28,063 research outputs found

    Learning to Dress {3D} People in Generative Clothing

    Get PDF
    Three-dimensional human body models are widely used in the analysis of human pose and motion. Existing models, however, are learned from minimally-clothed 3D scans and thus do not generalize to the complexity of dressed people in common images and videos. Additionally, current models lack the expressive power needed to represent the complex non-linear geometry of pose-dependent clothing shapes. To address this, we learn a generative 3D mesh model of clothed people from 3D scans with varying pose and clothing. Specifically, we train a conditional Mesh-VAE-GAN to learn the clothing deformation from the SMPL body model, making clothing an additional term in SMPL. Our model is conditioned on both pose and clothing type, giving the ability to draw samples of clothing to dress different body shapes in a variety of styles and poses. To preserve wrinkle detail, our Mesh-VAE-GAN extends patchwise discriminators to 3D meshes. Our model, named CAPE, represents global shape and fine local structure, effectively extending the SMPL body model to clothing. To our knowledge, this is the first generative model that directly dresses 3D human body meshes and generalizes to different poses. The model, code and data are available for research purposes at https://cape.is.tue.mpg.de.Comment: CVPR-2020 camera ready. Code and data are available at https://cape.is.tue.mpg.d

    Conduction mechanisms of epitaxial EuTiO3 thin films

    Full text link
    To investigate leakage current density versus electric field characteristics, epitaxial EuTiO3 thin films were deposited on (001) SrTiO3 substrates by pulsed laser deposition and were post-annealed in a reducing atmosphere. This investigation found that conduction mechanisms are strongly related to temperature and voltage polarity. It was determined that from 50 to 150 K the dominant conduction mechanism was a space-charge-limited current under both negative and positive biases. From 200 to 300 K, the conduction mechanism shows Schottky emission and Fowler-Nordheim tunneling behaviors for the negative and positive biases, respectively. This work demonstrates that Eu3+ is one source of leakage current in EuTiO3 thin films.Comment: 17 pages,4 figures, conferenc

    Superconducting correlations in ultra-small metallic grains

    Full text link
    To describe the crossover from the bulk BCS superconductivity to a fluctuation-dominated regime in ultrasmall metallic grains, new order parameters and correlation functions, such as ``parity gap'' and ``pair-mixing correlation function'', have been recently introduced. In this paper, we discuss the small-grain behaviour of the Penrose-Onsager-Yang off-diagonal long-range order (ODLRO) parameter in a pseudo-spin representation. Relations between the ODLRO parameter and those mentioned above are established through analytical and numerical calculations.Comment: 7 pages, 1 figur

    Anisotropic expansion of a thermal dipolar Bose gas

    Full text link
    We report on the anisotropic expansion of ultracold bosonic dysprosium gases at temperatures above quantum degeneracy and develop a quantitative theory to describe this behavior. The theory expresses the post-expansion aspect ratio in terms of temperature and microscopic collisional properties by incorporating Hartree-Fock mean-field interactions, hydrodynamic effects, and Bose-enhancement factors. Our results extend the utility of expansion imaging by providing accurate thermometry for dipolar thermal Bose gases, reducing error in expansion thermometry from tens of percent to only a few percent. Furthermore, we present a simple method to determine scattering lengths in dipolar gases, including near a Feshbach resonance, through observation of thermal gas expansion.Comment: main text and supplement, 11 pages total, 4 figure

    Fabrication of antenna-coupled KID array for Cosmic Microwave Background detection

    Full text link
    Kinetic Inductance Detectors (KIDs) have become an attractive alternative to traditional bolometers in the sub-mm and mm observing community due to their innate frequency multiplexing capabilities and simple lithographic processes. These advantages make KIDs a viable option for the O(500,000)O(500,000) detectors needed for the upcoming Cosmic Microwave Background - Stage 4 (CMB-S4) experiment. We have fabricated antenna-coupled MKID array in the 150GHz band optimized for CMB detection. Our design uses a twin slot antenna coupled to inverted microstrip made from a superconducting Nb/Al bilayer and SiNx_x, which is then coupled to an Al KID grown on high resistivity Si. We present the fabrication process and measurements of SiNx_x microstrip resonators.Comment: 7 pages, 9 figures, submitted to Journal of Low Temperature Physic

    PerfWeb: How to Violate Web Privacy with Hardware Performance Events

    Full text link
    The browser history reveals highly sensitive information about users, such as financial status, health conditions, or political views. Private browsing modes and anonymity networks are consequently important tools to preserve the privacy not only of regular users but in particular of whistleblowers and dissidents. Yet, in this work we show how a malicious application can infer opened websites from Google Chrome in Incognito mode and from Tor Browser by exploiting hardware performance events (HPEs). In particular, we analyze the browsers' microarchitectural footprint with the help of advanced Machine Learning techniques: k-th Nearest Neighbors, Decision Trees, Support Vector Machines, and in contrast to previous literature also Convolutional Neural Networks. We profile 40 different websites, 30 of the top Alexa sites and 10 whistleblowing portals, on two machines featuring an Intel and an ARM processor. By monitoring retired instructions, cache accesses, and bus cycles for at most 5 seconds, we manage to classify the selected websites with a success rate of up to 86.3%. The results show that hardware performance events can clearly undermine the privacy of web users. We therefore propose mitigation strategies that impede our attacks and still allow legitimate use of HPEs
    • …
    corecore