Results 41 to 50 of about 32,516 (266)
Practical sketching algorithms for low-rank matrix approximation [PDF]
This paper describes a suite of algorithms for constructing low-rank approximations of an input matrix from a random linear image of the matrix, called a sketch.
Cevher, Volkan +3 more
core +3 more sources
Randomized Dynamic Mode Decomposition
This paper presents a randomized algorithm for computing the near-optimal low-rank dynamic mode decomposition (DMD). Randomized algorithms are emerging techniques to compute low-rank matrix approximations at a fraction of the cost of deterministic ...
Brunton, Steven L. +3 more
core +1 more source
Unprecedented Spin‐Lifetime of Itinerant Electrons in Natural Graphite Crystals
Graphite exhibits extraordinary spintronic potential, with electron spin lifetimes reaching 1,000 ns at room temperature ‐ over 100 times longer than graphene‐based devices. Magnetic resonance spectroscopy reveals strong anisotropy: out‐of‐plane spins live 50 times longer than their in‐plane counterparts.
Bence G. Márkus +5 more
wiley +1 more source
Modeling and Verification of 1/f Noise Mechanisms in FAPbBr3 Single‐Crystal X‐Ray Detectors
We demonstratethat surface‐trap‐induced carrier number fluctuations are the dominantmechanism in FAPbBr3 Schottky devices, a conclusion supported by thedistinct defect profiles revealed by Drive‐Level Capacitance Profiling (DLCP). Throughnoise contribution decomposition, it is found that the 1/f noise of thedetector is the key noise source affecting ...
Zhongyu Yang +6 more
wiley +1 more source
Correction Fault Attacks on Randomized CRYSTALS-Dilithium
After NIST’s selection of Dilithium as the primary future standard for quantum-secure digital signatures, increased efforts to understand its implementation security properties are required to enable widespread adoption on embedded devices.
Elisabeth Krahmer +3 more
doaj +1 more source
Abstract Despite extensive modeling efforts in extraction research, transient column models are rarely applied in industry due to concerns regarding parameter identifiability and model reliability. To address this, we analyzed uncertainty propagation from estimated parameters in a previously introduced column model and assessed identifiability via ill ...
Andreas Palmtag +2 more
wiley +1 more source
Abstract We propose a hierarchical energy management scheme for aggregating Distributed Energy Resources (DERs) for grid flexibility services. To prevent a direct participation of numerous prosumers in the wholesale electricity market, aggregators, as self‐interest agents in our scheme, incentivize prosumers to provide flexibility. We firstly model the
Xiupeng Chen +3 more
wiley +1 more source
This article investigates how persistent homology, persistent Laplacians, and persistent commutative algebra reveal complementary geometric, topological, and algebraic invariants or signatures of real‐world data. By analyzing shapes, synthetic complexes, fullerenes, and biomolecules, the article shows how these mathematical frameworks enhance ...
Yiming Ren, Guo‐Wei Wei
wiley +1 more source
This study introduces a framework that combines graph neural networks with causal inference to forecast recurrence and uncover the clinical and pathological factors driving it. It further provides interpretability, validates risk factors via counterfactual and interventional analyses, and offers evidence‐based insights for treatment planning ...
Jubair Ahmed +3 more
wiley +1 more source
Apache Spark is a popular system aimed at the analysis of large data sets, but recent studies have shown that certain computations---in particular, many linear algebra computations that are the basis for solving common machine learning problems---are ...
Gerhardt, Lisa +8 more
core +1 more source

