Fitting pseudo-S${rm acute{e}}$rsic(Spergel) light profiles to galaxies in interferometric data: the excellence of the $uv$-plane

Kavli Affiliate: John D. Silverman | First 5 Authors: Qing-Hua Tan, Emanuele Daddi, Victor de Souza Magalhães, Carlos Gómez-Guijarro, Jérôme Pety | Summary: Modern (sub)millimeter interferometers, such as ALMA and NOEMA, offer high angular resolution and unprecedented sensitivity. This provides the possibility to characterize the morphology of the gas and dust in distant galaxies. To […]


Continue.. Fitting pseudo-S${rm acute{e}}$rsic(Spergel) light profiles to galaxies in interferometric data: the excellence of the $uv$-plane

Programmable patchy particles for materials design

Kavli Affiliate: Michael P. Brenner | First 5 Authors: Ella M. King, Chrisy Xiyu Du, Qian-Ze Zhu, Samuel S. Schoenholz, Michael P. Brenner | Summary: Direct design of complex functional materials would revolutionize technologies ranging from printable organs to novel clean energy devices. However, even incremental steps towards designing functional materials have proven challenging. If […]


Continue.. Programmable patchy particles for materials design

Scientific Preparation for CSST: Classification of Galaxy and Nebula/Star Cluster Based on Deep Learning

Kavli Affiliate: Feng Wang | First 5 Authors: Yuquan Zhang, Zhong Cao, Feng Wang, Lam, Man I | Summary: The Chinese Space Station Telescope (abbreviated as CSST) is a future advanced space telescope. Real-time identification of galaxy and nebula/star cluster (abbreviated as NSC) images is of great value during CSST survey. While recent research on […]


Continue.. Scientific Preparation for CSST: Classification of Galaxy and Nebula/Star Cluster Based on Deep Learning

Detecting DBMS Bugs with Context-Sensitive Instantiation and Multi-Plan Execution

Kavli Affiliate: Ke Wang | First 5 Authors: Jiaqi Li, Ke Wang, Yaoguang Chen, Yajin Zhou, Lei Wu | Summary: DBMS bugs can cause serious consequences, posing severe security and privacy concerns. This paper works towards the detection of memory bugs and logic bugs in DBMSs, and aims to solve the two innate challenges, including […]


Continue.. Detecting DBMS Bugs with Context-Sensitive Instantiation and Multi-Plan Execution

Integrating the PanDA Workload Management System with the Vera C. Rubin Observatory

Kavli Affiliate: Richard Dubois | First 5 Authors: Edward Karavakis, Wen Guan, Zhaoyu Yang, Tadashi Maeno, Torre Wenaus | Summary: The Vera C. Rubin Observatory will produce an unprecedented astronomical data set for studies of the deep and dynamic universe. Its Legacy Survey of Space and Time (LSST) will image the entire southern sky every […]


Continue.. Integrating the PanDA Workload Management System with the Vera C. Rubin Observatory

Low Resistance Ohmic Contact to P-type Monolayer WSe2

Kavli Affiliate: Michael Crommie | First 5 Authors: Jingxu Xie, Zuocheng Zhang, Haodong Zhang, Vikram Nagarajan, Wenyu Zhao | Summary: Advanced microelectronics in the future may require semiconducting channel materials beyond silicon. Two-dimensional (2D) semiconductors, characterized by their atomically thin thickness, hold immense promise for high-performance electronic devices at the nanometer scale with lower heat […]


Continue.. Low Resistance Ohmic Contact to P-type Monolayer WSe2

Improving Neural Machine Translation by Multi-Knowledge Integration with Prompting

Kavli Affiliate: Ke Wang | First 5 Authors: Ke Wang, Jun Xie, Yuqi Zhang, Yu Zhao, | Summary: Improving neural machine translation (NMT) systems with prompting has achieved significant progress in recent years. In this work, we focus on how to integrate multi-knowledge, multiple types of knowledge, into NMT models to enhance the performance with […]


Continue.. Improving Neural Machine Translation by Multi-Knowledge Integration with Prompting

Forcing Generative Models to Degenerate Ones: The Power of Data Poisoning Attacks

Kavli Affiliate: Yi Zhou | First 5 Authors: Shuli Jiang, Swanand Ravindra Kadhe, Yi Zhou, Ling Cai, Nathalie Baracaldo | Summary: Growing applications of large language models (LLMs) trained by a third party raise serious concerns on the security vulnerability of LLMs.It has been demonstrated that malicious actors can covertly exploit these vulnerabilities in LLMs […]


Continue.. Forcing Generative Models to Degenerate Ones: The Power of Data Poisoning Attacks

Hiding Functions within Functions: Steganography by Implicit Neural Representations

Kavli Affiliate: Jia Liu | First 5 Authors: Jia Liu, Peng Luo, Yan Ke, , | Summary: Deep steganography utilizes the powerful capabilities of deep neural networks to embed and extract messages, but its reliance on an additional message extractor limits its practical use due to the added suspicion it can raise from steganalyzers. To […]


Continue.. Hiding Functions within Functions: Steganography by Implicit Neural Representations

The Universe SPHEREx Will See: Empirically Based Galaxy Simulations and Redshift Predictions

Kavli Affiliate: James J. Bock | First 5 Authors: Richard M. Feder, Daniel C. Masters, Bomee Lee, James J. Bock, Yi-Kuan Chiang | Summary: We simulate galaxy properties and redshift estimation for SPHEREx, the next NASA Medium Class Explorer. To make robust models of the galaxy population and test spectro-photometric redshift performance for SPHEREx, we […]


Continue.. The Universe SPHEREx Will See: Empirically Based Galaxy Simulations and Redshift Predictions