Filters








31,063 Hits in 3.4 sec

Inverse-design magnonic devices [article]

Qi Wang, Andrii V. Chumak, Philipp Pirro
2020 arXiv   pre-print
Wang, Q. et al. Spin pinning and spin-wave dispersion in nanoscopic ferromagnetic waveguides. Phys. Rev. Lett. 122, 247202 (2019).  ... 
arXiv:2012.04544v1 fatcat:z4pgbrlugvbodlmy72oddu6pva

Philippe Lambin: how advances in imaging impact precision radiation oncology?

Julia Wang
2018 Precision Cancer Medicine  
Now, I think Meet the Professor Philippe Lambin: how advances in imaging impact precision radiation oncology?  ...  Expert introduction Philippe Lambin (Figure 1) , Professor, Radiation Oncology, Maastricht University, The Netherlands. Prof.  ... 
doi:10.21037/pcm.2018.09.06 fatcat:spokzli575gsbkdohpdklqsr3y

Objects as Points [article]

Xingyi Zhou, Dequan Wang, Philipp Krähenbühl
2019 arXiv   pre-print
Detection identifies objects as axis-aligned boxes in an image. Most successful object detectors enumerate a nearly exhaustive list of potential object locations and classify each. This is wasteful, inefficient, and requires additional post-processing. In this paper, we take a different approach. We model an object as a single point --- the center point of its bounding box. Our detector uses keypoint estimation to find center points and regresses to all other object properties, such as size, 3D
more » ... location, orientation, and even pose. Our center point based approach, CenterNet, is end-to-end differentiable, simpler, faster, and more accurate than corresponding bounding box based detectors. CenterNet achieves the best speed-accuracy trade-off on the MS COCO dataset, with 28.1% AP at 142 FPS, 37.4% AP at 52 FPS, and 45.1% AP with multi-scale testing at 1.4 FPS. We use the same approach to estimate 3D bounding box in the KITTI benchmark and human pose on the COCO keypoint dataset. Our method performs competitively with sophisticated multi-stage methods and runs in real-time.
arXiv:1904.07850v2 fatcat:sqvmgaq35rfx7o4uvmo4d5agle

Measures of scalability [article]

Xuemei Chen, Gitta Kutyniok, Kasso A. Okoudjou, Friedrich Philipp, and Rongrong Wang
2014 arXiv   pre-print
Philipp thanks the Matheon for their support. K. A. Okoudjou was supported by the Alexander von Humboldt foundation.  ...  Wang was supported by CRD Grant DNOISE 334810-05 and by the industrial sponsors of the Seismic Laboratory for Imaging and Modelling: BG Group, BGP, BP, Chevron, ConocoPhilips, Petrobras, PGS, Total SA,  ... 
arXiv:1406.2137v1 fatcat:3ho6zrgf7fbsfhxgf7qsgbq5eq

The carbon balance of terrestrial ecosystems in China

Shilong Piao, Jingyun Fang, Philippe Ciais, Philippe Peylin, Yao Huang, Stephen Sitch, Tao Wang
2009 Nature  
doi:10.1038/nature07944 pmid:19396142 fatcat:4ulmv32uc5ezhi73nr7qm4tocq

The AdipoChaser mouse

Qiong A Wang, Philipp E Scherer
2014 Adipocyte  
doi:10.4161/adip.27656 pmid:24719789 pmcid:PMC3979880 fatcat:g432r2blujdylbxkcvl5homehy

Objective Caml for Multicore Architectures [article]

Mathias Bourgoin, Benjamin Canou, Emmanuel Chailloux, Adrien Jonquet, Philippe Wang
2020 arXiv   pre-print
Objective Caml is a famous dialect of the ML family languages. It is well-known for its performance as a compiled programming language, notably thanks to its incremental generational automatic memory collection. However, for historical reasons, the latter was built for monocore processors. One consequence is the runtime library assumes there is effectively no more than one thread running at a time, which allows many optimisations for monocore architectures: very few thread mutexes are
more » ... to prevent more than a single thread to run at a time. This makes memory allocation and collection quite easier. The way it was built makes it not possible to take advantage of now widespread multicore CPU architectures. This paper presents our feedback on removing Objective Caml's garbage collector and designing a "Stop-The-World Stop&Copy" garbage collector to permit threads to take advantage of multicore architectures.
arXiv:2006.05862v1 fatcat:gplgxb2w7nctbp2vm6p7bvoqgy

Unusual Solvent Dependence of a Molecule-Based FeIIMacrocyclic Spin-Crossover Complex

Hongfeng Wang, Chiara Sinito, Abdellah Kaiba, José Sanchez Costa, Cédric Desplanches, Philippe Dagault, Philippe Guionneau, Jean-François Létard, Philippe Negrier, Denise Mondieig
2014 European Journal of Inorganic Chemistry  
This work illustrates in detail the reversible hydration-dehydration process of a molecule-based material, which involves a drastic change of the switchable magnetic properties of the sample. Concretely, the complex [FeL 222 N 3 O 2 (CN) 2 ]·H 2 O exhibits a spin crossover (SCO) accompanied by a change of the coordination number. The dehydration and rehydration of this SCO complex was carried out and monitored by different methods, which include X-ray diffraction analysis. The corresponding samples display a thermal spin transition as
doi:10.1002/ejic.201402666 fatcat:ilznxprjpfdenk5fzyvgvrh5na

Reminder duration determines threat memory modification in humans

Jingchu Hu, Wenqing Wang, Philipp Homan, Penggui Wang, Xifu Zheng, Daniela Schiller
2018 Scientific Reports  
Memory reminders can return a memory into an unstable state such that it will decay unless actively restabilized into long-term memory through reconsolidation. Exposure to a memory reminder, however, does not always lead to destabilization. The 'trace dominance' principle posits that the extent of exposure to memory reminders governs memory susceptibility to disruption. Here, we provide a first systematic investigation of reminder duration effects on threat memory modification in humans.
more » ... r duration was parametrically varied across 155 participants in a three-day protocol. We found that short reminders (1 s and 4 s) made the memory prone to interference from post-retrieval extinction, suggesting that the memory had been updated. In contrast, no reminder or long reminders (30 s and 3 min) made the memory resistant to such interference, and robustly return. Reminder duration therefore influences memory stability and may be a critical determinant of therapeutic efficacy. Upon retrieval, a memory may return to an unstable state and become amenable to modification. Memory reminders destabilize the memory such that it will decay unless actively restabilized into long-term memory. Reconsolidation refers to the molecular and cellular processes that returns the memory to a stable state 1,2 . Pharmacological manipulations of reconsolidation result in memory enhancement or impairment, and new information can get incorporated during reconsolidation into an updated memory 2-4 . Mere exposure to memory reminders, however, does not necessarily imply that the memory has entered an unstable state and therefore does not guarantee reconsolidation. There are cases of retrieved memories that are resistant to change 5-8 . Whether retrieval results in destabilization depends on a host of cellular and molecular mechanisms, which actively transfer the retrieved memory into an unstable neural representation. There appears to be a requirement for protein degradation, receptor-signaling activity, dendritic spine remodeling, gene regulation and epigenetic mechanism 7,9-20 . At the behavioral level, the 'trace dominance' principle posits that the extent of re-exposure to reminders determines the dominance of the memory, and hence, its stability. This principle emerged as a theoretical framework for interpreting empirical data of associative memory modification 21 . In associative threat learning 22 , a conditioned stimulus (CS) is initially benign until paired with an aversive outcome (US), after which the presentation of the CS alone elicits defensive responses. Multiple presentations of the CS without the US will eventually induce extinction memory, which diminishes defensive reactions to the CS. Using threat conditioning in the Medaka fish, Eisenberg and colleagues 21 found that administering an amnesic agent (protein synthesis inhibitor) following a single reminder abolished the expression of threat memory, whereas administration after multiple retrievals (i.e., extinction) induced the opposite effect resulting in high expression of threat memory. Similar results have been observed in other species, including crab 23 , mice 24 , and rats 25, 26 . According to the trace dominance interpretation, a single CS reminder makes the threat memory dominant and thus susceptible to interference. With multiple CS exposures, the extinction trace becomes dominant and hence vulnerable to disruption. This means that trace dominance and memory stability have an inverse relationship: reconsolidation interference will be effective following brief, but not extensive, reminder durations 27 .
doi:10.1038/s41598-018-27252-0 pmid:29891856 pmcid:PMC5995965 fatcat:ibmaow7i75dijawcv4or3ugclm

Inverse-design magnonic devices

Qi Wang, Andrii V. Chumak, Philipp Pirro
2021 Nature Communications  
AbstractThe field of magnonics offers a new type of low-power information processing, in which magnons, the quanta of spin waves, carry and process data instead of electrons. Many magnonic devices were demonstrated recently, but the development of each of them requires specialized investigations and, usually, one device design is suitable for one function only. Here, we introduce the method of inverse-design magnonics, in which any functionality can be specified first, and a feedback-based
more » ... tational algorithm is used to obtain the device design. We validate this method using the means of micromagnetic simulations. Our proof-of-concept prototype is based on a rectangular ferromagnetic area that can be patterned using square-shaped voids. To demonstrate the universality of this approach, we explore linear, nonlinear and nonreciprocal magnonic functionalities and use the same algorithm to create a magnonic (de-)multiplexer, a nonlinear switch and a circulator. Thus, inverse-design magnonics can be used to develop highly efficient rf applications as well as Boolean and neuromorphic computing building blocks.
doi:10.1038/s41467-021-22897-4 pmid:33976137 fatcat:teimboxs6nezjk54gnpky3rnfm

Globalisation de la République des Lettres ?

Chaohua Wang, Adriana Bontea, Philippe Roussin
2016 Communications  
Les Chinois ont, très tôt, prêté attention aux prix Nobel 204 Traduit de l'anglais par Adriana Bontea et Philippe Roussin Chaohua WANG Chercheur indépendant Londres NOTES © Le Seuil |  ...  Chaohua Wang Globalisation de la République des Lettres ?  ... 
doi:10.3917/commu.099.0199 fatcat:sjestbrfyjacdgbrfhzia55r5y

Generative Adversarial Networks for Synthesizing InSAR Patches [article]

Philipp Sibler, Yuanyuan Wang, Stefan Auer, Mohsin Ali, Xiao Xiang Zhu
2020 arXiv   pre-print
Generative Adversarial Networks (GANs) have been employed with certain success for image translation tasks between optical and real-valued SAR intensity imagery. Applications include aiding interpretability of SAR scenes with their optical counterparts by artificial patch generation and automatic SAR-optical scene matching. The synthesis of artificial complex-valued InSAR image stacks asks for, besides good perceptual quality, more stringent quality metrics like phase noise and phase coherence.
more » ... This paper provides a signal processing model of generative CNN structures, describes effects influencing those quality metrics and presents a mapping scheme of complex-valued data to given CNN structures based on popular Deep Learning frameworks.
arXiv:2008.01184v1 fatcat:jojukmp7bfg6lcdvpjk2dxxsvq

Two microRNAs are sufficient for embryogenesis in C. elegans [article]

Philipp J Dexheimer, Jingkui Wang, Luisa Cochella
2020 bioRxiv   pre-print
are sufficient for embryogenesis in C. elegans Philipp J.  ...  Dexheimer, Jingkui Wang and Luisa Cochella* Research Institute of Molecular Pathology (IMP), Vienna BioCenter (VBC), Campus-Vienna-Biocenter 1, 1030 Vienna, Austria *Corresponding author.  ... 
doi:10.1101/2020.06.28.176024 fatcat:tvj343ayj5aalpyrrsgbdyxwoa

Monocular Plan View Networks for Autonomous Driving [article]

Dequan Wang, Coline Devin, Qi-Zhi Cai, Philipp Krähenbühl, Trevor Darrell
2019 arXiv   pre-print
The object method builds on Wang et al. [10] , and combines 2D object detections and deep image features, but lacks explicit depth supervision.  ... 
arXiv:1905.06937v1 fatcat:dzjjraf4ynhbpcp2xrg2t4l42m

Frequent Item-set Mining without Ubiquitous Items [article]

Ran M. Bittmann, Philippe Nemery, Xingtian Shi, Michael Kemelmakher, Mengjiao Wang
2018 arXiv   pre-print
Recent works include probabilistic approaches (Wang, et al., 2010 ) (Tong, et al., 2012 , optimization of the features used for the item-set mining (Thirumuruganathan, et al., 2014) , application of  ... 
arXiv:1803.11105v1 fatcat:hfx6li74vjd2jjl25yal5ikpiy
« Previous Showing results 1 — 15 out of 31,063 results