id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1605.07722
|
Longqi Yang
|
Longqi Yang, Cheng-Kang Hsieh, Hongjian Yang, Nicola Dell, Serge
Belongie, Curtis Cole, Deborah Estrin
|
Yum-me: A Personalized Nutrient-based Meal Recommender System
| null | null | null | null |
cs.HC cs.AI cs.CV cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nutrient-based meal recommendations have the potential to help individuals
prevent or manage conditions such as diabetes and obesity. However, learning
people's food preferences and making recommendations that simultaneously appeal
to their palate and satisfy nutritional expectations are challenging. Existing
approaches either only learn high-level preferences or require a prolonged
learning period. We propose Yum-me, a personalized nutrient-based meal
recommender system designed to meet individuals' nutritional expectations,
dietary restrictions, and fine-grained food preferences. Yum-me enables a
simple and accurate food preference profiling procedure via a visual quiz-based
user interface, and projects the learned profile into the domain of
nutritionally appropriate food options to find ones that will appeal to the
user. We present the design and implementation of Yum-me, and further describe
and evaluate two innovative contributions. The first contriution is an open
source state-of-the-art food image analysis model, named FoodDist. We
demonstrate FoodDist's superior performance through careful benchmarking and
discuss its applicability across a wide array of dietary applications. The
second contribution is a novel online learning framework that learns food
preference from item-wise and pairwise image comparisons. We evaluate the
framework in a field study of 227 anonymous users and demonstrate that it
outperforms other baselines by a significant margin. We further conducted an
end-to-end validation of the feasibility and effectiveness of Yum-me through a
60-person user study, in which Yum-me improves the recommendation acceptance
rate by 42.63%.
|
[
{
"version": "v1",
"created": "Wed, 25 May 2016 04:13:49 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Dec 2016 14:48:18 GMT"
},
{
"version": "v3",
"created": "Sun, 30 Apr 2017 17:43:02 GMT"
}
] | 2017-05-02T00:00:00 |
[
[
"Yang",
"Longqi",
""
],
[
"Hsieh",
"Cheng-Kang",
""
],
[
"Yang",
"Hongjian",
""
],
[
"Dell",
"Nicola",
""
],
[
"Belongie",
"Serge",
""
],
[
"Cole",
"Curtis",
""
],
[
"Estrin",
"Deborah",
""
]
] |
new_dataset
| 0.989573 |
1702.02212
|
Tarek Sakakini
|
Tarek Sakakini, Suma Bhat, Pramod Viswanath
|
MORSE: Semantic-ally Drive-n MORpheme SEgment-er
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present in this paper a novel framework for morpheme segmentation which
uses the morpho-syntactic regularities preserved by word representations, in
addition to orthographic features, to segment words into morphemes. This
framework is the first to consider vocabulary-wide syntactico-semantic
information for this task. We also analyze the deficiencies of available
benchmarking datasets and introduce our own dataset that was created on the
basis of compositionality. We validate our algorithm across datasets and
present state-of-the-art results.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2017 21:49:13 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Feb 2017 00:13:28 GMT"
},
{
"version": "v3",
"created": "Mon, 1 May 2017 12:36:34 GMT"
}
] | 2017-05-02T00:00:00 |
[
[
"Sakakini",
"Tarek",
""
],
[
"Bhat",
"Suma",
""
],
[
"Viswanath",
"Pramod",
""
]
] |
new_dataset
| 0.999323 |
1704.04274
|
Jinfeng Du
|
Jinfeng Du, Reinaldo A. Valenzuela
|
How Much Spectrum is Too Much in Millimeter Wave Wireless Access
|
Accepted for publication for IEEE Journal on Selected Areas in
Communications (JSAC) Special Issue on Millimeter Wave Communications for
Future Mobile Networks
| null |
10.1109/JSAC.2017.2698859
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A great increase in wireless access rates might be attainable by using the
large amount of spectrum available in the millimeter wave (mmWave, 30 - 300
GHz) band. However, due to higher propagation losses inherent in these
frequencies, to use wider bandwidth for transmission at ranges beyond 100
meters or in non-line-of-sight (NLOS) settings may be ineffective or even
counterproductive when the penalty for estimating the channel is taken into
account. In this work we quantify the maximum beneficial bandwidth for mmWave
transmission in some typical deployment scenarios which use pilot-based channel
estimation and assume a minimum mean square error (MMSE) channel estimator at
the receiver. We find that for an I.I.D. block fading model with coherence time
$T_c$ and coherence bandwidth $B_c$, for transmitters and receivers equipped
with a single antenna, the optimal (rate-maximizing) signal-to-noise-ratio is a
constant that only depends on the product $B_cT_c$, which measures the channel
coherence and equals the average number of orthogonal symbols per each
independent channel coefficient. That is, for fixed channel coherence, the
optimal bandwidth scales linearly with the received signal power. Under some
typical deployment scenarios with both transmit and receive side beamforming, 1
GHz bandwidth can be too much.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2017 20:22:10 GMT"
}
] | 2017-05-02T00:00:00 |
[
[
"Du",
"Jinfeng",
""
],
[
"Valenzuela",
"Reinaldo A.",
""
]
] |
new_dataset
| 0.991544 |
1704.07028
|
Yuan Li
|
Jie Xue, Yuan Li, Ravi Janardan
|
On the expected diameter, width, and complexity of a stochastic
convex-hull
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate several computational problems related to the stochastic
convex hull (SCH). Given a stochastic dataset consisting of $n$ points in
$\mathbb{R}^d$ each of which has an existence probability, a SCH refers to the
convex hull of a realization of the dataset, i.e., a random sample including
each point with its existence probability. We are interested in computing
certain expected statistics of a SCH, including diameter, width, and
combinatorial complexity. For diameter, we establish the first deterministic
1.633-approximation algorithm with a time complexity polynomial in both $n$ and
$d$. For width, two approximation algorithms are provided: a deterministic
$O(1)$-approximation running in $O(n^{d+1} \log n)$ time, and a fully
polynomial-time randomized approximation scheme (FPRAS). For combinatorial
complexity, we propose an exact $O(n^d)$-time algorithm. Our solutions exploit
many geometric insights in Euclidean space, some of which might be of
independent interest.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2017 03:33:24 GMT"
},
{
"version": "v2",
"created": "Mon, 1 May 2017 05:36:14 GMT"
}
] | 2017-05-02T00:00:00 |
[
[
"Xue",
"Jie",
""
],
[
"Li",
"Yuan",
""
],
[
"Janardan",
"Ravi",
""
]
] |
new_dataset
| 0.998949 |
1705.00125
|
Patrick Judd
|
Patrick Judd, Alberto Delmas, Sayeh Sharify and Andreas Moshovos
|
Cnvlutin2: Ineffectual-Activation-and-Weight-Free Deep Neural Network
Computing
|
6 pages, 5 figures
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss several modifications and extensions over the previous proposed
Cnvlutin (CNV) accelerator for convolutional and fully-connected layers of Deep
Learning Network. We first describe different encodings of the activations that
are deemed ineffectual. The encodings have different memory overhead and energy
characteristics. We propose using a level of indirection when accessing
activations from memory to reduce their memory footprint by storing only the
effectual activations. We also present a modified organization that detects the
activations that are deemed as ineffectual while fetching them from memory.
This is different than the original design that instead detected them at the
output of the preceding layer. Finally, we present an extended CNV that can
also skip ineffectual weights.
|
[
{
"version": "v1",
"created": "Sat, 29 Apr 2017 03:49:34 GMT"
}
] | 2017-05-02T00:00:00 |
[
[
"Judd",
"Patrick",
""
],
[
"Delmas",
"Alberto",
""
],
[
"Sharify",
"Sayeh",
""
],
[
"Moshovos",
"Andreas",
""
]
] |
new_dataset
| 0.997936 |
1705.00301
|
Marei Algarni Mr.
|
Marei Algarni and Ganesh Sundaramoorthi
|
SurfCut: Surfaces of Minimal Paths From Topological Structures
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present SurfCut, an algorithm for extracting a smooth, simple surface with
an unknown 3D curve boundary from a noisy 3D image and a seed point. Our method
is built on the novel observation that certain ridge curves of a function
defined on a front propagated using the Fast Marching algorithm lie on the
surface. Our method extracts and cuts these ridges to form the surface
boundary. Our surface extraction algorithm is built on the novel observation
that the surface lies in a valley of the distance from Fast Marching. We show
that the resulting surface is a collection of minimal paths. Using the
framework of cubical complexes and Morse theory, we design algorithms to
extract these critical structures robustly. Experiments on three 3D datasets
show the robustness of our method, and that it achieves higher accuracy with
lower computational cost than state-of-the-art.
|
[
{
"version": "v1",
"created": "Sun, 30 Apr 2017 11:56:51 GMT"
}
] | 2017-05-02T00:00:00 |
[
[
"Algarni",
"Marei",
""
],
[
"Sundaramoorthi",
"Ganesh",
""
]
] |
new_dataset
| 0.999796 |
1705.00393
|
Aaron Nech
|
Aaron Nech, Ira Kemelmacher-Shlizerman
|
Level Playing Field for Million Scale Face Recognition
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Face recognition has the perception of a solved problem, however when tested
at the million-scale exhibits dramatic variation in accuracies across the
different algorithms. Are the algorithms very different? Is access to good/big
training data their secret weapon? Where should face recognition improve? To
address those questions, we created a benchmark, MF2, that requires all
algorithms to be trained on same data, and tested at the million scale. MF2 is
a public large-scale set with 672K identities and 4.7M photos created with the
goal to level playing field for large scale face recognition. We contrast our
results with findings from the other two large-scale benchmarks MegaFace
Challenge and MS-Celebs-1M where groups were allowed to train on any
private/public/big/small set. Some key discoveries: 1) algorithms, trained on
MF2, were able to achieve state of the art and comparable results to algorithms
trained on massive private sets, 2) some outperformed themselves once trained
on MF2, 3) invariance to aging suffers from low accuracies as in MegaFace,
identifying the need for larger age variations possibly within identities or
adjustment of algorithms in future testings.
|
[
{
"version": "v1",
"created": "Mon, 1 May 2017 01:04:53 GMT"
}
] | 2017-05-02T00:00:00 |
[
[
"Nech",
"Aaron",
""
],
[
"Kemelmacher-Shlizerman",
"Ira",
""
]
] |
new_dataset
| 0.955052 |
1705.00430
|
Hassan Foroosh
|
Vildan Atalay Aydin and Hassan Foroosh
|
Sub-Pixel Registration of Wavelet-Encoded Images
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sub-pixel registration is a crucial step for applications such as
super-resolution in remote sensing, motion compensation in magnetic resonance
imaging, and non-destructive testing in manufacturing, to name a few. Recently,
these technologies have been trending towards wavelet encoded imaging and
sparse/compressive sensing. The former plays a crucial role in reducing imaging
artifacts, while the latter significantly increases the acquisition speed. In
view of these new emerging needs for applications of wavelet encoded imaging,
we propose a sub-pixel registration method that can achieve direct wavelet
domain registration from a sparse set of coefficients. We make the following
contributions: (i) We devise a method of decoupling scale, rotation, and
translation parameters in the Haar wavelet domain, (ii) We derive explicit
mathematical expressions that define in-band sub-pixel registration in terms of
wavelet coefficients, (iii) Using the derived expressions, we propose an
approach to achieve in-band subpixel registration, avoiding back and forth
transformations. (iv) Our solution remains highly accurate even when a sparse
set of coefficients are used, which is due to localization of signals in a
sparse set of wavelet coefficients. We demonstrate the accuracy of our method,
and show that it outperforms the state-of-the-art on simulated and real data,
even when the data is sparse.
|
[
{
"version": "v1",
"created": "Mon, 1 May 2017 07:27:04 GMT"
}
] | 2017-05-02T00:00:00 |
[
[
"Aydin",
"Vildan Atalay",
""
],
[
"Foroosh",
"Hassan",
""
]
] |
new_dataset
| 0.999206 |
1705.00462
|
Francisco Paisana Francisco Paisana
|
Ahmed Selim, Francisco Paisana, Jerome A. Arokkiam, Yi Zhang, Linda
Doyle, Luiz A. DaSilva
|
Spectrum Monitoring for Radar Bands using Deep Convolutional Neural
Networks
|
7 pages, 10 figures, conference
| null | null | null |
cs.NI cs.IT cs.LG math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a spectrum monitoring framework for the detection
of radar signals in spectrum sharing scenarios. The core of our framework is a
deep convolutional neural network (CNN) model that enables Measurement Capable
Devices to identify the presence of radar signals in the radio spectrum, even
when these signals are overlapped with other sources of interference, such as
commercial LTE and WLAN. We collected a large dataset of RF measurements, which
include the transmissions of multiple radar pulse waveforms, downlink LTE,
WLAN, and thermal noise. We propose a pre-processing data representation that
leverages the amplitude and phase shifts of the collected samples. This
representation allows our CNN model to achieve a classification accuracy of
99.6% on our testing dataset. The trained CNN model is then tested under
various SNR values, outperforming other models, such as spectrogram-based CNN
models.
|
[
{
"version": "v1",
"created": "Mon, 1 May 2017 10:37:43 GMT"
}
] | 2017-05-02T00:00:00 |
[
[
"Selim",
"Ahmed",
""
],
[
"Paisana",
"Francisco",
""
],
[
"Arokkiam",
"Jerome A.",
""
],
[
"Zhang",
"Yi",
""
],
[
"Doyle",
"Linda",
""
],
[
"DaSilva",
"Luiz A.",
""
]
] |
new_dataset
| 0.99753 |
1705.00540
|
Ayan Chaudhury
|
Ayan Chaudhury, Christopher Ward, Ali Talasaz, Alexander G. Ivanov,
Mark Brophy, Bernard Grodzinski, Norman P.A. Huner, Rajni V. Patel and John
L. Barron
|
Machine Vision System for 3D Plant Phenotyping
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Machine vision for plant phenotyping is an emerging research area for
producing high throughput in agriculture and crop science applications. Since
2D based approaches have their inherent limitations, 3D plant analysis is
becoming state of the art for current phenotyping technologies. We present an
automated system for analyzing plant growth in indoor conditions. A gantry
robot system is used to perform scanning tasks in an automated manner
throughout the lifetime of the plant. A 3D laser scanner mounted as the robot's
payload captures the surface point cloud data of the plant from multiple views.
The plant is monitored from the vegetative to reproductive stages in light/dark
cycles inside a controllable growth chamber. An efficient 3D reconstruction
algorithm is used, by which multiple scans are aligned together to obtain a 3D
mesh of the plant, followed by surface area and volume computations. The whole
system, including the programmable growth chamber, robot, scanner, data
transfer and analysis is fully automated in such a way that a naive user can,
in theory, start the system with a mouse click and get back the growth analysis
results at the end of the lifetime of the plant with no intermediate
intervention. As evidence of its functionality, we show and analyze
quantitative results of the rhythmic growth patterns of the dicot Arabidopsis
thaliana(L.), and the monocot barley (Hordeum vulgare L.) plants under their
diurnal light/dark cycles.
|
[
{
"version": "v1",
"created": "Fri, 28 Apr 2017 01:02:12 GMT"
}
] | 2017-05-02T00:00:00 |
[
[
"Chaudhury",
"Ayan",
""
],
[
"Ward",
"Christopher",
""
],
[
"Talasaz",
"Ali",
""
],
[
"Ivanov",
"Alexander G.",
""
],
[
"Brophy",
"Mark",
""
],
[
"Grodzinski",
"Bernard",
""
],
[
"Huner",
"Norman P. A.",
""
],
[
"Patel",
"Rajni V.",
""
],
[
"Barron",
"John L.",
""
]
] |
new_dataset
| 0.998031 |
1609.01541
|
Alexandre de Castro
|
Alexandre de Castro
|
Quantum one-way permutation over the finite field of two elements
|
16 pages
|
Quantum Information Processing. 16:149 (2017)
|
10.1007/s11128-017-1599-6
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In quantum cryptography, a one-way permutation is a bounded unitary operator
$U:\mathcal{H} \to \mathcal{H}$ on a Hilbert space $\mathcal{H}$ that is easy
to compute on every input, but hard to invert given the image of a random
input. Levin [Probl. Inf. Transm., vol. 39 (1): 92-103 (2003)] has conjectured
that the unitary transformation $g(a,x)=(a,f(x)+ax)$, where $f$ is any
length-preserving function and $a,x \in GF_{{2}^{\|x\|}}$, is an
information-theoretically secure operator within a polynomial factor. Here, we
show that Levin's one-way permutation is provably secure because its output
values are four maximally entangled two-qubit states, and whose probability of
factoring them approaches zero faster than the multiplicative inverse of any
positive polynomial $poly(x)$ over the Boolean ring of all subsets of $x$. Our
results demonstrate through well-known theorems that existence of classical
one-way functions implies existence of a universal quantum one-way permutation
that cannot be inverted in subexponential time in the worst ca
|
[
{
"version": "v1",
"created": "Mon, 5 Sep 2016 11:44:18 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Nov 2016 20:02:24 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2017 22:05:06 GMT"
}
] | 2017-05-01T00:00:00 |
[
[
"de Castro",
"Alexandre",
""
]
] |
new_dataset
| 0.965367 |
1612.05395
|
Jacopo Pantaleoni
|
Jacopo Pantaleoni
|
Charted Metropolis Light Transport
|
15 pages, 6 figures - to be published in the SIGGRAPH 2017
proceedings
| null |
10.1145/3072959.3073677
| null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this manuscript, inspired by a simpler reformulation of primary sample
space Metropolis light transport, we derive a novel family of general Markov
chain Monte Carlo algorithms called charted Metropolis-Hastings, that
introduces the notion of sampling charts to extend a given sampling domain and
making it easier to sample the desired target distribution and escape from
local maxima through coordinate changes. We further apply the novel algorithms
to light transport simulation, obtaining a new type of algorithm called charted
Metropolis light transport, that can be seen as a bridge between primary sample
space and path space Metropolis light transport. The new algorithms require to
provide only right inverses of the sampling functions, a property that we
believe crucial to make them practical in the context of light transport
simulation. We further propose a method to integrate density estimation into
this framework through a novel scheme that uses it as an independence sampler.
|
[
{
"version": "v1",
"created": "Fri, 16 Dec 2016 08:41:06 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Dec 2016 09:51:25 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Dec 2016 16:58:16 GMT"
},
{
"version": "v4",
"created": "Mon, 30 Jan 2017 20:02:11 GMT"
},
{
"version": "v5",
"created": "Sun, 5 Feb 2017 20:39:49 GMT"
},
{
"version": "v6",
"created": "Wed, 26 Apr 2017 17:09:08 GMT"
},
{
"version": "v7",
"created": "Fri, 28 Apr 2017 06:43:30 GMT"
}
] | 2017-05-01T00:00:00 |
[
[
"Pantaleoni",
"Jacopo",
""
]
] |
new_dataset
| 0.996852 |
1701.03322
|
Yi Zhou Dr.
|
Yi Zhou
|
From First-Order Logic to Assertional Logic
|
arXiv admin note: text overlap with arXiv:1603.03511
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
First-Order Logic (FOL) is widely regarded as one of the most important
foundations for knowledge representation. Nevertheless, in this paper, we argue
that FOL has several critical issues for this purpose. Instead, we propose an
alternative called assertional logic, in which all syntactic objects are
categorized as set theoretic constructs including individuals, concepts and
operators, and all kinds of knowledge are formalized by equality assertions. We
first present a primitive form of assertional logic that uses minimal assumed
knowledge and constructs. Then, we show how to extend it by definitions, which
are special kinds of knowledge, i.e., assertions. We argue that assertional
logic, although simpler, is more expressive and extensible than FOL. As a case
study, we show how assertional logic can be used to unify logic and
probability, and more building blocks in AI.
|
[
{
"version": "v1",
"created": "Thu, 12 Jan 2017 12:25:42 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2017 06:09:21 GMT"
}
] | 2017-05-01T00:00:00 |
[
[
"Zhou",
"Yi",
""
]
] |
new_dataset
| 0.994876 |
1702.04466
|
Serge Kas Hanna
|
Serge Kas Hanna, Salim El Rouayheb
|
Guess & Check Codes for Deletions and Synchronization
|
Accepted in ISIT 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of constructing codes that can correct $\delta$
deletions occurring in an arbitrary binary string of length $n$ bits.
Varshamov-Tenengolts (VT) codes can correct all possible single deletions
$(\delta=1)$ with an asymptotically optimal redundancy. Finding similar codes
for $\delta \geq 2$ deletions is an open problem. We propose a new family of
codes, that we call Guess & Check (GC) codes, that can correct, with high
probability, a constant number of deletions $\delta$ occurring at uniformly
random positions within an arbitrary string. The GC codes are based on MDS
codes and have an asymptotically optimal redundancy that is $\Theta(\delta \log
n)$. We provide deterministic polynomial time encoding and decoding schemes for
these codes. We also describe the applications of GC codes to file
synchronization.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2017 05:35:08 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2017 18:47:37 GMT"
}
] | 2017-05-01T00:00:00 |
[
[
"Hanna",
"Serge Kas",
""
],
[
"Rouayheb",
"Salim El",
""
]
] |
new_dataset
| 0.991105 |
1704.08388
|
Ted Pedersen
|
Ted Pedersen
|
Duluth at Semeval-2017 Task 7 : Puns upon a midnight dreary, Lexical
Semantics for the weak and weary
|
5 pages, to Appear in the Proceedings of the 11th International
Workshop on Semantic Evaluation (SemEval 2017), August 2017, Vancouver, BC
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes the Duluth systems that participated in SemEval-2017
Task 7 : Detection and Interpretation of English Puns. The Duluth systems
participated in all three subtasks, and relied on methods that included word
sense disambiguation and measures of semantic relatedness.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2017 00:29:17 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Apr 2017 01:16:07 GMT"
}
] | 2017-05-01T00:00:00 |
[
[
"Pedersen",
"Ted",
""
]
] |
new_dataset
| 0.981154 |
1704.08695
|
Christoph Sieg
|
Philip Bechtle, Thomas Gehrmann, Christoph Sieg, Udo Zillmann
|
AWEsome: An open-source test platform for airborne wind energy systems
|
pdflatex, 25 pages, 9 figures
| null | null | null |
cs.SY cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present AWEsome (Airborne Wind Energy Standardized
Open-source Model Environment), a test platform for airborne wind energy
systems that consists of low-cost hardware and is entirely based on open-source
software. It can hence be used without the need of large financial investments,
in particular by research groups and startups to acquire first experiences in
their flight operations, to test novel control strategies or technical designs,
or for usage in public relations. Our system consists of a modified
off-the-shelf model aircraft that is controlled by the pixhawk autopilot
hardware and the ardupilot software for fixed wing aircraft. The aircraft is
attached to the ground by a tether. We have implemented new flight modes for
the autonomous tethered flight of the aircraft along periodic patterns. We
present the principal functionality of our algorithms. We report on first
successful tests of these modes in real flights.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2017 18:00:03 GMT"
}
] | 2017-05-01T00:00:00 |
[
[
"Bechtle",
"Philip",
""
],
[
"Gehrmann",
"Thomas",
""
],
[
"Sieg",
"Christoph",
""
],
[
"Zillmann",
"Udo",
""
]
] |
new_dataset
| 0.998903 |
1704.08718
|
Busi Reddy Gari Prashanth Reddy
|
Prashanth Busireddygari and Subhash Kak
|
Binary Prime Tableau Sequences
|
10
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a new class of random sequences called binary primes
tableau (PT) sequences that have potential applications in cryptography and
communications. The PT sequence of rank p is obtained from numbers arranged in
a tableau with p columns where primes are marked off until each column has at
least one prime and where the column entries are added modulo 2. We also
examine the dual to the PT sequences obtained by adding the rows of the
tableau. It is shown that PT sequences have excellent autocorrelation
properties.
|
[
{
"version": "v1",
"created": "Sun, 16 Apr 2017 04:39:29 GMT"
}
] | 2017-05-01T00:00:00 |
[
[
"Busireddygari",
"Prashanth",
""
],
[
"Kak",
"Subhash",
""
]
] |
new_dataset
| 0.998641 |
1704.08752
|
Holger Petersen
|
Holger Petersen
|
Busy Beaver Scores and Alphabet Size
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the Busy Beaver Game introduced by Rado (1962) generalized to
non-binary alphabets. Harland (2016) conjectured that activity (number of
steps) and productivity (number of non-blank symbols) of candidate machines
grow as the alphabet size increases. We prove this conjecture for any alphabet
size under the condition that the number of states is sufficiently large. For
the measure activity we show that increasing the alphabet size from two to
three allows an increase. By a classical construction it is even possible to
obtain a two-state machine increasing activity and productivity of any machine
if we allow an alphabet size depending on the number of states of the original
machine. We also show that an increase of the alphabet by a factor of three
admits an increase of activity.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2017 21:29:44 GMT"
}
] | 2017-05-01T00:00:00 |
[
[
"Petersen",
"Holger",
""
]
] |
new_dataset
| 0.999676 |
1704.08768
|
Li Li
|
Li Li and Zhu Li and Xiang Ma and Haitao Yang and Houqiang Li
|
Co-projection-plane based 3-D padding for polyhedron projection for
360-degree video
|
6 pages, 9 figures
| null | null | null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The polyhedron projection for 360-degree video is becoming more and more
popular since it can lead to much less geometry distortion compared with the
equirectangular projection. However, in the polyhedron projection, we can
observe very obvious texture discontinuity in the area near the face boundary.
Such a texture discontinuity may lead to serious quality degradation when
motion compensation crosses the discontinuous face boundary. To solve this
problem, in this paper, we first propose to fill the corresponding neighboring
faces in the suitable positions as the extension of the current face to keep
approximated texture continuity. Then a co-projection-plane based 3-D padding
method is proposed to project the reference pixels in the neighboring face to
the current face to guarantee exact texture continuity. Under the proposed
scheme, the reference pixel is always projected to the same plane with the
current pixel when performing motion compensation so that the texture
discontinuity problem can be solved. The proposed scheme is implemented in the
reference software of High Efficiency Video Coding. Compared with the existing
method, the proposed algorithm can significantly improve the rate-distortion
performance. The experimental results obviously demonstrate that the texture
discontinuity in the face boundary can be well handled by the proposed
algorithm.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2017 22:48:18 GMT"
}
] | 2017-05-01T00:00:00 |
[
[
"Li",
"Li",
""
],
[
"Li",
"Zhu",
""
],
[
"Ma",
"Xiang",
""
],
[
"Yang",
"Haitao",
""
],
[
"Li",
"Houqiang",
""
]
] |
new_dataset
| 0.953946 |
1704.08880
|
Andrzej Pelc
|
Andrzej Pelc
|
Deterministic Gathering with Crash Faults
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A team consisting of an unknown number of mobile agents, starting from
different nodes of an unknown network, have to meet at the same node and
terminate. This problem is known as {\em gathering}. We study deterministic
gathering algorithms under the assumption that agents are subject to {\em crash
faults} which can occur at any time. Two fault scenarios are considered. A {\em
motion fault} immobilizes the agent at a node or inside an edge but leaves
intact its memory at the time when the fault occurred. A more severe {\em total
fault} immobilizes the agent as well, but also erases its entire memory. Of
course, we cannot require faulty agents to gather. Thus the gathering problem
for fault prone agents calls for all fault-free agents to gather at a single
node, and terminate.
When agents move completely asynchronously, gathering with crash faults of
any type is impossible. Hence we consider a restricted version of asynchrony,
where each agent is assigned by the adversary a fixed speed, possibly different
for each agent. Agents have clocks ticking at the same rate. Each agent can
wait for a time of its choice at any node, or decide to traverse an edge but
then it moves at constant speed assigned to it. Moreover, agents have different
labels. Each agent knows its label and speed but not those of other agents.
We construct a gathering algorithm working for any team of at least two
agents in the scenario of motion faults, and a gathering algorithm working in
the presence of total faults, provided that at least two agents are fault free
all the time. If only one agent is fault free, the task of gathering with total
faults is sometimes impossible. Both our algorithms work in time polynomial in
the size of the graph, in the logarithm of the largest label, in the inverse of
the smallest speed, and in the ratio between the largest and the smallest
speed.
|
[
{
"version": "v1",
"created": "Fri, 28 Apr 2017 11:29:23 GMT"
}
] | 2017-05-01T00:00:00 |
[
[
"Pelc",
"Andrzej",
""
]
] |
new_dataset
| 0.981012 |
1606.03417
|
Zongqing Lu
|
Zongqing Lu, Guohong Cao, and Thomas La Porta
|
TeamPhone: Networking Smartphones for Disaster Recovery
| null | null |
10.1109/TMC.2017.2695452
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we investigate how to network smartphones for providing
communications in disaster recovery. By bridging the gaps among different kinds
of wireless networks, we have designed and implemented a system called
TeamPhone, which provides smartphones the capabilities of communications in
disaster recovery. Specifically, TeamPhone consists of two components: a
messaging system and a self-rescue system. The messaging system integrates
cellular networking, ad-hoc networking and opportunistic networking seamlessly,
and enables communications among rescue workers. The self-rescue system groups,
schedules and positions the smartphones of trapped survivors. Such a group of
smartphones can cooperatively wake up and send out emergency messages in an
energy-efficient manner with their location and position information so as to
assist rescue operations. We have implemented TeamPhone as a prototype
application on the Android platform and deployed it on off-the-shelf
smartphones. Experimental results demonstrate that TeamPhone can properly
fulfill communication requirements and greatly facilitate rescue operations in
disaster recovery.
|
[
{
"version": "v1",
"created": "Fri, 10 Jun 2016 18:25:33 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Mar 2017 19:13:11 GMT"
}
] | 2017-04-28T00:00:00 |
[
[
"Lu",
"Zongqing",
""
],
[
"Cao",
"Guohong",
""
],
[
"La Porta",
"Thomas",
""
]
] |
new_dataset
| 0.983572 |
1611.09011
|
Long Luo
|
Long Luo, Hongfang Yu, Shouxi Luo
|
Scalable Fine-grained Path Control in Software Defined Networks
|
9 pages, 7 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The OpenFlow-based SDN is widely studied to better network performance
through planning fine-grained paths. However, being designed to configure path
hop-by-hop, it faces the scalability issue that both the flow table overhead
and path setup delay are unacceptable for large-scale networks. In this paper,
we propose PACO, a framework based on Source Routing to address that problem
through quickly pushing paths into the packet header at network edges and
pre-installing few rules at the network core. The straightforward
implementation of SR is inefficient as it would incur too many path labels;
other efficient approaches would sacrifice path flexibility (e.g., DEFO). To
implement SR efficiently and flexibly, PACO presents each path as a
concatenation of pathlets and introduces algorithms to compute pathlets and
concatenate paths with minimum path labels. Our extensive simulations confirm
the scalability of PACO as it saves the flow table overhead up to 94% compared
with OpenFlow-SDN solutions and show that PACO outperforms SR-SDN solutions by
supporting more than 40% paths with few label overhead.
|
[
{
"version": "v1",
"created": "Mon, 28 Nov 2016 07:39:05 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2017 02:42:52 GMT"
}
] | 2017-04-28T00:00:00 |
[
[
"Luo",
"Long",
""
],
[
"Yu",
"Hongfang",
""
],
[
"Luo",
"Shouxi",
""
]
] |
new_dataset
| 0.985379 |
1702.06045
|
Haris Celik
|
Haris Celik, Ki Won Sung
|
Joint Transmission with Dummy Symbols for Dynamic TDD in Ultra-Dense
Deployments
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dynamic time-division duplexing (TDD) is considered a promising solution to
deal with fast-varying traffic often found in ultra-densely deployed networks.
At the same time, it generates more interference which may degrade the
performance of some user equipment (UE). When base station (BS) utilization is
low, some BSs may not have an UE to serve. Rather than going into sleep mode,
the idle BSs can help nearby UEs using joint transmission. To deal with
BS-to-BS interference, we propose using joint transmission with dummy symbols
where uplink BSs serving uplink UEs participate in the precoding. Since BSs are
not aware of the uplink symbols beforehand, any symbols with zero power can be
transmitted instead to null the BS-to-BS interference. Numerical results show
significant performance gains for uplink and downlink at low and medium
utilization. By varying the number of participating uplink BSs in the
precoding, we also show that it is possible to successfully trade performance
in the two directions.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2017 16:13:08 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2017 09:15:10 GMT"
}
] | 2017-04-28T00:00:00 |
[
[
"Celik",
"Haris",
""
],
[
"Sung",
"Ki Won",
""
]
] |
new_dataset
| 0.990414 |
1702.07914
|
Andreas Brandstadt
|
Andreas Brandst\"adt and Raffaele Mosca
|
On Chordal-$k$-Generalized Split Graphs
|
arXiv admin note: text overlap with arXiv:1701.03414
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A graph $G$ is a {\em chordal-$k$-generalized split graph} if $G$ is chordal
and there is a clique $Q$ in $G$ such that every connected component in $G[V
\setminus Q]$ has at most $k$ vertices. Thus, chordal-$1$-generalized split
graphs are exactly the split graphs.
We characterize chordal-$k$-generalized split graphs by forbidden induced
subgraphs. Moreover, we characterize a very special case of
chordal-$2$-generalized split graphs for which the Efficient Domination problem
is \NP-complete.
|
[
{
"version": "v1",
"created": "Sat, 25 Feb 2017 16:08:26 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Mar 2017 15:35:30 GMT"
},
{
"version": "v3",
"created": "Thu, 27 Apr 2017 08:57:31 GMT"
}
] | 2017-04-28T00:00:00 |
[
[
"Brandstädt",
"Andreas",
""
],
[
"Mosca",
"Raffaele",
""
]
] |
new_dataset
| 0.98695 |
1704.02565
|
Dafydd Gibbon
|
Dafydd Gibbon
|
Prosody: The Rhythms and Melodies of Speech
|
35 pages, 22 figures (2nd version at arxiv.org)
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The present contribution is a tutorial on selected aspects of prosody, the
rhythms and melodies of speech, based on a course of the same name at the
Summer School on Contemporary Phonetics and Phonology at Tongji University,
Shanghai, China in July 2016. The tutorial is not intended as an introduction
to experimental methodology or as an overview of the literature on the topic,
but as an outline of observationally accessible aspects of fundamental
frequency and timing patterns with the aid of computational visualisation,
situated in a semiotic framework of sign ranks and interpretations. After an
informal introduction to the basic concepts of prosody in the introduction and
a discussion of the place of prosody in the architecture of language, a
selection of acoustic phonetic topics in phonemic tone and accent prosody, word
prosody, phrasal prosody and discourse prosody are discussed, and a stylisation
method for visualising aspects of prosody is introduced. Examples are taken
from a number of typologically different languages: Anyi/Agni (Niger-Congo>Kwa,
Ivory Coast), English, Kuki-Thadou (Sino-Tibetan, North-East India and
Myanmar), Mandarin Chinese, Tem (Niger-Congo>Gur, Togo) and Farsi. The main
focus is on fundamental frequency patterns, but issues of timing and rhythm are
also discussed. In the final section, further reading and possible future
research directions are outlined.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2017 06:17:08 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Apr 2017 14:39:37 GMT"
}
] | 2017-04-28T00:00:00 |
[
[
"Gibbon",
"Dafydd",
""
]
] |
new_dataset
| 0.999874 |
1704.08390
|
Ted Pedersen
|
Xinru Yan and Ted Pedersen
|
Duluth at SemEval-2017 Task 6: Language Models in Humor Detection
|
5 pages, to Appear in the Proceedings of the 11th International
Workshop on Semantic Evaluation (SemEval 2017), August 2017, Vancouver, BC
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes the Duluth system that participated in SemEval-2017 Task
6 #HashtagWars: Learning a Sense of Humor. The system participated in Subtasks
A and B using N-gram language models, ranking highly in the task evaluation.
This paper discusses the results of our system in the development and
evaluation stages and from two post-evaluation runs.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2017 00:40:33 GMT"
}
] | 2017-04-28T00:00:00 |
[
[
"Yan",
"Xinru",
""
],
[
"Pedersen",
"Ted",
""
]
] |
new_dataset
| 0.970777 |
1704.08468
|
Ofer Neiman
|
Michael Elkin and Ofer Neiman
|
Linear-Size Hopsets with Small Hopbound, and Distributed Routing with
Low Memory
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For a positive parameter $\beta$, the $\beta$-bounded distance between a pair
of vertices $u,v$ in a weighted undirected graph $G = (V,E,\omega)$ is the
length of the shortest $u-v$ path in $G$ with at most $\beta$ edges, aka {\em
hops}. For $\beta$ as above and $\epsilon>0$, a {\em $(\beta,\epsilon)$-hopset}
of $G = (V,E,\omega)$ is a graph $G' =(V,H,\omega_H)$ on the same vertex set,
such that all distances in $G$ are $(1+\epsilon)$-approximated by
$\beta$-bounded distances in $G\cup G'$.
Hopsets are a fundamental graph-theoretic and graph-algorithmic construct,
and they are widely used for distance-related problems in a variety of
computational settings. Currently existing constructions of hopsets produce
hopsets either with $\Omega(n \log n)$ edges, or with a hopbound
$n^{\Omega(1)}$. In this paper we devise a construction of {\em linear-size}
hopsets with hopbound $(\log n)^{\log^{(3)}n+O(1)}$. This improves the previous
bound almost exponentially.
We also devise efficient implementations of our construction in PRAM and
distributed settings. The only existing PRAM algorithm \cite{EN16} for
computing hopsets with a constant (i.e., independent of $n$) hopbound requires
$n^{\Omega(1)}$ time. We devise a PRAM algorithm with polylogarithmic running
time for computing hopsets with a constant hopbound, i.e., our running time is
exponentially better than the previous one. Moreover, these hopsets are also
significantly sparser than their counterparts from \cite{EN16}.
We use our hopsets to devise a distributed routing scheme that exhibits
near-optimal tradeoff between individual memory requirement
$\tilde{O}(n^{1/k})$ of vertices throughout preprocessing and routing phases of
the algorithm, and stretch $O(k)$, along with a near-optimal construction time
$\approx D + n^{1/2 + 1/k}$, where $D$ is the hop-diameter of the input graph.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2017 08:08:22 GMT"
}
] | 2017-04-28T00:00:00 |
[
[
"Elkin",
"Michael",
""
],
[
"Neiman",
"Ofer",
""
]
] |
new_dataset
| 0.989057 |
1704.08513
|
Shayan Taheri
|
Shayan Taheri and Jiann-Shiun Yuan
|
Security Protection for Magnetic Tunnel Junction
|
This document is another version (i.e. the IEEE journal style) of a
published work in International Journal of Innovative Research in Electrical,
Electronics, Instrumentation and Control Engineering (IJIREEICE)
| null |
10.17148/IJIREEICE.2017.5401
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Energy efficiency is one of the most important parameters for designing and
building a computing system nowadays. Introduction of new transistor and memory
technologies to the integrated circuits design have brought hope for low energy
very large scale integration (VLSI) circuit design. This excellency is pleasant
if the computing system is secure and the energy is not wasted through
execution of malicious actions. In fact, it is required to make sure that the
utilized transistor and memory devices function correctly and no error occurs
in the system operation. In this regard, we propose a built-in-self-test
architecture for security checking of the magnetic tunnel junction (MTJ) device
under malicious process variations attack. Also, a general identification
technique is presented to investigate the behaviour and activities of the
employed circuitries within this MTJ testing architecture. The presented
identification technique tries to find any abnormal behaviour using the circuit
current signal.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2017 11:24:49 GMT"
}
] | 2017-04-28T00:00:00 |
[
[
"Taheri",
"Shayan",
""
],
[
"Yuan",
"Jiann-Shiun",
""
]
] |
new_dataset
| 0.99223 |
1610.05812
|
Liang Lu
|
Liang Lu and Steve Renals
|
Small-footprint Highway Deep Neural Networks for Speech Recognition
|
9 pages, 6 figures. Accepted to IEEE/ACM Transactions on Audio,
Speech and Language Processing, 2017. arXiv admin note: text overlap with
arXiv:1608.00892, arXiv:1607.01963
| null |
10.1109/TASLP.2017.2698723
| null |
cs.CL cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
State-of-the-art speech recognition systems typically employ neural network
acoustic models. However, compared to Gaussian mixture models, deep neural
network (DNN) based acoustic models often have many more model parameters,
making it challenging for them to be deployed on resource-constrained
platforms, such as mobile devices. In this paper, we study the application of
the recently proposed highway deep neural network (HDNN) for training
small-footprint acoustic models. HDNNs are a depth-gated feedforward neural
network, which include two types of gate functions to facilitate the
information flow through different layers. Our study demonstrates that HDNNs
are more compact than regular DNNs for acoustic modeling, i.e., they can
achieve comparable recognition accuracy with many fewer model parameters.
Furthermore, HDNNs are more controllable than DNNs: the gate functions of an
HDNN can control the behavior of the whole network using a very small number of
model parameters. Finally, we show that HDNNs are more adaptable than DNNs. For
example, simply updating the gate functions using adaptation data can result in
considerable gains in accuracy. We demonstrate these aspects by experiments
using the publicly available AMI corpus, which has around 80 hours of training
data.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2016 22:06:01 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Oct 2016 21:12:56 GMT"
},
{
"version": "v3",
"created": "Wed, 25 Jan 2017 15:45:22 GMT"
},
{
"version": "v4",
"created": "Tue, 25 Apr 2017 19:48:41 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Lu",
"Liang",
""
],
[
"Renals",
"Steve",
""
]
] |
new_dataset
| 0.951455 |
1703.08535
|
Michael Fenton
|
Michael Fenton, James McDermott, David Fagan, Stefan Forstenlechner,
Michael O'Neill, Erik Hemberg
|
PonyGE2: Grammatical Evolution in Python
|
8 pages, 4 figures, submitted to the 2017 GECCO Workshop on
Evolutionary Computation Software Systems (EvoSoft)
|
In Proceedings of GECCO '17 Companion, Berlin, Germany, July
15-19, 2017, 8 pages
|
10.1145/3067695.3082469
| null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Grammatical Evolution (GE) is a population-based evolutionary algorithm,
where a formal grammar is used in the genotype to phenotype mapping process.
PonyGE2 is an open source implementation of GE in Python, developed at UCD's
Natural Computing Research and Applications group. It is intended as an
advertisement and a starting-point for those new to GE, a reference for
students and researchers, a rapid-prototyping medium for our own experiments,
and a Python workout. As well as providing the characteristic genotype to
phenotype mapping of GE, a search algorithm engine is also provided. A number
of sample problems and tutorials on how to use and adapt PonyGE2 have been
developed.
|
[
{
"version": "v1",
"created": "Fri, 24 Mar 2017 17:50:28 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Apr 2017 16:37:41 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Fenton",
"Michael",
""
],
[
"McDermott",
"James",
""
],
[
"Fagan",
"David",
""
],
[
"Forstenlechner",
"Stefan",
""
],
[
"O'Neill",
"Michael",
""
],
[
"Hemberg",
"Erik",
""
]
] |
new_dataset
| 0.999282 |
1704.07875
|
Maria Ryskina
|
Maria Ryskina, Hannah Alpert-Abrams, Dan Garrette, Taylor
Berg-Kirkpatrick
|
Automatic Compositor Attribution in the First Folio of Shakespeare
|
Short paper (6 pages) accepted at ACL 2017
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compositor attribution, the clustering of pages in a historical printed
document by the individual who set the type, is a bibliographic task that
relies on analysis of orthographic variation and inspection of visual details
of the printed page. In this paper, we introduce a novel unsupervised model
that jointly describes the textual and visual features needed to distinguish
compositors. Applied to images of Shakespeare's First Folio, our model predicts
attributions that agree with the manual judgements of bibliographers with an
accuracy of 87%, even on text that is the output of OCR.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2017 19:26:36 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Ryskina",
"Maria",
""
],
[
"Alpert-Abrams",
"Hannah",
""
],
[
"Garrette",
"Dan",
""
],
[
"Berg-Kirkpatrick",
"Taylor",
""
]
] |
new_dataset
| 0.957542 |
1704.07905
|
Sandip Roy Mr.
|
Sandip Roy, Debabrata Sarddar
|
The Role of Cloud of Things in Smart Cities
|
16 pages, 14 figures
|
International Journal of Computer Science and Information Security
(IJCSIS), Vol. 14, No. 11, November 2016
| null | null |
cs.CY cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The recent demographic trends indicate towards a rapidly increasing
population growth and a significant portion of this increased population now
prefer to live mostly in cities. In connection with this, it has become the
responsibility of the government to ensure a quality standard of living in the
cities and also make sure that these facilities trickle down to the next
generation. A program named Smart City Mission has been started for this
purpose. With an extremely diverse population, that is only second to China in
the world in terms of size, the Indian government has engaged in serious
thinking for a better city planning and providing numerous opportunities for
the citizenry. It was, therefore, planned that the Smart City Mission program
will be able to provide a highly responsive infrastructure, network security, a
good living environment and the like. Internet of things (IoT) application in
smart cities turns out to be the most challenging in this phase. The
information available in the internet has made accessible to many devices
through IoT and it also aware the citizen in many aspects. But with the
increasing number of devices and information, it is now becoming increasingly
difficult to depend on IoT to manage things in the internet space with a
similar degree of ease. As a result, cloud-based technologies have given
preferences over the existing one and IoT has been replaced by the newly
introduced Cloud of Things (CoT) paradigm. This paper intends to connect
different smart city applications for the betterment of city life with the
Cloud of Things (CoT). Our proposed smart city architecture is based on Cloud
of Things, and the focus is also given to identify the existing as well as the
forthcoming challenges for the concerned program of the government. By
identifying the difficulties it is expected that the project will be
materialized with a great success.
|
[
{
"version": "v1",
"created": "Sat, 22 Apr 2017 19:08:07 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Roy",
"Sandip",
""
],
[
"Sarddar",
"Debabrata",
""
]
] |
new_dataset
| 0.989284 |
1704.07935
|
Murphy Berzish
|
Murphy Berzish, Yunhui Zheng, Vijay Ganesh
|
Z3str3: A String Solver with Theory-aware Branching
|
8 pages, 2 figures, 3 tables
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new string SMT solver, Z3str3, that is faster than its
competitors Z3str2, Norn, CVC4, S3, and S3P over a majority of three
industrial-strength benchmarks, namely Kaluza, PISA, and IBM AppScan. Z3str3
supports string equations, linear arithmetic over length function, and regular
language membership predicate. The key algorithmic innovation behind the
efficiency of Z3str3 is a technique we call theory-aware branching, wherein we
modify Z3's branching heuristic to take into account the structure of theory
literals to compute branching activities. In the traditional DPLL(T)
architecture, the structure of theory literals is hidden from the DPLL(T) SAT
solver because of the Boolean abstraction constructed over the input theory
formula. By contrast, the theory-aware technique presented in this paper
exposes the structure of theory literals to the DPLL(T) SAT solver's branching
heuristic, thus enabling it to make much smarter decisions during its search
than otherwise. As a consequence, Z3str3 has better performance than its
competitors.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2017 00:02:12 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Berzish",
"Murphy",
""
],
[
"Zheng",
"Yunhui",
""
],
[
"Ganesh",
"Vijay",
""
]
] |
new_dataset
| 0.992911 |
1704.07986
|
Akira Sasaki
|
Akira Sasaki, Kazuaki Hanawa, Naoaki Okazaki, Kentaro Inui
|
Other Topics You May Also Agree or Disagree: Modeling Inter-Topic
Preferences using Tweets and Matrix Factorization
|
To appear in ACL2017
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present in this paper our approach for modeling inter-topic preferences of
Twitter users: for example, those who agree with the Trans-Pacific Partnership
(TPP) also agree with free trade. This kind of knowledge is useful not only for
stance detection across multiple topics but also for various real-world
applications including public opinion surveys, electoral predictions, electoral
campaigns, and online debates. In order to extract users' preferences on
Twitter, we design linguistic patterns in which people agree and disagree about
specific topics (e.g., "A is completely wrong"). By applying these linguistic
patterns to a collection of tweets, we extract statements agreeing and
disagreeing with various topics. Inspired by previous work on item
recommendation, we formalize the task of modeling inter-topic preferences as
matrix factorization: representing users' preferences as a user-topic matrix
and mapping both users and topics onto a latent feature space that abstracts
the preferences. Our experimental results demonstrate both that our proposed
approach is useful in predicting missing preferences of users and that the
latent vector representations of topics successfully encode inter-topic
preferences.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2017 07:04:46 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Sasaki",
"Akira",
""
],
[
"Hanawa",
"Kazuaki",
""
],
[
"Okazaki",
"Naoaki",
""
],
[
"Inui",
"Kentaro",
""
]
] |
new_dataset
| 0.968272 |
1704.08030
|
Qier Meng
|
Qier Meng, Takayuki Kitasaka, Masahiro Oda, Junji Ueno, Kensaku Mori
|
Airway segmentation from 3D chest CT volumes based on volume of interest
using gradient vector flow
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Some lung diseases are related to bronchial airway structures and morphology.
Although airway segmentation from chest CT volumes is an important task in the
computer-aided diagnosis and surgery assistance systems for the chest, complete
3-D airway structure segmentation is a quite challenging task due to its
complex tree-like structure. In this paper, we propose a new airway
segmentation method from 3D chest CT volumes based on volume of interests (VOI)
using gradient vector flow (GVF). This method segments the bronchial regions by
applying the cavity enhancement filter (CEF) to trace the bronchial tree
structure from the trachea. It uses the CEF in the VOI to segment each branch.
And a tube-likeness function based on GVF and the GVF magnitude map in each VOI
are utilized to assist predicting the positions and directions of child
branches. By calculating the tube-likeness function based on GVF and the GVF
magnitude map, the airway-like candidate structures are identified and their
centrelines are extracted. Based on the extracted centrelines, we can detect
the branch points of the bifurcations and directions of the airway branches in
the next level. At the same time, a leakage detection is performed to avoid the
leakage by analysing the pixel information and the shape information of airway
candidate regions extracted in the VOI. Finally, we unify all of the extracted
bronchial regions to form an integrated airway tree. Preliminary experiments
using four cases of chest CT volumes demonstrated that the proposed method can
extract more bronchial branches in comparison with other methods.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2017 09:27:18 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Meng",
"Qier",
""
],
[
"Kitasaka",
"Takayuki",
""
],
[
"Oda",
"Masahiro",
""
],
[
"Ueno",
"Junji",
""
],
[
"Mori",
"Kensaku",
""
]
] |
new_dataset
| 0.989068 |
1704.08090
|
Badre Munir
|
Badre Munir
|
A Faster Patch Ordering Method for Image Denoising
|
4 pages, 1 figure, 2 tables
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Among the patch-based image denoising processing methods, smooth ordering of
local patches (patch ordering) has been shown to give state-of-art results. For
image denoising the patch ordering method forms two large TSPs (Traveling
Salesman Problem) comprised of nodes in N-dimensional space. Ten approximate
solutions of the two large TSPs are then used in a filtering process to form
the reconstructed image. Use of large TSPs makes patch ordering a
computationally intensive method. A modified patch ordering method for image
denoising is proposed. In the proposed method, several smaller-sized TSPs are
formed and the filtering process varied to work with solutions of these smaller
TSPs. In terms of PSNR, denoising results of the proposed method differed by
0.032 dB to 0.016 dB on average. In original method, solving TSPs was observed
to consume 85% of execution time. In proposed method, the time for solving TSPs
can be reduced to half of the time required in original method. The proposed
method can denoise images in 40% less time.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2017 13:06:56 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Munir",
"Badre",
""
]
] |
new_dataset
| 0.959519 |
1704.08125
|
Xuanyu Chen
|
Cailian Chen, Tom Hao Luan, Xinping Guan, Ning Lu and Yunshu Liu
|
Connected Vehicular Transportation: Data Analytics and Traffic-dependent
Networking
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With onboard operating systems becoming increasingly common in vehicles, the
real-time broadband infotainment and Intelligent Transportation System (ITS)
service applications in fast-motion vehicles become ever demanding, which are
highly expected to significantly improve the efficiency and safety of our daily
on-road lives. The emerging ITS and vehicular applications, e.g., trip
planning, however, require substantial efforts on the real-time pervasive
information collection and big data processing so as to provide quick decision
making and feedbacks to the fast moving vehicles, which thus impose the
significant challenges on the development of an efficient vehicular
communication platform. In this article, we present TrasoNET, an integrated
network framework to provide realtime intelligent transportation services to
connected vehicles by exploring the data analytics and networking techniques.
TrasoNET is built upon two key components. The first one guides vehicles to the
appropriate access networks by exploring the information of realtime traffic
status, specific user preferences, service applications and network conditions.
The second component mainly involves a distributed automatic access engine,
which enables individual vehicles to make distributed access decisions based on
access recommender, local observation and historic information. We showcase the
application of TrasoNET in a case study on real-time traffic sensing based on
real traces of taxis.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2017 13:56:11 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Chen",
"Cailian",
""
],
[
"Luan",
"Tom Hao",
""
],
[
"Guan",
"Xinping",
""
],
[
"Lu",
"Ning",
""
],
[
"Liu",
"Yunshu",
""
]
] |
new_dataset
| 0.977521 |
1704.08131
|
Kei Sakaguchi
|
Kei Sakaguchi, Thomas Haustein, Sergio Barbarossa, Emilio Calvanese
Strinati, Antonio Clemente, Giuseppe Destino, Aarno P\"arssinen, Ilgyu Kim,
Heesang Chung, Junhyeong Kim, Wilhelm Keusgen, Richard J. Weiler, Koji
Takinami, Elena Ceci, Ali Sadri, Liang Xain, Alexander Maltsev, Gia Khanh
Tran, Hiroaki Ogawa, Kim Mahler, Robert W. Heath Jr
|
Where, When, and How mmWave is Used in 5G and Beyon
|
Invited Paper
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless engineers and business planners commonly raise the question on
where, when, and how millimeter-wave (mmWave) will be used in 5G and beyond.
Since the next generation network is not just a new radio access standard, but
instead an integration of networks for vertical markets with diverse
applications, answers to the question depend on scenarios and use cases to be
deployed. This paper gives four 5G mmWave deployment examples and describes in
chronological order the scenarios and use cases of their probable deployment,
including expected system architectures and hardware prototypes. The paper
starts with 28 GHz outdoor backhauling for fixed wireless access and moving
hotspots, which will be demonstrated at the PyeongChang winter Olympic games in
2018. The second deployment example is a 60 GHz unlicensed indoor access system
at the Tokyo-Narita airport, which is combined with Mobile Edge Computing (MEC)
to enable ultra-high speed content download with low latency. The third example
is mmWave mesh network to be used as a micro Radio Access Network ({\mu}-RAN),
for cost-effective backhauling of small-cell Base Stations (BSs) in dense urban
scenarios. The last example is mmWave based Vehicular-to-Vehicular (V2V) and
Vehicular-to-Everything (V2X) communications system, which enables automated
driving by exchanging High Definition (HD) dynamic map information between cars
and Roadside Units (RSUs). For 5G and beyond, mmWave and MEC will play
important roles for a diverse set of applications that require both ultra-high
data rate and low latency communications.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2017 14:15:14 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Sakaguchi",
"Kei",
""
],
[
"Haustein",
"Thomas",
""
],
[
"Barbarossa",
"Sergio",
""
],
[
"Strinati",
"Emilio Calvanese",
""
],
[
"Clemente",
"Antonio",
""
],
[
"Destino",
"Giuseppe",
""
],
[
"Pärssinen",
"Aarno",
""
],
[
"Kim",
"Ilgyu",
""
],
[
"Chung",
"Heesang",
""
],
[
"Kim",
"Junhyeong",
""
],
[
"Keusgen",
"Wilhelm",
""
],
[
"Weiler",
"Richard J.",
""
],
[
"Takinami",
"Koji",
""
],
[
"Ceci",
"Elena",
""
],
[
"Sadri",
"Ali",
""
],
[
"Xain",
"Liang",
""
],
[
"Maltsev",
"Alexander",
""
],
[
"Tran",
"Gia Khanh",
""
],
[
"Ogawa",
"Hiroaki",
""
],
[
"Mahler",
"Kim",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] |
new_dataset
| 0.999399 |
1704.08141
|
Yihang Lou
|
Ling-Yu Duan, Vijay Chandrasekhar, Shiqi Wang, Yihang Lou, Jie Lin,
Yan Bai, Tiejun Huang, Alex Chichung Kot, Wen Gao
|
Compact Descriptors for Video Analysis: the Emerging MPEG Standard
|
4 figures, 4 tables
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper provides an overview of the on-going compact descriptors for video
analysis standard (CDVA) from the ISO/IEC moving pictures experts group (MPEG).
MPEG-CDVA targets at defining a standardized bitstream syntax to enable
interoperability in the context of video analysis applications. During the
developments of MPEGCDVA, a series of techniques aiming to reduce the
descriptor size and improve the video representation ability have been
proposed. This article describes the new standard that is being developed and
reports the performance of these key technical contributions.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2017 14:33:24 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Duan",
"Ling-Yu",
""
],
[
"Chandrasekhar",
"Vijay",
""
],
[
"Wang",
"Shiqi",
""
],
[
"Lou",
"Yihang",
""
],
[
"Lin",
"Jie",
""
],
[
"Bai",
"Yan",
""
],
[
"Huang",
"Tiejun",
""
],
[
"Kot",
"Alex Chichung",
""
],
[
"Gao",
"Wen",
""
]
] |
new_dataset
| 0.998543 |
1704.08244
|
Ivy Bo Peng
|
Ivy Bo Peng, Stefano Markidis, Erwin Laure, Gokcen Kestor, Roberto
Gioiosa
|
Idle Period Propagation in Message-Passing Applications
|
18th International Conference on High Performance Computing and
Communications, IEEE, 2016
| null |
10.1109/HPCC-SmartCity-DSS.2016.0134
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Idle periods on different processes of Message Passing applications are
unavoidable. While the origin of idle periods on a single process is well
understood as the effect of system and architectural random delays, yet it is
unclear how these idle periods propagate from one process to another. It is
important to understand idle period propagation in Message Passing applications
as it allows application developers to design communication patterns avoiding
idle period propagation and the consequent performance degradation in their
applications. To understand idle period propagation, we introduce a methodology
to trace idle periods when a process is waiting for data from a remote delayed
process in MPI applications. We apply this technique in an MPI application that
solves the heat equation to study idle period propagation on three different
systems. We confirm that idle periods move between processes in the form of
waves and that there are different stages in idle period propagation. Our
methodology enables us to identify a self-synchronization phenomenon that
occurs on two systems where some processes run slower than the other processes.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2017 17:58:28 GMT"
}
] | 2017-04-27T00:00:00 |
[
[
"Peng",
"Ivy Bo",
""
],
[
"Markidis",
"Stefano",
""
],
[
"Laure",
"Erwin",
""
],
[
"Kestor",
"Gokcen",
""
],
[
"Gioiosa",
"Roberto",
""
]
] |
new_dataset
| 0.995771 |
1202.5474
|
Pan Cao
|
Pan Cao and Eduard A. Jorswieck and Shuying Shi
|
Pareto Boundary of the Rate Region for Single-Stream MIMO Interference
Channels: Linear Transceiver Design
|
16 pages, 9 figures. Accepted for publication in IEEE Tans. Signal
Process. June. 2013
| null |
10.1109/TSP.2013.2272922
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a multiple-input multiple-output (MIMO) interference channel
(IC), where a single data stream per user is transmitted and each receiver
treats interference as noise. The paper focuses on the open problem of
computing the outermost boundary (so-called Pareto boundary-PB) of the
achievable rate region under linear transceiver design. The Pareto boundary
consists of the strict PB and non-strict PB. For the two user case, we compute
the non-strict PB and the two ending points of the strict PB exactly. For the
strict PB, we formulate the problem to maximize one rate while the other rate
is fixed such that a strict PB point is reached. To solve this non-convex
optimization problem which results from the hard-coupled two transmit
beamformers, we propose an alternating optimization algorithm. Furthermore, we
extend the algorithm to the multi-user scenario and show convergence. Numerical
simulations illustrate that the proposed algorithm computes a sequence of
well-distributed operating points that serve as a reasonable and complete inner
bound of the strict PB compared with existing methods.
|
[
{
"version": "v1",
"created": "Fri, 24 Feb 2012 15:14:12 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jul 2013 18:08:35 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Cao",
"Pan",
""
],
[
"Jorswieck",
"Eduard A.",
""
],
[
"Shi",
"Shuying",
""
]
] |
new_dataset
| 0.97396 |
1605.05861
|
Adri\'an Sauco Gallardo
|
Adri\'an Sauco-Gallardo, Unai Fern\'andez-Plazaola, and Luis D\'iez
|
On the Mobile-to-Mobile Linear Time-Variant Shallow-Water Acoustic
Channel Response
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We expose some concepts concerning the channel impulse response (CIR) of
linear time-varying (LTV) channels to give a proper characterization of the
mobile-to-mobile underwater channel. We find different connections between the
linear time-invariant (LTI) CIR of the static channel and two definitions of
LTV CIRs of the dynamic mobile-to-mobile channel. These connections are useful
to design a dynamic channel simulator from the static channel models available
in the literature. Such feature is particularly interesting for overspread
channels, which are hard to characterize by a measuring campaign. Specifically,
the shallow water acoustic (SWA) channel is potentially overspread due the
signal low velocity of propagation which prompt long delay spread responses and
great Doppler effect. Furthermore, from these connections between the LTI
static CIRs and the LTV dynamic CIRS, we find that the SWA mobile-to-mobile CIR
does not only depend on the relative velocity between transceivers, but also on
the absolute velocity of each of them referred to the velocity of propagation.
Nevertheless, publications about this topic do not consider it and formulate
their equations in terms of the relative velocity between transceivers. We
illustrate our find using two couples of examples where, even though the
relative velocity between the mobiles is the same, their CIRs are not.
|
[
{
"version": "v1",
"created": "Thu, 19 May 2016 09:15:43 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Apr 2017 10:06:14 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Sauco-Gallardo",
"Adrián",
""
],
[
"Fernández-Plazaola",
"Unai",
""
],
[
"Díez",
"Luis",
""
]
] |
new_dataset
| 0.995649 |
1607.03333
|
Liangqiong Qu
|
Liangqiong Qu, Shengfeng He, Jiawei Zhang, Jiandong Tian, Yandong
Tang, and Qingxiong Yang
|
RGBD Salient Object Detection via Deep Fusion
|
This paper has been submitted to IEEE Transactions on Image
Processing
| null |
10.1109/TIP.2017.2682981
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Numerous efforts have been made to design different low level saliency cues
for the RGBD saliency detection, such as color or depth contrast features,
background and color compactness priors. However, how these saliency cues
interact with each other and how to incorporate these low level saliency cues
effectively to generate a master saliency map remain a challenging problem. In
this paper, we design a new convolutional neural network (CNN) to fuse
different low level saliency cues into hierarchical features for automatically
detecting salient objects in RGBD images. In contrast to the existing works
that directly feed raw image pixels to the CNN, the proposed method takes
advantage of the knowledge in traditional saliency detection by adopting
various meaningful and well-designed saliency feature vectors as input. This
can guide the training of CNN towards detecting salient object more effectively
due to the reduced learning ambiguity. We then integrate a Laplacian
propagation framework with the learned CNN to extract a spatially consistent
saliency map by exploiting the intrinsic structure of the input image.
Extensive quantitative and qualitative experimental evaluations on three
datasets demonstrate that the proposed method consistently outperforms
state-of-the-art methods.
|
[
{
"version": "v1",
"created": "Tue, 12 Jul 2016 12:32:56 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Qu",
"Liangqiong",
""
],
[
"He",
"Shengfeng",
""
],
[
"Zhang",
"Jiawei",
""
],
[
"Tian",
"Jiandong",
""
],
[
"Tang",
"Yandong",
""
],
[
"Yang",
"Qingxiong",
""
]
] |
new_dataset
| 0.998287 |
1610.08469
|
Emiliano De Cristofaro
|
Sina Sajadmanesh and Sina Jafarzadeh and Seyed Ali Osia and Hamid R.
Rabiee and Hamed Haddadi and Yelena Mejova and Mirco Musolesi and Emiliano De
Cristofaro and Gianluca Stringhini
|
Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web
|
In the Web Science Track of 26th International World Wide Web
Conference (WWW 2017)
| null | null | null |
cs.CY cs.AI cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Food and nutrition occupy an increasingly prevalent space on the web, and
dishes and recipes shared online provide an invaluable mirror into culinary
cultures and attitudes around the world. More specifically, ingredients,
flavors, and nutrition information become strong signals of the taste
preferences of individuals and civilizations. However, there is little
understanding of these palate varieties. In this paper, we present a
large-scale study of recipes published on the web and their content, aiming to
understand cuisines and culinary habits around the world. Using a database of
more than 157K recipes from over 200 different cuisines, we analyze
ingredients, flavors, and nutritional values which distinguish dishes from
different regions, and use this knowledge to assess the predictability of
recipes from different cuisines. We then use country health statistics to
understand the relation between these factors and health indicators of
different nations, such as obesity, diabetes, migration, and health
expenditure. Our results confirm the strong effects of geographical and
cultural similarities on recipes, health indicators, and culinary preferences
across the globe.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2016 19:12:05 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Feb 2017 20:41:45 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Apr 2017 00:26:32 GMT"
},
{
"version": "v4",
"created": "Tue, 25 Apr 2017 11:57:25 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Sajadmanesh",
"Sina",
""
],
[
"Jafarzadeh",
"Sina",
""
],
[
"Osia",
"Seyed Ali",
""
],
[
"Rabiee",
"Hamid R.",
""
],
[
"Haddadi",
"Hamed",
""
],
[
"Mejova",
"Yelena",
""
],
[
"Musolesi",
"Mirco",
""
],
[
"De Cristofaro",
"Emiliano",
""
],
[
"Stringhini",
"Gianluca",
""
]
] |
new_dataset
| 0.997954 |
1701.07675
|
Sohrab Ferdowsi
|
Sohrab Ferdowsi, Slava Voloshynovskiy, Dimche Kostadinov, Taras
Holotyak
|
Sparse Ternary Codes for similarity search have higher coding gain than
dense binary codes
|
Accepted at 2017 IEEE International Symposium on Information Theory
(ISIT'17)
| null | null | null |
cs.IT cs.CV cs.IR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses the problem of Approximate Nearest Neighbor (ANN) search
in pattern recognition where feature vectors in a database are encoded as
compact codes in order to speed-up the similarity search in large-scale
databases. Considering the ANN problem from an information-theoretic
perspective, we interpret it as an encoding, which maps the original feature
vectors to a less entropic sparse representation while requiring them to be as
informative as possible. We then define the coding gain for ANN search using
information-theoretic measures. We next show that the classical approach to
this problem, which consists of binarization of the projected vectors is
sub-optimal. Instead, a properly designed ternary encoding achieves higher
coding gains and lower complexity.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2017 12:41:58 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Apr 2017 09:58:45 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Ferdowsi",
"Sohrab",
""
],
[
"Voloshynovskiy",
"Slava",
""
],
[
"Kostadinov",
"Dimche",
""
],
[
"Holotyak",
"Taras",
""
]
] |
new_dataset
| 0.95496 |
1703.03946
|
Domenico Ciuonzo
|
D. Ciuonzo and P. Salvo Rossi and P. Willett
|
Generalized Rao Test for Decentralized Detection of an Uncooperative
Target
|
extended version of IEEE Signal Processing Letters
| null |
10.1109/LSP.2017.2686377
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We tackle distributed detection of a non-cooperative target with a Wireless
Sensor Network (WSN). When the target is present, sensors observe an (unknown)
deterministic signal with attenuation depending on the distance between the
sensor and the (unknown) target positions, embedded in symmetricand unimodal
noise. The Fusion Center (FC) receives quantized sensor observations through
error-prone Binary Symmetric Channels (BSCs) and is in charge of performing a
more-accurate global decision. The resulting problem is a two-sided parameter
testing with nuisance parameters (i.e. the target position) present only under
the alternative hypothesis. After introducing the Generalized Likelihood Ratio
Test (GLRT) for the problem, we develop a novel fusion rule corresponding to a
Generalized Rao (G-Rao) test, based on Davies' framework, to reduce the
computational complexity. Also, a rationale for threshold-optimization is
proposed and confirmed by simulations. Finally, the aforementioned rules are
compared in terms of performance and computational complexity.
|
[
{
"version": "v1",
"created": "Sat, 11 Mar 2017 10:59:58 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Ciuonzo",
"D.",
""
],
[
"Rossi",
"P. Salvo",
""
],
[
"Willett",
"P.",
""
]
] |
new_dataset
| 0.962857 |
1703.10339
|
Besnik Fetahu
|
Besnik Fetahu and Katja Markert and Wolfgang Nejdl and Avishek Anand
|
Finding News Citations for Wikipedia
| null | null |
10.1145/2983323.2983808
| null |
cs.IR cs.CL cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An important editing policy in Wikipedia is to provide citations for added
statements in Wikipedia pages, where statements can be arbitrary pieces of
text, ranging from a sentence to a paragraph. In many cases citations are
either outdated or missing altogether.
In this work we address the problem of finding and updating news citations
for statements in entity pages. We propose a two-stage supervised approach for
this problem. In the first step, we construct a classifier to find out whether
statements need a news citation or other kinds of citations (web, book,
journal, etc.). In the second step, we develop a news citation algorithm for
Wikipedia statements, which recommends appropriate citations from a given news
collection. Apart from IR techniques that use the statement to query the news
collection, we also formalize three properties of an appropriate citation,
namely: (i) the citation should entail the Wikipedia statement, (ii) the
statement should be central to the citation, and (iii) the citation should be
from an authoritative source.
We perform an extensive evaluation of both steps, using 20 million articles
from a real-world news collection. Our results are quite promising, and show
that we can perform this task with high precision and at scale.
|
[
{
"version": "v1",
"created": "Thu, 30 Mar 2017 07:48:31 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Apr 2017 18:28:09 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Fetahu",
"Besnik",
""
],
[
"Markert",
"Katja",
""
],
[
"Nejdl",
"Wolfgang",
""
],
[
"Anand",
"Avishek",
""
]
] |
new_dataset
| 0.98929 |
1704.06693
|
Sandipan Banerjee
|
Sandipan Banerjee, John S. Bernhard, Walter J. Scheirer, Kevin W.
Bowyer, Patrick J. Flynn
|
SREFI: Synthesis of Realistic Example Face Images
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a novel face synthesis approach that can generate
an arbitrarily large number of synthetic images of both real and synthetic
identities. Thus a face image dataset can be expanded in terms of the number of
identities represented and the number of images per identity using this
approach, without the identity-labeling and privacy complications that come
from downloading images from the web. To measure the visual fidelity and
uniqueness of the synthetic face images and identities, we conducted face
matching experiments with both human participants and a CNN pre-trained on a
dataset of 2.6M real face images. To evaluate the stability of these synthetic
faces, we trained a CNN model with an augmented dataset containing close to
200,000 synthetic faces. We used a snapshot of this trained CNN to recognize
extremely challenging frontal (real) face images. Experiments showed training
with the augmented faces boosted the face recognition performance of the CNN.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2017 19:59:47 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Apr 2017 03:54:34 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Banerjee",
"Sandipan",
""
],
[
"Bernhard",
"John S.",
""
],
[
"Scheirer",
"Walter J.",
""
],
[
"Bowyer",
"Kevin W.",
""
],
[
"Flynn",
"Patrick J.",
""
]
] |
new_dataset
| 0.999681 |
1704.07490
|
Manuel Marques
|
Miguel Costa and Beatriz Quintino Ferreira and Manuel Marques
|
A Context Aware and Video-Based Risk Descriptor for Cyclists
|
Submitted to ITSC2017
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Aiming to reduce pollutant emissions, bicycles are regaining popularity
specially in urban areas. However, the number of cyclists' fatalities is not
showing the same decreasing trend as the other traffic groups. Hence,
monitoring cyclists' data appears as a keystone to foster urban cyclists'
safety by helping urban planners to design safer cyclist routes. In this work,
we propose a fully image-based framework to assess the rout risk from the
cyclist perspective. From smartphone sequences of images, this generic
framework is able to automatically identify events considering different risk
criteria based on the cyclist's motion and object detection. Moreover, since it
is entirely based on images, our method provides context on the situation and
is independent from the expertise level of the cyclist. Additionally, we build
on an existing platform and introduce several improvements on its mobile app to
acquire smartphone sensor data, including video. From the inertial sensor data,
we automatically detect the route segments performed by bicycle, applying
behavior analysis techniques. We test our methods on real data, attaining very
promising results in terms of risk classification, according to two different
criteria, and behavior analysis accuracy.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2017 23:10:05 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Costa",
"Miguel",
""
],
[
"Ferreira",
"Beatriz Quintino",
""
],
[
"Marques",
"Manuel",
""
]
] |
new_dataset
| 0.994073 |
1704.07535
|
Maxim Rabinovich
|
Maxim Rabinovich, Mitchell Stern, Dan Klein
|
Abstract Syntax Networks for Code Generation and Semantic Parsing
|
ACL 2017. MR and MS contributed equally
| null | null | null |
cs.CL cs.AI cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tasks like code generation and semantic parsing require mapping unstructured
(or partially structured) inputs to well-formed, executable outputs. We
introduce abstract syntax networks, a modeling framework for these problems.
The outputs are represented as abstract syntax trees (ASTs) and constructed by
a decoder with a dynamically-determined modular structure paralleling the
structure of the output tree. On the benchmark Hearthstone dataset for code
generation, our model obtains 79.2 BLEU and 22.7% exact match accuracy,
compared to previous state-of-the-art values of 67.1 and 6.1%. Furthermore, we
perform competitively on the Atis, Jobs, and Geo semantic parsing datasets with
no task-specific engineering.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2017 04:37:35 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Rabinovich",
"Maxim",
""
],
[
"Stern",
"Mitchell",
""
],
[
"Klein",
"Dan",
""
]
] |
new_dataset
| 0.999147 |
1704.07759
|
Gianluca Stringhini
|
Emeric Bernard-Jones, Jeremiah Onaolapo, Gianluca Stringhini
|
Email Babel: Does Language Affect Criminal Activity in Compromised
Webmail Accounts?
| null | null | null | null |
cs.CY cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We set out to understand the effects of differing language on the ability of
cybercriminals to navigate webmail accounts and locate sensitive information in
them. To this end, we configured thirty Gmail honeypot accounts with English,
Romanian, and Greek language settings. We populated the accounts with email
messages in those languages by subscribing them to selected online newsletters.
We hid email messages about fake bank accounts in fifteen of the accounts to
mimic real-world webmail users that sometimes store sensitive information in
their accounts. We then leaked credentials to the honey accounts via paste
sites on the Surface Web and the Dark Web, and collected data for fifteen days.
Our statistical analyses on the data show that cybercriminals are more likely
to discover sensitive information (bank account information) in the Greek
accounts than the remaining accounts, contrary to the expectation that Greek
ought to constitute a barrier to the understanding of non-Greek visitors to the
Greek accounts. We also extracted the important words among the emails that
cybercriminals accessed (as an approximation of the keywords that they searched
for within the honey accounts), and found that financial terms featured among
the top words. In summary, we show that language plays a significant role in
the ability of cybercriminals to access sensitive information hidden in
compromised webmail accounts.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2017 16:07:34 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Bernard-Jones",
"Emeric",
""
],
[
"Onaolapo",
"Jeremiah",
""
],
[
"Stringhini",
"Gianluca",
""
]
] |
new_dataset
| 0.999475 |
1704.07793
|
Jos\'e Ignacio Orlando Eng
|
Jos\'e Ignacio Orlando and Hugo Luis Manterola and Enzo Ferrante and
Federico Ariel
|
Arabidopsis roots segmentation based on morphological operations and
CRFs
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Arabidopsis thaliana is a plant species widely utilized by scientists to
estimate the impact of genetic differences in root morphological features. For
this purpose, images of this plant after genetic modifications are taken to
study differences in the root architecture. This task requires manual
segmentations of radicular structures, although this is a particularly tedious
and time-consuming labor. In this work, we present an unsupervised method for
Arabidopsis thaliana root segmentation based on morphological operations and
fully-connected Conditional Random Fields. Although other approaches have been
proposed to this purpose, all of them are based on more complex and expensive
imaging modalities. Our results prove that our method can be easily applied
over images taken using conventional scanners, with a minor user intervention.
A first data set, our results and a fully open source implementation are
available online.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2017 17:19:19 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Orlando",
"José Ignacio",
""
],
[
"Manterola",
"Hugo Luis",
""
],
[
"Ferrante",
"Enzo",
""
],
[
"Ariel",
"Federico",
""
]
] |
new_dataset
| 0.998852 |
1704.07809
|
Tomas Simon
|
Tomas Simon, Hanbyul Joo, Iain Matthews, Yaser Sheikh
|
Hand Keypoint Detection in Single Images using Multiview Bootstrapping
|
CVPR 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an approach that uses a multi-camera system to train fine-grained
detectors for keypoints that are prone to occlusion, such as the joints of a
hand. We call this procedure multiview bootstrapping: first, an initial
keypoint detector is used to produce noisy labels in multiple views of the
hand. The noisy detections are then triangulated in 3D using multiview geometry
or marked as outliers. Finally, the reprojected triangulations are used as new
labeled training data to improve the detector. We repeat this process,
generating more labeled data in each iteration. We derive a result analytically
relating the minimum number of views to achieve target true and false positive
rates for a given detector. The method is used to train a hand keypoint
detector for single images. The resulting keypoint detector runs in realtime on
RGB images and has accuracy comparable to methods that use depth sensors. The
single view detector, triangulated over multiple views, enables 3D markerless
hand motion capture with complex object interactions.
|
[
{
"version": "v1",
"created": "Tue, 25 Apr 2017 17:37:48 GMT"
}
] | 2017-04-26T00:00:00 |
[
[
"Simon",
"Tomas",
""
],
[
"Joo",
"Hanbyul",
""
],
[
"Matthews",
"Iain",
""
],
[
"Sheikh",
"Yaser",
""
]
] |
new_dataset
| 0.997781 |
1510.03692
|
Carsten Schneider
|
Jakob Ablinger and Carsten Schneider
|
Algebraic independence of sequences generated by (cyclotomic) harmonic
sums
|
Updated the title in order to avoid confusion; inserted Lemma 5 to
bring in more insight and supplemented Example 3 with further comments
| null | null | null |
cs.SC math-ph math.MP math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An expression in terms of (cyclotomic) harmonic sums can be simplified by the
quasi-shuffle algebra in terms of the so-called basis sums. By construction,
these sums are algebraically independent within the quasi-shuffle algebra. In
this article we show that the basis sums can be represented within a tower of
difference ring extensions where the constants remain unchanged. This property
enables one to embed this difference ring for the (cyclotomic) harmonic sums
into the ring of sequences. This construction implies that the sequences
produced by the basis sums are algebraically independent over the rational
sequences adjoined with the alternating sequence.
|
[
{
"version": "v1",
"created": "Tue, 13 Oct 2015 14:25:11 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Apr 2017 09:06:00 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Ablinger",
"Jakob",
""
],
[
"Schneider",
"Carsten",
""
]
] |
new_dataset
| 0.988517 |
1608.05137
|
Hamid Izadinia
|
Hamid Izadinia, Qi Shan, Steven M. Seitz
|
IM2CAD
|
To appear at CVPR 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a single photo of a room and a large database of furniture CAD models,
our goal is to reconstruct a scene that is as similar as possible to the scene
depicted in the photograph, and composed of objects drawn from the database. We
present a completely automatic system to address this IM2CAD problem that
produces high quality results on challenging imagery from interior home design
and remodeling websites. Our approach iteratively optimizes the placement and
scale of objects in the room to best match scene renderings to the input photo,
using image comparison metrics trained via deep convolutional neural nets. By
operating jointly on the full scene at once, we account for inter-object
occlusions. We also show the applicability of our method in standard scene
understanding benchmarks where we obtain significant improvement.
|
[
{
"version": "v1",
"created": "Thu, 18 Aug 2016 00:26:44 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Apr 2017 00:28:58 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Izadinia",
"Hamid",
""
],
[
"Shan",
"Qi",
""
],
[
"Seitz",
"Steven M.",
""
]
] |
new_dataset
| 0.998746 |
1610.04551
|
Rafael Hurtado
|
Jorge Useche and Rafael Hurtado
|
Tonal consonance parameters link microscopic and macroscopic properties
of music exposing a hidden order in melody
|
11 pages, 7 figures. Supplemental material contains 3 figures and 3
tables. An spreadsheet .xlsx contains data, fitting parameters, determination
coefficients, expected values, and Lagrange multipliers
| null | null | null |
cs.SD cs.IT math.IT physics.data-an physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consonance is related to the perception of pleasantness arising from a
combination of sounds and has been approached quantitatively using mathematical
relations, physics, information theory, and psychoacoustics. Tonal consonance
is present in timbre, musical tuning, harmony, and melody, and it is used for
conveying sensations, perceptions, and emotions in music. It involves the
physical properties of sound waves and is used to study melody and harmony
through musical intervals and chords. From the perspective of complexity, the
macroscopic properties of a system with many parts frequently rely on the
statistical properties of its constituent elements. Here we show how the tonal
consonance parameters for complex tones can be used to study complexity in
music. We apply this formalism to melody, showing that melodic lines in musical
pieces can be described in terms of the physical properties of melodic
intervals and the existence of an entropy extremalization principle subject to
psychoacoustic macroscopic constraints with musical meaning. This result
connects the human perception of consonance with the complexity of human
creativity in music through the physical properties of the musical stimulus.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2016 17:42:41 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Jan 2017 19:11:05 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Feb 2017 19:07:40 GMT"
},
{
"version": "v4",
"created": "Sun, 23 Apr 2017 16:31:08 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Useche",
"Jorge",
""
],
[
"Hurtado",
"Rafael",
""
]
] |
new_dataset
| 0.997726 |
1702.03131
|
Sha Hu
|
Sha Hu, Fredrik Rusek, and Ove Edfors
|
Cram\'er-Rao Lower Bounds for Positioning with Large Intelligent
Surfaces
|
Submitted to VTC-Fall, 2017; 6 pages; 7 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the potential for positioning with a system where antenna arrays
are deployed as a large intelligent surface (LIS). We derive
Fisher-informations and Cram\'{e}r-Rao lower bounds (CRLB) in closed-form for
terminals along the central perpendicular line (CPL) of the LIS for all three
Cartesian dimensions. For terminals at positions other than the CPL,
closed-form expressions for the Fisher-informations and CRLBs seem out of
reach, and we alternatively provide approximations (in closed-form) which are
shown to be very accurate. We also show that under mild conditions, the CRLBs
in general decrease quadratically in the surface-area for both the $x$ and $y$
dimensions. For the $z$-dimension (distance from the LIS), the CRLB decreases
linearly in the surface-area when terminals are along the CPL. However, when
terminals move away from the CPL, the CRLB is dramatically increased and then
also decreases quadratically in the surface-area. We also extensively discuss
the impact of different deployments (centralized and distributed) of the LIS.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2017 11:19:05 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Apr 2017 07:47:51 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Hu",
"Sha",
""
],
[
"Rusek",
"Fredrik",
""
],
[
"Edfors",
"Ove",
""
]
] |
new_dataset
| 0.999308 |
1704.04100
|
Chlo\'e Braud
|
Chlo\'e Braud and Oph\'elie Lacroix and Anders S{\o}gaard
|
Cross-lingual and cross-domain discourse segmentation of entire
documents
|
To appear in Proceedings of ACL 2017
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Discourse segmentation is a crucial step in building end-to-end discourse
parsers. However, discourse segmenters only exist for a few languages and
domains. Typically they only detect intra-sentential segment boundaries,
assuming gold standard sentence and token segmentation, and relying on
high-quality syntactic parses and rich heuristics that are not generally
available across languages and domains. In this paper, we propose statistical
discourse segmenters for five languages and three domains that do not rely on
gold pre-annotations. We also consider the problem of learning discourse
segmenters when no labeled data is available for a language. Our fully
supervised system obtains 89.5% F1 for English newswire, with slight drops in
performance on other domains, and we report supervised and unsupervised
(cross-lingual) results for five languages in total.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2017 12:54:30 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Apr 2017 14:03:10 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Braud",
"Chloé",
""
],
[
"Lacroix",
"Ophélie",
""
],
[
"Søgaard",
"Anders",
""
]
] |
new_dataset
| 0.990437 |
1704.06764
|
Stefano Buzzi
|
Stefano Buzzi and Carmen D'Andrea
|
Multiuser Millimeter Wave MIMO Channel Estimation with Hybrid
Beamforming
|
3 pages. To be presented at the Poster Session of the European
Conference on Networks and Communications (EuCNC), Oulu, Finland, June 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper focuses on multiuser MIMO channel estimation and data transmission
at millimeter wave (mmWave) frequencies. The proposed approach relies on the
time-division-duplex (TDD) protocol and is based on two distinct phases. First
of all, the Base Station (BS) sends a suitable probing signal so that all the
Mobile Stations (MSs), using a subspace tracking algorithm, can estimate the
dominant left singular vectors of their BS-to-MS propagation channel. Then,
each MS, using the estimated dominant left singular vectors as pre-coding
beamformers, sends a suitable pilot sequence so that the BS can estimate the
corresponding right dominant channel singular vectors and the corresponding
eigenvalues. The low-complexity projection approximation subspace tracking with
deflation (PASTd) algorithm is used at the MSs for dominant subspace
estimation, while pilot-matched (PM) and zero-forcing (ZF) reception is used at
the BS. The proposed algorithms can be used in conjuction with an analog RF
beamformer and are shown to exhibit very good performance.
|
[
{
"version": "v1",
"created": "Sat, 22 Apr 2017 08:24:32 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Buzzi",
"Stefano",
""
],
[
"D'Andrea",
"Carmen",
""
]
] |
new_dataset
| 0.982435 |
1704.06836
|
Lotem Peled
|
Lotem Peled and Roi Reichart
|
Sarcasm SIGN: Interpreting Sarcasm with Sentiment Based Monolingual
Machine Translation
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sarcasm is a form of speech in which speakers say the opposite of what they
truly mean in order to convey a strong sentiment. In other words, "Sarcasm is
the giant chasm between what I say, and the person who doesn't get it.". In
this paper we present the novel task of sarcasm interpretation, defined as the
generation of a non-sarcastic utterance conveying the same message as the
original sarcastic one. We introduce a novel dataset of 3000 sarcastic tweets,
each interpreted by five human judges. Addressing the task as monolingual
machine translation (MT), we experiment with MT algorithms and evaluation
measures. We then present SIGN: an MT based sarcasm interpretation algorithm
that targets sentiment words, a defining element of textual sarcasm. We show
that while the scores of n-gram based automatic measures are similar for all
interpretation models, SIGN's interpretations are scored higher by humans for
adequacy and sentiment polarity. We conclude with a discussion on future
research directions for our new task.
|
[
{
"version": "v1",
"created": "Sat, 22 Apr 2017 18:59:25 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Peled",
"Lotem",
""
],
[
"Reichart",
"Roi",
""
]
] |
new_dataset
| 0.999837 |
1704.06903
|
Takuto Sakamoto
|
Hiroki Takikawa and Takuto Sakamoto
|
Moral Foundations of Political Discourse: Comparative Analysis of the
Speech Records of the US Congress and the Japanese Diet
|
Originally submitted to the 3rd International Conference on
Computational Social Science (IC2S2), July 10-13, 2017; 4 pages
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There has been a growing body of study on the relationship between
public/political discourse and its moral-emotional foundations. Most of the
studies, however, have been confined to a single country's context, lacking
cross-cultural perspectives. Taking a comparative perspective, we examined the
emotional and moral structures of political and public discussion observed in
the U.S. and Japan by employing extensive text data that cover these two
countries. Specifically, we conducted dictionary-based sentiment and moral
analyses of floor debate in the U.S. Congress and the Japanese Diet over a long
period of time. The analyses revealed intriguing cross-national patterns in the
moral-emotional framework employed in parliamentary deliberations, which cast
doubt on some of the dominant arguments in the field, including, among others,
J. Haidt's moral foundation hypothesis.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2017 09:44:25 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Takikawa",
"Hiroki",
""
],
[
"Sakamoto",
"Takuto",
""
]
] |
new_dataset
| 0.961961 |
1704.06972
|
Yufei Wang
|
Yufei Wang, Zhe Lin, Xiaohui Shen, Scott Cohen, Garrison W. Cottrell
|
Skeleton Key: Image Captioning by Skeleton-Attribute Decomposition
|
Accepted by CVPR 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, there has been a lot of interest in automatically generating
descriptions for an image. Most existing language-model based approaches for
this task learn to generate an image description word by word in its original
word order. However, for humans, it is more natural to locate the objects and
their relationships first, and then elaborate on each object, describing
notable attributes. We present a coarse-to-fine method that decomposes the
original image description into a skeleton sentence and its attributes, and
generates the skeleton sentence and attribute phrases separately. By this
decomposition, our method can generate more accurate and novel descriptions
than the previous state-of-the-art. Experimental results on the MS-COCO and a
larger scale Stock3M datasets show that our algorithm yields consistent
improvements across different evaluation metrics, especially on the SPICE
metric, which has much higher correlation with human ratings than the
conventional metrics. Furthermore, our algorithm can generate descriptions with
varied length, benefiting from the separate control of the skeleton and
attributes. This enables image description generation that better accommodates
user preferences.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2017 20:17:12 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Wang",
"Yufei",
""
],
[
"Lin",
"Zhe",
""
],
[
"Shen",
"Xiaohui",
""
],
[
"Cohen",
"Scott",
""
],
[
"Cottrell",
"Garrison W.",
""
]
] |
new_dataset
| 0.999623 |
1704.07146
|
Ella Rabinovich
|
Ella Rabinovich, Noam Ordan, Shuly Wintner
|
Found in Translation: Reconstructing Phylogenetic Language Trees from
Translations
|
ACL2017, 11 pages
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Translation has played an important role in trade, law, commerce, politics,
and literature for thousands of years. Translators have always tried to be
invisible; ideal translations should look as if they were written originally in
the target language. We show that traces of the source language remain in the
translation product to the extent that it is possible to uncover the history of
the source language by looking only at the translation. Specifically, we
automatically reconstruct phylogenetic language trees from monolingual texts
(translated from several source languages). The signal of the source language
is so powerful that it is retained even after two phases of translation. This
strongly indicates that source language interference is the most dominant
characteristic of translated texts, overshadowing the more subtle signals of
universal properties of translation.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2017 11:14:20 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Rabinovich",
"Ella",
""
],
[
"Ordan",
"Noam",
""
],
[
"Wintner",
"Shuly",
""
]
] |
new_dataset
| 0.979382 |
1704.07154
|
Stefano Secci
|
Ho-Dac-Duy Nguyen, Chi-Dung Phung, Stefano Secci, Benevid Felix
(UFPR), Michele Nogueira (UFPR)
|
Can MPTCP Secure Internet Communications from Man-in-the-Middle Attacks?
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
-Multipath communications at the Internet scale have been a myth for a long
time, with no actual protocol being deployed so that multiple paths could be
taken by a same connection on the way towards an Internet destination.
Recently, the Multipath Transport Control Protocol (MPTCP) extension was
standardized and is undergoing a quick adoption in many use-cases, from mobile
to fixed access networks, from data-centers to core networks. Among its major
benefits -- i.e., reliability thanks to backup path rerouting; throughput
increase thanks to link aggregation; and confidentiality thanks to harder
capacity to intercept a full connection -- the latter has attracted lower
attention. How interesting would it be using MPTCP to exploit multiple
Internet-scale paths hence decreasing the probability of man-in-the-middle
(MITM) attacks is a question to which we try to answer. By analyzing the
Autonomous System (AS) level graph, we identify which countries and regions
show a higher level of robustness against MITM AS-level attacks, for example
due to core cable tapping or route hijacking practices.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2017 11:46:39 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Nguyen",
"Ho-Dac-Duy",
"",
"UFPR"
],
[
"Phung",
"Chi-Dung",
"",
"UFPR"
],
[
"Secci",
"Stefano",
"",
"UFPR"
],
[
"Felix",
"Benevid",
"",
"UFPR"
],
[
"Nogueira",
"Michele",
"",
"UFPR"
]
] |
new_dataset
| 0.991758 |
1704.07163
|
Chang-Ryeol Lee
|
Chang-Ryeol Lee and Kuk-Jin Yoon
|
Monocular Visual Odometry with a Rolling Shutter Camera
|
14 pages, 8 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rolling Shutter (RS) cameras have become popularized because of low-cost
imaging capability. However, the RS cameras suffer from undesirable artifacts
when the camera or the subject is moving, or illumination condition changes.
For that reason, Monocular Visual Odometry (MVO) with RS cameras produces
inaccurate ego-motion estimates. Previous works solve this RS distortion
problem with motion prediction from images and/or inertial sensors. However,
the MVO still has trouble in handling the RS distortion when the camera motion
changes abruptly (e.g. vibration of mobile cameras causes extremely fast motion
instantaneously). To address the problem, we propose the novel MVO algorithm in
consideration of the geometric characteristics of RS cameras. The key idea of
the proposed algorithm is the new RS essential matrix which incorporates the
instantaneous angular and linear velocities at each frame. Our algorithm
produces accurate and robust ego-motion estimates in an online manner, and is
applicable to various mobile applications with RS cameras. The superiority of
the proposed algorithm is validated through quantitative and qualitative
comparison on both synthetic and real dataset.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2017 12:02:53 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Lee",
"Chang-Ryeol",
""
],
[
"Yoon",
"Kuk-Jin",
""
]
] |
new_dataset
| 0.99696 |
1704.07238
|
Pedro Hecht
|
Pedro Hecht
|
Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order
|
9 pages, 13 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Currently there is an active Post-Quantum Cryptography (PQC) solutions
search, which attempts to find cryptographic protocols resistant to attacks by
means of for instance Shor polynomial time algorithm for numerical field
problems like integer factorization (IFP) or the discrete logarithm (DLP). The
use of non-commutative or non-associative structures are, among others, valid
choices for these kinds of protocols. In our case, we focus on a permutation
subgroup of high order and belonging to the symmetric group S381. Using
adequate one-way functions (OWF), we derived a Diffie-Hellman key exchange and
an ElGamal ciphering procedure that only relies on combinatorial operations.
Both OWF pose hard search problems which are assumed as not belonging to BQP
time-complexity class. Obvious advantages of present protocols are their
conceptual simplicity, fast throughput implementations, high cryptanalytic
security and no need for arithmetic operations and therefore extended precision
libraries. Such features make them suitable for low performance and low power
consumption platforms like smart cards, USB-keys and cellphones.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2017 13:57:40 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Hecht",
"Pedro",
""
]
] |
new_dataset
| 0.992304 |
1704.07296
|
Pei Xu
|
Pei Xu
|
A Real-time Hand Gesture Recognition and Human-Computer Interaction
System
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this project, we design a real-time human-computer interaction system
based on hand gesture. The whole system consists of three components: hand
detection, gesture recognition and human-computer interaction (HCI) based on
recognition; and realizes the robust control of mouse and keyboard events with
a higher accuracy of gesture recognition. Specifically, we use the
convolutional neural network (CNN) to recognize gestures and makes it
attainable to identify relatively complex gestures using only one cheap
monocular camera. We introduce the Kalman filter to estimate the hand position
based on which the mouse cursor control is realized in a stable and smooth way.
During the HCI stage, we develop a simple strategy to avoid the false
recognition caused by noises - mostly transient, false gestures, and thus to
improve the reliability of interaction. The developed system is highly
extendable and can be used in human-robotic or other human-machine interaction
scenarios with more complex command formats rather than just mouse and keyboard
events.
|
[
{
"version": "v1",
"created": "Mon, 24 Apr 2017 15:44:56 GMT"
}
] | 2017-04-25T00:00:00 |
[
[
"Xu",
"Pei",
""
]
] |
new_dataset
| 0.986796 |
1509.04627
|
Johannes Holke
|
Carsten Burstedde, Johannes Holke
|
A tetrahedral space-filling curve for non-conforming adaptive meshes
|
33 pages, 12 figures, 8 tables
| null |
10.1137/15M1040049
| null |
cs.DC cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a space-filling curve for triangular and tetrahedral
red-refinement that can be computed using bitwise interleaving operations
similar to the well-known Z-order or Morton curve for cubical meshes. To store
sufficient information for random access, we define a low-memory encoding using
10 bytes per triangle and 14 bytes per tetrahedron. We present algorithms that
compute the parent, children, and face-neighbors of a mesh element in constant
time, as well as the next and previous element in the space-filling curve and
whether a given element is on the boundary of the root simplex or not. Our
presentation concludes with a scalability demonstration that creates and adapts
selected meshes on a large distributed-memory system.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2015 16:16:54 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Apr 2017 09:44:26 GMT"
}
] | 2017-04-24T00:00:00 |
[
[
"Burstedde",
"Carsten",
""
],
[
"Holke",
"Johannes",
""
]
] |
new_dataset
| 0.969772 |
1608.05866
|
Marius Poke
|
Marius Poke, Torsten Hoefler, Colin W. Glass
|
AllConcur: Leaderless Concurrent Atomic Broadcast (Extended Version)
|
Overview: 18 pages, 7 sections, 10 figures, 3 tables. Modifications
from previous version: added Figure 4; added, in Section 4.4, a paragraph
describing the construction of Gs digraphs; added Section 4.5, a theoretical
comparison between AllConcur and leader-based agreement; added, in Section 5,
a comparison to unreliable agreement; rephrased several paragraphs to improve
clarity
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many distributed systems require coordination between the components
involved. With the steady growth of such systems, the probability of failures
increases, which necessitates scalable fault-tolerant agreement protocols. The
most common practical agreement protocol, for such scenarios, is leader-based
atomic broadcast. In this work, we propose AllConcur, a distributed system that
provides agreement through a leaderless concurrent atomic broadcast algorithm,
thus, not suffering from the bottleneck of a central coordinator. In AllConcur,
all components exchange messages concurrently through a logical overlay network
that employs early termination to minimize the agreement latency. Our
implementation of AllConcur supports standard sockets-based TCP as well as
high-performance InfiniBand Verbs communications. AllConcur can handle up to
135 million requests per second and achieves 17x higher throughput than today's
standard leader-based protocols, such as Libpaxos. Thus, AllConcur is highly
competitive with regard to existing solutions and, due to its decentralized
approach, enables hitherto unattainable system designs in a variety of fields.
|
[
{
"version": "v1",
"created": "Sat, 20 Aug 2016 19:53:45 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Apr 2017 13:41:39 GMT"
}
] | 2017-04-24T00:00:00 |
[
[
"Poke",
"Marius",
""
],
[
"Hoefler",
"Torsten",
""
],
[
"Glass",
"Colin W.",
""
]
] |
new_dataset
| 0.99963 |
1703.00565
|
Jason Kessler
|
Jason S. Kessler
|
Scattertext: a Browser-Based Tool for Visualizing how Corpora Differ
|
ACL 2017 Demos. 6 pages, 5 figures. See the Githup repo
https://github.com/JasonKessler/scattertext for source code and documentation
| null | null | null |
cs.CL cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Scattertext is an open source tool for visualizing linguistic variation
between document categories in a language-independent way. The tool presents a
scatterplot, where each axis corresponds to the rank-frequency a term occurs in
a category of documents. Through a tie-breaking strategy, the tool is able to
display thousands of visible term-representing points and find space to legibly
label hundreds of them. Scattertext also lends itself to a query-based
visualization of how the use of terms with similar embeddings differs between
document categories, as well as a visualization for comparing the importance
scores of bag-of-words features to univariate metrics.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2017 00:48:15 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Mar 2017 19:15:04 GMT"
},
{
"version": "v3",
"created": "Thu, 20 Apr 2017 21:39:34 GMT"
}
] | 2017-04-24T00:00:00 |
[
[
"Kessler",
"Jason S.",
""
]
] |
new_dataset
| 0.987964 |
1704.04725
|
Wei Guo
|
Wei Guo, Weile Zhang, Pengcheng Mu, Feifei Gao and Bobin Yao
|
Angle-Domain Doppler Pre-Compensation for High-Mobility OFDM Uplink with
a Massive ULA
|
arXiv admin note: text overlap with arXiv:1701.03221
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a Doppler pre-compensation scheme for high-mobility
orthogonal frequency division multiplexing (OFDM) uplink, where a high-speed
terminal transmits signals to the base station (BS). Considering that the
time-varying multipath channel consists of multiple Doppler frequency offsets
(DFOs) with different angle of departures (AoDs), we propose to perform DFO
pre-compensation at the transmitter with a large-scale uniform linear array
(ULA). The transmitted signal passes through a beamforming network with
high-spatial resolution to produce multiple parallel branches. Each branch
transmits signal towards one direction thus it is affected by one dominant DFO
when passing over the time-varying channel. Therefore, we can compensate the
DFO for each branch at the transmitter previously. Theoretical analysis for the
Doppler spread of the equivalent uplink channel is also conducted. It is found
that when the number of transmit antennas is sufficiently large, the
time-variation of channel can be efficiently suppressed. Therefore, the
performance will not degrade significantly if applying the conventional
time-invariant channel estimation and equalization methods at the receiver.
Simulation results are provided to verify the proposed scheme.
|
[
{
"version": "v1",
"created": "Sun, 16 Apr 2017 05:11:24 GMT"
}
] | 2017-04-24T00:00:00 |
[
[
"Guo",
"Wei",
""
],
[
"Zhang",
"Weile",
""
],
[
"Mu",
"Pengcheng",
""
],
[
"Gao",
"Feifei",
""
],
[
"Yao",
"Bobin",
""
]
] |
new_dataset
| 0.998359 |
1704.06375
|
Hualu Liu
|
Xiusheng Liu and Hualu Liu
|
Quantum Codes from Linear Codes over Finite Chain Rings
| null | null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by/4.0/
|
In this paper, we provide two methods of constructing quantum codes from
linear codes over finite chain rings. The first one is derived from the
Calderbank-Shor-Steane (CSS) construction applied to self-dual codes over
finite chain rings. The second construction is derived from the CSS
construction applied to Gray images of the linear codes over finite chain ring
$\mathbb{F}_{p^{2m}}+u\mathbb{F}_{p^{2m}}$. The good parameters of quantum
codes from cyclic codes over finite chain rings are obtained.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2017 01:28:36 GMT"
}
] | 2017-04-24T00:00:00 |
[
[
"Liu",
"Xiusheng",
""
],
[
"Liu",
"Hualu",
""
]
] |
new_dataset
| 0.99904 |
1704.06531
|
Ali Bereyhi
|
Saba Asaad, Ali Bereyhi, Mohammad Ali Sedaghat, Ralf R. M\"uller, Amir
M. Rabiei
|
Asymptotic Performance Analysis of Spatially Reconfigurable Antenna
Arrays
|
6 pages, 3 figures, presented at WSA 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A spatially reconfigurable antenna arrays consists of an antenna array of
finite length and fixed geometry which is displaced within a given area. Using
these reconfigurable components, the performance of MIMO systems is remarkably
improved by effectively positioning the array in its displacement area. This
paper studies the large-system performance of MIMO setups with spatially
reconfigurable antenna arrays when the displacement area is large. Considering
fading channels, the distribution of the input-output mutual information is
derived, and the asymptotic hardening property is demonstrated to hold. As the
size of the displacement area grows large, the mutual information is shown to
converge in distribution to a type-one Gumbel random variable whose mean grows
large proportional to the displacement size, and whose variance tends to zero.
Our numerical investigations depict that the type-one Gumbel approximation
closely tracks the empirical distribution even for a finite displacement size.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2017 13:28:17 GMT"
}
] | 2017-04-24T00:00:00 |
[
[
"Asaad",
"Saba",
""
],
[
"Bereyhi",
"Ali",
""
],
[
"Sedaghat",
"Mohammad Ali",
""
],
[
"Müller",
"Ralf R.",
""
],
[
"Rabiei",
"Amir M.",
""
]
] |
new_dataset
| 0.988728 |
1704.06544
|
Tobias Fechter
|
Tobias Fechter, Sonja Adebahr, Dimos Baltas, Ismail Ben Ayed,
Christian Desrosiers, Jose Dolz
|
A 3D fully convolutional neural network and a random walker to segment
the esophagus in CT
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Precise delineation of organs at risk (OAR) is a crucial task in radiotherapy
treatment planning, which aims at delivering high dose to the tumour while
sparing healthy tissues. In recent years algorithms showed high performance and
the possibility to automate this task for many OAR. However, for some OAR
precise delineation remains challenging. The esophagus with a versatile shape
and poor contrast is among these structures. To tackle these issues we propose
a 3D fully (convolutional neural network (CNN) driven random walk (RW) approach
to automatically segment the esophagus on CT. First, a soft probability map is
generated by the CNN. Then an active contour model (ACM) is fitted on the
probability map to get a first estimation of the center line. The outputs of
the CNN and ACM are then used in addition to CT Hounsfield values to drive the
RW. Evaluation and training was done on 50 CTs with peer reviewed esophagus
contours. Results were assessed regarding spatial overlap and shape
similarities.
The generated contours showed a mean Dice coefficient of 0.76, an average
symmetric square distance of 1.36 mm and an average Hausdorff distance of 11.68
compared to the reference. These figures translate into a very good agreement
with the reference contours and an increase in accuracy compared to other
methods.
We show that by employing a CNN accurate estimations of esophagus location
can be obtained and refined by a post processing RW step. One of the main
advantages compared to previous methods is that our network performs
convolutions in a 3D manner, fully exploiting the 3D spatial context and
performing an efficient and precise volume-wise prediction. The whole
segmentation process is fully automatic and yields esophagus delineations in
very good agreement with the used gold standard, showing that it can compete
with previously published methods.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2017 13:54:00 GMT"
}
] | 2017-04-24T00:00:00 |
[
[
"Fechter",
"Tobias",
""
],
[
"Adebahr",
"Sonja",
""
],
[
"Baltas",
"Dimos",
""
],
[
"Ayed",
"Ismail Ben",
""
],
[
"Desrosiers",
"Christian",
""
],
[
"Dolz",
"Jose",
""
]
] |
new_dataset
| 0.998495 |
1704.06593
|
Jacek Bialowas
|
Jacek Bialowas, Beata Grzyb, Pawel Poszumski
|
Firing Cell: An Artificial Neuron with a Simulation of
Long-Term-Potentiation-Related Memory
|
4 pages, 3 figures
|
ISAROB 2006, pp.731-734
| null | null |
cs.NE q-bio.NC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a computational model of neuron, called firing cell (FC),
properties of which cover such phenomena as attenuation of receptors for
external stimuli, delay and decay of postsynaptic potentials, modification of
internal weights due to propagation of postsynaptic potentials through the
dendrite, modification of properties of the analog memory for each input due to
a pattern of short-time synaptic potentiation or long-time synaptic
potentiation (LTP), output-spike generation when the sum of all inputs exceeds
a threshold, and refraction. The cell may take one of the three forms:
excitatory, inhibitory, and receptory. The computer simulations showed that,
depending on the phase of input signals, the artificial neuron's output
frequency may demonstrate various chaotic behaviors.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2017 15:31:33 GMT"
}
] | 2017-04-24T00:00:00 |
[
[
"Bialowas",
"Jacek",
""
],
[
"Grzyb",
"Beata",
""
],
[
"Poszumski",
"Pawel",
""
]
] |
new_dataset
| 0.998988 |
1505.05055
|
Carsten Burstedde
|
Carsten Burstedde and Johannes Holke and Tobin Isaac
|
Bounds on the number of discontinuities of Morton-type space-filling
curves
|
25 pages, 16 figures, 2 tables: added proofs for triangles and
tetrahedra; moved appendices into main document
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Morton- or z-curve is one example for a space filling curve: Given a
level of refinement L, it maps the interval [0, 2**dL) one-to-one to a set of
d-dimensional cubes of edge length 2**-L that form a subdivision of the unit
cube. Similar curves have been proposed for triangular and tetrahedral unit
domains. In contrast to the Hilbert curve that is continuous, the Morton-type
curves produce jumps.
We prove that any contiguous subinterval of the curve divides the domain into
a bounded number of face-connected subdomains. For the hypercube case and
arbitrary dimension, the subdomains are star-shaped and the bound is indeed
two. For the simplicial case in dimensions 2 and 3, the bound is proportional
to the depth of refinement L. We supplement the paper with theoretical and
computational studies on the frequency of jumps for a quantitative assessment.
|
[
{
"version": "v1",
"created": "Tue, 24 Mar 2015 22:25:50 GMT"
},
{
"version": "v2",
"created": "Wed, 20 May 2015 20:05:03 GMT"
},
{
"version": "v3",
"created": "Sat, 1 Aug 2015 17:59:50 GMT"
},
{
"version": "v4",
"created": "Thu, 20 Apr 2017 08:05:35 GMT"
}
] | 2017-04-21T00:00:00 |
[
[
"Burstedde",
"Carsten",
""
],
[
"Holke",
"Johannes",
""
],
[
"Isaac",
"Tobin",
""
]
] |
new_dataset
| 0.998599 |
1512.02347
|
Erkan Bostanci
|
Erkan Bostanci
|
Medical Wearable Technologies: Applications, Problems and Solutions
|
4 pages, conference, in Turkish
| null |
10.1109/TIPTEKNO.2015.7374111
| null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The focus of this paper is on wearable technologies which are increasingly
being employed in the medical field. From smart watches to smart glasses, from
electronic textile to data gloves; several gadgets are playing important roles
in diagnosis and treatment of various medical conditions. The threats posed by
these technologies are another matter of concern that must be seriously taken
into account. Numerous threats ranging from data privacy to big data problems
are facing us as adverse effects of these technologies. The paper analyses the
application areas and challenges of wearable technologies from a technical and
ethical point of view and presents solutions to possible threats.
|
[
{
"version": "v1",
"created": "Tue, 8 Dec 2015 06:29:27 GMT"
}
] | 2017-04-21T00:00:00 |
[
[
"Bostanci",
"Erkan",
""
]
] |
new_dataset
| 0.996593 |
1701.08251
|
Nasrin Mostafazadeh
|
Nasrin Mostafazadeh, Chris Brockett, Bill Dolan, Michel Galley,
Jianfeng Gao, Georgios P. Spithourakis, Lucy Vanderwende
|
Image-Grounded Conversations: Multimodal Context for Natural Question
and Response Generation
| null | null | null | null |
cs.CL cs.AI cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The popularity of image sharing on social media and the engagement it creates
between users reflects the important role that visual context plays in everyday
conversations. We present a novel task, Image-Grounded Conversations (IGC), in
which natural-sounding conversations are generated about a shared image. To
benchmark progress, we introduce a new multiple-reference dataset of
crowd-sourced, event-centric conversations on images. IGC falls on the
continuum between chit-chat and goal-directed conversation models, where visual
grounding constrains the topic of conversation to event-driven utterances.
Experiments with models trained on social media data show that the combination
of visual and textual context enhances the quality of generated conversational
turns. In human evaluation, the gap between human performance and that of both
neural and retrieval architectures suggests that multi-modal IGC presents an
interesting challenge for dialogue research.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2017 05:06:11 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Apr 2017 00:36:35 GMT"
}
] | 2017-04-21T00:00:00 |
[
[
"Mostafazadeh",
"Nasrin",
""
],
[
"Brockett",
"Chris",
""
],
[
"Dolan",
"Bill",
""
],
[
"Galley",
"Michel",
""
],
[
"Gao",
"Jianfeng",
""
],
[
"Spithourakis",
"Georgios P.",
""
],
[
"Vanderwende",
"Lucy",
""
]
] |
new_dataset
| 0.999485 |
1704.05909
|
James Peters Ph.D.
|
J.F. Peters
|
Proximal Nerve Complexes. A Computational Topology Approach
|
16 pages, 9 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article introduces a theory of proximal nerve complexes and nerve
spokes, restricted to the triangulation of finite regions in the Euclidean
plane. A nerve complex is a collection of filled triangles with a common
vertex, covering a finite region of the plane. Structures called $k$-spokes,
$k\geq 1$, are a natural extension of nerve complexes. A $k$-spoke is the union
of a collection of filled triangles that pairwise either have a common edge or
a common vertex. A consideration of the closeness of nerve complexes leads to a
proximal view of simplicial complexes. A practical application of proximal
nerve complexes is given, briefly, in terms of object shape geometry in digital
images.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2017 23:15:17 GMT"
}
] | 2017-04-21T00:00:00 |
[
[
"Peters",
"J. F.",
""
]
] |
new_dataset
| 0.99858 |
1704.05921
|
Dat Tran
|
Dat Tran and Christof Teuscher
|
Memcapacitive Devices in Logic and Crossbar Applications
| null | null | null | null |
cs.ET
|
http://creativecommons.org/publicdomain/zero/1.0/
|
Over the last decade, memristive devices have been widely adopted in
computing for various conventional and unconventional applications. While the
integration density, memory property, and nonlinear characteristics have many
benefits, reducing the energy consumption is limited by the resistive nature of
the devices. Memcapacitors would address that limitation while still having all
the benefits of memristors. Recent work has shown that with adjusted parameters
during the fabrication process, a metal-oxide device can indeed exhibit a
memcapacitive behavior. We introduce novel memcapacitive logic gates and
memcapacitive crossbar classifiers as a proof of concept that such applications
can outperform memristor-based architectures. The results illustrate that,
compared to memristive logic gates, our memcapacitive gates consume about 7x
less power. The memcapacitive crossbar classifier achieves similar
classification performance but reduces the power consumption by a factor of
about 1,500x for the MNIST dataset and a factor of about 1,000x for the
CIFAR-10 dataset compared to a memristive crossbar. Our simulation results
demonstrate that memcapacitive devices have great potential for both Boolean
logic and analog low-power applications.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2017 20:13:41 GMT"
}
] | 2017-04-21T00:00:00 |
[
[
"Tran",
"Dat",
""
],
[
"Teuscher",
"Christof",
""
]
] |
new_dataset
| 0.999172 |
1704.05939
|
Karel Lenc
|
Vassileios Balntas and Karel Lenc and Andrea Vedaldi and Krystian
Mikolajczyk
|
HPatches: A benchmark and evaluation of handcrafted and learned local
descriptors
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a novel benchmark for evaluating local image
descriptors. We demonstrate that the existing datasets and evaluation protocols
do not specify unambiguously all aspects of evaluation, leading to ambiguities
and inconsistencies in results reported in the literature. Furthermore, these
datasets are nearly saturated due to the recent improvements in local
descriptors obtained by learning them from large annotated datasets. Therefore,
we introduce a new large dataset suitable for training and testing modern
descriptors, together with strictly defined evaluation protocols in several
tasks such as matching, retrieval and classification. This allows for more
realistic, and thus more reliable comparisons in different application
scenarios. We evaluate the performance of several state-of-the-art descriptors
and analyse their properties. We show that a simple normalisation of
traditional hand-crafted descriptors can boost their performance to the level
of deep learning based descriptors within a realistic benchmarks evaluation.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2017 21:37:03 GMT"
}
] | 2017-04-21T00:00:00 |
[
[
"Balntas",
"Vassileios",
""
],
[
"Lenc",
"Karel",
""
],
[
"Vedaldi",
"Andrea",
""
],
[
"Mikolajczyk",
"Krystian",
""
]
] |
new_dataset
| 0.999525 |
1704.05972
|
Leon Derczynski
|
Leon Derczynski and Kalina Bontcheva and Maria Liakata and Rob Procter
and Geraldine Wong Sak Hoi and Arkaitz Zubiaga
|
SemEval-2017 Task 8: RumourEval: Determining rumour veracity and support
for rumours
| null | null | null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Media is full of false claims. Even Oxford Dictionaries named "post-truth" as
the word of 2016. This makes it more important than ever to build systems that
can identify the veracity of a story, and the kind of discourse there is around
it. RumourEval is a SemEval shared task that aims to identify and handle
rumours and reactions to them, in text. We present an annotation scheme, a
large dataset covering multiple topics - each having their own families of
claims and replies - and use these to pose two concrete challenges as well as
the results achieved by participants on these challenges.
|
[
{
"version": "v1",
"created": "Thu, 20 Apr 2017 01:21:20 GMT"
}
] | 2017-04-21T00:00:00 |
[
[
"Derczynski",
"Leon",
""
],
[
"Bontcheva",
"Kalina",
""
],
[
"Liakata",
"Maria",
""
],
[
"Procter",
"Rob",
""
],
[
"Hoi",
"Geraldine Wong Sak",
""
],
[
"Zubiaga",
"Arkaitz",
""
]
] |
new_dataset
| 0.999276 |
1103.4177
|
Lele Wang
|
Lele Wang and Mohammad Naghshvar
|
On the Capacity of the Noncausal Relay Channel
|
To appear in the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the noncausal relay channel, also known as the relay
channel with unlimited lookahead, introduced by El Gamal, Hassanpour, and
Mammen. Unlike the standard relay channel model, where the relay encodes its
signal based on the previous received output symbols, the relay in the
noncausal relay channel encodes its signal as a function of the entire received
sequence. In the existing coding schemes, the relay uses this noncausal
information solely to recover the transmitted message and then cooperates with
the sender to communicate this message to the receiver. However, it is shown in
this paper that by applying the Gelfand--Pinsker coding scheme, the relay can
take further advantage of the noncausally available information, which can
achieve strictly higher rates than existing coding schemes. This paper also
provides a new upper bound on the capacity of the noncausal relay that strictly
improves upon the cutset bound. These new lower and upper bounds on the
capacity coincide for the class of degraded noncausal relay channels and
establish the capacity for this class.
|
[
{
"version": "v1",
"created": "Tue, 22 Mar 2011 00:10:07 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Dec 2014 22:52:16 GMT"
},
{
"version": "v3",
"created": "Wed, 19 Apr 2017 17:55:44 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Wang",
"Lele",
""
],
[
"Naghshvar",
"Mohammad",
""
]
] |
new_dataset
| 0.999576 |
1610.00053
|
Jeffrey Shainline
|
Jeffrey M. Shainline and Sonia M. Buckley and Richard P. Mirin and Sae
Woo Nam
|
Superconducting optoelectronic circuits for neuromorphic computing
|
34 pages, 22 figures
| null |
10.1103/PhysRevApplied.7.034013
| null |
cs.NE cond-mat.supr-con physics.optics
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Neural networks have proven effective for solving many difficult
computational problems. Implementing complex neural networks in software is
very computationally expensive. To explore the limits of information
processing, it will be necessary to implement new hardware platforms with large
numbers of neurons, each with a large number of connections to other neurons.
Here we propose a hybrid semiconductor-superconductor hardware platform for the
implementation of neural networks and large-scale neuromorphic computing. The
platform combines semiconducting few-photon light-emitting diodes with
superconducting-nanowire single-photon detectors to behave as spiking neurons.
These processing units are connected via a network of optical waveguides, and
variable weights of connection can be implemented using several approaches. The
use of light as a signaling mechanism overcomes fanout and parasitic
constraints on electrical signals while simultaneously introducing physical
degrees of freedom which can be employed for computation. The use of
supercurrents achieves the low power density necessary to scale to systems with
enormous entropy. The proposed processing units can operate at speeds of at
least $20$ MHz with fully asynchronous activity, light-speed-limited latency,
and power densities on the order of 1 mW/cm$^2$ for neurons with 700
connections operating at full speed at 2 K. The processing units achieve an
energy efficiency of $\approx 20$ aJ per synapse event. By leveraging
multilayer photonics with deposited waveguides and superconductors with feature
sizes $>$ 100 nm, this approach could scale to systems with massive
interconnectivity and complexity for advanced computing as well as explorations
of information processing capacity in systems with an enormous number of
information-bearing microstates.
|
[
{
"version": "v1",
"created": "Fri, 30 Sep 2016 23:11:00 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Nov 2016 23:17:10 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Shainline",
"Jeffrey M.",
""
],
[
"Buckley",
"Sonia M.",
""
],
[
"Mirin",
"Richard P.",
""
],
[
"Nam",
"Sae Woo",
""
]
] |
new_dataset
| 0.984415 |
1701.07937
|
Taichi Uemura
|
Taichi Uemura
|
Homotopies for Free!
| null | null | null | null |
cs.LO math.LO
|
http://creativecommons.org/licenses/by/4.0/
|
We show "free theorems" in the style of Wadler for polymorphic functions in
homotopy type theory as consequences of the abstraction theorem. As an
application, it follows that every space defined as a higher inductive type has
the same homotopy groups as some type of polymorphic functions defined without
univalence or higher inductive types.
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2017 04:06:49 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Apr 2017 09:29:34 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Uemura",
"Taichi",
""
]
] |
new_dataset
| 0.986743 |
1702.04908
|
Ohad Kammar
|
Ohad Kammar, Paul B. Levy, Sean K. Moss, Sam Staton
|
A monad for full ground reference cells
| null | null | null | null |
cs.PL cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a denotational account of dynamic allocation of potentially cyclic
memory cells using a monad on a functor category. We identify the collection of
heaps as an object in a different functor category equipped with a monad for
adding hiding/encapsulation capabilities to the heaps. We derive a monad for
full ground references supporting effect masking by applying a state monad
transformer to the encapsulation monad. To evaluate the monad, we present a
denotational semantics for a call-by-value calculus with full ground
references, and validate associated code transformations.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 10:12:00 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Apr 2017 13:26:43 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Kammar",
"Ohad",
""
],
[
"Levy",
"Paul B.",
""
],
[
"Moss",
"Sean K.",
""
],
[
"Staton",
"Sam",
""
]
] |
new_dataset
| 0.994642 |
1704.05539
|
Russell Kaplan
|
Russell Kaplan, Christopher Sauer, Alexander Sosa
|
Beating Atari with Natural Language Guided Reinforcement Learning
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the first deep reinforcement learning agent that learns to beat
Atari games with the aid of natural language instructions. The agent uses a
multimodal embedding between environment observations and natural language to
self-monitor progress through a list of English instructions, granting itself
reward for completing instructions in addition to increasing the game score.
Our agent significantly outperforms Deep Q-Networks (DQNs), Asynchronous
Advantage Actor-Critic (A3C) agents, and the best agents posted to OpenAI Gym
on what is often considered the hardest Atari 2600 environment: Montezuma's
Revenge.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2017 21:31:29 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Kaplan",
"Russell",
""
],
[
"Sauer",
"Christopher",
""
],
[
"Sosa",
"Alexander",
""
]
] |
new_dataset
| 0.995763 |
1704.05547
|
Kathleen Nowak
|
Cliff Joslyn and Kathleen Nowak
|
Ubergraphs: A Definition of a Recursive Hypergraph Structure
|
9 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Partly in service of exploring the formal basis for Georgetown University's
AvesTerra database structure, we formalize a recursive hypergraph data
structure, which we call an ubergraph.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2017 22:10:47 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Joslyn",
"Cliff",
""
],
[
"Nowak",
"Kathleen",
""
]
] |
new_dataset
| 0.993672 |
1704.05591
|
Hamed Sadeghi
|
Hamed Sadeghi, Shahrokh Valaee and Shahram Shirani
|
OCRAPOSE II: An OCR-based indoor positioning system using mobile phone
images
|
14 pages, 22 Figures
| null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose an OCR (optical character recognition)-based
localization system called OCRAPOSE II, which is applicable in a number of
indoor scenarios including office buildings, parkings, airports, grocery
stores, etc. In these scenarios, characters (i.e. texts or numbers) can be used
as suitable distinctive landmarks for localization. The proposed system takes
advantage of OCR to read these characters in the query still images and
provides a rough location estimate using a floor plan. Then, it finds depth and
angle-of-view of the query using the information provided by the OCR engine in
order to refine the location estimate. We derive novel formulas for the query
angle-of-view and depth estimation using image line segments and the OCR box
information. We demonstrate the applicability and effectiveness of the proposed
system through experiments in indoor scenarios. It is shown that our system
demonstrates better performance compared to the state-of-the-art benchmarks in
terms of location recognition rate and average localization error specially
under sparse database condition.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2017 02:43:23 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Sadeghi",
"Hamed",
""
],
[
"Valaee",
"Shahrokh",
""
],
[
"Shirani",
"Shahram",
""
]
] |
new_dataset
| 0.998549 |
1704.05617
|
Chun-Nan Hsu
|
Sanjeev Shenoy, Tsung-Ting Kuo, Rodney Gabriel, Julian McAuley and
Chun-Nan Hsu
|
Deduplication in a massive clinical note dataset
|
Extended from the Master project report of Sanjeev Shenoy, Department
of Computer Science and Engineering, University of California, San Diego.
June 2016
| null | null | null |
cs.DB cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Duplication, whether exact or partial, is a common issue in many datasets. In
clinical notes data, duplication (and near duplication) can arise for many
reasons, such as the pervasive use of templates, copy-pasting, or notes being
generated by automated procedures. A key challenge in removing such near
duplicates is the size of such datasets; our own dataset consists of more than
10 million notes. To detect and correct such duplicates requires algorithms
that both accurate and highly scalable. We describe a solution based on
Minhashing with Locality Sensitive Hashing. In this paper, we present the
theory behind this method and present a database-inspired approach to make the
method scalable. We also present a clustering technique using disjoint sets to
produce dense clusters, which speeds up our algorithm.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2017 05:33:21 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Shenoy",
"Sanjeev",
""
],
[
"Kuo",
"Tsung-Ting",
""
],
[
"Gabriel",
"Rodney",
""
],
[
"McAuley",
"Julian",
""
],
[
"Hsu",
"Chun-Nan",
""
]
] |
new_dataset
| 0.976692 |
1704.05643
|
Bo Li
|
Bo Li, Huahui Chen, Yucheng Chen, Yuchao Dai, Mingyi He
|
Skeleton Boxes: Solving skeleton based action detection with a single
deep convolutional neural network
|
4 pages,3 figures, icmew 2017
|
icmew 2017
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Action recognition from well-segmented 3D skeleton video has been intensively
studied. However, due to the difficulty in representing the 3D skeleton video
and the lack of training data, action detection from streaming 3D skeleton
video still lags far behind its recognition counterpart and image based object
detection. In this paper, we propose a novel approach for this problem, which
leverages both effective skeleton video encoding and deep regression based
object detection from images. Our framework consists of two parts:
skeleton-based video image mapping, which encodes a skeleton video to a color
image in a temporal preserving way, and an end-to-end trainable fast skeleton
action detector (Skeleton Boxes) based on image detection. Experimental results
on the latest and largest PKU-MMD benchmark dataset demonstrate that our method
outperforms the state-of-the-art methods with a large margin. We believe our
idea would inspire and benefit future research in this important area.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2017 08:16:13 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Li",
"Bo",
""
],
[
"Chen",
"Huahui",
""
],
[
"Chen",
"Yucheng",
""
],
[
"Dai",
"Yuchao",
""
],
[
"He",
"Mingyi",
""
]
] |
new_dataset
| 0.997917 |
1704.05678
|
Soumyabrata Dev
|
Soumyabrata Dev, Florian M. Savoy, Yee Hui Lee, and Stefan Winkler
|
Design of low-cost, compact and weather-proof whole sky imagers for
high-dynamic-range captures
|
Published in Proc. IEEE International Geoscience and Remote Sensing
Symposium (IGARSS), July 2015
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ground-based whole sky imagers are popular for monitoring cloud formations,
which is necessary for various applications. We present two new Wide Angle
High-Resolution Sky Imaging System (WAHRSIS) models, which were designed
especially to withstand the hot and humid climate of Singapore. The first uses
a fully sealed casing, whose interior temperature is regulated using a Peltier
cooler. The second features a double roof design with ventilation grids on the
sides, allowing the outside air to flow through the device. Measurements of
temperature inside these two devices show their ability to operate in Singapore
weather conditions. Unlike our original WAHRSIS model, neither uses a
mechanical sun blocker to prevent the direct sunlight from reaching the camera;
instead they rely on high-dynamic-range imaging (HDRI) techniques to reduce the
glare from the sun.
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2017 10:27:30 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Dev",
"Soumyabrata",
""
],
[
"Savoy",
"Florian M.",
""
],
[
"Lee",
"Yee Hui",
""
],
[
"Winkler",
"Stefan",
""
]
] |
new_dataset
| 0.997414 |
1704.05742
|
Pengfei Liu
|
Pengfei Liu and Xipeng Qiu and Xuanjing Huang
|
Adversarial Multi-task Learning for Text Classification
|
Accepted by ACL2017
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Neural network models have shown their promising opportunities for multi-task
learning, which focus on learning the shared layers to extract the common and
task-invariant features. However, in most existing approaches, the extracted
shared features are prone to be contaminated by task-specific features or the
noise brought by other tasks. In this paper, we propose an adversarial
multi-task learning framework, alleviating the shared and private latent
feature spaces from interfering with each other. We conduct extensive
experiments on 16 different text classification tasks, which demonstrates the
benefits of our approach. Besides, we show that the shared knowledge learned by
our proposed model can be regarded as off-the-shelf knowledge and easily
transferred to new tasks. The datasets of all 16 tasks are publicly available
at \url{http://nlp.fudan.edu.cn/data/}
|
[
{
"version": "v1",
"created": "Wed, 19 Apr 2017 14:17:25 GMT"
}
] | 2017-04-20T00:00:00 |
[
[
"Liu",
"Pengfei",
""
],
[
"Qiu",
"Xipeng",
""
],
[
"Huang",
"Xuanjing",
""
]
] |
new_dataset
| 0.989746 |
1704.02222
|
Raul Acu\~na
|
Raul Acuna, Zaijuan Li, Volker Willert
|
MOMA: Visual Mobile Marker Odometry
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a cooperative odometry scheme based on the
detection of mobile markers in line with the idea of cooperative positioning
for multiple robots [1]. To this end, we introduce a simple optimization scheme
that realizes visual mobile marker odometry via accurate fixed marker-based
camera positioning and analyse the characteristics of errors inherent to the
method compared to classical fixed marker-based navigation and visual odometry.
In addition, we provide a specific UAV-UGV configuration that allows for
continuous movements of the UAV without doing stops and a minimal
caterpillar-like configuration that works with one UGV alone. Finally, we
present a real-world implementation and evaluation for the proposed UAV-UGV
configuration.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2017 13:25:50 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Apr 2017 10:40:41 GMT"
}
] | 2017-04-19T00:00:00 |
[
[
"Acuna",
"Raul",
""
],
[
"Li",
"Zaijuan",
""
],
[
"Willert",
"Volker",
""
]
] |
new_dataset
| 0.999523 |
1704.05091
|
Pedro Saleiro
|
Pedro Saleiro, Eduarda Mendes Rodrigues, Carlos Soares, Eug\'enio
Oliveira
|
FEUP at SemEval-2017 Task 5: Predicting Sentiment Polarity and Intensity
with Financial Word Embeddings
| null | null | null | null |
cs.CL cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the approach developed at the Faculty of Engineering of
University of Porto, to participate in SemEval 2017, Task 5: Fine-grained
Sentiment Analysis on Financial Microblogs and News. The task consisted in
predicting a real continuous variable from -1.0 to +1.0 representing the
polarity and intensity of sentiment concerning companies/stocks mentioned in
short texts. We modeled the task as a regression analysis problem and combined
traditional techniques such as pre-processing short texts, bag-of-words
representations and lexical-based features with enhanced financial specific
bag-of-embeddings. We used an external collection of tweets and news headlines
mentioning companies/stocks from S\&P 500 to create financial word embeddings
which are able to capture domain-specific syntactic and semantic similarities.
The resulting approach obtained a cosine similarity score of 0.69 in sub-task
5.1 - Microblogs and 0.68 in sub-task 5.2 - News Headlines.
|
[
{
"version": "v1",
"created": "Mon, 17 Apr 2017 18:48:00 GMT"
}
] | 2017-04-19T00:00:00 |
[
[
"Saleiro",
"Pedro",
""
],
[
"Rodrigues",
"Eduarda Mendes",
""
],
[
"Soares",
"Carlos",
""
],
[
"Oliveira",
"Eugénio",
""
]
] |
new_dataset
| 0.994375 |
1704.05174
|
Joao Papa
|
Joao Paulo Papa, Gustavo Henrique Rosa, Douglas Rodrigues, Xin-She
Yang
|
LibOPT: An Open-Source Platform for Fast Prototyping Soft Optimization
Techniques
| null | null | null | null |
cs.NE
|
http://creativecommons.org/licenses/by/4.0/
|
Optimization techniques play an important role in several scientific and
real-world applications, thus becoming of great interest for the community. As
a consequence, a number of open-source libraries are available in the
literature, which ends up fostering the research and development of new
techniques and applications. In this work, we present a new library for the
implementation and fast prototyping of nature-inspired techniques called
LibOPT. Currently, the library implements 15 techniques and 112 benchmarking
functions, as well as it also supports 11 hypercomplex-based optimization
approaches, which makes it one of the first of its kind. We showed how one can
easily use and also implement new techniques in LibOPT under the C paradigm.
Examples are provided with samples of source-code using benchmarking functions.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2017 02:16:13 GMT"
}
] | 2017-04-19T00:00:00 |
[
[
"Papa",
"Joao Paulo",
""
],
[
"Rosa",
"Gustavo Henrique",
""
],
[
"Rodrigues",
"Douglas",
""
],
[
"Yang",
"Xin-She",
""
]
] |
new_dataset
| 0.996943 |
1704.05181
|
Sanghamitra Dutta
|
Sanghamitra Dutta, Viveck Cadambe and Pulkit Grover
|
"Short-Dot": Computing Large Linear Transforms Distributedly Using Coded
Short Dot Products
|
Presented at NIPS 2016, Barcelona, Spain
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Faced with saturation of Moore's law and increasing dimension of data, system
designers have increasingly resorted to parallel and distributed computing.
However, distributed computing is often bottle necked by a small fraction of
slow processors called "stragglers" that reduce the speed of computation
because the fusion node has to wait for all processors to finish. To combat the
effect of stragglers, recent literature introduces redundancy in computations
across processors, e.g.,~using repetition-based strategies or erasure codes.
The fusion node can exploit this redundancy by completing the computation using
outputs from only a subset of the processors, ignoring the stragglers. In this
paper, we propose a novel technique -- that we call "Short-Dot" -- to introduce
redundant computations in a coding theory inspired fashion, for computing
linear transforms of long vectors. Instead of computing long dot products as
required in the original linear transform, we construct a larger number of
redundant and short dot products that can be computed faster and more
efficiently at individual processors. In reference to comparable schemes that
introduce redundancy to tackle stragglers, Short-Dot reduces the cost of
computation, storage and communication since shorter portions are stored and
computed at each processor, and also shorter portions of the input is
communicated to each processor. We demonstrate through probabilistic analysis
as well as experiments that Short-Dot offers significant speed-up compared to
existing techniques. We also derive trade-offs between the length of the
dot-products and the resilience to stragglers (number of processors to wait
for), for any such strategy and compare it to that achieved by our strategy.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2017 02:45:30 GMT"
}
] | 2017-04-19T00:00:00 |
[
[
"Dutta",
"Sanghamitra",
""
],
[
"Cadambe",
"Viveck",
""
],
[
"Grover",
"Pulkit",
""
]
] |
new_dataset
| 0.97571 |
1704.05215
|
Ashwin Mathur Mr.
|
Ashwin Mathur, Fei Han, and Hao Zhang
|
Multisensory Omni-directional Long-term Place Recognition: Benchmark
Dataset and Analysis
|
15 pages
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recognizing a previously visited place, also known as place recognition (or
loop closure detection) is the key towards fully autonomous mobile robots and
self-driving vehicle navigation. Augmented with various Simultaneous
Localization and Mapping techniques (SLAM), loop closure detection allows for
incremental pose correction and can bolster efficient and accurate map
creation. However, repeated and similar scenes (perceptual aliasing) and long
term appearance changes (e.g. weather variations) are major challenges for
current place recognition algorithms. We introduce a new dataset Multisensory
Omnidirectional Long-term Place recognition (MOLP) comprising omnidirectional
intensity and disparity images. This dataset presents many of the challenges
faced by outdoor mobile robots and current place recognition algorithms. Using
MOLP dataset, we formulate the place recognition problem as a regularized
sparse convex optimization problem. We conclude that information extracted from
intensity image is superior to disparity image in isolating discriminative
features for successful long term place recognition. Furthermore, when these
discriminative features are extracted from an omnidirectional vision sensor, a
robust bidirectional loop closure detection approach is established, allowing
mobile robots to close the loop, regardless of the difference in the direction
when revisiting a place.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2017 06:36:48 GMT"
}
] | 2017-04-19T00:00:00 |
[
[
"Mathur",
"Ashwin",
""
],
[
"Han",
"Fei",
""
],
[
"Zhang",
"Hao",
""
]
] |
new_dataset
| 0.988626 |
1704.05254
|
Fabian Peternek
|
Sebastian Maneth and Fabian Peternek
|
Grammar-Based Graph Compression
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new graph compressor that works by recursively detecting
repeated substructures and representing them through grammar rules. We show
that for a large number of graphs the compressor obtains smaller
representations than other approaches. Specific queries such as reachability
between two nodes or regular path queries can be evaluated in linear time (or
quadratic times, respectively), over the grammar, thus allowing speed-ups
proportional to the compression ratio.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2017 09:49:45 GMT"
}
] | 2017-04-19T00:00:00 |
[
[
"Maneth",
"Sebastian",
""
],
[
"Peternek",
"Fabian",
""
]
] |
new_dataset
| 0.955289 |
1704.05316
|
Sabri Pllana
|
Suejb Memeti and Lu Li and Sabri Pllana and Joanna Kolodziej and
Christoph Kessler
|
Benchmarking OpenCL, OpenACC, OpenMP, and CUDA: programming
productivity, performance, and energy consumption
| null | null | null | null |
cs.DC cs.PF cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many modern parallel computing systems are heterogeneous at their node level.
Such nodes may comprise general purpose CPUs and accelerators (such as, GPU, or
Intel Xeon Phi) that provide high performance with suitable energy-consumption
characteristics. However, exploiting the available performance of heterogeneous
architectures may be challenging. There are various parallel programming
frameworks (such as, OpenMP, OpenCL, OpenACC, CUDA) and selecting the one that
is suitable for a target context is not straightforward.
In this paper, we study empirically the characteristics of OpenMP, OpenACC,
OpenCL, and CUDA with respect to programming productivity, performance, and
energy. To evaluate the programming productivity we use our homegrown tool
CodeStat, which enables us to determine the percentage of code lines that was
required to parallelize the code using a specific framework. We use our tool
x-MeterPU to evaluate the energy consumption and the performance. Experiments
are conducted using the industry-standard SPEC benchmark suite and the Rodinia
benchmark suite for accelerated computing on heterogeneous systems that combine
Intel Xeon E5 Processors with a GPU accelerator or an Intel Xeon Phi
co-processor.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2017 13:08:35 GMT"
}
] | 2017-04-19T00:00:00 |
[
[
"Memeti",
"Suejb",
""
],
[
"Li",
"Lu",
""
],
[
"Pllana",
"Sabri",
""
],
[
"Kolodziej",
"Joanna",
""
],
[
"Kessler",
"Christoph",
""
]
] |
new_dataset
| 0.999306 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.