id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1209.0735
|
Darko Veberic
|
Darko Veberic
|
Lambert W Function for Applications in Physics
|
9 pages, 12 figures. Extended version of arXiv:1003.1628, updated
link to sources
|
Computer Physics Communications 183 (2012) 2622-2628
|
10.1016/j.cpc.2012.07.008
| null |
cs.MS cs.NA physics.comp-ph
|
http://creativecommons.org/licenses/by/4.0/
|
The Lambert W(x) function and its possible applications in physics are
presented. The actual numerical implementation in C++ consists of Halley's and
Fritsch's iterations with initial approximations based on branch-point
expansion, asymptotic series, rational fits, and continued-logarithm recursion.
|
[
{
"version": "v1",
"created": "Fri, 31 Aug 2012 21:07:48 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Jan 2018 14:33:32 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Veberic",
"Darko",
""
]
] |
new_dataset
| 0.988291 |
1508.04606
|
Julien Hendrickx
|
Tao Liu, Ming Cao, Claudio De Persis and Julien M. Hendrickx
|
Distributed Event-Triggered Control for Asymptotic Synchronization of
Dynamical Networks
|
8 pages, 2 figues, 1 table
| null | null | null |
cs.SY cs.MA math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies synchronization of dynamical networks with event-based
communication. Firstly, two estimators are introduced into each node, one to
estimate its own state, and the other to estimate the average state of its
neighbours. Then, with these two estimators, a distributed event-triggering
rule (ETR) with a dwell time is designed such that the network achieves
synchronization asymptotically with no Zeno behaviours. The designed ETR only
depends on the information that each node can obtain, and thus can be
implemented in a decentralized way.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2015 11:37:02 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Dec 2016 11:03:34 GMT"
},
{
"version": "v3",
"created": "Sat, 6 Jan 2018 13:53:04 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Liu",
"Tao",
""
],
[
"Cao",
"Ming",
""
],
[
"De Persis",
"Claudio",
""
],
[
"Hendrickx",
"Julien M.",
""
]
] |
new_dataset
| 0.988382 |
1705.02877
|
Mahdi Azari
|
Mohammad Mahdi Azari, Fernando Rosas, Kwang-Cheng Chen, and Sofie
Pollin
|
Ultra Reliable UAV Communication Using Altitude and Cooperation
Diversity
| null | null |
10.1109/TCOMM.2017.2746105
| null |
cs.IT math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of unmanned aerial vehicles (UAVs) that serve as aerial base stations
is expected to become predominant in the next decade. However, in order for
this technology to unfold its full potential it is necessary to develop a
fundamental understanding of the distinctive features of air-to-ground (A2G)
links. As a contribution in this direction, this paper proposes a generic
framework for the analysis and optimization of the A2G systems. In contrast to
the existing literature, this framework incorporates both height-dependent path
loss exponent and small-scale fading, and unifies a widely used
ground-to-ground channel model with that of A2G for analysis of large-scale
wireless networks. We derive analytical expressions for the optimal UAV height
that minimizes the outage probability of a given A2G link. Moreover, our
framework allows us to derive a height-dependent closed-form expression and a
tight lower bound for the outage probability of an \textit{A2G cooperative
communication} network. Our results suggest that the optimal location of the
UAVs with respect to the ground nodes does not change by the inclusion of
ground relays. This enables interesting insights in the deployment of future
A2G networks, as the system reliability could be adjusted dynamically by adding
relaying nodes without requiring changes in the position of the corresponding
UAVs.
|
[
{
"version": "v1",
"created": "Fri, 28 Apr 2017 10:37:49 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Azari",
"Mohammad Mahdi",
""
],
[
"Rosas",
"Fernando",
""
],
[
"Chen",
"Kwang-Cheng",
""
],
[
"Pollin",
"Sofie",
""
]
] |
new_dataset
| 0.990226 |
1707.06907
|
Ivona Tautkute
|
Ivona Tautkute, Aleksandra Mo\.zejko, Wojciech Stokowiec, Tomasz
Trzci\'nski, {\L}ukasz Brocki, Krzysztof Marasek
|
What Looks Good with my Sofa: Multimodal Search Engine for Interior
Design
|
FEDCSIS 5th Conference on Multimedia, Interaction, Design and
Innovation (MIDI), 2017
|
Proceedings of the 2017 Federated Conference on Computer Science
and Information Systems
|
10.15439/2017F56
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a multi-modal search engine for interior design
that combines visual and textual queries. The goal of our engine is to retrieve
interior objects, e.g. furniture or wall clocks, that share visual and
aesthetic similarities with the query. Our search engine allows the user to
take a photo of a room and retrieve with a high recall a list of items
identical or visually similar to those present in the photo. Additionally, it
allows to return other items that aesthetically and stylistically fit well
together. To achieve this goal, our system blends the results obtained using
textual and visual modalities. Thanks to this blending strategy, we increase
the average style similarity score of the retrieved items by 11%. Our work is
implemented as a Web-based application and it is planned to be opened to the
public.
|
[
{
"version": "v1",
"created": "Fri, 21 Jul 2017 14:08:42 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jan 2018 14:14:59 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Tautkute",
"Ivona",
""
],
[
"Możejko",
"Aleksandra",
""
],
[
"Stokowiec",
"Wojciech",
""
],
[
"Trzciński",
"Tomasz",
""
],
[
"Brocki",
"Łukasz",
""
],
[
"Marasek",
"Krzysztof",
""
]
] |
new_dataset
| 0.994622 |
1711.07617
|
Ravi Kiran Raman
|
Ravi Kiran Raman and Lav R. Varshney
|
Dynamic Distributed Storage for Scaling Blockchains
|
19 pages, 6 figures
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Blockchain uses the idea of storing transaction data in the form of a
distributed ledger wherein each node in the network stores a current copy of
the sequence of transactions in the form of a hash chain. This requirement of
storing the entire ledger incurs a high storage cost that grows undesirably
large for high transaction rates and large networks. In this work we use the
ideas of secret key sharing, private key encryption, and distributed storage to
design a coding scheme such that each node stores only a part of the entire
transaction thereby reducing the storage cost to a fraction of its original
cost. When further using dynamic zone allocation, we show the coding scheme can
also improve the integrity of the transaction data in the network over current
schemes. Further, block validation (bitcoin mining) consumes a significant
amount of energy as it is necessary to determine a hash value satisfying a
specific set of constraints; we show that using dynamic distributed storage
reduces these energy costs.
|
[
{
"version": "v1",
"created": "Tue, 21 Nov 2017 03:34:13 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Jan 2018 07:25:27 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Raman",
"Ravi Kiran",
""
],
[
"Varshney",
"Lav R.",
""
]
] |
new_dataset
| 0.987094 |
1801.02075
|
Thomas Preu{\ss}er
|
Thomas B. Preu{\ss}er
|
QBM - Mapping User-Specified Functions to Programmable Logic through a
QBF Satisfiability Problem
|
Instance in Prenex CNF Track of QBFEVAL'17 competition:
http://www.qbflib.org/family_detail.php?idFamily=775
| null | null | null |
cs.LO cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is a brief overview on the background behind the test set formulas
generated by the QBM tool. After establishing its application context, its
formal approach to the generation of QBF formulas and the concrete test set
formulas are described. Finally, some related work will be credited and the
source to obtain the open-source tool will be identified.
|
[
{
"version": "v1",
"created": "Sat, 6 Jan 2018 19:31:27 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Preußer",
"Thomas B.",
""
]
] |
new_dataset
| 0.996909 |
1801.02123
|
Ramakrishnan Durairajan
|
Ramakrishnan Durairajan, Sathiya Kumaran Mani, Paul Barford, Rob
Nowak, Joel Sommers
|
TimeWeaver: Opportunistic One Way Delay Measurement via NTP
|
14 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One-way delay (OWD) between end hosts has important implications for Internet
applications, protocols, and measurement-based analyses. We describe a new
approach for identifying OWDs via passive measurement of Network Time Protocol
(NTP) traffic. NTP traffic offers the opportunity to measure OWDs accurately
and continuously from hosts throughout the Internet. Based on detailed examina-
tion of NTP implementations and in-situ behavior, we develop an analysis tool
that we call TimeWeaver, which enables assessment of precision and accuracy of
OWD measurements from NTP. We apply TimeWeaver to a ~1TB corpus of NTP traffic
collected from 19 servers located in the US and report on the characteristics
of hosts and their associated OWDs, which we classify in a precision/accuracy
hierarchy. To demonstrate the utility of these measurements, we apply iterative
hard-threshold singular value decomposition to estimate OWDs between arbitrary
hosts from the high- est tier in the hierarchy. We show that this approach
results in highly accurate estimates of OWDs, with average error rates on the
order of less than 2%. Finally, we outline a number of applications---in
particular, IP geolocation, network operations and management---for hosts in
lower tiers of the precision hierarchy that can benefit from TimeWeaver,
offering directions for future work.
|
[
{
"version": "v1",
"created": "Sun, 7 Jan 2018 03:37:46 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Durairajan",
"Ramakrishnan",
""
],
[
"Mani",
"Sathiya Kumaran",
""
],
[
"Barford",
"Paul",
""
],
[
"Nowak",
"Rob",
""
],
[
"Sommers",
"Joel",
""
]
] |
new_dataset
| 0.998626 |
1801.02150
|
Salman Faraji
|
Salman Faraji, Philippe Muellhaupt and Auke J. Ijspeert
|
Time-projection control to recover inter-sample disturbances,
application to bipedal walking control
|
18 pages journal paper
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new walking controller based on 3LP, a 3D model of bipedal
walking that is composed of three pendulums to simulate falling, swing and
torso dynamics. Taking advantage of linear equations and closed-form solutions
of 3LP, the proposed controller projects intermediate states of the biped back
to the beginning of the phase for which a discrete LQR controller is designed.
After the projection, a proper control policy is generated by this LQR
controller and used at the intermediate time. The projection controller reacts
to disturbances immediately and compared to the discrete LQR controller, it
provides superior performance in recovering intermittent external pushes.
Further analysis of closed-loop eigenvalues and disturbance rejection strength
show strong stabilization properties for this architecture. An analysis of
viable regions also show that the proposed controller covers most of the
maximal viable set of states. It is computationally much faster than Model
Predictive Controllers (MPC) and yet optimal over an infinite horizon.
|
[
{
"version": "v1",
"created": "Sun, 7 Jan 2018 06:53:23 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Faraji",
"Salman",
""
],
[
"Muellhaupt",
"Philippe",
""
],
[
"Ijspeert",
"Auke J.",
""
]
] |
new_dataset
| 0.974885 |
1801.02193
|
Michal \v{C}ertick\'y
|
Michal \v{S}ustr, Jan Mal\'y, Michal \v{C}ertick\'y
|
Multi-platform Version of StarCraft: Brood War in a Docker Container:
Technical Report
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a dockerized version of a real-time strategy game StarCraft: Brood
War, commonly used as a domain for AI research, with a pre-installed collection
of AI developement tools supporting all the major types of StarCraft bots. This
provides a convenient way to deploy StarCraft AIs on numerous hosts at once and
across multiple platforms despite limited OS support of StarCraft. In this
technical report, we describe the design of our Docker images and present a few
use cases.
|
[
{
"version": "v1",
"created": "Sun, 7 Jan 2018 14:16:59 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Šustr",
"Michal",
""
],
[
"Malý",
"Jan",
""
],
[
"Čertický",
"Michal",
""
]
] |
new_dataset
| 0.999487 |
1801.02270
|
David Rajaratnam
|
Bernhard Hengst, Maurice Pagnucco, David Rajaratnam, Claude Sammut,
Michael Thielscher
|
Perceptual Context in Cognitive Hierarchies
| null | null | null | null |
cs.AI cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cognition does not only depend on bottom-up sensor feature abstraction, but
also relies on contextual information being passed top-down. Context is higher
level information that helps to predict belief states at lower levels. The main
contribution of this paper is to provide a formalisation of perceptual context
and its integration into a new process model for cognitive hierarchies. Several
simple instantiations of a cognitive hierarchy are used to illustrate the role
of context. Notably, we demonstrate the use context in a novel approach to
visually track the pose of rigid objects with just a 2D camera.
|
[
{
"version": "v1",
"created": "Sun, 7 Jan 2018 23:20:14 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Hengst",
"Bernhard",
""
],
[
"Pagnucco",
"Maurice",
""
],
[
"Rajaratnam",
"David",
""
],
[
"Sammut",
"Claude",
""
],
[
"Thielscher",
"Michael",
""
]
] |
new_dataset
| 0.993518 |
1801.02381
|
Dennis Andriesse
|
Erik van der Kouwe, Dennis Andriesse, Herbert Bos, Cristiano
Giuffrida, Gernot Heiser
|
Benchmarking Crimes: An Emerging Threat in Systems Security
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Properly benchmarking a system is a difficult and intricate task.
Unfortunately, even a seemingly innocuous benchmarking mistake can compromise
the guarantees provided by a given systems security defense and also put its
reproducibility and comparability at risk. This threat is particularly
insidious as it is generally not a result of malice and can easily go
undetected by both authors and reviewers. Moreover, as modern defenses often
trade off security for performance in an attempt to find an ideal design point
in the performance-security space, the damage caused by benchmarking mistakes
is increasingly worrisome.
To analyze the magnitude of the phenomenon, we identify a set of 22
"benchmarking crimes" that threaten the validity of systems security
evaluations and perform a survey of 50 defense papers published in top venues.
To ensure the validity of our results, we perform the complete survey twice,
with two independent readers. We find only a very small number of disagreements
between readers, showing that our assessment of benchmarking crimes is highly
reproducible.
We show that benchmarking crimes are widespread even in papers published at
tier-1 venues. We find that tier-1 papers commit an average of five
benchmarking crimes and we find only a single paper in our sample that
committed no benchmarking crimes. Moreover, we find that the scale of the
problem is constant over time, suggesting that the community is not yet
addressing it despite the problem being now more relevant than ever. This
threatens the scientific process, which relies on reproducibility and
comparability to ensure that published research advances the state of the art.
We hope to raise awareness of these issues and provide recommendations to
improve benchmarking quality and safeguard the scientific process in our
community.
|
[
{
"version": "v1",
"created": "Mon, 8 Jan 2018 10:59:35 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"van der Kouwe",
"Erik",
""
],
[
"Andriesse",
"Dennis",
""
],
[
"Bos",
"Herbert",
""
],
[
"Giuffrida",
"Cristiano",
""
],
[
"Heiser",
"Gernot",
""
]
] |
new_dataset
| 0.978466 |
1801.02507
|
Primavera De Filippi
|
Primavera De Filippi (CERSA), Samer Hassan (UCM)
|
Blockchain Technology as a Regulatory Technology: From Code is Law to
Law is Code
| null |
First Monday, University of Illinois at Chicago Library, 2016
| null | null |
cs.CY cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
"Code is law" refers to the idea that, with the advent of digital technology,
code has progressively established itself as the predominant way to regulate
the behavior of Internet users. Yet, while computer code can enforce rules more
efficiently than legal code, it also comes with a series of limitations, mostly
because it is difficult to transpose the ambiguity and flexibility of legal
rules into a formalized language which can be interpreted by a machine. With
the advent of blockchain technology and associated smart contracts, code is
assuming an even stronger role in regulating people's interactions over the
Internet, as many contractual transactions get transposed into smart contract
code. In this paper, we describe the shift from the traditional notion of "code
is law" (i.e. code having the effect of law) to the new conception of "law is
code" (i.e. law being defined as code).
|
[
{
"version": "v1",
"created": "Mon, 8 Jan 2018 15:33:51 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"De Filippi",
"Primavera",
"",
"CERSA"
],
[
"Hassan",
"Samer",
"",
"UCM"
]
] |
new_dataset
| 0.999483 |
1801.02508
|
Ella Gale
|
Ella M. Gale
|
Spiking memristor logic gates are a type of time-variant perceptron
|
8 pages, 3 figures. Poster presentation at a conference
| null | null | null |
cs.ET cs.AR cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Memristors are low-power memory-holding resistors thought to be useful for
neuromophic computing, which can compute via spike-interactions mediated
through the device's short-term memory. Using interacting spikes, it is
possible to build an AND gate that computes OR at the same time, similarly a
full adder can be built that computes the arithmetical sum of its inputs. Here
we show how these gates can be understood by modelling the memristors as a
novel type of perceptron: one which is sensitive to input order. The
memristor's memory can change the input weights for later inputs, and thus the
memristor gates cannot be accurately described by a single perceptron,
requiring either a network of time-invarient perceptrons or a complex
time-varying self-reprogrammable perceptron. This work demonstrates the high
functionality of memristor logic gates, and also that the addition of
theasholding could enable the creation of a standard perceptron in hardware,
which may have use in building neural net chips.
|
[
{
"version": "v1",
"created": "Mon, 8 Jan 2018 15:33:53 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Gale",
"Ella M.",
""
]
] |
new_dataset
| 0.992949 |
1801.02603
|
Hien Ngo Thi
|
Ngo Thi Hien
|
On strong alt-induced codes
|
10 pages
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Strong alt-induced codes, a particular case of alt-induced codes, has been
introduced and considered by D. L. Van and the author in earlier papers. In
this note, an algorithm to check whether a regular code is strong alt-induced
or not is proposed, and the embedding problem for the classes of prefix
(suffix, bifix) strong alt-induced codes in both the finite and regular case is
also exhibited.
|
[
{
"version": "v1",
"created": "Mon, 8 Jan 2018 18:32:09 GMT"
}
] | 2018-01-09T00:00:00 |
[
[
"Hien",
"Ngo Thi",
""
]
] |
new_dataset
| 0.997989 |
1701.04420
|
Ranveer Singh
|
Ranveer Singh, R. B. Bapat
|
On the Characteristic and Permanent Polynomials of a Matrix
| null |
https://www.degruyter.com/view/j/spma.2017.5.issue-1/spma-2017-0010/spma-2017-0010.xml?format=INT
|
10.1515/spma-2017-0010
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is a digraph corresponding to every square matrix over $\mathbb{C}$. We
generate a recurrence relation using the Laplace expansion to calculate the
characteristic, and permanent polynomials of a square matrix. Solving this
recurrence relation, we found that the characteristic, and permanent
polynomials can be calculated in terms of characteristic, and permanent
polynomials of some specific induced subdigraphs of blocks in the digraph,
respectively. Interestingly, these induced subdigraphs are vertex-disjoint and
they partition the digraph. Similar to the characteristic, and permanent
polynomials; the determinant, and permanent can also be calculated. Therefore,
this article provides a combinatorial meaning of these useful quantities of the
matrix theory. We conclude this article with a number of open problems which
may be attempted for further research in this direction.
|
[
{
"version": "v1",
"created": "Mon, 16 Jan 2017 19:08:31 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2017 11:03:36 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Apr 2017 00:32:19 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Singh",
"Ranveer",
""
],
[
"Bapat",
"R. B.",
""
]
] |
new_dataset
| 0.98865 |
1705.02451
|
Jeanne Pellerin
|
Jeanne Pellerin, Amaury Johnen, Kilian Verhetsel, Jean-Francois
Remacle
|
Identifying combinations of tetrahedra into hexahedra: a vertex based
strategy
|
Preprint submitted to CAD (26th IMR special issue)
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Indirect hex-dominant meshing methods rely on the detection of adjacent
tetrahedra an algorithm that performs this identification and builds the set of
all possible combinations of tetrahedral elements of an input mesh T into
hexahedra, prisms, or pyramids. All identified cells are valid for engineering
analysis. First, all combinations of eight/six/five vertices whose connectivity
in T matches the connectivity of a hexahedron/prism/pyramid are computed. The
subset of tetrahedra of T triangulating each potential cell is then determined.
Quality checks allow to early discard poor quality cells and to dramatically
improve the efficiency of the method. Each potential hexahedron/prism/pyramid
is computed only once. Around 3 millions potential hexahedra are computed in 10
seconds on a laptop. We finally demonstrate that the set of potential hexes
built by our algorithm is significantly larger than those built using
predefined patterns of subdivision of a hexahedron in tetrahedral elements.
|
[
{
"version": "v1",
"created": "Sat, 6 May 2017 06:12:59 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Aug 2017 14:59:53 GMT"
},
{
"version": "v3",
"created": "Thu, 4 Jan 2018 15:12:06 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Pellerin",
"Jeanne",
""
],
[
"Johnen",
"Amaury",
""
],
[
"Verhetsel",
"Kilian",
""
],
[
"Remacle",
"Jean-Francois",
""
]
] |
new_dataset
| 0.982528 |
1710.11176
|
Xiang Zhang
|
Xiang Zhang, Nishant Vishwamitra, Hongxin Hu, Feng Luo
|
CrescendoNet: A Simple Deep Convolutional Neural Network with Ensemble
Behavior
| null | null | null | null |
cs.LG cs.CV stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new deep convolutional neural network, CrescendoNet, by
stacking simple building blocks without residual connections. Each Crescendo
block contains independent convolution paths with increased depths. The numbers
of convolution layers and parameters are only increased linearly in Crescendo
blocks. In experiments, CrescendoNet with only 15 layers outperforms almost all
networks without residual connections on benchmark datasets, CIFAR10, CIFAR100,
and SVHN. Given sufficient amount of data as in SVHN dataset, CrescendoNet with
15 layers and 4.1M parameters can match the performance of DenseNet-BC with 250
layers and 15.3M parameters. CrescendoNet provides a new way to construct high
performance deep convolutional neural networks without residual connections.
Moreover, through investigating the behavior and performance of subnetworks in
CrescendoNet, we note that the high performance of CrescendoNet may come from
its implicit ensemble behavior, which differs from the FractalNet that is also
a deep convolutional neural network without residual connections. Furthermore,
the independence between paths in CrescendoNet allows us to introduce a new
path-wise training procedure, which can reduce the memory needed for training.
|
[
{
"version": "v1",
"created": "Mon, 30 Oct 2017 18:35:01 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jan 2018 17:01:21 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Zhang",
"Xiang",
""
],
[
"Vishwamitra",
"Nishant",
""
],
[
"Hu",
"Hongxin",
""
],
[
"Luo",
"Feng",
""
]
] |
new_dataset
| 0.979162 |
1801.01207
|
Daniel Gruss
|
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner
Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg
|
Meltdown
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The security of computer systems fundamentally relies on memory isolation,
e.g., kernel address ranges are marked as non-accessible and are protected from
user access. In this paper, we present Meltdown. Meltdown exploits side effects
of out-of-order execution on modern processors to read arbitrary kernel-memory
locations including personal data and passwords. Out-of-order execution is an
indispensable performance feature and present in a wide range of modern
processors. The attack works on different Intel microarchitectures since at
least 2010 and potentially other processors are affected. The root cause of
Meltdown is the hardware. The attack is independent of the operating system,
and it does not rely on any software vulnerabilities. Meltdown breaks all
security assumptions given by address space isolation as well as
paravirtualized environments and, thus, every security mechanism building upon
this foundation. On affected systems, Meltdown enables an adversary to read
memory of other processes or virtual machines in the cloud without any
permissions or privileges, affecting millions of customers and virtually every
user of a personal computer. We show that the KAISER defense mechanism for
KASLR has the important (but inadvertent) side effect of impeding Meltdown. We
stress that KAISER must be deployed immediately to prevent large-scale
exploitation of this severe information leakage.
|
[
{
"version": "v1",
"created": "Wed, 3 Jan 2018 23:36:24 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Lipp",
"Moritz",
""
],
[
"Schwarz",
"Michael",
""
],
[
"Gruss",
"Daniel",
""
],
[
"Prescher",
"Thomas",
""
],
[
"Haas",
"Werner",
""
],
[
"Mangard",
"Stefan",
""
],
[
"Kocher",
"Paul",
""
],
[
"Genkin",
"Daniel",
""
],
[
"Yarom",
"Yuval",
""
],
[
"Hamburg",
"Mike",
""
]
] |
new_dataset
| 0.963832 |
1801.01249
|
Gang Yang
|
Gang Yang and Qianqian Zhang and Ying-Chang Liang
|
Cooperative Ambient Backscatter Communications for Green
Internet-of-Things
|
This journal paper has 16 pages in double column and 6 figures, and
will appear in IEEE Internet-of-Things Journal. The conference version with
title "Cooperative receiver for ambient backscatter communications with
multiple antennas" was published in IEEE Conference Communications (ICC,
2017)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ambient backscatter communication (AmBC) enables a passive backscatter device
to transmit information to a reader using ambient RF signals, and has emerged
as a promising solution to green Internet-of-Things (IoT). Conventional AmBC
receivers are interested in recovering the information from the ambient
backscatter device (A-BD) only. In this paper, we propose a cooperative AmBC
(CABC) system in which the reader recovers information not only from the A-BD,
but also from the RF source. We first establish the system model for the CABC
system from spread spectrum and spectrum sharing perspectives. Then, for flat
fading channels, we derive the optimal maximum-likelihood (ML) detector,
suboptimal linear detectors as well as successive interference-cancellation
(SIC) based detectors. For frequency-selective fading channels, the system
model for the CABC system over ambient orthogonal frequency division
multiplexing (OFDM) carriers is proposed, upon which a low-complexity optimal
ML detector is derived. For both kinds of channels, the bit-error-rate (BER)
expressions for the proposed detectors are derived in closed forms. Finally,
extensive numerical results have shown that, when the A-BD signal and the
RF-source signal have equal symbol period, the proposed SIC-based detectors can
achieve near-ML detection performance for typical application scenarios, and
when the A-BD symbol period is longer than the RF-source symbol period, the
existence of backscattered signal in the CABC system can enhance the ML
detection performance of the RF-source signal, thanks to the beneficial effect
of the backscatter link when the A-BD transmits at a lower rate than the RF
source.
|
[
{
"version": "v1",
"created": "Thu, 4 Jan 2018 05:32:40 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Yang",
"Gang",
""
],
[
"Zhang",
"Qianqian",
""
],
[
"Liang",
"Ying-Chang",
""
]
] |
new_dataset
| 0.99696 |
1801.01262
|
Yi Zhang
|
Yi Zhang, Houjun Huang, Haifeng Zhang, Liao Ni, Wei Xu, Nasir Uddin
Ahmed, Md. Shakil Ahmed, Yilun Jin, Yingjie Chen, Jingxuan Wen and Wenxin Li
|
ICFVR 2017: 3rd International Competition on Finger Vein Recognition
|
8 pages, 15 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years, finger vein recognition has become an important sub-field in
biometrics and been applied to real-world applications. The development of
finger vein recognition algorithms heavily depends on large-scale real-world
data sets. In order to motivate research on finger vein recognition, we
released the largest finger vein data set up to now and hold finger vein
recognition competitions based on our data set every year. In 2017,
International Competition on Finger Vein Recognition(ICFVR) is held jointly
with IJCB 2017. 11 teams registered and 10 of them joined the final evaluation.
The winner of this year dramatically improved the EER from 2.64% to 0.483%
compared to the winner of last year. In this paper, we introduce the process
and results of ICFVR 2017 and give insights on development of state-of-art
finger vein recognition algorithms.
|
[
{
"version": "v1",
"created": "Thu, 4 Jan 2018 07:14:32 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Zhang",
"Yi",
""
],
[
"Huang",
"Houjun",
""
],
[
"Zhang",
"Haifeng",
""
],
[
"Ni",
"Liao",
""
],
[
"Xu",
"Wei",
""
],
[
"Ahmed",
"Nasir Uddin",
""
],
[
"Ahmed",
"Md. Shakil",
""
],
[
"Jin",
"Yilun",
""
],
[
"Chen",
"Yingjie",
""
],
[
"Wen",
"Jingxuan",
""
],
[
"Li",
"Wenxin",
""
]
] |
new_dataset
| 0.975927 |
1801.01442
|
Rithesh Kumar
|
Rithesh Kumar, Jose Sotelo, Kundan Kumar, Alexandre de Brebisson,
Yoshua Bengio
|
ObamaNet: Photo-realistic lip-sync from text
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present ObamaNet, the first architecture that generates both audio and
synchronized photo-realistic lip-sync videos from any new text. Contrary to
other published lip-sync approaches, ours is only composed of fully trainable
neural modules and does not rely on any traditional computer graphics methods.
More precisely, we use three main modules: a text-to-speech network based on
Char2Wav, a time-delayed LSTM to generate mouth-keypoints synced to the audio,
and a network based on Pix2Pix to generate the video frames conditioned on the
keypoints.
|
[
{
"version": "v1",
"created": "Wed, 6 Dec 2017 16:18:31 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Kumar",
"Rithesh",
""
],
[
"Sotelo",
"Jose",
""
],
[
"Kumar",
"Kundan",
""
],
[
"de Brebisson",
"Alexandre",
""
],
[
"Bengio",
"Yoshua",
""
]
] |
new_dataset
| 0.999715 |
1801.01454
|
Guillermo Gallego
|
Guillermo Gallego, Elias Mueggler, Peter Sturm
|
Translation of "Zur Ermittlung eines Objektes aus zwei Perspektiven mit
innerer Orientierung" by Erwin Kruppa (1913)
|
16 pages, 1 figure. Granted reproduction permission from the
publishing house of the Austrian Academy of Sciences
(https://verlag.oeaw.ac.at/)
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Erwin Kruppa's 1913 paper, Erwin Kruppa, "Zur Ermittlung eines Objektes aus
zwei Perspektiven mit innerer Orientierung", Sitzungsberichte der
Mathematisch-Naturwissenschaftlichen Kaiserlichen Akademie der Wissenschaften,
Vol. 122 (1913), pp. 1939-1948, which may be translated as "To determine a 3D
object from two perspective views with known inner orientation", is a landmark
paper in Computer Vision because it provides the first five-point algorithm for
relative pose estimation. Kruppa showed that (a finite number of solutions for)
the relative pose between two calibrated images of a rigid object can be
computed from five point matches between the images. Kruppa's work also gained
attention in the topic of camera self-calibration, as presented in (Maybank and
Faugeras, 1992). Since the paper is still relevant today (more than a hundred
citations within the last ten years) and the paper is not available online, we
ordered a copy from the German National Library in Frankfurt and provide an
English translation along with the German original. We also adapt the
terminology to a modern jargon and provide some clarifications (highlighted in
sans-serif font). For a historical review of geometric computer vision, the
reader is referred to the recent survey paper (Sturm, 2011).
|
[
{
"version": "v1",
"created": "Mon, 25 Dec 2017 12:25:16 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Gallego",
"Guillermo",
""
],
[
"Mueggler",
"Elias",
""
],
[
"Sturm",
"Peter",
""
]
] |
new_dataset
| 0.988962 |
1801.01486
|
Seyed Mehdi Iranmanesh
|
Seyed Mehdi Iranmanesh, Ali Dabouei, Hadi Kazemi, Nasser M. Nasrabadi
|
Deep Cross Polarimetric Thermal-to-visible Face Recognition
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a deep coupled learning frame- work to address the
problem of matching polarimetric ther- mal face photos against a gallery of
visible faces. Polariza- tion state information of thermal faces provides the
miss- ing textural and geometrics details in the thermal face im- agery which
exist in visible spectrum. we propose a coupled deep neural network
architecture which leverages relatively large visible and thermal datasets to
overcome the problem of overfitting and eventually we train it by a
polarimetric thermal face dataset which is the first of its kind. The pro-
posed architecture is able to make full use of the polari- metric thermal
information to train a deep model compared to the conventional shallow
thermal-to-visible face recogni- tion methods. Proposed coupled deep neural
network also finds global discriminative features in a nonlinear embed- ding
space to relate the polarimetric thermal faces to their corresponding visible
faces. The results show the superior- ity of our method compared to the
state-of-the-art models in cross thermal-to-visible face recognition
algorithms.
|
[
{
"version": "v1",
"created": "Thu, 4 Jan 2018 18:41:27 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Iranmanesh",
"Seyed Mehdi",
""
],
[
"Dabouei",
"Ali",
""
],
[
"Kazemi",
"Hadi",
""
],
[
"Nasrabadi",
"Nasser M.",
""
]
] |
new_dataset
| 0.98582 |
1801.01557
|
Javad Fotouhi
|
Javad Fotouhi, Clayton P. Alexander, Mathias Unberath, Giacomo Taylor,
Sing Chun Lee, Bernhard Fuerst, Alex Johnson, Greg Osgood, Russell H. Taylor,
Harpal Khanuja, Mehran Armand, Nassir Navab
|
Plan in 2D, execute in 3D: An augmented reality solution for cup
placement in total hip arthroplasty
| null |
J. Med. Imag. 5(2), 021205 (2018)
|
10.1117/1.JMI.5.2.021205
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reproducibly achieving proper implant alignment is a critical step in total
hip arthroplasty (THA) procedures that has been shown to substantially affect
patient outcome. In current practice, correct alignment of the acetabular cup
is verified in C-arm X-ray images that are acquired in an anterior-posterior
(AP) view. Favorable surgical outcome is, therefore, heavily dependent on the
surgeon's experience in understanding the 3D orientation of a hemispheric
implant from 2D AP projection images. This work proposes an easy to use
intra-operative component planning system based on two C-arm X-ray images that
is combined with 3D augmented reality (AR) visualization that simplifies
impactor and cup placement according to the planning by providing a real-time
RGBD data overlay. We evaluate the feasibility of our system in a user study
comprising four orthopedic surgeons at the Johns Hopkins Hospital, and also
report errors in translation, anteversion, and abduction as low as 1.98 mm,
1.10 degrees, and 0.53 degrees, respectively. The promising performance of this
AR solution shows that deploying this system could eliminate the need for
excessive radiation, simplify the intervention, and enable reproducibly
accurate placement of acetabular implants.
|
[
{
"version": "v1",
"created": "Thu, 4 Jan 2018 22:00:20 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Fotouhi",
"Javad",
""
],
[
"Alexander",
"Clayton P.",
""
],
[
"Unberath",
"Mathias",
""
],
[
"Taylor",
"Giacomo",
""
],
[
"Lee",
"Sing Chun",
""
],
[
"Fuerst",
"Bernhard",
""
],
[
"Johnson",
"Alex",
""
],
[
"Osgood",
"Greg",
""
],
[
"Taylor",
"Russell H.",
""
],
[
"Khanuja",
"Harpal",
""
],
[
"Armand",
"Mehran",
""
],
[
"Navab",
"Nassir",
""
]
] |
new_dataset
| 0.997584 |
1801.01560
|
Mathias Unberath
|
Sebastian Andress, Alex Johnson, Mathias Unberath, Alexander Winkler,
Kevin Yu, Javad Fotouhi, Simon Weidert, Greg Osgood, Nassir Navab
|
On-the-fly Augmented Reality for Orthopaedic Surgery Using a Multi-Modal
Fiducial
|
S. Andress, A. Johnson, M. Unberath, and A. Winkler have contributed
equally and are listed in alphabetical order
|
J. Med. Imag. 5(2), 2018
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fluoroscopic X-ray guidance is a cornerstone for percutaneous orthopaedic
surgical procedures. However, two-dimensional observations of the
three-dimensional anatomy suffer from the effects of projective simplification.
Consequently, many X-ray images from various orientations need to be acquired
for the surgeon to accurately assess the spatial relations between the
patient's anatomy and the surgical tools. In this paper, we present an
on-the-fly surgical support system that provides guidance using augmented
reality and can be used in quasi-unprepared operating rooms. The proposed
system builds upon a multi-modality marker and simultaneous localization and
mapping technique to co-calibrate an optical see-through head mounted display
to a C-arm fluoroscopy system. Then, annotations on the 2D X-ray images can be
rendered as virtual objects in 3D providing surgical guidance. We
quantitatively evaluate the components of the proposed system, and finally,
design a feasibility study on a semi-anthropomorphic phantom. The accuracy of
our system was comparable to the traditional image-guided technique while
substantially reducing the number of acquired X-ray images as well as procedure
time. Our promising results encourage further research on the interaction
between virtual and real objects, that we believe will directly benefit the
proposed method. Further, we would like to explore the capabilities of our
on-the-fly augmented reality support system in a larger study directed towards
common orthopaedic interventions.
|
[
{
"version": "v1",
"created": "Thu, 4 Jan 2018 22:02:33 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Andress",
"Sebastian",
""
],
[
"Johnson",
"Alex",
""
],
[
"Unberath",
"Mathias",
""
],
[
"Winkler",
"Alexander",
""
],
[
"Yu",
"Kevin",
""
],
[
"Fotouhi",
"Javad",
""
],
[
"Weidert",
"Simon",
""
],
[
"Osgood",
"Greg",
""
],
[
"Navab",
"Nassir",
""
]
] |
new_dataset
| 0.953738 |
1801.01572
|
YangQuan Chen Prof.
|
Guoxiang Zhang and YangQuan Chen
|
LoopSmart: Smart Visual SLAM Through Surface Loop Closure
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a visual simultaneous localization and mapping (SLAM) framework of
closing surface loops. It combines both sparse feature matching and dense
surface alignment. Sparse feature matching is used for visual odometry and
globally camera pose fine-tuning when dense loops are detected, while dense
surface alignment is the way of closing large loops and solving surface
mismatching problem. To achieve smart dense surface loop closure, a highly
efficient CUDA-based global point cloud registration method and a map content
dependent loop verification method are proposed. We run extensive experiments
on different datasets, our method outperforms state-of-the-art ones in terms of
both camera trajectory and surface reconstruction accuracy.
|
[
{
"version": "v1",
"created": "Thu, 4 Jan 2018 22:53:07 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Zhang",
"Guoxiang",
""
],
[
"Chen",
"YangQuan",
""
]
] |
new_dataset
| 0.998098 |
1801.01613
|
Fei Wu
|
Fei Wu, Yin Sun, Lu Chen, Jackie Xu, Kannan Srinivasan, and Ness B.
Shroff
|
High Throughput Low Delay Wireless Multicast via Multi-Channel Moving
Window Codes
|
To Appear in IEEE INFOCOM 2018
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A fundamental challenge in wireless multicast has been how to simultaneously
achieve high-throughput and low-delay for reliably serving a large number of
users. In this paper, we show how to harness substantial throughput and delay
gains by exploiting multi-channel resources. We develop a new scheme called
Multi-Channel Moving Window Codes (MC-MWC) for multi-channel multi-session
wireless multicast. The salient features of MC-MWC are three-fold. (i) High
throughput: we show that MC-MWC achieves order-optimal throughput in the
many-user many-channel asymptotic regime. Moreover, the number of channels
required by a conventional channel-allocation based scheme is shown to be
doubly-exponentially larger than that required by MC-MWC. (ii) Low delay: using
large deviations theory, we show that the delay of MC-MWC decreases linearly
with the number of channels, while the delay reduction of conventional schemes
is no more than a finite constant. (iii) Low feedback overhead: the feedback
overhead of MC-MWC is a constant that is independent of both the number of
receivers in each session and the number of sessions in the network. Finally,
our trace-driven simulation and numerical results validate the analytical
results and show that the implementation complexity of MC-MWC is low.
|
[
{
"version": "v1",
"created": "Fri, 5 Jan 2018 02:33:32 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Wu",
"Fei",
""
],
[
"Sun",
"Yin",
""
],
[
"Chen",
"Lu",
""
],
[
"Xu",
"Jackie",
""
],
[
"Srinivasan",
"Kannan",
""
],
[
"Shroff",
"Ness B.",
""
]
] |
new_dataset
| 0.958616 |
1801.01689
|
Christian Scheffer
|
Erik D. Demaine and S\'andor P. Fekete and Phillip Keldenich and Henk
Meijer and Christian Scheffer
|
Coordinated Motion Planning: Reconfiguring a Swarm of Labeled Robots
with Bounded Stretch
|
32 pages, 20 figures
| null | null | null |
cs.CG cs.DS cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a number of breakthroughs for coordinated motion planning, in
which the objective is to reconfigure a swarm of labeled convex objects by a
combination of parallel, continuous, collision-free translations into a given
target arrangement. Problems of this type can be traced back to the classic
work of Schwartz and Sharir (1983), who gave a method for deciding the
existence of a coordinated motion for a set of disks between obstacles; their
approach is polynomial in the complexity of the obstacles, but exponential in
the number of disks. Other previous work has largely focused on {\em
sequential} schedules, in which one robot moves at a time.
We provide constant-factor approximation algorithms for minimizing the
execution time of a coordinated, {\em parallel} motion plan for a swarm of
robots in the absence of obstacles, provided some amount of separability.
Our algorithm achieves {\em constant stretch factor}: If all robots are at
most $d$ units from their respective starting positions, the total duration of
the overall schedule is $O(d)$. Extensions include unlabeled robots and
different classes of robots. We also prove that finding a plan with minimal
execution time is NP-hard, even for a grid arrangement without any stationary
obstacles. On the other hand, we show that for densely packed disks that cannot
be well separated, a stretch factor $\Omega(N^{1/4})$ may be required. On the
positive side, we establish a stretch factor of $O(N^{1/2})$ even in this case.
|
[
{
"version": "v1",
"created": "Fri, 5 Jan 2018 10:15:31 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Demaine",
"Erik D.",
""
],
[
"Fekete",
"Sándor P.",
""
],
[
"Keldenich",
"Phillip",
""
],
[
"Meijer",
"Henk",
""
],
[
"Scheffer",
"Christian",
""
]
] |
new_dataset
| 0.973394 |
1801.01698
|
Mohammad Kazem Moghimi
|
Mohammad Mahdi Moghimi, Maryam Nayeri, Majid Pourahmadi, Mohammad
Kazem Moghimi
|
Moving Vehicle Detection Using AdaBoost and Haar-Like Feature in
Surveillance Videos
|
13 pages
|
International Journal of Imaging and Robotics, vol. 18, no. 1, pp.
94-106 (2018)
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vehicle detection is a technology which its aim is to locate and show the
vehicle size in digital images. In this technology, vehicles are detected in
presence of other things like trees and buildings. It has an important role in
many computer vision applications such as vehicle tracking, analyzing the
traffic scene and efficient traffic management. In this paper, vehicles
detected based on the boosting technique by Viola Jones. Our proposed system is
tested in some real scenes of surveillance videos with different light
conditions. The experimental results show that the accuracy,completeness, and
quality of the proposed vehicle detection method are better than the previous
techniques (about 94%, 92%, and 87%, respectively). Thus, our proposed approach
is robust and efficient to detect vehicles in surveillance videos and their
applications.
|
[
{
"version": "v1",
"created": "Fri, 5 Jan 2018 10:41:02 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Moghimi",
"Mohammad Mahdi",
""
],
[
"Nayeri",
"Maryam",
""
],
[
"Pourahmadi",
"Majid",
""
],
[
"Moghimi",
"Mohammad Kazem",
""
]
] |
new_dataset
| 0.99788 |
1801.01820
|
Carlo Condo
|
Carlo Condo, Seyyed Ali Hashemi, Arash Ardakani, Furkan Ercan, Warren
J. Gross
|
Design and Implementation of a Polar Codes Blind Detection Scheme
|
arXiv admin note: text overlap with arXiv:1705.01864
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In blind detection, a set of candidates has to be decoded within a strict
time constraint, to identify which transmissions are directed at the user
equipment. Blind detection is required by the 3GPP LTE/LTE-Advanced standard,
and it will be required in the 5th generation wireless communication standard
(5G) as well. Polar codes have been selected for use in 5G: thus, the issue of
blind detection of polar codes must be addressed. We propose a polar code blind
detection scheme where the user ID is transmitted instead of some of the frozen
bits. A first, coarse decoding phase helps selecting a subset of candidates
that is decoded by a more powerful algorithm: an early stopping criterion is
also introduced for the second decoding phase. Simulations results show good
missed detection and false alarm rates, along with substantial latency gains
thanks to early stopping. We then propose an architecture to implement the
devised blind detection scheme, based on a tunable decoder that can be used for
both phases. The architecture is synthesized and implementation results are
reported for various system parameters. The reported area occupation and
latency, obtained in 65 nm CMOS technology, are able to meet 5G requirements,
and are guaranteed to meet them with even less resource usage in the latest
technology nodes.
|
[
{
"version": "v1",
"created": "Thu, 4 Jan 2018 17:08:11 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Condo",
"Carlo",
""
],
[
"Hashemi",
"Seyyed Ali",
""
],
[
"Ardakani",
"Arash",
""
],
[
"Ercan",
"Furkan",
""
],
[
"Gross",
"Warren J.",
""
]
] |
new_dataset
| 0.984567 |
1801.01828
|
Sergio Rojas-Galeano
|
Nestor Rodriguez and Sergio Rojas-Galeano
|
Shielding Google's language toxicity model against adversarial attacks
| null | null | null | null |
cs.CL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Lack of moderation in online communities enables participants to incur in
personal aggression, harassment or cyberbullying, issues that have been
accentuated by extremist radicalisation in the contemporary post-truth politics
scenario. This kind of hostility is usually expressed by means of toxic
language, profanity or abusive statements. Recently Google has developed a
machine-learning-based toxicity model in an attempt to assess the hostility of
a comment; unfortunately, it has been suggested that said model can be deceived
by adversarial attacks that manipulate the text sequence of the comment. In
this paper we firstly characterise such adversarial attacks as using
obfuscation and polarity transformations. The former deceives by corrupting
toxic trigger content with typographic edits, whereas the latter deceives by
grammatical negation of the toxic content. Then, we propose a two--stage
approach to counter--attack these anomalies, bulding upon a recently proposed
text deobfuscation method and the toxicity scoring model. Lastly, we conducted
an experiment with approximately 24000 distorted comments, showing how in this
way it is feasible to restore toxicity of the adversarial variants, while
incurring roughly on a twofold increase in processing time. Even though novel
adversary challenges would keep coming up derived from the versatile nature of
written language, we anticipate that techniques combining machine learning and
text pattern recognition methods, each one targeting different layers of
linguistic features, would be needed to achieve robust detection of toxic
language, thus fostering aggression--free digital interaction.
|
[
{
"version": "v1",
"created": "Fri, 5 Jan 2018 16:45:59 GMT"
}
] | 2018-01-08T00:00:00 |
[
[
"Rodriguez",
"Nestor",
""
],
[
"Rojas-Galeano",
"Sergio",
""
]
] |
new_dataset
| 0.992036 |
1704.00905
|
Lorenzo Sabattini
|
Valeria Villani and Lorenzo Sabattini and Giuseppe Riggio and Alessio
Levratti and Cristian Secchi and Cesare Fantuzzi
|
Interacting With a Mobile Robot with a Natural Infrastructure-Less
Interface
| null |
Proceedings of the IFAC Wold Congress, 2017
|
10.1016/j.ifacol.2017.08.1829
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce a novel approach that enables users to interact
with a mobile robot in a natural manner. The proposed interaction system does
not require any specific infrastructure or device, but relies on commonly
utilized objects while leaving the user's hands free. Specifically, we propose
to utilize a smartwatch (or a sensorized wristband) for recognizing the motion
of the user's forearm. Measurements of accelerations and angular velocities are
exploited to recognize user's gestures and define velocity commands for the
robot. The proposed interaction system is evaluated experimentally with
different users controlling a mobile robot and compared to the use of a remote
control device for the teleoperation of robots. Results show that the usability
and effectiveness of the proposed natural interaction system based on the use
of a smartwatch provide significant improvement in the human-robot interaction
experience.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2017 07:43:49 GMT"
}
] | 2018-01-04T00:00:00 |
[
[
"Villani",
"Valeria",
""
],
[
"Sabattini",
"Lorenzo",
""
],
[
"Riggio",
"Giuseppe",
""
],
[
"Levratti",
"Alessio",
""
],
[
"Secchi",
"Cristian",
""
],
[
"Fantuzzi",
"Cesare",
""
]
] |
new_dataset
| 0.995814 |
1707.08409
|
Binqiang Chen
|
Binqiang Chen and Chenyang Yang
|
Caching Policy for Cache-enabled D2D Communications by Learning User
Preference
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Prior works in designing caching policy do not distinguish content popularity
with user preference. In this paper, we illustrate the caching gain by
exploiting individual user behavior in sending requests. After showing the
connection between the two concepts, we provide a model for synthesizing user
preference from content popularity. We then optimize the caching policy with
the knowledge of user preference and active level to maximize the offloading
probability for cache-enabled device-to-device communications, and develop a
low-complexity algorithm to find the solution. In order to learn user
preference, we model the user request behavior resorting to probabilistic
latent semantic analysis, and learn the model parameters by expectation
maximization algorithm. By analyzing a Movielens dataset, we find that the user
preferences are less similar, and the active level and topic preference of each
user change slowly over time. Based on this observation, we introduce a prior
knowledge based learning algorithm for user preference, which can shorten the
learning time. Simulation results show remarkable performance gain of the
caching policy with user preference over existing policy with content
popularity, both with realistic dataset and synthetic data validated by the
real dataset.
|
[
{
"version": "v1",
"created": "Wed, 26 Jul 2017 12:39:13 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jan 2018 08:02:58 GMT"
}
] | 2018-01-04T00:00:00 |
[
[
"Chen",
"Binqiang",
""
],
[
"Yang",
"Chenyang",
""
]
] |
new_dataset
| 0.99287 |
1801.00256
|
Shadrokh Samavi
|
Mahdi Ahmadi, Mohsen Hajabdollahi, Nader Karimi, Shadrokh Samavi
|
Context aware saliency map generation using semantic segmentation
|
5 pages, 7 figures, 2 tables
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Saliency map detection, as a method for detecting important regions of an
image, is used in many applications such as image classification and
recognition. We propose that context detection could have an essential role in
image saliency detection. This requires extraction of high level features. In
this paper a saliency map is proposed, based on image context detection using
semantic segmentation as a high level feature. Saliency map from semantic
information is fused with color and contrast based saliency maps. The final
saliency map is then generated. Simulation results for Pascal-voc11 image
dataset show 99% accuracy in context detection. Also final saliency map
produced by our proposed method shows acceptable results in detecting salient
points.
|
[
{
"version": "v1",
"created": "Sun, 31 Dec 2017 08:55:17 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jan 2018 08:11:57 GMT"
}
] | 2018-01-04T00:00:00 |
[
[
"Ahmadi",
"Mahdi",
""
],
[
"Hajabdollahi",
"Mohsen",
""
],
[
"Karimi",
"Nader",
""
],
[
"Samavi",
"Shadrokh",
""
]
] |
new_dataset
| 0.980179 |
1801.00743
|
Claudio Alexandre
|
Claudio Alexandre and Jo\~ao Balsa
|
Um Sistema Multiagente no Combate ao Braqueamento de Capitais
|
17 pages, in Portuguese, 7 figures
|
RISTI, 25 12/2017
|
10.17013/risti.25.1-17
| null |
cs.MA cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Money laundering is a crime that makes it possible to finance other crimes,
for this reason, it is important for criminal organizations and their combat is
prioritized by nations around the world. The anti-money laundering process has
not evolved as expected because it has prioritized only the signaling of
suspicious transactions. The constant increasing in the volume of transactions
has overloaded the indispensable human work of final evaluation of the
suspicions. This article presents a multiagent system that aims to go beyond
the capture of suspicious transactions, seeking to assist the human expert in
the analysis of suspicions. The agents created use data mining techniques to
create transactional behavioral profiles; apply rules generated in learning
process in conjunction with specific rules based on legal aspects and profiles
created to capture suspicious transactions; and analyze these suspicious
transactions indicating to the human expert those that require more detailed
analysis.
|
[
{
"version": "v1",
"created": "Tue, 2 Jan 2018 17:45:28 GMT"
}
] | 2018-01-04T00:00:00 |
[
[
"Alexandre",
"Claudio",
""
],
[
"Balsa",
"João",
""
]
] |
new_dataset
| 0.998007 |
1801.00879
|
Ayan Kumar Bhunia
|
Ayan Kumar Bhunia, Avirup Bhattacharyya, Prithaj Banerjee, Partha
Pratim Roy, Subrahmanyam Murala
|
A Novel Feature Descriptor for Image Retrieval by Combining Modified
Color Histogram and Diagonally Symmetric Co-occurrence Texture Pattern
|
Preprint Submitted
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we have proposed a novel feature descriptors combining color
and texture information collectively. In our proposed color descriptor
component, the inter-channel relationship between Hue (H) and Saturation (S)
channels in the HSV color space has been explored which was not done earlier.
We have quantized the H channel into a number of bins and performed the voting
with saturation values and vice versa by following a principle similar to that
of the HOG descriptor, where orientation of the gradient is quantized into a
certain number of bins and voting is done with gradient magnitude. This helps
us to study the nature of variation of saturation with variation in Hue and
nature of variation of Hue with the variation in saturation. The texture
component of our descriptor considers the co-occurrence relationship between
the pixels symmetric about both the diagonals of a 3x3 window. Our work is
inspired from the work done by Dubey et al.[1]. These two components, viz.
color and texture information individually perform better than existing texture
and color descriptors. Moreover, when concatenated the proposed descriptors
provide significant improvement over existing descriptors for content base
color image retrieval. The proposed descriptor has been tested for image
retrieval on five databases, including texture image databases - MIT VisTex
database and Salzburg texture database and natural scene databases Corel 1K,
Corel 5K and Corel 10K. The precision and recall values experimented on these
databases are compared with some state-of-art local patterns. The proposed
method provided satisfactory results from the experiments.
|
[
{
"version": "v1",
"created": "Wed, 3 Jan 2018 01:39:05 GMT"
}
] | 2018-01-04T00:00:00 |
[
[
"Bhunia",
"Ayan Kumar",
""
],
[
"Bhattacharyya",
"Avirup",
""
],
[
"Banerjee",
"Prithaj",
""
],
[
"Roy",
"Partha Pratim",
""
],
[
"Murala",
"Subrahmanyam",
""
]
] |
new_dataset
| 0.950674 |
1801.00924
|
Bojie Lv
|
Bojie Lv, Lexiang Huang and Rui Wang
|
Joint Content Delivery and Caching Placement via Dynamic Programming
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, downlink delivery of popular content is optimized with the
assistance of wireless cache nodes. Specifically, the requests of one file is
modeled as a Poisson point process with finite lifetime, and two downlink
transmission modes are considered: (1) the base station multicasts file
segments to the requesting users and selected cache nodes; (2) the base station
proactively multicasts file segments to the selected cache nodes without
requests from users. Hence the cache nodes with decoded files can help to
offload the traffic upon the next file request via other air interfaces, e.g.
WiFi. Without proactive caching placement, we formulate the downlink traffic
offloading as a Markov decision process with random number of stages, and
propose a revised Bellman's equation to obtain the optimal control policy. In
order to address the prohibitively huge state space, we also introduce a
low-complexity sub-optimal solution based on linear approximation of the value
functions, where the gap between the approximated value functions and the real
ones is bounded analytically. The approximated value functions can be
calculated from analytical expressions given the spatial distribution of
requesting users. Moreover, we propose a learning-based algorithm to evaluate
the approximated value functions for unknown distribution of requesting users.
Finally, a proactive caching placement algorithm is introduced to exploit the
temporal diversity of shadowing effect. It is shown by simulation that the
proposed low-complexity algorithm based on approximated value functions can
significantly reduce the resource consumption at the base station, and the
proactive caching placement can further improve the performance.
|
[
{
"version": "v1",
"created": "Wed, 3 Jan 2018 08:48:14 GMT"
}
] | 2018-01-04T00:00:00 |
[
[
"Lv",
"Bojie",
""
],
[
"Huang",
"Lexiang",
""
],
[
"Wang",
"Rui",
""
]
] |
new_dataset
| 0.979008 |
1801.00992
|
Youlong Wu
|
Ke Wang, Youlong Wu, Yingying Ma
|
The Capacity on Degraded Relay Broadcast Channel
|
8 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The relay broadcast channel (RBC) is considered, in which a transmitter
communicates with two receivers with the assistance of a relay. Based on
different degradation orders among the relay and the receivers' outputs, three
types of physically degraded RBCs (PDRBCs) are introduced. Inner bounds and
outer bounds are derived on the capacity region of the presented three types.
The bounds are tight for two types of PDRBCs: 1) one receiver's output is a
degraded form of the other receiver's output, and the relay's output is a
degraded form of the weaker receiver's output; 2) one receiver's output is a
degraded form of the relay's output, and the other receiver's output is a
degraded form of the relay's output. For the Gaussian PDRBC, the bounds match,
i.e., establish its capacity region.
|
[
{
"version": "v1",
"created": "Wed, 3 Jan 2018 13:15:50 GMT"
}
] | 2018-01-04T00:00:00 |
[
[
"Wang",
"Ke",
""
],
[
"Wu",
"Youlong",
""
],
[
"Ma",
"Yingying",
""
]
] |
new_dataset
| 0.999695 |
1509.08764
|
Quang Minh Ha
|
Quang Minh Ha, Yves Deville, Quang Dung Pham, Minh Ho\`ang H\`a
|
On the Min-cost Traveling Salesman Problem with Drone
|
57 pages, technical report, latest work
| null |
10.1016/j.trc.2017.11.015
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Over the past few years, unmanned aerial vehicles (UAV), also known as
drones, have been adopted as part of a new logistic method in the commercial
sector called "last-mile delivery". In this novel approach, they are deployed
alongside trucks to deliver goods to customers to improve the quality of
service and reduce the transportation cost. This approach gives rise to a new
variant of the traveling salesman problem (TSP), called TSP with drone (TSP-D).
A variant of this problem that aims to minimize the time at which truck and
drone finish the service (or, in other words, to maximize the quality of
service) was studied in the work of Murray and Chu (2015). In contrast, this
paper considers a new variant of TSP-D in which the objective is to minimize
operational costs including total transportation cost and one created by waste
time a vehicle has to wait for the other. The problem is first formulated
mathematically. Then, two algorithms are proposed for the solution. The first
algorithm (TSP-LS) was adapted from the approach proposed by Murray and Chu
(2015), in which an optimal TSP solution is converted to a feasible TSP-D
solution by local searches. The second algorithm, a Greedy Randomized Adaptive
Search Procedure (GRASP), is based on a new split procedure that optimally
splits any TSP tour into a TSP-D solution. After a TSP-D solution has been
generated, it is then improved through local search operators. Numerical
results obtained on various instances of both objective functions with
different sizes and characteristics are presented. The results show that GRASP
outperforms TSP-LS in terms of solution quality under an acceptable running
time.
|
[
{
"version": "v1",
"created": "Tue, 29 Sep 2015 14:19:47 GMT"
},
{
"version": "v2",
"created": "Mon, 23 May 2016 06:58:52 GMT"
},
{
"version": "v3",
"created": "Sat, 29 Jul 2017 18:08:35 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Ha",
"Quang Minh",
""
],
[
"Deville",
"Yves",
""
],
[
"Pham",
"Quang Dung",
""
],
[
"Hà",
"Minh Hoàng",
""
]
] |
new_dataset
| 0.999635 |
1512.01503
|
Quang Minh Ha
|
Quang Minh Ha, Yves Deville, Quang Dung Pham, Minh Ho\`ang H\`a
|
On the Min-cost Traveling Salesman Problem with Drone
|
We proposed arXiv:1509.08764 as the first report about our research
on TSP-D. However due to a critical error in the experiment, we changed the
research approach and method and propose arXiv:1512.01503. Now it seems
arXiv:1509.08764 received new citations. we would like to withdraw
arXiv:1512.01503 and replaced arXiv:1509.08764 with our latest work
| null |
10.1016/j.trc.2017.11.015
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Once known to be used exclusively in military domain, unmanned aerial
vehicles (drones) have stepped up to become a part of new logistic method in
commercial sector called "last-mile delivery". In this novel approach, small
unmanned aerial vehicles (UAV), also known as drones, are deployed alongside
with trucks to deliver goods to customers in order to improve the service
quality or reduce the transportation cost. It gives rise to a new variant of
the traveling salesman problem (TSP), of which we call TSP with drone (TSP-D).
In this article, we consider a variant of TSP-D where the main objective is to
minimize the total transportation cost. We also propose two heuristics: "Drone
First, Truck Second" (DFTS) and "Truck First, Drone Second" (TFDS), to
effectively solve the problem. The former constructs route for drone first
while the latter constructs route for truck first. We solve a TSP to generate
route for truck and propose a mixed integer programming (MIP) formulation with
different profit functions to build route for drone. Numerical results obtained
on many instances with different sizes and characteristics are presented.
Recommendations on promising algorithm choices are also provided.
|
[
{
"version": "v1",
"created": "Fri, 4 Dec 2015 18:23:41 GMT"
},
{
"version": "v2",
"created": "Sun, 27 Dec 2015 06:21:51 GMT"
},
{
"version": "v3",
"created": "Sun, 22 May 2016 17:06:40 GMT"
},
{
"version": "v4",
"created": "Thu, 26 May 2016 13:14:33 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Ha",
"Quang Minh",
""
],
[
"Deville",
"Yves",
""
],
[
"Pham",
"Quang Dung",
""
],
[
"Hà",
"Minh Hoàng",
""
]
] |
new_dataset
| 0.999641 |
1701.04723
|
Roman Kaplan
|
Roman Kaplan, Leonid Yavits, Ran Ginosar and Uri Weiser
|
A Resistive CAM Processing-in-Storage Architecture for DNA Sequence
Alignment
| null |
IEEE Micro, vol. 37, no. 4, pp. 20-28, 2017
|
10.1109/MM.2017.3211121
| null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel processing-in-storage (PRinS) architecture based on Resistive CAM
(ReCAM) is described and proposed for Smith-Waterman (S-W) sequence alignment.
The ReCAM massively-parallel compare operation finds matching base-pairs in a
fixed number of cycles, regardless of sequence length. The ReCAM PRinS S-W
algorithm is simulated and compared to FPGA, Xeon Phi and GPU-based
implementations, showing at least 4.7x higher throughput and at least 15x lower
power dissipation.
|
[
{
"version": "v1",
"created": "Tue, 17 Jan 2017 15:18:57 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Jun 2017 09:08:29 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Kaplan",
"Roman",
""
],
[
"Yavits",
"Leonid",
""
],
[
"Ginosar",
"Ran",
""
],
[
"Weiser",
"Uri",
""
]
] |
new_dataset
| 0.996785 |
1709.01126
|
Ronald Caplan
|
Ronald M. Caplan, Zoran Mikic and Jon A. Linker
|
From MPI to MPI+OpenACC: Conversion of a legacy FORTRAN PCG solver for
the spherical Laplace equation
|
18 pages, 4 figures. Work presented at the 2017 NVIDIA GPU Technology
Conference
| null | null | null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A real-world example of adding OpenACC to a legacy MPI FORTRAN Preconditioned
Conjugate Gradient code is described, and timing results for multi-node
multi-GPU runs are shown. The code is used to obtain three-dimensional
spherical solutions to the Laplace equation. Its application is finding
potential field solutions of the solar corona, a useful tool in space weather
modeling. We highlight key tips, strategies, and challenges faced when adding
OpenACC. Performance results are shown for running the code with MPI-only on
multiple CPUs, and with MPI+OpenACC on multiple GPUs and CPUs.
|
[
{
"version": "v1",
"created": "Mon, 4 Sep 2017 19:26:03 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Dec 2017 21:49:27 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Caplan",
"Ronald M.",
""
],
[
"Mikic",
"Zoran",
""
],
[
"Linker",
"Jon A.",
""
]
] |
new_dataset
| 0.994532 |
1710.01895
|
Chaomei Chen
|
Chaomei Chen
|
Eugene Garfield's Scholarly Impact: A Scientometric Review
|
24 pages, 19 Figures, 15 Tables
| null |
10.1007/s11192-017-2594-5
| null |
cs.DL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The concept of citation indexing has become deeply involved in many parts of
research itself and the broad environment in which research plays an integral
role, ranging from research evaluation, numerous indicators, to an increasingly
wider range of scientific disciplines. In this article, we pay tribute to
Eugene Garfield and present a scientometric review of the intellectual assets
that he brought to us. In addition, we explore the intellectual landscape that
has subsequently evolved in connection to many of his ideas. We illustrate what
systematic reviews of the scientific literature may reveal and what we may
learn from the rich information conveyed through citation-induced patterns. The
study is conducted with CiteSpace, one of many science mapping tools based on
data from the Web of Science and Scopus. Without Garfield's inventions, none of
these would be possible.
|
[
{
"version": "v1",
"created": "Thu, 5 Oct 2017 06:39:44 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Chen",
"Chaomei",
""
]
] |
new_dataset
| 0.962884 |
1711.01467
|
Rohit Girdhar
|
Rohit Girdhar and Deva Ramanan
|
Attentional Pooling for Action Recognition
|
In NIPS 2017. Project page:
https://rohitgirdhar.github.io/AttentionalPoolingAction/
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a simple yet surprisingly powerful model to incorporate
attention in action recognition and human object interaction tasks. Our
proposed attention module can be trained with or without extra supervision, and
gives a sizable boost in accuracy while keeping the network size and
computational cost nearly the same. It leads to significant improvements over
state of the art base architecture on three standard action recognition
benchmarks across still images and videos, and establishes new state of the art
on MPII dataset with 12.5% relative improvement. We also perform an extensive
analysis of our attention module both empirically and analytically. In terms of
the latter, we introduce a novel derivation of bottom-up and top-down attention
as low-rank approximations of bilinear pooling methods (typically used for
fine-grained classification). From this perspective, our attention formulation
suggests a novel characterization of action recognition as a fine-grained
recognition problem.
|
[
{
"version": "v1",
"created": "Sat, 4 Nov 2017 17:37:15 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Nov 2017 04:08:11 GMT"
},
{
"version": "v3",
"created": "Sat, 30 Dec 2017 01:07:10 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Girdhar",
"Rohit",
""
],
[
"Ramanan",
"Deva",
""
]
] |
new_dataset
| 0.964271 |
1711.02586
|
Sourjya Dutta
|
Sourjya Dutta, C.Nicolas Barati, Aditya Dhananjay, and Sundeep Rangan
|
5G Millimeter Wave Cellular System Capacity with Fully Digital
Beamforming
|
To appear in the Proceedings of the 51st Asilomar Conference on
Signals, Systems, and Computers, 2017
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to heavy reliance of millimeter-wave (mmWave) wireless systems on
directional links, Beamforming (BF) with high-dimensional arrays is essential
for cellular systems in these frequencies. How to perform the array processing
in a power efficient manner is a fundamental challenge. Analog and hybrid BF
require fewer analog-to-digital converters (ADCs), but can only communicate in
a small number of directions at a time,limiting directional search, spatial
multiplexing and control signaling. Digital BF enables flexible spatial
processing, but must be operated at a low quantization resolution to stay
within reasonable power levels. This paper presents a simple additive white
Gaussian noise (AWGN) model to assess the effect of low resolution quantization
of cellular system capacity. Simulations with this model reveal that at
moderate resolutions (3-4 bits per ADC), there is negligible loss in downlink
cellular capacity from quantization. In essence, the low-resolution ADCs limit
the high SNR, where cellular systems typically do not operate. The findings
suggest that low-resolution fully digital BF architectures can be power
efficient, offer greatly enhanced control plane functionality and comparable
data plane performance to analog BF.
|
[
{
"version": "v1",
"created": "Sun, 5 Nov 2017 01:48:18 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Jan 2018 16:34:33 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Dutta",
"Sourjya",
""
],
[
"Barati",
"C. Nicolas",
""
],
[
"Dhananjay",
"Aditya",
""
],
[
"Rangan",
"Sundeep",
""
]
] |
new_dataset
| 0.999027 |
1801.00035
|
Luis A. Mateos
|
Luis A. Mateos
|
LaMMos - Latching Mechanism based on Motorized-screw for Reconfigurable
Robots and Exoskeleton Suits
|
14 pages, 15 figures
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reconfigurable robots refer to a category of robots that their components
(individual joints and links) can be assembled in multiple configurations and
geometries. Most of existing latching mechanisms are based on physical tools
such as hooks, cages or magnets, which limit the payload capacity. Therefore,
robots re- quire a latching mechanism which can help to reconfigure itself
without sacrificing the payload capability. This paper presents a latching
mechanism based on the flexible screw attaching principle. In which, actuators
are used to move the robot links and joints while connecting them with a
motorized-screw and dis- connecting them by unfastening the screw. The brackets
used in our mechanism configuration helps to hold maximum force up to 5000N.
The LaMMos - Latching Mechanism based on Motorized- screw has been applied to
the DeWaLoP - Developing Water Loss Prevention in-pipe robot. It helps the
robot to shrink its body to crawl into the pipe with minimum diameter, by
recon- figuring the leg positions. And it helps to recover the legs positions
to original status once the robot is inside the pipe. Also, LaMMos add
stiffness to the robot legs by dynamically integrate them to the structure.
Additionally, we present an application of the LaMMos mechanism to exoskeleton
suits, for easing the mo- tors from the joints when carrying heavy weights for
long periods of time. This mechanism offers many interesting opportunities for
robotics research in terms of functionality, pay- load and size.
|
[
{
"version": "v1",
"created": "Wed, 27 Dec 2017 17:01:52 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Mateos",
"Luis A.",
""
]
] |
new_dataset
| 0.980407 |
1801.00061
|
Jose Eduardo Novoa Ilic
|
Jos\'e Novoa, Juan Pablo Escudero, Josu\'e Fredes, Jorge Wuth, Rodrigo
Mahu and N\'estor Becerra Yoma
|
Multichannel Robot Speech Recognition Database: MChRSR
| null | null | null | null |
cs.HC cs.RO
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
In real human robot interaction (HRI) scenarios, speech recognition
represents a major challenge due to robot noise, background noise and
time-varying acoustic channel. This document describes the procedure used to
obtain the Multichannel Robot Speech Recognition Database (MChRSR). It is
composed of 12 hours of multichannel evaluation data recorded in a real mobile
HRI scenario. This database was recorded with a PR2 robot performing different
translational and azimuthal movements. Accordingly, 16 evaluation sets were
obtained re-recording the clean set of the Aurora 4 database in different
movement conditions.
|
[
{
"version": "v1",
"created": "Sat, 30 Dec 2017 00:01:08 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Novoa",
"José",
""
],
[
"Escudero",
"Juan Pablo",
""
],
[
"Fredes",
"Josué",
""
],
[
"Wuth",
"Jorge",
""
],
[
"Mahu",
"Rodrigo",
""
],
[
"Yoma",
"Néstor Becerra",
""
]
] |
new_dataset
| 0.999348 |
1801.00184
|
Raeid Saqur
|
Raeid Saqur
|
H4-Writer: A Text Entry Method Designed For Gaze Controlled Environment
with Low KSPC and Spatial Footprint
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a new text entry technique, namely H4-Writer, designed
for gaze controlled environments and aimed at reducing average KSPC . and
spatial footprint. It also presents an empirical evaluation of this proposed
system by using three different input devices: mouse, gamepad, and eye tracker.
The experiment was conducted using 9 participants and the obtained data were
used to compare the entry speeds, efficiency and KSPC of H4-Writer for all the
devices. Over three blocks, the average entry speed was 3.54 wpm for the mouse,
3.33 wpm for the gamepad and only 2.11 wpm for the eye tracker. While the eye
tracker fared poorly compared to the mouse and the gamepad on entry speed, it
showed significant improvement in entry speed over progressing blocks
indicating increase in entry speed with practice. A full longitudinal study was
conducted to indicate this.
The average KSPC of all the three devices over all the text phrases entered
was 2.62, which is significantly lower compared to other hand writing
recognizing text entry techniques like EdgeWrite. An analysis of the blocks
revealed improvement in error rate, efficiency and KSPC values with progressing
block numbers as the participants got more acclimatized with the key codes for
corresponding characters.
|
[
{
"version": "v1",
"created": "Sat, 30 Dec 2017 19:43:04 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Saqur",
"Raeid",
""
]
] |
new_dataset
| 0.986084 |
1801.00361
|
Jason Toy
|
Jason Toy
|
SenseNet: 3D Objects Database and Tactile Simulator
| null | null | null | null |
cs.AI cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The majority of artificial intelligence research, as it relates from which to
biological senses has been focused on vision. The recent explosion of machine
learning and in particular, dee p learning, can be partially attributed to the
release of high quality data sets for algorithm s from which to model the world
on. Thus, most of these datasets are comprised of images. We believe that
focusing on sensorimotor systems and tactile feedback will create algorithms
that better mimic human intelligence. Here we present SenseNet: a collection of
tactile simulators and a large scale dataset of 3D objects for manipulation.
SenseNet was created for the purpose of researching and training Artificial
Intelligences (AIs) to interact with the environment via sensorimotor neural
systems and tactile feedback. We aim to accelerate that same explosion in image
processing, but for the domain of tactile feedback and sensorimotor research.
We hope that SenseNet can offer researchers in both the machine learning and
computational neuroscience communities brand new opportunities and avenues to
explore.
|
[
{
"version": "v1",
"created": "Sun, 31 Dec 2017 21:50:15 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Toy",
"Jason",
""
]
] |
new_dataset
| 0.976409 |
1801.00606
|
Sarah Kamel
|
Sarah Kamel, Mireille Sarkiss, Mich\`ele Wigger, and Ghaya Rekaya-Ben
Othman
|
Secrecy Capacity-Memory Tradeoff of Erasure Broadcast Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper derives upper and lower bounds on the secrecy capacity-memory
tradeoff of a wiretap erasure broadcast channel (BC) with Kw weak receivers and
Ks strong receivers, where weak receivers, respectively strong receivers, have
same erasure probabilities and cache sizes. The lower bounds are achieved by
schemes that meticulously combine joint cache-channel coding with wiretap
coding and key-aided one-time pads. The presented upper bound holds more
generally for arbitrary degraded BCs and arbitrary cache sizes. When only weak
receivers have cache memories, upper and lower bounds coincide for small and
large cache memories, thus providing the exact secrecy capacity-memory tradeoff
for this setup. The derived bounds allow to further conclude that the secrecy
capacity is positive even when the eavesdropper is stronger than all the
legitimate receivers with cache memories. Moreover, they show that the secrecy
capacity-memory tradeoff can be significantly smaller than its non-secure
counterpart, but it grows much faster when cache memories are small. The paper
also presents a lower bound on the global secrecy capacity-memory tradeoff
where one is allowed to optimize the cache assignment subject to a total cache
budget. It is close to the best known lower bound without secrecy constraint.
For small total cache budget, the global secrecy capacity-memory tradeoff is
achieved by assigning all the available cache memory uniformly over all
receivers if the eavesdropper is stronger than all legitimate receivers, and it
is achieved by assigning the cache memory uniformly only over the weak
receivers if the eavesdropper is weaker than the strong receivers.
|
[
{
"version": "v1",
"created": "Tue, 2 Jan 2018 11:02:07 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Kamel",
"Sarah",
""
],
[
"Sarkiss",
"Mireille",
""
],
[
"Wigger",
"Michèle",
""
],
[
"Othman",
"Ghaya Rekaya-Ben",
""
]
] |
new_dataset
| 0.986563 |
1801.00687
|
Ilya Sergey
|
Ilya Sergey, Amrit Kumar, Aquinas Hobor
|
Scilla: a Smart Contract Intermediate-Level LAnguage
|
12 pages
| null | null | null |
cs.PL
|
http://creativecommons.org/licenses/by/4.0/
|
This paper outlines key design principles of Scilla---an intermediate-level
language for verified smart contracts.
Scilla provides a clean separation between the communication aspect of smart
contracts on a blockchain, allowing for the rich interaction patterns, and a
programming component, which enjoys principled semantics and is amenable to
formal verification. Scilla is not meant to be a high-level programming
language, and we are going to use it as a translation target for high-level
languages, such as Solidity, for performing program analysis and verification,
before further compilation to an executable bytecode.
We describe the automata-based model of Scilla, present its programming
component and show how contract definitions in terms of automata streamline the
process of mechanised verification of their safety and temporal properties.
|
[
{
"version": "v1",
"created": "Tue, 2 Jan 2018 15:31:24 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Sergey",
"Ilya",
""
],
[
"Kumar",
"Amrit",
""
],
[
"Hobor",
"Aquinas",
""
]
] |
new_dataset
| 0.999161 |
1801.00690
|
Yuval Tassa
|
Yuval Tassa, Yotam Doron, Alistair Muldal, Tom Erez, Yazhe Li, Diego
de Las Casas, David Budden, Abbas Abdolmaleki, Josh Merel, Andrew Lefrancq,
Timothy Lillicrap, Martin Riedmiller
|
DeepMind Control Suite
|
24 pages, 7 figures, 2 tables
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The DeepMind Control Suite is a set of continuous control tasks with a
standardised structure and interpretable rewards, intended to serve as
performance benchmarks for reinforcement learning agents. The tasks are written
in Python and powered by the MuJoCo physics engine, making them easy to use and
modify. We include benchmarks for several learning algorithms. The Control
Suite is publicly available at https://www.github.com/deepmind/dm_control . A
video summary of all tasks is available at http://youtu.be/rAai4QzcYbs .
|
[
{
"version": "v1",
"created": "Tue, 2 Jan 2018 15:48:14 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Tassa",
"Yuval",
""
],
[
"Doron",
"Yotam",
""
],
[
"Muldal",
"Alistair",
""
],
[
"Erez",
"Tom",
""
],
[
"Li",
"Yazhe",
""
],
[
"Casas",
"Diego de Las",
""
],
[
"Budden",
"David",
""
],
[
"Abdolmaleki",
"Abbas",
""
],
[
"Merel",
"Josh",
""
],
[
"Lefrancq",
"Andrew",
""
],
[
"Lillicrap",
"Timothy",
""
],
[
"Riedmiller",
"Martin",
""
]
] |
new_dataset
| 0.981088 |
1801.00712
|
Luis Meira
|
Luis A. A. Meira, Paulo S. Martins, Mauro Menzori, Guilherme A. Zeni
|
Multi-Objective Vehicle Routing Problem Applied to Large Scale Post
Office Deliveries
|
arXiv admin note: text overlap with arXiv:1610.05402
| null | null | null |
cs.AI cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The number of optimization techniques in the combinatorial domain is large
and diversified. Nevertheless, real-world based benchmarks for testing
algorithms are few. This work creates an extensible real-world mail delivery
benchmark to the Vehicle Routing Problem (VRP) in a planar graph embedded in
the 2D Euclidean space. Such problem is multi-objective on a roadmap with up to
25 vehicles and 30,000 deliveries per day. Each instance models one generic day
of mail delivery, allowing both comparison and validation of optimization
algorithms for routing problems. The benchmark may be extended to model other
scenarios.
|
[
{
"version": "v1",
"created": "Sat, 23 Dec 2017 14:23:22 GMT"
}
] | 2018-01-03T00:00:00 |
[
[
"Meira",
"Luis A. A.",
""
],
[
"Martins",
"Paulo S.",
""
],
[
"Menzori",
"Mauro",
""
],
[
"Zeni",
"Guilherme A.",
""
]
] |
new_dataset
| 0.999137 |
1712.09227
|
Murat Ozbayoglu
|
A. Murat Ozbayoglu, Gokhan Kucukayan, Erdogan Dogdu
|
A Real-Time Autonomous Highway Accident Detection Model Based on Big
Data Processing and Computational Intelligence
| null |
IEEE International Conference on Big Data, (2016), pp.1807-1813,
Washington D.C. 5-8 December, 2016
|
10.1109/BigData.2016.7840798
| null |
cs.AI stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to increasing urban population and growing number of motor vehicles,
traffic congestion is becoming a major problem of the 21st century. One of the
main reasons behind traffic congestion is accidents which can not only result
in casualties and losses for the participants, but also in wasted and lost time
for the others that are stuck behind the wheels. Early detection of an accident
can save lives, provides quicker road openings, hence decreases wasted time and
resources, and increases efficiency. In this study, we propose a preliminary
real-time autonomous accident-detection system based on computational
intelligence techniques. Istanbul City traffic-flow data for the year 2015 from
various sensor locations are populated using big data processing methodologies.
The extracted features are then fed into a nearest neighbor model, a regression
tree, and a feed-forward neural network model. For the output, the possibility
of an occurrence of an accident is predicted. The results indicate that even
though the number of false alarms dominates the real accident cases, the system
can still provide useful information that can be used for status verification
and early reaction to possible accidents.
|
[
{
"version": "v1",
"created": "Tue, 26 Dec 2017 10:17:13 GMT"
}
] | 2018-01-02T00:00:00 |
[
[
"Ozbayoglu",
"A. Murat",
""
],
[
"Kucukayan",
"Gokhan",
""
],
[
"Dogdu",
"Erdogan",
""
]
] |
new_dataset
| 0.998796 |
1605.08951
|
Oscar Temprano
|
Oscar Temprano
|
A handle is enough for a hard game of Pull
| null | null | null | null |
cs.CC
|
http://creativecommons.org/publicdomain/zero/1.0/
|
We are going to show that some variants of a puzzle called Pull in which the
boxes have handles (i.e. we can only pull the boxes in certain directions) are
NP-hard
|
[
{
"version": "v1",
"created": "Sun, 29 May 2016 00:02:16 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Dec 2017 01:13:01 GMT"
}
] | 2018-01-01T00:00:00 |
[
[
"Temprano",
"Oscar",
""
]
] |
new_dataset
| 0.983961 |
1708.03402
|
Kaveh Mahdaviani
|
Kaveh Mahdaviani, Soheil Mohajer, Ashish Khisti
|
Product Matrix MSR Codes with Bandwidth Adaptive Exact Repair
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a distributed storage systems (DSS) with $k$ systematic nodes, robustness
against node failure is commonly provided by storing redundancy in a number of
other nodes and performing repair mechanism to reproduce the content of the
failed nodes. Efficiency is then achieved by minimizing the storage overhead
and the amount of data transmission required for data reconstruction and
repair, provided by coding solutions such as regenerating codes [1]. Common
explicit regenerating code constructions enable efficient repair through
accessing a predefined number, $d$, of arbitrary chosen available nodes, namely
helpers. In practice, however, the state of the system dynamically changes
based on the request load, the link traffic, etc., and the parameters which
optimize system's performance vary accordingly. It is then desirable to have
coding schemes which are able to operate optimally under a range of different
parameters simultaneously. Specifically, adaptivity in the number of helper
nodes for repair is of interest. While robustness requires capability of
performing repair with small number of helpers, it is desirable to use as many
helpers as available to reduce the transmission delay and total repair traffic.
In this work we focus on the minimum storage regenerating (MSR) codes, where
each node is supposed to store $\alpha$ information units, and the source data
of size $k\alpha$ could be recovered from any arbitrary set of $k$ nodes. We
introduce a class MSR codes that realize optimal repair bandwidth
simultaneously with a set of different choices for the number of helpers,
namely $D=\{d_{1}, \cdots, d_{\delta}\}$. Our coding scheme follows the Product
Matrix (PM) framework introduced in [2], and could be considered as a
generalization of the PM MSR code presented in [2], such that any $d_{i} =
(i+1)(k-1)$ helpers can perform an optimal repair. ...
|
[
{
"version": "v1",
"created": "Thu, 10 Aug 2017 22:38:45 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Dec 2017 19:24:23 GMT"
}
] | 2018-01-01T00:00:00 |
[
[
"Mahdaviani",
"Kaveh",
""
],
[
"Mohajer",
"Soheil",
""
],
[
"Khisti",
"Ashish",
""
]
] |
new_dataset
| 0.978795 |
1711.00537
|
Nikolaus Correll
|
Nikolaus Correll and Christoffer Heckman
|
Materials that make robots smart
|
International Symposium on Robotics Research (ISRR), December, 2017
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We posit that embodied artificial intelligence is not only a computational,
but also a materials problem. While the importance of material and structural
properties in the control loop are well understood, materials can take an
active role during control by tight integration of sensors, actuators,
computation and communication. We envision such materials to abstract
functionality, therefore making the construction of intelligent robots more
straightforward and robust. For example, robots could be made of bones that
measure load, muscles that move, skin that provides the robot with information
about the kind and location of tactile sensations ranging from pressure, to
texture and damage, eyes that extract high-level information, and brain
material that provides computation in a scalable manner. Such materials will
not resemble any existing engineered materials, but rather the heterogeneous
components out of which their natural counterparts are made. We describe the
state-of-the-art in so-called "robotic materials", their opportunities for
revolutionizing applications ranging from manipulation to autonomous driving,
and open challenges the robotics community needs to address in collaboration
with allies, such as wireless sensor network researchers and polymer
scientists.
|
[
{
"version": "v1",
"created": "Wed, 1 Nov 2017 20:49:29 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Dec 2017 01:00:58 GMT"
}
] | 2018-01-01T00:00:00 |
[
[
"Correll",
"Nikolaus",
""
],
[
"Heckman",
"Christoffer",
""
]
] |
new_dataset
| 0.987062 |
1711.03213
|
Judy Hoffman
|
Judy Hoffman, Eric Tzeng, Taesung Park, Jun-Yan Zhu, Phillip Isola,
Kate Saenko, Alexei A. Efros, Trevor Darrell
|
CyCADA: Cycle-Consistent Adversarial Domain Adaptation
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Domain adaptation is critical for success in new, unseen environments.
Adversarial adaptation models applied in feature spaces discover domain
invariant representations, but are difficult to visualize and sometimes fail to
capture pixel-level and low-level domain shifts. Recent work has shown that
generative adversarial networks combined with cycle-consistency constraints are
surprisingly effective at mapping images between domains, even without the use
of aligned image pairs. We propose a novel discriminatively-trained
Cycle-Consistent Adversarial Domain Adaptation model. CyCADA adapts
representations at both the pixel-level and feature-level, enforces
cycle-consistency while leveraging a task loss, and does not require aligned
pairs. Our model can be applied in a variety of visual recognition and
prediction settings. We show new state-of-the-art results across multiple
adaptation tasks, including digit classification and semantic segmentation of
road scenes demonstrating transfer from synthetic to real world domains.
|
[
{
"version": "v1",
"created": "Wed, 8 Nov 2017 23:54:52 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Dec 2017 02:52:43 GMT"
},
{
"version": "v3",
"created": "Fri, 29 Dec 2017 05:00:37 GMT"
}
] | 2018-01-01T00:00:00 |
[
[
"Hoffman",
"Judy",
""
],
[
"Tzeng",
"Eric",
""
],
[
"Park",
"Taesung",
""
],
[
"Zhu",
"Jun-Yan",
""
],
[
"Isola",
"Phillip",
""
],
[
"Saenko",
"Kate",
""
],
[
"Efros",
"Alexei A.",
""
],
[
"Darrell",
"Trevor",
""
]
] |
new_dataset
| 0.996025 |
1712.04427
|
Bainan Xia
|
Bainan Xia, Srinivas Shakkottai and Vijay Subramanian
|
Small-Scale Markets for Bilateral Resource Trading in the Sharing
Economy
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a general small-scale market for agent-to-agent resource sharing,
in which each agent could either be a server (seller) or a client (buyer) in
each time period. In every time period, a server has a certain amount of
resources that any client could consume, and randomly gets matched with a
client. Our target is to maximize the resource utilization in such an
agent-to-agent market, where the agents are strategic. During each transaction,
the server gets money and the client gets resources. Hence, trade ratio
maximization implies efficiency maximization of our system. We model the
proposed market system through a Mean Field Game approach and prove the
existence of the Mean Field Equilibrium, which can achieve an almost 100% trade
ratio. Finally, we carry out a simulation study motivated by an agent-to-agent
computing market, and a case study on a proposed photovoltaic market, and show
the designed market benefits both individuals and the system as a whole.
|
[
{
"version": "v1",
"created": "Tue, 12 Dec 2017 18:38:23 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Dec 2017 06:20:21 GMT"
}
] | 2018-01-01T00:00:00 |
[
[
"Xia",
"Bainan",
""
],
[
"Shakkottai",
"Srinivas",
""
],
[
"Subramanian",
"Vijay",
""
]
] |
new_dataset
| 0.975885 |
1712.10167
|
Robert Luko\v{t}ka
|
Robert Luko\v{t}ka, J\'an Maz\'ak
|
Simple cubic graphs with no short traveling salesman tour
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $tsp(G)$ denote the length of a shortest travelling salesman tour in a
graph $G$. We prove that for any $\varepsilon>0$, there exists a simple
$2$-connected planar cubic graph $G_1$ such that $tsp(G_1)\ge
(1.25-\varepsilon)\cdot|V(G_1)|$, a simple $2$-connected bipartite cubic graph
$G_2$ such that $tsp(G_2)\ge (1.2-\varepsilon)\cdot|V(G_2)|$, and a simple
$3$-connected cubic graph $G_3$ such that $tsp(G_3)\ge
(1.125-\varepsilon)\cdot|V(G_3)|$.
|
[
{
"version": "v1",
"created": "Fri, 29 Dec 2017 10:30:11 GMT"
}
] | 2018-01-01T00:00:00 |
[
[
"Lukoťka",
"Robert",
""
],
[
"Mazák",
"Ján",
""
]
] |
new_dataset
| 0.998695 |
1712.10179
|
Juan Juli\'an Merelo-Guerv\'os Pr.
|
Juan J. Merelo-Guerv\'os, Antonio Fern\'andez-Ares, Antonio \'Alvarez
Caballero, Pablo Garc\'ia-S\'anchez, Victor Rivas
|
RedDwarfData: a simplified dataset of StarCraft matches
| null | null | null |
GeNeura 2017-12-01
|
cs.AI
|
http://creativecommons.org/licenses/by-sa/4.0/
|
The game Starcraft is one of the most interesting arenas to test new machine
learning and computational intelligence techniques; however, StarCraft matches
take a long time and creating a good dataset for training can be hard. Besides,
analyzing match logs to extract the main characteristics can also be done in
many different ways to the point that extracting and processing data itself can
take an inordinate amount of time and of course, depending on what you choose,
can bias learning algorithms. In this paper we present a simplified dataset
extracted from the set of matches published by Robinson and Watson, which we
have called RedDwarfData, containing several thousand matches processed to
frames, so that temporal studies can also be undertaken. This dataset is
available from GitHub under a free license. An initial analysis and appraisal
of these matches is also made.
|
[
{
"version": "v1",
"created": "Fri, 29 Dec 2017 11:06:16 GMT"
}
] | 2018-01-01T00:00:00 |
[
[
"Merelo-Guervós",
"Juan J.",
""
],
[
"Fernández-Ares",
"Antonio",
""
],
[
"Caballero",
"Antonio Álvarez",
""
],
[
"García-Sánchez",
"Pablo",
""
],
[
"Rivas",
"Victor",
""
]
] |
new_dataset
| 0.999629 |
1712.10193
|
Xi Zhao
|
Xi Zhao, Yong Ding, Quanyu Zhao
|
A multi-candidate electronic voting scheme with unlimited participants
|
6 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper a new multi-candidate electronic voting scheme is constructed
with unlimited participants. The main idea is to express a ballot to allow
voting for up to k out of the m candidates and unlimited participants. The
purpose of vote is to select more than one winner among $m$ candidates. Our
result is complementary to the result by Sun peiyong$'$ s scheme, in the sense,
their scheme is not amenable for large-scale electronic voting due to flaw of
ballot structure. In our scheme the vote is split and hidden, and tallying is
made for $G\ddot{o}del$ encoding in decimal base without any trusted third
party, and the result does not rely on any traditional cryptography or
computational intractable assumption. Thus the proposed scheme not only solves
the problem of ballot structure, but also achieves the security including
perfect ballot secrecy, receipt-free, robustness, fairness and
dispute-freeness.
|
[
{
"version": "v1",
"created": "Fri, 29 Dec 2017 11:52:23 GMT"
}
] | 2018-01-01T00:00:00 |
[
[
"Zhao",
"Xi",
""
],
[
"Ding",
"Yong",
""
],
[
"Zhao",
"Quanyu",
""
]
] |
new_dataset
| 0.994583 |
1607.03132
|
Renaud-Alexandre Pitaval
|
Renaud-Alexandre Pitaval, Lu Wei, Olav Tirkkonen, and Camilla Hollanti
|
Density of Spherically-Embedded Stiefel and Grassmann Codes
|
Two-column version (24 pages, 6 figures, 4 tables). To appear in IEEE
Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The density of a code is the fraction of the coding space covered by packing
balls centered around the codewords. This paper investigates the density of
codes in the complex Stiefel and Grassmann manifolds equipped with the chordal
distance. The choice of distance enables the treatment of the manifolds as
subspaces of Euclidean hyperspheres. In this geometry, the densest packings are
not necessarily equivalent to maximum-minimum-distance codes. Computing a
code's density follows from computing: i) the normalized volume of a metric
ball and ii) the kissing radius, the radius of the largest balls one can pack
around the codewords without overlapping. First, the normalized volume of a
metric ball is evaluated by asymptotic approximations. The volume of a small
ball can be well-approximated by the volume of a locally-equivalent tangential
ball. In order to properly normalize this approximation, the precise volumes of
the manifolds induced by their spherical embedding are computed. For larger
balls, a hyperspherical cap approximation is used, which is justified by a
volume comparison theorem showing that the normalized volume of a ball in the
Stiefel or Grassmann manifold is asymptotically equal to the normalized volume
of a ball in its embedding sphere as the dimension grows to infinity. Then,
bounds on the kissing radius are derived alongside corresponding bounds on the
density. Unlike spherical codes or codes in flat spaces, the kissing radius of
Grassmann or Stiefel codes cannot be exactly determined from its minimum
distance. It is nonetheless possible to derive bounds on density as functions
of the minimum distance. Stiefel and Grassmann codes have larger density than
their image spherical codes when dimensions tend to infinity. Finally, the
bounds on density lead to refinements of the standard Hamming bounds for
Stiefel and Grassmann codes.
|
[
{
"version": "v1",
"created": "Mon, 11 Jul 2016 20:10:42 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Oct 2016 17:03:57 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Dec 2017 13:51:42 GMT"
},
{
"version": "v4",
"created": "Wed, 27 Dec 2017 14:58:04 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Pitaval",
"Renaud-Alexandre",
""
],
[
"Wei",
"Lu",
""
],
[
"Tirkkonen",
"Olav",
""
],
[
"Hollanti",
"Camilla",
""
]
] |
new_dataset
| 0.955453 |
1704.07123
|
Yingxiao Zhang
|
Yingxiao Zhang, Suzhi Bi, and Ying-Jun Angela Zhang
|
Joint Spectrum Reservation and On-demand Request for Mobile Virtual
Network Operators
|
corrected typos; re-organise the presentation of the analytical
result
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With wireless network virtualization, Mobile Virtual Network Operators
(MVNOs) can develop new services on a low-cost platform by leasing virtual
resources from mobile network owners. In this paper, we investigate a two-stage
spectrum leasing framework, where an MVNO acquires radio spectrum through both
advance reservation and on-demand request. To maximize its surplus, the MVNO
jointly optimizes the amount of spectrum to lease in the two stages by taking
into account the traffic distribution, random user locations, wireless channel
statistics, Quality of Service (QoS) requirements, and the prices differences.
Meanwhile, the acquired spectrum resources are dynamically allocated to the
MVNO's mobile subscribers (users) according to fast channel fadings in order to
maximize the utilization of the resources. The MVNO's surplus maximization
problem is naturally formulated as a tri-level nested optimization problem that
consists of Dynamic Resource Allocation (DRA), on-demand request, and advance
reservation subproblems. To solve the problem efficiently, we rigorously
analyze the structure of the optimal solution in the DRA problem, and the
optimal value is used to find the optimal leasing decisions in the two stages.
In particular, we derive closed-form expressions of the optimal advance
reservation and on-demand requests when the proportional fair utility function
is adopted. We further extend the analysis to general utility functions and
derive a Stochastic Gradient Decent (SGD) algorithm to find the optimal leasing
decisions. Simulation results show that the two-stage spectrum leasing strategy
can take advantage of both the price discount of advance reservation and the
flexibility of on-demand request to deal with traffic variations.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2017 10:12:34 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Dec 2017 21:54:38 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Zhang",
"Yingxiao",
""
],
[
"Bi",
"Suzhi",
""
],
[
"Zhang",
"Ying-Jun Angela",
""
]
] |
new_dataset
| 0.995371 |
1712.05898
|
Yifan Peng
|
Yifan Peng and Xiaosong Wang and Le Lu and Mohammadhadi Bagheri and
Ronald Summers and Zhiyong Lu
|
NegBio: a high-performance tool for negation and uncertainty detection
in radiology reports
|
Final version. Accepted for publication in AMIA 2018 Informatics
Summit. 9 pages, 2 figures, 4 tables
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Negative and uncertain medical findings are frequent in radiology reports,
but discriminating them from positive findings remains challenging for
information extraction. Here, we propose a new algorithm, NegBio, to detect
negative and uncertain findings in radiology reports. Unlike previous
rule-based methods, NegBio utilizes patterns on universal dependencies to
identify the scope of triggers that are indicative of negation or uncertainty.
We evaluated NegBio on four datasets, including two public benchmarking corpora
of radiology reports, a new radiology corpus that we annotated for this work,
and a public corpus of general clinical texts. Evaluation on these datasets
demonstrates that NegBio is highly accurate for detecting negative and
uncertain findings and compares favorably to a widely-used state-of-the-art
system NegEx (an average of 9.5% improvement in precision and 5.1% in
F1-score).
|
[
{
"version": "v1",
"created": "Sat, 16 Dec 2017 03:43:42 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Dec 2017 03:44:03 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Peng",
"Yifan",
""
],
[
"Wang",
"Xiaosong",
""
],
[
"Lu",
"Le",
""
],
[
"Bagheri",
"Mohammadhadi",
""
],
[
"Summers",
"Ronald",
""
],
[
"Lu",
"Zhiyong",
""
]
] |
new_dataset
| 0.992688 |
1712.07947
|
Ming Zhu
|
Ming Zhu, Xiao-Yang Liu, and Xiaodong Wang
|
Joint Transportation and Charging Scheduling in Public Vehicle Systems -
A Game Theoretic Approach
|
13 pages
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Public vehicle (PV) systems are promising transportation systems for future
smart cities which provide dynamic ride-sharing services according to
passengers' requests. PVs are driverless/self-driving electric vehicles which
require frequent recharging from smart grids. For such systems, the challenge
lies in both the efficient scheduling scheme to satisfy transportation demands
with service guarantee and the cost-effective charging strategy under the
real-time electricity pricing. In this paper, we study the joint transportation
and charging scheduling for PV systems to balance the transportation and
charging demands, ensuring the long-term operation. We adopt a cake cutting
game model to capture the interactions among PV groups, the cloud and smart
grids. The cloud announces strategies to coordinate the allocation of
transportation and energy resources among PV groups. All the PV groups try to
maximize their joint transportation and charging utilities. We propose an
algorithm to obtain the unique normalized Nash equilibrium point for this
problem. Simulations are performed to confirm the effects of our scheme under
the real taxi and power grid data sets of New York City. Our results show that
our scheme achieves almost the same transportation performance compared with a
heuristic scheme, namely, transportation with greedy charging; however, the
average energy price of the proposed scheme is 10.86% lower than the latter
one.
|
[
{
"version": "v1",
"created": "Wed, 20 Dec 2017 16:27:45 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Dec 2017 01:43:44 GMT"
},
{
"version": "v3",
"created": "Wed, 27 Dec 2017 02:01:07 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Zhu",
"Ming",
""
],
[
"Liu",
"Xiao-Yang",
""
],
[
"Wang",
"Xiaodong",
""
]
] |
new_dataset
| 0.996703 |
1712.09356
|
Ming Zhu
|
Ming Zhu, Xiao-Yang Liu, and Xiaodong Wang
|
An Online Ride-Sharing Path Planning Strategy for Public Vehicle Systems
|
12 pages
| null | null | null |
cs.AI cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As efficient traffic-management platforms, public vehicle (PV) systems are
envisioned to be a promising approach to solving traffic congestions and
pollutions for future smart cities. PV systems provide online/dynamic
peer-to-peer ride-sharing services with the goal of serving sufficient number
of customers with minimum number of vehicles and lowest possible cost. A key
component of the PV system is the online ride-sharing scheduling strategy. In
this paper, we propose an efficient path planning strategy that focuses on a
limited potential search area for each vehicle by filtering out the requests
that violate passenger service quality level, so that the global search is
reduced to local search. We analyze the performance of the proposed solution
such as reduction ratio of computational complexity. Simulations based on the
Manhattan taxi data set show that, the computing time is reduced by 22%
compared with the exhaustive search method under the same service quality
performance.
|
[
{
"version": "v1",
"created": "Wed, 27 Dec 2017 01:48:47 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Zhu",
"Ming",
""
],
[
"Liu",
"Xiao-Yang",
""
],
[
"Wang",
"Xiaodong",
""
]
] |
new_dataset
| 0.950708 |
1712.09392
|
Joshua Engelsma
|
Joshua J. Engelsma, Kai Cao, and Anil K. Jain
|
RaspiReader: Open Source Fingerprint Reader
|
substantial text overlap with arXiv:1708.07887
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We open source an easy to assemble, spoof resistant, high resolution, optical
fingerprint reader, called RaspiReader, using ubiquitous components. By using
our open source STL files and software, RaspiReader can be built in under one
hour for only US $175. As such, RaspiReader provides the fingerprint research
community a seamless and simple method for quickly prototyping new ideas
involving fingerprint reader hardware. In particular, we posit that this open
source fingerprint reader will facilitate the exploration of novel fingerprint
spoof detection techniques involving both hardware and software. We demonstrate
one such spoof detection technique by specially customizing RaspiReader with
two cameras for fingerprint image acquisition. One camera provides high
contrast, frustrated total internal reflection (FTIR) fingerprint images, and
the other outputs direct images of the finger in contact with the platen. Using
both of these image streams, we extract complementary information which, when
fused together and used for spoof detection, results in marked performance
improvement over previous methods relying only on grayscale FTIR images
provided by COTS optical readers. Finally, fingerprint matching experiments
between images acquired from the FTIR output of RaspiReader and images acquired
from a COTS reader verify the interoperability of the RaspiReader with existing
COTS optical readers.
|
[
{
"version": "v1",
"created": "Tue, 26 Dec 2017 20:21:17 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Engelsma",
"Joshua J.",
""
],
[
"Cao",
"Kai",
""
],
[
"Jain",
"Anil K.",
""
]
] |
new_dataset
| 0.978447 |
1712.09528
|
Stefan Heindorf
|
Martin Potthast (1), Stefan Heindorf (2), Hannah Bast (3) ((1) Leipzig
University, (2) Paderborn University, (3) University of Freiburg)
|
Proceedings of the WSDM Cup 2017: Vandalism Detection and Triple Scoring
|
Proceedings of the WSDM Cup 2017
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The WSDM Cup 2017 was a data mining challenge held in conjunction with the
10th International Conference on Web Search and Data Mining (WSDM). It
addressed key challenges of knowledge bases today: quality assurance and entity
search. For quality assurance, we tackle the task of vandalism detection, based
on a dataset of more than 82 million user-contributed revisions of the Wikidata
knowledge base, all of which annotated with regard to whether or not they are
vandalism. For entity search, we tackle the task of triple scoring, using a
dataset that comprises relevance scores for triples from type-like relations
including occupation and country of citizenship, based on about 10,000 human
relevance judgements. For reproducibility sake, participants were asked to
submit their software on TIRA, a cloud-based evaluation platform, and they were
incentivized to share their approaches open source.
|
[
{
"version": "v1",
"created": "Wed, 27 Dec 2017 08:49:08 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Potthast",
"Martin",
""
],
[
"Heindorf",
"Stefan",
""
],
[
"Bast",
"Hannah",
""
]
] |
new_dataset
| 0.979505 |
1712.09791
|
Kalpana Mahalingam
|
William Suresh Kumar, Kalpana Mahalingam, Raghavan Rama
|
Label Languages of 8-directional Array P System
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An 8-directional array P system is one where the rewriting of an array can
happen in any 8-directions. The array rules of such a system are labelled thus
resulting in a labelled 8-directional array P system. The labelling is not
unique and the label language is obtained by recording the strings over the
labels used in any terminating derivation of the P system. The system is shown
to generate interesting pictures. The label language is compared with Chomsky
hierarchy.
|
[
{
"version": "v1",
"created": "Thu, 28 Dec 2017 08:59:26 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Kumar",
"William Suresh",
""
],
[
"Mahalingam",
"Kalpana",
""
],
[
"Rama",
"Raghavan",
""
]
] |
new_dataset
| 0.99961 |
1712.09876
|
Emanuel Onica
|
Mihai Rotaru, Florentin Olariu, Emanuel Onica, Etienne Rivi\`ere
|
Reliable Messaging to Millions of Users with MigratoryData
| null |
Middleware 2017 - Proceedings of the 18th ACM/IFIP/USENIX
Middleware Conference: Industrial Track, Pages 1-7
|
10.1145/3154448.3154449
| null |
cs.DC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web-based notification services are used by a large range of businesses to
selectively distribute live updates to customers, following the
publish/subscribe (pub/sub) model. Typical deployments can involve millions of
subscribers expecting ordering and delivery guarantees together with low
latencies. Notification services must be vertically and horizontally scalable,
and adopt replication to provide a reliable service. We report our experience
building and operating MigratoryData, a highly-scalable notification service.
We discuss the typical requirements of MigratoryData customers, and describe
the architecture and design of the service, focusing on scalability and fault
tolerance. Our evaluation demonstrates the ability of MigratoryData to handle
millions of concurrent connections and support a reliable notification service
despite server failures and network disconnections.
|
[
{
"version": "v1",
"created": "Thu, 28 Dec 2017 14:48:28 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Rotaru",
"Mihai",
""
],
[
"Olariu",
"Florentin",
""
],
[
"Onica",
"Emanuel",
""
],
[
"Rivière",
"Etienne",
""
]
] |
new_dataset
| 0.989589 |
1712.09916
|
Fatemeh Afghah
|
Fatemeh Afghah, Bertrand Cambou, Masih Abedini, Sherali Zeadally
|
A ReRAM Physically Unclonable Function (ReRAM PUF)-based Approach to
Enhance Authentication Security in Software Defined Wireless Networks
|
16 pages, 10 figures, submitted to Springer International Journal of
Wireless Information Networks
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The exponentially increasing number of ubiquitous wireless devices connected
to the Internet in Internet of Things (IoT) networks highlights the need for a
new paradigm of data flow management in such large-scale networks under
software defined wireless networking (SDWN). The limited power and computation
capability available at IoT devices as well as the centralized management and
decision-making approach in SDWN introduce a whole new set of security threats
to the networks. In particular, the authentication mechanism between the
controllers and the forwarding devices in SDWNs is a key challenge from both
secrecy and integrity aspects. Conventional authentication protocols based on
public key infrastructure (PKI) are no longer sufficient for these networks
considering the large-scale and heterogeneity nature of the networks as well as
their deployment cost, and security vulnerabilities due to key distribution and
storage. We propose a novel security protocol based on physical unclonable
functions (PUFs) known as hardware security primitives to enhance the
authentication security in SDWNs. In this approach, digital PUFs are developed
using the inherent randomness of the nanomaterials of Resistive Random Access
Memory (ReRAM) that are embedded in most IoT devices to enable a secure
authentication and access control in these networks. These PUFs are developed
based on a novel approach of multi-states, in which the natural drifts due to
the physical variations in the environment are predicted to reduce the
potential errors in challenge-response pairs of PUFs being tested in different
situations. We also proposed a PUF-based PKI protocol to secure the controller
in SDWNs. The performance of the developed ReRAM-based PUFs are evaluated in
the experimental results.
|
[
{
"version": "v1",
"created": "Thu, 21 Dec 2017 18:54:36 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Afghah",
"Fatemeh",
""
],
[
"Cambou",
"Bertrand",
""
],
[
"Abedini",
"Masih",
""
],
[
"Zeadally",
"Sherali",
""
]
] |
new_dataset
| 0.999139 |
1712.09967
|
Michael A. Forbes
|
Michael A. Forbes and Amir Shpilka
|
A PSPACE Construction of a Hitting Set for the Closure of Small
Algebraic Circuits
| null | null | null | null |
cs.CC math.AG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study the complexity of constructing a hitting set for the
closure of VP, the class of polynomials that can be infinitesimally
approximated by polynomials that are computed by polynomial sized algebraic
circuits, over the real or complex numbers. Specifically, we show that there is
a PSPACE algorithm that given n,s,r in unary outputs a set of n-tuples over the
rationals of size poly(n,s,r), with poly(n,s,r) bit complexity, that hits all
n-variate polynomials of degree-r that are the limit of size-s algebraic
circuits. Previously it was known that a random set of this size is a hitting
set, but a construction that is certified to work was only known in EXPSPACE
(or EXPH assuming the generalized Riemann hypothesis). As a corollary we get
that a host of other algebraic problems such as Noether Normalization Lemma,
can also be solved in PSPACE deterministically, where earlier only randomized
algorithms and EXPSPACE algorithms (or EXPH assuming the generalized Riemann
hypothesis) were known.
The proof relies on the new notion of a robust hitting set which is a set of
inputs such that any nonzero polynomial that can be computed by a polynomial
size algebraic circuit, evaluates to a not too small value on at least one
element of the set. Proving the existence of such a robust hitting set is the
main technical difficulty in the proof.
Our proof uses anti-concentration results for polynomials, basic tools from
algebraic geometry and the existential theory of the reals.
|
[
{
"version": "v1",
"created": "Thu, 28 Dec 2017 18:23:01 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Forbes",
"Michael A.",
""
],
[
"Shpilka",
"Amir",
""
]
] |
new_dataset
| 0.998632 |
1712.10009
|
Gane Samb Lo
|
Gane Samb Lo
|
VB and R codes using Households databases available in the NSI's : A
prelude to statistical applied studies
|
42 pages, 3 figures
| null |
10.16929/ajas/206
| null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe the main features of the households databases we can find in most
of our National Statistics Institute. We provide algorithms aimed at extracting
a diversity of variables on which different statistical procedures may be
applied. Here, we particularly focus on the scaled income, as a beginning.
Associated codes (MS Visual Basic and R codes) have been successfully tested
and delivered in the text and in a separate file
|
[
{
"version": "v1",
"created": "Mon, 25 Dec 2017 19:29:07 GMT"
}
] | 2017-12-29T00:00:00 |
[
[
"Lo",
"Gane Samb",
""
]
] |
new_dataset
| 0.999588 |
1604.00617
|
Gustavo Ch\'avez
|
Gustavo Ch\'avez, George Turkiyyah, David Keyes
|
A Direct Elliptic Solver Based on Hierarchically Low-rank Schur
Complements
| null | null |
10.1007/978-3-319-52389-7_12
| null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A parallel fast direct solver for rank-compressible block tridiagonal linear
systems is presented. Algorithmic synergies between Cyclic Reduction and
Hierarchical matrix arithmetic operations result in a solver with $O(N \log^2
N)$ arithmetic complexity and $O(N \log N)$ memory footprint. We provide a
baseline for performance and applicability by comparing with well known
implementations of the $\mathcal{H}$-LU factorization and algebraic multigrid
with a parallel implementation that leverages the concurrency features of the
method. Numerical experiments reveal that this method is comparable with other
fast direct solvers based on Hierarchical Matrices such as $\mathcal{H}$-LU and
that it can tackle problems where algebraic multigrid fails to converge.
|
[
{
"version": "v1",
"created": "Sun, 3 Apr 2016 09:52:40 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Chávez",
"Gustavo",
""
],
[
"Turkiyyah",
"George",
""
],
[
"Keyes",
"David",
""
]
] |
new_dataset
| 0.957923 |
1609.03750
|
Lars Ailo Bongo
|
Inge Alexander Raknes, Bj{\o}rn Fjukstad, Lars Ailo Bongo
|
nsroot: Minimalist Process Isolation Tool Implemented With Linux
Namespaces
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Data analyses in the life sciences are moving from tools run on a personal
computer to services run on large computing platforms. This creates a need to
package tools and dependencies for easy installation, configuration and
deployment on distributed platforms. In addition, for secure execution there is
a need for process isolation on a shared platform. Existing virtual machine and
container technologies are often more complex than traditional Unix utilities,
like chroot, and often require root privileges in order to set up or use. This
is especially challenging on HPC systems where users typically do not have root
access. We therefore present nsroot, a lightweight Linux namespaces based
process isolation tool. It allows restricting the runtime environment of data
analysis tools that may not have been designed with security as a top priority,
in order to reduce the risk and consequences of security breaches, without
requiring any special privileges. The codebase of nsroot is small, and it
provides a command line interface similar to chroot. It can be used on all
Linux kernels that implement user namespaces. In addition, we propose combining
nsroot with the AppImage format for secure execution of packaged applications.
nsroot is open sourced and available at: https://github.com/uit-no/nsroot
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2016 10:12:05 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Raknes",
"Inge Alexander",
""
],
[
"Fjukstad",
"Bjørn",
""
],
[
"Bongo",
"Lars Ailo",
""
]
] |
new_dataset
| 0.992996 |
1709.06307
|
Dat Quoc Nguyen
|
Dat Quoc Nguyen, Dai Quoc Nguyen, Thanh Vu, Mark Dras, Mark Johnson
|
A Fast and Accurate Vietnamese Word Segmenter
|
In Proceedings of the 11th International Conference on Language
Resources and Evaluation (LREC 2018), to appear
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel approach to Vietnamese word segmentation. Our approach is
based on the Single Classification Ripple Down Rules methodology (Compton and
Jansen, 1990), where rules are stored in an exception structure and new rules
are only added to correct segmentation errors given by existing rules.
Experimental results on the benchmark Vietnamese treebank show that our
approach outperforms previous state-of-the-art approaches JVnSegmenter,
vnTokenizer, DongDu and UETsegmenter in terms of both accuracy and performance
speed. Our code is open-source and available at:
https://github.com/datquocnguyen/RDRsegmenter.
|
[
{
"version": "v1",
"created": "Tue, 19 Sep 2017 09:16:09 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Dec 2017 08:51:17 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Nguyen",
"Dat Quoc",
""
],
[
"Nguyen",
"Dai Quoc",
""
],
[
"Vu",
"Thanh",
""
],
[
"Dras",
"Mark",
""
],
[
"Johnson",
"Mark",
""
]
] |
new_dataset
| 0.963282 |
1711.05225
|
Pranav Rajpurkar
|
Pranav Rajpurkar, Jeremy Irvin, Kaylie Zhu, Brandon Yang, Hershel
Mehta, Tony Duan, Daisy Ding, Aarti Bagul, Curtis Langlotz, Katie Shpanskaya,
Matthew P. Lungren, Andrew Y. Ng
|
CheXNet: Radiologist-Level Pneumonia Detection on Chest X-Rays with Deep
Learning
| null | null | null | null |
cs.CV cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop an algorithm that can detect pneumonia from chest X-rays at a
level exceeding practicing radiologists. Our algorithm, CheXNet, is a 121-layer
convolutional neural network trained on ChestX-ray14, currently the largest
publicly available chest X-ray dataset, containing over 100,000 frontal-view
X-ray images with 14 diseases. Four practicing academic radiologists annotate a
test set, on which we compare the performance of CheXNet to that of
radiologists. We find that CheXNet exceeds average radiologist performance on
the F1 metric. We extend CheXNet to detect all 14 diseases in ChestX-ray14 and
achieve state of the art results on all 14 diseases.
|
[
{
"version": "v1",
"created": "Tue, 14 Nov 2017 17:58:50 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Nov 2017 04:21:27 GMT"
},
{
"version": "v3",
"created": "Mon, 25 Dec 2017 11:09:06 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Rajpurkar",
"Pranav",
""
],
[
"Irvin",
"Jeremy",
""
],
[
"Zhu",
"Kaylie",
""
],
[
"Yang",
"Brandon",
""
],
[
"Mehta",
"Hershel",
""
],
[
"Duan",
"Tony",
""
],
[
"Ding",
"Daisy",
""
],
[
"Bagul",
"Aarti",
""
],
[
"Langlotz",
"Curtis",
""
],
[
"Shpanskaya",
"Katie",
""
],
[
"Lungren",
"Matthew P.",
""
],
[
"Ng",
"Andrew Y.",
""
]
] |
new_dataset
| 0.999687 |
1711.07736
|
Aadhavan Sadasivam
|
S Aadhavan, P Renjith, and N Sadagopan
|
On $P_5$-free Chordal bipartite graphs
|
Presented in ICMCE 2017
| null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A bipartite graph is chordal bipartite if every cycle of length at least 6
has a chord in it. In this paper, we investigate the structure of $P_5$-free
chordal bipartite graphs and show that these graphs have a Nested Neighborhood
Ordering, a special ordering among its vertices. Further, using this ordering,
we present polynomial-time algorithms for classical problems such as
Hamiltonian cycle (path) and longest path. Two variants of Hamiltonian path
include Steiner path and minimum leaf spanning tree, and we obtain
polynomial-time algorithms for these problems as well restricted to $P_5$-free
chordal bipartite graphs.
|
[
{
"version": "v1",
"created": "Tue, 21 Nov 2017 12:04:03 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Dec 2017 11:43:22 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Aadhavan",
"S",
""
],
[
"Renjith",
"P",
""
],
[
"Sadagopan",
"N",
""
]
] |
new_dataset
| 0.999533 |
1712.08690
|
Aneesh Rangnekar
|
Aneesh Rangnekar, Nilay Mokashi, Emmett Ientilucci, Christopher Kanan
and Matthew Hoffman
|
Aerial Spectral Super-Resolution using Conditional Adversarial Networks
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inferring spectral signatures from ground based natural images has acquired a
lot of interest in applied deep learning. In contrast to the spectra of ground
based images, aerial spectral images have low spatial resolution and suffer
from higher noise interference. In this paper, we train a conditional
adversarial network to learn an inverse mapping from a trichromatic space to 31
spectral bands within 400 to 700 nm. The network is trained on AeroCampus, a
first of its kind aerial hyperspectral dataset. AeroCampus consists of high
spatial resolution color images and low spatial resolution hyperspectral images
(HSI). Color images synthesized from 31 spectral bands are used to train our
network. With a baseline root mean square error of 2.48 on the synthesized RGB
test data, we show that it is possible to generate spectral signatures in
aerial imagery.
|
[
{
"version": "v1",
"created": "Sat, 23 Dec 2017 00:21:20 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Rangnekar",
"Aneesh",
""
],
[
"Mokashi",
"Nilay",
""
],
[
"Ientilucci",
"Emmett",
""
],
[
"Kanan",
"Christopher",
""
],
[
"Hoffman",
"Matthew",
""
]
] |
new_dataset
| 0.999468 |
1712.08745
|
Kunfeng Wang
|
Wenwen Zhang, Kunfeng Wang, Hua Qu, Jihong Zhao, and Fei-Yue Wang
|
Scene-Specific Pedestrian Detection Based on Parallel Vision
|
To be published in IEEE ITSC 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As a special type of object detection, pedestrian detection in generic scenes
has made a significant progress trained with large amounts of labeled training
data manually. While the models trained with generic dataset work bad when they
are directly used in specific scenes. With special viewpoints, flow light and
backgrounds, datasets from specific scenes are much different from the datasets
from generic scenes. In order to make the generic scene pedestrian detectors
work well in specific scenes, the labeled data from specific scenes are needed
to adapt the models to the specific scenes. While labeling the data manually
spends much time and money, especially for specific scenes, each time with a
new specific scene, large amounts of images must be labeled. What's more, the
labeling information is not so accurate in the pixels manually and different
people make different labeling information. In this paper, we propose an
ACP-based method, with augmented reality's help, we build the virtual world of
specific scenes, and make people walking in the virtual scenes where it is
possible for them to appear to solve this problem of lacking labeled data and
the results show that data from virtual world is helpful to adapt generic
pedestrian detectors to specific scenes.
|
[
{
"version": "v1",
"created": "Sat, 23 Dec 2017 09:33:29 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Zhang",
"Wenwen",
""
],
[
"Wang",
"Kunfeng",
""
],
[
"Qu",
"Hua",
""
],
[
"Zhao",
"Jihong",
""
],
[
"Wang",
"Fei-Yue",
""
]
] |
new_dataset
| 0.999745 |
1712.08838
|
Ahmed Taha
|
Rohan Chandra, Sachin Grover, Kyungjun Lee, Moustafa Meshry, and Ahmed
Taha
|
Texture Synthesis with Recurrent Variational Auto-Encoder
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a recurrent variational auto-encoder for texture synthesis. A
novel loss function, FLTBNK, is used for training the texture synthesizer. It
is rotational and partially color invariant loss function. Unlike L2 loss,
FLTBNK explicitly models the correlation of color intensity between pixels. Our
texture synthesizer generates neighboring tiles to expand a sample texture and
is evaluated using various texture patterns from Describable Textures Dataset
(DTD). We perform both quantitative and qualitative experiments with various
loss functions to evaluate the performance of our proposed loss function
(FLTBNK) --- a mini-human subject study is used for the qualitative evaluation.
|
[
{
"version": "v1",
"created": "Sat, 23 Dec 2017 20:38:57 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Chandra",
"Rohan",
""
],
[
"Grover",
"Sachin",
""
],
[
"Lee",
"Kyungjun",
""
],
[
"Meshry",
"Moustafa",
""
],
[
"Taha",
"Ahmed",
""
]
] |
new_dataset
| 0.999695 |
1712.08917
|
Henrico Brum
|
Henrico Bertini Brum, Maria das Gra\c{c}as Volpe Nunes
|
Building a Sentiment Corpus of Tweets in Brazilian Portuguese
|
Accepted for publication in 11th International Conference on Language
Resources and Evaluation (LREC 2018)
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The large amount of data available in social media, forums and websites
motivates researches in several areas of Natural Language Processing, such as
sentiment analysis. The popularity of the area due to its subjective and
semantic characteristics motivates research on novel methods and approaches for
classification. Hence, there is a high demand for datasets on different domains
and different languages. This paper introduces TweetSentBR, a sentiment corpora
for Brazilian Portuguese manually annotated with 15.000 sentences on TV show
domain. The sentences were labeled in three classes (positive, neutral and
negative) by seven annotators, following literature guidelines for ensuring
reliability on the annotation. We also ran baseline experiments on polarity
classification using three machine learning methods, reaching 80.99% on
F-Measure and 82.06% on accuracy in binary classification, and 59.85% F-Measure
and 64.62% on accuracy on three point classification.
|
[
{
"version": "v1",
"created": "Sun, 24 Dec 2017 13:23:58 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Brum",
"Henrico Bertini",
""
],
[
"Nunes",
"Maria das Graças Volpe",
""
]
] |
new_dataset
| 0.998571 |
1712.08980
|
Alexander Kott
|
Alexander Kott, Ananthram Swami, Bruce J West
|
The Internet of Battle Things
|
This is a version of the article that appears in IEEE Computer as:
Kott, Alexander, Ananthram Swami, and Bruce J. West. "The Internet of Battle
Things." Computer 49.12 (2016): 70-75
|
Computer 49.12 (2016): 70-75
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The battlefield of the future will be densely populated by a variety of
entities ("things") -- some intelligent and some only marginally so --
performing a broad range of tasks: sensing, communicating, acting, and
collaborating with each other and human warfighters. We call this the Internet
of Battle Things, IoBT. In some ways, IoBT is already becoming a reality, but
20-30 years from now it is likely to become a dominant presence in warfare. To
become a reality, however, this bold vision will have to overcome a number of
major challenges. As one example of such a challenge, the communications among
things will have to be flexible and adaptive to rapidly changing situations and
military missions. In this paper, we explore this and several other major
challenges of IoBT, and outline key research directions and approaches towards
solving these challenges.
|
[
{
"version": "v1",
"created": "Mon, 25 Dec 2017 01:03:56 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Kott",
"Alexander",
""
],
[
"Swami",
"Ananthram",
""
],
[
"West",
"Bruce J",
""
]
] |
new_dataset
| 0.965547 |
1712.09010
|
Yao Wu
|
Yao Wu, Tianzhen Wu, Ziyi Xiong, Yuncheng Wu, Hong Chen, Cuiping Li,
Xiaoying Zhang
|
HelPal: A Search System for Mobile Crowd Service
|
4 pages
| null | null | null |
cs.IR
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Proliferation of ubiquitous mobile devices makes location based services
prevalent. Mobile users are able to volunteer as providers of specific services
and in the meanwhile to search these services. For example, drivers may be
interested in tracking available nearby users who are willing to help with
motor repair or are willing to provide travel directions or first aid. With the
diffusion of mobile users, it is necessary to provide scalable means of
enabling such users to connect with other nearby users so that they can help
each other with specific services. Motivated by these observations, we design
and implement a general location based system HelPal for mobile users to
provide and enjoy instant service, which is called mobile crowd service. In
this demo, we introduce a mobile crowd service system featured with several
novel techniques. We sketch the system architecture and illustrate scenarios
via several cases. Demonstration shows the user-friendly search interface for
users to conveniently find skilled and qualified nearby service providers.
|
[
{
"version": "v1",
"created": "Mon, 25 Dec 2017 05:22:24 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Wu",
"Yao",
""
],
[
"Wu",
"Tianzhen",
""
],
[
"Xiong",
"Ziyi",
""
],
[
"Wu",
"Yuncheng",
""
],
[
"Chen",
"Hong",
""
],
[
"Li",
"Cuiping",
""
],
[
"Zhang",
"Xiaoying",
""
]
] |
new_dataset
| 0.997555 |
1712.09037
|
Sanaullah Manzoor
|
Sanaullah Manzoor, Farhan Ahmad, Suleman Mazhar
|
Mobile Phone Based Portable Field Sensor System for Real-Time In-situ
River Water Quality Monitoring During Endangered Dolphin Monitoring Surveys
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile phone based potable water quality assessment device is developed to
analyze and study water pollution level at Indus river. Indus river is habitat
of endangered Indus river dolphin and water pollution is one of major causes of
survivability threats for this specie. We tested device performance at the six
locations of Lahore canal. pH of canal water deviates from the normal range of
the irrigation water. In future, we will study correlation between water
pollution level and habitat usage of Indus river dolphin using water quality
assessment device and hydrophone array based passive acoustic monitoring (PAM)
system.
|
[
{
"version": "v1",
"created": "Mon, 25 Dec 2017 08:18:08 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Manzoor",
"Sanaullah",
""
],
[
"Ahmad",
"Farhan",
""
],
[
"Mazhar",
"Suleman",
""
]
] |
new_dataset
| 0.999044 |
1712.09052
|
Mahmoud Fayed
|
Mahmoud S. Fayed, Muhammad Al-Qurishi, Atif Alamri, Ahmad A.
Al-Daraiseh
|
PWCT: Visual Language for IoT and Cloud Computing Applications and
Systems
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Developing IoT, Data Computing and Cloud Computing software requires
different programming skills and different programming languages. This cause a
problem for many companies and researchers that need to hires many programmers
to develop a complete solution. The problem is related directly to the
financial cost and the development time which are very important factors to
many research projects. In this paper we present and propose the PWCT visual
programming tool for developing IoT, Data Computing and Cloud Computing
Applications and Systems without writing textual code directly. Using PWCT
increase productivity and provide researchers with one visual programming tool
to develop different solutions.
|
[
{
"version": "v1",
"created": "Mon, 25 Dec 2017 10:31:12 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Fayed",
"Mahmoud S.",
""
],
[
"Al-Qurishi",
"Muhammad",
""
],
[
"Alamri",
"Atif",
""
],
[
"Al-Daraiseh",
"Ahmad A.",
""
]
] |
new_dataset
| 0.997651 |
1712.09145
|
Lei Zhang
|
Lei Zhang, Futai Zhang, Wei Wu
|
A Provably Secure Ring Signature Scheme in Certificateless Cryptography
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ring signature is a kind of group-oriented signature. It allows a member of a
group to sign messages on behalf of the group without revealing his/her
identity. Certificateless public key cryptography was first introduced by
Al-Riyami and Paterson in Asiacrypt 2003. In certificateless cryptography, it
does not require the use of certificates to guarantee the authenticity of
users' public keys. Meanwhile, certificateless cryptography does not have the
key escrow problem, which seems to be inherent in the Identity-based
cryptography. In this paper, we propose a concrete certificateless ring
signature scheme. The security models of certificateless ring signature are
also formalized. Our new scheme is provably secure in the random oracle model,
with the assumption that the Computational Diffie-Hellman problem is hard. In
addition, we also show that a generic construction of certificateless ring
signature is insecure against the key replacement attack defined in our
security models.
|
[
{
"version": "v1",
"created": "Mon, 25 Dec 2017 23:55:33 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Zhang",
"Lei",
""
],
[
"Zhang",
"Futai",
""
],
[
"Wu",
"Wei",
""
]
] |
new_dataset
| 0.993641 |
1712.09162
|
Chong Huang
|
Chong Huang, Peng Chen, Xin Yang, and Kwang-Ting (Tim) Cheng
|
REDBEE: A Visual-Inertial Drone System for Real-Time Moving Object
Detection
|
8 pages, IEEE/RSJ International Conference on Intelligent Robots and
Systems (IROS 2017)
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Aerial surveillance and monitoring demand both real-time and robust motion
detection from a moving camera. Most existing techniques for drones involve
sending a video data streams back to a ground station with a high-end desktop
computer or server. These methods share one major drawback: data transmission
is subjected to considerable delay and possible corruption. Onboard computation
can not only overcome the data corruption problem but also increase the range
of motion. Unfortunately, due to limited weight-bearing capacity, equipping
drones with computing hardware of high processing capability is not feasible.
Therefore, developing a motion detection system with real-time performance and
high accuracy for drones with limited computing power is highly desirable. In
this paper, we propose a visual-inertial drone system for real-time motion
detection, namely REDBEE, that helps overcome challenges in shooting scenes
with strong parallax and dynamic background. REDBEE, which can run on the
state-of-the-art commercial low-power application processor (e.g. Snapdragon
Flight board used for our prototype drone), achieves real-time performance with
high detection accuracy. The REDBEE system overcomes obstacles in shooting
scenes with strong parallax through an inertial-aided dual-plane homography
estimation; it solves the issues in shooting scenes with dynamic background by
distinguishing the moving targets through a probabilistic model based on
spatial, temporal, and entropy consistency. The experiments are presented which
demonstrate that our system obtains greater accuracy when detecting moving
targets in outdoor environments than the state-of-the-art real-time onboard
detection systems.
|
[
{
"version": "v1",
"created": "Tue, 26 Dec 2017 02:09:34 GMT"
}
] | 2017-12-27T00:00:00 |
[
[
"Huang",
"Chong",
"",
"Tim"
],
[
"Chen",
"Peng",
"",
"Tim"
],
[
"Yang",
"Xin",
"",
"Tim"
],
[
"Kwang-Ting",
"",
"",
"Tim"
],
[
"Cheng",
"",
""
]
] |
new_dataset
| 0.99951 |
1708.05741
|
Nof Abu-Zainab
|
Nof Abuzainab and Walid Saad
|
Dynamic Connectivity Game for Adversarial Internet of Battlefield Things
Systems
|
accepted in IEEE Internet of Things Journal
| null | null | null |
cs.IT cs.GT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, the problem of network connectivity is studied for an
adversarial Internet of Battlefield Things (IoBT) system in which an attacker
aims at disrupting the connectivity of the network by choosing to compromise
one of the IoBT nodes at each time epoch. To counter such attacks, an IoBT
defender attempts to reestablish the IoBT connectivity by either deploying new
IoBT nodes or by changing the roles of existing nodes. This problem is
formulated as a dynamic multistage Stackelberg connectivity game that extends
classical connectivity games and that explicitly takes into account the
characteristics and requirements of the IoBT network. In particular, the
defender's payoff captures the IoBT latency as well as the sum of weights of
disconnected nodes at each stage of the game. Due to the dependence of the
attacker's and defender's actions at each stage of the game on the network
state, the feedback Stackelberg solution (FSE) is used to solve the IoBT
connectivity game. Then, sufficient conditions under which the IoBT system will
remain connected, when the FSE solution is used, are determined analytically.
Numerical results show that the expected number of disconnected sensors, when
the FSE solution is used, decreases up to 62% compared to a baseline scenario
in which a Stackelberg game with no feedback is used, and up to 57% compared to
a baseline equal probability policy.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2017 19:28:24 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Dec 2017 00:35:33 GMT"
}
] | 2017-12-25T00:00:00 |
[
[
"Abuzainab",
"Nof",
""
],
[
"Saad",
"Walid",
""
]
] |
new_dataset
| 0.99752 |
1712.04382
|
Michael Freitag
|
Michael Freitag, Shahin Amiriparian, Sergey Pugachevskiy, Nicholas
Cummins, Bj\"orn Schuller
|
auDeep: Unsupervised Learning of Representations from Audio with Deep
Recurrent Neural Networks
| null | null | null | null |
cs.SD eess.AS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
auDeep is a Python toolkit for deep unsupervised representation learning from
acoustic data. It is based on a recurrent sequence to sequence autoencoder
approach which can learn representations of time series data by taking into
account their temporal dynamics. We provide an extensive command line interface
in addition to a Python API for users and developers, both of which are
comprehensively documented and publicly available at
https://github.com/auDeep/auDeep. Experimental results indicate that auDeep
features are competitive with state-of-the art audio classification.
|
[
{
"version": "v1",
"created": "Tue, 12 Dec 2017 16:43:33 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Dec 2017 17:33:47 GMT"
}
] | 2017-12-25T00:00:00 |
[
[
"Freitag",
"Michael",
""
],
[
"Amiriparian",
"Shahin",
""
],
[
"Pugachevskiy",
"Sergey",
""
],
[
"Cummins",
"Nicholas",
""
],
[
"Schuller",
"Björn",
""
]
] |
new_dataset
| 0.997985 |
1712.07759
|
Viacheslav Dubeyko
|
Vyacheslav Dubeyko, Cyril Guyot, Luis Cargnini, Adam Manzanares
|
POSIX-based Operating System in the environment of NVM/SCM memory
| null | null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern Operating Systems are typically POSIX-compliant. The system calls are
the fundamental layer of interaction between user-space applications and the OS
kernel and its implementation of fundamental abstractions and primitives used
in modern computing. The next generation of NVM/SCM memory raises critical
questions about the efficiency of modern OS architecture. This paper
investigates how the POSIX API drives performance for a system with NVM/SCM
memory. We show that OS and metadata related system calls represent the most
important area of optimization. However, the synchronization related system
calls (poll(), futex(), wait4()) are the most time-consuming overhead that even
a RAMdisk platform fails to eliminate. Attempting to preserve the POSIX-based
approach will likely result in fundamental inefficiencies for any future
applications of NVM/SCM memory.
|
[
{
"version": "v1",
"created": "Thu, 21 Dec 2017 01:26:15 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Dec 2017 02:53:24 GMT"
}
] | 2017-12-25T00:00:00 |
[
[
"Dubeyko",
"Vyacheslav",
""
],
[
"Guyot",
"Cyril",
""
],
[
"Cargnini",
"Luis",
""
],
[
"Manzanares",
"Adam",
""
]
] |
new_dataset
| 0.984473 |
1712.08291
|
Vivek Kulkarni
|
Vivek Kulkarni and William Yang Wang
|
TFW, DamnGina, Juvie, and Hotsie-Totsie: On the Linguistic and Social
Aspects of Internet Slang
|
10 pages, 11 figures,4 tables
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Slang is ubiquitous on the Internet. The emergence of new social contexts
like micro-blogs, question-answering forums, and social networks has enabled
slang and non-standard expressions to abound on the web. Despite this, slang
has been traditionally viewed as a form of non-standard language -- a form of
language that is not the focus of linguistic analysis and has largely been
neglected. In this work, we use UrbanDictionary to conduct the first
large-scale linguistic analysis of slang and its social aspects on the Internet
to yield insights into this variety of language that is increasingly used all
over the world online.
We begin by computationally analyzing the phonological, morphological and
syntactic properties of slang. We then study linguistic patterns in four
specific categories of slang namely alphabetisms, blends, clippings, and
reduplicatives. Our analysis reveals that slang demonstrates extra-grammatical
rules of phonological and morphological formation that markedly distinguish it
from the standard form shedding insight into its generative patterns. Next, we
analyze the social aspects of slang by studying subject restriction and
stereotyping in slang usage. Analyzing tens of thousands of such slang words
reveals that the majority of slang on the Internet belongs to two major
categories: sex and drugs. We also noted that not only is slang usage not
immune to prevalent social biases and prejudices but also reflects such biases
and stereotypes more intensely than the standard variety.
|
[
{
"version": "v1",
"created": "Fri, 22 Dec 2017 03:21:05 GMT"
}
] | 2017-12-25T00:00:00 |
[
[
"Kulkarni",
"Vivek",
""
],
[
"Wang",
"William Yang",
""
]
] |
new_dataset
| 0.999912 |
1712.08297
|
Yanning Zhou
|
Yanning Zhou, Qi Dou, Hao Chen, Jing Qin, Pheng-Ann Heng
|
SFCN-OPI: Detection and Fine-grained Classification of Nuclei Using
Sibling FCN with Objectness Prior Interaction
|
Accepted at AAAI 2018
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cell nuclei detection and fine-grained classification have been fundamental
yet challenging problems in histopathology image analysis. Due to the nuclei
tiny size, significant inter-/intra-class variances, as well as the inferior
image quality, previous automated methods would easily suffer from limited
accuracy and robustness. In the meanwhile, existing approaches usually deal
with these two tasks independently, which would neglect the close relatedness
of them. In this paper, we present a novel method of sibling fully
convolutional network with prior objectness interaction (called SFCN-OPI) to
tackle the two tasks simultaneously and interactively using a unified
end-to-end framework. Specifically, the sibling FCN branches share features in
earlier layers while holding respective higher layers for specific tasks. More
importantly, the detection branch outputs the objectness prior which
dynamically interacts with the fine-grained classification sibling branch
during the training and testing processes. With this mechanism, the
fine-grained classification successfully focuses on regions with high
confidence of nuclei existence and outputs the conditional probability, which
in turn benefits the detection through back propagation. Extensive experiments
on colon cancer histology images have validated the effectiveness of our
proposed SFCN-OPI and our method has outperformed the state-of-the-art methods
by a large margin.
|
[
{
"version": "v1",
"created": "Fri, 22 Dec 2017 03:56:56 GMT"
}
] | 2017-12-25T00:00:00 |
[
[
"Zhou",
"Yanning",
""
],
[
"Dou",
"Qi",
""
],
[
"Chen",
"Hao",
""
],
[
"Qin",
"Jing",
""
],
[
"Heng",
"Pheng-Ann",
""
]
] |
new_dataset
| 0.999051 |
1712.08394
|
Kunfeng Wang
|
Xuan Li, Kunfeng Wang, Yonglin Tian, Lan Yan, and Fei-Yue Wang
|
The ParallelEye Dataset: Constructing Large-Scale Artificial Scenes for
Traffic Vision Research
|
To be published in IEEE ITSC 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Video image datasets are playing an essential role in design and evaluation
of traffic vision algorithms. Nevertheless, a longstanding inconvenience
concerning image datasets is that manually collecting and annotating
large-scale diversified datasets from real scenes is time-consuming and prone
to error. For that virtual datasets have begun to function as a proxy of real
datasets. In this paper, we propose to construct large-scale artificial scenes
for traffic vision research and generate a new virtual dataset called
"ParallelEye". First of all, the street map data is used to build 3D scene
model of Zhongguancun Area, Beijing. Then, the computer graphics, virtual
reality, and rule modeling technologies are utilized to synthesize large-scale,
realistic virtual urban traffic scenes, in which the fidelity and geography
match the real world well. Furthermore, the Unity3D platform is used to render
the artificial scenes and generate accurate ground-truth labels, e.g.,
semantic/instance segmentation, object bounding box, object tracking, optical
flow, and depth. The environmental conditions in artificial scenes can be
controlled completely. As a result, we present a viable implementation pipeline
for constructing large-scale artificial scenes for traffic vision research. The
experimental results demonstrate that this pipeline is able to generate
photorealistic virtual datasets with low modeling time and high accuracy
labeling.
|
[
{
"version": "v1",
"created": "Fri, 22 Dec 2017 11:16:19 GMT"
}
] | 2017-12-25T00:00:00 |
[
[
"Li",
"Xuan",
""
],
[
"Wang",
"Kunfeng",
""
],
[
"Tian",
"Yonglin",
""
],
[
"Yan",
"Lan",
""
],
[
"Wang",
"Fei-Yue",
""
]
] |
new_dataset
| 0.999702 |
1712.08448
|
Henning Christiansen
|
Henning Christiansen
|
A simple script language for choreography of multiple, synchronizing
non-anthropomorphic robots
|
work in progress
| null | null | null |
cs.RO
|
http://creativecommons.org/licenses/by/4.0/
|
The scripting language described in this document is (in the first place)
intended to be used on robots developed by Anja M{\o}lle Lindelof and Henning
Christiansen as part of a research project about robots performing on stage.
The target robots are expected to appear as familiar domestic objects that
take their own life, so to speak, and perhaps perform together with human
players, creating at illusion of a communication between them. In the current
version, these robots' common behaviour is determined uniquely by a script
written in the language described here -- the only possible autonomy for the
robots is action to correct dynamically for inaccuracies that arise during a
performance.
The present work is preliminary and has not been compared to properly to
other research work in this area, and the testing is still limited. A first
implementation on small Lego Mindstorms based robots is under development by
Mads Saustrup Fox as part of his master thesis work.
|
[
{
"version": "v1",
"created": "Fri, 22 Dec 2017 14:02:45 GMT"
}
] | 2017-12-25T00:00:00 |
[
[
"Christiansen",
"Henning",
""
]
] |
new_dataset
| 0.997744 |
1712.08550
|
Tianxiang Gao
|
Tianxiang Gao, Weiming Bao, Jinning Li, Xiaofeng Gao, Boyuan Kong, Yan
Tang, Guihai Chen, Xuan Li
|
DancingLines: An Analytical Scheme to Depict Cross-Platform Event
Popularity
| null | null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays, events usually burst and are propagated online through multiple
modern media like social networks and search engines. There exists various
research discussing the event dissemination trends on individual medium, while
few studies focus on event popularity analysis from a cross-platform
perspective. Challenges come from the vast diversity of events and media,
limited access to aligned datasets across different media and a great deal of
noise in the datasets. In this paper, we design DancingLines, an innovative
scheme that captures and quantitatively analyzes event popularity between
pairwise text media. It contains two models: TF-SW, a semantic-aware popularity
quantification model, based on an integrated weight coefficient leveraging
Word2Vec and TextRank; and wDTW-CD, a pairwise event popularity time series
alignment model matching different event phases adapted from Dynamic Time
Warping. We also propose three metrics to interpret event popularity trends
between pairwise social platforms. Experimental results on eighteen real-world
event datasets from an influential social network and a popular search engine
validate the effectiveness and applicability of our scheme. DancingLines is
demonstrated to possess broad application potentials for discovering the
knowledge of various aspects related to events and different media.
|
[
{
"version": "v1",
"created": "Fri, 22 Dec 2017 16:24:15 GMT"
}
] | 2017-12-25T00:00:00 |
[
[
"Gao",
"Tianxiang",
""
],
[
"Bao",
"Weiming",
""
],
[
"Li",
"Jinning",
""
],
[
"Gao",
"Xiaofeng",
""
],
[
"Kong",
"Boyuan",
""
],
[
"Tang",
"Yan",
""
],
[
"Chen",
"Guihai",
""
],
[
"Li",
"Xuan",
""
]
] |
new_dataset
| 0.997184 |
1707.07966
|
Marc Heinrich
|
Eric Duchene (GOAL), Marc Heinrich (GOAL), Urban Larsson, Aline
Parreau (GOAL)
|
The switch operators and push-the-button games: a sequential compound
over rulesets
|
Journal of Theoretical Computer Science (TCS), Elsevier, A
Para{\^i}tre
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study operators that combine combinatorial games. This field was initiated
by Sprague-Grundy (1930s), Milnor (1950s) and Berlekamp-Conway-Guy (1970-80s)
via the now classical disjunctive sum operator on (abstract) games. The new
class consists in operators for rulesets, dubbed the switch-operators. The
ordered pair of rulesets (R 1 , R 2) is compatible if, given any position in R
1 , there is a description of how to move in R 2. Given compatible (R 1 , R 2),
we build the push-the-button game R 1 R 2 , where players start by playing
according to the rules R 1 , but at some point during play, one of the players
must switch the rules to R 2 , by pushing the button ". Thus, the game ends
according to the terminal condition of ruleset R 2. We study the pairwise
combinations of the classical rulesets Nim, Wythoff and Euclid. In addition, we
prove that standard periodicity results for Subtraction games transfer to this
setting, and we give partial results for a variation of Domineering, where R 1
is the game where the players put the domino tiles horizontally and R 2 the
game where they play vertically (thus generalizing the octal game 0.07).
|
[
{
"version": "v1",
"created": "Tue, 25 Jul 2017 12:58:20 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Dec 2017 08:01:54 GMT"
}
] | 2017-12-22T00:00:00 |
[
[
"Duchene",
"Eric",
"",
"GOAL"
],
[
"Heinrich",
"Marc",
"",
"GOAL"
],
[
"Larsson",
"Urban",
"",
"GOAL"
],
[
"Parreau",
"Aline",
"",
"GOAL"
]
] |
new_dataset
| 0.994072 |
1708.08902
|
Martin Reisslein
|
Akhilesh Thyagaturu and Ziyad Alharbi and Martin Reisslein
|
R-FFT: Function Split at IFFT/FFT in Unified LTE CRAN and Cable Access
Network
|
IEEE Transactions on Broadcasting, in print, 2018
| null |
10.1109/TBC.2017.2786032
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Remote-PHY (R-PHY) modular cable network for Data over Cable Service
Interface Specification (DOCSIS) service conducts the physical layer processing
for the transmissions over the broadcast cable in a remote node. In contrast,
the cloud radio access network (CRAN) for Long-Term Evolution (LTE) cellular
wireless services conducts all baseband physical layer processing in a central
baseband unit and the remaining physical layer processing steps towards radio
frequency (RF) transmission in remote nodes. Both DOCSIS and LTE are based on
Orthogonal Frequency Division Multiplexing (OFDM) physical layer processing. We
propose to unify cable and wireless cellular access networks by utilizing the
hybrid fiber-coax (HFC) cable network infrastructure as fiber fronthaul network
for cellular wireless services. For efficient operation of such a unified
access network, we propose a novel Remote-FFT (R-FFT) node that conducts the
physical layer processing from the Fast-Fourier Transform (FFT) module towards
the RF transmission, whereby DOCSIS and LTE share a common FFT module. The
frequency domain in-phase and quadrature (I/Q) symbols for both DOCSIS and LTE
are transmitted over the fiber between remote node and cable headend, where the
remaining physical layer processing is conducted. We further propose to cache
repetitive quadrature amplitude modulation (QAM) symbols in the R-FFT node to
reduce the fronthaul bitrate requirements and enable statistical multiplexing.
We evaluate the fronthaul bitrate reductions achieved by R-FFT node caching,
the fronthaul transmission bitrates arising from the unified DOCSIS and LTE
service, and illustrate the delay implications of moving part of the cable
R-PHY remote node physical layer processing to the headend.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2017 17:41:35 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Dec 2017 23:57:56 GMT"
}
] | 2017-12-22T00:00:00 |
[
[
"Thyagaturu",
"Akhilesh",
""
],
[
"Alharbi",
"Ziyad",
""
],
[
"Reisslein",
"Martin",
""
]
] |
new_dataset
| 0.987547 |
1712.00460
|
Eirik Keilegavlen
|
Eirik Keilegavlen, Alessio Fumagalli, Runar Berge, Ivar Stefansson,
Inga Berre
|
PorePy: An Open-Source Simulation Tool for Flow and Transport in
Deformable Fractured Rocks
| null | null | null | null |
cs.CE math.NA physics.geo-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fractures are ubiquitous in the subsurface and strongly affect flow and
deformation. The physical shape of the fractures, they are long and thin
objects, puts strong limitations on how the effect of this dynamics can be
incorporated into standard reservoir simulation tools. This paper reports the
development of an open-source software framework, termed PorePy, which is aimed
at simulation of flow and transport in three-dimensional fractured reservoirs,
as well as deformation of the reservoir due to shearing along fracture and
fault planes. Starting from a description of fractures as polygons embedded in
a 3D domain, PorePy provides semi-automatic gridding to construct a
discrete-fracture-matrix model, which forms the basis for subsequent
simulations. PorePy allows for flow and transport in all lower-dimensional
objects, including planes (2D) representing fractures, and lines (1D) and
points (0D), representing fracture intersections. Interaction between processes
in neighboring domains of different dimension is implemented as a sequence of
couplings of objects one dimension apart. This readily allows for handling of
complex fracture geometries compared to capabilities of existing software. In
addition to flow and transport, PorePy provides models for rock mechanics,
poro-elasticity and coupling with fracture deformation models. The software is
fully open, and can serve as a framework for transparency and reproducibility
of simulations. We describe the design principles of PorePy from a user
perspective, with focus on possibilities within gridding, covered physical
processes and available discretizations. The power of the framework is
illustrated with two sets of simulations; involving respectively coupled flow
and transport in a fractured porous medium, and low-pressure stimulation of a
geothermal reservoir.
|
[
{
"version": "v1",
"created": "Fri, 1 Dec 2017 19:02:15 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Dec 2017 08:23:58 GMT"
}
] | 2017-12-22T00:00:00 |
[
[
"Keilegavlen",
"Eirik",
""
],
[
"Fumagalli",
"Alessio",
""
],
[
"Berge",
"Runar",
""
],
[
"Stefansson",
"Ivar",
""
],
[
"Berre",
"Inga",
""
]
] |
new_dataset
| 0.995605 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.