Causal and passive parameterization of S-parameters using neural networks
Neural networks (NNs) are widely used to create parametric models of S-parameters for
various components in electronic systems. The focus of deriving these models has so far …
various components in electronic systems. The focus of deriving these models has so far …
Mvg mechanism: Differential privacy under matrix-valued query
Differential privacy mechanism design has traditionally been tailored for a scalar-valued
query function. Although many mechanisms such as the Laplace and Gaussian mechanisms …
query function. Although many mechanisms such as the Laplace and Gaussian mechanisms …
Entanglement detection in arbitrary-dimensional bipartite quantum systems through partial realigned moments
Detection of entanglement through partial knowledge of the quantum state is a challenge to
implement efficiently. Here we propose a separability criterion for detecting bipartite …
implement efficiently. Here we propose a separability criterion for detecting bipartite …
Perturbation analysis of the 8-point algorithm: A case study for wide FoV cameras
TLT da Silveira, CR Jung - … of the IEEE/CVF conference on …, 2019 - openaccess.thecvf.com
This paper presents a perturbation analysis for the estimate of epipolar matrices using the 8-
Point Algorithm (8-PA). Our approach explores existing bounds for singular subspaces and …
Point Algorithm (8-PA). Our approach explores existing bounds for singular subspaces and …
Some comments and a bibliography on the Laguerre-Samuelson inequality with extensions and applications in statistics and matrix theory
ST Jensen, GPH Styan - Analytic and geometric inequalities and …, 1999 - Springer
We examine an 1880 theorem of Laguerre [50] concerning polynomials with all real roots
and a 1968 inequality of Sanmelson [117] for the maximum and minimum deviation from the …
and a 1968 inequality of Sanmelson [117] for the maximum and minimum deviation from the …
DeepOTF: Learning Equations-constrained Prediction for Electromagnetic Behavior
High-quality passive devices are becoming increasingly important for the development of
mobile devices and telecommunications, but obtaining such devices through simulation and …
mobile devices and telecommunications, but obtaining such devices through simulation and …
Performance analysis of zero forcing crosstalk canceler in vectored VDSL2
SM Zafaruddin, S Prakriya… - IEEE Signal Processing …, 2012 - ieeexplore.ieee.org
In this letter, we analyze the performance of a zero forcing (ZF) crosstalk canceler/precoder
in vectored VDSL2. We show that there is gap between the theoretical capacity and the …
in vectored VDSL2. We show that there is gap between the theoretical capacity and the …
Bounds for the spectral radius and the largest singular value
O Rojo, R Soto, H Rojo - Computers & Mathematics with Applications, 1998 - Elsevier
We derive an increasing sequence of lower bounds for the spectral radius of a matrix with
real spectrum and progressively improved bounds for the largest singular value of a …
real spectrum and progressively improved bounds for the largest singular value of a …
Semi-Supervised Few-Shot Learning Via Dependency Maximization and Instance Discriminant Analysis
We study the few-shot learning (FSL) problem, where a model learns to recognize new
objects with extremely few labeled training data per category. Most of previous FSL …
objects with extremely few labeled training data per category. Most of previous FSL …
Enforcing causality and passivity of neural network models of broadband S-parameters
This paper proposes a method to ensure that S-Parameters generated using neural network
(NN) models are physically consistent and can be safely used in subsequent time-domain …
(NN) models are physically consistent and can be safely used in subsequent time-domain …