50,761 research outputs found
Temporal Action Localization in Untrimmed Videos via Multi-stage CNNs
We address temporal action localization in untrimmed long videos. This is
important because videos in real applications are usually unconstrained and
contain multiple action instances plus video content of background scenes or
other activities. To address this challenging issue, we exploit the
effectiveness of deep networks in temporal action localization via three
segment-based 3D ConvNets: (1) a proposal network identifies candidate segments
in a long video that may contain actions; (2) a classification network learns
one-vs-all action classification model to serve as initialization for the
localization network; and (3) a localization network fine-tunes on the learned
classification network to localize each action instance. We propose a novel
loss function for the localization network to explicitly consider temporal
overlap and therefore achieve high temporal localization accuracy. Only the
proposal network and the localization network are used during prediction. On
two large-scale benchmarks, our approach achieves significantly superior
performances compared with other state-of-the-art systems: mAP increases from
1.7% to 7.4% on MEXaction2 and increases from 15.0% to 19.0% on THUMOS 2014,
when the overlap threshold for evaluation is set to 0.5.Comment: IEEE Conference on Computer Vision and Pattern Recognition (CVPR),
201
Multichannel charge Kondo effect and non-Fermi liquid fixed points in conventional and topological superconductor islands
We study multiterminal Majorana and conventional superconducting islands in
the vicinity of the charge degeneracy point using bosonization and numerical
renormalization group. Both models map to the multichannel charge Kondo
problem, but for noninteracting normal leads they flow to different non-Fermi
liquid fixed points at low temperatures. We compare and contrast both cases by
numerically obtaining the full crossover to the low temperature regime and
predict distinctive transport signatures. We attribute the differences between
both types of islands to a crucial distinction of charge- and charge-
transfer in the conventional and topological case, respectively. In the
conventional case, our results establish s-wave islands as a new platform to
study the intermediate multichannel Kondo fixed point. In the topological setup
the crossover temperature to non-Fermi liquid behavior is relatively high as it
is proportional to level broadening and the transport results are not sensitive
to channel coupling anisotropy, moving away from the charge degeneracy point or
including a small Majorana hybridization, which makes our proposal
experimentally feasible.Comment: 14 pages, 10 figure
Apply current exponential de Finetti theorem to realistic quantum key distribution
In the realistic quantum key distribution (QKD), Alice and Bob respectively
get a quantum state from an unknown channel, whose dimension may be unknown.
However, while discussing the security, sometime we need to know exact
dimension, since current exponential de Finetti theorem, crucial to the
information-theoretical security proof, is deeply related with the dimension
and can only be applied to finite dimensional case. Here we address this
problem in detail. We show that if POVM elements corresponding to Alice and
Bob's measured results can be well described in a finite dimensional subspace
with sufficiently small error, then dimensions of Alice and Bob's states can be
almost regarded as finite. Since the security is well defined by the smooth
entropy, which is continuous with the density matrix, the small error of state
actually means small change of security. Then the security of
unknown-dimensional system can be solved. Finally we prove that for heterodyne
detection continuous variable QKD and differential phase shift QKD, the
collective attack is optimal under the infinite key size case.Comment: 11 pages, 2 figures, detailed version, applications adde
Trust Exploitation and Attention Competition: A Game Theoretical Model
The proliferation of Social Network Sites (SNSs) has greatly reformed the way
of information dissemination, but also provided a new venue for hosts with
impure motivations to disseminate malicious information. Social trust is the
basis for information dissemination in SNSs. Malicious hosts judiciously and
dynamically make the balance between maintaining its social trust and selfishly
maximizing its malicious gain over a long time-span. Studying the optimal
response strategies for each malicious host could assist to design the best
system maneuver so as to achieve the targeted level of overall malicious
activities. In this paper, we propose an interaction-based social trust model,
and formulate the maximization of long-term malicious gains of multiple
competing hosts as a non-cooperative differential game. Through rigorous
analysis, optimal response strategies are identified and the best system
maneuver mechanism is presented. Extensive numerical studies further verify the
analytical results
An Expression for the Granular Elastic Energy
Granular Solid Hydrodynamics (GSH) is a broad-ranged continual mechanical
description of granular media capable of accounting for static stress
distributions, yield phenomena, propagation and damping of elastic waves, the
critical state, shear band, and fast dense flow. An important input of GSH is
an expression for the elastic energy needed to deform the grains. The original
expression, though useful and simple, has some draw-backs. Therefore, a
slightly more complicated expression is proposed here that eliminates three of
them: (1) The maximal angle at which an inclined layer of grains remains stable
is increased from to the more realistic value of .
(2)Depending on direction and polarization, transverse elastic waves are known
to propagate at slightly different velocities. The old expression neglects
these differences, the new one successfully reproduces them. (3) Most
importantly, the old expression contains only the Drucker-Prager yield surface.
The new one contains in addition those named after Coulomb, Lade-Duncan and
Matsuoka-Nakai -- realizing each, and interpolating between them, by shifting a
single scalar parameter
- …
