A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Inverse-design magnonic devices
[article]
2020
arXiv
pre-print
Wang, Q. et al. Spin pinning and spin-wave dispersion in nanoscopic ferromagnetic waveguides. Phys. Rev. Lett. 122, 247202 (2019). ...
arXiv:2012.04544v1
fatcat:z4pgbrlugvbodlmy72oddu6pva
Philippe Lambin: how advances in imaging impact precision radiation oncology?
2018
Precision Cancer Medicine
Now, I think Meet the Professor Philippe Lambin: how advances in imaging impact precision radiation oncology? ...
Expert introduction Philippe Lambin (Figure 1) , Professor, Radiation Oncology, Maastricht University, The Netherlands. Prof. ...
doi:10.21037/pcm.2018.09.06
fatcat:spokzli575gsbkdohpdklqsr3y
Objects as Points
[article]
2019
arXiv
pre-print
Detection identifies objects as axis-aligned boxes in an image. Most successful object detectors enumerate a nearly exhaustive list of potential object locations and classify each. This is wasteful, inefficient, and requires additional post-processing. In this paper, we take a different approach. We model an object as a single point --- the center point of its bounding box. Our detector uses keypoint estimation to find center points and regresses to all other object properties, such as size, 3D
arXiv:1904.07850v2
fatcat:sqvmgaq35rfx7o4uvmo4d5agle
more »
... location, orientation, and even pose. Our center point based approach, CenterNet, is end-to-end differentiable, simpler, faster, and more accurate than corresponding bounding box based detectors. CenterNet achieves the best speed-accuracy trade-off on the MS COCO dataset, with 28.1% AP at 142 FPS, 37.4% AP at 52 FPS, and 45.1% AP with multi-scale testing at 1.4 FPS. We use the same approach to estimate 3D bounding box in the KITTI benchmark and human pose on the COCO keypoint dataset. Our method performs competitively with sophisticated multi-stage methods and runs in real-time.
Measures of scalability
[article]
2014
arXiv
pre-print
Philipp thanks the Matheon for their support. K. A. Okoudjou was supported by the Alexander von Humboldt foundation. ...
Wang was supported by CRD Grant DNOISE 334810-05 and by the industrial sponsors of the Seismic Laboratory for Imaging and Modelling: BG Group, BGP, BP, Chevron, ConocoPhilips, Petrobras, PGS, Total SA, ...
arXiv:1406.2137v1
fatcat:3ho6zrgf7fbsfhxgf7qsgbq5eq
The carbon balance of terrestrial ecosystems in China
2009
Nature
The AdipoChaser mouse
2014
Adipocyte
Objective Caml for Multicore Architectures
[article]
2020
arXiv
pre-print
Objective Caml is a famous dialect of the ML family languages. It is well-known for its performance as a compiled programming language, notably thanks to its incremental generational automatic memory collection. However, for historical reasons, the latter was built for monocore processors. One consequence is the runtime library assumes there is effectively no more than one thread running at a time, which allows many optimisations for monocore architectures: very few thread mutexes are
arXiv:2006.05862v1
fatcat:gplgxb2w7nctbp2vm6p7bvoqgy
more »
... to prevent more than a single thread to run at a time. This makes memory allocation and collection quite easier. The way it was built makes it not possible to take advantage of now widespread multicore CPU architectures. This paper presents our feedback on removing Objective Caml's garbage collector and designing a "Stop-The-World Stop&Copy" garbage collector to permit threads to take advantage of multicore architectures.
Unusual Solvent Dependence of a Molecule-Based FeIIMacrocyclic Spin-Crossover Complex
2014
European Journal of Inorganic Chemistry
This work illustrates in detail the reversible hydration-dehydration process of a molecule-based material, which involves a drastic change of the switchable magnetic properties of the sample. Concretely, the complex [FeL 222 N 3 O 2 (CN) 2 ]·H 2 O exhibits a spin crossover (SCO) accompanied by a change of the coordination number. The dehydration and rehydration of this SCO complex was carried out and monitored by different methods, which include X-ray diffraction analysis. The corresponding samples display a thermal spin transition as
doi:10.1002/ejic.201402666
fatcat:ilznxprjpfdenk5fzyvgvrh5na
Reminder duration determines threat memory modification in humans
2018
Scientific Reports
Memory reminders can return a memory into an unstable state such that it will decay unless actively restabilized into long-term memory through reconsolidation. Exposure to a memory reminder, however, does not always lead to destabilization. The 'trace dominance' principle posits that the extent of exposure to memory reminders governs memory susceptibility to disruption. Here, we provide a first systematic investigation of reminder duration effects on threat memory modification in humans.
doi:10.1038/s41598-018-27252-0
pmid:29891856
pmcid:PMC5995965
fatcat:ibmaow7i75dijawcv4or3ugclm
more »
... r duration was parametrically varied across 155 participants in a three-day protocol. We found that short reminders (1 s and 4 s) made the memory prone to interference from post-retrieval extinction, suggesting that the memory had been updated. In contrast, no reminder or long reminders (30 s and 3 min) made the memory resistant to such interference, and robustly return. Reminder duration therefore influences memory stability and may be a critical determinant of therapeutic efficacy. Upon retrieval, a memory may return to an unstable state and become amenable to modification. Memory reminders destabilize the memory such that it will decay unless actively restabilized into long-term memory. Reconsolidation refers to the molecular and cellular processes that returns the memory to a stable state 1,2 . Pharmacological manipulations of reconsolidation result in memory enhancement or impairment, and new information can get incorporated during reconsolidation into an updated memory 2-4 . Mere exposure to memory reminders, however, does not necessarily imply that the memory has entered an unstable state and therefore does not guarantee reconsolidation. There are cases of retrieved memories that are resistant to change 5-8 . Whether retrieval results in destabilization depends on a host of cellular and molecular mechanisms, which actively transfer the retrieved memory into an unstable neural representation. There appears to be a requirement for protein degradation, receptor-signaling activity, dendritic spine remodeling, gene regulation and epigenetic mechanism 7,9-20 . At the behavioral level, the 'trace dominance' principle posits that the extent of re-exposure to reminders determines the dominance of the memory, and hence, its stability. This principle emerged as a theoretical framework for interpreting empirical data of associative memory modification 21 . In associative threat learning 22 , a conditioned stimulus (CS) is initially benign until paired with an aversive outcome (US), after which the presentation of the CS alone elicits defensive responses. Multiple presentations of the CS without the US will eventually induce extinction memory, which diminishes defensive reactions to the CS. Using threat conditioning in the Medaka fish, Eisenberg and colleagues 21 found that administering an amnesic agent (protein synthesis inhibitor) following a single reminder abolished the expression of threat memory, whereas administration after multiple retrievals (i.e., extinction) induced the opposite effect resulting in high expression of threat memory. Similar results have been observed in other species, including crab 23 , mice 24 , and rats 25, 26 . According to the trace dominance interpretation, a single CS reminder makes the threat memory dominant and thus susceptible to interference. With multiple CS exposures, the extinction trace becomes dominant and hence vulnerable to disruption. This means that trace dominance and memory stability have an inverse relationship: reconsolidation interference will be effective following brief, but not extensive, reminder durations 27 .
Inverse-design magnonic devices
2021
Nature Communications
AbstractThe field of magnonics offers a new type of low-power information processing, in which magnons, the quanta of spin waves, carry and process data instead of electrons. Many magnonic devices were demonstrated recently, but the development of each of them requires specialized investigations and, usually, one device design is suitable for one function only. Here, we introduce the method of inverse-design magnonics, in which any functionality can be specified first, and a feedback-based
doi:10.1038/s41467-021-22897-4
pmid:33976137
fatcat:teimboxs6nezjk54gnpky3rnfm
more »
... tational algorithm is used to obtain the device design. We validate this method using the means of micromagnetic simulations. Our proof-of-concept prototype is based on a rectangular ferromagnetic area that can be patterned using square-shaped voids. To demonstrate the universality of this approach, we explore linear, nonlinear and nonreciprocal magnonic functionalities and use the same algorithm to create a magnonic (de-)multiplexer, a nonlinear switch and a circulator. Thus, inverse-design magnonics can be used to develop highly efficient rf applications as well as Boolean and neuromorphic computing building blocks.
Globalisation de la République des Lettres ?
2016
Communications
Les Chinois ont, très tôt, prêté attention aux prix Nobel 204
Traduit de l'anglais par Adriana Bontea et Philippe Roussin Chaohua WANG
Chercheur indépendant
Londres
NOTES
© Le Seuil | ...
Chaohua Wang Globalisation de la République des Lettres ? ...
doi:10.3917/commu.099.0199
fatcat:sjestbrfyjacdgbrfhzia55r5y
Generative Adversarial Networks for Synthesizing InSAR Patches
[article]
2020
arXiv
pre-print
Generative Adversarial Networks (GANs) have been employed with certain success for image translation tasks between optical and real-valued SAR intensity imagery. Applications include aiding interpretability of SAR scenes with their optical counterparts by artificial patch generation and automatic SAR-optical scene matching. The synthesis of artificial complex-valued InSAR image stacks asks for, besides good perceptual quality, more stringent quality metrics like phase noise and phase coherence.
arXiv:2008.01184v1
fatcat:jojukmp7bfg6lcdvpjk2dxxsvq
more »
... This paper provides a signal processing model of generative CNN structures, describes effects influencing those quality metrics and presents a mapping scheme of complex-valued data to given CNN structures based on popular Deep Learning frameworks.
Two microRNAs are sufficient for embryogenesis in C. elegans
[article]
2020
bioRxiv
pre-print
are sufficient for embryogenesis in C. elegans Philipp J. ...
Dexheimer, Jingkui Wang and Luisa Cochella* Research Institute of Molecular Pathology (IMP), Vienna BioCenter (VBC), Campus-Vienna-Biocenter 1, 1030 Vienna, Austria *Corresponding author. ...
doi:10.1101/2020.06.28.176024
fatcat:tvj343ayj5aalpyrrsgbdyxwoa
Monocular Plan View Networks for Autonomous Driving
[article]
2019
arXiv
pre-print
The object method builds on Wang et al. [10] , and combines 2D object detections and deep image features, but lacks explicit depth supervision. ...
arXiv:1905.06937v1
fatcat:dzjjraf4ynhbpcp2xrg2t4l42m
Frequent Item-set Mining without Ubiquitous Items
[article]
2018
arXiv
pre-print
Recent works include probabilistic approaches (Wang, et al., 2010 ) (Tong, et al., 2012 , optimization of the features used for the item-set mining (Thirumuruganathan, et al., 2014) , application of ...
arXiv:1803.11105v1
fatcat:hfx6li74vjd2jjl25yal5ikpiy
« Previous
Showing results 1 — 15 out of 31,063 results