id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1707.03753
Valdis Vitolins
Valdis Vitolins
Modernized Latvian Ergonomic Keyboard
7 pages, 7 figures, presented in conference of Latvian Ergonomic Society on 2011
null
null
null
cs.HC
http://creativecommons.org/licenses/by/4.0/
Increasingly more people use computers and create content using keyboards (even with leading edge touch-screen technology). As in the most part of the world, in Latvia also conventional "Qwerty" keyboard is used. Though for Latvian it is much worse than for English, especially due to enormous load to little fingers. It causes repetitive strain injuries and affects productivity of workers with extensive keyboard usage, especially for data input operators, call centers, inquiry office workers, etc. Improving computer keyboard layout decrease stress to hands and fingers thus minimizing exhaustion and injuries. With analysis of English and Latvian public domain novels and modern texts, letter appearance an sequence distribution for Latvian language was found. Qualities of alternative layouts for English (Dvorak, Colemak, Hallinstad) were investigated and open source carpalx simulation tool was adjusted according to the findings. Then carpalx was used to check more than 25 million keyboard layouts, measuring finger/hand effort, stroke typing convenience etc., to find the best one. It was proved that existing "\v{S}usildatec" (classic Latvian Ergonomic standard) keyboard is only slightly better than "Qwerty" for Latvian, though it is much worse for English. After computer simulation, several best layouts were tried practically for more than 6 months and most convenient one was promoted as a new "Latvian Modern" keyboard. Its typing effort is less than for "\v{S}usildatec", load is distributed according to finger strength, and typing strokes are alternating better between hands and fingers. Comparing to "Qwerty" keyboard new layout is better not only for Latvian but for English also. Keyboard drivers are developed for Microsoft Windows and Linux operating systems and are freely available in the web under permissive license.
[ { "version": "v1", "created": "Wed, 5 Jul 2017 13:51:33 GMT" } ]
2017-07-13T00:00:00
[ [ "Vitolins", "Valdis", "" ] ]
new_dataset
0.999626
1707.03778
Amira Ghenai
Amira Ghenai, Yelena Mejova
Catching Zika Fever: Application of Crowdsourcing and Machine Learning for Tracking Health Misinformation on Twitter
11 pages, 7 figures, short version to be published in the Fifth IEEE International Conference on Healthcare Informatics (ICHI 2017)
null
null
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In February 2016, World Health Organization declared the Zika outbreak a Public Health Emergency of International Concern. With developing evidence it can cause birth defects, and the Summer Olympics coming up in the worst affected country, Brazil, the virus caught fire on social media. In this work, use Zika as a case study in building a tool for tracking the misinformation around health concerns on Twitter. We collect more than 13 million tweets -- spanning the initial reports in February 2016 and the Summer Olympics -- regarding the Zika outbreak and track rumors outlined by the World Health Organization and Snopes fact checking website. The tool pipeline, which incorporates health professionals, crowdsourcing, and machine learning, allows us to capture health-related rumors around the world, as well as clarification campaigns by reputable health organizations. In the case of Zika, we discover an extremely bursty behavior of rumor-related topics, and show that, once the questionable topic is detected, it is possible to identify rumor-bearing tweets using automated techniques. Thus, we illustrate insights the proposed tools provide into potentially harmful information on social media, allowing public health researchers and practitioners to respond with a targeted and timely action.
[ { "version": "v1", "created": "Wed, 12 Jul 2017 15:55:20 GMT" } ]
2017-07-13T00:00:00
[ [ "Ghenai", "Amira", "" ], [ "Mejova", "Yelena", "" ] ]
new_dataset
0.989097
1408.5681
Louay Bazzi
Louay Bazzi
Weight distribution of cosets of small codes with good dual properties
null
IEEE Transactions on Information Theory. Volume: 61, Issue: 12, Dec. 2015
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The bilateral minimum distance of a binary linear code is the maximum $d$ such that all nonzero codewords have weights between $d$ and $n-d$. Let $Q\subset \{0,1\}^n$ be a binary linear code whose dual has bilateral minimum distance at least $d$, where $d$ is odd. Roughly speaking, we show that the average $L_\infty$-distance -- and consequently the $L_1$-distance -- between the weight distribution of a random cosets of $Q$ and the binomial distribution decays quickly as the bilateral minimum distance $d$ of the dual of $Q$ increases. For $d = \Theta(1)$, it decays like $n^{-\Theta(d)}$. On the other $d=\Theta(n)$ extreme, it decays like and $e^{-\Theta(d)}$. It follows that, almost all cosets of $Q$ have weight distributions very close to the to the binomial distribution. In particular, we establish the following bounds. If the dual of $Q$ has bilateral minimum distance at least $d=2t+1$, where $t\geq 1$ is an integer, then the average $L_\infty$-distance is at most $\min\{\left(e\ln{\frac{n}{2t}}\right)^{t}\left(\frac{2t}{n}\right)^{\frac{t}{2} }, \sqrt{2} e^{-\frac{t}{10}}\}$. For the average $L_1$-distance, we conclude the bound $\min\{(2t+1)\left(e\ln{\frac{n}{2t}}\right)^{t} \left(\frac{2t}{n}\right)^{\frac{t}{2}-1},\sqrt{2}(n+1)e^{-\frac{t}{10}}\}$, which gives nontrivial results for $t\geq 3$. We given applications to the weight distribution of cosets of extended Hadamard codes and extended dual BCH codes. Our argument is based on Fourier analysis, linear programming, and polynomial approximation techniques.
[ { "version": "v1", "created": "Mon, 25 Aug 2014 08:38:44 GMT" }, { "version": "v2", "created": "Mon, 12 Jan 2015 09:58:24 GMT" }, { "version": "v3", "created": "Sun, 16 Aug 2015 02:11:56 GMT" }, { "version": "v4", "created": "Mon, 10 Jul 2017 20:22:23 GMT" } ]
2017-07-12T00:00:00
[ [ "Bazzi", "Louay", "" ] ]
new_dataset
0.961346
1705.08506
Attila Kertesz-Farkas
Roman Chereshnev, Attila Kertesz-Farkas
HuGaDB: Human Gait Database for Activity Recognition from Wearable Inertial Sensor Networks
4 Figures, 3 tables
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a human gait data collection for analysis and activity recognition consisting of continues recordings of combined activities, such as walking, running, taking stairs up and down, sitting down, and so on; and the data recorded are segmented and annotated. Data were collected from a body sensor network consisting of six wearable inertial sensors (accelerometer and gyroscope) located on the right and left thighs, shins, and feet. Additionally, two electromyography sensors were used on the quadriceps (front thigh) to measure muscle activity. This database can be used not only for activity recognition but also for studying how activities are performed and how the parts of the legs move relative to each other. Therefore, the data can be used (a) to perform health-care-related studies, such as in walking rehabilitation or Parkinson's disease recognition, (b) in virtual reality and gaming for simulating humanoid motion, or (c) for humanoid robotics to model humanoid walking. This dataset is the first of its kind which provides data about human gait in great detail. The database is available free of charge https://github.com/romanchereshnev/HuGaDB.
[ { "version": "v1", "created": "Wed, 10 May 2017 13:36:38 GMT" }, { "version": "v2", "created": "Tue, 11 Jul 2017 14:25:43 GMT" } ]
2017-07-12T00:00:00
[ [ "Chereshnev", "Roman", "" ], [ "Kertesz-Farkas", "Attila", "" ] ]
new_dataset
0.999426
1706.06291
Denis Parra
Gabriel Sepulveda, Vicente Dominguez and Denis Parra
pyRecLab: A Software Library for Quick Prototyping of Recommender Systems
2 pages, poster submited to RecSys 2017 conference
null
null
null
cs.SE cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces pyRecLab, a software library written in C++ with Python bindings which allows to quickly train, test and develop recommender systems. Although there are several software libraries for this purpose, only a few let developers to get quickly started with the most traditional methods, permitting them to try different parameters and approach several tasks without a significant loss of performance. Among the few libraries that have all these features, they are available in languages such as Java, Scala or C#, what is a disadvantage for less experienced programmers more used to the popular Python programming language. In this article we introduce details of pyRecLab, showing as well performance analysis in terms of error metrics (MAE and RMSE) and train/test time. We benchmark it against the popular Java-based library LibRec, showing similar results. We expect programmers with little experience and people interested in quickly prototyping recommender systems to be benefited from pyRecLab.
[ { "version": "v1", "created": "Tue, 20 Jun 2017 07:21:59 GMT" }, { "version": "v2", "created": "Tue, 11 Jul 2017 16:07:20 GMT" } ]
2017-07-12T00:00:00
[ [ "Sepulveda", "Gabriel", "" ], [ "Dominguez", "Vicente", "" ], [ "Parra", "Denis", "" ] ]
new_dataset
0.999425
1707.02999
Constantinos Psomas
Constantinos Psomas, Ioannis Krikidis
Backscatter Communications for Wireless Powered Sensor Networks with Collision Resolution
IEEE Wireless Communications Letters (accepted for publication)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless powered backscatter communications is an attractive technology for next-generation low-powered sensor networks such as the Internet of Things. However, backscattering suffers from collisions due to multiple simultaneous transmissions and a dyadic backscatter channel, which greatly attenuate the received signal at the reader. This letter deals with backscatter communications in sensor networks from a large-scale point-of-view and considers various collision resolution techniques: directional antennas, ultra-narrow band transmissions and successive interference cancellation. We derive analytical expressions for the decoding probability and our results show the significant gains, which can be achieved from the aforementioned techniques.
[ { "version": "v1", "created": "Mon, 10 Jul 2017 18:07:15 GMT" } ]
2017-07-12T00:00:00
[ [ "Psomas", "Constantinos", "" ], [ "Krikidis", "Ioannis", "" ] ]
new_dataset
0.999552
1707.03004
Amir Mohammad Esmaieeli Sikaroudi
Amir Mohammad Esmaieeli Sikaroudi, Sasan Ghaffari, Ali Yousefi, Hassan Sadeghi Naeini
Foot anthropometry device and single object image thresholding
null
Signal & Image Processing : An International Journal (SIPIJ) Vol.8, No.3, June 2017
10.5121/sipij.2017.8301
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a device, algorithm and graphical user interface to obtain anthropometric measurements of foot. Presented device facilitates obtaining scale of image and image processing by taking one image from side foot and underfoot simultaneously. Introduced image processing algorithm minimizes a noise criterion, which is suitable for object detection in single object images and outperforms famous image thresholding methods when lighting condition is poor. Performance of image-based method is compared to manual method. Image-based measurements of underfoot in average was 4mm less than actual measures. Mean absolute error of underfoot length was 1.6mm, however length obtained from side foot had 4.4mm mean absolute error. Furthermore, based on t-test and f-test results, no significant difference between manual and image-based anthropometry observed. In order to maintain anthropometry process performance in different situations user interface designed for handling changes in light conditions and altering speed of the algorithm.
[ { "version": "v1", "created": "Mon, 10 Jul 2017 18:21:03 GMT" } ]
2017-07-12T00:00:00
[ [ "Sikaroudi", "Amir Mohammad Esmaieeli", "" ], [ "Ghaffari", "Sasan", "" ], [ "Yousefi", "Ali", "" ], [ "Naeini", "Hassan Sadeghi", "" ] ]
new_dataset
0.998705
1707.03067
Mingda Zhang
Zaeem Hussain, Mingda Zhang, Xiaozhong Zhang, Keren Ye, Christopher Thomas, Zuha Agha, Nathan Ong, Adriana Kovashka
Automatic Understanding of Image and Video Advertisements
To appear in CVPR 2017; data available on http://cs.pitt.edu/~kovashka/ads
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is more to images than their objective physical content: for example, advertisements are created to persuade a viewer to take a certain action. We propose the novel problem of automatic advertisement understanding. To enable research on this problem, we create two datasets: an image dataset of 64,832 image ads, and a video dataset of 3,477 ads. Our data contains rich annotations encompassing the topic and sentiment of the ads, questions and answers describing what actions the viewer is prompted to take and the reasoning that the ad presents to persuade the viewer ("What should I do according to this ad, and why should I do it?"), and symbolic references ads make (e.g. a dove symbolizes peace). We also analyze the most common persuasive strategies ads use, and the capabilities that computer vision systems should have to understand these strategies. We present baseline classification results for several prediction tasks, including automatically answering questions about the messages of the ads.
[ { "version": "v1", "created": "Mon, 10 Jul 2017 21:25:44 GMT" } ]
2017-07-12T00:00:00
[ [ "Hussain", "Zaeem", "" ], [ "Zhang", "Mingda", "" ], [ "Zhang", "Xiaozhong", "" ], [ "Ye", "Keren", "" ], [ "Thomas", "Christopher", "" ], [ "Agha", "Zuha", "" ], [ "Ong", "Nathan", "" ], [ "Kovashka", "Adriana", "" ] ]
new_dataset
0.991152
1707.03148
Seema Hegde B
Seema B Hegde, Sathish Babu, Pallapa Venkatram
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
21 pages, 16 figures, International Journal of Ad hoc, Sensor & Ubiquitous Computing
null
10.5121/ijasuc.2017.8301
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Manets Dynamics and Robustness are the key features of the nodes and are governed by several routing protocols such as AODV, DSR and so on. However in the network the growing resource demand leads to resource scarcity. The Node Mobility often leads to the link breakages and high routing overhead decreasing the stability and reliability of the network connectivity. In this context, the paper proposes a novel opportunistic AODV routing scheme which implements a cognitive agent based intelligent technique to set up a stable connectivity over the Manet. The Scheme computes the routing metric (rf) based on the collaboration sensitivity levels of the nodes obtained based through the knowledge based decision. This Routing Metric is subsequently used to set up the stable path for network connectivity. Thus minimizes the route overhead and increases the stability of the path. The Performance evaluation is conducted in comparison with the AODV and sleep AODV routing protocol and validated.
[ { "version": "v1", "created": "Tue, 11 Jul 2017 06:55:48 GMT" } ]
2017-07-12T00:00:00
[ [ "Hegde", "Seema B", "" ], [ "Babu", "Sathish", "" ], [ "Venkatram", "Pallapa", "" ] ]
new_dataset
0.999405
1707.03214
Cristina Fern\'andez-C\'ordoba
J. Borges, S. T. Dougherty, C. Fern\'andez-C\'ordoba, R. Ten-Valls
Binary Images of Z2Z4-Additive Cyclic Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Z2Z4-additive code C is called cyclic if the set of coordinates can be partitioned into two subsets, the set of Z_2 and the set of Z_4 coordinates, such that any cyclic shift of the coordinates of both subsets leaves the code invariant. We study the binary images of Z2Z4-additive cyclic codes. We determine all Z2Z4-additive cyclic codes with odd beta whose Gray images are linear binary codes.
[ { "version": "v1", "created": "Tue, 11 Jul 2017 10:56:45 GMT" } ]
2017-07-12T00:00:00
[ [ "Borges", "J.", "" ], [ "Dougherty", "S. T.", "" ], [ "Fernández-Córdoba", "C.", "" ], [ "Ten-Valls", "R.", "" ] ]
new_dataset
0.999421
1707.03233
Nikos Fotiou
Nikos Fotiou, Hasan Islam, Dmitrij Lagutin, Teemu Hakala, George C. Polyzos
CoAP over ICN
Proc. of the 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Larnaca, Cyprus, November, 2016
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Constrained Application Protocol (CoAP) is a specialized Web transfer protocol for resource-oriented applications intended to run on constrained devices, typically part of the Internet of Things. In this paper we leverage Information-Centric Networking (ICN), deployed within the domain of a network provider that interconnects, in addition to other terminals, CoAP endpoints in order to provide enhanced CoAP services. We present various CoAP-specific communication scenarios and discuss how ICN can provide benefits to both network providers and CoAP applications, even though the latter are not aware of the existence of ICN. In particular, the use of ICN results in smaller state management complexity at CoAP endpoints, simpler implementation at CoAP endpoints, and less communication overhead in the network.
[ { "version": "v1", "created": "Tue, 11 Jul 2017 11:54:05 GMT" } ]
2017-07-12T00:00:00
[ [ "Fotiou", "Nikos", "" ], [ "Islam", "Hasan", "" ], [ "Lagutin", "Dmitrij", "" ], [ "Hakala", "Teemu", "" ], [ "Polyzos", "George C.", "" ] ]
new_dataset
0.977081
1707.03297
Mouhamed Abdulla Ph.D.
Mouhamed Abdulla and Henk Wymeersch
Fine-Grained vs. Average Reliability for V2V Communications around Intersections
5 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:1706.10011
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intersections are critical areas of the transportation infrastructure associated with 47% of all road accidents. Vehicle-to-vehicle (V2V) communication has the potential of preventing up to 35% of such serious road collisions. In fact, under the 5G/LTE Rel.15+ standardization, V2V is a critical use-case not only for the purpose of enhancing road safety, but also for enabling traffic efficiency in modern smart cities. Under this anticipated 5G definition, high reliability of 0.99999 is expected for semi-autonomous vehicles (i.e., driver-in-the-loop). As a consequence, there is a need to assess the reliability, especially for accident-prone areas, such as intersections. We unpack traditional average V2V reliability in order to quantify its related fine-grained V2V reliability. Contrary to existing work on infinitely large roads, when we consider finite road segments of significance to practical real-world deployment, fine-grained reliability exhibits bimodal behavior. Performance for a certain vehicular traffic scenario is either very reliable or extremely unreliable, but nowhere in relative proximity to the average performance.
[ { "version": "v1", "created": "Mon, 10 Jul 2017 13:56:06 GMT" } ]
2017-07-12T00:00:00
[ [ "Abdulla", "Mouhamed", "" ], [ "Wymeersch", "Henk", "" ] ]
new_dataset
0.998528
1610.03727
Jonatan Krolikowski
Jonatan Krolikowski, Anastasios Giovanidis and Marco Di Renzo
Fair distributed user-traffic association in cache equipped cellular networks
6 pages, double column, 4 figures
null
10.23919/WIOPT.2017.7959862
null
cs.NI math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Caching of popular content on wireless nodes is recently proposed as a means to reduce congestion in the backbone of cellular networks and to improve Quality of Service. From a network point of view, the goal is to offload as many users as possible from the backbone network to the wireless caches while at the same time offering good service to cache-unrelated users. Aggressive offloading can lead to an unbalanced user association. Some wireless nodes can be overloaded by cache-related traffic while the resources of others remain underused. Given a fixed content placement, this work proposes an efficient distributed algorithm to control and balance the association of cache-related traffic among cellular cache memories. The algorithm allows the network to achieve the globally optimal solution and can be executed on base stations using a limited amount of information exchange between them. It is based on a novel algorithm we call Bucket-filling. The solution limits the cache-users per node by balancing the total load among the nodes in a fair way. The improvement compared to common user assignment policies is highlighted for single- as well as for multi-tier random networks.
[ { "version": "v1", "created": "Wed, 12 Oct 2016 14:31:27 GMT" }, { "version": "v2", "created": "Wed, 26 Oct 2016 10:27:43 GMT" }, { "version": "v3", "created": "Fri, 10 Feb 2017 18:33:40 GMT" } ]
2017-07-11T00:00:00
[ [ "Krolikowski", "Jonatan", "" ], [ "Giovanidis", "Anastasios", "" ], [ "Di Renzo", "Marco", "" ] ]
new_dataset
0.99769
1610.07198
Pierre Ganty
Pierre Ganty and Boris K\"opf and Pedro Valero
A Language-theoretic View on Network Protocols
21 pages
null
null
null
cs.FL cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Input validation is the first line of defense against malformed or malicious inputs. It is therefore critical that the validator (which is often part of the parser) is free of bugs. To build dependable input validators, we propose using parser generators for context-free languages. In the context of network protocols, various works have pointed at context-free languages as falling short to specify precisely or concisely common idioms found in protocols. We review those assessments and perform a rigorous, language-theoretic analysis of several common protocol idioms. We then demonstrate the practical value of our findings by developing a modular, robust, and efficient input validator for HTTP relying on context-free grammars and regular expressions.
[ { "version": "v1", "created": "Sun, 23 Oct 2016 16:29:30 GMT" }, { "version": "v2", "created": "Mon, 10 Jul 2017 14:37:17 GMT" } ]
2017-07-11T00:00:00
[ [ "Ganty", "Pierre", "" ], [ "Köpf", "Boris", "" ], [ "Valero", "Pedro", "" ] ]
new_dataset
0.993627
1701.06678
Achilleas Anastasopoulos
Achilleas Anastasopoulos and Jui Wu
Variable-length codes for channels with memory and feedback: error-exponent upper bounds
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The reliability function of memoryless channels with noiseless feedback and variable-length coding has been found to be a linear function of the average rate in the classic work of Burnashev. In this work we consider unifilar channels with noiseless feedback and study upper bounds for the channel reliability function with variable length codes. In unifilar channels the channel state is known to the transmitter but is unknown to the receiver. We generalize Burnashev's analysis and derive a similar expression which is linear in average rate and depends on the channel capacity, as well as an additional parameter which relates to a sequential binary hypothesis testing problem over this channel. This parameter is evaluated by setting up an appropriate Markov decision process (MDP). Furthermore, an upper bound for this parameter is derived using a simplified MDP. Numerical evaluation of the parameter for several binary input/state/output unifilar channels hints at the optimal transmission strategies. Such strategies are studied in a companion paper to provide lower (achievable) bounds on the channel reliability function.
[ { "version": "v1", "created": "Mon, 23 Jan 2017 23:35:16 GMT" }, { "version": "v2", "created": "Sun, 5 Feb 2017 23:41:06 GMT" }, { "version": "v3", "created": "Tue, 28 Feb 2017 00:29:01 GMT" }, { "version": "v4", "created": "Sun, 9 Jul 2017 16:04:40 GMT" } ]
2017-07-11T00:00:00
[ [ "Anastasopoulos", "Achilleas", "" ], [ "Wu", "Jui", "" ] ]
new_dataset
0.990243
1703.00849
Anastasios Giovanidis
Luis David Alvarez Corrales, Anastasios Giovanidis, Philippe Martins, Laurent Decreusefond
Wireless Node Cooperation with Resource Availability Constraints
submitted, 12 pages, double-column, 7 figures, 8 sub-figures in total
null
10.23919/WIOPT.2017.7959946
null
cs.NI cs.IT cs.PF math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Base station cooperation is a promising scheme to improve network performance for next generation cellular networks. Up to this point research has focused on station grouping criteria based solely on geographic proximity. However, for the cooperation to be meaningful, each station participating in a group should have sufficient available resources to share with others. In this work we consider an alternative grouping criterion based on a distance that considers both geographic proximity and available resources of the stations. When the network is modelled by a Poisson Point Process, we derive analytical formulas on the proportion of cooperative pairs or single stations, and the expected sum interference from each of the groups. The results illustrate that cooperation gains strongly depend on the distribution of available resources over the network.
[ { "version": "v1", "created": "Thu, 2 Mar 2017 16:29:46 GMT" } ]
2017-07-11T00:00:00
[ [ "Corrales", "Luis David Alvarez", "" ], [ "Giovanidis", "Anastasios", "" ], [ "Martins", "Philippe", "" ], [ "Decreusefond", "Laurent", "" ] ]
new_dataset
0.984517
1704.08614
Michael Wilber
Michael J. Wilber, Chen Fang, Hailin Jin, Aaron Hertzmann, John Collomosse, Serge Belongie
BAM! The Behance Artistic Media Dataset for Recognition Beyond Photography
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computer vision systems are designed to work well within the context of everyday photography. However, artists often render the world around them in ways that do not resemble photographs. Artwork produced by people is not constrained to mimic the physical world, making it more challenging for machines to recognize. This work is a step toward teaching machines how to categorize images in ways that are valuable to humans. First, we collect a large-scale dataset of contemporary artwork from Behance, a website containing millions of portfolios from professional and commercial artists. We annotate Behance imagery with rich attribute labels for content, emotions, and artistic media. Furthermore, we carry out baseline experiments to show the value of this dataset for artistic style prediction, for improving the generality of existing object classifiers, and for the study of visual domain adaptation. We believe our Behance Artistic Media dataset will be a good starting point for researchers wishing to study artistic imagery and relevant problems.
[ { "version": "v1", "created": "Thu, 27 Apr 2017 15:05:30 GMT" }, { "version": "v2", "created": "Sun, 9 Jul 2017 02:48:53 GMT" } ]
2017-07-11T00:00:00
[ [ "Wilber", "Michael J.", "" ], [ "Fang", "Chen", "" ], [ "Jin", "Hailin", "" ], [ "Hertzmann", "Aaron", "" ], [ "Collomosse", "John", "" ], [ "Belongie", "Serge", "" ] ]
new_dataset
0.999783
1706.05461
Jie Lin
Zhe Wang, Kingsley Kuan, Mathieu Ravaut, Gaurav Manek, Sibo Song, Yuan Fang, Seokhwan Kim, Nancy Chen, Luis Fernando D'Haro, Luu Anh Tuan, Hongyuan Zhu, Zeng Zeng, Ngai Man Cheung, Georgios Piliouras, Jie Lin, Vijay Chandrasekhar
Truly Multi-modal YouTube-8M Video Classification with Video, Audio, and Text
8 pages, Accepted to CVPR'17 Workshop on YouTube-8M Large-Scale Video Understanding
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
The YouTube-8M video classification challenge requires teams to classify 0.7 million videos into one or more of 4,716 classes. In this Kaggle competition, we placed in the top 3% out of 650 participants using released video and audio features. Beyond that, we extend the original competition by including text information in the classification, making this a truly multi-modal approach with vision, audio and text. The newly introduced text data is termed as YouTube-8M-Text. We present a classification framework for the joint use of text, visual and audio features, and conduct an extensive set of experiments to quantify the benefit that this additional mode brings. The inclusion of text yields state-of-the-art results, e.g. 86.7% GAP on the YouTube-8M-Text validation dataset.
[ { "version": "v1", "created": "Sat, 17 Jun 2017 00:39:04 GMT" }, { "version": "v2", "created": "Tue, 20 Jun 2017 02:06:33 GMT" }, { "version": "v3", "created": "Mon, 10 Jul 2017 00:44:45 GMT" } ]
2017-07-11T00:00:00
[ [ "Wang", "Zhe", "" ], [ "Kuan", "Kingsley", "" ], [ "Ravaut", "Mathieu", "" ], [ "Manek", "Gaurav", "" ], [ "Song", "Sibo", "" ], [ "Fang", "Yuan", "" ], [ "Kim", "Seokhwan", "" ], [ "Chen", "Nancy", "" ], [ "D'Haro", "Luis Fernando", "" ], [ "Tuan", "Luu Anh", "" ], [ "Zhu", "Hongyuan", "" ], [ "Zeng", "Zeng", "" ], [ "Cheung", "Ngai Man", "" ], [ "Piliouras", "Georgios", "" ], [ "Lin", "Jie", "" ], [ "Chandrasekhar", "Vijay", "" ] ]
new_dataset
0.983728
1707.02398
Stefano Rini
Stefano Rini and Shlomo Shamai (Shitz)
On the Capacity of the Carbon Copy onto Dirty Paper Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The "Carbon Copy onto Dirty Paper" (CCDP) channel is the compound "writing on dirty paper" channel in which the channel output is obtained as the sum of the channel input, white Gaussian noise and a Gaussian state sequence randomly selected among a set possible realizations. The transmitter has non-causal knowledge of the set of possible state sequences but does not know which sequence is selected to produce the channel output. We study the capacity of the CCDP channel for two scenarios: (i) the state sequences are independent and identically distributed, and (ii) the state sequences are scaled versions of the same sequence. In the first scenario, we show that a combination of superposition coding, time-sharing and Gel'fand-Pinsker binning is sufficient to approach the capacity to within three bits per channel use for any number of possible state realizations. In the second scenario, we derive capacity to within four bits-per-channel-use for the case of two possible state sequences. This result is extended to the CCDP channel with any number of possible state sequences under certain conditions on the scaling parameters which we denote as "strong fading" regime. We conclude by providing some remarks on the capacity of the CCDP channel in which the state sequences have any jointly Gaussian distribution.
[ { "version": "v1", "created": "Sat, 8 Jul 2017 05:41:32 GMT" } ]
2017-07-11T00:00:00
[ [ "Rini", "Stefano", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.97839
1707.02560
Ruifeng Duan
Riku J\"antti, Roberto Di Candia, Ruifeng Duan, and Kalle Ruttik
Multiantenna Quantum Backscatter Communications
6 pages, 4 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum illumination (QI) is a revolutionary photonic quantum sensing paradigm that enhances the sensitivity of photodetection in noisy and lossy environments. The QI concept has been recently used to propose a quantum backscatter communication (QBC), with the aim of increasing the receiver sensitivity beyond the limits of its classical counterpart. One of the practical challenges in microwave QI is the slow rate at which the entangled microwave modes can be generated. Here, we propose to mitigate this problem by using a multiple-input multiple-output antenna system to synthetically increase the number of efficiently-distinguishable modes in the QBC context.
[ { "version": "v1", "created": "Sun, 9 Jul 2017 11:00:06 GMT" } ]
2017-07-11T00:00:00
[ [ "Jäntti", "Riku", "" ], [ "Di Candia", "Roberto", "" ], [ "Duan", "Ruifeng", "" ], [ "Ruttik", "Kalle", "" ] ]
new_dataset
0.990635
1707.02605
Fulvio Mastrogiovanni
Divya Shah, Ernesto Denicia, Tiago Pimentel, Barbara Bruno, Fulvio Mastrogiovanni
Detection of bimanual gestures everywhere: why it matters, what we need and what is missing
Submitted to Robotics and Autonomous Systems (Elsevier)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bimanual gestures are of the utmost importance for the study of motor coordination in humans and in everyday activities. A reliable detection of bimanual gestures in unconstrained environments is fundamental for their clinical study and to assess common activities of daily living. This paper investigates techniques for a reliable, unconstrained detection and classification of bimanual gestures. It assumes the availability of inertial data originating from the two hands/arms, builds upon a previously developed technique for gesture modelling based on Gaussian Mixture Modelling (GMM) and Gaussian Mixture Regression (GMR), and compares different modelling and classification techniques, which are based on a number of assumptions inspired by literature about how bimanual gestures are represented and modelled in the brain. Experiments show results related to 5 everyday bimanual activities, which have been selected on the basis of three main parameters: (not) constraining the two hands by a physical tool, (not) requiring a specific sequence of single-hand gestures, being recursive (or not). In the best performing combination of modeling approach and classification technique, five out of five activities are recognized up to an accuracy of 97%, a precision of 82% and a level of recall of 100%.
[ { "version": "v1", "created": "Sun, 9 Jul 2017 17:30:35 GMT" } ]
2017-07-11T00:00:00
[ [ "Shah", "Divya", "" ], [ "Denicia", "Ernesto", "" ], [ "Pimentel", "Tiago", "" ], [ "Bruno", "Barbara", "" ], [ "Mastrogiovanni", "Fulvio", "" ] ]
new_dataset
0.969984
1707.02833
Jorge Mendes
Jorge Mendes and Jo\~ao Saraiva
Tabula: A Language to Model Spreadsheet Tables
In Proceedings of the 4th Workshop on Software Engineering Methods in Spreadsheets
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spreadsheets provide a flexible and easy to use software development environment, but that leads to error proneness. Work has been done to prevent errors in spreadsheets, including using models to specify distinct parts of a spreadsheet as it is done with model-driven software development. Previous model languages for spreadsheets offer a limited expressiveness, and cannot model several features present in most real world spreadsheets. In this paper, the modeling language Tabula is introduced. It extends previous spreadsheet models with features like type constraints and nested classes with repetitions. Tabula is not only more expressive than other models but it can also be extended with more features. Moreover, Tabula includes a bidirectional transformation engine that guarantees synchronization after an update either in the model or spreadsheet.
[ { "version": "v1", "created": "Mon, 10 Jul 2017 13:08:29 GMT" } ]
2017-07-11T00:00:00
[ [ "Mendes", "Jorge", "" ], [ "Saraiva", "João", "" ] ]
new_dataset
0.983461
1707.02849
Fabio Salassa
Jean-Charles Billaut, Federico Della Croce, Fabio Salassa, Vincent T'kindt
No-idle, no-wait: when shop scheduling meets dominoes, eulerian and hamiltonian paths
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In shop scheduling, several applications exist where it is required that some components perform consecutively. We refer to no-idle schedules if machines are required to operate with no inserted idle time and no-wait schedules if tasks cannot wait between the end of an operation and the start of the following one. We consider here no-idle/no-wait shop scheduling problems with makespan as performance measure and determine related complexity results. We first analyze the two-machine no-idle/no-wait flow shop problem and show that it is equivalent to a special version of the game of dominoes which is polynomially solvable by tackling an Eulerian path problem on a directed graph. We present for this problem an O(n) exact algorithm. As a byproduct we show that the Hamiltonian Path problem on a digraph G(V,A) with a special structure (where every pair of vertices i,j either has all successors in common or has no common successors) reduces to the two-machine no-idle/no-wait flow shop problem. Correspondingly, we provide a new polynomially solvable special case of the Hamiltonian Path problem. Then, we show that also the corresponding $m$-machine no-idle no-wait flow shop problem is polynomially solvable and provide an O(mn log n) exact algorithm. Finally we prove that the 2-machine no-idle/no-wait job shop problem and the 2-machine no-idle/no-wait open shop problem are NP-Hard in the strong sense.
[ { "version": "v1", "created": "Mon, 10 Jul 2017 13:34:07 GMT" } ]
2017-07-11T00:00:00
[ [ "Billaut", "Jean-Charles", "" ], [ "Della Croce", "Federico", "" ], [ "Salassa", "Fabio", "" ], [ "T'kindt", "Vincent", "" ] ]
new_dataset
0.992783
1707.02915
Shuai Wang Dr.
Song Min Kim, Shigemi Ishida, Shuai Wang, and Tian He
Free Side-channel Cross-technology Communication in Wireless Networks
To Appear in IEEE/ACM Transactions on Networking
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Enabling direct communication between wireless technologies immediately brings significant benefits including, but not limited to, cross-technology interference mitigation and context-aware smart operation. To explore the opportunities, we propose FreeBee -- a novel cross-technology communication technique for direct unicast as well as cross-technology/channel broadcast among three popular technologies of WiFi, ZigBee, and Bluetooth. The key concept of FreeBee is to modulate symbol messages by shifting the timings of periodic beacon frames already mandatory for diverse wireless standards. This keeps our design generically applicable across technologies and avoids additional bandwidth consumption (i.e., does not incur extra traffic), allowing continuous broadcast to safely reach mobile and/or duty-cycled devices. A new \emph{interval multiplexing} technique is proposed to enable concurrent bro\-adcasts from multiple senders or boost the transmission rate of a single sender. Theoretical and experimental exploration reveals that FreeBee offers a reliable symbol delivery under a second and supports mobility of 30mph and low duty-cycle operations of under 5%.
[ { "version": "v1", "created": "Mon, 10 Jul 2017 15:50:41 GMT" } ]
2017-07-11T00:00:00
[ [ "Kim", "Song Min", "" ], [ "Ishida", "Shigemi", "" ], [ "Wang", "Shuai", "" ], [ "He", "Tian", "" ] ]
new_dataset
0.998637
1707.02953
Debajyoti Mondal
Debajyoti Mondal
On String Contact Representations in 3D
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An axis-aligned string is a simple polygonal path, where each line segment is parallel to an axis in $\mathbb{R}^3$. Given a graph $G$, a string contact representation $\Psi$ of $G$ maps the vertices of $G$ to interior disjoint axis-aligned strings, where no three strings meet at a point, and two strings share a common point if and only if their corresponding vertices are adjacent in $G$. The complexity of $\Psi$ is the minimum integer $r$ such that every string in $\Psi$ is a $B_r$-string, i.e., a string with at most $r$ bends. While a result of Duncan et al. implies that every graph $G$ with maximum degree 4 has a string contact representation using $B_4$-strings, we examine constraints on $G$ that allow string contact representations with complexity 3, 2 or 1. We prove that if $G$ is Hamiltonian and triangle-free, then $G$ admits a contact representation where all the strings but one are $B_3$-strings. If $G$ is 3-regular and bipartite, then $G$ admits a contact representation with string complexity 2, and if we further restrict $G$ to be Hamiltonian, then $G$ has a contact representation, where all the strings but one are $B_1$-strings (i.e., $L$-shapes). Finally, we prove some complementary lower bounds on the complexity of string contact representations.
[ { "version": "v1", "created": "Mon, 10 Jul 2017 17:15:42 GMT" } ]
2017-07-11T00:00:00
[ [ "Mondal", "Debajyoti", "" ] ]
new_dataset
0.9991
1707.02961
Frank Staals
Lars Arge, Frank Staals
Dynamic Geodesic Nearest Neighbor Searching in a Simple Polygon
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an efficient dynamic data structure that supports geodesic nearest neighbor queries for a set of point sites $S$ in a static simple polygon $P$. Our data structure allows us to insert a new site in $S$, delete a site from $S$, and ask for the site in $S$ closest to an arbitrary query point $q \in P$. All distances are measured using the geodesic distance, that is, the length of the shortest path that is completely contained in $P$. Our data structure supports queries in $O(\sqrt{n}\log n\log^2 m)$ time, where $n$ is the number of sites currently in $S$, and $m$ is the number of vertices of $P$, and updates in $O(\sqrt{n}\log^3 m)$ time. The space usage is $O(n\log m + m)$. If only insertions are allowed, we can support queries in worst-case $O(\log^2 n\log^2 m)$ time, while allowing for $O(\log n\log^3 m)$ amortized time insertions. We can achieve the same running times in case there are both insertions and deletions, but the order of these operations is known in advance.
[ { "version": "v1", "created": "Mon, 10 Jul 2017 17:43:35 GMT" } ]
2017-07-11T00:00:00
[ [ "Arge", "Lars", "" ], [ "Staals", "Frank", "" ] ]
new_dataset
0.991018
1704.02161
Abhijit Guha Roy
Abhijit Guha Roy, Sailesh Conjeti, Sri Phani Krishna Karri, Debdoot Sheet, Amin Katouzian, Christian Wachinger, Nassir Navab
ReLayNet: Retinal Layer and Fluid Segmentation of Macular Optical Coherence Tomography using Fully Convolutional Network
Accepted for Publication at Biomedical Optics Express
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Optical coherence tomography (OCT) is used for non-invasive diagnosis of diabetic macular edema assessing the retinal layers. In this paper, we propose a new fully convolutional deep architecture, termed ReLayNet, for end-to-end segmentation of retinal layers and fluid masses in eye OCT scans. ReLayNet uses a contracting path of convolutional blocks (encoders) to learn a hierarchy of contextual features, followed by an expansive path of convolutional blocks (decoders) for semantic segmentation. ReLayNet is trained to optimize a joint loss function comprising of weighted logistic regression and Dice overlap loss. The framework is validated on a publicly available benchmark dataset with comparisons against five state-of-the-art segmentation methods including two deep learning based approaches to substantiate its effectiveness.
[ { "version": "v1", "created": "Fri, 7 Apr 2017 09:50:05 GMT" }, { "version": "v2", "created": "Fri, 7 Jul 2017 10:14:41 GMT" } ]
2017-07-10T00:00:00
[ [ "Roy", "Abhijit Guha", "" ], [ "Conjeti", "Sailesh", "" ], [ "Karri", "Sri Phani Krishna", "" ], [ "Sheet", "Debdoot", "" ], [ "Katouzian", "Amin", "" ], [ "Wachinger", "Christian", "" ], [ "Navab", "Nassir", "" ] ]
new_dataset
0.993957
1707.01873
Christian Cachin
Christian Cachin, Marko Vukoli\'c
Blockchain Consensus Protocols in the Wild
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A blockchain is a distributed ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed attention because they also address blockchain systems. This work discusses the process of assessing and gaining confidence in the resilience of a consensus protocols exposed to faults and adversarial nodes. We advocate to follow the established practice in cryptography and computer security, relying on public reviews, detailed models, and formal proofs; the designers of several practical systems appear to be unaware of this. Moreover, we review the consensus protocols in some prominent permissioned blockchain platforms with respect to their fault models and resilience against attacks. The protocol comparison covers Hyperledger Fabric, Tendermint, Symbiont, R3~Corda, Iroha, Kadena, Chain, Quorum, MultiChain, Sawtooth Lake, Ripple, Stellar, and IOTA.
[ { "version": "v1", "created": "Thu, 6 Jul 2017 17:21:03 GMT" }, { "version": "v2", "created": "Fri, 7 Jul 2017 05:46:05 GMT" } ]
2017-07-10T00:00:00
[ [ "Cachin", "Christian", "" ], [ "Vukolić", "Marko", "" ] ]
new_dataset
0.997259
1707.01996
Ping Hu
Ping Hu, Chi Wan Sung, Terence H. Chan
Capacity of Wireless Distributed Storage Systems with Broadcast Repair
28 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In wireless distributed storage systems, storage nodes are connected by wireless channels, which are broadcast in nature. This paper exploits this unique feature to design an efficient repair mechanism, called broadcast repair, for wireless distributed storage systems in the presence of multiple-node failures. Due to the broadcast nature of wireless transmission, we advocate a new measure on repair performance called repair-transmission bandwidth. In contrast to repair bandwidth, which measures the average number of packets downloaded by a newcomer to replace a failed node, repair-transmission bandwidth measures the average number of packets transmitted by helper nodes per failed node. A fundamental study on the storage capacity of wireless distributed storage systems with broadcast repair is conducted by modeling the storage system as a multicast network and analyzing the minimum cut of the corresponding information flow graph. The fundamental tradeoff between storage efficiency and repair-transmission bandwidth is also obtained for functional repair. The performance of broadcast repair is compared both analytically and numerically with that of cooperative repair, the basic repair method for wired distributed storage systems with multiple-node failures. While cooperative repair is based on the idea of allowing newcomers to exchange packets, broadcast repair is based on the idea of allowing a helper to broadcast packets to all newcomers simultaneously. We show that broadcast repair outperforms cooperative repair, offering a better tradeoff between storage efficiency and repair-transmission bandwidth.
[ { "version": "v1", "created": "Thu, 6 Jul 2017 23:56:59 GMT" } ]
2017-07-10T00:00:00
[ [ "Hu", "Ping", "" ], [ "Sung", "Chi Wan", "" ], [ "Chan", "Terence H.", "" ] ]
new_dataset
0.999599
1707.02000
Kamesh Madduri
Humayun Kabir, Kamesh Madduri
Shared-memory Graph Truss Decomposition
10 pages, conference submission
null
null
null
cs.DC cs.DS cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present PKT, a new shared-memory parallel algorithm and OpenMP implementation for the truss decomposition of large sparse graphs. A k-truss is a dense subgraph definition that can be considered a relaxation of a clique. Truss decomposition refers to a partitioning of all the edges in the graph based on their k-truss membership. The truss decomposition of a graph has many applications. We show that our new approach PKT consistently outperforms other truss decomposition approaches for a collection of large sparse graphs and on a 24-core shared-memory server. PKT is based on a recently proposed algorithm for k-core decomposition.
[ { "version": "v1", "created": "Fri, 7 Jul 2017 00:09:09 GMT" } ]
2017-07-10T00:00:00
[ [ "Kabir", "Humayun", "" ], [ "Madduri", "Kamesh", "" ] ]
new_dataset
0.982565
1707.02058
Hugo Gimbert
Nathalie Bertrand (IRSN), Miheer Dewaskar, Blaise Genest (SUMO), Hugo Gimbert (LaBRI)
Controlling a Population
null
null
null
null
cs.FL cs.GT cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new setting where a population of agents, each modelled by a finite-state system, are controlled uniformly: the controller applies the same action to every agent. The framework is largely inspired by the control of a biological system, namely a population of yeasts, where the controller may only change the environment common to all cells. We study a synchronisation problem for such populations: no matter how individual agents react to the actions of the controller , the controller aims at driving all agents synchronously to a target state. The agents are naturally represented by a non-deterministic finite state automaton (NFA), the same for every agent, and the whole system is encoded as a 2-player game. The first player (Controller) chooses actions, and the second player (Agents) resolves non-determinism for each agent. The game with m agents is called the m-population game. This gives rise to a parameterized control problem (where control refers to 2 player games), namely the population control problem: can Controller control the m-population game for all $m $\in$ N$ whatever Agents does? In this paper, we prove that the population control problem is decidable, and it is a EXPTIME-complete problem. As far as we know, this is one of the first results on parameterized control. Our algorithm, not based on cutoff techniques, produces winning strategies which are symbolic, that is, they do not need to count precisely how the population is spread between states. We also show that if there is no winning strategy, then there is a population size M such that Controller wins the m-population game if and only if $m $\le$ M$. Surprisingly, M can be doubly exponential in the number of states of the NFA, with tight upper and lower bounds.
[ { "version": "v1", "created": "Fri, 7 Jul 2017 07:11:06 GMT" } ]
2017-07-10T00:00:00
[ [ "Bertrand", "Nathalie", "", "IRSN" ], [ "Dewaskar", "Miheer", "", "SUMO" ], [ "Genest", "Blaise", "", "SUMO" ], [ "Gimbert", "Hugo", "", "LaBRI" ] ]
new_dataset
0.967879
1707.02275
Antonio Valerio Miceli Barone
Antonio Valerio Miceli Barone and Rico Sennrich
A parallel corpus of Python functions and documentation strings for automated code documentation and code generation
5 pages, 1 figure, 3 tables
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automated documentation of programming source code and automated code generation from natural language are challenging tasks of both practical and scientific interest. Progress in these areas has been limited by the low availability of parallel corpora of code and natural language descriptions, which tend to be small and constrained to specific domains. In this work we introduce a large and diverse parallel corpus of a hundred thousands Python functions with their documentation strings ("docstrings") generated by scraping open source repositories on GitHub. We describe baseline results for the code documentation and code generation tasks obtained by neural machine translation. We also experiment with data augmentation techniques to further increase the amount of training data. We release our datasets and processing scripts in order to stimulate research in these areas.
[ { "version": "v1", "created": "Fri, 7 Jul 2017 17:15:27 GMT" } ]
2017-07-10T00:00:00
[ [ "Barone", "Antonio Valerio Miceli", "" ], [ "Sennrich", "Rico", "" ] ]
new_dataset
0.999567
1504.03048
Shudi Yang
Shudi Yang, Zheng-An Yao, Chang-An Zhao
The weight distributions of two classes of p ary cyclic codes with few weights
20 pages
null
10.1016/j.ffa.2016.11.004
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic codes have attracted a lot of research interest for decades as they have efficient encoding and decoding algorithms. In this paper, for an odd prime $p$, the weight distributions of two classes of $p$-ary cyclic codes are completely determined. We show that both codes have at most five nonzero weights.
[ { "version": "v1", "created": "Mon, 13 Apr 2015 02:16:35 GMT" } ]
2017-07-07T00:00:00
[ [ "Yang", "Shudi", "" ], [ "Yao", "Zheng-An", "" ], [ "Zhao", "Chang-An", "" ] ]
new_dataset
0.95661
1509.01371
Shudi Yang
Shudi Yang and Zheng-An Yao
Complete Weight Enumerators of a Family of Three-Weight Linear Codes
13 pages. arXiv admin note: text overlap with arXiv:1505.06326
Des. Codes Cryptogr. 82: 663 (2017)
10.1007/s10623-016-0191-x
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear codes have been an interesting topic in both theory and practice for many years. In this paper, for an odd prime $p$, we present the explicit complete weight enumerator of a family of $p$-ary linear codes constructed with defining set. The weight enumerator is an mmediate result of the complete weight enumerator, which shows that the codes proposed in this paper are three-weight linear codes. Additionally, all nonzero codewords are minimal and thus they are suitable for secret sharing.
[ { "version": "v1", "created": "Fri, 4 Sep 2015 08:49:27 GMT" }, { "version": "v2", "created": "Mon, 14 Dec 2015 14:18:55 GMT" } ]
2017-07-07T00:00:00
[ [ "Yang", "Shudi", "" ], [ "Yao", "Zheng-An", "" ] ]
new_dataset
0.999027
1511.00796
Aradhana Nayak
Aradhana Nayak and Ravi Banavar
Almost-globally stable tracking for on compact Riemannian manifolds
6 pages, to appear in ECC 2016
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we propose a control law for almost-global asymptotic tracking (AGAT) of a smooth reference trajectory for a fully actuated simple mechanical system (SMS) evolving on a Riemannian manifold which can be embedded in a Euclidean space. The existing results on tracking for an SMS are either local, or almost-global, only in the case the manifold is a Lie group. In the latter case, the notion of a configuration error is naturally defined by the group operation and facilitates a global analysis. However, such a notion is not intrinsic to a Riemannian manifold. In this paper, we define a configuration error followed by error dynamics on a Riemannian manifold, and then prove AGAT. The results are demonstrated for a spherical pendulum which is an SMS on $S^2$ and for a particle moving on a Lissajous curve in $\mathbb{R}^3$.
[ { "version": "v1", "created": "Tue, 3 Nov 2015 07:24:17 GMT" }, { "version": "v2", "created": "Tue, 12 Apr 2016 14:44:09 GMT" }, { "version": "v3", "created": "Mon, 18 Apr 2016 10:27:04 GMT" }, { "version": "v4", "created": "Sat, 25 Jun 2016 20:48:53 GMT" }, { "version": "v5", "created": "Fri, 24 Mar 2017 06:00:10 GMT" }, { "version": "v6", "created": "Wed, 5 Jul 2017 19:19:20 GMT" } ]
2017-07-07T00:00:00
[ [ "Nayak", "Aradhana", "" ], [ "Banavar", "Ravi", "" ] ]
new_dataset
0.972809
1605.00887
Thibaut Verron
Bernard Bonnard (IMB, McTAO), Jean-Charles Faug\`ere (PolSys), Alain Jacquemard (IMB, PolSys), Mohab Safey El Din (PolSys), Thibaut Verron (PolSys)
Determinantal sets, singularities and application to optimal control in medical imagery
null
International symposium on symbolic and algebraic computations, Waterloo, Canada. ACM, pp.103-110 (2016)
10.1145/2930889.2930916
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Control theory has recently been involved in the field of nuclear magnetic resonance imagery. The goal is to control the magnetic field optimally in order to improve the contrast between two biological matters on the pictures. Geometric optimal control leads us here to analyze mero-morphic vector fields depending upon physical parameters , and having their singularities defined by a deter-minantal variety. The involved matrix has polynomial entries with respect to both the state variables and the parameters. Taking into account the physical constraints of the problem, one needs to classify, with respect to the parameters, the number of real singularities lying in some prescribed semi-algebraic set. We develop a dedicated algorithm for real root classification of the singularities of the rank defects of a polynomial matrix, cut with a given semi-algebraic set. The algorithm works under some genericity assumptions which are easy to check. These assumptions are not so restrictive and are satisfied in the aforementioned application. As more general strategies for real root classification do, our algorithm needs to compute the critical loci of some maps, intersections with the boundary of the semi-algebraic domain, etc. In order to compute these objects, the determinantal structure is exploited through a stratifi-cation by the rank of the polynomial matrix. This speeds up the computations by a factor 100. Furthermore, our implementation is able to solve the application in medical imagery, which was out of reach of more general algorithms for real root classification. For instance, computational results show that the contrast problem where one of the matters is water is partitioned into three distinct classes.
[ { "version": "v1", "created": "Tue, 3 May 2016 13:05:59 GMT" }, { "version": "v2", "created": "Thu, 6 Jul 2017 09:10:06 GMT" } ]
2017-07-07T00:00:00
[ [ "Bonnard", "Bernard", "", "IMB, McTAO" ], [ "Faugère", "Jean-Charles", "", "PolSys" ], [ "Jacquemard", "Alain", "", "IMB, PolSys" ], [ "Din", "Mohab Safey El", "", "PolSys" ], [ "Verron", "Thibaut", "", "PolSys" ] ]
new_dataset
0.989411
1706.10011
Mouhamed Abdulla Ph.D.
Mouhamed Abdulla and Henk Wymeersch
Fine-Grained Reliability for V2V Communications around Suburban and Urban Intersections
27 pages, 6 figures, submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Safe transportation is a key use-case of the 5G/LTE Rel.15+ communications, where an end-to-end reliability of 0.99999 is expected for a vehicle-to-vehicle (V2V) transmission distance of 100-200 m. Since communications reliability is related to road-safety, it is crucial to verify the fulfillment of the performance, especially for accident-prone areas such as intersections. We derive closed-form expressions for the V2V transmission reliability near suburban corners and urban intersections over finite interference regions. The analysis is based on plausible street configurations, traffic scenarios, and empirically-supported channel propagation. We show the means by which the performance metric can serve as a preliminary design tool to meet a target reliability. We then apply meta distribution concepts to provide a careful dissection of V2V communications reliability. Contrary to existing work on infinite roads, when we consider finite road segments for practical deployment, fine-grained reliability per realization exhibits bimodal behavior. Either performance for a certain vehicular traffic scenario is very reliable or extremely unreliable, but nowhere in relatively proximity to the average performance. In other words, standard SINR-based average performance metrics are analytically accurate but can be insufficient from a practical viewpoint. Investigating other safety-critical point process networks at the meta distribution-level may reveal similar discrepancies.
[ { "version": "v1", "created": "Fri, 30 Jun 2017 04:04:05 GMT" }, { "version": "v2", "created": "Wed, 5 Jul 2017 21:02:40 GMT" } ]
2017-07-07T00:00:00
[ [ "Abdulla", "Mouhamed", "" ], [ "Wymeersch", "Henk", "" ] ]
new_dataset
0.99985
1707.01591
Arya Farahi
Alex Chojnacki, Chengyu Dai, Arya Farahi, Guangsha Shi, Jared Webb, Daniel T. Zhang, Jacob Abernethy, Eric Schwartz
A Data Science Approach to Understanding Residential Water Contamination in Flint
Applied Data Science track paper at KDD 2017. For associated promotional video, see https://www.youtube.com/watch?v=0g66ImaV8Ag
null
10.1145/3097983.3098078
null
cs.LG stat.AP stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When the residents of Flint learned that lead had contaminated their water system, the local government made water-testing kits available to them free of charge. The city government published the results of these tests, creating a valuable dataset that is key to understanding the causes and extent of the lead contamination event in Flint. This is the nation's largest dataset on lead in a municipal water system. In this paper, we predict the lead contamination for each household's water supply, and we study several related aspects of Flint's water troubles, many of which generalize well beyond this one city. For example, we show that elevated lead risks can be (weakly) predicted from observable home attributes. Then we explore the factors associated with elevated lead. These risk assessments were developed in part via a crowd sourced prediction challenge at the University of Michigan. To inform Flint residents of these assessments, they have been incorporated into a web and mobile application funded by \texttt{Google.org}. We also explore questions of self-selection in the residential testing program, examining which factors are linked to when and how frequently residents voluntarily sample their water.
[ { "version": "v1", "created": "Wed, 5 Jul 2017 22:12:14 GMT" } ]
2017-07-07T00:00:00
[ [ "Chojnacki", "Alex", "" ], [ "Dai", "Chengyu", "" ], [ "Farahi", "Arya", "" ], [ "Shi", "Guangsha", "" ], [ "Webb", "Jared", "" ], [ "Zhang", "Daniel T.", "" ], [ "Abernethy", "Jacob", "" ], [ "Schwartz", "Eric", "" ] ]
new_dataset
0.996889
1707.01609
Rahmat Widia Sembiring
Amin Subandi, Rini Meiyanti, Cut Lika Mestika Sandy, Rahmat Widia Sembiring
Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification
2nd International Conference of Computer, Environment, Social Science, Health Science, Agriculture & Technology (ICEST) 2017
null
10.25046/aj020501
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. Vigenere Cipher has the disadvantage that if key length is not equal to the length of the plaintext, then the key will be repeated until equal to the plaintext length, it course allows cryptanalysts to make the process of cryptanalysis. And weaknesses of the symmetric key cryptographic algorithm is the safety of key distribution factor, if the key is known by others, then the function of cryptography itself become useless. Based on two such weaknesses, in this study, we modify the key on Vigenere Cipher, so when the key length smaller than the length of plaintext entered, the key will be generated by a process, so the next key character will be different from the previous key character. In This study also applied the technique of Three-pass protocol, a technique which message sender does not need to send the key, because each using its own key for the message encryption and decryption process, so the security of a message would be more difficult to solved.
[ { "version": "v1", "created": "Thu, 6 Jul 2017 01:35:03 GMT" } ]
2017-07-07T00:00:00
[ [ "Subandi", "Amin", "" ], [ "Meiyanti", "Rini", "" ], [ "Sandy", "Cut Lika Mestika", "" ], [ "Sembiring", "Rahmat Widia", "" ] ]
new_dataset
0.975369
1707.01642
Ruggero Micheletto
Ruggero Micheletto and Ahyi Kim
An HTM based cortical algorithm for detection of seismic waves
7 pages, 4 figures and one table. 7 Citations
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recognizing seismic waves immediately is very important for the realization of efficient disaster prevention. Generally these systems consist of a network of seismic detectors that send real time data to a central server. The server elaborates the data and attempts to recognize the first signs of an earthquake. The current problem with this approach is that it is subject to false alarms. A critical trade-off exists between sensitivity of the system and error rate. To overcame this problems, an artificial neural network based intelligent learning systems can be used. However, conventional supervised ANN systems are difficult to train, CPU intensive and prone to false alarms. To surpass these problems, here we attempt to use a next-generation unsupervised cortical algorithm HTM. This novel approach does not learn particular waveforms, but adapts to continuously fed data reaching the ability to discriminate between normality (seismic sensor background noise in no-earthquake conditions) and anomaly (sensor response to a jitter or an earthquake). Main goal of this study is test the ability of the HTM algorithm to be used to signal earthquakes automatically in a feasible disaster prevention system. We describe the methodology used and give the first qualitative assessments of the recognition ability of the system. Our preliminary results show that the cortical algorithm used is very robust to noise and that can successfully recognize synthetic earthquake-like signals efficiently and reliably.
[ { "version": "v1", "created": "Thu, 6 Jul 2017 05:24:12 GMT" } ]
2017-07-07T00:00:00
[ [ "Micheletto", "Ruggero", "" ], [ "Kim", "Ahyi", "" ] ]
new_dataset
0.952956
1707.01653
Eugene Cherny
Gleb Rogozinsky, Mihail Chesnokov and Eugene Cherny
pch2csd: an application for converting Nord Modular G2 patches into Csound code
7 pages, 4 figures, for associated source code, see https://github.com/gleb812/pch2csd/
Proc. 14th Sound and Music Computing Conf. (SMC 2017) (2017) 415-421
null
null
cs.SD
http://creativecommons.org/licenses/by/4.0/
The paper presents the pch2csd project, focused on converting patches of popular Clavia Nord Modular G2 synthesizer into code of Csound language. Now discontinued, Nord Modular G2 left a lot of interesting patches for sound synthesis and algorithmic composition. To give this heritage a new life, we created our project with the hope for being able to simulate the original sound and behavior of Nord Modular.
[ { "version": "v1", "created": "Thu, 6 Jul 2017 06:40:19 GMT" } ]
2017-07-07T00:00:00
[ [ "Rogozinsky", "Gleb", "" ], [ "Chesnokov", "Mihail", "" ], [ "Cherny", "Eugene", "" ] ]
new_dataset
0.997609
1707.01766
Thomas Studer
Kai Br\"unnler, Dandolo Flumini, Thomas Studer
A Logic of Blockchain Updates
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blockchains are distributed data structures that are used to achieve consensus in systems for cryptocurrencies (like Bitcoin) or smart contracts (like Ethereum). Although blockchains gained a lot of popularity recently, there is no logic-based model for blockchains available. We introduce BCL, a dynamic logic to reason about blockchain updates, and show that BCL is sound and complete with respect to a simple blockchain model.
[ { "version": "v1", "created": "Thu, 6 Jul 2017 13:03:04 GMT" } ]
2017-07-07T00:00:00
[ [ "Brünnler", "Kai", "" ], [ "Flumini", "Dandolo", "" ], [ "Studer", "Thomas", "" ] ]
new_dataset
0.999037
1707.01788
Alexandre Cherpillod
Alexandre Cherpillod, Stefano Mintchev, Dario Floreano
Embodied Flight with a Drone
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most human-robot interfaces, such as joysticks and keyboards, require training and constant cognitive effort and provide a limited degree of awareness of the robots state and its environment. Embodied interactions, instead of interfaces, could bridge the gap between humans and robots, allowing humans to naturally perceive and act through a distal robotic body. Establishing an embodied interaction and mapping human movements and a non-anthropomorphic robot is particularly challenging. In this paper, we describe a natural and immersive embodied interaction that allows users to control and experience drone flight with their own bodies. The setup uses a commercial flight simulator that tracks hand movements and provides haptic and visual feedback. The paper discusses how to integrate the simulator with a real drone, how to map body movement with drone motion, and how the resulting embodied interaction provides a more natural and immersive flight experience to unskilled users with respect to a conventional RC remote controller.
[ { "version": "v1", "created": "Thu, 6 Jul 2017 13:45:40 GMT" } ]
2017-07-07T00:00:00
[ [ "Cherpillod", "Alexandre", "" ], [ "Mintchev", "Stefano", "" ], [ "Floreano", "Dario", "" ] ]
new_dataset
0.999032
1707.01836
Awni Hannun
Pranav Rajpurkar, Awni Y. Hannun, Masoumeh Haghpanahi, Codie Bourn and Andrew Y. Ng
Cardiologist-Level Arrhythmia Detection with Convolutional Neural Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop an algorithm which exceeds the performance of board certified cardiologists in detecting a wide range of heart arrhythmias from electrocardiograms recorded with a single-lead wearable monitor. We build a dataset with more than 500 times the number of unique patients than previously studied corpora. On this dataset, we train a 34-layer convolutional neural network which maps a sequence of ECG samples to a sequence of rhythm classes. Committees of board-certified cardiologists annotate a gold standard test set on which we compare the performance of our model to that of 6 other individual cardiologists. We exceed the average cardiologist performance in both recall (sensitivity) and precision (positive predictive value).
[ { "version": "v1", "created": "Thu, 6 Jul 2017 15:42:46 GMT" } ]
2017-07-07T00:00:00
[ [ "Rajpurkar", "Pranav", "" ], [ "Hannun", "Awni Y.", "" ], [ "Haghpanahi", "Masoumeh", "" ], [ "Bourn", "Codie", "" ], [ "Ng", "Andrew Y.", "" ] ]
new_dataset
0.999185
1707.01848
Wieslaw Kopec
Wies{\l}aw Kope\'c, Katarzyna Abramczuk, Bart{\l}omiej Balcerzak, Marta Ju\'zwin Katarzyna Gniadzik, Grzegorz Kowalik, Rados{\l}aw Nielek
A Location-Based Game for Two Generations: Teaching Mobile Technology to the Elderly with the Support of Young Volunteers
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-49655-9_12
null
10.1007/978-3-319-49655-9_12
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a cooperative location-based game for the elderly with the use of tablets equipped with mobile application. The game was designed to tackle at once several crucial topics related to the issue of aging, namely the social inclusion, education in the field of modern technology, motivation for learning as well as physical activity. Mixed-aged teams consisting of two players: a junior and a senior took part in the game. The preliminary results suggest that the game can successfully address a number of issues including improving the elderly technical skills, increasing the elderly physical activity as well as positive intergenerational interaction. The paper describes the game setup in details and presents some initial data gathered during the gameplay.
[ { "version": "v1", "created": "Thu, 6 Jul 2017 16:07:00 GMT" } ]
2017-07-07T00:00:00
[ [ "Kopeć", "Wiesław", "" ], [ "Abramczuk", "Katarzyna", "" ], [ "Balcerzak", "Bartłomiej", "" ], [ "Gniadzik", "Marta Juźwin Katarzyna", "" ], [ "Kowalik", "Grzegorz", "" ], [ "Nielek", "Radosław", "" ] ]
new_dataset
0.999631
1502.03143
Berk Calli
Berk Calli, Aaron Walsman, Arjun Singh, Siddhartha Srinivasa, Pieter Abbeel and Aaron M. Dollar
Benchmarking in Manipulation Research: The YCB Object and Model Set and Benchmarking Protocols
Submitted to Robotics and Automation Magazine (RAM) Special Issue on Replicable and Measurable Robotics Research. 35 Pages
IEEE Robotics & Automation Magazine, 22 (2015) 36 - 52
10.1109/MRA.2015.2448951
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present the Yale-CMU-Berkeley (YCB) Object and Model set, intended to be used to facilitate benchmarking in robotic manipulation, prosthetic design and rehabilitation research. The objects in the set are designed to cover a wide range of aspects of the manipulation problem; it includes objects of daily life with different shapes, sizes, textures, weight and rigidity, as well as some widely used manipulation tests. The associated database provides high-resolution RGBD scans, physical properties, and geometric models of the objects for easy incorporation into manipulation and planning software platforms. In addition to describing the objects and models in the set along with how they were chosen and derived, we provide a framework and a number of example task protocols, laying out how the set can be used to quantitatively evaluate a range of manipulation approaches including planning, learning, mechanical design, control, and many others. A comprehensive literature survey on existing benchmarks and object datasets is also presented and their scope and limitations are discussed. The set will be freely distributed to research groups worldwide at a series of tutorials at robotics conferences, and will be otherwise available at a reasonable purchase cost. It is our hope that the ready availability of this set along with the ground laid in terms of protocol templates will enable the community of manipulation researchers to more easily compare approaches as well as continually evolve benchmarking tests as the field matures.
[ { "version": "v1", "created": "Tue, 10 Feb 2015 22:46:01 GMT" } ]
2017-07-06T00:00:00
[ [ "Calli", "Berk", "" ], [ "Walsman", "Aaron", "" ], [ "Singh", "Arjun", "" ], [ "Srinivasa", "Siddhartha", "" ], [ "Abbeel", "Pieter", "" ], [ "Dollar", "Aaron M.", "" ] ]
new_dataset
0.999177
1503.02295
Emmanuel Osegi
N.E. Osegi, P. Enyindah
GOptimaEmbed: A SmartSMS-SQLDatabaseManagementSystem for Low-Cost Microcontrollers
To be published
African Journal of Computing & ICT, 8(2)
null
null
cs.DB
http://creativecommons.org/licenses/by-nc-sa/3.0/
The era of the Internet of things, machine-to-machine and human to machine computing has heralded the development of a modern-day smart industry in which humanoids can co-operate,co-exist and interact seamlessly.Currently, there are many projects in this area of smart communication and thus giving rise to an industry electrified by smart things.In this paper we present a novel smart database management system (dbms),GOptimaEmbed, for intelligent querying of databases in device constrained embedded systems. The system uses genetic algorithms as main search engine and simplifies the query process using stored in-memory model based on an invented device dependent Short-messaging-Structured Query Language SMS SQL schema translator. In addition, querying is done over the air using integrated GSM module in the smart space. The system has been applied to querying a plant database and results were quite satisfactory. Keywords. GOptimaEmbed,smart dbms, genetic algorithms, SMS SQL
[ { "version": "v1", "created": "Sun, 8 Mar 2015 16:46:03 GMT" }, { "version": "v2", "created": "Tue, 10 Mar 2015 21:41:29 GMT" } ]
2017-07-06T00:00:00
[ [ "Osegi", "N. E.", "" ], [ "Enyindah", "P.", "" ] ]
new_dataset
0.998259
1611.06307
Shubham Pachori
Shubham Pachori
Multi-Scale Saliency Detection using Dictionary Learning
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Saliency detection has drawn a lot of attention of researchers in various fields over the past several years. Saliency is the perceptual quality that makes an object, person to draw the attention of humans at the very sight. Salient object detection in an image has been used centrally in many computational photography and computer vision applications like video compression, object recognition and classification, object segmentation, adaptive content delivery, motion detection, content aware resizing, camouflage images and change blindness images to name a few. We propose a method to detect saliency in the objects using multimodal dictionary learning which has been recently used in classification and image fusion. The multimodal dictionary that we are learning is task driven which gives improved performance over its counterpart (the one which is not task specific).
[ { "version": "v1", "created": "Sat, 19 Nov 2016 05:27:12 GMT" }, { "version": "v2", "created": "Mon, 3 Jul 2017 18:56:37 GMT" }, { "version": "v3", "created": "Wed, 5 Jul 2017 03:46:15 GMT" } ]
2017-07-06T00:00:00
[ [ "Pachori", "Shubham", "" ] ]
new_dataset
0.999656
1612.02314
Martin Pielot
Martin Pielot and Luz Rello
Productive, Anxious, Lonely - 24 Hours Without Push Notifications
null
null
10.1145/3098279.3098526
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report from the Do Not Disturb Challenge where 30 volunteers disabled notification alerts for 24 hours across all devices. The effect of the absence of notifications on the participants was isolated through an experimental study design: we compared self-reported feedback from the day without notifications against a baseline day. The evidence indicates that notifications have locked us in a dilemma: without notifications, participants felt less distracted and more productive. But, they also felt no longer able to be as responsive as expected, which made some participants anxious. And, they felt less connected with one's social group. In contrast to previous reports, about two third of the participants expressed the intention to change how they manage notifications. Two years later, half of the participants are still following through with their plans.
[ { "version": "v1", "created": "Wed, 7 Dec 2016 16:23:33 GMT" }, { "version": "v2", "created": "Tue, 4 Jul 2017 05:40:59 GMT" }, { "version": "v3", "created": "Wed, 5 Jul 2017 07:19:27 GMT" } ]
2017-07-06T00:00:00
[ [ "Pielot", "Martin", "" ], [ "Rello", "Luz", "" ] ]
new_dataset
0.980989
1707.01123
Ali Parsai
Ali Parsai, Alessandro Murgia, Serge Demeyer
LittleDarwin: a Feature-Rich and Extensible Mutation Testing Framework for Large and Complex Java Systems
Pre-proceedings of the 7th IPM International Conference on Fundamentals of Software Engineering
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mutation testing is a well-studied method for increasing the quality of a test suite. We designed LittleDarwin as a mutation testing framework able to cope with large and complex Java software systems, while still being easily extensible with new experimental components. LittleDarwin addresses two existing problems in the domain of mutation testing: having a tool able to work within an industrial setting, and yet, be open to extension for cutting edge techniques provided by academia. LittleDarwin already offers higher-order mutation, null type mutants, mutant sampling, manual mutation, and mutant subsumption analysis. There is no tool today available with all these features that is able to work with typical industrial software systems.
[ { "version": "v1", "created": "Tue, 4 Jul 2017 18:12:57 GMT" } ]
2017-07-06T00:00:00
[ [ "Parsai", "Ali", "" ], [ "Murgia", "Alessandro", "" ], [ "Demeyer", "Serge", "" ] ]
new_dataset
0.999086
1707.01184
Souvick Ghosh
Souvick Ghosh, Satanu Ghosh, and Dipankar Das
Sentiment Identification in Code-Mixed Social Media Text
null
null
null
null
cs.CL cs.AI cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sentiment analysis is the Natural Language Processing (NLP) task dealing with the detection and classification of sentiments in texts. While some tasks deal with identifying the presence of sentiment in the text (Subjectivity analysis), other tasks aim at determining the polarity of the text categorizing them as positive, negative and neutral. Whenever there is a presence of sentiment in the text, it has a source (people, group of people or any entity) and the sentiment is directed towards some entity, object, event or person. Sentiment analysis tasks aim to determine the subject, the target and the polarity or valence of the sentiment. In our work, we try to automatically extract sentiment (positive or negative) from Facebook posts using a machine learning approach.While some works have been done in code-mixed social media data and in sentiment analysis separately, our work is the first attempt (as of now) which aims at performing sentiment analysis of code-mixed social media text. We have used extensive pre-processing to remove noise from raw text. Multilayer Perceptron model has been used to determine the polarity of the sentiment. We have also developed the corpus for this task by manually labeling Facebook posts with their associated sentiments.
[ { "version": "v1", "created": "Tue, 4 Jul 2017 23:29:44 GMT" } ]
2017-07-06T00:00:00
[ [ "Ghosh", "Souvick", "" ], [ "Ghosh", "Satanu", "" ], [ "Das", "Dipankar", "" ] ]
new_dataset
0.987988
1707.01271
Bernard Parisse
Bernard Parisse
Compiling LATEX to computer algebra-enabled HTML5
The interactive HTML5/MathML version of the document is available at https://www-fourier.ujf-grenoble.fr/~parisse/giac/castex.htmlThe LaTeX source will not compile properly to PDF without installing the software described in the document
null
null
null
cs.SC cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document explains how to create or modify an existing LATEX document with commands enabling computations in the HTML5 output: when the reader opens the HTML5 output, he can run a computation in his browser, or modify the command to be executed and run it. This is done by combining different softwares: hevea for compilation to HTML5, giac.js for the CAS computing kernel (itself compiled from the C++ Giac library with emscripten), and a modified version of itex2MML for fast and nice rendering in MathML in browsers that support MathML.
[ { "version": "v1", "created": "Wed, 5 Jul 2017 09:24:46 GMT" } ]
2017-07-06T00:00:00
[ [ "Parisse", "Bernard", "" ] ]
new_dataset
0.977926
1707.01330
Mojtaba Masoudi
Mojtaba Masoudi, Hamidreza Pourreza, Mahdi Saadatmand Tarzjan, Fateme Shafiee Zargar, Masoud Pezeshki Rad, Noushin Eftekhari
A dataset for Computer-Aided Detection of Pulmonary Embolism in CTA images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Todays, researchers in the field of Pulmonary Embolism (PE) analysis need to use a publicly available dataset to assess and compare their methods. Different systems have been designed for the detection of pulmonary embolism (PE), but none of them have used any public datasets. All papers have used their own private dataset. In order to fill this gap, we have collected 5160 slices of computed tomography angiography (CTA) images acquired from 20 patients, and after labeling the image by experts in this field, we provided a reliable dataset which is now publicly available. In some situation, PE detection can be difficult, for example when it occurs in the peripheral branches or when patients have pulmonary diseases (such as parenchymal disease). Therefore, the efficiency of CAD systems highly depends on the dataset. In the given dataset, 66% of PE are located in peripheral branches, and different pulmonary diseases are also included.
[ { "version": "v1", "created": "Wed, 5 Jul 2017 11:35:27 GMT" } ]
2017-07-06T00:00:00
[ [ "Masoudi", "Mojtaba", "" ], [ "Pourreza", "Hamidreza", "" ], [ "Tarzjan", "Mahdi Saadatmand", "" ], [ "Zargar", "Fateme Shafiee", "" ], [ "Rad", "Masoud Pezeshki", "" ], [ "Eftekhari", "Noushin", "" ] ]
new_dataset
0.999871
1309.7720
Ken-ichiro Ishikawa
Ken-ichiro Ishikawa
ASURA: Scalable and Uniform Data Distribution Algorithm for Storage Clusters
14 pages
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large-scale storage cluster systems need to manage a vast amount of data locations. A naive data locations management maintains pairs of data ID and nodes storing the data in tables. However, it is not practical when the number of pairs is too large. To solve this problem, management using data distribution algorithms, rather than management using tables, has been proposed in recent research. It can distribute data by determining the node for storing the data based on the datum ID. Such data distribution algorithms require the ability to handle the addition or removal of nodes, short calculation time and uniform data distribution in the capacity of each node. This paper proposes a data distribution algorithm called ASURA (Advanced Scalable and Uniform storage by Random number Algorithm) that satisfies these requirements. It achieves following four characteristics: 1) minimum data movement to maintain data distribution according to node capacity when nodes are added or removed, even if data are replicated, 2) roughly sub-micro-seconds calculation time, 3) much lower than 1% maximum variability between nodes in data distribution, and 4) data distribution according to the capacity of each node. The evaluation results show that ASURA is qualitatively and quantitatively competitive against major data distribution algorithms such as Consistent Hashing, Weighted Rendezvous Hashing and Random Slicing. The comparison results show benefits of each algorithm; they show that ASURA has advantage in large scale-out storage clusters.
[ { "version": "v1", "created": "Mon, 30 Sep 2013 04:48:11 GMT" }, { "version": "v2", "created": "Tue, 4 Jul 2017 10:41:49 GMT" } ]
2017-07-05T00:00:00
[ [ "Ishikawa", "Ken-ichiro", "" ] ]
new_dataset
0.998765
1608.05550
Yuto Nakashima
Yuto Nakashima, Hiroe Inoue, Takuya Mieno, Shunsuke Inenaga, Hideo Bannai and Masayuki Takeda
Shortest unique palindromic substring queries in optimal time
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A palindrome is a string that reads the same forward and backward. A palindromic substring $P$ of a string $S$ is called a shortest unique palindromic substring ($\mathit{SUPS}$) for an interval $[x, y]$ in $S$, if $P$ occurs exactly once in $S$, this occurrence of $P$ contains interval $[x, y]$, and every palindromic substring of $S$ which contains interval $[x, y]$ and is shorter than $P$ occurs at least twice in $S$. The $\mathit{SUPS}$ problem is, given a string $S$, to preprocess $S$ so that for any subsequent query interval $[x, y]$ all the $\mathit{SUPS}\mbox{s}$ for interval $[x, y]$ can be answered quickly. We present an optimal solution to this problem. Namely, we show how to preprocess a given string $S$ of length $n$ in $O(n)$ time and space so that all $\mathit{SUPS}\mbox{s}$ for any subsequent query interval can be answered in $O(k+1)$ time, where $k$ is the number of outputs.
[ { "version": "v1", "created": "Fri, 19 Aug 2016 09:35:52 GMT" }, { "version": "v2", "created": "Tue, 4 Jul 2017 10:23:59 GMT" } ]
2017-07-05T00:00:00
[ [ "Nakashima", "Yuto", "" ], [ "Inoue", "Hiroe", "" ], [ "Mieno", "Takuya", "" ], [ "Inenaga", "Shunsuke", "" ], [ "Bannai", "Hideo", "" ], [ "Takeda", "Masayuki", "" ] ]
new_dataset
0.963163
1611.03012
Yuan-Hsun Lo
Yijin Zhang, Yuan-Hsun Lo, Kenneth W. Shum, Wing Shing Wong
New CRT sequence sets for a collision channel without feedback
21 pages, 1 figure, 4 tables
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Protocol sequences are binary and periodic sequences used for deterministic multiple access in a collision channel without feedback. In this paper, we focus on user-irrepressible (UI) protocol sequences that can guarantee a positive individual throughput per sequence period with probability one for a slot-synchronous channel, regardless of the delay offsets among the users. As the sequence period has a fundamental impact on the worst-case channel access delay, a common objective of designing UI sequences is to make the sequence period as short as possible. Consider a communication channel that is shared by $M$ active users, and assume that each protocol sequence has a constant Hamming weight $w$. To attain a better delay performance than previously known UI sequences, this paper presents a CRTm construction of UI sequences with $w=M+1$, which is a variation of the previously known CRT construction. For all non-prime $M\geq 8$, our construction produces the shortest known sequence period and the shortest known worst-case delay of UI sequences. Numerical results show that the new construction enjoys a better average delay performance than the optimal random access scheme and other constructions with the same sequence period, in a variety of traffic conditions. In addition, we derive an asymptotic lower bound on the minimum sequence period for $w=M+1$ if the sequence structure satisfies some technical conditions, called equi-difference, and prove the tightness of this lower bound by using the CRTm construction.
[ { "version": "v1", "created": "Wed, 9 Nov 2016 17:04:43 GMT" }, { "version": "v2", "created": "Fri, 10 Mar 2017 18:09:15 GMT" }, { "version": "v3", "created": "Tue, 4 Jul 2017 07:10:05 GMT" } ]
2017-07-05T00:00:00
[ [ "Zhang", "Yijin", "" ], [ "Lo", "Yuan-Hsun", "" ], [ "Shum", "Kenneth W.", "" ], [ "Wong", "Wing Shing", "" ] ]
new_dataset
0.996497
1611.05479
Anish Simhal
Anish K. Simhal, Cecilia Aguerrebere, Forrest Collman, Joshua T. Vogelstein, Kristina D. Micheva, Richard J. Weinberg, Stephen J. Smith, Guillermo Sapiro
Probabilistic Fluorescence-Based Synapse Detection
Current awaiting peer review
null
10.1371/journal.pcbi.1005493
null
cs.CV q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Brain function results from communication between neurons connected by complex synaptic networks. Synapses are themselves highly complex and diverse signaling machines, containing protein products of hundreds of different genes, some in hundreds of copies, arranged in precise lattice at each individual synapse. Synapses are fundamental not only to synaptic network function but also to network development, adaptation, and memory. In addition, abnormalities of synapse numbers or molecular components are implicated in most mental and neurological disorders. Despite their obvious importance, mammalian synapse populations have so far resisted detailed quantitative study. In human brains and most animal nervous systems, synapses are very small and very densely packed: there are approximately 1 billion synapses per cubic millimeter of human cortex. This volumetric density poses very substantial challenges to proteometric analysis at the critical level of the individual synapse. The present work describes new probabilistic image analysis methods for single-synapse analysis of synapse populations in both animal and human brains.
[ { "version": "v1", "created": "Wed, 16 Nov 2016 22:01:31 GMT" } ]
2017-07-05T00:00:00
[ [ "Simhal", "Anish K.", "" ], [ "Aguerrebere", "Cecilia", "" ], [ "Collman", "Forrest", "" ], [ "Vogelstein", "Joshua T.", "" ], [ "Micheva", "Kristina D.", "" ], [ "Weinberg", "Richard J.", "" ], [ "Smith", "Stephen J.", "" ], [ "Sapiro", "Guillermo", "" ] ]
new_dataset
0.999202
1701.07579
Vitaly Skachek
Eldho K. Thomas and Vitaly Skachek
Explicit Constructions and Bounds for Batch Codes with Restricted Size of Reconstruction Sets
To appear in 5ICMCTA
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear batch codes and codes for private information retrieval (PIR) with a query size $t$ and a restricted size $r$ of the reconstruction sets are studied. New bounds on the parameters of such codes are derived for small values of $t$ or of $r$ by providing corresponding constructions. By building on the ideas of Cadambe and Mazumdar, a new bound in a recursive form is derived for batch codes and PIR codes.
[ { "version": "v1", "created": "Thu, 26 Jan 2017 05:16:28 GMT" }, { "version": "v2", "created": "Tue, 4 Jul 2017 14:07:13 GMT" } ]
2017-07-05T00:00:00
[ [ "Thomas", "Eldho K.", "" ], [ "Skachek", "Vitaly", "" ] ]
new_dataset
0.99882
1704.02939
Nikola Yolov
Nikola Yolov
Minor-matching hypertree width
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a new width measure for a tree decomposition, minor-matching hypertree width, $\mu\text{-}tw$, for graphs and hypergraphs, such that bounding the width guarantees that set of maximal independent sets has a polynomially-sized restriction to each decomposition bag. The relaxed conditions of the decomposition allow a much wider class of graphs and hypergraphs of bounded width compared to other tree decompositions. We show that, for fixed $k$, there are $2^{(1 - \frac1k + o(1)){n \choose 2}}$ $n$-vertex graphs of minor-matching hypertree width at most $k$. A number of problems including Maximum Independence Set, $k$-Colouring, and Homomorphism of uniform hypergraphs permit polynomial-time solutions for hypergraphs with bounded minor-matching hypertree width and bounded rank. We show that for any given $k$ and any graph $G$, it is possible to construct a decomposition of minor-matching hypertree width at most $O(k^3)$, or to prove that $\mu\text{-}tw(G) > k$ in time $n^{O(k^3)}$. This is done by presenting a general algorithm for approximating the hypertree width of well-behaved measures, and reducing $\mu\text{-}tw$ to such measure. The result relating the restriction of the maximal independent sets to a set $S$ with the set of induced matchings intersecting $S$ in graphs, and minor matchings intersecting $S$ in hypergraphs, might be of independent interest.
[ { "version": "v1", "created": "Mon, 10 Apr 2017 16:25:55 GMT" }, { "version": "v2", "created": "Tue, 4 Jul 2017 16:29:51 GMT" } ]
2017-07-05T00:00:00
[ [ "Yolov", "Nikola", "" ] ]
new_dataset
0.981751
1704.08778
Ayan Chaudhury
Ayan Chaudhury and John L. Barron
Partially Occluded Leaf Recognition via Subgraph Matching and Energy Optimization
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an approach to match partially occluded plant leaves with databases of full plant leaves. Although contour based 2D shape matching has been studied extensively in the last couple of decades, matching occluded leaves with full leaf databases is an open and little worked on problem. Classifying occluded plant leaves is even more challenging than full leaf matching because of large variations and complexity of leaf structures. Matching an occluded contour with all the full contours in a database is an NP-hard problem [Su et al. ICCV2015], so our algorithm is necessarily suboptimal.
[ { "version": "v1", "created": "Fri, 28 Apr 2017 00:15:49 GMT" }, { "version": "v2", "created": "Mon, 3 Jul 2017 20:04:12 GMT" } ]
2017-07-05T00:00:00
[ [ "Chaudhury", "Ayan", "" ], [ "Barron", "John L.", "" ] ]
new_dataset
0.986562
1707.00735
Monirosharieh Vameghestahbanati
Monirosharieh Vameghestahbanati, Ian Marsland, Ramy H. Gohary, and Halim Yanikomeroglu
Polar Codes for SCMA Systems
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
In this paper, we design and compare multilevel polar coding (MLPC) and bit-interleaved polar coded modulation (BIPCM) for uplink sparse code multiple access (SCMA) systems that operate over fast and block fading channels. Both successive cancellation (SC) and successive cancellation list (SCL) decoding algorithms are considered. Simulation results show that, with either decoder, BIPCM performs better than its MLPC counterpart. Also, both BIPCM and MLPC exhibit a performance advantage over LTE turbo-coded and WiMAX LDPC SCMA systems when the SCL technique is used for decoding.
[ { "version": "v1", "created": "Mon, 3 Jul 2017 19:21:37 GMT" } ]
2017-07-05T00:00:00
[ [ "Vameghestahbanati", "Monirosharieh", "" ], [ "Marsland", "Ian", "" ], [ "Gohary", "Ramy H.", "" ], [ "Yanikomeroglu", "Halim", "" ] ]
new_dataset
0.998426
1707.00790
Hamid Mirzaei Buini
Hamid Mirzaei, Mona Fathollahi, Tony Givargis
OPEB: Open Physical Environment Benchmark for Artificial Intelligence
Accepted in 3rd IEEE International Forum on Research and Technologies for Society and Industry 2017
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Artificial Intelligence methods to solve continuous- control tasks have made significant progress in recent years. However, these algorithms have important limitations and still need significant improvement to be used in industry and real- world applications. This means that this area is still in an active research phase. To involve a large number of research groups, standard benchmarks are needed to evaluate and compare proposed algorithms. In this paper, we propose a physical environment benchmark framework to facilitate collaborative research in this area by enabling different research groups to integrate their designed benchmarks in a unified cloud-based repository and also share their actual implemented benchmarks via the cloud. We demonstrate the proposed framework using an actual implementation of the classical mountain-car example and present the results obtained using a Reinforcement Learning algorithm.
[ { "version": "v1", "created": "Tue, 4 Jul 2017 00:42:57 GMT" } ]
2017-07-05T00:00:00
[ [ "Mirzaei", "Hamid", "" ], [ "Fathollahi", "Mona", "" ], [ "Givargis", "Tony", "" ] ]
new_dataset
0.999666
1707.00836
Kyungmin Kim
Kyung-Min Kim, Min-Oh Heo, Seong-Ho Choi, and Byoung-Tak Zhang
DeepStory: Video Story QA by Deep Embedded Memory Networks
7 pages, accepted for IJCAI 2017
null
null
null
cs.CV cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Question-answering (QA) on video contents is a significant challenge for achieving human-level intelligence as it involves both vision and language in real-world settings. Here we demonstrate the possibility of an AI agent performing video story QA by learning from a large amount of cartoon videos. We develop a video-story learning model, i.e. Deep Embedded Memory Networks (DEMN), to reconstruct stories from a joint scene-dialogue video stream using a latent embedding space of observed data. The video stories are stored in a long-term memory component. For a given question, an LSTM-based attention model uses the long-term memory to recall the best question-story-answer triplet by focusing on specific words containing key information. We trained the DEMN on a novel QA dataset of children's cartoon video series, Pororo. The dataset contains 16,066 scene-dialogue pairs of 20.5-hour videos, 27,328 fine-grained sentences for scene description, and 8,913 story-related QA pairs. Our experimental results show that the DEMN outperforms other QA models. This is mainly due to 1) the reconstruction of video stories in a scene-dialogue combined form that utilize the latent embedding and 2) attention. DEMN also achieved state-of-the-art results on the MovieQA benchmark.
[ { "version": "v1", "created": "Tue, 4 Jul 2017 07:42:05 GMT" } ]
2017-07-05T00:00:00
[ [ "Kim", "Kyung-Min", "" ], [ "Heo", "Min-Oh", "" ], [ "Choi", "Seong-Ho", "" ], [ "Zhang", "Byoung-Tak", "" ] ]
new_dataset
0.995779
1707.00971
Camila Ara\'ujo
Camila Souza Araujo, Gabriel Magno, Wagner Meira Jr, Virgilio Almeida, Pedro Hartung and Danilo Doneda
Characterizing videos, audience and advertising in Youtube channels for kids
null
null
null
null
cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online video services, messaging systems, games and social media services are tremendously popular among young people and children in many countries. Most of the digital services offered on the internet are advertising funded, which makes advertising ubiquitous in children's everyday life. To understand the impact of advertising-based digital services on children, we study the collective behavior of users of YouTube for kids channels and present the demographics of a large number of users. We collected data from 12,848 videos from 17 channels in US and UK and 24 channels in Brazil. The channels in English have been viewed more than 37 billion times. We also collected more than 14 million comments made by users. Based on a combination of text-analysis and face recognition tools, we show the presence of racial and gender biases in our large sample of users. We also identify children actively using YouTube, although the minimum age for using the service is 13 years in most countries. We provide comparisons of user behavior among the three countries, which represent large user populations in the global North and the global South.
[ { "version": "v1", "created": "Tue, 4 Jul 2017 13:31:03 GMT" } ]
2017-07-05T00:00:00
[ [ "Araujo", "Camila Souza", "" ], [ "Magno", "Gabriel", "" ], [ "Meira", "Wagner", "Jr" ], [ "Almeida", "Virgilio", "" ], [ "Hartung", "Pedro", "" ], [ "Doneda", "Danilo", "" ] ]
new_dataset
0.994577
1507.06768
Daniel Graziotin
Ilona Kuzmickaja, Xiaofeng Wang, Daniel Graziotin, Gabriella Dodero, Pekka Abrahamsson
In Need of Creative Mobile Service Ideas? Forget Adults and Ask Young Children
48 pagers, 3 figures. Accepted for publication at SAGE Open
SAGE Open Vol 5, Issue 3, 2015
10.1177/2158244015601719
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well acknowledged that innovation is a key success factor in mobile service domain. Having creative ideas is the first critical step in the innovation process. Many studies suggest that customers are a valuable source of creative ideas. However, the literature also shows that adults may be constrained by existing technology frames, which are known to hinder creativity. Instead young children (aged 7-12) are considered digital natives yet are free from existing technology frames. This led us to study them as a potential source for creative mobile service ideas. A set of 41,000 mobile ideas obtained from a research project in 2006 granted us a unique opportunity to study the mobile service ideas from young children. We randomly selected two samples of ideas (N=400 each), one contained the ideas from young children, the other from adults (aged 17-50). These ideas were evaluated by several evaluators using an existing creativity framework. The results show that the mobile service ideas from the young children are significantly more original, transformational, implementable, and relevant than those from the adults. Therefore, this study shows that young children are better sources of novel and quality ideas than adults in the mobile services domain. This study bears significant contributions to the creativity and innovation research. It also indicates a new and valuable source for the companies that seek for creative ideas for innovative products and services.
[ { "version": "v1", "created": "Fri, 24 Jul 2015 07:45:00 GMT" } ]
2017-07-04T00:00:00
[ [ "Kuzmickaja", "Ilona", "" ], [ "Wang", "Xiaofeng", "" ], [ "Graziotin", "Daniel", "" ], [ "Dodero", "Gabriella", "" ], [ "Abrahamsson", "Pekka", "" ] ]
new_dataset
0.978232
1703.04993
Daniel Graziotin
Daniel Graziotin, Fabian Fagerholm, Xiaofeng Wang, Pekka Abrahamsson
On the Unhappiness of Software Developers
11 pages, 1 figure. Final version. Accepted for presentation at the 21st International Conference on Evaluation and Assessment in Software Engineering (EASE'17)
In Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering (EASE'17), 2017. ACM, New York, NY, USA, 324-333
10.1145/3084226.3084242
null
cs.SE cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The happy-productive worker thesis states that happy workers are more productive. Recent research in software engineering supports the thesis, and the ideal of flourishing happiness among software developers is often expressed among industry practitioners. However, the literature suggests that a cost-effective way to foster happiness and productivity among workers could be to limit unhappiness. Psychological disorders such as job burnout and anxiety could also be reduced by limiting the negative experiences of software developers. Simultaneously, a baseline assessment of (un)happiness and knowledge about how developers experience it are missing. In this paper, we broaden the understanding of unhappiness among software developers in terms of (1) the software developer population distribution of (un)happiness, and (2) the causes of unhappiness while developing software. We conducted a large-scale quantitative and qualitative survey, incorporating a psychometrically validated instrument for measuring (un)happiness, with 2220 developers, yielding a rich and balanced sample of 1318 complete responses. Our results indicate that software developers are a slightly happy population, but the need for limiting the unhappiness of developers remains. We also identified 219 factors representing causes of unhappiness while developing software. Our results, which are available as open data, can act as guidelines for practitioners in management positions and developers in general for fostering happiness on the job. We suggest considering happiness in future studies of both human and technical aspects in software engineering.
[ { "version": "v1", "created": "Wed, 15 Mar 2017 08:07:39 GMT" }, { "version": "v2", "created": "Mon, 24 Apr 2017 09:27:02 GMT" }, { "version": "v3", "created": "Wed, 10 May 2017 11:45:16 GMT" } ]
2017-07-04T00:00:00
[ [ "Graziotin", "Daniel", "" ], [ "Fagerholm", "Fabian", "" ], [ "Wang", "Xiaofeng", "" ], [ "Abrahamsson", "Pekka", "" ] ]
new_dataset
0.985732
1703.08018
Manuel Lafond
Manuel Lafond
On strongly chordal graphs that are not leaf powers
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A common task in phylogenetics is to find an evolutionary tree representing proximity relationships between species. This motivates the notion of leaf powers: a graph G = (V, E) is a leaf power if there exist a tree T on leafset V and a threshold k such that uv is an edge if and only if the distance between u and v in T is at most k. Characterizing leaf powers is a challenging open problem, along with determining the complexity of their recognition. This is in part due to the fact that few graphs are known to not be leaf powers, as such graphs are difficult to construct. Recently, Nevries and Rosenke asked if leaf powers could be characterized by strong chordality and a finite set of forbidden subgraphs. In this paper, we provide a negative answer to this question, by exhibiting an infinite family \G of (minimal) strongly chordal graphs that are not leaf powers. During the process, we establish a connection between leaf powers, alternating cycles and quartet compatibility. We also show that deciding if a chordal graph is \G-free is NP-complete, which may provide insight on the complexity of the leaf power recognition problem.
[ { "version": "v1", "created": "Thu, 23 Mar 2017 11:43:26 GMT" }, { "version": "v2", "created": "Tue, 25 Apr 2017 20:49:32 GMT" }, { "version": "v3", "created": "Sun, 2 Jul 2017 20:07:04 GMT" } ]
2017-07-04T00:00:00
[ [ "Lafond", "Manuel", "" ] ]
new_dataset
0.993464
1707.00067
Viren Jain
Viren Jain
Adversarial Image Alignment and Interpolation
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Volumetric (3d) images are acquired for many scientific and biomedical purposes using imaging methods such as serial section microscopy, CT scans, and MRI. A frequent step in the analysis and reconstruction of such data is the alignment and registration of images that were acquired in succession along a spatial or temporal dimension. For example, in serial section electron microscopy, individual 2d sections are imaged via electron microscopy and then must be aligned to one another in order to produce a coherent 3d volume. State of the art approaches find image correspondences derived from patch matching and invariant feature detectors, and then solve optimization problems that rigidly or elastically deform series of images into an aligned volume. Here we show how fully convolutional neural networks trained with an adversarial loss function can be used for two tasks: (1) synthesis of missing or damaged image data from adjacent sections, and (2) fine-scale alignment of block-face electron microscopy data. Finally, we show how these two capabilities can be combined in order to produce artificial isotropic volumes from anisotropic image volumes using a super-resolution adversarial alignment and interpolation approach.
[ { "version": "v1", "created": "Fri, 30 Jun 2017 23:59:27 GMT" } ]
2017-07-04T00:00:00
[ [ "Jain", "Viren", "" ] ]
new_dataset
0.999622
1707.00101
Lukas Fleischer
Volker Diekert and Lukas Fleischer
Church-Rosser Systems, Codes with Bounded Synchronization Delay and Local Rees Extensions
Extended abstract of an invited talk given at WORDS 2017
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
What is the common link, if there is any, between Church-Rosser systems, prefix codes with bounded synchronization delay, and local Rees extensions? The first obvious answer is that each of these notions relates to topics of interest for WORDS: Church-Rosser systems are certain rewriting systems over words, codes are given by sets of words which form a basis of a free submonoid in the free monoid of all words (over a given alphabet) and local Rees extensions provide structural insight into regular languages over words. So, it seems to be a legitimate title for an extended abstract presented at the conference WORDS 2017. However, this work is more ambitious, it outlines some less obvious but much more interesting link between these topics. This link is based on a structure theory of finite monoids with varieties of groups and the concept of local divisors playing a prominent role. Parts of this work appeared in a similar form in conference proceedings where proofs and further material can be found.
[ { "version": "v1", "created": "Sat, 1 Jul 2017 06:40:37 GMT" } ]
2017-07-04T00:00:00
[ [ "Diekert", "Volker", "" ], [ "Fleischer", "Lukas", "" ] ]
new_dataset
0.998856
1707.00153
Minjia Shi
Minjia Shi, Yan Liu, Randriam Hugues, Lin Sok, Patrick Sole
Trace codes over $\Z_4$ and Boolean function
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct trace codes over $\Z_4$ by using Boolean functions and skew sets, respectively. Their Lee weight distribution is studied by using a Galois ring version of the Walsh-Hadamard transform and exponential sums. We obtain a new family of optimal two-weight codes over $\Z_4.$
[ { "version": "v1", "created": "Sat, 1 Jul 2017 12:52:29 GMT" } ]
2017-07-04T00:00:00
[ [ "Shi", "Minjia", "" ], [ "Liu", "Yan", "" ], [ "Hugues", "Randriam", "" ], [ "Sok", "Lin", "" ], [ "Sole", "Patrick", "" ] ]
new_dataset
0.998257
1707.00338
Luciana Foss
Leila Ribeiro, Luciana Foss, Simone Andr\'e da Costa Cavalheiro
Entendendo o Pensamento Computacional
18 pages, in Portuguese
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this article is to clarify the meaning of Computational Thinking. We differentiate logical from computational reasoning and discuss the importance of Computational Thinking in solving problems. The three pillars of Computational Thinking - Abstraction, Automation and Analysis - are outlined, highlighting the role of each one in developing the skills needed for the problem-solving process. ----- O objetivo deste artigo \'e esclarecer o significado de Pensamento Computacional. Diferencia-se o racioc\'inio l\'ogico do computacional e discute-se a import\^ancia do Pensamento Computacional na resolu\c{c}\~ao de problemas. Os tr\^es pilares do Pensamento Computacional - Abstra\c{c}\~ao, Automa\c{c}\~ao e An\'alise - s\~ao delineados, destacando-se o papel de cada um deles no desenvolvimento das habilidades necess\'arias para o processo de solu\c{c}\~ao de problemas.
[ { "version": "v1", "created": "Sun, 2 Jul 2017 19:38:55 GMT" } ]
2017-07-04T00:00:00
[ [ "Ribeiro", "Leila", "" ], [ "Foss", "Luciana", "" ], [ "Cavalheiro", "Simone André da Costa", "" ] ]
new_dataset
0.977381
1707.00373
Zhiguo Fu
Zhiguo Fu
On Blockwise Symmetric Matchgate Signatures and Higher Domain \#CSP
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For any $n\geq 3$ and $ q\geq 3$, we prove that the {\sc Equality} function $(=_n)$ on $n$ variables over a domain of size $q$ cannot be realized by matchgates under holographic transformations. This is a consequence of our theorem on the structure of blockwise symmetric matchgate signatures. %due to the rank of the matrix form of the blockwise symmetric standard signatures, %where $(=_n)$ is an equality signature on domain $\{0, 1, \cdots, q-1\}$. This has the implication that the standard holographic algorithms based on matchgates, a methodology known to be universal for \#CSP over the Boolean domain, cannot produce P-time algorithms for planar \#CSP over any higher domain $q\geq 3$.
[ { "version": "v1", "created": "Mon, 3 Jul 2017 00:20:17 GMT" } ]
2017-07-04T00:00:00
[ [ "Fu", "Zhiguo", "" ] ]
new_dataset
0.966195
1707.00519
Fan Liu
Fan Liu, Christos Masouros, Ang Li, Huafei Sun, Lajos Hanzo
MU-MIMO Communications with MIMO Radar: From Co-existence to Joint Transmission
15 pages, 15 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Beamforming techniques are proposed for a joint multi-input-multi-output (MIMO) radar-communication (RadCom) system, where a single device acts both as a radar and a communication base station (BS) by simultaneously communicating with downlink users and detecting radar targets. Two operational options are considered, where we first split the antennas into two groups, one for radar and the other for communication. Under this deployment, the radar signal is designed to fall into the null-space of the downlink channel. The communication beamformer is optimized such that the beampattern obtained matches the radar's beampattern while satisfying the communication performance requirements. To reduce the optimizations' constraints, we consider a second operational option, where all the antennas transmit a joint waveform that is shared by both radar and communications. In this case, we formulate an appropriate probing beampattern, while guaranteeing the performance of the downlink communications. By incorporating the SINR constraints into objective functions as penalty terms, we further simplify the original beamforming designs to weighted optimizations, and solve them by efficient manifold algorithms. Numerical results show that the shared deployment outperforms the separated case significantly, and the proposed weighted optimizations achieve a similar performance to the original optimizations, despite their significantly lower computational complexity.
[ { "version": "v1", "created": "Mon, 3 Jul 2017 13:02:38 GMT" } ]
2017-07-04T00:00:00
[ [ "Liu", "Fan", "" ], [ "Masouros", "Christos", "" ], [ "Li", "Ang", "" ], [ "Sun", "Huafei", "" ], [ "Hanzo", "Lajos", "" ] ]
new_dataset
0.999763
1707.00627
Kenneth Young
Kenny Young and Ryan B. Hayward
A Reverse Hex Solver
Presented at Computers and Games 2016 Leiden, International Conference on Computers and Games. Springer International Publishing, 2016
null
null
null
cs.AI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Solrex,an automated solver for the game of Reverse Hex.Reverse Hex, also known as Rex, or Misere Hex, is the variant of the game of Hex in which the player who joins her two sides loses the game. Solrex performs a mini-max search of the state space using Scalable Parallel Depth First Proof Number Search, enhanced by the pruning of inferior moves and the early detection of certain winning strategies. Solrex is implemented on the same code base as the Hex program Solver, and can solve arbitrary positions on board sizes up to 6x6, with the hardest position taking less than four hours on four threads.
[ { "version": "v1", "created": "Wed, 26 Apr 2017 17:51:08 GMT" } ]
2017-07-04T00:00:00
[ [ "Young", "Kenny", "" ], [ "Hayward", "Ryan B.", "" ] ]
new_dataset
0.999341
1412.2352
S\'andor Kolumb\'an
S\'andor Kolumb\'an and Istv\'an Vajk and Johan Schoukens
Perturbed Datasets Methods for Hypothesis Testing and Structure of Corresponding Confidence Sets
null
Automatica, vol. 51, pages 326 - 331 (2015)
10.1016/j.automatica.2014.10.083
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hypothesis testing methods that do not rely on exact distribution assumptions have been emerging lately. The method of sign-perturbed sums (SPS) is capable of characterizing confidence regions with exact confidence levels for linear regression and linear dynamical systems parameter estimation problems if the noise distribution is symmetric. This paper describes a general family of hypothesis testing methods that have an exact user chosen confidence level based on finite sample count and without relying on an assumed noise distribution. It is shown that the SPS method belongs to this family and we provide another hypothesis test for the case where the symmetry assumption is replaced with exchangeability. In the case of linear regression problems it is shown that the confidence regions are connected, bounded and possibly non-convex sets in both cases. To highlight the importance of understanding the structure of confidence regions corresponding to such hypothesis tests it is shown that confidence sets for linear dynamical systems parameter estimates generated using the SPS method can have non-connected parts, which have far reaching consequences.
[ { "version": "v1", "created": "Sun, 7 Dec 2014 13:37:19 GMT" } ]
2017-07-03T00:00:00
[ [ "Kolumbán", "Sándor", "" ], [ "Vajk", "István", "" ], [ "Schoukens", "Johan", "" ] ]
new_dataset
0.998981
1505.07395
Marko Horvat
Marko Horvat, Dujo Duvnjak, Davor Jug
GWAT: The Geneva Affective Picture Database WordNet Annotation Tool
5 pages, 3 figures. In the Proceedings of 38th International Convention on Information and Communication Technology, Electronics and Microelectronics MIPRO 2015 (pp. 1403-1407)
null
null
null
cs.HC cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Geneva Affective Picture Database WordNet Annotation Tool (GWAT) is a user-friendly web application for manual annotation of pictures in Geneva Affective Picture Database (GAPED) with WordNet. The annotation tool has an intuitive interface which can be efficiently used with very little technical training. A single picture may be labeled with many synsets allowing experts to describe semantics with different levels of detail. Noun, verb, adjective and adverb synsets can be keyword-searched and attached to a specific GAPED picture with their unique identification numbers. Changes are saved automatically in the tool's relational database. The attached synsets can be reviewed, changed or deleted later. Additionally, GAPED pictures may be browsed in the tool's user interface using simple commands where previously attached WordNet synsets are displayed alongside the pictures. Stored annotations can be exported from the tool's database to different data formats and used in 3rd party applications if needed. Since GAPED does not define keywords of individual pictures but only a general category of picture groups, GWAT represents a significant improvement towards development of comprehensive picture semantics. The tool was developed with open technologies WordNet API, Apache, PHP5 and MySQL. It is freely available for scientific and non-commercial use.
[ { "version": "v1", "created": "Wed, 27 May 2015 16:27:23 GMT" }, { "version": "v2", "created": "Fri, 30 Jun 2017 14:07:05 GMT" } ]
2017-07-03T00:00:00
[ [ "Horvat", "Marko", "" ], [ "Duvnjak", "Dujo", "" ], [ "Jug", "Davor", "" ] ]
new_dataset
0.989128
1706.09579
Yingying Jiang
Yingying Jiang, Xiangyu Zhu, Xiaobing Wang, Shuli Yang, Wei Li, Hua Wang, Pei Fu and Zhenbo Luo
R2CNN: Rotational Region CNN for Orientation Robust Scene Text Detection
8 pages, 6 figures, 3 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel method called Rotational Region CNN (R2CNN) for detecting arbitrary-oriented texts in natural scene images. The framework is based on Faster R-CNN [1] architecture. First, we use the Region Proposal Network (RPN) to generate axis-aligned bounding boxes that enclose the texts with different orientations. Second, for each axis-aligned text box proposed by RPN, we extract its pooled features with different pooled sizes and the concatenated features are used to simultaneously predict the text/non-text score, axis-aligned box and inclined minimum area box. At last, we use an inclined non-maximum suppression to get the detection results. Our approach achieves competitive results on text detection benchmarks: ICDAR 2015 and ICDAR 2013.
[ { "version": "v1", "created": "Thu, 29 Jun 2017 05:00:38 GMT" }, { "version": "v2", "created": "Fri, 30 Jun 2017 13:01:52 GMT" } ]
2017-07-03T00:00:00
[ [ "Jiang", "Yingying", "" ], [ "Zhu", "Xiangyu", "" ], [ "Wang", "Xiaobing", "" ], [ "Yang", "Shuli", "" ], [ "Li", "Wei", "" ], [ "Wang", "Hua", "" ], [ "Fu", "Pei", "" ], [ "Luo", "Zhenbo", "" ] ]
new_dataset
0.990758
1706.09927
Cedomir Stefanovic
Federico Clazzer, Enrico Paolini, Iacopo Mambelli, Cedomir Stefanovic
Irregular Repetition Slotted ALOHA over the Rayleigh Block Fading Channel with Capture
Presented at ICC 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Random access protocols relying on the transmission of packet replicas in multiple slots and exploiting interference cancellation at the receiver have been shown to achieve per- formance competitive with that of orthogonal schemes. So far the optimization of the repetition degree profile, defining the probability for a user to transmit a given number of replicas, has mainly been performed targeting the collision channel model. In this paper the analysis is extended to a block fading channel model, also assuming capture effect at the receiver. Density evolution equations are developed for the new setting and, based on them, some repetition degree profiles are optimized and analyzed via Monte Carlo simulation in a finite frame length setting. The derived distributions are shown to achieve throughputs largely exceeding 1 [packet/slot].
[ { "version": "v1", "created": "Thu, 29 Jun 2017 19:05:01 GMT" } ]
2017-07-03T00:00:00
[ [ "Clazzer", "Federico", "" ], [ "Paolini", "Enrico", "" ], [ "Mambelli", "Iacopo", "" ], [ "Stefanovic", "Cedomir", "" ] ]
new_dataset
0.995101
1706.10046
Mikhail Rudoy
Erik D. Demaine, Mikhail Rudoy
Hamiltonicity is Hard in Thin or Polygonal Grid Graphs, but Easy in Thin Polygonal Grid Graphs
25 pages, 21 figures
null
null
null
cs.CC cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 2007, Arkin et al. initiated a systematic study of the complexity of the Hamiltonian cycle problem on square, triangular, or hexagonal grid graphs, restricted to polygonal, thin, superthin, degree-bounded, or solid grid graphs. They solved many combinations of these problems, proving them either polynomially solvable or NP-complete, but left three combinations open. In this paper, we prove two of these unsolved combinations to be NP-complete: Hamiltonicity of Square Polygonal Grid Graphs and Hamiltonicity of Hexagonal Thin Grid Graphs. We also consider a new restriction, where the grid graph is both thin and polygonal, and prove that Hamiltonicity then becomes polynomially solvable for square, triangular, and hexagonal grid graphs.
[ { "version": "v1", "created": "Fri, 30 Jun 2017 07:37:53 GMT" } ]
2017-07-03T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Rudoy", "Mikhail", "" ] ]
new_dataset
0.9911
1706.10220
Amit Kumar Sikder
Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
18 pages, Cyber-security, smart devices, sensors, sensor-based threats, 26th USENIX Security Symposium
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sensors (e.g., light, gyroscope, accelerotmeter) and sensing enabled applications on a smart device make the applications more user-friendly and efficient. However, the current permission-based sensor management systems of smart devices only focus on certain sensors and any App can get access to other sensors by just accessing the generic sensor API. In this way, attackers can exploit these sensors in numerous ways: they can extract or leak users' sensitive information, transfer malware, or record or steal sensitive information from other nearby devices. In this paper, we propose 6thSense, a context-aware intrusion detection system which enhances the security of smart devices by observing changes in sensor data for different tasks of users and creating a contextual model to distinguish benign and malicious behavior of sensors. 6thSense utilizes three different Machine Learning-based detection mechanisms (i.e., Markov Chain, Naive Bayes, and LMT) to detect malicious behavior associated with sensors. We implemented 6thSense on a sensor-rich Android smart device (i.e., smartphone) and collected data from typical daily activities of 50 real users. Furthermore, we evaluated the performance of 6thSense against three sensor-based threats: (1) a malicious App that can be triggered via a sensor (e.g., light), (2) a malicious App that can leak information via a sensor, and (3) a malicious App that can steal data using sensors. Our extensive evaluations show that the 6thSense framework is an effective and practical approach to defeat growing sensor-based threats with an accuracy above 96% without compromising the normal functionality of the device. Moreover, our framework costs minimal overhead.
[ { "version": "v1", "created": "Fri, 30 Jun 2017 14:40:08 GMT" } ]
2017-07-03T00:00:00
[ [ "Sikder", "Amit Kumar", "" ], [ "Aksu", "Hidayet", "" ], [ "Uluagac", "A. Selcuk", "" ] ]
new_dataset
0.999649
1706.10223
Bart{\l}omiej Balcerzak
Bart{\l}omiej Balcerzak, Wies{\l}aw Kope\'c, Rados{\l}aw Nielek, Sebastian Kruk, Kamil Warpechowski, Mateusz Wasik and Marek W\k{e}grzyn
Press F1 for help: participatory design for dealing with on-line and real life security of older adults
null
null
null
null
cs.SI cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present the report on the design and development of a platform for the inter-generational exchange of favors. This platform was designed using participatory design approach during a 24-hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of the end user, not only improves the design and development of the application, but also provides an effective method for designing and applying solutions aimed at improving the security of older adults while using online and mobile tools.
[ { "version": "v1", "created": "Fri, 30 Jun 2017 14:42:01 GMT" } ]
2017-07-03T00:00:00
[ [ "Balcerzak", "Bartłomiej", "" ], [ "Kopeć", "Wiesław", "" ], [ "Nielek", "Radosław", "" ], [ "Kruk", "Sebastian", "" ], [ "Warpechowski", "Kamil", "" ], [ "Wasik", "Mateusz", "" ], [ "Węgrzyn", "Marek", "" ] ]
new_dataset
0.997726
1706.10290
Mohammad Hosseini
Mohammad Hosseini, Richard B. Berlin Jr., Lui Sha
Physiology-Aware Rural Ambulance Routing
6 pages, The Fifth IEEE International Conference on Healthcare Informatics (ICHI 2017), Park City, Utah, 2017
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In emergency patient transport from rural medical facility to center tertiary hospital, real-time monitoring of the patient in the ambulance by a physician expert at the tertiary center is crucial. While telemetry healthcare services using mobile networks may enable remote real-time monitoring of transported patients, physiologic measures and tracking are at least as important and requires the existence of high-fidelity communication coverage. However, the wireless networks along the roads especially in rural areas can range from 4G to low-speed 2G, some parts with communication breakage. From a patient care perspective, transport during critical illness can make route selection patient state dependent. Prompt decisions with the relative advantage of a longer more secure bandwidth route versus a shorter, more rapid transport route but with less secure bandwidth must be made. The trade-off between route selection and the quality of wireless communication is an important optimization problem which unfortunately has remained unaddressed by prior work. In this paper, we propose a novel physiology-aware route scheduling approach for emergency ambulance transport of rural patients with acute, high risk diseases in need of continuous remote monitoring. We mathematically model the problem into an NP-hard graph theory problem, and approximate a solution based on a trade-off between communication coverage and shortest path. We profile communication along two major routes in a large rural hospital settings in Illinois, and use the traces to manifest the concept. Further, we design our algorithms and run preliminary experiments for scalability analysis. We believe that our scheduling techniques can become a compelling aid that enables an always-connected remote monitoring system in emergency patient transfer scenarios aimed to prevent morbidity and mortality with early diagnosis treatment.
[ { "version": "v1", "created": "Fri, 30 Jun 2017 17:45:11 GMT" } ]
2017-07-03T00:00:00
[ [ "Hosseini", "Mohammad", "" ], [ "Berlin", "Richard B.", "Jr." ], [ "Sha", "Lui", "" ] ]
new_dataset
0.985255
1407.2343
Kunal Narayan Chaudhury
S. Ghosh and K. N. Chaudhury
Fast Separable Non-Local Means
null
SPIE Journal of Electronic Imaging, vol. 25, no. 2, pp. 023026 (2016)
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a simple and fast algorithm called PatchLift for computing distances between patches (contiguous block of samples) extracted from a given one-dimensional signal. PatchLift is based on the observation that the patch distances can be efficiently computed from a matrix that is derived from the one-dimensional signal using lifting; importantly, the number of operations required to compute the patch distances using this approach does not scale with the patch length. We next demonstrate how PatchLift can be used for patch-based denoising of images corrupted with Gaussian noise. In particular, we propose a separable formulation of the classical Non-Local Means (NLM) algorithm that can be implemented using PatchLift. We demonstrate that the PatchLift-based implementation of separable NLM is few orders faster than standard NLM, and is competitive with existing fast implementations of NLM. Moreover, its denoising performance is shown to be consistently superior to that of NLM and some of its variants, both in terms of PSNR/SSIM and visual quality.
[ { "version": "v1", "created": "Wed, 9 Jul 2014 03:15:37 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2017 06:35:50 GMT" } ]
2017-06-30T00:00:00
[ [ "Ghosh", "S.", "" ], [ "Chaudhury", "K. N.", "" ] ]
new_dataset
0.997391
1701.08547
Robert Lim
Robert V. Lim, Boyana Norris, Allen D. Malony
Autotuning GPU Kernels via Static and Predictive Analysis
null
null
null
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Optimizing the performance of GPU kernels is challenging for both human programmers and code generators. For example, CUDA programmers must set thread and block parameters for a kernel, but might not have the intuition to make a good choice. Similarly, compilers can generate working code, but may miss tuning opportunities by not targeting GPU models or performing code transformations. Although empirical autotuning addresses some of these challenges, it requires extensive experimentation and search for optimal code variants. This research presents an approach for tuning CUDA kernels based on static analysis that considers fine-grained code structure and the specific GPU architecture features. Notably, our approach does not require any program runs in order to discover near-optimal parameter settings. We demonstrate the applicability of our approach in enabling code autotuners such as Orio to produce competitive code variants comparable with empirical-based methods, without the high cost of experiments.
[ { "version": "v1", "created": "Mon, 30 Jan 2017 11:23:42 GMT" }, { "version": "v2", "created": "Thu, 11 May 2017 22:27:32 GMT" }, { "version": "v3", "created": "Thu, 29 Jun 2017 11:25:02 GMT" } ]
2017-06-30T00:00:00
[ [ "Lim", "Robert V.", "" ], [ "Norris", "Boyana", "" ], [ "Malony", "Allen D.", "" ] ]
new_dataset
0.968318
1704.03603
Chengwen Xing
Yujie Lin, Shuai Wang, Xiangyuan Bu, Chengwen Xing, Jianping An
NOMA based Calibration for Large-Scale Spaceborne Antenna Arrays
30 Pages, 8 Figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the parallel calibration for transmitting phased arrays, the calibration receiver must separate the signals belonging to different antenna elements to avoid mutual interference. Existing algorithms encode different antenna elements' radiation with orthogonal signature codes, but these algorithms are far from desired for large-scale spaceborne antenna arrays. Considering the strictly limited resources on satellites, to improve hardware efficiency of large-scale spaceborne antenna arrays, in this work inspired by the idea of non-orthogonal multiple access (NOMA) we design a series of non-orthogonal signature codes for different antenna elements by Cyclically Shifting an m-Sequence (CSmS) with different offsets named as CSmS-NOMA signaling. This design can strike an elegant balance between the performance and complexity and is very suitable for large-scale spaceborne antenna arrays. It is shown that no matter how many antenna elements there are to be calibrated simultaneously, CSmS-NOMA signaling needs only one calibrating waveform generator and one matched filter. Hence it is much more efficient than the existing fully orthogonal schemes. In order to evaluate the achievable calibration accuracy, a unified theoretical framework is developed based on which the relationship between calibration accuracy and signal to noise ratio (SNR) has been clearly revealed. Furthermore, a hardware experiment platform is also built to assess the theoretical work. For all the considered scenarios, it can be concluded that the theoretical, simulated and experimental results coincide with each other perfectly.
[ { "version": "v1", "created": "Wed, 12 Apr 2017 02:48:17 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2017 02:34:15 GMT" } ]
2017-06-30T00:00:00
[ [ "Lin", "Yujie", "" ], [ "Wang", "Shuai", "" ], [ "Bu", "Xiangyuan", "" ], [ "Xing", "Chengwen", "" ], [ "An", "Jianping", "" ] ]
new_dataset
0.985456
1705.03634
Shirui Li
Shirui Li, Alper Yilmaz, Changlin Xiao, Hua Li
4d isip: 4d implicit surface interest point detection
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new method to detect 4D spatiotemporal interest points though an implicit surface, we refer to as the 4D-ISIP. We use a 3D volume which has a truncated signed distance function(TSDF) for every voxel to represent our 3D object model. The TSDF represents the distance between the spatial points and object surface points which is an implicit surface representation. Our novelty is to detect the points where the local neighborhood has significant variations along both spatial and temporal directions. We established a system to acquire 3D human motion dataset using only one Kinect. Experimental results show that our method can detect 4D-ISIP for different human actions.
[ { "version": "v1", "created": "Wed, 10 May 2017 07:12:31 GMT" }, { "version": "v2", "created": "Fri, 23 Jun 2017 07:18:54 GMT" } ]
2017-06-30T00:00:00
[ [ "Li", "Shirui", "" ], [ "Yilmaz", "Alper", "" ], [ "Xiao", "Changlin", "" ], [ "Li", "Hua", "" ] ]
new_dataset
0.986703
1706.05432
Malte M\"oser
Arvind Narayanan and Malte M\"oser
Obfuscation in Bitcoin: Techniques and Politics
null
null
null
null
cs.CY cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the cryptographic currency Bitcoin, all transactions are recorded in the blockchain - a public, global, and immutable ledger. Because transactions are public, Bitcoin and its users employ obfuscation to maintain a degree of financial privacy. Critically, and in contrast to typical uses of obfuscation, in Bitcoin obfuscation is not aimed against the system designer but is instead enabled by design. We map sixteen proposed privacy-preserving techniques for Bitcoin on an obfuscation-vs.-cryptography axis, and find that those that are used in practice tend toward obfuscation. We argue that this has led to a balance between privacy and regulatory acceptance.
[ { "version": "v1", "created": "Fri, 16 Jun 2017 21:15:46 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2017 15:03:16 GMT" } ]
2017-06-30T00:00:00
[ [ "Narayanan", "Arvind", "" ], [ "Möser", "Malte", "" ] ]
new_dataset
0.999122
1706.06775
Junya Honda
Junya Honda and Hirosuke Yamamoto
Variable-to-Fixed Length Homophonic Coding Suitable for Asymmetric Channel Coding
Full version of the paper to appear in 2017 IEEE International Symposium on Information Theory (ISIT2017)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In communication through asymmetric channels the capacity-achieving input distribution is not uniform in general. Homophonic coding is a framework to invertibly convert a (usually uniform) message into a sequence with some target distribution, and is a promising candidate to generate codewords with the nonuniform target distribution for asymmetric channels. In particular, a Variable-to-Fixed length (VF) homophonic code can be used as a suitable component for channel codes to avoid decoding error propagation. However, the existing VF homophonic code requires the knowledge of the maximum relative gap of probabilities between two adjacent sequences beforehand, which is an unrealistic assumption for long block codes. In this paper we propose a new VF homophonic code without such a requirement by allowing one-symbol decoding delay. We evaluate this code theoretically and experimentally to verify its asymptotic optimality.
[ { "version": "v1", "created": "Wed, 21 Jun 2017 07:58:21 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2017 11:00:29 GMT" } ]
2017-06-30T00:00:00
[ [ "Honda", "Junya", "" ], [ "Yamamoto", "Hirosuke", "" ] ]
new_dataset
0.983819
1706.09088
Dorien Herremans
Dorien Herremans, Ching-Hua Chuan
Modeling Musical Context with Word2vec
Proceedings of the First International Conference on Deep Learning and Music, Anchorage, US, May, 2017 (arXiv:1706.08675v1 [cs.NE])
Proceedings of the First International Workshop on Deep Learning and Music joint with IJCNN. Anchorage, US. 1(1). pp 11-18 (2017)
null
DLM/2017/1
cs.SD cs.IR cs.MM cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a semantic vector space model for capturing complex polyphonic musical context. A word2vec model based on a skip-gram representation with negative sampling was used to model slices of music from a dataset of Beethoven's piano sonatas. A visualization of the reduced vector space using t-distributed stochastic neighbor embedding shows that the resulting embedded vector space captures tonal relationships, even without any explicit information about the musical contents of the slices. Secondly, an excerpt of the Moonlight Sonata from Beethoven was altered by replacing slices based on context similarity. The resulting music shows that the selected slice based on similar word2vec context also has a relatively short tonal distance from the original slice.
[ { "version": "v1", "created": "Wed, 28 Jun 2017 00:46:50 GMT" }, { "version": "v2", "created": "Thu, 29 Jun 2017 02:33:06 GMT" } ]
2017-06-30T00:00:00
[ [ "Herremans", "Dorien", "" ], [ "Chuan", "Ching-Hua", "" ] ]
new_dataset
0.999235
1706.09485
Dixin Luo
Dixin Luo and Kelly Lyons
CASCONet: A Conference dataset
5 pages
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knowledge mobilization and translation describes the process of moving knowledge from research and development (R&D) labs into environments where it can be put to use. There is increasing interest in understanding mechanisms for knowledge mobilization, specifically with respect to academia and industry collaborations. These mechanisms include funding programs, research centers, and conferences, among others. In this paper, we focus on one specific knowledge mobilization mechanism, the CASCON conference, the annual conference of the IBM Centre for Advanced Studies (CAS). The mandate of CAS when it was established in 1990 was to foster collaborative work between the IBM Toronto Lab and university researchers from around the world. The first CAS Conference (CASCON) was held one year after CAS was formed in 1991. The focus of this annual conference was, and continues to be, bringing together academic researchers, industry practitioners, and technology users in a forum for sharing ideas and showcasing the results of the CAS collaborative work. We collected data about CASCON for the past 25 years including information about papers, technology showcase demos, workshops, and keynote presentations. The resulting dataset, called "CASCONet" is available for analysis and integration with related datasets. Using CASCONet, we analyzed interactions between R&D topics and changes in those topics over time. Results of our analysis show how the domain of knowledge being mobilized through CAS had evolved over time. By making CASCONet available to others, we hope that the data can be used in additional ways to understand knowledge mobilization and translation in this unique context.
[ { "version": "v1", "created": "Wed, 28 Jun 2017 21:02:11 GMT" } ]
2017-06-30T00:00:00
[ [ "Luo", "Dixin", "" ], [ "Lyons", "Kelly", "" ] ]
new_dataset
0.999759
1706.09558
Patrick Hutchings
P. Hutchings
Talking Drums: Generating drum grooves with neural networks
Proceedings of the First International Conference on Deep Learning and Music, Anchorage, US, May, 2017 (arXiv:1706.08675v1 [cs.NE])
Proceedings of the First International Workshop on Deep Learning and Music joint with IJCNN. Anchorage, US. 1(1). pp 43-47 (2017)
null
DLM/2017/3
cs.SD cs.MM cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Presented is a method of generating a full drum kit part for a provided kick-drum sequence. A sequence to sequence neural network model used in natural language translation was adopted to encode multiple musical styles and an online survey was developed to test different techniques for sampling the output of the softmax function. The strongest results were found using a sampling technique that drew from the three most probable outputs at each subdivision of the drum pattern but the consistency of output was found to be heavily dependent on style.
[ { "version": "v1", "created": "Thu, 29 Jun 2017 03:03:35 GMT" } ]
2017-06-30T00:00:00
[ [ "Hutchings", "P.", "" ] ]
new_dataset
0.970469
1706.09624
Panagiotis Diamantoulakis
Panagiotis D. Diamantoulakis and George K. Karagiannidis
Simultaneous Lightwave Information and Power Transfer (SLIPT) for Indoor IoT Applications
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the concept of Simultaneous Lightwave Information and Power Transfer (SLIPT) for indoor Internet-of-Things (IoT) applications. Specifically, we propose novel and fundamental SLIPT strategies, which can be implemented through Visible Light or Infrared communication systems, equipped with a simple solar panel-based receiver. These strategies are performed at the transmitter or at the receiver, or at both sides, named Adjusting transmission, Adjusting reception and Coordinated adjustment of transmission and reception, correspondingly. Furthermore, we deal with the fundamental trade-off between harvested energy and quality-of-service (QoS), by maximizing the harvested energy, while achieving the required user's QoS. To this end, two optimization problems are formulated and optimally solved. Computer simulations validate the optimum solutions and reveal that the proposed strategies considerably increase the harvested energy, compared to SLIPT with fixed policies.
[ { "version": "v1", "created": "Thu, 29 Jun 2017 08:32:01 GMT" } ]
2017-06-30T00:00:00
[ [ "Diamantoulakis", "Panagiotis D.", "" ], [ "Karagiannidis", "George K.", "" ] ]
new_dataset
0.992735
1706.09724
Damien Chablat
Damien Chablat (IRCCyN), Luc Baron (EPM), Ranjan Jha (EPM)
Kinematics and workspace analysis of a 3ppps parallel robot with u-shaped base
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the kinematic analysis of the 3-PPPS parallel robot with an equilateral mobile platform and a U-shape base. The proposed design and appropriate selection of parameters allow to formulate simpler direct and inverse kinematics for the manipulator under study. The parallel singularities associated with the manipulator depend only on the orientation of the end-effector, and thus depend only on the orientation of the end effector. The quaternion parameters are used to represent the aspects, i.e. the singularity free regions of the workspace. A cylindrical algebraic decomposition is used to characterize the workspace and joint space with a low number of cells. The dis-criminant variety is obtained to describe the boundaries of each cell. With these simplifications, the 3-PPPS parallel robot with proposed design can be claimed as the simplest 6 DOF robot, which further makes it useful for the industrial applications.
[ { "version": "v1", "created": "Tue, 16 May 2017 07:43:55 GMT" } ]
2017-06-30T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Baron", "Luc", "", "EPM" ], [ "Jha", "Ranjan", "", "EPM" ] ]
new_dataset
0.966933
1706.09764
Melissa Duarte
Paul Ferrand and Melissa Duarte
Multi-tap Digital Canceller for Full-Duplex Applications
SPAWC 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We identify phase noise as a bottleneck for the performance of digital self-interference cancellers that utilize a single auxiliary receiver---single-tap digital cancellers---and operate in multipath propagation environments. Our analysis demonstrates that the degradation due to phase noise is caused by a mismatch between the analog delay of the auxiliary receiver and the different delays of the multipath components of the self-interference signal. We propose a novel multi-tap digital self-interference canceller architecture that is based on multiple auxiliary receivers and a customized Normalized-Least-Mean-Squared (NLMS) filtering for self-interference regeneration. Our simulation results demonstrate that our proposed architecture is more robust to phase noise impairments and can in some cases achieve 10~dB larger self-interference cancellation than the single-tap architecture.
[ { "version": "v1", "created": "Thu, 29 Jun 2017 14:03:31 GMT" } ]
2017-06-30T00:00:00
[ [ "Ferrand", "Paul", "" ], [ "Duarte", "Melissa", "" ] ]
new_dataset
0.97941
1706.09817
Aleksandar Mastilovic
Aleksandar Mastilovic, Dejan Vukobratovic, Dusan Jakovetic, Dragana Bajovic
Cooperative Slotted ALOHA for Massive M2M Random Access Using Directional Antennas
IEEE ICC 2017, Workshop on Integrating Communications, Control, and Computing Technologies for Smart Grid (ICT4SG) Pages = 6; Figures = 6
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Slotted ALOHA (SA) algorithms with Successive Interference Cancellation (SIC) decoding have received significant attention lately due to their ability to dramatically increase the throughput of traditional SA. Motivated by increased density of cellular radio access networks due to the introduction of small cells, and dramatic increase of user density in Machine-to-Machine (M2M) communications, SA algorithms with SIC operating cooperatively in multi base station (BS) scenario are recently considered. In this paper, we generalize our previous work on Slotted ALOHA with multiple-BS (SA-MBS) by considering users that use directional antennas. In particular, we focus on a simple randomized beamforming strategy where, for every packet transmission, a user orients its main beam in a randomly selected direction. We are interested in the total achievable system throughput for two decoding scenarios: i) non-cooperative scenario in which traditional SA operates at each BS independently, and ii) cooperative SA-MBS in which centralized SIC-based decoding is applied over all received user signals. For both scenarios, we provide upper system throughput limits and compare them against the simulation results. Finally, we discuss the system performance as a function of simple directional antenna model parameters applied in this paper.
[ { "version": "v1", "created": "Thu, 29 Jun 2017 15:48:04 GMT" } ]
2017-06-30T00:00:00
[ [ "Mastilovic", "Aleksandar", "" ], [ "Vukobratovic", "Dejan", "" ], [ "Jakovetic", "Dusan", "" ], [ "Bajovic", "Dragana", "" ] ]
new_dataset
0.986808
1408.2955
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
A Hoare-like logic of asserted single-pass instruction sequences
22 pages, the preliminaries have textual overlaps with the preliminaries in arXiv:1402.4950 [cs.LO] and earlier papers; introduction and conclusions rewritten, explanatory remarks added; introduction partly rewritten; 24 pages, clarifying examples added
Scientific Annals of Computer Science, 26(2):125--156 (2016)
10.7561/SACS.2016.2.125
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a formal system for proving the partial correctness of a single-pass instruction sequence as considered in program algebra by decomposition into proofs of the partial correctness of segments of the single-pass instruction sequence concerned. The system is similar to Hoare logics, but takes into account that, by the presence of jump instructions, segments of single-pass instruction sequences may have multiple entry points and multiple exit points. It is intended to support a sound general understanding of the issues with Hoare-like logics for low-level programming languages.
[ { "version": "v1", "created": "Wed, 13 Aug 2014 09:41:13 GMT" }, { "version": "v2", "created": "Thu, 3 Dec 2015 14:09:34 GMT" }, { "version": "v3", "created": "Tue, 19 Jul 2016 11:54:17 GMT" }, { "version": "v4", "created": "Wed, 3 May 2017 11:53:03 GMT" } ]
2017-06-29T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
new_dataset
0.9996
1702.06764
Pepe Vila
Pepe Vila and Boris K\"opf
Loophole: Timing Attacks on Shared Event Loops in Chrome
Original publication in the Proceedings of the 26th Annual USENIX Security Symposium (USENIX Security 2017). https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/vila
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Event-driven programming (EDP) is the prevalent paradigm for graphical user interfaces, web clients, and it is rapidly gaining importance for server-side and network programming. Central components of EDP are {\em event loops}, which act as FIFO queues that are used by processes to store and dispatch messages received from other processes. In this paper we demonstrate that shared event loops are vulnerable to side-channel attacks, where a spy process monitors the loop usage pattern of other processes by enqueueing events and measuring the time it takes for them to be dispatched. Specifically, we exhibit attacks against the two central event loops in Google's Chrome web browser: that of the I/O thread of the host process, which multiplexes all network events and user actions, and that of the main thread of the renderer processes, which handles rendering and Javascript tasks. For each of these loops, we show how the usage pattern can be monitored with high resolution and low overhead, and how this can be abused for malicious purposes, such as web page identification, user behavior detection, and covert communication.
[ { "version": "v1", "created": "Wed, 22 Feb 2017 11:55:01 GMT" }, { "version": "v2", "created": "Wed, 28 Jun 2017 15:10:50 GMT" } ]
2017-06-29T00:00:00
[ [ "Vila", "Pepe", "" ], [ "Köpf", "Boris", "" ] ]
new_dataset
0.998848
1706.04188
Paul Ginsparg
P. Ginsparg
Preprint D\'ej\`a Vu: an FAQ
14 pages. v2: minor clarifications
null
10.15252/embj.201695531
null
cs.DL physics.soc-ph q-bio.OT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I give a brief overview of arXiv history, and describe the current state of arXiv practice, both technical and sociological. This commentary originally appeared in the EMBO Journal, 19 Oct 2016. It was intended as an update on comments from the late 1990s regarding use of preprints by biologists (or lack thereof), but may be of interest to practitioners of other disciplines. It is based largely on a keynote presentation I gave to the ASAPbio inaugural meeting in Feb 2016, and responds as well to some follow-up questions.
[ { "version": "v1", "created": "Tue, 13 Jun 2017 22:18:05 GMT" }, { "version": "v2", "created": "Wed, 28 Jun 2017 03:29:22 GMT" } ]
2017-06-29T00:00:00
[ [ "Ginsparg", "P.", "" ] ]
new_dataset
0.998809
1706.08870
Yixin Luo
Yixin Luo, Saugata Ghose, Tianshi Li, Sriram Govindan, Bikash Sharma, Bryan Kelly, Amirali Boroumand, Onur Mutlu
Using ECC DRAM to Adaptively Increase Memory Capacity
null
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern DRAM modules are often equipped with hardware error correction capabilities, especially for DRAM deployed in large-scale data centers, as process technology scaling has increased the susceptibility of these devices to errors. To provide fast error detection and correction, error-correcting codes (ECC) are placed on an additional DRAM chip in a DRAM module. This additional chip expands the raw capacity of a DRAM module by 12.5%, but the applications are unable to use any of this extra capacity, as it is used exclusively to provide reliability for all data. In reality, there are a number of applications that do not need such strong reliability for all their data regions (e.g., some user batch jobs executing on a public cloud), and can instead benefit from using additional DRAM capacity to store extra data. Our goal in this work is to provide the additional capacity within an ECC DRAM module to applications when they do not need the high reliability of error correction. In this paper, we propose Capacity- and Reliability-Adaptive Memory (CREAM), a hardware mechanism that adapts error correcting DRAM modules to offer multiple levels of error protection, and provides the capacity saved from using weaker protection to applications. For regions of memory that do not require strong error correction, we either provide no ECC protection or provide error detection using multibit parity. We evaluate several layouts for arranging the data within ECC DRAM in these reduced-protection modes, taking into account the various trade-offs exposed from exploiting the extra chip. Our experiments show that the increased capacity provided by CREAM improves performance by 23.0% for a memory caching workload, and by 37.3% for a commercial web search workload executing production query traces. In addition, CREAM can increase bank-level parallelism within DRAM, offering further performance improvements.
[ { "version": "v1", "created": "Tue, 27 Jun 2017 14:13:20 GMT" }, { "version": "v2", "created": "Wed, 28 Jun 2017 05:31:13 GMT" } ]
2017-06-29T00:00:00
[ [ "Luo", "Yixin", "" ], [ "Ghose", "Saugata", "" ], [ "Li", "Tianshi", "" ], [ "Govindan", "Sriram", "" ], [ "Sharma", "Bikash", "" ], [ "Kelly", "Bryan", "" ], [ "Boroumand", "Amirali", "" ], [ "Mutlu", "Onur", "" ] ]
new_dataset
0.985757
1706.09043
Daniel Paulusma
Dani\"el Paulusma and Christophe Picouleau and Bernard Ries
Critical Vertices and Edges in $H$-free Graphs
null
null
null
null
cs.CC cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A vertex or edge in a graph is critical if its deletion reduces the chromatic number of the graph by 1. We consider the problems of deciding whether a graph has a critical vertex or edge, respectively. We give a complexity dichotomy for both problems restricted to $H$-free graphs, that is, graphs with no induced subgraph isomorphic to $H$. Moreover, we show that an edge is critical if and only if its contraction reduces the chromatic number by 1. Hence, we also obtain a complexity dichotomy for the problem of deciding if a graph has an edge whose contraction reduces the chromatic number by 1.
[ { "version": "v1", "created": "Tue, 27 Jun 2017 20:58:26 GMT" } ]
2017-06-29T00:00:00
[ [ "Paulusma", "Daniël", "" ], [ "Picouleau", "Christophe", "" ], [ "Ries", "Bernard", "" ] ]
new_dataset
0.987228