id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1803.03417
Ramana Kumar
Ramana Kumar, Magnus O. Myreen
Clocked Definitions in HOL
null
null
null
null
cs.LO
http://creativecommons.org/licenses/by-sa/4.0/
Many potentially non-terminating functions cannot be directly defined in a logic of total functions, such as HOL. A well-known solution to this is to define non-terminating functions using a clock that forces termination at a certain depth of evaluation. Such clocked definitions are often frowned upon and avoided, since the clock is perceived as extra clutter. In this short paper, we explain that there are different ways to add a clock, some less intrusive than others. Our contribution is a technique by which termination proofs are kept simple even when minimising the use of the clock mechanism. Our examples are definitions of semantic interpreters for programming languages, so called functional big-step semantics.
[ { "version": "v1", "created": "Fri, 9 Mar 2018 08:53:10 GMT" } ]
2018-03-12T00:00:00
[ [ "Kumar", "Ramana", "" ], [ "Myreen", "Magnus O.", "" ] ]
new_dataset
0.967611
1803.03494
Peter Jung
Peter Jung
The Szeg\"o-Asymptotics for Doubly-Dispersive Gaussian Channels
20 pages, 1 figure
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the time-continuous doubly--dispersive channel with additive Gaussian noise and establish a capacity formula for the case where the channel operator is represented by a symbol which is periodic in time and fulfills some further integrability, smoothness and oscillation conditions. More precisely, we apply the well-known Holsinger-Gallager model for translating a time-continuous channel for a sequence of time--intervals of increasing length $\alpha\rightarrow\infty$ to a series of equivalent sets of discrete, parallel channels, known at the transmitter. We quantify conditions when this procedure converges. Finally, under periodicity assumptions this result can indeed be justified as the channel capacity in the sense Shannon. The key to this is result is a new Szeg\"o formula for certain pseudo--differential operators with real-valued symbol. The Szeg\"o limit holds if the symbol belongs to the homogeneous Besov space $\dot{B}^1_{\infty,1}$ with respect to its time-dependency, characterizing the oscillatory behavior in time. Finally, the formula justifies the water-filling principle in time and frequency as general technique independent of a sampling scheme.
[ { "version": "v1", "created": "Fri, 9 Mar 2018 12:56:53 GMT" } ]
2018-03-12T00:00:00
[ [ "Jung", "Peter", "" ] ]
new_dataset
0.99209
1803.03508
Hanxu Hou
Hanxu Hou, Yunghsiang S. Han, Kenneth W. Shum and Hui Li
A Unified Form of EVENODD and RDP Codes and Their Efficient Decoding
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Array codes have been widely employed in storage systems, such as Redundant Arrays of Inexpensive Disks (RAID). The row-diagonal parity (RDP) codes and EVENODD codes are two popular double-parity array codes. As the capacity of hard disks increases, better fault tolerance by using array codes with three or more parity disks is needed. Although many extensions of RDP codes and EVENODD codes have been proposed, the high decoding complexity is the main drawback of them. In this paper, we present a new construction for all families of EVENODD codes and RDP codes, and propose a unified form of them. Under this unified form, RDP codes can be treated as shortened codes of EVENODD codes. Moreover, an efficient decoding algorithm based on an LU factorization of Vandermonde matrix is proposed when the number of continuous surviving parity columns is no less than the number of erased information columns. The new decoding algorithm is faster than the existing algorithms when more than three information columns fail. The proposed efficient decoding algorithm is also applicable to other Vandermonde array codes. Thus the proposed MDS array code is practically very meaningful for storage systems that need higher reliability.
[ { "version": "v1", "created": "Fri, 9 Mar 2018 13:53:41 GMT" } ]
2018-03-12T00:00:00
[ [ "Hou", "Hanxu", "" ], [ "Han", "Yunghsiang S.", "" ], [ "Shum", "Kenneth W.", "" ], [ "Li", "Hui", "" ] ]
new_dataset
0.999796
1803.03576
Shweta Bhatt
Shweta Bhatt, Sagar Joglekar, Shehar Bano, Nishanth Sastry
Illuminating an Ecosystem of Partisan Websites
Published at The Web Conference 2018 (WWW 2018). Please cite the WWW version
null
10.1145/3184558.3188725
null
cs.SI
http://creativecommons.org/licenses/by/4.0/
This paper aims to shed light on alternative news media ecosystems that are believed to have influenced opinions and beliefs by false and/or biased news reporting during the 2016 US Presidential Elections. We examine a large, professionally curated list of 668 hyper-partisan websites and their corresponding Facebook pages, and identify key characteristics that mediate the traffic flow within this ecosystem. We uncover a pattern of new websites being established in the run up to the elections, and abandoned after. Such websites form an ecosystem, creating links from one website to another, and by `liking' each others' Facebook pages. These practices are highly effective in directing user traffic internally within the ecosystem in a highly partisan manner, with right-leaning sites linking to and liking other right-leaning sites and similarly left-leaning sites linking to other sites on the left, thus forming a filter bubble amongst news producers similar to the filter bubble which has been widely observed among consumers of partisan news. Whereas there is activity along both left- and right-leaning sites, right-leaning sites are more evolved, accounting for a disproportionate number of abandoned websites and partisan internal links. We also examine demographic characteristics of consumers of hyper-partisan news and find that some of the more populous demographic groups in the US tend to be consumers of more right-leaning sites.
[ { "version": "v1", "created": "Fri, 9 Mar 2018 15:48:00 GMT" } ]
2018-03-12T00:00:00
[ [ "Bhatt", "Shweta", "" ], [ "Joglekar", "Sagar", "" ], [ "Bano", "Shehar", "" ], [ "Sastry", "Nishanth", "" ] ]
new_dataset
0.990539
1602.01202
Yongjune Kim
Yongjune Kim, Abhishek A. Sharma, Robert Mateescu, Seung-Hwan Song, Zvonimir Z. Bandic, James A. Bain, B. V. K. Vijaya Kumar
Locally rewritable codes for resistive memories
accepted by IEEE International Conference on Communications (ICC) 2016
null
10.1109/ICC.2016.7510727
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose locally rewritable codes (LWC) for resistive memories inspired by locally repairable codes (LRC) for distributed storage systems. Small values of repair locality of LRC enable fast repair of a single failed node since the lost data in the failed node can be recovered by accessing only a small fraction of other nodes. By using rewriting locality, LWC can improve endurance limit and power consumption which are major challenges for resistive memories. We point out the duality between LRC and LWC, which indicates that existing construction methods of LRC can be applied to construct LWC.
[ { "version": "v1", "created": "Wed, 3 Feb 2016 06:43:10 GMT" } ]
2018-03-09T00:00:00
[ [ "Kim", "Yongjune", "" ], [ "Sharma", "Abhishek A.", "" ], [ "Mateescu", "Robert", "" ], [ "Song", "Seung-Hwan", "" ], [ "Bandic", "Zvonimir Z.", "" ], [ "Bain", "James A.", "" ], [ "Kumar", "B. V. K. Vijaya", "" ] ]
new_dataset
0.969271
1705.01167
Corey Walsh
Corey Walsh, Sertac Karaman
CDDT: Fast Approximate 2D Ray Casting for Accelerated Localization
8 pages, 14 figures, ICRA version
null
null
null
cs.DS cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Localization is an essential component for autonomous robots. A well-established localization approach combines ray casting with a particle filter, leading to a computationally expensive algorithm that is difficult to run on resource-constrained mobile robots. We present a novel data structure called the Compressed Directional Distance Transform for accelerating ray casting in two dimensional occupancy grid maps. Our approach allows online map updates, and near constant time ray casting performance for a fixed size map, in contrast with other methods which exhibit poor worst case performance. Our experimental results show that the proposed algorithm approximates the performance characteristics of reading from a three dimensional lookup table of ray cast solutions while requiring two orders of magnitude less memory and precomputation. This results in a particle filter algorithm which can maintain 2500 particles with 61 ray casts per particle at 40Hz, using a single CPU thread onboard a mobile robot.
[ { "version": "v1", "created": "Tue, 2 May 2017 20:38:42 GMT" }, { "version": "v2", "created": "Wed, 7 Mar 2018 19:00:34 GMT" } ]
2018-03-09T00:00:00
[ [ "Walsh", "Corey", "" ], [ "Karaman", "Sertac", "" ] ]
new_dataset
0.998315
1801.07495
Wafa Alorainy
Wafa Alorainy, Pete Burnap, Han Liu, Matthew Williams
The Enemy Among Us: Detecting Hate Speech with Threats Based 'Othering' Language Embeddings
null
null
null
null
cs.CL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Offensive or antagonistic language targeted at individuals and social groups based on their personal characteristics (also known as cyber hate speech or cyberhate) has been frequently posted and widely circulated viathe World Wide Web. This can be considered as a key risk factor for individual and societal tension linked toregional instability. Automated Web-based cyberhate detection is important for observing and understandingcommunity and regional societal tension - especially in online social networks where posts can be rapidlyand widely viewed and disseminated. While previous work has involved using lexicons, bags-of-words orprobabilistic language parsing approaches, they often suffer from a similar issue which is that cyberhate can besubtle and indirect - thus depending on the occurrence of individual words or phrases can lead to a significantnumber of false negatives, providing inaccurate representation of the trends in cyberhate. This problemmotivated us to challenge thinking around the representation of subtle language use, such as references toperceived threats from "the other" including immigration or job prosperity in a hateful context. We propose anovel framework that utilises language use around the concept of "othering" and intergroup threat theory toidentify these subtleties and we implement a novel classification method using embedding learning to computesemantic distances between parts of speech considered to be part of an "othering" narrative. To validate ourapproach we conduct several experiments on different types of cyberhate, namely religion, disability, race andsexual orientation, with F-measure scores for classifying hateful instances obtained through applying ourmodel of 0.93, 0.86, 0.97 and 0.98 respectively, providing a significant improvement in classifier accuracy overthe state-of-the-art
[ { "version": "v1", "created": "Tue, 23 Jan 2018 11:43:54 GMT" }, { "version": "v2", "created": "Sun, 28 Jan 2018 11:37:38 GMT" }, { "version": "v3", "created": "Thu, 8 Mar 2018 12:25:38 GMT" } ]
2018-03-09T00:00:00
[ [ "Alorainy", "Wafa", "" ], [ "Burnap", "Pete", "" ], [ "Liu", "Han", "" ], [ "Williams", "Matthew", "" ] ]
new_dataset
0.98344
1803.02623
Behrouz Bolourian Haghighi
Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh
TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA
null
null
null
null
cs.CR cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, an efficient fragile blind quad watermarking scheme for image tamper detection and recovery based on lifting wavelet transform and genetic algorithm is proposed. TRLG generates four compact digests with super quality based on lifting wavelet transform and halftoning technique by distinguishing the types of image blocks. In other words, for each 2*2 non-overlap blocks, four chances for recovering destroyed blocks are considered. A special parameter estimation technique based on genetic algorithm is performed to improve and optimize the quality of digests and watermarked image. Furthermore, CCS map is used to determine the mapping block for embedding information, encrypting and confusing the embedded information. In order to improve the recovery rate, Mirror-aside and Partner-block are proposed. The experiments that have been conducted to evaluate the performance of TRLG proved the superiority in terms of quality of the watermarked and recovered image, tamper localization and security compared with state-of-the-art methods. The results indicate that the PSNR and SSIM of the watermarked image are about 46 dB and approximately one, respectively. Also, the mean of PSNR and SSIM of several recovered images which has been destroyed about 90% is reached to 24 dB and 0.86, respectively.
[ { "version": "v1", "created": "Wed, 7 Mar 2018 12:47:18 GMT" } ]
2018-03-09T00:00:00
[ [ "Haghighi", "Behrouz Bolourian", "" ], [ "Taherinia", "Amir Hossein", "" ], [ "Mohajerzadeh", "Amir Hossein", "" ] ]
new_dataset
0.996665
1803.02887
Shayan Eskandari
Shayan Eskandari, Andreas Leoutsarakos, Troy Mursch, Jeremy Clark
A first look at browser-based Cryptojacking
9 pages, IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN (IEEE S&B) 2018 University College London (UCL), London, UK
null
null
null
cs.CR cs.CY cs.HC econ.EM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we examine the recent trend towards in-browser mining of cryptocurrencies; in particular, the mining of Monero through Coinhive and similar code- bases. In this model, a user visiting a website will download a JavaScript code that executes client-side in her browser, mines a cryptocurrency, typically without her consent or knowledge, and pays out the seigniorage to the website. Websites may consciously employ this as an alternative or to supplement advertisement revenue, may offer premium content in exchange for mining, or may be unwittingly serving the code as a result of a breach (in which case the seigniorage is collected by the attacker). The cryptocurrency Monero is preferred seemingly for its unfriendliness to large-scale ASIC mining that would drive browser-based efforts out of the market, as well as for its purported privacy features. In this paper, we survey this landscape, conduct some measurements to establish its prevalence and profitability, outline an ethical framework for considering whether it should be classified as an attack or business opportunity, and make suggestions for the detection, mitigation and/or prevention of browser-based mining for non- consenting users.
[ { "version": "v1", "created": "Wed, 7 Mar 2018 21:50:37 GMT" } ]
2018-03-09T00:00:00
[ [ "Eskandari", "Shayan", "" ], [ "Leoutsarakos", "Andreas", "" ], [ "Mursch", "Troy", "" ], [ "Clark", "Jeremy", "" ] ]
new_dataset
0.979876
1803.02994
Liang Jiang
Linli Xu, Liang Jiang, Chuan Qin, Zhe Wang, Dongfang Du
How Images Inspire Poems: Generating Classical Chinese Poetry from Images with Memory Networks
Accepted by AAAI 2018
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the recent advances of neural models and natural language processing, automatic generation of classical Chinese poetry has drawn significant attention due to its artistic and cultural value. Previous works mainly focus on generating poetry given keywords or other text information, while visual inspirations for poetry have been rarely explored. Generating poetry from images is much more challenging than generating poetry from text, since images contain very rich visual information which cannot be described completely using several keywords, and a good poem should convey the image accurately. In this paper, we propose a memory based neural model which exploits images to generate poems. Specifically, an Encoder-Decoder model with a topic memory network is proposed to generate classical Chinese poetry from images. To the best of our knowledge, this is the first work attempting to generate classical Chinese poetry from images with neural networks. A comprehensive experimental investigation with both human evaluation and quantitative analysis demonstrates that the proposed model can generate poems which convey images accurately.
[ { "version": "v1", "created": "Thu, 8 Mar 2018 08:07:31 GMT" } ]
2018-03-09T00:00:00
[ [ "Xu", "Linli", "" ], [ "Jiang", "Liang", "" ], [ "Qin", "Chuan", "" ], [ "Wang", "Zhe", "" ], [ "Du", "Dongfang", "" ] ]
new_dataset
0.998657
1803.03015
Chetan Singh Thakur
Runchun Wang, Chetan Singh Thakur, Andre van Schaik
An FPGA-based Massively Parallel Neuromorphic Cortex Simulator
18 pages
null
null
null
cs.NE
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper presents a massively parallel and scalable neuromorphic cortex simulator designed for simulating large and structurally connected spiking neural networks, such as complex models of various areas of the cortex. The main novelty of this work is the abstraction of a neuromorphic architecture into clusters represented by minicolumns and hypercolumns, analogously to the fundamental structural units observed in neurobiology. Without this approach, simulating large-scale fully connected networks needs prohibitively large memory to store look-up tables for point-to-point connections. Instead, we use a novel architecture, based on the structural connectivity in the neocortex, such that all the required parameters and connections can be stored in on-chip memory. The cortex simulator can be easily reconfigured for simulating different neural networks without any change in hardware structure by programming the memory. A hierarchical communication scheme allows one neuron to have a fan-out of up to 200k neurons. As a proof-of-concept, an implementation on one Altera Stratix V FPGA was able to simulate 20 million to 2.6 billion leaky-integrate-and-fire (LIF) neurons in real time. We verified the system by emulating a simplified auditory cortex (with 100 million neurons). This cortex simulator achieved a low power dissipation of 1.62 {\mu}W per neuron. With the advent of commercially available FPGA boards, our system offers an accessible and scalable tool for the design, real-time simulation, and analysis of large-scale spiking neural networks.
[ { "version": "v1", "created": "Thu, 8 Mar 2018 09:31:04 GMT" } ]
2018-03-09T00:00:00
[ [ "Wang", "Runchun", "" ], [ "Thakur", "Chetan Singh", "" ], [ "van Schaik", "Andre", "" ] ]
new_dataset
0.983646
1803.03106
Thomas Szyrkowiec
Thomas Szyrkowiec, Michele Santuari, Mohit Chamania, Domenico Siracusa, Achim Autenrieth, Victor Lopez, Joo Cho, and Wolfgang Kellerer
Automatic Intent-Based Secure Service Creation Through a Multilayer SDN Network Orchestration
Parts of the presented work has received funding from the European Commission within the H2020 Research and Innovation Programme, under grant agreeement n.645127, project ACINO
J. Opt. Commun. Netw. 10, 289-297 (2018)
10.1364/JOCN.10.000289
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Growing traffic demands and increasing security awareness are driving the need for secure services. Current solutions require manual configuration and deployment based on the customer's requirements. In this work, we present an architecture for an automatic intent-based provisioning of a secure service in a multilayer - IP, Ethernet, and optical - network while choosing the appropriate encryption layer using an open-source software-defined networking (SDN) orchestrator. The approach is experimentally evaluated in a testbed with commercial equipment. Results indicate that the processing impact of secure channel creation on a controller is negligible. As the time for setting up services over WDM varies between technologies, it needs to be taken into account in the decision-making process.
[ { "version": "v1", "created": "Thu, 8 Mar 2018 14:39:11 GMT" } ]
2018-03-09T00:00:00
[ [ "Szyrkowiec", "Thomas", "" ], [ "Santuari", "Michele", "" ], [ "Chamania", "Mohit", "" ], [ "Siracusa", "Domenico", "" ], [ "Autenrieth", "Achim", "" ], [ "Lopez", "Victor", "" ], [ "Cho", "Joo", "" ], [ "Kellerer", "Wolfgang", "" ] ]
new_dataset
0.962461
1803.03178
Preslav Nakov
Tsvetomila Mihaylova, Preslav Nakov, Lluis Marquez, Alberto Barron-Cedeno, Mitra Mohtarami, Georgi Karadzhov, James Glass
Fact Checking in Community Forums
AAAI-2018; Fact-Checking; Veracity; Community-Question Answering; Neural Networks; Distributed Representations
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Community Question Answering (cQA) forums are very popular nowadays, as they represent effective means for communities around particular topics to share information. Unfortunately, this information is not always factual. Thus, here we explore a new dimension in the context of cQA, which has been ignored so far: checking the veracity of answers to particular questions in cQA forums. As this is a new problem, we create a specialized dataset for it. We further propose a novel multi-faceted model, which captures information from the answer content (what is said and how), from the author profile (who says it), from the rest of the community forum (where it is said), and from external authoritative sources of information (external support). Evaluation results show a MAP value of 86.54, which is 21 points absolute above the baseline.
[ { "version": "v1", "created": "Thu, 8 Mar 2018 16:06:54 GMT" } ]
2018-03-09T00:00:00
[ [ "Mihaylova", "Tsvetomila", "" ], [ "Nakov", "Preslav", "" ], [ "Marquez", "Lluis", "" ], [ "Barron-Cedeno", "Alberto", "" ], [ "Mohtarami", "Mitra", "" ], [ "Karadzhov", "Georgi", "" ], [ "Glass", "James", "" ] ]
new_dataset
0.99982
1803.03186
David Gutierrez Estevez
D. M. Gutierrez-Estevez, \"O. Bulakci, M. Ericson, A. Prasad, E. Pateromichelakis, J. Belschner, P. Arnold, G. Calochira
RAN Enablers for 5G Radio Resource Management
null
Gutierrez-Estevez, D. M., et. al. "RAN enablers for 5G radio resource management.", IEEE Conference on Standards for Communications and Networking (CSCN), pp. 1-6. IEEE, 2017
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the description of several key RAN enablers for the radio resource management (RRM) framework of the fifth generation (5G) radio access network (RAN), referred to as building blocks of the 5G RRM. In particular, the following key RAN enablers are discussed: i) interference management techniques for dense and dynamic deployments, focusing on cell-edge performance enhancement; ii) dynamic traffic steering mechanisms that aim to attain the optimum mapping of 5G services to any available resources when and where needed by considering the peculiarities of different air interface variants (AIVs); iii) resource management strategies that deal with network slices; and iv) tight interworking between novel 5G AIVs and evolved legacy AIVs such as Long-term Evolution (LTE). Evaluation results for each of these key RAN enablers are also presented.
[ { "version": "v1", "created": "Thu, 8 Mar 2018 16:23:28 GMT" } ]
2018-03-09T00:00:00
[ [ "Gutierrez-Estevez", "D. M.", "" ], [ "Bulakci", "Ö.", "" ], [ "Ericson", "M.", "" ], [ "Prasad", "A.", "" ], [ "Pateromichelakis", "E.", "" ], [ "Belschner", "J.", "" ], [ "Arnold", "P.", "" ], [ "Calochira", "G.", "" ] ]
new_dataset
0.978779
1605.06799
Victor Barger
Andrea Webb Luangrath, Joann Peck, Victor A. Barger
Textual Paralanguage and its Implications for Marketing Communications
Forthcoming in the Journal of Consumer Psychology
Journal of Consumer Psychology 27 (2017) 98-107
10.1016/j.jcps.2016.05.002
null
cs.CL cs.SI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Both face-to-face communication and communication in online environments convey information beyond the actual verbal message. In a traditional face-to-face conversation, paralanguage, or the ancillary meaning- and emotion-laden aspects of speech that are not actual verbal prose, gives contextual information that allows interactors to more appropriately understand the message being conveyed. In this paper, we conceptualize textual paralanguage (TPL), which we define as written manifestations of nonverbal audible, tactile, and visual elements that supplement or replace written language and that can be expressed through words, symbols, images, punctuation, demarcations, or any combination of these elements. We develop a typology of textual paralanguage using data from Twitter, Facebook, and Instagram. We present a conceptual framework of antecedents and consequences of brands' use of textual paralanguage. Implications for theory and practice are discussed.
[ { "version": "v1", "created": "Sun, 22 May 2016 14:22:03 GMT" } ]
2018-03-08T00:00:00
[ [ "Luangrath", "Andrea Webb", "" ], [ "Peck", "Joann", "" ], [ "Barger", "Victor A.", "" ] ]
new_dataset
0.999242
1802.07420
Siddharth Dalmia
Siddharth Dalmia, Ramon Sanabria, Florian Metze and Alan W. Black
Sequence-based Multi-lingual Low Resource Speech Recognition
5 pages, 5 figures, to appear in 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2018)
null
null
null
cs.CL cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Techniques for multi-lingual and cross-lingual speech recognition can help in low resource scenarios, to bootstrap systems and enable analysis of new languages and domains. End-to-end approaches, in particular sequence-based techniques, are attractive because of their simplicity and elegance. While it is possible to integrate traditional multi-lingual bottleneck feature extractors as front-ends, we show that end-to-end multi-lingual training of sequence models is effective on context independent models trained using Connectionist Temporal Classification (CTC) loss. We show that our model improves performance on Babel languages by over 6% absolute in terms of word/phoneme error rate when compared to mono-lingual systems built in the same setting for these languages. We also show that the trained model can be adapted cross-lingually to an unseen language using just 25% of the target data. We show that training on multiple languages is important for very low resource cross-lingual target scenarios, but not for multi-lingual testing scenarios. Here, it appears beneficial to include large well prepared datasets.
[ { "version": "v1", "created": "Wed, 21 Feb 2018 04:09:26 GMT" }, { "version": "v2", "created": "Tue, 6 Mar 2018 19:51:21 GMT" } ]
2018-03-08T00:00:00
[ [ "Dalmia", "Siddharth", "" ], [ "Sanabria", "Ramon", "" ], [ "Metze", "Florian", "" ], [ "Black", "Alan W.", "" ] ]
new_dataset
0.988263
1803.02560
Yisroel Mirsky Mr.
Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai
Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs
null
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Man-in-the-Middle (MitM) attack is a cyber-attack in which an attacker intercepts traffic, thus harming the confidentiality, integrity, and availability of the network. It remains a popular attack vector due to its simplicity. However, existing solutions are either not portable, suffer from a high false positive rate, or are simply not generic. In this paper, we propose Vesper: a novel plug-and-play MitM detector for local area networks. Vesper uses a technique inspired from impulse response analysis used in the domain of acoustic signal processing. Analogous to how echoes in a cave capture the shape and construction of the environment, so to can a short and intense pulse of ICMP echo requests model the link between two network hosts. Vesper uses neural networks called autoencoders to model the normal patterns of the echoed pulses, and detect when the environment changes. Using this technique, Vesper is able to detect MitM attacks with high accuracy while incurring minimal network overhead. We evaluate Vesper on LANs consisting of video surveillance cameras, servers, and PC workstations. We also investigate several possible adversarial attacks against Vesper, and demonstrate how Vesper mitigates these attacks.
[ { "version": "v1", "created": "Wed, 7 Mar 2018 08:28:29 GMT" } ]
2018-03-08T00:00:00
[ [ "Mirsky", "Yisroel", "" ], [ "Kalbo", "Naor", "" ], [ "Elovici", "Yuval", "" ], [ "Shabtai", "Asaf", "" ] ]
new_dataset
0.999763
1803.02723
Tao Pang
Di Deng, Tao Pang, Prasanth Palli, Fang Shu, Kenji Shimada
Heterogeneous Vehicles Routing for Water Canal Damage Assessment
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Japan, inspection of irrigation water canals has been mostly conducted manually. However, the huge demand for more regular inspections as infrastructure ages, coupled with the limited time window available for inspection, has rendered manual inspection increasingly insufficient. With shortened inspection time and reduced labor cost, automated inspection using a combination of unmanned aerial vehicles (UAVs) and ground vehicles (cars) has emerged as an attractive alternative to manual inspection. In this paper, we propose a path planning framework that generates optimal plans for UAVs and cars to inspect water canals in a large agricultural area (tens of square kilometers). In addition to optimality, the paths need to satisfy several constraints, in order to guarantee UAV navigation safety and to abide by local traffic regulations. In the proposed framework, the canal and road networks are first modeled as two graphs, which are then partitioned into smaller subgraphs that can be covered by a given fleet of UAVs within one battery charge. The problem of finding optimal paths for both UAVs and cars on the graphs, subject to the constraints, is formulated as a mixed-integer quadratic program (MIQP). The proposed framework can also quickly generate new plans when a current plan is interrupted. The effectiveness of the proposed framework is validated by simulation results showing the successful generation of plans covering all given canal segments, and the ability to quickly revise the plan when conditions change.
[ { "version": "v1", "created": "Wed, 7 Mar 2018 15:47:14 GMT" } ]
2018-03-08T00:00:00
[ [ "Deng", "Di", "" ], [ "Pang", "Tao", "" ], [ "Palli", "Prasanth", "" ], [ "Shu", "Fang", "" ], [ "Shimada", "Kenji", "" ] ]
new_dataset
0.996883
1803.02751
Georgios Chasparis
Georgios C. Chasparis
Aspiration-based Perturbed Learning Automata
arXiv admin note: text overlap with arXiv:1709.05859, arXiv:1702.08334
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a novel payoff-based learning scheme for distributed optimization in repeatedly-played strategic-form games. Standard reinforcement-based learning exhibits several limitations with respect to their asymptotic stability. For example, in two-player coordination games, payoff-dominant (or efficient) Nash equilibria may not be stochastically stable. In this work, we present an extension of perturbed learning automata, namely aspiration-based perturbed learning automata (APLA) that overcomes these limitations. We provide a stochastic stability analysis of APLA in multi-player coordination games. We further show that payoff-dominant Nash equilibria are the only stochastically stable states.
[ { "version": "v1", "created": "Wed, 7 Mar 2018 16:29:28 GMT" } ]
2018-03-08T00:00:00
[ [ "Chasparis", "Georgios C.", "" ] ]
new_dataset
0.998355
1803.02791
Aravindh Raman
Aravindh Raman, Gareth Tyson and Nishanth Sastry
Facebook (A)Live? Are live social broadcasts really broadcasts?
Published at The Web Conference 2018 (WWW 2018). Please cite the WWW version
null
10.1145/3178876.3186061
null
cs.SI cs.NI
http://creativecommons.org/licenses/by/4.0/
The era of live-broadcast is back but with two major changes. First, unlike traditional TV broadcasts, content is now streamed over the Internet enabling it to reach a wider audience. Second, due to various user-generated content platforms it has become possible for anyone to get involved, streaming their own content to the world. This emerging trend of going live usually happens via social platforms, where users perform live social broadcasts predominantly from their mobile devices, allowing their friends (and the general public) to engage with the stream in real-time. With the growing popularity of such platforms, the burden on the current Internet infrastructure is therefore expected to multiply. With this in mind, we explore one such prominent platform - Facebook Live. We gather 3TB of data, representing one month of global activity and explore the characteristics of live social broadcast. From this, we derive simple yet effective principles which can decrease the network burden. We then dissect global and hyper-local properties of the video while on-air, by capturing the geography of the broadcasters or the users who produce the video and the viewers or the users who interact with it. Finally, we study the social engagement while the video is live and distinguish the key aspects when the same video goes on-demand. A common theme throughout the paper is that, despite its name, many attributes of Facebook Live deviate from both the concepts of live and broadcast.
[ { "version": "v1", "created": "Wed, 7 Mar 2018 18:01:43 GMT" } ]
2018-03-08T00:00:00
[ [ "Raman", "Aravindh", "" ], [ "Tyson", "Gareth", "" ], [ "Sastry", "Nishanth", "" ] ]
new_dataset
0.999197
1803.02818
Jekan Thangavelautham
Himangshu Kalita, Steven Morad, Jekan Thangavelautham
Path Planning and Navigation Inside Off-World Lava Tubes and Caves
9 pages, 10 figures, IEEE ION PLAN Conference. arXiv admin note: text overlap with arXiv:1701.07550
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detailed surface images of the Moon and Mars reveal hundreds of cave-like openings. These cave-like openings are theorized to be remnants of lava-tubes and their interior maybe in pristine conditions. These locations may have well preserved geological records of the Moon and Mars, including evidence of past water flow and habitability. Exploration of these caves using wheeled rovers remains a daunting challenge. These caves are likely to have entrances with caved-in ceilings much like the lava-tubes of Arizona and New Mexico. Thus, the entrances are nearly impossible to traverse even for experienced human hikers. Our approach is to utilize the SphereX robot, a 3 kg, 30 cm diameter robot with computer hardware and sensors of a smartphone attached to rocket thrusters. Each SphereX robot can hop, roll or fly short distances in low gravity, airless or low-pressure environments. Several SphereX robots maybe deployed to minimize single-point failure and exploit cooperative behaviors to traverse the cave. There are some important challenges for navigation and path planning in these cave environments. Localization systems such as GPS are not available nor are they easy to install due to the signal blockage from the rocks. These caves are too dark and too large for conventional sensor such as cameras and miniature laser sensors to perform detailed mapping and navigation. In this paper, we identify new techniques to map these caves by performing localized, cooperative mapping and navigation.
[ { "version": "v1", "created": "Wed, 7 Mar 2018 18:50:30 GMT" } ]
2018-03-08T00:00:00
[ [ "Kalita", "Himangshu", "" ], [ "Morad", "Steven", "" ], [ "Thangavelautham", "Jekan", "" ] ]
new_dataset
0.998291
1802.10417
Abbas Acar
Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac, and Kemal Akkaya
WACA: Wearable-Assisted Continuous Authentication
A shorter version of this paper will appear in BioSTAR 2018 Workshop. This is the full version of the paper. 1st update: added ACK section
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One-time login process in conventional authentication systems does not guarantee that the identified user is the actual user throughout the session. However, it is necessary to re-verify the user identity periodically throughout a login session without reducing the user convenience. Continuous authentication can address this issue. However, existing methods are either not reliable or not usable. In this paper, we introduce a usable and reliable method called Wearable Assisted Continuous Authentication (WACA). WACA relies on the sensor based keystroke dynamics, where the authentication data is acquired through the built in sensors of a wearable (e.g., smartwatch) while the user is typing. We implemented the WACA framework and evaluated its performance on real devices with real users. The empirical evaluation of WACA reveals that WACA is feasible and its error rate is as low as 1 percent with 30 seconds of processing time and 2 3% for 20 seconds. The computational overhead is minimal. Furthermore, we tested WACA against different attack scenarios. WACA is capable of identifying insider threats with very high accuracy (99.2%) and also robust against powerful adversaries such as imitation and statistical attackers.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 14:04:31 GMT" }, { "version": "v2", "created": "Mon, 5 Mar 2018 19:30:55 GMT" } ]
2018-03-07T00:00:00
[ [ "Acar", "Abbas", "" ], [ "Aksu", "Hidayet", "" ], [ "Uluagac", "A. Selcuk", "" ], [ "Akkaya", "Kemal", "" ] ]
new_dataset
0.999723
1803.01592
Matthew England Dr
James H. Davenport, Matthew England, Roberto Sebastiani, Patrick Trentin
OpenMath and SMT-LIB
Presented in the OpenMath 2017 Workshop, at CICM 2017, Edinburgh, UK
null
null
null
cs.SC cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
OpenMath and SMT-LIB are languages with very different origins, but both "represent mathematics". We describe SMT-LIB for the OpenMath community and consider adaptations for both languages to support the growing SC-Square initiative.
[ { "version": "v1", "created": "Mon, 5 Mar 2018 10:33:50 GMT" } ]
2018-03-07T00:00:00
[ [ "Davenport", "James H.", "" ], [ "England", "Matthew", "" ], [ "Sebastiani", "Roberto", "" ], [ "Trentin", "Patrick", "" ] ]
new_dataset
0.956556
1803.01845
Vidya Narayanan
Vidya Narayanan, Vlad Barash, John Kelly, Bence Kollanyi, Lisa-Maria Neudert, Philip N. Howard
Polarization, Partisanship and Junk News Consumption over Social Media in the US
arXiv admin note: text overlap with arXiv:1802.03572
null
null
Data Memo 2018.1
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
What kinds of social media users read junk news? We examine the distribution of the most significant sources of junk news in the three months before President Donald Trump first State of the Union Address. Drawing on a list of sources that consistently publish political news and information that is extremist, sensationalist, conspiratorial, masked commentary, fake news and other forms of junk news, we find that the distribution of such content is unevenly spread across the ideological spectrum. We demonstrate that (1) on Twitter, a network of Trump supporters shares the widest range of known junk news sources and circulates more junk news than all the other groups put together; (2) on Facebook, extreme hard right pages, distinct from Republican pages, share the widest range of known junk news sources and circulate more junk news than all the other audiences put together; (3) on average, the audiences for junk news on Twitter share a wider range of known junk news sources than audiences on Facebook public pages.
[ { "version": "v1", "created": "Sun, 4 Mar 2018 20:54:33 GMT" } ]
2018-03-07T00:00:00
[ [ "Narayanan", "Vidya", "" ], [ "Barash", "Vlad", "" ], [ "Kelly", "John", "" ], [ "Kollanyi", "Bence", "" ], [ "Neudert", "Lisa-Maria", "" ], [ "Howard", "Philip N.", "" ] ]
new_dataset
0.997137
1803.02100
David Robb
Helen Hastie, Katrin Lohan, Mike Chantler, David A. Robb, Subramanian Ramamoorthy, Ron Petrick, Sethu Vijayakumar and David Lane
The ORCA Hub: Explainable Offshore Robotics through Intelligent Interfaces
2 pages. Peer reviewed position paper accepted in the Explainable Robotic Systems Workshop, ACM Human-Robot Interaction conference, March 2018, Chicago, IL USA
null
null
null
cs.AI cs.HC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the UK Robotics and Artificial Intelligence Hub for Offshore Robotics for Certification of Assets (ORCA Hub), a 3.5 year EPSRC funded, multi-site project. The ORCA Hub vision is to use teams of robots and autonomous intelligent systems (AIS) to work on offshore energy platforms to enable cheaper, safer and more efficient working practices. The ORCA Hub will research, integrate, validate and deploy remote AIS solutions that can operate with existing and future offshore energy assets and sensors, interacting safely in autonomous or semi-autonomous modes in complex and cluttered environments, co-operating with remote operators. The goal is that through the use of such robotic systems offshore, the need for personnel will decrease. To enable this to happen, the remote operator will need a high level of situation awareness and key to this is the transparency of what the autonomous systems are doing and why. This increased transparency will facilitate a trusting relationship, which is particularly key in high-stakes, hazardous situations.
[ { "version": "v1", "created": "Tue, 6 Mar 2018 10:43:38 GMT" } ]
2018-03-07T00:00:00
[ [ "Hastie", "Helen", "" ], [ "Lohan", "Katrin", "" ], [ "Chantler", "Mike", "" ], [ "Robb", "David A.", "" ], [ "Ramamoorthy", "Subramanian", "" ], [ "Petrick", "Ron", "" ], [ "Vijayakumar", "Sethu", "" ], [ "Lane", "David", "" ] ]
new_dataset
0.997432
1803.02122
Jose Berengueres Ph.D
Lojain Jibawi, Saoussen Said, Kenjiro Tadakuma and Jose Berengueres
Smartphone-based Home Robotics
6 pages, 3 figures, IEEE IROS 2018
null
null
null
cs.RO cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Humanoid robotics is a promising field because the strong human preference to interact with anthropomorphic interfaces. Despite this, humanoid robots are far from reaching main stream adoption and the features available in such robots seem to lag that of the latest smartphones. A fragmented robot ecosystem and low incentives to developers do not help to foster the creation of Robot-Apps either. In contrast, smartphones enjoy high adoption rates and a vibrant app ecosystem (4M apps published). Given this, it seems logical to apply the mobile SW and HW development model to humanoid robots. One way is to use a smartphone to power the robot. Smartphones have been embedded in toys and drones before. However, they have never been used as the main compute unit in a humanoid embodiment. Here, we introduce a novel robot architecture based on smartphones that demonstrates x3 cost reduction and that is compatible with iOS/Android.
[ { "version": "v1", "created": "Tue, 6 Mar 2018 11:29:21 GMT" } ]
2018-03-07T00:00:00
[ [ "Jibawi", "Lojain", "" ], [ "Said", "Saoussen", "" ], [ "Tadakuma", "Kenjiro", "" ], [ "Berengueres", "Jose", "" ] ]
new_dataset
0.995123
1803.02124
David Robb
Helen Hastie, Francisco J. Chiyah Garcia, David A. Robb, Pedro Patron and Atanas Laskov
MIRIAM: A Multimodal Chat-Based Interface for Autonomous Systems
2 pages, ICMI'17, 19th ACM International Conference on Multimodal Interaction, November 13-17 2017, Glasgow, UK
null
10.1145/3136755.3143022
null
cs.AI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present MIRIAM (Multimodal Intelligent inteRactIon for Autonomous systeMs), a multimodal interface to support situation awareness of autonomous vehicles through chat-based interaction. The user is able to chat about the vehicle's plan, objectives, previous activities and mission progress. The system is mixed initiative in that it pro-actively sends messages about key events, such as fault warnings. We will demonstrate MIRIAM using SeeByte's SeeTrack command and control interface and Neptune autonomy simulator.
[ { "version": "v1", "created": "Tue, 6 Mar 2018 11:33:04 GMT" } ]
2018-03-07T00:00:00
[ [ "Hastie", "Helen", "" ], [ "Garcia", "Francisco J. Chiyah", "" ], [ "Robb", "David A.", "" ], [ "Patron", "Pedro", "" ], [ "Laskov", "Atanas", "" ] ]
new_dataset
0.999536
1803.02181
Vandit Gajjar J
Vandit Gajjar
2^B3^C: 2 Box 3 Crop of Facial Image for Gender Classification with Convolutional Networks
8 Pages, 7 Figures, Submitted to IEEE Computer Society Biometrics 2018 workshop in conjuction with CVPR 2018
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we tackle the classification of gender in facial images with deep learning. Our convolutional neural networks (CNN) use the VGG-16 architecture [1] and are pretrained on ImageNet for image classification. Our proposed method (2^B3^C) first detects the face in the facial image, increases the margin of a detected face by 50%, cropping the face with two boxes three crop schemes (Left, Middle, and Right crop) and extracts the CNN predictions on the cropped schemes. The CNNs of our method is fine-tuned on the Adience and LFW with gender annotations. We show the effectiveness of our method by achieving 90.8% classification on Adience and achieving competitive 95.3% classification accuracy on LFW dataset. In addition, to check the true ability of our method, our gender classification system has a frame rate of 7-10 fps (frames per seconds) on a GPU considering real-time scenarios.
[ { "version": "v1", "created": "Mon, 5 Mar 2018 11:25:14 GMT" } ]
2018-03-07T00:00:00
[ [ "Gajjar", "Vandit", "" ] ]
new_dataset
0.980045
1803.02307
Youngjun Cho
Youngjun Cho, Andrea Bianchi, Nicolai Marquardt and Nadia Bianchi-Berthouze
RealPen: Providing Realism in Handwriting Tasks on Touch Surfaces using Auditory-Tactile Feedback
Proceedings of the 29th Annual Symposium on User Interface Software and Technology (UIST '16)
null
10.1145/2984511.2984550
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present RealPen, an augmented stylus for capacitive tablet screens that recreates the physical sensation of writing on paper with a pencil, ball-point pen or marker pen. The aim is to create a more engaging experience when writing on touch surfaces, such as screens of tablet computers. This is achieved by re-generating the friction-induced oscillation and sound of a real writing tool in contact with paper. To generate realistic tactile feedback, our algorithm analyses the frequency spectrum of the friction oscillation generated when writing with traditional tools, extracts principal frequencies, and uses the actuator's frequency response profile for an adjustment weighting function. We enhance the realism by providing the sound feedback aligned with the writing pressure and speed. Furthermore, we investigated the effects of superposition and fluctuation of several frequencies on human tactile perception, evaluated the performance of RealPen, and characterized users' perception and preference of each feedback type.
[ { "version": "v1", "created": "Tue, 6 Mar 2018 17:17:19 GMT" } ]
2018-03-07T00:00:00
[ [ "Cho", "Youngjun", "" ], [ "Bianchi", "Andrea", "" ], [ "Marquardt", "Nicolai", "" ], [ "Bianchi-Berthouze", "Nadia", "" ] ]
new_dataset
0.999596
1803.02337
Hantao Cui
Hantao Cui, Fangxing Li, Kevin Tomsovic, Siqi Wang, Riyasat Azim, Yidan Lu, Haoyu Yuan
Cyber-Physical Testbed for Power System Wide-Area Measurement-Based Control Using Open-Source Software
Submitted to IET CPS
null
null
null
cs.SY cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The electric power system is a cyber-physical system with power flow in the physical system and information flow in the cyber. Simulation is crucial to understanding the dynamics and control of electric power systems yet the underlying communication system has historically been ignored in these studies. This paper aims at meeting the increasing needs to simulate the operations of a real power system including the physical system, the energy management system, the communication system, and the emerging wide-area measurement-based controls. This paper proposes a cyber-physical testbed design and implementation for verifying and demonstrating wide-area control methods based on streaming telemetry and phasor measurement unit data. The proposed decoupled architecture is composed of a differential algebraic equation based physical system simulator, a software-defined network, a scripting language environment for prototyping an EMS system and a control system, all of which are integrated over industry-standard communication protocols. The proposed testbed is implemented using open-source software packages managed by a Python dispatcher. Finally, demonstrations are presented to show two wide-area measurement-based controls - system separation control and hierarchical voltage control, in the implemented testbed.
[ { "version": "v1", "created": "Tue, 6 Mar 2018 18:51:34 GMT" } ]
2018-03-07T00:00:00
[ [ "Cui", "Hantao", "" ], [ "Li", "Fangxing", "" ], [ "Tomsovic", "Kevin", "" ], [ "Wang", "Siqi", "" ], [ "Azim", "Riyasat", "" ], [ "Lu", "Yidan", "" ], [ "Yuan", "Haoyu", "" ] ]
new_dataset
0.980905
1101.1477
Lorne Applebaum
Lorne Applebaum, Waheed U. Bajwa, Marco F. Duarte, and Robert Calderbank
Asynchronous Code-Division Random Access Using Convex Optimization
Journal version of work presented at 2010 Allerton Conference on Communication, Control and Computing. Version 2 includes additional analysis of randomly distributed user delays as well as a comparison with a matched filter receiver
Elsevier Phy. Commun., vol. 5, no. 2, pp. 129-147, Jun. 2012
10.1016/j.phycom.2011.09.006
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many applications in cellular systems and sensor networks involve a random subset of a large number of users asynchronously reporting activity to a base station. This paper examines the problem of multiuser detection (MUD) in random access channels for such applications. Traditional orthogonal signaling ignores the random nature of user activity in this problem and limits the total number of users to be on the order of the number of signal space dimensions. Contention-based schemes, on the other hand, suffer from delays caused by colliding transmissions and the hidden node problem. In contrast, this paper presents a novel pairing of an asynchronous non-orthogonal code-division random access scheme with a convex optimization-based MUD algorithm that overcomes the issues associated with orthogonal signaling and contention-based methods. Two key distinguishing features of the proposed MUD algorithm are that it does not require knowledge of the delay or channel state information of every user and it has polynomial-time computational complexity. The main analytical contribution of this paper is the relationship between the performance of the proposed MUD algorithm in the presence of arbitrary or random delays and two simple metrics of the set of user codewords. The study of these metrics is then focused on two specific sets of codewords, random binary codewords and specially constructed algebraic codewords, for asynchronous random access. The ensuing analysis confirms that the proposed scheme together with either of these two codeword sets significantly outperforms the orthogonal signaling-based random access in terms of the total number of users in the system.
[ { "version": "v1", "created": "Fri, 7 Jan 2011 17:14:43 GMT" }, { "version": "v2", "created": "Mon, 20 Jun 2011 23:21:05 GMT" } ]
2018-03-06T00:00:00
[ [ "Applebaum", "Lorne", "" ], [ "Bajwa", "Waheed U.", "" ], [ "Duarte", "Marco F.", "" ], [ "Calderbank", "Robert", "" ] ]
new_dataset
0.994567
1607.06544
Albert Reuther
Albert Reuther, Chansup Byun, William Arcand, David Bestor, Bill Bergeron, Matthew Hubbell, Michael Jones, Peter Michaleas, Andrew Prout, Antonio Rosa, Jeremy Kepner
Scheduler Technologies in Support of High Performance Data Analysis
6 pages, 5 figures, IEEE High Performance Extreme Computing Conference 2016
null
10.1109/HPEC.2016.7761604
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Job schedulers are a key component of scalable computing infrastructures. They orchestrate all of the work executed on the computing infrastructure and directly impact the effectiveness of the system. Recently, job workloads have diversified from long-running, synchronously-parallel simulations to include short-duration, independently parallel high performance data analysis (HPDA) jobs. Each of these job types requires different features and scheduler tuning to run efficiently. A number of schedulers have been developed to address both job workload and computing system heterogeneity. High performance computing (HPC) schedulers were designed to schedule large-scale scientific modeling and simulations on supercomputers. Big Data schedulers were designed to schedule data processing and analytic jobs on clusters. This paper compares and contrasts the features of HPC and Big Data schedulers with a focus on accommodating both scientific computing and high performance data analytic workloads. Job latency is critical for the efficient utilization of scalable computing infrastructures, and this paper presents the results of job launch benchmarking of several current schedulers: Slurm, Son of Grid Engine, Mesos, and Yarn. We find that all of these schedulers have low utilization for short-running jobs. Furthermore, employing multilevel scheduling significantly improves the utilization across all schedulers.
[ { "version": "v1", "created": "Fri, 22 Jul 2016 03:02:04 GMT" } ]
2018-03-06T00:00:00
[ [ "Reuther", "Albert", "" ], [ "Byun", "Chansup", "" ], [ "Arcand", "William", "" ], [ "Bestor", "David", "" ], [ "Bergeron", "Bill", "" ], [ "Hubbell", "Matthew", "" ], [ "Jones", "Michael", "" ], [ "Michaleas", "Peter", "" ], [ "Prout", "Andrew", "" ], [ "Rosa", "Antonio", "" ], [ "Kepner", "Jeremy", "" ] ]
new_dataset
0.990714
1702.07893
Facundo Memoli
Patrizio Frosini, Claudia Landi, Facundo Memoli
The Persistent Homotopy Type Distance
version 2: Extended dHT to vector-valued functions and reworked Section 5
null
null
null
cs.CG math.AT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the persistent homotopy type distance dHT to compare real valued functions defined on possibly different homotopy equivalent topological spaces. The underlying idea in the definition of dHT is to measure the minimal shift that is necessary to apply to one of the two functions in order that the sublevel sets of the two functions become homotopically equivalent. This distance is interesting in connection with persistent homology. Indeed, our main result states that dHT still provides an upper bound for the bottleneck distance between the persistence diagrams of the intervening functions. Moreover, because homotopy equivalences are weaker than homeomorphisms, this implies a lifting of the standard stability results provided by the L-infty distance and the natural pseudo-distance dNP. From a different standpoint, we prove that dHT extends the L-infty distance and dNP in two ways. First, we show that, appropriately restricting the category of objects to which dHT applies, it can be made to coincide with the other two distances. Finally, we show that dHT has an interpretation in terms of interleavings that naturally places it in the family of distances used in persistence theory.
[ { "version": "v1", "created": "Sat, 25 Feb 2017 13:55:53 GMT" }, { "version": "v2", "created": "Sun, 4 Mar 2018 16:15:19 GMT" } ]
2018-03-06T00:00:00
[ [ "Frosini", "Patrizio", "" ], [ "Landi", "Claudia", "" ], [ "Memoli", "Facundo", "" ] ]
new_dataset
0.999333
1707.03515
Jeremy Kepner
Chansup Byun, Jeremy Kepner, William Arcand, David Bestor, Bill Bergeron, Vijay Gadepally, Michael Houle, Matthew Hubbell, Michael Jones, Anna Klein, Peter Michaleas, Lauren Milechin, Julie Mullen, Andrew Prout, Antonio Rosa, Siddharth Samsi, Charles Yee, Albert Reuther
Benchmarking Data Analysis and Machine Learning Applications on the Intel KNL Many-Core Processor
6 pages; 9 figures; accepted to IEEE HPEC 2017
null
10.1109/HPEC.2017.8091067
null
cs.PF astro-ph.IM cs.DC physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knights Landing (KNL) is the code name for the second-generation Intel Xeon Phi product family. KNL has generated significant interest in the data analysis and machine learning communities because its new many-core architecture targets both of these workloads. The KNL many-core vector processor design enables it to exploit much higher levels of parallelism. At the Lincoln Laboratory Supercomputing Center (LLSC), the majority of users are running data analysis applications such as MATLAB and Octave. More recently, machine learning applications, such as the UC Berkeley Caffe deep learning framework, have become increasingly important to LLSC users. Thus, the performance of these applications on KNL systems is of high interest to LLSC users and the broader data analysis and machine learning communities. Our data analysis benchmarks of these application on the Intel KNL processor indicate that single-core double-precision generalized matrix multiply (DGEMM) performance on KNL systems has improved by ~3.5x compared to prior Intel Xeon technologies. Our data analysis applications also achieved ~60% of the theoretical peak performance. Also a performance comparison of a machine learning application, Caffe, between the two different Intel CPUs, Xeon E5 v3 and Xeon Phi 7210, demonstrated a 2.7x improvement on a KNL node.
[ { "version": "v1", "created": "Wed, 12 Jul 2017 02:04:58 GMT" } ]
2018-03-06T00:00:00
[ [ "Byun", "Chansup", "" ], [ "Kepner", "Jeremy", "" ], [ "Arcand", "William", "" ], [ "Bestor", "David", "" ], [ "Bergeron", "Bill", "" ], [ "Gadepally", "Vijay", "" ], [ "Houle", "Michael", "" ], [ "Hubbell", "Matthew", "" ], [ "Jones", "Michael", "" ], [ "Klein", "Anna", "" ], [ "Michaleas", "Peter", "" ], [ "Milechin", "Lauren", "" ], [ "Mullen", "Julie", "" ], [ "Prout", "Andrew", "" ], [ "Rosa", "Antonio", "" ], [ "Samsi", "Siddharth", "" ], [ "Yee", "Charles", "" ], [ "Reuther", "Albert", "" ] ]
new_dataset
0.996373
1707.05900
Jeremy Kepner
Andrew Prout, William Arcand, David Bestor, Bill Bergeron, Chansup Byun, Vijay Gadepally, Matthew Hubbell, Michael Houle, Michael Jones, Peter Michaleas, Lauren Milechin, Julie Mullen, Antonio Rosa, Siddharth Samsi, Albert Reuther, Jeremy Kepner
MIT SuperCloud Portal Workspace: Enabling HPC Web Application Deployment
6 pages, 3 figures, to appear in IEEE HPEC 2017
null
10.1109/HPEC.2017.8091097
null
cs.DC cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The MIT SuperCloud Portal Workspace enables the secure exposure of web services running on high performance computing (HPC) systems. The portal allows users to run any web application as an HPC job and access it from their workstation while providing authentication, encryption, and access control at the system level to prevent unintended access. This capability permits users to seamlessly utilize existing and emerging tools that present their user interface as a website on an HPC system creating a portal workspace. Performance measurements indicate that the MIT SuperCloud Portal Workspace incurs marginal overhead when compared to a direct connection of the same service.
[ { "version": "v1", "created": "Wed, 19 Jul 2017 00:04:21 GMT" } ]
2018-03-06T00:00:00
[ [ "Prout", "Andrew", "" ], [ "Arcand", "William", "" ], [ "Bestor", "David", "" ], [ "Bergeron", "Bill", "" ], [ "Byun", "Chansup", "" ], [ "Gadepally", "Vijay", "" ], [ "Hubbell", "Matthew", "" ], [ "Houle", "Michael", "" ], [ "Jones", "Michael", "" ], [ "Michaleas", "Peter", "" ], [ "Milechin", "Lauren", "" ], [ "Mullen", "Julie", "" ], [ "Rosa", "Antonio", "" ], [ "Samsi", "Siddharth", "" ], [ "Reuther", "Albert", "" ], [ "Kepner", "Jeremy", "" ] ]
new_dataset
0.999647
1711.02741
Kuan Fang
Kuan Fang, Yu Xiang, Xiaocheng Li, Silvio Savarese
Recurrent Autoregressive Networks for Online Multi-Object Tracking
10 pages, 3 figures, 6 tables
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main challenge of online multi-object tracking is to reliably associate object trajectories with detections in each video frame based on their tracking history. In this work, we propose the Recurrent Autoregressive Network (RAN), a temporal generative modeling framework to characterize the appearance and motion dynamics of multiple objects over time. The RAN couples an external memory and an internal memory. The external memory explicitly stores previous inputs of each trajectory in a time window, while the internal memory learns to summarize long-term tracking history and associate detections by processing the external memory. We conduct experiments on the MOT 2015 and 2016 datasets to demonstrate the robustness of our tracking method in highly crowded and occluded scenes. Our method achieves top-ranked results on the two benchmarks.
[ { "version": "v1", "created": "Tue, 7 Nov 2017 21:51:22 GMT" }, { "version": "v2", "created": "Sun, 4 Mar 2018 04:21:03 GMT" } ]
2018-03-06T00:00:00
[ [ "Fang", "Kuan", "" ], [ "Xiang", "Yu", "" ], [ "Li", "Xiaocheng", "" ], [ "Savarese", "Silvio", "" ] ]
new_dataset
0.97847
1801.00409
Haris Bin Zia
Haris Bin Zia, Agha Ali Raza, Awais Athar
PronouncUR: An Urdu Pronunciation Lexicon Generator
5 pages, LREC 2018
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
State-of-the-art speech recognition systems rely heavily on three basic components: an acoustic model, a pronunciation lexicon and a language model. To build these components, a researcher needs linguistic as well as technical expertise, which is a barrier in low-resource domains. Techniques to construct these three components without having expert domain knowledge are in great demand. Urdu, despite having millions of speakers all over the world, is a low-resource language in terms of standard publically available linguistic resources. In this paper, we present a grapheme-to-phoneme conversion tool for Urdu that generates a pronunciation lexicon in a form suitable for use with speech recognition systems from a list of Urdu words. The tool predicts the pronunciation of words using a LSTM-based model trained on a handcrafted expert lexicon of around 39,000 words and shows an accuracy of 64% upon internal evaluation. For external evaluation on a speech recognition task, we obtain a word error rate comparable to one achieved using a fully handcrafted expert lexicon.
[ { "version": "v1", "created": "Mon, 1 Jan 2018 07:54:09 GMT" }, { "version": "v2", "created": "Mon, 5 Mar 2018 17:57:03 GMT" } ]
2018-03-06T00:00:00
[ [ "Zia", "Haris Bin", "" ], [ "Raza", "Agha Ali", "" ], [ "Athar", "Awais", "" ] ]
new_dataset
0.998744
1802.03373
Sai Qian Zhang
Sai Qian Zhang, H.T. Kung, Youngjune Gwon
InferBeam: A Fast Beam Alignment Protocol for Millimeter-wave Networking
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce fast millimeter-wave base station (BS) and its antenna sector selection for user equipment based on its location. Using a conditional random field inference model with specially designed parameters, which are robust to change of environment, InferBeam allows the use of measurement samples on best beam selection at a small number of locations to infer the rest dynamically. Compared to beam-sweeping based approaches in the literature, InferBeam can drastically reduce the setup cost for beam alignment for a new environment, and also the latency in acquiring a new beam under intermittent blockage. We have evaluated InferBeam using a discrete event simulation. Our results indicate that the system can make best beam selection for 98% of locations in test environments comprising smallsized apartment or office spaces, while sampling fewer than 1% of locations. InferBeam is a complete protocol for best beam inference that can be integrated into millimeter-wave standards for accelerating the much-needed fast and economic beam alignment capability.
[ { "version": "v1", "created": "Fri, 9 Feb 2018 18:19:25 GMT" }, { "version": "v2", "created": "Mon, 5 Mar 2018 16:02:03 GMT" } ]
2018-03-06T00:00:00
[ [ "Zhang", "Sai Qian", "" ], [ "Kung", "H. T.", "" ], [ "Gwon", "Youngjune", "" ] ]
new_dataset
0.996155
1803.01047
Mehmet Turan
Mehmet Turan, Evin Pinar Ornek, Nail Ibrahimli, Can Giracoglu, Yasin Almalioglu, Mehmet Fatih Yanik, and Metin Sitti
Unsupervised Odometry and Depth Learning for Endoscopic Capsule Robots
submitted to IROS 2018
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last decade, many medical companies and research groups have tried to convert passive capsule endoscopes as an emerging and minimally invasive diagnostic technology into actively steerable endoscopic capsule robots which will provide more intuitive disease detection, targeted drug delivery and biopsy-like operations in the gastrointestinal(GI) tract. In this study, we introduce a fully unsupervised, real-time odometry and depth learner for monocular endoscopic capsule robots. We establish the supervision by warping view sequences and assigning the re-projection minimization to the loss function, which we adopt in multi-view pose estimation and single-view depth estimation network. Detailed quantitative and qualitative analyses of the proposed framework performed on non-rigidly deformable ex-vivo porcine stomach datasets proves the effectiveness of the method in terms of motion estimation and depth recovery.
[ { "version": "v1", "created": "Fri, 2 Mar 2018 21:30:39 GMT" } ]
2018-03-06T00:00:00
[ [ "Turan", "Mehmet", "" ], [ "Ornek", "Evin Pinar", "" ], [ "Ibrahimli", "Nail", "" ], [ "Giracoglu", "Can", "" ], [ "Almalioglu", "Yasin", "" ], [ "Yanik", "Mehmet Fatih", "" ], [ "Sitti", "Metin", "" ] ]
new_dataset
0.978918
1803.01136
Marco Giordani
Marco Giordani, Mattia Rebato, Andrea Zanella, Michele Zorzi
Coverage and Connectivity Analysis of Millimeter Wave Vehicular Networks
In press of Elsevier Ad Hoc Networks
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The next generations of vehicles will require data transmission rates in the order of terabytes per driving hour, to support advanced automotive services. This unprecedented amount of data to be exchanged goes beyond the capabilities of existing communication technologies for vehicular communication and calls for new solutions. A possible answer to this growing demand for ultra-high transmission speeds can be found in the millimeter-wave (mmWave) bands which, however, are subject to high signal attenuation and challenging propagation characteristics. In particular, mmWave links are typically directional, to benefit from the resulting beamforming gain, and require precise alignment of the transmitter and the receiver beams, an operation which may increase the latency of the communication and lead to deafness due to beam misalignment. In this paper, we propose a stochastic model for characterizing the beam coverage and connectivity probability in mmWave automotive networks. The purpose is to exemplify some of the complex and interesting tradeoffs that have to be considered when designing solutions for vehicular scenarios based on mmWave links. The results show that the performance of the automotive nodes in highly mobile mmWave systems strictly depends on the specific environment in which the vehicles are deployed, and must account for several automotive-specific features such as the nodes speed, the beam alignment periodicity, the base stations density and the antenna geometry.
[ { "version": "v1", "created": "Sat, 3 Mar 2018 10:01:11 GMT" } ]
2018-03-06T00:00:00
[ [ "Giordani", "Marco", "" ], [ "Rebato", "Mattia", "" ], [ "Zanella", "Andrea", "" ], [ "Zorzi", "Michele", "" ] ]
new_dataset
0.972516
1803.01261
Anastasia Shuba
Anastasia Shuba, Evita Bakopoulou, Milad Asgari Mehrabadi, Hieu Le, David Choffnes, Athina Markopoulou
AntShield: On-Device Detection of Personal Information Exposure
null
null
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile devices have access to personal, potentially sensitive data, and there is a growing number of applications that transmit this personally identifiable information (PII) over the network. In this paper, we present the AntShield system that performs on-device packet-level monitoring and detects the transmission of such sensitive information accurately and in real-time. A key insight is to distinguish PII that is predefined and is easily available on the device from PII that is unknown a priori but can be automatically detected by classifiers. Our system not only combines, for the first time, the advantages of on-device monitoring with the power of learning unknown PII, but also outperforms either of the two approaches alone. We demonstrate the real-time performance of our prototype as well as the classification performance using a dataset that we collect and analyze from scratch (including new findings in terms of leaks and patterns). AntShield is a first step towards enabling distributed learning of private information exposure.
[ { "version": "v1", "created": "Sat, 3 Mar 2018 23:31:49 GMT" } ]
2018-03-06T00:00:00
[ [ "Shuba", "Anastasia", "" ], [ "Bakopoulou", "Evita", "" ], [ "Mehrabadi", "Milad Asgari", "" ], [ "Le", "Hieu", "" ], [ "Choffnes", "David", "" ], [ "Markopoulou", "Athina", "" ] ]
new_dataset
0.980347
1803.01276
Miguel Mosteiro
Austin Halper, Miguel A. Mosteiro, Yulia Rossikova, and Prudence W. H. Wong
Station Assignment with Reallocation
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a dynamic allocation problem that arises in various scenarios where mobile clients joining and leaving the system have to communicate with static stations via radio transmissions. Restrictions are a maximum delay, or laxity, between consecutive client transmissions and a maximum bandwidth that a station can share among its clients. We study the problem of assigning clients to stations so that every client transmits to some station, satisfying those restrictions. We consider reallocation algorithms, where clients are revealed at its arrival time, the departure time is unknown until they leave, and clients may be reallocated to another station, but at a cost proportional to the reciprocal of the client laxity. We present negative results for previous related protocols that motivate the study; we introduce new protocols that expound trade-offs between station usage and reallocation cost; we determine experimentally a classification of the clients attempting to balance those opposite goals; we prove theoretically bounds on our performance metrics; and we show through simulations that, for realistic scenarios, our protocols behave much better than our theoretical guarantees.
[ { "version": "v1", "created": "Sun, 4 Mar 2018 00:55:39 GMT" } ]
2018-03-06T00:00:00
[ [ "Halper", "Austin", "" ], [ "Mosteiro", "Miguel A.", "" ], [ "Rossikova", "Yulia", "" ], [ "Wong", "Prudence W. H.", "" ] ]
new_dataset
0.972139
1803.01362
Adri\'an G\'omez-Brand\'on
Nieves R. Brisaboa, Travis Gagie, Adri\'an G\'omez-Brand\'on and Gonzalo Navarro
Two-Dimensional Block Trees
This research has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Sk{\l}odowska-Curie Actions H2020-MSCA-RISE-2015 BIRDS GA No. 690941
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Block Tree (BT) is a novel compact data structure designed to compress sequence collections. It obtains compression ratios close to Lempel-Ziv and supports efficient direct access to any substring. The BT divides the text recursively into fixed-size blocks and those appearing earlier are represented with pointers. On repetitive collections, a few blocks can represent all the others, and thus the BT reduces the size by orders of magnitude. In this paper we extend the BT to two dimensions, to exploit repetitiveness in collections of images, graphs, and maps. This two-dimensional Block Tree divides the image regularly into subimages and replaces some of them by pointers to other occurrences thereof. We develop a specific variant aimed at compressing the adjacency matrices of Web graphs, obtaining space reductions of up to 50\% compared with the $k^2$-tree, which is the best alternative supporting direct and reverse navigation in the graph.
[ { "version": "v1", "created": "Sun, 4 Mar 2018 14:46:32 GMT" } ]
2018-03-06T00:00:00
[ [ "Brisaboa", "Nieves R.", "" ], [ "Gagie", "Travis", "" ], [ "Gómez-Brandón", "Adrián", "" ], [ "Navarro", "Gonzalo", "" ] ]
new_dataset
0.996423
1803.01394
Roberto Tonelli
Gianni Fenu, Lodovica Marchesi, Michele Marchesi and Roberto Tonelli
The ICO Phenomenon and Its Relationships with Ethereum Smart Contract Environment
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Initial Coin Offerings (ICO) are public offers of new cryptocurrencies in exchange of existing ones, aimed to finance projects in the blockchain development arena. In the last 8 months of 2017, the total amount gathered by ICOs exceeded 4 billion US$, and overcame the venture capital funnelled toward high tech initiatives in the same period. A high percentage of ICOS is managed through Smart Contracts running on Ethereum blockchain, and in particular to ERC-20 Token Standard Contract. In this work we examine 1388 ICOs, published on December 31, 2017 on icobench.com Web site, gathering information relevant to the assessment of their quality and software development management, including data on their development teams. We also study, at the same date, the financial data of 450 ICO tokens available on coinmarketcap.com Web site, among which 355 tokens are managed on Ethereum blochain. We define success criteria for the ICOs, based on the funds actually gathered, and on the behavior of the price of the related tokens, finding the factors that most likely influence the ICO success likeliness.
[ { "version": "v1", "created": "Sun, 4 Mar 2018 17:57:01 GMT" } ]
2018-03-06T00:00:00
[ [ "Fenu", "Gianni", "" ], [ "Marchesi", "Lodovica", "" ], [ "Marchesi", "Michele", "" ], [ "Tonelli", "Roberto", "" ] ]
new_dataset
0.998932
1803.01413
Gedas Bertasius
Gedas Bertasius, Aaron Chan, Jianbo Shi
Egocentric Basketball Motion Planning from a Single First-Person Image
CVPR 2018
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a model that uses a single first-person image to generate an egocentric basketball motion sequence in the form of a 12D camera configuration trajectory, which encodes a player's 3D location and 3D head orientation throughout the sequence. To do this, we first introduce a future convolutional neural network (CNN) that predicts an initial sequence of 12D camera configurations, aiming to capture how real players move during a one-on-one basketball game. We also introduce a goal verifier network, which is trained to verify that a given camera configuration is consistent with the final goals of real one-on-one basketball players. Next, we propose an inverse synthesis procedure to synthesize a refined sequence of 12D camera configurations that (1) sufficiently matches the initial configurations predicted by the future CNN, while (2) maximizing the output of the goal verifier network. Finally, by following the trajectory resulting from the refined camera configuration sequence, we obtain the complete 12D motion sequence. Our model generates realistic basketball motion sequences that capture the goals of real players, outperforming standard deep learning approaches such as recurrent neural networks (RNNs), long short-term memory networks (LSTMs), and generative adversarial networks (GANs).
[ { "version": "v1", "created": "Sun, 4 Mar 2018 20:12:58 GMT" } ]
2018-03-06T00:00:00
[ [ "Bertasius", "Gedas", "" ], [ "Chan", "Aaron", "" ], [ "Shi", "Jianbo", "" ] ]
new_dataset
0.999167
1803.01469
EPTCS
Mario Frank (University of Potsdam, Institute for Computer Science, Potsdam, Germany), Christoph Kreitz (University of Potsdam, Institute for Computer Science, Potsdam, Germany)
A Theorem Prover for Scientific and Educational Purposes
In Proceedings ThEdu'17, arXiv:1803.00722
EPTCS 267, 2018, pp. 59-69
10.4204/EPTCS.267.4
null
cs.HC cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a prototype of an integrated reasoning environment for educational purposes. The presented tool is a fragment of a proof assistant and automated theorem prover. We describe the existing and planned functionality of the theorem prover and especially the functionality of the educational fragment. This currently supports working with terms of the untyped lambda calculus and addresses both undergraduate students and researchers. We show how the tool can be used to support the students' understanding of functional programming and discuss general problems related to the process of building theorem proving software that aims at supporting both research and education.
[ { "version": "v1", "created": "Mon, 5 Mar 2018 02:46:32 GMT" } ]
2018-03-06T00:00:00
[ [ "Frank", "Mario", "", "University of Potsdam, Institute for Computer Science,\n Potsdam, Germany" ], [ "Kreitz", "Christoph", "", "University of Potsdam, Institute for\n Computer Science, Potsdam, Germany" ] ]
new_dataset
0.97533
1803.01473
EPTCS
J{\o}rgen Villadsen (Technical University of Denmark), Andreas Halkj{\ae}r From (Technical University of Denmark), Anders Schlichtkrull (Technical University of Denmark)
Natural Deduction and the Isabelle Proof Assistant
In Proceedings ThEdu'17, arXiv:1803.00722
EPTCS 267, 2018, pp. 140-155
10.4204/EPTCS.267.9
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe our Natural Deduction Assistant (NaDeA) and the interfaces between the Isabelle proof assistant and NaDeA. In particular, we explain how NaDeA, using a generated prover that has been verified in Isabelle, provides feedback to the student, and also how NaDeA, for each formula proved by the student, provides a generated theorem that can be verified in Isabelle.
[ { "version": "v1", "created": "Mon, 5 Mar 2018 02:47:59 GMT" } ]
2018-03-06T00:00:00
[ [ "Villadsen", "Jørgen", "", "Technical University of Denmark" ], [ "From", "Andreas Halkjær", "", "Technical University of Denmark" ], [ "Schlichtkrull", "Anders", "", "Technical University of Denmark" ] ]
new_dataset
0.998622
1803.01579
Christos Verginis PhD student
Christos K. Verginis and Dimos V. Dimarogonas
Motion and Cooperative Transportation Planning for Multi-Agent Systems under Temporal Logic Formulas
Submitted to IEEE Transactions on Automation Science and Engineering. arXiv admin note: text overlap with arXiv:1611.05186
null
null
null
cs.SY cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a hybrid control framework for the motion planning of a multi-agent system including N robotic agents and M objects, under high level goals expressed as Linear Temporal Logic (LTL) formulas. In particular, we design control protocols that allow the transition of the agents as well as the cooperative transportation of the objects by the agents, among predefined regions of interest in the workspace. This allows to abstract the coupled behavior of the agents and the objects as a finite transition system and to design a high-level multi-agent plan that satisfies the agents' and the objects' specifications, given as temporal logic formulas. Simulation results verify the proposed framework.
[ { "version": "v1", "created": "Mon, 5 Mar 2018 10:05:44 GMT" } ]
2018-03-06T00:00:00
[ [ "Verginis", "Christos K.", "" ], [ "Dimarogonas", "Dimos V.", "" ] ]
new_dataset
0.961887
1803.01598
Florian Quinkert
Florian Quinkert, Thorsten Holz, KSM Tozammel Hossain, Emilio Ferrara, and Kristina Lerman
RAPTOR: Ransomware Attack PredicTOR
20 pages
null
null
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in known ransomware attacks, and then monitors newly registered domains to identify potentially malicious ones. In addition, RAPTOR uses time series forecasting techniques to learn models of historical ransomware activity and then leverages malicious domain registrations as an external signal to forecast future ransomware activity. We illustrate RAPTOR's effectiveness by forecasting all activity stages of Cerber, a popular ransomware family. By monitoring zone files of the top-level domain .top starting from August 30, 2016 through May 31, 2017, RAPTOR predicted 2,126 newly registered domains to be potential Cerber domains. Of these, 378 later actually appeared in blacklists. Our empirical evaluation results show that using predicted domain registrations helped improve forecasts of future Cerber activity. Most importantly, our approach demonstrates the value of fusing different signals in forecasting applications in the cyber domain.
[ { "version": "v1", "created": "Mon, 5 Mar 2018 10:51:24 GMT" } ]
2018-03-06T00:00:00
[ [ "Quinkert", "Florian", "" ], [ "Holz", "Thorsten", "" ], [ "Hossain", "KSM Tozammel", "" ], [ "Ferrara", "Emilio", "" ], [ "Lerman", "Kristina", "" ] ]
new_dataset
0.997051
1701.07842
Nicholas V. Lewchenko
Arjun Radhakrishna, Nicholas V. Lewchenko, Shawn Meier, Sergio Mover, Krishna Chaitanya Sripada, Damien Zufferey, Bor-Yuh Evan Chang, and Pavol \v{C}ern\'y
DroidStar: Callback Typestates for Android Classes
Appearing at ICSE 2018
null
null
null
cs.LO cs.LG cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Event-driven programming frameworks, such as Android, are based on components with asynchronous interfaces. The protocols for interacting with these components can often be described by finite-state machines we dub *callback typestates*. Callback typestates are akin to classical typestates, with the difference that their outputs (callbacks) are produced asynchronously. While useful, these specifications are not commonly available, because writing them is difficult and error-prone. Our goal is to make the task of producing callback typestates significantly easier. We present a callback typestate assistant tool, DroidStar, that requires only limited user interaction to produce a callback typestate. Our approach is based on an active learning algorithm, L*. We improved the scalability of equivalence queries (a key component of L*), thus making active learning tractable on the Android system. We use DroidStar to learn callback typestates for Android classes both for cases where one is already provided by the documentation, and for cases where the documentation is unclear. The results show that DroidStar learns callback typestates accurately and efficiently. Moreover, in several cases, the synthesized callback typestates uncovered surprising and undocumented behaviors.
[ { "version": "v1", "created": "Thu, 26 Jan 2017 19:06:45 GMT" }, { "version": "v2", "created": "Tue, 27 Feb 2018 23:43:09 GMT" }, { "version": "v3", "created": "Fri, 2 Mar 2018 18:45:04 GMT" } ]
2018-03-05T00:00:00
[ [ "Radhakrishna", "Arjun", "" ], [ "Lewchenko", "Nicholas V.", "" ], [ "Meier", "Shawn", "" ], [ "Mover", "Sergio", "" ], [ "Sripada", "Krishna Chaitanya", "" ], [ "Zufferey", "Damien", "" ], [ "Chang", "Bor-Yuh Evan", "" ], [ "Černý", "Pavol", "" ] ]
new_dataset
0.996144
1802.02669
Tolga Birdal
Haowen Deng, Tolga Birdal and Slobodan Ilic
PPFNet: Global Context Aware Local Features for Robust 3D Point Matching
Accepted for publication at CVPR 2018
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present PPFNet - Point Pair Feature NETwork for deeply learning a globally informed 3D local feature descriptor to find correspondences in unorganized point clouds. PPFNet learns local descriptors on pure geometry and is highly aware of the global context, an important cue in deep learning. Our 3D representation is computed as a collection of point-pair-features combined with the points and normals within a local vicinity. Our permutation invariant network design is inspired by PointNet and sets PPFNet to be ordering-free. As opposed to voxelization, our method is able to consume raw point clouds to exploit the full sparsity. PPFNet uses a novel $\textit{N-tuple}$ loss and architecture injecting the global information naturally into the local descriptor. It shows that context awareness also boosts the local feature representation. Qualitative and quantitative evaluations of our network suggest increased recall, improved robustness and invariance as well as a vital step in the 3D descriptor extraction performance.
[ { "version": "v1", "created": "Wed, 7 Feb 2018 23:01:52 GMT" }, { "version": "v2", "created": "Thu, 1 Mar 2018 20:26:25 GMT" } ]
2018-03-05T00:00:00
[ [ "Deng", "Haowen", "" ], [ "Birdal", "Tolga", "" ], [ "Ilic", "Slobodan", "" ] ]
new_dataset
0.981076
1802.08979
Xi Victoria Lin
Xi Victoria Lin and Chenglong Wang and Luke Zettlemoyer and Michael D. Ernst
NL2Bash: A Corpus and Semantic Parser for Natural Language Interface to the Linux Operating System
Accepted at the Language Resource and Evaluation Conference (LREC) 2018
null
null
null
cs.CL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present new data and semantic parsing methods for the problem of mapping English sentences to Bash commands (NL2Bash). Our long-term goal is to enable any user to perform operations such as file manipulation, search, and application-specific scripting by simply stating their goals in English. We take a first step in this domain, by providing a new dataset of challenging but commonly used Bash commands and expert-written English descriptions, along with baseline methods to establish performance levels on this task.
[ { "version": "v1", "created": "Sun, 25 Feb 2018 09:52:24 GMT" }, { "version": "v2", "created": "Fri, 2 Mar 2018 17:46:59 GMT" } ]
2018-03-05T00:00:00
[ [ "Lin", "Xi Victoria", "" ], [ "Wang", "Chenglong", "" ], [ "Zettlemoyer", "Luke", "" ], [ "Ernst", "Michael D.", "" ] ]
new_dataset
0.999728
1803.00451
Prabath Jayatissa Dr
W.G.P.T Jayathissa (Post Graduate Institute of Medicine University of Colombo), Vajira H W Dissanayake (Post Graduate Institute of Medicine University of Colombo), Roshan Hewapathirana (Post Graduate Institute of Medicine University of Colombo)
Developing a functional prototype master patient index (MPI) for interoperability of e-health systems in Sri Lanka
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Introduction: A Master Patient Index(MPI) is a centralized index of all patients in a healthcare system. This index is composed of a unique identifier for each patient link to his/her demographic data and clinical encounters. A MPI is essential to ensure data interoperability in the different healthcare institution. The The health ministry of Sri Lanka planning to develop MPI for the country. This project focused on developing the prototype MPI for Sri Lanka with the view to implementing and scaling up at the national level. Methods: This project consisted of 3 phases. Phase 1: requirement analysis using focus group discussions (FGD) with information system users. Phase 2: identification of the suitable Application Programming interface (API) model. Phase 3: development of the prototype MPI. Results: FGD were conducted in 6 hospitals. There were 78 interviewers (Male -36, and female - 42). They highlighted the key requirements for the MPI. Which were the unique identification method and different searching criteria and merging records to avoid duplication. Using this information, the requirements specification for MPI was developed. A combination of monolithic and microservices architecture was selected to develop the MPI. The API using the Personal Health Number (PHN) as the unique patient identifier and HL7 standard was developed and implemented. Conclusions: Development and implementation of a MPI has facilitated the long due need for interoperability among health information systems in Sri Lankan. KEYWORDS MPI, Interoperability, Unique Identifier, PHN, API
[ { "version": "v1", "created": "Thu, 1 Mar 2018 15:36:33 GMT" }, { "version": "v2", "created": "Fri, 2 Mar 2018 15:10:15 GMT" } ]
2018-03-05T00:00:00
[ [ "Jayathissa", "W. G. P. T", "", "Post Graduate Institute of Medicine University of\n Colombo" ], [ "Dissanayake", "Vajira H W", "", "Post Graduate Institute of Medicine\n University of Colombo" ], [ "Hewapathirana", "Roshan", "", "Post Graduate Institute of\n Medicine University of Colombo" ] ]
new_dataset
0.976195
1803.00653
Alexey Dosovitskiy
Nikolay Savinov, Alexey Dosovitskiy, Vladlen Koltun
Semi-parametric Topological Memory for Navigation
Published at International Conference on Learning Representations (ICLR) 2018. Project website at https://sites.google.com/view/SPTM
null
null
null
cs.LG cs.AI cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new memory architecture for navigation in previously unseen environments, inspired by landmark-based navigation in animals. The proposed semi-parametric topological memory (SPTM) consists of a (non-parametric) graph with nodes corresponding to locations in the environment and a (parametric) deep network capable of retrieving nodes from the graph based on observations. The graph stores no metric information, only connectivity of locations corresponding to the nodes. We use SPTM as a planning module in a navigation system. Given only 5 minutes of footage of a previously unseen maze, an SPTM-based navigation agent can build a topological map of the environment and use it to confidently navigate towards goals. The average success rate of the SPTM agent in goal-directed navigation across test environments is higher than the best-performing baseline by a factor of three. A video of the agent is available at https://youtu.be/vRF7f4lhswo
[ { "version": "v1", "created": "Thu, 1 Mar 2018 22:50:35 GMT" } ]
2018-03-05T00:00:00
[ [ "Savinov", "Nikolay", "" ], [ "Dosovitskiy", "Alexey", "" ], [ "Koltun", "Vladlen", "" ] ]
new_dataset
0.997991
1803.00900
Sukjin Lee
Suk Jin Lee, Hongsik Choi, Sungun Kim
Slotted CSMA/CA Based Energy Efficient MAC Protocol Design in Nanonetworks
12 pages, 9 figures, Journal
International Journal of Wireless & Mobile Networks, 2018
10.5121/ijwmn.2018.10101
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Devices in a beacon-enabled network use slotted CSMA/CA to contend for channel usage. Each node in the network competes for the channels when ready to transmit data. The slotted CSMA/CA mechanism based on the super-frame structure fairly provides communication chance for each node and makes a reasonable usage of the available energy in beacon-enabled Zigbee networks. When wireless nano-sensor nodes are implanted into the target human body area for detecting disease symptoms or virus existence, each node also requires a similar characteristic in channel sharing and in the transmission of event-driven data with a short length. In this paper, we suggest a wireless network model with nano-sensor nodes for the in-body application. We propose a novel MAC protocol derived from an existing Zigbee MAC protocol scheme and analyze the performance of energy usage with variable super-frame durations and packet sizes.
[ { "version": "v1", "created": "Fri, 2 Mar 2018 15:38:44 GMT" } ]
2018-03-05T00:00:00
[ [ "Lee", "Suk Jin", "" ], [ "Choi", "Hongsik", "" ], [ "Kim", "Sungun", "" ] ]
new_dataset
0.998176
1803.00902
Duygu Altinok
Duygu Altinok
DEMorphy, German Language Morphological Analyzer
7 pages, 2 figures
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/4.0/
DEMorphy is a morphological analyzer for German. It is built onto large, compactified lexicons from German Morphological Dictionary. A guesser based on German declension suffixed is also provided. For German, we provided a state-of-art morphological analyzer. DEMorphy is implemented in Python with ease of usability and accompanying documentation. The package is suitable for both academic and commercial purposes wit a permissive licence.
[ { "version": "v1", "created": "Fri, 2 Mar 2018 15:41:33 GMT" } ]
2018-03-05T00:00:00
[ [ "Altinok", "Duygu", "" ] ]
new_dataset
0.999354
1501.02741
Ming-Ming Cheng Prof.
Ali Borji, Ming-Ming Cheng, Huaizu Jiang, Jia Li
Salient Object Detection: A Benchmark
null
Image Processing, IEEE Transactions on (Volume:24, Issue: 12), 2015
10.1109/TIP.2015.2487833
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extensively compare, qualitatively and quantitatively, 40 state-of-the-art models (28 salient object detection, 10 fixation prediction, 1 objectness, and 1 baseline) over 6 challenging datasets for the purpose of benchmarking salient object detection and segmentation methods. From the results obtained so far, our evaluation shows a consistent rapid progress over the last few years in terms of both accuracy and running time. The top contenders in this benchmark significantly outperform the models identified as the best in the previous benchmark conducted just two years ago. We find that the models designed specifically for salient object detection generally work better than models in closely related areas, which in turn provides a precise definition and suggests an appropriate treatment of this problem that distinguishes it from other problems. In particular, we analyze the influences of center bias and scene complexity in model performance, which, along with the hard cases for state-of-the-art models, provide useful hints towards constructing more challenging large scale datasets and better saliency models. Finally, we propose probable solutions for tackling several open problems such as evaluation scores and dataset bias, which also suggest future research directions in the rapidly-growing field of salient object detection.
[ { "version": "v1", "created": "Mon, 5 Jan 2015 20:24:01 GMT" }, { "version": "v2", "created": "Tue, 27 Feb 2018 06:24:39 GMT" } ]
2018-03-02T00:00:00
[ [ "Borji", "Ali", "" ], [ "Cheng", "Ming-Ming", "" ], [ "Jiang", "Huaizu", "" ], [ "Li", "Jia", "" ] ]
new_dataset
0.99905
1704.00675
Jordi Pont-Tuset
Jordi Pont-Tuset and Federico Perazzi and Sergi Caelles and Pablo Arbel\'aez and Alex Sorkine-Hornung and Luc Van Gool
The 2017 DAVIS Challenge on Video Object Segmentation
Challenge website: http://davischallenge.org
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the 2017 DAVIS Challenge on Video Object Segmentation, a public dataset, benchmark, and competition specifically designed for the task of video object segmentation. Following the footsteps of other successful initiatives, such as ILSVRC and PASCAL VOC, which established the avenue of research in the fields of scene classification and semantic segmentation, the DAVIS Challenge comprises a dataset, an evaluation methodology, and a public competition with a dedicated workshop co-located with CVPR 2017. The DAVIS Challenge follows up on the recent publication of DAVIS (Densely-Annotated VIdeo Segmentation), which has fostered the development of several novel state-of-the-art video object segmentation techniques. In this paper we describe the scope of the benchmark, highlight the main characteristics of the dataset, define the evaluation metrics of the competition, and present a detailed analysis of the results of the participants to the challenge.
[ { "version": "v1", "created": "Mon, 3 Apr 2017 16:44:46 GMT" }, { "version": "v2", "created": "Wed, 26 Apr 2017 18:07:57 GMT" }, { "version": "v3", "created": "Thu, 1 Mar 2018 17:50:08 GMT" } ]
2018-03-02T00:00:00
[ [ "Pont-Tuset", "Jordi", "" ], [ "Perazzi", "Federico", "" ], [ "Caelles", "Sergi", "" ], [ "Arbeláez", "Pablo", "" ], [ "Sorkine-Hornung", "Alex", "" ], [ "Van Gool", "Luc", "" ] ]
new_dataset
0.999618
1801.02608
Danny Karmon
Danny Karmon, Daniel Zoran and Yoav Goldberg
LaVAN: Localized and Visible Adversarial Noise
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most works on adversarial examples for deep-learning based image classifiers use noise that, while small, covers the entire image. We explore the case where the noise is allowed to be visible but confined to a small, localized patch of the image, without covering any of the main object(s) in the image. We show that it is possible to generate localized adversarial noises that cover only 2% of the pixels in the image, none of them over the main object, and that are transferable across images and locations, and successfully fool a state-of-the-art Inception v3 model with very high success rates.
[ { "version": "v1", "created": "Mon, 8 Jan 2018 18:44:23 GMT" }, { "version": "v2", "created": "Thu, 1 Mar 2018 12:49:11 GMT" } ]
2018-03-02T00:00:00
[ [ "Karmon", "Danny", "" ], [ "Zoran", "Daniel", "" ], [ "Goldberg", "Yoav", "" ] ]
new_dataset
0.955626
1803.00085
Tai-Ling Yuan
Tai-Ling Yuan, Zhe Zhu, Kun Xu, Cheng-Jun Li, Shi-Min Hu
Chinese Text in the Wild
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
We introduce Chinese Text in the Wild, a very large dataset of Chinese text in street view images. While optical character recognition (OCR) in document images is well studied and many commercial tools are available, detection and recognition of text in natural images is still a challenging problem, especially for more complicated character sets such as Chinese text. Lack of training data has always been a problem, especially for deep learning methods which require massive training data. In this paper we provide details of a newly created dataset of Chinese text with about 1 million Chinese characters annotated by experts in over 30 thousand street view images. This is a challenging dataset with good diversity. It contains planar text, raised text, text in cities, text in rural areas, text under poor illumination, distant text, partially occluded text, etc. For each character in the dataset, the annotation includes its underlying character, its bounding box, and 6 attributes. The attributes indicate whether it has complex background, whether it is raised, whether it is handwritten or printed, etc. The large size and diversity of this dataset make it suitable for training robust neural networks for various tasks, particularly detection and recognition. We give baseline results using several state-of-the-art networks, including AlexNet, OverFeat, Google Inception and ResNet for character recognition, and YOLOv2 for character detection in images. Overall Google Inception has the best performance on recognition with 80.5% top-1 accuracy, while YOLOv2 achieves an mAP of 71.0% on detection. Dataset, source code and trained models will all be publicly available on the website.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 21:03:58 GMT" } ]
2018-03-02T00:00:00
[ [ "Yuan", "Tai-Ling", "" ], [ "Zhu", "Zhe", "" ], [ "Xu", "Kun", "" ], [ "Li", "Cheng-Jun", "" ], [ "Hu", "Shi-Min", "" ] ]
new_dataset
0.999677
1803.00097
Maximo Loizu Cisquella
Carlos Gilarranz Casado, Maximo Loizu Cisquella, Sergio Altares L\'opez
Intelligent Irrigation System Based on Arduino
6 pages, 9 figures
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper explains how to build an intelligent irrigation system using Arduino (a micro- controller) and many devices (humidity, temperature, pressure and water flow sensors). Our irrigation system combines a precise method to determine water balance of soils with an automatic response to water content oscillations. Thus, it is an example of how we can perform better irrigation systems by increasing the precision of measurements but also by automating decisions.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 21:32:43 GMT" } ]
2018-03-02T00:00:00
[ [ "Casado", "Carlos Gilarranz", "" ], [ "Cisquella", "Maximo Loizu", "" ], [ "López", "Sergio Altares", "" ] ]
new_dataset
0.988959
1803.00127
Nitin J Sanket
Huai-Jen Liang, Nitin J. Sanket, Cornelia Ferm\"uller, Yiannis Aloimonos
SalientDSO: Bringing Attention to Direct Sparse Odometry
null
null
null
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although cluttered indoor scenes have a lot of useful high-level semantic information which can be used for mapping and localization, most Visual Odometry (VO) algorithms rely on the usage of geometric features such as points, lines and planes. Lately, driven by this idea, the joint optimization of semantic labels and obtaining odometry has gained popularity in the robotics community. The joint optimization is good for accurate results but is generally very slow. At the same time, in the vision community, direct and sparse approaches for VO have stricken the right balance between speed and accuracy. We merge the successes of these two communities and present a way to incorporate semantic information in the form of visual saliency to Direct Sparse Odometry - a highly successful direct sparse VO algorithm. We also present a framework to filter the visual saliency based on scene parsing. Our framework, SalientDSO, relies on the widely successful deep learning based approaches for visual saliency and scene parsing which drives the feature selection for obtaining highly-accurate and robust VO even in the presence of as few as 40 point features per frame. We provide extensive quantitative evaluation of SalientDSO on the ICL-NUIM and TUM monoVO datasets and show that we outperform DSO and ORB-SLAM - two very popular state-of-the-art approaches in the literature. We also collect and publicly release a CVL-UMD dataset which contains two indoor cluttered sequences on which we show qualitative evaluations. To our knowledge this is the first paper to use visual saliency and scene parsing to drive the feature selection in direct VO.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 23:02:47 GMT" } ]
2018-03-02T00:00:00
[ [ "Liang", "Huai-Jen", "" ], [ "Sanket", "Nitin J.", "" ], [ "Fermüller", "Cornelia", "" ], [ "Aloimonos", "Yiannis", "" ] ]
new_dataset
0.997598
1803.00160
Hamid Foroughi
Hamid Foroughi, Hamidreza Askarieh Yazdi, Mojtaba Azhari
Buckling of thin composite plates reinforced with randomly oriented, straight single-walled carbon nanotubes using B3-Spline finite strip method
null
1st National Conference on New Materials and Systems in Civil Engineering, Graduate University of Advanced Technology, Kerman, Iran, 2013
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is devoted to the mechanical buckling analysis of thin composite plates under straight single-walled carbon nanotubes reinforcement with uniform distribution and random orientations. In order to develop the fundamental equations, the B3-Spline finite strip method along with the classical plate theory is employed and the total potential energy is minimized which leads to an eigenvalue problem. For deriving the effective modulus of thin composite plates reinforced with carbon nanotubes, the Mori-Tanaka method is used in which each straight carbon nanotube is modeled as a fiber with transversely isotropic elastic properties. The results of our numerical experiments including the critical buckling loads for rectangular thin composite plates reinforced by carbon nanotubes with various boundary conditions and different volume fractions of nanotubes are provided and the positive effect of using carbon nanotubes reinforcement in mechanical buckling of thin plates is illustrated.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 01:51:49 GMT" } ]
2018-03-02T00:00:00
[ [ "Foroughi", "Hamid", "" ], [ "Yazdi", "Hamidreza Askarieh", "" ], [ "Azhari", "Mojtaba", "" ] ]
new_dataset
0.99522
1803.00185
Yang Hu Dr.
Tianyuan Chang, Guihua Wen, Yang Hu, JiaJiong Ma
Facial Expression Recognition Based on Complexity Perception Classification Algorithm
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Facial expression recognition (FER) has always been a challenging issue in computer vision. The different expressions of emotion and uncontrolled environmental factors lead to inconsistencies in the complexity of FER and variability of between expression categories, which is often overlooked in most facial expression recognition systems. In order to solve this problem effectively, we presented a simple and efficient CNN model to extract facial features, and proposed a complexity perception classification (CPC) algorithm for FER. The CPC algorithm divided the dataset into an easy classification sample subspace and a complex classification sample subspace by evaluating the complexity of facial features that are suitable for classification. The experimental results of our proposed algorithm on Fer2013 and CK-plus datasets demonstrated the algorithm's effectiveness and superiority over other state-of-the-art approaches.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 03:05:50 GMT" } ]
2018-03-02T00:00:00
[ [ "Chang", "Tianyuan", "" ], [ "Wen", "Guihua", "" ], [ "Hu", "Yang", "" ], [ "Ma", "JiaJiong", "" ] ]
new_dataset
0.993818
1803.00219
Yang Hu Dr.
Jiajiong Ma, Guihua Wen, Yang Hu, Tianyuan Chang, Haibin Zeng, Lijun Jiang, Jianzeng Qin
Tongue image constitution recognition based on Complexity Perception method
null
null
null
null
cs.CV cs.AI
http://creativecommons.org/licenses/by-nc-sa/4.0/
Background and Object: In China, body constitution is highly related to physiological and pathological functions of human body and determines the tendency of the disease, which is of great importance for treatment in clinical medicine. Tongue diagnosis, as a key part of Traditional Chinese Medicine inspection, is an important way to recognize the type of constitution.In order to deploy tongue image constitution recognition system on non-invasive mobile device to achieve fast, efficient and accurate constitution recognition, an efficient method is required to deal with the challenge of this kind of complex environment. Methods: In this work, we perform the tongue area detection, tongue area calibration and constitution classification using methods which are based on deep convolutional neural network. Subject to the variation of inconstant environmental condition, the distribution of the picture is uneven, which has a bad effect on classification performance. To solve this problem, we propose a method based on the complexity of individual instances to divide dataset into two subsets and classify them separately, which is capable of improving classification accuracy. To evaluate the performance of our proposed method, we conduct experiments on three sizes of tongue datasets, in which deep convolutional neural network method and traditional digital image analysis method are respectively applied to extract features for tongue images. The proposed method is combined with the base classifier Softmax, SVM, and DecisionTree respectively. Results: As the experiments results shown, our proposed method improves the classification accuracy by 1.135% on average and achieves 59.99% constitution classification accuracy. Conclusions: Experimental results on three datasets show that our proposed method can effectively improve the classification accuracy of tongue constitution recognition.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 05:32:43 GMT" } ]
2018-03-02T00:00:00
[ [ "Ma", "Jiajiong", "" ], [ "Wen", "Guihua", "" ], [ "Hu", "Yang", "" ], [ "Chang", "Tianyuan", "" ], [ "Zeng", "Haibin", "" ], [ "Jiang", "Lijun", "" ], [ "Qin", "Jianzeng", "" ] ]
new_dataset
0.99677
1803.00232
Alexandre Thiery
Sripad Krishna Devalla, Prajwal K. Renukanand, Bharathwaj K. Sreedhar, Shamira Perera, Jean-Martial Mari, Khai Sing Chin, Tin A. Tun, Nicholas G. Strouthidis, Tin Aung, Alexandre H. Thiery, Michael J. A. Girard
DRUNET: A Dilated-Residual U-Net Deep Learning Network to Digitally Stain Optic Nerve Head Tissues in Optical Coherence Tomography Images
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given that the neural and connective tissues of the optic nerve head (ONH) exhibit complex morphological changes with the development and progression of glaucoma, their simultaneous isolation from optical coherence tomography (OCT) images may be of great interest for the clinical diagnosis and management of this pathology. A deep learning algorithm was designed and trained to digitally stain (i.e. highlight) 6 ONH tissue layers by capturing both the local (tissue texture) and contextual information (spatial arrangement of tissues). The overall dice coefficient (mean of all tissues) was $0.91 \pm 0.05$ when assessed against manual segmentations performed by an expert observer. We offer here a robust segmentation framework that could be extended for the automated parametric study of the ONH tissues.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 06:37:30 GMT" } ]
2018-03-02T00:00:00
[ [ "Devalla", "Sripad Krishna", "" ], [ "Renukanand", "Prajwal K.", "" ], [ "Sreedhar", "Bharathwaj K.", "" ], [ "Perera", "Shamira", "" ], [ "Mari", "Jean-Martial", "" ], [ "Chin", "Khai Sing", "" ], [ "Tun", "Tin A.", "" ], [ "Strouthidis", "Nicholas G.", "" ], [ "Aung", "Tin", "" ], [ "Thiery", "Alexandre H.", "" ], [ "Girard", "Michael J. A.", "" ] ]
new_dataset
0.9994
1803.00239
F. J. Lobillo
Jos\'e G\'omez-Torrecillas and F. J. Lobillo and Gabriel Navarro
Dual skew codes from annihilators: Transpose Hamming ring extensions
null
null
null
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a framework to study the dual of skew cyclic codes is proposed. The transposed Hamming ring extensions are based in the existence of an anti-isomorphism of algebras between skew polynomial rings. Our construction is applied to left ideal convolutional codes, skew constacyclic codes and skew Reed-Solomon code, showing that the dual of these codes belong to the same class.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 08:00:24 GMT" } ]
2018-03-02T00:00:00
[ [ "Gómez-Torrecillas", "José", "" ], [ "Lobillo", "F. J.", "" ], [ "Navarro", "Gabriel", "" ] ]
new_dataset
0.974352
1803.00262
Xiaojing Chen
Xiaojing Chen, Shixin Zhu, Xiaoshan Kai
Entanglement-assisted quantum MDS codes constructed from constacyclic codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, entanglement-assisted quantum error correcting codes (EAQECCs) have been constructed by cyclic codes and negacyclic codes. In this paper, by analyzing the cyclotomic cosets in the defining set of constacyclic codes, we constructed three classes of new EAQECCs which satisfy the entanglement-assisted quantum Singleton bound. Besides, three classes of EAQECCs with maximal entanglement from constacyclic codes are constructed in the meanwhile.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 09:12:52 GMT" } ]
2018-03-02T00:00:00
[ [ "Chen", "Xiaojing", "" ], [ "Zhu", "Shixin", "" ], [ "Kai", "Xiaoshan", "" ] ]
new_dataset
0.999638
1803.00275
Hasan Mahmood Aminul Islam
Hasan M A Islam, Dmitrij Lagutin, Andrey Lukyanenko, Andrei Gurtov and Antti Yl\"a-J\"a\"aski
CIDOR: Content Distribution and Retrieval in Disaster Networks for Public Protection
International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
null
10.1109/WiMOB.2017.8115834
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution and retrieval framework in disaster netwOrks for public pRotection (CIDOR) which exploits the design principle of the native CCN architecture in the native Delay Tolerant Networking (DTN) architecture. We prove the feasibility and investigate the performance of our proposed solution using extensive simulation with different classes of the DTN routing strategies in different mobility scenarios. The simulation result shows that CIDOR can reduce the content retrieval time up to 50% while the response ratio is close to 100%.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 09:57:33 GMT" } ]
2018-03-02T00:00:00
[ [ "Islam", "Hasan M A", "" ], [ "Lagutin", "Dmitrij", "" ], [ "Lukyanenko", "Andrey", "" ], [ "Gurtov", "Andrei", "" ], [ "Ylä-Jääski", "Antti", "" ] ]
new_dataset
0.997002
1803.00346
Silvia Cruciani
Silvia Cruciani, Christian Smith, Danica Kragic, Kaiyu Hang
Dexterous Manipulation Graphs
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose the Dexterous Manipulation Graph as a tool to address in-hand manipulation and reposition an object inside a robot's end-effector. This graph is used to plan a sequence of manipulation primitives so to bring the object to the desired end pose. This sequence of primitives is translated into motions of the robot to move the object held by the end-effector. We use a dual arm robot with parallel grippers to test our method on a real system and show successful planning and execution of in-hand manipulation.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 12:47:18 GMT" } ]
2018-03-02T00:00:00
[ [ "Cruciani", "Silvia", "" ], [ "Smith", "Christian", "" ], [ "Kragic", "Danica", "" ], [ "Hang", "Kaiyu", "" ] ]
new_dataset
0.98627
1803.00367
Samuel Coogan
Samuel Coogan and Murat Arcak
A Benchmark Problem in Transportation Networks
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we propose a case study of freeway traffic flow modeled as a hybrid system. We describe two general classes of networks that model flow along a freeway with merging onramps. The admission rate of traffic flow from each onramp is metered via a control input. Both classes of networks are easily scaled to accommodate arbitrary state dimension. The model is discrete-time and possesses piecewise-affine dynamics. Moreover, we present several control objectives that are especially relevant for traffic flow management. The proposed model is flexible and extensible and offers a benchmark for evaluating tools and techniques developed for hybrid systems.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 13:59:24 GMT" } ]
2018-03-02T00:00:00
[ [ "Coogan", "Samuel", "" ], [ "Arcak", "Murat", "" ] ]
new_dataset
0.982913
1803.00387
Xinxin Du
Xinxin Du, Marcelo H. Ang Jr., Sertac Karaman, Daniela Rus
A General Pipeline for 3D Detection of Vehicles
Accepted at ICRA 2018
null
null
null
cs.CV eess.IV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Autonomous driving requires 3D perception of vehicles and other objects in the in environment. Much of the current methods support 2D vehicle detection. This paper proposes a flexible pipeline to adopt any 2D detection network and fuse it with a 3D point cloud to generate 3D information with minimum changes of the 2D detection networks. To identify the 3D box, an effective model fitting algorithm is developed based on generalised car models and score maps. A two-stage convolutional neural network (CNN) is proposed to refine the detected 3D box. This pipeline is tested on the KITTI dataset using two different 2D detection networks. The 3D detection results based on these two networks are similar, demonstrating the flexibility of the proposed pipeline. The results rank second among the 3D detection algorithms, indicating its competencies in 3D detection.
[ { "version": "v1", "created": "Mon, 12 Feb 2018 15:32:23 GMT" } ]
2018-03-02T00:00:00
[ [ "Du", "Xinxin", "" ], [ "Ang", "Marcelo H.", "Jr." ], [ "Karaman", "Sertac", "" ], [ "Rus", "Daniela", "" ] ]
new_dataset
0.969519
1803.00424
Gerard Le Lann
G\'erard Le Lann (RITS)
Autonomic Vehicular Networks: Safety, Privacy, Cybersecurity and Societal Issues
null
IEEE Vehicular Technology Conference Spring 2018 -- First International Workshop on research advances in Cooperative ITS cyber security and privacy (C-ITSec), Jun 2018, Porto, Portugal
null
null
cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Safety, efficiency, privacy, and cybersecurity can be achieved jointly in self-organizing networks of communicating vehicles of various automated driving levels. The underlying approach, solutions and novel results are briefly exposed. We explain why we are faced with a crucial choice regarding motorized society and cyber surveillance.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 15:06:29 GMT" } ]
2018-03-02T00:00:00
[ [ "Lann", "Gérard Le", "", "RITS" ] ]
new_dataset
0.970663
1803.00466
Hyunji Chung
Hyunji Chung and Sangjin Lee
Intelligent Virtual Assistant knows Your Life
6 pages, 7 figures
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the IoT world, intelligent virtual assistant (IVA) is a popular service to interact with users based on voice command. For optimal performance and efficient data management, famous IVAs like Amazon Alexa and Google Assistant usually operate based on the cloud computing architecture. In this process, a large amount of behavioral traces that include user voice activity history with detailed descriptions can be stored in the remote servers within an IVA ecosystem. If those data (as also known as IVA cloud native data) are leaked by attacks, malicious person may be able to not only harvest detailed usage history of IVA services, but also reveals additional user related information through various data analysis techniques. In this paper, we firstly show and categorize types of IVA related data that can be collected from popular IVA, Amazon Alexa. We then analyze an experimental dataset covering three months with Alexa service, and characterize the properties of user lifestyle and life patterns. Our results show that it is possible to uncover new insights on personal information such as user interests, IVA usage patterns and sleeping, wakeup patterns. The results presented in this paper provide important implications for and privacy threats to IVA vendors and users as well.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 01:06:57 GMT" } ]
2018-03-02T00:00:00
[ [ "Chung", "Hyunji", "" ], [ "Lee", "Sangjin", "" ] ]
new_dataset
0.995413
1803.00467
Yuan Cao
Yuan Cao, Yonglin Cao
Negacyclic codes over the local ring $\mathbb{Z}_4[v]/\langle v^2+2v\rangle$ of oddly even length and their Gray images
arXiv admin note: text overlap with arXiv:1710.09236
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $R=\mathbb{Z}_{4}[v]/\langle v^2+2v\rangle=\mathbb{Z}_{4}+v\mathbb{Z}_{4}$ ($v^2=2v$) and $n$ be an odd positive integer. Then $R$ is a local non-principal ideal ring of $16$ elements and there is a $\mathbb{Z}_{4}$-linear Gray map from $R$ onto $\mathbb{Z}_{4}^2$ which preserves Lee distance and orthogonality. First, a canonical form decomposition and the structure for any negacyclic code over $R$ of length $2n$ are presented. From this decomposition, a complete classification of all these codes is obtained. Then the cardinality and the dual code for each of these codes are given, and self-dual negacyclic codes over $R$ of length $2n$ are presented. Moreover, all $23\cdot(4^p+5\cdot 2^p+9)^{\frac{2^{p}-2}{p}}$ negacyclic codes over $R$ of length $2M_p$ and all $3\cdot(4^p+5\cdot 2^p+9)^{\frac{2^{p-1}-1}{p}}$ self-dual codes among them are presented precisely, where $M_p=2^p-1$ is a Mersenne prime. Finally, $36$ new and good self-dual $2$-quasi-twisted linear codes over $\mathbb{Z}_4$ with basic parameters $(28,2^{28}, d_L=8,d_E=12)$ and of type $2^{14}4^7$ and basic parameters $(28,2^{28}, d_L=6,d_E=12)$ and of type $2^{16}4^6$ which are Gray images of self-dual negacyclic codes over $R$ of length $14$ are listed.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 00:31:22 GMT" } ]
2018-03-02T00:00:00
[ [ "Cao", "Yuan", "" ], [ "Cao", "Yonglin", "" ] ]
new_dataset
0.999871
1803.00486
Henry K. Schenck
John Little, Hal Schenck
Codes from surfaces with small Picard number
17 pages
null
null
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Extending work of M. Zarzar, we evaluate the potential of Goppa-type evaluation codes constructed from linear systems on projective algebraic surfaces with small Picard number. Putting this condition on the Picard number provides some control over the numbers of irreducible components of curves on the surface and hence over the minimum distance of the codes. We find that such surfaces do not automatically produce good codes; the sectional genus of the surface also has a major influence. Using that additional invariant, we derive bounds on the minimum distance under the assumption that the hyperplane section class generates the N\'eron-Severi group. We also give several examples of codes from such surfaces with minimum distance better than the best known bounds in Grassl's tables.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 16:36:36 GMT" } ]
2018-03-02T00:00:00
[ [ "Little", "John", "" ], [ "Schenck", "Hal", "" ] ]
new_dataset
0.999366
1803.00532
Mohammad M. Aref
Arttu Hautakoski, Mohammad M. Aref, Jouni Mattila
Reconfigurable Manipulator Simulation for Robotics and Multimodal Machine Learning Application: Aaria
preprint before submission to conference: 2018 IEEE International Conference on Automation Science and Engineering , 7 pages
null
null
null
cs.RO
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper represents a systematic way for generation of Aaria, a simulated model for serial manipulators for the purpose of kinematic or dynamic analysis with a vast variety of structures based on Simulink SimMechanics. The proposed model can receive configuration parameters, for instance in accordance with modified Denavit-Hartenberg convention, or trajectories for its base or joints for structures with 1 to 6 degrees of freedom (DOF). The manipulator is equipped with artificial joint sensors as well as simulated Inertial Measurement Units (IMUs) on each link. The simulation output can be positions, velocities, torques, in the joint space or IMU outputs; angular velocity, linear acceleration, tool coordinates with respect to the inertial frame. This simulation model is a source of a dataset for virtual multimodal sensory data for automation of robot modeling and control designed for machine learning and deep learning approaches based on big data.
[ { "version": "v1", "created": "Thu, 1 Mar 2018 17:57:13 GMT" } ]
2018-03-02T00:00:00
[ [ "Hautakoski", "Arttu", "" ], [ "Aref", "Mohammad M.", "" ], [ "Mattila", "Jouni", "" ] ]
new_dataset
0.998702
1708.00922
Siyuan Dong
Siyuan Dong, Wenzhen Yuan, Edward Adelson
Improved GelSight Tactile Sensor for Measuring Geometry and Slip
IEEE/RSJ International Conference on Intelligent Robots and Systems
null
10.1109/IROS.2017.8202149
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A GelSight sensor uses an elastomeric slab covered with a reflective membrane to measure tactile signals. It measures the 3D geometry and contact force information with high spacial resolution, and successfully helped many challenging robot tasks. A previous sensor, based on a semi-specular membrane, produces high resolution but with limited geometry accuracy. In this paper, we describe a new design of GelSight for robot gripper, using a Lambertian membrane and new illumination system, which gives greatly improved geometric accuracy while retaining the compact size. We demonstrate its use in measuring surface normals and reconstructing height maps using photometric stereo. We also use it for the task of slip detection, using a combination of information about relative motions on the membrane surface and the shear distortions. Using a robotic arm and a set of 37 everyday objects with varied properties, we find that the sensor can detect translational and rotational slip in general cases, and can be used to improve the stability of the grasp.
[ { "version": "v1", "created": "Wed, 2 Aug 2017 20:32:17 GMT" } ]
2018-03-01T00:00:00
[ [ "Dong", "Siyuan", "" ], [ "Yuan", "Wenzhen", "" ], [ "Adelson", "Edward", "" ] ]
new_dataset
0.987686
1710.01779
Alexander Panchenko
Alexander Panchenko, Eugen Ruppert, Stefano Faralli, Simone Paolo Ponzetto, Chris Biemann
Building a Web-Scale Dependency-Parsed Corpus from CommonCrawl
In Proceedings of the 11th Conference on Language Resources and Evaluation (LREC'2018). Miyazaki, Japan
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
We present DepCC, the largest-to-date linguistically analyzed corpus in English including 365 million documents, composed of 252 billion tokens and 7.5 billion of named entity occurrences in 14.3 billion sentences from a web-scale crawl of the \textsc{Common Crawl} project. The sentences are processed with a dependency parser and with a named entity tagger and contain provenance information, enabling various applications ranging from training syntax-based word embeddings to open information extraction and question answering. We built an index of all sentences and their linguistic meta-data enabling quick search across the corpus. We demonstrate the utility of this corpus on the verb similarity task by showing that a distributional model trained on our corpus yields better results than models trained on smaller corpora, like Wikipedia. This distributional model outperforms the state of art models of verb similarity trained on smaller corpora on the SimVerb3500 dataset.
[ { "version": "v1", "created": "Wed, 4 Oct 2017 19:42:37 GMT" }, { "version": "v2", "created": "Wed, 28 Feb 2018 18:14:30 GMT" } ]
2018-03-01T00:00:00
[ [ "Panchenko", "Alexander", "" ], [ "Ruppert", "Eugen", "" ], [ "Faralli", "Stefano", "" ], [ "Ponzetto", "Simone Paolo", "" ], [ "Biemann", "Chris", "" ] ]
new_dataset
0.99757
1711.11392
Reza Alijani
Reza Alijani, Siddhartha Banerjee, Sreenivas Gollapudi, Kostas Kollias, Kamesh Munagala
Two-sided Facility Location
null
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have witnessed the rise of many successful e-commerce marketplace platforms like the Amazon marketplace, AirBnB, Uber/Lyft, and Upwork, where a central platform mediates economic transactions between buyers and sellers. Motivated by these platforms, we formulate a set of facility location problems that we term Two-sided Facility location. In our model, agents arrive at nodes in an underlying metric space, where the metric distance between any buyer and seller captures the quality of the corresponding match. The platform posts prices and wages at the nodes, and opens a set of facilities to route the agents to. The agents at any facility are assumed to be matched. The platform ensures high match quality by imposing a distance constraint between a node and the facilities it is routed to. It ensures high service availability by ensuring flow to the facility is at least a pre-specified lower bound. Subject to these constraints, the goal of the platform is to maximize the social surplus (or gains from trade) subject to weak budget balance, i.e., profit being non-negative. We present an approximation algorithm for this problem that yields a $(1 + \epsilon)$ approximation to surplus for any constant $\epsilon > 0$, while relaxing the match quality (i.e., maximum distance of any match) by a constant factor. We use an LP rounding framework that easily extends to other objectives such as maximizing volume of trade or profit. We justify our models by considering a dynamic marketplace setting where agents arrive according to a stochastic process and have finite patience (or deadlines) for being matched. We perform queueing analysis to show that for policies that route agents to facilities and match them, ensuring a low abandonment probability of agents reduces to ensuring sufficient flow arrives at each facility.
[ { "version": "v1", "created": "Thu, 30 Nov 2017 13:48:40 GMT" }, { "version": "v2", "created": "Tue, 27 Feb 2018 22:09:10 GMT" } ]
2018-03-01T00:00:00
[ [ "Alijani", "Reza", "" ], [ "Banerjee", "Siddhartha", "" ], [ "Gollapudi", "Sreenivas", "" ], [ "Kollias", "Kostas", "" ], [ "Munagala", "Kamesh", "" ] ]
new_dataset
0.998089
1801.02229
Stavros Toumpis
Riccardo Cavallari and Stavros Toumpis and Roberto Verdone and Ioannis Kontoyiannis
Packet Speed and Cost in Mobile Wireless Delay-Tolerant Networks
Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mobile wireless delay-tolerant network (DTN) model is proposed and analyzed, in which infinitely many nodes are initially placed on R^2 according to a uniform Poisson point process (PPP) and subsequently travel, independently of each other, along trajectories comprised of line segments, changing travel direction at time instances that form a Poisson process, each time selecting a new travel direction from an arbitrary distribution; all nodes maintain constant speed. A single information packet is traveling towards a given direction using both wireless transmissions and sojourns on node buffers, according to a member of a broad class of possible routing rules. For this model, we compute the long-term averages of the speed with which the packet travels towards its destination and the rate with which the wireless transmission cost accumulates. Because of the complexity of the problem, we employ two intuitive, simplifying approximations; simulations verify that the approximation error is typically small. Our results quantify the fundamental trade-off that exists in mobile wireless DTNs between the packet speed and the packet delivery cost. The framework developed here is both general and versatile, and can be used as a starting point for further investigation.
[ { "version": "v1", "created": "Sun, 7 Jan 2018 18:49:35 GMT" }, { "version": "v2", "created": "Wed, 28 Feb 2018 17:39:50 GMT" } ]
2018-03-01T00:00:00
[ [ "Cavallari", "Riccardo", "" ], [ "Toumpis", "Stavros", "" ], [ "Verdone", "Roberto", "" ], [ "Kontoyiannis", "Ioannis", "" ] ]
new_dataset
0.999273
1801.09510
Andrea Tassi
Ioannis Mavromatis, Andrea Tassi, Giovanni Rigazzi, Robert J. Piechocki, Andrew Nix
Multi-Radio 5G Architecture for Connected and Autonomous Vehicles: Application and Design Insights
Invited paper on EAI Transactions on Industrial Networks and Intelligent Systems
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Connected and Autonomous Vehicles (CAVs) will play a crucial role in next-generation Cooperative Intelligent Transportation Systems (C-ITSs). Not only is the information exchange fundamental to improve road safety and efficiency, but it also paves the way to a wide spectrum of advanced ITS applications enhancing efficiency, mobility and accessibility. Highly dynamic network topologies and unpredictable wireless channel conditions entail numerous design challenges and open questions. In this paper, we address the beneficial interactions between CAVs and an ITS and propose a novel architecture design paradigm. Our solution can accommodate multi-layer applications over multiple Radio Access Technologies (RATs) and provide a smart configuration interface for enhancing the performance of each RAT.
[ { "version": "v1", "created": "Mon, 29 Jan 2018 14:04:14 GMT" }, { "version": "v2", "created": "Sun, 25 Feb 2018 22:15:27 GMT" }, { "version": "v3", "created": "Wed, 28 Feb 2018 12:35:16 GMT" } ]
2018-03-01T00:00:00
[ [ "Mavromatis", "Ioannis", "" ], [ "Tassi", "Andrea", "" ], [ "Rigazzi", "Giovanni", "" ], [ "Piechocki", "Robert J.", "" ], [ "Nix", "Andrew", "" ] ]
new_dataset
0.996241
1802.07370
Siddhartha Brahma
Siddhartha Brahma
SufiSent - Universal Sentence Representations Using Suffix Encodings
4 pages, Submitted to ICLR 2018 workshop
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computing universal distributed representations of sentences is a fundamental task in natural language processing. We propose a method to learn such representations by encoding the suffixes of word sequences in a sentence and training on the Stanford Natural Language Inference (SNLI) dataset. We demonstrate the effectiveness of our approach by evaluating it on the SentEval benchmark, improving on existing approaches on several transfer tasks.
[ { "version": "v1", "created": "Tue, 20 Feb 2018 23:08:19 GMT" } ]
2018-03-01T00:00:00
[ [ "Brahma", "Siddhartha", "" ] ]
new_dataset
0.999643
1802.09345
Jinsong Wu
Jinsong Wu, Song Guo, Huawei Huang, William Liu, Yong Xiang
Information and Communications Technologies for Sustainable Development Goals: State-of-the-Art, Needs and Perspectives
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In September 2015, the United Nations General Assembly accepted the 2030 Development Agenda, which has included 92 paragraphs, and the Paragraph 91 defined 17 sustainable development goals (SDGs) and 169 associated targets. The goal of this paper is to discover the correlations among SDGs and information and communications technologies (ICTs). This paper discusses the roles and opportunities that ICTs play in pursuing the SDGs. We identify a number of research gaps to those three pillars, social, economic, and environmental perspectives, of sustainable development. After extensive literature reviews on the SDG-related research initiatives and activities, we find that the majority of contributions to SDGs recognized by the IEEE and ACM research communities have mainly focused on the technical aspects, while there are lack of the holistic social good perspectives. Therefore, there are essential and urgent needs to raise the awareness and call for attentions on how to innovate and energize ICTs in order to best assist all nations to achieve the SDGs by 2030.
[ { "version": "v1", "created": "Mon, 19 Feb 2018 16:13:13 GMT" }, { "version": "v2", "created": "Wed, 28 Feb 2018 18:00:50 GMT" } ]
2018-03-01T00:00:00
[ [ "Wu", "Jinsong", "" ], [ "Guo", "Song", "" ], [ "Huang", "Huawei", "" ], [ "Liu", "William", "" ], [ "Xiang", "Yong", "" ] ]
new_dataset
0.974915
1802.10135
Mansour Ahmadi
Royi Ronen and Marian Radu and Corina Feuerstein and Elad Yom-Tov and Mansour Ahmadi
Microsoft Malware Classification Challenge
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Microsoft Malware Classification Challenge was announced in 2015 along with a publication of a huge dataset of nearly 0.5 terabytes, consisting of disassembly and bytecode of more than 20K malware samples. Apart from serving in the Kaggle competition, the dataset has become a standard benchmark for research on modeling malware behaviour. To date, the dataset has been cited in more than 50 research papers. Here we provide a high-level comparison of the publications citing the dataset. The comparison simplifies finding potential research directions in this field and future performance evaluation of the dataset.
[ { "version": "v1", "created": "Thu, 22 Feb 2018 12:27:38 GMT" } ]
2018-03-01T00:00:00
[ [ "Ronen", "Royi", "" ], [ "Radu", "Marian", "" ], [ "Feuerstein", "Corina", "" ], [ "Yom-Tov", "Elad", "" ], [ "Ahmadi", "Mansour", "" ] ]
new_dataset
0.997913
1802.10162
Rafael Hurtado
Jorge Useche, Rafael Hurtado, Federico Demmer
Interplay between musical practices and tuning in the marimba de chonta music
Total number of pages: 52, main manuscript: 18 pages, supplemental material: 34 pages, the main manuscript contains 6 tables and 9 figures
null
null
null
cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Pacific Coast of Colombia there is a type of marimba called marimba de chonta, which provides the melodic and harmonic contour for traditional music with characteristic chants and dances. The tunings of this marimba are based on the voice of female singers and allows musical practices, as a transposition that preserves relative distances between bars. Here we show that traditional tunings are consistent with isotonic scales, and that they have changed in the last three decades due to the influence of Western music. Specifically, low octaves have changed into just octaves. Additionally, consonance properties of this instrument include the occurrence of a broad minimum of dissonance that is used in the musical practices, while the narrow local peaks of dissonance are avoided. We found that the main reason for this is the occurrence of uncertainties in the tunings with respect to the mathematical successions of isotonic scales. We conclude that in this music the emergence of tunings and musical practices cannot be considered as separate issues. Consonance, timbre, and musical practices are entangled.
[ { "version": "v1", "created": "Tue, 27 Feb 2018 21:03:37 GMT" } ]
2018-03-01T00:00:00
[ [ "Useche", "Jorge", "" ], [ "Hurtado", "Rafael", "" ], [ "Demmer", "Federico", "" ] ]
new_dataset
0.992129
1802.10271
Jongmin Jeong
Jongmin Jeong, Tae Sung Yoon, Jin Bae Park
Multimodal Sensor-Based Semantic 3D Mapping for a Large-Scale Environment
10 pages, 9 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Semantic 3D mapping is one of the most important fields in robotics, and has been used in many applications, such as robot navigation, surveillance, and virtual reality. In general, semantic 3D mapping is mainly composed of 3D reconstruction and semantic segmentation. As these technologies evolve, there has been great progress in semantic 3D mapping in recent years. Furthermore, the number of robotic applications requiring semantic information in 3D mapping to perform high-level tasks has increased, and many studies on semantic 3D mapping have been published. Existing methods use a camera for both 3D reconstruction and semantic segmentation. However, this is not suitable for large-scale environments and has the disadvantage of high computational complexity. To address this problem, we propose a multimodal sensor-based semantic 3D mapping system using a 3D Lidar combined with a camera. In this study, we build a 3D map by estimating odometry based on a global positioning system (GPS) and an inertial measurement unit (IMU), and use the latest 2D convolutional neural network (CNN) for semantic segmentation. To build a semantic 3D map, we integrate the 3D map with semantic information by using coordinate transformation and Bayes' update scheme. In order to improve the semantic 3D map, we propose a 3D refinement process to correct wrongly segmented voxels and remove traces of moving vehicles in the 3D map. Through experiments on challenging sequences, we demonstrate that our method outperforms state-of-the-art methods in terms of accuracy and intersection over union (IoU). Thus, our method can be used for various applications that require semantic information in 3D map.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 06:02:55 GMT" } ]
2018-03-01T00:00:00
[ [ "Jeong", "Jongmin", "" ], [ "Yoon", "Tae Sung", "" ], [ "Park", "Jin Bae", "" ] ]
new_dataset
0.999073
1802.10371
Liang Liu
Liang Liu, Shuowen Zhang, Rui Zhang
CoMP in the Sky: UAV Placement and Movement Optimization for Multi-User Communications
submitted for possible journal publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Driven by the recent advancement in unmanned aerial vehicle (UAV) technology, this paper proposes a new wireless network architecture of \emph{coordinate multipoint (CoMP) in the sky} to harness both the benefits of interference mitigation via CoMP and high mobility of UAVs. Specifically, we consider uplink communications in a multi-UAV enabled multi-user system, where each UAV forwards its received signals from all ground users to a central processor (CP) for joint decoding. Moreover, we consider the case where the users may move on the ground, thus the UAVs need to adjust their locations in accordance with the user locations over time to maximize the network throughput. Utilizing random matrix theory, we first characterize in closed-form a set of approximated upper and lower bounds of the user's achievable rate in each time episode under a realistic line-of-sight (LoS) channel model with random phase, which are shown very tight both analytically and numerically. UAV placement and movement over different episodes are then optimized based on the derived bounds to maximize the minimum of user average achievable rates over all episodes for both cases of full information (of current and future episodes) and current information on the user's movement. Interestingly, it is shown that the optimized location of each UAV at any particular episode is the weighted average of the ground user locations at the current episode as well as its own location at the previous and/or next episode. Finally, simulation results are provided to validate and compare the performance of the proposed UAV placement and movement designs under different practical application scenarios.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 11:42:26 GMT" } ]
2018-03-01T00:00:00
[ [ "Liu", "Liang", "" ], [ "Zhang", "Shuowen", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.956442
1802.10375
Pablo Chico De Guzman
Pablo Chico de Guzman, Felipe Gorostiaga, Cesar Sanchez
i2kit: A Tool for Immutable Infrastructure Deployments based on Lightweight Virtual Machines specialized to run Containers
8 pages, 3 figures
null
null
null
cs.DC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Container technologies, like Docker, are becoming increasingly popular. Containers provide exceptional developer experience because containers offer lightweight isolation and ease of software distribution. Containers are also widely used in production environments, where a different set of challenges arise such as security, networking, service discovery and load balancing. Container cluster management tools, such as Kubernetes, attempt to solve these problems by introducing a new control layer with the container as the unit of deployment. However, adding a new control layer is an extra configuration step and an additional potential source of runtime errors. The virtual machine technology offered by cloud providers is more mature and proven in terms of security, networking, service discovery and load balancing. However, virtual machines are heavier than containers for local development, are less flexible for resource allocation, and suffer longer boot times. This paper presents an alternative to containers that enjoy the best features of both approaches: (1) the use of mature, proven cloud vendor technology; (2) no need for a new control layer; and (3) as lightweight as containers. Our solution is i2kit, a deployment tool based on the immutable infrastructure pattern, where the virtual machine is the unit of deployment. The i2kit tool accepts a simplified format of Kubernetes Deployment Manifests in order to reuse Kubernetes' most successful principles, but it creates a lightweight virtual machine for each Pod using Linuxkit. Linuxkit alleviates the drawback in size that using virtual machines would otherwise entail, because the footprint of Linuxkit is approximately 60MB. Finally, the attack surface of the system is reduced since Linuxkit only installs the minimum set of OS dependencies to run containers, and different Pods are isolated by hypervisor technology.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 11:51:21 GMT" } ]
2018-03-01T00:00:00
[ [ "de Guzman", "Pablo Chico", "" ], [ "Gorostiaga", "Felipe", "" ], [ "Sanchez", "Cesar", "" ] ]
new_dataset
0.998538
1802.10426
Hamed Alizadeh Ghazijahani
Hossein Nejati, Hamed Alizadeh Ghazijahani, Milad Abdollahzadeh, Tooba Malekzadeh, Ngai-Man Cheung, Kheng Hock Lee, Lian Leng Low
Fine-grained wound tissue analysis using deep neural network
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tissue assessment for chronic wounds is the basis of wound grading and selection of treatment approaches. While several image processing approaches have been proposed for automatic wound tissue analysis, there has been a shortcoming in these approaches for clinical practices. In particular, seemingly, all previous approaches have assumed only 3 tissue types in the chronic wounds, while these wounds commonly exhibit 7 distinct tissue types that presence of each one changes the treatment procedure. In this paper, for the first time, we investigate the classification of 7 wound issue types. We work with wound professionals to build a new database of 7 types of wound tissue. We propose to use pre-trained deep neural networks for feature extraction and classification at the patch-level. We perform experiments to demonstrate that our approach outperforms other state-of-the-art. We will make our database publicly available to facilitate research in wound assessment.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 14:18:36 GMT" } ]
2018-03-01T00:00:00
[ [ "Nejati", "Hossein", "" ], [ "Ghazijahani", "Hamed Alizadeh", "" ], [ "Abdollahzadeh", "Milad", "" ], [ "Malekzadeh", "Tooba", "" ], [ "Cheung", "Ngai-Man", "" ], [ "Lee", "Kheng Hock", "" ], [ "Low", "Lian Leng", "" ] ]
new_dataset
0.992937
1802.10438
Banu Kabakulak
Banu Kabakulak
Sensor and Sink Placement, Scheduling and Routing Algorithms for Connected Coverage of Wireless Sensor Networks
30 pages, 1 figure, 7 tables
null
null
null
cs.NI eess.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A sensor is a small electronic device which has the ability to sense, compute and communicate either with other sensors or directly with a base station (sink). In a wireless sensor network (WSN), the sensors monitor a region and transmit the collected data packets through routes to the sinks. In this study, we propose a mixed--integer linear programming (MILP) model to maximize the number of time periods that a WSN carries out the desired tasks with limited energy and budget. Our sink and sensor placement, scheduling, routing with connected coverage ($SPSRC$) model is the first in the literature that combines the decisions for the locations of sinks and sensors, activity schedules of the deployed sensors, and data flow routes from each active sensor to its assigned sink for connected coverage of the network over a finite planning horizon. The problem is NP--hard and difficult to solve even for small instances. Assuming that the sink locations are known, we develop heuristics which construct a feasible solution of the problem by gradually satisfying the constraints. Then, we introduce search heuristics to determine the locations of the sinks to maximize the network lifetime. Computational experiments reveal that our heuristic methods can find near optimal solutions in an acceptable amount of time compared to the commercial solver CPLEX 12.7.0.
[ { "version": "v1", "created": "Wed, 28 Feb 2018 14:43:30 GMT" } ]
2018-03-01T00:00:00
[ [ "Kabakulak", "Banu", "" ] ]
new_dataset
0.999159
1711.03694
Junting Zhang
Junting Zhang, Chen Liang, C.-C. Jay Kuo
A Fully Convolutional Tri-branch Network (FCTN) for Domain Adaptation
Accepted by ICASSP 2018
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
A domain adaptation method for urban scene segmentation is proposed in this work. We develop a fully convolutional tri-branch network, where two branches assign pseudo labels to images in the unlabeled target domain while the third branch is trained with supervision based on images in the pseudo-labeled target domain. The re-labeling and re-training processes alternate. With this design, the tri-branch network learns target-specific discriminative representations progressively and, as a result, the cross-domain capability of the segmenter improves. We evaluate the proposed network on large-scale domain adaptation experiments using both synthetic (GTA) and real (Cityscapes) images. It is shown that our solution achieves the state-of-the-art performance and it outperforms previous methods by a significant margin.
[ { "version": "v1", "created": "Fri, 10 Nov 2017 05:01:28 GMT" }, { "version": "v2", "created": "Tue, 27 Feb 2018 01:43:35 GMT" } ]
2018-02-28T00:00:00
[ [ "Zhang", "Junting", "" ], [ "Liang", "Chen", "" ], [ "Kuo", "C. -C. Jay", "" ] ]
new_dataset
0.962645
1802.09685
Khavee Agustus Botangen
Khavee Agustus Botangen, Shahper Vodanovich, Jian Yu
Preservation of Indigenous Culture among Indigenous Migrants through Social Media: the Igorot Peoples
10 pages, in Proceedings of the 50th Hawaii International Conference on System Sciences 2017
Botangen, K.A., Vodanovich, S. and Yu, J., 2017, January. Preservation of Indigenous Culture among Indigenous Migrants through Social Media: The Igorot Peoples. In Proceedings of the 50th Hawaii International Conference on System Sciences
10.24251/HICSS.2017.278
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The value and relevance of indigenous knowledge towards sustainability of human societies drives for its preservation. This work explored the use of Facebook groups to promote indigenous knowledge among Igorot peoples in the diaspora. The virtual communities help intensify the connection of Igorot migrants to their traditional culture despite the challenges of assimilation to a different society. A survey of posts on 20 Facebook groups identified and classified the indigenous cultural elements conveyed through social media. A subsequent survey of 56 Igorot migrants revealed that popular social media has a significant role in the exchange, revitalization, practice, and learning of indigenous culture; inciting an effective medium to leverage preservation strategies.
[ { "version": "v1", "created": "Tue, 27 Feb 2018 02:13:45 GMT" } ]
2018-02-28T00:00:00
[ [ "Botangen", "Khavee Agustus", "" ], [ "Vodanovich", "Shahper", "" ], [ "Yu", "Jian", "" ] ]
new_dataset
0.997603
1802.09714
Feiyun Zhu
Feiyun Zhu, Jun Guo, Ruoyu Li, Junzhou Huang
Robust Actor-Critic Contextual Bandit for Mobile Health (mHealth) Interventions
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the actor-critic contextual bandit for the mobile health (mHealth) intervention. State-of-the-art decision-making algorithms generally ignore the outliers in the dataset. In this paper, we propose a novel robust contextual bandit method for the mHealth. It can achieve the conflicting goal of reducing the influence of outliers while seeking for a similar solution compared with the state-of-the-art contextual bandit methods on the datasets without outliers. Such performance relies on two technologies: (1) the capped-$\ell_{2}$ norm; (2) a reliable method to set the thresholding hyper-parameter, which is inspired by one of the most fundamental techniques in the statistics. Although the model is non-convex and non-differentiable, we propose an effective reweighted algorithm and provide solid theoretical analyses. We prove that the proposed algorithm can find sufficiently decreasing points after each iteration and finally converges after a finite number of iterations. Extensive experiment results on two datasets demonstrate that our method can achieve almost identical results compared with state-of-the-art contextual bandit methods on the dataset without outliers, and significantly outperform those state-of-the-art methods on the badly noised dataset with outliers in a variety of parameter settings.
[ { "version": "v1", "created": "Tue, 27 Feb 2018 04:23:00 GMT" } ]
2018-02-28T00:00:00
[ [ "Zhu", "Feiyun", "" ], [ "Guo", "Jun", "" ], [ "Li", "Ruoyu", "" ], [ "Huang", "Junzhou", "" ] ]
new_dataset
0.987801
1802.09737
EPTCS
Bob Coecke, Aleks Kissinger
Proceedings 14th International Conference on Quantum Physics and Logic
null
EPTCS 266, 2018
10.4204/EPTCS.266
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the proceedings of the 14th International Conference on Quantum Physics and Logic (QPL 2017), which was held July 3-7, 2017 at the LUX Cinema Nijmegen, the Netherlands, and was hosted by Radboud University. QPL is a conference that brings together researchers working on mathematical foundations of quantum physics, quantum computing, and related areas, with a focus on structural perspectives and the use of logical tools, ordered algebraic and category-theoretic structures, formal languages, semantical methods, and other computer science techniques applied to the study of physical behaviour in general. This conference also welcomes work that applies structures and methods inspired by quantum theory to other fields (including computer science).
[ { "version": "v1", "created": "Tue, 27 Feb 2018 06:25:29 GMT" } ]
2018-02-28T00:00:00
[ [ "Coecke", "Bob", "" ], [ "Kissinger", "Aleks", "" ] ]
new_dataset
0.999114
1802.09795
Giulia Cervia
Giulia Cervia, Laura Luzzi, Ma\"el Le Treust and Matthieu R. Bloch
Polar codes for empirical coordination over noisy channels with strictly causal encoding
4 pages, 1 figure, conference paper presented at XXVI\`eme colloque GRETSI (2017)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a coding scheme based on polar codes for empirical coordination of autonomous devices. We consider a two-node network with a noisy link in which the input and output signals have to be coordinated with the source and the reconstruction. In the case of strictly causal encoding, we show that polar codes achieve the empirical coordination region, provided that a vanishing rate of common randomness is available.
[ { "version": "v1", "created": "Tue, 27 Feb 2018 09:50:13 GMT" } ]
2018-02-28T00:00:00
[ [ "Cervia", "Giulia", "" ], [ "Luzzi", "Laura", "" ], [ "Treust", "Maël Le", "" ], [ "Bloch", "Matthieu R.", "" ] ]
new_dataset
0.997609
1802.09860
Chen Yang
Chen Yang, Haohong Wang
CCP: Conflicts Check Protocol for Bitcoin Block Security
An earlier version appeared at 2018 IEEE ICNC Workshop on Computing, Networking and Communications (with aditional appendix)
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we present our early stage results on a Conflicts Check Protocol (CCP) that enables preventing potential attacks on bitcoin system. Based on the observation and discovery of a common symptom that many attacks may generate, CCP refines the current bitcoin systems by proposing a novel arbitration mechanism that is capable to determine the approval or abandon of certain transactions involved in confliction. This work examines the security issue of bitcoin from a new perspective, which may extend to a larger scope of attack analysis and prevention
[ { "version": "v1", "created": "Tue, 27 Feb 2018 12:59:35 GMT" } ]
2018-02-28T00:00:00
[ [ "Yang", "Chen", "" ], [ "Wang", "Haohong", "" ] ]
new_dataset
0.999369
1802.09919
Minjia Shi
Minjia Shi, Liqin Qian, Patrick Sole
Linear codes with few weights over $\mathbb{F}_2+u\mathbb{F}_2$
14 pages, need help in page 12. arXiv admin note: text overlap with arXiv:1612.00966
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct an infinite family of five-weight codes from trace codes over the ring $R=\mathbb{F}_2+u\mathbb{F}_2$, where $u^2=0.$ The trace codes have the algebraic structure of abelian codes. Their Lee weight is computed by using character sums. Combined with Pless power moments and Newton's Identities, the weight distribution of the Gray image of trace codes was present. Their support structure is determined. An application to secret sharing schemes is given.
[ { "version": "v1", "created": "Sat, 24 Feb 2018 12:04:13 GMT" } ]
2018-02-28T00:00:00
[ [ "Shi", "Minjia", "" ], [ "Qian", "Liqin", "" ], [ "Sole", "Patrick", "" ] ]
new_dataset
0.999557
1802.10019
Hee Seok Lee
Hee Seok Lee and Kang Kim
Simultaneous Traffic Sign Detection and Boundary Estimation using Convolutional Neural Network
Accepted for publication in IEEE Transactions on Intelligent Transportation Systems
null
10.1109/TITS.2018.2801560
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel traffic sign detection system that simultaneously estimates the location and precise boundary of traffic signs using convolutional neural network (CNN). Estimating the precise boundary of traffic signs is important in navigation systems for intelligent vehicles where traffic signs can be used as 3D landmarks for road environment. Previous traffic sign detection systems, including recent methods based on CNN, only provide bounding boxes of traffic signs as output, and thus requires additional processes such as contour estimation or image segmentation to obtain the precise sign boundary. In this work, the boundary estimation of traffic signs is formulated as a 2D pose and shape class prediction problem, and this is effectively solved by a single CNN. With the predicted 2D pose and the shape class of a target traffic sign in an input image, we estimate the actual boundary of the target sign by projecting the boundary of a corresponding template sign image into the input image plane. By formulating the boundary estimation problem as a CNN-based pose and shape prediction task, our method is end-to-end trainable, and more robust to occlusion and small targets than other boundary estimation methods that rely on contour estimation or image segmentation. The proposed method with architectural optimization provides an accurate traffic sign boundary estimation which is also efficient in compute, showing a detection frame rate higher than 7 frames per second on low-power mobile platforms.
[ { "version": "v1", "created": "Tue, 27 Feb 2018 16:51:04 GMT" } ]
2018-02-28T00:00:00
[ [ "Lee", "Hee Seok", "" ], [ "Kim", "Kang", "" ] ]
new_dataset
0.993812
1610.02516
Ren Yang
Ren Yang, Mai Xu, Zulin Wang, Yiping Duan, Xiaoming Tao
Saliency-Guided Complexity Control for HEVC Decoding
IEEE Transactions on Broadcasting
null
10.1109/TBC.2018.2795459
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The latest High Efficiency Video Coding (HEVC) standard significantly improves coding efficiency over its previous video coding standards. The expense of such improvement is enormous computational complexity, from both encoding and decoding sides. Since computational capability and power capacity are diverse across portable devices, it is necessary to reduce decoding complexity to a target with tolerable quality loss, so called complexity control. This paper proposes a Saliency-Guided Complexity Control (SGCC) approach for HEVC decoding, which reduces the decoding complexity to the target with minimal perceptual quality loss. First, we establish the SGCC formulation to minimize perceptual quality loss at the constraint on reduced decoding complexity, which is achieved via disabling Deblocking Filter (DF) and simplifying Motion Compensation (MC) of some non-salient Coding Tree Units (CTUs). One important component in this formulation is the modelled relationship between decoding complexity reduction and DF disabling/MC simplification, which determines the control accuracy of our approach. Another component is the modelled relationship between quality loss and DF disabling/MC simplification, responsible for optimizing perceptual quality. By solving the SGCC formulation for a given target complexity, we can obtain the DF and MC settings of each CTU, and then decoding complexity can be reduced to the target. Finally, the experimental results validate the effectiveness of our SGCC approach, from the aspects of control performance, complexity-distortion performance, fluctuation of quality loss and subjective quality.
[ { "version": "v1", "created": "Sat, 8 Oct 2016 12:09:38 GMT" }, { "version": "v2", "created": "Wed, 18 Jan 2017 15:42:24 GMT" }, { "version": "v3", "created": "Tue, 4 Apr 2017 02:34:44 GMT" }, { "version": "v4", "created": "Thu, 10 Aug 2017 01:15:55 GMT" }, { "version": "v5", "created": "Tue, 9 Jan 2018 12:15:59 GMT" } ]
2018-02-27T00:00:00
[ [ "Yang", "Ren", "" ], [ "Xu", "Mai", "" ], [ "Wang", "Zulin", "" ], [ "Duan", "Yiping", "" ], [ "Tao", "Xiaoming", "" ] ]
new_dataset
0.987647