This article presents GRFsaw, an open-source software for generating two-phase (binary) microstructures with user-defined structural properties.
Computational Engineering, Finance, and Science Materials Science
The stochastic block model (SBM) is a fundamental tool for community detection in networks, yet the finite-sample performance of inference methods remains underexplored.
Social and Information Networks Applications
To address these issues, we propose a multi-cam multi-map visual inertial localization system, which provides real-time, causal and drift-free position feedback to the robot control loop.
Robotics
A key contribution is the derivation of theoretical upper bounds for link prediction performance in our synthetic graphs, allowing us to estimate the predictability of the task and obtain an improved assessment of the performance of any method.
Social and Information Networks Physics and Society
Through systematic literature review and quantitative analysis, this paper outlines a panoramic view of wireless sensing security, revealing key technological trends and innovation opportunities, thereby helping to promote the development of this field.
Human-Computer Interaction Cryptography and Security
Finally, we fuse the features of the multi-cameras in the SLAM back-end to achieve robust pose estimation and online scale optimization.
Robotics
In this paper, we introduce the first diffusion model designed to generate complete synthetic human genotypes, which, by standard protocols, one can straightforwardly expand into full-length, DNA-level genomes.
Computational Engineering, Finance, and Science
This study also highlights the security risks posed by LLM-generated HTs, showing that 100% of GHOST-generated synthesizable HTs evaded detection by an ML-based HT detection tool.
Cryptography and Security
Compared to the best state-of-the-art scheduler, MASIM reduces the number of copy instructions by 63. 2% on average, which leads to a 28. 0% reduction in energy.
Emerging Technologies Hardware Architecture
Watermarking approaches are widely used to identify if images being circulated are authentic or AI-generated.
Cryptography and Security