id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1106.5742
|
Alireza Vahid
|
Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh
Sabharwal
|
Wireless Network Coding with Local Network Views: Coded Layer Scheduling
|
Technical report. A paper based on the results of this report will
appear
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the fundamental challenges in the design of distributed wireless
networks is the large dynamic range of network state. Since continuous tracking
of global network state at all nodes is practically impossible, nodes can only
acquire limited local views of the whole network to design their transmission
strategies. In this paper, we study multi-layer wireless networks and assume
that each node has only a limited knowledge, namely 1-local view, where each
S-D pair has enough information to perform optimally when other pairs do not
interfere, along with connectivity information for rest of the network. We
investigate the information-theoretic limits of communication with such limited
knowledge at the nodes. We develop a novel transmission strategy, namely Coded
Layer Scheduling, that solely relies on 1-local view at the nodes and
incorporates three different techniques: (1) per layer interference avoidance,
(2) repetition coding to allow overhearing of the interference, and (3) network
coding to allow interference neutralization. We show that our proposed scheme
can provide a significant throughput gain compared with the conventional
interference avoidance strategies. Furthermore, we show that our strategy
maximizes the achievable normalized sum-rate for some classes of networks,
hence, characterizing the normalized sum-capacity of those networks with
1-local view.
|
[
{
"version": "v1",
"created": "Tue, 28 Jun 2011 17:47:29 GMT"
},
{
"version": "v2",
"created": "Sun, 5 Feb 2012 23:58:47 GMT"
},
{
"version": "v3",
"created": "Fri, 14 Apr 2017 21:01:52 GMT"
}
] | 2017-04-18T00:00:00 |
[
[
"Vahid",
"Alireza",
""
],
[
"Aggarwal",
"Vaneet",
""
],
[
"Avestimehr",
"A. Salman",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
] |
new_dataset
| 0.981222 |
1601.05879
|
Jun Muramatsu
|
Jun Muramatsu and Shigeki Miyake
|
Construction of a Channel Code from an Arbitrary Source Code with
Decoder Side Information
|
(v.1) 9 pages. A short version is submitted to ISIT2016. (v.2) 21
pages. Submitted to IEEE Transactions on Information Theory. The second
author is added
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The construction of a channel code by using a source code with decoder side
information is introduced. For the construction, any pair of encoder and
decoder is available for a source code with decoder side information. A
constrained-random-number generator, which generates random numbers satisfying
a condition specified by a function and its value, is used to construct a
stochastic channel encoder. The result suggests that we can divide the channel
coding problem into the problems of channel encoding and source decoding with
side information.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 05:28:28 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Apr 2017 03:04:40 GMT"
}
] | 2017-04-18T00:00:00 |
[
[
"Muramatsu",
"Jun",
""
],
[
"Miyake",
"Shigeki",
""
]
] |
new_dataset
| 0.993368 |
1611.09714
|
Meghna Mankalale
|
Meghna G. Mankalale, Zhaoxin Liang, Zhengyang Zhao, Chris Kim,
Jian-Ping Wang, and Sachin S. Sapatnekar
|
CoMET: Composite-Input Magnetoelectric-based Logic Technology
| null | null | null | null |
cs.ET cond-mat.mes-hall
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work proposes CoMET, a fast and energy-efficient spintronics device for
logic applications. An input voltage is applied to a ferroelectric (FE)
material, in contact with a composite structure - a ferromagnet (FM) with
in-plane magnetic anisotropy (IMA) placed on top of an intra-gate FM
interconnect with perpendicular magnetic anisotropy (PMA). Through the
magnetoelectric (ME) effect, the input voltage nucleates a domain wall (DW) at
the input end of the PMA-FM interconnect. An applied current then rapidly
propagates the DW towards the output FE structure, where the inverse-ME effect
generates an output voltage. This voltage is propagated to the input of the
next CoMET device using a novel circuit structure that enables efficient device
cascading. The material parameters for CoMET are optimized by systematically
exploring the impact of parameter choices on device performance. Simulations on
a 7nm CoMET device show fast, low-energy operation, with a delay/energy of
98ps/68aJ for INV and 135ps/85aJ for MAJ3.
|
[
{
"version": "v1",
"created": "Tue, 29 Nov 2016 16:35:48 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Apr 2017 17:59:31 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Apr 2017 02:53:27 GMT"
}
] | 2017-04-18T00:00:00 |
[
[
"Mankalale",
"Meghna G.",
""
],
[
"Liang",
"Zhaoxin",
""
],
[
"Zhao",
"Zhengyang",
""
],
[
"Kim",
"Chris",
""
],
[
"Wang",
"Jian-Ping",
""
],
[
"Sapatnekar",
"Sachin S.",
""
]
] |
new_dataset
| 0.999814 |
1612.03216
|
Peter Potash
|
Peter Potash, Alexey Romanov, Anna Rumshisky
|
#HashtagWars: Learning a Sense of Humor
|
10 Pages
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we present a new dataset for computational humor, specifically
comparative humor ranking, which attempts to eschew the ubiquitous binary
approach to humor detection. The dataset consists of tweets that are humorous
responses to a given hashtag. We describe the motivation for this new dataset,
as well as the collection process, which includes a description of our
semi-automated system for data collection. We also present initial experiments
for this dataset using both unsupervised and supervised approaches. Our best
supervised system achieved 63.7% accuracy, suggesting that this task is much
more difficult than comparable humor detection tasks. Initial experiments
indicate that a character-level model is more suitable for this task than a
token-level model, likely due to a large amount of puns that can be captured by
a character-level model.
|
[
{
"version": "v1",
"created": "Fri, 9 Dec 2016 23:28:16 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Apr 2017 18:41:44 GMT"
}
] | 2017-04-18T00:00:00 |
[
[
"Potash",
"Peter",
""
],
[
"Romanov",
"Alexey",
""
],
[
"Rumshisky",
"Anna",
""
]
] |
new_dataset
| 0.999664 |
1704.04573
|
Xi Yang
|
Xi Yang, Zhichao Huang, Bin Han, Senjie Zhang, Chao-Kai Wen, Feifei
Gao, and Shi Jin
|
RaPro: A Novel 5G Rapid Prototyping System Architecture
|
accepted by IEEE Wireless Communication Letters
| null |
10.1109/LWC.2017.2692780
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel fifth-generation (5G) rapid prototyping (RaPro) system
architecture by combining FPGA-privileged modules from a software defined radio
(or FPGA-coprocessor) and high-level programming language for advanced
algorithms from multi-core general purpose processors. The proposed system
architecture exhibits excellent flexibility and scalability in the development
of a 5G prototyping system. As a proof of concept, a multi-user full-dimension
multiple-input and multiple-output system is established based on the proposed
architecture. Experimental results demonstrate the superiority of the proposed
architecture in large-scale antenna and wideband communication systems.
|
[
{
"version": "v1",
"created": "Sat, 15 Apr 2017 03:43:18 GMT"
}
] | 2017-04-18T00:00:00 |
[
[
"Yang",
"Xi",
""
],
[
"Huang",
"Zhichao",
""
],
[
"Han",
"Bin",
""
],
[
"Zhang",
"Senjie",
""
],
[
"Wen",
"Chao-Kai",
""
],
[
"Gao",
"Feifei",
""
],
[
"Jin",
"Shi",
""
]
] |
new_dataset
| 0.993285 |
1704.04585
|
Hung La
|
Devin Connell and Hung Manh La
|
Dynamic Path Planning and Replanning for Mobile Robots using RRT*
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is necessary for a mobile robot to be able to efficiently plan a path from
its starting, or current, location to a desired goal location. This is a
trivial task when the environment is static. However, the operational
environment of the robot is rarely static, and it often has many moving
obstacles. The robot may encounter one, or many, of these unknown and
unpredictable moving obstacles. The robot will need to decide how to proceed
when one of these obstacles is obstructing it's path. A method of dynamic
replanning using RRT* is presented. The robot will modify it's current plan
when an unknown random moving obstacle obstructs the path. Various experimental
results show the effectiveness of the proposed method.
|
[
{
"version": "v1",
"created": "Sat, 15 Apr 2017 05:03:57 GMT"
}
] | 2017-04-18T00:00:00 |
[
[
"Connell",
"Devin",
""
],
[
"La",
"Hung Manh",
""
]
] |
new_dataset
| 0.99833 |
1704.04672
|
Hung La
|
Alexander C. Woods and Hung M. La
|
A Novel Potential Field Controller for Use on Aerial Robots
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Unmanned Aerial Vehicles (UAV), commonly known as drones, have many potential
uses in real world applications. Drones require advanced planning and
navigation algorithms to enable them to safely move through and interact with
the world around them. This paper presents an extended potential field
controller (ePFC) which enables an aerial robot, or drone, to safely track a
dynamic target location while simultaneously avoiding any obstacles in its
path. The ePFC outperforms a traditional potential field controller (PFC) with
smoother tracking paths and shorter settling times. The proposed ePFC's
stability is evaluated by Lyapunov approach, and its performance is simulated
in a Matlab environment. Finally, the controller is implemented on an
experimental platform in a laboratory environment which demonstrates the
effectiveness of the controller.
|
[
{
"version": "v1",
"created": "Sat, 15 Apr 2017 18:13:28 GMT"
}
] | 2017-04-18T00:00:00 |
[
[
"Woods",
"Alexander C.",
""
],
[
"La",
"Hung M.",
""
]
] |
new_dataset
| 0.998092 |
1704.04689
|
Amir Mazaheri
|
Amir Mazaheri, Dong Zhang, Mubarak Shah
|
Video Fill In the Blank using LR/RL LSTMs with Spatial-Temporal
Attentions
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a video and a description sentence with one missing word (we call it
the "source sentence"), Video-Fill-In-the-Blank (VFIB) problem is to find the
missing word automatically. The contextual information of the sentence, as well
as visual cues from the video, are important to infer the missing word
accurately. Since the source sentence is broken into two fragments: the
sentence's left fragment (before the blank) and the sentence's right fragment
(after the blank), traditional Recurrent Neural Networks cannot encode this
structure accurately because of many possible variations of the missing word in
terms of the location and type of the word in the source sentence. For example,
a missing word can be the first word or be in the middle of the sentence and it
can be a verb or an adjective. In this paper, we propose a framework to tackle
the textual encoding: Two separate LSTMs (the LR and RL LSTMs) are employed to
encode the left and right sentence fragments and a novel structure is
introduced to combine each fragment with an "external memory" corresponding the
opposite fragments. For the visual encoding, end-to-end spatial and temporal
attention models are employed to select discriminative visual representations
to find the missing word. In the experiments, we demonstrate the superior
performance of the proposed method on challenging VFIB problem. Furthermore, we
introduce an extended and more generalized version of VFIB, which is not
limited to a single blank. Our experiments indicate the generalization
capability of our method in dealing with such more realistic scenarios.
|
[
{
"version": "v1",
"created": "Sat, 15 Apr 2017 21:13:41 GMT"
}
] | 2017-04-18T00:00:00 |
[
[
"Mazaheri",
"Amir",
""
],
[
"Zhang",
"Dong",
""
],
[
"Shah",
"Mubarak",
""
]
] |
new_dataset
| 0.954279 |
1704.04766
|
He Jiang
|
Jifeng Xuan, Yan Hu, He Jiang
|
Debt-Prone Bugs: Technical Debt in Software Maintenance
|
9 pages, 4 figures, International Journal of Advancements in
Computing Technology, 2012
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fixing bugs is an important phase in software development and maintenance. In
practice, the process of bug fixing may conflict with the release schedule.
Such confliction leads to a trade-off between software quality and release
schedule, which is known as the technical debt metaphor. In this article, we
propose the concept of debt-prone bugs to model the technical debt in software
maintenance. We identify three types of debt-prone bugs, namely tag bugs,
reopened bugs, and duplicate bugs. A case study on Mozilla is conducted to
examine the impact of debt-prone bugs in software products. We investigate the
correlation between debt-prone bugs and the product quality. For a product
under development, we build prediction models based on historical products to
predict the time cost of fixing bugs. The result shows that identifying
debt-prone bugs can assist in monitoring and improving software quality.
|
[
{
"version": "v1",
"created": "Sun, 16 Apr 2017 12:47:38 GMT"
}
] | 2017-04-18T00:00:00 |
[
[
"Xuan",
"Jifeng",
""
],
[
"Hu",
"Yan",
""
],
[
"Jiang",
"He",
""
]
] |
new_dataset
| 0.999496 |
1704.04792
|
Dhagash Mehta
|
Souvik Chandra, Dhagash Mehta, Aranya Chakrabortty
|
Locating Power Flow Solution Space Boundaries: A Numerical Polynomial
Homotopy Approach
|
9 pages, 5 figures
| null | null | null |
cs.SY math.AG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The solution space of any set of power flow equations may contain different
number of real-valued solutions. The boundaries that separate these regions are
referred to as power flow solution space boundaries. Knowledge of these
boundaries is important as they provide a measure for voltage stability.
Traditionally, continuation based methods have been employed to compute these
boundaries on the basis of initial guesses for the solution. However, with
rapid growth of renewable energy sources these boundaries will be increasingly
affected by variable parameters such as penetration levels, locations of the
renewable sources, and voltage set-points, making it difficult to generate an
initial guess that can guarantee all feasible solutions for the power flow
problem. In this paper we solve this problem by applying a numerical polynomial
homotopy based continuation method. The proposed method guarantees to find all
solution boundaries within a given parameter space up to a chosen level of
discretization, independent of any initial guess. Power system operators can
use this computational tool conveniently to plan the penetration levels of
renewable sources at different buses. We illustrate the proposed method through
simulations on 3-bus and 10-bus power system examples with renewable
generation.
|
[
{
"version": "v1",
"created": "Sun, 16 Apr 2017 16:05:52 GMT"
}
] | 2017-04-18T00:00:00 |
[
[
"Chandra",
"Souvik",
""
],
[
"Mehta",
"Dhagash",
""
],
[
"Chakrabortty",
"Aranya",
""
]
] |
new_dataset
| 0.958274 |
1701.07715
|
Julie Grollier
|
Jacob Torrejon, Mathieu Riou, Flavio Abreu Araujo, Sumito Tsunegi,
Guru Khalsa, Damien Querlioz, Paolo Bortolotti, Vincent Cros, Akio Fukushima,
Hitoshi Kubota, Shinji Yuasa, M. D. Stiles and Julie Grollier
|
Neuromorphic computing with nanoscale spintronic oscillators
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Neurons in the brain behave as non-linear oscillators, which develop rhythmic
activity and interact to process information. Taking inspiration from this
behavior to realize high density, low power neuromorphic computing will require
huge numbers of nanoscale non-linear oscillators. Indeed, a simple estimation
indicates that, in order to fit a hundred million oscillators organized in a
two-dimensional array inside a chip the size of a thumb, their lateral
dimensions must be smaller than one micrometer. However, despite multiple
theoretical proposals, there is no proof of concept today of neuromorphic
computing with nano-oscillators. Indeed, nanoscale devices tend to be noisy and
to lack the stability required to process data in a reliable way. Here, we show
experimentally that a nanoscale spintronic oscillator can achieve spoken digit
recognition with accuracies similar to state of the art neural networks. We
pinpoint the regime of magnetization dynamics leading to highest performance.
These results, combined with the exceptional ability of these spintronic
oscillators to interact together, their long lifetime, and low energy
consumption, open the path to fast, parallel, on-chip computation based on
networks of oscillators.
|
[
{
"version": "v1",
"created": "Wed, 25 Jan 2017 14:54:14 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Apr 2017 11:15:52 GMT"
}
] | 2017-04-17T00:00:00 |
[
[
"Torrejon",
"Jacob",
""
],
[
"Riou",
"Mathieu",
""
],
[
"Araujo",
"Flavio Abreu",
""
],
[
"Tsunegi",
"Sumito",
""
],
[
"Khalsa",
"Guru",
""
],
[
"Querlioz",
"Damien",
""
],
[
"Bortolotti",
"Paolo",
""
],
[
"Cros",
"Vincent",
""
],
[
"Fukushima",
"Akio",
""
],
[
"Kubota",
"Hitoshi",
""
],
[
"Yuasa",
"Shinji",
""
],
[
"Stiles",
"M. D.",
""
],
[
"Grollier",
"Julie",
""
]
] |
new_dataset
| 0.998288 |
1704.00057
|
Layla El Asri
|
Layla El Asri and Hannes Schulz and Shikhar Sharma and Jeremie Zumer
and Justin Harris and Emery Fine and Rahul Mehrotra and Kaheer Suleman
|
Frames: A Corpus for Adding Memory to Goal-Oriented Dialogue Systems
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the Frames dataset (Frames is available at
http://datasets.maluuba.com/Frames), a corpus of 1369 human-human dialogues
with an average of 15 turns per dialogue. We developed this dataset to study
the role of memory in goal-oriented dialogue systems. Based on Frames, we
introduce a task called frame tracking, which extends state tracking to a
setting where several states are tracked simultaneously. We propose a baseline
model for this task. We show that Frames can also be used to study memory in
dialogue management and information presentation through natural language
generation.
|
[
{
"version": "v1",
"created": "Fri, 31 Mar 2017 21:03:58 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Apr 2017 18:22:49 GMT"
}
] | 2017-04-17T00:00:00 |
[
[
"Asri",
"Layla El",
""
],
[
"Schulz",
"Hannes",
""
],
[
"Sharma",
"Shikhar",
""
],
[
"Zumer",
"Jeremie",
""
],
[
"Harris",
"Justin",
""
],
[
"Fine",
"Emery",
""
],
[
"Mehrotra",
"Rahul",
""
],
[
"Suleman",
"Kaheer",
""
]
] |
new_dataset
| 0.974931 |
1704.04365
|
Jianhua Mo
|
Jianhua Mo and Robert W. Heath Jr
|
Limited Feedback in Single and Multi-user MIMO Systems with Finite-Bit
ADCs
|
30 pages, 12 figures, submitted to IEEE Transactions on Wireless
Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Communication systems with low-resolution analog-to-digital-converters (ADCs)
can exploit channel state information at the transmitter and receiver. This
paper presents codebook designs and performance analyses for limited feedback
MIMO systems with finite-bit ADCs. A point-to-point single-user channel is
firstly considered. When the received signal is sliced by 1-bit ADCs, the
absolute phase at the receiver is important to align the phase of the received
signals. A new codebook design for beamforming, which separately quantizes the
channel direction and the residual phase, is therefore proposed. For the
multi-bit case where the optimal transmission method is unknown, suboptimal
Gaussian signaling and eigenvector beamforming is assumed to obtain a lower
bound of the achievable rate. It is found that to limit the rate loss, more
feedback bits are needed in the medium SNR regime than the low and high SNR
regimes, which is quite different from the conventional infinite-bit ADC case.
Second, a multi-user system where a multiple-antenna transmitter sends signals
to multiple single-antenna receivers with finite-bit ADCs is considered. Based
on the derived performance loss due to finite-bit ADCs and finite-bit CSI
feedback, the number of bits per feedback should increase linearly with the ADC
resolution in order to restrict the rate loss.
|
[
{
"version": "v1",
"created": "Fri, 14 Apr 2017 06:53:31 GMT"
}
] | 2017-04-17T00:00:00 |
[
[
"Mo",
"Jianhua",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] |
new_dataset
| 0.995451 |
1704.04460
|
Alexander Singh
|
Alexander Singh, Konstantinos Giannakis, Theodore Andronikos
|
Qumin, a minimalist quantum programming language
|
34 pages
| null | null | null |
cs.PL quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work we introduce Qumin, a novel quantum programming language with a
focus on providing an easy to use, minimalist, high-level, and easily
extensible platform for quantum programming. Qumin's design concentrates on
encompassing the various interactions between classical and quantum computation
via the use of two sublanguages: an untyped one that handles classical
preparation and control, and one linearly typed that explicitly handles quantum
routines. This allows the classical part of the language to be freely used for
general programming while placing restrictions on the quantum part that enforce
rules of quantum computing like the no-cloning of qubits.
We describe both the language's theoretical foundations in terms of lambda
calculi and linear type systems, and more practical matters such as
implementations of algorithms and useful programming tools like matrix and
oracle generators that streamline the interaction of the classical and quantum
fragments of a program. Finally, we provide an experimental open-source
implementation of an interpreter, typechecker and related tools for the
language (which can be found in \url{https://github.com/wintershammer/QImp}).
|
[
{
"version": "v1",
"created": "Fri, 14 Apr 2017 15:38:22 GMT"
}
] | 2017-04-17T00:00:00 |
[
[
"Singh",
"Alexander",
""
],
[
"Giannakis",
"Konstantinos",
""
],
[
"Andronikos",
"Theodore",
""
]
] |
new_dataset
| 0.999793 |
1704.04464
|
Ashish Kundu
|
Ashish Kundu, Zhiqiang Lin, Joshua Hammond
|
Energy Attacks on Mobile Devices
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
All mobile devices are energy-constrained. They use batteries that allows
using the device for a limited amount of time. In general, energy attacks on
mobile devices are denial of service (DoS) type of attacks. While previous
studies have analyzed the energy attacks in servers, no existing work has
analyzed the energy attacks on mobile devices. As such, in this paper, we
present the first systematic study on how to exploit the energy attacks on
smartphones. In particular, we explore energy attacks from the following
aspect: hardware components, software resources, and network communications
through the design and implementation of concrete malicious apps, and malicious
web pages. We quantitatively show how quickly we can drain the battery through
each individual attack, as well as their combinations. Finally, we believe
energy exploit will be a practical attack vector and mobile users should be
aware of this type of attacks.
|
[
{
"version": "v1",
"created": "Fri, 14 Apr 2017 16:08:35 GMT"
}
] | 2017-04-17T00:00:00 |
[
[
"Kundu",
"Ashish",
""
],
[
"Lin",
"Zhiqiang",
""
],
[
"Hammond",
"Joshua",
""
]
] |
new_dataset
| 0.998951 |
1704.04470
|
L. Elisa Celis
|
L. Elisa Celis and Farnood Salehi
|
Lean From Thy Neighbor: Stochastic & Adversarial Bandits in a Network
|
This article was first circulated in January 2015 and presented at
ISMP 2015 under the title "Bandit in a Network"
(https://informs.emeetingsonline.com/emeetings/formbuilder/clustersessiondtl.asp?csnno=22329&mmnno=264&ppnno=85856)
| null | null | null |
cs.LG cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An individual's decisions are often guided by those of his or her peers,
i.e., neighbors in a social network. Presumably, being privy to the experiences
of others aids in learning and decision making, but how much advantage does an
individual gain by observing her neighbors? Such problems make appearances in
sociology and economics and, in this paper, we present a novel model to capture
such decision-making processes and appeal to the classical multi-armed bandit
framework to analyze it. Each individual, in addition to her own actions, can
observe the actions and rewards obtained by her neighbors, and can use all of
this information in order to minimize her own regret. We provide algorithms for
this setting, both for stochastic and adversarial bandits, and show that their
regret smoothly interpolates between the regret in the classical bandit setting
and that of the full-information setting as a function of the neighbors'
exploration. In the stochastic setting the additional information must simply
be incorporated into the usual estimation of the rewards, while in the
adversarial setting this is attained by constructing a new unbiased estimator
for the rewards and appropriately bounding the amount of additional information
provided by the neighbors. These algorithms are optimal up to log factors;
despite the fact that the agents act independently and selfishly, this implies
that it is an approximate Nash equilibria for all agents to use our algorithms.
Further, we show via empirical simulations that our algorithms, often
significantly, outperform existing algorithms that one could apply to this
setting.
|
[
{
"version": "v1",
"created": "Fri, 14 Apr 2017 16:24:58 GMT"
}
] | 2017-04-17T00:00:00 |
[
[
"Celis",
"L. Elisa",
""
],
[
"Salehi",
"Farnood",
""
]
] |
new_dataset
| 0.993014 |
1609.06204
|
Alessio Palmero Aprosio
|
Alessio Palmero Aprosio and Giovanni Moretti
|
Italy goes to Stanford: a collection of CoreNLP modules for Italian
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this we paper present Tint, an easy-to-use set of fast, accurate and
extendable Natural Language Processing modules for Italian. It is based on
Stanford CoreNLP and is freely available as a standalone software or a library
that can be integrated in an existing project.
|
[
{
"version": "v1",
"created": "Tue, 20 Sep 2016 14:53:05 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Apr 2017 08:33:33 GMT"
}
] | 2017-04-14T00:00:00 |
[
[
"Aprosio",
"Alessio Palmero",
""
],
[
"Moretti",
"Giovanni",
""
]
] |
new_dataset
| 0.99835 |
1610.08809
|
Safa Jammali
|
Safa Jammali, Esaie Kuitche, Ayoub Rachati, Fran\c{c}ois B\'elanger,
Michelle Scott, A\"ida Ouangraoua
|
Aligning coding sequences with frameshift extension penalties
|
24 pages, 4 figures
|
Algorithms for Molecular Biology, 2017, vol. 12, no 1, p. 10
|
10.1186/s13015-017-0101-4
| null |
cs.DS q-bio.GN q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Frameshift translation is an important phenomenon that contributes to the
appearance of novel Coding DNA Sequences (CDS) and functions in gene evolution,
by allowing alternative amino acid translations of genes coding regions.
Frameshift translations can be identified by aligning two CDS, from a same gene
or from homologous genes, while accounting for their codon structure. Two main
classes of algorithms have been proposed to solve the problem of aligning CDS,
either by amino acid sequence alignment back-translation, or by simultaneously
accounting for the nucleotide and amino acid levels. The former does not allow
to account for frameshift translations and up to now, the latter exclusively
accounts for frameshift translation initiation, not accounting for the length
of the translation disruption caused by a frameshift.
Here, we introduce a new scoring scheme with an algorithm for the pairwise
alignment of CDS accounting for frameshift translation initiation and length,
while simultaneously accounting for nucleotide and amino acid sequences. We
compare the method to other CDS alignment methods based on an application to
the comparison of pairs of CDS from homologous \emph{human}, \emph{mouse} and
\emph{cow} genes of ten mammalian gene families from the Ensembl-Compara
database. The results show that our method is particularly robust to parameter
changes as compared to existing methods. It also appears to be a good
compromise, performing well both in the presence and absence of frameshift
translations between the CDS. An implementation of the method is available at
https://github.com/UdeS-CoBIUS/FsePSA.
|
[
{
"version": "v1",
"created": "Thu, 27 Oct 2016 14:43:48 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Apr 2017 17:04:29 GMT"
}
] | 2017-04-14T00:00:00 |
[
[
"Jammali",
"Safa",
""
],
[
"Kuitche",
"Esaie",
""
],
[
"Rachati",
"Ayoub",
""
],
[
"Bélanger",
"François",
""
],
[
"Scott",
"Michelle",
""
],
[
"Ouangraoua",
"Aïda",
""
]
] |
new_dataset
| 0.991088 |
1701.06478
|
Alireza Vahid
|
Alireza Vahid, Georgios Mappouras, Daniel J. Sorin, Robert Calderbank
|
Correcting Two Deletions and Insertions in Racetrack Memory
|
Technical report 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Racetrack memory is a non-volatile memory engineered to provide both high
density and low latency, that is subject to synchronization or shift errors.
This paper describes a fast coding solution, in which delimiter bits assist in
identifying the type of shift error, and easily implementable graph-based codes
are used to correct the error, once identified. A code that is able to detect
and correct double shift errors is described in detail.
|
[
{
"version": "v1",
"created": "Mon, 23 Jan 2017 16:24:14 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Apr 2017 01:25:19 GMT"
}
] | 2017-04-14T00:00:00 |
[
[
"Vahid",
"Alireza",
""
],
[
"Mappouras",
"Georgios",
""
],
[
"Sorin",
"Daniel J.",
""
],
[
"Calderbank",
"Robert",
""
]
] |
new_dataset
| 0.981953 |
1704.03978
|
Sheng Wang
|
Sheng Wang, Zhifeng Bao, J. Shane Culpepper, Timos Sellis, Gao Cong
|
Reverse k Nearest Neighbor Search over Trajectories
|
12 pages
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
GPS enables mobile devices to continuously provide new opportunities to
improve our daily lives. For example, the data collected in applications
created by Uber or Public Transport Authorities can be used to plan
transportation routes, estimate capacities, and proactively identify low
coverage areas. In this paper, we study a new kind of query-Reverse k Nearest
Neighbor Search over Trajectories (RkNNT), which can be used for route planning
and capacity estimation. Given a set of existing routes DR, a set of passenger
transitions DT, and a query route Q, a RkNNT query returns all transitions that
take Q as one of its k nearest travel routes. To solve the problem, we first
develop an index to handle dynamic trajectory updates, so that the most
up-to-date transition data are available for answering a RkNNT query. Then we
introduce a filter refinement framework for processing RkNNT queries using the
proposed indexes. Next, we show how to use RkNNT to solve the optimal route
planning problem MaxRkNNT (MinRkNNT), which is to search for the optimal route
from a start location to an end location that could attract the maximum (or
minimum) number of passengers based on a pre-defined travel distance threshold.
Experiments on real datasets demonstrate the efficiency and scalability of our
approaches. To the best of our best knowledge, this is the first work to study
the RkNNT problem for route planning.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2017 03:14:00 GMT"
}
] | 2017-04-14T00:00:00 |
[
[
"Wang",
"Sheng",
""
],
[
"Bao",
"Zhifeng",
""
],
[
"Culpepper",
"J. Shane",
""
],
[
"Sellis",
"Timos",
""
],
[
"Cong",
"Gao",
""
]
] |
new_dataset
| 0.994273 |
1609.07859
|
Taewan Kim
|
Taewan Kim, Seyeong Kim, Sangil Na, Hayoon Kim, Moonki Kim, Byoung-Ki
Jeon
|
Visual Fashion-Product Search at SK Planet
|
13 pages, 11 figures, 3 tables
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We build a large-scale visual search system which finds similar product
images given a fashion item. Defining similarity among arbitrary
fashion-products is still remains a challenging problem, even there is no exact
ground-truth. To resolve this problem, we define more than 90 fashion-related
attributes, and combination of these attributes can represent thousands of
unique fashion-styles. The fashion-attributes are one of the ingredients to
define semantic similarity among fashion-product images. To build our system at
scale, these fashion-attributes are again used to build an inverted indexing
scheme. In addition to these fashion-attributes for semantic similarity, we
extract colour and appearance features in a region-of-interest (ROI) of a
fashion item for visual similarity. By sharing our approach, we expect active
discussion on that how to apply current computer vision research into the
e-commerce industry.
|
[
{
"version": "v1",
"created": "Mon, 26 Sep 2016 06:53:36 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Sep 2016 04:47:48 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Oct 2016 08:28:22 GMT"
},
{
"version": "v4",
"created": "Wed, 19 Oct 2016 12:50:49 GMT"
},
{
"version": "v5",
"created": "Sun, 6 Nov 2016 07:57:32 GMT"
},
{
"version": "v6",
"created": "Wed, 12 Apr 2017 03:51:23 GMT"
}
] | 2017-04-13T00:00:00 |
[
[
"Kim",
"Taewan",
""
],
[
"Kim",
"Seyeong",
""
],
[
"Na",
"Sangil",
""
],
[
"Kim",
"Hayoon",
""
],
[
"Kim",
"Moonki",
""
],
[
"Jeon",
"Byoung-Ki",
""
]
] |
new_dataset
| 0.99433 |
1611.05594
|
Long Chen
|
Long Chen, Hanwang Zhang, Jun Xiao, Liqiang Nie, Jian Shao, Wei Liu,
Tat-Seng Chua
|
SCA-CNN: Spatial and Channel-wise Attention in Convolutional Networks
for Image Captioning
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visual attention has been successfully applied in structural prediction tasks
such as visual captioning and question answering. Existing visual attention
models are generally spatial, i.e., the attention is modeled as spatial
probabilities that re-weight the last conv-layer feature map of a CNN encoding
an input image. However, we argue that such spatial attention does not
necessarily conform to the attention mechanism --- a dynamic feature extractor
that combines contextual fixations over time, as CNN features are naturally
spatial, channel-wise and multi-layer. In this paper, we introduce a novel
convolutional neural network dubbed SCA-CNN that incorporates Spatial and
Channel-wise Attentions in a CNN. In the task of image captioning, SCA-CNN
dynamically modulates the sentence generation context in multi-layer feature
maps, encoding where (i.e., attentive spatial locations at multiple layers) and
what (i.e., attentive channels) the visual attention is. We evaluate the
proposed SCA-CNN architecture on three benchmark image captioning datasets:
Flickr8K, Flickr30K, and MSCOCO. It is consistently observed that SCA-CNN
significantly outperforms state-of-the-art visual attention-based image
captioning methods.
|
[
{
"version": "v1",
"created": "Thu, 17 Nov 2016 07:39:46 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Apr 2017 05:48:44 GMT"
}
] | 2017-04-13T00:00:00 |
[
[
"Chen",
"Long",
""
],
[
"Zhang",
"Hanwang",
""
],
[
"Xiao",
"Jun",
""
],
[
"Nie",
"Liqiang",
""
],
[
"Shao",
"Jian",
""
],
[
"Liu",
"Wei",
""
],
[
"Chua",
"Tat-Seng",
""
]
] |
new_dataset
| 0.953949 |
1611.07700
|
Silvia Zuffi
|
Silvia Zuffi, Angjoo Kanazawa, David Jacobs, Michael J. Black
|
3D Menagerie: Modeling the 3D shape and pose of animals
|
Accepted at CVPR 2017 (camera ready version)
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There has been significant work on learning realistic, articulated, 3D models
of the human body. In contrast, there are few such models of animals, despite
many applications. The main challenge is that animals are much less cooperative
than humans. The best human body models are learned from thousands of 3D scans
of people in specific poses, which is infeasible with live animals.
Consequently, we learn our model from a small set of 3D scans of toy figurines
in arbitrary poses. We employ a novel part-based shape model to compute an
initial registration to the scans. We then normalize their pose, learn a
statistical shape model, and refine the registrations and the model together.
In this way, we accurately align animal scans from different quadruped families
with very different shapes and poses. With the registration to a common
template we learn a shape space representing animals including lions, cats,
dogs, horses, cows and hippos. Animal shapes can be sampled from the model,
posed, animated, and fit to data. We demonstrate generalization by fitting it
to images of real animals including species not seen in training.
|
[
{
"version": "v1",
"created": "Wed, 23 Nov 2016 09:30:50 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Apr 2017 10:39:46 GMT"
}
] | 2017-04-13T00:00:00 |
[
[
"Zuffi",
"Silvia",
""
],
[
"Kanazawa",
"Angjoo",
""
],
[
"Jacobs",
"David",
""
],
[
"Black",
"Michael J.",
""
]
] |
new_dataset
| 0.994573 |
1612.08843
|
Hexiang Hu
|
Hexiang Hu, Shiyi Lan, Yuning Jiang, Zhimin Cao, Fei Sha
|
FastMask: Segment Multi-scale Object Candidates in One Shot
|
Accepted as CVPR 2017
| null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Objects appear to scale differently in natural images. This fact requires
methods dealing with object-centric tasks (e.g. object proposal) to have robust
performance over variances in object scales. In the paper, we present a novel
segment proposal framework, namely FastMask, which takes advantage of
hierarchical features in deep convolutional neural networks to segment
multi-scale objects in one shot. Innovatively, we adapt segment proposal
network into three different functional components (body, neck and head). We
further propose a weight-shared residual neck module as well as a
scale-tolerant attentional head module for efficient one-shot inference. On MS
COCO benchmark, the proposed FastMask outperforms all state-of-the-art segment
proposal methods in average recall being 2~5 times faster. Moreover, with a
slight trade-off in accuracy, FastMask can segment objects in near real time
(~13 fps) with 800*600 resolution images, demonstrating its potential in
practical applications. Our implementation is available on
https://github.com/voidrank/FastMask.
|
[
{
"version": "v1",
"created": "Wed, 28 Dec 2016 10:24:42 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Dec 2016 08:03:28 GMT"
},
{
"version": "v3",
"created": "Mon, 16 Jan 2017 06:46:35 GMT"
},
{
"version": "v4",
"created": "Tue, 11 Apr 2017 21:20:57 GMT"
}
] | 2017-04-13T00:00:00 |
[
[
"Hu",
"Hexiang",
""
],
[
"Lan",
"Shiyi",
""
],
[
"Jiang",
"Yuning",
""
],
[
"Cao",
"Zhimin",
""
],
[
"Sha",
"Fei",
""
]
] |
new_dataset
| 0.996946 |
1704.03519
|
Patrick Sol\'e
|
A. Melakhessou, K. Guenda, T. A. Gulliver, M. Shi and P. Sol\'e
|
On Codes over $\mathbb{F}_{q}+v\mathbb{F}_{q}+v^{2}\mathbb{F}_{q}$
|
19 pages
| null | null | null |
cs.IT math.IT math.RA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we investigate linear codes with complementary dual (LCD) codes
and formally self-dual codes over the ring $R=\F_{q}+v\F_{q}+v^{2}\F_{q}$,
where $v^{3}=v$, for $q$ odd. We give conditions on the existence of LCD codes
and present construction of formally self-dual codes over $R$. Further, we give
bounds on the minimum distance of LCD codes over $\F_q$ and extend these to
codes over $R$.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 20:05:05 GMT"
}
] | 2017-04-13T00:00:00 |
[
[
"Melakhessou",
"A.",
""
],
[
"Guenda",
"K.",
""
],
[
"Gulliver",
"T. A.",
""
],
[
"Shi",
"M.",
""
],
[
"Solé",
"P.",
""
]
] |
new_dataset
| 0.999174 |
1704.03604
|
Guanbin Li
|
Guanbin Li, Yuan Xie, Liang Lin, Yizhou Yu
|
Instance-Level Salient Object Segmentation
|
To appear in CVPR2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Image saliency detection has recently witnessed rapid progress due to deep
convolutional neural networks. However, none of the existing methods is able to
identify object instances in the detected salient regions. In this paper, we
present a salient instance segmentation method that produces a saliency mask
with distinct object instance labels for an input image. Our method consists of
three steps, estimating saliency map, detecting salient object contours and
identifying salient object instances. For the first two steps, we propose a
multiscale saliency refinement network, which generates high-quality salient
region masks and salient object contours. Once integrated with multiscale
combinatorial grouping and a MAP-based subset optimization framework, our
method can generate very promising salient object instance segmentation
results. To promote further research and evaluation of salient instance
segmentation, we also construct a new database of 1000 images and their
pixelwise salient instance annotations. Experimental results demonstrate that
our proposed method is capable of achieving state-of-the-art performance on all
public benchmarks for salient region detection as well as on our new dataset
for salient instance segmentation.
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2017 03:05:27 GMT"
}
] | 2017-04-13T00:00:00 |
[
[
"Li",
"Guanbin",
""
],
[
"Xie",
"Yuan",
""
],
[
"Lin",
"Liang",
""
],
[
"Yu",
"Yizhou",
""
]
] |
new_dataset
| 0.993146 |
1704.03761
|
Juan Jacobo Sim\'on-Pinero
|
J. J. Bernal, M. Guerreiro, J. J. Sim\'on
|
From ds-bounds for cyclic codes to true distance for abelian codes
|
arXiv admin note: text overlap with arXiv:1604.02949
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we develop a technique to extend any bound for the minimum
distance of cyclic codes constructed from its defining sets (ds-bounds) to
abelian (or multivariate) codes through the notion of $\mathbb{B}$-apparent
distance. We use this technique to improve the searching for new bounds for the
minimum distance of abelian codes. We also study conditions for an abelian code
to verify that its $\mathbb{B}$-apparent distance reaches its (true) minimum
distance. Then we construct some tables of such codes as an application
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2017 14:00:45 GMT"
}
] | 2017-04-13T00:00:00 |
[
[
"Bernal",
"J. J.",
""
],
[
"Guerreiro",
"M.",
""
],
[
"Simón",
"J. J.",
""
]
] |
new_dataset
| 0.997637 |
1704.03847
|
Nikolay Savinov
|
Timo Hackel, Nikolay Savinov, Lubor Ladicky, Jan D. Wegner, Konrad
Schindler, Marc Pollefeys
|
Semantic3D.net: A new Large-scale Point Cloud Classification Benchmark
|
Accepted to ISPRS Annals. The benchmark website is available at
http://www.semantic3d.net/ . The baseline code is available at
https://github.com/nsavinov/semantic3dnet
| null | null | null |
cs.CV cs.LG cs.NE cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a new 3D point cloud classification benchmark data set
with over four billion manually labelled points, meant as input for data-hungry
(deep) learning methods. We also discuss first submissions to the benchmark
that use deep convolutional neural networks (CNNs) as a work horse, which
already show remarkable performance improvements over state-of-the-art. CNNs
have become the de-facto standard for many tasks in computer vision and machine
learning like semantic segmentation or object detection in images, but have no
yet led to a true breakthrough for 3D point cloud labelling tasks due to lack
of training data. With the massive data set presented in this paper, we aim at
closing this data gap to help unleash the full potential of deep learning
methods for 3D labelling tasks. Our semantic3D.net data set consists of dense
point clouds acquired with static terrestrial laser scanners. It contains 8
semantic classes and covers a wide range of urban outdoor scenes: churches,
streets, railroad tracks, squares, villages, soccer fields and castles. We
describe our labelling interface and show that our data set provides more dense
and complete point clouds with much higher overall number of labelled points
compared to those already available to the research community. We further
provide baseline method descriptions and comparison between methods submitted
to our online system. We hope semantic3D.net will pave the way for deep
learning methods in 3D point cloud labelling to learn richer, more general 3D
representations, and first submissions after only a few months indicate that
this might indeed be the case.
|
[
{
"version": "v1",
"created": "Wed, 12 Apr 2017 17:12:57 GMT"
}
] | 2017-04-13T00:00:00 |
[
[
"Hackel",
"Timo",
""
],
[
"Savinov",
"Nikolay",
""
],
[
"Ladicky",
"Lubor",
""
],
[
"Wegner",
"Jan D.",
""
],
[
"Schindler",
"Konrad",
""
],
[
"Pollefeys",
"Marc",
""
]
] |
new_dataset
| 0.991985 |
1610.01687
|
Zifan Li
|
Zifan Li, Ambuj Tewari
|
Sampled Fictitious Play is Hannan Consistent
| null | null | null | null |
cs.GT cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fictitious play is a simple and widely studied adaptive heuristic for playing
repeated games. It is well known that fictitious play fails to be Hannan
consistent. Several variants of fictitious play including regret matching,
generalized regret matching and smooth fictitious play, are known to be Hannan
consistent. In this note, we consider sampled fictitious play: at each round,
the player samples past times and plays the best response to previous moves of
other players at the sampled time points. We show that sampled fictitious play,
using Bernoulli sampling, is Hannan consistent. Unlike several existing Hannan
consistency proofs that rely on concentration of measure results, ours instead
uses anti-concentration results from Littlewood-Offord theory.
|
[
{
"version": "v1",
"created": "Wed, 5 Oct 2016 23:41:23 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Apr 2017 15:52:46 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Li",
"Zifan",
""
],
[
"Tewari",
"Ambuj",
""
]
] |
new_dataset
| 0.992926 |
1701.01295
|
Sven Puchinger
|
Peter Beelen and Sven Puchinger and Johan Rosenkilde n\'e Nielsen
|
Twisted Reed-Solomon Codes
|
5 pages, accepted at IEEE International Symposium on Information
Theory 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new general construction of MDS codes over a finite field
$\mathbb{F}_q$. We describe two explicit subclasses which contain new MDS codes
of length at least $q/2$ for all values of $q \ge 11$. Moreover, we show that
most of the new codes are not equivalent to a Reed-Solomon code.
|
[
{
"version": "v1",
"created": "Thu, 5 Jan 2017 12:40:02 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Apr 2017 06:57:52 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Beelen",
"Peter",
""
],
[
"Puchinger",
"Sven",
""
],
[
"Nielsen",
"Johan Rosenkilde né",
""
]
] |
new_dataset
| 0.991817 |
1704.03092
|
Jianyu Huang
|
Jianyu Huang, Devin A. Matthews, Robert A. van de Geijn
|
Strassen's Algorithm for Tensor Contraction
| null | null | null |
FLAME Working Note #84, The University of Texas at Austin,
Department of Computer Science, Technical Report TR-17-02
|
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tensor contraction (TC) is an important computational kernel widely used in
numerous applications. It is a multi-dimensional generalization of matrix
multiplication (GEMM). While Strassen's algorithm for GEMM is well studied in
theory and practice, extending it to accelerate TC has not been previously
pursued. Thus, we believe this to be the first paper to demonstrate how one can
in practice speed up tensor contraction with Strassen's algorithm. By adopting
a Block-Scatter-Matrix format, a novel matrix-centric tensor layout, we can
conceptually view TC as GEMM for a general stride storage, with an implicit
tensor-to-matrix transformation. This insight enables us to tailor a recent
state-of-the-art implementation of Strassen's algorithm to TC, avoiding
explicit transpositions (permutations) and extra workspace, and reducing the
overhead of memory movement that is incurred. Performance benefits are
demonstrated with a performance model as well as in practice on modern single
core, multicore, and distributed memory parallel architectures, achieving up to
1.3x speedup. The resulting implementations can serve as a drop-in replacement
for various applications with significant speedup.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 00:37:59 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Huang",
"Jianyu",
""
],
[
"Matthews",
"Devin A.",
""
],
[
"van de Geijn",
"Robert A.",
""
]
] |
new_dataset
| 0.999391 |
1704.03094
|
EPTCS
|
Elias Castegren (Uppsala University, Sweden), Tobias Wrigstad (Uppsala
University, Sweden)
|
Actors without Borders: Amnesty for Imprisoned State
|
In Proceedings PLACES 2017, arXiv:1704.02418
|
EPTCS 246, 2017, pp. 10-20
|
10.4204/EPTCS.246.4
| null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In concurrent systems, some form of synchronisation is typically needed to
achieve data-race freedom, which is important for correctness and safety. In
actor-based systems, messages are exchanged concurrently but executed
sequentially by the receiving actor. By relying on isolation and non-sharing,
an actor can access its own state without fear of data-races, and the internal
behavior of an actor can be reasoned about sequentially.
However, actor isolation is sometimes too strong to express useful patterns.
For example, letting the iterator of a data-collection alias the internal
structure of the collection allows a more efficient implementation than if each
access requires going through the interface of the collection. With full
isolation, in order to maintain sequential reasoning the iterator must be made
part of the collection, which bloats the interface of the collection and means
that a client must have access to the whole data-collection in order to use the
iterator.
In this paper, we propose a programming language construct that enables a
relaxation of isolation but without sacrificing sequential reasoning. We
formalise the mechanism in a simple lambda calculus with actors and passive
objects, and show how an actor may leak parts of its internal state while
ensuring that any interaction with this data is still synchronised.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 00:43:06 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Castegren",
"Elias",
"",
"Uppsala University, Sweden"
],
[
"Wrigstad",
"Tobias",
"",
"Uppsala\n University, Sweden"
]
] |
new_dataset
| 0.995562 |
1704.03118
|
Neil Zhenqiang Gong
|
Neil Zhenqiang Gong, Altay Ozen, Yu Wu, Xiaoyu Cao, Richard Shin, Dawn
Song, Hongxia Jin and Xuan Bao
|
PIANO: Proximity-based User Authentication on Voice-Powered
Internet-of-Things Devices
|
To appear in ICDCS'17
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Voice is envisioned to be a popular way for humans to interact with
Internet-of-Things (IoT) devices. We propose a proximity-based user
authentication method (called PIANO) for access control on such voice-powered
IoT devices. PIANO leverages the built-in speaker, microphone, and Bluetooth
that voice-powered IoT devices often already have. Specifically, we assume that
a user carries a personal voice-powered device (e.g., smartphone, smartwatch,
or smartglass), which serves as the user's identity. When another voice-powered
IoT device of the user requires authentication, PIANO estimates the distance
between the two devices by playing and detecting certain acoustic signals;
PIANO grants access if the estimated distance is no larger than a user-selected
threshold. We implemented a proof-of-concept prototype of PIANO. Through
theoretical and empirical evaluations, we find that PIANO is secure, reliable,
personalizable, and efficient.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 02:27:31 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Gong",
"Neil Zhenqiang",
""
],
[
"Ozen",
"Altay",
""
],
[
"Wu",
"Yu",
""
],
[
"Cao",
"Xiaoyu",
""
],
[
"Shin",
"Richard",
""
],
[
"Song",
"Dawn",
""
],
[
"Jin",
"Hongxia",
""
],
[
"Bao",
"Xuan",
""
]
] |
new_dataset
| 0.997232 |
1704.03168
|
Yeong-Jae Woo
|
Yeong-Jae Woo, Sang Lyul Min
|
FMMU: A Hardware-Automated Flash Map Management Unit for Scalable
Performance of NAND Flash-Based SSDs
| null | null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
NAND flash-based Solid State Drives (SSDs), which are widely used from
embedded systems to enterprise servers, are enhancing performance by exploiting
the parallelism of NAND flash memories. To cope with the performance
improvement of SSDs, storage systems have rapidly adopted the host interface
for SSDs from Serial-ATA, which is used for existing hard disk drives, to
high-speed PCI express. Since NAND flash memory does not allow in-place
updates, it requires special software called Flash Translation Layer (FTL), and
SSDs are equipped with embedded processors to run FTL. Existing SSDs increase
the clock frequency of embedded processors or increase the number of embedded
processors in order to prevent FTL from acting as bottleneck of SSD
performance, but these approaches are not scalable. This paper proposes a
hardware-automated Flash Map Management Unit, called FMMU, that handles the
address translation process dominating the execution time of the FTL by
hardware automation. FMMU provides methods for exploiting the parallelism of
flash memory by processing outstanding requests in a non-blocking manner while
reducing the number of flash operations. The experimental results show that the
FMMU reduces the FTL execution time in the map cache hit case and the miss case
by 44% and 37%, respectively, compared with the existing software-based
approach operating in 4-core. FMMU also prevents FTL from acting as a
performance bottleneck for up to 32-channel, 8-way SSD using PCIe 3.0 x32 host
interface.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 06:46:51 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Woo",
"Yeong-Jae",
""
],
[
"Min",
"Sang Lyul",
""
]
] |
new_dataset
| 0.998942 |
1704.03287
|
Namyoon Lee
|
Song-Nam Hong, Seonho Kim, and Namyoon Lee
|
Uplink Multiuser Massive MIMO Systems with Low-Resolution ADCs: A
Coding-Theoretic Approach
|
Submitted to IEEE TWC
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers an uplink multiuser massive
multiple-input-multiple-output (MIMO) system with low-resolution
analog-to-digital converters (ADCs), in which K users with a single-antenna
communicate with one base station (BS) with Nr antennas. In this system, we
present a novel multiuser MIMO detection framework that is inspired by coding
theory. The key idea of the proposed framework is to create a code C of length
2Nr over a spatial domain. This code is constructed by a so-called
auto-encoding function that is not designable but is completely described by a
channel transformation followed by a quantization function of the ADCs. From
this point of view, we convert a multiuser MIMO detection problem into an
equivalent channel coding problem, in which a codeword of C corresponding to
users' messages is sent over 2Nr parallel channels, each with different channel
reliability. To the resulting problem, we propose a novel weighted minimum
distance decoding (wMDD) that appropriately exploits the unequal channel
reliabilities. It is shown that the proposed wMDD yields a non-trivial gain
over the conventional minimum distance decoding (MDD). From coding-theoretic
viewpoint, we identify that bit-error-rate (BER) exponentially decreases with
the minimum distance of the code C, which plays a similar role with a condition
number in conventional MIMO systems. Furthermore, we develop the communication
method that uses the wMDD for practical scenarios where the BS has no knowledge
of channel state information. Finally, numerical results are provided to verify
the superiority of the proposed method.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 13:49:41 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Hong",
"Song-Nam",
""
],
[
"Kim",
"Seonho",
""
],
[
"Lee",
"Namyoon",
""
]
] |
new_dataset
| 0.99155 |
1704.03298
|
Ralf Mikut
|
Ralf Mikut, Andreas Bartschat, Wolfgang Doneit, Jorge \'Angel
Gonz\'alez Ordiano, Benjamin Schott, Johannes Stegmaier, Simon Waczowicz,
Markus Reischl
|
The MATLAB Toolbox SciXMiner: User's Manual and Programmer's Guide
| null | null | null | null |
cs.LG
|
http://creativecommons.org/licenses/by-sa/4.0/
|
The Matlab toolbox SciXMiner is designed for the visualization and analysis
of time series and features with a special focus to classification problems. It
was developed at the Institute of Applied Computer Science of the Karlsruhe
Institute of Technology (KIT), a member of the Helmholtz Association of German
Research Centres in Germany. The aim was to provide an open platform for the
development and improvement of data mining methods and its applications to
various medical and technical problems. SciXMiner bases on Matlab (tested for
the version 2017a). Many functions do not require additional standard toolboxes
but some parts of Signal, Statistics and Wavelet toolboxes are used for special
cases. The decision to a Matlab-based solution was made to use the wide
mathematical functionality of this package provided by The Mathworks Inc.
SciXMiner is controlled by a graphical user interface (GUI) with menu items and
control elements like popup lists, checkboxes and edit elements. This makes it
easier to work with SciXMiner for inexperienced users. Furthermore, an
automatization and batch standardization of analyzes is possible using macros.
The standard Matlab style using the command line is also available. SciXMiner
is an open source software. The download page is
http://sourceforge.net/projects/SciXMiner. It is licensed under the conditions
of the GNU General Public License (GNU-GPL) of The Free Software Foundation.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 14:17:47 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Mikut",
"Ralf",
""
],
[
"Bartschat",
"Andreas",
""
],
[
"Doneit",
"Wolfgang",
""
],
[
"Ordiano",
"Jorge Ángel González",
""
],
[
"Schott",
"Benjamin",
""
],
[
"Stegmaier",
"Johannes",
""
],
[
"Waczowicz",
"Simon",
""
],
[
"Reischl",
"Markus",
""
]
] |
new_dataset
| 0.982972 |
1704.03342
|
Mieczys{\l}aw K{\l}opotek
|
Mieczys{\l}aw A. K{\l}opotek
|
Beliefs and Probability in Bacchus' l.p. Logic: A~3-Valued Logic
Solution to Apparent Counter-intuition
|
Draft for the conference M.A. K{\l}opotek: Beliefs and Probability in
Bacchus' l.p. Logic: A 3-Valued Logic Solution to Apparent Counter-intuition.
[in:] R. Trappl Ed,: Cybernetics and Systems Research. Proc. 11 European
Meeting on Cybernetics and System Research EMCSR'92, Wien, Osterreich, 20.
April 1992. World Scientific Singapore, New Jersey, London, HongKong Vol. 1,
pp. 519-526
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fundamental discrepancy between first order logic and statistical inference
(global versus local properties of universe) is shown to be the obstacle for
integration of logic and probability in L.p. logic of Bacchus. To overcome the
counterintuitiveness of L.p. behaviour, a 3-valued logic is proposed.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 15:04:45 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Kłopotek",
"Mieczysław A.",
""
]
] |
new_dataset
| 0.958936 |
1704.03383
|
Felipe A. Cruz
|
Lucas Benedicic, Felipe A. Cruz, Alberto Madonna and Kean Mariotti
|
Portable, high-performance containers for HPC
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Building and deploying software on high-end computing systems is a
challenging task. High performance applications have to reliably run across
multiple platforms and environments, and make use of site-specific resources
while resolving complicated software-stack dependencies. Containers are a type
of lightweight virtualization technology that attempt to solve this problem by
packaging applications and their environments into standard units of software
that are: portable, easy to build and deploy, have a small footprint, and low
runtime overhead. In this work we present an extension to the container runtime
of Shifter that provides containerized applications with a mechanism to access
GPU accelerators and specialized networking from the host system, effectively
enabling performance portability of containers across HPC resources. The
presented extension makes possible to rapidly deploy high-performance software
on supercomputers from containerized applications that have been developed,
built, and tested in non-HPC commodity hardware, e.g. the laptop or workstation
of a researcher.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 15:57:33 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Benedicic",
"Lucas",
""
],
[
"Cruz",
"Felipe A.",
""
],
[
"Madonna",
"Alberto",
""
],
[
"Mariotti",
"Kean",
""
]
] |
new_dataset
| 0.99946 |
1704.03446
|
Xuhong Chen
|
Xuhong Chen, Jiaxun Lu, Tao Li, Pingyi Fan and Khaled Ben Letaief
|
Directivity-Beamwidth Tradeoff of Massive MIMO Uplink Beamforming for
High Speed Train Communication
|
This paper has been accepted for future publication in IEEE ACCESS.
arXiv admin note: substantial text overlap with arXiv:1702.02121
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
High-mobility adaption and massive Multiple-input Multiple-output (MIMO)
application are two primary evolving objectives for the next generation high
speed train (HST) wireless communication system. In this paper, we consider how
to design a location-aware beamforming for the massive MIMO system in the high
traffic density HST network. We first analyze the tradeoff between beam
directivity and beamwidth, based on which we present the sensitivity analysis
of positioning accuracy. Then, in order to guarantee a high efficient
transmission, we derive an optimal problem to maximize the beam directivity
under the restriction of diverse positioning accuracies. After that, we present
a low-complexity beamforming design by utilizing location information, which
requires neither eigen-decomposing (ED) the uplink channel covariance matrix
(CCM) nor ED the downlink CCM (DCCM). Finally, we study the beamforming scheme
in future high traffic density HST network, where a two HSTs encountering
scenario is emphasized. By utilizing the real-time location information, we
propose an optimal adaptive beamforming scheme to maximize the achievable rate
region under limited channel source constraint. Numerical simulation indicates
that a massive MIMO system with less than a certain positioning error can
guarantee a required performance with satisfying transmission efficiency in the
high traffic density HST scenario and the achievable rate region when two HSTs
encounter is greatly improved as well.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2017 17:47:54 GMT"
}
] | 2017-04-12T00:00:00 |
[
[
"Chen",
"Xuhong",
""
],
[
"Lu",
"Jiaxun",
""
],
[
"Li",
"Tao",
""
],
[
"Fan",
"Pingyi",
""
],
[
"Letaief",
"Khaled Ben",
""
]
] |
new_dataset
| 0.990192 |
1410.8202
|
Jesko H\"uttenhain
|
Jesko H\"uttenhain and Christian Ikenmeyer
|
Binary Determinantal Complexity
|
10 pages, C source code for the computation available as ancillary
files
|
Linear Algebra and its Applications, 504:559-573, 2016
|
10.1016/j.laa.2016.04.027
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that for writing the 3 by 3 permanent polynomial as a determinant of
a matrix consisting only of zeros, ones, and variables as entries, a 7 by 7
matrix is required. Our proof is computer based and uses the enumeration of
bipartite graphs. Furthermore, we analyze sequences of polynomials that are
determinants of polynomially sized matrices consisting only of zeros, ones, and
variables. We show that these are exactly the sequences in the complexity class
of constant free polynomially sized (weakly) skew circuits.
|
[
{
"version": "v1",
"created": "Wed, 29 Oct 2014 23:57:38 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jan 2015 22:20:31 GMT"
}
] | 2017-04-11T00:00:00 |
[
[
"Hüttenhain",
"Jesko",
""
],
[
"Ikenmeyer",
"Christian",
""
]
] |
new_dataset
| 0.982381 |
1512.03384
|
Xintong Han
|
Xintong Han, Bharat Singh, Vlad I. Morariu and Larry S. Davis
|
VRFP: On-the-fly Video Retrieval using Web Images and Fast Fisher Vector
Products
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
VRFP is a real-time video retrieval framework based on short text input
queries, which obtains weakly labeled training images from the web after the
query is known. The retrieved web images representing the query and each
database video are treated as unordered collections of images, and each
collection is represented using a single Fisher Vector built on CNN features.
Our experiments show that a Fisher Vector is robust to noise present in web
images and compares favorably in terms of accuracy to other standard
representations. While a Fisher Vector can be constructed efficiently for a new
query, matching against the test set is slow due to its high dimensionality. To
perform matching in real-time, we present a lossless algorithm that accelerates
the inner product computation between high dimensional Fisher Vectors. We prove
that the expected number of multiplications required decreases quadratically
with the sparsity of Fisher Vectors. We are not only able to construct and
apply query models in real-time, but with the help of a simple re-ranking
scheme, we also outperform state-of-the-art automatic retrieval methods by a
significant margin on TRECVID MED13 (3.5%), MED14 (1.3%) and CCV datasets
(5.2%). We also provide a direct comparison on standard datasets between two
different paradigms for automatic video retrieval - zero-shot learning and
on-the-fly retrieval.
|
[
{
"version": "v1",
"created": "Thu, 10 Dec 2015 19:50:50 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Apr 2016 01:25:42 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Apr 2017 17:28:16 GMT"
}
] | 2017-04-11T00:00:00 |
[
[
"Han",
"Xintong",
""
],
[
"Singh",
"Bharat",
""
],
[
"Morariu",
"Vlad I.",
""
],
[
"Davis",
"Larry S.",
""
]
] |
new_dataset
| 0.996038 |
1704.02245
|
Gang Yang
|
Gang Yang and Ying-Chang Liang and Rui Zhang and Yiyang Pei
|
Modulation in the Air: Backscatter Communication over Ambient OFDM
Carrier
|
32 pages, 10 figures, journal paper
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ambient backscatter communication (AmBC) enables radio-frequency (RF) powered
backscatter devices (BDs) (e.g., sensors, tags) to modulate their information
bits over ambient RF carriers in an over-the-air manner. This technology also
called "modulation in the air", thus has emerged as a promising solution to
achieve green communications for future Internet-of-Things. This paper studies
an AmBC system by leveraging the ambient orthogonal frequency division
multiplexing (OFDM) modulated signals in the air. We first model such AmBC
system from a spread-spectrum communication perspective, upon which a novel
joint design for BD waveform and receiver detector is proposed. The BD symbol
period is designed to be in general an integer multiplication of the OFDM
symbol period, and the waveform for BD bit `0' maintains the same state within
a BD symbol period, while the waveform for BD bit `1' has a state transition in
the middle of each OFDM symbol period within a BD symbol period. In the
receiver detector design, we construct the test statistic that cancels out the
direct-link interference by exploiting the repeating structure of the ambient
OFDM signals due to the use of cyclic prefix. For the system with a
single-antenna receiver, the maximum-likelihood detector is proposed to recover
the BD bits, for which the optimal threshold is obtained in closed-form
expression. For the system with a multi-antenna receiver, we propose a new test
statistic, and derive the optimal detector. Moreover, practical timing
synchronization algorithms are proposed, and we also analyze the effect of
various system parameters on the system performance. Finally, extensive
numerical results are provided to verify that the proposed transceiver design
can improve the system bit-error-rate (BER) performance and the operating range
significantly, and achieve much higher data rate, as compared to the
conventional design.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2017 14:22:43 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Apr 2017 02:36:00 GMT"
}
] | 2017-04-11T00:00:00 |
[
[
"Yang",
"Gang",
""
],
[
"Liang",
"Ying-Chang",
""
],
[
"Zhang",
"Rui",
""
],
[
"Pei",
"Yiyang",
""
]
] |
new_dataset
| 0.996618 |
1704.02375
|
Yanhong Annie Liu
|
David S. Warren and Yanhong A. Liu
|
AppLP: A Dialogue on Applications of Logic Programming
|
David S. Warren and Yanhong A. Liu (Editors). 33 pages. Including
summaries by Christopher Kane and abstracts or position papers by M. Aref, J.
Rosenwald, I. Cervesato, E.S.L. Lam, M. Balduccini, J. Lobo, A. Russo, E.
Lupu, N. Leone, F. Ricca, G. Gupta, K. Marple, E. Salazar, Z. Chen, A. Sobhi,
S. Srirangapalli, C.R. Ramakrishnan, N. Bj{\o}rner, N.P. Lopes, A.
Rybalchenko, and P. Tarau
| null | null | null |
cs.PL cs.AI cs.LO cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This document describes the contributions of the 2016 Applications of Logic
Programming Workshop (AppLP), which was held on October 17 and associated with
the International Conference on Logic Programming (ICLP) in Flushing, New York
City.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2017 21:10:00 GMT"
}
] | 2017-04-11T00:00:00 |
[
[
"Warren",
"David S.",
""
],
[
"Liu",
"Yanhong A.",
""
]
] |
new_dataset
| 0.977037 |
1704.02553
|
Sean Rowan
|
Sean Rowan, Michael Clear, Mario Gerla, Meriel Huggard, Ciar\'an Mc
Goldrick
|
Securing Vehicle to Vehicle Communications using Blockchain through
Visible Light and Acoustic Side-Channels
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Autonomous and self-driving vehicles are appearing on the public highways.
These vehicles commonly use wireless communication techniques for both
vehicle-to-vehicle and vehicle-to-infrastructure communications. Manufacturers,
regulators and the public are understandably concerned about large-scale
systems failure or malicious attack via these wireless vehicular networks. This
paper explores the use of sensing and signalling devices that are commonly
integrated into modern vehicles for side-channel communication purposes.
Visible light (using a CMOS camera) and acoustic (ultrasonic audio)
side-channel encoding techniques are proposed, developed and evaluated in this
context. The side-channels are examined both theoretically and experimentally
and an upper bound on the line code modulation rate that is achievable with
these side channel schemes in the vehicular networking context is established.
A novel inter-vehicle session key establishment protocol, leveraging both
side-channels and a blockchain public key infrastructure, is then presented. In
light of the limited channel capacity and the interoperability/security
requirements for vehicular communications, techniques for constraining the
throughput requirement, providing device independence and validating the
location of the intended recipient vehicle, are presented. These reduce the
necessary device handshake throughput to 176 bits for creating symmetric
encryption and message authentication keys and in verifying a vehicle's
certificate with a recognised certification authority.
|
[
{
"version": "v1",
"created": "Sun, 9 Apr 2017 01:48:57 GMT"
}
] | 2017-04-11T00:00:00 |
[
[
"Rowan",
"Sean",
""
],
[
"Clear",
"Michael",
""
],
[
"Gerla",
"Mario",
""
],
[
"Huggard",
"Meriel",
""
],
[
"Goldrick",
"Ciarán Mc",
""
]
] |
new_dataset
| 0.989183 |
1704.02724
|
Byungmoon Kim Dr
|
Yeojin Kim, Byungmoon Kim, Jiyang Kim, Young J. Kim
|
CanvoX: High-resolution VR Painting in Large Volumetric Canvas
| null | null | null | null |
cs.GR
|
http://creativecommons.org/publicdomain/zero/1.0/
|
With virtual reality, digital painting on 2D canvases is now being extended
to 3D spaces. Tilt Brush and Oculus Quill are widely accepted among artists as
tools that pave the way to a new form of art - 3D emmersive painting. Current
3D painting systems are only a start, emitting textured triangular geometries.
In this paper, we advance this new art of 3D painting to 3D volumetric painting
that enables an artist to draw a huge scene with full control of spatial color
fields. Inspired by the fact that 2D paintings often use vast space to paint
background and small but detailed space for foreground, we claim that
supporting a large canvas in varying detail is essential for 3D painting. In
order to help artists focus and audiences to navigate the large canvas space,
we provide small artist-defined areas, called rooms, that serve as beacons for
artist-suggested scales, spaces, locations for intended appreciation view of
the painting. Artists and audiences can easily transport themselves between
different rooms. Technically, our canvas is represented as an array of deep
octrees of depth 24 or higher, built on CPU for volume painting and on GPU for
volume rendering using accurate ray casting. In CPU side, we design an
efficient iterative algorithm to refine or coarsen octree, as a result of
volumetric painting strokes, at highly interactive rates, and update the
corresponding GPU textures. Then we use GPU-based ray casting algorithms to
render the volumetric painting result. We explore precision issues stemming
from ray-casting the octree of high depth, and provide a new analysis and
verification. From our experimental results as well as the positive feedback
from the participating artists, we strongly believe that our new 3D volume
painting system can open up a new possibility for VR-driven digital art medium
to professional artists as well as to novice users.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2017 06:40:56 GMT"
}
] | 2017-04-11T00:00:00 |
[
[
"Kim",
"Yeojin",
""
],
[
"Kim",
"Byungmoon",
""
],
[
"Kim",
"Jiyang",
""
],
[
"Kim",
"Young J.",
""
]
] |
new_dataset
| 0.999589 |
1603.09364
|
Upal Mahbub
|
Upal Mahbub, Vishal M. Patel, Deepak Chandra, Brandon Barbello, Rama
Chellappa
|
Partial Face Detection for Continuous Authentication
| null |
2016 IEEE International Conference on Image Processing (ICIP),
Phoenix, AZ, USA, 2016, pp. 2991-2995
|
10.1109/ICIP.2016.7532908
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a part-based technique for real time detection of users' faces
on mobile devices is proposed. This method is specifically designed for
detecting partially cropped and occluded faces captured using a smartphone's
front-facing camera for continuous authentication. The key idea is to detect
facial segments in the frame and cluster the results to obtain the region which
is most likely to contain a face. Extensive experimentation on a mobile dataset
of 50 users shows that our method performs better than many state-of-the-art
face detection methods in terms of accuracy and processing speed.
|
[
{
"version": "v1",
"created": "Wed, 30 Mar 2016 20:15:08 GMT"
}
] | 2017-04-10T00:00:00 |
[
[
"Mahbub",
"Upal",
""
],
[
"Patel",
"Vishal M.",
""
],
[
"Chandra",
"Deepak",
""
],
[
"Barbello",
"Brandon",
""
],
[
"Chellappa",
"Rama",
""
]
] |
new_dataset
| 0.998465 |
1610.07930
|
Upal Mahbub
|
Upal Mahbub, Sayantan Sarkar, Vishal M. Patel, Rama Chellappa
|
Active User Authentication for Smartphones: A Challenge Data Set and
Benchmark Results
|
8 pages, 12 figures, 6 tables. Best poster award at BTAS 2016
| null |
10.1109/BTAS.2016.7791155
| null |
cs.CV cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, automated user verification techniques for smartphones are
investigated. A unique non-commercial dataset, the University of Maryland
Active Authentication Dataset 02 (UMDAA-02) for multi-modal user authentication
research is introduced. This paper focuses on three sensors - front camera,
touch sensor and location service while providing a general description for
other modalities. Benchmark results for face detection, face verification,
touch-based user identification and location-based next-place prediction are
presented, which indicate that more robust methods fine-tuned to the mobile
platform are needed to achieve satisfactory verification accuracy. The dataset
will be made available to the research community for promoting additional
research.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2016 15:56:07 GMT"
}
] | 2017-04-10T00:00:00 |
[
[
"Mahbub",
"Upal",
""
],
[
"Sarkar",
"Sayantan",
""
],
[
"Patel",
"Vishal M.",
""
],
[
"Chellappa",
"Rama",
""
]
] |
new_dataset
| 0.999558 |
1611.07727
|
Umar Iqbal
|
Umar Iqbal, Anton Milan, Juergen Gall
|
PoseTrack: Joint Multi-Person Pose Estimation and Tracking
|
Accepted to CVPR 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we introduce the challenging problem of joint multi-person pose
estimation and tracking of an unknown number of persons in unconstrained
videos. Existing methods for multi-person pose estimation in images cannot be
applied directly to this problem, since it also requires to solve the problem
of person association over time in addition to the pose estimation for each
person. We therefore propose a novel method that jointly models multi-person
pose estimation and tracking in a single formulation. To this end, we represent
body joint detections in a video by a spatio-temporal graph and solve an
integer linear program to partition the graph into sub-graphs that correspond
to plausible body pose trajectories for each person. The proposed approach
implicitly handles occlusion and truncation of persons. Since the problem has
not been addressed quantitatively in the literature, we introduce a challenging
"Multi-Person PoseTrack" dataset, and also propose a completely unconstrained
evaluation protocol that does not make any assumptions about the scale, size,
location or the number of persons. Finally, we evaluate the proposed approach
and several baseline methods on our new dataset.
|
[
{
"version": "v1",
"created": "Wed, 23 Nov 2016 10:30:06 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Nov 2016 12:56:22 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Apr 2017 14:16:38 GMT"
}
] | 2017-04-10T00:00:00 |
[
[
"Iqbal",
"Umar",
""
],
[
"Milan",
"Anton",
""
],
[
"Gall",
"Juergen",
""
]
] |
new_dataset
| 0.994195 |
1703.10135
|
Yuxuan Wang
|
Yuxuan Wang, RJ Skerry-Ryan, Daisy Stanton, Yonghui Wu, Ron J. Weiss,
Navdeep Jaitly, Zongheng Yang, Ying Xiao, Zhifeng Chen, Samy Bengio, Quoc Le,
Yannis Agiomyrgiannakis, Rob Clark, Rif A. Saurous
|
Tacotron: Towards End-to-End Speech Synthesis
|
Submitted to Interspeech 2017. v2 changed paper title to be
consistent with our conference submission (no content change other than typo
fixes)
| null | null | null |
cs.CL cs.LG cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A text-to-speech synthesis system typically consists of multiple stages, such
as a text analysis frontend, an acoustic model and an audio synthesis module.
Building these components often requires extensive domain expertise and may
contain brittle design choices. In this paper, we present Tacotron, an
end-to-end generative text-to-speech model that synthesizes speech directly
from characters. Given <text, audio> pairs, the model can be trained completely
from scratch with random initialization. We present several key techniques to
make the sequence-to-sequence framework perform well for this challenging task.
Tacotron achieves a 3.82 subjective 5-scale mean opinion score on US English,
outperforming a production parametric system in terms of naturalness. In
addition, since Tacotron generates speech at the frame level, it's
substantially faster than sample-level autoregressive methods.
|
[
{
"version": "v1",
"created": "Wed, 29 Mar 2017 16:55:13 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2017 21:20:34 GMT"
}
] | 2017-04-10T00:00:00 |
[
[
"Wang",
"Yuxuan",
""
],
[
"Skerry-Ryan",
"RJ",
""
],
[
"Stanton",
"Daisy",
""
],
[
"Wu",
"Yonghui",
""
],
[
"Weiss",
"Ron J.",
""
],
[
"Jaitly",
"Navdeep",
""
],
[
"Yang",
"Zongheng",
""
],
[
"Xiao",
"Ying",
""
],
[
"Chen",
"Zhifeng",
""
],
[
"Bengio",
"Samy",
""
],
[
"Le",
"Quoc",
""
],
[
"Agiomyrgiannakis",
"Yannis",
""
],
[
"Clark",
"Rob",
""
],
[
"Saurous",
"Rif A.",
""
]
] |
new_dataset
| 0.989333 |
1704.01984
|
Yi Li
|
Yi Li, M. Cenk Gursoy and Senem Velipasalar
|
A Delay-Aware Caching Algorithm for Wireless D2D Caching Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, wireless caching techniques have been studied to satisfy lower
delay requirements and offload traffic from peak periods. By storing parts of
the popular files at the mobile users, users can locate some of their requested
files in their own caches or the caches at their neighbors. In the latter case,
when a user receives files from its neighbors, device-to-device (D2D)
communication is enabled. D2D communication underlaid with cellular networks is
also a new paradigm for the upcoming 5G wireless systems. By allowing a pair of
adjacent D2D users to communicate directly, D2D communication can achieve
higher throughput, better energy efficiency and lower traffic delay. In this
work, we propose a very efficient caching algorithm for D2D-enabled cellular
networks to minimize the average transmission delay. Instead of searching over
all possible solutions, our algorithm finds out the best <file,user> pairs,
which provide the best delay improvement in each loop to form a caching policy
with very low transmission delay and high throughput. This algorithm is also
extended to address a more general scenario, in which the distributions of
fading coefficients and values of system parameters potentially change over
time. Via numerical results, the superiority of the proposed algorithm is
verified by comparing it with a naive algorithm, in which all users simply
cache their favorite files.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2017 18:30:24 GMT"
}
] | 2017-04-10T00:00:00 |
[
[
"Li",
"Yi",
""
],
[
"Gursoy",
"M. Cenk",
""
],
[
"Velipasalar",
"Senem",
""
]
] |
new_dataset
| 0.998611 |
1704.02199
|
Yuta Matsuzaki Mr
|
Yuta Matsuzaki, Kazushige Okayasu, Takaaki Imanari, Naomichi
Kobayashi, Yoshihiro Kanehara, Ryousuke Takasawa, Akio Nakamura, Hirokatsu
Kataoka
|
Could you guess an interesting movie from the posters?: An evaluation of
vision-based features on movie poster database
|
4 pages, 4 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we aim to estimate the Winner of world-wide film festival from
the exhibited movie poster. The task is an extremely challenging because the
estimation must be done with only an exhibited movie poster, without any film
ratings and box-office takings. In order to tackle this problem, we have
created a new database which is consist of all movie posters included in the
four biggest film festivals. The movie poster database (MPDB) contains historic
movies over 80 years which are nominated a movie award at each year. We apply a
couple of feature types, namely hand-craft, mid-level and deep feature to
extract various information from a movie poster. Our experiments showed
suggestive knowledge, for example, the Academy award estimation can be better
rate with a color feature and a facial emotion feature generally performs good
rate on the MPDB. The paper may suggest a possibility of modeling human taste
for a movie recommendation.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2017 12:17:38 GMT"
}
] | 2017-04-10T00:00:00 |
[
[
"Matsuzaki",
"Yuta",
""
],
[
"Okayasu",
"Kazushige",
""
],
[
"Imanari",
"Takaaki",
""
],
[
"Kobayashi",
"Naomichi",
""
],
[
"Kanehara",
"Yoshihiro",
""
],
[
"Takasawa",
"Ryousuke",
""
],
[
"Nakamura",
"Akio",
""
],
[
"Kataoka",
"Hirokatsu",
""
]
] |
new_dataset
| 0.989201 |
1704.02224
|
Xiaoming Deng
|
Xiaoming Deng, Shuo Yang, Yinda Zhang, Ping Tan, Liang Chang, Hongan
Wang
|
Hand3D: Hand Pose Estimation using 3D Neural Network
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel 3D neural network architecture for 3D hand pose estimation
from a single depth image. Different from previous works that mostly run on 2D
depth image domain and require intermediate or post process to bring in the
supervision from 3D space, we convert the depth map to a 3D volumetric
representation, and feed it into a 3D convolutional neural network(CNN) to
directly produce the pose in 3D requiring no further process. Our system does
not require the ground truth reference point for initialization, and our
network architecture naturally integrates both local feature and global context
in 3D space. To increase the coverage of the hand pose space of the training
data, we render synthetic depth image by transferring hand pose from existing
real image datasets. We evaluation our algorithm on two public benchmarks and
achieve the state-of-the-art performance. The synthetic hand pose dataset will
be available.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2017 13:27:48 GMT"
}
] | 2017-04-10T00:00:00 |
[
[
"Deng",
"Xiaoming",
""
],
[
"Yang",
"Shuo",
""
],
[
"Zhang",
"Yinda",
""
],
[
"Tan",
"Ping",
""
],
[
"Chang",
"Liang",
""
],
[
"Wang",
"Hongan",
""
]
] |
new_dataset
| 0.998833 |
1604.02531
|
Liang Zheng
|
Liang Zheng, Hengheng Zhang, Shaoyan Sun, Manmohan Chandraker, Yi
Yang, Qi Tian
|
Person Re-identification in the Wild
|
accepted as spotlight to CVPR 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel large-scale dataset and comprehensive baselines for
end-to-end pedestrian detection and person recognition in raw video frames. Our
baselines address three issues: the performance of various combinations of
detectors and recognizers, mechanisms for pedestrian detection to help improve
overall re-identification accuracy and assessing the effectiveness of different
detectors for re-identification. We make three distinct contributions. First, a
new dataset, PRW, is introduced to evaluate Person Re-identification in the
Wild, using videos acquired through six synchronized cameras. It contains 932
identities and 11,816 frames in which pedestrians are annotated with their
bounding box positions and identities. Extensive benchmarking results are
presented on this dataset. Second, we show that pedestrian detection aids
re-identification through two simple yet effective improvements: a
discriminatively trained ID-discriminative Embedding (IDE) in the person
subspace using convolutional neural network (CNN) features and a Confidence
Weighted Similarity (CWS) metric that incorporates detection scores into
similarity measurement. Third, we derive insights in evaluating detector
performance for the particular scenario of accurate person re-identification.
|
[
{
"version": "v1",
"created": "Sat, 9 Apr 2016 06:57:28 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2017 15:02:40 GMT"
}
] | 2017-04-07T00:00:00 |
[
[
"Zheng",
"Liang",
""
],
[
"Zhang",
"Hengheng",
""
],
[
"Sun",
"Shaoyan",
""
],
[
"Chandraker",
"Manmohan",
""
],
[
"Yang",
"Yi",
""
],
[
"Tian",
"Qi",
""
]
] |
new_dataset
| 0.999779 |
1609.02789
|
Donghyeon Lee
|
Donghyeon Lee
|
Arachneum: Blockchain meets Distributed Web
|
This paper has been withdrawn by the author. I feel need some
experiments
| null | null | null |
cs.CR cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Appearance of Bitcoin raise up evolution in currency. Blockchain database
also raise up possibilities to share important data between untrusted peers. In
this paper, we propose Arachneum, a decentralized, distributed, and
model-view-controller-based web service using blockchain and new privileges
model. Therefore, we can enjoy the freedom against censorship of government or
organizations, keep transparency of our web services, fork our web services,
and create/read/update/delete(CRUD) all model-view-controller(MVC) components
dynamically.
|
[
{
"version": "v1",
"created": "Mon, 22 Aug 2016 20:27:28 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2017 23:00:20 GMT"
}
] | 2017-04-07T00:00:00 |
[
[
"Lee",
"Donghyeon",
""
]
] |
new_dataset
| 0.999111 |
1702.01105
|
Iro Armeni
|
Iro Armeni, Sasha Sax, Amir R. Zamir and Silvio Savarese
|
Joint 2D-3D-Semantic Data for Indoor Scene Understanding
|
The dataset is available http://3Dsemantics.stanford.edu/
| null | null | null |
cs.CV cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a dataset of large-scale indoor spaces that provides a variety of
mutually registered modalities from 2D, 2.5D and 3D domains, with
instance-level semantic and geometric annotations. The dataset covers over
6,000m2 and contains over 70,000 RGB images, along with the corresponding
depths, surface normals, semantic annotations, global XYZ images (all in forms
of both regular and 360{\deg} equirectangular images) as well as camera
information. It also includes registered raw and semantically annotated 3D
meshes and point clouds. The dataset enables development of joint and
cross-modal learning models and potentially unsupervised approaches utilizing
the regularities present in large-scale indoor spaces. The dataset is available
here: http://3Dsemantics.stanford.edu/
|
[
{
"version": "v1",
"created": "Fri, 3 Feb 2017 18:28:33 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2017 01:46:13 GMT"
}
] | 2017-04-07T00:00:00 |
[
[
"Armeni",
"Iro",
""
],
[
"Sax",
"Sasha",
""
],
[
"Zamir",
"Amir R.",
""
],
[
"Savarese",
"Silvio",
""
]
] |
new_dataset
| 0.999701 |
1704.01570
|
Utku Kose
|
Aslihan Tufekci, Kamuran Samanci, Utku Kose
|
Developing a FPGA-supported touchscreen writing / drawing system for
educational environments
|
31 pages, 13 figures, 6 tables
|
Journal of Multidisciplinary Developments, 1(1), 2016, 60-90
| null | null |
cs.HC
|
http://creativecommons.org/licenses/by-sa/4.0/
|
Developments in information and communication technologies have been greatly
influential on the practices in all fields, and education is not an exception
to this. To illustrate with, computers were first used in computer assisted
education in order to increase the efficiency of teaching process. Recently,
computer has contributed more to the field through interactive and smart class
applications that are specially designed for classroom use. The aim of this
study is to develop a low cost, portable and projection supported touchscreen
to be used in educational environments by using FPGA technology and to test its
usability. For the purposes of the study, the above mentioned system was
developed by using the necessary hardware and software, and later it was tested
in terms of usability. This usability test was administered to teachers, who
were the target end users of this touchscreen writing / drawing system. The aim
of this test was to determine user friendliness, subservientness and usability
of the system. Several tools were used to obtain data from the users that
participated in the study. The analysis and evaluation of the data collected
revealed that the system has achieved its objectives successfully.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2017 18:28:50 GMT"
}
] | 2017-04-07T00:00:00 |
[
[
"Tufekci",
"Aslihan",
""
],
[
"Samanci",
"Kamuran",
""
],
[
"Kose",
"Utku",
""
]
] |
new_dataset
| 0.999449 |
1704.01669
|
Valentin Khrulkov
|
Valentin Khrulkov, Maxim Rakhuba and Ivan Oseledets
|
Vico-Greengard-Ferrando quadratures in the tensor solver for integral
equations
| null | null | null | null |
cs.NA math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Convolution with Green's function of a differential operator appears in a lot
of applications e.g. Lippmann-Schwinger integral equation. Algorithms for
computing such are usually non-trivial and require non-uniform mesh. However,
recently Vico, Greengard and Ferrando developed method for computing
convolution with smooth functions with compact support with spectral accuracy,
requiring nothing more than Fast Fourier Transform (FFT). Their approach is
very suitable for the low-rank tensor implementation which we develop using
Quantized Tensor Train (QTT) decomposition.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2017 23:47:57 GMT"
}
] | 2017-04-07T00:00:00 |
[
[
"Khrulkov",
"Valentin",
""
],
[
"Rakhuba",
"Maxim",
""
],
[
"Oseledets",
"Ivan",
""
]
] |
new_dataset
| 0.991751 |
1704.01802
|
Henrique Oliveira Santos
|
Henrique Santos, Vasco Furtado, Paulo Pinheiro, Deborah L. McGuinness
|
Contextual Data Collection for Smart Cities
|
In Proceedings of the 6th Workshop on Semantics for Smarter Cities
(S4SC 2015), Bethlehem, PA, USA, October 11-12, 2015
| null | null | null |
cs.AI cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As part of Smart Cities initiatives, national, regional and local governments
all over the globe are under the mandate of being more open regarding how they
share their data. Under this mandate, many of these governments are publishing
data under the umbrella of open government data, which includes measurement
data from city-wide sensor networks. Furthermore, many of these data are
published in so-called data portals as documents that may be spreadsheets,
comma-separated value (CSV) data files, or plain documents in PDF or Word
documents. The sharing of these documents may be a convenient way for the data
provider to convey and publish data but it is not the ideal way for data
consumers to reuse the data. For example, the problems of reusing the data may
range from difficulty opening a document that is provided in any format that is
not plain text, to the actual problem of understanding the meaning of each
piece of knowledge inside of the document. Our proposal tackles those
challenges by identifying metadata that has been regarded to be relevant for
measurement data and providing a schema for this metadata. We further leverage
the Human-Aware Sensor Network Ontology (HASNetO) to build an architecture for
data collected in urban environments. We discuss the use of HASNetO and the
supporting infrastructure to manage both data and metadata in support of the
City of Fortaleza, a large metropolitan area in Brazil.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2017 12:21:57 GMT"
}
] | 2017-04-07T00:00:00 |
[
[
"Santos",
"Henrique",
""
],
[
"Furtado",
"Vasco",
""
],
[
"Pinheiro",
"Paulo",
""
],
[
"McGuinness",
"Deborah L.",
""
]
] |
new_dataset
| 0.950354 |
1704.01859
|
Raluca Necula
|
Raluca Necula (1), Mihaela Breaban (1) and Madalina Raschip (1) ((1)
Faculty of Computer Science, Alexandru Ioan Cuza University, Iasi, Romania)
|
Tackling Dynamic Vehicle Routing Problem with Time Windows by means of
Ant Colony System
|
10 pages, 2 figures
| null | null | null |
cs.NE cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Dynamic Vehicle Routing Problem with Time Windows (DVRPTW) is an
extension of the well-known Vehicle Routing Problem (VRP), which takes into
account the dynamic nature of the problem. This aspect requires the vehicle
routes to be updated in an ongoing manner as new customer requests arrive in
the system and must be incorporated into an evolving schedule during the
working day. Besides the vehicle capacity constraint involved in the classical
VRP, DVRPTW considers in addition time windows, which are able to better
capture real-world situations. Despite this, so far, few studies have focused
on tackling this problem of greater practical importance. To this end, this
study devises for the resolution of DVRPTW, an ant colony optimization based
algorithm, which resorts to a joint solution construction mechanism, able to
construct in parallel the vehicle routes. This method is coupled with a local
search procedure, aimed to further improve the solutions built by ants, and
with an insertion heuristics, which tries to reduce the number of vehicles used
to service the available customers. The experiments indicate that the proposed
algorithm is competitive and effective, and on DVRPTW instances with a higher
dynamicity level, it is able to yield better results compared to existing
ant-based approaches.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2017 14:29:14 GMT"
}
] | 2017-04-07T00:00:00 |
[
[
"Necula",
"Raluca",
""
],
[
"Breaban",
"Mihaela",
""
],
[
"Raschip",
"Madalina",
""
]
] |
new_dataset
| 0.991038 |
1611.04268
|
Anastasia Shuba
|
Anastasia Shuba, Anh Le, Emmanouil Alimpertis, Minas Gjoka, Athina
Markopoulou
|
AntMonitor: A System for On-Device Mobile Network Monitoring and its
Applications
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a complete system for on-device passive monitoring,
collection, and analysis of fine grained, large-scale packet measurements from
mobile devices. First, we describe the design and implementation of AntMonitor
as a userspace mobile app based on a VPN-service but only on the device
(without the need to route through a remote VPN server) and using only the
minimum resources required. We evaluate our prototype and show that it
significantly outperforms prior state-of-the-art approaches: it achieves
throughput of over 90 Mbps downlink and 65 Mbps uplink, which is 2x and 8x
faster than mobile-only baselines and is 94% of the throughput without VPN,
while using 2-12x less energy. Second, we show that AntMonitor is uniquely
positioned to serve as a platform for passive on-device mobile network
monitoring and to enable a number of applications, including: (i) real-time
detection and prevention of private information leakage from the device to the
network; (ii) passive network performance monitoring; and (iii) application
classification and user profiling. We showcase preliminary results from a pilot
user study at a university campus.
|
[
{
"version": "v1",
"created": "Mon, 14 Nov 2016 07:16:59 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2017 01:37:53 GMT"
}
] | 2017-04-06T00:00:00 |
[
[
"Shuba",
"Anastasia",
""
],
[
"Le",
"Anh",
""
],
[
"Alimpertis",
"Emmanouil",
""
],
[
"Gjoka",
"Minas",
""
],
[
"Markopoulou",
"Athina",
""
]
] |
new_dataset
| 0.999216 |
1701.02632
|
Cristian Gonz\'alez Garc\'ia Cgg
|
Cristian Gonz\'alez Garc\'ia, Daniel Meana-Llori\'an, B. Cristina
Pelayo G-Bustelo, Juan Manuel Cueva Lovelle, N\'estor Garcia-Fernandez
|
Midgar: Detection of people through computer vision in the Internet of
Things scenarios to improve the security in Smart Cities, Smart Towns, and
Smart Homes
| null | null |
10.1016/j.future.2016.12.033
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Could we use Computer Vision in the Internet of Things for using pictures as
sensors? This is the principal hypothesis that we want to resolve. Currently,
in order to create safety areas, cities, or homes, people use IP cameras.
Nevertheless, this system needs people who watch the camera images, watch the
recording after something occurred, or watch when the camera notifies them of
any movement. These are the disadvantages. Furthermore, there are many Smart
Cities and Smart Homes around the world. This is why we thought of using the
idea of the Internet of Things to add a way of automating the use of IP
cameras. In our case, we propose the analysis of pictures through Computer
Vision to detect people in the analysed pictures. With this analysis, we are
able to obtain if these pictures contain people and handle the pictures as if
they were sensors with two possible states. Notwithstanding, Computer Vision is
a very complicated field. This is why we needed a second hypothesis: Could we
work with Computer Vision in the Internet of Things with a good accuracy to
automate or semi-automate this kind of events? The demonstration of these
hypotheses required a testing over our Computer Vision module to check the
possibilities that we have to use this module in a possible real environment
with a good accuracy. Our proposal, as a possible solution, is the analysis of
entire sequence instead of isolated pictures for using pictures as sensors in
the Internet of Things.
|
[
{
"version": "v1",
"created": "Tue, 10 Jan 2017 15:19:14 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Feb 2017 15:22:23 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Apr 2017 06:58:50 GMT"
}
] | 2017-04-06T00:00:00 |
[
[
"García",
"Cristian González",
""
],
[
"Meana-Llorián",
"Daniel",
""
],
[
"G-Bustelo",
"B. Cristina Pelayo",
""
],
[
"Lovelle",
"Juan Manuel Cueva",
""
],
[
"Garcia-Fernandez",
"Néstor",
""
]
] |
new_dataset
| 0.998317 |
1702.05153
|
Alexander Zhdanov
|
Alexander Zhdanov
|
Convolutional encoding of 60,64,68,72-bit self-dual codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we obtain the [60,30,12], [64,32,12], [68,34,12], [72,36,12]
self-dual codes as tailbitting convolutional codes with the smallest constraint
length K=9. In this construction one information bit is modulo two added to the
one of the encoder outputs and the first row in the quasi-cyclic generator
matrix is replaced by the obtained row. The pure quasi-cyclic construction with
K=10 is also available for [68,34,12] and [72,36,12] codes. The new [72,36,12]
singly even self-dual code with parameters Beta=483 Gamma=0 was obtained.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 21:07:18 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Apr 2017 16:11:22 GMT"
}
] | 2017-04-06T00:00:00 |
[
[
"Zhdanov",
"Alexander",
""
]
] |
new_dataset
| 0.994789 |
1703.05614
|
Xiao-Fan Niu
|
Xiao-Fan Niu, Wu-Jun Li
|
ParaGraphE: A Library for Parallel Knowledge Graph Embedding
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Knowledge graph embedding aims at translating the knowledge graph into
numerical representations by transforming the entities and relations into
continuous low-dimensional vectors. Recently, many methods [1, 5, 3, 2, 6] have
been proposed to deal with this problem, but existing single-thread
implementations of them are time-consuming for large-scale knowledge graphs.
Here, we design a unified parallel framework to parallelize these methods,
which achieves a significant time reduction without influencing the accuracy.
We name our framework as ParaGraphE, which provides a library for parallel
knowledge graph embedding. The source code can be downloaded from
https://github.com/LIBBLE/LIBBLE-MultiThread/tree/master/ParaGraphE .
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2017 13:36:41 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Mar 2017 06:15:48 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Apr 2017 02:56:45 GMT"
}
] | 2017-04-06T00:00:00 |
[
[
"Niu",
"Xiao-Fan",
""
],
[
"Li",
"Wu-Jun",
""
]
] |
new_dataset
| 0.994106 |
1704.01139
|
Adrian Garcia-Rodriguez
|
Adrian Garcia-Rodriguez, Giovanni Geraci, Lorenzo Galati Giordano,
Andrea Bonfante, Ming Ding, and David Lopez-Perez
|
Massive MIMO Unlicensed: A New Approach to Dynamic Spectrum Access
|
6 pages, 6 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays, the demand for wireless mobile services is copious, and will
continue increasing in the near future. Mobile cellular operators are therefore
looking at the unlicensed spectrum as an economical supplement to augment the
capacity of their soon-to-be overloaded networks. The same unlicensed bands are
luring internet service providers, venue owners, and authorities into
autonomously setting up and managing their high-performance private networks.
In light of this exciting future, ensuring coexistence between multiple
unlicensed technologies becomes a pivotal issue. So far this issue has been
merely addressed via inefficient sharing schemes based on intermittent
transmission. In this article, we present the fundamentals and the main
challenges behind massive MIMO unlicensed, a brand-new approach for technology
coexistence in the unlicensed bands, which is envisioned to boost spectrum
reuse for a plethora of use cases.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2017 18:20:09 GMT"
}
] | 2017-04-06T00:00:00 |
[
[
"Garcia-Rodriguez",
"Adrian",
""
],
[
"Geraci",
"Giovanni",
""
],
[
"Giordano",
"Lorenzo Galati",
""
],
[
"Bonfante",
"Andrea",
""
],
[
"Ding",
"Ming",
""
],
[
"Lopez-Perez",
"David",
""
]
] |
new_dataset
| 0.98569 |
1704.01244
|
Azade Fotouhi Ms
|
Azade Fotouhi, Ming Ding, Mahbub Hassan
|
Dynamic Base Station Repositioning to Improve Spectral Efficiency of
Drone Small Cells
|
Accepted at IEEE WoWMoM 2017 - 9 pages, 2 tables, 4 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With recent advancements in drone technology, researchers are now considering
the possibility of deploying small cells served by base stations mounted on
flying drones. A major advantage of such drone small cells is that the
operators can quickly provide cellular services in areas of urgent demand
without having to pre-install any infrastructure. Since the base station is
attached to the drone, technically it is feasible for the base station to
dynamic reposition itself in response to the changing locations of users for
reducing the communication distance, decreasing the probability of signal
blocking, and ultimately increasing the spectral efficiency. In this paper, we
first propose distributed algorithms for autonomous control of drone movements,
and then model and analyse the spectral efficiency performance of a drone small
cell to shed new light on the fundamental benefits of dynamic repositioning. We
show that, with dynamic repositioning, the spectral efficiency of drone small
cells can be increased by nearly 100\% for realistic drone speed, height, and
user traffic model and without incurring any major increase in drone energy
consumption.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2017 02:16:49 GMT"
}
] | 2017-04-06T00:00:00 |
[
[
"Fotouhi",
"Azade",
""
],
[
"Ding",
"Ming",
""
],
[
"Hassan",
"Mahbub",
""
]
] |
new_dataset
| 0.97531 |
1704.01279
|
Jesse Engel
|
Jesse Engel, Cinjon Resnick, Adam Roberts, Sander Dieleman, Douglas
Eck, Karen Simonyan, Mohammad Norouzi
|
Neural Audio Synthesis of Musical Notes with WaveNet Autoencoders
| null | null | null | null |
cs.LG cs.AI cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Generative models in vision have seen rapid progress due to algorithmic
improvements and the availability of high-quality image datasets. In this
paper, we offer contributions in both these areas to enable similar progress in
audio modeling. First, we detail a powerful new WaveNet-style autoencoder model
that conditions an autoregressive decoder on temporal codes learned from the
raw audio waveform. Second, we introduce NSynth, a large-scale and high-quality
dataset of musical notes that is an order of magnitude larger than comparable
public datasets. Using NSynth, we demonstrate improved qualitative and
quantitative performance of the WaveNet autoencoder over a well-tuned spectral
autoencoder baseline. Finally, we show that the model learns a manifold of
embeddings that allows for morphing between instruments, meaningfully
interpolating in timbre to create new types of sounds that are realistic and
expressive.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2017 06:34:22 GMT"
}
] | 2017-04-06T00:00:00 |
[
[
"Engel",
"Jesse",
""
],
[
"Resnick",
"Cinjon",
""
],
[
"Roberts",
"Adam",
""
],
[
"Dieleman",
"Sander",
""
],
[
"Eck",
"Douglas",
""
],
[
"Simonyan",
"Karen",
""
],
[
"Norouzi",
"Mohammad",
""
]
] |
new_dataset
| 0.999593 |
1704.01346
|
Laurent Besacier
|
Jeremy Ferrero, Frederic Agnes, Laurent Besacier, Didier Schwab
|
CompiLIG at SemEval-2017 Task 1: Cross-Language Plagiarism Detection
Methods for Semantic Textual Similarity
| null | null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
We present our submitted systems for Semantic Textual Similarity (STS) Track
4 at SemEval-2017. Given a pair of Spanish-English sentences, each system must
estimate their semantic similarity by a score between 0 and 5. In our
submission, we use syntax-based, dictionary-based, context-based, and MT-based
methods. We also combine these methods in unsupervised and supervised way. Our
best run ranked 1st on track 4a with a correlation of 83.02% with human
annotations.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2017 10:07:22 GMT"
}
] | 2017-04-06T00:00:00 |
[
[
"Ferrero",
"Jeremy",
""
],
[
"Agnes",
"Frederic",
""
],
[
"Besacier",
"Laurent",
""
],
[
"Schwab",
"Didier",
""
]
] |
new_dataset
| 0.998235 |
1704.01482
|
Jianwei Huang
|
Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu and
Huanguo Zhan
|
CHAOS: an SDN-based Moving Target Defense System
| null | null | null | null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The static nature of current cyber systems has made them easy to be attacked
and compromised. By constantly changing a system, Moving Target Defense (MTD)
has provided a promising way to reduce or move the attack surface that is
available for exploitation by an adversary. However, the current network- based
MTD obfuscates networks indiscriminately that makes some networks key services,
such as web and DNS services, unavailable, because many information of these
services has to be opened to the outside and remain real without compromising
their usability. Moreover, the indiscriminate obfuscation also severely reduces
the performance of networks. In this paper, we propose CHAOS, an SDN
(Software-defined networking)-based MTD system, which discriminately obfuscates
hosts with different security levels in a network. In CHAOS, we introduce a
Chaos Tower Obfuscation (CTO) method, which uses a Chaos Tower Structure (CTS)
to depict the hierarchy of all the hosts in an intranet and provides a more
unpredictable and flexible obfuscation method. We also present the design of
CHAOS, which leverages SDN features to obfuscate the attack surface including
IP obfuscation, ports obfuscation, and fingerprint obfuscation thereby
enhancing the unpredictability of the networking environment. We develop fast
CTO algorithms to achieve a different degree of obfuscation for the hosts in
each layer. Our experimental results show that a network protected by CHAOS is
capable of decreasing the percentage of information disclosure effectively to
guarantee the normal flow of traffic.
|
[
{
"version": "v1",
"created": "Wed, 5 Apr 2017 15:25:11 GMT"
}
] | 2017-04-06T00:00:00 |
[
[
"Wang",
"Juan",
""
],
[
"Xiao",
"Feng",
""
],
[
"Huang",
"Jianwei",
""
],
[
"Zha",
"Daochen",
""
],
[
"Hu",
"Hongxin",
""
],
[
"Zhan",
"Huanguo",
""
]
] |
new_dataset
| 0.998855 |
1411.0406
|
Arjun Bhardwaj
|
Arjun Bhardwaj and Sangeetha
|
GC-SROIQ(C) : Expressive Constraint Modelling and Grounded
Circumscription for SROIQ
|
For an improved formulation of the problem, which addresses critical
shortcomings of this paper, please refer to the following : Extending SROIQ
with Constraint Networks and Grounded Circumscription, arXiv:1508.00116
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Developments in semantic web technologies have promoted ontological encoding
of knowledge from diverse domains. However, modelling many practical domains
requires more expressive representations schemes than what the standard
description logics(DLs) support. We extend the DL SROIQ with constraint
networks and grounded circumscription. Applications of constraint modelling
include embedding ontologies with temporal or spatial information, while
grounded circumscription allows defeasible inference and closed world
reasoning. This paper overcomes restrictions on existing constraint modelling
approaches by introducing expressive constructs. Grounded circumscription
allows concept and role minimization and is decidable for DL. We provide a
general and intuitive algorithm for the framework of grounded circumscription
that can be applied to a whole range of logics. We present the resulting logic:
GC-SROIQ(C), and describe a tableau decision procedure for it.
|
[
{
"version": "v1",
"created": "Mon, 3 Nov 2014 10:05:29 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Nov 2014 07:46:47 GMT"
},
{
"version": "v3",
"created": "Tue, 28 Jul 2015 08:45:52 GMT"
},
{
"version": "v4",
"created": "Mon, 3 Apr 2017 18:04:45 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Bhardwaj",
"Arjun",
""
],
[
"Sangeetha",
"",
""
]
] |
new_dataset
| 0.993305 |
1509.06349
|
Jarkko Peltom\"aki
|
Jarkko Peltom\"aki, Markus Whiteland
|
A square root map on Sturmian words
|
Extended version. 40 pages, 5 figures, 2 tables
|
The Electronic Journal of Combinatorics Vol. 24, Issue 1, #P1.54
(2017)
| null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a square root map on Sturmian words and study its properties.
Given a Sturmian word of slope $\alpha$, there exists exactly six minimal
squares in its language (a minimal square does not have a square as a proper
prefix). A Sturmian word $s$ of slope $\alpha$ can be written as a product of
these six minimal squares: $s = X_1^2 X_2^2 X_3^2 \cdots$. The square root of
$s$ is defined to be the word $\sqrt{s} = X_1 X_2 X_3 \cdots$. The main result
of this paper is that that $\sqrt{s}$ is also a Sturmian word of slope
$\alpha$. Further, we characterize the Sturmian fixed points of the square root
map, and we describe how to find the intercept of $\sqrt{s}$ and an occurrence
of any prefix of $\sqrt{s}$ in $s$. Related to the square root map, we
characterize the solutions of the word equation $X_1^2 X_2^2 \cdots X_n^2 =
(X_1 X_2 \cdots X_n)^2$ in the language of Sturmian words of slope $\alpha$
where the words $X_i^2$ are minimal squares of slope $\alpha$.
We also study the square root map in a more general setting. We explicitly
construct an infinite set of non-Sturmian fixed points of the square root map.
We show that the subshifts $\Omega$ generated by these words have a curious
property: for all $w \in \Omega$ either $\sqrt{w} \in \Omega$ or $\sqrt{w}$ is
periodic. In particular, the square root map can map an aperiodic word to a
periodic word.
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2015 19:16:45 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Peltomäki",
"Jarkko",
""
],
[
"Whiteland",
"Markus",
""
]
] |
new_dataset
| 0.999125 |
1603.08188
|
Yimin Liu
|
Yimin Liu, Hang Ruan, Lei Wang, and Arye Nehorai
|
The Random Frequency Diverse Array: A New Antenna Structure for
Uncoupled Direction-Range Indication in Active Sensing
|
13 pages, 10 figures
| null |
10.1109/JSTSP.2016.2627183
| null |
cs.IT math.IT stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a new type of array antenna, termed the Random
Frequency Diverse Array (RFDA), for an uncoupled indication of target direction
and range with low system complexity. In RFDA, each array element has a narrow
bandwidth and a randomly assigned carrier frequency. The beampattern of the
array is shown to be stochastic but thumbtack-like, and its stochastic
characteristics, such as the mean, variance, and asymptotic distribution are
derived analytically. Based on these two features, we propose two kinds of
algorithms for signal processing. One is matched filtering, due to the
beampattern's good characteristics. The other is compressive sensing, because
the new approach can be regarded as a sparse and random sampling of target
information in the spatial-frequency domain. Fundamental limits, such as the
Cram\'er-Rao bound and the observing matrix's mutual coherence, are provided as
performance guarantees of the new array structure. The features and
performances of RFDA are verified with numerical results.
|
[
{
"version": "v1",
"created": "Sun, 27 Mar 2016 08:50:45 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Liu",
"Yimin",
""
],
[
"Ruan",
"Hang",
""
],
[
"Wang",
"Lei",
""
],
[
"Nehorai",
"Arye",
""
]
] |
new_dataset
| 0.999145 |
1605.00626
|
Sihua Shao
|
Sihua Shao, Abdallah Khreishah, Hany Elgala
|
Pixelated VLC-backscattering for Self-charging Indoor IoT Devices
| null | null |
10.1109/LPT.2016.2631946
| null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visible light communication (VLC) backscatter has been proposed as a wireless
access option for Internet of Things (IoT). However, the throughput of the
state-of-the-art VLC backscatter is limited by simple single-carrier pulsed
modulation scheme, such as on-off keying (OOK). In this paper, a novel
pixelated VLC backscatter is proposed and implemented to overcome the channel
capacity limitation. In particular, multiple smaller VLC backscatters,
switching on or off, are integrated to generate multi-level signals, which
enables the usage of more advanced modulation schemes than OOK. Based on
experimental results, rate adaptation at different communication distances can
be employed to enhance the achievable data rate. Compared to OOK, the data rate
can be tripled when 8-PAM is used at 2 meters. In general, $n$-fold throughput
enhancement is realized by utilizing $n$ smaller VLC backscatters while
incurring negligible additional energy using the same device space as that of a
single large backscatter.
|
[
{
"version": "v1",
"created": "Thu, 21 Apr 2016 05:38:15 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Shao",
"Sihua",
""
],
[
"Khreishah",
"Abdallah",
""
],
[
"Elgala",
"Hany",
""
]
] |
new_dataset
| 0.959943 |
1605.07480
|
Luca Sanguinetti
|
Houssem Sifaou, Abla Kammoun, Luca Sanguinetti, M\'erouane Debbah,
Mohamed-Slim Alouini
|
Max-Min SINR in Large-Scale Single-Cell MU-MIMO: Asymptotic Analysis and
Low Complexity Transceivers
|
13 pages, 4 figures, submitted to IEEE Transactions on Signal
Processing
| null |
10.1109/TSP.2016.2645518
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work focuses on the downlink and uplink of large-scale single-cell
MU-MIMO systems in which the base station (BS) endowed with $M$ antennas
communicates with $K$ single-antenna user equipments (UEs). Particularly, we
aim at reducing the complexity of the linear precoder and receiver that
maximize the minimum signal-to-interference-plus-noise ratio subject to a given
power constraint. To this end, we consider the asymptotic regime in which $M$
and $K$ grow large with a given ratio. Tools from random matrix theory (RMT)
are then used to compute, in closed form, accurate approximations for the
parameters of the optimal precoder and receiver, when imperfect channel state
information (modeled by the generic Gauss-Markov formulation form) is available
at the BS. The asymptotic analysis allows us to derive the asymptotically
optimal linear precoder and receiver that are characterized by a lower
complexity (due to the dependence on the large scale components of the channel)
and, possibly, by a better resilience to imperfect channel state information.
However, the implementation of both is still challenging as it requires fast
inversions of large matrices in every coherence period. To overcome this issue,
we apply the truncated polynomial expansion (TPE) technique to the precoding
and receiving vector of each UE and make use of RMT to determine the optimal
weighting coefficients on a per-UE basis that asymptotically solve the max-min
SINR problem. Numerical results are used to validate the asymptotic analysis in
the finite system regime and to show that the proposed TPE transceivers
efficiently mimic the optimal ones, while requiring much lower computational
complexity.
|
[
{
"version": "v1",
"created": "Tue, 24 May 2016 14:35:02 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Feb 2017 13:45:24 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Sifaou",
"Houssem",
""
],
[
"Kammoun",
"Abla",
""
],
[
"Sanguinetti",
"Luca",
""
],
[
"Debbah",
"Mérouane",
""
],
[
"Alouini",
"Mohamed-Slim",
""
]
] |
new_dataset
| 0.969101 |
1606.08761
|
Piero Triverio
|
Fadime Bekmambetova, Xinyue Zhang and Piero Triverio
|
A Dissipative Systems Theory for FDTD with Application to Stability
Analysis and Subgridding
| null | null |
10.1109/TAP.2016.2637867
| null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper establishes a far-reaching connection between the
Finite-Difference Time-Domain method (FDTD) and the theory of dissipative
systems. The FDTD equations for a rectangular region are written as a dynamical
system having the magnetic and electric fields on the boundary as inputs and
outputs. Suitable expressions for the energy stored in the region and the
energy absorbed from the boundaries are introduced, and used to show that the
FDTD system is dissipative under a generalized Courant-Friedrichs-Lewy
condition. Based on the concept of dissipation, a powerful theoretical
framework to investigate the stability of FDTD methods is devised. The new
method makes FDTD stability proofs simpler, more intuitive, and modular.
Stability conditions can indeed be given on the individual components (e.g.
boundary conditions, meshes, embedded models) instead of the whole coupled
setup. As an example of application, we derive a new subgridding method with
material traverse, arbitrary grid refinement, and guaranteed stability. The
method is easy to implement and has a straightforward stability proof.
Numerical results confirm its stability, low reflections, and ability to handle
material traverse.
|
[
{
"version": "v1",
"created": "Tue, 28 Jun 2016 15:45:32 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Bekmambetova",
"Fadime",
""
],
[
"Zhang",
"Xinyue",
""
],
[
"Triverio",
"Piero",
""
]
] |
new_dataset
| 0.998358 |
1611.05579
|
Yustinus Soelistio Eko
|
Kenny Supangat, Yustinus Eko Soelistio
|
Bus Stops Location and Bus Route Planning Using Mean Shift Clustering
and Ant Colony in West Jakarta
|
Original publication in the ICITDA 2016 Conference (14-16 Nov. 2016),
icitda.uii.ac.id
| null |
10.1088/1757-899X/185/1/012022
| null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Traffic Jam has been a daily problem for people in Jakarta which is one of
the busiest city in Indonesia up until now. Even though the official government
has tried to reduce the impact of traffic issues by developing a new public
transportation which takes up a lot of resources and time, it failed to
diminish the problem. The actual concern to this problem actually lies in how
people move between places in Jakarta where they always using their own vehicle
like cars, and motorcycles that fill most of the street in Jakarta. Among much
other public transportations that roams the street of Jakarta, Buses is
believed to be an efficient transportation that can move many people at once.
However, the location of the bus stop is now have moved to the middle of the
main road, and it is too far for the nearby residence to access to it. This
paper proposes an optimal location of optimal bus stops in West Jakarta that is
experimentally proven to have a maximal distance of 350 m. The optimal location
is estimated by means of mean shift clustering method while the optimal routes
are calculated using Ant Colony algorithm. The bus stops locations rate of
error is 0.07% with overall route area of 32 km. Based on our experiments, we
believe our proposed bus stop plan can be an interesting alternative to reduce
traffic congestion in West Jakarta.
|
[
{
"version": "v1",
"created": "Thu, 17 Nov 2016 06:23:36 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Supangat",
"Kenny",
""
],
[
"Soelistio",
"Yustinus Eko",
""
]
] |
new_dataset
| 0.999685 |
1701.01909
|
Amir Sadeghian
|
Amir Sadeghian, Alexandre Alahi, and Silvio Savarese
|
Tracking The Untrackable: Learning To Track Multiple Cues with Long-Term
Dependencies
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The majority of existing solutions to the Multi-Target Tracking (MTT) problem
do not combine cues in a coherent end-to-end fashion over a long period of
time. However, we present an online method that encodes long-term temporal
dependencies across multiple cues. One key challenge of tracking methods is to
accurately track occluded targets or those which share similar appearance
properties with surrounding objects. To address this challenge, we present a
structure of Recurrent Neural Networks (RNN) that jointly reasons on multiple
cues over a temporal window. We are able to correct many data association
errors and recover observations from an occluded state. We demonstrate the
robustness of our data-driven approach by tracking multiple targets using their
appearance, motion, and even interactions. Our method outperforms previous
works on multiple publicly available datasets including the challenging MOT
benchmark.
|
[
{
"version": "v1",
"created": "Sun, 8 Jan 2017 03:29:26 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Apr 2017 21:42:58 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Sadeghian",
"Amir",
""
],
[
"Alahi",
"Alexandre",
""
],
[
"Savarese",
"Silvio",
""
]
] |
new_dataset
| 0.990054 |
1703.09268
|
Curt Da Silva
|
Curt Da Silva, Felix J. Herrmann
|
A Unified 2D/3D Large Scale Software Environment for Nonlinear Inverse
Problems
| null | null | null | null |
cs.MS cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large scale parameter estimation problems are among some of the most
computationally demanding problems in numerical analysis. An academic
researcher's domain-specific knowledge often precludes that of software design,
which results in inversion frameworks that are technically correct, but not
scalable to realistically-sized problems. On the other hand, the computational
demands for realistic problems result in industrial codebases that are geared
solely for high performance, rather than comprehensibility or flexibility. We
propose a new software design for inverse problems constrained by partial
differential equations that bridges the gap between these two seemingly
disparate worlds. A hierarchical and modular design allows a user to delve into
as much detail as she desires, while exploiting high performance primitives at
the lower levels. Our code has the added benefit of actually reflecting the
underlying mathematics of the problem, which lowers the cognitive load on user
using it and reduces the initial startup period before a researcher can be
fully productive. We also introduce a new preconditioner for the 3D Helmholtz
equation that is suitable for fault-tolerant distributed systems. Numerical
experiments on a variety of 2D and 3D test problems demonstrate the
effectiveness of this approach on scaling algorithms from small to large scale
problems with minimal code changes.
|
[
{
"version": "v1",
"created": "Mon, 27 Mar 2017 19:01:10 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Apr 2017 00:19:08 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Da Silva",
"Curt",
""
],
[
"Herrmann",
"Felix J.",
""
]
] |
new_dataset
| 0.974703 |
1704.00853
|
Fred Glover
|
Kenneth Sorensen, Marc Sevaux and Fred Glover
|
A History of Metaheuristics
|
27 pages, to appear in: R. Marti, P. Pardalos, and M. Resende, eds.,
Handbook of Heuristics, Springer
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This chapter describes the history of metaheuristics in five distinct
periods, starting long before the first use of the term and ending a long time
in the future.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2017 02:28:59 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Sorensen",
"Kenneth",
""
],
[
"Sevaux",
"Marc",
""
],
[
"Glover",
"Fred",
""
]
] |
new_dataset
| 0.97133 |
1704.00939
|
Jacopo Staiano
|
Youness Mansar, Lorenzo Gatti, Sira Ferradans, Marco Guerini, Jacopo
Staiano
|
Fortia-FBK at SemEval-2017 Task 5: Bullish or Bearish? Inferring
Sentiment towards Brands from Financial News Headlines
|
6 pages, 1 figure; accepted for publication at the International
Workshop on Semantic Evaluation (SemEval-2017) to be held in conjunction with
ACL 2017
| null | null | null |
cs.CL cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe a methodology to infer Bullish or Bearish
sentiment towards companies/brands. More specifically, our approach leverages
affective lexica and word embeddings in combination with convolutional neural
networks to infer the sentiment of financial news headlines towards a target
company. Such architecture was used and evaluated in the context of the SemEval
2017 challenge (task 5, subtask 2), in which it obtained the best performance.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2017 10:01:47 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Mansar",
"Youness",
""
],
[
"Gatti",
"Lorenzo",
""
],
[
"Ferradans",
"Sira",
""
],
[
"Guerini",
"Marco",
""
],
[
"Staiano",
"Jacopo",
""
]
] |
new_dataset
| 0.99636 |
1704.00988
|
Ahmad Nauman Ghazi
|
Ahmad Nauman Ghazi, Ratna Pranathi Garigapati, Kai Petersen
|
Checklists to Support Test Charter Design in Exploratory Testing
|
In proceedings of 18th International conference of agile software
development. XP 2017
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
During exploratory testing sessions the tester simultaneously learns, designs
and executes tests. The activity is iterative and utilizes the skills of the
tester and provides flexibility and creativity.Test charters are used as a
vehicle to support the testers during the testing. The aim of this study is to
support practitioners in the design of test charters through checklists. We
aimed to identify factors allowing practitioners to critically reflect on their
designs and contents of test charters to support practitioners in making
informed decisions of what to include in test charters. The factors and
contents have been elicited through interviews. Overall, 30 factors and 35
content elements have been elicited.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2017 12:48:08 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Ghazi",
"Ahmad Nauman",
""
],
[
"Garigapati",
"Ratna Pranathi",
""
],
[
"Petersen",
"Kai",
""
]
] |
new_dataset
| 0.997561 |
1704.01003
|
Florent Altche
|
Florent Altch\'e, Philip Polack and Arnaud de la Fortelle
|
High-Speed Trajectory Planning for Autonomous Vehicles Using a Simple
Dynamic Model
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To improve safety and energy efficiency, autonomous vehicles are expected to
drive smoothly in most situations, while maintaining their velocity below a
predetermined speed limit. However, some scenarios such as low road adherence
or inadequate speed limit may require vehicles to automatically adapt their
velocity without external input, while nearing the limits of their dynamic
capacities. Many of the existing trajectory planning approaches are incapable
of making such adjustments, since they assume a feasible velocity reference is
given. Moreover, near-limits trajectory planning often implies high-complexity
dynamic vehicle models, making computations difficult. In this article, we use
a simple dynamic model derived from numerical simulations to design a
trajectory planner for high-speed driving of an autonomous vehicle based on
model predictive control. Unlike existing techniques, our formulation includes
the selection of a feasible velocity to track a predetermined path while
avoiding obstacles. Simulation results on a highly precise vehicle model show
that our approach can be used in real-time to provide feasible trajectories
that can be tracked using a simple control architecture. Moreover, the use of
our simplified model makes the planner more robust and yields better
trajectories compared to kinematic models commonly used in trajectory planning.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2017 13:36:34 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Altché",
"Florent",
""
],
[
"Polack",
"Philip",
""
],
[
"de la Fortelle",
"Arnaud",
""
]
] |
new_dataset
| 0.995602 |
1704.01036
|
Telmo Menezes
|
Telmo Menezes (CMB), Camille Roth (IEP Paris, CNRS, CMB)
|
Natural Scales in Geographical Patterns
| null |
Scientific Reports, Nature Publishing Group, 2017, 7 (45823)
|
10.1080/01621459.1971.10482356
| null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human mobility is known to be distributed across several orders of magnitude
of physical distances , which makes it generally difficult to endogenously find
or define typical and meaningful scales. Relevant analyses, from movements to
geographical partitions, seem to be relative to some ad-hoc scale, or no scale
at all. Relying on geotagged data collected from photo-sharing social media, we
apply community detection to movement networks constrained by increasing
percentiles of the distance distribution. Using a simple parameter-free
discontinuity detection algorithm, we discover clear phase transitions in the
community partition space. The detection of these phases constitutes the first
objective method of characterising endogenous, natural scales of human
movement. Our study covers nine regions, ranging from cities to countries of
various sizes and a transnational area. For all regions, the number of natural
scales is remarkably low (2 or 3). Further, our results hint at scale-related
behaviours rather than scale-related users. The partitions of the natural
scales allow us to draw discrete multi-scale geographical boundaries,
potentially capable of providing key insights in fields such as epidemiology or
cultural contagion where the introduction of spatial boundaries is pivotal.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2017 14:38:19 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Menezes",
"Telmo",
"",
"CMB"
],
[
"Roth",
"Camille",
"",
"IEP Paris, CNRS, CMB"
]
] |
new_dataset
| 0.984233 |
1704.01071
|
Mikolas Janota
|
Mikol\'a\v{s} Janota
|
An Achilles' Heel of Term-Resolution
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Term-resolution provides an elegant mechanism to prove that a quantified
Boolean formula (QBF) is true. It is a dual to Q-resolution (also referred to
as clause-resolution) and is practically highly important as it enables
certifying answers of DPLL-based QBF solvers. While term-resolution and
Q-resolution are very similar, they're not completely symmetric. In particular,
Q-resolution operates on clauses and term-resolution operates on models of the
matrix. This paper investigates what impact this asymmetry has. We'll see that
there is a large class of formulas (formulas with "big models") whose
term-resolution proofs are exponential. As a possible remedy, the paper
suggests to prove true QBFs by refuting their negation ({\em negate-refute}),
rather than proving them by term-resolution. The paper shows that from the
theoretical perspective this is indeed a favorable approach. In particular,
negation-refutation can p-simulates term-resolution and there is an exponential
separation between the two calculi. These observations further our
understanding of proof systems for QBFs and provide a strong theoretical
underpinning for the effort towards non-CNF QBF solvers.
|
[
{
"version": "v1",
"created": "Tue, 4 Apr 2017 15:41:14 GMT"
}
] | 2017-04-05T00:00:00 |
[
[
"Janota",
"Mikoláš",
""
]
] |
new_dataset
| 0.97404 |
1506.02163
|
Jie Ding
|
Zhun Deng, Jie Ding, Mohammad Noshad, and Vahid Tarokh
|
Capacity of Hexagonal Checkerboard Codes
|
This manuscript has been withdrawn by the authors as they have some
new progress and will rewrite it
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a new method to bound the capacity of checkerboard
codes on the hexagonal lattice. This produces rigorous bounds that are tighter
than those commonly known.
|
[
{
"version": "v1",
"created": "Sat, 6 Jun 2015 15:18:15 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Apr 2017 22:09:42 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Deng",
"Zhun",
""
],
[
"Ding",
"Jie",
""
],
[
"Noshad",
"Mohammad",
""
],
[
"Tarokh",
"Vahid",
""
]
] |
new_dataset
| 0.999124 |
1605.07322
|
Asahi Takaoka
|
Asahi Takaoka
|
Recognizing Simple-Triangle Graphs by Restricted 2-Chain Subgraph Cover
|
13 pages, 14 figures, the Author's accepted version of a paper in
WALCOM 2017, Keywords: Chain cover, Graph sandwich problem, PI graphs,
Simple-triangle graphs, Threshold dimension 2 graphs
|
WALCOM: Algorithms and Computation. Volume 10167 of Lecture Notes
in Computer Science (2017) 177-189
|
10.1007/978-3-319-53925-6_14
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A simple-triangle graph (also known as a PI graph) is the intersection graph
of a family of triangles defined by a point on a horizontal line and an
interval on another horizontal line. The recognition problem for
simple-triangle graphs was a longstanding open problem, and recently a
polynomial-time algorithm has been given [G. B. Mertzios, The Recognition of
Simple-Triangle Graphs and of Linear-Interval Orders is Polynomial, SIAM J.
Discrete Math., 29(3):1150--1185, 2015]. Along with the approach of this paper,
we show a simpler recognition algorithm for simple-triangle graphs. To do this,
we provide a polynomial-time algorithm to solve the following problem: Given a
bipartite graph $G$ and a set $F$ of edges of $G$, find a 2-chain subgraph
cover of $G$ such that one of two chain subgraphs has no edges in $F$.
|
[
{
"version": "v1",
"created": "Tue, 24 May 2016 07:26:39 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Apr 2017 05:31:52 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Takaoka",
"Asahi",
""
]
] |
new_dataset
| 0.999521 |
1607.00773
|
Mingzhe Chen
|
Mingzhe Chen, Walid Saad, Changchuan Yin, M\'erouane Debbah
|
Echo State Networks for Proactive Caching in Cloud-Based Radio Access
Networks with Mobile Users
|
Accepted in the IEEE Transactions on Wireless Communications
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, the problem of proactive caching is studied for cloud radio
access networks (CRANs). In the studied model, the baseband units (BBUs) can
predict the content request distribution and mobility pattern of each user,
determine which content to cache at remote radio heads and BBUs. This problem
is formulated as an optimization problem which jointly incorporates backhaul
and fronthaul loads and content caching. To solve this problem, an algorithm
that combines the machine learning framework of echo state networks with
sublinear algorithms is proposed. Using echo state networks (ESNs), the BBUs
can predict each user's content request distribution and mobility pattern while
having only limited information on the network's and user's state. In order to
predict each user's periodic mobility pattern with minimal complexity, the
memory capacity of the corresponding ESN is derived for a periodic input. This
memory capacity is shown to be able to record the maximum amount of user
information for the proposed ESN model. Then, a sublinear algorithm is proposed
to determine which content to cache while using limited content request
distribution samples. Simulation results using real data from Youku and the
Beijing University of Posts and Telecommunications show that the proposed
approach yields significant gains, in terms of sum effective capacity, that
reach up to 27.8% and 30.7%, respectively, compared to random caching with
clustering and random caching without clustering algorithm.
|
[
{
"version": "v1",
"created": "Mon, 4 Jul 2016 08:41:24 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Mar 2017 18:22:18 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Chen",
"Mingzhe",
""
],
[
"Saad",
"Walid",
""
],
[
"Yin",
"Changchuan",
""
],
[
"Debbah",
"Mérouane",
""
]
] |
new_dataset
| 0.98811 |
1703.02243
|
Wei Ke
|
Wei Ke, Jie Chen, Jianbin Jiao, Guoying Zhao, Qixiang Ye
|
SRN: Side-output Residual Network for Object Symmetry Detection in the
Wild
|
Proceedings of the IEEE Conference on Computer Vision and Pattern
Recognition, 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we establish a baseline for object symmetry detection in
complex backgrounds by presenting a new benchmark and an end-to-end deep
learning approach, opening up a promising direction for symmetry detection in
the wild. The new benchmark, named Sym-PASCAL, spans challenges including
object diversity, multi-objects, part-invisibility, and various complex
backgrounds that are far beyond those in existing datasets. The proposed
symmetry detection approach, named Side-output Residual Network (SRN),
leverages output Residual Units (RUs) to fit the errors between the object
symmetry groundtruth and the outputs of RUs. By stacking RUs in a
deep-to-shallow manner, SRN exploits the 'flow' of errors among multiple scales
to ease the problems of fitting complex outputs with limited layers,
suppressing the complex backgrounds, and effectively matching object symmetry
of different scales. Experimental results validate both the benchmark and its
challenging aspects related to realworld images, and the state-of-the-art
performance of our symmetry detection approach. The benchmark and the code for
SRN are publicly available at https://github.com/KevinKecc/SRN.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2017 07:09:40 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Apr 2017 01:58:50 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Ke",
"Wei",
""
],
[
"Chen",
"Jie",
""
],
[
"Jiao",
"Jianbin",
""
],
[
"Zhao",
"Guoying",
""
],
[
"Ye",
"Qixiang",
""
]
] |
new_dataset
| 0.997876 |
1703.06933
|
Caifa Zhou
|
Caifa Zhou, Andreas Wieser, and Xuezhi Tan
|
Fast Radio Map Construction and Position Estimation via Direct Mapping
for WLAN Indoor Localization System
|
more refined analysis required
| null | null | null |
cs.NI stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The main limitation that constrains the fast and comprehensive application of
Wireless Local Area Network (WLAN) based indoor localization systems with
Received Signal Strength (RSS) positioning algorithms is the building of the
fingerprinting radio map, which is time-consuming especially when the indoor
environment is large and/or with high frequent changes. Different approaches
have been proposed to reduce workload, including fingerprinting deployment and
update efforts, but the performance degrades greatly when the workload is
reduced below a certain level. In this paper, we propose an indoor localization
scenario that applies metric learning and manifold alignment to realize direct
mapping localization (DML) using a low resolution radio map with single sample
of RSS that reduces the fingerprinting workload by up to 87\%. Compared to
previous work. The proposed two localization approaches, DML and $k$ nearest
neighbors based on reconstructed radio map (reKNN), were shown to achieve less
than 4.3\ m and 3.7\ m mean localization error respectively in a typical office
environment with an area of approximately 170\ m$^2$, while the unsupervised
localization with perturbation algorithm was shown to achieve 4.7\ m mean
localization error with 8 times more workload than the proposed methods. As for
the room level localization application, both DML and reKNN can meet the
requirement with at most 9\ m of localization error which is enough to tell
apart different rooms with over 99\% accuracy.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2017 19:46:32 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Apr 2017 13:51:01 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Zhou",
"Caifa",
""
],
[
"Wieser",
"Andreas",
""
],
[
"Tan",
"Xuezhi",
""
]
] |
new_dataset
| 0.988245 |
1703.10193
|
Kiran Somasundaram
|
Onkar Dabeer, Radhika Gowaikar, Slawomir K. Grzechnik, Mythreya J.
Lakshman, Gerhard Reitmayr, Kiran Somasundaram, Ravi Teja Sukhavasi, Xinzhou
Wu
|
An End-to-End System for Crowdsourced 3d Maps for Autonomous Vehicles:
The Mapping Component
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Autonomous vehicles rely on precise high definition (HD) 3d maps for
navigation. This paper presents the mapping component of an end-to-end system
for crowdsourcing precise 3d maps with semantically meaningful landmarks such
as traffic signs (6 dof pose, shape and size) and traffic lanes (3d splines).
The system uses consumer grade parts, and in particular, relies on a single
front facing camera and a consumer grade GPS. Using real-time sign and lane
triangulation on-device in the vehicle, with offline sign/lane clustering
across multiple journeys and offline Bundle Adjustment across multiple journeys
in the backend, we construct maps with mean absolute accuracy at sign corners
of less than 20 cm from 25 journeys. To the best of our knowledge, this is the
first end-to-end HD mapping pipeline in global coordinates in the automotive
context using cost effective sensors.
|
[
{
"version": "v1",
"created": "Wed, 29 Mar 2017 18:44:11 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Mar 2017 21:28:39 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Dabeer",
"Onkar",
""
],
[
"Gowaikar",
"Radhika",
""
],
[
"Grzechnik",
"Slawomir K.",
""
],
[
"Lakshman",
"Mythreya J.",
""
],
[
"Reitmayr",
"Gerhard",
""
],
[
"Somasundaram",
"Kiran",
""
],
[
"Sukhavasi",
"Ravi Teja",
""
],
[
"Wu",
"Xinzhou",
""
]
] |
new_dataset
| 0.998774 |
1704.00077
|
Hieu Le
|
Hieu Le, Vu Nguyen, Chen-Ping Yu, Dimitris Samaras
|
Geodesic Distance Histogram Feature for Video Segmentation
| null | null |
10.1007/978-3-319-54181-5_18
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a geodesic-distance-based feature that encodes global
information for improved video segmentation algorithms. The feature is a joint
histogram of intensity and geodesic distances, where the geodesic distances are
computed as the shortest paths between superpixels via their boundaries. We
also incorporate adaptive voting weights and spatial pyramid configurations to
include spatial information into the geodesic histogram feature and show that
this further improves results. The feature is generic and can be used as part
of various algorithms. In experiments, we test the geodesic histogram feature
by incorporating it into two existing video segmentation frameworks. This leads
to significantly better performance in 3D video segmentation benchmarks on two
datasets.
|
[
{
"version": "v1",
"created": "Fri, 31 Mar 2017 22:39:32 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Le",
"Hieu",
""
],
[
"Nguyen",
"Vu",
""
],
[
"Yu",
"Chen-Ping",
""
],
[
"Samaras",
"Dimitris",
""
]
] |
new_dataset
| 0.992614 |
1704.00172
|
Manoel Horta Ribeiro
|
Sagar Sen, Manoel Horta Ribeiro, Raquel C. de Melo Minardi, Wagner
Meira Jr., Mari Nigard
|
Portinari: A Data Exploration Tool to Personalize Cervical Cancer
Screening
|
Conference paper published at ICSE 2017 Buenos Aires, at the Software
Engineering in Society Track. 10 pages, 5 figures
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Socio-technical systems play an important role in public health screening
programs to prevent cancer. Cervical cancer incidence has significantly
decreased in countries that developed systems for organized screening engaging
medical practitioners, laboratories and patients. The system automatically
identifies individuals at risk of developing the disease and invites them for a
screening exam or a follow-up exam conducted by medical professionals. A triage
algorithm in the system aims to reduce unnecessary screening exams for
individuals at low-risk while detecting and treating individuals at high-risk.
Despite the general success of screening, the triage algorithm is a
one-size-fits all approach that is not personalized to a patient. This can
easily be observed in historical data from screening exams. Often patients rely
on personal factors to determine that they are either at high risk or not at
risk at all and take action at their own discretion. Can exploring patient
trajectories help hypothesize personal factors leading to their decisions? We
present Portinari, a data exploration tool to query and visualize future
trajectories of patients who have undergone a specific sequence of screening
exams. The web-based tool contains (a) a visual query interface (b) a backend
graph database of events in patients' lives (c) trajectory visualization using
sankey diagrams. We use Portinari to explore diverse trajectories of patients
following the Norwegian triage algorithm. The trajectories demonstrated
variable degrees of adherence to the triage algorithm and allowed
epidemiologists to hypothesize about the possible causes.
|
[
{
"version": "v1",
"created": "Sat, 1 Apr 2017 14:24:21 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Sen",
"Sagar",
""
],
[
"Ribeiro",
"Manoel Horta",
""
],
[
"Minardi",
"Raquel C. de Melo",
""
],
[
"Meira",
"Wagner",
"Jr."
],
[
"Nigard",
"Mari",
""
]
] |
new_dataset
| 0.974666 |
1704.00280
|
Marius Cordts
|
Marius Cordts, Timo Rehfeld, Lukas Schneider, David Pfeiffer, Markus
Enzweiler, Stefan Roth, Marc Pollefeys, Uwe Franke
|
The Stixel world: A medium-level representation of traffic scenes
|
Accepted for publication in Image and Vision Computing
| null |
10.1016/j.imavis.2017.01.009
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent progress in advanced driver assistance systems and the race towards
autonomous vehicles is mainly driven by two factors: (1) increasingly
sophisticated algorithms that interpret the environment around the vehicle and
react accordingly, and (2) the continuous improvements of sensor technology
itself. In terms of cameras, these improvements typically include higher
spatial resolution, which as a consequence requires more data to be processed.
The trend to add multiple cameras to cover the entire surrounding of the
vehicle is not conducive in that matter. At the same time, an increasing number
of special purpose algorithms need access to the sensor input data to correctly
interpret the various complex situations that can occur, particularly in urban
traffic.
By observing those trends, it becomes clear that a key challenge for vision
architectures in intelligent vehicles is to share computational resources. We
believe this challenge should be faced by introducing a representation of the
sensory data that provides compressed and structured access to all relevant
visual content of the scene. The Stixel World discussed in this paper is such a
representation. It is a medium-level model of the environment that is
specifically designed to compress information about obstacles by leveraging the
typical layout of outdoor traffic scenes. It has proven useful for a multitude
of automotive vision applications, including object detection, tracking,
segmentation, and mapping.
In this paper, we summarize the ideas behind the model and generalize it to
take into account multiple dense input streams: the image itself, stereo depth
maps, and semantic class probability maps that can be generated, e.g., by CNNs.
Our generalization is embedded into a novel mathematical formulation for the
Stixel model. We further sketch how the free parameters of the model can be
learned using structured SVMs.
|
[
{
"version": "v1",
"created": "Sun, 2 Apr 2017 10:38:49 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Cordts",
"Marius",
""
],
[
"Rehfeld",
"Timo",
""
],
[
"Schneider",
"Lukas",
""
],
[
"Pfeiffer",
"David",
""
],
[
"Enzweiler",
"Markus",
""
],
[
"Roth",
"Stefan",
""
],
[
"Pollefeys",
"Marc",
""
],
[
"Franke",
"Uwe",
""
]
] |
new_dataset
| 0.990064 |
1704.00316
|
Chinh Hoang
|
Kathie Cameron, and Ch\'inh T. Ho\`ang
|
Solving the clique cover problem on (bull, $C_4$)-free graphs
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give an $O(n^4)$ algorithm to find a minimum clique cover of a (bull,
$C_4$)-free graph, or equivalently, a minimum colouring of a (bull,
$2K_2$)-free graph, where $n$ is the number of vertices of the graphs.
|
[
{
"version": "v1",
"created": "Sun, 2 Apr 2017 15:29:19 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Cameron",
"Kathie",
""
],
[
"Hoàng",
"Chính T.",
""
]
] |
new_dataset
| 0.988882 |
1704.00534
|
Hector Garcia de Marina Dr.
|
Hector Garcia de Marina and Zhiyong Sun and Ming Cao and Brian D.O.
Anderson
|
Controlling a triangular flexible formation of autonomous agents
|
7 pages, accepted in the 20th World Congress of the International
Federation of Automatic Control (IFAC)
| null | null | null |
cs.SY cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In formation control, triangular formations consisting of three autonomous
agents serve as a class of benchmarks that can be used to test and compare the
performances of different controllers. We present an algorithm that combines
the advantages of both position- and distance-based gradient descent control
laws. For example, only two pairs of neighboring agents need to be controlled,
agents can work in their own local frame of coordinates and the orientation of
the formation with respect to a global frame of coordinates is not prescribed.
We first present a novel technique based on adding artificial biases to
neighboring agents' range sensors such that their eventual positions correspond
to a collinear configuration. Right after, a small modification in the bias
terms by introducing a prescribed rotation matrix will allow the control of the
bearing of the neighboring agents.
|
[
{
"version": "v1",
"created": "Mon, 3 Apr 2017 11:27:20 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"de Marina",
"Hector Garcia",
""
],
[
"Sun",
"Zhiyong",
""
],
[
"Cao",
"Ming",
""
],
[
"Anderson",
"Brian D. O.",
""
]
] |
new_dataset
| 0.963028 |
1704.00556
|
Hassan Khosravi
|
Hassan Khosravi, Kendra Cooper, Kirsty Kitto
|
RiPLE: Recommendation in Peer-Learning Environments Based on Knowledge
Gaps and Interests
|
25 pages, 7 figures. The paper is accepted for publication in the
Journal of Educational Data Mining
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Various forms of Peer-Learning Environments are increasingly being used in
post-secondary education, often to help build repositories of student generated
learning objects. However, large classes can result in an extensive repository,
which can make it more challenging for students to search for suitable objects
that both reflect their interests and address their knowledge gaps. Recommender
Systems for Technology Enhanced Learning (RecSysTEL) offer a potential solution
to this problem by providing sophisticated filtering techniques to help
students to find the resources that they need in a timely manner. Here, a new
RecSysTEL for Recommendation in Peer-Learning Environments (RiPLE) is
presented. The approach uses a collaborative filtering algorithm based upon
matrix factorization to create personalized recommendations for individual
students that address their interests and their current knowledge gaps. The
approach is validated using both synthetic and real data sets. The results are
promising, indicating RiPLE is able to provide sensible personalized
recommendations for both regular and cold-start users under reasonable
assumptions about parameters and user behavior.
|
[
{
"version": "v1",
"created": "Mon, 3 Apr 2017 12:59:24 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Khosravi",
"Hassan",
""
],
[
"Cooper",
"Kendra",
""
],
[
"Kitto",
"Kirsty",
""
]
] |
new_dataset
| 0.998374 |
1704.00565
|
Eva Rotenberg
|
Jacob Holm, Eva Rotenberg
|
Dynamic Planar Embeddings of Dynamic Graphs
|
Announced at STACS'15
| null | null | null |
cs.DS cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an algorithm to support the dynamic embedding in the plane of a
dynamic graph. An edge can be inserted across a face between two vertices on
the face boundary (we call such a vertex pair linkable), and edges can be
deleted. The planar embedding can also be changed locally by flipping
components that are connected to the rest of the graph by at most two vertices.
Given vertices $u,v$, linkable$(u,v)$ decides whether $u$ and $v$ are
linkable in the current embedding, and if so, returns a list of suggestions for
the placement of $(u,v)$ in the embedding. For non-linkable vertices $u,v$, we
define a new query, one-flip-linkable$(u,v)$ providing a suggestion for a flip
that will make them linkable if one exists. We support all updates and queries
in O(log$^2 n$) time. Our time bounds match those of Italiano et al. for a
static (flipless) embedding of a dynamic graph.
Our new algorithm is simpler, exploiting that the complement of a spanning
tree of a connected plane graph is a spanning tree of the dual graph. The
primal and dual trees are interpreted as having the same Euler tour, and a main
idea of the new algorithm is an elegant interaction between top trees over the
two trees via their common Euler tour.
|
[
{
"version": "v1",
"created": "Mon, 3 Apr 2017 13:15:59 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Holm",
"Jacob",
""
],
[
"Rotenberg",
"Eva",
""
]
] |
new_dataset
| 0.996255 |
1704.00573
|
Claudio Paliotta
|
Mohammed Maghenem, Dennis W.J. Belleter, Claudio Paliotta, and Kristin
Y. Pettersen
|
Observer Based Path Following for Underactuated Marine Vessels in the
Presence of Ocean Currents: A Local Approach - With proofs
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article a solution to the problem of following a curved path in the
presence of a constant unknown ocean current disturbance is presented. The path
is parametrised by a path variable that is used to propagate a path-tangential
reference frame. The update law for the path variable is chosen such that the
motion of the path-tangential frame ensures that the vessel remains on the
normal of the path-tangential reference frame. As shown in the seminal work
[20] such a parametrisation is only possible locally. A tube is defined in
which the aforementioned parametrisation is valid and the path-following
problem is solved within this tube. The size of the tube is proportional to the
maximum curvature of the path. It is shown that within this tube, the
closed-loop system of the proposed controller, guidance law, and the ocean
current observer provides exponential stability of the path-following error
dynamics. The sway velocity dynamics are analysed taking into account couplings
previously overlooked in the literature, and is shown to remain bounded.
Simulation results are presented.
|
[
{
"version": "v1",
"created": "Fri, 31 Mar 2017 09:38:00 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Maghenem",
"Mohammed",
""
],
[
"Belleter",
"Dennis W. J.",
""
],
[
"Paliotta",
"Claudio",
""
],
[
"Pettersen",
"Kristin Y.",
""
]
] |
new_dataset
| 0.988773 |
1704.00623
|
Jose Flordelis
|
Jose Flordelis, Fredrik Rusek, Fredrik Tufvesson, Erik G. Larsson, and
Ove Edfors
|
Massive MIMO Performance - TDD Versus FDD: What Do Measurements Say?
|
Submitted to IEEE Transactions on Wireless Communications,
31/Mar/2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Downlink beamforming in Massive MIMO either relies on uplink pilot
measurements - exploiting reciprocity and TDD operation, or on the use of a
predetermined grid of beams with user equipments reporting their preferred
beams, mostly in FDD operation. Massive MIMO in its originally conceived form
uses the first strategy, with uplink pilots, whereas there is currently
significant commercial interest in the second, grid-of-beams. It has been
analytically shown that in isotropic scattering (independent Rayleigh fading)
the first approach outperforms the second. Nevertheless there remains
controversy regarding their relative performance in practice. In this
contribution, the performances of these two strategies are compared using
measured channel data at 2.6 GHz.
|
[
{
"version": "v1",
"created": "Mon, 3 Apr 2017 14:44:59 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Flordelis",
"Jose",
""
],
[
"Rusek",
"Fredrik",
""
],
[
"Tufvesson",
"Fredrik",
""
],
[
"Larsson",
"Erik G.",
""
],
[
"Edfors",
"Ove",
""
]
] |
new_dataset
| 0.971177 |
1704.00663
|
Deekshith P K
|
P. K. Deekshith, K. R. Sahasranand
|
Polar Codes over Fading Channels with Power and Delay Constraints
|
6 pages, 6 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The inherent nature of polar codes being channel specific makes it difficult
to use them in a setting where the communication channel changes with time. In
particular, to be able to use polar codes in a wireless scenario, varying
attenuation due to fading needs to be mitigated. To the best of our knowledge,
there has been no comprehensive work in this direction thus far. In this work,
a practical scheme involving channel inversion with the knowledge of the
channel state at the transmitter, is proposed. An additional practical
constraint on the permissible average and peak power is imposed, which in turn
makes the channel equivalent to an additive white Gaussian noise (AWGN) channel
cascaded with an erasure channel. It is shown that the constructed polar code
could be made to achieve the symmetric capacity of this channel. Further, a
means to compute the optimal design rate of the polar code for a given power
constraint is also discussed.
|
[
{
"version": "v1",
"created": "Mon, 3 Apr 2017 16:21:02 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Deekshith",
"P. K.",
""
],
[
"Sahasranand",
"K. R.",
""
]
] |
new_dataset
| 0.999112 |
1704.00715
|
David Poulin
|
Andrew James Ferris, Christoph Hirche and David Poulin
|
Convolutional Polar Codes
|
Subsumes arXiv:1312.4575
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Arikan's Polar codes attracted much attention as the first efficiently
decodable and capacity achieving codes. Furthermore, Polar codes exhibit an
exponentially decreasing block error probability with an asymptotic error
exponent upper bounded by 1/2. Since their discovery, many attempts have been
made to improve the error exponent and the finite block-length performance,
while keeping the bloc-structured kernel. Recently, two of us introduced a new
family of efficiently decodable error-correction codes based on a recently
discovered efficiently-contractible tensor network family in quantum many-body
physics, called branching MERA. These codes, called branching MERA codes,
include Polar codes and also extend them in a non-trivial way by substituting
the bloc-structured kernel by a convolutional structure. Here, we perform an
in-depth study of a particular example that can be thought of as a direct
extension to Arikan's Polar code, which we therefore name Convolutional Polar
codes. We prove that these codes polarize and exponentially suppress the
channel's error probability, with an asymptotic error exponent log_2(3)/2 which
is provably better than for Polar codes under successive cancellation decoding.
We also perform finite block-size numerical simulations which display improved
error-correcting capability with only a minor impact on decoding complexity.
|
[
{
"version": "v1",
"created": "Mon, 3 Apr 2017 17:57:34 GMT"
}
] | 2017-04-04T00:00:00 |
[
[
"Ferris",
"Andrew James",
""
],
[
"Hirche",
"Christoph",
""
],
[
"Poulin",
"David",
""
]
] |
new_dataset
| 0.999728 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.