id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1712.05881
|
Zahra Mahoor
|
Zahra Mahoor, Jack Felag, Josh Bongard
|
Morphology dictates a robot's ability to ground crowd-proposed language
| null | null | null | null |
cs.AI cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As more robots act in physical proximity to people, it is essential to ensure
they make decisions and execute actions that align with human values. To do so,
robots need to understand the true intentions behind human-issued commands. In
this paper, we define a safe robot as one that receives a natural-language
command from humans, considers an action in response to that command, and
accurately predicts how humans will judge that action if is executed in
reality. Our contribution is two-fold: First, we introduce a web platform for
human users to propose commands to simulated robots. The robots receive
commands and act based on those proposed commands, and then the users provide
positive and/or negative reinforcement. Next, we train a critic for each robot
to predict the crowd's responses to one of the crowd-proposed commands. Second,
we show that the morphology of a robot plays a role in the way it grounds
language: The critics show that two of the robots used in the experiment
achieve a lower prediction error than the others. Thus, those two robots are
safer, according to our definition, since they ground the proposed command more
accurately.
|
[
{
"version": "v1",
"created": "Sat, 16 Dec 2017 00:31:36 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Dec 2017 22:36:04 GMT"
}
] | 2017-12-22T00:00:00 |
[
[
"Mahoor",
"Zahra",
""
],
[
"Felag",
"Jack",
""
],
[
"Bongard",
"Josh",
""
]
] |
new_dataset
| 0.999584 |
1712.07672
|
Reza Hooshmand
|
Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
|
PKC-PC: A Variant of the McEliece Public Key Cryptosystem based on Polar
Codes
| null | null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Polar codes are novel and efficient error correcting codes with low encoding
and decoding complexities. These codes have a channel dependent generator
matrix which is determined by the code dimension, code length and transmission
channel parameters. This paper studies a variant of the McEliece public key
cryptosystem based on polar codes, called "PKC-PC". Due to the fact that the
structure of polar codes' generator matrix depends on the parameters of
channel, we used an efficient approach to conceal their generator matrix. Then,
by the help of the characteristics of polar codes and also introducing an
efficient approach, we reduced the public and private key sizes of the PKC-PC
and increased its information rate compared to the McEliece cryptosystem. It
was shown that polar codes are able to yield an increased security level
against conventional attacks and possible vulnerabilities on the code-based
public key cryptosystems. Moreover, it is indicated that the security of the
PKC-PC is reduced to solve NP-complete problems. Compared to other post-quantum
public key schemes, we believe that the PKC-PC is a promising candidate for
NIST post-quantum crypto standardization.
|
[
{
"version": "v1",
"created": "Wed, 20 Dec 2017 19:04:50 GMT"
}
] | 2017-12-22T00:00:00 |
[
[
"Hooshmand",
"Reza",
""
],
[
"Shooshtari",
"Masoumeh Koochak",
""
],
[
"Aref",
"Mohammad Reza",
""
]
] |
new_dataset
| 0.999734 |
1712.07694
|
Somnath Chakrabarti
|
Somnath Chakrabarti, Brandon Baker, Mona Vij
|
Intel SGX Enabled Key Manager Service with OpenStack Barbican
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Protecting data in the cloud continues to gain in importance, with encryption
being used to achieve the desired data protection. While there is desire to use
encryption, various cloud components do not want to deal with key management,
which points to a strong need for a separate key management system. OpenStack
Barbican is a platform developed by the OpenStack community aimed at providing
cryptographic functions useful for all environments, including large ephemeral
clouds. Barbican exposes REST APIs designed for the secure storage,
provisioning and management of secrets such as passwords, encryption keys, and
X.509 certificates, and supports plugins for a variety of crypto solutions in
the backend. Crypto plugins store secrets as encrypted blobs within the
Barbican database. Software based crypto plugins offer a scalable solution, but
are vulnerable to system software attacks. Hardware Security Module or HSM
plugins offer strong security guarantees, but they are expensive and don't
scale well. We propose to build an Intel Software Guard Extension or SGX based
software crypto plugin that offers security similar to an HSM with the low cost
and scalability of a software based solution. We extend OpenStack Barbican API
to support attestation of an Intel SGX crypto plugin, to allow clients higher
confidence in the software they are using for storing keys. In addition, the
API provides support for mutual attestation for Intel SGX enabled clients,
multi-user key distribution, and extensions for protecting the confidentiality
and integrity of the backend database.
|
[
{
"version": "v1",
"created": "Wed, 20 Dec 2017 20:19:37 GMT"
}
] | 2017-12-22T00:00:00 |
[
[
"Chakrabarti",
"Somnath",
""
],
[
"Baker",
"Brandon",
""
],
[
"Vij",
"Mona",
""
]
] |
new_dataset
| 0.998345 |
1712.07740
|
Ibbad Hafeez
|
Ibbad Hafeez, Aaron Yi Ding, Sasu Tarkoma
|
Securing Edge Networks with Securebox
| null | null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The number of mobile and IoT devices connected to home and enterprise
networks is growing fast. These devices offer new services and experiences for
the users; however, they also present new classes of security threats
pertaining to data and device safety and user privacy. In this article, we
first analyze the potential threats presented by these devices connected to
edge networks. We then propose Securebox: a new cloud-driven, low cost
Security-as-a-Service solution that applies Software-Defined Networking (SDN)
to improve network monitoring, security and management. Securebox enables
remote management of networks through a cloud security service (CSS) with
minimal user intervention required. To reduce costs and improve the
scalability, Securebox is based on virtualized middleboxes provided by CSS. Our
proposal differs from the existing solutions by integrating the SDN and cloud
into a unified edge security solution, and by offering a collaborative
protection mechanism that enables rapid security policy dissemination across
all connected networks in mitigating new threats or attacks detected by the
system. We have implemented two Securebox prototypes, using a low-cost
Raspberry-PI and off-the-shelf fanless PC. Our system evaluation has shown that
Securebox can achieve automatic network security and be deployed incrementally
to the infrastructure with low management overhead.
|
[
{
"version": "v1",
"created": "Wed, 20 Dec 2017 22:47:19 GMT"
}
] | 2017-12-22T00:00:00 |
[
[
"Hafeez",
"Ibbad",
""
],
[
"Ding",
"Aaron Yi",
""
],
[
"Tarkoma",
"Sasu",
""
]
] |
new_dataset
| 0.983124 |
1712.07783
|
Reza Dastbasteh
|
Reza Dastbasteh, Seyyed Hamed Mousavi, Taher Abualrub, Nuh Aydin, and
Javad Haghighat
|
Skew cyclic codes over $\mathbb{F}_{p}+u\mathbb{F}_{p}$
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study skew cyclic codes with arbitrary length over the ring
$R=\mathbb{F}_{p}+u\mathbb{F}_{p}$ where $p$ is an odd prime and $% u^{2}=0$.
We characterize all skew cyclic codes of length $n$ as left $% R[x;\theta
]$-submodules of $R_{n}=R[x;\theta ]/\langle x^{n}-1\rangle $. We find all
generator polynomials for these codes and describe their minimal spanning sets.
Moreover, an encoding and decoding algorithm is presented for skew cyclic codes
over the ring $R$. Finally, based on the theory we developed in this paper, we
provide examples of codes with good parameters over $F_{p}$ with different odd
prime $p.$ In fact, example 25 in our paper is a new ternary code in the class
of quasi-twisted codes. The other examples we provided are examples of optimal
codes.
|
[
{
"version": "v1",
"created": "Thu, 21 Dec 2017 03:44:58 GMT"
}
] | 2017-12-22T00:00:00 |
[
[
"Dastbasteh",
"Reza",
""
],
[
"Mousavi",
"Seyyed Hamed",
""
],
[
"Abualrub",
"Taher",
""
],
[
"Aydin",
"Nuh",
""
],
[
"Haghighat",
"Javad",
""
]
] |
new_dataset
| 0.998374 |
1712.07882
|
Felix Schuster
|
Manuel Costa, Lawrence Esswood, Olga Ohrimenko, Felix Schuster, Sameer
Wagh
|
The Pyramid Scheme: Oblivious RAM for Trusted Processors
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern processors, e.g., Intel SGX, allow applications to isolate secret code
and data in encrypted memory regions called enclaves. While encryption
effectively hides the contents of memory, the sequence of address references
issued by the secret code leaks information. This is a serious problem because
these leaks can easily break the confidentiality guarantees of enclaves.
In this paper, we explore Oblivious RAM (ORAM) designs that prevent these
information leaks under the constraints of modern SGX processors. Most ORAMs
are a poor fit for these processors because they have high constant overhead
factors or require large private memories, which are not available in these
processors. We address these limitations with a new hierarchical ORAM
construction, the Pyramid ORAM, that is optimized towards online bandwidth cost
and small blocks. It uses a new hashing scheme that circumvents the complexity
of previous hierarchical schemes.
We present an efficient x64-optimized implementation of Pyramid ORAM that
uses only the processor's registers as private memory. We compare Pyramid ORAM
with Circuit ORAM, a state-of-the-art tree-based ORAM scheme that also uses
constant private memory. Pyramid ORAM has better online asymptotical complexity
than Circuit ORAM. Our implementation of Pyramid ORAM and Circuit ORAM
validates this: as all hierarchical schemes, Pyramid ORAM has high variance of
access latencies; although latency can be high for some accesses, for typical
configurations Pyramid ORAM provides access latencies that are 8X better than
Circuit ORAM for 99% of accesses. Although the best known hierarchical ORAM has
better asymptotical complexity, Pyramid ORAM has significantly lower constant
overhead factors, making it the preferred choice in practice.
|
[
{
"version": "v1",
"created": "Thu, 21 Dec 2017 11:32:03 GMT"
}
] | 2017-12-22T00:00:00 |
[
[
"Costa",
"Manuel",
""
],
[
"Esswood",
"Lawrence",
""
],
[
"Ohrimenko",
"Olga",
""
],
[
"Schuster",
"Felix",
""
],
[
"Wagh",
"Sameer",
""
]
] |
new_dataset
| 0.995646 |
1712.08113
|
B.Sundar Rajan
|
Nujoom Sageer Karat, Anoop Thomas and B. Sundar Rajan
|
Optimal Error Correcting Delivery Scheme for Coded Caching with
Symmetric Batch Prefetching
|
9 pages and 4 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Coded caching is used to reduce network congestion during peak hours. A
single server is connected to a set of users through a bottleneck link, which
generally is assumed to be error-free. During non-peak hours, all the users
have full access to the files and they fill their local cache with portions of
the files available. During delivery phase, each user requests a file and the
server delivers coded transmissions to meet the demands taking into
consideration their cache contents. In this paper we assume that the shared
link is error prone. A new delivery scheme is required to meet the demands of
each user even after receiving finite number of transmissions in error. We
characterize the minimum average rate and minimum peak rate for this problem.
We find closed form expressions of these rates for a particular caching scheme
namely \textit{symmetric batch prefetching}. We also propose an optimal error
correcting delivery scheme for coded caching problem with symmetric batch
prefetching.
|
[
{
"version": "v1",
"created": "Thu, 21 Dec 2017 17:46:25 GMT"
}
] | 2017-12-22T00:00:00 |
[
[
"Karat",
"Nujoom Sageer",
""
],
[
"Thomas",
"Anoop",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
new_dataset
| 0.971032 |
1108.5497
|
Ifat Jahangir
|
Ifat Jahangir, Anindya Das and Masud Hasan
|
Facile Algebraic Representation of a Novel Quaternary Logic
|
Pre-print copy, final version can be found here:
http://www.ijcseonline.org/archive_issue.php?pub_id=35
|
International Journal of Computer Sciences and Engineering, Vol.4,
Issue.5, pp.1-15, 2016
| null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, a novel quaternary algebra has been proposed that can be used
to implement an arbitrary quaternary logic function in more than one systematic
ways. The proposed logic has evolved from and is closely related to the Boolean
algebra for binary domain; yet it does not lack the benefits of a higher-radix
system. It offers seamless integration of the binary logic functions and
expressions through a set of transforms and allows any binary logic
simplification technique to be applied in quaternary domain. Since physical
realization of the operators defined in this logic has recently been reported,
it has become very important to have a well-defined algebra that will
facilitate the algebraic manipulation of the novel quaternary logic and aid in
designing various complex logic circuits. Therefore, based on our earlier
works, here we describe the complete algebraic representation of this logic for
the first time. The efficacy of the logic has been shown by designing and
comparing several common logic circuits with existing designs in both binary
and quaternary domain.
|
[
{
"version": "v1",
"created": "Sun, 28 Aug 2011 08:07:09 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Nov 2011 20:24:14 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Dec 2017 19:25:24 GMT"
}
] | 2017-12-21T00:00:00 |
[
[
"Jahangir",
"Ifat",
""
],
[
"Das",
"Anindya",
""
],
[
"Hasan",
"Masud",
""
]
] |
new_dataset
| 0.990657 |
1708.03269
|
Kaarthik Sundar
|
Kaarthik Sundar and Sohum Misra and Sivakumar Rathinam and Rajnikant
Sharma
|
Routing Unmanned Vehicles in GPS-Denied Environments
|
Publised in International Conference on Umanned Aerial Systems
| null |
10.1109/ICUAS.2017.7991488
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most of the routing algorithms for unmanned vehicles, that arise in data
gathering and monitoring applications in the literature, rely on the Global
Positioning System (GPS) information for localization. However, disruption of
GPS signals either intentionally or unintentionally could potentially render
these algorithms not applicable. In this article, we present a novel method to
address this difficulty by combining methods from cooperative localization and
routing. In particular, the article formulates a fundamental combinatorial
optimization problem to plan routes for an unmanned vehicle in a GPS-restricted
environment while enabling localization for the vehicle. We also develop
algorithms to compute optimal paths for the vehicle using the proposed
formulation. Extensive simulation results are also presented to corroborate the
effectiveness and performance of the proposed formulation and algorithms.
|
[
{
"version": "v1",
"created": "Thu, 10 Aug 2017 15:44:18 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Dec 2017 23:36:34 GMT"
}
] | 2017-12-21T00:00:00 |
[
[
"Sundar",
"Kaarthik",
""
],
[
"Misra",
"Sohum",
""
],
[
"Rathinam",
"Sivakumar",
""
],
[
"Sharma",
"Rajnikant",
""
]
] |
new_dataset
| 0.966586 |
1708.07862
|
Jimmy Nielsen
|
Petar Popovski, Jimmy J. Nielsen, Cedomir Stefanovic, Elisabeth de
Carvalho, Erik Str\"om, Kasper F. Trillingsgaard, Alexandru-Sabin Bana, Dong
Min Kim, Radoslaw Kotaba, Jihong Park, Ren\'e B. S{\o}rensen
|
Wireless Access for Ultra-Reliable Low-Latency Communication (URLLC):
Principles and Building Blocks
|
Submitted to IEEE Network; Revised after 1st round of review; Title
changed after 2nd review
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ultra-reliable low latency communication (URLLC) is an important new feature
brought by 5G, with a potential to support a vast set of applications that rely
on mission-critical links. In this article, we first discuss the principles for
supporting URLLC from the perspective of the traditional assumptions and models
applied in communication/information theory. We then discuss how these
principles are applied in various elements of the system design, such as use of
various diversity sources, design of packets and access protocols. The
important messages are that there is a need to optimize the transmission of
signaling information, as well as a need for a lean use of various sources of
diversity.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2017 19:00:35 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Dec 2017 01:37:57 GMT"
},
{
"version": "v3",
"created": "Wed, 20 Dec 2017 12:06:04 GMT"
}
] | 2017-12-21T00:00:00 |
[
[
"Popovski",
"Petar",
""
],
[
"Nielsen",
"Jimmy J.",
""
],
[
"Stefanovic",
"Cedomir",
""
],
[
"de Carvalho",
"Elisabeth",
""
],
[
"Ström",
"Erik",
""
],
[
"Trillingsgaard",
"Kasper F.",
""
],
[
"Bana",
"Alexandru-Sabin",
""
],
[
"Kim",
"Dong Min",
""
],
[
"Kotaba",
"Radoslaw",
""
],
[
"Park",
"Jihong",
""
],
[
"Sørensen",
"René B.",
""
]
] |
new_dataset
| 0.985529 |
1712.05927
|
Zhichao Liu
|
Bingzhe Wu, Haodong Duan, Zhichao Liu, Guangyu Sun
|
SRPGAN: Perceptual Generative Adversarial Network for Single Image Super
Resolution
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Single image super resolution (SISR) is to reconstruct a high resolution
image from a single low resolution image. The SISR task has been a very
attractive research topic over the last two decades. In recent years,
convolutional neural network (CNN) based models have achieved great performance
on SISR task. Despite the breakthroughs achieved by using CNN models, there are
still some problems remaining unsolved, such as how to recover high frequency
details of high resolution images. Previous CNN based models always use a pixel
wise loss, such as l2 loss. Although the high resolution images constructed by
these models have high peak signal-to-noise ratio (PSNR), they often tend to be
blurry and lack high-frequency details, especially at a large scaling factor.
In this paper, we build a super resolution perceptual generative adversarial
network (SRPGAN) framework for SISR tasks. In the framework, we propose a
robust perceptual loss based on the discriminator of the built SRPGAN model. We
use the Charbonnier loss function to build the content loss and combine it with
the proposed perceptual loss and the adversarial loss. Compared with other
state-of-the-art methods, our method has demonstrated great ability to
construct images with sharp edges and rich details. We also evaluate our method
on different benchmarks and compare it with previous CNN based methods. The
results show that our method can achieve much higher structural similarity
index (SSIM) scores on most of the benchmarks than the previous state-of-art
methods.
|
[
{
"version": "v1",
"created": "Sat, 16 Dec 2017 09:52:43 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Dec 2017 17:46:16 GMT"
}
] | 2017-12-21T00:00:00 |
[
[
"Wu",
"Bingzhe",
""
],
[
"Duan",
"Haodong",
""
],
[
"Liu",
"Zhichao",
""
],
[
"Sun",
"Guangyu",
""
]
] |
new_dataset
| 0.996072 |
1712.07149
|
Laurence Mailaender
|
Arkady Molev-Shteiman, Laurence Mailaender, Xiao-Feng Qi
|
Distributed Massive MIMO Channel Estimation and Channel Database
Assistance
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to the low per-antenna SNR and high signaling overhead, channel
estimation is a major bottleneck in Massive MIMO systems. Spatial constraints
can improve estimation performance by exploiting sparsity. Solutions exist for
far field - beam domain channel estimation based on angle of arrival
estimation. However, there is no equivalent solution for near field and
distributed MIMO spatial channel estimation. We present a solution- source
domain channel estimation- that is based on source location estimation. We
extend this to employ a "Channel Database" incorporating information about the
physical scattering environment into channel estimation. We present methods for
generation, storage and usage of the Channel Database to assist localization
and communication.
|
[
{
"version": "v1",
"created": "Tue, 19 Dec 2017 19:06:21 GMT"
}
] | 2017-12-21T00:00:00 |
[
[
"Molev-Shteiman",
"Arkady",
""
],
[
"Mailaender",
"Laurence",
""
],
[
"Qi",
"Xiao-Feng",
""
]
] |
new_dataset
| 0.991063 |
1712.07182
|
Roope Vehkalahti
|
Laura Luzzi and Roope Vehkalahti
|
Algebraic lattice codes for linear fading channels
| null | null | null | null |
cs.IT math.IT math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the decades following Shannon's work, the quest to design codes for the
additive white Gaussian noise (AWGN) channel led to the development of a rich
theory, revealing a number of beautiful connections between information theory
and geometry of numbers. One of the most striking examples is the connection
between classical lattice sphere packing and the capacity of the AWGN channel.
The main result states that any family of lattice codes with linearly growing
Hermite invariant achieves a constant gap to capacity. These classical results
and many more can be found in the comprehensive book by Conway and Sloane
[5].....
|
[
{
"version": "v1",
"created": "Tue, 19 Dec 2017 20:02:26 GMT"
}
] | 2017-12-21T00:00:00 |
[
[
"Luzzi",
"Laura",
""
],
[
"Vehkalahti",
"Roope",
""
]
] |
new_dataset
| 0.996172 |
1712.07300
|
Huimiao Chen
|
Huimiao Chen, Hongcai Zhang, Zechun Hu, Yunyi Liang, Haocheng Luo,
Yinhai Wang
|
Plug-in Electric Vehicle Charging Congestion Analysis Using Taxi Travel
Data in the Central Area of Beijing
| null | null | null | null |
cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recharging a plug-in electric vehicle is more time-consuming than refueling
an internal combustion engine vehicle. As a result, charging stations may face
serious congestion problems during peak traffic hours in the near future with
the rapid growth of plug-in electric vehicle population. Considering that
drivers' time costs are usually expensive, charging congestion will be a
dominant factor that affect a charging station's quality of service. Hence, it
is indispensable to conduct adequate congestion analysis when designing
charging stations in order to guarantee acceptable quality of service in the
future. This paper proposes a data-driven approach for charging congestion
analysis of plug-in electric vehicle charging stations. Based on a data-driven
plug-in electric vehicle charging station planning model, we adopt the queuing
theory to model and analyze the charging congestion phenomenon in these
planning results. We simulate and analyze the proposed method for charging
stations servicing shared-use electric taxis in the central area of Beijing
leveraging real-world taxi travel data.
|
[
{
"version": "v1",
"created": "Tue, 19 Dec 2017 06:43:58 GMT"
}
] | 2017-12-21T00:00:00 |
[
[
"Chen",
"Huimiao",
""
],
[
"Zhang",
"Hongcai",
""
],
[
"Hu",
"Zechun",
""
],
[
"Liang",
"Yunyi",
""
],
[
"Luo",
"Haocheng",
""
],
[
"Wang",
"Yinhai",
""
]
] |
new_dataset
| 0.999178 |
1510.00440
|
Abhronil Sengupta
|
Abhronil Sengupta, Priyadarshini Panda, Parami Wijesinghe, Yusung Kim,
Kaushik Roy
|
Magnetic Tunnel Junction Mimics Stochastic Cortical Spiking Neurons
|
The article will appear in Scientific Reports
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Brain-inspired computing architectures attempt to mimic the computations
performed in the neurons and the synapses in the human brain in order to
achieve its efficiency in learning and cognitive tasks. In this work, we
demonstrate the mapping of the probabilistic spiking nature of pyramidal
neurons in the cortex to the stochastic switching behavior of a Magnetic Tunnel
Junction in presence of thermal noise. We present results to illustrate the
efficiency of neuromorphic systems based on such probabilistic neurons for
pattern recognition tasks in presence of lateral inhibition and homeostasis.
Such stochastic MTJ neurons can also potentially provide a direct mapping to
the probabilistic computing elements in Belief Networks for performing
regenerative tasks.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2015 22:31:40 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jun 2016 06:22:48 GMT"
},
{
"version": "v3",
"created": "Sat, 23 Jul 2016 06:54:35 GMT"
},
{
"version": "v4",
"created": "Tue, 19 Dec 2017 00:48:46 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Sengupta",
"Abhronil",
""
],
[
"Panda",
"Priyadarshini",
""
],
[
"Wijesinghe",
"Parami",
""
],
[
"Kim",
"Yusung",
""
],
[
"Roy",
"Kaushik",
""
]
] |
new_dataset
| 0.996922 |
1603.04739
|
Rahul Meshram
|
Rahul Meshram, D. Manjunath and Aditya Gopalan
|
On the Whittle Index for Restless Multi-armed Hidden Markov Bandits
|
Revised version, corrected few typos
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a restless multi-armed bandit in which each arm can be in one of
two states. When an arm is sampled, the state of the arm is not available to
the sampler. Instead, a binary signal with a known randomness that depends on
the state of the arm is available. No signal is available if the arm is not
sampled. An arm-dependent reward is accrued from each sampling. In each time
step, each arm changes state according to known transition probabilities which
in turn depend on whether the arm is sampled or not sampled. Since the state of
the arm is never visible and has to be inferred from the current belief and a
possible binary signal, we call this the hidden Markov bandit. Our interest is
in a policy to select the arm(s) in each time step that maximizes the infinite
horizon discounted reward. Specifically, we seek the use of Whittle's index in
selecting the arms. We first analyze the single-armed bandit and show that in
general, it admits an approximate threshold-type optimal policy when there is a
positive reward for the `no-sample' action. We also identify several special
cases for which the threshold policy is indeed the optimal policy. Next, we
show that such a single-armed bandit also satisfies an approximate-indexability
property. For the case when the single-armed bandit admits a threshold-type
optimal policy, we perform the calculation of the Whittle index for each arm.
Numerical examples illustrate the analytical results.
|
[
{
"version": "v1",
"created": "Tue, 15 Mar 2016 16:14:41 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Jun 2017 21:42:40 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Dec 2017 17:20:53 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Meshram",
"Rahul",
""
],
[
"Manjunath",
"D.",
""
],
[
"Gopalan",
"Aditya",
""
]
] |
new_dataset
| 0.994524 |
1709.04163
|
Yo-Seb Jeon
|
Yo-Seb Jeon, Namyoon Lee, Song-Nam Hong, and Robert W. Heath Jr
|
One-Bit Sphere Decoding for Uplink Massive MIMO Systems with One-Bit
ADCs
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a low-complexity near-maximum-likelihood-detection
(near-MLD) algorithm called one-bit-sphere-decoding for an uplink massive
multiple-input multiple-output (MIMO) system with one-bit analog-to-digital
converters (ADCs). The idea of the proposed algorithm is to estimate the
transmitted symbol vector sent by uplink users (a codeword vector) by searching
over a sphere, which contains a collection of codeword vectors close to the
received signal vector at the base station in terms of a weighted Hamming
distance. To reduce the computational complexity for the construction of the
sphere, the proposed algorithm divides the received signal vector into multiple
sub-vectors each with reduced dimension. Then, it generates multiple spheres in
parallel, where each sphere is centered at the sub-vector and contains a list
of sub-codeword vectors. The detection performance of the proposed algorithm is
also analyzed by characterizing the probability that the proposed algorithm
performs worse than the MLD. The analysis shows how the dimension of each
sphere and the size of the sub-codeword list are related to the
performance-complexity tradeoff achieved by the proposed algorithm. Simulation
results demonstrate that the proposed algorithm achieves near-MLD performance,
while reducing the computational complexity compared to the existing MLD
method.
|
[
{
"version": "v1",
"created": "Wed, 13 Sep 2017 07:16:40 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Dec 2017 11:56:23 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Jeon",
"Yo-Seb",
""
],
[
"Lee",
"Namyoon",
""
],
[
"Hong",
"Song-Nam",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] |
new_dataset
| 0.985367 |
1712.02322
|
Rana Soltani-Zarrin
|
Rana Soltani-Zarrin, Amin Zeiaee, Andrew Eib, Reza Langari, and Reza
Tafreshi
|
Cleverarm: A Novel Exoskeleton For Rehabilitation Of Upper Limb
Impairments
|
2017 IEEE International Symposium on Wearable & Rehabilitation
Robotics (WeRob)
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
CLEVERarm (Compact, Low-weight, Ergonomic, Virtual and Augmented Reality
Enhanced Rehabilitation arm) is a novel exoskeleton with eight degrees of
freedom supporting the motion of shoulder girdle, glenohumeral joint, elbow and
wrist. Of the eight degrees of freedom of the exoskeleton, six are active and
the two degrees of freedom supporting the motion of wrist are passive. This
paper briefly outlines the design of CLEVERarm and its control architectures.
|
[
{
"version": "v1",
"created": "Wed, 6 Dec 2017 18:44:41 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Dec 2017 00:00:27 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Soltani-Zarrin",
"Rana",
""
],
[
"Zeiaee",
"Amin",
""
],
[
"Eib",
"Andrew",
""
],
[
"Langari",
"Reza",
""
],
[
"Tafreshi",
"Reza",
""
]
] |
new_dataset
| 0.996176 |
1712.03943
|
Carlton Shepherd
|
Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis
|
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
|
Accepted at the 11th IFIP International Conference on Information
Security Theory and Practice (WISTP '17)
| null | null | null |
cs.CR cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Remote mobile and embedded devices are used to deliver increasingly impactful
services, such as medical rehabilitation and assistive technologies. Secure
system logging is beneficial in these scenarios to aid audit and forensic
investigations particularly if devices bring harm to end-users. Logs should be
tamper-resistant in storage, during execution, and when retrieved by a trusted
remote verifier. In recent years, Trusted Execution Environments (TEEs) have
emerged as the go-to root of trust on constrained devices for isolated
execution of sensitive applications. Existing TEE-based logging systems,
however, focus largely on protecting server-side logs and offer little
protection to constrained source devices. In this paper, we introduce EmLog --
a tamper-resistant logging system for constrained devices using the
GlobalPlatform TEE. EmLog provides protection against complex software
adversaries and offers several additional security properties over past
schemes. The system is evaluated across three log datasets using an
off-the-shelf ARM development board running an open-source,
GlobalPlatform-compliant TEE. On average, EmLog runs with low run-time memory
overhead (1MB heap and stack), 430--625 logs/second throughput, and five-times
persistent storage overhead versus unprotected logs.
|
[
{
"version": "v1",
"created": "Mon, 11 Dec 2017 18:49:08 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Dec 2017 16:41:54 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Dec 2017 03:20:19 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Shepherd",
"Carlton",
""
],
[
"Akram",
"Raja Naeem",
""
],
[
"Markantonakis",
"Konstantinos",
""
]
] |
new_dataset
| 0.996174 |
1712.04546
|
Changchuan Yin Dr.
|
Changchuan Yin
|
Encoding DNA sequences by integer chaos game representation
| null | null | null | null |
cs.CE q-bio.OT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
DNA sequences are fundamental for encoding genetic information. The genetic
information may not only be understood by symbolic sequences but also from the
hidden signals inside the sequences. The symbolic sequences need to be
transformed into numerical sequences so the hidden signals can be revealed by
signal processing techniques. All current transformation methods encode DNA
sequences into numerical values of the same length. These representations have
limitations in the applications of genomic signal compression, encryption, and
steganography. We propose an integer chaos game representation (iCGR) of DNA
sequences and a lossless encoding method DNA sequences by the iCGR. In the iCGR
method, a DNA sequence is represented by the iterated function of the
nucleotides and their positions in the sequence. Then the DNA sequence can be
uniquely encoded and recovered using three integers from iCGR. One integer is
the sequence length and the other two integers represent the accumulated
distributions of nucleotides in the sequence. The integer encoding scheme can
compress a DNA sequence by 2 bits per nucleotide. The integer representation of
DNA sequences provides a prospective tool for sequence compression, encryption,
and steganography. The Python programs in this study are freely available to
the public at https://github.com/cyinbox/iCGR
|
[
{
"version": "v1",
"created": "Tue, 12 Dec 2017 21:50:05 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Dec 2017 15:45:57 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Yin",
"Changchuan",
""
]
] |
new_dataset
| 0.997428 |
1712.06676
|
Haitham Afifi
|
Haitham Afifi, Sebastien Auroux, Holger Karl
|
MARVELO: Wireless Virtual Network Embedding for Overlay Graphs with
Loops
|
6 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When deploying resource-intensive signal processing applications in wireless
sensor or mesh networks, distributing processing blocks over multiple nodes
becomes promising. Such distributed applications need to solve the placement
problem (which block to run on which node), the routing problem (which link
between blocks to map on which path between nodes), and the scheduling problem
(which transmission is active when). We investigate a variant where the
application graph may contain feedback loops and we exploit wireless networks?
inherent multicast advantage. Thus, we propose Multicast-Aware Routing for
Virtual network Embedding with Loops in Overlays (MARVELO) to find efficient
solutions for scheduling and routing under a detailed interference model. We
cast this as a mixed integer quadratically constrained optimisation problem and
provide an efficient heuristic. Simulations show that our approach handles
complex scenarios quickly.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2017 21:07:38 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Afifi",
"Haitham",
""
],
[
"Auroux",
"Sebastien",
""
],
[
"Karl",
"Holger",
""
]
] |
new_dataset
| 0.998855 |
1712.06793
|
Han Guoan
|
Liang Xiao, Guoan Han, Donghua Jiang, Hongzi Zhu, Yanyong Zhang, H.
Vincent Poor
|
Two-dimensional Anti-jamming Mobile Communication Based on Reinforcement
Learning
| null | null | null | null |
cs.CR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
By using smart radio devices, a jammer can dynamically change its jamming
policy based on opposing security mechanisms; it can even induce the mobile
device to enter a specific communication mode and then launch the jamming
policy accordingly. On the other hand, mobile devices can exploit spread
spectrum and user mobility to address both jamming and interference. In this
paper, a two-dimensional anti-jamming mobile communication scheme is proposed
in which a mobile device leaves a heavily jammed/interfered-with frequency or
area. It is shown that, by applying reinforcement learning techniques, a mobile
device can achieve an optimal communication policy without the need to know the
jamming and interference model and the radio channel model in a dynamic game
framework. More specifically, a hotbooting deep Q-network based two-dimensional
mobile communication scheme is proposed that exploits experiences in similar
scenarios to reduce the exploration time at the beginning of the game, and
applies deep convolutional neural network and macro-action techniques to
accelerate the learning speed in dynamic situations. Several real-world
scenarios are simulated to evaluate the proposed method. These simulation
results show that our proposed scheme can improve both the
signal-to-interference-plus-noise ratio of the signals and the utility of the
mobile devices against cooperative jamming compared with benchmark schemes.
|
[
{
"version": "v1",
"created": "Tue, 19 Dec 2017 06:01:31 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Xiao",
"Liang",
""
],
[
"Han",
"Guoan",
""
],
[
"Jiang",
"Donghua",
""
],
[
"Zhu",
"Hongzi",
""
],
[
"Zhang",
"Yanyong",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
new_dataset
| 0.97667 |
1712.06794
|
Manar Mohaisen Prof.
|
Manar Mohaisen, Vitalii Pruks
|
Downlink macro-diversity precoding-aided spatial modulation
|
9 pages, 6 figures, 3 tables (Journal of Communications and
Networks), accepted on 2017, September 12
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a downlink macro-diversity precodingaided spatial modulation
(MD-PSM) scheme is proposed, in which two base stations (BSs) communicate
simultaneously with a single mobile station (MS). As such, the proposed scheme
achieved twice the spectral efficiency of the conventional PSM scheme. To
render the demodulation possible, the two signal constellation sets used at the
two BSs should be disjoint. Also, since the two BSs use the same spatial
dimension, i.e., indices of receive antennas, the Minkowski sum of the two
constellation sets should include unrepeated symbols. This is achieved through
rotating the constellation set used by the second BS, where the error rate is
also minimized. After obtaining the optimal rotation angles for several
scenarios, a reduced complexity maximum-likelihood receiver is introduced. For
an equal number of transmit and receive antennas of 4 and at a target BER of
10^{-4}, the simulation results show that the proposed MD-PSM scheme
outperforms the conventional PSM by about 17.3 dB and 12.4 dB, while achieving
the same and double the spectral efficiency, respectively. Also, due to the
distributed nature of MDPSM, it is shown that the diversity order of the novel
MD-PSM scheme is twice that of the conventional PSM.
|
[
{
"version": "v1",
"created": "Tue, 19 Dec 2017 06:09:28 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Mohaisen",
"Manar",
""
],
[
"Pruks",
"Vitalii",
""
]
] |
new_dataset
| 0.978808 |
1712.06840
|
Franz J. Brandenburg
|
Franz J. Brandenburg
|
On Fan-Crossing Graphs
| null | null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A fan is a set of edges with a single common endpoint. A graph is
fan-crossing if it admits a drawing in the plane so that each edge is crossed
by edges of a fan. It is fan-planar if, in addition, the common endpoint is on
the same side of the crossed edge. A graph is adjacency-crossing if it admits a
drawing so that crossing edges are adjacent. Then it excludes independent
crossings which are crossings by edges with no common endpoint.
Adjacency-crossing allows triangle-crossings in which an edge crosses the edges
of a triangle, which is excluded at fan-crossing graphs.
We show that every adjacency-crossing graph is fan-crossing. Thus
triangle-crossings can be avoided. On the other hand, there are fan-crossing
graphs that are not fan-planar, whereas for every fan-crossing graph there is a
fan-planar graph on the same set of vertices and with the same number of edges.
Hence, fan-crossing and fan-planar graphs are different, but they do not differ
in their density with at most 5n - 10 edges for graphs of size n.
|
[
{
"version": "v1",
"created": "Tue, 19 Dec 2017 09:39:26 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Brandenburg",
"Franz J.",
""
]
] |
new_dataset
| 0.999657 |
1712.06848
|
Erel Segal-Halevi
|
Erel Segal-Halevi and Avinatan Hassidim and Yonatan Aumann
|
MUDA: A Truthful Multi-Unit Double-Auction Mechanism
|
Accepted to the AAAI2018 conference
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a seminal paper, McAfee (1992) presented a truthful mechanism for double
auctions, attaining asymptotically-optimal gain-from-trade without any prior
information on the valuations of the traders. McAfee's mechanism handles
single-parametric agents, allowing each seller to sell a single unit and each
buyer to buy a single unit. This paper presents a double-auction mechanism that
handles multi-parametric agents and allows multiple units per trader, as long
as the valuation functions of all traders have decreasing marginal returns. The
mechanism is prior-free, ex-post individually-rational, dominant-strategy
truthful and strongly-budget-balanced. Its gain-from-trade approaches the
optimum when the market size is sufficiently large.
|
[
{
"version": "v1",
"created": "Tue, 19 Dec 2017 10:14:19 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Segal-Halevi",
"Erel",
""
],
[
"Hassidim",
"Avinatan",
""
],
[
"Aumann",
"Yonatan",
""
]
] |
new_dataset
| 0.996405 |
1712.06922
|
Qi Zhu
|
Qi Zhu, Hongwei Ng, Liyuan Liu, Ziwei Ji, Bingjie Jiang, Jiaming Shen,
Huan Gui (University of Illinois Urbana-Champaign)
|
Wikidata Vandalism Detection - The Loganberry Vandalism Detector at WSDM
Cup 2017
|
Vandalism Detector at WSDM Cup 2017, see arXiv:1712.05956
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wikidata is the new, large-scale knowledge base of the Wikimedia Foundation.
As it can be edited by anyone, entries frequently get vandalized, leading to
the possibility that it might spread of falsified information if such posts are
not detected. The WSDM 2017 Wiki Vandalism Detection Challenge requires us to
solve this problem by computing a vandalism score denoting the likelihood that
a revision corresponds to an act of vandalism and performance is measured using
the ROC-AUC obtained on a held-out test set. This paper provides the details of
our submission that obtained an ROC-AUC score of 0.91976 in the final
evaluation.
|
[
{
"version": "v1",
"created": "Tue, 19 Dec 2017 13:40:06 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Zhu",
"Qi",
"",
"University of Illinois Urbana-Champaign"
],
[
"Ng",
"Hongwei",
"",
"University of Illinois Urbana-Champaign"
],
[
"Liu",
"Liyuan",
"",
"University of Illinois Urbana-Champaign"
],
[
"Ji",
"Ziwei",
"",
"University of Illinois Urbana-Champaign"
],
[
"Jiang",
"Bingjie",
"",
"University of Illinois Urbana-Champaign"
],
[
"Shen",
"Jiaming",
"",
"University of Illinois Urbana-Champaign"
],
[
"Gui",
"Huan",
"",
"University of Illinois Urbana-Champaign"
]
] |
new_dataset
| 0.996984 |
1712.06952
|
Arvin Rasoulzadeh
|
Arvin Rasoulzadeh and Georg Nawratil
|
Linear Pentapods with a Simple Singularity Variety
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There exists a bijection between the configuration space of a linear pentapod
and all points $(u,v,w,p_x,p_y,p_z)\in\mathbb{R}^{6}$ located on the singular
quadric $\Gamma: u^2+v^2+w^2=1$, where $(u,v,w)$ determines the orientation of
the linear platform and $(p_x,p_y,p_z)$ its position. Then the set of all
singular robot configurations is obtained by intersecting $\Gamma$ with a cubic
hypersurface $\Sigma$ in $\mathbb{R}^{6}$, which is only quadratic in the
orientation variables and position variables, respectively. This article
investigates the restrictions to be imposed on the design of this mechanism in
order to obtain a reduction in degree. In detail we study the cases where
$\Sigma$ is (1) linear in position variables, (2) linear in orientation
variables and (3) quadratic in total. The resulting designs of linear pentapods
have the advantage of considerably simplified computation of singularity-free
spheres in the configuration space. Finally we propose three kinematically
redundant designs of linear pentapods with a simple singularity surface.
|
[
{
"version": "v1",
"created": "Tue, 19 Dec 2017 14:39:50 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Rasoulzadeh",
"Arvin",
""
],
[
"Nawratil",
"Georg",
""
]
] |
new_dataset
| 0.998823 |
1712.06956
|
Evangelos Coutsias
|
Michelle Hatch Hummel, Bihua Yu, Carlos Simmerling and Evangelos A.
Coutsias
|
Laguerre-Intersection Method for Implicit Solvation
|
39 pages
| null | null | null |
cs.CG math.MG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Laguerre tessellations of macromolecules capture properties such as molecular
interface surfaces, volumes and cavities. Explicit solvent molecular dynamics
simulations of a macromolecule are slow as the number of solvent atoms
considered typically increases by order of magnitude. Implicit methods model
the solvent via continuous corrections to the force field based on estimates of
the solvent exposed surface areas of individual atoms, gaining speed at the
expense of accuracy. However, Laguerre cells of exterior atoms tend to be
overly large or unbounded. Our method, the Laguerre-Intersection method, caps
cells in a physically accurate manner by considering the intersection of the
space-filling diagram with the Laguerre tessellation. This method optimizes an
adjustable parameter, the weight, to ensure the areas and volumes of capped
cells exposed to solvent are as close as possible, on average, to those
computed from equilibrated explicit solvent simulations. The contact planes are
radical planes, meaning that as the solvent weight is varied, cells remain
constant. We test the consistency of our model using a high-quality trajectory
of HIV-protease, a dimer with flexible loops and open-close transitions. We
also compare our results with interval-arithmetic Gauss-Bonnet based method.
Optimal solvent parameters quickly converge, which we use to illustrate the
increased accuracy of the Laguerre-Intersection method over two recently
proposed methods as compared to the explicit model.
|
[
{
"version": "v1",
"created": "Sun, 10 Dec 2017 02:52:48 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Hummel",
"Michelle Hatch",
""
],
[
"Yu",
"Bihua",
""
],
[
"Simmerling",
"Carlos",
""
],
[
"Coutsias",
"Evangelos A.",
""
]
] |
new_dataset
| 0.960589 |
1712.07019
|
Ehsan Hemmati
|
Mansour Sheikhan, Ehsan Hemmati
|
PSO-Optimized Hopfield Neural Network-Based Multipath Routing for Mobile
Ad-hoc Networks
|
Mobile ad-hoc networks; Reliability; Multipath routing; Neural
networks; Particle swarm optimization (PSO)
|
International Journal of Computational Intelligence Systems, Year
2012, Volume 5, Number 3, Pages 568-581
|
10.1080/18756891.2012.696921
| null |
cs.NE cs.AI cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Mobile ad-hoc network (MANET) is a dynamic collection of mobile computers
without the need for any existing infrastructure. Nodes in a MANET act as hosts
and routers. Designing of robust routing algorithms for MANETs is a challenging
task. Disjoint multipath routing protocols address this problem and increase
the reliability, security and lifetime of network. However, selecting an
optimal multipath is an NP-complete problem. In this paper, Hopfield neural
network (HNN) which its parameters are optimized by particle swarm optimization
(PSO) algorithm is proposed as multipath routing algorithm. Link expiration
time (LET) between each two nodes is used as the link reliability estimation
metric. This approach can find either node-disjoint or link-disjoint paths in
single phase route discovery. Simulation results confirm that PSO-HNN routing
algorithm has better performance as compared to backup path set selection
algorithm (BPSA) in terms of the path set reliability and number of paths in
the set.
|
[
{
"version": "v1",
"created": "Thu, 16 Nov 2017 23:36:59 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Sheikhan",
"Mansour",
""
],
[
"Hemmati",
"Ehsan",
""
]
] |
new_dataset
| 0.995987 |
1712.07040
|
Tom\'a\v{s} Ko\v{c}isk\'y
|
Tom\'a\v{s} Ko\v{c}isk\'y, Jonathan Schwarz, Phil Blunsom, Chris Dyer,
Karl Moritz Hermann, G\'abor Melis, Edward Grefenstette
|
The NarrativeQA Reading Comprehension Challenge
| null | null | null | null |
cs.CL cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reading comprehension (RC)---in contrast to information retrieval---requires
integrating information and reasoning about events, entities, and their
relations across a full document. Question answering is conventionally used to
assess RC ability, in both artificial agents and children learning to read.
However, existing RC datasets and tasks are dominated by questions that can be
solved by selecting answers using superficial information (e.g., local context
similarity or global term frequency); they thus fail to test for the essential
integrative aspect of RC. To encourage progress on deeper comprehension of
language, we present a new dataset and set of tasks in which the reader must
answer questions about stories by reading entire books or movie scripts. These
tasks are designed so that successfully answering their questions requires
understanding the underlying narrative rather than relying on shallow pattern
matching or salience. We show that although humans solve the tasks easily,
standard RC models struggle on the tasks presented here. We provide an analysis
of the dataset and the challenges it presents.
|
[
{
"version": "v1",
"created": "Tue, 19 Dec 2017 16:48:05 GMT"
}
] | 2017-12-20T00:00:00 |
[
[
"Kočiský",
"Tomáš",
""
],
[
"Schwarz",
"Jonathan",
""
],
[
"Blunsom",
"Phil",
""
],
[
"Dyer",
"Chris",
""
],
[
"Hermann",
"Karl Moritz",
""
],
[
"Melis",
"Gábor",
""
],
[
"Grefenstette",
"Edward",
""
]
] |
new_dataset
| 0.973737 |
1511.04919
|
Daniel Moskovich
|
Daniel Moskovich and Avishy Y. Carmi
|
Tales told by coloured tangles
|
29 pages, 28 figures. Revised to be more self-contained
|
Int. J. Unconv. Comput. 12(1) 71-105 (2016)
| null | null |
cs.IT math.GT math.IT quant-ph
|
http://creativecommons.org/licenses/by/4.0/
|
Tangle machines are a topologically inspired diagrammatic formalism to
describe information flow in networks. This paper begins with an expository
account of tangle machines motivated by the problem of describing `covariance
intersection' fusion of Gaussian estimators in networks. It then gives two
examples in which tangle machines tell stories of adiabatic quantum
computations, and discusses learning tangle machines from data.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2015 11:28:00 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Dec 2015 13:02:18 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Moskovich",
"Daniel",
""
],
[
"Carmi",
"Avishy Y.",
""
]
] |
new_dataset
| 0.953919 |
1702.03379
|
Fattaneh Bayatbabolghani
|
Fattaneh Bayatbabolghani and Marina Blanton and Mehrdad Aliasgari and
Michael Goodrich
|
Secure Fingerprint Alignment and Matching Protocols
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present three private fingerprint alignment and matching protocols, based
on what are considered to be the most precise and efficient fingerprint
recognition algorithms, which use minutia points. Our protocols allow two or
more honest-but-curious parties to compare their respective privately-held
fingerprints in a secure way such that they each learn nothing more than an
accurate score of how well the fingerprints match. To the best of our
knowledge, this is the first time fingerprint alignment based on minutiae is
considered in a secure computation framework. We build secure fingerprint
alignment and matching protocols in both the two-party setting using garbled
circuit evaluation and in the multi-party setting using secret sharing
techniques. In addition to providing precise and efficient secure fingerprint
alignment and matching, our contributions include the design of a number of
secure sub-protocols for complex operations such as sine, cosine, arctangent,
square root, and selection, which are likely to be of independent interest.
|
[
{
"version": "v1",
"created": "Sat, 11 Feb 2017 03:59:31 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Mar 2017 04:19:08 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Sep 2017 14:21:55 GMT"
},
{
"version": "v4",
"created": "Sat, 16 Dec 2017 06:43:13 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Bayatbabolghani",
"Fattaneh",
""
],
[
"Blanton",
"Marina",
""
],
[
"Aliasgari",
"Mehrdad",
""
],
[
"Goodrich",
"Michael",
""
]
] |
new_dataset
| 0.984891 |
1704.00792
|
Philipp Winter
|
George Kadianakis and Claudia V. Roberts and Laura M. Roberts and
Philipp Winter
|
Anomalous keys in Tor relays
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In its more than ten years of existence, the Tor network has seen hundreds of
thousands of relays come and go. Each relay maintains several RSA keys,
amounting to millions of keys, all archived by The Tor Project. In this paper,
we analyze 3.7 million RSA public keys of Tor relays. We (i) check if any
relays share prime factors or moduli, (ii) identify relays that use
non-standard exponents, (iii) characterize malicious relays that we discovered
in the first two steps, and (iv) develop a tool that can determine what onion
services fell prey to said malicious relays. Our experiments revealed that ten
relays shared moduli and 3,557 relays -- almost all part of a research project
-- shared prime factors, allowing adversaries to reconstruct private keys. We
further discovered 122 relays that used non-standard RSA exponents, presumably
in an attempt to attack onion services. By simulating how onion services are
positioned in Tor's distributed hash table, we identified four onion services
that were targeted by these malicious relays. Our work provides both The Tor
Project and onion service operators with tools to identify misconfigured and
malicious Tor relays to stop attacks before they pose a threat to Tor users.
|
[
{
"version": "v1",
"created": "Mon, 3 Apr 2017 20:08:40 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2017 19:39:01 GMT"
},
{
"version": "v3",
"created": "Fri, 15 Dec 2017 21:46:29 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Kadianakis",
"George",
""
],
[
"Roberts",
"Claudia V.",
""
],
[
"Roberts",
"Laura M.",
""
],
[
"Winter",
"Philipp",
""
]
] |
new_dataset
| 0.997333 |
1705.00694
|
Stepan Kuznetsov
|
Max Kanovich, Stepan Kuznetsov, Glyn Morrill, Andre Scedrov
|
A polynomial time algorithm for the Lambek calculus with brackets of
bounded order
| null |
Proc. FSCD 2017, LIPIcs vol. 84, 22:1-22:17
|
10.4230/LIPIcs.FSCD.2017.22
| null |
cs.LO cs.CL cs.DS cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Lambek calculus is a logical foundation of categorial grammar, a linguistic
paradigm of grammar as logic and parsing as deduction. Pentus (2010) gave a
polynomial-time algorithm for determ- ining provability of bounded depth
formulas in the Lambek calculus with empty antecedents allowed. Pentus'
algorithm is based on tabularisation of proof nets. Lambek calculus with
brackets is a conservative extension of Lambek calculus with bracket
modalities, suitable for the modeling of syntactical domains. In this paper we
give an algorithm for provability the Lambek calculus with brackets allowing
empty antecedents. Our algorithm runs in polynomial time when both the formula
depth and the bracket nesting depth are bounded. It combines a Pentus-style
tabularisation of proof nets with an automata-theoretic treatment of
bracketing.
|
[
{
"version": "v1",
"created": "Mon, 1 May 2017 20:12:11 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Dec 2017 10:39:22 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Kanovich",
"Max",
""
],
[
"Kuznetsov",
"Stepan",
""
],
[
"Morrill",
"Glyn",
""
],
[
"Scedrov",
"Andre",
""
]
] |
new_dataset
| 0.965958 |
1710.02648
|
Yujian Li
|
Yujian Li
|
Can Machines Think in Radio Language?
|
4 pages, 1 figure
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
People can think in auditory, visual and tactile forms of language, so can
machines principally. But is it possible for them to think in radio language?
According to a first principle presented for general intelligence, i.e. the
principle of language's relativity, the answer may give an exceptional solution
for robot astronauts to talk with each other in space exploration.
|
[
{
"version": "v1",
"created": "Sat, 7 Oct 2017 08:03:58 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Oct 2017 08:49:37 GMT"
},
{
"version": "v3",
"created": "Sun, 17 Dec 2017 12:39:53 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Li",
"Yujian",
""
]
] |
new_dataset
| 0.970473 |
1712.05819
|
Amine Mezghani
|
Amine Mezghani and A. Lee Swindlehurst
|
mmWave Massive MIMO with Simple RF and Appropriate DSP
|
published in Asilomar 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is considerable interest in the combined use of millimeter-wave
(mmwave) frequencies and arrays of massive numbers of antennas (massive MIMO)
for next-generation wireless communications systems. A symbiotic relationship
exists between these two factors: mmwave frequencies allow for densely packed
antenna arrays, and hence massive MIMO can be achieved with a small form
factor; low per-antenna SNR and shadowing can be overcome with a large array
gain; steering narrow beams or nulls with a large array is a good match for the
line-of-sight (LOS) or near-LOS mmwave propagation environments, etc.. However,
the cost and power consumption for standard implementations of massive MIMO
arrays at mmwave frequencies is a significant drawback to rapid adoption and
deployment. In this paper, we examine a number of possible approaches to reduce
cost and power at both the basestation and user terminal, making up for it with
signal processing and additional (cheap) antennas. These approaches include
lowresolution Analog-to-Digital Converters (ADCs), wireless local oscillator
distribution networks, spatial multiplexing and multistreaming instead of
higher-order modulation etc.. We will examine the potential of these approaches
in making mmwave massive MIMO a reality and discuss the requirements in terms
of digital signal processing (DSP).
|
[
{
"version": "v1",
"created": "Fri, 15 Dec 2017 19:33:09 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Mezghani",
"Amine",
""
],
[
"Swindlehurst",
"A. Lee",
""
]
] |
new_dataset
| 0.999602 |
1712.05914
|
Thai Hoang Dinh DTH
|
Khoi Khac Nguyen, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Diep
Nguyen, and Eryk Dutkiewicz
|
Cyberattack Detection in Mobile Cloud Computing: A Deep Learning
Approach
|
6 pages, 3 figures, 1 table, WCNC 2018 conference
| null | null | null |
cs.CR cs.DC cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the rapid growth of mobile applications and cloud computing, mobile
cloud computing has attracted great interest from both academia and industry.
However, mobile cloud applications are facing security issues such as data
integrity, users' confidentiality, and service availability. A preventive
approach to such problems is to detect and isolate cyber threats before they
can cause serious impacts to the mobile cloud computing system. In this paper,
we propose a novel framework that leverages a deep learning approach to detect
cyberattacks in mobile cloud environment. Through experimental results, we show
that our proposed framework not only recognizes diverse cyberattacks, but also
achieves a high accuracy (up to 97.11%) in detecting the attacks. Furthermore,
we present the comparisons with current machine learning-based approaches to
demonstrate the effectiveness of our proposed solution.
|
[
{
"version": "v1",
"created": "Sat, 16 Dec 2017 07:24:55 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Nguyen",
"Khoi Khac",
""
],
[
"Hoang",
"Dinh Thai",
""
],
[
"Niyato",
"Dusit",
""
],
[
"Wang",
"Ping",
""
],
[
"Nguyen",
"Diep",
""
],
[
"Dutkiewicz",
"Eryk",
""
]
] |
new_dataset
| 0.98938 |
1712.06091
|
Eran Treister
|
Eran Treister and Eldad Haber
|
A multigrid solver to the Helmholtz equation with a point source based
on travel time and amplitude
| null | null | null | null |
cs.CE physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Helmholtz equation arises when modeling wave propagation in the frequency
domain. The equation is discretized as an indefinite linear system, which is
difficult to solve at high wave numbers. In many applications, the solution of
the Helmholtz equation is required for a point source. In this case, it is
possible to reformulate the equation as two separate equations: one for the
travel time of the wave and one for its amplitude. The travel time is obtained
by a solution of the factored eikonal equation, and the amplitude is obtained
by solving a complex-valued advection-diffusion-reaction (ADR) equation. The
reformulated equation is equivalent to the original Helmholtz equation, and the
differences between the numerical solutions of these equations arise only from
discretization errors. We develop an efficient multigrid solver for obtaining
the amplitude given the travel time, which can be efficiently computed. This
approach is advantageous because the amplitude is typically smooth in this
case, and hence, more suitable for multigrid solvers than the standard
Helmholtz discretization. We demonstrate that our second order ADR
discretization is more accurate than the standard second order discretization
at high wave numbers, as long as there are no reflections or caustics.
Moreover, we show that using our approach, the problem can be solved more
efficiently than using the common shifted Laplacian multigrid approach.
|
[
{
"version": "v1",
"created": "Sun, 17 Dec 2017 11:44:36 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Treister",
"Eran",
""
],
[
"Haber",
"Eldad",
""
]
] |
new_dataset
| 0.97072 |
1712.06212
|
Minquan Cheng
|
Jinyu Wang, Minquan Cheng, Qifa Yan, Xiaohu Tang
|
On the Placement Delivery Array Design for Coded Caching Scheme in D2D
Networks
|
20 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The coded caching scheme is an efficient technique as a solution to reduce
the wireless network burden during the peak times in a Device-to-Device (D2D in
short) communications. In a coded caching scheme, each file block should be
divided into $F$ packets. It is meaningful to design a coded caching scheme
with the rate and $F$ as small as possible, especially in the practice for D2D
network. In this paper we first characterize coded caching scheme for D2D
network by a simple array called D2D placement delivery array (DPDA in shot).
Consequently some coded caching scheme for D2D network can be discussed by
means of an appropriate DPDA. Secondly we derive the lower bounds on the rate
and $F$ of a DPDA. According these two lower bounds, we show that the
previously known determined scheme proposed by Ji et al., (IEEE Trans. Inform.
Theory, 62(2): 849-869,2016) reaches our lower bound on the rate, but does not
meet the lower bound on $F$ for some parameters. Finally for these parameters,
we construct three classes of DPDAs which meet our two lower bounds. Based on
these DPDAs, three classes of coded caching scheme with low rate and lower $F$
are obtained for D2D network.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2017 00:29:52 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Wang",
"Jinyu",
""
],
[
"Cheng",
"Minquan",
""
],
[
"Yan",
"Qifa",
""
],
[
"Tang",
"Xiaohu",
""
]
] |
new_dataset
| 0.987226 |
1712.06251
|
Shuaifang Zhang
|
Shuaifang Zhang, Dongsheng Li, Wei Shen, Xiwen Zhang, Yu Liu
|
Crack detection in beam structures with a novel Laplace based Wavelet
Finite Element method
| null | null | null | null |
cs.CE cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Beam structure is one of the most widely used structures in mechanical
engineering and civil engineering. Ultrasonic guided wave based crack
identification is one of the most important and accepted approaches applied to
detect unseen small flaws in structures. Numerical simulations of ultrasonic
guided wave propagation have caught more and more attention due to the fast
development of hardware and software in the last few years. From all the
numerical simulation methods, wavelet based finite element method has been
proved to be one of the most efficient methods due to its better spatial
resolution, which means it needs fewer elements to get the same accuracy and it
can improve the calculation cost significantly. However, it needs a very small
time interval. Laplace transform can easily convert the time domain into a
frequency domain and then revert it back to a time domain. Laplace transform
has thus the advantage of finding better results with a very large time
interval. which can save a lot of time cost. This paper will present an
innovative method combining Laplace transform and the B-spline wavelet on
interval (BSWI) finite element method. This novel method allows to get results
with the same accuracy and with a significantly lower time cost, which would
not only decrease the total number of elements in the structure but also
increase the time integration interval. The numerical Laplace transform and
BSWI finite element will be introduced. Moreover, this innovative method is
applied to simulate the ultrasonic wave propagation in a beam structure in
different materials. Numerical examples for crack identification in beam
structures have been studied for verification.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2017 05:16:37 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Zhang",
"Shuaifang",
""
],
[
"Li",
"Dongsheng",
""
],
[
"Shen",
"Wei",
""
],
[
"Zhang",
"Xiwen",
""
],
[
"Liu",
"Yu",
""
]
] |
new_dataset
| 0.976212 |
1712.06259
|
Peter Reichl
|
P. Reichl and S. Claus
|
"Oh Tanenbaum, oh Tanenbaum...": Technical Foundations of Xmas 4.0
Research
|
5 pages, 12 figures
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Andrew Tanenbaum and his textbooks -- e.g. on Operating Systems, Computer
Networks, Structured Computer Organization and Distributed Systems, to name but
a few -- have had a tremendous impact on generations of computer science
students (and teachers at the same time). Given this, it is striking to observe
that this comprehensive body of work apparently does not provide a single line
on a research topic that seems to be intimately related with his name (at least
in German), i.e. Xmas Research (XR). Hence, the goal of this paper is to fill
this gap and provide insight into a number of paradigmatic XR research
questions, for instance: Can we today still count on Santa Claus? Or at least
on Xmas trees? And does this depend on basic tree structures, or can we rather
find solutions on the level of programming languages? By addressing such basic
open issues, we aim at providing a solid technical foundation for future steps
towards the imminent evolution of Xmas 4.0.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2017 06:09:29 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Reichl",
"P.",
""
],
[
"Claus",
"S.",
""
]
] |
new_dataset
| 0.975888 |
1712.06289
|
Yi Zhang
|
Yi Zhang, Xu Sun
|
A Chinese Dataset with Negative Full Forms for General Abbreviation
Prediction
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Abbreviation is a common phenomenon across languages, especially in Chinese.
In most cases, if an expression can be abbreviated, its abbreviation is used
more often than its fully expanded forms, since people tend to convey
information in a most concise way. For various language processing tasks,
abbreviation is an obstacle to improving the performance, as the textual form
of an abbreviation does not express useful information, unless it's expanded to
the full form. Abbreviation prediction means associating the fully expanded
forms with their abbreviations. However, due to the deficiency in the
abbreviation corpora, such a task is limited in current studies, especially
considering general abbreviation prediction should also include those full form
expressions that do not have valid abbreviations, namely the negative full
forms (NFFs). Corpora incorporating negative full forms for general
abbreviation prediction are few in number. In order to promote the research in
this area, we build a dataset for general Chinese abbreviation prediction,
which needs a few preprocessing steps, and evaluate several different models on
the built dataset. The dataset is available at
https://github.com/lancopku/Chinese-abbreviation-dataset
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2017 08:24:12 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Zhang",
"Yi",
""
],
[
"Sun",
"Xu",
""
]
] |
new_dataset
| 0.999842 |
1712.06343
|
Dohyung Kim
|
Dohyung Kim, Hyochang Yang, Minki Chung, Sungzoon Cho
|
Squeezed Convolutional Variational AutoEncoder for Unsupervised Anomaly
Detection in Edge Device Industrial Internet of Things
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose Squeezed Convolutional Variational AutoEncoder
(SCVAE) for anomaly detection in time series data for Edge Computing in
Industrial Internet of Things (IIoT). The proposed model is applied to labeled
time series data from UCI datasets for exact performance evaluation, and
applied to real world data for indirect model performance comparison. In
addition, by comparing the models before and after applying Fire Modules from
SqueezeNet, we show that model size and inference times are reduced while
similar levels of performance is maintained.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2017 11:23:51 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Kim",
"Dohyung",
""
],
[
"Yang",
"Hyochang",
""
],
[
"Chung",
"Minki",
""
],
[
"Cho",
"Sungzoon",
""
]
] |
new_dataset
| 0.957432 |
1712.06442
|
Marc Hellmuth
|
Marc Hellmuth, Nicolas Wieseke, Marcus Lechner, Hans-Peter Lenhof,
Martin Middendorf and Peter F. Stadler
|
Phylogenomics with Paralogs
| null |
PNAS 2015 112 (7) 2058-2063
|
10.1073/pnas.1412770112
| null |
cs.DM q-bio.PE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Phylogenomics heavily relies on well-curated sequence data sets that consist,
for each gene, exclusively of 1:1-orthologous. Paralogs are treated as a
dangerous nuisance that has to be detected and removed. We show here that this
severe restriction of the data sets is not necessary. Building upon recent
advances in mathematical phylogenetics we demonstrate that gene duplications
convey meaningful phylogenetic information and allow the inference of plausible
phylogenetic trees, provided orthologs and paralogs can be distinguished with a
degree of certainty. Starting from tree-free estimates of orthology, cograph
editing can sufficiently reduce the noise in order to find correct
event-annotated gene trees. The information of gene trees can then directly be
translated into constraints on the species trees. While the resolution is very
poor for individual gene families, we show that genome-wide data sets are
sufficient to generate fully resolved phylogenetic trees, even in the presence
of horizontal gene transfer.
We demonstrate that the distribution of paralogs in large gene families
contains in itself sufficient phylogenetic signal to infer fully resolved
species phylogenies. This source of phylogenetic information is independent of
information contained in orthologous sequences and is resilient against
horizontal gene transfer. An important consequence is that phylogenomics data
sets need not be restricted to 1:1 orthologs.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2017 14:58:20 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Hellmuth",
"Marc",
""
],
[
"Wieseke",
"Nicolas",
""
],
[
"Lechner",
"Marcus",
""
],
[
"Lenhof",
"Hans-Peter",
""
],
[
"Middendorf",
"Martin",
""
],
[
"Stadler",
"Peter F.",
""
]
] |
new_dataset
| 0.964782 |
1712.06467
|
Chaoqun Hong
|
Chaoqun Hong, Jun Yu
|
Multi-modal Face Pose Estimation with Multi-task Manifold Deep Learning
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human face pose estimation aims at estimating the gazing direction or head
postures with 2D images. It gives some very important information such as
communicative gestures, saliency detection and so on, which attracts plenty of
attention recently. However, it is challenging because of complex background,
various orientations and face appearance visibility. Therefore, a descriptive
representation of face images and mapping it to poses are critical. In this
paper, we make use of multi-modal data and propose a novel face pose estimation
method that uses a novel deep learning framework named Multi-task Manifold Deep
Learning $M^2DL$. It is based on feature extraction with improved deep neural
networks and multi-modal mapping relationship with multi-task learning. In the
proposed deep learning based framework, Manifold Regularized Convolutional
Layers (MRCL) improve traditional convolutional layers by learning the
relationship among outputs of neurons. Besides, in the proposed mapping
relationship learning method, different modals of face representations are
naturally combined to learn the mapping function from face images to poses. In
this way, the computed mapping model with multiple tasks is improved.
Experimental results on three challenging benchmark datasets DPOSE, HPID and
BKHPD demonstrate the outstanding performance of $M^2DL$.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2017 15:22:26 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Hong",
"Chaoqun",
""
],
[
"Yu",
"Jun",
""
]
] |
new_dataset
| 0.990419 |
1712.06473
|
Pan Peng
|
Gramoz Goranci, Monika Henzinger, Pan Peng
|
The Power of Vertex Sparsifiers in Dynamic Graph Algorithms
|
A preliminary version was presented at the 25th Annual European
Symposium on Algorithms (ESA 2017)
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new algorithmic framework for designing dynamic graph
algorithms in minor-free graphs, by exploiting the structure of such graphs and
a tool called vertex sparsification, which is a way to compress large graphs
into small ones that well preserve relevant properties among a subset of
vertices and has previously mainly been used in the design of approximation
algorithms.
Using this framework, we obtain a Monte Carlo randomized fully dynamic
algorithm for $(1+\varepsilon)$-approximating the energy of electrical flows in
$n$-vertex planar graphs with $\tilde{O}(r\varepsilon^{-2})$ worst-case update
time and $\tilde{O}((r+\frac{n}{\sqrt{r}})\varepsilon^{-2})$ worst-case query
time, for any $r$ larger than some constant. For $r=n^{2/3}$, this gives
$\tilde{O}(n^{2/3}\varepsilon^{-2})$ update time and
$\tilde{O}(n^{2/3}\varepsilon^{-2})$ query time. We also extend this algorithm
to work for minor-free graphs with similar approximation and running time
guarantees. Furthermore, we illustrate our framework on the all-pairs max flow
and shortest path problems by giving corresponding dynamic algorithms in
minor-free graphs with both sublinear update and query times. To the best of
our knowledge, our results are the first to systematically establish such a
connection between dynamic graph algorithms and vertex sparsification.
We also present both upper bound and lower bound for maintaining the energy
of electrical flows in the incremental subgraph model, where updates consist of
only vertex activations, which might be of independent interest.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2017 15:36:10 GMT"
}
] | 2017-12-19T00:00:00 |
[
[
"Goranci",
"Gramoz",
""
],
[
"Henzinger",
"Monika",
""
],
[
"Peng",
"Pan",
""
]
] |
new_dataset
| 0.983292 |
1508.02550
|
Jouni Sir\'en
|
Andrea Farruggia, Travis Gagie, Gonzalo Navarro, Simon J. Puglisi,
Jouni Sir\'en
|
Relative Suffix Trees
|
Accepted to The Computer Journal. The implementation is available at
https://github.com/jltsiren/relative-fm
| null |
10.1093/comjnl/bxx108
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Suffix trees are one of the most versatile data structures in stringology,
with many applications in bioinformatics. Their main drawback is their size,
which can be tens of times larger than the input sequence. Much effort has been
put into reducing the space usage, leading ultimately to compressed suffix
trees. These compressed data structures can efficiently simulate the suffix
tree, while using space proportional to a compressed representation of the
sequence. In this work, we take a new approach to compressed suffix trees for
repetitive sequence collections, such as collections of individual genomes. We
compress the suffix trees of individual sequences relative to the suffix tree
of a reference sequence. These relative data structures provide competitive
time/space trade-offs, being almost as small as the smallest compressed suffix
trees for repetitive collections, and competitive in time with the largest and
fastest compressed suffix trees.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2015 10:34:50 GMT"
},
{
"version": "v2",
"created": "Sun, 14 May 2017 15:08:38 GMT"
},
{
"version": "v3",
"created": "Fri, 15 Dec 2017 14:14:30 GMT"
}
] | 2017-12-18T00:00:00 |
[
[
"Farruggia",
"Andrea",
""
],
[
"Gagie",
"Travis",
""
],
[
"Navarro",
"Gonzalo",
""
],
[
"Puglisi",
"Simon J.",
""
],
[
"Sirén",
"Jouni",
""
]
] |
new_dataset
| 0.991502 |
1609.04906
|
Ireneusz Szcze\'sniak
|
Ireneusz Szcze\'sniak, Artur Gola, Andrzej Jajszczyk, Andrzej R. Pach,
and Bo\.zena Wo\'zna-Szcze\'sniak
|
Itinerant routing in elastic optical networks
|
submitted for publication to an IEEE journal
|
Journal of Lightwave Technology, volume: 35, issue: 10, May 15,
2017
|
10.1109/JLT.2017.2674182
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We state a new problem of \emph{itinerant routing} in elastic optical
networks, which we define as the establishment and reconfiguration of an
\emph{itinerant connection}. In an itinerant connection, one of the connection
end nodes is allowed to change. Itinerant routing could also be considered a
form of connection restoration, where a connection has to be restored to a
different end node. With the introduction of new mobile-network architectures,
the progressing integration of wireless and optical networks, the continuing
growth of wireless high-bitrate services, and the eventual deployment of
elastic optical networks, there is a need to support this itinerant routing in
the elastic optical networks. We present and discuss two major use cases of the
itinerant routing, and propose a \emph{novel reconfiguration algorithm}. Our
algorithm does not deteriorate the network performance, and requires half as
many new links to configure as the shortest-path reconfiguration algorithm. The
performance evaluation was carried out with 46800 simulation runs using
randomly-generated realistic transport networks.
|
[
{
"version": "v1",
"created": "Fri, 16 Sep 2016 03:58:27 GMT"
}
] | 2017-12-18T00:00:00 |
[
[
"Szcześniak",
"Ireneusz",
""
],
[
"Gola",
"Artur",
""
],
[
"Jajszczyk",
"Andrzej",
""
],
[
"Pach",
"Andrzej R.",
""
],
[
"Woźna-Szcześniak",
"Bożena",
""
]
] |
new_dataset
| 0.998505 |
1711.00657
|
Tibor Keresztfalvi
|
Tibor Keresztfalvi and Amos Lapidoth
|
Semi-Robust Communications over a Broadcast Channel
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We establish the deterministic-code capacity region of a network with one
transmitter and two receivers: an "ordinary receiver" and a "robust receiver."
The channel to the ordinary receiver is a given (known) discrete memoryless
channel (DMC), whereas the channel to the robust receiver is an arbitrarily
varying channel (AVC). Both receivers are required to decode the "common
message," whereas only the ordinary receiver is required to decode the "private
message."
|
[
{
"version": "v1",
"created": "Thu, 2 Nov 2017 09:19:49 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Dec 2017 14:44:21 GMT"
}
] | 2017-12-18T00:00:00 |
[
[
"Keresztfalvi",
"Tibor",
""
],
[
"Lapidoth",
"Amos",
""
]
] |
new_dataset
| 0.96963 |
1712.05181
|
Nick Pawlowski
|
Tom Bocklisch, Joey Faulkner, Nick Pawlowski, Alan Nichol
|
Rasa: Open Source Language Understanding and Dialogue Management
|
Presented at NIPS Workshop on Conversational AI, Code at
https://github.com/RasaHQ
| null | null | null |
cs.CL cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a pair of tools, Rasa NLU and Rasa Core, which are open source
python libraries for building conversational software. Their purpose is to make
machine-learning based dialogue management and language understanding
accessible to non-specialist software developers. In terms of design
philosophy, we aim for ease of use, and bootstrapping from minimal (or no)
initial training data. Both packages are extensively documented and ship with a
comprehensive suite of tests. The code is available at
https://github.com/RasaHQ/
|
[
{
"version": "v1",
"created": "Thu, 14 Dec 2017 11:37:18 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Dec 2017 09:33:11 GMT"
}
] | 2017-12-18T00:00:00 |
[
[
"Bocklisch",
"Tom",
""
],
[
"Faulkner",
"Joey",
""
],
[
"Pawlowski",
"Nick",
""
],
[
"Nichol",
"Alan",
""
]
] |
new_dataset
| 0.999412 |
1712.05444
|
Hongyu Ren
|
Hongyu Ren, Diqi Chen, Yizhou Wang
|
RAN4IQA: Restorative Adversarial Nets for No-Reference Image Quality
Assessment
|
AAAI'18
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inspired by the free-energy brain theory, which implies that human visual
system (HVS) tends to reduce uncertainty and restore perceptual details upon
seeing a distorted image, we propose restorative adversarial net (RAN), a
GAN-based model for no-reference image quality assessment (NR-IQA). RAN, which
mimics the process of HVS, consists of three components: a restorator, a
discriminator and an evaluator. The restorator restores and reconstructs input
distorted image patches, while the discriminator distinguishes the
reconstructed patches from the pristine distortion-free patches. After
restoration, we observe that the perceptual distance between the restored and
the distorted patches is monotonic with respect to the distortion level. We
further define Gain of Restoration (GoR) based on this phenomenon. The
evaluator predicts perceptual score by extracting feature representations from
the distorted and restored patches to measure GoR. Eventually, the quality
score of an input image is estimated by weighted sum of the patch scores.
Experimental results on Waterloo Exploration, LIVE and TID2013 show the
effectiveness and generalization ability of RAN compared to the
state-of-the-art NR-IQA models.
|
[
{
"version": "v1",
"created": "Thu, 14 Dec 2017 20:37:49 GMT"
}
] | 2017-12-18T00:00:00 |
[
[
"Ren",
"Hongyu",
""
],
[
"Chen",
"Diqi",
""
],
[
"Wang",
"Yizhou",
""
]
] |
new_dataset
| 0.991541 |
1712.05493
|
Zhiyuan Wan
|
Zhiyuan Wan, David Lo, Xin Xia, Liang Cai, and Shanping Li
|
Mining Sandboxes for Linux Containers
|
11 pages, IEEE International Conference on Software Testing,
Verification and Validation (ICST 2017)
| null |
10.1109/ICST.2017.16
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A container is a group of processes isolated from other groups via distinct
kernel namespaces and resource allocation quota. Attacks against containers
often leverage kernel exploits through system call interface. In this paper, we
present an approach that mines sandboxes for containers. We first explore the
behaviors of a container by leveraging automatic testing, and extract the set
of system calls accessed during testing. The set of system calls then results
as a sandbox of the container. The mined sandbox restricts the container's
access to system calls which are not seen during testing and thus reduces the
attack surface. In the experiment, our approach requires less than eleven
minutes to mine sandbox for each of the containers. The enforcement of mined
sandboxes does not impact the regular functionality of a container and incurs
low performance overhead.
|
[
{
"version": "v1",
"created": "Fri, 15 Dec 2017 00:54:21 GMT"
}
] | 2017-12-18T00:00:00 |
[
[
"Wan",
"Zhiyuan",
""
],
[
"Lo",
"David",
""
],
[
"Xia",
"Xin",
""
],
[
"Cai",
"Liang",
""
],
[
"Li",
"Shanping",
""
]
] |
new_dataset
| 0.985291 |
1712.05545
|
Nipun Wijerathne
|
Nipun Wijerathne, Sanjana Kadaba Viswanath, Marakkalage Sumudu Hasala,
Victoria Beltran, Chau Yuen, Hock Beng Lim
|
Towards Comfortable Cycling: A Practical Approach to Monitor the
Conditions in Cycling Paths
|
6 pages, 5 figures, Accepted by IEEE 4th World Forum on Internet of
Things (WF-IoT) 2018
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is a no brainer. Using bicycles to commute is the most sustainable form
of transport, is the least expensive to use and are pollution-free. Towns and
cities have to be made bicycle-friendly to encourage their wide usage.
Therefore, cycling paths should be more convenient, comfortable, and safe to
ride. This paper investigates a smartphone application, which passively
monitors the road conditions during cyclists ride. To overcome the problems of
monitoring roads, we present novel algorithms that sense the rough cycling
paths and locate road bumps. Each event is detected in real time to improve the
user friendliness of the application. Cyclists may keep their smartphones at
any random orientation and placement. Moreover, different smartphones sense the
same incident dissimilarly and hence report discrepant sensor values. We
further address the aforementioned difficulties that limit such crowd-sourcing
application. We evaluate our sensing application on cycling paths in Singapore,
and show that it can successfully detect such bad road conditions.
|
[
{
"version": "v1",
"created": "Fri, 15 Dec 2017 05:51:28 GMT"
}
] | 2017-12-18T00:00:00 |
[
[
"Wijerathne",
"Nipun",
""
],
[
"Viswanath",
"Sanjana Kadaba",
""
],
[
"Hasala",
"Marakkalage Sumudu",
""
],
[
"Beltran",
"Victoria",
""
],
[
"Yuen",
"Chau",
""
],
[
"Lim",
"Hock Beng",
""
]
] |
new_dataset
| 0.957404 |
1712.05644
|
Paul Vickers
|
Helen Gibson and Paul Vickers
|
graphTPP: A multivariate based method for interactive graph layout and
analysis
|
23 pages, 15 figures
| null | null | null |
cs.GR cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Graph layout is the process of creating a visual representation of a graph
through a node-link diagram. Node-attribute graphs have additional data stored
on the nodes which describe certain properties of the nodes called attributes.
Typical force-directed representations often produce hairball-like structures
that neither aid in understanding the graph's topology nor the relationship to
its attributes. The aim of this research was to investigate the use of
node-attributes for graph layout in order to improve the analysis process and
to give further insight into the graph over purely topological layouts. In this
article we present graphTPP, a graph based extension to targeted projection
pursuit (TPP) --- an interactive, linear, dimension reduction technique --- as
a method for graph layout and subsequent further analysis. TPP allows users to
control the projection and is optimised for clustering. Three case studies were
conducted in the areas of influence graphs, network security, and citation
networks. In each case graphTPP was shown to outperform standard force-directed
techniques and even other dimension reduction methods in terms of clarity of
clustered structure in the layout, the association between the structure and
the attributes and the insights elicited in each domain area.
|
[
{
"version": "v1",
"created": "Fri, 15 Dec 2017 12:44:27 GMT"
}
] | 2017-12-18T00:00:00 |
[
[
"Gibson",
"Helen",
""
],
[
"Vickers",
"Paul",
""
]
] |
new_dataset
| 0.951739 |
1712.05745
|
Pol Van Aubel
|
Pol Van Aubel (1), Kostas Papagiannopoulos (1), {\L}ukasz Chmielewski
(2), Christian Doerr (3) ((1) Radboud University, Digital Security Group, (2)
Riscure BV, Delft, the Netherlands, (3) Delft University of Technology,
Department of Intelligent Systems)
|
Side-channel based intrusion detection for industrial control systems
|
12 pages, 7 figures. For associated code, see
https://polvanaubel.com/research/em-ics/code/
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Industrial Control Systems are under increased scrutiny. Their security is
historically sub-par, and although measures are being taken by the
manufacturers to remedy this, the large installed base of legacy systems cannot
easily be updated with state-of-the-art security measures. We propose a system
that uses electromagnetic side-channel measurements to detect behavioural
changes of the software running on industrial control systems. To demonstrate
the feasibility of this method, we show it is possible to profile and
distinguish between even small changes in programs on Siemens S7-317 PLCs,
using methods from cryptographic side-channel analysis.
|
[
{
"version": "v1",
"created": "Fri, 15 Dec 2017 16:45:10 GMT"
}
] | 2017-12-18T00:00:00 |
[
[
"Van Aubel",
"Pol",
""
],
[
"Papagiannopoulos",
"Kostas",
""
],
[
"Chmielewski",
"Łukasz",
""
],
[
"Doerr",
"Christian",
""
]
] |
new_dataset
| 0.999024 |
1603.03873
|
Biao Zhang
|
Biao Zhang, Deyi Xiong, Jinsong Su
|
Neural Discourse Relation Recognition with Semantic Memory
|
7 pages
| null |
10.1016/j.neucom.2017.09.074
| null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Humans comprehend the meanings and relations of discourses heavily relying on
their semantic memory that encodes general knowledge about concepts and facts.
Inspired by this, we propose a neural recognizer for implicit discourse
relation analysis, which builds upon a semantic memory that stores knowledge in
a distributed fashion. We refer to this recognizer as SeMDER. Starting from
word embeddings of discourse arguments, SeMDER employs a shallow encoder to
generate a distributed surface representation for a discourse. A semantic
encoder with attention to the semantic memory matrix is further established
over surface representations. It is able to retrieve a deep semantic meaning
representation for the discourse from the memory. Using the surface and
semantic representations as input, SeMDER finally predicts implicit discourse
relations via a neural recognizer. Experiments on the benchmark data set show
that SeMDER benefits from the semantic memory and achieves substantial
improvements of 2.56\% on average over current state-of-the-art baselines in
terms of F1-score.
|
[
{
"version": "v1",
"created": "Sat, 12 Mar 2016 08:54:16 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"Zhang",
"Biao",
""
],
[
"Xiong",
"Deyi",
""
],
[
"Su",
"Jinsong",
""
]
] |
new_dataset
| 0.958559 |
1609.06853
|
Henk Don
|
Michiel de Bondt, Henk Don, Hans Zantema
|
Slowly synchronizing automata with fixed alphabet size
|
Replacing and extending the paper titled 'Finding DFAs with maximal
shortest synchronizing word length'. Source code included
| null | null | null |
cs.FL math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It was conjectured by \v{C}ern\'y in 1964 that a synchronizing DFA on $n$
states always has a shortest synchronizing word of length at most $(n-1)^2$,
and he gave a sequence of DFAs for which this bound is reached.
In this paper, we investigate the role of the alphabet size. For each
possible alphabet size, we count DFAs on $n \le 6$ states which synchronize in
$(n-1)^2 - e$ steps, for all $e < 2\lceil n/2 \rceil$. Furthermore, we give
constructions of automata with any number of states, and $3$, $4$, or $5$
symbols, which synchronize slowly, namely in $n^2 - 3n + O(1)$ steps.
In addition, our results prove \v{C}ern\'y's conjecture for $n \le 6$. Our
computation has led to $27$ DFAs on $3$, $4$, $5$ or $6$ states, which
synchronize in $(n-1)^2$ steps, but do not belong to \v{C}ern\'y's sequence. Of
these $27$ DFA's, $19$ are new, and the remaining $8$ which were already known
are exactly the \emph{minimal} ones: they will not synchronize any more after
removing a symbol.
So the $19$ new DFAs are extensions of automata which were already known,
including the \v{C}ern\'y automaton on $3$ states. But for $n > 3$, we prove
that the \v{C}ern\'y automaton on $n$ states does not admit non-trivial
extensions with the same smallest synchronizing word length $(n-1)^2$.
|
[
{
"version": "v1",
"created": "Thu, 22 Sep 2016 08:02:33 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Oct 2016 14:59:13 GMT"
},
{
"version": "v3",
"created": "Fri, 21 Oct 2016 07:29:26 GMT"
},
{
"version": "v4",
"created": "Tue, 1 Nov 2016 10:22:47 GMT"
},
{
"version": "v5",
"created": "Thu, 14 Dec 2017 12:45:36 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"de Bondt",
"Michiel",
""
],
[
"Don",
"Henk",
""
],
[
"Zantema",
"Hans",
""
]
] |
new_dataset
| 0.998965 |
1707.04993
|
Sergey Tulyakov
|
Sergey Tulyakov, Ming-Yu Liu, Xiaodong Yang, Jan Kautz
|
MoCoGAN: Decomposing Motion and Content for Video Generation
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visual signals in a video can be divided into content and motion. While
content specifies which objects are in the video, motion describes their
dynamics. Based on this prior, we propose the Motion and Content decomposed
Generative Adversarial Network (MoCoGAN) framework for video generation. The
proposed framework generates a video by mapping a sequence of random vectors to
a sequence of video frames. Each random vector consists of a content part and a
motion part. While the content part is kept fixed, the motion part is realized
as a stochastic process. To learn motion and content decomposition in an
unsupervised manner, we introduce a novel adversarial learning scheme utilizing
both image and video discriminators. Extensive experimental results on several
challenging datasets with qualitative and quantitative comparison to the
state-of-the-art approaches, verify effectiveness of the proposed framework. In
addition, we show that MoCoGAN allows one to generate videos with same content
but different motion as well as videos with different content and same motion.
|
[
{
"version": "v1",
"created": "Mon, 17 Jul 2017 03:42:17 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Dec 2017 00:04:02 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"Tulyakov",
"Sergey",
""
],
[
"Liu",
"Ming-Yu",
""
],
[
"Yang",
"Xiaodong",
""
],
[
"Kautz",
"Jan",
""
]
] |
new_dataset
| 0.99946 |
1711.03028
|
Russell O'Connor
|
Russell O'Connor
|
Simplicity: A New Language for Blockchains
| null |
2017. Proceedings of the 2017 Workshop on Programming Languages
and Analysis for Security. ACM, New York, NY, USA
|
10.1145/3139337.3139340
| null |
cs.PL
|
http://creativecommons.org/licenses/by/4.0/
|
Simplicity is a typed, combinator-based, functional language without loops
and recursion, designed to be used for crypto-currencies and blockchain
applications. It aims to improve upon existing crypto-currency languages, such
as Bitcoin Script and Ethereum's EVM, while avoiding some of the problems they
face. Simplicity comes with formal denotational semantics defined in Coq, a
popular, general purpose software proof assistant. Simplicity also includes
operational semantics that are defined with an abstract machine that we call
the Bit Machine. The Bit Machine is used as a tool for measuring the
computational space and time resources needed to evaluate Simplicity programs.
Owing to its Turing incompleteness, Simplicity is amenable to static analysis
that can be used to derive upper bounds on the computational resources needed,
prior to execution. While Turing incomplete, Simplicity can express any
finitary function, which we believe is enough to build useful "smart contracts"
for blockchain applications.
|
[
{
"version": "v1",
"created": "Wed, 8 Nov 2017 16:07:52 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Dec 2017 23:31:38 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"O'Connor",
"Russell",
""
]
] |
new_dataset
| 0.999478 |
1712.04216
|
Quentin Galvane
|
Quentin Galvane, Christophe Lino, Marc Christie, Julien Fleureau,
Fabien Servant, Francois-Louis Tariolle, Philippe Guillotel
|
Directing Cinematographic Drones
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quadrotor drones equipped with high quality cameras have rapidely raised as
novel, cheap and stable devices for filmmakers. While professional drone pilots
can create aesthetically pleasing videos in short time, the smooth -- and
cinematographic -- control of a camera drone remains challenging for most
users, despite recent tools that either automate part of the process or enable
the manual design of waypoints to create drone trajectories. This paper
proposes to move a step further towards more accessible cinematographic drones
by designing techniques to automatically or interactively plan quadrotor drone
motions in 3D dynamic environments that satisfy both cinematographic and
physical quadrotor constraints. We first propose the design of a Drone Toric
Space as a dedicated camera parameter space with embedded constraints and
derive some intuitive on-screen viewpoint manipulators. Second, we propose a
specific path planning technique which ensures both that cinematographic
properties can be enforced along the path, and that the path is physically
feasible by a quadrotor drone. At last, we build on the Drone Toric Space and
the specific path planning technique to coordinate the motion of multiple
drones around dynamic targets. A number of results then demonstrate the
interactive and automated capacities of our approaches on a number of
use-cases.
|
[
{
"version": "v1",
"created": "Tue, 12 Dec 2017 10:35:46 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Dec 2017 09:54:06 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"Galvane",
"Quentin",
""
],
[
"Lino",
"Christophe",
""
],
[
"Christie",
"Marc",
""
],
[
"Fleureau",
"Julien",
""
],
[
"Servant",
"Fabien",
""
],
[
"Tariolle",
"Francois-Louis",
""
],
[
"Guillotel",
"Philippe",
""
]
] |
new_dataset
| 0.997715 |
1712.04961
|
Christine Kaeser-Chen
|
Rohit Pandey, Marie White, Pavel Pidlypenskyi, Xue Wang, Christine
Kaeser-Chen
|
Real-time Egocentric Gesture Recognition on Mobile Head Mounted Displays
|
Extended Abstract NIPS 2017 Machine Learning on the Phone and other
Consumer Devices Workshop
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile virtual reality (VR) head mounted displays (HMD) have become popular
among consumers in recent years. In this work, we demonstrate real-time
egocentric hand gesture detection and localization on mobile HMDs. Our main
contributions are: 1) A novel mixed-reality data collection tool to automatic
annotate bounding boxes and gesture labels; 2) The largest-to-date egocentric
hand gesture and bounding box dataset with more than 400,000 annotated frames;
3) A neural network that runs real time on modern mobile CPUs, and achieves
higher than 76% precision on gesture recognition across 8 classes.
|
[
{
"version": "v1",
"created": "Wed, 13 Dec 2017 19:06:37 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"Pandey",
"Rohit",
""
],
[
"White",
"Marie",
""
],
[
"Pidlypenskyi",
"Pavel",
""
],
[
"Wang",
"Xue",
""
],
[
"Kaeser-Chen",
"Christine",
""
]
] |
new_dataset
| 0.999725 |
1712.05021
|
Le Hou
|
Le Hou, Ayush Agarwal, Dimitris Samaras, Tahsin M. Kurc, Rajarsi R.
Gupta, Joel H. Saltz
|
Unsupervised Histopathology Image Synthesis
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hematoxylin and Eosin stained histopathology image analysis is essential for
the diagnosis and study of complicated diseases such as cancer. Existing
state-of-the-art approaches demand extensive amount of supervised training data
from trained pathologists. In this work we synthesize in an unsupervised
manner, large histopathology image datasets, suitable for supervised training
tasks. We propose a unified pipeline that: a) generates a set of initial
synthetic histopathology images with paired information about the nuclei such
as segmentation masks; b) refines the initial synthetic images through a
Generative Adversarial Network (GAN) to reference styles; c) trains a
task-specific CNN and boosts the performance of the task-specific CNN with
on-the-fly generated adversarial examples. Our main contribution is that the
synthetic images are not only realistic, but also representative (in reference
styles) and relatively challenging for training task-specific CNNs. We test our
method for nucleus segmentation using images from four cancer types. When no
supervised data exists for a cancer type, our method without supervision cost
significantly outperforms supervised methods which perform across-cancer
generalization. Even when supervised data exists for all cancer types, our
approach without supervision cost performs better than supervised methods.
|
[
{
"version": "v1",
"created": "Wed, 13 Dec 2017 21:52:12 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"Hou",
"Le",
""
],
[
"Agarwal",
"Ayush",
""
],
[
"Samaras",
"Dimitris",
""
],
[
"Kurc",
"Tahsin M.",
""
],
[
"Gupta",
"Rajarsi R.",
""
],
[
"Saltz",
"Joel H.",
""
]
] |
new_dataset
| 0.997866 |
1712.05128
|
Alexandre Rademaker
|
Pedro Delfino and Bruno Cuconato and Edward Hermann Haeusler and
Alexandre Rademaker
|
Passing the Brazilian OAB Exam: data preparation and some experiments
|
Extended version of the paper published in the Proceedings of JURIX
2017 (http://ebooks.iospress.nl/ISBN/978-1-61499-838-9)
|
Legal Knowledge and Information Systems 302 (2017) 89-94
| null | null |
cs.CL
|
http://creativecommons.org/licenses/by-sa/4.0/
|
In Brazil, all legal professionals must demonstrate their knowledge of the
law and its application by passing the OAB exams, the national bar exams. The
OAB exams therefore provide an excellent benchmark for the performance of legal
information systems since passing the exam would arguably signal that the
system has acquired capacity of legal reasoning comparable to that of a human
lawyer. This article describes the construction of a new data set and some
preliminary experiments on it, treating the problem of finding the
justification for the answers to questions. The results provide a baseline
performance measure against which to evaluate future improvements. We discuss
the reasons to the poor performance and propose next steps.
|
[
{
"version": "v1",
"created": "Thu, 14 Dec 2017 08:40:10 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"Delfino",
"Pedro",
""
],
[
"Cuconato",
"Bruno",
""
],
[
"Haeusler",
"Edward Hermann",
""
],
[
"Rademaker",
"Alexandre",
""
]
] |
new_dataset
| 0.994385 |
1712.05202
|
Michail-Antisthenis Tsompanas
|
Michail-Antisthenis I. Tsompanas, Nikolaos I. Dourvas, Konstantinos
Ioannidis, Georgios Ch. Sirakoulis, Rolf Hoffmann, Andrew Adamatzky
|
Cellular Automata Applications in Shortest Path Problem
|
To appear in the book: Adamatzky, A (Ed.) Shortest path solvers. From
software to wetware. Springer, 2018
| null | null | null |
cs.CG nlin.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cellular Automata (CAs) are computational models that can capture the
essential features of systems in which global behavior emerges from the
collective effect of simple components, which interact locally. During the last
decades, CAs have been extensively used for mimicking several natural processes
and systems to find fine solutions in many complex hard to solve computer
science and engineering problems. Among them, the shortest path problem is one
of the most pronounced and highly studied problems that scientists have been
trying to tackle by using a plethora of methodologies and even unconventional
approaches. The proposed solutions are mainly justified by their ability to
provide a correct solution in a better time complexity than the renowned
Dijkstra's algorithm. Although there is a wide variety regarding the
algorithmic complexity of the algorithms suggested, spanning from simplistic
graph traversal algorithms to complex nature inspired and bio-mimicking
algorithms, in this chapter we focus on the successful application of CAs to
shortest path problem as found in various diverse disciplines like computer
science, swarm robotics, computer networks, decision science and biomimicking
of biological organisms' behaviour. In particular, an introduction on the first
CA-based algorithm tackling the shortest path problem is provided in detail.
After the short presentation of shortest path algorithms arriving from the
relaxization of the CAs principles, the application of the CA-based shortest
path definition on the coordinated motion of swarm robotics is also introduced.
Moreover, the CA based application of shortest path finding in computer
networks is presented in brief. Finally, a CA that models exactly the behavior
of a biological organism, namely the Physarum's behavior, finding the
minimum-length path between two points in a labyrinth is given.
|
[
{
"version": "v1",
"created": "Thu, 14 Dec 2017 12:54:22 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"Tsompanas",
"Michail-Antisthenis I.",
""
],
[
"Dourvas",
"Nikolaos I.",
""
],
[
"Ioannidis",
"Konstantinos",
""
],
[
"Sirakoulis",
"Georgios Ch.",
""
],
[
"Hoffmann",
"Rolf",
""
],
[
"Adamatzky",
"Andrew",
""
]
] |
new_dataset
| 0.99175 |
1712.05227
|
Oleksiy Kurganskyy
|
Oleksiy Kurganskyy and Alexandra Maximova
|
On co-counter-fragments of automata
|
10 pages, in Russian, 3 figures
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper contains results related to synthesis and presentation of abstract
automata by fragments of behaviour and investigates the structure of the
classes of finite connected initial output-less automata specified by systems
of defining relations considered as fragments, co-fragments, counter-fragments
and co-counter-fragments of automata.
|
[
{
"version": "v1",
"created": "Thu, 14 Dec 2017 14:02:03 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"Kurganskyy",
"Oleksiy",
""
],
[
"Maximova",
"Alexandra",
""
]
] |
new_dataset
| 0.999717 |
1712.05236
|
Ronan M.T. Fleming Dr
|
Laurent Heirendt and Sylvain Arreckx, Christophe Trefois, Yohan
Yarosz, Maharshi Vyas, Venkata P. Satagopam, Reinhard Schneider, Ines Thiele,
Ronan M.T. Fleming
|
ARTENOLIS: Automated Reproducibility and Testing Environment for
Licensed Software
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivation:
Automatically testing changes to code is an essential feature of continuous
integration. For open-source code, without licensed dependencies, a variety of
continuous integration services exist. The COnstraint-Based Reconstruction and
Analysis (COBRA) Toolbox is a suite of open-source code for computational
modelling with dependencies on licensed software. A novel automated framework
of continuous integration in a semi-licensed environment is required for the
development of the COBRA Toolbox and related tools of the COBRA community.
Results:
ARTENOLIS is a general-purpose infrastructure software application that
implements continuous integration for open-source software with licensed
dependencies. It uses a master-slave framework, tests code on multiple
operating systems, and multiple versions of licensed software dependencies.
ARTENOLIS ensures the stability, integrity, and cross-platform compatibility of
code in the COBRA Toolbox and related tools.
Availability and Implementation:
The continuous integration server, core of the reproducibility and testing
infrastructure, can be freely accessed under artenolis.lcsb.uni.lu. The
continuous integration framework code is located in the /.ci directory and at
the root of the repository freely available under
github.com/opencobra/cobratoolbox.
|
[
{
"version": "v1",
"created": "Fri, 1 Dec 2017 15:03:38 GMT"
}
] | 2017-12-15T00:00:00 |
[
[
"Heirendt",
"Laurent",
""
],
[
"Arreckx",
"Sylvain",
""
],
[
"Trefois",
"Christophe",
""
],
[
"Yarosz",
"Yohan",
""
],
[
"Vyas",
"Maharshi",
""
],
[
"Satagopam",
"Venkata P.",
""
],
[
"Schneider",
"Reinhard",
""
],
[
"Thiele",
"Ines",
""
],
[
"Fleming",
"Ronan M. T.",
""
]
] |
new_dataset
| 0.999375 |
1611.10195
|
Guido Borghi
|
Guido Borghi, Marco Venturelli, Roberto Vezzani, Rita Cucchiara
|
POSEidon: Face-from-Depth for Driver Pose Estimation
|
Accepted in Computer Vision and Pattern Recognition (CVPR 2017)
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fast and accurate upper-body and head pose estimation is a key task for
automatic monitoring of driver attention, a challenging context characterized
by severe illumination changes, occlusions and extreme poses. In this work, we
present a new deep learning framework for head localization and pose estimation
on depth images. The core of the proposal is a regression neural network,
called POSEidon, which is composed of three independent convolutional nets
followed by a fusion layer, specially conceived for understanding the pose by
depth. In addition, to recover the intrinsic value of face appearance for
understanding head position and orientation, we propose a new Face-from-Depth
approach for learning image faces from depth. Results in face reconstruction
are qualitatively impressive. We test the proposed framework on two public
datasets, namely Biwi Kinect Head Pose and ICT-3DHP, and on Pandora, a new
challenging dataset mainly inspired by the automotive setup. Results show that
our method overcomes all recent state-of-art works, running in real time at
more than 30 frames per second.
|
[
{
"version": "v1",
"created": "Wed, 30 Nov 2016 14:57:06 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Mar 2017 12:08:21 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Dec 2017 22:08:30 GMT"
}
] | 2017-12-14T00:00:00 |
[
[
"Borghi",
"Guido",
""
],
[
"Venturelli",
"Marco",
""
],
[
"Vezzani",
"Roberto",
""
],
[
"Cucchiara",
"Rita",
""
]
] |
new_dataset
| 0.998799 |
1712.03744
|
Liming Ma
|
Xudong Li, Liming Ma and Chaoping Xing
|
Optimal locally repairable codes via elliptic curves
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Constructing locally repairable codes achieving Singleton-type bound (we call
them optimal codes in this paper) is a challenging task and has attracted great
attention in the last few years. Tamo and Barg \cite{TB14} first gave a
breakthrough result in this topic by cleverly considering subcodes of
Reed-Solomon codes. Thus, $q$-ary optimal locally repairable codes from
subcodes of Reed-Solomon codes given in \cite{TB14} have length upper bounded
by $q$. Recently, it was shown through extension of construction in \cite{TB14}
that length of $q$-ary optimal locally repairable codes can be $q+1$ in
\cite{JMX17}. Surprisingly it was shown in \cite{BHHMV16} that, unlike
classical MDS codes, $q$-ary optimal locally repairable codes could have length
bigger than $q+1$. Thus, it becomes an interesting and challenging problem to
construct $q$-ary optimal locally repairable codes of length bigger than $q+1$.
In the present paper, we make use of rich algebraic structures of elliptic
curves to construct a family of $q$-ary optimal locally repairable codes of
length up to $q+2\sqrt{q}$. It turns out that locality of our codes can be as
big as $23$ and distance can be linear in length.
|
[
{
"version": "v1",
"created": "Mon, 11 Dec 2017 12:24:00 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Dec 2017 10:58:01 GMT"
}
] | 2017-12-14T00:00:00 |
[
[
"Li",
"Xudong",
""
],
[
"Ma",
"Liming",
""
],
[
"Xing",
"Chaoping",
""
]
] |
new_dataset
| 0.998822 |
1712.04489
|
Tarang Chugh
|
Tarang Chugh, Kai Cao, Anil K. Jain
|
Fingerprint Spoof Buster
|
13 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The primary purpose of a fingerprint recognition system is to ensure a
reliable and accurate user authentication, but the security of the recognition
system itself can be jeopardized by spoof attacks. This study addresses the
problem of developing accurate, generalizable, and efficient algorithms for
detecting fingerprint spoof attacks. Specifically, we propose a deep
convolutional neural network based approach utilizing local patches centered
and aligned using fingerprint minutiae. Experimental results on three
public-domain LivDet datasets (2011, 2013, and 2015) show that the proposed
approach provides state-of-the-art accuracies in fingerprint spoof detection
for intra-sensor, cross-material, cross-sensor, as well as cross-dataset
testing scenarios. For example, in LivDet 2015, the proposed approach achieves
99.03% average accuracy over all sensors compared to 95.51% achieved by the
LivDet 2015 competition winners. Additionally, two new fingerprint presentation
attack datasets containing more than 20,000 images, using two different
fingerprint readers, and over 12 different spoof fabrication materials are
collected. We also present a graphical user interface, called Fingerprint Spoof
Buster, that allows the operator to visually examine the local regions of the
fingerprint highlighted as live or spoof, instead of relying on only a single
score as output by the traditional approaches.
|
[
{
"version": "v1",
"created": "Tue, 12 Dec 2017 20:05:08 GMT"
}
] | 2017-12-14T00:00:00 |
[
[
"Chugh",
"Tarang",
""
],
[
"Cao",
"Kai",
""
],
[
"Jain",
"Anil K.",
""
]
] |
new_dataset
| 0.98639 |
1712.04595
|
Vijay Sridhar
|
Anastasios Sidiropoulos, Kritika Singhal, Vijay Sridhar
|
Fractal dimension and lower bounds for geometric problems
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the complexity of geometric problems on spaces of low fractal
dimension. It was recently shown by [Sidiropoulos & Sridhar, SoCG 2017] that
several problems admit improved solutions when the input is a pointset in
Euclidean space with fractal dimension smaller than the ambient dimension. In
this paper we prove nearly-matching lower bounds, thus establishing
nearly-optimal bounds for various problems as a function of the fractal
dimension.
More specifically, we show that for any set of $n$ points in $d$-dimensional
Euclidean space, of fractal dimension $\delta\in (1,d)$, for any $\epsilon >0$
and $c\geq 1$, any $c$-spanner must have treewidth at least $\Omega \left(
\frac{n^{1-1/(\delta - \epsilon)}}{c^{d-1}} \right)$, matching the previous
upper bound. The construction used to prove this lower bound on the treewidth
of spanners can also be used to derive lower bounds on the running time of
algorithms for various problems, assuming the Exponential Time Hypothesis. We
provide two prototypical results of this type. For any $\delta \in (1,d)$ and
any $\epsilon >0$ we show that:
1) $d$-dimensional Euclidean TSP on $n$ points with fractal dimension at most
$\delta$ cannot be solved in time $2^{O\left(n^{1-1/(\delta - \epsilon)}
\right)}$. The best-known upper bound is $2^{O(n^{1-1/\delta} \log n)}$.
2) The problem of finding $k$-pairwise non-intersecting $d$-dimensional unit
balls/axis parallel unit cubes with centers having fractal dimension at most
$\delta$ cannot be solved in time $f(k)n^{O \left(k^{1-1/(\delta -
\epsilon)}\right)}$ for any computable function $f$. The best-known upper bound
is $n^{O(k^{1-1/\delta} \log n)}$.
The above results nearly match previously known upper bounds from
[Sidiropoulos & Sridhar, SoCG 2017], and generalize analogous lower bounds for
the case of ambient dimension due to [Marx & Sidiropoulos, SoCG 2014].
|
[
{
"version": "v1",
"created": "Wed, 13 Dec 2017 03:01:56 GMT"
}
] | 2017-12-14T00:00:00 |
[
[
"Sidiropoulos",
"Anastasios",
""
],
[
"Singhal",
"Kritika",
""
],
[
"Sridhar",
"Vijay",
""
]
] |
new_dataset
| 0.985856 |
1712.04649
|
Theodosios Mourouzis
|
Theodosis Mourouzis, Chrysostomos Filipou
|
The Blockchain Revolution: Insights from Top-Management
|
26 pages, 22 figures
| null | null | null |
cs.CY cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is an exploration of Blockchain technology that is growing in popularity
and it seems to be able to disrupt a plethora of industries. A research is
being conducted to examine Blockchain potential to be adopted by enterprises
from different sectors as well as the parameters that could affect its
adoption. Mostly known as the technology that underpins Bitcoin, this concept
raised a significant interest within various markets. Blockchain offers a new
approach to valued information management and sharing and it is introduced as a
solution against the inefficiencies that affect the industry. Experts,
infrastructure providers and banks can now work on this technology and explore
its uses. This is a new technology journey with obstacles that will need to be
overcome and it can not be clear yet what will eventually arise. Professionals
from around the world express their views on the adoption of Blockchain by
organisations and how these plan to support its deployment. Thoughts are shared
in terms of the required budget and the parameters that can impact its
adoption. There is a great interest in Blockchain technology and its
revolutionary potential to modernize the world economy and this is only the
beginning.
|
[
{
"version": "v1",
"created": "Wed, 13 Dec 2017 08:14:19 GMT"
}
] | 2017-12-14T00:00:00 |
[
[
"Mourouzis",
"Theodosis",
""
],
[
"Filipou",
"Chrysostomos",
""
]
] |
new_dataset
| 0.981714 |
1712.04681
|
Andrew Adamatzky
|
Andrew Adamatzky
|
Maze solvers demystified and some other thoughts
|
This is a preliminary version of the chapter to be published in
Adamatzky A. (Ed.) Shortest path solvers. From software to wetware. Springer,
2018
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is a growing interest towards implementation of maze solving in
spatially-extended physical, chemical and living systems. Several reports of
prototypes attracted great publicity, e.g. maze solving with slime mould and
epithelial cells, maze navigating droplets. We show that most prototypes
utilise one of two phenomena: a shortest path in a maze is a path of the least
resistance for fluid and current flow, and a shortest path is a path of the
steepest gradient of chemoattractants. We discuss that substrates with
so-called maze-solving capabilities simply trace flow currents or chemical
diffusion gradients. We illustrate our thoughts with a model of flow and
experiments with slime mould. The chapter ends with a discussion of experiments
on maze solving with plant roots and leeches which show limitations of the
chemical diffusion maze-solving approach.
|
[
{
"version": "v1",
"created": "Wed, 13 Dec 2017 10:04:17 GMT"
}
] | 2017-12-14T00:00:00 |
[
[
"Adamatzky",
"Andrew",
""
]
] |
new_dataset
| 0.999452 |
1712.04687
|
Atchutananda Surampudi
|
Atchutananda Surampudi, Sankalp Shirish Chapalgaonkar and Paventhan
Arumugam
|
Can Balloons Produce Li-Fi? A Disaster Management Perspective
|
To be presented as a poster at the IEEE Global Li-Fi Congress 2018
| null | null | null |
cs.IT cs.NI math.IT
|
http://creativecommons.org/licenses/by/4.0/
|
Natural calamities and disasters disrupt the conventional communication
setups and the wireless bandwidth becomes constrained. A safe and
cost-effective solution for communication and data access in such scenarios is
long needed. Light-Fidelity (Li-Fi) which promises wireless access to data at
high speeds using visible light can be a good option. Visible light being safe
to use for wireless access in such affected environments also provides
illumination. Importantly, when a Li-Fi unit is attached to an air balloon and
a network of such Li-Fi balloons are coordinated to form a Li-Fi balloon
network, data can be accessed anytime and anywhere required and hence many
lives can be tracked and saved. We propose this idea of a Li-Fi balloon and
give an overview of its design using the Philips Li-Fi hardware. Further, we
propose the concept of a balloon network and coin it with an acronym, the
LiBNet. We consider the balloons to be arranged as a homogeneous Poisson point
process in the LiBNet and we derive the mean co-channel interference for such
an arrangement.
|
[
{
"version": "v1",
"created": "Wed, 13 Dec 2017 10:17:17 GMT"
}
] | 2017-12-14T00:00:00 |
[
[
"Surampudi",
"Atchutananda",
""
],
[
"Chapalgaonkar",
"Sankalp Shirish",
""
],
[
"Arumugam",
"Paventhan",
""
]
] |
new_dataset
| 0.999531 |
1712.04804
|
Thai Hoang Dinh DTH
|
Nguyen Van Huynh, Dinh Thai Hoang, Xiao Lu, Dusit Niyato, Ping Wang,
and Dong In Kim
|
Ambient Backscatter Communications: A Contemporary Survey
|
32 pages, 18 figures, journal
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, ambient backscatter communications has been introduced as a
cutting-edge technology which enables smart devices to communicate by utilizing
ambient radio frequency (RF) signals without requiring active RF transmission.
This technology is especially effective in addressing communication and energy
efficiency problems for low-power communications systems such as sensor
networks. It is expected to realize numerous Internet-of-Things (IoT)
applications. Therefore, this paper aims to provide a contemporary and
comprehensive literature review on fundamentals, applications, challenges, and
research efforts/progress of ambient backscatter communications. In particular,
we first present fundamentals of backscatter communications and briefly review
bistatic backscatter communications systems. Then, the general architecture,
advantages, and solutions to address existing issues and limitations of ambient
backscatter communications systems are discussed. Additionally, emerging
applications of ambient backscatter communications are highlighted. Finally, we
outline some open issues and future research directions.
|
[
{
"version": "v1",
"created": "Wed, 13 Dec 2017 14:52:44 GMT"
}
] | 2017-12-14T00:00:00 |
[
[
"Van Huynh",
"Nguyen",
""
],
[
"Hoang",
"Dinh Thai",
""
],
[
"Lu",
"Xiao",
""
],
[
"Niyato",
"Dusit",
""
],
[
"Wang",
"Ping",
""
],
[
"Kim",
"Dong In",
""
]
] |
new_dataset
| 0.995242 |
1712.04817
|
Dasari Kalyani
|
D Siva Santosh Kumar, Dasari Kalyani
|
Secure Encryption scheme with key exchange for Two server Architecture
|
4 pages, one figure, ICASETM-17 conference
|
IJERCSE, Volume 4, Issue 11, November 2017
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the distributed environment, authentication and key exchange mechanisms
play a major role. In general, for authentication, the client and the server
mutually exchange a common cryptographic key. In earlier, passwords were stored
on a single server. If an intruder gains access to the server by using some
malicious attacks, then all the passwords stored in the database be
compromised. So the e-commerce application security is endangered. In order to
improve the efficiency and performance of the authentication scheme, we
introduce multiple servers to store the passwords and participate in the key
exchange and authentication schemes. This ensures entire systems' security even
if a single server is compromised. The randomly generated nonce for each
session corresponding to two-level security mechanism where the scope of an
attacker pretends as legitimate user and login to the system is completely
restricted. In this method, passwords are stored in their equivalent hash
values and stored on multiple servers. This makes the attacker difficult to
reverse engineer and intercept to determine the password even from segments of
hash value. In this paper, we model a safe and secure password-based
authentication scheme using a key exchange.
|
[
{
"version": "v1",
"created": "Wed, 29 Nov 2017 03:52:36 GMT"
}
] | 2017-12-14T00:00:00 |
[
[
"Kumar",
"D Siva Santosh",
""
],
[
"Kalyani",
"Dasari",
""
]
] |
new_dataset
| 0.999021 |
1601.00524
|
Vadim Tropashko
|
Vadim Tropashko
|
Ideal Databases
|
Amended the introduction; added CoCoA section
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
From algebraic geometry perspective database relations are succinctly defined
as Finite Varieties. After establishing basic framework, we give analytic proof
of Heath theorem from Database Dependency theory. Next, we leverage
Algebra/Geometry dictionary and focus on algebraic counterparts of finite
varieties, polynomial ideals. It is well known that intersection and sum of
ideals are lattice operations. We generalize this fact to ideals from different
rings, therefore establishing that algebra of ideals is Relational Lattice. The
final stop is casting the framework into Linear Algebra, and traversing to
Quantum Theory.
|
[
{
"version": "v1",
"created": "Wed, 30 Dec 2015 22:45:56 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Dec 2017 18:24:33 GMT"
}
] | 2017-12-13T00:00:00 |
[
[
"Tropashko",
"Vadim",
""
]
] |
new_dataset
| 0.99213 |
1712.03999
|
Brian Dolhansky
|
Brian Dolhansky, Cristian Canton Ferrer
|
Eye In-Painting with Exemplar Generative Adversarial Networks
| null | null | null | null |
cs.CV cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a novel approach to in-painting where the identity of
the object to remove or change is preserved and accounted for at inference
time: Exemplar GANs (ExGANs). ExGANs are a type of conditional GAN that utilize
exemplar information to produce high-quality, personalized in painting results.
We propose using exemplar information in the form of a reference image of the
region to in-paint, or a perceptual code describing that object. Unlike
previous conditional GAN formulations, this extra information can be inserted
at multiple points within the adversarial network, thus increasing its
descriptive power. We show that ExGANs can produce photo-realistic personalized
in-painting results that are both perceptually and semantically plausible by
applying them to the task of closed to-open eye in-painting in natural
pictures. A new benchmark dataset is also introduced for the task of eye
in-painting for future comparisons.
|
[
{
"version": "v1",
"created": "Mon, 11 Dec 2017 19:40:55 GMT"
}
] | 2017-12-13T00:00:00 |
[
[
"Dolhansky",
"Brian",
""
],
[
"Ferrer",
"Cristian Canton",
""
]
] |
new_dataset
| 0.960885 |
1712.04048
|
Hao Zhang
|
Hao Zhang, Shizhen Xu, Graham Neubig, Wei Dai, Qirong Ho, Guangwen
Yang, Eric P. Xing
|
Cavs: A Vertex-centric Programming Interface for Dynamic Neural Networks
|
Short versions of this paper were presented at AISys workshop@SOSP
2017 and MLSys workshop@NIPS 2017
| null | null | null |
cs.LG cs.CL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent deep learning (DL) models have moved beyond static network
architectures to dynamic ones, handling data where the network structure
changes every example, such as sequences of variable lengths, trees, and
graphs. Existing dataflow-based programming models for DL---both static and
dynamic declaration---either cannot readily express these dynamic models, or
are inefficient due to repeated dataflow graph construction and processing, and
difficulties in batched execution. We present Cavs, a vertex-centric
programming interface and optimized system implementation for dynamic DL
models. Cavs represents dynamic network structure as a static vertex function
$\mathcal{F}$ and a dynamic instance-specific graph $\mathcal{G}$, and performs
backpropagation by scheduling the execution of $\mathcal{F}$ following the
dependencies in $\mathcal{G}$. Cavs bypasses expensive graph construction and
preprocessing overhead, allows for the use of static graph optimization
techniques on pre-defined operations in $\mathcal{F}$, and naturally exposes
batched execution opportunities over different graphs. Experiments comparing
Cavs to two state-of-the-art frameworks for dynamic NNs (TensorFlow Fold and
DyNet) demonstrate the efficacy of this approach: Cavs achieves a near one
order of magnitude speedup on training of various dynamic NN architectures, and
ablations demonstrate the contribution of our proposed batching and memory
management strategies.
|
[
{
"version": "v1",
"created": "Mon, 11 Dec 2017 22:04:39 GMT"
}
] | 2017-12-13T00:00:00 |
[
[
"Zhang",
"Hao",
""
],
[
"Xu",
"Shizhen",
""
],
[
"Neubig",
"Graham",
""
],
[
"Dai",
"Wei",
""
],
[
"Ho",
"Qirong",
""
],
[
"Yang",
"Guangwen",
""
],
[
"Xing",
"Eric P.",
""
]
] |
new_dataset
| 0.999479 |
1712.04190
|
Ghassan Samara
|
Tareq Alhmiedat, Ghassan Samara
|
A Low Cost ZigBee Sensor Network Architecture for Indoor Air Quality
Monitoring
|
5 pages
|
International Journal of Computer Science and Information Security
(IJCSIS), January 2017
| null |
Vol. 15, No. 1
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a low-cost system architecture that has been proposed for
automatically monitoring air quality indoors and continuously in real-time. The
designed system is in pilot phase where 4 sensor nodes are deployed in indoor
environment, and data over 4 weeks has been collected and performance analysis
and assessment are performed. Environmental data from sensor nodes are sent
through ZigBee communication protocol. The proposed system is low in cost, and
achieves low power consumption. Hardware and network architecture are presented
in addition to real-world deployment.
|
[
{
"version": "v1",
"created": "Tue, 12 Dec 2017 09:47:56 GMT"
}
] | 2017-12-13T00:00:00 |
[
[
"Alhmiedat",
"Tareq",
""
],
[
"Samara",
"Ghassan",
""
]
] |
new_dataset
| 0.999353 |
1712.04303
|
Jayvant Anantpur
|
Jayvant Anantpur, Nagendra Gulur Dwarakanath, Shivaram
Kalyanakrishnan, Shalabh Bhatnagar, R. Govindarajan
|
RLWS: A Reinforcement Learning based GPU Warp Scheduler
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Streaming Multiprocessors (SMs) of a Graphics Processing Unit (GPU)
execute instructions from a group of consecutive threads, called warps. At each
cycle, an SM schedules a warp from a group of active warps and can context
switch among the active warps to hide various stalls. Hence the performance of
warp scheduler is critical to the performance of GPU. Several heuristic warp
scheduling algorithms have been proposed which work well only for the
situations they are designed for. GPU workloads are becoming very diverse in
nature and hence one heuristic may not work for all cases. To work well over a
diverse range of workloads, which might exhibit hitherto unseen
characteristics, a warp scheduling algorithm must be able to adapt on-line.
We propose a Reinforcement Learning based Warp Scheduler (RLWS) which learns
to schedule warps based on the current state of the core and the long-term
benefits of scheduling actions, adapting not only to different types of
workloads, but also to different execution phases in each workload. As the
design space involving the state variables and the parameters (such as learning
and exploration rates, reward and penalty values) used by RLWS is large, we use
Genetic Algorithm to identify the useful subset of state variables and
parameter values. We evaluated the proposed RLWS using the GPGPU-SIM simulator
on a large number of workloads from the Rodinia, Parboil, CUDA-SDK and
GPGPU-SIM benchmark suites and compared with other state-of-the-art warp
scheduling methods. Our RL based implementation achieved either the best or
very close to the best performance in 80\% of kernels with an average speedup
of 1.06x over the Loose Round Robin strategy and 1.07x over the Two-Level
strategy.
|
[
{
"version": "v1",
"created": "Fri, 17 Nov 2017 13:57:23 GMT"
}
] | 2017-12-13T00:00:00 |
[
[
"Anantpur",
"Jayvant",
""
],
[
"Dwarakanath",
"Nagendra Gulur",
""
],
[
"Kalyanakrishnan",
"Shivaram",
""
],
[
"Bhatnagar",
"Shalabh",
""
],
[
"Govindarajan",
"R.",
""
]
] |
new_dataset
| 0.999052 |
1712.04402
|
Ignacio Martin
|
Ignacio Mart\'in, Jos\'e Alberto Hern\'andez, Alfonso Mu\~noz, Antonio
Guzm\'an
|
Android Malware Characterization using Metadata and Machine Learning
Techniques
|
4 figures, 2 tables and 8 pages
| null | null | null |
cs.CR cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Android Malware has emerged as a consequence of the increasing popularity of
smartphones and tablets. While most previous work focuses on inherent
characteristics of Android apps to detect malware, this study analyses indirect
features and meta-data to identify patterns in malware applications. Our
experiments show that: (1) the permissions used by an application offer only
moderate performance results; (2) other features publicly available at Android
Markets are more relevant in detecting malware, such as the application
developer and certificate issuer, and (3) compact and efficient classifiers can
be constructed for the early detection of malware applications prior to code
inspection or sandboxing.
|
[
{
"version": "v1",
"created": "Tue, 12 Dec 2017 17:39:33 GMT"
}
] | 2017-12-13T00:00:00 |
[
[
"Martín",
"Ignacio",
""
],
[
"Hernández",
"José Alberto",
""
],
[
"Muñoz",
"Alfonso",
""
],
[
"Guzmán",
"Antonio",
""
]
] |
new_dataset
| 0.986423 |
1704.02612
|
Shanxin Yuan
|
Shanxin Yuan, Qi Ye, Bjorn Stenger, Siddhant Jain, Tae-Kyun Kim
|
BigHand2.2M Benchmark: Hand Pose Dataset and State of the Art Analysis
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce a large-scale hand pose dataset, collected using a
novel capture method. Existing datasets are either generated synthetically or
captured using depth sensors: synthetic datasets exhibit a certain level of
appearance difference from real depth images, and real datasets are limited in
quantity and coverage, mainly due to the difficulty to annotate them. We
propose a tracking system with six 6D magnetic sensors and inverse kinematics
to automatically obtain 21-joints hand pose annotations of depth maps captured
with minimal restriction on the range of motion. The capture protocol aims to
fully cover the natural hand pose space. As shown in embedding plots, the new
dataset exhibits a significantly wider and denser range of hand poses compared
to existing benchmarks. Current state-of-the-art methods are evaluated on the
dataset, and we demonstrate significant improvements in cross-benchmark
performance. We also show significant improvements in egocentric hand pose
estimation with a CNN trained on the new dataset.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2017 15:00:31 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Dec 2017 17:05:42 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Yuan",
"Shanxin",
""
],
[
"Ye",
"Qi",
""
],
[
"Stenger",
"Bjorn",
""
],
[
"Jain",
"Siddhant",
""
],
[
"Kim",
"Tae-Kyun",
""
]
] |
new_dataset
| 0.999805 |
1704.04448
|
Soumya Basu
|
Soumya Basu, Aditya Sundarrajan, Javad Ghaderi, Sanjay Shakkottai,
Ramesh Sitaraman
|
Adaptive TTL-Based Caching for Content Delivery
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Content Delivery Networks (CDNs) deliver a majority of the user-requested
content on the Internet, including web pages, videos, and software downloads. A
CDN server caches and serves the content requested by users. Designing caching
algorithms that automatically adapt to the heterogeneity, burstiness, and
non-stationary nature of real-world content requests is a major challenge and
is the focus of our work. While there is much work on caching algorithms for
stationary request traffic, the work on non-stationary request traffic is very
limited. Consequently, most prior models are inaccurate for production CDN
traffic that is non-stationary.
We propose two TTL-based caching algorithms and provide provable guarantees
for content request traffic that is bursty and non-stationary. The first
algorithm called d-TTL dynamically adapts a TTL parameter using a stochastic
approximation approach. Given a feasible target hit rate, we show that the hit
rate of d-TTL converges to its target value for a general class of bursty
traffic that allows Markov dependence over time and non-stationary arrivals.
The second algorithm called f-TTL uses two caches, each with its own TTL. The
first-level cache adaptively filters out non-stationary traffic, while the
second-level cache stores frequently-accessed stationary traffic. Given
feasible targets for both the hit rate and the expected cache size, f-TTL
asymptotically achieves both targets. We implement d-TTL and f-TTL and evaluate
both algorithms using an extensive nine-day trace consisting of 500 million
requests from a production CDN server. We show that both d-TTL and f-TTL
converge to their hit rate targets with an error of about 1.3%. But, f-TTL
requires a significantly smaller cache size than d-TTL to achieve the same hit
rate, since it effectively filters out the non-stationary traffic for
rarely-accessed objects.
|
[
{
"version": "v1",
"created": "Fri, 14 Apr 2017 15:11:39 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Dec 2017 00:48:06 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Basu",
"Soumya",
""
],
[
"Sundarrajan",
"Aditya",
""
],
[
"Ghaderi",
"Javad",
""
],
[
"Shakkottai",
"Sanjay",
""
],
[
"Sitaraman",
"Ramesh",
""
]
] |
new_dataset
| 0.992128 |
1705.03311
|
Tobias Gr\"uning
|
Tobias Gr\"uning (1), Roger Labahn (1), Markus Diem (2), Florian
Kleber (2), Stefan Fiel (2) ((1) University of Rostock - CITlab, (2) TU Wien
- Computer Vision Lab)
|
READ-BAD: A New Dataset and Evaluation Scheme for Baseline Detection in
Archival Documents
|
Submitted to DAS2018
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Text line detection is crucial for any application associated with Automatic
Text Recognition or Keyword Spotting. Modern algorithms perform good on
well-established datasets since they either comprise clean data or
simple/homogeneous page layouts. We have collected and annotated 2036 archival
document images from different locations and time periods. The dataset contains
varying page layouts and degradations that challenge text line segmentation
methods. Well established text line segmentation evaluation schemes such as the
Detection Rate or Recognition Accuracy demand for binarized data that is
annotated on a pixel level. Producing ground truth by these means is laborious
and not needed to determine a method's quality. In this paper we propose a new
evaluation scheme that is based on baselines. The proposed scheme has no need
for binarization and it can handle skewed as well as rotated text lines. The
ICDAR 2017 Competition on Baseline Detection and the ICDAR 2017 Competition on
Layout Analysis for Challenging Medieval Manuscripts used this evaluation
scheme. Finally, we present results achieved by a recently published text line
detection algorithm.
|
[
{
"version": "v1",
"created": "Tue, 9 May 2017 13:19:39 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Dec 2017 08:15:20 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Grüning",
"Tobias",
""
],
[
"Labahn",
"Roger",
""
],
[
"Diem",
"Markus",
""
],
[
"Kleber",
"Florian",
""
],
[
"Fiel",
"Stefan",
""
]
] |
new_dataset
| 0.999187 |
1711.08102
|
Wangli Hao
|
Wangli Hao, Zhaoxiang Zhang, He Guan
|
CMCGAN: A Uniform Framework for Cross-Modal Visual-Audio Mutual
Generation
|
Have some problems need to be handled
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visual and audio modalities are two symbiotic modalities underlying videos,
which contain both common and complementary information. If they can be mined
and fused sufficiently, performances of related video tasks can be
significantly enhanced. However, due to the environmental interference or
sensor fault, sometimes, only one modality exists while the other is abandoned
or missing. By recovering the missing modality from the existing one based on
the common information shared between them and the prior information of the
specific modality, great bonus will be gained for various vision tasks. In this
paper, we propose a Cross-Modal Cycle Generative Adversarial Network (CMCGAN)
to handle cross-modal visual-audio mutual generation. Specifically, CMCGAN is
composed of four kinds of subnetworks: audio-to-visual, visual-to-audio,
audio-to-audio and visual-to-visual subnetworks respectively, which are
organized in a cycle architecture. CMCGAN has several remarkable advantages.
Firstly, CMCGAN unifies visual-audio mutual generation into a common framework
by a joint corresponding adversarial loss. Secondly, through introducing a
latent vector with Gaussian distribution, CMCGAN can handle dimension and
structure asymmetry over visual and audio modalities effectively. Thirdly,
CMCGAN can be trained end-to-end to achieve better convenience. Benefiting from
CMCGAN, we develop a dynamic multimodal classification network to handle the
modality missing problem. Abundant experiments have been conducted and validate
that CMCGAN obtains the state-of-the-art cross-modal visual-audio generation
results. Furthermore, it is shown that the generated modality achieves
comparable effects with those of original modality, which demonstrates the
effectiveness and advantages of our proposed method.
|
[
{
"version": "v1",
"created": "Wed, 22 Nov 2017 01:36:20 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Dec 2017 04:01:40 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Hao",
"Wangli",
""
],
[
"Zhang",
"Zhaoxiang",
""
],
[
"Guan",
"He",
""
]
] |
new_dataset
| 0.995359 |
1711.10448
|
Manu Goyal
|
Manu Goyal, Neil D. Reeves, Adrian K. Davison, Satyan Rajbhandari,
Jennifer Spragg and Moi Hoon Yap
|
DFUNet: Convolutional Neural Networks for Diabetic Foot Ulcer
Classification
|
Submitted to IEEE Access Journal
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Globally, in 2016, one out of eleven adults suffered from Diabetes Mellitus.
Diabetic Foot Ulcers (DFU) are a major complication of this disease, which if
not managed properly can lead to amputation. Current clinical approaches to DFU
treatment rely on patient and clinician vigilance, which has significant
limitations such as the high cost involved in the diagnosis, treatment and
lengthy care of the DFU. We collected an extensive dataset of foot images,
which contain DFU from different patients. In this paper, we have proposed the
use of traditional computer vision features for detecting foot ulcers among
diabetic patients, which represent a cost-effective, remote and convenient
healthcare solution. Furthermore, we used Convolutional Neural Networks (CNNs)
for the first time in DFU classification. We have proposed a novel
convolutional neural network architecture, DFUNet, with better feature
extraction to identify the feature differences between healthy skin and the
DFU. Using 10-fold cross-validation, DFUNet achieved an AUC score of 0.962.
This outperformed both the machine learning and deep learning classifiers we
have tested. Here we present the development of a novel and highly sensitive
DFUNet for objectively detecting the presence of DFUs. This novel approach has
the potential to deliver a paradigm shift in diabetic foot care.
|
[
{
"version": "v1",
"created": "Tue, 28 Nov 2017 18:21:22 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Dec 2017 15:14:49 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Goyal",
"Manu",
""
],
[
"Reeves",
"Neil D.",
""
],
[
"Davison",
"Adrian K.",
""
],
[
"Rajbhandari",
"Satyan",
""
],
[
"Spragg",
"Jennifer",
""
],
[
"Yap",
"Moi Hoon",
""
]
] |
new_dataset
| 0.997941 |
1711.11524
|
R Inkulu
|
Tameem Choudhury and R. Inkulu
|
Computing a rectilinear shortest path amid splinegons in plane
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We reduce the problem of computing a rectilinear shortest path between two
given points s and t in the splinegonal domain \calS to the problem of
computing a rectilinear shortest path between two points in the polygonal
domain. As part of this, we define a polygonal domain \calP from \calS and
transform a rectilinear shortest path computed in \calP to a path between s and
t amid splinegon obstacles in \calS. When \calS comprises of h pairwise
disjoint splinegons with a total of n vertices, excluding the time to compute a
rectilinear shortest path amid polygons in \calP, our reduction algorithm takes
O(n + h \lg{n}) time. For the special case of \calS comprising of concave-in
splinegons, we have devised another algorithm in which the reduction procedure
does not rely on the structures used in the algorithm to compute a rectilinear
shortest path in polygonal domain. As part of these, we have characterized few
of the properties of rectilinear shortest paths amid splinegons which could be
of independent interest.
|
[
{
"version": "v1",
"created": "Thu, 30 Nov 2017 17:29:00 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Dec 2017 04:56:10 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Choudhury",
"Tameem",
""
],
[
"Inkulu",
"R.",
""
]
] |
new_dataset
| 0.95406 |
1712.00750
|
Morad Behandish
|
Morad Behandish and Horea T. Ilies
|
Haptic Assembly and Prototyping: An Expository Review
|
Technical Report, University of Connecticut, 2016
| null | null |
CDL-TR-16-04
|
cs.HC cs.CG cs.GR cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An important application of haptic technology to digital product development
is in virtual prototyping (VP), part of which deals with interactive planning,
simulation, and verification of assembly-related activities, collectively
called virtual assembly (VA). In spite of numerous research and development
efforts over the last two decades, the industrial adoption of haptic-assisted
VP/VA has been slower than expected. Putting hardware limitations aside, the
main roadblocks faced in software development can be traced to the lack of
effective and efficient computational models of haptic feedback. Such models
must 1) accommodate the inherent geometric complexities faced when assembling
objects of arbitrary shape; and 2) conform to the computation time limitation
imposed by the notorious frame rate requirements---namely, 1 kHz for haptic
feedback compared to the more manageable 30-60 Hz for graphic rendering. The
simultaneous fulfillment of these competing objectives is far from trivial.
This survey presents some of the conceptual and computational challenges and
opportunities as well as promising future directions in haptic-assisted VP/VA,
with a focus on haptic assembly from a geometric modeling and spatial reasoning
perspective. The main focus is on revisiting definitions and classifications of
different methods used to handle the constrained multibody simulation in
real-time, ranging from physics-based and geometry-based to hybrid and unified
approaches using a variety of auxiliary computational devices to specify,
impose, and solve assembly constraints. Particular attention is given to the
newly developed 'analytic methods' inherited from motion planning and protein
docking that have shown great promise as an alternative paradigm to the more
popular combinatorial methods.
|
[
{
"version": "v1",
"created": "Sun, 3 Dec 2017 10:57:05 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Behandish",
"Morad",
""
],
[
"Ilies",
"Horea T.",
""
]
] |
new_dataset
| 0.997839 |
1712.03280
|
Deepak Dilipkumar
|
Ben Parr, Deepak Dilipkumar, Yuan Liu
|
Nintendo Super Smash Bros. Melee: An "Untouchable" Agent
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nintendo's Super Smash Bros. Melee fighting game can be emulated on modern
hardware allowing us to inspect internal memory states, such as character
positions. We created an AI that avoids being hit by training using these
internal memory states and outputting controller button presses. After training
on a month's worth of Melee matches, our best agent learned to avoid the
toughest AI built into the game for a full minute 74.6% of the time.
|
[
{
"version": "v1",
"created": "Fri, 8 Dec 2017 21:07:18 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Parr",
"Ben",
""
],
[
"Dilipkumar",
"Deepak",
""
],
[
"Liu",
"Yuan",
""
]
] |
new_dataset
| 0.999699 |
1712.03290
|
Yasaman Keshtkarjahromi
|
Yasaman Keshtkarjahromi, Hulya Seferoglu, Rashid Ansari, Ashfaq
Khokhar
|
Device-to-Device Networking Meets Cellular via Network Coding
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Utilizing device-to-device (D2D) connections among mobile devices is
promising to meet the increasing throughput demand over cellular links. In
particular, when mobile devices are in close proximity of each other and are
interested in the same content, D2D connections such as Wi-Fi Direct can be
opportunistically used to construct a cooperative (and jointly operating)
cellular and D2D networking system. However, it is crucial to understand,
quantify, and exploit the potential of network coding for cooperating mobile
devices in the joint cellular and D2D setup. In this paper, we consider this
problem, and (i) develop a network coding framework, namely NCMI, for
cooperative mobile devices in the joint cellular and D2D setup, where cellular
and D2D link capacities are the same, and (ii) characterize the performance of
the proposed network coding framework, where we use packet completion time,
which is the number of transmission slots to recover all packets, as a
performance metric. We demonstrate the benefits of our network coding framework
through simulations.
|
[
{
"version": "v1",
"created": "Fri, 8 Dec 2017 22:04:05 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Keshtkarjahromi",
"Yasaman",
""
],
[
"Seferoglu",
"Hulya",
""
],
[
"Ansari",
"Rashid",
""
],
[
"Khokhar",
"Ashfaq",
""
]
] |
new_dataset
| 0.962134 |
1712.03323
|
Gencer Sumbul
|
Gencer Sumbul, Ramazan Gokberk Cinbis, Selim Aksoy
|
Fine-Grained Object Recognition and Zero-Shot Learning in Remote Sensing
Imagery
|
G. Sumbul, R. G. Cinbis, S. Aksoy, "Fine-Grained Object Recognition
and Zero-Shot Learning in Remote Sensing Imagery", IEEE Transactions on
Geoscience and Remote Sensing (TGRS), in press, 2017
| null |
10.1109/TGRS.2017.2754648
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fine-grained object recognition that aims to identify the type of an object
among a large number of subcategories is an emerging application with the
increasing resolution that exposes new details in image data. Traditional fully
supervised algorithms fail to handle this problem where there is low
between-class variance and high within-class variance for the classes of
interest with small sample sizes. We study an even more extreme scenario named
zero-shot learning (ZSL) in which no training example exists for some of the
classes. ZSL aims to build a recognition model for new unseen categories by
relating them to seen classes that were previously learned. We establish this
relation by learning a compatibility function between image features extracted
via a convolutional neural network and auxiliary information that describes the
semantics of the classes of interest by using training samples from the seen
classes. Then, we show how knowledge transfer can be performed for the unseen
classes by maximizing this function during inference. We introduce a new data
set that contains 40 different types of street trees in 1-ft spatial resolution
aerial data, and evaluate the performance of this model with manually annotated
attributes, a natural language model, and a scientific taxonomy as auxiliary
information. The experiments show that the proposed model achieves 14.3%
recognition accuracy for the classes with no training examples, which is
significantly better than a random guess accuracy of 6.3% for 16 test classes,
and three other ZSL algorithms.
|
[
{
"version": "v1",
"created": "Sat, 9 Dec 2017 00:44:39 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Sumbul",
"Gencer",
""
],
[
"Cinbis",
"Ramazan Gokberk",
""
],
[
"Aksoy",
"Selim",
""
]
] |
new_dataset
| 0.998607 |
1712.03332
|
Kangjian Qin
|
Zhaoyang Zhang, Kangjian Qin, Liang Zhang, Huazi Zhang and Guo Tai
Chen
|
Progressive Bit-Flipping Decoding of Polar Codes Over Layered Critical
Sets
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In successive cancellation (SC) polar decoding, an incorrect estimate of any
prior unfrozen bit may bring about severe error propagation in the following
decoding, thus it is desirable to find out and correct an error as early as
possible. In this paper, we first construct a critical set $S$ of unfrozen
bits, which with high probability (typically $>99\%$) includes the bit where
the first error happens. Then we develop a progressive multi-level bit-flipping
decoding algorithm to correct multiple errors over the multiple-layer critical
sets each of which is constructed using the remaining undecoded subtree
associated with the previous layer. The \emph{level} in fact indicates the
number of \emph{independent} errors that could be corrected. We show that as
the level increases, the block error rate (BLER) performance of the proposed
progressive bit flipping decoder competes with the corresponding cyclic
redundancy check (CRC) aided successive cancellation list (CA-SCL) decoder,
e.g., a level 4 progressive bit-flipping decoder is comparable to the CA-SCL
decoder with a list size of $L=32$. Furthermore, the average complexity of the
proposed algorithm is much lower than that of a SCL decoder (and is similar to
that of SC decoding) at medium to high signal to noise ratio (SNR).
|
[
{
"version": "v1",
"created": "Sat, 9 Dec 2017 02:13:19 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Zhang",
"Zhaoyang",
""
],
[
"Qin",
"Kangjian",
""
],
[
"Zhang",
"Liang",
""
],
[
"Zhang",
"Huazi",
""
],
[
"Chen",
"Guo Tai",
""
]
] |
new_dataset
| 0.970029 |
1712.03336
|
Xuanyu Cao
|
Xuanyu Cao, Junshan Zhang, H. Vincent Poor
|
Mobile Edge Caching: An Optimal Auction Approach
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the explosive growth of wireless data, the sheer size of the mobile
traffic is challenging the capacity of current wireless systems. To tackle this
challenge, mobile edge caching has emerged as a promising paradigm recently, in
which the service providers (SPs) prefetch some popular contents in advance and
cache them locally at the network edge. When requested, those locally cached
contents can be directly delivered to users with low latency, thus alleviating
the traffic load over backhaul channels during peak hours and enhancing the
quality-of-experience (QoE) of users simultaneously. Due to the limited
available cache space, it makes sense for the SP to cache the most profitable
contents. Nevertheless, users' true valuations of contents are their private
knowledge, which is unknown to the SP in general. This information asymmetry
poses a significant challenge for effective caching at the SP side. Further,
the cached contents can be delivered with different quality, which needs to be
chosen judiciously to balance delivery costs and user satisfaction. To tackle
these difficulties, in this paper, we propose an optimal auction mechanism from
the perspective of the SP. In the auction, the SP determines the cache space
allocation over contents and user payments based on the users' (possibly
untruthful) reports of their valuations so that the SP's expected revenue is
maximized. The advocated mechanism is designed to elicit true valuations from
the users (incentive compatibility) and to incentivize user participation
(individual rationality). In addition, we devise a computationally efficient
method for calculating the optimal cache space allocation and user payments. We
further examine the optimal choice of the content delivery quality for the case
with a large number of users and derive a closed-form solution to compute the
optimal delivery quality.
|
[
{
"version": "v1",
"created": "Sat, 9 Dec 2017 02:46:51 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Cao",
"Xuanyu",
""
],
[
"Zhang",
"Junshan",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
new_dataset
| 0.995681 |
1712.03374
|
Timo Oude Vrielink
|
Kiyoteru Miyashita, Timo Oude Vrielink and George Mylonas
|
A cable-driven parallel manipulator with force sensing capabilities for
high-accuracy tissue endomicroscopy
|
Submitted to IPCAI 2018 (The 9th International Conference on
Information Processing in Computer-Assisted Interventions), 13 Pages, 12
Figures
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a new surgical end-effector probe, which allows to
accurately apply a contact force on a tissue, while at the same time allowing
for high resolution and highly repeatable probe movement. These are achieved by
implementing a cable-driven parallel manipulator arrangement, which is deployed
at the distal-end of a robotic instrument. The combination of the offered
qualities can be advantageous in several ways, with possible applications
including: large area endomicroscopy and multi-spectral imaging, micro-surgery,
tissue palpation, safe energy-based and conventional tissue resection. To
demonstrate the concept and its adaptability, the probe is integrated with a
modified da Vinci robot instrument.
|
[
{
"version": "v1",
"created": "Sat, 9 Dec 2017 10:39:26 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Miyashita",
"Kiyoteru",
""
],
[
"Vrielink",
"Timo Oude",
""
],
[
"Mylonas",
"George",
""
]
] |
new_dataset
| 0.990073 |
1712.03474
|
Lingxiao Song
|
Lingxiao Song, Zhihe Lu, Ran He, Zhenan Sun, Tieniu Tan
|
Geometry Guided Adversarial Facial Expression Synthesis
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Facial expression synthesis has drawn much attention in the field of computer
graphics and pattern recognition. It has been widely used in face animation and
recognition. However, it is still challenging due to the high-level semantic
presence of large and non-linear face geometry variations. This paper proposes
a Geometry-Guided Generative Adversarial Network (G2-GAN) for photo-realistic
and identity-preserving facial expression synthesis. We employ facial geometry
(fiducial points) as a controllable condition to guide facial texture synthesis
with specific expression. A pair of generative adversarial subnetworks are
jointly trained towards opposite tasks: expression removal and expression
synthesis. The paired networks form a mapping cycle between neutral expression
and arbitrary expressions, which also facilitate other applications such as
face transfer and expression invariant face recognition. Experimental results
show that our method can generate compelling perceptual results on various
facial expression synthesis databases. An expression invariant face recognition
experiment is also performed to further show the advantages of our proposed
method.
|
[
{
"version": "v1",
"created": "Sun, 10 Dec 2017 06:12:16 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Song",
"Lingxiao",
""
],
[
"Lu",
"Zhihe",
""
],
[
"He",
"Ran",
""
],
[
"Sun",
"Zhenan",
""
],
[
"Tan",
"Tieniu",
""
]
] |
new_dataset
| 0.976276 |
1712.03481
|
Xiao Lu
|
Xiao Lu, Hai Jiang, Dusit Niyato, Dong In Kim, and Zhu Han
|
Wireless-Powered Device-to-Device Communications with Ambient
Backscattering: Performance Modeling and Analysis
|
24 Pages, 13 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The recent advanced wireless energy harvesting technology has enabled
wireless-powered communications to accommodate wireless data services in a
self-sustainable manner. However, wireless-powered communications rely on
active RF signals to communicate, and result in high power consumption. On the
other hand, ambient backscatter technology that passively reflects existing RF
signal sources in the air to communicate has the potential to facilitate an
implementation with ultra-low power consumption. In this paper, we introduce a
hybrid D2D communication paradigm by integrating ambient backscattering with
wireless-powered communications. The hybrid D2D communications are
self-sustainable, as no dedicated external power supply is required. However,
since the radio signals for energy harvesting and for backscattering come from
the ambient, the performance of the hybrid D2D communications depends largely
on environment factors, e.g., distribution, spatial density, and transmission
load of ambient energy sources. Therefore, we design two mode selection
protocols for the hybrid D2D transmitter, allowing a more flexible adaptation
to the environment. We then introduce analytical models to characterize the
impacts of the considered environment factors on the hybrid D2D communication
performance. Together with extensive simulations, our analysis shows that the
communication performance benefits from larger repulsion, transmission load and
density of ambient energy sources. Further, we investigate how different mode
selection mechanisms affect the communication performance.
|
[
{
"version": "v1",
"created": "Sun, 10 Dec 2017 07:51:34 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Lu",
"Xiao",
""
],
[
"Jiang",
"Hai",
""
],
[
"Niyato",
"Dusit",
""
],
[
"Kim",
"Dong In",
""
],
[
"Han",
"Zhu",
""
]
] |
new_dataset
| 0.998697 |
1712.03554
|
Hector J. Garcia
|
H\'ector J. Garc\'ia, Igor L. Markov
|
Simulation of Quantum Circuits via Stabilizer Frames
|
15 pages, 18 figures, 3 tables
|
IEEE Transactions on Computers, vol. 64, no. 8, 2015
| null | null |
cs.DS quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Generic quantum-circuit simulation appears intractable for conventional
computers and may be unnecessary because useful quantum circuits exhibit
significant structure that can be exploited during simulation. For example,
Gottesman and Knill identified an important subclass, called stabilizer
circuits, which can be simulated efficiently using group-theory techniques and
insights from quantum physics. Realistic circuits enriched with quantum
error-correcting codes and fault-tolerant procedures are dominated by
stabilizer subcircuits and contain a relatively small number of non-Clifford
components. Therefore, we develop new data structures and algorithms that
facilitate parallel simulation of such circuits. Stabilizer frames offer more
compact storage than previous approaches but require more sophisticated
bookkeeping. Our implementation, called Quipu, simulates certain quantum
arithmetic circuits (e.g., reversible ripple-carry adders) in polynomial time
and space for equal superpositions of $n$-qubits. On such instances, known
linear-algebraic simulation techniques, such as the (state-of-the-art)
BDD-based simulator QuIDDPro, take exponential time. We simulate quantum
Fourier transform and quantum fault-tolerant circuits using Quipu, and the
results demonstrate that our stabilizer-based technique empirically outperforms
QuIDDPro in all cases. While previous high-performance, structure-aware
simulations of quantum circuits were difficult to parallelize, we demonstrate
that Quipu can be parallelized with a nontrivial computational speedup.
|
[
{
"version": "v1",
"created": "Sun, 10 Dec 2017 16:18:19 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"García",
"Héctor J.",
""
],
[
"Markov",
"Igor L.",
""
]
] |
new_dataset
| 0.989223 |
1712.03579
|
Mohi Reza
|
Mohi Reza, Warida Rashid, Moin Mostakim
|
Prodorshok I: A Bengali Isolated Speech Dataset for Voice-Based
Assistive Technologies - A comparative analysis of the effects of data
augmentation on HMM-GMM and DNN classifiers
|
4 pages, accepted for oral presentation at the 5th IEEE R10 HTC 2017
| null | null | null |
cs.SD cs.HC eess.AS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Prodorshok I is a Bengali isolated word dataset tailored to help create
speaker-independent, voice-command driven automated speech recognition (ASR)
based assistive technologies to help improve human-computer interaction (HCI).
This paper presents the results of an objective analysis that was undertaken
using a subset of words from Prodorshok I to assess its reliability in ASR
systems that utilize Hidden Markov Models (HMM) with Gaussian emissions and
Deep Neural Networks (DNN). The results show that simple data augmentation
involving a small pitch shift can make surprisingly tangible improvements to
accuracy levels in speech recognition.
|
[
{
"version": "v1",
"created": "Sun, 10 Dec 2017 19:52:51 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Reza",
"Mohi",
""
],
[
"Rashid",
"Warida",
""
],
[
"Mostakim",
"Moin",
""
]
] |
new_dataset
| 0.999847 |
1712.03623
|
David Barrera
|
David Barrera, Ian Molloy, Heqing Huang
|
IDIoT: Securing the Internet of Things like it's 1994
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Over 20 billion Internet of Things devices are set to come online by 2020.
Protecting such a large number of underpowered, UI-less, network-connected
devices will require a new security paradigm. We argue that solutions dependent
on vendor cooperation such as secure coding and platform changes are unlikely
to provide adequate defenses for the majority of devices. Similarly, regulation
approaches face a number implementation challenges which limit their
effectiveness. As part of the new paradigm, we propose IDIoT, a network
security policy enforcement framework for IoT devices. IDIoT prevents
widespread network attacks by restricting IoT devices to only their necessary
network behavior. IDIoT is simple and effective, building on decades of
tried-and-true network security principles without requiring changes to the
devices or cloud infrastructure.
|
[
{
"version": "v1",
"created": "Mon, 11 Dec 2017 01:58:49 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Barrera",
"David",
""
],
[
"Molloy",
"Ian",
""
],
[
"Huang",
"Heqing",
""
]
] |
new_dataset
| 0.97157 |
1712.03687
|
Zexun Zhou
|
Zexun Zhou, Zhongshi He, Ziyu Chen, Yuanyuan Jia, Haiyan Wang,
Jinglong Du, Dingding Chen
|
FHEDN: A based on context modeling Feature Hierarchy Encoder-Decoder
Network for face detection
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Because of affected by weather conditions, camera pose and range, etc.
Objects are usually small, blur, occluded and diverse pose in the images
gathered from outdoor surveillance cameras or access control system. It is
challenging and important to detect faces precisely for face recognition system
in the field of public security. In this paper, we design a based on context
modeling structure named Feature Hierarchy Encoder-Decoder Network for face
detection(FHEDN), which can detect small, blur and occluded face with hierarchy
by hierarchy from the end to the beginning likes encoder-decoder in a single
network. The proposed network is consist of multiple context modeling and
prediction modules, which are in order to detect small, blur, occluded and
diverse pose faces. In addition, we analyse the influence of distribution of
training set, scale of default box and receipt field size to detection
performance in implement stage. Demonstrated by experiments, Our network
achieves promising performance on WIDER FACE and FDDB benchmarks.
|
[
{
"version": "v1",
"created": "Mon, 11 Dec 2017 09:27:14 GMT"
}
] | 2017-12-12T00:00:00 |
[
[
"Zhou",
"Zexun",
""
],
[
"He",
"Zhongshi",
""
],
[
"Chen",
"Ziyu",
""
],
[
"Jia",
"Yuanyuan",
""
],
[
"Wang",
"Haiyan",
""
],
[
"Du",
"Jinglong",
""
],
[
"Chen",
"Dingding",
""
]
] |
new_dataset
| 0.993132 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.