id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1709.04553
Yingfei Wang
Yingfei Wang, Warren Powell
MOLTE: a Modular Optimal Learning Testing Environment
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the relative paucity of empirical testing of learning algorithms (of any type) by introducing a new public-domain, Modular, Optimal Learning Testing Environment (MOLTE) for Bayesian ranking and selection problem, stochastic bandits or sequential experimental design problems. The Matlab-based simulator allows the comparison of a number of learning policies (represented as a series of .m modules) in the context of a wide range of problems (each represented in its own .m module) which makes it easy to add new algorithms and new test problems. State-of-the-art policies and various problem classes are provided in the package. The choice of problems and policies is guided through a spreadsheet-based interface. Different graphical metrics are included. MOLTE is designed to be compatible with parallel computing to scale up from local desktop to clusters and clouds. We offer MOLTE as an easy-to-use tool for the research community that will make it possible to perform much more comprehensive testing, spanning a broader selection of algorithms and test problems. We demonstrate the capabilities of MOLTE through a series of comparisons of policies on a starter library of test problems. We also address the problem of tuning and constructing priors that have been largely overlooked in optimal learning literature. We envision MOLTE as a modest spur to provide researchers an easy environment to study interesting questions involved in optimal learning.
[ { "version": "v1", "created": "Wed, 13 Sep 2017 22:05:01 GMT" } ]
2017-09-15T00:00:00
[ [ "Wang", "Yingfei", "" ], [ "Powell", "Warren", "" ] ]
new_dataset
0.990626
1709.04569
Abhinav Aggarwal
Abhinav Aggarwal, Mahdi Zamani, Mihai Christodorescu
REMOTEGATE: Incentive-Compatible Remote Configuration of Security Gateways
Working manuscript
null
null
null
cs.CR cs.DC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Imagine that a malicious hacker is trying to attack a server over the Internet and the server wants to block the attack packets as close to their point of origin as possible. However, the security gateway ahead of the source of attack is untrusted. How can the server block the attack packets through this gateway? In this paper, we introduce REMOTEGATE, a trustworthy mechanism for allowing any party (server) on the Internet to configure a security gateway owned by a second party, at a certain agreed upon reward that the former pays to the latter for its service. We take an interactive incentive-compatible approach, for the case when both the server and the gateway are rational, to devise a protocol that will allow the server to help the security gateway generate and deploy a policy rule that filters the attack packets before they reach the server. The server will reward the gateway only when the latter can successfully verify that it has generated and deployed the correct rule for the issue. This mechanism will enable an Internet-scale approach to improving security and privacy, backed by digital payment incentives.
[ { "version": "v1", "created": "Thu, 14 Sep 2017 00:12:15 GMT" } ]
2017-09-15T00:00:00
[ [ "Aggarwal", "Abhinav", "" ], [ "Zamani", "Mahdi", "" ], [ "Christodorescu", "Mihai", "" ] ]
new_dataset
0.989346
1709.04582
Minjia Shi
Minjia Shi, Zhongyi Zhang, Patrick Sole
Pisano period codes
10 pages, submitted on 9th, September
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The cyclic codes with parity check polynomial the reciprocal of the characteristic polynomial of the Fibonacci recurrence over a prime finite field are shown to have either one weight or two weights. When these codes are irreducible cyclic we obtain many counterexamples to the conjectural classification of two-weight irreducible cyclic codes of Schmidt and White (2002). When they are reducible and projective their duals are uniformly packed.
[ { "version": "v1", "created": "Thu, 14 Sep 2017 01:49:41 GMT" } ]
2017-09-15T00:00:00
[ [ "Shi", "Minjia", "" ], [ "Zhang", "Zhongyi", "" ], [ "Sole", "Patrick", "" ] ]
new_dataset
0.999459
1709.04711
Salvatore Pontarelli
Salvatore Pontarelli, Pedro Reviriego, Michael Mitzenmacher
EMOMA: Exact Match in One Memory Access
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important function in modern routers and switches is to perform a lookup for a key. Hash-based methods, and in particular cuckoo hash tables, are popular for such lookup operations, but for large structures stored in off-chip memory, such methods have the downside that they may require more than one off-chip memory access to perform the key lookup. Although the number of off-chip memory accesses can be reduced using on-chip approximate membership structures such as Bloom filters, some lookups may still require more than one off-chip memory access. This can be problematic for some hardware implementations, as having only a single off-chip memory access enables a predictable processing of lookups and avoids the need to queue pending requests. We provide a data structure for hash-based lookups based on cuckoo hashing that uses only one off-chip memory access per lookup, by utilizing an on-chip pre-filter to determine which of multiple locations holds a key. We make particular use of the flexibility to move elements within a cuckoo hash table to ensure the pre-filter always gives the correct response. While this requires a slightly more complex insertion procedure and some additional memory accesses during insertions, it is suitable for most packet processing applications where key lookups are much more frequent than insertions. An important feature of our approach is its simplicity. Our approach is based on simple logic that can be easily implemented in hardware, and hardware implementations would benefit most from the single off-chip memory access per lookup.
[ { "version": "v1", "created": "Thu, 14 Sep 2017 11:32:52 GMT" } ]
2017-09-15T00:00:00
[ [ "Pontarelli", "Salvatore", "" ], [ "Reviriego", "Pedro", "" ], [ "Mitzenmacher", "Michael", "" ] ]
new_dataset
0.998304
1709.04820
Damien Sileo
Damien Sileo, Camille Pradel, Philippe Muller, Tim Van de Cruys
Synapse at CAp 2017 NER challenge: Fasttext CRF
null
CAP2017
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present our system for the CAp 2017 NER challenge which is about named entity recognition on French tweets. Our system leverages unsupervised learning on a larger dataset of French tweets to learn features feeding a CRF model. It was ranked first without using any gazetteer or structured external data, with an F-measure of 58.89\%. To the best of our knowledge, it is the first system to use fasttext embeddings (which include subword representations) and an embedding-based sentence representation for NER.
[ { "version": "v1", "created": "Thu, 14 Sep 2017 14:44:30 GMT" } ]
2017-09-15T00:00:00
[ [ "Sileo", "Damien", "" ], [ "Pradel", "Camille", "" ], [ "Muller", "Philippe", "" ], [ "Van de Cruys", "Tim", "" ] ]
new_dataset
0.995439
1709.04881
Thomas K\"ohler
Thomas K\"ohler, Michel B\"atz, Farzad Naderi, Andr\'e Kaup, Andreas K. Maier, Christian Riess
Benchmarking Super-Resolution Algorithms on Real Data
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the past decades, various super-resolution (SR) techniques have been developed to enhance the spatial resolution of digital images. Despite the great number of methodical contributions, there is still a lack of comparative validations of SR under practical conditions, as capturing real ground truth data is a challenging task. Therefore, current studies are either evaluated 1) on simulated data or 2) on real data without a pixel-wise ground truth. To facilitate comprehensive studies, this paper introduces the publicly available Super-Resolution Erlangen (SupER) database that includes real low-resolution images along with high-resolution ground truth data. Our database comprises image sequences with more than 20k images captured from 14 scenes under various types of motions and photometric conditions. The datasets cover four spatial resolution levels using camera hardware binning. With this database, we benchmark 15 single-image and multi-frame SR algorithms. Our experiments quantitatively analyze SR accuracy and robustness under realistic conditions including independent object and camera motion or photometric variations.
[ { "version": "v1", "created": "Fri, 8 Sep 2017 21:44:29 GMT" } ]
2017-09-15T00:00:00
[ [ "Köhler", "Thomas", "" ], [ "Bätz", "Michel", "" ], [ "Naderi", "Farzad", "" ], [ "Kaup", "André", "" ], [ "Maier", "Andreas K.", "" ], [ "Riess", "Christian", "" ] ]
new_dataset
0.998304
1709.03596
Masud Mansuripur
Masud Mansuripur and Pramod Khulbe
Macro-molecular data storage with petabyte/cm^3 density, highly parallel read/write operations, and genuine 3D storage capability
11 pages, 10 figures, 13 references. arXiv admin note: substantial text overlap with arXiv: 1709.03568
Published in Optical Data Storage 2004, edited by B.V.K. Vijaya Kumar and Hiromichi Kobori; Proceedings of SPIE 5380, pp272-282 (2004)
10.1117/12.562434
null
cs.ET physics.app-ph physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Digital information can be encoded in the building-block sequence of macro-molecules, such as RNA and single-stranded DNA. Methods of "writing" and "reading" macromolecular strands are currently available, but they are slow and expensive. In an ideal molecular data storage system, routine operations such as write, read, erase, store, and transfer must be done reliably and at high speed within an integrated chip. As a first step toward demonstrating the feasibility of this concept, we report preliminary results of DNA readout experiments conducted in miniaturized chambers that are scalable to even smaller dimensions. We show that translocation of a single-stranded DNA molecule (consisting of 50 adenosine bases followed by 100 cytosine bases) through an ion-channel yields a characteristic signal that is attributable to the 2-segment structure of the molecule. We also examine the dependence of the rate and speed of molecular translocation on the adjustable parameters of the experiment.
[ { "version": "v1", "created": "Sat, 26 Aug 2017 22:28:05 GMT" } ]
2017-09-14T00:00:00
[ [ "Mansuripur", "Masud", "" ], [ "Khulbe", "Pramod", "" ] ]
new_dataset
0.998269
1709.04121
Yajing Chen
Yajing Chen, Shikui Tu, Yuqi Yi and Lei Xu
Sketch-pix2seq: a Model to Generate Sketches of Multiple Categories
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sketch is an important media for human to communicate ideas, which reflects the superiority of human intelligence. Studies on sketch can be roughly summarized into recognition and generation. Existing models on image recognition failed to obtain satisfying performance on sketch classification. But for sketch generation, a recent study proposed a sequence-to-sequence variational-auto-encoder (VAE) model called sketch-rnn which was able to generate sketches based on human inputs. The model achieved amazing results when asked to learn one category of object, such as an animal or a vehicle. However, the performance dropped when multiple categories were fed into the model. Here, we proposed a model called sketch-pix2seq which could learn and draw multiple categories of sketches. Two modifications were made to improve the sketch-rnn model: one is to replace the bidirectional recurrent neural network (BRNN) encoder with a convolutional neural network(CNN); the other is to remove the Kullback-Leibler divergence from the objective function of VAE. Experimental results showed that models with CNN encoders outperformed those with RNN encoders in generating human-style sketches. Visualization of the latent space illustrated that the removal of KL-divergence made the encoder learn a posterior of latent space that reflected the features of different categories. Moreover, the combination of CNN encoder and removal of KL-divergence, i.e., the sketch-pix2seq model, had better performance in learning and generating sketches of multiple categories and showed promising results in creativity tasks.
[ { "version": "v1", "created": "Wed, 13 Sep 2017 03:22:27 GMT" } ]
2017-09-14T00:00:00
[ [ "Chen", "Yajing", "" ], [ "Tu", "Shikui", "" ], [ "Yi", "Yuqi", "" ], [ "Xu", "Lei", "" ] ]
new_dataset
0.996582
1709.04184
Themistoklis Prodromakis
Alexantrou Serb, Ali Khiat, Themis Prodromakis
Charge-based computing with analogue reconfigurable gates
22 pages, 15 figures
null
null
null
cs.ET cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the world enters the age of ubiquitous computing, the need for reconfigurable hardware operating close to the fundamental limits of energy consumption becomes increasingly pressing. Simultaneously, scaling-driven performance improvements within the framework of traditional analogue and digital design become progressively more restricted by fundamental physical constraints. Thus, a true paradigm shift in electronics design is required for fuelling the next big burst in technology. Here we lay the foundations of a new design paradigm that fuses analogue and digital thinking by combining digital electronics with memristive devices for achieving charge-based computation; information processing where every dissipated charge counts. This is realised by introducing memristive devices into standard logic gates, thus rendering them reconfigurable and able to perform analogue computation at a power cost close to digital. The power of this concept is then showcased by experimentally demonstrating a hardware data clusterer and a fuzzy NAND gate using this principle.
[ { "version": "v1", "created": "Wed, 13 Sep 2017 08:36:39 GMT" } ]
2017-09-14T00:00:00
[ [ "Serb", "Alexantrou", "" ], [ "Khiat", "Ali", "" ], [ "Prodromakis", "Themis", "" ] ]
new_dataset
0.996746
1709.04291
Mary Katherine Heinrich
Heiko Hamann, Mohammad Divband Soorati, Mary Katherine Heinrich, Daniel Nicolas Hofstadler, Igor Kuksin, Frank Veenstra, Mostafa Wahby, Stig Anton Nielsen, Sebastian Risi, Tomasz Skrzypczak, Payam Zahadat, Przemyslaw Wojtaszek, Kasper St{\o}y, Thomas Schmickl, Serge Kernbach, Phil Ayres
Flora robotica -- An Architectural System Combining Living Natural Plants and Distributed Robots
16 pages, 12 figures
null
null
null
cs.ET cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Key to our project flora robotica is the idea of creating a bio-hybrid system of tightly coupled natural plants and distributed robots to grow architectural artifacts and spaces. Our motivation with this ground research project is to lay a principled foundation towards the design and implementation of living architectural systems that provide functionalities beyond those of orthodox building practice, such as self-repair, material accumulation and self-organization. Plants and robots work together to create a living organism that is inhabited by human beings. User-defined design objectives help to steer the directional growth of the plants, but also the system's interactions with its inhabitants determine locations where growth is prohibited or desired (e.g., partitions, windows, occupiable space). We report our plant species selection process and aspects of living architecture. A leitmotif of our project is the rich concept of braiding: braids are produced by robots from continuous material and serve as both scaffolds and initial architectural artifacts before plants take over and grow the desired architecture. We use light and hormones as attraction stimuli and far-red light as repelling stimulus to influence the plants. Applied sensors range from simple proximity sensing to detect the presence of plants to sophisticated sensing technology, such as electrophysiology and measurements of sap flow. We conclude by discussing our anticipated final demonstrator that integrates key features of flora robotica, such as the continuous growth process of architectural artifacts and self-repair of living architecture.
[ { "version": "v1", "created": "Wed, 13 Sep 2017 12:40:15 GMT" } ]
2017-09-14T00:00:00
[ [ "Hamann", "Heiko", "" ], [ "Soorati", "Mohammad Divband", "" ], [ "Heinrich", "Mary Katherine", "" ], [ "Hofstadler", "Daniel Nicolas", "" ], [ "Kuksin", "Igor", "" ], [ "Veenstra", "Frank", "" ], [ "Wahby", "Mostafa", "" ], [ "Nielsen", "Stig Anton", "" ], [ "Risi", "Sebastian", "" ], [ "Skrzypczak", "Tomasz", "" ], [ "Zahadat", "Payam", "" ], [ "Wojtaszek", "Przemyslaw", "" ], [ "Støy", "Kasper", "" ], [ "Schmickl", "Thomas", "" ], [ "Kernbach", "Serge", "" ], [ "Ayres", "Phil", "" ] ]
new_dataset
0.993853
1709.04322
Ankit Mondal
Ankit Mondal and Ankur Srivastava
Power Optimizations in MTJ-based Neural Networks through Stochastic Computing
Accepted in the 2017 IEEE/ACM International Conference on Low Power Electronics and Design
null
null
null
cs.NE cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Artificial Neural Networks (ANNs) have found widespread applications in tasks such as pattern recognition and image classification. However, hardware implementations of ANNs using conventional binary arithmetic units are computationally expensive, energy-intensive and have large area overheads. Stochastic Computing (SC) is an emerging paradigm which replaces these conventional units with simple logic circuits and is particularly suitable for fault-tolerant applications. Spintronic devices, such as Magnetic Tunnel Junctions (MTJs), are capable of replacing CMOS in memory and logic circuits. In this work, we propose an energy-efficient use of MTJs, which exhibit probabilistic switching behavior, as Stochastic Number Generators (SNGs), which forms the basis of our NN implementation in the SC domain. Further, error resilient target applications of NNs allow us to introduce Approximate Computing, a framework wherein accuracy of computations is traded-off for substantial reductions in power consumption. We propose approximating the synaptic weights in our MTJ-based NN implementation, in ways brought about by properties of our MTJ-SNG, to achieve energy-efficiency. We design an algorithm that can perform such approximations within a given error tolerance in a single-layer NN in an optimal way owing to the convexity of the problem formulation. We then use this algorithm and develop a heuristic approach for approximating multi-layer NNs. To give a perspective of the effectiveness of our approach, a 43% reduction in power consumption was obtained with less than 1% accuracy loss on a standard classification problem, with 26% being brought about by the proposed algorithm.
[ { "version": "v1", "created": "Thu, 17 Aug 2017 19:56:23 GMT" } ]
2017-09-14T00:00:00
[ [ "Mondal", "Ankit", "" ], [ "Srivastava", "Ankur", "" ] ]
new_dataset
0.974736
1709.04329
Longhui Wei
Longhui Wei, Shiliang Zhang, Hantao Yao, Wen Gao, Qi Tian
GLAD: Global-Local-Alignment Descriptor for Pedestrian Retrieval
Accepted by ACM MM2017, 9 pages, 5 figures
null
10.1145/3123266.3123279
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The huge variance of human pose and the misalignment of detected human images significantly increase the difficulty of person Re-Identification (Re-ID). Moreover, efficient Re-ID systems are required to cope with the massive visual data being produced by video surveillance systems. Targeting to solve these problems, this work proposes a Global-Local-Alignment Descriptor (GLAD) and an efficient indexing and retrieval framework, respectively. GLAD explicitly leverages the local and global cues in human body to generate a discriminative and robust representation. It consists of part extraction and descriptor learning modules, where several part regions are first detected and then deep neural networks are designed for representation learning on both the local and global regions. A hierarchical indexing and retrieval framework is designed to eliminate the huge redundancy in the gallery set, and accelerate the online Re-ID procedure. Extensive experimental results show GLAD achieves competitive accuracy compared to the state-of-the-art methods. Our retrieval framework significantly accelerates the online Re-ID procedure without loss of accuracy. Therefore, this work has potential to work better on person Re-ID tasks in real scenarios.
[ { "version": "v1", "created": "Wed, 13 Sep 2017 13:44:46 GMT" } ]
2017-09-14T00:00:00
[ [ "Wei", "Longhui", "" ], [ "Zhang", "Shiliang", "" ], [ "Yao", "Hantao", "" ], [ "Gao", "Wen", "" ], [ "Tian", "Qi", "" ] ]
new_dataset
0.969936
1701.08025
Magnus Andersson
Hanqing Zhang, Tim Stangner, Krister Wiklund, Alvaro Rodriguez, Magnus Andersson
UmUTracker: A versatile MATLAB program for automated particle tracking of 2D light microscopy or 3D digital holography data
Manuscript including supplementary materials
null
10.1016/j.cpc.2017.05.029
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a versatile and fast MATLAB program (UmUTracker) that automatically detects and tracks particles by analyzing video sequences acquired by either light microscopy or digital in-line holographic microscopy. Our program detects the 2D lateral positions of particles with an algorithm based on the isosceles triangle transform, and reconstructs their 3D axial positions by a fast implementation of the Rayleigh-Sommerfeld model using a radial intensity profile. To validate the accuracy and performance of our program, we first track the 2D position of polystyrene particles using bright field and digital holographic microscopy. Second, we determine the 3D particle position by analyzing synthetic and experimentally acquired holograms. Finally, to highlight the full program features, we profile the microfluidic flow in a 100 micrometer high flow chamber. This result agrees with computational fluid dynamic simulations. On a regular desktop computer UmUTracker can detect, analyze, and track multiple particles at 5 frames per second for a template size of 201 x 201 in a 1024 x 1024 image. To enhance usability and to make it easy to implement new functions we used object-oriented programming. UmUTracker is suitable for studies related to: particle dynamics, cell localization, colloids and microfluidic flow measurement.
[ { "version": "v1", "created": "Fri, 27 Jan 2017 12:20:45 GMT" }, { "version": "v2", "created": "Fri, 21 Apr 2017 08:53:23 GMT" } ]
2017-09-13T00:00:00
[ [ "Zhang", "Hanqing", "" ], [ "Stangner", "Tim", "" ], [ "Wiklund", "Krister", "" ], [ "Rodriguez", "Alvaro", "" ], [ "Andersson", "Magnus", "" ] ]
new_dataset
0.998085
1703.05401
Mohammad Mozaffari
Mohammad Mozaffari, Walid Saad, Mehdi Bennis, and Merouane Debbah
Mobile Unmanned Aerial Vehicles (UAVs) for Energy-Efficient Internet of Things Communications
Accepted in IEEE Transactions on Wireless Communications, Sept. 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the efficient deployment and mobility of multiple unmanned aerial vehicles (UAVs), used as aerial base stations to collect data from ground Internet of Things (IoT) devices, is investigated. In particular, to enable reliable uplink communications for IoT devices with a minimum total transmit power, a novel framework is proposed for jointly optimizing the three-dimensional (3D) placement and mobility of the UAVs, device-UAV association, and uplink power control. First, given the locations of active IoT devices at each time instant, the optimal UAVs' locations and associations are determined. Next, to dynamically serve the IoT devices in a time-varying network, the optimal mobility patterns of the UAVs are analyzed. To this end, based on the activation process of the IoT devices, the time instances at which the UAVs must update their locations are derived. Moreover, the optimal 3D trajectory of each UAV is obtained in a way that the total energy used for the mobility of the UAVs is minimized while serving the IoT devices. Simulation results show that, using the proposed approach, the total transmit power of the IoT devices is reduced by 45% compared to a case in which stationary aerial base stations are deployed. In addition, the proposed approach can yield a maximum of 28% enhanced system reliability compared to the stationary case. The results also reveal an inherent tradeoff between the number of update times, the mobility of the UAVs, and the transmit power of the IoT devices. In essence, a higher number of updates can lead to lower transmit powers for the IoT devices at the cost of an increased mobility for the UAVs.
[ { "version": "v1", "created": "Wed, 15 Mar 2017 21:59:45 GMT" }, { "version": "v2", "created": "Tue, 12 Sep 2017 16:45:13 GMT" } ]
2017-09-13T00:00:00
[ [ "Mozaffari", "Mohammad", "" ], [ "Saad", "Walid", "" ], [ "Bennis", "Mehdi", "" ], [ "Debbah", "Merouane", "" ] ]
new_dataset
0.984832
1707.04687
Abhronil Sengupta
Yong Shim, Shuhan Chen, Abhronil Sengupta, Kaushik Roy
Stochastic Spin-Orbit Torque Devices as Elements for Bayesian Inference
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probabilistic inference from real-time input data is becoming increasingly popular and may be one of the potential pathways at enabling cognitive intelligence. As a matter of fact, preliminary research has revealed that stochastic functionalities also underlie the spiking behavior of neurons in cortical microcircuits of the human brain. In tune with such observations, neuromorphic and other unconventional computing platforms have recently started adopting the usage of computational units that generate outputs probabilistically, depending on the magnitude of the input stimulus. In this work, we experimentally demonstrate a spintronic device that offers a direct mapping to the functionality of such a controllable stochastic switching element. We show that the probabilistic switching of Ta/CoFeB/MgO heterostructures in presence of spin-orbit torque and thermal noise can be harnessed to enable probabilistic inference in a plethora of unconventional computing scenarios. This work can potentially pave the way for hardware that directly mimics the computational units of Bayesian inference.
[ { "version": "v1", "created": "Sat, 15 Jul 2017 05:06:43 GMT" }, { "version": "v2", "created": "Mon, 11 Sep 2017 22:15:53 GMT" } ]
2017-09-13T00:00:00
[ [ "Shim", "Yong", "" ], [ "Chen", "Shuhan", "" ], [ "Sengupta", "Abhronil", "" ], [ "Roy", "Kaushik", "" ] ]
new_dataset
0.975442
1709.02901
Muhammad Ikram
Muhammad Ikram and Mohamed Ali Kaafar
A First Look at Ad Blocking Apps on Google Play
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online advertisers and analytics services (or trackers), are constantly tracking users activities as they access web services either through browsers or a mobile apps. Numerous tools such as browser plugins and specialized mobile apps have been proposed to limit intrusive advertisements and prevent tracking on desktop computing and mobile phones. For desktop computing, browser plugins are heavily studied for their usability and efficiency issues, however, tools that block ads and prevent trackers in mobile platforms, have received the least or no attention. In this paper, we present a first look at 97 Android adblocking apps (or adblockers), extracted from more than 1.5 million apps from Google Play, that promise to block advertisements and analytics services. With our data collection and analysis pipeline of the Android adblockers, we reveal the presences of third-party tracking libraries and sensitive permissions for critical resources on user mobile devices as well as have malware in the source codes. We analyze users' reviews for the in-effectiveness of adblockers in terms of not blocking ads and trackers. We found that a significant fraction of adblockers are not fulfilling their advertised functionality.
[ { "version": "v1", "created": "Sat, 9 Sep 2017 03:54:18 GMT" }, { "version": "v2", "created": "Tue, 12 Sep 2017 05:06:16 GMT" } ]
2017-09-13T00:00:00
[ [ "Ikram", "Muhammad", "" ], [ "Kaafar", "Mohamed Ali", "" ] ]
new_dataset
0.995457
1709.03496
{\L}ukasz Kidzi\'nski
{\L}ukasz Kidzi\'nski
SweetRS: Dataset for a recommender systems of sweets
2 pages, 1 figure
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Benchmarking recommender system and matrix completion algorithms could be greatly simplified if the entire matrix was known. We built a \url{sweetrs.org} platform with $77$ candies and sweets to rank. Over $2000$ users submitted over $44000$ grades resulting in a matrix with $28\%$ coverage. In this report, we give the full description of the environment and we benchmark the \textsc{Soft-Impute} algorithm on the dataset.
[ { "version": "v1", "created": "Sun, 10 Sep 2017 23:19:41 GMT" } ]
2017-09-13T00:00:00
[ [ "Kidziński", "Łukasz", "" ] ]
new_dataset
0.999795
1709.03562
Andrea Li
Andrea S. Li, Alistair E. W. Johnson, Roger G. Mark
False arrhythmia alarm reduction in the intensive care unit
10 pages, 5 tables, 5 figures
null
10.5281/zenodo.889036
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
Research has shown that false alarms constitute more than 80% of the alarms triggered in the intensive care unit (ICU). The high false arrhythmia alarm rate has severe implications such as disruption of patient care, caregiver alarm fatigue, and desensitization from clinical staff to real life-threatening alarms. A method to reduce the false alarm rate would therefore greatly benefit patients as well as nurses in their ability to provide care. We here develop and describe a robust false arrhythmia alarm reduction system for use in the ICU. Building off of work previously described in the literature, we make use of signal processing and machine learning techniques to identify true and false alarms for five arrhythmia types. This baseline algorithm alone is able to perform remarkably well, with a sensitivity of 0.908, a specificity of 0.838, and a PhysioNet/CinC challenge score of 0.756. We additionally explore dynamic time warping techniques on both the entire alarm signal as well as on a beat-by-beat basis in an effort to improve performance of ventricular tachycardia, which has in the literature been one of the hardest arrhythmias to classify. Such an algorithm with strong performance and efficiency could potentially be translated for use in the ICU to promote overall patient care and recovery.
[ { "version": "v1", "created": "Mon, 11 Sep 2017 19:57:12 GMT" } ]
2017-09-13T00:00:00
[ [ "Li", "Andrea S.", "" ], [ "Johnson", "Alistair E. W.", "" ], [ "Mark", "Roger G.", "" ] ]
new_dataset
0.994375
1709.03642
Huu-Hiep Nguyen
Hiep H. Nguyen
MeshCloak: A Map-Based Approach for Personalized Location Privacy
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Protecting location privacy in mobile services has recently received significant consideration as Location-Based Service (LBS) can reveal user locations to attackers. A problem in the existing cloaking schemes is that location vulnerabilities may be exposed when an attacker exploits a street map in their attacks. While both real and synthetic trajectories are based on real street maps, most of previous cloaking schemes assume free space movements to define the distance between users, resulting in the mismatch between privacy models and user movements. In this paper, we present MeshCloak, a novel map-based model for personalized location privacy, which is formulated entirely in map-based setting and resists inference attacks at a minimal performance overhead. The key idea of MeshCloak is to quickly build a sparse constraint graph based on the mutual coverage relationship between queries by pre-computing the distance matrix and applying quadtree search. MeshCloak also takes into account real speed profiles and query frequencies. We evaluate the efficiency and effectiveness of the proposed scheme via a suite of carefully designed experiments on five real maps.
[ { "version": "v1", "created": "Tue, 12 Sep 2017 01:18:53 GMT" } ]
2017-09-13T00:00:00
[ [ "Nguyen", "Hiep H.", "" ] ]
new_dataset
0.99706
1709.03643
Makar Plakhotnyk Volodymyrovych
Makar Plakhotnyk
A HelloWord \textsc{Bib}\negthinspace\TeX~stile file .\textbf{bst}
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A HelloWord \textsc{Bib}\negthinspace\TeX~stile file .\textbf{bst} is described
[ { "version": "v1", "created": "Tue, 12 Sep 2017 01:32:46 GMT" } ]
2017-09-13T00:00:00
[ [ "Plakhotnyk", "Makar", "" ] ]
new_dataset
0.999613
1709.03723
Navroz Charania
Navroz Firoz Charania, Mukesh Kumar Giluka, Bheemarjuna Reddy Tamma and Antony Franklin
DEARF: Delay and Energy Aware RAW Formation Scheme to Support Delay Sensitive M2M Traffic in IEEE 802.11ah Networks
Accepted in IEEE ANTS 2016
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The IEEE 802.11ah amendment is designed to support upto 8K M2M devices over the Sub-GHz channel. To achieve this, it introduces new modifications to the PHY and MAC layers. A dynamic Restricted Access Window~(RAW) mechanism is introduced at the MAC layer. RAW splits the access for different devices into small chunks of time. Using the RAW mechanism, we propose a novel Delay and Energy Aware RAW Formation (DEARF) scheme to support delay sensitive devices along with other delay tolerant devices. We exploit this to introduce four new RAWs. These new RAWs help split the access into contention free for delay sensitive devices and contention based for other devices. For scheduling resources between these devices, we give the DEARF resource allocation and evaluate the scheme with help of simulations. Devices suffer a higher delay but, at high loads, devices using the proposed scheme are able to save 30% energy per packet and upto 330% energy per device. Packet delivery ratio is 100% at low loads and 90% at high loads as compared to 95% and 27% given by the traditional access. Other delay tolerant devices save upto 16% on energy per packet transmitted and 23% on delay at high loads.
[ { "version": "v1", "created": "Tue, 12 Sep 2017 08:02:19 GMT" } ]
2017-09-13T00:00:00
[ [ "Charania", "Navroz Firoz", "" ], [ "Giluka", "Mukesh Kumar", "" ], [ "Tamma", "Bheemarjuna Reddy", "" ], [ "Franklin", "Antony", "" ] ]
new_dataset
0.997384
1709.03739
Tadashi Matsuo
Tadashi Matsuo, Nobutaka Shimada
Construction of Latent Descriptor Space and Inference Model of Hand-Object Interactions
null
IEICE Trans. on Info. and Sys., Vol.E100-D, No.6, pp.1350-1359, 2017
10.1587/transinf.2016EDP7410
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Appearance-based generic object recognition is a challenging problem because all possible appearances of objects cannot be registered, especially as new objects are produced every day. Function of objects, however, has a comparatively small number of prototypes. Therefore, function-based classification of new objects could be a valuable tool for generic object recognition. Object functions are closely related to hand-object interactions during handling of a functional object; i.e., how the hand approaches the object, which parts of the object and contact the hand, and the shape of the hand during interaction. Hand-object interactions are helpful for modeling object functions. However, it is difficult to assign discrete labels to interactions because an object shape and grasping hand-postures intrinsically have continuous variations. To describe these interactions, we propose the interaction descriptor space which is acquired from unlabeled appearances of human hand-object interactions. By using interaction descriptors, we can numerically describe the relation between an object's appearance and its possible interaction with the hand. The model infers the quantitative state of the interaction from the object image alone. It also identifies the parts of objects designed for hand interactions such as grips and handles. We demonstrate that the proposed method can unsupervisedly generate interaction descriptors that make clusters corresponding to interaction types. And also we demonstrate that the model can infer possible hand-object interactions.
[ { "version": "v1", "created": "Tue, 12 Sep 2017 08:34:23 GMT" } ]
2017-09-13T00:00:00
[ [ "Matsuo", "Tadashi", "" ], [ "Shimada", "Nobutaka", "" ] ]
new_dataset
0.982708
1709.03814
Josep Crego
Yongchao Deng, Jungi Kim, Guillaume Klein, Catherine Kobus, Natalia Segal, Christophe Servan, Bo Wang, Dakun Zhang, Josep Crego, Jean Senellart
SYSTRAN Purely Neural MT Engines for WMT2017
Published in WMT 2017
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes SYSTRAN's systems submitted to the WMT 2017 shared news translation task for English-German, in both translation directions. Our systems are built using OpenNMT, an open-source neural machine translation system, implementing sequence-to-sequence models with LSTM encoder/decoders and attention. We experimented using monolingual data automatically back-translated. Our resulting models are further hyper-specialised with an adaptation technique that finely tunes models according to the evaluation test sentences.
[ { "version": "v1", "created": "Tue, 12 Sep 2017 12:47:05 GMT" } ]
2017-09-13T00:00:00
[ [ "Deng", "Yongchao", "" ], [ "Kim", "Jungi", "" ], [ "Klein", "Guillaume", "" ], [ "Kobus", "Catherine", "" ], [ "Segal", "Natalia", "" ], [ "Servan", "Christophe", "" ], [ "Wang", "Bo", "" ], [ "Zhang", "Dakun", "" ], [ "Crego", "Josep", "" ], [ "Senellart", "Jean", "" ] ]
new_dataset
0.993399
1709.03843
Le Zheng
Yingming Tsai, Le Zheng and Xiaodong Wang
Millimeter-Wave Beamformed Full-dimensional MIMO Channel Estimation Based on Atomic Norm Minimization
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The millimeter-wave (mmWave) full-dimensional (FD) MIMO system employs planar arrays at both the base station and user equipment and can simultaneously support both azimuth and elevation beamforming. In this paper, we propose atomic-norm-based methods for mmWave FD-MIMO channel estimation under both uniform planar arrays (UPA) and non-uniform planar arrays (NUPA). Unlike existing algorithms such as compressive sensing (CS) or subspace methods, the atomic-norm-based algorithms do not require to discretize the angle spaces of the angle of arrival (AoA) and angle of departure (AoD) into grids, thus provide much better accuracy in estimation. In the UPA case, to reduce the computational complexity, the original large-scale 4D atomic norm minimization problem is approximately reformulated as a semi-definite program (SDP) containing two decoupled two-level Toeplitz matrices. The SDP is then solved via the alternating direction method of multipliers (ADMM) where each iteration involves only closed-form computations. In the NUPA case, the atomic-norm-based formulation for channel estimation becomes nonconvex and a gradient-decent-based algorithm is proposed to solve the problem. Simulation results show that the proposed algorithms achieve better performance than the CS-based and subspace-based algorithms.
[ { "version": "v1", "created": "Tue, 12 Sep 2017 13:52:30 GMT" } ]
2017-09-13T00:00:00
[ [ "Tsai", "Yingming", "" ], [ "Zheng", "Le", "" ], [ "Wang", "Xiaodong", "" ] ]
new_dataset
0.994881
1709.03854
Ivan Olier
Ivan Olier, Noureddin Sadawi, G. Richard Bickerton, Joaquin Vanschoren, Crina Grosan, Larisa Soldatova and Ross D. King
Meta-QSAR: a large-scale application of meta-learning to drug design and discovery
33 pages and 15 figures. Manuscript accepted for publication in Machine Learning Journal. This is the author's pre-print version
null
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the learning of quantitative structure activity relationships (QSARs) as a case-study of meta-learning. This application area is of the highest societal importance, as it is a key step in the development of new medicines. The standard QSAR learning problem is: given a target (usually a protein) and a set of chemical compounds (small molecules) with associated bioactivities (e.g. inhibition of the target), learn a predictive mapping from molecular representation to activity. Although almost every type of machine learning method has been applied to QSAR learning there is no agreed single best way of learning QSARs, and therefore the problem area is well-suited to meta-learning. We first carried out the most comprehensive ever comparison of machine learning methods for QSAR learning: 18 regression methods, 6 molecular representations, applied to more than 2,700 QSAR problems. (These results have been made publicly available on OpenML and represent a valuable resource for testing novel meta-learning methods.) We then investigated the utility of algorithm selection for QSAR problems. We found that this meta-learning approach outperformed the best individual QSAR learning method (random forests using a molecular fingerprint representation) by up to 13%, on average. We conclude that meta-learning outperforms base-learning methods for QSAR learning, and as this investigation is one of the most extensive ever comparisons of base and meta-learning methods ever made, it provides evidence for the general effectiveness of meta-learning over base-learning.
[ { "version": "v1", "created": "Tue, 12 Sep 2017 14:07:13 GMT" } ]
2017-09-13T00:00:00
[ [ "Olier", "Ivan", "" ], [ "Sadawi", "Noureddin", "" ], [ "Bickerton", "G. Richard", "" ], [ "Vanschoren", "Joaquin", "" ], [ "Grosan", "Crina", "" ], [ "Soldatova", "Larisa", "" ], [ "King", "Ross D.", "" ] ]
new_dataset
0.971662
1709.03876
Sandor P. Fekete
S\'andor P. Fekete and Phillip Keldenich
Conflict-Free Coloring of Intersection Graphs
17 pages, 10 figures; full version of extended abstract that is to appear in ISAAC 2017
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A conflict-free $k$-coloring of a graph $G=(V,E)$ assigns one of $k$ different colors to some of the vertices such that, for every vertex $v$, there is a color that is assigned to exactly one vertex among $v$ and $v$'s neighbors. Such colorings have applications in wireless networking, robotics, and geometry, and are well studied in graph theory. Here we study the conflict-free coloring of geometric intersection graphs. We demonstrate that the intersection graph of $n$ geometric objects without fatness properties and size restrictions may have conflict-free chromatic number in $\Omega(\log n/\log\log n)$ and in $\Omega(\sqrt{\log n})$ for disks or squares of different sizes; it is known for general graphs that the worst case is in $\Theta(\log^2 n)$. For unit-disk intersection graphs, we prove that it is NP-complete to decide the existence of a conflict-free coloring with one color; we also show that six colors always suffice, using an algorithm that colors unit disk graphs of restricted height with two colors. We conjecture that four colors are sufficient, which we prove for unit squares instead of unit disks. For interval graphs, we establish a tight worst-case bound of two.
[ { "version": "v1", "created": "Tue, 12 Sep 2017 14:46:31 GMT" } ]
2017-09-13T00:00:00
[ [ "Fekete", "Sándor P.", "" ], [ "Keldenich", "Phillip", "" ] ]
new_dataset
0.996545
1612.05954
Armin Wei{\ss}
Alexei Miasnikov and Svetla Vassileva and Armin Wei{\ss}
The conjugacy problem in free solvable groups and wreath product of abelian groups is in TC$^0$
null
null
null
null
cs.CC math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the conjugacy problem in a wreath product $A \wr B$ is uniform-$\mathsf{TC}^0$-Turing-reducible to the conjugacy problem in the factors $A$ and $B$ and the power problem in $B$. If $B$ is torsion free, the power problem for $B$ can be replaced by the slightly weaker cyclic submonoid membership problem for $B$. Moreover, if $A$ is abelian, the cyclic subgroup membership problem suffices, which itself is uniform-$\mathsf{AC}^0$-many-one-reducible to the conjugacy problem in $A \wr B$. Furthermore, under certain natural conditions, we give a uniform $\mathsf{TC}^0$ Turing reduction from the power problem in $A \wr B$ to the power problems of $A$ and $B$. Together with our first result, this yields a uniform $\mathsf{TC}^0$ solution to the conjugacy problem in iterated wreath products of abelian groups - and, by the Magnus embedding, also in free solvable groups.
[ { "version": "v1", "created": "Sun, 18 Dec 2016 17:21:44 GMT" }, { "version": "v2", "created": "Mon, 11 Sep 2017 09:12:08 GMT" } ]
2017-09-12T00:00:00
[ [ "Miasnikov", "Alexei", "" ], [ "Vassileva", "Svetla", "" ], [ "Weiß", "Armin", "" ] ]
new_dataset
0.994006
1702.02287
Baichuan Zhang
Baichuan Zhang, Mohammad Al Hasan
Name Disambiguation in Anonymized Graphs using Network Embedding
The 26th ACM International Conference on Information and Knowledge Management (CIKM 2017) research track full paper
null
null
null
cs.SI cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In real-world, our DNA is unique but many people share names. This phenomenon often causes erroneous aggregation of documents of multiple persons who are namesake of one another. Such mistakes deteriorate the performance of document retrieval, web search, and more seriously, cause improper attribution of credit or blame in digital forensic. To resolve this issue, the name disambiguation task is designed which aims to partition the documents associated with a name reference such that each partition contains documents pertaining to a unique real-life person. Existing solutions to this task substantially rely on feature engineering, such as biographical feature extraction, or construction of auxiliary features from Wikipedia. However, for many scenarios, such features may be costly to obtain or unavailable due to the risk of privacy violation. In this work, we propose a novel name disambiguation method. Our proposed method is non-intrusive of privacy because instead of using attributes pertaining to a real-life person, our method leverages only relational data in the form of anonymized graphs. In the methodological aspect, the proposed method uses a novel representation learning model to embed each document in a low dimensional vector space where name disambiguation can be solved by a hierarchical agglomerative clustering algorithm. Our experimental results demonstrate that the proposed method is significantly better than the existing name disambiguation methods working in a similar setting.
[ { "version": "v1", "created": "Wed, 8 Feb 2017 04:54:09 GMT" }, { "version": "v2", "created": "Thu, 4 May 2017 00:40:44 GMT" }, { "version": "v3", "created": "Tue, 8 Aug 2017 14:29:03 GMT" }, { "version": "v4", "created": "Sat, 9 Sep 2017 23:05:04 GMT" } ]
2017-09-12T00:00:00
[ [ "Zhang", "Baichuan", "" ], [ "Hasan", "Mohammad Al", "" ] ]
new_dataset
0.998699
1709.02500
Mark Amo-Boateng PhD.
Mark Amo-Boateng
Super-speeds with Zero-RAM: Next Generation Large-Scale Optimization in Your Laptop!
7 pages, 4 figures, 7 tables
null
null
null
cs.DC cs.CC cs.DS cs.PF math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents the novel breakthrough general purpose algorithm for large scale optimization problems. The novel algorithm is capable of achieving breakthrough speeds for very large-scale optimization on general purpose laptops and embedded systems. Application of the algorithm to the Griewank function was possible in up to 1 billion decision variables in double precision took only 64485 seconds (~18 hours) to solve, while consuming 7,630 MB (7.6 GB) or RAM on a single threaded laptop CPU. It shows that the algorithm is computationally and memory (space) linearly efficient, and can find the optimal or near-optimal solution in a fraction of the time and memory that many conventional algorithms require. It is envisaged that this will open up new possibilities of real-time large-scale problems on personal laptops and embedded systems.
[ { "version": "v1", "created": "Fri, 8 Sep 2017 01:47:56 GMT" }, { "version": "v2", "created": "Mon, 11 Sep 2017 01:14:46 GMT" } ]
2017-09-12T00:00:00
[ [ "Amo-Boateng", "Mark", "" ] ]
new_dataset
0.999412
1709.02843
Leila Kosseim
Elnaz Davoodi and Leila Kosseim
CLaC at SemEval-2016 Task 11: Exploring linguistic and psycho-linguistic Features for Complex Word Identification
In Proceedings of the International Workshop on Semantic Evaluation (SemEval-2016), a workshop of the 15th Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-2016) pp 982-985. June 16-17, San Diego, California
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the system deployed by the CLaC-EDLK team to the "SemEval 2016, Complex Word Identification task". The goal of the task is to identify if a given word in a given context is "simple" or "complex". Our system relies on linguistic features and cognitive complexity. We used several supervised models, however the Random Forest model outperformed the others. Overall our best configuration achieved a G-score of 68.8% in the task, ranking our system 21 out of 45.
[ { "version": "v1", "created": "Fri, 8 Sep 2017 19:34:02 GMT" } ]
2017-09-12T00:00:00
[ [ "Davoodi", "Elnaz", "" ], [ "Kosseim", "Leila", "" ] ]
new_dataset
0.982449
1709.02885
Jekan Thangavelautham
Himangshu Kalita, Erik Asphaug, Stephen Schwartz, Jekanthan Thangavelautham
Network of Nano-Landers for In-Situ Characterization of Asteroid Impact Studies
11 pages, 19 figures appearing in the International Astronautical Congress 2017, Adelaide, Australia
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Exploration of asteroids and comets can give insight into the origins of the solar system and can be instrumental in planetary defence and in-situ resource utilization (ISRU). Asteroids, due to their low gravity are a challenging target for surface exploration. Current missions envision performing touch-and-go operations over an asteroid surface. In this work, we analyse the feasibility of sending scores of nano-landers, each 1 kg in mass and volume of 1U, or 1000 cm3. These landers would hop, roll and fly over the asteroid surface. The landers would include science instruments such as stereo cameras, hand-lens imagers and spectrometers to characterize rock composition. A network of nano-landers situated on the surface of an asteroid can provide unique and very detailed measurements of a spacecraft impacting onto an asteroid surface. A full-scale, artificial impact experiment onto an asteroid can help characterize its composition and geology and help in the development of asteroid deflection techniques intended for planetary defence. Scores of nano-landers could provide multiple complementary views of the impact, resultant seismic activity and trajectory of the ejecta. The nano-landers can analyse the pristine, unearthed regolith shielded from effects of UV and cosmic rays and that may be millions of years old. Our approach to formulating this mission concepts utilizes automated machine learning techniques in the planning and design of space systems. We use a form of Darwinian selection to select and identify suitable number of nano-landers, the on-board instruments and control system to explore and navigate the asteroid environment. Scenarios are generated in simulation and evaluated against quantifiable mission goals such as area explored on the asteroid and amount of data recorded from the impact event.
[ { "version": "v1", "created": "Sat, 9 Sep 2017 00:30:42 GMT" } ]
2017-09-12T00:00:00
[ [ "Kalita", "Himangshu", "" ], [ "Asphaug", "Erik", "" ], [ "Schwartz", "Stephen", "" ], [ "Thangavelautham", "Jekanthan", "" ] ]
new_dataset
0.993431
1709.02938
Siddharth Nair
Siddharth H. Nair, Arpita Sinha and Leena Vachhani
Hilbert's Space-filling Curve for Regions with Holes
Accepted for presentation at the 56th IEEE Conference on Decision and Control 2017
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a systematic strategy for implementing Hilbert's space filling curve for use in online exploration tasks and addresses its application in scenarios wherein the space to be searched obstacles (or holes) whose locations are not known a priori. Using the self-similarity and locality preserving properties of Hilbert's space filling curve, a set of evasive maneuvers are prescribed and characterized for online implementation. Application of these maneuvers in the case of non-uniform coverage of spaces and for obstacles of varying sizes is also presented. The results are validated with representative simulations demonstrating the deployment of the approach.
[ { "version": "v1", "created": "Sat, 9 Sep 2017 09:56:08 GMT" } ]
2017-09-12T00:00:00
[ [ "Nair", "Siddharth H.", "" ], [ "Sinha", "Arpita", "" ], [ "Vachhani", "Leena", "" ] ]
new_dataset
0.994531
1709.02957
Abhijnan Chakraborty
Abhijnan Chakraborty, Rajdeep Sarkar, Ayushi Mrigen, Niloy Ganguly
Tabloids in the Era of Social Media? Understanding the Production and Consumption of Clickbaits in Twitter
Accepted in 21st ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2018)
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the growing shift towards news consumption primarily through social media sites like Twitter, most of the traditional as well as new-age media houses are promoting their news stories by tweeting about them. The competition for user attention in such mediums has led many media houses to use catchy sensational form of tweets to attract more users - a process known as clickbaiting. In this work, using an extensive dataset collected from Twitter, we analyze the social sharing patterns of clickbait and non-clickbait tweets to determine the organic reach of such tweets. We also attempt to study the sections of Twitter users who actively engage themselves in following clickbait and non-clickbait tweets. Comparing the advent of clickbaits with the rise of tabloidization of news, we bring out several important insights regarding the news consumers as well as the media organizations promoting news stories on Twitter.
[ { "version": "v1", "created": "Sat, 9 Sep 2017 14:26:23 GMT" } ]
2017-09-12T00:00:00
[ [ "Chakraborty", "Abhijnan", "" ], [ "Sarkar", "Rajdeep", "" ], [ "Mrigen", "Ayushi", "" ], [ "Ganguly", "Niloy", "" ] ]
new_dataset
0.998976
1709.03167
Kevin Bowden
Geetanjali Rakshit, Kevin K. Bowden, Lena Reed, Amita Misra, Marilyn Walker
Debbie, the Debate Bot of the Future
IWSDS 2017
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Chatbots are a rapidly expanding application of dialogue systems with companies switching to bot services for customer support, and new applications for users interested in casual conversation. One style of casual conversation is argument, many people love nothing more than a good argument. Moreover, there are a number of existing corpora of argumentative dialogues, annotated for agreement and disagreement, stance, sarcasm and argument quality. This paper introduces Debbie, a novel arguing bot, that selects arguments from conversational corpora, and aims to use them appropriately in context. We present an initial working prototype of Debbie, with some preliminary evaluation and describe future work.
[ { "version": "v1", "created": "Sun, 10 Sep 2017 20:22:30 GMT" } ]
2017-09-12T00:00:00
[ [ "Rakshit", "Geetanjali", "" ], [ "Bowden", "Kevin K.", "" ], [ "Reed", "Lena", "" ], [ "Misra", "Amita", "" ], [ "Walker", "Marilyn", "" ] ]
new_dataset
0.995669
1709.03217
Chunming Tang
Claude Carlet, Sihem Mesnager, Chunming Tang, Yanfeng Qi
New characterization and parametrization of LCD Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear complementary dual (LCD) cyclic codes were referred historically to as reversible cyclic codes, which had applications in data storage. Due to a newly discovered application in cryptography, there has been renewed interest in LCD codes. In particular, it has been shown that binary LCD codes play an important role in implementations against side-channel attacks and fault injection attacks. In this paper, we first present a new characterization of binary LCD codes in terms of their symplectic basis. Using such a characterization,we solve a conjecture proposed by Galvez et al. on the minimum distance of binary LCD codes. Next, we consider the action of the orthogonal group on the set of all LCD codes, determine all possible orbits of this action, derive simple closed formulas of the size of the orbits, and present some asymptotic results of the size of the corresponding orbits. Our results show that almost all binary LCD codes are odd-like codes with odd-like duals, and about half of q-ary LCD codes have orthonormal basis, where q is a power of an odd prime.
[ { "version": "v1", "created": "Mon, 11 Sep 2017 02:35:11 GMT" } ]
2017-09-12T00:00:00
[ [ "Carlet", "Claude", "" ], [ "Mesnager", "Sihem", "" ], [ "Tang", "Chunming", "" ], [ "Qi", "Yanfeng", "" ] ]
new_dataset
0.996592
1709.03297
Giuseppe Vizzari
Luca Crociani, Gregor L\"ammel, H. Joon Park, Giuseppe Vizzari
Cellular Automaton Based Simulation of Large Pedestrian Facilities - A Case Study on the Staten Island Ferry Terminals
96th Transportation Research Board annual meeting, Washington, January 2017
null
null
null
cs.MA cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current metropolises largely depend on a functioning transport infrastructure and the increasing demand can only be satisfied by a well organized mass transit. One example for a crucial mass transit system is New York City's Staten Island Ferry, connecting the two boroughs of Staten Island and Manhattan with a regular passenger service. Today's demand already exceeds 2500 passengers for a single cycle during peek hours, and future projections suggest that it will further increase. One way to appraise how the system will cope with future demand is by simulation. This contribution proposes an integrated simulation approach to evaluate the system performance with respect to future demand. The simulation relies on a multiscale modeling approach where the terminal buildings are simulated by a microscopic and quantitatively valid cellular automata (CA) and the journeys of the ferries themselves are modeled by a mesoscopic queue simulation approach. Based on the simulation results recommendations with respect to the future demand are given.
[ { "version": "v1", "created": "Mon, 11 Sep 2017 08:48:19 GMT" } ]
2017-09-12T00:00:00
[ [ "Crociani", "Luca", "" ], [ "Lämmel", "Gregor", "" ], [ "Park", "H. Joon", "" ], [ "Vizzari", "Giuseppe", "" ] ]
new_dataset
0.999002
1709.03358
Benjamin Smith
Joost Renes, Benjamin Smith (GRACE, LIX)
qDSA: Small and Secure Digital Signatures with Curve-based Diffie--Hellman Key Pairs
ASIACRYPT 2017, Dec 2017, Hong Kong, China. 2017
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
qDSA is a high-speed, high-security signature scheme that facilitates implementations with a very small memory footprint, a crucial requirement for embedded systems and IoT devices, and that uses the same public keys as modern Diffie--Hellman schemes based on Montgomery curves (such as Curve25519) or Kummer surfaces. qDSA resembles an adaptation of EdDSA to the world of Kummer varieties, which are quotients of algebraic groups by $\pm$1. Interestingly, qDSA does not require any full group operations or point recovery: all computations, including signature verification, occur on the quotient where there is no group law. We include details on four implementations of qDSA, using Montgomery and fast Kummer surface arithmetic on the 8-bit AVR ATmega and 32-bit ARM Cortex M0 platforms. We find that qDSA significantly outperforms state-of-the-art signature implementations in terms of stack usage and code size. We also include an efficient compression algorithm for points on fast Kummer surfaces, reducing them to the same size as compressed elliptic curve points for the same security level.
[ { "version": "v1", "created": "Mon, 11 Sep 2017 13:05:58 GMT" } ]
2017-09-12T00:00:00
[ [ "Renes", "Joost", "", "GRACE, LIX" ], [ "Smith", "Benjamin", "", "GRACE, LIX" ] ]
new_dataset
0.995829
1709.03404
Oskar Schirmer
Felix Winkelmann, Oskar Schirmer
A Domain-specific Language for High-reliability Software used in the JUICE SWI Instrument - The hO Language Manual
21 pages
null
null
null
cs.DC cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
hO is a custom restricted dialect of Oberon, developed at the Max-Planck Institute for Solar System Research in G\"ottingen and used in the SWI flight software for the JUICE mission. hO is applied to reduce the possibility of syntactically valid but incorrect code, provide better means of statically analyzing source code, is more readable than C and gives syntactic support for the software architecture used in the SWI instrument software. By using a higher-level, application-specific notation a whole range of possible errors is eliminated and source code size is reduced, while making the code itself easier to understand, review and analyze.
[ { "version": "v1", "created": "Mon, 11 Sep 2017 14:27:33 GMT" } ]
2017-09-12T00:00:00
[ [ "Winkelmann", "Felix", "" ], [ "Schirmer", "Oskar", "" ] ]
new_dataset
0.99859
1709.03413
Eray Ozkural
Eray \"Ozkural
Gigamachine: incremental machine learning on desktop computers
This is the original submission for my AGI-2010 paper titled Stochastic Grammar Based Incremental Machine Learning Using Scheme which may be found on http://agi-conf.org/2010/wp-content/uploads/2009/06/paper_24.pdf and presented a partial but general solution to the transfer learning problem in AI. arXiv admin note: substantial text overlap with arXiv:1103.1003
Artificial General Intelligence 2010, p. 190
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a concrete design for Solomonoff's incremental machine learning system suitable for desktop computers. We use R5RS Scheme and its standard library with a few omissions as the reference machine. We introduce a Levin Search variant based on a stochastic Context Free Grammar together with new update algorithms that use the same grammar as a guiding probability distribution for incremental machine learning. The updates include adjusting production probabilities, re-using previous solutions, learning programming idioms and discovery of frequent subprograms. The issues of extending the a priori probability distribution and bootstrapping are discussed. We have implemented a good portion of the proposed algorithms. Experiments with toy problems show that the update algorithms work as expected.
[ { "version": "v1", "created": "Fri, 8 Sep 2017 17:39:26 GMT" } ]
2017-09-12T00:00:00
[ [ "Özkural", "Eray", "" ] ]
new_dataset
0.995325
1709.03424
Maximilien Gadouleau
Maximilien Gadouleau
Constant-Weight Array Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Binary constant-weight codes have been extensively studied, due to both their numerous applications and to their theoretical significance. In particular, constant-weight codes have been proposed for error correction in store and forward. In this paper, we introduce constant-weight array codes (CWACs), which offer a tradeoff between the rate gain of general constant-weight codes and the low decoding complexity of liftings. CWACs can either be used in the on-shot setting introduced earlier or in a multi-shot approach, where one codeword consists of several messages. The multi-shot approach generalizes the one-shot approach and hence allows for higher rate gains. We first give a construction of CWACs based on concatenation, which generalizes the traditional erasure codes, and also provide a decoding algorithm for these codes. Since CWACs can be viewed as a generalization of both binary constant-weight codes and nonrestricted Hamming metric codes, CWACs thus provide an additional degree of freedom to both problems of determining the maximum cardinality of constant-weight codes and nonrestricted Hamming metric codes. We then investigate their theoretical significance. We first generalize many classical bounds derived for Hamming metric codes or constant-weight codes in the CWAC framework. We finally relate the maximum cardinality of a CWAC to that of a constant-weight code, of a nonrestricted Hamming metric code, and of a spherical code.
[ { "version": "v1", "created": "Mon, 11 Sep 2017 15:01:45 GMT" } ]
2017-09-12T00:00:00
[ [ "Gadouleau", "Maximilien", "" ] ]
new_dataset
0.99976
1709.00604
Yimei Li
Yimei Li and Yao Liang
Compressed Sensing in Multi-Hop Large-Scale Wireless Sensor Networks Based on Routing Topology Tomography
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data acquisition from a multi-hop large-scale outdoor wireless sensor network (WSN) deployment for environmental monitoring is full of challenges. This is because the severe resource constraints on small battery-operated motes (e.g., bandwidth, memory, power, and computing capacity), the big data acquisition volume from the large-scale WSN,and the highly dynamic wireless link conditions in an outdoor communication environment. We present a novel compressed sensing approach which can recover the sensing data at the sink with high fidelity when very few data packets are collected, leading to a significant reduction of the net-work transmissions and thus an extension of the WSN lifetime. Interplaying with the dynamic WSN routing topology, the proposed approach is efficient and simple to implement on the resource-constrained motes without a mote's storing of any part of the random projection matrix, as opposed to other existing compressed sensing based schemes. We propose a systematic method via machine learning to find a suitable representation basis, for any given WSN deployment and data field, which is both sparse and incoherent with the random projection matrix in the compressed sensing for data acquisition. We validate our approach and evaluate its performance using a real-world multi-hop WSN testbed deployment in situ. The results demonstrate that our approach significantly outperforms existing compressed sensing approaches by reducing data recovery errors by an order of magnitude for the entire WSN observation field, while drastically reducing wireless communication costs at the same time.
[ { "version": "v1", "created": "Sat, 2 Sep 2017 16:55:06 GMT" }, { "version": "v2", "created": "Fri, 8 Sep 2017 02:56:18 GMT" } ]
2017-09-11T00:00:00
[ [ "Li", "Yimei", "" ], [ "Liang", "Yao", "" ] ]
new_dataset
0.987965
1709.02414
Taylan Sen
Tayan Sen, Md Kamrul Hasan, Zach Teicher, M. Ehsan Hoque
Automated Dyadic Data Recorder (ADDR) Framework and Analysis of Facial Cues in Deceptive Communication
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We developed an online framework that can automatically pair two crowd-sourced participants, prompt them to follow a research protocol, and record their audio and video on a remote server. The framework comprises two web applications: an Automatic Quality Gatekeeper for ensuring only high quality crowd-sourced participants are recruited for the study, and a Session Controller which directs participants to play a research protocol, such as an interrogation game. This framework was used to run a research study for analyzing facial expressions during honest and deceptive communication using a novel interrogation protocol. The protocol gathers two sets of nonverbal facial cues in participants: features expressed during questions relating to the interrogation topic and features expressed during control questions. The framework and protocol were used to gather 151 dyadic conversations (1.3 million video frames). Interrogators who were lied to expressed the smile-related lip corner puller cue more often than interrogators who were being told the truth, suggesting that facial cues from interrogators may be useful in evaluating the honesty of witnesses in some contexts. Overall, these results demonstrate that this framework is capable of gathering high quality data which can identify statistically significant results in a communication study.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 19:25:26 GMT" } ]
2017-09-11T00:00:00
[ [ "Sen", "Tayan", "" ], [ "Hasan", "Md Kamrul", "" ], [ "Teicher", "Zach", "" ], [ "Hoque", "M. Ehsan", "" ] ]
new_dataset
0.950795
1709.02433
Joseph O'Rourke
Joseph O'Rourke
Addendum to: Edge-Unfolding Nearly Flat Convex Caps
11 pages, 8 figures, 3 references. Eventually will be incorporated into [O'R17]: arXiv:1707.01006 [cs.CG]
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This addendum to [O'R17] establishes that a nearly flat acutely triangulated convex cap in the sense of that paper can be edge-unfolded even if closed to a polyhedron by adding the convex polygonal base under the cap.
[ { "version": "v1", "created": "Sat, 2 Sep 2017 19:50:40 GMT" } ]
2017-09-11T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
new_dataset
0.985282
1709.02480
Timnit Gebru
Timnit Gebru, Jonathan Krause, Yilun Wang, Duyun Chen, Jia Deng, Li Fei-Fei
Fine-Grained Car Detection for Visual Census Estimation
AAAI 2016
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Targeted socioeconomic policies require an accurate understanding of a country's demographic makeup. To that end, the United States spends more than 1 billion dollars a year gathering census data such as race, gender, education, occupation and unemployment rates. Compared to the traditional method of collecting surveys across many years which is costly and labor intensive, data-driven, machine learning driven approaches are cheaper and faster--with the potential ability to detect trends in close to real time. In this work, we leverage the ubiquity of Google Street View images and develop a computer vision pipeline to predict income, per capita carbon emission, crime rates and other city attributes from a single source of publicly available visual data. We first detect cars in 50 million images across 200 of the largest US cities and train a model to predict demographic attributes using the detected cars. To facilitate our work, we have collected the largest and most challenging fine-grained dataset reported to date consisting of over 2600 classes of cars comprised of images from Google Street View and other web sources, classified by car experts to account for even the most subtle of visual differences. We use this data to construct the largest scale fine-grained detection system reported to date. Our prediction results correlate well with ground truth income data (r=0.82), Massachusetts department of vehicle registration, and sources investigating crime rates, income segregation, per capita carbon emission, and other market research. Finally, we learn interesting relationships between cars and neighborhoods allowing us to perform the first large scale sociological analysis of cities using computer vision techniques.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 22:56:21 GMT" } ]
2017-09-11T00:00:00
[ [ "Gebru", "Timnit", "" ], [ "Krause", "Jonathan", "" ], [ "Wang", "Yilun", "" ], [ "Chen", "Duyun", "" ], [ "Deng", "Jia", "" ], [ "Fei-Fei", "Li", "" ] ]
new_dataset
0.999708
1709.02489
Harry Kalodner
Harry Kalodner, Steven Goldfeder, Alishah Chator, Malte M\"oser, and Arvind Narayanan
BlockSci: Design and applications of a blockchain analysis platform
null
null
null
null
cs.CR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analysis of blockchain data is useful for both scientific research and commercial applications. We present BlockSci, an open-source software platform for blockchain analysis. BlockSci is versatile in its support for different blockchains and analysis tasks. It incorporates an in-memory, analytical (rather than transactional) database, making it several hundred times faster than existing tools. We describe BlockSci's design and present four analyses that illustrate its capabilities. This is a working paper that accompanies the first public release of BlockSci, available at https://github.com/citp/BlockSci. We seek input from the community to further develop the software and explore other potential applications.
[ { "version": "v1", "created": "Fri, 8 Sep 2017 00:11:38 GMT" } ]
2017-09-11T00:00:00
[ [ "Kalodner", "Harry", "" ], [ "Goldfeder", "Steven", "" ], [ "Chator", "Alishah", "" ], [ "Möser", "Malte", "" ], [ "Narayanan", "Arvind", "" ] ]
new_dataset
0.999553
1709.02505
Li Li
Li Li and Hua Wei and Yao Huang and Yao Yao and Weiwei Ling and Gong Chen and Peng Li and Yunlong Cai
A Simple Two-stage Equalizer With Simplified Orthogonal Time Frequency Space Modulation Over Rapidly Time-varying Channels
4 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we derive a equivalent delay-Doppler channel matrix of the Orthogonal Time Frequency Space (OTFS) modulation that has not been studied in previous literature. It has the similar structure as the banded channel matrix of OFDM systems over rapidly time-varying channels. However, the band in the equivalent channel matrix will no longer spread with the increase of the Doppler spread once the length of maximum channel delay spread and the OTFS frame duration are deter- mined. Furthermore, the equivalent channel matrix can simplify the OTFS modulation in the transmitter side. Incorporating the equivalent channel matrix, we propose a simple two-stage equal- izer in 1 dimensional operations for OTFS modulation. First, the receive signal is equalized using the conventional OFDM single- tap equalizer in the frequency domain. The multipath effects can be removed. In the second stage, another low complexity delay- Doppler domain equalizer is employed to eliminate the effects of the residual interference caused by the Doppler spread with the equivalent channel matrix. The simulation results demonstrate that the proposed method is superior to the conventional single- tap equalizer and full minimum mean squared error (MMSE) equalizer of OFDM systems in terms of BER in high Doppler spread scenarios.
[ { "version": "v1", "created": "Fri, 8 Sep 2017 02:15:57 GMT" } ]
2017-09-11T00:00:00
[ [ "Li", "Li", "" ], [ "Wei", "Hua", "" ], [ "Huang", "Yao", "" ], [ "Yao", "Yao", "" ], [ "Ling", "Weiwei", "" ], [ "Chen", "Gong", "" ], [ "Li", "Peng", "" ], [ "Cai", "Yunlong", "" ] ]
new_dataset
0.994416
1709.02559
EPTCS
Maike Schwammberger (University of Oldenburg)
Imperfect Knowledge in Autonomous Urban Traffic Manoeuvres
In Proceedings FVAV 2017, arXiv:1709.02126
EPTCS 257, 2017, pp. 59-74
10.4204/EPTCS.257.7
null
cs.LO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Urban Multi-lane Spatial Logic (UMLSL) was introduced in [13] for proving safety (collision freedom) in autonomous urban traffic manoeuvres with perfect knowledge. We now consider a concept of imperfect knowledge, where cars have less information about other cars. To this end, we introduce the concept of a multi-view and propose crossing controllers using broadcast communication with data constraints for turning manoeuvres at intersections.
[ { "version": "v1", "created": "Fri, 8 Sep 2017 06:36:10 GMT" } ]
2017-09-11T00:00:00
[ [ "Schwammberger", "Maike", "", "University of Oldenburg" ] ]
new_dataset
0.97026
1709.02561
EPTCS
Benjamin Martin (1), Khalil Ghorbal (2), Eric Goubault (1), Sylvie Putot (1) ((1) LIX, Ecole Polytechnique, CNRS, Universit\'e Paris-Saclay, (2) INRIA)
Formal Verification of Station Keeping Maneuvers for a Planar Autonomous Hybrid System
In Proceedings FVAV 2017, arXiv:1709.02126
EPTCS 257, 2017, pp. 91-104
10.4204/EPTCS.257.9
null
cs.SY cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We formally verify a hybrid control law designed to perform a station keeping maneuver for a planar vehicle. Such maneuver requires that the vehicle reaches a neighborhood of its station in finite time and remains in it while waiting for further instructions. We model the dynamics as well as the control law as a hybrid program and formally verify both the reachability and safety properties involved. We highlight in particular the automated generation of invariant regions which turns out to be crucial in performing such verification. We use the theorem prover Keymaera X to discharge some of the generated proof obligations.
[ { "version": "v1", "created": "Fri, 8 Sep 2017 06:36:58 GMT" } ]
2017-09-11T00:00:00
[ [ "Martin", "Benjamin", "" ], [ "Ghorbal", "Khalil", "" ], [ "Goubault", "Eric", "" ], [ "Putot", "Sylvie", "" ] ]
new_dataset
0.985513
1403.7209
Istv\'an Z Reguly
Istv\'an Z. Reguly and Gihan R. Mudalige and Carlo Bertolli and Michael B. Giles and Adam Betts and Paul H. J. Kelly and David Radford
Acceleration of a Full-scale Industrial CFD Application with OP2
Submitted to ACM Transactions on Parallel Computing
IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 5, pp. 1265-1278, May 1 2016. doi: 10.1109/TPDS.2015.2453972
10.1109/TPDS.2015.2453972
null
cs.CE cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hydra is a full-scale industrial CFD application used for the design of turbomachinery at Rolls Royce plc. It consists of over 300 parallel loops with a code base exceeding 50K lines and is capable of performing complex simulations over highly detailed unstructured mesh geometries. Unlike simpler structured-mesh applications, which feature high speed-ups when accelerated by modern processor architectures, such as multi-core and many-core processor systems, Hydra presents major challenges in data organization and movement that need to be overcome for continued high performance on emerging platforms. We present research in achieving this goal through the OP2 domain-specific high-level framework. OP2 targets the domain of unstructured mesh problems and follows the design of an active library using source-to-source translation and compilation to generate multiple parallel implementations from a single high-level application source for execution on a range of back-end hardware platforms. We chart the conversion of Hydra from its original hand-tuned production version to one that utilizes OP2, and map out the key difficulties encountered in the process. To our knowledge this research presents the first application of such a high-level framework to a full scale production code. Specifically we show (1) how different parallel implementations can be achieved with an active library framework, even for a highly complicated industrial application such as Hydra, and (2) how different optimizations targeting contrasting parallel architectures can be applied to the whole application, seamlessly, reducing developer effort and increasing code longevity. Performance results demonstrate that not only the same runtime performance as that of the hand-tuned original production code could be achieved, but it can be significantly improved on conventional processor systems. Additionally, we achieve further...
[ { "version": "v1", "created": "Thu, 27 Mar 2014 20:14:24 GMT" } ]
2017-09-08T00:00:00
[ [ "Reguly", "István Z.", "" ], [ "Mudalige", "Gihan R.", "" ], [ "Bertolli", "Carlo", "" ], [ "Giles", "Michael B.", "" ], [ "Betts", "Adam", "" ], [ "Kelly", "Paul H. J.", "" ], [ "Radford", "David", "" ] ]
new_dataset
0.999616
1701.02718
Roozbeh Mottaghi
Roozbeh Mottaghi, Connor Schenck, Dieter Fox, Ali Farhadi
See the Glass Half Full: Reasoning about Liquid Containers, their Volume and Content
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Humans have rich understanding of liquid containers and their contents; for example, we can effortlessly pour water from a pitcher to a cup. Doing so requires estimating the volume of the cup, approximating the amount of water in the pitcher, and predicting the behavior of water when we tilt the pitcher. Very little attention in computer vision has been made to liquids and their containers. In this paper, we study liquid containers and their contents, and propose methods to estimate the volume of containers, approximate the amount of liquid in them, and perform comparative volume estimations all from a single RGB image. Furthermore, we show the results of the proposed model for predicting the behavior of liquids inside containers when one tilts the containers. We also introduce a new dataset of Containers Of liQuid contEnt (COQE) that contains more than 5,000 images of 10,000 liquid containers in context labelled with volume, amount of content, bounding box annotation, and corresponding similar 3D CAD models.
[ { "version": "v1", "created": "Tue, 10 Jan 2017 18:25:15 GMT" }, { "version": "v2", "created": "Wed, 6 Sep 2017 21:42:02 GMT" } ]
2017-09-08T00:00:00
[ [ "Mottaghi", "Roozbeh", "" ], [ "Schenck", "Connor", "" ], [ "Fox", "Dieter", "" ], [ "Farhadi", "Ali", "" ] ]
new_dataset
0.977464
1702.02642
Mehrtash Mehrabi
Mehrtash Mehrabi and Massoud Ardakani
On minimum distance of locally repairable codes
This paper has been withdrawn by the author due to some typos
null
10.1109/CWIT.2017.7994819
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed and cloud storage systems are used to reliably store large-scale data. Erasure codes have been recently proposed and used in real-world distributed and cloud storage systems such as Google File System, Microsoft Azure Storage, and Facebook HDFS-RAID, to enhance the reliability. In order to decrease the repair bandwidth and disk I/O, a class of erasure codes called locally repairable codes (LRCs) have been proposed which have small locality compare to other erasure codes. Although LRCs have small locality, they have lower minimum distance compare to the Singleton bound. Hence, seeking the largest possible minimum distance for LRCs have been the topic of many recent studies. In this paper, we study the largest possible minimum distance of a class of LRCs and evaluate them in terms of achievability. Furthermore, we compare our results with the existence bounds in the literature.
[ { "version": "v1", "created": "Wed, 8 Feb 2017 22:41:40 GMT" }, { "version": "v2", "created": "Fri, 17 Feb 2017 23:42:22 GMT" } ]
2017-09-08T00:00:00
[ [ "Mehrabi", "Mehrtash", "" ], [ "Ardakani", "Massoud", "" ] ]
new_dataset
0.999507
1705.02116
Shuoyao Wang
Shuoyao Wang, Suzhi Bi, Ying Jun (Angela) Zhang, Jianwei Huang
Electrical Vehicle Charging Station Profit Maximization: Admission, Pricing, and Online Scheduling
This paper has been submitted to IEEE Transactions on Sustainable Energy for potential journal publication
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rapid emergence of electric vehicles (EVs) demands an advanced infrastructure of publicly accessible charging stations that provide efficient charging services. In this paper, we propose a new charging station operation mechanism, the JoAP, which jointly optimizes the EV admission control, pricing, and charging scheduling to maximize the charging station's profit. More specifically, by introducing a tandem queueing network model, we analytically characterize the average charging station profit as a function of the admission control and pricing policies. Based on the analysis, we characterize the optimal JoAP algorithm. Through extensive simulations, we demonstrate that the proposed JoAP algorithm on average can achieve 330% and 531% higher profit than a widely adopted benchmark method under two representative waiting-time penalty rates.
[ { "version": "v1", "created": "Fri, 5 May 2017 07:59:36 GMT" }, { "version": "v2", "created": "Thu, 7 Sep 2017 08:18:08 GMT" } ]
2017-09-08T00:00:00
[ [ "Wang", "Shuoyao", "", "Angela" ], [ "Bi", "Suzhi", "", "Angela" ], [ "Jun", "Ying", "", "Angela" ], [ "Zhang", "", "" ], [ "Huang", "Jianwei", "" ] ]
new_dataset
0.993103
1705.02609
EPTCS
Antti Kuusisto, Fabian Reiter
Emptiness Problems for Distributed Automata
In Proceedings GandALF 2017, arXiv:1709.01761. 13 pages, 2 figures
EPTCS 256, 2017, pp. 210-222
10.4204/EPTCS.256.15
null
cs.FL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the decidability of the emptiness problem for three classes of distributed automata. These devices operate on finite directed graphs, acting as networks of identical finite-state machines that communicate in an infinite sequence of synchronous rounds. The problem is shown to be decidable in LogSpace for a class of forgetful automata, where the nodes see the messages received from their neighbors but cannot remember their own state. When restricted to the appropriate families of graphs, these forgetful automata are equivalent to classical finite word automata, but strictly more expressive than finite tree automata. On the other hand, we also show that the emptiness problem is undecidable in general. This already holds for two heavily restricted classes of distributed automata: those that reject immediately if they receive more than one message per round, and those whose state diagram must be acyclic except for self-loops.
[ { "version": "v1", "created": "Sun, 7 May 2017 12:45:27 GMT" }, { "version": "v2", "created": "Thu, 7 Sep 2017 06:58:50 GMT" } ]
2017-09-08T00:00:00
[ [ "Kuusisto", "Antti", "" ], [ "Reiter", "Fabian", "" ] ]
new_dataset
0.991124
1706.03827
Daniel Roche
Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
Deterministic, Stash-Free Write-Only ORAM
null
Proc. ACM Conf. on Computer and Communications Security (CCS) 2017
10.1145/3133956.3134051
null
cs.CR
http://creativecommons.org/publicdomain/zero/1.0/
Write-Only Oblivious RAM (WoORAM) protocols provide privacy by encrypting the contents of data and also hiding the pattern of write operations over that data. WoORAMs provide better privacy than plain encryption and better performance than more general ORAM schemes (which hide both writing and reading access patterns), and the write-oblivious setting has been applied to important applications of cloud storage synchronization and encrypted hidden volumes. In this paper, we introduce an entirely new technique for Write-Only ORAM, called DetWoORAM. Unlike previous solutions, DetWoORAM uses a deterministic, sequential writing pattern without the need for any "stashing" of blocks in local state when writes fail. Our protocol, while conceptually simple, provides substantial improvement over prior solutions, both asymptotically and experimentally. In particular, under typical settings the DetWoORAM writes only 2 blocks (sequentially) to backend memory for each block written to the device, which is optimal. We have implemented our solution using the BUSE (block device in user-space) module and tested DetWoORAM against both an encryption only baseline of dm-crypt and prior, randomized WoORAM solutions, measuring only a 3x-14x slowdown compared to an encryption-only baseline and around 6x-19x speedup compared to prior work.
[ { "version": "v1", "created": "Mon, 12 Jun 2017 19:58:36 GMT" }, { "version": "v2", "created": "Thu, 7 Sep 2017 09:16:42 GMT" } ]
2017-09-08T00:00:00
[ [ "Roche", "Daniel S.", "" ], [ "Aviv", "Adam J.", "" ], [ "Choi", "Seung Geol", "" ], [ "Mayberry", "Travis", "" ] ]
new_dataset
0.967816
1708.09233
Patrizio Angelini
Patrizio Angelini, Steven Chaplick, Felice De Luca, Jiri Fiala, Jaroslav Hancl Jr., Niklas Heinsohn, Michael Kaufmann, Stephen Kobourov, Jan Kratochvil, and Pavel Valtr
On Vertex- and Empty-Ply Proximity Drawings
Appears in the Proceedings of the 25th International Symposium on Graph Drawing and Network Visualization (GD 2017)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We initiate the study of the vertex-ply of straight-line drawings, as a relaxation of the recently introduced ply number. Consider the disks centered at each vertex with radius equal to half the length of the longest edge incident to the vertex. The vertex-ply of a drawing is determined by the vertex covered by the maximum number of disks. The main motivation for considering this relaxation is to relate the concept of ply to proximity drawings. In fact, if we interpret the set of disks as proximity regions, a drawing with vertex-ply number 1 can be seen as a weak proximity drawing, which we call empty-ply drawing. We show non-trivial relationships between the ply number and the vertex-ply number. Then, we focus on empty-ply drawings, proving some properties and studying what classes of graphs admit such drawings. Finally, we prove a lower bound on the ply and the vertex-ply of planar drawings.
[ { "version": "v1", "created": "Wed, 30 Aug 2017 12:24:25 GMT" }, { "version": "v2", "created": "Thu, 7 Sep 2017 08:55:02 GMT" } ]
2017-09-08T00:00:00
[ [ "Angelini", "Patrizio", "" ], [ "Chaplick", "Steven", "" ], [ "De Luca", "Felice", "" ], [ "Fiala", "Jiri", "" ], [ "Hancl", "Jaroslav", "Jr." ], [ "Heinsohn", "Niklas", "" ], [ "Kaufmann", "Michael", "" ], [ "Kobourov", "Stephen", "" ], [ "Kratochvil", "Jan", "" ], [ "Valtr", "Pavel", "" ] ]
new_dataset
0.988064
1708.09435
Shankar Kulumani
Shankar Kulumani and Kuya Takami and Taeyoung Lee
Geometric Control for Autonomous Landing on Asteroid Itokawa using Visual Localization
Presented at 2017 AAS Astrodynamics Specialist Conference Stevenson, WA
null
null
null
cs.SY math.OC
http://creativecommons.org/licenses/by-sa/4.0/
This paper considers the coupled orbit and attitude dynamics of a dumbbell spacecraft around an asteroid. Geometric methods are used to derive the coupled equations of motion, defined on the configuration space of the special Euclidean group, and then a nonlinear controller is designed to enable trajectory tracking of desired landing trajectories. Rather than relying on sliding mode control or optimization based methods, the proposed approach avoids the increased control utilization and computational complexity inherent in other techniques. The nonlinear controller is used to track a desired landing trajectory to the asteroid surface. A monocular imaging sensor is used to provide position and attitude estimates using visual odometry to enable relative state estimates. We demonstrate this control scheme with a landing simulation about asteroid Itokawa.
[ { "version": "v1", "created": "Thu, 24 Aug 2017 17:44:51 GMT" }, { "version": "v2", "created": "Thu, 7 Sep 2017 13:13:25 GMT" } ]
2017-09-08T00:00:00
[ [ "Kulumani", "Shankar", "" ], [ "Takami", "Kuya", "" ], [ "Lee", "Taeyoung", "" ] ]
new_dataset
0.995777
1708.09778
Veronika Irvine
Therese Biedl and Veronika Irvine
Drawing bobbin lace graphs, or, Fundamental cycles for a subclass of periodic graphs
Appears in the Proceedings of the 25th International Symposium on Graph Drawing and Network Visualization (GD 2017)
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study a class of graph drawings that arise from bobbin lace patterns. The drawings are periodic and require a combinatorial embedding with specific properties which we outline and demonstrate can be verified in linear time. In addition, a lace graph drawing has a topological requirement: it contains a set of non-contractible directed cycles which must be homotopic to $(1,0)$, that is, when drawn on a torus, each cycle wraps once around the minor meridian axis and zero times around the major longitude axis. We provide an algorithm for finding the two fundamental cycles of a canonical rectangular schema in a supergraph that enforces this topological constraint. The polygonal schema is then used to produce a straight-line drawing of the lace graph inside a rectangular frame. We argue that such a polygonal schema always exists for combinatorial embeddings satisfying the conditions of bobbin lace patterns, and that we can therefore create a pattern, given a graph with a fixed combinatorial embedding of genus one.
[ { "version": "v1", "created": "Thu, 31 Aug 2017 15:35:46 GMT" }, { "version": "v2", "created": "Tue, 5 Sep 2017 17:00:48 GMT" }, { "version": "v3", "created": "Thu, 7 Sep 2017 00:14:31 GMT" } ]
2017-09-08T00:00:00
[ [ "Biedl", "Therese", "" ], [ "Irvine", "Veronika", "" ] ]
new_dataset
0.998575
1709.01825
Satya Bagchi
Joydeb Pal, Pramod Kumar Maurya, Shyambhu Mukherjee and Satya Bagchi
Generalized twisted centralizer codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important code of length $n^2$ is obtained by taking centralizer of a square matrix over a finite field $\mathbb{F}_q$. Twisted centralizer codes, twisted by an element $a \in \mathbb{F}_q$, are also similar type of codes but different in nature. The main results were embedded on dimension and minimum distance. In this paper, we have defined a new family of twisted centralizer codes namely generalized twisted centralizer (GTC) codes by $\mathcal{C}(A,D):= \lbrace B \in \mathbb{F}_q^{n \times n}|AB=BAD \rbrace$ twisted by a matrix $D$ and investigated results on dimension and minimum distance. Parity-check matrix and syndromes are also investigated. Length of the centralizer codes is $n^2$ by construction but in this paper, we have constructed centralizer codes of length $(n^2-i)$, where $i$ is a positive integer. In twisted centralizer codes, minimum distance can be at most $n$ when the field is binary whereas GTC codes can be constructed with minimum distance more than $n$.
[ { "version": "v1", "created": "Wed, 6 Sep 2017 13:55:34 GMT" }, { "version": "v2", "created": "Thu, 7 Sep 2017 10:21:54 GMT" } ]
2017-09-08T00:00:00
[ [ "Pal", "Joydeb", "" ], [ "Maurya", "Pramod Kumar", "" ], [ "Mukherjee", "Shyambhu", "" ], [ "Bagchi", "Satya", "" ] ]
new_dataset
0.998268
1709.02076
Clayton Morrison
Donya Quick, Clayton T. Morrison
Composition by Conversation
6 pages, 8 figures, accepted to ICMC 2017
null
null
null
cs.SD cs.CL cs.IR cs.PL
http://creativecommons.org/licenses/by/4.0/
Most musical programming languages are developed purely for coding virtual instruments or algorithmic compositions. Although there has been some work in the domain of musical query languages for music information retrieval, there has been little attempt to unify the principles of musical programming and query languages with cognitive and natural language processing models that would facilitate the activity of composition by conversation. We present a prototype framework, called MusECI, that merges these domains, permitting score-level algorithmic composition in a text editor while also supporting connectivity to existing natural language processing frameworks.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 05:39:00 GMT" } ]
2017-09-08T00:00:00
[ [ "Quick", "Donya", "" ], [ "Morrison", "Clayton T.", "" ] ]
new_dataset
0.998632
1709.02081
Ha Tran Hong Phan
Ha Tran Hong Phan, Ashnil Kumar, David Feng, Michael Fulham, Jinman Kim
An unsupervised long short-term memory neural network for event detection in cell videos
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an automatic unsupervised cell event detection and classification method, which expands convolutional Long Short-Term Memory (LSTM) neural networks, for cellular events in cell video sequences. Cells in images that are captured from various biomedical applications usually have different shapes and motility, which pose difficulties for the automated event detection in cell videos. Current methods to detect cellular events are based on supervised machine learning and rely on tedious manual annotation from investigators with specific expertise. So that our LSTM network could be trained in an unsupervised manner, we designed it with a branched structure where one branch learns the frequent, regular appearance and movements of objects and the second learns the stochastic events, which occur rarely and without warning in a cell video sequence. We tested our network on a publicly available dataset of densely packed stem cell phase-contrast microscopy images undergoing cell division. This dataset is considered to be more challenging that a dataset with sparse cells. We compared our method to several published supervised methods evaluated on the same dataset and to a supervised LSTM method with a similar design and configuration to our unsupervised method. We used an F1-score, which is a balanced measure for both precision and recall. Our results show that our unsupervised method has a higher or similar F1-score when compared to two fully supervised methods that are based on Hidden Conditional Random Fields (HCRF), and has comparable accuracy with the current best supervised HCRF-based method. Our method was generalizable as after being trained on one video it could be applied to videos where the cells were in different conditions. The accuracy of our unsupervised method approached that of its supervised counterpart.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 05:58:23 GMT" } ]
2017-09-08T00:00:00
[ [ "Phan", "Ha Tran Hong", "" ], [ "Kumar", "Ashnil", "" ], [ "Feng", "David", "" ], [ "Fulham", "Michael", "" ], [ "Kim", "Jinman", "" ] ]
new_dataset
0.987979
1709.02096
EPTCS
St\'ephane Le Roux (Universit\'e Libre de Bruxelles), \'Erik Martin-Dorel (IRIT, Universit\'e de Toulouse), Jan-Georg Smaus (IRIT, Universit\'e de Toulouse)
An Existence Theorem of Nash Equilibrium in Coq and Isabelle
In Proceedings GandALF 2017, arXiv:1709.01761
EPTCS 256, 2017, pp. 46-60
10.4204/EPTCS.256.4
null
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nash equilibrium (NE) is a central concept in game theory. Here we prove formally a published theorem on existence of an NE in two proof assistants, Coq and Isabelle: starting from a game with finitely many outcomes, one may derive a game by rewriting each of these outcomes with either of two basic outcomes, namely that Player 1 wins or that Player 2 wins. If all ways of deriving such a win/lose game lead to a game where one player has a winning strategy, the original game also has a Nash equilibrium. This article makes three other contributions: first, while the original proof invoked linear extension of strict partial orders, here we avoid it by generalizing the relevant definition. Second, we notice that the theorem also implies the existence of a secure equilibrium, a stronger version of NE that was introduced for model checking. Third, we also notice that the constructive proof of the theorem computes secure equilibria for non-zero-sum priority games (generalizing parity games) in quasi-polynomial time.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 06:54:50 GMT" } ]
2017-09-08T00:00:00
[ [ "Roux", "Stéphane Le", "", "Université Libre de Bruxelles" ], [ "Martin-Dorel", "Érik", "", "IRIT, Université de Toulouse" ], [ "Smaus", "Jan-Georg", "", "IRIT,\n Université de Toulouse" ] ]
new_dataset
0.997438
1709.02102
EPTCS
David M\"uller (Technische Universit\"at Dresden), Salomon Sickert (Technische Universit\"at M\"unchen)
LTL to Deterministic Emerson-Lei Automata
In Proceedings GandALF 2017, arXiv:1709.01761
EPTCS 256, 2017, pp. 180-194
10.4204/EPTCS.256.13
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new translation from linear temporal logic (LTL) to deterministic Emerson-Lei automata, which are omega-automata with a Muller acceptance condition symbolically expressed as a Boolean formula. The richer acceptance condition structure allows the shift of complexity from the state space to the acceptance condition. Conceptually the construction is an enhanced product construction that exploits knowledge of its components to reduce the number of states. We identify two fragments of LTL, for which one can easily construct deterministic automata and show how knowledge of these components can reduce the number of states. We extend this idea to a general LTL framework, where we can use arbitrary LTL to deterministic automata translators for parts of formulas outside the mentioned fragments. Further, we show succinctness of the translation compared to existing construction. The construction is implemented in the tool Delag, which we evaluate on several benchmarks of LTL formulas and probabilistic model checking case studies.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 06:58:10 GMT" } ]
2017-09-08T00:00:00
[ [ "Müller", "David", "", "Technische Universität Dresden" ], [ "Sickert", "Salomon", "", "Technische Universität München" ] ]
new_dataset
0.999034
1709.02128
Martin Velas
Martin Velas, Michal Spanel, Michal Hradis and Adam Herout
CNN for Very Fast Ground Segmentation in Velodyne LiDAR Data
ICRA 2018 submission
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel method for ground segmentation in Velodyne point clouds. We propose an encoding of sparse 3D data from the Velodyne sensor suitable for training a convolutional neural network (CNN). This general purpose approach is used for segmentation of the sparse point cloud into ground and non-ground points. The LiDAR data are represented as a multi-channel 2D signal where the horizontal axis corresponds to the rotation angle and the vertical axis the indexes channels (i.e. laser beams). Multiple topologies of relatively shallow CNNs (i.e. 3-5 convolutional layers) are trained and evaluated using a manually annotated dataset we prepared. The results show significant improvement of performance over the state-of-the-art method by Zhang et al. in terms of speed and also minor improvements in terms of accuracy.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 08:13:36 GMT" } ]
2017-09-08T00:00:00
[ [ "Velas", "Martin", "" ], [ "Spanel", "Michal", "" ], [ "Hradis", "Michal", "" ], [ "Herout", "Adam", "" ] ]
new_dataset
0.989779
1709.02177
Cedomir Stefanovic
Cedomir Stefanovic, Francisco Lazaro, Petar Popovski
Frameless ALOHA with Reliability-Latency Guarantees
Accepted for presentation at IEEE Globecom 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the novelties brought by 5G is that wireless system design has increasingly turned its focus on guaranteeing reliability and latency. This shifts the design objective of random access protocols from throughput optimization towards constraints based on reliability and latency. For this purpose, we use frameless ALOHA, which relies on successive interference cancellation (SIC), and derive its exact finite-length analysis of the statistics of the unresolved users (reliability) as a function of the contention period length (latency). The presented analysis can be used to derive the reliability-latency guarantees. We also optimize the scheme parameters in order to maximize the reliability within a given latency. Our approach represents an important step towards the general area of design and analysis of access protocols with reliability-latency guarantees.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 10:37:14 GMT" } ]
2017-09-08T00:00:00
[ [ "Stefanovic", "Cedomir", "" ], [ "Lazaro", "Francisco", "" ], [ "Popovski", "Petar", "" ] ]
new_dataset
0.986882
1709.02233
Philip Lundrigan
Philip Lundrigan, Kyeong Min, Neal Patwari, Sneha Kasera, Kerry Kelly, Jimmy Moore, Miriah Meyer, Scott C. Collingwood, Flory Nkoy, Bryan Stone, and Katherine Sward
EpiFi: An In-Home Sensor Network Architecture for Epidemiological Studies
13 pages, 12 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We design and build a system called EpiFi, which allows epidemiologists to easily design and deploy experiments in homes. The focus of EpiFi is reducing the barrier to entry for deploying and using an in-home sensor network. We present a novel architecture for in-home sensor networks configured using a single configuration file and provide: a fast and reliable method for device discovery when installed in the home, a new mechanism for sensors to authenticate over the air using a subject's home WiFi router, and data reliability mechanisms to minimize loss in the network through a long-term deployment. We work collaboratively with pediatric asthma researchers to design three studies and deploy EpiFi in homes.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 13:45:52 GMT" } ]
2017-09-08T00:00:00
[ [ "Lundrigan", "Philip", "" ], [ "Min", "Kyeong", "" ], [ "Patwari", "Neal", "" ], [ "Kasera", "Sneha", "" ], [ "Kelly", "Kerry", "" ], [ "Moore", "Jimmy", "" ], [ "Meyer", "Miriah", "" ], [ "Collingwood", "Scott C.", "" ], [ "Nkoy", "Flory", "" ], [ "Stone", "Bryan", "" ], [ "Sward", "Katherine", "" ] ]
new_dataset
0.999418
1709.02235
Shahar Tsiper Mr.
Shahar Tsiper, Or Dicker, Idan Kaizerman, Zeev Zohar, Mordechai Segev and Yonina C. Eldar
Sparsity-Based Super Resolution for SEM Images
Final publication available at ACS Nano Letters
null
10.1021/acs.nanolett.7b02091
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The scanning electron microscope (SEM) produces an image of a sample by scanning it with a focused beam of electrons. The electrons interact with the atoms in the sample, which emit secondary electrons that contain information about the surface topography and composition. The sample is scanned by the electron beam point by point, until an image of the surface is formed. Since its invention in 1942, SEMs have become paramount in the discovery and understanding of the nanometer world, and today it is extensively used for both research and in industry. In principle, SEMs can achieve resolution better than one nanometer. However, for many applications, working at sub-nanometer resolution implies an exceedingly large number of scanning points. For exactly this reason, the SEM diagnostics of microelectronic chips is performed either at high resolution (HR) over a small area or at low resolution (LR) while capturing a larger portion of the chip. Here, we employ sparse coding and dictionary learning to algorithmically enhance LR SEM images of microelectronic chips up to the level of the HR images acquired by slow SEM scans, while considerably reducing the noise. Our methodology consists of two steps: an offline stage of learning a joint dictionary from a sequence of LR and HR images of the same region in the chip, followed by a fast-online super-resolution step where the resolution of a new LR image is enhanced. We provide several examples with typical chips used in the microelectronics industry, as well as a statistical study on arbitrary images with characteristic structural features. Conceptually, our method works well when the images have similar characteristics. This work demonstrates that employing sparsity concepts can greatly improve the performance of SEM, thereby considerably increasing the scanning throughput without compromising on analysis quality and resolution.
[ { "version": "v1", "created": "Tue, 29 Aug 2017 16:23:43 GMT" } ]
2017-09-08T00:00:00
[ [ "Tsiper", "Shahar", "" ], [ "Dicker", "Or", "" ], [ "Kaizerman", "Idan", "" ], [ "Zohar", "Zeev", "" ], [ "Segev", "Mordechai", "" ], [ "Eldar", "Yonina C.", "" ] ]
new_dataset
0.997842
1709.02340
Muhammad R. A. Khandaker PhD
Muhammad R. A. Khandaker, Christos Masouros and Kai-Kit Wong
Secure Full-Duplex Device-to-Device Communication
Accepted in IEEE GLOBECOM 2017, Singapore, 4-8 Dec. 2017
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers full-duplex (FD) device-to-device (D2D) communications in a downlink MISO cellular system in the presence of multiple eavesdroppers. The D2D pair communicate sharing the same frequency band allocated to the cellular users (CUs). Since the D2D users share the same frequency as the CUs, both the base station (BS) and D2D transmissions interfere each other. In addition, due to limited processing capability, D2D users are susceptible to external attacks. Our aim is to design optimal beamforming and power control mechanism to guarantee secure communication while delivering the required quality-of-service (QoS) for the D2D link. In order to improve security, artificial noise (AN) is transmitted by the BS. We design robust beamforming for secure message as well as the AN in the worst-case sense for minimizing total transmit power with imperfect channel state information (CSI) of all links available at the BS. The problem is strictly non-convex with infinitely many constraints. By discovering the hidden convexity of the problem, we derive a rank-one optimal solution for the power minimization problem.
[ { "version": "v1", "created": "Thu, 7 Sep 2017 16:33:15 GMT" } ]
2017-09-08T00:00:00
[ [ "Khandaker", "Muhammad R. A.", "" ], [ "Masouros", "Christos", "" ], [ "Wong", "Kai-Kit", "" ] ]
new_dataset
0.981029
1612.01840
Micha\"el Defferrard
Micha\"el Defferrard, Kirell Benzi, Pierre Vandergheynst and Xavier Bresson
FMA: A Dataset For Music Analysis
ISMIR 2017 camera-ready
null
null
null
cs.SD cs.IR
http://creativecommons.org/licenses/by/4.0/
We introduce the Free Music Archive (FMA), an open and easily accessible dataset suitable for evaluating several tasks in MIR, a field concerned with browsing, searching, and organizing large music collections. The community's growing interest in feature and end-to-end learning is however restrained by the limited availability of large audio datasets. The FMA aims to overcome this hurdle by providing 917 GiB and 343 days of Creative Commons-licensed audio from 106,574 tracks from 16,341 artists and 14,854 albums, arranged in a hierarchical taxonomy of 161 genres. It provides full-length and high-quality audio, pre-computed features, together with track- and user-level metadata, tags, and free-form text such as biographies. We here describe the dataset and how it was created, propose a train/validation/test split and three subsets, discuss some suitable MIR tasks, and evaluate some baselines for genre recognition. Code, data, and usage examples are available at https://github.com/mdeff/fma
[ { "version": "v1", "created": "Tue, 6 Dec 2016 14:58:59 GMT" }, { "version": "v2", "created": "Tue, 25 Apr 2017 23:14:19 GMT" }, { "version": "v3", "created": "Tue, 5 Sep 2017 18:38:33 GMT" } ]
2017-09-07T00:00:00
[ [ "Defferrard", "Michaël", "" ], [ "Benzi", "Kirell", "" ], [ "Vandergheynst", "Pierre", "" ], [ "Bresson", "Xavier", "" ] ]
new_dataset
0.999893
1703.09542
Yongzhe Zhang
Yongzhe Zhang, Hsiang-Shang Ko, Zhenjiang Hu
Palgol: A High-Level DSL for Vertex-Centric Graph Processing with Remote Data Access
12 pages, 10 figures, extended version of APLAS 2017 paper
null
null
null
cs.DC
http://creativecommons.org/licenses/by/4.0/
Pregel is a popular distributed computing model for dealing with large-scale graphs. However, it can be tricky to implement graph algorithms correctly and efficiently in Pregel's vertex-centric model, especially when the algorithm has multiple computation stages, complicated data dependencies, or even communication over dynamic internal data structures. Some domain-specific languages (DSLs) have been proposed to provide more intuitive ways to implement graph algorithms, but due to the lack of support for remote access --- reading or writing attributes of other vertices through references --- they cannot handle the above mentioned dynamic communication, causing a class of Pregel algorithms with fast convergence impossible to implement. To address this problem, we design and implement Palgol, a more declarative and powerful DSL which supports remote access. In particular, programmers can use a more declarative syntax called chain access to naturally specify dynamic communication as if directly reading data on arbitrary remote vertices. By analyzing the logic patterns of chain access, we provide a novel algorithm for compiling Palgol programs to efficient Pregel code. We demonstrate the power of Palgol by using it to implement several practical Pregel algorithms, and the evaluation result shows that the efficiency of Palgol is comparable with that of hand-written code.
[ { "version": "v1", "created": "Tue, 28 Mar 2017 12:35:33 GMT" }, { "version": "v2", "created": "Wed, 6 Sep 2017 17:00:30 GMT" } ]
2017-09-07T00:00:00
[ [ "Zhang", "Yongzhe", "" ], [ "Ko", "Hsiang-Shang", "" ], [ "Hu", "Zhenjiang", "" ] ]
new_dataset
0.997431
1704.02470
Andrey Ignatov
Andrey Ignatov, Nikolay Kobyshev, Radu Timofte, Kenneth Vanhoey, Luc Van Gool
DSLR-Quality Photos on Mobile Devices with Deep Convolutional Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite a rapid rise in the quality of built-in smartphone cameras, their physical limitations - small sensor size, compact lenses and the lack of specific hardware, - impede them to achieve the quality results of DSLR cameras. In this work we present an end-to-end deep learning approach that bridges this gap by translating ordinary photos into DSLR-quality images. We propose learning the translation function using a residual convolutional neural network that improves both color rendition and image sharpness. Since the standard mean squared loss is not well suited for measuring perceptual image quality, we introduce a composite perceptual error function that combines content, color and texture losses. The first two losses are defined analytically, while the texture loss is learned in an adversarial fashion. We also present DPED, a large-scale dataset that consists of real photos captured from three different phones and one high-end reflex camera. Our quantitative and qualitative assessments reveal that the enhanced image quality is comparable to that of DSLR-taken photos, while the methodology is generalized to any type of digital camera.
[ { "version": "v1", "created": "Sat, 8 Apr 2017 10:27:36 GMT" }, { "version": "v2", "created": "Tue, 5 Sep 2017 19:46:11 GMT" } ]
2017-09-07T00:00:00
[ [ "Ignatov", "Andrey", "" ], [ "Kobyshev", "Nikolay", "" ], [ "Timofte", "Radu", "" ], [ "Vanhoey", "Kenneth", "" ], [ "Van Gool", "Luc", "" ] ]
new_dataset
0.98931
1704.04007
Thomas Westerb\"ack
Ragnar Freij-Hollanti, Camilla Hollanti, and Thomas Westerb\"ack
Matroid Theory and Storage Codes: Bounds and Constructions
Invited book chapter in Network Coding and Subspace Designs, Springer, to appear
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent research on distributed storage systems (DSSs) has revealed interesting connections between matroid theory and locally repairable codes (LRCs). The goal of this chapter is to introduce the reader to matroids and polymatroids, and illustrate their relation to distribute storage systems. While many of the results are rather technical in nature, effort is made to increase accessibility via simple examples. The chapter embeds all the essential features of LRCs, namely locality, availability, and hierarchy alongside with related generalised Singleton bounds.
[ { "version": "v1", "created": "Thu, 13 Apr 2017 06:34:54 GMT" }, { "version": "v2", "created": "Tue, 5 Sep 2017 20:52:42 GMT" } ]
2017-09-07T00:00:00
[ [ "Freij-Hollanti", "Ragnar", "" ], [ "Hollanti", "Camilla", "" ], [ "Westerbäck", "Thomas", "" ] ]
new_dataset
0.999026
1706.08628
Shan Zhang
Shan Zhang, Ning Zhang, Xiaojie Fang, Peng Yang, Xuemin (Sherman) Shen
Self-Sustaining Caching Stations: Towards Cost-Effective 5G-Enabled Vehicular Networks
IEEE Communications Magazine, to appear
null
10.1109/MCOM.2017.1700129
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we investigate the cost-effective 5G-enabled vehicular networks to support emerging vehicular applications, such as autonomous driving, in-car infotainment and location-based road services. To this end, self-sustaining caching stations (SCSs) are introduced to liberate on-road base stations from the constraints of power lines and wired backhauls. Specifically, the cache-enabled SCSs are powered by renewable energy and connected to core networks through wireless backhauls, which can realize "drop-and-play" deployment, green operation, and low-latency services. With SCSs integrated, a 5G-enabled heterogeneous vehicular networking architecture is further proposed, where SCSs are deployed along roadside for traffic offloading while conventional macro base stations (MBSs) provide ubiquitous coverage to vehicles. In addition, a hierarchical network management framework is designed to deal with high dynamics in vehicular traffic and renewable energy, where content caching, energy management and traffic steering are jointly investigated to optimize the service capability of SCSs with balanced power demand and supply in different time scales. Case studies are provided to illustrate SCS deployment and operation designs, and some open research issues are also discussed.
[ { "version": "v1", "created": "Mon, 26 Jun 2017 23:52:52 GMT" } ]
2017-09-07T00:00:00
[ [ "Zhang", "Shan", "", "Sherman" ], [ "Zhang", "Ning", "", "Sherman" ], [ "Fang", "Xiaojie", "", "Sherman" ], [ "Yang", "Peng", "", "Sherman" ], [ "Xuemin", "", "", "Sherman" ], [ "Shen", "", "" ] ]
new_dataset
0.965776
1709.01618
Chris Tensmeyer
Chris Tensmeyer, Brian Davis, Curtis Wigington, Iain Lee, Bill Barrett
PageNet: Page Boundary Extraction in Historical Handwritten Documents
HIP 2017 (in submission)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When digitizing a document into an image, it is common to include a surrounding border region to visually indicate that the entire document is present in the image. However, this border should be removed prior to automated processing. In this work, we present a deep learning based system, PageNet, which identifies the main page region in an image in order to segment content from both textual and non-textual border noise. In PageNet, a Fully Convolutional Network obtains a pixel-wise segmentation which is post-processed into the output quadrilateral region. We evaluate PageNet on 4 collections of historical handwritten documents and obtain over 94% mean intersection over union on all datasets and approach human performance on 2 of these collections. Additionally, we show that PageNet can segment documents that are overlayed on top of other documents.
[ { "version": "v1", "created": "Tue, 5 Sep 2017 22:54:49 GMT" } ]
2017-09-07T00:00:00
[ [ "Tensmeyer", "Chris", "" ], [ "Davis", "Brian", "" ], [ "Wigington", "Curtis", "" ], [ "Lee", "Iain", "" ], [ "Barrett", "Bill", "" ] ]
new_dataset
0.995823
1709.01761
EPTCS
Patricia Bouyer (LSV, CNRS & ENS de Cachan), Andrea Orlandini (ISTC-CNR, Italy), Pierluigi San Pietro (DEIB, Politecnico di Milano)
Proceedings Eighth International Symposium on Games, Automata, Logics and Formal Verification
null
EPTCS 256, 2017
10.4204/EPTCS.256
null
cs.GT cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains the proceedings of the Eighth International Symposium on Games, Automata, Logic and Formal Verification (GandALF 2017). The symposium took place in Roma, Italy, from the 20th to the 22nd of September 2017. The GandALF symposium was established by a group of Italian computer scientists interested in mathematical logic, automata theory, game theory, and their applications to the specification, design, and verification of complex systems. Its aim is to provide a forum where people from different areas, and possibly with different backgrounds, can fruitfully interact. GandALF has a truly international spirit, as witnessed by the composition of the program and steering committee and by the country distribution of the submitted papers.
[ { "version": "v1", "created": "Wed, 6 Sep 2017 10:58:27 GMT" } ]
2017-09-07T00:00:00
[ [ "Bouyer", "Patricia", "", "LSV, CNRS & ENS de Cachan" ], [ "Orlandini", "Andrea", "", "ISTC-CNR, Italy" ], [ "Pietro", "Pierluigi San", "", "DEIB, Politecnico di Milano" ] ]
new_dataset
0.962268
1709.01795
Samira Briongos
Samira Briongos, Gorka Irazoqui, Pedro Malag\'on and Thomas Eisenbarth
CacheShield: Protecting Legacy Processes Against Cache Attacks
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cache attacks pose a threat to any code whose execution flow or memory accesses depend on sensitive information. Especially in public clouds, where caches are shared across several tenants, cache attacks remain an unsolved problem. Cache attacks rely on evictions by the spy process, which alter the execution behavior of the victim process. We show that hardware performance events of cryptographic routines reveal the presence of cache attacks. Based on this observation, we propose CacheShield, a tool to protect legacy code by monitoring its execution and detecting the presence of cache attacks, thus providing the opportunity to take preventative measures. CacheShield can be run by users and does not require alteration of the OS or hypervisor, while previously proposed software-based countermeasures require cooperation from the hypervisor. Unlike methods that try to detect malicious processes, our approach is lean, as only a fraction of the system needs to be monitored. It also integrates well into today's cloud infrastructure, as concerned users can opt to use CacheShield without support from the cloud service provider. Our results show that CacheShield detects cache attacks fast, with high reliability, and with few false positives, even in the presence of strong noise.
[ { "version": "v1", "created": "Wed, 6 Sep 2017 12:09:35 GMT" } ]
2017-09-07T00:00:00
[ [ "Briongos", "Samira", "" ], [ "Irazoqui", "Gorka", "" ], [ "Malagón", "Pedro", "" ], [ "Eisenbarth", "Thomas", "" ] ]
new_dataset
0.998459
1709.01812
Gil Vernik
Gil Vernik, Michael Factor, Elliot K. Kolodner, Pietro Michiardi, Effi Ofer, Francesco Pace
Stocator: A High Performance Object Store Connector for Spark
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Stocator, a high performance object store connector for Apache Spark, that takes advantage of object store semantics. Previous connectors have assumed file system semantics, in particular, achieving fault tolerance and allowing speculative execution by creating temporary files to avoid interference between worker threads executing the same task and then renaming these files. Rename is not a native object store operation; not only is it not atomic, but it is implemented using a costly copy operation and a delete. Instead our connector leverages the inherent atomicity of object creation, and by avoiding the rename paradigm it greatly decreases the number of operations on the object store as well as enabling a much simpler approach to dealing with the eventually consistent semantics typical of object stores. We have implemented Stocator and shared it in open source. Performance testing shows that it is as much as 18 times faster for write intensive workloads and performs as much as 30 times fewer operations on the object store than the legacy Hadoop connectors, reducing costs both for the client and the object storage service provider.
[ { "version": "v1", "created": "Tue, 8 Aug 2017 06:02:03 GMT" } ]
2017-09-07T00:00:00
[ [ "Vernik", "Gil", "" ], [ "Factor", "Michael", "" ], [ "Kolodner", "Elliot K.", "" ], [ "Michiardi", "Pietro", "" ], [ "Ofer", "Effi", "" ], [ "Pace", "Francesco", "" ] ]
new_dataset
0.99917
1709.01848
Andrew Yates
Andrew Yates, Arman Cohan, Nazli Goharian
Depression and Self-Harm Risk Assessment in Online Forums
Expanded version of EMNLP17 paper. Added sections 6.1, 6.2, 6.4, FastText baseline, and CNN-R
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Users suffering from mental health conditions often turn to online resources for support, including specialized online support communities or general communities such as Twitter and Reddit. In this work, we present a neural framework for supporting and studying users in both types of communities. We propose methods for identifying posts in support communities that may indicate a risk of self-harm, and demonstrate that our approach outperforms strong previously proposed methods for identifying such posts. Self-harm is closely related to depression, which makes identifying depressed users on general forums a crucial related task. We introduce a large-scale general forum dataset ("RSDD") consisting of users with self-reported depression diagnoses matched with control users. We show how our method can be applied to effectively identify depressed users from their use of language alone. We demonstrate that our method outperforms strong baselines on this general forum dataset.
[ { "version": "v1", "created": "Wed, 6 Sep 2017 14:50:42 GMT" } ]
2017-09-07T00:00:00
[ [ "Yates", "Andrew", "" ], [ "Cohan", "Arman", "" ], [ "Goharian", "Nazli", "" ] ]
new_dataset
0.998354
1305.2545
Aleksandrs Slivkins
Ashwinkumar Badanidiyuru, Robert Kleinberg and Aleksandrs Slivkins
Bandits with Knapsacks
An extended abstract of this work has appeared in the 54th IEEE Symposium on Foundations of Computer Science (FOCS 2013). 55 pages. Compared to the initial "full version" from May'13, this version has a significantly revised presentation and reflects the current status of the follow-up work. Also, this version contains a stronger regret bound in one of the main results
null
10.1109/FOCS.2013.30
null
cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-armed bandit problems are the predominant theoretical model of exploration-exploitation tradeoffs in learning, and they have countless applications ranging from medical trials, to communication networks, to Web search and advertising. In many of these application domains the learner may be constrained by one or more supply (or budget) limits, in addition to the customary limitation on the time horizon. The literature lacks a general model encompassing these sorts of problems. We introduce such a model, called "bandits with knapsacks", that combines aspects of stochastic integer programming with online learning. A distinctive feature of our problem, in comparison to the existing regret-minimization literature, is that the optimal policy for a given latent distribution may significantly outperform the policy that plays the optimal fixed arm. Consequently, achieving sublinear regret in the bandits-with-knapsacks problem is significantly more challenging than in conventional bandit problems. We present two algorithms whose reward is close to the information-theoretic optimum: one is based on a novel "balanced exploration" paradigm, while the other is a primal-dual algorithm that uses multiplicative updates. Further, we prove that the regret achieved by both algorithms is optimal up to polylogarithmic factors. We illustrate the generality of the problem by presenting applications in a number of different domains including electronic commerce, routing, and scheduling. As one example of a concrete application, we consider the problem of dynamic posted pricing with limited supply and obtain the first algorithm whose regret, with respect to the optimal dynamic policy, is sublinear in the supply.
[ { "version": "v1", "created": "Sat, 11 May 2013 21:50:46 GMT" }, { "version": "v2", "created": "Sun, 30 Jun 2013 21:13:51 GMT" }, { "version": "v3", "created": "Thu, 15 Aug 2013 13:52:46 GMT" }, { "version": "v4", "created": "Mon, 20 Oct 2014 19:24:09 GMT" }, { "version": "v5", "created": "Wed, 24 Jun 2015 16:43:30 GMT" }, { "version": "v6", "created": "Fri, 31 Jul 2015 18:36:51 GMT" }, { "version": "v7", "created": "Sat, 17 Jun 2017 18:59:24 GMT" }, { "version": "v8", "created": "Tue, 5 Sep 2017 14:00:33 GMT" } ]
2017-09-06T00:00:00
[ [ "Badanidiyuru", "Ashwinkumar", "" ], [ "Kleinberg", "Robert", "" ], [ "Slivkins", "Aleksandrs", "" ] ]
new_dataset
0.999575
1610.07458
Kevin Ryczko
Kevin Ryczko, Adam Domurad, Nicholas Buhagiar, Isaac Tamblyn
Hashkat: Large-scale simulations of online social networks
null
null
10.1007/s13278-017-0424-7
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hashkat (http://hashkat.org) is a free, open source, agent based simulation software package designed to simulate large-scale online social networks (e.g. Twitter, Facebook, LinkedIn, etc). It allows for dynamic agent generation, edge creation, and information propagation. The purpose of hashkat is to study the growth of online social networks and how information flows within them. Like real life online social networks, hashkat incorporates user relationships, information diffusion, and trending topics. Hashkat was implemented in C++, and was designed with extensibility in mind. The software includes Shell and Python scripts for easy installation and usability. In this report, we describe all of the algorithms and features integrated into hashkat before moving on to example use cases. In general, hashkat can be used to understand the underlying topology of social networks, validate sampling methods of such networks, develop business strategy for advertising on online social networks, and test new features of an online social network before going into production.
[ { "version": "v1", "created": "Mon, 24 Oct 2016 15:32:07 GMT" } ]
2017-09-06T00:00:00
[ [ "Ryczko", "Kevin", "" ], [ "Domurad", "Adam", "" ], [ "Buhagiar", "Nicholas", "" ], [ "Tamblyn", "Isaac", "" ] ]
new_dataset
0.956945
1611.09914
Vitaly Skachek
Vitaly Skachek
Batch and PIR Codes and Their Connections to Locally Repairable Codes
Survey
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this survey, two related families of codes are discussed: batch codes and codes for private information retrieval. These two families can be viewed as natural generalizations of locally repairable codes, which were extensively studied in the context of coding for fault tolerance in distributed data storage systems. Bounds on the parameters of the codes, as well as basic constructions, are presented. Connections between different code families are discussed.
[ { "version": "v1", "created": "Tue, 29 Nov 2016 22:17:24 GMT" }, { "version": "v2", "created": "Thu, 9 Mar 2017 13:30:18 GMT" }, { "version": "v3", "created": "Tue, 6 Jun 2017 11:47:20 GMT" }, { "version": "v4", "created": "Tue, 5 Sep 2017 14:35:35 GMT" } ]
2017-09-06T00:00:00
[ [ "Skachek", "Vitaly", "" ] ]
new_dataset
0.99977
1708.08510
Peter Snyder
Peter Snyder, Cynthia Taylor, Chris Kanich
Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern web browsers have accrued an incredibly broad set of features since being invented for hypermedia dissemination in 1990. Many of these features benefit users by enabling new types of web applications. However, some features also bring risk to users' privacy and security, whether through implementation error, unexpected composition, or unintended use. Currently there is no general methodology for weighing these costs and benefits. Restricting access to only the features which are necessary for delivering desired functionality on a given website would allow users to enforce the principle of lease privilege on use of the myriad APIs present in the modern web browser. However, security benefits gained by increasing restrictions must be balanced against the risk of breaking existing websites. This work addresses this problem with a methodology for weighing the costs and benefits of giving websites default access to each browser feature. We model the benefit as the number of websites that require the feature for some user-visible benefit, and the cost as the number of CVEs, lines of code, and academic attacks related to the functionality. We then apply this methodology to 74 Web API standards implemented in modern browsers. We find that allowing websites default access to large parts of the Web API poses significant security and privacy risks, with little corresponding benefit. We also introduce a configurable browser extension that allows users to selectively restrict access to low-benefit, high-risk features on a per site basis. We evaluated our extension with two hardened browser configurations, and found that blocking 15 of the 74 standards avoids 52.0% of code paths related to previous CVEs, and 50.0% of implementation code identified by our metric, without affecting the functionality of 94.7% of measured websites.
[ { "version": "v1", "created": "Mon, 28 Aug 2017 20:26:51 GMT" }, { "version": "v2", "created": "Tue, 5 Sep 2017 01:30:26 GMT" } ]
2017-09-06T00:00:00
[ [ "Snyder", "Peter", "" ], [ "Taylor", "Cynthia", "" ], [ "Kanich", "Chris", "" ] ]
new_dataset
0.981067
1709.01070
Pavel Surynek
Marika Ivanov\'a, Pavel Surynek, Diep Thi Ngoc Nguyen
Maintaining Ad-Hoc Communication Network in Area Protection Scenarios with Adversarial Agents
arXiv admin note: substantial text overlap with arXiv:1708.07285
null
null
null
cs.MA cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address a problem of area protection in graph-based scenarios with multiple mobile agents where connectivity is maintained among agents to ensure they can communicate. The problem consists of two adversarial teams of agents that move in an undirected graph shared by both teams. Agents are placed in vertices of the graph; at most one agent can occupy a vertex; and they can move into adjacent vertices in a conflict free way. Teams have asymmetric goals: the aim of one team - attackers - is to invade into given area while the aim of the opponent team - defenders - is to protect the area from being entered by attackers by occupying selected vertices. The team of defenders need to maintain connectivity of vertices occupied by its own agents in a visibility graph. The visibility graph models possibility of communication between pairs of vertices. We study strategies for allocating vertices to be occupied by the team of defenders to block attacking agents where connectivity is maintained at the same time. To do this we reserve a subset of defending agents that do not try to block the attackers but instead are placed to support connectivity of the team. The performance of strategies is tested in multiple benchmarks. The success of a strategy is heavily dependent on the type of the instance, and so one of the contributions of this work is that we identify suitable strategies for diverse instance types.
[ { "version": "v1", "created": "Mon, 4 Sep 2017 07:38:17 GMT" } ]
2017-09-06T00:00:00
[ [ "Ivanová", "Marika", "" ], [ "Surynek", "Pavel", "" ], [ "Nguyen", "Diep Thi Ngoc", "" ] ]
new_dataset
0.991357
1709.01105
Ravi Kadlimatti
Ravi Kadlimatti and Adly T. Fam
Good Code Sets from Complementary Pairs via Discrete Frequency Chips
null
Kadlimatti, Ravi, and Adly T. Fam. "Good Code Sets from Complementary Pairs via Discrete Frequency Chips." Aerospace 4.2 (2017): 28
10.3390/aerospace4020028
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
It is shown that replacing the sinusoidal chip in Golay complementary code pairs by special classes of waveforms that satisfy two conditions, symmetry/anti-symmetry and quazi-orthogonality in the convolution sense, renders the complementary codes immune to frequency selective fading and also allows for concatenating them in time using one frequency band/channel. This results in a zero-sidelobe region around the mainlobe and an adjacent region of small cross-correlation sidelobes. The symmetry/anti-symmetry property results in the zero-sidelobe region on either side of the mainlobe, while quasi-orthogonality of the two chips keeps the adjacent region of cross-correlations small. Such codes are constructed using discrete frequency-coding waveforms (DFCW) based on linear frequency modulation (LFM) and piecewise LFM (PLFM) waveforms as chips for the complementary code pair, as they satisfy both the symmetry/anti-symmetry and quasi-orthogonality conditions. It is also shown that changing the slopes/chirp rates of the DFCW waveforms (based on LFM and PLFM waveforms) used as chips with the same complementary code pair results in good code sets with a zero-sidelobe region. It is also shown that a second good code set with a zero-sidelobe region could be constructed from the mates of the complementary code pair, while using the same DFCW waveforms as their chips. The cross-correlation between the two sets is shown to contain a zero-sidelobe region and an adjacent region of small cross-correlation sidelobes. Thus, the two sets are quasi-orthogonal and could be combined to form a good code set with twice the number of codes without affecting their cross-correlation properties. Or a better good code set with the same number codes could be constructed by choosing the best candidates form the two sets. Such code sets find utility in multiple input-multiple output (MIMO) radar applications.
[ { "version": "v1", "created": "Mon, 4 Sep 2017 18:18:34 GMT" } ]
2017-09-06T00:00:00
[ [ "Kadlimatti", "Ravi", "" ], [ "Fam", "Adly T.", "" ] ]
new_dataset
0.998589
1709.01241
Jayson Lynch
Erik D. Demaine, Isaac Grosof, Jayson Lynch
Push-Pull Block Puzzles are Hard
Full version of CIAC 2017 paper. 17 pages
Algorithms and Complexity: 10th International Conference, CIAC 2017, Athens, Greece, May 24-26, 2017, Proceedings
10.1007/978-3-319-57586-516
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proves that push-pull block puzzles in 3D are PSPACE-complete to solve, and push-pull block puzzles in 2D with thin walls are NP-hard to solve, settling an open question by Zubaran and Ritt. Push-pull block puzzles are a type of recreational motion planning problem, similar to Sokoban, that involve moving a `robot' on a square grid with $1 \times 1$ obstacles. The obstacles cannot be traversed by the robot, but some can be pushed and pulled by the robot into adjacent squares. Thin walls prevent movement between two adjacent squares. This work follows in a long line of algorithms and complexity work on similar problems. The 2D push-pull block puzzle shows up in the video games Pukoban as well as The Legend of Zelda: A Link to the Past, giving another proof of hardness for the latter. This variant of block-pushing puzzles is of particular interest because of its connections to reversibility, since any action (e.g., push or pull) can be inverted by another valid action (e.g., pull or push).
[ { "version": "v1", "created": "Tue, 5 Sep 2017 05:42:05 GMT" } ]
2017-09-06T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Grosof", "Isaac", "" ], [ "Lynch", "Jayson", "" ] ]
new_dataset
0.996937
1709.01320
Ahmadreza Montazerolghaem
Ahmadreza Montazerolghaem, Mohammad Hossein Yaghmaee, Alberto Leon-Garcia
OpenSIP: Toward Software-Defined SIP Networking
IEEE Transactions on Network and Service Management, vol. PP, no. 99, pp. 1-1. keywords: {Databases;IP networks;Resource management;Routing;Routing protocols;Servers;OpenFlow.;SDN and NFV orchestration;SIP Network management;SIP Resource Allocation;SIP Routing}
null
10.1109/TNSM.2017.2741258
Print ISSN: 1932-4537
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
VoIP is becoming a low-priced and efficient replacement for PSTN in communication industries. With a widely growing adoption rate, SIP is an application layer signaling protocol, standardized by the IETF, for creating, modifying, and terminating VoIP sessions. Generally speaking, SIP routes a call request to its destination by using SIP proxies. With the increasing use of SIP, traditional configurations pose certain drawbacks, such as ineffective routing, un-optimized management of proxy resources (including CPU and memory), and overload conditions. This paper presents OpenSIP to upgrade the SIP network framework with emerging technologies, such as SDN and NFV. SDN provides for management that decouples the data and control planes along with a software-based centralized control that results in effective routing and resource management. Moreover, NFV assists SDN by virtualizing various network devices and functions. However, current SDN elements limit the inspected fields to layer 2-4 headers, whereas SIP routing information resides in the layer-7 header. A benefit of OpenSIP is that it enforces policies on SIP networking that are agnostic to higher layers with the aid of a Deep Packet Inspection (DPI) engine. Among the benefits of OpenSIP is programmability, cost reduction, unified management, routing, as well as efficient load balancing. The present study implements OpenSIP on a real testbed which includes Open vSwitch and the Floodlight controller. The results show that the proposed architecture has a low overhead and satisfactory performance and, in addition, can take advantage of a flexible scale-out design during application deployment.
[ { "version": "v1", "created": "Tue, 5 Sep 2017 10:18:56 GMT" } ]
2017-09-06T00:00:00
[ [ "Montazerolghaem", "Ahmadreza", "" ], [ "Yaghmaee", "Mohammad Hossein", "" ], [ "Leon-Garcia", "Alberto", "" ] ]
new_dataset
0.990388
1709.01321
Rajdeep Dutta
Rajdeep Dutta, Chunjiang Qian, Liang Sun, Daniel Pack
A Generic Formation Controller and State Observer for Multiple Unmanned Systems
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a novel decentralized controller to drive multiple unmanned aerial vehicles (UAVs) into a symmetric formation of regular polygon shape surrounding a mobile target. The proposed controller works for time-varying information exchange topologies among agents and preserves a network connectivity while steering UAVs into a formation. The proposed nonlinear controller is highly generalized and offers flexibility in achieving the control objective due to the freedom of choosing controller parameters from a range of values. By the virtue of additional tuning parameters, i.e. fractional powers on proportional and derivative difference terms, the nonlinear controller procures a family of UAV trajectories satisfying the same control objective. An appropriate adjustment of the parameters facilitates in generating smooth UAV trajectories without causing abrupt position jumps. The convergence of the closed-loop system is analyzed and established using the Lyapunov approach. Simulation results validate the effectiveness of the proposed controller which outperforms an existing formation controller by driving a team of UAVs elegantly in a target-centric formation. We also present a nonlinear observer to estimate vehicle velocities with the availability of position coordinates and heading angles. Simulation results show that the proposed nonlinear observer results in quick convergence of the estimates to its true values.
[ { "version": "v1", "created": "Tue, 5 Sep 2017 10:21:06 GMT" } ]
2017-09-06T00:00:00
[ [ "Dutta", "Rajdeep", "" ], [ "Qian", "Chunjiang", "" ], [ "Sun", "Liang", "" ], [ "Pack", "Daniel", "" ] ]
new_dataset
0.977263
1709.01347
Elisabeth de Carvalho
Elisabeth de Carvalho, Emil Bj\"ornson, Jesper H. S{\o}rensen, Erik G. Larsson, Petar Popovski
Random Pilot and Data Access in Massive MIMO for Machine-type Communications
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A massive MIMO system, represented by a base station with hundreds of antennas, is capable of spatially multiplexing many devices and thus naturally suited to serve dense crowds of wireless devices in emerging applications, such as machine-type communications. Crowd scenarios pose new challenges in the pilot-based acquisition of channel state information and call for pilot access protocols that match the intermittent pattern of device activity. A joint pilot assignment and data transmission protocol based on random access is proposed in this paper for the uplink of a massive MIMO system. The protocol relies on the averaging across multiple transmission slots of the pilot collision events that result from the random access process. We derive new uplink sum rate expressions that take pilot collisions, intermittent device activity, and interference into account. Simplified bounds are obtained and used to optimize the device activation probability and pilot length. A performance analysis indicates how performance scales as a function of the number of antennas and the transmission slot duration.
[ { "version": "v1", "created": "Tue, 5 Sep 2017 12:26:21 GMT" } ]
2017-09-06T00:00:00
[ [ "de Carvalho", "Elisabeth", "" ], [ "Björnson", "Emil", "" ], [ "Sørensen", "Jesper H.", "" ], [ "Larsson", "Erik G.", "" ], [ "Popovski", "Petar", "" ] ]
new_dataset
0.99892
1709.01438
Pedro Neto
Mohammad Safeea, Pedro Neto
KUKA Sunrise Toolbox: Interfacing Collaborative Robots with MATLAB
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collaborative robots are increasingly present in our lives. The KUKA LBR iiwa equipped with the KUKA Sunrise.OS controller is a good example of a collaborative/sensitive robot. This paper presents a MATLAB Toolbox, the KUKA Sunrise Toolbox (KST), to interface KUKA Sunrise.OS using MATLAB. The KST contains functionalities for networking, real-time control, point-to-point motion, setters and getters of parameters and physical interaction. KST includes more than 50 functions and runs on a remote computer connected with the KUKA Sunrise controller via transmission control Protocol/Internet Protocol (TCP/IP). The KST potentialities are demonstrated in three use cases.
[ { "version": "v1", "created": "Tue, 5 Sep 2017 15:02:31 GMT" } ]
2017-09-06T00:00:00
[ [ "Safeea", "Mohammad", "" ], [ "Neto", "Pedro", "" ] ]
new_dataset
0.956969
1709.01459
David Joseph Tan
David Joseph Tan and Nassir Navab and Federico Tombari
6D Object Pose Estimation with Depth Images: A Seamless Approach for Robotic Interaction and Augmented Reality
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To determine the 3D orientation and 3D location of objects in the surroundings of a camera mounted on a robot or mobile device, we developed two powerful algorithms in object detection and temporal tracking that are combined seamlessly for robotic perception and interaction as well as Augmented Reality (AR). A separate evaluation of, respectively, the object detection and the temporal tracker demonstrates the important stride in research as well as the impact on industrial robotic applications and AR. When evaluated on a standard dataset, the detector produced the highest f1-score with a large margin while the tracker generated the best accuracy at a very low latency of approximately 2 ms per frame with one CPU core: both algorithms outperforming the state of the art. When combined, we achieve a powerful framework that is robust to handle multiple instances of the same object under occlusion and clutter while attaining real-time performance. Aiming at stepping beyond the simple scenarios used by current systems, often constrained by having a single object in absence of clutter, averting to touch the object to prevent close-range partial occlusion, selecting brightly colored objects to easily segment them individually or assuming that the object has simple geometric structure, we demonstrate the capacity to handle challenging cases under clutter, partial occlusion and varying lighting conditions with objects of different shapes and sizes.
[ { "version": "v1", "created": "Tue, 5 Sep 2017 15:38:26 GMT" } ]
2017-09-06T00:00:00
[ [ "Tan", "David Joseph", "" ], [ "Navab", "Nassir", "" ], [ "Tombari", "Federico", "" ] ]
new_dataset
0.999716
1709.01493
Monika Rani
Monika Rani and O. P. Vyas
Smart Bike Sharing System to make the City even Smarter
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These last years with the growing population in the smart city demands an efficient transportation sharing (bike sharing) system for developing the smart city. The Bike sharing as we know is affordable, easily accessible and reliable mode of transportation. But an efficient bike sharing capable of not only sharing bike also provides information regarding the availability of bike per station, route business, time/day-wise bike schedule. The embedded sensors are able to opportunistically communicate through wireless communication with stations when available, providing real-time data about tours/minutes, speed, effort, rhythm, etc. We have been based on our study analysis data to predict regarding the bike's available at stations, bike schedule, a location of the nearest hub where a bike is available etc., reduce the user time and effort.
[ { "version": "v1", "created": "Sat, 5 Aug 2017 08:46:47 GMT" } ]
2017-09-06T00:00:00
[ [ "Rani", "Monika", "" ], [ "Vyas", "O. P.", "" ] ]
new_dataset
0.997345
1410.5926
Huaizu Jiang
Huaizu Jiang, Zejian Yuan, Ming-Ming Cheng, Yihong Gong, Nanning Zheng, Jingdong Wang
Salient Object Detection: A Discriminative Regional Feature Integration Approach
null
null
10.1007/s11263-016-0977-3
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Salient object detection has been attracting a lot of interest, and recently various heuristic computational models have been designed. In this paper, we formulate saliency map computation as a regression problem. Our method, which is based on multi-level image segmentation, utilizes the supervised learning approach to map the regional feature vector to a saliency score. Saliency scores across multiple levels are finally fused to produce the saliency map. The contributions lie in two-fold. One is that we propose a discriminate regional feature integration approach for salient object detection. Compared with existing heuristic models, our proposed method is able to automatically integrate high-dimensional regional saliency features and choose discriminative ones. The other is that by investigating standard generic region properties as well as two widely studied concepts for salient object detection, i.e., regional contrast and backgroundness, our approach significantly outperforms state-of-the-art methods on six benchmark datasets. Meanwhile, we demonstrate that our method runs as fast as most existing algorithms.
[ { "version": "v1", "created": "Wed, 22 Oct 2014 07:05:38 GMT" } ]
2017-09-05T00:00:00
[ [ "Jiang", "Huaizu", "" ], [ "Yuan", "Zejian", "" ], [ "Cheng", "Ming-Ming", "" ], [ "Gong", "Yihong", "" ], [ "Zheng", "Nanning", "" ], [ "Wang", "Jingdong", "" ] ]
new_dataset
0.996083
1606.05982
Lawrence Ong
Lawrence Ong
Optimal Finite-Length and Asymptotic Index Codes for Five or Fewer Receivers
Author final manuscript
null
10.1109/TIT.2017.2748562
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Index coding models broadcast networks in which a sender sends different messages to different receivers simultaneously, where each receiver may know some of the messages a priori. The aim is to find the minimum (normalised) index codelength that the sender sends. This paper considers unicast index coding, where each receiver requests exactly one message, and each message is requested by exactly one receiver. Each unicast index-coding instances can be fully described by a directed graph and vice versa, where each vertex corresponds to one receiver. For any directed graph representing a unicast index-coding instance, we show that if a maximum acyclic induced subgraph (MAIS) is obtained by removing two or fewer vertices from the graph, then the minimum index codelength equals the number of vertices in the MAIS, and linear codes are optimal for the corresponding index-coding instance. Using this result, we solved all unicast index-coding instances with up to five receivers, which correspond to all graphs with up to five vertices. For 9819 non-isomorphic graphs among all graphs up to five vertices, we obtained the minimum index codelength for all message alphabet sizes; for the remaining 28 graphs, we obtained the minimum index codelength if the message alphabet size is $k^2$ for any positive integer $k$. This work complements the result by Arbabjolfaei et al. (ISIT 2013), who solved all unicast index-coding instances with up to five receivers in the asymptotic regime, where the message alphabet size tends to infinity.
[ { "version": "v1", "created": "Mon, 20 Jun 2016 06:28:57 GMT" }, { "version": "v2", "created": "Mon, 4 Sep 2017 00:06:00 GMT" } ]
2017-09-05T00:00:00
[ [ "Ong", "Lawrence", "" ] ]
new_dataset
0.999592
1701.07616
Valerio Bioglio
Valerio Bioglio, Frederic Gabry, Ingmar Land, Jean-Claude Belfiore
Minimum-Distance Based Construction of Multi-Kernel Polar Codes
to appear in IEEE Globecom 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a construction for multi-kernel polar codes based on the maximization of the minimum distance. Compared to the original construction based on density evolution, our new design shows particular advantages for short code lengths, where the polarization effect has less impact on the performance than the distances of the code. We introduce and compute the minimum-distance profile and provide a simple greedy algorithm for the code design. Compared to state-of-the-art punctured or shortened Arikan polar codes, multi-kernel polar codes with our new design show significantly improved error-rate performance.
[ { "version": "v1", "created": "Thu, 26 Jan 2017 08:47:04 GMT" }, { "version": "v2", "created": "Mon, 4 Sep 2017 10:06:20 GMT" } ]
2017-09-05T00:00:00
[ [ "Bioglio", "Valerio", "" ], [ "Gabry", "Frederic", "" ], [ "Land", "Ingmar", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
new_dataset
0.992003
1702.01815
Gemma Boleda
Gemma Boleda, Sebastian Pad\'o, Nghia The Pham, Marco Baroni
Living a discrete life in a continuous world: Reference with distributed representations
Accepted at IWCS 2017. Final version, 9 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reference is a crucial property of language that allows us to connect linguistic expressions to the world. Modeling it requires handling both continuous and discrete aspects of meaning. Data-driven models excel at the former, but struggle with the latter, and the reverse is true for symbolic models. This paper (a) introduces a concrete referential task to test both aspects, called cross-modal entity tracking; (b) proposes a neural network architecture that uses external memory to build an entity library inspired in the DRSs of DRT, with a mechanism to dynamically introduce new referents or add information to referents that are already in the library. Our model shows promise: it beats traditional neural network architectures on the task. However, it is still outperformed by Memory Networks, another model with external memory.
[ { "version": "v1", "created": "Mon, 6 Feb 2017 22:50:49 GMT" }, { "version": "v2", "created": "Mon, 4 Sep 2017 08:44:28 GMT" } ]
2017-09-05T00:00:00
[ [ "Boleda", "Gemma", "" ], [ "Padó", "Sebastian", "" ], [ "Pham", "Nghia The", "" ], [ "Baroni", "Marco", "" ] ]
new_dataset
0.994876
1707.09468
Rowan Zellers
Rowan Zellers, Yejin Choi
Zero-Shot Activity Recognition with Verb Attribute Induction
accepted to EMNLP 2017
null
null
null
cs.CL cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate large-scale zero-shot activity recognition by modeling the visual and linguistic attributes of action verbs. For example, the verb "salute" has several properties, such as being a light movement, a social act, and short in duration. We use these attributes as the internal mapping between visual and textual representations to reason about a previously unseen action. In contrast to much prior work that assumes access to gold standard attributes for zero-shot classes and focuses primarily on object attributes, our model uniquely learns to infer action attributes from dictionary definitions and distributed word representations. Experimental results confirm that action attributes inferred from language can provide a predictive signal for zero-shot prediction of previously unseen activities.
[ { "version": "v1", "created": "Sat, 29 Jul 2017 06:05:52 GMT" }, { "version": "v2", "created": "Sat, 2 Sep 2017 19:53:20 GMT" } ]
2017-09-05T00:00:00
[ [ "Zellers", "Rowan", "" ], [ "Choi", "Yejin", "" ] ]
new_dataset
0.957525
1708.01967
Kai Shu
Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, Huan Liu
Fake News Detection on Social Media: A Data Mining Perspective
ACM SIGKDD Explorations Newsletter, 2017
null
null
null
cs.SI cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social media for news consumption is a double-edged sword. On the one hand, its low cost, easy access, and rapid dissemination of information lead people to seek out and consume news from social media. On the other hand, it enables the wide spread of "fake news", i.e., low quality news with intentionally false information. The extensive spread of fake news has the potential for extremely negative impacts on individuals and society. Therefore, fake news detection on social media has recently become an emerging research that is attracting tremendous attention. Fake news detection on social media presents unique characteristics and challenges that make existing detection algorithms from traditional news media ineffective or not applicable. First, fake news is intentionally written to mislead readers to believe false information, which makes it difficult and nontrivial to detect based on news content; therefore, we need to include auxiliary information, such as user social engagements on social media, to help make a determination. Second, exploiting this auxiliary information is challenging in and of itself as users' social engagements with fake news produce data that is big, incomplete, unstructured, and noisy. Because the issue of fake news detection on social media is both challenging and relevant, we conducted this survey to further facilitate research on the problem. In this survey, we present a comprehensive review of detecting fake news on social media, including fake news characterizations on psychology and social theories, existing algorithms from a data mining perspective, evaluation metrics and representative datasets. We also discuss related research areas, open problems, and future research directions for fake news detection on social media.
[ { "version": "v1", "created": "Mon, 7 Aug 2017 02:29:09 GMT" }, { "version": "v2", "created": "Wed, 9 Aug 2017 00:25:03 GMT" }, { "version": "v3", "created": "Sun, 3 Sep 2017 02:40:05 GMT" } ]
2017-09-05T00:00:00
[ [ "Shu", "Kai", "" ], [ "Sliva", "Amy", "" ], [ "Wang", "Suhang", "" ], [ "Tang", "Jiliang", "" ], [ "Liu", "Huan", "" ] ]
new_dataset
0.998612
1708.07985
Alessio Arleo
Alessio Arleo, Walter Didimo, Giuseppe Liotta, Fabrizio Montecchiani
GiViP: A Visual Profiler for Distributed Graph Processing Systems
Appears in the Proceedings of the 25th International Symposium on Graph Drawing and Network Visualization (GD 2017)
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analyzing large-scale graphs provides valuable insights in different application scenarios. While many graph processing systems working on top of distributed infrastructures have been proposed to deal with big graphs, the tasks of profiling and debugging their massive computations remain time consuming and error-prone. This paper presents GiViP, a visual profiler for distributed graph processing systems based on a Pregel-like computation model. GiViP captures the huge amount of messages exchanged throughout a computation and provides an interactive user interface for the visual analysis of the collected data. We show how to take advantage of GiViP to detect anomalies related to the computation and to the infrastructure, such as slow computing units and anomalous message patterns.
[ { "version": "v1", "created": "Sat, 26 Aug 2017 15:30:03 GMT" }, { "version": "v2", "created": "Sat, 2 Sep 2017 15:28:25 GMT" } ]
2017-09-05T00:00:00
[ [ "Arleo", "Alessio", "" ], [ "Didimo", "Walter", "" ], [ "Liotta", "Giuseppe", "" ], [ "Montecchiani", "Fabrizio", "" ] ]
new_dataset
0.998077
1708.09603
Pascal Giard
Pascal Giard, Alexios Balatsoukas-Stimming, Thomas Christoph M\"uller, Andrea Bonetti, Claude Thibeault, Warren J. Gross, Philippe Flatresse, Andreas Burg
PolarBear: A 28-nm FD-SOI ASIC for Decoding of Polar Codes
12 pages, 12 figures, 5 tables, to appear in IEEE Journal on Emerging and Selected Topics in Circuits and Systems
null
10.1109/JETCAS.2017.2745704
null
cs.AR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes are a recently proposed class of block codes that provably achieve the capacity of various communication channels. They received a lot of attention as they can do so with low-complexity encoding and decoding algorithms, and they have an explicit construction. Their recent inclusion in a 5G communication standard will only spur more research. However, only a couple of ASICs featuring decoders for polar codes were fabricated, and none of them implements a list-based decoding algorithm. In this paper, we present ASIC measurement results for a fabricated 28 nm CMOS chip that implements two different decoders: the first decoder is tailored toward error-correction performance and flexibility. It supports any code rate as well as three different decoding algorithms: successive cancellation (SC), SC flip and SC list (SCL). The flexible decoder can also decode both non-systematic and systematic polar codes. The second decoder targets speed and energy efficiency. We present measurement results for the first silicon-proven SCL decoder, where its coded throughput is shown to be of 306.8 Mbps with a latency of 3.34 us and an energy per bit of 418.3 pJ/bit at a clock frequency of 721 MHz for a supply of 1.3 V. The energy per bit drops down to 178.1 pJ/bit with a more modest clock frequency of 308 MHz, lower throughput of 130.9 Mbps and a reduced supply voltage of 0.9 V. For the other two operating modes, the energy per bit is shown to be of approximately 95 pJ/bit. The less flexible high-throughput unrolled decoder can achieve a coded throughput of 9.2 Gbps and a latency of 628 ns for a measured energy per bit of 1.15 pJ/bit at 451 MHz.
[ { "version": "v1", "created": "Thu, 31 Aug 2017 08:03:19 GMT" }, { "version": "v2", "created": "Fri, 1 Sep 2017 09:01:53 GMT" } ]
2017-09-05T00:00:00
[ [ "Giard", "Pascal", "" ], [ "Balatsoukas-Stimming", "Alexios", "" ], [ "Müller", "Thomas Christoph", "" ], [ "Bonetti", "Andrea", "" ], [ "Thibeault", "Claude", "" ], [ "Gross", "Warren J.", "" ], [ "Flatresse", "Philippe", "" ], [ "Burg", "Andreas", "" ] ]
new_dataset
0.999852
1709.00525
Hang Li
Hang Li
Sensor Network Based Collision-Free Navigation and Map Building for Mobile Robots
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Safe robot navigation is a fundamental research field for autonomous robots including ground mobile robots and flying robots. The primary objective of a safe robot navigation algorithm is to guide an autonomous robot from its initial position to a target or along a desired path with obstacle avoidance. With the development of information technology and sensor technology, the implementations combining robotics with sensor network are focused on in the recent researches. One of the relevant implementations is the sensor network based robot navigation. Moreover, another important navigation problem of robotics is safe area search and map building. In this report, a global collision-free path planning algorithm for ground mobile robots in dynamic environments is presented firstly. Considering the advantages of sensor network, the presented path planning algorithm is developed to a sensor network based navigation algorithm for ground mobile robots. The 2D range finder sensor network is used in the presented method to detect static and dynamic obstacles. The sensor network can guide each ground mobile robot in the detected safe area to the target. Furthermore, the presented navigation algorithm is extended into 3D environments. With the measurements of the sensor network, any flying robot in the workspace is navigated by the presented algorithm from the initial position to the target. Moreover, in this report, another navigation problem, safe area search and map building for ground mobile robot, is studied and two algorithms are presented. In the first presented method, we consider a ground mobile robot equipped with a 2D range finder sensor searching a bounded 2D area without any collision and building a complete 2D map of the area. Furthermore, the first presented map building algorithm is extended to another algorithm for 3D map building.
[ { "version": "v1", "created": "Sat, 2 Sep 2017 03:11:20 GMT" } ]
2017-09-05T00:00:00
[ [ "Li", "Hang", "" ] ]
new_dataset
0.994011
1709.00588
Zhiheng Zhou
Zhiheng Zhou, Congduan Li, Shenghao Yang and Xuan Guang
Practical Inner Codes for Batched Sparse Codes in Wireless Multihop Networks
35 pages, 6 figures, Submitted to IEEE Transactions on Vehicular Technology
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
Batched sparse (BATS) code is a promising technology for reliable data transmission in multi-hop wireless networks. As a BATS code consists of an outer code and an inner code that typically is a random linear network code, one main research topic for BATS codes is to design an inner code with good performance in transmission efficiency and complexity. In this paper, this issue is addressed with a focus on the problem of minimizing the total number of packets transmitted by the source and intermediate nodes. Subsequently, the problem is formulated as a mixed integer nonlinear programming (MINLP) problem that is NP-hard in general. By exploiting the properties of inner codes and the incomplete beta function, we construct a nonlinear programming (NLP) problem that gives a valid upper bound on the best performance that can be achieved by any feasible solutions. Moreover, both centralized and decentralized real-time optimization strategies are developed. In particular, the decentralized approach is performed independently by each node to find a feasible solution in linear time with the use of look-up tables. Numerical results show that the gap in performance between our proposed approaches and the upper bound is very small, which demonstrates that all feasible solutions developed in the paper are near-optimal with a guaranteed performance bound.
[ { "version": "v1", "created": "Sat, 2 Sep 2017 14:30:17 GMT" } ]
2017-09-05T00:00:00
[ [ "Zhou", "Zhiheng", "" ], [ "Li", "Congduan", "" ], [ "Yang", "Shenghao", "" ], [ "Guang", "Xuan", "" ] ]
new_dataset
0.99953