id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1801.07555
|
Hongkai Wen
|
Yiran Shen, Fengyuan Yang, Bowen Du, Weitao Xu, Chengwen Luo, Hongkai
Wen
|
Shake-n-Shack: Enabling Secure Data Exchange Between Smart Wearables via
Handshakes
|
To appear in PerCom'18
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Since ancient Greece, handshaking has been commonly practiced between two
people as a friendly gesture to express trust and respect, or form a mutual
agreement. In this paper, we show that such physical contact can be used to
bootstrap secure cyber contact between the smart devices worn by users. The key
observation is that during handshaking, although belonged to two different
users, the two hands involved in the shaking events are often rigidly
connected, and therefore exhibit very similar motion patterns. We propose a
novel Shake-n-Shack system, which harvests motion data during user handshaking
from the wrist worn smart devices such as smartwatches or fitness bands, and
exploits the matching motion patterns to generate symmetric keys on both
parties. The generated keys can be then used to establish a secure
communication channel for exchanging data between devices. This provides a much
more natural and user-friendly alternative for many applications, e.g.
exchanging/sharing contact details, friending on social networks, or even
making payments, since it doesn't involve extra bespoke hardware, nor require
the users to perform pre-defined gestures. We implement the proposed
Shake-n-Shack system on off-the-shelf smartwatches, and extensive evaluation
shows that it can reliably generate 128-bit symmetric keys just after around 1s
of handshaking (with success rate >99%), and is resilient to real-time
mimicking attacks: in our experiments the Equal Error Rate (EER) is only 1.6%
on average. We also show that the proposed Shake-n-Shack system can be
extremely lightweight, and is able to run in-situ on the resource-constrained
smartwatches without incurring excessive resource consumption.
|
[
{
"version": "v1",
"created": "Tue, 23 Jan 2018 14:23:13 GMT"
}
] | 2018-01-24T00:00:00 |
[
[
"Shen",
"Yiran",
""
],
[
"Yang",
"Fengyuan",
""
],
[
"Du",
"Bowen",
""
],
[
"Xu",
"Weitao",
""
],
[
"Luo",
"Chengwen",
""
],
[
"Wen",
"Hongkai",
""
]
] |
new_dataset
| 0.993717 |
1801.07624
|
Michal Zasadzinski
|
Micha{\l} Zasadzi\'nski, Victor Munt\'es-Mulero, Marc Sol\'e, Thomas
Ludwig
|
Mistral Supercomputer Job History Analysis
|
16 pages, 14 figures, 5 tables
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this technical report, we show insights and results of operational data
analysis from petascale supercomputer Mistral, which is ranked as 42nd most
powerful in the world as of January 2018. Data sources include hardware
monitoring data, job scheduler history, topology, and hardware information. We
explore job state sequences, spatial distribution, and electric power patterns.
|
[
{
"version": "v1",
"created": "Tue, 23 Jan 2018 15:51:50 GMT"
}
] | 2018-01-24T00:00:00 |
[
[
"Zasadziński",
"Michał",
""
],
[
"Muntés-Mulero",
"Victor",
""
],
[
"Solé",
"Marc",
""
],
[
"Ludwig",
"Thomas",
""
]
] |
new_dataset
| 0.990386 |
1801.07695
|
Pinar Sen
|
Pinar Sen and Young-Han Kim
|
Homologous Codes for Multiple Access Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Building on recent development by Padakandla and Pradhan, and by Lim, Feng,
Pastore, Nazer, and Gastpar, this paper studies the potential of structured
nested coset coding as a complete replacement for random coding in network
information theory. The roles of two techniques used in nested coset coding to
generate nonuniform codewords, namely, shaping and channel transformation, are
clarified and illustrated via the simple example of the two-sender multiple
access channel. While individually deficient, the optimal combination of
shaping and channel transformation is shown to achieve the same performance as
traditional random codes for the general two-sender multiple access channel.
The achievability proof of the capacity region is extended to the multiple
access channels with more than two senders, and with one or more receivers. A
quantization argument consistent with the construction of nested coset codes is
presented to prove achievability for their Gaussian counterparts. These results
open up new possibilities of utilizing nested coset codes with the same
generator matrix for a broader class of applications.
|
[
{
"version": "v1",
"created": "Tue, 23 Jan 2018 18:33:43 GMT"
}
] | 2018-01-24T00:00:00 |
[
[
"Sen",
"Pinar",
""
],
[
"Kim",
"Young-Han",
""
]
] |
new_dataset
| 0.98791 |
1706.09188
|
Jinmei Fan
|
JinMei Fan
|
Optimal quinary cyclic codes with minimum distance four
|
22 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, by analyzing solutions of certain equations in the finite
field $\mathbb{F}_{5^m}$, three classes of new optimal quinary cyclic codes
with parameters $[5^m-1,5^m-2m-2,4]$ and two theorems are presented. With the
help of the two theorems, perfect nonlinear monomials, almost perfect nonlinear
monomials and a number of other monomials are used to construct more classes of
new optimal quinary cyclic codes with the same parameters.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2017 09:47:53 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Jan 2018 11:42:25 GMT"
}
] | 2018-01-23T00:00:00 |
[
[
"Fan",
"JinMei",
""
]
] |
new_dataset
| 0.998449 |
1707.04512
|
Amirsina Torfi
|
Amirsina Torfi, Sobhan Soleymani, Siamak Aram and Vahid Tabataba
Vakili
|
On the Construction of Polar Codes for Achieving the Capacity of
Marginal Channels
| null | null |
10.1109/ALLERTON.2017.8262785
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Achieving security against adversaries with unlimited computational power is
of great interest in a communication scenario. Since polar codes are capacity
achieving codes with low encoding-decoding complexity and they can approach
perfect secrecy rates for binary-input degraded wiretap channels in symmetric
settings, they are investigated extensively in the literature recently. In this
paper, a polar coding scheme to achieve secrecy capacity in non-symmetric
binary input channels is proposed. The proposed scheme satisfies security and
reliability conditions. The wiretap channel is assumed to be stochastically
degraded with respect to the legitimate channel and message distribution is
uniform. The information set is sent over channels that are good for Bob and
bad for Eve. Random bits are sent over channels that are good for both Bob and
Eve. A frozen vector is chosen randomly and is sent over channels bad for both.
We prove that there exists a frozen vector for which the coding scheme
satisfies reliability and security conditions and approaches the secrecy
capacity. We further empirically show that in the proposed scheme for
non-symmetric binary-input discrete memoryless channels, the equivocation rate
achieves its upper bound in the whole capacity-equivocation region.
|
[
{
"version": "v1",
"created": "Wed, 12 Jul 2017 15:20:44 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Aug 2017 01:39:15 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Aug 2017 06:54:40 GMT"
},
{
"version": "v4",
"created": "Fri, 11 Aug 2017 18:05:33 GMT"
},
{
"version": "v5",
"created": "Tue, 3 Oct 2017 14:24:22 GMT"
},
{
"version": "v6",
"created": "Sun, 8 Oct 2017 02:13:47 GMT"
}
] | 2018-01-23T00:00:00 |
[
[
"Torfi",
"Amirsina",
""
],
[
"Soleymani",
"Sobhan",
""
],
[
"Aram",
"Siamak",
""
],
[
"Vakili",
"Vahid Tabataba",
""
]
] |
new_dataset
| 0.96539 |
1801.00098
|
Uche Nnolim
|
U. A. Nnolim
|
A PDE-based log-agnostic illumination correction algorithm
|
22 pages, 9 figures, 4 tables
| null | null | null |
cs.CV eess.IV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report presents the results of a partial differential equation
(PDE)-based image enhancement algorithm, for dynamic range compression and
illumination correction in the absence of the logarithmic function. The
proposed algorithm combines forward and reverse flows in a PDE-based
formulation. The experimental results are compared with algorithms from the
literature and indicate comparable performance in most cases.
|
[
{
"version": "v1",
"created": "Sat, 30 Dec 2017 08:02:56 GMT"
},
{
"version": "v2",
"created": "Sun, 21 Jan 2018 07:52:27 GMT"
}
] | 2018-01-23T00:00:00 |
[
[
"Nnolim",
"U. A.",
""
]
] |
new_dataset
| 0.997455 |
1801.06624
|
Minjia Shi
|
Minjia Shi, Daitao Huang, Lin Sok, and Patrick Sol\'e
|
Double circulant self-dual and LCD codes over Galois rings
|
Sbumitted on 4, December, 20 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper investigates the existence, enumeration and asymptotic performance
of self-dual and LCD double circulant codes over Galois rings of characteristic
$p^2$ and order $p^4$ with $p$ and odd prime. When $p \equiv 3 \pmod{4},$ we
give an algorithm to construct a duality preserving bijective Gray map from
such a Galois ring to $\mathbb{Z}_{p^2}^2.$ Using random coding, we obtain
families of asymptotically good self-dual and LCD codes over
$\mathbb{Z}_{p^2},$ for the metric induced by the standard
$\mathbb{F}_p$-valued Gray maps.
|
[
{
"version": "v1",
"created": "Sat, 20 Jan 2018 05:17:10 GMT"
}
] | 2018-01-23T00:00:00 |
[
[
"Shi",
"Minjia",
""
],
[
"Huang",
"Daitao",
""
],
[
"Sok",
"Lin",
""
],
[
"Solé",
"Patrick",
""
]
] |
new_dataset
| 0.993157 |
1801.06679
|
Xin Kang
|
Xin Kang, Ying-Chang Liang, and Jing Yang
|
Riding on the Primary: A New Spectrum Sharing Paradigm for
Wireless-Powered IoT Devices
|
Submitted to IEEE Trans. Wireless Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a new spectrum sharing model referred to as riding on the
primary (ROP) is proposed for wireless-powered IoT devices with ambient
backscatter communication capabilities. The key idea of ROP is that the
secondary transmitter harvests energy from the primary signal, then modulates
its information bits to the primary signal, and reflects the modulated signal
to the secondary receiver without violating the primary system's interference
requirement. Compared with the conventional spectrum sharing model, the
secondary system in the proposed ROP not only utilizes the spectrum of the
primary system but also takes advantage of the primary signal to harvest energy
and to carry its information. In this paper, we investigate the performance of
such a spectrum sharing system under fading channels. To be specific, we
maximize the ergodic capacity of the secondary system by jointly optimizing the
transmit power of the primary signal and the reflection coefficient of the
secondary ambient backscatter. Different (ideal/practical) energy consumption
models, different (peak/average) transmit power constraints, different types
(fixed/dynamically adjustable) reflection coefficient, different primary
system's interference requirements (rate/outage) are considered. Optimal power
allocation and reflection coefficient are obtained for each scenario.
|
[
{
"version": "v1",
"created": "Sat, 20 Jan 2018 14:02:57 GMT"
}
] | 2018-01-23T00:00:00 |
[
[
"Kang",
"Xin",
""
],
[
"Liang",
"Ying-Chang",
""
],
[
"Yang",
"Jing",
""
]
] |
new_dataset
| 0.995051 |
1801.06704
|
Thijmen Krebs
|
Thijmen J. P. Krebs
|
A more reasonable proof of Cobham's theorem
|
3 pages
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a short new proof of Cobham's theorem without using Kronecker's
approximation theorem, making it suitable for generalization beyond automatic
sequences.
|
[
{
"version": "v1",
"created": "Sat, 20 Jan 2018 17:47:52 GMT"
}
] | 2018-01-23T00:00:00 |
[
[
"Krebs",
"Thijmen J. P.",
""
]
] |
new_dataset
| 0.964645 |
1801.06835
|
Yanju Gu
|
Yanju Gu
|
Distributed Multi-User Wireless Charging Power Allocation
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless power charging enables portable devices to be permanently unplugged.
Due to its low transmission power and low transmission efficiency, it requires
much longer time slot to charge users compared with that for data transmission
in wireless communication networks. Besides, each user's demand urgency needs
to be taken into consideration for power allocation. Therefore, new algorithms
are essential for wireless power allocation in multi-user wireless charging
networks. In this paper, this problem is formulated as a static noncooperative
game. It is shown that there exists a unique Nash equilibrium, which is the
static state of the wireless power charging network. A distributed power
allocation algorithm is proposed to compute the Nash equilibrium of the game.
The main result of the paper consists of rigorous analysis of the distributed
algorithm for power allocation. The algorithm is shown to converge to Nash
equilibrium of the game with exponentially convergence rate for arbitrary
initial value with synchronous scheduling. Moreover, the distributed algorithm
is also convergence guaranteed with asynchronous scheduling under communication
delay and packet drops. Numerical simulations prove the correctness of the
analysis and demonstrate the fast convergence of the algorithm and the
robustness to synchronous scheduling.
|
[
{
"version": "v1",
"created": "Sun, 21 Jan 2018 15:16:08 GMT"
}
] | 2018-01-23T00:00:00 |
[
[
"Gu",
"Yanju",
""
]
] |
new_dataset
| 0.995165 |
1801.07026
|
Matias Martinez
|
Matias Martinez, Sylvain Lecomte
|
Do Mobile Developers Ask on Q&A Sites About Error Codes Thrown by a
Cross-Platform App Development Framework? An Empirical Study
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
During last years development frameworks have emerged to make easier the
development and maintenance of cross-platform mobile applications. Xamarin
framework is one of them: it takes as input an app written in C# and produces
native code for Android, iOS and Windows Mobile platforms. When using Xamarin,
developers can meet errors, identified with codes, thrown by the
framework.Unfortunately, the Xamarin official documentation does not provide a
complete description, solution or workaround for all those codes.In this paper,
we analyze two sites of questions and answers related to Xamarin for finding
questions that mention those error codes. We found in both sites that there are
questions written by developers asking about Xamarin errors, and the majority
of them have at least one answer. Our intuition is this discovered information
could be useful for giving support to Xamarin developers.
|
[
{
"version": "v1",
"created": "Mon, 22 Jan 2018 10:20:41 GMT"
}
] | 2018-01-23T00:00:00 |
[
[
"Martinez",
"Matias",
""
],
[
"Lecomte",
"Sylvain",
""
]
] |
new_dataset
| 0.999294 |
1801.07132
|
Amr Alanwar
|
Amr Alanwar, Bernhard Etzlinger, Henrique Ferraz, Joao Hespanha, Mani
Srivastava
|
SecSens: Secure State Estimation with Application to Localization and
Time Synchronization
| null | null | null | null |
cs.CR cs.RO cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Research evidence in Cyber-Physical Systems (CPS) shows that the introduced
tight coupling of information technology with physical sensing and actuation
leads to more vulnerability and security weaknesses. But, the traditional
security protection mechanisms of CPS focus on data encryption while neglecting
the sensors which are vulnerable to attacks in the physical domain.
Accordingly, researchers attach utmost importance to the problem of state
estimation in the presence of sensor attacks. In this work, we present SecSens,
a novel approach for secure nonlinear state estimation in the presence of
modeling and measurement noise. SecSens consists of two independent algorithms,
namely, SecEKF and SecOPT, which are based on Extended Kalman Filter and
Maximum Likelihood Estimation, respectively. We adopt a holistic approach to
introduce security awareness among state estimation algorithms without
requiring specialized hardware, or cryptographic techniques. We apply SecSens
to securely localize and time synchronize networked mobile devices. SecSens
provides good performance at run-time several order of magnitude faster than
the state of art solutions under the presence of powerful attacks. Our
algorithms are evaluated on a testbed with static nodes and a mobile quadrotor
all equipped with commercial ultra-wide band wireless devices.
|
[
{
"version": "v1",
"created": "Mon, 22 Jan 2018 15:10:14 GMT"
}
] | 2018-01-23T00:00:00 |
[
[
"Alanwar",
"Amr",
""
],
[
"Etzlinger",
"Bernhard",
""
],
[
"Ferraz",
"Henrique",
""
],
[
"Hespanha",
"Joao",
""
],
[
"Srivastava",
"Mani",
""
]
] |
new_dataset
| 0.988478 |
1801.03634
|
Varun Mehta
|
Varun Mehta, Rahul Meshram, Kesav Kaza and S.N. Merchant
|
Restless Bandits with Constrained Arms: Applications in Social and
Information Networks
| null | null | null | null |
cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a problem of information gathering in a social network with
dynamically available sources and time varying quality of information. We
formulate this problem as a restless multi-armed bandit (RMAB). In this
problem, information quality of a source corresponds to the state of an arm in
RMAB. The decision making agent does not know the quality of information from
sources a priori. But the agent maintains a belief about the quality of
information from each source. This is a problem of RMAB with partially
observable states. The objective of the agent is to gather relevant information
efficiently from sources by contacting them. We formulate this as a infinite
horizon discounted reward problem, where reward depends on quality of
information. We study Whittle's index policy which determines the sequence of
play of arms that maximizes long term cumulative reward. We illustrate the
performance of index policy, myopic policy and compare with uniform random
policy through numerical simulation.
|
[
{
"version": "v1",
"created": "Thu, 11 Jan 2018 05:24:47 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Jan 2018 08:36:50 GMT"
}
] | 2018-01-22T00:00:00 |
[
[
"Mehta",
"Varun",
""
],
[
"Meshram",
"Rahul",
""
],
[
"Kaza",
"Kesav",
""
],
[
"Merchant",
"S. N.",
""
]
] |
new_dataset
| 0.994828 |
1801.06267
|
Kevin Moran P
|
Mario Linares Vasquez, Kevin Moran, and Denys Poshyvanyk
|
Continuous, Evolutionary and Large-Scale: A New Perspective for
Automated Mobile App Testing
|
12 pages, accepted to the Proceedings of 33rd IEEE International
Conference on Software Maintenance and Evolution (ICSME'17)
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile app development involves a unique set of challenges including device
fragmentation and rapidly evolving platforms, making testing a difficult task.
The design space for a comprehensive mobile testing strategy includes features,
inputs, potential contextual app states, and large combinations of devices and
underlying platforms. Therefore, automated testing is an essential activity of
the development process. However, current state of the art of automated testing
tools for mobile apps poses limitations that has driven a preference for manual
testing in practice. As of today, there is no comprehensive automated solution
for mobile testing that overcomes fundamental issues such as automated oracles,
history awareness in test cases, or automated evolution of test cases.
In this perspective paper we survey the current state of the art in terms of
the frameworks, tools, and services available to developers to aid in mobile
testing, highlighting present shortcomings. Next, we provide commentary on
current key challenges that restrict the possibility of a comprehensive,
effective, and practical automated testing solution. Finally, we offer our
vision of a comprehensive mobile app testing framework, complete with research
agenda, that is succinctly summarized along three principles: Continuous,
Evolutionary and Large-scale (CEL).
|
[
{
"version": "v1",
"created": "Fri, 19 Jan 2018 01:58:56 GMT"
}
] | 2018-01-22T00:00:00 |
[
[
"Vasquez",
"Mario Linares",
""
],
[
"Moran",
"Kevin",
""
],
[
"Poshyvanyk",
"Denys",
""
]
] |
new_dataset
| 0.996811 |
1801.06290
|
Debajyoti Mondal
|
Anna Lubiw and Debajyoti Mondal
|
Angle-Monotone Graphs: Construction and Local Routing
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A geometric graph in the plane is angle-monotone of width $\gamma$ if every
pair of vertices is connected by an angle-monotone path of width $\gamma$, a
path such that the angles of any two edges in the path differ by at most
$\gamma$. Angle-monotone graphs have good spanning properties.
We prove that every point set in the plane admits an angle-monotone graph of
width $90^\circ$, hence with spanning ratio $\sqrt 2$, and a subquadratic
number of edges. This answers an open question posed by Dehkordi, Frati and
Gudmundsson.
We show how to construct, for any point set of size $n$ and any angle
$\alpha$, $0 < \alpha < 45^\circ$, an angle-monotone graph of width
$(90^\circ+\alpha)$ with $O(\frac{n}{\alpha})$ edges. Furthermore, we give a
local routing algorithm to find angle-monotone paths of width
$(90^\circ+\alpha)$ in these graphs. The routing ratio, which is the ratio of
path length to Euclidean distance, is at most $1/\cos(45^\circ +
\frac{\alpha}{2})$, i.e., ranging from $\sqrt 2 \approx 1.414$ to $2.613$. For
the special case $\alpha = 30^\circ$, we obtain the $\Theta_6$-graph and our
routing algorithm achieves the known routing ratio 2 while finding
angle-monotone paths of width $120^\circ$.
|
[
{
"version": "v1",
"created": "Fri, 19 Jan 2018 04:26:18 GMT"
}
] | 2018-01-22T00:00:00 |
[
[
"Lubiw",
"Anna",
""
],
[
"Mondal",
"Debajyoti",
""
]
] |
new_dataset
| 0.999138 |
1801.06323
|
Hussain Chowdhury Mr.
|
Hussain A Chowdhury, Dhruba K Bhattacharyya
|
Plagiarism: Taxonomy, Tools and Detection Techniques
|
Paper of the 19th National Convention on Knowledge, Library and
Information Networking (NACLIN 2016) held at Tezpur University, Assam, India
from October 26-28, 2016
|
Knowledge, Library and Information Networking, NACLIN 2016, ISBN:
978-93-82735-08-3
| null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To detect plagiarism of any form, it is essential to have broad knowledge of
its possible forms and classes, and existence of various tools and systems for
its detection. Based on impact or severity of damages, plagiarism may occur in
an article or in any production in a number of ways. This survey presents a
taxonomy of various plagiarism forms and include discussion on each of these
forms. Over the years, a good number tools and techniques have been introduced
to detect plagiarism. This paper highlights few promising methods for
plagiarism detection based on machine learning techniques. We analyse the pros
and cons of these methods and finally we highlight a list of issues and
research challenges related to this evolving research problem.
|
[
{
"version": "v1",
"created": "Fri, 19 Jan 2018 07:27:42 GMT"
}
] | 2018-01-22T00:00:00 |
[
[
"Chowdhury",
"Hussain A",
""
],
[
"Bhattacharyya",
"Dhruba K",
""
]
] |
new_dataset
| 0.987754 |
1801.06328
|
Satoshi Takabe
|
Satoshi Takabe, Yuta Ishimatsu, Tadashi Wadayama, Masahito Hayashi
|
Asymptotic Analysis on Spatial Coupling Coding for Two-Way Relay
Channels
|
5 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compute-and-forward relaying is effective to increase bandwidth efficiency of
wireless two-way relay channels. In a compute-and-forward scheme, a relay tries
to decode a linear combination composed of transmitted messages from other
terminals or relays. Design for error correcting codes and its decoding
algorithms suitable for compute-and-forward relaying schemes are still
important issue to be studied. In this paper, we will present an asymptotic
performance analysis on LDPC codes over two-way relay channels based on density
evolution (DE). Because of the asymmetric nature of the channel, we employ the
population dynamics DE combined with DE formulas for asymmetric channels to
obtain BP thresholds. In addition, we also evaluate the asymptotic performance
of spatially coupled LDPC codes for two-way relay channels. The results
indicate that the spatial coupling codes yield improvements in the BP threshold
compared with corresponding uncoupled codes for two-way relay channels.
|
[
{
"version": "v1",
"created": "Fri, 19 Jan 2018 07:59:18 GMT"
}
] | 2018-01-22T00:00:00 |
[
[
"Takabe",
"Satoshi",
""
],
[
"Ishimatsu",
"Yuta",
""
],
[
"Wadayama",
"Tadashi",
""
],
[
"Hayashi",
"Masahito",
""
]
] |
new_dataset
| 0.998146 |
1801.06368
|
Huy Kang Kim
|
Eunjo Lee, Jiyoung Woo, Hyoungshick Kim, Huy Kang Kim
|
No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil
Black Markets in Online Games
|
10 pages, 11 figures, In Proceedings of the 27th International World
Wide Web Conference (WWW) 2018
| null | null | null |
cs.CY cs.CR cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online game involves a very large number of users who are interconnected and
interact with each other via the Internet. We studied the characteristics of
exchanging virtual goods with real money through processes called "real money
trading (RMT)." This exchange might influence online game user behaviors and
cause damage to the reputation of game companies. We examined in-game
transactions to reveal RMT by constructing a social graph of virtual goods
exchanges in an online game and identifying network communities of users.
We analyzed approximately 6,000,000 transactions in a popular online game and
inferred RMT transactions by comparing the RMT transactions crawled from an
out-game market. Our findings are summarized as follows: (1) the size of the
RMT market could be approximately estimated; (2) professional RMT providers
typically form a specific network structure (either star-shape or chain) in the
trading network, which can be used as a clue for tracing RMT transactions; and
(3) the observed RMT market has evolved over time into a monopolized market
with a small number of large-sized virtual goods providers.
|
[
{
"version": "v1",
"created": "Fri, 19 Jan 2018 11:18:02 GMT"
}
] | 2018-01-22T00:00:00 |
[
[
"Lee",
"Eunjo",
""
],
[
"Woo",
"Jiyoung",
""
],
[
"Kim",
"Hyoungshick",
""
],
[
"Kim",
"Huy Kang",
""
]
] |
new_dataset
| 0.990964 |
1801.06400
|
Aydar Negimatzhanov
|
Rinat Khatipov, Manuel Mazzara, Aydar Negimatzhanov, Victor Rivera,
Anvar Zakirov, Ilgiz Zamaleev
|
Hikester - the event management application
| null | null | null | null |
cs.SI cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today social networks and services are one of the most important part of our
everyday life. Most of the daily activities, such as communicating with
friends, reading news or dating is usually done using social networks. However,
there are activities for which social networks do not yet provide adequate
support. This paper focuses on event management and introduces "Hikester". The
main objective of this service is to provide users with the possibility to
create any event they desire and to invite other users. "Hikester" supports the
creation and management of events like attendance of football matches, quest
rooms, shared train rides or visit of museums in foreign countries. Here we
discuss the project architecture as well as the detailed implementation of the
system components: the recommender system, the spam recognition service and the
parameters optimizer.
|
[
{
"version": "v1",
"created": "Fri, 19 Jan 2018 13:37:03 GMT"
}
] | 2018-01-22T00:00:00 |
[
[
"Khatipov",
"Rinat",
""
],
[
"Mazzara",
"Manuel",
""
],
[
"Negimatzhanov",
"Aydar",
""
],
[
"Rivera",
"Victor",
""
],
[
"Zakirov",
"Anvar",
""
],
[
"Zamaleev",
"Ilgiz",
""
]
] |
new_dataset
| 0.999451 |
1801.06428
|
Kevin Moran P
|
Kevin Moran, Mario Linares-Vasquez, Carlos Bernal-Cardenas,
Christopher Vendome and Denys Poshyvanyk
|
CrashScope: A Practical Tool for Automated Testing of Android
Applications
|
4 pages, Accepted in the Proceedings of 39th IEEE/ACM International
Conference on Software Engineering (ICSE'17). arXiv admin note: text overlap
with arXiv:1706.01130
| null |
10.1109/ICSE-C.2017.16
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Unique challenges arise when testing mobile applications due to their
prevailing event-driven nature and complex contextual features (e.g. sensors,
notifications). Current automated input generation approaches for Android apps
are typically not practical for developers to use due to required
instrumentation or platform dependence and generally do not effectively
exercise contextual features. To better support developers in mobile testing
tasks, in this demo we present a novel, automated tool called CrashScope. This
tool explores a given Android app using systematic input generation, according
to several strategies informed by static and dynamic analyses, with the
intrinsic goal of triggering crashes. When a crash is detected, CrashScope
generates an augmented crash report containing screenshots, detailed crash
reproduction steps, the captured exception stack trace, and a fully replayable
script that automatically reproduces the crash on a target device(s). Results
of preliminary studies show that CrashScope is able to uncover about as many
crashes as other state of the art tools, while providing detailed useful crash
reports and test scripts to developers. Website:
www.crashscope-android.com/crashscope-home Video url:
https://youtu.be/ii6S1JF6xDw
|
[
{
"version": "v1",
"created": "Thu, 18 Jan 2018 04:45:49 GMT"
}
] | 2018-01-22T00:00:00 |
[
[
"Moran",
"Kevin",
""
],
[
"Linares-Vasquez",
"Mario",
""
],
[
"Bernal-Cardenas",
"Carlos",
""
],
[
"Vendome",
"Christopher",
""
],
[
"Poshyvanyk",
"Denys",
""
]
] |
new_dataset
| 0.991992 |
1801.06448
|
Ruchin Jain
|
Ruchin Jain
|
A Congestion Control System Based on VANET for Small Length Roads
| null |
Annals of Emerging Technologies in Computing (AETiC), Print ISSN:
2516-0281, Online ISSN: 2516-029X, pp. 17-21, Vol. 2, No. 1, 1st January
2018, Published by International Association of Educators and Researchers
(IAER)
| null | null |
cs.NI cs.CE
|
http://creativecommons.org/licenses/by/4.0/
|
As vehicle population has been increasing on a daily basis, this leads
towards increased number of accidents. To overcome this issue, Vehicular Ad Hoc
Network (VANET) has come up with lot of novel ideas such as vehicular
communication, navigation and traffic controlling. In this study, the main
focus is on congestion control at the intersections which result from unclear
ahead. For this purpose, a city lane and intersection model has been proposed
to manage vehicle mobility. It shows the actual vehicle to vehicle and vehicle
to traffic infrastructure communication. The experiment was conducted using
Network Simulator 2 (NS 2). The implementation required modelling the road side
unit, traffic control unit, and on-board unit along the roadside. In the
simulation, including traffic volume, the distance between two signals,
end-to-end delay, packet delivery ratio, throughput and packet lost were taken
into consideration. These parameters ensure efficient communication between the
traffic signals. This results in improved congestion control and road safety,
since the vehicles will be signalled not to enter the junction box and
information about other vehicles.
|
[
{
"version": "v1",
"created": "Tue, 9 Jan 2018 09:15:04 GMT"
}
] | 2018-01-22T00:00:00 |
[
[
"Jain",
"Ruchin",
""
]
] |
new_dataset
| 0.999572 |
1801.06502
|
Zhihao Ding
|
Zhihao Ding, Pinyi Ren, Qinghe Du
|
Mobility Based Routing Protocol with MAC Collision Improvement in
Vehicular Ad Hoc Networks
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Intelligent transportation system attracts a great deal of research attention
because it helps enhance traffic safety, improve driving experiences, and
transportation efficiency. Vehicular Ad Hoc Network (VANET) supports wireless
connections among vehicles and offers information exchange, thus significantly
facilitating intelligent transportation systems. Since the vehicles move fast
and often change lanes unpredictably, the network topology evolves rapidly in a
random fashion, which imposes diverse challenges in routing protocol design
over VANET. When it comes to the 5G era, the fulfilment of ultra low end-to-end
delay and ultra high reliability becomes more crucial than ever. In this paper,
we propose a novel routing protocol that incorporates mobility status and MAC
layer channel contention information. The proposed routing protocol determines
next hop by applying mobility information and MAC contention information which
differs from existing greedy perimeter stateless routing (GPSR) protocol.
Simulation results of the proposed routing protocol show its performance
superiority over the existing approach.
|
[
{
"version": "v1",
"created": "Fri, 19 Jan 2018 17:39:27 GMT"
}
] | 2018-01-22T00:00:00 |
[
[
"Ding",
"Zhihao",
""
],
[
"Ren",
"Pinyi",
""
],
[
"Du",
"Qinghe",
""
]
] |
new_dataset
| 0.993858 |
1801.04420
|
Sahar Shahbaz
|
Sahar Shahbaz, Bahareh Akhbari, Reza Asvadi
|
LDPC Codes over Gaussian Multiple Access Wiretap Channel
|
21 pages, 8 figures, A Revision Submitted to IET Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of two-user Gaussian multiple access channel (GMAC) in
the presence of an external eavesdropper. In this problem, an eavesdropper
receives a signal with a lower signal-to-noise ratio (SNR) compared to the
legitimate receiver and all transmitted messages should be kept confidential
against the eavesdropper. For this purpose, we propose a secure coding scheme
on this channel which utilizes low-density parity-check (LDPC) codes by
employing random bit insertion and puncturing techniques. At each encoder, the
confidential message with some random bits as a random message are
systematically encoded, and then the associated bits to the confidential
message are punctured. Next, the encoders send their unpunctured bits over a
Gaussian multiple access wiretap channel (GMAC-WT). The puncturing distribution
applied to the LDPC code is considered in two cases: random and optimized. We
utilize a modified extrinsic information transfer (EXIT) chart analysis to
optimize the puncturing distribution for each encoder. The security gap is used
as a measure of secrecy for the sent messages over GMAC-WT which should be made
as small as possible. We compare the achieved secure rate pair with an
achievable secrecy rate region of GMAC-WT to show the effective performance of
the proposed scheme. In this paper, equal and unequal power conditions at the
transmitters are investigated. For both cases, we attain a fairly small
security gap which is equivalent to achieve the points near the secrecy rate
region of GMAC-WT.
|
[
{
"version": "v1",
"created": "Sat, 13 Jan 2018 11:24:31 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jan 2018 08:05:05 GMT"
}
] | 2018-01-19T00:00:00 |
[
[
"Shahbaz",
"Sahar",
""
],
[
"Akhbari",
"Bahareh",
""
],
[
"Asvadi",
"Reza",
""
]
] |
new_dataset
| 0.967512 |
1801.05768
|
Zhen Chen
|
Zhen Chen, Zhiying Wang and Syed Jafar
|
The Asymptotic Capacity of Private Search
| null | null | null | null |
cs.IT cs.CR cs.DS math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The private search problem is introduced, where a dataset comprised of $L$
i.i.d. records is replicated across $N$ non-colluding servers, each record
takes values uniformly from an alphabet of size $K$, and a user wishes to
search for all records that match a privately chosen value, without revealing
any information about the chosen value to any individual server. The capacity
of private search is the maximum number of bits of desired information that can
be retrieved per bit of download. The asymptotic (large $K$) capacity of
private search is shown to be $1-1/N$, even as the scope of private search is
further generalized to allow approximate (OR) search over a number of
realizations that grows with $K$. The results are based on the asymptotic
behavior of a new converse bound for private information retrieval with
arbitrarily dependent messages.
|
[
{
"version": "v1",
"created": "Fri, 12 Jan 2018 05:29:38 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jan 2018 18:17:36 GMT"
}
] | 2018-01-19T00:00:00 |
[
[
"Chen",
"Zhen",
""
],
[
"Wang",
"Zhiying",
""
],
[
"Jafar",
"Syed",
""
]
] |
new_dataset
| 0.993606 |
1801.05848
|
Anna-Lena Horlemann-Trautmann
|
Alessandro Neri and Anna-Lena Horlemann-Trautmann
|
Random Construction of Partial MDS Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work deals with partial MDS (PMDS) codes, a special class of locally
repairable codes, used for distributed storage system. We first show that a
known construction of these codes, using Gabidulin codes, can be extended to
use any maximum rank distance code. Then we define a standard form for the
generator matrices of PMDS codes and use this form to give an algebraic
description of PMDS generator matrices. This implies that over a sufficiently
large finite field a randomly chosen generator matrix in PMDS standard form
generates a PMDS code with high probability. This also provides sufficient
conditions on the field size for the existence of PMDS codes.
|
[
{
"version": "v1",
"created": "Wed, 17 Jan 2018 20:09:02 GMT"
}
] | 2018-01-19T00:00:00 |
[
[
"Neri",
"Alessandro",
""
],
[
"Horlemann-Trautmann",
"Anna-Lena",
""
]
] |
new_dataset
| 0.993837 |
1801.05881
|
Mayank Kejriwal
|
Mayank Kejriwal, Yao Gu
|
A Pipeline for Post-Crisis Twitter Data Acquisition
|
6 pages, 4 figures, Workshop on Social Web in Emergency and Disaster
Management 2018 at the ACM WSDM Conference
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to instant availability of data on social media platforms like Twitter,
and advances in machine learning and data management technology, real-time
crisis informatics has emerged as a prolific research area in the last decade.
Although several benchmarks are now available, especially on portals like
CrisisLex, an important, practical problem that has not been addressed thus far
is the rapid acquisition and benchmarking of data from free, publicly available
streams like the Twitter API. In this paper, we present ongoing work on a
pipeline for facilitating immediate post-crisis data collection, curation and
relevance filtering from the Twitter API. The pipeline is minimally supervised,
alleviating the need for feature engineering by including a judicious mix of
data preprocessing and fast text embeddings, along with an active learning
framework. We illustrate the utility of the pipeline by describing a recent
case study wherein it was used to collect and analyze millions of tweets in the
immediate aftermath of the Las Vegas shootings.
|
[
{
"version": "v1",
"created": "Wed, 17 Jan 2018 22:38:52 GMT"
}
] | 2018-01-19T00:00:00 |
[
[
"Kejriwal",
"Mayank",
""
],
[
"Gu",
"Yao",
""
]
] |
new_dataset
| 0.958951 |
1801.05889
|
Edip Demirbilek
|
Edip Demirbilek and Jean-Charles Gr\'egoire
|
Perceived Audiovisual Quality Modelling based on Decison Trees, Genetic
Programming and Neural Networks
| null | null | null | null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Our objective is to build machine learning based models that predict
audiovisual quality directly from a set of correlated parameters that are
extracted from a target quality dataset. We have used the bitstream version of
the INRS audiovisual quality dataset that reflects contemporary real-time
configurations for video frame rate, video quantization, noise reduction
parameters and network packet loss rate. We have utilized this dataset to build
bitstream perceived quality estimation models based on the Random Forests,
Bagging, Deep Learning and Genetic Programming methods.
We have taken an empirical approach and have generated models varying from
very simple to the most complex depending on the number of features used from
the quality dataset. Random Forests and Bagging models have overall generated
the most accurate results in terms of RMSE and Pearson correlation coefficient
values. Deep Learning and Genetic Programming based bitstream models have also
achieved good results but that high performance was observed only with a
limited range of features. We have also obtained the epsilon-insensitive RMSE
values for each model and have computed the significance of the difference
between the correlation coefficients.
Overall we conclude that computing the bitstream information is worth the
effort it takes to generate and helps to build more accurate models for
real-time communications. However, it is useful only for the deployment of the
right algorithms with the carefully selected subset of the features. The
dataset and tools that have been developed during this research are publicly
available for research and development purposes.
|
[
{
"version": "v1",
"created": "Wed, 6 Dec 2017 02:49:27 GMT"
}
] | 2018-01-19T00:00:00 |
[
[
"Demirbilek",
"Edip",
""
],
[
"Grégoire",
"Jean-Charles",
""
]
] |
new_dataset
| 0.994524 |
1801.05932
|
Kevin Moran P
|
Kevin Moran
|
Enhancing Bug Reports for Mobile Apps
|
77 pages, MS Thesis presented to the faculty @ the College of William
& Mary
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The modern software development landscape has seen a shift in focus toward
mobile applications as "smart" devices near ubiquitous adoption. Due to this
trend, the complexity of mobile applications has been increasing, making
development and maintenance particularly challenging. However, it is clear that
current bug tracking systems are not able effectively support construction of
reports with actionable information that will directly lead to a bug's
resolution. To address the need for an improved reporting system, we introduce
a novel solution, called FUSION, that helps users auto-complete reproduction
steps in bug reports for mobile apps. FUSION links information, that users
provide, to program artifacts extracted through static and dynamic analysis
performed before testing or release. The approach that FUSION employs is
generalizable to other current mobile software platforms, and constitutes a new
method by which off-device bug reporting can be conducted for mobile software
projects. We evaluate FUSION by conducting a study that quantitatively and
qualitatively measures the user experience of the system for both reporting and
reproducing bugs, as well as the quality of the bug reports it produces. In a
study involving 28 participants we apply FUSION to support the maintenance
tasks of reporting and reproducing defects on 15 real-world bugs found in 14
open source Android apps. Our results demonstrate that FUSION allows for more
reliable reproduction of bugs from reports by aiding users in reporting more
detailed application-specific information compared to traditional bug tracking
systems.
|
[
{
"version": "v1",
"created": "Thu, 18 Jan 2018 04:32:08 GMT"
}
] | 2018-01-19T00:00:00 |
[
[
"Moran",
"Kevin",
""
]
] |
new_dataset
| 0.987839 |
1801.05938
|
Cam Ly Nguyen Ms
|
Cam Ly Nguyen and Aftab Khan
|
WiLAD: Wireless Localisation through Anomaly Detection
| null |
IEEE GLOBECOM 2017
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new approach towards RSS (Received Signal Strength) based
wireless localisation for scenarios where, instead of absolute positioning of
an object, only the information whether an object is inside or outside of a
specific area is required. This is motivated through a number of applications
including, but not limited to, a) security: detecting whether an object is
removed from a secure location, b) wireless sensor networks: detecting sensor
movements outside of a network area, and c) computational behaviour analytics:
detecting customers leaving a retail store. The result of such detection
systems can naturally be utilised in building a higher level contextual
understanding of a system or user behaviours. We use a supervised learning
method to overcome issues related to RSS based localisation systems including
multipath fading, shadowing, and incorrect model parameters (as in unsupervised
methods). Moreover, to reduce the cost of collecting training data, we employ a
detection method called One-Class SVM (OC-SVM) which requires only one class of
data (positive data, or target class data) for training. We derive a
mathematical approximation of accuracy which utilises the characteristics of
wireless signals as well as OC-SVM. Based on this we then propose a novel
mathematical formula to find optimal placement of devices. This enables us to
optimize the placement without performing any costly experiments or
simulations. We validate our proposed mathematical framework based on simulated
and real experiments.
|
[
{
"version": "v1",
"created": "Thu, 18 Jan 2018 05:13:15 GMT"
}
] | 2018-01-19T00:00:00 |
[
[
"Nguyen",
"Cam Ly",
""
],
[
"Khan",
"Aftab",
""
]
] |
new_dataset
| 0.99943 |
1801.06059
|
Muthiah Annamalai
|
Muthiah Annamalai, T Shrinivasan
|
Tamil Open-Source Landscape - Opportunities and Challenges
|
Tamil Internet Conference (INFITT) 2017, Toronto, Canada
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We report in this paper, Tamil open-source software community is a vibrant
place with software developers, font designers, translators, voice-over
artists, and general user testers, who come together for love of their
language, and promotion of critical thinking, and modern language usage in
Tamil. We identify a need for institutional support at various stages from
grooming software developers in Tamil, to marketing platform for Tamil
software. There is bright future for tamil software if we will meet challenges
it brings with it.
|
[
{
"version": "v1",
"created": "Tue, 16 Jan 2018 05:29:48 GMT"
}
] | 2018-01-19T00:00:00 |
[
[
"Annamalai",
"Muthiah",
""
],
[
"Shrinivasan",
"T",
""
]
] |
new_dataset
| 0.999263 |
1801.06153
|
Kai Li
|
Kai Li, Wei Ni, Eduardo Tovar, and Mohsen Guizani
|
LCD: Low Latency Command Dissemination for A Platoon of Vehicles
|
8 pages, 5 figures, accepted in IEEE International Conference on
Communications (ICC), 2018
| null | null | null |
cs.PF cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a vehicular platoon, a lead vehicle that is responsible for managing the
platoon's moving directions and velocity periodically disseminates control
commands to following vehicles based on vehicle-to-vehicle communications.
However, reducing command dissemination latency with multiple vehicles while
ensuring successful message delivery to the tail vehicle is challenging. We
propose a new linear dynamic programming algorithm using backward induction and
interchange arguments to minimize the dissemination latency of the vehicles.
Furthermore, a closed form of dissemination latency in vehicular platoon is
obtained by utilizing Markov chain with M/M/1 queuing model. Simulation results
confirm that the proposed dynamic programming algorithm improves the
dissemination rate by at least 50.9%, compared to similar algorithms in the
literature. Moreover, it also approximates the best performance with the
maximum gap of up to 0.2 second in terms of latency.
|
[
{
"version": "v1",
"created": "Thu, 18 Jan 2018 18:06:09 GMT"
}
] | 2018-01-19T00:00:00 |
[
[
"Li",
"Kai",
""
],
[
"Ni",
"Wei",
""
],
[
"Tovar",
"Eduardo",
""
],
[
"Guizani",
"Mohsen",
""
]
] |
new_dataset
| 0.976486 |
1504.04073
|
David Eppstein
|
David Eppstein
|
The Parametric Closure Problem
|
22 pages, 8 figures. A preliminary version of this paper appeared at
the 14th Algorithms and Data Structures Symposium (WADS), Victoria, BC,
August 2015, Springer, Lecture Notes in Comp. Sci. 9214 (2015), pp. 327-338
|
ACM Trans. Algorithms 14 (1): Article 2, 2018
|
10.1145/3147212
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define the parametric closure problem, in which the input is a partially
ordered set whose elements have linearly varying weights and the goal is to
compute the sequence of minimum-weight lower sets of the partial order as the
weights vary. We give polynomial time solutions to many important special cases
of this problem including semiorders, reachability orders of bounded-treewidth
graphs, partial orders of bounded width, and series-parallel partial orders.
Our result for series-parallel orders provides a significant generalization of
a previous result of Carlson and Eppstein on bicriterion subtree problems.
|
[
{
"version": "v1",
"created": "Thu, 16 Apr 2015 00:41:36 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Sep 2017 01:11:08 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Eppstein",
"David",
""
]
] |
new_dataset
| 0.986777 |
1508.06464
|
Osamu Hirose
|
Osamu Hirose, Shotaro Kawaguchi, Terumasa Tokunaga, Yu Toyoshima,
Takayuki Teramoto, Sayuri Kuge, Takeshi Ishihara, Yuichi Iino, Ryo Yoshida
|
SPF-CellTracker: Tracking multiple cells with strongly-correlated moves
using a spatial particle filter
|
14 pages, 6 figures
|
IEEE/ACM Trans.Comput.Biol.Bioinform. 2017
|
10.1109/TCBB.2017.2782255
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tracking many cells in time-lapse 3D image sequences is an important
challenging task of bioimage informatics. Motivated by a study of brain-wide 4D
imaging of neural activity in C. elegans, we present a new method of multi-cell
tracking. Data types to which the method is applicable are characterized as
follows: (i) cells are imaged as globular-like objects, (ii) it is difficult to
distinguish cells based only on shape and size, (iii) the number of imaged
cells ranges in several hundreds, (iv) moves of nearly-located cells are
strongly correlated and (v) cells do not divide. We developed a tracking
software suite which we call SPF-CellTracker. Incorporating dependency on
cells' moves into prediction model is the key to reduce the tracking errors:
cell-switching and coalescence of tracked positions. We model target cells'
correlated moves as a Markov random field and we also derive a fast computation
algorithm, which we call spatial particle filter. With the live-imaging data of
nuclei of C. elegans neurons in which approximately 120 nuclei of neurons are
imaged, we demonstrate an advantage of the proposed method over the standard
particle filter and a method developed by Tokunaga et al. (2014).
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2015 12:27:17 GMT"
},
{
"version": "v2",
"created": "Mon, 23 May 2016 00:08:55 GMT"
},
{
"version": "v3",
"created": "Fri, 27 May 2016 19:52:44 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Hirose",
"Osamu",
""
],
[
"Kawaguchi",
"Shotaro",
""
],
[
"Tokunaga",
"Terumasa",
""
],
[
"Toyoshima",
"Yu",
""
],
[
"Teramoto",
"Takayuki",
""
],
[
"Kuge",
"Sayuri",
""
],
[
"Ishihara",
"Takeshi",
""
],
[
"Iino",
"Yuichi",
""
],
[
"Yoshida",
"Ryo",
""
]
] |
new_dataset
| 0.997621 |
1512.02134
|
Nikolaus Mayer
|
Nikolaus Mayer, Eddy Ilg, Philip H\"ausser, Philipp Fischer, Daniel
Cremers, Alexey Dosovitskiy, Thomas Brox
|
A Large Dataset to Train Convolutional Networks for Disparity, Optical
Flow, and Scene Flow Estimation
|
Includes supplementary material
| null |
10.1109/CVPR.2016.438
| null |
cs.CV cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent work has shown that optical flow estimation can be formulated as a
supervised learning task and can be successfully solved with convolutional
networks. Training of the so-called FlowNet was enabled by a large
synthetically generated dataset. The present paper extends the concept of
optical flow estimation via convolutional networks to disparity and scene flow
estimation. To this end, we propose three synthetic stereo video datasets with
sufficient realism, variation, and size to successfully train large networks.
Our datasets are the first large-scale datasets to enable training and
evaluating scene flow methods. Besides the datasets, we present a convolutional
network for real-time disparity estimation that provides state-of-the-art
results. By combining a flow and disparity estimation network and training it
jointly, we demonstrate the first scene flow estimation with a convolutional
network.
|
[
{
"version": "v1",
"created": "Mon, 7 Dec 2015 17:35:00 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Mayer",
"Nikolaus",
""
],
[
"Ilg",
"Eddy",
""
],
[
"Häusser",
"Philip",
""
],
[
"Fischer",
"Philipp",
""
],
[
"Cremers",
"Daniel",
""
],
[
"Dosovitskiy",
"Alexey",
""
],
[
"Brox",
"Thomas",
""
]
] |
new_dataset
| 0.964725 |
1711.03951
|
Luc Trudeau
|
Luc N. Trudeau and Nathan E. Egge and David Barr
|
Predicting Chroma from Luma in AV1
|
8 pages
| null | null | null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Chroma from luma (CfL) prediction is a new and promising chroma-only intra
predictor that models chroma pixels as a linear function of the coincident
reconstructed luma pixels. In this paper, we present the CfL predictor adopted
in Alliance Video 1 (AV1), a royalty-free video codec developed by the Alliance
for Open Media (AOM). The proposed CfL distinguishes itself from prior art not
only by reducing decoder complexity, but also by producing more accurate
predictions. On average, CfL reduces the BD-rate, when measured with CIEDE2000,
by 5% for still images and 2% for video sequences.
|
[
{
"version": "v1",
"created": "Fri, 10 Nov 2017 18:26:04 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jan 2018 15:51:46 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Trudeau",
"Luc N.",
""
],
[
"Egge",
"Nathan E.",
""
],
[
"Barr",
"David",
""
]
] |
new_dataset
| 0.998643 |
1801.05585
|
Nanne Van Noord
|
Nanne van Noord, Eric Postma
|
Light-weight pixel context encoders for image inpainting
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work we propose Pixel Content Encoders (PCE), a light-weight image
inpainting model, capable of generating novel con-tent for large missing
regions in images. Unlike previously presented convolutional neural network
based models, our PCE model has an order of magnitude fewer trainable
parameters. Moreover, by incorporating dilated convolutions we are able to
preserve fine grained spatial information, achieving state-of-the-art
performance on benchmark datasets of natural images and paintings. Besides
image inpainting, we show that without changing the architecture, PCE can be
used for image extrapolation, generating novel content beyond existing image
boundaries.
|
[
{
"version": "v1",
"created": "Wed, 17 Jan 2018 08:19:41 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"van Noord",
"Nanne",
""
],
[
"Postma",
"Eric",
""
]
] |
new_dataset
| 0.967858 |
1801.05588
|
Shaan Chopra
|
Abhinav Khattar, Karan Dabas, Kshitij Gupta, Shaan Chopra, and
Ponnurangam Kumaraguru
|
White or Blue, the Whale gets its Vengeance: A Social Media Analysis of
the Blue Whale Challenge
|
18 pages
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Blue Whale Challenge is a series of self-harm causing tasks that are
propagated via online social media under the disguise of a "game." The list of
tasks must be completed in a duration of 50 days and they cause both physical
and mental harm to the player. The final task is to commit suicide. The game is
supposed to be administered by people called "curators" who incite others to
cause self-mutilation and commit suicide. The curators and potential players
are known to contact each other on social networking websites and the
conversations between them are suspected to take place mainly via direct
messages which are difficult to track. Though, in order to find curators, the
players make public posts containing certain hashtags/keywords to catch their
attention. Even though a lot of these social networks have moderated posts
talking about the game, yet some posts manage to pass their filters. Our
research focuses on (1) understanding the social media spread of the challenge,
(2) spotting the behaviour of the people taking interest in Blue Whale
challenge and, (3) analysing demographics of the users who may be involved in
playing the game.
|
[
{
"version": "v1",
"created": "Wed, 17 Jan 2018 08:40:32 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Khattar",
"Abhinav",
""
],
[
"Dabas",
"Karan",
""
],
[
"Gupta",
"Kshitij",
""
],
[
"Chopra",
"Shaan",
""
],
[
"Kumaraguru",
"Ponnurangam",
""
]
] |
new_dataset
| 0.997492 |
1801.05604
|
Christos Liaskos K.
|
A. Tsioliaridou, C. Liaskos, E. Dedu, S. Ioannidis
|
Packet Routing in 3D Nanonetworks: A Lightweight, Linear-path Scheme
| null |
Volume 12, June 2017, Pages 63-71
|
10.1016/j.nancom.2017.01.001
| null |
cs.NI cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Packet routing in nanonetworks requires novel approaches, which can cope with
the extreme limitations posed by the nano-scale. Highly lossy wireless
channels, extremely limited hardware capabilities and non-unique node
identifiers are among the restrictions. The present work offers an addressing
and routing solution for static 3D nanonetworks that find applications in
material monitoring and programmatic property tuning. The addressing process
relies on virtual coordinates from multiple, alternative anchor point sets that
act as \emph{viewports}. Each viewport offers different address granularity
within the network space, and its selection is optimized by a packet sending
node using a novel heuristic. Regarding routing, each node can deduce whether
it is located on the linear segment connecting the sender to the recipient
node. This deduction is made using integer calculations, node-local information
and in a stateless manner, minimizing the computational and storage overhead of
the proposed scheme. Most importantly, the nodes can regulate the width of the
linear path, thus trading energy efficiency (redundant transmissions) for
increased path diversity. This trait can enable future adaptive routing
schemes. Extensive evaluation via simulations highlights the advantages of the
novel scheme over related approaches.
|
[
{
"version": "v1",
"created": "Wed, 17 Jan 2018 09:38:37 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Tsioliaridou",
"A.",
""
],
[
"Liaskos",
"C.",
""
],
[
"Dedu",
"E.",
""
],
[
"Ioannidis",
"S.",
""
]
] |
new_dataset
| 0.99982 |
1801.05611
|
Christos Liaskos K.
|
Christos Liaskos, Ageliki Tsioliaridou, Sotiris Ioannidis
|
The Socket Store: An App Model for the Application-Network Interaction
| null | null |
10.1109/ISCC.2017.8024557
| null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A developer of mobile or desktop applications is responsible for implementing
the network logic of his software. Nonetheless: i) Developers are not network
specialists, while pressure for emphasis on the visible application parts
places the network logic out of the coding focus. Moreover, computer networks
undergo evolution at paces that developers may not follow. ii) From the network
resource provider point of view, marketing novel services and involving a broad
audience is also challenge for the same reason. Moreover, the objectives of
end-user networking logic are neither clear nor uniform. This constitutes the
central optimization of network resources an additional challenge. As a
solution to these problems, we propose the Socket Store. The Store is a
marketplace containing end-user network logic in modular form. The Store
modules act as intelligent mediators between the end-user and the network
resources. Each module has a clear, specialized objective, such as connecting
two clients over the Internet while avoiding transit networks suspicious for
eavesdropping. The Store is populated and peer-reviewed by network specialists,
whose motive is the visibility, practical applicability and monetization
potential of their work. A developer first purchases access to a given socket
module. Subsequently, he incorporates it to his applications under development,
obtaining state-of-the-art performance with trivial coding burden. A full Store
prototype is implemented and a critical data streaming module is evaluated as a
driving case.
|
[
{
"version": "v1",
"created": "Wed, 17 Jan 2018 10:11:39 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Liaskos",
"Christos",
""
],
[
"Tsioliaridou",
"Ageliki",
""
],
[
"Ioannidis",
"Sotiris",
""
]
] |
new_dataset
| 0.996942 |
1801.05731
|
Roberto Bifulco
|
Giuseppe Siracusano, Roberto Bifulco
|
In-network Neural Networks
|
Accepted at SysML 2018
| null | null | null |
cs.DC cs.AR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present N2Net, a system that implements binary neural networks using
commodity switching chips deployed in network switches and routers. Our system
shows that these devices can run simple neural network models, whose input is
encoded in the network packets' header, at packet processing speeds (billions
of packets per second). Furthermore, our experience highlights that switching
chips could support even more complex models, provided that some minor and
cheap modifications to the chip's design are applied. We believe N2Net provides
an interesting building block for future end-to-end networked systems.
|
[
{
"version": "v1",
"created": "Wed, 17 Jan 2018 16:17:28 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Siracusano",
"Giuseppe",
""
],
[
"Bifulco",
"Roberto",
""
]
] |
new_dataset
| 0.994876 |
1801.05741
|
R\'emi Cura
|
R\'emi Cura, Julien Perret, Nicolas Paparoditis
|
StreetGen : In base city scale procedural generation of streets: road
network, road surface and street objects
|
Paper extracted from thesis manuscript, is also an extension of
doi:10.5194/isprsannals-II-3-W5-409-201
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Streets are large, diverse, and used for several (and possibly conflicting)
transport modalities as well as social and cultural activities. Proper planning
is essential and requires data. Manually fabricating data that represent
streets (street reconstruction) is error-prone and time consuming. Automatising
street reconstruction is a challenge because of the diversity, size, and scale
of the details (few centimetres for cornerstone) required. The state-of-the-art
focuses on roads (no context, no urban features) and is strongly determined by
each application (simulation, visualisation, planning). We propose a unified
framework that works on real Geographic Information System (GIS) data and uses
a strong, yet simple modelling hypothesis when possible to robustly model
streets at the city level or street level. Our method produces a coherent
street-network model containing topological traffic information, road surface
and street objects. We demonstrate the robustness and genericity of our method
by reconstructing the entire city of Paris streets and exploring other similar
reconstruction (airport driveway).
|
[
{
"version": "v1",
"created": "Wed, 17 Jan 2018 16:33:28 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Cura",
"Rémi",
""
],
[
"Perret",
"Julien",
""
],
[
"Paparoditis",
"Nicolas",
""
]
] |
new_dataset
| 0.988286 |
1801.05746
|
Alexey Shvets
|
Vladimir Iglovikov and Alexey Shvets
|
TernausNet: U-Net with VGG11 Encoder Pre-Trained on ImageNet for Image
Segmentation
|
5 pages, 4 figures
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Pixel-wise image segmentation is demanding task in computer vision. Classical
U-Net architectures composed of encoders and decoders are very popular for
segmentation of medical images, satellite images etc. Typically, neural network
initialized with weights from a network pre-trained on a large data set like
ImageNet shows better performance than those trained from scratch on a small
dataset. In some practical applications, particularly in medicine and traffic
safety, the accuracy of the models is of utmost importance. In this paper, we
demonstrate how the U-Net type architecture can be improved by the use of the
pre-trained encoder. Our code and corresponding pre-trained weights are
publicly available at https://github.com/ternaus/TernausNet. We compare three
weight initialization schemes: LeCun uniform, the encoder with weights from
VGG11 and full network trained on the Carvana dataset. This network
architecture was a part of the winning solution (1st out of 735) in the Kaggle:
Carvana Image Masking Challenge.
|
[
{
"version": "v1",
"created": "Wed, 17 Jan 2018 16:49:10 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Iglovikov",
"Vladimir",
""
],
[
"Shvets",
"Alexey",
""
]
] |
new_dataset
| 0.999592 |
1801.05764
|
Nikolaos Alexopoulos
|
Nikolaos Alexopoulos, Sheikh Mahbub Habib, Steffen Schulz, Max
M\"uhlh\"auser
|
M-STAR: A Modular, Evidence-based Software Trustworthiness Framework
|
18 pages, 13 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Despite years of intensive research in the field of software vulnerabilities
discovery, exploits are becoming ever more common. Consequently, it is more
necessary than ever to choose software configurations that minimize systems'
exposure surface to these threats. In order to support users in assessing the
security risks induced by their software configurations and in making informed
decisions, we introduce M-STAR, a Modular Software Trustworthiness ARchitecture
and framework for probabilistically assessing the trustworthiness of software
systems, based on evidence, such as their vulnerability history and source code
properties.
Integral to M-STAR is a software trustworthiness model, consistent with the
concept of computational trust. Computational trust models are rooted in
Bayesian probability and Dempster-Shafer Belief theory, offering mathematical
soundness and expressiveness to our framework. To evaluate our framework, we
instantiate M-STAR for Debian Linux packages, and investigate real-world
deployment scenarios. In our experiments with real-world data, M-STAR could
assess the relative trustworthiness of complete software configurations with an
error of less than 10%. Due to its modular design, our proposed framework is
agile, as it can incorporate future advances in the field of code analysis and
vulnerability prediction. Our results point out that M-STAR can be a valuable
tool for system administrators, regular users and developers, helping them
assess and manage risks associated with their software configurations.
|
[
{
"version": "v1",
"created": "Wed, 17 Jan 2018 17:32:00 GMT"
}
] | 2018-01-18T00:00:00 |
[
[
"Alexopoulos",
"Nikolaos",
""
],
[
"Habib",
"Sheikh Mahbub",
""
],
[
"Schulz",
"Steffen",
""
],
[
"Mühlhäuser",
"Max",
""
]
] |
new_dataset
| 0.984647 |
1709.00285
|
Sergey Pupyrev
|
Sergey Pupyrev
|
Mixed Linear Layouts of Planar Graphs
|
Appears in the Proceedings of the 25th International Symposium on
Graph Drawing and Network Visualization (GD 2017)
| null | null | null |
cs.CG cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A $k$-stack (respectively, $k$-queue) layout of a graph consists of a total
order of the vertices, and a partition of the edges into $k$ sets of
non-crossing (non-nested) edges with respect to the vertex ordering. In 1992,
Heath and Rosenberg conjectured that every planar graph admits a mixed
$1$-stack $1$-queue layout in which every edge is assigned to a stack or to a
queue that use a common vertex ordering.
We disprove this conjecture by providing a planar graph that does not have
such a mixed layout. In addition, we study mixed layouts of graph subdivisions,
and show that every planar graph has a mixed subdivision with one division
vertex per edge.
|
[
{
"version": "v1",
"created": "Fri, 1 Sep 2017 13:09:50 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jan 2018 18:41:11 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Pupyrev",
"Sergey",
""
]
] |
new_dataset
| 0.992993 |
1801.04961
|
Rajit Karmakar
|
Rajit Karmakar, Santanu Chatopadhyay and Rohit Kapur
|
Encrypt Flip-Flop: A Novel Logic Encryption Technique For Sequential
Circuits
|
14 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Logic Encryption is one of the most popular hardware security techniques
which can prevent IP piracy and illegal IC overproduction. It introduces
obfuscation by inserting some extra hardware into a design to hide its
functionality from unauthorized users. Correct functionality of an encrypted
design depends upon the application of correct keys, shared only with the
authorized users. In the recent past, extensive efforts have been devoted in
extracting the secret key of an encrypted design. At the same time, several
countermeasures have also been proposed by the research community to thwart
different state-of-the-art attacks on logic encryption. However, most of the
proposed countermeasures fail to prevent the powerful SAT attack. Although a
few researchers have proposed different solutions to withstand SAT attack,
those solutions suffer from several drawbacks such as high design overheads,
low output corruptibility, and vulnerability against removal attack. Almost all
the known logic encryption strategies are vulnerable to scan based attack. In
this paper, we propose a novel encryption technique called Encrypt Flip-Flop,
which encrypts the outputs of selected flip-flops by inserting multiplexers
(MUX). The proposed strategy can thwart all the known attacks including SAT and
scan based attacks. The scheme has low design overhead and implementation
complexity. Experimental results on several ISCAS'89 and ITC'99 benchmarks show
that our proposed method can produce reasonable output corruption for wrong
keys.
|
[
{
"version": "v1",
"created": "Mon, 15 Jan 2018 19:36:01 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Karmakar",
"Rajit",
""
],
[
"Chatopadhyay",
"Santanu",
""
],
[
"Kapur",
"Rohit",
""
]
] |
new_dataset
| 0.996453 |
1801.05032
|
Feng-Lin Li
|
Feng-Lin Li, Minghui Qiu, Haiqing Chen, Xiongwei Wang, Xing Gao, Jun
Huang, Juwei Ren, Zhongzhou Zhao, Weipeng Zhao, Lei Wang, Guwei Jin, Wei Chu
|
AliMe Assist: An Intelligent Assistant for Creating an Innovative
E-commerce Experience
| null | null | null | null |
cs.CL cs.AI
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
We present AliMe Assist, an intelligent assistant designed for creating an
innovative online shopping experience in E-commerce. Based on question
answering (QA), AliMe Assist offers assistance service, customer service, and
chatting service. It is able to take voice and text input, incorporate context
to QA, and support multi-round interaction. Currently, it serves millions of
customer questions per day and is able to address 85% of them. In this paper,
we demonstrate the system, present the underlying techniques, and share our
experience in dealing with real-world QA in the E-commerce field.
|
[
{
"version": "v1",
"created": "Fri, 12 Jan 2018 12:11:30 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Li",
"Feng-Lin",
""
],
[
"Qiu",
"Minghui",
""
],
[
"Chen",
"Haiqing",
""
],
[
"Wang",
"Xiongwei",
""
],
[
"Gao",
"Xing",
""
],
[
"Huang",
"Jun",
""
],
[
"Ren",
"Juwei",
""
],
[
"Zhao",
"Zhongzhou",
""
],
[
"Zhao",
"Weipeng",
""
],
[
"Wang",
"Lei",
""
],
[
"Jin",
"Guwei",
""
],
[
"Chu",
"Wei",
""
]
] |
new_dataset
| 0.99954 |
1801.05038
|
R\'emi Cura
|
Remi Cura, Julien Perret, Nicolas Paparoditis
|
An octree cells occupancy geometric dimensionality descriptor for
massive on-server point cloud visualisation and classification
|
extracted from article arXiv:1602.06920 ( arXiv:1602.06920 was split
into 2 articles because it was to long and to hard to read)
| null | null | null |
cs.CV cs.CG cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Lidar datasets are becoming more and more common. They are appreciated for
their precise 3D nature, and have a wide range of applications, such as surface
reconstruction, object detection, visualisation, etc. For all this
applications, having additional semantic information per point has potential of
increasing the quality and the efficiency of the application. In the last
decade the use of Machine Learning and more specifically classification methods
have proved to be successful to create this semantic information. In this
paradigm, the goal is to classify points into a set of given classes (for
instance tree, building, ground, other). Some of these methods use descriptors
(also called feature) of a point to learn and predict its class. Designing the
descriptors is then the heart of these methods. Descriptors can be based on
points geometry and attributes, use contextual information, etc. Furthermore,
descriptors can be used by humans for easier visual understanding and sometimes
filtering. In this work we propose a new simple geometric descriptor that gives
information about the implicit local dimensionality of the point cloud at
various scale. For instance a tree seen from afar is more volumetric in nature
(3D), yet locally each leaves is rather planar (2D). To do so we build an
octree centred on the point to consider, and compare the variation of the
occupancy of the cells across the levels of the octree. We compare this
descriptor with the state of the art dimensionality descriptor and show its
interest. We further test the descriptor for classification within the Point
Cloud Server, and demonstrate efficiency and correctness results.
|
[
{
"version": "v1",
"created": "Mon, 15 Jan 2018 21:40:24 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Cura",
"Remi",
""
],
[
"Perret",
"Julien",
""
],
[
"Paparoditis",
"Nicolas",
""
]
] |
new_dataset
| 0.995032 |
1801.05064
|
Mohammad Roohitavaf
|
Mohammad Roohitavaf and Sandeep Kulkarni
|
DKVF: A Framework for Rapid Prototyping and Evaluating Distributed
Key-value Stores
| null | null | null | null |
cs.DC cs.DB cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present our framework DKVF that enables one to quickly prototype and
evaluate new protocols for key-value stores and compare them with existing
protocols based on selected benchmarks. Due to limitations of CAP theorem, new
protocols must be developed that achieve the desired trade-off between
consistency and availability for the given application at hand. Hence, both
academic and industrial communities focus on developing new protocols that
identify a different (and hopefully better in one or more aspect) point on this
trade-off curve. While these protocols are often based on a simple intuition,
evaluating them to ensure that they indeed provide increased availability,
consistency, or performance is a tedious task. Our framework, DKVF, enables one
to quickly prototype a new protocol as well as identify how it performs
compared to existing protocols for pre-specified benchmarks. Our framework
relies on YCSB (Yahoo! Cloud Servicing Benchmark) for benchmarking. We
demonstrate DKVF by implementing four existing protocols --eventual
consistency, COPS, GentleRain and CausalSpartan-- with it. We compare the
performance of these protocols against different loading conditions. We find
that the performance is similar to our implementation of these protocols from
scratch. And, the comparison of these protocols is consistent with what has
been reported in the literature. Moreover, implementation of these protocols
was much more natural as we only needed to translate the pseudocode into Java
(and add the necessary error handling). Hence, it was possible to achieve this
in just 1-2 days per protocol. Finally, our framework is extensible. It is
possible to replace individual components in the framework (e.g., the storage
component).
|
[
{
"version": "v1",
"created": "Mon, 15 Jan 2018 23:09:59 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Roohitavaf",
"Mohammad",
""
],
[
"Kulkarni",
"Sandeep",
""
]
] |
new_dataset
| 0.997673 |
1801.05100
|
Nicholas Katzakis
|
Nicholas Katzakis, Kiyoshi Kiyokawa, Masahiro Hori, Haruo Takemura
|
Plane-Casting: 3D Cursor Control with a SmartPhone
|
Proceedings of "Touching the Third Dimension" (3DCHI), Workshop at
ACM SIGCHI Conference on Human Factors in Computing Systems
|
Proceedings of "The 3rd dimension of CHI (3DCHI): Touching and
designing 3D user interfaces" workshop at ACM SIGCHI Conference on Human
Factors in Computing Systems 2012. Austin, TX. pp 13-21
|
10.1145/2212776.2212698
| null |
cs.HC
|
http://creativecommons.org/licenses/by/4.0/
|
We present Plane-Casting, a novel technique for 3D object manipulation from a
distance that is especially suitable for smartphones. We describe two
variations of Plane-Casting, Pivot and Free Plane-Casting, and present results
from a pilot study. Results suggest that Pivot Plane-Casting is more suitable
for quick, coarse movements whereas Free Plane-Casting is more suited to
slower, precise motion. In a 3D movement task, Pivot Plane-Casting performed
better quantitatively, but subjects preferred Free Plane-Casting overall.
|
[
{
"version": "v1",
"created": "Tue, 16 Jan 2018 02:38:00 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Katzakis",
"Nicholas",
""
],
[
"Kiyokawa",
"Kiyoshi",
""
],
[
"Hori",
"Masahiro",
""
],
[
"Takemura",
"Haruo",
""
]
] |
new_dataset
| 0.999697 |
1801.05114
|
Harinaivo Andriatahiny
|
Harinaivo Andriatahiny, Desir\'e Ars\`ene Ratahirinjatovo, Sanni
Jos\'e Andrianalisefa
|
Generalized Reed-Muller codes over Galois rings
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, Bhaintwal and Wasan studied the Generalized Reed-Muller codes over
the prime power integer residue ring. In this paper, we give a generalization
of these codes to Generalized Reed-Muller codes over Galois rings.
|
[
{
"version": "v1",
"created": "Tue, 16 Jan 2018 04:34:52 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Andriatahiny",
"Harinaivo",
""
],
[
"Ratahirinjatovo",
"Desiré Arsène",
""
],
[
"Andrianalisefa",
"Sanni José",
""
]
] |
new_dataset
| 0.996345 |
1801.05117
|
Jinwei Gu
|
Huaijin Chen, Jinwei Gu, Orazio Gallo, Ming-Yu Liu, Ashok
Veeraraghavan, Jan Kautz
|
Reblur2Deblur: Deblurring Videos via Self-Supervised Learning
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motion blur is a fundamental problem in computer vision as it impacts image
quality and hinders inference. Traditional deblurring algorithms leverage the
physics of the image formation model and use hand-crafted priors: they usually
produce results that better reflect the underlying scene, but present
artifacts. Recent learning-based methods implicitly extract the distribution of
natural images directly from the data and use it to synthesize plausible
images. Their results are impressive, but they are not always faithful to the
content of the latent image. We present an approach that bridges the two. Our
method fine-tunes existing deblurring neural networks in a self-supervised
fashion by enforcing that the output, when blurred based on the optical flow
between subsequent frames, matches the input blurry image. We show that our
method significantly improves the performance of existing methods on several
datasets both visually and in terms of image quality metrics. The supplementary
material is https://goo.gl/nYPjEQ
|
[
{
"version": "v1",
"created": "Tue, 16 Jan 2018 05:02:09 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Chen",
"Huaijin",
""
],
[
"Gu",
"Jinwei",
""
],
[
"Gallo",
"Orazio",
""
],
[
"Liu",
"Ming-Yu",
""
],
[
"Veeraraghavan",
"Ashok",
""
],
[
"Kautz",
"Jan",
""
]
] |
new_dataset
| 0.998404 |
1801.05189
|
Carlos Vela M.Sc.
|
Cristina Fern\'andez-C\'ordoba, Carlos Vela, Merc\`e Villanueva
|
On the Kernel of $\mathbb{Z}_{2^s}$-Linear Hadamard Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The $\mathbb{Z}_{2^s}$-additive codes are subgroups of $\mathbb{Z}^n_{2^s}$,
and can be seen as a generalization of linear codes over $\mathbb{Z}_2$ and
$\mathbb{Z}_4$. A $\mathbb{Z}_{2^s}$-linear Hadamard code is a binary Hadamard
code which is the Gray map image of a $\mathbb{Z}_{2^s}$-additive code. It is
known that the dimension of the kernel can be used to give a complete
classification of the $\mathbb{Z}_4$-linear Hadamard codes. In this paper, the
kernel of $\mathbb{Z}_{2^s}$-linear Hadamard codes and its dimension are
established for $s > 2$. Moreover, we prove that this invariant only provides a
complete classification for some values of $t$ and $s$. The exact amount of
nonequivalent such codes are given up to $t=11$ for any $s\geq 2$, by using
also the rank and, in some cases, further computations.
|
[
{
"version": "v1",
"created": "Tue, 16 Jan 2018 10:08:52 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Fernández-Córdoba",
"Cristina",
""
],
[
"Vela",
"Carlos",
""
],
[
"Villanueva",
"Mercè",
""
]
] |
new_dataset
| 0.998378 |
1801.05230
|
Andrea Romanoni
|
Enrico Piazza and Andrea Romanoni and Matteo Matteucci
|
Real-time CPU-based large-scale 3D mesh reconstruction
|
Accepted for ICRA2018/RA-L
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Robotics, especially in this era of autonomous driving, mapping is one key
ability of a robot to be able to navigate through an environment, localize on
it and analyze its traversability. To allow for real-time execution on
constrained hardware, the map usually estimated by feature-based or semi-dense
SLAM algorithms is a sparse point cloud; a richer and more complete
representation of the environment is desirable. Existing dense mapping
algorithms require extensive use of GPU computing and they hardly scale to
large environments; incremental algorithms from sparse points still represent
an effective solution when light computational effort is needed and big
sequences have to be processed in real-time. In this paper we improved and
extended the state of the art incremental manifold mesh algorithm proposed in
[1] and extended in [2]. While these algorithms do not achieve real-time and
they embed points from SLAM or Structure from Motion only when their position
is fixed, in this paper we propose the first incremental algorithm able to
reconstruct a manifold mesh in real-time through single core CPU processing
which is also able to modify the mesh according to 3D points updates from the
underlying SLAM algorithm. We tested our algorithm against two state of the art
incremental mesh mapping systems on the KITTI dataset, and we showed that,
while accuracy is comparable, our approach is able to reach real-time
performances thanks to an order of magnitude speed-up.
|
[
{
"version": "v1",
"created": "Tue, 16 Jan 2018 12:49:04 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Piazza",
"Enrico",
""
],
[
"Romanoni",
"Andrea",
""
],
[
"Matteucci",
"Matteo",
""
]
] |
new_dataset
| 0.974612 |
1801.05294
|
Farhad Shirani Chaharsooghi
|
Mohsen Heidari, Farhad Shirani, S. Sandeep Pradhan
|
Bounds on the Effective-length of Optimal Codes for Interference Channel
with Feedback
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we investigate the necessity of finite blocklength codes in
distributed transmission of independent message sets over channels with
feedback. Previously, it was shown that finite effective length codes are
necessary in distributed transmission and compression of sources. We provide
two examples of three user interference channels with feedback where codes with
asymptotically large effective lengths are sub-optimal. As a result, we
conclude that coded transmission using finite effective length codes is
necessary to achieve optimality. We argue that the sub-optimal performance of
large effective length codes is due to their inefficiency in preserving the
correlation between the inputs to the distributed terminals in the
communication system. This correlation is made available by the presence of
feedback at the terminals and is used as a means for coordination between the
terminals when using finite effective length coding strategies.
|
[
{
"version": "v1",
"created": "Tue, 16 Jan 2018 15:25:36 GMT"
}
] | 2018-01-17T00:00:00 |
[
[
"Heidari",
"Mohsen",
""
],
[
"Shirani",
"Farhad",
""
],
[
"Pradhan",
"S. Sandeep",
""
]
] |
new_dataset
| 0.959912 |
1707.04019
|
Mohammad Noormohammadpour
|
Mohammad Noormohammadpour, Cauligi S. Raghavendra, Sriram Rao, Asad M.
Madni
|
RCD: Rapid Close to Deadline Scheduling for Datacenter Networks
|
World Automation Congress (WAC), IEEE, 2016
| null |
10.1109/WAC.2016.7582951
| null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Datacenter-based Cloud Computing services provide a flexible, scalable and
yet economical infrastructure to host online services such as multimedia
streaming, email and bulk storage. Many such services perform geo-replication
to provide necessary quality of service and reliability to users resulting in
frequent large inter- datacenter transfers. In order to meet tenant service
level agreements (SLAs), these transfers have to be completed prior to a
deadline. In addition, WAN resources are quite scarce and costly, meaning they
should be fully utilized. Several recently proposed schemes, such as B4,
TEMPUS, and SWAN have focused on improving the utilization of inter-datacenter
transfers through centralized scheduling, however, they fail to provide a
mechanism to guarantee that admitted requests meet their deadlines. Also, in a
recent study, authors propose Amoeba, a system that allows tenants to define
deadlines and guarantees that the specified deadlines are met, however, to
admit new traffic, the proposed system has to modify the allocation of already
admitted transfers. In this paper, we propose Rapid Close to Deadline
Scheduling (RCD), a close to deadline traffic allocation technique that is fast
and efficient. Through simulations, we show that RCD is up to 15 times faster
than Amoeba, provides high link utilization along with deadline guarantees, and
is able to make quick decisions on whether a new request can be fully satisfied
before its deadline.
|
[
{
"version": "v1",
"created": "Thu, 13 Jul 2017 08:09:18 GMT"
}
] | 2018-01-16T00:00:00 |
[
[
"Noormohammadpour",
"Mohammad",
""
],
[
"Raghavendra",
"Cauligi S.",
""
],
[
"Rao",
"Sriram",
""
],
[
"Madni",
"Asad M.",
""
]
] |
new_dataset
| 0.955641 |
1801.01769
|
Suichan Li
|
Suichan Li
|
3D-DETNet: a Single Stage Video-Based Vehicle Detector
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Video-based vehicle detection has received considerable attention over the
last ten years and there are many deep learning based detection methods which
can be applied to it. However, these methods are devised for still images and
applying them for video vehicle detection directly always obtains poor
performance. In this work, we propose a new single-stage video-based vehicle
detector integrated with 3DCovNet and focal loss, called 3D-DETNet. Draw
support from 3D Convolution network and focal loss, our method has ability to
capture motion information and is more suitable to detect vehicle in video than
other single-stage methods devised for static images. The multiple video frames
are initially fed to 3D-DETNet to generate multiple spatial feature maps, then
sub-model 3DConvNet takes spatial feature maps as input to capture temporal
information which is fed to final fully convolution model for predicting
locations of vehicles in video frames. We evaluate our method on UA-DETAC
vehicle detection dataset and our 3D-DETNet yields best performance and keeps a
higher detection speed of 26 fps compared with other competing methods.
|
[
{
"version": "v1",
"created": "Fri, 5 Jan 2018 14:38:14 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Jan 2018 09:06:07 GMT"
}
] | 2018-01-16T00:00:00 |
[
[
"Li",
"Suichan",
""
]
] |
new_dataset
| 0.999279 |
1801.02203
|
Richa Verma
|
Prerna Agarwal, Richa Verma, Angshul Majumdar
|
Indian Regional Movie Dataset for Recommender Systems
|
7 pages, 8 figures, open-source Indian movie rating dataset, metadata
of movies and users
| null | null | null |
cs.IR cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Indian regional movie dataset is the first database of regional Indian
movies, users and their ratings. It consists of movies belonging to 18
different Indian regional languages and metadata of users with varying
demographics. Through this dataset, the diversity of Indian regional cinema and
its huge viewership is captured. We analyze the dataset that contains roughly
10K ratings of 919 users and 2,851 movies using some supervised and
unsupervised collaborative filtering techniques like Probabilistic Matrix
Factorization, Matrix Completion, Blind Compressed Sensing etc. The dataset
consists of metadata information of users like age, occupation, home state and
known languages. It also consists of metadata of movies like genre, language,
release year and cast. India has a wide base of viewers which is evident by the
large number of movies released every year and the huge box-office revenue.
This dataset can be used for designing recommendation systems for Indian users
and regional movies, which do not, yet, exist. The dataset can be downloaded
from \href{https://goo.gl/EmTPv6}{https://goo.gl/EmTPv6}.
|
[
{
"version": "v1",
"created": "Sun, 7 Jan 2018 16:02:35 GMT"
}
] | 2018-01-16T00:00:00 |
[
[
"Agarwal",
"Prerna",
""
],
[
"Verma",
"Richa",
""
],
[
"Majumdar",
"Angshul",
""
]
] |
new_dataset
| 0.999737 |
1801.03794
|
Rajshekhar Bhat Vishweshwar
|
Rajshekhar Vishweshwar Bhat, Mehul Motani and Teng Joon Lim
|
Hybrid NOMA-TDMA for Multiple Access Channels with Non-Ideal Batteries
and Circuit Cost
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a multiple-access channel where the users are powered from
batteries having non-negligible internal resistance. When power is drawn from
the battery, a variable fraction of the power, which is a function of the power
drawn from the battery, is lost across the internal resistance. Hence, the
power delivered to the load is less than the power drawn from the battery. The
users consume a constant power for the circuit operation during transmission
but do not consume any power when not transmitting. In this setting, we obtain
the maximum sum-rates and achievable rate regions under various cases. We show
that, unlike in the ideal battery case, the TDMA (time-division multiple
access) strategy, wherein the users transmit orthogonally in time, may not
always achieve the maximum sum-rate when the internal resistance is non-zero.
The users may need to adopt a hybrid NOMA-TDMA strategy which combines the
features of NOMA (non-orthogonal multiple access) and TDMA, wherein a set of
users are allocated fixed time windows for orthogonal single-user and
non-orthogonal joint transmissions, respectively. We also numerically show that
the maximum achievable rate regions in NOMA and TDMA strategies are contained
within the maximum achievable rate region of the hybrid NOMA-TDMA strategy.
|
[
{
"version": "v1",
"created": "Thu, 11 Jan 2018 14:46:55 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Jan 2018 15:46:44 GMT"
}
] | 2018-01-16T00:00:00 |
[
[
"Bhat",
"Rajshekhar Vishweshwar",
""
],
[
"Motani",
"Mehul",
""
],
[
"Lim",
"Teng Joon",
""
]
] |
new_dataset
| 0.980932 |
1801.04334
|
Xiaosong Wang
|
Xiaosong Wang, Yifan Peng, Le Lu, Zhiyong Lu, Ronald M. Summers
|
TieNet: Text-Image Embedding Network for Common Thorax Disease
Classification and Reporting in Chest X-rays
|
v1: Main paper + supplementary material
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Chest X-rays are one of the most common radiological examinations in daily
clinical routines. Reporting thorax diseases using chest X-rays is often an
entry-level task for radiologist trainees. Yet, reading a chest X-ray image
remains a challenging job for learning-oriented machine intelligence, due to
(1) shortage of large-scale machine-learnable medical image datasets, and (2)
lack of techniques that can mimic the high-level reasoning of human
radiologists that requires years of knowledge accumulation and professional
training. In this paper, we show the clinical free-text radiological reports
can be utilized as a priori knowledge for tackling these two key problems. We
propose a novel Text-Image Embedding network (TieNet) for extracting the
distinctive image and text representations. Multi-level attention models are
integrated into an end-to-end trainable CNN-RNN architecture for highlighting
the meaningful text words and image regions. We first apply TieNet to classify
the chest X-rays by using both image features and text embeddings extracted
from associated reports. The proposed auto-annotation framework achieves high
accuracy (over 0.9 on average in AUCs) in assigning disease labels for our
hand-label evaluation dataset. Furthermore, we transform the TieNet into a
chest X-ray reporting system. It simulates the reporting process and can output
disease classification and a preliminary report together. The classification
results are significantly improved (6% increase on average in AUCs) compared to
the state-of-the-art baseline on an unseen and hand-labeled dataset (OpenI).
|
[
{
"version": "v1",
"created": "Fri, 12 Jan 2018 22:04:30 GMT"
}
] | 2018-01-16T00:00:00 |
[
[
"Wang",
"Xiaosong",
""
],
[
"Peng",
"Yifan",
""
],
[
"Lu",
"Le",
""
],
[
"Lu",
"Zhiyong",
""
],
[
"Summers",
"Ronald M.",
""
]
] |
new_dataset
| 0.995106 |
1801.04372
|
Daoyuan Wu
|
Daoyuan Wu and Yao Cheng and Debin Gao and Yingjiu Li and Robert H.
Deng
|
SCLib: A Practical and Lightweight Defense against Component Hijacking
in Android Applications
|
This is the extended technical report version of our SCLib paper
accepted by ACM CODASPY 2018
(http://www.ycheng.org/codaspy/2018/accepted.html)
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cross-app collaboration via inter-component communication is a fundamental
mechanism on Android. Although it brings the benefits such as functionality
reuse and data sharing, a threat called component hijacking is also introduced.
By hijacking a vulnerable component in victim apps, an attack app can escalate
its privilege for operations originally prohibited. Many prior studies have
been performed to understand and mitigate this issue, but no defense is being
deployed in the wild, largely due to the deployment difficulties and
performance concerns. In this paper we present SCLib, a secure component
library that performs in-app mandatory access control on behalf of app
components. It does not require firmware modification or app repackaging as in
previous works. The library-based nature also makes SCLib more accessible to
app developers, and enables them produce secure components in the first place
over fragmented Android devices. As a proof of concept, we design six mandatory
policies and overcome unique implementation challenges to mitigate attacks
originated from both system weaknesses and common developer mistakes. Our
evaluation using ten high-profile open source apps shows that SCLib can protect
their 35 risky components with negligible code footprint (less than 0.3% stub
code) and nearly no slowdown to normal intra-app communications. The worst-case
performance overhead to stop attacks is about 5%.
|
[
{
"version": "v1",
"created": "Sat, 13 Jan 2018 03:30:33 GMT"
}
] | 2018-01-16T00:00:00 |
[
[
"Wu",
"Daoyuan",
""
],
[
"Cheng",
"Yao",
""
],
[
"Gao",
"Debin",
""
],
[
"Li",
"Yingjiu",
""
],
[
"Deng",
"Robert H.",
""
]
] |
new_dataset
| 0.998884 |
1801.04530
|
Jiannan Zhao
|
Jiannan Zhao, Cheng Hu, Chun Zhang, Zhihua Wang and Shigang Yue
|
A Bio-inspired Collision Detecotr for Small Quadcopter
|
7 pages, 29 figures
| null | null | null |
cs.NE cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sense and avoid capability enables insects to fly versatilely and robustly in
dynamic complex environment. Their biological principles are so practical and
efficient that inspired we human imitating them in our flying machines. In this
paper, we studied a novel bio-inspired collision detector and its application
on a quadcopter. The detector is inspired from LGMD neurons in the locusts, and
modeled into an STM32F407 MCU. Compared to other collision detecting methods
applied on quadcopters, we focused on enhancing the collision selectivity in a
bio-inspired way that can considerably increase the computing efficiency during
an obstacle detecting task even in complex dynamic environment. We designed the
quadcopter's responding operation imminent collisions and tested this
bio-inspired system in an indoor arena. The observed results from the
experiments demonstrated that the LGMD collision detector is feasible to work
as a vision module for the quadcopter's collision avoidance task.
|
[
{
"version": "v1",
"created": "Sun, 14 Jan 2018 09:22:43 GMT"
}
] | 2018-01-16T00:00:00 |
[
[
"Zhao",
"Jiannan",
""
],
[
"Hu",
"Cheng",
""
],
[
"Zhang",
"Chun",
""
],
[
"Wang",
"Zhihua",
""
],
[
"Yue",
"Shigang",
""
]
] |
new_dataset
| 0.997115 |
1801.04619
|
Ryan Webster
|
Ryan Webster
|
Innovative Non-parametric Texture Synthesis via Patch Permutations
| null | null | null | null |
cs.GR
|
http://creativecommons.org/licenses/by/4.0/
|
In this work, we present a non-parametric texture synthesis algorithm capable
of producing plausible images without copying large tiles of the exemplar. We
focus on a simple synthesis algorithm, where we explore two patch match
heuristics; the well known Bidirectional Similarity (BS) measure and a
heuristic that finds near permutations using the solution of an entropy
regularized optimal transport (OT) problem. Innovative synthesis is achieved
with a small patch size, where global plausibility relies on the qualities of
the match. For OT, less entropic regularization also meant near permutations
and more plausible images. We examine the tile maps of the synthesized images,
showing that they are indeed novel superpositions of the input and contain few
or no verbatim copies. Synthesis results are compared to a statistical method,
namely a random convolutional network. We conclude by remarking simple
algorithms using only the input image can synthesize textures decently well and
call for more modest approaches in future algorithm design.
|
[
{
"version": "v1",
"created": "Sun, 14 Jan 2018 22:33:50 GMT"
}
] | 2018-01-16T00:00:00 |
[
[
"Webster",
"Ryan",
""
]
] |
new_dataset
| 0.999095 |
1801.04837
|
Celso Carvalho
|
Eric V. das Neves, Ronaldo N. Martins, Celso B. Carvalho and Edjair
Mota
|
Disseminacao de mensagens DTN com base em grupos de interesses
|
IV Escola Regional de Informatica (ERIN 2017), in Portuguese
|
Eric V. Das Neves, Ronaldo Martins, Celso B. Carvalho and Edjair
Mota. Disseminacao de mensagens DTN com base em grupos de interesses. IV
Escola Regional de Informatica - ERIN, 2017
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent works explore social characteristics of nodes to improve message
delivery rate in Delay Tolerant Networks (DTN). This work uses machine learning
techniques to create node groups organized by common interests. Messages are
sent to target groups, and from there to the final destination. Simulation
results using The ONE simulator show that the larger the group size the higher
the message delivery rate, that reaches 100% in some cases. The paper also
presents results related to the groups of interest such as message delivery
rat, delivery delay and an average number of hops to deliver messages. The
overall results indicate that group-based routing is a promising research
filed.
|
[
{
"version": "v1",
"created": "Wed, 10 Jan 2018 07:36:53 GMT"
}
] | 2018-01-16T00:00:00 |
[
[
"Neves",
"Eric V. das",
""
],
[
"Martins",
"Ronaldo N.",
""
],
[
"Carvalho",
"Celso B.",
""
],
[
"Mota",
"Edjair",
""
]
] |
new_dataset
| 0.96742 |
1606.05519
|
Timm B\"ottger
|
Timm B\"ottger, Felix Cuadrado, Gareth Tyson, Ignacio Castro, Steve
Uhlig
|
Open Connect Everywhere: A Glimpse at the Internet Ecosystem through the
Lens of the Netflix CDN
| null |
B\"ottger, T., Cuadrado, F., Tyson, G., Castro, I., Uhlig, S..
(2018). "Open Connect Everywhere: A Glimpse at the Internet Ecosystem Through
the Lens of the Netflix CDN". In ACM SIGCOMM Computer Communications Review
(CCR), 48(1)
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The importance of IXPs to interconnect different networks and exchange
traffic locally has been well studied over the last few years. However, far
less is known about the role IXPs play as a platform to enable large-scale
content delivery and to reach a world-wide customer base. In this paper, we
study the infrastructure deployment of a content hypergiant, Netflix, and show
that the combined worldwide IXP substrate is the major corner stone of its
Content Delivery Network. To meet its worldwide demand for high-quality video
delivery, Netflix has built a dedicated CDN. Its scale allows us to study a
major part of the Internet ecosystem, by observing how Netflix takes advantage
of the combined capabilities of IXPs and ISPs present in different regions. We
find wide disparities in the regional Netflix deployment and traffic levels at
IXPs and ISPs across various local ecosystems. This highlights the complexity
of large-scale content delivery as well as differences in the capabilities of
IXPs in specific regions. On a global scale we find that the footprint provided
by IXPs allows Netflix to deliver most of its traffic directly from them. This
highlights the additional role that IXPs play in the Internet ecosystem, not
just in terms of interconnection, but also allowing players such as Netflix to
deliver significant amounts of traffic.
|
[
{
"version": "v1",
"created": "Fri, 17 Jun 2016 13:26:23 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Aug 2017 14:03:50 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Jan 2018 11:15:35 GMT"
}
] | 2018-01-15T00:00:00 |
[
[
"Böttger",
"Timm",
""
],
[
"Cuadrado",
"Felix",
""
],
[
"Tyson",
"Gareth",
""
],
[
"Castro",
"Ignacio",
""
],
[
"Uhlig",
"Steve",
""
]
] |
new_dataset
| 0.985732 |
1712.09915
|
Mario Michael Krell
|
Mario Michael Krell, Julia Bernd, Yifan Li, Daniel Ma, Jaeyoung Choi,
Michael Ellsworth, Damian Borth, Gerald Friedland
|
Field Studies with Multimedia Big Data: Opportunities and Challenges
(Extended Version)
| null | null | null |
TR-17-002
|
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social multimedia users are increasingly sharing all kinds of data about the
world. They do this for their own reasons, not to provide data for field
studies-but the trend presents a great opportunity for scientists. The Yahoo
Flickr Creative Commons 100 Million (YFCC100M) dataset comprises 99 million
images and nearly 800 thousand videos from Flickr, all shared under Creative
Commons licenses. To enable scientists to leverage these media records for
field studies, we propose a new framework that extracts targeted subcorpora
from the YFCC100M, in a format usable by researchers who are not experts in big
data retrieval and processing.
This paper discusses a number of examples from the literature-as well as some
entirely new ideas-of natural and social science field studies that could be
piloted, supplemented, replicated, or conducted using YFCC100M data. These
examples illustrate the need for a general new open-source framework for
Multimedia Big Data Field Studies. There is currently a gap between the
separate aspects of what multimedia researchers have shown to be possible with
consumer-produced big data and the follow-through of creating a comprehensive
field study framework that supports scientists across other disciplines.
To bridge this gap, we must meet several challenges. For example, the
framework must handle unlabeled and noisily labeled data to produce a filtered
dataset for a scientist-who naturally wants it to be both as large and as clean
as possible. This requires an iterative approach that provides access to
statistical summaries and refines the search by constructing new classifiers.
The first phase of our framework is available as Multimedia Commons Search, an
intuitive interface that enables complex search queries at a large scale...
|
[
{
"version": "v1",
"created": "Thu, 28 Dec 2017 16:17:43 GMT"
}
] | 2018-01-15T00:00:00 |
[
[
"Krell",
"Mario Michael",
""
],
[
"Bernd",
"Julia",
""
],
[
"Li",
"Yifan",
""
],
[
"Ma",
"Daniel",
""
],
[
"Choi",
"Jaeyoung",
""
],
[
"Ellsworth",
"Michael",
""
],
[
"Borth",
"Damian",
""
],
[
"Friedland",
"Gerald",
""
]
] |
new_dataset
| 0.982112 |
1801.04017
|
David Kernot
|
David Kernot, Terry Bossomaier, Roger Bradbury
|
Did William Shakespeare and Thomas Kyd Write Edward III?
|
13 pages, 5 Figures, 3 Tables
|
International Journal on Natural Language Computing (IJNLC) Vol.6,
No.6, December 2017
|
10.5121/ijnlc.2017.6601
| null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
William Shakespeare is believed to be a significant author in the anonymous
play, The Reign of King Edward III, published in 1596. However, recently,
Thomas Kyd, has been suggested as the primary author. Using a neurolinguistics
approach to authorship identification we use a four-feature technique, RPAS, to
convert the 19 scenes in Edward III into a multi-dimensional vector. Three
complementary analytical techniques are applied to cluster the data and reduce
single technique bias before an alternate method, seriation, is used to measure
the distances between clusters and test the strength of the connections. We
find the multivariate techniques robust and are able to allocate up to 14
scenes to Thomas Kyd, and further question if scenes long believed to be
Shakespeare's are not his.
|
[
{
"version": "v1",
"created": "Thu, 11 Jan 2018 23:40:39 GMT"
}
] | 2018-01-15T00:00:00 |
[
[
"Kernot",
"David",
""
],
[
"Bossomaier",
"Terry",
""
],
[
"Bradbury",
"Roger",
""
]
] |
new_dataset
| 0.979938 |
1801.04035
|
He Zhu
|
He Zhu and Changcheng Huang and Jiayu Zhou
|
EdgeChain: Blockchain-based Multi-vendor Mobile Edge Application
Placement
|
9 pages, 7 figures, conference
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The state-of-the-art mobile edge applications are generating intense traffic
and posing rigorous latency requirements to service providers. While resource
sharing across multiple service providers can be a way to maximize the
utilization of limited resources at the network edge, it requires a centralized
repository maintained by all parties for service providers to share status.
Moreover, service providers have to trust each other for resource allocation
fairness, which is difficult because of potential conflicts of interest. We
propose EdgeChain, a blockchain-based architecture to make mobile edge
application placement decisions for multiple service providers. We first
formulate a stochastic programming problem minimizing the placement cost for
mobile edge application placement scenarios. Based on our model, we present a
heuristic mobile edge application placement algorithm. As a decentralized
public ledger, the blockchain then takes the logic of our algorithm as the
smart contract, with the consideration of resources from all mobile edge hosts
participating in the system. The algorithm is agreed by all parties and the
results will only be accepted by majority of the mining nodes on the
blockchain. When a placement decision is made, an edge host meeting the
consumer's latency and budget requirements will be selected at the lowest cost.
All placement transactions are stored on the blockchain and are traceable by
every mobile edge service provider and application vendor who consumes
resources at the mobile edge.
|
[
{
"version": "v1",
"created": "Fri, 12 Jan 2018 01:50:57 GMT"
}
] | 2018-01-15T00:00:00 |
[
[
"Zhu",
"He",
""
],
[
"Huang",
"Changcheng",
""
],
[
"Zhou",
"Jiayu",
""
]
] |
new_dataset
| 0.994425 |
1801.03578
|
Afshin Zafari
|
Afshin Zafari, Elisabeth Larsson, Martin Tillenius
|
DuctTeip: An efficient programming model for distributed task based
parallel computing
| null | null | null | null |
cs.DC cs.CE cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current high-performance computer systems used for scientific computing
typically combine shared memory computational nodes in a distributed memory
environment. Extracting high performance from these complex systems requires
tailored approaches. Task based parallel programming has been successful both
in simplifying the programming and in exploiting the available hardware
parallelism for shared memory systems. In this paper we focus on how to extend
task parallel programming to distributed memory systems. We use a hierarchical
decomposition of tasks and data in order to accommodate the different levels of
hardware. We test the proposed programming model on two different applications,
a Cholesky factorization, and a solver for the Shallow Water Equations. We also
compare the performance of our implementation with that of other frameworks for
distributed task parallel programming, and show that it is competitive.
|
[
{
"version": "v1",
"created": "Wed, 10 Jan 2018 22:50:01 GMT"
}
] | 2018-01-14T00:00:00 |
[
[
"Zafari",
"Afshin",
""
],
[
"Larsson",
"Elisabeth",
""
],
[
"Tillenius",
"Martin",
""
]
] |
new_dataset
| 0.97486 |
1710.07148
|
Lars Jaffke
|
Lars Jaffke, O-joung Kwon, Jan Arne Telle
|
A unified polynomial-time algorithm for Feedback Vertex Set on graphs of
bounded mim-width
|
26 pages, 3 figures; accepted at STACS 2018
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a first polynomial-time algorithm for (Weighted) Feedback Vertex Set
on graphs of bounded maximum induced matching width (mim-width). Explicitly,
given a branch decomposition of mim-width $w$, we give an
$n^{\mathcal{O}(w)}$-time algorithm that solves Feedback Vertex Set. This
provides a unified algorithm for many well-known classes, such as Interval
graphs and Permutation graphs, and furthermore, it gives the first
polynomial-time algorithms for other classes of bounded mim-width, such as
Circular Permutation and Circular $k$-Trapezoid graphs for fixed $k$. In all
these classes the decomposition is computable in polynomial time, as shown by
Belmonte and Vatshelle [Theor. Comput. Sci. 2013]. We show that powers of
graphs of tree-width $w - 1$ or path-width $w$ and powers of graphs of
clique-width $w$ have mim-width at most $w$. These results extensively provide
new classes of bounded mim-width. We prove a slight strengthening of the first
statement which implies that, surprisingly, Leaf Power graphs which are of
importance in the field of phylogenetic studies have mim-width at most $1$.
Given a tree decomposition of width $w-1$, a path decomposition of width $w$,
or a clique-width $w$-expression of a graph, one can for any value of $k$ find
a mim-width decomposition of its $k$-power in polynomial time, and apply our
algorithm to solve Feedback Vertex Set on the $k$-power in time
$n^{\mathcal{O}(w)}$. In contrast to Feedback Vertex Set, we show that
Hamiltonian Cycle is NP-complete even on graphs of linear mim-width $1$, which
further hints at the expressive power of the mim-width parameter.
|
[
{
"version": "v1",
"created": "Thu, 19 Oct 2017 14:01:09 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2018 10:59:10 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Jaffke",
"Lars",
""
],
[
"Kwon",
"O-joung",
""
],
[
"Telle",
"Jan Arne",
""
]
] |
new_dataset
| 0.998624 |
1712.09282
|
Harishchandra Dubey
|
Rabindra K. Barik and Rakesh K. Lenka and N.V.R. Simha and
Harishchandra Dubey and Kunal Mankodiya
|
Fog Computing based SDI Framework for Mineral Resources Information
Infrastructure Management in India
|
5 pages
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spatial Data Infrastructure (SDI) is an important concept for sharing spatial
data across the web. With cumulative techniques with spatial cloud computing
and fog computing, SDI has the greater potential and has been emerged as a tool
for processing, analysis and transmission of spatial data. The Fog computing is
a paradigm where Fog devices help to increase throughput and reduce latency at
the edge of the client with respect to cloud computing environment. This paper
proposed and developed a fog computing based SDI framework for mining analytics
from spatial big data for mineral resources management in India. We built a
prototype using Raspberry Pi, an embedded microprocessor. We validated by
taking suitable case study of mineral resources management in India by doing
preliminary analysis including overlay analysis. Results showed that fog
computing hold a great promise for analysis of spatial data. We used open
source GIS i.e. QGIS and QIS plugin for reducing the transmission to cloud from
the fog node.
|
[
{
"version": "v1",
"created": "Tue, 26 Dec 2017 15:16:19 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2018 18:16:06 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Barik",
"Rabindra K.",
""
],
[
"Lenka",
"Rakesh K.",
""
],
[
"Simha",
"N. V. R.",
""
],
[
"Dubey",
"Harishchandra",
""
],
[
"Mankodiya",
"Kunal",
""
]
] |
new_dataset
| 0.974149 |
1801.03406
|
Tanya Piplani
|
Tanya Piplani, David Bamman
|
DeepSeek: Content Based Image Search & Retrieval
|
arXiv admin note: text overlap with arXiv:1706.06064 by other authors
| null | null | null |
cs.IR
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Most of the internet today is composed of digital media that includes videos
and images. With pixels becoming the currency in which most transactions happen
on the internet, it is becoming increasingly important to have a way of
browsing through this ocean of information with relative ease. YouTube has 400
hours of video uploaded every minute and many million images are browsed on
Instagram, Facebook, etc. Inspired by recent advances in the field of deep
learning and success that it has gained on various problems like image
captioning and, machine translation , word2vec , skip thoughts, etc, we present
DeepSeek a natural language processing based deep learning model that allows
users to enter a description of the kind of images that they want to search,
and in response the system retrieves all the images that semantically and
contextually relate to the query. Two approaches are described in the following
sections.
|
[
{
"version": "v1",
"created": "Tue, 9 Jan 2018 09:57:40 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Jan 2018 06:28:44 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Piplani",
"Tanya",
""
],
[
"Bamman",
"David",
""
]
] |
new_dataset
| 0.99949 |
1801.03529
|
Safeeullah Soomro
|
Nareena Soomro and Safeeullah Soomro
|
Autism Children's App using PECS
|
Volume 2 Number 1
|
Annals of Emerging Technologies in Computing (AETiC) , 2018
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Since autistic children suffers from learning disabilities and communication
barriers, this research aim to design, develop and evaluate an Android based
mobile application (app) providing better learning environment with inclusion
of graphical representation in a cost effective manner. This research evaluate
various supporting technologies and finds Picture Exchange Communication System
(PECS) to be better choice for integrating with the app. Evaluation results
reveal that the inclusion of PECS helped the children suffering from Autistic
Spectrum Disorder (ASD) to better communicate with others. The study included
autistic children who do not speak, who are unintelligible and who are
minimally effective communicators with their present communication system. The
evolution results showed encouraging impacts of the Autism App in supporting
autistic children to adapt to normal life and improve the standard of their
life.
|
[
{
"version": "v1",
"created": "Tue, 9 Jan 2018 09:48:20 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Soomro",
"Nareena",
""
],
[
"Soomro",
"Safeeullah",
""
]
] |
new_dataset
| 0.990652 |
1801.03551
|
Farnoosh Ghadiri
|
Farnoosh Ghadiri, Robert Bergevin, Guillaume-Alexandre Bilodeau
|
From Superpixel to Human Shape Modelling for Carried Object Detection
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Detecting carried objects is one of the requirements for developing systems
to reason about activities involving people and objects. We present an approach
to detect carried objects from a single video frame with a novel method that
incorporates features from multiple scales. Initially, a foreground mask in a
video frame is segmented into multi-scale superpixels. Then the human-like
regions in the segmented area are identified by matching a set of extracted
features from superpixels against learned features in a codebook. A carried
object probability map is generated using the complement of the matching
probabilities of superpixels to human-like regions and background information.
A group of superpixels with high carried object probability and strong edge
support is then merged to obtain the shape of the carried object. We applied
our method to two challenging datasets, and results show that our method is
competitive with or better than the state-of-the-art.
|
[
{
"version": "v1",
"created": "Wed, 10 Jan 2018 21:07:13 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Ghadiri",
"Farnoosh",
""
],
[
"Bergevin",
"Robert",
""
],
[
"Bilodeau",
"Guillaume-Alexandre",
""
]
] |
new_dataset
| 0.987123 |
1801.03604
|
Chandra Khatri
|
Ashwin Ram, Rohit Prasad, Chandra Khatri, Anu Venkatesh, Raefer
Gabriel, Qing Liu, Jeff Nunn, Behnam Hedayatnia, Ming Cheng, Ashish Nagar,
Eric King, Kate Bland, Amanda Wartick, Yi Pan, Han Song, Sk Jayadevan, Gene
Hwang, Art Pettigrue
|
Conversational AI: The Science Behind the Alexa Prize
|
18 pages, 5 figures, Alexa Prize Proceedings Paper
(https://developer.amazon.com/alexaprize/proceedings), Alexa Prize University
Competition to advance Conversational AI
|
Alexa.Prize.Proceedings
https://developer.amazon.com/alexaprize/proceedings accessed (2018)-01-01
| null | null |
cs.AI cs.CL cs.CY cs.HC cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Conversational agents are exploding in popularity. However, much work remains
in the area of social conversation as well as free-form conversation over a
broad range of domains and topics. To advance the state of the art in
conversational AI, Amazon launched the Alexa Prize, a 2.5-million-dollar
university competition where sixteen selected university teams were challenged
to build conversational agents, known as socialbots, to converse coherently and
engagingly with humans on popular topics such as Sports, Politics,
Entertainment, Fashion and Technology for 20 minutes. The Alexa Prize offers
the academic community a unique opportunity to perform research with a live
system used by millions of users. The competition provided university teams
with real user conversational data at scale, along with the user-provided
ratings and feedback augmented with annotations by the Alexa team. This enabled
teams to effectively iterate and make improvements throughout the competition
while being evaluated in real-time through live user interactions. To build
their socialbots, university teams combined state-of-the-art techniques with
novel strategies in the areas of Natural Language Understanding, Context
Modeling, Dialog Management, Response Generation, and Knowledge Acquisition. To
support the efforts of participating teams, the Alexa Prize team made
significant scientific and engineering investments to build and improve
Conversational Speech Recognition, Topic Tracking, Dialog Evaluation, Voice
User Experience, and tools for traffic management and scalability. This paper
outlines the advances created by the university teams as well as the Alexa
Prize team to achieve the common goal of solving the problem of Conversational
AI.
|
[
{
"version": "v1",
"created": "Thu, 11 Jan 2018 01:23:50 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Ram",
"Ashwin",
""
],
[
"Prasad",
"Rohit",
""
],
[
"Khatri",
"Chandra",
""
],
[
"Venkatesh",
"Anu",
""
],
[
"Gabriel",
"Raefer",
""
],
[
"Liu",
"Qing",
""
],
[
"Nunn",
"Jeff",
""
],
[
"Hedayatnia",
"Behnam",
""
],
[
"Cheng",
"Ming",
""
],
[
"Nagar",
"Ashish",
""
],
[
"King",
"Eric",
""
],
[
"Bland",
"Kate",
""
],
[
"Wartick",
"Amanda",
""
],
[
"Pan",
"Yi",
""
],
[
"Song",
"Han",
""
],
[
"Jayadevan",
"Sk",
""
],
[
"Hwang",
"Gene",
""
],
[
"Pettigrue",
"Art",
""
]
] |
new_dataset
| 0.984963 |
1801.03616
|
Huazi Zhang
|
Huazi Zhang, Rong Li, Jian Wang, Shengchen Dai, Gongzheng Zhang, Ying
Chen, Hejia Luo, Jun Wang
|
Parity-Check Polar Coding for 5G and Beyond
|
The work was first disclosed in 2016 as a technical contribution to
3GPP and accepted by IEEE ICC 2018. Part of the proposed design has been
adopted by 3GPP as the Polar coding standards for 5G
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a comprehensive Polar coding solution that
integrates reliability calculation, rate matching and parity-check coding.
Judging a channel coding design from the industry's viewpoint, there are two
primary concerns: (i) low-complexity implementation in application-specific
integrated circuit (ASIC), and (ii) superior \& stable performance under a wide
range of code lengths and rates. The former provides cost- \& power-efficiency
which are vital to any commercial system; the latter ensures flexible and
robust services. Our design respects both criteria. It demonstrates better
performance than existing schemes in literature, but requires only a fraction
of implementation cost. With easily-reproducible code construction for
arbitrary code rates and lengths, we are able to report "1-bit"
fine-granularity simulation results for thousands of cases. The released
results can serve as a baseline for future optimization of Polar codes.
|
[
{
"version": "v1",
"created": "Thu, 11 Jan 2018 02:37:13 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Zhang",
"Huazi",
""
],
[
"Li",
"Rong",
""
],
[
"Wang",
"Jian",
""
],
[
"Dai",
"Shengchen",
""
],
[
"Zhang",
"Gongzheng",
""
],
[
"Chen",
"Ying",
""
],
[
"Luo",
"Hejia",
""
],
[
"Wang",
"Jun",
""
]
] |
new_dataset
| 0.975824 |
1801.03623
|
Chen Yuan
|
Yuan Luo and Chaoping Xing and Chen Yuan
|
Optimal locally repairable codes of distance $3$ and $4$ via cyclic
codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Like classical block codes, a locally repairable code also obeys the
Singleton-type bound (we call a locally repairable code {\it optimal} if it
achieves the Singleton-type bound). In the breakthrough work of \cite{TB14},
several classes of optimal locally repairable codes were constructed via
subcodes of Reed-Solomon codes. Thus, the lengths of the codes given in
\cite{TB14} are upper bounded by the code alphabet size $q$. Recently, it was
proved through extension of construction in \cite{TB14} that length of $q$-ary
optimal locally repairable codes can be $q+1$ in \cite{JMX17}. Surprisingly,
\cite{BHHMV16} presented a few examples of $q$-ary optimal locally repairable
codes of small distance and locality with code length achieving roughly $q^2$.
Very recently, it was further shown in \cite{LMX17} that there exist $q$-ary
optimal locally repairable codes with length bigger than $q+1$ and distance
propositional to $n$.
Thus, it becomes an interesting and challenging problem to construct new
families of $q$-ary optimal locally repairable codes of length bigger than
$q+1$.
In this paper, we construct a class of optimal locally repairable codes of
distance $3$ and $4$ with unbounded length (i.e., length of the codes is
independent of the code alphabet size). Our technique is through cyclic codes
with particular generator and parity-check polynomials that are carefully
chosen.
|
[
{
"version": "v1",
"created": "Thu, 11 Jan 2018 03:26:40 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Luo",
"Yuan",
""
],
[
"Xing",
"Chaoping",
""
],
[
"Yuan",
"Chen",
""
]
] |
new_dataset
| 0.999123 |
1801.03695
|
Sergi Abadal
|
Sergi Abadal, Seyed E. Hosseininejad, Albert Cabellos-Aparicio, Eduard
Alarc\'on
|
Graphene-Based terahertz antennas for area-constrained applications
| null |
S. Abadal, S. E. Hosseininejad, A. Cabellos-Aparicio and E.
Alarc\'on, "Graphene-Based terahertz antennas for area-constrained
applications," Proceedings of the TSP '17, Barcelona, 2017, pp. 817-820
|
10.1109/TSP.2017.8076102
| null |
cs.ET physics.app-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Terahertz technology has made significant advances in the fields of
spectroscopy, imaging and, more recently, wireless communications. In the
latter, the use of this frequency band between 0.1 and 10 THz becomes extremely
attractive due to the abundance of bandwidth and the potential for low area and
power footprints, yet challenging given the large propagation losses and the
lack of mature devices and circuits for terahertz operation. Maturity issues
aside, this combination of features renders terahertz wireless communications
desirable for highly integrated applications where area may be a decisive
metric.
|
[
{
"version": "v1",
"created": "Thu, 11 Jan 2018 10:10:55 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Abadal",
"Sergi",
""
],
[
"Hosseininejad",
"Seyed E.",
""
],
[
"Cabellos-Aparicio",
"Albert",
""
],
[
"Alarcón",
"Eduard",
""
]
] |
new_dataset
| 0.9983 |
1801.03834
|
Sergi Abadal
|
Seyed E. Hosseininejad, Mohammad Neshat, Reza Faraji-Dana, Sergi
Abadal, Max C. Lemme, Peter Haring Bol\'ivar, Eduard Alarc\'on and Albert
Cabellos-Aparicio
|
Terahertz Dielectric Resonator Antenna Coupled to Graphene Plasmonic
Dipole
|
Accepted for presentation at EuCAP 2018
| null | null | null |
cs.ET physics.app-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an efficient approach for exciting a dielectric resonator
antenna (DRA) in the terahertz frequencies by means of a graphene plasmonic
dipole. Design and analysis are performed in two steps. First, the propagation
properties of hybrid plasmonic onedimensional and two-dimensional structures
are obtained by using transfer matrix theory and the finite-element method. The
coupling amount between the plasmonic graphene mode and the dielectric wave
mode is explored based on different parameters. These results, together with
DRA and plasmonic antenna theory, are then used to design a DRA antenna that
supports the $TE_{y}^{112}$ mode at 2.4 THz and achieves a gain (IEEE) of up to
7 dBi and a radiation efficiency of up 70%. This gain is 6.5 dB higher than
that of the graphene dipole alone and achieved with a moderate area overhead,
demonstrating the value of the proposed structure.
|
[
{
"version": "v1",
"created": "Thu, 11 Jan 2018 15:56:54 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Hosseininejad",
"Seyed E.",
""
],
[
"Neshat",
"Mohammad",
""
],
[
"Faraji-Dana",
"Reza",
""
],
[
"Abadal",
"Sergi",
""
],
[
"Lemme",
"Max C.",
""
],
[
"Bolívar",
"Peter Haring",
""
],
[
"Alarcón",
"Eduard",
""
],
[
"Cabellos-Aparicio",
"Albert",
""
]
] |
new_dataset
| 0.991739 |
1801.03895
|
Lakshmi Natarajan Dr
|
Lakshmi Natarajan and Prasad Krishnan and V. Lalitha
|
On Locally Decodable Index Codes
|
10 pages, 1 figure
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Index coding achieves bandwidth savings by jointly encoding the messages
demanded by all the clients in a broadcast channel. The encoding is performed
in such a way that each client can retrieve its demanded message from its side
information and the broadcast codeword. In general, in order to decode its
demanded message symbol, a receiver may have to observe the entire transmitted
codeword. Querying or downloading the codeword symbols might involve costs to a
client -- such as network utilization costs and storage requirements for the
queried symbols to perform decoding. In traditional index coding solutions,
this 'client aware' perspective is not considered during code design. As a
result, for these codes, the number of codeword symbols queried by a client per
decoded message symbol, which we refer to as 'locality', could be large. In
this paper, considering locality as a cost parameter, we view index coding as a
trade-off between the achievable broadcast rate (codeword length normalized by
the message length) and locality, where the objective is to minimize the
broadcast rate for a given value of locality and vice versa. We show that the
smallest possible locality for any index coding problem is 1, and that the
optimal index coding solution with locality 1 is the coding scheme based on
fractional coloring of the interference graph. We propose index coding schemes
with small locality by covering the side information graph using acyclic
subgraphs and subgraphs with small minrank. We also show how locality can be
accounted for in conventional partition multicast and cycle covering solutions
to index coding. Finally, applying these new techniques, we characterize the
locality-broadcast rate trade-off of the index coding problem whose side
information graph is the directed 3-cycle.
|
[
{
"version": "v1",
"created": "Thu, 11 Jan 2018 17:41:25 GMT"
}
] | 2018-01-12T00:00:00 |
[
[
"Natarajan",
"Lakshmi",
""
],
[
"Krishnan",
"Prasad",
""
],
[
"Lalitha",
"V.",
""
]
] |
new_dataset
| 0.998131 |
1704.01306
|
Sven M\"uelich
|
Sven M\"uelich and Sven Puchinger and Martin Bossert
|
Using Convolutional Codes for Key Extraction in SRAM Physical Unclonable
Functions
|
Submitted to "Workshop on Trustworthy Manufacturing and Utilization
of Secure Devices (TRUDEVICE 2018)"
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Physical Unclonable Functions (PUFs) exploit variations in the manufacturing
process to derive bit sequences from integrated circuits, which can be used as
secure cryptographic keys. Instead of storing the keys in an insecure,
non-volatile memory, they can be reproduced when needed. Since the reproduced
sequences are not stable due to physical reasons, error correction must be
applied. Recently, convolutional codes were shown to be suitable for key
reproduction in PUFs based on SRAM. This work shows how to further decrease the
reconstruction failure probability and PUF implementation size using codes with
larger memory length and decoding concepts such as soft-information and list
decoding.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2017 08:23:18 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jan 2018 15:00:23 GMT"
}
] | 2018-01-11T00:00:00 |
[
[
"Müelich",
"Sven",
""
],
[
"Puchinger",
"Sven",
""
],
[
"Bossert",
"Martin",
""
]
] |
new_dataset
| 0.999466 |
1710.00888
|
Jose Berengueres Ph.D
|
Jose Berengueres and Dani Castro
|
Sentiment Perception of Readers and Writers in Emoji use
|
8 pages, 17 figures
| null | null | null |
cs.IR cs.CL cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Previous research has traditionally analyzed emoji sentiment from the point
of view of the reader of the content not the author. Here, we analyze emoji
sentiment from the point of view of the author and present a emoji sentiment
benchmark that was built from an employee happiness dataset where emoji happen
to be annotated with daily happiness of the author of the comment. The data
spans over 3 years, and 4k employees of 56 companies based in Barcelona. We
compare sentiment of writers to readers. Results indicate that, there is an 82%
agreement in how emoji sentiment is perceived by readers and writers. Finally,
we report that when authors use emoji they report higher levels of happiness.
Emoji use was not found to be correlated with differences in author moodiness.
|
[
{
"version": "v1",
"created": "Mon, 2 Oct 2017 20:07:18 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jan 2018 23:26:06 GMT"
}
] | 2018-01-11T00:00:00 |
[
[
"Berengueres",
"Jose",
""
],
[
"Castro",
"Dani",
""
]
] |
new_dataset
| 0.999741 |
1711.04213
|
Albert Cheu
|
Albert Cheu, Ravi Sundaram, Jonathan Ullman
|
Skyline Identification in Multi-Armed Bandits
|
18 pages, 2 Figures; an ALT'18/ISIT'18 submission
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a variant of the classical PAC multi-armed bandit problem. There
is an ordered set of $n$ arms $A[1],\dots,A[n]$, each with some stochastic
reward drawn from some unknown bounded distribution. The goal is to identify
the $skyline$ of the set $A$, consisting of all arms $A[i]$ such that $A[i]$
has larger expected reward than all lower-numbered arms $A[1],\dots,A[i-1]$. We
define a natural notion of an $\varepsilon$-approximate skyline and prove
matching upper and lower bounds for identifying an $\varepsilon$-skyline.
Specifically, we show that in order to identify an $\varepsilon$-skyline from
among $n$ arms with probability $1-\delta$, $$
\Theta\bigg(\frac{n}{\varepsilon^2} \cdot \min\bigg\{
\log\bigg(\frac{1}{\varepsilon \delta}\bigg), \log\bigg(\frac{n}{\delta}\bigg)
\bigg\} \bigg) $$ samples are necessary and sufficient. When $\varepsilon \gg
1/n$, our results improve over the naive algorithm, which draws enough samples
to approximate the expected reward of every arm; the algorithm of (Auer et al.,
AISTATS'16) for Pareto-optimal arm identification is likewise superseded. Our
results show that the sample complexity of the skyline problem lies strictly in
between that of best arm identification (Even-Dar et al., COLT'02) and that of
approximating the expected reward of every arm.
|
[
{
"version": "v1",
"created": "Sun, 12 Nov 2017 00:35:02 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jan 2018 19:05:10 GMT"
}
] | 2018-01-11T00:00:00 |
[
[
"Cheu",
"Albert",
""
],
[
"Sundaram",
"Ravi",
""
],
[
"Ullman",
"Jonathan",
""
]
] |
new_dataset
| 0.995631 |
1801.00947
|
Sha Hu
|
Sha Hu, Fredrik Rusek
|
Modulus Zero-Forcing Detection for MIMO Channels
|
Submitted; 4 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a modulus based zero-forcing (MZF) detection for multi-input
multi-output (MIMO) channels. Traditionally, a ZF detector nulls out all
interferences from other layers when detecting a current layer, which can yield
suboptimal detection-performance due to the noise-enhancement issue. In many
communication systems, finite alphabets such as M
quadrature-amplitude-modulation (QAM) are widely used, which comprises \sqrt{M}
pulse-amplitude-modulation (PAM) symbols for the real and imaginary parts. With
finite alphabets, one feasible way to improve ZF detection is to allow
controllable interferences that can be removed away by modulus operations.
|
[
{
"version": "v1",
"created": "Wed, 3 Jan 2018 10:17:46 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jan 2018 13:05:51 GMT"
}
] | 2018-01-11T00:00:00 |
[
[
"Hu",
"Sha",
""
],
[
"Rusek",
"Fredrik",
""
]
] |
new_dataset
| 0.994668 |
1801.02668
|
Ting-Hao Huang
|
Ting-Hao 'Kenneth' Huang and Joseph Chee Chang and Jeffrey P. Bigham
|
Evorus: A Crowd-powered Conversational Assistant Built to Automate
Itself Over Time
|
10 pages. To appear in the Proceedings of the Conference on Human
Factors in Computing Systems 2018 (CHI'18)
| null |
10.1145/3173574.3173869
| null |
cs.HC cs.AI cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Crowd-powered conversational assistants have been shown to be more robust
than automated systems, but do so at the cost of higher response latency and
monetary costs. A promising direction is to combine the two approaches for high
quality, low latency, and low cost solutions. In this paper, we introduce
Evorus, a crowd-powered conversational assistant built to automate itself over
time by (i) allowing new chatbots to be easily integrated to automate more
scenarios, (ii) reusing prior crowd answers, and (iii) learning to
automatically approve response candidates. Our 5-month-long deployment with 80
participants and 281 conversations shows that Evorus can automate itself
without compromising conversation quality. Crowd-AI architectures have long
been proposed as a way to reduce cost and latency for crowd-powered systems;
Evorus demonstrates how automation can be introduced successfully in a deployed
system. Its architecture allows future researchers to make further innovation
on the underlying automated components in the context of a deployed open domain
dialog system.
|
[
{
"version": "v1",
"created": "Mon, 8 Jan 2018 20:07:35 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jan 2018 03:49:24 GMT"
}
] | 2018-01-11T00:00:00 |
[
[
"Huang",
"Ting-Hao 'Kenneth'",
""
],
[
"Chang",
"Joseph Chee",
""
],
[
"Bigham",
"Jeffrey P.",
""
]
] |
new_dataset
| 0.998301 |
1801.02875
|
Jun Muramatsu
|
Jun Muramatsu and Shigeki Miyake
|
Multi-Terminal Codes Using Constrained-Random-Number Generators
|
14 pages. This is the extended version of the paper submitted to
ISIT2018. (v2) minor change
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A general multi-terminal source code and a general multi-terminal channel
code are presented. Constrained-random-number generators with sparse matrices,
which are building blocks for the code construction, are used in the
construction of both encoders and decoders. Achievable regions for source
coding and channel coding are derived in terms of entropy functions, where the
capacity region for channel coding provides an alternative to the region of
[Somekh-Baruch and Verd\'u, ISIT2006].
|
[
{
"version": "v1",
"created": "Tue, 9 Jan 2018 10:47:23 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jan 2018 08:43:17 GMT"
}
] | 2018-01-11T00:00:00 |
[
[
"Muramatsu",
"Jun",
""
],
[
"Miyake",
"Shigeki",
""
]
] |
new_dataset
| 0.998456 |
1801.03431
|
Maxime Lafarge
|
Maxime W. Lafarge, Josien P.W. Pluim, Koen A.J. Eppenhof, Pim
Moeskops, Mitko Veta
|
Inferring a Third Spatial Dimension from 2D Histological Images
|
IEEE International Symposium on Biomedical Imaging (ISBI), 2018
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Histological images are obtained by transmitting light through a tissue
specimen that has been stained in order to produce contrast. This process
results in 2D images of the specimen that has a three-dimensional structure. In
this paper, we propose a method to infer how the stains are distributed in the
direction perpendicular to the surface of the slide for a given 2D image in
order to obtain a 3D representation of the tissue. This inference is achieved
by decomposition of the staining concentration maps under constraints that
ensure realistic decomposition and reconstruction of the original 2D images.
Our study shows that it is possible to generate realistic 3D images making this
method a potential tool for data augmentation when training deep learning
models.
|
[
{
"version": "v1",
"created": "Wed, 10 Jan 2018 15:59:12 GMT"
}
] | 2018-01-11T00:00:00 |
[
[
"Lafarge",
"Maxime W.",
""
],
[
"Pluim",
"Josien P. W.",
""
],
[
"Eppenhof",
"Koen A. J.",
""
],
[
"Moeskops",
"Pim",
""
],
[
"Veta",
"Mitko",
""
]
] |
new_dataset
| 0.986318 |
1801.03460
|
Marcelo Criscuolo
|
Marcelo Criscuolo, Erick Rocha Fonseca, Sandra Maria Alu\'isio, Ana
Carolina Speran\c{c}a-Criscuolo
|
MilkQA: a Dataset of Consumer Questions for the Task of Answer Selection
|
6 pages
|
Intelligent Systems (BRACIS), 2017 Brazilian Conference on
|
10.1109/BRACIS.2017.12
| null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce MilkQA, a question answering dataset from the dairy domain
dedicated to the study of consumer questions. The dataset contains 2,657 pairs
of questions and answers, written in the Portuguese language and originally
collected by the Brazilian Agricultural Research Corporation (Embrapa). All
questions were motivated by real situations and written by thousands of authors
with very different backgrounds and levels of literacy, while answers were
elaborated by specialists from Embrapa's customer service. Our dataset was
filtered and anonymized by three human annotators. Consumer questions are a
challenging kind of question that is usually employed as a form of seeking
information. Although several question answering datasets are available, most
of such resources are not suitable for research on answer selection models for
consumer questions. We aim to fill this gap by making MilkQA publicly
available. We study the behavior of four answer selection models on MilkQA: two
baseline models and two convolutional neural network archictetures. Our results
show that MilkQA poses real challenges to computational models, particularly
due to linguistic characteristics of its questions and to their unusually
longer lengths. Only one of the experimented models gives reasonable results,
at the cost of high computational requirements.
|
[
{
"version": "v1",
"created": "Wed, 10 Jan 2018 17:16:36 GMT"
}
] | 2018-01-11T00:00:00 |
[
[
"Criscuolo",
"Marcelo",
""
],
[
"Fonseca",
"Erick Rocha",
""
],
[
"Aluísio",
"Sandra Maria",
""
],
[
"Sperança-Criscuolo",
"Ana Carolina",
""
]
] |
new_dataset
| 0.999803 |
1607.03766
|
Benjamin Elizalde
|
Sebastian Sager and Benjamin Elizalde and Damian Borth and Christian
Schulze and Bhiksha Raj and Ian Lane
|
AudioPairBank: Towards A Large-Scale Tag-Pair-Based Audio Content
Analysis
|
This paper is a revised version of "AudioSentibank: Large-scale
Semantic Ontology of Acoustic Concepts for Audio Content Analysis"
| null | null | null |
cs.SD cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, sound recognition has been used to identify sounds, such as car and
river. However, sounds have nuances that may be better described by
adjective-noun pairs such as slow car, and verb-noun pairs such as flying
insects, which are under explored. Therefore, in this work we investigate the
relation between audio content and both adjective-noun pairs and verb-noun
pairs. Due to the lack of datasets with these kinds of annotations, we
collected and processed the AudioPairBank corpus consisting of a combined total
of 1,123 pairs and over 33,000 audio files. One contribution is the previously
unavailable documentation of the challenges and implications of collecting
audio recordings with these type of labels. A second contribution is to show
the degree of correlation between the audio content and the labels through
sound recognition experiments, which yielded results of 70% accuracy, hence
also providing a performance benchmark. The results and study in this paper
encourage further exploration of the nuances in audio and are meant to
complement similar research performed on images and text in multimedia
analysis.
|
[
{
"version": "v1",
"created": "Wed, 13 Jul 2016 14:31:54 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Aug 2017 23:07:17 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Jan 2018 21:36:04 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Sager",
"Sebastian",
""
],
[
"Elizalde",
"Benjamin",
""
],
[
"Borth",
"Damian",
""
],
[
"Schulze",
"Christian",
""
],
[
"Raj",
"Bhiksha",
""
],
[
"Lane",
"Ian",
""
]
] |
new_dataset
| 0.998342 |
1706.07230
|
Devendra Singh Chaplot
|
Devendra Singh Chaplot, Kanthashree Mysore Sathyendra, Rama Kumar
Pasumarthi, Dheeraj Rajagopal, Ruslan Salakhutdinov
|
Gated-Attention Architectures for Task-Oriented Language Grounding
|
To appear in AAAI-18
| null | null | null |
cs.LG cs.AI cs.CL cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To perform tasks specified by natural language instructions, autonomous
agents need to extract semantically meaningful representations of language and
map it to visual elements and actions in the environment. This problem is
called task-oriented language grounding. We propose an end-to-end trainable
neural architecture for task-oriented language grounding in 3D environments
which assumes no prior linguistic or perceptual knowledge and requires only raw
pixels from the environment and the natural language instruction as input. The
proposed model combines the image and text representations using a
Gated-Attention mechanism and learns a policy to execute the natural language
instruction using standard reinforcement and imitation learning methods. We
show the effectiveness of the proposed model on unseen instructions as well as
unseen maps, both quantitatively and qualitatively. We also introduce a novel
environment based on a 3D game engine to simulate the challenges of
task-oriented language grounding over a rich set of instructions and
environment states.
|
[
{
"version": "v1",
"created": "Thu, 22 Jun 2017 09:39:17 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jan 2018 03:24:06 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Chaplot",
"Devendra Singh",
""
],
[
"Sathyendra",
"Kanthashree Mysore",
""
],
[
"Pasumarthi",
"Rama Kumar",
""
],
[
"Rajagopal",
"Dheeraj",
""
],
[
"Salakhutdinov",
"Ruslan",
""
]
] |
new_dataset
| 0.999438 |
1709.01872
|
Tejpal Virdi
|
John T. Guibas, Tejpal S. Virdi, Peter S. Li
|
Synthetic Medical Images from Dual Generative Adversarial Networks
|
First two authors contributed equally. Accepted to NIPS 2017
Workshops on Medical Imaging and Machine Learning for Health
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Currently there is strong interest in data-driven approaches to medical image
classification. However, medical imaging data is scarce, expensive, and fraught
with legal concerns regarding patient privacy. Typical consent forms only allow
for patient data to be used in medical journals or education, meaning the
majority of medical data is inaccessible for general public research. We
propose a novel, two-stage pipeline for generating synthetic medical images
from a pair of generative adversarial networks, tested in practice on retinal
fundi images. We develop a hierarchical generation process to divide the
complex image generation task into two parts: geometry and photorealism. We
hope researchers will use our pipeline to bring private medical data into the
public domain, sparking growth in imaging tasks that have previously relied on
the hand-tuning of models. We have begun this initiative through the
development of SynthMed, an online repository for synthetic medical images.
|
[
{
"version": "v1",
"created": "Wed, 6 Sep 2017 16:07:30 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Dec 2017 05:01:18 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Jan 2018 20:32:51 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Guibas",
"John T.",
""
],
[
"Virdi",
"Tejpal S.",
""
],
[
"Li",
"Peter S.",
""
]
] |
new_dataset
| 0.962777 |
1711.07324
|
Manish Gupta
|
Dixita Limbachiya and Krishna Gopal and Bansari Rao and Manish K.
Gupta
|
On DNA Codes using the Ring Z4 + wZ4
|
Revised version with new results and corrections. Submitted to ISIT
2018
| null | null | null |
cs.IT math.IT math.RA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we study the DNA codes from the ring R = Z4 + wZ4, where w^2 =
2+2w with 16 elements. We establish a one to one correspondence between the
elements of the ring R and all the DNA codewords of length 2 by defining a
distance-preserving Gau map phi. Using this map, we give several new classes of
the DNA codes which satisfies reverse and reverse complement constraints. Some
of the constructed DNA codes are optimal.
|
[
{
"version": "v1",
"created": "Mon, 20 Nov 2017 14:42:06 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jan 2018 16:01:30 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Limbachiya",
"Dixita",
""
],
[
"Gopal",
"Krishna",
""
],
[
"Rao",
"Bansari",
""
],
[
"Gupta",
"Manish K.",
""
]
] |
new_dataset
| 0.999548 |
1712.09161
|
Aisha Urooj
|
Cecilia La Place, Aisha Urooj Khan and Ali Borji
|
Segmenting Sky Pixels in Images
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Outdoor scene parsing models are often trained on ideal datasets and produce
quality results. However, this leads to a discrepancy when applied to the real
world. The quality of scene parsing, particularly sky classification, decreases
in night time images, images involving varying weather conditions, and scene
changes due to seasonal weather. This project focuses on approaching these
challenges by using a state-of-the-art model in conjunction with a non-ideal
dataset: SkyFinder and a subset from SUN database with Sky object. We focus
specifically on sky segmentation, the task of determining sky and not-sky
pixels, and improving upon an existing state-of-the-art model: RefineNet. As a
result of our efforts, we have seen an improvement of 10-15% in the average MCR
compared to the prior methods on SkyFinder dataset. We have also improved from
an off-the shelf-model in terms of average mIOU by nearly 35%. Further, we
analyze our trained models on images w.r.t two aspects: times of day and
weather, and find that, in spite of facing same challenges as prior methods,
our trained models significantly outperform them.
|
[
{
"version": "v1",
"created": "Tue, 26 Dec 2017 02:07:46 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jan 2018 19:19:55 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"La Place",
"Cecilia",
""
],
[
"Khan",
"Aisha Urooj",
""
],
[
"Borji",
"Ali",
""
]
] |
new_dataset
| 0.999312 |
1801.02621
|
Mufti Mahmud
|
Fariha Afsana, Md. Asif-Ur-Rahman, Muhammad R. Ahmed, Mufti Mahmud and
M. Shamim Kaiser
|
An Energy Conserving Routing Scheme for Wireless Body Sensor Nanonetwork
Communication
|
13 pages, 13 figures, and 2 tables, IEEE Access, 2018
| null |
10.1109/ACCESS.2018.2789437
| null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Current developments in nanotechnology make electromagnetic communication
(EC) possible at the nanoscale for applications involving Wireless [Body]
Sensor Networks (W[B]SNs). This specialized branch of WSN has emerged as an
important research area contributing to medical treatment, social welfare, and
sports. The concept is based on the interaction of integrated nanoscale
machines by means of wireless communications. One key hurdle for advancing
nanocommunications is the lack of an apposite networking protocol to address
the upcoming needs of the nanonetworks. Recently, some key challenges have been
identified, such as nanonodes with extreme energy constraints, limited
computational capabilities, Terahertz frequency bands with limited transmission
range, etc., in designing protocols for wireless nanosensor networks (WNN).
This work proposes an improved performance scheme of nanocommunication over
Terahertz bands for wireless BSNs making it suitable for smart e-health
applications. The scheme contains -- a new energy-efficient forwarding routine
for EC in WNN consisting of hybrid clusters with centralized scheduling, a
model designed for channel behavior taking into account the aggregated impact
of molecular absorption, spreading loss, and shadowing, and an energy model for
energy harvesting and consumption. The outage probability is derived for both
single and multilinks and extended to determine the outage capacity. The outage
probability for a multilink is derived using a cooperative fusion technique at
a predefined fusion node. Simulated using a Nano-Sim simulator, performance of
the proposed model has been evaluated for energy efficiency, outage capacity,
and outage probability. The results demonstrate the efficiency of the proposed
scheme through maximized energy utilization in both single and multihop
communication, multisensor fusion enhances the link quality of the
transmission.
|
[
{
"version": "v1",
"created": "Sun, 7 Jan 2018 08:52:57 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Afsana",
"Fariha",
""
],
[
"Asif-Ur-Rahman",
"Md.",
""
],
[
"Ahmed",
"Muhammad R.",
""
],
[
"Mahmud",
"Mufti",
""
],
[
"Kaiser",
"M. Shamim",
""
]
] |
new_dataset
| 0.995645 |
1801.02691
|
Fengjiao Peng
|
Fengjiao Peng, Veronica LaBelle, Emily Yue and Rosalind Picard
|
A Trip to the Moon: Personalized Animated Movies for Self-reflection
| null |
Proceedings of the 2018 CHI Conference on Human Factors in
Computing Systems. ACM, 2018
|
10.1145/3173574.3173827
| null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Self-tracking physiological and psychological data poses the challenge of
presentation and interpretation. Insightful narratives for self-tracking data
can motivate the user towards constructive self-reflection. One powerful form
of narrative that engages audience across various culture and age groups is
animated movies. We collected a week of self-reported mood and behavior data
from each user and created in Unity a personalized animation based on their
data. We evaluated the impact of their video in a randomized control trial with
a non-personalized animated video as control. We found that personalized videos
tend to be more emotionally engaging, encouraging greater and lengthier writing
that indicated self-reflection about moods and behaviors, compared to
non-personalized control videos.
|
[
{
"version": "v1",
"created": "Mon, 8 Jan 2018 21:16:19 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Peng",
"Fengjiao",
""
],
[
"LaBelle",
"Veronica",
""
],
[
"Yue",
"Emily",
""
],
[
"Picard",
"Rosalind",
""
]
] |
new_dataset
| 0.993093 |
1801.02811
|
Wei Wang Dr.
|
Wei Wang, Shiyue He, Lin Yang, Qian Zhang, Tao Jiang
|
Wi-Fi Teeter-Totter: Overclocking OFDM for Internet of Things
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The conventional high-speed Wi-Fi has recently become a contender for
low-power Internet-of-Things (IoT) communications. OFDM continues its adoption
in the new IoT Wi-Fi standard due to its spectrum efficiency that can support
the demand of massive IoT connectivity. While the IoT Wi-Fi standard offers
many new features to improve power and spectrum efficiency, the basic physical
layer (PHY) structure of transceiver design still conforms to its conventional
design rationale where access points (AP) and clients employ the same OFDM PHY.
In this paper, we argue that current Wi-Fi PHY design does not take full
advantage of the inherent asymmetry between AP and IoT. To fill the gap, we
propose an asymmetric design where IoT devices transmit uplink packets using
the lowest power while pushing all the decoding burdens to the AP side. Such a
design utilizes the sufficient power and computational resources at AP to trade
for the transmission (TX) power of IoT devices. The core technique enabling
this asymmetric design is that the AP takes full power of its high clock rate
to boost the decoding ability. We provide an implementation of our design and
show that it can reduce the IoT's TX power by boosting the decoding capability
at the receivers.
|
[
{
"version": "v1",
"created": "Tue, 9 Jan 2018 06:22:11 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Wang",
"Wei",
""
],
[
"He",
"Shiyue",
""
],
[
"Yang",
"Lin",
""
],
[
"Zhang",
"Qian",
""
],
[
"Jiang",
"Tao",
""
]
] |
new_dataset
| 0.98948 |
1801.02815
|
Chifu Yang Dr.
|
Nan Yu, Chifu Yang, Miao Li
|
A Planar Tracking Game with Sensing Delays and its MATLAB Implementation
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a new perspective on the conventional planar target
tracking problem. One evader and one pursuer are considered in the dynamics. In
the planar tracking, pursuer has the ability to measure the position and the
velocity information of the evader but with sensing delays. The modeling and
the controller design of the system are presented with details. Then, a
computer game is developed and implemented using MATLAB/Simulink, which
constitutes the main contribution of the paper.
|
[
{
"version": "v1",
"created": "Tue, 9 Jan 2018 06:42:58 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Yu",
"Nan",
""
],
[
"Yang",
"Chifu",
""
],
[
"Li",
"Miao",
""
]
] |
new_dataset
| 0.963351 |
1801.02818
|
Satoshi Takabe
|
Satoshi Takabe, Tadashi Wadayama
|
k-connectivity of Random Graphs and Random Geometric Graphs in Node
Fault Model
|
6 pages
| null | null | null |
cs.IT cs.SI math.IT physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
k-connectivity of random graphs is a fundamental property indicating
reliability of multi-hop wireless sensor networks (WSN). WSNs comprising of
sensor nodes with limited power resources are modeled by random graphs with
unreliable nodes, which is known as the node fault model. In this paper, we
investigate k-connectivity of random graphs in the node fault model by
evaluating the network breakdown probability, i.e., the disconnectivity
probability of random graphs after stochastic node removals. Using the notion
of a strongly typical set, we obtain universal asymptotic upper and lower
bounds of the network breakdown probability. The bounds are applicable both to
random graphs and to random geometric graphs. We then consider three
representative random graph ensembles: the Erdos-Renyi random graph as the
simplest case, the random intersection graph for WSNs with random key
predistribution schemes, and the random geometric graph as a model of WSNs
generated by random sensor node deployment. The bounds unveil the existence of
the phase transition of the network breakdown probability for those ensembles.
|
[
{
"version": "v1",
"created": "Tue, 9 Jan 2018 06:52:57 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Takabe",
"Satoshi",
""
],
[
"Wadayama",
"Tadashi",
""
]
] |
new_dataset
| 0.966182 |
1801.02909
|
George Iosifidis Dr
|
Konstantinos Poularakis, George Iosifidis, Leandros Tassiulas
|
SDN-enabled Tactical Ad Hoc Networks: Extending Programmable Control to
the Edge
|
to appear in IEEE Communications Magazine, Ad Hoc and Sensor Networks
Series
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern tactical operations have complex communication and computing
requirements, often involving different coalition teams, that cannot be
supported by today's mobile ad hoc networks. To this end, the emerging Software
Defined Networking (SDN) paradigm has the potential to enable the redesign and
successful deployment of these systems. In this paper, we propose a set of
novel architecture designs for SDN-enabled mobile ad hoc networks in the
tactical field. We discuss in detail the challenges raised by the ad hoc and
coalition network environment, and we present specific solutions to address
them. The proposed approaches build on evidence from experimental evaluation of
such architectures and leverage recent theoretical results from SDN deployments
in large backbone networks.
|
[
{
"version": "v1",
"created": "Tue, 9 Jan 2018 12:18:29 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Poularakis",
"Konstantinos",
""
],
[
"Iosifidis",
"George",
""
],
[
"Tassiulas",
"Leandros",
""
]
] |
new_dataset
| 0.999046 |
1801.02913
|
Laura Luzzi
|
Laura Luzzi and Roope Vehkalahti
|
The DMT classification of real and quaternionic lattice codes
|
6 pages, 1 figure. Conference paper submitted to the International
Symposium on Information Theory 2018
| null | null | null |
cs.IT math.IT math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we consider space-time codes where the code-words are
restricted to either real or quaternion matrices. We prove two separate
diversity-multiplexing gain trade-off (DMT) upper bounds for such codes and
provide a criterion for a lattice code to achieve these upper bounds. We also
point out that lattice codes based on Q-central division algebras satisfy this
optimality criterion. As a corollary this result provides a DMT classification
for all Q-central division algebra codes that are based on standard embeddings.
|
[
{
"version": "v1",
"created": "Tue, 9 Jan 2018 12:26:49 GMT"
}
] | 2018-01-10T00:00:00 |
[
[
"Luzzi",
"Laura",
""
],
[
"Vehkalahti",
"Roope",
""
]
] |
new_dataset
| 0.966188 |
1003.1628
|
Darko Veberic
|
Darko Veberic
|
Having Fun with Lambert W(x) Function
|
15 pages, 11 figures, 4 tables, updated link to sources
| null | null |
GAP-2009-114
|
cs.MS cs.NA math.NA
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
This short note presents the Lambert W(x) function and its possible
application in the framework of physics related to the Pierre Auger
Observatory. The actual numerical implementation in C++ consists of Halley's
and Fritsch's iteration with branch-point expansion, asymptotic series and
rational fits as initial approximations.
|
[
{
"version": "v1",
"created": "Mon, 8 Mar 2010 13:47:25 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Jan 2018 15:18:25 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Veberic",
"Darko",
""
]
] |
new_dataset
| 0.996725 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.