id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1611.08554
|
Fabian Reiter
|
Fabian Reiter
|
Asynchronous Distributed Automata: A Characterization of the Modal
Mu-Fragment
|
13 pages, 2 figures
| null |
10.4230/LIPIcs.ICALP.2017.100
| null |
cs.FL cs.DC cs.LO
|
http://creativecommons.org/licenses/by/4.0/
|
We establish the equivalence between a class of asynchronous distributed
automata and a small fragment of least fixpoint logic, when restricted to
finite directed graphs. More specifically, the logic we consider is (a variant
of) the fragment of the modal $\mu$-calculus that allows least fixpoints but
forbids greatest fixpoints. The corresponding automaton model uses a network of
identical finite-state machines that communicate in an asynchronous manner and
whose state diagram must be acyclic except for self-loops. Exploiting the
connection with logic, we also prove that the expressive power of those
machines is independent of whether or not messages can be lost.
|
[
{
"version": "v1",
"created": "Fri, 25 Nov 2016 19:02:23 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Mar 2017 17:40:00 GMT"
}
] | 2018-05-18T00:00:00 |
[
[
"Reiter",
"Fabian",
""
]
] |
new_dataset
| 0.998042 |
1712.00960
|
Zuoxin Li
|
Zuoxin Li and Fuqiang Zhou
|
FSSD: Feature Fusion Single Shot Multibox Detector
|
add project code
| null | null | null |
cs.CV
|
http://creativecommons.org/publicdomain/zero/1.0/
|
SSD (Single Shot Multibox Detector) is one of the best object detection
algorithms with both high accuracy and fast speed. However, SSD's feature
pyramid detection method makes it hard to fuse the features from different
scales. In this paper, we proposed FSSD (Feature Fusion Single Shot Multibox
Detector), an enhanced SSD with a novel and lightweight feature fusion module
which can improve the performance significantly over SSD with just a little
speed drop. In the feature fusion module, features from different layers with
different scales are concatenated together, followed by some down-sampling
blocks to generate new feature pyramid, which will be fed to multibox detectors
to predict the final detection results. On the Pascal VOC 2007 test, our
network can achieve 82.7 mAP (mean average precision) at the speed of 65.8 FPS
(frame per second) with the input size 300$\times$300 using a single Nvidia
1080Ti GPU. In addition, our result on COCO is also better than the
conventional SSD with a large margin. Our FSSD outperforms a lot of
state-of-the-art object detection algorithms in both aspects of accuracy and
speed. Code is available at https://github.com/lzx1413/CAFFE_SSD/tree/fssd.
|
[
{
"version": "v1",
"created": "Mon, 4 Dec 2017 09:05:55 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jan 2018 02:27:48 GMT"
},
{
"version": "v3",
"created": "Thu, 17 May 2018 03:47:18 GMT"
}
] | 2018-05-18T00:00:00 |
[
[
"Li",
"Zuoxin",
""
],
[
"Zhou",
"Fuqiang",
""
]
] |
new_dataset
| 0.954625 |
1712.09665
|
Tom B Brown
|
Tom B. Brown, Dandelion Man\'e, Aurko Roy, Mart\'in Abadi, Justin
Gilmer
|
Adversarial Patch
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a method to create universal, robust, targeted adversarial image
patches in the real world. The patches are universal because they can be used
to attack any scene, robust because they work under a wide variety of
transformations, and targeted because they can cause a classifier to output any
target class. These adversarial patches can be printed, added to any scene,
photographed, and presented to image classifiers; even when the patches are
small, they cause the classifiers to ignore the other items in the scene and
report a chosen target class.
To reproduce the results from the paper, our code is available at
https://github.com/tensorflow/cleverhans/tree/master/examples/adversarial_patch
|
[
{
"version": "v1",
"created": "Wed, 27 Dec 2017 20:03:51 GMT"
},
{
"version": "v2",
"created": "Thu, 17 May 2018 01:44:59 GMT"
}
] | 2018-05-18T00:00:00 |
[
[
"Brown",
"Tom B.",
""
],
[
"Mané",
"Dandelion",
""
],
[
"Roy",
"Aurko",
""
],
[
"Abadi",
"Martín",
""
],
[
"Gilmer",
"Justin",
""
]
] |
new_dataset
| 0.996546 |
1802.09808
|
Marian-Andrei Rizoiu
|
Marian-Andrei Rizoiu and Timothy Graham and Rui Zhang and Yifei Zhang
and Robert Ackland and Lexing Xie
|
#DebateNight: The Role and Influence of Socialbots on Twitter During the
1st 2016 U.S. Presidential Debate
| null |
12th International AAAI Conference on Web and Social Media (ICWSM
2018)
| null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Serious concerns have been raised about the role of 'socialbots' in
manipulating public opinion and influencing the outcome of elections by
retweeting partisan content to increase its reach. Here we analyze the role and
influence of socialbots on Twitter by determining how they contribute to
retweet diffusions. We collect a large dataset of tweets during the 1st U.S.
Presidential Debate in 2016 (#DebateNight) and we analyze its 1.5 million users
from three perspectives: user influence, political behavior (partisanship and
engagement) and botness. First, we define a measure of user influence based on
the user's active contributions to information diffusions, i.e. their tweets
and retweets. Given that Twitter does not expose the retweet structure - it
associates all retweets with the original tweet - we model the latent diffusion
structure using only tweet time and user features, and we implement a scalable
novel approach to estimate influence over all possible unfoldings. Next, we use
partisan hashtag analysis to quantify user political polarization and
engagement. Finally, we use the BotOrNot API to measure user botness (the
likelihood of being a bot). We build a two-dimensional "polarization map" that
allows for a nuanced analysis of the interplay between botness, partisanship
and influence. We find that not only social bots are more active on Twitter -
starting more retweet cascades and retweeting more -- but they are 2.5 times
more influential than humans, and more politically engaged. Moreover,
pro-Republican bots are both more influential and more politically engaged than
their pro-Democrat counterparts. However we caution against blanket statements
that software designed to appear human dominates political debates. We find
that many highly influential Twitter users are in fact pro-Democrat and that
most pro-Republican users are mid-influential and likely to be human (low
botness).
|
[
{
"version": "v1",
"created": "Tue, 27 Feb 2018 10:23:46 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Apr 2018 12:36:39 GMT"
},
{
"version": "v3",
"created": "Thu, 17 May 2018 01:35:13 GMT"
}
] | 2018-05-18T00:00:00 |
[
[
"Rizoiu",
"Marian-Andrei",
""
],
[
"Graham",
"Timothy",
""
],
[
"Zhang",
"Rui",
""
],
[
"Zhang",
"Yifei",
""
],
[
"Ackland",
"Robert",
""
],
[
"Xie",
"Lexing",
""
]
] |
new_dataset
| 0.994161 |
1805.06597
|
Kai Chen
|
Kai Chen, Liangming Wu, Changlong Xu, Jian Li, Hao Xu, and Jing Jiang
|
ARUM: Polar Coded HARQ Scheme based on Incremental Channel Polarization
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A hybrid ARQ (HARQ) scheme for polar code, which is called active-bit
relocation under masks (ARUM), is proposed. In each transmission, the data bits
are encoded and bit-wisely XOR-masked using a binary vector before being
transmitted through the channel. The masking process combines multiple
transmissions together which forms another step of inter-transmission channel
transform. The reliabilities are updated after every transmission, and the less
reliable bits in earlier ones are relocated to the more reliable positions at
the latest transmitted block. ARUM is a very flexible HARQ scheme which allows
each transmission to have a different mother code length and to adopt
independent rate-matching scheme with sufficient channel state feedback in HARQ
process. Simulation shows that ARUM can obtain near-optimal coding gain.
|
[
{
"version": "v1",
"created": "Thu, 17 May 2018 04:06:35 GMT"
}
] | 2018-05-18T00:00:00 |
[
[
"Chen",
"Kai",
""
],
[
"Wu",
"Liangming",
""
],
[
"Xu",
"Changlong",
""
],
[
"Li",
"Jian",
""
],
[
"Xu",
"Hao",
""
],
[
"Jiang",
"Jing",
""
]
] |
new_dataset
| 0.999046 |
1805.06861
|
Carl Schultz
|
Carl Schultz, Mehul Bhatt, Jakob Suchan, Przemys{\l}aw Wa{\l}\k{e}ga
|
Answer Set Programming Modulo `Space-Time'
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present ASP Modulo `Space-Time', a declarative representational and
computational framework to perform commonsense reasoning about regions with
both spatial and temporal components. Supported are capabilities for mixed
qualitative-quantitative reasoning, consistency checking, and inferring
compositions of space-time relations; these capabilities combine and synergise
for applications in a range of AI application areas where the processing and
interpretation of spatio-temporal data is crucial. The framework and resulting
system is the only general KR-based method for declaratively reasoning about
the dynamics of `space-time' regions as first-class objects. We present an
empirical evaluation (with scalability and robustness results), and include
diverse application examples involving interpretation and control tasks.
|
[
{
"version": "v1",
"created": "Thu, 17 May 2018 17:05:30 GMT"
}
] | 2018-05-18T00:00:00 |
[
[
"Schultz",
"Carl",
""
],
[
"Bhatt",
"Mehul",
""
],
[
"Suchan",
"Jakob",
""
],
[
"Wałęga",
"Przemysław",
""
]
] |
new_dataset
| 0.987484 |
1707.04850
|
Vincent Tan
|
Lan V. Truong and Vincent Y. F. Tan
|
Moderate Deviation Asymptotics for Variable-Length Codes with Feedback
|
30 pages; No figures. Revision submitted to the IEEE Transactions on
Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider data transmission across discrete memoryless channels (DMCs)
using variable-length codes with feedback. We consider the family of such codes
whose rates are $\rho_N$ below the channel capacity $C$, where $\rho_N$ is a
positive sequence that tends to zero slower than the reciprocal of the square
root of the expectation of the (random) blocklength $N$. This is known as the
moderate deviations regime and we establish the optimal moderate deviations
constant. We show that in this scenario, the error probability decays
sub-exponentially with speed $\exp(-(B/C)N\rho_N)$, where $B$ is the maximum
relative entropy between output distributions of the DMC.
|
[
{
"version": "v1",
"created": "Sun, 16 Jul 2017 09:29:16 GMT"
},
{
"version": "v2",
"created": "Wed, 16 May 2018 04:27:08 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Truong",
"Lan V.",
""
],
[
"Tan",
"Vincent Y. F.",
""
]
] |
new_dataset
| 0.995181 |
1710.02610
|
Akash Singh
|
Akash Singh, Chaohui Gong, Howie Choset
|
Modelling and Path Planning of Snake Robot in cluttered environment
|
Accepted in IEEE/INFToMM International Conference on Reconfigurable
Mechanisms and Robots 2018,Tu Delft
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Studying snake robot locomotion in a cluttered environment has been a
complicated task because the motion model is discontinuous due to the physical
contact with obstacles, and the contact force cannot be determined solely by
contact positions. We present a unique mathematical model of the robot
interacting with obstacles in which the contact forces are mapped on the basis
of a viscous friction model. Also a motion planning strategy has been
introduced which helps deriving the simplest path that ensures sufficient
number of contacts of the robot with the obstacles required to reach a goal
position. Numerical simulations and experimental results are presented to
validate the theoretical approach.
|
[
{
"version": "v1",
"created": "Sat, 7 Oct 2017 00:04:36 GMT"
},
{
"version": "v2",
"created": "Tue, 15 May 2018 19:23:32 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Singh",
"Akash",
""
],
[
"Gong",
"Chaohui",
""
],
[
"Choset",
"Howie",
""
]
] |
new_dataset
| 0.997998 |
1711.09360
|
Alexios Balatsoukas-Stimming
|
Alexios Balatsoukas Stimming and Athanasios P. Liavas
|
Design of LDPC Codes for the Unequal Power Two-User Gaussian Multiple
Access Channel
| null | null |
10.1109/LWC.2018.2833855
| null |
cs.IT eess.SP math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we describe an LDPC code design framework for the unequal power
two-user Gaussian multiple access channel using EXIT charts. We show that the
sum-rate of the LDPC codes designed using our approach can get close to the
maximal sum-rate of the two-user Gaussian multiple access channel. Moreover, we
provide numerical simulation results that demonstrate the excellent
finite-length performance of the designed LDPC codes.
|
[
{
"version": "v1",
"created": "Sun, 26 Nov 2017 09:59:13 GMT"
},
{
"version": "v2",
"created": "Fri, 4 May 2018 08:40:08 GMT"
},
{
"version": "v3",
"created": "Wed, 16 May 2018 09:06:56 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Stimming",
"Alexios Balatsoukas",
""
],
[
"Liavas",
"Athanasios P.",
""
]
] |
new_dataset
| 0.966053 |
1802.07000
|
Denis Rystsov
|
Denis Rystsov
|
CASPaxos: Replicated State Machines without logs
|
update style
| null | null | null |
cs.DC
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
CASPaxos is a wait-free, linearizable, multi-writer multi-reader register in
unreliable, asynchronous networks supporting arbitrary update operations
including compare-and-set (CAS). The register acts as a replicated state
machine providing an interface for changing its value by applying an arbitrary
user-provided function (a command). Unlike Multi-Paxos and Raft which replicate
the log of commands, CASPaxos replicates state, thus avoiding associated
complexity, reducing write amplification, increasing concurrency of disk
operations and hardware utilization. The paper describes CASPaxos, proves its
safety properties and evaluates the characteristics of a CASPaxos-based
prototype of key-value storage.
|
[
{
"version": "v1",
"created": "Tue, 20 Feb 2018 08:09:38 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Feb 2018 07:22:28 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Feb 2018 18:11:53 GMT"
},
{
"version": "v4",
"created": "Tue, 13 Mar 2018 15:58:22 GMT"
},
{
"version": "v5",
"created": "Fri, 16 Mar 2018 16:42:19 GMT"
},
{
"version": "v6",
"created": "Mon, 26 Mar 2018 03:41:03 GMT"
},
{
"version": "v7",
"created": "Tue, 3 Apr 2018 16:02:27 GMT"
},
{
"version": "v8",
"created": "Thu, 5 Apr 2018 17:32:34 GMT"
},
{
"version": "v9",
"created": "Wed, 16 May 2018 16:52:08 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Rystsov",
"Denis",
""
]
] |
new_dataset
| 0.998683 |
1804.03492
|
Mikaela Angelina Uy
|
Mikaela Angelina Uy and Gim Hee Lee
|
PointNetVLAD: Deep Point Cloud Based Retrieval for Large-Scale Place
Recognition
|
CVPR 2018, 11 pages, 10 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Unlike its image based counterpart, point cloud based retrieval for place
recognition has remained as an unexplored and unsolved problem. This is largely
due to the difficulty in extracting local feature descriptors from a point
cloud that can subsequently be encoded into a global descriptor for the
retrieval task. In this paper, we propose the PointNetVLAD where we leverage on
the recent success of deep networks to solve point cloud based retrieval for
place recognition. Specifically, our PointNetVLAD is a combination/modification
of the existing PointNet and NetVLAD, which allows end-to-end training and
inference to extract the global descriptor from a given 3D point cloud.
Furthermore, we propose the "lazy triplet and quadruplet" loss functions that
can achieve more discriminative and generalizable global descriptors to tackle
the retrieval task. We create benchmark datasets for point cloud based
retrieval for place recognition, and the experimental results on these datasets
show the feasibility of our PointNetVLAD. Our code and the link for the
benchmark dataset downloads are available in our project website.
http://github.com/mikacuy/pointnetvlad/
|
[
{
"version": "v1",
"created": "Tue, 10 Apr 2018 13:06:56 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Apr 2018 06:58:55 GMT"
},
{
"version": "v3",
"created": "Wed, 16 May 2018 08:47:33 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Uy",
"Mikaela Angelina",
""
],
[
"Lee",
"Gim Hee",
""
]
] |
new_dataset
| 0.997634 |
1804.05053
|
Maria Alejandra Barrios
|
Colleen Richey and Maria A.Barrios, Zeb Armstrong, Chris Bartels,
Horacio Franco, Martin Graciarena, Aaron Lawson, Mahesh Kumar Nandwana, Allen
Stauffer, Julien van Hout, Paul Gamble, Jeff Hetherly, Cory Stephenson, and
Karl Ni
|
Voices Obscured in Complex Environmental Settings (VOICES) corpus
|
Submitted to Interspeech 2018
| null | null | null |
cs.SD eess.AS
|
http://creativecommons.org/licenses/by/4.0/
|
This paper introduces the Voices Obscured In Complex Environmental Settings
(VOICES) corpus, a freely available dataset under Creative Commons BY 4.0. This
dataset will promote speech and signal processing research of speech recorded
by far-field microphones in noisy room conditions. Publicly available speech
corpora are mostly composed of isolated speech at close-range microphony. A
typical approach to better represent realistic scenarios, is to convolve clean
speech with noise and simulated room response for model training. Despite these
efforts, model performance degrades when tested against uncurated speech in
natural conditions. For this corpus, audio was recorded in furnished rooms with
background noise played in conjunction with foreground speech selected from the
LibriSpeech corpus. Multiple sessions were recorded in each room to accommodate
for all foreground speech-background noise combinations. Audio was recorded
using twelve microphones placed throughout the room, resulting in 120 hours of
audio per microphone. This work is a multi-organizational effort led by SRI
International and Lab41 with the intent to push forward state-of-the-art
distant microphone approaches in signal processing and speech recognition.
|
[
{
"version": "v1",
"created": "Fri, 13 Apr 2018 17:47:55 GMT"
},
{
"version": "v2",
"created": "Tue, 15 May 2018 23:52:22 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Richey",
"Colleen",
""
],
[
"Barrios",
"Maria A.",
""
],
[
"Armstrong",
"Zeb",
""
],
[
"Bartels",
"Chris",
""
],
[
"Franco",
"Horacio",
""
],
[
"Graciarena",
"Martin",
""
],
[
"Lawson",
"Aaron",
""
],
[
"Nandwana",
"Mahesh Kumar",
""
],
[
"Stauffer",
"Allen",
""
],
[
"van Hout",
"Julien",
""
],
[
"Gamble",
"Paul",
""
],
[
"Hetherly",
"Jeff",
""
],
[
"Stephenson",
"Cory",
""
],
[
"Ni",
"Karl",
""
]
] |
new_dataset
| 0.994547 |
1805.06156
|
Neda Tavakoli
|
Neda Tavakoli, Dong Dai, Yong Chen
|
Client-side Straggler-Aware I/O Scheduler for Object-based Parallel File
Systems
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Object-based parallel file systems have emerged as promising storage
solutions for high-performance computing (HPC) systems. Despite the fact that
object storage provides a flexible interface, scheduling highly concurrent I/O
requests that access a large number of objects still remains as a challenging
problem, especially in the case when stragglers (storage servers that are
significantly slower than others) exist in the system. An efficient I/O
scheduler needs to avoid possible stragglers to achieve low latency and high
throughput. In this paper, we introduce a log-assisted straggler-aware I/O
scheduling to mitigate the impact of storage server stragglers. The
contribution of this study is threefold. First, we introduce a client-side,
log-assisted, straggler-aware I/O scheduler architecture to tackle the storage
straggler issue in HPC systems. Second, we present three scheduling algorithms
that can make efficient decision for scheduling I/Os while avoiding stragglers
based on such an architecture. Third, we evaluate the proposed I/O scheduler
using simulations, and the simulation results have confirmed the promise of the
newly introduced straggler-aware I/O scheduler.
|
[
{
"version": "v1",
"created": "Wed, 16 May 2018 06:59:06 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Tavakoli",
"Neda",
""
],
[
"Dai",
"Dong",
""
],
[
"Chen",
"Yong",
""
]
] |
new_dataset
| 0.955748 |
1805.06182
|
Zhihong Liu
|
Zhihong Liu, Jiajia Liu, Yong Zeng, Jianfeng Ma, and Qiping Huang
|
Covert Wireless Communications with Active Eavesdropper on AWGN Channels
|
10 pages, 12 figures
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Covert wireless communication can prevent an adversary from knowing the
existence of user's transmission, thus provide stronger security protection. In
AWGN channels, a square root law was obtained and the result shows that Alice
can reliably and covertly transmit $\mathcal{O}(\sqrt{n})$ bits to Bob in n
channel uses in the presence of a passive eavesdropper (Willie). However,
existing work presupposes that Willie is static and only samples the channels
at a fixed place. If Willie can dynamically adjust the testing distance between
him and Alice according to his sampling values, his detection probability of
error can be reduced significantly via a trend test. We found that, if Alice
has no prior knowledge about Willie, she cannot hide her transmission behavior
in the presence of an active Willie, and the square root law does not hold in
this situation. We then proposed a novel countermeasure to deal with the active
Willie. Through randomized transmission scheduling, Willie cannot detect
Alice's transmission attempts if Alice can set her transmission probability
below a threshold. Additionally, we systematically evaluated the security
properties of covert communications in a dense wireless network, and proposed a
density-based routing scheme to deal with multi-hop covert communication in a
wireless network. As the network grows denser, Willie's uncertainty increases,
and finally resulting in a "shadow" network to Willie.
|
[
{
"version": "v1",
"created": "Wed, 16 May 2018 08:11:47 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Liu",
"Zhihong",
""
],
[
"Liu",
"Jiajia",
""
],
[
"Zeng",
"Yong",
""
],
[
"Ma",
"Jianfeng",
""
],
[
"Huang",
"Qiping",
""
]
] |
new_dataset
| 0.993396 |
1805.06306
|
Lingfeng Zhang
|
Lingfeng Zhang, Ioannis A. Kakadiaris
|
Fully Associative Patch-based 1-to-N Matcher for Face Recognition
|
Accepted in ICB2018. arXiv admin note: text overlap with
arXiv:1804.01417, arXiv:1805.02339 and substantial text overlap with
arXiv:1803.09359
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper focuses on improving face recognition performance by a patch-based
1-to-N signature matcher that learns correlations between different facial
patches. A Fully Associative Patch-based Signature Matcher (FAPSM) is proposed
so that the local matching identity of each patch contributes to the global
matching identities of all the patches. The proposed matcher consists of three
steps. First, based on the signature, the local matching identity and the
corresponding matching score of each patch are computed. Then, a fully
associative weight matrix is learned to obtain the global matching identities
and scores of all the patches. At last, the l1-regularized weighting is applied
to combine the global matching identity of each patch and obtain a final
matching identity. The proposed matcher has been integrated with the UR2D
system for evaluation. The experimental results indicate that the proposed
matcher achieves better performance than the current UR2D system. The Rank-1
accuracy is improved significantly by 3% and 0.55% on the UHDB31 dataset and
the IJB-A dataset, respectively.
|
[
{
"version": "v1",
"created": "Tue, 15 May 2018 01:42:46 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Zhang",
"Lingfeng",
""
],
[
"Kakadiaris",
"Ioannis A.",
""
]
] |
new_dataset
| 0.998886 |
1805.06353
|
Shuo Zhang
|
Shuo Zhang and Vugar Abdul Zada and Krisztian Balog
|
SmartTable: A Spreadsheet Program with Intelligent Assistance
|
The 41st International ACM SIGIR Conference on Research and
Development in Information Retrieval (SIGIR '18)
| null |
10.1145/3209978.3210171
| null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce SmartTable, an online spreadsheet application that is equipped
with intelligent assistance capabilities. With a focus on relational tables,
describing entities along with their attributes, we offer assistance in two
flavors: (i) for populating the table with additional entities (rows) and (ii)
for extending it with additional entity attributes (columns). We provide
details of our implementation, which is also released as open source. The
application is available at http://smarttable.cc.
|
[
{
"version": "v1",
"created": "Wed, 16 May 2018 14:54:00 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Zhang",
"Shuo",
""
],
[
"Zada",
"Vugar Abdul",
""
],
[
"Balog",
"Krisztian",
""
]
] |
new_dataset
| 0.99793 |
1805.06411
|
Mustafa Al-Bassam
|
Mustafa Al-Bassam, Alberto Sonnino, Micha{\l} Kr\'ol, Ioannis Psaras
|
Airtnt: Fair Exchange Payment for Outsourced Secure Enclave Computations
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present Airtnt, a novel scheme that enables users with CPUs that support
Trusted Execution Environments (TEEs) and remote attestation to rent out
computing time on secure enclaves to untrusted users. Airtnt makes use of the
attestation capabilities of TEEs and smart contracts on distributed ledgers to
guarantee the fair exchange of the payment and the result of an execution.
Airtnt makes use of off-chain payment channels to allow requesters to pay
executing nodes for intermediate "snapshots" of the state of an execution.
Effectively, this step-by-step "compute-payment" cycle realises untrusted
pay-as-you-go micropayments for computation. Neither the requester nor the
executing node can walk away and incur monetary loss to the other party. This
also allows requesters to continue executions on other executing nodes if the
original executing node becomes unavailable or goes offline.
|
[
{
"version": "v1",
"created": "Wed, 16 May 2018 16:35:20 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Al-Bassam",
"Mustafa",
""
],
[
"Sonnino",
"Alberto",
""
],
[
"Król",
"Michał",
""
],
[
"Psaras",
"Ioannis",
""
]
] |
new_dataset
| 0.994072 |
1805.06413
|
Soujanya Poria
|
Devamanyu Hazarika, Soujanya Poria, Sruthi Gorantla, Erik Cambria,
Roger Zimmermann, Rada Mihalcea
|
CASCADE: Contextual Sarcasm Detection in Online Discussion Forums
|
Accepted in COLING 2018
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by-sa/4.0/
|
The literature in automated sarcasm detection has mainly focused on lexical,
syntactic and semantic-level analysis of text. However, a sarcastic sentence
can be expressed with contextual presumptions, background and commonsense
knowledge. In this paper, we propose CASCADE (a ContextuAl SarCasm DEtector)
that adopts a hybrid approach of both content and context-driven modeling for
sarcasm detection in online social media discussions. For the latter, CASCADE
aims at extracting contextual information from the discourse of a discussion
thread. Also, since the sarcastic nature and form of expression can vary from
person to person, CASCADE utilizes user embeddings that encode stylometric and
personality features of the users. When used along with content-based feature
extractors such as Convolutional Neural Networks (CNNs), we see a significant
boost in the classification performance on a large Reddit corpus.
|
[
{
"version": "v1",
"created": "Wed, 16 May 2018 16:38:38 GMT"
}
] | 2018-05-17T00:00:00 |
[
[
"Hazarika",
"Devamanyu",
""
],
[
"Poria",
"Soujanya",
""
],
[
"Gorantla",
"Sruthi",
""
],
[
"Cambria",
"Erik",
""
],
[
"Zimmermann",
"Roger",
""
],
[
"Mihalcea",
"Rada",
""
]
] |
new_dataset
| 0.995041 |
1803.00191
|
Liang Wang
|
Liang Wang, Meng Sun, Wei Zhao, Kewei Shen, Jingming Liu
|
Yuanfudao at SemEval-2018 Task 11: Three-way Attention and Relational
Knowledge for Commonsense Machine Comprehension
|
5 pages, 1 figure, Accepted to International Workshop on Semantic
Evaluation 2018
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
This paper describes our system for SemEval-2018 Task 11: Machine
Comprehension using Commonsense Knowledge. We use Three-way Attentive Networks
(TriAN) to model interactions between the passage, question and answers. To
incorporate commonsense knowledge, we augment the input with relation embedding
from the graph of general knowledge ConceptNet (Speer et al., 2017). As a
result, our system achieves state-of-the-art performance with 83.95% accuracy
on the official test data. Code is publicly available at
https://github.com/intfloat/commonsense-rc
|
[
{
"version": "v1",
"created": "Thu, 1 Mar 2018 03:23:55 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2018 04:38:11 GMT"
},
{
"version": "v3",
"created": "Sat, 7 Apr 2018 06:15:49 GMT"
},
{
"version": "v4",
"created": "Wed, 11 Apr 2018 10:47:52 GMT"
},
{
"version": "v5",
"created": "Tue, 15 May 2018 06:21:02 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Wang",
"Liang",
""
],
[
"Sun",
"Meng",
""
],
[
"Zhao",
"Wei",
""
],
[
"Shen",
"Kewei",
""
],
[
"Liu",
"Jingming",
""
]
] |
new_dataset
| 0.985778 |
1803.00628
|
Elliott Donlon
|
Elliott Donlon, Siyuan Dong, Melody Liu, Jianhua Li, Edward Adelson
and Alberto Rodriguez
|
GelSlim: A High-Resolution, Compact, Robust, and Calibrated
Tactile-sensing Finger
|
RA-L Pre-print. 8 pages
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work describes the development of a high-resolution tactile-sensing
finger for robot grasping. This finger, inspired by previous GelSight sensing
techniques, features an integration that is slimmer, more robust, and with more
homogeneous output than previous vision-based tactile sensors. To achieve a
compact integration, we redesign the optical path from illumination source to
camera by combining light guides and an arrangement of mirror reflections. We
parameterize the optical path with geometric design variables and describe the
tradeoffs between the finger thickness, the depth of field of the camera, and
the size of the tactile sensing area. The sensor sustains the wear from
continuous use -- and abuse -- in grasping tasks by combining tougher materials
for the compliant soft gel, a textured fabric skin, a structurally rigid body,
and a calibration process that maintains homogeneous illumination and contrast
of the tactile images during use. Finally, we evaluate the sensor's durability
along four metrics that track the signal quality during more than 3000 grasping
experiments.
|
[
{
"version": "v1",
"created": "Thu, 1 Mar 2018 21:16:22 GMT"
},
{
"version": "v2",
"created": "Tue, 15 May 2018 16:54:08 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Donlon",
"Elliott",
""
],
[
"Dong",
"Siyuan",
""
],
[
"Liu",
"Melody",
""
],
[
"Li",
"Jianhua",
""
],
[
"Adelson",
"Edward",
""
],
[
"Rodriguez",
"Alberto",
""
]
] |
new_dataset
| 0.999575 |
1803.06807
|
Behzad Asadi
|
Behzad Asadi, Lawrence Ong, and Sarah J. Johnson
|
Centralized Caching with Unequal Cache Sizes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We address a centralized caching problem with unequal cache sizes. We
consider a system with a server of files connected through a shared error-free
link to a group of cache-enabled users where one subgroup has a larger cache
size than the other. We propose an explicit caching scheme for the considered
system aimed at minimizing the load of worst-case demands over the shared link.
As suggested by numerical evaluations, our scheme improves upon the best
existing explicit scheme by having a lower worst-case load; also, our scheme
performs within a multiplicative factor of 1.11 from the scheme that can be
obtained by solving an optimisation problem in which the number of parameters
grows exponentially with the number of users.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2018 05:29:33 GMT"
},
{
"version": "v2",
"created": "Tue, 15 May 2018 00:42:37 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Asadi",
"Behzad",
""
],
[
"Ong",
"Lawrence",
""
],
[
"Johnson",
"Sarah J.",
""
]
] |
new_dataset
| 0.979138 |
1804.01792
|
Nicola Strisciuglio
|
Nicola Strisciuglio, Radim Tylecek, Michael Blaich, Nicolai Petkov,
Peter Bieber, Jochen Hemming, Eldert van Henten, Torsten Sattler, Marc
Pollefeys, Theo Gevers, Thomas Brox, Robert B. Fisher
|
TrimBot2020: an outdoor robot for automatic gardening
|
Accepted for publication at International Sympsium on Robotics 2018
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Robots are increasingly present in modern industry and also in everyday life.
Their applications range from health-related situations, for assistance to
elderly people or in surgical operations, to automatic and driver-less vehicles
(on wheels or flying) or for driving assistance. Recently, an interest towards
robotics applied in agriculture and gardening has arisen, with applications to
automatic seeding and cropping or to plant disease control, etc. Autonomous
lawn mowers are succesful market applications of gardening robotics. In this
paper, we present a novel robot that is developed within the TrimBot2020
project, funded by the EU H2020 program. The project aims at prototyping the
first outdoor robot for automatic bush trimming and rose pruning.
|
[
{
"version": "v1",
"created": "Thu, 5 Apr 2018 11:55:37 GMT"
},
{
"version": "v2",
"created": "Tue, 15 May 2018 12:06:00 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Strisciuglio",
"Nicola",
""
],
[
"Tylecek",
"Radim",
""
],
[
"Blaich",
"Michael",
""
],
[
"Petkov",
"Nicolai",
""
],
[
"Bieber",
"Peter",
""
],
[
"Hemming",
"Jochen",
""
],
[
"van Henten",
"Eldert",
""
],
[
"Sattler",
"Torsten",
""
],
[
"Pollefeys",
"Marc",
""
],
[
"Gevers",
"Theo",
""
],
[
"Brox",
"Thomas",
""
],
[
"Fisher",
"Robert B.",
""
]
] |
new_dataset
| 0.999713 |
1804.09543
|
Dafydd Gibbon
|
Dafydd Gibbon
|
The Future of Prosody: It's about Time
|
9 pages, 15 figures, keynote address draft for Speech Prosody 9,
Poznan, 2018
| null | null | null |
cs.CL cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Prosody is usually defined in terms of the three distinct but interacting
domains of pitch, intensity and duration patterning, or, more generally, as
phonological and phonetic properties of 'suprasegmentals', speech segments
which are larger than consonants and vowels. Rather than taking this approach,
the concept of multiple time domains for prosody processing is taken up, and
methods of time domain analysis are discussed: annotation mining with timing
dispersion measures, time tree induction, oscillator models in phonology and
phonetics, and finally the use of the Amplitude Envelope Modulation Spectrum
(AEMS). While frequency demodulation (in the form of pitch tracking) is a
central issue in prosodic analysis, in the present context it is amplitude
envelope demodulation and frequency zones in the long time-domain spectra of
the demodulated envelope which are focused. A generalised view is taken of
oscillation as iteration in abstract prosodic models and as modulation and
demodulation of a variety of rhythms in the speech signal.
|
[
{
"version": "v1",
"created": "Mon, 23 Apr 2018 20:54:43 GMT"
},
{
"version": "v2",
"created": "Tue, 1 May 2018 14:19:31 GMT"
},
{
"version": "v3",
"created": "Mon, 7 May 2018 09:31:38 GMT"
},
{
"version": "v4",
"created": "Tue, 15 May 2018 05:55:55 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Gibbon",
"Dafydd",
""
]
] |
new_dataset
| 0.973441 |
1805.03329
|
arXiv Admin
|
Michael Jacob, Zack Zheng
|
LogIn: Unlock Journaling System for Personal Informatics
|
arXiv admin note: submission has been withdrawn by arXiv
administrators due to inappropriate overlap with external sources
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In situ self-report is widely used in human-computer interaction, ubiquitous
computing, and for assessment and intervention in health and wellness.
Unfortunately, it remains limited by high burdens. We examine unlock journaling
as an alternative. Specifically, we build upon recent work to introduce single
slide unlock journaling gestures appropriate for health and wellness measures.
We then present the first field study comparing unlock journaling with
traditional diaries and notification based reminders in self report of health
and wellness measures. We find unlock journaling is less intrusive than
reminders, dramatically improves frequency of journaling, and can provide equal
or better timeliness. Where appropriate to broader design needs, unlock
journaling is thus an overall promising method for in situ self report.
|
[
{
"version": "v1",
"created": "Wed, 9 May 2018 00:42:15 GMT"
},
{
"version": "v2",
"created": "Tue, 15 May 2018 19:14:08 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Jacob",
"Michael",
""
],
[
"Zheng",
"Zack",
""
]
] |
new_dataset
| 0.997443 |
1805.04778
|
Assaf Yifrach
|
Assaf Yifrach, Yishay Mansour
|
Fair Leader Election for Rational Agents in Asynchronous Rings and
Networks
|
48 pages, PODC 2018
| null |
10.1145/3212734.3212767
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a game theoretic model where a coalition of processors might collude
to bias the outcome of the protocol, where we assume that the processors always
prefer any legitimate outcome over a non-legitimate one. We show that the
problems of Fair Leader Election and Fair Coin Toss are equivalent, and focus
on Fair Leader Election.
Our main focus is on a directed asynchronous ring of $n$ processors, where we
investigate the protocol proposed by Abraham et al.
\cite{abraham2013distributed} and studied in Afek et al.
\cite{afek2014distributed}. We show that in general the protocol is resilient
only to sub-linear size coalitions. Specifically, we show that
$\Omega(\sqrt{n\log n})$ randomly located processors or $\Omega(\sqrt[3]{n})$
adversarially located processors can force any outcome. We complement this by
showing that the protocol is resilient to any adversarial coalition of size
$O(\sqrt[4]{n})$.
We propose a modification to the protocol, and show that it is resilient to
every coalition of size $\Theta(\sqrt{n})$, by exhibiting both an attack and a
resilience result. For every $k \geq 1$, we define a family of graphs
${\mathcal{G}}_{k}$ that can be simulated by trees where each node in the tree
simulates at most $k$ processors. We show that for every graph in
${\mathcal{G}}_{k}$, there is no fair leader election protocol that is
resilient to coalitions of size $k$. Our result generalizes a previous result
of Abraham et al. \cite{abraham2013distributed} that states that for every
graph, there is no fair leader election protocol which is resilient to
coalitions of size $\lceil \frac{n}{2} \rceil$.
|
[
{
"version": "v1",
"created": "Sat, 12 May 2018 20:40:21 GMT"
},
{
"version": "v2",
"created": "Tue, 15 May 2018 13:39:35 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Yifrach",
"Assaf",
""
],
[
"Mansour",
"Yishay",
""
]
] |
new_dataset
| 0.998343 |
1805.05144
|
Muhammad Imran
|
Firoj Alam, Ferda Ofli, Muhammad Imran, Michael Aupetit
|
A Twitter Tale of Three Hurricanes: Harvey, Irma, and Maria
|
Accepted at ISCRAM 2018 conference
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
People increasingly use microblogging platforms such as Twitter during
natural disasters and emergencies. Research studies have revealed the
usefulness of the data available on Twitter for several disaster response
tasks. However, making sense of social media data is a challenging task due to
several reasons such as limitations of available tools to analyze high-volume
and high-velocity data streams. This work presents an extensive
multidimensional analysis of textual and multimedia content from millions of
tweets shared on Twitter during the three disaster events. Specifically, we
employ various Artificial Intelligence techniques from Natural Language
Processing and Computer Vision fields, which exploit different machine learning
algorithms to process the data generated during the disaster events. Our study
reveals the distributions of various types of useful information that can
inform crisis managers and responders as well as facilitate the development of
future automated systems for disaster management.
|
[
{
"version": "v1",
"created": "Mon, 14 May 2018 12:38:44 GMT"
},
{
"version": "v2",
"created": "Tue, 15 May 2018 10:28:27 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Alam",
"Firoj",
""
],
[
"Ofli",
"Ferda",
""
],
[
"Imran",
"Muhammad",
""
],
[
"Aupetit",
"Michael",
""
]
] |
new_dataset
| 0.998104 |
1805.05377
|
Nicholas FitzGerald
|
Nicholas FitzGerald, Julian Michael, Luheng He, Luke Zettlemoyer
|
Large-Scale QA-SRL Parsing
|
10 pages, 3 figures, 8 tables. Accepted to ACL 2018
| null | null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new large-scale corpus of Question-Answer driven Semantic Role
Labeling (QA-SRL) annotations, and the first high-quality QA-SRL parser. Our
corpus, QA-SRL Bank 2.0, consists of over 250,000 question-answer pairs for
over 64,000 sentences across 3 domains and was gathered with a new
crowd-sourcing scheme that we show has high precision and good recall at modest
cost. We also present neural models for two QA-SRL subtasks: detecting argument
spans for a predicate and generating questions to label the semantic
relationship. The best models achieve question accuracy of 82.6% and span-level
accuracy of 77.6% (under human evaluation) on the full pipelined QA-SRL
prediction task. They can also, as we show, be used to gather additional
annotations at low cost.
|
[
{
"version": "v1",
"created": "Mon, 14 May 2018 18:50:11 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"FitzGerald",
"Nicholas",
""
],
[
"Michael",
"Julian",
""
],
[
"He",
"Luheng",
""
],
[
"Zettlemoyer",
"Luke",
""
]
] |
new_dataset
| 0.998685 |
1805.05381
|
Neeraj Varshney
|
Neeraj Varshney, Aditya K. Jagannatham, Pramod K. Varshney
|
Cognitive MIMO-RF/FSO Cooperative Relay Communication with Mobile Nodes
and Imperfect Channel State Information
|
revision submitted to IEEE Transactions on Cognitive Communications
and Networking
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work analyzes the performance of an underlay cognitive radio based
decode-and-forward mixed multiple-input multiple-output (MIMO) radio
frequency/free space optical (RF/FSO) cooperative relay system with multiple
mobile secondary and primary user nodes. The effect of imperfect channel state
information (CSI) arising due to channel estimation error is also considered at
the secondary user transmitters (SU-TXs) and relay on the power control and
symbol detection processes respectively. A unique aspect of this work is that
both fixed and proportional interference power constraints are employed to
limit the interference at the primary user receivers (PU-RXs). Analytical
results are derived to characterize the exact and asymptotic outage and bit
error probabilities of the above system under practical conditions of node
mobility and imperfect CSI, together with impairments of the optical channel,
such as path loss, atmospheric turbulence, and pointing errors, for orthogonal
space-time block coded transmission between each SU-TX and relay. Finally,
simulation results are presented to yield various interesting insights into the
system performance such as the benefits of a midamble versus preamble for
channel estimation.
|
[
{
"version": "v1",
"created": "Mon, 14 May 2018 18:55:51 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Varshney",
"Neeraj",
""
],
[
"Jagannatham",
"Aditya K.",
""
],
[
"Varshney",
"Pramod K.",
""
]
] |
new_dataset
| 0.99936 |
1805.05426
|
George Fragulis
|
George F. Fragulis, Lazaros Lazaridis, Maria Papatsimouli and Ioannis
A. Skordas
|
O.D.E.S. : An Online Dynamic Examination System based on a CMS Wordpress
plugin
| null | null | null | null |
cs.CY cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes the online dynamic examination application plugin named
O.D.E.S., developed according to the open source software philosophy, where the
CMS Wordpress is used as programmers/coders are given the potential to develop
applications from scratch with safety and ease. In ODES application there
exists two types of users: admin/teacher and student. The admin/teacher can
create/edit/delete/view questions, categories of questions and examination
papers. The questions are divided in two types, multiple choice questions
(including true/false) and long answer questions (essays). The teacher can
create exams choosing the number of questions and the types of questions that
exist in the pool of questions that are previously created. The selection is
done randomly by the application and the teacher just determines the total
number of both multiple choice or long answer questions as well as the
importance (weight) of each one of them (including negative grades also). The
student takes the random generated exam and receives his/hers grades. The
grades of the multiple choice questions are done automatically, whereas for the
long answer questions the teacher is responsible to put grades on. After the
completion of the exam the teacher can view the student's final score via the
control panel or a report.
|
[
{
"version": "v1",
"created": "Mon, 7 May 2018 17:01:51 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Fragulis",
"George F.",
""
],
[
"Lazaridis",
"Lazaros",
""
],
[
"Papatsimouli",
"Maria",
""
],
[
"Skordas",
"Ioannis A.",
""
]
] |
new_dataset
| 0.994483 |
1805.05456
|
Manish Sharma
|
Manish Sharma, Akash Anand, Rupika Srivastava and Lakshmi Kaligounder
|
Wearable Audio and IMU Based Shot Detection in Racquet Sports
|
5 pages, 4 figures
| null | null | null |
cs.LG cs.AI stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wearables like smartwatches which are embedded with sensors and powerful
processors, provide a strong platform for development of analytics solutions in
sports domain. To analyze players' games, while motion sensor based shot
detection has been extensively studied in sports like Tennis, Golf, Baseball;
Table Tennis and Badminton are relatively less explored due to possible less
intense hand motion during shots. In our paper, we propose a novel,
computationally inexpensive and real-time system for shot detection in table
tennis, based on fusion of Inertial Measurement Unit (IMU) and audio sensor
data embedded in a wrist-worn wearable. The system builds upon our presented
methodology for synchronizing IMU and audio sensor input in time using detected
shots and achieves 95.6% accuracy. To our knowledge, it is the first
fusion-based solution for sports analysis in wearables. Shot detectors for
other racquet sports as well as further analytics to provide features like shot
classification, rally analysis and recommendations, can easily be built over
our proposed solution.
|
[
{
"version": "v1",
"created": "Mon, 14 May 2018 21:31:59 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Sharma",
"Manish",
""
],
[
"Anand",
"Akash",
""
],
[
"Srivastava",
"Rupika",
""
],
[
"Kaligounder",
"Lakshmi",
""
]
] |
new_dataset
| 0.998419 |
1805.05581
|
Reina Akama
|
Reina Akama, Kento Watanabe, Sho Yokoi, Sosuke Kobayashi, Kentaro Inui
|
Unsupervised Learning of Style-sensitive Word Vectors
|
7 pages, Accepted at The 56th Annual Meeting of the Association for
Computational Linguistics (ACL 2018)
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the first study aimed at capturing stylistic similarity
between words in an unsupervised manner. We propose extending the continuous
bag of words (CBOW) model (Mikolov et al., 2013) to learn style-sensitive word
vectors using a wider context window under the assumption that the style of all
the words in an utterance is consistent. In addition, we introduce a novel task
to predict lexical stylistic similarity and to create a benchmark dataset for
this task. Our experiment with this dataset supports our assumption and
demonstrates that the proposed extensions contribute to the acquisition of
style-sensitive word embeddings.
|
[
{
"version": "v1",
"created": "Tue, 15 May 2018 06:19:12 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Akama",
"Reina",
""
],
[
"Watanabe",
"Kento",
""
],
[
"Yokoi",
"Sho",
""
],
[
"Kobayashi",
"Sosuke",
""
],
[
"Inui",
"Kentaro",
""
]
] |
new_dataset
| 0.98692 |
1805.05887
|
Julian Sch\"utte
|
Julian Sch\"utte, Gerd Stefan Brost
|
LUCON: Data Flow Control for Message-Based IoT Systems
|
data flow control, information flow control, trustcom, 11 pages
| null | null | null |
cs.CR cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today's emerging Industrial Internet of Things (IIoT) scenarios are
characterized by the exchange of data between services across enterprises.
Traditional access and usage control mechanisms are only able to determine if
data may be used by a subject, but lack an understanding of how it may be used.
The ability to control the way how data is processed is however crucial for
enterprises to guarantee (and provide evidence of) compliant processing of
critical data, as well as for users who need to control if their private data
may be analyzed or linked with additional information - a major concern in IoT
applications processing personal information. In this paper, we introduce
LUCON, a data-centric security policy framework for distributed systems that
considers data flows by controlling how messages may be routed across services
and how they are combined and processed. LUCON policies prevent information
leaks, bind data usage to obligations, and enforce data flows across services.
Policy enforcement is based on a dynamic taint analysis at runtime and an
upfront static verification of message routes against policies. We discuss the
semantics of these two complementing enforcement models and illustrate how
LUCON policies are compiled from a simple policy language into a first-order
logic representation. We demonstrate the practical application of LUCON in a
real-world IoT middleware and discuss its integration into Apache Camel.
Finally, we evaluate the runtime impact of LUCON and discuss performance and
scalability aspects.
|
[
{
"version": "v1",
"created": "Mon, 14 May 2018 12:41:51 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Schütte",
"Julian",
""
],
[
"Brost",
"Gerd Stefan",
""
]
] |
new_dataset
| 0.964294 |
1805.05927
|
Abdul Hai Zahid Mohammed
|
M A H Zahid, Ankush Mittal, R.C. Joshi, and G. Atluri
|
CLINIQA: A Machine Intelligence Based Clinical Question Answering System
|
This manuscript was submitted to IEEE Transactions on Information
Technology in Biomedicine in 2007 and was in second revision when it was
withdrawn. As I moved to industry and could not get enough time to revise it.
I am uploading it here for anyone interested in conventional ML based
approach to NLP
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The recent developments in the field of biomedicine have made large volumes
of biomedical literature available to the medical practitioners. Due to the
large size and lack of efficient searching strategies, medical practitioners
struggle to obtain necessary information available in the biomedical
literature. Moreover, the most sophisticated search engines of age are not
intelligent enough to interpret the clinicians' questions. These facts reflect
the urgent need of an information retrieval system that accepts the queries
from medical practitioners' in natural language and returns the answers quickly
and efficiently. In this paper, we present an implementation of a machine
intelligence based CLINIcal Question Answering system (CLINIQA) to answer
medical practitioner's questions. The system was rigorously evaluated on
different text mining algorithms and the best components for the system were
selected. The system makes use of Unified Medical Language System for semantic
analysis of both questions and medical documents. In addition, the system
employs supervised machine learning algorithms for classification of the
documents, identifying the focus of the question and answer selection.
Effective domain-specific heuristics are designed for answer ranking. The
performance evaluation on hundred clinical questions shows the effectiveness of
our approach.
|
[
{
"version": "v1",
"created": "Tue, 15 May 2018 17:45:25 GMT"
}
] | 2018-05-16T00:00:00 |
[
[
"Zahid",
"M A H",
""
],
[
"Mittal",
"Ankush",
""
],
[
"Joshi",
"R. C.",
""
],
[
"Atluri",
"G.",
""
]
] |
new_dataset
| 0.958936 |
1701.00860
|
Christophe De Wagter
|
Christophe De Wagter and Rick Ruijsink and Ewoud Smeur and Kevin van
Hecke and Freek van Tienen and Erik van der Horst and Bart Remes
|
Design, Control and Visual Navigation of the DelftaCopter
| null | null |
10.1002/rob.21789
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To participate in the Outback Medical Express UAV Challenge 2016, a vehicle
was designed and tested that can hover precisely, take-off and land vertically,
fly fast forward efficiently and use computer vision to locate a person and a
suitable landing location. A rotor blade was designed that can deliver
sufficient thrust in hover, while still being efficient in fast forward flight.
Energy measurements and windtunnel tests were performed. A rotor-head and
corresponding control algorithms were developed to allow transitioning flight
with the non-conventional rotor dynamics. Dedicated electronics were designed
that meet vehicle needs and regulations to allow safe flight beyond visual line
of sight. Vision based search and guidance algorithms were developed and
tested. Flight tests and a competition participation illustrate the
applicability of the DelftaCopter concept.
|
[
{
"version": "v1",
"created": "Tue, 3 Jan 2017 22:55:20 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"De Wagter",
"Christophe",
""
],
[
"Ruijsink",
"Rick",
""
],
[
"Smeur",
"Ewoud",
""
],
[
"van Hecke",
"Kevin",
""
],
[
"van Tienen",
"Freek",
""
],
[
"van der Horst",
"Erik",
""
],
[
"Remes",
"Bart",
""
]
] |
new_dataset
| 0.9993 |
1702.06156
|
Chase Dowling
|
Chase Dowling, Tanner Fiez, Lillian Ratliff, Baosen Zhang
|
How Much Urban Traffic is Searching for Parking? Simulating Curbside
Parking as a Network of Finite Capacity Queues
|
Updated May 11, 2018 (fixed formatting errors)
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the increasing availability of transaction data collected by digital
parking meters, paid curbside parking can be advantageously modeled as a
network of interdependent queues. In this article we introduce methods for
analyzing a special class of networks of finite capacity queues, where tasks
arrive from an exogenous source, join the queue if there is an available server
or are rejected and move to another queue in search of service according to the
network topology. Such networks can be useful for modeling curbside parking
since queues in the network perform the same function and drivers searching for
an available server are under combinatorial constraints and jockeying is not
instantaneous. Further, we provide a motivating example for such networks of
finite capacity queues in the context of drivers searching for parking in the
neighborhood of Belltown in Seattle, Washington, USA. Lastly, since the
stationary distribution of such networks used to model parking are difficult to
satisfactorily characterize, we also introduce a simulation tool for the
purpose of testing the assumptions made to estimate interesting performance
metrics. Our results suggest that a Markovian relaxation of the problem when
solving for the mean rate metrics is comparable to deterministic service times
reflective of a driver's tendency to park for the maximum allowable time.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2017 19:56:58 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Feb 2018 22:22:19 GMT"
},
{
"version": "v3",
"created": "Fri, 11 May 2018 21:05:15 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Dowling",
"Chase",
""
],
[
"Fiez",
"Tanner",
""
],
[
"Ratliff",
"Lillian",
""
],
[
"Zhang",
"Baosen",
""
]
] |
new_dataset
| 0.95424 |
1705.10087
|
Thomas Moreau
|
Thomas Moreau, Laurent Oudre, Nicolas Vayatis
|
DICOD: Distributed Convolutional Sparse Coding
| null | null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we introduce DICOD, a convolutional sparse coding algorithm
which builds shift invariant representations for long signals. This algorithm
is designed to run in a distributed setting, with local message passing, making
it communication efficient. It is based on coordinate descent and uses locally
greedy updates which accelerate the resolution compared to greedy coordinate
selection. We prove the convergence of this algorithm and highlight its
computational speed-up which is super-linear in the number of cores used. We
also provide empirical evidence for the acceleration properties of our
algorithm compared to state-of-the-art methods.
|
[
{
"version": "v1",
"created": "Mon, 29 May 2017 09:21:30 GMT"
},
{
"version": "v2",
"created": "Sun, 13 May 2018 14:04:25 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Moreau",
"Thomas",
""
],
[
"Oudre",
"Laurent",
""
],
[
"Vayatis",
"Nicolas",
""
]
] |
new_dataset
| 0.986025 |
1710.08092
|
Weidi Xie
|
Qiong Cao, Li Shen, Weidi Xie, Omkar M. Parkhi and Andrew Zisserman
|
VGGFace2: A dataset for recognising faces across pose and age
|
This paper has been accepted by IEEE Conference on Automatic Face and
Gesture Recognition (F&G), 2018. (Oral)
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
In this paper, we introduce a new large-scale face dataset named VGGFace2.
The dataset contains 3.31 million images of 9131 subjects, with an average of
362.6 images for each subject. Images are downloaded from Google Image Search
and have large variations in pose, age, illumination, ethnicity and profession
(e.g. actors, athletes, politicians). The dataset was collected with three
goals in mind: (i) to have both a large number of identities and also a large
number of images for each identity; (ii) to cover a large range of pose, age
and ethnicity; and (iii) to minimize the label noise. We describe how the
dataset was collected, in particular the automated and manual filtering stages
to ensure a high accuracy for the images of each identity. To assess face
recognition performance using the new dataset, we train ResNet-50 (with and
without Squeeze-and-Excitation blocks) Convolutional Neural Networks on
VGGFace2, on MS- Celeb-1M, and on their union, and show that training on
VGGFace2 leads to improved recognition performance over pose and age. Finally,
using the models trained on these datasets, we demonstrate state-of-the-art
performance on all the IARPA Janus face recognition benchmarks, e.g. IJB-A,
IJB-B and IJB-C, exceeding the previous state-of-the-art by a large margin.
Datasets and models are publicly available.
|
[
{
"version": "v1",
"created": "Mon, 23 Oct 2017 05:26:32 GMT"
},
{
"version": "v2",
"created": "Sun, 13 May 2018 10:35:21 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Cao",
"Qiong",
""
],
[
"Shen",
"Li",
""
],
[
"Xie",
"Weidi",
""
],
[
"Parkhi",
"Omkar M.",
""
],
[
"Zisserman",
"Andrew",
""
]
] |
new_dataset
| 0.999873 |
1711.04090
|
Xianda Zhou
|
Xianda Zhou, William Yang Wang
|
MojiTalk: Generating Emotional Responses at Scale
| null | null | null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Generating emotional language is a key step towards building empathetic
natural language processing agents. However, a major challenge for this line of
research is the lack of large-scale labeled training data, and previous studies
are limited to only small sets of human annotated sentiment labels.
Additionally, explicitly controlling the emotion and sentiment of generated
text is also difficult. In this paper, we take a more radical approach: we
exploit the idea of leveraging Twitter data that are naturally labeled with
emojis. More specifically, we collect a large corpus of Twitter conversations
that include emojis in the response, and assume the emojis convey the
underlying emotions of the sentence. We then introduce a reinforced conditional
variational encoder approach to train a deep generative model on these
conversations, which allows us to use emojis to control the emotion of the
generated text. Experimentally, we show in our quantitative and qualitative
analyses that the proposed models can successfully generate high-quality
abstractive conversation responses in accordance with designated emotions.
|
[
{
"version": "v1",
"created": "Sat, 11 Nov 2017 07:20:51 GMT"
},
{
"version": "v2",
"created": "Sat, 12 May 2018 05:10:42 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Zhou",
"Xianda",
""
],
[
"Wang",
"William Yang",
""
]
] |
new_dataset
| 0.997946 |
1712.03291
|
Sushant Veer
|
Sushant Veer, Rakesh, Ioannis Poulakakis
|
Input-to-State Stability of Periodic Orbits of Systems with Impulse
Effects via Poincar\'e Analysis
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we investigate the relation between robustness of periodic
orbits exhibited by systems with impulse effects and robustness of their
corresponding Poincar\'e maps. In particular, we prove that input-to-state
stability (ISS) of a periodic orbit under external excitation in both
continuous and discrete time is equivalent to ISS of the corresponding 0-input
fixed point of the associated \emph{forced} Poincar\'e map. This result extends
the classical Poincar\'e analysis for asymptotic stability of periodic
solutions to establish orbital input-to-state stability of such solutions under
external excitation. In our proof, we define the forced Poincar\'e map, and use
it to construct ISS estimates for the periodic orbit in terms of ISS estimates
of this map under mild assumptions on the input signals. As a consequence of
the availability of these estimates, the equivalence between exponential
stability (ES) of the fixed point of the 0-input (unforced) Poincar\'e map and
ES of the corresponding orbit is recovered. The results can be applied
naturally to study the robustness of periodic orbits of continuous-time systems
as well. Although our motivation for extending classical Poincar\'e analysis to
address ISS stems from the need to design robust controllers for limit-cycle
walking and running robots, the results are applicable to a much broader class
of systems that exhibit periodic solutions.
|
[
{
"version": "v1",
"created": "Fri, 8 Dec 2017 22:04:29 GMT"
},
{
"version": "v2",
"created": "Fri, 11 May 2018 19:46:23 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Veer",
"Sushant",
""
],
[
"Rakesh",
"",
""
],
[
"Poulakakis",
"Ioannis",
""
]
] |
new_dataset
| 0.986492 |
1803.02057
|
Jatavallabhula Krishna Murthy
|
Junaid Ahmed Ansari, Sarthak Sharma, Anshuman Majumdar, J. Krishna
Murthy, and K. Madhava Krishna
|
The Earth ain't Flat: Monocular Reconstruction of Vehicles on Steep and
Graded Roads from a Moving Camera
|
Submitted to IROS 2018
| null | null | null |
cs.RO cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Accurate localization of other traffic participants is a vital task in
autonomous driving systems. State-of-the-art systems employ a combination of
sensing modalities such as RGB cameras and LiDARs for localizing traffic
participants, but most such demonstrations have been confined to plain roads.
We demonstrate, to the best of our knowledge, the first results for monocular
object localization and shape estimation on surfaces that do not share the same
plane with the moving monocular camera. We approximate road surfaces by local
planar patches and use semantic cues from vehicles in the scene to initialize a
local bundle-adjustment like procedure that simultaneously estimates the pose
and shape of the vehicles, and the orientation of the local ground plane on
which the vehicle stands as well. We evaluate the proposed approach on the
KITTI and SYNTHIA-SF benchmarks, for a variety of road plane configurations.
The proposed approach significantly improves the state-of-the-art for monocular
object localization on arbitrarily-shaped roads.
|
[
{
"version": "v1",
"created": "Tue, 6 Mar 2018 08:28:18 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Ansari",
"Junaid Ahmed",
""
],
[
"Sharma",
"Sarthak",
""
],
[
"Majumdar",
"Anshuman",
""
],
[
"Murthy",
"J. Krishna",
""
],
[
"Krishna",
"K. Madhava",
""
]
] |
new_dataset
| 0.999168 |
1804.06514
|
Yan Ke
|
Jia Liu, Yan Ke, Yu Lei, Jun Li, Yaojie Wang, Yiliang Han, Minqing
Zhang, Xiaoyuan Yang
|
The Reincarnation of Grille Cipher: A Generative Approach
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to keep the data secret, various techniques have been implemented to
encrypt and decrypt the secret data. Cryptography is committed to the security
of content, i.e. it cannot be restored with a given ciphertext. Steganography
is to hiding the existence of a communication channel within a stego. However,
it has been difficult to construct a cipher (cypher) that simultaneously
satisfy both channel and content security for secure communication. Inspired by
the Cardan grille, this paper presents a new generative framework for grille
cipher. A digital cardan grille is used for message encryption and decryption.
The ciphertext is directly sampled by a powerful generator without an explicit
cover. Message loss and prior loss are proposed for penalizing message
extraction error and unrealistic ciphertext. Jensen-Shannon Divergence is
introduced as new criteria for channel security. A simple practical data-driven
grille cipher is proposed using semantic image inpainting and generative
adversarial network. Experimental results demonstrate the promising of the
proposed method.
|
[
{
"version": "v1",
"created": "Wed, 18 Apr 2018 00:37:34 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Apr 2018 11:11:37 GMT"
},
{
"version": "v3",
"created": "Mon, 14 May 2018 17:23:54 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Liu",
"Jia",
""
],
[
"Ke",
"Yan",
""
],
[
"Lei",
"Yu",
""
],
[
"Li",
"Jun",
""
],
[
"Wang",
"Yaojie",
""
],
[
"Han",
"Yiliang",
""
],
[
"Zhang",
"Minqing",
""
],
[
"Yang",
"Xiaoyuan",
""
]
] |
new_dataset
| 0.977819 |
1805.00553
|
Vivek Singh
|
Brian Teixeira, Vivek Singh, Terrence Chen, Kai Ma, Birgi Tamersoy,
Yifan Wu, Elena Balashova, and Dorin Comaniciu
|
Generating Synthetic X-ray Images of a Person from the Surface Geometry
|
accepted for spotlight presentation at CVPR 2018
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel framework that learns to predict human anatomy from body
surface. Specifically, our approach generates a synthetic X-ray image of a
person only from the person's surface geometry. Furthermore, the synthetic
X-ray image is parametrized and can be manipulated by adjusting a set of body
markers which are also generated during the X-ray image prediction. With the
proposed framework, multiple synthetic X-ray images can easily be generated by
varying surface geometry. By perturbing the parameters, several additional
synthetic X-ray images can be generated from the same surface geometry. As a
result, our approach offers a potential to overcome the training data barrier
in the medical domain. This capability is achieved by learning a pair of
networks - one learns to generate the full image from the partial image and a
set of parameters, and the other learns to estimate the parameters given the
full image. During training, the two networks are trained iteratively such that
they would converge to a solution where the predicted parameters and the full
image are consistent with each other. In addition to medical data enrichment,
our framework can also be used for image completion as well as anomaly
detection.
|
[
{
"version": "v1",
"created": "Tue, 1 May 2018 21:07:30 GMT"
},
{
"version": "v2",
"created": "Mon, 14 May 2018 14:21:32 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Teixeira",
"Brian",
""
],
[
"Singh",
"Vivek",
""
],
[
"Chen",
"Terrence",
""
],
[
"Ma",
"Kai",
""
],
[
"Tamersoy",
"Birgi",
""
],
[
"Wu",
"Yifan",
""
],
[
"Balashova",
"Elena",
""
],
[
"Comaniciu",
"Dorin",
""
]
] |
new_dataset
| 0.993808 |
1805.03375
|
Corwin Sinnamon
|
Corwin Sinnamon
|
Complexity of Proper Suffix-Convex Regular Languages
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A language L is suffix-convex if for any words u, v,w, whenever w and uvw are
in L, vw is in L as well. Suffix-convex languages include left ideals,
suffix-closed languages, and suffix-free languages, which were studied
previously. In this paper, we concentrate on suffix-convex languages that do
not belong to any one of these classes; we call such languages proper. In order
to study this language class, we define a structure called a suffix-convex
triple system that characterizes the automata recognizing suffix-convex
languages. We find tight upper bounds for reversal, star, product, and boolean
operations of proper suffix-convex languages, and we conjecture on the size of
the largest syntactic semigroup. We also prove that three witness streams are
required to meet all these bounds.
|
[
{
"version": "v1",
"created": "Wed, 9 May 2018 05:21:49 GMT"
},
{
"version": "v2",
"created": "Sat, 12 May 2018 21:27:57 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Sinnamon",
"Corwin",
""
]
] |
new_dataset
| 0.998812 |
1805.04542
|
Svetlana Kiritchenko
|
Svetlana Kiritchenko and Saif M. Mohammad
|
Sentiment Composition of Words with Opposing Polarities
|
In Proceedings of the 15th Annual Conference of the North American
Chapter of the Association for Computational Linguistics: Human Language
Technologies (NAACL), San Diego, California, 2016
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we explore sentiment composition in phrases that have at least
one positive and at least one negative word---phrases like 'happy accident' and
'best winter break'. We compiled a dataset of such opposing polarity phrases
and manually annotated them with real-valued scores of sentiment association.
Using this dataset, we analyze the linguistic patterns present in opposing
polarity phrases. Finally, we apply several unsupervised and supervised
techniques of sentiment composition to determine their efficacy on this
dataset. Our best system, which incorporates information from the phrase's
constituents, their parts of speech, their sentiment association scores, and
their embedding vectors, obtains an accuracy of over 80% on the opposing
polarity phrases.
|
[
{
"version": "v1",
"created": "Fri, 11 May 2018 18:16:54 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Kiritchenko",
"Svetlana",
""
],
[
"Mohammad",
"Saif M.",
""
]
] |
new_dataset
| 0.999419 |
1805.04544
|
Viktor Zamaraev
|
Christian Konrad, Viktor Zamaraev
|
Distributed Minimum Vertex Coloring and Maximum Independent Set in
Chordal Graphs
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give deterministic distributed $(1+\epsilon)$-approximation algorithms for
Minimum Vertex Coloring and Maximum Independent Set on chordal graphs in the
LOCAL model. Our coloring algorithm runs in $O(\frac{1}{\epsilon} \log n)$
rounds, and our independent set algorithm has a runtime of
$O(\frac{1}{\epsilon}\log(\frac{1}{\epsilon})\log^* n)$ rounds. For coloring,
existing lower bounds imply that the dependencies on $\frac{1}{\epsilon}$ and
$\log n$ are best possible. For independent set, we prove that
$O(\frac{1}{\epsilon})$ rounds are necessary.
Both our algorithms make use of a tree decomposition of the input chordal
graph. They iteratively peel off interval subgraphs, which are identified via
the tree decomposition of the input graph, thereby partitioning the vertex set
into $O(\log n)$ layers. For coloring, each interval graph is colored
independently, which results in various coloring conflicts between the layers.
These conflicts are then resolved in a separate phase, using the particular
structure of our partitioning. For independent set, only the first $O( \log
\frac{1}{\epsilon})$ layers are required as they already contain a large enough
independent set. We develop a $(1+\epsilon)$-approximation maximum independent
set algorithm for interval graphs, which we then apply to those layers.
This work raises the question as to how useful tree decompositions are for
distributed computing.
|
[
{
"version": "v1",
"created": "Fri, 11 May 2018 18:21:02 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Konrad",
"Christian",
""
],
[
"Zamaraev",
"Viktor",
""
]
] |
new_dataset
| 0.996623 |
1805.04558
|
Svetlana Kiritchenko
|
Svetlana Kiritchenko, Saif M. Mohammad, Jason Morin, and Berry de
Bruijn
|
NRC-Canada at SMM4H Shared Task: Classifying Tweets Mentioning Adverse
Drug Reactions and Medication Intake
|
In Proceedings of the Social Media Mining for Health Applications
Workshop at AMIA-2017, Washington, DC, USA, 2017
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Our team, NRC-Canada, participated in two shared tasks at the AMIA-2017
Workshop on Social Media Mining for Health Applications (SMM4H): Task 1 -
classification of tweets mentioning adverse drug reactions, and Task 2 -
classification of tweets describing personal medication intake. For both tasks,
we trained Support Vector Machine classifiers using a variety of surface-form,
sentiment, and domain-specific features. With nine teams participating in each
task, our submissions ranked first on Task 1 and third on Task 2. Handling
considerable class imbalance proved crucial for Task 1. We applied an
under-sampling technique to reduce class imbalance (from about 1:10 to 1:2).
Standard n-gram features, n-grams generalized over domain terms, as well as
general-domain and domain-specific word embeddings had a substantial impact on
the overall performance in both tasks. On the other hand, including sentiment
lexicon features did not result in any improvement.
|
[
{
"version": "v1",
"created": "Fri, 11 May 2018 19:01:49 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Kiritchenko",
"Svetlana",
""
],
[
"Mohammad",
"Saif M.",
""
],
[
"Morin",
"Jason",
""
],
[
"de Bruijn",
"Berry",
""
]
] |
new_dataset
| 0.991378 |
1805.04617
|
Alexander Fabbri
|
Alexander R. Fabbri, Irene Li, Prawat Trairatvorakul, Yijiao He, Wei
Tai Ting, Robert Tung, Caitlin Westerfield, Dragomir R. Radev
|
TutorialBank: A Manually-Collected Corpus for Prerequisite Chains,
Survey Extraction and Resource Recommendation
|
ACL 2018, 56th Annual Meeting of the Association for Computational
Linguistics, Melbourne, Australia, 2018
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The field of Natural Language Processing (NLP) is growing rapidly, with new
research published daily along with an abundance of tutorials, codebases and
other online resources. In order to learn this dynamic field or stay up-to-date
on the latest research, students as well as educators and researchers must
constantly sift through multiple sources to find valuable, relevant
information. To address this situation, we introduce TutorialBank, a new,
publicly available dataset which aims to facilitate NLP education and research.
We have manually collected and categorized over 6,300 resources on NLP as well
as the related fields of Artificial Intelligence (AI), Machine Learning (ML)
and Information Retrieval (IR). Our dataset is notably the largest
manually-picked corpus of resources intended for NLP education which does not
include only academic papers. Additionally, we have created both a search
engine and a command-line tool for the resources and have annotated the corpus
to include lists of research topics, relevant resources for each topic,
prerequisite relations among topics, relevant sub-parts of individual
resources, among other annotations. We are releasing the dataset and present
several avenues for further research.
|
[
{
"version": "v1",
"created": "Fri, 11 May 2018 23:13:34 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Fabbri",
"Alexander R.",
""
],
[
"Li",
"Irene",
""
],
[
"Trairatvorakul",
"Prawat",
""
],
[
"He",
"Yijiao",
""
],
[
"Ting",
"Wei Tai",
""
],
[
"Tung",
"Robert",
""
],
[
"Westerfield",
"Caitlin",
""
],
[
"Radev",
"Dragomir R.",
""
]
] |
new_dataset
| 0.966364 |
1805.04714
|
Grigorios Kalliatakis M.A.
|
Grigorios Kalliatakis, Shoaib Ehsan, Ales Leonardis and Klaus
McDonald-Maier
|
Exploring object-centric and scene-centric CNN features and their
complementarity for human rights violations recognition in images
|
19 pages, 13 figures; Submitted to PLOS ONE
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Identifying potential abuses of human rights through imagery is a novel and
challenging task in the field of computer vision, that will enable to expose
human rights violations over large-scale data that may otherwise be impossible.
While standard databases for object and scene categorisation contain hundreds
of different classes, the largest available dataset of human rights violations
contains only 4 classes. Here, we introduce the `Human Rights Archive Database'
(HRA), a verified-by-experts repository of 3050 human rights violations
photographs, labelled with human rights semantic categories, comprising a list
of the types of human rights abuses encountered at present. With the HRA
dataset and a two-phase transfer learning scheme, we fine-tuned the
state-of-the-art deep convolutional neural networks (CNNs) to provide human
rights violations classification CNNs (HRA-CNNs). We also present extensive
experiments refined to evaluate how well object-centric and scene-centric CNN
features can be combined for the task of recognising human rights abuses. With
this, we show that HRA database poses a challenge at a higher level for the
well studied representation learning methods, and provide a benchmark in the
task of human rights violations recognition in visual context. We expect this
dataset can help to open up new horizons on creating systems able of
recognising rich information about human rights violations. Our dataset, codes
and trained models are available online at
https://github.com/GKalliatakis/Human-Rights-Archive-CNNs.
|
[
{
"version": "v1",
"created": "Sat, 12 May 2018 12:50:03 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Kalliatakis",
"Grigorios",
""
],
[
"Ehsan",
"Shoaib",
""
],
[
"Leonardis",
"Ales",
""
],
[
"McDonald-Maier",
"Klaus",
""
]
] |
new_dataset
| 0.999489 |
1805.04722
|
Marco Baldi
|
Paolo Santini, Marco Baldi, Giovanni Cancellieri, Franco Chiaraluce
|
Hindering reaction attacks by using monomial codes in the McEliece
cryptosystem
|
5 pages, 0 figures, 1 table, accepted for presentation at the 2018
IEEE International Symposium on Information Theory (ISIT)
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study recent reaction attacks against QC-LDPC and QC-MDPC
code-based cryptosystems, which allow an opponent to recover the private
parity-check matrix through its distance spectrum by observing a sufficiently
high number of decryption failures. We consider a special class of codes, known
as monomial codes, to form private keys with the desirable property of having a
unique and complete distance spectrum. We verify that for these codes the
problem of recovering the secret key from the distance spectrum is equivalent
to that of finding cliques in a graph, and use this equivalence to prove that
current reaction attacks are not applicable when codes of this type are used in
the McEliece cryptosystem.
|
[
{
"version": "v1",
"created": "Sat, 12 May 2018 13:58:38 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Santini",
"Paolo",
""
],
[
"Baldi",
"Marco",
""
],
[
"Cancellieri",
"Giovanni",
""
],
[
"Chiaraluce",
"Franco",
""
]
] |
new_dataset
| 0.980841 |
1805.04747
|
Raja Naeem Akram
|
James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis
|
Consumer Centric Data Control, Tracking and Transparency -- A Position
Paper
|
10 Pages, 2 Figures, Conference
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Personal data related to a user's activities, preferences and services, is
considered to be a valuable commodity not only for a wide range of
technology-oriented companies like Google, Amazon and Apple but also for more
traditional companies like travel/transport, banking, entertainment and
marketing industry. This has resulted in more targeted and to a great extend
personalised services for individuals -- in most cases at a minimal financial
cost to them. The operational reality upon which a user authorises companies to
collect his/her personal data to receive, in return, more
personalised/targeted/context-aware services and hassle-free activities (for
users) is widely deployed. It becomes evident that the security, integrity and
accessibility of the collected data are of paramount importance. These
characteristics are becoming more entrenched in the era of Internet-of-Things
(IoT), autonomous vehicles and seamless travel. In this position paper, we
examine the challenges faced by both users and organisations in dealing with
the Personal Identifiable Information (PII). Furthermore, we expand on the
implications of the General Data Protection Regulation (GDPR) specifically for
the management of the PII. Subsequently, we extend the discussion to future
technologies, especially the IoT and integrated transport systems for better
customer experience -- and their ramification on the data governance and PII
management. Finally, we propose a framework that balances user's privacy and
data control with an organisation's objective of delivering quality, targeted
and efficient services to their customers using the "collected user data". This
framework is referred to as "Consumer Oriented Data Control \& Auditability"
(CODCA) and defines the technologies that are adapted to privacy concerns and
legal/regulation-frameworks.
|
[
{
"version": "v1",
"created": "Sat, 12 May 2018 16:14:38 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Tapsell",
"James",
""
],
[
"Akram",
"Raja Naeem",
""
],
[
"Markantonakis",
"Konstantinos",
""
]
] |
new_dataset
| 0.999279 |
1805.04850
|
Omer Shwartz
|
Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren
|
Shattered Trust: When Replacement Smartphone Components Attack
|
Presented in WOOT 17', 11th {USENIX} Workshop on Offensive
Technologies ({WOOT} 17) - 2017
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Phone touchscreens, and other similar hardware components such as orientation
sensors, wireless charging controllers, and NFC readers, are often produced by
third-party manufacturers and not by the phone vendors themselves. Third-party
driver source code to support these components is integrated into the vendor's
source code. In contrast to 'pluggable' drivers, such as USB or network
drivers, the component driver's source code implicitly assumes that the
component hardware is authentic and trustworthy. As a result of this trust,
very few integrity checks are performed on the communications between the
component and the device's main processor.
In this paper, we call this trust into question, considering the fact that
touchscreens are often shattered and then replaced with aftermarket components
of questionable origin. We analyze the operation of a commonly used touchscreen
controller. We construct two standalone attacks, based on malicious touchscreen
hardware, that function as building blocks toward a full attack: a series of
touch injection attacks that allow the touchscreen to impersonate the user and
exfiltrate data, and a buffer overflow attack that lets the attacker execute
privileged operations. Combining the two building blocks, we present and
evaluate a series of end-to-end attacks that can severely compromise a stock
Android phone with standard firmware. Our results make the case for a
hardware-based physical countermeasure.
|
[
{
"version": "v1",
"created": "Sun, 13 May 2018 10:01:23 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Shwartz",
"Omer",
""
],
[
"Cohen",
"Amir",
""
],
[
"Shabtai",
"Asaf",
""
],
[
"Oren",
"Yossi",
""
]
] |
new_dataset
| 0.999413 |
1805.04871
|
Shuming Ma
|
Shuming Ma, Xu Sun, Yizhong Wang, Junyang Lin
|
Bag-of-Words as Target for Neural Machine Translation
|
accepted by ACL 2018
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A sentence can be translated into more than one correct sentences. However,
most of the existing neural machine translation models only use one of the
correct translations as the targets, and the other correct sentences are
punished as the incorrect sentences in the training stage. Since most of the
correct translations for one sentence share the similar bag-of-words, it is
possible to distinguish the correct translations from the incorrect ones by the
bag-of-words. In this paper, we propose an approach that uses both the
sentences and the bag-of-words as targets in the training stage, in order to
encourage the model to generate the potentially correct sentences that are not
appeared in the training set. We evaluate our model on a Chinese-English
translation dataset, and experiments show our model outperforms the strong
baselines by the BLEU score of 4.55.
|
[
{
"version": "v1",
"created": "Sun, 13 May 2018 12:24:20 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Ma",
"Shuming",
""
],
[
"Sun",
"Xu",
""
],
[
"Wang",
"Yizhong",
""
],
[
"Lin",
"Junyang",
""
]
] |
new_dataset
| 0.97291 |
1805.04893
|
Rui Zhang
|
Rui Zhang, Cicero Nogueira dos Santos, Michihiro Yasunaga, Bing Xiang,
Dragomir Radev
|
Neural Coreference Resolution with Deep Biaffine Attention by Joint
Mention Detection and Mention Clustering
|
ACL2018
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Coreference resolution aims to identify in a text all mentions that refer to
the same real-world entity. The state-of-the-art end-to-end neural coreference
model considers all text spans in a document as potential mentions and learns
to link an antecedent for each possible mention. In this paper, we propose to
improve the end-to-end coreference resolution system by (1) using a biaffine
attention model to get antecedent scores for each possible mention, and (2)
jointly optimizing the mention detection accuracy and the mention clustering
log-likelihood given the mention cluster labels. Our model achieves the
state-of-the-art performance on the CoNLL-2012 Shared Task English test set.
|
[
{
"version": "v1",
"created": "Sun, 13 May 2018 14:24:31 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Zhang",
"Rui",
""
],
[
"Santos",
"Cicero Nogueira dos",
""
],
[
"Yasunaga",
"Michihiro",
""
],
[
"Xiang",
"Bing",
""
],
[
"Radev",
"Dragomir",
""
]
] |
new_dataset
| 0.982455 |
1805.04905
|
Nathan Schneider
|
Nathan Schneider, Jena D. Hwang, Vivek Srikumar, Jakob Prange, Austin
Blodgett, Sarah R. Moeller, Aviram Stern, Adi Bitan, Omri Abend
|
Comprehensive Supersense Disambiguation of English Prepositions and
Possessives
|
ACL 2018
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Semantic relations are often signaled with prepositional or possessive
marking--but extreme polysemy bedevils their analysis and automatic
interpretation. We introduce a new annotation scheme, corpus, and task for the
disambiguation of prepositions and possessives in English. Unlike previous
approaches, our annotations are comprehensive with respect to types and tokens
of these markers; use broadly applicable supersense classes rather than
fine-grained dictionary definitions; unite prepositions and possessives under
the same class inventory; and distinguish between a marker's lexical
contribution and the role it marks in the context of a predicate or scene.
Strong interannotator agreement rates, as well as encouraging disambiguation
results with established supervised methods, speak to the viability of the
scheme and task.
|
[
{
"version": "v1",
"created": "Sun, 13 May 2018 16:08:57 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Schneider",
"Nathan",
""
],
[
"Hwang",
"Jena D.",
""
],
[
"Srikumar",
"Vivek",
""
],
[
"Prange",
"Jakob",
""
],
[
"Blodgett",
"Austin",
""
],
[
"Moeller",
"Sarah R.",
""
],
[
"Stern",
"Aviram",
""
],
[
"Bitan",
"Adi",
""
],
[
"Abend",
"Omri",
""
]
] |
new_dataset
| 0.996064 |
1805.04986
|
Jing Jin
|
Zhaoyang Qiu, Shugeng Chen, Ian Daly, Jie Jia, Xingyu Wang, Jing Jin
|
BCI-Based Strategies on Stroke Rehabilitation with Avatar and FES
Feedback
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Stroke is the leading cause of serious and long-term disability worldwide.
Some studies have shown that motor imagery (MI) based BCI has a positive effect
in poststroke rehabilitation. It could help patients promote the reorganization
processes in the damaged brain regions. However, offline motor imagery and
conventional online motor imagery with feedback (such as rewarding sounds and
movements of an avatar) could not reflect the true intention of the patients.
In this study, both virtual limbs and functional electrical stimulation (FES)
were used as feedback to provide patients a closed-loop sensorimotor
integration for motor rehabilitation. The FES system would activate if the user
was imagining hand movement of instructed side. Ten stroke patients (7 male,
aged 22-70 years, mean 49.5+-15.1) were involved in this study. All of them
participated in BCI-FES rehabilitation training for 4 weeks.The average motor
imagery accuracies of the ten patients in the last week were 71.3%, which has
improved 3% than that in the first week. Five patients' Fugl-Meyer Assessment
(FMA) scores have been raised. Patient 6, who has have suffered from stroke
over two years, achieved the greatest improvement after rehabilitation training
(pre FMA: 20, post FMA: 35). In the aspect of brain patterns, the active
patterns of the five patients gradually became centralized and shifted to
sensorimotor areas (channel C3 and C4) and premotor area (channel FC3 and
FC4).In this study, motor imagery based BCI and FES system were combined to
provided stoke patients with a closed-loop sensorimotor integration for motor
rehabilitation. Result showed evidences that the BCI-FES system is effective in
restoring upper extremities motor function in stroke. In future work, more
cases are needed to demonstrate its superiority over conventional therapy and
explore the potential role of MI in poststroke rehabilitation.
|
[
{
"version": "v1",
"created": "Mon, 14 May 2018 02:06:02 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Qiu",
"Zhaoyang",
""
],
[
"Chen",
"Shugeng",
""
],
[
"Daly",
"Ian",
""
],
[
"Jia",
"Jie",
""
],
[
"Wang",
"Xingyu",
""
],
[
"Jin",
"Jing",
""
]
] |
new_dataset
| 0.966772 |
1805.04993
|
Alice Lai
|
Alice Lai, Joel Tetreault
|
Discourse Coherence in the Wild: A Dataset, Evaluation and Methods
|
Accepted at SIGDIAL 2018
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To date there has been very little work on assessing discourse coherence
methods on real-world data. To address this, we present a new corpus of
real-world texts (GCDC) as well as the first large-scale evaluation of leading
discourse coherence algorithms. We show that neural models, including two that
we introduce here (SentAvg and ParSeq), tend to perform best. We analyze these
performance differences and discuss patterns we observed in low coherence texts
in four domains.
|
[
{
"version": "v1",
"created": "Mon, 14 May 2018 02:48:29 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Lai",
"Alice",
""
],
[
"Tetreault",
"Joel",
""
]
] |
new_dataset
| 0.999681 |
1805.05033
|
Clemens Zeidler
|
Clemens Zeidler, Muhammad Rizwan Asghar
|
AuthStore: Password-based Authentication and Encrypted Data Storage in
Untrusted Environments
|
8 pages, 3 figures, 1 table
| null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Passwords are widely used for client to server authentication as well as for
encrypting data stored in untrusted environments, such as cloud storage. Both,
authentication and encrypted cloud storage, are usually discussed in isolation.
In this work, we propose AuthStore, a flexible authentication framework that
allows users to securely reuse passwords for authentication as well as for
encrypted cloud storage at a single or multiple service providers. Users can
configure how secure passwords are protected using password stretching
techniques. We present a compact password-authenticated key exchange protocol
(CompactPAKE) that integrates the retrieval of password stretching parameters.
A parameter attack is described and we show how existing solutions suffer from
this attack. Furthermore, we introduce a password manager that supports
CompactPAKE.
|
[
{
"version": "v1",
"created": "Mon, 14 May 2018 07:34:22 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Zeidler",
"Clemens",
""
],
[
"Asghar",
"Muhammad Rizwan",
""
]
] |
new_dataset
| 0.99886 |
1805.05046
|
Sunghoon Lee
|
Sunghoon Lee, Jooyoun Park, Jun Heo
|
Improved Reconciliation With Polar Codes In Quantum Key Distribution
| null | null | null | null |
cs.IT math.IT quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quantum key distribution (QKD) is a cryptographic system that generates an
information-theoretically secure key shared by two legitimate parties. QKD
consists of two parts: quantum and classical. The latter is referred to as
classical post-processing (CPP). Information reconciliation is a part of CPP in
which parties are given correlated variables and attempt to eliminate the
discrepancies between them while disclosing a minimum amount of information.
The elegant reconciliation protocol known as \emph{Cascade} was developed
specifically for QKD in 1992 and has become the de-facto standard for all QKD
implementations. However, the protocol is highly interactive. Thus, other
protocols based on linear block codes such as Hamming codes, low-density
parity-check (LDPC) codes, and polar codes have been researched. In particular,
reconciliation using LDPC codes has been mainly studied because of its
outstanding performance. Nevertheless, with small block size, the bit error
rate performance of polar codes under successive-cancellation list (SCL)
decoding with a cyclic redundancy check (CRC) is comparable to state-of-the-art
turbo and LDPC codes. In this study, we demonstrate the use of polar codes to
improve the performance of information reconciliation in a QKD system with
small block size. The best decoder for polar codes, a CRC-aided SCL decoder,
requires CRC-precoded messages. However, messages that are sifted keys in QKD
are obtained arbitrarily as a result of a characteristic of the QKD protocol
and cannot be CRC-precoded. We propose a method that allows arbitrarily
obtained sifted keys to be CRC precoded by introducing a virtual string. Thus
the best decoder can be used for reconciliation using polar codes and improves
the efficiency of the protocol.
|
[
{
"version": "v1",
"created": "Mon, 14 May 2018 07:58:40 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Lee",
"Sunghoon",
""
],
[
"Park",
"Jooyoun",
""
],
[
"Heo",
"Jun",
""
]
] |
new_dataset
| 0.99296 |
1805.05095
|
Duygu Ataman
|
Duygu Ataman
|
Bianet: A Parallel News Corpus in Turkish, Kurdish and English
|
Published at the LREC Workshop MLP-MomenT 2018
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new open-source parallel corpus consisting of news articles
collected from the Bianet magazine, an online newspaper that publishes Turkish
news, often along with their translations in English and Kurdish. In this
paper, we describe the collection process of the corpus and its statistical
properties. We validate the benefit of using the Bianet corpus by evaluating
bilingual and multilingual neural machine translation models in English-Turkish
and English-Kurdish directions.
|
[
{
"version": "v1",
"created": "Mon, 14 May 2018 10:07:51 GMT"
}
] | 2018-05-15T00:00:00 |
[
[
"Ataman",
"Duygu",
""
]
] |
new_dataset
| 0.999835 |
1506.00290
|
Ilan Komargodski
|
Yael Tauman Kalai and Ilan Komargodski
|
Compressing Communication in Distributed Protocols
|
21 pages + 1 title page
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show how to compress communication in selection protocols, where the goal
is to agree on a sequence of random bits using only a broadcast channel. More
specifically, we present a generic method for converting any selection
protocol, into another selection protocol where each message is ``short'' while
preserving the same number of rounds, the same output distribution, and the
same resilience to error. Assuming that the output of the protocol lies in some
universe of size $M$, in our resulting protocol each message consists of only
$\mathsf{polylog}(M,n,d)$ many bits, where $n$ is the number of parties and $d$
is the number of rounds. Our transformation works in the presence of either
static or adaptive Byzantine faults.
As a corollary, we conclude that for any $\mathsf{poly}(n)$-round collective
coin-flipping protocol, leader election protocol, or general selection
protocols, messages of length $\mathsf{polylog}(n)$ suffice (in the presence of
either static or adaptive Byzantine faults).
|
[
{
"version": "v1",
"created": "Sun, 31 May 2015 21:00:39 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Aug 2015 10:18:20 GMT"
},
{
"version": "v3",
"created": "Thu, 10 May 2018 19:14:51 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Kalai",
"Yael Tauman",
""
],
[
"Komargodski",
"Ilan",
""
]
] |
new_dataset
| 0.965551 |
1604.05903
|
Nabarun Mondal Mr
|
Nabarun Mondal, Jatin Puri, Mrunal Lohia
|
A declarative Language for Rapid Business Development
|
6 pages
| null | null | null |
cs.SE cs.PL
|
http://creativecommons.org/licenses/by-sa/4.0/
|
The motivation for ZoomBA are domain specific languages (DSL) like VERILOG,
VHDL, Spice. DSL for Software testing is not a new idea, many commercial tools
like Silk Suite use them, while Selenese, the DSL for Selenium IDE [6] is open
source. ZoomBA is a functionally motivated, embeddable, Turing Complete
language. It's philosophy is to expose the existing Java echo system in a
declarative fashion for the purpose of System Integration and software
validation. By design ZoomBA script size is meagre compared to Python or even
to Scala for business automation problems. Bayestree uses ZoomBA for system
integration/adapter/data manipulation purposes.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2016 11:52:11 GMT"
},
{
"version": "v2",
"created": "Sat, 5 May 2018 07:35:30 GMT"
},
{
"version": "v3",
"created": "Fri, 11 May 2018 05:48:10 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Mondal",
"Nabarun",
""
],
[
"Puri",
"Jatin",
""
],
[
"Lohia",
"Mrunal",
""
]
] |
new_dataset
| 0.996162 |
1705.00986
|
Mattia Rebato
|
Mattia Rebato and Jihong Park and Petar Popovski and Elisabeth De
Carvalho and Michele Zorzi
|
Stochastic Geometric Coverage Analysis in mmWave Cellular Networks with
a Realistic Channel Model
|
7 pages, 6 figures, submitted to GLOBECOM 2017
| null |
10.1109/GLOCOM.2017.8254626
| null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Millimeter-wave (mmWave) bands have been attracting growing attention as a
possible candidate for next-generation cellular networks, since the available
spectrum is orders of magnitude larger than in current cellular allocations. To
precisely design mmWave systems, it is important to examine mmWave interference
and SIR coverage under large-scale deployments. For this purpose, we apply an
accurate mmWave channel model, derived from experiments, into an analytical
framework based on stochastic geometry. In this way we obtain a closed-form SIR
coverage probability in large-scale mmWave cellular networks.
|
[
{
"version": "v1",
"created": "Tue, 2 May 2017 14:12:14 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Rebato",
"Mattia",
""
],
[
"Park",
"Jihong",
""
],
[
"Popovski",
"Petar",
""
],
[
"De Carvalho",
"Elisabeth",
""
],
[
"Zorzi",
"Michele",
""
]
] |
new_dataset
| 0.978824 |
1805.03668
|
Lianhui Qin
|
Lianhui Qin, Lemao Liu, Victoria Bi, Yan Wang, Xiaojiang Liu, Zhiting
Hu, Hai Zhao, Shuming Shi
|
Automatic Article Commenting: the Task and Dataset
|
ACL2018; with supplements; Dataset link available in the paper
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Comments of online articles provide extended views and improve user
engagement. Automatically making comments thus become a valuable functionality
for online forums, intelligent chatbots, etc. This paper proposes the new task
of automatic article commenting, and introduces a large-scale Chinese dataset
with millions of real comments and a human-annotated subset characterizing the
comments' varying quality. Incorporating the human bias of comment quality, we
further develop automatic metrics that generalize a broad set of popular
reference-based metrics and exhibit greatly improved correlations with human
evaluations.
|
[
{
"version": "v1",
"created": "Wed, 9 May 2018 18:00:15 GMT"
},
{
"version": "v2",
"created": "Fri, 11 May 2018 00:44:02 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Qin",
"Lianhui",
""
],
[
"Liu",
"Lemao",
""
],
[
"Bi",
"Victoria",
""
],
[
"Wang",
"Yan",
""
],
[
"Liu",
"Xiaojiang",
""
],
[
"Hu",
"Zhiting",
""
],
[
"Zhao",
"Hai",
""
],
[
"Shi",
"Shuming",
""
]
] |
new_dataset
| 0.984832 |
1805.04005
|
Enis Afgan
|
Enis Afgan, Andrew Lonie, James Taylor, Nuwan Goonasekera
|
CloudLaunch: Discover and Deploy Cloud Applications
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cloud computing is a common platform for delivering software to end users.
However, the process of making complex-to-deploy applications available across
different cloud providers requires isolated and uncoordinated
application-specific solutions, often locking-in developers to a particular
cloud provider. Here, we present the CloudLaunch application as a uniform
platform for discovering and deploying applications for different cloud
providers. CloudLaunch allows arbitrary applications to be added to a catalog
with each application having its own customizable user interface and control
over the launch process, while preserving cloud-agnosticism so that authors can
easily make their applications available on multiple clouds with minimal
effort. It then provides a uniform interface for launching available
applications by end users across different cloud providers. Architecture
details are presented along with examples of different deployable applications
that highlight architectural features.
|
[
{
"version": "v1",
"created": "Thu, 10 May 2018 14:34:01 GMT"
},
{
"version": "v2",
"created": "Fri, 11 May 2018 02:19:53 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Afgan",
"Enis",
""
],
[
"Lonie",
"Andrew",
""
],
[
"Taylor",
"James",
""
],
[
"Goonasekera",
"Nuwan",
""
]
] |
new_dataset
| 0.995667 |
1805.04151
|
Andrii Riazanov
|
Venkatesan Guruswami, Andrii Riazanov
|
Beating Fredman-Koml\'{o}s for perfect $k$-hashing
|
19 pages
| null | null | null |
cs.IT cs.DM cs.DS math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We say a subset $C \subseteq \{1,2,\dots,k\}^n$ is a $k$-hash code (also
called $k$-separated) if for every subset of $k$ codewords from $C$, there
exists a coordinate where all these codewords have distinct values.
Understanding the largest possible rate (in bits), defined as $(\log_2 |C|)/n$,
of a $k$-hash code is a classical problem. It arises in two equivalent
contexts: (i) the smallest size possible for a perfect hash family that maps a
universe of $N$ elements into $\{1,2,\dots,k\}$, and (ii) the zero-error
capacity for decoding with lists of size less than $k$ for a certain
combinatorial channel.
A general upper bound of $k!/k^{k-1}$ on the rate of a $k$-hash code (in the
limit of large $n$) was obtained by Fredman and Koml\'{o}s in 1984 for any $k
\geq 4$. While better bounds have been obtained for $k=4$, their original bound
has remained the best known for each $k \ge 5$. In this work, we obtain the
first improvement to the Fredman-Koml\'{o}s bound for every $k \ge 5$. While we
get explicit (numerical) bounds for $k=5,6$, for larger $k$ we only show that
the FK bound can be improved by a positive, but unspecified, amount. Under a
conjecture on the optimum value of a certain polynomial optimization problem
over the simplex, our methods allow an effective bound to be computed for every
$k$.
|
[
{
"version": "v1",
"created": "Thu, 10 May 2018 19:53:55 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Guruswami",
"Venkatesan",
""
],
[
"Riazanov",
"Andrii",
""
]
] |
new_dataset
| 0.995363 |
1805.04265
|
Feng Tian
|
Feng Tian
|
Scripting Relational Database Engine Using Transducer
| null | null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/4.0/
|
We allow database user to script a parallel relational database engine with a
procedural language. Procedural language code is executed as a user defined
relational query operator called transducer. Transducer is tightly integrated
with relation engine, including query optimizer, query executor and can be
executed in parallel like other query operators. With transducer, we can
efficiently execute queries that are very difficult to express in SQL. As
example, we show how to run time series and graph queries, etc, within a
parallel relational database.
|
[
{
"version": "v1",
"created": "Fri, 11 May 2018 07:52:23 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Tian",
"Feng",
""
]
] |
new_dataset
| 0.95106 |
1805.04295
|
Martina Mammarella Miss
|
Martina Mammarella and Elisa Capello
|
A Tube-based Robust MPC for a Fixed-wing UAV: an Application for
Precision Farming
|
6 pages, 7 figures, 1 table
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The techniques of precision agriculture include the possibility to execute
crop monitoring tasks through the application of Unmanned Aerial Vehicles
(UAVs). These platforms are flexible, easy to use and low-cost, and they are
the best candidates for improving the farm efficiency and productivity. In this
research, a guidance algorithm and a robust control system are combined to
guarantee the robustness of the system to additive noise (i.e. wind
disturbance) and uncertainties (i.e. model parameter variations). A small
fixed-wing UAV with an autonomy of about $1$ hour is proposed as case study, to
reduce the cost of monitoring and increasing the stability performance of the
system. A waypoint-grid on a paddy field is verified by hardware-in-the loop
tests. The control scheme provides good results with a low computational
effort, guaranteeing the repeatability of the monitoring and reduction of the
costs.
|
[
{
"version": "v1",
"created": "Fri, 11 May 2018 09:44:07 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Mammarella",
"Martina",
""
],
[
"Capello",
"Elisa",
""
]
] |
new_dataset
| 0.975236 |
1805.04328
|
Zhi Yang
|
Zhi Yang, Lai Zhou, Guangyue Zhao, Shidong Zhou
|
Channel Model in Urban Environment for Unmanned Aerial Vehicle
Communications
|
to prepare in European Conference on Antennas and Propagetion
(EUCAP), 2018
| null | null | null |
cs.IT eess.SP math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to develop and analyze reliable communications links for unmanned
aerial vehicles (UAVs), accurate models for the propagation channel are
required. The radio channel properties in the urban scenario are different from
those in the suburb scenario and open area due to so many scattering paths from
office buildings, especially when the UAV flies in the low altitude. We took
some measurement campaigns on the campus of Tsinghua University with crowded
apartments and office buildings. Based on the measurement result we extract the
main parameters of pathloss model, and propose a simplified Saleh-Valenzuela
(SV) model with specific parameters. The typical scene of central lawn is
compared with the office buildings in the analysis of K-factor and
root-mean-square (RMS) delay spread.
|
[
{
"version": "v1",
"created": "Fri, 11 May 2018 11:24:59 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Yang",
"Zhi",
""
],
[
"Zhou",
"Lai",
""
],
[
"Zhao",
"Guangyue",
""
],
[
"Zhou",
"Shidong",
""
]
] |
new_dataset
| 0.99651 |
1805.04417
|
Parikshit Maini
|
Parikshit Maini, Kaarthik Sundar, Sivakumar Rathinam and PB Sujit
|
Cooperative Planning for Fuel-constrained Aerial Vehicles and
Ground-based Refueling Vehicles for Large-Scale Coverage
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Low cost Unmanned Aerial Vehicles (UAVs) need multiple refuels to accomplish
large area coverage. The number of refueling stations and their placement plays
a vital role in determining coverage efficiency. In this paper, we propose the
use of a ground-based refueling vehicle (RV) to increase the operational range
of a UAV in both spatial and temporal domains. Determining optimal routes for
the UAV and RV, and selecting optimized locations for refueling to aid in
minimizing coverage time is a challenging problem due to different vehicle
speeds, coupling between refueling location placement, and the coverage area at
each location. We develop a two-stage strategy for coupled route planning for
UAV and RV to perform a coverage mission. The first stage computes a minimal
set of refueling sites that permit a feasible UAV route. In the second stage,
multiple Mixed-Integer Linear Programming (MILP) formulations are developed to
plan optimal routes for the UAV and the refueling vehicle taking into account
the feasible set of refueling sites generated in stage one. The performance of
different formulations is compared empirically. In addition, computationally
efficient heuristics are developed to solve the routing problem. Extensive
simulations are conducted to corroborate the effectiveness of proposed
approaches.
|
[
{
"version": "v1",
"created": "Fri, 11 May 2018 14:23:43 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Maini",
"Parikshit",
""
],
[
"Sundar",
"Kaarthik",
""
],
[
"Rathinam",
"Sivakumar",
""
],
[
"Sujit",
"PB",
""
]
] |
new_dataset
| 0.984636 |
1805.04473
|
Mark Santolucito
|
Mark Santolucito, Jialu Zhang, Ennan Zhai, Ruzica Piskac
|
Statically Verifying Continuous Integration Configurations
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Continuous Integration (CI) testing is a popular software development
technique that allows developers to easily check that their code can build
successfully and pass tests across various system environments. In order to use
a CI platform, a developer must include a set of configuration files to a code
repository for specifying build conditions. Incorrect configuration settings
lead to CI build failures, which can take hours to run, wasting valuable
developer time and delaying product release dates. Debugging CI configurations
is challenging because users must manage configurations for the build across
many system environments, to which they may not have local access. Thus, the
only way to check a CI configuration is to push a commit and wait for the build
result. To address this problem, we present the first approach, VeriCI, for
statically checking for errors in a given CI configuration before the developer
pushes a commit to build on the CI server. Our key insight is that the
repositories in a CI environment contain lists of build histories which offer
the time-aware repository build status. Driven by this insight, we introduce
the Misclassification Guided Abstraction Refinement (MiGAR) loop that automates
part of the learning process across the heterogeneous build environments in CI.
We then use decision tree learning to generate constraints on the CI
configuration that must hold for a build to succeed by training on a large
history of continuous integration repository build results. We evaluate VeriCI
on real-world data from GitHub and find that we have 83% accuracy of predicting
a build failure.
|
[
{
"version": "v1",
"created": "Fri, 11 May 2018 16:21:43 GMT"
}
] | 2018-05-14T00:00:00 |
[
[
"Santolucito",
"Mark",
""
],
[
"Zhang",
"Jialu",
""
],
[
"Zhai",
"Ennan",
""
],
[
"Piskac",
"Ruzica",
""
]
] |
new_dataset
| 0.997074 |
1708.03278
|
Xinghao Chen
|
Xinghao Chen, Hengkai Guo, Guijin Wang, Li Zhang
|
Motion Feature Augmented Recurrent Neural Network for Skeleton-based
Dynamic Hand Gesture Recognition
|
Accepted by ICIP 2017
| null |
10.1109/ICIP.2017.8296809
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dynamic hand gesture recognition has attracted increasing interests because
of its importance for human computer interaction. In this paper, we propose a
new motion feature augmented recurrent neural network for skeleton-based
dynamic hand gesture recognition. Finger motion features are extracted to
describe finger movements and global motion features are utilized to represent
the global movement of hand skeleton. These motion features are then fed into a
bidirectional recurrent neural network (RNN) along with the skeleton sequence,
which can augment the motion features for RNN and improve the classification
performance. Experiments demonstrate that our proposed method is effective and
outperforms start-of-the-art methods.
|
[
{
"version": "v1",
"created": "Thu, 10 Aug 2017 16:02:58 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Chen",
"Xinghao",
""
],
[
"Guo",
"Hengkai",
""
],
[
"Wang",
"Guijin",
""
],
[
"Zhang",
"Li",
""
]
] |
new_dataset
| 0.99815 |
1709.06505
|
Sebastian Lutz
|
Rafael Monroy, Sebastian Lutz, Tejo Chalasani, Aljosa Smolic
|
SalNet360: Saliency Maps for omni-directional images with CNN
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The prediction of Visual Attention data from any kind of media is of valuable
use to content creators and used to efficiently drive encoding algorithms. With
the current trend in the Virtual Reality (VR) field, adapting known techniques
to this new kind of media is starting to gain momentum. In this paper, we
present an architectural extension to any Convolutional Neural Network (CNN) to
fine-tune traditional 2D saliency prediction to Omnidirectional Images (ODIs)
in an end-to-end manner. We show that each step in the proposed pipeline works
towards making the generated saliency map more accurate with respect to ground
truth data.
|
[
{
"version": "v1",
"created": "Tue, 19 Sep 2017 16:21:09 GMT"
},
{
"version": "v2",
"created": "Thu, 10 May 2018 09:47:27 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Monroy",
"Rafael",
""
],
[
"Lutz",
"Sebastian",
""
],
[
"Chalasani",
"Tejo",
""
],
[
"Smolic",
"Aljosa",
""
]
] |
new_dataset
| 0.999266 |
1711.06127
|
R\"udiger G\"obl
|
R\"udiger G\"obl, Nassir Navab, Christoph Hennersperger
|
SUPRA: Open Source Software Defined Ultrasound Processing for Real-Time
Applications
|
This is a pre-print of an article published in the International
Journal of Computer Assisted Radiology and Surgery. The final authenticated
version is available online at: https://doi.org/10.1007/s11548-018-1750-6
|
G\"obl, R., Navab, N. & Hennersperger, C. , "SUPRA: Open Source
Software Defined Ultrasound Processing for Real-Time Applications" Int J CARS
(2018)
|
10.1007/s11548-018-1750-6
| null |
cs.CV cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Research in ultrasound imaging is limited in reproducibility by two factors:
First, many existing ultrasound pipelines are protected by intellectual
property, rendering exchange of code difficult. Second, most pipelines are
implemented in special hardware, resulting in limited flexibility of
implemented processing steps on such platforms.
Methods: With SUPRA we propose an open-source pipeline for fully Software
Defined Ultrasound Processing for Real-time Applications to alleviate these
problems. Covering all steps from beamforming to output of B-mode images, SUPRA
can help improve the reproducibility of results and make modifications to the
image acquisition mode accessible to the research community. We evaluate the
pipeline qualitatively, quantitatively, and regarding its run-time.
Results: The pipeline shows image quality comparable to a clinical system and
backed by point-spread function measurements a comparable resolution. Including
all processing stages of a usual ultrasound pipeline, the run-time analysis
shows that it can be executed in 2D and 3D on consumer GPUs in real-time.
Conclusions: Our software ultrasound pipeline opens up the research in image
acquisition. Given access to ultrasound data from early stages (raw channel
data, radiofrequency data) it simplifies the development in imaging.
Furthermore, it tackles the reproducibility of research results, as code can be
shared easily and even be executed without dedicated ultrasound hardware.
|
[
{
"version": "v1",
"created": "Thu, 16 Nov 2017 15:12:35 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Nov 2017 18:04:11 GMT"
},
{
"version": "v3",
"created": "Thu, 10 May 2018 15:45:57 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Göbl",
"Rüdiger",
""
],
[
"Navab",
"Nassir",
""
],
[
"Hennersperger",
"Christoph",
""
]
] |
new_dataset
| 0.998995 |
1804.11275
|
Hadi Mardani Kamali
|
Hadi Mardani Kamali, Kimia Zamiri Azar, Kris Gaj, Houman Homayoun,
Avesta Sasan
|
LUT-Lock: A Novel LUT-based Logic Obfuscation for FPGA-Bitstream and
ASIC-Hardware Protection
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we propose LUT-Lock, a novel Look-Up-Table-based netlist
obfuscation algorithm, for protecting the intellectual property that is mapped
to an FPGA bitstream or an ASIC netlist. We, first, illustrate the
effectiveness of several key features that make the LUT-based obfuscation more
resilient against SAT attacks and then we embed the proposed key features into
our proposed LUT-Lock algorithm. We illustrates that LUT-Lock maximizes the
resiliency of the LUT-based obfuscation against SAT attacks by forcing a near
exponential increase in the execution time of a SAT solver with respect to the
number of obfuscated gates. Hence, by adopting LUT-Lock algorithm, SAT attack
execution time could be made unreasonably long by increasing the number of
utilized LUTs.
|
[
{
"version": "v1",
"created": "Mon, 30 Apr 2018 15:32:19 GMT"
},
{
"version": "v2",
"created": "Thu, 10 May 2018 16:29:59 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Kamali",
"Hadi Mardani",
""
],
[
"Azar",
"Kimia Zamiri",
""
],
[
"Gaj",
"Kris",
""
],
[
"Homayoun",
"Houman",
""
],
[
"Sasan",
"Avesta",
""
]
] |
new_dataset
| 0.992944 |
1805.03648
|
Ryan Kastner
|
Ryan Kastner, Janarbek Matai, and Stephen Neuendorffer
|
Parallel Programming for FPGAs
| null | null | null | null |
cs.AR
|
http://creativecommons.org/licenses/by/4.0/
|
This book focuses on the use of algorithmic high-level synthesis (HLS) to
build application-specific FPGA systems. Our goal is to give the reader an
appreciation of the process of creating an optimized hardware design using HLS.
Although the details are, of necessity, different from parallel programming for
multicore processors or GPUs, many of the fundamental concepts are similar. For
example, designers must understand memory hierarchy and bandwidth, spatial and
temporal locality of reference, parallelism, and tradeoffs between computation
and storage. This book is a practical guide for anyone interested in building
FPGA systems. In a university environment, it is appropriate for advanced
undergraduate and graduate courses. At the same time, it is also useful for
practicing system designers and embedded programmers. The book assumes the
reader has a working knowledge of C/C++ and includes a significant amount of
sample code. In addition, we assume familiarity with basic computer
architecture concepts (pipelining, speedup, Amdahl's Law, etc.). A knowledge of
the RTL-based FPGA design flow is helpful, although not required.
|
[
{
"version": "v1",
"created": "Wed, 9 May 2018 17:26:28 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Kastner",
"Ryan",
""
],
[
"Matai",
"Janarbek",
""
],
[
"Neuendorffer",
"Stephen",
""
]
] |
new_dataset
| 0.986214 |
1805.03720
|
Matthew Guzdial
|
Matthew Guzdial, Nicholas Liao, Vishwa Shah, and Mark O. Riedl
|
Creative Invention Benchmark
|
8 pages, 4 figures, International Conference on Computational
Creativity
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present the Creative Invention Benchmark (CrIB), a
2000-problem benchmark for evaluating a particular facet of computational
creativity. Specifically, we address combinational p-creativity, the creativity
at play when someone combines existing knowledge to achieve a solution novel to
that individual. We present generation strategies for the five problem
categories of the benchmark and a set of initial baselines.
|
[
{
"version": "v1",
"created": "Wed, 9 May 2018 20:20:41 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Guzdial",
"Matthew",
""
],
[
"Liao",
"Nicholas",
""
],
[
"Shah",
"Vishwa",
""
],
[
"Riedl",
"Mark O.",
""
]
] |
new_dataset
| 0.999606 |
1805.03755
|
Karen L. Karavanic
|
Brian Delgado and Karen L. Karavanic
|
EPA-RIMM: A Framework for Dynamic SMM-based Runtime Integrity
Measurement
|
13 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Runtime integrity measurements identify unexpected changes in operating
systems and hypervisors during operation, enabling early detection of
persistent threats. System Management Mode, a privileged x86 CPU mode, has the
potential to effectively perform such rootkit detection. Previously proposed
SMM-based approaches demonstrated effective detection capabilities, but at a
cost of performance degradation and software side effects. In this paper we
introduce our solution to these problems, an SMM-based Extensible, Performance
Aware Runtime Integrity Measurement Mechanism called EPA-RIMM. The EPA-RIMM
architecture features a performance-sensitive design that decomposes large
integrity measurements and schedules them to control perturbation and side
effects. EPA-RIMM's decomposition of long-running measurements into shorter
tasks, extensibility, and use of SMM complicates the efforts of malicious code
to detect or avoid the integrity measurements. Using a Minnowboard-based
prototype, we demonstrate its detection capabilities and performance impacts.
Early results are promising, and suggest that EPA-RIMM will meet
production-level performance constraints while continuously monitoring key OS
and hypervisor data structures for signs of attack.
|
[
{
"version": "v1",
"created": "Wed, 9 May 2018 23:26:46 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Delgado",
"Brian",
""
],
[
"Karavanic",
"Karen L.",
""
]
] |
new_dataset
| 0.994291 |
1805.03774
|
Fan Bu
|
Fan Bu
|
The Evolution of Popularity and Images of Characters in Marvel Cinematic
Universe Fanfictions
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This analysis proposes a new topic model to study the yearly trends in Marvel
Cinematic Universe fanfictions on three levels: character popularity, character
images/topics, and vocabulary pattern of topics. It is found that character
appearances in fanfictions have become more diverse over the years thanks to
constant introduction of new characters in feature films, and in the case of
Captain America, multi-dimensional character development is well-received by
the fanfiction world.
|
[
{
"version": "v1",
"created": "Thu, 10 May 2018 01:27:58 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Bu",
"Fan",
""
]
] |
new_dataset
| 0.995803 |
1805.03815
|
Yundi Wu
|
Yundi Wu, Jie Xu, and Ling Qiu
|
UAV-Enabled Wireless Power Transfer with Directional Antenna: A Two-User
Case
|
6 pages, 3 figures, conference
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers an unmanned aerial vehicle (UAV)-enabled wireless power
transfer (WPT) system, in which a UAV equipped with a directional antenna is
dispatched to deliver wireless energy to charge two energy receivers (ERs) on
the ground. Under this setup, we maximize the common (or minimum) energy
received by the two ERs over a particular finite charging period, by jointly
optimizing the altitude, trajectory, and transmit beamwidth of the UAV, subject
to the UAV's maximum speed constraints, as well as the maximum/minimum altitude
and beamwidth constraints. However, the common energy maximization is a
non-convex optimization problem that is generally difficult to be solved
optimally. To tackle this problem, we first ignore the maximum UAV speed
constraints and solve the relaxed problem optimally. The optimal solution to
the relaxed problem reveals that the UAV should hover above two symmetric
locations during the whole charging period, with the corresponding altitude and
beamwidth optimized. Next, we study the original problem with the maximum UAV
speed constraints considered, for which a heuristic hover-fly-hover trajectory
design is proposed based on the optimal symmetric-location-hovering solution to
the relaxed problem. Numerical results validate that thanks to the employment
of directional antenna with adaptive beamwidth and altitude control, our
proposed design significantly improves the common energy received by the two
ERs, as compared to other benchmark schemes.
|
[
{
"version": "v1",
"created": "Thu, 10 May 2018 04:42:27 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Wu",
"Yundi",
""
],
[
"Xu",
"Jie",
""
],
[
"Qiu",
"Ling",
""
]
] |
new_dataset
| 0.99786 |
1805.03897
|
Biel Moy\`a
|
Gabriel Moy\`a, Antoni Jaume-i-Cap\'o and Javier Varona
|
Dealing with sequences in the RGBDT space
|
4 pages CVPR'18 Workshop: Brave New Ideas for Video Understanding
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Most of the current research in computer vision is focused on working with
single images without taking in account temporal information. We present a
probabilistic non-parametric model that mixes multiple information cues from
devices to segment regions that contain moving objects in image sequences. We
prepared an experimental setup to show the importance of using previous
information for obtaining an accurate segmentation result, using a novel
dataset that provides sequences in the RGBDT space. We label the detected
regions ts with a state-of-the-art human detector. Each one of the detected
regions is at least marked as human once.
|
[
{
"version": "v1",
"created": "Thu, 10 May 2018 09:02:30 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Moyà",
"Gabriel",
""
],
[
"Jaume-i-Capó",
"Antoni",
""
],
[
"Varona",
"Javier",
""
]
] |
new_dataset
| 0.999286 |
1805.03979
|
Morteza Varasteh
|
Morteza Varasteh, Borzoo Rassouli, Hamdi Joudeh and Bruno Clerckx
|
SWIPT Signalling over Complex AWGN Channels with Two Nonlinear Energy
Harvester Models
|
Accepted for publication. arXiv admin note: substantial text overlap
with arXiv:1712.01226
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Simultaneous Wireless Information and Power Transfer (SWIPT) is subject to
nonlinearity at the energy harvester that leads to significant changes to
transmit signal designs compared to conventional wireless communications. In
this paper, the capacity of a discrete time, memoryless and complex Additive
White Gaussian Noise (AWGN) channel in the presence of a nonlinear energy
harvester at the receiver is studied. Considering the two common nonlinear
energy harvester models introduced in the literature, two sets of constraints
are considered. First the capacity is studied under average power (AP), peak
amplitude (PA) and receiver delivery power (RDP) constraints. The RDP
constraint is modelled as a linear combination of even-moment statistics of the
channel input being larger than a threshold. It is shown that the capacity of
an AWGN channel under AP and RDP constraints is the same as the capacity of an
AWGN channel under an AP constraint, however, depending on the two constraints,
it can be either achieved or arbitrarily approached. It is also shown that
under AP, PA and RDP constraints, the amplitude of the optimal inputs is
discrete with a finite number of mass points. Next, the capacity is studied
under AP, PA and output outage probability (OOP) constraints. OOP is modelled
as satisfying a certain probability inequality for the amplitude of the
received signal being outside of a given interval. Similarly, it is shown that
the amplitude of the optimal input is discrete with a finite number of mass
points.
|
[
{
"version": "v1",
"created": "Wed, 9 May 2018 10:09:38 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Varasteh",
"Morteza",
""
],
[
"Rassouli",
"Borzoo",
""
],
[
"Joudeh",
"Hamdi",
""
],
[
"Clerckx",
"Bruno",
""
]
] |
new_dataset
| 0.973227 |
1805.03988
|
Min Liu
|
Min Liu and Tobi Delbruck
|
ABMOF: A Novel Optical Flow Algorithm for Dynamic Vision Sensors
|
11 pages, 10 figures, Video of result: https://youtu.be/Ss-MciioqTk
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dynamic Vision Sensors (DVS), which output asynchronous log intensity change
events, have potential applications in high-speed robotics, autonomous cars and
drones. The precise event timing, sparse output, and wide dynamic range of the
events are well suited for optical flow, but conventional optical flow (OF)
algorithms are not well matched to the event stream data. This paper proposes
an event-driven OF algorithm called adaptive block-matching optical flow
(ABMOF). ABMOF uses time slices of accumulated DVS events. The time slices are
adaptively rotated based on the input events and OF results. Compared with
other methods such as gradient-based OF, ABMOF can efficiently be implemented
in compact logic circuits. Results show that ABMOF achieves comparable accuracy
to conventional standards such as Lucas-Kanade (LK). The main contributions of
our paper are new adaptive time-slice rotation methods that ensure the
generated slices have sufficient features for matching,including a feedback
mechanism that controls the generated slices to have average slice displacement
within the block search range. An LK method using our adapted slices is also
implemented. The ABMOF accuracy is compared with this LK method on natural
scene data including sparse and dense texture, high dynamic range, and fast
motion exceeding 30,000 pixels per second.The paper dataset and source code are
available from http://sensors.ini.uzh.ch/databases.html.
|
[
{
"version": "v1",
"created": "Thu, 10 May 2018 14:07:31 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Liu",
"Min",
""
],
[
"Delbruck",
"Tobi",
""
]
] |
new_dataset
| 0.991672 |
1805.04003
|
Stefano Crespi Reghizzi
|
Stefano Crespi Reghizzi and Pierluigi San Pietro
|
Non-erasing Chomsky-Sch{\"u}tzenberger theorem with grammar-independent
alphabet
|
27 pages. Early versions of parts of this work have been presented at
the LATA 2016 Conf. and at the Conf. dedicated to the scientific legacy of
M.P. Sch\"utzenberger, 2017
| null | null | null |
cs.FL
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
The famous theorem by Chomsky and Sch\"utzenberger (CST) says that every
context-free language $L$ over an alphabet $\Sigma$ is representable as $h(D
\cap R)$, where $D$ is a Dyck language over a set $\Omega$ of brackets, $R$ is
a local language and $h$ is an alphabetic homomorphism that erases unboundedly
many symbols. Berstel found that the number of erasures can be linearly limited
if the grammar is in Greibach normal form; Berstel and Boasson (and later,
independently, Okhotin) proved a non-erasing variant of CST for grammars in
Double Greibach Normal Form. In all these CST statements, however, the size of
the Dyck alphabet $\Omega$ depends on the grammar size for $L$. In the Stanley
variant of the CST, $|\Omega|$ only depends on $|\Sigma|$ and not on the
grammar, but the homomorphism erases many more symbols than in the other
versions of CST; also, the regular language $R$ is strictly locally testable
but not local. We prove a new version of CST which combines both features of
being non-erasing and of using a grammar-independent alphabet. In our
construction, $|\Omega|$ is polynomial in $|\Sigma|$, namely
$O(|\Sigma|^{46})$, and the regular language $R$ is strictly locally testable.
Using a recent generalization of Medvedev's homomorphic characterization of
regular languages, we prove that the degree in the polynomial dependence of
$|\Omega|$ on $|\Sigma|$ may be reduced to just 2 in the case of linear
grammars in Double Greibach Normal Form.
|
[
{
"version": "v1",
"created": "Thu, 10 May 2018 14:33:02 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Reghizzi",
"Stefano Crespi",
""
],
[
"Pietro",
"Pierluigi San",
""
]
] |
new_dataset
| 0.98737 |
1805.04058
|
Julian Dolby
|
Julian Dolby, Avraham Shinnar, Allison Allain, Jenna Reinen
|
Ariadne: Analysis for Machine Learning Program
| null | null |
10.1145/3211346.3211349
| null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Machine learning has transformed domains like vision and translation, and is
now increasingly used in science, where the correctness of such code is vital.
Python is popular for machine learning, in part because of its wealth of
machine learning libraries, and is felt to make development faster; however,
this dynamic language has less support for error detection at code creation
time than tools like Eclipse. This is especially problematic for machine
learning: given its statistical nature, code with subtle errors may run and
produce results that look plausible but are meaningless. This can vitiate
scientific results. We report on Ariadne: applying a static framework, WALA, to
machine learning code that uses TensorFlow. We have created static analysis for
Python, a type system for tracking tensors---Tensorflow's core data
structures---and a data flow analysis to track their usage. We report on how it
was built and present some early results.
|
[
{
"version": "v1",
"created": "Thu, 10 May 2018 16:51:40 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Dolby",
"Julian",
""
],
[
"Shinnar",
"Avraham",
""
],
[
"Allain",
"Allison",
""
],
[
"Reinen",
"Jenna",
""
]
] |
new_dataset
| 0.997804 |
1805.04074
|
Sirisha Chimata
|
A. Nagalakshmi, Ch. Sirisha, Dr. D.N. Madhusudana Rao
|
Hybrid CMOS-CNFET based NP dynamic Carry Look Ahead Adder
|
6 pages, 1 figure, 6 tables, Based on Master's thesis project
(2014-16) carried by A. Nagalakshmi
| null | null | null |
cs.ET cs.AR physics.app-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Advanced electronic device technologies require a faster operation and
smaller average power consumption, which are the most important parameters in
very large scale integrated circuit design. The conventional Complementary
Metal-Oxide Semiconductor (CMOS) technology is limited by the threshold voltage
and subthreshold leakage problems in scaling of devices. This leads to failure
in adapting it to sub-micron and nanotechnologies. The carbon nanotube (CNT)
technology overcomes the threshold voltage and subthreshold leakage problems
despite reduction in size. The CNT based technology develops the most promising
devices among emerging technologies because it has most of the desired
features. Carbon Nanotube Field Effect Transistors (CNFETs) are the novel
devices that are expected to sustain the transistor scalability while
increasing its performance. Recently, there have been tremendous advances in
CNT technology for nanoelectronics applications. CNFETs avoid most of the
fundamental limitations and offer several advantages compared to silicon-based
technology. Though CNT evolves as a better option to overcome some of the bulk
CMOS problems, the CNT itself still immersed with setbacks. The fabrication of
carbon nanotube at very large digital circuits on a single substrate is
difficult to achieve. Therefore, a hybrid NP dynamic Carry Look Ahead Adder
(CLA) is designed using p-CNFET and n-MOS transistors. Here, the performance of
CLA is evaluated in 8-bit, 16-bit, 32-bit and 64-bit stages with the following
four different implementations: silicon MOSFET (Si-MOSFET) domino logic,
Si-MOSFET NP dynamic CMOS, carbon nanotube MOSFET (CN-MOSFET) domino logic, and
CN-MOSFET NP dynamic CMOS. Finally, a Hybrid CMOS-CNFET based 64-bit NP dynamic
CLA is evaluated based on HSPICE simulation in 32nm technology, which
effectively suppresses power dissipation without an increase in propagation
delay.
|
[
{
"version": "v1",
"created": "Thu, 10 May 2018 17:27:16 GMT"
}
] | 2018-05-11T00:00:00 |
[
[
"Nagalakshmi",
"A.",
""
],
[
"Sirisha",
"Ch.",
""
],
[
"Rao",
"Dr. D. N. Madhusudana",
""
]
] |
new_dataset
| 0.997024 |
1710.03626
|
George MacCartney Jr
|
George R. MacCartney Jr. and Theodore S. Rappaport and Amitava Ghosh
|
Base Station Diversity Propagation Measurements at 73 GHz
Millimeter-Wave for 5G Coordinated Multipoint (CoMP) Analysis
|
to be published in 2017 IEEE Global Communications Workshops (GC
Wkshps), Singapore, Dec. 2017
|
2017 IEEE Globecom Workshops (GC Wkshps)
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes wideband (1 GHz) base station diversity and coordinated
multipoint (CoMP)-style large-scale measurements at 73 GHz in an urban
microcell open square scenario in downtown Brooklyn, New York on the NYU
campus. The measurements consisted of ten random receiver locations at
pedestrian level (1.4 meters) and ten random transmitter locations at lamppost
level (4.0 meters) that provided 36 individual transmitter-receiver (TX-RX)
combinations. For each of the 36 radio links, extensive directional
measurements were made to give insights into small-cell base station diversity
at millimeter-wave (mmWave) bands. High-gain steerable horn antennas with
7-degree and 15-degree half-power beamwidths (HPBW) were used at the
transmitter (TX) and receiver (RX), respectively. For each TX-RX combination,
the TX antenna was scanned over a 120-degree sector and the RX antenna was
scanned over the entire azimuth plane at the strongest RX elevation plane and
two other elevation planes on both sides of the strongest elevation angle,
separated by the 15-degree HPBW. Directional and omnidirectional path loss
models were derived and match well with the literature. Signal reception
probabilities derived from the measurements for one to five base stations that
served a single RX location show significant coverage improvement over all
potential beamformed RX antenna pointing angles. CDFs for nearest neighbor and
Best-N omnidirectional path loss and cell outage probabilities for directional
antennas provide insights into coverage and interference for future mmWave
small-cells that will exploit macro-diversity and CoMP.
|
[
{
"version": "v1",
"created": "Tue, 10 Oct 2017 14:38:48 GMT"
}
] | 2018-05-10T00:00:00 |
[
[
"MacCartney",
"George R.",
"Jr."
],
[
"Rappaport",
"Theodore S.",
""
],
[
"Ghosh",
"Amitava",
""
]
] |
new_dataset
| 0.997309 |
1711.05219
|
Imtiaz Parvez
|
Imtiaz Parvez, Tanwir Khan, Arif Sarwat, Zakaria Parvez
|
LAA LTE and WiFi based Smart Grid Metering Infrastructure in 3.5 GHz
Band
|
Accepted in IEEE R10HTC conference
|
IEEE Region 10 Humanitarian Technology Conference (R10-HTC),
Dhaka, 2017, pp. 151-155
|
10.1109/R10-HTC.2017.8288927
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Advanced metering infrastructure (AMI) of smart grid requires bidirectional
communication for transferring data to billing center, for which WiFi is an
attractive choice. However, WiFi operates in the unlicensed bands and LTE needs
to offload data in the same unlicensed band. Recent release of 3.5 GHz (also
termed as citizen broadband radio service (CBRS)) can be an attractive shared
band where LTE and WiFi can coexist. In our study, we propose a fixed duty
cycled LTE-U and WiFi based smart grid metering infrastructure where smart
meter uses WiFi and data collector (termed as Access Point (AP)) of smart
meters uses LTE for transferring data. We investigate the coexistence
performance of LTE-WiFi in the 3.5 GHz band using a time division duplexing
(TDD) LTE confederated by WiFi along with FTP traffic model for system level
simulation. The simulation results demonstrate a good neighboring coexistence
between LTE and WiFi resulting a candidate AMI architecture for smart grid in
the 3.5 GHz band.
|
[
{
"version": "v1",
"created": "Tue, 14 Nov 2017 17:33:19 GMT"
}
] | 2018-05-10T00:00:00 |
[
[
"Parvez",
"Imtiaz",
""
],
[
"Khan",
"Tanwir",
""
],
[
"Sarwat",
"Arif",
""
],
[
"Parvez",
"Zakaria",
""
]
] |
new_dataset
| 0.999078 |
1712.02053
|
Chenyang Xia
|
ChenYang Xia and YouZhe Fan and Ji Chen and Chi-Ying Tsui
|
On Path Memory in List Successive Cancellation Decoder of Polar Codes
|
5 pages, 6 figures, 2 tables
| null |
10.1109/ISCAS.2018.8351462
| null |
cs.IT cs.AR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Polar code is a breakthrough in coding theory. Using list successive
cancellation decoding with large list size L, polar codes can achieve excellent
error correction performance. The L partial decoded vectors are stored in the
path memory and updated according to the results of list management. In the
state-of-the-art designs, the memories are implemented with registers and a
large crossbar is used for copying the partial decoded vectors from one block
of memory to another during the update. The architectures are quite area-costly
when the code length and list size are large. To solve this problem, we propose
two optimization schemes for the path memory in this work. First, a folded path
memory architecture is presented to reduce the area cost. Second, we show a
scheme that the path memory can be totally removed from the architecture.
Experimental results show that these schemes effectively reduce the area of
path memory.
|
[
{
"version": "v1",
"created": "Wed, 6 Dec 2017 06:18:30 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Dec 2017 13:00:37 GMT"
}
] | 2018-05-10T00:00:00 |
[
[
"Xia",
"ChenYang",
""
],
[
"Fan",
"YouZhe",
""
],
[
"Chen",
"Ji",
""
],
[
"Tsui",
"Chi-Ying",
""
]
] |
new_dataset
| 0.998332 |
1802.07869
|
Srikrishna Karanam
|
Georgios Georgakis and Srikrishna Karanam and Ziyan Wu and Jan Ernst
and Jana Kosecka
|
End-to-end learning of keypoint detector and descriptor for pose
invariant 3D matching
|
9 pages, 9 figures, 3 tables, CVPR 2018
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Finding correspondences between images or 3D scans is at the heart of many
computer vision and image retrieval applications and is often enabled by
matching local keypoint descriptors. Various learning approaches have been
applied in the past to different stages of the matching pipeline, considering
detector, descriptor, or metric learning objectives. These objectives were
typically addressed separately and most previous work has focused on image
data. This paper proposes an end-to-end learning framework for keypoint
detection and its representation (descriptor) for 3D depth maps or 3D scans,
where the two can be jointly optimized towards task-specific objectives without
a need for separate annotations. We employ a Siamese architecture augmented by
a sampling layer and a novel score loss function which in turn affects the
selection of region proposals. The positive and negative examples are obtained
automatically by sampling corresponding region proposals based on their
consistency with known 3D pose labels. Matching experiments with depth data on
multiple benchmark datasets demonstrate the efficacy of the proposed approach,
showing significant improvements over state-of-the-art methods.
|
[
{
"version": "v1",
"created": "Thu, 22 Feb 2018 01:58:43 GMT"
},
{
"version": "v2",
"created": "Wed, 9 May 2018 15:00:23 GMT"
}
] | 2018-05-10T00:00:00 |
[
[
"Georgakis",
"Georgios",
""
],
[
"Karanam",
"Srikrishna",
""
],
[
"Wu",
"Ziyan",
""
],
[
"Ernst",
"Jan",
""
],
[
"Kosecka",
"Jana",
""
]
] |
new_dataset
| 0.987628 |
1805.03351
|
Konstantinos Georgiou
|
Konstantinos Georgiou, Jay Griffiths, Yuval Yakubov
|
Symmetric Rendezvous With Advice: How to Rendezvous in a Disk
|
29 pages, 6 figures
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the classic Symmetric Rendezvous problem on a Line (SRL), two robots at
known distance 2 but unknown direction execute the same randomized algorithm
trying to minimize the expected rendezvous time. A long standing conjecture is
that the best possible rendezvous time is 4.25 with known upper and lower
bounds being very close to that value. We introduce and study a geometric
variation of SRL that we call Symmetric Rendezvous in a Disk (SRD) where two
robots at distance 2 have a common reference point at distance $\rho$. We show
that even when $\rho$ is not too small, the two robots can meet in expected
time that is less than $4.25$. Part of our contribution is that we demonstrate
how to adjust known, even simple and provably non-optimal, algorithms for SRL,
effectively improving their performance in the presence of a reference point.
Special to our algorithms for SRD is that, unlike in SRL, for every fixed
$\rho$ the worst case distance traveled, i.e. energy that is used, in our
algorithms is finite. In particular, we show that the energy of our algorithms
is $O\left(\rho^2\right)$, while we also explore time-energy tradeoffs,
concluding that one may be efficient both with respect to time and energy, with
only a minor compromise on the optimal termination time.
|
[
{
"version": "v1",
"created": "Wed, 9 May 2018 02:13:35 GMT"
}
] | 2018-05-10T00:00:00 |
[
[
"Georgiou",
"Konstantinos",
""
],
[
"Griffiths",
"Jay",
""
],
[
"Yakubov",
"Yuval",
""
]
] |
new_dataset
| 0.999641 |
1805.03502
|
Rachata Ausavarungnirun
|
Vivek Seshadri, Yoongu Kim, Chris Fallin, Donghyuk Lee, Rachata
Ausavarungnirun, Gennady Pekhimenko, Yixin Luo, Onur Mutlu, Phillip B.
Gibbons, Michael A. Kozuch, Todd C. Mowry
|
RowClone: Accelerating Data Movement and Initialization Using DRAM
|
arXiv admin note: text overlap with arXiv:1605.06483
| null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In existing systems, to perform any bulk data movement operation (copy or
initialization), the data has to first be read into the on-chip processor, all
the way into the L1 cache, and the result of the operation must be written back
to main memory. This is despite the fact that these operations do not involve
any actual computation. RowClone exploits the organization and operation of
commodity DRAM to perform these operations completely inside DRAM using two
mechanisms. The first mechanism, Fast Parallel Mode, copies data between two
rows inside the same DRAM subarray by issuing back-to-back activate commands to
the source and the destination row. The second mechanism, Pipelined Serial
Mode, transfers cache lines between two banks using the shared internal bus.
RowClone significantly reduces the raw latency and energy consumption of bulk
data copy and initialization. This reduction directly translates to improvement
in performance and energy efficiency of systems running copy or
initialization-intensive workloads
|
[
{
"version": "v1",
"created": "Mon, 7 May 2018 18:54:58 GMT"
}
] | 2018-05-10T00:00:00 |
[
[
"Seshadri",
"Vivek",
""
],
[
"Kim",
"Yoongu",
""
],
[
"Fallin",
"Chris",
""
],
[
"Lee",
"Donghyuk",
""
],
[
"Ausavarungnirun",
"Rachata",
""
],
[
"Pekhimenko",
"Gennady",
""
],
[
"Luo",
"Yixin",
""
],
[
"Mutlu",
"Onur",
""
],
[
"Gibbons",
"Phillip B.",
""
],
[
"Kozuch",
"Michael A.",
""
],
[
"Mowry",
"Todd C.",
""
]
] |
new_dataset
| 0.998332 |
1805.03563
|
Dominique Vaufreydaz
|
Eleonore Ferrier-Barbut (Chroma), Dominique Vaufreydaz (Pervasive),
Jean-Alix David (Chroma), J\'er\^ome Lussereau (Chroma), Anne Spalanzani
(Chroma)
|
Personal space of autonomous car's passengers sitting in the driver's
seat
| null |
The 2018 IEEE Intelligent Vehicles Symposium (IV'18), Jun 2018,
Changshu, Suzhou, China
| null | null |
cs.HC cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article deals with the specific context of an autonomous car navigating
in an urban center within a shared space between pedestrians and cars. The
driver delegates the control to the autonomous system while remaining seated in
the driver's seat. The proposed study aims at giving a first insight into the
definition of human perception of space applied to vehicles by testing the
existence of a personal space around the car.It aims at measuring proxemic
information about the driver's comfort zone in such conditions.Proxemics, or
human perception of space, has been largely explored when applied to humans or
to robots, leading to the concept of personal space, but poorly when applied to
vehicles. In this article, we highlight the existence and the characteristics
of a zone of comfort around the car which is not correlated to the risk of a
collision between the car and other road users. Our experiment includes 19
volunteers using a virtual reality headset to look at 30 scenarios filmed in
360{\textdegree} from the point of view of a passenger sitting in the driver's
seat of an autonomous car.They were asked to say "stop" when they felt
discomfort visualizing the scenarios.As said, the scenarios voluntarily avoid
collision effect as we do not want to measure fear but discomfort.The scenarios
involve one or three pedestrians walking past the car at different distances
from the wings of the car, relative to the direction of motion of the car, on
both sides. The car is either static or moving straight forward at different
speeds.The results indicate the existence of a comfort zone around the car in
which intrusion causes discomfort.The size of the comfort zone is sensitive
neither to the side of the car where the pedestrian passes nor to the number of
pedestrians. In contrast, the feeling of discomfort is relative to the car's
motion (static or moving).Another outcome from this study is an illustration of
the usage of first person 360{\textdegree} video and a virtual reality headset
to evaluate feelings of a passenger within an autonomous car.
|
[
{
"version": "v1",
"created": "Wed, 9 May 2018 14:46:40 GMT"
}
] | 2018-05-10T00:00:00 |
[
[
"Ferrier-Barbut",
"Eleonore",
"",
"Chroma"
],
[
"Vaufreydaz",
"Dominique",
"",
"Pervasive"
],
[
"David",
"Jean-Alix",
"",
"Chroma"
],
[
"Lussereau",
"Jérôme",
"",
"Chroma"
],
[
"Spalanzani",
"Anne",
"",
"Chroma"
]
] |
new_dataset
| 0.998392 |
1704.03851
|
Petr Vabishchevich N.
|
Petr N. Vabishchevich
|
Numerical solution of time-dependent problems with fractional power
elliptic operator
|
25 pages, 13 figures, 6 tables. arXiv admin note: text overlap with
arXiv:1510.08297, arXiv:1412.5706
| null |
10.1134/S0965542518030120
| null |
cs.NA math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An unsteady problem is considered for a space-fractional equation in a
bounded domain. A first-order evolutionary equation involves a fractional power
of an elliptic operator of second order. Finite element approximation in space
is employed. To construct approximation in time, standard two-level schemes are
used. The approximate solution at a new time-level is obtained as a solution of
a discrete problem with the fractional power of the elliptic operator. A
Pade-type approximation is constructed on the basis of special quadrature
formulas for an integral representation of the fractional power elliptic
operator using explicit schemes. A similar approach is applied in the numerical
implementation of implicit schemes. The results of numerical experiments are
presented for a test two-dimensional problem.
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2017 17:35:34 GMT"
}
] | 2018-05-09T00:00:00 |
[
[
"Vabishchevich",
"Petr N.",
""
]
] |
new_dataset
| 0.991595 |
1706.06438
|
Liang Liu
|
Liang Liu and Wei Yu
|
Massive Connectivity with Massive MIMO-Part I: Device Activity Detection
and Channel Estimation
|
This paper is accepted and to be published in the IEEE Transactions
on Signal Processing
| null |
10.1109/TSP.2018.2818082
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This two-part paper considers an uplink massive device communication scenario
in which a large number of devices are connected to a base-station (BS), but
user traffic is sporadic so that in any given coherence interval, only a subset
of users are active. The objective is to quantify the cost of active user
detection and channel estimation and to characterize the overall achievable
rate of a grant-free two-phase access scheme in which device activity detection
and channel estimation are performed jointly using pilot sequences in the first
phase and data is transmitted in the second phase. In order to accommodate a
large number of simultaneously transmitting devices, this paper studies an
asymptotic regime where the BS is equipped with a massive number of antennas.
The main contributions of Part I of this paper are as follows. First, we note
that as a consequence of having a large pool of potentially active devices but
limited coherence time, the pilot sequences cannot all be orthogonal. However,
despite the non-orthogonality, this paper shows that in the asymptotic massive
multiple-input multiple-output (MIMO) regime, both the missed device detection
and the false alarm probabilities for activity detection can always be made to
go to zero by utilizing compressed sensing techniques that exploit sparsity in
the user activity pattern. Part II of this paper further characterizes the
achievable rates using the proposed scheme and quantifies the cost of using
non-orthogonal pilot sequences for channel estimation in achievable rates.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2017 13:52:35 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Mar 2018 03:39:28 GMT"
}
] | 2018-05-09T00:00:00 |
[
[
"Liu",
"Liang",
""
],
[
"Yu",
"Wei",
""
]
] |
new_dataset
| 0.972656 |
1707.02887
|
Sha Hu
|
Sha Hu, Fredrik Rusek, and Ove Edfors
|
Beyond Massive-MIMO: The Potential of Data-Transmission with Large
Intelligent Surfaces
|
Submitted to IEEE Trans. on Signal Process., 30 pages, 12 figures
| null |
10.1109/TSP.2018.2816577
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider the potential of data-transmission in a system
with a massive number of radiating and sensing elements, thought of as a
contiguous surface of electromagnetically active material. We refer to this as
a large intelligent surface (LIS). The "LIS" is a newly proposed concept, which
conceptually goes beyond contemporary massive MIMO technology, that arises from
our vision of a future where man-made structures are electronically active with
integrated electronics and wireless communication making the entire environment
"intelligent".
We consider capacities of single-antenna autonomous terminals communicating
to the LIS where the entire surface is used as a receiving antenna array. Under
the condition that the surface-area is sufficiently large, the received signal
after a matched-filtering (MF) operation can be closely approximated by a
sinc-function-like intersymbol interference (ISI) channel. We analyze the
capacity per square meter (m^2) deployed surface, \hat{C}, that is achievable
for a fixed transmit power per volume-unit, \hat{P}. Moreover, we also show
that the number of independent signal dimensions per m deployed surface is
2/\lambda for one-dimensional terminal-deployment, and \pi/\lambda^2 per m^2
for two and three dimensional terminal-deployments. Lastly, we consider
implementations of the LIS in the form of a grid of conventional antenna
elements and show that, the sampling lattice that minimizes the surface-area of
the LIS and simultaneously obtains one signal space dimension for every spent
antenna is the hexagonal lattice. We extensively discuss the design of the
state-of-the-art low-complexity channel shortening (CS) demodulator for
data-transmission with the LIS.
|
[
{
"version": "v1",
"created": "Mon, 10 Jul 2017 14:43:47 GMT"
}
] | 2018-05-09T00:00:00 |
[
[
"Hu",
"Sha",
""
],
[
"Rusek",
"Fredrik",
""
],
[
"Edfors",
"Ove",
""
]
] |
new_dataset
| 0.984397 |
1707.06865
|
Behdad Dashtbozorg
|
Behdad Dashtbozorg, Jiong Zhang, and Bart M. ter Haar Romeny
|
Retinal Microaneurysms Detection using Local Convergence Index Features
| null | null |
10.1109/TIP.2018.2815345
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Retinal microaneurysms are the earliest clinical sign of diabetic retinopathy
disease. Detection of microaneurysms is crucial for the early diagnosis of
diabetic retinopathy and prevention of blindness. In this paper, a novel and
reliable method for automatic detection of microaneurysms in retinal images is
proposed. In the first stage of the proposed method, several preliminary
microaneurysm candidates are extracted using a gradient weighting technique and
an iterative thresholding approach. In the next stage, in addition to intensity
and shape descriptors, a new set of features based on local convergence index
filters is extracted for each candidate. Finally, the collective set of
features is fed to a hybrid sampling/boosting classifier to discriminate the
MAs from non-MAs candidates. The method is evaluated on images with different
resolutions and modalities (RGB and SLO) using five publicly available datasets
including the Retinopathy Online Challenge's dataset. The proposed method
achieves an average sensitivity score of 0.471 on the ROC dataset outperforming
state-of-the-art approaches in an extensive comparison. The experimental
results on the other four datasets demonstrate the effectiveness and robustness
of the proposed microaneurysms detection method regardless of different image
resolutions and modalities.
|
[
{
"version": "v1",
"created": "Fri, 21 Jul 2017 12:30:12 GMT"
}
] | 2018-05-09T00:00:00 |
[
[
"Dashtbozorg",
"Behdad",
""
],
[
"Zhang",
"Jiong",
""
],
[
"Romeny",
"Bart M. ter Haar",
""
]
] |
new_dataset
| 0.98807 |
1707.08216
|
Imtiaz Parvez
|
Imtiaz Parvez, Arif I. Sarwat, Jonathan Pinto, Zakaria Parvez,
Mohammad Aqib Khandaker
|
A Gossip Algorithm based Clock Synchronization Scheme for Smart Grid
Applications
| null |
2017 North American Power Symposium (NAPS), Morgantown, WV, 2017,
pp. 1-6
|
10.1109/NAPS.2017.8107405
| null |
cs.SY cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The uprising interest in multi-agent based networked system, and the numerous
number of applications in the distributed control of the smart grid leads us to
address the problem of time synchronization in the smart grid. Utility
companies look for new packet based time synchronization solutions with Global
Positioning System (GPS) level accuracies beyond traditional packet methods
such as Network Time Proto- col (NTP). However GPS based solutions have poor
reception in indoor environments and dense urban canyons as well as GPS antenna
installation might be costly. Some smart grid nodes such as Phasor Measurement
Units (PMUs), fault detection, Wide Area Measurement Systems (WAMS) etc.,
requires synchronous accuracy as low as 1 ms. On the other hand, 1 sec accuracy
is acceptable in management information domain. Acknowledging this, in this
study, we introduce gossip algorithm based clock synchronization method among
network entities from the decision control and communication point of view. Our
method synchronizes clock within dense network with a bandwidth limited
environment. Our technique has been tested in different kinds of network
topologies- complete, star and random geometric network and demonstrated
satisfactory performance.
|
[
{
"version": "v1",
"created": "Tue, 25 Jul 2017 20:57:21 GMT"
}
] | 2018-05-09T00:00:00 |
[
[
"Parvez",
"Imtiaz",
""
],
[
"Sarwat",
"Arif I.",
""
],
[
"Pinto",
"Jonathan",
""
],
[
"Parvez",
"Zakaria",
""
],
[
"Khandaker",
"Mohammad Aqib",
""
]
] |
new_dataset
| 0.991762 |
1708.04512
|
Yun-Fu Liu
|
Yun-Fu Liu, Da-Wei Jaw, Shih-Chia Huang, Jenq-Neng Hwang
|
DesnowNet: Context-Aware Deep Network for Snow Removal
| null | null |
10.1109/TIP.2018.2806202
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Existing learning-based atmospheric particle-removal approaches such as those
used for rainy and hazy images are designed with strong assumptions regarding
spatial frequency, trajectory, and translucency. However, the removal of snow
particles is more complicated because it possess the additional attributes of
particle size and shape, and these attributes may vary within a single image.
Currently, hand-crafted features are still the mainstream for snow removal,
making significant generalization difficult to achieve. In response, we have
designed a multistage network codenamed DesnowNet to in turn deal with the
removal of translucent and opaque snow particles. We also differentiate snow
into attributes of translucency and chromatic aberration for accurate
estimation. Moreover, our approach individually estimates residual complements
of the snow-free images to recover details obscured by opaque snow.
Additionally, a multi-scale design is utilized throughout the entire network to
model the diversity of snow. As demonstrated in experimental results, our
approach outperforms state-of-the-art learning-based atmospheric phenomena
removal methods and one semantic segmentation baseline on the proposed Snow100K
dataset in both qualitative and quantitative comparisons. The results indicate
our network would benefit applications involving computer vision and graphics.
|
[
{
"version": "v1",
"created": "Tue, 15 Aug 2017 14:33:52 GMT"
}
] | 2018-05-09T00:00:00 |
[
[
"Liu",
"Yun-Fu",
""
],
[
"Jaw",
"Da-Wei",
""
],
[
"Huang",
"Shih-Chia",
""
],
[
"Hwang",
"Jenq-Neng",
""
]
] |
new_dataset
| 0.986013 |
1803.10325
|
Ming-Deh Huang
|
Ming-Deh A. Huang
|
Trilinear maps for cryptography
| null | null | null | null |
cs.CR math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We construct cryptographic trilinear maps that involve simple, non-ordinary
abelian varieties over finite fields. In addition to the discrete logarithm
problems on the abelian varieties, the cryptographic strength of the trilinear
maps is based on a discrete logarithm problem on the quotient of certain
modules defined through the N\'{e}ron-Severi groups. The discrete logarithm
problem is reducible to constructing an explicit description of the algebra
generated by two non-commuting endomorphisms, where the explicit description
consists of a linear basis with the two endomorphisms expressed in the basis,
and the multiplication table on the basis. It is also reducible to constructing
an effective $\mathbb{Z}$-basis for the endomorphism ring of a simple
non-ordinary abelian variety. Both problems appear to be challenging in general
and require further investigation.
|
[
{
"version": "v1",
"created": "Tue, 27 Mar 2018 20:59:28 GMT"
},
{
"version": "v2",
"created": "Mon, 7 May 2018 19:34:07 GMT"
}
] | 2018-05-09T00:00:00 |
[
[
"Huang",
"Ming-Deh A.",
""
]
] |
new_dataset
| 0.999603 |
1804.11210
|
Lutz Bornmann Dr.
|
Julian N. Marewski, Lutz Bornmann
|
Opium in science and society: Numbers
| null | null | null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In science and beyond, numbers are omnipresent when it comes to justifying
different kinds of judgments. Which scientific author, hiring committee-member,
or advisory board panelist has not been confronted with page-long "publication
manuals", "assessment reports", "evaluation guidelines", calling for p-values,
citation rates, h-indices, or other statistics in order to motivate judgments
about the "quality" of findings, applicants, or institutions? Yet, many of
those relying on and calling for statistics do not even seem to understand what
information those numbers can actually convey, and what not. Focusing on the
uninformed usage of bibliometrics as worrysome outgrowth of the increasing
quantification of science and society, we place the abuse of numbers into
larger historical contexts and trends. These are characterized by a
technology-driven bureaucratization of science, obsessions with control and
accountability, and mistrust in human intuitive judgment. The ongoing digital
revolution increases those trends. We call for bringing sanity back into
scientific judgment exercises. Despite all number crunching, many judgments -
be it about scientific output, scientists, or research institutions - will
neither be unambiguous, uncontroversial, or testable by external standards, nor
can they be otherwise validated or objectified. Under uncertainty, good human
judgment remains, for the better, indispensable, but it can be aided, so we
conclude, by a toolbox of simple judgment tools, called heuristics. In the best
position to use those heuristics are research evaluators (1) who have expertise
in the to-be-evaluated area of research, (2) who have profound knowledge in
bibliometrics, and (3) who are statistically literate.
|
[
{
"version": "v1",
"created": "Fri, 27 Apr 2018 11:32:12 GMT"
},
{
"version": "v2",
"created": "Tue, 8 May 2018 06:43:39 GMT"
}
] | 2018-05-09T00:00:00 |
[
[
"Marewski",
"Julian N.",
""
],
[
"Bornmann",
"Lutz",
""
]
] |
new_dataset
| 0.98366 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.