id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1706.09086
|
Debajyoti Mondal
|
Anna Lubiw and Debajyoti Mondal
|
On Compatible Triangulations with a Minimum Number of Steiner Points
|
A preliminary version appeared at the 29th Canadian Conference on
Computational Geometry (CCCG 2017)
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Two vertex-labelled polygons are \emph{compatible} if they have the same
clockwise cyclic ordering of vertices. The definition extends to polygonal
regions (polygons with holes) and to triangulations---for every face, the
clockwise cyclic order of vertices on the boundary must be the same. It is
known that every pair of compatible $n$-vertex polygonal regions can be
extended to compatible triangulations by adding $O(n^2)$ Steiner points.
Furthermore, $\Omega(n^2)$ Steiner points are sometimes necessary, even for a
pair of polygons. Compatible triangulations provide piecewise linear
homeomorphisms and are also a crucial first step in morphing planar graph
drawings, aka "2D shape animation". An intriguing open question, first posed by
Aronov, Seidel, and Souvaine in 1993, is to decide if two compatible polygons
have compatible triangulations with at most $k$ Steiner points. In this paper
we prove the problem to be NP-hard for polygons with holes. The question
remains open for simple polygons.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2017 00:33:18 GMT"
}
] | 2017-06-29T00:00:00 |
[
[
"Lubiw",
"Anna",
""
],
[
"Mondal",
"Debajyoti",
""
]
] |
new_dataset
| 0.967715 |
1706.09089
|
Jing Jin
|
Jing Jin, Brendan Z. Allison, Yu Zhang, Yan Chen, Sijie Zhou, Yi Dong,
Xingyu Wang and Andrzej Chchocki
|
Continuous use of ERP-based BCIs with different visual angles in ALS
patients
| null | null | null | null |
cs.HC q-bio.NC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Objective: Amyotrophic lateral sclerosis (ALS) is a rare disease, but is also
one of the most common motor neuron diseases, and people of all races and
ethnic backgrounds are affected. There is currently no cure. Brain computer
interfaces (BCIs) can establish a communication channel directly between the
brain and an external device by recognizing brain activities that reflect user
intent. Therefore, this technology could help ALS patients in promoting
functional independence through BCI-based speller systems and motor assistive
devices. Methods: In this paper, two kinds of ERP-based speller systems were
tested on 18 ALS patients to: (1) assess performance when they spelled 42
characters online continuously, without a break; and (2) to compare performance
between a matrix-based speller paradigm (MS-P, mean visual angle 6 degree) and
a new speller paradigm that used a larger visual angle called the large visual
angle speller paradigm (LS-P, mean visual angle 8 degree). Results: Although
results showed that there were no significant differences between the two
paradigms in accuracy trend over continuous use (p>0.05), the fatigue during
the LS-P condition was significantly lower than that of MS-P (p<0.05). Results
also showed that continuous use slightly reduced the performance of this
ERP-based BCI. Conclusion: 15 subjects obtained higher than 80% feedback
accuracy (online output accuracy) and 9 subjects obtained higher than 90%
feedback accuracy in one of the two paradigms, thus validating the BCI
approaches in this study. Significance: Most ALS subjects in this study could
spell effectively after continuous use of an ERP-based BCI. The new LS-P
display may be easier for subjects to use, resulting in lower fatigue.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2017 00:52:17 GMT"
}
] | 2017-06-29T00:00:00 |
[
[
"Jin",
"Jing",
""
],
[
"Allison",
"Brendan Z.",
""
],
[
"Zhang",
"Yu",
""
],
[
"Chen",
"Yan",
""
],
[
"Zhou",
"Sijie",
""
],
[
"Dong",
"Yi",
""
],
[
"Wang",
"Xingyu",
""
],
[
"Chchocki",
"Andrzej",
""
]
] |
new_dataset
| 0.965896 |
1706.09094
|
Rommel Salas
|
Rommel Salas
|
Antropologia de la Informatica Social: Teoria de la Convergencia
Tecno-Social
|
in Spanish
| null | null | null |
cs.CY
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
The traditional humanism of the twentieth century, inspired by the culture of
the book, systematically distanced itself from the new society of digital
information; the Internet and tools of information processing revolutionized
the world, society during this period developed certain adaptive
characteristics based on coexistence (Human - Machine), this transformation
sets based on the impact of three technology segments: devices, applications
and infrastructure of social communication, which are involved in various
physical, behavioural and cognitive changes of the human being; and the
emergence of new models of influence and social control through the new
ubiquitous communication; however in this new process of conviviality new
models like the "collaborative thinking" and "InfoSharing" develop; managing
social information under three Human ontological dimensions (h) - Information
(i) - Machine (m), which is the basis of a new physical-cyber ecosystem, where
they coexist and develop new social units called "virtual communities ". This
new communication infrastructure and social management of information given
discovered areas of vulnerability "social perspective of risk", impacting all
social units through massive impact vector (i); The virtual environment "H + i
+ M"; and its components, as well as the life cycle management of social
information allows us to understand the path of integration "Techno - Social"
and setting a new contribution to cybernetics, within the convergence of
technology with society and the new challenges of coexistence, aimed at a new
holistic and not pragmatic vision, as the human component (h) in the virtual
environment is the precursor of the future and needs to be studied not as an
application, but as the hub of a new society.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2017 01:29:57 GMT"
}
] | 2017-06-29T00:00:00 |
[
[
"Salas",
"Rommel",
""
]
] |
new_dataset
| 0.998106 |
1706.09146
|
Rami Cohen
|
Rami Cohen, Netanel Raviv, Yuval Cassuto
|
LDPC Codes over the q-ary Multi-Bit Channel
|
26 pages, 8 figures, submitted to IEEE Transactions on Information
Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we introduce a new channel model we term the q-ary multi-bit
channel (QMBC). This channel models a memory device, where q-ary symbols
(q=2^s) are stored in the form of current/voltage levels. The symbols are read
in a measurement process, which provides a symbol bit in each measurement step,
starting from the most significant bit. An error event occurs when not all the
symbol bits are known. To deal with such error events, we use GF(q) low-density
parity-check (LDPC) codes and analyze their decoding performance. We start with
iterative-decoding threshold analysis, and derive optimal edge-label
distributions for maximizing the decoding threshold. We later move to
finite-length iterative-decoding analysis and propose an edge-labeling
algorithm for improved decoding performance. We then provide finite-length
maximum-likelihood decoding analysis for both the standard non-binary random
ensemble and LDPC ensembles. Finally, we demonstrate by simulations that the
proposed edge-labeling algorithm improves finite-length decoding performance by
orders of magnitude.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2017 07:25:02 GMT"
}
] | 2017-06-29T00:00:00 |
[
[
"Cohen",
"Rami",
""
],
[
"Raviv",
"Netanel",
""
],
[
"Cassuto",
"Yuval",
""
]
] |
new_dataset
| 0.999555 |
1706.09247
|
Saurabh Bagchi
|
Naixing Wang, Edgardo Barsallo Yi, Saurabh Bagchi
|
On Reliability of Android Wearable Health Devices
| null | null | null | null |
cs.CY
|
http://creativecommons.org/licenses/by/4.0/
|
Wearable devices are increasingly being used for monitoring health signals
and for fitness purposes with typical uses being calorie tracker, workout
assistant, and step counter. Even though these wearables can measure many
health signals (e.g. heart rate), they are still not perceived as highly
accurate, relative to clinical monitoring devices. In this paper, we
investigate the accuracy of heart monitor as included in two popular wearables
Motorola Moto 360 and the Apple Watch. We analyze the accuracy from a hardware
and a software perspective and show the effects of body motion on the heart
rate monitors based on the use of photoplethysmography (PPG) signals used in
Android wearables. We then do a software reliability study of the Android Wear
OS, on which many wearables are based, using fuzz testing.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2017 16:34:05 GMT"
}
] | 2017-06-29T00:00:00 |
[
[
"Wang",
"Naixing",
""
],
[
"Yi",
"Edgardo Barsallo",
""
],
[
"Bagchi",
"Saurabh",
""
]
] |
new_dataset
| 0.998417 |
1706.09269
|
Wen Shen
|
Bradley Quadros, Ronit Kadam, Kartik Saxena, Wen Shen and Alfred Kobsa
|
Dashbell: A Low-cost Smart Doorbell System for Home Use
|
Accepted by IEEE PerCom 2016
| null | null | null |
cs.CY
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Smart doorbells allow home owners to receive alerts when a visitor is at the
door, see who the guest is, and communicate with the visitor from a smart
device. They greatly improve people's life quality and contribute to the
evolution of smart homes. However, the commercial smart doorbells are quite
expensive, usually cost more than 190 US dollars, which is a substantial
impediment on the pervasiveness of smart doorbells. To solve this problem, we
introduce the Dashbell-a budget smart doorbell system for home use. It connects
a WiFi-enabled device, the Amazon Dash Button, to a network and enables the
home owner to answer the bell triggered by the dash button using a smartphone.
The Dashbell system also enables fast fault detection and diagnosis due to its
distributed framework.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 23:26:03 GMT"
}
] | 2017-06-29T00:00:00 |
[
[
"Quadros",
"Bradley",
""
],
[
"Kadam",
"Ronit",
""
],
[
"Saxena",
"Kartik",
""
],
[
"Shen",
"Wen",
""
],
[
"Kobsa",
"Alfred",
""
]
] |
new_dataset
| 0.999792 |
1706.09335
|
Harsh Jhamtani
|
Gaurush Hiranandani, Pranav Maneriker, Harsh Jhamtani
|
Generating Appealing Brand Names
|
Has been accepted to and presented in CICLING 2017
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Providing appealing brand names to newly launched products, newly formed
companies or for renaming existing companies is highly important as it can play
a crucial role in deciding its success or failure. In this work, we propose a
computational method to generate appealing brand names based on the description
of such entities. We use quantitative scores for readability, pronounceability,
memorability and uniqueness of the generated names to rank order them. A set of
diverse appealing names is recommended to the user for the brand naming task.
Experimental results show that the names generated by our approach are more
appealing than names which prior approaches and recruited humans could come up.
|
[
{
"version": "v1",
"created": "Wed, 28 Jun 2017 15:50:26 GMT"
}
] | 2017-06-29T00:00:00 |
[
[
"Hiranandani",
"Gaurush",
""
],
[
"Maneriker",
"Pranav",
""
],
[
"Jhamtani",
"Harsh",
""
]
] |
new_dataset
| 0.967751 |
1606.03365
|
James Eaton
|
James Eaton and Nikolay D. Gaubitch and Alastair H. Moore and Patrick
A. Naylor
|
Acoustic Characterization of Environments (ACE) Challenge Results
Technical Report
|
Supporting material for Proceedings of the ACE Challenge Workshop - a
satellite event of IEEE-WASPAA 2015 (arXiv:1510.00383)
| null | null | null |
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This document provides the results of the tests of acoustic parameter
estimation algorithms on the Acoustic Characterization of Environments (ACE)
Challenge Evaluation dataset which were subsequently submitted and written up
into papers for the Proceedings of the ACE Challenge. This document is
supporting material for a forthcoming journal paper on the ACE Challenge which
will provide further analysis of the results.
|
[
{
"version": "v1",
"created": "Thu, 17 Dec 2015 10:40:22 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Jun 2016 11:55:47 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Jun 2017 14:42:44 GMT"
},
{
"version": "v4",
"created": "Tue, 27 Jun 2017 09:34:28 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Eaton",
"James",
""
],
[
"Gaubitch",
"Nikolay D.",
""
],
[
"Moore",
"Alastair H.",
""
],
[
"Naylor",
"Patrick A.",
""
]
] |
new_dataset
| 0.992534 |
1609.06355
|
Sivakanth Gopi
|
Jop Bri\"et, Zeev Dvir and Sivakanth Gopi
|
Outlaw distributions and locally decodable codes
|
A preliminary version of this paper appeared in the proceedings of
ITCS 2017
| null | null | null |
cs.CC math.CO math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Locally decodable codes (LDCs) are error correcting codes that allow for
decoding of a single message bit using a small number of queries to a corrupted
encoding. Despite decades of study, the optimal trade-off between query
complexity and codeword length is far from understood. In this work, we give a
new characterization of LDCs using distributions over Boolean functions whose
expectation is hard to approximate (in~$L_\infty$~norm) with a small number of
samples. We coin the term `outlaw distributions' for such distributions since
they `defy' the Law of Large Numbers. We show that the existence of outlaw
distributions over sufficiently `smooth' functions implies the existence of
constant query LDCs and vice versa. We give several candidates for outlaw
distributions over smooth functions coming from finite field incidence
geometry, additive combinatorics and from hypergraph (non)expanders.
We also prove a useful lemma showing that (smooth) LDCs which are only
required to work on average over a random message and a random message index
can be turned into true LDCs at the cost of only constant factors in the
parameters.
|
[
{
"version": "v1",
"created": "Tue, 20 Sep 2016 21:02:02 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jun 2017 21:42:41 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Briët",
"Jop",
""
],
[
"Dvir",
"Zeev",
""
],
[
"Gopi",
"Sivakanth",
""
]
] |
new_dataset
| 0.986239 |
1703.01062
|
Hyungsik Ju
|
Hyungsik Ju, Yuro Lee, Tae-Joong Kim
|
Full-Duplex Operations in Wireless Powered Communication Networks
|
7 pages, 7 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a wireless powered communication network (WPCN) consisting of
a hybrid access point (H-AP) and multiple user equipment (UEs), all of which
operate in full-duplex (FD), is described. We first propose a transceiver
structure that enables FD operation of each UE to simultaneously receive energy
in the downlink (DL) and transmit information in the uplink (UL). We then
provide an energy usage model in the proposed UE transceiver that accounts for
the energy leakage from the transmit chain to the receive chain. It is shown
that the throughput of an FD WPCN using the proposed FD UEs can be maximized by
optimally allocating the UL transmission time to the UEs by solving a convex
optimization problem. Simulation results reveal that the use of the proposed FD
UEs efficiently improves the throughput of a WPCN with practical
self-interference cancellation (SIC) capability at the H-AP. With current SIC
technologies reducing the power of the residual self-interference to the level
of background noise, the proposed FD WPCN using FD UEs achieves 18% and 25 % of
throughput gain as compared to the conventional FD WPCN using HD UEs and HD
WPCN, respectively.
|
[
{
"version": "v1",
"created": "Fri, 3 Mar 2017 07:23:49 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Mar 2017 01:02:38 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Jun 2017 02:00:43 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Ju",
"Hyungsik",
""
],
[
"Lee",
"Yuro",
""
],
[
"Kim",
"Tae-Joong",
""
]
] |
new_dataset
| 0.958939 |
1706.08619
|
Johnnatan Messias
|
Johnnatan Messias, Pantelis Vikatos and Fabricio Benevenuto
|
White, Man, and Highly Followed: Gender and Race Inequalities in Twitter
|
In Proceedings of the IEEE/WIC/ACM International Conference on Web
Intelligence (WI'17). Leipzig, Germany. August 2017
| null |
10.1145/3106426.3106472
| null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social media is considered a democratic space in which people connect and
interact with each other regardless of their gender, race, or any other
demographic factor. Despite numerous efforts that explore demographic factors
in social media, it is still unclear whether social media perpetuates old
inequalities from the offline world. In this paper, we attempt to identify
gender and race of Twitter users located in U.S. using advanced image
processing algorithms from Face++. Then, we investigate how different
demographic groups (i.e. male/female, Asian/Black/White) connect with other. We
quantify to what extent one group follow and interact with each other and the
extent to which these connections and interactions reflect in inequalities in
Twitter. Our analysis shows that users identified as White and male tend to
attain higher positions in Twitter, in terms of the number of followers and
number of times in user's lists. We hope our effort can stimulate the
development of new theories of demographic information in the online space.
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2017 22:44:08 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Messias",
"Johnnatan",
""
],
[
"Vikatos",
"Pantelis",
""
],
[
"Benevenuto",
"Fabricio",
""
]
] |
new_dataset
| 0.973005 |
1706.08641
|
Sheng Zhang
|
Sheng Zhang, Wei-qi Qian
|
Dynamic backstepping control for pure-feedback nonlinear systems
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A dynamic backstepping method is proposed to design controllers for nonlinear
systems in the pure-feedback form, for which the traditional backstepping
method suffers from solving the implicit nonlinear algebraic equation. The idea
of this method is to augment the (virtual) controls as states during each
recursive step. As new dynamics are included in the design, the resulting
controller is in the dynamic feedback form. Procedure of deriving the
controller is detailed, and one more Lyapunov design is executed in each step
compared with the traditional backstepping method. Under appropriate
assumptions, the proposed control scheme achieves the uniformly asymptotically
stability. The effectiveness of this method is illustrated by the stabilization
and tracking numerical examples.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2017 01:51:52 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Zhang",
"Sheng",
""
],
[
"Qian",
"Wei-qi",
""
]
] |
new_dataset
| 0.993171 |
1706.08680
|
Darko Dimitrov
|
Darko Dimitrov, Zhibin Du, Carlos M. da Fonseca
|
Forbidden branches in trees with minimal atom-bond connectivity index
| null |
Applied Mathematics and Computation, Volume 313, 15 November 2017,
Pages 418 - 430
|
10.1016/j.amc.2017.06.014
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The atom-bond connectivity (ABC) index has been, in recent years, one of the
most actively studied vertex-degree-based graph invariants in chemical graph
theory. For a given graph $G$, the ABC index is defined as $\sum_{uv\in
E}\sqrt{\frac{d(u) +d(v)-2}{d(u)d(v)}}$, where $d(u)$ is the degree of vertex
$u$ in $G$ and $E(G)$ denotes the set of edges of $G$. In this paper we present
some new structural properties of trees with a minimal ABC index (also refer to
as a minimal-ABC tree), which is a step further towards understanding their
complete characterization. We show that a minimal-ABC tree cannot
simultaneously contain a $B_4$-branch and $B_1$ or $B_2$-branches.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2017 06:20:24 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Dimitrov",
"Darko",
""
],
[
"Du",
"Zhibin",
""
],
[
"da Fonseca",
"Carlos M.",
""
]
] |
new_dataset
| 0.976329 |
1706.08690
|
Tarik Alafif
|
Tarik Alafif, Zeyad Hailat, Melih Aslan, Xuewen Chen
|
Large-scale Datasets: Faces with Partial Occlusions and Pose Variations
in the Wild
|
5 pages 8 figures 1 table
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Face detection methods have relied on face datasets for training. However,
existing face datasets tend to be in small scales for face learning in both
constrained and unconstrained environments. In this paper, we first introduce
our large-scale image datasets, Large-scale Labeled Face (LSLF) and noisy
Large-scale Labeled Non-face (LSLNF). Our LSLF dataset consists of a large
number of unconstrained multi-view and partially occluded faces. The faces have
many variations in color and grayscale, image quality, image resolution, image
illumination, image background, image illusion, human face, cartoon face,
facial expression, light and severe partial facial occlusion, make up, gender,
age, and race. Many of these faces are partially occluded with accessories such
as tattoos, hats, glasses, sunglasses, hands, hair, beards, scarves,
microphones, or other objects or persons. The LSLF dataset is currently the
largest labeled face image dataset in the literature in terms of the number of
labeled images and the number of individuals compared to other existing labeled
face image datasets. Second, we introduce our CrowedFaces and CrowedNonFaces
image datasets. The crowedFaces and CrowedNonFaces datasets include faces and
non-faces images from crowed scenes. These datasets essentially aim for
researchers to provide a large number of training examples with many variations
for large scale face learning and face recognition tasks.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2017 07:04:51 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Alafif",
"Tarik",
""
],
[
"Hailat",
"Zeyad",
""
],
[
"Aslan",
"Melih",
""
],
[
"Chen",
"Xuewen",
""
]
] |
new_dataset
| 0.992507 |
1706.08718
|
Hela Jedda
|
Hela Jedda, Leonardo G. Baltar, Oliver De Candido, Amine Mezghani,
Josef A. Nossek
|
DFE/THP duality for FBMC with highly frequency selective channels
|
Presented in EUSIPCO 2015, 31 August - 4 September 2015, Nice, France
| null |
10.1109/EUSIPCO.2015.7362760
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Filter bank based multicarrier with Offset-QAM systems (FBMC/OQAM) are strong
candidates for the waveform of future 5-th generation (5G) wireless standards.
These systems can achieve maximum spectral efficiency compared to other
multicarrier schemes, particularly in highly frequency selective propagation
conditions. In this case a multi-tap, fractionally spaced equalizer or precoder
needs to be inserted in each subcarrier at the receiver or transmitter side to
compensate inter-symbol interference (ISI) and inter-carrier interference
(ICI). In this paper we propose a new Tomlinson-Harashima precoder (THP) design
for FBMC/OQAM based on the mean squared error (MSE) duality from a minimum MSE
(MMSE) designed decision feedback equalizer (DFE).
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2017 08:25:52 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Jedda",
"Hela",
""
],
[
"Baltar",
"Leonardo G.",
""
],
[
"De Candido",
"Oliver",
""
],
[
"Mezghani",
"Amine",
""
],
[
"Nossek",
"Josef A.",
""
]
] |
new_dataset
| 0.979292 |
1706.08789
|
Tengteng Huang
|
Pengyuan Lyu, Xiang Bai, Cong Yao, Zhen Zhu, Tengteng Huang, Wenyu Liu
|
Auto-Encoder Guided GAN for Chinese Calligraphy Synthesis
|
submitted to ICADR2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we investigate the Chinese calligraphy synthesis problem:
synthesizing Chinese calligraphy images with specified style from standard
font(eg. Hei font) images (Fig. 1(a)). Recent works mostly follow the stroke
extraction and assemble pipeline which is complex in the process and limited by
the effect of stroke extraction. We treat the calligraphy synthesis problem as
an image-to-image translation problem and propose a deep neural network based
model which can generate calligraphy images from standard font images directly.
Besides, we also construct a large scale benchmark that contains various styles
for Chinese calligraphy synthesis. We evaluate our method as well as some
baseline methods on the proposed dataset, and the experimental results
demonstrate the effectiveness of our proposed model.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2017 11:35:31 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Lyu",
"Pengyuan",
""
],
[
"Bai",
"Xiang",
""
],
[
"Yao",
"Cong",
""
],
[
"Zhu",
"Zhen",
""
],
[
"Huang",
"Tengteng",
""
],
[
"Liu",
"Wenyu",
""
]
] |
new_dataset
| 0.997504 |
1706.08900
|
Long Yu
|
Long Yu and Xiusheng Liu
|
Constant composition codes derived from linear codes
|
13 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a class of linear codes and obtain their weight
distribution. Some of these codes are almost optimal. Moreover, several classes
of constant composition codes(CCCs) are constructed as subcodes of linear
codes.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2017 15:08:36 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Yu",
"Long",
""
],
[
"Liu",
"Xiusheng",
""
]
] |
new_dataset
| 0.998496 |
1706.08931
|
Swagat Kumar
|
Aniruddha Singhal, Nishant Kejriwal, Prasun Pallav, Soumyadeep
Choudhury, Rajesh Sinha and Swagat Kumar
|
Managing a Fleet of Autonomous Mobile Robots (AMR) using Cloud Robotics
Platform
|
14 pages, 15 figures, journal paper
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we provide details of implementing a system for managing a
fleet of autonomous mobile robots (AMR) operating in a factory or a warehouse
premise. While the robots are themselves autonomous in its motion and obstacle
avoidance capability, the target destination for each robot is provided by a
global planner. The global planner and the ground vehicles (robots) constitute
a multi agent system (MAS) which communicate with each other over a wireless
network. Three different approaches are explored for implementation. The first
two approaches make use of the distributed computing based Networked Robotics
architecture and communication framework of Robot Operating System (ROS) itself
while the third approach uses Rapyuta Cloud Robotics framework for this
implementation. The comparative performance of these approaches are analyzed
through simulation as well as real world experiment with actual robots. These
analyses provide an in-depth understanding of the inner working of the Cloud
Robotics Platform in contrast to the usual ROS framework. The insight gained
through this exercise will be valuable for students as well as practicing
engineers interested in implementing similar systems else where. In the
process, we also identify few critical limitations of the current Rapyuta
platform and provide suggestions to overcome them.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2017 16:32:59 GMT"
}
] | 2017-06-28T00:00:00 |
[
[
"Singhal",
"Aniruddha",
""
],
[
"Kejriwal",
"Nishant",
""
],
[
"Pallav",
"Prasun",
""
],
[
"Choudhury",
"Soumyadeep",
""
],
[
"Sinha",
"Rajesh",
""
],
[
"Kumar",
"Swagat",
""
]
] |
new_dataset
| 0.995538 |
1511.03675
|
Michael Walter
|
Peter B\"urgisser and Matthias Christandl and Ketan D. Mulmuley and
Michael Walter
|
Membership in moment polytopes is in NP and coNP
|
20 pages
|
SIAM J. Comput., 46 (3), 972-991 (2017)
|
10.1137/15M1048859
| null |
cs.CC math-ph math.MP math.RT math.SG quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that the problem of deciding membership in the moment polytope
associated with a finite-dimensional unitary representation of a compact,
connected Lie group is in NP and coNP. This is the first non-trivial result on
the computational complexity of this problem, which naively amounts to a
quadratically-constrained program. Our result applies in particular to the
Kronecker polytopes, and therefore to the problem of deciding positivity of the
stretched Kronecker coefficients. In contrast, it has recently been shown that
deciding positivity of a single Kronecker coefficient is NP-hard in general
[Ikenmeyer, Mulmuley and Walter, arXiv:1507.02955]. We discuss the consequences
of our work in the context of complexity theory and the quantum marginal
problem.
|
[
{
"version": "v1",
"created": "Wed, 11 Nov 2015 21:00:56 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Jun 2017 20:03:41 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Bürgisser",
"Peter",
""
],
[
"Christandl",
"Matthias",
""
],
[
"Mulmuley",
"Ketan D.",
""
],
[
"Walter",
"Michael",
""
]
] |
new_dataset
| 0.966913 |
1604.05940
|
Martin B\"ohm
|
Martin B\"ohm and Pavel Vesel\'y
|
Online Chromatic Number is PSPACE-Complete
| null | null | null | null |
cs.CC math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the online graph coloring problem, vertices from a graph G, known in
advance, arrive in an online fashion and an algorithm must immediately assign a
color to each incoming vertex v so that the revealed graph is properly colored.
The exact location of v in the graph G is not known to the algorithm. The
online chromatic number of G is the smallest number of colors such that some
online algorithm is able to properly color G for any incoming order. We prove
that computing the online chromatic number of a graph is PSPACE-complete.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2016 13:10:22 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jun 2017 09:10:50 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Böhm",
"Martin",
""
],
[
"Veselý",
"Pavel",
""
]
] |
new_dataset
| 0.999529 |
1702.01672
|
Enrico Piovano
|
Enrico Piovano, Hamdi Joudeh and Bruno Clerckx
|
On Coded Caching in the Overloaded MISO Broadcast Channel
|
accepted to IEEE ISIT 2017 (Fig. 1 corrected)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work investigates the interplay of coded caching and spatial
multiplexing in an overloaded Multiple-Input-Single-Output (MISO) Broadcast
Channel (BC), i.e. a system where the number of users is greater than the
number of transmitting antennas. On one hand, coded caching uses the aggregate
global cache memory of the users to create multicasting opportunities. On the
other hand, multiple antennas at the transmitter leverage the available CSIT to
transmit multiple streams simultaneously. In this paper, we introduce a novel
scheme which combines both the gain derived from coded-caching and spatial
multiplexing and outperforms existing schemes in terms of delivery time and
CSIT requirement.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2017 16:01:20 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Apr 2017 12:50:54 GMT"
},
{
"version": "v3",
"created": "Sat, 24 Jun 2017 14:37:34 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Piovano",
"Enrico",
""
],
[
"Joudeh",
"Hamdi",
""
],
[
"Clerckx",
"Bruno",
""
]
] |
new_dataset
| 0.953342 |
1702.04866
|
Paul Gazzillo
|
Thomas D. Dickerson, Paul Gazzillo, Maurice Herlihy, Eric Koskinen
|
Proust: A Design Space for Highly-Concurrent Transactional Data
Structures
| null | null | null | null |
cs.DC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most STM systems are poorly equipped to support libraries of concurrent data
structures. One reason is that they typically detect conflicts by tracking
transactions' read sets and write sets, an approach that often leads to false
conflicts. A second is that existing data structures and libraries often need
to be rewritten from scratch to support transactional conflict detection and
rollback. This paper introduces Proust, a framework for the design and
implementation of transactional data structures. Proust is designed to maximize
re-use of existing well-engineered by providing transactional "wrappers" to
make existing thread-safe concurrent data structures transactional. Proustian
objects are also integrated with an underling STM system, allowing them to take
advantage of well-engineered STM conflict detection mechanisms. Proust
generalizes and unifies prior approaches such as boosting and predication.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 06:07:25 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jun 2017 14:38:14 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Dickerson",
"Thomas D.",
""
],
[
"Gazzillo",
"Paul",
""
],
[
"Herlihy",
"Maurice",
""
],
[
"Koskinen",
"Eric",
""
]
] |
new_dataset
| 0.99762 |
1702.05349
|
Pavlos Sermpezis
|
Gavriil Chaviaras, Petros Gigis, Pavlos Sermpezis, Xenofontas
Dimitropoulos
|
ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix
Hijacking
| null |
Proceedings of the ACM SIGCOMM 2016 Conference (SIGCOMM '16),
625-626
|
10.1145/2934872.2959078
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Prefix hijacking is a common phenomenon in the Internet that often causes
routing problems and economic losses. In this demo, we propose ARTEMIS, a tool
that enables network administrators to detect and mitigate prefix hijacking
incidents, against their own prefixes. ARTEMIS is based on the real-time
monitoring of BGP data in the Internet, and software-defined networking (SDN)
principles, and can completely mitigate a prefix hijacking within a few minutes
(e.g., 5-6 mins in our experiments) after it has been launched.
|
[
{
"version": "v1",
"created": "Fri, 17 Feb 2017 14:11:44 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Chaviaras",
"Gavriil",
""
],
[
"Gigis",
"Petros",
""
],
[
"Sermpezis",
"Pavlos",
""
],
[
"Dimitropoulos",
"Xenofontas",
""
]
] |
new_dataset
| 0.994278 |
1704.05676
|
Gerco van Heerdt
|
Gerco van Heerdt, Matteo Sammartino, Alexandra Silva
|
CALF: Categorical Automata Learning Framework
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Automata learning is a technique that has successfully been applied in
verification, with the automaton type varying depending on the application
domain. Adaptations of automata learning algorithms for increasingly complex
types of automata have to be developed from scratch because there was no
abstract theory offering guidelines. This makes it hard to devise such
algorithms, and it obscures their correctness proofs. We introduce a simple
category-theoretic formalism that provides an appropriately abstract foundation
for studying automata learning. Furthermore, our framework establishes formal
relations between algorithms for learning, testing, and minimization. We
illustrate its generality with two examples: deterministic and weighted
automata.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2017 10:08:41 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2017 10:15:35 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Jun 2017 07:27:56 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"van Heerdt",
"Gerco",
""
],
[
"Sammartino",
"Matteo",
""
],
[
"Silva",
"Alexandra",
""
]
] |
new_dataset
| 0.990921 |
1706.07890
|
Andrew Drucker
|
Andrew Drucker
|
A Note on a Communication Game
|
7 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe a communication game, and a conjecture about this game, whose
proof would imply the well-known Sensitivity Conjecture asserting a polynomial
relation between sensitivity and block sensitivity for Boolean functions. The
author defined this game and observed the connection in Dec. 2013 - Jan. 2014.
The game and connection were independently discovered by Gilmer, Kouck\'y, and
Saks, who also established further results about the game (not proved by us)
and published their results in ITCS '15 [GKS15].
This note records our independent work, including some observations that did
not appear in [GKS15]. Namely, the main conjecture about this communication
game would imply not only the Sensitivity Conjecture, but also a stronger
hypothesis raised by Chung, F\"uredi, Graham, and Seymour [CFGS88]; and,
another related conjecture we pose about a "query-bounded" variant of our
communication game would suffice to answer a question of Aaronson, Ambainis,
Balodis, and Bavarian [AABB14] about the query complexity of the "Weak Parity"
problem---a question whose resolution was previously shown by [AABB14] to
follow from a proof of the Chung et al. hypothesis.
|
[
{
"version": "v1",
"created": "Sat, 24 Jun 2017 01:36:33 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Drucker",
"Andrew",
""
]
] |
new_dataset
| 0.979797 |
1706.08045
|
Ali Dehghantanha
|
M. Amine Chelihi, Akintunde Elutilo, Imran Ahmed, Christos
Papadopoulos, Ali Dehghantanha
|
An Android Cloud Storage Apps Forensic Taxonomy
| null |
Contemporary Digital Forensic Investigations of Cloud and Mobile
Applications, PP 285-305, Chapter 15, 2017
| null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Mobile phones have been playing a very significant role in our daily
activities for the last decade. With the increase need for these devices,
people are now more reliant on their smartphone applications for their daily
tasks and many prefer to save their mobile data on a cloud platform to access
them anywhere on any device. Cloud technology is the new way for better data
storage, as it offers better security, more flexibility, and mobility. Many
smartphones have been investigated as subjects, objects or tools of the crime.
Many of these investigations include analysing data stored through cloud
storage apps which contributes to importance of cloud apps forensics on mobile
devices. In this paper, various cloud Android applications are analysed using
the forensics tool XRY and a forensics taxonomy for investigation of these apps
is suggested. The proposed taxonomy reflects residual artefacts retrievable
from 31 different cloud applications. It is expected that the proposed taxonomy
and the forensic findings in this paper will assist future forensic
investigations involving cloud based storage applications.
|
[
{
"version": "v1",
"created": "Sun, 25 Jun 2017 07:18:04 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Chelihi",
"M. Amine",
""
],
[
"Elutilo",
"Akintunde",
""
],
[
"Ahmed",
"Imran",
""
],
[
"Papadopoulos",
"Christos",
""
],
[
"Dehghantanha",
"Ali",
""
]
] |
new_dataset
| 0.985912 |
1706.08107
|
Michal Kepski
|
Michal Kepski
|
Detekcja upadku i wybranych akcji na sekwencjach obraz\'ow cyfrowych
|
PhD Thesis (in Polish)
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years a growing interest on action recognition is observed,
including detection of fall accident for the elderly. However, despite many
efforts undertaken, the existing technology is not widely used by elderly,
mainly because of its flaws like low precision, large number of false alarms,
inadequate privacy preserving during data acquisition and processing. This
research work meets these expectations. The work is empirical and it is
situated in the field of computer vision systems. The main part of the work
situates itself in the area of action and behavior recognition. Efficient
algorithms for fall detection were developed, tested and implemented using
image sequences and wireless inertial sensor worn by a monitored person. A set
of descriptors for depth maps has been elaborated to permit classification of
pose as well as the action of a person. Experimental research was carried out
based on the prepared data repository consisting of synchronized depth and
accelerometric data. The study was carried out in the scenario with a static
camera facing the scene and an active camera observing the scene from above.
The experimental results showed that the developed algorithms for fall
detection have high sensitivity and specificity. The algorithm were designed
with regard to low computational demands and possibility to run on ARM
platforms. Several experiments including person detection, tracking and fall
detection in real-time were carried out to show efficiency and reliability of
the proposed solutions.
|
[
{
"version": "v1",
"created": "Sun, 25 Jun 2017 13:55:55 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Kepski",
"Michal",
""
]
] |
new_dataset
| 0.992903 |
1706.08177
|
Gong Liu
|
Daniel Liu, Lvette Lopez
|
A computer-based recursion algorithm for automatic charge of power
device of electric vehicles carrying electromagnet
|
5 pages, 5 figures
| null | null | null |
cs.SY
|
http://creativecommons.org/licenses/by/4.0/
|
This paper proposes a computer-based recursion algorithm for automatic charge
of power device of electric vehicles carrying electromagnet. The charging
system includes charging cable with one end connecting gang socket,
electromagnetic gear driving the connecting socket and a charging pile breaking
or closing, and detecting part for detecting electric vehicle static call or
start state. The gang socket mentioned above is linked to electromagnetic gear,
and the detecting part is connected with charging management system containing
the intelligent charging power module which controls the electromagnetic drive
action to close socket with a charging pile at static state and to break at
start state. Our work holds an electric automobile with convenience, safety low
maintenance cost.
|
[
{
"version": "v1",
"created": "Sun, 25 Jun 2017 22:18:59 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Liu",
"Daniel",
""
],
[
"Lopez",
"Lvette",
""
]
] |
new_dataset
| 0.998095 |
1706.08205
|
Sayan Sarcar
|
Sayan Sarcar, Ahmed Sabbir Arif, Ali Mazalek
|
Metrics for Bengali Text Entry Research
|
This paper has been accepted and presented as a position paper at ACM
CHI 2015 workshop on "Text entry on the edge"
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the intention of bringing uniformity to Bengali text entry research,
here we present a new approach for calculating the most popular English text
entry evaluation metrics for Bengali. To demonstrate our approach, we conducted
a user study where we evaluated four popular Bengali text entry techniques.
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2017 02:07:11 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Sarcar",
"Sayan",
""
],
[
"Arif",
"Ahmed Sabbir",
""
],
[
"Mazalek",
"Ali",
""
]
] |
new_dataset
| 0.951068 |
1706.08315
|
Pierre Ganty
|
Pierre Ganty and Elena Guti\'errez
|
Parikh Image of Pushdown Automata
|
17 pages, 2 figures
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We compare pushdown automata (PDAs for short) against other representations.
First, we show that there is a family of PDAs over a unary alphabet with $n$
states and $p \geq 2n + 4$ stack symbols that accepts one single long word for
which every equivalent context-free grammar needs $\Omega(n^2(p-2n-4))$
variables. This family shows that the classical algorithm for converting a PDA
to an equivalent context-free grammar is optimal even when the alphabet is
unary. Moreover, we observe that language equivalence and Parikh equivalence,
which ignores the ordering between symbols, coincide for this family. We
conclude that, when assuming this weaker equivalence, the conversion algorithm
is also optimal. Second, Parikh's theorem motivates the comparison of PDAs
against finite state automata. In particular, the same family of unary PDAs
gives a lower bound on the number of states of every Parikh-equivalent finite
state automaton. Finally, we look into the case of unary deterministic PDAs. We
show a new construction converting a unary deterministic PDA into an equivalent
context-free grammar that achieves best known bounds.
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2017 10:51:04 GMT"
}
] | 2017-06-27T00:00:00 |
[
[
"Ganty",
"Pierre",
""
],
[
"Gutiérrez",
"Elena",
""
]
] |
new_dataset
| 0.998117 |
1412.5797
|
Crist\'obal Camarero
|
Crist\'obal Camarero and Carmen Mart\'inez
|
Quasi-perfect Lee Codes of Radius 2 and Arbitrarily Large Dimension
| null |
IEEE Transactions on Information Theory, vol. 62, no. 3, pp.
1183-1192 (March 2016)
|
10.1109/TIT.2016.2517069
| null |
cs.IT cs.DM math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A construction of 2-quasi-perfect Lee codes is given over the space $\mathbb
Z_p^n$ for $p$ prime, $p\equiv \pm 5\pmod{12}$ and $n=2[\frac{p}{4}]$. It is
known that there are infinitely many such primes. Golomb and Welch conjectured
that perfect codes for the Lee-metric do not exist for dimension $n\geq 3$ and
radius $r\geq 2$. This conjecture was proved to be true for large radii as well
as for low dimensions. The codes found are very close to be perfect, which
exhibits the hardness of the conjecture. A series of computations show that
related graphs are Ramanujan, which could provide further connections between
Coding and Graph Theories.
|
[
{
"version": "v1",
"created": "Thu, 18 Dec 2014 10:34:38 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Oct 2015 10:17:06 GMT"
},
{
"version": "v3",
"created": "Fri, 15 Jan 2016 08:34:39 GMT"
},
{
"version": "v4",
"created": "Fri, 23 Jun 2017 10:45:25 GMT"
}
] | 2017-06-26T00:00:00 |
[
[
"Camarero",
"Cristóbal",
""
],
[
"Martínez",
"Carmen",
""
]
] |
new_dataset
| 0.997273 |
1605.03546
|
Bernd G\"artner
|
J\'er\^ome Dohrau, Bernd G\"artner, Manuel Kohler, Ji\v{r}\'i
Matou\v{s}ek, Emo Welzl
|
ARRIVAL: A zero-player graph game in NP $\cap$ coNP
|
6 pages, 3 figures; final version is due to be published in the
collection of papers "A Journey through Discrete Mathematics. A Tribute to
Ji\v{r}\'i Matou\v{s}ek" edited by Martin Loebl, Jaroslav Ne\v{s}et\v{r}il
and Robin Thomas, due to be published by Springer
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Suppose that a train is running along a railway network, starting from a
designated origin, with the goal of reaching a designated destination. The
network, however, is of a special nature: every time the train traverses a
switch, the switch will change its position immediately afterwards. Hence, the
next time the train traverses the same switch, the other direction will be
taken, so that directions alternate with each traversal of the switch. Given a
network with origin and destination, what is the complexity of deciding whether
the train, starting at the origin, will eventually reach the destination? It is
easy to see that this problem can be solved in exponential time, but we are not
aware of any polynomial-time method. In this short paper, we prove that the
problem is in NP $\cap$ coNP. This raises the question whether we have just
failed to find a (simple) polynomial-time solution, or whether the complexity
status is more subtle, as for some other well-known (two-player) graph games.
|
[
{
"version": "v1",
"created": "Wed, 11 May 2016 18:56:46 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Oct 2016 11:51:15 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Nov 2016 10:30:30 GMT"
},
{
"version": "v4",
"created": "Fri, 23 Jun 2017 17:40:57 GMT"
}
] | 2017-06-26T00:00:00 |
[
[
"Dohrau",
"Jérôme",
""
],
[
"Gärtner",
"Bernd",
""
],
[
"Kohler",
"Manuel",
""
],
[
"Matoušek",
"Jiří",
""
],
[
"Welzl",
"Emo",
""
]
] |
new_dataset
| 0.995085 |
1605.04201
|
Christian Lameiro
|
Christian Lameiro and Ignacio Santamaria and Peter J. Schreier
|
Rate region boundary of the SISO Z-interference channel with improper
signaling
| null |
IEEE Transactions on Communications, vol. 65, no. 3, pp. 1022-1034
(March 2017)
|
10.1109/TCOMM.2016.2641948
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper provides a complete characterization of the boundary of an
achievable rate region, called the Pareto boundary, of the single-antenna Z
interference channel (Z-IC), when interference is treated as noise and users
transmit complex Gaussian signals that are allowed to be improper. By
considering the augmented complex formulation, we derive a necessary and
sufficient condition for improper signaling to be optimal. This condition is
stated as a threshold on the interference channel coefficient, which is a
function of the interfered user rate and which allows insightful
interpretations into the behavior of the achievable rates in terms of the
circularity coefficient (i.e., degree of impropriety). Furthermore, the optimal
circularity coefficient is provided in closed form. The simplicity of the
obtained characterization permits interesting insights into when and how
improper signaling outperforms proper signaling in the single-antenna Z-IC. We
also provide an in-depth discussion on the optimal strategies and the
properties of the Pareto boundary.
|
[
{
"version": "v1",
"created": "Fri, 13 May 2016 14:55:04 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2017 12:18:49 GMT"
}
] | 2017-06-26T00:00:00 |
[
[
"Lameiro",
"Christian",
""
],
[
"Santamaria",
"Ignacio",
""
],
[
"Schreier",
"Peter J.",
""
]
] |
new_dataset
| 0.989188 |
1703.00073
|
Tetsufumi Tanamoto
|
Tetsufumi Tanamoto, Satoshi Takaya, Nobuaki Sakamoto, Hirotsugu Kasho,
Shinichi Yasuda, Takao Marukame, Shinobu Fujita, and Yuichiro Mitani
|
Physically unclonable function using initial waveform of ring
oscillators on 65 nm CMOS technology
|
5 pages, 9 figures
|
Jpn. J. Appl. Phys. 56, 04CF13 (2017)
|
10.7567/JJAP.56.04CF13
| null |
cs.CR cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A silicon physically unclonable function (PUF) using ring oscillators (ROs)
has the advantage of easy application in both an application specific
integrated circuit (ASIC) and a field-programmable gate array (FPGA). Here, we
provide a RO-PUF using the initial waveform of the ROs based on 65 nm CMOS
technology. Compared with the conventional RO-PUF, the number of ROs is greatly
reduced and the time needed to generate an ID is within a couple of system
clocks.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2017 16:38:17 GMT"
}
] | 2017-06-26T00:00:00 |
[
[
"Tanamoto",
"Tetsufumi",
""
],
[
"Takaya",
"Satoshi",
""
],
[
"Sakamoto",
"Nobuaki",
""
],
[
"Kasho",
"Hirotsugu",
""
],
[
"Yasuda",
"Shinichi",
""
],
[
"Marukame",
"Takao",
""
],
[
"Fujita",
"Shinobu",
""
],
[
"Mitani",
"Yuichiro",
""
]
] |
new_dataset
| 0.974858 |
1602.08455
|
Lei You
|
Lei You, Jianbo Li, Changjiang Wei, Lejuan Hu
|
MPAR: A Movement Pattern-Aware Optimal Routing for Social Delay Tolerant
Networks
|
18 pages
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social Delay Tolerant Networks (SDTNs) are a special kind of Delay Tolerant
Network (DTN) that consists of a number of mobile devices with social
characteristics. The current research achievements on routing algorithms tend
to separately evaluate the available profit for each prospective relay node and
cannot achieve the global optimal performance in an overall perspective. In
this paper, we propose a Movement Pattern-Aware optimal Routing (MPAR) for
SDTNs, by choosing the optimal relay node(s) set for each message, which
eventually based on running a search algorithm on a hyper-cube solution space.
Concretely, the movement pattern of a group of node(s) can be extracted from
the movement records of nodes. Then the set of commonly visited locations for
the relay node(s) set and the destination node is obtained, by which we can
further evaluate the co-delivery probability of the relay node(s) set. Both
local search scheme and tabu-search scheme are utilized in finding the optimal
set, and the tabu-search based routing Tabu-MPAR is proved able to guide the
relay node(s) set in evolving to the optimal one. We demonstrate how the MPAR
algorithm significantly outperforms the previous ones through extensive
simulations, based on the synthetic SDTN mobility model.
|
[
{
"version": "v1",
"created": "Fri, 26 Feb 2016 19:53:50 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jun 2017 22:19:14 GMT"
}
] | 2017-06-23T00:00:00 |
[
[
"You",
"Lei",
""
],
[
"Li",
"Jianbo",
""
],
[
"Wei",
"Changjiang",
""
],
[
"Hu",
"Lejuan",
""
]
] |
new_dataset
| 0.999077 |
1602.08461
|
Lei You
|
Lei You, Jianbo Li, Changjiang We, Chenqu Dai
|
A One-Hop Information Based Geographic Routing Protocol for Delay
Tolerant MANETs
|
14 pages
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Delay and Disruption Tolerant Networks (DTNs) may lack continuous network
connectivity. Routing in DTNs is thus a challenge since it must handle network
partitioning, long delays, and dynamic topology. Meanwhile, routing protocols
of the traditional Mobile Ad hoc NETworks (MANETs) cannot work well due to the
failure of its assumption that most network connections are available. In this
article, a geographic routing protocol is proposed for MANETs in delay tolerant
situations, by using no more than one-hop information. A utility function is
designed for implementing the under-controlled replication strategy. To reduce
the overheads caused by message flooding, we employ a criterion so as to
evaluate the degree of message redundancy. Consequently a message redundancy
coping mechanism is added to our routing protocol. Extensive simulations have
been conducted and the results show that when node moving speed is relatively
low, our routing protocol outperforms the other schemes such as Epidemic, Spray
and Wait, FirstContact in delivery ratio and average hop count, while
introducing an acceptable overhead ratio into the network.
|
[
{
"version": "v1",
"created": "Fri, 26 Feb 2016 20:07:24 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jun 2017 22:31:19 GMT"
}
] | 2017-06-23T00:00:00 |
[
[
"You",
"Lei",
""
],
[
"Li",
"Jianbo",
""
],
[
"We",
"Changjiang",
""
],
[
"Dai",
"Chenqu",
""
]
] |
new_dataset
| 0.999301 |
1611.07759
|
Xiaozhi Chen
|
Xiaozhi Chen, Huimin Ma, Ji Wan, Bo Li, Tian Xia
|
Multi-View 3D Object Detection Network for Autonomous Driving
|
To appear in IEEE Conference on Computer Vision and Pattern
Recognition (CVPR) 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper aims at high-accuracy 3D object detection in autonomous driving
scenario. We propose Multi-View 3D networks (MV3D), a sensory-fusion framework
that takes both LIDAR point cloud and RGB images as input and predicts oriented
3D bounding boxes. We encode the sparse 3D point cloud with a compact
multi-view representation. The network is composed of two subnetworks: one for
3D object proposal generation and another for multi-view feature fusion. The
proposal network generates 3D candidate boxes efficiently from the bird's eye
view representation of 3D point cloud. We design a deep fusion scheme to
combine region-wise features from multiple views and enable interactions
between intermediate layers of different paths. Experiments on the challenging
KITTI benchmark show that our approach outperforms the state-of-the-art by
around 25% and 30% AP on the tasks of 3D localization and 3D detection. In
addition, for 2D detection, our approach obtains 10.3% higher AP than the
state-of-the-art on the hard data among the LIDAR-based methods.
|
[
{
"version": "v1",
"created": "Wed, 23 Nov 2016 12:08:38 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Apr 2017 11:34:01 GMT"
},
{
"version": "v3",
"created": "Thu, 22 Jun 2017 03:23:51 GMT"
}
] | 2017-06-23T00:00:00 |
[
[
"Chen",
"Xiaozhi",
""
],
[
"Ma",
"Huimin",
""
],
[
"Wan",
"Ji",
""
],
[
"Li",
"Bo",
""
],
[
"Xia",
"Tian",
""
]
] |
new_dataset
| 0.993993 |
1703.04142
|
Lech Madeyski
|
Lech Madeyski and Marcin Kawalerowicz
|
Continuous Defect Prediction: The Idea and a Related Dataset
|
Lech Madeyski and Marcin Kawalerowicz. "Continuous Defect Prediction:
The Idea and a Related Dataset" In: 14th International Conference on Mining
Software Repositories (MSR'17). Buenos Aires. 2017, pp. 515-518. doi:
10.1109/MSR.2017.46. URL:
http://madeyski.e-informatyka.pl/download/MadeyskiKawalerowiczMSR17.pdf
| null |
10.1109/MSR.2017.46
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We would like to present the idea of our Continuous Defect Prediction (CDP)
research and a related dataset that we created and share. Our dataset is
currently a set of more than 11 million data rows, representing files involved
in Continuous Integration (CI) builds, that synthesize the results of CI builds
with data we mine from software repositories. Our dataset embraces 1265
software projects, 30,022 distinct commit authors and several software process
metrics that in earlier research appeared to be useful in software defect
prediction. In this particular dataset we use TravisTorrent as the source of CI
data. TravisTorrent synthesizes commit level information from the Travis CI
server and GitHub open-source projects repositories. We extend this data to a
file change level and calculate the software process metrics that may be used,
for example, as features to predict risky software changes that could break the
build if committed to a repository with CI enabled.
|
[
{
"version": "v1",
"created": "Sun, 12 Mar 2017 17:08:47 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jun 2017 12:02:12 GMT"
}
] | 2017-06-23T00:00:00 |
[
[
"Madeyski",
"Lech",
""
],
[
"Kawalerowicz",
"Marcin",
""
]
] |
new_dataset
| 0.996692 |
1703.05271
|
Celalettin Umit Bas
|
C. Umit Bas, Rui Wang, Dimitris Psychoudakis, Thomas Henige, Robert
Monroe, Jeongho Park, Jianzhong Zhang, Andreas F. Molisch
|
A Real-Time Millimeter-Wave Phased Array MIMO Channel Sounder
|
6 pages, 15 figures, conference paper
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a novel real-time MIMO channel sounder for 28 GHz.
Until now, the common practice to investigate the directional characteristics
of millimeter-wave channels has been using a rotating horn antenna. The sounder
presented here is capable of performing horizontal and vertical beam steering
with the help of phased arrays. Thanks to fast beam-switching capability, the
proposed sounder can perform measurements that are directionally resolved both
at the transmitter (TX) and receiver (RX) as fast as 1.44 milliseconds compared
to the minutes or even hours required for rotating horn antenna sounders. This
does not only enable us to measure more points for better statistical inference
but also allows to perform directional analysis in dynamic environments.
Equally importantly, the short measurement time combined with the high phase
stability of our setup limits the phase drift between TX and RX, enabling
phase-coherent sounding of all beam pairs even when TX and RX are physically
separated and have no cabled connection for synchronization. This ensures that
the measurement data is suitable for high-resolution parameter extraction
algorithms. Along with the system design and specifications, this paper also
discusses the measurements performed for verification of the sounder.
Furthermore, we present sample measurements from a channel sounding campaign
performed on a residential street.
|
[
{
"version": "v1",
"created": "Wed, 15 Mar 2017 17:18:26 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Mar 2017 05:11:20 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Apr 2017 17:25:55 GMT"
},
{
"version": "v4",
"created": "Thu, 22 Jun 2017 05:56:02 GMT"
}
] | 2017-06-23T00:00:00 |
[
[
"Bas",
"C. Umit",
""
],
[
"Wang",
"Rui",
""
],
[
"Psychoudakis",
"Dimitris",
""
],
[
"Henige",
"Thomas",
""
],
[
"Monroe",
"Robert",
""
],
[
"Park",
"Jeongho",
""
],
[
"Zhang",
"Jianzhong",
""
],
[
"Molisch",
"Andreas F.",
""
]
] |
new_dataset
| 0.999419 |
1706.06997
|
Long Yu
|
Long Yu and Xiusheng Liu
|
Constant Composition Codes as Subcodes of Linear Codes
|
13pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, on one hand, a class of linear codes with one or two weights
is obtained. Based on these linear codes, we construct two classes of constant
composition codes, which includes optimal constant composition codes depending
on LVFC bound. On the other hand, a class of constant composition codes is
derived from known linear codes.
|
[
{
"version": "v1",
"created": "Wed, 21 Jun 2017 16:38:41 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Jun 2017 10:20:34 GMT"
}
] | 2017-06-23T00:00:00 |
[
[
"Yu",
"Long",
""
],
[
"Liu",
"Xiusheng",
""
]
] |
new_dataset
| 0.999669 |
1706.07068
|
Ahmed Elgammal
|
Ahmed Elgammal, Bingchen Liu, Mohamed Elhoseiny, Marian Mazzone
|
CAN: Creative Adversarial Networks, Generating "Art" by Learning About
Styles and Deviating from Style Norms
|
This paper is an extended version of a paper published on the eighth
International Conference on Computational Creativity (ICCC), held in Atlanta,
GA, June 20th-June 22nd, 2017
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new system for generating art. The system generates art by
looking at art and learning about style; and becomes creative by increasing the
arousal potential of the generated art by deviating from the learned styles. We
build over Generative Adversarial Networks (GAN), which have shown the ability
to learn to generate novel images simulating a given distribution. We argue
that such networks are limited in their ability to generate creative products
in their original design. We propose modifications to its objective to make it
capable of generating creative art by maximizing deviation from established
styles and minimizing deviation from art distribution. We conducted experiments
to compare the response of human subjects to the generated art with their
response to art created by artists. The results show that human subjects could
not distinguish art generated by the proposed system from art generated by
contemporary artists and shown in top art fairs. Human subjects even rated the
generated images higher on various scales.
|
[
{
"version": "v1",
"created": "Wed, 21 Jun 2017 18:05:13 GMT"
}
] | 2017-06-23T00:00:00 |
[
[
"Elgammal",
"Ahmed",
""
],
[
"Liu",
"Bingchen",
""
],
[
"Elhoseiny",
"Mohamed",
""
],
[
"Mazzone",
"Marian",
""
]
] |
new_dataset
| 0.979205 |
1706.07187
|
Fulvio Frati
|
Ernesto Damiani, Perpetus Jacques Houngbo, Rasool Asal, Stelvio
Cimato, Fulvio Frati, Joel T. Honsou, Dina Shehada, Chan Yeob Yeun
|
Pay-with-a-Selfie, a human-centred digital payment system
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile payment systems are increasingly used to simplify the way in which
money transfers and transactions can be performed. We argue that, to achieve
their full potential as economic boosters in developing countries, mobile
payment systems need to rely on new metaphors suitable for the business models,
lifestyle, and technology availability conditions of the targeted communities.
The Pay-with-a-Group-Selfie (PGS) project, funded by the Melinda & Bill Gates
Foundation, has developed a micro-payment system that supports everyday small
transactions by extending the reach of, rather than substituting, existing
payment frameworks. PGS is based on a simple gesture and a readily
understandable metaphor. The gesture - taking a selfie - has become part of the
lifestyle of mobile phone users worldwide, including non-technology-savvy ones.
The metaphor likens computing two visual shares of the selfie to ripping a
banknote in two, a technique used for decades for delayed payment in cash-only
markets. PGS is designed to work with devices with limited computational power
and when connectivity is patchy or not always available. Thanks to visual
cryptography techniques PGS uses for computing the shares, the original selfie
can be recomposed simply by stacking the shares, preserving the analogy with
re-joining the two parts of the banknote.
|
[
{
"version": "v1",
"created": "Thu, 22 Jun 2017 07:26:02 GMT"
}
] | 2017-06-23T00:00:00 |
[
[
"Damiani",
"Ernesto",
""
],
[
"Houngbo",
"Perpetus Jacques",
""
],
[
"Asal",
"Rasool",
""
],
[
"Cimato",
"Stelvio",
""
],
[
"Frati",
"Fulvio",
""
],
[
"Honsou",
"Joel T.",
""
],
[
"Shehada",
"Dina",
""
],
[
"Yeun",
"Chan Yeob",
""
]
] |
new_dataset
| 0.999716 |
1706.07198
|
Asha V
|
V. Asha
|
Synthesis of Near-regular Natural Textures
|
5 Pages, 10 Figures, IJCRD-5(1), 2016
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Texture synthesis is widely used in the field of computer graphics, vision,
and image processing. In the present paper, a texture synthesis algorithm is
proposed for near-regular natural textures with the help of a representative
periodic pattern extracted from the input textures using distance matching
function. Local texture statistics is then analyzed against global texture
statistics for non-overlapping windows of size same as periodic pattern size
and a representative periodic pattern is extracted from the image and used for
texture synthesis, while preserving the global regularity and visual
appearance. Validation of the algorithm based on experiments with synthetic
textures whose periodic pattern sizes are known and containing camouflages /
defects proves the strength of the algorithm for texture synthesis and its
application in detection of camouflages / defects in textures.
|
[
{
"version": "v1",
"created": "Thu, 22 Jun 2017 07:58:20 GMT"
}
] | 2017-06-23T00:00:00 |
[
[
"Asha",
"V.",
""
]
] |
new_dataset
| 0.999295 |
1611.04224
|
Li You
|
Li You, Xiqi Gao, Geoffrey Ye Li, Xiang-Gen Xia, Ni Ma
|
BDMA for Millimeter-Wave/Terahertz Massive MIMO Transmission with
Per-Beam Synchronization
|
29 pages, 4 figures
|
IEEE Journal on Selected Areas in Communications, vol. 35, no. 7,
pp. 1550-1563 (Jul. 2017)
|
10.1109/JSAC.2017.2699100
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose beam division multiple access (BDMA) with per-beam synchronization
(PBS) in time and frequency for wideband massive multiple-input multiple-output
(MIMO) transmission over millimeter-wave (mmW)/Terahertz (THz) bands. We first
introduce a physically motivated beam domain channel model for massive MIMO and
demonstrate that the envelopes of the beam domain channel elements tend to be
independent of time and frequency when both the numbers of antennas at base
station and user terminals (UTs) tend to infinity. Motivated by the derived
beam domain channel properties, we then propose PBS for mmW/THz massive MIMO.
We show that both the effective delay and Doppler frequency spreads of wideband
massive MIMO channels with PBS are reduced by a factor of the number of UT
antennas compared with the conventional synchronization approaches.
Subsequently, we apply PBS to BDMA, investigate beam scheduling to maximize the
achievable ergodic rates for both uplink and downlink BDMA, and develop a
greedy beam scheduling algorithm. Simulation results verify the effectiveness
of BDMA with PBS for mmW/THz wideband massive MIMO systems in typical mobility
scenarios.
|
[
{
"version": "v1",
"created": "Mon, 14 Nov 2016 01:56:21 GMT"
}
] | 2017-06-22T00:00:00 |
[
[
"You",
"Li",
""
],
[
"Gao",
"Xiqi",
""
],
[
"Li",
"Geoffrey Ye",
""
],
[
"Xia",
"Xiang-Gen",
""
],
[
"Ma",
"Ni",
""
]
] |
new_dataset
| 0.999512 |
1612.06670
|
Jincheng Zhuang
|
Qi Cheng and Jun Zhang and Jincheng Zhuang
|
LWE from Non-commutative Group Rings
|
A refined security analysis is provided
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Ring Learning-With-Errors (LWE) problem, whose security is based on hard
ideal lattice problems, has proven to be a promising primitive with diverse
applications in cryptography. There are however recent discoveries of faster
algorithms for the principal ideal SVP problem, and attempts to generalize the
attack to non-principal ideals. In this work, we study the LWE problem on group
rings, and build cryptographic schemes based on this new primitive. One can
regard the LWE on cyclotomic integers as a special case when the underlying
group is cyclic, while our proposal utilizes non-commutative groups, which
eliminates the weakness associated with the principal ideal lattices. In
particular, we show how to build public key encryption schemes from dihedral
group rings, which maintains the efficiency of the ring-LWE and improves its
security.
|
[
{
"version": "v1",
"created": "Tue, 20 Dec 2016 14:13:17 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Feb 2017 03:29:46 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Jun 2017 09:47:15 GMT"
}
] | 2017-06-22T00:00:00 |
[
[
"Cheng",
"Qi",
""
],
[
"Zhang",
"Jun",
""
],
[
"Zhuang",
"Jincheng",
""
]
] |
new_dataset
| 0.990493 |
1703.06891
|
Chris Donahue
|
Chris Donahue, Zachary C. Lipton, Julian McAuley
|
Dance Dance Convolution
|
Published as a conference paper at ICML 2017
| null | null | null |
cs.LG cs.MM cs.NE cs.SD stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dance Dance Revolution (DDR) is a popular rhythm-based video game. Players
perform steps on a dance platform in synchronization with music as directed by
on-screen step charts. While many step charts are available in standardized
packs, players may grow tired of existing charts, or wish to dance to a song
for which no chart exists. We introduce the task of learning to choreograph.
Given a raw audio track, the goal is to produce a new step chart. This task
decomposes naturally into two subtasks: deciding when to place steps and
deciding which steps to select. For the step placement task, we combine
recurrent and convolutional neural networks to ingest spectrograms of low-level
audio features to predict steps, conditioned on chart difficulty. For step
selection, we present a conditional LSTM generative model that substantially
outperforms n-gram and fixed-window approaches.
|
[
{
"version": "v1",
"created": "Mon, 20 Mar 2017 18:00:13 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Mar 2017 07:44:55 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Jun 2017 00:45:51 GMT"
}
] | 2017-06-22T00:00:00 |
[
[
"Donahue",
"Chris",
""
],
[
"Lipton",
"Zachary C.",
""
],
[
"McAuley",
"Julian",
""
]
] |
new_dataset
| 0.999812 |
1706.06081
|
Jianyu Lin
|
Jianyu Lin, Neil T. Clancy, Yang Hu, Ji Qi, Taran Tatla, Danail
Stoyanov, Lena Maier-Hein, Daniel S. Elson
|
Endoscopic Depth Measurement and Super-Spectral-Resolution Imaging
|
accepted by MICCAI2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Intra-operative measurements of tissue shape and multi/ hyperspectral
information have the potential to provide surgical guidance and decision making
support. We report an optical probe based system to combine sparse
hyperspectral measurements and spectrally-encoded structured lighting (SL) for
surface measurements. The system provides informative signals for navigation
with a surgical interface. By rapidly switching between SL and white light (WL)
modes, SL information is combined with structure-from-motion (SfM) from white
light images, based on SURF feature detection and Lucas-Kanade (LK) optical
flow to provide quasi-dense surface shape reconstruction with known scale in
real-time. Furthermore, "super-spectral-resolution" was realized, whereby the
RGB images and sparse hyperspectral data were integrated to recover dense
pixel-level hyperspectral stacks, by using convolutional neural networks to
upscale the wavelength dimension. Validation and demonstration of this system
is reported on ex vivo/in vivo animal/ human experiments.
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2017 17:49:20 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Jun 2017 13:13:04 GMT"
}
] | 2017-06-22T00:00:00 |
[
[
"Lin",
"Jianyu",
""
],
[
"Clancy",
"Neil T.",
""
],
[
"Hu",
"Yang",
""
],
[
"Qi",
"Ji",
""
],
[
"Tatla",
"Taran",
""
],
[
"Stoyanov",
"Danail",
""
],
[
"Maier-Hein",
"Lena",
""
],
[
"Elson",
"Daniel S.",
""
]
] |
new_dataset
| 0.99779 |
1706.06664
|
Anshumali Shrivastava
|
Chen Luo, Anshumali Shrivastava
|
Arrays of (locality-sensitive) Count Estimators (ACE): High-Speed
Anomaly Detection via Cache Lookups
| null | null | null | null |
cs.DB cs.LG stat.CO stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Anomaly detection is one of the frequent and important subroutines deployed
in large-scale data processing systems. Even being a well-studied topic,
existing techniques for unsupervised anomaly detection require storing
significant amounts of data, which is prohibitive from memory and latency
perspective. In the big-data world existing methods fail to address the new set
of memory and latency constraints. In this paper, we propose ACE (Arrays of
(locality-sensitive) Count Estimators) algorithm that can be 60x faster than
the ELKI package~\cite{DBLP:conf/ssd/AchtertBKSZ09}, which has the fastest
implementation of the unsupervised anomaly detection algorithms. ACE algorithm
requires less than $4MB$ memory, to dynamically compress the full data
information into a set of count arrays. These tiny $4MB$ arrays of counts are
sufficient for unsupervised anomaly detection. At the core of the ACE
algorithm, there is a novel statistical estimator which is derived from the
sampling view of Locality Sensitive Hashing(LSH). This view is significantly
different and efficient than the widely popular view of LSH for near-neighbor
search. We show the superiority of ACE algorithm over 11 popular baselines on 3
benchmark datasets, including the KDD-Cup99 data which is the largest available
benchmark comprising of more than half a million entries with ground truth
anomaly labels.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2017 21:09:22 GMT"
}
] | 2017-06-22T00:00:00 |
[
[
"Luo",
"Chen",
""
],
[
"Shrivastava",
"Anshumali",
""
]
] |
new_dataset
| 0.987907 |
1706.06693
|
Ahmed Hindy
|
Ahmed Hindy, Aria Nosratinia
|
Ergodic Fading MIMO Dirty Paper and Broadcast Channels: Capacity Bounds
and Lattice Strategies
|
Accepted in IEEE Transactions on Wireless Communications
| null |
10.1109/TWC.2017.2712631
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A multiple-input multiple-output (MIMO) version of the dirty paper channel is
studied, where the channel input and the dirt experience the same fading
process and the fading channel state is known at the receiver (CSIR). This
represents settings where signal and interference sources are co-located, such
as in the broadcast channel. First, a variant of Costa's dirty paper coding
(DPC) is presented, whose achievable rates are within a constant gap to
capacity for all signal and dirt powers. Additionally, a lattice coding and
decoding scheme is proposed, whose decision regions are independent of the
channel realizations. Under Rayleigh fading, the gap to capacity of the lattice
coding scheme vanishes with the number of receive antennas, even at finite
Signal-to-Noise Ratio (SNR). Thus, although the capacity of the fading dirty
paper channel remains unknown, this work shows it is not far from its dirt-free
counterpart. The insights from the dirty paper channel directly lead to
transmission strategies for the two-user MIMO broadcast channel (BC), where the
transmitter emits a superposition of desired and undesired (dirt) signals with
respect to each receiver. The performance of the lattice coding scheme is
analyzed under different fading dynamics for the two users, showing that
high-dimensional lattices achieve rates close to capacity.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2017 22:51:12 GMT"
}
] | 2017-06-22T00:00:00 |
[
[
"Hindy",
"Ahmed",
""
],
[
"Nosratinia",
"Aria",
""
]
] |
new_dataset
| 0.99642 |
1706.06718
|
Sean McMahon Mr
|
Sean McMahon, Niko S\"underhauf, Ben Upcroft, and Michael Milford
|
Multi-Modal Trip Hazard Affordance Detection On Construction Sites
|
9 Pages, 12 Figures, 2 Tables, Accepted to Robotics and Automation
Letters (RA-L)
| null | null | null |
cs.RO cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Trip hazards are a significant contributor to accidents on construction and
manufacturing sites, where over a third of Australian workplace injuries occur
[1]. Current safety inspections are labour intensive and limited by human
fallibility,making automation of trip hazard detection appealing from both a
safety and economic perspective. Trip hazards present an interesting challenge
to modern learning techniques because they are defined as much by affordance as
by object type; for example wires on a table are not a trip hazard, but can be
if lying on the ground. To address these challenges, we conduct a comprehensive
investigation into the performance characteristics of 11 different colour and
depth fusion approaches, including 4 fusion and one non fusion approach; using
colour and two types of depth images. Trained and tested on over 600 labelled
trip hazards over 4 floors and 2000m$\mathrm{^{2}}$ in an active construction
site,this approach was able to differentiate between identical objects in
different physical configurations (see Figure 1). Outperforming a colour-only
detector, our multi-modal trip detector fuses colour and depth information to
achieve a 4% absolute improvement in F1-score. These investigative results and
the extensive publicly available dataset moves us one step closer to assistive
or fully automated safety inspection systems on construction sites.
|
[
{
"version": "v1",
"created": "Wed, 21 Jun 2017 01:58:18 GMT"
}
] | 2017-06-22T00:00:00 |
[
[
"McMahon",
"Sean",
""
],
[
"Sünderhauf",
"Niko",
""
],
[
"Upcroft",
"Ben",
""
],
[
"Milford",
"Michael",
""
]
] |
new_dataset
| 0.999754 |
1706.06818
|
George Grispos
|
George Grispos, William Bradley Glisson, David Bourrie, Tim Storer,
Stacy Miller
|
Security Incident Recognition and Reporting (SIRR): An Industrial
Perspective
|
2017 Americas Conference on Information Systems (AMCIS 2017), Boston,
Massachusetts, United States
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reports and press releases highlight that security incidents continue to
plague organizations. While researchers and practitioners' alike endeavor to
identify and implement realistic security solutions to prevent incidents from
occurring, the ability to initially identify a security incident is paramount
when researching a security incident lifecycle. Hence, this research
investigates the ability of employees in a Global Fortune 500 financial
organization, through internal electronic surveys, to recognize and report
security incidents to pursue a more holistic security posture. The research
contribution is an initial insight into security incident perceptions by
employees in the financial sector as well as serving as an initial guide for
future security incident recognition and reporting initiatives.
|
[
{
"version": "v1",
"created": "Wed, 21 Jun 2017 10:38:35 GMT"
}
] | 2017-06-22T00:00:00 |
[
[
"Grispos",
"George",
""
],
[
"Glisson",
"William Bradley",
""
],
[
"Bourrie",
"David",
""
],
[
"Storer",
"Tim",
""
],
[
"Miller",
"Stacy",
""
]
] |
new_dataset
| 0.995928 |
1706.06902
|
Ala Al-Fuqaha
|
Ala Al-Fuqaha, Omar Al-Ibrahim, Ammar Rayes
|
Geo-Encryption Protocol For Mobile Networks
| null | null |
10.1016/j.comcom.2007.04.016
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a geo-encryption protocol that allow mobile nodes to communicate
securely by restricting the decryption of a message to a particular location
and time period. Our protocol will handle the exchange of movement parameters,
so that a sender is able to geo-encrypt messages to a moving decryption zone
that contains a mobile node's estimated location. We also present methods for
estimating the node's movement parameters to allow for geo-encryption. Finally,
we evaluate our model by measuring the induced overhead to the network and its
performance in terms of decryption ratio.
|
[
{
"version": "v1",
"created": "Wed, 21 Jun 2017 13:39:32 GMT"
}
] | 2017-06-22T00:00:00 |
[
[
"Al-Fuqaha",
"Ala",
""
],
[
"Al-Ibrahim",
"Omar",
""
],
[
"Rayes",
"Ammar",
""
]
] |
new_dataset
| 0.96886 |
1706.06921
|
Ala Al-Fuqaha
|
Mohammad A. Salahuddin, Ala Al-Fuqaha, Mohsen Guizani and Soumaya
Cherkaoui
|
RSU Cloud and its Resource Management in support of Enhanced Vehicular
Applications
| null | null |
10.1109/GLOCOMW.2014.7063418
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose Roadside Unit (RSU) Clouds as a novel way to offer non-safety
application with QoS for VANETs. The architecture of RSU Clouds is delineated,
and consists of traditional RSUs and specialized micro-datacenters and virtual
machines (VMs) using Software Defined Networking (SDN). SDN offers the
flexibility to migrate or replicate virtual services and reconfigure the data
forwarding rules dynamically. However, frequent changes to service hosts and
data flows not only result in degradation of services, but are also costly for
service providers. In this paper, we use Mininet to analyze and formally
quantify the reconfiguration overhead. Our unique RSU Cloud Resource Management
(CRM) model jointly minimizes reconfiguration overhead, cost of service
deployment and infrastructure routing delay. To the best of our knowledge, we
are the first to utilize this approach. We compare the performance of purist
approach to our Integer Linear Programming (ILP) model and our innovative
heuristic for the CRM technique and discuss the results. We will show the
benefits of a holistic approach in Cloud Resource Management with SDN.
|
[
{
"version": "v1",
"created": "Wed, 21 Jun 2017 14:15:01 GMT"
}
] | 2017-06-22T00:00:00 |
[
[
"Salahuddin",
"Mohammad A.",
""
],
[
"Al-Fuqaha",
"Ala",
""
],
[
"Guizani",
"Mohsen",
""
],
[
"Cherkaoui",
"Soumaya",
""
]
] |
new_dataset
| 0.998859 |
1702.07178
|
Zhenyu Li
|
Zhenyu Li and Adrian G. Bors
|
Steganalysis of 3D Objects Using Statistics of Local Feature Sets
| null | null |
10.1016/j.ins.2017.06.011
| null |
cs.CR cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
3D steganalysis aims to identify subtle invisible changes produced in
graphical objects through digital watermarking or steganography. Sets of
statistical representations of 3D features, extracted from both cover and stego
3D mesh objects, are used as inputs into machine learning classifiers in order
to decide whether any information was hidden in the given graphical object.
According to previous studies, sets of local geometry features can be used to
define the differences between stego and cover-objects. The features proposed
in this paper include those representing the local object curvature, vertex
normals, the local geometry representation in the spherical coordinate system
and are considered in various combinations with others. We also analyze the
effectiveness of various 3D feature sets applied for steganalysis based on the
Pearson correlation coefficient. The classifiers proposed in this study for
discriminating the 3D stego and cover-objects include Support Vector Machine
and the Fisher Linear Discriminant ensemble. Three different watermarking and
steganographic methods are used for hiding information in the 3D objects used
for testing the performance of the proposed steganalysis methodology.
|
[
{
"version": "v1",
"created": "Thu, 23 Feb 2017 11:24:03 GMT"
}
] | 2017-06-21T00:00:00 |
[
[
"Li",
"Zhenyu",
""
],
[
"Bors",
"Adrian G.",
""
]
] |
new_dataset
| 0.997868 |
1706.03428
|
Joeran Beel
|
Joeran Beel, Zeljko Carevic, Johann Schaible, Gabor Neusch
|
RARD: The Related-Article Recommendation Dataset
| null |
D-Lib Magazine, Vol. 23, No. 7/8. Publication date: July 2017
| null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recommender-system datasets are used for recommender-system evaluations,
training machine-learning algorithms, and exploring user behavior. While there
are many datasets for recommender systems in the domains of movies, books, and
music, there are rather few datasets from research-paper recommender systems.
In this paper, we introduce RARD, the Related-Article Recommendation Dataset,
from the digital library Sowiport and the recommendation-as-a-service provider
Mr. DLib. The dataset contains information about 57.4 million recommendations
that were displayed to the users of Sowiport. Information includes details on
which recommendation approaches were used (e.g. content-based filtering,
stereotype, most popular), what types of features were used in content based
filtering (simple terms vs. keyphrases), where the features were extracted from
(title or abstract), and the time when recommendations were delivered and
clicked. In addition, the dataset contains an implicit item-item rating matrix
that was created based on the recommendation click logs. RARD enables
researchers to train machine learning algorithms for research-paper
recommendations, perform offline evaluations, and do research on data from Mr.
DLib's recommender system, without implementing a recommender system
themselves. In the field of scientific recommender systems, our dataset is
unique. To the best of our knowledge, there is no dataset with more (implicit)
ratings available, and that many variations of recommendation algorithms. The
dataset is available at http://data.mr-dlib.org, and published under the
Creative Commons Attribution 3.0 Unported (CC-BY) license.
|
[
{
"version": "v1",
"created": "Mon, 12 Jun 2017 01:00:25 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jun 2017 06:47:33 GMT"
}
] | 2017-06-21T00:00:00 |
[
[
"Beel",
"Joeran",
""
],
[
"Carevic",
"Zeljko",
""
],
[
"Schaible",
"Johann",
""
],
[
"Neusch",
"Gabor",
""
]
] |
new_dataset
| 0.999559 |
1706.05274
|
Jianan Li
|
Jianan Li, Xiaodan Liang, Yunchao Wei, Tingfa Xu, Jiashi Feng,
Shuicheng Yan
|
Perceptual Generative Adversarial Networks for Small Object Detection
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Detecting small objects is notoriously challenging due to their low
resolution and noisy representation. Existing object detection pipelines
usually detect small objects through learning representations of all the
objects at multiple scales. However, the performance gain of such ad hoc
architectures is usually limited to pay off the computational cost. In this
work, we address the small object detection problem by developing a single
architecture that internally lifts representations of small objects to
"super-resolved" ones, achieving similar characteristics as large objects and
thus more discriminative for detection. For this purpose, we propose a new
Perceptual Generative Adversarial Network (Perceptual GAN) model that improves
small object detection through narrowing representation difference of small
objects from the large ones. Specifically, its generator learns to transfer
perceived poor representations of the small objects to super-resolved ones that
are similar enough to real large objects to fool a competing discriminator.
Meanwhile its discriminator competes with the generator to identify the
generated representation and imposes an additional perceptual requirement -
generated representations of small objects must be beneficial for detection
purpose - on the generator. Extensive evaluations on the challenging
Tsinghua-Tencent 100K and the Caltech benchmark well demonstrate the
superiority of Perceptual GAN in detecting small objects, including traffic
signs and pedestrians, over well-established state-of-the-arts.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 13:41:54 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jun 2017 14:38:43 GMT"
}
] | 2017-06-21T00:00:00 |
[
[
"Li",
"Jianan",
""
],
[
"Liang",
"Xiaodan",
""
],
[
"Wei",
"Yunchao",
""
],
[
"Xu",
"Tingfa",
""
],
[
"Feng",
"Jiashi",
""
],
[
"Yan",
"Shuicheng",
""
]
] |
new_dataset
| 0.980636 |
1706.06247
|
Yalda Mohsenzadeh
|
Erfan Zangeneh (1), Mohammad Rahmati (1), Yalda Mohsenzadeh (2) ((1)
Amirkabir University of Technology, (2) Massachusetts Institute of
Technology)
|
Low Resolution Face Recognition Using a Two-Branch Deep Convolutional
Neural Network Architecture
|
11 pages, 8 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel couple mappings method for low resolution face recognition
using deep convolutional neural networks (DCNNs). The proposed architecture
consists of two branches of DCNNs to map the high and low resolution face
images into a common space with nonlinear transformations. The branch
corresponding to transformation of high resolution images consists of 14 layers
and the other branch which maps the low resolution face images to the common
space includes a 5-layer super-resolution network connected to a 14-layer
network. The distance between the features of corresponding high and low
resolution images are backpropagated to train the networks. Our proposed method
is evaluated on FERET data set and compared with state-of-the-art competing
methods. Our extensive experimental results show that the proposed method
significantly improves the recognition performance especially for very low
resolution probe face images (11.4% improvement in recognition accuracy).
Furthermore, it can reconstruct a high resolution image from its corresponding
low resolution probe image which is comparable with state-of-the-art
super-resolution methods in terms of visual quality.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2017 02:54:52 GMT"
}
] | 2017-06-21T00:00:00 |
[
[
"Zangeneh",
"Erfan",
""
],
[
"Rahmati",
"Mohammad",
""
],
[
"Mohsenzadeh",
"Yalda",
""
]
] |
new_dataset
| 0.97526 |
1706.06364
|
Amaro Barreal
|
Amaro Barreal
|
Lattice Codes for Physical Layer Communications
|
Doctoral dissertation. Available at
http://urn.fi/URN:ISBN:978-952-60-7387-3
| null | null |
Aalto University publication series DOCTORAL DISSERTATIONS, 71/2017
|
cs.IT math.IT math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Lattices are deceptively simple mathematical structures that have become
indispensable for code design for physical layer communications. While
lattice-related problems are interesting in their own right, the usefulness of
these discrete structures in wireless communications provides additional
motivation for their study and enables a multidisciplinary line of research.
This thesis is devoted to the study of lattice code design for physical layer
communications. Modern wireless communication networks are required to
accommodate significantly varied types of mobile devices, differing in
available computational power or number of equipped antennas. Additionally, the
density of the networks increases rapidly, and many communication protocols
diverge from the classical direct point-to-point transmission in favor of
allowing for intermediate relays to process and forward data. An important
consequence of this shift towards more sophisticated transmission protocols is
that traditional well-performing codes become futile for modern communications,
thus the study and development of novel codes is called for.
Yet, however involved a transmission protocol may be, the characteristics of
the physical medium, i.e., the wireless channel, stay unaffected. It is thus
natural that an underlying lattice structure for code design remains crucial.
This thesis consists of several articles considering lattice code design for
four different communication settings relevant in modern wireless
communications.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2017 11:14:47 GMT"
}
] | 2017-06-21T00:00:00 |
[
[
"Barreal",
"Amaro",
""
]
] |
new_dataset
| 0.996289 |
1706.06381
|
Michael Schwarz
|
Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser,
Cl\'ementine Maurice, Raphael Spreitzer, Stefan Mangard
|
KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Besides cryptographic secrets, side-channel attacks also leak sensitive user
input. The most accurate attacks exploit cache timings or interrupt information
to monitor keystroke timings and subsequently infer typed words and sentences.
Previously proposed countermeasures fail to prevent keystroke timing attacks as
they do not protect keystroke processing among the entire software stack.
We close this gap with KeyDrown, a new defense mechanism against keystroke
timing attacks. KeyDrown injects a large number of fake keystrokes in the
kernel to prevent interrupt-based attacks and Prime+Probe attacks on the
kernel. All keystrokes, including fake keystrokes, are carefully propagated
through the shared library in order to hide any cache activity and thus to
prevent Flush+Reload attacks. Finally, we provide additional protection against
Prime+Probe for password input in user space programs. We show that attackers
cannot distinguish fake keystrokes from real keystrokes anymore and we evaluate
KeyDrown on a commodity notebook as well as on two Android smartphones. We show
that KeyDrown eliminates any advantage an attacker can gain from using
interrupt or cache side-channel information.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2017 12:15:42 GMT"
}
] | 2017-06-21T00:00:00 |
[
[
"Schwarz",
"Michael",
""
],
[
"Lipp",
"Moritz",
""
],
[
"Gruss",
"Daniel",
""
],
[
"Weiser",
"Samuel",
""
],
[
"Maurice",
"Clémentine",
""
],
[
"Spreitzer",
"Raphael",
""
],
[
"Mangard",
"Stefan",
""
]
] |
new_dataset
| 0.999285 |
1706.06415
|
Yang Liu
|
Jiacheng Zhang, Yanzhuo Ding, Shiqi Shen, Yong Cheng, Maosong Sun,
Huanbo Luan, Yang Liu
|
THUMT: An Open Source Toolkit for Neural Machine Translation
|
4 pages, 1 figure
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces THUMT, an open-source toolkit for neural machine
translation (NMT) developed by the Natural Language Processing Group at
Tsinghua University. THUMT implements the standard attention-based
encoder-decoder framework on top of Theano and supports three training
criteria: maximum likelihood estimation, minimum risk training, and
semi-supervised training. It features a visualization tool for displaying the
relevance between hidden states in neural networks and contextual words, which
helps to analyze the internal workings of NMT. Experiments on Chinese-English
datasets show that THUMT using minimum risk training significantly outperforms
GroundHog, a state-of-the-art toolkit for NMT.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2017 13:29:16 GMT"
}
] | 2017-06-21T00:00:00 |
[
[
"Zhang",
"Jiacheng",
""
],
[
"Ding",
"Yanzhuo",
""
],
[
"Shen",
"Shiqi",
""
],
[
"Cheng",
"Yong",
""
],
[
"Sun",
"Maosong",
""
],
[
"Luan",
"Huanbo",
""
],
[
"Liu",
"Yang",
""
]
] |
new_dataset
| 0.974996 |
1706.06468
|
Lin Zhang Dr.
|
L. Zhang, B. C. O'Kelly and T. Nagel
|
A finite-strain hyperviscoplastic model and undrained triaxial tests of
peat
|
30 pages, 16 figures, 4 tables. This is a pre-peer reviewed version
of manuscript submitted to the International Journal of Numerical and
Analytical Methods in Geomechanics
| null | null | null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a finite-strain hyperviscoplastic constitutive model
within a thermodynamically consistent framework for peat which was categorised
as a material with both rate-dependent and thermodynamic equilibrium hysteresis
based on the data reported in the literature. The model was implemented
numerically using implicit time integration and verified against analytical
solutions under simplified conditions. Experimental studies on the undrained
relaxation and loading-unloading-reloading behaviour of an undisturbed fibrous
peat were carried out to define the thermodynamic equilibrium state during
deviatoric loading as a prerequisite for further modelling, to fit particularly
those model parameters related to solid matrix properties, and to validate the
proposed model under undrained conditions. This validation performed by
comparison to experimental results showed that the hyperviscoplastic model
could simulate undrained triaxial compression tests carried out at five
different strain rates with loading/unloading relaxation steps.
|
[
{
"version": "v1",
"created": "Sun, 18 Jun 2017 18:21:49 GMT"
}
] | 2017-06-21T00:00:00 |
[
[
"Zhang",
"L.",
""
],
[
"O'Kelly",
"B. C.",
""
],
[
"Nagel",
"T.",
""
]
] |
new_dataset
| 0.990287 |
1706.06514
|
Christiane Spisla
|
Michael J\"unger, Petra Mutzel, Christiane Spisla
|
Orthogonal Compaction Using Additional Bends
|
Submitted to 25th International Symposium on Graph Drawing & Network
Visualization
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compacting orthogonal drawings is a challenging task. Usually algorithms try
to compute drawings with small area or edge length while preserving the
underlying orthogonal shape. We present a one-dimensional compaction algorithm
that alters the orthogonal shape of edges for better geometric results. An
experimental evaluation shows that we were able to reduce the total edge length
and the drawing area, but at the expense of additional bends.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2017 15:20:45 GMT"
}
] | 2017-06-21T00:00:00 |
[
[
"Jünger",
"Michael",
""
],
[
"Mutzel",
"Petra",
""
],
[
"Spisla",
"Christiane",
""
]
] |
new_dataset
| 0.966928 |
1510.08018
|
Anatoly Khina
|
Anatoly Khina, Yuval Kochman, and Uri Erez
|
The Dirty MIMO Multiple-Access Channel
|
To appear, IEEE Transactions on Information Theory
| null |
10.1109/ISIT.2016.7541545
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the scalar dirty multiple-access channel, in addition to Gaussian noise,
two additive interference signals are present, each known non-causally to a
single transmitter. It was shown by Philosof et al. that for strong
interferences, an i.i.d. ensemble of codes does not achieve the capacity
region. Rather, a structured-codes approach was presented, that was shown to be
optimal in the limit of high signal-to-noise ratios, where the sum-capacity is
dictated by the minimal ("bottleneck") channel gain. In this paper, we consider
the multiple-input multiple-output (MIMO) variant of this setting. In order to
incorporate structured codes in this case, one can utilize matrix
decompositions that transform the channel into effective parallel scalar dirty
multiple-access channels. This approach however suffers from a "bottleneck"
effect for each effective scalar channel and therefore the achievable rates
strongly depend on the chosen decomposition. It is shown that a recently
proposed decomposition, where the diagonals of the effective channel matrices
are equal up to a scaling factor, is optimal at high signal-to-noise ratios,
under an equal rank assumption. This approach is then extended to any number of
transmitters. Finally, an application to physical-layer network coding for the
MIMO two-way relay channel is presented.
|
[
{
"version": "v1",
"created": "Tue, 27 Oct 2015 18:28:51 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jan 2017 07:32:14 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Apr 2017 00:30:19 GMT"
},
{
"version": "v4",
"created": "Sat, 17 Jun 2017 00:08:57 GMT"
}
] | 2017-06-20T00:00:00 |
[
[
"Khina",
"Anatoly",
""
],
[
"Kochman",
"Yuval",
""
],
[
"Erez",
"Uri",
""
]
] |
new_dataset
| 0.990185 |
1512.02072
|
Zsuzsanna P\"usp\"oki
|
Zsuzsanna P\"usp\"oki, John Paul Ward, Daniel Sage, Michael Unser
|
On The Continuous Steering of the Scale of Tight Wavelet Frames
| null | null |
10.1137/15M1033885
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In analogy with steerable wavelets, we present a general construction of
adaptable tight wavelet frames, with an emphasis on scaling operations. In
particular, the derived wavelets can be "dilated" by a procedure comparable to
the operation of steering steerable wavelets. The fundamental aspects of the
construction are the same: an admissible collection of Fourier multipliers is
used to extend a tight wavelet frame, and the "scale" of the wavelets is
adapted by scaling the multipliers. As an application, the proposed wavelets
can be used to improve the frequency localization. Importantly, the localized
frequency bands specified by this construction can be scaled efficiently using
matrix multiplication.
|
[
{
"version": "v1",
"created": "Mon, 7 Dec 2015 14:50:43 GMT"
}
] | 2017-06-20T00:00:00 |
[
[
"Püspöki",
"Zsuzsanna",
""
],
[
"Ward",
"John Paul",
""
],
[
"Sage",
"Daniel",
""
],
[
"Unser",
"Michael",
""
]
] |
new_dataset
| 0.992891 |
1606.07373
|
Maksim Bolonkin
|
Du Tran, Maksim Bolonkin, Manohar Paluri, Lorenzo Torresani
|
VideoMCC: a New Benchmark for Video Comprehension
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While there is overall agreement that future technology for organizing,
browsing and searching videos hinges on the development of methods for
high-level semantic understanding of video, so far no consensus has been
reached on the best way to train and assess models for this task. Casting video
understanding as a form of action or event categorization is problematic as it
is not fully clear what the semantic classes or abstractions in this domain
should be. Language has been exploited to sidestep the problem of defining
video categories, by formulating video understanding as the task of captioning
or description. However, language is highly complex, redundant and sometimes
ambiguous. Many different captions may express the same semantic concept. To
account for this ambiguity, quantitative evaluation of video description
requires sophisticated metrics, whose performance scores are typically hard to
interpret by humans.
This paper provides four contributions to this problem. First, we formulate
Video Multiple Choice Caption (VideoMCC) as a new well-defined task with an
easy-to-interpret performance measure. Second, we describe a general
semi-automatic procedure to create benchmarks for this task. Third, we publicly
release a large-scale video benchmark created with an implementation of this
procedure and we include a human study that assesses human performance on our
dataset. Finally, we propose and test a varied collection of approaches on this
benchmark for the purpose of gaining a better understanding of the new
challenges posed by video comprehension.
|
[
{
"version": "v1",
"created": "Thu, 23 Jun 2016 16:53:22 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Nov 2016 19:49:57 GMT"
},
{
"version": "v3",
"created": "Fri, 31 Mar 2017 17:50:47 GMT"
},
{
"version": "v4",
"created": "Fri, 14 Apr 2017 17:30:12 GMT"
},
{
"version": "v5",
"created": "Fri, 16 Jun 2017 19:50:46 GMT"
}
] | 2017-06-20T00:00:00 |
[
[
"Tran",
"Du",
""
],
[
"Bolonkin",
"Maksim",
""
],
[
"Paluri",
"Manohar",
""
],
[
"Torresani",
"Lorenzo",
""
]
] |
new_dataset
| 0.966393 |
1609.02104
|
Yue Wang
|
Yue Wang, Alexandra Meliou, Gerome Miklau
|
A Consumer-Centric Market for Database Computation in the Cloud
| null | null | null | null |
cs.DB cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The availability of public computing resources in the cloud has
revolutionized data analysis, but requesting cloud resources often involves
complex decisions for consumers. Under the current pricing mechanisms, cloud
service providers offer several service options and charge consumers based on
the resources they use. Before they can decide which cloud resources to
request, consumers have to estimate the completion time and cost of their
computational tasks for different service options and possibly for different
service providers. This estimation is challenging even for expert cloud users.
We propose a new market-based framework for pricing computational tasks in the
cloud. Our framework introduces an agent between consumers and cloud providers.
The agent takes data and computational tasks from users, estimates time and
cost for evaluating the tasks, and returns to consumers contracts that specify
the price and completion time. Our framework can be applied directly to
existing cloud markets without altering the way cloud providers offer and price
services. In addition, it simplifies cloud use for consumers by allowing them
to compare contracts, rather than choose resources directly. We present design,
analytical, and algorithmic contributions focusing on pricing computation
contracts, analyzing their properties, and optimizing them in complex
workflows. We conduct an experimental evaluation of our market framework over a
real-world cloud service and demonstrate empirically that our market ensures
three key properties: competitiveness, fairness, and resilience. Finally, we
present a fine-grained pricing mechanism for complex workflows and show that it
can increase agent profits by more than an order of magnitude in some cases.
|
[
{
"version": "v1",
"created": "Wed, 7 Sep 2016 18:42:09 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Sep 2016 06:25:36 GMT"
},
{
"version": "v3",
"created": "Fri, 16 Sep 2016 14:19:02 GMT"
},
{
"version": "v4",
"created": "Thu, 17 Nov 2016 19:55:15 GMT"
},
{
"version": "v5",
"created": "Tue, 22 Nov 2016 02:31:53 GMT"
},
{
"version": "v6",
"created": "Fri, 16 Jun 2017 20:40:04 GMT"
}
] | 2017-06-20T00:00:00 |
[
[
"Wang",
"Yue",
""
],
[
"Meliou",
"Alexandra",
""
],
[
"Miklau",
"Gerome",
""
]
] |
new_dataset
| 0.993861 |
1706.05468
|
Alberto Ravagnani
|
Alberto Ravagnani and Frank R. Kschischang
|
Adversarial Network Coding
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A combinatorial framework for adversarial network coding is presented.
Channels are described by specifying the possible actions that one or more
(possibly coordinated) adversaries may take. Upper bounds on three notions of
capacity (the one-shot capacity, the zero-error capacity, and the compound
zero-error capacity) are obtained for point-to-point channels, and generalized
to corresponding capacity regions appropriate for multi-source networks. A key
result of this paper is a general method by which bounds on these capacities in
point-to-point channels may be ported to networks. This technique is
illustrated in detail for Hamming-type channels with multiple adversaries
operating on specific coordinates, which correspond, in the context of
networks, to multiple adversaries acting on specific network edges.
Capacity-achieving coding schemes are described for some of the considered
adversarial models.
|
[
{
"version": "v1",
"created": "Sat, 17 Jun 2017 01:41:06 GMT"
}
] | 2017-06-20T00:00:00 |
[
[
"Ravagnani",
"Alberto",
""
],
[
"Kschischang",
"Frank R.",
""
]
] |
new_dataset
| 0.955878 |
1706.05536
|
Ahmed Alioua
|
Ahmed Alioua, Sidi-Mohammed Senouci and Samira Moussaoui
|
dSDiVN: a distributed Software-Defined Networking architecture for
Infrastructure-less Vehicular Networks
|
12 pages, 5 figures, accepted in I4CS2017
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the last few years, the emerging network architecture paradigm of
Software-Defined Networking (SDN), has become one of the most important
technology to manage large scale networks such as Vehicular Ad-hoc Networks
(VANETs). Recently, several works have shown interest in the use of SDN
paradigm in VANETs. SDN brings flexibility, scalability and management facility
to current VANETs. However, almost all of proposed Software-Defined VANET
(SDVN) architectures are infrastructure-based. This paper will focus on how to
enable SDN in infrastructure-less vehicular environments. For this aim, we
propose a novel distributed SDN-based architecture for uncovered
infrastructure-less vehicular scenarios. It is a scalable cluster-based
architecture with distributed mobile controllers and a reliable fall back
recovery mechanism based on self-organized clustering and failure anticipation.
|
[
{
"version": "v1",
"created": "Sat, 17 Jun 2017 13:47:09 GMT"
}
] | 2017-06-20T00:00:00 |
[
[
"Alioua",
"Ahmed",
""
],
[
"Senouci",
"Sidi-Mohammed",
""
],
[
"Moussaoui",
"Samira",
""
]
] |
new_dataset
| 0.999106 |
1706.05604
|
Mohsen Karimzadeh Kiskani
|
Mohsen Karimzadeh Kiskani and Hamid Sadjadpour
|
Secure and Private Cloud Storage Systems with Random Linear Fountain
Codes
|
8 pages, 2 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An information theoretic approach to security and privacy called Secure And
Private Information Retrieval (SAPIR) is introduced. SAPIR is applied to
distributed data storage systems. In this approach, random combinations of all
contents are stored across the network. Our coding approach is based on Random
Linear Fountain (RLF) codes. To retrieve a content, a group of servers
collaborate with each other to form a Reconstruction Group (RG). SAPIR achieves
asymptotic perfect secrecy if at least one of the servers within an RG is not
compromised. Further, a Private Information Retrieval (PIR) scheme based on
random queries is proposed. The PIR approach ensures the users privately
download their desired contents without the servers knowing about the requested
contents indices. The proposed scheme is adaptive and can provide privacy
against a significant number of colluding servers.
|
[
{
"version": "v1",
"created": "Sun, 18 Jun 2017 04:42:05 GMT"
}
] | 2017-06-20T00:00:00 |
[
[
"Kiskani",
"Mohsen Karimzadeh",
""
],
[
"Sadjadpour",
"Hamid",
""
]
] |
new_dataset
| 0.985096 |
1706.05830
|
Michael Schelling
|
Michael Schelling, Martin Bossert
|
Code Constructions based on Reed-Solomon Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reed--Solomon codes are a well--studied code class which fulfill the
Singleton bound with equality. However, their length is limited to the size $q$
of the underlying field $\mathbb{F}_q$. In this paper we present a code
construction which yields codes with lengths of factors of the field size.
Furthermore a decoding algorithm beyond half the minimum distance is given and
analyzed.
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2017 08:43:02 GMT"
}
] | 2017-06-20T00:00:00 |
[
[
"Schelling",
"Michael",
""
],
[
"Bossert",
"Martin",
""
]
] |
new_dataset
| 0.995913 |
1706.06001
|
Konstantinos Poularakis
|
Konstantinos Poularakis, Qiaofeng Qin, Erich Nahum, Miguel Rio,
Leandros Tassiulas
|
Bringing SDN to the Mobile Edge
|
6 pages, 6 figures, DAIS 2017 - Workshop on Distributed Analytics
InfraStructure and Algorithms for Multi-Organization Federations
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays, Software Defined Network (SDN) architectures and applications are
revolutionizing the way wired networks are built and operate. However, little
is known about the potential of this disruptive technology in wireless mobile
networks. In fact, SDN is based on a centralized network control principle,
while existing mobile network protocols give emphasis on the distribution of
network resources and their management. Therefore, it is challenging to apply
SDN ideas in the context of mobile networks. In this paper, we propose methods
to overcome these challenges and make SDN more suitable for the mobile
environment. Our main idea is to combine centralized SDN and distributed
control in a hybrid design that takes the best of the two paradigms; (i) global
network view and control programmability of SDN and (ii) robustness of
distributed protocols. We discuss the pros and cons of each method and
highlight them in an SDN prototype implementation built using off-the-shelf
mobile devices.
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2017 15:08:52 GMT"
}
] | 2017-06-20T00:00:00 |
[
[
"Poularakis",
"Konstantinos",
""
],
[
"Qin",
"Qiaofeng",
""
],
[
"Nahum",
"Erich",
""
],
[
"Rio",
"Miguel",
""
],
[
"Tassiulas",
"Leandros",
""
]
] |
new_dataset
| 0.996877 |
1706.06027
|
Hao Wang
|
Hao Wang, Ilya Kolmanovsky, and Jing Sun
|
Zonotope-based Set-membership Parameter Identification of Linear Systems
with Additive and Multiplicative Uncertainties and Its Application to Engine
Condition Monitoring
|
11 pages, 5 figures
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we develop two zonotope-based set-membership estimation
algorithms for identification of time-varying parameters in linear models,
where both additive and multiplicative uncertainties are treated explicitly.
The two recursive algorithms can be differentiated by their ways of processing
the data and required computations. The first algorithm, which is referred to
as Cone And Zonotope Intersection (CAZI), requires solving linear programming
problems at each iteration. The second algorithm, referred to as the Polyhedron
And Zonotope Intersection (PAZI), involves linear programming as well as an
optimization subject to linear matrix inequalities (LMIs). Both algorithms are
capable of providing tight overbounds of the feasible solution set (FSS) in our
numerical case studies. Furthermore, PAZI provides an additional opportunity of
further analyzing the relation between the estimation results at different
iterations. An application to health monitoring of marine engines is considered
to demonstrate the utility and effectiveness of the algorithms.
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2017 15:54:32 GMT"
}
] | 2017-06-20T00:00:00 |
[
[
"Wang",
"Hao",
""
],
[
"Kolmanovsky",
"Ilya",
""
],
[
"Sun",
"Jing",
""
]
] |
new_dataset
| 0.993372 |
1508.06899
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
Contradiction-tolerant process algebra with propositional signals
|
25 pages; 26 pages, occurrences of wrong symbol for bisimulation
equivalence replaced; 26 pages, Proposition 1 added; 27 pages, explanation of
the phrase 'in contradiction' added to section 2 and presentation of the
completeness result in section 2 improved; 27 pages, uniqueness result in
section 2 revised; 27 pages, last paragraph of section 8 revised
|
Fundamenta Informaticae, 153(1-2): 29-55 (2017)
|
10.3233/FI-2017-1530
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a previous paper, an ACP-style process algebra was proposed in which
propositions are used as the visible part of the state of processes and as
state conditions under which processes may proceed. This process algebra,
called ACPps, is built on classical propositional logic. In this paper, we
present a version of ACPps built on a paraconsistent propositional logic which
is essentially the same as CLuNs. There are many systems that would have to
deal with self-contradictory states if no special measures were taken. For a
number of these systems, it is conceivable that accepting self-contradictory
states and dealing with them in a way based on a paraconsistent logic is an
alternative to taking special measures. The presented version of ACPps can be
suited for the description and analysis of systems that deal with
self-contradictory states in a way based on the above-mentioned paraconsistent
logic.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2015 15:28:17 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Mar 2016 16:36:31 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Nov 2016 15:38:26 GMT"
},
{
"version": "v4",
"created": "Sun, 27 Nov 2016 13:40:52 GMT"
},
{
"version": "v5",
"created": "Thu, 9 Feb 2017 12:13:43 GMT"
},
{
"version": "v6",
"created": "Sun, 19 Mar 2017 11:19:42 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
new_dataset
| 0.977921 |
1608.07573
|
Garth Wells
|
Jack S. Hale, Lizao Li, Chris N. Richardson and Garth N. Wells
|
Containers for portable, productive and performant scientific computing
| null | null |
10.1109/MCSE.2017.2421459
| null |
cs.DC cs.MS cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Containers are an emerging technology that hold promise for improving
productivity and code portability in scientific computing. We examine Linux
container technology for the distribution of a non-trivial scientific computing
software stack and its execution on a spectrum of platforms from laptop
computers through to high performance computing (HPC) systems. We show on a
workstation and a leadership-class HPC system that when deployed appropriately
there are no performance penalties running scientific programs inside
containers. For Python code run on large parallel computers, the run time is
reduced inside a container due to faster library imports. The software
distribution approach and data that we present will help developers and users
decide on whether container technology is appropriate for them. We also provide
guidance for the vendors of HPC systems that rely on proprietary libraries for
performance on what they can do to make containers work seamlessly and without
performance penalty.
|
[
{
"version": "v1",
"created": "Fri, 26 Aug 2016 11:58:00 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Nov 2016 18:21:56 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Hale",
"Jack S.",
""
],
[
"Li",
"Lizao",
""
],
[
"Richardson",
"Chris N.",
""
],
[
"Wells",
"Garth N.",
""
]
] |
new_dataset
| 0.998903 |
1609.04735
|
Bruno Silvestre
|
Vinicius N. Medeiros, Douglas V. Santana, Bruno Silvestre, Vinicius da
C. M. Borges
|
RALL - Routing-Aware Of Path Length, Link Quality, And Traffic Load For
Wireless Sensor Networks
| null | null |
10.1145/3019612.3019730
| null |
cs.NI cs.DS
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Due to the enormous variety of application scenarios and ubiquity,Internet of
Things (IoT) brought a new perspective of applications for the current and
future Internet. The Wireless Sensor Networks provide key devices for
developing the IoT communication paradigm, such as the sensors collecting
various kind of information and the routing and MAC protocols. However, this
type of network has strong power consumption and transmission capacity
restrictions (low speed wireless links and subject to interference). In this
context, it is necessary to develop solutions that enable a more efficient
communication based on the optimized utilization of the network resources. This
papers aims to present a multi-objective routing algorithm, named Routing-Aware
of path Length, Link quality, and traffic Load (RALL), that seeks to balance
three objectives: to minimize bottlenecks, to minimize path length, and to
avoid links with low quality. RALL results in good performance when taking into
consideration delivery rate, overhead, delay, and power consumption.
|
[
{
"version": "v1",
"created": "Thu, 15 Sep 2016 16:59:05 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Medeiros",
"Vinicius N.",
""
],
[
"Santana",
"Douglas V.",
""
],
[
"Silvestre",
"Bruno",
""
],
[
"Borges",
"Vinicius da C. M.",
""
]
] |
new_dataset
| 0.998477 |
1702.02878
|
Leonardo Fernandez-Jambrina
|
L. Fern\'andez-Jambrina
|
Bezier developable surfaces
|
26 pages, 10 figures, Computer Aided Geometric Design special number
in memoriam Professor Gerald Farin
|
Computer Aided Geometric Design 55, 15-28 (2017)
|
10.1016/j.cagd.2017.02.001
| null |
cs.GR math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we address the issue of designing developable surfaces with
Bezier patches. We show that developable surfaces with a polynomial edge of
regression are the set of developable surfaces which can be constructed with
Aumann's algorithm. We also obtain the set of polynomial developable surfaces
which can be constructed using general polynomial curves. The conclusions can
be extended to spline surfaces as well.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2017 16:23:36 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Fernández-Jambrina",
"L.",
""
]
] |
new_dataset
| 0.995211 |
1702.06016
|
Fabiana Zollo
|
Michela Del Vicario, Sabrina Gaito, Walter Quattrociocchi, Matteo
Zignani, Fabiana Zollo
|
Public discourse and news consumption on online social media: A
quantitative, cross-platform analysis of the Italian Referendum
| null | null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The rising attention to the spreading of fake news and unsubstantiated rumors
on online social media and the pivotal role played by confirmation bias led
researchers to investigate different aspects of the phenomenon. Experimental
evidence showed that confirmatory information gets accepted even if containing
deliberately false claims while dissenting information is mainly ignored or
might even increase group polarization. It seems reasonable that, to address
misinformation problem properly, we have to understand the main determinants
behind content consumption and the emergence of narratives on online social
media. In this paper we address such a challenge by focusing on the discussion
around the Italian Constitutional Referendum by conducting a quantitative,
cross-platform analysis on both Facebook public pages and Twitter accounts. We
observe the spontaneous emergence of well-separated communities on both
platforms. Such a segregation is completely spontaneous, since no
categorization of contents was performed a priori. By exploring the dynamics
behind the discussion, we find that users tend to restrict their attention to a
specific set of Facebook pages/Twitter accounts. Finally, taking advantage of
automatic topic extraction and sentiment analysis techniques, we are able to
identify the most controversial topics inside and across both platforms. We
measure the distance between how a certain topic is presented in the
posts/tweets and the related emotional response of users. Our results provide
interesting insights for the understanding of the evolution of the core
narratives behind different echo chambers and for the early detection of
massive viral phenomena around false claims.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2017 15:35:27 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Jun 2017 10:14:10 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Del Vicario",
"Michela",
""
],
[
"Gaito",
"Sabrina",
""
],
[
"Quattrociocchi",
"Walter",
""
],
[
"Zignani",
"Matteo",
""
],
[
"Zollo",
"Fabiana",
""
]
] |
new_dataset
| 0.992819 |
1706.05089
|
Go Sugimoto
|
Go Sugimoto (ACDH-\"OAW)
|
Number game
| null | null | null | null |
cs.CL cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
CLARIN (Common Language Resources and Technology Infrastructure) is regarded
as one of the most important European research infrastructures, offering and
promoting a wide array of useful services for (digital) research in linguistics
and humanities. However, the assessment of the users for its core technical
development has been highly limited, therefore, it is unclear if the community
is thoroughly aware of the status-quo of the growing infrastructure. In
addition, CLARIN does not seem to be fully materialised marketing and business
plans and strategies despite its strong technical assets. This article analyses
the web traffic of the Virtual Language Observatory, one of the main web
applications of CLARIN and a symbol of pan-European re-search cooperation, to
evaluate the users and performance of the service in a transparent and
scientific way. It is envisaged that the paper can raise awareness of the
pressing issues on objective and transparent operation of the infrastructure
though Open Evaluation, and the synergy between marketing and technical
development. It also investigates the "science of web analytics" in an attempt
to document the research process for the purpose of reusability and
reproducibility, thus to find universal lessons for the use of a web analytics,
rather than to merely produce a statistical report of a particular website
which loses its value outside its context.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2017 13:00:08 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Sugimoto",
"Go",
"",
"ACDH-ÖAW"
]
] |
new_dataset
| 0.999596 |
1706.05123
|
Wenqing Xu
|
Wenqing Xu, Mark Stalzer
|
Deriving Compact Laws Based on Algebraic Formulation of a Data Set
|
16 pages, 2 tables
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In various subjects, there exist compact and consistent relationships between
input and output parameters. Discovering the relationships, or namely compact
laws, in a data set is of great interest in many fields, such as physics,
chemistry, and finance. While data discovery has made great progress in
practice thanks to the success of machine learning in recent years, the
development of analytical approaches in finding the theory behind the data is
relatively slow. In this paper, we develop an innovative approach in
discovering compact laws from a data set. By proposing a novel algebraic
equation formulation, we convert the problem of deriving meaning from data into
formulating a linear algebra model and searching for relationships that fit the
data. Rigorous proof is presented in validating the approach. The algebraic
formulation allows the search of equation candidates in an explicit
mathematical manner. Searching algorithms are also proposed for finding the
governing equations with improved efficiency. For a certain type of compact
theory, our approach assures convergence and the discovery is computationally
efficient and mathematically precise.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 01:13:04 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Xu",
"Wenqing",
""
],
[
"Stalzer",
"Mark",
""
]
] |
new_dataset
| 0.961366 |
1706.05125
|
Yann Dauphin
|
Mike Lewis, Denis Yarats, Yann N. Dauphin, Devi Parikh and Dhruv Batra
|
Deal or No Deal? End-to-End Learning for Negotiation Dialogues
| null | null | null | null |
cs.AI cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Much of human dialogue occurs in semi-cooperative settings, where agents with
different goals attempt to agree on common decisions. Negotiations require
complex communication and reasoning skills, but success is easy to measure,
making this an interesting task for AI. We gather a large dataset of
human-human negotiations on a multi-issue bargaining task, where agents who
cannot observe each other's reward functions must reach an agreement (or a
deal) via natural language dialogue. For the first time, we show it is possible
to train end-to-end models for negotiation, which must learn both linguistic
and reasoning skills with no annotated dialogue states. We also introduce
dialogue rollouts, in which the model plans ahead by simulating possible
complete continuations of the conversation, and find that this technique
dramatically improves performance. Our code and dataset are publicly available
(https://github.com/facebookresearch/end-to-end-negotiator).
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 01:26:09 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Lewis",
"Mike",
""
],
[
"Yarats",
"Denis",
""
],
[
"Dauphin",
"Yann N.",
""
],
[
"Parikh",
"Devi",
""
],
[
"Batra",
"Dhruv",
""
]
] |
new_dataset
| 0.999459 |
1706.05150
|
He-Da Wang
|
He-Da Wang, Teng Zhang, Ji Wu
|
The Monkeytyping Solution to the YouTube-8M Video Understanding
Challenge
|
Submitted to the CVPR 2017 Workshop on YouTube-8M Large-Scale Video
Understanding
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article describes the final solution of team monkeytyping, who finished
in second place in the YouTube-8M video understanding challenge. The dataset
used in this challenge is a large-scale benchmark for multi-label video
classification. We extend the work in [1] and propose several improvements for
frame sequence modeling. We propose a network structure called Chaining that
can better capture the interactions between labels. Also, we report our
approaches in dealing with multi-scale information and attention pooling. In
addition, We find that using the output of model ensemble as a side target in
training can boost single model performance. We report our experiments in
bagging, boosting, cascade, and stacking, and propose a stacking algorithm
called attention weighted stacking. Our final submission is an ensemble that
consists of 74 sub models, all of which are listed in the appendix.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 05:39:53 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Wang",
"He-Da",
""
],
[
"Zhang",
"Teng",
""
],
[
"Wu",
"Ji",
""
]
] |
new_dataset
| 0.951197 |
1706.05161
|
Fabrizio Montecchiani
|
Emilio Di Giacomo, Walter Didimo, William S. Evans, Giuseppe Liotta,
Henk Meijer, Fabrizio Montecchiani, Stephen K. Wismath
|
New Results on Edge Partitions of 1-plane Graphs
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A $1$-plane graph is a graph embedded in the plane such that each edge is
crossed at most once. A NIC-plane graph is a $1$-plane graph such that any two
pairs of crossing edges share at most one end-vertex. An edge partition of a
$1$-plane graph $G$ is a coloring of the edges of $G$ with two colors, red and
blue, such that both the graph induced by the red edges and the graph induced
by the blue edges are plane graphs. We prove the following: $(i)$ Every
NIC-plane graph admits an edge partition such that the red graph has maximum
vertex degree three; this bound on the vertex degree is worst-case optimal.
$(ii)$ Deciding whether a $1$-plane graph admits an edge partition such that
the red graph has maximum vertex degree two is NP-complete. $(iii)$ Deciding
whether a $1$-plane graph admits an edge partition such that the red graph has
maximum vertex degree one, and computing one in the positive case, can be done
in quadratic time. Applications of these results to graph drawing are also
discussed.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 07:04:28 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Di Giacomo",
"Emilio",
""
],
[
"Didimo",
"Walter",
""
],
[
"Evans",
"William S.",
""
],
[
"Liotta",
"Giuseppe",
""
],
[
"Meijer",
"Henk",
""
],
[
"Montecchiani",
"Fabrizio",
""
],
[
"Wismath",
"Stephen K.",
""
]
] |
new_dataset
| 0.979423 |
1706.05238
|
Mustafa Cemil Coskun
|
Mustafa Cemil Co\c{s}kun, Gianluigi Liva, Alexandre Graell i Amat and
Michael Lentmaier
|
Successive Cancellation Decoding of Single Parity-Check Product Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce successive cancellation (SC) decoding of product codes (PCs)
with single parity-check (SPC) component codes. Recursive formulas are derived,
which resemble the SC decoding algorithm of polar codes. We analyze the error
probability of SPC-PCs over the binary erasure channel under SC decoding. A
bridge with the analysis of PCs introduced by Elias in 1954 is also
established. Furthermore, bounds on the block error probability under SC
decoding are provided, and compared to the bounds under the original decoding
algorithm proposed by Elias. It is shown that SC decoding of SPC-PCs achieves a
lower block error probability than Elias' decoding.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 12:14:50 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Coşkun",
"Mustafa Cemil",
""
],
[
"Liva",
"Gianluigi",
""
],
[
"Amat",
"Alexandre Graell i",
""
],
[
"Lentmaier",
"Michael",
""
]
] |
new_dataset
| 0.966573 |
1706.05263
|
Sebastien Tixeuil
|
Jordan Adamek, Mikhail Nesterenko, James Robinson, S\'ebastien Tixeuil
(NPA, IUF, LINCS)
|
Concurrent Geometric Multicasting
| null | null | null | null |
cs.DC cs.CG cs.DM cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present MCFR, a multicasting concurrent face routing algorithm that uses
geometric routing to deliver a message from source to multiple targets. We
describe the algorithm's operation, prove it correct, estimate its performance
bounds and evaluate its performance using simulation. Our estimate shows that
MCFR is the first geometric multicast routing algorithm whose message delivery
latency is independent of network size and only proportional to the distance
between the source and the targets. Our simulation indicates that MCFR has
significantly better reliability than existing algorithms.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 13:16:54 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Adamek",
"Jordan",
"",
"NPA, IUF, LINCS"
],
[
"Nesterenko",
"Mikhail",
"",
"NPA, IUF, LINCS"
],
[
"Robinson",
"James",
"",
"NPA, IUF, LINCS"
],
[
"Tixeuil",
"Sébastien",
"",
"NPA, IUF, LINCS"
]
] |
new_dataset
| 0.988068 |
1706.05267
|
Matthieu Perrin
|
Damien Imbs (LIF), Achour Mostefaoui (GDD), Matthieu Perrin, Michel
Raynal (ASAP, IUF)
|
Set-Constrained Delivery Broadcast: Definition, Abstraction Power, and
Computability Limits
|
arXiv admin note: substantial text overlap with arXiv:1702.08176
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a new communication abstraction, called Set-Constrained
Delivery Broadcast (SCD-broadcast), whose aim is to provide its users with an
appropriate abstraction level when they have to implement objects or
distributed tasks in an asynchronous message-passing system prone to process
crash failures. This abstraction allows each process to broadcast messages and
deliver a sequence of sets of messages in such a way that, if a process
delivers a set of messages including a message m and later delivers a set of
messages including a message m ' , no process delivers first a set of messages
including m ' and later a set of message including m. After having presented an
algorithm implementing SCD-broadcast, the paper investigates its programming
power and its computability limits. On the "power" side it presents
SCD-broadcast-based algorithms, which are both simple and efficient, building
objects (such as snapshot and conflict-free replicated data), and distributed
tasks. On the "computability limits" side it shows that SCD-broadcast and
read/write registers are computationally equivalent.
|
[
{
"version": "v1",
"created": "Thu, 15 Jun 2017 14:20:40 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Imbs",
"Damien",
"",
"LIF"
],
[
"Mostefaoui",
"Achour",
"",
"GDD"
],
[
"Perrin",
"Matthieu",
"",
"ASAP, IUF"
],
[
"Raynal",
"Michel",
"",
"ASAP, IUF"
]
] |
new_dataset
| 0.99747 |
1706.05286
|
Irvan Arief Ang
|
Irvan B. Arief-Ang, Flora D. Salim and Margaret Hamilton
|
CD-HOC: Indoor Human Occupancy Counting using Carbon Dioxide Sensor Data
|
24 pages
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human occupancy information is crucial for any modern Building Management
System (BMS). Implementing pervasive sensing and leveraging Carbon Dioxide data
from BMS sensor, we present Carbon Dioxide - Human Occupancy Counter (CD-HOC),
a novel way to estimate the number of people within a closed space from a
single carbon dioxide sensor. CD-HOC de-noises and pre-processes the carbon
dioxide data. We utilise both seasonal-trend decomposition based on Loess and
seasonal-trend decomposition with moving average to factorise carbon dioxide
data. For each trend, seasonal and irregular component, we model different
regression algorithms to predict each respective human occupancy component
value. We propose a zero pattern adjustment model to increase the accuracy and
finally, we use additive decomposition to reconstruct the prediction value. We
run our model in two different locations that have different contexts. The
first location is an academic staff room and the second is a cinema theatre.
Our results show an average of 4.33% increment in accuracy for the small room
with 94.68% indoor human occupancy counting and 8.46% increase for the cinema
theatre in comparison to the accuracy of the baseline method, support vector
regression.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 14:28:32 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Arief-Ang",
"Irvan B.",
""
],
[
"Salim",
"Flora D.",
""
],
[
"Hamilton",
"Margaret",
""
]
] |
new_dataset
| 0.967009 |
1706.05288
|
Mohammad Hosseini
|
Mohammad Hosseini, Yu Jiang, Ali Yekkehkhany, Richard R. Berlin, Lui
Sha
|
A Mobile Geo-Communication Dataset for Physiology-Aware DASH in Rural
Ambulance Transport
|
Proceedings of the 8th ACM on Multimedia Systems Conference
(MMSys'17), Pages 158-163, Taipei, Taiwan, June 20 - 23, 2017
| null |
10.1145/3083187.3083211
| null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Use of telecommunication technologies for remote, continuous monitoring of
patients can enhance effectiveness of emergency ambulance care during transport
from rural areas to a regional center hospital. However, the communication
along the various routes in rural areas may have wide bandwidth ranges from 2G
to 4G; some regions may have only lower satellite bandwidth available.
Bandwidth fluctuation together with real-time communication of various clinical
multimedia pose a major challenge during rural patient ambulance transport.;
AB@The availability of a pre-transport route-dependent communication bandwidth
database is an important resource in remote monitoring and clinical multimedia
transmission in rural ambulance transport. Here, we present a geo-communication
dataset from extensive profiling of 4 major US mobile carriers in Illinois,
from the rural location of Hoopeston to the central referral hospital center at
Urbana. In collaboration with Carle Foundation Hospital, we developed a
profiler, and collected various geographical and communication traces for
realistic emergency rural ambulance transport scenarios. Our dataset is to
support our ongoing work of proposing "physiology-aware DASH", which is
particularly useful for adaptive remote monitoring of critically ill patients
in emergency rural ambulance transport. It provides insights on ensuring higher
Quality of Service (QoS) for most critical clinical multimedia in response to
changes in patients' physiological states and bandwidth conditions. Our dataset
is available online for research community.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 14:28:53 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Hosseini",
"Mohammad",
""
],
[
"Jiang",
"Yu",
""
],
[
"Yekkehkhany",
"Ali",
""
],
[
"Berlin",
"Richard R.",
""
],
[
"Sha",
"Lui",
""
]
] |
new_dataset
| 0.999844 |
1706.05309
|
Rangeet Mitra
|
Rangeet Mitra and Vimal Bhatia
|
Precoded Chebyshev-NLMS based pre-distorter for nonlinear LED
compensation in NOMA-VLC
|
R. Mitra and V. Bhatia are with Indian Institute of Technology
Indore, Indore-453552, India, Email:[email protected],
[email protected]. This work was submitted to IEEE Transactions on
Communications on October 26, 2016, decisioned on March 3, 2017, and revised
on April 25, 2017, and is currently under review in IEEE Transactions on
Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visible light communication (VLC) is one of the main technologies driving the
future 5G communication systems due to its ability to support high data rates
with low power consumption, thereby facilitating high speed green
communications. To further increase the capacity of VLC systems, a technique
called non-orthogonal multiple access (NOMA) has been suggested to cater to
increasing demand for bandwidth, whereby users' signals are superimposed prior
to transmission and detected at each user equipment using successive
interference cancellation (SIC). Some recent results on NOMA exist which
greatly enhance the achievable capacity as compared to orthogonal multiple
access techniques. However, one of the performance-limiting factors affecting
VLC systems is the nonlinear characteristics of a light emitting diode (LED).
This paper considers the nonlinear LED characteristics in the design of
pre-distorter for cognitive radio inspired NOMA in VLC, and proposes singular
value decomposition based Chebyshev precoding to improve performance of
nonlinear multiple-input multiple output NOMA-VLC. A novel and generalized
power allocation strategy is also derived in this work, which is valid even in
scenarios when users experience similar channels. Additionally, in this work,
analytical upper bounds for the bit error rate of the proposed detector are
derived for square $M$-quadrature amplitude modulation.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 15:07:42 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Mitra",
"Rangeet",
""
],
[
"Bhatia",
"Vimal",
""
]
] |
new_dataset
| 0.996313 |
1706.05356
|
Stephen Edwards Dr
|
Stephen Edwards
|
Limits to rover miniaturisation and their implications for solar system
exploration
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Semiautonomous rover scaling is examined for exploration throughout the solar
system. Communications to a relay orbiter is a major constraint, due to power
requirements and decreasing antenna gain at small sizes. Also, analysis time
scales adversely for power hungry Raman or surface abrasion, and also for low
photon count gamma ray spectroscopy. 1 cm scale rovers with a MER like
capability should be possible, and could operate on solar power to 40 AU. At 2
cm, rovers powered by current RTGs are feasible, and are useful in the outer
solar system. Such rovers will return images, autonomously navigate from
interest point to interest point, and autonomously deploy instruments. Analyses
include elemental APX and gamma ray spectroscopy for elemental and Raman and IR
spectroscopy for molecular and or mineralogical compositions. They can be built
with current technology, the component size is similar to watch movements. Low
temperatures are not an obstacle. Very high temperatures, e.g. 390 to 480 C for
surface Venus, will require more work on high temperature electronics, but
current work suggests that dense ICs for Venusian conditions should be feasible
in the near future. Mm size rovers, designed primarily for imaging, are
feasible at inner solar system solar flux levels. If deployed in large numbers,
manufacturing developments would be needed to allow mechanised assembly of
multiple MEMS systems. Miniature, degassing to space, RTGs could provide power
in cold vacuum environments, as could advanced betavoltaic systems, though much
work would be required to develop the latter.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2017 17:23:04 GMT"
}
] | 2017-06-19T00:00:00 |
[
[
"Edwards",
"Stephen",
""
]
] |
new_dataset
| 0.999352 |
1410.4967
|
Dimitrios Kallergis
|
Dimitrios Kallergis, Konstantinos Chimos, Vizikidis Stefanos,
Theodoros Karvounidis, Christos Douligeris
|
Pirus: A Web-based File Hosting Service with Object Oriented Logic in
Cloud Computing
|
6 pages, 3rd International Conference on Internet and Cloud Computing
Technology (ICICCT2013), November 6-7 2013, Singapore
|
International Journal of Information Technology & Computer Science
(IJITCS) 12 (3) (2013) 38-43
| null | null |
cs.SE cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper a new Web-based File Hosting Service with Object Oriented Logic
in Cloud Computing called Pirus was developed. The service will be used by the
academic community of the University of Piraeus giving users the ability to
remotely store and access their personal files with no security compromises. It
also offers the administrators the ability to manage users and roles. The
objective was to deliver a fully operational service, using state-of-the-art
programming techniques to enable scalability and future development of the
existing functionality. The use of technologies such as .NET Framework, C#
programming language, CSS and jQuery, MSSQL for database hosting and the
support of Virtualization and Cloud Computing will contribute significantly in
compatibility, code reuse, reliability and reduce of maintenance costs and
resources. The service was installed and tested in a controlled environment to
ascertain the required functionality and the offered reliability and safety
with complete success.
The technologies used and supported, allow future work in upgrading and
extending the service. Changes and improvements, in hardware and software, in
order to convert the service to a SaaS (Software as a Service) Cloud
application is a logical step in order to efficiently offer the service to a
wider community. Improved and added functionality offered by further
development will leverage the user experience.
|
[
{
"version": "v1",
"created": "Sat, 18 Oct 2014 14:59:59 GMT"
}
] | 2017-06-16T00:00:00 |
[
[
"Kallergis",
"Dimitrios",
""
],
[
"Chimos",
"Konstantinos",
""
],
[
"Stefanos",
"Vizikidis",
""
],
[
"Karvounidis",
"Theodoros",
""
],
[
"Douligeris",
"Christos",
""
]
] |
new_dataset
| 0.999168 |
1701.03573
|
Markus Giftthaler
|
Markus Giftthaler, Timothy Sandy, Kathrin D\"orfler, Ian Brooks, Mark
Buckingham, Gonzalo Rey, Matthias Kohler, Fabio Gramazio and Jonas Buchli
|
Mobile Robotic Fabrication at 1:1 scale: the In situ Fabricator
| null | null |
10.1007/s41693-017-0003-5
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the concept of an In situ Fabricator, a mobile robot
intended for on-site manufacturing, assembly and digital fabrication. We
present an overview of a prototype system, its capabilities, and highlight the
importance of high-performance control, estimation and planning algorithms for
achieving desired construction goals. Next, we detail on two architectural
application scenarios: first, building a full-size undulating brick wall, which
required a number of repositioning and autonomous localisation manoeuvres.
Second, the Mesh Mould concrete process, which shows that an In situ Fabricator
in combination with an innovative digital fabrication tool can be used to
enable completely novel building technologies. Subsequently, important
limitations and disadvantages of our approach are discussed. Based on that, we
identify the need for a new type of robotic actuator, which facilitates the
design of novel full-scale construction robots. We provide brief insight into
the development of this actuator and conclude the paper with an outlook on the
next-generation In situ Fabricator, which is currently under development.
|
[
{
"version": "v1",
"created": "Fri, 13 Jan 2017 07:04:23 GMT"
}
] | 2017-06-16T00:00:00 |
[
[
"Giftthaler",
"Markus",
""
],
[
"Sandy",
"Timothy",
""
],
[
"Dörfler",
"Kathrin",
""
],
[
"Brooks",
"Ian",
""
],
[
"Buckingham",
"Mark",
""
],
[
"Rey",
"Gonzalo",
""
],
[
"Kohler",
"Matthias",
""
],
[
"Gramazio",
"Fabio",
""
],
[
"Buchli",
"Jonas",
""
]
] |
new_dataset
| 0.999825 |
1706.03038
|
Mohammadamin Barekatain
|
Mohammadamin Barekatain, Miquel Mart\'i, Hsueh-Fu Shih, Samuel Murray,
Kotaro Nakayama, Yutaka Matsuo and Helmut Prendinger
|
Okutama-Action: An Aerial View Video Dataset for Concurrent Human Action
Detection
|
Computer Vision and Pattern Recognition Workshops (CVPRW), Hawaii,
USA, 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Despite significant progress in the development of human action detection
datasets and algorithms, no current dataset is representative of real-world
aerial view scenarios. We present Okutama-Action, a new video dataset for
aerial view concurrent human action detection. It consists of 43 minute-long
fully-annotated sequences with 12 action classes. Okutama-Action features many
challenges missing in current datasets, including dynamic transition of
actions, significant changes in scale and aspect ratio, abrupt camera movement,
as well as multi-labeled actors. As a result, our dataset is more challenging
than existing ones, and will help push the field forward to enable real-world
applications.
|
[
{
"version": "v1",
"created": "Fri, 9 Jun 2017 16:54:51 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jun 2017 16:04:01 GMT"
}
] | 2017-06-16T00:00:00 |
[
[
"Barekatain",
"Mohammadamin",
""
],
[
"Martí",
"Miquel",
""
],
[
"Shih",
"Hsueh-Fu",
""
],
[
"Murray",
"Samuel",
""
],
[
"Nakayama",
"Kotaro",
""
],
[
"Matsuo",
"Yutaka",
""
],
[
"Prendinger",
"Helmut",
""
]
] |
new_dataset
| 0.999849 |
1706.04870
|
Ashraf Darwish
|
Ayat Taha, Ashraf Darwish, and Aboul Ella Hassanien
|
Arabian Horse Identification Benchmark Dataset
| null | null | null | null |
cs.CV
|
http://creativecommons.org/publicdomain/zero/1.0/
|
The lack of a standard muzzle print database is a challenge for conducting
researches in Arabian horse identification systems. Therefore, collecting a
muzzle print images database is a crucial decision. The dataset presented in
this paper is an option for the studies that need a dataset for testing and
comparing the algorithms under development for Arabian horse identification.
Our collected dataset consists of 300 color images that were collected from 50
Arabian horse muzzle species. This dataset has been collected from 50 Arabian
horses with 6 muzzle print images each. A special care has been given to the
quality of the collected images. The collected images cover different quality
levels and degradation factors such as image rotation and image partiality for
simulating real time identification operations. This dataset can be used to
test the identification of Arabian horse system including the extracted
features and the selected classifier.
|
[
{
"version": "v1",
"created": "Thu, 15 Jun 2017 13:58:02 GMT"
}
] | 2017-06-16T00:00:00 |
[
[
"Taha",
"Ayat",
""
],
[
"Darwish",
"Ashraf",
""
],
[
"Hassanien",
"Aboul Ella",
""
]
] |
new_dataset
| 0.999878 |
1512.04280
|
Liang Lu
|
Liang Lu and Steve Renals
|
Small-footprint Deep Neural Networks with Highway Connections for Speech
Recognition
|
5 pages, 3 figures, fixed typo, accepted by Interspeech 2016
| null | null | null |
cs.CL cs.LG cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For speech recognition, deep neural networks (DNNs) have significantly
improved the recognition accuracy in most of benchmark datasets and application
domains. However, compared to the conventional Gaussian mixture models,
DNN-based acoustic models usually have much larger number of model parameters,
making it challenging for their applications in resource constrained platforms,
e.g., mobile devices. In this paper, we study the application of the recently
proposed highway network to train small-footprint DNNs, which are {\it thinner}
and {\it deeper}, and have significantly smaller number of model parameters
compared to conventional DNNs. We investigated this approach on the AMI meeting
speech transcription corpus which has around 70 hours of audio data. The
highway neural networks constantly outperformed their plain DNN counterparts,
and the number of model parameters can be reduced significantly without
sacrificing the recognition accuracy.
|
[
{
"version": "v1",
"created": "Mon, 14 Dec 2015 12:29:32 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Mar 2016 12:14:06 GMT"
},
{
"version": "v3",
"created": "Mon, 20 Jun 2016 10:30:54 GMT"
},
{
"version": "v4",
"created": "Wed, 14 Jun 2017 15:17:27 GMT"
}
] | 2017-06-15T00:00:00 |
[
[
"Lu",
"Liang",
""
],
[
"Renals",
"Steve",
""
]
] |
new_dataset
| 0.965439 |
1610.01630
|
Georgie Knight Dr
|
Georgie Knight, Alexander P. Kartun-Giles, Orestis Georgiou, Carl P.
Dettmann
|
Counting Geodesic Paths in 1D VANETs
|
11 pages, 5 figures
|
IEEE Wireless Communications Letters 6 (2017): 110-113
|
10.1109/LWC.2016.2635135
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the IEEE 802.11p standard addressing vehicular communications, Basic
Safety Messages (BSMs) can be bundled together and relayed as to increase the
effective communication range of transmitting vehicles. This process forms a
vehicular ad hoc network (VANET) for the dissemination of safety information.
The number of "shortest multihop paths" (or geodesics) connecting two network
nodes is an important statistic which can be used to enhance throughput,
validate threat events, protect against collusion attacks, infer location
information, and also limit redundant broadcasts thus reducing interference. To
this end, we analytically calculate for the first time the mean and variance of
the number of geodesics in 1D VANETs.
|
[
{
"version": "v1",
"created": "Mon, 12 Sep 2016 09:29:44 GMT"
}
] | 2017-06-15T00:00:00 |
[
[
"Knight",
"Georgie",
""
],
[
"Kartun-Giles",
"Alexander P.",
""
],
[
"Georgiou",
"Orestis",
""
],
[
"Dettmann",
"Carl P.",
""
]
] |
new_dataset
| 0.994655 |
1706.02735
|
Alfredo Canziani
|
Alfredo Canziani, Eugenio Culurciello
|
CortexNet: a Generic Network Family for Robust Visual Temporal
Representations
|
8 pages, 4 figures. Edit: 4.2 - define n = t - 1; fix grammar/meaning
in last sentence. 5.2 - add Open Images data set ref
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the past five years we have observed the rise of incredibly well
performing feed-forward neural networks trained supervisedly for vision related
tasks. These models have achieved super-human performance on object
recognition, localisation, and detection in still images. However, there is a
need to identify the best strategy to employ these networks with temporal
visual inputs and obtain a robust and stable representation of video data.
Inspired by the human visual system, we propose a deep neural network family,
CortexNet, which features not only bottom-up feed-forward connections, but also
it models the abundant top-down feedback and lateral connections, which are
present in our visual cortex. We introduce two training schemes - the
unsupervised MatchNet and weakly supervised TempoNet modes - where a network
learns how to correctly anticipate a subsequent frame in a video clip or the
identity of its predominant subject, by learning egomotion clues and how to
automatically track several objects in the current scene. Find the project
website at https://engineering.purdue.edu/elab/CortexNet/.
|
[
{
"version": "v1",
"created": "Thu, 8 Jun 2017 19:17:52 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jun 2017 17:53:32 GMT"
}
] | 2017-06-15T00:00:00 |
[
[
"Canziani",
"Alfredo",
""
],
[
"Culurciello",
"Eugenio",
""
]
] |
new_dataset
| 0.954378 |
1706.04285
|
Chenxing Xia
|
Chenxing Xia and Hanling Zhang and Xiuju Gao
|
Saliency detection by aggregating complementary background template with
optimization framework
|
28 pages,10 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes an unsupervised bottom-up saliency detection approach by
aggregating complementary background template with refinement. Feature vectors
are extracted from each superpixel to cover regional color, contrast and
texture information. By using these features, a coarse detection for salient
region is realized based on background template achieved by different
combinations of boundary regions instead of only treating four boundaries as
background. Then, by ranking the relevance of the image nodes with foreground
cues extracted from the former saliency map, we obtain an improved result.
Finally, smoothing operation is utilized to refine the foreground-based
saliency map to improve the contrast between salient and non-salient regions
until a close to binary saliency map is reached. Experimental results show that
the proposed algorithm generates more accurate saliency maps and performs
favorably against the state-off-the-art saliency detection methods on four
publicly available datasets.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2017 00:06:02 GMT"
}
] | 2017-06-15T00:00:00 |
[
[
"Xia",
"Chenxing",
""
],
[
"Zhang",
"Hanling",
""
],
[
"Gao",
"Xiuju",
""
]
] |
new_dataset
| 0.99529 |
1706.04353
|
Alexey Abramov
|
Alexey Abramov, Christopher Bayer, Claudio Heller, Claudia Loy
|
Multi-Lane Perception Using Feature Fusion Based on GraphSLAM
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An extensive, precise and robust recognition and modeling of the environment
is a key factor for next generations of Advanced Driver Assistance Systems and
development of autonomous vehicles. In this paper, a real-time approach for the
perception of multiple lanes on highways is proposed. Lane markings detected by
camera systems and observations of other traffic participants provide the input
data for the algorithm. The information is accumulated and fused using
GraphSLAM and the result constitutes the basis for a multilane clothoid model.
To allow incorporation of additional information sources, input data is
processed in a generic format. Evaluation of the method is performed by
comparing real data, collected with an experimental vehicle on highways, to a
ground truth map. The results show that ego and adjacent lanes are robustly
detected with high quality up to a distance of 120 m. In comparison to serial
lane detection, an increase in the detection range of the ego lane and a
continuous perception of neighboring lanes is achieved. The method can
potentially be utilized for the longitudinal and lateral control of
self-driving vehicles.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2017 08:17:03 GMT"
}
] | 2017-06-15T00:00:00 |
[
[
"Abramov",
"Alexey",
""
],
[
"Bayer",
"Christopher",
""
],
[
"Heller",
"Claudio",
""
],
[
"Loy",
"Claudia",
""
]
] |
new_dataset
| 0.96059 |
1706.04524
|
Julia Kiseleva
|
Julia Kiseleva and Maarten de Rijke
|
Evaluating Personal Assistants on Mobile devices
| null | null | null | null |
cs.HC cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The iPhone was introduced only a decade ago in 2007 but has fundamentally
changed the way we interact with online information. Mobile devices differ
radically from classic command-based and point-and-click user interfaces, now
allowing for gesture-based interaction using fine-grained touch and swipe
signals. Due to the rapid growth in the use of voice-controlled intelligent
personal assistants on mobile devices, such as Microsoft's Cortana, Google Now,
and Apple's Siri, mobile devices have become personal, allowing us to be online
all the time, and assist us in any task, both in work and in our daily lives,
making context a crucial factor to consider.
Mobile usage is now exceeding desktop usage, and is still growing at a rapid
rate, yet our main ways of training and evaluating personal assistants are
still based on (and framed in) classical desktop interactions, focusing on
explicit queries, clicks, and dwell time spent. However, modern user
interaction with mobile devices is radically different due to touch screens
with a gesture- and voice-based control and the varying context of use, e.g.,
in a car, by bike, often invalidating the assumptions underlying today's user
satisfaction evaluation.
There is an urgent need to understand voice- and gesture-based interaction,
taking all interaction signals and context into account in appropriate ways. We
propose a research agenda for developing methods to evaluate and improve
context-aware user satisfaction with mobile interactions using gesture-based
signals at scale.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2017 14:57:18 GMT"
}
] | 2017-06-15T00:00:00 |
[
[
"Kiseleva",
"Julia",
""
],
[
"de Rijke",
"Maarten",
""
]
] |
new_dataset
| 0.986059 |
1706.04549
|
James Peters Ph.D.
|
M.Z. Ahmad, J.F. Peters
|
Delta Complexes in Digital Images. Approximating Image Object Shapes
|
20 pages, 12 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a computational topology of digital images, simplexes are replaced by
Delta sets in approximating image object shapes. For simplicity, simplexes and
Delta sets are restricted to the Euclidean plane. A planar simplex is either a
vertex, a line segment or a filled triangle. In this study of image shapes, a
planar Delta set is a sequence of ordered simplicial complexes. The basic
approach is to approximate an image shape by decomposing an image region
containing the shape into combinations of Delta sets called Delta complexes.
This approach to image shapes is motivated by the ease with which shapes
covered by Delta complexes can be measured and compared. A number of basic
results directly related to shape analysis are also given in the context of
Delta complex proximities.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2017 15:49:17 GMT"
}
] | 2017-06-15T00:00:00 |
[
[
"Ahmad",
"M. Z.",
""
],
[
"Peters",
"J. F.",
""
]
] |
new_dataset
| 0.996297 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.