We study time-reversal symmetry breaking in non-Hermitian fluctuating field theories with conserved dynamic…
We study time-reversal symmetry breaking in non-Hermitian fluctuating field theories with conserved dynamic…
We study boundedness of zeros of the independence polynomial of tori for sequences of tori converging to th…
A singular attribute of humankind is our ability to undertake novel, cooperative behavior, or teamwork. Thi…
We study the low-energy properties of the one-dimensional spin-1/2 XXZ chain with time-reversal symmetry-br…
We give an analytic approach to the Saito vanishing theorem by going back to the original idea for the proo…
We introduce the concept of Procedural Content Generation via Knowledge Transformation (PCG-KT), a new lens…
We study a class of McKean--Vlasov Stochastic Differential Equations (MV-SDEs) with drifts and diffusions h…
Onsite gain-loss induced topological braiding principles of non-Hermitian energy bands is theoretically for…
In this paper, our aim is to briefly survey and articulate the logical and philosophical foundations of usi…
We consider the estimation of measures of model performance in a target population when covariate and outco…
Out-of-distribution (OOD) detection is a critical requirement for the deployment of deep neural networks. T…
This article examines the impact of China's delayed retirement announcement on households' savings behavior…
Blockchain's influence extends beyond finance, impacting diverse sectors such as real estate, oil and gas, …
In this paper, we explore the potential of Vision-Language Models (VLMs), specifically CLIP, in predicting …
Compartmental models have long served as important tools in mathematical epidemiology, with their usefulnes…
To enhance the efficiency of incident response triage operations, it is not cost-effective to defend all sy…
Incorporating contrastive learning objectives in sentence representation learning (SRL) has yielded signifi…
Principal component analysis (PCA) is a key tool in the field of data dimensionality reduction that is usef…
The paper analyzes security aspects of practical entanglement-based quantum key distribution (QKD), namely,…
As conventional communication systems based on classic information theory have closely approached the limit…