This is a experimental project. Feel free to send feedback!
Thesis Tide ranks papers based on their relevance to the fields, with the goal of making it easier to find the most relevant papers. It uses AI to analyze the content of papers and rank them!
We study in detail the postselection problem in a specific model: bosons hopping on a lattice subjected to continuous local measurements of quadrature observables. We solve the model analytically and ...
Useful Fields:
LTL3 is a multi-valued variant of Linear-time Temporal Logic for runtime verification applications. The semantic descriptions of LTL3 in previous work are given only in terms of the relationship to co...
Useful Fields:
We revisit the problem of synchronisability for communicating automata, i.e., whether the language of send messages for an asynchronous system is the same as the language of send messages with a synch...
Useful Fields:
We study the data-parallel language BUTF, inspired by the Futhark language for array programming. We give a translation of BUTF into a version of the pi-calculus with broadcasting and labeled names. T...
Useful Fields:
Let and let be an -invariant subspace with , corresponding to exterior eigenvalu...
Useful Fields:
Upcoming surveys are likely to discover a new sample of interstellar objects (ISOs) within the Solar System, but questions remain about the origin and distribution of this population within the Galaxy...
Useful Fields:
This study investigates the site occupancy preferences of Al in Ta(FeAl) Laves phases using first-principles calculations, with Al concentrations ranging from 0...
Useful Fields:
Recently, as Large Language Models (LLMs) have shown impressive emerging capabilities and gained widespread popularity, research on LLM-based search agents has proliferated. In real-world situations, ...
Useful Fields:
Quantum communication facilitates the secure transmission of information and the distribution of entanglement, but the rates at which these tasks can be achieved are fundamentally constrained by the c...
Useful Fields:
Retrieval-Augmented Generation (RAG) systems have shown promise in enhancing the performance of Large Language Models (LLMs). However, these systems face challenges in effectively integrating external...
Useful Fields:
Answering end user security questions is challenging. While large language models (LLMs) like GPT, LLAMA, and Gemini are far from error-free, they have shown promise in answering a variety of question...
Useful Fields:
Variational empirical Bayes (VEB) methods provide a practically attractive approach to fitting large, sparse, multiple regression models. These methods usually use coordinate ascent to optimize the va...
Useful Fields:
The global output of academic publications exceeds 5 million articles per year, making it difficult for humans to keep up with even a tiny fraction of scientific output. We need methods to navigate an...
Useful Fields:
Solar trajectory monitoring is a pivotal challenge in solar energy systems, underpinning applications such as autonomous energy harvesting and environmental sensing. A prevalent failure mode in sustai...
Useful Fields:
In this paper, a multi-agent motion planning problem is studied aiming to minimize energy consumption of connected automated vehicles (CAVs) in lane change scenarios. We model this interactive motion ...
Useful Fields:
The celebrated canonical Ramsey theorem of Erdős and Rado implies that for , any colouring of the edges of with sufficiently large gives a copy...
Useful Fields:
Video Anomaly Detection (VAD) aims to automatically analyze spatiotemporal patterns in surveillance videos collected from open spaces to detect anomalous events that may cause harm without physical co...
Useful Fields:
The Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST) will survey the southern sky to create the largest galaxy catalog to date, and its statistical power demands an improved understand...
Useful Fields:
Smart contracts form the core of Web3 applications. Contracts mediate the transfer of cryptocurrency, making them irresistible targets for hackers. We introduce ASP, a system aimed at easing the const...
Useful Fields:
Under the assumption that the adjusted Brill-Noether number is at least , we prove that the Brill-Noether loci in of pointed curves carryi...
Useful Fields: