id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1709.00696
|
Emanuele Bellini
|
Emanuele Bellini, Nadir Murru
|
A multifactor RSA-like scheme with fast decryption based on R\'edei
rational functions over the Pell hyperbola
|
15 pages
| null | null | null |
cs.IT math.GR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a generalization of an RSA-like scheme based on R\'edei rational
functions over the Pell hyperbola. Instead of a modulus which is a product of
two primes, we define the scheme on a multi-factor modulus, i.e. on a product
of more than two primes. This results in a scheme with a decryption which is
quadratically faster, in the number of primes factoring the modulus, than the
original RSA, while preserving a better security. The scheme reaches its best
efficiency advantage over RSA for high security levels, since in these cases
the modulus can contain more primes. Compared to the analog schemes based on
elliptic curves, as the KMOV cryptosystem, the proposed scheme is more
efficient. Furthermore a variation of the scheme with larger ciphertext size
does not suffer of impossible group operation attacks, as it happens for
schemes based on elliptic curves.
|
[
{
"version": "v1",
"created": "Sun, 3 Sep 2017 11:04:34 GMT"
}
] | 2017-09-05T00:00:00 |
[
[
"Bellini",
"Emanuele",
""
],
[
"Murru",
"Nadir",
""
]
] |
new_dataset
| 0.996137 |
1709.00777
|
Clemens Kupke
|
Helle Hvid Hansen, Clemens Kupke, Johannes Marti, Yde Venema
|
Parity Games and Automata for Game Logic (Extended Version)
|
Technical Report version of the paper published at the workshop DaLi
2017 on Dynamic Logic: new trends and applications
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Parikh's game logic is a PDL-like fixpoint logic interpreted on monotone
neighbourhood frames that represent the strategic power of players in
determined two-player games. Game logic translates into a fragment of the
monotone $\mu$-calculus, which in turn is expressively equivalent to monotone
modal automata. Parity games and automata are important tools for dealing with
the combinatorial complexity of nested fixpoints in modal fixpoint logics, such
as the modal $\mu$-calculus. In this paper, we (1) discuss the semantics a of
game logic over neighbourhood structures in terms of parity games, and (2) use
these games to obtain an automata-theoretic characterisation of the fragment of
the monotone $\mu$-calculus that corresponds to game logic. Our proof makes
extensive use of structures that we call syntax graphs that combine the
ease-of-use of syntax trees of formulas with the flexibility and succinctness
of automata. They are essentially a graph-based view of the alternating tree
automata that were introduced by Wilke in the study of modal $\mu$-calculus.
|
[
{
"version": "v1",
"created": "Sun, 3 Sep 2017 23:51:31 GMT"
}
] | 2017-09-05T00:00:00 |
[
[
"Hansen",
"Helle Hvid",
""
],
[
"Kupke",
"Clemens",
""
],
[
"Marti",
"Johannes",
""
],
[
"Venema",
"Yde",
""
]
] |
new_dataset
| 0.999779 |
1709.00827
|
EPTCS
|
James Ferlez (University of Maryland, College Park), Rance Cleaveland
(University of Maryland, College Park), Steve Marcus (University of Maryland,
College Park)
|
Bisimulation and Hennessy-Milner Logic for Generalized Synchronization
Trees
|
In Proceedings EXPRESS/SOS 2017, arXiv:1709.00049
|
EPTCS 255, 2017, pp. 35-50
|
10.4204/EPTCS.255.3
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we develop a generalization of Hennessy-Milner Logic (HML) for
Generalized Synchronization Trees (GSTs) that we call Generalized Hennessy
Milner Logic (GHML). Importantly, this logic suggests a strong relationship
between (weak) bisimulation for GSTs and ordinary bisimulation for
Synchronization Trees (STs). We demonstrate that this relationship can be used
to define the GST analog for image-finiteness of STs. Furthermore, we
demonstrate that certain maximal Hennessy-Milner classes of STs have
counterparts in maximal Hennessy-Milner classes of GSTs with respect to GST
weak bisimulation. We also exhibit some interesting characteristics of these
maximal Hennessy-Milner classes of GSTs.
|
[
{
"version": "v1",
"created": "Mon, 4 Sep 2017 06:28:16 GMT"
}
] | 2017-09-05T00:00:00 |
[
[
"Ferlez",
"James",
"",
"University of Maryland, College Park"
],
[
"Cleaveland",
"Rance",
"",
"University of Maryland, College Park"
],
[
"Marcus",
"Steve",
"",
"University of Maryland,\n College Park"
]
] |
new_dataset
| 0.960507 |
1709.00833
|
Ludovic Courtes
|
Ludovic Court\`es
|
Code Staging in GNU Guix
|
16th ACM SIGPLAN International Conference on Generative Programming:
Concepts and Experiences (GPCE'17), Oct 2017, Vancouver, Canada
| null |
10.1145/3136040.3136045
| null |
cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
GNU Guix is a " functional " package manager that builds upon earlier work on
Nix. Guix implements high-level abstractions such as packages and operating
system services as domain-specic languages (DSLs) embedded in Scheme. It also
implements build actions and operating system orchestration in Scheme. This
leads to a multi-tier programming environment where embedded code snippets are
staged for eventual execution. This paper presents G-expressions or " gexps ",
the staging mechanism we devised for Guix. We explain our journey from
traditional Lisp S-expressions to G-expressions, which augment the former with
contextual information and ensure hygienic code staging. We discuss the
implementation of gexps and report on our experience using them in a variety of
operating system use cases-from package build processes to system services.
Gexps provide a novel way to cover many aspects of OS connguration in a single,
multi-tier language, while facilitating code reuse and code sharing .
|
[
{
"version": "v1",
"created": "Mon, 4 Sep 2017 06:34:07 GMT"
}
] | 2017-09-05T00:00:00 |
[
[
"Courtès",
"Ludovic",
""
]
] |
new_dataset
| 0.999708 |
1709.00931
|
Azlan Iqbal
|
Azlan Iqbal
|
A Computer Composes A Fabled Problem: Four Knights vs. Queen
|
12 pages, 5 figures and 2 appendices
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explain how the prototype automatic chess problem composer, Chesthetica,
successfully composed a rare and interesting chess problem using the new
Digital Synaptic Neural Substrate (DSNS) computational creativity approach.
This problem represents a greater challenge from a creative standpoint because
the checkmate is not always clear and the method of winning even less so.
Creating a decisive chess problem of this type without the aid of an omniscient
7-piece endgame tablebase (and one that also abides by several chess
composition conventions) would therefore be a challenge for most human players
and composers working on their own. The fact that a small computer with
relatively low processing power and memory was sufficient to compose such a
problem using the DSNS approach in just 10 days is therefore noteworthy. In
this report we document the event and result in some detail. It lends
additional credence to the DSNS as a viable new approach in the field of
computational creativity. In particular, in areas where human-like creativity
is required for targeted or specific problems with no clear path to the
solution.
|
[
{
"version": "v1",
"created": "Mon, 4 Sep 2017 12:56:23 GMT"
}
] | 2017-09-05T00:00:00 |
[
[
"Iqbal",
"Azlan",
""
]
] |
new_dataset
| 0.960256 |
1606.00359
|
Sankaralingam Dhanalakshmi
|
S. Dhanalakshmi and N. Sadagopan
|
On strictly Chordality-k graphs
|
25 pages, 11 figures, 2 tables, 3 algorithms, In revision in Discrete
Applied Mathematics
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Strictly Chordality-k graphs (SC_k graphs) are graphs which are either cycle
free or every induced cycle is exactly k, for some fixed k, k \geq 3. Note that
k = 3 and k = 4 are precisely the Chordal graphs and Chordal Bipartite graphs,
respectively. In this paper, we initiate a structural and an algorithmic study
of SCk, k \geq 5 graphs.
|
[
{
"version": "v1",
"created": "Wed, 1 Jun 2016 17:15:14 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Sep 2017 14:20:37 GMT"
}
] | 2017-09-04T00:00:00 |
[
[
"Dhanalakshmi",
"S.",
""
],
[
"Sadagopan",
"N.",
""
]
] |
new_dataset
| 0.999578 |
1609.04918
|
Jimmy Wu
|
Alex Khodaverdian, Benjamin Weitz, Jimmy Wu, Nir Yosef
|
Steiner Network Problems on Temporal Graphs
| null | null | null | null |
cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a temporal Steiner network problem in which a graph, as well as
changes to its edges and/or vertices over a set of discrete times, are given as
input; the goal is to find a minimal subgraph satisfying a set of $k$
time-sensitive connectivity demands. We show that this problem, $k$-Temporal
Steiner Network ($k$-TSN), is NP-hard to approximate to a factor of $k -
\epsilon$, for every fixed $k \geq 2$ and $\epsilon > 0$. This bound is tight,
as certified by a trivial approximation algorithm. Conceptually this
demonstrates, in contrast to known results for traditional Steiner problems,
that a time dimension adds considerable complexity even when the problem is
offline.
We also discuss special cases of $k$-TSN in which the graph changes satisfy a
monotonicity property. We show approximation-preserving reductions from
monotonic $k$-TSN to well-studied problems such as Priority Steiner Tree and
Directed Steiner Tree, implying improved approximation algorithms.
Lastly, $k$-TSN and its variants arise naturally in computational biology; to
facilitate such applications, we devise an integer linear program for $k$-TSN
based on network flows.
|
[
{
"version": "v1",
"created": "Fri, 16 Sep 2016 06:49:22 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Sep 2017 03:30:55 GMT"
}
] | 2017-09-04T00:00:00 |
[
[
"Khodaverdian",
"Alex",
""
],
[
"Weitz",
"Benjamin",
""
],
[
"Wu",
"Jimmy",
""
],
[
"Yosef",
"Nir",
""
]
] |
new_dataset
| 0.951884 |
1703.07814
|
Abir Das
|
Huijuan Xu, Abir Das, Kate Saenko
|
R-C3D: Region Convolutional 3D Network for Temporal Activity Detection
|
ICCV 2017 Camera Ready Version
|
Proceedings of the International Conference on Computer Vision
(ICCV), 2017
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We address the problem of activity detection in continuous, untrimmed video
streams. This is a difficult task that requires extracting meaningful
spatio-temporal features to capture activities, accurately localizing the start
and end times of each activity. We introduce a new model, Region Convolutional
3D Network (R-C3D), which encodes the video streams using a three-dimensional
fully convolutional network, then generates candidate temporal regions
containing activities, and finally classifies selected regions into specific
activities. Computation is saved due to the sharing of convolutional features
between the proposal and the classification pipelines. The entire model is
trained end-to-end with jointly optimized localization and classification
losses. R-C3D is faster than existing methods (569 frames per second on a
single Titan X Maxwell GPU) and achieves state-of-the-art results on THUMOS'14.
We further demonstrate that our model is a general activity detection framework
that does not rely on assumptions about particular dataset properties by
evaluating our approach on ActivityNet and Charades. Our code is available at
http://ai.bu.edu/r-c3d/.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2017 18:49:05 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Aug 2017 22:37:54 GMT"
}
] | 2017-09-04T00:00:00 |
[
[
"Xu",
"Huijuan",
""
],
[
"Das",
"Abir",
""
],
[
"Saenko",
"Kate",
""
]
] |
new_dataset
| 0.982907 |
1705.06804
|
Daniele Pinchera Dr.
|
Daniele Pinchera, Marco Donald Migliore, Fulvio Schettino and Gaetano
Panariello
|
Antenna Arrays for Line-of-Sight Massive MIMO: Half Wavelength is not
Enough
|
updated version of the paper, that now includes additional results on
the spectral efficiency
|
Electronics 2017, 6, 57
|
10.3390/electronics6030057
| null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aim of this paper is to analyze the array synthesis for 5 G massive MIMO
systems in the line-of-sight working condition. The main result of the
numerical investigation performed is that non-uniform arrays are the natural
choice in this kind of application. In particular, by using non-equispaced
arrays, we show that it is possible to achieve a better average condition
number of the channel matrix and a significantly higher spectral efficiency.
Furthermore, we verify that increasing the array size is beneficial also for
circular arrays, and we provide some useful rules-of-thumb for antenna array
design for massive MIMO applications. These results are in contrast to the
widely-accepted idea in the 5 G massive MIMO literature, in which the
half-wavelength linear uniform array is universally adopted.
|
[
{
"version": "v1",
"created": "Thu, 18 May 2017 21:23:27 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Sep 2017 15:50:04 GMT"
}
] | 2017-09-04T00:00:00 |
[
[
"Pinchera",
"Daniele",
""
],
[
"Migliore",
"Marco Donald",
""
],
[
"Schettino",
"Fulvio",
""
],
[
"Panariello",
"Gaetano",
""
]
] |
new_dataset
| 0.998697 |
1709.00043
|
Giuseppe Liotta
|
Sylvain Lazard, William Lenhart, and Giuseppe Liotta
|
On the Edge-length Ratio of Outerplanar Graphs
|
Appears in the Proceedings of the 25th International Symposium on
Graph Drawing and Network Visualization (GD 2017)
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that any outerplanar graph admits a planar straightline drawing such
that the length ratio of the longest to the shortest edges is strictly less
than 2. This result is tight in the sense that for any $\epsilon > 0$ there are
outerplanar graphs that cannot be drawn with an edge-length ratio smaller than
$2 - \epsilon$. We also show that every bipartite outerplanar graph has a
planar straight-line drawing with edge-length ratio 1, and that, for any $k
\geq 1$, there exists an outerplanar graph with a given combinatorial embedding
such that any planar straight-line drawing has edge-length ratio greater than
k.
|
[
{
"version": "v1",
"created": "Thu, 31 Aug 2017 19:02:12 GMT"
}
] | 2017-09-04T00:00:00 |
[
[
"Lazard",
"Sylvain",
""
],
[
"Lenhart",
"William",
""
],
[
"Liotta",
"Giuseppe",
""
]
] |
new_dataset
| 0.999513 |
1709.00098
|
Duc Nguyen
|
Duc T. Nguyen and Blair Kaneshiro
|
AudExpCreator: A GUI-based Matlab tool for designing and creating
auditory experiments with the Psychophysics Toolbox
|
15 pages, 6 figures
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present AudExpCreator, a GUI-based Matlab tool for designing and creating
auditory experiments. AudExpCreator allows users to generate auditory
experiments that run on Matlab's Psychophysics Toolbox without having to write
any code; rather, users simply follow instructions in GUIs to specify desired
design parameters. The software comprises five auditory study types, including
behavioral studies and integration with EEG and physiological response
collection systems. Advanced features permit more complicated experimental
designs as well as maintenance and update of previously created experiments.
AudExpCreator alleviates programming barriers while providing a free,
open-source alternative to commercial experimental design software.
|
[
{
"version": "v1",
"created": "Thu, 31 Aug 2017 22:15:12 GMT"
}
] | 2017-09-04T00:00:00 |
[
[
"Nguyen",
"Duc T.",
""
],
[
"Kaneshiro",
"Blair",
""
]
] |
new_dataset
| 0.98582 |
1709.00372
|
Daniel Archambault
|
Paolo Simonetto, Daniel Archambault and Stephen Kobourov
|
Drawing Dynamic Graphs Without Timeslices
|
Appears in the Proceedings of the 25th International Symposium on
Graph Drawing and Network Visualization (GD 2017)
| null | null | null |
cs.SI cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Timeslices are often used to draw and visualize dynamic graphs. While
timeslices are a natural way to think about dynamic graphs, they are routinely
imposed on continuous data. Often, it is unclear how many timeslices to select:
too few timeslices can miss temporal features such as causality or even graph
structure while too many timeslices slows the drawing computation. We present a
model for dynamic graphs which is not based on timeslices, and a dynamic graph
drawing algorithm, DynNoSlice, to draw graphs in this model. In our evaluation,
we demonstrate the advantages of this approach over timeslicing on continuous
data sets.
|
[
{
"version": "v1",
"created": "Fri, 1 Sep 2017 15:45:41 GMT"
}
] | 2017-09-04T00:00:00 |
[
[
"Simonetto",
"Paolo",
""
],
[
"Archambault",
"Daniel",
""
],
[
"Kobourov",
"Stephen",
""
]
] |
new_dataset
| 0.963531 |
1709.00387
|
Suwon Shon
|
Suwon Shon, Ahmed Ali and James Glass
|
MIT-QCRI Arabic Dialect Identification System for the 2017 Multi-Genre
Broadcast Challenge
|
Submitted to the 2017 IEEE Automatic Speech Recognition and
Understanding Workshop (ASRU 2017)
| null | null | null |
cs.CL cs.LG cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In order to successfully annotate the Arabic speech con- tent found in
open-domain media broadcasts, it is essential to be able to process a diverse
set of Arabic dialects. For the 2017 Multi-Genre Broadcast challenge (MGB-3)
there were two possible tasks: Arabic speech recognition, and Arabic Dialect
Identification (ADI). In this paper, we describe our efforts to create an ADI
system for the MGB-3 challenge, with the goal of distinguishing amongst four
major Arabic dialects, as well as Modern Standard Arabic. Our research fo-
cused on dialect variability and domain mismatches between the training and
test domain. In order to achieve a robust ADI system, we explored both Siamese
neural network models to learn similarity and dissimilarities among Arabic
dialects, as well as i-vector post-processing to adapt domain mismatches. Both
Acoustic and linguistic features were used for the final MGB-3 submissions,
with the best primary system achieving 75% accuracy on the official 10hr test
set.
|
[
{
"version": "v1",
"created": "Mon, 28 Aug 2017 14:20:02 GMT"
}
] | 2017-09-04T00:00:00 |
[
[
"Shon",
"Suwon",
""
],
[
"Ali",
"Ahmed",
""
],
[
"Glass",
"James",
""
]
] |
new_dataset
| 0.999798 |
1709.00396
|
Elaine Sedenberg
|
Elaine Sedenberg, John Chuang
|
Smile for the Camera: Privacy and Policy Implications of Emotion AI
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The introduction of artificial intelligence (AI) on visual images for
emotional analysis obliterates the natural subjectivity and contextual
dependence of our facial displays. Emotion AI places itself as an algorithmic
lens on our digital artifacts and real-time interactions, creating the illusion
of a new, objective class of data: our emotional and mental states. Building
upon a rich network of existing public photographs--as well as fresh feeds from
surveillance footage or smart phone cameras--these emotion algorithms require
no additional infrastructure or improvements on image quality. In order to
examine the potential policy and legal remedies for emotion AI as an emerging
technology, we first establish a framework of actors, collection motivations,
time scales, and space considerations that differentiates emotion AI from other
algorithmic lenses. Each of these elements influences available policy
remedies, and should shape continuing discussions on the antecedent conditions
that make emotional AI acceptable or not in particular contexts. Based on our
framework of unique elements, we examine potential available policy remedies to
prevent or remediate harm. Specifically, our paper looks toward the regulatory
role of the Federal Trade Commission in the US, gaps in the EU's General Data
Protection Regulation (GDPR) allowing for emotion data collection, and
precedent set by polygraph technologies in evidentiary and use restrictions set
by law. We also examine the way social norms and adaptations could grow to also
modulate broader use. Given the challenges in controlling the flow of these
data, we call for further research and attention as emotion AI technology
remains poised for adoption.
|
[
{
"version": "v1",
"created": "Fri, 1 Sep 2017 17:25:28 GMT"
}
] | 2017-09-04T00:00:00 |
[
[
"Sedenberg",
"Elaine",
""
],
[
"Chuang",
"John",
""
]
] |
new_dataset
| 0.97578 |
1610.09278
|
Ralf Stauder
|
Ralf Stauder, Daniel Ostler, Michael Kranzfelder, Sebastian Koller,
Hubertus Feu{\ss}ner, Nassir Navab
|
The TUM LapChole dataset for the M2CAI 2016 workflow challenge
|
5 pages, 2 figures, preliminary reference for published dataset
(until larger comparison study of workshop organizers is published)
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
In this technical report we present our collected dataset of laparoscopic
cholecystectomies (LapChole). Laparoscopic videos of a total of 20 surgeries
were recorded and annotated with surgical phase labels, of which 15 were
randomly pre-determined as training data, while the remaining 5 videos are
selected as test data. This dataset was later included as part of the M2CAI
2016 workflow detection challenge during MICCAI 2016 in Athens.
|
[
{
"version": "v1",
"created": "Fri, 28 Oct 2016 15:36:58 GMT"
},
{
"version": "v2",
"created": "Thu, 31 Aug 2017 14:27:37 GMT"
}
] | 2017-09-01T00:00:00 |
[
[
"Stauder",
"Ralf",
""
],
[
"Ostler",
"Daniel",
""
],
[
"Kranzfelder",
"Michael",
""
],
[
"Koller",
"Sebastian",
""
],
[
"Feußner",
"Hubertus",
""
],
[
"Navab",
"Nassir",
""
]
] |
new_dataset
| 0.99968 |
1708.06727
|
Kenneth Joseph
|
John Wihbey, Thalita Dias Coleman, Kenneth Joseph, David Lazer
|
Exploring the Ideological Nature of Journalists' Social Networks on
Twitter and Associations with News Story Content
|
Presented at DS+J workshop at KDD'17
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The present work proposes the use of social media as a tool for better
understanding the relationship between a journalists' social network and the
content they produce. Specifically, we ask: what is the relationship between
the ideological leaning of a journalist's social network on Twitter and the
news content he or she produces? Using a novel dataset linking over 500,000
news articles produced by 1,000 journalists at 25 different news outlets, we
show a modest correlation between the ideologies of who a journalist follows on
Twitter and the content he or she produces. This research can provide the basis
for greater self-reflection among media members about how they source their
stories and how their own practice may be colored by their online networks. For
researchers, the findings furnish a novel and important step in better
understanding the construction of media stories and the mechanics of how
ideology can play a role in shaping public information.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2017 17:17:24 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Aug 2017 22:41:48 GMT"
}
] | 2017-09-01T00:00:00 |
[
[
"Wihbey",
"John",
""
],
[
"Coleman",
"Thalita Dias",
""
],
[
"Joseph",
"Kenneth",
""
],
[
"Lazer",
"David",
""
]
] |
new_dataset
| 0.976588 |
1708.09417
|
Lasha Abziandize
|
Lasha Abzianidze
|
LangPro: Natural Language Theorem Prover
|
6 pages, 8 figures, Conference on Empirical Methods in Natural
Language Processing (EMNLP) 2017
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
LangPro is an automated theorem prover for natural language
(https://github.com/kovvalsky/LangPro). Given a set of premises and a
hypothesis, it is able to prove semantic relations between them. The prover is
based on a version of analytic tableau method specially designed for natural
logic. The proof procedure operates on logical forms that preserve linguistic
expressions to a large extent. %This property makes the logical forms easily
obtainable from syntactic trees. %, in particular, Combinatory Categorial
Grammar derivation trees. The nature of proofs is deductive and transparent. On
the FraCaS and SICK textual entailment datasets, the prover achieves high
results comparable to state-of-the-art.
|
[
{
"version": "v1",
"created": "Wed, 30 Aug 2017 18:22:28 GMT"
}
] | 2017-09-01T00:00:00 |
[
[
"Abzianidze",
"Lasha",
""
]
] |
new_dataset
| 0.995787 |
1708.09515
|
Therese Biedl
|
Therese Biedl, Debajyoti Mondal
|
On Upward Drawings of Trees on a Given Grid
|
Appears in the Proceedings of the 25th International Symposium on
Graph Drawing and Network Visualization (GD 2017)
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Computing a minimum-area planar straight-line drawing of a graph is known to
be NP-hard for planar graphs, even when restricted to outerplanar graphs.
However, the complexity question is open for trees. Only a few hardness results
are known for straight-line drawings of trees under various restrictions such
as edge length or slope constraints. On the other hand, there exist
polynomial-time algorithms for computing minimum-width (resp., minimum-height)
upward drawings of trees, where the height (resp., width) is unbounded.
In this paper we take a major step in understanding the complexity of the
area minimization problem for strictly-upward drawings of trees, which is one
of the most common styles for drawing rooted trees. We prove that given a
rooted tree $T$ and a $W\times H$ grid, it is NP-hard to decide whether $T$
admits a strictly-upward (unordered) drawing in the given grid.
|
[
{
"version": "v1",
"created": "Thu, 31 Aug 2017 00:59:02 GMT"
}
] | 2017-09-01T00:00:00 |
[
[
"Biedl",
"Therese",
""
],
[
"Mondal",
"Debajyoti",
""
]
] |
new_dataset
| 0.998344 |
1708.09537
|
Xiaoyu Ji
|
Guoming Zhang, Chen Yan, Xiaoyu Ji, Taimin Zhang, Tianchen Zhang,
Wenyuan Xu
|
DolphinAtack: Inaudible Voice Commands
|
15 pages, 17 figures
|
published on ACM Conference on Computer and Communications
Security (CCS) 2017
|
10.1145/3133956.3134052
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Speech recognition (SR) systems such as Siri or Google Now have become an
increasingly popular human-computer interaction method, and have turned various
systems into voice controllable systems(VCS). Prior work on attacking VCS shows
that the hidden voice commands that are incomprehensible to people can control
the systems. Hidden voice commands, though hidden, are nonetheless audible. In
this work, we design a completely inaudible attack, DolphinAttack, that
modulates voice commands on ultrasonic carriers (e.g., f > 20 kHz) to achieve
inaudibility. By leveraging the nonlinearity of the microphone circuits, the
modulated low frequency audio commands can be successfully demodulated,
recovered, and more importantly interpreted by the speech recognition systems.
We validate DolphinAttack on popular speech recognition systems, including
Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa. By
injecting a sequence of inaudible voice commands, we show a few
proof-of-concept attacks, which include activating Siri to initiate a FaceTime
call on iPhone, activating Google Now to switch the phone to the airplane mode,
and even manipulating the navigation system in an Audi automobile. We propose
hardware and software defense solutions. We validate that it is feasible to
detect DolphinAttack by classifying the audios using supported vector machine
(SVM), and suggest to re-design voice controllable systems to be resilient to
inaudible voice command attacks.
|
[
{
"version": "v1",
"created": "Thu, 31 Aug 2017 02:28:21 GMT"
}
] | 2017-09-01T00:00:00 |
[
[
"Zhang",
"Guoming",
""
],
[
"Yan",
"Chen",
""
],
[
"Ji",
"Xiaoyu",
""
],
[
"Zhang",
"Taimin",
""
],
[
"Zhang",
"Tianchen",
""
],
[
"Xu",
"Wenyuan",
""
]
] |
new_dataset
| 0.9954 |
1708.09573
|
Gaurav Singal Dr.
|
Gaurav Singal, Vijay Laxmi, Manoj S Gaur, D Vijay Rao and Riti
Kushwaha
|
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks:
Concepts and Challenges
|
20 pages, 10 Figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multicast communication plays a crucial role in Mobile Adhoc Networks
(MANETs). MANETs provide low cost, self configuring devices for multimedia data
communication in military battlefield scenarios, disaster and public safety
networks (PSN). Multicast communication improves the network performance in
terms of bandwidth consumption, battery power and routing overhead as compared
to unicast for same volume of data communication. In recent past, a number of
multicast routing protocols (MRPs) have been proposed that tried to resolve
issues and challenges in MRP. Multicast based group communication demands
dynamic construction of efficient and reliable route for multimedia data
communication during high node mobility, contention, routing and channel
overhead. This paper gives an insight into the merits and demerits of the
currently known research techniques and provides a better environment to make
reliable MRP. It presents a ample study of various Quality of Service (QoS)
techniques and existing enhancement in mesh based MRPs. Mesh topology based
MRPs are classified according to their enhancement in routing mechanism and QoS
modification on On-Demand Multicast Routing Protocol (ODMRP) protocol to
improve performance metrics. This paper covers the most recent, robust and
reliable QoS and Mesh based MRPs, classified based on their operational
features, with their advantages and limitations, and provides comparison of
their performance parameters.
|
[
{
"version": "v1",
"created": "Thu, 31 Aug 2017 06:02:09 GMT"
}
] | 2017-09-01T00:00:00 |
[
[
"Singal",
"Gaurav",
""
],
[
"Laxmi",
"Vijay",
""
],
[
"Gaur",
"Manoj S",
""
],
[
"Rao",
"D Vijay",
""
],
[
"Kushwaha",
"Riti",
""
]
] |
new_dataset
| 0.963452 |
1708.09679
|
Liang Ma
|
Liang Ma, JieXiong, Yuejun Wei
|
An Incremental Redundancy HARQ Scheme for Polar Code
|
6 pages, 7 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A polar code extension method which supports incremental redundancy hybrid
ARQ(IR-HARQ) is proposed in this paper. By copying information bits to proper
positions of the extend part, the extended polar code can give additional
protection for the bits weakly protected by the first transmission. A
comparison between the proposed algorithm with directly generated polar code,
LTE turbo code, and some other IR-HARQ supporting polar code is given.
Simulation results show that the proposed algorithm has nearly the same
performance as directly generated polar code, which is chosen as base line for
comparison.
|
[
{
"version": "v1",
"created": "Thu, 31 Aug 2017 12:22:16 GMT"
}
] | 2017-09-01T00:00:00 |
[
[
"Ma",
"Liang",
""
],
[
"JieXiong",
"",
""
],
[
"Wei",
"Yuejun",
""
]
] |
new_dataset
| 0.983631 |
1708.09754
|
Wei-Han Lee
|
Wei-Han Lee, Ruby B. Lee
|
Implicit Smartphone User Authentication with Sensors and Contextual
Machine Learning
|
Published on the IEEE/IFIP International Conference on Dependable
Systems and Networks (DSN) 2017. arXiv admin note: substantial text overlap
with arXiv:1703.03523
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Authentication of smartphone users is important because a lot of sensitive
data is stored in the smartphone and the smartphone is also used to access
various cloud data and services. However, smartphones are easily stolen or
co-opted by an attacker. Beyond the initial login, it is highly desirable to
re-authenticate end-users who are continuing to access security-critical
services and data. Hence, this paper proposes a novel authentication system for
implicit, continuous authentication of the smartphone user based on behavioral
characteristics, by leveraging the sensors already ubiquitously built into
smartphones. We propose novel context-based authentication models to
differentiate the legitimate smartphone owner versus other users. We
systematically show how to achieve high authentication accuracy with different
design alternatives in sensor and feature selection, machine learning
techniques, context detection and multiple devices. Our system can achieve
excellent authentication performance with 98.1% accuracy with negligible system
overhead and less than 2.4% battery consumption.
|
[
{
"version": "v1",
"created": "Wed, 30 Aug 2017 17:26:57 GMT"
}
] | 2017-09-01T00:00:00 |
[
[
"Lee",
"Wei-Han",
""
],
[
"Lee",
"Ruby B.",
""
]
] |
new_dataset
| 0.983152 |
1708.09839
|
Christian H\"ane
|
Christian H\"ane, Lionel Heng, Gim Hee Lee, Friedrich Fraundorfer,
Paul Furgale, Torsten Sattler, Marc Pollefeys
|
3D Visual Perception for Self-Driving Cars using a Multi-Camera System:
Calibration, Mapping, Localization, and Obstacle Detection
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cameras are a crucial exteroceptive sensor for self-driving cars as they are
low-cost and small, provide appearance information about the environment, and
work in various weather conditions. They can be used for multiple purposes such
as visual navigation and obstacle detection. We can use a surround multi-camera
system to cover the full 360-degree field-of-view around the car. In this way,
we avoid blind spots which can otherwise lead to accidents. To minimize the
number of cameras needed for surround perception, we utilize fisheye cameras.
Consequently, standard vision pipelines for 3D mapping, visual localization,
obstacle detection, etc. need to be adapted to take full advantage of the
availability of multiple cameras rather than treat each camera individually. In
addition, processing of fisheye images has to be supported. In this paper, we
describe the camera calibration and subsequent processing pipeline for
multi-fisheye-camera systems developed as part of the V-Charge project. This
project seeks to enable automated valet parking for self-driving cars. Our
pipeline is able to precisely calibrate multi-camera systems, build sparse 3D
maps for visual navigation, visually localize the car with respect to these
maps, generate accurate dense maps, as well as detect obstacles based on
real-time depth map extraction.
|
[
{
"version": "v1",
"created": "Thu, 31 Aug 2017 17:45:42 GMT"
}
] | 2017-09-01T00:00:00 |
[
[
"Häne",
"Christian",
""
],
[
"Heng",
"Lionel",
""
],
[
"Lee",
"Gim Hee",
""
],
[
"Fraundorfer",
"Friedrich",
""
],
[
"Furgale",
"Paul",
""
],
[
"Sattler",
"Torsten",
""
],
[
"Pollefeys",
"Marc",
""
]
] |
new_dataset
| 0.975522 |
1703.08208
|
Seyyed Ali Hashemi
|
Seyyed Ali Hashemi, Carlo Condo, Warren J. Gross
|
Fast and Flexible Successive-Cancellation List Decoders for Polar Codes
|
IEEE Transactions on Signal Processing
| null |
10.1109/TSP.2017.2740204
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Polar codes have gained significant amount of attention during the past few
years and have been selected as a coding scheme for the next generation of
mobile broadband standard. Among decoding schemes, successive-cancellation list
(SCL) decoding provides a reasonable trade-off between the error-correction
performance and hardware implementation complexity when used to decode polar
codes, at the cost of limited throughput. The simplified SCL (SSCL) and its
extension SSCL-SPC increase the speed of decoding by removing redundant
calculations when encountering particular information and frozen bit patterns
(rate one and single parity check codes), while keeping the error-correction
performance unaltered. In this paper, we improve SSCL and SSCL-SPC by proving
that the list size imposes a specific number of bit estimations required to
decode rate one and single parity check codes. Thus, the number of estimations
can be limited while guaranteeing exactly the same error-correction performance
as if all bits of the code were estimated. We call the new decoding algorithms
Fast-SSCL and Fast-SSCL-SPC. Moreover, we show that the number of bit
estimations in a practical application can be tuned to achieve desirable speed,
while keeping the error-correction performance almost unchanged. Hardware
architectures implementing both algorithms are then described and implemented:
it is shown that our design can achieve 1.86 Gb/s throughput, higher than the
best state-of-the-art decoders.
|
[
{
"version": "v1",
"created": "Thu, 23 Mar 2017 19:25:44 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Aug 2017 20:26:24 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Hashemi",
"Seyyed Ali",
""
],
[
"Condo",
"Carlo",
""
],
[
"Gross",
"Warren J.",
""
]
] |
new_dataset
| 0.998762 |
1705.07289
|
Wenhao Wang
|
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang,
Vincent Bindschaedler, Haixu Tang, Carl A. Gunter
|
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel
Hazards in SGX
|
Accepted to ACM CCS 2017
| null |
10.1145/3133956.3134038
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Side-channel risks of Intel's SGX have recently attracted great attention.
Under the spotlight is the newly discovered page-fault attack, in which an
OS-level adversary induces page faults to observe the page-level access
patterns of a protected process running in an SGX enclave. With almost all
proposed defense focusing on this attack, little is known about whether such
efforts indeed raise the bar for the adversary, whether a simple variation of
the attack renders all protection ineffective, not to mention an in-depth
understanding of other attack surfaces in the SGX system. In the paper, we
report the first step toward systematic analyses of side-channel threats that
SGX faces, focusing on the risks associated with its memory management. Our
research identifies 8 potential attack vectors, ranging from TLB to DRAM
modules. More importantly, we highlight the common misunderstandings about SGX
memory side channels, demonstrating that high frequent AEXs can be avoided when
recovering EdDSA secret key through a new page channel and fine-grained
monitoring of enclave programs (at the level of 64B) can be done through
combining both cache and cross-enclave DRAM channels. Our findings reveal the
gap between the ongoing security research on SGX and its side-channel
weaknesses, redefine the side-channel threat model for secure enclaves, and can
provoke a discussion on when to use such a system and how to use it securely.
|
[
{
"version": "v1",
"created": "Sat, 20 May 2017 11:11:10 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Aug 2017 15:06:30 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Wang",
"Wenhao",
""
],
[
"Chen",
"Guoxing",
""
],
[
"Pan",
"Xiaorui",
""
],
[
"Zhang",
"Yinqian",
""
],
[
"Wang",
"XiaoFeng",
""
],
[
"Bindschaedler",
"Vincent",
""
],
[
"Tang",
"Haixu",
""
],
[
"Gunter",
"Carl A.",
""
]
] |
new_dataset
| 0.995262 |
1708.05279
|
Ryan Curtin
|
Ryan R. Curtin, Marcus Edel
|
Designing and building the mlpack open-source machine learning library
|
submitted to ICOPUST 2017
| null | null | null |
cs.MS cs.LG cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
mlpack is an open-source C++ machine learning library with an emphasis on
speed and flexibility. Since its original inception in 2007, it has grown to be
a large project implementing a wide variety of machine learning algorithms,
from standard techniques such as decision trees and logistic regression to
modern techniques such as deep neural networks as well as other
recently-published cutting-edge techniques not found in any other library.
mlpack is quite fast, with benchmarks showing mlpack outperforming other
libraries' implementations of the same methods. mlpack has an active community,
with contributors from around the world---including some from PUST. This short
paper describes the goals and design of mlpack, discusses how the open-source
community functions, and shows an example usage of mlpack for a simple data
science problem.
|
[
{
"version": "v1",
"created": "Thu, 17 Aug 2017 13:59:48 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Aug 2017 15:41:17 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Curtin",
"Ryan R.",
""
],
[
"Edel",
"Marcus",
""
]
] |
new_dataset
| 0.982583 |
1708.09006
|
Daniel Crispell
|
Daniel Crispell and Maxim Bazik
|
Pix2face: Direct 3D Face Model Estimation
|
To appear in 2017 ICCV "300 3D Facial-Videos in-the-Wild Challenge"
Workshop
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An efficient, fully automatic method for 3D face shape and pose estimation in
unconstrained 2D imagery is presented. The proposed method jointly estimates a
dense set of 3D landmarks and facial geometry using a single pass of a modified
version of the popular "U-Net" neural network architecture. Additionally, we
propose a method for directly estimating a set of 3D Morphable Model (3DMM)
parameters, using the estimated 3D landmarks and geometry as constraints in a
simple linear system. Qualitative modeling results are presented, as well as
quantitative evaluation of predicted 3D face landmarks in unconstrained video
sequences.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2017 20:13:00 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Crispell",
"Daniel",
""
],
[
"Bazik",
"Maxim",
""
]
] |
new_dataset
| 0.998171 |
1708.09014
|
Naghmeh Ivaki
|
Naghmeh Ivaki
|
13th European Dependable Computing Conference (EDCC 2017): Fast
Abstracts and Student Forum Proceedings
|
13th European Dependable Computing Conference, Geneva, Switzerland,
4-8 September 2017
| null | null | null |
cs.DC
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Fast Abstracts are short presentations of work in progress or opinion pieces
and aim to serve as a rapid and flexible mechanism to (i) Report on current
work that may or may not be complete; (ii) Introduce new ideas to the
community; (iii) State positions on controversial issues or open problems.
Student Forum is a vibrant and friendly environment where students can present
their work, exchange ideas and experiences, get feedback on their work, get new
inspirations and points of view. In addition, the forum stimulates interaction
between young researchers, experienced researchers, and industry.
|
[
{
"version": "v1",
"created": "Thu, 24 Aug 2017 19:30:00 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Ivaki",
"Naghmeh",
""
]
] |
new_dataset
| 0.9986 |
1708.09040
|
Elahe Rahimtoroghi
|
Elahe Rahimtoroghi, Jiaqi Wu, Ruimin Wang, Pranav Anand, Marilyn A
Walker
|
Modelling Protagonist Goals and Desires in First-Person Narrative
|
10 pages, 18th Annual SIGdial Meeting on Discourse and Dialogue
(SIGDIAL 2017)
| null | null | null |
cs.AI cs.CL cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many genres of natural language text are narratively structured, a testament
to our predilection for organizing our experiences as narratives. There is
broad consensus that understanding a narrative requires identifying and
tracking the goals and desires of the characters and their narrative outcomes.
However, to date, there has been limited work on computational models for this
problem. We introduce a new dataset, DesireDB, which includes gold-standard
labels for identifying statements of desire, textual evidence for desire
fulfillment, and annotations for whether the stated desire is fulfilled given
the evidence in the narrative context. We report experiments on tracking desire
fulfillment using different methods, and show that LSTM Skip-Thought model
achieves F-measure of 0.7 on our corpus.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2017 21:40:22 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Rahimtoroghi",
"Elahe",
""
],
[
"Wu",
"Jiaqi",
""
],
[
"Wang",
"Ruimin",
""
],
[
"Anand",
"Pranav",
""
],
[
"Walker",
"Marilyn A",
""
]
] |
new_dataset
| 0.999636 |
1708.09099
|
Yi Han
|
Yi Han, Sriharsha Etigowni, Hua Li, Saman Zonouz, Athina Petropulu
|
Watch Me, but Don't Touch Me! Contactless Control Flow Monitoring via
Electromagnetic Emanations
| null |
CCS '17, October 30-November 3, 2017, Dallas, TX, USA
|
10.1145/3133956.3134081
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Trustworthy operation of industrial control systems depends on secure and
real-time code execution on the embedded programmable logic controllers (PLCs).
The controllers monitor and control the critical infrastructures, such as
electric power grids and healthcare platforms, and continuously report back the
system status to human operators. We present Zeus, a contactless embedded
controller security monitor to ensure its execution control flow integrity.
Zeus leverages the electromagnetic emission by the PLC circuitry during the
execution of the controller programs. Zeus's contactless execution tracking
enables non-intrusive monitoring of security-critical controllers with tight
real-time constraints. Those devices often cannot tolerate the cost and
performance overhead that comes with additional traditional hardware or
software monitoring modules. Furthermore, Zeus provides an air-gap between the
monitor (trusted computing base) and the target (potentially compromised) PLC.
This eliminates the possibility of the monitor infection by the same attack
vectors. Zeus monitors for control flow integrity of the PLC program execution.
Zeus monitors the communications between the human-machine interface and the
PLC, and captures the control logic binary uploads to the PLC. Zeus exercises
its feasible execution paths, and fingerprints their emissions using an
external electromagnetic sensor. Zeus trains a neural network for legitimate
PLC executions, and uses it at runtime to identify the control flow based on
PLC's electromagnetic emissions. We implemented Zeus on a commercial Allen
Bradley PLC, which is widely used in industry, and evaluated it on real-world
control program executions. Zeus was able to distinguish between different
legitimate and malicious executions with 98.9% accuracy and with zero overhead
on PLC execution by design.
|
[
{
"version": "v1",
"created": "Wed, 30 Aug 2017 03:32:56 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Han",
"Yi",
""
],
[
"Etigowni",
"Sriharsha",
""
],
[
"Li",
"Hua",
""
],
[
"Zonouz",
"Saman",
""
],
[
"Petropulu",
"Athina",
""
]
] |
new_dataset
| 0.999014 |
1708.09167
|
Emilio Di Giacomo
|
Emilio Di Giacomo, Leszek Gasieniec, Giuseppe Liotta, Alfredo Navarra
|
Colored Point-set Embeddings of Acyclic Graphs
|
Appears in the Proceedings of the 25th International Symposium on
Graph Drawing and Network Visualization (GD 2017)
| null | null | null |
cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that any planar drawing of a forest of three stars whose vertices are
constrained to be at fixed vertex locations may require $\Omega(n^\frac{2}{3})$
edges each having $\Omega(n^\frac{1}{3})$ bends in the worst case. The lower
bound holds even when the function that maps vertices to points is not a
bijection but it is defined by a 3-coloring. In contrast, a constant number of
bends per edge can be obtained for 3-colored paths and for 3-colored
caterpillars whose leaves all have the same color. Such results answer to a
long standing open problem.
|
[
{
"version": "v1",
"created": "Wed, 30 Aug 2017 08:39:49 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Di Giacomo",
"Emilio",
""
],
[
"Gasieniec",
"Leszek",
""
],
[
"Liotta",
"Giuseppe",
""
],
[
"Navarra",
"Alfredo",
""
]
] |
new_dataset
| 0.987236 |
1708.09197
|
Henry F\"orster
|
Michael A. Bekos, Henry F\"orster, Michael Kaufmann
|
On Smooth Orthogonal and Octilinear Drawings: Relations, Complexity and
Kandinsky Drawings
|
Appears in the Proceedings of the 25th International Symposium on
Graph Drawing and Network Visualization (GD 2017)
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study two variants of the well-known orthogonal drawing model: (i) the
smooth orthogonal, and (ii) the octilinear. Both models form an extension of
the orthogonal, by supporting one additional type of edge segments (circular
arcs and diagonal segments, respectively).
For planar graphs of max-degree 4, we analyze relationships between the graph
classes that can be drawn bendless in the two models and we also prove
NP-hardness for a restricted version of the bendless drawing problem for both
models. For planar graphs of higher degree, we present an algorithm that
produces bi-monotone smooth orthogonal drawings with at most two segments per
edge, which also guarantees a linear number of edges with exactly one segment.
|
[
{
"version": "v1",
"created": "Wed, 30 Aug 2017 09:43:12 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Bekos",
"Michael A.",
""
],
[
"Förster",
"Henry",
""
],
[
"Kaufmann",
"Michael",
""
]
] |
new_dataset
| 0.991589 |
1708.09238
|
Felice De Luca
|
Michael Bekos, Felice De Luca, Walter Didimo, Tamara Mchedlidze,
Martin N\"ollenburg, Antonios Symvonis and Ioannis Tollis
|
Planar Drawings of Fixed-Mobile Bigraphs
| null | null | null | null |
cs.CG cs.CC cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A fixed-mobile bigraph G is a bipartite graph such that the vertices of one
partition set are given with fixed positions in the plane and the mobile
vertices of the other part, together with the edges, must be added to the
drawing. We assume that G is planar and study the problem of finding, for a
given k >= 0, a planar poly-line drawing of G with at most k bends per edge. In
the most general case, we show NP-hardness. For k=0 and under additional
constraints on the positions of the fixed or mobile vertices, we either prove
that the problem is polynomial-time solvable or prove that it belongs to NP.
Finally, we present a polynomial-time testing algorithm for a certain type of
"layered" 1-bend drawings.
|
[
{
"version": "v1",
"created": "Wed, 30 Aug 2017 12:37:09 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Bekos",
"Michael",
""
],
[
"De Luca",
"Felice",
""
],
[
"Didimo",
"Walter",
""
],
[
"Mchedlidze",
"Tamara",
""
],
[
"Nöllenburg",
"Martin",
""
],
[
"Symvonis",
"Antonios",
""
],
[
"Tollis",
"Ioannis",
""
]
] |
new_dataset
| 0.998794 |
1708.09313
|
Thomas Cusick
|
T. W. Cusick and E. M. Sanger
|
Rotation Symmetric Bent Boolean Functions for n = 2p
|
16 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It has been conjectured that there are no homogeneous rotation symmetric bent
Boolean functions of degree greater than two. In this paper we begin by proving
that sums of short-cycle rotation symmetric bent Boolean functions must contain
a specific degree two monomial rotation symmetric Boolean function. We then
prove most cases of the conjecture in n=2p, p>2 prime, variables and extend
this work to the nonhomogeneous case.
|
[
{
"version": "v1",
"created": "Wed, 30 Aug 2017 15:04:19 GMT"
}
] | 2017-08-31T00:00:00 |
[
[
"Cusick",
"T. W.",
""
],
[
"Sanger",
"E. M.",
""
]
] |
new_dataset
| 0.998105 |
1605.09125
|
Takayuki Nozaki
|
Takayuki Nozaki
|
Zigzag Decodable Fountain Codes
|
11 pages, 15 figures, submitted to IEICETransactions, Oct. 2016
|
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications
and Computer Sciences Vol.E100-A No.8 (2017) pp.1693-1704
|
10.1587/transfun.E100.A.1693
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a fountain coding system which has lower space decoding
complexity and lower decoding erasure rate than the Raptor coding systems. The
main idea of the proposed fountain code is employing shift and exclusive OR to
generate the output packets. This technique is known as the zigzag decodable
code, which is efficiently decoded by the zigzag decoder. In other words, we
propose a fountain code based on the zigzag decodable code in this paper.
Moreover, we analyze the overhead for the received packets, decoding erasure
rate, decoding complexity, and asymptotic overhead of the proposed fountain
code. As the result, we show that the proposed fountain code outperforms the
Raptor codes in terms of the overhead and decoding erasure rate. Simulation
results show that the proposed fountain coding system outperforms Raptor coding
system in terms of the overhead and the space decoding complexity.
|
[
{
"version": "v1",
"created": "Mon, 30 May 2016 07:28:20 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Oct 2016 12:42:05 GMT"
}
] | 2017-08-30T00:00:00 |
[
[
"Nozaki",
"Takayuki",
""
]
] |
new_dataset
| 0.996918 |
1708.08542
|
Katherine Ye
|
Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer,
Adam Petcher, Andrew W. Appel
|
Verified Correctness and Security of mbedTLS HMAC-DRBG
|
Appearing in CCS '17
| null |
10.1145/3133956.3133974
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A),
and we have proved its cryptographic security--that its output is
pseudorandom--using a hybrid game-based proof. We have also proved that the
mbedTLS implementation (C program) correctly implements this functional
specification. That proof composes with an existing C compiler correctness
proof to guarantee, end-to-end, that the machine language program gives strong
pseudorandomness. All proofs (hybrid games, C program verification, compiler,
and their composition) are machine-checked in the Coq proof assistant. Our
proofs are modular: the hybrid game proof holds on any implementation of
HMAC-DRBG that satisfies our functional specification. Therefore, our
functional specification can serve as a high-assurance reference.
|
[
{
"version": "v1",
"created": "Mon, 28 Aug 2017 21:50:55 GMT"
}
] | 2017-08-30T00:00:00 |
[
[
"Ye",
"Katherine Q.",
""
],
[
"Green",
"Matthew",
""
],
[
"Sanguansin",
"Naphat",
""
],
[
"Beringer",
"Lennart",
""
],
[
"Petcher",
"Adam",
""
],
[
"Appel",
"Andrew W.",
""
]
] |
new_dataset
| 0.954216 |
1708.08680
|
Mangal Kothari
|
Hardik Parwana and Mangal Kothari
|
Quaternions and Attitude Representation
|
19 pages, 2 figures, 1 table, 2 MATLAB code listings
| null | null | null |
cs.SY
|
http://creativecommons.org/licenses/by/4.0/
|
The attitude space has been parameterized in various ways for practical
purposes. Different representations gain preferences over others based on their
intuitive understanding, ease of implementation, formulaic simplicity, and
physical as well as mathematical complications involved in using them. This
technical note gives a brief overview and discusses the quaternions, which are
fourth dimensional extended complex numbers and used to represent orientation.
Their relationship to other modes of attitude representation such as Euler
angles and Axis-Angle representation is also explored and conversion from one
representation to another is explained. The conventions, intuitive
understanding and formulas most frequently used and indispensable to any
quaternion application are stated and wherever possible, derived.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2017 10:09:11 GMT"
}
] | 2017-08-30T00:00:00 |
[
[
"Parwana",
"Hardik",
""
],
[
"Kothari",
"Mangal",
""
]
] |
new_dataset
| 0.995264 |
1708.08754
|
Giovanni Poggi
|
Dario D'Avino, Davide Cozzolino, Giovanni Poggi, Luisa Verdoliva
|
Autoencoder with recurrent neural networks for video forgery detection
|
Presented at IS&T Electronic Imaging: Media Watermarking, Security,
and Forensics, January 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Video forgery detection is becoming an important issue in recent years,
because modern editing software provide powerful and easy-to-use tools to
manipulate videos. In this paper we propose to perform detection by means of
deep learning, with an architecture based on autoencoders and recurrent neural
networks. A training phase on a few pristine frames allows the autoencoder to
learn an intrinsic model of the source. Then, forged material is singled out as
anomalous, as it does not fit the learned model, and is encoded with a large
reconstruction error. Recursive networks, implemented with the long short-term
memory model, are used to exploit temporal dependencies. Preliminary results on
forged videos show the potential of this approach.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2017 14:06:16 GMT"
}
] | 2017-08-30T00:00:00 |
[
[
"D'Avino",
"Dario",
""
],
[
"Cozzolino",
"Davide",
""
],
[
"Poggi",
"Giovanni",
""
],
[
"Verdoliva",
"Luisa",
""
]
] |
new_dataset
| 0.979409 |
1708.08874
|
Jong-Chyi Su
|
Jong-Chyi Su, Chenyun Wu, Huaizu Jiang, Subhransu Maji
|
Reasoning about Fine-grained Attribute Phrases using Reference Games
|
To appear in ICCV 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a framework for learning to describe fine-grained visual
differences between instances using attribute phrases. Attribute phrases
capture distinguishing aspects of an object (e.g., "propeller on the nose" or
"door near the wing" for airplanes) in a compositional manner. Instances within
a category can be described by a set of these phrases and collectively they
span the space of semantic attributes for a category. We collect a large
dataset of such phrases by asking annotators to describe several visual
differences between a pair of instances within a category. We then learn to
describe and ground these phrases to images in the context of a *reference
game* between a speaker and a listener. The goal of a speaker is to describe
attributes of an image that allows the listener to correctly identify it within
a pair. Data collected in a pairwise manner improves the ability of the speaker
to generate, and the ability of the listener to interpret visual descriptions.
Moreover, due to the compositionality of attribute phrases, the trained
listeners can interpret descriptions not seen during training for image
retrieval, and the speakers can generate attribute-based explanations for
differences between previously unseen categories. We also show that embedding
an image into the semantic space of attribute phrases derived from listeners
offers 20% improvement in accuracy over existing attribute-based
representations on the FGVC-aircraft dataset.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2017 16:57:39 GMT"
}
] | 2017-08-30T00:00:00 |
[
[
"Su",
"Jong-Chyi",
""
],
[
"Wu",
"Chenyun",
""
],
[
"Jiang",
"Huaizu",
""
],
[
"Maji",
"Subhransu",
""
]
] |
new_dataset
| 0.999789 |
1708.08895
|
Lucas Waye
|
Lucas Waye, Pablo Buiras, Owen Arden, Alejandro Russo, Stephen Chong
|
Cryptographically Secure Information Flow Control on Key-Value Stores
|
Full version of conference paper appearing in CCS 2017
| null |
10.1145/3133956.3134036
| null |
cs.CR cs.PL
|
http://creativecommons.org/licenses/by/4.0/
|
We present Clio, an information flow control (IFC) system that transparently
incorporates cryptography to enforce confidentiality and integrity policies on
untrusted storage. Clio insulates developers from explicitly manipulating keys
and cryptographic primitives by leveraging the policy language of the IFC
system to automatically use the appropriate keys and correct cryptographic
operations. We prove that Clio is secure with a novel proof technique that is
based on a proof style from cryptography together with standard programming
languages results. We present a prototype Clio implementation and a case study
that demonstrates Clio's practicality.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2017 17:25:58 GMT"
}
] | 2017-08-30T00:00:00 |
[
[
"Waye",
"Lucas",
""
],
[
"Buiras",
"Pablo",
""
],
[
"Arden",
"Owen",
""
],
[
"Russo",
"Alejandro",
""
],
[
"Chong",
"Stephen",
""
]
] |
new_dataset
| 0.99091 |
1512.08187
|
Gaurav Somani
|
Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti and
Rajkumar Buyya
|
DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions
|
Published in Computer Communications, Volume 107, 2017, Eslevier
| null |
10.1016/j.comcom.2017.03.010.
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Security issues related to the cloud computing are relevant to various
stakeholders for an informed cloud adoption decision. Apart from data breaches,
the cyber security research community is revisiting the attack space for
cloud-specific solutions as these issues affect budget, resource management,
and service quality. Distributed Denial of Service (DDoS) attack is one such
serious attack in the cloud space. In this paper, we present developments
related to DDoS attack mitigation solutions in the cloud. In particular, we
present a comprehensive survey with a detailed insight into the
characterization, prevention, detection, and mitigation mechanisms of these
attacks. Additionally, we present a comprehensive solution taxonomy to classify
DDoS attack solutions. We also provide a comprehensive discussion on important
metrics to evaluate various solutions. This survey concludes that there is a
strong requirement of solutions, which are designed keeping utility computing
models in mind. Accurate auto-scaling decisions, multi-layer mitigation, and
defense using profound resources in the cloud, are some of the key requirements
of the desired solutions. In the end, we provide a definite guideline on
effective solution building and detailed solution requirements to help the
cyber security research community in designing defense mechanisms. To the best
of our knowledge, this work is a novel attempt to identify the need of DDoS
mitigation solutions involving multi-level information flow and effective
resource management during the attack.
|
[
{
"version": "v1",
"created": "Sun, 27 Dec 2015 09:16:20 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Aug 2017 09:26:23 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Somani",
"Gaurav",
""
],
[
"Gaur",
"Manoj Singh",
""
],
[
"Sanghi",
"Dheeraj",
""
],
[
"Conti",
"Mauro",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
new_dataset
| 0.989441 |
1604.03515
|
Vladislav Ryzhikov Dr
|
Davide Bresolin, Agi Kurucz, Emilio Mu\~noz-Velasco, Vladislav
Ryzhikov, Guido Sciavicco, Michael Zakharyaschev
|
Horn Fragments of the Halpern-Shoham Interval Temporal Logic (Technical
Report)
| null |
ACM Trans. Comput. Logic 18, 3, Article 22 (August 2017), 39 pages
|
10.1145/3105909
| null |
cs.LO cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the satisfiability problem for Horn fragments of the
Halpern-Shoham interval temporal logic depending on the type (box or diamond)
of the interval modal operators, the type of the underlying linear order
(discrete or dense), and the type of semantics for the interval relations
(reflexive or irreflexive). For example, we show that satisfiability of Horn
formulas with diamonds is undecidable for any type of linear orders and
semantics. On the contrary, satisfiability of Horn formulas with boxes is
tractable over both discrete and dense orders under the reflexive semantics and
over dense orders under the irreflexive semantics, but becomes undecidable over
discrete orders under the irreflexive semantics. Satisfiability of binary Horn
formulas with both boxes and diamonds is always undecidable under the
irreflexive semantics.
|
[
{
"version": "v1",
"created": "Tue, 12 Apr 2016 18:43:02 GMT"
},
{
"version": "v2",
"created": "Tue, 10 May 2016 15:07:04 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Mar 2017 10:16:50 GMT"
},
{
"version": "v4",
"created": "Sun, 28 May 2017 13:35:38 GMT"
},
{
"version": "v5",
"created": "Mon, 28 Aug 2017 14:11:39 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Bresolin",
"Davide",
""
],
[
"Kurucz",
"Agi",
""
],
[
"Muñoz-Velasco",
"Emilio",
""
],
[
"Ryzhikov",
"Vladislav",
""
],
[
"Sciavicco",
"Guido",
""
],
[
"Zakharyaschev",
"Michael",
""
]
] |
new_dataset
| 0.955114 |
1701.06854
|
Rahul Mitra
|
Rahul Mitra, Jiakai Zhang, Sanath Narayan, Shuaib Ahmed, Sharat
Chandran, Arjun Jain
|
Improved Descriptors for Patch Matching and Reconstruction
|
9 pages, ICCV Workshop on Compact and Efficient Feature
Representation and Learning (CEFRL), 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a convolutional neural network (ConvNet) based approach for
learning local image descriptors which can be used for significantly improved
patch matching and 3D reconstructions. A multi-resolution ConvNet is used for
learning keypoint descriptors. We also propose a new dataset consisting of an
order of magnitude more number of scenes, images, and positive and negative
correspondences compared to the currently available Multi-View Stereo (MVS)
[18] dataset. The new dataset also has better coverage of the overall
viewpoint, scale, and lighting changes in comparison to the MVS dataset. We
evaluate our approach on publicly available datasets, such as Oxford Affine
Covariant Regions Dataset (ACRD) [12], MVS [18], Synthetic [6] and Strecha [15]
datasets to quantify the image descriptor performance. Scenes from the Oxford
ACRD, MVS and Synthetic datasets are used for evaluating the patch matching
performance of the learnt descriptors while the Strecha dataset is used to
evaluate the 3D reconstruction task. Experiments show that the proposed
descriptor outperforms the current state-of-the-art descriptors in both the
evaluation tasks.
|
[
{
"version": "v1",
"created": "Tue, 24 Jan 2017 13:05:12 GMT"
},
{
"version": "v2",
"created": "Mon, 29 May 2017 15:03:27 GMT"
},
{
"version": "v3",
"created": "Wed, 31 May 2017 07:50:11 GMT"
},
{
"version": "v4",
"created": "Sun, 27 Aug 2017 17:45:22 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Mitra",
"Rahul",
""
],
[
"Zhang",
"Jiakai",
""
],
[
"Narayan",
"Sanath",
""
],
[
"Ahmed",
"Shuaib",
""
],
[
"Chandran",
"Sharat",
""
],
[
"Jain",
"Arjun",
""
]
] |
new_dataset
| 0.99976 |
1705.01002
|
Flavio Maschietti
|
Flavio Maschietti and David Gesbert and Paul de Kerret and Henk
Wymeersch
|
Robust Location-Aided Beam Alignment in Millimeter Wave Massive MIMO
|
24 pages, 7 figures. The short version of this paper has been
accepted to IEEE Globecom 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Location-aided beam alignment has been proposed recently as a potential
approach for fast link establishment in millimeter wave (mmWave) massive MIMO
(mMIMO) communications. However, due to mobility and other imperfections in the
estimation process, the spatial information obtained at the base station (BS)
and the user (UE) is likely to be noisy, degrading beam alignment performance.
In this paper, we introduce a robust beam alignment framework in order to
exhibit resilience with respect to this problem. We first recast beam alignment
as a decentralized coordination problem where BS and UE seek coordination on
the basis of correlated yet individual position information. We formulate the
optimum beam alignment solution as the solution of a Bayesian team decision
problem. We then propose a suite of algorithms to approach optimality with
reduced complexity. The effectiveness of the robust beam alignment procedure,
compared with classical designs, is then verified on simulation settings with
varying location information accuracies.
|
[
{
"version": "v1",
"created": "Tue, 2 May 2017 14:42:59 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Aug 2017 10:21:22 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Maschietti",
"Flavio",
""
],
[
"Gesbert",
"David",
""
],
[
"de Kerret",
"Paul",
""
],
[
"Wymeersch",
"Henk",
""
]
] |
new_dataset
| 0.962694 |
1705.04267
|
Dufan Wu
|
Dufan Wu, Kyungsang Kim, Georges El Fakhri, and Quanzheng Li
|
A Cascaded Convolutional Neural Network for X-ray Low-dose CT Image
Denoising
|
9 pages, 9 figures
| null | null | null |
cs.CV stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Image denoising techniques are essential to reducing noise levels and
enhancing diagnosis reliability in low-dose computed tomography (CT). Machine
learning based denoising methods have shown great potential in removing the
complex and spatial-variant noises in CT images. However, some residue
artifacts would appear in the denoised image due to complexity of noises. A
cascaded training network was proposed in this work, where the trained CNN was
applied on the training dataset to initiate new trainings and remove artifacts
induced by denoising. A cascades of convolutional neural networks (CNN) were
built iteratively to achieve better performance with simple CNN structures.
Experiments were carried out on 2016 Low-dose CT Grand Challenge datasets to
evaluate the method's performance.
|
[
{
"version": "v1",
"created": "Thu, 11 May 2017 16:32:55 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Aug 2017 13:48:08 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Wu",
"Dufan",
""
],
[
"Kim",
"Kyungsang",
""
],
[
"Fakhri",
"Georges El",
""
],
[
"Li",
"Quanzheng",
""
]
] |
new_dataset
| 0.996619 |
1706.10097
|
Matthew Lease
|
Akash Mankar, Riddhi J. Shah, and Matthew Lease
|
Design Activism for Minimum Wage Crowd Work
|
This is an extended online version of the paper accepted to the 5th
AAAI Conference on Human Computation and Crowdsourcing (HCOMP 2017)
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Entry-level crowd work is often reported to pay less than minimum wage. While
this may be appropriate or even necessary, due to various legal, economic, and
pragmatic factors, some Requesters and workers continue to question this status
quo. To promote further discussion on the issue, we survey Requesters and
workers whether they would support restricting tasks to require minimum wage
pay. As a form of design activism, we confronted workers with this dilemma
directly by posting a dummy Mechanical Turk task which told them that they
could not work on it because it paid less than their local minimum wage, and we
invited their feedback. Strikingly, for those workers expressing an opinion,
two-thirds of Indians favored the policy while two-thirds of Americans opposed
it. Though a majority of Requesters supported minimum wage pay, only 20\% would
enforce it. To further empower Requesters, and to ensure that effort or
ignorance are not barriers to change, we provide a simple public API to make it
easy to find a worker's local minimum wage by his/her IP address.
|
[
{
"version": "v1",
"created": "Fri, 30 Jun 2017 10:06:34 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jul 2017 17:37:09 GMT"
},
{
"version": "v3",
"created": "Sun, 27 Aug 2017 05:48:57 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Mankar",
"Akash",
""
],
[
"Shah",
"Riddhi J.",
""
],
[
"Lease",
"Matthew",
""
]
] |
new_dataset
| 0.990463 |
1708.01227
|
Suwon Shon
|
Suwon Shon, Seongkyu Mun, Wooil Kim and Hanseok Ko
|
Autoencoder based Domain Adaptation for Speaker Recognition under
Insufficient Channel Information
|
Interspeech 2017, pp 1014-1018
| null | null | null |
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In real-life conditions, mismatch between development and test domain
degrades speaker recognition performance. To solve the issue, many researchers
explored domain adaptation approaches using matched in-domain dataset. However,
adaptation would be not effective if the dataset is insufficient to estimate
channel variability of the domain. In this paper, we explore the problem of
performance degradation under such a situation of insufficient channel
information. In order to exploit limited in-domain dataset effectively, we
propose an unsupervised domain adaptation approach using Autoencoder based
Domain Adaptation (AEDA). The proposed approach combines an autoencoder with a
denoising autoencoder to adapt resource-rich development dataset to test
domain. The proposed technique is evaluated on the Domain Adaptation Challenge
13 experimental protocols that is widely used in speaker recognition for domain
mismatched condition. The results show significant improvements over baselines
and results from other prior studies.
|
[
{
"version": "v1",
"created": "Thu, 3 Aug 2017 17:18:58 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Aug 2017 14:29:48 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Shon",
"Suwon",
""
],
[
"Mun",
"Seongkyu",
""
],
[
"Kim",
"Wooil",
""
],
[
"Ko",
"Hanseok",
""
]
] |
new_dataset
| 0.994503 |
1708.07887
|
Joshua Engelsma
|
Joshua J. Engelsma, Kai Cao, Anil K. Jain
|
RaspiReader: An Open Source Fingerprint Reader Facilitating Spoof
Detection
|
14 pages, 14 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the design and prototype of an open source, optical fingerprint
reader, called RaspiReader, using ubiquitous components. RaspiReader, a
low-cost and easy to assemble reader, provides the fingerprint research
community a seamless and simple method for gaining more control over the
sensing component of fingerprint recognition systems. In particular, we posit
that this versatile fingerprint reader will encourage researchers to explore
novel spoof detection methods that integrate both hardware and software.
RaspiReader's hardware is customized with two cameras for fingerprint
acquisition with one camera providing high contrast, frustrated total internal
reflection (FTIR) images, and the other camera outputting direct images. Using
both of these image streams, we extract complementary information which, when
fused together, results in highly discriminative features for fingerprint spoof
(presentation attack) detection. Our experimental results demonstrate a marked
improvement over previous spoof detection methods which rely only on FTIR
images provided by COTS optical readers. Finally, fingerprint matching
experiments between images acquired from the FTIR output of the RaspiReader and
images acquired from a COTS fingerprint reader verify the interoperability of
the RaspiReader with existing COTS optical readers.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2017 21:11:28 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Engelsma",
"Joshua J.",
""
],
[
"Cao",
"Kai",
""
],
[
"Jain",
"Anil K.",
""
]
] |
new_dataset
| 0.998015 |
1708.07916
|
Simon Rubinstein-Salzedo
|
Simon Rubinstein-Salzedo and Yifan Zhu
|
The Asymmetric Colonel Blotto Game
|
Comments welcome!
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper explores the Nash equilibria of a variant of the Colonel Blotto
game, which we call the Asymmetric Colonel Blotto game. In the Colonel Blotto
game, two players simultaneously distribute forces across $n$ battlefields.
Within each battlefield, the player that allocates the higher level of force
wins. The payoff of the game is the proportion of wins on the individual
battlefields. In the asymmetric version, the levels of force distributed to the
battlefields must be nondecreasing. In this paper, we find a family of Nash
equilibria for the case with three battlefields and equal levels of force and
prove the uniqueness of the marginal distributions. We also find the unique
equilibrium payoff for all possible levels of force in the case with two
battlefields, and obtain partial results for the unique equilibrium payoff for
asymmetric levels of force in the case with three battlefields.
|
[
{
"version": "v1",
"created": "Sat, 26 Aug 2017 01:59:48 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Rubinstein-Salzedo",
"Simon",
""
],
[
"Zhu",
"Yifan",
""
]
] |
new_dataset
| 0.978956 |
1708.07937
|
Siddharth Srivastava
|
Siddharth Srivastava, Brejesh Lall
|
3D Binary Signatures
|
Tenth Indian Conference on Computer Vision, Graphics and Image
Processing 2016
| null |
10.1145/3009977.3010009
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a novel binary descriptor for 3D point clouds. The
proposed descriptor termed as 3D Binary Signature (3DBS) is motivated from the
matching efficiency of the binary descriptors for 2D images. 3DBS describes
keypoints from point clouds with a binary vector resulting in extremely fast
matching. The method uses keypoints from standard keypoint detectors. The
descriptor is built by constructing a Local Reference Frame and aligning a
local surface patch accordingly. The local surface patch constitutes of
identifying nearest neighbours based upon an angular constraint among them. The
points are ordered with respect to the distance from the keypoints. The normals
of the ordered pairs of these keypoints are projected on the axes and the
relative magnitude is used to assign a binary digit. The vector thus
constituted is used as a signature for representing the keypoints. The matching
is done by using hamming distance. We show that 3DBS outperforms state of the
art descriptors on various evaluation metrics.
|
[
{
"version": "v1",
"created": "Sat, 26 Aug 2017 06:01:09 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Srivastava",
"Siddharth",
""
],
[
"Lall",
"Brejesh",
""
]
] |
new_dataset
| 0.999511 |
1708.08016
|
Viraj Mavani
|
Viraj Mavani, Shanmuganathan Raman, Krishna P Miyapuram
|
Facial Expression Recognition using Visual Saliency and Deep Learning
|
6 pages
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
We have developed a convolutional neural network for the purpose of
recognizing facial expressions in human beings. We have fine-tuned the existing
convolutional neural network model trained on the visual recognition dataset
used in the ILSVRC2012 to two widely used facial expression datasets - CFEE and
RaFD, which when trained and tested independently yielded test accuracies of
74.79% and 95.71%, respectively. Generalization of results was evident by
training on one dataset and testing on the other. Further, the image product of
the cropped faces and their visual saliency maps were computed using Deep
Multi-Layer Network for saliency prediction and were fed to the facial
expression recognition CNN. In the most generalized experiment, we observed the
top-1 accuracy in the test set to be 65.39%. General confusion trends between
different facial expressions as exhibited by humans were also observed.
|
[
{
"version": "v1",
"created": "Sat, 26 Aug 2017 20:03:38 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Mavani",
"Viraj",
""
],
[
"Raman",
"Shanmuganathan",
""
],
[
"Miyapuram",
"Krishna P",
""
]
] |
new_dataset
| 0.982295 |
1708.08189
|
Ali Al-Bayaty
|
Ahmed F. Hussein, Abbas K. AlZubaidi, Ali Al-Bayaty, Qais A. Habash
|
An IoT Real-Time Biometric Authentication System Based on ECG Fiducial
Extracted Features Using Discrete Cosine Transform
|
6 pages, 8 figures, IoT, Authentication, ECG, DCT
| null | null | null |
cs.CV cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The conventional authentication technologies, like RFID tags and
authentication cards/badges, suffer from different weaknesses, therefore a
prompt replacement to use biometric method of authentication should be applied
instead. Biometrics, such as fingerprints, voices, and ECG signals, are unique
human characters that can be used for authentication processing. In this work,
we present an IoT real-time authentication system based on using extracted ECG
features to identify the unknown persons. The Discrete Cosine Transform (DCT)
is used as an ECG feature extraction, where it has better characteristics for
real-time system implementations. There are a substantial number of researches
with a high accuracy of authentication, but most of them ignore the real-time
capability of authenticating individuals. With the accuracy rate of 97.78% at
around 1.21 seconds of processing time, the proposed system is more suitable
for use in many applications that require fast and reliable authentication
processing demands.
|
[
{
"version": "v1",
"created": "Mon, 28 Aug 2017 04:59:08 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Hussein",
"Ahmed F.",
""
],
[
"AlZubaidi",
"Abbas K.",
""
],
[
"Al-Bayaty",
"Ali",
""
],
[
"Habash",
"Qais A.",
""
]
] |
new_dataset
| 0.993476 |
1708.08414
|
Kyong-Tak Cho
|
Kyong-Tak Cho and Kang Shin
|
Viden: Attacker Identification on In-Vehicle Networks
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Various defense schemes --- which determine the presence of an attack on the
in-vehicle network --- have recently been proposed. However, they fail to
identify which Electronic Control Unit (ECU) actually mounted the attack.
Clearly, pinpointing the attacker ECU is essential for fast/efficient forensic,
isolation, security patch, etc. To meet this need, we propose a novel scheme,
called Viden (Voltage-based attacker identification), which can identify the
attacker ECU by measuring and utilizing voltages on the in-vehicle network. The
first phase of Viden, called ACK learning, determines whether or not the
measured voltage signals really originate from the genuine message transmitter.
Viden then exploits the voltage measurements to construct and update the
transmitter ECUs' voltage profiles as their fingerprints. It finally uses the
voltage profiles to identify the attacker ECU. Since Viden adapts its profiles
to changes inside/outside of the vehicle, it can pinpoint the attacker ECU
under various conditions. Moreover, its efficiency and design-compliance with
modern in-vehicle network implementations make Viden practical and easily
deployable. Our extensive experimental evaluations on both a CAN bus prototype
and two real vehicles have shown that Viden can accurately fingerprint ECUs
based solely on voltage measurements and thus identify the attacker ECU with a
low false identification rate of 0.2%.
|
[
{
"version": "v1",
"created": "Mon, 28 Aug 2017 16:51:15 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Cho",
"Kyong-Tak",
""
],
[
"Shin",
"Kang",
""
]
] |
new_dataset
| 0.998915 |
1708.08421
|
Bin Han
|
Bin Han, Tao Li, and Xiaosheng Zhuang
|
Directional Compactly supported Box Spline Tight Framelets with Simple
Structure
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To effectively capture singularities in high-dimensional data and functions,
multivariate compactly supported tight framelets, having directionality and
derived from refinable box splines, are of particular interest in both theory
and applications. The $d$-dimensional Haar refinable function $\chi_{[0,1]^d}$
is a simple example of refinable box splines. For every dimension $d\in \N$, in
this paper we construct a directional compactly supported $d$-dimensional Haar
tight framelet such that all its high-pass filters in its underlying tight
framelet filter bank have only two nonzero coefficients with opposite signs and
they exhibit totally $(3^d-1)/2$ directions in dimension $d$. Furthermore,
applying the projection method to such directional Haar tight framelets, from
every refinable box spline in every dimension, we construct a directional
compactly supported box spline tight framelet with simple structure such that
all the high-pass filters in its underlying tight framelet filter bank have
only two nonzero coefficients with opposite signs. Moreover, such compactly
supported box spline tight framelets can achieve arbitrarily high numbers of
directions by using refinable box splines with increasing supports.
|
[
{
"version": "v1",
"created": "Mon, 28 Aug 2017 16:58:36 GMT"
}
] | 2017-08-29T00:00:00 |
[
[
"Han",
"Bin",
""
],
[
"Li",
"Tao",
""
],
[
"Zhuang",
"Xiaosheng",
""
]
] |
new_dataset
| 0.991655 |
1612.03985
|
S. Amir Hosseini
|
S. Amir Hosseini, Shivendra S. Panwar
|
Restless Video Bandits: Optimal SVC Streaming in a Multi-user Wireless
Network
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider the problem of optimal scalable video delivery to
mobile users in wireless networks given arbitrary Quality Adaptation (QA)
mechanisms. In current practical systems, QA and scheduling are performed
independently by the content provider and network operator, respectively. While
most research has been focused on jointly optimizing these two tasks, the high
complexity that comes with a joint approach makes the implementation
impractical. Therefore, we present a scheduling mechanism that takes the QA
logic of each user as input and optimizes the scheduling accordingly. Hence,
there is no need for centralized QA and cross-layer interactions are minimized.
We model the QA-adaptive scheduling and the jointly optimal problem as a
Restless Bandit and a Multi-user Semi Markov Decision Process, respectively in
order to compare the loss incurred by not employing a jointly optimal scheme.
We then present heuristic algorithms in order to achieve the optimal outcome of
the Restless Bandit solution assuming the base station has knowledge of the
underlying quality adaptation of each user (QA-Aware). We also present a
simplified heuristic without the need for any higher layer knowledge at the
base station (QA-Blind). We show that our QA-Aware strategy can achieve up to
two times improvement in user network utilization compared to popular baseline
algorithms such as Proportional Fairness. We also provide a testbed
implementation of the QA-Blind scheme in order to compare it with baseline
algorithms in a real network setting.
|
[
{
"version": "v1",
"created": "Tue, 13 Dec 2016 00:27:35 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Aug 2017 18:36:51 GMT"
}
] | 2017-08-28T00:00:00 |
[
[
"Hosseini",
"S. Amir",
""
],
[
"Panwar",
"Shivendra S.",
""
]
] |
new_dataset
| 0.985608 |
1703.09064
|
Laszlo Kish
|
Kyle Sundqvist, David K. Ferry, Laszlo B. Kish
|
Memristor equations: incomplete physics and undefined passivity/activity
|
Accepted for publication in Fluctuation and Noise Letters (August 5)
| null | null | null |
cs.ET
|
http://creativecommons.org/licenses/by/4.0/
|
In his seminal paper, Chua presented a fundamental physical claim by
introducing the memristor, "The missing circuit element". The memristor
equations were originally supposed to represent a passive circuit element
because, with active circuitry, arbitrary elements can be realized without
limitations. Therefore, if the memristor equations do not guarantee that the
circuit element can be realized by a passive system, the fundamental physics
claim about the memristor as "missing circuit element" loses all its weight.
The question of passivity/activity belongs to physics thus we incorporate
thermodynamics into the study of this problem. We show that the memristor
equations are physically incomplete regarding the problem of
passivity/activity. As a consequence, the claim that the present memristor
functions describe a passive device lead to unphysical results, such as
violating the Second Law of thermodynamics, in infinitely large number of
cases. The seminal memristor equations cannot introduce a new physical circuit
element without making the model more physical such as providing the
Fluctuation Dissipation Theory of memristors.
|
[
{
"version": "v1",
"created": "Thu, 23 Mar 2017 14:18:59 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Mar 2017 15:26:43 GMT"
},
{
"version": "v3",
"created": "Mon, 5 Jun 2017 19:18:47 GMT"
},
{
"version": "v4",
"created": "Fri, 25 Aug 2017 13:10:25 GMT"
}
] | 2017-08-28T00:00:00 |
[
[
"Sundqvist",
"Kyle",
""
],
[
"Ferry",
"David K.",
""
],
[
"Kish",
"Laszlo B.",
""
]
] |
new_dataset
| 0.996049 |
1704.00205
|
Shuo Han
|
Shuo Han, Lei Zou, Jeffrey Xu Yu, Dongyan Zhao
|
Keyword Search on RDF Graphs - A Query Graph Assembly Approach
| null | null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/4.0/
|
Keyword search provides ordinary users an easy-to-use interface for querying
RDF data. Given the input keywords, in this paper, we study how to assemble a
query graph that is to represent user's query intention accurately and
efficiently. Based on the input keywords, we first obtain the elementary query
graph building blocks, such as entity/class vertices and predicate edges. Then,
we formally define the query graph assembly (QGA) problem. Unfortunately, we
prove theoretically that QGA is a NP-complete problem. In order to solve that,
we design some heuristic lower bounds and propose a bipartite graph
matching-based best-first search algorithm. The algorithm's time complexity is
$O(k^{2l} \cdot l^{3l})$, where $l$ is the number of the keywords and $k$ is a
tunable parameter, i.e., the maximum number of candidate entity/class vertices
and predicate edges allowed to match each keyword. Although QGA is intractable,
both $l$ and $k$ are small in practice. Furthermore, the algorithm's time
complexity does not depend on the RDF graph size, which guarantees the good
scalability of our system in large RDF graphs. Experiments on DBpedia and
Freebase confirm the superiority of our system on both effectiveness and
efficiency.
|
[
{
"version": "v1",
"created": "Sat, 1 Apr 2017 18:17:28 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Aug 2017 14:51:52 GMT"
}
] | 2017-08-28T00:00:00 |
[
[
"Han",
"Shuo",
""
],
[
"Zou",
"Lei",
""
],
[
"Yu",
"Jeffrey Xu",
""
],
[
"Zhao",
"Dongyan",
""
]
] |
new_dataset
| 0.96016 |
1704.03704
|
Mansour Naslcheraghi
|
Mansour Naslcheraghi, Seyed Ali Ghorashi, Mohammad Shikh-Bahaei
|
Full-Duplex Device-to-Device Collaboration for Low-Latency Wireless
Video Distribution
|
Accepted for publication in 24'th International Conference on
Telecommunication (ICT 2017)
| null |
10.1109/ICT.2017.7998228
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Growing demand for video services is the main driver for increasing traffic
in wireless cellular data networks. Wireless video distribution schemes have
recently been proposed to offload data via Device-to-Device (D2D)
communications. These offloading schemes increase capacity and reduce
end-to-end delay in cellular networks and help to serve the dramatically
increasing demand for high quality video. In this paper, we propose a new
scheme for video distribution over cellular networks by exploiting full-duplex
(FD) D2D communication in two scenarios; scenario one: two nodes exchange their
desired video files simultaneously with each other, and scenario two: each node
can concurrently transmit to and receive from two different nodes. In the
latter case, an intermediate transceiver can serve one or multiple users' file
requests whilst capturing its desired file from another device in the vicinity.
Analytic and simulation results are used to compare the proposed scheme with
its half-duplex (HD) counterpart under the same transmitter establishment
criteria to show the achievable gain of FD-D2D scheme in video content
delivery, in terms of sum throughput and latency.
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2017 11:12:50 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Apr 2017 07:56:27 GMT"
}
] | 2017-08-28T00:00:00 |
[
[
"Naslcheraghi",
"Mansour",
""
],
[
"Ghorashi",
"Seyed Ali",
""
],
[
"Shikh-Bahaei",
"Mohammad",
""
]
] |
new_dataset
| 0.999541 |
1708.07616
|
Mrinal Goswami
|
Mrinal Goswami, Mayukh Roy Chowdhury, Bibhash Sen
|
Design of Configurable Sequential Circuits in Quantum-dot Cellular
Automata
|
13 pages, 17 figures
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quantum-dot cellular automata (QCA) is a likely candidate for future low
power nano-scale electronic devices. Sequential circuits in QCA attract more
attention due to its numerous application in digital industry. On the other
hand, configurable devices provide low device cost and efficient utilization of
device area. Since the fundamental building block of any sequential logic
circuit is flip flop, hence constructing configurable, multi-purpose QCA
flip-flops are one of the prime importance of current research. This work
proposes a design of configurable flip-flop (CFF) which is the first of its
kind in QCA domain. The proposed flip-flop can be configured to D, T and JK
flip-flop by configuring its control inputs. In addition, to make more
efficient configurable flip-flop, a clock pulse generator (CPG) is designed
which can trigger all types of edges (falling, rising and dual) of a clock. The
same CFF design is used to realize an edge configurable (dual/rising/falling)
flip- flop with the help of CPG. The biggest advantage of using edge
configurable (dual/rising/falling) flip-flop is that it can be used in 9
different ways using the same single circuit. All the proposed designs are
verified using QCADesigner simulator.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2017 05:25:21 GMT"
}
] | 2017-08-28T00:00:00 |
[
[
"Goswami",
"Mrinal",
""
],
[
"Chowdhury",
"Mayukh Roy",
""
],
[
"Sen",
"Bibhash",
""
]
] |
new_dataset
| 0.998856 |
1708.07619
|
Fazel Sharifi
|
Fazel Sharifi, Z. M. Saifullah and Abdel-Hameed Badawy
|
Design of Adiabatic MTJ-CMOS Hybrid Circuits
| null | null | null | null |
cs.ET cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Low-power designs are a necessity with the increasing demand of portable
devices which are battery operated. In many of such devices the operational
speed is not as important as battery life. Logic-in-memory structures using
nano-devices and adiabatic designs are two methods to reduce the static and
dynamic power consumption respectively. Magnetic tunnel junction (MTJ) is an
emerging technology which has many advantages when used in logic-in-memory
structures in conjunction with CMOS. In this paper, we introduce a novel
adiabatic hybrid MTJ/CMOS structure which is used to design AND/NAND, XOR/XNOR
and 1-bit full adder circuits. We simulate the designs using HSPICE with 32nm
CMOS technology and compared it with a non-adiabatic hybrid MTJ/CMOS circuits.
The proposed adiabatic MTJ/CMOS full adder design has more than 7 times lower
power consumtion compared to the previous MTJ/CMOS full adder.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2017 06:11:17 GMT"
}
] | 2017-08-28T00:00:00 |
[
[
"Sharifi",
"Fazel",
""
],
[
"Saifullah",
"Z. M.",
""
],
[
"Badawy",
"Abdel-Hameed",
""
]
] |
new_dataset
| 0.999606 |
1708.07762
|
Cihan Kucukkececi
|
Cihan Kucukkececi, Ugur Dogrusoz, Esat Belviranli, and Alptug Dilek
|
Chisio: A Compound Graph Editing and Layout Framework
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new free, open-source compound graph editing and layout
framework named Chisio, based on the Eclipse Graph Editing Framework (GEF) and
written in Java. Chisio can be used as a finished graph editor with its
easy-to-use graphical interface. The framework has an architecture suitable for
easy customization of the tool for end-user's specific needs as well. Chisio
comes with a variety of graph layout algorithms, most supporting compound
structures and non-uniform node dimensions. Furthermore, new algorithms are
straightforward to add, making Chisio an ideal test environment for layout
algorithm developers.
|
[
{
"version": "v1",
"created": "Fri, 25 Aug 2017 14:36:07 GMT"
}
] | 2017-08-28T00:00:00 |
[
[
"Kucukkececi",
"Cihan",
""
],
[
"Dogrusoz",
"Ugur",
""
],
[
"Belviranli",
"Esat",
""
],
[
"Dilek",
"Alptug",
""
]
] |
new_dataset
| 0.999483 |
1512.04364
|
Stefan Sechelmann
|
Michael Joswig and Milan Mehner and Stefan Sechelmann and Jan Techter
and Alexander I. Bobenko
|
DGD Gallery: Storage, sharing, and publication of digital research data
|
19 pages, 8 figures, to appear in "Advances in Discrete Differential
Geometry", ed. A. I. Bobenko, Springer, 2016
|
"Advances in Discrete Differential Geometry", ed. A. I. Bobenko,
pp. 421-439, Springer, 2016
|
10.1007/978-3-662-50447-5
| null |
cs.OH math.DG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe a project, called the "Discretization in Geometry and Dynamics
Gallery", or DGD Gallery for short, whose goal is to store geometric data and
to make it publicly available. The DGD Gallery offers an online web service for
the storage, sharing, and publication of digital research data.
|
[
{
"version": "v1",
"created": "Mon, 16 Nov 2015 16:32:25 GMT"
}
] | 2017-08-25T00:00:00 |
[
[
"Joswig",
"Michael",
""
],
[
"Mehner",
"Milan",
""
],
[
"Sechelmann",
"Stefan",
""
],
[
"Techter",
"Jan",
""
],
[
"Bobenko",
"Alexander I.",
""
]
] |
new_dataset
| 0.955398 |
1705.01464
|
Claudiu Herteliu
|
Claudiu Herteliu, Marcel Ausloos, Bogdan Vasile Ileanu, Giulia Rotundo
and Tudorel Andrei
|
Quantitative and Qualitative Analysis of Editor Behavior through
Potentially Coercive Citations
|
23 pages, 6 figures, 5 tables, 45 references, published in
Publications (MDPI), 2017 (http://www.mdpi.com/2304-6775/5/2/15). The title
of published version is slightly changed
|
Publications 5 (2017) 15
|
10.3390/publications5020015
| null |
cs.DL
|
http://creativecommons.org/licenses/by/4.0/
|
How much is the h-index of an editor of a well ranked journal improved due to
citations which occur after his or her appointment? Scientific recognition
within academia is widely measured nowadays by the number of citations or
h-index. Our dataset is based on a sample of four editors from a well ranked
journal (impact factor - IF - greater than 2). The target group consists of two
editors who seem to benefit by their position through an increased citation
number (and subsequently h-index) within journal. The total amount of citations
for the target group is bigger than 600. The control group is formed by another
set of two editors from the same journal whose relations between their
positions and their citation records remain neutral. The total amount of
citations for the control group is more than 1200. The timespan for which
pattern of citations has been studied is 1975-2015. Previous coercive citations
for a journal benefit (increase its IF) has been signaled. To the best of our
knowledge, this is a pioneering work on coercive citations for personal (or
editors) benefit. Editorial teams should be aware about this type of
potentially unethical behavior and act accordingly.
|
[
{
"version": "v1",
"created": "Tue, 2 May 2017 15:44:10 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jun 2017 14:41:03 GMT"
}
] | 2017-08-25T00:00:00 |
[
[
"Herteliu",
"Claudiu",
""
],
[
"Ausloos",
"Marcel",
""
],
[
"Ileanu",
"Bogdan Vasile",
""
],
[
"Rotundo",
"Giulia",
""
],
[
"Andrei",
"Tudorel",
""
]
] |
new_dataset
| 0.999419 |
1708.00411
|
Songyou Peng
|
Songyou Peng, Bjoern Haefner, Yvain Qu\'eau, Daniel Cremers
|
Depth Super-Resolution Meets Uncalibrated Photometric Stereo
|
International Conference on Computer Vision (ICCV) Workshop, 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel depth super-resolution approach for RGB-D sensors is presented. It
disambiguates depth super-resolution through high-resolution photometric clues
and, symmetrically, it disambiguates uncalibrated photometric stereo through
low-resolution depth cues. To this end, an RGB-D sequence is acquired from the
same viewing angle, while illuminating the scene from various uncalibrated
directions. This sequence is handled by a variational framework which fits
high-resolution shape and reflectance, as well as lighting, to both the
low-resolution depth measurements and the high-resolution RGB ones. The key
novelty consists in a new PDE-based photometric stereo regularizer which
implicitly ensures surface regularity. This allows to carry out depth
super-resolution in a purely data-driven manner, without the need for any
ad-hoc prior or material calibration. Real-world experiments are carried out
using an out-of-the-box RGB-D sensor and a hand-held LED light source.
|
[
{
"version": "v1",
"created": "Tue, 1 Aug 2017 16:39:56 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Aug 2017 16:24:55 GMT"
}
] | 2017-08-25T00:00:00 |
[
[
"Peng",
"Songyou",
""
],
[
"Haefner",
"Bjoern",
""
],
[
"Quéau",
"Yvain",
""
],
[
"Cremers",
"Daniel",
""
]
] |
new_dataset
| 0.984823 |
1708.06846
|
Arthur Choi
|
Arthur Choi and Adnan Darwiche
|
On Relaxing Determinism in Arithmetic Circuits
|
In Proceedings of the Thirty-fourth International Conference on
Machine Learning (ICML)
| null | null | null |
cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The past decade has seen a significant interest in learning tractable
probabilistic representations. Arithmetic circuits (ACs) were among the first
proposed tractable representations, with some subsequent representations being
instances of ACs with weaker or stronger properties. In this paper, we provide
a formal basis under which variants on ACs can be compared, and where the
precise roles and semantics of their various properties can be made more
transparent. This allows us to place some recent developments on ACs in a
clearer perspective and to also derive new results for ACs. This includes an
exponential separation between ACs with and without determinism; completeness
and incompleteness results; and tractability results (or lack thereof) when
computing most probable explanations (MPEs).
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2017 23:02:11 GMT"
}
] | 2017-08-25T00:00:00 |
[
[
"Choi",
"Arthur",
""
],
[
"Darwiche",
"Adnan",
""
]
] |
new_dataset
| 0.988576 |
1708.07285
|
Pavel Surynek
|
Marika Ivanov\'a, Pavel Surynek
|
Area Protection in Adversarial Path-Finding Scenarios with Multiple
Mobile Agents on Graphs: a theoretical and experimental study of
target-allocation strategies for defense coordination
| null | null | null | null |
cs.AI cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We address a problem of area protection in graph-based scenarios with
multiple agents. The problem consists of two adversarial teams of agents that
move in an undirected graph shared by both teams. Agents are placed in vertices
of the graph; at most one agent can occupy a vertex; and they can move into
adjacent vertices in a conflict free way. Teams have asymmetric goals: the aim
of one team - attackers - is to invade into given area while the aim of the
opponent team - defenders - is to protect the area from being entered by
attackers by occupying selected vertices. We study strategies for allocating
vertices to be occupied by the team of defenders to block attacking agents. We
show that the decision version of the problem of area protection is PSPACE-hard
under the assumption that agents can allocate their target vertices multiple
times. Further we develop various on-line vertex-allocation strategies for the
defender team in a simplified variant of the problem with single stage vertex
allocation and evaluated their performance in multiple benchmarks. The success
of a strategy is heavily dependent on the type of the instance, and so one of
the contributions of this work is that we identify suitable vertex-allocation
strategies for diverse instance types. In particular, we introduce a
simulation-based method that identifies and tries to capture bottlenecks in the
graph, that are frequently used by the attackers. Our experimental evaluation
suggests that this method often allows a successful defense even in instances
where the attackers significantly outnumber the defenders.
|
[
{
"version": "v1",
"created": "Thu, 24 Aug 2017 05:58:28 GMT"
}
] | 2017-08-25T00:00:00 |
[
[
"Ivanová",
"Marika",
""
],
[
"Surynek",
"Pavel",
""
]
] |
new_dataset
| 0.995222 |
1708.07321
|
Peter Larsson
|
Peter Larsson
|
Golden Angle Modulation: Geometric- and Probabilistic-shaping
|
11 pages, 15 figures, submitted for possible publication in IEEE
transactions on communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quadrature amplitude modulation (QAM), deployed in billions of communication
devises, exhibits a shaping-loss of $\pi \mathrm{e}/6$ ($\approx 1.53$ dB)
compared to the Shannon-Hartley theorem. With inspiration gained from special
(leaf, flower petal, and seed) packing arrangements (so called spiral
phyllotaxis) found among plants, we have designed a shape-versatile, circular
symmetric, modulation scheme, \textit{the Golden angle modulation (GAM)}.
Geometric- and probabilistic-shaping-based GAM schemes are designed that
practically overcome the shaping-loss of 1.53 dB. Specifically, we consider
mutual information (MI)-optimized geometric-, probabilistic-, and joint
geometric-and-probabilistic-GAM, under SNR-equality, and PAPR-inequality,
constraints. Out of those, the joint scheme yields the highest MI-performance,
and then comes the probabilistic schemes. This study finds that GAM could be an
interesting candidate for future communication systems. Transmitter resource
limited links, such as space probe-to-earth, satellite, and
mobile-to-basestation, are scenarios where capacity achieving GAM could be of
particular value.
|
[
{
"version": "v1",
"created": "Thu, 24 Aug 2017 09:04:12 GMT"
}
] | 2017-08-25T00:00:00 |
[
[
"Larsson",
"Peter",
""
]
] |
new_dataset
| 0.999332 |
1708.07329
|
Matteo Cinelli
|
Matteo Cinelli, Giovanna Ferraro and Antonio Iovanella
|
Resilience of Core-Periphery Networks in the Case of Rich-Club
| null | null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Core-periphery networks are structures that present a set of central and
densely connected nodes, namely the core, and a set of non-central and sparsely
connected nodes, namely the periphery. The rich-club refers to a set in which
the highest degree nodes show a high density of connections. Thus, a network
that displays a rich-club can be interpreted as a core-periphery network in
which the core is made up by a number of hubs. In this paper, we test the
resilience of networks showing a progressively denser rich-club and we observe
how this structure is able to affect the network measures in terms of both
cohesion and efficiency in information flow. Additionally, we consider the case
in which, instead of making the core denser, we add links to the periphery.
These two procedures of core and periphery thickening delineate a decision
process in the placement of new links and allow us to conduct a scenario
analysis that can be helpful in the comprehension and supervision of complex
networks under the resilience perspective. The advantages of the two
procedures, as well as their implications, are discussed in relation to both
network effciency and node heterogeneity.
|
[
{
"version": "v1",
"created": "Thu, 24 Aug 2017 09:16:21 GMT"
}
] | 2017-08-25T00:00:00 |
[
[
"Cinelli",
"Matteo",
""
],
[
"Ferraro",
"Giovanna",
""
],
[
"Iovanella",
"Antonio",
""
]
] |
new_dataset
| 0.982556 |
1708.07347
|
Sebastian Heinz
|
Sebastian Heinz, Christian Bracher, Roland Vollgraf
|
An LSTM-Based Dynamic Customer Model for Fashion Recommendation
| null | null | null | null |
cs.IR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online fashion sales present a challenging use case for personalized
recommendation: Stores offer a huge variety of items in multiple sizes. Small
stocks, high return rates, seasonality, and changing trends cause continuous
turnover of articles for sale on all time scales. Customers tend to shop
rarely, but often buy multiple items at once. We report on backtest experiments
with sales data of 100k frequent shoppers at Zalando, Europe's leading online
fashion platform. To model changing customer and store environments, our
recommendation method employs a pair of neural networks: To overcome the cold
start problem, a feedforward network generates article embeddings in "fashion
space," which serve as input to a recurrent neural network that predicts a
style vector in this space for each client, based on their past purchase
sequence. We compare our results with a static collaborative filtering
approach, and a popularity ranking baseline.
|
[
{
"version": "v1",
"created": "Thu, 24 Aug 2017 10:35:24 GMT"
}
] | 2017-08-25T00:00:00 |
[
[
"Heinz",
"Sebastian",
""
],
[
"Bracher",
"Christian",
""
],
[
"Vollgraf",
"Roland",
""
]
] |
new_dataset
| 0.999565 |
1708.07354
|
Sandra Kiefer
|
Sandra Kiefer, Ilia Ponomarenko, Pascal Schweitzer
|
The Weisfeiler-Leman Dimension of Planar Graphs is at most 3
|
34 pages, 3 figures, extended version of LICS 2017 paper
| null |
10.1109/LICS.2017.8005107
| null |
cs.DM cs.LO math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that the Weisfeiler-Leman (WL) dimension of the class of all finite
planar graphs is at most 3. In particular, every finite planar graph is
definable in first-order logic with counting using at most 4 variables. The
previously best known upper bounds for the dimension and number of variables
were 14 and 15, respectively.
First we show that, for dimension 3 and higher, the WL-algorithm correctly
tests isomorphism of graphs in a minor-closed class whenever it determines the
orbits of the automorphism group of any arc-colored 3-connected graph belonging
to this class.
Then we prove that, apart from several exceptional graphs (which have
WL-dimension at most 2), the individualization of two correctly chosen vertices
of a colored 3-connected planar graph followed by the 1-dimensional
WL-algorithm produces the discrete vertex partition. This implies that the
3-dimensional WL-algorithm determines the orbits of a colored 3-connected
planar graph.
As a byproduct of the proof, we get a classification of the 3-connected
planar graphs with fixing number 3.
|
[
{
"version": "v1",
"created": "Thu, 24 Aug 2017 11:06:19 GMT"
}
] | 2017-08-25T00:00:00 |
[
[
"Kiefer",
"Sandra",
""
],
[
"Ponomarenko",
"Ilia",
""
],
[
"Schweitzer",
"Pascal",
""
]
] |
new_dataset
| 0.986252 |
1703.04035
|
Shiyu Zhao
|
Shiyu Zhao, Zhiyong Sun, Daniel Zelazo, Minh-Hoang Trinh, Hyo-Sung Ahn
|
Laman Graphs are Generically Bearing Rigid in Arbitrary Dimensions
|
To appear in IEEE CDC 2017
| null | null | null |
cs.SY math.CO math.MG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses the problem of constructing bearing rigid networks in
arbitrary dimensions. We first show that the bearing rigidity of a network is a
generic property that is critically determined by the underlying graph of the
network. A new notion termed generic bearing rigidity is defined for graphs. If
the underlying graph of a network is generically bearing rigid, then the
network is bearing rigid for almost all configurations; otherwise, the network
is not bearing rigid for any configuration. As a result, the key to construct
bearing rigid networks is to construct generically bearing rigid graphs. The
main contribution of this paper is to prove that Laman graphs, which can be
generated by the Henneberg construction, are generically bearing rigid in
arbitrary dimensions. As a consequence, if the underlying graph of a network is
Laman, the network is bearing rigid for almost all configurations in arbitrary
dimensions.
|
[
{
"version": "v1",
"created": "Sat, 11 Mar 2017 22:33:04 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Aug 2017 11:11:49 GMT"
}
] | 2017-08-24T00:00:00 |
[
[
"Zhao",
"Shiyu",
""
],
[
"Sun",
"Zhiyong",
""
],
[
"Zelazo",
"Daniel",
""
],
[
"Trinh",
"Minh-Hoang",
""
],
[
"Ahn",
"Hyo-Sung",
""
]
] |
new_dataset
| 0.999546 |
1704.07945
|
Kuniaki Saito Saito Kuniaki
|
Masataka Yamaguchi, Kuniaki Saito, Yoshitaka Ushiku, Tatsuya Harada
|
Spatio-temporal Person Retrieval via Natural Language Queries
|
Accepted to ICCV2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we address the problem of spatio-temporal person retrieval
from multiple videos using a natural language query, in which we output a tube
(i.e., a sequence of bounding boxes) which encloses the person described by the
query. For this problem, we introduce a novel dataset consisting of videos
containing people annotated with bounding boxes for each second and with five
natural language descriptions. To retrieve the tube of the person described by
a given natural language query, we design a model that combines methods for
spatio-temporal human detection and multimodal retrieval. We conduct
comprehensive experiments to compare a variety of tube and text representations
and multimodal retrieval methods, and present a strong baseline in this task as
well as demonstrate the efficacy of our tube representation and multimodal
feature embedding technique. Finally, we demonstrate the versatility of our
model by applying it to two other important tasks.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2017 02:26:01 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Aug 2017 21:16:27 GMT"
}
] | 2017-08-24T00:00:00 |
[
[
"Yamaguchi",
"Masataka",
""
],
[
"Saito",
"Kuniaki",
""
],
[
"Ushiku",
"Yoshitaka",
""
],
[
"Harada",
"Tatsuya",
""
]
] |
new_dataset
| 0.998368 |
1708.06913
|
Santanu Sarkar Dr.
|
Tapabrata Roy and Santanu Sarkar
|
$\prod\limits_{i=1}^{n} \mathbb{Z}_{2^i}$-Additive Cyclic Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study $\prod\limits_{i=1}^{n} \mathbb{Z}_{2^i}$-Additive
Cyclic Codes. These codes are identified as $\mathbb{Z}_{2^n}[x]$-submodules of
$\prod\limits_{i=1}^{n}\mathbb{Z}_{2^i}[x]/ \langle x^{\alpha_i}-1\rangle$;
$\alpha_i$ and $\rm{i}$ being relatively prime for each $i=1,2,\ldots,n.$ We
first define a $\prod\limits_{i=1}^{n}\mathbb{Z}_{2^i}$-additive cyclic code of
a certain length. We then define the distance between two codewords and the
minimum distance of such a code. Moreover we relate these to binary codes using
the generalized Gray maps. We define the duals of such codes and show that the
dual of a $\prod\limits_{i=1}^{n}\mathbb{Z}_{2^i}$-additive cyclic code is also
cyclic. We then give the polynomial definition of a
$\prod\limits_{i=1}^{n}\mathbb{Z}_{2^i}$-additive cyclic code of a certain
length. We then determine the structure of such codes and derive a minimal
spanning set for that. We also determine the total number of codewords in this
code. We finally give an illustrative example of a
$\prod\limits_{i=1}^{n}\mathbb{Z}_{2^i}$-additive cyclic code.
|
[
{
"version": "v1",
"created": "Wed, 23 Aug 2017 08:12:22 GMT"
}
] | 2017-08-24T00:00:00 |
[
[
"Roy",
"Tapabrata",
""
],
[
"Sarkar",
"Santanu",
""
]
] |
new_dataset
| 0.977187 |
1708.07104
|
Veronica Perez-Rosas
|
Ver\'onica P\'erez-Rosas, Bennett Kleinberg, Alexandra Lefevre, Rada
Mihalcea
|
Automatic Detection of Fake News
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The proliferation of misleading information in everyday access media outlets
such as social media feeds, news blogs, and online newspapers have made it
challenging to identify trustworthy news sources, thus increasing the need for
computational tools able to provide insights into the reliability of online
content. In this paper, we focus on the automatic identification of fake
content in online news. Our contribution is twofold. First, we introduce two
novel datasets for the task of fake news detection, covering seven different
news domains. We describe the collection, annotation, and validation process in
detail and present several exploratory analysis on the identification of
linguistic differences in fake and legitimate news content. Second, we conduct
a set of learning experiments to build accurate fake news detectors. In
addition, we provide comparative analyses of the automatic and manual
identification of fake news.
|
[
{
"version": "v1",
"created": "Wed, 23 Aug 2017 17:12:03 GMT"
}
] | 2017-08-24T00:00:00 |
[
[
"Pérez-Rosas",
"Verónica",
""
],
[
"Kleinberg",
"Bennett",
""
],
[
"Lefevre",
"Alexandra",
""
],
[
"Mihalcea",
"Rada",
""
]
] |
new_dataset
| 0.984938 |
1611.02836
|
Yihua Tan
|
Yihua Tan, Soung Chang Liew, and Tao Huang
|
Mobile Lattice-Coded Physical-Layer Network Coding With Practical
Channel Alignment
|
22 pages, 18 figures, 3 tables
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Physical-layer network coding (PNC) is a communications paradigm that
exploits overlapped transmissions to boost the throughput of wireless relay
networks. A high point of PNC research was a theoretical proof that PNC that
makes use of lattice codes could approach the information-theoretic capacity of
a two-way relay network (TWRN), where two end nodes communicate via a relay
node. The capacity cannot be achieved by conventional methods of time-division
or straightforward network coding. Many practical challenges, however, remain
to be addressed before the full potential of lattice-coded PNC can be realized.
Two major challenges are: for good performance in lattice-coded PNC, channels
of simultaneously transmitting nodes must be aligned; for lattice-coded PNC to
be practical, the complexity of lattice encoding at the transmitters and
lattice decoding at the receiver must be reduced. We address these challenges
and implement a first lattice-coded PNC system on a software-defined radio
platform. Specifically, we design and implement a low-overhead channel
precoding system that accurately aligns the channels of distributed nodes. In
our implementation, the nodes only use low-cost temperature-compensated
oscillators---a consequent challenge is that the channel alignment must be done
more frequently and more accurately compared with the use of expensive
oscillators. The low overhead and accurate channel alignment are achieved by
(1)a channel precoding system implemented over FPGA to realize fast feedback of
channel state information; (2)a highly-accurate carrier frequency offset
estimation method; and (3)a partial-feedback channel estimation method that
significantly reduces the feedback information from the receiver to the
transmitters for channel precoding at the transmitters. To reduce lattice
encoding and decoding complexities, we adapt the low-density lattice code for
use in PNC systems.
|
[
{
"version": "v1",
"created": "Wed, 9 Nov 2016 06:55:33 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Aug 2017 04:29:36 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Tan",
"Yihua",
""
],
[
"Liew",
"Soung Chang",
""
],
[
"Huang",
"Tao",
""
]
] |
new_dataset
| 0.999407 |
1611.06474
|
Nazia Attari
|
N. Attari and F. Ofli and M. Awad and J. Lucas and S. Chawla
|
Nazr-CNN: Fine-Grained Classification of UAV Imagery for Damage
Assessment
|
Accepted for publication in the 4th IEEE International Conference on
Data Science and Advanced Analytics (DSAA) 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose Nazr-CNN1, a deep learning pipeline for object detection and
fine-grained classification in images acquired from Unmanned Aerial Vehicles
(UAVs) for damage assessment and monitoring. Nazr-CNN consists of two
components. The function of the first component is to localize objects (e.g.
houses or infrastructure) in an image by carrying out a pixel-level
classification. In the second component, a hidden layer of a Convolutional
Neural Network (CNN) is used to encode Fisher Vectors (FV) of the segments
generated from the first component in order to help discriminate between
different levels of damage. To showcase our approach we use data from UAVs that
were deployed to assess the level of damage in the aftermath of a devastating
cyclone that hit the island of Vanuatu in 2015. The collected images were
labeled by a crowdsourcing effort and the labeling categories consisted of
fine-grained levels of damage to built structures. Since our data set is
relatively small, a pre- trained network for pixel-level classification and FV
encoding was used. Nazr-CNN attains promising results both for object detection
and damage assessment suggesting that the integrated pipeline is robust in the
face of small data sets and labeling errors by annotators. While the focus of
Nazr-CNN is on assessment of UAV images in a post-disaster scenario, our
solution is general and can be applied in many diverse settings. We show one
such case of transfer learning to assess the level of damage in aerial images
collected after a typhoon in Philippines.
|
[
{
"version": "v1",
"created": "Sun, 20 Nov 2016 05:54:06 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Aug 2017 08:27:52 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Attari",
"N.",
""
],
[
"Ofli",
"F.",
""
],
[
"Awad",
"M.",
""
],
[
"Lucas",
"J.",
""
],
[
"Chawla",
"S.",
""
]
] |
new_dataset
| 0.996577 |
1703.04281
|
EPTCS
|
Masaki Nakanishi (Department of Education, Art and Science, Yamagata
University), Kamil Khadiev (University of Latvia, Faculty of Computing,
Center for Quantum Computer Science and Kazan Federal University, Institute
of Computational Mathematics and IT), Kri\v{s}j\=anis Pr\=usis (University of
Latvia, Faculty of Computing, Center for Quantum Computer Science),
Jevg\=enijs Vihrovs (University of Latvia, Faculty of Computing, Center for
Quantum Computer Science), Abuzer Yakary{\i}lmaz (University of Latvia,
Faculty of Computing, Center for Quantum Computer Science)
|
Exact Affine Counter Automata
|
In Proceedings AFL 2017, arXiv:1708.06226
|
EPTCS 252, 2017, pp. 205-218
|
10.4204/EPTCS.252.20
| null |
cs.FL cs.CC quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce an affine generalization of counter automata, and analyze their
ability as well as affine finite automata. Our contributions are as follows. We
show that there is a language that can be recognized by exact realtime affine
counter automata but by neither 1-way deterministic pushdown automata nor
realtime deterministic k-counter automata. We also show that a certain promise
problem, which is conjectured not to be solved by two-way quantum finite
automata in polynomial time, can be solved by Las Vegas affine finite automata.
Lastly, we show that how a counter helps for affine finite automata by showing
that the language MANYTWINS, which is conjectured not to be recognized by
affine, quantum or classical finite state models in polynomial time, can be
recognized by affine counter automata with one-sided bounded-error in realtime.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2017 07:50:35 GMT"
},
{
"version": "v2",
"created": "Sat, 27 May 2017 05:29:22 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Aug 2017 01:21:54 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Nakanishi",
"Masaki",
"",
"Department of Education, Art and Science, Yamagata\n University"
],
[
"Khadiev",
"Kamil",
"",
"University of Latvia, Faculty of Computing,\n Center for Quantum Computer Science and Kazan Federal University, Institute\n of Computational Mathematics and IT"
],
[
"Prūsis",
"Krišjānis",
"",
"University of\n Latvia, Faculty of Computing, Center for Quantum Computer Science"
],
[
"Vihrovs",
"Jevgēnijs",
"",
"University of Latvia, Faculty of Computing, Center for\n Quantum Computer Science"
],
[
"Yakaryılmaz",
"Abuzer",
"",
"University of Latvia,\n Faculty of Computing, Center for Quantum Computer Science"
]
] |
new_dataset
| 0.98562 |
1708.06461
|
EPTCS
|
F. Blanchet-Sadri (Department of Computer Science, University of North
Carolina), Kun Chen (Department of Computer Science, University of North
Carolina), Kenneth Hawes (Department of Mathematics, University of Virginia)
|
Dyck Words, Lattice Paths, and Abelian Borders
|
In Proceedings AFL 2017, arXiv:1708.06226
|
EPTCS 252, 2017, pp. 56-70
|
10.4204/EPTCS.252.9
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We use results on Dyck words and lattice paths to derive a formula for the
exact number of binary words of a given length with a given minimal abelian
border length, tightening a bound on that number from Christodoulakis et al.
(Discrete Applied Mathematics, 2014). We also extend to any number of distinct
abelian borders a result of Rampersad et al. (Developments in Language Theory,
2013) on the exact number of binary words of a given length with no abelian
borders. Furthermore, we generalize these results to partial words.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2017 00:48:32 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Blanchet-Sadri",
"F.",
"",
"Department of Computer Science, University of North\n Carolina"
],
[
"Chen",
"Kun",
"",
"Department of Computer Science, University of North\n Carolina"
],
[
"Hawes",
"Kenneth",
"",
"Department of Mathematics, University of Virginia"
]
] |
new_dataset
| 0.996723 |
1708.06467
|
EPTCS
|
Alexander Meduna (Department of Information Systems, Faculty of
Information Technology, Brno University of Technology), Jakub Marti\v{s}ko
(Department of Information Systems, Faculty of Information Technology, Brno
University of Technology)
|
CD Grammar Systems with Two Propagating Scattered Context Components
Characterize the Family of Context Sensitive Languages
|
In Proceedings AFL 2017, arXiv:1708.06226
|
EPTCS 252, 2017, pp. 170-179
|
10.4204/EPTCS.252.17
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The L(PSCG)=L(CS) problem asks whether propagating scattered context grammars
and context sensitive grammars are equivalent. The presented paper reformulates
and answers this problem in terms of CD grammar systems. More specifically, it
characterizes the family of context sensitive languages by two-component CD
grammar systems with propagating scattered context rules.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2017 00:51:21 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Meduna",
"Alexander",
"",
"Department of Information Systems, Faculty of\n Information Technology, Brno University of Technology"
],
[
"Martiško",
"Jakub",
"",
"Department of Information Systems, Faculty of Information Technology, Brno\n University of Technology"
]
] |
new_dataset
| 0.992764 |
1708.06469
|
EPTCS
|
Benedek Nagy (Department of Mathematics, Faculty of Arts and Sciences,
Eastern Mediterranean University), Shaghayegh Parchami (Department of
Mathematics, Faculty of Arts and Sciences, Eastern Mediterranean University),
Hamid Mir-Mohammad-Sadeghi (Department of Mathematics, Faculty of Arts and
Sciences, Eastern Mediterranean University)
|
A New Sensing 5'-->3' Watson-Crick Automata Concept
|
In Proceedings AFL 2017, arXiv:1708.06226
|
EPTCS 252, 2017, pp. 195-204
|
10.4204/EPTCS.252.19
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Watson-Crick (WK) finite automata are working on a Watson-Crick tape, that
is, on a DNA molecule. Therefore, it has two reading heads. While in
traditional WK automata both heads read the whole input in the same physical
direction, in 5'->3' WK automata the heads start from the two extremes and read
the input in opposite direction. In sensing 5'->3' WK automata the process on
the input is finished when the heads meet. Since the heads of a WK automaton
may read longer strings in a transition, in previous models a so-called sensing
parameter took care for the proper meeting of the heads (not allowing to read
the same positions of the input in the last step). In this paper, a new model
is investigated, which works without the sensing parameter (it is done by an
appropriate change of the concept of configuration). Consequently, the accepted
language classes of the variants are also changed. Various hierarchy results
are proven in the paper.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2017 00:52:08 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Nagy",
"Benedek",
"",
"Department of Mathematics, Faculty of Arts and Sciences,\n Eastern Mediterranean University"
],
[
"Parchami",
"Shaghayegh",
"",
"Department of\n Mathematics, Faculty of Arts and Sciences, Eastern Mediterranean University"
],
[
"Mir-Mohammad-Sadeghi",
"Hamid",
"",
"Department of Mathematics, Faculty of Arts and\n Sciences, Eastern Mediterranean University"
]
] |
new_dataset
| 0.999599 |
1708.06508
|
Toan Nguyen
|
Athanasios Papadopoulos, Toan Nguyen, Emre Durmus, Nasir Memon
|
IllusionPIN: Shoulder-Surfing Resistant Authentication Using Hybrid
Images
|
15 pages, 10 figures, IEEE Transactions on Information Forensics and
Security, 2017
| null |
10.1109/TIFS.2017.2725199
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We address the problem of shoulder-surfing attacks on authentication schemes
by proposing IllusionPIN (IPIN), a PIN-based authentication method that
operates on touchscreen devices. IPIN uses the technique of hybrid images to
blend two keypads with different digit orderings in such a way, that the user
who is close to the device is seeing one keypad to enter her PIN, while the
attacker who is looking at the device from a bigger distance is seeing only the
other keypad. The user's keypad is shuffled in every authentication attempt
since the attacker may memorize the spatial arrangement of the pressed digits.
To reason about the security of IllusionPIN, we developed an algorithm which
is based on human visual perception and estimates the minimum distance from
which an observer is unable to interpret the keypad of the user. We tested our
estimations with 84 simulated shoulder-surfing attacks from 21 different
people. None of the attacks was successful against our estimations. In
addition, we estimated the minimum distance from which a camera is unable to
capture the visual information from the keypad of the user. Based on our
analysis, it seems practically almost impossible for a surveillance camera to
capture the PIN of a smartphone user when IPIN is in use.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2017 06:28:22 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Papadopoulos",
"Athanasios",
""
],
[
"Nguyen",
"Toan",
""
],
[
"Durmus",
"Emre",
""
],
[
"Memon",
"Nasir",
""
]
] |
new_dataset
| 0.999242 |
1708.06521
|
Olivier Cur\'e
|
Xiangnan Ren and Olivier Cur\'e and Hubert Naacke and Li Ke
|
Strider-lsa: Massive RDF Stream Reasoning in the Cloud
|
10 pages, 10 figures, 4 tables
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reasoning over semantically annotated data is an emerging trend in stream
processing aiming to produce sound and complete answers to a set of continuous
queries. It usually comes at the cost of finding a trade-off between data
throughput and the cost of expressive inferences. Strider-lsa proposes such a
trade-off and combines a scalable RDF stream processing engine with an
efficient reasoning system. The main reasoning tasks are based on a query
rewriting approach for SPARQL that benefits from an intelligent encoding of
RDFS+ (RDFS + owl:sameAs) ontology elements. Strider-lsa runs in production at
a major international water management company to detect anomalies from sensor
streams. The system is evaluated along different dimensions and over multiple
datasets to emphasize its performance.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2017 07:45:30 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Ren",
"Xiangnan",
""
],
[
"Curé",
"Olivier",
""
],
[
"Naacke",
"Hubert",
""
],
[
"Ke",
"Li",
""
]
] |
new_dataset
| 0.992501 |
1708.06649
|
Nikolaos Pappas
|
Nikolaos Pappas, Jeongho Jeon, Di Yuan, Apostolos Traganitis, Anthony
Ephremides
|
Wireless Network-Level Partial Relay Cooperation: A Stable Throughput
Analysis
|
Submitted for journal publication. arXiv admin note: text overlap
with arXiv:1502.01134
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we study the benefit of partial relay cooperation. We consider
a two-node system consisting of one source and one relay node transmitting
information to a common destination. The source and the relay have external
traffic and in addition, the relay is equipped with a flow controller to
regulate the incoming traffic from the source node. The cooperation is
performed at the network level. A collision channel with erasures is
considered. We provide an exact characterization of the stability region of the
system and we also prove that the system with partial cooperation is always
better or at least equal to the system without the flow controller.
|
[
{
"version": "v1",
"created": "Mon, 21 Aug 2017 16:32:29 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Pappas",
"Nikolaos",
""
],
[
"Jeon",
"Jeongho",
""
],
[
"Yuan",
"Di",
""
],
[
"Traganitis",
"Apostolos",
""
],
[
"Ephremides",
"Anthony",
""
]
] |
new_dataset
| 0.989533 |
1708.06721
|
Shuai Sun
|
Armin Mehrabian, Shuai Sun, Vikram K. Narayana, Volker J. Sorger, and
Tarek El-Ghazawi
|
D3NOC: Dynamic Data-Driven Network On Chip in Photonic Electronic
Hybrids
|
8 pages
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a reconfigurable hybrid Photonic-Plasmonic
Network-on-Chip (NoC) based on the Dynamic Data Driven Application System
(DDDAS) paradigm. In DDDAS computations and measurements form a dynamic closed
feedback loop in which they tune one another in response to changes in the
environment. Our proposed system enables dynamic augmentation of a base
electrical mesh topology with an optical express bus during the run-time. In
addition, the measurement process itself adjusts to the environment. In order
to achieve lower latencies, lower dynamic power, and higher throughput, we take
advantage of a Configurable Hybrid Photonic Plasmonic Interconnect (CHyPPI) for
our reconfigurable connections. We evaluate the performance and power of our
system against kernels from NAS Parallel Benchmark (NPB) in addition to some
synthetically generated traffic. In comparison to a 16x16 base electrical mesh,
D3NOC shows up to 89% latency and 67% dynamic power net improvements beyond
overhead-corrected performance. It should be noted that the design-space of NoC
reconfiguration is vast and the goal of this study is not design-space
exploration. Our goal is to show the potentials of adaptive dynamic
measurements when coupled with other reconfiguration techniques in the NoC
context.
|
[
{
"version": "v1",
"created": "Tue, 22 Aug 2017 16:55:32 GMT"
}
] | 2017-08-23T00:00:00 |
[
[
"Mehrabian",
"Armin",
""
],
[
"Sun",
"Shuai",
""
],
[
"Narayana",
"Vikram K.",
""
],
[
"Sorger",
"Volker J.",
""
],
[
"El-Ghazawi",
"Tarek",
""
]
] |
new_dataset
| 0.999132 |
1603.09051
|
Rahul Aralikatte
|
Rahul Aralikatte and G Srinivasaraghavan
|
Phoenix: A Self-Optimizing Chess Engine
|
Accepted in CICN 2015. Preprint
| null | null | null |
cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Since the advent of computers, many tasks which required humans to spend a
lot of time and energy have been trivialized by the computers' ability to
perform repetitive tasks extremely quickly. Playing chess is one such task. It
was one of the first games which was `solved' using AI. With the advent of deep
learning, chess playing agents can surpass human ability with relative ease.
However algorithms using deep learning must learn millions of parameters. This
work looks at the game of chess through the lens of genetic algorithms. We
train a genetic player from scratch using only a handful of learnable
parameters. We use Multi-Niche Crowding to optimize positional Value Tables
(PVTs) which are used extensively in chess engines to evaluate the goodness of
a position. With a very simple setup and after only 1000 generations of
evolution, the player reaches the level of an International Master.
|
[
{
"version": "v1",
"created": "Wed, 30 Mar 2016 06:41:04 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Sep 2016 04:53:19 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Aug 2017 14:32:55 GMT"
},
{
"version": "v4",
"created": "Sun, 20 Aug 2017 11:25:43 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Aralikatte",
"Rahul",
""
],
[
"Srinivasaraghavan",
"G",
""
]
] |
new_dataset
| 0.997054 |
1701.02292
|
Ian Blake
|
Ian Blake and Shu Lin
|
On short cycle enumeration in biregular bipartite graphs
|
One of the results has been shown invalid via counterexample
| null | null | null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A number of recent works have used a variety of combinatorial constructions
to derive Tanner graphs for LDPC codes and some of these have been shown to
perform well in terms of their probability of error curves and error floors.
Such graphs are bipartite and many of these constructions yield biregular
graphs where the degree of left vertices is a constant $c+1$ and that of the
right vertices is a constant $d+1$. Such graphs are termed $(c+1,d+1)$
biregular bipartite graphs here. One property of interest in such work is the
girth of the graph and the number of short cycles in the graph, cycles of
length either the girth or slightly larger. Such numbers have been shown to be
related to the error floor of the probability of error curve of the related
LDPC code. Using known results of graph theory, it is shown how the girth and
the number of cycles of length equal to the girth may be computed for these
$(c+1,d+1)$ biregular bipartite graphs knowing only the parameters $c$ and $d$
and the numbers of left and right vertices. While numerous algorithms to
determine the number of short cycles in arbitrary graphs exist, the reduction
of the problem from an algorithm to a computation for these biregular bipartite
graphs is of interest.
|
[
{
"version": "v1",
"created": "Mon, 9 Jan 2017 18:29:36 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Aug 2017 18:04:32 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Blake",
"Ian",
""
],
[
"Lin",
"Shu",
""
]
] |
new_dataset
| 0.999603 |
1701.06610
|
Bari\c{s} Nakibo\u{g}lu
|
Bar{\i}\c{s} Nakibo\u{g}lu
|
The Augustin Center and The Sphere Packing Bound For Memoryless Channels
|
Accepted to ISIT 2017
| null |
10.1109/ISIT.2017.8006759
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For any channel with a convex constraint set and finite Augustin capacity,
existence of a unique Augustin center and associated Erven-Harremoes bound are
established. Augustin-Legendre capacity, center, and radius are introduced and
proved to be equal to the corresponding Renyi-Gallager entities. Sphere packing
bounds with polynomial prefactors are derived for codes on two families of
channels: (possibly non-stationary) memoryless channels with multiple additive
cost constraints and stationary memoryless channels with convex constraints on
the empirical distribution of the input codewords.
|
[
{
"version": "v1",
"created": "Mon, 23 Jan 2017 20:02:58 GMT"
},
{
"version": "v2",
"created": "Thu, 4 May 2017 21:18:49 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Nakiboğlu",
"Barış",
""
]
] |
new_dataset
| 0.98331 |
1701.07089
|
Saikat Guha
|
Oliver Johnson, Saikat Guha
|
A de Bruijn identity for discrete random variables
|
9 pages, shorter version submitted to ISIT 2017
|
Proceedings of the International Symposium on Information Theory,
2017, p898-902
|
10.1109/ISIT.2017.8006658
| null |
cs.IT math.IT math.PR quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss properties of the "beamsplitter addition" operation, which
provides a non-standard scaled convolution of random variables supported on the
non-negative integers. We give a simple expression for the action of
beamsplitter addition using generating functions. We use this to give a
self-contained and purely classical proof of a heat equation and de Bruijn
identity, satisfied when one of the variables is geometric.
|
[
{
"version": "v1",
"created": "Mon, 23 Jan 2017 15:11:01 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Johnson",
"Oliver",
""
],
[
"Guha",
"Saikat",
""
]
] |
new_dataset
| 0.964892 |
1703.04115
|
Oliver Obst
|
Olivia Michael and Oliver Obst
|
BetaRun Soccer Simulation League Team: Variety, Complexity, and Learning
|
A sketch for a new team for RoboCup 2D simulation league, currently
planned for 2018
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
RoboCup offers a set of benchmark problems for Artificial Intelligence in
form of official world championships since 1997. The most tactical advanced and
richest in terms of behavioural complexity of these is the 2D Soccer Simulation
League, a simulated robotic soccer competition. BetaRun is a new attempt
combining both machine learning and manual programming approaches, with the
ultimate goal to arrive at a team that is trained entirely from observing and
playing games, and a new development based on agent2D.
|
[
{
"version": "v1",
"created": "Sun, 12 Mar 2017 13:17:08 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Aug 2017 07:15:22 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Michael",
"Olivia",
""
],
[
"Obst",
"Oliver",
""
]
] |
new_dataset
| 0.999495 |
1703.08408
|
Cyril Nguyen Van Phu
|
Cyril Nguyen Van Phu, Nadir Farhi, Habib Haj-Salem, Jean-Patrick
Lebacque
|
A vehicle-to-infrastructure communication based algorithm for urban
traffic control
|
6 pages
| null |
10.1109/MTITS.2017.8005594
| null |
cs.SY cs.NI math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present in this paper a new algorithm for urban traffic light control with
mixed traffic (communicating and non communicating vehicles) and mixed
infrastructure (equipped and unequipped junctions). We call equipped junction
here a junction with a traffic light signal (TLS) controlled by a road side
unit (RSU). On such a junction, the RSU manifests its connectedness to equipped
vehicles by broadcasting its communication address and geographical
coordinates. The RSU builds a map of connected vehicles approaching and leaving
the junction. The algorithm allows the RSU to select a traffic phase, based on
the built map. The selected traffic phase is applied by the TLS; and both
equipped and unequipped vehicles must respect it. The traffic management is in
feedback on the traffic demand of communicating vehicles. We simulated the
vehicular traffic as well as the communications. The two simulations are
combined in a closed loop with visualization and monitoring interfaces. Several
indicators on vehicular traffic (mean travel time, ended vehicles) and IEEE
802.11p communication performances (end-to-end delay, throughput) are derived
and illustrated in three dimension maps. We then extended the traffic control
to a urban road network where we also varied the number of equipped junctions.
Other indicators are shown for road traffic performances in the road network
case, where high gains are experienced in the simulation results.
|
[
{
"version": "v1",
"created": "Fri, 24 Mar 2017 13:45:27 GMT"
},
{
"version": "v2",
"created": "Mon, 29 May 2017 15:27:45 GMT"
},
{
"version": "v3",
"created": "Mon, 3 Jul 2017 12:50:34 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Van Phu",
"Cyril Nguyen",
""
],
[
"Farhi",
"Nadir",
""
],
[
"Haj-Salem",
"Habib",
""
],
[
"Lebacque",
"Jean-Patrick",
""
]
] |
new_dataset
| 0.99966 |
1705.01861
|
Vicky Kalogeiton
|
Vicky Kalogeiton, Philippe Weinzaepfel, Vittorio Ferrari, Cordelia
Schmid
|
Action Tubelet Detector for Spatio-Temporal Action Localization
|
9 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current state-of-the-art approaches for spatio-temporal action localization
rely on detections at the frame level that are then linked or tracked across
time. In this paper, we leverage the temporal continuity of videos instead of
operating at the frame level. We propose the ACtion Tubelet detector
(ACT-detector) that takes as input a sequence of frames and outputs tubelets,
i.e., sequences of bounding boxes with associated scores. The same way
state-of-the-art object detectors rely on anchor boxes, our ACT-detector is
based on anchor cuboids. We build upon the SSD framework. Convolutional
features are extracted for each frame, while scores and regressions are based
on the temporal stacking of these features, thus exploiting information from a
sequence. Our experimental results show that leveraging sequences of frames
significantly improves detection performance over using individual frames. The
gain of our tubelet detector can be explained by both more accurate scores and
more precise localization. Our ACT-detector outperforms the state-of-the-art
methods for frame-mAP and video-mAP on the J-HMDB and UCF-101 datasets, in
particular at high overlap thresholds.
|
[
{
"version": "v1",
"created": "Thu, 4 May 2017 14:41:56 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Jul 2017 21:02:35 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Aug 2017 13:54:34 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Kalogeiton",
"Vicky",
""
],
[
"Weinzaepfel",
"Philippe",
""
],
[
"Ferrari",
"Vittorio",
""
],
[
"Schmid",
"Cordelia",
""
]
] |
new_dataset
| 0.997661 |
1706.05101
|
Zahra Hajibabaei Najafabadi
|
Zahra Hajibabaei, Jalil Modares, Azadeh Vosoughi
|
On M-ary Distributed Detection for Power Constraint Wireless Sensor
Networks
|
arXiv admin note: text overlap with arXiv:cs/0703046 by other authors
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a wireless sensor network (WSN), consisting of several sensors
and a fusion center (FC), which is tasked with solving an M-ary hypothesis
testing problem. Sensors make M-ary decisions and transmit their digitally
modulated decisions over orthogonal channels, which are subject to Rayleigh
fading and noise, to the FC. Adopting Bayesian optimality criterion, we
consider training and non-training based distributed detection systems and
investigate the effect of imperfect channel state information (CSI) on the
optimal maximum a posteriori probability (MAP) fusion rules and optimal power
allocation between sensors, when the sum of training and data symbol transmit
powers is fixed. We consider J-divergence criteria to do power allocation
between sensors. The theoretical results show that J-divergence for coherent
reception will be maximized if total training power be half of total power,
however for non coherent reception, optimal training power which maximize
J-divergence is zero. The simulated results also show that probability of error
will be minimized if training power be half of total power for coherent
reception and zero for non coherent reception.
|
[
{
"version": "v1",
"created": "Thu, 15 Jun 2017 21:43:19 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Aug 2017 17:55:29 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Hajibabaei",
"Zahra",
""
],
[
"Modares",
"Jalil",
""
],
[
"Vosoughi",
"Azadeh",
""
]
] |
new_dataset
| 0.986177 |
1708.05517
|
Maram Hasanain
|
Maram Hasanain, Reem Suwaileh, Tamer Elsayed, Mucahid Kutlu and Hind
Almerekhi
|
EveTAR: Building a Large-Scale Multi-Task Test Collection over Arabic
Tweets
| null | null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article introduces a new language-independent approach for creating a
large-scale high-quality test collection of tweets that supports multiple
information retrieval (IR) tasks without running a shared-task campaign. The
adopted approach (demonstrated over Arabic tweets) designs the collection
around significant (i.e., popular) events, which enables the development of
topics that represent frequent information needs of Twitter users for which
rich content exists. That inherently facilitates the support of multiple tasks
that generally revolve around events, namely event detection, ad-hoc search,
timeline generation, and real-time summarization. The key highlights of the
approach include diversifying the judgment pool via interactive search and
multiple manually-crafted queries per topic, collecting high-quality
annotations via crowd-workers for relevancy and in-house annotators for
novelty, filtering out low-agreement topics and inaccessible tweets, and
providing multiple subsets of the collection for better availability. Applying
our methodology on Arabic tweets resulted in EveTAR , the first
freely-available tweet test collection for multiple IR tasks. EveTAR includes a
crawl of 355M Arabic tweets and covers 50 significant events for which about
62K tweets were judged with substantial average inter-annotator agreement
(Kappa value of 0.71). We demonstrate the usability of EveTAR by evaluating
existing algorithms in the respective tasks. Results indicate that the new
collection can support reliable ranking of IR systems that is comparable to
similar TREC collections, while providing strong baseline results for future
studies over Arabic tweets.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2017 06:12:40 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Aug 2017 10:13:15 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Hasanain",
"Maram",
""
],
[
"Suwaileh",
"Reem",
""
],
[
"Elsayed",
"Tamer",
""
],
[
"Kutlu",
"Mucahid",
""
],
[
"Almerekhi",
"Hind",
""
]
] |
new_dataset
| 0.999674 |
1708.05763
|
Richard Futrell
|
Richard Futrell, Edward Gibson, Hal Tily, Idan Blank, Anastasia
Vishnevetsky, Steven T. Piantadosi, Evelina Fedorenko
|
The Natural Stories Corpus
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is now a common practice to compare models of human language processing by
predicting participant reactions (such as reading times) to corpora consisting
of rich naturalistic linguistic materials. However, many of the corpora used in
these studies are based on naturalistic text and thus do not contain many of
the low-frequency syntactic constructions that are often required to
distinguish processing theories. Here we describe a new corpus consisting of
English texts edited to contain many low-frequency syntactic constructions
while still sounding fluent to native speakers. The corpus is annotated with
hand-corrected parse trees and includes self-paced reading time data. Here we
give an overview of the content of the corpus and release the data.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2017 21:27:34 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Futrell",
"Richard",
""
],
[
"Gibson",
"Edward",
""
],
[
"Tily",
"Hal",
""
],
[
"Blank",
"Idan",
""
],
[
"Vishnevetsky",
"Anastasia",
""
],
[
"Piantadosi",
"Steven T.",
""
],
[
"Fedorenko",
"Evelina",
""
]
] |
new_dataset
| 0.980444 |
1708.05790
|
Corren McCoy
|
Corren G. McCoy, Michael L. Nelson, Michele C. Weigle
|
University Twitter Engagement: Using Twitter Followers to Rank
Universities
|
14 pages, 4 figures
| null | null | null |
cs.DL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We examine and rank a set of 264 U.S. universities extracted from the
National Collegiate Athletic Association (NCAA) Division I membership and
global lists published in U.S. News, Times Higher Education, Academic Ranking
of World Universities, and Money Magazine. Our University Twitter Engagement
(UTE) rank is based on the friend and extended follower network of primary and
affiliated secondary Twitter accounts referenced on a university's home page.
In rank-to-rank comparisons we observed a significant, positive rank
correlation ({\tau}=0.6018) between UTE and an aggregate reputation ranking
which indicates that UTE could be a viable proxy for ranking atypical
institutions normally excluded from traditional lists. In addition, we
significantly reduce the cost of data collection needed to rank each
institution by using only web-based artifacts and a publicly accessible Twitter
application programming interface (API).
|
[
{
"version": "v1",
"created": "Sat, 19 Aug 2017 01:33:28 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"McCoy",
"Corren G.",
""
],
[
"Nelson",
"Michael L.",
""
],
[
"Weigle",
"Michele C.",
""
]
] |
new_dataset
| 0.98328 |
1708.05805
|
Poorna Talkad Sukumar
|
Poorna Talkad Sukumar and Ronald Metoyer
|
Design Space of Programming Tools on Mobile Touchscreen Devices
|
11 pages, includes one-page table
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While mobile touchscreen devices are ubiquitous and present opportunities for
novel applications, they have seen little adoption as tools for computer
programming. In this literature survey, we bring together the diverse research
work on programming-related tasks supported by mobile touchscreen devices to
explore the design space for applying them to programming situations. We used
the Grounded theory approach to identify themes and classify previous work. We
present these themes and how each paper contributes to the theme, and we
outline the remaining challenges in and opportunities for using mobile
touchscreen devices in programming applications.
|
[
{
"version": "v1",
"created": "Sat, 19 Aug 2017 05:04:05 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Sukumar",
"Poorna Talkad",
""
],
[
"Metoyer",
"Ronald",
""
]
] |
new_dataset
| 0.997689 |
1708.05947
|
Peter Larsson
|
Peter Larsson
|
Golden Angle Modulation
|
4 pages, 4 figures. Submitted for possible publication in wireless
communication letters. Extract from draft PhD thesis chapter
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quadrature amplitude modulation (QAM) exhibits a shaping-loss of $\pi
\mathrm{e}/6$, ($\approx1.53$ dB) compared to the AWGN Shannon capacity. With
inspiration gained from special (leaf, flower petal, and seed) packing
arrangements (spiral phyllotaxis) found among plants, a novel, shape-versatile,
circular symmetric, modulation scheme, the Golden Angle Modulation (GAM) is
introduced. Disc-shaped, and complex Gaussian approximating bell-shaped,
GAM-signal constellations are considered. For bell-GAM, a high-rate
approximation, and a mutual information optimization formulation, are
developed. Bell-GAM overcomes the asymptotic shaping-loss seen in QAM, and
offers Shannon capacity approaching performance. Transmitter resource limited
links, such as space probe-to-earth, and mobile-to-basestation, are cases where
GAM could be particularly valuable.
|
[
{
"version": "v1",
"created": "Sun, 20 Aug 2017 10:19:30 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Larsson",
"Peter",
""
]
] |
new_dataset
| 0.99935 |
1708.06063
|
Matias Korman
|
Jean Cardinal and Hiro Ito and Matias Korman and Stefan Langerman
|
Helly Numbers of Polyominoes
|
This paper was published in Graphs and Combinatorics, September 2013,
Volume 29, Issue 5, pp 1221-1234
| null |
10.1007/s00373-012-1203-x
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define the Helly number of a polyomino $P$ as the smallest number $h$ such
that the $h$-Helly property holds for the family of symmetric and translated
copies of $P$ on the integer grid. We prove the following: (i) the only
polyominoes with Helly number 2 are the rectangles, (ii) there does not exist
any polyomino with Helly number 3, (iii) there exist polyominoes of Helly
number $k$ for any $k\neq 1,3$.
|
[
{
"version": "v1",
"created": "Mon, 21 Aug 2017 02:28:10 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Cardinal",
"Jean",
""
],
[
"Ito",
"Hiro",
""
],
[
"Korman",
"Matias",
""
],
[
"Langerman",
"Stefan",
""
]
] |
new_dataset
| 0.959791 |
1708.06126
|
Albert Berenguel
|
Albert Berenguel, Oriol Ramos Terrades, Josep Llad\'os, Cristina
Ca\~nero
|
e-Counterfeit: a mobile-server platform for document counterfeit
detection
|
6 pages, 5 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a novel application to detect counterfeit identity
documents forged by a scan-printing operation. Texture analysis approaches are
proposed to extract validation features from security background that is
usually printed in documents as IDs or banknotes. The main contribution of this
work is the end-to-end mobile-server architecture, which provides a service for
non-expert users and therefore can be used in several scenarios. The system
also provides a crowdsourcing mode so labeled images can be gathered,
generating databases for incremental training of the algorithms.
|
[
{
"version": "v1",
"created": "Mon, 21 Aug 2017 09:24:46 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Berenguel",
"Albert",
""
],
[
"Terrades",
"Oriol Ramos",
""
],
[
"Lladós",
"Josep",
""
],
[
"Cañero",
"Cristina",
""
]
] |
new_dataset
| 0.996374 |
1708.06226
|
EPTCS
|
Erzs\'ebet Csuhaj-Varj\'u, P\'al D\"om\"osi, Gy\"orgy Vaszil
|
Proceedings 15th International Conference on Automata and Formal
Languages
| null |
EPTCS 252, 2017
|
10.4204/EPTCS.252
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The 15th International Conference on Automata and Formal Languages (AFL 2017)
was held in Debrecen, Hungary, from September 4 to 6, 2017. The conference was
organized by the Faculty of Informatics of the University of Debrecen and the
Faculty of Informatics of the E\"otv\"os Lor\'and University of Budapest.
Topics of interest covered all aspects of automata and formal languages,
including theory and applications.
|
[
{
"version": "v1",
"created": "Mon, 21 Aug 2017 13:55:30 GMT"
}
] | 2017-08-22T00:00:00 |
[
[
"Csuhaj-Varjú",
"Erzsébet",
""
],
[
"Dömösi",
"Pál",
""
],
[
"Vaszil",
"György",
""
]
] |
new_dataset
| 0.997217 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.