50,761 research outputs found

    Temporal Action Localization in Untrimmed Videos via Multi-stage CNNs

    Full text link
    We address temporal action localization in untrimmed long videos. This is important because videos in real applications are usually unconstrained and contain multiple action instances plus video content of background scenes or other activities. To address this challenging issue, we exploit the effectiveness of deep networks in temporal action localization via three segment-based 3D ConvNets: (1) a proposal network identifies candidate segments in a long video that may contain actions; (2) a classification network learns one-vs-all action classification model to serve as initialization for the localization network; and (3) a localization network fine-tunes on the learned classification network to localize each action instance. We propose a novel loss function for the localization network to explicitly consider temporal overlap and therefore achieve high temporal localization accuracy. Only the proposal network and the localization network are used during prediction. On two large-scale benchmarks, our approach achieves significantly superior performances compared with other state-of-the-art systems: mAP increases from 1.7% to 7.4% on MEXaction2 and increases from 15.0% to 19.0% on THUMOS 2014, when the overlap threshold for evaluation is set to 0.5.Comment: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 201

    Multichannel charge Kondo effect and non-Fermi liquid fixed points in conventional and topological superconductor islands

    Full text link
    We study multiterminal Majorana and conventional superconducting islands in the vicinity of the charge degeneracy point using bosonization and numerical renormalization group. Both models map to the multichannel charge Kondo problem, but for noninteracting normal leads they flow to different non-Fermi liquid fixed points at low temperatures. We compare and contrast both cases by numerically obtaining the full crossover to the low temperature regime and predict distinctive transport signatures. We attribute the differences between both types of islands to a crucial distinction of charge-2e2e and charge-ee transfer in the conventional and topological case, respectively. In the conventional case, our results establish s-wave islands as a new platform to study the intermediate multichannel Kondo fixed point. In the topological setup the crossover temperature to non-Fermi liquid behavior is relatively high as it is proportional to level broadening and the transport results are not sensitive to channel coupling anisotropy, moving away from the charge degeneracy point or including a small Majorana hybridization, which makes our proposal experimentally feasible.Comment: 14 pages, 10 figure

    Apply current exponential de Finetti theorem to realistic quantum key distribution

    Full text link
    In the realistic quantum key distribution (QKD), Alice and Bob respectively get a quantum state from an unknown channel, whose dimension may be unknown. However, while discussing the security, sometime we need to know exact dimension, since current exponential de Finetti theorem, crucial to the information-theoretical security proof, is deeply related with the dimension and can only be applied to finite dimensional case. Here we address this problem in detail. We show that if POVM elements corresponding to Alice and Bob's measured results can be well described in a finite dimensional subspace with sufficiently small error, then dimensions of Alice and Bob's states can be almost regarded as finite. Since the security is well defined by the smooth entropy, which is continuous with the density matrix, the small error of state actually means small change of security. Then the security of unknown-dimensional system can be solved. Finally we prove that for heterodyne detection continuous variable QKD and differential phase shift QKD, the collective attack is optimal under the infinite key size case.Comment: 11 pages, 2 figures, detailed version, applications adde

    Trust Exploitation and Attention Competition: A Game Theoretical Model

    Full text link
    The proliferation of Social Network Sites (SNSs) has greatly reformed the way of information dissemination, but also provided a new venue for hosts with impure motivations to disseminate malicious information. Social trust is the basis for information dissemination in SNSs. Malicious hosts judiciously and dynamically make the balance between maintaining its social trust and selfishly maximizing its malicious gain over a long time-span. Studying the optimal response strategies for each malicious host could assist to design the best system maneuver so as to achieve the targeted level of overall malicious activities. In this paper, we propose an interaction-based social trust model, and formulate the maximization of long-term malicious gains of multiple competing hosts as a non-cooperative differential game. Through rigorous analysis, optimal response strategies are identified and the best system maneuver mechanism is presented. Extensive numerical studies further verify the analytical results

    An Expression for the Granular Elastic Energy

    Full text link
    Granular Solid Hydrodynamics (GSH) is a broad-ranged continual mechanical description of granular media capable of accounting for static stress distributions, yield phenomena, propagation and damping of elastic waves, the critical state, shear band, and fast dense flow. An important input of GSH is an expression for the elastic energy needed to deform the grains. The original expression, though useful and simple, has some draw-backs. Therefore, a slightly more complicated expression is proposed here that eliminates three of them: (1) The maximal angle at which an inclined layer of grains remains stable is increased from 2626^\circ to the more realistic value of 3030^\circ. (2)Depending on direction and polarization, transverse elastic waves are known to propagate at slightly different velocities. The old expression neglects these differences, the new one successfully reproduces them. (3) Most importantly, the old expression contains only the Drucker-Prager yield surface. The new one contains in addition those named after Coulomb, Lade-Duncan and Matsuoka-Nakai -- realizing each, and interpolating between them, by shifting a single scalar parameter
    corecore