id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1705.10698
Mark Marsden
Mark Marsden, Kevin McGuinness, Suzanne Little, Noel E. O'Connor
ResnetCrowd: A Residual Deep Learning Architecture for Crowd Counting, Violent Behaviour Detection and Crowd Density Level Classification
7 Pages, AVSS 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose ResnetCrowd, a deep residual architecture for simultaneous crowd counting, violent behaviour detection and crowd density level classification. To train and evaluate the proposed multi-objective technique, a new 100 image dataset referred to as Multi Task Crowd is constructed. This new dataset is the first computer vision dataset fully annotated for crowd counting, violent behaviour detection and density level classification. Our experiments show that a multi-task approach boosts individual task performance for all tasks and most notably for violent behaviour detection which receives a 9\% boost in ROC curve AUC (Area under the curve). The trained ResnetCrowd model is also evaluated on several additional benchmarks highlighting the superior generalisation of crowd analysis models trained for multiple objectives.
[ { "version": "v1", "created": "Tue, 30 May 2017 15:18:41 GMT" } ]
2017-05-31T00:00:00
[ [ "Marsden", "Mark", "" ], [ "McGuinness", "Kevin", "" ], [ "Little", "Suzanne", "" ], [ "O'Connor", "Noel E.", "" ] ]
new_dataset
0.999134
1705.10754
Francisco Rangel
Francisco Rangel and Marc Franco-Salvador and Paolo Rosso
A Low Dimensionality Representation for Language Variety Identification
null
CICLing - Computational Linguistics and Intelligent Text Processing, 2016
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Language variety identification aims at labelling texts in a native language (e.g. Spanish, Portuguese, English) with its specific variation (e.g. Argentina, Chile, Mexico, Peru, Spain; Brazil, Portugal; UK, US). In this work we propose a low dimensionality representation (LDR) to address this task with five different varieties of Spanish: Argentina, Chile, Mexico, Peru and Spain. We compare our LDR method with common state-of-the-art representations and show an increase in accuracy of ~35%. Furthermore, we compare LDR with two reference distributed representation models. Experimental results show competitive performance while dramatically reducing the dimensionality --and increasing the big data suitability-- to only 6 features per variety. Additionally, we analyse the behaviour of the employed machine learning algorithms and the most discriminating features. Finally, we employ an alternative dataset to test the robustness of our low dimensionality representation with another set of similar languages.
[ { "version": "v1", "created": "Tue, 30 May 2017 17:07:45 GMT" } ]
2017-05-31T00:00:00
[ [ "Rangel", "Francisco", "" ], [ "Franco-Salvador", "Marc", "" ], [ "Rosso", "Paolo", "" ] ]
new_dataset
0.975655
1605.05716
Sven Puchinger
Sven Puchinger and Sebastian Stern and Martin Bossert and Robert F. H. Fischer
Space-Time Codes Based on Rank-Metric Codes and Their Decoding
6 pages, IEEE International Symposium on Wireless Communication Systems 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new class of space-time block codes based on finite-field rank-metric codes in combination with a rank-metric-preserving mapping to the set of Eisenstein integers. It is shown that these codes achieve maximum diversity order and improve upon certain existing constructions. Moreover, we present a new decoding algorithm for these codes which utilizes the algebraic structure of the underlying finite-field rank-metric codes and employs lattice-reduction-aided equalization. This decoder does not achieve the same performance as the classical maximum-likelihood decoding methods, but has polynomial complexity in the matrix dimension, making it usable for large field sizes and numbers of antennas.
[ { "version": "v1", "created": "Wed, 18 May 2016 19:38:01 GMT" }, { "version": "v2", "created": "Thu, 15 Sep 2016 07:52:21 GMT" }, { "version": "v3", "created": "Mon, 29 May 2017 16:48:55 GMT" } ]
2017-05-30T00:00:00
[ [ "Puchinger", "Sven", "" ], [ "Stern", "Sebastian", "" ], [ "Bossert", "Martin", "" ], [ "Fischer", "Robert F. H.", "" ] ]
new_dataset
0.998196
1605.07648
Michael Maire
Gustav Larsson, Michael Maire, Gregory Shakhnarovich
FractalNet: Ultra-Deep Neural Networks without Residuals
updated with ImageNet results; published as a conference paper at ICLR 2017; project page at http://people.cs.uchicago.edu/~larsson/fractalnet/
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a design strategy for neural network macro-architecture based on self-similarity. Repeated application of a simple expansion rule generates deep networks whose structural layouts are precisely truncated fractals. These networks contain interacting subpaths of different lengths, but do not include any pass-through or residual connections; every internal signal is transformed by a filter and nonlinearity before being seen by subsequent layers. In experiments, fractal networks match the excellent performance of standard residual networks on both CIFAR and ImageNet classification tasks, thereby demonstrating that residual representations may not be fundamental to the success of extremely deep convolutional neural networks. Rather, the key may be the ability to transition, during training, from effectively shallow to deep. We note similarities with student-teacher behavior and develop drop-path, a natural extension of dropout, to regularize co-adaptation of subpaths in fractal architectures. Such regularization allows extraction of high-performance fixed-depth subnetworks. Additionally, fractal networks exhibit an anytime property: shallow subnetworks provide a quick answer, while deeper subnetworks, with higher latency, provide a more accurate answer.
[ { "version": "v1", "created": "Tue, 24 May 2016 20:28:53 GMT" }, { "version": "v2", "created": "Tue, 8 Nov 2016 17:34:04 GMT" }, { "version": "v3", "created": "Fri, 24 Feb 2017 21:37:25 GMT" }, { "version": "v4", "created": "Fri, 26 May 2017 18:53:56 GMT" } ]
2017-05-30T00:00:00
[ [ "Larsson", "Gustav", "" ], [ "Maire", "Michael", "" ], [ "Shakhnarovich", "Gregory", "" ] ]
new_dataset
0.990319
1609.04745
Jingjin Yu
Jingjin Yu and Shuai D Han and Wei N Tang and Daniela Rus
A Portable, 3D-Printing Enabled Multi-Vehicle Platform for Robotics Research and Education
Updated author list and paper
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
microMVP is an affordable, portable, and open source micro-scale mobile robot platform designed for robotics research and education. As a complete and unique multi-vehicle platform enabled by 3D printing and the maker culture, microMVP can be easily reproduced and requires little maintenance: a set of six micro vehicles, each measuring $8\times 5\times 6$ cubic centimeters and weighing under $100$ grams, and the accompanying tracking platform can be fully assembled in under two hours, all from readily available components. In this paper, we describe microMVP's hardware and software architecture, and the design thoughts that go into the making of the platform. The capabilities of microMVP APIs are then demonstrated with several single- and multi-robot path and motion planning algorithms. microMVP supports all common operation systems.
[ { "version": "v1", "created": "Thu, 15 Sep 2016 17:29:49 GMT" }, { "version": "v2", "created": "Mon, 29 May 2017 14:39:26 GMT" } ]
2017-05-30T00:00:00
[ [ "Yu", "Jingjin", "" ], [ "Han", "Shuai D", "" ], [ "Tang", "Wei N", "" ], [ "Rus", "Daniela", "" ] ]
new_dataset
0.999154
1610.01495
Francesco Romano
Francesco Romano and Daniele Pucci and Silvio Traversaro and Francesco Nori
The Static Center of Pressure Sensitivity: a further Criterion to assess Contact Stability and Balancing Controllers
null
null
null
null
cs.RO math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Legged locomotion has received increasing attention from the robotics community. In this respect, contact stability plays a critical role in ensuring that robots maintain balance, and it is a key element for balancing and walking controllers. The Center of Pressure is a contact stability criterion that defines a point that must be kept strictly inside the support polygon in order to ensure postural stability. In this paper, we introduce the concept of the sensitivity of the static center of pressure: roughly speaking, the rate of change of the center of pressure with respect to the system equilibrium configurations. This new concept can be used as an additional criterion to assess the robustness of the contact stability. We show how the sensitivity of the center of pressure can also be used as a metric to assess balancing controllers by considering two state-of-the-art control strategies. The analytical analysis is performed on a simplified model, and validated during balancing tasks on the iCub humanoid robot.
[ { "version": "v1", "created": "Wed, 5 Oct 2016 16:02:24 GMT" }, { "version": "v2", "created": "Mon, 29 May 2017 07:05:55 GMT" } ]
2017-05-30T00:00:00
[ [ "Romano", "Francesco", "" ], [ "Pucci", "Daniele", "" ], [ "Traversaro", "Silvio", "" ], [ "Nori", "Francesco", "" ] ]
new_dataset
0.99945
1703.05121
Stephan Merz
Leslie Lamport, Stephan Merz (VERIDIS)
Auxiliary Variables in TLA+
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Auxiliary variables are often needed for verifying that an implementation is correct with respect to a higher-level specification. They augment the formal description of the implementation without changing its semantics--that is, the set of behaviors that it describes. This paper explains rules for adding history, prophecy, and stuttering variables to TLA+ specifications, ensuring that the augmented specification is equivalent to the original one. The rules are explained with toy examples, and they are used to verify the correctness of a simplified version of a snapshot algorithm due to Afek et al.
[ { "version": "v1", "created": "Wed, 15 Mar 2017 12:29:06 GMT" }, { "version": "v2", "created": "Mon, 29 May 2017 07:14:27 GMT" } ]
2017-05-30T00:00:00
[ [ "Lamport", "Leslie", "", "VERIDIS" ], [ "Merz", "Stephan", "", "VERIDIS" ] ]
new_dataset
0.986998
1704.07996
Xiaomin Wu
Feng Shu, Xiaomin Wu, Jinsong Hu, Riqing Chen, and Jiangzhou Wang
Secure Precise Wireless Transmission with Random-Subcarrier-Selection-based Directional Modulation Transmit Antenna Array
14 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a practical wireless transmission scheme is proposed to transmit confidential messages to the desired user securely and precisely by the joint use of multiple techniques including artificial noise (AN) projection, phase alignment (PA)/beamforming, and random subcarrier selection (RSCS) based on OFDM, and directional modulation (DM), namely RSCS-OFDM-DM. This RSCS-OFDM-DM scheme provides an extremely low-complexity structures for the transmitter and desired receiver and makes the secure and precise wireless transmission realizable in practice. For illegal eavesdroppers, the receive power of confidential messages is so weak that their receivers cannot intercept these confidential messages successfully once it is corrupted by AN. In such a scheme, the design of phase alignment/beamforming vector and AN projection matrix depend intimately on the desired direction angle and distance. It is particularly noted that the use of RSCS leads to a significant outcome that the receive power of confidential messages mainly concentrates on the small neighboring region around the desired receiver and only small fraction of its power leaks out to the remaining large broad regions. This concept is called secure precise transmission. The probability density function of real-time receive signal-to-interference-and-noise ratio (SINR) is derived. Also, the average SINR and its tight upper bound are attained. The approximate closed-form expression for average secrecy rate is derived by analyzing the first-null positions of SINR and clarifying the wiretap region.
[ { "version": "v1", "created": "Wed, 26 Apr 2017 07:43:43 GMT" }, { "version": "v2", "created": "Sat, 27 May 2017 05:28:03 GMT" } ]
2017-05-30T00:00:00
[ [ "Shu", "Feng", "" ], [ "Wu", "Xiaomin", "" ], [ "Hu", "Jinsong", "" ], [ "Chen", "Riqing", "" ], [ "Wang", "Jiangzhou", "" ] ]
new_dataset
0.995687
1705.01921
Liliang Ren
Liliang Ren
Recurrent Soft Attention Model for Common Object Recognition
5 pages, 4 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose the Recurrent Soft Attention Model, which integrates the visual attention from the original image to a LSTM memory cell through a down-sample network. The model recurrently transmits visual attention to the memory cells for glimpse mask generation, which is a more natural way for attention integration and exploitation in general object detection and recognition problem. We test our model under the metric of the top-1 accuracy on the CIFAR-10 dataset. The experiment shows that our down-sample network and feedback mechanism plays an effective role among the whole network structure.
[ { "version": "v1", "created": "Thu, 4 May 2017 17:27:42 GMT" }, { "version": "v2", "created": "Mon, 29 May 2017 07:02:52 GMT" } ]
2017-05-30T00:00:00
[ [ "Ren", "Liliang", "" ] ]
new_dataset
0.988366
1705.02417
Tommaso Gagliardoni
Tommaso Gagliardoni
Quantum Security of Cryptographic Primitives
PhD Thesis. This document is an electronic version with minor modifications of the original, published through the E-Publishing-Service of the TU Darmstadt
null
null
null
cs.CR cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, such as quantum key distribution). In this work, we propose the first systematic classification of quantum security scenarios, and for each of them we recall the main tools and results, as well as presenting new ones. We achieve this goal by identifying four distinct quantum security classes, or domains, each of them encompassing the security notions and constructions related to a particular scenario. We start with the class QS0, which is `classical cryptography' (meaning that no quantum scenario is considered). Regarding post-quantum cryptography, we introduce the class QS1, where we discuss in detail the problems arising when designing a classical cryptographic object meant to be resistant against adversaries with local quantum computing power, and we provide a classification of the possible quantum security reductions in this scenario when considering provable security. In respect to hybrid classical-quantum models, in the security class QS2 we discuss in detail the possible scenarios where these scenarios arise, and what a correct formalization should be in terms of quantum oracle access. Finally, in the class QS3 we consider all those cryptographic constructions designed to run natively on quantum hardware. We believe that the framework we introduce in this work will be a valuable tool for the scientific community in addressing the challenges arising when formalizing sound constructions and notions of security in the quantum world.
[ { "version": "v1", "created": "Fri, 5 May 2017 23:21:31 GMT" } ]
2017-05-30T00:00:00
[ [ "Gagliardoni", "Tommaso", "" ] ]
new_dataset
0.998597
1705.09665
Cristian Danescu-Niculescu-Mizil
Justine Zhang and William L. Hamilton and Cristian Danescu-Niculescu-Mizil and Dan Jurafsky and Jure Leskovec
Community Identity and User Engagement in a Multi-Community Landscape
10 page, 3 figures, To appear in the Proceedings of the 11th International Conference On Web And Social Media, ICWSM 2017; this version has subtle differences with the proceedings version, including an introductory quote
null
null
null
cs.SI cs.CL cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A community's identity defines and shapes its internal dynamics. Our current understanding of this interplay is mostly limited to glimpses gathered from isolated studies of individual communities. In this work we provide a systematic exploration of the nature of this relation across a wide variety of online communities. To this end we introduce a quantitative, language-based typology reflecting two key aspects of a community's identity: how distinctive, and how temporally dynamic it is. By mapping almost 300 Reddit communities into the landscape induced by this typology, we reveal regularities in how patterns of user engagement vary with the characteristics of a community. Our results suggest that the way new and existing users engage with a community depends strongly and systematically on the nature of the collective identity it fosters, in ways that are highly consequential to community maintainers. For example, communities with distinctive and highly dynamic identities are more likely to retain their users. However, such niche communities also exhibit much larger acculturation gaps between existing users and newcomers, which potentially hinder the integration of the latter. More generally, our methodology reveals differences in how various social phenomena manifest across communities, and shows that structuring the multi-community landscape can lead to a better understanding of the systematic nature of this diversity.
[ { "version": "v1", "created": "Fri, 26 May 2017 18:00:02 GMT" } ]
2017-05-30T00:00:00
[ [ "Zhang", "Justine", "" ], [ "Hamilton", "William L.", "" ], [ "Danescu-Niculescu-Mizil", "Cristian", "" ], [ "Jurafsky", "Dan", "" ], [ "Leskovec", "Jure", "" ] ]
new_dataset
0.96109
1705.09701
Keith Smith
Peter Macko, Xiongzi Ge, John Haskins Jr., James Kelley, David Slik, Keith A. Smith, Maxim G. Smith
SMORE: A Cold Data Object Store for SMR Drives (Extended Version)
13 pages, 8 figures, full version of 6 page paper published at MSST 2017
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Shingled magnetic recording (SMR) increases the capacity of magnetic hard drives, but it requires that each zone of a disk be written sequentially and erased in bulk. This makes SMR a good fit for workloads dominated by large data objects with limited churn. To explore this possibility, we have developed SMORE, an object storage system designed to reliably and efficiently store large, seldom-changing data objects on an array of host-managed or host-aware SMR disks. SMORE uses a log-structured approach to accommodate the constraint that all writes to an SMR drive must be sequential within large shingled zones. It stripes data across zones on separate disks, using erasure coding to protect against drive failure. A separate garbage collection thread reclaims space by migrating live data out of the emptiest zones so that they can be trimmed and reused. An index stored on flash and backed up to the SMR drives maps object identifiers to on-disk locations. SMORE interleaves log records with object data within SMR zones to enable index recovery after a system crash (or failure of the flash device) without any additional logging mechanism. SMORE achieves full disk bandwidth when ingesting data---with a variety of object sizes---and when reading large objects. Read performance declines for smaller object sizes where inter- object seek time dominates. With a worst-case pattern of random deletions, SMORE has a write amplification (not counting RAID parity) of less than 2.0 at 80% occupancy. By taking an index snapshot every two hours, SMORE recovers from crashes in less than a minute. More frequent snapshots allow faster recovery.
[ { "version": "v1", "created": "Fri, 26 May 2017 20:03:18 GMT" } ]
2017-05-30T00:00:00
[ [ "Macko", "Peter", "" ], [ "Ge", "Xiongzi", "" ], [ "Haskins", "John", "Jr." ], [ "Kelley", "James", "" ], [ "Slik", "David", "" ], [ "Smith", "Keith A.", "" ], [ "Smith", "Maxim G.", "" ] ]
new_dataset
0.993133
1705.09751
Ying Chen
Ying Chen, Rongpeng Li, Zhifeng Zhao, and Honggang Zhang
On the Capacity of Fractal Wireless Networks With Direct Social Interactions
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/4.0/
The capacity of a fractal wireless network with direct social interactions is studied in this paper. Specifically, we mathematically formulate the self-similarity of a fractal wireless network by a power-law degree distribution $ P(k) $, and we capture the connection feature between two nodes with degree $ k_{1} $ and $ k_{2} $ by a joint probability distribution $ P(k_{1},k_{2}) $. It is proved that if the source node communicates with one of its direct contacts randomly, the maximum capacity is consistent with the classical result $ \Theta\left(\frac{1}{\sqrt{n\log n}}\right) $ achieved by Kumar \cite{Gupta2000The}. On the other hand, if the two nodes with distance $ d $ communicate according to the probability $ d^{-\beta} $, the maximum capacity can reach up to $ \Theta\left(\frac{1}{\log n}\right) $, which exhibits remarkable improvement compared with the well-known result in \cite{Gupta2000The}.
[ { "version": "v1", "created": "Sat, 27 May 2017 01:33:30 GMT" } ]
2017-05-30T00:00:00
[ [ "Chen", "Ying", "" ], [ "Li", "Rongpeng", "" ], [ "Zhao", "Zhifeng", "" ], [ "Zhang", "Honggang", "" ] ]
new_dataset
0.997195
1705.09770
Hazim Shakhatreh
Hazim Shakhatreh, Abdallah Khreishah, and Bo Ji
Providing Wireless Coverage to High-rise Buildings Using UAVs
6 pages, 5 figures
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
Unmanned aerial vehicles (UAVs) can be used as aerial wireless base stations when cellular networks go down. Prior studies on UAV-based wireless coverage typically consider an Air-to-Ground path loss model, which assumes that the users are outdoor and they are located on a 2D plane. In this paper, we propose using a single UAV to provide wireless coverage for indoor users inside a high-rise building under disaster situations (such as earthquakes or floods), when cellular networks are down. First, we present a realistic Outdoor-Indoor path loss model and describe the tradeoff introduced by this model. Then, we study the problem of efficient UAV placement, where the objective is to minimize the total transmit power required to cover the entire high-rise building. The formulated problem is non-convex and is generally difficult to solve. To that end, we consider two cases of practical interest and provide the efficient solutions to the formulated problem under these cases. In the first case, we aim to find the minimum transmit power such that an indoor user with the maximum path loss can be covered. In the second case, we assume that the locations of indoor users are symmetric across the dimensions of each floor.
[ { "version": "v1", "created": "Sat, 27 May 2017 05:56:52 GMT" } ]
2017-05-30T00:00:00
[ [ "Shakhatreh", "Hazim", "" ], [ "Khreishah", "Abdallah", "" ], [ "Ji", "Bo", "" ] ]
new_dataset
0.99468
1705.09785
Ankit Dhall
Ankit Dhall, Kunal Chelani, Vishnu Radhakrishnan, K.M. Krishna
LiDAR-Camera Calibration using 3D-3D Point correspondences
null
null
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advent of autonomous vehicles, LiDAR and cameras have become an indispensable combination of sensors. They both provide rich and complementary data which can be used by various algorithms and machine learning to sense and make vital inferences about the surroundings. We propose a novel pipeline and experimental setup to find accurate rigid-body transformation for extrinsically calibrating a LiDAR and a camera. The pipeling uses 3D-3D point correspondences in LiDAR and camera frame and gives a closed form solution. We further show the accuracy of the estimate by fusing point clouds from two stereo cameras which align perfectly with the rotation and translation estimated by our method, confirming the accuracy of our method's estimates both mathematically and visually. Taking our idea of extrinsic LiDAR-camera calibration forward, we demonstrate how two cameras with no overlapping field-of-view can also be calibrated extrinsically using 3D point correspondences. The code has been made available as open-source software in the form of a ROS package, more information about which can be sought here: https://github.com/ankitdhall/lidar_camera_calibration .
[ { "version": "v1", "created": "Sat, 27 May 2017 07:57:50 GMT" } ]
2017-05-30T00:00:00
[ [ "Dhall", "Ankit", "" ], [ "Chelani", "Kunal", "" ], [ "Radhakrishnan", "Vishnu", "" ], [ "Krishna", "K. M.", "" ] ]
new_dataset
0.995472
1705.09859
Arti Yardi
Arti Yardi, Ruud Pellikaan
On shortened and punctured cyclic codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of identifying whether the family of cyclic codes is asymptotically good or not is a long-standing open problem in the field of coding theory. It is known in the literature that some families of cyclic codes such as BCH codes and Reed-Solomon codes are asymptotically bad, however in general the answer to this question is not known. A recent result by Nelson and Van Zwam shows that, all linear codes can be obtained by a sequence of puncturing and/or shortening of a collection of asymptotically good codes~\cite{Nelson_2015}. In this paper, we prove that any linear code can be obtained by a sequence of puncturing and/or shortening of some cyclic code. Therefore the result that all codes can be obtained by shortening and/or puncturing cyclic codes leaves the possibility open that cyclic codes are asymptotically good.
[ { "version": "v1", "created": "Sat, 27 May 2017 20:02:41 GMT" } ]
2017-05-30T00:00:00
[ [ "Yardi", "Arti", "" ], [ "Pellikaan", "Ruud", "" ] ]
new_dataset
0.998953
1705.09890
David Zarrouk Prof.
Moshe P. Mann, Lior Damti, David Zarrouk
Minimally Actuated Serial Robot
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel type of serial robot with minimal actuation. The robot is a serial rigid structure consisting of multiple links connected by passive joints and of movable actuators. The novelty of this robot is that the actuators travel over the links to a given joint and adjust the relative angle between the two adjacent links. The joints passively preserve their angles until one of the actuators moves them again. This actuation can be applied to any serial robot with two or more links. This unique configuration enables the robot to undergo the same wide range of motions typically associated with hyper-redundant robots but with much fewer actuators. The robot is modular and its size and geometry can be easily changed. We describe the robot's mechanical design and kinematics in detail and demonstrate its capabilities for obstacle avoidance with some simulated examples. In addition, we show how an experimental robot fitted with a single mobile actuator can maneuver through a confined space to reach its target.
[ { "version": "v1", "created": "Sun, 28 May 2017 05:32:47 GMT" } ]
2017-05-30T00:00:00
[ [ "Mann", "Moshe P.", "" ], [ "Damti", "Lior", "" ], [ "Zarrouk", "David", "" ] ]
new_dataset
0.998628
1705.10116
Dominik Peters
Haris Aziz, Florian Brandl, Felix Brandt, Paul Harrenstein, Martin Olsen, Dominik Peters
Fractional Hedonic Games
25 pages. Journal version following papers at AAMAS-2014 and AAMAS-2015. Includes new NP^NP-hardness result
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The work we present in this paper initiated the formal study of fractional hedonic games, coalition formation games in which the utility of a player is the average value he ascribes to the members of his coalition. Among other settings, this covers situations in which players only distinguish between friends and non-friends and desire to be in a coalition in which the fraction of friends is maximal. Fractional hedonic games thus not only constitute a natural class of succinctly representable coalition formation games, but also provide an interesting framework for network clustering. We propose a number of conditions under which the core of fractional hedonic games is non-empty and provide algorithms for computing a core stable outcome. By contrast, we show that the core may be empty in other cases, and that it is computationally hard in general to decide non-emptiness of the core.
[ { "version": "v1", "created": "Mon, 29 May 2017 11:03:56 GMT" } ]
2017-05-30T00:00:00
[ [ "Aziz", "Haris", "" ], [ "Brandl", "Florian", "" ], [ "Brandt", "Felix", "" ], [ "Harrenstein", "Paul", "" ], [ "Olsen", "Martin", "" ], [ "Peters", "Dominik", "" ] ]
new_dataset
0.995405
1607.01341
Silvio Micali
Jing Chen, Silvio Micali
Algorand
null
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A public ledger is a tamperproof sequence of data that can be read and augmented by everyone. Public ledgers have innumerable and compelling uses. They can secure, in plain sight, all kinds of transactions ---such as titles, sales, and payments--- in the exact order in which they occur. Public ledgers not only curb corruption, but also enable very sophisticated applications ---such as cryptocurrencies and smart contracts. They stand to revolutionize the way a democratic society operates. As currently implemented, however, they scale poorly and cannot achieve their potential. Algorand is a truly democratic and efficient way to implement a public ledger. Unlike prior implementations based on proof of work, it requires a negligible amount of computation, and generates a transaction history that will not "fork" with overwhelmingly high probability. Algorand is based on (a novel and super fast) message-passing Byzantine agreement. For concreteness, we shall describe Algorand only as a money platform.
[ { "version": "v1", "created": "Tue, 5 Jul 2016 17:35:20 GMT" }, { "version": "v2", "created": "Fri, 15 Jul 2016 19:07:36 GMT" }, { "version": "v3", "created": "Mon, 1 Aug 2016 19:29:24 GMT" }, { "version": "v4", "created": "Wed, 24 Aug 2016 12:24:27 GMT" }, { "version": "v5", "created": "Mon, 3 Oct 2016 19:06:07 GMT" }, { "version": "v6", "created": "Fri, 11 Nov 2016 19:43:17 GMT" }, { "version": "v7", "created": "Wed, 16 Nov 2016 21:56:20 GMT" }, { "version": "v8", "created": "Tue, 23 May 2017 16:25:10 GMT" }, { "version": "v9", "created": "Fri, 26 May 2017 13:16:11 GMT" } ]
2017-05-29T00:00:00
[ [ "Chen", "Jing", "" ], [ "Micali", "Silvio", "" ] ]
new_dataset
0.998346
1705.06965
J\'an Vesel\'y
J\'an Vesel\'y, Arkaprava Basu, Abhishek Bhattacharjee, Gabriel Loh, Mark Oskin, Steven K. Reinhardt
GPU System Calls
null
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
GPUs are becoming first-class compute citizens and are being tasked to perform increasingly complex work. Modern GPUs increasingly support programmability- enhancing features such as shared virtual memory and hardware cache coherence, enabling them to run a wider variety of programs. But a key aspect of general-purpose programming where GPUs are still found lacking is the ability to invoke system calls. We explore how to directly invoke generic system calls in GPU programs. We examine how system calls should be meshed with prevailing GPGPU programming models where thousands of threads are organized in a hierarchy of execution groups: Should a system call be invoked at the individual GPU task, or at different execution group levels? What are reasonable ordering semantics for GPU system calls across these hierarchy of execution groups? To study these questions, we implemented GENESYS -- a mechanism to allow GPU pro- grams to invoke system calls in the Linux operating system. Numerous subtle changes to Linux were necessary, as the existing kernel assumes that only CPUs invoke system calls. We analyze the performance of GENESYS using micro-benchmarks and three applications that exercise the filesystem, networking, and memory allocation subsystems of the kernel. We conclude by analyzing the suitability of all of Linux's system calls for the GPU.
[ { "version": "v1", "created": "Fri, 19 May 2017 12:48:50 GMT" }, { "version": "v2", "created": "Wed, 24 May 2017 20:48:00 GMT" } ]
2017-05-29T00:00:00
[ [ "Veselý", "Ján", "" ], [ "Basu", "Arkaprava", "" ], [ "Bhattacharjee", "Abhishek", "" ], [ "Loh", "Gabriel", "" ], [ "Oskin", "Mark", "" ], [ "Reinhardt", "Steven K.", "" ] ]
new_dataset
0.964791
1705.09328
Gabriele Farina
Gabriele Farina and John P. Dickerson and Tuomas Sandholm
Operation Frames and Clubs in Kidney Exchange
Published at IJCAI-17
null
null
null
cs.GT cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A kidney exchange is a centrally-administered barter market where patients swap their willing yet incompatible donors. Modern kidney exchanges use 2-cycles, 3-cycles, and chains initiated by non-directed donors (altruists who are willing to give a kidney to anyone) as the means for swapping. We propose significant generalizations to kidney exchange. We allow more than one donor to donate in exchange for their desired patient receiving a kidney. We also allow for the possibility of a donor willing to donate if any of a number of patients receive kidneys. Furthermore, we combine these notions and generalize them. The generalization is to exchange among organ clubs, where a club is willing to donate organs outside the club if and only if the club receives organs from outside the club according to given specifications. We prove that unlike in the standard model, the uncapped clearing problem is NP-complete. We also present the notion of operation frames that can be used to sequence the operations across batches, and present integer programming formulations for the market clearing problems for these new types of organ exchanges. Experiments show that in the single-donation setting, operation frames improve planning by 34%--51%. Allowing up to two donors to donate in exchange for one kidney donated to their designated patient yields a further increase in social welfare.
[ { "version": "v1", "created": "Thu, 25 May 2017 18:58:58 GMT" } ]
2017-05-29T00:00:00
[ [ "Farina", "Gabriele", "" ], [ "Dickerson", "John P.", "" ], [ "Sandholm", "Tuomas", "" ] ]
new_dataset
0.997054
1705.09366
Erik Saule
Erik Saule, Dinesh Panchananam, Alexander Hohl, Wenwu Tang, Eric Delmelle
Parallel Space-Time Kernel Density Estimation
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The exponential growth of available data has increased the need for interactive exploratory analysis. Dataset can no longer be understood through manual crawling and simple statistics. In Geographical Information Systems (GIS), the dataset is often composed of events localized in space and time; and visualizing such a dataset involves building a map of where the events occurred. We focus in this paper on events that are localized among three dimensions (latitude, longitude, and time), and on computing the first step of the visualization pipeline, space-time kernel density estimation (STKDE), which is most computationally expensive. Starting from a gold standard implementation, we show how algorithm design and engineering, parallel decomposition, and scheduling can be applied to bring near real-time computing to space-time kernel density estimation. We validate our techniques on real world datasets extracted from infectious disease, social media, and ornithology.
[ { "version": "v1", "created": "Thu, 25 May 2017 21:16:37 GMT" } ]
2017-05-29T00:00:00
[ [ "Saule", "Erik", "" ], [ "Panchananam", "Dinesh", "" ], [ "Hohl", "Alexander", "" ], [ "Tang", "Wenwu", "" ], [ "Delmelle", "Eric", "" ] ]
new_dataset
0.998459
1705.09402
Andrew Adamatzky
Andrew Adamatzky
On dynamics of excitation in F-actin: automaton model
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We represent a filamentous actin molecule as a graph of finite-state machines (F-actin automaton). Each node in the graph takes three states --- resting, excited, refractory. All nodes update their states simultaneously and by the same rule, in discrete time steps. Two rules are considered: threshold rule --- a resting node is excited if it has at least one excited neighbour and narrow excitation interval rule --- a resting node is excited if it has exactly one excited neighbour. We analyse distributions of transient periods and lengths of limit cycles in evolution of F-actin automaton, propose mechanisms for formation of limit cycles and evaluate density of information storage in F-actin automata.
[ { "version": "v1", "created": "Fri, 26 May 2017 00:36:28 GMT" } ]
2017-05-29T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.996957
1705.09425
Yao Qin
Yao Qin, Mengyang Feng, Huchuan Lu, Garrison W. Cottrell
Hierarchical Cellular Automata for Visual Saliency
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Saliency detection, finding the most important parts of an image, has become increasingly popular in computer vision. In this paper, we introduce Hierarchical Cellular Automata (HCA) -- a temporally evolving model to intelligently detect salient objects. HCA consists of two main components: Single-layer Cellular Automata (SCA) and Cuboid Cellular Automata (CCA). As an unsupervised propagation mechanism, Single-layer Cellular Automata can exploit the intrinsic relevance of similar regions through interactions with neighbors. Low-level image features as well as high-level semantic information extracted from deep neural networks are incorporated into the SCA to measure the correlation between different image patches. With these hierarchical deep features, an impact factor matrix and a coherence matrix are constructed to balance the influences on each cell's next state. The saliency values of all cells are iteratively updated according to a well-defined update rule. Furthermore, we propose CCA to integrate multiple saliency maps generated by SCA at different scales in a Bayesian framework. Therefore, single-layer propagation and multi-layer integration are jointly modeled in our unified HCA. Surprisingly, we find that the SCA can improve all existing methods that we applied it to, resulting in a similar precision level regardless of the original results. The CCA can act as an efficient pixel-wise aggregation algorithm that can integrate state-of-the-art methods, resulting in even better results. Extensive experiments on four challenging datasets demonstrate that the proposed algorithm outperforms state-of-the-art conventional methods and is competitive with deep learning based approaches.
[ { "version": "v1", "created": "Fri, 26 May 2017 03:43:16 GMT" } ]
2017-05-29T00:00:00
[ [ "Qin", "Yao", "" ], [ "Feng", "Mengyang", "" ], [ "Lu", "Huchuan", "" ], [ "Cottrell", "Garrison W.", "" ] ]
new_dataset
0.995717
1705.09468
Alexander Span
Alexander Span, Vahid Aref, Henning Buelow, Stephan ten Brink
On Time-Bandwidth Product of Multi-Soliton Pulses
Accepted for ISIT 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-soliton pulses are potential candidates for fiber optical transmission where the information is modulated and recovered in the so-called nonlinear Fourier domain. While this is an elegant technique to account for the channel nonlinearity, the obtained spectral efficiency, so far, is not competitive with the classic Nyquist-based schemes. In this paper, we study the evolution of the time-bandwidth product of multi-solitons as they propagate along the optical fiber. For second and third order soliton pulses, we numerically optimize the pulse shapes to achieve the smallest time-bandwidth product when the phase of the spectral amplitudes is used for modulation. Moreover, we analytically estimate the pulse-duration and bandwidth of multi-solitons in some practically important cases. Those estimations enable us to approximate the time-bandwidth product for higher order solitons.
[ { "version": "v1", "created": "Fri, 26 May 2017 08:05:22 GMT" } ]
2017-05-29T00:00:00
[ [ "Span", "Alexander", "" ], [ "Aref", "Vahid", "" ], [ "Buelow", "Henning", "" ], [ "Brink", "Stephan ten", "" ] ]
new_dataset
0.997041
1508.03843
Marko A. Rodriguez
Marko A. Rodriguez
The Gremlin Graph Traversal Machine and Language
To appear in the Proceedings of the 2015 ACM Database Programming Languages Conference
ACM Proceedings of the 15th Symposium on Database Programming Languages, pages 1-10, 2015
10.1145/2815072.2815073
null
cs.DB cs.DM
http://creativecommons.org/publicdomain/zero/1.0/
Gremlin is a graph traversal machine and language designed, developed, and distributed by the Apache TinkerPop project. Gremlin, as a graph traversal machine, is composed of three interacting components: a graph $G$, a traversal $\Psi$, and a set of traversers $T$. The traversers move about the graph according to the instructions specified in the traversal, where the result of the computation is the ultimate locations of all halted traversers. A Gremlin machine can be executed over any supporting graph computing system such as an OLTP graph database and/or an OLAP graph processor. Gremlin, as a graph traversal language, is a functional language implemented in the user's native programming language and is used to define the $\Psi$ of a Gremlin machine. This article provides a mathematical description of Gremlin and details its automaton and functional properties. These properties enable Gremlin to naturally support imperative and declarative querying, host language agnosticism, user-defined domain specific languages, an extensible compiler/optimizer, single- and multi-machine execution models, hybrid depth- and breadth-first evaluation, as well as the existence of a Universal Gremlin Machine and its respective entailments.
[ { "version": "v1", "created": "Sun, 16 Aug 2015 16:30:27 GMT" } ]
2017-05-26T00:00:00
[ [ "Rodriguez", "Marko A.", "" ] ]
new_dataset
0.998511
1705.08923
Tao Zhou
Tao Zhou, Muhao Chen, Jie Yu, Demetri Terzopoulos
Attention-based Natural Language Person Retrieval
CVPR 2017 Workshop (vision meets cognition)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Following the recent progress in image classification and captioning using deep learning, we develop a novel natural language person retrieval system based on an attention mechanism. More specifically, given the description of a person, the goal is to localize the person in an image. To this end, we first construct a benchmark dataset for natural language person retrieval. To do so, we generate bounding boxes for persons in a public image dataset from the segmentation masks, which are then annotated with descriptions and attributes using the Amazon Mechanical Turk. We then adopt a region proposal network in Faster R-CNN as a candidate region generator. The cropped images based on the region proposals as well as the whole images with attention weights are fed into Convolutional Neural Networks for visual feature extraction, while the natural language expression and attributes are input to Bidirectional Long Short- Term Memory (BLSTM) models for text feature extraction. The visual and text features are integrated to score region proposals, and the one with the highest score is retrieved as the output of our system. The experimental results show significant improvement over the state-of-the-art method for generic object retrieval and this line of research promises to benefit search in surveillance video footage.
[ { "version": "v1", "created": "Wed, 24 May 2017 18:36:58 GMT" } ]
2017-05-26T00:00:00
[ [ "Zhou", "Tao", "" ], [ "Chen", "Muhao", "" ], [ "Yu", "Jie", "" ], [ "Terzopoulos", "Demetri", "" ] ]
new_dataset
0.999679
1705.08994
Hassan Jameel Asghar
Hassan Jameel Asghar, Paul Tyler, Mohamed Ali Kaafar
On the Privacy of the Opal Data Release: A Response
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document is a response to a report from the University of Melbourne on the privacy of the Opal dataset release. The Opal dataset was released by Data61 (CSIRO) in conjunction with the Transport for New South Wales (TfNSW). The data consists of two separate weeks of "tap-on/tap-off" data of individuals who used any of the four different modes of public transport from TfNSW: buses, light rail, train and ferries. These taps are recorded through the smart ticketing system, known as Opal, available in the state of New South Wales, Australia.
[ { "version": "v1", "created": "Wed, 24 May 2017 23:11:13 GMT" } ]
2017-05-26T00:00:00
[ [ "Asghar", "Hassan Jameel", "" ], [ "Tyler", "Paul", "" ], [ "Kaafar", "Mohamed Ali", "" ] ]
new_dataset
0.999153
1705.08996
Jekan Thangavelautham
Aaditya Ravindran, Ravi Teja Nallapu, Andrew Warren, Alessandra Babuscia, Jose Vazco and Jekan Thangavelautham
An Experimental Platform for Multi-spacecraft Phase-Array Communications
4 pages, 10 figures, IEEE Cognitive Communications for Aerospace Applications Workshop
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emergence of small satellites and CubeSats for interplanetary exploration will mean hundreds if not thousands of spacecraft exploring every corner of the solar-system. Current methods for communication and tracking of deep space probes use ground based systems such as the Deep Space Network (DSN). However, the increased communication demand will require radically new methods to ease communication congestion. Networks of communication relay satellites located at strategic locations such as geostationary orbit and Lagrange points are potential solutions. Instead of one large communication relay satellite, we could have scores of small satellites that utilize phase arrays to effectively operate as one large satellite. Excess payload capacity on rockets can be used to warehouse more small satellites in the communication network. The advantage of this network is that even if one or a few of the satellites are damaged or destroyed, the network still operates but with degraded performance. The satellite network would operate in a distributed architecture and some satellites maybe dynamically repurposed to split and communicate with multiple targets at once. The potential for this alternate communication architecture is significant, but this requires development of satellite formation flying and networking technologies. Our research has found neural-network control approaches such as the Artificial Neural Tissue can be effectively used to control multirobot/multi-spacecraft systems and can produce human competitive controllers. We have been developing a laboratory experiment platform called Athena to develop critical spacecraft control algorithms and cognitive communication methods. We briefly report on the development of the platform and our plans to gain insight into communication phase arrays for space.
[ { "version": "v1", "created": "Wed, 24 May 2017 23:17:38 GMT" } ]
2017-05-26T00:00:00
[ [ "Ravindran", "Aaditya", "" ], [ "Nallapu", "Ravi Teja", "" ], [ "Warren", "Andrew", "" ], [ "Babuscia", "Alessandra", "" ], [ "Vazco", "Jose", "" ], [ "Thangavelautham", "Jekan", "" ] ]
new_dataset
0.968315
1705.09101
Akshay Jain
Akshay Jain (1), Elena Lopez-Aguilera (1) and Ilker Demirkol (1) ((1) Department of Network Engineering, Universitat Polit\`ecnica de Catalunya, Barcelona, Spain)
Mobility Management as a Service for 5G Networks
Submitted to 14th International Symposium on Wireless Communication Systems
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobility Management (MM) techniques have conventionally been centralized in nature, wherein a single network entity has been responsible for handling the mobility related tasks of the mobile nodes attached to the network. However, an exponential growth in network traffic and the number of users has ushered in the concept of providing Mobility Management as a Service (MMaaS) to the wireless nodes attached to the 5G networks. Allowing for on-demand mobility management solutions will not only provide the network with the flexibility that it needs to accommodate the many different use cases that are to be served by future networks, but it will also provide the network with the scalability that is needed alongside the flexibility to serve future networks. And hence, in this paper, a detailed study of MMaaS has been provided, highlighting its benefits and challenges for 5G networks. Additionally, the very important property of granularity of service which is deeply intertwined with the scalability and flexibility requirements of the future wireless networks, and a consequence of MMaaS, has also been discussed in detail.
[ { "version": "v1", "created": "Thu, 25 May 2017 09:21:14 GMT" } ]
2017-05-26T00:00:00
[ [ "Jain", "Akshay", "" ], [ "Lopez-Aguilera", "Elena", "" ], [ "Demirkol", "Ilker", "" ] ]
new_dataset
0.951027
1703.03386
Cristian Danescu-Niculescu-Mizil
William L. Hamilton, Justine Zhang, Cristian Danescu-Niculescu-Mizil, Dan Jurafsky, Jure Leskovec
Loyalty in Online Communities
Extended version of a paper appearing in the Proceedings of ICWSM 2017 (with the same title); please cite the official ICWSM version
null
null
null
cs.SI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Loyalty is an essential component of multi-community engagement. When users have the choice to engage with a variety of different communities, they often become loyal to just one, focusing on that community at the expense of others. However, it is unclear how loyalty is manifested in user behavior, or whether loyalty is encouraged by certain community characteristics. In this paper we operationalize loyalty as a user-community relation: users loyal to a community consistently prefer it over all others; loyal communities retain their loyal users over time. By exploring this relation using a large dataset of discussion communities from Reddit, we reveal that loyalty is manifested in remarkably consistent behaviors across a wide spectrum of communities. Loyal users employ language that signals collective identity and engage with more esoteric, less popular content, indicating they may play a curational role in surfacing new material. Loyal communities have denser user-user interaction networks and lower rates of triadic closure, suggesting that community-level loyalty is associated with more cohesive interactions and less fragmentation into subgroups. We exploit these general patterns to predict future rates of loyalty. Our results show that a user's propensity to become loyal is apparent from their first interactions with a community, suggesting that some users are intrinsically loyal from the very beginning.
[ { "version": "v1", "created": "Thu, 9 Mar 2017 18:37:50 GMT" }, { "version": "v2", "created": "Tue, 4 Apr 2017 01:09:26 GMT" }, { "version": "v3", "created": "Wed, 24 May 2017 14:45:13 GMT" } ]
2017-05-25T00:00:00
[ [ "Hamilton", "William L.", "" ], [ "Zhang", "Justine", "" ], [ "Danescu-Niculescu-Mizil", "Cristian", "" ], [ "Jurafsky", "Dan", "" ], [ "Leskovec", "Jure", "" ] ]
new_dataset
0.999647
1705.00138
Monowar Hasan
Monowar Hasan, Sibin Mohan, Rodolfo Pellizzoni, Rakesh B. Bobba
Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems
Accepted for publication, 29th Euromicro Conference on Real-Time Systems (ECRTS17)
null
null
null
cs.CR cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Embedded real-time systems (RTS) are pervasive. Many modern RTS are exposed to unknown security flaws, and threats to RTS are growing in both number and sophistication. However, until recently, cyber-security considerations were an afterthought in the design of such systems. Any security mechanisms integrated into RTS must (a) co-exist with the real- time tasks in the system and (b) operate without impacting the timing and safety constraints of the control logic. We introduce Contego, an approach to integrating security tasks into RTS without affecting temporal requirements. Contego is specifically designed for legacy systems, viz., the real-time control systems in which major alterations of the system parameters for constituent tasks is not always feasible. Contego combines the concept of opportunistic execution with hierarchical scheduling to maintain compatibility with legacy systems while still providing flexibility by allowing security tasks to operate in different modes. We also define a metric to measure the effectiveness of such integration. We evaluate Contego using synthetic workloads as well as with an implementation on a realistic embedded platform (an open- source ARM CPU running real-time Linux).
[ { "version": "v1", "created": "Sat, 29 Apr 2017 06:22:32 GMT" }, { "version": "v2", "created": "Tue, 2 May 2017 05:44:38 GMT" }, { "version": "v3", "created": "Tue, 23 May 2017 19:00:17 GMT" } ]
2017-05-25T00:00:00
[ [ "Hasan", "Monowar", "" ], [ "Mohan", "Sibin", "" ], [ "Pellizzoni", "Rodolfo", "" ], [ "Bobba", "Rakesh B.", "" ] ]
new_dataset
0.952361
1705.07632
Liang Yanchao
Yanchao Liang, Jianhua Li
Computer vision-based food calorie estimation: dataset, method, and experiment
7 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computer vision has been introduced to estimate calories from food images. But current food image data sets don't contain volume and mass records of foods, which leads to an incomplete calorie estimation. In this paper, we present a novel food image data set with volume and mass records of foods, and a deep learning method for food detection, to make a complete calorie estimation. Our data set includes 2978 images, and every image contains corresponding each food's annotation, volume and mass records, as well as a certain calibration reference. To estimate calorie of food in the proposed data set, a deep learning method using Faster R-CNN first is put forward to detect the food. And the experiment results show our method is effective to estimate calories and our data set contains adequate information for calorie estimation. Our data set is the first released food image data set which can be used to evaluate computer vision-based calorie estimation methods.
[ { "version": "v1", "created": "Mon, 22 May 2017 09:47:29 GMT" }, { "version": "v2", "created": "Tue, 23 May 2017 05:41:44 GMT" }, { "version": "v3", "created": "Wed, 24 May 2017 07:48:37 GMT" } ]
2017-05-25T00:00:00
[ [ "Liang", "Yanchao", "" ], [ "Li", "Jianhua", "" ] ]
new_dataset
0.999402
1705.08624
Yassine Maalej
Yassine Maalej, Sameh Sorour, Ahmed Abdel-Rahim and Mohsen Guizani
VANETs Meet Autonomous Vehicles: A Multimodal 3D Environment Learning Approach
7 pages, 12 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we design a multimodal framework for object detection, recognition and mapping based on the fusion of stereo camera frames, point cloud Velodyne Lidar scans, and Vehicle-to-Vehicle (V2V) Basic Safety Messages (BSMs) exchanged using Dedicated Short Range Communication (DSRC). We merge the key features of rich texture descriptions of objects from 2D images, depth and distance between objects provided by 3D point cloud and awareness of hidden vehicles from BSMs' 3D information. We present a joint pixel to point cloud and pixel to V2V correspondences of objects in frames from the Kitti Vision Benchmark Suite by using a semi-supervised manifold alignment approach to achieve camera-Lidar and camera-V2V mapping of their recognized objects that have the same underlying manifold.
[ { "version": "v1", "created": "Wed, 24 May 2017 06:24:21 GMT" } ]
2017-05-25T00:00:00
[ [ "Maalej", "Yassine", "" ], [ "Sorour", "Sameh", "" ], [ "Abdel-Rahim", "Ahmed", "" ], [ "Guizani", "Mohsen", "" ] ]
new_dataset
0.999627
1705.08708
Chun Tian
Chun Tian
SNMP for Common Lisp
10 pages; reprinted from ILC '09, Proceedings of the International Lisp Conference, March 22-25, 2009, Cambridge, Massachusetts, USA
ILC '09, Proceedings of the International Lisp Conference, March 22-25, 2009, Cambridge, Massachusetts, USA
null
null
cs.NI cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simple Network Management Protocol (SNMP) is widely used for management of Internet-based network today. In Lisp community, there're large Lisp-based applications which may need be monitored, and there're Lispers who may need to monitor other remote systems which are either Lisp-based or not. However, the relationship between Lisp and SNMP haven't been studied enough during past 20 years. The cl-net-snmp project has developed a new Common Lisp package which implemented the SNMP protocol. On client side, it can be used to query remote SNMP peers, and on server side, it brings SNMP capability into Common Lisp based applications, which could be monitored from remote through any SNMP-based management system. It's also a flexible platform for researches on network management and SNMP itself. But the most important, this project tries to prove: Common Lisp is the most fit language to implement SNMP. Different from other exist SNMP projects on Common Lisp, cl-net-snmp is clearly targeted on full SNMP protocol support include SNMPv3 and server-side work (agent). During the development, an general ASN.1 compiler and runtime package and an portable UDP networking package are also implemented, which would be useful for other related projects. In this paper, the author first introduces the SNMP protocol and a quick tutorial of cl-net-snmp on both client and server sides, and then the Lisp native design and the implementation details of the ASN.1 and SNMP package, especially the "code generation"' approach on compiling SNMP MIB definitions from ASN.1 into Common Lisp.
[ { "version": "v1", "created": "Wed, 24 May 2017 11:46:01 GMT" } ]
2017-05-25T00:00:00
[ [ "Tian", "Chun", "" ] ]
new_dataset
0.998068
1705.08709
Boya Di
Boya Di, Lingyang Song, Yonghui Li and Zhu Han
V2X Meets NOMA: Non-Orthogonal Multiple Access for 5G Enabled Vehicular Networks
Accepted by IEEE Wireless Communications Magazine
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Benefited from the widely deployed infrastructure, the LTE network has recently been considered as a promising candidate to support the vehicle-to-everything (V2X) services. However, with a massive number of devices accessing the V2X network in the future, the conventional OFDM-based LTE network faces the congestion issues due to its low efficiency of orthogonal access, resulting in significant access delay and posing a great challenge especially to safety-critical applications. The non-orthogonal multiple access (NOMA) technique has been well recognized as an effective solution for the future 5G cellular networks to provide broadband communications and massive connectivity. In this article, we investigate the applicability of NOMA in supporting cellular V2X services to achieve low latency and high reliability. Starting with a basic V2X unicast system, a novel NOMA-based scheme is proposed to tackle the technical hurdles in designing high spectral efficient scheduling and resource allocation schemes in the ultra dense topology. We then extend it to a more general V2X broadcasting system. Other NOMA-based extended V2X applications and some open issues are also discussed.
[ { "version": "v1", "created": "Wed, 24 May 2017 11:48:20 GMT" } ]
2017-05-25T00:00:00
[ [ "Di", "Boya", "" ], [ "Song", "Lingyang", "" ], [ "Li", "Yonghui", "" ], [ "Han", "Zhu", "" ] ]
new_dataset
0.993641
1705.06214
Lutz Schr\"oder
Paul Wild and Lutz Schr\"oder
A Characterization Theorem for a Modal Description Logic
null
null
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modal description logics feature modalities that capture dependence of knowledge on parameters such as time, place, or the information state of agents. E.g., the logic S5-ALC combines the standard description logic ALC with an S5-modality that can be understood as an epistemic operator or as representing (undirected) change. This logic embeds into a corresponding modal first-order logic S5-FOL. We prove a modal characterization theorem for this embedding, in analogy to results by van Benthem and Rosen relating ALC to standard first-order logic: We show that S5-ALC with only local roles is, both over finite and over unrestricted models, precisely the bisimulation invariant fragment of S5-FOL, thus giving an exact description of the expressive power of S5-ALC with only local roles.
[ { "version": "v1", "created": "Wed, 17 May 2017 15:35:16 GMT" }, { "version": "v2", "created": "Tue, 23 May 2017 06:35:33 GMT" } ]
2017-05-24T00:00:00
[ [ "Wild", "Paul", "" ], [ "Schröder", "Lutz", "" ] ]
new_dataset
0.997127
1705.07956
Mar\'ia Henar Salas-Olmedo
Juan Carlos Garcia-Palomares, Maria Henar Salas-Olmedo, Borja Moya-Gomez, Ana Condeco-Melhorado and Javier Gutierrrez
The pulse of the city through Twitter: relationships between land use and spatiotemporal demographics
15 pages, 6 figures
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social network data offer interesting opportunities in urban studies. In this study, we used Twitter data to analyse city dynamics over the course of the day. Users of this social network were grouped according to city zone and time slot in order to analyse the daily dynamics of the city and the relationship between this and land use. First, daytime activity in each zone was compared with activity at night in order to determine which zones showed increased activity in each of the time slots. Then, typical Twitter activity profiles were obtained based on the predominant land use in each zone, indicating how land uses linked to activities were activated during the day, but at different rates depending on the type of land use. Lastly, a multiple regression analysis was performed to determine the influence of the different land uses on each of the major time slots (morning, afternoon, evening and night) through their changing coefficients. Activity tended to decrease throughout the day for most land uses (e.g. offices, education, health and transport), but remained constant in parks and increased in retail and residential zones. Our results show that social network data can be used to improve our understanding of the link between land use and urban dynamics.
[ { "version": "v1", "created": "Mon, 22 May 2017 19:21:03 GMT" } ]
2017-05-24T00:00:00
[ [ "Garcia-Palomares", "Juan Carlos", "" ], [ "Salas-Olmedo", "Maria Henar", "" ], [ "Moya-Gomez", "Borja", "" ], [ "Condeco-Melhorado", "Ana", "" ], [ "Gutierrrez", "Javier", "" ] ]
new_dataset
0.965055
1705.07972
Joshua Engelsma
Joshua J. Engelsma, Sunpreet S. Arora, Anil K. Jain, Nicholas G. Paulter Jr
Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations
14 pages, 14 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the design and manufacturing of high fidelity universal 3D fingerprint targets, which can be imaged on a variety of fingerprint sensing technologies, namely capacitive, contact-optical, and contactless-optical. Universal 3D fingerprint targets enable, for the first time, not only a repeatable and controlled evaluation of fingerprint readers, but also the ability to conduct fingerprint reader interoperability studies. Fingerprint reader interoperability refers to how robust fingerprint recognition systems are to variations in the images acquired by different types of fingerprint readers. To build universal 3D fingerprint targets, we adopt a molding and casting framework consisting of (i) digital mapping of fingerprint images to a negative mold, (ii) CAD modeling a scaffolding system to hold the negative mold, (iii) fabricating the mold and scaffolding system with a high resolution 3D printer, (iv) producing or mixing a material with similar electrical, optical, and mechanical properties to that of the human finger, and (v) fabricating a 3D fingerprint target using controlled casting. Our experiments conducted with PIV and Appendix F certified optical (contact and contactless) and capacitive fingerprint readers demonstrate the usefulness of universal 3D fingerprint targets for controlled and repeatable fingerprint reader evaluations and also fingerprint reader interoperability studies.
[ { "version": "v1", "created": "Mon, 22 May 2017 19:51:59 GMT" } ]
2017-05-24T00:00:00
[ [ "Engelsma", "Joshua J.", "" ], [ "Arora", "Sunpreet S.", "" ], [ "Jain", "Anil K.", "" ], [ "Paulter", "Nicholas G.", "Jr" ] ]
new_dataset
0.997103
1705.08012
Thommen George Karimpanal
Thommen Karimpanal George, Harit Maganlal Gadhia, Ruben S/O Sukumar, John-John Cabibihan
Sensing discomfort of standing passengers in public rail transportation systems using a smart phone
Document prepared for IEEE International Conference on Control and Automation (ICCA), 2013, 5 pages, 8 figures
10th IEEE International Conference on Control & Automation (IEEE ICCA 2013), HangZhou China, June 12-14, 2013, pp. 1509-1513
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper aims to investigate the effect of acceleration on the discomfort of standing passengers. The acceleration levels from different public rail transport lines such as the mass rapid transits (MRTs) and light rail transits (LRTs) of Singapore, as well as the associated qualitative data indicating the discomfort of standing passengers were collected and analyzed. Based on a logistic regression model to analyze the data, a discomfort index was introduced, which can be used to compare various rail lines based on ride comfort. A method for predicting the discomfort of passengers based on the acceleration values was proposed for any given train line.
[ { "version": "v1", "created": "Mon, 22 May 2017 21:31:50 GMT" } ]
2017-05-24T00:00:00
[ [ "George", "Thommen Karimpanal", "" ], [ "Gadhia", "Harit Maganlal", "" ], [ "Sukumar", "Ruben S/O", "" ], [ "Cabibihan", "John-John", "" ] ]
new_dataset
0.999133
1705.08040
Nariman Farsad
Nariman Farsad and Christopher Rose and Muriel M\'edard and Andrea Goldsmith
Capacity of Molecular Channels with Imperfect Particle-Intensity Modulation and Detection
Accepted at IEEE International Symposium on Information Theory (ISIT)
null
null
null
cs.IT cs.ET math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work introduces the particle-intensity channel (PIC) as a model for molecular communication systems and characterizes the properties of the optimal input distribution and the capacity limits for this system. In the PIC, the transmitter encodes information, in symbols of a given duration, based on the number of particles released, and the receiver detects and decodes the message based on the number of particles detected during the symbol interval. In this channel, the transmitter may be unable to control precisely the number of particles released, and the receiver may not detect all the particles that arrive. We demonstrate that the optimal input distribution for this channel always has mass points at zero and the maximum number of particles that can be released. We then consider diffusive particle transport, derive the capacity expression when the input distribution is binary, and show conditions under which the binary input is capacity-achieving. In particular, we demonstrate that when the transmitter cannot generate particles at a high rate, the optimal input distribution is binary.
[ { "version": "v1", "created": "Mon, 22 May 2017 23:21:02 GMT" } ]
2017-05-24T00:00:00
[ [ "Farsad", "Nariman", "" ], [ "Rose", "Christopher", "" ], [ "Médard", "Muriel", "" ], [ "Goldsmith", "Andrea", "" ] ]
new_dataset
0.99081
1705.08094
Guangdong Bai
Zhengkui Wang, Guangdong Bai, Soumyadeb Chowdhury, Quanqing Xu, Zhi Lin Seow
TwiInsight: Discovering Topics and Sentiments from Social Media Datasets
null
null
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social media platforms contain a great wealth of information which provides opportunities for us to explore hidden patterns or unknown correlations, and understand people's satisfaction with what they are discussing. As one showcase, in this paper, we present a system, TwiInsight which explores the insight of Twitter data. Different from other Twitter analysis systems, TwiInsight automatically extracts the popular topics under different categories (e.g., healthcare, food, technology, sports and transport) discussed in Twitter via topic modeling and also identifies the correlated topics across different categories. Additionally, it also discovers the people's opinions on the tweets and topics via the sentiment analysis. The system also employs an intuitive and informative visualization to show the uncovered insight. Furthermore, we also develop and compare six most popular algorithms - three for sentiment analysis and three for topic modeling.
[ { "version": "v1", "created": "Tue, 23 May 2017 06:49:12 GMT" } ]
2017-05-24T00:00:00
[ [ "Wang", "Zhengkui", "" ], [ "Bai", "Guangdong", "" ], [ "Chowdhury", "Soumyadeb", "" ], [ "Xu", "Quanqing", "" ], [ "Seow", "Zhi Lin", "" ] ]
new_dataset
0.999099
1705.08207
Tam Nguyen
Tam V. Nguyen, Luoqi Liu
Salient Object Detection with Semantic Priors
accepted to IJCAI 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Salient object detection has increasingly become a popular topic in cognitive and computational sciences, including computer vision and artificial intelligence research. In this paper, we propose integrating \textit{semantic priors} into the salient object detection process. Our algorithm consists of three basic steps. Firstly, the explicit saliency map is obtained based on the semantic segmentation refined by the explicit saliency priors learned from the data. Next, the implicit saliency map is computed based on a trained model which maps the implicit saliency priors embedded into regional features with the saliency values. Finally, the explicit semantic map and the implicit map are adaptively fused to form a pixel-accurate saliency map which uniformly covers the objects of interest. We further evaluate the proposed framework on two challenging datasets, namely, ECSSD and HKUIS. The extensive experimental results demonstrate that our method outperforms other state-of-the-art methods.
[ { "version": "v1", "created": "Tue, 23 May 2017 12:24:09 GMT" } ]
2017-05-24T00:00:00
[ [ "Nguyen", "Tam V.", "" ], [ "Liu", "Luoqi", "" ] ]
new_dataset
0.995027
1705.08339
Carlos Mosquera
Carlos Mosquera, Roberto Lopez-Valcarce, Vahid Joroughi
Distributed Precoding Systems in Multi-Gateway Multibeam Satellites: Regularization and Coarse Beamforming
Submitted to IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the problem of beamforming design in a multibeam satellite, which is shared by different groups of terminals -clusters-, each served by an Earth station or gateway. Each gateway precodes the symbols addressed to its respective users; the design follows an MMSE criterion, and a regularization factor judiciously chosen allows to account for the presence of mutually interfering clusters, extending more classical results applicable to one centralized station. More importantly, channel statistics can be used instead of instantaneous channel state information, avoiding the exchange of information among gateways through backhaul links. The on-board satellite beamforming weights are designed to exploit the degrees of freedom of the satellite antennas to minimize the noise impact and the interference to some specific users. On-ground beamforming results are provided as a reference to compare the joint performance of MMSE precoders and on-board beamforming network. A non-adaptive design complements the results and makes them more amenable to practical use by designing a coarse beamforming network.
[ { "version": "v1", "created": "Tue, 23 May 2017 14:57:48 GMT" } ]
2017-05-24T00:00:00
[ [ "Mosquera", "Carlos", "" ], [ "Lopez-Valcarce", "Roberto", "" ], [ "Joroughi", "Vahid", "" ] ]
new_dataset
0.970407
1611.01484
Ankan Bansal
Ankan Bansal, Anirudh Nanduri, Carlos Castillo, Rajeev Ranjan, Rama Chellappa
UMDFaces: An Annotated Face Dataset for Training Deep Networks
Updates: Verified keypoints, removed duplicate subjects, released test protocol
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent progress in face detection (including keypoint detection), and recognition is mainly being driven by (i) deeper convolutional neural network architectures, and (ii) larger datasets. However, most of the large datasets are maintained by private companies and are not publicly available. The academic computer vision community needs larger and more varied datasets to make further progress. In this paper we introduce a new face dataset, called UMDFaces, which has 367,888 annotated faces of 8,277 subjects. We also introduce a new face recognition evaluation protocol which will help advance the state-of-the-art in this area. We discuss how a large dataset can be collected and annotated using human annotators and deep networks. We provide human curated bounding boxes for faces. We also provide estimated pose (roll, pitch and yaw), locations of twenty-one key-points and gender information generated by a pre-trained neural network. In addition, the quality of keypoint annotations has been verified by humans for about 115,000 images. Finally, we compare the quality of the dataset with other publicly available face datasets at similar scales.
[ { "version": "v1", "created": "Fri, 4 Nov 2016 18:37:41 GMT" }, { "version": "v2", "created": "Sun, 21 May 2017 08:00:42 GMT" } ]
2017-05-23T00:00:00
[ [ "Bansal", "Ankan", "" ], [ "Nanduri", "Anirudh", "" ], [ "Castillo", "Carlos", "" ], [ "Ranjan", "Rajeev", "" ], [ "Chellappa", "Rama", "" ] ]
new_dataset
0.99818
1701.09135
Samarth Manoj Brahmbhatt
Samarth Brahmbhatt and James Hays
DeepNav: Learning to Navigate Large Cities
CVPR 2017 camera ready version
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present DeepNav, a Convolutional Neural Network (CNN) based algorithm for navigating large cities using locally visible street-view images. The DeepNav agent learns to reach its destination quickly by making the correct navigation decisions at intersections. We collect a large-scale dataset of street-view images organized in a graph where nodes are connected by roads. This dataset contains 10 city graphs and more than 1 million street-view images. We propose 3 supervised learning approaches for the navigation task and show how A* search in the city graph can be used to generate supervision for the learning. Our annotation process is fully automated using publicly available mapping services and requires no human input. We evaluate the proposed DeepNav models on 4 held-out cities for navigating to 5 different types of destinations. Our algorithms outperform previous work that uses hand-crafted features and Support Vector Regression (SVR)[19].
[ { "version": "v1", "created": "Tue, 31 Jan 2017 17:14:24 GMT" }, { "version": "v2", "created": "Sat, 20 May 2017 22:40:26 GMT" } ]
2017-05-23T00:00:00
[ [ "Brahmbhatt", "Samarth", "" ], [ "Hays", "James", "" ] ]
new_dataset
0.999644
1702.05853
Hoyoun Kim
Hoyoun Kim and Jong-Seon No
Relay-Aided MIMO Cellular Networks Using Opposite Directional Interference Alignment
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we first propose interference alignment (IA) scheme for uplink transmission of multiple-input-mulitple-output (MIMO) cellular network with a help of relay which operates in halfduplex mode. The proposed scheme only requires global channel state information (CSI) knowledge at relay and no transmitter beamforming and time extension is required at user equipment (UE), which differs from the conventional IA schemes for cellular network. We derive the feasibility condition of the proposed scheme for the general network configuration and analyze the degrees-of-freedom (DoF) performance of the proposed IA scheme. Extension of proposed scheme for downlink and full-duplex network are further described in this paper. It is also shown that the same advantage as the uplink case can be obtained for downlink case through relay induced interfering multiple access channel (IMAC) and interfering broadcast channel (IBC) duality. Furthermore, full-duplex network is shown to have same advantages with half-duplex cases.
[ { "version": "v1", "created": "Mon, 20 Feb 2017 04:09:07 GMT" }, { "version": "v2", "created": "Mon, 22 May 2017 06:13:47 GMT" } ]
2017-05-23T00:00:00
[ [ "Kim", "Hoyoun", "" ], [ "No", "Jong-Seon", "" ] ]
new_dataset
0.99506
1703.00178
Mirsad Cosovic
Mirsad Cosovic, Achilleas Tsitsimelis, Dejan Vukobratovic, Javier Matamoros, Carles Anton-Haro
5G Mobile Cellular Networks: Enabling Distributed State Estimation for Smart Grids
8 pages, 6 figures, version of the magazine paper submitted for publication
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/4.0/
With transition towards 5G, mobile cellular networks are evolving into a powerful platform for ubiquitous large-scale information acquisition, communication, storage and processing. 5G will provide suitable services for mission-critical and real-time applications such as the ones envisioned in future Smart Grids. In this work, we show how emerging 5G mobile cellular network, with its evolution of Machine-Type Communications and the concept of Mobile Edge Computing, provides an adequate environment for distributed monitoring and control tasks in Smart Grids. In particular, we present in detail how Smart Grids could benefit from advanced distributed State Estimation methods placed within 5G environment. We present an overview of emerging distributed State Estimation solutions, focusing on those based on distributed optimization and probabilistic graphical models, and investigate their integration as part of the future 5G Smart Grid services.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 08:33:28 GMT" }, { "version": "v2", "created": "Sat, 20 May 2017 18:39:49 GMT" } ]
2017-05-23T00:00:00
[ [ "Cosovic", "Mirsad", "" ], [ "Tsitsimelis", "Achilleas", "" ], [ "Vukobratovic", "Dejan", "" ], [ "Matamoros", "Javier", "" ], [ "Anton-Haro", "Carles", "" ] ]
new_dataset
0.99551
1705.07121
Mansaf Alam Dr
Kashish A. Shakil, Farhana J. Zareen, Mansaf Alam and Suraiya Jabin
BAMHealthCloud: A Biometric Authentication and Data Management System for Healthcare Data in Cloud
null
null
null
null
cs.CR cs.CY cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advancements in healthcare industry with new technology and population growth has given rise to security threat to our most personal data. The healthcare data management system consists of records in different formats such as text, numeric, pictures and videos leading to data which is big and unstructured. Also, hospitals have several branches at different locations throughout a country and overseas. In view of these requirements a cloud based healthcare management system can be an effective solution for efficient health care data management. One of the major concerns of a cloud based healthcare system is the security aspect. It includes theft to identity, tax fraudulence, insurance frauds, medical frauds and defamation of high profile patients. Hence, a secure data access and retrieval is needed in order to provide security of critical medical records in health care management system. Biometric authentication mechanism is suitable in this scenario since it overcomes the limitations of token theft and forgetting passwords in conventional token id-password mechanism used for providing security. It also has high accuracy rate for secure data access and retrieval. In this paper we propose BAMHealthCloud which is a cloud based system for management of healthcare data, it ensures security of data through biometric authentication. It has been developed after performing a detailed case study on healthcare sector in a developing country. Training of the signature samples for authentication purpose has been performed in parallel on hadoop MapReduce framework using Resilient Backpropagation neural network. From rigorous experiments it can be concluded that it achieves a speedup of 9x, Equal error rate (EER) of 0.12, sensitivity of 0.98 and specificity of 0.95 as compared to other approaches existing in literature.
[ { "version": "v1", "created": "Fri, 19 May 2017 11:00:40 GMT" } ]
2017-05-23T00:00:00
[ [ "Shakil", "Kashish A.", "" ], [ "Zareen", "Farhana J.", "" ], [ "Alam", "Mansaf", "" ], [ "Jabin", "Suraiya", "" ] ]
new_dataset
0.996249
1705.07207
Baisravan HomChaudhuri
Baisravan HomChaudhuri and Pierluigi Pisu
A Driver-in-the Loop Fuel Economic Control Strategy for Connected Vehicles in Urban Roads
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we focus on developing driver-in-the loop fuel economic control strategy for multiple connected vehicles. The control strategy is considered to work in a driver assistance framework where the controller gives command to a driver to follow while considering the ability of the driver in following control commands. Our proposed method uses vehicle-to-vehicle (V2V) communication, exploits traffic lights' Signal Phase and Timing (SPAT) information, models driver error injection with Markov chain, and employs scenario tree based stochastic model predictive control to improve vehicle fuel economy and traffic mobility. The proposed strategy is decentralized in nature as every vehicle evaluates its own strategy using only local information. Simulation results show the effect of consideration of driver error injection when synthesizing fuel economic controllers in a driver assistance fashion.
[ { "version": "v1", "created": "Fri, 19 May 2017 22:08:01 GMT" } ]
2017-05-23T00:00:00
[ [ "HomChaudhuri", "Baisravan", "" ], [ "Pisu", "Pierluigi", "" ] ]
new_dataset
0.992655
1705.07237
Mustafa Kishk
Mustafa A. Kishk and Harpreet S. Dhillon
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting IoT network (secondary network). The nodes in the secondary network are assumed to be solely powered by ambient RF energy harvested from the transmissions of the primary network. We assume that the secondary nodes can eavesdrop on the primary transmissions due to which the primary network uses secrecy guard zones. The primary transmitter goes silent if any secondary receiver is detected within its guard zone. Using tools from stochastic geometry, we derive the probability of successful connection of the primary network as well as the probability of secure communication. Two conditions must be jointly satisfied in order to ensure successful connection: (i) the SINR at the primary receiver is above a predefined threshold, and (ii) the primary transmitter is not silent. In order to ensure secure communication, the SINR value at each of the secondary nodes should be less than a predefined threshold. Clearly, when more secondary nodes are deployed, more primary transmitters will remain silent for a given guard zone radius, thus impacting the amount of energy harvested by the secondary network. Our results concretely show the existence of an optimal deployment density for the secondary network that maximizes the density of nodes that are able to harvest sufficient amount of energy. Furthermore, we show the dependence of this optimal deployment density on the guard zone radius of the primary network. In addition, we show that the optimal guard zone radius selected by the primary network is a function of the deployment density of the secondary network. This interesting coupling between the two networks is studied using tools from game theory. Overall, this work is one of the few concrete works that symbiotically merge tools from stochastic geometry and game theory.
[ { "version": "v1", "created": "Sat, 20 May 2017 00:45:53 GMT" } ]
2017-05-23T00:00:00
[ [ "Kishk", "Mustafa A.", "" ], [ "Dhillon", "Harpreet S.", "" ] ]
new_dataset
0.98821
1705.07275
Kai Chen
David Tse, Bin Li, Kai Chen
Polar Coding for Parallel Gaussian Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a Polar coding scheme for parallel Gaussian channels. The encoder knows the sum rate of the parallel channels but does not know the rate of any channel. By using the nesting property of Polar code, we design a coding/decoding scheme to achieve the sum rates.
[ { "version": "v1", "created": "Sat, 20 May 2017 07:48:10 GMT" } ]
2017-05-23T00:00:00
[ [ "Tse", "David", "" ], [ "Li", "Bin", "" ], [ "Chen", "Kai", "" ] ]
new_dataset
0.981871
1705.07511
Yu-Ting Wang
Yu-Ting Wang, Jun Li, Rong Zheng, Dongmei Zhao
ARABIS: an Asynchronous Acoustic Indoor Positioning System for Mobile Devices
8 pages, 13 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Acoustic ranging based indoor positioning solutions have the advantage of higher ranging accuracy and better compatibility with commercial-off-the-self consumer devices. However, similar to other time-domain based approaches using Time-of-Arrival and Time-Difference-of-Arrival, they suffer from performance degradation in presence of multi-path propagation and low received signal-to-noise ratio (SNR) in indoor environments. In this paper, we improve upon our previous work on asynchronous acoustic indoor positioning and develop ARABIS, a robust and low-cost acoustic positioning system (IPS) for mobile devices. We develop a low-cost acoustic board custom-designed to support large operational ranges and extensibility. To mitigate the effects of low SNR and multi-path propagation, we devise a robust algorithm that iteratively removes possible outliers by taking advantage of redundant TDoA estimates. Experiments have been carried in two testbeds of sizes 10.67m*7.76m and 15m*15m, one in an academic building and one in a convention center. The proposed system achieves average and 95% quantile localization errors of 7.4cm and 16.0cm in the first testbed with 8 anchor nodes and average and 95% quantile localization errors of 20.4cm and 40.0cm in the second testbed with 4 anchor nodes only.
[ { "version": "v1", "created": "Sun, 21 May 2017 21:35:06 GMT" } ]
2017-05-23T00:00:00
[ [ "Wang", "Yu-Ting", "" ], [ "Li", "Jun", "" ], [ "Zheng", "Rong", "" ], [ "Zhao", "Dongmei", "" ] ]
new_dataset
0.999445
1705.07520
Vladimir Zamdzhiev
Vladimir Nikolaev Zamdzhiev
Rewriting Context-free Families of String Diagrams
PhD Thesis. Successfully defended in August 2016. See PDF for full abstract
null
null
null
cs.FL cs.LO quant-ph
http://creativecommons.org/licenses/by/4.0/
String diagrams provide a convenient graphical framework which may be used for equational reasoning about morphisms of monoidal categories. However, unlike term rewriting, rewriting string diagrams results in shorter equational proofs, because the string diagrammatic representation allows us to formally establish equalities modulo any rewrite steps which follow from the monoidal structure. Manipulating string diagrams by hand is a time-consuming and error-prone process, especially for large string diagrams. This can be ameliorated by using software proof assistants, such as Quantomatic. However, reasoning about concrete string diagrams may be limiting and in some scenarios it is necessary to reason about entire (infinite) families of string diagrams. When doing so, we face the same problems as for manipulating concrete string diagrams, but in addition, we risk making further mistakes if we are not precise enough about the way we represent (infinite) families of string diagrams. The primary goal of this thesis is to design a mathematical framework for equational reasoning about infinite families of string diagrams which is amenable to computer automation. We will be working with context-free families of string diagrams and we will represent them using context-free graph grammars. We will model equations between infinite families of diagrams using rewrite rules between context-free grammars. Our framework represents equational reasoning about concrete string diagrams and context-free families of string diagrams using double-pushout rewriting on graphs and context-free graph grammars respectively. We will prove that our representation is sound by showing that it respects the concrete semantics of string diagrammatic reasoning and we will show that our framework is appropriate for software implementation by proving important decidability properties.
[ { "version": "v1", "created": "Sun, 21 May 2017 22:48:54 GMT" } ]
2017-05-23T00:00:00
[ [ "Zamdzhiev", "Vladimir Nikolaev", "" ] ]
new_dataset
0.954074
1705.07522
Hamid Tizhoosh
Morteza Babaie, Shivam Kalra, Aditya Sriram, Christopher Mitcheltree, Shujin Zhu, Amin Khatami, Shahryar Rahnamayan, H.R. Tizhoosh
Classification and Retrieval of Digital Pathology Scans: A New Dataset
Accepted for presentation at Workshop for Computer Vision for Microscopy Image Analysis (CVMI 2017) @ CVPR 2017, Honolulu, Hawaii
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce a new dataset, \textbf{Kimia Path24}, for image classification and retrieval in digital pathology. We use the whole scan images of 24 different tissue textures to generate 1,325 test patches of size 1000$\times$1000 (0.5mm$\times$0.5mm). Training data can be generated according to preferences of algorithm designer and can range from approximately 27,000 to over 50,000 patches if the preset parameters are adopted. We propose a compound patch-and-scan accuracy measurement that makes achieving high accuracies quite challenging. In addition, we set the benchmarking line by applying LBP, dictionary approach and convolutional neural nets (CNNs) and report their results. The highest accuracy was 41.80\% for CNN.
[ { "version": "v1", "created": "Mon, 22 May 2017 00:00:18 GMT" } ]
2017-05-23T00:00:00
[ [ "Babaie", "Morteza", "" ], [ "Kalra", "Shivam", "" ], [ "Sriram", "Aditya", "" ], [ "Mitcheltree", "Christopher", "" ], [ "Zhu", "Shujin", "" ], [ "Khatami", "Amin", "" ], [ "Rahnamayan", "Shahryar", "" ], [ "Tizhoosh", "H. R.", "" ] ]
new_dataset
0.995288
1705.07640
Leonid Keselman
Stan Melax, Leonid Keselman, Sterling Orsten
Dynamics Based 3D Skeletal Hand Tracking
Published in Graphics Interface 2013
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tracking the full skeletal pose of the hands and fingers is a challenging problem that has a plethora of applications for user interaction. Existing techniques either require wearable hardware, add restrictions to user pose, or require significant computation resources. This research explores a new approach to tracking hands, or any articulated model, by using an augmented rigid body simulation. This allows us to phrase 3D object tracking as a linear complementarity problem with a well-defined solution. Based on a depth sensor's samples, the system generates constraints that limit motion orthogonal to the rigid body model's surface. These constraints, along with prior motion, collision/contact constraints, and joint mechanics, are resolved with a projected Gauss-Seidel solver. Due to camera noise properties and attachment errors, the numerous surface constraints are impulse capped to avoid overpowering mechanical constraints. To improve tracking accuracy, multiple simulations are spawned at each frame and fed a variety of heuristics, constraints and poses. A 3D error metric selects the best-fit simulation, helping the system handle challenging hand motions. Such an approach enables real-time, robust, and accurate 3D skeletal tracking of a user's hand on a variety of depth cameras, while only utilizing a single x86 CPU core for processing.
[ { "version": "v1", "created": "Mon, 22 May 2017 10:01:39 GMT" } ]
2017-05-23T00:00:00
[ [ "Melax", "Stan", "" ], [ "Keselman", "Leonid", "" ], [ "Orsten", "Sterling", "" ] ]
new_dataset
0.998412
1705.07788
Krzysztof Szczypiorski
Krzysztof Szczypiorski and Wojciech Zydecki
StegIbiza: Steganography in Club Music Implemented in Python
4 pages, 4 figures, 1 table
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces the implementation of steganography method called StegIbiza, which uses tempo modulation as hidden message carrier. With the use of Python scripting language, a bit string was encoded and decoded using WAV and MP3 files. Once the message was hidden into a music files, an internet radio was created to evaluate broadcast possibilities. No dedicated music or signal processing equipment was used in this StegIbiza implementation
[ { "version": "v1", "created": "Mon, 22 May 2017 14:56:49 GMT" } ]
2017-05-23T00:00:00
[ [ "Szczypiorski", "Krzysztof", "" ], [ "Zydecki", "Wojciech", "" ] ]
new_dataset
0.999122
1705.07862
Joshua Finnell
Joshua Finnell, Martin Klein and Brian J. Cain
Nucleus: A Pilot Project
13 pages, report
null
null
LA-UR-17-23791
cs.DL
http://creativecommons.org/licenses/by-nc-sa/4.0/
Early in 2016, an environmental scan was conducted by the Research Library Data Working Group for three purposes: 1.) Perform a survey of the data management landscape at Los Alamos National Laboratory in order to identify local gaps in data management services. 2.) Conduct an environmental scan of external institutions to benchmark budgets, infrastructure, and personnel dedicated to data management. 3.) Draft a research data infrastructure model that aligns with the current workflow and classification restrictions at Los Alamos National Laboratory. This report is a summary of those activities and the draft for a pilot data management project.
[ { "version": "v1", "created": "Mon, 22 May 2017 17:09:17 GMT" } ]
2017-05-23T00:00:00
[ [ "Finnell", "Joshua", "" ], [ "Klein", "Martin", "" ], [ "Cain", "Brian J.", "" ] ]
new_dataset
0.998526
1705.07867
Miltiadis Allamanis
Miltiadis Allamanis and Marc Brockschmidt
SmartPaste: Learning to Adapt Source Code
null
null
null
null
cs.LG cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep Neural Networks have been shown to succeed at a range of natural language tasks such as machine translation and text summarization. While tasks on source code (ie, formal languages) have been considered recently, most work in this area does not attempt to capitalize on the unique opportunities offered by its known syntax and structure. In this work, we introduce SmartPaste, a first task that requires to use such information. The task is a variant of the program repair problem that requires to adapt a given (pasted) snippet of code to surrounding, existing source code. As first solutions, we design a set of deep neural models that learn to represent the context of each variable location and variable usage in a data flow-sensitive way. Our evaluation suggests that our models can learn to solve the SmartPaste task in many cases, achieving 58.6% accuracy, while learning meaningful representation of variable usages.
[ { "version": "v1", "created": "Mon, 22 May 2017 17:16:06 GMT" } ]
2017-05-23T00:00:00
[ [ "Allamanis", "Miltiadis", "" ], [ "Brockschmidt", "Marc", "" ] ]
new_dataset
0.998858
1601.02781
Mansaf Alam Dr
Farhana Javed Zareen, Kashish Ara Shakil, Mansaf Alam and Suraiya Jabin
BAMCloud: A Cloud Based Mobile Biometric Authentication Framework
null
null
null
null
cs.DC cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With an exponential increase in number of users switching to mobile banking, various countries are adopting biometric solutions as security measures. The main reason for biometric technologies becoming more common in the everyday lives of consumers is because of the facility to easily capture biometric data in real time, using their mobile phones. Biometric technologies are providing the potential security framework to make banking more convenient and secure than it has ever been. At the same time, the exponential growth of enrollment in the biometric system produces massive amount of high dimensionality data that leads to degradation in the performance of the mobile banking systems. Therefore, in order to overcome the performance issues arising due to this data deluge, this paper aims to propose a distributed mobile biometric system based on a high performance cluster Cloud. High availability, better time efficiency and scalability are some of the added advantages of using the proposed system. In this paper a Cloud based mobile biometric authentication framework (BAMCloud) is proposed that uses dynamic signatures and performs authentication. It includes the steps involving data capture using any handheld mobile device, then storage, preprocessing and training the system in a distributed manner over Cloud. For this purpose we have implemented it using MapReduce on Hadoop platform and for training Levenberg-Marquardt backpropagation neural network has been used. Moreover, the methodology adopted is very novel as it achieves a speedup of 8.5x and a performance of 96.23%. Furthermore, the cost benefit analysis of the implemented system shows that the cost of implementation and execution of the system is lesser than the existing ones. The experiments demonstrate that the better performance is achieved by proposed framework as compared to the other methods used in the recent literature.
[ { "version": "v1", "created": "Tue, 12 Jan 2016 09:38:44 GMT" }, { "version": "v2", "created": "Fri, 19 May 2017 11:23:33 GMT" } ]
2017-05-22T00:00:00
[ [ "Zareen", "Farhana Javed", "" ], [ "Shakil", "Kashish Ara", "" ], [ "Alam", "Mansaf", "" ], [ "Jabin", "Suraiya", "" ] ]
new_dataset
0.997935
1604.06414
Da Zheng
Da Zheng, Disa Mhembere, Joshua T. Vogelstein, Carey E. Priebe, Randal Burns
FlashR: R-Programmed Parallel and Scalable Machine Learning using SSDs
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
R is one of the most popular programming languages for statistics and machine learning, but the R framework is relatively slow and unable to scale to large datasets. The general approach for speeding up an implementation in R is to implement the algorithms in C or FORTRAN and provide an R wrapper. FlashR takes a different approach: it executes R code in parallel and scales the code beyond memory capacity by utilizing solid-state drives (SSDs) automatically. It provides a small number of generalized operations (GenOps) upon which we reimplement a large number of matrix functions in the R base package. As such, FlashR parallelizes and scales existing R code with little/no modification. To reduce data movement between CPU and SSDs, FlashR evaluates matrix operations lazily, fuses operations at runtime, and uses cache-aware, two-level matrix partitioning. We evaluate FlashR on a variety of machine learning and statistics algorithms on inputs of up to four billion data points. FlashR out-of-core tracks closely the performance of FlashR in-memory. The R code for machine learning algorithms executed in FlashR outperforms the in-memory execution of H2O and Spark MLlib by a factor of 2-10 and outperforms Revolution R Open by more than an order of magnitude.
[ { "version": "v1", "created": "Thu, 21 Apr 2016 18:43:38 GMT" }, { "version": "v2", "created": "Sat, 30 Apr 2016 00:43:50 GMT" }, { "version": "v3", "created": "Wed, 18 May 2016 13:42:30 GMT" }, { "version": "v4", "created": "Thu, 18 May 2017 23:28:01 GMT" } ]
2017-05-22T00:00:00
[ [ "Zheng", "Da", "" ], [ "Mhembere", "Disa", "" ], [ "Vogelstein", "Joshua T.", "" ], [ "Priebe", "Carey E.", "" ], [ "Burns", "Randal", "" ] ]
new_dataset
0.998958
1606.02866
Binqiang Chen
Binqiang Chen, Chenyang Yang, Andreas F. Molisch
Cache-enabled Device-to-Device Communications: Offloading Gain and Energy Cost
A part of this work was published in IEEE WCNC 2016 with title "Energy Costs for Traffic Offloading by Cache-enabled D2D Communications"
null
10.1109/TWC.2017.2699631
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By caching files at users, content delivery traffic can be offloaded via device-to-device (D2D) links if a helper user is willing to transmit the cached file to the user who requests the file. In practice, the user device has limited battery capacity, and may terminate the D2D connection when its battery has little energy left. Thus, taking the battery consumption allowed by the helper users to support D2D into account introduces a reduction in the possible amount of offloading. In this paper, we investigate the relationship between offloading gain of the system and energy cost of each helper user. To this end, we introduce a user-centric protocol to control the energy cost for a helper user to transmit the file. Then, we optimize the proactive caching policy to maximize the offloading opportunity, and optimize the transmit power at each helper to maximize the offloading probability. Finally, we evaluate the overall amount of traffic offloaded to D2D links and evaluate the average energy consumption at each helper, with the optimized caching policy and transmit power. Simulations show that a significant amount of traffic can be offloaded even when the energy cost is kept low.
[ { "version": "v1", "created": "Thu, 9 Jun 2016 08:32:49 GMT" } ]
2017-05-22T00:00:00
[ [ "Chen", "Binqiang", "" ], [ "Yang", "Chenyang", "" ], [ "Molisch", "Andreas F.", "" ] ]
new_dataset
0.996559
1611.04212
Min Li
Chunshan Liu, Min Li, Stephen V. Hanly, Iain B. Collings, Philip Whiting
Millimeter Wave Beam Alignment: Large Deviations Analysis and Design Insights
Author final manuscript, to appear in IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Millimeter Wave Communications for Future Mobile Networks, 2017 (corresponding author: Min Li)
null
10.1109/JSAC.2017.2699360
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In millimeter wave cellular communication, fast and reliable beam alignment via beam training is crucial to harvest sufficient beamforming gain for the subsequent data transmission. In this paper, we establish fundamental limits in beam-alignment performance under both the exhaustive search and the hierarchical search that adopts multi-resolution beamforming codebooks, accounting for time-domain training overhead. Specifically, we derive lower and upper bounds on the probability of misalignment for an arbitrary level in the hierarchical search, based on a single-path channel model. Using the method of large deviations, we characterize the decay rate functions of both bounds and show that the bounds coincide as the training sequence length goes large. We go on to characterize the asymptotic misalignment probability of both the hierarchical and exhaustive search, and show that the latter asymptotically outperforms the former, subject to the same training overhead and codebook resolution. We show via numerical results that this relative performance behavior holds in the non-asymptotic regime. Moreover, the exhaustive search is shown to achieve significantly higher worst-case spectrum efficiency than the hierarchical search, when the pre-beamforming signal-to-noise ratio (SNR) is relatively low. This study hence implies that the exhaustive search is more effective for users situated further from base stations, as they tend to have low SNR.
[ { "version": "v1", "created": "Mon, 14 Nov 2016 00:00:21 GMT" }, { "version": "v2", "created": "Fri, 19 May 2017 11:58:28 GMT" } ]
2017-05-22T00:00:00
[ [ "Liu", "Chunshan", "" ], [ "Li", "Min", "" ], [ "Hanly", "Stephen V.", "" ], [ "Collings", "Iain B.", "" ], [ "Whiting", "Philip", "" ] ]
new_dataset
0.994172
1705.06784
Igor Korkin
Igor Korkin and Satoshi Tanda
Detect Kernel-Mode Rootkits via Real Time Logging & Controlling Memory Access
Proceedings of the 12th annual Conference on Digital Forensics, Security and Law (CDFSL), Embry-Riddle Aeronautical University, Daytona Beach, Florida, USA. May 15-16 2017. 31 pages, 14 figures, 3 tables, 101 references
null
null
null
cs.CR
http://creativecommons.org/publicdomain/zero/1.0/
Modern malware and spyware platforms attack existing antivirus solutions and even Microsoft PatchGuard. To protect users and business systems new technologies developed by Intel and AMD CPUs may be applied. To deal with the new malware we propose monitoring and controlling access to the memory in real time using Intel VT-x with EPT. We have checked this concept by developing MemoryMonRWX, which is a bare-metal hypervisor. MemoryMonRWX is able to track and trap all types of memory access: read, write, and execute. MemoryMonRWX also has the following competitive advantages: fine-grained analysis, support of multi-core CPUs and 64-bit Windows 10. MemoryMonRWX is able to protect critical kernel memory areas even when PatchGuard has been disabled by malware. Its main innovative features are as follows: guaranteed interception of every memory access, resilience, and low performance degradation.
[ { "version": "v1", "created": "Thu, 18 May 2017 20:16:17 GMT" } ]
2017-05-22T00:00:00
[ [ "Korkin", "Igor", "" ], [ "Tanda", "Satoshi", "" ] ]
new_dataset
0.968587
1705.06822
EPTCS
John Cowles (University of Wyoming), Ruben Gamboa
The Cayley-Dickson Construction in ACL2
In Proceedings ACL2Workshop 2017, arXiv:1705.00766
EPTCS 249, 2017, pp. 18-29
10.4204/EPTCS.249.2
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Cayley-Dickson Construction is a generalization of the familiar construction of the complex numbers from pairs of real numbers. The complex numbers can be viewed as two-dimensional vectors equipped with a multiplication. The construction can be used to construct, not only the two-dimensional Complex Numbers, but also the four-dimensional Quaternions and the eight-dimensional Octonions. Each of these vector spaces has a vector multiplication, v_1*v_2, that satisfies: 1. Each nonzero vector has a multiplicative inverse. 2. For the Euclidean length of a vector |v|, |v_1 * v_2| = |v_1| |v2|. Real numbers can also be viewed as (one-dimensional) vectors with the above two properties. ACL2(r) is used to explore this question: Given a vector space, equipped with a multiplication, satisfying the Euclidean length condition 2, given above. Make pairs of vectors into "new" vectors with a multiplication. When do the newly constructed vectors also satisfy condition 2?
[ { "version": "v1", "created": "Wed, 3 May 2017 01:48:44 GMT" } ]
2017-05-22T00:00:00
[ [ "Cowles", "John", "", "University of Wyoming" ], [ "Gamboa", "Ruben", "" ] ]
new_dataset
0.999508
1705.06950
Joao Carreira
Will Kay, Joao Carreira, Karen Simonyan, Brian Zhang, Chloe Hillier, Sudheendra Vijayanarasimhan, Fabio Viola, Tim Green, Trevor Back, Paul Natsev, Mustafa Suleyman and Andrew Zisserman
The Kinetics Human Action Video Dataset
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the DeepMind Kinetics human action video dataset. The dataset contains 400 human action classes, with at least 400 video clips for each action. Each clip lasts around 10s and is taken from a different YouTube video. The actions are human focussed and cover a broad range of classes including human-object interactions such as playing instruments, as well as human-human interactions such as shaking hands. We describe the statistics of the dataset, how it was collected, and give some baseline performance figures for neural network architectures trained and tested for human action classification on this dataset. We also carry out a preliminary analysis of whether imbalance in the dataset leads to bias in the classifiers.
[ { "version": "v1", "created": "Fri, 19 May 2017 12:07:01 GMT" } ]
2017-05-22T00:00:00
[ [ "Kay", "Will", "" ], [ "Carreira", "Joao", "" ], [ "Simonyan", "Karen", "" ], [ "Zhang", "Brian", "" ], [ "Hillier", "Chloe", "" ], [ "Vijayanarasimhan", "Sudheendra", "" ], [ "Viola", "Fabio", "" ], [ "Green", "Tim", "" ], [ "Back", "Trevor", "" ], [ "Natsev", "Paul", "" ], [ "Suleyman", "Mustafa", "" ], [ "Zisserman", "Andrew", "" ] ]
new_dataset
0.999436
1705.06960
Marco Giordani
Marco Giordani, Andrea Zanella, Michele Zorzi
Technical Report - MillimeterWave Communication in Vehicular Networks: Coverage and Connectivity Analysis
This document is a preliminary report which describes the mathematical model developed to carry out the results proposed in our work "Millimeter Wave Communication in Vehicular Networks: Challenges and Opportunities", accepted to International Conference on Modern Circuits and Systems Technologies (MOCAST), 2017. A more updated version of this technical report will appear in the next weeks
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this technical report (TR), we describe the mathematical model we developed to carry out a preliminary coverage and connectivity analysis in an automotive communication scenario based on mmWave links. The purpose is to exemplify some of the complex and interesting tradeoffs that have to be considered when designing solutions for mmWave automotive scenarios.
[ { "version": "v1", "created": "Wed, 26 Apr 2017 15:23:14 GMT" } ]
2017-05-22T00:00:00
[ [ "Giordani", "Marco", "" ], [ "Zanella", "Andrea", "" ], [ "Zorzi", "Michele", "" ] ]
new_dataset
0.997761
1705.06968
Shweta Sagari
Siddarth Mathur and Shweta S. Sagari and Syed Obaid Amin and Ravishankar Ravindran and Dola Saha and Ivan Seskar and Dipankar Raychaudhuri and Guoqiang Wang
Demo Abstract: CDMA-based IoT Services with Shared Band Operation of LTE in 5G
Accepted demo paper at IEEE Infocom 2017, link: http://infocom2017.ieee-infocom.org/program/demos-posters
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the vision of deployment of massive Internet-of-Things (IoTs) in 5G network, existing 4G network and protocols are inefficient to handle sporadic IoT traffic with requirements of low-latency, low control overhead and low power. To suffice these requirements, we propose a design of a PHY/MAC layer using Software Defined Radios (SDRs) that is backward compatible with existing OFDM based LTE protocols and supports CDMA based transmissions for low power IoT devices as well. This demo shows our implemented system based on that design and the viability of the proposal under different network scenarios.
[ { "version": "v1", "created": "Wed, 10 May 2017 15:50:05 GMT" } ]
2017-05-22T00:00:00
[ [ "Mathur", "Siddarth", "" ], [ "Sagari", "Shweta S.", "" ], [ "Amin", "Syed Obaid", "" ], [ "Ravindran", "Ravishankar", "" ], [ "Saha", "Dola", "" ], [ "Seskar", "Ivan", "" ], [ "Raychaudhuri", "Dipankar", "" ], [ "Wang", "Guoqiang", "" ] ]
new_dataset
0.987524
1705.07080
Karttikeya Mangalam
Karttikeya Mangalam, K S Venkatesh
Bitwise Operations of Cellular Automaton on Gray-scale Images
5 Pages. The code is available at : https://github.com/karttikeya/Bitwise-CA-Opeartions/
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cellular Automata (CA) theory is a discrete model that represents the state of each of its cells from a finite set of possible values which evolve in time according to a pre-defined set of transition rules. CA have been applied to a number of image processing tasks such as Convex Hull Detection, Image Denoising etc. but mostly under the limitation of restricting the input to binary images. In general, a gray-scale image may be converted to a number of different binary images which are finally recombined after CA operations on each of them individually. We have developed a multinomial regression based weighed summation method to recombine binary images for better performance of CA based Image Processing algorithms. The recombination algorithm is tested for the specific case of denoising Salt and Pepper Noise to test against standard benchmark algorithms such as the Median Filter for various images and noise levels. The results indicate several interesting invariances in the application of the CA, such as the particular noise realization and the choice of sub-sampling of pixels to determine recombination weights. Additionally, it appears that simpler algorithms for weight optimization which seek local minima work as effectively as those that seek global minima such as Simulated Annealing.
[ { "version": "v1", "created": "Fri, 19 May 2017 16:34:29 GMT" } ]
2017-05-22T00:00:00
[ [ "Mangalam", "Karttikeya", "" ], [ "Venkatesh", "K S", "" ] ]
new_dataset
0.998097
1605.06884
Seongah Jeong
Seongah Jeong and Osvaldo Simeone and Joonhyuk Kang
Mobile Cloud Computing with a UAV-Mounted Cloudlet: Optimal Bit Allocation for Communication and Computation
21 pages, 3 figures, 1 Table, accepted in IET Communications
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile cloud computing relieves the tension between compute-intensive mobile applications and battery-constrained mobile devices by enabling the offloading of computing tasks from mobiles to a remote processors. This paper considers a mobile cloud computing scenario in which the "cloudlet" processor that provides offloading opportunities to mobile devices is mounted on unmanned aerial vehicles (UAVs) to enhance coverage. Focusing on a slotted communication system with frequency division multiplexing between mobile and UAV, the joint optimization of the number of input bits transmitted in the uplink by the mobile to the UAV, the number of input bits processed by the cloudlet at the UAV, and the number of output bits returned by the cloudlet to the mobile in the downlink in each slot is carried out by means of dual decomposition under maximum latency constraints with the aim of minimizing the mobile energy consumption. Numerical results reveal the critical importance of an optimized bit allocation in order to enable significant energy savings as compared to local mobile execution for stringent latency constraints.
[ { "version": "v1", "created": "Mon, 23 May 2016 03:36:39 GMT" }, { "version": "v2", "created": "Sun, 18 Sep 2016 17:12:05 GMT" }, { "version": "v3", "created": "Thu, 18 May 2017 04:10:24 GMT" } ]
2017-05-19T00:00:00
[ [ "Jeong", "Seongah", "" ], [ "Simeone", "Osvaldo", "" ], [ "Kang", "Joonhyuk", "" ] ]
new_dataset
0.986732
1609.05362
Seongah Jeong
Seongah Jeong and Osvaldo Simeone and Joonhyuk Kang
Mobile Edge Computing via a UAV-Mounted Cloudlet: Optimization of Bit Allocation and Path Planning
14 pages, 5 figures, 2 tables, IEEE Transactions on Vehicular Technology
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unmanned Aerial Vehicles (UAVs) have been recently considered as means to provide enhanced coverage or relaying services to mobile users (MUs) in wireless systems with limited or no infrastructure. In this paper, a UAV-based mobile cloud computing system is studied in which a moving UAV is endowed with computing capabilities to offer computation offloading opportunities to MUs with limited local processing capabilities. The system aims at minimizing the total mobile energy consumption while satisfying quality of service requirements of the offloaded mobile application. Offloading is enabled by uplink and downlink communications between the mobile devices and the UAV that take place by means of frequency division duplex (FDD) via orthogonal or non-orthogonal multiple access (NOMA) schemes. The problem of jointly optimizing the bit allocation for uplink and downlink communication as well as for computing at the UAV, along with the cloudlet's trajectory under latency and UAV's energy budget constraints is formulated and addressed by leveraging successive convex approximation (SCA) strategies. Numerical results demonstrate the significant energy savings that can be accrued by means of the proposed joint optimization of bit allocation and cloudlet's trajectory as compared to local mobile execution as well as to partial optimization approaches that design only the bit allocation or the cloudlet's trajectory.
[ { "version": "v1", "created": "Sat, 17 Sep 2016 16:41:25 GMT" }, { "version": "v2", "created": "Tue, 21 Mar 2017 16:14:42 GMT" }, { "version": "v3", "created": "Thu, 18 May 2017 17:42:50 GMT" } ]
2017-05-19T00:00:00
[ [ "Jeong", "Seongah", "" ], [ "Simeone", "Osvaldo", "" ], [ "Kang", "Joonhyuk", "" ] ]
new_dataset
0.961017
1705.04560
Netanel Raviv
Ron M. Roth, Netanel Raviv, Itzhak Tamo
Construction of Sidon spaces with applications to coding
Parts of this paper will be presented at the International Symposium on Information Theory (ISIT), Aachen, Germany, June 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A subspace of a finite extension field is called a Sidon space if the product of any two of its elements is unique up to a scalar multiplier from the base field. Sidon spaces were recently introduced by Bachoc et al. as a means to characterize multiplicative properties of subspaces, and yet no explicit constructions were given. In this paper, several constructions of Sidon spaces are provided. In particular, in some of the constructions the relation between $k$, the dimension of the Sidon space, and $n$, the dimension of the ambient extension field, is optimal. These constructions are shown to provide cyclic subspace codes, which are useful tools in network coding schemes. To the best of the authors' knowledge, this constitutes the first set of constructions of non-trivial cyclic subspace codes in which the relation between $k$ and $n$ is polynomial, and in particular, linear. As a result, a conjecture by Trautmann et al. regarding the existence of non-trivial cyclic subspace codes is resolved for most parameters, and multi-orbit cyclic subspace codes are attained, whose cardinality is within a constant factor (close to $1/2$) from the sphere-packing bound for subspace codes.
[ { "version": "v1", "created": "Fri, 12 May 2017 13:19:43 GMT" }, { "version": "v2", "created": "Thu, 18 May 2017 09:48:23 GMT" } ]
2017-05-19T00:00:00
[ [ "Roth", "Ron M.", "" ], [ "Raviv", "Netanel", "" ], [ "Tamo", "Itzhak", "" ] ]
new_dataset
0.979188
1705.06353
Christophe Bruchansky
Christophe Bruchansky
Political Footprints: Political Discourse Analysis using Pre-Trained Word Vectors
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we discuss how machine learning could be used to produce a systematic and more objective political discourse analysis. Political footprints are vector space models (VSMs) applied to political discourse. Each of their vectors represents a word, and is produced by training the English lexicon on large text corpora. This paper presents a simple implementation of political footprints, some heuristics on how to use them, and their application to four cases: the U.N. Kyoto Protocol and Paris Agreement, and two U.S. presidential elections. The reader will be offered a number of reasons to believe that political footprints produce meaningful results, along with some suggestions on how to improve their implementation.
[ { "version": "v1", "created": "Wed, 17 May 2017 21:29:08 GMT" } ]
2017-05-19T00:00:00
[ [ "Bruchansky", "Christophe", "" ] ]
new_dataset
0.997309
1705.06586
Erik Wittern
Erik Wittern, Annie Ying, Yunhui Zheng, Jim A. Laredo, Julian Dolby, Christopher C. Young, Aleksander A. Slominski
Opportunities in Software Engineering Research for Web API Consumption
Erik Wittern and Annie Ying are both first authors
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, invoking third party code increasingly involves calling web services via their web APIs, as opposed to the more traditional scenario of downloading a library and invoking the library's API. However, there are also new challenges for developers calling these web APIs. In this paper, we highlight a broad set of these challenges and argue for resulting opportunities for software engineering research to support developers in consuming web APIs. We outline two specific research threads in this context: (1) web API specification curation, which enables us to know the signatures of web APIs, and (2) static analysis that is capable of extracting URLs, HTTP methods etc. of web API calls. Furthermore, we present new work on how we combine (1) and (2) to provide IDE support for application developers consuming web APIs. As web APIs are used broadly, research in supporting the consumption of web APIs offers exciting opportunities.
[ { "version": "v1", "created": "Thu, 18 May 2017 13:24:18 GMT" } ]
2017-05-19T00:00:00
[ [ "Wittern", "Erik", "" ], [ "Ying", "Annie", "" ], [ "Zheng", "Yunhui", "" ], [ "Laredo", "Jim A.", "" ], [ "Dolby", "Julian", "" ], [ "Young", "Christopher C.", "" ], [ "Slominski", "Aleksander A.", "" ] ]
new_dataset
0.98948
1705.06663
Shan Zhang
Shan Zhang, Ning Zhang, Sheng Zhou, Jie Gong, Zhisheng Niu, and Xuemin (Sherman) Shen
Energy-Sustainable Traffic Steering for 5G Mobile Networks
IEEE Communications Magazine (to appear)
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Renewable energy harvesting (EH) technology is expected to be pervasively utilized in the next generation (5G) mobile networks to support sustainable network developments and operations. However, the renewable energy supply is inherently random and intermittent, which could lead to energy outage, energy overflow, quality of service (QoS) degradation, etc. Accordingly, how to enhance renewable energy sustainability is a critical issue for green networking. To this end, an energy-sustainable traffic steering framework is proposed in this article, where the traffic load is dynamically adjusted to match with energy distributions in both spatial and temporal domains by means of inter- and intra-tier steering, caching and pushing. Case studies are carried out, which demonstrate the proposed framework can reduce on-grid energy demand while satisfying QoS requirements. Research topics and challenges of energy-sustainable traffic steering are also discussed.
[ { "version": "v1", "created": "Thu, 18 May 2017 15:58:21 GMT" } ]
2017-05-19T00:00:00
[ [ "Zhang", "Shan", "", "Sherman" ], [ "Zhang", "Ning", "", "Sherman" ], [ "Zhou", "Sheng", "", "Sherman" ], [ "Gong", "Jie", "", "Sherman" ], [ "Niu", "Zhisheng", "", "Sherman" ], [ "Xuemin", "", "", "Sherman" ], [ "Shen", "", "" ] ]
new_dataset
0.981604
1705.06674
Shovan Maity
Shovan Maity, Debayan Das, Shreyas Sen
Wearable Health Monitoring Using Capacitive Voltage-Mode Human Body Communication
International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 17)
null
null
null
cs.NI cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rapid miniaturization and cost reduction of computing, along with the availability of wearable and implantable physiological sensors have led to the growth of human Body Area Network (BAN) formed by a network of such sensors and computing devices. One promising application of such a network is wearable health monitoring where the collected data from the sensors would be transmitted and analyzed to assess the health of a person. Typically, the devices in a BAN are connected through wireless (WBAN), which suffers from energy inefficiency due to the high-energy consumption of wireless transmission. Human Body Communication (HBC) uses the relatively low loss human body as the communication medium to connect these devices, promising order(s) of magnitude better energy-efficiency and built-in security compared to WBAN. In this paper, we demonstrate a health monitoring device and system built using Commercial-Off-The- Shelf (COTS) sensors and components, that can collect data from physiological sensors and transmit it through a) intra-body HBC to another device (hub) worn on the body or b) upload health data through HBC-based human-machine interaction to an HBC capable machine. The system design constraints and signal transfer characteristics for the implemented HBC-based wearable health monitoring system are measured and analyzed, showing reliable connectivity with >8x power savings compared to Bluetooth lowenergy (BTLE).
[ { "version": "v1", "created": "Sun, 14 May 2017 04:18:18 GMT" } ]
2017-05-19T00:00:00
[ [ "Maity", "Shovan", "" ], [ "Das", "Debayan", "" ], [ "Sen", "Shreyas", "" ] ]
new_dataset
0.998356
1508.03619
Scott Beamer
Scott Beamer, Krste Asanovi\'c, David Patterson
The GAP Benchmark Suite
small revisions to correspond to v1.0
null
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a graph processing benchmark suite with the goal of helping to standardize graph processing evaluations. Fewer differences between graph processing evaluations will make it easier to compare different research efforts and quantify improvements. The benchmark not only specifies graph kernels, input graphs, and evaluation methodologies, but it also provides optimized baseline implementations. These baseline implementations are representative of state-of-the-art performance, and thus new contributions should outperform them to demonstrate an improvement. The input graphs are sized appropriately for shared memory platforms, but any implementation on any platform that conforms to the benchmark's specifications could be compared. This benchmark suite can be used in a variety of settings. Graph framework developers can demonstrate the generality of their programming model by implementing all of the benchmark's kernels and delivering competitive performance on all of the benchmark's graphs. Algorithm designers can use the input graphs and the baseline implementations to demonstrate their contribution. Platform designers and performance analysts can use the suite as a workload representative of graph processing.
[ { "version": "v1", "created": "Fri, 14 Aug 2015 19:46:48 GMT" }, { "version": "v2", "created": "Fri, 2 Oct 2015 23:40:36 GMT" }, { "version": "v3", "created": "Tue, 6 Oct 2015 17:51:24 GMT" }, { "version": "v4", "created": "Tue, 16 May 2017 19:14:14 GMT" } ]
2017-05-18T00:00:00
[ [ "Beamer", "Scott", "" ], [ "Asanović", "Krste", "" ], [ "Patterson", "David", "" ] ]
new_dataset
0.973771
1703.07076
Esben Jannik Bjerrum
Esben Jannik Bjerrum
SMILES Enumeration as Data Augmentation for Neural Network Modeling of Molecules
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simplified Molecular Input Line Entry System (SMILES) is a single line text representation of a unique molecule. One molecule can however have multiple SMILES strings, which is a reason that canonical SMILES have been defined, which ensures a one to one correspondence between SMILES string and molecule. Here the fact that multiple SMILES represent the same molecule is explored as a technique for data augmentation of a molecular QSAR dataset modeled by a long short term memory (LSTM) cell based neural network. The augmented dataset was 130 times bigger than the original. The network trained with the augmented dataset shows better performance on a test set when compared to a model built with only one canonical SMILES string per molecule. The correlation coefficient R2 on the test set was improved from 0.56 to 0.66 when using SMILES enumeration, and the root mean square error (RMS) likewise fell from 0.62 to 0.55. The technique also works in the prediction phase. By taking the average per molecule of the predictions for the enumerated SMILES a further improvement to a correlation coefficient of 0.68 and a RMS of 0.52 was found.
[ { "version": "v1", "created": "Tue, 21 Mar 2017 07:13:13 GMT" }, { "version": "v2", "created": "Wed, 17 May 2017 11:24:43 GMT" } ]
2017-05-18T00:00:00
[ [ "Bjerrum", "Esben Jannik", "" ] ]
new_dataset
0.99359
1704.03972
Zhilin Wu
Yu-Fang Chen, Ondrej Lengal, Tony Tan, Zhilin Wu
Register automata with linear arithmetic
null
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel automata model over the alphabet of rational numbers, which we call register automata over the rationals (RA-Q). It reads a sequence of rational numbers and outputs another rational number. RA-Q is an extension of the well-known register automata (RA) over infinite alphabets, which are finite automata equipped with a finite number of registers/variables for storing values. Like in the standard RA, the RA-Q model allows both equality and ordering tests between values. It, moreover, allows to perform linear arithmetic between certain variables. The model is quite expressive: in addition to the standard RA, it also generalizes other well-known models such as affine programs and arithmetic circuits. The main feature of RA-Q is that despite the use of linear arithmetic, the so-called invariant problem---a generalization of the standard non-emptiness problem---is decidable. We also investigate other natural decision problems, namely, commutativity, equivalence, and reachability. For deterministic RA-Q, commutativity and equivalence are polynomial-time inter-reducible with the invariant problem.
[ { "version": "v1", "created": "Thu, 13 Apr 2017 02:20:25 GMT" }, { "version": "v2", "created": "Wed, 17 May 2017 13:13:57 GMT" } ]
2017-05-18T00:00:00
[ [ "Chen", "Yu-Fang", "" ], [ "Lengal", "Ondrej", "" ], [ "Tan", "Tony", "" ], [ "Wu", "Zhilin", "" ] ]
new_dataset
0.999587
1705.05832
Abdulrahman Elnekiti
Abdulrhman Elnekiti
New Directions In Cellular Automata
Pre-print submission to Complex Systems journal
null
null
null
cs.FL nlin.CG
http://creativecommons.org/licenses/by/4.0/
We Propose A Novel Automaton Model which uses Arithmetic Operations as the Evolving Rules, each cell has the states of the Natural Numbers k = (N), a radius of r = 1/2 and operates on an arbitrary input size. The Automaton reads an Arithmetic Expression as an input and outputs another Arithmetic Expression. In Addition, we simulate a variety of One Dimensional Cellular Automata Structures with different Dynamics including Elementary Cellular Automata.
[ { "version": "v1", "created": "Wed, 17 May 2017 01:46:21 GMT" } ]
2017-05-18T00:00:00
[ [ "Elnekiti", "Abdulrhman", "" ] ]
new_dataset
0.999386
1705.05893
Indrasen Bhattacharya
Brett Kelly, Indrasen Bhattacharya, Maxim Shusteff, Robert M. Panas, Hayden K. Taylor, Christopher M. Spadaccini
Computed Axial Lithography (CAL): Toward Single Step 3D Printing of Arbitrary Geometries
10 pages, 17 figure, ACM SIGGRAPH format
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most additive manufacturing processes today operate by printing voxels (3D pixels) serially point-by-point to build up a 3D part. In some more recently-developed techniques, for example optical printing methods such as projection stereolithography [Zheng et al. 2012], [Tumbleston et al. 2015], parts are printed layer-by-layer by curing full 2d (very thin in one dimension) layers of the 3d part in each print step. There does not yet exist a technique which is able to print arbitrarily-defined 3D geometries in a single print step. If such a technique existed, it could be used to expand the range of printable geometries in additive manufacturing and relax constraints on factors such as overhangs in topology optimization. It could also vastly increase print speed for 3D parts. In this work, we develop the principles for an approach for single exposure 3D printing of arbitrarily defined geometries. The approach, termed Computed Axial Lithgography (CAL), is based on tomographic reconstruction, with mathematical optimization to generate a set of projections to optically define an arbitrary dose distribution within a target volume. We demonstrate the potential ability of the technique to print 3D parts using a prototype CAL system based on sequential illumination from many angles. We also propose new hardware designs which will help us to realize true single-shot arbitrary-geometry 3D CAL.
[ { "version": "v1", "created": "Tue, 16 May 2017 19:56:58 GMT" } ]
2017-05-18T00:00:00
[ [ "Kelly", "Brett", "" ], [ "Bhattacharya", "Indrasen", "" ], [ "Shusteff", "Maxim", "" ], [ "Panas", "Robert M.", "" ], [ "Taylor", "Hayden K.", "" ], [ "Spadaccini", "Christopher M.", "" ] ]
new_dataset
0.989377
1705.05953
Mehrdad Hessar
Vamsi Talla, Mehrdad Hessar, Bryce Kellogg, Ali Najafi, Joshua R. Smith and Shyamnath Gollakota
LoRa Backscatter: Enabling The Vision of Ubiquitous Connectivity
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The vision of embedding connectivity into billions of everyday objects runs into the reality of existing communication technologies --- there is no existing wireless technology that can provide reliable and long-range communication at tens of microwatts of power as well as cost less than a dime. While backscatter is low-power and low-cost, it is known to be limited to short ranges. This paper overturns this conventional wisdom about backscatter and presents the first wide-area backscatter system. Our design can successfully backscatter from any location between an RF source and receiver, separated by 475 m, while being compatible with commodity LoRa hardware. Further, when our backscatter device is co-located with the RF source, the receiver can be as far as 2.8 km away. We deploy our system in a 4,800 $ft^{2}$ (446 $m^{2}$) house spread across three floors, a 13,024 $ft^{2}$ (1210 $m^{2}$) office area covering 41 rooms, as well as a one-acre (4046 $m^{2}$) vegetable farm and show that we can achieve reliable coverage, using only a single RF source and receiver. We also build a contact lens prototype as well as a flexible epidermal patch device attached to the human skin. We show that these devices can reliably backscatter data across a 3,328 $ft^{2}$ (309 $m^{2}$) room. Finally, we present a design sketch of a LoRa backscatter IC that shows that it costs less than a dime at scale and consumes only 9.25 $\mu$W of power, which is more than 1000x lower power than LoRa radio chipsets.
[ { "version": "v1", "created": "Tue, 16 May 2017 23:15:06 GMT" } ]
2017-05-18T00:00:00
[ [ "Talla", "Vamsi", "" ], [ "Hessar", "Mehrdad", "" ], [ "Kellogg", "Bryce", "" ], [ "Najafi", "Ali", "" ], [ "Smith", "Joshua R.", "" ], [ "Gollakota", "Shyamnath", "" ] ]
new_dataset
0.99792
1705.06002
Aubrey Alston
Aubrey Alston
Attribute-based Encryption for Attribute-based Authentication, Authorization, Storage, and Transmission in Distributed Storage Systems
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Attribute-based encryption is a form of encryption which offers the capacity to encrypt data such that it is only accessible to individuals holding a satisfactory configuration of attributes. As cloud and distributed computing become more pervasive in both private and public spheres, attribute-based encryption holds potential to address the issue of achieving secure authentication, authorization, and transmission in these environments where performance must scale with security while also supporting fine-grained access control among a massively large number of consumers. With this work, we offer an example generic configurable stateless protocol for secure attribute-based authentication, authorization, storage, and transmission in distributed storage systems based upon ciphertext-policy attribute-based encryption (CP-ABE), discuss the experience of implementing a distributed storage system around this protocol, and present future avenues of work enabled by such a protocol. The key contribution of this work is an illustration of a means by which any CP-ABE system may be utilized in a black-box manner for attribute-based authentication and cryptographically enforced attribute-based access control in distributed storage systems.
[ { "version": "v1", "created": "Wed, 17 May 2017 04:23:45 GMT" } ]
2017-05-18T00:00:00
[ [ "Alston", "Aubrey", "" ] ]
new_dataset
0.998186
1705.06072
Guang Yang
Ming Xiao, Shahid Mumtaz, Yongming Huang, Linglong Dai, Yonghui Li, Michail Matthaiou, George K. Karagiannidis, Emil Bj\"ornson, Kai Yang, Chih Lin, Amitava Ghosh
Millimeter Wave Communications for Future Mobile Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Millimeter wave (mmWave) communications have recently attracted large research interest, since the huge available bandwidth can potentially lead to rates of multiple Gbps (gigabit per second) per user. Though mmWave can be readily used in stationary scenarios such as indoor hotspots or backhaul, it is challenging to use mmWave in mobile networks, where the transmitting/receiving nodes may be moving, channels may have a complicated structure, and the coordination among multiple nodes is difficult. To fully exploit the high potential rates of mmWave in mobile networks, lots of technical problems must be addressed. This paper presents a comprehensive survey of mmWave communications for future mobile networks (5G and beyond). We first summarize the recent channel measurement campaigns and modeling results. Then, we discuss in detail recent progresses in multiple input multiple output (MIMO) transceiver design for mmWave communications. After that, we provide an overview of the solution for multiple access and backhauling, followed by analysis of coverage and connectivity. Finally, the progresses in the standardization and deployment of mmWave for mobile networks are discussed.
[ { "version": "v1", "created": "Wed, 17 May 2017 10:02:57 GMT" } ]
2017-05-18T00:00:00
[ [ "Xiao", "Ming", "" ], [ "Mumtaz", "Shahid", "" ], [ "Huang", "Yongming", "" ], [ "Dai", "Linglong", "" ], [ "Li", "Yonghui", "" ], [ "Matthaiou", "Michail", "" ], [ "Karagiannidis", "George K.", "" ], [ "Björnson", "Emil", "" ], [ "Yang", "Kai", "" ], [ "Lin", "Chih", "" ], [ "Ghosh", "Amitava", "" ] ]
new_dataset
0.99925
1705.06086
Sebastian Werner
Sebastian Werner, Zdravko Velinov, Wenzel Jakob, Matthias B. Hullin
Scratch iridescence: Wave-optical rendering of diffractive surface structure
null
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The surface of metal, glass and plastic objects is often characterized by microscopic scratches caused by manufacturing and/or wear. A closer look onto such scratches reveals iridescent colors with a complex dependency on viewing and lighting conditions. The physics behind this phenomenon is well understood; it is caused by diffraction of the incident light by surface features on the order of the optical wavelength. Existing analytic models are able to reproduce spatially unresolved microstructure such as the iridescent appearance of compact disks and similar materials. Spatially resolved scratches, on the other hand, have proven elusive due to the highly complex wave-optical light transport simulations needed to account for their appearance. In this paper, we propose a wave-optical shading model based on non-paraxial scalar diffraction theory to render this class of effects. Our model expresses surface roughness as a collection of line segments. To shade a point on the surface, the individual diffraction patterns for contributing scratch segments are computed analytically and superimposed coherently. This provides natural transitions from localized glint-like iridescence to smooth BRDFs representing the superposition of many reflections at large viewing distances. We demonstrate that our model is capable of recreating the overall appearance as well as characteristic detail effects observed on real-world examples.
[ { "version": "v1", "created": "Wed, 17 May 2017 10:59:29 GMT" } ]
2017-05-18T00:00:00
[ [ "Werner", "Sebastian", "" ], [ "Velinov", "Zdravko", "" ], [ "Jakob", "Wenzel", "" ], [ "Hullin", "Matthias B.", "" ] ]
new_dataset
0.999142
1705.06134
Fredrik Johansson
Claus Fieker, William Hart, Tommy Hofmann, Fredrik Johansson
Nemo/Hecke: Computer Algebra and Number Theory Packages for the Julia Programming Language
ISSAC '17, Kaiserslautern, Germany, July 25-28, 2017, 8 pages
null
10.1145/3087604.3087611
null
cs.MS cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce two new packages, Nemo and Hecke, written in the Julia programming language for computer algebra and number theory. We demonstrate that high performance generic algorithms can be implemented in Julia, without the need to resort to a low-level C implementation. For specialised algorithms, we use Julia's efficient native C interface to wrap existing C/C++ libraries such as Flint, Arb, Antic and Singular. We give examples of how to use Hecke and Nemo and discuss some algorithms that we have implemented to provide high performance basic arithmetic.
[ { "version": "v1", "created": "Wed, 17 May 2017 13:10:32 GMT" } ]
2017-05-18T00:00:00
[ [ "Fieker", "Claus", "" ], [ "Hart", "William", "" ], [ "Hofmann", "Tommy", "" ], [ "Johansson", "Fredrik", "" ] ]
new_dataset
0.998571
1705.06247
Douglas Stinson
Douglas R. Stinson
Optimal Ramp Schemes and Related Combinatorial Objects
null
null
null
null
cs.CR math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1996, Jackson and Martin proved that a strong ideal ramp scheme is equivalent to an orthogonal array. However, there was no good characterization of ideal ramp schemes that are not strong. Here we show the equivalence of ideal ramp schemes to a new variant of orthogonal arrays that we term augmented orthogonal arrays. We give some constructions for these new kinds of arrays, and, as a consequence, we also provide parameter situations where ideal ramp schemes exist but strong ideal ramp schemes do not exist.
[ { "version": "v1", "created": "Wed, 17 May 2017 16:28:20 GMT" } ]
2017-05-18T00:00:00
[ [ "Stinson", "Douglas R.", "" ] ]
new_dataset
0.996167
1705.06250
Majid Masoumi
Majid Masoumi and A. Ben Hamza
Shape Classification using Spectral Graph Wavelets
null
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectral shape descriptors have been used extensively in a broad spectrum of geometry processing applications ranging from shape retrieval and segmentation to classification. In this pa- per, we propose a spectral graph wavelet approach for 3D shape classification using the bag-of-features paradigm. In an effort to capture both the local and global geometry of a 3D shape, we present a three-step feature description framework. First, local descriptors are extracted via the spectral graph wavelet transform having the Mexican hat wavelet as a generating ker- nel. Second, mid-level features are obtained by embedding lo- cal descriptors into the visual vocabulary space using the soft- assignment coding step of the bag-of-features model. Third, a global descriptor is constructed by aggregating mid-level fea- tures weighted by a geodesic exponential kernel, resulting in a matrix representation that describes the frequency of appearance of nearby codewords in the vocabulary. Experimental results on two standard 3D shape benchmarks demonstrate the effective- ness of the proposed classification approach in comparison with state-of-the-art methods.
[ { "version": "v1", "created": "Fri, 12 May 2017 01:23:55 GMT" } ]
2017-05-18T00:00:00
[ [ "Masoumi", "Majid", "" ], [ "Hamza", "A. Ben", "" ] ]
new_dataset
0.997401
1612.00558
Basura Fernando
Basura Fernando, Sareh Shirazi and Stephen Gould
Unsupervised Human Action Detection by Action Matching
IEEE International Conference on Computer Vision and Pattern Recognition CVPR 2017 Workshops
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new task of unsupervised action detection by action matching. Given two long videos, the objective is to temporally detect all pairs of matching video segments. A pair of video segments are matched if they share the same human action. The task is category independent---it does not matter what action is being performed---and no supervision is used to discover such video segments. Unsupervised action detection by action matching allows us to align videos in a meaningful manner. As such, it can be used to discover new action categories or as an action proposal technique within, say, an action detection pipeline. Moreover, it is a useful pre-processing step for generating video highlights, e.g., from sports videos. We present an effective and efficient method for unsupervised action detection. We use an unsupervised temporal encoding method and exploit the temporal consistency in human actions to obtain candidate action segments. We evaluate our method on this challenging task using three activity recognition benchmarks, namely, the MPII Cooking activities dataset, the THUMOS15 action detection benchmark and a new dataset called the IKEA dataset. On the MPII Cooking dataset we detect action segments with a precision of 21.6% and recall of 11.7% over 946 long video pairs and over 5000 ground truth action segments. Similarly, on THUMOS dataset we obtain 18.4% precision and 25.1% recall over 5094 ground truth action segment pairs.
[ { "version": "v1", "created": "Fri, 2 Dec 2016 03:39:38 GMT" }, { "version": "v2", "created": "Mon, 3 Apr 2017 03:36:17 GMT" }, { "version": "v3", "created": "Wed, 5 Apr 2017 06:18:22 GMT" }, { "version": "v4", "created": "Tue, 16 May 2017 00:56:24 GMT" } ]
2017-05-17T00:00:00
[ [ "Fernando", "Basura", "" ], [ "Shirazi", "Sareh", "" ], [ "Gould", "Stephen", "" ] ]
new_dataset
0.985905
1703.04935
Nikolaos Giatsoglou
Nikolaos Giatsoglou, Konstantinos Ntontin, Elli Kartsakli, Angelos Antonopoulos, Christos Verikoukis
D2D-Aware Device Caching in MmWave-Cellular Networks
added main body of the paper
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel policy for device caching that facilitates popular content exchange through high-rate device-to-device (D2D) millimeter-wave (mmWave) communication. The D2D-aware caching (DAC) policy splits the cacheable content into two content groups and distributes it randomly to the user equipment devices (UEs), with the goal to enable D2D connections. By exploiting the high bandwidth availability and the directionality of mmWaves, we ensure high rates for the D2D transmissions, while mitigating the co-channel interference that limits the throughput gains of D2D communication in the sub-6 GHz bands. Furthermore, based on a stochastic-geometry modeling of the network topology, we analytically derive the offloading gain that is achieved by the proposed policy and the distribution of the content retrieval delay considering both half- and full-duplex mode for the D2D communication. The accuracy of the proposed analytical framework is validated through Monte-Carlo simulations. In addition, for a wide range of a content popularity indicator the results show that the proposed policy achieves higher offloading and lower content-retrieval delays than existing state-of-the-art approaches.
[ { "version": "v1", "created": "Wed, 15 Mar 2017 05:28:33 GMT" }, { "version": "v2", "created": "Tue, 16 May 2017 15:43:07 GMT" } ]
2017-05-17T00:00:00
[ [ "Giatsoglou", "Nikolaos", "" ], [ "Ntontin", "Konstantinos", "" ], [ "Kartsakli", "Elli", "" ], [ "Antonopoulos", "Angelos", "" ], [ "Verikoukis", "Christos", "" ] ]
new_dataset
0.970597
1705.01864
Carlo Condo
Carlo Condo, Seyyed Ali Hashemi, Warren J. Gross
Blind Detection with Polar Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In blind detection, a set of candidates has to be decoded within a strict time constraint, to identify which transmissions are directed at the user equipment. Blind detection is an operation required by the 3GPP LTE/LTE-Advanced standard, and it will be required in the 5th generation wireless communication standard (5G) as well. We propose a blind detection scheme based on polar codes, where the radio network temporary identifier (RNTI) is transmitted instead of some of the frozen bits. A low-complexity decoding stage decodes all candidates, selecting a subset that is decoded by a high-performance algorithm. Simulations results show good missed detection and false alarm rates, that meet the system specifications. We also propose an early stopping criterion for the second decoding stage that can reduce the number of operations performed, improving both average latency and energy consumption. The detection speed is analyzed and different system parameter combinations are shown to meet the stringent timing requirements, leading to various implementation trade-offs.
[ { "version": "v1", "created": "Thu, 4 May 2017 14:51:21 GMT" }, { "version": "v2", "created": "Tue, 16 May 2017 03:44:20 GMT" } ]
2017-05-17T00:00:00
[ [ "Condo", "Carlo", "" ], [ "Hashemi", "Seyyed Ali", "" ], [ "Gross", "Warren J.", "" ] ]
new_dataset
0.985579
1705.05455
Saad Bin Ahmed
Saad Bin Ahmed, Saeeda Naz, Salahuddin Swati, Muhammad Imran Razzak
Handwritten Urdu Character Recognition using 1-Dimensional BLSTM Classifier
10 pages, Accepted in NCA for publication
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recognition of cursive script is regarded as a subtle task in optical character recognition due to its varied representation. Every cursive script has different nature and associated challenges. As Urdu is one of cursive language that is derived from Arabic script, thats why it nearly shares the same challenges and difficulties even more harder. We can categorized Urdu and Arabic language on basis of its script they use. Urdu is mostly written in Nastaliq style whereas, Arabic follows Naskh style of writing. This paper presents new and comprehensive Urdu handwritten offline database name Urdu-Nastaliq Handwritten Dataset (UNHD). Currently, there is no standard and comprehensive Urdu handwritten dataset available publicly for researchers. The acquired dataset covers commonly used ligatures that were written by 500 writers with their natural handwriting on A4 size paper. We performed experiments using recurrent neural networks and reported a significant accuracy for handwritten Urdu character recognition.
[ { "version": "v1", "created": "Mon, 15 May 2017 21:13:08 GMT" } ]
2017-05-17T00:00:00
[ [ "Ahmed", "Saad Bin", "" ], [ "Naz", "Saeeda", "" ], [ "Swati", "Salahuddin", "" ], [ "Razzak", "Muhammad Imran", "" ] ]
new_dataset
0.99929
1705.05464
Leopoldo Armesto
Leopoldo Armesto
Dise\~na, Fabrica y Programa Tu Propio Robot
21 pages, in Spanish, 10 figures
null
null
null
cs.RO
http://creativecommons.org/licenses/by-sa/4.0/
In this document we present DYOR, an educational robot that you can make at home or at class. The robot has been created by students at the Universitat Polit\'ecnica de Val\`encia and me through their projects and masther thesis and it has been used in my subjects at the University so my students dessign, make and program their own robot with low-cost materials.
[ { "version": "v1", "created": "Mon, 15 May 2017 21:56:00 GMT" } ]
2017-05-17T00:00:00
[ [ "Armesto", "Leopoldo", "" ] ]
new_dataset
0.99888
1705.05476
Marco Tulio Valente
Marcos Viana, Andre Hora, Marco Tulio Valente
CodeCity for (and by) JavaScript
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
JavaScript is one of the most popular programming languages on the web. Despite the language popularity and the increasing size of JavaScript systems, there is a limited number of visualization tools that can be used by developers to comprehend, maintain, and evolve JavaScript software. In this paper, we introduce JSCity, an implementation in JavaScript of the well-known Code City software visualization metaphor. JSCity relies on JavaScript features and libraries to show "software cities" in standard web browsers, without requiring complex installation procedures. We also report our experience on producing visualizations for 40 popular JavaScript systems using JScity.
[ { "version": "v1", "created": "Mon, 15 May 2017 23:09:54 GMT" } ]
2017-05-17T00:00:00
[ [ "Viana", "Marcos", "" ], [ "Hora", "Andre", "" ], [ "Valente", "Marco Tulio", "" ] ]
new_dataset
0.955995
1705.05483
Andrei Polzounov
Andrei Polzounov, Artsiom Ablavatski, Sergio Escalera, Shijian Lu, Jianfei Cai
WordFence: Text Detection in Natural Images with Border Awareness
5 pages, 2 figures, ICIP 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, text recognition has achieved remarkable success in recognizing scanned document text. However, word recognition in natural images is still an open problem, which generally requires time consuming post-processing steps. We present a novel architecture for individual word detection in scene images based on semantic segmentation. Our contributions are twofold: the concept of WordFence, which detects border areas surrounding each individual word and a novel pixelwise weighted softmax loss function which penalizes background and emphasizes small text regions. WordFence ensures that each word is detected individually, and the new loss function provides a strong training signal to both text and word border localization. The proposed technique avoids intensive post-processing, producing an end-to-end word detection system. We achieve superior localization recall on common benchmark datasets - 92% recall on ICDAR11 and ICDAR13 and 63% recall on SVT. Furthermore, our end-to-end word recognition system achieves state-of-the-art 86% F-Score on ICDAR13.
[ { "version": "v1", "created": "Mon, 15 May 2017 23:42:59 GMT" } ]
2017-05-17T00:00:00
[ [ "Polzounov", "Andrei", "" ], [ "Ablavatski", "Artsiom", "" ], [ "Escalera", "Sergio", "" ], [ "Lu", "Shijian", "" ], [ "Cai", "Jianfei", "" ] ]
new_dataset
0.999513
1705.05509
Yang Yang
W Su, Y Yang, Z Zhou, X Tang
New quaternary sequences of even length with optimal auto-correlation
This paper was submitted to Science China: Information Sciences at Oct 16, 2016, and accpted for publication at Apr 27, 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sequences with low auto-correlation property have been applied in code-division multiple access communication systems, radar and cryptography. Using the inverse Gray mapping, a quaternary sequence of even length $N$ can be obtained from two binary sequences of the same length, which are called component sequences. In this paper, using interleaving method, we present several classes of component sequences from twin-prime sequences pairs or GMW sequences pairs given by Tang and Ding in 2010; two, three or four binary sequences defined by cyclotomic classes of order $4$. Hence we can obtain new classes of quaternary sequences, which are different from known ones, since known component sequences are constructed from a pair of binary sequences with optimal auto-correlation or Sidel'nikov sequences.
[ { "version": "v1", "created": "Tue, 16 May 2017 03:00:11 GMT" } ]
2017-05-17T00:00:00
[ [ "Su", "W", "" ], [ "Yang", "Y", "" ], [ "Zhou", "Z", "" ], [ "Tang", "X", "" ] ]
new_dataset
0.992552
1705.05566
Marco Cattani
Marco Cattani
Opportunistic Communication in Extreme Wireless Sensor Networks
null
null
10.4233/uuid:73fe7835-43ac-4d65-bbf1-9202c7d72c45
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sensor networks can nowadays deliver 99.9% of their data with duty cycles below 1%. This remarkable performance is, however, dependent on some important underlying assumptions: low traffic rates, medium size densities and static nodes. In this thesis, we investigate the performance of these same resource-constrained devices, but under scenarios that present extreme conditions: high traffic rates, high densities and mobility: the so-called Extreme Wireless Sensor Networks (EWSNs).
[ { "version": "v1", "created": "Tue, 16 May 2017 07:48:19 GMT" } ]
2017-05-17T00:00:00
[ [ "Cattani", "Marco", "" ] ]
new_dataset
0.994558
1705.05640
Limin Wang
Wen Li, Limin Wang, Wei Li, Eirikur Agustsson, Jesse Berent, Abhinav Gupta, Rahul Sukthankar, Luc Van Gool
WebVision Challenge: Visual Learning and Understanding With Web Data
project page: http://www.vision.ee.ethz.ch/webvision/
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the 2017 WebVision Challenge, a public image recognition challenge designed for deep learning based on web images without instance-level human annotation. Following the spirit of previous vision challenges, such as ILSVRC, Places2 and PASCAL VOC, which have played critical roles in the development of computer vision by contributing to the community with large scale annotated data for model designing and standardized benchmarking, we contribute with this challenge a large scale web images dataset, and a public competition with a workshop co-located with CVPR 2017. The WebVision dataset contains more than $2.4$ million web images crawled from the Internet by using queries generated from the $1,000$ semantic concepts of the benchmark ILSVRC 2012 dataset. Meta information is also included. A validation set and test set containing human annotated images are also provided to facilitate algorithmic development. The 2017 WebVision challenge consists of two tracks, the image classification task on WebVision test set, and the transfer learning task on PASCAL VOC 2012 dataset. In this paper, we describe the details of data collection and annotation, highlight the characteristics of the dataset, and introduce the evaluation metrics.
[ { "version": "v1", "created": "Tue, 16 May 2017 10:59:23 GMT" } ]
2017-05-17T00:00:00
[ [ "Li", "Wen", "" ], [ "Wang", "Limin", "" ], [ "Li", "Wei", "" ], [ "Agustsson", "Eirikur", "" ], [ "Berent", "Jesse", "" ], [ "Gupta", "Abhinav", "" ], [ "Sukthankar", "Rahul", "" ], [ "Van Gool", "Luc", "" ] ]
new_dataset
0.998912
1705.05650
Georg Struth
Hitoshi Furusawa, Yasuo Kawahara, Georg Struth, Norihiro Tsumagari
Kleisli, Parikh and Peleg Compositions and Liftings for Multirelations
20 pages
null
10.1016/j.jlamp.2017.04.002
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multirelations provide a semantic domain for computing systems that involve two dual kinds of nondeterminism. This paper presents relational formalisations of Kleisli, Parikh and Peleg compositions and liftings of multirelations. These liftings are similar to those that arise in the Kleisli category of the powerset monad. We show that Kleisli composition of multirelations is associative, but need not have units. Parikh composition may neither be associative nor have units, but yields a category on the subclass of up-closed multirelations. Finally, Peleg composition has units, but need not be associative; a category is obtained when multirelations are union-closed.
[ { "version": "v1", "created": "Tue, 16 May 2017 11:29:33 GMT" } ]
2017-05-17T00:00:00
[ [ "Furusawa", "Hitoshi", "" ], [ "Kawahara", "Yasuo", "" ], [ "Struth", "Georg", "" ], [ "Tsumagari", "Norihiro", "" ] ]
new_dataset
0.967664
1705.05674
Carlo Condo
Carlo Condo, Seyyed Ali Hashemi, Warren J. Gross
Efficient Bit-Channel Reliability Computation for Multi-Mode Polar Code Encoders and Decoders
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes are a family of capacity-achieving error-correcting codes, and they have been selected as part of the next generation wireless communication standard. Each polar code bit-channel is assigned a reliability value, used to determine which bits transmit information and which parity. Relative reliabilities need to be known by both encoders and decoders: in case of multi-mode systems, where multiple code lengths and code rates are supported, the storage of relative reliabilities can lead to high implementation complexity. In this work, observe patterns among code reliabilities. We propose an approximate computation technique to easily represent the reliabilities of multiple codes, through a limited set of variables and update rules. The proposed method allows to tune the trade-off between reliability accuracy and implementation complexity. An approximate computation architecture for encoders and decoders is designed and implemented, showing 50.7% less area occupation than storage-based solutions, with less than 0.05 dB error correction performance degradation.
[ { "version": "v1", "created": "Tue, 16 May 2017 12:21:52 GMT" } ]
2017-05-17T00:00:00
[ [ "Condo", "Carlo", "" ], [ "Hashemi", "Seyyed Ali", "" ], [ "Gross", "Warren J.", "" ] ]
new_dataset
0.999515