id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1612.06345
Mohammed Eltayeb
Mohammed E. Eltayeb, Tareq Y. Al-Naffouri, and Robert W. Heath Jr
Compressive Sensing for Millimeter Wave Antenna Array Diagnosis
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The radiation pattern of an antenna array depends on the excitation weights and the geometry of the array. Due to wind and atmospheric conditions, outdoor millimeter wave antenna elements are subject to full or partial blockages from a plethora of particles like dirt, salt, ice, and water droplets. Handheld devices are also subject to blockages from random finger placement and/or finger prints. These blockages cause absorption and scattering to the signal incident on the array, and change the array geometry. This distorts the far-field radiation pattern of the array leading to an increase in the sidelobe level and decrease in gain. This paper studies the effects of blockages on the far-field radiation pattern of linear arrays and proposes two array diagnosis techniques for millimeter wave antenna arrays. The proposed techniques jointly estimate the locations of the blocked antennas and the induced attenuation and phase shifts. Numerical results show that the proposed techniques provide satisfactory results in terms of fault detection with reduced number of measurements (diagnosis time) provided that the number of blockages is small compared to the array size.
[ { "version": "v1", "created": "Mon, 19 Dec 2016 20:46:40 GMT" }, { "version": "v2", "created": "Tue, 25 Apr 2017 08:48:27 GMT" }, { "version": "v3", "created": "Fri, 30 Jun 2017 02:45:11 GMT" }, { "version": "v4", "created": "Mon, 9 Oct 2017 14:59:48 GMT" } ]
2017-10-10T00:00:00
[ [ "Eltayeb", "Mohammed E.", "" ], [ "Al-Naffouri", "Tareq Y.", "" ], [ "Heath", "Robert W.", "Jr" ] ]
new_dataset
0.999788
1706.00800
Vincent Neiger
Elise Barelli, Peter Beelen, Mrinmoy Datta, Vincent Neiger, Johan Rosenkilde
Two-Point Codes for the Generalized GK curve
13 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We improve previously known lower bounds for the minimum distance of certain two-point AG codes constructed using a Generalized Giulietti-Korchmaros curve (GGK). Castellanos and Tizziotti recently described such bounds for two-point codes coming from the Giulietti-Korchmaros curve (GK). Our results completely cover and in many cases improve on their results, using different techniques, while also supporting any GGK curve. Our method builds on the order bound for AG codes: to enable this, we study certain Weierstrass semigroups. This allows an efficient algorithm for computing our improved bounds. We find several new improvements upon the MinT minimum distance tables.
[ { "version": "v1", "created": "Fri, 2 Jun 2017 18:25:22 GMT" }, { "version": "v2", "created": "Sat, 7 Oct 2017 15:17:31 GMT" } ]
2017-10-10T00:00:00
[ [ "Barelli", "Elise", "" ], [ "Beelen", "Peter", "" ], [ "Datta", "Mrinmoy", "" ], [ "Neiger", "Vincent", "" ], [ "Rosenkilde", "Johan", "" ] ]
new_dataset
0.998522
1708.09658
Micha{\l} Skrzypczak
Micha{\l} Skrzypczak
B\"uchi VASS recognise w-languages that are Sigma^1_1 - complete
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short note exhibits an example of a Sigma^1_1-complete language that can be recognised by a one blind counter B\"uchi automaton (or equivalently a B\"uchi VASS with only one place).
[ { "version": "v1", "created": "Thu, 31 Aug 2017 10:39:04 GMT" }, { "version": "v2", "created": "Mon, 9 Oct 2017 16:09:22 GMT" } ]
2017-10-10T00:00:00
[ [ "Skrzypczak", "Michał", "" ] ]
new_dataset
0.994564
1709.10278
Omer Ben Porat
Omer Ben-Porat, Moshe Tennenholtz
Shapley Facility Location Games
To appear in WINE 2017: The 13th Conference on Web and Internet Economics
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Facility location games have been a topic of major interest in economics, operations research and computer science, starting from the seminal work by Hotelling. Spatial facility location models have successfully predicted the outcome of competition in a variety of scenarios. In a typical facility location game, users/customers/voters are mapped to a metric space representing their preferences, and each player picks a point (facility) in that space. In most facility location games considered in the literature, users are assumed to act deterministically: given the facilities chosen by the players, users are attracted to their nearest facility. This paper introduces facility location games with probabilistic attraction, dubbed Shapley facility location games, due to a surprising connection to the Shapley value. The specific attraction function we adopt in this model is aligned with the recent findings of the behavioral economics literature on choice prediction. Given this model, our first main result is that Shapley facility location games are potential games; hence, they possess pure Nash equilibrium. Moreover, the latter is true for any compact user space, any user distribution over that space, and any number of players. Note that this is in sharp contrast to Hotelling facility location games. In our second main result we show that under the assumption that players can compute an approximate best response, approximate equilibrium profiles can be learned efficiently by the players via dynamics. Our third main result is a bound on the Price of Anarchy of this class of games, as well as showing the bound is tight. Ultimately, we show that player payoffs coincide with their Shapley value in a coalition game, where coalition gains are the social welfare of the users.
[ { "version": "v1", "created": "Fri, 29 Sep 2017 08:17:39 GMT" }, { "version": "v2", "created": "Mon, 9 Oct 2017 16:32:18 GMT" } ]
2017-10-10T00:00:00
[ [ "Ben-Porat", "Omer", "" ], [ "Tennenholtz", "Moshe", "" ] ]
new_dataset
0.998145
1710.02566
Kaustubha Mendhurwar
Kaustubha Mendhurwar, Qing Gu, Vladimir de la Cruz, Sudhir Mudur, and Tiberiu Popa
CAMREP- Concordia Action and Motion Repository
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Action recognition, motion classification, gait analysis and synthesis are fundamental problems in a number of fields such as computer graphics, bio-mechanics and human computer interaction that generate a large body of research. This type of data is complex because it is inherently multidimensional and has multiple modalities such as video, motion capture data, accelerometer data, etc. While some of this data, such as monocular video are easy to acquire, others are much more difficult and expensive such as motion capture data or multi-view video. This creates a large barrier of entry in the research community for data driven research. We have embarked on creating a new large repository of motion and action data (CAMREP) consisting of several motion and action databases. What makes this database unique is that we use a variety of modalities, enabling multi-modal analysis. Presently, the size of datasets varies with some having a large number of subjects while others having smaller numbers. We have also acquired long capture sequences in a number of cases, making some datasets rather large.
[ { "version": "v1", "created": "Fri, 6 Oct 2017 19:42:13 GMT" } ]
2017-10-10T00:00:00
[ [ "Mendhurwar", "Kaustubha", "" ], [ "Gu", "Qing", "" ], [ "de la Cruz", "Vladimir", "" ], [ "Mudur", "Sudhir", "" ], [ "Popa", "Tiberiu", "" ] ]
new_dataset
0.997258
1710.02599
Pulkit Budhiraja
Pulkit Budhiraja, Mark Roman Miller, Abhishek K Modi, David Forsyth
Rotation Blurring: Use of Artificial Blurring to Reduce Cybersickness in Virtual Reality First Person Shooters
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Users of Virtual Reality (VR) systems often experience vection, the perception of self-motion in the absence of any physical movement. While vection helps to improve presence in VR, it often leads to a form of motion sickness called cybersickness. Cybersickness is a major deterrent to large scale adoption of VR. Prior work has discovered that changing vection (changing the perceived speed or moving direction) causes more severe cybersickness than steady vection (walking at a constant speed or in a constant direction). Based on this idea, we try to reduce the cybersickness caused by character movements in a First Person Shooter (FPS) game in VR. We propose Rotation Blurring (RB), uniformly blurring the screen during rotational movements to reduce cybersickness. We performed a user study to evaluate the impact of RB in reducing cybersickness. We found that the blurring technique led to an overall reduction in sickness levels of the participants and delayed its onset. Participants who experienced acute levels of cybersickness benefited significantly from this technique.
[ { "version": "v1", "created": "Fri, 6 Oct 2017 22:02:00 GMT" } ]
2017-10-10T00:00:00
[ [ "Budhiraja", "Pulkit", "" ], [ "Miller", "Mark Roman", "" ], [ "Modi", "Abhishek K", "" ], [ "Forsyth", "David", "" ] ]
new_dataset
0.98454
1710.02722
Wiktor Daszczuk
Wiktor B. Daszczuk, Maciej Bielecki, Jan Michalski
Rybu: Imperative-style Preprocessor for Verification of Distributed Systems in the Dedan Environment
16 pages, 1 figure
KKIO 2017 - Software Engineering Conference, Rzesz\'ow, Poland, 14-16 Sept 2017, Software Engineering Research for the Practice, Polish Information Processing Society, pp. 135-150
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Integrated Model of Distributed Systems (IMDS) is developed for specification and verification of distributed systems, and verification against deadlocks. On the basis of IMDS, Dedan verification environment was prepared. Universal deadlock detection formulas allow for automatic verification, without any knowledge of a temporal logic, which simplifies the verification process. However, the input language, following the rules of IMDS, seems to be exotic for many users. For this reason Rybu preprocessor was created. Its purpose is to build large models in imperative-style language, on much higher abstraction level.
[ { "version": "v1", "created": "Sat, 7 Oct 2017 18:57:50 GMT" } ]
2017-10-10T00:00:00
[ [ "Daszczuk", "Wiktor B.", "" ], [ "Bielecki", "Maciej", "" ], [ "Michalski", "Jan", "" ] ]
new_dataset
0.99667
1710.02763
Eduardo Seiti De Oliveira
Eduardo Oliveira, Jomara Bind\'a, Renato Lopes, Eduardo Valle
Paperclickers: Affordable Solution for Classroom Response Systems
12 pages, 13 figures
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a low-cost classroom response system requiring a single mobile device for the teacher and cards with printed codes for the students. We aim at broadening the adoption of active learning techniques in developing countries, offering a tool for easy implementation. We embody the solution as a smartphone application, describing the development history, pitfalls, and lessons learned that might be helpful for other small academic teams. We also described the results of the first round usability tests we performed on the first prototype, and how the affected the current version of the software. A beta release version is currently available for the public at large.
[ { "version": "v1", "created": "Sun, 8 Oct 2017 01:00:51 GMT" } ]
2017-10-10T00:00:00
[ [ "Oliveira", "Eduardo", "" ], [ "Bindá", "Jomara", "" ], [ "Lopes", "Renato", "" ], [ "Valle", "Eduardo", "" ] ]
new_dataset
0.981437
1710.02932
Haresh Karnan
Haresh Karnan, Aritra Biswas, Pranav Vaidik Dhulipala, Jan Dufek and Robin Murphy
Visual Servoing of Unmanned Surface Vehicle from Small Tethered Unmanned Aerial Vehicle
6 pages, 13 images
null
null
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an algorithm and the implementation of a motor schema to aid the visual localization subsystem of the ongoing EMILY project at Texas A and M University. The EMILY project aims to team an Unmanned Surface Vehicle (USV) with an Unmanned Aerial Vehicle (UAV) to augment the search and rescue of marine casualties during an emergency response phase. The USV is designed to serve as a flotation device once it reaches the victims. A live video feed from the UAV is provided to the casuality responders giving them a visual estimate of the USVs orientation and position to help with its navigation. One of the challenges involved with casualty response using a USV UAV team is to simultaneously control the USV and track it. In this paper, we present an implemented solution to automate the UAV camera movements to keep the USV in view at all times. The motor schema proposed, uses the USVs coordinates from the visual localization subsystem to control the UAVs camera movements and track the USV with minimal camera movements such that the USV is always in the cameras field of view.
[ { "version": "v1", "created": "Mon, 9 Oct 2017 04:14:05 GMT" } ]
2017-10-10T00:00:00
[ [ "Karnan", "Haresh", "" ], [ "Biswas", "Aritra", "" ], [ "Dhulipala", "Pranav Vaidik", "" ], [ "Dufek", "Jan", "" ], [ "Murphy", "Robin", "" ] ]
new_dataset
0.998505
1710.02934
Yuke Li
Yuke Li, A. Stephen Morse, Ji Liu, and Tamer Ba\c{s}ar
Countries' Survival in Networked International Environments
a shorter version will appear in Proceedings of IEEE conference on Decision and Control 2017
null
null
null
cs.SI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper applies a recently developed power allocation game in Li and Morse (2017) to study the countries' survival problem in networked international environments. In the game, countries strategically allocate their power to support the survival of themselves and their friends and to oppose that of their foes, where by a country's survival is meant when the country's total support equals or exceeds its total threats. This paper establishes conditions that characterize different types of networked international environments in which a country may survive, such as when all the antagonism among countries makes up a complete or bipartite graph.
[ { "version": "v1", "created": "Mon, 9 Oct 2017 04:27:35 GMT" } ]
2017-10-10T00:00:00
[ [ "Li", "Yuke", "" ], [ "Morse", "A. Stephen", "" ], [ "Liu", "Ji", "" ], [ "Başar", "Tamer", "" ] ]
new_dataset
0.964825
1701.04679
Evangelos Pournaras
Evangelos Pournaras, Mark Yao, Dirk Helbing
Self-regulating Supply-Demand Systems
null
null
10.1016/j.future.2017.05.018
null
cs.SY cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Supply-demand systems in Smart City sectors such as energy, transportation, telecommunication, are subject of unprecedented technological transformations by the Internet of Things. Usually, supply-demand systems involve actors that produce and consume resources, e.g. energy, and they are regulated such that supply meets demand, or demand meets available supply. Mismatches of supply and demand may increase operational costs, can cause catastrophic damage in infrastructure, for instance power blackouts, and may even lead to social unrest and security threats. Long-term, operationally offline and top-down regulatory decision-making by governmental officers, policy makers or system operators may turn out to be ineffective for matching supply-demand under new dynamics and opportunities that Internet of Things technologies bring to supply-demand systems, for instance, interactive cyber-physical systems and software agents running locally in physical assets to monitor and apply automated control actions in real-time. e.g. power flow redistributions by smart transformers to improve the Smart Grid reliability. Existing work on online regulatory mechanisms of matching supply-demand either focuses on game-theoretic solutions with assumptions that cannot be easily met in real-world systems or assume centralized management entities and local access to global information. This paper contributes a generic decentralized self-regulatory framework, which, in contrast to related work, is shaped around standardized control system concepts and Internet of Things technologies for an easier adoption and applicability. The framework involves a decentralized combinatorial optimization mechanism that matches supply-demand under different regulatory scenarios.
[ { "version": "v1", "created": "Mon, 16 Jan 2017 16:53:12 GMT" }, { "version": "v2", "created": "Sun, 9 Apr 2017 21:56:05 GMT" } ]
2017-10-09T00:00:00
[ [ "Pournaras", "Evangelos", "" ], [ "Yao", "Mark", "" ], [ "Helbing", "Dirk", "" ] ]
new_dataset
0.990617
1709.01634
J. Michael Herrmann
J. Michael Herrmann
The Voynich Manuscript is Written in Natural Language: The Pahlavi Hypothesis
23 pages, 15 figures, 4 tables. Second version: one reference added, duplicate text removed from introduction
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The late medieval Voynich Manuscript (VM) has resisted decryption and was considered a meaningless hoax or an unsolvable cipher. Here, we provide evidence that the VM is written in natural language by establishing a relation of the Voynich alphabet and the Iranian Pahlavi script. Many of the Voynich characters are upside-down versions of their Pahlavi counterparts, which may be an effect of different writing directions. Other Voynich letters can be explained as ligatures or departures from Pahlavi with the intent to cope with known problems due to the stupendous ambiguity of Pahlavi text. While a translation of the VM text is not attempted here, we can confirm the Voynich-Pahlavi relation at the character level by the transcription of many words from the VM illustrations and from parts of the main text. Many of the transcribed words can be identified as terms from Zoroastrian cosmology which is in line with the use of Pahlavi script in Zoroastrian communities from medieval times.
[ { "version": "v1", "created": "Wed, 6 Sep 2017 00:15:37 GMT" }, { "version": "v2", "created": "Fri, 6 Oct 2017 16:52:11 GMT" } ]
2017-10-09T00:00:00
[ [ "Herrmann", "J. Michael", "" ] ]
new_dataset
0.999646
1710.01458
Zhixian Lei
Zhixian Lei, Yueqi Sheng
Sum of Square Proof for Brascamp-Lieb Type Inequality
null
null
null
null
cs.CC math.CA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Brascamp-Lieb inequality is an important mathematical tool in analysis, geometry and information theory. There are various ways to prove Brascamp-Lieb inequality such as heat flow method, Brownian motion and subadditivity of the entropy. While Brascamp-Lieb inequality is originally stated in Euclidean Space, discussed Brascamp-Lieb inequality for discrete Abelian group and discussed Brascamp-Lieb inequality for Markov semigroups. Many mathematical inequalities can be formulated as algebraic inequalities which asserts some given polynomial is nonnegative. In 1927, Artin proved that any non- negative polynomial can be represented as a sum of squares of rational functions, which can be further formulated as a polynomial certificate of the nonnegativity of the polynomial. This is a Sum of Square proof of the inequality. Take the degree of the polynomial certificate as the degree of Sum of Square proof. The degree of an Sum of Square proof determines the complexity of generating such proof by Sum of Square algorithm which is a powerful tool for optimization and computer aided proof. In this paper, we give a Sum of Square proof for some special settings of Brascamp- Lieb inequality following and and discuss some applications of Brascamp-Lieb inequality on Abelian group and Euclidean Sphere. If the original description of the inequality has constant degree and d is constant, the degree of the proof is also constant. Therefore, low degree sum of square algorithm can fully capture the power of low degree finite Brascamp-Lieb inequality.
[ { "version": "v1", "created": "Wed, 4 Oct 2017 04:46:05 GMT" }, { "version": "v2", "created": "Thu, 5 Oct 2017 22:28:34 GMT" } ]
2017-10-09T00:00:00
[ [ "Lei", "Zhixian", "" ], [ "Sheng", "Yueqi", "" ] ]
new_dataset
0.967984
1710.01928
Maheswara Rao Valluri
Maheswara Rao Valluri
NTRUCipher-Lattice Based Secret Key Encryption
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
NTRU cryptosystem has allowed designing a range of cryptographic schemes due to its flexibility and efficiency. Although NTRU cryptosystem was introduced nearly two decades ago, it has not yet received any attention like designing a secret key encryption. In this paper, we propose a secret key encryption over NTRU lattices, named as NTRUCipher. This NTRUCipher is designed using modification of the NTRU public key encryption. We analyze this cipher efficiency and the space complexity with respect to security aspects, and also show that the NTRUCipher is secured under the indistinguishability chosen plaintext attack.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 09:13:47 GMT" }, { "version": "v2", "created": "Fri, 6 Oct 2017 00:50:34 GMT" } ]
2017-10-09T00:00:00
[ [ "Valluri", "Maheswara Rao", "" ] ]
new_dataset
0.999104
1710.02086
Sreelekha S
Sreelekha S, Pushpak Bhattacharyya
Indowordnets help in Indian Language Machine Translation
4 pages with 3 tables submitted to LREC 2018
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Being less resource languages, Indian-Indian and English-Indian language MT system developments faces the difficulty to translate various lexical phenomena. In this paper, we present our work on a comparative study of 440 phrase-based statistical trained models for 110 language pairs across 11 Indian languages. We have developed 110 baseline Statistical Machine Translation systems. Then we have augmented the training corpus with Indowordnet synset word entries of lexical database and further trained 110 models on top of the baseline system. We have done a detailed performance comparison using various evaluation metrics such as BLEU score, METEOR and TER. We observed significant improvement in evaluations of translation quality across all the 440 models after using the Indowordnet. These experiments give a detailed insight in two ways : (1) usage of lexical database with synset mapping for resource poor languages (2) efficient usage of Indowordnet sysnset mapping. More over, synset mapped lexical entries helped the SMT system to handle the ambiguity to a great extent during the translation.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 16:03:42 GMT" }, { "version": "v2", "created": "Fri, 6 Oct 2017 04:15:38 GMT" } ]
2017-10-09T00:00:00
[ [ "S", "Sreelekha", "" ], [ "Bhattacharyya", "Pushpak", "" ] ]
new_dataset
0.988102
1710.02280
Yifei Teng
Yifei Teng, An Zhao, Camille Goudeseune
Generating Nontrivial Melodies for Music as a Service
ISMIR 2017 Conference
null
null
null
cs.SD cs.AI eess.AS
http://creativecommons.org/licenses/by/4.0/
We present a hybrid neural network and rule-based system that generates pop music. Music produced by pure rule-based systems often sounds mechanical. Music produced by machine learning sounds better, but still lacks hierarchical temporal structure. We restore temporal hierarchy by augmenting machine learning with a temporal production grammar, which generates the music's overall structure and chord progressions. A compatible melody is then generated by a conditional variational recurrent autoencoder. The autoencoder is trained with eight-measure segments from a corpus of 10,000 MIDI files, each of which has had its melody track and chord progressions identified heuristically. The autoencoder maps melody into a multi-dimensional feature space, conditioned by the underlying chord progression. A melody is then generated by feeding a random sample from that space to the autoencoder's decoder, along with the chord progression generated by the grammar. The autoencoder can make musically plausible variations on an existing melody, suitable for recurring motifs. It can also reharmonize a melody to a new chord progression, keeping the rhythm and contour. The generated music compares favorably with that generated by other academic and commercial software designed for the music-as-a-service industry.
[ { "version": "v1", "created": "Fri, 6 Oct 2017 05:53:20 GMT" } ]
2017-10-09T00:00:00
[ [ "Teng", "Yifei", "" ], [ "Zhao", "An", "" ], [ "Goudeseune", "Camille", "" ] ]
new_dataset
0.991836
1710.02316
Jean Stawiaski
Jean Stawiaski
A Multiscale Patch Based Convolutional Network for Brain Tumor Segmentation
null
null
null
null
cs.CV q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents a multiscale patch based convolutional neural network for the automatic segmentation of brain tumors in multi-modality 3D MR images. We use multiscale deep supervision and inputs to train a convolutional network. We evaluate the effectiveness of the proposed approach on the BRATS 2017 segmentation challenge where we obtained dice scores of 0.755, 0.900, 0.782 and 95% Hausdorff distance of 3.63mm, 4.10mm, and 6.81mm for enhanced tumor core, whole tumor and tumor core respectively.
[ { "version": "v1", "created": "Fri, 6 Oct 2017 09:04:28 GMT" } ]
2017-10-09T00:00:00
[ [ "Stawiaski", "Jean", "" ] ]
new_dataset
0.99566
1710.02382
Zeeshan Kaleem
Zeeshan Kaleem and Mubashir Husain Rehmani
Amateur Drone Monitoring: State-of-the-Art Architectures, Key Enabling Technologies, and Future Research Directions
arXiv admin note: text overlap with arXiv:1510.07390 by other authors
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The unmanned air-vehicle (UAV) or mini-drones equipped with sensors are becoming increasingly popular for various commercial, industrial, and public-safety applications. However, drones with uncontrolled deployment poses challenges for highly security-sensitive areas such as President house, nuclear plants, and commercial areas because they can be used unlawfully. In this article, to cope with security-sensitive challenges, we propose point-to-point and flying ad-hoc network (FANET) architectures to assist the efficient deployment of monitoring drones (MDr). To capture amateur drone (ADr), MDr must have the capability to efficiently and timely detect, track, jam, and hunt the ADr. We discuss the capabilities of the existing detection, tracking, localization, and routing schemes and also present the limitations in these schemes as further research challenges. Moreover, the future challenges related to co-channel interference, channel model design, and cooperative schemes are discussed. Our findings indicate that MDr deployment is necessary for caring of ADr, and intensive research and development is required to fill the gaps in the existing technologies.
[ { "version": "v1", "created": "Sun, 17 Sep 2017 11:03:57 GMT" } ]
2017-10-09T00:00:00
[ [ "Kaleem", "Zeeshan", "" ], [ "Rehmani", "Mubashir Husain", "" ] ]
new_dataset
0.990517
1401.1541
Lorna Stewart
Lorna Stewart and Richard Anthony Valenzano
On polygon numbers of circle graphs and distance hereditary graphs
27 pages, 8 figures
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Circle graphs are intersection graphs of chords in a circle and $k$-polygon graphs are intersection graphs of chords in a convex $k$-sided polygon where each chord has its endpoints on distinct sides. The $k$-polygon graphs, for $k \ge 2$, form an infinite chain of graph classes, each of which contains the class of permutation graphs. The union of all of those graph classes is the class of circle graphs. The polygon number $\gp(G)$ of a circle graph $G$ is the minimum $k$ such that $G$ is a $k$-polygon graph. Given a circle graph $G$ and an integer $k$, determining whether $\gp(G) \le k$ is NP-complete, while the problem is solvable in polynomial time for fixed $k$. In this paper, we show that $\gp(G)$ is always at least as large as the asteroidal number of $G$, and equal to the asteroidal number of $G$ when $G$ is a connected distance hereditary graph that is not a clique. This implies that the classes of distance hereditary permutation graphs and distance hereditary AT-free graphs are the same, and we give a forbidden subgraph characterization of that class. We also establish the following upper bounds: $\gp(G)$ is at most the clique cover number of $G$ if $G$ is not a clique, at most 1 plus the independence number of $G$, and at most $\lceil n/2 \rceil$ where $n \ge 3$ is the number of vertices of $G$. Our results lead to linear time algorithms for finding the minimum number of corners that must be added to a given circle representation to produce a polygon representation, and for finding the asteroidal number of a distance hereditary graph, both of which are improvements over previous algorithms for those problems.
[ { "version": "v1", "created": "Tue, 7 Jan 2014 23:17:25 GMT" }, { "version": "v2", "created": "Wed, 4 Oct 2017 21:38:49 GMT" } ]
2017-10-06T00:00:00
[ [ "Stewart", "Lorna", "" ], [ "Valenzano", "Richard Anthony", "" ] ]
new_dataset
0.999793
1701.01469
Harsha Nagarajan
Mowen Lu, Harsha Nagarajan, Emre Yamangil, Russell Bent, Scott Backhaus, Arthur Barnes
Optimal Transmission Line Switching under Geomagnetic Disturbances
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, there have been increasing concerns about how geomagnetic disturbances (GMDs) impact electrical power systems. Geomagnetically-induced currents (GICs) can saturate transformers, induce hot spot heating and increase reactive power losses. These effects can potentially cause catastrophic damage to transformers and severely impact the ability of a power system to deliver power. To address this problem, we develop a model of GIC impacts to power systems that includes 1) GIC thermal capacity of transformers as a function of normal Alternating Current (AC) and 2) reactive power losses as a function of GIC. We use this model to derive an optimization problem that protects power systems from GIC impacts through line switching, generator redispatch, and load shedding. We employ state-of-the-art convex relaxations of AC power flow equations to lower bound the objective. We demonstrate the approach on a modified RTS96 system and the UIUC 150-bus system and show that line switching is an effective means to mitigate GIC impacts. We also provide a sensitivity analysis of optimal switching decisions with respect to GMD direction.
[ { "version": "v1", "created": "Thu, 5 Jan 2017 20:32:59 GMT" }, { "version": "v2", "created": "Thu, 1 Jun 2017 18:38:24 GMT" }, { "version": "v3", "created": "Sat, 23 Sep 2017 00:18:09 GMT" }, { "version": "v4", "created": "Thu, 5 Oct 2017 05:22:10 GMT" } ]
2017-10-06T00:00:00
[ [ "Lu", "Mowen", "" ], [ "Nagarajan", "Harsha", "" ], [ "Yamangil", "Emre", "" ], [ "Bent", "Russell", "" ], [ "Backhaus", "Scott", "" ], [ "Barnes", "Arthur", "" ] ]
new_dataset
0.989512
1702.01042
Jinwen Shi
Jinwen Shi, Ling Liu, Deniz G\"und\"uz and Cong Ling
Polar Codes and Polar Lattices for the Heegard-Berger Problem
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Explicit coding schemes are proposed to achieve the rate-distortion function of the Heegard-Berger problem using polar codes. Specifically, a nested polar code construction is employed to achieve the rate-distortion function for the doubly-symmetric binary sources when the side information may be absent. The nested structure contains two optimal polar codes for lossy source coding and channel coding, respectively. Moreover, a similar nested polar lattice construction is employed when the source and the side information are jointly Gaussian. The proposed polar lattice is constructed by nesting a quantization polar lattice and a capacity-achieving polar lattice for the additive white Gaussian noise channel.
[ { "version": "v1", "created": "Fri, 3 Feb 2017 15:14:11 GMT" }, { "version": "v2", "created": "Thu, 5 Oct 2017 17:36:14 GMT" } ]
2017-10-06T00:00:00
[ [ "Shi", "Jinwen", "" ], [ "Liu", "Ling", "" ], [ "Gündüz", "Deniz", "" ], [ "Ling", "Cong", "" ] ]
new_dataset
0.998808
1709.00252
Tony Wauters
Fabio Salassa, Wim Vancroonenburg, Tony Wauters, Federico Della Croce, Greet Vanden Berghe
MILP and Max-Clique based heuristics for the Eternity II puzzle
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present paper considers a hybrid local search approach to the Eternity II puzzle and to unsigned, rectangular, edge matching puzzles in general. Both an original mixed-integer linear programming (MILP) formulation and a novel Max-Clique formulation are presented for this NP-hard problem. Although the presented formulations remain computationally intractable for medium and large sized instances, they can serve as the basis for developing heuristic decompositions and very large scale neighbourhoods. As a side product of the Max-Clique formulation, new hard-to-solve instances are published for the academic research community. Two reasonably well performing MILP-based constructive methods are presented and used for determining the initial solution of a multi-neighbourhood local search approach. Experimental results confirm that this local search can further improve the results obtained by the constructive heuristics and is quite competitive with the state of the art procedures.
[ { "version": "v1", "created": "Fri, 1 Sep 2017 11:27:55 GMT" }, { "version": "v2", "created": "Thu, 5 Oct 2017 11:01:37 GMT" } ]
2017-10-06T00:00:00
[ [ "Salassa", "Fabio", "" ], [ "Vancroonenburg", "Wim", "" ], [ "Wauters", "Tony", "" ], [ "Della Croce", "Federico", "" ], [ "Berghe", "Greet Vanden", "" ] ]
new_dataset
0.999185
1709.02247
Saed Khawaldeh
Saed Khawaldeh, Tajwar Abrar Aleef, Usama Pervaiz, Vu Hoang Minh and Yeman Brhane Hagos
Complete End-To-End Low Cost Solution To a 3D Scanning System with Integrated Turntable
22 pages
International Journal of Computer Science & Information Technology (IJCSIT), 9, 39-55 (2017)
10.5121/ijcsit.2017.9404
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
3D reconstruction is a technique used in computer vision which has a wide range of applications in areas like object recognition, city modelling, virtual reality, physical simulations, video games and special effects. Previously, to perform a 3D reconstruction, specialized hardwares were required. Such systems were often very expensive and was only available for industrial or research purpose. With the rise of the availability of high-quality low cost 3D sensors, it is now possible to design inexpensive complete 3D scanning systems. The objective of this work was to design an acquisition and processing system that can perform 3D scanning and reconstruction of objects seamlessly. In addition, the goal of this work also included making the 3D scanning process fully automated by building and integrating a turntable alongside the software. This means the user can perform a full 3D scan only by a press of a few buttons from our dedicated graphical user interface. Three main steps were followed to go from acquisition of point clouds to the finished reconstructed 3D model. First, our system acquires point cloud data of a person/object using inexpensive camera sensor. Second, align and convert the acquired point cloud data into a watertight mesh of good quality. Third, export the reconstructed model to a 3D printer to obtain a proper 3D print of the model.
[ { "version": "v1", "created": "Sun, 3 Sep 2017 13:40:23 GMT" } ]
2017-10-06T00:00:00
[ [ "Khawaldeh", "Saed", "" ], [ "Aleef", "Tajwar Abrar", "" ], [ "Pervaiz", "Usama", "" ], [ "Minh", "Vu Hoang", "" ], [ "Hagos", "Yeman Brhane", "" ] ]
new_dataset
0.993257
1709.03787
Balazs Vedres
Balazs Vedres
Forbidden triads and Creative Success in Jazz: The Miles Davis Factor
null
Applied Network Science (2017) 2:31
10.1007/s41109-017-0051-2
null
cs.SI nlin.AO stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article argues for the importance of forbidden triads - open triads with high-weight edges - in predicting success in creative fields. Forbidden triads had been treated as a residual category beyond closed and open triads, yet I argue that these structures provide opportunities to combine socially evolved styles in new ways. Using data on the entire history of recorded jazz from 1896 to 2010, I show that observed collaborations have tolerated the openness of high weight triads more than expected, observed jazz sessions had more forbidden triads than expected, and the density of forbidden triads contributed to the success of recording sessions, measured by the number of record releases of session material. The article also shows that the sessions of Miles Davis had received an especially high boost from forbidden triads.
[ { "version": "v1", "created": "Tue, 12 Sep 2017 11:28:25 GMT" } ]
2017-10-06T00:00:00
[ [ "Vedres", "Balazs", "" ] ]
new_dataset
0.988879
1709.09343
Francisco Su\'arez-Ruiz
Francisco Su\'arez-Ruiz, Teguh Santoso Lembono and Quang-Cuong Pham
RoboTSP - A Fast Solution to the Robotic Task Sequencing Problem
6 pages, 7 figures, 1 table
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many industrial robotics applications, such as spot-welding, spray-painting or drilling, the robot is required to visit successively multiple targets. The robot travel time among the targets is a significant component of the overall execution time. This travel time is in turn greatly affected by the order of visit of the targets, and by the robot configurations used to reach each target. Therefore, it is crucial to optimize these two elements, a problem known in the literature as the Robotic Task Sequencing Problem (RTSP). Our contribution in this paper is two-fold. First, we propose a fast, near-optimal, algorithm to solve RTSP. The key to our approach is to exploit the classical distinction between task space and configuration space, which, surprisingly, has been so far overlooked in the RTSP literature. Second, we provide an open-source implementation of the above algorithm, which has been carefully benchmarked to yield an efficient, ready-to-use, software solution. We discuss the relationship between RTSP and other Traveling Salesman Problem (TSP) variants, such as the Generalized Traveling Salesman Problem (GTSP), and show experimentally that our method finds motion sequences of the same quality but using several orders of magnitude less computation time than existing approaches.
[ { "version": "v1", "created": "Wed, 27 Sep 2017 05:42:31 GMT" }, { "version": "v2", "created": "Thu, 5 Oct 2017 10:29:57 GMT" } ]
2017-10-06T00:00:00
[ [ "Suárez-Ruiz", "Francisco", "" ], [ "Lembono", "Teguh Santoso", "" ], [ "Pham", "Quang-Cuong", "" ] ]
new_dataset
0.970892
1710.01772
Yunfeng Zhang
Yedendra B. Shrinivasan, Yunfeng Zhang
CELIO: An application development framework for interactive spaces
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Developing applications for interactive space is different from developing cross-platform applications for personal computing. Input, output, and architectural variations in each interactive space introduce big overhead in terms of cost and time for developing, deploying and maintaining applications for interactive spaces. Often, these applications become on-off experience tied to the deployed spaces. To alleviate this problem and enable rapid responsive space design applications similar to responsive web design, we present CELIO application development framework for interactive spaces. The framework is micro services based and neatly decouples application and design specifications from hardware and architecture specifications of an interactive space. In this paper, we describe this framework and its implementation details. Also, we briefly discuss the use cases developed using this framework.
[ { "version": "v1", "created": "Wed, 4 Oct 2017 19:19:39 GMT" } ]
2017-10-06T00:00:00
[ [ "Shrinivasan", "Yedendra B.", "" ], [ "Zhang", "Yunfeng", "" ] ]
new_dataset
0.995426
1710.01872
Lingfei Jin
Peter Beelen and Lingfei Jin
Explicit MDS Codes with Complementary Duals
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1964, Massey introduced a class of codes with complementary duals which are called Linear Complimentary Dual (LCD for short) codes. He showed that LCD codes have applications in communication system, side-channel attack (SCA) and so on. LCD codes have been extensively studied in literature. On the other hand, MDS codes form an optimal family of classical codes which have wide applications in both theory and practice. The main purpose of this paper is to give an explicit construction of several classes of LCD MDS codes, using tools from algebraic function fields. We exemplify this construction and obtain several classes of explicit LCD MDS codes for the odd characteristic case.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 03:33:38 GMT" } ]
2017-10-06T00:00:00
[ [ "Beelen", "Peter", "" ], [ "Jin", "Lingfei", "" ] ]
new_dataset
0.99927
1710.01873
Mehdi Shafiei
Shiva Geraee, Hamed Mohammadbagherpoor, Mehdi Shafiei, Majid Valizadehdeh, Farshad Montazeri, Mohammad Reza Feyzi
A Modified DTC with Capability of Regenerative Braking Energy in BLDC driven Electric Vehicles Using Adaptive Control Theory
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper represents a novel regenerative braking approach for the Electric Vehicles. The proposed method solves the short-range problem which is corresponding to the charge of the battery pack. The DTC switching algorithm has been modified to recover the electrical energy from Electrical Vehicle (EV), driven by Brushless DC motor, without using the additional power converter or the other electrical energy storage devices. During regenerative braking process, different switching pattern is applied to the inverter to convert the mechanical energy to the electrical energy through the reverse diodes. This switching pattern is different from the normal operation due to the special arrangement of voltage vectors which is considered to convert the mechanical energy to electrical energy. The state of charge of the battery is used as a performance indicator of the method. Simultaneously, a model reference adaptive system has been designed to tune the system parameters. Several simulations are carried out to validate the performance and effectiveness of the proposed methods. The results show the high capability and performance of the designed method.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 03:36:55 GMT" } ]
2017-10-06T00:00:00
[ [ "Geraee", "Shiva", "" ], [ "Mohammadbagherpoor", "Hamed", "" ], [ "Shafiei", "Mehdi", "" ], [ "Valizadehdeh", "Majid", "" ], [ "Montazeri", "Farshad", "" ], [ "Feyzi", "Mohammad Reza", "" ] ]
new_dataset
0.960423
1710.01887
Arif Mohaimin Sadri
Arif Mohaimin Sadri, Samiul Hasan, Satish V. Ukkusuri, Manuel Cebrian
Crisis Communication Patterns in Social Media during Hurricane Sandy
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hurricane Sandy was one of the deadliest and costliest of hurricanes over the past few decades. Many states experienced significant power outage, however many people used social media to communicate while having limited or no access to traditional information sources. In this study, we explored the evolution of various communication patterns using machine learning techniques and determined user concerns that emerged over the course of Hurricane Sandy. The original data included ~52M tweets coming from ~13M users between October 14, 2012 and November 12, 2012. We run topic model on ~763K tweets from top 4,029 most frequent users who tweeted about Sandy at least 100 times. We identified 250 well-defined communication patterns based on perplexity. Conversations of most frequent and relevant users indicate the evolution of numerous storm-phase (warning, response, and recovery) specific topics. People were also concerned about storm location and time, media coverage, and activities of political leaders and celebrities. We also present each relevant keyword that contributed to one particular pattern of user concerns. Such keywords would be particularly meaningful in targeted information spreading and effective crisis communication in similar major disasters. Each of these words can also be helpful for efficient hash-tagging to reach target audience as needed via social media. The pattern recognition approach of this study can be used in identifying real time user needs in future crises.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 05:32:07 GMT" } ]
2017-10-06T00:00:00
[ [ "Sadri", "Arif Mohaimin", "" ], [ "Hasan", "Samiul", "" ], [ "Ukkusuri", "Satish V.", "" ], [ "Cebrian", "Manuel", "" ] ]
new_dataset
0.983304
1710.01966
Erick Peirson
B. R. Erick Peirson, Erin Bottino, Julia L. Damerow, Manfred D. Laubichler
Quantitative Perspectives on Fifty Years of the Journal of the History of Biology
45 pages, 14 figures, 4 tables
null
10.1007/s10739-017-9499-2
null
cs.DL cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Journal of the History of Biology provides a fifty-year long record for examining the evolution of the history of biology as a scholarly discipline. In this paper, we present a new dataset and preliminary quantitative analysis of the thematic content of JHB from the perspectives of geography, organisms, and thematic fields. The geographic diversity of authors whose work appears in JHB has increased steadily since 1968, but the geographic coverage of the content of JHB articles remains strongly lopsided toward the United States, United Kingdom, and western Europe and has diversified much less dramatically over time. The taxonomic diversity of organisms discussed in JHB increased steadily between 1968 and the late 1990s but declined in later years, mirroring broader patterns of diversification previously reported in the biomedical research literature. Finally, we used a combination of topic modeling and nonlinear dimensionality reduction techniques to develop a model of multi-article fields within JHB. We found evidence for directional changes in the representation of fields on multiple scales. The diversity of JHB with regard to the representation of thematic fields has increased overall, with most of that diversification occurring in recent years. Drawing on the dataset generated in the course of this analysis, as well as web services in the emerging digital history and philosophy of science ecosystem, we have developed an interactive web platform for exploring the content of JHB, and we provide a brief overview of the platform in this article. As a whole, the data and analyses presented here provide a starting-place for further critical reflection on the evolution of the history of biology over the past half-century.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 11:13:16 GMT" } ]
2017-10-06T00:00:00
[ [ "Peirson", "B. R. Erick", "" ], [ "Bottino", "Erin", "" ], [ "Damerow", "Julia L.", "" ], [ "Laubichler", "Manfred D.", "" ] ]
new_dataset
0.999616
1710.02019
Daniel Augot
Daniel Augot (GRACE), Herv\'e Chabanne, Thomas Chenevier, William George (LIX, GRACE), Laurent Lamber
A User-Centric System for Verified Identities on the Bitcoin Blockchain
null
International Workshop on Cryptocurrencies and Blockchain Technology - CBT'17, Sep 2017, Oslo, Norway
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin's decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even as identity providers can revoke identities and impose controls.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 13:48:04 GMT" } ]
2017-10-06T00:00:00
[ [ "Augot", "Daniel", "", "GRACE" ], [ "Chabanne", "Hervé", "", "LIX, GRACE" ], [ "Chenevier", "Thomas", "", "LIX, GRACE" ], [ "George", "William", "", "LIX, GRACE" ], [ "Lamber", "Laurent", "" ] ]
new_dataset
0.990854
1710.02041
Leslie Barrett
Leslie Barrett (Bloomberg, LP), Wayne Krug (Bloomberg, LP), Zefu Lu (Bloomberg, LP), Karin D. Martin (University of Washington Seattle), Roberto Martin (Bloomberg, LP), Alexandra Ortan (Bloomberg, LP), Anu Pradhan (Bloomberg, LP), Alexander Sherman (Alexander Sherman, J.D.), Michael W. Sherman (Bloomberg, LP), Ryon Smey (Bloomberg, LP), Trent Wenzel (Bloomberg, LP)
Civil Asset Forfeiture: A Judicial Perspective
Presented at the Data For Good Exchange 2017
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Civil Asset Forfeiture (CAF) is a longstanding and controversial legal process viewed on the one hand as a powerful tool for combating drug crimes and on the other hand as a violation of the rights of US citizens. Data used to support both sides of the controversy to date has come from government sources representing records of the events at the time of occurrence. Court dockets represent litigation events initiated following the forfeiture, however, and can thus provide a new perspective on the CAF legal process. This paper will show new evidence supporting existing claims about the growth of the practice and bias in its application based on the quantitative analysis of data derived from these court cases.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 14:29:51 GMT" } ]
2017-10-06T00:00:00
[ [ "Barrett", "Leslie", "", "Bloomberg, LP" ], [ "Krug", "Wayne", "", "Bloomberg, LP" ], [ "Lu", "Zefu", "", "Bloomberg, LP" ], [ "Martin", "Karin D.", "", "University of Washington Seattle" ], [ "Martin", "Roberto", "", "Bloomberg, LP" ], [ "Ortan", "Alexandra", "", "Bloomberg, LP" ], [ "Pradhan", "Anu", "", "Bloomberg, LP" ], [ "Sherman", "Alexander", "", "Alexander Sherman, J.D." ], [ "Sherman", "Michael W.", "", "Bloomberg, LP" ], [ "Smey", "Ryon", "", "Bloomberg, LP" ], [ "Wenzel", "Trent", "", "Bloomberg,\n LP" ] ]
new_dataset
0.999198
1710.02121
Abhijit Makhal
Abhijit Makhal, Frederico Thomas, Alba Perez Gracia
Grasping Unknown Objects in Clutter by Superquadric Representation
Submitted at International conference of Robotics Computing, 2018
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a quick and efficient method is presented for grasping unknown objects in clutter. The grasping method relies on real-time superquadric (SQ) representation of partial view objects and incomplete object modelling, well suited for unknown symmetric objects in cluttered scenarios which is followed by optimized antipodal grasping. The incomplete object models are processed through a mirroring algorithm that assumes symmetry to first create an approximate complete model and then fit for SQ representation. The grasping algorithm is designed for maximum force balance and stability, taking advantage of the quick retrieval of dimension and surface curvature information from the SQ parameters. The pose of the SQs with respect to the direction of gravity is calculated and used together with the parameters of the SQs and specification of the gripper, to select the best direction of approach and contact points. The SQ fitting method has been tested on custom datasets containing objects in isolation as well as in clutter. The grasping algorithm is evaluated on a PR2 and real time results are presented. Initial results indicate that though the method is based on simplistic shape information, it outperforms other learning based grasping algorithms that also work in clutter in terms of time-efficiency and accuracy.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 17:27:04 GMT" } ]
2017-10-06T00:00:00
[ [ "Makhal", "Abhijit", "" ], [ "Thomas", "Frederico", "" ], [ "Gracia", "Alba Perez", "" ] ]
new_dataset
0.99822
1710.02133
Patrick Slade
Patrick Slade, Siobhan Powell, Michael F. Howland
Optimal control of a single leg hopper by Liouvillian system reduction
6 pages, 8 figures
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The benefits of legged locomotion shown in nature overcome challenges such as obstacles or terrain smoothness typically encountered with wheeled vehicles. This paper evaluates the benefits of using optimal control on a single leg hopper during the entire hopping motion. Basic control without considering physical constraints is implemented through hand-tuned PD controllers following the Raibert control framework. The differential flatness of the first-order equations of motion and the Liouvillian property for the second-order equations for the hopper system are proved, enabling flat outputs for control. A two-point boundary value problem (BVP) is then used to minimize jerk in the flat system to gain implicit smoothness in the output controls. This smoothness ensures that the planned trajectories are feasible, allowing for given waypoints to be reached.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 17:48:56 GMT" } ]
2017-10-06T00:00:00
[ [ "Slade", "Patrick", "" ], [ "Powell", "Siobhan", "" ], [ "Howland", "Michael F.", "" ] ]
new_dataset
0.972956
1710.02134
Grace Kuo
Nick Antipa, Grace Kuo, Reinhard Heckel, Ben Mildenhall, Emrah Bostan, Ren Ng, Laura Waller
DiffuserCam: Lensless Single-exposure 3D Imaging
The first two authors contributed equally
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We demonstrate a compact and easy-to-build computational camera for single-shot 3D imaging. Our lensless system consists solely of a diffuser placed in front of a standard image sensor. Every point within the volumetric field-of-view projects a unique pseudorandom pattern of caustics on the sensor. By using a physical approximation and simple calibration scheme, we solve the large-scale inverse problem in a computationally efficient way. The caustic patterns enable compressed sensing, which exploits sparsity in the sample to solve for more 3D voxels than pixels on the 2D sensor. Our 3D voxel grid is chosen to match the experimentally measured two-point optical resolution across the field-of-view, resulting in 100 million voxels being reconstructed from a single 1.3 megapixel image. However, the effective resolution varies significantly with scene content. Because this effect is common to a wide range of computational cameras, we provide new theory for analyzing resolution in such systems.
[ { "version": "v1", "created": "Thu, 5 Oct 2017 17:48:57 GMT" } ]
2017-10-06T00:00:00
[ [ "Antipa", "Nick", "" ], [ "Kuo", "Grace", "" ], [ "Heckel", "Reinhard", "" ], [ "Mildenhall", "Ben", "" ], [ "Bostan", "Emrah", "" ], [ "Ng", "Ren", "" ], [ "Waller", "Laura", "" ] ]
new_dataset
0.987811
1503.04069
Klaus Greff
Klaus Greff, Rupesh Kumar Srivastava, Jan Koutn\'ik, Bas R. Steunebrink, J\"urgen Schmidhuber
LSTM: A Search Space Odyssey
12 pages, 6 figures
IEEE Transactions on Neural Networks and Learning Systems ( Volume: 28, Issue: 10, Oct. 2017 ) Pages: 2222 - 2232
10.1109/TNNLS.2016.2582924
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several variants of the Long Short-Term Memory (LSTM) architecture for recurrent neural networks have been proposed since its inception in 1995. In recent years, these networks have become the state-of-the-art models for a variety of machine learning problems. This has led to a renewed interest in understanding the role and utility of various computational components of typical LSTM variants. In this paper, we present the first large-scale analysis of eight LSTM variants on three representative tasks: speech recognition, handwriting recognition, and polyphonic music modeling. The hyperparameters of all LSTM variants for each task were optimized separately using random search, and their importance was assessed using the powerful fANOVA framework. In total, we summarize the results of 5400 experimental runs ($\approx 15$ years of CPU time), which makes our study the largest of its kind on LSTM networks. Our results show that none of the variants can improve upon the standard LSTM architecture significantly, and demonstrate the forget gate and the output activation function to be its most critical components. We further observe that the studied hyperparameters are virtually independent and derive guidelines for their efficient adjustment.
[ { "version": "v1", "created": "Fri, 13 Mar 2015 14:01:38 GMT" }, { "version": "v2", "created": "Wed, 4 Oct 2017 11:40:31 GMT" } ]
2017-10-05T00:00:00
[ [ "Greff", "Klaus", "" ], [ "Srivastava", "Rupesh Kumar", "" ], [ "Koutník", "Jan", "" ], [ "Steunebrink", "Bas R.", "" ], [ "Schmidhuber", "Jürgen", "" ] ]
new_dataset
0.999198
1603.03404
Tianwei Zhang
Tianwei Zhang, Yinqian Zhang, Ruby B. Lee
Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation
18 pages
null
null
null
cs.DC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cloud computing, network Denial of Service (DoS) attacks are well studied and defenses have been implemented, but severe DoS attacks on a victim's working memory by a single hostile VM are not well understood. Memory DoS attacks are Denial of Service (or Degradation of Service) attacks caused by contention for hardware memory resources on a cloud server. Despite the strong memory isolation techniques for virtual machines (VMs) enforced by the software virtualization layer in cloud servers, the underlying hardware memory layers are still shared by the VMs and can be exploited by a clever attacker in a hostile VM co-located on the same server as the victim VM, denying the victim the working memory he needs. We first show quantitatively the severity of contention on different memory resources. We then show that a malicious cloud customer can mount low-cost attacks to cause severe performance degradation for a Hadoop distributed application, and 38X delay in response time for an E-commerce website in the Amazon EC2 cloud. Then, we design an effective, new defense against these memory DoS attacks, using a statistical metric to detect their existence and execution throttling to mitigate the attack damage. We achieve this by a novel re-purposing of existing hardware performance counters and duty cycle modulation for security, rather than for improving performance or power consumption. We implement a full prototype on the OpenStack cloud system. Our evaluations show that this defense system can effectively defeat memory DoS attacks with negligible performance overhead.
[ { "version": "v1", "created": "Thu, 10 Mar 2016 20:16:52 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2016 04:46:07 GMT" }, { "version": "v3", "created": "Wed, 4 Oct 2017 16:43:59 GMT" } ]
2017-10-05T00:00:00
[ [ "Zhang", "Tianwei", "" ], [ "Zhang", "Yinqian", "" ], [ "Lee", "Ruby B.", "" ] ]
new_dataset
0.954584
1710.01328
Abhijit Makhal
Abhijit Makhal and Alex K. Goins
Reuleaux: Robot Base Placement by Reachability Analysis
Submitted to International Conference of Robotic Computing 2018
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Before beginning any robot task, users must position the robot's base, a task that now depends entirely on user intuition. While slight perturbation is tolerable for robots with moveable bases, correcting the problem is imperative for fixed-base robots if some essential task sections are out of reach. For mobile manipulation robots, it is necessary to decide on a specific base position before beginning manipulation tasks. This paper presents Reuleaux, an open source library for robot reachability analyses and base placement. It reduces the amount of extra repositioning and removes the manual work of identifying potential base locations. Based on the reachability map, base placement locations of a whole robot or only the arm can be efficiently determined. This can be applied to both statically mounted robots, where position of the robot and work piece ensure the maximum amount of work performed, and to mobile robots, where the maximum amount of workable area can be reached. Solutions are not limited only to vertically constrained placement, since complicated robotics tasks require the base to be placed at unique poses based on task demand. All Reuleaux library methods were tested on different robots of different specifications and evaluated for tasks in simulation and real world environment. Evaluation results indicate that Reuleaux had significantly improved performance than prior existing methods in terms of time-efficiency and range of applicability.
[ { "version": "v1", "created": "Tue, 3 Oct 2017 18:13:58 GMT" } ]
2017-10-05T00:00:00
[ [ "Makhal", "Abhijit", "" ], [ "Goins", "Alex K.", "" ] ]
new_dataset
0.997047
1710.01347
David Di Giorgio
David Di Giorgio
Simple Cortex: A Model of Cells in the Sensory Nervous System
null
null
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neuroscience research has produced many theories and computational neural models of sensory nervous systems. Notwithstanding many different perspectives towards developing intelligent machines, artificial intelligence has ultimately been influenced by neuroscience. Therefore, this paper provides an introduction to biologically inspired machine intelligence by exploring the basic principles of sensation and perception as well as the structure and behavior of biological sensory nervous systems like the neocortex. Concepts like spike timing, synaptic plasticity, inhibition, neural structure, and neural behavior are applied to a new model, Simple Cortex (SC). A software implementation of SC has been built and demonstrates fast observation, learning, and prediction of spatio-temporal sensory-motor patterns and sequences. Finally, this paper suggests future areas of improvement and growth for Simple Cortex and other related machine intelligence models.
[ { "version": "v1", "created": "Tue, 3 Oct 2017 18:51:19 GMT" } ]
2017-10-05T00:00:00
[ [ "Di Giorgio", "David", "" ] ]
new_dataset
0.98121
1710.01416
Saed Khawaldeh
Vu Hoang Minh, Tajwar Abrar Aleef, Usama Pervaiz, Yeman Brhane Hagos, Saed Khawaldeh
Smoothness-based Edge Detection using Low-SNR Camera for Robot Navigation
null
null
null
null
cs.CV cs.RO stat.AP stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the emerging advancement in the branch of autonomous robotics, the ability of a robot to efficiently localize and construct maps of its surrounding is crucial. This paper deals with utilizing thermal-infrared cameras, as opposed to conventional cameras as the primary sensor to capture images of the robot's surroundings. For localization, the images need to be further processed before feeding them to a navigational system. The main motivation of this paper was to develop an edge detection methodology capable of utilizing the low-SNR poor output from such a thermal camera and effectively detect smooth edges of the surrounding environment. The enhanced edge detector proposed in this paper takes the raw image from the thermal sensor, denoises the images, applies Canny edge detection followed by CSS method. The edges are ranked to remove any noise and only edges of the highest rank are kept. Then, the broken edges are linked by computing edge metrics and a smooth edge of the surrounding is displayed in a binary image. Several comparisons are also made in the paper between the proposed technique and the existing techniques.
[ { "version": "v1", "created": "Tue, 3 Oct 2017 22:48:41 GMT" } ]
2017-10-05T00:00:00
[ [ "Minh", "Vu Hoang", "" ], [ "Aleef", "Tajwar Abrar", "" ], [ "Pervaiz", "Usama", "" ], [ "Hagos", "Yeman Brhane", "" ], [ "Khawaldeh", "Saed", "" ] ]
new_dataset
0.967978
1710.01475
Min Qiu
Min Qiu, Lei Yang, Yixuan Xie and Jinhong Yuan
On the Design of Multi-Dimensional Irregular Repeat-Accumulate Lattice Codes
Accepted for publication in IEEE Transactions on Communications, 15 pages, 7 figures, 2 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most multi-dimensional (more than two dimensions) lattice partitions only form additive quotient groups and lack multiplication operations. This prevents us from constructing lattice codes based on multi-dimensional lattice partitions directly from non-binary linear codes over finite fields. In this paper, we design lattice codes from Construction A lattices where the underlying linear codes are non-binary irregular repeat-accumulate (IRA) codes. Most importantly, our codes are based on multi-dimensional lattice partitions with finite constellations. We propose a novel encoding structure that adds randomly generated lattice sequences to the encoder's messages, instead of multiplying lattice sequences to the encoder's messages. We prove that our approach can ensure that the decoder's messages exhibit permutation-invariance and symmetry properties. With these two properties, the densities of the messages in the iterative decoder can be modeled by Gaussian distributions described by a single parameter. With Gaussian approximation, extrinsic information transfer (EXIT) charts for our multi-dimensional IRA lattice codes are developed and used for analyzing the convergence behavior and optimizing the decoding thresholds. Simulation results show that our codes can approach the unrestricted Shannon limit within 0.46 dB and outperform the previously designed lattice codes with two-dimensional lattice partitions and existing lattice coding schemes for large codeword length.
[ { "version": "v1", "created": "Wed, 4 Oct 2017 06:30:10 GMT" } ]
2017-10-05T00:00:00
[ [ "Qiu", "Min", "" ], [ "Yang", "Lei", "" ], [ "Xie", "Yixuan", "" ], [ "Yuan", "Jinhong", "" ] ]
new_dataset
0.957191
1701.02991
Zaid Hussain
Zaid Hussain, Bader AlBdaiwi, Anton Cerny
Node-Independent Spanning Trees in Gaussian Networks
null
Journal of Parallel and Distributed Computing, Volume 109, November 2017, Pages 324-332
10.1016/j.jpdc.2017.06.018
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Message broadcasting in networks could be carried over spanning trees. A set of spanning trees in the same network is node independent if two conditions are satisfied. First, all trees are rooted at node $r$. Second, for every node $u$ in the network, all trees' paths from $r$ to $u$ are node-disjoint, excluding the end nodes $r$ and $u$. Independent spanning trees have applications in fault-tolerant communications and secure message distributions. Gaussian networks and two-dimensional toroidal networks share similar topological characteristics. They are regular of degree four, symmetric, and node-transitive. Gaussian networks, however, have relatively lesser network diameter that could result in a better performance. This promotes Gaussian networks to be a potential alternative for two-dimensional toroidal networks. In this paper, we present constructions for node independent spanning trees in dense Gaussian networks. Based on these constructions, we design routing algorithms that can be used in fault-tolerant routing and secure message distribution. We also design fault-tolerant algorithms to construct these trees in parallel.
[ { "version": "v1", "created": "Wed, 11 Jan 2017 14:43:05 GMT" } ]
2017-10-04T00:00:00
[ [ "Hussain", "Zaid", "" ], [ "AlBdaiwi", "Bader", "" ], [ "Cerny", "Anton", "" ] ]
new_dataset
0.981495
1707.03435
Gustavo Gil
Giovanni Savino, Simone Piantini, Gustavo Gil, Marco Pierini
Obstacle detection test in real-word traffic contexts for the purposes of motorcycle autonomous emergency braking (MAEB)
25th International Technical Conference on the Enhanced Safety of Vehicles (2017)
null
null
Paper Number 17-0047
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research suggests that a Motorcycle Autonomous Emergency Braking system (MAEB) could influence 25% of the crashes involving powered two wheelers (PTWs). By automatically slowing down a host PTW of up to 10 km/h in inevitable collision scenarios, MAEB could potentially mitigate the crash severity for the riders. The feasibility of automatic decelerations of motorcycles was shown via field trials in controlled environment. However, the feasibility of correct MAEB triggering in the real traffic context is still unclear. In particular, MAEB requires an accurate obstacle detection, the feasibility of which from a single track vehicle has not been confirmed yet. To address this issue, our study presents obstacle detection tests in a real-world MAEB-sensitive crash scenario.
[ { "version": "v1", "created": "Sun, 25 Jun 2017 09:44:17 GMT" }, { "version": "v2", "created": "Mon, 2 Oct 2017 20:57:23 GMT" } ]
2017-10-04T00:00:00
[ [ "Savino", "Giovanni", "" ], [ "Piantini", "Simone", "" ], [ "Gil", "Gustavo", "" ], [ "Pierini", "Marco", "" ] ]
new_dataset
0.998316
1709.01669
Shenghui Su
Shenghui Su, Jianhua Zheng and Shuwang Lu
A Fast Quantum-safe Asymmetric Cryptosystem Using Extra Superincreasing Sequences
8 Pages. arXiv admin note: text overlap with arXiv:1408.6226
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper gives the definitions of an extra superincreasing sequence and an anomalous subset sum, and proposes a fast quantum-safe asymmetric cryptosystem called JUOAN2. The new cryptosystem is based on an additive multivariate permutation problem (AMPP) and an anomalous subset sum problem (ASSP) which parallel a multivariate polynomial problem and a shortest vector problem respectively, and composed of a key generator, an encryption algorithm, and a decryption algorithm. The authors analyze the security of the new cryptosystem against the Shamir minima accumulation point attack and the LLL lattice basis reduction attack, and prove it to be semantically secure (namely IND-CPA) on the assumption that AMPP and ASSP have no subexponential time solutions. Particularly, the analysis shows that the new cryptosystem has the potential to be resistant to quantum computing attack, and is especially suitable to the secret communication between two mobile terminals in maneuvering field operations under any weather. At last, an example explaining the correctness of the new cryptosystem is given.
[ { "version": "v1", "created": "Wed, 6 Sep 2017 04:32:09 GMT" }, { "version": "v2", "created": "Tue, 3 Oct 2017 01:51:22 GMT" } ]
2017-10-04T00:00:00
[ [ "Su", "Shenghui", "" ], [ "Zheng", "Jianhua", "" ], [ "Lu", "Shuwang", "" ] ]
new_dataset
0.998321
1710.00561
Neeraj Varshney
Neeraj Varshney, Aditya K. Jagannatham, and Pramod K. Varshney
Diffusive Molecular Communication with Nanomachine Mobility
To be submitted in 52th Annual Conference on Information Sciences and Systems (CISS)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents a performance analysis for diffusive molecular communication with mobile transmit and receive nanomachines. To begin with, the optimal test is obtained for symbol detection at the receiver nanomachine. Subsequently, closed-form expressions are derived for the probabilities of detection and false alarm, probability of error, and capacity considering also aberrations such as multi-source interference, inter-symbol interference, and counting errors. Simulation results are presented to corroborate the theoretical results derived and also, to yield various insights into the performance of the system. Interestingly, it is shown that the performance of the mobile diffusive molecular communication can be significantly enhanced by allocating large fraction of total available molecules for transmission as the slot interval increases.
[ { "version": "v1", "created": "Mon, 2 Oct 2017 10:01:38 GMT" } ]
2017-10-04T00:00:00
[ [ "Varshney", "Neeraj", "" ], [ "Jagannatham", "Aditya K.", "" ], [ "Varshney", "Pramod K.", "" ] ]
new_dataset
0.999039
1710.00817
Ahmadreza Montazerolghaem
Ahmadreza Montazerolghaem, Mohammad Hossein Yaghmaee Moghaddam, Farzad Tashtarian
Overload Control in SIP Networks: A Heuristic Approach Based on Mathematical Optimization
arXiv admin note: substantial text overlap with arXiv:1709.10260
Global Communications Conference (GLOBECOM), 2015 IEEE
10.1109/GLOCOM.2015.7417081
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Session Initiation Protocol (SIP) is an application-layer control protocol for creating, modifying and terminating multimedia sessions. An open issue is the control of overload that occurs when a SIP server lacks sufficient CPU and memory resources to process all messages. We prove that the problem of overload control in SIP network with a set of n servers and limited resources is in the form of NP-hard. This paper proposes a Load-Balanced Call Admission Controller (LB-CAC), based on a heuristic mathematical model to determine an optimal resource allocation in such a way that maximizes call admission rates regarding the limited resources of the SIP servers. LB-CAC determines the optimal "call admission rates" and "signaling paths" for admitted calls along optimal allocation of CPU and memory resources of the SIP servers through a new linear programming model. This happens by acquiring some critical information of SIP servers. An assessment of the numerical and experimental results demonstrates the efficiency of the proposed method.
[ { "version": "v1", "created": "Sat, 30 Sep 2017 05:23:56 GMT" } ]
2017-10-04T00:00:00
[ [ "Montazerolghaem", "Ahmadreza", "" ], [ "Moghaddam", "Mohammad Hossein Yaghmaee", "" ], [ "Tashtarian", "Farzad", "" ] ]
new_dataset
0.998537
1710.00893
Zhe Zhang
Zhe Zhang, Shaoshan Liu, Grace Tsai, Hongbing Hu, Chen-Chi Chu, and Feng Zheng
PIRVS: An Advanced Visual-Inertial SLAM System with Flexible Sensor Fusion and Hardware Co-Design
null
null
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the PerceptIn Robotics Vision System (PIRVS) system, a visual-inertial computing hardware with embedded simultaneous localization and mapping (SLAM) algorithm. The PIRVS hardware is equipped with a multi-core processor, a global-shutter stereo camera, and an IMU with precise hardware synchronization. The PIRVS software features a novel and flexible sensor fusion approach to not only tightly integrate visual measurements with inertial measurements and also to loosely couple with additional sensor modalities. It runs in real-time on both PC and the PIRVS hardware. We perform a thorough evaluation of the proposed system using multiple public visual-inertial datasets. Experimental results demonstrate that our system reaches comparable accuracy of state-of-the-art visual-inertial algorithms on PC, while being more efficient on the PIRVS hardware.
[ { "version": "v1", "created": "Mon, 2 Oct 2017 20:17:54 GMT" } ]
2017-10-04T00:00:00
[ [ "Zhang", "Zhe", "" ], [ "Liu", "Shaoshan", "" ], [ "Tsai", "Grace", "" ], [ "Hu", "Hongbing", "" ], [ "Chu", "Chen-Chi", "" ], [ "Zheng", "Feng", "" ] ]
new_dataset
0.999039
1710.00923
Michael Gasser
Michael Gasser
Minimal Dependency Translation: a Framework for Computer-Assisted Translation for Under-Resourced Languages
EAI International Conference on ICT for Development for Africa September 25-27, 2017, Bahir Dar, Ethiopia
null
null
null
cs.CL
http://creativecommons.org/licenses/by-sa/4.0/
This paper introduces Minimal Dependency Translation (MDT), an ongoing project to develop a rule-based framework for the creation of rudimentary bilingual lexicon-grammars for machine translation and computer-assisted translation into and out of under-resourced languages as well as initial steps towards an implementation of MDT for English-to-Amharic translation. The basic units in MDT, called groups, are headed multi-item sequences. In addition to wordforms, groups may contain lexemes, syntactic-semantic categories, and grammatical features. Each group is associated with one or more translations, each of which is a group in a target language. During translation, constraint satisfaction is used to select a set of source-language groups for the input sentence and to sequence the words in the associated target-language groups.
[ { "version": "v1", "created": "Mon, 2 Oct 2017 21:56:16 GMT" } ]
2017-10-04T00:00:00
[ [ "Gasser", "Michael", "" ] ]
new_dataset
0.951561
1710.01202
F Yan
Fei Yan, Krystian Mikolajczyk, Josef Kittler
Person Re-Identification with Vision and Language
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose a new approach to person re-identification using images and natural language descriptions. We propose a joint vision and language model based on CCA and CNN architectures to match across the two modalities as well as to enrich visual examples for which there are no language descriptions. We also introduce new annotations in the form of natural language descriptions for two standard Re-ID benchmarks, namely CUHK03 and VIPeR. We perform experiments on these two datasets with techniques based on CNN, hand-crafted features as well as LSTM for analysing visual and natural description data. We investigate and demonstrate the advantages of using natural language descriptions compared to attributes as well as CNN compared to LSTM in the context of Re-ID. We show that the joint use of language and vision can significantly improve the state-of-the-art performance on standard Re-ID benchmarks.
[ { "version": "v1", "created": "Tue, 3 Oct 2017 15:05:31 GMT" } ]
2017-10-04T00:00:00
[ [ "Yan", "Fei", "" ], [ "Mikolajczyk", "Krystian", "" ], [ "Kittler", "Josef", "" ] ]
new_dataset
0.995234
1710.01215
Nasim Nematzadeh
Nasim Nematzadeh, David M.W. Powers
The Cafe Wall Illusion: Local and Global Perception from multiple scale to multiscale
Under revision by Applied Computational Intelligence and Soft Computing
null
null
null
cs.CV
http://creativecommons.org/publicdomain/zero/1.0/
Geometrical illusions are a subclass of optical illusions in which the geometrical characteristics of patterns such as orientations and angles are distorted and misperceived as the result of low- to high-level retinal/cortical processing. Modelling the detection of tilt in these illusions and their strengths as they are perceived is a challenging task computationally and leads to development of techniques that match with human performance. In this study, we present a predictive and quantitative approach for modeling foveal and peripheral vision in the induced tilt in Caf\'e Wall illusion in which parallel mortar lines between shifted rows of black and white tiles appear to converge and diverge. A bioderived filtering model for the responses of retinal/cortical simple cells to the stimulus using Difference of Gaussians is utilized with an analytic processing pipeline introduced in our previous studies to quantify the angle of tilt in the model. Here we have considered visual characteristics of foveal and peripheral vision in the perceived tilt in the pattern to predict different degrees of tilt in different areas of the fovea and periphery as the eye saccades to different parts of the image. The tilt analysis results from several sampling sizes and aspect ratios, modelling variant foveal views are used from our previous investigations on the local tilt, and we specifically investigate in this work, different configurations of the whole pattern modelling variant Gestalt views across multiple scales in order to provide confidence intervals around the predicted tilts. The foveal sample sets are verified and quantified using two different sampling methods. We present here a precise and quantified comparison contrasting local tilt detection in the foveal sets with a global average across all of the Caf\'e Wall configurations tested in this work.
[ { "version": "v1", "created": "Sun, 17 Sep 2017 10:12:06 GMT" } ]
2017-10-04T00:00:00
[ [ "Nematzadeh", "Nasim", "" ], [ "Powers", "David M. W.", "" ] ]
new_dataset
0.956665
1603.05736
Alexander Barg
Talha Cihad Gulcu, Min Ye, and Alexander Barg
Construction of polar codes for arbitrary discrete memoryless channels
The results are unchanged, minor changes in the proofs
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that polar codes can be efficiently constructed for binary-input channels. At the same time, existing algorithms for general input alphabets are less practical because of high complexity. We address the construction problem for the general case, and analyze an algorithm that is based on successive reduction of the output alphabet size of the subchannels in each recursion step. For this procedure we estimate the approximation error as $O(\mu^{-1/(q-1)}),$ where $\mu$ is the "quantization parameter," i.e., the maximum size of the subchannel output alphabet allowed by the algorithm. The complexity of the code construction scales as $O(N\mu^4),$ where $N$ is the length of the code. We also show that if the polarizing operation relies on modulo-$q$ addition, it is possible to merge subsets of output symbols without any loss in subchannel capacity. Performing this procedure before each approximation step results in a further speed-up of the code construction, and the resulting codes have smaller gap to capacity. We show that a similar acceleration can be attained for polar codes over finite field alphabets. Experimentation shows that the suggested construction algorithms can be used to construct long polar codes for alphabets of size $q=16$ and more with acceptable loss of the code rate for a variety of polarizing transforms.
[ { "version": "v1", "created": "Fri, 18 Mar 2016 00:34:10 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2017 20:18:18 GMT" } ]
2017-10-03T00:00:00
[ [ "Gulcu", "Talha Cihad", "" ], [ "Ye", "Min", "" ], [ "Barg", "Alexander", "" ] ]
new_dataset
0.986384
1607.04559
Xinyu Gao
Xinyu Gao, Linglong Dai, Akbar M. Sayeed
Low RF-Complexity Technologies to Enable Millimeter-Wave MIMO with Large Antenna Array for 5G Wireless Communications
This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Millimeter-wave (mmWave) MIMO with large antenna array has attracted considerable interests from academic and industry communities, as it can provide larger bandwidth and higher spectrum efficiency. However, with hundreds of antennas, the number of radio frequency (RF) chains required by mmWave MIMO is also huge, leading to unaffordable hardware cost and power consumption in practice. In this paper, we investigate low RF-complexity technologies to solve this bottleneck. We first review the evolution of low RF-complexity technologies from microwave frequencies to mmWave frequencies. Then, we discuss two promising low RF-complexity technologies for mmWave MIMO systems in detail, i.e., phased array based hybrid precoding (PAHP) and lens array based hybrid precoding (LAHP), including their principles, advantages, challenges, and recent results. We compare the performance of these two technologies to draw some insights about how they can be deployed in practice. Finally, we conclude this paper and point out some future research directions in this area.
[ { "version": "v1", "created": "Fri, 15 Jul 2016 15:39:15 GMT" }, { "version": "v2", "created": "Sat, 16 Sep 2017 15:53:28 GMT" }, { "version": "v3", "created": "Sun, 1 Oct 2017 03:10:39 GMT" } ]
2017-10-03T00:00:00
[ [ "Gao", "Xinyu", "" ], [ "Dai", "Linglong", "" ], [ "Sayeed", "Akbar M.", "" ] ]
new_dataset
0.997878
1610.03452
Emiliano De Cristofaro
Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, Jeremy Blackburn
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web
A shorter version of this paper appears in the Proceedings of the 11th International AAAI Conference on Web and Social Media (ICWSM'17). Please cite the ICWSM'17 paper. Corresponding author: [email protected]
null
null
null
cs.SI cs.CY cs.HC physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The discussion-board site 4chan has been part of the Internet's dark underbelly since its inception, and recent political events have put it increasingly in the spotlight. In particular, /pol/, the "Politically Incorrect" board, has been a central figure in the outlandish 2016 US election season, as it has often been linked to the alt-right movement and its rhetoric of hate and racism. However, 4chan remains relatively unstudied by the scientific community: little is known about its user base, the content it generates, and how it affects other parts of the Web. In this paper, we start addressing this gap by analyzing /pol/ along several axes, using a dataset of over 8M posts we collected over two and a half months. First, we perform a general characterization, showing that /pol/ users are well distributed around the world and that 4chan's unique features encourage fresh discussions. We also analyze content, finding, for instance, that YouTube links and hate speech are predominant on /pol/. Overall, our analysis not only provides the first measurement study of /pol/, but also insight into online harassment and hate speech trends in social media.
[ { "version": "v1", "created": "Tue, 11 Oct 2016 18:11:50 GMT" }, { "version": "v2", "created": "Fri, 14 Oct 2016 08:57:43 GMT" }, { "version": "v3", "created": "Mon, 7 Nov 2016 17:35:37 GMT" }, { "version": "v4", "created": "Mon, 13 Mar 2017 14:38:57 GMT" }, { "version": "v5", "created": "Sun, 1 Oct 2017 17:09:21 GMT" } ]
2017-10-03T00:00:00
[ [ "Hine", "Gabriel Emile", "" ], [ "Onaolapo", "Jeremiah", "" ], [ "De Cristofaro", "Emiliano", "" ], [ "Kourtellis", "Nicolas", "" ], [ "Leontiadis", "Ilias", "" ], [ "Samaras", "Riginos", "" ], [ "Stringhini", "Gianluca", "" ], [ "Blackburn", "Jeremy", "" ] ]
new_dataset
0.998342
1705.06947
Emiliano De Cristofaro
Savvas Zannettou and Tristan Caulfield and Emiliano De Cristofaro and Nicolas Kourtellis and Ilias Leontiadis and Michael Sirivianos and Gianluca Stringhini and Jeremy Blackburn
The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources
To appear in the 17th ACM Internet Measurement Conference (IMC 2017)
null
null
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the number and the diversity of news outlets on the Web grow, so does the opportunity for "alternative" sources of information to emerge. Using large social networks like Twitter and Facebook, misleading, false, or agenda-driven information can quickly and seamlessly spread online, deceiving people or influencing their opinions. Also, the increased engagement of tightly knit communities, such as Reddit and 4chan, further compounds the problem, as their users initiate and propagate alternative information, not only within their own communities, but also to different ones as well as various social media. In fact, these platforms have become an important piece of the modern information ecosystem, which, thus far, has not been studied as a whole. In this paper, we begin to fill this gap by studying mainstream and alternative news shared on Twitter, Reddit, and 4chan. By analyzing millions of posts around several axes, we measure how mainstream and alternative news flows between these platforms. Our results indicate that alt-right communities within 4chan and Reddit can have a surprising level of influence on Twitter, providing evidence that "fringe" communities often succeed in spreading alternative news to mainstream social networks and the greater Web.
[ { "version": "v1", "created": "Fri, 19 May 2017 12:01:44 GMT" }, { "version": "v2", "created": "Sat, 30 Sep 2017 12:07:47 GMT" } ]
2017-10-03T00:00:00
[ [ "Zannettou", "Savvas", "" ], [ "Caulfield", "Tristan", "" ], [ "De Cristofaro", "Emiliano", "" ], [ "Kourtellis", "Nicolas", "" ], [ "Leontiadis", "Ilias", "" ], [ "Sirivianos", "Michael", "" ], [ "Stringhini", "Gianluca", "" ], [ "Blackburn", "Jeremy", "" ] ]
new_dataset
0.994248
1708.02139
Zeming Lin
Zeming Lin, Jonas Gehring, Vasil Khalidov, Gabriel Synnaeve
STARDATA: A StarCraft AI Research Dataset
To be presented at AIIDE17
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We release a dataset of 65646 StarCraft replays that contains 1535 million frames and 496 million player actions. We provide full game state data along with the original replays that can be viewed in StarCraft. The game state data was recorded every 3 frames which ensures suitability for a wide variety of machine learning tasks such as strategy classification, inverse reinforcement learning, imitation learning, forward modeling, partial information extraction, and others. We use TorchCraft to extract and store the data, which standardizes the data format for both reading from replays and reading directly from the game. Furthermore, the data can be used on different operating systems and platforms. The dataset contains valid, non-corrupted replays only and its quality and diversity was ensured by a number of heuristics. We illustrate the diversity of the data with various statistics and provide examples of tasks that benefit from the dataset. We make the dataset available at https://github.com/TorchCraft/StarData . En Taro Adun!
[ { "version": "v1", "created": "Mon, 7 Aug 2017 14:47:47 GMT" } ]
2017-10-03T00:00:00
[ [ "Lin", "Zeming", "" ], [ "Gehring", "Jonas", "" ], [ "Khalidov", "Vasil", "" ], [ "Synnaeve", "Gabriel", "" ] ]
new_dataset
0.999811
1709.09612
Abhishek Dubey
Michael A. Walker, Abhishek Dubey, Aron Laszka, and Douglas C. Schmidt
PlaTIBART: a Platform for Transactive IoT Blockchain Applications with Repeatable Testing
Workshop on Middleware and Applications for the Internet of Things (M4IoT) 2017
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advent of blockchain-enabled IoT applications, there is an increased need for related software patterns, middleware concepts, and testing practices to ensure adequate quality and productivity. IoT and blockchain each provide different design goals, concepts, and practices that must be integrated, including the distributed actor model and fault tolerance from IoT and transactive information integrity over untrustworthy sources from blockchain. Both IoT and blockchain are emerging technologies and both lack codified patterns and practices for development of applications when combined. This paper describes PlaTIBART, which is a platform for transactive IoT blockchain applications with repeatable testing that combines the Actor pattern (which is a commonly used model of computation in IoT) together with a custom Domain Specific Language (DSL) and test network management tools. We show how PlaTIBART has been applied to develop, test, and analyze fault-tolerant IoT blockchain applications.
[ { "version": "v1", "created": "Wed, 27 Sep 2017 16:38:03 GMT" }, { "version": "v2", "created": "Sat, 30 Sep 2017 01:44:46 GMT" } ]
2017-10-03T00:00:00
[ [ "Walker", "Michael A.", "" ], [ "Dubey", "Abhishek", "" ], [ "Laszka", "Aron", "" ], [ "Schmidt", "Douglas C.", "" ] ]
new_dataset
0.970857
1710.00082
Anthony Rhodes
Anthony D. Rhodes
Real-Time Wind Noise Detection and Suppression with Neural-Based Signal Reconstruction for Mult-Channel, Low-Power Devices
5 pages, 8 figures
null
null
null
cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Active wind noise detection and suppression techniques are a new and essential paradigm for enhancing ASR-based functionality with smart glasses, in addition to other wearable and smart devices in the broader IoT (Internet of things). In this paper, we develop two separate algorithms for wind noise detection and suppression, respectively, operational in a challenging, low-energy regime. Together, these algorithms comprise a robust wind noise suppression system. In the first case, we advance a real-time wind detection algorithm (RTWD) that uses two distinct sets of low-dimensional signal features to discriminate the presence of wind noise with high accuracy. For wind noise suppression, we employ an additional algorithm - attentive neural wind suppression (ANWS) - that utilizes a neural network to reconstruct the wearer speech signal from wind-corrupted audio in the spectral regions that are most adversely affected by wind noise. Finally, we test our algorithms through real-time experiments using low-power, multi-microphone devices with a wind simulator under challenging detection criteria and a variety of wind intensities.
[ { "version": "v1", "created": "Fri, 29 Sep 2017 20:33:38 GMT" } ]
2017-10-03T00:00:00
[ [ "Rhodes", "Anthony D.", "" ] ]
new_dataset
0.993841
1710.00166
Tian Lei
Lei Tian, Xiaopeng Hong, Guoying Zhao, Chunxiao Fan, Yue Ming, and Matti Pietik\"ainen
PCANet-II: When PCANet Meets the Second Order Pooling
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
PCANet, as one noticeable shallow network, employs the histogram representation for feature pooling. However, there are three main problems about this kind of pooling method. First, the histogram-based pooling method binarizes the feature maps and leads to inevitable discriminative information loss. Second, it is difficult to effectively combine other visual cues into a compact representation, because the simple concatenation of various visual cues leads to feature representation inefficiency. Third, the dimensionality of histogram-based output grows exponentially with the number of feature maps used. In order to overcome these problems, we propose a novel shallow network model, named as PCANet-II. Compared with the histogram-based output, the second order pooling not only provides more discriminative information by preserving both the magnitude and sign of convolutional responses, but also dramatically reduces the size of output features. Thus we combine the second order statistical pooling method with the shallow network, i.e., PCANet. Moreover, it is easy to combine other discriminative and robust cues by using the second order pooling. So we introduce the binary feature difference encoding scheme into our PCANet-II to further improve robustness. Experiments demonstrate the effectiveness and robustness of our proposed PCANet-II method.
[ { "version": "v1", "created": "Sat, 30 Sep 2017 09:11:38 GMT" } ]
2017-10-03T00:00:00
[ [ "Tian", "Lei", "" ], [ "Hong", "Xiaopeng", "" ], [ "Zhao", "Guoying", "" ], [ "Fan", "Chunxiao", "" ], [ "Ming", "Yue", "" ], [ "Pietikäinen", "Matti", "" ] ]
new_dataset
0.993327
1710.00319
Moran Koren
Itai Arieli, Moran Koren, Rann Smorodinsky
The Crowdfunding Game
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recent success of crowdfunding for supporting new and innovative products has been overwhelming with over 34 Billion Dollars raised in 2015. In many crowdfunding platforms, firms set a campaign threshold and contributions are collected only if this threshold is reached. During the campaign, consumers are uncertain as to the ex-post value of the product, the business model viability, and the seller's reliability. Consumer who commit to a contribution therefore gambles. This gamble is effected by the campaign's threshold. Contributions to campaigns with higher thresholds are collected only if a greater number of agents find the offering acceptable. Therefore, high threshold serves as a social insurance and thus in high-threshold campaigns, potential contributors feel more at ease with contributing. We introduce the crowdfunding game and explore the contributor's dilemma in the context of experience goods. We discuss equilibrium existence and related social welfare, information aggregation and revenue implications.
[ { "version": "v1", "created": "Sun, 1 Oct 2017 09:10:47 GMT" } ]
2017-10-03T00:00:00
[ [ "Arieli", "Itai", "" ], [ "Koren", "Moran", "" ], [ "Smorodinsky", "Rann", "" ] ]
new_dataset
0.980443
1710.00379
Yao-Yuan Yang
Yao-Yuan Yang, Shao-Chuan Lee, Yu-An Chung, Tung-En Wu, Si-An Chen, Hsuan-Tien Lin
libact: Pool-based Active Learning in Python
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
libact is a Python package designed to make active learning easier for general users. The package not only implements several popular active learning strategies, but also features the active-learning-by-learning meta-algorithm that assists the users to automatically select the best strategy on the fly. Furthermore, the package provides a unified interface for implementing more strategies, models and application-specific labelers. The package is open-source on Github, and can be easily installed from Python Package Index repository.
[ { "version": "v1", "created": "Sun, 1 Oct 2017 17:18:03 GMT" } ]
2017-10-03T00:00:00
[ [ "Yang", "Yao-Yuan", "" ], [ "Lee", "Shao-Chuan", "" ], [ "Chung", "Yu-An", "" ], [ "Wu", "Tung-En", "" ], [ "Chen", "Si-An", "" ], [ "Lin", "Hsuan-Tien", "" ] ]
new_dataset
0.998368
1710.00453
Alane Suhr
Stephanie Zhou, Alane Suhr, Yoav Artzi
Visual Reasoning with Natural Language
AAAI NCHRC 2017
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Natural language provides a widely accessible and expressive interface for robotic agents. To understand language in complex environments, agents must reason about the full range of language inputs and their correspondence to the world. Such reasoning over language and vision is an open problem that is receiving increasing attention. While existing data sets focus on visual diversity, they do not display the full range of natural language expressions, such as counting, set reasoning, and comparisons. We propose a simple task for natural language visual reasoning, where images are paired with descriptive statements. The task is to predict if a statement is true for the given scene. This abstract describes our existing synthetic images corpus and our current work on collecting real vision data.
[ { "version": "v1", "created": "Mon, 2 Oct 2017 01:52:05 GMT" } ]
2017-10-03T00:00:00
[ [ "Zhou", "Stephanie", "" ], [ "Suhr", "Alane", "" ], [ "Artzi", "Yoav", "" ] ]
new_dataset
0.996529
1710.00490
Catarina Moreira
Catarina Moreira and Emmanuel Haven and Sandro Sozzo and Andreas Wichert
The Dutch's Real World Financial Institute: Introducing Quantum-Like Bayesian Networks as an Alternative Model to deal with Uncertainty
15 images, 33 pages
null
null
null
cs.AI quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we analyse and model a real life financial loan application belonging to a sample bank in the Netherlands. The log is robust in terms of data, containing a total of 262 200 event logs, belonging to 13 087 different credit applications. The dataset is heterogeneous and consists of a mixture of computer generated automatic processes and manual human tasks. The goal is to work out a decision model, which represents the underlying tasks that make up the loan application service, and to assess potential areas of improvement of the institution's internal processes. To this end we study the impact of incomplete event logs for the extraction and analysis of business processes. It is quite common that event logs are incomplete with several amounts of missing information (for instance, workers forget to register their tasks). Absence of data is translated into a drastic decrease of precision and compromises the decision models, leading to biased and unrepresentative results. We investigate how classical probabilistic models are affected by incomplete event logs and we explore quantum-like probabilistic inferences as an alternative mathematical model to classical probability. This work represents a first step towards systematic investigation of the impact of quantum interference in a real life large scale decision scenario. The results obtained in this study indicate that, under high levels of uncertainty, the quantum-like models generate quantum interference terms, which allow an additional non-linear parameterisation of the data. Experimental results attest the efficiency of the quantum-like Bayesian networks, since the application of interference terms is able to reduce the error percentage of inferences performed over quantum-like models when compared to inferences produced by classical models.
[ { "version": "v1", "created": "Mon, 2 Oct 2017 05:28:03 GMT" } ]
2017-10-03T00:00:00
[ [ "Moreira", "Catarina", "" ], [ "Haven", "Emmanuel", "" ], [ "Sozzo", "Sandro", "" ], [ "Wichert", "Andreas", "" ] ]
new_dataset
0.997334
1710.00506
Tamoor-Ul-Hassan Syed
Syed Tamoor-ul-Hassan, Sumudu Samarakoon, Mehdi Bennis, Matti Latva-aho, Choong-Seong Hong
Learning-based Caching in Cloud-Aided Wireless Networks
4 pages, 5 figures, Accepted, IEEE Comm Letter 2017
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies content caching in cloud-aided wireless networks where small cell base stations with limited storage are connected to the cloud via limited capacity fronthaul links. By formulating a utility (inverse of service delay) maximization problem, we propose a cache update algorithm based on spatio-temporal traffic demands. To account for the large number of contents, we propose a content clustering algorithm to group similar contents. Subsequently, with the aid of regret learning at small cell base stations and the cloud, each base station caches contents based on the learned content popularity subject to its storage constraints. The performance of the proposed caching algorithm is evaluated for sparse and dense environments while investigating the tradeoff between global and local class popularity. Simulation results show 15% and 40% gains in the proposed method compared to various baselines.
[ { "version": "v1", "created": "Mon, 2 Oct 2017 06:45:30 GMT" } ]
2017-10-03T00:00:00
[ [ "Tamoor-ul-Hassan", "Syed", "" ], [ "Samarakoon", "Sumudu", "" ], [ "Bennis", "Mehdi", "" ], [ "Latva-aho", "Matti", "" ], [ "Hong", "Choong-Seong", "" ] ]
new_dataset
0.98675
1710.00517
Hiroshi Kawasaki
Yuki Shiba, Satoshi Ono, Ryo Furukawa, Shinsaku Hiura, Hiroshi Kawasaki
Temporal shape super-resolution by intra-frame motion encoding using high-fps structured light
9 pages, Published at the International Conference on Computer Vision (ICCV 2017)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the solutions of depth imaging of moving scene is to project a static pattern on the object and use just a single image for reconstruction. However, if the motion of the object is too fast with respect to the exposure time of the image sensor, patterns on the captured image are blurred and reconstruction fails. In this paper, we impose multiple projection patterns into each single captured image to realize temporal super resolution of the depth image sequences. With our method, multiple patterns are projected onto the object with higher fps than possible with a camera. In this case, the observed pattern varies depending on the depth and motion of the object, so we can extract temporal information of the scene from each single image. The decoding process is realized using a learning-based approach where no geometric calibration is needed. Experiments confirm the effectiveness of our method where sequential shapes are reconstructed from a single image. Both quantitative evaluations and comparisons with recent techniques were also conducted.
[ { "version": "v1", "created": "Mon, 2 Oct 2017 07:52:04 GMT" } ]
2017-10-03T00:00:00
[ [ "Shiba", "Yuki", "" ], [ "Ono", "Satoshi", "" ], [ "Furukawa", "Ryo", "" ], [ "Hiura", "Shinsaku", "" ], [ "Kawasaki", "Hiroshi", "" ] ]
new_dataset
0.979639
1710.00813
Conrad Rosenbrock
Conred W. Rosenbrock
A Practical Python API for Querying AFLOWLIB
7 pages, 3 code listings
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large databases such as aflowlib.org provide valuable data sources for discovering material trends through machine learning. Although a REST API and query language are available, there is a learning curve associated with the AFLUX language that acts as a barrier for new users. Additionally, the data is stored using non-standard serialization formats. Here we present a high-level API that allows immediate access to the aflowlib data using standard python operators and language features. It provides an easy way to integrate aflowlib data with other python materials packages such as ase and quippy, and provides automatic deserialization into numpy arrays and python objects. This package is available via "pip install aflow".
[ { "version": "v1", "created": "Thu, 28 Sep 2017 20:38:47 GMT" } ]
2017-10-03T00:00:00
[ [ "Rosenbrock", "Conred W.", "" ] ]
new_dataset
0.999286
1706.02885
Satoshi Koide
Satoshi Koide, Yukihiro Tadokoro, Chuan Xiao, Yoshiharu Ishikawa
CiNCT: Compression and retrieval for massive vehicular trajectories via relative movement labeling
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a compressed data structure for moving object trajectories in a road network, which are represented as sequences of road edges. Unlike existing compression methods for trajectories in a network, our method supports pattern matching and decompression from an arbitrary position while retaining a high compressibility with theoretical guarantees. Specifically, our method is based on FM-index, a fast and compact data structure for pattern matching. To enhance the compression, we incorporate the sparsity of road networks into the data structure. In particular, we present the novel concepts of relative movement labeling and PseudoRank, each contributing to significant reductions in data size and query processing time. Our theoretical analysis and experimental studies reveal the advantages of our proposed method as compared to existing trajectory compression methods and FM-index variants.
[ { "version": "v1", "created": "Fri, 9 Jun 2017 10:25:55 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2017 12:28:12 GMT" } ]
2017-10-02T00:00:00
[ [ "Koide", "Satoshi", "" ], [ "Tadokoro", "Yukihiro", "" ], [ "Xiao", "Chuan", "" ], [ "Ishikawa", "Yoshiharu", "" ] ]
new_dataset
0.992843
1709.09409
George Fragulis
Ioannis A. Skordas, Nikolaos Tsirekas, Nestoras Kolovos, George F. Fragulis, Athanasios G. Triantafyllou and Maria G. Bouliou
e-Sem: Dynamic Seminar Management System for Primary, Secondary and Tertiary Education
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the dynamic seminar management system named 'e-Sem', developed according to the opensource software philosophy. Due to its dynamic management functionality, it can equally adapt to any education environment (Primary, Secondary, Tertiary). The purpose of the proposed dynamic system is ease of use and handling, by any class of users, without the need of special guidance. Also, students are given the opportunity to: a) register as users; b) enroll in seminars in a simple way; c) receive e-learning material at any time of day any day of week, and d) be informed of new announcements concerning the seminar in which they are enrolled . In addition, the administrator and the tutors have a number of tools such as : management seminars and trainees in a friendly way, sending educational material as well as new announcements to the trainees; the possibility of electronic recording of presence or absence of the trainees in a seminar, and direct printing of a certificate of successful attendance of a seminar for each trainee. The application also offers features such as electronic organization, storage and presentation of educational material, overcoming the limiting factors of space and time of classical teaching, thus creating a dynamic environment
[ { "version": "v1", "created": "Wed, 27 Sep 2017 09:31:35 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2017 10:17:07 GMT" } ]
2017-10-02T00:00:00
[ [ "Skordas", "Ioannis A.", "" ], [ "Tsirekas", "Nikolaos", "" ], [ "Kolovos", "Nestoras", "" ], [ "Fragulis", "George F.", "" ], [ "Triantafyllou", "Athanasios G.", "" ], [ "Bouliou", "Maria G.", "" ] ]
new_dataset
0.998171
1709.10147
John Clemens
J. Aaron Pendergrass, Sarah Helble, John Clemens, Peter Loscocco
Maat: A Platform Service for Measurement and Attestation
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software integrity measurement and attestation (M&A) are critical technologies for evaluating the trustworthiness of software platforms. To best support these technologies, next generation systems must provide a centralized service for securely selecting, collecting, and evaluating integrity measurements. Centralization of M&A avoids duplication, minimizes security risks to the system, and ensures correct ad- ministration of integrity policies and systems. This paper details the desirable features and properties of such a system, and introduces Maat, a prototype implementation of an M&A service that meets these properties. Maat is a platform service that provides a centralized policy-driven framework for determining which measurement tools and protocols to use to meet the needs of a given integrity evaluation. Maat simplifies the task of integrating integrity measurements into a range of larger trust decisions such as authentication, network access control, or delegated computations.
[ { "version": "v1", "created": "Thu, 28 Sep 2017 19:50:12 GMT" } ]
2017-10-02T00:00:00
[ [ "Pendergrass", "J. Aaron", "" ], [ "Helble", "Sarah", "" ], [ "Clemens", "John", "" ], [ "Loscocco", "Peter", "" ] ]
new_dataset
0.989818
1709.10159
Haji Mohammad Saleem
Haji Mohammad Saleem, Kelly P Dillon, Susan Benesch and Derek Ruths
A Web of Hate: Tackling Hateful Speech in Online Social Spaces
9 pages, presented at the first workshop on Text Analytics for Cybersecurity and Online Safety (TA-COS), collocated with LREC 2016
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online social platforms are beset with hateful speech - content that expresses hatred for a person or group of people. Such content can frighten, intimidate, or silence platform users, and some of it can inspire other users to commit violence. Despite widespread recognition of the problems posed by such content, reliable solutions even for detecting hateful speech are lacking. In the present work, we establish why keyword-based methods are insufficient for detection. We then propose an approach to detecting hateful speech that uses content produced by self-identifying hateful communities as training data. Our approach bypasses the expensive annotation process often required to train keyword systems and performs well across several established platforms, making substantial improvements over current state-of-the-art approaches.
[ { "version": "v1", "created": "Thu, 28 Sep 2017 20:31:30 GMT" } ]
2017-10-02T00:00:00
[ [ "Saleem", "Haji Mohammad", "" ], [ "Dillon", "Kelly P", "" ], [ "Benesch", "Susan", "" ], [ "Ruths", "Derek", "" ] ]
new_dataset
0.999302
1709.10275
Chris Lehnert
Chris Lehnert, Chris McCool, Tristan Perez
In-Field Peduncle Detection of Sweet Peppers for Robotic Harvesting: a comparative study
Submitted to International Conference on Robotics and Automation 2018, under review
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robotic harvesting of crops has the potential to disrupt current agricultural practices. A key element to enabling robotic harvesting is to safely remove the crop from the plant which often involves locating and cutting the peduncle, the part of the crop that attaches it to the main stem of the plant. In this paper we present a comparative study of two methods for performing peduncle detection. The first method is based on classic colour and geometric features obtained from the scene with a support vector machine classifier, referred to as PFH-SVM. The second method is an efficient deep neural network approach, MiniInception, that is able to be deployed on a robotic platform. In both cases we employ a secondary filtering process that enforces reasonable assumptions about the crop structure, such as the proximity of the peduncle to the crop. Our tests are conducted on Harvey, a sweet pepper harvesting robot, and is evaluated in a greenhouse using two varieties of sweet pepper, Ducati and Mercuno. We demonstrate that the MiniInception method achieves impressive accuracy and considerably outperforms the PFH-SVM approach achieving an F1 score of 0.564 and 0.302 respectively.
[ { "version": "v1", "created": "Fri, 29 Sep 2017 08:10:33 GMT" } ]
2017-10-02T00:00:00
[ [ "Lehnert", "Chris", "" ], [ "McCool", "Chris", "" ], [ "Perez", "Tristan", "" ] ]
new_dataset
0.982652
1709.10299
Souneil Park
Souneil Park, Joan Serra, Enrique Frias Martinez, Nuria Oliver
MobInsight: A Framework Using Semantic Neighborhood Features for Localized Interpretations of Urban Mobility
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collective urban mobility embodies the residents' local insights on the city. Mobility practices of the residents are produced from their spatial choices, which involve various considerations such as the atmosphere of destinations, distance, past experiences, and preferences. The advances in mobile computing and the rise of geo-social platforms have provided the means for capturing the mobility practices; however, interpreting the residents' insights is challenging due to the scale and complexity of an urban environment, and its unique context. In this paper, we present MobInsight, a framework for making localized interpretations of urban mobility that reflect various aspects of the urbanism. MobInsight extracts a rich set of neighborhood features through holistic semantic aggregation, and models the mobility between all-pairs of neighborhoods. We evaluate MobInsight with the mobility data of Barcelona and demonstrate diverse localized and semantically-rich interpretations.
[ { "version": "v1", "created": "Fri, 29 Sep 2017 09:31:59 GMT" } ]
2017-10-02T00:00:00
[ [ "Park", "Souneil", "" ], [ "Serra", "Joan", "" ], [ "Martinez", "Enrique Frias", "" ], [ "Oliver", "Nuria", "" ] ]
new_dataset
0.997349
1709.10371
Meryem Benammar
Meryem Benammar, Valerio Bioglio, Frederic Gabry, Ingmar Land
Multi-Kernel Polar Codes: Proof of Polarization and Error Exponents
Accepted and to be presented at ITW 2017, Kaohsiung
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate a novel family of polar codes based on multi-kernel constructions, proving that this construction actually polarizes. To this end, we derive a new and more general proof of polarization, which gives sufficient conditions for kernels to polarize. Finally, we derive the convergence rate of the multi-kernel construction and relate it to the convergence rate of each of the constituent kernels.
[ { "version": "v1", "created": "Fri, 29 Sep 2017 12:39:37 GMT" } ]
2017-10-02T00:00:00
[ [ "Benammar", "Meryem", "" ], [ "Bioglio", "Valerio", "" ], [ "Gabry", "Frederic", "" ], [ "Land", "Ingmar", "" ] ]
new_dataset
0.998228
1709.10431
Yanchao Yu
Yanchao Yu, Arash Eshghi, Gregory Mills, Oliver Joseph Lemon
The BURCHAK corpus: a Challenge Data Set for Interactive Learning of Visually Grounded Word Meanings
10 pages, THE 6TH WORKSHOP ON VISION AND LANGUAGE (VL'17)
null
10.18653/v1/W17-2001
null
cs.CL cs.AI cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We motivate and describe a new freely available human-human dialogue dataset for interactive learning of visually grounded word meanings through ostensive definition by a tutor to a learner. The data has been collected using a novel, character-by-character variant of the DiET chat tool (Healey et al., 2003; Mills and Healey, submitted) with a novel task, where a Learner needs to learn invented visual attribute words (such as " burchak " for square) from a tutor. As such, the text-based interactions closely resemble face-to-face conversation and thus contain many of the linguistic phenomena encountered in natural, spontaneous dialogue. These include self-and other-correction, mid-sentence continuations, interruptions, overlaps, fillers, and hedges. We also present a generic n-gram framework for building user (i.e. tutor) simulations from this type of incremental data, which is freely available to researchers. We show that the simulations produce outputs that are similar to the original data (e.g. 78% turn match similarity). Finally, we train and evaluate a Reinforcement Learning dialogue control agent for learning visually grounded word meanings, trained from the BURCHAK corpus. The learned policy shows comparable performance to a rule-based system built previously.
[ { "version": "v1", "created": "Fri, 29 Sep 2017 14:43:06 GMT" } ]
2017-10-02T00:00:00
[ [ "Yu", "Yanchao", "" ], [ "Eshghi", "Arash", "" ], [ "Mills", "Gregory", "" ], [ "Lemon", "Oliver Joseph", "" ] ]
new_dataset
0.997161
1709.10486
Casey Kennington
Casey Kennington and Sarah Plane
Symbol, Conversational, and Societal Grounding with a Toy Robot
2 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Essential to meaningful interaction is grounding at the symbolic, conversational, and societal levels. We present ongoing work with Anki's Cozmo toy robot as a research platform where we leverage the recent words-as-classifiers model of lexical semantics in interactive reference resolution tasks for language grounding.
[ { "version": "v1", "created": "Fri, 29 Sep 2017 16:36:53 GMT" } ]
2017-10-02T00:00:00
[ [ "Kennington", "Casey", "" ], [ "Plane", "Sarah", "" ] ]
new_dataset
0.9798
1610.03793
Daniel Hein
Daniel Hein, Alexander Hentschel, Volkmar Sterzing, Michel Tokic, Steffen Udluft
Introduction to the "Industrial Benchmark"
11 pages
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel reinforcement learning benchmark, called Industrial Benchmark, is introduced. The Industrial Benchmark aims at being be realistic in the sense, that it includes a variety of aspects that we found to be vital in industrial applications. It is not designed to be an approximation of any real system, but to pose the same hardness and complexity.
[ { "version": "v1", "created": "Wed, 12 Oct 2016 17:18:01 GMT" }, { "version": "v2", "created": "Thu, 28 Sep 2017 11:28:26 GMT" } ]
2017-09-29T00:00:00
[ [ "Hein", "Daniel", "" ], [ "Hentschel", "Alexander", "" ], [ "Sterzing", "Volkmar", "" ], [ "Tokic", "Michel", "" ], [ "Udluft", "Steffen", "" ] ]
new_dataset
0.999642
1704.00058
Makoto Kobayashi
Makoto Kobayashi, Ryo Murakami, Shunsuke Saruwatari, Takashi Watanabe
Wireless Full-duplex Medium Access Control for Enhancing Energy Efficiency
30 pages, 23 figures, Submitted to IEEE Transactions on Green Communications and Networking
null
10.1109/TGCN.2017.2756883
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have witnessed a proliferation of battery-powered mobile devices, e.g., smartphones, tablets, sensors, and laptops, which leads a significant demand for high capacity wireless communication with high energy efficiency. Among technologies to provide the efficiency is full-duplex wireless communication. Full-duplex wireless enhances capacity by simultaneously transmitting uplink and downlink data with limited frequency resources. Previous studies on full-duplex wireless mostly focuses on doubling the network capacity, whereas in this paper we discuss that full-duplex wireless can also provide higher energy efficiency. We propose low power communication by wireless full-duplexing (LPFD), focusing on the fact that the full-duplex communication duration becomes half of the halfduplex communication duration. In the LPFD, by using the sleep state in which the transceiver provided in the wireless communication terminal is turned off, power consumption of the wireless communication terminal is reduced and energy efficiency in wireless full duplex is improved. Simulation results show that the energy efficiency achieved by LPFD is up to approximately 17.3 times higher than the energy efficiency achieved by existing full-duplex medium access protocol. Further, it is up to approximately 27.5 times higher than the energy efficiency using power saving mode of half-duplex communication.
[ { "version": "v1", "created": "Fri, 31 Mar 2017 21:05:48 GMT" } ]
2017-09-29T00:00:00
[ [ "Kobayashi", "Makoto", "" ], [ "Murakami", "Ryo", "" ], [ "Saruwatari", "Shunsuke", "" ], [ "Watanabe", "Takashi", "" ] ]
new_dataset
0.997311
1709.09287
Kaiyu Feng
Kaiyu Feng, Tao Guo, Gao Cong, Sourav S. Bhowmicks, Shuai Ma
SURGE: Continuous Detection of Bursty Regions Over a Stream of Spatial Objects
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the proliferation of mobile devices and location-based services, continuous generation of massive volume of streaming spatial objects (i.e., geo-tagged data) opens up new opportunities to address real-world problems by analyzing them. In this paper, we present a novel continuous bursty region detection problem that aims to continuously detect a bursty region of a given size in a specified geographical area from a stream of spatial objects. Specifically, a bursty region shows maximum spike in the number of spatial objects in a given time window. The problem is useful in addressing several real-world challenges such as surge pricing problem in online transportation and disease outbreak detection. To solve the problem, we propose an exact solution and two approximate solutions, and the approximation ratio is $\frac{1-\alpha}{4}$ in terms of the burst score, where $\alpha$ is a parameter to control the burst score. We further extend these solutions to support detection of top-$k$ bursty regions. Extensive experiments with real-world data are conducted to demonstrate the efficiency and effectiveness of our solutions.
[ { "version": "v1", "created": "Tue, 26 Sep 2017 23:58:29 GMT" }, { "version": "v2", "created": "Thu, 28 Sep 2017 06:36:04 GMT" } ]
2017-09-29T00:00:00
[ [ "Feng", "Kaiyu", "" ], [ "Guo", "Tao", "" ], [ "Cong", "Gao", "" ], [ "Bhowmicks", "Sourav S.", "" ], [ "Ma", "Shuai", "" ] ]
new_dataset
0.996773
1709.09551
Chiara Boldrini
Elisabetta Biondi, Chiara Boldrini, Andrea Passarella, Marco Conti
What you lose when you snooze: how duty cycling impacts on the contact process in opportunistic networks
Accepted for publication on ACM Transactions on Modeling and Performance Evaluation of Computing Systems (ToMPECS)
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In opportunistic networks, putting devices in energy saving mode is crucial to preserve their battery, and hence to increase the lifetime of the network and foster user participation. A popular strategy for energy saving is duty cycling. However, when in energy saving mode, users cannot communicate with each other. The side effects of duty cycling are twofold. On the one hand, duty cycling may reduce the number of usable contacts for delivering messages, increasing intercontact times and delays. On the other hand, duty cycling may break long contacts into smaller contacts, thus also reducing the capacity of the opportunistic network. Despite the potential serious effects, the role played by duty cycling in opportunistic networks has been often neglected in the literature. In order to fill this gap, in this paper we propose a general model for deriving the pairwise contact and intercontact times measured when a duty cycling policy is superimposed on the original encounter process determined only by node mobility. The model we propose is general, i.e., not bound to a specific distribution of contact and intercontact times, and very accurate, as we show exploiting two traces of real human mobility for validation. Using this model, we derive several interesting results about the properties of measured contact and intercontact times with duty cycling: their distribution, how their coefficient of variation changes depending on the duty cycle value, how the duty cycling affects the capacity and delay of an opportunistic network. The applicability of these results is broad, ranging from performance models for opportunistic networks that factor in the duty cycling effect, to the optimisation of the duty cycle to meet a certain target performance.
[ { "version": "v1", "created": "Wed, 27 Sep 2017 14:23:58 GMT" }, { "version": "v2", "created": "Thu, 28 Sep 2017 12:25:08 GMT" } ]
2017-09-29T00:00:00
[ [ "Biondi", "Elisabetta", "" ], [ "Boldrini", "Chiara", "" ], [ "Passarella", "Andrea", "" ], [ "Conti", "Marco", "" ] ]
new_dataset
0.998738
1709.09733
Michael Lyons
Michael J. Lyons
NIME: A Community of Communities
null
A NIME Reader: Fifteen Years of New Interfaces for Musical Expression, A.R. Jensenius and M.J. Lyons (eds.), Springer, pp.477-478, 2017
10.6084/m9.figshare.5386786
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Commentary on the article Fourteen Years of NIME: The Value and Meaning of Community in Interactive Music Research by A. Marquez-Borbon and P. Stapleton.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 19:25:48 GMT" } ]
2017-09-29T00:00:00
[ [ "Lyons", "Michael J.", "" ] ]
new_dataset
0.999257
1709.09770
Pengfei Huang
Pengfei Huang, Eitan Yaakobi, Paul H. Siegel
Multi-Erasure Locally Recoverable Codes Over Small Fields
This is an extended version of arXiv:1701.06110. To appear in Allerton 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Erasure codes play an important role in storage systems to prevent data loss. In this work, we study a class of erasure codes called Multi-Erasure Locally Recoverable Codes (ME-LRCs) for storage arrays. Compared to previous related works, we focus on the construction of ME-LRCs over small fields. We first develop upper and lower bounds on the minimum distance of ME-LRCs. Our main contribution is to propose a general construction of ME-LRCs based on generalized tensor product codes, and study their erasure-correcting properties. A decoding algorithm tailored for erasure recovery is given, and correctable erasure patterns are identified. We then prove that our construction yields optimal ME-LRCs with a wide range of code parameters, and present some explicit ME-LRCs over small fields. Finally, we show that generalized integrated interleaving (GII) codes can be treated as a subclass of generalized tensor product codes, thus defining the exact relation between these codes.
[ { "version": "v1", "created": "Thu, 28 Sep 2017 00:37:02 GMT" } ]
2017-09-29T00:00:00
[ [ "Huang", "Pengfei", "" ], [ "Yaakobi", "Eitan", "" ], [ "Siegel", "Paul H.", "" ] ]
new_dataset
0.997009
1709.09816
Federico Fancellu
Ben Krause, Marco Damonte, Mihai Dobre, Daniel Duma, Joachim Fainberg, Federico Fancellu, Emmanuel Kahembwe, Jianpeng Cheng, Bonnie Webber
Edina: Building an Open Domain Socialbot with Self-dialogues
10 pages; submitted to the 1st Proceedings of the Alexa Prize
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Edina, the University of Edinburgh's social bot for the Amazon Alexa Prize competition. Edina is a conversational agent whose responses utilize data harvested from Amazon Mechanical Turk (AMT) through an innovative new technique we call self-dialogues. These are conversations in which a single AMT Worker plays both participants in a dialogue. Such dialogues are surprisingly natural, efficient to collect and reflective of relevant and/or trending topics. These self-dialogues provide training data for a generative neural network as well as a basis for soft rules used by a matching score component. Each match of a soft rule against a user utterance is associated with a confidence score which we show is strongly indicative of reply quality, allowing this component to self-censor and be effectively integrated with other components. Edina's full architecture features a rule-based system backing off to a matching score, backing off to a generative neural network. Our hybrid data-driven methodology thus addresses both coverage limitations of a strictly rule-based approach and the lack of guarantees of a strictly machine-learning approach.
[ { "version": "v1", "created": "Thu, 28 Sep 2017 06:13:33 GMT" } ]
2017-09-29T00:00:00
[ [ "Krause", "Ben", "" ], [ "Damonte", "Marco", "" ], [ "Dobre", "Mihai", "" ], [ "Duma", "Daniel", "" ], [ "Fainberg", "Joachim", "" ], [ "Fancellu", "Federico", "" ], [ "Kahembwe", "Emmanuel", "" ], [ "Cheng", "Jianpeng", "" ], [ "Webber", "Bonnie", "" ] ]
new_dataset
0.998214
1709.09875
Jomy John
Jomy John
Recognition of Documents in Braille
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visually impaired people are integral part of the society and it has been a must to provide them with means and system through which they may communicate with the world. In this work, I would like to address how computers can be made useful to read the scripts in Braille. The importance of this work is to reduce communication gap between visually impaired people and the society. Braille remains the most popular tactile reading code even in this century. There are numerous amount of literature locked up in Braille. Braille recognition not only reduces time in reading or extracting information from Braille document but also helps people engaged in special education for correcting papers and other school related works. The availability of such a system will enhance communication and collaboration possibilities with visually impaired people. Existing works supports only documents in white either bright or dull in colour. Hardly any work could be traced on hand printed ordinary documents in Braille.
[ { "version": "v1", "created": "Thu, 28 Sep 2017 09:51:33 GMT" } ]
2017-09-29T00:00:00
[ [ "John", "Jomy", "" ] ]
new_dataset
0.984298
1709.09931
Angela He
Angela He
Educational game design: game elements for promoting engagement
54 pages, 3 figures, 2 tables
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Engagement in educational games, a recently popular academic topic, has been shown to increase learning performance, as well as a number of attitudinal factors, such as intrinsic interest and motivation. However, there is a lack of research on how games can be designed to promote engagement. This mixed methods case study aimed to discover effective game elements for promoting 17-18 year old high school students' engagement with an educational game. Using within-case and cross-case analyses and triangulated data, 10 elements emerged and were categorized into the constructs of story, gameplay, and atmosphere. Examples and connections to the literature for each element are reported. Findings implicate that educational game design for both learning and engagement is composed of educational-game specific elements, game design for solely engagement is similar for both educational and entertainment games, and a gap on educational game design technique instead of theory should be addressed to further benefit educational game development.
[ { "version": "v1", "created": "Wed, 27 Sep 2017 02:48:27 GMT" } ]
2017-09-29T00:00:00
[ [ "He", "Angela", "" ] ]
new_dataset
0.964687
1709.09936
Banu Kabakulak
Banu Kabakulak, Z. Caner Ta\c{s}k{\i}n, and Ali Emre Pusane
A Branch-and-Cut Algorithm to Design LDPC Codes without Small Cycles in Communication Systems
31 pages, 18 figures, 7 tables
null
null
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a digital communication system, information is sent from one place to another over a noisy communication channel using binary symbols (bits). Original information is encoded by adding redundant bits, which are then used by low--density parity--check (LDPC) codes to detect and correct errors that may have been introduced during transmission. Error correction capability of an LDPC code is severely degraded due to harmful structures such as small cycles in its bipartite graph representation known as Tanner graph (TG). We introduce an integer programming formulation to generate a TG for a given smallest cycle length. We propose a branch-and-cut algorithm for its solution and investigate structural properties of the problem to derive valid inequalities and variable fixing rules. We introduce a heuristic to obtain feasible solutions of the problem. Our computational experiments show that our algorithm can generate LDPC codes without small cycles in acceptable amount of time for practically relevant code lengths.
[ { "version": "v1", "created": "Thu, 28 Sep 2017 13:19:08 GMT" } ]
2017-09-29T00:00:00
[ [ "Kabakulak", "Banu", "" ], [ "Taşkın", "Z. Caner", "" ], [ "Pusane", "Ali Emre", "" ] ]
new_dataset
0.999671
1709.09991
Benedikt Bollig
Benedikt Bollig, Marie Fortin and Paul Gastin
Communicating Finite-State Machines and Two-Variable Logic
null
null
null
null
cs.LO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Communicating finite-state machines are a fundamental, well-studied model of finite-state processes that communicate via unbounded first-in first-out channels. We show that they are expressively equivalent to existential MSO logic with two first-order variables and the order relation.
[ { "version": "v1", "created": "Thu, 28 Sep 2017 14:39:36 GMT" } ]
2017-09-29T00:00:00
[ [ "Bollig", "Benedikt", "" ], [ "Fortin", "Marie", "" ], [ "Gastin", "Paul", "" ] ]
new_dataset
0.992365
1511.07607
Rahul Anand Sharma Mr.
Rahul Anand Sharma, Pramod Sankar K and CV Jawahar
Fine-Grain Annotation of Cricket Videos
ACPR 2015
null
null
null
cs.MM cs.CL cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recognition of human activities is one of the key problems in video understanding. Action recognition is challenging even for specific categories of videos, such as sports, that contain only a small set of actions. Interestingly, sports videos are accompanied by detailed commentaries available online, which could be used to perform action annotation in a weakly-supervised setting. For the specific case of Cricket videos, we address the challenge of temporal segmentation and annotation of ctions with semantic descriptions. Our solution consists of two stages. In the first stage, the video is segmented into "scenes", by utilizing the scene category information extracted from text-commentary. The second stage consists of classifying video-shots as well as the phrases in the textual description into various categories. The relevant phrases are then suitably mapped to the video-shots. The novel aspect of this work is the fine temporal scale at which semantic information is assigned to the video. As a result of our approach, we enable retrieval of specific actions that last only a few seconds, from several hours of video. This solution yields a large number of labeled exemplars, with no manual effort, that could be used by machine learning algorithms to learn complex actions.
[ { "version": "v1", "created": "Tue, 24 Nov 2015 08:34:20 GMT" }, { "version": "v2", "created": "Wed, 27 Sep 2017 10:48:11 GMT" } ]
2017-09-28T00:00:00
[ [ "Sharma", "Rahul Anand", "" ], [ "K", "Pramod Sankar", "" ], [ "Jawahar", "CV", "" ] ]
new_dataset
0.999321
1709.09443
Lea Frermann
Lea Frermann and Michael C. Frank
Prosodic Features from Large Corpora of Child-Directed Speech as Predictors of the Age of Acquisition of Words
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
The impressive ability of children to acquire language is a widely studied phenomenon, and the factors influencing the pace and patterns of word learning remains a subject of active research. Although many models predicting the age of acquisition of words have been proposed, little emphasis has been directed to the raw input children achieve. In this work we present a comparatively large-scale multi-modal corpus of prosody-text aligned child directed speech. Our corpus contains automatically extracted word-level prosodic features, and we investigate the utility of this information as predictors of age of acquisition. We show that prosody features boost predictive power in a regularized regression, and demonstrate their utility in the context of a multi-modal factorized language models trained and tested on child-directed speech.
[ { "version": "v1", "created": "Wed, 27 Sep 2017 10:50:12 GMT" } ]
2017-09-28T00:00:00
[ [ "Frermann", "Lea", "" ], [ "Frank", "Michael C.", "" ] ]
new_dataset
0.989369
1709.09484
Anisse Ismaili
Anisse Ismaili
Routing Games over Time with FIFO policy
Submission to WINE-2017 Deadline was August 2nd AoE, 2017
null
null
null
cs.GT cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study atomic routing games where every agent travels both along its decided edges and through time. The agents arriving on an edge are first lined up in a \emph{first-in-first-out} queue and may wait: an edge is associated with a capacity, which defines how many agents-per-time-step can pop from the queue's head and enter the edge, to transit for a fixed delay. We show that the best-response optimization problem is not approximable, and that deciding the existence of a Nash equilibrium is complete for the second level of the polynomial hierarchy. Then, we drop the rationality assumption, introduce a behavioral concept based on GPS navigation, and study its worst-case efficiency ratio to coordination.
[ { "version": "v1", "created": "Fri, 4 Aug 2017 02:22:46 GMT" } ]
2017-09-28T00:00:00
[ [ "Ismaili", "Anisse", "" ] ]
new_dataset
0.992246
1709.09574
Jelani Nelson
Jacob Teo Por Loong, Jelani Nelson, Huacheng Yu
Fillable arrays with constant time operations and a single bit of redundancy
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the fillable array problem one must maintain an array A[1..n] of $w$-bit entries subject to random access reads and writes, and also a $\texttt{fill}(\Delta)$ operation which sets every entry of to some $\Delta\in\{0,\ldots,2^w-1\}$. We show that with just one bit of redundancy, i.e. a data structure using $nw+1$ bits of memory, $\texttt{read}/\texttt{fill}$ can be implemented in worst case constant time, and $\texttt{write}$ can be implemented in either amortized constant time (deterministically) or worst case expected constant (randomized). In the latter case, we need to store an additional $O(\log n)$ random bits to specify a permutation drawn from an $1/n^2$-almost pairwise independent family.
[ { "version": "v1", "created": "Wed, 27 Sep 2017 15:15:14 GMT" } ]
2017-09-28T00:00:00
[ [ "Loong", "Jacob Teo Por", "" ], [ "Nelson", "Jelani", "" ], [ "Yu", "Huacheng", "" ] ]
new_dataset
0.99889
1709.09615
Xiao Lu
Xiao Lu, Dusit Niyato, Hai Jiang, Dong In Kim, Yong Xiao and Zhu Han
Ambient Backscatter Networking: A Novel Paradigm to Assist Wireless Powered Communications
A shortened version of this article is to appear in IEEE Wireless Communications
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ambient backscatter communication technology has been introduced recently, and is then quickly becoming a promising choice for self-sustainable communication systems as an external power supply or a dedicated carrier emitter is not required. By leveraging existing RF signal resources, ambient backscatter technology can support sustainable and independent communications and consequently open up a whole new set of applications that facilitate Internet-of-Things (IoT). In this article, we study an integration of ambient backscatter with wireless powered communication networks (WPCNs). We first present an overview of backscatter communication systems with an emphasis on the emerging ambient backscatter technology. Then we propose a novel hybrid transmitter design by combining the advantages of both ambient backscatter and wireless powered communications. Furthermore, in the cognitive radio environment, we introduce a multiple access scheme to coordinate the hybrid data transmissions. The performance evaluation shows that the hybrid transmitter outperforms traditional designs. In addition, we discuss some open issues related to the ambient backscatter networking.
[ { "version": "v1", "created": "Wed, 27 Sep 2017 16:42:28 GMT" } ]
2017-09-28T00:00:00
[ [ "Lu", "Xiao", "" ], [ "Niyato", "Dusit", "" ], [ "Jiang", "Hai", "" ], [ "Kim", "Dong In", "" ], [ "Xiao", "Yong", "" ], [ "Han", "Zhu", "" ] ]
new_dataset
0.999409
1709.09623
Hongxu Chen
Hongxu Chen, Alwen Tiu, Zhiwu Xu, Yang Liu
A Permission-Dependent Type System for Secure Information Flow Analysis
48 pages
null
null
null
cs.PL cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a novel type system for enforcing secure information flow in an imperative language. Our work is motivated by the problem of statically checking potential information leakage in Android applications. To this end, we design a lightweight type system featuring Android permission model, where the permissions are statically assigned to applications and are used to enforce access control in the applications. We take inspiration from a type system by Banerjee and Naumann (BN) to allow security types to be dependent on the permissions of the applications. A novel feature of our type system is a typing rule for conditional branching induced by permission testing, which introduces a merging operator on security types, allowing more precise security policies to be enforced. The soundness of our type system is proved with respect to a notion of noninterference. In addition, a type inference algorithm is presented for the underlying security type system, by reducing the inference problem to a constraint solving problem in the lattice of security types.
[ { "version": "v1", "created": "Wed, 27 Sep 2017 16:55:25 GMT" } ]
2017-09-28T00:00:00
[ [ "Chen", "Hongxu", "" ], [ "Tiu", "Alwen", "" ], [ "Xu", "Zhiwu", "" ], [ "Liu", "Yang", "" ] ]
new_dataset
0.997756
1709.04883
Nane Kratzke
Nane Kratzke and Ren\'e Peinl
ClouNS - A Cloud-native Application Reference Model for Enterprise Architects
null
null
10.1109/EDOCW.2016.7584353
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capability to operate cloud-native applications can generate enormous business growth and value. But enterprise architects should be aware that cloud-native applications are vulnerable to vendor lock-in. We investigated cloud-native application design principles, public cloud service providers, and industrial cloud standards. All results indicate that most cloud service categories seem to foster vendor lock-in situations which might be especially problematic for enterprise architectures. This might sound disillusioning at first. However, we present a reference model for cloud-native applications that relies only on a small subset of well standardized IaaS services. The reference model can be used for codifying cloud technologies. It can guide technology identification, classification, adoption, research and development processes for cloud-native application and for vendor lock-in aware enterprise architecture engineering methodologies.
[ { "version": "v1", "created": "Thu, 14 Sep 2017 17:16:09 GMT" } ]
2017-09-27T00:00:00
[ [ "Kratzke", "Nane", "" ], [ "Peinl", "René", "" ] ]
new_dataset
0.991146
1709.08666
Jennifer Carlet
Jennifer Carlet, Bernard Abayowa
Fast Vehicle Detection in Aerial Imagery
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, several real-time or near real-time object detectors have been developed. However these object detectors are typically designed for first-person view images where the subject is large in the image and do not directly apply well to detecting vehicles in aerial imagery. Though some detectors have been developed for aerial imagery, these are either slow or do not handle multi-scale imagery very well. Here the popular YOLOv2 detector is modified to vastly improve it's performance on aerial data. The modified detector is compared to Faster RCNN on several aerial imagery datasets. The proposed detector gives near state of the art performance at more than 4x the speed.
[ { "version": "v1", "created": "Mon, 25 Sep 2017 18:41:01 GMT" } ]
2017-09-27T00:00:00
[ [ "Carlet", "Jennifer", "" ], [ "Abayowa", "Bernard", "" ] ]
new_dataset
0.991737
1709.08830
Yu Cheng
Devu Manikantan Shilay, Kin Gwn Lorey, Tianshu Weiz, Teems Lovetty, and Yu Cheng
Catching Anomalous Distributed Photovoltaics: An Edge-based Multi-modal Anomaly Detection
null
null
null
null
cs.SY cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A significant challenge in energy system cyber security is the current inability to detect cyber-physical attacks targeting and originating from distributed grid-edge devices such as photovoltaics (PV) panels, smart flexible loads, and electric vehicles. We address this concern by designing and developing a distributed, multi-modal anomaly detection approach that can sense the health of the device and the electric power grid from the edge. This is realized by exploiting unsupervised machine learning algorithms on multiple sources of time-series data, fusing these multiple local observations and flagging anomalies when a deviation from the normal behavior is observed. We particularly focus on the cyber-physical threats to the distributed PVs that has the potential to cause local disturbances or grid instabilities by creating supply-demand mismatch, reverse power flow conditions etc. We use an open source power system simulation tool called GridLAB-D, loaded with real smart home and solar datasets to simulate the smart grid scenarios and to illustrate the impact of PV attacks on the power system. Various attacks targeting PV panels that create voltage fluctuations, reverse power flow etc were designed and performed. We observe that while individual unsupervised learning algorithms such as OCSVMs, Corrupt RF and PCA surpasses in identifying particular attack type, PCA with Convex Hull outperforms all algorithms in identifying all designed attacks with a true positive rate of 83.64% and an accuracy of 95.78%. Our key insight is that due to the heterogeneous nature of the distribution grid and the uncertainty in the type of the attack being launched, relying on single mode of information for defense can lead to increased false alarms and missed detection rates as one can design attacks to hide within those uncertainties and remain stealthy.
[ { "version": "v1", "created": "Tue, 26 Sep 2017 04:54:46 GMT" } ]
2017-09-27T00:00:00
[ [ "Shilay", "Devu Manikantan", "" ], [ "Lorey", "Kin Gwn", "" ], [ "Weiz", "Tianshu", "" ], [ "Lovetty", "Teems", "" ], [ "Cheng", "Yu", "" ] ]
new_dataset
0.993879
1709.08831
Sandeep Konam
Sandeep Konam, Stephanie Rosenthal, Manuela Veloso
UAV and Service Robot Coordination for Indoor Object Search Tasks
IJCAI-2016 Workshop on Autonomous Mobile Service Robots
null
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our CoBot robots have successfully performed a variety of service tasks in our multi-building environment including accompanying people to meetings and delivering objects to offices due to its navigation and localization capabilities. However, they lack the capability to visually search over desks and other confined locations for an object of interest. Conversely, an inexpensive GPS-denied quadcopter platform such as the Parrot ARDrone 2.0 could perform this object search task if it had access to reasonable localization. In this paper, we propose the concept of coordination between CoBot and the Parrot ARDrone 2.0 to perform service-based object search tasks, in which CoBot localizes and navigates to the general search areas carrying the ARDrone and the ARDrone searches locally for objects. We propose a vision-based moving target navigation algorithm that enables the ARDrone to localize with respect to CoBot, search for objects, and return to the CoBot for future searches. We demonstrate our algorithm in indoor environments on several search trajectories.
[ { "version": "v1", "created": "Tue, 26 Sep 2017 05:04:37 GMT" } ]
2017-09-27T00:00:00
[ [ "Konam", "Sandeep", "" ], [ "Rosenthal", "Stephanie", "" ], [ "Veloso", "Manuela", "" ] ]
new_dataset
0.975023
1709.09029
Stanislav Levin
Stanislav Levin, Amiram Yehudai
The Co-Evolution of Test Maintenance and Code Maintenance through the lens of Fine-Grained Semantic Changes
postprint, ICSME 2017
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic testing is a widely adopted technique for improving software quality. Software developers add, remove and update test methods and test classes as part of the software development process as well as during the evolution phase, following the initial release. In this work we conduct a large scale study of 61 popular open source projects and report the relationships we have established between test maintenance, production code maintenance, and semantic changes (e.g, statement added, method removed, etc.). performed in developers' commits. We build predictive models, and show that the number of tests in a software project can be well predicted by employing code maintenance profiles (i.e., how many commits were performed in each of the maintenance activities: corrective, perfective, adaptive). Our findings also reveal that more often than not, developers perform code fixes without performing complementary test maintenance in the same commit (e.g., update an existing test or add a new one). When developers do perform test maintenance, it is likely to be affected by the semantic changes they perform as part of their commit. Our work is based on studying 61 popular open source projects, comprised of over 240,000 commits consisting of over 16,000,000 semantic change type instances, performed by over 4,000 software engineers.
[ { "version": "v1", "created": "Tue, 26 Sep 2017 14:13:33 GMT" } ]
2017-09-27T00:00:00
[ [ "Levin", "Stanislav", "" ], [ "Yehudai", "Amiram", "" ] ]
new_dataset
0.965361
1709.09069
Andreas Kirsch
Andreas Kirsch
MDP environments for the OpenAI Gym
6 pages, 2 figures
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The OpenAI Gym provides researchers and enthusiasts with simple to use environments for reinforcement learning. Even the simplest environment have a level of complexity that can obfuscate the inner workings of RL approaches and make debugging difficult. This whitepaper describes a Python framework that makes it very easy to create simple Markov-Decision-Process environments programmatically by specifying state transitions and rewards of deterministic and non-deterministic MDPs in a domain-specific language in Python. It then presents results and visualizations created with this MDP framework.
[ { "version": "v1", "created": "Tue, 26 Sep 2017 14:52:23 GMT" } ]
2017-09-27T00:00:00
[ [ "Kirsch", "Andreas", "" ] ]
new_dataset
0.997514
1709.09099
Chiwan Park
Chiwan Park, Ha-Myung Park, Minji Yoon, U Kang
PMV: Pre-partitioned Generalized Matrix-Vector Multiplication for Scalable Graph Mining
10 pages
null
null
null
cs.DC cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How can we analyze enormous networks including the Web and social networks which have hundreds of billions of nodes and edges? Network analyses have been conducted by various graph mining methods including shortest path computation, PageRank, connected component computation, random walk with restart, etc. These graph mining methods can be expressed as generalized matrix-vector multiplication which consists of few operations inspired by typical matrix-vector multiplication. Recently, several graph processing systems based on matrix-vector multiplication or their own primitives have been proposed to deal with large graphs; however, they all have failed on Web-scale graphs due to insufficient memory space or the lack of consideration for I/O costs. In this paper, we propose PMV (Pre-partitioned generalized Matrix-Vector multiplication), a scalable distributed graph mining method based on generalized matrix-vector multiplication on distributed systems. PMV significantly decreases the communication cost, which is the main bottleneck of distributed systems, by partitioning the input graph in advance and judiciously applying execution strategies based on the density of the pre-partitioned sub-matrices. Experiments show that PMV succeeds in processing up to 16x larger graphs than existing distributed memory-based graph mining methods, and requires 9x less time than previous disk-based graph mining methods by reducing I/O costs significantly.
[ { "version": "v1", "created": "Tue, 26 Sep 2017 15:53:15 GMT" } ]
2017-09-27T00:00:00
[ [ "Park", "Chiwan", "" ], [ "Park", "Ha-Myung", "" ], [ "Yoon", "Minji", "" ], [ "Kang", "U", "" ] ]
new_dataset
0.975501
1604.04855
Ashwin Ganesan
Ashwin Ganesan
Fault tolerant supergraphs with automorphisms
null
null
null
null
cs.DM cs.NI math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a graph $Y$ on $n$ vertices and a desired level of fault-tolerance $k$, an objective in fault-tolerant system design is to construct a supergraph $X$ on $n + k$ vertices such that the removal of any $k$ nodes from $X$ leaves a graph containing $Y$. In order to reconfigure around faults when they occur, it is also required that any two subsets of $k$ nodes of $X$ are in the same orbit of the action of its automorphism group. In this paper, we prove that such a supergraph must be the complete graph. This implies that it is very expensive to have an interconnection network which is $k$-fault-tolerant and which also supports automorphic reconfiguration. Our work resolves an open problem in the literature. The proof uses a result due to Cameron on $k$-homogeneous groups.
[ { "version": "v1", "created": "Sun, 17 Apr 2016 09:42:38 GMT" }, { "version": "v2", "created": "Wed, 22 Mar 2017 08:43:40 GMT" }, { "version": "v3", "created": "Sun, 24 Sep 2017 16:47:55 GMT" } ]
2017-09-26T00:00:00
[ [ "Ganesan", "Ashwin", "" ] ]
new_dataset
0.999626
1605.06015
Irina Biktasheva
Mario Antonioletti, Vadim N. Biktashev, Adrian Jackson, Sanjay R. Kharche, Tomas Stary, Irina V. Biktasheva
BeatBox - HPC Simulation Environment for Biophysically and Anatomically Realistic Cardiac Electrophysiology
37 pages, 10 figures, last version submitted to PLOS ONE
PLoS ONE 12(5): e0172292, 2017
10.1371/journal.pone.0172292
null
cs.CE nlin.AO nlin.PS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The BeatBox simulation environment combines flexible script language user interface with the robust computational tools, in order to setup cardiac electrophysiology in-silico experiments without re-coding at low-level, so that cell excitation, tissue/anatomy models, stimulation protocols may be included into a BeatBox script, and simulation run either sequentially or in parallel (MPI) without re-compilation. BeatBox is a free software written in C language to be run on a Unix-based platform. It provides the whole spectrum of multi scale tissue modelling from 0-dimensional individual cell simulation, 1-dimensional fibre, 2-dimensional sheet and 3-dimensional slab of tissue, up to anatomically realistic whole heart simulations, with run time measurements including cardiac re-entry tip/filament tracing, ECG, local/global samples of any variables, etc. BeatBox solvers, cell, and tissue/anatomy models repositories are extended via robust and flexible interfaces, thus providing an open framework for new developments in the field. In this paper we give an overview of the BeatBox current state, together with a description of the main computational methods and MPI parallelisation approaches.
[ { "version": "v1", "created": "Thu, 19 May 2016 15:46:25 GMT" }, { "version": "v2", "created": "Mon, 14 Nov 2016 20:53:12 GMT" }, { "version": "v3", "created": "Sun, 12 Feb 2017 21:38:56 GMT" } ]
2017-09-26T00:00:00
[ [ "Antonioletti", "Mario", "" ], [ "Biktashev", "Vadim N.", "" ], [ "Jackson", "Adrian", "" ], [ "Kharche", "Sanjay R.", "" ], [ "Stary", "Tomas", "" ], [ "Biktasheva", "Irina V.", "" ] ]
new_dataset
0.994432