This is a experimental project. Feel free to send feedback!
Thesis Tide ranks papers based on their relevance to the fields, with the goal of making it easier to find the most relevant papers. It uses AI to analyze the content of papers and rank them!
Learned image compression (LIC) has demonstrated superior rate-distortion (R-D) performance compared to traditional codecs, but is challenged by training inefficiency that could incur more than two we...
Useful Fields:
This paper investigates deteriorations in knee and ankle dynamics during running. Changes in lower limb accelerations are analyzed by a wearable musculo-skeletal monitoring system. The system employs ...
Useful Fields:
Laser-induced breakdown with ultrashort laser pulses is isochoric and inertially confined. It is characterized by a sequence of nonlinear energy deposition and hydrodynamics events such as shock wave ...
Useful Fields:
Detecting weaknesses in cryptographic algorithms is of utmost importance for designing secure information systems. The state-of-the-art soft analytical side-channel attack (SASCA) uses physical leakag...
Useful Fields:
The notion of matched pair of actions on a Hopf algebra generalizes the braided group construction of Lu, Yan and Zhu, and efficiently provides Yang-Baxter operators. In this paper, we classify matche...
Useful Fields:
The paper introduces EICopilot, an novel agent-based solution enhancing search and exploration of enterprise registration data within extensive online knowledge graphs like those detailing legal entit...
Useful Fields:
Binary observations are often repeated to improve data quality, creating technical replicates. Several scoring methods are commonly used to infer the actual individual state and obtain a probability f...
Useful Fields:
An important choice in the design of satellite networks is whether the routing decisions are made in a distributed manner onboard the satellite, or centrally on a ground-based controller. We study the...
Useful Fields:
This paper introduces GPT-HTree, a framework combining hierarchical clustering, decision trees, and large language models (LLMs) to address this challenge. By leveraging hierarchical clustering to seg...
Useful Fields:
Code generation aims to automatically generate code snippets of specific programming language according to natural language descriptions. The continuous advancements in deep learning, particularly pre...
Useful Fields:
In this article, we numerically study the dynamics of a two-dimensional quasi-fluxon bubble in an oscillatory regime stabilized by a localized annular force under a rapidly oscillating microwave field...
Useful Fields:
We establish a framework that allows us to transfer results between some constraint satisfaction problems with infinite templates and promise constraint satisfaction problems. On the one hand, we obta...
Useful Fields:
A black hole is the end state of the gravitational collapse of massive stars. However, a typical black hole contains a singularity and to avoid singularity formation we have to violate a strong energy...
Useful Fields:
We compute the Euler characteristic of the moduli space of quadratic rational maps with a periodic marked critical point of a given period.
Useful Fields:
Surface parametrization plays a crucial role in various fields, such as computer graphics and medical imaging, and computational science and engineering. However, most existing techniques rely on the ...
Useful Fields:
We study a quantity called discrete layered entropy, which approximates the Shannon entropy within a logarithmic gap. Compared to the Shannon entropy, the discrete layered entropy is piecewise linear,...
Useful Fields:
Attention maps in neural models for NLP are appealing to explain the decision made by a model, hopefully emphasizing words that justify the decision. While many empirical studies hint that attention m...
Useful Fields:
Modern machine learning algorithms, especially deep learning based techniques, typically involve careful hyperparameter tuning to achieve the best performance. Despite the surge of intense interest in...
Useful Fields:
The Stealth Address Protocol (SAP) allows users to receive assets through stealth addresses that are unlinkable to their stealth meta-addresses. The most widely used SAP, Dual-Key SAP (DKSAP), and the...
Useful Fields:
Analyzing relationships between objects is a pivotal problem within data science. In this context, Dimensionality reduction (DR) techniques are employed to generate smaller and more manageable data re...
Useful Fields: