id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1701.00188
Yuan Zhang
Yuan Zhang, Regina Barzilay, Tommi Jaakkola
Aspect-augmented Adversarial Networks for Domain Adaptation
TACL
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a neural method for transfer learning between two (source and target) classification tasks or aspects over the same domain. Rather than training on target labels, we use a few keywords pertaining to source and target aspects indicating sentence relevance instead of document class labels. Documents are encoded by learning to embed and softly select relevant sentences in an aspect-dependent manner. A shared classifier is trained on the source encoded documents and labels, and applied to target encoded documents. We ensure transfer through aspect-adversarial training so that encoded documents are, as sets, aspect-invariant. Experimental results demonstrate that our approach outperforms different baselines and model variants on two datasets, yielding an improvement of 27% on a pathology dataset and 5% on a review dataset.
[ { "version": "v1", "created": "Sun, 1 Jan 2017 03:04:33 GMT" }, { "version": "v2", "created": "Mon, 25 Sep 2017 03:36:05 GMT" } ]
2017-09-26T00:00:00
[ [ "Zhang", "Yuan", "" ], [ "Barzilay", "Regina", "" ], [ "Jaakkola", "Tommi", "" ] ]
new_dataset
0.985479
1703.03821
Olalekan Ogunmolu
Olalekan Ogunmolu, Adwait Kulkarni, Yonas Tadesse, Xuejun Gu, Steve Jiang, and Nicholas Gans
Soft-NeuroAdapt: A 3-DOF Neuro-Adaptive Patient Pose Correction System For Frameless and Maskless Cancer Radiotherapy
This paper has been withdrawn due to some errors in the text
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
Precise patient positioning is fundamental to successful removal of malignant tumors during treatment of head and neck cancers. Errors in patient positioning have been known to damage critical organs and cause complications. To better address issues of patient positioning and motion, we introduce a 3-DOF neuro-adaptive soft-robot, called Soft-NeuroAdapt to correct deviations along 3 axes. The robot consists of inflatable air bladders that adaptively control head deviations from target while ensuring patient safety and comfort. The adaptive-neuro controller combines a state feedback component, a feedforward regulator, and a neural network that ensures correct adaptation. States are measured by a 3D vision system. We validate Soft-NeuroAdapt on a 3D printed head-and-neck dummy, and demonstrate that the controller provides adaptive actuation that compensates for intrafractional deviations in patient positioning.
[ { "version": "v1", "created": "Fri, 10 Mar 2017 19:13:49 GMT" }, { "version": "v2", "created": "Tue, 14 Mar 2017 04:51:49 GMT" }, { "version": "v3", "created": "Tue, 1 Aug 2017 18:24:27 GMT" }, { "version": "v4", "created": "Fri, 22 Sep 2017 20:24:50 GMT" } ]
2017-09-26T00:00:00
[ [ "Ogunmolu", "Olalekan", "" ], [ "Kulkarni", "Adwait", "" ], [ "Tadesse", "Yonas", "" ], [ "Gu", "Xuejun", "" ], [ "Jiang", "Steve", "" ], [ "Gans", "Nicholas", "" ] ]
new_dataset
0.999217
1705.06640
Kexin Pei
Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
To be published in SOSP'17
null
10.1145/3132747.3132785
null
cs.LG cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep learning (DL) systems are increasingly deployed in safety- and security-critical domains including self-driving cars and malware detection, where the correctness and predictability of a system's behavior for corner case inputs are of great importance. Existing DL testing depends heavily on manually labeled data and therefore often fails to expose erroneous behaviors for rare inputs. We design, implement, and evaluate DeepXplore, the first whitebox framework for systematically testing real-world DL systems. First, we introduce neuron coverage for systematically measuring the parts of a DL system exercised by test inputs. Next, we leverage multiple DL systems with similar functionality as cross-referencing oracles to avoid manual checking. Finally, we demonstrate how finding inputs for DL systems that both trigger many differential behaviors and achieve high neuron coverage can be represented as a joint optimization problem and solved efficiently using gradient-based search techniques. DeepXplore efficiently finds thousands of incorrect corner case behaviors (e.g., self-driving cars crashing into guard rails and malware masquerading as benign software) in state-of-the-art DL models with thousands of neurons trained on five popular datasets including ImageNet and Udacity self-driving challenge data. For all tested DL models, on average, DeepXplore generated one test input demonstrating incorrect behavior within one second while running only on a commodity laptop. We further show that the test inputs generated by DeepXplore can also be used to retrain the corresponding DL model to improve the model's accuracy by up to 3%.
[ { "version": "v1", "created": "Thu, 18 May 2017 15:09:39 GMT" }, { "version": "v2", "created": "Sun, 4 Jun 2017 23:40:43 GMT" }, { "version": "v3", "created": "Mon, 10 Jul 2017 17:05:40 GMT" }, { "version": "v4", "created": "Sun, 24 Sep 2017 15:55:11 GMT" } ]
2017-09-26T00:00:00
[ [ "Pei", "Kexin", "" ], [ "Cao", "Yinzhi", "" ], [ "Yang", "Junfeng", "" ], [ "Jana", "Suman", "" ] ]
new_dataset
0.985776
1706.10028
Zeyu Guo
Zeyu Guo
$\mathcal{P}$-schemes and Deterministic Polynomial Factoring over Finite Fields
PhD thesis
null
null
null
cs.CC cs.SC math.GR math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a family of mathematical objects called $\mathcal{P}$-schemes, where $\mathcal{P}$ is a poset of subgroups of a finite group $G$. A $\mathcal{P}$-scheme is a collection of partitions of the right coset spaces $H\backslash G$, indexed by $H\in\mathcal{P}$, that satisfies a list of axioms. These objects generalize the classical notion of association schemes as well as the notion of $m$-schemes (Ivanyos et al. 2009). Based on $\mathcal{P}$-schemes, we develop a unifying framework for the problem of deterministic factoring of univariate polynomials over finite fields under the generalized Riemann hypothesis (GRH).
[ { "version": "v1", "created": "Fri, 30 Jun 2017 05:42:59 GMT" }, { "version": "v2", "created": "Sat, 23 Sep 2017 09:44:03 GMT" } ]
2017-09-26T00:00:00
[ [ "Guo", "Zeyu", "" ] ]
new_dataset
0.995019
1709.02746
Sam Silvestro
Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu
FreeGuard: A Faster Secure Heap Allocator
15 pages, 4 figures, to be published at CCS'17
null
10.1145/3133956.3133957
null
cs.OS cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In spite of years of improvements to software security, heap-related attacks still remain a severe threat. One reason is that many existing memory allocators fall short in a variety of aspects. For instance, performance-oriented allocators are designed with very limited countermeasures against attacks, but secure allocators generally suffer from significant performance overhead, e.g., running up to 10x slower. This paper, therefore, introduces FreeGuard, a secure memory allocator that prevents or reduces a wide range of heap-related attacks, such as heap overflows, heap over-reads, use-after-frees, as well as double and invalid frees. FreeGuard has similar performance to the default Linux allocator, with less than 2% overhead on average, but provides significant improvement to security guarantees. FreeGuard also addresses multiple implementation issues of existing secure allocators, such as the issue of scalability. Experimental results demonstrate that FreeGuard is very effective in defending against a variety of heap-related attacks.
[ { "version": "v1", "created": "Fri, 8 Sep 2017 15:29:17 GMT" }, { "version": "v2", "created": "Mon, 25 Sep 2017 16:10:02 GMT" } ]
2017-09-26T00:00:00
[ [ "Silvestro", "Sam", "" ], [ "Liu", "Hongyu", "" ], [ "Crosser", "Corey", "" ], [ "Lin", "Zhiqiang", "" ], [ "Liu", "Tongping", "" ] ]
new_dataset
0.998656
1709.04901
EPTCS
Davide Ancona (DIBRIS, University of Genova), Francesco Dagnino (DIBRIS, University of Genova), Elena Zucca (DIBRIS, University of Genova)
Extending Coinductive Logic Programming with Co-Facts
In Proceedings CoALP-Ty'16, arXiv:1709.04199
EPTCS 258, 2017, pp. 1-18
10.4204/EPTCS.258.1
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a generalized logic programming paradigm where programs, consisting of facts and rules with the usual syntax, can be enriched by co-facts, which syntactically resemble facts but have a special meaning. As in coinductive logic programming, interpretations are subsets of the complete Herbrand basis, including infinite terms. However, the intended meaning (declarative semantics) of a program is a fixed point which is not necessarily the least, nor the greatest one, but is determined by co-facts. In this way, it is possible to express predicates on non well-founded structures, such as infinite lists and graphs, for which the coinductive interpretation would be not precise enough. Moreover, this paradigm nicely subsumes standard (inductive) and coinductive logic programming, since both can be expressed by a particular choice of co-facts, hence inductive and coinductive predicates can coexist in the same program. We illustrate the paradigm by examples, and provide declarative and operational semantics, proving the correctness of the latter. Finally, we describe a prototype meta-interpreter.
[ { "version": "v1", "created": "Thu, 14 Sep 2017 17:45:35 GMT" } ]
2017-09-26T00:00:00
[ [ "Ancona", "Davide", "", "DIBRIS, University of Genova" ], [ "Dagnino", "Francesco", "", "DIBRIS, University of Genova" ], [ "Zucca", "Elena", "", "DIBRIS, University of Genova" ] ]
new_dataset
0.999233
1709.07949
Suayb Arslan
Suayb S. Arslan
Asymptotically MDS Array BP-XOR Codes
8 pages, 4 figures, to be submitted
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Belief propagation or message passing on binary erasure channels (BEC) is a low complexity decoding algorithm that allows the recovery of message symbols based on bipartite graph prunning process. Recently, array XOR codes have attracted attention for storage systems due to their burst error recovery performance and easy arithmetic based on Exclusive OR (XOR)-only logic operations. Array BP-XOR codes are a subclass of array XOR codes that can be decoded using BP under BEC. Requiring the capability of BP-decodability in addition to Maximum Distance Separability (MDS) constraint on the code construction process is observed to put an upper bound on the maximum achievable code block length, which leads to the code construction process to become a harder problem. In this study, we introduce asymptotically MDS array BP-XOR codes that are alternative to exact MDS array BP-XOR codes to pave the way for easier code constructions while keeping the decoding complexity low with an asymptotically vanishing coding overhead. We finally provide and analyze a simple code construction method that is based on discrete geometry to fulfill the requirements of the class of asymptotically MDS array BP-XOR codes.
[ { "version": "v1", "created": "Fri, 22 Sep 2017 21:07:49 GMT" } ]
2017-09-26T00:00:00
[ [ "Arslan", "Suayb S.", "" ] ]
new_dataset
0.994752
1709.07983
Zhenyu Xiao
Zhenyu Xiao, Pengfei Xia, Xiang-Gen Xia
Full-Duplex Millimeter-Wave Communication
This paper explores the combination of full duplex communication and millimeter wave communication. (To appear in IEEE Wireless Communications)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The potential of doubling the spectrum efficiency of full-duplex (FD) transmission motivates us to investigate FD millimeter-wave (FD-mmWave) communication. To realize FD transmission in the mmWave band, we first introduce possible antenna configurations for FD-mmWave transmission. It is shown that, different from the cases in micro-wave band FD communications, the configuration with separate Tx/Rx antenna arrays appears more flexible in self-interference (SI) suppression while it may increase some cost and area versus that with the same array. We then model the mmWave SI channel with separate Tx/Rx arrays, where a near-field propagation model is adopted for the line-of-sight (LOS) path, and it is found that the established LOS-SI channel with separate Tx/Rx arrays also shows spatial sparsity. Based on the SI channel, we further explore approaches to mitigate SI by signal processing, and we focus on a new cancellation approach in FD-mmWave communication, i.e., beamforming cancellation. Centered on the constant-amplitude (CA) constraint of the beamforming vectors, we propose several candidate solutions. Lastly, we consider an FD-mmWave multi-user scenario, and show that even if there are no FD users in an FD-mmWave cellular system, the FD benefit can still be exploited in the FD base station. Candidate solutions are also discussed to mitigate both SI and multi-user interference (MUI) simultaneously.
[ { "version": "v1", "created": "Sat, 23 Sep 2017 01:27:11 GMT" } ]
2017-09-26T00:00:00
[ [ "Xiao", "Zhenyu", "" ], [ "Xia", "Pengfei", "" ], [ "Xia", "Xiang-Gen", "" ] ]
new_dataset
0.965952
1709.07989
Jianwei Zhao
Jianwei Zhao, Feifei Gao, Qihui Wu, Shi Jin, Yi Wu, Weimin Jia
Beam Tracking for UAV Mounted SatCom on-the-Move with Massive Antenna Array
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unmanned aerial vehicle (UAV)-satellite communication has drawn dramatic attention for its potential to build the integrated space-air-ground network and the seamless wide-area coverage. The key challenge to UAV-satellite communication is its unstable beam pointing due to the UAV navigation, which is a typical SatCom on-the-move scenario. In this paper, we propose a blind beam tracking approach for Ka-band UAVsatellite communication system, where UAV is equipped with a large-scale antenna array. The effects of UAV navigation are firstly released through the mechanical adjustment, which could approximately point the beam towards the target satellite through beam stabilization and dynamic isolation. Specially, the attitude information can be realtimely derived from data fusion of lowcost sensors. Then, the precision of the beam pointing is blindly refined through electrically adjusting the weight of the massive antennas, where an array structure based simultaneous perturbation algorithm is designed. Simulation results are provided to demonstrate the superiority of the proposed method over the existing ones.
[ { "version": "v1", "created": "Sat, 23 Sep 2017 02:24:08 GMT" } ]
2017-09-26T00:00:00
[ [ "Zhao", "Jianwei", "" ], [ "Gao", "Feifei", "" ], [ "Wu", "Qihui", "" ], [ "Jin", "Shi", "" ], [ "Wu", "Yi", "" ], [ "Jia", "Weimin", "" ] ]
new_dataset
0.995817
1709.08103
Unnat Jain
Unnat Jain, Vinay P. Namboodiri, Gaurav Pandey
Compact Environment-Invariant Codes for Robust Visual Place Recognition
Conference on Computer and Robot Vision (CRV) 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robust visual place recognition (VPR) requires scene representations that are invariant to various environmental challenges such as seasonal changes and variations due to ambient lighting conditions during day and night. Moreover, a practical VPR system necessitates compact representations of environmental features. To satisfy these requirements, in this paper we suggest a modification to the existing pipeline of VPR systems to incorporate supervised hashing. The modified system learns (in a supervised setting) compact binary codes from image feature descriptors. These binary codes imbibe robustness to the visual variations exposed to it during the training phase, thereby, making the system adaptive to severe environmental changes. Also, incorporating supervised hashing makes VPR computationally more efficient and easy to implement on simple hardware. This is because binary embeddings can be learned over simple-to-compute features and the distance computation is also in the low-dimensional hamming space of binary codes. We have performed experiments on several challenging data sets covering seasonal, illumination and viewpoint variations. We also compare two widely used supervised hashing methods of CCAITQ and MLH and show that this new pipeline out-performs or closely matches the state-of-the-art deep learning VPR methods that are based on high-dimensional features extracted from pre-trained deep convolutional neural networks.
[ { "version": "v1", "created": "Sat, 23 Sep 2017 19:08:47 GMT" } ]
2017-09-26T00:00:00
[ [ "Jain", "Unnat", "" ], [ "Namboodiri", "Vinay P.", "" ], [ "Pandey", "Gaurav", "" ] ]
new_dataset
0.999565
1709.08154
Xin Jie Tang Mr
Xin Jie Tang, Yong Haur Tay, Nordahlia Abdullah Siam, Seng Choon Lim
Rapid and Robust Automated Macroscopic Wood Identification System using Smartphone with Macro-lens
Accepted by PRWAC 2017
null
null
null
cs.CY cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wood Identification has never been more important to serve the purpose of global forest species protection and timber regulation. Macroscopic level wood identification practiced by wood anatomists can identify wood up to genus level. This is sufficient to serve as a frontline identification to fight against illegal wood logging and timber trade for law enforcement authority. However, frontline enforcement official may lack of the accuracy and confidence of a well trained wood anatomist. Hence, computer assisted method such as machine vision methods are developed to do rapid field identification for law enforcement official. In this paper, we proposed a rapid and robust macroscopic wood identification system using machine vision method with off-the-shelf smartphone and retrofitted macro-lens. Our system is cost effective, easily accessible, fast and scalable at the same time provides human-level accuracy on identification. Camera-enabled smartphone with Internet connectivity coupled with a macro-lens provides a simple and effective digital acquisition of macroscopic wood images which are essential for macroscopic wood identification. The images are immediately streamed to a cloud server via Internet connection for identification which are done within seconds.
[ { "version": "v1", "created": "Sun, 24 Sep 2017 06:10:52 GMT" } ]
2017-09-26T00:00:00
[ [ "Tang", "Xin Jie", "" ], [ "Tay", "Yong Haur", "" ], [ "Siam", "Nordahlia Abdullah", "" ], [ "Lim", "Seng Choon", "" ] ]
new_dataset
0.984865
1709.08172
Shuang Li
Shuang Li, Peter Mathews
Can Image Retrieval help Visual Saliency Detection?
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel image retrieval framework for visual saliency detection using information about salient objects contained within bounding box annotations for similar images. For each test image, we train a customized SVM from similar example images to predict the saliency values of its object proposals and generate an external saliency map (ES) by aggregating the regional scores. To overcome limitations caused by the size of the training dataset, we also propose an internal optimization module which computes an internal saliency map (IS) by measuring the low-level contrast information of the test image. The two maps, ES and IS, have complementary properties so we take a weighted combination to further improve the detection performance. Experimental results on several challenging datasets demonstrate that the proposed algorithm performs favorably against the state-of-the-art methods.
[ { "version": "v1", "created": "Sun, 24 Sep 2017 09:50:48 GMT" } ]
2017-09-26T00:00:00
[ [ "Li", "Shuang", "" ], [ "Mathews", "Peter", "" ] ]
new_dataset
0.994368
1709.08184
Alex James Dr
Timur Ibrayev, Ulan Myrzakhan, Olga Krestinskaya, Aidana Irmanova, Alex Pappachen James
On-chip Face Recognition System Design with Memristive Hierarchical Temporal Memory
Journal of Intelligent and Fuzzy Systems, 2018
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hierarchical Temporal Memory is a new machine learning algorithm intended to mimic the working principle of neocortex, part of the human brain, which is responsible for learning, classification, and making predictions. Although many works illustrate its effectiveness as a software algorithm, hardware design for HTM remains an open research problem. Hence, this work proposes an architecture for HTM Spatial Pooler and Temporal Memory with learning mechanism, which creates a single image for each class based on important and unimportant features of all images in the training set. In turn, the reduction in the number of templates within database reduces the memory requirements and increases the processing speed. Moreover, face recognition analysis indicates that for a large number of training images, the proposed design provides higher accuracy results (83.5\%) compared to only Spatial Pooler design presented in the previous works.
[ { "version": "v1", "created": "Sun, 24 Sep 2017 11:11:58 GMT" } ]
2017-09-26T00:00:00
[ [ "Ibrayev", "Timur", "" ], [ "Myrzakhan", "Ulan", "" ], [ "Krestinskaya", "Olga", "" ], [ "Irmanova", "Aidana", "" ], [ "James", "Alex Pappachen", "" ] ]
new_dataset
0.996452
1709.08216
Ankit Singh Rawat
Ankit Singh Rawat and Itzhak Tamo and Venkatesan Guruswami and Klim Efremenko
MDS Code Constructions with Small Sub-packetization and Near-optimal Repair Bandwidth
Significant overlap with arXiv:1608.00191
null
null
null
cs.IT cs.CC math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of constructing MDS codes that enable exact repair of each code block with small repair bandwidth, which refers to the total amount of information flow from the remaining code blocks during the repair process. This problem naturally arises in the context of distributed storage systems as the node repair problem [7]. The constructions of exact-repairable MDS codes with optimal repair-bandwidth require working with large sub-packetization levels, which restricts their employment in practice. This paper presents constructions for MDS codes that simultaneously provide both small repair bandwidth and small sub-packetization level. In particular, this paper presents two general approaches to construct exact-repairable MDS codes that aim at significantly reducing the required sub-packetization level at the cost of slightly sub-optimal repair bandwidth. The first approach gives MDS codes that have repair bandwidth at most twice the optimal repair-bandwidth. Additionally, these codes also have the smallest possible sub-packetization level $\ell = O(r)$, where $r$ denotes the number of parity blocks. This approach is then generalized to design codes that have their repair bandwidth approaching the optimal repair-bandwidth at the cost of graceful increment in the required sub-packetization level. The second approach transforms an MDS code with optimal repair-bandwidth and large sub-packetization level into a longer MDS code with small sub-packetization level and near-optimal repair bandwidth. For a given $r$, the obtained codes have their sub-packetization level scaling logarithmically with the code length. In addition, the obtained codes require field size only linear in the code length and ensure load balancing among the intact code blocks in terms of the information downloaded from these blocks during the exact reconstruction of a code block.
[ { "version": "v1", "created": "Sun, 24 Sep 2017 16:21:50 GMT" } ]
2017-09-26T00:00:00
[ [ "Rawat", "Ankit Singh", "" ], [ "Tamo", "Itzhak", "" ], [ "Guruswami", "Venkatesan", "" ], [ "Efremenko", "Klim", "" ] ]
new_dataset
0.959851
1709.08235
J\"org P. M\"uller
Fatema Tuj Johora and Philipp Kraus and J\"org P. M\"uller
Dynamic Path Planning and Movement Control in Pedestrian Simulation
This paper was accepted for the preproceedings of The 2nd International Workshop on Agent-based modelling of urban systems (ABMUS 2017), http://www.modelling-urban-systems.com/
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modeling and simulation of pedestrian behavior is used in applications such as planning large buildings, disaster management, or urban planning. Realistically simulating pedestrian behavior is challenging, due to the complexity of individual behavior as well as the complexity of interactions of pedestrians with each other and with the environment. This work-in-progress paper addresses the tactical (path planning) and the operational level (movement control) of pedestrian simulation from the perspective of multiagent-based modeling. We propose (1) an novel extension of the JPS routing algorithm for tactical planning, and (2) an architecture how path planning can be integrated with a social-force based movement control. The architecture is inspired by layered architectures for robot planning and control. We validate correctness and efficiency of our approach through simulation runs.
[ { "version": "v1", "created": "Sun, 24 Sep 2017 18:40:21 GMT" } ]
2017-09-26T00:00:00
[ [ "Johora", "Fatema Tuj", "" ], [ "Kraus", "Philipp", "" ], [ "Müller", "Jörg P.", "" ] ]
new_dataset
0.989604
1709.08317
Yanru Zhang
Yanru Zhang and Lingyang Song and Miao Pan and Zaher Dawy and Zhu Han
Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard
null
null
null
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential "buyers", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present.
[ { "version": "v1", "created": "Mon, 25 Sep 2017 04:43:21 GMT" } ]
2017-09-26T00:00:00
[ [ "Zhang", "Yanru", "" ], [ "Song", "Lingyang", "" ], [ "Pan", "Miao", "" ], [ "Dawy", "Zaher", "" ], [ "Han", "Zhu", "" ] ]
new_dataset
0.987615
1709.08377
Zhendong Mao
Di Chen, Zhongyuan Zhao, Zhendong Mao, and Mugen Peng
Channel Matrix Sparsity with Imperfect Channel State Information in Cloud-Radio Access Networks
12 pages, 9 figures, to be published in IEEE Transactions on Vehicular Technology
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel matrix sparsification is considered as a promising approach to reduce the progressing complexity in large-scale cloud-radio access networks (C-RANs) based on ideal channel condition assumption. In this paper, the research of channel sparsification is extend to practical scenarios, in which the perfect channel state information (CSI) is not available. First, a tractable lower bound of signal-to-interferenceplus-noise ratio (SINR) fidelity, which is defined as a ratio of SINRs with and without channel sparsification, is derived to evaluate the impact of channel estimation error. Based on the theoretical results, a Dinkelbach-based algorithm is proposed to achieve the global optimal performance of channel matrix sparsification based on the criterion of distance. Finally, all these results are extended to a more challenging scenario with pilot contamination. Finally, simulation results are shown to evaluate the performance of channel matrix sparsification with imperfect CSIs and verify our analytical results.
[ { "version": "v1", "created": "Mon, 25 Sep 2017 08:50:33 GMT" } ]
2017-09-26T00:00:00
[ [ "Chen", "Di", "" ], [ "Zhao", "Zhongyuan", "" ], [ "Mao", "Zhendong", "" ], [ "Peng", "Mugen", "" ] ]
new_dataset
0.99098
1709.08515
Daniel Morris
Daniel D. Morris, Brian Colonna, Paul Haley
LADAR-Based Mover Detection from Moving Vehicles
null
Proceedings of the 25th Army Science Conference, Nov 27-30, 2006
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detecting moving vehicles and people is crucial for safe operation of UGVs but is challenging in cluttered, real world environments. We propose a registration technique that enables objects to be robustly matched and tracked, and hence movers to be detected even in high clutter. Range data are acquired using a 2D scanning Ladar from a moving platform. These are automatically clustered into objects and modeled using a surface density function. A Bhattacharya similarity is optimized to register subsequent views of each object enabling good discrimination and tracking, and hence mover detection.
[ { "version": "v1", "created": "Mon, 25 Sep 2017 14:30:33 GMT" } ]
2017-09-26T00:00:00
[ [ "Morris", "Daniel D.", "" ], [ "Colonna", "Brian", "" ], [ "Haley", "Paul", "" ] ]
new_dataset
0.998957
1709.08517
Daniel Morris
Daniel Morris, Paul Haley, William Zachar, Steve McLean
LADAR-Based Vehicle Tracking and Trajectory Estimation for Urban Driving
Proceedings of Association for Unmanned Vehicle Systems International (AUVSI), San Diego, June 2008
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Safe mobility for unmanned ground vehicles requires reliable detection of other vehicles, along with precise estimates of their locations and trajectories. Here we describe the algorithms and system we have developed for accurate trajectory estimation of nearby vehicles using an onboard scanning LADAR. We introduce a variable-axis Ackerman steering model and compare this to an independent steering model. Then for robust tracking we propose a multi-hypothesis tracker that combines these kinematic models to leverage the strengths of each. When trajectories estimated with our techniques are input into a planner, they enable an unmanned vehicle to negotiate traffic in urban environments. Results have been evaluated running in real time on a moving vehicle with a scanning LADAR.
[ { "version": "v1", "created": "Mon, 25 Sep 2017 14:36:12 GMT" } ]
2017-09-26T00:00:00
[ [ "Morris", "Daniel", "" ], [ "Haley", "Paul", "" ], [ "Zachar", "William", "" ], [ "McLean", "Steve", "" ] ]
new_dataset
0.998829
1709.08540
Ning Li
Ning Li, Jose-Fernan Martinez-Ortega, Vicente Hernandez Diaz
Delay based Duplicate Transmission Avoid (DDA) Coordination Scheme for Opportunistic routing
13 pages, 10 figures, 18 formulas
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the packet is transmitted to a set of relaying nodes in opportunistic routing strategy, so the transmission delay and the duplication transmission are serious. For reducing the transmission delay and the duplicate transmission, in this paper, we propose the delay based duplication transmission avoid (DDA) coordination scheme for opportunistic routing. In this coordination scheme, the candidate relaying nodes are divided into different fully connected relaying networks, so the duplicate transmission is avoided. Moreover, we propose the relaying network recognition algorithm which can be used to judge whether the sub-network is fully connected or not. The properties of the relaying networks are investigated in detail in this paper. When the fully connected relaying networks are got, they will be the basic units in the next hop relaying network selection. In this paper, we prove that the packet delivery ratio of the high priority relaying nodes in the relaying network has greater effection on the relaying delay than that of the low priority relaying nodes. According to this conclusion, in DDA, the relaying networks which the packet delivery ratios of the high priority relaying nodes are high have higher priority than that of the low one. During the next hop relaying network selection, the transmission delay, the network utility, and the packet delivery ratio are taken into account. By these innovations, the DDA can improve the network performance greatly than that of ExOR and SOAR.
[ { "version": "v1", "created": "Mon, 25 Sep 2017 15:11:38 GMT" } ]
2017-09-26T00:00:00
[ [ "Li", "Ning", "" ], [ "Martinez-Ortega", "Jose-Fernan", "" ], [ "Diaz", "Vicente Hernandez", "" ] ]
new_dataset
0.969781
1709.08613
Amir Daneshgar
Amir Daneshgar and Fahimeh Mohebbipoor
A Secure Self-synchronized Stream Cipher
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We follow two main objectives in this article. On the one hand, we introduce a security model called LORBACPA$^+$ for self-synchronized stream ciphers which is stronger than the blockwise LOR-IND-CPA, where we show that standard constructions as delayed CBC or similar existing self-synchronized modes of operation are not secure in this stronger model. Then, on the other hand, following contributions of G.~Mill\'{e}rioux et.al., we introduce a new self-synchronized stream cipher and prove its security in LORBACPA$^+$ model.
[ { "version": "v1", "created": "Mon, 25 Sep 2017 17:47:43 GMT" } ]
2017-09-26T00:00:00
[ [ "Daneshgar", "Amir", "" ], [ "Mohebbipoor", "Fahimeh", "" ] ]
new_dataset
0.987982
0909.3356
Chi-Kin Chau
Chi-Kin Chau, Minghua Chen, Soung Chang Liew
Capacity of Large-scale CSMA Wireless Networks
Extended version of the paper presented at ACM MobiCom 09'. Improved Model for Aggregate Carrier-Sensing
IEEE/ACM Transactions on Networking, Vol. 19, No. 3, pp893-906 (Jun 2011)
10.1109/TNET.2010.2095880
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schemes. There have been fewer studies of the asymptotic capacity of large-scale wireless networks based on CSMA (carrier-sensing multi-access), which schedules transmissions in a distributed and random manner. With the rapid and widespread adoption of CSMA technology, a critical question is that whether CSMA networks can be as scalable as TDMA networks. To answer this question and explore the capacity of CSMA networks, we first formulate the models of CSMA protocols to take into account the unique CSMA characteristics not captured by existing interference models in the literature. These CSMA models determine the feasible states, and consequently the capacity of CSMA networks. We then study the throughput efficiency of CSMA scheduling as compared to TDMA. Finally, we tune the CSMA parameters so as to maximize the throughput to the optimal order. As a result, we show that CSMA can achieve throughput as $\Omega(\frac{1}{\sqrt{n}})$, the same order as optimal centralized TDMA, on uniform random networks. Our CSMA scheme makes use of an efficient backbone-peripheral routing scheme and a careful design of dual carrier-sensing and dual channel scheme. We also address the implementation issues of our CSMA scheme.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 05:22:30 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 01:16:46 GMT" }, { "version": "v3", "created": "Thu, 5 Nov 2009 10:32:03 GMT" }, { "version": "v4", "created": "Mon, 17 May 2010 11:22:39 GMT" } ]
2017-09-25T00:00:00
[ [ "Chau", "Chi-Kin", "" ], [ "Chen", "Minghua", "" ], [ "Liew", "Soung Chang", "" ] ]
new_dataset
0.979277
1708.05263
Lucas Bechberger
Lucas Bechberger
The Size of a Hyperball in a Conceptual Space
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The cognitive framework of conceptual spaces [3] provides geometric means for representing knowledge. A conceptual space is a high-dimensional space whose dimensions are partitioned into so-called domains. Within each domain, the Euclidean metric is used to compute distances. Distances in the overall space are computed by applying the Manhattan metric to the intra-domain distances. Instances are represented as points in this space and concepts are represented by regions. In this paper, we derive a formula for the size of a hyperball under the combined metric of a conceptual space. One can think of such a hyperball as the set of all points having a certain minimal similarity to the hyperball's center.
[ { "version": "v1", "created": "Tue, 4 Jul 2017 10:13:51 GMT" }, { "version": "v2", "created": "Tue, 5 Sep 2017 09:10:06 GMT" }, { "version": "v3", "created": "Mon, 18 Sep 2017 11:37:45 GMT" }, { "version": "v4", "created": "Fri, 22 Sep 2017 12:44:03 GMT" } ]
2017-09-25T00:00:00
[ [ "Bechberger", "Lucas", "" ] ]
new_dataset
0.996209
1709.07555
Pradipta Ghosh
Pradipta Ghosh, Jason A. Tran, Daniel Dsouza, Nora Ayanian, and Bhaskar Krishnamachari
ROMANO: A Novel Overlay Lightweight Communication Protocol for Unified Control and Sensing of a Network of Robots
null
null
null
null
cs.RO cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the Robotic Overlay coMmunicAtioN prOtocol (ROMANO), a lightweight, application layer overlay communication protocol for a unified sensing and control abstraction of a network of heterogeneous robots mainly consisting of low power, low-compute-capable robots. ROMANO is built to work in conjunction with the well-known MQ Telemetry Transport for Sensor Nodes (MQTT-SN) protocol, a lightweight publish-subscribe communication protocol for the Internet of Things and makes use its concept of "topics" to designate the addition and deletion of communication endpoints by changing the subscriptions of topics at each device. We also develop a portable implementation of ROMANO for low power IEEE 802.15.4 (Zigbee) radios and deployed it on a small testbed of commercially available, low-power, and low-compute-capable robots called Pololu 3pi robots. Based on a thorough analysis of the protocol on the real testbed, as a measure of throughput, we demonstrate that ROMANO can guarantee more than a $99.5\%$ message delivery ratio for a message generation rate up to 200 messages per second. The single hop delays in ROMANO are as low as 20ms with linear dependency on the number of robots connected. These delay numbers concur with typical delays in 802.15.4 networks and suggest that ROMANO does not introduce additional delays. Lastly, we implement four different multi-robot applications to demonstrate the scalability, adaptability, ease of integration, and reliability of ROMANO.
[ { "version": "v1", "created": "Fri, 22 Sep 2017 00:53:07 GMT" } ]
2017-09-25T00:00:00
[ [ "Ghosh", "Pradipta", "" ], [ "Tran", "Jason A.", "" ], [ "Dsouza", "Daniel", "" ], [ "Ayanian", "Nora", "" ], [ "Krishnamachari", "Bhaskar", "" ] ]
new_dataset
0.996263
1709.07598
Aparna Bharati
Aparna Bharati, Mayank Vatsa, Richa Singh, Kevin W. Bowyer and Xin Tong
Demography-based Facial Retouching Detection using Subclass Supervised Sparse Autoencoder
Accepted in International Joint Conference on Biometrics, 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Digital retouching of face images is becoming more widespread due to the introduction of software packages that automate the task. Several researchers have introduced algorithms to detect whether a face image is original or retouched. However, previous work on this topic has not considered whether or how accuracy of retouching detection varies with the demography of face images. In this paper, we introduce a new Multi-Demographic Retouched Faces (MDRF) dataset, which contains images belonging to two genders, male and female, and three ethnicities, Indian, Chinese, and Caucasian. Further, retouched images are created using two different retouching software packages. The second major contribution of this research is a novel semi-supervised autoencoder incorporating "subclass" information to improve classification. The proposed approach outperforms existing state-of-the-art detection algorithms for the task of generalized retouching detection. Experiments conducted with multiple combinations of ethnicities show that accuracy of retouching detection can vary greatly based on the demographics of the training and testing images.
[ { "version": "v1", "created": "Fri, 22 Sep 2017 05:13:48 GMT" } ]
2017-09-25T00:00:00
[ [ "Bharati", "Aparna", "" ], [ "Vatsa", "Mayank", "" ], [ "Singh", "Richa", "" ], [ "Bowyer", "Kevin W.", "" ], [ "Tong", "Xin", "" ] ]
new_dataset
0.999407
1709.07626
Jagmohan Chauhan
Jagmohan Chauhan, Suranga Seneviratne, Yining Hu, Archan Misra, Aruna Seneviratne, Youngki Lee
BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs
null
null
null
null
cs.CR cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recurrent neural networks (RNNs) have shown promising results in audio and speech processing applications due to their strong capabilities in modelling sequential data. In many applications, RNNs tend to outperform conventional models based on GMM/UBMs and i-vectors. Increasing popularity of IoT devices makes a strong case for implementing RNN based inferences for applications such as acoustics based authentication, voice commands, and edge analytics for smart homes. Nonetheless, the feasibility and performance of RNN based inferences on resources-constrained IoT devices remain largely unexplored. In this paper, we investigate the feasibility of using RNNs for an end-to-end authentication system based on breathing acoustics. We evaluate the performance of RNN models on three types of devices; smartphone, smartwatch, and Raspberry Pi and show that unlike CNN models, RNN models can be easily ported onto resource-constrained devices without a significant loss in accuracy.
[ { "version": "v1", "created": "Fri, 22 Sep 2017 08:06:38 GMT" } ]
2017-09-25T00:00:00
[ [ "Chauhan", "Jagmohan", "" ], [ "Seneviratne", "Suranga", "" ], [ "Hu", "Yining", "" ], [ "Misra", "Archan", "" ], [ "Seneviratne", "Aruna", "" ], [ "Lee", "Youngki", "" ] ]
new_dataset
0.992368
1709.07641
Qing Hai Liao
Zhe Wang, Yang Liu, Qinghai Liao, Haoyang Ye, Ming Liu and Lujia Wang
Characterization of a RS-LiDAR for 3D Perception
For ICRA2018
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High precision 3D LiDARs are still expensive and hard to acquire. This paper presents the characteristics of RS-LiDAR, a model of low-cost LiDAR with sufficient supplies, in comparison with VLP-16. The paper also provides a set of evaluations to analyze the characterizations and performances of LiDARs sensors. This work analyzes multiple properties, such as drift effects, distance effects, color effects and sensor orientation effects, in the context of 3D perception. By comparing with Velodyne LiDAR, we found RS-LiDAR as a cheaper and acquirable substitute of VLP-16 with similar efficiency.
[ { "version": "v1", "created": "Fri, 22 Sep 2017 09:01:29 GMT" } ]
2017-09-25T00:00:00
[ [ "Wang", "Zhe", "" ], [ "Liu", "Yang", "" ], [ "Liao", "Qinghai", "" ], [ "Ye", "Haoyang", "" ], [ "Liu", "Ming", "" ], [ "Wang", "Lujia", "" ] ]
new_dataset
0.999
1709.07860
Christoph Studer
Oscar Casta\~neda, Tom Goldstein, Christoph Studer
VLSI Designs for Joint Channel Estimation and Data Detection in Large SIMO Wireless Systems
To appear in the IEEE Transactions on Circuits and Systems-I: Regular Papers
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel estimation errors have a critical impact on the reliability of wireless communication systems. While virtually all existing wireless receivers separate channel estimation from data detection, it is well known that joint channel estimation and data detection (JED) significantly outperforms conventional methods at the cost of high computational complexity. In this paper, we propose a novel JED algorithm and corresponding VLSI designs for large single-input multiple-output (SIMO) wireless systems that use constant-modulus constellations. The proposed algorithm is referred to as PRojection Onto conveX hull (PrOX) and relies on biconvex relaxation (BCR), which enables us to efficiently compute an approximate solution of the maximum-likelihood JED problem. Since BCR solves a biconvex problem via alternating optimization, we provide a theoretical convergence analysis for PrOX. We design a scalable, high-throughput VLSI architecture that uses a linear array of processing elements to minimize hardware complexity. We develop corresponding field-programmable gate array (FPGA) and application-specific integrated circuit (ASIC) designs, and we demonstrate that PrOX significantly outperforms the only other existing JED design in terms of throughput, hardware-efficiency, and energy-efficiency.
[ { "version": "v1", "created": "Fri, 22 Sep 2017 17:27:17 GMT" } ]
2017-09-25T00:00:00
[ [ "Castañeda", "Oscar", "" ], [ "Goldstein", "Tom", "" ], [ "Studer", "Christoph", "" ] ]
new_dataset
0.998769
1611.10076
Shweta Bhandari
Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti
Android Inter-App Communication Threats and Detection Techniques
83 pages, 4 figures, This is a survey paper
computers & security 70 (2017) 392-421
10.1016/j.cose.2017.07.002
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the digital breakthrough, smart phones have become very essential component. Mobile devices are very attractive attack surface for cyber thieves as they hold personal details (accounts, locations, contacts, photos) and have potential capabilities for eavesdropping (with cameras/microphone, wireless connections). Android, being the most popular, is the target of malicious hackers who are trying to use Android app as a tool to break into and control device. Android malware authors use many anti-analysis techniques to hide from analysis tools. Academic researchers and commercial anti-malware companies are putting great effort to detect such malicious apps. They are making use of the combinations of static, dynamic and behavior based analysis techniques. Despite of all the security mechanisms provided by Android, apps can carry out malicious actions through collusion. In collusion malicious functionality is divided across multiple apps. Each participating app accomplish its part and communicate information to another app through Inter Component Communication (ICC). ICC do not require any special permissions. Also, there is no compulsion to inform user about the communication. Each participating app needs to request a minimal set of privileges, which may make it appear benign to current state-of-the-art techniques that analyze one app at a time. There are many surveys on app analysis techniques in Android; however they focus on single-app analysis. This survey augments this through focusing only on collusion among multiple-apps. In this paper, we present Android vulnerabilities that may be exploited for a possible collusion attack. We cover the existing threat analysis, scenarios, and a detailed comparison of tools for intra and inter-app analysis. To the best of our knowledge this is the first survey on app collusion and state-of-the-art detection tools in Android.
[ { "version": "v1", "created": "Wed, 30 Nov 2016 10:13:50 GMT" }, { "version": "v2", "created": "Thu, 21 Sep 2017 12:31:24 GMT" } ]
2017-09-22T00:00:00
[ [ "Bhandari", "Shweta", "" ], [ "Jaballah", "Wafa Ben", "" ], [ "Jain", "Vineeta", "" ], [ "Laxmi", "Vijay", "" ], [ "Zemmari", "Akka", "" ], [ "Gaur", "Manoj Singh", "" ], [ "Mosbah", "Mohamed", "" ], [ "Conti", "Mauro", "" ] ]
new_dataset
0.999285
1709.03456
Jawad Tayyub
Jawad Tayyub, Majd Hawasly, David C. Hogg and Anthony G. Cohn
CLAD: A Complex and Long Activities Dataset with Rich Crowdsourced Annotations
null
null
10.5518/249
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a novel activity dataset which exhibits real-life and diverse scenarios of complex, temporally-extended human activities and actions. The dataset presents a set of videos of actors performing everyday activities in a natural and unscripted manner. The dataset was recorded using a static Kinect 2 sensor which is commonly used on many robotic platforms. The dataset comprises of RGB-D images, point cloud data, automatically generated skeleton tracks in addition to crowdsourced annotations. Furthermore, we also describe the methodology used to acquire annotations through crowdsourcing. Finally some activity recognition benchmarks are presented using current state-of-the-art techniques. We believe that this dataset is particularly suitable as a testbed for activity recognition research but it can also be applicable for other common tasks in robotics/computer vision research such as object detection and human skeleton tracking.
[ { "version": "v1", "created": "Mon, 11 Sep 2017 16:01:17 GMT" }, { "version": "v2", "created": "Thu, 21 Sep 2017 16:52:04 GMT" } ]
2017-09-22T00:00:00
[ [ "Tayyub", "Jawad", "" ], [ "Hawasly", "Majd", "" ], [ "Hogg", "David C.", "" ], [ "Cohn", "Anthony G.", "" ] ]
new_dataset
0.999529
1709.07020
Matteo Cantiello Dr.
Alberto Pepe, Matteo Cantiello, Josh Nicholson
The arXiv of the future will not look like the arXiv
The authors of this document welcome public comments and ideas from its readers, at the online version of this article (https://www.authorea.com/173764)
null
null
null
cs.DL astro-ph.SR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The arXiv is the most popular preprint repository in the world. Since its inception in 1991, the arXiv has allowed researchers to freely share publication-ready articles prior to formal peer review. The growth and the popularity of the arXiv emerged as a result of new technologies that made document creation and dissemination easy, and cultural practices where collaboration and data sharing were dominant. The arXiv represents a unique place in the history of research communication and the Web itself, however it has arguably changed very little since its creation. Here we look at the strengths and weaknesses of arXiv in an effort to identify what possible improvements can be made based on new technologies not previously available. Based on this, we argue that a modern arXiv might in fact not look at all like the arXiv of today.
[ { "version": "v1", "created": "Wed, 20 Sep 2017 18:12:05 GMT" } ]
2017-09-22T00:00:00
[ [ "Pepe", "Alberto", "" ], [ "Cantiello", "Matteo", "" ], [ "Nicholson", "Josh", "" ] ]
new_dataset
0.997986
1709.07051
Yang Li
Yang Li, John Klingner, and Nikolaus Correll
Distributed Camouflage for Swarm Robotics and Smart Materials
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a distributed algorithm for a swarm of active particles to camouflage in an environment. Each particle is equipped with sensing, computation and communication, allowing the system to take color and gradient information from the environment and self-organize into an appropriate pattern. Current artificial camouflage systems are either limited to static patterns, which are adapted for specific environments, or rely on back-projection, which depend on the viewer's point of view. Inspired by the camouflage abilities of the cuttlefish, we propose a distributed estimation and pattern formation algorithm that allows to quickly adapt to different environments. We present convergence results both in simulation as well as on a swarm of miniature robots "Droplets" for a variety of patterns.
[ { "version": "v1", "created": "Wed, 20 Sep 2017 19:58:34 GMT" } ]
2017-09-22T00:00:00
[ [ "Li", "Yang", "" ], [ "Klingner", "John", "" ], [ "Correll", "Nikolaus", "" ] ]
new_dataset
0.999375
1709.07221
Alp Bassa
Alp Bassa, Henning Stichtenoth
Self-Dual Codes better than the Gilbert--Varshamov bound
null
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that every self-orthogonal code over $\mathbb F_q$ of length $n$ can be extended to a self-dual code, if there exists self-dual codes of length $n$. Using a family of Galois towers of algebraic function fields we show that over any nonprime field $\mathbb F_q$, with $q\geq 64$, except possibly $q=125$, there are self-dual codes better than the asymptotic Gilbert--Varshamov bound.
[ { "version": "v1", "created": "Thu, 21 Sep 2017 09:15:44 GMT" } ]
2017-09-22T00:00:00
[ [ "Bassa", "Alp", "" ], [ "Stichtenoth", "Henning", "" ] ]
new_dataset
0.995374
1709.07276
Ahmed Ali
Ahmed Ali, Stephan Vogel, Steve Renals
Speech Recognition Challenge in the Wild: Arabic MGB-3
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the Arabic MGB-3 Challenge - Arabic Speech Recognition in the Wild. Unlike last year's Arabic MGB-2 Challenge, for which the recognition task was based on more than 1,200 hours broadcast TV news recordings from Aljazeera Arabic TV programs, MGB-3 emphasises dialectal Arabic using a multi-genre collection of Egyptian YouTube videos. Seven genres were used for the data collection: comedy, cooking, family/kids, fashion, drama, sports, and science (TEDx). A total of 16 hours of videos, split evenly across the different genres, were divided into adaptation, development and evaluation data sets. The Arabic MGB-Challenge comprised two tasks: A) Speech transcription, evaluated on the MGB-3 test set, along with the 10 hour MGB-2 test set to report progress on the MGB-2 evaluation; B) Arabic dialect identification, introduced this year in order to distinguish between four major Arabic dialects - Egyptian, Levantine, North African, Gulf, as well as Modern Standard Arabic. Two hours of audio per dialect were released for development and a further two hours were used for evaluation. For dialect identification, both lexical features and i-vector bottleneck features were shared with participants in addition to the raw audio recordings. Overall, thirteen teams submitted ten systems to the challenge. We outline the approaches adopted in each system, and summarise the evaluation results.
[ { "version": "v1", "created": "Thu, 21 Sep 2017 12:10:43 GMT" } ]
2017-09-22T00:00:00
[ [ "Ali", "Ahmed", "" ], [ "Vogel", "Stephan", "" ], [ "Renals", "Steve", "" ] ]
new_dataset
0.999419
1709.07322
Stephan R Richter
Stephan R. Richter and Zeeshan Hayder and Vladlen Koltun
Playing for Benchmarks
Published at the International Conference on Computer Vision (ICCV 2017)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a benchmark suite for visual perception. The benchmark is based on more than 250K high-resolution video frames, all annotated with ground-truth data for both low-level and high-level vision tasks, including optical flow, semantic instance segmentation, object detection and tracking, object-level 3D scene layout, and visual odometry. Ground-truth data for all tasks is available for every frame. The data was collected while driving, riding, and walking a total of 184 kilometers in diverse ambient conditions in a realistic virtual world. To create the benchmark, we have developed a new approach to collecting ground-truth data from simulated worlds without access to their source code or content. We conduct statistical analyses that show that the composition of the scenes in the benchmark closely matches the composition of corresponding physical environments. The realism of the collected data is further validated via perceptual experiments. We analyze the performance of state-of-the-art methods for multiple tasks, providing reference baselines and highlighting challenges for future research. The supplementary video can be viewed at https://youtu.be/T9OybWv923Y
[ { "version": "v1", "created": "Thu, 21 Sep 2017 13:44:47 GMT" } ]
2017-09-22T00:00:00
[ [ "Richter", "Stephan R.", "" ], [ "Hayder", "Zeeshan", "" ], [ "Koltun", "Vladlen", "" ] ]
new_dataset
0.999834
1604.04384
Nick Hawes
Nick Hawes, Chris Burbridge, Ferdian Jovan, Lars Kunze, Bruno Lacerda, Lenka Mudrov\'a, Jay Young, Jeremy Wyatt, Denise Hebesberger, Tobias K\"ortner, Rares Ambrus, Nils Bore, John Folkesson, Patric Jensfelt, Lucas Beyer, Alexander Hermans, Bastian Leibe, Aitor Aldoma, Thomas F\"aulhammer, Michael Zillich, Markus Vincze, Eris Chinellato, Muhannad Al-Omari, Paul Duckworth, Yiannis Gatsoulis, David C. Hogg, Anthony G. Cohn, Christian Dondrup, Jaime Pulido Fentanes, Tomas Krajn\'ik, Jo\~ao M. Santos, Tom Duckett, Marc Hanheide
The STRANDS Project: Long-Term Autonomy in Everyday Environments
null
null
10.1109/MRA.2016.2636359
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Thanks to the efforts of the robotics and autonomous systems community, robots are becoming ever more capable. There is also an increasing demand from end-users for autonomous service robots that can operate in real environments for extended periods. In the STRANDS project we are tackling this demand head-on by integrating state-of-the-art artificial intelligence and robotics research into mobile service robots, and deploying these systems for long-term installations in security and care environments. Over four deployments, our robots have been operational for a combined duration of 104 days autonomously performing end-user defined tasks, covering 116km in the process. In this article we describe the approach we have used to enable long-term autonomous operation in everyday environments, and how our robots are able to use their long run times to improve their own performance.
[ { "version": "v1", "created": "Fri, 15 Apr 2016 07:35:32 GMT" }, { "version": "v2", "created": "Fri, 14 Oct 2016 08:13:52 GMT" } ]
2017-09-21T00:00:00
[ [ "Hawes", "Nick", "" ], [ "Burbridge", "Chris", "" ], [ "Jovan", "Ferdian", "" ], [ "Kunze", "Lars", "" ], [ "Lacerda", "Bruno", "" ], [ "Mudrová", "Lenka", "" ], [ "Young", "Jay", "" ], [ "Wyatt", "Jeremy", "" ], [ "Hebesberger", "Denise", "" ], [ "Körtner", "Tobias", "" ], [ "Ambrus", "Rares", "" ], [ "Bore", "Nils", "" ], [ "Folkesson", "John", "" ], [ "Jensfelt", "Patric", "" ], [ "Beyer", "Lucas", "" ], [ "Hermans", "Alexander", "" ], [ "Leibe", "Bastian", "" ], [ "Aldoma", "Aitor", "" ], [ "Fäulhammer", "Thomas", "" ], [ "Zillich", "Michael", "" ], [ "Vincze", "Markus", "" ], [ "Chinellato", "Eris", "" ], [ "Al-Omari", "Muhannad", "" ], [ "Duckworth", "Paul", "" ], [ "Gatsoulis", "Yiannis", "" ], [ "Hogg", "David C.", "" ], [ "Cohn", "Anthony G.", "" ], [ "Dondrup", "Christian", "" ], [ "Fentanes", "Jaime Pulido", "" ], [ "Krajník", "Tomas", "" ], [ "Santos", "João M.", "" ], [ "Duckett", "Tom", "" ], [ "Hanheide", "Marc", "" ] ]
new_dataset
0.962223
1607.01039
Yi Lu
Yi Lu
Practical Tera-scale Walsh-Hadamard Transform
to appear in proceedings of Future Technologies Conference - FTC 2016, San Francisco, 6 - 7 Dec, IEEE
null
10.1109/FTC.2016.7821757
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the mid-second decade of new millennium, the development of IT has reached unprecedented new heights. As one derivative of Moore's law, the operating system evolves from the initial 16 bits, 32 bits, to the ultimate 64 bits. Most modern computing platforms are in transition to the 64-bit versions. For upcoming decades, IT industry will inevitably favor software and systems, which can efficiently utilize the new 64-bit hardware resources. In particular, with the advent of massive data outputs regularly, memory-efficient software and systems would be leading the future. In this paper, we aim at studying practical Walsh-Hadamard Transform (WHT). WHT is popular in a variety of applications in image and video coding, speech processing, data compression, digital logic design, communications, just to name a few. The power and simplicity of WHT has stimulated research efforts and interests in (noisy) sparse WHT within interdisciplinary areas including (but is not limited to) signal processing, cryptography. Loosely speaking, sparse WHT refers to the case that the number of nonzero Walsh coefficients is much smaller than the dimension; the noisy version of sparse WHT refers to the case that the number of large Walsh coefficients is much smaller than the dimension while there exists a large number of small nonzero Walsh coefficients. Clearly, general Walsh-Hadamard Transform is a first solution to the noisy sparse WHT, which can obtain all Walsh coefficients larger than a given threshold and the index positions. In this work, we study efficient implementations of very large dimensional general WHT. Our work is believed to shed light on noisy sparse WHT, which remains to be a big open challenge. Meanwhile, the main idea behind will help to study parallel data-intensive computing, which has a broad range of applications.
[ { "version": "v1", "created": "Tue, 28 Jun 2016 15:07:56 GMT" }, { "version": "v2", "created": "Sat, 24 Dec 2016 20:46:12 GMT" } ]
2017-09-21T00:00:00
[ [ "Lu", "Yi", "" ] ]
new_dataset
0.997121
1705.00764
Muhammad Bilal
Muhammad Bilal and Shin-Gak Kang
An Authentication Protocol for Future Sensor Networks
This article is accepted for the publication in "Sensors" journal. 29 pages, 15 figures
Sensors 2017, 17(5), 979
10.3390/s17050979
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.
[ { "version": "v1", "created": "Tue, 2 May 2017 02:11:00 GMT" } ]
2017-09-21T00:00:00
[ [ "Bilal", "Muhammad", "" ], [ "Kang", "Shin-Gak", "" ] ]
new_dataset
0.983045
1706.00115
Hiroki Sayama
Hiroki Sayama, Catherine Cramer, Lori Sheetz, Stephen Uzzo
NetSciEd: Network Science and Education for the Interconnected World
15 pages, 4 figures, 3 tables
Complicity: An International Journal of Complexity and Education, 14 (2), 104-115, 2017
null
null
cs.CY physics.ed-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short article presents a summary of the NetSciEd (Network Science and Education) initiative that aims to address the need for curricula, resources, accessible materials, and tools for introducing K-12 students and the general public to the concept of networks, a crucial framework in understanding complexity. NetSciEd activities include (1) the NetSci High educational outreach program (since 2010), which connects high school students and their teachers with regional university research labs and provides them with the opportunity to work on network science research projects; (2) the NetSciEd symposium series (since 2012), which brings network science researchers and educators together to discuss how network science can help and be integrated into formal and informal education; and (3) the Network Literacy: Essential Concepts and Core Ideas booklet (since 2014), which was created collaboratively and subsequently translated into 18 languages by an extensive group of network science researchers and educators worldwide.
[ { "version": "v1", "created": "Wed, 31 May 2017 22:30:24 GMT" }, { "version": "v2", "created": "Wed, 5 Jul 2017 22:47:19 GMT" } ]
2017-09-21T00:00:00
[ [ "Sayama", "Hiroki", "" ], [ "Cramer", "Catherine", "" ], [ "Sheetz", "Lori", "" ], [ "Uzzo", "Stephen", "" ] ]
new_dataset
0.980792
1709.06650
Jake Wellens
Hyo Won Kim, Chris Maldonado and Jake Wellens
On Graphs and the Gotsman-Linial Conjecture for d = 2
15 pages
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an infinite class of counterexamples to the Gotsman-Linial conjecture when d = 2. On the other hand, we establish an asymptotic form of the conjecture for quadratic threshold functions whose non-zero quadratic terms define a graph with either low fractional chromatic number or few edges. Our techniques are elementary and our exposition is self-contained, if you're into that.
[ { "version": "v1", "created": "Tue, 19 Sep 2017 21:30:56 GMT" } ]
2017-09-21T00:00:00
[ [ "Kim", "Hyo Won", "" ], [ "Maldonado", "Chris", "" ], [ "Wellens", "Jake", "" ] ]
new_dataset
0.996508
1709.06723
Mohamed Hassan
Mohamed S. Hassan, Bruno Ribeiro, Walid G. Aref
SBG-Sketch: A Self-Balanced Sketch for Labeled-Graph Stream Summarization
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Applications in various domains rely on processing graph streams, e.g., communication logs of a cloud-troubleshooting system, road-network traffic updates, and interactions on a social network. A labeled-graph stream refers to a sequence of streamed edges that form a labeled graph. Label-aware applications need to filter the graph stream before performing a graph operation. Due to the large volume and high velocity of these streams, it is often more practical to incrementally build a lossy-compressed version of the graph, and use this lossy version to approximately evaluate graph queries. Challenges arise when the queries are unknown in advance but are associated with filtering predicates based on edge labels. Surprisingly common, and especially challenging, are labeled-graph streams that have highly skewed label distributions that might also vary over time. This paper introduces Self-Balanced Graph Sketch (SBG-Sketch, for short), a graphical sketch for summarizing and querying labeled-graph streams that can cope with all these challenges. SBG-Sketch maintains synopsis for both the edge attributes (e.g., edge weight) as well as the topology of the streamed graph. SBG-Sketch allows efficient processing of graph-traversal queries, e.g., reachability queries. Experimental results over a variety of real graph streams show SBG-Sketch to reduce the estimation errors of state-of-the-art methods by up to 99%.
[ { "version": "v1", "created": "Wed, 20 Sep 2017 04:37:02 GMT" } ]
2017-09-21T00:00:00
[ [ "Hassan", "Mohamed S.", "" ], [ "Ribeiro", "Bruno", "" ], [ "Aref", "Walid G.", "" ] ]
new_dataset
0.98816
1709.06871
Chris Bleakley
Philip J. Corr, Guenole C. Silvestre and Chris J. Bleakley
Open Source Dataset and Deep Learning Models for Online Digit Gesture Recognition on Touchscreens
Irish Machine Vision and Image Processing Conference (IMVIP) 2017, Maynooth, Ireland, 30 August-1 September 2017
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an evaluation of deep neural networks for recognition of digits entered by users on a smartphone touchscreen. A new large dataset of Arabic numerals was collected for training and evaluation of the network. The dataset consists of spatial and temporal touch data recorded for 80 digits entered by 260 users. Two neural network models were investigated. The first model was a 2D convolutional neural (ConvNet) network applied to bitmaps of the glpyhs created by interpolation of the sensed screen touches and its topology is similar to that of previously published models for offline handwriting recognition from scanned images. The second model used a 1D ConvNet architecture but was applied to the sequence of polar vectors connecting the touch points. The models were found to provide accuracies of 98.50% and 95.86%, respectively. The second model was much simpler, providing a reduction in the number of parameters from 1,663,370 to 287,690. The dataset has been made available to the community as an open source resource.
[ { "version": "v1", "created": "Wed, 20 Sep 2017 14:02:55 GMT" } ]
2017-09-21T00:00:00
[ [ "Corr", "Philip J.", "" ], [ "Silvestre", "Guenole C.", "" ], [ "Bleakley", "Chris J.", "" ] ]
new_dataset
0.998304
1709.06908
Chao Zhao
Chao Zhao, Jingchi Jiang, Yi Guan
EMR-based medical knowledge representation and inference via Markov random fields and distributed representation learning
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Objective: Electronic medical records (EMRs) contain an amount of medical knowledge which can be used for clinical decision support (CDS). Our objective is a general system that can extract and represent these knowledge contained in EMRs to support three CDS tasks: test recommendation, initial diagnosis, and treatment plan recommendation, with the given condition of one patient. Methods: We extracted four kinds of medical entities from records and constructed an EMR-based medical knowledge network (EMKN), in which nodes are entities and edges reflect their co-occurrence in a single record. Three bipartite subgraphs (bi-graphs) were extracted from the EMKN to support each task. One part of the bi-graph was the given condition (e.g., symptoms), and the other was the condition to be inferred (e.g., diseases). Each bi-graph was regarded as a Markov random field to support the inference. Three lazy energy functions and one parameter-based energy function were proposed, as well as two knowledge representation learning-based energy functions, which can provide a distributed representation of medical entities. Three measures were utilized for performance evaluation. Results: On the initial diagnosis task, 80.11% of the test records identified at least one correct disease from top 10 candidates. Test and treatment recommendation results were 87.88% and 92.55%, respectively. These results altogether indicate that the proposed system outperformed the baseline methods. The distributed representation of medical entities does reflect similarity relationships in regards to knowledge level. Conclusion: Combining EMKN and MRF is an effective approach for general medical knowledge representation and inference. Different tasks, however, require designing their energy functions individually.
[ { "version": "v1", "created": "Wed, 20 Sep 2017 14:45:21 GMT" } ]
2017-09-21T00:00:00
[ [ "Zhao", "Chao", "" ], [ "Jiang", "Jingchi", "" ], [ "Guan", "Yi", "" ] ]
new_dataset
0.987219
1709.06921
Alysson Bessani
Jo\~ao Sousa, Alysson Bessani and Marko Vukoli\'c
A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform
null
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hyperledger Fabric (HLF) is a flexible permissioned blockchain platform designed for business applications beyond the basic digital coin addressed by Bitcoin and other existing networks. A key property of HLF is its extensibility, and in particular the support for multiple ordering services for building the blockchain. Nonetheless, the version 1.0 was launched in early 2017 without an implementation of a Byzantine fault-tolerant (BFT) ordering service. To overcome this limitation, we designed, implemented, and evaluated a BFT ordering service for HLF on top of the BFT-SMaRt state machine replication/consensus library, implementing also optimizations for wide-area deployment. Our results show that HLF with our ordering service can achieve up to ten thousand transactions per second and write a transaction irrevocably in the blockchain in half a second, even with peers spread in different continents.
[ { "version": "v1", "created": "Wed, 20 Sep 2017 15:10:45 GMT" } ]
2017-09-21T00:00:00
[ [ "Sousa", "João", "" ], [ "Bessani", "Alysson", "" ], [ "Vukolić", "Marko", "" ] ]
new_dataset
0.998917
1709.06926
Qing Liang
Qing Liang and Ming Liu
Plugo: a VLC Systematic Perspective of Large-scale Indoor Localization
11 pages submitted to TMECH
null
null
8934
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Indoor localization based on Visible Light Communication (VLC) has been in favor with both the academia and industry for years. In this paper, we present a prototyping photodiode-based VLC system towards large-scale localization. Specially, we give in-depth analysis of the design constraints and considerations for large-scale indoor localization research. After that we identify the key enablers for such systems: 1) distributed architecture, 2) one-way communication, and 3) random multiple access. Accordingly, we propose Plugo -- a photodiode-based VLC system conforming to the aforementioned criteria. We present a compact design of the VLC-compatible LED bulbs featuring plug-and-go use-cases. The basic framed slotted Additive Links On-line Hawaii Area (ALOHA) is exploited to achieve random multiple access over the shared optical medium. We show its effectiveness in beacon broadcasting by experiments, and further demonstrate its scalability to large-scale scenarios through simulations. Finally, preliminary localization experiments are conducted using fingerprinting-based methods in a customized testbed, achieving an average accuracy of 0.14 m along with a 90-percentile accuracy of 0.33 m.
[ { "version": "v1", "created": "Tue, 15 Aug 2017 09:29:05 GMT" } ]
2017-09-21T00:00:00
[ [ "Liang", "Qing", "" ], [ "Liu", "Ming", "" ] ]
new_dataset
0.991489
1605.01004
Antonis Achilleos
Antonis Achilleos
The Completeness Problem for Modal Logic
null
null
10.13140/RG.2.1.2373.6727
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the completeness problem for Modal Logic and examine its complexity. For a definition of completeness for formulas, given a formula of a modal logic, the completeness problem asks whether the formula is complete for that logic. We discover that completeness and validity have the same complexity --- with certain exceptions for which there are, in general, no complete formulas. To prove upper bounds, we present a non-deterministic polynomial-time procedure with an oracle from PSPACE that combines tableaux and a test for bisimulation, and determines whether a formula is complete.
[ { "version": "v1", "created": "Tue, 3 May 2016 18:10:15 GMT" }, { "version": "v2", "created": "Tue, 19 Sep 2017 14:59:07 GMT" } ]
2017-09-20T00:00:00
[ [ "Achilleos", "Antonis", "" ] ]
new_dataset
0.998374
1608.05564
Kai Herrmann
Kai Herrmann, Hannes Voigt, Andreas Behrend, Jonas Rausch, Wolfgang Lehner
Living in Parallel Realities -- Co-Existing Schema Versions with a Bidirectional Database Evolution Language
null
null
10.1145/3035918.3064046
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce end-to-end support of co-existing schema versions within one database. While it is state of the art to run multiple versions of a continuously developed application concurrently, it is hard to do the same for databases. In order to keep multiple co-existing schema versions alive; which are all accessing the same data set; developers usually employ handwritten delta code (e.g. views and triggers in SQL). This delta code is hard to write and hard to maintain: if a database administrator decides to adapt the physical table schema, all handwritten delta code needs to be adapted as well, which is expensive and error-prone in practice. In this paper, we present InVerDa: developers use the simple bidirectional database evolution language BiDEL, which carries enough information to generate all delta code automatically. Without additional effort, new schema versions become immediately accessible and data changes in any version are visible in all schema versions at the same time. InVerDa also allows for easily changing the physical table design without affecting the availability of co-existing schema versions. This greatly increases robustness (orders of magnitude less lines of code) and allows for significant performance optimization. A main contribution is the formal evaluation that each schema version acts like a common full-fledged database schema independently of the chosen physical table design.
[ { "version": "v1", "created": "Fri, 19 Aug 2016 10:44:42 GMT" }, { "version": "v2", "created": "Tue, 19 Sep 2017 12:06:13 GMT" } ]
2017-09-20T00:00:00
[ [ "Herrmann", "Kai", "" ], [ "Voigt", "Hannes", "" ], [ "Behrend", "Andreas", "" ], [ "Rausch", "Jonas", "" ], [ "Lehner", "Wolfgang", "" ] ]
new_dataset
0.987665
1701.04925
Fahimeh Rezazadegan
Fahimeh Rezazadegan, Sareh Shirazi, Ben Upcroft and Michael Milford
Action Recognition: From Static Datasets to Moving Robots
null
Robotics and Automation (ICRA), 2017 IEEE International Conference on
10.1109/ICRA.2017.7989361
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep learning models have achieved state-of-the- art performance in recognizing human activities, but often rely on utilizing background cues present in typical computer vision datasets that predominantly have a stationary camera. If these models are to be employed by autonomous robots in real world environments, they must be adapted to perform independently of background cues and camera motion effects. To address these challenges, we propose a new method that firstly generates generic action region proposals with good potential to locate one human action in unconstrained videos regardless of camera motion and then uses action proposals to extract and classify effective shape and motion features by a ConvNet framework. In a range of experiments, we demonstrate that by actively proposing action regions during both training and testing, state-of-the-art or better performance is achieved on benchmarks. We show the outperformance of our approach compared to the state-of-the-art in two new datasets; one emphasizes on irrelevant background, the other highlights the camera motion. We also validate our action recognition method in an abnormal behavior detection scenario to improve workplace safety. The results verify a higher success rate for our method due to the ability of our system to recognize human actions regardless of environment and camera motion.
[ { "version": "v1", "created": "Wed, 18 Jan 2017 02:10:56 GMT" } ]
2017-09-20T00:00:00
[ [ "Rezazadegan", "Fahimeh", "" ], [ "Shirazi", "Sareh", "" ], [ "Upcroft", "Ben", "" ], [ "Milford", "Michael", "" ] ]
new_dataset
0.976099
1704.03140
Chun Pong Lau
Chun Pong Lau, Yu Hin Lai, Lok Ming Lui
Restoration of Atmospheric Turbulence-distorted Images via RPCA and Quasiconformal Maps
21 pages, 24 figures
null
null
null
cs.CV cs.CG cs.GR
http://creativecommons.org/licenses/by-nc-sa/4.0/
We address the problem of restoring a high-quality image from an observed image sequence strongly distorted by atmospheric turbulence. A novel algorithm is proposed in this paper to reduce geometric distortion as well as space-and-time-varying blur due to strong turbulence. By considering a suitable energy functional, our algorithm first obtains a sharp reference image and a subsampled image sequence containing sharp and mildly distorted image frames with respect to the reference image. The subsampled image sequence is then stabilized by applying the Robust Principal Component Analysis (RPCA) on the deformation fields between image frames and warping the image frames by a quasiconformal map associated with the low-rank part of the deformation matrix. After image frames are registered to the reference image, the low-rank part of them are deblurred via a blind deconvolution, and the deblurred frames are then fused with the enhanced sparse part. Experiments have been carried out on both synthetic and real turbulence-distorted video. Results demonstrate that our method is effective in alleviating distortions and blur, restoring image details and enhancing visual quality.
[ { "version": "v1", "created": "Tue, 11 Apr 2017 04:24:44 GMT" }, { "version": "v2", "created": "Tue, 19 Sep 2017 03:40:28 GMT" } ]
2017-09-20T00:00:00
[ [ "Lau", "Chun Pong", "" ], [ "Lai", "Yu Hin", "" ], [ "Lui", "Lok Ming", "" ] ]
new_dataset
0.982016
1705.07962
Tony Beltramelli
Tony Beltramelli
pix2code: Generating Code from a Graphical User Interface Screenshot
null
null
null
null
cs.LG cs.AI cs.CL cs.CV cs.NE
http://creativecommons.org/licenses/by/4.0/
Transforming a graphical user interface screenshot created by a designer into computer code is a typical task conducted by a developer in order to build customized software, websites, and mobile applications. In this paper, we show that deep learning methods can be leveraged to train a model end-to-end to automatically generate code from a single input image with over 77% of accuracy for three different platforms (i.e. iOS, Android and web-based technologies).
[ { "version": "v1", "created": "Mon, 22 May 2017 19:32:20 GMT" }, { "version": "v2", "created": "Tue, 19 Sep 2017 11:27:47 GMT" } ]
2017-09-20T00:00:00
[ [ "Beltramelli", "Tony", "" ] ]
new_dataset
0.999546
1709.06113
Siddharth Gupta
David Eppstein, Siddharth Gupta
Crossing Patterns in Nonplanar Road Networks
9 pages, 4 figures. To appear at the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems(ACM SIGSPATIAL 2017)
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define the crossing graph of a given embedded graph (such as a road network) to be a graph with a vertex for each edge of the embedding, with two crossing graph vertices adjacent when the corresponding two edges of the embedding cross each other. In this paper, we study the sparsity properties of crossing graphs of real-world road networks. We show that, in large road networks (the Urban Road Network Dataset), the crossing graphs have connected components that are primarily trees, and that the remaining non-tree components are typically sparse (technically, that they have bounded degeneracy). We prove theoretically that when an embedded graph has a sparse crossing graph, it has other desirable properties that lead to fast algorithms for shortest paths and other algorithms important in geographic information systems. Notably, these graphs have polynomial expansion, meaning that they and all their subgraphs have small separators.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 18:15:41 GMT" } ]
2017-09-20T00:00:00
[ [ "Eppstein", "David", "" ], [ "Gupta", "Siddharth", "" ] ]
new_dataset
0.999082
1709.06158
Matthias Nie{\ss}ner
Angel Chang, Angela Dai, Thomas Funkhouser, Maciej Halber, Matthias Nie{\ss}ner, Manolis Savva, Shuran Song, Andy Zeng, Yinda Zhang
Matterport3D: Learning from RGB-D Data in Indoor Environments
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Access to large, diverse RGB-D datasets is critical for training RGB-D scene understanding algorithms. However, existing datasets still cover only a limited number of views or a restricted scale of spaces. In this paper, we introduce Matterport3D, a large-scale RGB-D dataset containing 10,800 panoramic views from 194,400 RGB-D images of 90 building-scale scenes. Annotations are provided with surface reconstructions, camera poses, and 2D and 3D semantic segmentations. The precise global alignment and comprehensive, diverse panoramic set of views over entire buildings enable a variety of supervised and self-supervised computer vision tasks, including keypoint matching, view overlap prediction, normal prediction from color, semantic segmentation, and region classification.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 20:34:48 GMT" } ]
2017-09-20T00:00:00
[ [ "Chang", "Angel", "" ], [ "Dai", "Angela", "" ], [ "Funkhouser", "Thomas", "" ], [ "Halber", "Maciej", "" ], [ "Nießner", "Matthias", "" ], [ "Savva", "Manolis", "" ], [ "Song", "Shuran", "" ], [ "Zeng", "Andy", "" ], [ "Zhang", "Yinda", "" ] ]
new_dataset
0.999814
1709.06176
Julia Stoyanovich
Julia Stoyanovich and Matthew Gilbride and Vera Zaychik Moffitt
Zooming in on NYC taxi data with Portal
Presented at Data Science for Social Good (DSSG) 2017: https://dssg.uchicago.edu/data-science-for-social-good-conference-2017/
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we develop a methodology for analyzing transportation data at different levels of temporal and geographic granularity, and apply our methodology to the TLC Trip Record Dataset, made publicly available by the NYC Taxi & Limousine Commission. This data is naturally represented by a set of trajectories, annotated with time and with additional information such as passenger count and cost. We analyze TLC data to identify hotspots, which point to lack of convenient public transportation options, and popular routes, which motivate ride-sharing solutions or addition of a bus route. Our methodology is based on using a system called Portal, which implements efficient representations and principled analysis methods for evolving graphs. Portal is implemented on top of Apache Spark, a popular distributed data processing system, is inter-operable with other Spark libraries like SparkSQL, and supports sophisticated kinds of analysis of evolving graphs efficiently. Portal is currently under development in the Data, Responsibly Lab at Drexel. We plan to release Portal in the open source in Fall 2017.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 21:55:47 GMT" } ]
2017-09-20T00:00:00
[ [ "Stoyanovich", "Julia", "" ], [ "Gilbride", "Matthew", "" ], [ "Moffitt", "Vera Zaychik", "" ] ]
new_dataset
0.994423
1709.06204
Jungseock Joo
Donghyeon Won, Zachary C. Steinert-Threlkeld, Jungseock Joo
Protest Activity Detection and Perceived Violence Estimation from Social Media Images
To appear in Proceedings of the 25th ACM International Conference on Multimedia 2017 (full research paper)
null
null
null
cs.MM cs.CV cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a novel visual model which can recognize protesters, describe their activities by visual attributes and estimate the level of perceived violence in an image. Studies of social media and protests use natural language processing to track how individuals use hashtags and links, often with a focus on those items' diffusion. These approaches, however, may not be effective in fully characterizing actual real-world protests (e.g., violent or peaceful) or estimating the demographics of participants (e.g., age, gender, and race) and their emotions. Our system characterizes protests along these dimensions. We have collected geotagged tweets and their images from 2013-2017 and analyzed multiple major protest events in that period. A multi-task convolutional neural network is employed in order to automatically classify the presence of protesters in an image and predict its visual attributes, perceived violence and exhibited emotions. We also release the UCLA Protest Image Dataset, our novel dataset of 40,764 images (11,659 protest images and hard negatives) with various annotations of visual attributes and sentiments. Using this dataset, we train our model and demonstrate its effectiveness. We also present experimental results from various analysis on geotagged image data in several prevalent protest events. Our dataset will be made accessible at https://www.sscnet.ucla.edu/comm/jjoo/mm-protest/.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 23:57:42 GMT" } ]
2017-09-20T00:00:00
[ [ "Won", "Donghyeon", "" ], [ "Steinert-Threlkeld", "Zachary C.", "" ], [ "Joo", "Jungseock", "" ] ]
new_dataset
0.997878
1709.06214
Samir Elouasbi
Samir Elouasbi and Andrzej Pelc
Deterministic rendezvous with detection using beeps
A preliminary version of this paper appeared in Proc. 11th International Symposium on Algorithms and Experiments for Wireless Sensor Networks (ALGOSENSORS 2015), LNCS 9536, 85-97
International Journal of Foundations of Computer Science 28 (2017), 77-97
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two mobile agents, starting at arbitrary, possibly different times from arbitrary nodes of an unknown network, have to meet at some node. Agents move in synchronous rounds: in each round an agent can either stay at the current node or move to one of its neighbors. Agents have different labels which are positive integers. Each agent knows its own label, but not the label of the other agent. In traditional formulations of the rendezvous problem, meeting is accomplished when the agents get to the same node in the same round. We want to achieve a more demanding goal, called rendezvous with detection: agents must become aware that the meeting is accomplished, simultaneously declare this and stop. This awareness depends on how an agent can communicate to the other agent its presence at a node. We use two variations of the arguably weakest model of communication, called the beeping model, introduced in [8]. In each round an agent can either listen or beep. In the local beeping model, an agent hears a beep in a round if it listens in this round and if the other agent is at the same node and beeps. In the global beeping model, an agent hears a loud beep in a round if it listens in this round and if the other agent is at the same node and beeps, and it hears a soft beep in a round if it listens in this round and if the other agent is at some other node and beeps. We first present a deterministic algorithm of rendezvous with detection working, even for the local beeping model, in an arbitrary unknown network in time polynomial in the size of the network and in the length of the smaller label (i.e., in the logarithm of this label). However, in this algorithm, agents spend a lot of energy: the number of moves that an agent must make, is proportional to the time of rendezvous. It is thus natural to ask if bounded-energy agents can always achieve rendezvous with detection as well...
[ { "version": "v1", "created": "Tue, 19 Sep 2017 00:58:43 GMT" } ]
2017-09-20T00:00:00
[ [ "Elouasbi", "Samir", "" ], [ "Pelc", "Andrzej", "" ] ]
new_dataset
0.998817
1709.06217
Samir Elouasbi
Samir Elouasbi and Andrzej Pelc
Deterministic meeting of sniffing agents in the plane
A preliminary version of this paper appeared in the Proc. 23rd International Colloquium on Structural Information and Communication Complexity (SIROCCO 2016), LNCS 9988
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two mobile agents, starting at arbitrary, possibly different times from arbitrary locations in the plane, have to meet. Agents are modeled as discs of diameter 1, and meeting occurs when these discs touch. Agents have different labels which are integers from the set of 0 to L-1. Each agent knows L and knows its own label, but not the label of the other agent. Agents are equipped with compasses and have synchronized clocks. They make a series of moves. Each move specifies the direction and the duration of moving. This includes a null move which consists in staying inert for some time, or forever. In a non-null move agents travel at the same constant speed, normalized to 1. We assume that agents have sensors enabling them to estimate the distance from the other agent (defined as the distance between centers of discs), but not the direction towards it. We consider two models of estimation. In both models an agent reads its sensor at the moment of its appearance in the plane and then at the end of each move. This reading (together with the previous ones) determines the decision concerning the next move. In both models the reading of the sensor tells the agent if the other agent is already present. Moreover, in the monotone model, each agent can find out, for any two readings in moments t1 and t2, whether the distance from the other agent at time t1 was smaller, equal or larger than at time t2. In the weaker binary model, each agent can find out, at any reading, whether it is at distance less than \r{ho} or at distance at least \r{ho} from the other agent, for some real \r{ho} > 1 unknown to them. Such distance estimation mechanism can be implemented, e.g., using chemical sensors. Each agent emits some chemical substance (scent), and the sensor of the other agent detects it, i.e., sniffs. The intensity of the scent decreases with the distance.
[ { "version": "v1", "created": "Tue, 19 Sep 2017 01:22:27 GMT" } ]
2017-09-20T00:00:00
[ [ "Elouasbi", "Samir", "" ], [ "Pelc", "Andrzej", "" ] ]
new_dataset
0.991521
1709.06299
Arne Schmidt
Aaron T. Becker, S\'andor P. Fekete, Phillip Keldenich, Dominik Krupke, Christian Rieck, Christian Scheffer, Arne Schmidt
Tilt Assembly: Algorithms for Micro-Factories That Build Objects with Uniform External Forces
17 pages, 17 figures, 1 table, full version of extended abstract that is to appear in ISAAC 2017
null
null
null
cs.DS cs.CC cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present algorithmic results for the parallel assembly of many micro-scale objects in two and three dimensions from tiny particles, which has been proposed in the context of programmable matter and self-assembly for building high-yield micro-factories. The underlying model has particles moving under the influence of uniform external forces until they hit an obstacle; particles can bond when being forced together with another appropriate particle. Due to the physical and geometric constraints, not all shapes can be built in this manner; this gives rise to the Tilt Assembly Problem (TAP) of deciding constructibility. For simply-connected polyominoes $P$ in 2D consisting of $N$ unit-squares ("tiles"), we prove that TAP can be decided in $O(N\log N)$ time. For the optimization variant MaxTAP (in which the objective is to construct a subshape of maximum possible size), we show polyAPX-hardness: unless P=NP, MaxTAP cannot be approximated within a factor of $\Omega(N^{\frac{1}{3}})$; for tree-shaped structures, we give an $O(N^{\frac{1}{2}})$-approximation algorithm. For the efficiency of the assembly process itself, we show that any constructible shape allows pipelined assembly, which produces copies of $P$ in $O(1)$ amortized time, i.e., $N$ copies of $P$ in $O(N)$ time steps. These considerations can be extended to three-dimensional objects: For the class of polycubes $P$ we prove that it is NP-hard to decide whether it is possible to construct a path between two points of $P$; it is also NP-hard to decide constructibility of a polycube $P$. Moreover, it is expAPX-hard to maximize a path from a given start point.
[ { "version": "v1", "created": "Tue, 19 Sep 2017 08:52:23 GMT" } ]
2017-09-20T00:00:00
[ [ "Becker", "Aaron T.", "" ], [ "Fekete", "Sándor P.", "" ], [ "Keldenich", "Phillip", "" ], [ "Krupke", "Dominik", "" ], [ "Rieck", "Christian", "" ], [ "Scheffer", "Christian", "" ], [ "Schmidt", "Arne", "" ] ]
new_dataset
0.994233
1709.06325
Max Talanov
Max Talanov, Evgenii Zykov, Yuriy Gerasimov, Alexander Toschev, Victor Erokhin
Dopamine modulation via memristive schematic
10 pages, 7 figures
null
null
Memristive-brain-2017-01
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this technical report we present novel results of the dopamine neuromodulation inspired modulation of a polyaniline (PANI) memristive device excitatory learning STDP. Results presented in this work are of two experiments setup computer simulation and physical prototype experiments. We present physical prototype of inhibitory learning or iSTDP as well as the results of iSTDP learning.
[ { "version": "v1", "created": "Tue, 19 Sep 2017 10:02:49 GMT" } ]
2017-09-20T00:00:00
[ [ "Talanov", "Max", "" ], [ "Zykov", "Evgenii", "" ], [ "Gerasimov", "Yuriy", "" ], [ "Toschev", "Alexander", "" ], [ "Erokhin", "Victor", "" ] ]
new_dataset
0.998948
1709.06537
You-Luen Lee
You-Luen Lee, Da-Cheng Juan, Xuan-An Tseng, Yu-Ting Chen, and Shih-Chieh Chang
DC-Prophet: Predicting Catastrophic Machine Failures in DataCenters
13 pages, 5 figures, accepted by 2017 ECML PKDD
null
null
null
cs.DC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When will a server fail catastrophically in an industrial datacenter? Is it possible to forecast these failures so preventive actions can be taken to increase the reliability of a datacenter? To answer these questions, we have studied what are probably the largest, publicly available datacenter traces, containing more than 104 million events from 12,500 machines. Among these samples, we observe and categorize three types of machine failures, all of which are catastrophic and may lead to information loss, or even worse, reliability degradation of a datacenter. We further propose a two-stage framework-DC-Prophet-based on One-Class Support Vector Machine and Random Forest. DC-Prophet extracts surprising patterns and accurately predicts the next failure of a machine. Experimental results show that DC-Prophet achieves an AUC of 0.93 in predicting the next machine failure, and a F3-score of 0.88 (out of 1). On average, DC-Prophet outperforms other classical machine learning methods by 39.45% in F3-score.
[ { "version": "v1", "created": "Mon, 14 Aug 2017 07:46:47 GMT" } ]
2017-09-20T00:00:00
[ [ "Lee", "You-Luen", "" ], [ "Juan", "Da-Cheng", "" ], [ "Tseng", "Xuan-An", "" ], [ "Chen", "Yu-Ting", "" ], [ "Chang", "Shih-Chieh", "" ] ]
new_dataset
0.987144
1609.09329
Olga Kieselmann
Olga Kieselmann and Arno Wacker
k-rAC - a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables
null
In Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, New York, NY, USA, Article 43, 2017
10.1145/3098954.3103154
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed Hash Tables (DHT) are a common architecture for decentralized applications and, therefore, would be suited for privacy-aware applications. However, currently existing DHTs allow every peer to access any index. To build privacy-aware applications, we need to control this access. In this paper, we present k-rAC, a privacy-aware fine-grained AC for DHTs. For authentication, we present three different mechanisms based on public-key cryptography, zero-knowledge-proofs, and cryptographic hashes. For authorization, we use distributed AC lists. The security of our approach is based on k-resilience. We show that our approach introduces an acceptable overhead and discuss its suitability for different scenarios.
[ { "version": "v1", "created": "Thu, 29 Sep 2016 13:32:01 GMT" } ]
2017-09-19T00:00:00
[ [ "Kieselmann", "Olga", "" ], [ "Wacker", "Arno", "" ] ]
new_dataset
0.990856
1704.00032
Sven Karol
Sven Karol, Tobias Nett, Jeronimo Castrillon, Ivo F. Sbalzarini
A Domain-Specific Language and Editor for Parallel Particle Methods
Submitted to ACM Transactions on Mathematical Software on Dec. 25, 2016
null
null
null
cs.MS cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Domain-specific languages (DSLs) are of increasing importance in scientific high-performance computing to reduce development costs, raise the level of abstraction and, thus, ease scientific programming. However, designing and implementing DSLs is not an easy task, as it requires knowledge of the application domain and experience in language engineering and compilers. Consequently, many DSLs follow a weak approach using macros or text generators, which lack many of the features that make a DSL a comfortable for programmers. Some of these features---e.g., syntax highlighting, type inference, error reporting, and code completion---are easily provided by language workbenches, which combine language engineering techniques and tools in a common ecosystem. In this paper, we present the Parallel Particle-Mesh Environment (PPME), a DSL and development environment for numerical simulations based on particle methods and hybrid particle-mesh methods. PPME uses the meta programming system (MPS), a projectional language workbench. PPME is the successor of the Parallel Particle-Mesh Language (PPML), a Fortran-based DSL that used conventional implementation strategies. We analyze and compare both languages and demonstrate how the programmer's experience can be improved using static analyses and projectional editing. Furthermore, we present an explicit domain model for particle abstractions and the first formal type system for particle methods.
[ { "version": "v1", "created": "Fri, 31 Mar 2017 19:39:27 GMT" }, { "version": "v2", "created": "Sun, 17 Sep 2017 13:50:08 GMT" } ]
2017-09-19T00:00:00
[ [ "Karol", "Sven", "" ], [ "Nett", "Tobias", "" ], [ "Castrillon", "Jeronimo", "" ], [ "Sbalzarini", "Ivo F.", "" ] ]
new_dataset
0.98561
1704.05746
Le Liang
Le Liang, Haixia Peng, Geoffrey Ye Li and Xuemin Shen
Vehicular Communications: A Physical Layer Perspective
13pages, 4 figures. Accepted by IEEE Trans. Veh. Technol
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vehicular communications have attracted more and more attention recently from both industry and academia due to its strong potential to enhance road safety, improve traffic efficiency, and provide rich on-board information and entertainment services. In this paper, we discuss fundamental physical layer issues that enable efficient vehicular communications and present a comprehensive overview of the state-of-the-art research. We first introduce vehicular channel characteristics and modeling, which are the key underlying features differentiating vehicular communications from other types of wireless systems. We then present schemes to estimate the time-varying vehicular channels and various modulation techniques to deal with high-mobility channels. After reviewing resource allocation for vehicular communications, we discuss the potential to enable vehicular communications over the millimeter wave bands. Finally, we identify the challenges and opportunities associated with vehicular communications.
[ { "version": "v1", "created": "Wed, 19 Apr 2017 14:31:42 GMT" }, { "version": "v2", "created": "Sun, 16 Jul 2017 07:24:38 GMT" }, { "version": "v3", "created": "Fri, 15 Sep 2017 20:34:47 GMT" } ]
2017-09-19T00:00:00
[ [ "Liang", "Le", "" ], [ "Peng", "Haixia", "" ], [ "Li", "Geoffrey Ye", "" ], [ "Shen", "Xuemin", "" ] ]
new_dataset
0.999546
1704.07468
Yanjun Qi Dr.
Ritambhara Singh, Arshdeep Sekhon, Kamran Kowsari, Jack Lanchantin, Beilun Wang and Yanjun Qi
GaKCo: a Fast GApped k-mer string Kernel using COunting
@ECML 2017
null
null
null
cs.LG cs.AI cs.CC cs.CL cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
String Kernel (SK) techniques, especially those using gapped $k$-mers as features (gk), have obtained great success in classifying sequences like DNA, protein, and text. However, the state-of-the-art gk-SK runs extremely slow when we increase the dictionary size ($\Sigma$) or allow more mismatches ($M$). This is because current gk-SK uses a trie-based algorithm to calculate co-occurrence of mismatched substrings resulting in a time cost proportional to $O(\Sigma^{M})$. We propose a \textbf{fast} algorithm for calculating \underline{Ga}pped $k$-mer \underline{K}ernel using \underline{Co}unting (GaKCo). GaKCo uses associative arrays to calculate the co-occurrence of substrings using cumulative counting. This algorithm is fast, scalable to larger $\Sigma$ and $M$, and naturally parallelizable. We provide a rigorous asymptotic analysis that compares GaKCo with the state-of-the-art gk-SK. Theoretically, the time cost of GaKCo is independent of the $\Sigma^{M}$ term that slows down the trie-based approach. Experimentally, we observe that GaKCo achieves the same accuracy as the state-of-the-art and outperforms its speed by factors of 2, 100, and 4, on classifying sequences of DNA (5 datasets), protein (12 datasets), and character-based English text (2 datasets), respectively. GaKCo is shared as an open source tool at \url{https://github.com/QData/GaKCo-SVM}
[ { "version": "v1", "created": "Mon, 24 Apr 2017 21:43:21 GMT" }, { "version": "v2", "created": "Sun, 30 Apr 2017 20:12:01 GMT" }, { "version": "v3", "created": "Mon, 18 Sep 2017 17:25:17 GMT" } ]
2017-09-19T00:00:00
[ [ "Singh", "Ritambhara", "" ], [ "Sekhon", "Arshdeep", "" ], [ "Kowsari", "Kamran", "" ], [ "Lanchantin", "Jack", "" ], [ "Wang", "Beilun", "" ], [ "Qi", "Yanjun", "" ] ]
new_dataset
0.997002
1708.07747
Han Xiao
Han Xiao, Kashif Rasul, Roland Vollgraf
Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms
Dataset is freely available at https://github.com/zalandoresearch/fashion-mnist Benchmark is available at http://fashion-mnist.s3-website.eu-central-1.amazonaws.com/
null
null
null
cs.LG cs.CV stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Fashion-MNIST, a new dataset comprising of 28x28 grayscale images of 70,000 fashion products from 10 categories, with 7,000 images per category. The training set has 60,000 images and the test set has 10,000 images. Fashion-MNIST is intended to serve as a direct drop-in replacement for the original MNIST dataset for benchmarking machine learning algorithms, as it shares the same image size, data format and the structure of training and testing splits. The dataset is freely available at https://github.com/zalandoresearch/fashion-mnist
[ { "version": "v1", "created": "Fri, 25 Aug 2017 14:01:29 GMT" }, { "version": "v2", "created": "Fri, 15 Sep 2017 21:29:49 GMT" } ]
2017-09-19T00:00:00
[ [ "Xiao", "Han", "" ], [ "Rasul", "Kashif", "" ], [ "Vollgraf", "Roland", "" ] ]
new_dataset
0.999892
1709.03714
Cheng Wang
Cheng Wang
RRA: Recurrent Residual Attention for Sequence Learning
9 pages, 7 figures
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a recurrent neural network (RNN) with residual attention (RRA) to learn long-range dependencies from sequential data. We propose to add residual connections across timesteps to RNN, which explicitly enhances the interaction between current state and hidden states that are several timesteps apart. This also allows training errors to be directly back-propagated through residual connections and effectively alleviates gradient vanishing problem. We further reformulate an attention mechanism over residual connections. An attention gate is defined to summarize the individual contribution from multiple previous hidden states in computing the current state. We evaluate RRA on three tasks: the adding problem, pixel-by-pixel MNIST classification and sentiment analysis on the IMDB dataset. Our experiments demonstrate that RRA yields better performance, faster convergence and more stable training compared to a standard LSTM network. Furthermore, RRA shows highly competitive performance to the state-of-the-art methods.
[ { "version": "v1", "created": "Tue, 12 Sep 2017 07:39:43 GMT" } ]
2017-09-19T00:00:00
[ [ "Wang", "Cheng", "" ] ]
new_dataset
0.984558
1709.04585
Minjia Shi
Minjia Shi, Zhongyi Zhang, Patrick Sole
Two-weight codes and second order recurrences
10 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic codes of dimension $2$ over a finite field are shown to have at most two nonzero weights. This extends a construction of Rao et al (2010) and disproves a conjecture of Schmidt-White (2002). We compute their weight distribution, and give a condition on the roots of their check polynomials for them to be MDS.
[ { "version": "v1", "created": "Thu, 14 Sep 2017 01:52:40 GMT" }, { "version": "v2", "created": "Sat, 16 Sep 2017 08:50:06 GMT" } ]
2017-09-19T00:00:00
[ [ "Shi", "Minjia", "" ], [ "Zhang", "Zhongyi", "" ], [ "Sole", "Patrick", "" ] ]
new_dataset
0.998835
1709.05341
Stefano Germano
Stefano Germano, Francesco Calimeri, Eliana Palermiti
LoIDE: a web-based IDE for Logic Programming - Preliminary Technical Report
11 pages, 3 figures
null
null
null
cs.SE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Logic-based paradigms are nowadays widely used in many different fields, also thank to the availability of robust tools and systems that allow the development of real-world and industrial applications. In this work we present LoIDE, an advanced and modular web-editor for logic-based languages that also integrates with state-of-the-art solvers.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 18:15:36 GMT" } ]
2017-09-19T00:00:00
[ [ "Germano", "Stefano", "" ], [ "Calimeri", "Francesco", "" ], [ "Palermiti", "Eliana", "" ] ]
new_dataset
0.99983
1709.05395
Nasser Al-Fannah
Nasser Mohammed Al-Fannah
One Leak Will Sink A Ship: WebRTC IP Address Leaks
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The introduction of the WebRTC API to modern browsers has brought about a new threat to user privacy. This API causes a range of client IP addresses to become available to a visited website via JavaScript even if a VPN is in use. This a potentially serious problem for users utilizing VPN services for anonymity. In order to better understand the magnitude of this issue, we tested widely used browsers and VPN services to discover which client IP addresses can be revealed and in what circumstances. In most cases, at least one of the client addresses is leaked. The number and type of leaked IP addresses are affected by the choices of browser and VPN service, meaning that privacy-sensitive users should choose their browser and their VPN provider with care. We conclude by proposing countermeasures which can be used to help mitigate this issue.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 20:41:03 GMT" } ]
2017-09-19T00:00:00
[ [ "Al-Fannah", "Nasser Mohammed", "" ] ]
new_dataset
0.994964
1709.05522
Xingyu Na
Hui Bu, Jiayu Du, Xingyu Na, Bengu Wu, Hao Zheng
AISHELL-1: An Open-Source Mandarin Speech Corpus and A Speech Recognition Baseline
Oriental COCOSDA 2017
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An open-source Mandarin speech corpus called AISHELL-1 is released. It is by far the largest corpus which is suitable for conducting the speech recognition research and building speech recognition systems for Mandarin. The recording procedure, including audio capturing devices and environments are presented in details. The preparation of the related resources, including transcriptions and lexicon are described. The corpus is released with a Kaldi recipe. Experimental results implies that the quality of audio recordings and transcriptions are promising.
[ { "version": "v1", "created": "Sat, 16 Sep 2017 14:33:27 GMT" } ]
2017-09-19T00:00:00
[ [ "Bu", "Hui", "" ], [ "Du", "Jiayu", "" ], [ "Na", "Xingyu", "" ], [ "Wu", "Bengu", "" ], [ "Zheng", "Hao", "" ] ]
new_dataset
0.99938
1709.05587
Chao-Lin Liu
Chao-Lin Liu, Shuhua Zhang, Yuanli Geng, Huei-ling Lai, Hongsu Wang
Character Distributions of Classical Chinese Literary Texts: Zipf's Law, Genres, and Epochs
12 pages, 2 tables, 6 figures, 2017 International Conference on Digital Humanities
null
null
null
cs.CL cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We collect 14 representative corpora for major periods in Chinese history in this study. These corpora include poetic works produced in several dynasties, novels of the Ming and Qing dynasties, and essays and news reports written in modern Chinese. The time span of these corpora ranges between 1046 BCE and 2007 CE. We analyze their character and word distributions from the viewpoint of the Zipf's law, and look for factors that affect the deviations and similarities between their Zipfian curves. Genres and epochs demonstrated their influences in our analyses. Specifically, the character distributions for poetic works of between 618 CE and 1644 CE exhibit striking similarity. In addition, although texts of the same dynasty may tend to use the same set of characters, their character distributions still deviate from each other.
[ { "version": "v1", "created": "Sun, 17 Sep 2017 01:15:03 GMT" } ]
2017-09-19T00:00:00
[ [ "Liu", "Chao-Lin", "" ], [ "Zhang", "Shuhua", "" ], [ "Geng", "Yuanli", "" ], [ "Lai", "Huei-ling", "" ], [ "Wang", "Hongsu", "" ] ]
new_dataset
0.99908
1709.05669
Rajat Gupta
Rajat Gupta, Kanishk Aman, Nalin Shiva, Yadvendra Singh
An Improved Fatigue Detection System Based on Behavioral Characteristics of Driver
4 pages, 2 figures, edited version of published paper in IEEE ICITE 2017
2017 2nd IEEE International Conference on Intelligent Transportation Engineering, pp 227-230
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, road accidents have increased significantly. One of the major reasons for these accidents, as reported is driver fatigue. Due to continuous and longtime driving, the driver gets exhausted and drowsy which may lead to an accident. Therefore, there is a need for a system to measure the fatigue level of driver and alert him when he/she feels drowsy to avoid accidents. Thus, we propose a system which comprises of a camera installed on the car dashboard. The camera detect the driver's face and observe the alteration in its facial features and uses these features to observe the fatigue level. Facial features include eyes and mouth. Principle Component Analysis is thus implemented to reduce the features while minimizing the amount of information lost. The parameters thus obtained are processed through Support Vector Classifier for classifying the fatigue level. After that classifier output is sent to the alert unit.
[ { "version": "v1", "created": "Sun, 17 Sep 2017 14:28:21 GMT" } ]
2017-09-19T00:00:00
[ [ "Gupta", "Rajat", "" ], [ "Aman", "Kanishk", "" ], [ "Shiva", "Nalin", "" ], [ "Singh", "Yadvendra", "" ] ]
new_dataset
0.952138
1709.05712
Liyang Sun
Liyang Sun, Guibin Tian, Guanyu Zhu, Yong Liu, Hang Shi and David Dai
Multipath IP Routing on End Devices: Motivation, Design, and Performance
12 pages, 9 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most end devices are now equipped with multiple network interfaces. Applications can exploit all available interfaces and benefit from multipath transmission. Recently Multipath TCP (MPTCP) was proposed to implement multipath transmission at the transport layer and has attracted lots of attention from academia and industry. However, MPTCP only supports TCP-based applications and its multipath routing flexibility is limited. In this paper, we investigate the possibility of orchestrating multipath transmission from the network layer of end devices, and develop a Multipath IP (MPIP) design consisting of signaling, session and path management, multipath routing, and NAT traversal. We implement MPIP in Linux and Android kernels. Through controlled lab experiments and Internet experiments, we demonstrate that MPIP can effectively achieve multipath gains at the network layer. It not only supports the legacy TCP and UDP protocols, but also works seamlessly with MPTCP. By facilitating user-defined customized routing, MPIP can route traffic from competing applications in a coordinated fashion to maximize the aggregate user Quality-of-Experience.
[ { "version": "v1", "created": "Sun, 17 Sep 2017 20:17:15 GMT" } ]
2017-09-19T00:00:00
[ [ "Sun", "Liyang", "" ], [ "Tian", "Guibin", "" ], [ "Zhu", "Guanyu", "" ], [ "Liu", "Yong", "" ], [ "Shi", "Hang", "" ], [ "Dai", "David", "" ] ]
new_dataset
0.999344
1709.05742
Mordechai Guri
Mordechai Guri, Dima Bykhovsky, Yuval Elovici
aIR-Jumper: Covert Air-Gap Exfiltration/Infiltration via Security Cameras & Infrared (IR)
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Infrared (IR) light is invisible to humans, but cameras are optically sensitive to this type of light. In this paper, we show how attackers can use surveillance cameras and infrared light to establish bi-directional covert communication between the internal networks of organizations and remote attackers. We present two scenarios: exfiltration (leaking data out of the network) and infiltration (sending data into the network). Exfiltration. Surveillance and security cameras are equipped with IR LEDs, which are used for night vision. In the exfiltration scenario, malware within the organization access the surveillance cameras across the local network and controls the IR illumination. Sensitive data such as PIN codes, passwords, and encryption keys are then modulated, encoded, and transmitted over the IR signals. Infiltration. In an infiltration scenario, an attacker standing in a public area (e.g., in the street) uses IR LEDs to transmit hidden signals to the surveillance camera(s). Binary data such as command and control (C&C) and beacon messages are encoded on top of the IR signals. The exfiltration and infiltration can be combined to establish bidirectional, 'air-gap' communication between the compromised network and the attacker. We discuss related work and provide scientific background about this optical channel. We implement a malware prototype and present data modulation schemas and a basic transmission protocol. Our evaluation of the covert channel shows that data can be covertly exfiltrated from an organization at a rate of 20 bit/sec per surveillance camera to a distance of tens of meters away. Data can be covertly infiltrated into an organization at a rate of over 100 bit/sec per surveillance camera from a distance of hundreds of meters to kilometers away.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 01:59:39 GMT" } ]
2017-09-19T00:00:00
[ [ "Guri", "Mordechai", "" ], [ "Bykhovsky", "Dima", "" ], [ "Elovici", "Yuval", "" ] ]
new_dataset
0.997995
1709.05744
Nam Yul Yu
Nam Yul Yu
Indistinguishability and Energy Sensitivity of Asymptotically Gaussian Compressed Encryption
Submitted to IEEE Transactions on Information Forensics and Security
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In information-theoretic sense, it is known that a CS-based cryptosystem can be perfectly secure if it employs a random Gaussian sensing matrix updated at each encryption and its plaintext has constant energy. In this paper, we propose a new CS-based cryptosystem that employs a secret bipolar keystream and a public unitary matrix, which can be suitable for practical implementation by generating and renewing the keystream in a fast and efficient manner. We demonstrate that the sensing matrix is asymptotically Gaussian for a sufficiently large plaintext length, which guarantees a reliable CS decryption for a legitimate recipient. By means of probability metrics, we also show that the new CS-based cryptosystem can have the indistinguishability against an adversary, as long as the keystream is updated at each encryption and each plaintext has constant energy. Finally, we investigate how much the security of the new CS-based cryptosystem is sensitive to energy variation of plaintexts.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 02:13:15 GMT" } ]
2017-09-19T00:00:00
[ [ "Yu", "Nam Yul", "" ] ]
new_dataset
0.974082
1709.05763
Hideaki Hata
Pannavat Terdchanakul, Hideaki Hata, Passakorn Phannachitta, Kenichi Matsumoto
Bug or Not? Bug Report Classification Using N-Gram IDF
5 pages, ICSME 2017
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Previous studies have found that a significant number of bug reports are misclassified between bugs and non-bugs, and that manually classifying bug reports is a time-consuming task. To address this problem, we propose a bug reports classification model with N-gram IDF, a theoretical extension of Inverse Document Frequency (IDF) for handling words and phrases of any length. N-gram IDF enables us to extract key terms of any length from texts, these key terms can be used as the features to classify bug reports. We build classification models with logistic regression and random forest using features from N-gram IDF and topic modeling, which is widely used in various software engineering tasks. With a publicly available dataset, our results show that our N-gram IDF-based models have a superior performance than the topic-based models on all of the evaluated cases. Our models show promising results and have a potential to be extended to other software engineering tasks.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 03:36:12 GMT" } ]
2017-09-19T00:00:00
[ [ "Terdchanakul", "Pannavat", "" ], [ "Hata", "Hideaki", "" ], [ "Phannachitta", "Passakorn", "" ], [ "Matsumoto", "Kenichi", "" ] ]
new_dataset
0.99604
1709.05794
Pier Luigi Ventre
Pier Luigi Ventre, Jordi Ortiz, Alaitz Mendiola, Carolina Fern\'andez, Adam Pavlidis, Pankaj Sharma, Sebastiano Buscaglione, Kostas Stamos, Afrodite Sevasti, David Whittaker
Deploying SDN in G\'EANT production network
Short paper/demo at IEEE NFV-SDN 2017
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the demand for more bandwidth, agile infrastructures and services grows, it becomes challenging for Service Providers like G\'EANT to manage the proprietary underlay, while keeping costs low. In such a scenario, Software Defined Networking (SDN), open hardware and open source software prove to be key components to address those challenges. After one year of development, SDX-L2 and BoD, the SDN-ization of the G\'EANT Open and Bandwidth on Demand (BoD) services, have been brought to the pilot status and G\'EANT is now testing the outcomes on its operational network. In this demonstration, we show BoD and SDX-L2 "going live" at the G\'EANT production infrastructure. The pilots run on the same underlay infrastructure thanks to the virtualization capabilities of the network devices. Provisioning of the services is covered during the demo. In the final steps of the demonstration, we show how the infrastructure is able to automatically manage network events and how it remains operational in the case of fault events.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 07:34:42 GMT" } ]
2017-09-19T00:00:00
[ [ "Ventre", "Pier Luigi", "" ], [ "Ortiz", "Jordi", "" ], [ "Mendiola", "Alaitz", "" ], [ "Fernández", "Carolina", "" ], [ "Pavlidis", "Adam", "" ], [ "Sharma", "Pankaj", "" ], [ "Buscaglione", "Sebastiano", "" ], [ "Stamos", "Kostas", "" ], [ "Sevasti", "Afrodite", "" ], [ "Whittaker", "David", "" ] ]
new_dataset
0.968436
1709.05865
Shubham Dham
Shubham Dham, Anirudh Sharma, Abhinav Dhall
Depression Scale Recognition from Audio, Visual and Text Analysis
null
null
null
null
cs.CV cs.LG cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Depression is a major mental health disorder that is rapidly affecting lives worldwide. Depression not only impacts emotional but also physical and psychological state of the person. Its symptoms include lack of interest in daily activities, feeling low, anxiety, frustration, loss of weight and even feeling of self-hatred. This report describes work done by us for Audio Visual Emotion Challenge (AVEC) 2017 during our second year BTech summer internship. With the increase in demand to detect depression automatically with the help of machine learning algorithms, we present our multimodal feature extraction and decision level fusion approach for the same. Features are extracted by processing on the provided Distress Analysis Interview Corpus-Wizard of Oz (DAIC-WOZ) database. Gaussian Mixture Model (GMM) clustering and Fisher vector approach were applied on the visual data; statistical descriptors on gaze, pose; low level audio features and head pose and text features were also extracted. Classification is done on fused as well as independent features using Support Vector Machine (SVM) and neural networks. The results obtained were able to cross the provided baseline on validation data set by 17% on audio features and 24.5% on video features.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 11:26:01 GMT" } ]
2017-09-19T00:00:00
[ [ "Dham", "Shubham", "" ], [ "Sharma", "Anirudh", "" ], [ "Dhall", "Abhinav", "" ] ]
new_dataset
0.999519
1709.05943
Alexander Wong
Mohammad Javad Shafiee, Brendan Chywl, Francis Li, and Alexander Wong
Fast YOLO: A Fast You Only Look Once System for Real-time Embedded Object Detection in Video
null
null
null
null
cs.CV cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object detection is considered one of the most challenging problems in this field of computer vision, as it involves the combination of object classification and object localization within a scene. Recently, deep neural networks (DNNs) have been demonstrated to achieve superior object detection performance compared to other approaches, with YOLOv2 (an improved You Only Look Once model) being one of the state-of-the-art in DNN-based object detection methods in terms of both speed and accuracy. Although YOLOv2 can achieve real-time performance on a powerful GPU, it still remains very challenging for leveraging this approach for real-time object detection in video on embedded computing devices with limited computational power and limited memory. In this paper, we propose a new framework called Fast YOLO, a fast You Only Look Once framework which accelerates YOLOv2 to be able to perform object detection in video on embedded devices in a real-time manner. First, we leverage the evolutionary deep intelligence framework to evolve the YOLOv2 network architecture and produce an optimized architecture (referred to as O-YOLOv2 here) that has 2.8X fewer parameters with just a ~2% IOU drop. To further reduce power consumption on embedded devices while maintaining performance, a motion-adaptive inference method is introduced into the proposed Fast YOLO framework to reduce the frequency of deep inference with O-YOLOv2 based on temporal motion characteristics. Experimental results show that the proposed Fast YOLO framework can reduce the number of deep inferences by an average of 38.13%, and an average speedup of ~3.3X for objection detection in video compared to the original YOLOv2, leading Fast YOLO to run an average of ~18FPS on a Nvidia Jetson TX1 embedded system.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 13:57:16 GMT" } ]
2017-09-19T00:00:00
[ [ "Shafiee", "Mohammad Javad", "" ], [ "Chywl", "Brendan", "" ], [ "Li", "Francis", "" ], [ "Wong", "Alexander", "" ] ]
new_dataset
0.996549
1709.05961
Dai Huidong Dr.
Huidong Dai, Weiji He, Guohua Gu, Ling Ye, Tianyi Mao, and Qian Chen
Adaptive compressed 3D imaging based on wavelet trees and Hadamard multiplexing with a single photon counting detector
11 pages, 5 figures, 1 table
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Photon counting 3D imaging allows to obtain 3D images with single-photon sensitivity and sub-ns temporal resolution. However, it is challenging to scale to high spatial resolution. In this work, we demonstrate a photon counting 3D imaging technique with short-pulsed structured illumination and a single-pixel photon counting detector. The proposed multi-resolution photon counting 3D imaging technique acquires a high-resolution 3D image from a coarse image and edges at successfully finer resolution sampled by Hadamard multiplexing along the wavelet trees. The detected power is significantly increased thanks to the Hadamard multiplexing. Both the required measurements and the reconstruction time can be significantly reduced by performing wavelet-tree-based regions of edges predication and Hadamard demultiplexing, which makes the proposed technique suitable for scenes with high spatial resolution. The experimental results indicate that a 3D image at resolution up to 512*512 pixels can be acquired and retrieved with practical time as low as 17 seconds.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 02:23:36 GMT" } ]
2017-09-19T00:00:00
[ [ "Dai", "Huidong", "" ], [ "He", "Weiji", "" ], [ "Gu", "Guohua", "" ], [ "Ye", "Ling", "" ], [ "Mao", "Tianyi", "" ], [ "Chen", "Qian", "" ] ]
new_dataset
0.986083
1709.05979
Giovanni Zini
Maria Montanucci, Marco Timpanella, Giovanni Zini
AG codes and AG quantum codes from cyclic extensions of the Suzuki and Ree curves
arXiv admin note: text overlap with arXiv:1703.03178
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate several types of linear codes constructed from two families $\tilde{\mathcal S}_q$ and $\tilde{\mathcal R}_q$ of maximal curves over finite fields recently constructed by Skabelund as cyclic covers of the Suzuki and Ree curves. Plane models for such curves are provided, and the Weierstrass semigroup $H(P)$ at an $\mathbb{F}_{q}$-rational point $P$ is shown to be symmetric.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 17:34:09 GMT" } ]
2017-09-19T00:00:00
[ [ "Montanucci", "Maria", "" ], [ "Timpanella", "Marco", "" ], [ "Zini", "Giovanni", "" ] ]
new_dataset
0.989296
1709.06002
Abdelhadi Azzouni
Abdelhadi Azzouni, Raouf Boutaba, and Guy Pujolle
NeuRoute: Predictive Dynamic Routing for Software-Defined Networks
Accepted for CNSM 2017
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces NeuRoute, a dynamic routing framework for Software Defined Networks (SDN) entirely based on machine learning, specifically, Neural Networks. Current SDN/OpenFlow controllers use a default routing based on Dijkstra algorithm for shortest paths, and provide APIs to develop custom routing applications. NeuRoute is a controller-agnostic dynamic routing framework that (i) predicts traffic matrix in real time, (ii) uses a neural network to learn traffic characteristics and (iii) generates forwarding rules accordingly to optimize the network throughput. NeuRoute achieves the same results as the most efficient dynamic routing heuristic but in much less execution time.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 15:17:50 GMT" } ]
2017-09-19T00:00:00
[ [ "Azzouni", "Abdelhadi", "" ], [ "Boutaba", "Raouf", "" ], [ "Pujolle", "Guy", "" ] ]
new_dataset
0.995149
1709.06049
Simon Hangl
Simon Hangl and Andreas Mennel and Justus Piater
A novel Skill-based Programming Paradigm based on Autonomous Playing and Skill-centric Testing
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a novel paradigm for robot pro- gramming with which we aim to make robot programming more accessible for unexperienced users. In order to do so we incorporate two major components in one single framework: autonomous skill acquisition by robotic playing and visual programming. Simple robot program skeletons solving a task for one specific situation, so-called basic behaviours, are provided by the user. The robot then learns how to solve the same task in many different situations by autonomous playing which reduces the barrier for unexperienced robot programmers. Programmers can use a mix of visual programming and kinesthetic teaching in order to provide these simple program skeletons. The robot program can be implemented interactively by programming parts with visual programming and kinesthetic teaching. We further integrate work on experience-based skill-centric robot software testing which enables the user to continuously test implemented skills without having to deal with the details of specific components.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 17:12:14 GMT" } ]
2017-09-19T00:00:00
[ [ "Hangl", "Simon", "" ], [ "Mennel", "Andreas", "" ], [ "Piater", "Justus", "" ] ]
new_dataset
0.970445
1709.06067
Michael Jones
Michael Jones and Kevin Seppi
Sculpt, Deploy, Repeat: Fast Prototyping of Interactive Physical Objects
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Building a deployable PhysiComp that merges form and function typically involves a significant investment of time and skill in digital electronics, 3D modeling and mechanical design. We aim to help designers quickly create prototypes by removing technical barriers in that process. Other methods for constructing PhysiComp prototypes either lack fidelity in representing shape and function or are confined to use in the studio next to a workstation, camera or projector system. Software 3D CAD tools can be used to design the shape but do not provide immediate tactile feedback on fit and feel. In this work, sculpting around 3D printed replicas of electronics combines electronics and form in a fluid design environment. The sculptures are scanned, modified for assembly and then printed on a 3D printer. Using this process, functional prototypes can be created with about 4 hours of focused effort over a day and a half with most of that time spent waiting for the 3D printer. The process lends itself to concurrent exploration of several designs and to rapid iteration. This allows the design process to converge quickly to a PhysiComp that is comfortable and useful.
[ { "version": "v1", "created": "Mon, 18 Sep 2017 17:44:23 GMT" } ]
2017-09-19T00:00:00
[ [ "Jones", "Michael", "" ], [ "Seppi", "Kevin", "" ] ]
new_dataset
0.999318
1511.06728
Natalia Neverova
Natalia Neverova, Christian Wolf, Florian Nebout, Graham Taylor
Hand Pose Estimation through Semi-Supervised and Weakly-Supervised Learning
13 pages, 10 figures, 4 tables
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for hand pose estimation based on a deep regressor trained on two different kinds of input. Raw depth data is fused with an intermediate representation in the form of a segmentation of the hand into parts. This intermediate representation contains important topological information and provides useful cues for reasoning about joint locations. The mapping from raw depth to segmentation maps is learned in a semi/weakly-supervised way from two different datasets: (i) a synthetic dataset created through a rendering pipeline including densely labeled ground truth (pixelwise segmentations); and (ii) a dataset with real images for which ground truth joint positions are available, but not dense segmentations. Loss for training on real images is generated from a patch-wise restoration process, which aligns tentative segmentation maps with a large dictionary of synthetic poses. The underlying premise is that the domain shift between synthetic and real data is smaller in the intermediate representation, where labels carry geometric and topological meaning, than in the raw input domain. Experiments on the NYU dataset show that the proposed training method decreases error on joints over direct regression of joints from depth data by 15.7%.
[ { "version": "v1", "created": "Fri, 20 Nov 2015 19:19:00 GMT" }, { "version": "v2", "created": "Wed, 8 Jun 2016 13:31:05 GMT" }, { "version": "v3", "created": "Thu, 9 Jun 2016 06:08:54 GMT" }, { "version": "v4", "created": "Fri, 15 Sep 2017 09:24:57 GMT" } ]
2017-09-18T00:00:00
[ [ "Neverova", "Natalia", "" ], [ "Wolf", "Christian", "" ], [ "Nebout", "Florian", "" ], [ "Taylor", "Graham", "" ] ]
new_dataset
0.974097
1606.01038
Michele Luvisotto
Michele Luvisotto, Alireza Sadeghi, Farshad Lahouti, Stefano Vitturi, Michele Zorzi
RCFD: A Novel Channel Access Scheme for Full-Duplex Wireless Networks Based on Contention in Time and Frequency Domains
Submitted at IEEE Transactions on Mobile Computing. arXiv admin note: text overlap with arXiv:1605.09716
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the last years, the advancements in signal processing and integrated circuits technology allowed several research groups to develop working prototypes of in-band full-duplex wireless systems. The introduction of such a revolutionary concept is promising in terms of increasing network performance, but at the same time poses several new challenges, especially at the MAC layer. Consequently, innovative channel access strategies are needed to exploit the opportunities provided by full-duplex while dealing with the increased complexity derived from its adoption. In this direction, this paper proposes RTS/CTS in the Frequency Domain (RCFD), a MAC layer scheme for full-duplex ad hoc wireless networks, based on the idea of time-frequency channel contention. According to this approach, different OFDM subcarriers are used to coordinate how nodes access the shared medium. The proposed scheme leads to efficient transmission scheduling with the result of avoiding collisions and exploiting full-duplex opportunities. The considerable performance improvements with respect to standard and state-of-the-art MAC protocols for wireless networks are highlighted through both theoretical analysis and network simulations.
[ { "version": "v1", "created": "Fri, 3 Jun 2016 10:42:35 GMT" }, { "version": "v2", "created": "Fri, 15 Sep 2017 13:07:56 GMT" } ]
2017-09-18T00:00:00
[ [ "Luvisotto", "Michele", "" ], [ "Sadeghi", "Alireza", "" ], [ "Lahouti", "Farshad", "" ], [ "Vitturi", "Stefano", "" ], [ "Zorzi", "Michele", "" ] ]
new_dataset
0.995735
1609.05511
Dafydd Gibbon
Dafydd Gibbon and Sascha Griffiths
Multilinear Grammar: Ranks and Interpretations
45 pages, 10 figures. In press, journal Open Linguistics (de Gruyter Open), proofread and corrected version
Open Linguistics 2017, 3(1): 265-307
10.1515/opli-2017-0014
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multilinear Grammar provides a framework for integrating the many different syntagmatic structures of language into a coherent semiotically based Rank Interpretation Architecture, with default linear grammars at each rank. The architecture defines a Sui Generis Condition on ranks, from discourse through utterance and phrasal structures to the word, with its sub-ranks of morphology and phonology. Each rank has unique structures and its own semantic-pragmatic and prosodic-phonetic interpretation models. Default computational models for each rank are proposed, based on a Procedural Plausibility Condition: incremental processing in linear time with finite working memory. We suggest that the Rank Interpretation Architecture and its multilinear properties provide systematic design features of human languages, contrasting with unordered lists of key properties or single structural properties at one rank, such as recursion, which have previously been been put forward as language design features. The framework provides a realistic background for the gradual development of complexity in the phylogeny and ontogeny of language, and clarifies a range of challenges for the evaluation of realistic linguistic theories and applications. The empirical objective of the paper is to demonstrate unique multilinear properties at each rank and thereby motivate the Multilinear Grammar and Rank Interpretation Architecture framework as a coherent approach to capturing the complexity of human languages in the simplest possible way.
[ { "version": "v1", "created": "Sun, 18 Sep 2016 16:29:20 GMT" }, { "version": "v2", "created": "Sun, 9 Oct 2016 14:07:26 GMT" }, { "version": "v3", "created": "Tue, 11 Oct 2016 13:14:19 GMT" }, { "version": "v4", "created": "Mon, 10 Jul 2017 23:00:53 GMT" }, { "version": "v5", "created": "Sun, 27 Aug 2017 21:29:55 GMT" } ]
2017-09-18T00:00:00
[ [ "Gibbon", "Dafydd", "" ], [ "Griffiths", "Sascha", "" ] ]
new_dataset
0.994058
1610.04378
Seok-Ho Chang
Meesue Shin, Laura Toni, Sang-Hyo Kim, and Seok-Ho Chang
Joint Source, Channel and Space-time Coding of Progressive Sources in MIMO Systems
some errors in section III
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The optimization of joint source and channel coding for a sequence of numerous progressive packets is a challenging problem. Further, the problem becomes more complicated if the space-time coding is also involved with the optimization in a multiple-input multiple-output (MIMO) system. This is because the number of ways of jointly assigning channels codes and space-time codes to progressive packets is much larger than that of solely assigning channel codes to the packets. We are unaware of any feasible and complete solution for such optimization of joint source, channel, and space-time coding of progressive packets. This paper applies a parametric approach to address that complex joint optimization problem in a MIMO system. We use the parametric methodology to derive some useful theoretical results, and then exploit those results to propose an optimization method where the joint assignment of channel codes and space-time codes to the packets can be optimized in a packet-by-packet manner. As a result, the computational complexity of the optimization is exponentially reduced, compared to the conventional exhaustive search. The numerical results show that the proposed method significantly improves the peak-signal-to-noise ratio performance of the rate-based optimal solution in a MIMO system.
[ { "version": "v1", "created": "Fri, 14 Oct 2016 09:09:59 GMT" }, { "version": "v2", "created": "Thu, 14 Sep 2017 19:55:15 GMT" } ]
2017-09-18T00:00:00
[ [ "Shin", "Meesue", "" ], [ "Toni", "Laura", "" ], [ "Kim", "Sang-Hyo", "" ], [ "Chang", "Seok-Ho", "" ] ]
new_dataset
0.999074
1612.00967
Minjia Shi
Minjia Shi, Yue Guan, Patrick Sole
Two new families of two-weight codes
7 pages
IEEE Transactions on Information Theory, Volume: 63, Issue: 10, pp. 6240-6246, Oct. 2017
10.1109/TIT.2017.2742499
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct two new infinite families of trace codes of dimension $2m$, over the ring $\mathbb{F}_p+u\mathbb{F}_p,$ when $p$ is an odd prime. They have the algebraic structure of abelian codes. Their Lee weight distribution is computed by using Gauss sums. By Gray mapping, we obtain two infinite families of linear $p$-ary codes of respective lengths $(p^m-1)^2$ and $2(p^m-1)^2.$ When $m$ is singly-even, the first family gives five-weight codes. When $m$ is odd, and $p\equiv 3 \pmod{4},$ the first family yields $p$-ary two-weight codes, which are shown to be optimal by application of the Griesmer bound. The second family consists of two-weight codes that are shown to be optimal, by the Griesmer bound, whenever $p=3$ and $m \ge 3,$ or $p\ge 5$ and $m\ge 4.$ Applications to secret sharing schemes are given.
[ { "version": "v1", "created": "Sat, 3 Dec 2016 13:27:27 GMT" }, { "version": "v2", "created": "Fri, 15 Sep 2017 04:57:37 GMT" } ]
2017-09-18T00:00:00
[ [ "Shi", "Minjia", "" ], [ "Guan", "Yue", "" ], [ "Sole", "Patrick", "" ] ]
new_dataset
0.998424
1709.04969
Fred Morstatter
Fred Morstatter, Kai Shu, Suhang Wang, and Huan Liu
Cross-Platform Emoji Interpretation: Analysis, a Solution, and Applications
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most social media platforms are largely based on text, and users often write posts to describe where they are, what they are seeing, and how they are feeling. Because written text lacks the emotional cues of spoken and face-to-face dialogue, ambiguities are common in written language. This problem is exacerbated in the short, informal nature of many social media posts. To bypass this issue, a suite of special characters called "emojis," which are small pictograms, are embedded within the text. Many emojis are small depictions of facial expressions designed to help disambiguate the emotional meaning of the text. However, a new ambiguity arises in the way that emojis are rendered. Every platform (Windows, Mac, and Android, to name a few) renders emojis according to their own style. In fact, it has been shown that some emojis can be rendered so differently that they look "happy" on some platforms, and "sad" on others. In this work, we use real-world data to verify the existence of this problem. We verify that the usage of the same emoji can be significantly different across platforms, with some emojis exhibiting different sentiment polarities on different platforms. We propose a solution to identify the intended emoji based on the platform-specific nature of the emoji used by the author of a social media post. We apply our solution to sentiment analysis, a task that can benefit from the emoji calibration technique we use in this work. We conduct experiments to evaluate the effectiveness of the mapping in this task.
[ { "version": "v1", "created": "Thu, 14 Sep 2017 20:28:27 GMT" } ]
2017-09-18T00:00:00
[ [ "Morstatter", "Fred", "" ], [ "Shu", "Kai", "" ], [ "Wang", "Suhang", "" ], [ "Liu", "Huan", "" ] ]
new_dataset
0.997831
1709.05065
Behzad Mahaseni
Behzad Mahaseni, Nabhan D. Salih
Asian Stamps Identification and Classification System
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problem of stamp recognition. The goal is to classify a given stamp to a certain country and also identify the year it is published. We propose a new approach for stamp recognition based on describing a given stamp image using color information and texture information. For color information we use color histogram for the entire image and for texture we use two features. SIFT which is based on local feature descriptors and HOG which is a dens texture descriptor. As a result on total we have three different types of features. Our initial evaluation shows that give these information we are able to classify the images with a reasonable accuracy.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 05:38:13 GMT" } ]
2017-09-18T00:00:00
[ [ "Mahaseni", "Behzad", "" ], [ "Salih", "Nabhan D.", "" ] ]
new_dataset
0.997907
1709.05070
S\'ebastien Arnold
S\'ebastien M. R. Arnold, Tsam Kiu Pun, Th\'eo-Tim J. Denisart and Francisco J. Valero-Cuevas
Shapechanger: Environments for Transfer Learning
Presented at the SoCal 2017 Robotics Symposium
null
null
null
cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Shapechanger, a library for transfer reinforcement learning specifically designed for robotic tasks. We consider three types of knowledge transfer---from simulation to simulation, from simulation to real, and from real to real---and a wide range of tasks with continuous states and actions. Shapechanger is under active development and open-sourced at: https://github.com/seba-1511/shapechanger/.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 06:44:19 GMT" } ]
2017-09-18T00:00:00
[ [ "Arnold", "Sébastien M. R.", "" ], [ "Pun", "Tsam Kiu", "" ], [ "Denisart", "Théo-Tim J.", "" ], [ "Valero-Cuevas", "Francisco J.", "" ] ]
new_dataset
0.995348
1709.05161
Kamil Senel
Kamil Senel and Erik G. Larsson
Device Activity and Embedded Information Bit Detection Using AMP in Massive MIMO
Accepted for publication in GC'17 Workshops - LSASLUB
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Future cellular networks will support a massive number of devices as a result of emerging technologies such as Internet-of-Things and sensor networks. Enhanced by machine type communication (MTC), low-power low-complex devices in the order of billions are projected to receive service from cellular networks. Contrary to traditional networks which are designed to handle human driven traffic, future networks must cope with MTC based systems that exhibit sparse traffic properties, operate with small packets and contain a large number of devices. Such a system requires smarter control signaling schemes for efficient use of system resources. In this work, we consider a grant-free random access cellular network and propose an approach which jointly detects user activity and single information bit per packet. The proposed approach is inspired by the approximate message passing (AMP) and demonstrates a superior performance compared to the original AMP approach. Furthermore, the numerical analysis reveals that the performance of the proposed approach scales with number of devices, which makes it suitable for user detection in cellular networks with massive number of devices.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 11:40:15 GMT" } ]
2017-09-18T00:00:00
[ [ "Senel", "Kamil", "" ], [ "Larsson", "Erik G.", "" ] ]
new_dataset
0.998344
1709.05214
S. M. Hossein Tabatabaei Yazdi
S. M. Hossein Tabatabaei Yazdi, Han Mao Kiah, Ryan Gabrys, Olgica Milenkovic
Mutually Uncorrelated Primers for DNA-Based Data Storage
14 pages, 3 figures, 1 Table. arXiv admin note: text overlap with arXiv:1601.08176
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the notion of weakly mutually uncorrelated (WMU) sequences, motivated by applications in DNA-based data storage systems and for synchronization of communication devices. WMU sequences are characterized by the property that no sufficiently long suffix of one sequence is the prefix of the same or another sequence. WMU sequences used for primer design in DNA-based data storage systems are also required to be at large mutual Hamming distance from each other, have balanced compositions of symbols, and avoid primer-dimer byproducts. We derive bounds on the size of WMU and various constrained WMU codes and present a number of constructions for balanced, error-correcting, primer-dimer free WMU codes using Dyck paths, prefix-synchronized and cyclic codes.
[ { "version": "v1", "created": "Wed, 13 Sep 2017 20:49:35 GMT" } ]
2017-09-18T00:00:00
[ [ "Yazdi", "S. M. Hossein Tabatabaei", "" ], [ "Kiah", "Han Mao", "" ], [ "Gabrys", "Ryan", "" ], [ "Milenkovic", "Olgica", "" ] ]
new_dataset
0.955522
1709.05281
Li Li
Li Li, Jun Gao, M\'ed\'eric Hurier, Pingfan Kong, Tegawend\'e F. Bissyand\'e, Alexandre Bartel, Jacques Klein, and Yves Le Traon
AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a growing collection of Android apps collected from several sources, including the official Google Play app market and a growing collection of various metadata of those collected apps aiming at facilitating the Android-relevant research works. Our dataset by far has collected over five million apps and over 20 types of metadata such as VirusTotal reports. Our objective of collecting this dataset is to contribute to ongoing research efforts, as well as to enable new potential research topics on Android Apps. By releasing our app and metadata set to the research community, we also aim at encouraging our fellow researchers to engage in reproducible experiments. This article will be continuously updated based on the growing apps and metadata collected in the AndroZoo project. If you have specific metadata that you want to collect from AndroZoo and which are not yet provided by far, please let us know. We will thereby prioritise it in our collecting process so as to provide it to our fellow researchers in a short manner.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 15:52:57 GMT" } ]
2017-09-18T00:00:00
[ [ "Li", "Li", "" ], [ "Gao", "Jun", "" ], [ "Hurier", "Médéric", "" ], [ "Kong", "Pingfan", "" ], [ "Bissyandé", "Tegawendé F.", "" ], [ "Bartel", "Alexandre", "" ], [ "Klein", "Jacques", "" ], [ "Traon", "Yves Le", "" ] ]
new_dataset
0.999825
1709.05291
Salvador Tamarit
David Insa, Sergio P\'erez, Josep Silva and Salvador Tamarit
Erlang Code Evolution Control
Pre-proceedings paper presented at the 27th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2017), Namur, Belgium, 10-12 October 2017 (arXiv:1708.07854)
null
null
LOPSTR/2017/26
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
During the software lifecycle, a program can evolve several times for different reasons such as the optimisation of a bottle-neck, the refactoring of an obscure function, etc. These code changes often involve several functions or modules, so it can be difficult to know whether the correct behaviour of the previous releases has been preserved in the new release. Most developers rely on a previously defined test suite to check this behaviour preservation. We propose here an alternative approach to automatically obtain a test suite that specifically focusses on comparing the old and new versions of the code. Our test case generation is directed by a sophisticated combination of several already existing tools such as TypEr, CutEr, and PropEr; and other ideas such as allowing the programmer to chose an expression of interest that must preserve the behaviour, or the recording of the sequences of values to which this expression is evaluated. All the presented work has been implemented in an open-source tool that is publicly available on GitHub.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 16:19:40 GMT" } ]
2017-09-18T00:00:00
[ [ "Insa", "David", "" ], [ "Pérez", "Sergio", "" ], [ "Silva", "Josep", "" ], [ "Tamarit", "Salvador", "" ] ]
new_dataset
0.990613
1709.05305
Shereen Oraby
Shereen Oraby, Vrindavan Harrison, Amita Misra, Ellen Riloff, and Marilyn Walker
Are you serious?: Rhetorical Questions and Sarcasm in Social Media Dialog
10 pages, 1 figure, SIGDIAL 2016
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Effective models of social dialog must understand a broad range of rhetorical and figurative devices. Rhetorical questions (RQs) are a type of figurative language whose aim is to achieve a pragmatic goal, such as structuring an argument, being persuasive, emphasizing a point, or being ironic. While there are computational models for other forms of figurative language, rhetorical questions have received little attention to date. We expand a small dataset from previous work, presenting a corpus of 10,270 RQs from debate forums and Twitter that represent different discourse functions. We show that we can clearly distinguish between RQs and sincere questions (0.76 F1). We then show that RQs can be used both sarcastically and non-sarcastically, observing that non-sarcastic (other) uses of RQs are frequently argumentative in forums, and persuasive in tweets. We present experiments to distinguish between these uses of RQs using SVM and LSTM models that represent linguistic features and post-level context, achieving results as high as 0.76 F1 for "sarcastic" and 0.77 F1 for "other" in forums, and 0.83 F1 for both "sarcastic" and "other" in tweets. We supplement our quantitative experiments with an in-depth characterization of the linguistic variation in RQs.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 16:54:02 GMT" } ]
2017-09-18T00:00:00
[ [ "Oraby", "Shereen", "" ], [ "Harrison", "Vrindavan", "" ], [ "Misra", "Amita", "" ], [ "Riloff", "Ellen", "" ], [ "Walker", "Marilyn", "" ] ]
new_dataset
0.999087
1709.05324
Stuart Gibson
Fangliang Bai, Manuel J. Marques and Stuart J. Gibson
Cystoid macular edema segmentation of Optical Coherence Tomography images using fully convolutional neural networks and fully connected CRFs
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new method for cystoid macular edema (CME) segmentation in retinal Optical Coherence Tomography (OCT) images, using a fully convolutional neural network (FCN) and a fully connected conditional random fields (dense CRFs). As a first step, the framework trains the FCN model to extract features from retinal layers in OCT images, which exhibit CME, and then segments CME regions using the trained model. Thereafter, dense CRFs are used to refine the segmentation according to the edema appearance. We have trained and tested the framework with OCT images from 10 patients with diabetic macular edema (DME). Our experimental results show that fluid and concrete macular edema areas were segmented with good adherence to boundaries. A segmentation accuracy of $0.61\pm 0.21$ (Dice coefficient) was achieved, with respect to the ground truth, which compares favourably with the previous state-of-the-art that used a kernel regression based method ($0.51\pm 0.34$). Our approach is versatile and we believe it can be easily adapted to detect other macular defects.
[ { "version": "v1", "created": "Fri, 15 Sep 2017 17:33:19 GMT" } ]
2017-09-18T00:00:00
[ [ "Bai", "Fangliang", "" ], [ "Marques", "Manuel J.", "" ], [ "Gibson", "Stuart J.", "" ] ]
new_dataset
0.994111
1510.01397
Christopher Moll\'en
Christopher Moll\'en, Erik G. Larsson, Thomas Eriksson
Waveforms for the Massive MIMO Downlink: Amplifier Efficiency, Distortion and Performance
null
IEEE Transactions on Communications, vol. 64, no. 12, pp. 5050-5063, Dec. 2016
10.1109/TCOMM.2016.2557781
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In massive MIMO, most precoders result in downlink signals that suffer from high PAR, independently of modulation order and whether single-carrier or OFDM transmission is used. The high PAR lowers the power efficiency of the base station amplifiers. To increase power efficiency, low-PAR precoders have been proposed. In this article, we compare different transmission schemes for massive MIMO in terms of the power consumed by the amplifiers. It is found that (i) OFDM and single-carrier transmission have the same performance over a hardened massive MIMO channel and (ii) when the higher amplifier power efficiency of low-PAR precoding is taken into account, conventional and low-PAR precoders lead to approximately the same power consumption. Since downlink signals with low PAR allow for simpler and cheaper hardware, than signals with high PAR, therefore, the results suggest that low-PAR precoding with either single-carrier or OFDM transmission should be used in a massive MIMO base station.
[ { "version": "v1", "created": "Mon, 5 Oct 2015 23:29:49 GMT" } ]
2017-09-15T00:00:00
[ [ "Mollén", "Christopher", "" ], [ "Larsson", "Erik G.", "" ], [ "Eriksson", "Thomas", "" ] ]
new_dataset
0.979495
1602.01792
Kunho Kim
Kunho Kim, Madian Khabsa, C. Lee Giles
Random Forest DBSCAN for USPTO Inventor Name Disambiguation
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Name disambiguation and the subsequent name conflation are essential for the correct processing of person name queries in a digital library or other database. It distinguishes each unique person from all other records in the database. We study inventor name disambiguation for a patent database using methods and features from earlier work on author name disambiguation and propose a feature set appropriate for a patent database. A random forest was selected for the pairwise linking classifier since they outperform Naive Bayes, Logistic Regression, Support Vector Machines (SVM), Conditional Inference Tree, and Decision Trees. Blocking size, very important for scaling, was selected based on experiments that determined feature importance and accuracy. The DBSCAN algorithm is used for clustering records, using a distance function derived from random forest classifier. For additional scalability clustering was parallelized. Tests on the USPTO patent database show that our method successfully disambiguated 12 million inventor mentions within 6.5 hours. Evaluation on datasets from USPTO PatentsView inventor name disambiguation competition shows our algorithm outperforms all algorithms in the competition.
[ { "version": "v1", "created": "Thu, 4 Feb 2016 19:00:30 GMT" }, { "version": "v2", "created": "Mon, 25 Apr 2016 20:22:34 GMT" }, { "version": "v3", "created": "Thu, 16 Jun 2016 16:50:33 GMT" }, { "version": "v4", "created": "Thu, 14 Sep 2017 14:25:22 GMT" } ]
2017-09-15T00:00:00
[ [ "Kim", "Kunho", "" ], [ "Khabsa", "Madian", "" ], [ "Giles", "C. Lee", "" ] ]
new_dataset
0.990759
1708.07313
S.M. Riazul Islam PhD
S. M. Riazul Islam, Farman Ali, Hyeonjoon Moon, and Kyung-Sup Kwak
Secure Channel for Molecular Communications
4 pages, 5 figures, ICTC 2017
null
null
null
cs.IT cs.CR cs.ET math.IT
http://creativecommons.org/licenses/by/4.0/
Molecular communication in nanonetworks is an emerging communication paradigm that uses molecules as information carriers. Achieving a secure information exchange is one of the practical challenges that need to be considered to address the potential of molecular communications in nanonetworks. In this article, we have introduced secure channel into molecular communications to prevent eavesdropping. First, we propose a Diffie Hellman algorithm-based method by which communicating nanomachines can exchange a secret key through molecular signaling. Then, we use this secret key to perform ciphering. Also, we present both the algorithm for secret key exchange and the secured molecular communication system. The proposed secured system is found effective in terms of energy consumption.
[ { "version": "v1", "created": "Thu, 24 Aug 2017 08:48:07 GMT" }, { "version": "v2", "created": "Thu, 14 Sep 2017 12:02:35 GMT" } ]
2017-09-15T00:00:00
[ [ "Islam", "S. M. Riazul", "" ], [ "Ali", "Farman", "" ], [ "Moon", "Hyeonjoon", "" ], [ "Kwak", "Kyung-Sup", "" ] ]
new_dataset
0.999364