Results 101 to 110 of about 14,839 (236)

Relative and absolute Lefschetz standard conjectures for some Lagrangian fibrations

open access: yesJournal of the London Mathematical Society, Volume 111, Issue 4, April 2025.
Abstract We show that the hyper‐Kähler varieties of OG10‐type constructed by Laza–Saccà–Voisin (LSV) verify the Lefschetz standard conjecture. This is an application of a more general result, stating that certain Lagrangian fibrations verify this conjecture. The main technical assumption of this general result is that the Lagrangian fibration satisfies
Giuseppe Ancona   +3 more
wiley   +1 more source

VENOM: Text-driven Unrestricted Adversarial Example Generation with Diffusion Models [PDF]

open access: yesarXiv
Adversarial attacks have proven effective in deceiving machine learning models by subtly altering input images, motivating extensive research in recent years. Traditional methods constrain perturbations within $l_p$-norm bounds, but advancements in Unrestricted Adversarial Examples (UAEs) allow for more complex, generative-model-based manipulations ...
arxiv  

Partially Directed Snake Polyominoes [PDF]

open access: yesarXiv, 2013
The goal of this paper is to study the family of snake polyominoes. More precisely, we focus our attention on the class of partially directed snakes. We establish functional equations and length generating functions of two dimensional, three dimensional and then $N$ dimensional partially directed snake polyominoes.
arxiv  

Computational Studies of Snake Venom Toxins

open access: yesToxins, 2017
Most snake venom toxins are proteins, and participate to envenomation through a diverse array of bioactivities, such as bleeding, inflammation, and pain, cytotoxic, cardiotoxic or neurotoxic effects.
Paola G. Ojeda   +5 more
doaj   +1 more source

A general approach to enhance the survivability of backdoor attacks by decision path coupling [PDF]

open access: yesarXiv
Backdoor attacks have been one of the emerging security threats to deep neural networks (DNNs), leading to serious consequences. One of the mainstream backdoor defenses is model reconstruction-based. Such defenses adopt model unlearning or pruning to eliminate backdoors. However, little attention has been paid to survive from such defenses.
arxiv  

Snake graph calculus and cluster algebras from surfaces II: Self-crossing snake graphs [PDF]

open access: yesarXiv, 2014
Snake graphs appear naturally in the theory of cluster algebras. For cluster algebras from surfaces, each cluster variable is given by a formula which is parametrized by the perfect matchings of a snake graph. In this paper, we continue our study of snake graphs from a combinatorial point of view.
arxiv  

Processing of Snake Venom Metalloproteinases: Generation of Toxin Diversity and Enzyme Inactivation

open access: yesToxins, 2016
Snake venom metalloproteinases (SVMPs) are abundant in the venoms of vipers and rattlesnakes, playing important roles for the snake adaptation to different environments, and are related to most of the pathological effects of these venoms in human victims.
Ana M. Moura-da-Silva   +5 more
doaj   +1 more source

Subdivision based snakes for contour detection [PDF]

open access: yesarXiv, 2018
In this paper we propose a method for computing the contour of an object in an image using a snake represented as a subdivision curve. The evolution of the snake is driven by its control points which are computed minimizing an energy that pushes the snake towards the boundary of the interest region.
arxiv  

Fractionation of Snake Venom by the Gel-Filtration Method. [PDF]

open access: bronze, 1959
Walter Björk   +5 more
openalex   +1 more source

Home - About - Disclaimer - Privacy