id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1712.03894
Andrew Bedford
Andrew Bedford
Coqatoo: Generating Natural Language Versions of Coq Proofs
International Workshop on Coq for Programming Languages (CoqPL 2018)
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to their numerous advantages, formal proofs and proof assistants, such as Coq, are becoming increasingly popular. However, one disadvantage of using proof assistants is that the resulting proofs can sometimes be hard to read and understand, particularly for less-experienced users. To address this issue, we have implemented a tool capable of generating natural language versions of Coq proofs called Coqatoo, which we present in this paper.
[ { "version": "v1", "created": "Mon, 11 Dec 2017 17:12:34 GMT" } ]
2017-12-12T00:00:00
[ [ "Bedford", "Andrew", "" ] ]
new_dataset
0.978884
1712.03931
Manolis Savva
Manolis Savva, Angel X. Chang, Alexey Dosovitskiy, Thomas Funkhouser, Vladlen Koltun
MINOS: Multimodal Indoor Simulator for Navigation in Complex Environments
MINOS is a simulator designed to support research on end-to-end navigation
null
null
null
cs.LG cs.AI cs.CV cs.GR cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present MINOS, a simulator designed to support the development of multisensory models for goal-directed navigation in complex indoor environments. The simulator leverages large datasets of complex 3D environments and supports flexible configuration of multimodal sensor suites. We use MINOS to benchmark deep-learning-based navigation methods, to analyze the influence of environmental complexity on navigation performance, and to carry out a controlled study of multimodality in sensorimotor learning. The experiments show that current deep reinforcement learning approaches fail in large realistic environments. The experiments also indicate that multimodality is beneficial in learning to navigate cluttered scenes. MINOS is released open-source to the research community at http://minosworld.org . A video that shows MINOS can be found at https://youtu.be/c0mL9K64q84
[ { "version": "v1", "created": "Mon, 11 Dec 2017 18:24:58 GMT" } ]
2017-12-12T00:00:00
[ [ "Savva", "Manolis", "" ], [ "Chang", "Angel X.", "" ], [ "Dosovitskiy", "Alexey", "" ], [ "Funkhouser", "Thomas", "" ], [ "Koltun", "Vladlen", "" ] ]
new_dataset
0.975903
1608.05830
Ali Dorri
Ali Dorri, Soroush Vaseghi, Omid Gharib
DEBH: Detection and Elimination Black Holes in Mobile Ad Hoc Network
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security in Mobile Ad hoc Network (MANET) is one of the key challenges due to its special features e.g. hop-by-hop communications, dynamic topology, and open network boundary that received tremendous attention by scholars. Traditional security methods are not applicable in MANET due to its special properties. In this paper, a novel approach called Detecting and Eliminating Black Holes (DEBH) is proposed that uses a data control packet and an additional Black hole Check (BCh) table for detecting and eliminating malicious nodes. Benefiting from trustable nodes, the processing overhead of the security method decreases by passing time. Ad hoc On-demand Distance Vector (AODV) routing protocol is used as the routing protocol in our design. After finding the freshest path using AODV, our design checks the safety of selected path. In case of detecting any malicious node, it is isolated from the entire network by broadcasting a packet that contains the ID of malicious nodes. Simulation results show that DEBH increases network throughput and decreases packet overhead and delay in comparison with other studied approaches. Moreover, DEBH is able to detect all active malicious nodes which generates fault routing information.
[ { "version": "v1", "created": "Sat, 20 Aug 2016 14:29:04 GMT" }, { "version": "v2", "created": "Fri, 8 Dec 2017 08:58:59 GMT" } ]
2017-12-11T00:00:00
[ [ "Dorri", "Ali", "" ], [ "Vaseghi", "Soroush", "" ], [ "Gharib", "Omid", "" ] ]
new_dataset
0.983804
1701.05209
Lenny Fukshansky
Lenny Fukshansky and Ahmad Adib Shaar
A new family of one-coincidence sets of sequences with dispersed elements for frequency hopping CDMA systems
8 pages, 5 tables; to appear in Advances in Mathematics of Communication
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new family of one-coincidence sequence sets suitable for frequency hopping code division multiple access (FH-CDMA) systems with dispersed (low density) sequence elements. These sets are derived from one-coincidence prime sequence sets, such that for each one-coincidence prime sequence set there is a new one-coincidence set comprised of sequences with dispersed sequence elements, required in some circumstances, for FH-CDMA systems. Getting rid of crowdedness of sequence elements is achieved by doubling the size of the sequence element alphabet. In addition, this doubling process eases control over the distance between adjacent sequence elements. Properties of the new sets are discussed.
[ { "version": "v1", "created": "Wed, 18 Jan 2017 19:11:07 GMT" }, { "version": "v2", "created": "Fri, 8 Dec 2017 18:07:40 GMT" } ]
2017-12-11T00:00:00
[ [ "Fukshansky", "Lenny", "" ], [ "Shaar", "Ahmad Adib", "" ] ]
new_dataset
0.999081
1707.01039
Prabhu Chandhar
Prabhu Chandhar, Danyo Danev, Erik G. Larsson
Massive MIMO for Communications with Drone Swarms
Accepted for publication in the IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We illustrate the potential of massive MIMO for communication with unmanned aerial vehicles (UAVs). We consider a scenario where multiple single-antenna UAVs simultaneously communicate with a ground station (GS) equipped with a large number of antennas. Specifically, we discuss the achievable uplink (UAV to GS) capacity performance in the case of line-of-sight (LoS) conditions. We develop a realistic geometric model which incorporates an arbitrary orientation of the GS and UAV antenna elements to characterize the polarization mismatch loss which occurs due to the movement and orientation of the UAVs. A closed-form expression for a lower bound on the ergodic rate for a maximum-ratio combining receiver with estimated channel state information is derived. The optimal antenna spacing that maximizes the ergodic rate achieved by an UAV is also determined for uniform linear and rectangular arrays. It is shown that when the UAVs are spherically uniformly distributed around the GS, the ergodic rate per UAV is maximized for an antenna spacing equal to an integer multiple of one-half wavelength.
[ { "version": "v1", "created": "Tue, 4 Jul 2017 15:39:07 GMT" }, { "version": "v2", "created": "Fri, 8 Dec 2017 18:27:06 GMT" } ]
2017-12-11T00:00:00
[ [ "Chandhar", "Prabhu", "" ], [ "Danev", "Danyo", "" ], [ "Larsson", "Erik G.", "" ] ]
new_dataset
0.99037
1710.07789
Om Prakash
Habibul Islam and Om Prakash
Skew constacyclic codes over Fq+uFq+vFq
10 pages paper communicated to the Journal of Algebra and its Applications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper skew constacyclic codes over finite non-chain ring R = F_q+uF_q+vF_q, where q= p^m, p is an odd prime and u^{2}=u, v^{2}=v, uv = vu = 0 are studied. We show that Gray image of a skew alpha-constacyclic cyclic code of length n over R is a skew alpha-quasi-cyclic code of length $3n$ over F_{q} of index 3. It is also shown that skew alpha-constacyclic codes are either equivalent to alpha-constacyclic codes or alpha-quasi-twisted codes over R. Further, the structural properties of skew constacyclic over R are obtained by decomposition method.
[ { "version": "v1", "created": "Sat, 21 Oct 2017 11:22:42 GMT" }, { "version": "v2", "created": "Thu, 2 Nov 2017 07:57:40 GMT" }, { "version": "v3", "created": "Fri, 8 Dec 2017 11:31:27 GMT" } ]
2017-12-11T00:00:00
[ [ "Islam", "Habibul", "" ], [ "Prakash", "Om", "" ] ]
new_dataset
0.999699
1712.02052
Kartik Mohta
Kartik Mohta, Michael Watterson, Yash Mulgaonkar, Sikang Liu, Chao Qu, Anurag Makineni, Kelsey Saulnier, Ke Sun, Alex Zhu, Jeffrey Delmerico, Konstantinos Karydis, Nikolay Atanasov, Giuseppe Loianno, Davide Scaramuzza, Kostas Daniilidis, Camillo Jose Taylor, Vijay Kumar
Fast, Autonomous Flight in GPS-Denied and Cluttered Environments
Pre-peer reviewed version of the article accepted in Journal of Field Robotics
null
10.1002/rob.21774
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most challenging tasks for a flying robot is to autonomously navigate between target locations quickly and reliably while avoiding obstacles in its path, and with little to no a-priori knowledge of the operating environment. This challenge is addressed in the present paper. We describe the system design and software architecture of our proposed solution, and showcase how all the distinct components can be integrated to enable smooth robot operation. We provide critical insight on hardware and software component selection and development, and present results from extensive experimental testing in real-world warehouse environments. Experimental testing reveals that our proposed solution can deliver fast and robust aerial robot autonomous navigation in cluttered, GPS-denied environments.
[ { "version": "v1", "created": "Wed, 6 Dec 2017 06:14:42 GMT" } ]
2017-12-11T00:00:00
[ [ "Mohta", "Kartik", "" ], [ "Watterson", "Michael", "" ], [ "Mulgaonkar", "Yash", "" ], [ "Liu", "Sikang", "" ], [ "Qu", "Chao", "" ], [ "Makineni", "Anurag", "" ], [ "Saulnier", "Kelsey", "" ], [ "Sun", "Ke", "" ], [ "Zhu", "Alex", "" ], [ "Delmerico", "Jeffrey", "" ], [ "Karydis", "Konstantinos", "" ], [ "Atanasov", "Nikolay", "" ], [ "Loianno", "Giuseppe", "" ], [ "Scaramuzza", "Davide", "" ], [ "Daniilidis", "Kostas", "" ], [ "Taylor", "Camillo Jose", "" ], [ "Kumar", "Vijay", "" ] ]
new_dataset
0.985529
1712.02850
David Karpuk
Ragnar Freij-Hollanti, Oliver W. Gnilke, Camilla Hollanti, Anna-Lena Horlemann-Trautmann, David Karpuk, Ivo Kubjas
t-Private Information Retrieval Schemes Using Transitive Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents private information retrieval (PIR) schemes for coded storage with colluding servers, which are not restricted to maximum distance separable (MDS) codes. PIR schemes for general linear codes are constructed and the resulting PIR rate is calculated explicitly. It is shown that codes with transitive automorphism groups yield the highest possible rates obtainable with the proposed scheme. This rate coincides with the known asymptotic PIR capacity for MDS-coded storage systems without collusion. While many PIR schemes in the literature require field sizes that grow with the number of servers and files in the system, we focus especially on the case of a binary base field, for which Reed- Muller codes serve as an important and explicit class of examples.
[ { "version": "v1", "created": "Thu, 7 Dec 2017 20:10:02 GMT" } ]
2017-12-11T00:00:00
[ [ "Freij-Hollanti", "Ragnar", "" ], [ "Gnilke", "Oliver W.", "" ], [ "Hollanti", "Camilla", "" ], [ "Horlemann-Trautmann", "Anna-Lena", "" ], [ "Karpuk", "David", "" ], [ "Kubjas", "Ivo", "" ] ]
new_dataset
0.988777
1712.02923
Vatsal Patel
Vatsal Patel, Sanjay Krishnan, Aimee Goncalves, Ken Goldberg
SPRK: A Low-Cost Stewart Platform For Motion Study In Surgical Robotics
null
null
null
null
cs.RO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To simulate body organ motion due to breathing, heart beats, or peristaltic movements, we designed a low-cost, miniaturized SPRK (Stewart Platform Research Kit) to translate and rotate phantom tissue. This platform is 20cm x 20cm x 10cm to fit in the workspace of a da Vinci Research Kit (DVRK) surgical robot and costs $250, two orders of magnitude less than a commercial Stewart platform. The platform has a range of motion of +/- 1.27 cm in translation along x, y, and z directions and has motion modes for sinusoidal motion and breathing-inspired motion. Modular platform mounts were also designed for pattern cutting and debridement experiments. The platform's positional controller has a time-constant of 0.2 seconds and the root-mean-square error is 1.22 mm, 1.07 mm, and 0.20 mm in x, y, and z directions respectively. All the details, CAD models, and control software for the platform is available at github.com/BerkeleyAutomation/sprk.
[ { "version": "v1", "created": "Fri, 8 Dec 2017 03:05:37 GMT" } ]
2017-12-11T00:00:00
[ [ "Patel", "Vatsal", "" ], [ "Krishnan", "Sanjay", "" ], [ "Goncalves", "Aimee", "" ], [ "Goldberg", "Ken", "" ] ]
new_dataset
0.996075
1712.02944
Tevfik Kosar
Asif Imran, Md S Q Zulkar Nine, Kemal Guner, Tevfik Kosar
OneDataShare: A Vision for Cloud-hosted Data Transfer Scheduling and Optimization as a Service
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fast, reliable, and efficient data transmission across wide-area networks is a predominant bottleneck for data-intensive cloud applications. This paper introduces OneDataShare, which is designed to eliminate the issues plaguing effective cloud-based data transfers of varying file sizes and across incompatible transfer end-points. The vision of OneDataShare is to achieve high-speed data communication, interoperability between multiple transfer protocols, and accurate estimation of delivery time for advance planning, thereby maximizing user-profit through improved and faster data analysis for business intelligence. The paper elaborates on the desirable features of OneDataShare as a cloud-hosted data transfer scheduling and optimization service, and how it is aligned with the vision of harnessing the power of the cloud and distributed computing. Experimental evaluation and comparison with existing real-life file transfer services show that the transfer throughout achieved by OneDataShare is 6.5 times greater.
[ { "version": "v1", "created": "Fri, 8 Dec 2017 05:24:56 GMT" } ]
2017-12-11T00:00:00
[ [ "Imran", "Asif", "" ], [ "Nine", "Md S Q Zulkar", "" ], [ "Guner", "Kemal", "" ], [ "Kosar", "Tevfik", "" ] ]
new_dataset
0.993901
1712.02962
Daizhan Cheng Dr
Yaqi Hao, Daizhan Cheng
On Skew-Symmetric Games
31 pages,9 tables
null
null
null
cs.GT math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By resorting to the vector space structure of finite games, skew-symmetric games (SSGs) are proposed and investigated as a natural subspace of finite games. First of all, for two player games, it is shown that the skew-symmetric games form an orthogonal complement of the symmetric games. Then for a general SSG its linear representation is given, which can be used to verify whether a finite game is skew-symmetric. Furthermore, some properties of SSGs are also obtained in the light of its vector subspace structure. Finally, a symmetry-based decomposition of finite games is proposed, which consists of three mutually orthogonal subspaces: symmetric subspace, skew-symmetric subspace and asymmetric subspace. An illustrative example is presented to demonstrate this decomposition.
[ { "version": "v1", "created": "Fri, 8 Dec 2017 06:42:05 GMT" } ]
2017-12-11T00:00:00
[ [ "Hao", "Yaqi", "" ], [ "Cheng", "Daizhan", "" ] ]
new_dataset
0.996232
1712.02977
Toru Niina
Toru Niina
Periortree: An Extention of R-Tree for Periodic Boundary Conditions
a very preliminary draft
null
null
null
cs.DS
http://creativecommons.org/licenses/by/4.0/
Searching spatial data is an important operation for scientific simulations which are performed mostly with periodic boundary conditions. An R-Tree is a well known tree data structure used to contain spatial objects and it is capable of answering to spatial searching queries in an efficient way. In this paper, a novel method to construct an R-Tree considering periodic boundary conditions is presented. Unlike existing methods, the proposed method works without any kind of extra objects or queries. Moreover, because this method reduces the volume of bounding box for each node under the periodic boundary conditions, it is expected to increase the overall efficiency. While the extension of an R-Tree is presented in this work, this method is not only applicable to an R-Tree but also to other data structures that use axis-aligned bounding boxes with periodic boundary conditions. The implementation is available on GitHub.
[ { "version": "v1", "created": "Fri, 8 Dec 2017 08:29:16 GMT" } ]
2017-12-11T00:00:00
[ [ "Niina", "Toru", "" ] ]
new_dataset
0.99606
1712.03159
Pulak Purkait
Pulak Purkait and Christopher Zach
Minimal Solvers for Monocular Rolling Shutter Compensation under Ackermann Motion
Submitted to WACV 2018
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern automotive vehicles are often equipped with a budget commercial rolling shutter camera. These devices often produce distorted images due to the inter-row delay of the camera while capturing the image. Recent methods for monocular rolling shutter motion compensation utilize blur kernel and the straightness property of line segments. However, these methods are limited to handling rotational motion and also are not fast enough to operate in real time. In this paper, we propose a minimal solver for the rolling shutter motion compensation which assumes known vertical direction of the camera. Thanks to the Ackermann motion model of vehicles which consists of only two motion parameters, and two parameters for the simplified depth assumption that lead to a 4-line algorithm. The proposed minimal solver estimates the rolling shutter camera motion efficiently and accurately. The extensive experiments on real and simulated datasets demonstrate the benefits of our approach in terms of qualitative and quantitative results.
[ { "version": "v1", "created": "Fri, 8 Dec 2017 16:26:43 GMT" } ]
2017-12-11T00:00:00
[ [ "Purkait", "Pulak", "" ], [ "Zach", "Christopher", "" ] ]
new_dataset
0.989411
1712.03186
Gustavo Maciel Dias Vieira
Rafael R. Machado, Gustavo M. D. Vieira
UEFI BIOS Accessibility for the Visually Impaired
6 pages
SBESC '17: Proceedings of the VII Brazilian Symposium on Computing Systems Engineering, IEEE Computer Society, 2017, 155-160
10.1109/SBESC.2017.27
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
People with some kind of disability face a high level of difficulty for everyday tasks because, in many cases, accessibility was not considered necessary when the task or process was designed. An example of this scenario is a computer's BIOS configuration screens, which do not consider the specific needs, such as screen readers, of visually impaired people. This paper proposes the idea that it is possible to make the pre-operating system environment accessible to visually impaired people. We report our work-in-progress in creating a screen reader prototype, accessing audio cards compatible with the High Definition Audio specification in systems running UEFI compliant firmware.
[ { "version": "v1", "created": "Thu, 7 Dec 2017 17:47:11 GMT" } ]
2017-12-11T00:00:00
[ [ "Machado", "Rafael R.", "" ], [ "Vieira", "Gustavo M. D.", "" ] ]
new_dataset
0.996022
1706.00556
Yang Song
Yang Song, Zhifei Zhang, Hairong Qi
r-BTN: Cross-domain Face Composite and Synthesis from Limited Facial Patches
Accepted by AAAI 2018
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
We start by asking an interesting yet challenging question, "If an eyewitness can only recall the eye features of the suspect, such that the forensic artist can only produce a sketch of the eyes (e.g., the top-left sketch shown in Fig. 1), can advanced computer vision techniques help generate the whole face image?" A more generalized question is that if a large proportion (e.g., more than 50%) of the face/sketch is missing, can a realistic whole face sketch/image still be estimated. Existing face completion and generation methods either do not conduct domain transfer learning or can not handle large missing area. For example, the inpainting approach tends to blur the generated region when the missing area is large (i.e., more than 50%). In this paper, we exploit the potential of deep learning networks in filling large missing region (e.g., as high as 95% missing) and generating realistic faces with high-fidelity in cross domains. We propose the recursive generation by bidirectional transformation networks (r-BTN) that recursively generates a whole face/sketch from a small sketch/face patch. The large missing area and the cross domain challenge make it difficult to generate satisfactory results using a unidirectional cross-domain learning structure. On the other hand, a forward and backward bidirectional learning between the face and sketch domains would enable recursive estimation of the missing region in an incremental manner (Fig. 1) and yield appealing results. r-BTN also adopts an adversarial constraint to encourage the generation of realistic faces/sketches. Extensive experiments have been conducted to demonstrate the superior performance from r-BTN as compared to existing potential solutions.
[ { "version": "v1", "created": "Fri, 2 Jun 2017 05:07:37 GMT" }, { "version": "v2", "created": "Wed, 6 Dec 2017 20:08:27 GMT" } ]
2017-12-08T00:00:00
[ [ "Song", "Yang", "" ], [ "Zhang", "Zhifei", "" ], [ "Qi", "Hairong", "" ] ]
new_dataset
0.992275
1710.10515
George Chen
George H. Chen, Kendall Nowocin, Niraj Marathe
Toward Reducing Crop Spoilage and Increasing Small Farmer Profits in India: a Simultaneous Hardware and Software Solution
International Conference on Information and Communication Technologies for Development 2017, fixed Figure 4 sparsity pattern issue, added acknowledgments
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
India's agricultural system has been facing a severe problem of crop wastage. A key contributing factor to this problem is that many small farmers lack access to reliable cold storage that extends crop shelf-life. To avoid having leftover crops that spoil, these farmers often sell their crops at unfavorable low prices. Inevitably, not all crops are sold before spoilage. Even if the farmers have access to cold storage, the farmers may not know how long to hold different crops in cold storage for, which hinges on strategizing over when and where to sell their harvest. In this note, we present progress toward a simultaneous hardware and software solution that aims to help farmers reduce crop spoilage and increase their profits. The hardware is a cost-effective solar-powered refrigerator and control unit. The software refers to a produce price forecasting system, for which we have tested a number of machine learning methods. Note that unlike standard price forecasting tasks such as for stock market data, the produce price data from predominantly rural Indian markets have a large amount of missing values. In developing our two-pronged solution, we are actively working with farmers at two pilot sites in Karnataka and Odisha.
[ { "version": "v1", "created": "Sat, 28 Oct 2017 18:55:24 GMT" }, { "version": "v2", "created": "Thu, 7 Dec 2017 07:00:30 GMT" } ]
2017-12-08T00:00:00
[ [ "Chen", "George H.", "" ], [ "Nowocin", "Kendall", "" ], [ "Marathe", "Niraj", "" ] ]
new_dataset
0.978822
1711.05412
Dianmu Zhang
Dianmu Zhang and Blake Hannaford
IKBT: solving closed-form Inverse Kinematics with Behavior Tree
14 pages, 6 figures
null
null
null
cs.RO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Serial robot arms have complicated kinematic equations which must be solved to write effective arm planning and control software (the Inverse Kinematics Problem). Existing software packages for inverse kinematics often rely on numerical methods which have significant shortcomings. Here we report a new symbolic inverse kinematics solver which overcomes the limitations of numerical methods, and the shortcomings of previous symbolic software packages. We integrate Behavior Trees, an execution planning framework previously used for controlling intelligent robot behavior, to organize the equation solving process, and a modular architecture for each solution technique. The system successfully solved, generated a LaTex report, and generated a Python code template for 18 out of 19 example robots of 4-6 DOF. The system is readily extensible, maintainable, and multi-platform with few dependencies. The complete package is available with a Modified BSD license on Github.
[ { "version": "v1", "created": "Wed, 15 Nov 2017 05:19:18 GMT" }, { "version": "v2", "created": "Fri, 17 Nov 2017 01:27:29 GMT" }, { "version": "v3", "created": "Thu, 7 Dec 2017 08:42:56 GMT" } ]
2017-12-08T00:00:00
[ [ "Zhang", "Dianmu", "" ], [ "Hannaford", "Blake", "" ] ]
new_dataset
0.996506
1711.07120
Yu Qin
Yu Qin and Wanjiaman Li
Quantum Inspired Security on a Mobile Phone
The conclusion of this paper I recalculated and found to be wrong. Since I am afraid of causing future problems, please let me withdraw it
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The widespread use of mobile electronic devices increases the complexities of mobile security. This paper aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.
[ { "version": "v1", "created": "Mon, 20 Nov 2017 02:04:27 GMT" }, { "version": "v2", "created": "Thu, 7 Dec 2017 07:18:21 GMT" } ]
2017-12-08T00:00:00
[ [ "Qin", "Yu", "" ], [ "Li", "Wanjiaman", "" ] ]
new_dataset
0.998947
1711.09704
David P. Chassin
David P. Chassin
Multi-scale Transactive Control In Interconnected Bulk Power Systems Under High Renewable Energy Supply and High Demand Response Scenarios
242 pages, including auxiliary report by David P. Chassin and Ned Djilali. Phd thesis, Mechanical Engineering, Univ of Victoria (2017)
null
null
null
cs.SY nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This thesis presents the design, analysis, and validation of a hierarchical transactive control system that engages demand response resources to enhance the integration of renewable electricity generation resources. This control system joins energy, capacity and regulation markets together in a unified homeostatic and economically efficient electricity operation that increases total surplus while improving reliability and decreasing carbon emissions from fossil-based generation resources. The work encompasses: (1) the derivation of a short-term demand response model suitable for transactive control systems and its validation with field demonstration data; (2) an aggregate load model that enables effective control of large populations of thermal loads using a new type of thermostat (discrete time with zero deadband); (3) a methodology for optimally controlling response to frequency deviations while tracking schedule area exports in areas that have high penetration of both intermittent renewable resources and fast-acting demand response; and (4) the development of a system-wide (continental interconnection) scale strategy for optimal power trajectory and resource dispatch based on a shift from primarily energy cost-based approach to a primarily ramping cost-based one. The results show that multi-layer transactive control systems can be constructed, will enhance renewable resource utilization, and will operate in a coordinated manner with bulk power systems that include both regions with and without organized power markets. Estimates of Western Electric Coordionating Council (WECC) system cost savings under target renewable energy generation levels resulting from the proposed system exceed US$150B annually by the year 2024, when compared to the existing control system.
[ { "version": "v1", "created": "Wed, 22 Nov 2017 19:10:47 GMT" }, { "version": "v2", "created": "Wed, 6 Dec 2017 23:53:42 GMT" } ]
2017-12-08T00:00:00
[ [ "Chassin", "David P.", "" ] ]
new_dataset
0.986614
1712.01090
Chen Chen
Mengyuan Liu, Hong Liu, Chen Chen
Robust 3D Action Recognition through Sampling Local Appearances and Global Distributions
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
3D action recognition has broad applications in human-computer interaction and intelligent surveillance. However, recognizing similar actions remains challenging since previous literature fails to capture motion and shape cues effectively from noisy depth data. In this paper, we propose a novel two-layer Bag-of-Visual-Words (BoVW) model, which suppresses the noise disturbances and jointly encodes both motion and shape cues. First, background clutter is removed by a background modeling method that is designed for depth data. Then, motion and shape cues are jointly used to generate robust and distinctive spatial-temporal interest points (STIPs): motion-based STIPs and shape-based STIPs. In the first layer of our model, a multi-scale 3D local steering kernel (M3DLSK) descriptor is proposed to describe local appearances of cuboids around motion-based STIPs. In the second layer, a spatial-temporal vector (STV) descriptor is proposed to describe the spatial-temporal distributions of shape-based STIPs. Using the Bag-of-Visual-Words (BoVW) model, motion and shape cues are combined to form a fused action representation. Our model performs favorably compared with common STIP detection and description methods. Thorough experiments verify that our model is effective in distinguishing similar actions and robust to background clutter, partial occlusions and pepper noise.
[ { "version": "v1", "created": "Mon, 4 Dec 2017 14:31:42 GMT" }, { "version": "v2", "created": "Thu, 7 Dec 2017 15:21:15 GMT" } ]
2017-12-08T00:00:00
[ [ "Liu", "Mengyuan", "" ], [ "Liu", "Hong", "" ], [ "Chen", "Chen", "" ] ]
new_dataset
0.988485
1712.02494
Jiajun Lu
Jiajun Lu, Hussein Sibai, Evan Fabry
Adversarial Examples that Fool Detectors
Follow up paper for adversarial stop signs. Submitted to CVPR 2018
null
null
null
cs.CV cs.AI cs.GR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An adversarial example is an example that has been adjusted to produce a wrong label when presented to a system at test time. To date, adversarial example constructions have been demonstrated for classifiers, but not for detectors. If adversarial examples that could fool a detector exist, they could be used to (for example) maliciously create security hazards on roads populated with smart vehicles. In this paper, we demonstrate a construction that successfully fools two standard detectors, Faster RCNN and YOLO. The existence of such examples is surprising, as attacking a classifier is very different from attacking a detector, and that the structure of detectors - which must search for their own bounding box, and which cannot estimate that box very accurately - makes it quite likely that adversarial patterns are strongly disrupted. We show that our construction produces adversarial examples that generalize well across sequences digitally, even though large perturbations are needed. We also show that our construction yields physical objects that are adversarial.
[ { "version": "v1", "created": "Thu, 7 Dec 2017 05:13:54 GMT" } ]
2017-12-08T00:00:00
[ [ "Lu", "Jiajun", "" ], [ "Sibai", "Hussein", "" ], [ "Fabry", "Evan", "" ] ]
new_dataset
0.994413
1712.02731
Romeo Orsolino
Romeo Orsolino (1), Michele Focchi (1), Carlos Mastalli (1), Hongkai Dai (2), Darwin G. Caldwell (1) and Claudio Semini (1) ((1) Department of Advanced Robotics, Istituto Italiano di Tecnologia (IIT), (2) Toyota Research Institute (TRI))
The Actuation-consistent Wrench Polytope (AWP) and the Feasible Wrench Polytope (FWP)
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The motivation of our current research is to devise motion planners for legged locomotion that are able to exploit the robot's actuation capabilities. This means, when possible, to minimize joint torques or to propel as much as admissible when required. For this reason we define two new 6 dimensional bounded polytopes that we name Actuation-consistent Wrench Polytope (AWP) and Feasible Wrench Polytope (FWP). These objects turn out to be very useful in motion planning for the definition of constraints on the accelerations of the Center of Mass of the robot that respect the friction cones and the actuation limits. The AWP and the FWP could be used also in the robot design phase to size the actuators of the system based on some predefined reference motion.
[ { "version": "v1", "created": "Thu, 7 Dec 2017 17:23:07 GMT" } ]
2017-12-08T00:00:00
[ [ "Orsolino", "Romeo", "" ], [ "Focchi", "Michele", "" ], [ "Mastalli", "Carlos", "" ], [ "Dai", "Hongkai", "" ], [ "Caldwell", "Darwin G.", "" ], [ "Semini", "Claudio", "" ] ]
new_dataset
0.99477
1704.03627
Ting-Hao Huang
Ting-Hao 'Kenneth' Huang, Yun-Nung Chen, Jeffrey P. Bigham
Real-time On-Demand Crowd-powered Entity Extraction
Accepted by the 5th Edition Of The Collective Intelligence Conference (CI 2017) as an oral presentation. Interface code and data are available at: https://github.com/windx0303/dialogue-esp-game
null
null
null
cs.HC cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Output-agreement mechanisms such as ESP Game have been widely used in human computation to obtain reliable human-generated labels. In this paper, we argue that a "time-limited" output-agreement mechanism can be used to create a fast and robust crowd-powered component in interactive systems, particularly dialogue systems, to extract key information from user utterances on the fly. Our experiments on Amazon Mechanical Turk using the Airline Travel Information System (ATIS) dataset showed that the proposed approach achieves high-quality results with an average response time shorter than 9 seconds.
[ { "version": "v1", "created": "Wed, 12 Apr 2017 05:48:18 GMT" }, { "version": "v2", "created": "Wed, 6 Dec 2017 17:12:12 GMT" } ]
2017-12-07T00:00:00
[ [ "Huang", "Ting-Hao 'Kenneth'", "" ], [ "Chen", "Yun-Nung", "" ], [ "Bigham", "Jeffrey P.", "" ] ]
new_dataset
0.981196
1704.04683
Guokun Lai
Guokun Lai, Qizhe Xie, Hanxiao Liu, Yiming Yang, Eduard Hovy
RACE: Large-scale ReAding Comprehension Dataset From Examinations
EMNLP 2017
null
null
null
cs.CL cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present RACE, a new dataset for benchmark evaluation of methods in the reading comprehension task. Collected from the English exams for middle and high school Chinese students in the age range between 12 to 18, RACE consists of near 28,000 passages and near 100,000 questions generated by human experts (English instructors), and covers a variety of topics which are carefully designed for evaluating the students' ability in understanding and reasoning. In particular, the proportion of questions that requires reasoning is much larger in RACE than that in other benchmark datasets for reading comprehension, and there is a significant gap between the performance of the state-of-the-art models (43%) and the ceiling human performance (95%). We hope this new dataset can serve as a valuable resource for research and evaluation in machine comprehension. The dataset is freely available at http://www.cs.cmu.edu/~glai1/data/race/ and the code is available at https://github.com/qizhex/RACE_AR_baselines.
[ { "version": "v1", "created": "Sat, 15 Apr 2017 19:31:41 GMT" }, { "version": "v2", "created": "Sun, 30 Apr 2017 15:47:40 GMT" }, { "version": "v3", "created": "Sat, 10 Jun 2017 03:21:55 GMT" }, { "version": "v4", "created": "Sat, 15 Jul 2017 18:48:57 GMT" }, { "version": "v5", "created": "Tue, 5 Dec 2017 19:36:03 GMT" } ]
2017-12-07T00:00:00
[ [ "Lai", "Guokun", "" ], [ "Xie", "Qizhe", "" ], [ "Liu", "Hanxiao", "" ], [ "Yang", "Yiming", "" ], [ "Hovy", "Eduard", "" ] ]
new_dataset
0.999826
1706.00069
Qiyu Zhi
Qiyu Zhi, Ronald Metoyer
Recognizing Handwritten Source Code
7 pages, 6 figures, Proceedings of the 2017 Graphics Interface conference
null
10.20380/GI2017.21
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Supporting programming on touchscreen devices requires effective text input and editing methods. Unfortunately, the virtual keyboard can be inefficient and uses valuable screen space on already small devices. Recent advances in stylus input make handwriting a potentially viable text input solution for programming on touchscreen devices. The primary barrier, however, is that handwriting recognition systems are built to take advantage of the rules of natural language, not those of a programming language. In this paper, we explore this particular problem of handwriting recognition for source code. We collect and make publicly available a dataset of handwritten Python code samples from 15 participants and we characterize the typical recognition errors for this handwritten Python source code when using a state-of-the-art handwriting recognition tool. We present an approach to improve the recognition accuracy by augmenting a handwriting recognizer with the programming language grammar rules. Our experiment on the collected dataset shows an 8.6% word error rate and a 3.6% character error rate which outperforms standard handwriting recognition systems and compares favorably to typing source code on virtual keyboards.
[ { "version": "v1", "created": "Wed, 31 May 2017 20:07:12 GMT" } ]
2017-12-07T00:00:00
[ [ "Zhi", "Qiyu", "" ], [ "Metoyer", "Ronald", "" ] ]
new_dataset
0.998192
1712.02167
Dragoi Vlad
Vlad Dragoi and Herv\'e Tal\'e Kalachi
Cryptanalysis of a public key encryption scheme based on QC-LDPC and QC-MDPC codes
To be published in IEEE Communications Letters
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter presents a cryptanalysis of the modified McEliece cryptosystem recently proposed by Moufek, Guenda and Gulliver [24]. The system is based on the juxtaposition of quasi-cyclic LDPC and quasi-cyclic MDPC codes. The idea of our attack is to find an alternative permutation matrix together with an equivalent LDPC code which allow the decoding of any cipher-text with a very high probability. We also apply a recent technique to determine weak keys [4] for this scheme. The results show that the probability of weak keys is high enough that this variant can be ruled out as a possible secure encryption scheme.
[ { "version": "v1", "created": "Wed, 6 Dec 2017 12:57:42 GMT" } ]
2017-12-07T00:00:00
[ [ "Dragoi", "Vlad", "" ], [ "Kalachi", "Hervé Talé", "" ] ]
new_dataset
0.993975
1712.02170
Yuliang Liu
Liu Yuliang, Jin Lianwen, Zhang Shuaitao and Zhang Sheng
Detecting Curve Text in the Wild: New Dataset and New Solution
9 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scene text detection has been made great progress in recent years. The detection manners are evolving from axis-aligned rectangle to rotated rectangle and further to quadrangle. However, current datasets contain very little curve text, which can be widely observed in scene images such as signboard, product name and so on. To raise the concerns of reading curve text in the wild, in this paper, we construct a curve text dataset named CTW1500, which includes over 10k text annotations in 1,500 images (1000 for training and 500 for testing). Based on this dataset, we pioneering propose a polygon based curve text detector (CTD) which can directly detect curve text without empirical combination. Moreover, by seamlessly integrating the recurrent transverse and longitudinal offset connection (TLOC), the proposed method can be end-to-end trainable to learn the inherent connection among the position offsets. This allows the CTD to explore context information instead of predicting points independently, resulting in more smooth and accurate detection. We also propose two simple but effective post-processing methods named non-polygon suppress (NPS) and polygonal non-maximum suppression (PNMS) to further improve the detection accuracy. Furthermore, the proposed approach in this paper is designed in an universal manner, which can also be trained with rectangular or quadrilateral bounding boxes without extra efforts. Experimental results on CTW-1500 demonstrate our method with only a light backbone can outperform state-of-the-art methods with a large margin. By evaluating only in the curve or non-curve subset, the CTD + TLOC can still achieve the best results. Code is available at https://github.com/Yuliang-Liu/Curve-Text-Detector.
[ { "version": "v1", "created": "Wed, 6 Dec 2017 13:02:43 GMT" } ]
2017-12-07T00:00:00
[ [ "Yuliang", "Liu", "" ], [ "Lianwen", "Jin", "" ], [ "Shuaitao", "Zhang", "" ], [ "Sheng", "Zhang", "" ] ]
new_dataset
0.999619
1712.02186
Hu Xu
Hu Xu, Sihong Xie, Lei Shu, Philip S. Yu
Product Function Need Recognition via Semi-supervised Attention Network
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Functionality is of utmost importance to customers when they purchase products. However, it is unclear to customers whether a product can really satisfy their needs on functions. Further, missing functions may be intentionally hidden by the manufacturers or the sellers. As a result, a customer needs to spend a fair amount of time before purchasing or just purchase the product on his/her own risk. In this paper, we first identify a novel QA corpus that is dense on product functionality information \footnote{The annotated corpus can be found at \url{https://www.cs.uic.edu/~hxu/}.}. We then design a neural network called Semi-supervised Attention Network (SAN) to discover product functions from questions. This model leverages unlabeled data as contextual information to perform semi-supervised sequence labeling. We conduct experiments to show that the extracted function have both high coverage and accuracy, compared with a wide spectrum of baselines.
[ { "version": "v1", "created": "Wed, 6 Dec 2017 13:48:57 GMT" } ]
2017-12-07T00:00:00
[ [ "Xu", "Hu", "" ], [ "Xie", "Sihong", "" ], [ "Shu", "Lei", "" ], [ "Yu", "Philip S.", "" ] ]
new_dataset
0.956016
1302.2223
Marko Horvat
Marko Horvat, Anton Grbin, Gordan Gledec
WNtags: A Web-Based Tool For Image Labeling And Retrieval With Lexical Ontologies
10 pages, 3 figures, published in 16th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems, 10-12 Sep 2012, San Sebastian, Spain
Frontiers in artificial intelligence and applications, 243, pp. 585-594 (2012)
null
null
cs.IR cs.AI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ever growing number of image documents available on the Internet continuously motivates research in better annotation models and more efficient retrieval methods. Formal knowledge representation of objects and events in pictures, their interaction as well as context complexity becomes no longer an option for a quality image repository, but a necessity. We present an ontology-based online image annotation tool WNtags and demonstrate its usefulness in several typical multimedia retrieval tasks using International Affective Picture System emotionally annotated image database. WNtags is built around WordNet lexical ontology but considers Suggested Upper Merged Ontology as the preferred labeling formalism. WNtags uses sets of weighted WordNet synsets as high-level image semantic descriptors and query matching is performed with word stemming and node distance metrics. We also elaborate our near future plans to expand image content description with induced affect as in stimuli for research of human emotion and attention.
[ { "version": "v1", "created": "Sat, 9 Feb 2013 11:49:19 GMT" }, { "version": "v2", "created": "Tue, 5 Dec 2017 18:50:48 GMT" } ]
2017-12-06T00:00:00
[ [ "Horvat", "Marko", "" ], [ "Grbin", "Anton", "" ], [ "Gledec", "Gordan", "" ] ]
new_dataset
0.999523
1707.07833
Inwan Yoo
Inwan Yoo, David G. C. Hildebrand, Willie F. Tobin, Wei-Chung Allen Lee, Won-Ki Jeong
ssEMnet: Serial-section Electron Microscopy Image Registration using a Spatial Transformer Network with Learned Features
DLMIA 2017 accepted
null
10.1007/978-3-319-67558-9_29
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The alignment of serial-section electron microscopy (ssEM) images is critical for efforts in neuroscience that seek to reconstruct neuronal circuits. However, each ssEM plane contains densely packed structures that vary from one section to the next, which makes matching features across images a challenge. Advances in deep learning has resulted in unprecedented performance in similar computer vision problems, but to our knowledge, they have not been successfully applied to ssEM image co-registration. In this paper, we introduce a novel deep network model that combines a spatial transformer for image deformation and a convolutional autoencoder for unsupervised feature learning for robust ssEM image alignment. This results in improved accuracy and robustness while requiring substantially less user intervention than conventional methods. We evaluate our method by comparing registration quality across several datasets.
[ { "version": "v1", "created": "Tue, 25 Jul 2017 06:50:34 GMT" }, { "version": "v2", "created": "Tue, 5 Dec 2017 06:56:20 GMT" } ]
2017-12-06T00:00:00
[ [ "Yoo", "Inwan", "" ], [ "Hildebrand", "David G. C.", "" ], [ "Tobin", "Willie F.", "" ], [ "Lee", "Wei-Chung Allen", "" ], [ "Jeong", "Won-Ki", "" ] ]
new_dataset
0.996788
1709.03715
Stefano Bagnasco
Marco Aldinucci, Stefano Bagnasco, Stefano Lusso, Paolo Pasteris, Sergio Rabellino and Sara Vallero
OCCAM: a flexible, multi-purpose and extendable HPC cluster
Accepted for publication in the Proceedings of CHEP2016, San Francisco, USA
null
10.1088/1742-6596/898/8/082039
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Open Computing Cluster for Advanced data Manipulation (OCCAM) is a multi-purpose flexible HPC cluster designed and operated by a collaboration between the University of Torino and the Sezione di Torino of the Istituto Nazionale di Fisica Nucleare. It is aimed at providing a flexible, reconfigurable and extendable infrastructure to cater to a wide range of different scientific computing use cases, including ones from solid-state chemistry, high-energy physics, computer science, big data analytics, computational biology, genomics and many others. Furthermore, it will serve as a platform for R&D activities on computational technologies themselves, with topics ranging from GPU acceleration to Cloud Computing technologies. A heterogeneous and reconfigurable system like this poses a number of challenges related to the frequency at which heterogeneous hardware resources might change their availability and shareability status, which in turn affect methods and means to allocate, manage, optimize, bill, monitor VMs, containers, virtual farms, jobs, interactive bare-metal sessions, etc. This work describes some of the use cases that prompted the design and construction of the HPC cluster, its architecture and resource provisioning model, along with a first characterization of its performance by some synthetic benchmark tools and a few realistic use-case tests.
[ { "version": "v1", "created": "Tue, 12 Sep 2017 07:40:51 GMT" } ]
2017-12-06T00:00:00
[ [ "Aldinucci", "Marco", "" ], [ "Bagnasco", "Stefano", "" ], [ "Lusso", "Stefano", "" ], [ "Pasteris", "Paolo", "" ], [ "Rabellino", "Sergio", "" ], [ "Vallero", "Sara", "" ] ]
new_dataset
0.997862
1709.08605
Maxim Borisyak
Maxim Borisyak, Michail Usvyatsov, Michael Mulhearn, Chase Shimmin and Andrey Ustyuzhanin
Muon Trigger for Mobile Phones
null
null
10.1088/1742-6596/898/3/032048
null
cs.CV astro-ph.IM physics.ins-det
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The CRAYFIS experiment proposes to use privately owned mobile phones as a ground detector array for Ultra High Energy Cosmic Rays. Upon interacting with Earth's atmosphere, these events produce extensive particle showers which can be detected by cameras on mobile phones. A typical shower contains minimally-ionizing particles such as muons. As these particles interact with CMOS image sensors, they may leave tracks of faintly-activated pixels that are sometimes hard to distinguish from random detector noise. Triggers that rely on the presence of very bright pixels within an image frame are not efficient in this case. We present a trigger algorithm based on Convolutional Neural Networks which selects images containing such tracks and are evaluated in a lazy manner: the response of each successive layer is computed only if activation of the current layer satisfies a continuation criterion. Usage of neural networks increases the sensitivity considerably comparable with image thresholding, while the lazy evaluation allows for execution of the trigger under the limited computational power of mobile phones.
[ { "version": "v1", "created": "Mon, 25 Sep 2017 17:15:09 GMT" } ]
2017-12-06T00:00:00
[ [ "Borisyak", "Maxim", "" ], [ "Usvyatsov", "Michail", "" ], [ "Mulhearn", "Michael", "" ], [ "Shimmin", "Chase", "" ], [ "Ustyuzhanin", "Andrey", "" ] ]
new_dataset
0.99939
1711.01386
Yuan Yang
Yuan Yang, Pengtao Xie, Xin Gao, Carol Cheng, Christy Li, Hongbao Zhang and Eric Xing
Predicting Discharge Medications at Admission Time Based on Deep Learning
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Predicting discharge medications right after a patient being admitted is an important clinical decision, which provides physicians with guidance on what type of medication regimen to plan for and what possible changes on initial medication may occur during an inpatient stay. It also facilitates medication reconciliation process with easy detection of medication discrepancy at discharge time to improve patient safety. However, since the information available upon admission is limited and patients' condition may evolve during an inpatient stay, these predictions could be a difficult decision for physicians to make. In this work, we investigate how to leverage deep learning technologies to assist physicians in predicting discharge medications based on information documented in the admission note. We build a convolutional neural network which takes an admission note as input and predicts the medications placed on the patient at discharge time. Our method is able to distill semantic patterns from unstructured and noisy texts, and is capable of capturing the pharmacological correlations among medications. We evaluate our method on 25K patient visits and compare with 4 strong baselines. Our methods demonstrate a 20% increase in macro-averaged F1 score than the best baseline.
[ { "version": "v1", "created": "Sat, 4 Nov 2017 03:04:40 GMT" }, { "version": "v2", "created": "Sat, 25 Nov 2017 19:33:22 GMT" }, { "version": "v3", "created": "Tue, 5 Dec 2017 17:13:56 GMT" } ]
2017-12-06T00:00:00
[ [ "Yang", "Yuan", "" ], [ "Xie", "Pengtao", "" ], [ "Gao", "Xin", "" ], [ "Cheng", "Carol", "" ], [ "Li", "Christy", "" ], [ "Zhang", "Hongbao", "" ], [ "Xing", "Eric", "" ] ]
new_dataset
0.972935
1711.03800
Arun Balajee Vasudevan
Arun Balajee Vasudevan, Dengxin Dai, Luc Van Gool
Object Referring in Visual Scene with Spoken Language
10 pages, Submitted to WACV 2018
null
null
null
cs.CV cs.CL cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object referring has important applications, especially for human-machine interaction. While having received great attention, the task is mainly attacked with written language (text) as input rather than spoken language (speech), which is more natural. This paper investigates Object Referring with Spoken Language (ORSpoken) by presenting two datasets and one novel approach. Objects are annotated with their locations in images, text descriptions and speech descriptions. This makes the datasets ideal for multi-modality learning. The approach is developed by carefully taking down ORSpoken problem into three sub-problems and introducing task-specific vision-language interactions at the corresponding levels. Experiments show that our method outperforms competing methods consistently and significantly. The approach is also evaluated in the presence of audio noise, showing the efficacy of the proposed vision-language interaction methods in counteracting background noise.
[ { "version": "v1", "created": "Fri, 10 Nov 2017 13:04:55 GMT" }, { "version": "v2", "created": "Tue, 5 Dec 2017 15:12:24 GMT" } ]
2017-12-06T00:00:00
[ [ "Vasudevan", "Arun Balajee", "" ], [ "Dai", "Dengxin", "" ], [ "Van Gool", "Luc", "" ] ]
new_dataset
0.999075
1712.00547
Tim Miller
Tim Miller, Piers Howe, Liz Sonenberg
Explainable AI: Beware of Inmates Running the Asylum Or: How I Learnt to Stop Worrying and Love the Social and Behavioural Sciences
IJCAI 2017 Workshop on Explainable Artificial Intelligence (XAI)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In his seminal book `The Inmates are Running the Asylum: Why High-Tech Products Drive Us Crazy And How To Restore The Sanity' [2004, Sams Indianapolis, IN, USA], Alan Cooper argues that a major reason why software is often poorly designed (from a user perspective) is that programmers are in charge of design decisions, rather than interaction designers. As a result, programmers design software for themselves, rather than for their target audience, a phenomenon he refers to as the `inmates running the asylum'. This paper argues that explainable AI risks a similar fate. While the re-emergence of explainable AI is positive, this paper argues most of us as AI researchers are building explanatory agents for ourselves, rather than for the intended users. But explainable AI is more likely to succeed if researchers and practitioners understand, adopt, implement, and improve models from the vast and valuable bodies of research in philosophy, psychology, and cognitive science, and if evaluation of these models is focused more on people than on technology. From a light scan of literature, we demonstrate that there is considerable scope to infuse more results from the social and behavioural sciences into explainable AI, and present some key results from these fields that are relevant to explainable AI.
[ { "version": "v1", "created": "Sat, 2 Dec 2017 04:21:14 GMT" }, { "version": "v2", "created": "Tue, 5 Dec 2017 04:23:25 GMT" } ]
2017-12-06T00:00:00
[ [ "Miller", "Tim", "" ], [ "Howe", "Piers", "" ], [ "Sonenberg", "Liz", "" ] ]
new_dataset
0.999594
1712.01021
Florian Glaser
Florian Glaser and Stefan Mach and Abbas Rahimi and Frank K. G\"urkaynak and Qiuting Huang and Luca Benini
An 826 MOPS, 210 uW/MHz Unum ALU in 65 nm
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To overcome the limitations of conventional floating-point number formats, an interval arithmetic and variable-width storage format called universal number (unum) has been recently introduced. This paper presents the first (to the best of our knowledge) silicon implementation measurements of an application-specific integrated circuit (ASIC) for unum floating-point arithmetic. The designed chip includes a 128-bit wide unum arithmetic unit to execute additions and subtractions, while also supporting lossless (for intermediate results) and lossy (for external data movements) compression units to exploit the memory usage reduction potential of the unum format. Our chip, fabricated in a 65 nm CMOS process, achieves a maximum clock frequency of 413 MHz at 1.2 V with an average measured power of 210 uW/MHz.
[ { "version": "v1", "created": "Mon, 4 Dec 2017 11:43:58 GMT" }, { "version": "v2", "created": "Tue, 5 Dec 2017 01:45:29 GMT" } ]
2017-12-06T00:00:00
[ [ "Glaser", "Florian", "" ], [ "Mach", "Stefan", "" ], [ "Rahimi", "Abbas", "" ], [ "Gürkaynak", "Frank K.", "" ], [ "Huang", "Qiuting", "" ], [ "Benini", "Luca", "" ] ]
new_dataset
0.999287
1712.01359
Jae Shin Yoon
Jae Shin Yoon, Ziwei Li, Hyun Soo Park
3D Semantic Trajectory Reconstruction from 3D Pixel Continuum
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a method to reconstruct dense semantic trajectory stream of human interactions in 3D from synchronized multiple videos. The interactions inherently introduce self-occlusion and illumination/appearance/shape changes, resulting in highly fragmented trajectory reconstruction with noisy and coarse semantic labels. Our conjecture is that among many views, there exists a set of views that can confidently recognize the visual semantic label of a 3D trajectory. We introduce a new representation called 3D semantic map---a probability distribution over the semantic labels per trajectory. We construct the 3D semantic map by reasoning about visibility and 2D recognition confidence based on view-pooling, i.e., finding the view that best represents the semantics of the trajectory. Using the 3D semantic map, we precisely infer all trajectory labels jointly by considering the affinity between long range trajectories via estimating their local rigid transformations. This inference quantitatively outperforms the baseline approaches in terms of predictive validity, representation robustness, and affinity effectiveness. We demonstrate that our algorithm can robustly compute the semantic labels of a large scale trajectory set involving real-world human interactions with object, scenes, and people.
[ { "version": "v1", "created": "Mon, 4 Dec 2017 21:03:12 GMT" } ]
2017-12-06T00:00:00
[ [ "Yoon", "Jae Shin", "" ], [ "Li", "Ziwei", "" ], [ "Park", "Hyun Soo", "" ] ]
new_dataset
0.964131
1712.01411
Ian Stewart
Ian Stewart and Stevie Chancellor and Munmun De Choudhury and Jacob Eisenstein
#anorexia, #anarexia, #anarexyia: Characterizing Online Community Practices with Orthographic Variation
null
null
null
null
cs.CL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distinctive linguistic practices help communities build solidarity and differentiate themselves from outsiders. In an online community, one such practice is variation in orthography, which includes spelling, punctuation, and capitalization. Using a dataset of over two million Instagram posts, we investigate orthographic variation in a community that shares pro-eating disorder (pro-ED) content. We find that not only does orthographic variation grow more frequent over time, it also becomes more profound or deep, with variants becoming increasingly distant from the original: as, for example, #anarexyia is more distant than #anarexia from the original spelling #anorexia. These changes are driven by newcomers, who adopt the most extreme linguistic practices as they enter the community. Moreover, this behavior correlates with engagement: the newcomers who adopt deeper orthographic variants tend to remain active for longer in the community, and the posts that contain deeper variation receive more positive feedback in the form of "likes." Previous work has linked community membership change with language change, and our work casts this connection in a new light, with newcomers driving an evolving practice, rather than adapting to it. We also demonstrate the utility of orthographic variation as a new lens to study sociolinguistic change in online communities, particularly when the change results from an exogenous force such as a content ban.
[ { "version": "v1", "created": "Mon, 4 Dec 2017 23:27:11 GMT" } ]
2017-12-06T00:00:00
[ [ "Stewart", "Ian", "" ], [ "Chancellor", "Stevie", "" ], [ "De Choudhury", "Munmun", "" ], [ "Eisenstein", "Jacob", "" ] ]
new_dataset
0.99968
1712.01429
Ot\'avio Penatti
Ot\'avio A. B. Penatti and Milton F. S. Santos
Human activity recognition from mobile inertial sensors using recurrence plots
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inertial sensors are present in most mobile devices nowadays and such devices are used by people during most of their daily activities. In this paper, we present an approach for human activity recognition based on inertial sensors by employing recurrence plots (RP) and visual descriptors. The pipeline of the proposed approach is the following: compute RPs from sensor data, compute visual features from RPs and use them in a machine learning protocol. As RPs generate texture visual patterns, we transform the problem of sensor data classification to a problem of texture classification. Experiments for classifying human activities based on accelerometer data showed that the proposed approach obtains the highest accuracies, outperforming time- and frequency-domain features directly extracted from sensor data. The best results are obtained when using RGB RPs, in which each RGB channel corresponds to the RP of an independent accelerometer axis.
[ { "version": "v1", "created": "Tue, 5 Dec 2017 00:49:07 GMT" } ]
2017-12-06T00:00:00
[ [ "Penatti", "Otávio A. B.", "" ], [ "Santos", "Milton F. S.", "" ] ]
new_dataset
0.998318
1712.01464
Parisa Hassanzadeh
Parisa Hassanzadeh, Antonia M. Tulino, Jaime Llorca, Elza Erkip
Broadcast Caching Networks with Two Receivers and Multiple Correlated Sources
in Proceedings of Asilomar Conference on Signals, Systems and Computers, Pacific Grove, California, November 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The correlation among the content distributed across a cache-aided broadcast network can be exploited to reduce the delivery load on the shared wireless link. This paper considers a two-user three-file network with correlated content, and studies its fundamental limits for the worst-case demand. A class of achievable schemes based on a two-step source coding approach is proposed. Library files are first compressed using Gray-Wyner source coding, and then cached and delivered using a combination of correlation-unaware cache-aided coded multicast schemes. The second step is interesting in its own right and considers a multiple-request caching problem, whose solution requires coding in the placement phase. A lower bound on the optimal peak rate-memory trade-off is derived, which is used to evaluate the performance of the proposed scheme. It is shown that for symmetric sources the two-step strategy achieves the lower bound for large cache capacities, and it is within half of the joint entropy of two of the sources conditioned on the third source for all other cache sizes.
[ { "version": "v1", "created": "Tue, 5 Dec 2017 03:32:17 GMT" } ]
2017-12-06T00:00:00
[ [ "Hassanzadeh", "Parisa", "" ], [ "Tulino", "Antonia M.", "" ], [ "Llorca", "Jaime", "" ], [ "Erkip", "Elza", "" ] ]
new_dataset
0.978878
1712.01469
Weisheng Zhong
Weisheng Zhong, Fanglan Chen, Kaiqun Fu, Chang-Tien Lu
SAFEBIKE: A Bike-sharing Route Recommender with Availability Prediction and Safe Routing
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents SAFEBIKE, a novel route recommendation system for bike-sharing service that utilizes station information to infer the number of available bikes in dock and recommend bike routes according to multiple factors such as distance and safety level. The system consists of a station level availability predictor that predicts bikes and docks amount at each station, and an efficient route recommendation service that considers safety and bike/dock availability factors. It targets users who are concerned about route safeness and station availability. We demonstrate the system by utilizing Citi Bike station availability and New York City crime data of Manhattan to show the effectiveness of our approach. Integrated with real-time station availability and historical crime data resources, our proposed system can effectively recommend an optimal bike route and improve the travel experience of bike users.
[ { "version": "v1", "created": "Tue, 5 Dec 2017 03:57:38 GMT" } ]
2017-12-06T00:00:00
[ [ "Zhong", "Weisheng", "" ], [ "Chen", "Fanglan", "" ], [ "Fu", "Kaiqun", "" ], [ "Lu", "Chang-Tien", "" ] ]
new_dataset
0.999684
1712.01651
Shun Miao
Shun Miao, Sebastien Piat, Peter Fischer, Ahmet Tuysuzoglu, Philip Mewes, Tommaso Mansi, Rui Liao
Dilated FCN for Multi-Agent 2D/3D Medical Image Registration
AAAI 2018
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
2D/3D image registration to align a 3D volume and 2D X-ray images is a challenging problem due to its ill-posed nature and various artifacts presented in 2D X-ray images. In this paper, we propose a multi-agent system with an auto attention mechanism for robust and efficient 2D/3D image registration. Specifically, an individual agent is trained with dilated Fully Convolutional Network (FCN) to perform registration in a Markov Decision Process (MDP) by observing a local region, and the final action is then taken based on the proposals from multiple agents and weighted by their corresponding confidence levels. The contributions of this paper are threefold. First, we formulate 2D/3D registration as a MDP with observations, actions, and rewards properly defined with respect to X-ray imaging systems. Second, to handle various artifacts in 2D X-ray images, multiple local agents are employed efficiently via FCN-based structures, and an auto attention mechanism is proposed to favor the proposals from regions with more reliable visual cues. Third, a dilated FCN-based training mechanism is proposed to significantly reduce the Degree of Freedom in the simulation of registration environment, and drastically improve training efficiency by an order of magnitude compared to standard CNN-based training method. We demonstrate that the proposed method achieves high robustness on both spine cone beam Computed Tomography data with a low signal-to-noise ratio and data from minimally invasive spine surgery where severe image artifacts and occlusions are presented due to metal screws and guide wires, outperforming other state-of-the-art methods (single agent-based and optimization-based) by a large margin.
[ { "version": "v1", "created": "Wed, 22 Nov 2017 03:22:17 GMT" } ]
2017-12-06T00:00:00
[ [ "Miao", "Shun", "" ], [ "Piat", "Sebastien", "" ], [ "Fischer", "Peter", "" ], [ "Tuysuzoglu", "Ahmet", "" ], [ "Mewes", "Philip", "" ], [ "Mansi", "Tommaso", "" ], [ "Liao", "Rui", "" ] ]
new_dataset
0.999569
1712.01700
Wellington Pinheiro dos Santos
Wellington Pinheiro dos Santos, Ricardo Emmanuel de Souza, Ascendino Fl\'avio Dias e Silva, Pl\'inio Batista dos Santos Filho
Avalia\c{c}\~ao da doen\c{c}a de Alzheimer pela an\'alise multiespectral de imagens DW-MR por redes RBF como alternativa aos mapas ADC
in Portuguese
Learning and Nonlinear Models, v. 4, p. 43-53, 2008
null
null
cs.CV eess.IV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Alzheimer's disease is the most common cause of dementia, yet difficult to accurately diagnose without the use of invasive techniques, particularly at the beginning of the disease. This work addresses the classification and analysis of multispectral synthetic images composed by diffusion-weighted magnetic resonance brain volumes for evaluation of the area of cerebrospinal fluid and its correlation with the progression of Alzheimer's disease. A 1.5 T MR imaging system was used to acquire all the images presented. The classification methods are based on multilayer perceptrons and classifiers of radial basis function networks. It is assumed that the classes of interest can be separated by hyperquadrics. A polynomial network of degree 2 is used to classify the original volumes, generating a ground-truth volume. The classification results are used to improve the usual analysis by the map of apparent diffusion coefficients.
[ { "version": "v1", "created": "Sun, 3 Dec 2017 19:02:00 GMT" } ]
2017-12-06T00:00:00
[ [ "Santos", "Wellington Pinheiro dos", "" ], [ "de Souza", "Ricardo Emmanuel", "" ], [ "Silva", "Ascendino Flávio Dias e", "" ], [ "Filho", "Plínio Batista dos Santos", "" ] ]
new_dataset
0.998185
1712.01735
Qingzhi Liu
Qingzhi Liu, Wieger IJntema, Anass Drif, Przemys{\l}aw Pawe{\l}czak, Marco Zuniga
WiPLoc: Perpetual Indoor Localization with RF Wireless Power Transfer
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Indoor localization is a cornerstone of mobile services. Until now most of the research effort has focused on achieving sub-meter localization accuracy because many mobile applications depend on precise localization measurements. In some scenarios, however, it is required to trade location accuracy for system maintainability. For example, in large-scale deployments of indoor networks, such as item-monitoring in smart buildings, attaining room-level localization accuracy may be sufficient, but replacing the batteries of the devices used for localization could lead to high operational costs. As indoor localization systems grow in popularity it will be important to provide them with full energy autonomy. To tackle this problem we propose WiPLoc: an indoor localization system aimed at operating perpetually without batteries. Our contributions are twofold. First, we propose a novel localization method that exploits capture effect and orthogonal codes to operate at energy levels that are low enough to operate within the energy budget provided by long-range wireless power transmission. Second, we implement WiPLoc using off-the-shelf components and test it extensively in a laboratory environment. Our test results show that with WiPLoc one wireless charger per (16 m$^{\text{2}}$) room can enable perpetual lifetime operation of mobile objects requiring localization with an average accuracy of almost 90%.
[ { "version": "v1", "created": "Tue, 5 Dec 2017 16:19:23 GMT" } ]
2017-12-06T00:00:00
[ [ "Liu", "Qingzhi", "" ], [ "IJntema", "Wieger", "" ], [ "Drif", "Anass", "" ], [ "Pawełczak", "Przemysław", "" ], [ "Zuniga", "Marco", "" ] ]
new_dataset
0.957797
1712.01794
Svetlana Kiritchenko
Svetlana Kiritchenko and Saif M. Mohammad
The Effect of Negators, Modals, and Degree Adverbs on Sentiment Composition
In Proceedings of the 7th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis (WASSA), San Diego, California, 2016
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Negators, modals, and degree adverbs can significantly affect the sentiment of the words they modify. Often, their impact is modeled with simple heuristics; although, recent work has shown that such heuristics do not capture the true sentiment of multi-word phrases. We created a dataset of phrases that include various negators, modals, and degree adverbs, as well as their combinations. Both the phrases and their constituent content words were annotated with real-valued scores of sentiment association. Using phrasal terms in the created dataset, we analyze the impact of individual modifiers and the average effect of the groups of modifiers on overall sentiment. We find that the effect of modifiers varies substantially among the members of the same group. Furthermore, each individual modifier can affect sentiment words in different ways. Therefore, solutions based on statistical learning seem more promising than fixed hand-crafted rules on the task of automatic sentiment prediction.
[ { "version": "v1", "created": "Tue, 5 Dec 2017 18:17:43 GMT" } ]
2017-12-06T00:00:00
[ [ "Kiritchenko", "Svetlana", "" ], [ "Mohammad", "Saif M.", "" ] ]
new_dataset
0.994231
1612.01352
Jincheng Dai
Kai Niu, Jincheng Dai, Kai Chen, Jiaru Lin, Q. T. Zhang and Athanasios V. Vasilakos
Rate-Compatible Punctured Polar Codes: Optimal Construction Based on Polar Spectra
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes are the first class of constructive channel codes achieving the symmetric capacity of the binary-input discrete memoryless channels. But the corresponding code length is limited to the power of two. In this paper, we establish a systematic framework to design the rate-compatible punctured polar (RCPP) codes with arbitrary code length. A new theoretic tool, called polar spectra, is proposed to count the number of paths on the code tree with the same number of zeros or ones respectively. Furthermore, a spectrum distance SD0 (SD1) and a joint spectrum distance (JSD) are presented as performance criteria to optimize the puncturing tables. For the capacity-zero puncturing mode (punctured bits are unknown to the decoder), we propose a quasi-uniform puncturing algorithm, analyze the number of equivalent puncturings and prove that this scheme can maximize SD1 and JSD. Similarly, for the capacity-one mode (punctured bits are known to the decoder), we also devise a reversal quasi-uniform puncturing scheme and prove that it has the maximum SD0 and JSD. Both schemes have a universal puncturing table without any exhausted search. These optimal RCPP codes outperform the performance of turbo codes in LTE wireless communication systems.
[ { "version": "v1", "created": "Mon, 5 Dec 2016 13:48:39 GMT" }, { "version": "v2", "created": "Sun, 3 Dec 2017 02:46:35 GMT" } ]
2017-12-05T00:00:00
[ [ "Niu", "Kai", "" ], [ "Dai", "Jincheng", "" ], [ "Chen", "Kai", "" ], [ "Lin", "Jiaru", "" ], [ "Zhang", "Q. T.", "" ], [ "Vasilakos", "Athanasios V.", "" ] ]
new_dataset
0.997434
1701.06188
Seyyed Mohammadreza Azimi
Seyyed Mohammadreza Azimi, Osvaldo Simeone, Avik Sengupta and Ravi Tandon
Online Edge Caching in Fog-Aided Wireless Network
20 pages, 5 figures, Please see the updated version arXiv:1711.10430
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a Fog Radio Access Network (F-RAN) architecture, edge nodes (ENs), such as base stations, are equipped with limited-capacity caches, as well as with fronthaul links that can support given transmission rates from a cloud processor. Existing information-theoretic analyses of content delivery in F-RANs have focused on offline caching with separate content placement and delivery phases. In contrast, this work considers an online caching set-up, in which the set of popular files is time-varying and both cache replenishment and content delivery can take place in each time slot. The analysis is centered on the characterization of the long-term Normalized Delivery Time (NDT), which captures the temporal dependence of the coding latencies accrued across multiple time slots in the high signal-to- noise ratio regime. Online caching and delivery schemes based on reactive and proactive caching are investigated, and their performance is compared to optimal offline caching schemes both analytically and via numerical results.
[ { "version": "v1", "created": "Sun, 22 Jan 2017 17:09:15 GMT" }, { "version": "v2", "created": "Thu, 26 Jan 2017 06:12:45 GMT" }, { "version": "v3", "created": "Wed, 10 May 2017 02:21:23 GMT" }, { "version": "v4", "created": "Sun, 3 Dec 2017 18:07:23 GMT" } ]
2017-12-05T00:00:00
[ [ "Azimi", "Seyyed Mohammadreza", "" ], [ "Simeone", "Osvaldo", "" ], [ "Sengupta", "Avik", "" ], [ "Tandon", "Ravi", "" ] ]
new_dataset
0.998427
1703.04968
Youcef Maouche
Hongwei Liu, Youcef Maouche
Two-Weight and a Few Weights Trace Codes over $\mathbb{F}_{q}+u\mathbb{F}_{q}$
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $p$ be a prime number, $q=p^s$ for a positive integer $s$. For any positive divisor $e$ of $q-1$, we construct an infinite family codes of size $q^{2m}$ with few Lee-weight. These codes are defined as trace codes over the ring $R=\mathbb{F}_q + u\mathbb{F}_q$, $u^2 = 0$. Using Gauss sums, their Lee weight distributions are provided. When $\gcd(e,m)=1$, we obtain an infinite family of two-weight codes over the finite field $\mathbb{F}_q$ which meet the Griesmer bound. Moreover, when $\gcd(e,m)=2, 3$ or $4$ we construct new infinite family codes with at most five-weight.
[ { "version": "v1", "created": "Wed, 15 Mar 2017 06:50:54 GMT" }, { "version": "v2", "created": "Mon, 4 Dec 2017 07:04:00 GMT" } ]
2017-12-05T00:00:00
[ [ "Liu", "Hongwei", "" ], [ "Maouche", "Youcef", "" ] ]
new_dataset
0.999879
1703.08906
Hongzhi Guo
Hongzhi Guo, Josep Miquel Jornet, Qiaoqiang Gan, and Zhi Sun
Cooperative Raman Spectroscopy for Real-time In Vivo Nano-biosensing
null
IEEE Transactions on NanoBioscience ( Volume: 16, Issue: 7, Oct. 2017 )
10.1109/TNB.2017.2749183
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last few decades, the development of miniature biological sensors that can detect and measure different phenomena at the nanoscale has led to transformative disease diagnosis and treatment techniques. Among others, biofunctional Raman nanoparticles have been utilized in vitro and in vivo for multiplexed diagnosis and detection of different biological agents. However, existing solutions require the use of bulky lasers to excite the nanoparticles and similarly bulky and expensive spectrometers to measure the scattered Raman signals, which limit the practicality and applications of this nano-biosensing technique. In addition, due to the high path loss of the intra-body environment, the received signals are usually very weak, which hampers the accuracy of the measurements. In this paper, the concept of cooperative Raman spectrum reconstruction for real-time in vivo nano-biosensing is presented for the first time. The fundamental idea is to replace the single excitation and measurement points (i.e., the laser and the spectrometer, respectively) by a network of interconnected nano-devices that can simultaneously excite and measure nano-biosensing particles. More specifically, in the proposed system a large number of nanosensors jointly and distributively collect the Raman response of nano-biofunctional nanoparticles (NBPs) traveling through the blood vessels. This paper presents a detailed description of the sensing system and, more importantly, proves its feasibility, by utilizing accurate models of optical signal propagation in intra-body environment and low-complexity estimation algorithms. The numerical results show that with a certain density of NBPs, the reconstructed Raman spectrum can be recovered and utilized to accurately extract the targeting intra-body information.
[ { "version": "v1", "created": "Mon, 27 Mar 2017 02:36:19 GMT" } ]
2017-12-05T00:00:00
[ [ "Guo", "Hongzhi", "" ], [ "Jornet", "Josep Miquel", "" ], [ "Gan", "Qiaoqiang", "" ], [ "Sun", "Zhi", "" ] ]
new_dataset
0.996338
1709.06916
Haizhong Zheng
Haizhong Zheng, Minhui Xue, Hao Lu, Shuang Hao, Haojin Zhu, Xiaohui Liang, and Keith Ross
Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Popular User-Review Social Networks (URSNs)---such as Dianping, Yelp, and Amazon---are often the targets of reputation attacks in which fake reviews are posted in order to boost or diminish the ratings of listed products and services. These attacks often emanate from a collection of accounts, called Sybils, which are collectively managed by a group of real users. A new advanced scheme, which we term elite Sybil attacks, recruits organically highly-rated accounts to generate seemingly-trustworthy and realistic-looking reviews. These elite Sybil accounts taken together form a large-scale sparsely-knit Sybil network for which existing Sybil fake-review defense systems are unlikely to succeed. In this paper, we conduct the first study to define, characterize, and detect elite Sybil attacks. We show that contemporary elite Sybil attacks have a hybrid architecture, with the first tier recruiting elite Sybil workers and distributing tasks by Sybil organizers, and with the second tier posting fake reviews for profit by elite Sybil workers. We design ElsieDet, a three-stage Sybil detection scheme, which first separates out suspicious groups of users, then identifies the campaign windows, and finally identifies elite Sybil users participating in the campaigns. We perform a large-scale empirical study on ten million reviews from Dianping, by far the most popular URSN service in China. Our results show that reviews from elite Sybil users are more spread out temporally, craft more convincing reviews, and have higher filter bypass rates. We also measure the impact of Sybil campaigns on various industries (such as cinemas, hotels, restaurants) as well as chain stores, and demonstrate that monitoring elite Sybil users over time can provide valuable early alerts against Sybil campaigns.
[ { "version": "v1", "created": "Wed, 20 Sep 2017 15:01:36 GMT" }, { "version": "v2", "created": "Mon, 4 Dec 2017 13:20:55 GMT" } ]
2017-12-05T00:00:00
[ [ "Zheng", "Haizhong", "" ], [ "Xue", "Minhui", "" ], [ "Lu", "Hao", "" ], [ "Hao", "Shuang", "" ], [ "Zhu", "Haojin", "" ], [ "Liang", "Xiaohui", "" ], [ "Ross", "Keith", "" ] ]
new_dataset
0.991378
1710.10088
Rong Kang
Rong Kang, Chen Wang, Peng Wang, Yuting Ding, Jianmin Wang
Fine-grained Pattern Matching Over Streaming Time Series
14 pages, 14 figures, 29 conference
null
null
null
cs.CV cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pattern matching of streaming time series with lower latency under limited computing resource comes to a critical problem, especially as the growth of Industry 4.0 and Industry Internet of Things. However, against traditional single pattern matching problem, a pattern may contain multiple segments representing different statistical properties or physical meanings for more precise and expressive matching in real world. Hence, we formulate a new problem, called "fine-grained pattern matching", which allows users to specify varied granularities of matching deviation to different segments of a given pattern, and fuzzy regions for adaptive breakpoints determination between consecutive segments. In this paper, we propose a novel two-phase approach. In the pruning phase, we introduce Equal-Length Block (ELB) representation together with Block-Skipping Pruning (BSP) policy, which guarantees low cost feature calculation, effective pruning and no false dismissals. In the post-processing phase, a delta-function is proposed to enable us to conduct exact matching in linear complexity. Extensive experiments are conducted to evaluate on synthetic and real-world datasets, which illustrates that our algorithm outperforms the brute-force method and MSM, a multi-step filter mechanism over the multi-scaled representation.
[ { "version": "v1", "created": "Fri, 27 Oct 2017 11:45:14 GMT" }, { "version": "v2", "created": "Fri, 3 Nov 2017 02:51:43 GMT" }, { "version": "v3", "created": "Fri, 1 Dec 2017 23:45:48 GMT" } ]
2017-12-05T00:00:00
[ [ "Kang", "Rong", "" ], [ "Wang", "Chen", "" ], [ "Wang", "Peng", "" ], [ "Ding", "Yuting", "" ], [ "Wang", "Jianmin", "" ] ]
new_dataset
0.979972
1711.05017
Morad Behandish
Morad Behandish and Horea T. Ilies
Haptic Assembly Using Skeletal Densities and Fourier Transforms
A shorter version was presented in ASME Computers and Information in Engineering Conference (CIE'2015) (Best Paper Award)
ASME Transactions, Journal of ASME Transactions, Journal of Computing and Information Science in Engineering, 16(2), p.021002, 2016
10.1115/1.4032696
CDL-TR-16-01
cs.HC cs.CG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Haptic-assisted virtual assembly and prototyping has seen significant attention over the past two decades. However, in spite of the appealing prospects, its adoption has been slower than expected. We identify the main roadblocks as the inherent geometric complexities faced when assembling objects of arbitrary shape, and the computation time limitation imposed by the notorious 1 kHz haptic refresh rate. We addressed the first problem in a recent work by introducing a generic energy model for geometric guidance and constraints between features of arbitrary shape. In the present work, we address the second challenge by leveraging Fourier transforms to compute the constraint forces and torques. Our new concept of 'geometric energy' field is computed automatically from a cross-correlation of 'skeletal densities' in the frequency domain, and serves as a generalization of the manually specified virtual fixtures or heuristically identified mating constraints proposed in the literature. The formulation of the energy field as a convolution enables efficient computation using fast Fourier transforms (FFT) on the graphics processing unit (GPU). We show that our method is effective for low-clearance assembly of objects of arbitrary geometric and syntactic complexity.
[ { "version": "v1", "created": "Tue, 14 Nov 2017 09:30:56 GMT" } ]
2017-12-05T00:00:00
[ [ "Behandish", "Morad", "" ], [ "Ilies", "Horea T.", "" ] ]
new_dataset
0.980617
1711.08819
Piotr Mirowski
Kory Wallace Mathewson and Piotr Mirowski
Improvised Comedy as a Turing Test
4 pages, 3 figures. Presented at 31st Conference on Neural Information Processing Systems 2017. Workshop on Machine Learning for Creativity and Design
null
null
null
cs.AI
http://creativecommons.org/licenses/by/4.0/
The best improvisational theatre actors can make any scene partner, of any skill level or ability, appear talented and proficient in the art form, and thus "make them shine". To challenge this improvisational paradigm, we built an artificial intelligence (AI) trained to perform live shows alongside human actors for human audiences. Over the course of 30 performances to a combined audience of almost 3000 people, we have refined theatrical games which involve combinations of human and (at times, adversarial) AI actors. We have developed specific scene structures to include audience participants in interesting ways. Finally, we developed a complete show structure that submitted the audience to a Turing test and observed their suspension of disbelief, which we believe is key for human/non-human theatre co-creation.
[ { "version": "v1", "created": "Thu, 23 Nov 2017 20:13:34 GMT" }, { "version": "v2", "created": "Sat, 2 Dec 2017 00:25:58 GMT" } ]
2017-12-05T00:00:00
[ [ "Mathewson", "Kory Wallace", "" ], [ "Mirowski", "Piotr", "" ] ]
new_dataset
0.998706
1711.09313
Jameson Merkow
Jameson Merkow and Robert Lufkin and Kim Nguyen and Stefano Soatto and Zhuowen Tu and Andrea Vedaldi
DeepRadiologyNet: Radiologist Level Pathology Detection in CT Head Images
22 pages with references, 6 figures, 2 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a system to automatically filter clinically significant findings from computerized tomography (CT) head scans, operating at performance levels exceeding that of practicing radiologists. Our system, named DeepRadiologyNet, builds on top of deep convolutional neural networks (CNNs) trained using approximately 3.5 million CT head images gathered from over 24,000 studies taken from January 1, 2015 to August 31, 2015 and January 1, 2016 to April 30 2016 in over 80 clinical sites. For our initial system, we identified 30 phenomenological traits to be recognized in the CT scans. To test the system, we designed a clinical trial using over 4.8 million CT head images (29,925 studies), completely disjoint from the training and validation set, interpreted by 35 US Board Certified radiologists with specialized CT head experience. We measured clinically significant error rates to ascertain whether the performance of DeepRadiologyNet was comparable to or better than that of US Board Certified radiologists. DeepRadiologyNet achieved a clinically significant miss rate of 0.0367% on automatically selected high-confidence studies. Thus, DeepRadiologyNet enables significant reduction in the workload of human radiologists by automatically filtering studies and reporting on the high-confidence ones at an operating point well below the literal error rate for US Board Certified radiologists, estimated at 0.82%.
[ { "version": "v1", "created": "Sun, 26 Nov 2017 00:30:45 GMT" }, { "version": "v2", "created": "Wed, 29 Nov 2017 18:17:29 GMT" }, { "version": "v3", "created": "Sat, 2 Dec 2017 19:14:49 GMT" } ]
2017-12-05T00:00:00
[ [ "Merkow", "Jameson", "" ], [ "Lufkin", "Robert", "" ], [ "Nguyen", "Kim", "" ], [ "Soatto", "Stefano", "" ], [ "Tu", "Zhuowen", "" ], [ "Vedaldi", "Andrea", "" ] ]
new_dataset
0.961565
1712.00238
Morad Behandish
Morad Behandish and Horea T. Ilies
Shape Complementarity Analysis for Objects of Arbitrary Shape
Technical Report, University of Connecticut, 2014
null
null
CDL-TR-14-01
cs.CG cs.CV cs.GR cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The basic problem of shape complementarity analysis appears fundamental to applications as diverse as mechanical design, assembly automation, robot motion planning, micro- and nano-fabrication, protein-ligand binding, and rational drug design. However, the current challenge lies in the lack of a general mathematical formulation that applies to objects of arbitrary shape. We propose that a measure of shape complementarity can be obtained from the extent of approximate overlap between shape skeletons. A space-continuous implicit generalization of the skeleton, called the skeletal density function (SDF) is defined over the Euclidean space that contains the individual assembly partners. The SDF shape descriptors capture the essential features that are relevant to proper contact alignment, and are considerably more robust than the conventional explicit skeletal representations. We express the shape complementarity score as a convolution of the individual SDFs. The problem then breaks down to a global optimization of the score over the configuration space of spatial relations, which can be efficiently implemented using fast Fourier transforms (FFTs) on nonequispaced samples. We demonstrate the effectiveness of the scoring approach for several examples from 2D peg-in-hole alignment to more complex 3D examples in mechanical assembly and protein docking. We show that the proposed method is reliable, inherently robust against small perturbations, and effective in steering gradient-based optimization.
[ { "version": "v1", "created": "Fri, 1 Dec 2017 09:07:14 GMT" } ]
2017-12-05T00:00:00
[ [ "Behandish", "Morad", "" ], [ "Ilies", "Horea T.", "" ] ]
new_dataset
0.995557
1712.00686
Xiangying Chen
Xiangying Chen
Digraph Polynomials for Counting Cycles and Paths
18 pages, 5 figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many polynomial invariants are defined on graphs for encoding the combinatorial information and researching them algebraically. In this paper, we introduce the cycle polynomial and the path polynomial of directed graphs for counting cycles and paths, respectively. They satisfy recurrence relations with respect to elementary edge or vertex operations. They are related to other polynomials and can also be generalized to the bivariate cycle polynomial, the bivariate path polynomial and the trivariate cycle-path polynomial. And a most general digraph polynomial satisfying such a linear recurrence relation is recursively defined and shown to be co-reducible to the trivariate cycle-path polynomial. We also give an explicit expression of this polynomial.
[ { "version": "v1", "created": "Sun, 3 Dec 2017 00:26:25 GMT" } ]
2017-12-05T00:00:00
[ [ "Chen", "Xiangying", "" ] ]
new_dataset
0.981971
1712.00714
Nader Akoury
Nader Akoury and Anh Nguyen
Spatial PixelCNN: Generating Images from Patches
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose Spatial PixelCNN, a conditional autoregressive model that generates images from small patches. By conditioning on a grid of pixel coordinates and global features extracted from a Variational Autoencoder (VAE), we are able to train on patches of images, and reproduce the full-sized image. We show that it not only allows for generating high quality samples at the same resolution as the underlying dataset, but is also capable of upscaling images to arbitrary resolutions (tested at resolutions up to $50\times$) on the MNIST dataset. Compared to a PixelCNN++ baseline, Spatial PixelCNN quantitatively and qualitatively achieves similar performance on the MNIST dataset.
[ { "version": "v1", "created": "Sun, 3 Dec 2017 06:02:23 GMT" } ]
2017-12-05T00:00:00
[ [ "Akoury", "Nader", "" ], [ "Nguyen", "Anh", "" ] ]
new_dataset
0.999659
1712.00735
Takeshi Koshiba
Takeshi Koshiba
Fourier-based Function Secret Sharing with General Access Structure
12 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Function secret sharing (FSS) scheme is a mechanism that calculates a function f(x) for x in {0,1}^n which is shared among p parties, by using distributed functions f_i:{0,1}^n -> G, where G is an Abelian group, while the function f:{0,1}^n -> G is kept secret to the parties. Ohsawa et al. in 2017 observed that any function f can be described as a linear combination of the basis functions by regarding the function space as a vector space of dimension 2^n and gave new FSS schemes based on the Fourier basis. All existing FSS schemes are of (p,p)-threshold type. That is, to compute f(x), we have to collect f_i(x) for all the distributed functions. In this paper, as in the secret sharing schemes, we consider FSS schemes with any general access structure. To do this, we observe that Fourier-based FSS schemes by Ohsawa et al. are compatible with linear secret sharing scheme. By incorporating the techniques of linear secret sharing with any general access structure into the Fourier-based FSS schemes, we show Fourier-based FSS schemes with any general access structure.
[ { "version": "v1", "created": "Sun, 3 Dec 2017 09:34:31 GMT" } ]
2017-12-05T00:00:00
[ [ "Koshiba", "Takeshi", "" ] ]
new_dataset
0.983749
1712.00776
Petar Bojovi\'c D.
Petar D. Bojovic, K. Savic, A. Smiljanic
Multikast rutiranje open-source platformom - XORP
in Serbian. Published on e-RAF Journal on Computing (e-RAF JoC), 2010
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Integration of a software router into embedded systems is obtained possibility of the most modern routers, at a much more affordable price. Transfer services TV and radio signals over the IP network are only activated by using multicast 1 protocol for routing. Multicast routing 2 is currently a feature of only costly hardware solutions. The XORP open-source platform offers multicast routing through a software router, with the ability to integrate into cheap embedded platforms. ---- Integracijom softverskog rutera u embedded sisteme dobija se mogu\'cnost najsavremenijih rutera, po znatno pristupa\v{c}nijoj ceni. Servisi prenosa TV i radio signala preko IP mre\v{z}e, za\v{z}ivljavaju tek kori\v{s}\'cenjem multikast 1 protokola za rutiranje. Multikast rutiranje 2 je trenutno funkcija samo skupih hardverskih re\v{s}enja. XORP open-source platforma nudi multikast rutiranje kroz softverski ruter, sa mogu\'cno\v{s}\'cu integracije u jeftine embedded platforme.
[ { "version": "v1", "created": "Sun, 3 Dec 2017 14:45:10 GMT" } ]
2017-12-05T00:00:00
[ [ "Bojovic", "Petar D.", "" ], [ "Savic", "K.", "" ], [ "Smiljanic", "A.", "" ] ]
new_dataset
0.999268
1712.00983
Zhen Mei
Zhen Mei, Bin Dai, Martin Johnston and Rolando Carrasco
Design of Polar Codes with Single and Multi-Carrier Modulation on Impulsive Noise Channels using Density Evolution
5 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, density evolution-based construction methods to design good polar codes on impulsive noise channels for single-carrier and multi-carrier systems are proposed and evaluated. For a single-carrier system, the tight bound of the block error probability (BLEP) is derived by applying density evolution and the performance of the proposed construction methods are compared. For the multi-carrier system employing orthogonal frequency-division multiplexing, the accurate BLEP estimation is not feasible so a tight lower bound on the BLEP for polar codes is derived by assuming the noise on each sub-carrier is Gaussian. The results show that the lower bound becomes tighter as the number of carriers increases.
[ { "version": "v1", "created": "Mon, 4 Dec 2017 10:05:09 GMT" } ]
2017-12-05T00:00:00
[ [ "Mei", "Zhen", "" ], [ "Dai", "Bin", "" ], [ "Johnston", "Martin", "" ], [ "Carrasco", "Rolando", "" ] ]
new_dataset
0.991678
1712.01059
Qizheng He
Qizheng He, Jianan Wu, Gang Yu, Chi Zhang
SOT for MOT
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a robust tracker to solve the multiple object tracking (MOT) problem, under the framework of tracking-by-detection. As the first contribution, we innovatively combine single object tracking (SOT) algorithms with multiple object tracking algorithms, and our results show that SOT is a general way to strongly reduce the number of false negatives, regardless of the quality of detection. Another contribution is that we show with a deep learning based appearance model, it is easy to associate detections of the same object efficiently and also with high accuracy. This appearance model plays an important role in our MOT algorithm to correctly associate detections into long trajectories, and also in our SOT algorithm to discover new detections mistakenly missed by the detector. The deep neural network based model ensures the robustness of our tracking algorithm, which can perform data association in a wide variety of scenes. We ran comprehensive experiments on a large-scale and challenging dataset, the MOT16 benchmark, and results showed that our tracker achieved state-of-the-art performance based on both public and private detections.
[ { "version": "v1", "created": "Mon, 4 Dec 2017 13:22:31 GMT" } ]
2017-12-05T00:00:00
[ [ "He", "Qizheng", "" ], [ "Wu", "Jianan", "" ], [ "Yu", "Gang", "" ], [ "Zhang", "Chi", "" ] ]
new_dataset
0.966911
1712.01111
Chen Chen
Rui Hou, Chen Chen, Mubarak Shah
An End-to-end 3D Convolutional Neural Network for Action Detection and Segmentation in Videos
arXiv admin note: substantial text overlap with arXiv:1703.10664
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an end-to-end 3D CNN for action detection and segmentation in videos. The proposed architecture is a unified deep network that is able to recognize and localize action based on 3D convolution features. A video is first divided into equal length clips and next for each clip a set of tube proposals are generated based on 3D CNN features. Finally, the tube proposals of different clips are linked together and spatio-temporal action detection is performed using these linked video proposals. This top-down action detection approach explicitly relies on a set of good tube proposals to perform well and training the bounding box regression usually requires a large number of annotated samples. To remedy this, we further extend the 3D CNN to an encoder-decoder structure and formulate the localization problem as action segmentation. The foreground regions (i.e. action regions) for each frame are segmented first then the segmented foreground maps are used to generate the bounding boxes. This bottom-up approach effectively avoids tube proposal generation by leveraging the pixel-wise annotations of segmentation. The segmentation framework also can be readily applied to a general problem of video object segmentation. Extensive experiments on several video datasets demonstrate the superior performance of our approach for action detection and video object segmentation compared to the state-of-the-arts.
[ { "version": "v1", "created": "Thu, 30 Nov 2017 19:26:49 GMT" } ]
2017-12-05T00:00:00
[ [ "Hou", "Rui", "" ], [ "Chen", "Chen", "" ], [ "Shah", "Mubarak", "" ] ]
new_dataset
0.972141
1712.01235
Abhinav Jauhri
Abhinav Jauhri, Carlee Joe-Wong, John Paul Shen
On the Real-time Vehicle Placement Problem
Presented at NIPS Workshop on Machine Learning for Intelligent Transportation Systems, 2017
null
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by ride-sharing platforms' efforts to reduce their riders' wait times for a vehicle, this paper introduces a novel problem of placing vehicles to fulfill real-time pickup requests in a spatially and temporally changing environment. The real-time nature of this problem makes it fundamentally different from other placement and scheduling problems, as it requires not only real-time placement decisions but also handling real-time request dynamics, which are influenced by human mobility patterns. We use a dataset of ten million ride requests from four major U.S. cities to show that the requests exhibit significant self-similarity. We then propose distributed online learning algorithms for the real-time vehicle placement problem and bound their expected performance under this observed self-similarity.
[ { "version": "v1", "created": "Mon, 4 Dec 2017 18:21:38 GMT" } ]
2017-12-05T00:00:00
[ [ "Jauhri", "Abhinav", "" ], [ "Joe-Wong", "Carlee", "" ], [ "Shen", "John Paul", "" ] ]
new_dataset
0.999637
1608.00059
Shervin Minaee
Shervin Minaee, Amirali Abdolrashidi and Yao Wang
Face Recognition Using Scattering Convolutional Network
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Face recognition has been an active research area in the past few decades. In general, face recognition can be very challenging due to variations in viewpoint, illumination, facial expression, etc. Therefore it is essential to extract features which are invariant to some or all of these variations. Here a new image representation, called scattering transform/network, has been used to extract features from faces. The scattering transform is a kind of convolutional network which provides a powerful multi-layer representation for signals. After extraction of scattering features, PCA is applied to reduce the dimensionality of the data and then a multi-class support vector machine is used to perform recognition. The proposed algorithm has been tested on three face datasets and achieved a very high recognition rate.
[ { "version": "v1", "created": "Sat, 30 Jul 2016 01:39:04 GMT" }, { "version": "v2", "created": "Thu, 30 Nov 2017 22:38:09 GMT" } ]
2017-12-04T00:00:00
[ [ "Minaee", "Shervin", "" ], [ "Abdolrashidi", "Amirali", "" ], [ "Wang", "Yao", "" ] ]
new_dataset
0.966889
1608.03445
Thomas Maillart
Thomas Maillart, Mingyi Zhao, Jens Grossklags, and John Chuang
Given Enough Eyeballs, All Bugs Are Shallow? Revisiting Eric Raymond with Bug Bounty Programs
19 pages, 3 figures, 1 table, forthcoming at Journal of Cybersecurity (2017)
Journal of Cybersecurity, 2017
10.1093/cybsec/tyx008
tyx008
cs.CR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bug bounty programs offer a modern platform for organizations to crowdsource their software security and for security researchers to be fairly rewarded for the vulnerabilities they find. Little is known however on the incentives set by bug bounty programs: How they drive new bug discoveries, and how they supposedly improve security through the progressive exhaustion of discoverable vulnerabilities. Here, we recognize that bug bounty programs create tensions, for organizations running them on the one hand, and for security researchers on the other hand. At the level of one bug bounty program, security researchers face a sort of St-Petersburg paradox: The probability of finding additional bugs decays fast, and thus can hardly be matched with a sufficient increase of monetary rewards. Furthermore, bug bounty program managers have an incentive to gather the largest possible crowd to ensure a larger pool of expertise, which in turn increases competition among security researchers. As a result, we find that researchers have high incentives to switch to newly launched programs, for which a reserve of low-hanging fruit vulnerabilities is still available. Our results inform on the technical and economic mechanisms underlying the dynamics of bug bounty program contributions, and may in turn help improve the mechanism design of bug bounty programs that get increasingly adopted by cybersecurity savvy organizations.
[ { "version": "v1", "created": "Thu, 11 Aug 2016 13:00:52 GMT" }, { "version": "v2", "created": "Tue, 22 Aug 2017 13:32:17 GMT" } ]
2017-12-04T00:00:00
[ [ "Maillart", "Thomas", "" ], [ "Zhao", "Mingyi", "" ], [ "Grossklags", "Jens", "" ], [ "Chuang", "John", "" ] ]
new_dataset
0.987157
1702.05812
Andrew Miller
Andrew Miller and Iddo Bentov and Ranjit Kumaresan and Christopher Cordi and Patrick McCorry
Sprites and State Channels: Payment Networks that Go Faster than Lightning
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bitcoin, Ethereum and other blockchain-based cryptocurrencies, as deployed today, cannot scale for wide-spread use. A leading approach for cryptocurrency scaling is a smart contract mechanism called a payment channel which enables two mutually distrustful parties to transact efficiently (and only requires a single transaction in the blockchain to set-up). Payment channels can be linked together to form a payment network, such that payments between any two parties can (usually) be routed through the network along a path that connects them. Crucially, both parties can transact without trusting hops along the route. In this paper, we propose a novel variant of payment channels, called Sprites, that reduces the worst-case "collateral cost" that each hop along the route may incur. The benefits of Sprites are two-fold. 1) In Lightning Network, a payment across a path of $\ell$ channels requires locking up collateral for $\Theta(\ell\Delta)$ time, where $\Delta$ is the time to commit an on-chain transaction. Sprites reduces this cost to $O(\ell + \Delta)$. 2) Unlike prior work, Sprites supports partial withdrawals and deposits, during which the channel can continue to operate without interruption. In evaluating Sprites we make several additional contributions. First, our simulation-based security model is the first formalism to model timing guarantees in payment channels. Our construction is also modular, making use of a generic abstraction from folklore, called the "state channel," which we are the first to formalize. We also provide a simulation framework for payment network protocols, which we use to confirm that the Sprites construction mitigates against throughput-reducing attacks.
[ { "version": "v1", "created": "Sun, 19 Feb 2017 22:29:09 GMT" }, { "version": "v2", "created": "Thu, 30 Nov 2017 22:59:07 GMT" } ]
2017-12-04T00:00:00
[ [ "Miller", "Andrew", "" ], [ "Bentov", "Iddo", "" ], [ "Kumaresan", "Ranjit", "" ], [ "Cordi", "Christopher", "" ], [ "McCorry", "Patrick", "" ] ]
new_dataset
0.999504
1707.06325
Joohyung Lee
Joohyung Lee, Samidh Talsania, Yi Wang
Computing LPMLN Using ASP and MLN Solvers
Paper presented at the 33nd International Conference on Logic Programming (ICLP 2017), Melbourne, Australia, August 28 to September 1, 2017 16 pages, LaTeX, 3 PDF figures (arXiv:YYMM.NNNNN)
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LPMLN is a recent addition to probabilistic logic programming languages. Its main idea is to overcome the rigid nature of the stable model semantics by assigning a weight to each rule in a way similar to Markov Logic is defined. We present two implementations of LPMLN, $\text{LPMLN2ASP}$ and $\text{LPMLN2MLN}$. System $\text{LPMLN2ASP}$ translates LPMLN programs into the input language of answer set solver $\text{CLINGO}$, and using weak constraints and stable model enumeration, it can compute most probable stable models as well as exact conditional and marginal probabilities. System $\text{LPMLN2MLN}$ translates LPMLN programs into the input language of Markov Logic solvers, such as $\text{ALCHEMY}$, $\text{TUFFY}$, and $\text{ROCKIT}$, and allows for performing approximate probabilistic inference on LPMLN programs. We also demonstrate the usefulness of the LPMLN systems for computing other languages, such as ProbLog and Pearl's Causal Models, that are shown to be translatable into LPMLN. (Under consideration for acceptance in TPLP)
[ { "version": "v1", "created": "Wed, 19 Jul 2017 23:38:47 GMT" }, { "version": "v2", "created": "Tue, 25 Jul 2017 20:04:27 GMT" }, { "version": "v3", "created": "Thu, 30 Nov 2017 23:10:25 GMT" } ]
2017-12-04T00:00:00
[ [ "Lee", "Joohyung", "" ], [ "Talsania", "Samidh", "" ], [ "Wang", "Yi", "" ] ]
new_dataset
0.992586
1711.08040
Sachin Mehta
Sachin Mehta, Hannaneh Hajishirzi, and Linda Shapiro
Identifying Most Walkable Direction for Navigation in an Outdoor Environment
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an approach for identifying the most walkable direction for navigation using a hand-held camera. Our approach extracts semantically rich contextual information from the scene using a custom encoder-decoder architecture for semantic segmentation and models the spatial and temporal behavior of objects in the scene using a spatio-temporal graph. The system learns to minimize a cost function over the spatial and temporal object attributes to identify the most walkable direction. We construct a new annotated navigation dataset collected using a hand-held mobile camera in an unconstrained outdoor environment, which includes challenging settings such as highly dynamic scenes, occlusion between objects, and distortions. Our system achieves an accuracy of 84% on predicting a safe direction. We also show that our custom segmentation network is both fast and accurate, achieving mIOU (mean intersection over union) scores of 81 and 44.7 on the PASCAL VOC and the PASCAL Context datasets, respectively, while running at about 21 frames per second.
[ { "version": "v1", "created": "Tue, 21 Nov 2017 21:15:33 GMT" }, { "version": "v2", "created": "Fri, 1 Dec 2017 03:18:52 GMT" } ]
2017-12-04T00:00:00
[ [ "Mehta", "Sachin", "" ], [ "Hajishirzi", "Hannaneh", "" ], [ "Shapiro", "Linda", "" ] ]
new_dataset
0.999261
1711.09368
Siyu Zhou
Siyu Zhou, Weiqiang Zhao, Jiashi Feng, Hanjiang Lai, Yan Pan, Jian Yin, Shuicheng Yan
Personalized and Occupational-aware Age Progression by Generative Adversarial Networks
9 pages, 10 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Face age progression, which aims to predict the future looks, is important for various applications and has been received considerable attentions. Existing methods and datasets are limited in exploring the effects of occupations which may influence the personal appearances. In this paper, we firstly introduce an occupational face aging dataset for studying the influences of occupations on the appearances. It includes five occupations, which enables the development of new algorithms for age progression and facilitate future researches. Second, we propose a new occupational-aware adversarial face aging network, which learns human aging process under different occupations. Two factors are taken into consideration in our aging process: personality-preserving and visually plausible texture change for different occupations. We propose personalized network with personalized loss in deep autoencoder network for keeping personalized facial characteristics, and occupational-aware adversarial network with occupational-aware adversarial loss for obtaining more realistic texture changes. Experimental results well demonstrate the advantages of the proposed method by comparing with other state-of-the-arts age progression methods.
[ { "version": "v1", "created": "Sun, 26 Nov 2017 10:50:56 GMT" }, { "version": "v2", "created": "Fri, 1 Dec 2017 06:58:03 GMT" } ]
2017-12-04T00:00:00
[ [ "Zhou", "Siyu", "" ], [ "Zhao", "Weiqiang", "" ], [ "Feng", "Jiashi", "" ], [ "Lai", "Hanjiang", "" ], [ "Pan", "Yan", "" ], [ "Yin", "Jian", "" ], [ "Yan", "Shuicheng", "" ] ]
new_dataset
0.998267
1711.11543
Abhishek Das
Abhishek Das, Samyak Datta, Georgia Gkioxari, Stefan Lee, Devi Parikh, Dhruv Batra
Embodied Question Answering
20 pages, 13 figures, Webpage: https://embodiedqa.org/
null
null
null
cs.CV cs.AI cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new AI task -- Embodied Question Answering (EmbodiedQA) -- where an agent is spawned at a random location in a 3D environment and asked a question ("What color is the car?"). In order to answer, the agent must first intelligently navigate to explore the environment, gather information through first-person (egocentric) vision, and then answer the question ("orange"). This challenging task requires a range of AI skills -- active perception, language understanding, goal-driven navigation, commonsense reasoning, and grounding of language into actions. In this work, we develop the environments, end-to-end-trained reinforcement learning agents, and evaluation protocols for EmbodiedQA.
[ { "version": "v1", "created": "Thu, 30 Nov 2017 18:06:47 GMT" }, { "version": "v2", "created": "Fri, 1 Dec 2017 16:55:05 GMT" } ]
2017-12-04T00:00:00
[ [ "Das", "Abhishek", "" ], [ "Datta", "Samyak", "" ], [ "Gkioxari", "Georgia", "" ], [ "Lee", "Stefan", "" ], [ "Parikh", "Devi", "" ], [ "Batra", "Dhruv", "" ] ]
new_dataset
0.986444
1712.00049
Shuai Sun
Jiaxin Peng, Shuai Sun, Vikram K. Narayana, Volker J. Sorger, Tarek El-Ghazawi
Integrated Nanophotonics Architecture for Residue Number System Arithmetic
7 pages, 5 figures
null
null
null
cs.ET physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Residue number system (RNS) enables dimensionality reduction of an arithmetic problem by representing a large number as a set of smaller integers, where the number is decomposed by prime number factorization using the moduli as basic functions. These reduced problem sets can then be processed independently and in parallel, thus improving computational efficiency and speed. Here we show an optical RNS hardware representation based on integrated nanophotonics. The digit-wise shifting in RNS arithmetic is expressed as spatial routing of an optical signal in 2x2 hybrid photonic-plasmonic switches. Here the residue is represented by spatially shifting the input waveguides relative to the routers outputs, where the moduli are represented by the number of waveguides. By cascading the photonic 2x2 switches, we design a photonic RNS adder and a multiplier forming an all-to-all sparse directional network. The advantage of this photonic arithmetic processor is the short (10's ps) computational execution time given by the optical propagation delay through the integrated nanophotonic router. Furthermore, we show how photonic processing in-the-network leverages the natural parallelism of optics such as wavelength-division-multiplexing or optical angular momentum in this RNS processor. A key application for photonic RNS is the functional analysis convolution with widespread usage in numerical linear algebra, computer vision, language- image- and signal processing, and neural networks.
[ { "version": "v1", "created": "Thu, 30 Nov 2017 19:46:57 GMT" } ]
2017-12-04T00:00:00
[ [ "Peng", "Jiaxin", "" ], [ "Sun", "Shuai", "" ], [ "Narayana", "Vikram K.", "" ], [ "Sorger", "Volker J.", "" ], [ "El-Ghazawi", "Tarek", "" ] ]
new_dataset
0.963981
1712.00184
Chang-Ryeol Lee
Chang-Ryeol Lee, Kuk-Jin Yoon
Inertial-aided Rolling Shutter Relative Pose Estimation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Relative pose estimation is a fundamental problem in computer vision and it has been studied for conventional global shutter cameras for decades. However, recently, a rolling shutter camera has been widely used due to its low cost imaging capability and, since the rolling shutter camera captures the image line-by-line, the relative pose estimation of a rolling shutter camera is more difficult than that of a global shutter camera. In this paper, we propose to exploit inertial measurements (gravity and angular velocity) for the rolling shutter relative pose estimation problem. The inertial measurements provide information about the partial relative rotation between two views (cameras) and the instantaneous motion that causes the rolling shutter distortion. Based on this information, we simplify the rolling shutter relative pose estimation problem and propose effective methods to solve it. Unlike the previous methods, which require 44 (linear) or 17 (nonlinear) points with the uniform rolling shutter camera model, the proposed methods require at most 9 or 11 points to estimate the relative pose between the rolling shutter cameras. Experimental results on synthetic data and the public PennCOSYVIO dataset show that the proposed methods outperform the existing methods.
[ { "version": "v1", "created": "Fri, 1 Dec 2017 04:16:36 GMT" } ]
2017-12-04T00:00:00
[ [ "Lee", "Chang-Ryeol", "" ], [ "Yoon", "Kuk-Jin", "" ] ]
new_dataset
0.987087
1712.00206
Alessandro De Palma
Alessandro De Palma, Erik Hemberg, Una-May O'Reilly
Distributed Stratified Locality Sensitive Hashing for Critical Event Prediction in the Cloud
Accepted poster at NIPS 2017 Workshop on Machine Learning for Health (https://ml4health.github.io/2017/)
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The availability of massive healthcare data repositories calls for efficient tools for data-driven medicine. We introduce a distributed system for Stratified Locality Sensitive Hashing to perform fast similarity-based prediction on large medical waveform datasets. Our implementation, for an ICU use case, prioritizes latency over throughput and is targeted at a cloud environment. We demonstrate our system on Acute Hypotensive Episode prediction from Arterial Blood Pressure waveforms. On a dataset of $1.37$ million points, we show scaling up to $40$ processors and a $21\times$ speedup in number of comparisons to parallel exhaustive search at the price of a $10\%$ Matthews correlation coefficient (MCC) loss. Furthermore, if additional MCC loss can be tolerated, our system achieves speedups up to two orders of magnitude.
[ { "version": "v1", "created": "Fri, 1 Dec 2017 06:23:22 GMT" } ]
2017-12-04T00:00:00
[ [ "De Palma", "Alessandro", "" ], [ "Hemberg", "Erik", "" ], [ "O'Reilly", "Una-May", "" ] ]
new_dataset
0.961971
1712.00282
Abhinav Kumar
Abhinav Kumar, Shantanu Gupta, Vladimir Kozitsky and Sriganesh Madhvanath
Neural Signatures for Licence Plate Re-identification
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of vehicle licence plate re-identification is generally considered as a one-shot image retrieval problem. The objective of this task is to learn a feature representation (called a "signature") for licence plates. Incoming licence plate images are converted to signatures and matched to a previously collected template database through a distance measure. Then, the input image is recognized as the template whose signature is "nearest" to the input signature. The template database is restricted to contain only a single signature per unique licence plate for our problem. We measure the performance of deep convolutional net-based features adapted from face recognition on this task. In addition, we also test a hybrid approach combining the Fisher vector with a neural network-based embedding called "f2nn" trained with the Triplet loss function. We find that the hybrid approach performs comparably while providing computational benefits. The signature generated by the hybrid approach also shows higher generalizability to datasets more dissimilar to the training corpus.
[ { "version": "v1", "created": "Fri, 1 Dec 2017 11:36:15 GMT" } ]
2017-12-04T00:00:00
[ [ "Kumar", "Abhinav", "" ], [ "Gupta", "Shantanu", "" ], [ "Kozitsky", "Vladimir", "" ], [ "Madhvanath", "Sriganesh", "" ] ]
new_dataset
0.950775
1712.00375
Arpita Baral
Arpita Baral, Abhilash Gondane, Sanjib Sadhu, Priya Ranjan Sinha Mahapatra
Maximum-width Axis-Parallel Empty Rectangular Annulus
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a set $P$ of $n$ points on $\mathbb R^{2}$, we address the problem of computing an axis-parallel empty rectangular annulus $A$ of maximum-width such that no point of $P$ lies inside $A$ but all points of $P$ must lie inside, outside and on the boundaries of two parallel rectangles forming the annulus $A$. We propose an $O(n^3)$ time and $O(n)$ space algorithm to solve the problem. In a particular case when the inner rectangle of an axis-parallel empty rectangular annulus reduces to an input point we can solve the problem in $O(n \log n)$ time and $O(n)$ space.
[ { "version": "v1", "created": "Fri, 1 Dec 2017 15:48:23 GMT" } ]
2017-12-04T00:00:00
[ [ "Baral", "Arpita", "" ], [ "Gondane", "Abhilash", "" ], [ "Sadhu", "Sanjib", "" ], [ "Mahapatra", "Priya Ranjan Sinha", "" ] ]
new_dataset
0.998828
1712.00414
Andrew Adamatzky
Jordi Vallverdu, Oscar Castro, Richard Mayne, Max Talanov, Michael Levin, Frantisek Baluska, Yukio Gunji, Audrey Dussutour, Hector Zenil, Andrew Adamatzky
Slime mould: the fundamental mechanisms of cognition
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The slime mould Physarum polycephalum has been used in developing unconventional computing devices for in which the slime mould played a role of a sensing, actuating, and computing device. These devices treated the slime mould rather as an active living substrate yet the slime mould is a self-consistent living creature which evolved for millions of years and occupied most part of the world, but in any case, that living entity did not own true cognition, just automated biochemical mechanisms. To "rehabilitate" the slime mould from the rank of a purely living electronics element to a "creature of thoughts" we are analyzing the cognitive potential of P. polycephalum. We base our theory of minimal cognition of the slime mould on a bottom-up approach, from the biological and biophysical nature of the slime mould and its regulatory systems using frameworks suh as Lyon's biogenic cognition, Muller, di Primio-Lengeler\'s modifiable pathways, Bateson's "patterns that connect" framework, Maturana's autopoetic network, or proto-consciousness and Morgan's Canon.
[ { "version": "v1", "created": "Fri, 1 Dec 2017 17:23:34 GMT" } ]
2017-12-04T00:00:00
[ [ "Vallverdu", "Jordi", "" ], [ "Castro", "Oscar", "" ], [ "Mayne", "Richard", "" ], [ "Talanov", "Max", "" ], [ "Levin", "Michael", "" ], [ "Baluska", "Frantisek", "" ], [ "Gunji", "Yukio", "" ], [ "Dussutour", "Audrey", "" ], [ "Zenil", "Hector", "" ], [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.99745
1712.00423
Jerome Soumagne
M. Scot Breitenfeld, Neil Fortner, Jordan Henderson, Jerome Soumagne, Mohamad Chaarawi, Johann Lombardi, Quincey Koziol
DAOS for Extreme-scale Systems in Scientific Applications
Submitted to HiPC-2017 on Jun 30 2017, accepted for publication on Sep 8 2017, withdrawn on Oct 20 2017 b/c no author was able to present
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Exascale I/O initiatives will require new and fully integrated I/O models which are capable of providing straightforward functionality, fault tolerance and efficiency. One solution is the Distributed Asynchronous Object Storage (DAOS) technology, which is primarily designed to handle the next generation NVRAM and NVMe technologies envisioned for providing a high bandwidth/IOPS storage tier close to the compute nodes in an HPC system. In conjunction with DAOS, the HDF5 library, an I/O library for scientific applications, will support end-to-end data integrity, fault tolerance, object mapping, index building and querying. This paper details the implementation and performance of the HDF5 library built over DAOS by using three representative scientific application codes.
[ { "version": "v1", "created": "Fri, 1 Dec 2017 17:31:50 GMT" } ]
2017-12-04T00:00:00
[ [ "Breitenfeld", "M. Scot", "" ], [ "Fortner", "Neil", "" ], [ "Henderson", "Jordan", "" ], [ "Soumagne", "Jerome", "" ], [ "Chaarawi", "Mohamad", "" ], [ "Lombardi", "Johann", "" ], [ "Koziol", "Quincey", "" ] ]
new_dataset
0.998839
1711.11073
Sufian Hameed
Sufian Hameed, Sameet Farooq
The Art of Crypto Currencies: A Comprehensive Analysis of Popular Crypto Currencies
10 pages, 8 figures
International Journal of Advanced Computer Science and Applications(ijacsa), 7(12), 2016. http://dx.doi.org/10.14569/IJACSA.2016.071255
10.14569/IJACSA.2016.071255
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crypto Currencies have recently gained enormous popularity amongst the general public. With each passing day, more and more companies are radically accepting crypto cur-rencies in their payment systems, paving way for an economic revolution. Currently more than 700 crypto-currencies are avail-able at Coindesk alone for trade purposes. As of November 2016, the Crypto currencies hold a total market share of over 14 Billion USD1 [5]. With no centralized institution to monitor the movement of funds, Crypto currencies and their users are susceptible to multiple threats. In this paper we present an effort to explain the functionality of some of the most popular crypto currencies available in the online market. We present an analysis of the mining methodologies employed by these currencies to induce new currency into the market and how they compete with each other to provide fast, decentralized transactions to the users. We also share, some of the most dangerous attacks that can be placed on these crypto currencies and how the overall model of the crypto currencies mitigates these attacks. Towards the end, we will present taxonomy of the five highly popular crypto currencies and compare their features.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 19:34:58 GMT" } ]
2017-12-01T00:00:00
[ [ "Hameed", "Sufian", "" ], [ "Farooq", "Sameet", "" ] ]
new_dataset
0.997587
1711.11403
Jose N. Franco-Riquelme
Jos\'e N. Franco-Riquelme, Isaac Lemus-Aguilar, Joaqu\'in Ordieres-Mer\'e
KIBS Innovative Entrepreneurship Networks on Social Media
This paper was presented on the EU-SPRI Early Career Researcher Conference (ECC) on Innovative Entrepreneurship. Politecnico di Milano (POLIMI). Milan, Italy. November 23rd and 24th, 2017
null
null
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The analysis of the use of social media for innovative entrepreneurship in the context has received little attention in the literature, especially in the context of Knowledge Intensive Business Services (KIBS). Therefore, this paper focuses on bridging this gap by applying text mining and sentiment analysis techniques to identify the innovative entrepreneurship reflected by these companies in their social media. Finally, we present and analyze the results of our quantitative analysis of 23.483 posts based on eleven Spanish and Italian consultancy KIBS Twitter Usernames and Keywords using data interpretation techniques such as clustering and topic modeling. This paper suggests that there is a significant gap between the perceived potential of social media and the entrepreneurial behaviors at the social context in business-to-business (B2B) companies.
[ { "version": "v1", "created": "Thu, 30 Nov 2017 14:08:19 GMT" } ]
2017-12-01T00:00:00
[ [ "Franco-Riquelme", "José N.", "" ], [ "Lemus-Aguilar", "Isaac", "" ], [ "Ordieres-Meré", "Joaquín", "" ] ]
new_dataset
0.984075
1711.11438
EPTCS
Rajeev Alur (1), Dana Fisman (2), Rishabh Singh (3), Armando Solar-Lezama (4) ((1) University of Pennsylvania, (2) Ben-Gurion University, (3) Microsoft Research, Redmond, (4) Massachusetts Institute of Technology)
SyGuS-Comp 2017: Results and Analysis
In Proceedings SYNT 2017, arXiv:1711.10224. arXiv admin note: text overlap with arXiv:1611.07627, arXiv:1602.01170
EPTCS 260, 2017, pp. 97-115
10.4204/EPTCS.260.9
null
cs.SE cs.LG cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Syntax-Guided Synthesis (SyGuS) is the computational problem of finding an implementation f that meets both a semantic constraint given by a logical formula phi in a background theory T, and a syntactic constraint given by a grammar G, which specifies the allowed set of candidate implementations. Such a synthesis problem can be formally defined in SyGuS-IF, a language that is built on top of SMT-LIB. The Syntax-Guided Synthesis Competition (SyGuS-Comp) is an effort to facilitate, bring together and accelerate research and development of efficient solvers for SyGuS by providing a platform for evaluating different synthesis techniques on a comprehensive set of benchmarks. In this year's competition six new solvers competed on over 1500 benchmarks. This paper presents and analyses the results of SyGuS-Comp'17.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 01:31:10 GMT" } ]
2017-12-01T00:00:00
[ [ "Alur", "Rajeev", "" ], [ "Fisman", "Dana", "" ], [ "Singh", "Rishabh", "" ], [ "Solar-Lezama", "Armando", "" ] ]
new_dataset
0.999108
1711.11439
EPTCS
Swen Jacobs (1), Nicolas Basset (2), Roderick Bloem (3), Romain Brenguier (4), Maximilien Colange (5), Peter Faymonville (1), Bernd Finkbeiner (1), Ayrat Khalimov (3), Felix Klein (1), Thibaud Michaud (5), Guillermo A. P\'erez (2), Jean-Fran\c{c}ois Raskin (2), Ocan Sankur (6), Leander Tentrup (1) ((1) Saarland University, (2) Universit\'e Libre de Bruxelles, (3) Graz University of Technology, (4) University of Oxford, (5) LRDE, EPITA, (6) CNRS, Irisa)
The 4th Reactive Synthesis Competition (SYNTCOMP 2017): Benchmarks, Participants & Results
In Proceedings SYNT 2017, arXiv:1711.10224. arXiv admin note: text overlap with arXiv:1609.00507
EPTCS 260, 2017, pp. 116-143
10.4204/EPTCS.260.10
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report on the fourth reactive synthesis competition (SYNTCOMP 2017). We introduce two new benchmark classes that have been added to the SYNTCOMP library, and briefly describe the benchmark selection, evaluation scheme and the experimental setup of SYNTCOMP 2017. We present the participants of SYNTCOMP 2017, with a focus on changes with respect to the previous years and on the two completely new tools that have entered the competition. Finally, we present and analyze the results of our experimental evaluation, including a ranking of tools with respect to quantity and quality of solutions.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 04:02:14 GMT" } ]
2017-12-01T00:00:00
[ [ "Jacobs", "Swen", "" ], [ "Basset", "Nicolas", "" ], [ "Bloem", "Roderick", "" ], [ "Brenguier", "Romain", "" ], [ "Colange", "Maximilien", "" ], [ "Faymonville", "Peter", "" ], [ "Finkbeiner", "Bernd", "" ], [ "Khalimov", "Ayrat", "" ], [ "Klein", "Felix", "" ], [ "Michaud", "Thibaud", "" ], [ "Pérez", "Guillermo A.", "" ], [ "Raskin", "Jean-François", "" ], [ "Sankur", "Ocan", "" ], [ "Tentrup", "Leander", "" ] ]
new_dataset
0.99815
1711.11460
Jianwei Qian
Jianwei Qian, Haohua Du, Jiahui Hou, Linlin Chen, Taeho Jung, Xiang-Yang Li, Yu Wang, Yanbo Deng
VoiceMask: Anonymize and Sanitize Voice Input on Mobile Devices
null
null
null
null
cs.CR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Voice input has been tremendously improving the user experience of mobile devices by freeing our hands from typing on the small screen. Speech recognition is the key technology that powers voice input, and it is usually outsourced to the cloud for the best performance. However, the cloud might compromise users' privacy by identifying their identities by voice, learning their sensitive input content via speech recognition, and then profiling the mobile users based on the content. In this paper, we design an intermediate between users and the cloud, named VoiceMask, to sanitize users' voice data before sending it to the cloud for speech recognition. We analyze the potential privacy risks and aim to protect users' identities and sensitive input content from being disclosed to the cloud. VoiceMask adopts a carefully designed voice conversion mechanism that is resistant to several attacks. Meanwhile, it utilizes an evolution-based keyword substitution technique to sanitize the voice input content. The two sanitization phases are all performed in the resource-limited mobile device while still maintaining the usability and accuracy of the cloud-supported speech recognition service. We implement the voice sanitizer on Android systems and present extensive experimental results that validate the effectiveness and efficiency of our app. It is demonstrated that we are able to reduce the chance of a user's voice being identified from 50 people by 84% while keeping the drop of speech recognition accuracy within 14.2%.
[ { "version": "v1", "created": "Thu, 30 Nov 2017 15:18:07 GMT" } ]
2017-12-01T00:00:00
[ [ "Qian", "Jianwei", "" ], [ "Du", "Haohua", "" ], [ "Hou", "Jiahui", "" ], [ "Chen", "Linlin", "" ], [ "Jung", "Taeho", "" ], [ "Li", "Xiang-Yang", "" ], [ "Wang", "Yu", "" ], [ "Deng", "Yanbo", "" ] ]
new_dataset
0.997989
1711.11487
Xueyuan Han
Xueyuan Han, Thomas Pasquier, Tanvi Ranjan, Mark Goldstein, Margo Seltzer
FRAPpuccino: Fault-detection through Runtime Analysis of Provenance
7 pages, 2 figures, 1 table
Han, X., Pasquier, T., Ranjan, T., Goldstein, M. and Seltzer, M., 2017. FRAPpuccino: Fault-detection through Runtime Analysis of Provenance
null
null
cs.SY cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present FRAPpuccino (or FRAP), a provenance-based fault detection mechanism for Platform as a Service (PaaS) users, who run many instances of an application on a large cluster of machines. FRAP models, records, and analyzes the behavior of an application and its impact on the system as a directed acyclic provenance graph. It assumes that most instances behave normally and uses their behavior to construct a model of legitimate behavior. Given a model of legitimate behavior, FRAP uses a dynamic sliding window algorithm to compare a new instance's execution to that of the model. Any instance that does not conform to the model is identified as an anomaly. We present the FRAP prototype and experimental results showing that it can accurately detect application anomalies.
[ { "version": "v1", "created": "Thu, 30 Nov 2017 16:09:17 GMT" } ]
2017-12-01T00:00:00
[ [ "Han", "Xueyuan", "" ], [ "Pasquier", "Thomas", "" ], [ "Ranjan", "Tanvi", "" ], [ "Goldstein", "Mark", "" ], [ "Seltzer", "Margo", "" ] ]
new_dataset
0.998085
1605.05850
Sevil Dr\"axler
Sevil Dr\"axler, Manuel Peuster, Holger Karl, Michael Bredel, Johannes Lessmann, Thomas Soenen, Wouter Tavernier, Sharon Mendel-Brin, George Xilouris
SONATA: Service Programming and Orchestration for Virtualized Software Networks
null
null
10.1109/ICCW.2017.7962785
null
cs.SE cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In conventional large-scale networks, creation and management of network services are costly and complex tasks that often consume a lot of resources, including time and manpower. Network softwarization and network function virtualization have been introduced to tackle these problems. They replace the hardware-based network service components and network control mechanisms with software components running on general-purpose hardware, aiming at decreasing costs and complexity of implementing new services, maintaining the implemented services, and managing available resources in service provisioning platforms and underlying infrastructures. To experience the full potential of these approaches, innovative development support tools and service provisioning environments are needed. To answer these needs, we introduce the SONATA architecture, a service programming, orchestration, and management framework. We present a development toolchain for virtualized network services, fully integrated with a service platform and orchestration system. We motivate the modular and flexible architecture of our system and discuss its main components and features, such as function- and service-specific managers that allow fine- grained service management, slicing support to facilitate multi-tenancy, recursiveness for improved scalability, and full-featured DevOps support.
[ { "version": "v1", "created": "Thu, 19 May 2016 08:45:23 GMT" } ]
2017-11-30T00:00:00
[ [ "Dräxler", "Sevil", "" ], [ "Peuster", "Manuel", "" ], [ "Karl", "Holger", "" ], [ "Bredel", "Michael", "" ], [ "Lessmann", "Johannes", "" ], [ "Soenen", "Thomas", "" ], [ "Tavernier", "Wouter", "" ], [ "Mendel-Brin", "Sharon", "" ], [ "Xilouris", "George", "" ] ]
new_dataset
0.996648
1612.04631
Romain Bregier
Romain Br\'egier, Fr\'ed\'eric Devernay, Laetitia Leyrit, James Crowley
Defining the Pose of any 3D Rigid Object and an Associated Distance
null
International Journal of Computer Vision, Springer Verlag, 2017
10.1007/s11263-017-1052-4
null
cs.CV math.MG physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The pose of a rigid object is usually regarded as a rigid transformation, described by a translation and a rotation. However, equating the pose space with the space of rigid transformations is in general abusive, as it does not account for objects with proper symmetries -- which are common among man-made objects.In this article, we define pose as a distinguishable static state of an object, and equate a pose with a set of rigid transformations. Based solely on geometric considerations, we propose a frame-invariant metric on the space of possible poses, valid for any physical rigid object, and requiring no arbitrary tuning. This distance can be evaluated efficiently using a representation of poses within an Euclidean space of at most 12 dimensions depending on the object's symmetries. This makes it possible to efficiently perform neighborhood queries such as radius searches or k-nearest neighbor searches within a large set of poses using off-the-shelf methods. Pose averaging considering this metric can similarly be performed easily, using a projection function from the Euclidean space onto the pose space. The practical value of those theoretical developments is illustrated with an application of pose estimation of instances of a 3D rigid object given an input depth map, via a Mean Shift procedure.
[ { "version": "v1", "created": "Wed, 14 Dec 2016 13:46:55 GMT" }, { "version": "v2", "created": "Wed, 16 Aug 2017 09:24:46 GMT" }, { "version": "v3", "created": "Wed, 29 Nov 2017 14:10:04 GMT" } ]
2017-11-30T00:00:00
[ [ "Brégier", "Romain", "" ], [ "Devernay", "Frédéric", "" ], [ "Leyrit", "Laetitia", "" ], [ "Crowley", "James", "" ] ]
new_dataset
0.999449
1704.00693
Istv\'an Z Reguly
Istvan Z Reguly, Gihan R Mudalige, Mike B Giles
Loop Tiling in Large-Scale Stencil Codes at Run-time with OPS
null
null
10.1109/TPDS.2017.2778161
null
cs.PF cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The key common bottleneck in most stencil codes is data movement, and prior research has shown that improving data locality through optimisations that schedule across loops do particularly well. However, in many large PDE applications it is not possible to apply such optimisations through compilers because there are many options, execution paths and data per grid point, many dependent on run-time parameters, and the code is distributed across different compilation units. In this paper, we adapt the data locality improving optimisation called iteration space slicing for use in large OPS applications both in shared-memory and distributed-memory systems, relying on run-time analysis and delayed execution. We evaluate our approach on a number of applications, observing speedups of 2$\times$ on the Cloverleaf 2D/3D proxy application, which contain 83/141 loops respectively, $3.5\times$ on the linear solver TeaLeaf, and $1.7\times$ on the compressible Navier-Stokes solver OpenSBLI. We demonstrate strong and weak scalability up to 4608 cores of CINECA's Marconi supercomputer. We also evaluate our algorithms on Intel's Knights Landing, demonstrating maintained throughput as the problem size grows beyond 16GB, and we do scaling studies up to 8704 cores. The approach is generally applicable to any stencil DSL that provides per loop data access information.
[ { "version": "v1", "created": "Mon, 3 Apr 2017 17:16:39 GMT" }, { "version": "v2", "created": "Mon, 26 Jun 2017 14:57:19 GMT" } ]
2017-11-30T00:00:00
[ [ "Reguly", "Istvan Z", "" ], [ "Mudalige", "Gihan R", "" ], [ "Giles", "Mike B", "" ] ]
new_dataset
0.99868
1709.08767
Eliu Huerta
E. A. Huerta, Roland Haas, Edgar Fajardo, Daniel S. Katz, Stuart Anderson, Peter Couvares, Josh Willis, Timothy Bouvet, Jeremy Enos, William T. C. Kramer, Hon Wai Leong and David Wheeler
BOSS-LDG: A Novel Computational Framework that Brings Together Blue Waters, Open Science Grid, Shifter and the LIGO Data Grid to Accelerate Gravitational Wave Discovery
10 pages, 10 figures. Accepted as a Full Research Paper to the 13th IEEE International Conference on eScience
2017 IEEE 13th International Conference on e-Science
10.1109/eScience.2017.47
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel computational framework that connects Blue Waters, the NSF-supported, leadership-class supercomputer operated by NCSA, to the Laser Interferometer Gravitational-Wave Observatory (LIGO) Data Grid via Open Science Grid technology. To enable this computational infrastructure, we configured, for the first time, a LIGO Data Grid Tier-1 Center that can submit heterogeneous LIGO workflows using Open Science Grid facilities. In order to enable a seamless connection between the LIGO Data Grid and Blue Waters via Open Science Grid, we utilize Shifter to containerize LIGO's workflow software. This work represents the first time Open Science Grid, Shifter, and Blue Waters are unified to tackle a scientific problem and, in particular, it is the first time a framework of this nature is used in the context of large scale gravitational wave data analysis. This new framework has been used in the last several weeks of LIGO's second discovery campaign to run the most computationally demanding gravitational wave search workflows on Blue Waters, and accelerate discovery in the emergent field of gravitational wave astrophysics. We discuss the implications of this novel framework for a wider ecosystem of Higher Performance Computing users.
[ { "version": "v1", "created": "Tue, 26 Sep 2017 00:49:21 GMT" } ]
2017-11-30T00:00:00
[ [ "Huerta", "E. A.", "" ], [ "Haas", "Roland", "" ], [ "Fajardo", "Edgar", "" ], [ "Katz", "Daniel S.", "" ], [ "Anderson", "Stuart", "" ], [ "Couvares", "Peter", "" ], [ "Willis", "Josh", "" ], [ "Bouvet", "Timothy", "" ], [ "Enos", "Jeremy", "" ], [ "Kramer", "William T. C.", "" ], [ "Leong", "Hon Wai", "" ], [ "Wheeler", "David", "" ] ]
new_dataset
0.995926
1710.06924
Xingchao Peng
Xingchao Peng, Ben Usman, Neela Kaushik, Judy Hoffman, Dequan Wang, Kate Saenko
VisDA: The Visual Domain Adaptation Challenge
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the 2017 Visual Domain Adaptation (VisDA) dataset and challenge, a large-scale testbed for unsupervised domain adaptation across visual domains. Unsupervised domain adaptation aims to solve the real-world problem of domain shift, where machine learning models trained on one domain must be transferred and adapted to a novel visual domain without additional supervision. The VisDA2017 challenge is focused on the simulation-to-reality shift and has two associated tasks: image classification and image segmentation. The goal in both tracks is to first train a model on simulated, synthetic data in the source domain and then adapt it to perform well on real image data in the unlabeled test domain. Our dataset is the largest one to date for cross-domain object classification, with over 280K images across 12 categories in the combined training, validation and testing domains. The image segmentation dataset is also large-scale with over 30K images across 18 categories in the three domains. We compare VisDA to existing cross-domain adaptation datasets and provide a baseline performance analysis using various domain adaptation models that are currently popular in the field.
[ { "version": "v1", "created": "Wed, 18 Oct 2017 20:20:49 GMT" }, { "version": "v2", "created": "Wed, 29 Nov 2017 04:04:18 GMT" } ]
2017-11-30T00:00:00
[ [ "Peng", "Xingchao", "" ], [ "Usman", "Ben", "" ], [ "Kaushik", "Neela", "" ], [ "Hoffman", "Judy", "" ], [ "Wang", "Dequan", "" ], [ "Saenko", "Kate", "" ] ]
new_dataset
0.999398
1711.02293
Seokseong Jeon
Seokseong Jeon, Chansu Yu, Young-Joo Suh
Pre-shared Key Agreement for Secure Public Wi-Fi
null
null
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel pre-shared key (PSK) agreement scheme to establish a secure connection between a Wi-Fi client and access point (AP) without prior knowledge of a password. The standard IEEE 802.11 security method, Robust Security Network Association, widely known as Wi-Fi Protected Access (WPA) and WPA2, derives a shared cryptographic key if and only if a user provides an identical password which an AP possesses, causing ofinconvenience of obtaining and entering the password. In this paper, a proposed scheme, Secure Open AP (SOAP), adopts two public key algorithms, the elliptic curve Diffie-Hellman key exchange algorithm (ECDH) and digital signature algorithm (ECDSA) to establish a secure connection between a client and an AP without having prior knowledge of a password. Implementation and experiment results demonstrate the viability of the proposed scheme.
[ { "version": "v1", "created": "Tue, 7 Nov 2017 05:34:46 GMT" }, { "version": "v2", "created": "Fri, 17 Nov 2017 06:31:48 GMT" }, { "version": "v3", "created": "Sun, 26 Nov 2017 11:21:47 GMT" }, { "version": "v4", "created": "Wed, 29 Nov 2017 11:47:45 GMT" } ]
2017-11-30T00:00:00
[ [ "Jeon", "Seokseong", "" ], [ "Yu", "Chansu", "" ], [ "Suh", "Young-Joo", "" ] ]
new_dataset
0.998322
1711.10485
Xiaodong He
Tao Xu, Pengchuan Zhang, Qiuyuan Huang, Han Zhang, Zhe Gan, Xiaolei Huang, and Xiaodong He
AttnGAN: Fine-Grained Text to Image Generation with Attentional Generative Adversarial Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an Attentional Generative Adversarial Network (AttnGAN) that allows attention-driven, multi-stage refinement for fine-grained text-to-image generation. With a novel attentional generative network, the AttnGAN can synthesize fine-grained details at different subregions of the image by paying attentions to the relevant words in the natural language description. In addition, a deep attentional multimodal similarity model is proposed to compute a fine-grained image-text matching loss for training the generator. The proposed AttnGAN significantly outperforms the previous state of the art, boosting the best reported inception score by 14.14% on the CUB dataset and 170.25% on the more challenging COCO dataset. A detailed analysis is also performed by visualizing the attention layers of the AttnGAN. It for the first time shows that the layered attentional GAN is able to automatically select the condition at the word level for generating different parts of the image.
[ { "version": "v1", "created": "Tue, 28 Nov 2017 18:59:50 GMT" } ]
2017-11-30T00:00:00
[ [ "Xu", "Tao", "" ], [ "Zhang", "Pengchuan", "" ], [ "Huang", "Qiuyuan", "" ], [ "Zhang", "Han", "" ], [ "Gan", "Zhe", "" ], [ "Huang", "Xiaolei", "" ], [ "He", "Xiaodong", "" ] ]
new_dataset
0.986041
1711.10579
Bin Wang
Bin Wang, John Bachan, Cy Chan
ExaGridPF: A Parallel Power Flow Solver for Transmission and Unbalanced Distribution Systems
null
null
null
null
cs.CE cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates parallelization strategies for solving power flow problems in both transmission and unbalanced, three-phase distribution systems by developing a scalable power flow solver, ExaGridPF, which is compatible with existing high-performance computing platforms. Newton-Raphson (NR) and Newton-Krylov (NK) algorithms have been implemented to verify the performance improvement over both standard IEEE test cases and synthesized grid topologies. For three-phase, unbalanced system, we adapt the current injection method (CIM) to model the power flow and utilize SuperLU to parallelize the computing load across multiple threads. The experimental results indicate that more than 5 times speedup ratio can be achieved for synthesized large-scale transmission topologies, and significant efficiency improvements are observed over existing methods for the distribution networks.
[ { "version": "v1", "created": "Tue, 28 Nov 2017 21:57:14 GMT" } ]
2017-11-30T00:00:00
[ [ "Wang", "Bin", "" ], [ "Bachan", "John", "" ], [ "Chan", "Cy", "" ] ]
new_dataset
0.997412
1711.10636
EPTCS
Roderick Bloem, Sven Schewe, Ayrat Khalimov
CTL* synthesis via LTL synthesis
In Proceedings SYNT 2017, arXiv:1711.10224
EPTCS 260, 2017, pp. 4-22
10.4204/EPTCS.260.4
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We reduce synthesis for CTL* properties to synthesis for LTL. In the context of model checking this is impossible - CTL* is more expressive than LTL. Yet, in synthesis we have knowledge of the system structure and we can add new outputs. These outputs can be used to encode witnesses of the satisfaction of CTL* subformulas directly into the system. This way, we construct an LTL formula, over old and new outputs and original inputs, which is realisable if, and only if, the original CTL* formula is realisable. The CTL*-via-LTL synthesis approach preserves the problem complexity, although it might increase the minimal system size. We implemented the reduction, and evaluated the CTL*-via-LTL synthesiser on several examples.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 01:23:10 GMT" } ]
2017-11-30T00:00:00
[ [ "Bloem", "Roderick", "" ], [ "Schewe", "Sven", "" ], [ "Khalimov", "Ayrat", "" ] ]
new_dataset
0.999449
1711.10651
Mhafuzul Islam
Mhafuzul Islam, Mashrur Chowdhury, Hongda Li, Hongxin Hu
Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention
22 pages, 4 figures, Will be published in the "2018 Transportation Research Board Conference Proceedings
null
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A connected vehicle (CV) environment is composed of a diverse data collection, data communication and dissemination, and computing infrastructure systems that are vulnerable to the same cyberattacks as all traditional computing environments. Cyberattacks can jeopardize the expected safety, mobility, energy, and environmental benefits from connected vehicle applications. As cyberattacks can lead to severe traffic incidents, it has become one of the primary concerns in connected vehicle applications. In this paper, we investigate the impact of cyberattacks on the vehicle-to-infrastructure (V2I) network from a V2I application point of view. Then, we develop a novel V2I cybersecurity architecture, named CVGuard, which can detect and prevent cyberattacks on the V2I environment. In designing CVGuard, key challenges, such as scalability, resiliency and future usability were considered. A case study using a distributed denial of service (DDoS) on a V2I application, i.e., the Stop Sign Gap Assist (SSGA) application, shows that CVGuard was effective in mitigating the adverse effects created by a DDoS attack. In our case study, because of the DDoS attack, conflicts between the minor and major road vehicles occurred in an unsignalized intersection, which could have caused potential crashes. A reduction of conflicts between vehicles occurred because CVGuard was in operation. The reduction of conflicts was compared based on the number of conflicts before and after the implementation and operation of the CVGuard security platform. Analysis revealed that the strategies adopted by the CVGuard were successful in reducing the inter-vehicle conflicts by 60% where a DDoS attack compromised the SSGA application at an unsignalized intersection.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 02:39:52 GMT" } ]
2017-11-30T00:00:00
[ [ "Islam", "Mhafuzul", "" ], [ "Chowdhury", "Mashrur", "" ], [ "Li", "Hongda", "" ], [ "Hu", "Hongxin", "" ] ]
new_dataset
0.995289
1711.10693
Anthony Ortiz
Dalton Rosario, Christoph Borel, Damon Conover, Ryan McAlinden, Anthony Ortiz, Sarah Shiver, Blair Simon
Small Drone Field Experiment: Data Collection & Processing
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Following an initiative formalized in April 2016 formally known as ARL West between the U.S. Army Research Laboratory (ARL) and University of Southern California's Institute for Creative Technologies (USC ICT), a field experiment was coordinated and executed in the summer of 2016 by ARL, USC ICT, and Headwall Photonics. The purpose was to image part of the USC main campus in Los Angeles, USA, using two portable COTS (commercial off the shelf) aerial drone solutions for data acquisition, for photogrammetry (3D reconstruction from images), and fusion of hyperspectral data with the recovered set of 3D point clouds representing the target area. The research aims for determining the viability of having a machine capable of segmenting the target area into key material classes (e.g., manmade structures, live vegetation, water) for use in multiple purposes, to include providing the user with a more accurate scene understanding and enabling the unsupervised automatic sampling of meaningful material classes from the target area for adaptive semi-supervised machine learning. In the latter, a target set library may be used for automatic machine training with data of local material classes, as an example, to increase the prediction chances of machines recognizing targets. The field experiment and associated data post processing approach to correct for reflectance, geo-rectify, recover the area's dense point clouds from images, register spectral with elevation properties of scene surfaces from the independently collected datasets, and generate the desired scene segmented maps are discussed. Lessons learned from the experience are also highlighted throughout the paper.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 06:08:16 GMT" } ]
2017-11-30T00:00:00
[ [ "Rosario", "Dalton", "" ], [ "Borel", "Christoph", "" ], [ "Conover", "Damon", "" ], [ "McAlinden", "Ryan", "" ], [ "Ortiz", "Anthony", "" ], [ "Shiver", "Sarah", "" ], [ "Simon", "Blair", "" ] ]
new_dataset
0.980307
1711.10694
Wanchun Liu
Wanchun Liu, Ying-Chang Liang, Yonghui Li and Branka Vucetic
Backscatter Multiplicative Multiple-Access Systems: Fundamental Limits and Practical Design
This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a novel ambient backscatter multiple-access system, where a receiver (Rx) simultaneously detects the signals transmitted from an active transmitter (Tx) and a backscatter Tag. Specifically, the information-carrying signal sent by the Tx arrives at the Rx through two wireless channels: the direct channel from the Tx to the Rx, and the backscatter channel from the Tx to the Tag and then to the Rx. The received signal from the backscatter channel also carries the Tag's information because of the multiplicative backscatter operation at the Tag. This multiple-access system introduces a new channel model, referred to as multiplicative multiple-access channel (M-MAC). We analyze the achievable rate region of the M-MAC, and prove that its region is strictly larger than that of the conventional time-division multiple-access scheme in many cases, including, e.g., the high SNR regime and the case when the direct channel is much stronger than the backscatter channel. Hence, the multiplicative multiple-access scheme is an attractive technique to improve the throughput for ambient backscatter communication systems. Moreover, we analyze the detection error rates for coherent and noncoherent modulation schemes adopted by the Tx and the Tag, respectively, in both synchronous and asynchronous scenarios, which further bring interesting insights for practical system design.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 06:12:37 GMT" } ]
2017-11-30T00:00:00
[ [ "Liu", "Wanchun", "" ], [ "Liang", "Ying-Chang", "" ], [ "Li", "Yonghui", "" ], [ "Vucetic", "Branka", "" ] ]
new_dataset
0.996071
1711.10703
Ying Tai
Yu Chen, Ying Tai, Xiaoming Liu, Chunhua Shen, Jian Yang
FSRNet: End-to-End Learning Face Super-Resolution with Facial Priors
Chen and Tai contributed equally to this paper
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Face Super-Resolution (SR) is a domain-specific super-resolution problem. The specific facial prior knowledge could be leveraged for better super-resolving face images. We present a novel deep end-to-end trainable Face Super-Resolution Network (FSRNet), which makes full use of the geometry prior, i.e., facial landmark heatmaps and parsing maps, to super-resolve very low-resolution (LR) face images without well-aligned requirement. Specifically, we first construct a coarse SR network to recover a coarse high-resolution (HR) image. Then, the coarse HR image is sent to two branches: a fine SR encoder and a prior information estimation network, which extracts the image features, and estimates landmark heatmaps/parsing maps respectively. Both image features and prior information are sent to a fine SR decoder to recover the HR image. To further generate realistic faces, we propose the Face Super-Resolution Generative Adversarial Network (FSRGAN) to incorporate the adversarial loss into FSRNet. Moreover, we introduce two related tasks, face alignment and parsing, as the new evaluation metrics for face SR, which address the inconsistency of classic metrics w.r.t. visual perception. Extensive benchmark experiments show that FSRNet and FSRGAN significantly outperforms state of the arts for very LR face SR, both quantitatively and qualitatively. Code will be made available upon publication.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 06:47:04 GMT" } ]
2017-11-30T00:00:00
[ [ "Chen", "Yu", "" ], [ "Tai", "Ying", "" ], [ "Liu", "Xiaoming", "" ], [ "Shen", "Chunhua", "" ], [ "Yang", "Jian", "" ] ]
new_dataset
0.973346
1711.10738
Guoru Ding Dr.
Guoru Ding, Qihui Wu, Linyuan Zhang, Yun Lin, Theodoros A. Tsiftsis, and Yu-Dong Yao
An Amateur Drone Surveillance System Based on Cognitive Internet of Things
null
IEEE Communications Magazine, 2018
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Drones, also known as mini-unmanned aerial vehicles, have attracted increasing attention due to their boundless applications in communications, photography, agriculture, surveillance and numerous public services. However, the deployment of amateur drones poses various safety, security and privacy threats. To cope with these challenges, amateur drone surveillance becomes a very important but largely unexplored topic. In this article, we firstly present a brief survey to show the state-of-the-art studies on amateur drone surveillance. Then, we propose a vision, named Dragnet, by tailoring the recent emerging cognitive internet of things framework for amateur drone surveillance. Next, we discuss the key enabling techniques for Dragnet in details, accompanied with the technical challenges and open issues. Furthermore, we provide an exemplary case study on the detection and classification of authorized and unauthorized amateur drones, where, for example, an important event is being held and only authorized drones are allowed to fly over.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 09:21:29 GMT" } ]
2017-11-30T00:00:00
[ [ "Ding", "Guoru", "" ], [ "Wu", "Qihui", "" ], [ "Zhang", "Linyuan", "" ], [ "Lin", "Yun", "" ], [ "Tsiftsis", "Theodoros A.", "" ], [ "Yao", "Yu-Dong", "" ] ]
new_dataset
0.998127
1711.10862
Tamas Madl
Tamas Madl, David Madl
Smartphone-based paroxysmal atrial fibrillation monitoring with robust generalization
Accepted at NIPS ML4H 2017
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Atrial fibrillation is increasingly prevalent, especially in the elderly, and challenging to detect due paroxysmal nature. Here, we propose novel computational methods based on heart beat intervals to facilitate rapid and robust discrimination between atrial fibrillation and sinus rhythm. We used low-cost Android smartphones, and recorded short, 30 second waveform data from 194 participants. In addition, we evaluated our approach on 8528 hand-held ECG recordings to show generalization. Our approach achieves a sensitivity of 93% and specificity of 94% on 30 second waveforms, significantly outperforming previously proposed heart rate variability features and smartphone-based AFib detection methods, and substantiates the feasibility of real-world application on low-cost hardware.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 14:11:22 GMT" } ]
2017-11-30T00:00:00
[ [ "Madl", "Tamas", "" ], [ "Madl", "David", "" ] ]
new_dataset
0.95602
1711.10886
M. Saquib Sarfraz
M. Saquib Sarfraz, Angela Constantinescu, Melanie Zuzej, Rainer Stiefelhagen
A Multimodal Assistive System for Helping Visually Impaired in Social Interactions
null
Informatik Spectrum, Springer volume 40,No. 6. 2017
10.1007/s00287-017-1077-7
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Access to non-verbal cues in social interactions is vital for people with visual impairment. It has been shown that non-verbal cues such as eye contact, number of people, their names and positions are helpful for individuals who are blind. While there is an increasing interest in developing systems to provide these cues less emphasis has been put in evaluating its impact on the visually impaired users. In this paper, we provide this analysis by conducting a user study with 12 visually impaired participants in a typical social interaction setting. We design a real time multi-modal system that provides such non-verbal cues via audio and haptic interfaces. The study shows that such systems are generally perceived as useful in social interaction and brings forward some concerns that are not being addressed in its usability aspects. The study provides important insight about developing such technology for this significant part of society.
[ { "version": "v1", "created": "Wed, 29 Nov 2017 14:49:24 GMT" } ]
2017-11-30T00:00:00
[ [ "Sarfraz", "M. Saquib", "" ], [ "Constantinescu", "Angela", "" ], [ "Zuzej", "Melanie", "" ], [ "Stiefelhagen", "Rainer", "" ] ]
new_dataset
0.998772
1711.10912
Cem Bassoy
Cem Bassoy
TLib: A Flexible C++ Tensor Framework for Numerical Tensor Calculus
29 pages
null
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Numerical tensor calculus comprise basic tensor operations such as the entrywise addition and contraction of higher-order tensors. We present, TLib, flexible tensor framework with generic tensor functions and tensor classes that assists users to implement generic and flexible tensor algorithms in C++. The number of dimensions, the extents of the dimensions of the tensors and the contraction modes of the tensor operations can be runtime variable. Our framework provides tensor classes that simplify the management of multidimensional data and utilization of tensor operations using object-oriented and generic programming techniques. Additional stream classes help the user to verify and compare of numerical results with MATLAB. Tensor operations are implemented with generic tensor functions and in terms of multidimensional iterator types only, decoupling data storage representation and computation. The user can combine tensor functions with different tensor types and extend the framework without further modification of the classes or functions. We discuss the design and implementation of the framework and demonstrate its usage with examples that have been discussed in the literature.
[ { "version": "v1", "created": "Tue, 28 Nov 2017 14:36:59 GMT" } ]
2017-11-30T00:00:00
[ [ "Bassoy", "Cem", "" ] ]
new_dataset
0.998631