id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1608.03542
|
Daniel Hewlett
|
Daniel Hewlett, Alexandre Lacoste, Llion Jones, Illia Polosukhin,
Andrew Fandrianto, Jay Han, Matthew Kelcey, David Berthelot
|
WikiReading: A Novel Large-scale Language Understanding Task over
Wikipedia
| null |
Proceedings of the 54th Annual Meeting of the Association for
Computational Linguistics (Volume 1: Long Papers), 2016, pp. 1535-1545
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present WikiReading, a large-scale natural language understanding task and
publicly-available dataset with 18 million instances. The task is to predict
textual values from the structured knowledge base Wikidata by reading the text
of the corresponding Wikipedia articles. The task contains a rich variety of
challenging classification and extraction sub-tasks, making it well-suited for
end-to-end models such as deep neural networks (DNNs). We compare various
state-of-the-art DNN-based architectures for document classification,
information extraction, and question answering. We find that models supporting
a rich answer space, such as word or character sequences, perform best. Our
best-performing model, a word-level sequence to sequence model with a mechanism
to copy out-of-vocabulary words, obtains an accuracy of 71.8%.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2016 17:34:12 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Mar 2017 19:58:44 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Hewlett",
"Daniel",
""
],
[
"Lacoste",
"Alexandre",
""
],
[
"Jones",
"Llion",
""
],
[
"Polosukhin",
"Illia",
""
],
[
"Fandrianto",
"Andrew",
""
],
[
"Han",
"Jay",
""
],
[
"Kelcey",
"Matthew",
""
],
[
"Berthelot",
"David",
""
]
] |
new_dataset
| 0.983483 |
1610.01471
|
Yuan Cao
|
Yuan Cao, Yonglin Cao
|
The Gray image of constacyclic codes over the finite chain ring
$F_{p^m}[u]/\langle u^k\rangle$
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $\mathbb{F}_{p^m}$ be a finite field of cardinality $p^m$, where $p$ is a
prime, and $k, N$ be any positive integers. We denote $R_k=F_{p^m}[u]/\langle
u^k\rangle =F_{p^m}+uF_{p^m}+\ldots+u^{k-1}F_{p^m}$ ($u^k=0$) and
$\lambda=a_0+a_1u+\ldots+a_{k-1}u^{k-1}$ where $a_0, a_1,\ldots, a_{k-1}\in
F_{p^m}$ satisfying $a_0\neq 0$ and $a_1=1$. Let $r$ be a positive integer
satisfying $p^{r-1}+1\leq k\leq p^r$. We defined a Gray map from $R_k$ to
$F_{p^m}^{p^r}$ first, then prove that the Gray image of any linear
$\lambda$-constacyclic code over $R_k$ of length $N$ is a distance invariant
linear $a_0^{p^r}$-constacyclic code over $F_{p^m}$ of length $p^rN$.
Furthermore, the generator polynomials for each linear $\lambda$-constacyclic
code over $R_k$ of length $N$ and its Gray image are given respectively.
Finally, some optimal constacyclic codes over $F_{3}$ and $F_{5}$ are
constructed.
|
[
{
"version": "v1",
"created": "Wed, 5 Oct 2016 15:07:04 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Mar 2017 23:52:34 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Cao",
"Yuan",
""
],
[
"Cao",
"Yonglin",
""
]
] |
new_dataset
| 0.990864 |
1702.06478
|
Juan-Manuel Torres-Moreno
|
Xavier Bost, Ilaria Brunetti, Luis Adri\'an Cabrera-Diego,
Jean-Val\`ere Cossu, Andr\'ea Linhares, Mohamed Morchid, Juan-Manuel
Torres-Moreno, Marc El-B\`eze, Richard Dufour
|
Syst\`emes du LIA \`a DEFT'13
|
12 pages, 3 tables, (Paper in French)
|
Proceedings of the Ninth DEFT Workshop, DEFT2013, Les
Sables-d'Olonne, France, 21st June 2013
| null | null |
cs.CL cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The 2013 D\'efi de Fouille de Textes (DEFT) campaign is interested in two
types of language analysis tasks, the document classification and the
information extraction in the specialized domain of cuisine recipes. We present
the systems that the LIA has used in DEFT 2013. Our systems show interesting
results, even though the complexity of the proposed tasks.
|
[
{
"version": "v1",
"created": "Tue, 21 Feb 2017 17:14:56 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Bost",
"Xavier",
""
],
[
"Brunetti",
"Ilaria",
""
],
[
"Cabrera-Diego",
"Luis Adrián",
""
],
[
"Cossu",
"Jean-Valère",
""
],
[
"Linhares",
"Andréa",
""
],
[
"Morchid",
"Mohamed",
""
],
[
"Torres-Moreno",
"Juan-Manuel",
""
],
[
"El-Bèze",
"Marc",
""
],
[
"Dufour",
"Richard",
""
]
] |
new_dataset
| 0.990978 |
1703.04346
|
Chunming Tang
|
Claude Carlet, Sihem Mesnager, Chunming Tang, Yanfeng Qi
|
Linear codes over Fq which are equivalent to LCD codes
|
arXiv admin note: text overlap with arXiv:1702.08033
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Linear codes with complementary duals (abbreviated LCD) are linear codes
whose intersection with their dual are trivial. When they are binary, they play
an important role in armoring implementations against side-channel attacks and
fault injection attacks. Non-binary LCD codes in characteristic 2 can be
transformed into binary LCD codes by expansion. In this paper, we introduce a
general construction of LCD codes from any linear codes. Further, we show that
any linear code over $\mathbb F_{q} (q>3)$ is equivalent to an Euclidean LCD
code and any linear code over $\mathbb F_{q^2} (q>2)$ is equivalent to a
Hermitian LCD code. Consequently an $[n,k,d]$-linear Euclidean LCD code over
$\mathbb F_q$ with $q>3$ exists if there is an $[n,k,d]$-linear code over
$\mathbb F_q$ and an $[n,k,d]$-linear Hermitian LCD code over $\mathbb F_{q^2}$
with $q>2$ exists if there is an $[n,k,d]$-linear code over $\mathbb F_{q^2}$.
Hence, when $q>3$ (resp.$q>2$) $q$-ary Euclidean (resp. $q^2$-ary Hermitian)
LCD codes possess the same asymptotical bound as $q$-ary linear codes (resp.
$q^2$-ary linear codes). Finally, we present an approach of constructing LCD
codes by extending linear codes.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2017 11:48:01 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Mar 2017 12:10:18 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Carlet",
"Claude",
""
],
[
"Mesnager",
"Sihem",
""
],
[
"Tang",
"Chunming",
""
],
[
"Qi",
"Yanfeng",
""
]
] |
new_dataset
| 0.999756 |
1703.05303
|
Ilya Dumer
|
Ilya Dumer
|
Recursive decoding of Reed-Muller codes
| null |
Proc. 37th Allerton Conf. on Commun., Control, and Computing,
Monticello, IL, USA, 1999, pp. 61-69
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
New soft- and hard decision decoding algorithms are presented for general
Reed-Muller codes $\left\{\genfrac{}{}{0pt}{}{m}{r}\right\} $ of length $2^{m}$
and distance $2^{m-r}$. We use Plotkin $(u,u+v)$ construction and decompose
code $\left\{\genfrac{}{}{0pt}{}{m}{r}\right\} $ onto subblocks
$u\in\left\{\genfrac{}{}{0pt}{}{m-1}{r}\right\} $ and
$v\in\left\{\genfrac{}{}{0pt}{}{m-1}{r-1}\right\} .$ In decoding, we first try
to find a subblock $v$ from the better protected code and then proceed with the
block $u$. The likelihoods of the received symbols are recalculated in a way
similar to belief propagation. Thus, decoding is relegated to the two
constituent codes. We repeat this recursion and execute decoding only at the
end nodes $\left\{\genfrac{}{}{0pt}{}{j}{1}\right\} $ and
$\left\{\genfrac{}{}{0pt}{}{j}{j-1}\right\} $. The overall complexity has low
order of $n\log n.$ It is shown that this decoding substantially outperforms
other algorithms of polynomial complexity known for RM codes. In particular,
for medium and high code rates, the algorithm corrects most error patterns of
weight $d\ln d/2.$
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2017 22:25:18 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Dumer",
"Ilya",
""
]
] |
new_dataset
| 0.964788 |
1703.05381
|
Justinas Miseikis
|
Justinas Miseikis and Matthias Ruther and Bernhard Walzel and Mario
Hirz and Helmut Brunner
|
3D Vision Guided Robotic Charging Station for Electric and Plug-in
Hybrid Vehicles
|
6 pages, 8 figures, OAGM and ARW Joint Workshop 2017 on Vision,
Automation and Robotics
| null | null | null |
cs.RO cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Electric vehicles (EVs) and plug-in hybrid vehicles (PHEVs) are rapidly
gaining popularity on our roads. Besides a comparatively high purchasing price,
the main two problems limiting their use are the short driving range and
inconvenient charging process. In this paper we address the following by
presenting an automatic robot-based charging station with 3D vision guidance
for plugging and unplugging the charger. First of all, the whole system concept
consisting of a 3D vision system, an UR10 robot and a charging station is
presented. Then we show the shape-based matching methods used to successfully
identify and get the exact pose of the charging port. The same approach is used
to calibrate the camera-robot system by using just known structure of the
connector plug and no additional markers. Finally, a three-step robot motion
planning procedure for plug-in is presented and functionality is demonstrated
in a series of successful experiments.
|
[
{
"version": "v1",
"created": "Wed, 15 Mar 2017 20:49:14 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Miseikis",
"Justinas",
""
],
[
"Ruther",
"Matthias",
""
],
[
"Walzel",
"Bernhard",
""
],
[
"Hirz",
"Mario",
""
],
[
"Brunner",
"Helmut",
""
]
] |
new_dataset
| 0.995225 |
1703.05400
|
Shin-Ming Cheng
|
Shin-Ming Cheng and Pin-Yu Chen and Ching-Chao Lin and Hsu-Chun Hsiao
|
Traffic-aware Patching for Cyber Security in Mobile IoT
|
8 pages, 6 figures, To appear in July 2017 IEEE Communications
Magazine, feature topic on "Traffic Measurements for Cyber Security"
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The various types of communication technologies and mobility features in
Internet of Things (IoT) on the one hand enable fruitful and attractive
applications, but on the other hand facilitates malware propagation, thereby
raising new challenges on handling IoT-empowered malware for cyber security.
Comparing with the malware propagation control scheme in traditional wireless
networks where nodes can be directly repaired and secured, in IoT, compromised
end devices are difficult to be patched. Alternatively, blocking malware via
patching intermediate nodes turns out to be a more feasible and practical
solution. Specifically, patching intermediate nodes can effectively prevent the
proliferation of malware propagation by securing infrastructure links and
limiting malware propagation to local device-to-device dissemination. This
article proposes a novel traffic-aware patching scheme to select important
intermediate nodes to patch, which applies to the IoT system with limited
patching resources and response time constraint. Experiments on real-world
trace datasets in IoT networks are conducted to demonstrate the advantage of
the proposed traffic-aware patching scheme in alleviating malware propagation.
|
[
{
"version": "v1",
"created": "Wed, 15 Mar 2017 21:59:05 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Cheng",
"Shin-Ming",
""
],
[
"Chen",
"Pin-Yu",
""
],
[
"Lin",
"Ching-Chao",
""
],
[
"Hsiao",
"Hsu-Chun",
""
]
] |
new_dataset
| 0.986381 |
1703.05467
|
Jin Qi
|
Jin Qi, Miao Le, Chunming Li, Ping Zhou
|
Global and Local Information Based Deep Network for Skin Lesion
Segmentation
|
4 pages, 3 figures. ISIC2017
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
With a large influx of dermoscopy images and a growing shortage of
dermatologists, automatic dermoscopic image analysis plays an essential role in
skin cancer diagnosis. In this paper, a new deep fully convolutional neural
network (FCNN) is proposed to automatically segment melanoma out of skin images
by end-to-end learning with only pixels and labels as inputs. Our proposed FCNN
is capable of using both local and global information to segment melanoma by
adopting skipping layers. The public benchmark database consisting of 150
validation images, 600 test images and 2000 training images in the melanoma
detection challenge 2017 at International Symposium Biomedical Imaging 2017 is
used to test the performance of our algorithm. All large size images (for
example, $4000\times 6000$ pixels) are reduced to much smaller images with
$384\times 384$ pixels (more than 10 times smaller). We got and submitted
preliminary results to the challenge without any pre or post processing. The
performance of our proposed method could be further improved by data
augmentation and by avoiding image size reduction.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2017 03:23:48 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Qi",
"Jin",
""
],
[
"Le",
"Miao",
""
],
[
"Li",
"Chunming",
""
],
[
"Zhou",
"Ping",
""
]
] |
new_dataset
| 0.978497 |
1703.05530
|
Vincent Andrearczyk
|
Vincent Andrearczyk and Paul F. Whelan
|
Convolutional Neural Network on Three Orthogonal Planes for Dynamic
Texture Classification
|
19 pages, 10 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dynamic Textures (DTs) are sequences of images of moving scenes that exhibit
certain stationarity properties in time such as smoke, vegetation and fire. The
analysis of DT is important for recognition, segmentation, synthesis or
retrieval for a range of applications including surveillance, medical imaging
and remote sensing. Deep learning methods have shown impressive results and are
now the new state of the art for a wide range of computer vision tasks
including image and video recognition and segmentation. In particular,
Convolutional Neural Networks (CNNs) have recently proven to be well suited for
texture analysis with a design similar to a filter bank approach. In this
paper, we develop a new approach to DT analysis based on a CNN method applied
on three orthogonal planes x y , xt and y t . We train CNNs on spatial frames
and temporal slices extracted from the DT sequences and combine their outputs
to obtain a competitive DT classifier. Our results on a wide range of commonly
used DT classification benchmark datasets prove the robustness of our approach.
Significant improvement of the state of the art is shown on the larger
datasets.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2017 09:30:07 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Andrearczyk",
"Vincent",
""
],
[
"Whelan",
"Paul F.",
""
]
] |
new_dataset
| 0.953556 |
1703.05680
|
Andre Ebert
|
Andre Ebert, Sebastian Feld, Florian Dorfmeister
|
Segmented and Directional Impact Detection for Parked Vehicles using
Mobile Devices
|
4 Pages, 6 Figures, Accepted at the The 23rd International Conference
on Systems, Signals and Image Processing (IWSSIP)
| null |
10.1109/IWSSIP.2016.7502762
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mutual usage of vehicles as well as car sharing became more and more
attractive during the last years. Especially in urban environments with limited
parking possibilities and a higher risk for traffic jams, car rentals and
sharing services may save time and money. But when renting a vehicle it could
already be damaged (e.g., scratches or bumps inflicted by a previous user)
without the damage being perceived by the service provider. In order to address
such problems, we present an automated, motion-based system for impact
detection, that facilitates a common smartphone as a sensor platform. The
system is capable of detecting the impact segment and the point of time of an
impact event on a vehicle's surface, as well as its direction of origin. With
this additional specific knowledge, it may be possible to reconstruct the
circumstances of an impact event, e.g., to prove possible innocence of a
service's customer.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2017 15:51:56 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Ebert",
"Andre",
""
],
[
"Feld",
"Sebastian",
""
],
[
"Dorfmeister",
"Florian",
""
]
] |
new_dataset
| 0.981272 |
1703.05700
|
Ryo Suzuki
|
Ryo Suzuki, Tom Yeh, Koji Yatani, Mark D. Gross
|
Autocomplete Textures for 3D Printing
| null | null | null | null |
cs.HC cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Texture is an essential property of physical objects that affects aesthetics,
usability, and functionality. However, designing and applying textures to 3D
objects with existing tools remains difficult and time-consuming; it requires
proficient 3D modeling skills. To address this, we investigated an
auto-completion approach for efficient texture creation that automates the
tedious, repetitive process of applying texture while allowing flexible
customization. We developed techniques for users to select a target surface,
sketch and manipulate a texture with 2D drawings, and then generate 3D
printable textures onto an arbitrary curved surface. In a controlled experiment
our tool sped texture creation by 80% over conventional tools, a performance
gain that is higher with more complex target surfaces. This result confirms
that auto-completion is powerful for creating 3D textures.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2017 16:24:01 GMT"
}
] | 2017-03-17T00:00:00 |
[
[
"Suzuki",
"Ryo",
""
],
[
"Yeh",
"Tom",
""
],
[
"Yatani",
"Koji",
""
],
[
"Gross",
"Mark D.",
""
]
] |
new_dataset
| 0.999783 |
1603.09137
|
Ross Drummond
|
Ross Drummond, Shi Zhao, David A. Howey, Stephen R. Duncan
|
Circuit Synthesis of Electrochemical Supercapacitor Models
| null | null |
10.1016/j.est.2016.11.003
| null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is concerned with the synthesis of RC electrical circuits from
physics-based supercapacitor models describing conservation and diffusion
relationships. The proposed synthesis procedure uses model discretisation,
linearisation, balanced model order reduction and passive network synthesis to
form the circuits. Circuits with different topologies are synthesized from
several physical models. This work will give greater understanding to the
physical interpretation of electrical circuits and will enable the development
of more generalised circuits, since the synthesized impedance functions are
generated by considering the physics, not from experimental fitting which may
ignore certain dynamics.
|
[
{
"version": "v1",
"created": "Wed, 30 Mar 2016 11:44:45 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Drummond",
"Ross",
""
],
[
"Zhao",
"Shi",
""
],
[
"Howey",
"David A.",
""
],
[
"Duncan",
"Stephen R.",
""
]
] |
new_dataset
| 0.999429 |
1604.00642
|
Moein Sarvaghad-Moghaddam
|
Moein Sarvaghad-Moghaddam
|
Multi-objective design of quantum circuits using genetic programming
|
This paper has been withdrawn by the author due to some of
modifications in structures
| null | null | null |
cs.ET cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quantum computing is a new way of data processing based on the concept of
quantum mechanics. Quantum circuit design is a process of converting a quantum
gate to a series of basic gates and is divided into two general categories
based on the decomposition and composition. In the second group, using
evolutionary algorithms and especially genetic algorithms, multiplication of
matrix gates was used to achieve the final characteristic of quantum circuit.
Genetic programming is a subfield of evolutionary computing in which computer
programs evolve to solve studied problems. In past research that has been done
in the field of quantum circuits design, only one cost metrics (usually quantum
cost) has been investigated. In this paper for the first time, a
multi-objective approach has been provided to design quantum circuits using
genetic programming that considers the depth and the cost of nearest neighbor
metrics in addition to quantum cost metric. Another innovation of this article
is the use of two-step fitness function and taking into account the equivalence
of global phase in quantum gates. The results show that the proposed method is
able to find a good answer in a short time.
|
[
{
"version": "v1",
"created": "Sun, 3 Apr 2016 14:33:15 GMT"
},
{
"version": "v2",
"created": "Sat, 28 May 2016 09:19:04 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Mar 2017 15:48:36 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Sarvaghad-Moghaddam",
"Moein",
""
]
] |
new_dataset
| 0.98065 |
1608.00771
|
Lee Braine
|
Christopher D. Clack, Vikram A. Bakshi, Lee Braine
|
Smart Contract Templates: foundations, design landscape and research
directions
| null | null | null | null |
cs.CY
|
http://creativecommons.org/licenses/by/4.0/
|
In this position paper, we consider some foundational topics regarding smart
contracts (such as terminology, automation, enforceability, and semantics) and
define a smart contract as an automatable and enforceable agreement. We explore
a simple semantic framework for smart contracts, covering both operational and
non-operational aspects, and describe templates and agreements for
legally-enforceable smart contracts, based on legal documents. Building upon
the Ricardian Contract, we identify operational parameters in the legal
documents and use these to connect legal agreements to standardised code. We
also explore the design landscape, including increasing sophistication of
parameters, increasing use of common standardised code, and long-term research.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2016 11:15:34 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Aug 2016 16:48:47 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Mar 2017 12:24:25 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Clack",
"Christopher D.",
""
],
[
"Bakshi",
"Vikram A.",
""
],
[
"Braine",
"Lee",
""
]
] |
new_dataset
| 0.970362 |
1608.05578
|
Larry Bull
|
Larry Bull
|
Haploid-Diploid Evolutionary Algorithms
|
arXiv admin note: text overlap with arXiv:1607.00318
| null | null | null |
cs.NE q-bio.PE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper uses the recent idea that the fundamental haploid-diploid
lifecycle of eukaryotic organisms implements a rudimentary form of learning
within evolution. A general approach for evolutionary computation is here
derived that differs from all previous known work using diploid
representations. The primary role of recombination is also changed from that
previously considered in both natural and artificial evolution under the new
view. Using well-known abstract tuneable models it is shown that varying
fitness landscape ruggedness varies the benefit of the new approach.
|
[
{
"version": "v1",
"created": "Fri, 19 Aug 2016 12:17:59 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jan 2017 15:02:32 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Mar 2017 15:48:37 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Bull",
"Larry",
""
]
] |
new_dataset
| 0.972956 |
1610.09849
|
Nuno K. Pratas
|
Nuno K. Pratas, Sarath Pattathil, Cedomir Stefanovic, Petar Popovski
|
Massive Machine-Type Communication (mMTC) Access with Integrated
Authentication
|
Accepted for presentation at ICC 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a connection establishment protocol with integrated
authentication, suited for Massive Machine-Type Communications (mMTC). The
protocol is contention-based and its main feature is that a device contends
with a unique signature that also enables the authentication of the device
towards the network. The signatures are inspired by Bloom filters and are
created based on the output of the MILENAGE authentication and encryption
algorithm set, which is used in the authentication and security procedures in
the LTE protocol family. We show that our method utilizes the system resources
more efficiently, achieves lower latency of connection establishment for
Poisson arrivals and allows a $87\%$ signalling overhead reduction. An
important conclusion is that the mMTC traffic benefits profoundly from
integration of security features into the connection establishment/access
protocols, instead of addressing them post-hoc, which has been a common
practice.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2016 10:20:26 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Mar 2017 08:00:54 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Pratas",
"Nuno K.",
""
],
[
"Pattathil",
"Sarath",
""
],
[
"Stefanovic",
"Cedomir",
""
],
[
"Popovski",
"Petar",
""
]
] |
new_dataset
| 0.995093 |
1703.03652
|
Andrew Paverd
|
Philipp Mundhenk, Andrew Paverd, Artur Mrowca, Sebastian Steinhorst,
Martin Lukasiewycz, Suhaib A. Fahmy, Samarjit Chakraborty
|
Security in Automotive Networks: Lightweight Authentication and
Authorization
|
Authors' preprint of an article to appear in ACM Transactions on
Design Automation of Electronic Systems (ACM TODAES) 2017
| null |
10.1145/2960407
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the increasing amount of interconnections between vehicles, the attack
surface of internal vehicle networks is rising steeply. Although these networks
are shielded against external attacks, they often do not have any internal
security to protect against malicious components or adversaries who breach the
network perimeter. To secure the in-vehicle network, all communicating
components must be authenticated, and only authorized components should be
allowed to send and receive messages. This is achieved using an authentication
framework. Cryptography is widely used to authenticate communicating parties
and provide secure communication channels (e.g., Internet communication).
However, the real-time performance requirements of in-vehicle networks restrict
the types of cryptographic algorithms and protocols that may be used. In
particular, asymmetric cryptography is computationally infeasible during
vehicle operation.
In this work, we address the challenges of designing authentication protocols
for automotive systems. We present Lightweight Authentication for Secure
Automotive Networks (LASAN), a full lifecycle authentication approach. We
describe the core LASAN protocols and show how they protect the internal
vehicle network while complying with the real-time constraints and low
computational resources of this domain. Unlike previous work, we also explain
how this framework can be integrated into all aspects of the automotive
lifecycle, including manufacturing, vehicle maintenance, and software updates.
We evaluate LASAN in two different ways: First, we analyze the security
properties of the protocols using established protocol verification techniques
based on formal methods. Second, we evaluate the timing requirements of LASAN
and compare these to other frameworks using a new highly modular discrete event
simulator for in-vehicle networks, which we have developed for this evaluation.
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2017 12:25:14 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Mar 2017 09:02:40 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Mundhenk",
"Philipp",
""
],
[
"Paverd",
"Andrew",
""
],
[
"Mrowca",
"Artur",
""
],
[
"Steinhorst",
"Sebastian",
""
],
[
"Lukasiewycz",
"Martin",
""
],
[
"Fahmy",
"Suhaib A.",
""
],
[
"Chakraborty",
"Samarjit",
""
]
] |
new_dataset
| 0.998939 |
1703.04583
|
Ferdinand Brasser
|
Benny Fuhry (1), Raad Bahmani (2), Ferdinand Brasser (2), Florian Hahn
(1), Florian Kerschbaum (3) and Ahmad-Reza Sadeghi (2) ((1) SAP Research, (2)
Technische Universit\"at Darmstadt, (3) University of Waterloo)
|
HardIDX: Practical and Secure Index with SGX
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Software-based approaches for search over encrypted data are still either
challenged by lack of proper, low-leakage encryption or slow performance.
Existing hardware-based approaches do not scale well due to hardware
limitations and software designs that are not specifically tailored to the
hardware architecture, and are rarely well analyzed for their security (e.g.,
the impact of side channels). Additionally, existing hardware-based solutions
often have a large code footprint in the trusted environment susceptible to
software compromises. In this paper we present HardIDX: a hardware-based
approach, leveraging Intel's SGX, for search over encrypted data. It implements
only the security critical core, i.e., the search functionality, in the trusted
environment and resorts to untrusted software for the remainder. HardIDX is
deployable as a highly performant encrypted database index: it is logarithmic
in the size of the index and searches are performed within a few milliseconds
rather than seconds. We formally model and prove the security of our scheme
showing that its leakage is equivalent to the best known searchable encryption
schemes. Our implementation has a very small code and memory footprint yet
still scales to virtually unlimited search index sizes, i.e., size is limited
only by the general - non-secure - hardware resources.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2017 17:09:30 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Fuhry",
"Benny",
""
],
[
"Bahmani",
"Raad",
""
],
[
"Brasser",
"Ferdinand",
""
],
[
"Hahn",
"Florian",
""
],
[
"Kerschbaum",
"Florian",
""
],
[
"Sadeghi",
"Ahmad-Reza",
""
]
] |
new_dataset
| 0.993421 |
1703.04603
|
Sebastian Schweizer
|
Egor Derevenetc, Roland Meyer, Sebastian Schweizer
|
Locality and Singularity for Store-Atomic Memory Models
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Robustness is a correctness notion for concurrent programs running under
relaxed consistency models. The task is to check that the relaxed behavior
coincides (up to traces) with sequential consistency (SC). Although
computationally simple on paper (robustness has been shown to be
PSPACE-complete for TSO, PGAS, and Power), building a practical robustness
checker remains a challenge. The problem is that the various relaxations lead
to a dramatic number of computations, only few of which violate robustness.
In the present paper, we set out to reduce the search space for robustness
checkers. We focus on store-atomic consistency models and establish two
completeness results. The first result, called locality, states that a
non-robust program always contains a violating computation where only one
thread delays commands. The second result, called singularity, is even stronger
but restricted to programs without lightweight fences. It states that there is
a violating computation where a single store is delayed.
As an application of the results, we derive a linear-size source-to-source
translation of robustness to SC-reachability. It applies to general programs,
regardless of the data domain and potentially with an unbounded number of
threads and with unbounded buffers. We have implemented the translation and
verified, for the first time, PGAS algorithms in a fully automated fashion. For
TSO, our analysis outperforms existing tools.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2017 17:28:27 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Derevenetc",
"Egor",
""
],
[
"Meyer",
"Roland",
""
],
[
"Schweizer",
"Sebastian",
""
]
] |
new_dataset
| 0.989853 |
1703.04636
|
Giovanni Poggi
|
Luca D'Amiano, Davide Cozzolino, Giovanni Poggi, Luisa Verdoliva
|
A PatchMatch-based Dense-field Algorithm for Video Copy-Move Detection
and Localization
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new algorithm for the reliable detection and localization of
video copy-move forgeries. Discovering well crafted video copy-moves may be
very difficult, especially when some uniform background is copied to occlude
foreground objects. To reliably detect both additive and occlusive copy-moves
we use a dense-field approach, with invariant features that guarantee
robustness to several post-processing operations. To limit complexity, a
suitable video-oriented version of PatchMatch is used, with a multiresolution
search strategy, and a focus on volumes of interest. Performance assessment
relies on a new dataset, designed ad hoc, with realistic copy-moves and a wide
variety of challenging situations. Experimental results show the proposed
method to detect and localize video copy-moves with good accuracy even in
adverse conditions.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2017 18:08:49 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"D'Amiano",
"Luca",
""
],
[
"Cozzolino",
"Davide",
""
],
[
"Poggi",
"Giovanni",
""
],
[
"Verdoliva",
"Luisa",
""
]
] |
new_dataset
| 0.98863 |
1703.04746
|
Vivek Kulkarni
|
Michael J. Hazoglu, Vivek Kulkarni, Steven S. Skiena, Ken A. Dill
|
Citation histories of papers: sometimes the rich get richer, sometimes
they don't
| null | null | null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe a simple model of how a publication's citations change over time,
based on pure-birth stochastic processes with a linear cumulative advantage
effect. The model is applied to citation data from the Physical Review corpus
provided by APS. Our model reveals that papers fall into three different
clusters: papers that have rapid initial citations and ultimately high impact
(fast-hi), fast to rise but quick to plateau (fast-flat), or late bloomers
(slow-late), which may either never achieve many citations, or do so many years
after publication. In "fast-hi" and "slow-late", there is a rich-get-richer
effect: papers that have many citations accumulate additional citations more
rapidly while the "fast-flat" papers do not display this effect. We conclude by
showing that only a few years of post-publication statistics are needed to
identify high impact ("fast-hi") papers.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2017 22:08:34 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Hazoglu",
"Michael J.",
""
],
[
"Kulkarni",
"Vivek",
""
],
[
"Skiena",
"Steven S.",
""
],
[
"Dill",
"Ken A.",
""
]
] |
new_dataset
| 0.957735 |
1703.04783
|
Shinji Watanabe Shinji Watanabe
|
Tsubasa Ochiai, Shinji Watanabe, Takaaki Hori, John R. Hershey
|
Multichannel End-to-end Speech Recognition
| null | null | null | null |
cs.SD cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The field of speech recognition is in the midst of a paradigm shift:
end-to-end neural networks are challenging the dominance of hidden Markov
models as a core technology. Using an attention mechanism in a recurrent
encoder-decoder architecture solves the dynamic time alignment problem,
allowing joint end-to-end training of the acoustic and language modeling
components. In this paper we extend the end-to-end framework to encompass
microphone array signal processing for noise suppression and speech enhancement
within the acoustic encoding network. This allows the beamforming components to
be optimized jointly within the recognition architecture to improve the
end-to-end speech recognition objective. Experiments on the noisy speech
benchmarks (CHiME-4 and AMI) show that our multichannel end-to-end system
outperformed the attention-based baseline with input from a conventional
adaptive beamformer.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2017 22:28:51 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Ochiai",
"Tsubasa",
""
],
[
"Watanabe",
"Shinji",
""
],
[
"Hori",
"Takaaki",
""
],
[
"Hershey",
"John R.",
""
]
] |
new_dataset
| 0.975792 |
1703.04819
|
Sandra Avila
|
Afonso Menegola, Julia Tavares, Michel Fornaciali, Lin Tzy Li, Sandra
Avila, Eduardo Valle
|
RECOD Titans at ISIC Challenge 2017
|
5 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This extended abstract describes the participation of RECOD Titans in parts 1
and 3 of the ISIC Challenge 2017 "Skin Lesion Analysis Towards Melanoma
Detection" (ISBI 2017). Although our team has a long experience with melanoma
classification, the ISIC Challenge 2017 was the very first time we worked on
skin-lesion segmentation. For part 1 (segmentation), our final submission used
four of our models: two trained with all 2000 samples, without a validation
split, for 250 and for 500 epochs respectively; and other two trained and
validated with two different 1600/400 splits, for 220 epochs. Those four
models, individually, achieved between 0.780 and 0.783 official validation
scores. Our final submission averaged the output of those four models achieved
a score of 0.793. For part 3 (classification), the submitted test run as well
as our last official validation run were the result from a meta-model that
assembled seven base deep-learning models: three based on Inception-V4 trained
on our largest dataset; three based on Inception trained on our smallest
dataset; and one based on ResNet-101 trained on our smaller dataset. The
results of those component models were stacked in a meta-learning layer based
on an SVM trained on the validation set of our largest dataset.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2017 23:11:04 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Menegola",
"Afonso",
""
],
[
"Tavares",
"Julia",
""
],
[
"Fornaciali",
"Michel",
""
],
[
"Li",
"Lin Tzy",
""
],
[
"Avila",
"Sandra",
""
],
[
"Valle",
"Eduardo",
""
]
] |
new_dataset
| 0.999651 |
1703.04824
|
Jan Haji\v{c} Jr
|
Jan Haji\v{c} jr., Pavel Pecina
|
In Search of a Dataset for Handwritten Optical Music Recognition:
Introducing MUSCIMA++
| null | null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-sa/4.0/
|
Optical Music Recognition (OMR) has long been without an adequate dataset and
ground truth for evaluating OMR systems, which has been a major problem for
establishing a state of the art in the field. Furthermore, machine learning
methods require training data. We analyze how the OMR processing pipeline can
be expressed in terms of gradually more complex ground truth, and based on this
analysis, we design the MUSCIMA++ dataset of handwritten music notation that
addresses musical symbol recognition and notation reconstruction. The MUSCIMA++
dataset version 0.9 consists of 140 pages of handwritten music, with 91255
manually annotated notation symbols and 82261 explicitly marked relationships
between symbol pairs. The dataset allows training and evaluating models for
symbol classification, symbol localization, and notation graph assembly, both
in isolation and jointly. Open-source tools are provided for manipulating the
dataset, visualizing the data and further annotation, and the dataset itself is
made available under an open license.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2017 23:21:26 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Hajič",
"Jan",
"jr."
],
[
"Pecina",
"Pavel",
""
]
] |
new_dataset
| 0.992457 |
1703.04837
|
Xintao Wu
|
Shuhan Yuan, Xintao Wu, Yang Xiang
|
SNE: Signed Network Embedding
|
To appear in PAKDD 2017
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Several network embedding models have been developed for unsigned networks.
However, these models based on skip-gram cannot be applied to signed networks
because they can only deal with one type of link. In this paper, we present our
signed network embedding model called SNE. Our SNE adopts the log-bilinear
model, uses node representations of all nodes along a given path, and further
incorporates two signed-type vectors to capture the positive or negative
relationship of each edge along the path. We conduct two experiments, node
classification and link prediction, on both directed and undirected signed
networks and compare with four baselines including a matrix factorization
method and three state-of-the-art unsigned network embedding models. The
experimental results demonstrate the effectiveness of our signed network
embedding.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2017 23:43:15 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Yuan",
"Shuhan",
""
],
[
"Wu",
"Xintao",
""
],
[
"Xiang",
"Yang",
""
]
] |
new_dataset
| 0.951639 |
1703.04874
|
Jovonni Pharr
|
Jovonni L. Pharr
|
Hacker Combat: A Competitive Sport from Programmatic Dueling &
Cyberwarfare
| null | null | null | null |
cs.CR cs.CY cs.HC
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
The history of humanhood has included competitive activities of many
different forms. Sports have offered many benefits beyond that of
entertainment. At the time of this article, there exists not a competitive
ecosystem for cyber security beyond that of conventional capture the flag
competitions, and the like. This paper introduces a competitive framework with
a foundation on computer science, and hacking. This proposed competitive
landscape encompasses the ideas underlying information security, software
engineering, and cyber warfare. We also demonstrate the opportunity to rank,
score, & categorize actionable skill levels into tiers of capability.
Physiological metrics are analyzed from participants during gameplay. These
analyses provide support regarding the intricacies required for competitive
play, and analysis of play. We use these intricacies to build a case for an
organized competitive ecosystem. Using previous player behavior from gameplay,
we also demonstrate the generation of an artificial agent purposed with
gameplay at a competitive level.
|
[
{
"version": "v1",
"created": "Wed, 15 Mar 2017 01:38:16 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Pharr",
"Jovonni L.",
""
]
] |
new_dataset
| 0.973147 |
1703.05148
|
Yanzhi Song
|
Songtao Guo, Yixin Luo, and Yanzhi Song
|
Random Forests and VGG-NET: An Algorithm for the ISIC 2017 Skin Lesion
Classification Challenge
|
ISIC2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This manuscript briefly describes an algorithm developed for the ISIC 2017
Skin Lesion Classification Competition. In this task, participants are asked to
complete two independent binary image classification tasks that involve three
unique diagnoses of skin lesions (melanoma, nevus, and seborrheic keratosis).
In the first binary classification task, participants are asked to distinguish
between (a) melanoma and (b) nevus and seborrheic keratosis. In the second
binary classification task, participants are asked to distinguish between (a)
seborrheic keratosis and (b) nevus and melanoma. The other phases of the
competition are not considered. Our proposed algorithm consists of three steps:
preprocessing, classification using VGG-NET and Random Forests, and calculation
of a final score.
|
[
{
"version": "v1",
"created": "Wed, 15 Mar 2017 13:33:55 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Guo",
"Songtao",
""
],
[
"Luo",
"Yixin",
""
],
[
"Song",
"Yanzhi",
""
]
] |
new_dataset
| 0.952193 |
1703.05260
|
Ashutosh Modi
|
Ashutosh Modi and Tatjana Anikina and Simon Ostermann and Manfred
Pinkal
|
InScript: Narrative texts annotated with script information
|
Paper accepted at LREC 2016, 9 pages, The corpus can be downloaded
at: http://www.sfb1102.uni-saarland.de/?page_id=2582
|
LREC 2016
| null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the InScript corpus (Narrative Texts Instantiating Script
structure). InScript is a corpus of 1,000 stories centered around 10 different
scenarios. Verbs and noun phrases are annotated with event and participant
types, respectively. Additionally, the text is annotated with coreference
information. The corpus shows rich lexical variation and will serve as a unique
resource for the study of the role of script knowledge in natural language
processing.
|
[
{
"version": "v1",
"created": "Wed, 15 Mar 2017 17:01:20 GMT"
}
] | 2017-03-16T00:00:00 |
[
[
"Modi",
"Ashutosh",
""
],
[
"Anikina",
"Tatjana",
""
],
[
"Ostermann",
"Simon",
""
],
[
"Pinkal",
"Manfred",
""
]
] |
new_dataset
| 0.999617 |
1509.01653
|
Talha Khan
|
Talha Ahmed Khan, Ahmed Alkhateeb, Robert W. Heath Jr
|
Millimeter Wave Energy Harvesting
|
30 pages, published in IEEE Transactions on Wireless Communications
| null |
10.1109/TWC.2016.2577582
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The millimeter wave (mmWave) band, which is a prime candidate for 5G cellular
networks, seems attractive for wireless energy harvesting. This is because it
will feature large antenna arrays as well as extremely dense base station (BS)
deployments. The viability of mmWave for energy harvesting though is unclear,
due to the differences in propagation characteristics such as extreme
sensitivity to building blockages. This paper considers a scenario where
low-power devices extract energy and/or information from the mmWave signals.
Using stochastic geometry, analytical expressions are derived for the energy
coverage probability, the average harvested power, and the overall
(energy-and-information) coverage probability at a typical wireless-powered
device in terms of the BS density, the antenna geometry parameters, and the
channel parameters. Numerical results reveal several network and device level
design insights. At the BSs, optimizing the antenna geometry parameters such as
beamwidth can maximize the network-wide energy coverage for a given user
population. At the device level, the performance can be substantially improved
by optimally splitting the received signal for energy and information
extraction, and by deploying multi-antenna arrays. For the latter, an efficient
low-power multi-antenna mmWave receiver architecture is proposed for
simultaneous energy and information transfer. Overall, simulation results
suggest that mmWave energy harvesting generally outperforms lower frequency
solutions.
|
[
{
"version": "v1",
"created": "Sat, 5 Sep 2015 01:37:32 GMT"
},
{
"version": "v2",
"created": "Sat, 9 Apr 2016 14:45:59 GMT"
},
{
"version": "v3",
"created": "Sat, 11 Mar 2017 00:28:14 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Khan",
"Talha Ahmed",
""
],
[
"Alkhateeb",
"Ahmed",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] |
new_dataset
| 0.997066 |
1608.02339
|
Filippo Bonazzi
|
Elena Reshetova, Filippo Bonazzi, N. Asokan
|
SELint: an SEAndroid policy analysis tool
|
12 pages
|
Proceedings of the 3rd International Conference on Information
Systems Security and Privacy - Volume 1, 2017, pages 47-58
|
10.5220/0006126600470058
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
SEAndroid enforcement is now mandatory for Android devices. In order to
provide the desired level of security for their products, Android OEMs need to
be able to minimize their mistakes in writing SEAndroid policies. However,
existing SEAndroid and SELinux tools are not very useful for this purpose. It
has been shown that SEAndroid policies found in commercially available devices
for multiple manufacturers contain mistakes and redundancies. In this paper we
present a new tool, SELint, which aims to help OEMs to produce better SEAndroid
policies. SELint is extensible and configurable to suit the needs of different
OEMs. It is provided with a default configuration based on the AOSP SEAndroid
policy, but can be customized by OEMs.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2016 07:31:40 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Oct 2016 17:18:37 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Mar 2017 13:35:59 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Reshetova",
"Elena",
""
],
[
"Bonazzi",
"Filippo",
""
],
[
"Asokan",
"N.",
""
]
] |
new_dataset
| 0.999564 |
1609.09359
|
Daniele Lain
|
Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik
|
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP
|
To appear in ACM Asia Conference on Computer and Communications
Security (ASIACCS) 2017. 13 pages, 17 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Acoustic emanations of computer keyboards represent a serious privacy issue.
As demonstrated in prior work, physical properties of keystroke sounds might
reveal what a user is typing. However, previous attacks assumed relatively
strong adversary models that are not very practical in many real-world
settings. Such strong models assume: (i) adversary's physical proximity to the
victim, (ii) precise profiling of the victim's typing style and keyboard,
and/or (iii) significant amount of victim's typed information (and its
corresponding sounds) available to the adversary.
This paper presents and explores a new keyboard acoustic eavesdropping attack
that involves Voice-over-IP (VoIP), called Skype & Type (S&T), while avoiding
prior strong adversary assumptions. This work is motivated by the simple
observation that people often engage in secondary activities (including typing)
while participating in VoIP calls. As expected, VoIP software acquires and
faithfully transmits all sounds, including emanations of pressed keystrokes,
which can include passwords and other sensitive information. We show that one
very popular VoIP software (Skype) conveys enough audio information to
reconstruct the victim's input -- keystrokes typed on the remote keyboard. Our
results demonstrate that, given some knowledge on the victim's typing style and
keyboard model, the attacker attains top-5 accuracy of 91.7% in guessing a
random key pressed by the victim.
Furthermore, we demonstrate that S&T is robust to various VoIP issues (e.g.,
Internet bandwidth fluctuations and presence of voice over keystrokes), thus
confirming feasibility of this attack. Finally, it applies to other popular
VoIP software, such as Google Hangouts.
|
[
{
"version": "v1",
"created": "Thu, 29 Sep 2016 14:24:04 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Mar 2017 18:35:01 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Compagno",
"Alberto",
""
],
[
"Conti",
"Mauro",
""
],
[
"Lain",
"Daniele",
""
],
[
"Tsudik",
"Gene",
""
]
] |
new_dataset
| 0.98099 |
1610.09044
|
Hassan Jameel Asghar
|
Jagmohan Chauhan and Benjamin Zi Hao Zhao and Hassan Jameel Asghar and
Jonathan Chan and Mohamed Ali Kaafar
|
BehavioCog: An Observation Resistant Authentication Scheme
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose that by integrating behavioural biometric gestures---such as
drawing figures on a touch screen---with challenge-response based cognitive
authentication schemes, we can benefit from the properties of both. On the one
hand, we can improve the usability of existing cognitive schemes by
significantly reducing the number of challenge-response rounds by (partially)
relying on the hardness of mimicking carefully designed behavioural biometric
gestures. On the other hand, the observation resistant property of cognitive
schemes provides an extra layer of protection for behavioural biometrics; an
attacker is unsure if a failed impersonation is due to a biometric failure or a
wrong response to the challenge. We design and develop an instantiation of such
a "hybrid" scheme, and call it BehavioCog. To provide security close to a
4-digit PIN---one in 10,000 chance to impersonate---we only need two
challenge-response rounds, which can be completed in less than 38 seconds on
average (as estimated in our user study), with the advantage that unlike PINs
or passwords, the scheme is secure under observation.
|
[
{
"version": "v1",
"created": "Fri, 28 Oct 2016 00:40:19 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Mar 2017 00:34:24 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Chauhan",
"Jagmohan",
""
],
[
"Zhao",
"Benjamin Zi Hao",
""
],
[
"Asghar",
"Hassan Jameel",
""
],
[
"Chan",
"Jonathan",
""
],
[
"Kaafar",
"Mohamed Ali",
""
]
] |
new_dataset
| 0.994539 |
1702.08033
|
Chunming Tang
|
Claude Carlet, Sihem Mesnager, Chunming Tang, Yanfeng Qi
|
Euclidean and Hermitian LCD MDS codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Linear codes with complementary duals (abbreviated LCD) are linear codes
whose intersection with their dual is trivial. When they are binary, they play
an important role in armoring implementations against side-channel attacks and
fault injection attacks. Non-binary LCD codes in characteristic 2 can be
transformed into binary LCD codes by expansion. On the other hand, being
optimal codes, maximum distance separable codes (abbreviated MDS) have been of
much interest from many researchers due to their theoretical significant and
practical implications. However, little work has been done on LCD MDS codes. In
particular, determining the existence of $q$-ary $[n,k]$ LCD MDS codes for
various lengths $n$ and dimensions $k$ is a basic and interesting problem. In
this paper, we firstly study the problem of the existence of $q$-ary $[n,k]$
LCD MDS codes and completely solve it for the Euclidean case. More
specifically, we show that for $q>3$ there exists a $q$-ary $[n,k]$ Euclidean
LCD MDS code, where $0\le k \le n\le q+1$, or, $q=2^{m}$, $n=q+2$ and $k= 3
\text{or} q-1$. Secondly, we investigate several constructions of new Euclidean
and Hermitian LCD MDS codes. Our main techniques in constructing Euclidean and
Hermitian LCD MDS codes use some linear codes with small dimension or
codimension, self-orthogonal codes and generalized Reed-Solomon codes.
|
[
{
"version": "v1",
"created": "Sun, 26 Feb 2017 13:55:24 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Mar 2017 11:46:29 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Carlet",
"Claude",
""
],
[
"Mesnager",
"Sihem",
""
],
[
"Tang",
"Chunming",
""
],
[
"Qi",
"Yanfeng",
""
]
] |
new_dataset
| 0.999623 |
1703.03831
|
Giacomo Cabri
|
Daniele Grassi, Giacomo Barigazzi, Giacomo Cabri
|
User Longevity and Engagement in Mobile Multiplayer Sports Management
Games
| null | null | null | null |
cs.CY cs.HC
|
http://creativecommons.org/licenses/by/4.0/
|
Mobile games are extremely popular and engage millions of people every day.
Even if they are often quite simple, their development features a high degree
of difficulty and requires close attention to both achieve a high satisfaction
from users and grant a return to the developers. In this paper we propose a
model that analyzes users' playing session time in order to evaluate and
maximize the longevity of games, even during the first phases of their
development.
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2017 20:10:41 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Grassi",
"Daniele",
""
],
[
"Barigazzi",
"Giacomo",
""
],
[
"Cabri",
"Giacomo",
""
]
] |
new_dataset
| 0.998904 |
1703.03904
|
Alireza Poshtkohi
|
Alireza Poshtkohi, Ali Haj Abutalebi, Shaahin Hessabi
|
DotGrid: a .NET-based cross-platform software for desktop grids
|
20 pages, 14 figures
|
Int. J. Web and Grid Services, Vol. 3, No. 3, pp.313-332, 2007
|
10.1504/IJWGS.2007.014955
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Grid infrastructures that have provided wide integrated use of resources are
becoming the de-facto computing platform for solving large-scale problems in
science, engineering and commerce. In this evolution, desktop grid technologies
allow the grid communities to exploit the idle cycles of pervasive desktop PC
systems to increase the available computing power. In this paper we present
DotGrid, a cross-platform grid software. DotGrid is the first comprehensive
desktop grid software utilising Microsoft's .NET Framework in Windows-based
environments and MONO .NET in Unix-class operating systems to operate. Using
DotGrid services and APIs, grid desktop middleware and applications can be
implemented conveniently. We evaluated our DotGrid's performance by
implementing a set of grid-based applications.
|
[
{
"version": "v1",
"created": "Sat, 11 Mar 2017 04:13:25 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Poshtkohi",
"Alireza",
""
],
[
"Abutalebi",
"Ali Haj",
""
],
[
"Hessabi",
"Shaahin",
""
]
] |
new_dataset
| 0.998777 |
1703.03963
|
Anton Eremeev
|
Anton Eremeev, Yulia Kovalenko
|
On Solving Travelling Salesman Problem with Vertex Requisitions
|
To appear in Yugoslav Journal of Operations Research
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the Travelling Salesman Problem with Vertex Requisitions, where
for each position of the tour at most two possible vertices are given. It is
known that the problem is strongly NP-hard. The proposed algorithm for this
problem has less time complexity compared to the previously known one. In
particular, almost all feasible instances of the problem are solvable in O(n)
time using the new algorithm, where n is the number of vertices. The developed
approach also helps in fast enumeration of a neighborhood in the local search
and yields an integer programming model with O(n) binary variables for the
problem.
|
[
{
"version": "v1",
"created": "Sat, 11 Mar 2017 12:24:19 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Eremeev",
"Anton",
""
],
[
"Kovalenko",
"Yulia",
""
]
] |
new_dataset
| 0.966638 |
1703.04009
|
Thomas Davidson
|
Thomas Davidson, Dana Warmsley, Michael Macy, Ingmar Weber
|
Automated Hate Speech Detection and the Problem of Offensive Language
|
To appear in the Proceedings of ICWSM 2017. Please cite that version
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A key challenge for automatic hate-speech detection on social media is the
separation of hate speech from other instances of offensive language. Lexical
detection methods tend to have low precision because they classify all messages
containing particular terms as hate speech and previous work using supervised
learning has failed to distinguish between the two categories. We used a
crowd-sourced hate speech lexicon to collect tweets containing hate speech
keywords. We use crowd-sourcing to label a sample of these tweets into three
categories: those containing hate speech, only offensive language, and those
with neither. We train a multi-class classifier to distinguish between these
different categories. Close analysis of the predictions and the errors shows
when we can reliably separate hate speech from other offensive language and
when this differentiation is more difficult. We find that racist and homophobic
tweets are more likely to be classified as hate speech but that sexist tweets
are generally classified as offensive. Tweets without explicit hate keywords
are also more difficult to classify.
|
[
{
"version": "v1",
"created": "Sat, 11 Mar 2017 18:20:13 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Davidson",
"Thomas",
""
],
[
"Warmsley",
"Dana",
""
],
[
"Macy",
"Michael",
""
],
[
"Weber",
"Ingmar",
""
]
] |
new_dataset
| 0.959749 |
1703.04060
|
Derrick Wing Kwan Ng
|
Lou Zhao, Derrick Wing Kwan Ng, and Jinhong Yuan
|
Multi-user Precoding and Channel Estimation for Hybrid Millimeter Wave
Systems
|
15 pages, accepted for publication, JSAC 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we develop a low-complexity channel estimation for hybrid
millimeter wave (mmWave) systems, where the number of radio frequency (RF)
chains is much less than the number of antennas equipped at each transceiver.
The proposed mmWave channel estimation algorithm first exploits multiple
frequency tones to estimate the strongest angle-of-arrivals (AoAs) at both base
station (BS) and user sides for the design of analog beamforming matrices. Then
all the users transmit orthogonal pilot symbols to the BS along the directions
of the estimated strongest AoAs in order to estimate the channel. The estimated
channel will be adopted to design the digital zero-forcing (ZF) precoder at the
BS for the multi-user downlink transmission. The proposed channel estimation
algorithm is applicable to both nonsparse and sparse mmWave channel
environments. Furthermore, we derive a tight achievable rate upper bound of the
digital ZF precoding with the proposed channel estimation algorithm scheme. Our
analytical and simulation results show that the proposed scheme obtains a
considerable achievable rate of fully digital systems, where the number of RF
chains equipped at each transceiver is equal to the number of antennas.
Besides, by taking into account the effect of various types of errors, i.e.,
random phase errors, transceiver analog beamforming errors, and equivalent
channel estimation errors, we derive a closed-form approximation for the
achievable rate of the considered scheme. We illustrate the robustness of the
proposed channel estimation and multi-user downlink precoding scheme against
the system imperfection.
|
[
{
"version": "v1",
"created": "Sun, 12 Mar 2017 02:27:20 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Zhao",
"Lou",
""
],
[
"Ng",
"Derrick Wing Kwan",
""
],
[
"Yuan",
"Jinhong",
""
]
] |
new_dataset
| 0.96225 |
1703.04079
|
Ayan Sinha
|
Ayan Sinha, Asim Unmesh, Qixing Huang and Karthik Ramani
|
SurfNet: Generating 3D shape surfaces using deep residual networks
|
CVPR 2017 paper
| null | null | null |
cs.CV cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
3D shape models are naturally parameterized using vertices and faces, \ie,
composed of polygons forming a surface. However, current 3D learning paradigms
for predictive and generative tasks using convolutional neural networks focus
on a voxelized representation of the object. Lifting convolution operators from
the traditional 2D to 3D results in high computational overhead with little
additional benefit as most of the geometry information is contained on the
surface boundary. Here we study the problem of directly generating the 3D shape
surface of rigid and non-rigid shapes using deep convolutional neural networks.
We develop a procedure to create consistent `geometry images' representing the
shape surface of a category of 3D objects. We then use this consistent
representation for category-specific shape surface generation from a parametric
representation or an image by developing novel extensions of deep residual
networks for the task of geometry image generation. Our experiments indicate
that our network learns a meaningful representation of shape surfaces allowing
it to interpolate between shape orientations and poses, invent new shape
surfaces and reconstruct 3D shape surfaces from previously unseen images.
|
[
{
"version": "v1",
"created": "Sun, 12 Mar 2017 07:21:50 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Sinha",
"Ayan",
""
],
[
"Unmesh",
"Asim",
""
],
[
"Huang",
"Qixing",
""
],
[
"Ramani",
"Karthik",
""
]
] |
new_dataset
| 0.994359 |
1703.04277
|
Faheem Ullah
|
Faheem Ullah, Adam Johannes Raft, Mojtaba Shahin, Mansooreh Zahedi and
Muhammad Ali Babar
|
Security Support in Continuous Deployment Pipeline
| null | null | null | null |
cs.SE cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Continuous Deployment (CD) has emerged as a new practice in the software
industry to continuously and automatically deploy software changes into
production. Continuous Deployment Pipeline (CDP) supports CD practice by
transferring the changes from the repository to production. Since most of the
CDP components run in an environment that has several interfaces to the
Internet, these components are vulnerable to various kinds of malicious
attacks. This paper reports our work aimed at designing secure CDP by utilizing
security tactics. We have demonstrated the effectiveness of five security
tactics in designing a secure pipeline by conducting an experiment on two CDPs
- one incorporates security tactics while the other does not. Both CDPs have
been analyzed qualitatively and quantitatively. We used assurance cases with
goal-structured notations for qualitative analysis. For quantitative analysis,
we used penetration tools. Our findings indicate that the applied tactics
improve the security of the major components (i.e., repository, continuous
integration server, main server) of a CDP by controlling access to the
components and establishing secure connections.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2017 07:38:16 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Ullah",
"Faheem",
""
],
[
"Raft",
"Adam Johannes",
""
],
[
"Shahin",
"Mojtaba",
""
],
[
"Zahedi",
"Mansooreh",
""
],
[
"Babar",
"Muhammad Ali",
""
]
] |
new_dataset
| 0.992747 |
1703.04283
|
Fabrizio Montecchiani
|
Patrizio Angelini, Michael A. Bekos, Giuseppe Liotta, Fabrizio
Montecchiani
|
Universal Slope Sets for 1-Bend Planar Drawings
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe a set of $\Delta -1$ slopes that are universal for 1-bend planar
drawings of planar graphs of maximum degree $\Delta \geq 4$; this establishes a
new upper bound of $\Delta-1$ on the 1-bend planar slope number. By universal
we mean that every planar graph of degree $\Delta$ has a planar drawing with at
most one bend per edge and such that the slopes of the segments forming the
edges belong to the given set of slopes. This improves over previous results in
two ways: Firstly, the best previously known upper bound for the 1-bend planar
slope number was $\frac{3}{2} (\Delta -1)$ (the known lower bound being
$\frac{3}{4} (\Delta -1)$); secondly, all the known algorithms to construct
1-bend planar drawings with $O(\Delta)$ slopes use a different set of slopes
for each graph and can have bad angular resolution, while our algorithm uses a
universal set of slopes, which also guarantees that the minimum angle between
any two edges incident to a vertex is $\frac{\pi}{(\Delta-1)}$.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2017 08:00:31 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Angelini",
"Patrizio",
""
],
[
"Bekos",
"Michael A.",
""
],
[
"Liotta",
"Giuseppe",
""
],
[
"Montecchiani",
"Fabrizio",
""
]
] |
new_dataset
| 0.999097 |
1703.04336
|
Sergiu Nisioi
|
Anca Bucur and Sergiu Nisioi
|
A Visual Representation of Wittgenstein's Tractatus Logico-Philosophicus
|
Workshop on Language Technology Resources and Tools for Digital
Humanities (LT4DH)
| null | null | null |
cs.IR cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present a data visualization method together with its
potential usefulness in digital humanities and philosophy of language. We
compile a multilingual parallel corpus from different versions of
Wittgenstein's Tractatus Logico-Philosophicus, including the original in German
and translations into English, Spanish, French, and Russian. Using this corpus,
we compute a similarity measure between propositions and render a visual
network of relations for different languages.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2017 11:19:56 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Bucur",
"Anca",
""
],
[
"Nisioi",
"Sergiu",
""
]
] |
new_dataset
| 0.995843 |
1703.04347
|
Anjany Kumar Sekuboyina
|
Anjany Sekuboyina, Alexander Valentinitsch, Jan S. Kirschke, and
Bjoern H. Menze
|
A Localisation-Segmentation Approach for Multi-label Annotation of
Lumbar Vertebrae using Deep Nets
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multi-class segmentation of vertebrae is a non-trivial task mainly due to the
high correlation in the appearance of adjacent vertebrae. Hence, such a task
calls for the consideration of both global and local context. Based on this
motivation, we propose a two-staged approach that, given a computed tomography
dataset of the spine, segments the five lumbar vertebrae and simultaneously
labels them. The first stage employs a multi-layered perceptron performing
non-linear regression for locating the lumbar region using the global context.
The second stage, comprised of a fully-convolutional deep network, exploits the
local context in the localised lumbar region to segment and label the lumbar
vertebrae in one go. Aided with practical data augmentation for training, our
approach is highly generalisable, capable of successfully segmenting both
healthy and abnormal vertebrae (fractured and scoliotic spines). We
consistently achieve an average Dice coefficient of over 90 percent on a
publicly available dataset of the xVertSeg segmentation challenge of MICCAI
2016. This is particularly noteworthy because the xVertSeg dataset is beset
with severe deformities in the form of vertebral fractures and scoliosis.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2017 11:55:16 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Sekuboyina",
"Anjany",
""
],
[
"Valentinitsch",
"Alexander",
""
],
[
"Kirschke",
"Jan S.",
""
],
[
"Menze",
"Bjoern H.",
""
]
] |
new_dataset
| 0.989625 |
1703.04414
|
Ludovic Chandesris
|
Ludovic Chandesris, Valentin Savin and David Declercq
|
Dynamic-SCFlip Decoding of Polar Codes
|
submitted to IEEE Transactions on Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a generalization of the recently introduced Successive
Cancellation Flip (SCFlip) decoding of polar codes, characterized by a number
of extra decoding attempts, where one or several positions are flipped from the
standard Successive Cancellation (SC) decoding. To make such an approach
effective, we first introduce the concept of higher-order bit-flips, and
propose a new metric to determine the bit-flips that are more likely to correct
the trajectory of the SC decoding. We then propose a generalized SCFlip
decoding algorithm, referred to as Dynamic-SCFlip (D-SCFlip), which dynamically
builds a list of candidate bit-flips, while guaranteeing that extra decoding
attempts are performed by decreasing probability of success. Simulation results
show that D-SCFlip is an effective alternative to SC-List decoding of polar
codes, by providing very good error correcting performance, with an average
computation complexity close to the one of the SC decoder.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2017 14:27:19 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Chandesris",
"Ludovic",
""
],
[
"Savin",
"Valentin",
""
],
[
"Declercq",
"David",
""
]
] |
new_dataset
| 0.991614 |
1703.04526
|
Maria G. Villarrea-Marroquin
|
Jonathan Montalvo-Urquizo, Mar\'ia G. Villarreal-Marroqu\'in, Jos\'e
J. Hern\'andez-Castillo, H\'ector E. Hern\'andez-Gonz\'alez
|
MWTP: Monterrey Weather, Traffic and Pollution Database for Geospatial
Analysis
|
13 pages, 6 figures, 6 Tables
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The MWTP: Monterrey Weather, Traffic and Pollution Database contains a
collection of historic weather conditions, and recent traffic and air pollution
data of the metropolitan area of Monterrey, Mexico. Collected data includes:
temperature, humidity, raining conditions, wind speed, travel distance, travel
time, PM2.5, PM10, O3, among many others. As of February 2017, the MWTP
database contained more than 4 million records of weather data, more than 700
thousand records of traffic data and around 57 thousand of air pollution
measurements. Here, it is described how the data is been collected and
structured into a databased, so it can be used for statistical and geospatial
analysis of the Monterrey area.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2017 06:54:21 GMT"
}
] | 2017-03-14T00:00:00 |
[
[
"Montalvo-Urquizo",
"Jonathan",
""
],
[
"Villarreal-Marroquín",
"María G.",
""
],
[
"Hernández-Castillo",
"José J.",
""
],
[
"Hernández-González",
"Héctor E.",
""
]
] |
new_dataset
| 0.999663 |
1501.05502
|
Mao Tan
|
Mao Tan, Hua-li Yang, Bin Duan, Yong-xin Su, Feng He
|
Optimizing production scheduling of steel plate hot rolling for economic
load dispatch under time-of-use electricity pricing
|
13 pages, 6 figures, 4 tables
| null |
10.1155/2017/1048081
| null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Time-of-Use (TOU) electricity pricing provides an opportunity for industrial
users to cut electricity costs. Although many methods for Economic Load
Dispatch (ELD) under TOU pricing in continuous industrial processing have been
proposed, there are still difficulties in batch-type processing since power
load units are not directly adjustable and nonlinearly depend on production
planning and scheduling. In this paper, for hot rolling, a typical batch-type
and energy intensive process in steel industry, a production scheduling
optimization model for ELD is proposed under TOU pricing, in which the
objective is to minimize electricity costs while considering penalties caused
by jumps between adjacent slabs. A NSGA-II based multi-objective production
scheduling algorithm is developed to obtain Pareto-optimal solutions, and then
TOPSIS based multi-criteria decision-making is performed to recommend an
optimal solution to facilitate filed operation. Experimental results and
analyses show that the proposed method cuts electricity costs in production,
especially in case of allowance for penalty score increase in a certain range.
Further analyses show that the proposed method has effect on peak load
regulation of power grid.
|
[
{
"version": "v1",
"created": "Thu, 22 Jan 2015 14:10:34 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Mar 2017 07:45:00 GMT"
}
] | 2017-03-13T00:00:00 |
[
[
"Tan",
"Mao",
""
],
[
"Yang",
"Hua-li",
""
],
[
"Duan",
"Bin",
""
],
[
"Su",
"Yong-xin",
""
],
[
"He",
"Feng",
""
]
] |
new_dataset
| 0.972785 |
1609.03897
|
Reza Faghih Mirzaee
|
Reza Faghih Mirzaee, Niloofar Farahani
|
Design of a Ternary Edge-Triggered D Flip-Flap-Flop for Multiple-Valued
Sequential Logic
|
9 Pages, 7 Figures, 5 Tables
| null | null | null |
cs.AR
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Development of large computerized systems requires both combinational and
sequential circuits. Registers and counters are two important examples of
sequential circuits, which are widely used in practical applications like CPUs.
The basic element of sequential logic is Flip-Flop, which stores an input value
and returns two outputs (Q and Q_bar). This paper presents an innovative
ternary D Flip-Flap-Flop, which offers circuit designers to customize their
design by eliminating one of the outputs if it is not required. This unique
feature of the new design leads to considerable power reduction in comparison
with the previously presented structures. The proposed design is simulated and
tested by HSPICE and 45 nm CMOS technology.
|
[
{
"version": "v1",
"created": "Tue, 13 Sep 2016 15:33:06 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Mar 2017 18:33:06 GMT"
},
{
"version": "v3",
"created": "Fri, 10 Mar 2017 16:15:21 GMT"
}
] | 2017-03-13T00:00:00 |
[
[
"Mirzaee",
"Reza Faghih",
""
],
[
"Farahani",
"Niloofar",
""
]
] |
new_dataset
| 0.99681 |
1612.06099
|
Valerio Bioglio
|
Frederic Gabry, Valerio Bioglio, Ingmar Land, Jean-Claude Belfiore
|
Multi-Kernel Construction of Polar Codes
|
to appear in: Workshop on Channel Coding for 5G and Future Networks -
IEEE ICC 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a generalized construction for binary polar codes based on mixing
multiple kernels of different sizes in order to construct polar codes of block
lengths that are not only powers of integers. This results in a multi kernel
polar code with very good performance while the encoding complexity remains low
and the decoding follows the same general structure as for the original Arikan
polar codes. The construction provides numerous practical advantages as more
code lengths can be achieved without puncturing or shortening. We observe
numerically that the error-rate performance of our construction outperforms
stateof the-art constructions using puncturing methods.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2016 10:07:07 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Mar 2017 11:29:17 GMT"
}
] | 2017-03-13T00:00:00 |
[
[
"Gabry",
"Frederic",
""
],
[
"Bioglio",
"Valerio",
""
],
[
"Land",
"Ingmar",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] |
new_dataset
| 0.964674 |
1703.03594
|
Alireza Poshtkohi
|
Alireza Poshtkohi, M.B. Ghaznavi-Ghoushchi
|
The xDotGrid Native, Cross-Platform, High-Performance xDFS File Transfer
Framework
|
25 pages, 20 figures
|
Computers & Electrical Engineering 38(6), 1409-1432 (2012)
|
10.1016/j.compeleceng.2012.04.007
|
01
|
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce and describe the highly concurrent xDFS file
transfer protocol and examine its cross-platform and cross-language
implementation in native code for both Linux and Windows in 32 or 64-bit
multi-core processor architectures. The implemented xDFS protocol based on
xDotGrid.NET framework is fully compared with the Globus GridFTP protocol. We
finally propose the xDFS protocol as a new paradigm of distributed systems for
Internet services, and data-intensive Grid and Cloud applications. Also, we
incrementally consider different developmental methods of the optimum file
transfer systems, and their advantages and disadvantages. The vision of this
paper tries as possible to minimize the overhead concerned with the file
transfer protocol itself and to examine optimal software design patterns of
that protocol. In all disk-to-disk tests for transferring a 2GB file with or
without parallelism, the xDFS throughput at minimum 30% and at most 53% was
superior to the GridFTP.
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2017 09:33:45 GMT"
}
] | 2017-03-13T00:00:00 |
[
[
"Poshtkohi",
"Alireza",
""
],
[
"Ghaznavi-Ghoushchi",
"M. B.",
""
]
] |
new_dataset
| 0.995838 |
1703.03609
|
Mostafa Salehi
|
Saeedreza Shehnepoor, Mostafa Salehi, Reza Farahbakhsh and Noel Crespi
|
NetSpam: a Network-based Spam Detection Framework for Reviews in Online
Social Media
| null | null |
10.1109/TIFS.2017.2675361
| null |
cs.SI cs.CL cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays, a big part of people rely on available content in social media in
their decisions (e.g. reviews and feedback on a topic or product). The
possibility that anybody can leave a review provide a golden opportunity for
spammers to write spam reviews about products and services for different
interests. Identifying these spammers and the spam content is a hot topic of
research and although a considerable number of studies have been done recently
toward this end, but so far the methodologies put forth still barely detect
spam reviews, and none of them show the importance of each extracted feature
type. In this study, we propose a novel framework, named NetSpam, which
utilizes spam features for modeling review datasets as heterogeneous
information networks to map spam detection procedure into a classification
problem in such networks. Using the importance of spam features help us to
obtain better results in terms of different metrics experimented on real-world
review datasets from Yelp and Amazon websites. The results show that NetSpam
outperforms the existing methods and among four categories of features;
including review-behavioral, user-behavioral, reviewlinguistic,
user-linguistic, the first type of features performs better than the other
categories.
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2017 10:17:27 GMT"
}
] | 2017-03-13T00:00:00 |
[
[
"Shehnepoor",
"Saeedreza",
""
],
[
"Salehi",
"Mostafa",
""
],
[
"Farahbakhsh",
"Reza",
""
],
[
"Crespi",
"Noel",
""
]
] |
new_dataset
| 0.982825 |
1703.03631
|
Matias Martinez
|
Matias Martinez, Sylvain Lecomte
|
XamForumDB: a dataset for studying Q&A about cross-platform mobile
applications development
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Android and iSO are the two mobile platforms present in almost all
smartphones build during last years. Developing an application that targets
both platforms is a challenge. A traditional way is to build two different
apps, one in Java for Android, the other in Objective-C for iOS. Xamarin is a
framework for developing Android and iOS apps which allows developers to share
most of the application code across multiple implementations of the app, each
for a specific platform. In this paper, we present XamForumDB, a database that
stores discussions, questions and answers extracted from the Xamarin forum. We
envision research community could use it for studying, for instance, the
problematic of developing such kind of applications.
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2017 11:26:56 GMT"
}
] | 2017-03-13T00:00:00 |
[
[
"Martinez",
"Matias",
""
],
[
"Lecomte",
"Sylvain",
""
]
] |
new_dataset
| 0.999882 |
1703.03677
|
Weile Zhang
|
Weile Zhang and Hai Lin
|
Uncoordinated Frequency Shifts based Pilot Contamination Attack
Detection
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Pilot contamination attack is an important kind of active eavesdropping
activity conducted by a malicious user during channel training phase. In this
paper, motivated by the fact that frequency asynchronism could introduce
divergence of the transmitted pilot signals between intended user and attacker,
we propose a new uncoordinated frequency shift (UFS) scheme for detection of
pilot contamination attack in multiple antenna system. An attack detection
algorithm is further developed based on source enumeration method. Both the
asymptotic detection performance analysis and numerical results are provided to
verify the proposed studies. The results demonstrate that the proposed UFS
scheme can achieve comparable detection performance as the existing
superimposed random sequence based scheme, without sacrifice of legitimate
channel estimation performance.
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2017 13:30:51 GMT"
}
] | 2017-03-13T00:00:00 |
[
[
"Zhang",
"Weile",
""
],
[
"Lin",
"Hai",
""
]
] |
new_dataset
| 0.987521 |
1612.06151
|
Hendrik Barfuss
|
Hendrik Barfuss and Michael Buerger and Jasper Podschus and Walter
Kellermann
|
HRTF-based two-dimensional robust least-squares frequency-invariant
beamformer design for robot audition
|
Joint Workshop on Hands-free Speech Communication and Microphone
Arrays (HSCMA), March 2017, San Francisco, CA, USA
| null | null | null |
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we propose a two-dimensional Head-Related Transfer Function
(HRTF)-based robust beamformer design for robot audition, which allows for
explicit control of the beamformer response for the entire three-dimensional
sound field surrounding a humanoid robot. We evaluate the proposed method by
means of both signal-independent and signal-dependent measures in a robot
audition scenario. Our results confirm the effectiveness of the proposed
two-dimensional HRTF-based beamformer design, compared to our previously
published one-dimensional HRTF-based beamformer design, which was carried out
for a fixed elevation angle only.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2016 12:19:25 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Feb 2017 08:51:24 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Mar 2017 08:47:38 GMT"
}
] | 2017-03-10T00:00:00 |
[
[
"Barfuss",
"Hendrik",
""
],
[
"Buerger",
"Michael",
""
],
[
"Podschus",
"Jasper",
""
],
[
"Kellermann",
"Walter",
""
]
] |
new_dataset
| 0.984606 |
1702.01795
|
Peter Patel-Schneider
|
Peter F. Patel-Schneider
|
ASHACL: Alternative Shapes Constraint Language
|
18 pages
| null | null | null |
cs.AI
|
http://creativecommons.org/licenses/by/4.0/
|
ASHACL, a variant of the W3C Shapes Constraint Language, is designed to
determine whether an RDF graph meets some conditions. These conditions are
grouped into shapes, which validate whether particular RDF terms each meet the
constraints of the shape. Shapes are themselves expressed as RDF triples in an
RDF graph, called a shapes graph.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2017 21:13:43 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Mar 2017 13:10:02 GMT"
}
] | 2017-03-10T00:00:00 |
[
[
"Patel-Schneider",
"Peter F.",
""
]
] |
new_dataset
| 0.999827 |
1703.02968
|
Daniele Bernardini
|
Andrea Barillari (1), Daniele Bernardini (1), Pierluigi Crescenzi (2)
((1) Intranet Standard GmbH, Munich, Germany (2) Universit\`a di Firenze,
Italy)
|
Sigil3D: A Crowdsourcing Platform for Interactive 3D Content
|
translated from the paper published in the conference proceedings for
GARR 2017
| null | null | null |
cs.HC cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose applying the crowdsourcing approach to a software
platform that uses a modern and state-of-the-art 3D game engine. This platform
could facilitate the generation and manipulation of interactive 3D environments
by a community of users producing different content such as cultural heritage,
scientific virtual labs, games, novel art forms and virtual museums.
|
[
{
"version": "v1",
"created": "Wed, 8 Mar 2017 18:16:21 GMT"
}
] | 2017-03-10T00:00:00 |
[
[
"Barillari",
"Andrea",
""
],
[
"Bernardini",
"Daniele",
""
],
[
"Crescenzi",
"Pierluigi",
""
]
] |
new_dataset
| 0.984849 |
1703.03017
|
Rub\'en Saborido Infantes
|
Rub\'en Saborido, Foutse Khomh, Yann-Ga\"el Gu\'eh\'eneuc, Giuliano
Antoniol
|
Comprehension of Ads-supported and Paid Android Applications: Are They
Different?
|
Accepted for publication in the proceedings of the IEEE International
Conference on Program Comprehension 2017
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Android market is a place where developers offer paid and-or free apps to
users. Free apps are interesting to users because they can try them immediately
without incurring a monetary cost. However, free apps often have limited
features and-or contain ads when compared to their paid counterparts. Thus,
users may eventually need to pay to get additional features and-or remove ads.
While paid apps have clear market values, their ads-supported versions are not
entirely free because ads have an impact on performance.
In this paper, first, we perform an exploratory study about ads-supported and
paid apps to understand their differences in terms of implementation and
development process. We analyze 40 Android apps and we observe that (i)
ads-supported apps are preferred by users although paid apps have a better
rating, (ii) developers do not usually offer a paid app without a corresponding
free version, (iii) ads-supported apps usually have more releases and are
released more often than their corresponding paid versions, (iv) there is no a
clear strategy about the way developers set prices of paid apps, (v) paid apps
do not usually include more functionalities than their corresponding
ads-supported versions, (vi) developers do not always remove ad networks in
paid versions of their ads-supported apps, and (vii) paid apps require less
permissions than ads-supported apps. Second, we carry out an experimental study
to compare the performance of ads-supported and paid apps and we propose four
equations to estimate the cost of ads-supported apps. We obtain that (i)
ads-supported apps use more resources than their corresponding paid versions
with statistically significant differences and (ii) paid apps could be
considered a most cost-effective choice for users because their cost can be
amortized in a short period of time, depending on their usage.
|
[
{
"version": "v1",
"created": "Wed, 8 Mar 2017 20:04:30 GMT"
}
] | 2017-03-10T00:00:00 |
[
[
"Saborido",
"Rubén",
""
],
[
"Khomh",
"Foutse",
""
],
[
"Guéhéneuc",
"Yann-Gaël",
""
],
[
"Antoniol",
"Giuliano",
""
]
] |
new_dataset
| 0.998719 |
1703.03070
|
Aytac Azgin
|
Asit Chakraborti, Syed Obaid Amin, Aytac Azgin, Ravishankar Ravindran,
Guo-Qiang Wang
|
SRMCA: A Scalable and Resilient Real-time Multi-party Communication
Architecture
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a scalable and resilient real-time multi-party
communication architecture for the delivery of mixed media streams, for which
content centric networking, with its intelligent network layer, is chosen for
implementation to address the shortcomings of the current IP-based Internet
architecture. Content centric networking (CCN) represents one of the major
proposals targeting future Internet architecture, and is typically optimized
for non-realtime content delivery. Proposed research in this paper addresses
the architectural challenges for large-scale deployment of CCN to serve
real-time applications from the perspective of a multi-party video conferencing
framework, with the necessary architectural components to support application-
and system-level objectives, in regards to quality of experience, resource
utilization, and scalability. We present an in-depth analysis of the proposed
architecture by first providing an analytical driven study for the system, and
then demonstrating its performance by emulating the architecture over a
test-bed with a large number of participants involved in many-to-many
communication sessions. The results suggest that the proposed architecture can
scale well above 50 participants without incurring significant penalty in
signaling, communication, and computing overheads, with capability to support
100 or more participants.
|
[
{
"version": "v1",
"created": "Wed, 8 Mar 2017 23:21:53 GMT"
}
] | 2017-03-10T00:00:00 |
[
[
"Chakraborti",
"Asit",
""
],
[
"Amin",
"Syed Obaid",
""
],
[
"Azgin",
"Aytac",
""
],
[
"Ravindran",
"Ravishankar",
""
],
[
"Wang",
"Guo-Qiang",
""
]
] |
new_dataset
| 0.969686 |
1703.03101
|
Zhongqi Sun
|
Zhongqi Sun, Li Dai, Kun Liu, Yuanqing Xia, Karl Henrik Johansson
|
Robust MPC for tracking of nonholonomic robots with additive
disturbances
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, two robust model predictive control (MPC) schemes are proposed
for tracking control of nonholonomic systems with bounded disturbances:
tube-MPC and nominal robust MPC (NRMPC). In tube-MPC, the control signal
consists of a control action and a nonlinear feedback law based on the
deviation of the actual states from the states of a nominal system. It renders
the actual trajectory within a tube centered along the optimal trajectory of
the nominal system. Recursive feasibility and input-to-state stability are
established and the constraints are ensured by tightening the input domain and
the terminal region. While in NRMPC, an optimal control sequence is obtained by
solving an optimization problem based on the current state, and the first
portion of this sequence is applied to the real system in an open-loop manner
during each sampling period. The state of nominal system model is updated by
the actual state at each step, which provides additional a feedback. By
introducing a robust state constraint and tightening the terminal region,
recursive feasibility and input-to-state stability are guaranteed. Simulation
results demonstrate the effectiveness of both strategies proposed.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2017 01:39:27 GMT"
}
] | 2017-03-10T00:00:00 |
[
[
"Sun",
"Zhongqi",
""
],
[
"Dai",
"Li",
""
],
[
"Liu",
"Kun",
""
],
[
"Xia",
"Yuanqing",
""
],
[
"Johansson",
"Karl Henrik",
""
]
] |
new_dataset
| 0.960577 |
1703.03115
|
Patrick Sol\'e
|
Adel Alahmadi, Cem G\"uneri, Buket \"Ozkaya, Hatoon Shoaib, Patrick
Sol\'e
|
On linear complementary-dual multinegacirculant codes
|
arXiv admin note: text overlap with arXiv:1606.00815
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Linear codes with complementary-duals (LCD) are linear codes that intersect
with their dual trivially. Multinegacirculant codes of index $2$ that are LCD
are characterized algebraically and some good codes are found in this family.
Exact enumeration is performed for indices 2 and 3, and for all indices $t$ for
a special case of the co-index by using their concatenated structure.
Asymptotic existence results are derived for the special class of such codes
that are one-generator and have co-index a power of two by means of Dickson
polynomials. This shows that there are infinite families of LCD
multinegacirculant codes with relative distance satisfying a modified
Varshamov-Gilbert bound.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2017 02:57:09 GMT"
}
] | 2017-03-10T00:00:00 |
[
[
"Alahmadi",
"Adel",
""
],
[
"Güneri",
"Cem",
""
],
[
"Özkaya",
"Buket",
""
],
[
"Shoaib",
"Hatoon",
""
],
[
"Solé",
"Patrick",
""
]
] |
new_dataset
| 0.998164 |
1703.03186
|
Lucia Maddalena
|
Mario Rosario Guarracino and Lucia Maddalena
|
Segmenting Dermoscopic Images
|
4 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose an automatic algorithm, named SDI, for the segmentation of skin
lesions in dermoscopic images, articulated into three main steps: selection of
the image ROI, selection of the segmentation band, and segmentation. We present
extensive experimental results achieved by the SDI algorithm on the lesion
segmentation dataset made available for the ISIC 2017 challenge on Skin Lesion
Analysis Towards Melanoma Detection, highlighting its advantages and
disadvantages.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2017 09:14:40 GMT"
}
] | 2017-03-10T00:00:00 |
[
[
"Guarracino",
"Mario Rosario",
""
],
[
"Maddalena",
"Lucia",
""
]
] |
new_dataset
| 0.998864 |
1703.03222
|
B.Sundar Rajan
|
Divya U. S. and B. Sundar Rajan
|
Maximum Likelihood Decoder for Index Coded PSK Modulation for Priority
Ordered Receivers
|
9 pages, 6 figures and 2 tables
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Index coded PSK modulation over an AWGN broadcast channel, for a given index
coding problem (ICP) is studied. For a chosen index code and an arbitrary
mapping (of broadcast vectors to PSK signal points), we have derived a decision
rule for the maximum likelihood (ML) decoder. The message error performance of
a receiver at high SNR is characterized by a parameter called PSK Index Coding
Gain (PSK-ICG). The PSK-ICG of a receiver is determined by a metric called
minimum inter-set distance. For a given ICP with an order of priority among the
receivers, and a chosen $2^N$-PSK constellation we propose an algorithm to find
(index code, mapping) pairs, each of which gives the best performance in terms
of PSK-ICG of the receivers. No other pair of index code (of length $N$ with
$2^N$ broadcast vectors) and mapping can give a better PSK-ICG for the highest
priority receiver. Also, given that the highest priority receiver achieves its
best performance, the next highest priority receiver achieves its maximum gain
possible and so on in the specified order or priority.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2017 10:45:31 GMT"
}
] | 2017-03-10T00:00:00 |
[
[
"S.",
"Divya U.",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
new_dataset
| 0.999287 |
1703.03378
|
Wei-Han Lee
|
Wei-Han Lee, Ruby Lee
|
Multi-sensor authentication to improve smartphone security
|
Published in International Conference on Information Systems Security
and Privacy (ICISSP), 2015
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The widespread use of smartphones gives rise to new security and privacy
concerns. Smartphone thefts account for the largest percentage of thefts in
recent crime statistics. Using a victim's smartphone, the attacker can launch
impersonation attacks, which threaten the security of the victim and other
users in the network. Our threat model includes the attacker taking over the
phone after the user has logged on with his password or pin. Our goal is to
design a mechanism for smartphones to better authenticate the current user,
continuously and implicitly, and raise alerts when necessary. In this paper, we
propose a multi-sensors-based system to achieve continuous and implicit
authentication for smartphone users. The system continuously learns the owner's
behavior patterns and environment characteristics, and then authenticates the
current user without interrupting user-smartphone interactions. Our method can
adaptively update a user's model considering the temporal change of user's
patterns. Experimental results show that our method is efficient, requiring
less than 10 seconds to train the model and 20 seconds to detect the abnormal
user, while achieving high accuracy (more than 90%). Also the combination of
more sensors provide better accuracy. Furthermore, our method enables adjusting
the security level by changing the sampling rate.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2017 18:27:48 GMT"
}
] | 2017-03-10T00:00:00 |
[
[
"Lee",
"Wei-Han",
""
],
[
"Lee",
"Ruby",
""
]
] |
new_dataset
| 0.965371 |
1603.01911
|
Andr\'e van Renssen
|
Jean-Francois Baffier, Man-Kwun Chiu, Yago Diez, Matias Korman, Valia
Mitsou, Andr\'e van Renssen, Marcel Roeloffzen, Yushi Uno
|
Hanabi is NP-hard, Even for Cheaters who Look at Their Cards
| null | null | null | null |
cs.DM cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study a cooperative card game called Hanabi from the
viewpoint of algorithmic combinatorial game theory. In Hanabi, each card has
one among $c$ colors and a number between $1$ and $n$. The aim is to make, for
each color, a pile of cards of that color with all increasing numbers from $1$
to $n$. At each time during the game, each player holds $h$ cards in hand.
Cards are drawn sequentially from a deck and the players should decide whether
to play, discard or store them for future use. One of the features of the game
is that the players can see their partners' cards but not their own and
information must be shared through hints.
We introduce a single-player, perfect-information model and show that the
game is intractable even for this simplified version where we forego both the
hidden information and the multiplayer aspect of the game, even when the player
can only hold two cards in her hand. On the positive side, we show that the
decision version of the problem---to decide whether or not numbers from $1$
through $n$ can be played for every color---can be solved in (almost) linear
time for some restricted cases.
|
[
{
"version": "v1",
"created": "Mon, 7 Mar 2016 01:29:25 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Feb 2017 04:53:03 GMT"
},
{
"version": "v3",
"created": "Wed, 8 Mar 2017 02:53:44 GMT"
}
] | 2017-03-09T00:00:00 |
[
[
"Baffier",
"Jean-Francois",
""
],
[
"Chiu",
"Man-Kwun",
""
],
[
"Diez",
"Yago",
""
],
[
"Korman",
"Matias",
""
],
[
"Mitsou",
"Valia",
""
],
[
"van Renssen",
"André",
""
],
[
"Roeloffzen",
"Marcel",
""
],
[
"Uno",
"Yushi",
""
]
] |
new_dataset
| 0.998688 |
1604.03000
|
Frederic Sala
|
Frederic Sala, Ryan Gabrys, Clayton Schoeny, and Lara Dolecek
|
Exact Reconstruction from Insertions in Synchronization Codes
|
18 pages, 3 figures. Accepted to IEEE Transactions on Information
Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work studies problems in data reconstruction, an important area with
numerous applications. In particular, we examine the reconstruction of binary
and non-binary sequences from synchronization (insertion/deletion-correcting)
codes. These sequences have been corrupted by a fixed number of symbol
insertions (larger than the minimum edit distance of the code), yielding a
number of distinct traces to be used for reconstruction. We wish to know the
minimum number of traces needed for exact reconstruction. This is a general
version of a problem tackled by Levenshtein for uncoded sequences.
We introduce an exact formula for the maximum number of common supersequences
shared by sequences at a certain edit distance, yielding an upper bound on the
number of distinct traces necessary to guarantee exact reconstruction. Without
specific knowledge of the codewords, this upper bound is tight. We apply our
results to the famous single deletion/insertion-correcting Varshamov-Tenengolts
(VT) codes and show that a significant number of VT codeword pairs achieve the
worst-case number of outputs needed for exact reconstruction. We also consider
extensions to other channels, such as adversarial deletion and
insertion/deletion channels and probabilistic channels.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2016 15:37:25 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Mar 2017 23:23:20 GMT"
}
] | 2017-03-09T00:00:00 |
[
[
"Sala",
"Frederic",
""
],
[
"Gabrys",
"Ryan",
""
],
[
"Schoeny",
"Clayton",
""
],
[
"Dolecek",
"Lara",
""
]
] |
new_dataset
| 0.956793 |
1612.07766
|
Joshua Lind
|
Joshua Lind, Ittay Eyal, Peter Pietzuch and Emin G\"un Sirer
|
Teechan: Payment Channels Using Trusted Execution Environments
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Blockchain protocols are inherently limited in transaction throughput and
latency. Recent efforts to address performance and scale blockchains have
focused on off-chain payment channels. While such channels can achieve low
latency and high throughput, deploying them securely on top of the Bitcoin
blockchain has been difficult, partly because building a secure implementation
requires changes to the underlying protocol and the ecosystem.
We present Teechan, a full-duplex payment channel framework that exploits
trusted execution environments. Teechan can be deployed securely on the
existing Bitcoin blockchain without having to modify the protocol. It: (i)
achieves a higher transaction throughput and lower transaction latency than
prior solutions; (ii) enables unlimited full-duplex payments as long as the
balance does not exceed the channel's credit; (iii) requires only a single
message to be sent per payment in any direction; and (iv) places at most two
transactions on the blockchain under any execution scenario.
We have built and deployed the Teechan framework using Intel SGX on the
Bitcoin network. Our experiments show that, not counting network latencies,
Teechan can achieve 2,480 transactions per second on a single channel, with
sub-millisecond latencies.
|
[
{
"version": "v1",
"created": "Thu, 22 Dec 2016 19:38:29 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Mar 2017 23:51:06 GMT"
}
] | 2017-03-09T00:00:00 |
[
[
"Lind",
"Joshua",
""
],
[
"Eyal",
"Ittay",
""
],
[
"Pietzuch",
"Peter",
""
],
[
"Sirer",
"Emin Gün",
""
]
] |
new_dataset
| 0.997406 |
1701.08607
|
Samiya Shimly
|
Samiya Shimly, David B. Smith and Samaneh Movassaghi
|
Cross-layer optimized routing with low duty cycle TDMA across multiple
wireless body area networks
|
6 pages, 6 figures, conference submission. arXiv admin note:
substantial text overlap with arXiv:1701.08605
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study the performance of two cross-layer optimized dynamic
routing techniques for radio interference mitigation across multiple coexisting
wireless body area networks (BANs), based on real-life measurements. At the
network layer, the best route is selected according to channel state
information from the physical layer, associated with low duty cycle TDMA at the
MAC layer. The routing techniques (i.e., shortest path routing (SPR), and novel
cooperative multi-path routing (CMR) incorporating 3-branch selection
combining) perform real-time and reliable data transfer across BANs operating
near the 2.4 GHz ISM band. An open-access experimental data set of 'everyday'
mixed-activities is used for analyzing the proposed cross-layer optimization.
We show that CMR gains up to 14 dB improvement with 8.3% TDMA duty cycle, and
even 10 dB improvement with 0.2% TDMA duty cycle over SPR, at 10% outage
probability at a realistic signal-to-interference-plus-noise ratio (SINR).
Acceptable packet delivery ratios (PDR) and spectral efficiencies are obtained
from SPR and CMR with reasonably sensitive receivers across a range of TDMA low
duty cycles, with up to 9 dB improvement of CMR over SPR at 90% PDR. The
distribution fits for received SINR through routing are also derived and
validated with theoretical analysis.
|
[
{
"version": "v1",
"created": "Fri, 13 Jan 2017 04:30:36 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Mar 2017 03:05:45 GMT"
}
] | 2017-03-09T00:00:00 |
[
[
"Shimly",
"Samiya",
""
],
[
"Smith",
"David B.",
""
],
[
"Movassaghi",
"Samaneh",
""
]
] |
new_dataset
| 0.978793 |
1703.02602
|
Carlos Vega
|
Carlos Vega, Paula Roquero, Rafael Leira, Ivan Gonzalez, Javier Aracil
|
Loginson: a transform and load system for very large scale log analysis
in large IT infrastructures
|
23 pages, Figure 12
|
The Journal of Supercomputing; Volume 73-2017; pp 1-22
|
10.1007/s11227-017-1990-1
| null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays, most systems and applications produce log records that are useful
for security and monitoring purposes such as debugging programming errors,
checking system status, and detecting configuration problems or even attacks.
To this end, a log repository becomes necessary whereby logs can be accessed
and visualized in a timely manner. This paper presents Loginson, a
high-performance log centralization system for large-scale log collection and
processing in large IT infrastructures. Besides log collection, Loginson
provides high-level analytics through a visual interface for the purpose of
troubleshooting critical incidents. We note that Loginson outperforms all of
the other log centralization solutions by taking full advantage of the vertical
scalability, and therefore decreasing Capital Expenditure (CAPEX) and Operating
Expense (OPEX) costs for deployment scenarios with a huge volume of log data.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2017 21:30:17 GMT"
}
] | 2017-03-09T00:00:00 |
[
[
"Vega",
"Carlos",
""
],
[
"Roquero",
"Paula",
""
],
[
"Leira",
"Rafael",
""
],
[
"Gonzalez",
"Ivan",
""
],
[
"Aracil",
"Javier",
""
]
] |
new_dataset
| 0.999066 |
1703.02798
|
Bruno Clerckx
|
Bruno Clerckx, Zati Bayani Zawawi and Kaibin Huang
|
Wirelessly Powered Backscatter Communications: Waveform Design and
SNR-Energy Tradeoff
|
submitted for publication
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper shows that wirelessly powered backscatter communications is
subject to a fundamental tradeoff between the harvested energy at the tag and
the reliability of the backscatter communication, measured in terms of SNR at
the reader. Assuming the RF transmit signal is a multisine waveform adaptive to
the channel state information, we derive a systematic approach to optimize the
transmit waveform weights (amplitudes and phases) in order to enlarge as much
as possible the SNRenergy region. Performance evaluations confirm the
significant benefits of using multiple frequency components in the adaptive
transmit multisine waveform to exploit the nonlinearity of the rectifier and a
frequency diversity gain.
|
[
{
"version": "v1",
"created": "Wed, 8 Mar 2017 12:01:15 GMT"
}
] | 2017-03-09T00:00:00 |
[
[
"Clerckx",
"Bruno",
""
],
[
"Zawawi",
"Zati Bayani",
""
],
[
"Huang",
"Kaibin",
""
]
] |
new_dataset
| 0.992735 |
1703.02852
|
Yulong Pei
|
Wouter Ligtenberg and Yulong Pei
|
Introduction to a Temporal Graph Benchmark
| null | null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A temporal graph is a data structure, consisting of nodes and edges in which
the edges are associated with time labels. To analyze the temporal graph, the
first step is to find a proper graph dataset/benchmark. While many temporal
graph datasets exist online, none could be found that used the interval labels
in which each edge is associated with a starting and ending time. Therefore we
create a temporal graph data based on Wikipedia reference graph for temporal
analysis. This report aims to provide more details of this graph benchmark to
those who are interested in using it.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2017 20:19:32 GMT"
}
] | 2017-03-09T00:00:00 |
[
[
"Ligtenberg",
"Wouter",
""
],
[
"Pei",
"Yulong",
""
]
] |
new_dataset
| 0.999453 |
1703.02866
|
Ramanujan M. S.
|
Daniel Lokshtanov, M. S. Ramanujan, Saket Saurabh
|
The Half-integral Erd\"os-P\'osa Property for Non-null Cycles
| null | null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A Group Labeled Graph is a pair $(G,\Lambda)$ where $G$ is an oriented graph
and $\Lambda$ is a mapping from the arcs of $G$ to elements of a group. A (not
necessarily directed) cycle $C$ is called non-null if for any cyclic ordering
of the arcs in $C$, the group element obtained by `adding' the labels on
forward arcs and `subtracting' the labels on reverse arcs is not the identity
element of the group. Non-null cycles in group labeled graphs generalize
several well-known graph structures, including odd cycles.
In this paper, we prove that non-null cycles on Group Labeled Graphs have the
half-integral Erd\"os-P\'osa property. That is, there is a function $f:{\mathbb
N}\to {\mathbb N}$ such that for any $k\in {\mathbb N}$, any group labeled
graph $(G,\Lambda)$ has a set of $k$ non-null cycles such that each vertex of
$G$ appears in at most two of these cycles or there is a set of at most $f(k)$
vertices that intersects every non-null cycle. Since it is known that non-null
cycles do not have the integeral Erd\"os-P\'osa property in general, a
half-integral Erd\"os-P\'osa result is the best one could hope for.
|
[
{
"version": "v1",
"created": "Wed, 8 Mar 2017 15:16:05 GMT"
}
] | 2017-03-09T00:00:00 |
[
[
"Lokshtanov",
"Daniel",
""
],
[
"Ramanujan",
"M. S.",
""
],
[
"Saurabh",
"Saket",
""
]
] |
new_dataset
| 0.984073 |
1504.07494
|
John B. Little
|
John B. Little
|
Toric Codes and Finite Geometries
|
11 pages
|
Finite Fields Appl. 45 (2017), 203-216
| null | null |
cs.IT math.AG math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show how the theory of affine geometries over the ring ${\mathbb
Z}/\langle q - 1\rangle$ can be used to understand the properties of toric and
generalized toric codes over ${\mathbb F}_q$. The minimum distance of these
codes is strongly tied to the collections of lines in the finite geometry that
contain subsets of the exponent vectors of the monomials that are evaluated to
produce the standard generator matrix for the code. We argue that this
connection is, in fact, even more direct than the connection with the lattice
geometry of those exponent vectors considered as elements of ${\mathbb Z}^2$ or
${\mathbb R}^2$. This point of view should be useful both as a way to visualize
properties of these codes and as a guide to heuristic searches for good codes
constructed in this fashion. In particular, we will use these ideas to see a
reason why these constructions have been so successful over the field ${\mathbb
F}_8$, but less successful in other cases.
This corrected version (posted on 3/6/2017) adds a necessary hypothesis in
Proposition 2.4. A counterexample to the previous version was pointed out to
the author by Melda G\"or\"ur and the author thanks her for bringing that to
his attention. Theorem 3.2 and Corollary 3.3 are also reformulated so they do
not refer to the new more restricted Proposition 2.4.
|
[
{
"version": "v1",
"created": "Tue, 28 Apr 2015 14:23:45 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Mar 2017 22:39:09 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Little",
"John B.",
""
]
] |
new_dataset
| 0.992538 |
1610.04982
|
Hongliang Zhang
|
Hongliang Zhang and Yun Liao and Lingyang Song
|
D2D-U: Device-to-Device Communications in Unlicensed Bands for 5G and
Beyond
| null | null | null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Device-to-Device (D2D) communication, which enables direct communication
between nearby mobile devices, is an attractive add-on component to improve
spectrum efficiency and user experience by reusing licensed cellular spectrum
in 5G system. In this paper, we propose to enable D2D communication in
unlicensed spectrum (D2D-U) as an underlay of the uplink LTE network for
further booming the network capacity. A sensing-based protocol is designed to
support the unlicensed channel access for both LTE and D2D users. We further
investigate the subchannel allocation problem to maximize the sum rate of LTE
and D2D users while taking into account their interference to the existing
Wi-Fi systems. Specifically, we formulate the subchannel allocation as a
many-to-many matching problem with externalities, and develop an iterative
user-subchannel swap algorithm. Analytical and simulation results show that the
proposed D2D-U scheme can significantly improve the system sum-rate.
|
[
{
"version": "v1",
"created": "Mon, 17 Oct 2016 06:32:03 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Mar 2017 02:56:54 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Zhang",
"Hongliang",
""
],
[
"Liao",
"Yun",
""
],
[
"Song",
"Lingyang",
""
]
] |
new_dataset
| 0.999063 |
1610.05432
|
Markus Eich
|
Markus Eich and Sareh Shirazi and Gordon Wyeth
|
ARTiS: Appearance-based Action Recognition in Task Space for Real-Time
Human-Robot Collaboration
| null | null | null | null |
cs.RO cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To have a robot actively supporting a human during a collaborative task, it
is crucial that robots are able to identify the current action in order to
predict the next one. Common approaches make use of high-level knowledge, such
as object affordances, semantics or understanding of actions in terms of pre-
and post-conditions. These approaches often require hand-coded a priori
knowledge, time- and resource-intensive or supervised learning techniques.
We propose to reframe this problem as an appearance-based place recognition
problem. In our framework, we regard sequences of visual images of human
actions as a map in analogy to the visual place recognition problem. Observing
the task for the second time, our approach is able to recognize pre-observed
actions in a one-shot learning approach and is thereby able to recognize the
current observation in the task space. We propose two new methods for creating
and aligning action observations within a task map. We compare and verify our
approaches with real data of humans assembling several types of IKEA flat
packs.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2016 04:45:03 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Mar 2017 03:58:38 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Eich",
"Markus",
""
],
[
"Shirazi",
"Sareh",
""
],
[
"Wyeth",
"Gordon",
""
]
] |
new_dataset
| 0.985425 |
1702.06887
|
Arman Ahmadzadeh
|
Arman Ahmadzadeh, Vahid Jamali, Adam Noel, Robert Schober
|
Diffusive Mobile Molecular Communications Over Time-Variant Channels
|
4 pages, 3 figures, 1 table. Accepted for publication in IEEE
Communications Letters (Author's comment: Manuscript submitted Jan. 19, 2017;
revised Feb. 20, 2017; accepted Feb. 22, 2017)
| null |
10.1109/LCOMM.2017.2678467
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This letter introduces a formalism for modeling time-variant channels for
diffusive molecular communication systems. In particular, we consider a fluid
environment where one transmitter nano-machine and one receiver nano-machine
are subjected to Brownian motion in addition to the diffusive motion of the
information molecules used for communication. Due to the stochastic movements
of the transmitter and receiver nano-machines, the statistics of the channel
impulse response change over time. We show that the time-variant behaviour of
the channel can be accurately captured by appropriately modifying the diffusion
coefficient of the information molecules. Furthermore, we derive an analytical
expression for evaluation of the expected error probability of a simple
detector for the considered system. The accuracy of the proposed analytical
expression is verified via particle-based simulation of the Brownian motion.
|
[
{
"version": "v1",
"created": "Wed, 22 Feb 2017 16:42:27 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Ahmadzadeh",
"Arman",
""
],
[
"Jamali",
"Vahid",
""
],
[
"Noel",
"Adam",
""
],
[
"Schober",
"Robert",
""
]
] |
new_dataset
| 0.999446 |
1703.01537
|
Soteris Demetriou
|
Soteris Demetriou, Nan Zhang, Yeonjoon Lee, Xiaofeng Wang, Carl
Gunter, Xiaoyong Zhou, Michael Grace
|
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices
Using OS-level Situation Awareness
| null | null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new development of smart-home systems is to use mobile apps to control IoT
devices across a Home Area Network (HAN). Those systems tend to rely on the
Wi-Fi router to authenticate other devices; as verified in our study, IoT
vendors tend to trust all devices connected to the HAN. This treatment exposes
them to the attack from malicious apps, particularly those running on
authorized phones, which the router does not have information to control, as
confirmed in our measurement study. Mitigating this threat cannot solely rely
on IoT manufacturers, which may need to change the hardware on the devices to
support encryption, increasing the cost of the device, or software developers
who we need to trust to implement security correctly.
In this work, we present a new technique to control the communication between
the IoT devices and their apps in a unified, backward-compatible way. Our
approach, called Hanguard, does not require any changes to the IoT devices
themselves, the IoT apps or the OS of the participating phones. Hanguard
achieves a fine-grained, per-app protection through bridging the OS-level
situation awareness and the router-level per-flow control: each phone runs a
non-system userspace Monitor app to identify the party that attempts to access
the protected IoT device and inform the router through a control plane of its
access decision; the router enforces the decision on the data plane after
verifying whether the phone should be allowed to talk to the device. Hanguard
uses a role-based access control (RBAC) schema which leverages type enforcement
(TE) and multi-category security (MCS) primitives to define highly flexible
access control rules. We implemented our design over both Android and iOS (>95%
of mobile OS market share) and a popular router. Our study shows that Hanguard
is both efficient and effective in practice.
|
[
{
"version": "v1",
"created": "Sat, 4 Mar 2017 23:58:05 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Mar 2017 01:46:20 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Demetriou",
"Soteris",
""
],
[
"Zhang",
"Nan",
""
],
[
"Lee",
"Yeonjoon",
""
],
[
"Wang",
"Xiaofeng",
""
],
[
"Gunter",
"Carl",
""
],
[
"Zhou",
"Xiaoyong",
""
],
[
"Grace",
"Michael",
""
]
] |
new_dataset
| 0.96658 |
1703.02124
|
Jonathan Leach
|
Susan Chan, Ryan E. Warburton, Genevieve Gariepy, Jonathan Leach,
Daniele Faccio
|
Non-line-of-sight tracking of people at long range
| null | null | null | null |
cs.CV physics.ins-det
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A remote-sensing system that can determine the position of hidden objects has
applications in many critical real-life scenarios, such as search and rescue
missions and safe autonomous driving. Previous work has shown the ability to
range and image objects hidden from the direct line of sight, employing
advanced optical imaging technologies aimed at small objects at short range. In
this work we demonstrate a long-range tracking system based on single laser
illumination and single-pixel single-photon detection. This enables us to track
one or more people hidden from view at a stand-off distance of over 50~m. These
results pave the way towards next generation LiDAR systems that will
reconstruct not only the direct-view scene but also the main elements hidden
behind walls or corners.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2017 16:57:04 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Chan",
"Susan",
""
],
[
"Warburton",
"Ryan E.",
""
],
[
"Gariepy",
"Genevieve",
""
],
[
"Leach",
"Jonathan",
""
],
[
"Faccio",
"Daniele",
""
]
] |
new_dataset
| 0.984408 |
1703.02145
|
Justin Miller
|
Justin Miller, Andres Hasfura, Shih-Yuan Liu, Jonathan P. How
|
Dynamic Arrival Rate Estimation for Campus Mobility on Demand Network
Graphs
|
Appears in 2016 IEEE/RSJ International Conference on Intelligent
Robots and Systems (IROS).
http://ieeexplore.ieee.org/abstract/document/7759357/
|
IEEE/RSJ International Conference on Intelligent Robots and
Systems (IROS), Daejeon, 2016, pp. 2285-2292 (2016)
|
10.1109/IROS.2016.7759357
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobility On Demand (MOD) systems are revolutionizing transportation in urban
settings by improving vehicle utilization and reducing parking congestion. A
key factor in the success of an MOD system is the ability to measure and
respond to real-time customer arrival data. Real time traffic arrival rate data
is traditionally difficult to obtain due to the need to install fixed sensors
throughout the MOD network. This paper presents a framework for measuring
pedestrian traffic arrival rates using sensors onboard the vehicles that make
up the MOD fleet. A novel distributed fusion algorithm is presented which
combines onboard LIDAR and camera sensor measurements to detect trajectories of
pedestrians with a 90% detection hit rate with 1.5 false positives per minute.
A novel moving observer method is introduced to estimate pedestrian arrival
rates from pedestrian trajectories collected from mobile sensors. The moving
observer method is evaluated in both simulation and hardware and is shown to
achieve arrival rate estimates comparable to those that would be obtained with
multiple stationary sensors.
|
[
{
"version": "v1",
"created": "Mon, 6 Mar 2017 23:02:34 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Miller",
"Justin",
""
],
[
"Hasfura",
"Andres",
""
],
[
"Liu",
"Shih-Yuan",
""
],
[
"How",
"Jonathan P.",
""
]
] |
new_dataset
| 0.986898 |
1703.02166
|
Tran Nam Van
|
Nam Tran Van
|
Building a Syllable Database to Solve the Problem of Khmer Word
Segmentation
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Word segmentation is a basic problem in natural language processing. With the
languages having the complex writing system like the Khmer language in Southern
of Vietnam, this problem really very intractable, posing the significant
challenges. Although there are some experts in Vietnam as well as international
having deeply researched this problem, there are still no reasonable results
meeting the demand, in particular, no treated thoroughly the ambiguous
phenomenon, in the process of Khmer language processing so far. This paper
present a solution based on the syllable division into component clusters using
two syllable models proposed, thereby building a Khmer syllable database, is
still not actually available. This method using a lexical database updated from
the online Khmer dictionaries and some supported dictionaries serving role of
training data and complementary linguistic characteristics. Each component
cluster is labelled and located by the first and last letter to identify
entirety a syllable. This approach is workable and the test results achieve
high accuracy, eliminate the ambiguity, contribute to solving the problem of
word segmentation and applying efficiency in Khmer language processing.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2017 01:13:39 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Van",
"Nam Tran",
""
]
] |
new_dataset
| 0.996183 |
1703.02195
|
EPTCS
|
Samuel Bucheli (Z\"uhlke Engineering AG), Meghdad Ghari (School of
Mathematics, Institute for Research in Fundamental Sciences (IPM)), Thomas
Studer (University of Bern)
|
Temporal Justification Logic
|
In Proceedings M4M9 2017, arXiv:1703.01736
|
EPTCS 243, 2017, pp. 59-74
|
10.4204/EPTCS.243.5
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Justification logics are modal-like logics with the additional capability of
recording the reason, or justification, for modalities in syntactic structures,
called justification terms. Justification logics can be seen as explicit
counterparts to modal logics. The behavior and interaction of agents in
distributed system is often modeled using logics of knowledge and time. In this
paper, we sketch some preliminary ideas on how the modal knowledge part of such
logics of knowledge and time could be replaced with an appropriate
justification logic.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2017 03:16:07 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Bucheli",
"Samuel",
"",
"Zühlke Engineering AG"
],
[
"Ghari",
"Meghdad",
"",
"School of\n Mathematics, Institute for Research in Fundamental Sciences"
],
[
"Studer",
"Thomas",
"",
"University of Bern"
]
] |
new_dataset
| 0.98371 |
1703.02200
|
Lu Yu
|
Xingsi Zhong and Yu Fu and Lu Yu and Richard Brooks
|
Stealthy Malware Traffic - Not as Innocent as It Looks
|
9 figures, 2 tables
|
Zhong, Xingsi, Yu Fu, Lu Yu, Richard Brooks, and G. Kumar
Venayagamoorthy. "Stealthy malware traffic-Not as innocent as it looks." In
Malicious and Unwanted Software (MALWARE), 2015 10th International Conference
on, pp. 110-116. IEEE, 2015
|
10.1109/MALWARE.2015.7413691
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Malware is constantly evolving. Although existing countermeasures have
success in malware detection, corresponding counter-countermeasures are always
emerging. In this study, a counter-countermeasure that avoids network-based
detection approaches by camouflaging malicious traffic as an innocuous protocol
is presented. The approach includes two steps: Traffic format transformation
and side-channel massage (SCM). Format transforming encryption (FTE) translates
protocol syntax to mimic another innocuous protocol while SCM obscures traffic
side-channels. The proposed approach is illustrated by transforming Zeus botnet
(Zbot) Command and Control (C&C) traffic into smart grid Phasor Measurement
Unit (PMU) data. The experimental results show that the transformed traffic is
identified by Wireshark as synchrophasor protocol, and the transformed protocol
fools current side-channel attacks. Moreover, it is shown that a real smart
grid Phasor Data Concentrator (PDC) accepts the false PMU data.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2017 03:30:26 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Zhong",
"Xingsi",
""
],
[
"Fu",
"Yu",
""
],
[
"Yu",
"Lu",
""
],
[
"Brooks",
"Richard",
""
]
] |
new_dataset
| 0.982237 |
1703.02247
|
Marius Rafailescu
|
Marius Rafailescu
|
Fault Tolerant Leader Election in Distributed Systems
| null | null |
10.5121/ijcsit.2017.9102
|
International Journal of Computer Science & Information Technology
(IJCSIT) Vol 9, No 1, February 2017
|
cs.DC
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
There are many distributed systems which use a leader in their logic. When
such systems need to be fault tolerant and the current leader suffers a
technical problem, it is necesary to apply a special algorithm in order to
choose a new leader. In this paper I present a new fault tolerant algorithm
which elects a new leader based on a random roulette wheel selection.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2017 07:28:05 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Rafailescu",
"Marius",
""
]
] |
new_dataset
| 0.999469 |
1703.02475
|
Silu Huang
|
Silu Huang, Liqi Xu, Jialin Liu, Aaron Elmore, Aditya Parameswaran
|
OrpheusDB: Bolt-on Versioning for Relational Databases
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Data science teams often collaboratively analyze datasets, generating dataset
versions at each stage of iterative exploration and analysis. There is a
pressing need for a system that can support dataset versioning, enabling such
teams to efficiently store, track, and query across dataset versions. We
introduce OrpheusDB, a dataset version control system that "bolts on"
versioning capabilities to a traditional relational database system, thereby
gaining the analytics capabilities of the database "for free". We develop and
evaluate multiple data models for representing versioned data, as well as a
light-weight partitioning scheme, LyreSplit, to further optimize the models for
reduced query latencies. With LyreSplit, OrpheusDB is on average 1000x faster
in finding effective (and better) partitionings than competing approaches,
while also reducing the latency of version retrieval by up to 20x relative to
schemes without partitioning. LyreSplit can be applied in an online fashion as
new versions are added, alongside an intelligent migration scheme that reduces
migration time by 10x on average.
|
[
{
"version": "v1",
"created": "Tue, 7 Mar 2017 17:09:13 GMT"
}
] | 2017-03-08T00:00:00 |
[
[
"Huang",
"Silu",
""
],
[
"Xu",
"Liqi",
""
],
[
"Liu",
"Jialin",
""
],
[
"Elmore",
"Aaron",
""
],
[
"Parameswaran",
"Aditya",
""
]
] |
new_dataset
| 0.999424 |
1506.06021
|
Emilio Ferrara
|
Emilio Ferrara, Zeyao Yang
|
Measuring Emotional Contagion in Social Media
|
10 pages, 5 figures
|
PloS one, 10(11), e0142390. 2015
|
10.1371/journal.pone.0142390
| null |
cs.SI cs.LG physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social media are used as main discussion channels by millions of individuals
every day. The content individuals produce in daily social-media-based
micro-communications, and the emotions therein expressed, may impact the
emotional states of others. A recent experiment performed on Facebook
hypothesized that emotions spread online, even in absence of non-verbal cues
typical of in-person interactions, and that individuals are more likely to
adopt positive or negative emotions if these are over-expressed in their social
network. Experiments of this type, however, raise ethical concerns, as they
require massive-scale content manipulation with unknown consequences for the
individuals therein involved. Here, we study the dynamics of emotional
contagion using Twitter. Rather than manipulating content, we devise a null
model that discounts some confounding factors (including the effect of
emotional contagion). We measure the emotional valence of content the users are
exposed to before posting their own tweets. We determine that on average a
negative post follows an over-exposure to 4.34% more negative content than
baseline, while positive posts occur after an average over-exposure to 4.50%
more positive contents. We highlight the presence of a linear relationship
between the average emotional valence of the stimuli users are exposed to, and
that of the responses they produce. We also identify two different classes of
individuals: highly and scarcely susceptible to emotional contagion. Highly
susceptible users are significantly less inclined to adopt negative emotions
than the scarcely susceptible ones, but equally likely to adopt positive
emotions. In general, the likelihood of adopting positive emotions is much
greater than that of negative emotions.
|
[
{
"version": "v1",
"created": "Fri, 19 Jun 2015 14:29:24 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Ferrara",
"Emilio",
""
],
[
"Yang",
"Zeyao",
""
]
] |
new_dataset
| 0.959749 |
1509.01608
|
Emilio Ferrara
|
Santa Agreste, Salvatore Catanese, Pasquale De Meo, Emilio Ferrara,
Giacomo Fiumara
|
Network Structure and Resilience of Mafia Syndicates
|
22 pages, 10 figures, 1 table
|
Information Sciences, 351, 30-47. 2016
|
10.1016/j.ins.2016.02.027
| null |
cs.SI cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present the results of the study of Sicilian Mafia
organization by using Social Network Analysis. The study investigates the
network structure of a Mafia organization, describing its evolution and
highlighting its plasticity to interventions targeting membership and its
resilience to disruption caused by police operations. We analyze two different
datasets about Mafia gangs built by examining different digital trails and
judicial documents spanning a period of ten years: the former dataset includes
the phone contacts among suspected individuals, the latter is constituted by
the relationships among individuals actively involved in various criminal
offenses. Our report illustrates the limits of traditional investigation
methods like tapping: criminals high up in the organization hierarchy do not
occupy the most central positions in the criminal network, and oftentimes do
not appear in the reconstructed criminal network at all. However, we also
suggest possible strategies of intervention, as we show that although criminal
networks (i.e., the network encoding mobsters and crime relationships) are
extremely resilient to different kind of attacks, contact networks (i.e., the
network reporting suspects and reciprocated phone calls) are much more
vulnerable and their analysis can yield extremely valuable insights.
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2015 21:13:16 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Agreste",
"Santa",
""
],
[
"Catanese",
"Salvatore",
""
],
[
"De Meo",
"Pasquale",
""
],
[
"Ferrara",
"Emilio",
""
],
[
"Fiumara",
"Giacomo",
""
]
] |
new_dataset
| 0.997716 |
1601.05140
|
Aram Galstyan
|
V.S. Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram
Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara, Alessandro Flammini,
Filippo Menczer, Andrew Stevens, Alexander Dekhtyar, Shuyang Gao, Tad Hogg,
Farshad Kooti, Yan Liu, Onur Varol, Prashant Shiralkar, Vinod Vydiswaran,
Qiaozhu Mei, Tim Hwang
|
The DARPA Twitter Bot Challenge
|
IEEE Computer Magazine, in press
|
Computer 49 (6), 38-46. IEEE, 2016
|
10.1109/MC.2016.183
| null |
cs.SI cs.AI cs.CY physics.data-an physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A number of organizations ranging from terrorist groups such as ISIS to
politicians and nation states reportedly conduct explicit campaigns to
influence opinion on social media, posing a risk to democratic processes. There
is thus a growing need to identify and eliminate "influence bots" - realistic,
automated identities that illicitly shape discussion on sites like Twitter and
Facebook - before they get too influential. Spurred by such events, DARPA held
a 4-week competition in February/March 2015 in which multiple teams supported
by the DARPA Social Media in Strategic Communications program competed to
identify a set of previously identified "influence bots" serving as ground
truth on a specific topic within Twitter. Past work regarding influence bots
often has difficulty supporting claims about accuracy, since there is limited
ground truth (though some exceptions do exist [3,7]). However, with the
exception of [3], no past work has looked specifically at identifying influence
bots on a specific topic. This paper describes the DARPA Challenge and
describes the methods used by the three top-ranked teams.
|
[
{
"version": "v1",
"created": "Wed, 20 Jan 2016 00:23:03 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Apr 2016 23:02:08 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Subrahmanian",
"V. S.",
""
],
[
"Azaria",
"Amos",
""
],
[
"Durst",
"Skylar",
""
],
[
"Kagan",
"Vadim",
""
],
[
"Galstyan",
"Aram",
""
],
[
"Lerman",
"Kristina",
""
],
[
"Zhu",
"Linhong",
""
],
[
"Ferrara",
"Emilio",
""
],
[
"Flammini",
"Alessandro",
""
],
[
"Menczer",
"Filippo",
""
],
[
"Stevens",
"Andrew",
""
],
[
"Dekhtyar",
"Alexander",
""
],
[
"Gao",
"Shuyang",
""
],
[
"Hogg",
"Tad",
""
],
[
"Kooti",
"Farshad",
""
],
[
"Liu",
"Yan",
""
],
[
"Varol",
"Onur",
""
],
[
"Shiralkar",
"Prashant",
""
],
[
"Vydiswaran",
"Vinod",
""
],
[
"Mei",
"Qiaozhu",
""
],
[
"Hwang",
"Tim",
""
]
] |
new_dataset
| 0.999047 |
1607.06819
|
Emilio Ferrara
|
Xinxin Yang and Bo-Chiuan Chen and Mrinmoy Maity and Emilio Ferrara
|
Social Politics: Agenda Setting and Political Communication on Social
Media
| null |
International Conference on Social Informatics (pp. 330-344).
Springer. 2016
|
10.1007/978-3-319-47880-7_20
| null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social media play an increasingly important role in political communication.
Various studies investigated how individuals adopt social media for political
discussion, to share their views about politics and policy, or to mobilize and
protest against social issues. Yet, little attention has been devoted to the
main actors of political discussions: the politicians. In this paper, we
explore the topics of discussion of U.S. President Obama and the 50 U.S. State
Governors using Twitter data and agenda-setting theory as a tool to describe
the patterns of daily political discussion, uncovering the main topics of
attention and interest of these actors. We examine over one hundred thousand
tweets produced by these politicians and identify seven macro-topics of
conversation, finding that Twitter represents a particularly appealing vehicle
of conversation for American opposition politicians. We highlight the main
motifs of political conversation of the two parties, discovering that
Republican and Democrat Governors are more or less similarly active on Twitter
but exhibit different styles of communication. Finally, by reconstructing the
networks of occurrences of Governors' hashtags and keywords related to
political issues, we observe that Republicans form a tight core, with a
stronger shared agenda on many issues of discussion.
|
[
{
"version": "v1",
"created": "Fri, 22 Jul 2016 20:00:25 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Yang",
"Xinxin",
""
],
[
"Chen",
"Bo-Chiuan",
""
],
[
"Maity",
"Mrinmoy",
""
],
[
"Ferrara",
"Emilio",
""
]
] |
new_dataset
| 0.997665 |
1611.03854
|
Arman Shojaeifard
|
Arman Shojaeifard and Kai-Kit Wong and Marco Di Renzo and Gan Zheng
and Khairi Ashour Hamdi and Jie Tang
|
Massive MIMO-Enabled Full-Duplex Cellular Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we provide a theoretical framework for the study of massive
multiple-input multiple-output (MIMO)-enabled full-duplex (FD) cellular
networks in which the self-interference (SI) channels follow the Rician
distribution and other channels are Rayleigh distributed. To facilitate
bi-directional wireless functionality, we adopt (i) a downlink (DL) linear
zero-forcing with self-interference-nulling (ZF-SIN) precoding scheme at the FD
base stations (BSs), and (ii) an uplink (UL) self-interference-aware (SIA)
fractional power control mechanism at the FD user equipments (UEs). Linear ZF
receivers are further utilized for signal detection in the UL. The results
indicate that the UL rate bottleneck in the baseline FD single-antenna system
can be overcome via exploiting massive MIMO. On the other hand, the findings
may be viewed as a reality-check, since we show that, under state-of-the-art
system parameters, the spectral efficiency (SE) gain of FD massive MIMO over
its half-duplex (HD) counterpart largely depends on the SI cancellation
capability of the UEs. In addition, the anticipated two-fold increase in SE is
shown to be only achievable with an infinitely large number of antennas.
|
[
{
"version": "v1",
"created": "Fri, 11 Nov 2016 20:59:44 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Mar 2017 12:19:47 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Shojaeifard",
"Arman",
""
],
[
"Wong",
"Kai-Kit",
""
],
[
"Di Renzo",
"Marco",
""
],
[
"Zheng",
"Gan",
""
],
[
"Hamdi",
"Khairi Ashour",
""
],
[
"Tang",
"Jie",
""
]
] |
new_dataset
| 0.992921 |
1702.02240
|
Weijun Zhu
|
Weijun Zhu
|
A novel type of Automata for dynamic, heterogeneous and random
architectures
|
8 pages, 4 figure
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, the author aims to establish a mathematical model for a mimic
computer. To this end, a novel automaton is proposed. First, a one-dimensional
cellular automaton is used for expressing some dynamic changes in the structure
of a computing unit, a sequential automaton is employed to describe some state
transitions, a hierarchical automaton is employed to express the different
granularities of some computing units, and a probabilistic automaton is used to
depict some random changes of a computing unit. Second, the new automaton is
obtained by combining the various types of automata mentioned above in the
certain logical relationship. To the best of our knowledge, the new automaton
model is the first automaton which can portray the operation semantics for a
mimic computing system, and it can directly describe some behaviors of a mimic
computer.
|
[
{
"version": "v1",
"created": "Wed, 8 Feb 2017 00:59:53 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Feb 2017 08:45:07 GMT"
},
{
"version": "v3",
"created": "Sun, 5 Mar 2017 02:03:51 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Zhu",
"Weijun",
""
]
] |
new_dataset
| 0.984239 |
1702.08272
|
Phil Ammirato
|
Phil Ammirato, Patrick Poirson, Eunbyung Park, Jana Kosecka, Alexander
C. Berg
|
A Dataset for Developing and Benchmarking Active Vision
|
To appear at ICRA 2017
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new public dataset with a focus on simulating robotic vision
tasks in everyday indoor environments using real imagery. The dataset includes
20,000+ RGB-D images and 50,000+ 2D bounding boxes of object instances densely
captured in 9 unique scenes. We train a fast object category detector for
instance detection on our data. Using the dataset we show that, although
increasingly accurate and fast, the state of the art for object detection is
still severely impacted by object scale, occlusion, and viewing direction all
of which matter for robotics applications. We next validate the dataset for
simulating active vision, and use the dataset to develop and evaluate a
deep-network-based system for next best move prediction for object
classification using reinforcement learning. Our dataset is available for
download at cs.unc.edu/~ammirato/active_vision_dataset_website/.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2017 13:23:35 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Mar 2017 20:06:58 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Ammirato",
"Phil",
""
],
[
"Poirson",
"Patrick",
""
],
[
"Park",
"Eunbyung",
""
],
[
"Kosecka",
"Jana",
""
],
[
"Berg",
"Alexander C.",
""
]
] |
new_dataset
| 0.999781 |
1703.01423
|
Jun Shintake
|
Jun Shintake, Harshal Sonar, Egor Piskarev, Jamie Paik and Dario
Floreano
|
Soft Pneumatic Gelatin Actuator for Edible Robotics
|
Submitted to IEEE/RSJ International Conference on Intelligent Robots
and Systems 2017
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a fully edible pneumatic actuator based on gelatin-glycerol
composite. The actuator is monolithic, fabricated via a molding process, and
measures 90 mm in length, 20 mm in width, and 17 mm in thickness. Thanks to the
composite mechanical characteristics similar to those of silicone elastomers,
the actuator exhibits a bending angle of 170.3 {\deg} and a blocked force of
0.34 N at the applied pressure of 25 kPa. These values are comparable to
elastomer based pneumatic actuators. As a validation example, two actuators are
integrated to form a gripper capable of handling various objects, highlighting
the high performance and applicability of the edible actuator. These edible
actuators, combined with other recent edible materials and electronics, could
lay the foundation for a new type of edible robots.
|
[
{
"version": "v1",
"created": "Sat, 4 Mar 2017 09:27:19 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Shintake",
"Jun",
""
],
[
"Sonar",
"Harshal",
""
],
[
"Piskarev",
"Egor",
""
],
[
"Paik",
"Jamie",
""
],
[
"Floreano",
"Dario",
""
]
] |
new_dataset
| 0.998917 |
1703.01441
|
Chaoping Xing
|
Lingfei Jin and Chaoping Xing
|
Algebraic geometry codes with complementary duals exceed the asymptotic
Gilbert-Varshamov bound
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It was shown by Massey that linear complementary dual (LCD for short) codes
are asymptotically good. In 2004, Sendrier proved that LCD codes meet the
asymptotic Gilbert-Varshamov (GV for short) bound. Until now, the GV bound
still remains to be the best asymptotical lower bound for LCD codes. In this
paper, we show that an algebraic geometry code over a finite field of even
characteristic is equivalent to an LCD code and consequently there exists a
family of LCD codes that are equivalent to algebraic geometry codes and exceed
the asymptotical GV bound.
|
[
{
"version": "v1",
"created": "Sat, 4 Mar 2017 11:11:11 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Jin",
"Lingfei",
""
],
[
"Xing",
"Chaoping",
""
]
] |
new_dataset
| 0.961109 |
1703.01446
|
He Jiang
|
He Jiang, Liming Nie, Zeyi Sun, Zhilei Ren, Weiqiang Kong, Tao Zhang,
Xiapu Luo
|
ROSF: Leveraging Information Retrieval and Supervised Learning for
Recommending Code Snippets
|
14 pages, 6 figures, IEEE Transactions on Services Computing, 2016
| null |
10.1109/TSC.2016.2592909
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When implementing unfamiliar programming tasks, developers commonly search
code examples and learn usage patterns of APIs from the code examples or reuse
them by copy-pasting and modifying. For providing high-quality code examples,
previous studies present several methods to recommend code snippets mainly
based on information retrieval. In this paper, to provide better recommendation
results, we propose ROSF, Recommending cOde Snippets with multi-aspect
Features, a novel method combining both information retrieval and supervised
learning. In our method, we recommend Top-Kcode snippets for a givenfree-form
query based on two stages, i.e., coarse-grained searching and fine-grained
re-ranking. First, we generate a code snippet candidate set by searching a code
snippet corpus using an information retrieval method. Second, we predict
probability values of the code snippets for different relevance scores in the
candidate set by the learned prediction model from a training set, re-rank
these candidate code snippets according to the probability values, and
recommend the final results to developers. We conduct several experiments to
evaluate our method in a large-scale corpus containing 921,713 real-world code
snippets. The results show that ROSF is an effective method for code snippets
recommendation and outperforms the-state-of-the-art methods by 20%-41% in
Precision and 13%-33% in NDCG
|
[
{
"version": "v1",
"created": "Sat, 4 Mar 2017 11:41:31 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Jiang",
"He",
""
],
[
"Nie",
"Liming",
""
],
[
"Sun",
"Zeyi",
""
],
[
"Ren",
"Zhilei",
""
],
[
"Kong",
"Weiqiang",
""
],
[
"Zhang",
"Tao",
""
],
[
"Luo",
"Xiapu",
""
]
] |
new_dataset
| 0.953553 |
1703.01544
|
Felice De Luca
|
Abu Reyan Ahmed, Felice De Luca, Sabin Devkota, Alon Efrat, Md Iqbal
Hossain, Stephen Kobourov, Jixian Li, Sammi Abida Salma and Eric Welch
|
L-Graphs and Monotone L-Graphs
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In an $\mathsf{L}$-embedding of a graph, each vertex is represented by an
$\mathsf{L}$-segment, and two segments intersect each other if and only if the
corresponding vertices are adjacent in the graph. If the corner of each
$\mathsf{L}$-segment in an $\mathsf{L}$-embedding lies on a straight line, we
call it a monotone $\mathsf{L}$-embedding. In this paper we give a full
characterization of monotone $\mathsf{L}$-embeddings by introducing a new class
of graphs which we call "non-jumping" graphs. We show that a graph admits a
monotone $\mathsf{L}$-embedding if and only if the graph is a non-jumping
graph. Further, we show that outerplanar graphs, convex bipartite graphs,
interval graphs, 3-leaf power graphs, and complete graphs are subclasses of
non-jumping graphs. Finally, we show that distance-hereditary graphs and
$k$-leaf power graphs ($k\le 4$) admit $\mathsf{L}$-embeddings.
|
[
{
"version": "v1",
"created": "Sun, 5 Mar 2017 01:41:08 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Ahmed",
"Abu Reyan",
""
],
[
"De Luca",
"Felice",
""
],
[
"Devkota",
"Sabin",
""
],
[
"Efrat",
"Alon",
""
],
[
"Hossain",
"Md Iqbal",
""
],
[
"Kobourov",
"Stephen",
""
],
[
"Li",
"Jixian",
""
],
[
"Salma",
"Sammi Abida",
""
],
[
"Welch",
"Eric",
""
]
] |
new_dataset
| 0.999624 |
1703.01605
|
Yongwei Nie
|
Yongwei Nie, Xu Cao, Chengjiang Long, Ping Li, Guiqing Li
|
L2GSCI: Local to Global Seam Cutting and Integrating for Accurate Face
Contour Extraction
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current face alignment algorithms can robustly find a set of landmarks along
face contour. However, the landmarks are sparse and lack curve details,
especially in chin and cheek areas where a lot of concave-convex bending
information exists. In this paper, we propose a local to global seam cutting
and integrating algorithm (L2GSCI) to extract continuous and accurate face
contour. Our method works in three steps with the help of a rough initial
curve. First, we sample small and overlapped squares along the initial curve.
Second, the seam cutting part of L2GSCI extracts a local seam in each square
region. Finally, the seam integrating part of L2GSCI connects all the redundant
seams together to form a continuous and complete face curve. Overall, the
proposed method is much more straightforward than existing face alignment
algorithms, but can achieve pixel-level continuous face curves rather than
discrete and sparse landmarks. Moreover, experiments on two face benchmark
datasets (i.e., LFPW and HELEN) show that our method can precisely reveal
concave-convex bending details of face contours, which has significantly
improved the performance when compared with the state-ofthe- art face alignment
approaches.
|
[
{
"version": "v1",
"created": "Sun, 5 Mar 2017 15:06:28 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Nie",
"Yongwei",
""
],
[
"Cao",
"Xu",
""
],
[
"Long",
"Chengjiang",
""
],
[
"Li",
"Ping",
""
],
[
"Li",
"Guiqing",
""
]
] |
new_dataset
| 0.990232 |
1703.01646
|
Joseph S. B. Mitchell
|
Joseph S. B. Mitchell
|
A PTAS for TSP with Neighborhoods Among Fat Regions in the Plane
|
Manuscript that was published in SODA 2007, with updates made after
the proceedings version/talk
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Euclidean TSP with neighborhoods (TSPN) problem seeks a shortest tour
that visits a given collection of $n$ regions ({\em neighborhoods}). We present
the first polynomial-time approximation scheme for TSPN for a set of regions
given by arbitrary disjoint fat regions in the plane. This improves
substantially upon the known approximation algorithms, and is the first PTAS
for TSPN on regions of non-comparable sizes. Our result is based on a novel
extension of the $m$-guillotine method. The result applies to regions that are
"fat" in a very weak sense: each region $P_i$ has area $\Omega([diam(P_i)]^2)$,
but is otherwise arbitrary.
|
[
{
"version": "v1",
"created": "Sun, 5 Mar 2017 19:10:17 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Mitchell",
"Joseph S. B.",
""
]
] |
new_dataset
| 0.998711 |
1703.01820
|
Amna Qureshi
|
Amna Qureshi, David Meg\'ias, Helena Rif\`a-Pous
|
PSUM:Peer-to-peer multimedia content distribution using
collusion-resistant fingerprinting
|
38 Pages, Journal
| null |
10.1016/j.jnca.2016.03.007
| null |
cs.CR cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of peer-to-peer (P2P) networks for multimedia distribution has spread
out globally in recent years. The mass popularity is primarily driven by
cost-effective distribution of content, also giving rise to piracy. An end user
(buyer/peer) of a P2P content distribution system does not want to reveal
his/her identity during a transaction with a content owner (merchant), whereas
the merchant does not want the buyer to further distribute the content
illegally. To date, different P2P distribution systems have been proposed that
provide copyright and privacy protection at a cost of high computational burden
at the merchants and/or at the buyer's end and thus, making these systems
impractical. In this paper, we propose PSUM, a P2P content distribution system
which allows efficient distribution of large-sized multimedia content while
preserving the security and privacy of merchants and buyers. The security of
PSUM is ensured by using an asymmetric fingerprinting protocol based on
collusion-resistant codes. In addition, PSUM enables buyers to obtain digital
contents anonymously, but this anonymity can be revoked as soon as he/she is
found guilty of copyright violation. The paper presents a thorough performance
analysis of PSUM, through different experiments and simulations, and also
analyzes several security compromising attacks and countermeasures.
|
[
{
"version": "v1",
"created": "Mon, 6 Mar 2017 11:47:30 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Qureshi",
"Amna",
""
],
[
"Megías",
"David",
""
],
[
"Rifà-Pous",
"Helena",
""
]
] |
new_dataset
| 0.999249 |
1703.01863
|
Benjamin Smith
|
Craig Costello, Benjamin Smith (LIX, GRACE)
|
Montgomery curves and their arithmetic
| null | null | null | null |
cs.CR math.NT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Three decades ago, Montgomery introduced a new elliptic curve model for use
in Lenstra's ECM factorization algorithm. Since then, his curves and the
algorithms associated with them have become foundational in the implementation
of elliptic curve cryptosystems. This article surveys the theory and
cryptographic applications of Montgomery curves over non-binary finite fields,
including Montgomery's x-only arithmetic and Ladder algorithm, x-only
Diffie--Hellman, y-coordinate recovery, and 2-dimensional and Euclidean
differential addition chains such as Montgomery's PRAC algorithm.
|
[
{
"version": "v1",
"created": "Mon, 6 Mar 2017 13:30:11 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Costello",
"Craig",
"",
"LIX, GRACE"
],
[
"Smith",
"Benjamin",
"",
"LIX, GRACE"
]
] |
new_dataset
| 0.991064 |
1703.01880
|
Wen Jiang
|
Shuai Xu and Wen Jiang
|
A Physarum-inspired model for the probit-based stochastic user
equilibrium problem
|
24 pages,5 figures
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Stochastic user equilibrium is an important issue in the traffic assignment
problems, tradition models for the stochastic user equilibrium problem are
designed as mathematical programming problems. In this article, a
Physarum-inspired model for the probit-based stochastic user equilibrium
problem is proposed. There are two main contributions of our work. On the one
hand, the origin Physarum model is modified to find the shortest path in
traffic direction networks with the properties of two-way traffic
characteristic. On the other hand, the modified Physarum-inspired model could
get the equilibrium flows when traveller's perceived transportation cost
complies with normal distribution. The proposed method is constituted with a
two-step procedure. First, the modified Physarum model is applied to get the
auxiliary flows. Second, the auxiliary flows are averaged to obtain the
equilibrium flows. Numerical examples are conducted to illustrate the
performance of the proposed method, which is compared with the Method of
Successive Average method.
|
[
{
"version": "v1",
"created": "Mon, 6 Mar 2017 14:07:48 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Xu",
"Shuai",
""
],
[
"Jiang",
"Wen",
""
]
] |
new_dataset
| 0.95905 |
1703.01886
|
Christian Berthet
|
Christian Berthet
|
On Von Schelling Formula for the Generalized Coupon Collector Problem
|
22 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper gives an algebraic proof of the correctness of Von Schelling
formula for the probability of the coupon collector problem waiting time for
non-uniform distributions and partial collections. It introduces a theorem on
sums of powers of subset probabilities which to our knowledge is new. A set of
binomial coefficients is used as a basis for decomposition of these sums of
powers.
|
[
{
"version": "v1",
"created": "Mon, 6 Mar 2017 14:15:29 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Berthet",
"Christian",
""
]
] |
new_dataset
| 0.991107 |
1703.01918
|
Ronald Kemker
|
Ronald Kemker, Carl Salvaggio, and Christopher Kanan
|
High-Resolution Multispectral Dataset for Semantic Segmentation
|
9 pages, 8 Figures
| null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Unmanned aircraft have decreased the cost required to collect remote sensing
imagery, which has enabled researchers to collect high-spatial resolution data
from multiple sensor modalities more frequently and easily. The increase in
data will push the need for semantic segmentation frameworks that are able to
classify non-RGB imagery, but this type of algorithmic development requires an
increase in publicly available benchmark datasets with class labels. In this
paper, we introduce a high-resolution multispectral dataset with image labels.
This new benchmark dataset has been pre-split into training/testing folds in
order to standardize evaluation and continue to push state-of-the-art
classification frameworks for non-RGB imagery.
|
[
{
"version": "v1",
"created": "Mon, 6 Mar 2017 15:16:56 GMT"
}
] | 2017-03-07T00:00:00 |
[
[
"Kemker",
"Ronald",
""
],
[
"Salvaggio",
"Carl",
""
],
[
"Kanan",
"Christopher",
""
]
] |
new_dataset
| 0.999712 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.