Start Exploring Research Today

Join our community of researchers and gain deeper insights into academic papers.

By subscribing, you agree to our Terms of Service and Privacy Policy.

Constraints on the active galactic nucleus and starburst activity of local ultraluminous infrared galaxies from a broad range of torus models

February 19, 2025

| | | | | | |

Physics
Astrophysics of Galaxies
Astrophysics of Galaxies
In this paper we further explore the properties of the HERschel Ultra Luminous Infrared Galaxy Survey (HERUS) sample of 42 local ultraluminous infrared galaxies (ULIRGs) with our recently developed Bayesian spectral energy distribution (SED...

Towards Context-Robust LLMs: A Gated Representation Fine-tuning Approach

February 19, 2025

| | | | | | | | | | and others

Computer Science
Computation and Language
Information Retrieval
Computation and Language
Information Retrieval
Large Language Models (LLMs) enhanced with external contexts, such as through retrieval-augmented generation (RAG), often face challenges in handling imperfect evidence. They tend to over-rely on external knowledge, making them vulnerable t...

Point Cloud Geometry Scalable Coding Using a Resolution and Quality-conditioned Latents Probability Estimator

February 19, 2025

| | | | | | | | |

Computer Science
Computer Vision and Pattern Recognition
Computer Vision and Pattern Recognition
In the current age, users consume multimedia content in very heterogeneous scenarios in terms of network, hardware, and display capabilities. A naive solution to this problem is to encode multiple independent streams, each covering a differ...

Temperature Dependence of Beam on Plasma Stopping Power in the Resonance Regions of Fusion Reactions

February 19, 2025

|

Physics
Plasma Physics
Nuclear Experiment
Nuclear Theory
Accelerator Physics
Plasma Physics
Nuclear Experiment
Nuclear Theory
Accelerator Physics
A recent proposal of accelerator based fusion reactor considers a scheme where an ion beam from the accelerator hits the target plasma on the resonance of the fusion reaction so that the reactivity (σv\sigma v) can be an order of magnitude ...

A comprehensive study of bound-states for the nonlinear Schr\"odinger equation on single-knot metric graphs

February 19, 2025

| | | | |

Mathematics
Analysis of PDEs
Classical Analysis and ODEs
Analysis of PDEs
Classical Analysis and ODEs
We study the existence and qualitative properties of action ground-states (that is, bound-states with minimal action) {of the nonlinear Schr\"odinger equation} over single-knot metric graphs -- which are made of half-lines, loops and pendan...

Aligned Multi Objective Optimization

February 19, 2025

| | | | | | | | | | and others

Computer Science
Mathematics
Machine Learning
Optimization and Control
Machine Learning
Optimization and Control
To date, the multi-objective optimization literature has mainly focused on conflicting objectives, studying the Pareto front, or requiring users to balance tradeoffs. Yet, in machine learning practice, there are many scenarios where such co...

Retrieving Versus Understanding Extractive Evidence in Few-Shot Learning

February 19, 2025

| | |

Computer Science
Computation and Language
Computation and Language
A key aspect of alignment is the proper use of within-document evidence to construct document-level decisions. We analyze the relationship between the retrieval and interpretation of within-document evidence for large language model in a fe...

CND-IDS: Continual Novelty Detection for Intrusion Detection Systems

February 19, 2025

| | | | |

Computer Science
Cryptography and Security
Machine Learning
Cryptography and Security
Machine Learning
Intrusion detection systems (IDS) play a crucial role in IoT and network security by monitoring system data and alerting to suspicious activities. Machine learning (ML) has emerged as a promising solution for IDS, offering highly accurate i...

A New Framework of Software Obfuscation Evaluation Criteria

February 19, 2025

|

Computer Science
Software Engineering
Cryptography and Security
Software Engineering
Cryptography and Security
In the domain of practical software protection against man-at-the-end attacks such as software reverse engineering and tampering, much of the scientific literature is plagued by the use of subpar methods to evaluate the protections' strengt...

Hybrid Visual Servoing of Tendon-driven Continuum Robots

February 19, 2025

| | | | |

Computer Science
Electrical Engineering and Systems Science
Robotics
Computer Vision and Pattern Recognition
Systems and Control
Systems and Control
Robotics
Computer Vision and Pattern Recognition
Systems and Control
Systems and Control
This paper introduces a novel Hybrid Visual Servoing (HVS) approach for controlling tendon-driven continuum robots (TDCRs). The HVS system combines Image-Based Visual Servoing (IBVS) with Deep Learning-Based Visual Servoing (DLBVS) to overc...