id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1710.08126
|
Diaz Miguel
|
Pedro Araujo G\'omez, Miguel D\'iaz Rodr\'iguez, Vicente Amela
|
Design of a Robotic System for Diagnosis and Rehabilitation of Lower
Limbs
|
in Spanish
|
Dise\~no de Dispositivos para Rehabilitaci\'on y \'Ortesis,
pp.15-42, 2017, 978-980-11-1893-0
| null | null |
cs.RO physics.med-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Currently, lower limb robotic rehabilitation is widely developed, However,
the devices used so far seem to not have a uniform criteria for their design,
because, on the contrary, each developed mechanism is often presented as if it
does not take into account the criteria used in previous designs. On the other
hand, the diagnosis of lower limb from robotic devices has been little studied.
This chapter presents a guide for the design of robotic devices in diagnosis of
lower limbs, taking into account the mobility of the human leg and the
techniques used by physiotherapists in the execution of exercises and the
rehabilitation of rehabilitation and diagnosis tests, as well as the
recommendations made by various authors, among other aspects. The proposed
guide is illustrated through a case study based on a parallel robot RPU+3UPS
able to make movements that are applied during the processes of rehabilitation
and diagnosis. The proposal presents advantages over some existing devices such
as its load capacity that can support, and also allows you to restrict the
movement in directions required by the rehabilitation and the diagnosis
movements.
|
[
{
"version": "v1",
"created": "Mon, 23 Oct 2017 07:44:03 GMT"
}
] | 2017-10-24T00:00:00 |
[
[
"Gómez",
"Pedro Araujo",
""
],
[
"Rodríguez",
"Miguel Díaz",
""
],
[
"Amela",
"Vicente",
""
]
] |
new_dataset
| 0.966144 |
1710.08281
|
Ethel Ethel
|
Obinna Ethelbert, Faraz Fatemi Moghaddam, Philipp Wieder, Ramin
Yahyapour
|
A JSON Token-Based Authentication and Access Management Schema for Cloud
SaaS Applications
|
6 Pages
| null | null | null |
cs.CR cs.DC cs.PF cs.SE
|
http://creativecommons.org/publicdomain/zero/1.0/
|
Cloud computing is significantly reshaping the computing industry built
around core concepts such as virtualization, processing power, connectivity and
elasticity to store and share IT resources via a broad network. It has emerged
as the key technology that unleashes the potency of Big Data, Internet of
Things, Mobile and Web Applications, and other related technologies, but it
also comes with its challenges - such as governance, security, and privacy.
This paper is focused on the security and privacy challenges of cloud computing
with specific reference to user authentication and access management for cloud
SaaS applications. The suggested model uses a framework that harnesses the
stateless and secure nature of JWT for client authentication and session
management. Furthermore, authorized access to protected cloud SaaS resources
have been efficiently managed. Accordingly, a Policy Match Gate (PMG) component
and a Policy Activity Monitor (PAM) component have been introduced. In
addition, other subcomponents such as a Policy Validation Unit (PVU) and a
Policy Proxy DB (PPDB) have also been established for optimized service
delivery. A theoretical analysis of the proposed model portrays a system that
is secure, lightweight and highly scalable for improved cloud resource security
and management.
|
[
{
"version": "v1",
"created": "Mon, 23 Oct 2017 14:01:29 GMT"
}
] | 2017-10-24T00:00:00 |
[
[
"Ethelbert",
"Obinna",
""
],
[
"Moghaddam",
"Faraz Fatemi",
""
],
[
"Wieder",
"Philipp",
""
],
[
"Yahyapour",
"Ramin",
""
]
] |
new_dataset
| 0.997181 |
1710.08314
|
Mathieu L\'eonardon
|
Mathieu L\'eonardon, Adrien Cassagne, Camille Leroux, Christophe
J\'ego, Louis-Philippe Hamelin, Yvon Savaria
|
Fast and Flexible Software Polar List Decoders
|
11 pages, 7 figures, submitted to Springer Journal of Signal
Processing Systems
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Flexibility is one mandatory aspect of channel coding in modern wireless
communication systems. Among other things, the channel decoder has to support
several code lengths and code rates. This need for flexibility applies to polar
codes that are considered for control channels in the future 5G standard. This
paper presents a new generic and flexible implementation of a software
Successive Cancellation List (SCL) decoder. A large set of parameters can be
fine-tuned dynamically without re-compiling the software source code: the code
length, the code rate, the frozen bits set, the puncturing patterns, the cyclic
redundancy check, the list size, the type of decoding algorithm, the
tree-pruning strategy and the data quantization. This generic and flexible SCL
decoder enables to explore tradeoffs between throughput, latency and decoding
performance. Several optimizations are proposed to achieve a competitive
decoding speed despite the constraints induced by the genericity and the
flexibility. The resulting polar list decoder is about 4 times faster than a
generic software decoder and only 2 times slower than a non-flexible unrolled
decoder. Thanks to the flexibility of the decoder, the fully adaptive SCL
algorithm can be easily implemented and achieves higher throughput than any
other similar decoder in the literature (up to 425 Mb/s on a single processor
core for N = 2048 and K = 1723 at 4.5 dB).
|
[
{
"version": "v1",
"created": "Mon, 23 Oct 2017 14:48:30 GMT"
}
] | 2017-10-24T00:00:00 |
[
[
"Léonardon",
"Mathieu",
""
],
[
"Cassagne",
"Adrien",
""
],
[
"Leroux",
"Camille",
""
],
[
"Jégo",
"Christophe",
""
],
[
"Hamelin",
"Louis-Philippe",
""
],
[
"Savaria",
"Yvon",
""
]
] |
new_dataset
| 0.994019 |
1708.07575
|
Srivatsan Ravi Mr
|
Miguel Pires, Srivatsan Ravi and Rodrigo Rodrigues
|
Generalized Paxos Made Byzantine (and Less Complex)
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the most recent members of the Paxos family of protocols is
Generalized Paxos. This variant of Paxos has the characteristic that it departs
from the original specification of consensus, allowing for a weaker safety
condition where different processes can have a different views on a sequence
being agreed upon. However, much like the original Paxos counterpart,
Generalized Paxos does not have a simple implementation. Furthermore, with the
recent practical adoption of Byzantine fault tolerant protocols, it is timely
and important to understand how Generalized Paxos can be implemented in the
Byzantine model. In this paper, we make two main contributions. First, we
provide a description of Generalized Paxos that is easier to understand, based
on a simpler specification and the pseudocode for a solution that can be
readily implemented. Second, we extend the protocol to the Byzantine fault
model.
|
[
{
"version": "v1",
"created": "Thu, 24 Aug 2017 23:22:05 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Sep 2017 23:17:51 GMT"
},
{
"version": "v3",
"created": "Thu, 19 Oct 2017 19:03:01 GMT"
}
] | 2017-10-23T00:00:00 |
[
[
"Pires",
"Miguel",
""
],
[
"Ravi",
"Srivatsan",
""
],
[
"Rodrigues",
"Rodrigo",
""
]
] |
new_dataset
| 0.999487 |
1710.07328
|
Ian Gemp
|
Ian Gemp, Sridhar Mahadevan
|
Online Monotone Games
| null | null | null | null |
cs.GT cs.LG math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Algorithmic game theory (AGT) focuses on the design and analysis of
algorithms for interacting agents, with interactions rigorously formalized
within the framework of games. Results from AGT find applications in domains
such as online bidding auctions for web advertisements and network routing
protocols. Monotone games are games where agent strategies naturally converge
to an equilibrium state. Previous results in AGT have been obtained for convex,
socially-convex, or smooth games, but not monotone games. Our primary
theoretical contributions are defining the monotone game setting and its
extension to the online setting, a new notion of regret for this setting, and
accompanying algorithms that achieve sub-linear regret. We demonstrate the
utility of online monotone game theory on a variety of problem domains
including variational inequalities, reinforcement learning, and generative
adversarial networks.
|
[
{
"version": "v1",
"created": "Thu, 19 Oct 2017 19:31:56 GMT"
}
] | 2017-10-23T00:00:00 |
[
[
"Gemp",
"Ian",
""
],
[
"Mahadevan",
"Sridhar",
""
]
] |
new_dataset
| 0.954859 |
1710.07346
|
Zhu Shizhan
|
Shizhan Zhu, Sanja Fidler, Raquel Urtasun, Dahua Lin, Chen Change Loy
|
Be Your Own Prada: Fashion Synthesis with Structural Coherence
|
This is the updated version of our original paper appeared in ICCV
2017 proceedings
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
We present a novel and effective approach for generating new clothing on a
wearer through generative adversarial learning. Given an input image of a
person and a sentence describing a different outfit, our model "redresses" the
person as desired, while at the same time keeping the wearer and her/his pose
unchanged. Generating new outfits with precise regions conforming to a language
description while retaining wearer's body structure is a new challenging task.
Existing generative adversarial networks are not ideal in ensuring global
coherence of structure given both the input photograph and language description
as conditions. We address this challenge by decomposing the complex generative
process into two conditional stages. In the first stage, we generate a
plausible semantic segmentation map that obeys the wearer's pose as a latent
spatial arrangement. An effective spatial constraint is formulated to guide the
generation of this semantic segmentation map. In the second stage, a generative
model with a newly proposed compositional mapping layer is used to render the
final image with precise regions and textures conditioned on this map. We
extended the DeepFashion dataset [8] by collecting sentence descriptions for
79K images. We demonstrate the effectiveness of our approach through both
quantitative and qualitative evaluations. A user study is also conducted. The
codes and the data are available at http://mmlab.ie.cuhk.
edu.hk/projects/FashionGAN/.
|
[
{
"version": "v1",
"created": "Thu, 19 Oct 2017 20:46:26 GMT"
}
] | 2017-10-23T00:00:00 |
[
[
"Zhu",
"Shizhan",
""
],
[
"Fidler",
"Sanja",
""
],
[
"Urtasun",
"Raquel",
""
],
[
"Lin",
"Dahua",
""
],
[
"Loy",
"Chen Change",
""
]
] |
new_dataset
| 0.983655 |
1710.07368
|
Bichen Wu
|
Bichen Wu, Alvin Wan, Xiangyu Yue and Kurt Keutzer
|
SqueezeSeg: Convolutional Neural Nets with Recurrent CRF for Real-Time
Road-Object Segmentation from 3D LiDAR Point Cloud
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we address semantic segmentation of road-objects from 3D LiDAR
point clouds. In particular, we wish to detect and categorize instances of
interest, such as cars, pedestrians and cyclists. We formulate this problem as
a point- wise classification problem, and propose an end-to-end pipeline called
SqueezeSeg based on convolutional neural networks (CNN): the CNN takes a
transformed LiDAR point cloud as input and directly outputs a point-wise label
map, which is then refined by a conditional random field (CRF) implemented as a
recurrent layer. Instance-level labels are then obtained by conventional
clustering algorithms. Our CNN model is trained on LiDAR point clouds from the
KITTI dataset, and our point-wise segmentation labels are derived from 3D
bounding boxes from KITTI. To obtain extra training data, we built a LiDAR
simulator into Grand Theft Auto V (GTA-V), a popular video game, to synthesize
large amounts of realistic training data. Our experiments show that SqueezeSeg
achieves high accuracy with astonishingly fast and stable runtime (8.7 ms per
frame), highly desirable for autonomous driving applications. Furthermore,
additionally training on synthesized data boosts validation accuracy on
real-world data. Our source code and synthesized data will be open-sourced.
|
[
{
"version": "v1",
"created": "Thu, 19 Oct 2017 23:03:33 GMT"
}
] | 2017-10-23T00:00:00 |
[
[
"Wu",
"Bichen",
""
],
[
"Wan",
"Alvin",
""
],
[
"Yue",
"Xiangyu",
""
],
[
"Keutzer",
"Kurt",
""
]
] |
new_dataset
| 0.991116 |
1710.07386
|
Travis Baumbaugh
|
Travis Baumbaugh, Yariana Diaz, Sophia Friesenhahn, Felice
Manganiello, and Alexander Vetter
|
Batch Codes from Hamming and Reed-M\"uller Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Batch codes, introduced by Ishai et al. encode a string $x \in \Sigma^{k}$
into an $m$-tuple of strings, called buckets. In this paper we consider
multiset batch codes wherein a set of $t$-users wish to access one bit of
information each from the original string. We introduce a concept of optimal
batch codes. We first show that binary Hamming codes are optimal batch codes.
The main body of this work provides batch properties of Reed-M\"uller codes. We
look at locality and availability properties of first order Reed-M\"uller codes
over any finite field. We then show that binary first order Reed-M\"uller codes
are optimal batch codes when the number of users is 4 and generalize our study
to the family of binary Reed-M\"uller codes which have order less than half
their length.
|
[
{
"version": "v1",
"created": "Fri, 20 Oct 2017 01:02:43 GMT"
}
] | 2017-10-23T00:00:00 |
[
[
"Baumbaugh",
"Travis",
""
],
[
"Diaz",
"Yariana",
""
],
[
"Friesenhahn",
"Sophia",
""
],
[
"Manganiello",
"Felice",
""
],
[
"Vetter",
"Alexander",
""
]
] |
new_dataset
| 0.999805 |
1710.07477
|
Cheng-Sheng Chan
|
Tz-Ying Wu, Ting-An Chien, Cheng-Sheng Chan, Chan-Wei Hu, Min Sun
|
Anticipating Daily Intention using On-Wrist Motion Triggered Sensing
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Anticipating human intention by observing one's actions has many
applications. For instance, picking up a cellphone, then a charger (actions)
implies that one wants to charge the cellphone (intention). By anticipating the
intention, an intelligent system can guide the user to the closest power
outlet. We propose an on-wrist motion triggered sensing system for anticipating
daily intentions, where the on-wrist sensors help us to persistently observe
one's actions. The core of the system is a novel Recurrent Neural Network (RNN)
and Policy Network (PN), where the RNN encodes visual and motion observation to
anticipate intention, and the PN parsimoniously triggers the process of visual
observation to reduce computation requirement. We jointly trained the whole
network using policy gradient and cross-entropy loss. To evaluate, we collect
the first daily "intention" dataset consisting of 2379 videos with 34
intentions and 164 unique action sequences. Our method achieves 92.68%, 90.85%,
97.56% accuracy on three users while processing only 29% of the visual
observation on average.
|
[
{
"version": "v1",
"created": "Fri, 20 Oct 2017 10:39:58 GMT"
}
] | 2017-10-23T00:00:00 |
[
[
"Wu",
"Tz-Ying",
""
],
[
"Chien",
"Ting-An",
""
],
[
"Chan",
"Cheng-Sheng",
""
],
[
"Hu",
"Chan-Wei",
""
],
[
"Sun",
"Min",
""
]
] |
new_dataset
| 0.953108 |
1710.06905
|
Constantine Kontokosta
|
Constantine Kontokosta (New York University), Boyeong Hong (New York
University), Awais Malik (New York University), Ira M. Bellach (Women in Need
NYC), Xueqi Huang (New York University), Kristi Korsberg (New York
University), Dara Perl (New York University), Avikal Somvanshi (New York
University)
|
Predictors of Re-admission for Homeless Families in New York City: The
Case of the Win Shelter Network
|
Presented at the Data For Good Exchange 2017
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
New York City faces the challenge of an ever-increasing homeless population
with almost 60,000 people currently living in city shelters. In 2015,
approximately 25% of families stayed longer than 9 months in a shelter, and 17%
of families with children that exited a homeless shelter returned to the
shelter system within 30 days of leaving. This suggests that "long-term"
shelter residents and those that re-enter shelters contribute significantly to
the rise of the homeless population living in city shelters and indicate
systemic challenges to finding adequate permanent housing. Women in Need (Win)
is a non-profit agency that provides shelter to almost 10,000 homeless women
and children (10% of all homeless families of NYC), and is the largest homeless
shelter provider in the City. This paper focuses on our preliminary work with
Win to understand the factors that affect the rate of readmission of homeless
families at Win shelters, and to predict the likelihood of re-entry into the
shelter system on exit. These insights will enable improved service delivery
and operational efficiencies at these shelters. This paper describes our recent
efforts to integrate Win datasets with city records to create a unified,
comprehensive database of the homeless population being served by Win shelters.
A preliminary classification model is developed to predict the odds of
readmission and length of shelter stay based on the demographic and
socioeconomic characteristics of the homeless population served by Win. This
work is intended to form the basis for establishing a network of "smart
shelters" through the use of data science and data technologies.
|
[
{
"version": "v1",
"created": "Wed, 18 Oct 2017 19:31:43 GMT"
}
] | 2017-10-20T00:00:00 |
[
[
"Kontokosta",
"Constantine",
"",
"New York University"
],
[
"Hong",
"Boyeong",
"",
"New York\n University"
],
[
"Malik",
"Awais",
"",
"New York University"
],
[
"Bellach",
"Ira M.",
"",
"Women in Need\n NYC"
],
[
"Huang",
"Xueqi",
"",
"New York University"
],
[
"Korsberg",
"Kristi",
"",
"New York\n University"
],
[
"Perl",
"Dara",
"",
"New York University"
],
[
"Somvanshi",
"Avikal",
"",
"New York\n University"
]
] |
new_dataset
| 0.964574 |
1710.07132
|
Micha{\l} Karpi\'nski
|
Micha{\l} Karpi\'nski and Krzysztof Piecuch
|
On vertex coloring without monochromatic triangles
|
Extended abstract
| null | null | null |
cs.DS cs.CC math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a certain relaxation of the classic vertex coloring problem, namely,
a coloring of vertices of undirected, simple graphs, such that there are no
monochromatic triangles. We give the first classification of the problem in
terms of classic and parametrized algorithms. Several computational complexity
results are also presented, which improve on the previous results found in the
literature. We propose the new structural parameter for undirected, simple
graphs -- the triangle-free chromatic number $\chi_3$. We bound $\chi_3$ by
other known structural parameters. We also present two classes of graphs with
interesting coloring properties, that play pivotal role in proving useful
observation about our problem. We give/ask several conjectures/questions
throughout this paper to encourage new research in the area of graph coloring.
|
[
{
"version": "v1",
"created": "Thu, 19 Oct 2017 13:24:58 GMT"
}
] | 2017-10-20T00:00:00 |
[
[
"Karpiński",
"Michał",
""
],
[
"Piecuch",
"Krzysztof",
""
]
] |
new_dataset
| 0.986901 |
1710.07145
|
Andrzej Pelc
|
Andrzej Pelc
|
Reaching a Target in the Plane with no Information
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A mobile agent has to reach a target in the Euclidean plane. Both the agent
and the target are modeled as points. In the beginning, the agent is at
distance at most $D>0$ from the target. Reaching the target means that the
agent gets at a {\em sensing distance} at most $r>0$ from it. The agent has a
measure of length and a compass. We consider two scenarios: in the {\em static}
scenario the target is inert, and in the {\em dynamic} scenario it may move
arbitrarily at any (possibly varying) speed bounded by $v$. The agent has no
information about the parameters of the problem, in particular it does not know
$D$, $r$ or $v$. The goal is to reach the target at lowest possible cost,
measured by the total length of the trajectory of the agent.
Our main result is establishing the minimum cost (up to multiplicative
constants) of reaching the target under both scenarios, and providing the
optimal algorithm for the agent. For the static scenario the minimum cost is
$\Theta((\log D + \log \frac{1}{r}) D^2/r)$, and for the dynamic scenario it is
$\Theta((\log M + \log \frac{1}{r}) M^2/r)$, where $M=\max(D,v)$. Under the
latter scenario, the speed of the agent in our algorithm grows exponentially
with time, and we prove that for an agent whose speed grows only polynomially
with time, this cost is impossible to achieve.
|
[
{
"version": "v1",
"created": "Thu, 19 Oct 2017 13:53:51 GMT"
}
] | 2017-10-20T00:00:00 |
[
[
"Pelc",
"Andrzej",
""
]
] |
new_dataset
| 0.977319 |
1710.07147
|
Aschkan Omidvar
|
Aschkan Omidvar, Eren Erman Ozguven, O. Arda Vanli, R.
Tavakkoli-Moghaddam
|
A Two-Phase Safe Vehicle Routing and Scheduling Problem: Formulations
and Solution Algorithms
| null | null | null | null |
cs.AI cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a two phase time dependent vehicle routing and scheduling
optimization model that identifies the safest routes, as a substitute for the
classical objectives given in the literature such as shortest distance or
travel time, through (1) avoiding recurring congestions, and (2) selecting
routes that have a lower probability of crash occurrences and non-recurring
congestion caused by those crashes. In the first phase, we solve a
mixed-integer programming model which takes the dynamic speed variations into
account on a graph of roadway networks according to the time of day, and
identify the routing of a fleet and sequence of nodes on the safest feasible
paths. Second phase considers each route as an independent transit path (fixed
route with fixed node sequences), and tries to avoid congestion by rescheduling
the departure times of each vehicle from each node, and by adjusting the
sub-optimal speed on each arc. A modified simulated annealing (SA) algorithm is
formulated to solve both complex models iteratively, which is found to be
capable of providing solutions in a considerably short amount of time.
|
[
{
"version": "v1",
"created": "Wed, 18 Oct 2017 01:58:19 GMT"
}
] | 2017-10-20T00:00:00 |
[
[
"Omidvar",
"Aschkan",
""
],
[
"Ozguven",
"Eren Erman",
""
],
[
"Vanli",
"O. Arda",
""
],
[
"Tavakkoli-Moghaddam",
"R.",
""
]
] |
new_dataset
| 0.997046 |
1710.07191
|
Oded Padon
|
Oded Padon, Giuliano Losa, Mooly Sagiv, Sharon Shoham
|
Paxos Made EPR: Decidable Reasoning about Distributed Protocols
|
61 pages. Full version of paper by the same title presented in OOPSLA
2017
| null | null | null |
cs.PL cs.DC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed protocols such as Paxos play an important role in many computer
systems. Therefore, a bug in a distributed protocol may have tremendous
effects. Accordingly, a lot of effort has been invested in verifying such
protocols. However, checking invariants of such protocols is undecidable and
hard in practice, as it requires reasoning about an unbounded number of nodes
and messages. Moreover, protocol actions and invariants involve both quantifier
alternations and higher-order concepts such as set cardinalities and
arithmetic.
This paper makes a step towards automatic verification of such protocols. We
aim at a technique that can verify correct protocols and identify bugs in
incorrect protocols. To this end, we develop a methodology for deductive
verification based on effectively propositional logic (EPR)---a decidable
fragment of first-order logic (also known as the Bernays-Sch\"onfinkel-Ramsey
class). In addition to decidability, EPR also enjoys the finite model property,
allowing to display violations as finite structures which are intuitive for
users. Our methodology involves modeling protocols using general
(uninterpreted) first-order logic, and then systematically transforming the
model to obtain a model and an inductive invariant that are decidable to check.
The steps of the transformations are also mechanically checked, ensuring the
soundness of the method. We have used our methodology to verify the safety of
Paxos, and several of its variants, including Multi-Paxos, Vertical Paxos, Fast
Paxos, Flexible Paxos and Stoppable Paxos. To the best of our knowledge, this
work is the first to verify these protocols using a decidable logic, and the
first formal verification of Vertical Paxos, Fast Paxos and Stoppable Paxos.
|
[
{
"version": "v1",
"created": "Thu, 19 Oct 2017 15:37:42 GMT"
}
] | 2017-10-20T00:00:00 |
[
[
"Padon",
"Oded",
""
],
[
"Losa",
"Giuliano",
""
],
[
"Sagiv",
"Mooly",
""
],
[
"Shoham",
"Sharon",
""
]
] |
new_dataset
| 0.987617 |
1710.07198
|
Noa Garcia
|
Noa Garcia and George Vogiatzis
|
Dress like a Star: Retrieving Fashion Products from Videos
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work proposes a system for retrieving clothing and fashion products from
video content. Although films and television are the perfect showcase for
fashion brands to promote their products, spectators are not always aware of
where to buy the latest trends they see on screen. Here, a framework for
breaking the gap between fashion products shown on videos and users is
presented. By relating clothing items and video frames in an indexed database
and performing frame retrieval with temporal aggregation and fast indexing
techniques, we can find fashion products from videos in a simple and
non-intrusive way. Experiments in a large-scale dataset conducted here show
that, by using the proposed framework, memory requirements can be reduced by
42.5X with respect to linear search, whereas accuracy is maintained at around
90%.
|
[
{
"version": "v1",
"created": "Thu, 19 Oct 2017 15:45:32 GMT"
}
] | 2017-10-20T00:00:00 |
[
[
"Garcia",
"Noa",
""
],
[
"Vogiatzis",
"George",
""
]
] |
new_dataset
| 0.998846 |
1701.00879
|
Xingyi Zhang
|
Ye Tian, Ran Cheng, Xingyi Zhang and Yaochu Jin
|
PlatEMO: A MATLAB Platform for Evolutionary Multi-Objective Optimization
|
20 pages, 12 figures, 4 tables
|
IEEE Computational Intelligence Magazine, 2017, 12(4): 73-87
| null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Over the last three decades, a large number of evolutionary algorithms have
been developed for solving multiobjective optimization problems. However, there
lacks an up-to-date and comprehensive software platform for researchers to
properly benchmark existing algorithms and for practitioners to apply selected
algorithms to solve their real-world problems. The demand of such a common tool
becomes even more urgent, when the source code of many proposed algorithms has
not been made publicly available. To address these issues, we have developed a
MATLAB platform for evolutionary multi-objective optimization in this paper,
called PlatEMO, which includes more than 50 multi-objective evolutionary
algorithms and more than 100 multi-objective test problems, along with several
widely used performance indicators. With a user-friendly graphical user
interface, PlatEMO enables users to easily compare several evolutionary
algorithms at one time and collect statistical results in Excel or LaTeX files.
More importantly, PlatEMO is completely open source, such that users are able
to develop new algorithms on the basis of it. This paper introduces the main
features of PlatEMO and illustrates how to use it for performing comparative
experiments, embedding new algorithms, creating new test problems, and
developing performance indicators. Source code of PlatEMO is now available at:
http://bimk.ahu.edu.cn/index.php?s=/Index/Software/index.html.
|
[
{
"version": "v1",
"created": "Wed, 4 Jan 2017 00:52:49 GMT"
}
] | 2017-10-19T00:00:00 |
[
[
"Tian",
"Ye",
""
],
[
"Cheng",
"Ran",
""
],
[
"Zhang",
"Xingyi",
""
],
[
"Jin",
"Yaochu",
""
]
] |
new_dataset
| 0.997524 |
1702.07146
|
Manuel Mazzara
|
Daniel de Carvalho, Manuel Mazzara, Bogdan Mingela, Larisa Safina,
Alexander Tchitchigin, Nikolay Troshkov
|
Jolie Static Type Checker: a prototype
|
Modeling and Analysis of Information Systems, 2017
| null | null | null |
cs.SE cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Static verification of a program source code correctness is an important
element of software reliability. Formal verification of software programs
involves proving that a program satisfies a formal specification of its
behavior. Many languages use both static and dynamic type checking. With such
approach, the static type checker verifies everything possible at compile time,
and dynamic checks the remaining. The current state of the Jolie programming
language includes a dynamic type system. Consequently, it allows avoidable
run-time errors. A static type system for the language has been formally
defined on paper but lacks an implementation yet. In this paper, we describe a
prototype of Jolie Static Type Checker (JSTC), which employs a technique based
on a SMT solver. We describe the theory behind and the implementation, and the
process of static analysis.
|
[
{
"version": "v1",
"created": "Thu, 23 Feb 2017 09:38:11 GMT"
},
{
"version": "v2",
"created": "Sat, 16 Sep 2017 08:20:53 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Sep 2017 07:51:20 GMT"
},
{
"version": "v4",
"created": "Wed, 20 Sep 2017 11:30:33 GMT"
},
{
"version": "v5",
"created": "Wed, 18 Oct 2017 15:53:47 GMT"
}
] | 2017-10-19T00:00:00 |
[
[
"de Carvalho",
"Daniel",
""
],
[
"Mazzara",
"Manuel",
""
],
[
"Mingela",
"Bogdan",
""
],
[
"Safina",
"Larisa",
""
],
[
"Tchitchigin",
"Alexander",
""
],
[
"Troshkov",
"Nikolay",
""
]
] |
new_dataset
| 0.999647 |
1707.04084
|
Joey Zaoyuan Ge
|
Joey Z. Ge, Ariel A. Calder\'on, N\'estor O. P\'erez-Arancibia
|
An Earthworm-Inspired Soft Crawling Robot Controlled by Friction
|
8 pages, 9 figures, 1 table
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the modeling, design, fabrication and feedback control of an
earthworm-inspired soft robot capable of crawling on surfaces by actively
manipulating the frictional force between its body and the surface. Earthworms
are segmented worms composed of repeating units known as metameres. The muscle
and setae structure embedded in each individual metamere makes possible its
peristaltic locomotion both under and above ground. Here, we propose a
pneumatically-driven soft robotic system made of parts analogous to the muscle
and setae structure and can replicate the crawling motion of a single earthworm
metamere. A model is also introduced to describe the crawling dynamics of the
proposed robotic system and proven be controllable. Robust crawling locomotion
is then experimentally verified.
|
[
{
"version": "v1",
"created": "Wed, 12 Jul 2017 00:36:48 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Jul 2017 00:04:00 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Oct 2017 02:17:08 GMT"
}
] | 2017-10-19T00:00:00 |
[
[
"Ge",
"Joey Z.",
""
],
[
"Calderón",
"Ariel A.",
""
],
[
"Pérez-Arancibia",
"Néstor O.",
""
]
] |
new_dataset
| 0.99943 |
1707.04202
|
Jiancao Hou
|
Jiancao Hou, Sandeep Narayanan, Yi Ma, and Mohammad Shikh-Bahaei
|
Multi-Antenna Assisted Virtual Full-Duplex Relaying with
Reliability-Aware Iterative Decoding
|
6 pages, 4 figures, conference paper has been submitted
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a multi-antenna assisted virtual full-duplex (FD) relaying
with reliability-aware iterative decoding at destination node is proposed to
improve system spectral efficiency and reliability. This scheme enables two
half-duplex relay nodes, mimicked as FD relaying, to alternatively serve as
transmitter and receiver to relay their decoded data signals regardless the
decoding errors, meanwhile, cancel the inter-relay interference with
QR-decomposition. Then, by deploying the reliability-aware iterative
detection/decoding process, destination node can efficiently mitigate
inter-frame interference and error propagation effect at the same time.
Simulation results show that, without extra cost of time delay and signalling
overhead, our proposed scheme outperforms the conventional selective
decode-and-forward (S-DF) relaying schemes, such as cyclic redundancy check
based S-DF relaying and threshold based S-DF relaying, by up to 8 dB in terms
of bit-error-rate.
|
[
{
"version": "v1",
"created": "Thu, 13 Jul 2017 16:23:09 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Oct 2017 16:20:03 GMT"
}
] | 2017-10-19T00:00:00 |
[
[
"Hou",
"Jiancao",
""
],
[
"Narayanan",
"Sandeep",
""
],
[
"Ma",
"Yi",
""
],
[
"Shikh-Bahaei",
"Mohammad",
""
]
] |
new_dataset
| 0.973794 |
1708.03979
|
Mahyar Najibi
|
Mahyar Najibi, Pouya Samangouei, Rama Chellappa, Larry Davis
|
SSH: Single Stage Headless Face Detector
|
International Conference on Computer Vision (ICCV) 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the Single Stage Headless (SSH) face detector. Unlike two stage
proposal-classification detectors, SSH detects faces in a single stage directly
from the early convolutional layers in a classification network. SSH is
headless. That is, it is able to achieve state-of-the-art results while
removing the "head" of its underlying classification network -- i.e. all fully
connected layers in the VGG-16 which contains a large number of parameters.
Additionally, instead of relying on an image pyramid to detect faces with
various scales, SSH is scale-invariant by design. We simultaneously detect
faces with different scales in a single forward pass of the network, but from
different layers. These properties make SSH fast and light-weight.
Surprisingly, with a headless VGG-16, SSH beats the ResNet-101-based
state-of-the-art on the WIDER dataset. Even though, unlike the current
state-of-the-art, SSH does not use an image pyramid and is 5X faster. Moreover,
if an image pyramid is deployed, our light-weight network achieves
state-of-the-art on all subsets of the WIDER dataset, improving the AP by 2.5%.
SSH also reaches state-of-the-art results on the FDDB and Pascal-Faces datasets
while using a small input size, leading to a runtime of 50 ms/image on a GPU.
The code is available at https://github.com/mahyarnajibi/SSH.
|
[
{
"version": "v1",
"created": "Mon, 14 Aug 2017 01:12:24 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Sep 2017 20:04:56 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Oct 2017 00:07:03 GMT"
}
] | 2017-10-19T00:00:00 |
[
[
"Najibi",
"Mahyar",
""
],
[
"Samangouei",
"Pouya",
""
],
[
"Chellappa",
"Rama",
""
],
[
"Davis",
"Larry",
""
]
] |
new_dataset
| 0.999125 |
1709.07166
|
Benjamin Johnston
|
Benjamin Johnston, Alistair McEwan and Philip de Chazal
|
Semi-Automated Nasal PAP Mask Sizing using Facial Photographs
|
4 pages, 3 figures, 4 tables, IEEE Engineering Medicine and Biology
Conference 2017
| null |
10.1109/EMBC.2017.8037049
| null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
We present a semi-automated system for sizing nasal Positive Airway Pressure
(PAP) masks based upon a neural network model that was trained with facial
photographs of both PAP mask users and non-users. It demonstrated an accuracy
of 72% in correctly sizing a mask and 96% accuracy sizing to within 1 mask size
group. The semi-automated system performed comparably to sizing from manual
measurements taken from the same images which produced 89% and 100% accuracy
respectively.
|
[
{
"version": "v1",
"created": "Thu, 21 Sep 2017 06:08:58 GMT"
}
] | 2017-10-19T00:00:00 |
[
[
"Johnston",
"Benjamin",
""
],
[
"McEwan",
"Alistair",
""
],
[
"de Chazal",
"Philip",
""
]
] |
new_dataset
| 0.988244 |
1710.06518
|
Michel Meneses
|
Michel Conrado Cardoso Meneses
|
Sistema de Navega\c{c}\~ao Aut\^onomo Baseado em Vis\~ao Computacional
|
in Portuguese. Thesis presented to the Federal University of Sergipe,
at Sergipe, Brazil in partial fulfillment of the requirement for the degree
of Bachelor of Science in Computer Engineering. A demonstration of this
project can be watched by this link: https://youtu.be/hzyKAGhQExg Advisors:
Dr. Leonardo Nogueira Matos, Dr. Bruno Otavio Piedade Prado
| null | null | null |
cs.RO cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Autonomous robots are used as the tool to solve many kinds of problems, such
as environmental mapping and monitoring. Either for adverse conditions related
to the human presence or even for the need to reduce costs, it is certain that
many efforts have been made to develop robots with an increasingly high level
of autonomy. They must be capable of locomotion through dynamic environments,
without human operators or assistant systems' help. It is noted, thus, that the
form of perception and modeling of the environment becomes significantly
relevant to navigation. Among the main sensing methods are those based on
vision. Through this, it is possible to create highly-detailed models about the
environment, since many characteristics can be measured, such as texture,
color, and illumination. However, the most accurate vision-based navigation
techniques are computationally expensive to run on low-cost mobile platforms.
Therefore, the goal of this work was to develop a low-cost robot, controlled by
a Raspberry Pi, whose navigation system is based on vision. For this purpose,
the strategy used consisted in identifying obstacles via optical flow pattern
recognition. Through this signal, it is possible to infer the relative
displacement between the robot and other elements in the environment. Its
estimation was done using the Lucas-Kanade algorithm, which can be executed by
the Raspberry Pi without harming its performance. Finally, an SVM based
classifier was used to identify patterns of this signal associated with
obstacles movement. The developed system was evaluated considering its
execution over an optical flow pattern dataset extracted from a real navigation
environment. In the end, it was verified that the processing frequency of the
system was superior to the others. Furthermore, its accuracy and acquisition
cost were, respectively, higher and lower than most of the cited works.
|
[
{
"version": "v1",
"created": "Tue, 17 Oct 2017 22:37:07 GMT"
}
] | 2017-10-19T00:00:00 |
[
[
"Meneses",
"Michel Conrado Cardoso",
""
]
] |
new_dataset
| 0.999674 |
1710.06711
|
Raluca Diaconu
|
Raluca Diaconu, Jean Bacon, Jie Deng, Jatinder Singh
|
ComFlux: External Composition and Adaptation of Pervasive Applications
| null | null | null | null |
cs.CY cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Technology is becoming increasingly pervasive. At present, the system
components working together to provide functionality, be they purely software
or with a physical element, tend to operate within silos, bound to a particular
application or usage.
This is counter to the wider vision of pervasive computing, where a
potentially limitless number of applications can be realised through the
dynamic and seamless interactions of system components. We believe this
application composition should be externally controlled, driven by policy and
subject to access control. We present ComFlux, our open source middleware, and
show through a number of designs and implementations, how it supports this
functionality with acceptable overhead.
|
[
{
"version": "v1",
"created": "Wed, 18 Oct 2017 12:58:51 GMT"
}
] | 2017-10-19T00:00:00 |
[
[
"Diaconu",
"Raluca",
""
],
[
"Bacon",
"Jean",
""
],
[
"Deng",
"Jie",
""
],
[
"Singh",
"Jatinder",
""
]
] |
new_dataset
| 0.995158 |
1710.06831
|
Pooyan Fazli
|
Utkarsh Patel, Emre Hatay, Mike D'Arcy, Ghazal Zand, and Pooyan Fazli
|
Setting Up the Beam for Human-Centered Service Tasks
|
10 pages
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the Beam, a collaborative autonomous mobile service robot, based
on SuitableTech's Beam telepresence system. We present a set of enhancements to
the telepresence system, including autonomy, human awareness, increased
computation and sensing capabilities, and integration with the popular Robot
Operating System (ROS) framework. Together, our improvements transform the Beam
into a low-cost platform for research on service robots. We examine the Beam on
target search and object delivery tasks and demonstrate that the robot achieves
a 100% success rate.
|
[
{
"version": "v1",
"created": "Wed, 18 Oct 2017 17:17:04 GMT"
}
] | 2017-10-19T00:00:00 |
[
[
"Patel",
"Utkarsh",
""
],
[
"Hatay",
"Emre",
""
],
[
"D'Arcy",
"Mike",
""
],
[
"Zand",
"Ghazal",
""
],
[
"Fazli",
"Pooyan",
""
]
] |
new_dataset
| 0.988413 |
1702.06086
|
Wei Shen
|
Wei Shen, Kai Zhao, Yilu Guo, Alan Yuille
|
Label Distribution Learning Forests
|
Accepted by NIPS2017
| null | null | null |
cs.LG cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Label distribution learning (LDL) is a general learning framework, which
assigns to an instance a distribution over a set of labels rather than a single
label or multiple labels. Current LDL methods have either restricted
assumptions on the expression form of the label distribution or limitations in
representation learning, e.g., to learn deep features in an end-to-end manner.
This paper presents label distribution learning forests (LDLFs) - a novel label
distribution learning algorithm based on differentiable decision trees, which
have several advantages: 1) Decision trees have the potential to model any
general form of label distributions by a mixture of leaf node predictions. 2)
The learning of differentiable decision trees can be combined with
representation learning. We define a distribution-based loss function for a
forest, enabling all the trees to be learned jointly, and show that an update
function for leaf node predictions, which guarantees a strict decrease of the
loss function, can be derived by variational bounding. The effectiveness of the
proposed LDLFs is verified on several LDL tasks and a computer vision
application, showing significant improvements to the state-of-the-art LDL
methods.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2017 18:04:31 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Jul 2017 19:17:32 GMT"
},
{
"version": "v3",
"created": "Wed, 20 Sep 2017 06:48:22 GMT"
},
{
"version": "v4",
"created": "Mon, 16 Oct 2017 21:05:45 GMT"
}
] | 2017-10-18T00:00:00 |
[
[
"Shen",
"Wei",
""
],
[
"Zhao",
"Kai",
""
],
[
"Guo",
"Yilu",
""
],
[
"Yuille",
"Alan",
""
]
] |
new_dataset
| 0.995608 |
1710.05981
|
Ming Li
|
Ming Li, Dejun Yang, Jian Lin, Ming Li, and Jian Tang
|
SpecWatch: A Framework for Adversarial Spectrum Monitoring with Unknown
Statistics
| null | null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In cognitive radio networks (CRNs), dynamic spectrum access has been proposed
to improve the spectrum utilization, but it also generates spectrum misuse
problems. One common solution to these problems is to deploy monitors to detect
misbehaviors on certain channel. However, in multi-channel CRNs, it is very
costly to deploy monitors on every channel. With a limited number of monitors,
we have to decide which channels to monitor. In addition, we need to determine
how long to monitor each channel and in which order to monitor, because
switching channels incurs costs. Moreover, the information about the misuse
behavior is not available a priori. To answer those questions, we model the
spectrum monitoring problem as an adversarial multi-armed bandit problem with
switching costs (MAB-SC), propose an effective framework, and design two online
algorithms, SpecWatch-II and SpecWatch-III, based on the same framework. To
evaluate the algorithms, we use weak regret, i.e., the performance difference
between the solution of our algorithm and optimal (fixed) solution in
hindsight, as the metric. We prove that the expected weak regret of
SpecWatch-II is O(T^{2/3}), where T is the time horizon. Whereas, the actual
weak regret of SpecWatch-III is O(T^{2/3}) with probability 1 - {\delta}, for
any {\delta} in (0, 1). Both algorithms guarantee the upper bounds matching the
lower bound of the general adversarial MAB- SC problem. Therefore, they are all
asymptotically optimal.
|
[
{
"version": "v1",
"created": "Mon, 16 Oct 2017 20:07:02 GMT"
}
] | 2017-10-18T00:00:00 |
[
[
"Li",
"Ming",
""
],
[
"Yang",
"Dejun",
""
],
[
"Lin",
"Jian",
""
],
[
"Li",
"Ming",
""
],
[
"Tang",
"Jian",
""
]
] |
new_dataset
| 0.997966 |
1710.06071
|
Franck Dernoncourt
|
Franck Dernoncourt, Ji Young Lee
|
PubMed 200k RCT: a Dataset for Sequential Sentence Classification in
Medical Abstracts
|
Accepted as a conference paper at IJCNLP 2017
| null | null | null |
cs.CL cs.AI stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present PubMed 200k RCT, a new dataset based on PubMed for sequential
sentence classification. The dataset consists of approximately 200,000
abstracts of randomized controlled trials, totaling 2.3 million sentences. Each
sentence of each abstract is labeled with their role in the abstract using one
of the following classes: background, objective, method, result, or conclusion.
The purpose of releasing this dataset is twofold. First, the majority of
datasets for sequential short-text classification (i.e., classification of
short texts that appear in sequences) are small: we hope that releasing a new
large dataset will help develop more accurate algorithms for this task. Second,
from an application perspective, researchers need better tools to efficiently
skim through the literature. Automatically classifying each sentence in an
abstract would help researchers read abstracts more efficiently, especially in
fields where abstracts may be long, such as the medical field.
|
[
{
"version": "v1",
"created": "Tue, 17 Oct 2017 03:22:00 GMT"
}
] | 2017-10-18T00:00:00 |
[
[
"Dernoncourt",
"Franck",
""
],
[
"Lee",
"Ji Young",
""
]
] |
new_dataset
| 0.999858 |
1710.06112
|
Jiawei Hu
|
Jiawei Hu and Qun Liu
|
CASICT Tibetan Word Segmentation System for MLWS2017
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We participated in the MLWS 2017 on Tibetan word segmentation task, our
system is trained in a unrestricted way, by introducing a baseline system and
76w tibetan segmented sentences of ours. In the system character sequence is
processed by the baseline system into word sequence, then a subword unit (BPE
algorithm) split rare words into subwords with its corresponding features,
after that a neural network classifier is adopted to token each subword into
"B,M,E,S" label, in decoding step a simple rule is used to recover a final word
sequence. The candidate system for submition is selected by evaluating the
F-score in dev set pre-extracted from the 76w sentences. Experiment shows that
this method can fix segmentation errors of baseline system and result in a
significant performance gain.
|
[
{
"version": "v1",
"created": "Tue, 17 Oct 2017 06:05:50 GMT"
}
] | 2017-10-18T00:00:00 |
[
[
"Hu",
"Jiawei",
""
],
[
"Liu",
"Qun",
""
]
] |
new_dataset
| 0.995386 |
1710.06146
|
Kostadin Kratchanov
|
Kostadin Kratchanov
|
Cinnamons: A Computation Model Underlying Control Network Programming
|
7th Intl Conf. on Computer Science, Engineering & Applications
(ICCSEA 2017) September 23~24, 2017, Copenhagen, Denmark
| null |
10.5121/csit.2017.71101
| null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give the easily recognizable name "cinnamon" and "cinnamon programming" to
a new computation model intended to form a theoretical foundation for Control
Network Programming (CNP). CNP has established itself as a programming paradigm
combining declarative and imperative features, built-in search engine, powerful
tools for search control that allow easy, intuitive, visual development of
heuristic, nondeterministic, and randomized solutions. We define rigorously the
syntax and semantics of the new model of computation, at the same time trying
to keep clear the intuition behind and to include enough examples. The
purposely simplified theoretical model is then compared to both WHILE-programs
(thus demonstrating its Turing-completeness), and the "real" CNP. Finally,
future research possibilities are mentioned that would eventually extend the
cinnamon programming into the directions of nondeterminism, randomness, and
fuzziness.
|
[
{
"version": "v1",
"created": "Tue, 17 Oct 2017 08:13:10 GMT"
}
] | 2017-10-18T00:00:00 |
[
[
"Kratchanov",
"Kostadin",
""
]
] |
new_dataset
| 0.96364 |
1710.06235
|
Marco Carraro
|
Marco Carraro, Matteo Munaro, Jeff Burke, Emanuele Menegatti
|
Real-time marker-less multi-person 3D pose estimation in RGB-Depth
camera networks
|
Submitted to the 2018 IEEE International Conference on Robotics and
Automation
| null | null | null |
cs.CV cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a novel system to estimate and track the 3D poses of
multiple persons in calibrated RGB-Depth camera networks. The multi-view 3D
pose of each person is computed by a central node which receives the
single-view outcomes from each camera of the network. Each single-view outcome
is computed by using a CNN for 2D pose estimation and extending the resulting
skeletons to 3D by means of the sensor depth. The proposed system is
marker-less, multi-person, independent of background and does not make any
assumption on people appearance and initial pose. The system provides real-time
outcomes, thus being perfectly suited for applications requiring user
interaction. Experimental results show the effectiveness of this work with
respect to a baseline multi-view approach in different scenarios. To foster
research and applications based on this work, we released the source code in
OpenPTrack, an open source project for RGB-D people tracking.
|
[
{
"version": "v1",
"created": "Tue, 17 Oct 2017 12:27:23 GMT"
}
] | 2017-10-18T00:00:00 |
[
[
"Carraro",
"Marco",
""
],
[
"Munaro",
"Matteo",
""
],
[
"Burke",
"Jeff",
""
],
[
"Menegatti",
"Emanuele",
""
]
] |
new_dataset
| 0.998491 |
1710.06288
|
Seokju Lee
|
Seokju Lee, Junsik Kim, Jae Shin Yoon, Seunghak Shin, Oleksandr Bailo,
Namil Kim, Tae-Hee Lee, Hyun Seok Hong, Seung-Hoon Han, In So Kweon
|
VPGNet: Vanishing Point Guided Network for Lane and Road Marking
Detection and Recognition
|
To appear on ICCV 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a unified end-to-end trainable multi-task network
that jointly handles lane and road marking detection and recognition that is
guided by a vanishing point under adverse weather conditions. We tackle rainy
and low illumination conditions, which have not been extensively studied until
now due to clear challenges. For example, images taken under rainy days are
subject to low illumination, while wet roads cause light reflection and distort
the appearance of lane and road markings. At night, color distortion occurs
under limited illumination. As a result, no benchmark dataset exists and only a
few developed algorithms work under poor weather conditions. To address this
shortcoming, we build up a lane and road marking benchmark which consists of
about 20,000 images with 17 lane and road marking classes under four different
scenarios: no rain, rain, heavy rain, and night. We train and evaluate several
versions of the proposed multi-task network and validate the importance of each
task. The resulting approach, VPGNet, can detect and classify lanes and road
markings, and predict a vanishing point with a single forward pass.
Experimental results show that our approach achieves high accuracy and
robustness under various conditions in real-time (20 fps). The benchmark and
the VPGNet model will be publicly available.
|
[
{
"version": "v1",
"created": "Tue, 17 Oct 2017 13:57:29 GMT"
}
] | 2017-10-18T00:00:00 |
[
[
"Lee",
"Seokju",
""
],
[
"Kim",
"Junsik",
""
],
[
"Yoon",
"Jae Shin",
""
],
[
"Shin",
"Seunghak",
""
],
[
"Bailo",
"Oleksandr",
""
],
[
"Kim",
"Namil",
""
],
[
"Lee",
"Tae-Hee",
""
],
[
"Hong",
"Hyun Seok",
""
],
[
"Han",
"Seung-Hoon",
""
],
[
"Kweon",
"In So",
""
]
] |
new_dataset
| 0.999405 |
1710.06372
|
Maher Alharby
|
Maher Alharby and Aad van Moorsel
|
Blockchain-based Smart Contracts: A Systematic Mapping Study
|
Keywords: Blockchain, Smart contracts, Systematic Mapping Study,
Survey
|
Fourth International Conference on Computer Science and
Information Technology (CSIT-2017)
|
10.5121/csit.2017.71011
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An appealing feature of blockchain technology is smart contracts. A smart
contract is executable code that runs on top of the blockchain to facilitate,
execute and enforce an agreement between untrusted parties without the
involvement of a trusted third party. In this paper, we conduct a systematic
mapping study to collect all research that is relevant to smart contracts from
a technical perspective. The aim of doing so is to identify current research
topics and open challenges for future studies in smart contract research. We
extract 24 papers from different scientific databases. The results show that
about two thirds of the papers focus on identifying and tackling smart contract
issues. Four key issues are identified, namely, codifying, security, privacy
and performance issues. The rest of the papers focuses on smart contract
applications or other smart contract related topics. Research gaps that need to
be addressed in future studies are provided.
|
[
{
"version": "v1",
"created": "Tue, 17 Oct 2017 16:39:23 GMT"
}
] | 2017-10-18T00:00:00 |
[
[
"Alharby",
"Maher",
""
],
[
"van Moorsel",
"Aad",
""
]
] |
new_dataset
| 0.998552 |
1710.06390
|
Maria Glenski
|
Maria Glenski, Ellyn Ayton, Dustin Arendt, and Svitlana Volkova
|
Fishing for Clickbaits in Social Images and Texts with
Linguistically-Infused Neural Network Models
|
Pineapplefish Clickbait Detector, Clickbait Challenge 2017
| null | null | null |
cs.LG cs.CL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the results and conclusions of our participation in the
Clickbait Challenge 2017 on automatic clickbait detection in social media. We
first describe linguistically-infused neural network models and identify
informative representations to predict the level of clickbaiting present in
Twitter posts. Our models allow to answer the question not only whether a post
is a clickbait or not, but to what extent it is a clickbait post e.g., not at
all, slightly, considerably, or heavily clickbaity using a score ranging from 0
to 1. We evaluate the predictive power of models trained on varied text and
image representations extracted from tweets. Our best performing model that
relies on the tweet text and linguistic markers of biased language extracted
from the tweet and the corresponding page yields mean squared error (MSE) of
0.04, mean absolute error (MAE) of 0.16 and R2 of 0.43 on the held-out test
data. For the binary classification setup (clickbait vs. non-clickbait), our
model achieved F1 score of 0.69. We have not found that image representations
combined with text yield significant performance improvement yet. Nevertheless,
this work is the first to present preliminary analysis of objects extracted
using Google Tensorflow object detection API from images in clickbait vs.
non-clickbait Twitter posts. Finally, we outline several steps to improve model
performance as a part of the future work.
|
[
{
"version": "v1",
"created": "Tue, 17 Oct 2017 17:00:59 GMT"
}
] | 2017-10-18T00:00:00 |
[
[
"Glenski",
"Maria",
""
],
[
"Ayton",
"Ellyn",
""
],
[
"Arendt",
"Dustin",
""
],
[
"Volkova",
"Svitlana",
""
]
] |
new_dataset
| 0.961675 |
1710.06396
|
Xavier Dahan
|
Xavier Dahan
|
On the bit-size of non-radical triangular sets
|
Extended abstract
| null | null | null |
cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present upper bounds on the bit-size of coefficients of non-radical
lexicographical Groebner bases in purely triangular form (triangular sets) of
dimension zero. This extends a previous work [Dahan-Schost, Issac'2004],
constrained to radical triangular sets; it follows the same technical steps,
based on interpolation. However, key notion of height of varieties is not
available for points with multiplicities; therefore the bounds obtained are
less universal and depend on some input data. We also introduce a related
family of non- monic polynomials that have smaller coefficients, and smaller
bounds. It is not obvious to compute them from the initial triangular set
though.
|
[
{
"version": "v1",
"created": "Tue, 17 Oct 2017 17:07:25 GMT"
}
] | 2017-10-18T00:00:00 |
[
[
"Dahan",
"Xavier",
""
]
] |
new_dataset
| 0.998278 |
1701.05766
|
Osman Tursun
|
Osman Tursun, Cemal Aker, Sinan Kalkan
|
A Large-scale Dataset and Benchmark for Similar Trademark Retrieval
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Trademark retrieval (TR) has become an important yet challenging problem due
to an ever increasing trend in trademark applications and infringement
incidents. There have been many promising attempts for the TR problem, which,
however, fell impracticable since they were evaluated with limited and mostly
trivial datasets. In this paper, we provide a large-scale dataset with
benchmark queries with which different TR approaches can be evaluated
systematically. Moreover, we provide a baseline on this benchmark using the
widely-used methods applied to TR in the literature. Furthermore, we identify
and correct two important issues in TR approaches that were not addressed
before: reversal of contrast, and presence of irrelevant text in trademarks
severely affect the TR methods. Lastly, we applied deep learning, namely,
several popular Convolutional Neural Network models, to the TR problem. To the
best of the authors, this is the first attempt to do so.
|
[
{
"version": "v1",
"created": "Fri, 20 Jan 2017 11:36:30 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Oct 2017 11:44:56 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Tursun",
"Osman",
""
],
[
"Aker",
"Cemal",
""
],
[
"Kalkan",
"Sinan",
""
]
] |
new_dataset
| 0.999718 |
1705.02743
|
Xin Chen
|
Xin Chen and Yu Zhu, Hua Zhou and Liang Diao and Dongyan Wang
|
ChineseFoodNet: A large-scale Image Dataset for Chinese Food Recognition
|
8 pages, 5 figure, 2 tables
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we introduce a new and challenging large-scale food image
dataset called "ChineseFoodNet", which aims to automatically recognizing
pictured Chinese dishes. Most of the existing food image datasets collected
food images either from recipe pictures or selfie. In our dataset, images of
each food category of our dataset consists of not only web recipe and menu
pictures but photos taken from real dishes, recipe and menu as well.
ChineseFoodNet contains over 180,000 food photos of 208 categories, with each
category covering a large variations in presentations of same Chinese food. We
present our efforts to build this large-scale image dataset, including food
category selection, data collection, and data clean and label, in particular
how to use machine learning methods to reduce manual labeling work that is an
expensive process. We share a detailed benchmark of several state-of-the-art
deep convolutional neural networks (CNNs) on ChineseFoodNet. We further propose
a novel two-step data fusion approach referred as "TastyNet", which combines
prediction results from different CNNs with voting method. Our proposed
approach achieves top-1 accuracies of 81.43% on the validation set and 81.55%
on the test set, respectively. The latest dataset is public available for
research and can be achieved at https://sites.google.com/view/chinesefoodnet.
|
[
{
"version": "v1",
"created": "Mon, 8 May 2017 05:16:51 GMT"
},
{
"version": "v2",
"created": "Sat, 23 Sep 2017 01:07:35 GMT"
},
{
"version": "v3",
"created": "Sun, 15 Oct 2017 17:58:08 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Chen",
"Xin",
""
],
[
"Zhu",
"Yu",
""
],
[
"Zhou",
"Hua",
""
],
[
"Diao",
"Liang",
""
],
[
"Wang",
"Dongyan",
""
]
] |
new_dataset
| 0.999885 |
1707.04621
|
Wahab Ali Gulzar Khawaja
|
Wahab Khawaja, Ozgur Ozdemir, and Ismail Guvenc
|
UAV Air-to-Ground Channel Characterization for mmWave Systems
|
Comment: Accepted for 5G Millimeter-Wave Channel Measurement, Models,
and Systems workshop, VTC Fall 2017 Comment: Typo corrected in the x-axis of
Fig. 4 and Fig. 5 on page 3 and page 4
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Communication at mmWave bands carries critical importance for 5G wireless
networks. In this paper, we study the characterization of mmWave air-to-ground
(AG) channels for unmanned aerial vehicle (UAV) communications. In particular,
we use ray tracing simulations using Remcom Wireless InSite software to study
the behavior of AG mmWave bands at two different frequencies: 28~GHz and
60~GHz. Received signal strength (RSS) and root mean square delay spread
(RMS-DS) of multipath components (MPCs) are analyzed for different UAV heights
considering four different environments: urban, suburban, rural, and over sea.
It is observed that the RSS mostly follows the two ray propagation model along
the UAV flight path for higher altitudes. This two ray propagation model is
affected by the presence of high rise scatterers in urban scenario. Moreover,
we present details of a universal serial radio peripheral (USRP) based channel
sounder that can be used for AG channel measurements for mmWave (60 GHz) UAV
communications.
|
[
{
"version": "v1",
"created": "Sat, 1 Jul 2017 23:25:01 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Oct 2017 20:10:17 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Khawaja",
"Wahab",
""
],
[
"Ozdemir",
"Ozgur",
""
],
[
"Guvenc",
"Ismail",
""
]
] |
new_dataset
| 0.997793 |
1709.00751
|
Seung Hyun Son
|
Yeongjin Oh, Seunghyun Son, Gyumin Sim
|
Sushi Dish - Object detection and classification from real images
|
6 pages, 13 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In conveyor belt sushi restaurants, billing is a burdened job because one has
to manually count the number of dishes and identify the color of them to
calculate the price. In a busy situation, there can be a mistake that customers
are overcharged or under-charged. To deal with this problem, we developed a
method that automatically identifies the color of dishes and calculate the
total price using real images. Our method consists of ellipse fitting and
convol-utional neural network. It achieves ellipse detection precision 85% and
recall 96% and classification accuracy 92%.
|
[
{
"version": "v1",
"created": "Sun, 3 Sep 2017 18:02:01 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Oct 2017 16:18:10 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Oh",
"Yeongjin",
""
],
[
"Son",
"Seunghyun",
""
],
[
"Sim",
"Gyumin",
""
]
] |
new_dataset
| 0.983899 |
1709.01786
|
Fatemeh Ghassemi
|
Behnaz Yousefi, Fatemeh Ghassemi
|
An Efficient Loop-free Version of AODVv2
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ad hoc On Demand distance Vector (AODV) routing protocol is one of the most
prominent routing protocol used in Mobile Ad-hoc Networks (MANETs). Due to the
mobility of nodes, there exists many revisions as scenarios leading to the loop
formation were found. We demonstrate the loop freedom property violation of
AODVv2-11, AODVv2-13, and AODVv2-16 through counterexamples. We present our
proposed version of AODVv2 precisely which not only ensures loop freedom but
also improves the performance.
|
[
{
"version": "v1",
"created": "Wed, 6 Sep 2017 11:51:58 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Oct 2017 09:39:51 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Yousefi",
"Behnaz",
""
],
[
"Ghassemi",
"Fatemeh",
""
]
] |
new_dataset
| 0.993256 |
1710.03349
|
Loet Leydesdorff
|
Jordan A Comins, Stephanie A Carmack, Loet Leydesdorff
|
Patent Citation Spectroscopy (PCS): Algorithmic retrieval of landmark
patents
| null | null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One essential component in the construction of patent landscapes in
biomedical research and development (R&D) is identifying the most seminal
patents. Hitherto, the identification of seminal patents required subject
matter experts within biomedical areas. In this brief communication, we report
an analytical method and tool, Patent Citation Spectroscopy (PCS), for rapidly
identifying landmark patents in user-specified areas of biomedical innovation.
PCS mines the cited references within large sets of patents and provides an
estimate of the most historically impactful prior work. The efficacy of PCS is
shown in two case studies of biomedical innovation with clinical relevance: (1)
RNA interference and (2) cholesterol. PCS mined and analyzed 4,065 cited
references related to patents on RNA interference and correctly identified the
foundational patent of this technology, as independently reported by subject
matter experts on RNAi intellectual property. Secondly, PCS was applied to a
broad set of patents dealing with cholesterol - a case study chosen to reflect
a more general, as opposed to expert, patent search query. PCS mined through
11,326 cited references and identified the seminal patent as that for Lipitor,
the groundbreaking medication for treating high cholesterol as well as the pair
of patents underlying Repatha. These cases suggest that PCS provides a useful
method for identifying seminal patents in areas of biomedical innovation and
therapeutics. The interactive tool is free-to-use at: www.leydesdorff.net/pcs/.
|
[
{
"version": "v1",
"created": "Mon, 9 Oct 2017 23:29:43 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Oct 2017 14:01:38 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Comins",
"Jordan A",
""
],
[
"Carmack",
"Stephanie A",
""
],
[
"Leydesdorff",
"Loet",
""
]
] |
new_dataset
| 0.998859 |
1710.05063
|
Derya Malak
|
Derya Malak, Mazin Al-Shalash, and Jeffrey G. Andrews
|
A Distributed Auction Policy for User Association in Device-to-Device
Caching Networks
|
Proc. IEEE PIMRC 2017
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a distributed bidding-aided Matern carrier sense multiple access
(CSMA) policy for device-to-device (D2D) content distribution. The network is
composed of D2D receivers and potential D2D transmitters, i.e., transmitters
are turned on or off by the scheduling algorithm. Each D2D receiver determines
the value of its request, by bidding on the set of potential transmitters in
its communication range. Given a medium access probability, a fraction of the
potential transmitters are jointly scheduled, i.e., turned on, determined
jointly by the auction policy and the power control scheme. The bidding-aided
scheduling algorithm exploits (i) the local demand distribution, (ii) spatial
distribution of D2D node locations, and (iii) the cache configurations of the
potential transmitters. We contrast the performance of the bidding-aided CSMA
policy with other well-known CSMA schemes that do not take into account
(i)-(iii), demonstrate that our algorithm achieves a higher spectral efficiency
in terms of the number of bits transmitted per unit time per unit bandwidth per
user. The gain becomes even more visible under randomized configurations and
requests rather than more skewed placement configurations and deterministic
demand distributions.
|
[
{
"version": "v1",
"created": "Fri, 13 Oct 2017 20:02:12 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Malak",
"Derya",
""
],
[
"Al-Shalash",
"Mazin",
""
],
[
"Andrews",
"Jeffrey G.",
""
]
] |
new_dataset
| 0.99013 |
1710.05121
|
Jeffrey Bosboom
|
Jeffrey Bosboom (MIT CSAIL) and Michael Hoffmann (ETH Zurich)
|
Netrunner Mate-in-1 or -2 is Weakly NP-Hard
|
13 pages, 1 figure
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that deciding whether the Runner can win this turn (mate-in-1) in
the Netrunner card game generalized to allow decks to contain an arbitrary
number of copies of a card is weakly NP-hard. We also prove that deciding
whether the Corp can win within two turns (mate-in-2) in this generalized
Netrunner is weakly NP-hard.
|
[
{
"version": "v1",
"created": "Sat, 14 Oct 2017 01:48:07 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Bosboom",
"Jeffrey",
"",
"MIT CSAIL"
],
[
"Hoffmann",
"Michael",
"",
"ETH Zurich"
]
] |
new_dataset
| 0.987175 |
1710.05174
|
Runmin Cong
|
Runmin Cong, Jianjun Lei, Changqing Zhang, Qingming Huang, Xiaochun
Cao, Chunping Hou
|
Saliency Detection for Stereoscopic Images Based on Depth Confidence
Analysis and Multiple Cues Fusion
|
5 pages, 6 figures, Published on IEEE Signal Processing Letters 2016,
Project URL: https://rmcong.github.io/proj_RGBD_sal.html
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Stereoscopic perception is an important part of human visual system that
allows the brain to perceive depth. However, depth information has not been
well explored in existing saliency detection models. In this letter, a novel
saliency detection method for stereoscopic images is proposed. Firstly, we
propose a measure to evaluate the reliability of depth map, and use it to
reduce the influence of poor depth map on saliency detection. Then, the input
image is represented as a graph, and the depth information is introduced into
graph construction. After that, a new definition of compactness using color and
depth cues is put forward to compute the compactness saliency map. In order to
compensate the detection errors of compactness saliency when the salient
regions have similar appearances with background, foreground saliency map is
calculated based on depth-refined foreground seeds selection mechanism and
multiple cues contrast. Finally, these two saliency maps are integrated into a
final saliency map through weighted-sum method according to their importance.
Experiments on two publicly available stereo datasets demonstrate that the
proposed method performs better than other 10 state-of-the-art approaches.
|
[
{
"version": "v1",
"created": "Sat, 14 Oct 2017 12:34:10 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Cong",
"Runmin",
""
],
[
"Lei",
"Jianjun",
""
],
[
"Zhang",
"Changqing",
""
],
[
"Huang",
"Qingming",
""
],
[
"Cao",
"Xiaochun",
""
],
[
"Hou",
"Chunping",
""
]
] |
new_dataset
| 0.999189 |
1710.05202
|
Juan Caballero
|
Irfan Ul Haq, Sergio Chica, Juan Caballero, Somesh Jha
|
Malware Lineage in the Wild
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Malware lineage studies the evolutionary relationships among malware and has
important applications for malware analysis. A persistent limitation of prior
malware lineage approaches is to consider every input sample a separate malware
version. This is problematic since a majority of malware are packed and the
packing process produces many polymorphic variants (i.e., executables with
different file hash) of the same malware version. Thus, many samples correspond
to the same malware version and it is challenging to identify distinct malware
versions from polymorphic variants. This problem does not manifest in prior
malware lineage approaches because they work on synthetic malware, malware that
are not packed, or packed malware for which unpackers are available. In this
work, we propose a novel malware lineage approach that works on malware samples
collected in the wild. Given a set of malware executables from the same family,
for which no source code is available and which may be packed, our approach
produces a lineage graph where nodes are versions of the family and edges
describe the relationships between versions. To enable our malware lineage
approach, we propose the first technique to identify the versions of a malware
family and a scalable code indexing technique for determining shared functions
between any pair of input samples. We have evaluated the accuracy of our
approach on 13 open-source programs and have applied it to produce lineage
graphs for 10 popular malware families. Our malware lineage graphs achieve on
average a 26 times reduction from number of input samples to number of
versions.
|
[
{
"version": "v1",
"created": "Sat, 14 Oct 2017 16:02:02 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Haq",
"Irfan Ul",
""
],
[
"Chica",
"Sergio",
""
],
[
"Caballero",
"Juan",
""
],
[
"Jha",
"Somesh",
""
]
] |
new_dataset
| 0.994941 |
1710.05231
|
Gilwoo Lee
|
Shushman Choudhury, Yifan Hou, Gilwoo Lee, Siddhartha S. Srinivasa
|
Hybrid DDP in Clutter (CHDDP): Trajectory Optimization for Hybrid
Dynamical System in Cluttered Environments
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an algorithm for obtaining an optimal control policy for hybrid
dynamical systems in cluttered environments. To the best of our knowledge, this
is the first attempt to have a locally optimal solution for this specific
problem setting. Our approach extends an optimal control algorithm for hybrid
dynamical systems in the obstacle-free case to environments with obstacles. Our
method does not require any preset mode sequence or heuristics to prune the
exponential search of mode sequences. By first solving the relaxed problem of
getting an obstacle-free, dynamically feasible trajectory and then solving for
both obstacle-avoidance and optimality, we can generate smooth, locally optimal
control policies. We demonstrate the performance of our algorithm on a
box-pushing example in a number of environments against the baseline of
randomly sampling modes and actions with a Kinodynamic RRT.
|
[
{
"version": "v1",
"created": "Sat, 14 Oct 2017 20:31:14 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Choudhury",
"Shushman",
""
],
[
"Hou",
"Yifan",
""
],
[
"Lee",
"Gilwoo",
""
],
[
"Srinivasa",
"Siddhartha S.",
""
]
] |
new_dataset
| 0.985249 |
1710.05360
|
Michal Szabados
|
Michal Szabados
|
Nivat's conjecture holds for sums of two periodic configurations
|
Accepted for SOFSEM 2018. This version includes an appendix with
proofs. 12 pages + references + appendix
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nivat's conjecture is a long-standing open combinatorial problem. It concerns
two-dimensional configurations, that is, maps $\mathbb Z^2 \rightarrow \mathcal
A$ where $\mathcal A$ is a finite set of symbols. Such configurations are often
understood as colorings of a two-dimensional square grid. Let $P_c(m,n)$ denote
the number of distinct $m \times n$ block patterns occurring in a configuration
$c$. Configurations satisfying $P_c(m,n) \leq mn$ for some $m,n \in \mathbb N$
are said to have low rectangular complexity. Nivat conjectured that such
configurations are necessarily periodic.
Recently, Kari and the author showed that low complexity configurations can
be decomposed into a sum of periodic configurations. In this paper we show that
if there are at most two components, Nivat's conjecture holds. As a corollary
we obtain an alternative proof of a result of Cyr and Kra: If there exist $m,n
\in \mathbb N$ such that $P_c(m,n) \leq mn/2$, then $c$ is periodic. The
technique used in this paper combines the algebraic approach of Kari and the
author with balanced sets of Cyr and Kra.
|
[
{
"version": "v1",
"created": "Sun, 15 Oct 2017 16:24:49 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Szabados",
"Michal",
""
]
] |
new_dataset
| 0.971763 |
1710.05370
|
Erik Velldal
|
Erik Velldal and Lilja {\O}vrelid and Eivind Alexander Bergem and
Cathrine Stadsnes and Samia Touileb and Fredrik J{\o}rgensen
|
NoReC: The Norwegian Review Corpus
|
Pending (non-anonymous) review for LREC 2018
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the Norwegian Review Corpus (NoReC), created for training
and evaluating models for document-level sentiment analysis. The full-text
reviews have been collected from major Norwegian news sources and cover a range
of different domains, including literature, movies, video games, restaurants,
music and theater, in addition to product reviews across a range of categories.
Each review is labeled with a manually assigned score of 1-6, as provided by
the rating of the original author. This first release of the corpus comprises
more than 35,000 reviews. It is distributed using the CoNLL-U format,
pre-processed using UDPipe, along with a rich set of metadata. The work
reported in this paper forms part of the SANT initiative (Sentiment Analysis
for Norwegian Text), a project seeking to provide resources and tools for
sentiment analysis and opinion mining for Norwegian. As resources for sentiment
analysis have so far been unavailable for Norwegian, NoReC represents a highly
valuable and sought-after addition to Norwegian language technology.
|
[
{
"version": "v1",
"created": "Sun, 15 Oct 2017 18:15:35 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Velldal",
"Erik",
""
],
[
"Øvrelid",
"Lilja",
""
],
[
"Bergem",
"Eivind Alexander",
""
],
[
"Stadsnes",
"Cathrine",
""
],
[
"Touileb",
"Samia",
""
],
[
"Jørgensen",
"Fredrik",
""
]
] |
new_dataset
| 0.999625 |
1710.05470
|
P Balasubramanian
|
P Balasubramanian, C Dang, D L Maskell, K Prasad
|
Asynchronous Early Output Section-Carry Based Carry Lookahead Adder with
Alias Carry Logic
| null |
P. Balasubramanian, C. Dang, D.L. Maskell, K. Prasad,
"Asynchronous Early Output Section-Carry Based Carry Lookahead Adder with
Alias Carry Logic," Proc. 30th International Conference on Microelectronics,
pp. 293-298, 2017, Serbia
| null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new asynchronous early output section-carry based carry lookahead adder
(SCBCLA) with alias carry output logic is presented in this paper. To evaluate
the proposed SCBCLA with alias carry logic and to make a comparison with other
CLAs, a 32-bit addition operation is considered. Compared to the
weak-indication SCBCLA with alias logic, the proposed early output SCBCLA with
alias logic reports a 13% reduction in area without any increases in latency
and power dissipation. On the other hand, in comparison with the early output
recursive CLA (RCLA), the proposed early output SCBCLA with alias logic reports
a 16% reduction in latency while occupying almost the same area and dissipating
almost the same average power. All the asynchronous CLAs are
quasi-delay-insensitive designs which incorporate the delay-insensitive
dual-rail data encoding and adhere to the 4-phase return-to-zero handshaking.
The adders were realized and the simulations were performed based on a 32/28nm
CMOS process.
|
[
{
"version": "v1",
"created": "Mon, 16 Oct 2017 02:33:49 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Balasubramanian",
"P",
""
],
[
"Dang",
"C",
""
],
[
"Maskell",
"D L",
""
],
[
"Prasad",
"K",
""
]
] |
new_dataset
| 0.98894 |
1710.05474
|
P Balasubramanian
|
P Balasubramanian, C Dang, D L Maskell, K Prasad
|
Approximate Ripple Carry and Carry Lookahead Adders - A Comparative
Analysis
| null |
P. Balasubramanian, C. Dang, D.L. Maskell, K. Prasad, "Approximate
Ripple Carry and Carry Lookahead Adders - A Comparative Analysis," Proc. 30th
International Conference on Microelectronics, pp. 299-304, 2017, Serbia
| null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Approximate ripple carry adders (RCAs) and carry lookahead adders (CLAs) are
presented which are compared with accurate RCAs and CLAs for performing a
32-bit addition. The accurate and approximate RCAs and CLAs are implemented
using a 32/28nm CMOS process. Approximations ranging from 4- to 20-bits are
considered for the less significant adder bit positions. The simulation results
show that approximate RCAs report reductions in the power-delay product (PDP)
ranging from 19.5% to 82% than the accurate RCA for approximation sizes varying
from 4- to 20-bits. Also, approximate CLAs report reductions in PDP ranging
from 16.7% to 74.2% than the accurate CLA for approximation sizes varying from
4- to 20-bits. On average, for the approximation sizes considered, it is
observed that approximate CLAs achieve a 46.5% reduction in PDP compared to the
approximate RCAs. Hence, approximate CLAs are preferable over approximate RCAs
for the low power implementation of approximate computer arithmetic.
|
[
{
"version": "v1",
"created": "Mon, 16 Oct 2017 02:42:59 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Balasubramanian",
"P",
""
],
[
"Dang",
"C",
""
],
[
"Maskell",
"D L",
""
],
[
"Prasad",
"K",
""
]
] |
new_dataset
| 0.998355 |
1710.05585
|
Abdalla Swikir
|
Abdalla Swikir, Antoine Girard, and Majid Zamani
|
From dissipativity theory to compositional synthesis of symbolic models
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we introduce a compositional framework for the construction of
finite abstractions (a.k.a. symbolic models) of interconnected discrete-time
control systems. The compositional scheme is based on the joint
dissipativity-type properties of discrete-time control subsystems and their
finite abstractions. In the first part of the paper, we use a notion of
so-called storage function as a relation between each subsystem and its finite
abstraction to construct compositionally a notion of so-called simulation
function as a relation between interconnected finite abstractions and that of
control systems. The derived simulation function is used to quantify the error
between the output behavior of the overall interconnected concrete system and
that of its finite abstraction. In the second part of the paper, we propose a
technique to construct finite abstractions together with their corresponding
storage functions for a class of discrete-time control systems under some
incremental passivity property. We show that if a discrete-time control system
is so-called incrementally passivable, then one can construct its finite
abstraction by a suitable quantization of the input and state sets together
with the corresponding storage function. Finally, the proposed results are
illustrated by constructing a finite abstraction of a network of linear
discrete-time control systems and its corresponding simulation function in a
compositional way. The compositional conditions in this example do not impose
any restriction on the gains or the number of the subsystems which, in
particular, elucidates the effectiveness of dissipativity-type compositional
reasoning for networks of systems.
|
[
{
"version": "v1",
"created": "Mon, 16 Oct 2017 09:29:47 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Swikir",
"Abdalla",
""
],
[
"Girard",
"Antoine",
""
],
[
"Zamani",
"Majid",
""
]
] |
new_dataset
| 0.968891 |
1710.05602
|
Amaro Barreal
|
Amaro Barreal and Camilla Hollanti
|
On Fast-Decodable Algebraic Space--Time Codes
|
Invited book chapter, submitted
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the near future, the $5^{th}$ generation (5G) wireless systems will be
established. They will consist of an integration of different techniques,
including distributed antenna systems and massive multiple-input
multiple-output systems, and the overall performance will highly depend on the
channel coding techniques employed. Due to the nature of future wireless
networks, space--time codes are no longer merely an object of choice, but will
often appear naturally in the communications setting. However, as the involved
communication devices often exhibit a modest computational power, the
complexity of the codes to be utilised should be reasonably low for possible
practical implementation.
Fast-decodable codes enjoy reduced complexity of maximum-likelihood (ML)
decoding due to a smart inner structure allowing for parallelisation in the ML
search. The complexity reductions considered in this chapter are entirely owing
to the algebraic structure of the considered codes, and could be further
improved by employing non-ML decoding methods, however yielding suboptimal
performance.
The aim of this chapter is twofold. First, we provide a tutorial introduction
to space--time coding and study powerful algebraic tools for their design and
construction. Secondly, we revisit algebraic techniques used for reducing the
worst-case decoding complexity of both single-user and multiuser space-time
codes, alongside with general code families and illustrative examples.
|
[
{
"version": "v1",
"created": "Mon, 16 Oct 2017 10:11:35 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Barreal",
"Amaro",
""
],
[
"Hollanti",
"Camilla",
""
]
] |
new_dataset
| 0.96985 |
1710.05615
|
Hyegyeong Park
|
Hyegyeong Park, Dongwon Lee and Jaekyun Moon
|
LDPC Code Design for Distributed Storage: Balancing Repair Bandwidth,
Reliability and Storage Overhead
|
32 pages
| null | null | null |
cs.DC cs.IT cs.PF math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed storage systems suffer from significant repair traffic generated
due to frequent storage node failures. This paper shows that properly designed
low-density parity-check (LDPC) codes can substantially reduce the amount of
required block downloads for repair thanks to the sparse nature of their factor
graph representation. In particular, with a careful construction of the factor
graph, both low repair-bandwidth and high reliability can be achieved for a
given code rate. First, a formula for the average repair bandwidth of LDPC
codes is developed. This formula is then used to establish that the minimum
repair bandwidth can be achieved by forcing a regular check node degree in the
factor graph. Moreover, it is shown that given a fixed code rate, the variable
node degree should also be regular to yield minimum repair bandwidth, under
some reasonable minimum variable node degree constraint. It is also shown that
for a given repair-bandwidth requirement, LDPC codes can yield substantially
higher reliability than currently utilized Reed-Solomon (RS) codes. Our
reliability analysis is based on a formulation of the general equation for the
mean-time-to-data-loss (MTTDL) associated with LDPC codes. The formulation
reveals that the stopping number is closely related to the MTTDL. It is further
shown that LDPC codes can be designed such that a small loss of
repair-bandwidth optimality may be traded for a large improvement in
erasure-correction capability and thus the MTTDL.
|
[
{
"version": "v1",
"created": "Mon, 16 Oct 2017 10:49:25 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Park",
"Hyegyeong",
""
],
[
"Lee",
"Dongwon",
""
],
[
"Moon",
"Jaekyun",
""
]
] |
new_dataset
| 0.999019 |
1710.05661
|
Marc Aiguier
|
Marc Aiguier and Isabelle Bloch
|
Dual Logic Concepts based on Mathematical Morphology in Stratified
Institutions: Applications to Spatial Reasoning
|
36 pages
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Several logical operators are defined as dual pairs, in different types of
logics. Such dual pairs of operators also occur in other algebraic theories,
such as mathematical morphology. Based on this observation, this paper proposes
to define, at the abstract level of institutions, a pair of abstract dual and
logical operators as morphological erosion and dilation. Standard quantifiers
and modalities are then derived from these two abstract logical operators.
These operators are studied both on sets of states and sets of models. To cope
with the lack of explicit set of states in institutions, the proposed abstract
logical dual operators are defined in an extension of institutions, the
stratified institutions, which take into account the notion of open sentences,
the satisfaction of which is parametrized by sets of states. A hint on the
potential interest of the proposed framework for spatial reasoning is also
provided.
|
[
{
"version": "v1",
"created": "Mon, 16 Oct 2017 12:50:03 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Aiguier",
"Marc",
""
],
[
"Bloch",
"Isabelle",
""
]
] |
new_dataset
| 0.950895 |
1710.05768
|
Vahid Towhidlou
|
Vahid Towhidlou and Mohammad Shikh Bahaei
|
Adaptive Full Duplex Communications in Cognitive Radio Networks
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose a novel adaptive scheme for full duplex
communication of secondary users (SUs) in a cognitive radio network. The
secondary network operates in three modes; Cooperative Sensing (CS), Full
Duplex Transmit and Sensing (FDTS), and Full Duplex Transmit and Receive
(FDTR). In the CS mode, the secondary nodes detect the activity of primary
users (PUs) through a novel cooperative MAC protocol and will decide the
systems mode of operation in the subsequent spectrum hole. In the FDTS mode one
of the SUs senses the PUs activity continuously whilst transmitting to another
node. In the FDTR mode, the SUs would communicate bidirectionally in an
asynchronous full duplex (FD) manner, with decreased maximum and average
collision durations. Analytical closed forms for probability of collision,
average collision duration and cumulative collision duration, as well as
throughput of the SU network are derived, and performance of the proposed
protocol in terms of above-mentioned metrics, its effectiveness, and advantages
over conventional methods of sensing and transmission are verified via
simulations
|
[
{
"version": "v1",
"created": "Mon, 16 Oct 2017 14:53:57 GMT"
}
] | 2017-10-17T00:00:00 |
[
[
"Towhidlou",
"Vahid",
""
],
[
"Bahaei",
"Mohammad Shikh",
""
]
] |
new_dataset
| 0.981946 |
1708.04706
|
Furkan Ercan
|
Furkan Ercan, Carlo Condo, Seyyed Ali Hashemi, Warren J. Gross
|
On Error-Correction Performance and Implementation of Polar Code List
Decoders for 5G
|
Accepted in 55th Annual Allerton Conference on Communication,
Control, and Computing
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Polar codes are a class of capacity achieving error correcting codes that has
been recently selected for the next generation of wireless communication
standards (5G). Polar code decoding algorithms have evolved in various
directions, striking different balances between error-correction performance,
speed and complexity. Successive-cancellation list (SCL) and its incarnations
constitute a powerful, well-studied set of algorithms, in constant improvement.
At the same time, different implementation approaches provide a wide range of
area occupations and latency results. 5G puts a focus on improved
error-correction performance, high throughput and low power consumption: a
comprehensive study considering all these metrics is currently lacking in
literature. In this work, we evaluate SCL-based decoding algorithms in terms of
error-correction performance and compare them to low-density parity-check
(LDPC) codes. Moreover, we consider various decoder implementations, for both
polar and LDPC codes, and compare their area occupation and power and energy
consumption when targeting short code lengths and rates. Our work shows that
among SCL-based decoders, the partitioned SCL (PSCL) provides the lowest area
occupation and power consumption, whereas fast simplified SCL (Fast-SSCL)
yields the lowest energy consumption. Compared to LDPC decoder architectures,
different SCL implementations occupy up to 17.1x less area, dissipate up to
7.35x less power, and up to 26x less energy.
|
[
{
"version": "v1",
"created": "Tue, 15 Aug 2017 22:19:09 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Oct 2017 20:03:14 GMT"
}
] | 2017-10-16T00:00:00 |
[
[
"Ercan",
"Furkan",
""
],
[
"Condo",
"Carlo",
""
],
[
"Hashemi",
"Seyyed Ali",
""
],
[
"Gross",
"Warren J.",
""
]
] |
new_dataset
| 0.996981 |
1710.04778
|
Donghuan Lu
|
Donghuan Lu, Morgan Heisler, Sieun Lee, Gavin Ding, Marinko V. Sarunic
and Mirza Faisal Beg
|
Retinal Fluid Segmentation and Detection in Optical Coherence Tomography
Images using Fully Convolutional Neural Network
|
9 pages, 5 figures, MICCAI Retinal OCT Fluid Challenge 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As a non-invasive imaging modality, optical coherence tomography (OCT) can
provide micrometer-resolution 3D images of retinal structures. Therefore it is
commonly used in the diagnosis of retinal diseases associated with edema in and
under the retinal layers. In this paper, a new framework is proposed for the
task of fluid segmentation and detection in retinal OCT images. Based on the
raw images and layers segmented by a graph-cut algorithm, a fully convolutional
neural network was trained to recognize and label the fluid pixels. Random
forest classification was performed on the segmented fluid regions to detect
and reject the falsely labeled fluid regions. The leave-one-out cross
validation experiments on the RETOUCH database show that our method performs
well in both segmentation (mean Dice: 0.7317) and detection (mean AUC: 0.985)
tasks.
|
[
{
"version": "v1",
"created": "Fri, 13 Oct 2017 01:51:01 GMT"
}
] | 2017-10-16T00:00:00 |
[
[
"Lu",
"Donghuan",
""
],
[
"Heisler",
"Morgan",
""
],
[
"Lee",
"Sieun",
""
],
[
"Ding",
"Gavin",
""
],
[
"Sarunic",
"Marinko V.",
""
],
[
"Beg",
"Mirza Faisal",
""
]
] |
new_dataset
| 0.998695 |
1710.04782
|
Donghuan Lu
|
Donghuan Lu, Karteek Popuri, Weiguang Ding, Rakesh Balachandar and
Mirza Faisal Beg
|
Multimodal and Multiscale Deep Neural Networks for the Early Diagnosis
of Alzheimer's Disease using structural MR and FDG-PET images
|
12 pages, 4 figures, Alzheimer's disease, deep learning, multimodal,
early diagnosis, multiscale
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Alzheimer's Disease (AD) is a progressive neurodegenerative disease. Amnestic
mild cognitive impairment (MCI) is a common first symptom before the conversion
to clinical impairment where the individual becomes unable to perform
activities of daily living independently. Although there is currently no
treatment available, the earlier a conclusive diagnosis is made, the earlier
the potential for interventions to delay or perhaps even prevent progression to
full-blown AD. Neuroimaging scans acquired from MRI and metabolism images
obtained by FDG-PET provide in-vivo view into the structure and function
(glucose metabolism) of the living brain. It is hypothesized that combining
different image modalities could better characterize the change of human brain
and result in a more accuracy early diagnosis of AD. In this paper, we proposed
a novel framework to discriminate normal control(NC) subjects from subjects
with AD pathology (AD and NC, MCI subjects convert to AD in future). Our novel
approach utilizing a multimodal and multiscale deep neural network was found to
deliver a 85.68\% accuracy in the prediction of subjects within 3 years to
conversion. Cross validation experiments proved that it has better
discrimination ability compared with results in existing published literature.
|
[
{
"version": "v1",
"created": "Fri, 13 Oct 2017 02:14:39 GMT"
}
] | 2017-10-16T00:00:00 |
[
[
"Lu",
"Donghuan",
""
],
[
"Popuri",
"Karteek",
""
],
[
"Ding",
"Weiguang",
""
],
[
"Balachandar",
"Rakesh",
""
],
[
"Beg",
"Mirza Faisal",
""
]
] |
new_dataset
| 0.973796 |
1710.04986
|
Somphong Jitman
|
Arunwan Boripan, Somphong Jitman, and Patanee Udomkavanich
|
Characterization and Enumeration of Complementary Dual Abelian Codes
| null | null | null | null |
cs.IT math.IT math.RA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Abelian codes and complementary dual codes form important classes of linear
codes that have been extensively studied due to their rich algebraic structures
and wide applications. In this paper, a family of abelian codes with
complementary dual in a group algebra $\mathbb{F}_{p^\nu}[G]$ has been studied
under both the Euclidean and Hermitian inner products, where $p$ is a prime,
$\nu$ is a positive integer, and $G$ is an arbitrary finite abelian group.
Based on the discrete Fourier transform decomposition for semi-simple group
algebras and properties of ideas in local group algebras, the characterization
of such codes have been given. Subsequently, the number of complementary dual
abelian codes in $\mathbb{F}_{p^\nu}[G]$ has been shown to be independent of
the Sylow $p$-subgroup of $G$ and it has been completely determined for every
finite abelian group $G$. In some cases, a simplified formula for the
enumeration has been provided as well. The known results for cyclic
complementary dual codes can be viewed as corollaries.
|
[
{
"version": "v1",
"created": "Fri, 13 Oct 2017 16:20:03 GMT"
}
] | 2017-10-16T00:00:00 |
[
[
"Boripan",
"Arunwan",
""
],
[
"Jitman",
"Somphong",
""
],
[
"Udomkavanich",
"Patanee",
""
]
] |
new_dataset
| 0.996827 |
1212.6326
|
Karsten Ahnert
|
Denis Demidov, Karsten Ahnert, Karl Rupp, Peter Gottschling
|
Programming CUDA and OpenCL: A Case Study Using Modern C++ Libraries
|
21 pages, 4 figures, submitted to SIAM Journal of Scientific
Computing and accepted
| null |
10.1137/120903683
| null |
cs.MS cs.DC physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a comparison of several modern C++ libraries providing high-level
interfaces for programming multi- and many-core architectures on top of CUDA or
OpenCL. The comparison focuses on the solution of ordinary differential
equations and is based on odeint, a framework for the solution of systems of
ordinary differential equations. Odeint is designed in a very flexible way and
may be easily adapted for effective use of libraries such as Thrust, MTL4,
VexCL, or ViennaCL, using CUDA or OpenCL technologies. We found that CUDA and
OpenCL work equally well for problems of large sizes, while OpenCL has higher
overhead for smaller problems. Furthermore, we show that modern high-level
libraries allow to effectively use the computational resources of many-core
GPUs or multi-core CPUs without much knowledge of the underlying technologies.
|
[
{
"version": "v1",
"created": "Thu, 27 Dec 2012 08:56:00 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Apr 2013 07:50:28 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Demidov",
"Denis",
""
],
[
"Ahnert",
"Karsten",
""
],
[
"Rupp",
"Karl",
""
],
[
"Gottschling",
"Peter",
""
]
] |
new_dataset
| 0.996762 |
1605.06827
|
Somphong Jitman
|
Kriangkrai Boonniyom, Somphong Jitman
|
Complementary Dual Subfield Linear Codes Over Finite Fields
|
accepted in Thai Journal of Mathematics: Special issue ICMSA2015
|
Thai Journal of Mathematics Special issue ICMSA2015, 133-152
(2016)
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Two families of complementary codes over finite fields $\mathbb{F}_q$ are
studied, where $q=r^2$ is square: i) Hermitian complementary dual linear codes,
and ii) trace Hermitian complementary dual subfield linear codes. Necessary and
sufficient conditions for a linear code (resp., a subfield linear code) to be
Hermitian complementary dual (resp., trace Hermitian complementary dual) are
determined. Constructions of such codes are given together their parameters.
Some illustrative examples are provided as well.
|
[
{
"version": "v1",
"created": "Sun, 22 May 2016 17:44:26 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Boonniyom",
"Kriangkrai",
""
],
[
"Jitman",
"Somphong",
""
]
] |
new_dataset
| 0.99778 |
1612.03854
|
Therese Biedl
|
Therese Biedl, Markus Chimani, Martin Derka, Petra Mutzel
|
Crossing Number for Graphs With Bounded Pathwidth
|
Full version of paper that will appear at ISAAC'17
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The crossing number is the smallest number of pairwise edge-crossings when
drawing a graph into the plane. There are only very few graph classes for which
the exact crossing number is known or for which there at least exist constant
approximation ratios. Furthermore, up to now, general crossing number
computations have never been successfully tackled using bounded width of graph
decompositions, like treewidth or pathwidth.
In this paper, we for the first time show that crossing number is tractable
(even in linear time) for maximal graphs of bounded pathwidth~3. The technique
also shows that the crossing number and the rectilinear (a.k.a. straight-line)
crossing number are identical for this graph class, and that we require only an
$O(n)\times O(n)$-grid to achieve such a drawing.
Our techniques can further be extended to devise a 2-approximation for
general graphs with pathwidth 3, and a $4w^3$-approximation for maximal graphs
of pathwidth $w$. This is a constant approximation for bounded pathwidth
graphs.
|
[
{
"version": "v1",
"created": "Mon, 12 Dec 2016 19:12:47 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Oct 2017 00:18:11 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Biedl",
"Therese",
""
],
[
"Chimani",
"Markus",
""
],
[
"Derka",
"Martin",
""
],
[
"Mutzel",
"Petra",
""
]
] |
new_dataset
| 0.999484 |
1704.05614
|
Wanchun Liu
|
Wanchun Liu, Xiangyun Zhou, Salman Durrani and Petar Popovski
|
A Novel Receiver Design with Joint Coherent and Non-Coherent Processing
| null |
IEEE Transactions on Communications, vol. 65, no. 8, pp.
3479-3493, Aug. 2017
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a novel splitting receiver, which involves joint
processing of coherently and non-coherently received signals. Using a passive
RF power splitter, the received signal at each receiver antenna is split into
two streams which are then processed by a conventional coherent detection (CD)
circuit and a power-detection (PD) circuit, respectively. The streams of the
signals from all the receiver antennas are then jointly used for information
detection. We show that the splitting receiver creates a three-dimensional
received signal space, due to the joint coherent and non-coherent processing.
We analyze the achievable rate of a splitting receiver, which shows that the
splitting receiver provides a rate gain of $3/2$ compared to either the
conventional (CD-based) coherent receiver or the PD-based non-coherent receiver
in the high SNR regime. We also analyze the symbol error rate (SER) for
practical modulation schemes, which shows that the splitting receiver achieves
asymptotic SER reduction by a factor of at least $\sqrt{M}-1$ for $M$-QAM
compared to either the conventional (CD-based) coherent receiver or the
PD-based non-coherent receiver.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2017 05:21:51 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Liu",
"Wanchun",
""
],
[
"Zhou",
"Xiangyun",
""
],
[
"Durrani",
"Salman",
""
],
[
"Popovski",
"Petar",
""
]
] |
new_dataset
| 0.975843 |
1710.02292
|
Cedomir Stefanovic
|
Cedomir Stefanovic, Enrico Paolini, Gianluigi Liva
|
Asymptotic Performance of Coded Slotted ALOHA with Multi Packet
Reception
|
Accepted for publication in IEEE Communication Letters. Spotted typos
corrected with respect to the previous version
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this letter, we develop a converse bound on the asymptotic load threshold
of coded slotted ALOHA (CSA) schemes with K-multi packet reception capabilities
at the receiver. Density evolution is used to track the average probability of
packet segment loss and an area matching condition is applied to obtain the
converse. For any given CSA rate, the converse normalized to K increases with
K, which is in contrast with the results obtained so far for slotted ALOHA
schemes based on successive interference cancellation. We show how the derived
bound can be approached using spatially-coupled CSA.
|
[
{
"version": "v1",
"created": "Fri, 6 Oct 2017 07:08:05 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Oct 2017 10:55:32 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Stefanovic",
"Cedomir",
""
],
[
"Paolini",
"Enrico",
""
],
[
"Liva",
"Gianluigi",
""
]
] |
new_dataset
| 0.998826 |
1710.04162
|
Adam Stooke
|
Adam Stooke and Pieter Abbeel
|
Synkhronos: a Multi-GPU Theano Extension for Data Parallelism
| null | null | null | null |
cs.DC cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present Synkhronos, an extension to Theano for multi-GPU computations
leveraging data parallelism. Our framework provides automated execution and
synchronization across devices, allowing users to continue to write serial
programs without risk of race conditions. The NVIDIA Collective Communication
Library is used for high-bandwidth inter-GPU communication. Further
enhancements to the Theano function interface include input slicing (with
aggregation) and input indexing, which perform common data-parallel computation
patterns efficiently. One example use case is synchronous SGD, which has
recently been shown to scale well for a growing set of deep learning problems.
When training ResNet-50, we achieve a near-linear speedup of 7.5x on an NVIDIA
DGX-1 using 8 GPUs, relative to Theano-only code running a single GPU in
isolation. Yet Synkhronos remains general to any data-parallel computation
programmable in Theano. By implementing parallelism at the level of individual
Theano functions, our framework uniquely addresses a niche between manual
multi-device programming and prescribed multi-GPU training routines.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 16:38:58 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Stooke",
"Adam",
""
],
[
"Abbeel",
"Pieter",
""
]
] |
new_dataset
| 0.992687 |
1710.04177
|
Heather Mattie
|
Heather Mattie, Kenth Eng{\o}-Monsen, Rich Ling, Jukka-Pekka Onnela
|
The Social Bow Tie
| null | null | null | null |
cs.SI physics.soc-ph stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Understanding tie strength in social networks, and the factors that influence
it, have received much attention in a myriad of disciplines for decades.
Several models incorporating indicators of tie strength have been proposed and
used to quantify relationships in social networks, and a standard set of
structural network metrics have been applied to predominantly online social
media sites to predict tie strength. Here, we introduce the concept of the
"social bow tie" framework, a small subgraph of the network that consists of a
collection of nodes and ties that surround a tie of interest, forming a
topological structure that resembles a bow tie. We also define several
intuitive and interpretable metrics that quantify properties of the bow tie. We
use random forests and regression models to predict categorical and continuous
measures of tie strength from different properties of the bow tie, including
nodal attributes. We also investigate what aspects of the bow tie are most
predictive of tie strength in two distinct social networks: a collection of 75
rural villages in India and a nationwide call network of European mobile phone
users. Our results indicate several of the bow tie metrics are highly
predictive of tie strength, and we find the more the social circles of two
individuals overlap, the stronger their tie, consistent with previous findings.
However, we also find that the more tightly-knit their non-overlapping social
circles, the weaker the tie. This new finding complements our current
understanding of what drives the strength of ties in social networks.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 17:12:05 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Oct 2017 12:10:30 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Mattie",
"Heather",
""
],
[
"Engø-Monsen",
"Kenth",
""
],
[
"Ling",
"Rich",
""
],
[
"Onnela",
"Jukka-Pekka",
""
]
] |
new_dataset
| 0.964524 |
1710.04276
|
Vaibhav Kumar
|
Vaibhav Kumar, Barry Cardiff, and Mark F. Flanagan
|
Physical-Layer Network Coding with Multiple Antennas: An Enabling
Technology for Smart Cities
|
10 pages, 6 figures, 1 table, PIMRC - 2017 CORNER Workshop
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Efficient heterogeneous communication technologies are critical components to
provide flawless connectivity in smart cities. The proliferation of wireless
technologies, services and communication devices has created the need for green
and spectrally efficient communication technologies. Physical- layer network
coding (PNC) is now well-known as a potential candidate for delay-sensitive and
spectrally efficient communication applications, especially in bidirectional
relaying, and is therefore well-suited for smart city applications. In this
paper, we provide a brief introduction to PNC and the associated distance
shortening phenomenon which occurs at the relay. We discuss the issues with
existing schemes that mitigate the deleterious effect of distance shortening,
and we propose simple and effective solutions based on the use of multiple
antenna systems. Simulation results confirm that full diversity order can be
achieved in a PNC system by using antenna selection schemes based on the
Euclidean distance metric.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 19:49:10 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Kumar",
"Vaibhav",
""
],
[
"Cardiff",
"Barry",
""
],
[
"Flanagan",
"Mark F.",
""
]
] |
new_dataset
| 0.96486 |
1710.04280
|
Gregory Stein
|
Gregory J. Stein and Nicholas Roy
|
GeneSIS-RT: Generating Synthetic Images for training Secondary
Real-world Tasks
|
8 pages, 7 figures; submitted to ICRA 2018
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel approach for generating high-quality, synthetic data for
domain-specific learning tasks, for which training data may not be readily
available. We leverage recent progress in image-to-image translation to bridge
the gap between simulated and real images, allowing us to generate realistic
training data for real-world tasks using only unlabeled real-world images and a
simulation. GeneSIS-RT ameliorates the burden of having to collect labeled
real-world images and is a promising candidate for generating high-quality,
domain-specific, synthetic data.
To show the effectiveness of using GeneSIS-RT to create training data, we
study two tasks: semantic segmentation and reactive obstacle avoidance. We
demonstrate that learning algorithms trained using data generated by GeneSIS-RT
make high-accuracy predictions and outperform systems trained on raw simulated
data alone, and as well or better than those trained on real data. Finally, we
use our data to train a quadcopter to fly 60 meters at speeds up to 3.4 m/s
through a cluttered environment, demonstrating that our GeneSIS-RT images can
be used to learn to perform mission-critical tasks.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 19:54:55 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Stein",
"Gregory J.",
""
],
[
"Roy",
"Nicholas",
""
]
] |
new_dataset
| 0.995489 |
1710.04486
|
Dominique Vaufreydaz
|
Thomas Guntz (LIG), Raffaella Balzarini (LIG), Dominique Vaufreydaz
(LIG, UGA), James L. Crowley (Grenoble INP, LIG)
|
Multimodal Observation and Interpretation of Subjects Engaged in Problem
Solving
| null |
1st Workshop on "Behavior, Emotion and Representation: Building
Blocks of Interaction'', Oct 2017, Bielefeld, Germany. 2017
| null | null |
cs.HC cs.CV stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present the first results of a pilot experiment in the
capture and interpretation of multimodal signals of human experts engaged in
solving challenging chess problems. Our goal is to investigate the extent to
which observations of eye-gaze, posture, emotion and other physiological
signals can be used to model the cognitive state of subjects, and to explore
the integration of multiple sensor modalities to improve the reliability of
detection of human displays of awareness and emotion. We observed chess players
engaged in problems of increasing difficulty while recording their behavior.
Such recordings can be used to estimate a participant's awareness of the
current situation and to predict ability to respond effectively to challenging
situations. Results show that a multimodal approach is more accurate than a
unimodal one. By combining body posture, visual attention and emotion, the
multimodal approach can reach up to 93% of accuracy when determining player's
chess expertise while unimodal approach reaches 86%. Finally this experiment
validates the use of our equipment as a general and reproducible tool for the
study of participants engaged in screen-based interaction and/or problem
solving.
|
[
{
"version": "v1",
"created": "Thu, 12 Oct 2017 12:59:42 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Guntz",
"Thomas",
"",
"LIG"
],
[
"Balzarini",
"Raffaella",
"",
"LIG"
],
[
"Vaufreydaz",
"Dominique",
"",
"LIG, UGA"
],
[
"Crowley",
"James L.",
"",
"Grenoble INP, LIG"
]
] |
new_dataset
| 0.96781 |
1710.04515
|
Dan Lim
|
Dan Lim
|
Convolutional Attention-based Seq2Seq Neural Network for End-to-End ASR
|
Masters thesis, Korea Univ
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This thesis introduces the sequence to sequence model with Luong's attention
mechanism for end-to-end ASR. It also describes various neural network
algorithms including Batch normalization, Dropout and Residual network which
constitute the convolutional attention-based seq2seq neural network. Finally
the proposed model proved its effectiveness for speech recognition achieving
15.8% phoneme error rate on TIMIT dataset.
|
[
{
"version": "v1",
"created": "Thu, 12 Oct 2017 13:40:43 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Lim",
"Dan",
""
]
] |
new_dataset
| 0.991277 |
1710.04578
|
Dongyao Chen
|
Dongyao Chen, Kyong-Tak Cho, Kang G. Shin
|
Mobile IMUs Reveal Driver's Identity From Vehicle Turns
|
15 pages, 15 figures
| null | null | null |
cs.CR cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As vehicle maneuver data becomes abundant for assisted or autonomous driving,
their implication of privacy invasion/leakage has become an increasing concern.
In particular, the surface for fingerprinting a driver will expand
significantly if the driver's identity can be linked with the data collected
from his mobile or wearable devices which are widely deployed worldwide and
have increasing sensing capabilities. In line with this trend, this paper
investigates a fast emerging driving data source that has driver's privacy
implications. We first show that such privacy threats can be materialized via
any mobile device with IMUs (e.g., gyroscope and accelerometer). We then
present Dri-Fi (Driver Fingerprint), a driving data analytic engine that can
fingerprint the driver with vehicle turn(s). Dri-Fi achieves this based on IMUs
data taken only during the vehicle's turn(s). Such an approach expands the
attack surface significantly compared to existing driver fingerprinting
schemes. From this data, Dri-Fi extracts three new features --- acceleration
along the end-of-turn axis, its deviation, and the deviation of the yaw rate
--- and exploits them to identify the driver. Our extensive evaluation shows
that an adversary equipped with Dri-Fi can correctly fingerprint the driver
within just one turn with 74.1%, 83.5%, and 90.8% accuracy across 12, 8, and 5
drivers --- typical of an immediate family or close-friends circle ---
respectively. Moreover, with measurements on more than one turn, the adversary
can achieve up to 95.3%, 95.4%, and 96.6% accuracy across 12, 8, and 5 drivers,
respectively.
|
[
{
"version": "v1",
"created": "Thu, 12 Oct 2017 15:49:35 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Chen",
"Dongyao",
""
],
[
"Cho",
"Kyong-Tak",
""
],
[
"Shin",
"Kang G.",
""
]
] |
new_dataset
| 0.99767 |
1710.04628
|
Sebastian Enqvist
|
Sebastian Enqvist
|
Flat modal fixpoint logics with the converse modality
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove a generic completeness result for a class of modal fixpoint logics
corresponding to flat fragments of the two-way mu-calculus, extending earlier
work by Santocanale and Venema. We observe that Santocanale and Venema's proof
that least fixpoints in the Lindenbaum-Tarski algebra of certain flat fixpoint
logics are constructive, using finitary adjoints, no longer works when the
converse modality is introduced. Instead, our completeness proof directly
constructs a model for a consistent formula, using the induction rule in a way
that is similar to the standard completeness proof for propositional dynamic
logic. This approach is combined with the concept of a focus, which has
previously been used in tableau based reasoning for modal fixpoint logics.
|
[
{
"version": "v1",
"created": "Thu, 12 Oct 2017 17:28:47 GMT"
}
] | 2017-10-13T00:00:00 |
[
[
"Enqvist",
"Sebastian",
""
]
] |
new_dataset
| 0.998929 |
1602.07891
|
Zhibang Xie
|
Zhibang Xie and Qingjin Deng
|
Loongson IoT Gateway: A Technical Review
|
4 pages, 4 figures
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A prototype of Loongson IoT (Internet of Things) ZigBee gateway is already
designed and implemented. However, this prototype is not perfect enough because
of the lack of a number of functions. And a lot of things should be done to
improve this prototype, such as adding widely used IEEE 802.11 function, using
a fully open source ZigBee protocol stack to get rid of proprietary implement
or using a fully open source embedded operating system to support 6LoWPAN, and
implementing multiple interfaces.
|
[
{
"version": "v1",
"created": "Thu, 25 Feb 2016 11:41:45 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Mar 2016 16:00:13 GMT"
},
{
"version": "v3",
"created": "Thu, 31 Mar 2016 17:27:40 GMT"
},
{
"version": "v4",
"created": "Thu, 11 May 2017 16:45:30 GMT"
},
{
"version": "v5",
"created": "Tue, 10 Oct 2017 21:13:13 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Xie",
"Zhibang",
""
],
[
"Deng",
"Qingjin",
""
]
] |
new_dataset
| 0.998704 |
1605.01348
|
Vaishakh Ravindrakumar
|
Vaishakh Ravindrakumar, Parthasarathi Panda, Nikhil Karamchandani and
Vinod Prabhakaran
|
Private Coded Caching
|
To appear in IEEE Transactions on Information Forensics and Security
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent work by Maddah-Ali and Niesen introduced coded caching which
demonstrated the benefits of joint design of storage and transmission policies
in content delivery networks. They studied a setup where a server communicates
with a set of users, each equipped with a local cache, over a shared error-free
link and proposed an order-optimal caching and delivery scheme. In this paper,
we introduce the problem of secretive coded caching where we impose the
additional constraint that a user should not be able to learn anything, from
either the content stored in its cache or the server transmissions, about a
file it did not request. We propose a feasible scheme for this setting and
demonstrate its order-optimality with respect to information-theoretic lower
bounds.
|
[
{
"version": "v1",
"created": "Wed, 4 May 2016 17:11:06 GMT"
},
{
"version": "v2",
"created": "Tue, 17 May 2016 19:04:17 GMT"
},
{
"version": "v3",
"created": "Fri, 3 Mar 2017 04:32:12 GMT"
},
{
"version": "v4",
"created": "Wed, 11 Oct 2017 15:50:28 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Ravindrakumar",
"Vaishakh",
""
],
[
"Panda",
"Parthasarathi",
""
],
[
"Karamchandani",
"Nikhil",
""
],
[
"Prabhakaran",
"Vinod",
""
]
] |
new_dataset
| 0.995747 |
1710.03832
|
Artjoms Sinkarovs PhD
|
Artjoms Sinkarovs and Sven-Bodo Scholz
|
A Lambda Calculus for Transfinite Arrays: Unifying Arrays and Streams
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Array programming languages allow for concise and generic formulations of
numerical algorithms, thereby providing a huge potential for program
optimisation such as fusion, parallelisation, etc. One of the restrictions that
these languages typically have is that the number of elements in every array
has to be finite. This means that implementing streaming algorithms in such
languages requires new types of data structures, with operations that are not
immediately compatible with existing array operations or compiler
optimisations.
In this paper, we propose a design for a functional language that natively
supports infinite arrays. We use ordinal numbers to introduce the notion of
infinity in shapes and indices. By doing so, we obtain a calculus that
naturally extends existing array calculi and, at the same time, allows for
recursive specifications as they are found in stream- and list-based settings.
Furthermore, the main language construct that can be thought of as an $n$-fold
cons operator gives rise to expressing transfinite recursion in data, something
that lists or streams usually do not support. This makes it possible to treat
the proposed calculus as a unifying theory of arrays, lists and streams. We
give an operational semantics of the proposed language, discuss design choices
that we have made, and demonstrate its expressibility with several examples. We
also demonstrate that the proposed formalism preserves a number of well-known
universal equalities from array/list/stream theories, and discuss
implementation-related challenges.
|
[
{
"version": "v1",
"created": "Tue, 10 Oct 2017 21:52:11 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Sinkarovs",
"Artjoms",
""
],
[
"Scholz",
"Sven-Bodo",
""
]
] |
new_dataset
| 0.996959 |
1710.03861
|
Beom Heyn Kim
|
Beom Heyn Kim, Wei Huang, Afshar Ganjali, David Lie
|
Unity 2.0: Secure and Durable Personal Cloud Storage
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While personal cloud storage services such as Dropbox, OneDrive, Google Drive
and iCloud have become very popular in recent years, these services offer few
security guarantees to users. These cloud services are aimed at end users,
whose applications often assume a local file system storage, and thus require
strongly consistent data. In addition, users usually access these services
using personal computers and portable devices such as phones and tablets, which
are upload bandwidth constrained and in many cases battery powered. Unity is a
system that provides confidentiality, integrity, durability and strong
consistency while minimizing the upload bandwidth of its clients. We find that
Unity consumes minimal upload bandwidth for compute-heavy workload compared to
NFS and Dropbox, while uses similar amount of upload bandwidth for write-heavy
workload relative to NBD. Although read-heavy workload tends to consume more
upload bandwidth with Unity, it is no more than an eighth of the size of blocks
replicated and there is much room for optimization. Moreover, Unity provides
flexibility to maintain multiple DEs to provide scalability for multiple
devices to concurrently access the data with the minimal lease switch cost.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 00:13:08 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Kim",
"Beom Heyn",
""
],
[
"Huang",
"Wei",
""
],
[
"Ganjali",
"Afshar",
""
],
[
"Lie",
"David",
""
]
] |
new_dataset
| 0.998403 |
1710.03932
|
Tianshi Chen
|
Tianshi Chen
|
Continuous-time DC kernel --- a stable generalized first-order spline
kernel
|
16 pages, 1 figure, preliminary and abridged version was published in
CDC 2016
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The stable spline (SS) kernel and the diagonal correlated (DC) kernel are two
kernels that have been applied and studied extensively for kernel-based
regularized LTI system identification. In this note, we show that similar to
the derivation of the SS kernel, the continuous-time DC kernel can be derived
by applying the same "stable" coordinate change to a "generalized" first-order
spline kernel, and thus can be interpreted as a stable generalized first-order
spline kernel. This interpretation provides new facets to understand the
properties of the DC kernel. In particular, we derive a new orthonormal basis
expansion of the DC kernel, and the explicit expression of the norm of the RKHS
associated with the DC kernel. Moreover, for the non-uniformly sampled DC
kernel, we derive its maximum entropy property and show that its kernel matrix
has tridiagonal inverse.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 06:56:24 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Chen",
"Tianshi",
""
]
] |
new_dataset
| 0.999506 |
1710.03957
|
Yanran Li
|
Yanran Li, Hui Su, Xiaoyu Shen, Wenjie Li, Ziqiang Cao, Shuzi Niu
|
DailyDialog: A Manually Labelled Multi-turn Dialogue Dataset
|
accepted by IJCNLP 2017
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop a high-quality multi-turn dialog dataset, DailyDialog, which is
intriguing in several aspects. The language is human-written and less noisy.
The dialogues in the dataset reflect our daily communication way and cover
various topics about our daily life. We also manually label the developed
dataset with communication intention and emotion information. Then, we evaluate
existing approaches on DailyDialog dataset and hope it benefit the research
field of dialog systems.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 08:30:30 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Li",
"Yanran",
""
],
[
"Su",
"Hui",
""
],
[
"Shen",
"Xiaoyu",
""
],
[
"Li",
"Wenjie",
""
],
[
"Cao",
"Ziqiang",
""
],
[
"Niu",
"Shuzi",
""
]
] |
new_dataset
| 0.99934 |
1710.04036
|
Yinyan Zhang
|
Yinyan Zhang, Shuai Li, and Hongliang Guo
|
Porcellio scaber algorithm (PSA) for solving constrained optimization
problems
|
6 pages, 1 figure
| null | null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we extend a bio-inspired algorithm called the porcellio scaber
algorithm (PSA) to solve constrained optimization problems, including a
constrained mixed discrete-continuous nonlinear optimization problem. Our
extensive experiment results based on benchmark optimization problems show that
the PSA has a better performance than many existing methods or algorithms. The
results indicate that the PSA is a promising algorithm for constrained
optimization.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 12:38:59 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Zhang",
"Yinyan",
""
],
[
"Li",
"Shuai",
""
],
[
"Guo",
"Hongliang",
""
]
] |
new_dataset
| 0.999309 |
1710.04052
|
Stefan Brueggenwirth
|
Stefan Br\"uggenwirth and Fernando Rial
|
Robotic Control for Cognitive UWB Radar
|
4 pages, 9 figures, submitted to IEEE IRC 2018
| null | null | null |
cs.SY cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the article, we describe a trajectory planning problem for a 6-DOF robotic
manipulator arm that carries an ultra-wideband (UWB) radar sensor with
synthetic aperture (SAR). The resolution depends on the trajectory and velocity
profile of the sensor head. The constraints can be modelled as an optimization
problem to obtain a feasible, collision-free target trajectory of the
end-effector of the manipulator arm in Cartesian coordinates that minimizes
observation time. For 3D-reconstruction, the target is observed in multiple
height slices. For Through-the-Wall radar the sensor can be operated in sliding
mode for scanning larger areas. For IED inspection the spot-light mode is
preferred, constantly pointing the antennas towards the target to obtain
maximum azimuth resolution.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 13:16:51 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Brüggenwirth",
"Stefan",
""
],
[
"Rial",
"Fernando",
""
]
] |
new_dataset
| 0.998674 |
1710.04097
|
Hamid Tizhoosh
|
Morteza Babaie, H.R. Tizhoosh, Amin Khatami, M.E. Shiri
|
Local Radon Descriptors for Image Search
|
To appear in proceedings of the 7th International Conference on Image
Processing Theory, Tools and Applications (IPTA 2017), Nov 28-Dec 1,
Montreal, Canada
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Radon transform and its inverse operation are important techniques in medical
imaging tasks. Recently, there has been renewed interest in Radon transform for
applications such as content-based medical image retrieval. However, all
studies so far have used Radon transform as a global or quasi-global image
descriptor by extracting projections of the whole image or large sub-images.
This paper attempts to show that the dense sampling to generate the histogram
of local Radon projections has a much higher discrimination capability than the
global one. In this paper, we introduce Local Radon Descriptor (LRD) and apply
it to the IRMA dataset, which contains 14,410 x-ray images as well as to the
INRIA Holidays dataset with 1,990 images. Our results show significant
improvement in retrieval performance by using LRD versus its global version. We
also demonstrate that LRD can deliver results comparable to well-established
descriptors like LBP and HOG.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 14:50:01 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Babaie",
"Morteza",
""
],
[
"Tizhoosh",
"H. R.",
""
],
[
"Khatami",
"Amin",
""
],
[
"Shiri",
"M. E.",
""
]
] |
new_dataset
| 0.999119 |
1710.04122
|
Manan Suri
|
Manan Suri
|
Dispenser Concept for Unmanned Aerial Vehicles (UAV, Drone, UAS)
|
12 pages, 5 figures
| null | null | null |
cs.CY eess.SP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
System, design and methodology to load and dispense different articles from
an autonomous aircraft are disclosed. In one embodiment, the design of a unique
detachable dispenser for delivery of articles is described along with an
intelligent methodology of loading and delivering the articles to and from the
dispenser. Design of the dispenser, interaction of the dispenser with the
flight control unit and ground control or base-station, and interaction of the
base station with the sender or recipient of the article, are also described.
|
[
{
"version": "v1",
"created": "Fri, 22 Sep 2017 13:21:29 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Suri",
"Manan",
""
]
] |
new_dataset
| 0.998306 |
1710.04142
|
Nishtha Madaan
|
Nishtha Madaan, Sameep Mehta, Mayank Saxena, Aditi Aggarwal, Taneea S
Agrawaal, Vrinda Malhotra
|
Bollywood Movie Corpus for Text, Images and Videos
| null | null | null | null |
cs.CY cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In past few years, several data-sets have been released for text and images.
We present an approach to create the data-set for use in detecting and removing
gender bias from text. We also include a set of challenges we have faced while
creating this corpora. In this work, we have worked with movie data from
Wikipedia plots and movie trailers from YouTube. Our Bollywood Movie corpus
contains 4000 movies extracted from Wikipedia and 880 trailers extracted from
YouTube which were released from 1970-2017. The corpus contains csv files with
the following data about each movie - Wikipedia title of movie, cast, plot
text, co-referenced plot text, soundtrack information, link to movie poster,
caption of movie poster, number of males in poster, number of females in
poster. In addition to that, corresponding to each cast member the following
data is available - cast name, cast gender, cast verbs, cast adjectives, cast
relations, cast centrality, cast mentions. We present some preliminary results
on the task of bias removal which suggest that the data-set is quite useful for
performing such tasks.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 15:51:13 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Madaan",
"Nishtha",
""
],
[
"Mehta",
"Sameep",
""
],
[
"Saxena",
"Mayank",
""
],
[
"Aggarwal",
"Aditi",
""
],
[
"Agrawaal",
"Taneea S",
""
],
[
"Malhotra",
"Vrinda",
""
]
] |
new_dataset
| 0.985301 |
1710.04144
|
Booma Sowkarthiga Balasubramani
|
Booma Sowkarthiga Balasubramani, Omar Belingheri, Eric S. Boria,
Isabel F. Cruz, Sybil Derrible, Michael D. Siciliano
|
GUIDES - Geospatial Urban Infrastructure Data Engineering Solutions
|
4 pages, SIGSPATIAL'17, November 7-10, 2017, Los Angeles Area, CA,
USA
| null | null | null |
cs.CY cs.DB
|
http://creativecommons.org/licenses/by/4.0/
|
As the underground infrastructure systems of cities age, maintenance and
repair become an increasing concern. Cities face difficulties in planning
maintenance, predicting and responding to infrastructure related issues, and in
realizing their vision to be a smart city due to their incomplete understanding
of the existing state of the infrastructure. Only few cities have accurate and
complete digital information on their underground infrastructure (e.g.,
electricity, water, natural gas) systems, which poses problems to those
planning and performing construction projects. To address these issues, we
introduce GUIDES as a new data conversion and management framework for urban
underground infrastructure systems that enable city administrators, workers,
and contractors along with the general public and other users to query
digitized and integrated data to make smarter decisions. This demo paper
presents the GUIDES architecture and describes two of its central components:
(i) mapping of underground infrastructure systems, and (ii) integration of
heterogeneous geospatial data.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2017 15:58:21 GMT"
}
] | 2017-10-12T00:00:00 |
[
[
"Balasubramani",
"Booma Sowkarthiga",
""
],
[
"Belingheri",
"Omar",
""
],
[
"Boria",
"Eric S.",
""
],
[
"Cruz",
"Isabel F.",
""
],
[
"Derrible",
"Sybil",
""
],
[
"Siciliano",
"Michael D.",
""
]
] |
new_dataset
| 0.988717 |
1603.04667
|
Antonio Marques
|
Antonio G. Marques, Santiago Segarra, Geert Leus, Alejandro Ribeiro
|
Stationary Graph Processes and Spectral Estimation
|
Accepted for publication in the IEEE Trans. Signal Processing
| null |
10.1109/TSP.2017.2739099
| null |
cs.SY cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Stationarity is a cornerstone property that facilitates the analysis and
processing of random signals in the time domain. Although time-varying signals
are abundant in nature, in many practical scenarios the information of interest
resides in more irregular graph domains. This lack of regularity hampers the
generalization of the classical notion of stationarity to graph signals. The
contribution in this paper is twofold. Firstly, we propose a definition of weak
stationarity for random graph signals that takes into account the structure of
the graph where the random process takes place, while inheriting many of the
meaningful properties of the classical definition in the time domain. Our
definition requires that stationary graph processes can be modeled as the
output of a linear graph filter applied to a white input. We will show that
this is equivalent to requiring the correlation matrix to be diagonalized by
the graph Fourier transform. Secondly, we analyze the properties of the power
spectral density and propose a number of methods to estimate it. We start with
nonparametric approaches, including periodograms, window-based average
periodograms, and filter banks. We then shift the focus to parametric
approaches, discussing the estimation of moving-average (MA), autoregressive
(AR) and ARMA processes. Finally, we illustrate the power spectral density
estimation in synthetic and real-world graphs.
|
[
{
"version": "v1",
"created": "Mon, 14 Mar 2016 04:01:43 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Aug 2017 00:51:20 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Marques",
"Antonio G.",
""
],
[
"Segarra",
"Santiago",
""
],
[
"Leus",
"Geert",
""
],
[
"Ribeiro",
"Alejandro",
""
]
] |
new_dataset
| 0.977706 |
1609.01266
|
Pablo Terlisky
|
Francisco J. Soulignac and Pablo Terlisky
|
Minimal and minimum unit circular-arc models
|
22 pages, 18 figures
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A proper circular-arc (PCA) model is a pair ${\cal M} = (C, \cal A)$ where
$C$ is a circle and $\cal A$ is a family of inclusion-free arcs on $C$ in which
no two arcs of $\cal A$ cover $C$. A PCA model $\cal U = (C,\cal A)$ is a $(c,
\ell)$-CA model when $C$ has circumference $c$, all the arcs in $\cal A$ have
length $\ell$, and all the extremes of the arcs in $\cal A$ are at a distance
at least $1$. If $c \leq c'$ and $\ell \leq \ell'$ for every $(c', \ell')$-CA
model equivalent (resp. isomorphic) to $\cal U$, then $\cal U$ is minimal
(resp. minimum). In this article we prove that every PCA model is isomorphic to
a minimum model. Our main tool is a new characterization of those PCA models
that are equivalent to $(c,\ell)$-CA models, that allows us to conclude that
$c$ and $\ell$ are integer when $\cal U$ is minimal. As a consequence, we
obtain an $O(n^3)$ time and $O(n^2)$ space algorithm to solve the minimal
representation problem, while we prove that the minimum representation problem
is NP-complete.
|
[
{
"version": "v1",
"created": "Mon, 5 Sep 2016 19:44:02 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Oct 2017 01:35:29 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Oct 2017 18:03:05 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Soulignac",
"Francisco J.",
""
],
[
"Terlisky",
"Pablo",
""
]
] |
new_dataset
| 0.982138 |
1609.02440
|
Yang Huang
|
Yang Huang and Bruno Clerckx
|
Large-Scale Multi-Antenna Multi-Sine Wireless Power Transfer
|
Accepted to IEEE Transactions on Signal Processing
| null |
10.1109/TSP.2017.2739112
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless Power Transfer (WPT) is expected to be a technology reshaping the
landscape of low-power applications such as the Internet of Things, Radio
Frequency identification (RFID) networks, etc. Although there has been some
progress towards multi-antenna multi-sine WPT design, the large-scale design of
WPT, reminiscent of massive MIMO in communications, remains an open challenge.
In this paper, we derive efficient multiuser algorithms based on a
generalizable optimization framework, in order to design transmit sinewaves
that maximize the weighted-sum/minimum rectenna output DC voltage. The study
highlights the significant effect of the nonlinearity introduced by the
rectification process on the design of waveforms in multiuser systems.
Interestingly, in the single-user case, the optimal spatial domain beamforming,
obtained prior to the frequency domain power allocation optimization, turns out
to be Maximum Ratio Transmission (MRT). In contrast, in the general weighted
sum criterion maximization problem, the spatial domain beamforming optimization
and the frequency domain power allocation optimization are coupled. Assuming
channel hardening, low-complexity algorithms are proposed based on asymptotic
analysis, to maximize the two criteria. The structure of the asymptotically
optimal spatial domain precoder can be found prior to the optimization. The
performance of the proposed algorithms is evaluated. Numerical results confirm
the inefficiency of the linear model-based design for the single and multi-user
scenarios. It is also shown that as nonlinear model-based designs, the proposed
algorithms can benefit from an increasing number of sinewaves.
|
[
{
"version": "v1",
"created": "Thu, 8 Sep 2016 14:13:00 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Aug 2017 15:15:29 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Huang",
"Yang",
""
],
[
"Clerckx",
"Bruno",
""
]
] |
new_dataset
| 0.991952 |
1609.03659
|
Wei Shen
|
Wei Shen, Kai Zhao, Yuan Jiang, Yan Wang, Xiang Bai and Alan Yuille
|
DeepSkeleton: Learning Multi-task Scale-associated Deep Side Outputs for
Object Skeleton Extraction in Natural Images
|
submitted to TIP. arXiv admin note: substantial text overlap with
arXiv:1603.09446
| null |
10.1109/TIP.2017.2735182
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Object skeletons are useful for object representation and object detection.
They are complementary to the object contour, and provide extra information,
such as how object scale (thickness) varies among object parts. But object
skeleton extraction from natural images is very challenging, because it
requires the extractor to be able to capture both local and non-local image
context in order to determine the scale of each skeleton pixel. In this paper,
we present a novel fully convolutional network with multiple scale-associated
side outputs to address this problem. By observing the relationship between the
receptive field sizes of the different layers in the network and the skeleton
scales they can capture, we introduce two scale-associated side outputs to each
stage of the network. The network is trained by multi-task learning, where one
task is skeleton localization to classify whether a pixel is a skeleton pixel
or not, and the other is skeleton scale prediction to regress the scale of each
skeleton pixel. Supervision is imposed at different stages by guiding the
scale-associated side outputs toward the groundtruth skeletons at the
appropriate scales. The responses of the multiple scale-associated side outputs
are then fused in a scale-specific way to detect skeleton pixels using multiple
scales effectively. Our method achieves promising results on two skeleton
extraction datasets, and significantly outperforms other competitors.
Additionally, the usefulness of the obtained skeletons and scales (thickness)
are verified on two object detection applications: Foreground object
segmentation and object proposal detection.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2016 02:23:39 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Dec 2016 18:55:20 GMT"
},
{
"version": "v3",
"created": "Thu, 13 Jul 2017 19:39:16 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Shen",
"Wei",
""
],
[
"Zhao",
"Kai",
""
],
[
"Jiang",
"Yuan",
""
],
[
"Wang",
"Yan",
""
],
[
"Bai",
"Xiang",
""
],
[
"Yuille",
"Alan",
""
]
] |
new_dataset
| 0.992097 |
1612.07120
|
Bin Bai Dr.
|
Bin Bai, Jianbin Liu, Yu Zhou, Songlin Zhang, Yuchen He, Zhuo Xu
|
Imaging around corners with single-pixel detector by computational ghost
imaging
| null | null |
10.1016/j.ijleo.2017.08.057
| null |
cs.CV physics.optics
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have designed a single-pixel camera with imaging around corners based on
computational ghost imaging. It can obtain the image of an object when the
camera cannot look at the object directly. Our imaging system explores the fact
that a bucket detector in a ghost imaging setup has no spatial resolution
capability. A series of experiments have been designed to confirm our
predictions. This camera has potential applications for imaging around corner
or other similar environments where the object cannot be observed directly.
|
[
{
"version": "v1",
"created": "Thu, 8 Dec 2016 09:54:20 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Bai",
"Bin",
""
],
[
"Liu",
"Jianbin",
""
],
[
"Zhou",
"Yu",
""
],
[
"Zhang",
"Songlin",
""
],
[
"He",
"Yuchen",
""
],
[
"Xu",
"Zhuo",
""
]
] |
new_dataset
| 0.980205 |
1706.02458
|
Silas Fong
|
Silas L. Fong and Vincent Y. F. Tan
|
Scaling Exponent and Moderate Deviations Asymptotics of Polar Codes for
the AWGN Channel
|
24 pages
| null |
10.3390/e19070364
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper investigates polar codes for the additive white Gaussian noise
(AWGN) channel. The scaling exponent $\mu$ of polar codes for a memoryless
channel $q_{Y|X}$ with capacity $I(q_{Y|X})$ characterizes the closest gap
between the capacity and non-asymptotic achievable rates in the following way:
For a fixed $\varepsilon \in (0, 1)$, the gap between the capacity $I(q_{Y|X})$
and the maximum non-asymptotic rate $R_n^*$ achieved by a length-$n$ polar code
with average error probability $\varepsilon$ scales as $n^{-1/\mu}$, i.e.,
$I(q_{Y|X})-R_n^* = \Theta(n^{-1/\mu})$.
It is well known that the scaling exponent $\mu$ for any binary-input
memoryless channel (BMC) with $I(q_{Y|X})\in(0,1)$ is bounded above by $4.714$,
which was shown by an explicit construction of polar codes. Our main result
shows that $4.714$ remains to be a valid upper bound on the scaling exponent
for the AWGN channel. Our proof technique involves the following two ideas: (i)
The capacity of the AWGN channel can be achieved within a gap of
$O(n^{-1/\mu}\sqrt{\log n})$ by using an input alphabet consisting of $n$
constellations and restricting the input distribution to be uniform; (ii) The
capacity of a multiple access channel (MAC) with an input alphabet consisting
of $n$ constellations can be achieved within a gap of $O(n^{-1/\mu}\log n)$ by
using a superposition of $\log n$ binary-input polar codes. In addition, we
investigate the performance of polar codes in the moderate deviations regime
where both the gap to capacity and the error probability vanish as $n$ grows.
An explicit construction of polar codes is proposed to obey a certain tradeoff
between the gap to capacity and the decay rate of the error probability for the
AWGN channel.
|
[
{
"version": "v1",
"created": "Thu, 8 Jun 2017 06:46:22 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Fong",
"Silas L.",
""
],
[
"Tan",
"Vincent Y. F.",
""
]
] |
new_dataset
| 0.978674 |
1706.03370
|
David Evans David E Evans
|
Bargav Jayaraman, Hannah Li, David Evans
|
Decentralized Certificate Authorities
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The security of TLS depends on trust in certificate authorities, and that
trust stems from their ability to protect and control the use of a private
signing key. The signing key is the key asset of a certificate authority (CA),
and its value is based on trust in the corresponding public key which is
primarily distributed by browser vendors. Compromise of a CA private key
represents a single point-of-failure that could have disastrous consequences,
so CAs go to great lengths to attempt to protect and control the use of their
private keys. Nevertheless, keys are sometimes compromised and may be misused
accidentally or intentionally by insiders. We propose splitting a CA's private
key among multiple parties, and producing signatures using a generic secure
multi-party computation protocol that never exposes the actual signing key.
This could be used by a single CA to reduce the risk that its signing key would
be compromised or misused. It could also enable new models for certificate
generation, where multiple CAs would need to agree and cooperate before a new
certificate can be generated, or even where certificate generation would
require cooperation between a CA and the certificate recipient (subject).
Although more efficient solutions are possible with custom protocols, we
demonstrate the feasibility of implementing a decentralized CA using a generic
two-party secure computation protocol with an evaluation of a prototype
implementation that uses secure two-party computation to generate certificates
signed using ECDSA on curve secp192k1.
|
[
{
"version": "v1",
"created": "Sun, 11 Jun 2017 16:11:42 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jun 2017 20:08:55 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Oct 2017 13:46:36 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Jayaraman",
"Bargav",
""
],
[
"Li",
"Hannah",
""
],
[
"Evans",
"David",
""
]
] |
new_dataset
| 0.988245 |
1706.05085
|
David Evans David E Evans
|
Hannah Li, David Evans
|
Horcrux: A Password Manager for Paranoids
|
13 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vulnerabilities in password managers are unremitting because current designs
provide large attack surfaces, both at the client and server. We describe and
evaluate Horcrux, a password manager that is designed holistically to minimize
and decentralize trust, while retaining the usability of a traditional password
manager. The prototype Horcrux client, implemented as a Firefox add-on, is
split into two components, with code that has access to the user's master's
password and any key material isolated into a small auditable component,
separate from the complexity of managing the user interface. Instead of
exposing actual credentials to the DOM, a dummy username and password are
autofilled by the untrusted component. The trusted component intercepts and
modifies POST requests before they are encrypted and sent over the network. To
avoid trusting a centralized store, stored credentials are secret-shared over
multiple servers. To provide domain and username privacy, while maintaining
resilience to off-line attacks on a compromised password store, we incorporate
cuckoo hashing in a way that ensures an attacker cannot determine if a guessed
master password is correct. Our approach only works for websites that do not
manipulate entered credentials in the browser client, so we conducted a
large-scale experiment that found the technique appears to be compatible with
over 98% of tested login forms.
|
[
{
"version": "v1",
"created": "Thu, 15 Jun 2017 20:48:07 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Oct 2017 13:39:48 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Li",
"Hannah",
""
],
[
"Evans",
"David",
""
]
] |
new_dataset
| 0.959824 |
1709.08990
|
Daniel Lemire
|
Daniel Lemire, Nathan Kurz, Christoph Rupp
|
Stream VByte: Faster Byte-Oriented Integer Compression
| null |
Information Processing Letters 130, February 2018, Pages 1-6
|
10.1016/j.ipl.2017.09.011
| null |
cs.IR cs.DB
|
http://creativecommons.org/licenses/by/4.0/
|
Arrays of integers are often compressed in search engines. Though there are
many ways to compress integers, we are interested in the popular byte-oriented
integer compression techniques (e.g., VByte or Google's Varint-GB). They are
appealing due to their simplicity and engineering convenience. Amazon's
varint-G8IU is one of the fastest byte-oriented compression technique published
so far. It makes judicious use of the powerful single-instruction-multiple-data
(SIMD) instructions available in commodity processors. To surpass varint-G8IU,
we present Stream VByte, a novel byte-oriented compression technique that
separates the control stream from the encoded data. Like varint-G8IU, Stream
VByte is well suited for SIMD instructions. We show that Stream VByte decoding
can be up to twice as fast as varint-G8IU decoding over real data sets. In this
sense, Stream VByte establishes new speed records for byte-oriented integer
compression, at times exceeding the speed of the memcpy function. On a 3.4GHz
Haswell processor, it decodes more than 4 billion differentially-coded integers
per second from RAM to L1 cache.
|
[
{
"version": "v1",
"created": "Mon, 25 Sep 2017 14:45:20 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Sep 2017 19:53:20 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Lemire",
"Daniel",
""
],
[
"Kurz",
"Nathan",
""
],
[
"Rupp",
"Christoph",
""
]
] |
new_dataset
| 0.993808 |
1710.02595
|
Umang Bhatt
|
Umang Bhatt, Shouvik Mani, Edgar Xi, J. Zico Kolter
|
Intelligent Pothole Detection and Road Condition Assessment
|
Presented at the Data For Good Exchange 2017
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Poor road conditions are a public nuisance, causing passenger discomfort,
damage to vehicles, and accidents. In the U.S., road-related conditions are a
factor in 22,000 of the 42,000 traffic fatalities each year. Although we often
complain about bad roads, we have no way to detect or report them at scale. To
address this issue, we developed a system to detect potholes and assess road
conditions in real-time. Our solution is a mobile application that captures
data on a car's movement from gyroscope and accelerometer sensors in the phone.
To assess roads using this sensor data, we trained SVM models to classify road
conditions with 93% accuracy and potholes with 92% accuracy, beating the base
rate for both problems. As the user drives, the models use the sensor data to
classify whether the road is good or bad, and whether it contains potholes.
Then, the classification results are used to create data-rich maps that
illustrate road conditions across the city. Our system will empower civic
officials to identify and repair damaged roads which inconvenience passengers
and cause accidents. This paper details our data science process for collecting
training data on real roads, transforming noisy sensor data into useful
signals, training and evaluating machine learning models, and deploying those
models to production through a real-time classification app. It also highlights
how cities can use our system to crowdsource data and deliver road repair
resources to areas in need.
|
[
{
"version": "v1",
"created": "Fri, 6 Oct 2017 21:42:15 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Oct 2017 05:05:58 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Bhatt",
"Umang",
""
],
[
"Mani",
"Shouvik",
""
],
[
"Xi",
"Edgar",
""
],
[
"Kolter",
"J. Zico",
""
]
] |
new_dataset
| 0.999632 |
1710.03330
|
Claudia Flores-Saviaga
|
Philip N. Howard, Saiph Savage, Claudia Flores-Saviaga, Carlos Toxtli
and Andres Monroy-Hern\'andez
|
Redes sociales, participaci\'on ciudadana y la hip\'otesis del
slacktivismo: lecciones del caso de "El Bronco" / Social Media, Civic
Engagement, and the Slacktivism Hypothesis: Lessons from Mexico's "El Bronco"
| null | null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
El uso de las redes sociales tiene consecuencias positivas o negativas en la
participaci\'on ciudadana? La gran parte de los intentos por responder a esta
pregunta incluyen datos de la opini\'on p\'ublica de los Estados Unidos, por lo
que nosotros ofrecemos un estudio sobre un caso significativo de M\'exico,
donde un candidato independiente utiliz\'o las redes sociales para comunicarse
con el p\'ublico y rehuy\'o de los medios de comunicaci\'on tradicionales.
Dicho candidato, conocido como "El Bronco", gan\'o la carrera por la
gubernatura del estado al derrotar a los candidatos de los partidos
tradicionales. Adem\'as, gener\'o una participaci\'on ciudadana que se ha
mantenido m\'as all\'a del d\'ia de las elecciones. En nuestra investigaci\'on
analizamos m\'as de 750 mil mensajes, comentarios y respuestas durante m\'as de
tres a\~nos de interacciones en la p\'agina p\'ublica de Facebook de "El
Bronco". Examinamos y demostramos que las redes sociales pueden utilizarse para
dar cabida a una gran cantidad de interacciones ciudadanas sobre la vida
p\'ublica m\'as all\'a de un acontecimiento pol\'itico.
Does social media use have a positive or negative impact on civic engagement?
The "slacktivism hypothesis" holds that if citizens use social media for
political conversation, those conversations will be fleeting and vapid. Most
attempts to answer this question involve public opinion data from the United
States, so we offer an examination of an important case from Mexico, where an
independent candidate used social media to communicate with the public and
eschewed traditional media outlets. He won the race for state governor,
defeating candidates from traditional parties and triggering sustained public
engagement beyond election day. In our investigation, we analyze over 750,000
posts, comments, and replies over three years of conversations on the Facebook
page of "El Bronco".
|
[
{
"version": "v1",
"created": "Mon, 9 Oct 2017 21:55:46 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Howard",
"Philip N.",
""
],
[
"Savage",
"Saiph",
""
],
[
"Flores-Saviaga",
"Claudia",
""
],
[
"Toxtli",
"Carlos",
""
],
[
"Monroy-Hernández",
"Andres",
""
]
] |
new_dataset
| 0.993925 |
1710.03346
|
Hao Chen
|
Hao Chen, Maria Vasardani, Stephan Winter
|
Geo-referencing Place from Everyday Natural Language Descriptions
|
28 pages, 15 figures
| null | null | null |
cs.AI cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Natural language place descriptions in everyday communication provide a rich
source of spatial knowledge about places. An important step to utilize such
knowledge in information systems is geo-referencing all the places referred to
in these descriptions. Current techniques for geo-referencing places from text
documents are using place name recognition and disambiguation; however, place
descriptions often contain place references that are not known by gazetteers,
or that are expressed in other, more flexible ways. Hence, the approach for
geo-referencing presented in this paper starts from a place graph that contains
the place references as well as spatial relationships extracted from place
descriptions. Spatial relationships are used to constrain the locations of
places and allow the later best-matching process for geo-referencing. The novel
geo-referencing process results in higher precision and recall compared to
state-of-art toponym resolution approaches on several tested place description
datasets.
|
[
{
"version": "v1",
"created": "Mon, 9 Oct 2017 23:06:17 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Chen",
"Hao",
""
],
[
"Vasardani",
"Maria",
""
],
[
"Winter",
"Stephan",
""
]
] |
new_dataset
| 0.996742 |
1710.03352
|
Robert Colvin
|
Ian J. Hayes, Larissa A. Meinicke, Kirsten Winter, Robert J. Colvin
|
A synchronous program algebra: a basis for reasoning about shared-memory
and event-based concurrency
|
Extended version of a Formal Methods 2016 paper, "An algebra of
synchronous atomic steps"
| null | null | null |
cs.LO cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This research started with an algebra for reasoning about rely/guarantee
concurrency for a shared memory model. The approach taken led to a more
abstract algebra of atomic steps, in which atomic steps synchronise (rather
than interleave) when composed in parallel. The algebra of rely/guarantee
concurrency then becomes an instantiation of the more abstract algebra. Many of
the core properties needed for rely/guarantee reasoning can be shown to hold in
the abstract algebra where their proofs are simpler and hence allow a higher
degree of automation. The algebra has been encoded in Isabelle/HOL to provide a
basis for tool support for program verification.
In rely/guarantee concurrency, programs are specified to guarantee certain
behaviours until assumptions about the behaviour of their environment are
violated. When assumptions are violated, program behaviour is unconstrained
(aborting), and guarantees need no longer hold. To support these guarantees a
second synchronous operator, weak conjunction, was introduced: both processes
in a weak conjunction must agree to take each atomic step, unless one aborts in
which case the whole aborts. In developing the laws for parallel and weak
conjunction we found many properties were shared by the operators and that the
proofs of many laws were essentially the same. This insight led to the idea of
generalising synchronisation to an abstract operator with only the axioms that
are shared by the parallel and weak conjunction operator, so that those two
operators can be viewed as instantiations of the abstract synchronisation
operator. The main differences between parallel and weak conjunction are how
they combine individual atomic steps; that is left open in the axioms for the
abstract operator.
|
[
{
"version": "v1",
"created": "Mon, 9 Oct 2017 23:48:19 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Hayes",
"Ian J.",
""
],
[
"Meinicke",
"Larissa A.",
""
],
[
"Winter",
"Kirsten",
""
],
[
"Colvin",
"Robert J.",
""
]
] |
new_dataset
| 0.990567 |
1710.03561
|
Geraint Palmer
|
Geraint I. Palmer, Vincent A. Knight, Paul R. Harper, Asyl L. Hawa
|
Ciw: An open source discrete event simulation library
| null | null | null | null |
cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces Ciw, an open source library for conducting discrete
event simulations that has been developed in Python. The strengths of the
library are illustrated in terms of best practice and reproducibility for
computational research. An analysis of Ciw's performance and comparison to
several alternative discrete event simulation frameworks is presented.
|
[
{
"version": "v1",
"created": "Wed, 27 Sep 2017 11:05:34 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Palmer",
"Geraint I.",
""
],
[
"Knight",
"Vincent A.",
""
],
[
"Harper",
"Paul R.",
""
],
[
"Hawa",
"Asyl L.",
""
]
] |
new_dataset
| 0.99868 |
1710.03675
|
Carl Boettiger
|
Carl Boettiger and Dirk Eddelbuettel
|
An Introduction to Rocker: Docker Containers for R
| null | null | null | null |
cs.SE
|
http://creativecommons.org/licenses/by/4.0/
|
We describe the Rocker project, which provides a widely-used suite of Docker
images with customized R environments for particular tasks. We discuss how this
suite is organized, and how these tools can increase portability, scaling,
reproducibility, and convenience of R users and developers.
|
[
{
"version": "v1",
"created": "Tue, 10 Oct 2017 16:02:11 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Boettiger",
"Carl",
""
],
[
"Eddelbuettel",
"Dirk",
""
]
] |
new_dataset
| 0.988806 |
1710.03732
|
Ketan Date
|
Ketan Date and Rakesh Nagi
|
RLT2-based Parallel Algorithms for Solving Large Quadratic Assignment
Problems on Graphics Processing Unit Clusters
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper discusses efficient parallel algorithms for obtaining strong lower
bounds and exact solutions for large instances of the Quadratic Assignment
Problem (QAP). Our parallel architecture is comprised of both multi-core
processors and Compute Unified Device Architecture (CUDA) enabled NVIDIA
Graphics Processing Units (GPUs) on the Blue Waters Supercomputing Facility at
the University of Illinois at Urbana-Champaign. We propose novel
parallelization of the Lagrangian Dual Ascent algorithm on the GPUs, which is
used for solving a QAP formulation based on Level-2 Refactorization
Linearization Technique (RLT2). The Linear Assignment sub-problems (LAPs) in
this procedure are solved using our accelerated Hungarian algorithm [Date,
Ketan, Rakesh Nagi. 2016. GPU-accelerated Hungarian algorithms for the Linear
Assignment Problem. Parallel Computing 57 52-72]. We embed this accelerated
dual ascent algorithm in a parallel branch-and-bound scheme and conduct
extensive computational experiments on single and multiple GPUs, using problem
instances with up to 42 facilities from the QAPLIB. The experiments suggest
that our GPU-based approach is scalable and it can be used to obtain tight
lower bounds on large QAP instances. Our accelerated branch-and-bound scheme is
able to comfortably solve Nugent and Taillard instances (up to 30 facilities)
from the QAPLIB, using modest number of GPUs.
|
[
{
"version": "v1",
"created": "Tue, 10 Oct 2017 17:22:04 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Date",
"Ketan",
""
],
[
"Nagi",
"Rakesh",
""
]
] |
new_dataset
| 0.982023 |
1710.03739
|
Hao Chen
|
Hao Chen and Kristin Lauter and Katherine E. Stange
|
Attacks on the Search-RLWE problem with small errors
| null |
SIAM Journal on Applied Algebra and Geometry 2017
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Ring Learning-With-Errors (RLWE) problem shows great promise for
post-quantum cryptography and homomorphic encryption. We describe a new attack
on the non-dual search RLWE problem with small error widths, using ring
homomorphisms to finite fields and the chi-squared statistical test. In
particular, we identify a "subfield vulnerability" (Section 5.2) and give a new
attack which finds this vulnerability by mapping to a finite field extension
and detecting non-uniformity with respect to the number of elements in the
subfield. We use this attack to give examples of vulnerable RLWE instances in
Galois number fields. We also extend the well-known search-to-decision
reduction result to Galois fields with any unramified prime modulus q,
regardless of the residue degree f of q, and we use this in our attacks. The
time complexity of our attack is O(nq2f), where n is the degree of K and f is
the residue degree of q in K. We also show an attack on the non-dual (resp.
dual) RLWE problem with narrow error distributions in prime cyclotomic rings
when the modulus is a ramified prime (resp. any integer). We demonstrate the
attacks in practice by finding many vulnerable instances and successfully
attacking them. We include the code for all attacks.
|
[
{
"version": "v1",
"created": "Tue, 10 Oct 2017 17:40:58 GMT"
}
] | 2017-10-11T00:00:00 |
[
[
"Chen",
"Hao",
""
],
[
"Lauter",
"Kristin",
""
],
[
"Stange",
"Katherine E.",
""
]
] |
new_dataset
| 0.998082 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.