id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1612.01175
Benjamin Eysenbach
Benjamin Eysenbach, Carl Vondrick, Antonio Torralba
Who is Mistaken?
See project website at: http://people.csail.mit.edu/bce/mistaken/ . (Edit: fixed typos and references)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recognizing when people have false beliefs is crucial for understanding their actions. We introduce the novel problem of identifying when people in abstract scenes have incorrect beliefs. We present a dataset of scenes, each visually depicting an 8-frame story in which a character has a mistaken belief. We then create a representation of characters' beliefs for two tasks in human action understanding: predicting who is mistaken, and when they are mistaken. Experiments suggest that our method for identifying mistaken characters performs better on these tasks than simple baselines. Diagnostics on our model suggest it learns important cues for recognizing mistaken beliefs, such as gaze. We believe models of people's beliefs will have many applications in action understanding, robotics, and healthcare.
[ { "version": "v1", "created": "Sun, 4 Dec 2016 20:45:42 GMT" }, { "version": "v2", "created": "Fri, 31 Mar 2017 16:36:53 GMT" } ]
2017-04-03T00:00:00
[ [ "Eysenbach", "Benjamin", "" ], [ "Vondrick", "Carl", "" ], [ "Torralba", "Antonio", "" ] ]
new_dataset
0.999456
1703.08227
Shu Sun Ms.
Shu Sun, Theodore S. Rappaport
Millimeter Wave MIMO Channel Estimation Based on Adaptive Compressed Sensing
7 pages, 5 figures, in 2017 IEEE International Conference on Communications Workshop (ICCW), Paris, May 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple-input multiple-output (MIMO) systems are well suited for millimeter-wave (mmWave) wireless communications where large antenna arrays can be integrated in small form factors due to tiny wavelengths, thereby providing high array gains while supporting spatial multiplexing, beamforming, or antenna diversity. It has been shown that mmWave channels exhibit sparsity due to the limited number of dominant propagation paths, thus compressed sensing techniques can be leveraged to conduct channel estimation at mmWave frequencies. This paper presents a novel approach of constructing beamforming dictionary matrices for sparse channel estimation using the continuous basis pursuit (CBP) concept, and proposes two novel low-complexity algorithms to exploit channel sparsity for adaptively estimating multipath channel parameters in mmWave channels. We verify the performance of the proposed CBP-based beamforming dictionary and the two algorithms using a simulator built upon a three-dimensional mmWave statistical spatial channel model, NYUSIM, that is based on real-world propagation measurements. Simulation results show that the CBP-based dictionary offers substantially higher estimation accuracy and greater spectral efficiency than the grid-based counterpart introduced by previous researchers, and the algorithms proposed here render better performance but require less computational effort compared with existing algorithms.
[ { "version": "v1", "created": "Thu, 23 Mar 2017 20:36:27 GMT" }, { "version": "v2", "created": "Fri, 31 Mar 2017 14:45:57 GMT" } ]
2017-04-03T00:00:00
[ [ "Sun", "Shu", "" ], [ "Rappaport", "Theodore S.", "" ] ]
new_dataset
0.999287
1703.08232
Shu Sun Ms.
Shu Sun, George R. MacCartney Jr., Theodore S. Rappaport
A Novel Millimeter-Wave Channel Simulator and Applications for 5G Wireless Communications
7 pages, 8 figures, in 2017 IEEE International Conference on Communications (ICC), Paris, May 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents details and applications of a novel channel simulation software named NYUSIM, which can be used to generate realistic temporal and spatial channel responses to support realistic physical- and link-layer simulations and design for fifth-generation (5G) cellular communications. NYUSIM is built upon the statistical spatial channel model for broadband millimeter-wave (mmWave) wireless communication systems developed by researchers at New York University (NYU). The simulator is applicable for a wide range of carrier frequencies (500 MHz to 100 GHz), radio frequency (RF) bandwidths (0 to 800 MHz), antenna beamwidths (7 to 360 degrees for azimuth and 7 to 45 degrees for elevation), and operating scenarios (urban microcell, urban macrocell, and rural macrocell), and also incorporates multiple-input multiple-output (MIMO) antenna arrays at the transmitter and receiver. This paper also provides examples to demonstrate how to use NYUSIM for analyzing MIMO channel conditions and spectral efficiencies, which show that NYUSIM is an alternative and more realistic channel model compared to the 3rd Generation Partnership Project (3GPP) and other channel models for mmWave bands.
[ { "version": "v1", "created": "Thu, 23 Mar 2017 21:06:03 GMT" }, { "version": "v2", "created": "Fri, 31 Mar 2017 14:40:23 GMT" } ]
2017-04-03T00:00:00
[ [ "Sun", "Shu", "" ], [ "MacCartney", "George R.", "Jr." ], [ "Rappaport", "Theodore S.", "" ] ]
new_dataset
0.999528
1703.08239
Shu Sun Ms.
Shu Sun, Hangsong Yan, George R. MacCartney Jr., Theodore S. Rappaport
Millimeter Wave Small-Scale Spatial Statistics in an Urban Microcell Scenario
7 pages, 11 figures, in 2017 IEEE International Conference on Communications (ICC), Paris, May 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents outdoor wideband small-scale spatial fading and autocorrelation measurements and results in the 73 GHz millimeter-wave (mmWave) band conducted in downtown Brooklyn, New York. Both directional and omnidirectional receiver (RX) antennas are studied. Two pairs of transmitter (TX) and RX locations were tested with one line-of-sight (LOS) and one non-line-of-sight (NLOS) environment, where a linear track was employed at each RX to move the antenna in half-wavelength increments. Measured data reveal that the small-scale spatial fading of the received signal voltage amplitude are generally Ricean-distributed for both omnidirectional and directional RX antenna patterns under both LOS and NLOS conditions in most cases, except for the log-normal distribution for the omnidirectional RX antenna pattern in the NLOS environment. Sinusoidal exponential and typical exponential functions are found to model small-scale spatial autocorrelation of the received signal voltage amplitude in LOS and NLOS environments in most cases, respectively. Furthermore, different decorrelation distances were observed for different RX track orientations, i.e., for different directions of motion relative to the TX. Results herein are valuable for characterizing small-scale spatial fading and autocorrelation properties in multiple-input multiple-output (MIMO) systems for fifth-generation (5G) mmWave frequencies.
[ { "version": "v1", "created": "Thu, 23 Mar 2017 21:33:58 GMT" }, { "version": "v2", "created": "Fri, 31 Mar 2017 14:36:52 GMT" } ]
2017-04-03T00:00:00
[ [ "Sun", "Shu", "" ], [ "Yan", "Hangsong", "" ], [ "MacCartney", "George R.", "Jr." ], [ "Rappaport", "Theodore S.", "" ] ]
new_dataset
0.999413
1703.10607
Vinod Kristem
Vinod Kristem, Seun Sangodoyin, C. U. Bas, Martin Kaeske, Juho Lee, Christian Schneider, Gerd Sommerkorn, J. Zhang, Reiner S. Thomae, Andreas F. Molisch
3D MIMO Outdoor-to-Indoor Propagation Channel Measurement
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
3-dimensional Multiple-Input Multiple-Output (3D MIMO) systems have received great interest recently because of the spatial diversity advantage and capability for full-dimensional beamforming, making them promising candidates for practical realization of massive MIMO. In this paper, we present a low-cost test equipment (channel sounder) and post-processing algorithms suitable for investigating 3D MIMO channels, as well as the results from a measurement campaign for obtaining elevation and azimuth characteristics in an outdoor-to-indoor (O2I) environment. Due to limitations in available antenna switches, our channel sounder consists of a hybrid switched/virtual cylindrical array with effectively 480 antenna elements at the base station (BS). The virtual setup increased the overall MIMO measurement duration, thereby introducing phase drift errors in the measurements. Using a reference antenna measurements, we estimate and correct for the phase errors during post-processing. We provide the elevation and azimuth angular spreads, for the measurements done in an urban macro-cellular (UMa) and urban micro-cellular (UMi) environments, and study their dependence on the UE height. Based on the measurements done with UE placed on different floors, we study the feasibility of separating users in the elevation domain. The measured channel impulse responses are also used to study the channel hardening aspects of Massive MIMO and the optimality of Maximum Ratio Combining (MRC) receiver.
[ { "version": "v1", "created": "Thu, 30 Mar 2017 06:53:28 GMT" } ]
2017-04-03T00:00:00
[ [ "Kristem", "Vinod", "" ], [ "Sangodoyin", "Seun", "" ], [ "Bas", "C. U.", "" ], [ "Kaeske", "Martin", "" ], [ "Lee", "Juho", "" ], [ "Schneider", "Christian", "" ], [ "Sommerkorn", "Gerd", "" ], [ "Zhang", "J.", "" ], [ "Thomae", "Reiner S.", "" ], [ "Molisch", "Andreas F.", "" ] ]
new_dataset
0.997694
1703.10633
Hung Le
Glencora Borradaile and Hung Le
Light spanners for bounded treewidth graphs imply light spanners for $H$-minor-free graphs
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Grigni and Hung~\cite{GH12} conjectured that H-minor-free graphs have $(1+\epsilon)$-spanners that are light, that is, of weight $g(|H|,\epsilon)$ times the weight of the minimum spanning tree for some function $g$. This conjecture implies the {\em efficient} polynomial-time approximation scheme (PTAS) of the traveling salesperson problem in $H$-minor free graphs; that is, a PTAS whose running time is of the form $2^{f(\epsilon)}n^{O(1)}$ for some function $f$. The state of the art PTAS for TSP in H-minor-free-graphs has running time $n^{1/\epsilon^c}$. We take a further step toward proving this conjecture by showing that if the bounded treewidth graphs have light greedy spanners, then the conjecture is true. We also prove that the greedy spanner of a bounded pathwidth graph is light and discuss the possibility of extending our proof to bounded treewidth graphs.
[ { "version": "v1", "created": "Thu, 30 Mar 2017 18:42:52 GMT" } ]
2017-04-03T00:00:00
[ [ "Borradaile", "Glencora", "" ], [ "Le", "Hung", "" ] ]
new_dataset
0.992418
1703.10661
Md Shopon
Mithun Biswas, Rafiqul Islam, Gautam Kumar Shom, Md Shopon, Nabeel Mohammed, Sifat Momen, Md Anowarul Abedin
BanglaLekha-Isolated: A Comprehensive Bangla Handwritten Character Dataset
Bangla Handwriting Dataset, OCR
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bangla handwriting recognition is becoming a very important issue nowadays. It is potentially a very important task specially for Bangla speaking population of Bangladesh and West Bengal. By keeping that in our mind we are introducing a comprehensive Bangla handwritten character dataset named BanglaLekha-Isolated. This dataset contains Bangla handwritten numerals, basic characters and compound characters. This dataset was collected from multiple geographical location within Bangladesh and includes sample collected from a variety of aged groups. This dataset can also be used for other classification problems i.e: gender, age, district. This is the largest dataset on Bangla handwritten characters yet.
[ { "version": "v1", "created": "Wed, 22 Feb 2017 07:57:14 GMT" } ]
2017-04-03T00:00:00
[ [ "Biswas", "Mithun", "" ], [ "Islam", "Rafiqul", "" ], [ "Shom", "Gautam Kumar", "" ], [ "Shopon", "Md", "" ], [ "Mohammed", "Nabeel", "" ], [ "Momen", "Sifat", "" ], [ "Abedin", "Md Anowarul", "" ] ]
new_dataset
0.999877
1703.10719
Muhammad Shakir
Muhammad Z. Shakir, Muhammad Ismail, Xianbin Wang, Khalid A. Qaraqe, and Erchin Serpedin
From D2D to Ds2D: Prolonging the Battery Life of Mobile Devices via Ds2D Communications
Accepted for publication in IEEE Wireless Communications, Mar 21, 2017
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Emerging device centric systems (DCS) such as device-to-device (D2D) communications are considered as a standard part of future mobile networks, where operators/consumers involve the devices in direct communication to improve the cellular system throughput, latency, fairness, and energy efficiency. However, battery life of mobile devices involved in such communications is crucial for 5G smartphone users to explore the emerging applications in DCS. It is anticipated that the owners of 5G-enabled smartphones use their devices more extensively to talk, text, email, and surf the Web more often than do customers with 4G smartphones or traditional handsets, which puts a significantly higher demand on the battery life. Smartphones are currently equipped with multiple radio interfaces that enable them to access different types of wireless networks including LTE-direct and Wi-Fi-direct, besides cellular networks. Such a capability is not well explored within the context of DCS. This article proposes a new scheme to support the emerging features in DCS where a D2D-enabled mobile device (sink device or a file/content requester) aggregates the radio resources of multiple mobile devices (source devices or file/content providers) via its multiple radio interfaces such that the scheme is referred to as devices-to-device (Ds2D) communications. Ds2D communication scheme ensures an optimal packet split among the source mobile devices to improve the file/content transfer latency (FTL), energy efficiency, and battery life. Simulation results demonstrate that the proposed optimal packet split scheme among multiple source devices participating in Ds2D communication scheme guarantees an improvement in mobile battery life over wide range of data rate levels in comparison with the random packet split strategy and traditional D2D communication paradigm between the sink and source mobile devices.
[ { "version": "v1", "created": "Fri, 31 Mar 2017 00:23:05 GMT" } ]
2017-04-03T00:00:00
[ [ "Shakir", "Muhammad Z.", "" ], [ "Ismail", "Muhammad", "" ], [ "Wang", "Xianbin", "" ], [ "Qaraqe", "Khalid A.", "" ], [ "Serpedin", "Erchin", "" ] ]
new_dataset
0.998449
1703.10758
Maosheng Xiong
Maosheng Xiong
On cyclic codes of composite length and the minimal distance
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an interesting paper Professor Cunsheng Ding provided three constructions of cyclic codes of length being a product of two primes. Numerical data shows that many codes from these constructions are best cyclic codes of the same length and dimension over the same finite field. However, not much is known about these codes. In this paper we explain some of the mysteries of the numerical data by developing a general method on cyclic codes of composite length and on estimating the minimal distance. Inspired by the new method, we also provide a general construction of cyclic codes of composite length. Numerical data shows that it produces many best cyclic codes as well. Finally, we point out how these cyclic codes can be used to construct convolutional codes with large free distance.
[ { "version": "v1", "created": "Fri, 31 Mar 2017 05:18:16 GMT" } ]
2017-04-03T00:00:00
[ [ "Xiong", "Maosheng", "" ] ]
new_dataset
0.998798
1703.10840
Georgios Stamoulis
Steven Kelk, Georgios Stamoulis, Taoyang Wu
Treewidth distance on phylogenetic trees
29 pages, 12 figures
null
null
null
cs.DM cs.DS q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we study the treewidth of the \emph{display graph}, an auxiliary graph structure obtained from the fusion of phylogenetic (i.e., evolutionary) trees at their leaves. Earlier work has shown that the treewidth of the display graph is bounded if the trees are in some formal sense topologically similar. Here we further expand upon this relationship. We analyse a number of reduction rules which are commonly used in the phylogenetics literature to obtain fixed parameter tractable algorithms. In some cases (the \emph{subtree} reduction) the reduction rules behave similarly with respect to treewidth, while others (the \emph{cluster} reduction) behave very differently, and the behaviour of the \emph{chain reduction} is particularly intriguing because of its link with graph separators and forbidden minors. We also show that the gap between treewidth and Tree Bisection and Reconnect (TBR) distance can be infinitely large, and that unlike, for example, planar graphs the treewidth of the display graph can be as much as linear in its number of vertices. On a slightly different note we show that if a display graph is formed from the fusion of a phylogenetic network and a tree, rather than from two trees, the treewidth of the display graph is bounded whenever the tree can be topologically embedded ("displayed") within the network. This opens the door to the formulation of the display problem in Monadic Second Order Logic (MSOL). A number of other auxiliary results are given. We conclude with a discussion and list a number of open problems.
[ { "version": "v1", "created": "Fri, 31 Mar 2017 10:33:24 GMT" } ]
2017-04-03T00:00:00
[ [ "Kelk", "Steven", "" ], [ "Stamoulis", "Georgios", "" ], [ "Wu", "Taoyang", "" ] ]
new_dataset
0.961893
1703.10995
Nikolaos Miridakis
Nikolaos I. Miridakis, Theodoros A. Tsiftsis, Dimitrios D. Vergados, Angelos Michalas
All Cognitive MIMO: A New Multiuser Detection Approach with Different Priorities
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new detection scheme for multiuser multiple-input multiple-output (MIMO) systems is analytically presented. In particular, the transmitting users are being categorized in two distinct priority service groups, while they communicate directly with a multi-antenna receiver. The linear zero-forcing scheme is applied in two consecutive detection stages upon the signal reception. In the first stage, the signals of one service group are detected, followed by the second stage including the corresponding detection of the remaining signals. An appropriate switching scheme based on specific transmission quality requirements is utilized prior to the detection so as to allocate the signals of a given service group to the suitable detection stage. The objective is the enhancement of the reception quality for both service groups. The proposed approach can be implemented directly in cognitive radio communication assigning the secondary users to the appropriate service group. The exact outage probability of the considered system is derived in closed form. The special case of massive MIMO is further studied yielding some useful engineering outcomes; the effective channel coherence time and a certain optimality condition defining both the transmission quality and effective number of independent transmissions.
[ { "version": "v1", "created": "Fri, 31 Mar 2017 17:33:30 GMT" } ]
2017-04-03T00:00:00
[ [ "Miridakis", "Nikolaos I.", "" ], [ "Tsiftsis", "Theodoros A.", "" ], [ "Vergados", "Dimitrios D.", "" ], [ "Michalas", "Angelos", "" ] ]
new_dataset
0.991628
1610.05834
Guy Satat
Guy Satat, Matthew Tancik and Ramesh Raskar
Lensless Imaging with Compressive Ultrafast Sensing
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Lensless imaging is an important and challenging problem. One notable solution to lensless imaging is a single pixel camera which benefits from ideas central to compressive sampling. However, traditional single pixel cameras require many illumination patterns which result in a long acquisition process. Here we present a method for lensless imaging based on compressive ultrafast sensing. Each sensor acquisition is encoded with a different illumination pattern and produces a time series where time is a function of the photon's origin in the scene. Currently available hardware with picosecond time resolution enables time tagging photons as they arrive to an omnidirectional sensor. This allows lensless imaging with significantly fewer patterns compared to regular single pixel imaging. To that end, we develop a framework for designing lensless imaging systems that use ultrafast detectors. We provide an algorithm for ideal sensor placement and an algorithm for optimized active illumination patterns. We show that efficient lensless imaging is possible with ultrafast measurement and compressive sensing. This paves the way for novel imaging architectures and remote sensing in extreme situations where imaging with a lens is not possible.
[ { "version": "v1", "created": "Wed, 19 Oct 2016 01:08:55 GMT" }, { "version": "v2", "created": "Thu, 30 Mar 2017 02:04:49 GMT" } ]
2017-03-31T00:00:00
[ [ "Satat", "Guy", "" ], [ "Tancik", "Matthew", "" ], [ "Raskar", "Ramesh", "" ] ]
new_dataset
0.995776
1703.08902
Danilo Dominguez Perez
Danilo Dominguez Perez and Wei Le
Generating Predicate Callback Summaries for the Android Framework
11 pages
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the challenges of analyzing, testing and debugging Android apps is that the potential execution orders of callbacks are missing from the apps' source code. However, bugs, vulnerabilities and refactoring transformations have been found to be related to callback sequences. Existing work on control flow analysis of Android apps have mainly focused on analyzing GUI events. GUI events, although being a key part of determining control flow of Android apps, do not offer a complete picture. Our observation is that orthogonal to GUI events, the Android API calls also play an important role in determining the order of callbacks. In the past, such control flow information has been modeled manually. This paper presents a complementary solution of constructing program paths for Android apps. We proposed a specification technique, called Predicate Callback Summary (PCS), that represents the callback control flow information (including callback sequences as well as the conditions under which the callbacks are invoked) in Android API methods and developed static analysis techniques to automatically compute and apply such summaries to construct apps' callback sequences. Our experiments show that by applying PCSs, we are able to construct Android apps' control flow graphs, including inter-callback relations, and also to detect infeasible paths involving multiple callbacks. Such control flow information can help program analysis and testing tools to report more precise results. Our detailed experimental data is available at: http://goo.gl/NBPrKs
[ { "version": "v1", "created": "Mon, 27 Mar 2017 02:23:21 GMT" }, { "version": "v2", "created": "Tue, 28 Mar 2017 01:42:52 GMT" }, { "version": "v3", "created": "Wed, 29 Mar 2017 21:41:32 GMT" } ]
2017-03-31T00:00:00
[ [ "Perez", "Danilo Dominguez", "" ], [ "Le", "Wei", "" ] ]
new_dataset
0.983022
1703.10222
Michele Tucci
Stefano Riverso, Michele Tucci, Juan C. Vasquez, Josep M. Guerrero, Giancarlo Ferrari-Trecate
Plug-and-play and coordinated control for bus-connected AC islanded microgrids
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a distributed control architecture for voltage and frequency stabilization in AC islanded microgrids. In the primary control layer, each generation unit is equipped with a local controller acting on the corresponding voltage-source converter. Following the plug-and-play design approach previously proposed by some of the authors, whenever the addition/removal of a distributed generation unit is required, feasibility of the operation is automatically checked by designing local controllers through convex optimization. The update of the voltage-control layer, when units plug -in/-out, is therefore automatized and stability of the microgrid is always preserved. Moreover, local control design is based only on the knowledge of parameters of power lines and it does not require to store a global microgrid model. In this work, we focus on bus-connected microgrid topologies and enhance the primary plug-and-play layer with local virtual impedance loops and secondary coordinated controllers ensuring bus voltage tracking and reactive power sharing. In particular, the secondary control architecture is distributed, hence mirroring the modularity of the primary control layer. We validate primary and secondary controllers by performing experiments with balanced, unbalanced and nonlinear loads, on a setup composed of three bus-connected distributed generation units. Most importantly, the stability of the microgrid after the addition/removal of distributed generation units is assessed. Overall, the experimental results show the feasibility of the proposed modular control design framework, where generation units can be added/removed on the fly, thus enabling the deployment of virtual power plants that can be resized over time.
[ { "version": "v1", "created": "Wed, 29 Mar 2017 20:00:29 GMT" } ]
2017-03-31T00:00:00
[ [ "Riverso", "Stefano", "" ], [ "Tucci", "Michele", "" ], [ "Vasquez", "Juan C.", "" ], [ "Guerrero", "Josep M.", "" ], [ "Ferrari-Trecate", "Giancarlo", "" ] ]
new_dataset
0.99767
1703.10304
Lei Fan
Lei Fan, Ziyu Pan, Long Chen and Kai Huang
Planecell: Representing the 3D Space with Planes
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reconstruction based on the stereo camera has received considerable attention recently, but two particular challenges still remain. The first concerns the need to aggregate similar pixels in an effective approach, and the second is to maintain as much of the available information as possible while ensuring sufficient accuracy. To overcome these issues, we propose a new 3D representation method, namely, planecell, that extracts planarity from the depth-assisted image segmentation and then projects these depth planes into the 3D world. An energy function formulated from Conditional Random Field that generalizes the planar relationships is maximized to merge coplanar segments. We evaluate our method with a variety of reconstruction baselines on both KITTI and Middlebury datasets, and the results indicate the superiorities compared to other 3D space representation methods in accuracy, memory requirements and further applications.
[ { "version": "v1", "created": "Thu, 30 Mar 2017 03:58:05 GMT" } ]
2017-03-31T00:00:00
[ [ "Fan", "Lei", "" ], [ "Pan", "Ziyu", "" ], [ "Chen", "Long", "" ], [ "Huang", "Kai", "" ] ]
new_dataset
0.999447
1703.10405
Mengqi Peng
Mengqi Peng, Jun Xing, Li-Yi Wei
Autocomplete 3D Sculpting
10 pages
null
null
null
cs.GR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Digital sculpting is a popular means to create 3D models but remains a challenging task for many users. This can be alleviated by recent advances in data-driven and procedural modeling, albeit bounded by the underlying data and procedures. We propose a 3D sculpting system that assists users in freely creating models without predefined scope. With a brushing interface similar to common sculpting tools, our system silently records and analyzes users' workflows, and predicts what they might or should do in the future to reduce input labor or enhance output quality. Users can accept, ignore, or modify the suggestions and thus maintain full control and individual style. They can also explicitly select and clone past workflows over output model regions. Our key idea is to consider how a model is authored via dynamic workflows in addition to what it is shaped in static geometry, for more accurate analysis of user intentions and more general synthesis of shape structures. The workflows contain potential repetitions for analysis and synthesis, including user inputs (e.g. pen strokes on a pressure sensing tablet), model outputs (e.g. extrusions on an object surface), and camera viewpoints. We evaluate our method via user feedbacks and authored models.
[ { "version": "v1", "created": "Thu, 30 Mar 2017 11:06:02 GMT" } ]
2017-03-31T00:00:00
[ [ "Peng", "Mengqi", "" ], [ "Xing", "Jun", "" ], [ "Wei", "Li-Yi", "" ] ]
new_dataset
0.989914
1703.10501
Grigorios Kalliatakis M.A.
Grigorios Kalliatakis, Shoaib Ehsan, and Klaus D. McDonald-Maier
A Paradigm Shift: Detecting Human Rights Violations Through Web Images
Position paper, 8 pages, 3 figures
null
null
null
cs.CV cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The growing presence of devices carrying digital cameras, such as mobile phones and tablets, combined with ever improving internet networks have enabled ordinary citizens, victims of human rights abuse, and participants in armed conflicts, protests, and disaster situations to capture and share via social media networks images and videos of specific events. This paper discusses the potential of images in human rights context including the opportunities and challenges they present. This study demonstrates that real-world images have the capacity to contribute complementary data to operational human rights monitoring efforts when combined with novel computer vision approaches. The analysis is concluded by arguing that if images are to be used effectively to detect and identify human rights violations by rights advocates, greater attention to gathering task-specific visual concepts from large-scale web images is required.
[ { "version": "v1", "created": "Thu, 30 Mar 2017 14:53:55 GMT" } ]
2017-03-31T00:00:00
[ [ "Kalliatakis", "Grigorios", "" ], [ "Ehsan", "Shoaib", "" ], [ "McDonald-Maier", "Klaus D.", "" ] ]
new_dataset
0.955731
1703.10571
Alex Ter-Sarkisov
Aram Ter-Sarkisov and Robert Ross and John Kelleher
Bootstrapping Labelled Dataset Construction for Cow Tracking and Behavior Analysis
null
null
null
null
cs.CV cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a new approach to the long-term tracking of an object in a challenging environment. The object is a cow and the environment is an enclosure in a cowshed. Some of the key challenges in this domain are a cluttered background, low contrast and high similarity between moving objects which greatly reduces the efficiency of most existing approaches, including those based on background subtraction. Our approach is split into object localization, instance segmentation, learning and tracking stages. Our solution is compared to a range of semi-supervised object tracking algorithms and we show that the performance is strong and well suited to subsequent analysis. We present our solution as a first step towards broader tracking and behavior monitoring for cows in precision agriculture with the ultimate objective of early detection of lameness.
[ { "version": "v1", "created": "Thu, 30 Mar 2017 17:09:39 GMT" } ]
2017-03-31T00:00:00
[ [ "Ter-Sarkisov", "Aram", "" ], [ "Ross", "Robert", "" ], [ "Kelleher", "John", "" ] ]
new_dataset
0.982328
1510.03726
Simone Martini
Simone Martini
Several types of types in programming languages
History and Philosophy of Computing, HAPOC 2015. To appear in LNCS
History and Philosophy of Computing, HAPOC 2015, IFIP Advances in Information and Communication Technology 487, 216-227, Springer 2016
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Types are an important part of any modern programming language, but we often forget that the concept of type we understand nowadays is not the same it was perceived in the sixties. Moreover, we conflate the concept of "type" in programming languages with the concept of the same name in mathematical logic, an identification that is only the result of the convergence of two different paths, which started apart with different aims. The paper will present several remarks (some historical, some of more conceptual character) on the subject, as a basis for a further investigation. The thesis we will argue is that there are three different characters at play in programming languages, all of them now called types: the technical concept used in language design to guide implementation; the general abstraction mechanism used as a modelling tool; the classifying tool inherited from mathematical logic. We will suggest three possible dates ad quem for their presence in the programming language literature, suggesting that the emergence of the concept of type in computer science is relatively independent from the logical tradition, until the Curry-Howard isomorphism will make an explicit bridge between them.
[ { "version": "v1", "created": "Tue, 13 Oct 2015 15:05:47 GMT" }, { "version": "v2", "created": "Thu, 16 Jun 2016 09:51:13 GMT" } ]
2017-03-30T00:00:00
[ [ "Martini", "Simone", "" ] ]
new_dataset
0.9761
1612.06209
Stephan Sigg
Le Ngu Nguyen and Stephan Sigg
Personalized Image-based User Authentication using Wearable Cameras
null
null
null
null
cs.CR cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Personal devices (e.g. laptops, tablets, and mobile phones) are conventional in daily life and have the ability to store users' private data. The security problems related to these appliances have become a primary concern for both users and researchers. In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provisional image-based passwords which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before a clustering procedure is applied to discard repetitive scenes. The whole process aims to retain memorable images to form the authentication challenges. We integrate eye tracking data to select informative sequences of video frames and suggest a blurriness-based method if an eye-facing camera is not available. To evaluate our system, we perform experiments in different settings including object-interaction activities and traveling contexts. Even though our mechanism produces variable graphical passwords, the log-in effort for the user is comparable with approaches based on static challenges. We verified the authentication challenges in the presence of a random and an informed attacker who is familiar with the environment and observed that the time required and the number of attempts are significantly higher than for the legitimate user, making it possible to detect attacks on the authentication system.
[ { "version": "v1", "created": "Mon, 19 Dec 2016 14:50:27 GMT" }, { "version": "v2", "created": "Wed, 29 Mar 2017 10:39:39 GMT" } ]
2017-03-30T00:00:00
[ [ "Nguyen", "Le Ngu", "" ], [ "Sigg", "Stephan", "" ] ]
new_dataset
0.997663
1701.02388
Gabriel Murray
Gabriel Murray
Stoic Ethics for Artificial Agents
Final accepted version submitted to Canadian A.I. 2017 conference
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a position paper advocating the notion that Stoic philosophy and ethics can inform the development of ethical A.I. systems. This is in sharp contrast to most work on building ethical A.I., which has focused on Utilitarian or Deontological ethical theories. We relate ethical A.I. to several core Stoic notions, including the dichotomy of control, the four cardinal virtues, the ideal Sage, Stoic practices, and Stoic perspectives on emotion or affect. More generally, we put forward an ethical view of A.I. that focuses more on internal states of the artificial agent rather than on external actions of the agent. We provide examples relating to near-term A.I. systems as well as hypothetical superintelligent agents.
[ { "version": "v1", "created": "Mon, 9 Jan 2017 23:25:43 GMT" }, { "version": "v2", "created": "Tue, 28 Mar 2017 23:59:25 GMT" } ]
2017-03-30T00:00:00
[ [ "Murray", "Gabriel", "" ] ]
new_dataset
0.96103
1703.03613
Luca Caltagirone
Luca Caltagirone, Samuel Scheidegger, Lennart Svensson, Mattias Wahde
Fast LIDAR-based Road Detection Using Fully Convolutional Neural Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, a deep learning approach has been developed to carry out road detection using only LIDAR data. Starting from an unstructured point cloud, top-view images encoding several basic statistics such as mean elevation and density are generated. By considering a top-view representation, road detection is reduced to a single-scale problem that can be addressed with a simple and fast fully convolutional neural network (FCN). The FCN is specifically designed for the task of pixel-wise semantic segmentation by combining a large receptive field with high-resolution feature maps. The proposed system achieved excellent performance and it is among the top-performing algorithms on the KITTI road benchmark. Its fast inference makes it particularly suitable for real-time applications.
[ { "version": "v1", "created": "Fri, 10 Mar 2017 10:26:24 GMT" }, { "version": "v2", "created": "Wed, 29 Mar 2017 07:30:07 GMT" } ]
2017-03-30T00:00:00
[ [ "Caltagirone", "Luca", "" ], [ "Scheidegger", "Samuel", "" ], [ "Svensson", "Lennart", "" ], [ "Wahde", "Mattias", "" ] ]
new_dataset
0.994821
1703.08561
Andrew Best
Andrew Best and Sahil Narang and Daniel Barber and Dinesh Manocha
AutonoVi: Autonomous Vehicle Planning with Dynamic Maneuvers and Traffic Constraints
9 pages, 6 figures
null
null
null
cs.RO cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present AutonoVi:, a novel algorithm for autonomous vehicle navigation that supports dynamic maneuvers and satisfies traffic constraints and norms. Our approach is based on optimization-based maneuver planning that supports dynamic lane-changes, swerving, and braking in all traffic scenarios and guides the vehicle to its goal position. We take into account various traffic constraints, including collision avoidance with other vehicles, pedestrians, and cyclists using control velocity obstacles. We use a data-driven approach to model the vehicle dynamics for control and collision avoidance. Furthermore, our trajectory computation algorithm takes into account traffic rules and behaviors, such as stopping at intersections and stoplights, based on an arc-spline representation. We have evaluated our algorithm in a simulated environment and tested its interactive performance in urban and highway driving scenarios with tens of vehicles, pedestrians, and cyclists. These scenarios include jaywalking pedestrians, sudden stops from high speeds, safely passing cyclists, a vehicle suddenly swerving into the roadway, and high-density traffic where the vehicle must change lanes to progress more effectively.
[ { "version": "v1", "created": "Fri, 24 Mar 2017 18:21:16 GMT" }, { "version": "v2", "created": "Wed, 29 Mar 2017 17:15:55 GMT" } ]
2017-03-30T00:00:00
[ [ "Best", "Andrew", "" ], [ "Narang", "Sahil", "" ], [ "Barber", "Daniel", "" ], [ "Manocha", "Dinesh", "" ] ]
new_dataset
0.999127
1703.08981
Xiong Zhang
Xuanhua Shi and Xiong Zhang and Ligang He and Hai Jin and Zhixiang Ke and Song Wu
MURS: Mitigating Memory Pressure in Service-oriented Data Processing Systems
9 pages, 7 figures
null
null
null
cs.DC
http://creativecommons.org/publicdomain/zero/1.0/
Although a data processing system often works as a batch processing system, many enterprises deploy such a system as a service, which we call the service-oriented data processing system. It has been shown that in-memory data processing systems suffer from serious memory pressure. The situation becomes even worse for the service-oriented data processing systems due to various reasons. For example, in a service-oriented system, multiple submitted tasks are launched at the same time and executed in the same context in the resources, comparing with the batch processing mode where the tasks are processed one by one. Therefore, the memory pressure will affect all submitted tasks, including the tasks that only incur the light memory pressure when they are run alone. In this paper, we find that the reason why memory pressure arises is because the running tasks produce massive long-living data objects in the limited memory space. Our studies further reveal that the long-living data objects are generated by the API functions that are invoked by the in-memory processing frameworks. Based on these findings, we propose a method to classify the API functions based on the memory usage rate. Further, we design a scheduler called MURS to mitigate the memory pressure. We implement MURS in Spark and conduct the experiments to evaluate the performance of MURS. The results show that when comparing to Spark, MURS can 1) decrease the execution time of the submitted jobs by up to 65.8\%, 2) mitigate the memory pressure in the server by decreasing the garbage collection time by up to 81\%, and 3) reduce the data spilling, and hence disk I/O, by approximately 90\%.
[ { "version": "v1", "created": "Mon, 27 Mar 2017 09:23:52 GMT" }, { "version": "v2", "created": "Wed, 29 Mar 2017 11:28:43 GMT" } ]
2017-03-30T00:00:00
[ [ "Shi", "Xuanhua", "" ], [ "Zhang", "Xiong", "" ], [ "He", "Ligang", "" ], [ "Jin", "Hai", "" ], [ "Ke", "Zhixiang", "" ], [ "Wu", "Song", "" ] ]
new_dataset
0.970883
1703.09774
Peter Sheridan Dodds
Peter Sheridan Dodds and Christopher M. Danforth
Measuring the happiness of large-scale written expression: Songs, Blogs, and Presidents
13 pages, 11 figures, 3 tables
Journal of Happiness Studies, 11(4), 441-456, 2010 (published online July 20, 2009)
10.1007/s10902-009-9150-9
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The importance of quantifying the nature and intensity of emotional states at the level of populations is evident: we would like to know how, when, and why individuals feel as they do if we wish, for example, to better construct public policy, build more successful organizations, and, from a scientific perspective, more fully understand economic and social phenomena. Here, by incorporating direct human assessment of words, we quantify happiness levels on a continuous scale for a diverse set of large-scale texts: song titles and lyrics, weblogs, and State of the Union addresses. Our method is transparent, improvable, capable of rapidly processing Web-scale texts, and moves beyond approaches based on coarse categorization. Among a number of observations, we find that the happiness of song lyrics trends downward from the 1960's to the mid 1990's while remaining stable within genres, and that the happiness of blogs has steadily increased from 2005 to 2009, exhibiting a striking rise and fall with blogger age and distance from the equator.
[ { "version": "v1", "created": "Mon, 6 Mar 2017 15:44:13 GMT" } ]
2017-03-30T00:00:00
[ [ "Dodds", "Peter Sheridan", "" ], [ "Danforth", "Christopher M.", "" ] ]
new_dataset
0.994273
1505.05772
Bernardo Andres Hernandez Vicente
Bernardo Hernandez (1) and Paul Trodden (2) ((1) PhD student at the Department of Automatic Control and Systems Engineering, The University of Sheffield, (2) Department of Automatic Control and Systems Engineering, The University of Sheffield)
Persistently Exciting Tube MPC
Accepted for presentation at the American Control Conference 2016 (Boston, MA)
null
10.1109/ACC.2016.7525037
null
cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new approach to deal with the dual problem of system identification and regulation. The main feature consists of breaking the control input to the system into a regulator part and a persistently exciting part. The former is used to regulate the plant using a robust MPC formulation, in which the latter is treated as a bounded additive disturbance. The identification process is executed by a simple recursive least squares algorithm. In order to guarantee sufficient excitation for the identification, an additional non-convex constraint is enforced over the persistently exciting part.
[ { "version": "v1", "created": "Thu, 21 May 2015 15:41:09 GMT" }, { "version": "v2", "created": "Mon, 27 Mar 2017 14:44:24 GMT" } ]
2017-03-29T00:00:00
[ [ "Hernandez", "Bernardo", "" ], [ "Trodden", "Paul", "" ] ]
new_dataset
0.953841
1612.01860
David Ryan
David Ryan
An algorithm to assign musical prime commas to every prime number and construct a universal and compact free Just Intonation musical notation
This pre-print is a fifth draft, 28th March 2017. It incorporates an updated algorithm KG2 from its author, an updated 3-way comparison between DR, SAG, KG2 algorithms, some extra information about higher Pythagorean integers, functions 3EPO and CSPO, and normalisation of comma pumps. Any feedback is welcome, the author's contact details are listed at the end of the paper
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Musical frequencies in Just Intonation are comprised of rational numbers. The structure of rational numbers is determined by prime factorisations. Just Intonation frequencies can be split into two components. The larger component uses only integer powers of the first two primes, 2 and 3. The smaller component decomposes into a series of microtonal adjustments, one for each prime number 5 and above present in the original frequency. The larger 3-limit component can be notated using scientific pitch notation modified to use Pythagorean tuning. The microtonal adjustments can be notated using rational commas which are built up from prime commas. This gives a notation system for the whole of free-JI, called Rational Comma Notation. RCN is compact since all microtonal adjustments can be represented by a single notational unit based on a rational number. RCN has different versions depending on the choice of algorithm to assign a prime comma to each prime number. Two existing algorithms SAG and KG2 are found in the literature. A novel algorithm DR is developed based on discussion of mathematical and musical criteria for algorithm design. Results for DR are presented for primes below 1400. Some observations are made about these results and their applications, including shorthand notation and pitch class lattices. Results for DR are compared with those for SAG and KG2. Translation is possible between any two free-JI notations and any two versions of RCN since they all represent the same underlying set of rational numbers.
[ { "version": "v1", "created": "Mon, 5 Dec 2016 12:48:03 GMT" }, { "version": "v2", "created": "Wed, 7 Dec 2016 14:29:20 GMT" }, { "version": "v3", "created": "Fri, 27 Jan 2017 17:05:31 GMT" }, { "version": "v4", "created": "Tue, 31 Jan 2017 17:33:34 GMT" }, { "version": "v5", "created": "Tue, 28 Mar 2017 14:57:07 GMT" } ]
2017-03-29T00:00:00
[ [ "Ryan", "David", "" ] ]
new_dataset
0.983513
1702.06858
Hugo Gimbert
Mikolaj Boja\'nczyk, Hugo Gimbert (LaBRI), Edon Kelmendi (LaBRI)
Emptiness of zero automata is decidable
null
null
null
null
cs.FL cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Zero automata are a probabilistic extension of parity automata on infinite trees. The satisfiability of a certain probabilistic variant of mso, called tmso + zero, reduces to the emptiness problem for zero automata. We introduce a variant of zero automata called nonzero automata. We prove that for every zero automaton there is an equivalent nonzero automaton of quadratic size and the emptiness problem of nonzero automata is decidable and both in NP and in coNP. These results imply that tmso + zero has decidable satisfiability.
[ { "version": "v1", "created": "Wed, 22 Feb 2017 15:39:12 GMT" }, { "version": "v2", "created": "Tue, 28 Mar 2017 08:07:06 GMT" } ]
2017-03-29T00:00:00
[ [ "Bojańczyk", "Mikolaj", "", "LaBRI" ], [ "Gimbert", "Hugo", "", "LaBRI" ], [ "Kelmendi", "Edon", "", "LaBRI" ] ]
new_dataset
0.989367
1703.07475
Chunhui Liu
Chunhui Liu, and Yueyu Hu, and Yanghao Li, and Sijie Song, and Jiaying Liu
PKU-MMD: A Large Scale Benchmark for Continuous Multi-Modal Human Action Understanding
10 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite the fact that many 3D human activity benchmarks being proposed, most existing action datasets focus on the action recognition tasks for the segmented videos. There is a lack of standard large-scale benchmarks, especially for current popular data-hungry deep learning based methods. In this paper, we introduce a new large scale benchmark (PKU-MMD) for continuous multi-modality 3D human action understanding and cover a wide range of complex human activities with well annotated information. PKU-MMD contains 1076 long video sequences in 51 action categories, performed by 66 subjects in three camera views. It contains almost 20,000 action instances and 5.4 million frames in total. Our dataset also provides multi-modality data sources, including RGB, depth, Infrared Radiation and Skeleton. With different modalities, we conduct extensive experiments on our dataset in terms of two scenarios and evaluate different methods by various metrics, including a new proposed evaluation protocol 2D-AP. We believe this large-scale dataset will benefit future researches on action detection for the community.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 00:22:49 GMT" }, { "version": "v2", "created": "Tue, 28 Mar 2017 01:01:29 GMT" } ]
2017-03-29T00:00:00
[ [ "Liu", "Chunhui", "" ], [ "Hu", "Yueyu", "" ], [ "Li", "Yanghao", "" ], [ "Song", "Sijie", "" ], [ "Liu", "Jiaying", "" ] ]
new_dataset
0.999783
1703.09296
Jiri Hladuvka
Ji\v{r}\'i Hlad\r{u}vka, Bui Thi Mai Phuong, Richard Ljuhar, Davul Ljuhar, Ana M Rodrigues, Jaime C Branco, Helena Canh\~ao
Femoral ROIs and Entropy for Texture-based Detection of Osteoarthritis from High-Resolution Knee Radiographs
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The relationship between knee osteoarthritis progression and changes in tibial bone structure has long been recognized and various texture descriptors have been proposed to detect early osteoarthritis (OA) from radiographs. This work aims to investigate (1) femoral textures as an OA indicator and (2) the potential of entropy as a computationally efficient alternative to established texture descriptors. We design a robust semi-automatically placed layout for regions of interest (ROI), compute the Hurst coefficient and the entropy in each ROI, and employ statistical and machine learning methods to evaluate feature combinations. Based on 153 high-resolution radiographs, our results identify medial femur as an effective univariate descriptor, with significance comparable to medial tibia. Entropy is shown to contribute to classification performance. A linear five-feature classifier combining femur, entropic and standard texture descriptors, achieves AUC of 0.85, outperforming the state-of-the-art by roughly 0.1.
[ { "version": "v1", "created": "Mon, 27 Mar 2017 20:20:50 GMT" } ]
2017-03-29T00:00:00
[ [ "Hladůvka", "Jiří", "" ], [ "Phuong", "Bui Thi Mai", "" ], [ "Ljuhar", "Richard", "" ], [ "Ljuhar", "Davul", "" ], [ "Rodrigues", "Ana M", "" ], [ "Branco", "Jaime C", "" ], [ "Canhão", "Helena", "" ] ]
new_dataset
0.998674
1010.2472
Zdenek Dvorak
Zdenek Dvorak, Dan Kral, Robin Thomas
Three-coloring triangle-free graphs on surfaces I. Extending a coloring to a disk with one triangle
18 pages, 2 figures; v3: further reviewer remarks incorporated
J. Combin. Theory Ser. B 120 (2016), 1-17
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let G be a plane graph with exactly one triangle T and all other cycles of length at least 5, and let C be a facial cycle of G of length at most six. We prove that a 3-coloring of C does not extend to a 3-coloring of G if and only if C has length exactly six and there is a color x such that either G has an edge joining two vertices of C colored x, or T is disjoint from C and every vertex of T is adjacent to a vertex of C colored x. This is a lemma to be used in a future paper of this series.
[ { "version": "v1", "created": "Tue, 12 Oct 2010 18:55:07 GMT" }, { "version": "v2", "created": "Tue, 12 Mar 2013 01:51:40 GMT" }, { "version": "v3", "created": "Fri, 4 Mar 2016 08:58:32 GMT" } ]
2017-03-28T00:00:00
[ [ "Dvorak", "Zdenek", "" ], [ "Kral", "Dan", "" ], [ "Thomas", "Robin", "" ] ]
new_dataset
0.999335
1404.2019
Sandor P. Fekete
Michael A. Bender, Martin Farach-Colton, S\'andor P. Fekete, Jeremy T. Fineman, Seth Gilbert
Cost-oblivious storage reallocation
20 pages, 3 figures; to appear in Transactions on Algorithms. Full journal version of of previous conference paper in PODS 2014
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Databases need to allocate and free blocks of storage on disk. Freed blocks introduce holes where no data is stored. Allocation systems attempt to reuse such deallocated regions in order to minimize the footprint on disk. If previously allocated blocks cannot be moved, the problem is called the memory allocation problem, which is known to have a logarithmic overhead in the footprint. This paper defines the storage reallocation problem, where previously allocated blocks can be moved, or reallocated, but at some cost. The algorithms presented here are cost oblivious, in that they work for a broad and reasonable class of cost functions, even when they do not know what the cost function is. The objective is to minimize the storage footprint, that is, the largest memory address containing an allocated object, while simultaneously minimizing the reallocation costs. This paper gives asymptotically optimal algorithms for storage reallocation, in which the storage footprint is at most (1+epsilon) times optimal, and the reallocation cost is at most (1/epsilon) times the original allocation cost, which is also optimal. The algorithms are cost oblivious as long as the allocation/reallocation cost function is subadditive.
[ { "version": "v1", "created": "Tue, 8 Apr 2014 06:37:46 GMT" }, { "version": "v2", "created": "Sun, 27 Apr 2014 18:37:56 GMT" }, { "version": "v3", "created": "Sun, 26 Mar 2017 09:01:16 GMT" } ]
2017-03-28T00:00:00
[ [ "Bender", "Michael A.", "" ], [ "Farach-Colton", "Martin", "" ], [ "Fekete", "Sándor P.", "" ], [ "Fineman", "Jeremy T.", "" ], [ "Gilbert", "Seth", "" ] ]
new_dataset
0.985685
1405.0203
Alireza Vahid
Alireza Vahid, Mohammad Ali Maddah-Ali, Amir Salman Avestimehr, Yan Zhu
Binary Fading Interference Channel with No CSIT
To appear in IEEE Transactions on Information Theory
null
10.1109/ISIT.2014.6874916
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the capacity region of the two-user Binary Fading (or Erasure) Interference Channel where the transmitters have no knowledge of the channel state information. We develop new inner-bounds and outer-bounds for this problem. We identify three regimes based on the channel parameters: weak, moderate, and strong interference regimes. Interestingly, this is similar to the generalized degrees of freedom of the two-user Gaussian interference channel where transmitters have perfect channel knowledge. We show that for the weak interference regime, treating interference as erasure is optimal while for the strong interference regime, decoding interference is optimal. For the moderate interference regime, we provide new inner and outer bounds. The inner-bound is based on a modification of the Han-Kobayashi scheme for the erasure channel, enhanced by time-sharing. We study the gap between our inner-bound and our outer-bounds for the moderate interference regime and compare our results to that of the Gaussian interference channel. Deriving our new outer-bounds has three main steps. We first create a contracted channel that has fewer states compared to the original channel, in order to make the analysis tractable. We then prove the Correlation Lemma that shows an outer-bound on the capacity region of the contracted channel also serves as an outer-bound for the original channel. Finally using the Conditional Entropy Leakage Lemma, we derive our outer-bound on the capacity region of the contracted channel.
[ { "version": "v1", "created": "Thu, 1 May 2014 15:57:40 GMT" }, { "version": "v2", "created": "Sun, 11 Oct 2015 16:47:11 GMT" }, { "version": "v3", "created": "Fri, 24 Mar 2017 19:40:10 GMT" } ]
2017-03-28T00:00:00
[ [ "Vahid", "Alireza", "" ], [ "Maddah-Ali", "Mohammad Ali", "" ], [ "Avestimehr", "Amir Salman", "" ], [ "Zhu", "Yan", "" ] ]
new_dataset
0.969417
1508.03765
Evan Everett
Evan Everett, Clayton Shepard, Lin Zhong, and Ashutosh Sabharwal
SoftNull: Many-Antenna Full-Duplex Wireless via Digital Beamforming
null
IEEE Transactions on Wireless Communications, vol. 15, no. 12, pp. 8077-8092, Dec. 2016
10.1109/TWC.2016.2612625
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present and study a digital-controlled method, called SoftNull, to enable full-duplex in many-antenna systems. Unlike most designs that rely on analog cancelers to suppress self-interference, SoftNull relies on digital transmit beamforming to reduce self-interference. SoftNull does not attempt to perfectly null self-interference, but instead seeks to reduce self-interference sufficiently to prevent swamping the receiver's dynamic range. Residual self-interference is then cancelled digitally by the receiver. We evaluate the performance of SoftNull using measurements from a 72-element antenna array in both indoor and outdoor environments. We find that SoftNull can significantly outperform half-duplex for small cells operating in the many-antenna regime, where the number of antennas is many more than the number of users served simultaneously.
[ { "version": "v1", "created": "Sat, 15 Aug 2015 19:27:21 GMT" }, { "version": "v2", "created": "Sun, 26 Mar 2017 23:47:32 GMT" } ]
2017-03-28T00:00:00
[ [ "Everett", "Evan", "" ], [ "Shepard", "Clayton", "" ], [ "Zhong", "Lin", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
new_dataset
0.996638
1512.03128
Pascal Giard
Seyyed Ali Hashemi and Alexios Balatsoukas-Stimming and Pascal Giard and Claude Thibeault and Warren J. Gross
Partitioned Successive-Cancellation List Decoding of Polar Codes
4 pages, 6 figures, to appear at IEEE ICASSP 2016
null
10.1109/ICASSP.2016.7471817
null
cs.AR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Successive-cancellation list (SCL) decoding is an algorithm that provides very good error-correction performance for polar codes. However, its hardware implementation requires a large amount of memory, mainly to store intermediate results. In this paper, a partitioned SCL algorithm is proposed to reduce the large memory requirements of the conventional SCL algorithm. The decoder tree is broken into partitions that are decoded separately. We show that with careful selection of list sizes and number of partitions, the proposed algorithm can outperform conventional SCL while requiring less memory.
[ { "version": "v1", "created": "Thu, 10 Dec 2015 02:34:13 GMT" }, { "version": "v2", "created": "Fri, 22 Jan 2016 15:24:12 GMT" } ]
2017-03-28T00:00:00
[ [ "Hashemi", "Seyyed Ali", "" ], [ "Balatsoukas-Stimming", "Alexios", "" ], [ "Giard", "Pascal", "" ], [ "Thibeault", "Claude", "" ], [ "Gross", "Warren J.", "" ] ]
new_dataset
0.986084
1605.07524
Laurent Vanbever
Maria Apostolaki, Aviv Zohar, Laurent Vanbever
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
To appear in the 38th IEEE Symposium on Security and Privacy, May 2017
null
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for attackers. While many attack vectors have already been uncovered, one important vector has been left out though: attacking the currency via the Internet routing infrastructure itself. Indeed, by manipulating routing advertisements (BGP hijacks) or by naturally intercepting traffic, Autonomous Systems (ASes) can intercept and manipulate a large fraction of Bitcoin traffic. This paper presents the first taxonomy of routing attacks and their impact on Bitcoin, considering both small-scale attacks, targeting individual nodes, and large-scale attacks, targeting the network as a whole. While challenging, we show that two key properties make routing attacks practical: (i) the efficiency of routing manipulation; and (ii) the significant centralization of Bitcoin in terms of mining and routing. Specifically, we find that any network attacker can hijack few (<100) BGP prefixes to isolate ~50% of the mining power---even when considering that mining pools are heavily multi-homed. We also show that on-path network attackers can considerably slow down block propagation by interfering with few key Bitcoin messages. We demonstrate the feasibility of each attack against the deployed Bitcoin software. We also quantify their effectiveness on the current Bitcoin topology using data collected from a Bitcoin supernode combined with BGP routing data. The potential damage to Bitcoin is worrying. By isolating parts of the network or delaying block propagation, attackers can cause a significant amount of mining power to be wasted, leading to revenue losses and enabling a wide range of exploits such as double spending. To prevent such effects in practice, we provide both short and long-term countermeasures, some of which can be deployed immediately.
[ { "version": "v1", "created": "Tue, 24 May 2016 16:08:04 GMT" }, { "version": "v2", "created": "Fri, 24 Mar 2017 19:25:05 GMT" } ]
2017-03-28T00:00:00
[ [ "Apostolaki", "Maria", "" ], [ "Zohar", "Aviv", "" ], [ "Vanbever", "Laurent", "" ] ]
new_dataset
0.999561
1606.03493
Zongqing Lu
Zongqing Lu, Xiao Sun, and Thomas La Porta
Cooperative Data Offload in Opportunistic Networks: From Mobile Devices to Infrastructure
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Opportunistic mobile networks consisting of intermittently connected mobile devices have been exploited for various applications, such as computational offloading and mitigating cellular traffic load. In contrast to existing work, in this paper, we focus on cooperatively offloading data among mobile devices to maximally improve the probability of data delivery from a mobile device to intermittently connected infrastructure within a given time constraint, which is referred to as the \textit{cooperative offloading} problem. Unfortunately, the estimation of data delivery probability over an opportunistic path is difficult and cooperative offloading is NP-hard. To this end, we first propose a probabilistic framework that provides the estimation of such probability. Based on the proposed probabilistic framework, we design a heuristic algorithm to solve cooperative offloading at a low computation cost. Due to the lack of global information, a distributed algorithm is further proposed. The performance of the proposed approaches is evaluated based on both synthetic networks and real traces. Experimental results show that the probabilistic framework can accurately estimate the data delivery probability, cooperative offloading greatly improves the delivery probability, the heuristic algorithm approximates the optimum, and the performance of both the heuristic algorithm and distributed algorithm outperforms other approaches.
[ { "version": "v1", "created": "Fri, 10 Jun 2016 22:23:27 GMT" }, { "version": "v2", "created": "Sun, 26 Mar 2017 19:48:01 GMT" } ]
2017-03-28T00:00:00
[ [ "Lu", "Zongqing", "" ], [ "Sun", "Xiao", "" ], [ "La Porta", "Thomas", "" ] ]
new_dataset
0.991723
1611.08315
Sandor P. Fekete
S\'andor P. Fekete and Qian Li and Joseph S. B. Mitchell and Christian Scheffer
Universal Guard Problems
28 pages, 19 figures, full version of extended abstract that appeared in the 27th International Symposium on Algorithms and Computation (ISAAC 2016), 32:1-32:13
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a spectrum of results for the Universal Guard Problem, in which one is to obtain a small set of points ("guards") that are "universal" in their ability to guard any of a set of possible polygonal domains in the plane. We give upper and lower bounds on the number of universal guards that are always sufficient to guard all polygons having a given set of n vertices, or to guard all polygons in a given set of k polygons on an n-point vertex set. Our upper bound proofs include algorithms to construct universal guard sets of the respective cardinalities.
[ { "version": "v1", "created": "Thu, 24 Nov 2016 21:38:59 GMT" }, { "version": "v2", "created": "Mon, 27 Mar 2017 07:19:12 GMT" } ]
2017-03-28T00:00:00
[ [ "Fekete", "Sándor P.", "" ], [ "Li", "Qian", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Scheffer", "Christian", "" ] ]
new_dataset
0.996958
1703.08025
Yunzhen Zhao
Yunzhen Zhao and Yuxin Peng
Saliency-guided video classification via adaptively weighted learning
6 pages, 1 figure, accepted by ICME 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Video classification is productive in many practical applications, and the recent deep learning has greatly improved its accuracy. However, existing works often model video frames indiscriminately, but from the view of motion, video frames can be decomposed into salient and non-salient areas naturally. Salient and non-salient areas should be modeled with different networks, for the former present both appearance and motion information, and the latter present static background information. To address this problem, in this paper, video saliency is predicted by optical flow without supervision firstly. Then two streams of 3D CNN are trained individually for raw frames and optical flow on salient areas, and another 2D CNN is trained for raw frames on non-salient areas. For the reason that these three streams play different roles for each class, the weights of each stream are adaptively learned for each class. Experimental results show that saliency-guided modeling and adaptively weighted learning can reinforce each other, and we achieve the state-of-the-art results.
[ { "version": "v1", "created": "Thu, 23 Mar 2017 12:02:21 GMT" }, { "version": "v2", "created": "Sun, 26 Mar 2017 02:43:13 GMT" } ]
2017-03-28T00:00:00
[ [ "Zhao", "Yunzhen", "" ], [ "Peng", "Yuxin", "" ] ]
new_dataset
0.99012
1703.08630
Pedro Hecht
Pedro Hecht
Post-Quantum Cryptography: A Zero-Knowledge Authentication Protocol
3 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a simple bare-bones solution of a Zero-Knowledge authentication protocol which uses non-commutative algebra and a variation of the generalized symmetric decomposition problem (GSDP) as a one-way function. The cryptographic security is assured as long the GSDP problem is computationally hard to solve in non-commutative algebraic structures and belongs currently to the PQC category as no quantum computer attack is likely to exists.
[ { "version": "v1", "created": "Sat, 25 Mar 2017 00:09:14 GMT" } ]
2017-03-28T00:00:00
[ [ "Hecht", "Pedro", "" ] ]
new_dataset
0.999141
1703.08813
Oluwaseun Ajao
Aisling Gough, Ruth F Hunter, Oluwaseun Ajao, Anna Jurek, Gary McKeown, Jun Hong, Eimear Barrett, Marbeth Ferguson, Gerry McElwee, Miriam McCarthy, Frank Kee
Tweet for Behavior Change: Using Social Media for the Dissemination of Public Health Messages
17 pages published in Journal of Medical Internet Research - JMIR Public Health Surveillance, March 2017
JMIR Public Health Surveill 2017;3(1):e14. PMID: 28336503. URL: http://publichealth.jmir.org/2017/1/e14
10.2196/publichealth.6313
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background: Social media public health campaigns have the advantage of tailored messaging at low cost and large reach, but little is known about what would determine their feasibility as tools for inducing attitude and behavior change. Objective: The aim of this study was to test the feasibility of designing, implementing, and evaluating a social media-enabled intervention for skin cancer prevention. Conclusions: Social media-disseminated public health messages reached more than 23% of the Northern Ireland population. A Web-based survey suggested that the campaign might have contributed to improved knowledge and attitudes toward skin cancer among the target population. Findings suggested that shocking and humorous messages generated greatest impressions and engagement, but information-based messages were likely to be shared most. The extent of behavioral change as a result of the campaign remains to be explored, however, the change of attitudes and knowledge is promising. Social media is an inexpensive, effective method for delivering public health messages. However, existing and traditional process evaluation methods may not be suitable for social media.
[ { "version": "v1", "created": "Sun, 26 Mar 2017 13:22:00 GMT" } ]
2017-03-28T00:00:00
[ [ "Gough", "Aisling", "" ], [ "Hunter", "Ruth F", "" ], [ "Ajao", "Oluwaseun", "" ], [ "Jurek", "Anna", "" ], [ "McKeown", "Gary", "" ], [ "Hong", "Jun", "" ], [ "Barrett", "Eimear", "" ], [ "Ferguson", "Marbeth", "" ], [ "McElwee", "Gerry", "" ], [ "McCarthy", "Miriam", "" ], [ "Kee", "Frank", "" ] ]
new_dataset
0.999029
1703.08900
Haitao Cao
X. Niu and H. Cao
Some new bounds of placement delivery arrays
Coded caching scheme, placement delivery array, optimal
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coded caching scheme is a technique which reduce the load during peak traffic times in a wireless network system. Placement delivery array (PDA in short) was first introduced by Yan et al.. It can be used to design coded caching scheme. In this paper, we prove some lower bounds of PDA on the element and some lower bounds of PDA on the column. We also give some constructions for optimal PDA.
[ { "version": "v1", "created": "Mon, 27 Mar 2017 02:03:24 GMT" } ]
2017-03-28T00:00:00
[ [ "Niu", "X.", "" ], [ "Cao", "H.", "" ] ]
new_dataset
0.974983
1703.08931
Jakub Radoszewski
Micha{\l} Adamczyk, Mai Alzamel, Panagiotis Charalampopoulos, Costas S. Iliopoulos, and Jakub Radoszewski
Palindromic Decompositions with Gaps and Errors
accepted to CSR 2017
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Identifying palindromes in sequences has been an interesting line of research in combinatorics on words and also in computational biology, after the discovery of the relation of palindromes in the DNA sequence with the HIV virus. Efficient algorithms for the factorization of sequences into palindromes and maximal palindromes have been devised in recent years. We extend these studies by allowing gaps in decompositions and errors in palindromes, and also imposing a lower bound to the length of acceptable palindromes. We first present an algorithm for obtaining a palindromic decomposition of a string of length n with the minimal total gap length in time O(n log n * g) and space O(n g), where g is the number of allowed gaps in the decomposition. We then consider a decomposition of the string in maximal \delta-palindromes (i.e. palindromes with \delta errors under the edit or Hamming distance) and g allowed gaps. We present an algorithm to obtain such a decomposition with the minimal total gap length in time O(n (g + \delta)) and space O(n g).
[ { "version": "v1", "created": "Mon, 27 Mar 2017 05:09:06 GMT" } ]
2017-03-28T00:00:00
[ [ "Adamczyk", "Michał", "" ], [ "Alzamel", "Mai", "" ], [ "Charalampopoulos", "Panagiotis", "" ], [ "Iliopoulos", "Costas S.", "" ], [ "Radoszewski", "Jakub", "" ] ]
new_dataset
0.97298
1605.08548
Andres Monroy-Hernandez
Justin Cranshaw, Andr\'es Monroy-Hern\'andez, S.A. Needham
Journeys & Notes: Designing Social Computing for Non-Places
CHI '16 Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
null
10.1145/2858036.2858573
null
cs.HC cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we present a mobile application we designed and engineered to enable people to log their travels near and far, leave notes behind, and build a community around spaces in between destinations. Our design explores new ground for location-based social computing systems, identifying opportunities where these systems can foster the growth of on-line communities rooted at non-places. In our work we develop, explore, and evaluate several innovative features designed around four usage scenarios: daily commuting, long-distance traveling, quantified traveling, and journaling. We present the results of two small-scale user studies, and one large-scale, world-wide deployment, synthesizing the results as potential opportunities and lessons learned in designing social computing for non-places.
[ { "version": "v1", "created": "Fri, 27 May 2016 09:03:22 GMT" } ]
2017-03-27T00:00:00
[ [ "Cranshaw", "Justin", "" ], [ "Monroy-Hernández", "Andrés", "" ], [ "Needham", "S. A.", "" ] ]
new_dataset
0.997549
1612.06112
MinKeun Chung
MinKeun Chung, Min Soo Sim, Dong Ku Kim, Chan-Byoung Chae
Compact Full Duplex MIMO Radios in D2D Underlaid Cellular Networks: From System Design to Prototype Results
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the implementation and application possibilities of a compact full duplex multiple-input multiple-output (MIMO) architecture where direct communication exists between users, e.g., device-to-device (D2D) and cellular link coexisting on the same spectrum. For the architecture of the compact full duplex radio, we combine an analog self-interference canceler based dual-polarization with high cross-polarization discrimination (XPD) and Long Term Evolution (LTE)-based per-subcarrier digital self-interference canceler. While we consider the compactness and power efficiency of an analog solution, we focus on the digital canceler design with robustness to a frequency-selective channel and high compatibility with a conventional LTE system. For an over-the-air wireless experiment of full duplex testbed with a two-user-pair, we implement a full duplex MIMO physical layer (PHY), supporting 20 MHz bandwidth, on an FPGA-based software-defined radio platform. Further, we propose a novel timing synchronization method to construct a more viable full duplex MIMO link. By having the full duplex link prototype fully operating in real-time, we present the first characterization of the proposed compact full duplex MIMO performance depending on the transmit power of the full duplex node. We also show the link quality between nodes. One of the crucial insights of this work is that the full duplex operation of a user is capable of acquiring the throughput gain if the user has self-interference capability with guaranteed performance.
[ { "version": "v1", "created": "Mon, 19 Dec 2016 10:36:02 GMT" }, { "version": "v2", "created": "Fri, 17 Mar 2017 17:15:09 GMT" } ]
2017-03-27T00:00:00
[ [ "Chung", "MinKeun", "" ], [ "Sim", "Min Soo", "" ], [ "Kim", "Dong Ku", "" ], [ "Chae", "Chan-Byoung", "" ] ]
new_dataset
0.998243
1703.00667
Pierre Peterlongo
Camille Marchet, Lolita Lecompte, Antoine Limasset, Lucie Bittner and Pierre Peterlongo
A resource-frugal probabilistic dictionary and applications in bioinformatics
Submitted to Journal of Discrete Algorithms. arXiv admin note: substantial text overlap with arXiv:1605.08319
null
null
null
cs.DS q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Indexing massive data sets is extremely expensive for large scale problems. In many fields, huge amounts of data are currently generated, however extracting meaningful information from voluminous data sets, such as computing similarity between elements, is far from being trivial. It remains nonetheless a fundamental need. This work proposes a probabilistic data structure based on a minimal perfect hash function for indexing large sets of keys. Our structure out-compete the hash table for construction, query times and for memory usage, in the case of the indexation of a static set. To illustrate the impact of algorithms performances, we provide two applications based on similarity computation between collections of sequences, and for which this calculation is an expensive but required operation. In particular, we show a practical case in which other bioinformatics tools fail to scale up the tested data set or provide lower recall quality results.
[ { "version": "v1", "created": "Thu, 2 Mar 2017 08:37:37 GMT" }, { "version": "v2", "created": "Fri, 24 Mar 2017 08:45:35 GMT" } ]
2017-03-27T00:00:00
[ [ "Marchet", "Camille", "" ], [ "Lecompte", "Lolita", "" ], [ "Limasset", "Antoine", "" ], [ "Bittner", "Lucie", "" ], [ "Peterlongo", "Pierre", "" ] ]
new_dataset
0.952492
1703.07839
Aradhana Nayak
Aradhana Nayak and Ravi N. Banavar
Almost-global tracking for a rigid body with internal rotors
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Almost-global orientation trajectory tracking for a rigid body with external actuation has been well studied in the literature, and in the geometric setting as well. The tracking control law relies on the fact that a rigid body is a simple mechanical system (SMS) on the $3-$dimensional group of special orthogonal matrices. However, the problem of designing feedback control laws for tracking using internal actuation mechanisms, like rotors or control moment gyros, has received lesser attention from a geometric point of view. An internally actuated rigid body is not a simple mechanical system, and the phase-space here evolves on the level set of a momentum map. In this note, we propose a novel proportional integral derivative (PID) control law for a rigid body with $3$ internal rotors, that achieves tracking of feasible trajectories from almost all initial conditions.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 20:24:18 GMT" }, { "version": "v2", "created": "Fri, 24 Mar 2017 05:44:39 GMT" } ]
2017-03-27T00:00:00
[ [ "Nayak", "Aradhana", "" ], [ "Banavar", "Ravi N.", "" ] ]
new_dataset
0.9948
1703.08244
Maribel Acosta
Fabian Fl\"ock, Kenan Erdogan, Maribel Acosta
TokTrack: A Complete Token Provenance and Change Tracking Dataset for the English Wikipedia
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a dataset that contains every instance of all tokens (~ words) ever written in undeleted, non-redirect English Wikipedia articles until October 2016, in total 13,545,349,787 instances. Each token is annotated with (i) the article revision it was originally created in, and (ii) lists with all the revisions in which the token was ever deleted and (potentially) re-added and re-deleted from its article, enabling a complete and straightforward tracking of its history. This data would be exceedingly hard to create by an average potential user as it is (i) very expensive to compute and as (ii) accurately tracking the history of each token in revisioned documents is a non-trivial task. Adapting a state-of-the-art algorithm, we have produced a dataset that allows for a range of analyses and metrics, already popular in research and going beyond, to be generated on complete-Wikipedia scale; ensuring quality and allowing researchers to forego expensive text-comparison computation, which so far has hindered scalable usage. We show how this data enables, on token-level, computation of provenance, measuring survival of content over time, very detailed conflict metrics, and fine-grained interactions of editors like partial reverts, re-additions and other metrics, in the process gaining several novel insights.
[ { "version": "v1", "created": "Thu, 23 Mar 2017 22:20:45 GMT" } ]
2017-03-27T00:00:00
[ [ "Flöck", "Fabian", "" ], [ "Erdogan", "Kenan", "" ], [ "Acosta", "Maribel", "" ] ]
new_dataset
0.999887
1703.08306
Kwangsu Lee
Kwangsu Lee
Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness
MS Thesis, Korea Advanced Institute of Science and Technology, February 2000
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A block cipher is a bijective function that transforms a plaintext to a ciphertext. A block cipher is a principle component in a cryptosystem because the security of a cryptosystem depends on the security of a block cipher. A Feistel network is the most widely used method to construct a block cipher. This structure has a property such that it can transform a function to a bijective function. But the previous Feistel network is unsuitable to construct block ciphers that have large input-output size. One way to construct block ciphers with large input-output size is to use an unbalanced Feistel network that is the generalization of a previous Feistel network. There have been little research on unbalanced Feistel networks and previous work was about some particular structures of unbalanced Feistel networks. So previous work didn't provide a theoretical base to construct block ciphers that are secure and efficient using unbalanced Feistel networks. In this thesis, we analyze the minimal number of rounds of pseudo-random permutation generators that use unbalanced Feistel networks. That is, after categorizing unbalanced Feistel networks as source-heavy structures and target-heavy structures, we analyze the minimal number of rounds of pseudo-random permutation generators that use each structure. Therefore, in order to construct a block cipher that is secure and efficient using unbalanced Feistel networks, we should follow the results of this thesis. Additionally, we propose a new unbalanced Feistel network that has some advantages such that it can extend a previous block cipher with small input-output size to a new block cipher with large input-output size. We also analyze the minimum number of rounds of a pseudo-random permutation generator that uses this structure.
[ { "version": "v1", "created": "Fri, 24 Mar 2017 08:06:21 GMT" } ]
2017-03-27T00:00:00
[ [ "Lee", "Kwangsu", "" ] ]
new_dataset
0.955932
1703.05186
Manuel Mazzara
Evgenii Akentev, Alexander Tchitchigin, Larisa Safina, Manuel Mazzara
Verified type checker for Jolie programming language
null
null
null
null
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Jolie is a service-oriented programming language which comes with the formal specification of its type system. However, there is no tool to ensure that programs in Jolie are well-typed. In this paper we provide the results of building a type checker for Jolie as a part of its syntax and semantics formal model. We express the type checker as a program with dependent types in Agda proof assistant which helps to ascertain that the type checker is correct.
[ { "version": "v1", "created": "Wed, 15 Mar 2017 14:42:26 GMT" }, { "version": "v2", "created": "Thu, 23 Mar 2017 06:57:15 GMT" } ]
2017-03-24T00:00:00
[ [ "Akentev", "Evgenii", "" ], [ "Tchitchigin", "Alexander", "" ], [ "Safina", "Larisa", "" ], [ "Mazzara", "Manuel", "" ] ]
new_dataset
0.999377
1703.07920
Kaori Abe
Kaori Abe, Teppei Suzuki, Shunya Ueta, Akio Nakamura, Yutaka Satoh and Hirokatsu Kataoka
Changing Fashion Cultures
9 pages, 9 figures
null
null
null
cs.CV cs.DB cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a novel concept that analyzes and visualizes worldwide fashion trends. Our goal is to reveal cutting-edge fashion trends without displaying an ordinary fashion style. To achieve the fashion-based analysis, we created a new fashion culture database (FCDB), which consists of 76 million geo-tagged images in 16 cosmopolitan cities. By grasping a fashion trend of mixed fashion styles,the paper also proposes an unsupervised fashion trend descriptor (FTD) using a fashion descriptor, a codeword vetor, and temporal analysis. To unveil fashion trends in the FCDB, the temporal analysis in FTD effectively emphasizes consecutive features between two different times. In experiments, we clearly show the analysis of fashion trends and fashion-based city similarity. As the result of large-scale data collection and an unsupervised analyzer, the proposed approach achieves world-level fashion visualization in a time series. The code, model, and FCDB will be publicly available after the construction of the project page.
[ { "version": "v1", "created": "Thu, 23 Mar 2017 03:48:08 GMT" } ]
2017-03-24T00:00:00
[ [ "Abe", "Kaori", "" ], [ "Suzuki", "Teppei", "" ], [ "Ueta", "Shunya", "" ], [ "Nakamura", "Akio", "" ], [ "Satoh", "Yutaka", "" ], [ "Kataoka", "Hirokatsu", "" ] ]
new_dataset
0.996086
1703.07934
Joel Ferguson
Joel Ferguson, Alejandro Donaire, Richard H. Middleton
Integral control of port-Hamiltonian systems: non-passive outputs without coordinate transformation
8 pages, 2 figures
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a method for the addition of integral action to non-passive outputs of a class of port-Hamiltonian systems. The proposed integral controller is a dynamic extension, constructed from the open loop system, such that the closed loop preserves the port-Hamiltonian form. It is shown that the controller is able to reject the effects of both matched and unmatched disturbances, preserving the regulation of the non-passive outputs. Previous solutions to this problem have relied on a change of coordinates whereas the presented solution is developed using the original state vector and, therefore, retains its physical interpretation. In addition, the resulting closed loop dynamics have a natural interpretation as a Control by Interconnection scheme.
[ { "version": "v1", "created": "Thu, 23 Mar 2017 05:05:58 GMT" } ]
2017-03-24T00:00:00
[ [ "Ferguson", "Joel", "" ], [ "Donaire", "Alejandro", "" ], [ "Middleton", "Richard H.", "" ] ]
new_dataset
0.957296
1703.08043
George MacCartney Jr
George R. MacCartney Jr., Hangsong Yan, Shu Sun, Theodore S. Rappaport
A Flexible Wideband Millimeter-Wave Channel Sounder with Local Area and NLOS to LOS Transition Measurements
To be published in 2017 IEEE International Conference on Communications (ICC), Paris, France, May 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a millimeter-wave (mmWave) wideband sliding correlator channel sounder with flexibility to operate at various transmission rates. The channel sounder can transmit and receive up to 1 GHz of RF null-to-null bandwidth while measuring a 2 nanosecond multipath time resolution. The system architecture takes advantage of field-programmable gate arrays (FPGAs), high-speed digital-to-analog converters (DACs), and low phase noise Rubidium (Rb) references for synchronization. Using steerable narrowbeam antennas, the system can measure up to 185 dB of path loss. The channel sounder is used to measure the directional and omnidirectional received power as a receiver transitions from line-of-sight to non-line-of-sight conditions down an urban canyon. A 25 dB drop in omnidirectional received power was observed as the receiver transitioned from line-of-sight (LOS) conditions to deeply shadowed non-LOS (NLOS) conditions. The channel sounder was also used to study signal variation and spatial consistency for a local set of receiver locations arranged in a cluster spanning a 5 m x 10 m local area, where the omnidirectional received power in LOS and NLOS environments is found to be relatively stable with standard deviations of received power of 2.2 dB and 4.3 dB, respectively. This work shows that when implementing beamforming at the transmitter at mmWave, the omnidirectional received power over a local area has little fluctuation among receiver locations separated by a few to several meters.
[ { "version": "v1", "created": "Thu, 23 Mar 2017 12:38:46 GMT" } ]
2017-03-24T00:00:00
[ [ "MacCartney", "George R.", "Jr." ], [ "Yan", "Hangsong", "" ], [ "Sun", "Shu", "" ], [ "Rappaport", "Theodore S.", "" ] ]
new_dataset
0.999178
1703.08084
Jean-Benoit Delbrouck
Jean-Benoit Delbrouck, Stephane Dupont
Multimodal Compact Bilinear Pooling for Multimodal Neural Machine Translation
Submitted to ICLR Workshop 2017
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In state-of-the-art Neural Machine Translation, an attention mechanism is used during decoding to enhance the translation. At every step, the decoder uses this mechanism to focus on different parts of the source sentence to gather the most useful information before outputting its target word. Recently, the effectiveness of the attention mechanism has also been explored for multimodal tasks, where it becomes possible to focus both on sentence parts and image regions. Approaches to pool two modalities usually include element-wise product, sum or concatenation. In this paper, we evaluate the more advanced Multimodal Compact Bilinear pooling method, which takes the outer product of two vectors to combine the attention features for the two modalities. This has been previously investigated for visual question answering. We try out this approach for multimodal image caption translation and show improvements compared to basic combination methods.
[ { "version": "v1", "created": "Thu, 23 Mar 2017 14:20:52 GMT" } ]
2017-03-24T00:00:00
[ [ "Delbrouck", "Jean-Benoit", "" ], [ "Dupont", "Stephane", "" ] ]
new_dataset
0.984304
1701.05125
Omid Semiari
Omid Semiari, Walid Saad, Mehdi Bennis, and Behrouz Maham
Caching Meets Millimeter Wave Communications for Enhanced Mobility Management in 5G Networks
null
null
null
null
cs.GT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most promising approaches to overcome the uncertainty and dynamic channel variations of millimeter wave (mmW) communications is to deploy dual-mode base stations that integrate both mmW and microwave ($\mu$W) frequencies. If properly designed, such dual-mode base stations can enhance mobility and handover in highly mobile wireless environments. In this paper, a novel approach for analyzing and managing mobility in joint $\mu$W-mmW networks is proposed. The proposed approach leverages device-level caching along with the capabilities of dual-mode base stations to minimize handover failures, reduce inter-frequency measurement energy consumption, and provide seamless mobility in emerging dense heterogeneous networks. First, fundamental results on the caching capabilities, including caching probability and cache duration are derived for the proposed dual-mode network scenario. Second, the average achievable rate of caching is derived for mobile users. Third, the proposed cache-enabled mobility management problem is formulated as a dynamic matching game between mobile user equipments (MUEs) and small base stations (SBSs). The goal of this game is to find a distributed handover mechanism that subject to the network constraints on HOFs and limited cache sizes, allows each MUE to choose between executing an HO to a target SBS, being connected to the macrocell base station (MBS), or perform a transparent HO by using the cached content. The formulated matching game allows capturing the dynamics of the mobility management problem caused by HOFs. To solve this dynamic matching problem, a novel algorithm is proposed and its convergence to a two-sided dynamically stable HO policy is proved. Numerical results corroborate the analytical derivations and show that the proposed solution will provides significant reductions in both the HOF and energy consumption by MUEs.
[ { "version": "v1", "created": "Wed, 18 Jan 2017 15:59:42 GMT" }, { "version": "v2", "created": "Wed, 22 Mar 2017 14:04:49 GMT" } ]
2017-03-23T00:00:00
[ [ "Semiari", "Omid", "" ], [ "Saad", "Walid", "" ], [ "Bennis", "Mehdi", "" ], [ "Maham", "Behrouz", "" ] ]
new_dataset
0.996176
1702.00783
Ryan Dahl
Ryan Dahl, Mohammad Norouzi, Jonathon Shlens
Pixel Recursive Super Resolution
null
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a pixel recursive super resolution model that synthesizes realistic details into images while enhancing their resolution. A low resolution image may correspond to multiple plausible high resolution images, thus modeling the super resolution process with a pixel independent conditional model often results in averaging different details--hence blurry edges. By contrast, our model is able to represent a multimodal conditional distribution by properly modeling the statistical dependencies among the high resolution image pixels, conditioned on a low resolution input. We employ a PixelCNN architecture to define a strong prior over natural images and jointly optimize this prior with a deep conditioning convolutional network. Human evaluations indicate that samples from our proposed model look more photo realistic than a strong L2 regression baseline.
[ { "version": "v1", "created": "Thu, 2 Feb 2017 18:59:17 GMT" }, { "version": "v2", "created": "Wed, 22 Mar 2017 16:13:21 GMT" } ]
2017-03-23T00:00:00
[ [ "Dahl", "Ryan", "" ], [ "Norouzi", "Mohammad", "" ], [ "Shlens", "Jonathon", "" ] ]
new_dataset
0.998988
1702.05060
Xuanzhe Liu
Xuanzhe Liu, Huoran Li, Xuan Lu, Tao Xie, Qiaozhu Mei, Hong Mei, Feng Feng
Mining Behavioral Patterns from Millions of Android Users
29pages
IEEE Transactions on Software Engineering, 2017
10.1109/TSE.2017.2685387
null
cs.CY cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The prevalence of smart mobile devices has promoted the popularity of mobile applications (a.k.a. apps). Supporting mobility has become a promising trend in software engineering research. This article presents an empirical study of behavioral service profiles collected from millions of users whose devices are deployed with Wandoujia, a leading Android app store service in China. The dataset of Wandoujia service profiles consists of two kinds of user behavioral data from using 0.28 million free Android apps, including (1) app management activities (i.e., downloading, updating, and uninstalling apps) from over 17 million unique users and (2) app network usage from over 6 million unique users. We explore multiple aspects of such behavioral data and present patterns of app usage. Based on the findings as well as derived knowledge, we also suggest some new open opportunities and challenges that can be explored by the research community, including app development, deployment, delivery, revenue, etc.
[ { "version": "v1", "created": "Tue, 14 Feb 2017 11:31:13 GMT" }, { "version": "v2", "created": "Wed, 22 Mar 2017 12:07:29 GMT" } ]
2017-03-23T00:00:00
[ [ "Liu", "Xuanzhe", "" ], [ "Li", "Huoran", "" ], [ "Lu", "Xuan", "" ], [ "Xie", "Tao", "" ], [ "Mei", "Qiaozhu", "" ], [ "Mei", "Hong", "" ], [ "Feng", "Feng", "" ] ]
new_dataset
0.954243
1703.05884
Ashton Fagg
Hamed Kiani Galoogahi, Ashton Fagg, Chen Huang, Deva Ramanan, Simon Lucey
Need for Speed: A Benchmark for Higher Frame Rate Object Tracking
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose the first higher frame rate video dataset (called Need for Speed - NfS) and benchmark for visual object tracking. The dataset consists of 100 videos (380K frames) captured with now commonly available higher frame rate (240 FPS) cameras from real world scenarios. All frames are annotated with axis aligned bounding boxes and all sequences are manually labelled with nine visual attributes - such as occlusion, fast motion, background clutter, etc. Our benchmark provides an extensive evaluation of many recent and state-of-the-art trackers on higher frame rate sequences. We ranked each of these trackers according to their tracking accuracy and real-time performance. One of our surprising conclusions is that at higher frame rates, simple trackers such as correlation filters outperform complex methods based on deep networks. This suggests that for practical applications (such as in robotics or embedded vision), one needs to carefully tradeoff bandwidth constraints associated with higher frame rate acquisition, computational costs of real-time analysis, and the required application accuracy. Our dataset and benchmark allows for the first time (to our knowledge) systematic exploration of such issues, and will be made available to allow for further research in this space.
[ { "version": "v1", "created": "Fri, 17 Mar 2017 04:18:25 GMT" }, { "version": "v2", "created": "Tue, 21 Mar 2017 22:35:09 GMT" } ]
2017-03-23T00:00:00
[ [ "Galoogahi", "Hamed Kiani", "" ], [ "Fagg", "Ashton", "" ], [ "Huang", "Chen", "" ], [ "Ramanan", "Deva", "" ], [ "Lucey", "Simon", "" ] ]
new_dataset
0.999774
1703.07348
Dajiang Zhou
Xushen Han, Dajiang Zhou, Shihao Wang, and Shinji Kimura
CNN-MERP: An FPGA-Based Memory-Efficient Reconfigurable Processor for Forward and Backward Propagation of Convolutional Neural Networks
null
ICCD 2016
null
null
cs.LG cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large-scale deep convolutional neural networks (CNNs) are widely used in machine learning applications. While CNNs involve huge complexity, VLSI (ASIC and FPGA) chips that deliver high-density integration of computational resources are regarded as a promising platform for CNN's implementation. At massive parallelism of computational units, however, the external memory bandwidth, which is constrained by the pin count of the VLSI chip, becomes the system bottleneck. Moreover, VLSI solutions are usually regarded as a lack of the flexibility to be reconfigured for the various parameters of CNNs. This paper presents CNN-MERP to address these issues. CNN-MERP incorporates an efficient memory hierarchy that significantly reduces the bandwidth requirements from multiple optimizations including on/off-chip data allocation, data flow optimization and data reuse. The proposed 2-level reconfigurability is utilized to enable fast and efficient reconfiguration, which is based on the control logic and the multiboot feature of FPGA. As a result, an external memory bandwidth requirement of 1.94MB/GFlop is achieved, which is 55% lower than prior arts. Under limited DRAM bandwidth, a system throughput of 1244GFlop/s is achieved at the Vertex UltraScale platform, which is 5.48 times higher than the state-of-the-art FPGA implementations.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 01:31:23 GMT" } ]
2017-03-23T00:00:00
[ [ "Han", "Xushen", "" ], [ "Zhou", "Dajiang", "" ], [ "Wang", "Shihao", "" ], [ "Kimura", "Shinji", "" ] ]
new_dataset
0.989433
1703.07499
Anibal Sanjab
Walid Saad, Anibal Sanjab, Yunpeng Wang, Charles Kamhoua, Kevin Kwiat
Hardware Trojan Detection Game: A Prospect-Theoretic Approach
IEEE Transactions on Vehicular Technology
null
null
null
cs.IT cs.CR cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Outsourcing integrated circuit (IC) manufacturing to offshore foundries has grown exponentially in recent years. Given the critical role of ICs in the control and operation of vehicular systems and other modern engineering designs, such offshore outsourcing has led to serious security threats due to the potential of insertion of hardware trojans - malicious designs that, when activated, can lead to highly detrimental consequences. In this paper, a novel game-theoretic framework is proposed to analyze the interactions between a hardware manufacturer, acting as attacker, and an IC testing facility, acting as defender. The problem is formulated as a noncooperative game in which the attacker must decide on the type of trojan that it inserts while taking into account the detection penalty as well as the damage caused by the trojan. Meanwhile, the resource-constrained defender must decide on the best testing strategy that allows optimizing its overall utility which accounts for both damages and the fines. The proposed game is based on the robust behavioral framework of prospect theory (PT) which allows capturing the potential uncertainty, risk, and irrational behavior in the decision making of both the attacker and defender. For both, the standard rational expected utility (EUT) case and the PT case, a novel algorithm based on fictitious play is proposed and shown to converge to a mixed-strategy Nash equilibrium. For an illustrative case study, thorough analytical results are derived for both EUT and PT to study the properties of the reached equilibrium as well as the impact of key system parameters such as the defender-set fine. Simulation results assess the performance of the proposed framework under both EUT and PT and show that the use of PT will provide invaluable insights on the outcomes of the proposed hardware trojan game, in particular, and system security, in general.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 02:57:19 GMT" } ]
2017-03-23T00:00:00
[ [ "Saad", "Walid", "" ], [ "Sanjab", "Anibal", "" ], [ "Wang", "Yunpeng", "" ], [ "Kamhoua", "Charles", "" ], [ "Kwiat", "Kevin", "" ] ]
new_dataset
0.955666
1703.07532
Robbie Weber
Glencora Borradaile, Jeff Erickson, Hung Le, Robbie Weber
Embedded-width: A variant of treewidth for plane graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define a special case of tree decompositions for planar graphs that respect a given embedding of the graph. We study the analogous width of the resulting decomposition we call the embedded-width of a plane graph. We show both upper bounds and lower bounds for the embedded-width of a graph in terms of its treewidth and describe a fixed parameter tractable algorithm to calculate the embedded-width of a plane graph. To do so, we give novel bounds on the size of matchings in planar graphs.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 05:29:48 GMT" } ]
2017-03-23T00:00:00
[ [ "Borradaile", "Glencora", "" ], [ "Erickson", "Jeff", "" ], [ "Le", "Hung", "" ], [ "Weber", "Robbie", "" ] ]
new_dataset
0.997908
1703.07562
Josef Spillner
Josef Spillner
Snafu: Function-as-a-Service (FaaS) Runtime Design and Implementation
15 pages, 9 figures, 4 tables, repeatable, unreviewed
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Snafu, or Snake Functions, is a modular system to host, execute and manage language-level functions offered as stateless (micro-)services to diverse external triggers. The system interfaces resemble those of commercial FaaS providers but its implementation provides distinct features which make it overall useful to research on FaaS and prototyping of FaaS-based applications. This paper argues about the system motivation in the presence of already existing alternatives, its design and architecture, the open source implementation and collected metrics which characterise the system.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 08:32:59 GMT" } ]
2017-03-23T00:00:00
[ [ "Spillner", "Josef", "" ] ]
new_dataset
0.999496
1703.07575
Jan Egger
Jan Egger, Markus Gall, J\"urgen Wallner, Pedro Boechat, Alexander Hann, Xing Li, Xiaojun Chen, Dieter Schmalstieg
HTC Vive MeVisLab integration via OpenVR for medical applications
14 pages, 11 figures, 40 references
PLoS ONE 12(3): e0173972 (2017)
10.1371/journal.pone.0173972
null
cs.GR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Virtual Reality, an immersive technology that replicates an environment via computer-simulated reality, gets a lot of attention in the entertainment industry. However, VR has also great potential in other areas, like the medical domain, Examples are intervention planning, training and simulation. This is especially of use in medical operations, where an aesthetic outcome is important, like for facial surgeries. Alas, importing medical data into Virtual Reality devices is not necessarily trivial, in particular, when a direct connection to a proprietary application is desired. Moreover, most researcher do not build their medical applications from scratch, but rather leverage platforms like MeVisLab, MITK, OsiriX or 3D Slicer. These platforms have in common that they use libraries like ITK and VTK, and provide a convenient graphical interface. However, ITK and VTK do not support Virtual Reality directly. In this study, the usage of a Virtual Reality device for medical data under the MeVisLab platform is presented. The OpenVR library is integrated into the MeVisLab platform, allowing a direct and uncomplicated usage of the head mounted display HTC Vive inside the MeVisLab platform. Medical data coming from other MeVisLab modules can directly be connected per drag-and-drop to the Virtual Reality module, rendering the data inside the HTC Vive for immersive virtual reality inspection.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 09:21:00 GMT" } ]
2017-03-23T00:00:00
[ [ "Egger", "Jan", "" ], [ "Gall", "Markus", "" ], [ "Wallner", "Jürgen", "" ], [ "Boechat", "Pedro", "" ], [ "Hann", "Alexander", "" ], [ "Li", "Xing", "" ], [ "Chen", "Xiaojun", "" ], [ "Schmalstieg", "Dieter", "" ] ]
new_dataset
0.997383
1703.07578
Doli\`ere Francis Som\'e
Doli\`ere Francis Som\'e, Nataliia Bielova and Tamara Rezk
Control What You Include! Server-Side Protection against Third Party Web Tracking
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Third party tracking is the practice by which third parties recognize users accross different websites as they browse the web. Recent studies show that 90% of websites contain third party content that is tracking its users across the web. Website developers often need to include third party content in order to provide basic functionality. However, when a developer includes a third party content, she cannot know whether the third party contains tracking mechanisms. If a website developer wants to protect her users from being tracked, the only solution is to exclude any third-party content, thus trading functionality for privacy. We describe and implement a privacy-preserving web architecture that gives website developers a control over third party tracking: developers are able to include functionally useful third party content, the same time ensuring that the end users are not tracked by the third parties.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 09:23:54 GMT" } ]
2017-03-23T00:00:00
[ [ "Somé", "Dolière Francis", "" ], [ "Bielova", "Nataliia", "" ], [ "Rezk", "Tamara", "" ] ]
new_dataset
0.970693
1703.07619
Adnan Aijaz
Adnan Aijaz
Comments on "CRB-RPL: A Receiver-based Routing Protocol for Communications in Cognitive Radio Enabled Smart Grid"
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A recent paper by Yang et al. [1] proposed CRB-RPL as a new RPL-based routing protocol for communications in cognitive radio (CR) enabled smart grid. Essentially, CRB-RPL adopts the operation of CRB-MAC, which is a medium access control (MAC) protocol for cognitive machine-to-machine (M2M) communications, and depicts it as a network layer enhancement. CRB-RPL suffers from a number of technical flaws in terms of protocol operation and analytical aspects. The main objective of this paper is to highlight these technical flaws of CRB-RPL and provide corrections to analytical modeling.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 12:29:26 GMT" } ]
2017-03-23T00:00:00
[ [ "Aijaz", "Adnan", "" ] ]
new_dataset
0.999106
1703.07751
Ben Nassi
Ben Nassi, Adi Shamir, Yuval Elovici
Oops!...I think I scanned a malware
Cyber-Security, Covert Channel, Data Infiltration, Scanner
null
null
null
cs.CR
http://creativecommons.org/publicdomain/zero/1.0/
This article presents a proof-of-concept illustrating the feasibility of creating a covert channel between a C\&C server and a malware installed in an organization by exploiting an organization's scanner and using it as a means of interaction. We take advantage of the light sensitivity of a flatbed scanner, using a light source to infiltrate data to an organization. We present an implementation of the method for different purposes (even to trigger a ransomware attack) in various experimental setups using: (1) a laser connected to a stand (2) a laser carried by a drone, and (3) a hijacked smart bulb within the targeted organization from a passing car. In our experiments we were able to infiltrate data using different types of light sources (including infrared light), from a distance of up to 900 meters away from the scanner. We discuss potential counter measures to prevent the attack.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 17:12:20 GMT" } ]
2017-03-23T00:00:00
[ [ "Nassi", "Ben", "" ], [ "Shamir", "Adi", "" ], [ "Elovici", "Yuval", "" ] ]
new_dataset
0.997048
1703.07765
Ke Yang
Qammer H. Abbasi, Ali Arshad Nasir, Ke Yang, Khalid Qaraqe, Akram Alomainy
Cooperative In-Vivo Nano-Network Communication at Terahertz Frequencies
5 pages, 8 figures
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nano devices have great potential to play a vital role in future medical diagnostics and treatment technologies because of its non-invasive nature and ability to reach delicate body sites easily as compared to conventional devices. In this paper, a novel concept of cooperative communication for in-vivo nano-network is presented to enhance the communication among these devices. The effect on the system outage probability performance is conducted for various parameters including relay lacement, number of relays, transmit power, bandwidth and carrier frequency. Results show approximately a 10-fold increase in the system outage performance whenever an additional relay is included in the cooperative network, hence show a great potential of using cooperative communication to enhance the performance of nano-network at terahertz frequencies.
[ { "version": "v1", "created": "Wed, 22 Mar 2017 17:44:01 GMT" } ]
2017-03-23T00:00:00
[ [ "Abbasi", "Qammer H.", "" ], [ "Nasir", "Ali Arshad", "" ], [ "Yang", "Ke", "" ], [ "Qaraqe", "Khalid", "" ], [ "Alomainy", "Akram", "" ] ]
new_dataset
0.983886
1611.08906
Yiannis Andreopoulos
Aaron Chadha and Yiannis Andreopoulos
Voronoi-based compact image descriptors: Efficient Region-of-Interest retrieval with VLAD and deep-learning-based descriptors
IEEE Transaction on Multimedia, to appear
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the problem of image retrieval based on visual queries when the latter comprise arbitrary regions-of-interest (ROI) rather than entire images. Our proposal is a compact image descriptor that combines the state-of-the-art in content-based descriptor extraction with a multi-level, Voronoi-based spatial partitioning of each dataset image. The proposed multi-level Voronoi-based encoding uses a spatial hierarchical K-means over interest-point locations, and computes a content-based descriptor over each cell. In order to reduce the matching complexity with minimal or no sacrifice in retrieval performance: (i) we utilize the tree structure of the spatial hierarchical K-means to perform a top-to-bottom pruning for local similarity maxima; (ii) we propose a new image similarity score that combines relevant information from all partition levels into a single measure for similarity; (iii) we combine our proposal with a novel and efficient approach for optimal bit allocation within quantized descriptor representations. By deriving both a Voronoi-based VLAD descriptor (termed as Fast-VVLAD) and a Voronoi-based deep convolutional neural network (CNN) descriptor (termed as Fast-VDCNN), we demonstrate that our Voronoi-based framework is agnostic to the descriptor basis, and can easily be slotted into existing frameworks. Via a range of ROI queries in two standard datasets, it is shown that the Voronoi-based descriptors achieve comparable or higher mean Average Precision against conventional grid-based spatial search, while offering more than two-fold reduction in complexity. Finally, beyond ROI queries, we show that Voronoi partitioning improves the geometric invariance of compact CNN descriptors, thereby resulting in competitive performance to the current state-of-the-art on whole image retrieval.
[ { "version": "v1", "created": "Sun, 27 Nov 2016 20:35:48 GMT" }, { "version": "v2", "created": "Mon, 20 Mar 2017 18:37:56 GMT" } ]
2017-03-22T00:00:00
[ [ "Chadha", "Aaron", "" ], [ "Andreopoulos", "Yiannis", "" ] ]
new_dataset
0.996776
1701.04733
Ahsan Humayun Mr.
Ahsan Humayun, Dr.Muhammad Asif, Dr.Muhammmad Kashif Hanif
BTAS: A Library for Tropical Algebra
null
International Journal of Computer Science and Information Security 2016 Volume 14 No.12
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
GPUs are dedicated processors used for complex calculations and simulations and they can be effectively used for tropical algebra computations. Tropical algebra is based on max-plus algebra and min-plus algebra. In this paper we proposed and designed a library based on Tropical Algebra which is used to provide standard vector and matrix operations namely Basic Tropical Algebra Subroutines (BTAS). The testing of BTAS library is conducted by implementing the sequential version of Floyd Warshall Algorithm on CPU and furthermore parallel version on GPU. The developed library for tropical algebra delivered extensively better results on a less expensive GPU as compared to the same on CPU.
[ { "version": "v1", "created": "Tue, 17 Jan 2017 15:44:41 GMT" } ]
2017-03-22T00:00:00
[ [ "Humayun", "Ahsan", "" ], [ "Asif", "Dr. Muhammad", "" ], [ "Hanif", "Dr. Muhammmad Kashif", "" ] ]
new_dataset
0.999703
1701.08294
Yong Yao
Jia Xu and Yong Yao
A proof of Hilbert's theorem on ternary quartic forms with the ladder technique
9 pages
null
null
null
cs.SC math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a totally constructive approach for the proof of Hilbert's theorem on ternary quartic forms. The main contribution is the ladder technique, with which the Hilbert's theorem is proved vividly.
[ { "version": "v1", "created": "Sat, 28 Jan 2017 15:43:32 GMT" }, { "version": "v2", "created": "Tue, 21 Mar 2017 06:46:08 GMT" } ]
2017-03-22T00:00:00
[ [ "Xu", "Jia", "" ], [ "Yao", "Yong", "" ] ]
new_dataset
0.99508
1703.05161
Christian Reinbacher
Christian Reinbacher and Gottfried Munda and Thomas Pock
Real-Time Panoramic Tracking for Event Cameras
Accepted to International Conference on Computational Photography 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Event cameras are a paradigm shift in camera technology. Instead of full frames, the sensor captures a sparse set of events caused by intensity changes. Since only the changes are transferred, those cameras are able to capture quick movements of objects in the scene or of the camera itself. In this work we propose a novel method to perform camera tracking of event cameras in a panoramic setting with three degrees of freedom. We propose a direct camera tracking formulation, similar to state-of-the-art in visual odometry. We show that the minimal information needed for simultaneous tracking and mapping is the spatial position of events, without using the appearance of the imaged scene point. We verify the robustness to fast camera movements and dynamic objects in the scene on a recently proposed dataset and self-recorded sequences.
[ { "version": "v1", "created": "Wed, 15 Mar 2017 14:03:47 GMT" }, { "version": "v2", "created": "Tue, 21 Mar 2017 13:08:49 GMT" } ]
2017-03-22T00:00:00
[ [ "Reinbacher", "Christian", "" ], [ "Munda", "Gottfried", "" ], [ "Pock", "Thomas", "" ] ]
new_dataset
0.997678
1703.05240
Bernardo Furtado
Francis Tseng, Fei Liu, Bernardo Alves Furtado
Humans of Simulated New York (HOSNY): an exploratory comprehensive model of city life
18 pages, 5 figures, submitted (in review), typos corrected
null
null
null
cs.MA q-fin.EC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The model presented in this paper experiments with a comprehensive simulant agent in order to provide an exploratory platform in which simulation modelers may try alternative scenarios and participation in policy decision-making. The framework is built in a computationally distributed online format in which users can join in and visually explore the results. Modeled activity involves daily routine errands, such as shopping, visiting the doctor or engaging in the labor market. Further, agents make everyday decisions based on individual behavioral attributes and minimal requirements, according to social and contagion networks. Fully developed firms and governments are also included in the model allowing for taxes collection, production decisions, bankruptcy and change in ownership. The contributions to the literature are multifold. They include (a) a comprehensive model with detailing of the agents and firms' activities and processes and original use of simultaneously (b) reinforcement learning for firm pricing and demand allocation; (c) social contagion for disease spreading and social network for hiring opportunities; and (d) Bayesian networks for demographic-like generation of agents. All of that within a (e) visually rich environment and multiple use of databases. Hence, the model provides a comprehensive framework from where interactions among citizens, firms and governments can be easily explored allowing for learning and visualization of policies and scenarios.
[ { "version": "v1", "created": "Wed, 15 Mar 2017 16:33:18 GMT" }, { "version": "v2", "created": "Tue, 21 Mar 2017 17:38:04 GMT" } ]
2017-03-22T00:00:00
[ [ "Tseng", "Francis", "" ], [ "Liu", "Fei", "" ], [ "Furtado", "Bernardo Alves", "" ] ]
new_dataset
0.950156
1703.06930
Nicole Chan
Nicole Chan, Sayan Mitra
Verifying safety of an autonomous spacecraft rendezvous mission
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A fundamental maneuver in autonomous space operations is known as rendezvous, where a spacecraft navigates to and approaches another spacecraft. In this case study, we present linear and nonlinear benchmark models of an active chaser spacecraft performing rendezvous toward a passive, orbiting target. The system is modeled as a hybrid automaton, where the chaser must adhere to different sets of constraints in each discrete mode. A switched LQR controller is designed accordingly to meet this collection of physical and geometric safety constraints, while maintaining liveness in navigating toward the target spacecraft. We extend this benchmark problem to check for passive safety, which is collision avoidance along a passive, propulsion-free trajectory that may be followed in the event of system failures. We show that existing hybrid verification tools like SpaceEx, C2E2, and our own implementation of a simulation-driven verification tool can robustly verify this system with respect to the requirements, and a variety of relevant initial conditions.
[ { "version": "v1", "created": "Mon, 20 Mar 2017 19:15:56 GMT" } ]
2017-03-22T00:00:00
[ [ "Chan", "Nicole", "" ], [ "Mitra", "Sayan", "" ] ]
new_dataset
0.998921
1703.07139
Panos Alevizos
Panos N. Alevizos and Aggelos Bletsas
Scatter Radio Receivers for Extended Range Environmental Sensing WSNs
null
in Proceeding of IEEE Communications Workshop, May 2016, Nafplio, Greece
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Backscatter communication, relying on the reflection principle, constitutes a promising-enabling technology for lowcost, large-scale, ubiquitous sensor networking. This work makes an overview of the state-of-the-art coherent and noncoherent scatter radio receivers that account for the peculiar signal model consisting of several microwave and communication parameters.
[ { "version": "v1", "created": "Tue, 21 Mar 2017 10:49:50 GMT" } ]
2017-03-22T00:00:00
[ [ "Alevizos", "Panos N.", "" ], [ "Bletsas", "Aggelos", "" ] ]
new_dataset
0.991846
1703.07206
Carlos M\'alaga Dr.
J. T. Becerra-Sagredo, F. Mandujano and C. Malaga
A GPU-based Multi-level Algorithm for Boundary Value Problems
14 pages, 7 figures
null
null
null
cs.MS cs.NA physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel and scalable geometric multi-level algorithm is presented for the numerical solution of elliptic partial differential equations, specially designed to run with high occupancy of streaming processors inside Graphics Processing Units(GPUs). The algorithm consists of iterative, superposed operations on a single grid, and it is composed of two simple full-grid routines: a restriction and a coarsened interpolation-relaxation. The restriction is used to collect sources using recursive coarsened averages, and the interpolation-relaxation simultaneously applies coarsened finite-difference operators and interpolations. The routines are scheduled in a saw-like refining cycle. Convergence to machine precision is achieved repeating the full cycle using accumulated residuals and successively collecting the solution. Its total number of operations scale linearly with the number of nodes. It provides an attractive fast solver for Boundary Value Problems (BVPs), specially for simulations running entirely in the GPU. Applications shown in this work include the deformation of two-dimensional grids, the computation of three-dimensional streamlines for a singular trifoil-knot vortex and the calculation of three-dimensional electric potentials in heterogeneous dielectric media.
[ { "version": "v1", "created": "Thu, 16 Mar 2017 15:35:08 GMT" } ]
2017-03-22T00:00:00
[ [ "Becerra-Sagredo", "J. T.", "" ], [ "Mandujano", "F.", "" ], [ "Malaga", "C.", "" ] ]
new_dataset
0.974786
1703.07286
Johannes Schemmel
Johannes Schemmel, Laura Kriener, Paul M\"uller, Karlheinz Meier
An Accelerated Analog Neuromorphic Hardware System Emulating NMDA- and Calcium-Based Non-Linear Dendrites
Accepted at IJCNN 2017
null
null
null
cs.NE cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an extension of the BrainScaleS accelerated analog neuromorphic hardware model. The scalable neuromorphic architecture is extended by the support for multi-compartment models and non-linear dendrites. These features are part of a \SI{65}{\nano\meter} prototype ASIC. It allows to emulate different spike types observed in cortical pyramidal neurons: NMDA plateau potentials, calcium and sodium spikes. By replicating some of the structures of these cells, they can be configured to perform coincidence detection within a single neuron. Built-in plasticity mechanisms can modify not only the synaptic weights, but also the dendritic synaptic composition to efficiently train large multi-compartment neurons. Transistor-level simulations demonstrate the functionality of the analog implementation and illustrate analogies to biological measurements.
[ { "version": "v1", "created": "Tue, 21 Mar 2017 15:43:18 GMT" } ]
2017-03-22T00:00:00
[ [ "Schemmel", "Johannes", "" ], [ "Kriener", "Laura", "" ], [ "Müller", "Paul", "" ], [ "Meier", "Karlheinz", "" ] ]
new_dataset
0.973278
1410.2231
David Eppstein
Brad Ballinger and Mirela Damian and David Eppstein and Robin Flatland and Jessica Ginepro and Thomas Hull
Minimum Forcing Sets for Miura Folding Patterns
20 pages, 16 figures. To appear at the ACM/SIAM Symp. on Discrete Algorithms (SODA 2015)
ACM-SIAM Symposium on Discrete Algorithms (SODA15), (2015), 136-147
null
null
cs.DS cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the study of forcing sets in mathematical origami. The origami material folds flat along straight line segments called creases, each of which is assigned a folding direction of mountain or valley. A subset $F$ of creases is forcing if the global folding mountain/valley assignment can be deduced from its restriction to $F$. In this paper we focus on one particular class of foldable patterns called Miura-ori, which divide the plane into congruent parallelograms using horizontal lines and zig-zag vertical lines. We develop efficient algorithms for constructing a minimum forcing set of a Miura-ori map, and for deciding whether a given set of creases is forcing or not. We also provide tight bounds on the size of a forcing set, establishing that the standard mountain-valley assignment for the Miura-ori is the one that requires the most creases in its forcing sets. Additionally, given a partial mountain/valley assignment to a subset of creases of a Miura-ori map, we determine whether the assignment domain can be extended to a locally flat-foldable pattern on all the creases. At the heart of our results is a novel correspondence between flat-foldable Miura-ori maps and $3$-colorings of grid graphs.
[ { "version": "v1", "created": "Wed, 8 Oct 2014 19:46:21 GMT" } ]
2017-03-21T00:00:00
[ [ "Ballinger", "Brad", "" ], [ "Damian", "Mirela", "" ], [ "Eppstein", "David", "" ], [ "Flatland", "Robin", "" ], [ "Ginepro", "Jessica", "" ], [ "Hull", "Thomas", "" ] ]
new_dataset
0.957133
1607.06891
Najmeh Miramirkhani
Najmeh Miramirkhani, Oleksii Starov, Nick Nikiforakis
Dial One for Scam: A Large-Scale Analysis of Technical Support Scams
This paper was published in NDSS 2017
null
10.14722/ndss.2017.23163
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In technical support scams, cybercriminals attempt to convince users that their machines are infected with malware and are in need of their technical support. In this process, the victims are asked to provide scammers with remote access to their machines, who will then "diagnose the problem", before offering their support services which typically cost hundreds of dollars. Despite their conceptual simplicity, technical support scams are responsible for yearly losses of tens of millions of dollars from everyday users of the web. In this paper, we report on the first systematic study of technical support scams and the call centers hidden behind them. We identify malvertising as a major culprit for exposing users to technical support scams and use it to build an automated system capable of discovering, on a weekly basis, hundreds of phone numbers and domains operated by scammers. By allowing our system to run for more than 8 months we collect a large corpus of technical support scams and use it to provide insights on their prevalence, the abused infrastructure, the illicit profits, and the current evasion attempts of scammers. Finally, by setting up a controlled, IRB-approved, experiment where we interact with 60 different scammers, we experience first-hand their social engineering tactics, while collecting detailed statistics of the entire process. We explain how our findings can be used by law-enforcing agencies and propose technical and educational countermeasures for helping users avoid being victimized by technical support scams.
[ { "version": "v1", "created": "Sat, 23 Jul 2016 04:57:16 GMT" }, { "version": "v2", "created": "Tue, 14 Mar 2017 18:36:58 GMT" }, { "version": "v3", "created": "Sun, 19 Mar 2017 18:25:32 GMT" } ]
2017-03-21T00:00:00
[ [ "Miramirkhani", "Najmeh", "" ], [ "Starov", "Oleksii", "" ], [ "Nikiforakis", "Nick", "" ] ]
new_dataset
0.999766
1703.03905
Alireza Poshtkohi
Alireza Poshtkohi, M.B. Ghaznavi-Ghoushchi
DotDFS: A Grid-based high-throughput file transfer system
28 pages, 21 figures
Parallel Computing, 37 (2011) 114-136
10.1016/j.parco.2010.12.003
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
DotGrid platform is a Grid infrastructure integrated with a set of open and standard protocols recently implemented on the top of Microsoft .NET in Windows and MONO .NET in UNIX/Linux. DotGrid infrastructure along with its proposed protocols provides a right and solid approach to targeting other platforms, e.g., the native C/C++ runtime. In this paper, we propose a new file transfer protocol called DotDFS as a high-throughput distributed file transfer component for DotGrid. DotDFS introduces some open binary protocols for efficient file transfers on current Grid infrastructures. DotDFS protocol also provides mechanisms for multiple file streams to gain high-throughput file transfer similar to GridFTP protocol, but by proposing and implementing a new parallel TCP connection-oriented paradigm. In our LAN tests, we have achieved better results than Globus GridFTP implementation particularly in multiple TCP streams and directory tree transfers. Our LAN experiences in memory-to-memory tests show that DotDFS accesses to the 94% bottleneck bandwidth while GridFTP is accessing 91%. In LAN disk-to-disk tests, comparing DotDFS protocol with GridFTP protocol unveils a set of interesting and technical problems in GridFTP for both the nature of the protocol and its implementation by Globus. In the WAN experimental studies, we propose a new idea for analytical modeling of file transfer protocols like DotDFS inspired by sampling, experimentation and mathematical interpolation approaches. The cross-platform and open standard-based features of DotDFS provide a substantial framework for unifying data access and resource sharing in real heterogeneous Grid environments.
[ { "version": "v1", "created": "Sat, 11 Mar 2017 04:17:07 GMT" }, { "version": "v2", "created": "Sat, 18 Mar 2017 08:47:54 GMT" } ]
2017-03-21T00:00:00
[ [ "Poshtkohi", "Alireza", "" ], [ "Ghaznavi-Ghoushchi", "M. B.", "" ] ]
new_dataset
0.997429
1703.06137
Y F Li
F Li
Chaotic-Based Processor for Communication and Multimedia Applications
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Chaos is a phenomenon that attracted much attention in the past ten years. In this paper, we analyze chaos-based signal processing, and proposed a chaos processor to take advantage of chaos phenomenon. We also analyzed and demonstrated two of its practical applications in communication and sound synthesis.
[ { "version": "v1", "created": "Fri, 17 Mar 2017 06:01:58 GMT" } ]
2017-03-21T00:00:00
[ [ "Li", "F", "" ] ]
new_dataset
0.997565
1703.06256
Chunde Huang
Chunde Huang, Jiaxiang Huang
A Fast HOG Descriptor Using Lookup Table and Integral Image
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The histogram of oriented gradients (HOG) is a widely used feature descriptor in computer vision for the purpose of object detection. In the paper, a modified HOG descriptor is described, it uses a lookup table and the method of integral image to speed up the detection performance by a factor of 5~10. By exploiting the special hardware features of a given platform(e.g. a digital signal processor), further improvement can be made to the HOG descriptor in order to have real-time object detection and tracking.
[ { "version": "v1", "created": "Sat, 18 Mar 2017 04:58:32 GMT" } ]
2017-03-21T00:00:00
[ [ "Huang", "Chunde", "" ], [ "Huang", "Jiaxiang", "" ] ]
new_dataset
0.998655
1703.06573
EPTCS
Hubert Garavel, Lina Marsso
A Large Term Rewrite System Modelling a Pioneering Cryptographic Algorithm
In Proceedings MARS 2017, arXiv:1703.05812
EPTCS 244, 2017, pp. 129-183
10.4204/EPTCS.244.6
null
cs.CR cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a term rewrite system that formally models the Message Authenticator Algorithm (MAA), which was one of the first cryptographic functions for computing a Message Authentication Code and was adopted, between 1987 and 2001, in international standards (ISO 8730 and ISO 8731-2) to ensure the authenticity and integrity of banking transactions. Our term rewrite system is large (13 sorts, 18 constructors, 644 non-constructors, and 684 rewrite rules), confluent, and terminating. Implementations in thirteen different languages have been automatically derived from this model and used to validate 200 official test vectors for the MAA.
[ { "version": "v1", "created": "Mon, 20 Mar 2017 02:48:31 GMT" } ]
2017-03-21T00:00:00
[ [ "Garavel", "Hubert", "" ], [ "Marsso", "Lina", "" ] ]
new_dataset
0.966784
1703.06575
EPTCS
Marc Bouissou (EDF R&D)
A Benchmark on Reliability of Complex Discrete Systems: Emergency Power Supply of a Nuclear Power Plant
In Proceedings MARS 2017, arXiv:1703.05812
EPTCS 244, 2017, pp. 200-216
10.4204/EPTCS.244.8
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper contains two parts: the description of a real electrical system, with many redundancies, reconfigurations and repairs, then the description of a reliability model of this system, based on the BDMP (Boolean logic Driven Markov Processes) formalism and partial results of a reliability and availability calculation made from this model.
[ { "version": "v1", "created": "Mon, 20 Mar 2017 02:49:04 GMT" } ]
2017-03-21T00:00:00
[ [ "Bouissou", "Marc", "", "EDF R&D" ] ]
new_dataset
0.999476
1703.06587
Han Tian
Han Tian, Hankz Hankui Zhuo
Paper2vec: Citation-Context Based Document Distributed Representation for Scholar Recommendation
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to the availability of references of research papers and the rich information contained in papers, various citation analysis approaches have been proposed to identify similar documents for scholar recommendation. Despite of the success of previous approaches, they are, however, based on co-occurrence of items. Once there are no co-occurrence items available in documents, they will not work well. Inspired by distributed representations of words in the literature of natural language processing, we propose a novel approach to measuring the similarity of papers based on distributed representations learned from the citation context of papers. We view the set of papers as the vocabulary, define the weighted citation context of papers, and convert it to weight matrix similar to the word-word cooccurrence matrix in natural language processing. After that we explore a variant of matrix factorization approach to train distributed representations of papers on the matrix, and leverage the distributed representations to measure similarities of papers. In the experiment, we exhibit that our approach outperforms state-of-theart citation-based approaches by 25%, and better than other distributed representation based methods.
[ { "version": "v1", "created": "Mon, 20 Mar 2017 03:53:48 GMT" } ]
2017-03-21T00:00:00
[ [ "Tian", "Han", "" ], [ "Zhuo", "Hankz Hankui", "" ] ]
new_dataset
0.999078
1703.06618
Yuting Hu
Yuting Hu, Liang Zheng, Yi Yang, and Yongfeng Huang
Twitter100k: A Real-world Dataset for Weakly Supervised Cross-Media Retrieval
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper contributes a new large-scale dataset for weakly supervised cross-media retrieval, named Twitter100k. Current datasets, such as Wikipedia, NUS Wide and Flickr30k, have two major limitations. First, these datasets are lacking in content diversity, i.e., only some pre-defined classes are covered. Second, texts in these datasets are written in well-organized language, leading to inconsistency with realistic applications. To overcome these drawbacks, the proposed Twitter100k dataset is characterized by two aspects: 1) it has 100,000 image-text pairs randomly crawled from Twitter and thus has no constraint in the image categories; 2) text in Twitter100k is written in informal language by the users. Since strongly supervised methods leverage the class labels that may be missing in practice, this paper focuses on weakly supervised learning for cross-media retrieval, in which only text-image pairs are exploited during training. We extensively benchmark the performance of four subspace learning methods and three variants of the Correspondence AutoEncoder, along with various text features on Wikipedia, Flickr30k and Twitter100k. Novel insights are provided. As a minor contribution, inspired by the characteristic of Twitter100k, we propose an OCR-based cross-media retrieval method. In experiment, we show that the proposed OCR-based method improves the baseline performance.
[ { "version": "v1", "created": "Mon, 20 Mar 2017 06:56:33 GMT" } ]
2017-03-21T00:00:00
[ [ "Hu", "Yuting", "" ], [ "Zheng", "Liang", "" ], [ "Yang", "Yi", "" ], [ "Huang", "Yongfeng", "" ] ]
new_dataset
0.999835
1703.06811
Boris \v{S}kori\'c
Taras Stanko and Boris Skoric
Minutia-pair spectral representations for fingerprint template protection
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new fixed-length representation of fingerprint minutiae, for use in template protection. It is similar to the `spectral minutiae' representation of Xu et al. but is based on coordinate differences between pairs of minutiae. Our technique has the advantage that it does not discard the phase information of the spectral functions. We show that the fingerprint matching performance (Equal Error Rate) is comparable to that of the original spectral minutiae representation, while the speed is improved.
[ { "version": "v1", "created": "Mon, 20 Mar 2017 15:55:53 GMT" } ]
2017-03-21T00:00:00
[ [ "Stanko", "Taras", "" ], [ "Skoric", "Boris", "" ] ]
new_dataset
0.992791
1603.06036
Hongteng Xu
Hongteng Xu and Junchi Yan and Nils Persson and Weiyao Lin and Hongyuan Zha
Fractal Dimension Invariant Filtering and Its CNN-based Implementation
CVPR 2017
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fractal analysis has been widely used in computer vision, especially in texture image processing and texture analysis. The key concept of fractal-based image model is the fractal dimension, which is invariant to bi-Lipschitz transformation of image, and thus capable of representing intrinsic structural information of image robustly. However, the invariance of fractal dimension generally does not hold after filtering, which limits the application of fractal-based image model. In this paper, we propose a novel fractal dimension invariant filtering (FDIF) method, extending the invariance of fractal dimension to filtering operations. Utilizing the notion of local self-similarity, we first develop a local fractal model for images. By adding a nonlinear post-processing step behind anisotropic filter banks, we demonstrate that the proposed filtering method is capable of preserving the local invariance of the fractal dimension of image. Meanwhile, we show that the FDIF method can be re-instantiated approximately via a CNN-based architecture, where the convolution layer extracts anisotropic structure of image and the nonlinear layer enhances the structure via preserving local fractal dimension of image. The proposed filtering method provides us with a novel geometric interpretation of CNN-based image model. Focusing on a challenging image processing task --- detecting complicated curves from the texture-like images, the proposed method obtains superior results to the state-of-art approaches.
[ { "version": "v1", "created": "Sat, 19 Mar 2016 03:29:57 GMT" }, { "version": "v2", "created": "Thu, 10 Nov 2016 05:03:45 GMT" }, { "version": "v3", "created": "Fri, 17 Mar 2017 03:10:56 GMT" } ]
2017-03-20T00:00:00
[ [ "Xu", "Hongteng", "" ], [ "Yan", "Junchi", "" ], [ "Persson", "Nils", "" ], [ "Lin", "Weiyao", "" ], [ "Zha", "Hongyuan", "" ] ]
new_dataset
0.977489
1701.01663
Cicero Carvalho
C\'icero Carvalho and Victor G.L. Neumann
On the next-to-minimal weight of projective Reed-Muller codes
9 pages. arXiv admin note: text overlap with arXiv:1701.01658
null
null
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present several values for the next-to-minimal weights of projective Reed-Muller codes. We work over $\mathbb{F}_q$ with $q \geq 3$ since in IEEE-IT 62(11) p. 6300-6303 (2016) we have determined the complete values for the next-to-minimal weights of binary projective Reed-Muller codes. As in loc. cit. here we also find examples of codewords with next-to-minimal weight whose set of zeros is not in a hyperplane arrangement.
[ { "version": "v1", "created": "Fri, 6 Jan 2017 15:29:45 GMT" } ]
2017-03-20T00:00:00
[ [ "Carvalho", "Cícero", "" ], [ "Neumann", "Victor G. L.", "" ] ]
new_dataset
0.999156
1701.04224
Chunlin Tian
Chunlin Tian, Weijun Ji
Auxiliary Multimodal LSTM for Audio-visual Speech Recognition and Lipreading
8 pages, 4 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Aduio-visual Speech Recognition (AVSR) which employs both the video and audio information to do Automatic Speech Recognition (ASR) is one of the application of multimodal leaning making ASR system more robust and accuracy. The traditional models usually treated AVSR as inference or projection but strict prior limits its ability. As the revival of deep learning, Deep Neural Networks (DNN) becomes an important toolkit in many traditional classification tasks including ASR, image classification, natural language processing. Some DNN models were used in AVSR like Multimodal Deep Autoencoders (MDAEs), Multimodal Deep Belief Network (MDBN) and Multimodal Deep Boltzmann Machine (MDBM) that actually work better than traditional methods. However, such DNN models have several shortcomings: (1) They don't balance the modal fusion and temporal fusion, or even haven't temporal fusion; (2)The architecture of these models isn't end-to-end, the training and testing getting cumbersome. We propose a DNN model, Auxiliary Multimodal LSTM (am-LSTM), to overcome such weakness. The am-LSTM could be trained and tested once, moreover easy to train and preventing overfitting automatically. The extensibility and flexibility are also take into consideration. The experiments show that am-LSTM is much better than traditional methods and other DNN models in three datasets.
[ { "version": "v1", "created": "Mon, 16 Jan 2017 10:08:22 GMT" }, { "version": "v2", "created": "Fri, 17 Mar 2017 14:57:06 GMT" } ]
2017-03-20T00:00:00
[ [ "Tian", "Chunlin", "" ], [ "Ji", "Weijun", "" ] ]
new_dataset
0.997692
1702.04872
Daoyuan Wu
Daoyuan Wu and Ximing Liu and Jiayun Xu and David Lo and Debin Gao
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps
This paper has been accepted by WASA 2017 (http://wasa-conference.org/WASA2017/). It is originally a course project paper done by the first three authors in April 2016
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Android has been the most popular smartphone system, with multiple platform versions (e.g., KITKAT and Lollipop) active in the market. To manage the application's compatibility with one or more platform versions, Android allows apps to declare the supported platform SDK versions in their manifest files. In this paper, we make a first effort to study this modern software mechanism. Our objective is to measure the current practice of the declared SDK versions (which we term as DSDK versions afterwards) in real apps, and the consistency between the DSDK versions and their app API calls. To this end, we perform a three-dimensional analysis. First, we parse Android documents to obtain a mapping between each API and their corresponding platform versions. We then analyze the DSDK-API consistency for over 24K apps, among which we pre-exclude 1.3K apps that provide different app binaries for different Android versions through Google Play analysis. Besides shedding light on the current DSDK practice, our study quantitatively measures the two side effects of inappropriate DSDK versions: (i) around 1.8K apps have API calls that do not exist in some declared SDK versions, which causes runtime crash bugs on those platform versions; (ii) over 400 apps, due to claiming the outdated targeted DSDK versions, are potentially exploitable by remote code execution. These results indicate the importance and difficulty of declaring correct DSDK, and our work can help developers fulfill this goal.
[ { "version": "v1", "created": "Thu, 16 Feb 2017 06:46:07 GMT" }, { "version": "v2", "created": "Fri, 17 Mar 2017 09:36:08 GMT" } ]
2017-03-20T00:00:00
[ [ "Wu", "Daoyuan", "" ], [ "Liu", "Ximing", "" ], [ "Xu", "Jiayun", "" ], [ "Lo", "David", "" ], [ "Gao", "Debin", "" ] ]
new_dataset
0.998735
1702.05074
Myna Vajha
Myna Vajha, Vinayak Ramkumar and P. Vijay Kumar
Binary, Shortened Projective Reed Muller Codes for Coded Private Information Retrieval
submitted to ISIT 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of a Private Information Retrieval (PIR) code was recently introduced by Fazeli, Vardy and Yaakobi who showed that this class of codes permit PIR at reduced levels of storage overhead in comparison with replicated-server PIR. In the present paper, the construction of an $(n,k)$ $\tau$-server binary, linear PIR code having parameters $n = \sum\limits_{i = 0}^{\ell} {m \choose i}$, $k = {m \choose \ell}$ and $\tau = 2^{\ell}$ is presented. These codes are obtained through homogeneous-polynomial evaluation and correspond to the binary, Projective Reed Muller (PRM) code. The construction can be extended to yield PIR codes for any $\tau$ of the form $2^{\ell}$, $2^{\ell}-1$ and any value of $k$, through a combination of single-symbol puncturing and shortening of the PRM code. Each of these code constructions above, have smaller storage overhead in comparison with other PIR codes appearing in the literature. For the particular case of $\tau=3,4$, we show that the codes constructed here are optimal, systematic PIR codes by providing an improved lower bound on the block length $n(k, \tau)$ of a systematic PIR code. It follows from a result by Vardy and Yaakobi, that these codes also yield optimal, systematic primitive multi-set $(n, k, \tau)_B$ batch codes for $\tau=3,4$. The PIR code constructions presented here also yield upper bounds on the generalized Hamming weights of binary PRM codes.
[ { "version": "v1", "created": "Thu, 16 Feb 2017 18:29:10 GMT" }, { "version": "v2", "created": "Fri, 17 Mar 2017 08:34:52 GMT" } ]
2017-03-20T00:00:00
[ [ "Vajha", "Myna", "" ], [ "Ramkumar", "Vinayak", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.993303
1703.05807
Nathan McDonald
Nathan McDonald
Reservoir Computing and Extreme Learning Machines using Pairs of Cellular Automata Rules
accepted to International Joint Conference on Neural Networks (IJCNN 2017)
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A framework for implementing reservoir computing (RC) and extreme learning machines (ELMs), two types of artificial neural networks, based on 1D elementary Cellular Automata (CA) is presented, in which two separate CA rules explicitly implement the minimum computational requirements of the reservoir layer: hyperdimensional projection and short-term memory. CAs are cell-based state machines, which evolve in time in accordance with local rules based on a cells current state and those of its neighbors. Notably, simple single cell shift rules as the memory rule in a fixed edge CA afforded reasonable success in conjunction with a variety of projection rules, potentially significantly reducing the optimal solution search space. Optimal iteration counts for the CA rule pairs can be estimated for some tasks based upon the category of the projection rule. Initial results support future hardware realization, where CAs potentially afford orders of magnitude reduction in size, weight, and power (SWaP) requirements compared with floating point RC implementations.
[ { "version": "v1", "created": "Thu, 16 Mar 2017 19:33:57 GMT" } ]
2017-03-20T00:00:00
[ [ "McDonald", "Nathan", "" ] ]
new_dataset
0.965392
1703.05819
Dmytro Karamshuk
Dmytro Karamshuk, Tetyana Lokot, Oleksandr Pryymak, Nishanth Sastry
Identifying Partisan Slant in News Articles and Twitter during Political Crises
International Conference on Social Informatics (SocInfo 2016)
null
10.1007/978-3-319-47880-7_16
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we are interested in understanding the interrelationships between mainstream and social media in forming public opinion during mass crises, specifically in regards to how events are framed in the mainstream news and on social networks and to how the language used in those frames may allow to infer political slant and partisanship. We study the lingual choices for political agenda setting in mainstream and social media by analyzing a dataset of more than 40M tweets and more than 4M news articles from the mass protests in Ukraine during 2013-2014 - known as "Euromaidan" - and the post-Euromaidan conflict between Russian, pro-Russian and Ukrainian forces in eastern Ukraine and Crimea. We design a natural language processing algorithm to analyze at scale the linguistic markers which point to a particular political leaning in online media and show that political slant in news articles and Twitter posts can be inferred with a high level of accuracy. These findings allow us to better understand the dynamics of partisan opinion formation during mass crises and the interplay between main- stream and social media in such circumstances.
[ { "version": "v1", "created": "Thu, 16 Mar 2017 21:07:59 GMT" } ]
2017-03-20T00:00:00
[ [ "Karamshuk", "Dmytro", "" ], [ "Lokot", "Tetyana", "" ], [ "Pryymak", "Oleksandr", "" ], [ "Sastry", "Nishanth", "" ] ]
new_dataset
0.999724
1703.05859
Suzhi Bi
Suzhi Bi, Ying Jun (Angela) Zhang, and Rui Zhang
Distributed Scheduling in Wireless Powered Communication Network: Protocol Design and Performance Analysis
This paper has been accepted for publication in 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt 2017), Paris, France, 15th - 19th May, 2017
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless powered communication network (WPCN) is a novel networking paradigm that uses radio frequency (RF) wireless energy transfer (WET) technology to power the information transmissions of wireless devices (WDs). When energy and information are transferred in the same frequency band, a major design issue is transmission scheduling to avoid interference and achieve high communication performance. Commonly used centralized scheduling methods in WPCN may result in high control signaling overhead and thus are not suitable for wireless networks constituting a large number of WDs with random locations and dynamic operations. To tackle this issue, we propose in this paper a distributed scheduling protocol for energy and information transmissions in WPCN. Specifically, we allow a WD that is about to deplete its battery to broadcast an energy request buzz (ERB), which triggers WET from its associated hybrid access point (HAP) to recharge the battery. If no ERB is sent, the WDs contend to transmit data to the HAP using the conventional $p$-persistent CSMA (carrier sensing multiple access). In particular, we propose an energy queueing model based on an energy decoupling property to derive the throughput performance. Our analysis is verified through simulations under practical network parameters, which demonstrate good throughput performance of the distributed scheduling protocol and reveal some interesting design insights that are different from conventional contention-based communication network assuming the WDs are powered with unlimited energy supplies.
[ { "version": "v1", "created": "Fri, 17 Mar 2017 01:00:37 GMT" } ]
2017-03-20T00:00:00
[ [ "Bi", "Suzhi", "", "Angela" ], [ "Jun", "Ying", "", "Angela" ], [ "Zhang", "", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.968161
1703.05895
Dongsoo Har
Dongsoo Har
Charging Wireless Sensor Networks with Mobile Charger and Infrastructure Pivot Cluster Heads
to be submitted to an SCI journal
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless rechargeable sensor networks (WRSNs) consisting of sensor nodes with batteries have been at the forefront of sensing and communication technologies in the last few years. Sensor networks with different missions are being massively rolled out, particularly in the internet-of-things commercial market. To ensure sustainable operation of WRSNs, charging in a timely fashion is very important, since lack of energy of even a single sensor node could result in serious outcomes. With the large number of WRSNs existing and to be existed, energy-efficient charging schemes are becoming indispensable to workplaces that demand a proper level of operating cost. Selection of charging scheme depends on network parameters such as the distribution pattern of sensor nodes, the mobility of the charger, and the availability of the directional antenna. Among current charging techniques, radio frequency (RF) remote charging with a small transmit antenna is gaining interest when non-contact type charging is required for sensor nodes. RF charging is particularly useful when sensor nodes are distributed in the service area. To obtain higher charging efficiency with RF charging, optimal path planning for mobile chargers, and the beamforming technique, implemented by making use of a directional antenna, can be considered. In this article, we present a review of RF charging for WRSNs from the perspectives of charging by mobile charger, harvesting using sensor nodes, and energy trading between sensor nodes. The concept of a pivot cluster head is introduced and a novel RF charging scheme in two stages, consisting of charging pivot cluster heads by a mobile charger with a directional antenna and charging member sensor nodes by pivot cluster heads with directional antennae, is presented.
[ { "version": "v1", "created": "Fri, 17 Mar 2017 05:30:04 GMT" } ]
2017-03-20T00:00:00
[ [ "Har", "Dongsoo", "" ] ]
new_dataset
0.998572
1703.05903
R\'ehan Noordally Mr.
Xavier Nicolay, R\'ehan Noordally and Yassine Gangat
rTraceroute: R\'eunion Traceroute Visualisation
null
null
null
null
cs.NI cs.SE
http://creativecommons.org/publicdomain/zero/1.0/
Traceroute is the main tools to explore Internet path. It provides limited information about each node along the path. However, Traceroute cannot go further in statistics analysis, or \emph{Man-Machine Interface (MMI)}. Indeed, there are no graphical tool that is able to draw all paths used by IP routes. We present a new tool that can handle more than 1,000 Traceroute results, map them, identify graphically MPLS links, get information of usage of all routes (in percent) to improve the knowledge between countries' links. rTraceroute want to go deeper in usage of atomic traces. In this paper, we will discuss the concept of rTraceroute and present some example of usage.
[ { "version": "v1", "created": "Fri, 17 Mar 2017 06:22:29 GMT" } ]
2017-03-20T00:00:00
[ [ "Nicolay", "Xavier", "" ], [ "Noordally", "Réhan", "" ], [ "Gangat", "Yassine", "" ] ]
new_dataset
0.999127
1703.05913
Sohini Roychowdhury
Sohini Roychowdhury, Donny Sun, Matthew Bihis, Johnny Ren, Paul Hage and Humairat H. Rahman
Computer Aided Detection of Anemia-like Pallor
4 pages,2 figures, 2 tables
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Paleness or pallor is a manifestation of blood loss or low hemoglobin concentrations in the human blood that can be caused by pathologies such as anemia. This work presents the first automated screening system that utilizes pallor site images, segments, and extracts color and intensity-based features for multi-class classification of patients with high pallor due to anemia-like pathologies, normal patients and patients with other abnormalities. This work analyzes the pallor sites of conjunctiva and tongue for anemia screening purposes. First, for the eye pallor site images, the sclera and conjunctiva regions are automatically segmented for regions of interest. Similarly, for the tongue pallor site images, the inner and outer tongue regions are segmented. Then, color-plane based feature extraction is performed followed by machine learning algorithms for feature reduction and image level classification for anemia. In this work, a suite of classification algorithms image-level classifications for normal (class 0), pallor (class 1) and other abnormalities (class 2). The proposed method achieves 86% accuracy, 85% precision and 67% recall in eye pallor site images and 98.2% accuracy and precision with 100% recall in tongue pallor site images for classification of images with pallor. The proposed pallor screening system can be further fine-tuned to detect the severity of anemia-like pathologies using controlled set of local images that can then be used for future benchmarking purposes.
[ { "version": "v1", "created": "Fri, 17 Mar 2017 07:35:26 GMT" } ]
2017-03-20T00:00:00
[ [ "Roychowdhury", "Sohini", "" ], [ "Sun", "Donny", "" ], [ "Bihis", "Matthew", "" ], [ "Ren", "Johnny", "" ], [ "Hage", "Paul", "" ], [ "Rahman", "Humairat H.", "" ] ]
new_dataset
0.991109
1703.06117
John Prpi\'c
J. Prpi\'c
Unpacking Blockchains
Collective Intelligence 2017. NYU Tandon School of Engineering. June 15-16, 2017
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Bitcoin digital currency appeared in 2009. Since this time, researchers and practitioners have looked under the hood of the open source Bitcoin currency, and discovered that Bitcoins Blockchain software architecture is useful for non-monetary purposes too. By coalescing the research and practice on Blockchains, this work begins to unpack Blockchains as a general phenomenon, therein, arguing that all Blockchain phenomena can be conceived as being comprised of transaction platforms and digital ledgers, and illustrating where public key encryption plays a differential role in facilitating these features of Blockchains.
[ { "version": "v1", "created": "Mon, 13 Mar 2017 22:03:09 GMT" } ]
2017-03-20T00:00:00
[ [ "Prpić", "J.", "" ] ]
new_dataset
0.982848
1703.06133
Abhishek Kr Singh
Abhishek Kr Singh
Fully Mechanized Proofs of Dilworths Theorem and Mirskys Theorem
null
null
null
null
cs.LO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present two fully mechanized proofs of Dilworths and Mirskys theorems in the Coq proof assistant. Dilworths Theorem states that in any finite partially ordered set (poset), the size of a smallest chain cover and a largest antichain are the same. Mirskys Theorem is a dual of Dilworths Theorem. We formalize the proofs by Perles [2] (for Dilworths Theorem) and by Mirsky [5] (for the dual theorem). We also come up with a library of definitions and facts that can be used as a framework for formalizing other theorems on finite posets.
[ { "version": "v1", "created": "Fri, 17 Mar 2017 17:55:35 GMT" } ]
2017-03-20T00:00:00
[ [ "Singh", "Abhishek Kr", "" ] ]
new_dataset
0.991055
1408.1023
Jiangshan Yu
Jiangshan Yu, Vincent Cheval and Mark Ryan
DTKI: a new formalized PKI with no trusted parties
19 pages
The computer journal. Vol. 59 No. 11, pp. 1695-1713, 2016
10.1093/comjnl/bxw039
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The security of public key validation protocols for web-based applications has recently attracted attention because of weaknesses in the certificate authority model, and consequent attacks. Recent proposals using public logs have succeeded in making certificate management more transparent and verifiable. However, those proposals involve a fixed set of authorities. This means an oligopoly is created. Another problem with current log-based system is their heavy reliance on trusted parties that monitor the logs. We propose a distributed transparent key infrastructure (DTKI), which greatly reduces the oligopoly of service providers and allows verification of the behaviour of trusted parties. In addition, this paper formalises the public log data structure and provides a formal analysis of the security that DTKI guarantees.
[ { "version": "v1", "created": "Tue, 5 Aug 2014 16:32:12 GMT" }, { "version": "v2", "created": "Sat, 14 Feb 2015 11:29:42 GMT" }, { "version": "v3", "created": "Tue, 24 Feb 2015 12:10:44 GMT" }, { "version": "v4", "created": "Thu, 2 Jul 2015 17:27:02 GMT" }, { "version": "v5", "created": "Mon, 5 Sep 2016 13:06:31 GMT" }, { "version": "v6", "created": "Thu, 16 Mar 2017 15:07:19 GMT" } ]
2017-03-17T00:00:00
[ [ "Yu", "Jiangshan", "" ], [ "Cheval", "Vincent", "" ], [ "Ryan", "Mark", "" ] ]
new_dataset
0.99113