vehicle interactions, many published control studies still rely on single-run evaluations and project-specific baseline implementations, limiting reproducibility and comparability. This paper presents sumoITScontrol, an o…
-
AdaMamba: Adaptive Frequency-Gated Mamba for Long-Term Time Series Forecasting
Accurate long-term time series forecasting (LTSF) requires the capture of complex long-range dependencies and dynamic periodic patterns. Recent advances in frequency-domain analysis offer a global perspective for uncovering temporal characteristics. However, real-world time series often exhibit pronounced cross-domain heterogeneity where variables that appear synchronized in the time domain can di…
-
Protecting the Trace: A Principled Black-Box Approach Against Distillation Attacks
Frontier models push the boundaries of what is learnable at extreme computational costs, yet distillation via sampling reasoning traces exposes closed-source frontier models to adversarial third parties who can bypass their guardrails and misappropriate their capabilities, raising safety, security, and intellectual privacy concerns. To address this, there is growing interest in building antidistil…
-
Age of Information under Source-Aware Truncated ARQ in Multi-Source Wireless Status Updating
This paper studies information timeliness in multi-source wireless Internet of Things (IoT) status updating systems under a truncated Automatic Repeat reQuest (ARQ) protocol. We propose a source-aware truncated ARQ (SATARQ) scheme that allows differentiated maximum transmission times (MTTs) tailored to different sources. This work focuses on a wireless system with preemptive update management. To …
-
The functional form of galaxy and halo luminosity and mass functions
The galaxy luminosity and stellar mass function (LF, SMF), and halo mass function (HMF), are fundamental quantities in astrophysics and crucial inputs to a range of astrophysical and cosmological analyses. They are typically parametrised by fitting functions that have been chosen "by eye" to match observed or simulated data. We apply symbolic regression -- specifically the Exhaustive Symbolic Regr…
-
Measuring Temporal Linguistic Emergence in Diffusion Language Models
Diffusion language models expose an explicit denoising trajectory, making it possible to ask when different kinds of information become measurable during generation. We study three independent 32-step runs of LLaDA-8B-Base on masked WikiText-103 text, each with 1{,}000 probe-training sequences and 200 held-out evaluation sequences. From saved trajectories, we derive four temporal measurements: tok…
-
Effect of total dose proton irradiation on the performance of Kinetic Inductance Detectors for far-Infrared space observatory
Kinetic Inductance Detectors (KIDs) are a promising technology for future space missions, where exposure to high-energy particles may affect detector performance. In this work, we irradiated two types of KID arrays, absorber coupled and antenna coupled, with high-energy protons at 120 mK. We used a total dose equivalent to approximately 10 years of operation at the L2 Lagrange point. A comparison …