id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1707.07756
Yuanjie Li
Wenguang Huang, Chang Zhou and Yuanjie Li
cniCloud: Querying the Cellular Network Information at Scale
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents cniCloud, a cloud-based platform for mobile devices to share and query the fine-grained cellular information at scale. cniCloud extends the single-device cellular analytics via crowdsourcing: It collects the fine-grained cellular network data from massive mobile devices, aggregates them in a cloud-based database, and provides interfaces for end users to run an SQL-like query over the cellular data. It offers efficient and responsive processing by optimizing the database storage and adopting the domain-specific optimizations. Our preliminary deployments and experiments validate its feasibility in performing crowdsourced analytics.
[ { "version": "v1", "created": "Mon, 24 Jul 2017 21:44:23 GMT" } ]
2017-07-26T00:00:00
[ [ "Huang", "Wenguang", "" ], [ "Zhou", "Chang", "" ], [ "Li", "Yuanjie", "" ] ]
new_dataset
0.999612
1707.07759
Mehdi Naderi Soorki
Mehdi Naderi Soorki, Walid Saad, Mohammad Hossein Manshaei, and Hossein Saidi
Stochastic Coalitional Games for Cooperative Random Access in M2M Communications
null
null
null
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the problem of random access contention between machine type devices (MTDs) in the uplink of a wireless cellular network is studied. In particular, the possibility of forming cooperative groups to coordinate the MTDs' requests for the random access channel (RACH) is analyzed. The problem is formulated as a stochastic coalition formation game in which the MTDs are the players that seek to form cooperative coalitions to optimize a utility function that captures each MTD's energy consumption and time-varying queue length. Within each coalition, an MTD acts as a coalition head that sends the access requests of the coalition members over the RACH. One key feature of this game is its ability to cope with stochastic environments in which the arrival requests of MTDs and the packet success rate over RACH are dynamically time-varying. The proposed stochastic coalitional is composed of multiple stages, each of which corresponds to a coalitional game in stochastic characteristic form that is played by the MTDs at each time step. To solve this game, a novel distributed coalition formation algorithm is proposed and shown to converge to a stable MTD partition. Simulation results show that, on the average, the proposed stochastic coalition formation algorithm can reduce the average fail ratio and energy consumption of up to 36% and 31% for a cluster-based distribution of MTDs, respectively, compared with a noncooperative case. Moreover, when the MTDs are more sensitive to the energy consumption (queue length), the coalitions' size will increase (decrease).
[ { "version": "v1", "created": "Mon, 24 Jul 2017 21:54:43 GMT" } ]
2017-07-26T00:00:00
[ [ "Soorki", "Mehdi Naderi", "" ], [ "Saad", "Walid", "" ], [ "Manshaei", "Mohammad Hossein", "" ], [ "Saidi", "Hossein", "" ] ]
new_dataset
0.962293
1707.07825
Arun Mukundan
Arun Mukundan, Giorgos Tolias, Ondrej Chum
Multiple-Kernel Local-Patch Descriptor
To appear in the British Machine Vision Conference (BMVC), September 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a multiple-kernel local-patch descriptor based on efficient match kernels of patch gradients. It combines two parametrizations of gradient position and direction, each parametrization provides robustness to a different type of patch miss-registration: polar parametrization for noise in the patch dominant orientation detection, Cartesian for imprecise location of the feature point. Even though handcrafted, the proposed method consistently outperforms the state-of-the-art methods on two local patch benchmarks.
[ { "version": "v1", "created": "Tue, 25 Jul 2017 06:15:41 GMT" } ]
2017-07-26T00:00:00
[ [ "Mukundan", "Arun", "" ], [ "Tolias", "Giorgos", "" ], [ "Chum", "Ondrej", "" ] ]
new_dataset
0.999423
1707.07866
Ilya Grishchenko
Stefano Calzavara, Ilya Grishchenko and Matteo Maffei
HornDroid: Practical and Sound Static Analysis of Android Applications by SMT Solving
In Proceedings of 1st IEEE European Symposium on Security and Privacy (IEEE EuroS&P 2016)
null
10.1109/EuroSP&.P20.196.16
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present HornDroid, a new tool for the static analysis of information flow properties in Android applications. The core idea underlying HornDroid is to use Horn clauses for soundly abstracting the semantics of Android applications and to express security properties as a set of proof obligations that are automatically discharged by an off-the-shelf SMT solver. This approach makes it possible to fine-tune the analysis in order to achieve a high degree of precision while still using off-the-shelf verification tools, thereby leveraging the recent advances in this field. As a matter of fact, HornDroid outperforms state-of-the-art Android static analysis tools on benchmarks proposed by the community. Moreover, HornDroid is the first static analysis tool for Android to come with a formal proof of soundness, which covers the core of the analysis technique: besides yielding correctness assurances, this proof allowed us to identify some critical corner-cases that affect the soundness guarantees provided by some of the previous static analysis tools for Android.
[ { "version": "v1", "created": "Tue, 25 Jul 2017 09:28:20 GMT" } ]
2017-07-26T00:00:00
[ [ "Calzavara", "Stefano", "" ], [ "Grishchenko", "Ilya", "" ], [ "Maffei", "Matteo", "" ] ]
new_dataset
0.985206
1707.08084
Radu Tudor Ionescu
Andrei M. Butnaru, Radu Tudor Ionescu, Florentina Hristea
ShotgunWSD: An unsupervised algorithm for global word sense disambiguation inspired by DNA sequencing
In Proceedings of EACL 2017
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a novel unsupervised algorithm for word sense disambiguation (WSD) at the document level. Our algorithm is inspired by a widely-used approach in the field of genetics for whole genome sequencing, known as the Shotgun sequencing technique. The proposed WSD algorithm is based on three main steps. First, a brute-force WSD algorithm is applied to short context windows (up to 10 words) selected from the document in order to generate a short list of likely sense configurations for each window. In the second step, these local sense configurations are assembled into longer composite configurations based on suffix and prefix matching. The resulted configurations are ranked by their length, and the sense of each word is chosen based on a voting scheme that considers only the top k configurations in which the word appears. We compare our algorithm with other state-of-the-art unsupervised WSD algorithms and demonstrate better performance, sometimes by a very large margin. We also show that our algorithm can yield better performance than the Most Common Sense (MCS) baseline on one data set. Moreover, our algorithm has a very small number of parameters, is robust to parameter tuning, and, unlike other bio-inspired methods, it gives a deterministic solution (it does not involve random choices).
[ { "version": "v1", "created": "Tue, 25 Jul 2017 16:56:53 GMT" } ]
2017-07-26T00:00:00
[ [ "Butnaru", "Andrei M.", "" ], [ "Ionescu", "Radu Tudor", "" ], [ "Hristea", "Florentina", "" ] ]
new_dataset
0.998589
1310.3793
Hye Won Chung
Hye Won Chung, Saikat Guha and Lizhong Zheng
Superadditivity of Quantum Channel Coding Rate with Finite Blocklength Joint Measurements
To appear in IEEE Transactions on Information Theory
IEEE Transactions on Information Theory ( Volume: 62, Issue: 10, Oct. 2016 )
10.1109/TIT.2016.2597285
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The maximum rate at which classical information can be reliably transmitted per use of a quantum channel strictly increases in general with $N$, the number of channel outputs that are detected jointly by the quantum joint-detection receiver (JDR). This phenomenon is known as superadditivity of the maximum achievable information rate over a quantum channel. We study this phenomenon for a pure-state classical-quantum (cq) channel and provide a lower bound on $C_N/N$, the maximum information rate when the JDR is restricted to making joint measurements over no more than $N$ quantum channel outputs, while allowing arbitrary classical error correction. We also show the appearance of a superadditivity phenomenon---of mathematical resemblance to the aforesaid problem---in the channel capacity of a classical discrete memoryless channel (DMC) when a concatenated coding scheme is employed, and the inner decoder is forced to make hard decisions on $N$-length inner codewords. Using this correspondence, we develop a unifying framework for the above two notions of superadditivity, and show that for our lower bound to $C_N/N$ to be equal to a given fraction of the asymptotic capacity $C$ of the respective channel, $N$ must be proportional to $V/C^2$, where $V$ is the respective channel dispersion quantity.
[ { "version": "v1", "created": "Mon, 14 Oct 2013 19:06:02 GMT" }, { "version": "v2", "created": "Mon, 1 Jun 2015 22:06:46 GMT" }, { "version": "v3", "created": "Sun, 31 Jul 2016 04:47:17 GMT" } ]
2017-07-25T00:00:00
[ [ "Chung", "Hye Won", "" ], [ "Guha", "Saikat", "" ], [ "Zheng", "Lizhong", "" ] ]
new_dataset
0.984438
1605.04063
Ziling Heng
Ziling Heng and Qin Yue
A construction of $q$-ary linear codes with two weights
19 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear codes with a few weights are very important in coding theory and have attracted a lot of attention. In this paper, we present a construction of $q$-ary linear codes from trace and norm functions over finite fields. The weight distributions of the linear codes are determined in some cases based on Gauss sums. It is interesting that our construction can produce optimal or almost optimal codes. Furthermore, we show that our codes can be used to construct secret sharing schemes with interesting access structures and strongly regular graphs with new parameters.
[ { "version": "v1", "created": "Fri, 13 May 2016 06:41:42 GMT" }, { "version": "v2", "created": "Mon, 24 Jul 2017 02:11:50 GMT" } ]
2017-07-25T00:00:00
[ [ "Heng", "Ziling", "" ], [ "Yue", "Qin", "" ] ]
new_dataset
0.978202
1610.07701
Martin Milani\v{c}
Endre Boros, Vladimir Gurvich, Martin Milani\v{c}, Vladimir Oudalov, Jernej Vi\v{c}i\v{c}
A three-person deterministic graphical game without Nash equilibria
23 pages, 6 captioned and 15 uncaptioned figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an example of a three-person deterministic graphical game that has no Nash equilibrium in pure stationary strategies. The game has seven positions, four outcomes (a unique cycle and three terminal positions), and its normal form is of size 2 x 2 x 4 only. Thus, our example strengthens significantly the one obtained in 2014 by Gurvich and Oudalov; the latter has four players, five terminals, and a 2 x 4 x 6 x 8 normal form. Furthermore, our example is minimal with respect to the number of players. Both examples are tight but not Nash-solvable. Such examples were known since 1975, but they were not related to deterministic graphical games. Moreover, due to the small size of our example, we can strengthen it further by showing that it has no Nash equilibrium not only in pure but also in independently mixed strategies, for both Markovian and a priori evaluations.
[ { "version": "v1", "created": "Tue, 25 Oct 2016 01:33:07 GMT" }, { "version": "v2", "created": "Sun, 23 Jul 2017 20:53:06 GMT" } ]
2017-07-25T00:00:00
[ [ "Boros", "Endre", "" ], [ "Gurvich", "Vladimir", "" ], [ "Milanič", "Martin", "" ], [ "Oudalov", "Vladimir", "" ], [ "Vičič", "Jernej", "" ] ]
new_dataset
0.994751
1612.06371
Gunnar Sigurdsson
Gunnar A. Sigurdsson and Santosh Divvala and Ali Farhadi and Abhinav Gupta
Asynchronous Temporal Fields for Action Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Actions are more than just movements and trajectories: we cook to eat and we hold a cup to drink from it. A thorough understanding of videos requires going beyond appearance modeling and necessitates reasoning about the sequence of activities, as well as the higher-level constructs such as intentions. But how do we model and reason about these? We propose a fully-connected temporal CRF model for reasoning over various aspects of activities that includes objects, actions, and intentions, where the potentials are predicted by a deep network. End-to-end training of such structured models is a challenging endeavor: For inference and learning we need to construct mini-batches consisting of whole videos, leading to mini-batches with only a few videos. This causes high-correlation between data points leading to breakdown of the backprop algorithm. To address this challenge, we present an asynchronous variational inference method that allows efficient end-to-end training. Our method achieves a classification mAP of 22.4% on the Charades benchmark, outperforming the state-of-the-art (17.2% mAP), and offers equal gains on the task of temporal localization.
[ { "version": "v1", "created": "Mon, 19 Dec 2016 20:56:40 GMT" }, { "version": "v2", "created": "Mon, 24 Jul 2017 09:58:14 GMT" } ]
2017-07-25T00:00:00
[ [ "Sigurdsson", "Gunnar A.", "" ], [ "Divvala", "Santosh", "" ], [ "Farhadi", "Ali", "" ], [ "Gupta", "Abhinav", "" ] ]
new_dataset
0.955001
1705.04371
Mogens Graf Plessen
Mogens Graf Plessen
Trajectory Planning of Automated Vehicles in Tube-like Road Segments
- 8 pages, 7 figures, 1 table. - this is the extended version of the ITSC 2017 conference paper
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a method based on linear programming for trajectory planning of automated vehicles, combining obstacle avoidance, time scheduling for the reaching of waypoints and time-optimal traversal of tube-like road segments. System modeling is conducted entirely spatial-based. Kinematic vehicle dynamics as well as time are expressed in a road-aligned coordinate frame with path along the road centerline serving as the dependent variable. We elaborate on control rate constraints in the spatial domain. A vehicle dimension constraint heuristic is proposed to constrain vehicle dimensions inside road boundaries. It is outlined how friction constraints are accounted for. The discussion is extended to dynamic vehicle models. The benefits of the proposed method are illustrated by a comparison to a time-based method.
[ { "version": "v1", "created": "Thu, 11 May 2017 20:32:43 GMT" }, { "version": "v2", "created": "Mon, 24 Jul 2017 10:18:14 GMT" } ]
2017-07-25T00:00:00
[ [ "Plessen", "Mogens Graf", "" ] ]
new_dataset
0.954076
1705.09805
Rico Jonschkowski
Rico Jonschkowski, Roland Hafner, Jonathan Scholz, and Martin Riedmiller
PVEs: Position-Velocity Encoders for Unsupervised Learning of Structured State Representations
Accepted at Robotics: Science and Systems (RSS 2017) Workshop -- New Frontiers for Deep Learning in Robotics http://juxi.net/workshop/deep-learning-rss-2017/
null
null
null
cs.RO cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose position-velocity encoders (PVEs) which learn---without supervision---to encode images to positions and velocities of task-relevant objects. PVEs encode a single image into a low-dimensional position state and compute the velocity state from finite differences in position. In contrast to autoencoders, position-velocity encoders are not trained by image reconstruction, but by making the position-velocity representation consistent with priors about interacting with the physical world. We applied PVEs to several simulated control tasks from pixels and achieved promising preliminary results.
[ { "version": "v1", "created": "Sat, 27 May 2017 11:17:49 GMT" }, { "version": "v2", "created": "Mon, 19 Jun 2017 16:07:17 GMT" }, { "version": "v3", "created": "Mon, 24 Jul 2017 12:15:40 GMT" } ]
2017-07-25T00:00:00
[ [ "Jonschkowski", "Rico", "" ], [ "Hafner", "Roland", "" ], [ "Scholz", "Jonathan", "" ], [ "Riedmiller", "Martin", "" ] ]
new_dataset
0.982098
1707.01176
Varun Gangal
Varun Gangal, Harsh Jhamtani, Graham Neubig, Eduard Hovy, Eric Nyberg
CharManteau: Character Embedding Models For Portmanteau Creation
Accepted for publication in EMNLP 2017
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Portmanteaus are a word formation phenomenon where two words are combined to form a new word. We propose character-level neural sequence-to-sequence (S2S) methods for the task of portmanteau generation that are end-to-end-trainable, language independent, and do not explicitly use additional phonetic information. We propose a noisy-channel-style model, which allows for the incorporation of unsupervised word lists, improving performance over a standard source-to-target model. This model is made possible by an exhaustive candidate generation strategy specifically enabled by the features of the portmanteau task. Experiments find our approach superior to a state-of-the-art FST-based baseline with respect to ground truth accuracy and human evaluation.
[ { "version": "v1", "created": "Tue, 4 Jul 2017 23:11:52 GMT" }, { "version": "v2", "created": "Mon, 24 Jul 2017 16:27:55 GMT" } ]
2017-07-25T00:00:00
[ [ "Gangal", "Varun", "" ], [ "Jhamtani", "Harsh", "" ], [ "Neubig", "Graham", "" ], [ "Hovy", "Eduard", "" ], [ "Nyberg", "Eric", "" ] ]
new_dataset
0.999781
1707.02931
Mohamed Elawady
Mohamed Elawady, Christophe Ducottet, Olivier Alata, Cecile Barat, Philippe Colantoni
Wavelet-based Reflection Symmetry Detection via Textural and Color Histograms
Draft submission for ICCV 2017 Workshop (Detecting Symmetry in the Wild) [Paper track]
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Symmetry is one of the significant visual properties inside an image plane, to identify the geometrically balanced structures through real-world objects. Existing symmetry detection methods rely on descriptors of the local image features and their neighborhood behavior, resulting incomplete symmetrical axis candidates to discover the mirror similarities on a global scale. In this paper, we propose a new reflection symmetry detection scheme, based on a reliable edge-based feature extraction using Log-Gabor filters, plus an efficient voting scheme parameterized by their corresponding textural and color neighborhood information. Experimental evaluation on four single-case and three multiple-case symmetry detection datasets validates the superior achievement of the proposed work to find global symmetries inside an image.
[ { "version": "v1", "created": "Mon, 10 Jul 2017 16:32:43 GMT" }, { "version": "v2", "created": "Tue, 11 Jul 2017 05:31:27 GMT" }, { "version": "v3", "created": "Mon, 17 Jul 2017 11:57:21 GMT" }, { "version": "v4", "created": "Sat, 22 Jul 2017 02:05:16 GMT" } ]
2017-07-25T00:00:00
[ [ "Elawady", "Mohamed", "" ], [ "Ducottet", "Christophe", "" ], [ "Alata", "Olivier", "" ], [ "Barat", "Cecile", "" ], [ "Colantoni", "Philippe", "" ] ]
new_dataset
0.999114
1707.04294
Hadi Salman
Elif Ayvali, Hadi Salman, Howie Choset
Ergodic Coverage In Constrained Environments Using Stochastic Trajectory Optimization
Accepted, IROS 2017
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In search and surveillance applications in robotics, it is intuitive to spatially distribute robot trajectories with respect to the probability of locating targets in the domain. Ergodic coverage is one such approach to trajectory planning in which a robot is directed such that the percentage of time spent in a region is in proportion to the probability of locating targets in that region. In this work, we extend the ergodic coverage algorithm to robots operating in constrained environments and present a formulation that can capture sensor footprint and avoid obstacles and restricted areas in the domain. We demonstrate that our formulation easily extends to coordination of multiple robots equipped with different sensing capabilities to perform ergodic coverage of a domain.
[ { "version": "v1", "created": "Thu, 13 Jul 2017 20:07:24 GMT" }, { "version": "v2", "created": "Sat, 22 Jul 2017 17:32:34 GMT" } ]
2017-07-25T00:00:00
[ [ "Ayvali", "Elif", "" ], [ "Salman", "Hadi", "" ], [ "Choset", "Howie", "" ] ]
new_dataset
0.995153
1707.07020
Haythem Bany Salameh Dr
Esraa Al Jarrah, Haythem Bany Salameh, Ali Eyadeh
Adaptive Quorum-based Channel-hopping Distributed Coordination Scheme for Cognitive Radio Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose novel channel-hoppingbased distributed rendezvous algorithm based on grid-basedquorum techniques. The proposed algorithm increases the probability of rendezvous (RDV) within a single cycle by allowing CR nodes to meet more often according to intersection property of quorum systems (QSs). Our proposed algorithm is called Adaptive quorum-based channel-hopping distributed coordination scheme for cognitive radio networks. The main idea of our algorithm is to dynamically adjust the selected QS by CR users according to the varying traffic loads in the CRN. The proposed algorithm decreases the average time to rendezvous (TTR) and increase the probability of RDV. We evaluate the performance of our algorithm through simulations. The performance of our algorithm is compared with two different schemes. The results show that our algorithm can reduce TTR, increase the RDV, and decrease the energy consumption per successful RDV.
[ { "version": "v1", "created": "Fri, 21 Jul 2017 18:45:03 GMT" } ]
2017-07-25T00:00:00
[ [ "Jarrah", "Esraa Al", "" ], [ "Salameh", "Haythem Bany", "" ], [ "Eyadeh", "Ali", "" ] ]
new_dataset
0.964603
1707.07082
Yuanxin Wu
Yuanxin Wu and Ling Pei
Gyroscope Calibration via Magnetometer
7 pages
Volume 17, Issue 16, IEEE Sensors Journal, 2017
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Magnetometers, gyroscopes and accelerometers are commonly used sensors in a variety of applications. The paper proposes a novel gyroscope calibration method in the homogeneous magnetic field by the help of magnetometer. It is shown that, with sufficient rotation excitation, the homogeneous magnetic field vector can be exploited to serve as a good reference for calibrating low-cost gyroscopes. The calibration parameters include the gyroscope scale factor, non-orthogonal coefficient and bias for three axes, as well as its misalignment to the magnetometer frame. Simulation and field test results demonstrate the method's effectiveness.
[ { "version": "v1", "created": "Sat, 22 Jul 2017 01:35:11 GMT" } ]
2017-07-25T00:00:00
[ [ "Wu", "Yuanxin", "" ], [ "Pei", "Ling", "" ] ]
new_dataset
0.990418
1707.07102
Xuwang Yin
Xuwang Yin, Vicente Ordonez
OBJ2TEXT: Generating Visually Descriptive Language from Object Layouts
Accepted at EMNLP 2017
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generating captions for images is a task that has recently received considerable attention. In this work we focus on caption generation for abstract scenes, or object layouts where the only information provided is a set of objects and their locations. We propose OBJ2TEXT, a sequence-to-sequence model that encodes a set of objects and their locations as an input sequence using an LSTM network, and decodes this representation using an LSTM language model. We show that our model, despite encoding object layouts as a sequence, can represent spatial relationships between objects, and generate descriptions that are globally coherent and semantically relevant. We test our approach in a task of object-layout captioning by using only object annotations as inputs. We additionally show that our model, combined with a state-of-the-art object detector, improves an image captioning model from 0.863 to 0.950 (CIDEr score) in the test benchmark of the standard MS-COCO Captioning task.
[ { "version": "v1", "created": "Sat, 22 Jul 2017 04:17:42 GMT" } ]
2017-07-25T00:00:00
[ [ "Yin", "Xuwang", "" ], [ "Ordonez", "Vicente", "" ] ]
new_dataset
0.999786
1707.07188
Taras Iakymchuk
Juan Barrios-Avil\'es, Taras Iakymchuk, Jorge Samaniego, Alfredo Rosado-Mu\~noz
An Event-based Fast Movement Detection Algorithm for a Positioning Robot Using POWERLINK Communication
Videos of assembly and live system action: https://youtu.be/KjkawFHd9_0 https://youtu.be/5X8d1Gw2Eco https://youtu.be/Ou9ngd9pZng https://youtu.be/UUgifzsseHQ https://youtu.be/L7G84E7jcoY https://youtu.be/RVOU5G1V7Io https://youtu.be/bmXIbk8I5sk
null
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work develops a tracking system based on an event-based camera. A bioinspired filtering algorithm to reduce noise and transmitted data while keeping the main features at the scene is implemented in FPGA which also serves as a network node. POWERLINK IEEE 61158 industrial network is used to communicate the FPGA with a controller connected to a self-developed two axis servo-controlled robot. The FPGA includes the network protocol to integrate the event-based camera as any other existing network node. The inverse kinematics for the robot is included in the controller. In addition, another network node is used to control pneumatic valves blowing the ball at different speed and trajectories. To complete the system and provide a comparison, a traditional frame-based camera is also connected to the controller. The imaging data for the tracking system are obtained either from the event-based or frame-based camera. Results show that the robot can accurately follow the ball using fast image recognition, with the intrinsic advantages of the event-based system (size, price, power). This works shows how the development of new equipment and algorithms can be efficiently integrated in an industrial system, merging commercial industrial equipment with the new devices so that new technologies can rapidly enter into the industrial field.
[ { "version": "v1", "created": "Sat, 22 Jul 2017 16:20:37 GMT" } ]
2017-07-25T00:00:00
[ [ "Barrios-Avilés", "Juan", "" ], [ "Iakymchuk", "Taras", "" ], [ "Samaniego", "Jorge", "" ], [ "Rosado-Muñoz", "Alfredo", "" ] ]
new_dataset
0.994947
1707.07191
Ting-Hao Huang
Chieh-Yang Huang, Tristan Labetoulle, Ting-Hao Kenneth Huang, Yi-Pei Chen, Hung-Chen Chen, Vallari Srivastava, Lun-Wei Ku
MoodSwipe: A Soft Keyboard that Suggests Messages Based on User-Specified Emotions
6 pages (including references), EMNLP 2017 Demo paper
null
null
null
cs.CL cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present MoodSwipe, a soft keyboard that suggests text messages given the user-specified emotions utilizing the real dialog data. The aim of MoodSwipe is to create a convenient user interface to enjoy the technology of emotion classification and text suggestion, and at the same time to collect labeled data automatically for developing more advanced technologies. While users select the MoodSwipe keyboard, they can type as usual but sense the emotion conveyed by their text and receive suggestions for their message as a benefit. In MoodSwipe, the detected emotions serve as the medium for suggested texts, where viewing the latter is the incentive to correcting the former. We conduct several experiments to show the superiority of the emotion classification models trained on the dialog data, and further to verify good emotion cues are important context for text suggestion.
[ { "version": "v1", "created": "Sat, 22 Jul 2017 16:32:16 GMT" } ]
2017-07-25T00:00:00
[ [ "Huang", "Chieh-Yang", "" ], [ "Labetoulle", "Tristan", "" ], [ "Huang", "Ting-Hao Kenneth", "" ], [ "Chen", "Yi-Pei", "" ], [ "Chen", "Hung-Chen", "" ], [ "Srivastava", "Vallari", "" ], [ "Ku", "Lun-Wei", "" ] ]
new_dataset
0.999829
1707.07265
Sho Takase
Sho Takase, Naoaki Okazaki, Kentaro Inui
Composing Distributed Representations of Relational Patterns
Published as a conference paper at ACL 2016
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning distributed representations for relation instances is a central technique in downstream NLP applications. In order to address semantic modeling of relational patterns, this paper constructs a new dataset that provides multiple similarity ratings for every pair of relational patterns on the existing dataset. In addition, we conduct a comparative study of different encoders including additive composition, RNN, LSTM, and GRU for composing distributed representations of relational patterns. We also present Gated Additive Composition, which is an enhancement of additive composition with the gating mechanism. Experiments show that the new dataset does not only enable detailed analyses of the different encoders, but also provides a gauge to predict successes of distributed representations of relational patterns in the relation classification task.
[ { "version": "v1", "created": "Sun, 23 Jul 2017 08:12:59 GMT" } ]
2017-07-25T00:00:00
[ [ "Takase", "Sho", "" ], [ "Okazaki", "Naoaki", "" ], [ "Inui", "Kentaro", "" ] ]
new_dataset
0.97638
1707.07276
Kareem Darwish
Kareem Darwish, Dimitar Alexandrov, Preslav Nakov and Yelena Mejova
Seminar Users in the Arabic Twitter Sphere
to appear in SocInfo 2017
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the notion of "seminar users", who are social media users engaged in propaganda in support of a political entity. We develop a framework that can identify such users with 84.4% precision and 76.1% recall. While our dataset is from the Arab region, omitting language-specific features has only a minor impact on classification performance, and thus, our approach could work for detecting seminar users in other parts of the world and in other languages. We further explored a controversial political topic to observe the prevalence and potential potency of such users. In our case study, we found that 25% of the users engaged in the topic are in fact seminar users and their tweets make nearly a third of the on-topic tweets. Moreover, they are often successful in affecting mainstream discourse with coordinated hashtag campaigns.
[ { "version": "v1", "created": "Sun, 23 Jul 2017 10:18:38 GMT" } ]
2017-07-25T00:00:00
[ [ "Darwish", "Kareem", "" ], [ "Alexandrov", "Dimitar", "" ], [ "Nakov", "Preslav", "" ], [ "Mejova", "Yelena", "" ] ]
new_dataset
0.999326
1707.07278
Besnik Fetahu
Besnik Fetahu and Katja Markert and Avishek Anand
Fine Grained Citation Span for References in Wikipedia
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
\emph{Verifiability} is one of the core editing principles in Wikipedia, editors being encouraged to provide citations for the added content. For a Wikipedia article, determining the \emph{citation span} of a citation, i.e. what content is covered by a citation, is important as it helps decide for which content citations are still missing. We are the first to address the problem of determining the \emph{citation span} in Wikipedia articles. We approach this problem by classifying which textual fragments in an article are covered by a citation. We propose a sequence classification approach where for a paragraph and a citation, we determine the citation span at a fine-grained level. We provide a thorough experimental evaluation and compare our approach against baselines adopted from the scientific domain, where we show improvement for all evaluation metrics.
[ { "version": "v1", "created": "Sun, 23 Jul 2017 10:43:26 GMT" } ]
2017-07-25T00:00:00
[ [ "Fetahu", "Besnik", "" ], [ "Markert", "Katja", "" ], [ "Anand", "Avishek", "" ] ]
new_dataset
0.982658
1707.07328
Robin Jia
Robin Jia and Percy Liang
Adversarial Examples for Evaluating Reading Comprehension Systems
EMNLP 2017
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Standard accuracy metrics indicate that reading comprehension systems are making rapid progress, but the extent to which these systems truly understand language remains unclear. To reward systems with real language understanding abilities, we propose an adversarial evaluation scheme for the Stanford Question Answering Dataset (SQuAD). Our method tests whether systems can answer questions about paragraphs that contain adversarially inserted sentences, which are automatically generated to distract computer systems without changing the correct answer or misleading humans. In this adversarial setting, the accuracy of sixteen published models drops from an average of $75\%$ F1 score to $36\%$; when the adversary is allowed to add ungrammatical sequences of words, average accuracy on four models decreases further to $7\%$. We hope our insights will motivate the development of new models that understand language more precisely.
[ { "version": "v1", "created": "Sun, 23 Jul 2017 18:26:29 GMT" } ]
2017-07-25T00:00:00
[ [ "Jia", "Robin", "" ], [ "Liang", "Percy", "" ] ]
new_dataset
0.996016
1707.07394
Shin Fujieda
Shin Fujieda, Kohei Takayama and Toshiya Hachisuka
Wavelet Convolutional Neural Networks for Texture Classification
9 pages, 7 figures, 2 tables
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Texture classification is an important and challenging problem in many image processing applications. While convolutional neural networks (CNNs) achieved significant successes for image classification, texture classification remains a difficult problem since textures usually do not contain enough information regarding the shape of object. In image processing, texture classification has been traditionally studied well with spectral analyses which exploit repeated structures in many textures. Since CNNs process images as-is in the spatial domain whereas spectral analyses process images in the frequency domain, these models have different characteristics in terms of performance. We propose a novel CNN architecture, wavelet CNNs, which integrates a spectral analysis into CNNs. Our insight is that the pooling layer and the convolution layer can be viewed as a limited form of a spectral analysis. Based on this insight, we generalize both layers to perform a spectral analysis with wavelet transform. Wavelet CNNs allow us to utilize spectral information which is lost in conventional CNNs but useful in texture classification. The experiments demonstrate that our model achieves better accuracy in texture classification than existing models. We also show that our model has significantly fewer parameters than CNNs, making our model easier to train with less memory.
[ { "version": "v1", "created": "Mon, 24 Jul 2017 03:59:04 GMT" } ]
2017-07-25T00:00:00
[ [ "Fujieda", "Shin", "" ], [ "Takayama", "Kohei", "" ], [ "Hachisuka", "Toshiya", "" ] ]
new_dataset
0.995401
1707.07467
Angel Cuenca
A. Cuenca, J. Alcaina, J. Salt, V. Casanova, R. Piz\'a
A packet-based dual-rate PID control strategy for a slow-rate sensing Networked Control System
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a packet-based dual-rate control strategy to face time-varying network-induced delays, packet dropouts and packet disorder in a Networked Control System. Slow-rate sensing enables to achieve energy saving by reducing network load. In addition, choosing a slower sensing period than the longest round-trip time delay can avoid packet disorder. On the other hand, a slow-rate sensing usually degrades control performance in a conventional control framework. Therefore, including dual-rate control techniques can be useful to maintain the desired performance, since the controller is able to generate a fast-rate control signal from a slow-rate sensing signal. A dual-rate PID controller is used, which can be split into two parts: a slow-rate PI controller is located at the remote side (with no permanent communication to the plant) and a fast-rate PD controller, at the local side (close to the plant, sensor, and inside the actuator, which can offer a low computation power). In addition, at the remote side, where a powerful computation device is located, a prediction stage is included in order to generate the packet of future, estimated slow-rate control actions to be sent to the local side. At this side, these actions are converted to fast-rate ones and used when a packet does not arrive due to the network-induced delay or due to occurring dropouts. The control proposal is able to reach the nominal (no-dropout, no-delay) performance despite the existence of time-varying delays and packet dropouts. Via real-time control for a Cartesian robot, results clearly reveal the superiority of the control approach compared to a previous authors\' proposal, where the time-varying delays are faced by means of a gain scheduling control strategy.
[ { "version": "v1", "created": "Mon, 24 Jul 2017 10:24:11 GMT" } ]
2017-07-25T00:00:00
[ [ "Cuenca", "A.", "" ], [ "Alcaina", "J.", "" ], [ "Salt", "J.", "" ], [ "Casanova", "V.", "" ], [ "Pizá", "R.", "" ] ]
new_dataset
0.991074
1707.07478
Francesco Quaglia Prof.
Mauro Ianni, Alessandro Pellegrini, Francesco Quaglia
A Wait-free Multi-word Atomic (1,N) Register for Large-scale Data Sharing on Multi-core Machines
none
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a multi-word atomic (1,N) register for multi-core machines exploiting Read-Modify-Write (RMW) instructions to coordinate the writer and the readers in a wait-free manner. Our proposal, called Anonymous Readers Counting (ARC), enables large-scale data sharing by admitting up to $2^{32}-2$ concurrent readers on off-the-shelf 64-bits machines, as opposed to the most advanced RMW-based approach which is limited to 58 readers. Further, ARC avoids multiple copies of the register content when accessing it---this affects classical register's algorithms based on atomic read/write operations on single words. Thus it allows for higher scalability with respect to the register size. Moreover, ARC explicitly reduces improves performance via a proper limitation of RMW instructions in case of read operations, and by supporting constant time for read operations and amortized constant time for write operations. A proof of correctness of our register algorithm is also provided, together with experimental data for a comparison with literature proposals. Beyond assessing ARC on physical platforms, we carry out as well an experimentation on virtualized infrastructures, which shows the resilience of wait-free synchronization as provided by ARC with respect to CPU-steal times, proper of more modern paradigms such as cloud computing.
[ { "version": "v1", "created": "Mon, 24 Jul 2017 11:01:30 GMT" } ]
2017-07-25T00:00:00
[ [ "Ianni", "Mauro", "" ], [ "Pellegrini", "Alessandro", "" ], [ "Quaglia", "Francesco", "" ] ]
new_dataset
0.998709
1707.07594
J\'er\^ome Kunegis
Sebastian Schelter and J\'er\^ome Kunegis
'Dark Germany': Hidden Patterns of Participation in Online Far-Right Protests Against Refugee Housing
12 pages, Proc. Int. Conf. on Soc. Inform., 2017
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The political discourse in Western European countries such as Germany has recently seen a resurgence of the topic of refugees, fueled by an influx of refugees from various Middle Eastern and African countries. Even though the topic of refugees evidently plays a large role in online and offline politics of the affected countries, the fact that protests against refugees stem from the right-wight political spectrum has lead to corresponding media to be shared in a decentralized fashion, making an analysis of the underlying social and mediatic networks difficult. In order to contribute to the analysis of these processes, we present a quantitative study of the social media activities of a contemporary nationwide protest movement against local refugee housing in Germany, which organizes itself via dedicated Facebook pages per city. We analyse data from 136 such protest pages in 2015, containing more than 46,000 posts and more than one million interactions by more than 200,000 users. In order to learn about the patterns of communication and interaction among users of far-right social media sites and pages, we investigate the temporal characteristics of the social media activities of this protest movement, as well as the connectedness of the interactions of its participants. We find several activity metrics such as the number of posts issued, discussion volume about crime and housing costs, negative polarity in comments, and user engagement to peak in late 2015, coinciding with chancellor Angela Merkel's much criticized decision of September 2015 to temporarily admit the entry of Syrian refugees to Germany. Furthermore, our evidence suggests a low degree of direct connectedness of participants in this movement, (i.a., indicated by a lack of geographical collaboration patterns), yet we encounter a strong affiliation of the pages' user base with far-right political parties.
[ { "version": "v1", "created": "Mon, 24 Jul 2017 14:58:50 GMT" } ]
2017-07-25T00:00:00
[ [ "Schelter", "Sebastian", "" ], [ "Kunegis", "Jérôme", "" ] ]
new_dataset
0.995423
1609.09827
Vaneet Aggarwal
Vaneet Aggarwal, Yih-Farn R. Chen, Tian Lan and Yu Xiang
Sprout: A functional caching approach to minimize service latency in erasure-coded storage
16 pages
null
null
null
cs.DC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern distributed storage systems often use erasure codes to protect against disk and node failures to increase reliability, while trying to meet the latency requirements of the applications and clients. Storage systems may have caches at the proxy or client ends in order to reduce the latency. In this paper, we consider a novel caching framework with erasure code called functional caching. Functional Caching involves using erasure-coded chunks in the cache such that the code formed by the chunks in storage nodes and cache combined are maximal-distance-separable (MDS) erasure codes. Based on the arrival rates of different files, placement of file chunks on the servers, and service time distribution of storage servers, an optimal functional caching placement and the access probabilities of the file request from different disks are considered. The proposed algorithm gives significant latency improvement in both simulations and a prototyped solution in an open-source, cloud storage deployment.
[ { "version": "v1", "created": "Fri, 30 Sep 2016 17:31:21 GMT" }, { "version": "v2", "created": "Wed, 19 Jul 2017 14:59:35 GMT" }, { "version": "v3", "created": "Fri, 21 Jul 2017 03:44:17 GMT" } ]
2017-07-24T00:00:00
[ [ "Aggarwal", "Vaneet", "" ], [ "Chen", "Yih-Farn R.", "" ], [ "Lan", "Tian", "" ], [ "Xiang", "Yu", "" ] ]
new_dataset
0.958115
1707.06685
Dylan McDermott
Ohad Kammar and Dylan McDermott
A monadic solution to the Cartwright-Felleisen-Wadler conjecture
Talk proposal uploaded for archival purposes
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a programming language, can we give a monadic denotational semantics that is stable under language extension? Models containing only a single monad are not stable. Models based on type-and-effect systems, in which there is a monad for every set of operations in the language, are. Cartwright and Felleisen, and Wadler, conjectured such monadic semantics can be generated. We describe a new general method of constructing stable models from standard monadic models, based on factorizations of monad morphisms. We show that under certain conditions factorizations induce a monad for every set of operations, and explain why the conditions usually hold. We also describe preliminary work using fibrations for logical relations generated from these factorization systems for proving the correctness of the resulting model.
[ { "version": "v1", "created": "Thu, 20 Jul 2017 19:26:41 GMT" } ]
2017-07-24T00:00:00
[ [ "Kammar", "Ohad", "" ], [ "McDermott", "Dylan", "" ] ]
new_dataset
0.976838
1707.06776
Huda Chuangpishit
Huda Chuangpishit, Jurek Czyzowicz, Evangelos Kranakis, Danny Krizanc
Rendezvous on a Line by Location-Aware Robots Despite the Presence of Byzantine Faults
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A set of mobile robots is placed at points of an infinite line. The robots are equipped with GPS devices and they may communicate their positions on the line to a central authority. The collection contains an unknown subset of "spies", i.e., byzantine robots, which are indistinguishable from the non-faulty ones. The set of the non-faulty robots need to rendezvous in the shortest possible time in order to perform some task, while the byzantine robots may try to delay their rendezvous for as long as possible. The problem facing a central authority is to determine trajectories for all robots so as to minimize the time until the non-faulty robots have rendezvoused. The trajectories must be determined without knowledge of which robots are faulty. Our goal is to minimize the competitive ratio between the time required to achieve the first rendezvous of the non-faulty robots and the time required for such a rendezvous to occur under the assumption that the faulty robots are known at the start. We provide a bounded competitive ratio algorithm, where the central authority is informed only of the set of initial robot positions, without knowing which ones or how many of them are faulty. When an upper bound on the number of byzantine robots is known to the central authority, we provide algorithms with better competitive ratios. In some instances we are able to show these algorithms are optimal.
[ { "version": "v1", "created": "Fri, 21 Jul 2017 07:10:20 GMT" } ]
2017-07-24T00:00:00
[ [ "Chuangpishit", "Huda", "" ], [ "Czyzowicz", "Jurek", "" ], [ "Kranakis", "Evangelos", "" ], [ "Krizanc", "Danny", "" ] ]
new_dataset
0.999611
1707.06901
Manuel Eberl
Manuel Eberl, Johannes H\"olzl, Tobias Nipkow
A Verified Compiler for Probability Density Functions
Presented at ESOP 2015
null
10.1007/978-3-662-46669-8_4
null
cs.PL cs.LO math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bhat et al. developed an inductive compiler that computes density functions for probability spaces described by programs in a simple probabilistic functional language. In this work, we implement such a compiler for a modified version of this language within the theorem prover Isabelle and give a formal proof of its soundness w.r.t. the semantics of the source and target language. Together with Isabelle's code generation for inductive predicates, this yields a fully verified, executable density compiler. The proof is done in two steps, using a standard refinement approach: first, an abstract compiler working with abstract functions modelled directly in the theorem prover's logic is defined and proven sound. Then, this compiler is refined to a concrete version that returns a target-language expression.
[ { "version": "v1", "created": "Fri, 21 Jul 2017 14:00:35 GMT" } ]
2017-07-24T00:00:00
[ [ "Eberl", "Manuel", "" ], [ "Hölzl", "Johannes", "" ], [ "Nipkow", "Tobias", "" ] ]
new_dataset
0.997193
1707.06912
Piotr Gawlowicz
Piotr Gaw{\l}owicz and Anatolij Zubow and Adam Wolisz
LtFi: Cross-technology Communication for RRM between LTE-U and IEEE 802.11
null
null
null
TKN-17-0003
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cross-technology communication (CTC) was proposed in recent literature as a way to exploit the opportunities of collaboration between heterogeneous wireless technologies. This paper presents LtFi, a system which enables to set-up a CTC between nodes of co-located LTE-U and WiFi networks. LtFi follows a two-step approach: using the air-interface LTE-U BSs are broadcasting connection and identification data to adjacent WiFi nodes, which is used to create a bi-directional control channel over the wired Internet. This way LtFi enables the development of advanced cross-technology interference and radio resource management schemes between heterogeneous WiFi and LTE-U networks. LtFi is of low complexity and fully compliant with LTE-U technology and works on WiFi side with COTS hardware. It was prototypically implemented and evaluated. Experimental results reveal that LtFi is able to reliably decoded the data transmitted over the LtFi air-interface in a crowded wireless environment at even very low LTE-U receive power levels of -92dBm. Moreover, results from system-level simulations show that LtFi is able to accurately estimate the set of interfering LTE-U BSs in a typical LTE-U multi-cell environment.
[ { "version": "v1", "created": "Fri, 21 Jul 2017 14:20:26 GMT" } ]
2017-07-24T00:00:00
[ [ "Gawłowicz", "Piotr", "" ], [ "Zubow", "Anatolij", "" ], [ "Wolisz", "Adam", "" ] ]
new_dataset
0.99774
1703.02261
Fabrizio Montecchiani
Stephen G. Kobourov, Giuseppe Liotta, Fabrizio Montecchiani
An annotated bibliography on 1-planarity
null
null
10.1016/j.cosrev.2017.06.002
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of 1-planarity is among the most natural and most studied generalizations of graph planarity. A graph is 1-planar if it has an embedding where each edge is crossed by at most another edge. The study of 1-planar graphs dates back to more than fifty years ago and, recently, it has driven increasing attention in the areas of graph theory, graph algorithms, graph drawing, and computational geometry. This annotated bibliography aims to provide a guiding reference to researchers who want to have an overview of the large body of literature about 1-planar graphs. It reviews the current literature covering various research streams about 1-planarity, such as characterization and recognition, combinatorial properties, and geometric representations. As an additional contribution, we offer a list of open problems on 1-planar graphs.
[ { "version": "v1", "created": "Tue, 7 Mar 2017 08:02:33 GMT" }, { "version": "v2", "created": "Mon, 20 Mar 2017 08:48:17 GMT" }, { "version": "v3", "created": "Thu, 20 Jul 2017 10:22:41 GMT" } ]
2017-07-21T00:00:00
[ [ "Kobourov", "Stephen G.", "" ], [ "Liotta", "Giuseppe", "" ], [ "Montecchiani", "Fabrizio", "" ] ]
new_dataset
0.989991
1704.05051
Hossein Hosseini
Hossein Hosseini, Baicen Xiao and Radha Poovendran
Google's Cloud Vision API Is Not Robust To Noise
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Google has recently introduced the Cloud Vision API for image analysis. According to the demonstration website, the API "quickly classifies images into thousands of categories, detects individual objects and faces within images, and finds and reads printed words contained within images." It can be also used to "detect different types of inappropriate content from adult to violent content." In this paper, we evaluate the robustness of Google Cloud Vision API to input perturbation. In particular, we show that by adding sufficient noise to the image, the API generates completely different outputs for the noisy image, while a human observer would perceive its original content. We show that the attack is consistently successful, by performing extensive experiments on different image types, including natural images, images containing faces and images with texts. For instance, using images from ImageNet dataset, we found that adding an average of 14.25% impulse noise is enough to deceive the API. Our findings indicate the vulnerability of the API in adversarial environments. For example, an adversary can bypass an image filtering system by adding noise to inappropriate images. We then show that when a noise filter is applied on input images, the API generates mostly the same outputs for restored images as for original images. This observation suggests that cloud vision API can readily benefit from noise filtering, without the need for updating image analysis algorithms.
[ { "version": "v1", "created": "Sun, 16 Apr 2017 09:47:46 GMT" }, { "version": "v2", "created": "Thu, 20 Jul 2017 05:31:16 GMT" } ]
2017-07-21T00:00:00
[ [ "Hosseini", "Hossein", "" ], [ "Xiao", "Baicen", "" ], [ "Poovendran", "Radha", "" ] ]
new_dataset
0.994575
1707.06283
Devendra Yadav
Devendra Kumar Yadav, Gajraj Kuldeep, S. D. Joshi
Orthogonal Ramanujan Sums, its properties and Applications in Multiresolution Analysis
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Signal processing community has recently shown interest in Ramanujan sums which was defined by S.Ramanujan in 1918. In this paper we have proposed Orthog- onal Ramanujan Sums (ORS) based on Ramanujan sums. In this paper we present two novel application of ORS. Firstly a new representation of a finite length signal is given using ORS which is defined as Orthogonal Ramanujan Periodic Transform.Secondly ORS has been applied to multiresolution analysis and it is shown that Haar transform is a spe- cial case.
[ { "version": "v1", "created": "Thu, 25 May 2017 02:59:54 GMT" } ]
2017-07-21T00:00:00
[ [ "Yadav", "Devendra Kumar", "" ], [ "Kuldeep", "Gajraj", "" ], [ "Joshi", "S. D.", "" ] ]
new_dataset
0.989276
1707.06363
Sri Harsha Kondapalli
Sri Harsha Kondapalli, Xuan Zhang and Shantanu Chakrabartty
Energy-dissipation Limits in Variance-based Computing
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Variance-based logic (VBL) uses the fluctuations or the variance in the state of a particle or a physical quantity to represent different logic levels. In this letter we show that compared to the traditional bi-stable logic representation the variance-based representation can theoretically achieve a superior performance trade-off (in terms of energy dissipation and information capacity) when operating at fundamental limits imposed by thermal-noise. We show that for a bi-stable logic device the lower limit on energy dissipated per bit is 4.35KT/bit, whereas under similar operating conditions, a VBL device could achieve a lower limit of sub-KT/bit. These theoretical results are general enough to be applicable to different instantiations and variants of VBL ranging from digital processors based on energy-scavenging or to processors based on the emerging valleytronic devices.
[ { "version": "v1", "created": "Thu, 20 Jul 2017 03:43:31 GMT" } ]
2017-07-21T00:00:00
[ [ "Kondapalli", "Sri Harsha", "" ], [ "Zhang", "Xuan", "" ], [ "Chakrabartty", "Shantanu", "" ] ]
new_dataset
0.999116
1707.06393
Adam Jacobson
Adam Jacobson, Walter Scheirer and Michael Milford
Deja vu: Scalable Place Recognition Using Mutually Supportive Feature Frequencies
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning and recognition is a fundamental process performed in many robot operations such as mapping and localization. The majority of approaches share some common characteristics, such as attempting to extract salient features, landmarks or signatures, and growth in data storage and computational requirements as the size of the environment increases. In biological systems, spatial encoding in the brain is definitively known to be performed using a fixed-size neural encoding framework - the place, head-direction and grid cells found in the mammalian hippocampus and entorhinal cortex. Particularly paradoxically, one of the main encoding centers - the grid cells - represents the world using a highly aliased, repetitive encoding structure where one neuron represents an unbounded number of places in the world. Inspired by this system, in this paper we invert the normal approach used in forming mapping and localization algorithms, by developing a novel place recognition algorithm that seeks out and leverages repetitive, mutually complementary landmark frequencies in the world. The combinatorial encoding capacity of multiple different frequencies enables not only the ability to achieve efficient data storage, but also the potential for sub-linear storage growth in a learning and recall system. Using both ground-based and aerial camera datasets, we demonstrate the system finding and utilizing these frequencies to achieve successful place recognition, and discuss how this approach might scale to arbitrarily large global datasets and dimensions.
[ { "version": "v1", "created": "Thu, 20 Jul 2017 06:53:01 GMT" } ]
2017-07-21T00:00:00
[ [ "Jacobson", "Adam", "" ], [ "Scheirer", "Walter", "" ], [ "Milford", "Michael", "" ] ]
new_dataset
0.953547
1707.06420
Matej Arta\v{c}
Craig Sheridan, Darren Whigham, Matej Arta\v{c}
DICE Fault Injection Tool
QUDOS 2016 submission
null
10.1145/2945408.2945415
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe the motivation, innovation, design, running example and future development of a Fault Inject Tool (FIT). This tool enables controlled causing of cloud platform issues such as resource stress and service or VM outages, the purpose being to observe the subsequent effect on deployed applications. It is being designed for use in a DevOps workflow for tighter correlation between application design and cloud operation, although not limited to this usage, and helps improve resiliency for data intensive applications by bringing together fault tolerance, stress testing and benchmarking in a single tool.
[ { "version": "v1", "created": "Thu, 20 Jul 2017 09:16:53 GMT" } ]
2017-07-21T00:00:00
[ [ "Sheridan", "Craig", "" ], [ "Whigham", "Darren", "" ], [ "Artač", "Matej", "" ] ]
new_dataset
0.998383
1707.06503
Gregory Gutin
Bin Sheng, Ruijuan Li, Gregory Gutin
The Euler and Chinese Postman Problems on 2-Arc-Colored Digraphs
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The famous Chinese Postman Problem (CPP) is polynomial time solvable on both undirected and directed graphs. Gutin et al. [Discrete Applied Math 217 (2016)] generalized these results by proving that CPP on $c$-edge-colored graphs is polynomial time solvable for every $c\geq 2$. In CPP on weighted edge-colored graphs $G$, we wish to find a minimum weight properly colored closed walk containing all edges of $G$ (a walk is properly colored if every two consecutive edges are of different color, including the last and first edges in a closed walk). In this paper, we consider CPP on arc-colored digraphs (for properly colored closed directed walks), and provide a polynomial-time algorithm for the problem on weighted 2-arc-colored digraphs. This is a somewhat surprising result since it is NP-complete to decide whether a 2-arc-colored digraph has a properly colored directed cycle [Gutin et al., Discrete Math 191 (1998)]. To obtain the polynomial-time algorithm, we characterize 2-arc-colored digraphs containing properly colored Euler trails.
[ { "version": "v1", "created": "Thu, 20 Jul 2017 13:45:36 GMT" } ]
2017-07-21T00:00:00
[ [ "Sheng", "Bin", "" ], [ "Li", "Ruijuan", "" ], [ "Gutin", "Gregory", "" ] ]
new_dataset
0.997267
1707.06564
Guido Schillaci
Guido Schillaci, Fabio Schillaci and Verena V. Hafner
A Customisable Underwater Robot
null
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
We present a model of a configurable underwater drone, whose parts are optimised for 3D printing processes. We show how - through the use of printable adapters - several thrusters and ballast configurations can be implemented, allowing different maneuvering possibilities. After introducing the model and illustrating a set of possible configurations, we present a functional prototype based on open source hardware and software solutions. The prototype has been successfully tested in several dives in rivers and lakes around Berlin. The reliability of the printed models has been tested only in relatively shallow waters. However, we strongly believe that their availability as freely downloadable models will motivate the general public to build and to test underwater drones, thus speeding up the development of innovative solutions and applications. The models and their documentation will be available for download at the following link: https://adapt.informatik.hu-berlin.de/schillaci/underwater.html.
[ { "version": "v1", "created": "Thu, 20 Jul 2017 15:17:51 GMT" } ]
2017-07-21T00:00:00
[ [ "Schillaci", "Guido", "" ], [ "Schillaci", "Fabio", "" ], [ "Hafner", "Verena V.", "" ] ]
new_dataset
0.983197
1611.04825
Vibhaalakshmi Sivaraman
Vibhaalakshmi Sivaraman, Srinivas Narayana, Ori Rottenstreich, S. Muthukrishnan, Jennifer Rexford
Heavy-Hitter Detection Entirely in the Data Plane
SOSR 2017, Santa Clara, CA
null
10.1145/3050220.3050239
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Identifying the "heavy hitter" flows or flows with large traffic volumes in the data plane is important for several applications e.g., flow-size aware routing, DoS detection, and traffic engineering. However, measurement in the data plane is constrained by the need for line-rate processing (at 10-100Gb/s) and limited memory in switching hardware. We propose HashPipe, a heavy hitter detection algorithm using emerging programmable data planes. HashPipe implements a pipeline of hash tables which retain counters for heavy flows while evicting lighter flows over time. We prototype HashPipe in P4 and evaluate it with packet traces from an ISP backbone link and a data center. On the ISP trace (which contains over 400,000 flows), we find that HashPipe identifies 95% of the 300 heaviest flows with less than 80KB of memory.
[ { "version": "v1", "created": "Tue, 15 Nov 2016 13:42:33 GMT" }, { "version": "v2", "created": "Wed, 19 Jul 2017 17:27:45 GMT" } ]
2017-07-20T00:00:00
[ [ "Sivaraman", "Vibhaalakshmi", "" ], [ "Narayana", "Srinivas", "" ], [ "Rottenstreich", "Ori", "" ], [ "Muthukrishnan", "S.", "" ], [ "Rexford", "Jennifer", "" ] ]
new_dataset
0.979081
1704.02540
Yiming Huo
Yiming Huo, Xiaodai Dong, Wei Xu
5G Cellular User Equipment: From Theory to Practical Hardware Design
Submitted to IEEE ACCESS. It has 18 pages, 17 figures, and 5 tables
null
10.1109/ACCESS.2017.2727550
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research and development on the next generation wireless systems, namely 5G, has experienced explosive growth in recent years. In the physical layer (PHY), the massive multiple-input-multiple-output (MIMO) technique and the use of high GHz frequency bands are two promising trends for adoption. Millimeter-wave (mmWave) bands such as 28 GHz, 38 GHz, 64 GHz, and 71 GHz, which were previously considered not suitable for commercial cellular networks, will play an important role in 5G. Currently, most 5G research deals with the algorithms and implementations of modulation and coding schemes, new spatial signal processing technologies, new spectrum opportunities, channel modeling, 5G proof of concept (PoC) systems, and other system-level enabling technologies. In this paper, we first investigate the contemporary wireless user equipment (UE) hardware design, and unveil the critical 5G UE hardware design constraints on circuits and systems. On top of the said investigation and design trade-off analysis, a new, highly reconfigurable system architecture for 5G cellular user equipment, namely distributed phased arrays based MIMO (DPA-MIMO) is proposed. Finally, the link budget calculation and data throughput numerical results are presented for the evaluation of the proposed architecture.
[ { "version": "v1", "created": "Sat, 8 Apr 2017 22:53:31 GMT" }, { "version": "v2", "created": "Fri, 7 Jul 2017 06:45:40 GMT" }, { "version": "v3", "created": "Wed, 19 Jul 2017 10:57:23 GMT" } ]
2017-07-20T00:00:00
[ [ "Huo", "Yiming", "" ], [ "Dong", "Xiaodai", "" ], [ "Xu", "Wei", "" ] ]
new_dataset
0.991766
1706.01875
Rishab Nithyanand
Rishab Nithyanand, Brian Schaffner, Phillipa Gill
Measuring Offensive Speech in Online Political Discourse
null
null
null
null
cs.CL cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Internet and online forums such as Reddit have become an increasingly popular medium for citizens to engage in political conversations. However, the online disinhibition effect resulting from the ability to use pseudonymous identities may manifest in the form of offensive speech, consequently making political discussions more aggressive and polarizing than they already are. Such environments may result in harassment and self-censorship from its targets. In this paper, we present preliminary results from a large-scale temporal measurement aimed at quantifying offensiveness in online political discussions. To enable our measurements, we develop and evaluate an offensive speech classifier. We then use this classifier to quantify and compare offensiveness in the political and general contexts. We perform our study using a database of over 168M Reddit comments made by over 7M pseudonyms between January 2015 and January 2017 -- a period covering several divisive political events including the 2016 US presidential elections.
[ { "version": "v1", "created": "Tue, 6 Jun 2017 21:29:23 GMT" }, { "version": "v2", "created": "Wed, 19 Jul 2017 17:24:51 GMT" } ]
2017-07-20T00:00:00
[ [ "Nithyanand", "Rishab", "" ], [ "Schaffner", "Brian", "" ], [ "Gill", "Phillipa", "" ] ]
new_dataset
0.998669
1707.03742
Francisco Gomez-Donoso
Francisco Gomez-Donoso, Sergio Orts-Escolano and Miguel Cazorla
Large-scale Multiview 3D Hand Pose Dataset
null
null
null
null
cs.HC cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Accurate hand pose estimation at joint level has several uses on human-robot interaction, user interfacing and virtual reality applications. Yet, it currently is not a solved problem. The novel deep learning techniques could make a great improvement on this matter but they need a huge amount of annotated data. The hand pose datasets released so far present some issues that make them impossible to use on deep learning methods such as the few number of samples, high-level abstraction annotations or samples consisting in depth maps. In this work, we introduce a multiview hand pose dataset in which we provide color images of hands and different kind of annotations for each, i.e the bounding box and the 2D and 3D location on the joints in the hand. Besides, we introduce a simple yet accurate deep learning architecture for real-time robust 2D hand pose estimation.
[ { "version": "v1", "created": "Wed, 12 Jul 2017 14:39:49 GMT" }, { "version": "v2", "created": "Thu, 13 Jul 2017 08:05:53 GMT" }, { "version": "v3", "created": "Tue, 18 Jul 2017 19:02:55 GMT" } ]
2017-07-20T00:00:00
[ [ "Gomez-Donoso", "Francisco", "" ], [ "Orts-Escolano", "Sergio", "" ], [ "Cazorla", "Miguel", "" ] ]
new_dataset
0.988715
1707.05911
Yufei Wang
Yufei Wang, Zhe Lin, Xiaohui Shen, Radomir Mech, Gavin Miller, Garrison W. Cottrell
Recognizing and Curating Photo Albums via Event-Specific Image Importance
Accepted as oral in BMVC 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic organization of personal photos is a problem with many real world ap- plications, and can be divided into two main tasks: recognizing the event type of the photo collection, and selecting interesting images from the collection. In this paper, we attempt to simultaneously solve both tasks: album-wise event recognition and image- wise importance prediction. We collected an album dataset with both event type labels and image importance labels, refined from an existing CUFED dataset. We propose a hybrid system consisting of three parts: A siamese network-based event-specific image importance prediction, a Convolutional Neural Network (CNN) that recognizes the event type, and a Long Short-Term Memory (LSTM)-based sequence level event recognizer. We propose an iterative updating procedure for event type and image importance score prediction. We experimentally verified that image importance score prediction and event type recognition can each help the performance of the other.
[ { "version": "v1", "created": "Wed, 19 Jul 2017 01:03:04 GMT" } ]
2017-07-20T00:00:00
[ [ "Wang", "Yufei", "" ], [ "Lin", "Zhe", "" ], [ "Shen", "Xiaohui", "" ], [ "Mech", "Radomir", "" ], [ "Miller", "Gavin", "" ], [ "Cottrell", "Garrison W.", "" ] ]
new_dataset
0.998987
1707.06122
Philipp Kats
Philipp Kats, Cheng Qian, Constantine Kontokosta, Stanislav Sobolevsky
Twitter Activity Timeline as a Signature of Urban Neighborhood
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern cities are complex systems, evolving at a fast pace. Thus, many urban planning, political, and economic decisions require a deep and up-to-date understanding of the local context of urban neighborhoods. This study shows that the structure of openly available social media records, such as Twitter, offers a possibility for building a unique dynamic signature of urban neighborhood function, and, therefore, might be used as an efficient and simple decision support tool. Considering New York City as an example, we investigate how Twitter data can be used to decompose the urban landscape into self-defining zones, aligned with the functional properties of individual neighborhoods and their social and economic characteristics. We further explore the potential of these data for detecting events and evaluating their impact over time and space. This approach paves a way to a methodology for immediate quantification of the impact of urban development programs and the estimation of socioeconomic statistics at a finer spatial-temporal scale, thus allowing urban policy-makers to track neighborhood transformations and foresee undesirable changes in order to take early action before official statistics would be available.
[ { "version": "v1", "created": "Wed, 19 Jul 2017 14:39:15 GMT" } ]
2017-07-20T00:00:00
[ [ "Kats", "Philipp", "" ], [ "Qian", "Cheng", "" ], [ "Kontokosta", "Constantine", "" ], [ "Sobolevsky", "Stanislav", "" ] ]
new_dataset
0.992631
1707.06175
Taylor Mordan
Taylor Mordan, Nicolas Thome, Matthieu Cord and Gilles Henaff
Deformable Part-based Fully Convolutional Network for Object Detection
Accepted to BMVC 2017 (oral)
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing region-based object detectors are limited to regions with fixed box geometry to represent objects, even if those are highly non-rectangular. In this paper we introduce DP-FCN, a deep model for object detection which explicitly adapts to shapes of objects with deformable parts. Without additional annotations, it learns to focus on discriminative elements and to align them, and simultaneously brings more invariance for classification and geometric information to refine localization. DP-FCN is composed of three main modules: a Fully Convolutional Network to efficiently maintain spatial resolution, a deformable part-based RoI pooling layer to optimize positions of parts and build invariance, and a deformation-aware localization module explicitly exploiting displacements of parts to improve accuracy of bounding box regression. We experimentally validate our model and show significant gains. DP-FCN achieves state-of-the-art performances of 83.1% and 80.9% on PASCAL VOC 2007 and 2012 with VOC data only.
[ { "version": "v1", "created": "Wed, 19 Jul 2017 16:03:05 GMT" } ]
2017-07-20T00:00:00
[ [ "Mordan", "Taylor", "" ], [ "Thome", "Nicolas", "" ], [ "Cord", "Matthieu", "" ], [ "Henaff", "Gilles", "" ] ]
new_dataset
0.95909
1707.06211
Louis Francois Pau
L-F Pau
Wireless enabled clothing: New modular technologies and overall supply chain impact
null
null
null
CR-26 Upg\"otva AB
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper is devoted to the realization of wireless enabled clothing, employing recent new technologies in electronics, textile, and renewable power. This new wireless enabled clothing architecture is modular and distributed,allowing for customization in functionality and clothing designs. Are studied the implications for supply chains,distribution channels, and cost benefits. Modular wireless enabled clothing offers significant personalization opportunities at costs comparable with mobile terminals.
[ { "version": "v1", "created": "Wed, 12 Jul 2017 09:32:22 GMT" } ]
2017-07-20T00:00:00
[ [ "Pau", "L-F", "" ] ]
new_dataset
0.998792
1512.06257
Lina Yao
Lina Yao, Quan Z. Sheng, Boualem Benatallah, Schahram Dustdar, Xianzhi Wang, Ali Shemshadi, and Anne H.H. Ngu
Up in the Air: When Homes Meet the Web of Things
null
null
null
null
cs.CY cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emerging Internet of Things (IoT) will comprise billions of Web-enabled objects (or "things") where such objects can sense, communicate, compute and potentially actuate. WoT is essentially the embodiment of the evolution from systems linking digital documents to systems relating digital information to real-world physical items. It is widely understood that significant technical challenges exist in developing applications in the WoT environment. In this paper, we report our practical experience in the design and development of a smart home system in a WoT environment. Our system provides a layered framework for managing and sharing the information produced by physical things as well as the residents. We particularly focus on a research prototype named WITS, that helps the elderly live independently and safely in their own homes, with minimal support from the decreasing number of individuals in the working-age population. WITS enables an unobtrusive monitoring of elderly people in a real-world, inhabituated home environment, by leveraging WoT technologies in building context-aware, personalized services.
[ { "version": "v1", "created": "Sat, 19 Dec 2015 14:56:55 GMT" }, { "version": "v2", "created": "Tue, 29 Dec 2015 10:29:50 GMT" }, { "version": "v3", "created": "Tue, 18 Jul 2017 05:12:49 GMT" } ]
2017-07-19T00:00:00
[ [ "Yao", "Lina", "" ], [ "Sheng", "Quan Z.", "" ], [ "Benatallah", "Boualem", "" ], [ "Dustdar", "Schahram", "" ], [ "Wang", "Xianzhi", "" ], [ "Shemshadi", "Ali", "" ], [ "Ngu", "Anne H. H.", "" ] ]
new_dataset
0.997074
1603.07304
Matteo Gallet
Matteo Gallet, Georg Nawratil, Josef Schicho, J.M. Selig
Mobile Icosapods
22 pages, 4 figures
Advances in Applied Mathematics, Volume 88, July 2017, Pages 1-25
10.1016/j.aam.2016.12.002
null
cs.RO math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pods are mechanical devices constituted of two rigid bodies, the base and the platform, connected by a number of other rigid bodies, called legs, that are anchored via spherical joints. It is possible to prove that the maximal number of legs of a mobile pod, when finite, is 20. In 1904, Borel designed a technique to construct examples of such 20-pods, but could not constrain the legs to have base and platform points with real coordinates. We show that Borel's construction yields all mobile 20-pods, and that it is possible to construct examples with all real coordinates.
[ { "version": "v1", "created": "Wed, 23 Mar 2016 19:05:22 GMT" } ]
2017-07-19T00:00:00
[ [ "Gallet", "Matteo", "" ], [ "Nawratil", "Georg", "" ], [ "Schicho", "Josef", "" ], [ "Selig", "J. M.", "" ] ]
new_dataset
0.999837
1610.02874
Emmanuel Thome
Joshua Fried (1), Pierrick Gaudry (2), Nadia Heninger (1), Emmanuel Thom\'e (2) ((1) CIS (2) CARAMBA)
A kilobit hidden SNFS discrete logarithm computation
null
Jean-S{\'e}bastien Coron, Jesper Buus Nielsen. Eurocrypt 2017, Apr 2017, Paris, France. Springer, 10210, 2017, Lecture Notes in Computer Science
10.1007/978-3-319-56620-7_8
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We perform a special number field sieve discrete logarithm computation in a 1024-bit prime field. To our knowledge, this is the first kilobit-sized discrete logarithm computation ever reported for prime fields. This computation took a little over two months of calendar time on an academic cluster using the open-source CADO-NFS software. Our chosen prime $p$ looks random, and $p--1$ has a 160-bit prime factor, in line with recommended parameters for the Digital Signature Algorithm. However, our p has been trapdoored in such a way that the special number field sieve can be used to compute discrete logarithms in $\mathbb{F}\_p^*$ , yet detecting that p has this trapdoor seems out of reach. Twenty-five years ago, there was considerable controversy around the possibility of back-doored parameters for DSA. Our computations show that trapdoored primes are entirely feasible with current computing technology. We also describe special number field sieve discrete log computations carried out for multiple weak primes found in use in the wild. As can be expected from a trapdoor mechanism which we say is hard to detect, our research did not reveal any trapdoored prime in wide use. The only way for a user to defend against a hypothetical trapdoor of this kind is to require verifiably random primes.
[ { "version": "v1", "created": "Mon, 10 Oct 2016 12:03:40 GMT" }, { "version": "v2", "created": "Tue, 18 Jul 2017 06:49:46 GMT" } ]
2017-07-19T00:00:00
[ [ "Fried", "Joshua", "", "CIS" ], [ "Gaudry", "Pierrick", "", "CARAMBA" ], [ "Heninger", "Nadia", "", "CIS" ], [ "Thomé", "Emmanuel", "", "CARAMBA" ] ]
new_dataset
0.974754
1705.05065
Shital Shah
Shital Shah, Debadeepta Dey, Chris Lovett, Ashish Kapoor
AirSim: High-Fidelity Visual and Physical Simulation for Autonomous Vehicles
Accepted for Field and Service Robotics conference 2017 (FSR 2017)
null
null
MSR-TR-2017-9
cs.RO cs.AI cs.CV cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Developing and testing algorithms for autonomous vehicles in real world is an expensive and time consuming process. Also, in order to utilize recent advances in machine intelligence and deep learning we need to collect a large amount of annotated training data in a variety of conditions and environments. We present a new simulator built on Unreal Engine that offers physically and visually realistic simulations for both of these goals. Our simulator includes a physics engine that can operate at a high frequency for real-time hardware-in-the-loop (HITL) simulations with support for popular protocols (e.g. MavLink). The simulator is designed from the ground up to be extensible to accommodate new types of vehicles, hardware platforms and software protocols. In addition, the modular design enables various components to be easily usable independently in other projects. We demonstrate the simulator by first implementing a quadrotor as an autonomous vehicle and then experimentally comparing the software components with real-world flights.
[ { "version": "v1", "created": "Mon, 15 May 2017 04:06:22 GMT" }, { "version": "v2", "created": "Tue, 18 Jul 2017 05:30:28 GMT" } ]
2017-07-19T00:00:00
[ [ "Shah", "Shital", "" ], [ "Dey", "Debadeepta", "" ], [ "Lovett", "Chris", "" ], [ "Kapoor", "Ashish", "" ] ]
new_dataset
0.999574
1705.07687
Aitor Garcia Pablos
Aitor Garc\'ia-Pablos, Montse Cuadros, German Rigau
W2VLDA: Almost Unsupervised System for Aspect Based Sentiment Analysis
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the increase of online customer opinions in specialised websites and social networks, the necessity of automatic systems to help to organise and classify customer reviews by domain-specific aspect/categories and sentiment polarity is more important than ever. Supervised approaches to Aspect Based Sentiment Analysis obtain good results for the domain/language their are trained on, but having manually labelled data for training supervised systems for all domains and languages are usually very costly and time consuming. In this work we describe W2VLDA, an almost unsupervised system based on topic modelling, that combined with some other unsupervised methods and a minimal configuration, performs aspect/category classifiation, aspect-terms/opinion-words separation and sentiment polarity classification for any given domain and language. We evaluate the performance of the aspect and sentiment classification in the multilingual SemEval 2016 task 5 (ABSA) dataset. We show competitive results for several languages (English, Spanish, French and Dutch) and domains (hotels, restaurants, electronic-devices).
[ { "version": "v1", "created": "Mon, 22 May 2017 12:01:10 GMT" }, { "version": "v2", "created": "Tue, 18 Jul 2017 07:36:48 GMT" } ]
2017-07-19T00:00:00
[ [ "García-Pablos", "Aitor", "" ], [ "Cuadros", "Montse", "" ], [ "Rigau", "German", "" ] ]
new_dataset
0.999564
1707.05304
Harald Beck
Harald Beck, Thomas Eiter, Christian Folie
Ticker: A System for Incremental ASP-based Stream Reasoning
Paper presented at the 33nd International Conference on Logic Programming (ICLP 2017), Melbourne, Australia, August 28 to September 1, 2017, 24 pages, LaTeX, 4 PDF figures (arXiv:1707.05304)
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In complex reasoning tasks, as expressible by Answer Set Programming (ASP), problems often permit for multiple solutions. In dynamic environments, where knowledge is continuously changing, the question arises how a given model can be incrementally adjusted relative to new and outdated information. This paper introduces Ticker, a prototypical engine for well-defined logical reasoning over streaming data. Ticker builds on a practical fragment of the recent rule-based language LARS which extends Answer Set Programming for streams by providing flexible expiration control and temporal modalities. We discuss Ticker's reasoning strategies: First, the repeated one-shot solving mode calls Clingo on an ASP encoding. We show how this translation can be incrementally updated when new data is streaming in or time passes by. Based on this, we build on Doyle's classic justification-based truth maintenance system (TMS) to update models of non-stratified programs. Finally, we empirically compare the obtained evaluation mechanisms. This paper is under consideration for acceptance in TPLP.
[ { "version": "v1", "created": "Mon, 17 Jul 2017 17:59:19 GMT" }, { "version": "v2", "created": "Tue, 18 Jul 2017 07:22:14 GMT" } ]
2017-07-19T00:00:00
[ [ "Beck", "Harald", "" ], [ "Eiter", "Thomas", "" ], [ "Folie", "Christian", "" ] ]
new_dataset
0.998696
1707.05456
Manh Duong Phung
P. M. Duong, T. T. Hoang, T. Q. Vinh
Control of an Internet-based Robot System Using the Real-time Transport Protocol
in Proceeding of The 5th Vietnam Conference on Mechatronics, Ho chi minh City, Vietnam, 2010
null
null
null
cs.RO cs.NI cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a novel approach in controlling robot systems over the Internet. The Real-time Transport Protocol (RTP) is used as the communication protocol instead of traditionally using TCP and UDP. The theoretic analyses, the simulation studies and the experimental implementation have been performed to evaluate the feasibility and effectiveness of the proposed approach for practical uses.
[ { "version": "v1", "created": "Tue, 18 Jul 2017 03:53:53 GMT" } ]
2017-07-19T00:00:00
[ [ "Duong", "P. M.", "" ], [ "Hoang", "T. T.", "" ], [ "Vinh", "T. Q.", "" ] ]
new_dataset
0.971539
1707.05487
Alonso Silva
Alonso Silva, Antonia Masucci
Green Base Station Placement for Microwave Backhaul Links
Proceedings of the International Symposium on Ubiquitous Networking (UNet'17), May 2017, Casablanca, Morocco
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless mobile backhaul networks have been proposed as a substitute in cases in which wired alternatives are not available due to economical or geographical reasons. In this work, we study the location problem of base stations in a given region where mobile terminals are distributed according to a certain probability density function and the base stations communicate through microwave backhaul links. Using results of optimal transport theory, we provide the optimal asymptotic distribution of base stations in the considered setting by minimizing the total power over the whole network.
[ { "version": "v1", "created": "Tue, 18 Jul 2017 06:05:42 GMT" } ]
2017-07-19T00:00:00
[ [ "Silva", "Alonso", "" ], [ "Masucci", "Antonia", "" ] ]
new_dataset
0.970261
1707.05554
Hemant Kumar Rath
Hemant Kumar Rath, Sumanth Timmadasari, Bighnaraj Panigrahi and Anantha Simha
Realistic Indoor Path Loss Modeling for Regular WiFi Operations in India
Published in 23rd National Conference on Communications, NCC 2017, IEEE
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Indoor wireless communication using Wireless Fidelity (WiFi) is becoming a major need for the success of Internet of Things (IoT) and cloud robotics in both developed and developing countries. With different operating conditions, interference, obstacles and type of building materials used, it is difficult to predict the path loss components in an indoor environment, which are crucial for the network design. It has been observed that the indoor path loss models proposed for western countries cannot be directly used in Indian scenarios due to variations in building materials utilized, floor plans, etc. In this paper, we have proposed a non-deterministic statistical indoor path loss model- Tata Indoor Path Loss Model (T-IPLM) which can be used for the 2.4 - 2.5 GHz, Industrial Scientific and Medical (ISM) band. To propose and validate, we have conducted several drive tests with different conditions such as busy office premise with obstacles, open office premise, corridor, canteen, and multi-storey office locations, etc. We have also compared T-IPLM with popular path loss models such as ITU-R and Log-distance; T-IPLM matches closely with the drive test results as compared to other models. We believe that T-IPLM model can be used extensively to design accurate indoor communication networks required for regular WiFi communications and deployment and operations of IoT and cloud robotics.
[ { "version": "v1", "created": "Tue, 18 Jul 2017 10:42:51 GMT" } ]
2017-07-19T00:00:00
[ [ "Rath", "Hemant Kumar", "" ], [ "Timmadasari", "Sumanth", "" ], [ "Panigrahi", "Bighnaraj", "" ], [ "Simha", "Anantha", "" ] ]
new_dataset
0.994706
1707.05619
Arkadii Slinko
Umberto Grandi, Daniel Hughes, Francesca Rossi and Arkadii Slinko
Gibbard-Satterthwaite Games for k-Approval Voting Rules
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Gibbard-Satterthwaite theorem implies the existence of voters, called manipulators, who can change the election outcome in their favour by voting strategically. When a given preference profile admits several such manipulators, voting becomes a game played by these voters, who have to reason strategically about each others' actions. To complicate the game even further, counter-manipulators may then try to counteract the actions of manipulators. Our voters are boundedly rational and do not think beyond manipulating or countermanipulating. We call these games Gibbard--Satterthwaite Games. In this paper we look for conditions that guarantee the existence of a Nash equilibria in pure strategies.
[ { "version": "v1", "created": "Tue, 18 Jul 2017 14:02:16 GMT" } ]
2017-07-19T00:00:00
[ [ "Grandi", "Umberto", "" ], [ "Hughes", "Daniel", "" ], [ "Rossi", "Francesca", "" ], [ "Slinko", "Arkadii", "" ] ]
new_dataset
0.999684
1509.07315
Timm Faulwasser
Timm Faulwasser, Milan Korda, Colin N. Jones and Dominique Bonvin
On Turnpike and Dissipativity Properties of Continuous-Time Optimal Control Problems
null
Automatica, 2017, 81(4): 297-304
10.1016/j.automatica.2017.03.012
null
cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the relations between three different properties, which are of importance in optimal control problems: dissipativity of the underlying dynamics with respect to a specific supply rate, optimal operation at steady state, and the turnpike property. We show in a continuous-time setting that if along optimal trajectories a strict dissipation inequality is satisfied, then this implies optimal operation at this steady state and the existence of a turnpike at the same steady state. Finally, we establish novel converse turnpike results, i.e., we show that the existence of a turnpike at a steady state implies optimal operation at this steady state and dissipativity with respect to this steady state. We draw upon a numerical example to illustrate our findings.
[ { "version": "v1", "created": "Thu, 24 Sep 2015 11:15:44 GMT" }, { "version": "v2", "created": "Sun, 16 Jul 2017 06:25:16 GMT" } ]
2017-07-18T00:00:00
[ [ "Faulwasser", "Timm", "" ], [ "Korda", "Milan", "" ], [ "Jones", "Colin N.", "" ], [ "Bonvin", "Dominique", "" ] ]
new_dataset
0.998355
1605.02588
Antoine Dailly
Nicolas Bousquet (G-SCOP), Antoine Dailly (GOAL), Eric Duchene (GOAL), Hamamache Kheddouci (GOAL), Aline Parreau (GOAL)
A Vizing-like theorem for union vertex-distinguishing edge coloring
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a variant of the vertex-distinguishing edge coloring problem, where each edge is assigned a subset of colors. The label of a vertex is the union of the sets of colors on edges incident to it. In this paper we investigate the problem of finding a coloring with the minimum number of colors where every vertex receives a distinct label. Finding such a coloring generalizes several other well-known problems of vertex-distinguishing colorings in graphs.We show that for any graph (without connected component reduced to an edge or a single vertex), the minimum number of colors for which such a coloring exists can only take 3possible values depending on the order of the graph. Moreover, we provide the exact value for paths, cycles and complete binary trees.
[ { "version": "v1", "created": "Mon, 9 May 2016 13:58:43 GMT" }, { "version": "v2", "created": "Mon, 17 Jul 2017 11:38:09 GMT" } ]
2017-07-18T00:00:00
[ [ "Bousquet", "Nicolas", "", "G-SCOP" ], [ "Dailly", "Antoine", "", "GOAL" ], [ "Duchene", "Eric", "", "GOAL" ], [ "Kheddouci", "Hamamache", "", "GOAL" ], [ "Parreau", "Aline", "", "GOAL" ] ]
new_dataset
0.99677
1608.05167
Gui-Song Xia
Gui-Song Xia, Jingwen Hu, Fan Hu, Baoguang Shi, Xiang Bai, Yanfei Zhong, Liangpei Zhang
AID: A Benchmark Dataset for Performance Evaluation of Aerial Scene Classification
null
IEEE Transactions on Geoscience and Remote Sensing, Vol. 55, No.7, pp.3965-3981 (July 2017)
10.1109/TGRS.2017.2685945
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aerial scene classification, which aims to automatically label an aerial image with a specific semantic category, is a fundamental problem for understanding high-resolution remote sensing imagery. In recent years, it has become an active task in remote sensing area and numerous algorithms have been proposed for this task, including many machine learning and data-driven approaches. However, the existing datasets for aerial scene classification like UC-Merced dataset and WHU-RS19 are with relatively small sizes, and the results on them are already saturated. This largely limits the development of scene classification algorithms. This paper describes the Aerial Image Dataset (AID): a large-scale dataset for aerial scene classification. The goal of AID is to advance the state-of-the-arts in scene classification of remote sensing images. For creating AID, we collect and annotate more than ten thousands aerial scene images. In addition, a comprehensive review of the existing aerial scene classification techniques as well as recent widely-used deep learning methods is given. Finally, we provide a performance analysis of typical aerial scene classification and deep learning approaches on AID, which can be served as the baseline results on this benchmark.
[ { "version": "v1", "created": "Thu, 18 Aug 2016 04:20:45 GMT" } ]
2017-07-18T00:00:00
[ [ "Xia", "Gui-Song", "" ], [ "Hu", "Jingwen", "" ], [ "Hu", "Fan", "" ], [ "Shi", "Baoguang", "" ], [ "Bai", "Xiang", "" ], [ "Zhong", "Yanfei", "" ], [ "Zhang", "Liangpei", "" ] ]
new_dataset
0.999839
1610.03013
Weinan Zhang
Jun Wang, Weinan Zhang, Shuai Yuan
Display Advertising with Real-Time Bidding (RTB) and Behavioural Targeting
A 122-page monograph about RTB display advertising, which will be published on Now Publisher in July 2017
null
null
null
cs.GT
http://creativecommons.org/licenses/by/4.0/
The most significant progress in recent years in online display advertising is what is known as the Real-Time Bidding (RTB) mechanism to buy and sell ads. RTB essentially facilitates buying an individual ad impression in real time while it is still being generated from a user's visit. RTB not only scales up the buying process by aggregating a large amount of available inventories across publishers but, most importantly, enables direct targeting of individual users. As such, RTB has fundamentally changed the landscape of digital marketing. Scientifically, the demand for automation, integration and optimisation in RTB also brings new research opportunities in information retrieval, data mining, machine learning and other related fields. In this monograph, an overview is given of the fundamental infrastructure, algorithms, and technical solutions of this new frontier of computational advertising. The covered topics include user response prediction, bid landscape forecasting, bidding algorithms, revenue optimisation, statistical arbitrage, dynamic pricing, and ad fraud detection.
[ { "version": "v1", "created": "Fri, 7 Oct 2016 16:12:28 GMT" }, { "version": "v2", "created": "Sat, 15 Jul 2017 17:38:36 GMT" } ]
2017-07-18T00:00:00
[ [ "Wang", "Jun", "" ], [ "Zhang", "Weinan", "" ], [ "Yuan", "Shuai", "" ] ]
new_dataset
0.993976
1610.03902
Susmita Dey Manasi
S. Dey Manasi, M. M. Al Rashid, J. Atulasimha, S. Bandyopadhyay, A. R. Trivedi
Straintronic magneto-tunneling-junction based ternary content addressable memory
8 pages, 11 figures
Part I: IEEE Transactions on Electron Devices (Volume: 64, Issue: 7, Page(s): 2835-2841, July 2017), Part II: IEEE Transactions on Electron Devices (Volume: 64, Issue: 7, Page(s): 2842-2848, July 2017)
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Straintronic magneto-tunneling junction (s-MTJ) switches, whose resistances are controlled with voltage-generated strain in the magnetostrictive free layer of the MTJ, are extremely energy-efficient switches that would dissipate a few aJ of energy during switching. Unfortunately, they are also relatively error-prone and have low resistance on/off ratio. This suggests that as computing elements, they are best suited for non-Boolean architectures. Here, we propose and analyze a ternary content addressable memory implemented with s-MTJs and some transistors. It overcomes challenges encountered by traditional all-transistor implementations, resulting in exceptionally high cell density.
[ { "version": "v1", "created": "Thu, 13 Oct 2016 00:37:44 GMT" }, { "version": "v2", "created": "Fri, 21 Oct 2016 21:31:38 GMT" } ]
2017-07-18T00:00:00
[ [ "Manasi", "S. Dey", "" ], [ "Rashid", "M. M. Al", "" ], [ "Atulasimha", "J.", "" ], [ "Bandyopadhyay", "S.", "" ], [ "Trivedi", "A. R.", "" ] ]
new_dataset
0.999399
1610.09629
Beno\^it Valiron
Ugo Dal Lago, Claudia Faggian, Benoit Valiron, Akira Yoshimizu
The Geometry of Parallelism. Classical, Probabilistic, and Quantum Effects
21 pages, extended version of the conference paper ; July 2017: removed a spurious and unused lemma
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a Geometry of Interaction model for higher-order quantum computation, and prove its adequacy for a full quantum programming language in which entanglement, duplication, and recursion are all available. Our model comes with a multi-token machine, a proof net system, and a PCF-style language. The approach we develop is not specific to quantum computation, and our model is an instance of a new framework whose main feature is the ability to model commutative effects in a parallel setting. Being based on a multi-token machine equipped with a memory, it has a concrete nature which makes it well suited for building low-level operational descriptions of higher-order languages.
[ { "version": "v1", "created": "Sun, 30 Oct 2016 10:54:43 GMT" }, { "version": "v2", "created": "Fri, 25 Nov 2016 12:10:01 GMT" }, { "version": "v3", "created": "Sat, 15 Jul 2017 14:32:53 GMT" } ]
2017-07-18T00:00:00
[ [ "Lago", "Ugo Dal", "" ], [ "Faggian", "Claudia", "" ], [ "Valiron", "Benoit", "" ], [ "Yoshimizu", "Akira", "" ] ]
new_dataset
0.978074
1705.08338
Aidin Ferdowsi
Aidin Ferdowsi, Walid Saad, Behrouz Maham, Narayan B. Mandayam
A Colonel Blotto Game for Interdependence-Aware Cyber-Physical Systems Security in Smart Cities
null
null
10.1145/3063386.3063765
null
cs.GT cs.IT cs.SY math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smart cities must integrate a number of interdependent cyber-physical systems that operate in a coordinated manner to improve the well-being of the city's residents. A cyber-physical system (CPS) is a system of computational elements controlling physical entities. Large-scale CPSs are more vulnerable to attacks due to the cyber-physical interdependencies that can lead to cascading failures which can have a significant detrimental effect on a city. In this paper, a novel approach is proposed for analyzing the problem of allocating security resources, such as firewalls and anti-malware, over the various cyber components of an interdependent CPS to protect the system against imminent attacks. The problem is formulated as a Colonel Blotto game in which the attacker seeks to allocate its resources to compromise the CPS, while the defender chooses how to distribute its resources to defend against potential attacks. To evaluate the effects of defense and attack, various CPS factors are considered including human-CPS interactions as well as physical and topological characteristics of a CPS such as flow and capacity of interconnections and minimum path algorithms. Results show that, for the case in which the attacker is not aware of the CPS interdependencies, the defender can have a higher payoff, compared to the case in which the attacker has complete information. The results also show that, in the case of more symmetric nodes, due to interdependencies, the defender achieves its highest payoff at the equilibrium compared to the case with independent, asymmetric nodes.
[ { "version": "v1", "created": "Tue, 23 May 2017 14:54:28 GMT" } ]
2017-07-18T00:00:00
[ [ "Ferdowsi", "Aidin", "" ], [ "Saad", "Walid", "" ], [ "Maham", "Behrouz", "" ], [ "Mandayam", "Narayan B.", "" ] ]
new_dataset
0.998732
1705.08992
Leonid Peshkin
Nicholas Harvey, Vahab Mirrokni, David Karger, Virginia Savova, Leonid Peshkin
Matroids Hitting Sets and Unsupervised Dependency Grammar Induction
11 pages 4 figures
null
null
null
cs.DM cs.CL cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper formulates a novel problem on graphs: find the minimal subset of edges in a fully connected graph, such that the resulting graph contains all spanning trees for a set of specifed sub-graphs. This formulation is motivated by an un-supervised grammar induction problem from computational linguistics. We present a reduction to some known problems and algorithms from graph theory, provide computational complexity results, and describe an approximation algorithm.
[ { "version": "v1", "created": "Wed, 24 May 2017 22:53:56 GMT" }, { "version": "v2", "created": "Sat, 15 Jul 2017 20:24:11 GMT" } ]
2017-07-18T00:00:00
[ [ "Harvey", "Nicholas", "" ], [ "Mirrokni", "Vahab", "" ], [ "Karger", "David", "" ], [ "Savova", "Virginia", "" ], [ "Peshkin", "Leonid", "" ] ]
new_dataset
0.998732
1707.04652
Sanjaya Wijeratne
Sanjaya Wijeratne, Lakshika Balasuriya, Amit Sheth, Derek Doran
EmojiNet: An Open Service and API for Emoji Sense Discovery
This paper was published at ICWSM 2017 as a full paper, Proc. of the 11th International AAAI Conference on Web and Social Media (ICWSM 2017). Montreal, Canada. 2017
null
null
null
cs.CL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the release of EmojiNet, the largest machine-readable emoji sense inventory that links Unicode emoji representations to their English meanings extracted from the Web. EmojiNet is a dataset consisting of: (i) 12,904 sense labels over 2,389 emoji, which were extracted from the web and linked to machine-readable sense definitions seen in BabelNet, (ii) context words associated with each emoji sense, which are inferred through word embedding models trained over Google News corpus and a Twitter message corpus for each emoji sense definition, and (iii) recognizing discrepancies in the presentation of emoji on different platforms, specification of the most likely platform-based emoji sense for a selected set of emoji. The dataset is hosted as an open service with a REST API and is available at http://emojinet.knoesis.org/. The development of this dataset, evaluation of its quality, and its applications including emoji sense disambiguation and emoji sense similarity are discussed.
[ { "version": "v1", "created": "Fri, 14 Jul 2017 22:02:05 GMT" } ]
2017-07-18T00:00:00
[ [ "Wijeratne", "Sanjaya", "" ], [ "Balasuriya", "Lakshika", "" ], [ "Sheth", "Amit", "" ], [ "Doran", "Derek", "" ] ]
new_dataset
0.999812
1707.04653
Sanjaya Wijeratne
Sanjaya Wijeratne, Lakshika Balasuriya, Amit Sheth, Derek Doran
A Semantics-Based Measure of Emoji Similarity
This paper is accepted at Web Intelligence 2017 as a full paper, In 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI). Leipzig, Germany: ACM, 2017
null
10.1145/3106426.3106490
null
cs.CL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Emoji have grown to become one of the most important forms of communication on the web. With its widespread use, measuring the similarity of emoji has become an important problem for contemporary text processing since it lies at the heart of sentiment analysis, search, and interface design tasks. This paper presents a comprehensive analysis of the semantic similarity of emoji through embedding models that are learned over machine-readable emoji meanings in the EmojiNet knowledge base. Using emoji descriptions, emoji sense labels and emoji sense definitions, and with different training corpora obtained from Twitter and Google News, we develop and test multiple embedding models to measure emoji similarity. To evaluate our work, we create a new dataset called EmoSim508, which assigns human-annotated semantic similarity scores to a set of 508 carefully selected emoji pairs. After validation with EmoSim508, we present a real-world use-case of our emoji embedding models using a sentiment analysis task and show that our models outperform the previous best-performing emoji embedding model on this task. The EmoSim508 dataset and our emoji embedding models are publicly released with this paper and can be downloaded from http://emojinet.knoesis.org/.
[ { "version": "v1", "created": "Fri, 14 Jul 2017 22:08:15 GMT" } ]
2017-07-18T00:00:00
[ [ "Wijeratne", "Sanjaya", "" ], [ "Balasuriya", "Lakshika", "" ], [ "Sheth", "Amit", "" ], [ "Doran", "Derek", "" ] ]
new_dataset
0.975072
1707.04669
Muhammad Shakir
Hamed Ahmadi, Konstantinos Katzis, Muhammad Zeeshan Shakir
A Novel Airborne Self-organising Architecture for 5G+ Networks
5 pages, 2 figures, conference paper in IEEE VTC-Fall 2017, in Proceedings IEEE Vehicular Technology Conference (VTC-Fall 2017), Toronto, Canada, Sep. 2017
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network Flying Platforms (NFPs) such as unmanned aerial vehicles, unmanned balloons or drones flying at low/medium/high altitude can be employed to enhance network coverage and capacity by deploying a swarm of flying platforms that implement novel radio resource management techniques. In this paper, we propose a novel layered architecture where NFPs, of various types and flying at low/medium/high layers in a swarm of flying platforms, are considered as an integrated part of the future cellular networks to inject additional capacity and expand the coverage for exceptional scenarios (sports events, concerts, etc.) and hard-to-reach areas (rural or sparsely populated areas). Successful roll-out of the proposed architecture depends on several factors including, but are not limited to: network optimisation for NFP placement and association, safety operations of NFP for network/equipment security, and reliability for NFP transport and control/signaling mechanisms. In this work, we formulate the optimum placement of NFP at a Lower Layer (LL) by exploiting the airborne Self-organising Network (SON) features. Our initial simulations show the NFP-LL can serve more User Equipment (UE)s using this placement technique.
[ { "version": "v1", "created": "Sat, 15 Jul 2017 00:44:30 GMT" } ]
2017-07-18T00:00:00
[ [ "Ahmadi", "Hamed", "" ], [ "Katzis", "Konstantinos", "" ], [ "Shakir", "Muhammad Zeeshan", "" ] ]
new_dataset
0.983555
1707.04678
Alexandros Tsaptsinos
Alexandros Tsaptsinos
Lyrics-Based Music Genre Classification Using a Hierarchical Attention Network
8 pages, 4 figures, ISMIR 2017
null
null
null
cs.IR cs.CL cs.NE
http://creativecommons.org/licenses/by/4.0/
Music genre classification, especially using lyrics alone, remains a challenging topic in Music Information Retrieval. In this study we apply recurrent neural network models to classify a large dataset of intact song lyrics. As lyrics exhibit a hierarchical layer structure - in which words combine to form lines, lines form segments, and segments form a complete song - we adapt a hierarchical attention network (HAN) to exploit these layers and in addition learn the importance of the words, lines, and segments. We test the model over a 117-genre dataset and a reduced 20-genre dataset. Experimental results show that the HAN outperforms both non-neural models and simpler neural models, whilst also classifying over a higher number of genres than previous research. Through the learning process we can also visualise which words or lines in a song the model believes are important to classifying the genre. As a result the HAN provides insights, from a computational perspective, into lyrical structure and language features that differentiate musical genres.
[ { "version": "v1", "created": "Sat, 15 Jul 2017 02:22:41 GMT" } ]
2017-07-18T00:00:00
[ [ "Tsaptsinos", "Alexandros", "" ] ]
new_dataset
0.999488
1707.04738
Marc Mosko
Marc Mosko
CCNx 1.0 Bidirectional Streams
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Content Centric Networks, where one retrieves data based on a given name, not a conventional connection to a server or other device, there is a need for a standard mechanism to establish bi-directional streams. We describe a method to open and maintain such conversations using the techniques of a named data network.
[ { "version": "v1", "created": "Sat, 15 Jul 2017 14:21:22 GMT" } ]
2017-07-18T00:00:00
[ [ "Mosko", "Marc", "" ] ]
new_dataset
0.997336
1707.04749
Marc Mosko
Marc Mosko, Ramesh Ayyagari, Priti Goel, Eric Holmberg, Mark Konezny
A new NS3 Implementation of CCNx 1.0 Protocol
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ccns3Sim project is an open source implementation of the CCNx 1.0 protocols for the NS3 simulator. We describe the implementation and several important features including modularity and process delay simulation. The ccns3Sim implementation is a fresh NS3-specific implementation. Like NS3 itself, it uses C++98 standard, NS3 code style, NS3 smart pointers, NS3 xUnit, and integrates with the NS3 documentation and manual. A user or developer does not need to learn two systems. If one knows NS3, one should be able to get started with the CCNx code right away. A developer can easily use their own implementation of the layer 3 protocol, layer 4 protocol, forwarder, routing protocol, Pending Interest Table (PIT) or Forwarding Information Base (FIB) or Content Store (CS). A user may configure or specify a new implementation for any of these features at runtime in the simulation script. In this paper, we describe the software architecture and give examples of using the simulator. We evaluate the implementation with several example experiments on ICN caching.
[ { "version": "v1", "created": "Sat, 15 Jul 2017 15:20:11 GMT" } ]
2017-07-18T00:00:00
[ [ "Mosko", "Marc", "" ], [ "Ayyagari", "Ramesh", "" ], [ "Goel", "Priti", "" ], [ "Holmberg", "Eric", "" ], [ "Konezny", "Mark", "" ] ]
new_dataset
0.998853
1707.04788
Brandon Morris
Brandon L. Morris, Anthony Skjellum
MPIgnite: An MPI-Like Language and Prototype Implementation for Apache Spark
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scale-out parallel processing based on MPI is a 25-year-old standard with at least another decade of preceding history of enabling technologies in the High Performance Computing community. Newer frameworks such as MapReduce, Hadoop, and Spark represent industrial scalable computing solutions that have received broad adoption because of their comparative simplicity of use, applicability to relevant problems, and ability to harness scalable, distributed resources. While MPI provides performance and portability, it lacks in productivity and fault tolerance. Likewise, Spark is a specific example of a current-generation MapReduce and data-parallel computing infrastructure that addresses those goals but in turn lacks peer communication support to allow featherweight, highly scalable peer-to-peer data-parallel code sections. The key contribution of this paper is to demonstrate how to introduce the collective and point-to-point peer communication concepts of MPI into a Spark environment. This is done in order to produce performance-portable, peer-oriented and group-oriented communication services while retaining the essential, desirable properties of Spark. Additional concepts of fault tolerance and productivity are considered. This approach is offered in contrast to adding MapReduce framework as upper-middleware based on a traditional MPI implementation as baseline infrastructure.
[ { "version": "v1", "created": "Sat, 15 Jul 2017 21:28:03 GMT" } ]
2017-07-18T00:00:00
[ [ "Morris", "Brandon L.", "" ], [ "Skjellum", "Anthony", "" ] ]
new_dataset
0.999424
1707.04832
Marc Mosko
Marc Mosko
Metis CCNx 1.0 Forwarder
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metis is the CCNx 1.0 forwarder that implements the CCNx 1.0 Semantics and Messages draft standards. This document describes how to use Metis and the internal software architecture.
[ { "version": "v1", "created": "Sun, 16 Jul 2017 06:56:51 GMT" } ]
2017-07-18T00:00:00
[ [ "Mosko", "Marc", "" ] ]
new_dataset
0.999551
1707.04917
Meirav Zehavi
Akanksha Agrawal, Daniel Lokshtanov, Pranabendu Misra, Saket Saurabh, Meirav Zehavi
Feedback Vertex Set Inspired Kernel for Chordal Vertex Deletion
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a graph $G$ and a parameter $k$, the Chordal Vertex Deletion (CVD) problem asks whether there exists a subset $U\subseteq V(G)$ of size at most $k$ that hits all induced cycles of size at least 4. The existence of a polynomial kernel for CVD was a well-known open problem in the field of Parameterized Complexity. Recently, Jansen and Pilipczuk resolved this question affirmatively by designing a polynomial kernel for CVD of size $O(k^{161}\log^{58}k)$, and asked whether one can design a kernel of size $O(k^{10})$. While we do not completely resolve this question, we design a significantly smaller kernel of size $O(k^{12}\log^{10}k)$, inspired by the $O(k^2)$-size kernel for Feedback Vertex Set. Furthermore, we introduce the notion of the independence degree of a vertex, which is our main conceptual contribution.
[ { "version": "v1", "created": "Sun, 16 Jul 2017 17:22:08 GMT" } ]
2017-07-18T00:00:00
[ [ "Agrawal", "Akanksha", "" ], [ "Lokshtanov", "Daniel", "" ], [ "Misra", "Pranabendu", "" ], [ "Saurabh", "Saket", "" ], [ "Zehavi", "Meirav", "" ] ]
new_dataset
0.995762
1707.04960
Aidean Sharghi
Aidean Sharghi, Jacob S. Laurel, Boqing Gong
Query-Focused Video Summarization: Dataset, Evaluation, and A Memory Network Based Approach
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have witnessed a resurgence of interest in video summarization. However, one of the main obstacles to the research on video summarization is the user subjectivity - users have various preferences over the summaries. The subjectiveness causes at least two problems. First, no single video summarizer fits all users unless it interacts with and adapts to the individual users. Second, it is very challenging to evaluate the performance of a video summarizer. To tackle the first problem, we explore the recently proposed query-focused video summarization which introduces user preferences in the form of text queries about the video into the summarization process. We propose a memory network parameterized sequential determinantal point process in order to attend the user query onto different video frames and shots. To address the second challenge, we contend that a good evaluation metric for video summarization should focus on the semantic information that humans can perceive rather than the visual features or temporal overlaps. To this end, we collect dense per-video-shot concept annotations, compile a new dataset, and suggest an efficient evaluation method defined upon the concept annotations. We conduct extensive experiments contrasting our video summarizer to existing ones and present detailed analyses about the dataset and the new evaluation method.
[ { "version": "v1", "created": "Sun, 16 Jul 2017 23:11:28 GMT" } ]
2017-07-18T00:00:00
[ [ "Sharghi", "Aidean", "" ], [ "Laurel", "Jacob S.", "" ], [ "Gong", "Boqing", "" ] ]
new_dataset
0.986929
1707.04987
Uma Roy
Uma Roy, Ashwath Thirmulai, Joe Zurier
Online Multi-Armed Bandit
null
null
null
null
cs.AI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a novel variant of the multi-armed bandit problem, in which bandits are streamed one at a time to the player, and at each point, the player can either choose to pull the current bandit or move on to the next bandit. Once a player has moved on from a bandit, they may never visit it again, which is a crucial difference between our problem and classic multi-armed bandit problems. In this online context, we study Bernoulli bandits (bandits with payout Ber($p_i$) for some underlying mean $p_i$) with underlying means drawn i.i.d. from various distributions, including the uniform distribution, and in general, all distributions that have a CDF satisfying certain differentiability conditions near zero. In all cases, we suggest several strategies and investigate their expected performance. Furthermore, we bound the performance of any optimal strategy and show that the strategies we have suggested are indeed optimal up to a constant factor. We also investigate the case where the distribution from which the underlying means are drawn is not known ahead of time. We again, are able to suggest algorithms that are optimal up to a constant factor for this case, given certain mild conditions on the universe of distributions.
[ { "version": "v1", "created": "Mon, 17 Jul 2017 02:55:00 GMT" } ]
2017-07-18T00:00:00
[ [ "Roy", "Uma", "" ], [ "Thirmulai", "Ashwath", "" ], [ "Zurier", "Joe", "" ] ]
new_dataset
0.999105
1707.05015
Ethan Fast
Ethan Fast, Binbin Chen, Julia Mendelsohn, Jonathan Bassen, Michael Bernstein
Iris: A Conversational Agent for Complex Tasks
null
null
null
null
cs.HC cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today's conversational agents are restricted to simple standalone commands. In this paper, we present Iris, an agent that draws on human conversational strategies to combine commands, allowing it to perform more complex tasks that it has not been explicitly designed to support: for example, composing one command to "plot a histogram" with another to first "log-transform the data". To enable this complexity, we introduce a domain specific language that transforms commands into automata that Iris can compose, sequence, and execute dynamically by interacting with a user through natural language, as well as a conversational type system that manages what kinds of commands can be combined. We have designed Iris to help users with data science tasks, a domain that requires support for command combination. In evaluation, we find that data scientists complete a predictive modeling task significantly faster (2.6 times speedup) with Iris than a modern non-conversational programming environment. Iris supports the same kinds of commands as today's agents, but empowers users to weave together these commands to accomplish complex goals.
[ { "version": "v1", "created": "Mon, 17 Jul 2017 06:55:43 GMT" } ]
2017-07-18T00:00:00
[ [ "Fast", "Ethan", "" ], [ "Chen", "Binbin", "" ], [ "Mendelsohn", "Julia", "" ], [ "Bassen", "Jonathan", "" ], [ "Bernstein", "Michael", "" ] ]
new_dataset
0.998848
1707.05224
Kumar Sankar Ray
Kumar S. Ray, Anit Chakraborty, Sayandip Dutta
Detection, Recognition and Tracking of Moving Objects from Real-time Video via Visual Vocabulary Model and Species Inspired PSO
null
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the basic problem of recognizing moving objects in video images using Visual Vocabulary model and Bag of Words and track our object of interest in the subsequent video frames using species inspired PSO. Initially, the shadow free images are obtained by background modelling followed by foreground modeling to extract the blobs of our object of interest. Subsequently, we train a cubic SVM with human body datasets in accordance with our domain of interest for recognition and tracking. During training, using the principle of Bag of Words we extract necessary features of certain domains and objects for classification. Subsequently, matching these feature sets with those of the extracted object blobs that are obtained by subtracting the shadow free background from the foreground, we detect successfully our object of interest from the test domain. The performance of the classification by cubic SVM is satisfactorily represented by confusion matrix and ROC curve reflecting the accuracy of each module. After classification, our object of interest is tracked in the test domain using species inspired PSO. By combining the adaptive learning tools with the efficient classification of description, we achieve optimum accuracy in recognition of the moving objects. We evaluate our algorithm benchmark datasets: iLIDS, VIVID, Walking2, Woman. Comparative analysis of our algorithm against the existing state-of-the-art trackers shows very satisfactory and competitive results.
[ { "version": "v1", "created": "Fri, 2 Jun 2017 11:09:10 GMT" } ]
2017-07-18T00:00:00
[ [ "Ray", "Kumar S.", "" ], [ "Chakraborty", "Anit", "" ], [ "Dutta", "Sayandip", "" ] ]
new_dataset
0.958319
1707.04251
Bernhard Bliem
Bernhard Bliem and Stefan Woltran
Defensive Alliances in Graphs of Bounded Treewidth
18 pages, 9 figures. arXiv admin note: substantial text overlap with arXiv:1411.6549
null
null
null
cs.CC
http://creativecommons.org/licenses/by/4.0/
A set S of vertices of a graph is a defensive alliance if, for each element of S, the majority of its neighbors is in S. The problem of finding a defensive alliance of minimum size in a given graph is NP-hard and there are polynomial-time algorithms if certain parameters are bounded by a fixed constant. In particular, fixed-parameter tractability results have been obtained for some structural parameters such as the vertex cover number. However, for the parameter treewidth, the question of whether the problem is FPT has remained open. This is unfortunate because treewidth is perhaps the most prominent graph parameter and has proven successful for many problems. In this work, we give a negative answer by showing that the problem is W[1]-hard when parameterized by treewidth, which rules out FPT algorithms under common assumptions. This is surprising since the problem is known to be FPT when parameterized by solution size and "subset problems" that satisfy this property usually tend to be FPT for bounded treewidth as well. We prove W[1]-hardness by using techniques from a recent hardness result for the problem of finding so-called secure sets in a graph.
[ { "version": "v1", "created": "Wed, 12 Jul 2017 18:13:31 GMT" } ]
2017-07-17T00:00:00
[ [ "Bliem", "Bernhard", "" ], [ "Woltran", "Stefan", "" ] ]
new_dataset
0.999135
1707.04330
Marcus Hanwell
Marcus D. Hanwell and Wibe A. de Jong and Christopher J. Harris
Open Chemistry: RESTful Web APIs, JSON, NWChem and the Modern Web Application
null
null
null
null
cs.SE
http://creativecommons.org/licenses/by/4.0/
An end-to-end platform for chemical science research has been developed that integrates data from computational and experimental approaches through a modern web-based interface. The platform offers a highly interactive visualization and analytics environment that functions well on mobile, laptop and desktop devices. It offers pragmatic solutions to ensure that large and complex data sets are more accessible. Existing desktop applications/frameworks were extended to integrate with high-performance computing (HPC) resources, and offer command-line tools to automate interaction---connecting distributed teams to this software platform on their own terms. The platform was developed openly, and all source code hosted on the GitHub platform with automated deployment possible using Ansible coupled with standard Ubuntu-based machine images deployed to cloud machines. The platform is designed to enable teams to reap the benefits of the connected web---going beyond what conventional search and analytics platforms offer in this area. It also has the goal of offering federated instances, that can be customized to the sites/research performed. Data gets stored using JSON, extending upon previous approaches using XML, building structures that support computational chemistry calculations. These structures were developed to make it easy to process data across different languages, and send data to a JavaScript web client.
[ { "version": "v1", "created": "Thu, 13 Jul 2017 21:27:27 GMT" } ]
2017-07-17T00:00:00
[ [ "Hanwell", "Marcus D.", "" ], [ "de Jong", "Wibe A.", "" ], [ "Harris", "Christopher J.", "" ] ]
new_dataset
0.987494
1707.04449
Yoshiaki Katayama
Takashi Okumura, Koichi Wada, Yoshiaki Katayama
Optimal Asynchronous Rendezvous for Mobile Robots with Lights
15 pages, 3 figures, 1 table
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a Rendezvous problem for 2 autonomous mobile robots in asynchronous settings with persistent memory called light. It is well known that Rendezvous is impossible when robots have no lights in basic common models, even if the system is semi-synchronous. On the other hand, Rendezvous is possible if robots have lights with a constant number of colors in several types lights. In asynchronous settings, Rendezvous can be solved by robots with 4 colors of lights in non-rigid movement, if robots can use not only own light but also other robot's light (full-light), where non-rigid movement means robots may be stopped before reaching the computed destination but can move a minimum distance \delta > 0 and rigid movement means robots can reach the computed destination. In semi-synchronous settings, Rendezvous can be solved with 2 colors of full-lights in non-rigid movement. In this paper, we show that in asynchronous settings, Rendezvous can be solved with 2 colors of full-lights in rigid movement and in non-rigid movement if robots know the value of the minimum distance \delta. We also show that Rendezvous can be solved with 2 colors of full-lights in general non-rigid movement if we consider some reasonable restricted class of asynchronous settings.
[ { "version": "v1", "created": "Fri, 14 Jul 2017 10:37:09 GMT" } ]
2017-07-17T00:00:00
[ [ "Okumura", "Takashi", "" ], [ "Wada", "Koichi", "" ], [ "Katayama", "Yoshiaki", "" ] ]
new_dataset
0.981776
1707.04507
Jeremy Sproston
Jeremy Sproston
Probabilistic Timed Automata with Clock-Dependent Probabilities
Full version of a paper published at RP 2017
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probabilistic timed automata are classical timed automata extended with discrete probability distributions over edges. We introduce clock-dependent probabilistic timed automata, a variant of probabilistic timed automata in which transition probabilities can depend linearly on clock values. Clock-dependent probabilistic timed automata allow the modelling of a continuous relationship between time passage and the likelihood of system events. We show that the problem of deciding whether the maximum probability of reaching a certain location is above a threshold is undecidable for clock-dependent probabilistic timed automata. On the other hand, we show that the maximum and minimum probability of reaching a certain location in clock-dependent probabilistic timed automata can be approximated using a region-graph-based approach.
[ { "version": "v1", "created": "Fri, 14 Jul 2017 13:47:30 GMT" } ]
2017-07-17T00:00:00
[ [ "Sproston", "Jeremy", "" ] ]
new_dataset
0.997558
1707.04538
Tomasz Jurczyk
Tomasz Jurczyk, Jinho D. Choi
Cross-genre Document Retrieval: Matching between Conversational and Formal Writings
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper challenges a cross-genre document retrieval task, where the queries are in formal writing and the target documents are in conversational writing. In this task, a query, is a sentence extracted from either a summary or a plot of an episode in a TV show, and the target document consists of transcripts from the corresponding episode. To establish a strong baseline, we employ the current state-of-the-art search engine to perform document retrieval on the dataset collected for this work. We then introduce a structure reranking approach to improve the initial ranking by utilizing syntactic and semantic structures generated by NLP tools. Our evaluation shows an improvement of more than 4% when the structure reranking is applied, which is very promising.
[ { "version": "v1", "created": "Fri, 14 Jul 2017 15:21:25 GMT" } ]
2017-07-17T00:00:00
[ [ "Jurczyk", "Tomasz", "" ], [ "Choi", "Jinho D.", "" ] ]
new_dataset
0.97347
1707.04550
Jind\v{r}ich Helcl
Jind\v{r}ich Helcl and Jind\v{r}ich Libovick\'y
CUNI System for the WMT17 Multimodal Translation Task
8 pages; Camera-ready submission to WMT17
null
null
null
cs.CL cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe our submissions to the WMT17 Multimodal Translation Task. For Task 1 (multimodal translation), our best scoring system is a purely textual neural translation of the source image caption to the target language. The main feature of the system is the use of additional data that was acquired by selecting similar sentences from parallel corpora and by data synthesis with back-translation. For Task 2 (cross-lingual image captioning), our best submitted system generates an English caption which is then translated by the best system used in Task 1. We also present negative results, which are based on ideas that we believe have potential of making improvements, but did not prove to be useful in our particular setup.
[ { "version": "v1", "created": "Fri, 14 Jul 2017 15:58:47 GMT" } ]
2017-07-17T00:00:00
[ [ "Helcl", "Jindřich", "" ], [ "Libovický", "Jindřich", "" ] ]
new_dataset
0.979015
1606.07876
Michele Amoretti
Michele Amoretti and Francesco Zanichelli
P2P-PL: A Pattern Language to Design Efficient and Robust Peer-to-Peer Systems
43 pages, 27 figures
null
10.1007/s12083-017-0551-y
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To design peer-to-peer (P2P) software systems is a challenging task, because of their highly decentralized nature, which may cause unexpected emergent global behaviors. The last fifteen years have seen many P2P applications to come out and win favor with millions of users. From success histories of applications like BitTorrent, Skype, MyP2P we have learnt a number of useful design patterns. Thus, in this article we present a P2P pattern language (shortly, P2P-PL) which encompasses all the aspects that a fully effective and efficient P2P software system should provide, namely consistency of stored data, redundancy, load balancing, coping with asymmetric bandwidth, decentralized security. The patterns of the proposed P2P-PL are described in detail, and a composition strategy for designing robust, effective and efficient P2P software systems is proposed.
[ { "version": "v1", "created": "Sat, 25 Jun 2016 07:14:47 GMT" } ]
2017-07-14T00:00:00
[ [ "Amoretti", "Michele", "" ], [ "Zanichelli", "Francesco", "" ] ]
new_dataset
0.985781
1703.03468
Manikanta Kotaru
Manikanta Kotaru, Sachin Katti
Position Tracking for Virtual Reality Using Commodity WiFi
null
null
null
null
cs.CV cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today, experiencing virtual reality (VR) is a cumbersome experience which either requires dedicated infrastructure like infrared cameras to track the headset and hand-motion controllers (e.g., Oculus Rift, HTC Vive), or provides only 3-DoF (Degrees of Freedom) tracking which severely limits the user experience (e.g., Samsung Gear). To truly enable VR everywhere, we need position tracking to be available as a ubiquitous service. This paper presents WiCapture, a novel approach which leverages commodity WiFi infrastructure, which is ubiquitous today, for tracking purposes. We prototype WiCapture using off-the-shelf WiFi radios and show that it achieves an accuracy of 0.88 cm compared to sophisticated infrared based tracking systems like the Oculus, while providing much higher range, resistance to occlusion, ubiquity and ease of deployment.
[ { "version": "v1", "created": "Thu, 9 Mar 2017 21:19:48 GMT" }, { "version": "v2", "created": "Wed, 12 Jul 2017 18:12:40 GMT" } ]
2017-07-14T00:00:00
[ [ "Kotaru", "Manikanta", "" ], [ "Katti", "Sachin", "" ] ]
new_dataset
0.969384
1706.03799
Maxwell Forbes
Maxwell Forbes, Yejin Choi
Verb Physics: Relative Physical Knowledge of Actions and Objects
11 pages, published in Proceedings of ACL 2017
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning commonsense knowledge from natural language text is nontrivial due to reporting bias: people rarely state the obvious, e.g., "My house is bigger than me." However, while rarely stated explicitly, this trivial everyday knowledge does influence the way people talk about the world, which provides indirect clues to reason about the world. For example, a statement like, "Tyler entered his house" implies that his house is bigger than Tyler. In this paper, we present an approach to infer relative physical knowledge of actions and objects along five dimensions (e.g., size, weight, and strength) from unstructured natural language text. We frame knowledge acquisition as joint inference over two closely related problems: learning (1) relative physical knowledge of object pairs and (2) physical implications of actions when applied to those object pairs. Empirical results demonstrate that it is possible to extract knowledge of actions and objects from language and that joint inference over different types of knowledge improves performance.
[ { "version": "v1", "created": "Mon, 12 Jun 2017 18:24:25 GMT" }, { "version": "v2", "created": "Thu, 13 Jul 2017 02:19:45 GMT" } ]
2017-07-14T00:00:00
[ [ "Forbes", "Maxwell", "" ], [ "Choi", "Yejin", "" ] ]
new_dataset
0.996755
1707.03914
Khaled Elbassioni
Khaled Elbassioni and Kazuhisa Makino
Enumerating Vertices of $0/1$-Polyhedra associated with $0/1$-Totally Unimodular Matrices
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an incremental polynomial time algorithm for enumerating the vertices of any polyhedron $\mathcal{P}(A,\mathbf{1})=\{x\in\RR^n \mid Ax\geq \b1,~x\geq \b0\}$, when $A$ is a totally unimodular matrix. Our algorithm is based on decomposing the hypergraph transversal problem for unimodular hypergraphs using Seymour's decomposition of totally unimodular matrices, and may be of independent interest.
[ { "version": "v1", "created": "Wed, 12 Jul 2017 21:13:08 GMT" } ]
2017-07-14T00:00:00
[ [ "Elbassioni", "Khaled", "" ], [ "Makino", "Kazuhisa", "" ] ]
new_dataset
0.984535
1707.04122
EPTCS
Sebastian Arming (University of Salzburg), Ezio Bartocci (TU Wien), Ana Sokolova (Uni)
SEA-PARAM: Exploring Schedulers in Parametric MDPs
In Proceedings QAPL 2017, arXiv:1707.03668
EPTCS 250, 2017, pp. 25-38
10.4204/EPTCS.250.3
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study parametric Markov decision processes (PMDPs) and their reachability probabilities "independent" of the parameters. Different to existing work on parameter synthesis (implemented in the tools PARAM and PRISM), our main focus is on describing different types of optimal deterministic memoryless schedulers for the whole parameter range. We implement a simple prototype tool SEA-PARAM that computes these optimal schedulers and show experimental results.
[ { "version": "v1", "created": "Thu, 13 Jul 2017 13:51:45 GMT" } ]
2017-07-14T00:00:00
[ [ "Arming", "Sebastian", "", "University of Salzburg" ], [ "Bartocci", "Ezio", "", "TU Wien" ], [ "Sokolova", "Ana", "", "Uni" ] ]
new_dataset
0.955606
1707.04210
Lei Shi
Lei Shi, Tao Jiang, Ye Zhao, Xiatian Zhang and Yao Lu
UrbanFACET: Visually Profiling Cities from Mobile Device Recorded Movement Data of Millions of City Residents
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cities are living systems where urban infrastructures and their functions are defined and evolved due to population behaviors. Profiling the cities and functional regions has been an important topic in urban design and planning. This paper studies a unique big data set which includes daily movement data of tens of millions of city residents, and develop a visual analytics system, namely UrbanFACET, to discover and visualize the dynamical profiles of multiple cities and their residents. This big user movement data set, acquired from mobile users' agnostic check-ins at thousands of phone APPs, is well utilized in an integrative study and visualization together with urban structure (e.g., road network) and POI (Point of Interest) distributions. In particular, we novelly develop a set of information-theory based metrics to characterize the mobility patterns of city areas and groups of residents. These multifaceted metrics including Fluidity, vibrAncy, Commutation, divErsity, and densiTy (FACET) which categorize and manifest hidden urban functions and behaviors. UrbanFACET system further allows users to visually analyze and compare the metrics over different areas and cities in metropolitan scales. The system is evaluated through both case studies on several big and heavily populated cities, and user studies involving real-world users.
[ { "version": "v1", "created": "Thu, 13 Jul 2017 16:37:02 GMT" } ]
2017-07-14T00:00:00
[ [ "Shi", "Lei", "" ], [ "Jiang", "Tao", "" ], [ "Zhao", "Ye", "" ], [ "Zhang", "Xiatian", "" ], [ "Lu", "Yao", "" ] ]
new_dataset
0.987931
1707.04244
Preeti Bhargava
Preeti Bhargava and Nemanja Spasojevic and Guoning Hu
Lithium NLP: A System for Rich Information Extraction from Noisy User Generated Text on Social Media
9 pages, 6 figures, 2 tables, EMNLP 2017 Workshop on Noisy User Generated Text WNUT 2017
null
null
null
cs.AI cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe the Lithium Natural Language Processing (NLP) system - a resource-constrained, high- throughput and language-agnostic system for information extraction from noisy user generated text on social media. Lithium NLP extracts a rich set of information including entities, topics, hashtags and sentiment from text. We discuss several real world applications of the system currently incorporated in Lithium products. We also compare our system with existing commercial and academic NLP systems in terms of performance, information extracted and languages supported. We show that Lithium NLP is at par with and in some cases, outperforms state- of-the-art commercial NLP systems.
[ { "version": "v1", "created": "Thu, 13 Jul 2017 17:52:51 GMT" } ]
2017-07-14T00:00:00
[ [ "Bhargava", "Preeti", "" ], [ "Spasojevic", "Nemanja", "" ], [ "Hu", "Guoning", "" ] ]
new_dataset
0.998509
1701.06681
Achilleas Anastasopoulos
Achilleas Anastasopoulos and Jui Wu
Variable-length codes for channels with memory and feedback: error-exponent lower bounds
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The reliability function of memoryless channels with noiseless feedback and variable-length coding has been found to be a linear function of the average rate in the classic work of Burnashev. In this work we consider unifilar channels with noiseless feedback and study specific transmission schemes, the performance of which provides lower bounds for the channel reliability function. In unifilar channels the channel state evolves in a deterministic fashion based on the previous state, input, and output, and is known to the transmitter but is unknown to the receiver. We consider a two-stage transmission scheme. In the first stage, both transmitter and receiver summarize their common information in an M-dimensional vector with elements in the state space of the unifilar channel and an M-dimensional probability mass function, with M being the number of messages. The second stage, which is entered when one of the messages is sufficiently reliable, is resolving a binary hypothesis testing problem. The analysis assumes the presence of some common randomness shared by the transmitter and receiver, and is based on the study of the log-likelihood ratio of the transmitted message posterior belief, and in particular on the study of its multi-step drift. Simulation results confirm that the bounds are tight compared to the upper bounds derived in a companion paper.
[ { "version": "v1", "created": "Mon, 23 Jan 2017 23:46:29 GMT" }, { "version": "v2", "created": "Mon, 6 Feb 2017 00:24:15 GMT" }, { "version": "v3", "created": "Sun, 12 Feb 2017 23:07:30 GMT" }, { "version": "v4", "created": "Fri, 24 Feb 2017 23:59:04 GMT" }, { "version": "v5", "created": "Wed, 12 Jul 2017 14:58:51 GMT" } ]
2017-07-13T00:00:00
[ [ "Anastasopoulos", "Achilleas", "" ], [ "Wu", "Jui", "" ] ]
new_dataset
0.977012
1705.04111
Andreas Jakoby
Andreas Jakoby, Naveen Kumar Goswami, Eik List, Stefan Lucks
Critical Graphs for Minimum Vertex Cover
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the context of the chromatic-number problem, a critical graph is an instance where the deletion of any element would decrease the graph's chromatic number. Such instances have shown to be interesting objects of study for deepen the understanding of the optimization problem. This work introduces critical graphs in context of Minimum Vertex Cover. We demonstrate their potential for the generation of larger graphs with hidden a priori known solutions. Firstly, we propose a parametrized graph-generation process which preserves the knowledge of the minimum cover. Secondly, we conduct a systematic search for small critical graphs. Thirdly, we illustrate the applicability for benchmarking purposes by reporting on a series of experiments using the state-of-the-art heuristic solver NuMVC.
[ { "version": "v1", "created": "Thu, 11 May 2017 11:08:08 GMT" }, { "version": "v2", "created": "Wed, 12 Jul 2017 14:21:55 GMT" } ]
2017-07-13T00:00:00
[ [ "Jakoby", "Andreas", "" ], [ "Goswami", "Naveen Kumar", "" ], [ "List", "Eik", "" ], [ "Lucks", "Stefan", "" ] ]
new_dataset
0.995408
1706.07960
Seil Na
Seil Na, Youngjae Yu, Sangho Lee, Jisung Kim, Gunhee Kim
Encoding Video and Label Priors for Multi-label Video Classification on YouTube-8M dataset
accepted at Youtube-8M CVPR'17 Workshop as Oral Presentation. Kaggle 8th model
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
YouTube-8M is the largest video dataset for multi-label video classification. In order to tackle the multi-label classification on this challenging dataset, it is necessary to solve several issues such as temporal modeling of videos, label imbalances, and correlations between labels. We develop a deep neural network model, which consists of four components: the frame encoder, the classification layer, the label processing layer, and the loss function. We introduce our newly proposed methods and discusses how existing models operate in the YouTube-8M Classification Task, what insights they have, and why they succeed (or fail) to achieve good performance. Most of the models we proposed are very high compared to the baseline models, and the ensemble of the models we used is 8th in the Kaggle Competition.
[ { "version": "v1", "created": "Sat, 24 Jun 2017 13:50:41 GMT" }, { "version": "v2", "created": "Wed, 12 Jul 2017 05:33:50 GMT" } ]
2017-07-13T00:00:00
[ [ "Na", "Seil", "" ], [ "Yu", "Youngjae", "" ], [ "Lee", "Sangho", "" ], [ "Kim", "Jisung", "" ], [ "Kim", "Gunhee", "" ] ]
new_dataset
0.987893
1707.03341
Dave Morris
D. Morris, S. Voutsinas, N.C. Hambly and R.G. Mann
Use of Docker for deployment and testing of astronomy software
29 pages, 9 figures, accepted for publication in Astronomy and Computing, ref ASCOM199
null
null
null
cs.SE astro-ph.IM
http://creativecommons.org/licenses/by-sa/4.0/
We describe preliminary investigations of using Docker for the deployment and testing of astronomy software. Docker is a relatively new containerisation technology that is developing rapidly and being adopted across a range of domains. It is based upon virtualization at operating system level, which presents many advantages in comparison to the more traditional hardware virtualization that underpins most cloud computing infrastructure today. A particular strength of Docker is its simple format for describing and managing software containers, which has benefits for software developers, system administrators and end users. We report on our experiences from two projects -- a simple activity to demonstrate how Docker works, and a more elaborate set of services that demonstrates more of its capabilities and what they can achieve within an astronomical context -- and include an account of how we solved problems through interaction with Docker's very active open source development community, which is currently the key to the most effective use of this rapidly-changing technology.
[ { "version": "v1", "created": "Tue, 11 Jul 2017 16:12:08 GMT" } ]
2017-07-13T00:00:00
[ [ "Morris", "D.", "" ], [ "Voutsinas", "S.", "" ], [ "Hambly", "N. C.", "" ], [ "Mann", "R. G.", "" ] ]
new_dataset
0.998517
1707.03491
Hui Fang
Hui Fang, Meng Zhang
Creatism: A deep-learning photographer capable of creating professional work
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine-learning excels in many areas with well-defined goals. However, a clear goal is usually not available in art forms, such as photography. The success of a photograph is measured by its aesthetic value, a very subjective concept. This adds to the challenge for a machine learning approach. We introduce Creatism, a deep-learning system for artistic content creation. In our system, we break down aesthetics into multiple aspects, each can be learned individually from a shared dataset of professional examples. Each aspect corresponds to an image operation that can be optimized efficiently. A novel editing tool, dramatic mask, is introduced as one operation that improves dramatic lighting for a photo. Our training does not require a dataset with before/after image pairs, or any additional labels to indicate different aspects in aesthetics. Using our system, we mimic the workflow of a landscape photographer, from framing for the best composition to carrying out various post-processing operations. The environment for our virtual photographer is simulated by a collection of panorama images from Google Street View. We design a "Turing-test"-like experiment to objectively measure quality of its creations, where professional photographers rate a mixture of photographs from different sources blindly. Experiments show that a portion of our robot's creation can be confused with professional work.
[ { "version": "v1", "created": "Tue, 11 Jul 2017 23:18:50 GMT" } ]
2017-07-13T00:00:00
[ [ "Fang", "Hui", "" ], [ "Zhang", "Meng", "" ] ]
new_dataset
0.998224
1707.03569
Georgios Balikas
Georgios Balikas, Simon Moura, Massih-Reza Amini
Multitask Learning for Fine-Grained Twitter Sentiment Analysis
International ACM SIGIR Conference on Research and Development in Information Retrieval 2017
null
10.1145/3077136.3080702
null
cs.IR cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional sentiment analysis approaches tackle problems like ternary (3-category) and fine-grained (5-category) classification by learning the tasks separately. We argue that such classification tasks are correlated and we propose a multitask approach based on a recurrent neural network that benefits by jointly learning them. Our study demonstrates the potential of multitask models on this type of problems and improves the state-of-the-art results in the fine-grained sentiment classification problem.
[ { "version": "v1", "created": "Wed, 12 Jul 2017 07:17:50 GMT" } ]
2017-07-13T00:00:00
[ [ "Balikas", "Georgios", "" ], [ "Moura", "Simon", "" ], [ "Amini", "Massih-Reza", "" ] ]
new_dataset
0.97647
1707.03720
Y F Li
F. Li, J. Du
Multiband NFC for High-Throughput Wireless Computer Vision Sensor Network
6 pages
null
null
null
cs.NI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vision sensors lie in the heart of computer vision. In many computer vision applications, such as AR/VR, non-contacting near-field communication (NFC) with high throughput is required to transfer information to algorithms. In this work, we proposed a novel NFC system which utilizes multiple frequency bands to achieve high throughput.
[ { "version": "v1", "created": "Sun, 28 May 2017 06:43:29 GMT" } ]
2017-07-13T00:00:00
[ [ "Li", "F.", "" ], [ "Du", "J.", "" ] ]
new_dataset
0.997076
1707.03751
Valdis Vitolins
MacKenzie Cumings, Valdis V\=itoli\c{n}\v{s}
New Symbols for Base-16 and Base-256 Numerals
null
International Journal of Computer Science & Engineering Technology (2017) pp. 205-212. ISSN 2229-3345
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
A new system of hexadecimal and base-256 numerals is proposed whose digit shapes are based on binary numerals. The proposed numerals are implemented in open source fonts and integrated into popular editors (Notepad++ and Eclipse) to prove the concept.
[ { "version": "v1", "created": "Wed, 5 Jul 2017 13:50:20 GMT" } ]
2017-07-13T00:00:00
[ [ "Cumings", "MacKenzie", "" ], [ "Vītoliņš", "Valdis", "" ] ]
new_dataset
0.998296