id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1803.08383
|
Marcos Maroto
|
Marcos Maroto, Enrique Ca\~no, Pavel Gonz\'alez, Diego Villegas
|
Head-up Displays (HUD) in driving
|
7 pages
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Head Up Displays (HUDs) were designed originally to present at the usual
viewpoints of the pilot the main sensor data during aircraft missions, because
of placing instrument information in the forward field of view enhances pilots
ability to utilize both instrument and environmental information
simultaneously. The first civilian motor vehicle had a monochrome HUD that was
released in 1988 by General Motors as a technological improvement of HeadDown
Display (HDD) interface, which is commonly used in automobile industry. The HUD
reduces the number and duration of the drivers sight deviations from the road,
by projecting the required information directly into the drivers line of
vision. There are many studies about ways of presenting the information:
standard oneearpiece presentation, threedimensional audio presentation, visual
only or audiovisual presentation. Results have shown that using a 3D auditory
display the time of acquiring targets is approximately 2.2 seconds faster than
using a oneearpiece way. Nevertheless, a disadvantage is when the drivers
attention unconsciously shifts away from the road and goes focused on
processing the information presented by the HUD. By this reason, the time, the
way and the channel are important to represent the information on a HUD. A
solution is a context aware multimodal proactive recommended system that
features personalized content combined with the use of car sensors to determine
when the information has to be presented.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2018 14:46:45 GMT"
}
] | 2018-03-23T00:00:00 |
[
[
"Maroto",
"Marcos",
""
],
[
"Caño",
"Enrique",
""
],
[
"González",
"Pavel",
""
],
[
"Villegas",
"Diego",
""
]
] |
new_dataset
| 0.997796 |
1803.08433
|
Ouyang Zhang
|
Ouyang Zhang and Kannan Srinivasan
|
Dyloc: Dynamic and Collaborative User-controlled AOA based Localizing
System with your laptops
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Currently, accurate localization system based on commodity WiFi devices is
not broadly available yet. In the literature, the solutions are based on either
network infrastructure like WiFi router, which have at least three antennas, or
sacrifice accuracy with coarse grained information like RSSI. In this work, we
design a new localizing system which is accurate based on AOA estimation and
instantly deployable on users' devices.
Dyloc is designed to be dynamically constructed with user's devices as
network nodes without any network infrastructure. On the platform of laptops,
our system achieve comparable localization accuracy with state-of-the-art work
despite of the limitation of less number and large separation of antennas. We
design multi-stage signal processing to resolve the ambiguity issue arisen in
this scenario. To enable dynamic and collaborative construction, our system can
accurately conduct self-localization and also eliminate the need of
infrastructure anchors, which is due to the dedicated two-layer algorithm
design.
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2018 16:17:07 GMT"
}
] | 2018-03-23T00:00:00 |
[
[
"Zhang",
"Ouyang",
""
],
[
"Srinivasan",
"Kannan",
""
]
] |
new_dataset
| 0.999325 |
1803.08495
|
Kevin Chen
|
Kevin Chen, Christopher B. Choy, Manolis Savva, Angel X. Chang, Thomas
Funkhouser, Silvio Savarese
|
Text2Shape: Generating Shapes from Natural Language by Learning Joint
Embeddings
| null | null | null | null |
cs.CV cs.AI cs.GR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a method for generating colored 3D shapes from natural language.
To this end, we first learn joint embeddings of freeform text descriptions and
colored 3D shapes. Our model combines and extends learning by association and
metric learning approaches to learn implicit cross-modal connections, and
produces a joint representation that captures the many-to-many relations
between language and physical properties of 3D shapes such as color and shape.
To evaluate our approach, we collect a large dataset of natural language
descriptions for physical 3D objects in the ShapeNet dataset. With this learned
joint embedding we demonstrate text-to-shape retrieval that outperforms
baseline approaches. Using our embeddings with a novel conditional Wasserstein
GAN framework, we generate colored 3D shapes from text. Our method is the first
to connect natural language text with realistic 3D objects exhibiting rich
variations in color, texture, and shape detail. See video at
https://youtu.be/zraPvRdl13Q
|
[
{
"version": "v1",
"created": "Thu, 22 Mar 2018 17:57:47 GMT"
}
] | 2018-03-23T00:00:00 |
[
[
"Chen",
"Kevin",
""
],
[
"Choy",
"Christopher B.",
""
],
[
"Savva",
"Manolis",
""
],
[
"Chang",
"Angel X.",
""
],
[
"Funkhouser",
"Thomas",
""
],
[
"Savarese",
"Silvio",
""
]
] |
new_dataset
| 0.999823 |
1702.08388
|
Arkaitz Zubiaga
|
Arkaitz Zubiaga, Bo Wang, Maria Liakata, Rob Procter
|
Political Homophily in Independence Movements: Analysing and Classifying
Social Media Users by National Identity
|
Accepted for publication in IEEE Intelligent Systems
| null | null | null |
cs.CL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social media and data mining are increasingly being used to analyse political
and societal issues. Here we undertake the classification of social media users
as supporting or opposing ongoing independence movements in their territories.
Independence movements occur in territories whose citizens have conflicting
national identities; users with opposing national identities will then support
or oppose the sense of being part of an independent nation that differs from
the officially recognised country. We describe a methodology that relies on
users' self-reported location to build large-scale datasets for three
territories -- Catalonia, the Basque Country and Scotland. An analysis of these
datasets shows that homophily plays an important role in determining who people
connect with, as users predominantly choose to follow and interact with others
from the same national identity. We show that a classifier relying on users'
follow networks can achieve accurate, language-independent classification
performances ranging from 85% to 97% for the three territories.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2017 17:19:03 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jun 2017 18:01:10 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Mar 2018 11:48:11 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Zubiaga",
"Arkaitz",
""
],
[
"Wang",
"Bo",
""
],
[
"Liakata",
"Maria",
""
],
[
"Procter",
"Rob",
""
]
] |
new_dataset
| 0.996411 |
1710.00958
|
Adib Rastegarnia
|
Douglas Comer and Adib Rastegarnia
|
OSDF: A Framework For Software Defined Network Programming
|
4 pages, 4 figures, accepted as a work in progress paper in CCNC 2018
| null |
10.1109/CCNC.2018.8319173
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Using SDN to configure and control a multi-site network involves writing code
that handles low-level details. We describe preliminary work on a framework
that takes a network description and set of policies as input, and handles all
the details of deriving routes and installing flow rules in switches. The paper
describes key software components and reports preliminary results.
|
[
{
"version": "v1",
"created": "Tue, 3 Oct 2017 02:05:58 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Comer",
"Douglas",
""
],
[
"Rastegarnia",
"Adib",
""
]
] |
new_dataset
| 0.998181 |
1802.09984
|
Victor Marsault
|
Nadime Francis, Alastair Green, Paolo Guagliardo, Leonid Libkin,
Tobias Lindaaker, Victor Marsault, Stefan Plantikow, Mats Rydberg, Martin
Schuster, Petra Selmer, and Andr\'es Taylor
|
Formal Semantics of the Language Cypher
|
22 pages
| null | null | null |
cs.DB cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cypher is a query language for property graphs. It was originally designed
and implemented as part of the Neo4j graph database, and it is currently used
in a growing number of commercial systems, industrial applications and research
projects. In this work, we provide denotational semantics of the core fragment
of the read-only part of Cypher, which features in particular pattern matching,
filtering, and most relational operations on tables.
|
[
{
"version": "v1",
"created": "Tue, 27 Feb 2018 16:01:36 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2018 18:27:52 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Francis",
"Nadime",
""
],
[
"Green",
"Alastair",
""
],
[
"Guagliardo",
"Paolo",
""
],
[
"Libkin",
"Leonid",
""
],
[
"Lindaaker",
"Tobias",
""
],
[
"Marsault",
"Victor",
""
],
[
"Plantikow",
"Stefan",
""
],
[
"Rydberg",
"Mats",
""
],
[
"Schuster",
"Martin",
""
],
[
"Selmer",
"Petra",
""
],
[
"Taylor",
"Andrés",
""
]
] |
new_dataset
| 0.998527 |
1803.07170
|
Edmond Awad
|
Edmond Awad, Sydney Levine, Max Kleiman-Weiner, Sohan Dsouza, Joshua
B. Tenenbaum, Azim Shariff, Jean-Fran\c{c}ois Bonnefon, Iyad Rahwan
|
Blaming humans in autonomous vehicle accidents: Shared responsibility
across levels of automation
| null | null | null | null |
cs.AI cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When a semi-autonomous car crashes and harms someone, how are blame and
causal responsibility distributed across the human and machine drivers? In this
article, we consider cases in which a pedestrian was hit and killed by a car
being operated under shared control of a primary and a secondary driver. We
find that when only one driver makes an error, that driver receives the blame
and is considered causally responsible for the harm, regardless of whether that
driver is a machine or a human. However, when both drivers make errors in cases
of shared control between a human and a machine, the blame and responsibility
attributed to the machine is reduced. This finding portends a public
under-reaction to the malfunctioning AI components of semi-autonomous cars and
therefore has a direct policy implication: a bottom-up regulatory scheme (which
operates through tort law that is adjudicated through the jury system) could
fail to properly regulate the safety of shared-control vehicles; instead, a
top-down scheme (enacted through federal laws) may be called for.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2018 21:20:56 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Mar 2018 04:12:03 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Awad",
"Edmond",
""
],
[
"Levine",
"Sydney",
""
],
[
"Kleiman-Weiner",
"Max",
""
],
[
"Dsouza",
"Sohan",
""
],
[
"Tenenbaum",
"Joshua B.",
""
],
[
"Shariff",
"Azim",
""
],
[
"Bonnefon",
"Jean-François",
""
],
[
"Rahwan",
"Iyad",
""
]
] |
new_dataset
| 0.995837 |
1803.07614
|
Ratheesh K. Mungara
|
Ozgun Y. Bursalioglu, Giuseppe Caire, Ratheesh K. Mungara, Haralabos
C. Papadopoulos and Chenwei Wang
|
Fog Massive MIMO: A User-Centric Seamless Hot-Spot Architecture
|
32 pages, 7 figures and 1 Table
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The decoupling of data and control planes, as proposed for 5G networks, will
enable the efficient implementation of multitier networks where user equipment
(UE) nodes obtain coverage and connectivity through the top-tier macro-cells,
and, at the same time, achieve high-throughput low-latency communication
through lower tiers in the hierarchy. This paper considers a new architecture
for such lower tiers, dubbed fog massive MIMO, where the UEs are able to
establish high-throughput low-latency data links in a seamless and
opportunistic manner, as they travel through a dense fog of high-capacity
wireless infrastructure nodes, referred to as remote radio heads (RRHs).
Traditional handover mechanisms in dense multicell networks inherently give
rise to frequent handovers and pilot sequence re-assignments, incurring, as a
result, excessive protocol overhead and significant latency. In the proposed
fog massive MIMO architecture, UEs seamlessly and implicitly associate
themselves to the most convenient RRHs in a completely autonomous manner. Each
UE makes use of a unique uplink pilot sequence, and pilot contamination is
mitigated by a novel coded "on-the-fly" pilot contamination control mechanism.
We analyze the spectral efficiency and the outage probability of the proposed
architecture via stochastic geometry, using some recent results on unique
coverage in Boolean models, and provide a detailed comparison with respect to
an idealized baseline massive MIMO cellular system, that neglects protocol
overhead and latency due to explicit user-cell association. Our analysis,
supported by extensive system simulation, reveals that there exists a "sweet
spot" of the per-pilot user load (number of users per pilot), such that the
proposed system achieves spectral efficiency close to that of an ideal cellular
system with the minimum distance user-base station association and no
pilot/handover overhead.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 19:27:34 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Bursalioglu",
"Ozgun Y.",
""
],
[
"Caire",
"Giuseppe",
""
],
[
"Mungara",
"Ratheesh K.",
""
],
[
"Papadopoulos",
"Haralabos C.",
""
],
[
"Wang",
"Chenwei",
""
]
] |
new_dataset
| 0.992684 |
1803.07648
|
Luca Allodi
|
Luca Allodi and Sebastian Banescu and Henning Femmer and Kristian
Beckers
|
Identifying Relevant Information Cues for Vulnerability Assessment Using
CVSS
|
9 pages, CODASPY 2018
|
Proceedings of the 2018 ACM Conference on Data and Application
Security and Privacy
|
10.1145/3176258.3176340
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The assessment of new vulnerabilities is an activity that accounts for
information from several data sources and produces a `severity' score for the
vulnerability. The Common Vulnerability Scoring System (\CVSS) is the reference
standard for this assessment. Yet, no guidance currently exists on \emph{which
information} aids a correct assessment and should therefore be considered.
In this paper we address this problem by evaluating which information cues
increase (or decrease) assessment accuracy.
We devise a block design experiment with 67 software engineering students
with varying vulnerability information and measure scoring accuracy under
different information sets.
We find that baseline vulnerability descriptions provided by standard
vulnerability sources provide only part of the information needed to achieve an
accurate vulnerability assessment. Further, we find that additional information
on \texttt{assets}, \texttt{attacks}, and \texttt{vulnerability type}
contributes in increasing the accuracy of the assessment; conversely,
information on \texttt{known threats} misleads the assessor and decreases
assessment accuracy and should be avoided when assessing vulnerabilities. These
results go in the direction of formalizing the vulnerability communication to,
for example, fully automate security assessments.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 20:51:07 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Allodi",
"Luca",
""
],
[
"Banescu",
"Sebastian",
""
],
[
"Femmer",
"Henning",
""
],
[
"Beckers",
"Kristian",
""
]
] |
new_dataset
| 0.957767 |
1803.07680
|
Robail Yasrab Dr.
|
Robail Yasrab
|
PaaS Cloud: The Business Perspective
|
24 pages
| null | null | null |
cs.CY cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The next generation of PaaS technology accomplishes the true promise of
object-oriented and 4GLs development with less effort. Now PaaS is becoming one
of the core technical services for application development organizations. PaaS
offers a resourceful and agile approach to develop, operate and deploy
applications in a cost-effective manner. It is now turning out to be one of the
preferred choices throughout the world, especially for globally distributed
development environment. However it still lacks the scale of popularity and
acceptance which Software-as-a-Service (SaaS) and Infrastructure-as-a-Service
(IaaS) have attained. PaaS offers a promising future with novel technology
architecture and evolutionary development approach. In this article, we
identify the strengths, weaknesses, opportunities and threats for the PaaS
industry. We then identify the various issues that will affect the different
stakeholders of PaaS industry. This research will outline a set of
recommendations for the PaaS practitioners to better manage this technology.
For PaaS technology researchers, we also outline the number of research areas
that need attention in coming future. Finally, we also included an online
survey to outline PaaS technology market leaders. This will facilitate PaaS
technology practitioners to have a more deep insight into market trends and
technologies.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 22:37:09 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Yasrab",
"Robail",
""
]
] |
new_dataset
| 0.990155 |
1803.07782
|
Vijay Rajanna
|
Vijay Rajanna, Tracy Hammond
|
Gaze-Assisted User Authentication to Counter Shoulder-surfing Attacks
|
5 pages, 7 figures, 2 tables, ACM Richard Tapia Conference, Austin,
2016
|
ACM Richard Tapia Conference, Austin, 2016
| null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A highly secure, foolproof, user authentication system is still a primary
focus of research in the field of User Privacy and Security. Shoulder-surfing
is an act of spying when an authorized user is logging into a system, and is
promoted by a malicious intent of gaining unauthorized access. We present a
gaze-assisted user authentication system as a potential solution to counter
shoulder-surfing attacks. The system comprises of an eye tracker and an
authentication interface with 12 pre-defined shapes (e.g., triangle, circle,
etc.) that move simultaneously on the screen. A user chooses a set of three
shapes as a password. To authenticate, the user follows the paths of three
shapes as they move, one on each frame, over three consecutive frames.
The system uses either the template matching or decision tree algorithms to
match the scan-path of the user's gaze with the path traversed by the shape.
The system was evaluated with seven users to test the accuracy of both the
algorithms. We found that with the template matching algorithm the system
achieves an accuracy of 95%, and with the decision tree algorithm an accuracy
of 90.2%. We also present the advantages and disadvantages of using both the
algorithms. Our study suggests that gaze-based authentication is a highly
secure method against shoulder-surfing attacks as the unique pattern of eye
movements for each individual makes the system hard to break into.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2018 07:48:22 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Rajanna",
"Vijay",
""
],
[
"Hammond",
"Tracy",
""
]
] |
new_dataset
| 0.999596 |
1803.07808
|
Pei Zhou
|
Pei Zhou, Kaijun Cheng, Xiao Han, Xuming Fang, Yuguang Fang, Rong He,
Yan Long and Yanping Liu
|
IEEE 802.11ay based mmWave WLANs: Design Challenges and Solutions
|
27 pages, 33 figures. Accepted for publication in IEEE Communications
Surveys and Tutorials
| null |
10.1109/COMST.2018.2816920
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Millimeter-wave (mmWave) with large spectrum available is considered as the
most promising frequency band for future wireless communications. The IEEE
802.11ad and IEEE 802.11ay operating on 60 GHz mmWave are the two most expected
wireless local area network (WLAN) technologies for ultra-high-speed
communications. For the IEEE 802.11ay standard still under development, there
are plenty of proposals from companies and researchers who are involved with
the IEEE 802.11ay task group. In this survey, we conduct a comprehensive review
on the medium access control layer (MAC) related issues for the IEEE 802.11ay,
some cross-layer between physical layer (PHY) and MAC technologies are also
included. We start with MAC related technologies in the IEEE 802.11ad and
discuss design challenges on mmWave communications, leading to some MAC related
technologies for the IEEE 802.11ay. We then elaborate on important design
issues for IEEE 802.11ay. Specifically, we review the channel bonding and
aggregation for the IEEE 802.11ay, and point out the major differences between
the two technologies. Then, we describe channel access and channel allocation
in the IEEE 802.11ay, including spatial sharing and interference mitigation
technologies. After that, we present an in-depth survey on beamforming training
(BFT), beam tracking, single-user multiple-input-multiple-output (SU-MIMO)
beamforming and multi-user multiple-input-multiple-output (MU-MIMO)
beamforming. Finally, we discuss some open design issues and future research
directions for mmWave WLANs. We hope that this paper provides a good
introduction to this exciting research area for future wireless systems.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2018 09:32:56 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Zhou",
"Pei",
""
],
[
"Cheng",
"Kaijun",
""
],
[
"Han",
"Xiao",
""
],
[
"Fang",
"Xuming",
""
],
[
"Fang",
"Yuguang",
""
],
[
"He",
"Rong",
""
],
[
"Long",
"Yan",
""
],
[
"Liu",
"Yanping",
""
]
] |
new_dataset
| 0.999405 |
1803.07913
|
Manuele Brambilla
|
Amos Sironi, Manuele Brambilla, Nicolas Bourdis, Xavier Lagorce, Ryad
Benosman
|
HATS: Histograms of Averaged Time Surfaces for Robust Event-based Object
Classification
|
Accepted for publication at CVPR2018. Dataset available at
http://www.prophesee.ai/dataset-n-cars/
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Event-based cameras have recently drawn the attention of the Computer Vision
community thanks to their advantages in terms of high temporal resolution, low
power consumption and high dynamic range, compared to traditional frame-based
cameras. These properties make event-based cameras an ideal choice for
autonomous vehicles, robot navigation or UAV vision, among others. However, the
accuracy of event-based object classification algorithms, which is of crucial
importance for any reliable system working in real-world conditions, is still
far behind their frame-based counterparts. Two main reasons for this
performance gap are: 1. The lack of effective low-level representations and
architectures for event-based object classification and 2. The absence of large
real-world event-based datasets. In this paper we address both problems. First,
we introduce a novel event-based feature representation together with a new
machine learning architecture. Compared to previous approaches, we use local
memory units to efficiently leverage past temporal information and build a
robust event-based representation. Second, we release the first large
real-world event-based dataset for object classification. We compare our method
to the state-of-the-art with extensive experiments, showing better
classification performance and real-time computation.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2018 13:37:24 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Sironi",
"Amos",
""
],
[
"Brambilla",
"Manuele",
""
],
[
"Bourdis",
"Nicolas",
""
],
[
"Lagorce",
"Xavier",
""
],
[
"Benosman",
"Ryad",
""
]
] |
new_dataset
| 0.979532 |
1803.07926
|
Hung La
|
Huy Xuan Pham, Hung Manh La, David Feil-Seifer, Matthew Dean
|
A Distributed Control Framework of Multiple Unmanned Aerial Vehicles for
Dynamic Wildfire Tracking
|
arXiv admin note: substantial text overlap with arXiv:1704.02630
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wild-land fire fighting is a hazardous job. A key task for firefighters is to
observe the "fire front" to chart the progress of the fire and areas that will
likely spread next. Lack of information of the fire front causes many
accidents. Using Unmanned Aerial Vehicles (UAVs) to cover wildfire is promising
because it can replace humans in hazardous fire tracking and significantly
reduce operation costs. In this paper we propose a distributed control
framework designed for a team of UAVs that can closely monitor a wildfire in
open space, and precisely track its development. The UAV team, designed for
flexible deployment, can effectively avoid in-flight collisions and cooperate
well with neighbors. They can maintain a certain height level to the ground for
safe flight above fire. Experimental results are conducted to demonstrate the
capabilities of the UAV team in covering a spreading wildfire.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 00:07:07 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Pham",
"Huy Xuan",
""
],
[
"La",
"Hung Manh",
""
],
[
"Feil-Seifer",
"David",
""
],
[
"Dean",
"Matthew",
""
]
] |
new_dataset
| 0.960101 |
1803.07927
|
Liangdong Lu
|
Liangdong Lu, Wenping Ma, Ruihu Li, Yuena Ma, Luobin Guo
|
New Quantum MDS codes constructed from Constacyclic codes
|
arXiv admin note: text overlap with arXiv:1803.04168
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quantum maximum-distance-separable (MDS) codes are an important class of
quantum codes. In this paper, using constacyclic codes and Hermitain
construction, we construct some new quantum MDS codes of the form $q=2am+t$,
$n=\frac{q^{2}+1}{a}$. Most of these quantum MDS codes are new in the sense
that their parameters are not covered be the codes available in the literature.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 05:37:32 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Lu",
"Liangdong",
""
],
[
"Ma",
"Wenping",
""
],
[
"Li",
"Ruihu",
""
],
[
"Ma",
"Yuena",
""
],
[
"Guo",
"Luobin",
""
]
] |
new_dataset
| 0.999742 |
1803.08014
|
Kuan-Ting Yu
|
Kuan-Ting Yu, Alberto Rodriguez
|
Realtime State Estimation with Tactile and Visual Sensing for Inserting
a Suction-held Object
|
8 pages, 10 figures, submitted to IROS 2018
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop a real-time state estimation system to recover the pose and
contact formation of an object relative to its environment. In this paper, we
focus on the application of inserting an object picked by a suction cup into a
tight space, an enabling technology for robotic packaging.
We propose a framework that fuses force and visual sensing for improved
accuracy and robustness. Visual sensing is versatile and non-intrusive, but
suffers from occlusions and limited accuracy, especially for tasks involving
contact. Tactile sensing is local, but provides accuracy and robustness to
occlusions. The proposed algorithm to fuse them is based on iSAM, an on-line
optimization technique, which we use to incorporate kinematic measurements from
the robot, contact geometry of the object and the container, and visual
tracking. In this paper, we generalize previous results in planar settings to a
3D task with more complex contact interactions. A key challenge in using force
sensing is that we do not observe contact point locations directly. We propose
a data-driven method to infer the contact formation, which is then used in
real-time by the state estimator. We demonstrate and evaluate the algorithm in
a setup instrumented to provide groundtruth.
|
[
{
"version": "v1",
"created": "Wed, 21 Mar 2018 17:12:12 GMT"
}
] | 2018-03-22T00:00:00 |
[
[
"Yu",
"Kuan-Ting",
""
],
[
"Rodriguez",
"Alberto",
""
]
] |
new_dataset
| 0.992424 |
1602.06426
|
Cassio Neri
|
Cassio Neri
|
A loopless and branchless $O(1)$ algorithm to generate the next Dyck
word
|
First published on 19 July 2014 at https://github.com/cassioneri/Dyck
| null | null | null |
cs.DS
|
http://creativecommons.org/licenses/by-sa/4.0/
|
Let integer be any C/C++ unsigned integer type up to 64-bits long. Given a
Dyck word the following code returns the next Dyck word of the same size,
provided it exists.
integer next_dyck_word(integer w) {
integer const a = w & -w;
integer const b = w + a;
integer c = w ^ b;
c = (c / a >> 2) + 1;
c = ((c * c - 1) & 0xaaaaaaaaaaaaaaaa) | b;
return c;
}
|
[
{
"version": "v1",
"created": "Sat, 20 Feb 2016 16:24:30 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Mar 2018 20:54:58 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Neri",
"Cassio",
""
]
] |
new_dataset
| 0.997096 |
1705.09427
|
Yuliang Li
|
Yuliang Li, Alin Deutsch, and Victor Vianu
|
SpinArt: A Spin-based Verifier for Artifact Systems
| null | null | null | null |
cs.DB cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Data-driven workflows, of which IBM's Business Artifacts are a prime
exponent, have been successfully deployed in practice, adopted in industrial
standards, and have spawned a rich body of research in academia, focused
primarily on static analysis. In previous work, we obtained theoretical results
on the verification of a rich model incorporating core elements of IBM's
successful Guard-Stage-Milestone (GSM) artifact model. The results showed
decidability of verification of temporal properties of a large class of GSM
workflows and established its complexity. Following up on these results, the
present paper reports on the implementation of SpinArt, a practical verifier
based on the classical model-checking tool Spin. The implementation includes
nontrivial optimizations and achieves good performance on real-world business
process examples. Our results shed light on the capabilities and limitations of
off-the-shelf verifiers in the context of data-driven workflows.
|
[
{
"version": "v1",
"created": "Fri, 26 May 2017 04:13:17 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Sep 2017 17:35:37 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Mar 2018 23:21:27 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Li",
"Yuliang",
""
],
[
"Deutsch",
"Alin",
""
],
[
"Vianu",
"Victor",
""
]
] |
new_dataset
| 0.99885 |
1705.09811
|
Torsten Schaub
|
Martin Gebser and Roland Kaminski and Benjamin Kaufmann and Torsten
Schaub
|
Multi-shot ASP solving with clingo
|
Under consideration for publication in Theory and Practice of Logic
Programming (TPLP)
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new flexible paradigm of grounding and solving in Answer Set
Programming (ASP), which we refer to as multi-shot ASP solving, and present its
implementation in the ASP system clingo.
Multi-shot ASP solving features grounding and solving processes that deal
with continuously changing logic programs. In doing so, they remain operative
and accommodate changes in a seamless way. For instance, such processes allow
for advanced forms of search, as in optimization or theory solving, or
interaction with an environment, as in robotics or query-answering. Common to
them is that the problem specification evolves during the reasoning process,
either because data or constraints are added, deleted, or replaced. This
evolutionary aspect adds another dimension to ASP since it brings about state
changing operations. We address this issue by providing an operational
semantics that characterizes grounding and solving processes in multi-shot ASP
solving. This characterization provides a semantic account of grounder and
solver states along with the operations manipulating them.
The operative nature of multi-shot solving avoids redundancies in relaunching
grounder and solver programs and benefits from the solver's learning
capacities. clingo accomplishes this by complementing ASP's declarative input
language with control capacities. On the declarative side, a new directive
allows for structuring logic programs into named and parameterizable
subprograms. The grounding and integration of these subprograms into the
solving process is completely modular and fully controllable from the
procedural side. To this end, clingo offers a new application programming
interface that is conveniently accessible via scripting languages.
|
[
{
"version": "v1",
"created": "Sat, 27 May 2017 11:52:40 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2018 16:43:53 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Gebser",
"Martin",
""
],
[
"Kaminski",
"Roland",
""
],
[
"Kaufmann",
"Benjamin",
""
],
[
"Schaub",
"Torsten",
""
]
] |
new_dataset
| 0.972399 |
1707.04131
|
Jonas Rauber
|
Jonas Rauber, Wieland Brendel, Matthias Bethge
|
Foolbox: A Python toolbox to benchmark the robustness of machine
learning models
|
Code and examples available at https://github.com/bethgelab/foolbox
and documentation available at http://foolbox.readthedocs.io
| null | null | null |
cs.LG cs.CR cs.CV stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Even todays most advanced machine learning models are easily fooled by almost
imperceptible perturbations of their inputs. Foolbox is a new Python package to
generate such adversarial perturbations and to quantify and compare the
robustness of machine learning models. It is build around the idea that the
most comparable robustness measure is the minimum perturbation needed to craft
an adversarial example. To this end, Foolbox provides reference implementations
of most published adversarial attack methods alongside some new ones, all of
which perform internal hyperparameter tuning to find the minimum adversarial
perturbation. Additionally, Foolbox interfaces with most popular deep learning
frameworks such as PyTorch, Keras, TensorFlow, Theano and MXNet and allows
different adversarial criteria such as targeted misclassification and top-k
misclassification as well as different distance measures. The code is licensed
under the MIT license and is openly available at
https://github.com/bethgelab/foolbox . The most up-to-date documentation can be
found at http://foolbox.readthedocs.io .
|
[
{
"version": "v1",
"created": "Thu, 13 Jul 2017 13:59:15 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Aug 2017 03:22:01 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Mar 2018 10:10:10 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Rauber",
"Jonas",
""
],
[
"Brendel",
"Wieland",
""
],
[
"Bethge",
"Matthias",
""
]
] |
new_dataset
| 0.987032 |
1803.06960
|
Joachim Breitner
|
Joachim Breitner and Antal Spector-Zabusky and Yao Li and Christine
Rizkallah and John Wiegley and Stephanie Weirich
|
Ready, Set, Verify! Applying hs-to-coq to real-world Haskell code
|
30 pages, submitted to ICFP'18
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Good tools can bring mechanical verification to programs written in
mainstream functional languages. We use hs-to-coq to translate significant
portions of Haskell's containers library into Coq, and verify it against
specifications that we derive from a variety of sources including type class
laws, the library's test suite, and interfaces from Coq's standard library. Our
work shows that it is feasible to verify mature, widely-used, highly optimized,
and unmodified Haskell code. We also learn more about the theory of
weight-balanced trees, extend hs-to-coq to handle partiality, and -- since we
found no bugs -- attest to the superb quality of well-tested functional code.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2018 14:42:25 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Mar 2018 03:15:09 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Breitner",
"Joachim",
""
],
[
"Spector-Zabusky",
"Antal",
""
],
[
"Li",
"Yao",
""
],
[
"Rizkallah",
"Christine",
""
],
[
"Wiegley",
"John",
""
],
[
"Weirich",
"Stephanie",
""
]
] |
new_dataset
| 0.968721 |
1803.07292
|
Mika M\"antyl\"a
|
Mika V. M\"antyl\"a, Fabio Calefato, Maelick Claes
|
Natural Language or Not (NLoN) - A Package for Software Engineering Text
Analysis Pipeline
| null |
MSR '18: 15th International Conference on Mining Software
Repositories, May 28--29, 2018 Gothenburg, Sweden
|
10.1145/3196398.3196444
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of natural language processing (NLP) is gaining popularity in
software engineering. In order to correctly perform NLP, we must pre-process
the textual information to separate natural language from other information,
such as log messages, that are often part of the communication in software
engineering. We present a simple approach for classifying whether some textual
input is natural language or not. Although our NLoN package relies on only 11
language features and character tri-grams, we are able to achieve an area under
the ROC curve performances between 0.976-0.987 on three different data sources,
with Lasso regression from Glmnet as our learner and two human raters for
providing ground truth. Cross-source prediction performance is lower and has
more fluctuation with top ROC performances from 0.913 to 0.980. Compared with
prior work, our approach offers similar performance but is considerably more
lightweight, making it easier to apply in software engineering text mining
pipelines. Our source code and data are provided as an R-package for further
improvements.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 08:32:56 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Mäntylä",
"Mika V.",
""
],
[
"Calefato",
"Fabio",
""
],
[
"Claes",
"Maelick",
""
]
] |
new_dataset
| 0.997378 |
1803.07294
|
Jiani Zhang
|
Jiani Zhang, Xingjian Shi, Junyuan Xie, Hao Ma, Irwin King, Dit-Yan
Yeung
|
GaAN: Gated Attention Networks for Learning on Large and Spatiotemporal
Graphs
| null | null | null | null |
cs.LG cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new network architecture, Gated Attention Networks (GaAN), for
learning on graphs. Unlike the traditional multi-head attention mechanism,
which equally consumes all attention heads, GaAN uses a convolutional
sub-network to control each attention head's importance. We demonstrate the
effectiveness of GaAN on the inductive node classification problem. Moreover,
with GaAN as a building block, we construct the Graph Gated Recurrent Unit
(GGRU) to address the traffic speed forecasting problem. Extensive experiments
on three real-world datasets show that our GaAN framework achieves
state-of-the-art results on both tasks.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 08:33:20 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Zhang",
"Jiani",
""
],
[
"Shi",
"Xingjian",
""
],
[
"Xie",
"Junyuan",
""
],
[
"Ma",
"Hao",
""
],
[
"King",
"Irwin",
""
],
[
"Yeung",
"Dit-Yan",
""
]
] |
new_dataset
| 0.965243 |
1803.07295
|
Rodolfo Delmonte
|
Rodolfo Delmonte
|
Expressivity in TTS from Semantics and Pragmatics
|
Presented at AISV 2015 - Now appearing in Studi AISV, n.1
| null |
10.17469/O2101AISV000026
| null |
cs.CL
|
http://creativecommons.org/publicdomain/zero/1.0/
|
In this paper we present ongoing work to produce an expressive TTS reader
that can be used both in text and dialogue applications. The system called
SPARSAR has been used to read (English) poetry so far but it can now be applied
to any text. The text is fully analyzed both at phonetic and phonological
level, and at syntactic and semantic level. In addition, the system has access
to a restricted list of typical pragmatically marked phrases and expressions
that are used to convey specific discourse function and speech acts and need
specialized intonational contours. The text is transformed into a poem-like
structures, where each line corresponds to a Breath Group, semantically and
syntactically consistent. Stanzas correspond to paragraph boundaries.
Analogical parameters are related to ToBI theoretical indices but their number
is doubled. In this paper, we concentrate on short stories and fables.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 08:35:16 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Delmonte",
"Rodolfo",
""
]
] |
new_dataset
| 0.994349 |
1803.07351
|
Ruobing Shen
|
Ruobing Shen, Xiaoyu Chen, Xiangrui Zheng, Gerhard Reinelt
|
Discrete Potts Model for Generating Superpixels on Noisy Images
|
23 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many computer vision applications, such as object recognition and
segmentation, increasingly build on superpixels. However, there have been so
far few superpixel algorithms that systematically deal with noisy images. We
propose to first decompose the image into equal-sized rectangular patches,
which also sets the maximum superpixel size. Within each patch, a Potts model
for simultaneous segmentation and denoising is applied, that guarantees
connected and non-overlapping superpixels and also produces a denoised image.
The corresponding optimization problem is formulated as a mixed integer linear
program (MILP), and solved by a commercial solver. Extensive experiments on the
BSDS500 dataset images with noises are compared with other state-of-the-art
superpixel methods. Our method achieves the best result in terms of a combined
score (OP) composed of the under-segmentation error, boundary recall and
compactness.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 10:32:55 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Shen",
"Ruobing",
""
],
[
"Chen",
"Xiaoyu",
""
],
[
"Zheng",
"Xiangrui",
""
],
[
"Reinelt",
"Gerhard",
""
]
] |
new_dataset
| 0.978033 |
1803.07386
|
Maneet Singh
|
Akshay Sethi, Maneet Singh, Richa Singh, Mayank Vatsa
|
Residual Codean Autoencoder for Facial Attribute Analysis
|
Accepted in Pattern Recognition Letters
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Facial attributes can provide rich ancillary information which can be
utilized for different applications such as targeted marketing, human computer
interaction, and law enforcement. This research focuses on facial attribute
prediction using a novel deep learning formulation, termed as R-Codean
autoencoder. The paper first presents Cosine similarity based loss function in
an autoencoder which is then incorporated into the Euclidean distance based
autoencoder to formulate R-Codean. The proposed loss function thus aims to
incorporate both magnitude and direction of image vectors during feature
learning. Further, inspired by the utility of shortcut connections in deep
models to facilitate learning of optimal parameters, without incurring the
problem of vanishing gradient, the proposed formulation is extended to
incorporate shortcut connections in the architecture. The proposed R-Codean
autoencoder is utilized in facial attribute prediction framework which
incorporates patch-based weighting mechanism for assigning higher weights to
relevant patches for each attribute. The experimental results on publicly
available CelebA and LFWA datasets demonstrate the efficacy of the proposed
approach in addressing this challenging problem.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 12:05:33 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Sethi",
"Akshay",
""
],
[
"Singh",
"Maneet",
""
],
[
"Singh",
"Richa",
""
],
[
"Vatsa",
"Mayank",
""
]
] |
new_dataset
| 0.993064 |
1803.07496
|
Xuehe Wang
|
Xuehe Wang, Lingjie Duan, Junshan Zhang
|
Mobile Social Services with Network Externality: From Separate Pricing
to Bundled Pricing
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today, many wireless device providers choose to sell devices bundled with
complementary mobile social services, which exhibit strong positive network
externality. This paper aims to quantify the benefits of selling devices and
complementary services under the following three strategies: separate pricing,
bundled pricing, and hybrid pricing (both the separate and bundled options are
offered). A comprehensive comparison of the above three strategies is carried
out for two popular service models, namely physical connectivity sharing and
virtual content sharing, respectively. We first study the physical service
model where the provider (e.g., FON) offers users customized WiFi devices for
indoor Internet access, and allows service subscribers to physically access all
device owners' WiFi when traveling. Observing that all device-owners contribute
to the connectivity sharing, we show, via a Stackelberg game theoretic
approach, that bundled pricing outperforms separate pricing as long as the
total cost of device and service is reasonably low to stimulate network
externality. Further, hybrid pricing strictly dominates bundled pricing thanks
to the pricing flexibility to keep high marginal profit of device-selling.
Next, we investigate the virtual sharing service model where the provider
(e.g., Apple) sells devices and device-supported applications. Different from
the connectivity service model, in this model service subscribers directly
contribute to the virtual content sharing, and the network externality can be
fairly strong. We prove that hybrid pricing degenerates to bundled pricing if
the network externality degree is larger than the average device valuation,
which is in stark contrast with the connectivity service model in which hybrid
pricing always outperforms bundled pricing.
|
[
{
"version": "v1",
"created": "Tue, 20 Mar 2018 15:49:36 GMT"
}
] | 2018-03-21T00:00:00 |
[
[
"Wang",
"Xuehe",
""
],
[
"Duan",
"Lingjie",
""
],
[
"Zhang",
"Junshan",
""
]
] |
new_dataset
| 0.951512 |
1408.6771
|
David Eppstein
|
Zachary Abel, Erik D. Demaine, Martin L. Demaine, David Eppstein, Anna
Lubiw and Ryuhei Uehara
|
Flat Foldings of Plane Graphs with Prescribed Angles and Edge Lengths
|
21 pages, 10 figures
|
J. Computational Geometry 9 (1): 71-91, 2018
|
10.20382/jocg.v9i1
| null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When can a plane graph with prescribed edge lengths and prescribed angles
(from among $\{0,180^\circ, 360^\circ$\}) be folded flat to lie in an
infinitesimally thin line, without crossings? This problem generalizes the
classic theory of single-vertex flat origami with prescribed mountain-valley
assignment, which corresponds to the case of a cycle graph. We characterize
such flat-foldable plane graphs by two obviously necessary but also sufficient
conditions, proving a conjecture made in 2001: the angles at each vertex should
sum to $360^\circ$, and every face of the graph must itself be flat foldable.
This characterization leads to a linear-time algorithm for testing flat
foldability of plane graphs with prescribed edge lengths and angles, and a
polynomial-time algorithm for counting the number of distinct folded states.
|
[
{
"version": "v1",
"created": "Thu, 28 Aug 2014 16:25:49 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Mar 2018 20:23:21 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Abel",
"Zachary",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Eppstein",
"David",
""
],
[
"Lubiw",
"Anna",
""
],
[
"Uehara",
"Ryuhei",
""
]
] |
new_dataset
| 0.973267 |
1706.05593
|
Sherif Abuelenin
|
Sherif M. Abuelenin and Rabab F. Abdel-Kader
|
Closed-Form Mathematical Representations of Interval Type-2 Fuzzy Logic
Systems
|
15 pages, 10 figures, 3 tables
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Interval type-2 fuzzy logic systems (IT2 FLSs) have a wide range of
applications due to their abilities to handle uncertainties compared to their
type-1 counterparts. This paper discusses the representation of IT2 FLSs in
closed mathematical form. Two novel inference mechanisms are introduced, each
of them represents a whole IT2 FLS. The two forms are based on approximating
Coupland and John's geometric method and the Nie-Tan method. Having closed-form
representations is preferred in the design of control systems, especially when
stability analysis is studied. Additionally, the simplicity of the proposed
mechanisms, offers an easy way for implementation. Simulation results show that
the proposed method perform very closely to other methods. Simulation results
are provided.
|
[
{
"version": "v1",
"created": "Sat, 17 Jun 2017 23:39:56 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Mar 2018 08:45:27 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Abuelenin",
"Sherif M.",
""
],
[
"Abdel-Kader",
"Rabab F.",
""
]
] |
new_dataset
| 0.95981 |
1708.05063
|
Shankara Narayanan Krishna
|
Parosh Aziz Abdulla, Mohamed Faouzi Atig and S. Krishna
|
Communicating Timed Processes with Perfect Timed Channels
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the model of communicating timed automata (CTA) that extends the
classical models of finite-state processes communicating through FIFO perfect
channels and timed automata, in the sense that the finite-state processes are
replaced by timed automata, and messages inside the perfect channels are
equipped with clocks representing their ages. In addition to the standard
operations (resetting clocks, checking guards of clocks) each automaton can
either (1) append a message to the tail of a channel with an initial age or (2)
receive the message at the head of a channel if its age satisfies a set of
given constraints. In this paper, we show that the reachability problem is
undecidable even in the case of two timed automata connected by one
unidirectional timed channel if one allows global clocks (that the two automata
can check and manipulate). We prove that this undecidability still holds even
for CTA consisting of three timed automata and two unidirectional timed
channels (and without any global clock). However, the reachability problem
becomes decidable (in $\mathsf{EXPTIME}$) in the case of two automata linked
with one unidirectional timed channel and with no global clock. Finally, we
consider the bounded-context case, where in each context, only one timed
automaton is allowed to receive messages from one channel while being able to
send messages to all the other timed channels. In this case we show that the
reachability problem is decidable.
|
[
{
"version": "v1",
"created": "Thu, 10 Aug 2017 05:21:40 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Oct 2017 05:19:22 GMT"
},
{
"version": "v3",
"created": "Thu, 8 Feb 2018 18:05:11 GMT"
},
{
"version": "v4",
"created": "Sun, 18 Mar 2018 12:02:56 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Abdulla",
"Parosh Aziz",
""
],
[
"Atig",
"Mohamed Faouzi",
""
],
[
"Krishna",
"S.",
""
]
] |
new_dataset
| 0.998598 |
1709.00727
|
Vandit Gajjar J
|
Vandit Gajjar, Viraj Mavani, Ayesha Gurnani
|
Hand Gesture Real Time Paint Tool - Box
|
This paper needs a proper writing and experiments need to be
implemented, thus we are withdrawing this submission
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
With current development universally in computing, now a days user
interaction approaches with mouse, keyboard, touch-pens etc. are not
sufficient. Directly using of hands or hand gestures as an input device is a
method to attract people with providing the applications, through Machine
Learning and Computer Vision. Human-computer interaction application in which
you can simply draw different shapes, fill the colors, moving the folder from
one place to another place and rotating your image with rotating your hand
gesture all this will be without touching your device only. In this paper
Machine Learning based hand gestures recognition is presented, with the use of
Computer Vision different types of gesture applications have been created.
|
[
{
"version": "v1",
"created": "Sun, 3 Sep 2017 14:53:05 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Oct 2017 16:59:47 GMT"
},
{
"version": "v3",
"created": "Sun, 18 Mar 2018 05:10:35 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Gajjar",
"Vandit",
""
],
[
"Mavani",
"Viraj",
""
],
[
"Gurnani",
"Ayesha",
""
]
] |
new_dataset
| 0.994748 |
1802.03656
|
Benyou Wang
|
Benyou Wang, Li Wang, Qikang Wei, Lichun Liu
|
TextZoo, a New Benchmark for Reconsidering Text Classification
|
a benchmark need to be completed
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Text representation is a fundamental concern in Natural Language Processing,
especially in text classification. Recently, many neural network approaches
with delicate representation model (e.g. FASTTEXT, CNN, RNN and many hybrid
models with attention mechanisms) claimed that they achieved state-of-art in
specific text classification datasets. However, it lacks an unified benchmark
to compare these models and reveals the advantage of each sub-components for
various settings. We re-implement more than 20 popular text representation
models for classification in more than 10 datasets. In this paper, we
reconsider the text classification task in the perspective of neural network
and get serval effects with analysis of the above results.
|
[
{
"version": "v1",
"created": "Sat, 10 Feb 2018 22:34:38 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Mar 2018 03:07:10 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Wang",
"Benyou",
""
],
[
"Wang",
"Li",
""
],
[
"Wei",
"Qikang",
""
],
[
"Liu",
"Lichun",
""
]
] |
new_dataset
| 0.996251 |
1802.09734
|
Zongtao Liu
|
Yang Yang, Zongtao Liu, Chenhao Tan, Fei Wu, Yueting Zhuang and Yafeng
Li
|
To Stay or to Leave: Churn Prediction for Urban Migrants in the Initial
Period
| null | null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In China, 260 million people migrate to cities to realize their urban dreams.
Despite that these migrants play an important role in the rapid urbanization
process, many of them fail to settle down and eventually leave the city. The
integration process of migrants thus raises an important issue for scholars and
policymakers.
In this paper, we use Shanghai as an example to investigate migrants'
behavior in their first weeks and in particular, how their behavior relates to
early departure. Our dataset consists of a one-month complete dataset of 698
telecommunication logs between 54 million users, plus a novel and publicly
available housing price data for 18K real estates in Shanghai. We find that
migrants who end up leaving early tend to neither develop diverse connections
in their first weeks nor move around the city. Their active areas also have
higher housing prices than that of staying migrants. We formulate a churn
prediction problem to determine whether a migrant is going to leave based on
her behavior in the first few days. The prediction performance improves as we
include data from more days. Interestingly, when using the same features, the
classifier trained from only the first few days is already as good as the
classifier trained using full data, suggesting that the performance difference
mainly lies in the difference between features.
|
[
{
"version": "v1",
"created": "Tue, 27 Feb 2018 06:18:14 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Mar 2018 03:52:16 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Yang",
"Yang",
""
],
[
"Liu",
"Zongtao",
""
],
[
"Tan",
"Chenhao",
""
],
[
"Wu",
"Fei",
""
],
[
"Zhuang",
"Yueting",
""
],
[
"Li",
"Yafeng",
""
]
] |
new_dataset
| 0.999356 |
1803.06647
|
Jinning Li
|
Jinning Li, Siqi Liu, and Mengyao Cao
|
Line Artist: A Multiple Style Sketch to Painting Synthesis Scheme
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Drawing a beautiful painting is a dream of many people since childhood. In
this paper, we propose a novel scheme, Line Artist, to synthesize artistic
style paintings with freehand sketch images, leveraging the power of deep
learning and advanced algorithms. Our scheme includes three models. The Sketch
Image Extraction (SIE) model is applied to generate the training data. It
includes smoothing reality images and pencil sketch extraction. The Detailed
Image Synthesis (DIS) model trains a conditional generative adversarial network
to generate detailed real-world information. The Adaptively Weighted Artistic
Style Transfer (AWAST) model is capable to combine multiple style images with a
content with the VGG19 network and PageRank algorithm. The appealing artistic
images are then generated by optimization iterations. Experiments are operated
on the Kaggle Cats dataset and The Oxford Buildings Dataset. Our synthesis
results are proved to be artistic, beautiful and robust.
|
[
{
"version": "v1",
"created": "Sun, 18 Mar 2018 11:54:22 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Li",
"Jinning",
""
],
[
"Liu",
"Siqi",
""
],
[
"Cao",
"Mengyao",
""
]
] |
new_dataset
| 0.98025 |
1803.06720
|
Felix Beierle
|
Felix Beierle, Vinh Thuy Tran, Mathias Allemand, Patrick Neff,
Winfried Schlee, Thomas Probst, R\"udiger Pryss, Johannes Zimmermann
|
TYDR - Track Your Daily Routine. Android App for Tracking Smartphone
Sensor and Usage Data
|
Accepted for publication at the 5th IEEE/ACM International Conference
on Mobile Software Engineering and Systems (MOBILESoft '18)
| null |
10.1145/3197231.3197235
| null |
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the Android app TYDR (Track Your Daily Routine) which tracks
smartphone sensor and usage data and utilizes standardized psychometric
personality questionnaires. With the app, we aim at collecting data for
researching correlations between the tracked smartphone data and the user's
personality in order to predict personality from smartphone data. In this
paper, we highlight our approaches in addressing the challenges in developing
such an app. We optimize the tracking of sensor data by assessing the trade-off
of size of data and battery consumption and granularity of the stored
information. Our user interface is designed to incentivize users to install the
app and fill out questionnaires. TYDR processes and visualizes the tracked
sensor and usage data as well as the results of the personality questionnaires.
When developing an app that will be used in psychological studies, requirements
posed by ethics commissions / institutional review boards and data protection
officials have to be met. We detail our approaches concerning those
requirements regarding the anonymized storing of user data, informing the users
about the data collection, and enabling an opt-out option. We present our
process for anonymized data storing while still being able to identify
individual users who successfully completed a psychological study with the app.
|
[
{
"version": "v1",
"created": "Sun, 18 Mar 2018 19:24:56 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Beierle",
"Felix",
""
],
[
"Tran",
"Vinh Thuy",
""
],
[
"Allemand",
"Mathias",
""
],
[
"Neff",
"Patrick",
""
],
[
"Schlee",
"Winfried",
""
],
[
"Probst",
"Thomas",
""
],
[
"Pryss",
"Rüdiger",
""
],
[
"Zimmermann",
"Johannes",
""
]
] |
new_dataset
| 0.998635 |
1803.06874
|
Christian Timmerer
|
Anatoliy Zabrovskiy, Christian Feldmann, Christian Timmerer
|
Multi-Codec DASH Dataset
|
6 pages, submitted to ACM MMSys'18 (dataset track)
| null | null | null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The number of bandwidth-hungry applications and services is constantly
growing. HTTP adaptive streaming of audio-visual content accounts for the
majority of today's internet traffic. Although the internet bandwidth increases
also constantly, audio-visual compression technology is inevitable and we are
currently facing the challenge to be confronted with multiple video codecs.
This paper proposes a multi-codec DASH dataset comprising AVC, HEVC, VP9, and
AV1 in order to enable interoperability testing and streaming experiments for
the efficient usage of these codecs under various conditions. We adopt state of
the art encoding and packaging options and also provide basic quality metrics
along with the DASH segments. Additionally, we briefly introduce a multi-codec
DASH scheme and possible usage scenarios. Finally, we provide a preliminary
evaluation of the encoding efficiency in the context of HTTP adaptive streaming
services and applications.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2018 11:32:36 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Zabrovskiy",
"Anatoliy",
""
],
[
"Feldmann",
"Christian",
""
],
[
"Timmerer",
"Christian",
""
]
] |
new_dataset
| 0.999739 |
1803.06990
|
Wayan Wicke
|
Harald Unterweger, Jens Kirchner, Wayan Wicke, Arman Ahmadzadeh, Doaa
Ahmed, Vahid Jamali, Christoph Alexiou, Georg Fischer, and Robert Schober
|
Experimental Molecular Communication Testbed Based on Magnetic
Nanoparticles in Duct Flow
|
6 pages, 4 figures, 1 table, invited paper in IEEE International
Workshop on Signal Processing Advances in Wireless Communications (SPAWC)
2018
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Simple and easy to implement testbeds are needed to further advance molecular
communication research. To this end, this paper presents an in-vessel molecular
communication testbed using magnetic nanoparticles dispersed in an aqueous
suspension as they are also used for drug targeting in biotechnology. The
transmitter is realized by an electronic pump for injection via a Y-connector.
A second pump provides a background flow for signal propagation. For signal
reception, we employ a susceptometer, an electronic device including a coil,
where the magnetic particles move through and generate an electrical signal. We
present experimental results for the transmission of a binary sequence and the
system response following a single injection. For this flow-driven particle
transport, we propose a simple parameterized mathematical model for evaluating
the system response.
|
[
{
"version": "v1",
"created": "Mon, 19 Mar 2018 15:28:05 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Unterweger",
"Harald",
""
],
[
"Kirchner",
"Jens",
""
],
[
"Wicke",
"Wayan",
""
],
[
"Ahmadzadeh",
"Arman",
""
],
[
"Ahmed",
"Doaa",
""
],
[
"Jamali",
"Vahid",
""
],
[
"Alexiou",
"Christoph",
""
],
[
"Fischer",
"Georg",
""
],
[
"Schober",
"Robert",
""
]
] |
new_dataset
| 0.998807 |
cs/0610145
|
Peter Berlin
|
Peter Berlin, Baris Nakiboglu, Bixio Rimoldi, Emre Telatar
|
A Simple Converse of Burnashev's Reliability
|
10 pages, 1 figure, updated missing reference
|
IEEE Transactions on Information Theory, 55(7):3074-3080, July
2009
|
10.1109/TIT.2009.2021322
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a remarkable paper published in 1976, Burnashev determined the reliability
function of variable-length block codes over discrete memoryless channels with
feedback. Subsequently, an alternative achievability proof was obtained by
Yamamoto and Itoh via a particularly simple and instructive scheme. Their idea
is to alternate between a communication and a confirmation phase until the
receiver detects the codeword used by the sender to acknowledge that the
message is correct. We provide a converse that parallels the Yamamoto-Itoh
achievability construction. Besides being simpler than the original, the
proposed converse suggests that a communication and a confirmation phase are
implicit in any scheme for which the probability of error decreases with the
largest possible exponent. The proposed converse also makes it intuitively
clear why the terms that appear in Burnashev's exponent are necessary.
|
[
{
"version": "v1",
"created": "Wed, 25 Oct 2006 15:51:01 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Oct 2006 18:58:36 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Sep 2008 19:31:06 GMT"
}
] | 2018-03-20T00:00:00 |
[
[
"Berlin",
"Peter",
""
],
[
"Nakiboglu",
"Baris",
""
],
[
"Rimoldi",
"Bixio",
""
],
[
"Telatar",
"Emre",
""
]
] |
new_dataset
| 0.991861 |
0903.0197
|
Sean Cleary
|
Sean Cleary and Katherine St. John
|
Rotation Distance is Fixed-Parameter Tractable
|
9 pages, 3 figures
|
Inform. Process. Lett. 109 (2009), no. 16, 918-922
| null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rotation distance between trees measures the number of simple operations it
takes to transform one tree into another. There are no known polynomial-time
algorithms for computing rotation distance. In the case of ordered rooted
trees, we show that the rotation distance between two ordered trees is
fixed-parameter tractable, in the parameter, k, the rotation distance. The
proof relies on the kernalization of the initial trees to trees with size
bounded by 7k.
|
[
{
"version": "v1",
"created": "Mon, 2 Mar 2009 01:36:50 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Cleary",
"Sean",
""
],
[
"John",
"Katherine St.",
""
]
] |
new_dataset
| 0.999347 |
1701.06341
|
Ramji Venkataramanan
|
Mahed Abroshan, Ramji Venkataramanan and Albert Guillen i Fabregas
|
Coding for Segmented Edit Channels
|
Appeared in IEEE Transactions on Information Theory
|
IEEE Transactions on Information Theory, vol. 64, no.4, pp.
3086-3098, April 2018
|
10.1109/TIT.2017.2788143
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers insertion and deletion channels with the additional
assumption that the channel input sequence is implicitly divided into segments
such that at most one edit can occur within a segment. No segment markers are
available in the received sequence. We propose code constructions for the
segmented deletion, segmented insertion, and segmented insertion-deletion
channels based on subsets of Varshamov-Tenengolts codes chosen with
pre-determined prefixes and/or suffixes. The proposed codes, constructed for
any finite alphabet, are zero-error and can be decoded segment-by-segment. We
also derive an upper bound on the rate of any zero-error code for the segmented
edit channel, in terms of the segment length. This upper bound shows that the
rate scaling of the proposed codes as the segment length increases is the same
as that of the maximal code.
|
[
{
"version": "v1",
"created": "Mon, 23 Jan 2017 11:43:00 GMT"
},
{
"version": "v2",
"created": "Fri, 17 Feb 2017 18:44:43 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Aug 2017 09:46:13 GMT"
},
{
"version": "v4",
"created": "Fri, 16 Mar 2018 10:00:24 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Abroshan",
"Mahed",
""
],
[
"Venkataramanan",
"Ramji",
""
],
[
"Fabregas",
"Albert Guillen i",
""
]
] |
new_dataset
| 0.999263 |
1710.04123
|
Liu Feng
|
Feng Liu
|
City Brain, a New Architecture of Smart City Based on the Internet Brain
|
12pages, 5 figures,25conference
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the ten years after the Smart City was put forward, there are still
problems like unclear concept, lack of top-down design and information island.
With the further development of the Internet, the brain-like architecture of
the Internet is becoming clearer and clearer. As a product of combination of
city buildings and the Internet, the Smart City will also have a new
architecture, and the city brain thus appears. Based on the Internet Brain,
this paper describes how to construct the Smart City in the form of brain-like
tissue, and how to evaluate the construction level of the Smart City (City IQ)
relying on the Big SNS (city neural networks) and city cloud reflex arcs.
|
[
{
"version": "v1",
"created": "Sun, 24 Sep 2017 05:04:25 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Oct 2017 06:04:39 GMT"
},
{
"version": "v3",
"created": "Fri, 16 Mar 2018 07:48:08 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Liu",
"Feng",
""
]
] |
new_dataset
| 0.997974 |
1802.02398
|
Hongmin Li
|
Hongmin Li, Guoqi Li, Hanchao Liu, Luping Shi
|
Super-resolution of spatiotemporal event-stream image captured by the
asynchronous temporal contrast vision sensor
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Super-resolution (SR) is a useful technology to generate a high-resolution
(HR) visual output from the low-resolution (LR) visual inputs overcoming the
physical limitations of the cameras. However, SR has not been applied to
enhance the resolution of spatiotemporal event-stream images captured by the
frame-free dynamic vision sensors (DVSs). SR of event-stream image is
fundamentally different from existing frame-based schemes since basically each
pixel value of DVS images is an event sequence. In this work, a two-stage
scheme is proposed to solve the SR problem of the spatiotemporal event-stream
image. We use a nonhomogeneous Poisson point process to model the event
sequence, and sample the events of each pixel by simulating a nonhomogeneous
Poisson process according to the specified event number and rate function.
Firstly, the event number of each pixel of the HR DVS image is determined with
a sparse signal representation based method to obtain the HR event-count map
from that of the LR DVS recording. The rate function over time line of the
point process of each HR pixel is computed using a spatiotemporal filter on the
corresponding LR neighbor pixels. Secondly, the event sequence of each new
pixel is generated with a thinning based event sampling algorithm. Two metrics
are proposed to assess the event-stream SR results. The proposed method is
demonstrated through obtaining HR event-stream images from a series of DVS
recordings with the proposed method. Results show that the upscaled HR event
streams has perceptually higher spatial texture detail than the LR DVS images.
Besides, the temporal properties of the upscaled HR event streams match that of
the original input very well. This work enables many potential applications of
event-based vision.
|
[
{
"version": "v1",
"created": "Wed, 7 Feb 2018 12:14:56 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Mar 2018 10:39:03 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Li",
"Hongmin",
""
],
[
"Li",
"Guoqi",
""
],
[
"Liu",
"Hanchao",
""
],
[
"Shi",
"Luping",
""
]
] |
new_dataset
| 0.974087 |
1802.09110
|
Marko Mitrovic
|
Marko Mitrovic, Moran Feldman, Andreas Krause, Amin Karbasi
|
Submodularity on Hypergraphs: From Sets to Sequences
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a nutshell, submodular functions encode an intuitive notion of diminishing
returns. As a result, submodularity appears in many important machine learning
tasks such as feature selection and data summarization. Although there has been
a large volume of work devoted to the study of submodular functions in recent
years, the vast majority of this work has been focused on algorithms that
output sets, not sequences. However, in many settings, the order in which we
output items can be just as important as the items themselves.
To extend the notion of submodularity to sequences, we use a directed graph
on the items where the edges encode the additional value of selecting items in
a particular order. Existing theory is limited to the case where this
underlying graph is a directed acyclic graph. In this paper, we introduce two
new algorithms that provably give constant factor approximations for general
graphs and hypergraphs having bounded in or out degrees. Furthermore, we show
the utility of our new algorithms for real-world applications in movie
recommendation, online link prediction, and the design of course sequences for
MOOCs.
|
[
{
"version": "v1",
"created": "Mon, 26 Feb 2018 00:07:17 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Mar 2018 22:19:36 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Mitrovic",
"Marko",
""
],
[
"Feldman",
"Moran",
""
],
[
"Krause",
"Andreas",
""
],
[
"Karbasi",
"Amin",
""
]
] |
new_dataset
| 0.973712 |
1803.03422
|
Mordechai Guri
|
Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici
|
MOSQUITO: Covert Ultrasonic Transmissions between Two Air-Gapped
Computers using Speaker-to-Speaker Communication
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we show how two (or more) airgapped computers in the same room,
equipped with passive speakers, headphones, or earphones can covertly exchange
data via ultrasonic waves. Microphones are not required. Our method is based on
the capability of a malware to exploit a specific audio chip feature in order
to reverse the connected speakers from output devices into input devices -
unobtrusively rendering them microphones. We discuss the attack model and
provide technical background and implementation details. We show that although
the reversed speakers/headphones/earphones were not originally designed to
perform as microphones, they still respond well to the near-ultrasonic range
(18kHz to 24kHz). We evaluate the communication channel with different
equipment, and at various distances and transmission speeds, and also discuss
some practical considerations. Our results show that the speaker-to-speaker
communication can be used to covertly transmit data between two air-gapped
computers positioned a maximum of nine meters away from one another. Moreover,
we show that two (microphone-less) headphones can exchange data from a distance
of three meters apart. This enables 'headphones-to-headphones' covert
communication, which is discussed for the first time in this paper.
|
[
{
"version": "v1",
"created": "Fri, 9 Mar 2018 09:01:30 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Mar 2018 10:38:38 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Guri",
"Mordechai",
""
],
[
"Solewicz",
"Yosef",
""
],
[
"Daidakulov",
"Andrey",
""
],
[
"Elovici",
"Yuval",
""
]
] |
new_dataset
| 0.99779 |
1803.05365
|
Chris Mitchell
|
Chris J Mitchell
|
The Hsu-Harn-Mu-Zhang-Zhu group key establishment protocol is insecure
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A significant security vulnerability in a recently published group key
establishment protocol is described. This vulnerability allows a malicious
insider to fraudulently establish a group key with an innocent victim, with the
key chosen by the attacker. This shortcoming is sufficiently serious that the
protocol should not be used.
|
[
{
"version": "v1",
"created": "Wed, 14 Mar 2018 15:43:13 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Mar 2018 14:28:30 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Mitchell",
"Chris J",
""
]
] |
new_dataset
| 0.957477 |
1803.06121
|
Jinyong Jeong
|
Jinyong Jeong, Younggun Cho, Young-Sik Shin, Hyunchul Roh, Ayoung Kim
|
Complex Urban LiDAR Data Set
|
Accepted to ICRA2018
| null | null | null |
cs.RO
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
This paper presents a Light Detection and Ranging (LiDAR) data set that
targets complex urban environments. Urban environments with high-rise buildings
and congested traffic pose a significant challenge for many robotics
applications. The presented data set is unique in the sense it is able to
capture the genuine features of an urban environment (e.g. metropolitan areas,
large building complexes and underground parking lots). Data of two-dimensional
(2D) and threedimensional (3D) LiDAR, which are typical types of LiDAR sensors,
are provided in the data set. The two 16-ray 3D LiDARs are tilted on both sides
for maximal coverage. One 2D LiDAR faces backward while the other faces
forwards to collect data of roads and buildings, respectively. Raw sensor data
from Fiber Optic Gyro (FOG), Inertial Measurement Unit (IMU), and the Global
Positioning System (GPS) are presented in a file format for vehicle pose
estimation. The pose information of the vehicle estimated at 100 Hz is also
presented after applying the graph simultaneous localization and mapping (SLAM)
algorithm. For the convenience of development, the file player and data viewer
in Robot Operating System (ROS) environment were also released via the web
page. The full data sets are available at: http://irap.kaist.ac.kr/dataset. In
this website, 3D preview of each data set is provided using WebGL.
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2018 09:23:40 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Jeong",
"Jinyong",
""
],
[
"Cho",
"Younggun",
""
],
[
"Shin",
"Young-Sik",
""
],
[
"Roh",
"Hyunchul",
""
],
[
"Kim",
"Ayoung",
""
]
] |
new_dataset
| 0.998896 |
1803.06141
|
Hossein Kashiyani
|
Hossein Kashiyani, Shahriar B. Shokouhi
|
Patchwise object tracking via structural local sparse appearance model
|
6 pages, 3 figures, Accepted by ICCKE 2017
| null |
10.1109/ICCKE.2017.8167940
| null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
In this paper, we propose a robust visual tracking method which exploits the
relationships of targets in adjacent frames using patchwise joint sparse
representation. Two sets of overlapping patches with different sizes are
extracted from target candidates to construct two dictionaries with
consideration of joint sparse representation. By applying this representation
into structural sparse appearance model, we can take two-fold advantages.
First, the correlation of target patches over time is considered. Second, using
this local appearance model with different patch sizes takes into account local
features of target thoroughly. Furthermore, the position of candidate patches
and their occlusion levels are utilized simultaneously to obtain the final
likelihood of target candidates. Evaluations on recent challenging benchmark
show that our tracking method outperforms the state-of-the-art trackers.
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2018 10:06:37 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Kashiyani",
"Hossein",
""
],
[
"Shokouhi",
"Shahriar B.",
""
]
] |
new_dataset
| 0.963471 |
1803.06168
|
Laure Daviaud
|
Mikolaj Bojanczyk, Laure Daviaud and Krishna Shankara Narayanan
|
Regular and First Order List Functions
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define two classes of functions, called regular (respectively,
first-order) list functions, which manipulate objects such as lists, lists of
lists, pairs of lists, lists of pairs of lists, etc. The definition is in the
style of regular expressions: the functions are constructed by starting with
some basic functions (e.g. projections from pairs, or head and tail operations
on lists) and putting them together using four combinators (most importantly,
composition of functions). Our main results are that first-order list functions
are exactly the same as first-order transductions, under a suitable encoding of
the inputs; and the regular list functions are exactly the same as
MSO-transductions.
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2018 11:25:25 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Bojanczyk",
"Mikolaj",
""
],
[
"Daviaud",
"Laure",
""
],
[
"Narayanan",
"Krishna Shankara",
""
]
] |
new_dataset
| 0.99913 |
1803.06294
|
Alberto Rodriguez-Natal
|
Alberto Rodriguez-Natal, Vina Ermagan, Kien Nguyen, Sharon Barkai,
Yusheng Ji, Fabio Maino, Albert Cabellos-Aparicio
|
SDN for End-Nodes: Scenario Analysis and Architectural Guidelines
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The advent of SDN has brought a plethora of new architectures and controller
designs for many use-cases and scenarios. Existing SDN deployments focus on
campus, datacenter and WAN networks. However, little research efforts have been
devoted to the scenario of effectively controlling a full deployment of
end-nodes (e.g. smartphones) that are transient and scattered across the
Internet. In this paper, we present a rigorous analysis of the challenges
associated with an SDN architecture for end-nodes, show that such challenges
are not found in existing SDN scenarios, and provide practical design
guidelines to address them. Then, and following these guidelines we present a
reference architecture based on a decentralized, distributed and symmetric
controller with a connectionless pull-oriented southbound and an intent-driven
northbound. Finally, we measure a proof-of-concept deployment to assess the
validity of the analysis as well as the architecture.
|
[
{
"version": "v1",
"created": "Fri, 16 Mar 2018 16:17:32 GMT"
}
] | 2018-03-19T00:00:00 |
[
[
"Rodriguez-Natal",
"Alberto",
""
],
[
"Ermagan",
"Vina",
""
],
[
"Nguyen",
"Kien",
""
],
[
"Barkai",
"Sharon",
""
],
[
"Ji",
"Yusheng",
""
],
[
"Maino",
"Fabio",
""
],
[
"Cabellos-Aparicio",
"Albert",
""
]
] |
new_dataset
| 0.99894 |
1511.00925
|
Jamie Morgenstern
|
Justin Hsu, Jamie Morgenstern, Ryan Rogers, Aaron Roth, Rakesh Vohra
|
Do Prices Coordinate Markets?
| null | null |
10.1145/2897518.2897559
| null |
cs.GT cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Walrasian equilibrium prices can be said to coordinate markets: They support
a welfare optimal allocation in which each buyer is buying bundle of goods that
is individually most preferred. However, this clean story has two caveats.
First, the prices alone are not sufficient to coordinate the market, and buyers
may need to select among their most preferred bundles in a coordinated way to
find a feasible allocation. Second, we don't in practice expect to encounter
exact equilibrium prices tailored to the market, but instead only approximate
prices, somehow encoding "distributional" information about the market. How
well do prices work to coordinate markets when tie-breaking is not coordinated,
and they encode only distributional information?
We answer this question. First, we provide a genericity condition such that
for buyers with Matroid Based Valuations, overdemand with respect to
equilibrium prices is at most 1, independent of the supply of goods, even when
tie-breaking is done in an uncoordinated fashion. Second, we provide
learning-theoretic results that show that such prices are robust to changing
the buyers in the market, so long as all buyers are sampled from the same
(unknown) distribution.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2015 14:39:32 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Dec 2015 15:32:41 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Apr 2016 18:28:23 GMT"
},
{
"version": "v4",
"created": "Thu, 12 May 2016 20:11:18 GMT"
},
{
"version": "v5",
"created": "Wed, 22 Jun 2016 14:20:14 GMT"
}
] | 2018-03-16T00:00:00 |
[
[
"Hsu",
"Justin",
""
],
[
"Morgenstern",
"Jamie",
""
],
[
"Rogers",
"Ryan",
""
],
[
"Roth",
"Aaron",
""
],
[
"Vohra",
"Rakesh",
""
]
] |
new_dataset
| 0.998751 |
1607.02250
|
Yiming Cui
|
Yiming Cui, Ting Liu, Zhipeng Chen, Shijin Wang and Guoping Hu
|
Consensus Attention-based Neural Networks for Chinese Reading
Comprehension
|
9+1 pages, published at COLING 2016
| null | null | null |
cs.CL cs.NE
|
http://creativecommons.org/licenses/by/4.0/
|
Reading comprehension has embraced a booming in recent NLP research. Several
institutes have released the Cloze-style reading comprehension data, and these
have greatly accelerated the research of machine comprehension. In this work,
we firstly present Chinese reading comprehension datasets, which consist of
People Daily news dataset and Children's Fairy Tale (CFT) dataset. Also, we
propose a consensus attention-based neural network architecture to tackle the
Cloze-style reading comprehension problem, which aims to induce a consensus
attention over every words in the query. Experimental results show that the
proposed neural network significantly outperforms the state-of-the-art
baselines in several public datasets. Furthermore, we setup a baseline for
Chinese reading comprehension task, and hopefully this would speed up the
process for future research.
|
[
{
"version": "v1",
"created": "Fri, 8 Jul 2016 06:46:48 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Jul 2016 05:49:42 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Mar 2018 09:21:09 GMT"
}
] | 2018-03-16T00:00:00 |
[
[
"Cui",
"Yiming",
""
],
[
"Liu",
"Ting",
""
],
[
"Chen",
"Zhipeng",
""
],
[
"Wang",
"Shijin",
""
],
[
"Hu",
"Guoping",
""
]
] |
new_dataset
| 0.99268 |
1611.02787
|
Bum Jun Kwon
|
Bum Jun Kwon, Virinchi Srinivas, Amol Deshpande, Tudor Dumitra\c{s}
|
Catching Worms, Trojan Horses and PUPs: Unsupervised Detection of Silent
Delivery Campaigns
| null | null |
10.14722/ndss.2017.23220
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The growing commoditization of the underground economy has given rise to
malware delivery networks, which charge fees for quickly delivering malware or
unwanted software to a large number of hosts. To provide this service, a key
method is the orchestration of silent delivery campaigns, which involve a group
of downloaders that receive remote commands and that deliver their payloads
without any user interaction. These campaigns have not been characterized
systematically, unlike other aspects of malware delivery networks. Moreover,
silent delivery campaigns can evade detection by relying on inconspicuous
downloaders on the client side and on disposable domain names on the server
side. We describe Beewolf, a system for detecting silent delivery campaigns
from Internet-wide records of download events. The key observation behind our
system is that the downloaders involved in these campaigns frequently retrieve
payloads in lockstep. Beewolf identifies such locksteps in an unsupervised and
deterministic manner. By exploiting novel techniques and empirical
observations, Beewolf can operate on streaming data. We utilize Beewolf to
study silent delivery campaigns at scale, on a data set of 33.3 million
download events. This investigation yields novel findings, e.g. malware
distributed through compromised software update channels, a substantial overlap
between the delivery ecosystems for malware and unwanted software, and several
types of business relationships within these ecosystems. Beewolf achieves over
92% true positives and fewer than 5% false positives. Moreover, Beewolf can
detect suspicious downloaders a median of 165 days ahead of existing anti-virus
products and payload-hosting domains a median of 196 days ahead of existing
blacklists.
|
[
{
"version": "v1",
"created": "Wed, 9 Nov 2016 01:11:45 GMT"
}
] | 2018-03-16T00:00:00 |
[
[
"Kwon",
"Bum Jun",
""
],
[
"Srinivas",
"Virinchi",
""
],
[
"Deshpande",
"Amol",
""
],
[
"Dumitraş",
"Tudor",
""
]
] |
new_dataset
| 0.99736 |
1709.08299
|
Yiming Cui
|
Yiming Cui, Ting Liu, Zhipeng Chen, Wentao Ma, Shijin Wang and Guoping
Hu
|
Dataset for the First Evaluation on Chinese Machine Reading
Comprehension
|
5 pages, published at LREC 2018
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
Machine Reading Comprehension (MRC) has become enormously popular recently
and has attracted a lot of attention. However, existing reading comprehension
datasets are mostly in English. To add diversity in reading comprehension
datasets, in this paper we propose a new Chinese reading comprehension dataset
for accelerating related research in the community. The proposed dataset
contains two different types: cloze-style reading comprehension and user query
reading comprehension, associated with large-scale training data as well as
human-annotated validation and hidden test set. Along with this dataset, we
also hosted the first Evaluation on Chinese Machine Reading Comprehension
(CMRC-2017) and successfully attracted tens of participants, which suggest the
potential impact of this dataset.
|
[
{
"version": "v1",
"created": "Mon, 25 Sep 2017 03:14:01 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Mar 2018 09:22:50 GMT"
}
] | 2018-03-16T00:00:00 |
[
[
"Cui",
"Yiming",
""
],
[
"Liu",
"Ting",
""
],
[
"Chen",
"Zhipeng",
""
],
[
"Ma",
"Wentao",
""
],
[
"Wang",
"Shijin",
""
],
[
"Hu",
"Guoping",
""
]
] |
new_dataset
| 0.981798 |
1803.02952
|
Tianran Hu
|
Tianran Hu, Anbang Xu, Zhe Liu, Quanzeng You, Yufan Guo, Vibha Sinha,
Jiebo Luo, Rama Akkiraju
|
Touch Your Heart: A Tone-aware Chatbot for Customer Care on Social Media
|
12 pages, CHI 2018
| null | null | null |
cs.HC
|
http://creativecommons.org/licenses/by-sa/4.0/
|
Chatbot has become an important solution to rapidly increasing customer care
demands on social media in recent years. However, current work on chatbot for
customer care ignores a key to impact user experience - tones. In this work, we
create a novel tone-aware chatbot that generates toned responses to user
requests on social media. We first conduct a formative research, in which the
effects of tones are studied. Significant and various influences of different
tones on user experience are uncovered in the study. With the knowledge of
effects of tones, we design a deep learning based chatbot that takes tone
information into account. We train our system on over 1.5 million real customer
care conversations collected from Twitter. The evaluation reveals that our
tone-aware chatbot generates as appropriate responses to user requests as human
agents. More importantly, our chatbot is perceived to be even more empathetic
than human agents.
|
[
{
"version": "v1",
"created": "Thu, 8 Mar 2018 03:18:41 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Mar 2018 01:00:25 GMT"
}
] | 2018-03-16T00:00:00 |
[
[
"Hu",
"Tianran",
""
],
[
"Xu",
"Anbang",
""
],
[
"Liu",
"Zhe",
""
],
[
"You",
"Quanzeng",
""
],
[
"Guo",
"Yufan",
""
],
[
"Sinha",
"Vibha",
""
],
[
"Luo",
"Jiebo",
""
],
[
"Akkiraju",
"Rama",
""
]
] |
new_dataset
| 0.999315 |
1803.05449
|
Alexis Conneau
|
Alexis Conneau and Douwe Kiela
|
SentEval: An Evaluation Toolkit for Universal Sentence Representations
|
LREC 2018
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce SentEval, a toolkit for evaluating the quality of universal
sentence representations. SentEval encompasses a variety of tasks, including
binary and multi-class classification, natural language inference and sentence
similarity. The set of tasks was selected based on what appears to be the
community consensus regarding the appropriate evaluations for universal
sentence representations. The toolkit comes with scripts to download and
preprocess datasets, and an easy interface to evaluate sentence encoders. The
aim is to provide a fairer, less cumbersome and more centralized way for
evaluating sentence representations.
|
[
{
"version": "v1",
"created": "Wed, 14 Mar 2018 18:01:15 GMT"
}
] | 2018-03-16T00:00:00 |
[
[
"Conneau",
"Alexis",
""
],
[
"Kiela",
"Douwe",
""
]
] |
new_dataset
| 0.958783 |
1803.05457
|
Carissa Schoenick
|
Peter Clark, Isaac Cowhey, Oren Etzioni, Tushar Khot, Ashish
Sabharwal, Carissa Schoenick, Oyvind Tafjord
|
Think you have Solved Question Answering? Try ARC, the AI2 Reasoning
Challenge
|
10 pages, 7 tables, 2 figures
| null | null | null |
cs.AI cs.CL cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new question set, text corpus, and baselines assembled to
encourage AI research in advanced question answering. Together, these
constitute the AI2 Reasoning Challenge (ARC), which requires far more powerful
knowledge and reasoning than previous challenges such as SQuAD or SNLI. The ARC
question set is partitioned into a Challenge Set and an Easy Set, where the
Challenge Set contains only questions answered incorrectly by both a
retrieval-based algorithm and a word co-occurence algorithm. The dataset
contains only natural, grade-school science questions (authored for human
tests), and is the largest public-domain set of this kind (7,787 questions). We
test several baselines on the Challenge Set, including leading neural models
from the SQuAD and SNLI tasks, and find that none are able to significantly
outperform a random baseline, reflecting the difficult nature of this task. We
are also releasing the ARC Corpus, a corpus of 14M science sentences relevant
to the task, and implementations of the three neural baseline models tested.
Can your model perform better? We pose ARC as a challenge to the community.
|
[
{
"version": "v1",
"created": "Wed, 14 Mar 2018 18:04:21 GMT"
}
] | 2018-03-16T00:00:00 |
[
[
"Clark",
"Peter",
""
],
[
"Cowhey",
"Isaac",
""
],
[
"Etzioni",
"Oren",
""
],
[
"Khot",
"Tushar",
""
],
[
"Sabharwal",
"Ashish",
""
],
[
"Schoenick",
"Carissa",
""
],
[
"Tafjord",
"Oyvind",
""
]
] |
new_dataset
| 0.983982 |
1803.05705
|
Fabian Klute
|
Fabian Klute and Martin N\"ollenburg
|
Minimizing Crossings in Constrained Two-Sided Circular Graph Layouts
|
This is the full version of a paper with the same title appearing in
the proceedings of the 34th International Symposium on Computational Geometry
(SoCG) 2018
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Circular layouts are a popular graph drawing style, where vertices are placed
on a circle and edges are drawn as straight chords. Crossing minimization in
circular layouts is \NP-hard. One way to allow for fewer crossings in practice
are two-sided layouts that draw some edges as curves in the exterior of the
circle. In fact, one- and two-sided circular layouts are equivalent to one-page
and two-page book drawings, i.e., graph layouts with all vertices placed on a
line (the spine) and edges drawn in one or two distinct half-planes (the pages)
bounded by the spine. In this paper we study the problem of minimizing the
crossings for a fixed cyclic vertex order by computing an optimal $k$-plane set
of exteriorly drawn edges for $k \ge 1$, extending the previously studied case
$k=0$. We show that this relates to finding bounded-degree maximum-weight
induced subgraphs of circle graphs, which is a graph-theoretic problem of
independent interest. We show \NP-hardness for arbitrary $k$, present an
efficient algorithm for $k=1$, and generalize it to an explicit \XP-time
algorithm for any fixed $k$. For the practically interesting case $k=1$ we
implemented our algorithm and present experimental results that confirm the
applicability of our algorithm.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2018 12:11:48 GMT"
}
] | 2018-03-16T00:00:00 |
[
[
"Klute",
"Fabian",
""
],
[
"Nöllenburg",
"Martin",
""
]
] |
new_dataset
| 0.97165 |
1611.08882
|
Ilias Giechaskiel
|
Ilias Giechaskiel and Kasper B. Rasmussen and Ken Eguro
|
Leaky Wires: Information Leakage and Covert Communication Between FPGA
Long Wires
| null | null |
10.1145/3196494.3196518
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Field-Programmable Gate Arrays (FPGAs) are integrated circuits that implement
reconfigurable hardware. They are used in modern systems, creating specialized,
highly-optimized integrated circuits without the need to design and manufacture
dedicated chips. As the capacity of FPGAs grows, it is increasingly common for
designers to incorporate implementations of algorithms and protocols from a
range of third-party sources. The monolithic nature of FPGAs means that all
on-chip circuits, including third party black-box designs, must share common
on-chip infrastructure, such as routing resources. In this paper, we observe
that a "long" routing wire carrying a logical 1 reduces the propagation delay
of other adjacent but unconnected long wires in the FPGA interconnect, thereby
leaking information about its state. We exploit this effect and propose a
communication channel that can be used for both covert transmissions between
circuits, and for exfiltration of secrets from the chip. We show that the
effect is measurable for both static and dynamic signals, and that it can be
detected using very small on-board circuits. In our prototype, we are able to
correctly infer the logical state of an adjacent long wire over 99% of the
time, even without error correction, and for signals that are maintained for as
little as 82us. Using a Manchester encoding scheme, our channel bandwidth is as
high as 6kbps. We characterize the channel in detail and show that it is
measurable even when multiple competing circuits are present and can be
replicated on different generations and families of Xilinx devices (Virtex 5,
Virtex 6, and Artix 7). Finally, we propose countermeasures that can be
deployed by systems and tools designers to reduce the impact of this
information leakage.
|
[
{
"version": "v1",
"created": "Sun, 27 Nov 2016 18:23:07 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Aug 2017 22:29:17 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Mar 2018 18:43:06 GMT"
}
] | 2018-03-15T00:00:00 |
[
[
"Giechaskiel",
"Ilias",
""
],
[
"Rasmussen",
"Kasper B.",
""
],
[
"Eguro",
"Ken",
""
]
] |
new_dataset
| 0.983194 |
1704.06716
|
Abhishek Gupta
|
Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore, Biswanath
Mukherjee
|
Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area
Network
| null | null |
10.1109/GLOCOM.2017.8254731
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Network Function Virtualization (NFV) aims to simplify deployment of network
services by running Virtual Network Functions (VNFs) on commercial
off-the-shelf servers. Service deployment involves placement of VNFs and
in-sequence routing of traffic flows through VNFs comprising a Service Chain
(SC). The joint VNF placement and traffic routing is usually referred as SC
mapping. In a Wide Area Network (WAN), a situation may arise where several
traffic flows, generated by many distributed node pairs, require the same SC,
one single instance (or occurrence) of that SC might not be enough. SC mapping
with multiple SC instances for the same SC turns out to be a very complex
problem, since the sequential traversal of VNFs has to be maintained while
accounting for traffic flows in various directions. Our study is the first to
deal with SC mapping with multiple SC instances to minimize network resource
consumption. Exact mathematical modeling of this problem results in a quadratic
formulation. We propose a two-phase column-generation-based model and solution
in order to get results over large network topologies within reasonable
computational times. Using such an approach, we observe that an appropriate
choice of only a small set of SC instances can lead to solution very close to
the minimum bandwidth consumption.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2017 22:23:27 GMT"
}
] | 2018-03-15T00:00:00 |
[
[
"Gupta",
"Abhishek",
""
],
[
"Jaumard",
"Brigitte",
""
],
[
"Tornatore",
"Massimo",
""
],
[
"Mukherjee",
"Biswanath",
""
]
] |
new_dataset
| 0.994829 |
1709.00265
|
Aitor Alvarez-Gila
|
Aitor Alvarez-Gila, Joost van de Weijer, Estibaliz Garrote
|
Adversarial Networks for Spatial Context-Aware Spectral Image
Reconstruction from RGB
|
Accepted at IEEE ICCVW 2017 - "Physics Based Vision meets Deep
Learning" Workshop (PBDL 2017). Added train-test splits and updated results
| null |
10.1109/ICCVW.2017.64
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hyperspectral signal reconstruction aims at recovering the original spectral
input that produced a certain trichromatic (RGB) response from a capturing
device or observer. Given the heavily underconstrained, non-linear nature of
the problem, traditional techniques leverage different statistical properties
of the spectral signal in order to build informative priors from real world
object reflectances for constructing such RGB to spectral signal mapping.
However, most of them treat each sample independently, and thus do not benefit
from the contextual information that the spatial dimensions can provide. We
pose hyperspectral natural image reconstruction as an image to image mapping
learning problem, and apply a conditional generative adversarial framework to
help capture spatial semantics. This is the first time Convolutional Neural
Networks -and, particularly, Generative Adversarial Networks- are used to solve
this task. Quantitative evaluation shows a Root Mean Squared Error (RMSE) drop
of 33.2% and a Relative RMSE drop of 54.0% on the ICVL natural hyperspectral
image dataset.
|
[
{
"version": "v1",
"created": "Fri, 1 Sep 2017 12:00:51 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Mar 2018 14:48:14 GMT"
}
] | 2018-03-15T00:00:00 |
[
[
"Alvarez-Gila",
"Aitor",
""
],
[
"van de Weijer",
"Joost",
""
],
[
"Garrote",
"Estibaliz",
""
]
] |
new_dataset
| 0.983852 |
1711.05581
|
Romain Jacob
|
Romain Jacob, Licong Zhang, Marco Zimmerling, Jan Beutel, Samarjit
Chakraborty, Lothar Thiele
|
TTW: A Time-Triggered-Wireless Design for CPS [ Extended version ]
|
13 pages, 8 figures. Extended version of the same paper, to be
published in the proceedings of DATE 2018
| null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by/4.0/
|
Wired field buses have proved their effectiveness to support Cyber-Physical
Systems (CPS). However, in avionics, for ease of deployment, or for new
functionality featuring mobile devices, there is a strong interest for wireless
solutions. Low-power wireless protocols have been proposed, but requirements of
a large class of CPS applications can still not be satisfied. This paper
presents Time-Triggered-Wireless (TTW), a distributed low-power wireless system
design that minimizes energy consumption and offers end-to-end timing
predictability, adaptability, reliability, low latency. Our evaluation shows a
reduction of communication latency by a factor 2x and of energy consumption by
33-40% compared to state-of-the-art approaches. This validates the suitability
of TTW for wireless CPS applications and opens the way for implementation and
real-world experience with industry partners.
|
[
{
"version": "v1",
"created": "Wed, 15 Nov 2017 14:15:34 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Mar 2018 10:17:43 GMT"
}
] | 2018-03-15T00:00:00 |
[
[
"Jacob",
"Romain",
""
],
[
"Zhang",
"Licong",
""
],
[
"Zimmerling",
"Marco",
""
],
[
"Beutel",
"Jan",
""
],
[
"Chakraborty",
"Samarjit",
""
],
[
"Thiele",
"Lothar",
""
]
] |
new_dataset
| 0.999846 |
1803.05039
|
Jice Wang
|
Jice Wang and Hongqi Wu
|
Android Inter-App Communication Threats, Solutions, and Challenges
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Researchers and commercial companies have made a lot of efforts on detecting
malware in Android platform. However, a recent malware threat, App collusion,
makes malware detection challenging. In App collusion, two or more Apps
collaborate to perform malicious actions by communicating with each other,
which makes single App analysis insufficient. In this paper, we first introduce
Android security mechanism and communication channels used by android
Applications. Then we summarize the security vulnerabilities and potential
threats introduced by App communication. Finally, we discuss state of art
researches and challenges on App collusion detection.
|
[
{
"version": "v1",
"created": "Tue, 13 Mar 2018 20:41:14 GMT"
}
] | 2018-03-15T00:00:00 |
[
[
"Wang",
"Jice",
""
],
[
"Wu",
"Hongqi",
""
]
] |
new_dataset
| 0.994745 |
1803.05210
|
Luca Ghiani
|
Valerio Mura, Giulia Orr\`u, Roberto Casula, Alessandra Sibiriu,
Giulia Loi, Pierluigi Tuveri, Luca Ghiani, and Gian Luca Marcialis
|
LivDet 2017 Fingerprint Liveness Detection Competition 2017
|
presented at ICB 2018
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fingerprint Presentation Attack Detection (FPAD) deals with distinguishing
images coming from artificial replicas of the fingerprint characteristic, made
up of materials like silicone, gelatine or latex, and images coming from alive
fingerprints. Images are captured by modern scanners, typically relying on
solid-state or optical technologies. Since from 2009, the Fingerprint Liveness
Detection Competition (LivDet) aims to assess the performance of the
state-of-the-art algorithms according to a rigorous experimental protocol and,
at the same time, a simple overview of the basic achievements. The competition
is open to all academics research centers and all companies that work in this
field. The positive, increasing trend of the participants number, which
supports the success of this initiative, is confirmed even this year: 17
algorithms were submitted to the competition, with a larger involvement of
companies and academies. This means that the topic is relevant for both sides,
and points out that a lot of work must be done in terms of fundamental and
applied research.
|
[
{
"version": "v1",
"created": "Wed, 14 Mar 2018 11:28:52 GMT"
}
] | 2018-03-15T00:00:00 |
[
[
"Mura",
"Valerio",
""
],
[
"Orrù",
"Giulia",
""
],
[
"Casula",
"Roberto",
""
],
[
"Sibiriu",
"Alessandra",
""
],
[
"Loi",
"Giulia",
""
],
[
"Tuveri",
"Pierluigi",
""
],
[
"Ghiani",
"Luca",
""
],
[
"Marcialis",
"Gian Luca",
""
]
] |
new_dataset
| 0.999494 |
1803.05223
|
Simon Ostermann
|
Simon Ostermann, Ashutosh Modi, Michael Roth, Stefan Thater, Manfred
Pinkal
|
MCScript: A Novel Dataset for Assessing Machine Comprehension Using
Script Knowledge
|
Accepted at LREC 2018
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a large dataset of narrative texts and questions about these
texts, intended to be used in a machine comprehension task that requires
reasoning using commonsense knowledge. Our dataset complements similar datasets
in that we focus on stories about everyday activities, such as going to the
movies or working in the garden, and that the questions require commonsense
knowledge, or more specifically, script knowledge, to be answered. We show that
our mode of data collection via crowdsourcing results in a substantial amount
of such inference questions. The dataset forms the basis of a shared task on
commonsense and script knowledge organized at SemEval 2018 and provides
challenging test cases for the broader natural language understanding
community.
|
[
{
"version": "v1",
"created": "Wed, 14 Mar 2018 11:59:13 GMT"
}
] | 2018-03-15T00:00:00 |
[
[
"Ostermann",
"Simon",
""
],
[
"Modi",
"Ashutosh",
""
],
[
"Roth",
"Michael",
""
],
[
"Thater",
"Stefan",
""
],
[
"Pinkal",
"Manfred",
""
]
] |
new_dataset
| 0.999722 |
1803.05278
|
Xiaobo Zhou
|
Xiaobo Zhou, Jun Li, Feng Shu, Qingqing Wu, Yongpeng Wu, Wen Chen, and
Hanzo Lajos
|
Secure SWIPT for Directional Modulation Aided AF Relaying Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Secure wireless information and power transfer based on directional
modulation is conceived for amplify-and-forward (AF) relaying networks.
Explicitly, we first formulate a secrecy rate maximization (SRM) problem, which
can be decomposed into a twin-level optimization problem and solved by a
one-dimensional (1D) search and semidefinite relaxation (SDR) technique. Then
in order to reduce the search complexity, we formulate an optimization problem
based on maximizing the signal-to-leakage-AN-noise-ratio (Max-SLANR) criterion,
and transform it into a SDR problem. Additionally, the relaxation is proved to
be tight according to the classic Karush-Kuhn-Tucker (KKT) conditions. Finally,
to reduce the computational complexity, a successive convex approximation (SCA)
scheme is proposed to find a near-optimal solution. The complexity of the SCA
scheme is much lower than that of the SRM and the Max-SLANR schemes. Simulation
results demonstrate that the performance of the SCA scheme is very close to
that of the SRM scheme in terms of its secrecy rate and bit error rate (BER),
but much better than that of the zero forcing (ZF) scheme.
|
[
{
"version": "v1",
"created": "Wed, 14 Mar 2018 13:45:41 GMT"
}
] | 2018-03-15T00:00:00 |
[
[
"Zhou",
"Xiaobo",
""
],
[
"Li",
"Jun",
""
],
[
"Shu",
"Feng",
""
],
[
"Wu",
"Qingqing",
""
],
[
"Wu",
"Yongpeng",
""
],
[
"Chen",
"Wen",
""
],
[
"Lajos",
"Hanzo",
""
]
] |
new_dataset
| 0.959131 |
1401.6312
|
Bart Bogaerts
|
Broes De Cat, Bart Bogaerts, Maurice Bruynooghe, Gerda Janssens and
Marc Denecker
|
Predicate Logic as a Modelling Language: The IDP System
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the technology of the time, Kowalski's seminal 1974 paper {\em Predicate
Logic as a Programming Language} was a breakthrough for the use of logic in
computer science. It introduced two fundamental ideas: on the declarative side,
the use of the Horn clause logic fragment of classical logic, which was soon
extended with negation as failure, on the procedural side the procedural
interpretation which made it possible to write algorithms in the formalism.
Since then, strong progress was made both on the declarative understanding of
the logic programming formalism and in automated reasoning technologies,
particularly in SAT solving, Constraint Programming and Answer Set Programming.
This has paved the way for the development of an extension of logic programming
that embodies a more pure view of logic as a modelling language and its role
for problem solving.
In this paper, we present the \idp language and system. The language is
essentially classical logic extended with one of logic programmings most
important contributions to knowledge representation: the representation of
complex definitions as rule sets under well-founded semantics. The system is a
knowledge base system: a system in which complex declarative information is
stored in a knowledge base which can be used to solve different computational
problems by applying multiple forms of inference. In this view, theories are
declarative modellings, bags of information, descriptions of possible states of
affairs. They are neither procedures nor descriptions of computational
problems. As such, the \idp language and system preserve the fundamental idea
of a declarative reading of logic programs, while they break with the
fundamental idea of the procedural interpretation of logic programs.
|
[
{
"version": "v1",
"created": "Fri, 24 Jan 2014 11:13:43 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Mar 2016 09:43:32 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Mar 2018 13:06:19 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"De Cat",
"Broes",
""
],
[
"Bogaerts",
"Bart",
""
],
[
"Bruynooghe",
"Maurice",
""
],
[
"Janssens",
"Gerda",
""
],
[
"Denecker",
"Marc",
""
]
] |
new_dataset
| 0.992888 |
1611.00616
|
Jiafeng Xu
|
Jiafeng Xu, Karl Henning Halse
|
Dual Quaternion Variational Integrator for Rigid Body Dynamic Simulation
| null | null | null | null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a symplectic dual quaternion variational integrator(DQVI) for
simulating single rigid body motion in all six degrees of freedom. Dual
quaternion is used to represent rigid body kinematics and one-step Lie group
variational integrator is used to conserve the geometric structure, energy and
momentum of the system during the simulation. The combination of these two
becomes the first Lie group variational integrator for rigid body simulation
without decoupling translations and rotations. Newton-Raphson method is used to
solve the recursive dynamic equation. This method is suitable for real-time
rigid body simulations with high precision under large time step. DQVI respects
the symplectic structure of the system with excellent long-term conservation of
geometry structure, momentum and energy. It also allows the reference point and
6-by-6 inertia matrix to be arbitrarily defined, which is very convenient for a
variety of engineering problems.
|
[
{
"version": "v1",
"created": "Wed, 2 Nov 2016 14:02:16 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Mar 2018 15:49:09 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Xu",
"Jiafeng",
""
],
[
"Halse",
"Karl Henning",
""
]
] |
new_dataset
| 0.994376 |
1704.03329
|
Eike Hermann M\"uller
|
William R. Saunders and James Grant and Eike H. M\"uller
|
A Domain Specific Language for Performance Portable Molecular Dynamics
Algorithms
|
24 pages, 12 figures, 11 tables, accepted for publication in Computer
Physics Communications on 12 Nov 2017
| null |
10.1016/j.cpc.2017.11.006
| null |
cs.DC cs.SE physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Developers of Molecular Dynamics (MD) codes face significant challenges when
adapting existing simulation packages to new hardware. In a continuously
diversifying hardware landscape it becomes increasingly difficult for
scientists to be experts both in their own domain (physics/chemistry/biology)
and specialists in the low level parallelisation and optimisation of their
codes. To address this challenge, we describe a "Separation of Concerns"
approach for the development of parallel and optimised MD codes: the science
specialist writes code at a high abstraction level in a domain specific
language (DSL), which is then translated into efficient computer code by a
scientific programmer. In a related context, an abstraction for the solution of
partial differential equations with grid based methods has recently been
implemented in the (Py)OP2 library. Inspired by this approach, we develop a
Python code generation system for molecular dynamics simulations on different
parallel architectures, including massively parallel distributed memory systems
and GPUs. We demonstrate the efficiency of the auto-generated code by studying
its performance and scalability on different hardware and compare it to other
state-of-the-art simulation packages. With growing data volumes the extraction
of physically meaningful information from the simulation becomes increasingly
challenging and requires equally efficient implementations. A particular
advantage of our approach is the easy expression of such analysis algorithms.
We consider two popular methods for deducing the crystalline structure of a
material from the local environment of each atom, show how they can be
expressed in our abstraction and implement them in the code generation
framework.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 14:52:55 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Nov 2017 15:02:44 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Saunders",
"William R.",
""
],
[
"Grant",
"James",
""
],
[
"Müller",
"Eike H.",
""
]
] |
new_dataset
| 0.9992 |
1705.06860
|
Sha Hu
|
Sha Hu, Fredrik Rusek, and Ove Edfors
|
Beyond Massive-MIMO: The Potential of Positioning with Large Intelligent
Surfaces
|
Submitted to IEEE Trans. on Signal Processing on Apr. 2017; 30 pages;
13 figures
| null |
10.1109/TSP.2018.2795547
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the potential for positioning with a system where antenna arrays
are deployed as a large intelligent surface (LIS), which is a newly proposed
concept beyond massive-MIMO where future man-made structures are electronically
active with integrated electronics and wireless communication making the entire
environment \lq\lq{}intelligent\rq\rq{}. In a first step, we derive
Fisher-information and Cram\'{e}r-Rao lower bounds (CRLBs) in closed-form for
positioning a terminal located perpendicular to the center of the LIS, whose
location we refer to as being on the central perpendicular line (CPL) of the
LIS. For a terminal that is not on the CPL, closed-form expressions of the
Fisher-information and CRLB seem out of reach, and we alternatively find
approximations of them which are shown to be accurate. Under mild conditions,
we show that the CRLB for all three Cartesian dimensions ($x$, $y$ and $z$)
decreases quadratically in the surface-area of the LIS, except for a terminal
exactly on the CPL where the CRLB for the $z$-dimension (distance from the LIS)
decreases linearly in the same. In a second step, we analyze the CRLB for
positioning when there is an unknown phase $\varphi$ presented in the analog
circuits of the LIS. We then show that the CRLBs are dramatically increased for
all three dimensions but decrease in the third-order of the surface-area.
Moreover, with an infinitely large LIS the CRLB for the $z$-dimension with an
unknown $\varphi$ is 6 dB higher than the case without phase uncertainty, and
the CRLB for estimating $\varphi$ converges to a constant that is independent
of the wavelength $\lambda$. At last, we extensively discuss the impact of
centralized and distributed deployments of LIS, and show that a distributed
deployment of LIS can enlarge the coverage for terminal-positioning and improve
the overall positioning performance.
|
[
{
"version": "v1",
"created": "Fri, 19 May 2017 04:43:09 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Hu",
"Sha",
""
],
[
"Rusek",
"Fredrik",
""
],
[
"Edfors",
"Ove",
""
]
] |
new_dataset
| 0.99799 |
1705.09776
|
Xinfeng Zhang
|
Lingyu Duan, Wei Sun, Xinfeng Zhang, Shiqi Wang, Jie Chen, Jianxiong
Yin, Simon See, Tiejun Huang, Alex C. Kot, Wen Gao
|
Fast MPEG-CDVS Encoder with GPU-CPU Hybrid Computing
| null | null |
10.1109/TIP.2018.2794203
| null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The compact descriptors for visual search (CDVS) standard from ISO/IEC moving
pictures experts group (MPEG) has succeeded in enabling the interoperability
for efficient and effective image retrieval by standardizing the bitstream
syntax of compact feature descriptors. However, the intensive computation of
CDVS encoder unfortunately hinders its widely deployment in industry for
large-scale visual search. In this paper, we revisit the merits of low
complexity design of CDVS core techniques and present a very fast CDVS encoder
by leveraging the massive parallel execution resources of GPU. We elegantly
shift the computation-intensive and parallel-friendly modules to the
state-of-the-arts GPU platforms, in which the thread block allocation and the
memory access are jointly optimized to eliminate performance loss. In addition,
those operations with heavy data dependence are allocated to CPU to resolve the
extra but non-necessary computation burden for GPU. Furthermore, we have
demonstrated the proposed fast CDVS encoder can work well with those
convolution neural network approaches which has harmoniously leveraged the
advantages of GPU platforms, and yielded significant performance improvements.
Comprehensive experimental results over benchmarks are evaluated, which has
shown that the fast CDVS encoder using GPU-CPU hybrid computing is promising
for scalable visual search.
|
[
{
"version": "v1",
"created": "Sat, 27 May 2017 06:59:37 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Jun 2017 11:26:11 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Duan",
"Lingyu",
""
],
[
"Sun",
"Wei",
""
],
[
"Zhang",
"Xinfeng",
""
],
[
"Wang",
"Shiqi",
""
],
[
"Chen",
"Jie",
""
],
[
"Yin",
"Jianxiong",
""
],
[
"See",
"Simon",
""
],
[
"Huang",
"Tiejun",
""
],
[
"Kot",
"Alex C.",
""
],
[
"Gao",
"Wen",
""
]
] |
new_dataset
| 0.997233 |
1709.02782
|
Majid Masoumi
|
Majid Masoumi, A. Ben Hamza
|
Global spectral graph wavelet signature for surface analysis of carpal
bones
|
arXiv admin note: substantial text overlap with arXiv:1705.06250
| null |
10.1088/1361-6560/aaa71a
| null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a spectral graph wavelet approach for shape
analysis of carpal bones of human wrist. We apply a metric called global
spectral graph wavelet signature for representation of cortical surface of the
carpal bone based on eigensystem of Laplace-Beltrami operator. Furthermore, we
propose a heuristic and efficient way of aggregating local descriptors of a
carpal bone surface to global descriptor. The resultant global descriptor is
not only isometric invariant, but also much more efficient and requires less
memory storage. We perform experiments on shape of the carpal bones of ten
women and ten men from a publicly-available database. Experimental results show
the excellency of the proposed GSGW compared to recent proposed GPS embedding
approach for comparing shapes of the carpal bones across populations.
|
[
{
"version": "v1",
"created": "Mon, 4 Sep 2017 18:30:54 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Masoumi",
"Majid",
""
],
[
"Hamza",
"A. Ben",
""
]
] |
new_dataset
| 0.998708 |
1802.07490
|
Shan Luo Dr
|
Shan Luo, Wenzhen Yuan, Edward Adelson, Anthony G. Cohn and Raul
Fuentes
|
ViTac: Feature Sharing between Vision and Tactile Sensing for Cloth
Texture Recognition
|
6 pages, 5 figures, Accepted for 2018 IEEE International Conference
on Robotics and Automation
| null | null | null |
cs.RO cs.CV cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vision and touch are two of the important sensing modalities for humans and
they offer complementary information for sensing the environment. Robots could
also benefit from such multi-modal sensing ability. In this paper, addressing
for the first time (to the best of our knowledge) texture recognition from
tactile images and vision, we propose a new fusion method named Deep Maximum
Covariance Analysis (DMCA) to learn a joint latent space for sharing features
through vision and tactile sensing. The features of camera images and tactile
data acquired from a GelSight sensor are learned by deep neural networks. But
the learned features are of a high dimensionality and are redundant due to the
differences between the two sensing modalities, which deteriorates the
perception performance. To address this, the learned features are paired using
maximum covariance analysis. Results of the algorithm on a newly collected
dataset of paired visual and tactile data relating to cloth textures show that
a good recognition performance of greater than 90\% can be achieved by using
the proposed DMCA framework. In addition, we find that the perception
performance of either vision or tactile sensing can be improved by employing
the shared representation space, compared to learning from unimodal data.
|
[
{
"version": "v1",
"created": "Wed, 21 Feb 2018 10:06:14 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Mar 2018 14:57:30 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Luo",
"Shan",
""
],
[
"Yuan",
"Wenzhen",
""
],
[
"Adelson",
"Edward",
""
],
[
"Cohn",
"Anthony G.",
""
],
[
"Fuentes",
"Raul",
""
]
] |
new_dataset
| 0.954137 |
1803.02622
|
Christian Zimmermann
|
Christian Zimmermann, Tim Welschehold, Christian Dornhege, Wolfram
Burgard and Thomas Brox
|
3D Human Pose Estimation in RGBD Images for Robotic Task Learning
|
Accepted to ICRA 2018. Video and Code (ROS node) are available:
http://lmb.informatik.uni-freiburg.de/projects/rgbd-pose3d/
| null | null | null |
cs.CV cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose an approach to estimate 3D human pose in real world units from a
single RGBD image and show that it exceeds performance of monocular 3D pose
estimation approaches from color as well as pose estimation exclusively from
depth. Our approach builds on robust human keypoint detectors for color images
and incorporates depth for lifting into 3D. We combine the system with our
learning from demonstration framework to instruct a service robot without the
need of markers. Experiments in real world settings demonstrate that our
approach enables a PR2 robot to imitate manipulation actions observed from a
human teacher.
|
[
{
"version": "v1",
"created": "Wed, 7 Mar 2018 12:46:18 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Mar 2018 10:18:18 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Zimmermann",
"Christian",
""
],
[
"Welschehold",
"Tim",
""
],
[
"Dornhege",
"Christian",
""
],
[
"Burgard",
"Wolfram",
""
],
[
"Brox",
"Thomas",
""
]
] |
new_dataset
| 0.967216 |
1803.04442
|
Krzysztof Rzadca
|
Grzegorz Milka, Krzysztof Rzadca
|
Dfuntest: A Testing Framework for Distributed Applications
|
PPAM 2017 Proceedings
| null |
10.1007/978-3-319-78024-5_35
| null |
cs.DC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
New ideas in distributed systems (algorithms or protocols) are commonly
tested by simulation, because experimenting with a prototype deployed on a
realistic platform is cumbersome. However, a prototype not only measures
performance but also verifies assumptions about the underlying system. We
developed dfuntest - a testing framework for distributed applications that
defines abstractions and test structure, and automates experiments on
distributed platforms. Dfuntest aims to be jUnit's analogue for distributed
applications; a framework that enables the programmer to write robust and
flexible scenarios of experiments. Dfuntest requires minimal bindings that
specify how to deploy and interact with the application. Dfuntest's
abstractions allow execution of a scenario on a single machine, a cluster, a
cloud, or any other distributed infrastructure, e.g. on PlanetLab. A scenario
is a procedure; thus, our framework can be used both for functional tests and
for performance measurements. We show how to use dfuntest to deploy our DHT
prototype on 60 PlanetLab nodes and verify whether the prototype maintains a
correct topology.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2018 18:25:59 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Milka",
"Grzegorz",
""
],
[
"Rzadca",
"Krzysztof",
""
]
] |
new_dataset
| 0.999203 |
1803.04553
|
Li-Yang Tan
|
Rocco A. Servedio and Li-Yang Tan
|
Luby--Veli\v{c}kovi\'c--Wigderson revisited: Improved correlation bounds
and pseudorandom generators for depth-two circuits
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study correlation bounds and pseudorandom generators for depth-two
circuits that consist of a $\mathsf{SYM}$-gate (computing an arbitrary
symmetric function) or $\mathsf{THR}$-gate (computing an arbitrary linear
threshold function) that is fed by $S$ $\mathsf{AND}$ gates. Such circuits were
considered in early influential work on unconditional derandomization of Luby,
Veli\v{c}kovi\'c, and Wigderson [LVW93], who gave the first non-trivial PRG
with seed length $2^{O(\sqrt{\log(S/\varepsilon)})}$ that $\varepsilon$-fools
these circuits.
In this work we obtain the first strict improvement of [LVW93]'s seed length:
we construct a PRG that $\varepsilon$-fools size-$S$
$\{\mathsf{SYM},\mathsf{THR}\} \circ\mathsf{AND}$ circuits over $\{0,1\}^n$
with seed length \[ 2^{O(\sqrt{\log S })} + \mathrm{polylog}(1/\varepsilon), \]
an exponential (and near-optimal) improvement of the $\varepsilon$-dependence
of [LVW93]. The above PRG is actually a special case of a more general PRG
which we establish for constant-depth circuits containing multiple
$\mathsf{SYM}$ or $\mathsf{THR}$ gates, including as a special case
$\{\mathsf{SYM},\mathsf{THR}\} \circ \mathsf{AC^0}$ circuits. These more
general results strengthen previous results of Viola [Vio06] and essentially
strengthen more recent results of Lovett and Srinivasan [LS11].
Our improved PRGs follow from improved correlation bounds, which are
transformed into PRGs via the Nisan--Wigderson "hardness versus randomness"
paradigm [NW94]. The key to our improved correlation bounds is the use of a
recent powerful \emph{multi-switching} lemma due to H{\aa}stad [H{\aa}s14].
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2018 22:12:00 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Servedio",
"Rocco A.",
""
],
[
"Tan",
"Li-Yang",
""
]
] |
new_dataset
| 0.999051 |
1803.04631
|
Xiaolong Xie
|
Xiaolong Xie, Yun Liang, Xiuhong Li, Wei Tan
|
CuLDA_CGS: Solving Large-scale LDA Problems on GPUs
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Latent Dirichlet Allocation(LDA) is a popular topic model. Given the fact
that the input corpus of LDA algorithms consists of millions to billions of
tokens, the LDA training process is very time-consuming, which may prevent the
usage of LDA in many scenarios, e.g., online service. GPUs have benefited
modern machine learning algorithms and big data analysis as they can provide
high memory bandwidth and computation power. Therefore, many frameworks, e.g.
Ten- sorFlow, Caffe, CNTK, support to use GPUs for accelerating the popular
machine learning data-intensive algorithms. However, we observe that LDA
solutions on GPUs are not satisfying.
In this paper, we present CuLDA_CGS, a GPU-based efficient and scalable
approach to accelerate large-scale LDA problems. CuLDA_CGS is designed to
efficiently solve LDA problems at high throughput. To it, we first delicately
design workload partition and synchronization mechanism to exploit the benefits
of mul- tiple GPUs. Then, we offload the LDA sampling process to each
individual GPU by optimizing from the sampling algorithm, par- allelization,
and data compression perspectives. Evaluations show that compared with
state-of-the-art LDA solutions, CuLDA_CGS outperforms them by a large margin
(up to 7.3X) on a single GPU. CuLDA_CGS is able to achieve extra 3.0X speedup
on 4 GPUs. The source code is publicly available on https://github.com/cuMF/
CuLDA_CGS.
|
[
{
"version": "v1",
"created": "Tue, 13 Mar 2018 05:44:40 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Xie",
"Xiaolong",
""
],
[
"Liang",
"Yun",
""
],
[
"Li",
"Xiuhong",
""
],
[
"Tan",
"Wei",
""
]
] |
new_dataset
| 0.999374 |
1803.04827
|
Amin Banitalebi-Dehkordi
|
Amin Banitalebi-Dehkordi, Yuanyuan Dong, Mahsa T. Pourazad, and Panos
Nasiopoulos
|
A Learning-Based Visual Saliency Fusion Model for High Dynamic Range
Video (LBVS-HDR)
| null |
EUSIPCO, 2015
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Saliency prediction for Standard Dynamic Range (SDR) videos has been well
explored in the last decade. However, limited studies are available on High
Dynamic Range (HDR) Visual Attention Models (VAMs). Considering that the
characteristic of HDR content in terms of dynamic range and color gamut is
quite different than those of SDR content, it is essential to identify the
importance of different saliency attributes of HDR videos for designing a VAM
and understand how to combine these features. To this end we propose a
learning-based visual saliency fusion method for HDR content (LVBS-HDR) to
combine various visual saliency features. In our approach various conspicuity
maps are extracted from HDR data, and then for fusing conspicuity maps, a
Random Forests algorithm is used to train a model based on the collected data
from an eye-tracking experiment. Performance evaluations demonstrate the
superiority of the proposed fusion method against other existing fusion
methods.
|
[
{
"version": "v1",
"created": "Tue, 13 Mar 2018 14:21:09 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Banitalebi-Dehkordi",
"Amin",
""
],
[
"Dong",
"Yuanyuan",
""
],
[
"Pourazad",
"Mahsa T.",
""
],
[
"Nasiopoulos",
"Panos",
""
]
] |
new_dataset
| 0.98291 |
1803.04860
|
Simone Madeo
|
Alexandra Covaci and Simone Madeo and Patrick Motylinski and
St\'ephane Vincent
|
NECTAR: Non-Interactive Smart Contract Protocol using Blockchain
Technology
|
IEEE/ACM 1st International Workshop on Emerging Trends in Software
Engineering for Blockchain (WETSEB 2018)
| null |
10.1145/3194113.3194116
| null |
cs.CY cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Blockchain-driven technologies are considered disruptive because of the
availability of dis-intermediated, censorship-resistant and tamper-proof
digital platforms of distributed trust. Among these technologies, smart
contract platforms have the potential to take over functions usually done by
intermediaries like banks, escrow or legal services. In this paper, we
introduce a novel protocol aiming to execute smart contracts as part of a
blockchain transaction validation. We enable extensions in the execution of
smart contracts while guaranteeing their privacy, correctness and
verifiability. Man-in-the-middle attacks are prevented, since no communication
between participants is requested, and contract validations do not imply the
re-execution of the code by all the nodes in the network. However, proofs of
correct execution are stored on the blockchain and can be verified by multiple
parties. Our solution is based on programming tools which optimize the time
execution and the required memory while preserving the embedded functionality.
|
[
{
"version": "v1",
"created": "Tue, 13 Mar 2018 14:57:53 GMT"
}
] | 2018-03-14T00:00:00 |
[
[
"Covaci",
"Alexandra",
""
],
[
"Madeo",
"Simone",
""
],
[
"Motylinski",
"Patrick",
""
],
[
"Vincent",
"Stéphane",
""
]
] |
new_dataset
| 0.992142 |
1704.04882
|
Dusko Pavlovic
|
Dusko Pavlovic and Muzamil Yahia
|
Monoidal computer III: A coalgebraic view of computability and
complexity
|
34 pages, 24 figures; in this version: added the Appendix
| null | null | null |
cs.LO cs.CC math.CT math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Monoidal computer is a categorical model of intensional computation, where
many different programs correspond to the same input-output behavior. The
upshot of yet another model of computation is that a categorical formalism
should provide a much needed high level language for theory of computation,
flexible enough to allow abstracting away the low level implementation details
when they are irrelevant, or taking them into account when they are genuinely
needed. A salient feature of the approach through monoidal categories is the
formal graphical language of string diagrams, which supports visual reasoning
about programs and computations.
In the present paper, we provide a coalgebraic characterization of monoidal
computer. It turns out that the availability of interpreters and specializers,
that make a monoidal category into a monoidal computer, is equivalent with the
existence of a *universal state space*, that carries a weakly final state
machine for any pair of input and output types. Being able to program state
machines in monoidal computers allows us to represent Turing machines, to
capture their execution, count their steps, as well as, e.g., the memory cells
that they use. The coalgebraic view of monoidal computer thus provides a
convenient diagrammatic language for studying computability and complexity.
|
[
{
"version": "v1",
"created": "Mon, 17 Apr 2017 06:27:29 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Feb 2018 09:00:13 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Mar 2018 01:36:07 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Pavlovic",
"Dusko",
""
],
[
"Yahia",
"Muzamil",
""
]
] |
new_dataset
| 0.988431 |
1708.02721
|
Boyi Jiang
|
Boyi Jiang, Juyong Zhang, Bailin Deng, Yudong Guo and Ligang Liu
|
Deep Face Feature for Face Alignment
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a deep learning based image feature extraction
method designed specifically for face images. To train the feature extraction
model, we construct a large scale photo-realistic face image dataset with
ground-truth correspondence between multi-view face images, which are
synthesized from real photographs via an inverse rendering procedure. The deep
face feature (DFF) is trained using correspondence between face images rendered
from different views. Using the trained DFF model, we can extract a feature
vector for each pixel of a face image, which distinguishes different facial
regions and is shown to be more effective than general-purpose feature
descriptors for face-related tasks such as matching and alignment. Based on the
DFF, we develop a robust face alignment method, which iteratively updates
landmarks, pose and 3D shape. Extensive experiments demonstrate that our method
can achieve state-of-the-art results for face alignment under highly
unconstrained face images.
|
[
{
"version": "v1",
"created": "Wed, 9 Aug 2017 05:39:36 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Mar 2018 12:30:36 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Jiang",
"Boyi",
""
],
[
"Zhang",
"Juyong",
""
],
[
"Deng",
"Bailin",
""
],
[
"Guo",
"Yudong",
""
],
[
"Liu",
"Ligang",
""
]
] |
new_dataset
| 0.987093 |
1803.03663
|
Daniel Paulusma
|
Barnaby Martin, Daniel Paulusma, Erik Jan van Leeuwen
|
Disconnected Cuts in Claw-free Graphs
| null | null | null | null |
cs.DS cs.CC cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A disconnected cut of a connected graph is a vertex cut that itself also
induces a disconnected subgraph. The decision problem whether a graph has a
disconnected cut is called Disconnected Cut. This problem is closely related to
several homomorphism and contraction problems, and fits in an extensive line of
research on vertex cuts with additional properties. It is known that
Disconnected Cut is NP-hard on general graphs, while polynomial-time algorithms
are known for several graph classes. However, the complexity of the problem on
claw-free graphs remained an open question. Its connection to the complexity of
the problem to contract a claw-free graph to the 4-vertex cycle $C_4$ led Ito
et al. (TCS 2011) to explicitly ask to resolve this open question.
We prove that Disconnected Cut is polynomial-time solvable on claw-free
graphs, answering the question of Ito et al. The centerpiece of our result is a
novel decomposition theorem for claw-free graphs of diameter 2, which we
believe is of independent interest and expands the research line initiated by
Chudnovsky and Seymour (JCTB 2007-2012) and Hermelin et al. (ICALP 2011). On
our way to exploit this decomposition theorem, we characterize how disconnected
cuts interact with certain cobipartite subgraphs, and prove two further novel
algorithmic results, namely Disconnected Cut is polynomial-time solvable on
circular-arc graphs and line graphs.
|
[
{
"version": "v1",
"created": "Fri, 9 Mar 2018 19:23:03 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Martin",
"Barnaby",
""
],
[
"Paulusma",
"Daniel",
""
],
[
"van Leeuwen",
"Erik Jan",
""
]
] |
new_dataset
| 0.977976 |
1803.03667
|
Irina Legchenkova
|
Evgeny Shulzinger, Irina Legchenkova and Edward Bormashenko
|
Co-occurrence of the Benford-like and Zipf Laws Arising from the Texts
Representing Human and Artificial Languages
|
23 pages, 8 figures, 4 tables
| null | null | null |
cs.CL physics.soc-ph stat.OT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We demonstrate that large texts, representing human (English, Russian,
Ukrainian) and artificial (C++, Java) languages, display quantitative patterns
characterized by the Benford-like and Zipf laws. The frequency of a word
following the Zipf law is inversely proportional to its rank, whereas the total
numbers of a certain word appearing in the text generate the uneven
Benford-like distribution of leading numbers. Excluding the most popular words
essentially improves the correlation of actual textual data with the Zipfian
distribution, whereas the Benford distribution of leading numbers (arising from
the overall amount of a certain word) is insensitive to the same elimination
procedure. The calculated values of the moduli of slopes of double
logarithmical plots for artificial languages (C++, Java) are markedly larger
than those for human ones.
|
[
{
"version": "v1",
"created": "Tue, 6 Mar 2018 12:24:42 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Shulzinger",
"Evgeny",
""
],
[
"Legchenkova",
"Irina",
""
],
[
"Bormashenko",
"Edward",
""
]
] |
new_dataset
| 0.998636 |
1803.03705
|
Saeed Mehrabi
|
Prosenjit Bose, Paz Carmi, Vida Dujmovic, Saeed Mehrabi, Fabrizio
Montecchiani, Pat Morin, and Luis Fernando Schultz Xavier da Silveira
|
Geodesic Obstacle Representation of Graphs
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An obstacle representation of a graph is a mapping of the vertices onto
points in the plane and a set of connected regions of the plane (called
obstacles) such that the straight-line segment connecting the points
corresponding to two vertices does not intersect any obstacles if and only if
the vertices are adjacent in the graph. The obstacle representation and its
plane variant (in which the resulting representation is a plane straight-line
embedding of the graph) have been extensively studied with the main objective
of minimizing the number of obstacles. Recently, Biedl and Mehrabi (GD 2017)
studied grid obstacle representations of graphs in which the vertices of the
graph are mapped onto the points in the plane while the straight-line segments
representing the adjacency between the vertices is replaced by the $L_1$
(Manhattan) shortest paths in the plane that avoid obstacles.
In this paper, we introduce the notion of geodesic obstacle representations
of graphs with the main goal of providing a generalized model, which comes
naturally when viewing line segments as shortest paths in the Euclidean plane.
To this end, we extend the definition of obstacle representation by allowing
some obstacles-avoiding shortest path between the corresponding points in the
underlying metric space whenever the vertices are adjacent in the graph. We
consider both general and plane variants of geodesic obstacle representations
(in a similar sense to obstacle representations) under any polyhedral distance
function in $\mathbb{R}^d$ as well as shortest path distances in graphs. Our
results generalize and unify the notions of obstacle representations, plane
obstacle representations and grid obstacle representations, leading to a number
of questions on such embeddings.
|
[
{
"version": "v1",
"created": "Fri, 9 Mar 2018 21:54:48 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Bose",
"Prosenjit",
""
],
[
"Carmi",
"Paz",
""
],
[
"Dujmovic",
"Vida",
""
],
[
"Mehrabi",
"Saeed",
""
],
[
"Montecchiani",
"Fabrizio",
""
],
[
"Morin",
"Pat",
""
],
[
"da Silveira",
"Luis Fernando Schultz Xavier",
""
]
] |
new_dataset
| 0.984351 |
1803.03733
|
Jie Xu Dr.
|
Xiaowen Cao and Jie Xu and Rui Zhang
|
Mobile Edge Computing for Cellular-Connected UAV: Computation Offloading
and Trajectory Optimization
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies a new mobile edge computing (MEC) setup where an unmanned
aerial vehicle (UAV) is served by cellular ground base stations (GBSs) for
computation offloading. The UAV flies between a give pair of initial and final
locations, during which it needs to accomplish certain computation tasks by
offloading them to some selected GBSs along its trajectory for parallel
execution. Under this setup, we aim to minimize the UAV's mission completion
time by optimizing its trajectory jointly with the computation offloading
scheduling, subject to the maximum speed constraint of the UAV, and the
computation capacity constraints at GBSs. The joint UAV trajectory and
computation offloading optimization problem is, however, non-convex and thus
difficult to be solved optimally. To tackle this problem, we propose an
efficient algorithm to obtain a high-quality suboptimal solution. Numerical
results show that the proposed design significantly reduces the UAV's mission
completion time, as compared to benchmark schemes.
|
[
{
"version": "v1",
"created": "Sat, 10 Mar 2018 01:33:24 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Cao",
"Xiaowen",
""
],
[
"Xu",
"Jie",
""
],
[
"Zhang",
"Rui",
""
]
] |
new_dataset
| 0.994996 |
1803.03786
|
Georgi Karadzhov
|
Georgi Karadzhov, Pepa Gencheva, Preslav Nakov, Ivan Koychev
|
We Built a Fake News & Click-bait Filter: What Happened Next Will Blow
Your Mind!
|
RANLP'2017, 7 pages, 1 figure
| null |
10.26615/978-954-452-049-6_045
| null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is completely amazing! Fake news and click-baits have totally invaded the
cyber space. Let us face it: everybody hates them for three simple reasons.
Reason #2 will absolutely amaze you. What these can achieve at the time of
election will completely blow your mind! Now, we all agree, this cannot go on,
you know, somebody has to stop it. So, we did this research on fake
news/click-bait detection and trust us, it is totally great research, it really
is! Make no mistake. This is the best research ever! Seriously, come have a
look, we have it all: neural networks, attention mechanism, sentiment lexicons,
author profiling, you name it. Lexical features, semantic features, we
absolutely have it all. And we have totally tested it, trust us! We have
results, and numbers, really big numbers. The best numbers ever! Oh, and
analysis, absolutely top notch analysis. Interested? Come read the shocking
truth about fake news and click-bait in the Bulgarian cyber space. You won't
believe what we have found!
|
[
{
"version": "v1",
"created": "Sat, 10 Mar 2018 10:09:13 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Karadzhov",
"Georgi",
""
],
[
"Gencheva",
"Pepa",
""
],
[
"Nakov",
"Preslav",
""
],
[
"Koychev",
"Ivan",
""
]
] |
new_dataset
| 0.983033 |
1803.03887
|
Hai Hu
|
Hai Hu, Yiwen Zhang
|
Path of Vowel Raising in Chengdu Dialect of Mandarin
|
to appear in the Proceedings of 29th North America Conference on
Chinese Linguistics
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
He and Rao (2013) reported a raising phenomenon of /a/ in /Xan/ (X being a
consonant or a vowel) in Chengdu dialect of Mandarin, i.e. /a/ is realized as
[epsilon] for young speakers but [ae] for older speakers, but they offered no
acoustic analysis. We designed an acoustic study that examined the realization
of /Xan/ in speakers of different age (old vs. young) and gender (male vs.
female) groups, where X represents three conditions: 1) unaspirated consonants:
C ([p], [t], [k]), 2) aspirated consonants: Ch ([ph], [th], [kh]), and 3) high
vowels: V ([i], [y], [u]). 17 native speakers were asked to read /Xan/
characters and the F1 values are extracted for comparison. Our results
confirmed the raising effect in He and Rao (2013), i.e., young speakers realize
/a/ as [epsilon] in /an/, whereas older speakers in the most part realize it as
[ae]. Also, female speakers raise more than male speakers within the same age
group. Interestingly, within the /Van/ condition, older speakers do raise /a/
in /ian/ and /yan/. We interpret this as /a/ first assimilates to its preceding
front high vowels /i/ and /y/ for older speakers, which then becomes
phonologized in younger speakers in all conditions, including /Chan/ and /Can/.
This shows a possible trajectory of the ongoing sound change in the Chengdu
dialect.
|
[
{
"version": "v1",
"created": "Sun, 11 Mar 2018 02:58:40 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Hu",
"Hai",
""
],
[
"Zhang",
"Yiwen",
""
]
] |
new_dataset
| 0.980324 |
1803.03958
|
Hossein Pourakbar
|
Hossein Pourakbar, Ali Ghaffari
|
Reliable and Real-Time End-to-End Delivery Protocol in Wireless Sensor
Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many routing protocols have been proposed to handle reliability and real-time
routing energy efficiency for wireless sensor networks. In this paper we
propose a new routing protocol with QoS based capabilities for WSNs. We used
priority queues for improve real-time and non-real-time packets forwarding
according to deadline of them. The protocol finds a best-cost, time-sensitive
packet forwarding mechanism for real-time data with minimum consumption of the
energy. In order to avoid of congestion in network our protocol drops those
packets who can't reach their destination in specified time. For service
quality assurance in reliability domain we used packet reception rate as an
important parameter (PRR) in selecting of neighbor nodes. Simulation results
show that our new approach how can provide quality of service parameters.
|
[
{
"version": "v1",
"created": "Sun, 11 Mar 2018 13:06:20 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Pourakbar",
"Hossein",
""
],
[
"Ghaffari",
"Ali",
""
]
] |
new_dataset
| 0.994749 |
1803.04000
|
Soumil Mandal
|
Soumil Mandal, Sainik Kumar Mahata, Dipankar Das
|
Preparing Bengali-English Code-Mixed Corpus for Sentiment Analysis of
Indian Languages
|
The 13th Workshop on Asian Language Resources (ALR), collocated with
LREC 2018
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
Analysis of informative contents and sentiments of social users has been
attempted quite intensively in the recent past. Most of the systems are usable
only for monolingual data and fails or gives poor results when used on data
with code-mixing property. To gather attention and encourage researchers to
work on this crisis, we prepared gold standard Bengali-English code-mixed data
with language and polarity tag for sentiment analysis purposes. In this paper,
we discuss the systems we prepared to collect and filter raw Twitter data. In
order to reduce manual work while annotation, hybrid systems combining rule
based and supervised models were developed for both language and sentiment
tagging. The final corpus was annotated by a group of annotators following a
few guidelines. The gold standard corpus thus obtained has impressive
inter-annotator agreement obtained in terms of Kappa values. Various metrics
like Code-Mixed Index (CMI), Code-Mixed Factor (CF) along with various aspects
(language and emotion) also qualitatively polled the code-mixed and sentiment
properties of the corpus.
|
[
{
"version": "v1",
"created": "Sun, 11 Mar 2018 18:13:01 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Mandal",
"Soumil",
""
],
[
"Mahata",
"Sainik Kumar",
""
],
[
"Das",
"Dipankar",
""
]
] |
new_dataset
| 0.997398 |
1803.04058
|
Jaber Kakar
|
Jaber Kakar and Alaa Alameer and Anas Chaaban and Aydin Sezgin and
Arogyaswami Paulraj
|
Cache-Assisted Broadcast-Relay Wireless Networks: A Delivery-Time
Cache-Memory Tradeoff
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An emerging trend of next generation communication systems is to provide
network edges with additional capabilities such as storage resources in the
form of caches to reduce file delivery latency. To investigate this aspect, we
study the fundamental limits of a cache-aided broadcast-relay wireless network
consisting of one central base station, $M$ cache-equipped transceivers and $K$
receivers from a latency-centric perspective. We use the normalized delivery
time (NDT) to capture the per-bit latency for the worst-case file request
pattern, normalized with respect to a reference interference-free system with
unlimited transceiver cache capabilities. The objective is to design the
schemes for cache placement and file delivery in order to minimize the NDT. To
this end, we establish a novel converse and two types of achievability schemes
applicable to both time-variant and invariant channels. The first scheme is a
general one-shot scheme for any $M$ and $K$ that synergistically exploits both
multicasting (coded) caching and distributed zero-forcing opportunities. We
show that the proposed one-shot scheme (i) attains gains attributed to both
individual and collective transceiver caches (ii) is NDT-optimal for various
parameter settings, particularly at higher cache sizes. The second scheme, on
the other hand, designs beamformers to facilitate both subspace interference
alignment and zero-forcing at lower cache sizes. Exploiting both schemes, we
are able to characterize for various special cases of $M$ and $K$ which satisfy
$K+M\leq 4$ the optimal tradeoff between cache storage and latency. The
tradeoff illustrates that the NDT is the preferred choice to capture the
latency of a system rather than the commonly used sum degrees-of-freedom (DoF).
In fact, our optimal tradeoff refutes the popular belief that increasing cache
sizes translates to increasing the achievable sum DoF.
|
[
{
"version": "v1",
"created": "Sun, 11 Mar 2018 22:32:27 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Kakar",
"Jaber",
""
],
[
"Alameer",
"Alaa",
""
],
[
"Chaaban",
"Anas",
""
],
[
"Sezgin",
"Aydin",
""
],
[
"Paulraj",
"Arogyaswami",
""
]
] |
new_dataset
| 0.997801 |
1803.04168
|
Yang Liu
|
Liangdong Lu, Wenping Ma, Ruihu Li, Yuena Ma, Yang Liu, Hao Cao
|
Entanglement-assisted quantum MDS codes from constacyclic codes with
large minimum distance
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The entanglement-assisted (EA) formalism allows arbitrary classical linear
codes to transform into entanglement-assisted quantum error correcting codes
(EAQECCs) by using pre-shared entanglement between the sender and the receiver.
In this work, we propose a decomposition of the defining set of constacyclic
codes. Using this method, we construct four classes of $q$-ary
entanglement-assisted quantum MDS (EAQMDS) codes based on classical
constacyclic MDS codes by exploiting less pre-shared maximally entangled
states. We show that a class of $q$-ary EAQMDS have minimum distance upper
limit greater than $3q-1$. Some of them have much larger minimum distance than
the known quantum MDS (QMDS) codes of the same length. Most of these $q$-ary
EAQMDS codes are new in the sense that their parameters are not covered by the
codes available in the literature.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2018 10:04:15 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Lu",
"Liangdong",
""
],
[
"Ma",
"Wenping",
""
],
[
"Li",
"Ruihu",
""
],
[
"Ma",
"Yuena",
""
],
[
"Liu",
"Yang",
""
],
[
"Cao",
"Hao",
""
]
] |
new_dataset
| 0.998984 |
1803.04173
|
Davide Maiorca
|
Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca,
Giorgio Giacinto, Claudia Eckert and Fabio Roli
|
Adversarial Malware Binaries: Evading Deep Learning for Malware
Detection in Executables
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Machine-learning methods have already been exploited as useful tools for
detecting malicious executable files. They leverage data retrieved from malware
samples, such as header fields, instruction sequences, or even raw bytes, to
learn models that discriminate between benign and malicious software. However,
it has also been shown that machine learning and deep neural networks can be
fooled by evasion attacks (also referred to as adversarial examples), i.e.,
small changes to the input data that cause misclassification at test time. In
this work, we investigate the vulnerability of malware detection methods that
use deep networks to learn from raw bytes. We propose a gradient-based attack
that is capable of evading a recently-proposed deep network suited to this
purpose by only changing few specific bytes at the end of each malware sample,
while preserving its intrusive functionality. Promising results show that our
adversarial malware binaries evade the targeted network with high probability,
even though less than 1% of their bytes are modified.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2018 10:27:17 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Kolosnjaji",
"Bojan",
""
],
[
"Demontis",
"Ambra",
""
],
[
"Biggio",
"Battista",
""
],
[
"Maiorca",
"Davide",
""
],
[
"Giacinto",
"Giorgio",
""
],
[
"Eckert",
"Claudia",
""
],
[
"Roli",
"Fabio",
""
]
] |
new_dataset
| 0.997876 |
1803.04292
|
Bertil Chapuis
|
Bertil Chapuis, Benoit Garbinato
|
Geodabs: Trajectory Indexing Meets Fingerprinting at Scale
| null | null | null | null |
cs.DS cs.DB cs.DC cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Finding trajectories and discovering motifs that are similar in large
datasets is a central problem for a wide range of applications. Solutions
addressing this problem usually rely on spatial indexing and on the computation
of a similarity measure in polynomial time. Although effective in the context
of sparse trajectory datasets, this approach is too expensive in the context of
dense datasets, where many trajectories potentially match with a given query.
In this paper, we apply fingerprinting, a copy-detection mechanism used in the
context of textual data, to trajectories. To this end, we fingerprint
trajectories with geodabs, a construction based on geohash aimed at trajectory
fingerprinting. We demonstrate that by relying on the properties of a space
filling curve geodabs can be used to build sharded inverted indexes. We show
how normalization affects precision and recall, two key measures in information
retrieval. We then demonstrate that the probabilistic nature of fingerprinting
has a marginal effect on the quality of the results. Finally, we evaluate our
method in terms of performances and show that, in contrast with existing
methods, it is not affected by the density of the trajectory dataset and that
it can be efficiently distributed.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2018 14:48:06 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Chapuis",
"Bertil",
""
],
[
"Garbinato",
"Benoit",
""
]
] |
new_dataset
| 0.993761 |
1803.04332
|
R\'emi Cura
|
Remi Cura, Julien Perret, Nicolas Paparoditis
|
A state of the art of urban reconstruction: street, street network,
vegetation, urban feature
|
Extracted from PhD (chap1)
| null | null | null |
cs.OH cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
World population is raising, especially the part of people living in cities.
With increased population and complex roles regarding their inhabitants and
their surroundings, cities concentrate difficulties for design, planning and
analysis. These tasks require a way to reconstruct/model a city. Traditionally,
much attention has been given to buildings reconstruction, yet an essential
part of city were neglected: streets. Streets reconstruction has been seldom
researched. Streets are also complex compositions of urban features, and have a
unique role for transportation (as they comprise roads). We aim at completing
the recent state of the art for building reconstruction (Musialski2012) by
considering all other aspect of urban reconstruction. We introduce the need for
city models. Because reconstruction always necessitates data, we first analyse
which data are available. We then expose a state of the art of street
reconstruction, street network reconstruction, urban features
reconstruction/modelling, vegetation , and urban objects
reconstruction/modelling.
Although reconstruction strategies vary widely, we can order them by the role
the model plays, from data driven approach, to model-based approach, to inverse
procedural modelling and model catalogue matching. The main challenges seems to
come from the complex nature of urban environment and from the limitations of
the available data. Urban features have strong relationships, between them, and
to their surrounding, as well as in hierarchical relations. Procedural
modelling has the power to express these relations, and could be applied to the
reconstruction of urban features via the Inverse Procedural Modelling paradigm.
|
[
{
"version": "v1",
"created": "Thu, 18 Jan 2018 02:11:18 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Cura",
"Remi",
""
],
[
"Perret",
"Julien",
""
],
[
"Paparoditis",
"Nicolas",
""
]
] |
new_dataset
| 0.999704 |
1803.04389
|
Vaibhav Kulkarni
|
Vaibhav Kulkarni, Bertil Chapuis, Beno\^it Garbinato and Abhijit
Mahalunkar
|
Addressing the Free-Rider Problem in Public Transport Systems
| null | null | null | null |
cs.CY cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Public transport network constitutes for an indispensable part of a city by
providing mobility services to the general masses. To improve ease of access
and reduce infrastructural investments, public transport authorities often
adopt proof of payment system. Such a system operates by eliminating ticket
controls when boarding the vehicle and subjecting the travelers to random
ticket checks by affiliated personnel (controllers). Although cost efficient,
such a system promotes free-riders, who deliberately decide to evade fares for
the transport service. A recent survey by the association of European
transport, estimates hefty income losses due to fare evasion, highlighting that
free-riding is a serious problem that needs immediate attention. To this end,
we highlight the attack vectors which can be exploited by free-riders by
analyzing the crowdsourced data about the control-locations. Next, we propose a
framework to generate randomized control-location traces by using generative
adversarial networks (GANs) in order to minimize the attack vectors. Finally,
we propose metrics to evaluate such a system, quantified in terms of increased
risk and higher probability of being subjected to control checks across the
city.
|
[
{
"version": "v1",
"created": "Mon, 12 Mar 2018 17:31:47 GMT"
}
] | 2018-03-13T00:00:00 |
[
[
"Kulkarni",
"Vaibhav",
""
],
[
"Chapuis",
"Bertil",
""
],
[
"Garbinato",
"Benoît",
""
],
[
"Mahalunkar",
"Abhijit",
""
]
] |
new_dataset
| 0.998104 |
1701.04210
|
Laura Lopez-Fuentes
|
Laura Lopez-Fuentes, Andrew D.Bagdanov, Joost van de Weijer, Harald
Skinnemoen
|
Bandwidth limited object recognition in high resolution imagery
|
9 pages, 9 figures, accepted in WACV
|
Applications of Computer Vision (WACV), 2017 IEEE Winter
Conference on. IEEE, 2017. p. 1197-1205
|
10.1109/WACV.2017.138
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a novel method to optimize bandwidth usage for object
detection in critical communication scenarios. We develop two operating models
of active information seeking. The first model identifies promising regions in
low resolution imagery and progressively requests higher resolution regions on
which to perform recognition of higher semantic quality. The second model
identifies promising regions in low resolution imagery while simultaneously
predicting the approximate location of the object of higher semantic quality.
From this general framework, we develop a car recognition system via
identification of its license plate and evaluate the performance of both models
on a car dataset that we introduce. Results are compared with traditional JPEG
compression and demonstrate that our system saves up to one order of magnitude
of bandwidth while sacrificing little in terms of recognition performance.
|
[
{
"version": "v1",
"created": "Mon, 16 Jan 2017 09:16:35 GMT"
}
] | 2018-03-12T00:00:00 |
[
[
"Lopez-Fuentes",
"Laura",
""
],
[
"Bagdanov",
"Andrew D.",
""
],
[
"van de Weijer",
"Joost",
""
],
[
"Skinnemoen",
"Harald",
""
]
] |
new_dataset
| 0.995971 |
1705.06476
|
Jason Weston
|
Alexander H. Miller, Will Feng, Adam Fisch, Jiasen Lu, Dhruv Batra,
Antoine Bordes, Devi Parikh, Jason Weston
|
ParlAI: A Dialog Research Software Platform
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce ParlAI (pronounced "par-lay"), an open-source software platform
for dialog research implemented in Python, available at http://parl.ai. Its
goal is to provide a unified framework for sharing, training and testing of
dialog models, integration of Amazon Mechanical Turk for data collection, human
evaluation, and online/reinforcement learning; and a repository of machine
learning models for comparing with others' models, and improving upon existing
architectures. Over 20 tasks are supported in the first release, including
popular datasets such as SQuAD, bAbI tasks, MCTest, WikiQA, QACNN, QADailyMail,
CBT, bAbI Dialog, Ubuntu, OpenSubtitles and VQA. Several models are integrated,
including neural models such as memory networks, seq2seq and attentive LSTMs.
|
[
{
"version": "v1",
"created": "Thu, 18 May 2017 08:54:47 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Jun 2017 18:35:03 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Aug 2017 04:17:48 GMT"
},
{
"version": "v4",
"created": "Thu, 8 Mar 2018 19:58:17 GMT"
}
] | 2018-03-12T00:00:00 |
[
[
"Miller",
"Alexander H.",
""
],
[
"Feng",
"Will",
""
],
[
"Fisch",
"Adam",
""
],
[
"Lu",
"Jiasen",
""
],
[
"Batra",
"Dhruv",
""
],
[
"Bordes",
"Antoine",
""
],
[
"Parikh",
"Devi",
""
],
[
"Weston",
"Jason",
""
]
] |
new_dataset
| 0.99848 |
1709.05533
|
Fabian Bl\"ochliger
|
Fabian Bl\"ochliger, Marius Fehr, Marcin Dymczyk, Thomas Schneider and
Roland Siegwart
|
Topomap: Topological Mapping and Navigation Based on Visual SLAM Maps
|
8 pages
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visual robot navigation within large-scale, semi-structured environments
deals with various challenges such as computation intensive path planning
algorithms or insufficient knowledge about traversable spaces. Moreover, many
state-of-the-art navigation approaches only operate locally instead of gaining
a more conceptual understanding of the planning objective. This limits the
complexity of tasks a robot can accomplish and makes it harder to deal with
uncertainties that are present in the context of real-time robotics
applications. In this work, we present Topomap, a framework which simplifies
the navigation task by providing a map to the robot which is tailored for path
planning use. This novel approach transforms a sparse feature-based map from a
visual Simultaneous Localization And Mapping (SLAM) system into a
three-dimensional topological map. This is done in two steps. First, we extract
occupancy information directly from the noisy sparse point cloud. Then, we
create a set of convex free-space clusters, which are the vertices of the
topological map. We show that this representation improves the efficiency of
global planning, and we provide a complete derivation of our algorithm.
Planning experiments on real world datasets demonstrate that we achieve similar
performance as RRT* with significantly lower computation times and storage
requirements. Finally, we test our algorithm on a mobile robotic platform to
prove its advantages.
|
[
{
"version": "v1",
"created": "Sat, 16 Sep 2017 15:43:46 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Mar 2018 08:57:54 GMT"
}
] | 2018-03-12T00:00:00 |
[
[
"Blöchliger",
"Fabian",
""
],
[
"Fehr",
"Marius",
""
],
[
"Dymczyk",
"Marcin",
""
],
[
"Schneider",
"Thomas",
""
],
[
"Siegwart",
"Roland",
""
]
] |
new_dataset
| 0.998001 |
1712.06316
|
Yue Luo
|
Yue Luo, Jimmy Ren, Zhouxia Wang, Wenxiu Sun, Jinshan Pan, Jianbo Liu,
Jiahao Pang, Liang Lin
|
LSTM Pose Machines
|
Poster in IEEE Conference on Computer Vision and Pattern Recognition
(CVPR), 2018
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We observed that recent state-of-the-art results on single image human pose
estimation were achieved by multi-stage Convolution Neural Networks (CNN).
Notwithstanding the superior performance on static images, the application of
these models on videos is not only computationally intensive, it also suffers
from performance degeneration and flicking. Such suboptimal results are mainly
attributed to the inability of imposing sequential geometric consistency,
handling severe image quality degradation (e.g. motion blur and occlusion) as
well as the inability of capturing the temporal correlation among video frames.
In this paper, we proposed a novel recurrent network to tackle these problems.
We showed that if we were to impose the weight sharing scheme to the
multi-stage CNN, it could be re-written as a Recurrent Neural Network (RNN).
This property decouples the relationship among multiple network stages and
results in significantly faster speed in invoking the network for videos. It
also enables the adoption of Long Short-Term Memory (LSTM) units between video
frames. We found such memory augmented RNN is very effective in imposing
geometric consistency among frames. It also well handles input quality
degradation in videos while successfully stabilizes the sequential outputs. The
experiments showed that our approach significantly outperformed current
state-of-the-art methods on two large-scale video pose estimation benchmarks.
We also explored the memory cells inside the LSTM and provided insights on why
such mechanism would benefit the prediction for video-based pose estimations.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2017 09:56:45 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2018 02:54:09 GMT"
},
{
"version": "v3",
"created": "Wed, 7 Mar 2018 03:39:55 GMT"
},
{
"version": "v4",
"created": "Fri, 9 Mar 2018 07:44:38 GMT"
}
] | 2018-03-12T00:00:00 |
[
[
"Luo",
"Yue",
""
],
[
"Ren",
"Jimmy",
""
],
[
"Wang",
"Zhouxia",
""
],
[
"Sun",
"Wenxiu",
""
],
[
"Pan",
"Jinshan",
""
],
[
"Liu",
"Jianbo",
""
],
[
"Pang",
"Jiahao",
""
],
[
"Lin",
"Liang",
""
]
] |
new_dataset
| 0.993974 |
1802.05908
|
Matthias Fey
|
Nils M. Kriege, Matthias Fey, Denis Fisseler, Petra Mutzel, Frank
Weichert
|
Recognizing Cuneiform Signs Using Graph Based Methods
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The cuneiform script constitutes one of the earliest systems of writing and
is realized by wedge-shaped marks on clay tablets. A tremendous number of
cuneiform tablets have already been discovered and are incrementally
digitalized and made available to automated processing. As reading cuneiform
script is still a manual task, we address the real-world application of
recognizing cuneiform signs by two graph based methods with complementary
runtime characteristics. We present a graph model for cuneiform signs together
with a tailored distance measure based on the concept of the graph edit
distance. We propose efficient heuristics for its computation and demonstrate
its effectiveness in classification tasks experimentally. To this end, the
distance measure is used to implement a nearest neighbor classifier leading to
a high computational cost for the prediction phase with increasing training set
size. In order to overcome this issue, we propose to use CNNs adapted to graphs
as an alternative approach shifting the computational cost to the training
phase. We demonstrate the practicability of both approaches in an extensive
experimental comparison regarding runtime and prediction accuracy. Although
currently available annotated real-world data is still limited, we obtain a
high accuracy using CNNs, in particular, when the training set is enriched by
augmented examples.
|
[
{
"version": "v1",
"created": "Fri, 16 Feb 2018 12:28:28 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Mar 2018 07:52:49 GMT"
}
] | 2018-03-12T00:00:00 |
[
[
"Kriege",
"Nils M.",
""
],
[
"Fey",
"Matthias",
""
],
[
"Fisseler",
"Denis",
""
],
[
"Mutzel",
"Petra",
""
],
[
"Weichert",
"Frank",
""
]
] |
new_dataset
| 0.999611 |
1803.03302
|
Jyh-Ming Lien
|
Zhonghua Xi, Yu-Ki Lee, Young-Joo Lee, Yun-hyeong Kim, Huangxin Wang,
Yue Hao, Young-Chang Joo, In-Suk Choi, Jyh-Ming Lien
|
Super Compaction and Pluripotent Shape Transformation via Algorithmic
Stacking for 3D Deployable Structures
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Origami structures enabled by folding and unfolding can create complex 3D
shapes. However, even a small 3D shape can have large 2D unfoldings. The huge
initial dimension of the 2D flattened structure makes fabrication difficult,
and defeats the main purpose, namely compactness, of many origami-inspired
engineering. In this work, we propose a novel algorithmic kirigami method that
provides super compaction of an arbitrary 3D shape with non-negligible surface
thickness called "algorithmic stacking". Our approach computationally finds a
way of cutting the thick surface of the shape into a strip. This strip forms a
Hamiltonian cycle that covers the entire surface and can realize transformation
between two target shapes: from a super compact stacked shape to the input 3D
shape. Depending on the surface thickness, the stacked structure takes merely
0.001% to 6% of the original volume. This super compacted structure not only
can be manufactured in a workspace that is significantly smaller than the
provided 3D shape, but also makes packing and transportation easier for a
deployable application. We further demonstrate that, the proposed stackable
structure also provides high pluripotency and can transform into multiple 3D
target shapes if these 3D shapes can be dissected in specific ways and form a
common stacked structure. In contrast to many designs of origami structure that
usually target at a particular shape, our results provide a universal platform
for pluripotent 3D transformable structures.
|
[
{
"version": "v1",
"created": "Thu, 8 Mar 2018 20:54:21 GMT"
}
] | 2018-03-12T00:00:00 |
[
[
"Xi",
"Zhonghua",
""
],
[
"Lee",
"Yu-Ki",
""
],
[
"Lee",
"Young-Joo",
""
],
[
"Kim",
"Yun-hyeong",
""
],
[
"Wang",
"Huangxin",
""
],
[
"Hao",
"Yue",
""
],
[
"Joo",
"Young-Chang",
""
],
[
"Choi",
"In-Suk",
""
],
[
"Lien",
"Jyh-Ming",
""
]
] |
new_dataset
| 0.998832 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.