id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1703.01975
Ruben Mayer
Ruben Mayer, Harshit Gupta, Enrique Saurez, Umakishore Ramachandran
The Fog Makes Sense: Enabling Social Sensing Services With Limited Internet Connectivity
Ruben Mayer, Harshit Gupta, Enrique Saurez, and Umakishore Ramachandran. 2017. The Fog Makes Sense: Enabling Social Sensing Services With Limited Internet Connectivity. In Proceedings of The 2nd International Workshop on Social Sensing, Pittsburgh, PA, USA, April 21 2017 (SocialSens'17), 6 pages
null
10.1145/3055601.3055614
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social sensing services use humans as sensor carriers, sensor operators and sensors themselves in order to provide situation-awareness to applications. This promises to provide a multitude of benefits to the users, for example in the management of natural disasters or in community empowerment. However, current social sensing services depend on Internet connectivity since the services are deployed on central Cloud platforms. In many circumstances, Internet connectivity is constrained, for instance when a natural disaster causes Internet outages or when people do not have Internet access due to economical reasons. In this paper, we propose the emerging Fog Computing infrastructure to become a key-enabler of social sensing services in situations of constrained Internet connectivity. To this end, we develop a generic architecture and API of Fog-enabled social sensing services. We exemplify the usage of the proposed social sensing architecture on a number of concrete use cases from two different scenarios.
[ { "version": "v1", "created": "Mon, 6 Mar 2017 17:02:14 GMT" } ]
2017-03-07T00:00:00
[ [ "Mayer", "Ruben", "" ], [ "Gupta", "Harshit", "" ], [ "Saurez", "Enrique", "" ], [ "Ramachandran", "Umakishore", "" ] ]
new_dataset
0.992869
1703.02002
Md Mizanur Rahman
Mahmudur Rahman, Mizanur Rahman, Bogdan Carbunar, Duen Horng Chau
FairPlay: Fraud and Malware Detection in Google Play
Proceedings of the 2016 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics, 2016
null
null
null
cs.SI cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fraudulent behaviors in Google Android app market fuel search rank abuse and malware proliferation. We present FairPlay, a novel system that uncovers both malware and search rank fraud apps, by picking out trails that fraudsters leave behind. To identify suspicious apps, FairPlay PCF algorithm correlates review activities and uniquely combines detected review relations with linguistic and behavioral signals gleaned from longitudinal Google Play app data. We contribute a new longitudinal app dataset to the community, which consists of over 87K apps, 2.9M reviews, and 2.4M reviewers, collected over half a year. FairPlay achieves over 95% accuracy in classifying gold standard datasets of malware, fraudulent and legitimate apps. We show that 75% of the identified malware apps engage in search rank fraud. FairPlay discovers hundreds of fraudulent apps that currently evade Google Bouncer detection technology, and reveals a new type of attack campaign, where users are harassed into writing positive reviews, and install and review other apps.
[ { "version": "v1", "created": "Mon, 6 Mar 2017 17:51:16 GMT" } ]
2017-03-07T00:00:00
[ [ "Rahman", "Mahmudur", "" ], [ "Rahman", "Mizanur", "" ], [ "Carbunar", "Bogdan", "" ], [ "Chau", "Duen Horng", "" ] ]
new_dataset
0.999856
1702.07491
Yansong Gao
Yansong Gao, Damith C. Ranasinghe
R$^3$PUF: A Highly Reliable Memristive Device based Reconfigurable PUF
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a memristive device based R$ ^3 $PUF construction achieving highly desired PUF properties, which are not offered by most current PUF designs: (1) High reliability, almost 100\% that is crucial for PUF-based cryptographic key generations, significantly reducing, or even eliminating the expensive overhead of on-chip error correction logic and the associated helper on-chip data storage or off-chip storage and transfer. (2) Reconfigurability, while current PUF designs rarely exhibit such an attractive property. We validate our R$ ^3 $PUF via extensive Monte-Carlo simulations in Cadence based on parameters of real devices. The R$ ^3 $PUF is simple, cost-effective and easy to manage compared to other PUF constructions exhibiting high reliability or reconfigurability. None of previous PUF constructions is able to provide both desired high reliability and reconfigurability concurrently.
[ { "version": "v1", "created": "Fri, 24 Feb 2017 08:27:09 GMT" } ]
2017-03-06T00:00:00
[ [ "Gao", "Yansong", "" ], [ "Ranasinghe", "Damith C.", "" ] ]
new_dataset
0.996658
1703.00123
Jian Dai
Jian Dai, Fei He, Wang-Chien Lee, Gang Chen, Beng Chin Ooi
DTNC: A New Server-side Data Cleansing Framework for Cellular Trajectory Services
null
null
null
null
cs.NI cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is essential for the cellular network operators to provide cellular location services to meet the needs of their users and mobile applications. However, cellular locations, estimated by network-based methods at the server-side, bear with {\it high spatial errors} and {\it arbitrary missing locations}. Moreover, auxiliary sensor data at the client-side are not available to the operators. In this paper, we study the {\em cellular trajectory cleansing problem} and propose an innovative data cleansing framework, namely \underline{D}ynamic \underline{T}ransportation \underline{N}etwork based \underline{C}leansing (DTNC) to improve the quality of cellular locations delivered in online cellular trajectory services. We maintain a dynamic transportation network (DTN), which associates a network edge with a probabilistic distribution of travel times updated continuously. In addition, we devise an object motion model, namely, {\em travel-time-aware hidden semi-Markov model} ({\em TT-HsMM}), which is used to infer the most probable traveled edge sequences on DTN. To validate our ideas, we conduct a comprehensive evaluation using real-world cellular data provided by a major cellular network operator and a GPS dataset collected by smartphones as the ground truth. In the experiments, DTNC displays significant advantages over six state-of-the-art techniques.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 03:41:40 GMT" }, { "version": "v2", "created": "Fri, 3 Mar 2017 07:42:42 GMT" } ]
2017-03-06T00:00:00
[ [ "Dai", "Jian", "" ], [ "He", "Fei", "" ], [ "Lee", "Wang-Chien", "" ], [ "Chen", "Gang", "" ], [ "Ooi", "Beng Chin", "" ] ]
new_dataset
0.991597
1703.00948
Preeti Bhargava
Nemanja Spasojevic, Preeti Bhargava, Guoning Hu
DAWT: Densely Annotated Wikipedia Texts across multiple languages
8 pages, 3 figures, 7 tables, WWW2017, WWW 2017 Companion proceedings
null
10.1145/3041021.3053367
null
cs.IR cs.AI cs.CL cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we open up the DAWT dataset - Densely Annotated Wikipedia Texts across multiple languages. The annotations include labeled text mentions mapping to entities (represented by their Freebase machine ids) as well as the type of the entity. The data set contains total of 13.6M articles, 5.0B tokens, 13.8M mention entity co-occurrences. DAWT contains 4.8 times more anchor text to entity links than originally present in the Wikipedia markup. Moreover, it spans several languages including English, Spanish, Italian, German, French and Arabic. We also present the methodology used to generate the dataset which enriches Wikipedia markup in order to increase number of links. In addition to the main dataset, we open up several derived datasets including mention entity co-occurrence counts and entity embeddings, as well as mappings between Freebase ids and Wikidata item ids. We also discuss two applications of these datasets and hope that opening them up would prove useful for the Natural Language Processing and Information Retrieval communities, as well as facilitate multi-lingual research.
[ { "version": "v1", "created": "Thu, 2 Mar 2017 20:55:20 GMT" } ]
2017-03-06T00:00:00
[ [ "Spasojevic", "Nemanja", "" ], [ "Bhargava", "Preeti", "" ], [ "Hu", "Guoning", "" ] ]
new_dataset
0.995149
1703.01107
Weiwei Ai Weiwei Ai
Weiwei Ai, Nitish Patel, Partha Roop, Avinash Malik, Nathan Allen and Mark L. Trew
An intracardiac electrogram model to bridge virtual hearts and implantable cardiac devices
null
null
null
null
cs.SY physics.med-ph q-bio.TO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Virtual heart models have been proposed to enhance the safety of implantable cardiac devices through closed loop validation. To communicate with a virtual heart, devices have been driven by cardiac signals at specific sites. As a result, only the action potentials of these sites are sensed. However, the real device implanted in the heart will sense a complex combination of near and far-field extracellular potential signals. Therefore many device functions, such as blanking periods and refractory periods, are designed to handle these unexpected signals. To represent these signals, we develop an intracardiac electrogram (IEGM) model as an interface between the virtual heart and the device. The model can capture not only the local excitation but also far-field signals and pacing afterpotentials. Moreover, the sensing controller can specify unipolar or bipolar electrogram (EGM) sensing configurations and introduce various oversensing and undersensing modes. The simulation results show that the model is able to reproduce clinically observed sensing problems, which significantly extends the capabilities of the virtual heart model in the context of device validation.
[ { "version": "v1", "created": "Fri, 3 Mar 2017 10:46:47 GMT" } ]
2017-03-06T00:00:00
[ [ "Ai", "Weiwei", "" ], [ "Patel", "Nitish", "" ], [ "Roop", "Partha", "" ], [ "Malik", "Avinash", "" ], [ "Allen", "Nathan", "" ], [ "Trew", "Mark L.", "" ] ]
new_dataset
0.997113
1703.01122
Nicole Schweikardt
Dietrich Kuske and Nicole Schweikardt
First-Order Logic with Counting: At Least, Weak Hanf Normal Forms Always Exist and Can Be Computed!
41 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the logic FOCN(P) which extends first-order logic by counting and by numerical predicates from a set P, and which can be viewed as a natural generalisation of various counting logics that have been studied in the literature. We obtain a locality result showing that every FOCN(P)-formula can be transformed into a formula in Hanf normal form that is equivalent on all finite structures of degree at most d. A formula is in Hanf normal form if it is a Boolean combination of formulas describing the neighbourhood around its tuple of free variables and arithmetic sentences with predicates from P over atomic statements describing the number of realisations of a type with a single centre. The transformation into Hanf normal form can be achieved in time elementary in $d$ and the size of the input formula. From this locality result, we infer the following applications: (*) The Hanf-locality rank of first-order formulas of bounded quantifier alternation depth only grows polynomially with the formula size. (*) The model checking problem for the fragment FOC(P) of FOCN(P) on structures of bounded degree is fixed-parameter tractable (with elementary parameter dependence). (*) The query evaluation problem for fixed queries from FOC(P) over fully dynamic databases of degree at most d can be solved efficiently: there is a dynamic algorithm that can enumerate the tuples in the query result with constant delay, and that allows to compute the size of the query result and to test if a given tuple belongs to the query result within constant time after every database update.
[ { "version": "v1", "created": "Fri, 3 Mar 2017 12:10:53 GMT" } ]
2017-03-06T00:00:00
[ [ "Kuske", "Dietrich", "" ], [ "Schweikardt", "Nicole", "" ] ]
new_dataset
0.993714
1703.01270
Jeffrey Lipton
Jeffrey I Lipton, Aidan J Fay, Daniela Rus
Baxter's Homunculus: Virtual Reality Spaces for Teleoperation in Manufacturing
8 pages 6 figures, submitted to IROS 2017
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Expensive specialized systems have hampered development of telerobotic systems for manufacturing systems. In this paper we demonstrate a telerobotic system which can reduce the cost of such system by leveraging commercial virtual reality(VR) technology and integrating it with existing robotics control software. The system runs on a commercial gaming engine using off the shelf VR hardware. This system can be deployed on multiple network architectures from a wired local network to a wireless network connection over the Internet. The system is based on the homunculus model of mind wherein we embed the user in a virtual reality control room. The control room allows for multiple sensor display, dynamic mapping between the user and robot, does not require the production of duals for the robot, or its environment. The control room is mapped to a space inside the robot to provide a sense of co-location within the robot. We compared our system with state of the art automation algorithms for assembly tasks, showing a 100% success rate for our system compared with a 66% success rate for automated systems. We demonstrate that our system can be used for pick and place, assembly, and manufacturing tasks.
[ { "version": "v1", "created": "Fri, 3 Mar 2017 18:03:26 GMT" } ]
2017-03-06T00:00:00
[ [ "Lipton", "Jeffrey I", "" ], [ "Fay", "Aidan J", "" ], [ "Rus", "Daniela", "" ] ]
new_dataset
0.992314
1403.7980
Andre Schulz
Erik D. Demaine and Andre Schulz
Embedding Stacked Polytopes on a Polynomial-Size Grid
22 pages, 10 Figures
null
null
null
cs.CG cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A stacking operation adds a $d$-simplex on top of a facet of a simplicial $d$-polytope while maintaining the convexity of the polytope. A stacked $d$-polytope is a polytope that is obtained from a $d$-simplex and a series of stacking operations. We show that for a fixed $d$ every stacked $d$-polytope with $n$ vertices can be realized with nonnegative integer coordinates. The coordinates are bounded by $O(n^{2\log(2d)})$, except for one axis, where the coordinates are bounded by $O(n^{3\log(2d)})$. The described realization can be computed with an easy algorithm. The realization of the polytopes is obtained with a lifting technique which produces an embedding on a large grid. We establish a rounding scheme that places the vertices on a sparser grid, while maintaining the convexity of the embedding.
[ { "version": "v1", "created": "Mon, 31 Mar 2014 13:03:45 GMT" }, { "version": "v2", "created": "Fri, 27 Mar 2015 15:04:50 GMT" }, { "version": "v3", "created": "Wed, 13 Jan 2016 14:42:08 GMT" }, { "version": "v4", "created": "Thu, 2 Mar 2017 07:45:17 GMT" } ]
2017-03-03T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Schulz", "Andre", "" ] ]
new_dataset
0.95555
1407.1507
Sebastian Deorowicz
Sebastian Deorowicz and Marek Kokot and Szymon Grabowski and Agnieszka Debudaj-Grabysz
KMC 2: Fast and resource-frugal $k$-mer counting
null
Bioinformatics 31 (10): 1569-1576 (2015)
10.1093/bioinformatics/btv022
null
cs.DS cs.CE q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivation: Building the histogram of occurrences of every $k$-symbol long substring of nucleotide data is a standard step in many bioinformatics applications, known under the name of $k$-mer counting. Its applications include developing de Bruijn graph genome assemblers, fast multiple sequence alignment and repeat detection. The tremendous amounts of NGS data require fast algorithms for $k$-mer counting, preferably using moderate amounts of memory. Results: We present a novel method for $k$-mer counting, on large datasets at least twice faster than the strongest competitors (Jellyfish~2, KMC~1), using about 12\,GB (or less) of RAM memory. Our disk-based method bears some resemblance to MSPKmerCounter, yet replacing the original minimizers with signatures (a carefully selected subset of all minimizers) and using $(k, x)$-mers allows to significantly reduce the I/O, and a highly parallel overall architecture allows to achieve unprecedented processing speeds. For example, KMC~2 allows to count the 28-mers of a human reads collection with 44-fold coverage (106\,GB of compressed size) in about 20 minutes, on a 6-core Intel i7 PC with an SSD. Availability: KMC~2 is freely available at http://sun.aei.polsl.pl/kmc. Contact: [email protected]
[ { "version": "v1", "created": "Sun, 6 Jul 2014 15:39:05 GMT" } ]
2017-03-03T00:00:00
[ [ "Deorowicz", "Sebastian", "" ], [ "Kokot", "Marek", "" ], [ "Grabowski", "Szymon", "" ], [ "Debudaj-Grabysz", "Agnieszka", "" ] ]
new_dataset
0.995218
1609.08546
Jacob Varley
Jacob Varley, Chad DeChant, Adam Richardson, Joaqu\'in Ruales, Peter Allen
Shape Completion Enabled Robotic Grasping
Under review at IEEE/RSJ International Conference on Intelligent Robots and Systems(IROS) 2017
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work provides an architecture to enable robotic grasp planning via shape completion. Shape completion is accomplished through the use of a 3D convolutional neural network (CNN). The network is trained on our own new open source dataset of over 440,000 3D exemplars captured from varying viewpoints. At runtime, a 2.5D pointcloud captured from a single point of view is fed into the CNN, which fills in the occluded regions of the scene, allowing grasps to be planned and executed on the completed object. Runtime shape completion is very rapid because most of the computational costs of shape completion are borne during offline training. We explore how the quality of completions vary based on several factors. These include whether or not the object being completed existed in the training data and how many object models were used to train the network. We also look at the ability of the network to generalize to novel objects allowing the system to complete previously unseen objects at runtime. Finally, experimentation is done both in simulation and on actual robotic hardware to explore the relationship between completion quality and the utility of the completed mesh model for grasping.
[ { "version": "v1", "created": "Tue, 27 Sep 2016 17:40:06 GMT" }, { "version": "v2", "created": "Thu, 2 Mar 2017 18:19:56 GMT" } ]
2017-03-03T00:00:00
[ [ "Varley", "Jacob", "" ], [ "DeChant", "Chad", "" ], [ "Richardson", "Adam", "" ], [ "Ruales", "Joaquín", "" ], [ "Allen", "Peter", "" ] ]
new_dataset
0.958341
1612.02113
Matthew Kokshoorn
Matthew Kokshoorn, He Chen, Yonghui Li and Branka Vucetic
Fountain Code-Inspired Channel Estimation for Multi-user Millimeter Wave MIMO Systems
To be presented at ICC, 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper develops a novel channel estimation approach for multi-user millimeter wave (mmWave) wireless systems with large antenna arrays. By exploiting the inherent mmWave channel sparsity, we propose a novel simultaneous-estimation with iterative fountain training (SWIFT) framework, in which the average number of channel measurements is adapted to various channel conditions. To this end, the base station (BS) and each user continue to measure the channel with a random subset of transmit/receive beamforming directions until the channel estimate converges. We formulate the channel estimation process as a compressed sensing problem and apply a sparse estimation approach to recover the virtual channel information. As SWIFT does not adapt the BS's transmitting beams to any single user, we are able to estimate all user channels simultaneously. Simulation results show that SWIFT can significantly outperform existing random-beamforming based approaches that use a fixed number of measurements, over a range of signal-to-noise ratios and channel coherence times.
[ { "version": "v1", "created": "Wed, 7 Dec 2016 04:45:52 GMT" }, { "version": "v2", "created": "Thu, 2 Mar 2017 01:11:02 GMT" } ]
2017-03-03T00:00:00
[ [ "Kokshoorn", "Matthew", "" ], [ "Chen", "He", "" ], [ "Li", "Yonghui", "" ], [ "Vucetic", "Branka", "" ] ]
new_dataset
0.998639
1703.00512
Randal Olson
Randal S. Olson, William La Cava, Patryk Orzechowski, Ryan J. Urbanowicz, Jason H. Moore
PMLB: A Large Benchmark Suite for Machine Learning Evaluation and Comparison
14 pages, 5 figures, submitted for review to JMLR
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The selection, development, or comparison of machine learning methods in data mining can be a difficult task based on the target problem and goals of a particular study. Numerous publicly available real-world and simulated benchmark datasets have emerged from different sources, but their organization and adoption as standards have been inconsistent. As such, selecting and curating specific benchmarks remains an unnecessary burden on machine learning practitioners and data scientists. The present study introduces an accessible, curated, and developing public benchmark resource to facilitate identification of the strengths and weaknesses of different machine learning methodologies. We compare meta-features among the current set of benchmark datasets in this resource to characterize the diversity of available data. Finally, we apply a number of established machine learning methods to the entire benchmark suite and analyze how datasets and algorithms cluster in terms of performance. This work is an important first step towards understanding the limitations of popular benchmarking suites and developing a resource that connects existing benchmarking standards to more diverse and efficient standards in the future.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 21:20:11 GMT" } ]
2017-03-03T00:00:00
[ [ "Olson", "Randal S.", "" ], [ "La Cava", "William", "" ], [ "Orzechowski", "Patryk", "" ], [ "Urbanowicz", "Ryan J.", "" ], [ "Moore", "Jason H.", "" ] ]
new_dataset
0.999494
1703.00536
Ania Piotrowska
Ania Piotrowska and Jamie Hayes and Tariq Elahi and Sebastian Meiser and George Danezis
The Loopix Anonymity System
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Loopix, a low-latency anonymous communication system that provides bi-directional 'third-party' sender and receiver anonymity and unobservability. Loopix leverages cover traffic and brief message delays to provide anonymity and achieve traffic analysis resistance, including against a global network adversary. Mixes and clients self-monitor the network via loops of traffic to provide protection against active attacks, and inject cover traffic to provide stronger anonymity and a measure of sender and receiver unobservability. Service providers mediate access in and out of a stratified network of Poisson mix nodes to facilitate accounting and off-line message reception, as well as to keep the number of links in the system low, and to concentrate cover traffic. We provide a theoretical analysis of the Poisson mixing strategy as well as an empirical evaluation of the anonymity provided by the protocol and a functional implementation that we analyze in terms of scalability by running it on AWS EC2. We show that a Loopix relay can handle upwards of 300 messages per second, at a small delay overhead of less than 1.5 ms on top of the delays introduced into messages to provide security. Overall message latency is in the order of seconds - which is low for a mix-system. Furthermore, many mix nodes can be securely added to a stratified topology to scale throughput without sacrificing anonymity.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 22:33:41 GMT" } ]
2017-03-03T00:00:00
[ [ "Piotrowska", "Ania", "" ], [ "Hayes", "Jamie", "" ], [ "Elahi", "Tariq", "" ], [ "Meiser", "Sebastian", "" ], [ "Danezis", "George", "" ] ]
new_dataset
0.990678
1703.00619
Claudia Melo
Claudia de O. Melo and Thiago C. de Sousa
Reflections on Cyberethics Education for Millennial Software Engineers
International Workshop on Software Engineering Curricula for Millennials (SECM), ICSE 2017
null
null
null
cs.SE cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software is a key component of solutions for 21st Century problems. These problems are often "wicked", complex, and unpredictable. To provide the best possible solution, millennial software engineers must be prepared to make ethical decisions, thinking critically, and acting systematically. This reality demands continuous changes in educational systems and curricula delivery, as misjudgment might have serious social impact. This study aims to investigate and reflect on Software Engineering (SE) Programs, proposing a conceptual framework for analyzing cyberethics education and a set of suggestions on how to integrate it into the SE undergraduate curriculum.
[ { "version": "v1", "created": "Thu, 2 Mar 2017 05:00:50 GMT" } ]
2017-03-03T00:00:00
[ [ "Melo", "Claudia de O.", "" ], [ "de Sousa", "Thiago C.", "" ] ]
new_dataset
0.971902
1703.00626
Onur Mutlu
Onur Mutlu
The RowHammer Problem and Other Issues We May Face as Memory Becomes Denser
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As memory scales down to smaller technology nodes, new failure mechanisms emerge that threaten its correct operation. If such failure mechanisms are not anticipated and corrected, they can not only degrade system reliability and availability but also, perhaps even more importantly, open up security vulnerabilities: a malicious attacker can exploit the exposed failure mechanism to take over the entire system. As such, new failure mechanisms in memory can become practical and significant threats to system security. In this work, we discuss the RowHammer problem in DRAM, which is a prime (and perhaps the first) example of how a circuit-level failure mechanism in DRAM can cause a practical and widespread system security vulnerability. RowHammer, as it is popularly referred to, is the phenomenon that repeatedly accessing a row in a modern DRAM chip causes bit flips in physically-adjacent rows at consistently predictable bit locations. It is caused by a hardware failure mechanism called DRAM disturbance errors, which is a manifestation of circuit-level cell-to-cell interference in a scaled memory technology. We analyze the root causes of the RowHammer problem and examine various solutions. We also discuss what other vulnerabilities may be lurking in DRAM and other types of memories, e.g., NAND flash memory or Phase Change Memory, that can potentially threaten the foundations of secure systems, as the memory technologies scale to higher densities. We conclude by describing and advocating a principled approach to memory reliability and security research that can enable us to better anticipate and prevent such vulnerabilities.
[ { "version": "v1", "created": "Thu, 2 Mar 2017 05:19:38 GMT" } ]
2017-03-03T00:00:00
[ [ "Mutlu", "Onur", "" ] ]
new_dataset
0.952224
1703.00662
Dong Min Kim
Dong Min Kim, Henning Thomsen, Petar Popovski
On a User-Centric Base Station Cooperation Scheme for Reliable Communications
to be presented in IEEE VTC 2017 Spring
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe CoMP2flex, a user-centric base station (BS) cooperation scheme that provides improvements in reliability of both uplink (UL) and downlink (DL) communications of wireless cellular networks. CoMP2flex supports not only cooperation of two BSs with same direction of traffic but also cooperation of two BSs serving bidirectional traffic. The reliability performance of CoMP2flex is shown with numerical simulations and analytical expressions. We quantify and numerically validate the performance of the greedy BS pairing algorithm by comparing maximum weight matching methods, implemented as the Edmonds matching algorithm for weighted graphs.
[ { "version": "v1", "created": "Thu, 2 Mar 2017 08:22:24 GMT" } ]
2017-03-03T00:00:00
[ [ "Kim", "Dong Min", "" ], [ "Thomsen", "Henning", "" ], [ "Popovski", "Petar", "" ] ]
new_dataset
0.999052
1703.00745
F. J. Lobillo
Jos\'e G\'omez-Torrecillas, F. J. Lobillo and Gabriel Navarro
Peterson-Gorenstein-Zierler algorithm for skew RS codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We design a non-commutative version of the Peterson-Gorenstein-Zierler decoding algorithm for a class of codes that we call skew RS codes. These codes are left ideals of a quotient of a skew polynomial ring, which endow them of a sort of non-commutative cyclic structure. Since we work over an arbitrary field, our techniques may be applied both to linear block codes and convolutional codes. In particular, our decoding algorithm applies for block codes beyond the classical cyclic case.
[ { "version": "v1", "created": "Thu, 2 Mar 2017 12:13:28 GMT" } ]
2017-03-03T00:00:00
[ [ "Gómez-Torrecillas", "José", "" ], [ "Lobillo", "F. J.", "" ], [ "Navarro", "Gabriel", "" ] ]
new_dataset
0.999505
1503.08623
Edd Barrett Dr
Edd Barrett, Carl Friedrich Bolz, Lukas Diekmann, Laurence Tratt
Fine-grained Language Composition: A Case Study
27 pages, 4 tables, 5 figures
European Conference on Object-Oriented Programming (ECOOP). July 2016, Pages 3:1--3:27
10.4230/LIPIcs.ECOOP.2016.3
null
cs.PL
http://creativecommons.org/licenses/by/4.0/
Although run-time language composition is common, it normally takes the form of a crude Foreign Function Interface (FFI). While useful, such compositions tend to be coarse-grained and slow. In this paper we introduce a novel fine-grained syntactic composition of PHP and Python which allows users to embed each language inside the other, including referencing variables across languages. This composition raises novel design and implementation challenges. We show that good solutions can be found to the design challenges; and that the resulting implementation imposes an acceptable performance overhead of, at most, 2.6x.
[ { "version": "v1", "created": "Mon, 30 Mar 2015 10:10:18 GMT" }, { "version": "v2", "created": "Wed, 9 Dec 2015 15:36:57 GMT" }, { "version": "v3", "created": "Mon, 11 Jul 2016 11:39:51 GMT" } ]
2017-03-02T00:00:00
[ [ "Barrett", "Edd", "" ], [ "Bolz", "Carl Friedrich", "" ], [ "Diekmann", "Lukas", "" ], [ "Tratt", "Laurence", "" ] ]
new_dataset
0.998375
1604.06959
David Wu
David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh
Privacy, Discovery, and Authentication for the Internet of Things
Extended version of ESORICS 2016 paper
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic service discovery is essential to realizing the full potential of the Internet of Things (IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low Energy have gained widespread adoption across both IoT and mobile devices, most of these protocols do not offer any form of privacy control for the service, and often leak sensitive information such as service type, device hostname, device owner's identity, and more in the clear. To address the need for better privacy in both the IoT and the mobile landscape, we develop two protocols for private service discovery and private mutual authentication. Our protocols provide private and authentic service advertisements, zero round-trip (0-RTT) mutual authentication, and are provably secure in the Canetti-Krawczyk key-exchange model. In contrast to alternatives, our protocols are lightweight and require minimal modification to existing key-exchange protocols. We integrate our protocols into an existing open-source distributed applications framework, and provide benchmarks on multiple hardware platforms: Intel Edisons, Raspberry Pis, smartphones, laptops, and desktops. Finally, we discuss some privacy limitations of the Apple AirDrop protocol (a peer-to-peer file sharing mechanism) and show how to improve the privacy of Apple AirDrop using our private mutual authentication protocol.
[ { "version": "v1", "created": "Sat, 23 Apr 2016 21:57:09 GMT" }, { "version": "v2", "created": "Mon, 11 Jul 2016 08:07:13 GMT" }, { "version": "v3", "created": "Tue, 28 Feb 2017 20:08:56 GMT" } ]
2017-03-02T00:00:00
[ [ "Wu", "David J.", "" ], [ "Taly", "Ankur", "" ], [ "Shankar", "Asim", "" ], [ "Boneh", "Dan", "" ] ]
new_dataset
0.985851
1702.03775
Markus Borg
Markus Borg, Thomas Olsson, John Svensson
From LiDAR to Underground Maps via 5G - Business Models Enabling a System-of-Systems Approach to Mapping the Kankberg Mine
Technical report origining in the PIMM project, Pilot for Industrial Mobile communication in Mining. This work was funded by VINNOVA, the Swedish Agency for Innovation Systems
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With ever-increasing productivity targets in mining operations, there is a growing interest in mining automation. The PIMM project addresses the fundamental challenge of network communication by constructing a pilot 5G network in the underground mine Kankberg. In this report, we discuss how such a 5G network could constitute the essential infrastructure to organize existing systems in Kankberg into a system-of-systems (SoS). In this report, we analyze a scenario in which LiDAR equipped vehicles operating in the mine are connected to existing mine mapping and positioning solutions. The approach is motivated by the approaching era of remote controlled, or even autonomous, vehicles in mining operations. The proposed SoS could ensure continuously updated maps of Kankberg, rendered in unprecedented detail, supporting both productivity and safety in the underground mine. We present four different SoS solutions from an organizational point of view, discussing how development and operations of the constituent systems could be distributed among Boliden and external stakeholders, e.g., the vehicle suppliers, the hauling company, and the developers of the mapping software. The four scenarios are compared from both technical and business perspectives, and based on trade-off discussions and SWOT analyses. We conclude our report by recommending continued research along two future paths, namely a closer cooperation with the vehicle suppliers, and further feasibility studies regarding establishing a Kankberg software ecosystem.
[ { "version": "v1", "created": "Mon, 13 Feb 2017 13:55:32 GMT" }, { "version": "v2", "created": "Wed, 1 Mar 2017 11:20:03 GMT" } ]
2017-03-02T00:00:00
[ [ "Borg", "Markus", "" ], [ "Olsson", "Thomas", "" ], [ "Svensson", "John", "" ] ]
new_dataset
0.99745
1702.05373
Gregory Cohen
Gregory Cohen, Saeed Afshar, Jonathan Tapson, Andr\'e van Schaik
EMNIST: an extension of MNIST to handwritten letters
The dataset is now available for download from https://www.westernsydney.edu.au/bens/home/reproducible_research/emnist. This link is also included in the revised article
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The MNIST dataset has become a standard benchmark for learning, classification and computer vision systems. Contributing to its widespread adoption are the understandable and intuitive nature of the task, its relatively small size and storage requirements and the accessibility and ease-of-use of the database itself. The MNIST database was derived from a larger dataset known as the NIST Special Database 19 which contains digits, uppercase and lowercase handwritten letters. This paper introduces a variant of the full NIST dataset, which we have called Extended MNIST (EMNIST), which follows the same conversion paradigm used to create the MNIST dataset. The result is a set of datasets that constitute a more challenging classification tasks involving letters and digits, and that shares the same image structure and parameters as the original MNIST task, allowing for direct compatibility with all existing classifiers and systems. Benchmark results are presented along with a validation of the conversion process through the comparison of the classification results on converted NIST digits and the MNIST digits.
[ { "version": "v1", "created": "Fri, 17 Feb 2017 15:06:14 GMT" }, { "version": "v2", "created": "Wed, 1 Mar 2017 08:55:36 GMT" } ]
2017-03-02T00:00:00
[ [ "Cohen", "Gregory", "" ], [ "Afshar", "Saeed", "" ], [ "Tapson", "Jonathan", "" ], [ "van Schaik", "André", "" ] ]
new_dataset
0.999875
1703.00050
Manolis Savva
Angel X. Chang, Mihail Eric, Manolis Savva, Christopher D. Manning
SceneSeer: 3D Scene Design with Natural Language
null
null
null
null
cs.GR cs.CL cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Designing 3D scenes is currently a creative task that requires significant expertise and effort in using complex 3D design interfaces. This effortful design process starts in stark contrast to the easiness with which people can use language to describe real and imaginary environments. We present SceneSeer: an interactive text to 3D scene generation system that allows a user to design 3D scenes using natural language. A user provides input text from which we extract explicit constraints on the objects that should appear in the scene. Given these explicit constraints, the system then uses a spatial knowledge base learned from an existing database of 3D scenes and 3D object models to infer an arrangement of the objects forming a natural scene matching the input description. Using textual commands the user can then iteratively refine the created scene by adding, removing, replacing, and manipulating objects. We evaluate the quality of 3D scenes generated by SceneSeer in a perceptual evaluation experiment where we compare against manually designed scenes and simpler baselines for 3D scene generation. We demonstrate how the generated scenes can be iteratively refined through simple natural language commands.
[ { "version": "v1", "created": "Tue, 28 Feb 2017 20:47:47 GMT" } ]
2017-03-02T00:00:00
[ [ "Chang", "Angel X.", "" ], [ "Eric", "Mihail", "" ], [ "Savva", "Manolis", "" ], [ "Manning", "Christopher D.", "" ] ]
new_dataset
0.999734
1703.00061
Manolis Savva
Manolis Savva, Angel X. Chang, Maneesh Agrawala
SceneSuggest: Context-driven 3D Scene Design
null
null
null
null
cs.GR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present SceneSuggest: an interactive 3D scene design system providing context-driven suggestions for 3D model retrieval and placement. Using a point-and-click metaphor we specify regions in a scene in which to automatically place and orient relevant 3D models. Candidate models are ranked using a set of static support, position, and orientation priors learned from 3D scenes. We show that our suggestions enable rapid assembly of indoor scenes. We perform a user study comparing suggestions to manual search and selection, as well as to suggestions with no automatic orientation. We find that suggestions reduce total modeling time by 32%, that orientation priors reduce time spent re-orienting objects by 27%, and that context-driven suggestions reduce the number of text queries by 50%.
[ { "version": "v1", "created": "Tue, 28 Feb 2017 21:21:03 GMT" } ]
2017-03-02T00:00:00
[ [ "Savva", "Manolis", "" ], [ "Chang", "Angel X.", "" ], [ "Agrawala", "Maneesh", "" ] ]
new_dataset
0.998985
1703.00075
Rachid Haddadi
Rachid Haddadi, Elhassane Abdelmounim, Mustapha El Hanine, Abdelaziz Belaguid
Discrete Wavelet Transform Based Algorithm for Recognition of QRS Complexes
null
World of Computer Science and Information Technology Journal (WCSIT) ; ISSN: 2221-0741; Vol. 4, No. 9, 127-132, 2014
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes the application of Discrete Wavelet Transform (DWT) to detect the QRS (ECG is characterized by a recurrent wave sequence of P, QRS and T-wave) of an electrocardiogram (ECG) signal. Wavelet Transform provides localization in both time and frequency. In preprocessing stage, DWT is used to remove the baseline wander in the ECG signal. The performance of the algorithm of QRS detection is evaluated against the standard MIT BIH (Massachusetts Institute of Technology, Beth Israel Hospital) Arrhythmia database. The average QRS complexes detection rate of 98.1 % is achieved.
[ { "version": "v1", "created": "Tue, 28 Feb 2017 22:12:00 GMT" } ]
2017-03-02T00:00:00
[ [ "Haddadi", "Rachid", "" ], [ "Abdelmounim", "Elhassane", "" ], [ "Hanine", "Mustapha El", "" ], [ "Belaguid", "Abdelaziz", "" ] ]
new_dataset
0.958542
1703.00079
Mert Geveci
Mert Geveci
Fault Tolerant Thermal Control of Steam Turbine Shell Deflections
Six pages, nine figures, and one table
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The metal-to-metal clearances of a steam turbine during full or part load operation are among the main drivers of efficiency. The requirement to add clearances is driven by a number of factors including the relative movements of the steam turbine shell and rotor during transient conditions such as startup and shutdown. This paper includes a description of a control algorithm to manage external heating blankets for the thermal control of the shell deflections during turbine shutdown. The proposed method is tolerant of changes in the heat loss characteristics of the system as well as simultaneous component failures.
[ { "version": "v1", "created": "Tue, 28 Feb 2017 22:31:52 GMT" } ]
2017-03-02T00:00:00
[ [ "Geveci", "Mert", "" ] ]
new_dataset
0.990599
1703.00112
Lei Qiu
Lei Qiu, Yu Zhang, Li Zhang
Minimum Enclosing Circle of a Set of Static Points with Dynamic Weight from One Free Point
14 pages, 8 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a set $S$ of $n$ static points and a free point $p$ in the Euclidean plane, we study a new variation of the minimum enclosing circle problem, in which a dynamic weight that equals to the reciprocal of the distance from the free point $p$ to the undetermined circle center is included. In this work, we prove the optimal solution of the new problem is unique and lies on the boundary of the farthest-point Voronoi diagram of $S$, once $p$ does not coincide with any vertex of the convex hull of $S$. We propose a tree structure constructed from the boundary of the farthest-point Voronoi diagram and use the hierarchical relationship between edges to locate the optimal solution. The plane could be divide into at most $3n-4$ non-overlapping regions. When $p$ lies in one of the regions, the optimal solution locates at one node or lies on the interior of one edge in the boundary of the farthest-point Voronoi diagram. Moreover, we apply the new variation to calculate the maximum displacement of one point $p$ under the condition that the displacements of points in $S$ are restricted in 2D rigid motion.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 02:48:12 GMT" } ]
2017-03-02T00:00:00
[ [ "Qiu", "Lei", "" ], [ "Zhang", "Yu", "" ], [ "Zhang", "Li", "" ] ]
new_dataset
0.963717
1703.00170
R\'ehan Noordally Mr.
R\'ehan Noordally, Xavier Nicolay, Yassine Gangat and Pascal Anelli
How long delays impact TCP performance for a connectivity from Reunion Island ?
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
TCP is the protocol of transport the most used in the Internet and have a heavy-dependence on delay. Reunion Island have a specific Internet connection, based on main links to France, located 10.000 km away. As a result, the minimal delay between Reunion Island and France is around 180 ms. In this paper, we will study TCP traces collected in Reunion Island University. The goal is to determine the metrics to study the impacts of long delays on TCP performance.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 08:03:29 GMT" } ]
2017-03-02T00:00:00
[ [ "Noordally", "Réhan", "" ], [ "Nicolay", "Xavier", "" ], [ "Gangat", "Yassine", "" ], [ "Anelli", "Pascal", "" ] ]
new_dataset
0.979733
1703.00185
Alessandro Gabbana
E. Calore, A. Gabbana, J. Kraus, E. Pellegrini, S.F. Schifano, R. Tripiccione
Massively parallel lattice-Boltzmann codes on large GPU clusters
null
null
10.1016/j.parco.2016.08.005
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a massively parallel code for a state-of-the art thermal lattice- Boltzmann method. Our code has been carefully optimized for performance on one GPU and to have a good scaling behavior extending to a large number of GPUs. Versions of this code have been already used for large-scale studies of convective turbulence. GPUs are becoming increasingly popular in HPC applications, as they are able to deliver higher performance than traditional processors. Writing efficient programs for large clusters is not an easy task as codes must adapt to increasingly parallel architectures, and the overheads of node-to-node communications must be properly handled. We describe the structure of our code, discussing several key design choices that were guided by theoretical models of performance and experimental benchmarks. We present an extensive set of performance measurements and identify the corresponding main bot- tlenecks; finally we compare the results of our GPU code with those measured on other currently available high performance processors. Our results are a production-grade code able to deliver a sustained performance of several tens of Tflops as well as a design and op- timization methodology that can be used for the development of other high performance applications for computational physics.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 08:59:48 GMT" } ]
2017-03-02T00:00:00
[ [ "Calore", "E.", "" ], [ "Gabbana", "A.", "" ], [ "Kraus", "J.", "" ], [ "Pellegrini", "E.", "" ], [ "Schifano", "S. F.", "" ], [ "Tripiccione", "R.", "" ] ]
new_dataset
0.971131
1703.00207
Aditya Ahuja
Aditya Ahuja
A Quantum-Classical Scheme towards Quantum Functional Encryption
13 pages
null
null
null
cs.CR quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum encryption is a well studied problem for both classical and quantum information. However, little is known about quantum encryption schemes which enable the user, under different keys, to learn different functions of the plaintext, given the ciphertext. In this paper, we give a novel one-bit secret-key quantum encryption scheme, a classical extension of which allows different key holders to learn different length subsequences of the plaintext from the ciphertext. We prove our quantum-classical scheme secure under the notions of quantum semantic security, quantum entropic indistinguishability, and recent security definitions from the field of functional encryption.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 10:11:52 GMT" } ]
2017-03-02T00:00:00
[ [ "Ahuja", "Aditya", "" ] ]
new_dataset
0.961212
1703.00331
Mahyar Shahsavari
Mahyar Shahsavari (CRIStAL), Pierre Boulet (CRIStAL)
Memristor nanodevice for unconventional computing:review and applications
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A memristor is a two-terminal nanodevice that its properties attract a wide community of researchers from various domains such as physics, chemistry, electronics, computer and neuroscience.The simple structure for manufacturing, small scalability, nonvolatility and potential of using inlow power platforms are outstanding characteristics of this emerging nanodevice. In this report,we review a brief literature of memristor from mathematic model to the physical realization. Wediscuss different classes of memristors based on the material used for its manufacturing. Thepotential applications of memristor are presented and a wide domain of applications are explainedand classified.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 15:05:44 GMT" } ]
2017-03-02T00:00:00
[ [ "Shahsavari", "Mahyar", "", "CRIStAL" ], [ "Boulet", "Pierre", "", "CRIStAL" ] ]
new_dataset
0.998742
1703.00369
Rob Meijer
Rob J Meijer
MattockFS; Page-cache and access-control concerns in asynchronous message-based forensic frameworks on the Linux platform
dissertation, Univ College London, June 2016
null
10.13140/RG.2.2.35426.53440
null
cs.CR
http://creativecommons.org/licenses/by/4.0/
In this dissertation the feasibility of creating a page-cache efficient storage- and messaging solution with integrity geared access control for a scalable forensic framework is researched. The Open Computer Forensics Architecture (OCFA),a lab-side scalable computer forensics framework, introduced the concept of a message passing concurrency based forensic framework. Since then, the amount of per-investigation data to be processed in a lab environment has continued to grow significantly while available RAM and CPU processing power combined with prohibitive cost and limited capacity of SSD solutions have shifted processing from being largely CPU constrained to being much more IO constrained. OCFA suffered from several page-cache-miss related performance issues that have grown more significant as a result of this shift. In the light of anti-forensics and general issues related to process integrity, OCFA did not leverage the power of its message passing based design to address integrity concerns. The main purpose of this dissertation is to analyze and evaluate a number of page-cache friendly technologies that could contribute to the creation of a computer forensics lab-geared scalable message-passing-concurrency based forensic framework with a significantly reduced quantity of page-cache-miss induced spurious IO operations, taking into account integrity related issues. Provenance logs from historic investigations conducted using the Open Computer Forensics Architecture were thoroughly analyzed in this study, during which several bottlenecks and design flaws in OCFA were identified. A number of strategies were devised to address these bottlenecks in future computer forensic frameworks. Finally, the most prominently page-cache related strategies were consolidated with access-control measures into a user-space file-system and low-level API prototype.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 16:30:20 GMT" } ]
2017-03-02T00:00:00
[ [ "Meijer", "Rob J", "" ] ]
new_dataset
0.951817
1703.00426
Francois Chollet
Cezary Kaliszyk, Fran\c{c}ois Chollet, Christian Szegedy
HolStep: A Machine Learning Dataset for Higher-order Logic Theorem Proving
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large computer-understandable proofs consist of millions of intermediate logical steps. The vast majority of such steps originate from manually selected and manually guided heuristics applied to intermediate goals. So far, machine learning has generally not been used to filter or generate these steps. In this paper, we introduce a new dataset based on Higher-Order Logic (HOL) proofs, for the purpose of developing new machine learning-based theorem-proving strategies. We make this dataset publicly available under the BSD license. We propose various machine learning tasks that can be performed on this dataset, and discuss their significance for theorem proving. We also benchmark a set of simple baseline machine learning models suited for the tasks (including logistic regression, convolutional neural networks and recurrent neural networks). The results of our baseline models show the promise of applying machine learning to HOL theorem proving.
[ { "version": "v1", "created": "Wed, 1 Mar 2017 18:20:19 GMT" } ]
2017-03-02T00:00:00
[ [ "Kaliszyk", "Cezary", "" ], [ "Chollet", "François", "" ], [ "Szegedy", "Christian", "" ] ]
new_dataset
0.999831
1501.06091
Mostafa El-Khamy
Mostafa El-Khamy, Hessam Mahdavifar, Gennady Feygin, Jungwon Lee, Inyup Kang
Relaxed Polar Codes
Conference version,Relaxed Channel Polarization for Reduced Complexity Polar Coding, accepted for presentation at IEEE Wireless Communications and Networking Conference WCNC 2015
IEEE Transactions on Information Theory, 2017
10.1109/TIT.2017.2657691
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes are the latest breakthrough in coding theory, as they are the first family of codes with explicit construction that provably achieve the symmetric capacity of discrete memoryless channels. Ar{\i}kan's polar encoder and successive cancellation decoder have complexities of $N \log N$, for code length $N$. Although, the complexity bound of $N \log N$ is asymptotically favorable, we report in this work methods to further reduce the encoding and decoding complexities of polar coding. The crux is to relax the polarization of certain bit-channels without performance degradation. We consider schemes for relaxing the polarization of both \emph{very good} and \emph{very bad} bit-channels, in the process of channel polarization. Relaxed polar codes are proved to preserve the capacity achieving property of polar codes. Analytical bounds on the asymptotic and finite-length complexity reduction attainable by relaxed polarization are derived. For binary erasure channels, we show that the computation complexity can be reduced by a factor of 6, while preserving the rate and error performance. We also show that relaxed polar codes can be decoded with significantly reduced latency. For AWGN channels with medium code lengths, we show that relaxed polar codes can have lower error probabilities than conventional polar codes, while having reduced encoding and decoding computation complexities.
[ { "version": "v1", "created": "Sat, 24 Jan 2015 22:51:54 GMT" }, { "version": "v2", "created": "Thu, 16 Jul 2015 08:32:06 GMT" } ]
2017-03-01T00:00:00
[ [ "El-Khamy", "Mostafa", "" ], [ "Mahdavifar", "Hessam", "" ], [ "Feygin", "Gennady", "" ], [ "Lee", "Jungwon", "" ], [ "Kang", "Inyup", "" ] ]
new_dataset
0.999695
1504.08248
Palash Dey
Palash Dey, Neeldhara Misra, and Y. Narahari
Frugal Bribery in Voting
Full version has been accepted in Theoretical Computer Science
null
null
null
cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bribery in elections is an important problem in computational social choice theory. However, bribery with money is often illegal in elections. Motivated by this, we introduce the notion of frugal bribery and formulate two new pertinent computational problems which we call Frugal-bribery and Frugal- $bribery to capture bribery without money in elections. In the proposed model, the briber is frugal in nature and this is captured by her inability to bribe votes of a certain kind, namely, non-vulnerable votes. In the Frugal-bribery problem, the goal is to make a certain candidate win the election by changing only vulnerable votes. In the Frugal-{dollar}bribery problem, the vulnerable votes have prices and the goal is to make a certain candidate win the election by changing only vulnerable votes, subject to a budget constraint of the briber. We further formulate two natural variants of the Frugal-{dollar}bribery problem namely Uniform-frugal-{dollar}bribery and Nonuniform-frugal-{dollar}bribery where the prices of the vulnerable votes are, respectively, all the same or different. We study the computational complexity of the above problems for unweighted and weighted elections for several commonly used voting rules. We observe that, even if we have only a small number of candidates, the problems are intractable for all voting rules studied here for weighted elections, with the sole exception of the Frugal-bribery problem for the plurality voting rule. In contrast, we have polynomial time algorithms for the Frugal-bribery problem for plurality, veto, k-approval, k-veto, and plurality with runoff voting rules for unweighted elections. However, the Frugal-{dollar}bribery problem is intractable for all the voting rules studied here barring the plurality and the veto voting rules for unweighted elections.
[ { "version": "v1", "created": "Thu, 30 Apr 2015 14:42:34 GMT" }, { "version": "v2", "created": "Thu, 24 Nov 2016 16:39:10 GMT" }, { "version": "v3", "created": "Tue, 28 Feb 2017 16:51:02 GMT" } ]
2017-03-01T00:00:00
[ [ "Dey", "Palash", "" ], [ "Misra", "Neeldhara", "" ], [ "Narahari", "Y.", "" ] ]
new_dataset
0.998668
1508.03062
Steven Chaplick
Kathie Cameron, Steven Chaplick, Chinh T. Hoang
On the structure of (pan, even hole)-free graphs
Accepted to appear in the Journal of Graph Theory
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A hole is a chordless cycle with at least four vertices. A pan is a graph which consists of a hole and a single vertex with precisely one neighbor on the hole. An even hole is a hole with an even number of vertices. We prove that a (pan, even hole)-free graph can be decomposed by clique cutsets into essentially unit circular-arc graphs. This structure theorem is the basis of our $O(nm)$-time certifying algorithm for recognizing (pan, even hole)-free graphs and for our $O(n^{2.5}+nm)$-time algorithm to optimally color them. Using this structure theorem, we show that the tree-width of a (pan, even hole)-free graph is at most 1.5 times the clique number minus 1, and thus the chromatic number is at most 1.5 times the clique number.
[ { "version": "v1", "created": "Wed, 12 Aug 2015 20:38:01 GMT" }, { "version": "v2", "created": "Tue, 28 Feb 2017 09:07:22 GMT" } ]
2017-03-01T00:00:00
[ [ "Cameron", "Kathie", "" ], [ "Chaplick", "Steven", "" ], [ "Hoang", "Chinh T.", "" ] ]
new_dataset
0.994396
1611.00159
S. B. Balaji
S.B.Balaji, P.Vijay Kumar
Bounds on Codes with Locality and Availability
submitted to ISIT 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate bounds on rate and minimum distance of codes with $t$ availability. We present bounds on minimum distance of a code with $t$ availability that are tighter than existing bounds. For bounds on rate of a code with $t$ availability, we restrict ourselves to a sub-class of codes with $t$ availability called codes with strict $t$ availability and derive a tighter rate bound. Codes with strict $t$ availability can be defined as the null space of an $(m \times n)$ parity-check matrix $H$, where each row has weight $(r+1)$ and each column has weight $t$, with intersection between support of any two rows atmost one. We also present two general constructions for codes with $t$ availability.
[ { "version": "v1", "created": "Tue, 1 Nov 2016 08:25:44 GMT" }, { "version": "v2", "created": "Wed, 2 Nov 2016 06:06:18 GMT" }, { "version": "v3", "created": "Tue, 7 Feb 2017 18:56:12 GMT" }, { "version": "v4", "created": "Mon, 13 Feb 2017 05:08:07 GMT" }, { "version": "v5", "created": "Tue, 28 Feb 2017 16:15:24 GMT" } ]
2017-03-01T00:00:00
[ [ "Balaji", "S. B.", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.999839
1612.04265
Trinabh Gupta
Trinabh Gupta, Henrique Fingler, Lorenzo Alvisi, Michael Walfish
Pretzel: Email encryption and provider-supplied functions are compatible
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Emails today are often encrypted, but only between mail servers---the vast majority of emails are exposed in plaintext to the mail servers that handle them. While better than no encryption, this arrangement leaves open the possibility of attacks, privacy violations, and other disclosures. Publicly, email providers have stated that default end-to-end encryption would conflict with essential functions (spam filtering, etc.), because the latter requires analyzing email text. The goal of this paper is to demonstrate that there is no conflict. We do so by designing, implementing, and evaluating Pretzel. Starting from a cryptographic protocol that enables two parties to jointly perform a classification task without revealing their inputs to each other, Pretzel refines and adapts this protocol to the email context. Our experimental evaluation of a prototype demonstrates that email can be encrypted end-to-end \emph{and} providers can compute over it, at tolerable cost: clients must devote some storage and processing, and provider overhead is roughly 5 times versus the status quo.
[ { "version": "v1", "created": "Tue, 13 Dec 2016 16:21:39 GMT" }, { "version": "v2", "created": "Wed, 14 Dec 2016 02:32:23 GMT" }, { "version": "v3", "created": "Mon, 27 Feb 2017 21:47:34 GMT" } ]
2017-03-01T00:00:00
[ [ "Gupta", "Trinabh", "" ], [ "Fingler", "Henrique", "" ], [ "Alvisi", "Lorenzo", "" ], [ "Walfish", "Michael", "" ] ]
new_dataset
0.999733
1702.08819
Xuan Zhang
Xuan Zhang, Wenbo Shi, Qinran Hu, Bin Yan, Ali Malkawi and Na Li
Distributed Temperature Control via Geothermal Heat Pump Systems in Energy Efficient Buildings
8 pages, 10 figures, in Proc. of 2017 American Control Conference, the long version. arXiv admin note: text overlap with arXiv:1702.03308
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geothermal Heat Pump (GHP) systems are heating and cooling systems that use the ground as the temperature exchange medium. GHP systems are becoming more and more popular in recent years due to their high efficiency. Conventional control schemes of GHP systems are mainly designed for buildings with a single thermal zone. For large buildings with multiple thermal zones, those control schemes either lose efficiency or become costly to implement requiring a lot of real-time measurement, communication and computation. In this paper, we focus on developing energy efficient control schemes for GHP systems in buildings with multiple zones. We present a thermal dynamic model of a building equipped with a GHP system for floor heating/cooling and formulate the GHP system control problem as a resource allocation problem with the objective to maximize user comfort in different zones and to minimize the building energy consumption. We then propose real-time distributed algorithms to solve the control problem. Our distributed multi-zone control algorithms are scalable and do not need to measure or predict any exogenous disturbances such as the outdoor temperature and indoor heat gains. Thus, it is easy to implement them in practice. Simulation results demonstrate the effectiveness of the proposed control schemes.
[ { "version": "v1", "created": "Tue, 28 Feb 2017 15:18:13 GMT" } ]
2017-03-01T00:00:00
[ [ "Zhang", "Xuan", "" ], [ "Shi", "Wenbo", "" ], [ "Hu", "Qinran", "" ], [ "Yan", "Bin", "" ], [ "Malkawi", "Ali", "" ], [ "Li", "Na", "" ] ]
new_dataset
0.990868
cs/0408011
Marcel Wild
Marcel Wild
The asymptotic number of binary codes and binary matroids
12 pages
SIAM Journal of Discrete Mathematics 19 (2005) 691-699
null
null
cs.IT cs.DM math.IT
null
The asyptotic number of nonequivalent binary n-codes is determined. This is also the asymptotic number of nonisomorphic binary n-matroids. The connection to a result of Lefmann, Roedl, Phelps is explored. The latter states that almost all binary n-codes have a trivial automorphism group.
[ { "version": "v1", "created": "Wed, 4 Aug 2004 14:46:49 GMT" } ]
2017-03-01T00:00:00
[ [ "Wild", "Marcel", "" ] ]
new_dataset
0.999719
1602.07267
Dmitry Ignatov
Dmitry I. Ignatov
On closure operators related to maximal tricliques in tripartite hypergraphs
Draft for spec. issue of DAM (2015)
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Triadic Formal Concept Analysis (3FCA) was introduced by Lehman and Wille almost two decades ago. And many researchers work in Data Mining and Formal Concept Analysis using the notions of closed sets, Galois and closure operators, closure systems, but up-to-date even though that different researchers actively work on mining triadic and n-ary relations, a proper closure operator for enumeration of triconcepts, i.e. maximal triadic cliques of tripartite hypergaphs, was not introduced. In this paper we show that the previously introduced operators for obtaining triconcepts and maximal connected and complete sets (MCCSs) are not always consistent and provide the reader with a definition of valid closure operator and associated set system. Moreover, we study the difficulties of related problems from order-theoretic and combinatorial point view as well as provide the reader with justifications of the complexity classes of these problems.
[ { "version": "v1", "created": "Tue, 23 Feb 2016 19:13:00 GMT" }, { "version": "v2", "created": "Sun, 26 Feb 2017 12:16:05 GMT" } ]
2017-02-28T00:00:00
[ [ "Ignatov", "Dmitry I.", "" ] ]
new_dataset
0.996589
1605.01148
Viirj Kan
Viirj Kan, Emma Vargo, Noa Machover, Hiroshi Ishii, Serena Pan, Weixuan Chen, Yasuaki Kakehi
Organic Primitives: Synthesis and Design of pH-Reactive Materials using Molecular I/O for Sensing, Actuation, and Interaction
Updated paper
null
10.1145/3025453.3025952
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present Organic Primitives, an enabling toolbox that expands upon the library of input-output devices in HCI and facilitates the design of interactions with organic, fluid-based systems. We formulated color, odor and shape changing material primitives which act as sensor-actuators that convert pH signals into human-readable outputs. Food-grade organic molecules anthocyanin, vanillin, and chitosan were employed as dopants to synthesize materials which output a spectrum of colors, degrees of shape deformation, and switch between odorous and non-odorous states. We evaluated the individual output properties of our sensor-actuators to assess the rate, range, and reversibility of the changes as a function of pH 2-10. We present a design space with techniques for enhancing the functionality of the material primitives, and offer passive and computational methods for controlling the material interfaces. Finally, we explore applications enabled by Organic Primitives under four contexts: environmental, cosmetic, edible, and interspecies.
[ { "version": "v1", "created": "Wed, 4 May 2016 05:33:44 GMT" }, { "version": "v2", "created": "Sat, 25 Feb 2017 02:23:43 GMT" } ]
2017-02-28T00:00:00
[ [ "Kan", "Viirj", "" ], [ "Vargo", "Emma", "" ], [ "Machover", "Noa", "" ], [ "Ishii", "Hiroshi", "" ], [ "Pan", "Serena", "" ], [ "Chen", "Weixuan", "" ], [ "Kakehi", "Yasuaki", "" ] ]
new_dataset
0.999197
1607.08344
Nicolas Gilberto Gutierrez Ortiz
Nicolas Gutierrez and Manuela Wiesinger-Widi
AUGURY: A time-series based application for the analysis and forecasting of system and network performance metrics
8 pages, 9 figures, submitted to SYNASC2016
null
10.1109/SYNASC.2016.062
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents AUGURY, an application for the analysis of monitoring data from computers, servers or cloud infrastructures. The analysis is based on the extraction of patterns and trends from historical data, using elements of time-series analysis. The purpose of AUGURY is to aid a server administrator by forecasting the behaviour and resource usage of specific applications and in presenting a status report in a concise manner. AUGURY provides tools for identifying network traffic congestion and peak usage times, and for making memory usage projections. The application data processing specialises in two tasks: the parametrisation of the memory usage of individual applications and the extraction of the seasonal component from network traffic data. AUGURY uses a different underlying assumption for each of these two tasks. With respect to the memory usage, a limited number of single-valued parameters are assumed to be sufficient to parameterize any application being hosted on the server. Regarding the network traffic data, long-term patterns, such as hourly or daily exist and are being induced by work-time schedules and automatised administrative jobs. In this paper, the implementation of each of the two tasks is presented, tested using locally-generated data, and applied to data from weather forecasting applications hosted on a web server. This data is used to demonstrate the insight that AUGURY can add to the monitoring of server and cloud infrastructures.
[ { "version": "v1", "created": "Thu, 28 Jul 2016 08:02:29 GMT" } ]
2017-02-28T00:00:00
[ [ "Gutierrez", "Nicolas", "" ], [ "Wiesinger-Widi", "Manuela", "" ] ]
new_dataset
0.998938
1610.08914
Lucas Dixon
Ellery Wulczyn, Nithum Thain, Lucas Dixon
Ex Machina: Personal Attacks Seen at Scale
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
The damage personal attacks cause to online discourse motivates many platforms to try to curb the phenomenon. However, understanding the prevalence and impact of personal attacks in online platforms at scale remains surprisingly difficult. The contribution of this paper is to develop and illustrate a method that combines crowdsourcing and machine learning to analyze personal attacks at scale. We show an evaluation method for a classifier in terms of the aggregated number of crowd-workers it can approximate. We apply our methodology to English Wikipedia, generating a corpus of over 100k high quality human-labeled comments and 63M machine-labeled ones from a classifier that is as good as the aggregate of 3 crowd-workers, as measured by the area under the ROC curve and Spearman correlation. Using this corpus of machine-labeled scores, our methodology allows us to explore some of the open questions about the nature of online personal attacks. This reveals that the majority of personal attacks on Wikipedia are not the result of a few malicious users, nor primarily the consequence of allowing anonymous contributions from unregistered users.
[ { "version": "v1", "created": "Thu, 27 Oct 2016 18:18:18 GMT" }, { "version": "v2", "created": "Sat, 25 Feb 2017 18:38:16 GMT" } ]
2017-02-28T00:00:00
[ [ "Wulczyn", "Ellery", "" ], [ "Thain", "Nithum", "" ], [ "Dixon", "Lucas", "" ] ]
new_dataset
0.98758
1611.01702
Adji Bousso Dieng
Adji B. Dieng, Chong Wang, Jianfeng Gao, John Paisley
TopicRNN: A Recurrent Neural Network with Long-Range Semantic Dependency
International Conference on Learning Representations
null
null
null
cs.CL cs.AI cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose TopicRNN, a recurrent neural network (RNN)-based language model designed to directly capture the global semantic meaning relating words in a document via latent topics. Because of their sequential nature, RNNs are good at capturing the local structure of a word sequence - both semantic and syntactic - but might face difficulty remembering long-range dependencies. Intuitively, these long-range dependencies are of semantic nature. In contrast, latent topic models are able to capture the global underlying semantic structure of a document but do not account for word ordering. The proposed TopicRNN model integrates the merits of RNNs and latent topic models: it captures local (syntactic) dependencies using an RNN and global (semantic) dependencies using latent topics. Unlike previous work on contextual RNN language modeling, our model is learned end-to-end. Empirical results on word prediction show that TopicRNN outperforms existing contextual RNN baselines. In addition, TopicRNN can be used as an unsupervised feature extractor for documents. We do this for sentiment analysis on the IMDB movie review dataset and report an error rate of $6.28\%$. This is comparable to the state-of-the-art $5.91\%$ resulting from a semi-supervised approach. Finally, TopicRNN also yields sensible topics, making it a useful alternative to document models such as latent Dirichlet allocation.
[ { "version": "v1", "created": "Sat, 5 Nov 2016 21:25:07 GMT" }, { "version": "v2", "created": "Mon, 27 Feb 2017 03:03:38 GMT" } ]
2017-02-28T00:00:00
[ [ "Dieng", "Adji B.", "" ], [ "Wang", "Chong", "" ], [ "Gao", "Jianfeng", "" ], [ "Paisley", "John", "" ] ]
new_dataset
0.995423
1702.07044
Anran Wang
Anran Wang, Vikram Iyer, Vamsi Talla, Joshua R. Smith and Shyamnath Gollakota
FM Backscatter: Enabling Connected Cities and Smart Fabrics
NSDI 2017
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper enables connectivity on everyday objects by transforming them into FM radio stations. To do this, we show for the first time that ambient FM radio signals can be used as a signal source for backscatter communication. Our design creates backscatter transmissions that can be decoded on any FM receiver including those in cars and smartphones. This enables us to achieve a previously infeasible capability: backscattering information to cars and smartphones in outdoor environments. Our key innovation is a modulation technique that transforms backscatter, which is a multiplication operation on RF signals, into an addition operation on the audio signals output by FM receivers. This enables us to embed both digital data as well as arbitrary audio into ambient analog FM radio signals. We build prototype hardware of our design and successfully embed audio transmissions over ambient FM signals. Further, we achieve data rates of up to 3.2 kbps and ranges of 5-60 feet, while consuming as little as 11.07{\mu}W of power. To demonstrate the potential of our design, we also fabricate our prototype on a cotton t-shirt by machine sewing patterns of a conductive thread to create a smart fabric that can transmit data to a smartphone. We also embed FM antennas into posters and billboards and show that they can communicate with FM receivers in cars and smartphones.
[ { "version": "v1", "created": "Wed, 22 Feb 2017 23:37:34 GMT" }, { "version": "v2", "created": "Fri, 24 Feb 2017 23:57:27 GMT" } ]
2017-02-28T00:00:00
[ [ "Wang", "Anran", "" ], [ "Iyer", "Vikram", "" ], [ "Talla", "Vamsi", "" ], [ "Smith", "Joshua R.", "" ], [ "Gollakota", "Shyamnath", "" ] ]
new_dataset
0.996501
1702.07484
Uli Fahrenberg
Uli Fahrenberg, Axel Legay
Featured Weighted Automata
null
null
null
null
cs.FL cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A featured transition system is a transition system in which the transitions are annotated with feature expressions: Boolean expressions on a finite number of given features. Depending on its feature expression, each individual transition can be enabled when some features are present, and disabled for other sets of features. The behavior of a featured transition system hence depends on a given set of features. There are algorithms for featured transition systems which can check their properties for all sets of features at once, for example for LTL or CTL properties. Here we introduce a model of featured weighted automata which combines featured transition systems and (semiring-) weighted automata. We show that methods and techniques from weighted automata extend to featured weighted automata and devise algorithms to compute quantitative properties of featured weighted automata for all sets of features at once. We show applications to minimum reachability and to energy properties.
[ { "version": "v1", "created": "Fri, 24 Feb 2017 07:40:36 GMT" }, { "version": "v2", "created": "Mon, 27 Feb 2017 06:30:58 GMT" } ]
2017-02-28T00:00:00
[ [ "Fahrenberg", "Uli", "" ], [ "Legay", "Axel", "" ] ]
new_dataset
0.998992
1702.07753
Craig DeForest
C.E. DeForest, K. Glazebrook
Practical Magick with C, PDL, and PDL::PP -- a guide to compiled add-ons for PDL
42 pages, 1 figure, overview of the PDL::PP description language for vectorized calculation
null
null
null
cs.PL
http://creativecommons.org/licenses/by/4.0/
This guide is intended to knit together, and extend, the existing PP and C documentation on PDL internals. It draws heavily from prior work by the authors of the code. Special thanks go to Christian Soeller, and Tuomas Lukka, who together with Glazebrook conceived and implemented PDL and PP; and to Chris Marshall, who has led the PDL development team through several groundbreaking releases and to new levels of usability.
[ { "version": "v1", "created": "Fri, 24 Feb 2017 20:45:52 GMT" } ]
2017-02-28T00:00:00
[ [ "DeForest", "C. E.", "" ], [ "Glazebrook", "K.", "" ] ]
new_dataset
0.999803
1702.07784
Emiliano De Cristofaro
Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali
Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying
WWW Cybersafety Workshop 2017
null
null
null
cs.SI cs.AI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the past few years, online aggression and abusive behaviors have occurred in many different forms and on a variety of platforms. In extreme cases, these incidents have evolved into hate, discrimination, and bullying, and even materialized into real-world threats and attacks against individuals or groups. In this paper, we study the Gamergate controversy. Started in August 2014 in the online gaming world, it quickly spread across various social networking platforms, ultimately leading to many incidents of cyberbullying and cyberaggression. We focus on Twitter, presenting a measurement study of a dataset of 340k unique users and 1.6M tweets to study the properties of these users, the content they post, and how they differ from random Twitter users. We find that users involved in this "Twitter war" tend to have more friends and followers, are generally more engaged and post tweets with negative sentiment, less joy, and more hate than random users. We also perform preliminary measurements on how the Twitter suspension mechanism deals with such abusive behaviors. While we focus on Gamergate, our methodology to collect and analyze tweets related to aggressive and bullying activities is of independent interest.
[ { "version": "v1", "created": "Fri, 24 Feb 2017 22:14:30 GMT" } ]
2017-02-28T00:00:00
[ [ "Chatzakou", "Despoina", "" ], [ "Kourtellis", "Nicolas", "" ], [ "Blackburn", "Jeremy", "" ], [ "De Cristofaro", "Emiliano", "" ], [ "Stringhini", "Gianluca", "" ], [ "Vakali", "Athena", "" ] ]
new_dataset
0.99773
1702.07831
Bocong Chen
Bocong Chen, Hongwei Liu
New constructions of MDS codes with complementary duals
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear complementary-dual (LCD for short) codes are linear codes that intersect with their duals trivially. LCD codes have been used in certain communication systems. It is recently found that LCD codes can be applied in cryptography. This application of LCD codes renewed the interest in the construction of LCD codes having a large minimum distance. MDS codes are optimal in the sense that the minimum distance cannot be improved for given length and code size. Constructing LCD MDS codes is thus of significance in theory and practice. Recently, Jin (\cite{Jin}, IEEE Trans. Inf. Theory, 2016) constructed several classes of LCD MDS codes through generalized Reed-Solomon codes. In this paper, a different approach is proposed to obtain new LCD MDS codes from generalized Reed-Solomon codes. Consequently, new code constructions are provided and certain previously known results in \cite{Jin} are extended.
[ { "version": "v1", "created": "Sat, 25 Feb 2017 03:48:40 GMT" } ]
2017-02-28T00:00:00
[ [ "Chen", "Bocong", "" ], [ "Liu", "Hongwei", "" ] ]
new_dataset
0.999269
1702.07946
Erik Rye
Erik Rye, Robert Beverly
SDN as Active Measurement Infrastructure
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Active measurements are integral to the operation and management of networks, and invaluable to supporting empirical network research. Unfortunately, it is often cost-prohibitive and logistically difficult to widely deploy measurement nodes, especially in the core. In this work, we consider the feasibility of tightly integrating measurement within the infrastructure by using Software Defined Networks (SDNs). We introduce "SDN as Active Measurement Infrastructure" (SAAMI) to enable measurements to originate from any location where SDN is deployed, removing the need for dedicated measurement nodes and increasing vantage point diversity. We implement ping and traceroute using SAAMI, as well as a proof-of-concept custom measurement protocol to demonstrate the power and ease of SAAMI's open framework. Via a large-scale measurement campaign using SDN switches as vantage points, we show that SAAMI is accurate, scalable, and extensible.
[ { "version": "v1", "created": "Sat, 25 Feb 2017 21:01:28 GMT" } ]
2017-02-28T00:00:00
[ [ "Rye", "Erik", "" ], [ "Beverly", "Robert", "" ] ]
new_dataset
0.979434
1702.07951
Wolfgang Mauerer
Florian Murr and Wolfgang Mauerer
McFSM: Globally Taming Complex Systems
To appear in SEsCPS@ICSE2017
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Industrial computing devices, in particular cyber-physical, real-time and safety-critical systems, focus on reacting to external events and the need to cooperate with other devices to create a functional system. They are often implemented with languages that focus on a simple, local description of how a component reacts to external input data and stimuli. Despite the trend in modern software architectures to structure systems into largely independent components, the remaining interdependencies still create rich behavioural dynamics even for small systems. Standard and industrial programming approaches do usually not model or extensively describe the global properties of an entire system. Although a large number of approaches to solve this dilemma have been suggested, it remains a hard and error-prone task to implement systems with complex interdependencies correctly. We introduce multiple coupled finite state machines (McFSMs), a novel mechanism that allows us to model and manage such interdependencies. It is based on a consistent, well-structured and simple global description. A sound theoretical foundation is provided, and associated tools allow us to generate efficient low-level code in various programming languages using model-driven techniques. We also present a domain specific language to express McFSMs and their connections to other systems, to model their dynamic behaviour, and to investigate their efficiency and correctness at compile-time.
[ { "version": "v1", "created": "Sat, 25 Feb 2017 21:35:56 GMT" } ]
2017-02-28T00:00:00
[ [ "Murr", "Florian", "" ], [ "Mauerer", "Wolfgang", "" ] ]
new_dataset
0.997242
1702.07960
Qiang Wu
Xingchen Li, Qiang Wu, Nan Zhang
Citation personal display: A case study of personal websites by physicists in 11 well-known universities
25 pages, 4 figures, Journal of Documentation, 2017
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper aims to investigate the extent to which researchers display citation, and wants to examine whether there are researcher differences in citation personal display at the level of university, country, and academic rank. Physicists in 11 well-known universities in USA, Britain, and China were chosen as the object of study. It was manually identified if physicists had mentioned citation counts, citation-based indices, or a link to Google Scholar Citations (GSC) on the personal websites. A chi-square test is constructed to test researcher differences in citation personal display. Results showed that the overall proportion of citation personal display is not high (14.8%), with 129 of 870 physicists displaying citation. And physicists from different well-known universities indeed had a significant difference in citation personal display. Moreover, at the national level, it was noticed that physicists in well-known Chinese universities had the highest level of citation personal display, followed by Britain and the USA. Further, this study also found that researchers who had the academic rank of professor had the highest citation personal display. In addition, the differences in h-index personal display by university, country or academic rank were analyzed, and the results showed that they were not statistically significant.
[ { "version": "v1", "created": "Sun, 26 Feb 2017 00:46:11 GMT" } ]
2017-02-28T00:00:00
[ [ "Li", "Xingchen", "" ], [ "Wu", "Qiang", "" ], [ "Zhang", "Nan", "" ] ]
new_dataset
0.972056
1702.08006
Arthur-Jozsef Molnar
Arthur-Jozsef Molnar, J\"urgen Gro{\ss}mann
CRSTIP - An Assessment Scheme for Security Assessment Processes
IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2014
null
10.1109/ISSREW.2014.16
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex networked systems are an integral part of today's support infrastructures. Due to their importance, these systems become more and more the target for cyber-attacks, suffering a notable number of security incidents. Also, they are subject to regulation by national and international legislation. An operator of such an infrastructure or system is responsible for ensuring its security and correct functioning in order to satisfy customers. In addition, the entire process of risk and quality control needs to be efficient and manageable. This short paper introduces the Compliance, Risk Assessment and Security Testing Improvement Profiling (CRSTIP) scheme. CRSTIP is an evaluation scheme that enables assessing the maturity of security assessment processes, taking into consideration systematic use of formalisms, integration and tool-support in the areas of compliance assessment, security risk assessment and security testing. The paper describes the elements of the scheme and their application to one of the case studies of the RASEN research project.
[ { "version": "v1", "created": "Sun, 26 Feb 2017 09:10:06 GMT" } ]
2017-02-28T00:00:00
[ [ "Molnar", "Arthur-Jozsef", "" ], [ "Großmann", "Jürgen", "" ] ]
new_dataset
0.997159
1702.08008
Arthur-Jozsef Molnar
Arthur-Jozsef Molnar
JETracer - A Framework for Java GUI Event Tracing
Proceedings of ENASE 2015, ISBN: 978-989-758-100-7
null
10.5220/0005372902070214
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present paper introduces the open-source Java Event Tracer (JETracer) framework for real-time tracing of GUI events within applications based on the AWT, Swing or SWT graphical toolkits. Our framework provides a common event model for supported toolkits, the possibility of receiving GUI events in real-time, good performance in the case of complex target applications and the possibility of deployment over a network. The present paper provides the rationale for JETracer, presents related research and details its technical implementation. An empirical evaluation where JETracer is used to trace GUI events within five popular, open-source applications is also presented.
[ { "version": "v1", "created": "Sun, 26 Feb 2017 09:28:55 GMT" } ]
2017-02-28T00:00:00
[ [ "Molnar", "Arthur-Jozsef", "" ] ]
new_dataset
0.998274
1702.08042
Caetano Sauer
Caetano Sauer, Goetz Graefe, Theo H\"arder
Instant restore after a media failure
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Media failures usually leave database systems unavailable for several hours until recovery is complete, especially in applications with large devices and high transaction volume. Previous work introduced a technique called single-pass restore, which increases restore bandwidth and thus substantially decreases time to repair. Instant restore goes further as it permits read/write access to any data on a device undergoing restore--even data not yet restored--by restoring individual data segments on demand. Thus, the restore process is guided primarily by the needs of applications, and the observed mean time to repair is effectively reduced from several hours to a few seconds. This paper presents an implementation and evaluation of instant restore. The technique is incrementally implemented on a system starting with the traditional ARIES design for logging and recovery. Experiments show that the transaction latency perceived after a media failure can be cut down to less than a second and that the overhead imposed by the technique on normal processing is minimal. The net effect is that a few "nines" of availability are added to the system using simple and low-overhead software techniques.
[ { "version": "v1", "created": "Sun, 26 Feb 2017 14:58:04 GMT" } ]
2017-02-28T00:00:00
[ [ "Sauer", "Caetano", "" ], [ "Graefe", "Goetz", "" ], [ "Härder", "Theo", "" ] ]
new_dataset
0.997866
1702.08104
Mike Eichhorn
Mike Eichhorn, Christopher D. Williams, Ralf Bachmayer, Brad de Young
A Mission Planning System for the AUV "SLOCUM Glider" for the Newfoundland and Labrador Shelf
9 pages, 13 figures, OCEANS 2010 IEEE - Sydney, 24-27 May 2010
null
10.1109/OCEANSSYD.2010.5603919
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a system for mission planning for an autonomous underwater vehicle in time-varying ocean currents. The mission planning system is designed for the AUV "SLOCUM Glider" to collect oceanographic data along the Newfoundland and Labrador Shelf. The data will be used in conjunction with a numerical ocean model currently under development by the Department of Fisheries and Oceans Canada. This allows for the validation and the modification of existing ocean current and climate models as well as the design of new models with the aim of improving the accuracy of forecasts. The use of the ocean current forecast data in netCDF format in an ocean current model, the algorithms which consider glider-specific behaviour, details of the program's technical implementation in C++, and, preliminary results will be described.
[ { "version": "v1", "created": "Sun, 26 Feb 2017 22:38:50 GMT" } ]
2017-02-28T00:00:00
[ [ "Eichhorn", "Mike", "" ], [ "Williams", "Christopher D.", "" ], [ "Bachmayer", "Ralf", "" ], [ "de Young", "Brad", "" ] ]
new_dataset
0.996645
1702.08112
Chuong Nguyen
Chuong V Nguyen, Jurgen Fripp, David R Lovell, Robert Furbank, Peter Kuffner, Helen Daily, Xavier Sirault
3D Scanning System for Automatic High-Resolution Plant Phenotyping
8 papes, DICTA 2016
In Digital Image Computing: Techniques and Applications (DICTA), 2016 International Conference on, pp. 1-8. IEEE, 2016
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Thin leaves, fine stems, self-occlusion, non-rigid and slowly changing structures make plants difficult for three-dimensional (3D) scanning and reconstruction -- two critical steps in automated visual phenotyping. Many current solutions such as laser scanning, structured light, and multiview stereo can struggle to acquire usable 3D models because of limitations in scanning resolution and calibration accuracy. In response, we have developed a fast, low-cost, 3D scanning platform to image plants on a rotating stage with two tilting DSLR cameras centred on the plant. This uses new methods of camera calibration and background removal to achieve high-accuracy 3D reconstruction. We assessed the system's accuracy using a 3D visual hull reconstruction algorithm applied on 2 plastic models of dicotyledonous plants, 2 sorghum plants and 2 wheat plants across different sets of tilt angles. Scan times ranged from 3 minutes (to capture 72 images using 2 tilt angles), to 30 minutes (to capture 360 images using 10 tilt angles). The leaf lengths, widths, areas and perimeters of the plastic models were measured manually and compared to measurements from the scanning system: results were within 3-4% of each other. The 3D reconstructions obtained with the scanning system show excellent geometric agreement with all six plant specimens, even plants with thin leaves and fine stems.
[ { "version": "v1", "created": "Sun, 26 Feb 2017 23:52:00 GMT" } ]
2017-02-28T00:00:00
[ [ "Nguyen", "Chuong V", "" ], [ "Fripp", "Jurgen", "" ], [ "Lovell", "David R", "" ], [ "Furbank", "Robert", "" ], [ "Kuffner", "Peter", "" ], [ "Daily", "Helen", "" ], [ "Sirault", "Xavier", "" ] ]
new_dataset
0.993988
1702.08164
Reza Malekian Ph.D.
Babedi. B. Letswamotse, Kgotlaetsile. M. Modieginyane, Reza Malekian
SDN Based QoS Provision in WSN Technologies
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Sensor Networks (WSNs) have rapidly progressed over the years, they are now applied in health care systems, home automation, security surveillance, disaster management and more. With this rapid growth in the number of users and applications leading to WSNs becoming increasingly complex, this growth makes high demands on WSNs to provide the requirements of every user and application that uses them. They have recently been envisioned to be integrated into Internet of Things (IoT), their role will be to provide sensing services to the ever increasing community of internet users. However even with so much potential, WSNs still experience issues in node deployment, fault tolerance, scalability and Quality of Service (QoS) provisioning amongst others. In this paper we propose to improve QoS provisioning by introducing Software Defined principles into WSN technologies.
[ { "version": "v1", "created": "Mon, 27 Feb 2017 07:14:40 GMT" } ]
2017-02-28T00:00:00
[ [ "Letswamotse", "Babedi. B.", "" ], [ "Modieginyane", "Kgotlaetsile. M.", "" ], [ "Malekian", "Reza", "" ] ]
new_dataset
0.99769
1702.08208
Jakub Breier
Jakub Breier and Wei He
Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA
12 pages, 4 figures
Proceedings of the 2015 International Workshop on Secure Internet of Things (SIoT), pp. 58-64
10.1109/SIOT.2015.15
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet of Things connects lots of small constrained devices to the Internet. As in any other environment, communication security is important and cryptographic algorithms are one of many elements that we use in order to keep messages secure. Because of the constrained nature of these environments, it is necessary to use algorithms that do not require high computational power. Lightweight ciphers are therefore ideal candidates for this purpose. In this paper, we explore a possibility of attacking an ultra-lightweight cipher PRESENT by using a multiple fault attack. Utilizing the Differential Fault Analysis technique, we were able to recover the secret key with two faulty encryptions and an exhaustive search of 2^16 remaining key bits. Our attack aims at four nibbles in the penultimate round of the cipher, causing faulty output in all nibbles of the output. We also provide a practical attack scenario by exploiting Hardware Trojan (HT) technique for the proposed fault injection in a Xilinx Spartan-6 FPGA.
[ { "version": "v1", "created": "Mon, 27 Feb 2017 09:52:23 GMT" } ]
2017-02-28T00:00:00
[ [ "Breier", "Jakub", "" ], [ "He", "Wei", "" ] ]
new_dataset
0.996505
1702.08225
Pedro A. Garc\'ia-S\'anchez
J. I. Farr\'an, P. A. Garc\'ia-S\'anchez, B. A. Heredia
On the second Feng-Rao distance of Algebraic Geometry codes related to Arf semigroups
null
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the second (generalized) Feng-Rao distance for elements in an Arf numerical semigroup that are greater than or equal to the conductor of the semigroup. This provides a lower bound for the second Hamming weight for one point AG codes. In particular, we can obtain the second Feng-Rao distance for the codes defined by asymptotically good towers of function fields whose Weierstrass semigroups are inductive. In addition, we compute the second Feng-Rao number, and provide some examples and comparisons with previous results on this topic. These calculations rely on Ap\'{e}ry sets, and thus several results concerning Ap\'ery sets of Arf semigroups are presented.
[ { "version": "v1", "created": "Mon, 27 Feb 2017 10:50:46 GMT" } ]
2017-02-28T00:00:00
[ [ "Farrán", "J. I.", "" ], [ "García-Sánchez", "P. A.", "" ], [ "Heredia", "B. A.", "" ] ]
new_dataset
0.991548
1702.08291
Steffen Staab
Wendy Hall, Jim Hendler, Steffen Staab
A Manifesto for Web Science @ 10
4 pages
null
null
null
cs.CY
http://creativecommons.org/licenses/by-nc-sa/4.0/
Twenty-seven years ago, one of the biggest societal changes in human history began slowly when the technical foundations for the World Wide Web were defined by Tim Berners-Lee. Ever since, the Web has grown exponentially, reaching far beyond its original technical foundations and deeply affecting the world today - and even more so the society of the future. We have seen that the Web can influence the realization of human rights and even the pursuit of happiness. The Web provides an infrastructure to help us to learn, to work, to communicate with loved ones, and to provide entertainment. However, it also creates an environment affected by the digital divide between those who have and those who do not have access. Additionally, the Web provides challenges we must understand if we are to find a viable balance between data ownership and privacy protection, between over-whelming surveillance and the prevention of terrorism. For the Web to succeed, we need to understand its societal challenges including increased crime, the impact of social platforms and socio-economic discrimination, and we must work towards fairness, social inclusion, and open governance. Ten Yars ago, the field of Web Science was created to explore the science underlying the Web from a socio-technical perspective including its mathematical properties, engineering principles, and social impacts. Ten years later, we are learning much as the interdisciplinary endeavor to understand the Web's global information space continues to grow. In this article we want to elicit the major lessons we have learned through Web Science and make some cautious predictions of what to expect next.
[ { "version": "v1", "created": "Mon, 27 Feb 2017 14:08:42 GMT" } ]
2017-02-28T00:00:00
[ [ "Hall", "Wendy", "" ], [ "Hendler", "Jim", "" ], [ "Staab", "Steffen", "" ] ]
new_dataset
0.972396
1606.05487
Renzo Andri
Renzo Andri and Lukas Cavigelli and Davide Rossi and Luca Benini
YodaNN: An Architecture for Ultra-Low Power Binary-Weight CNN Acceleration
null
null
null
null
cs.AR cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Convolutional neural networks (CNNs) have revolutionized the world of computer vision over the last few years, pushing image classification beyond human accuracy. The computational effort of today's CNNs requires power-hungry parallel processors or GP-GPUs. Recent developments in CNN accelerators for system-on-chip integration have reduced energy consumption significantly. Unfortunately, even these highly optimized devices are above the power envelope imposed by mobile and deeply embedded applications and face hard limitations caused by CNN weight I/O and storage. This prevents the adoption of CNNs in future ultra-low power Internet of Things end-nodes for near-sensor analytics. Recent algorithmic and theoretical advancements enable competitive classification accuracy even when limiting CNNs to binary (+1/-1) weights during training. These new findings bring major optimization opportunities in the arithmetic core by removing the need for expensive multiplications, as well as reducing I/O bandwidth and storage. In this work, we present an accelerator optimized for binary-weight CNNs that achieves 1510 GOp/s at 1.2 V on a core area of only 1.33 MGE (Million Gate Equivalent) or 0.19 mm$^2$ and with a power dissipation of 895 {\mu}W in UMC 65 nm technology at 0.6 V. Our accelerator significantly outperforms the state-of-the-art in terms of energy and area efficiency achieving 61.2 TOp/s/[email protected] V and 1135 GOp/s/[email protected] V, respectively.
[ { "version": "v1", "created": "Fri, 17 Jun 2016 11:48:29 GMT" }, { "version": "v2", "created": "Mon, 13 Feb 2017 11:00:58 GMT" }, { "version": "v3", "created": "Thu, 16 Feb 2017 10:54:26 GMT" }, { "version": "v4", "created": "Fri, 24 Feb 2017 08:46:12 GMT" } ]
2017-02-27T00:00:00
[ [ "Andri", "Renzo", "" ], [ "Cavigelli", "Lukas", "" ], [ "Rossi", "Davide", "" ], [ "Benini", "Luca", "" ] ]
new_dataset
0.99136
1611.00459
Adam Noel
Adam Noel, Andrew W. Eckford
Asynchronous Peak Detection for Demodulation in Molecular Communication
6 pages, 1 table, 5 figures. To be presented at the IEEE International Conference on Communications (IEEE ICC 2017) in May 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Molecular communication requires low-complexity symbol detection algorithms to deal with the many sources of uncertainty that are inherent in these channels. This paper proposes two variants of a high-performance asynchronous peak detection algorithm for a receiver that makes independent observations. The first variant has low complexity and measures the largest observation within a sampling interval. The second variant adds decision feedback to mitigate inter-symbol interference. Although the algorithm does not require synchronization between the transmitter and receiver, results demonstrate that the bit error performance of symbol-by-symbol detection using the first variant is better than using a single sample whose sampling time is chosen a priori. The second variant is shown to have performance comparable to that of an energy detector. Both variants of the algorithm demonstrate better resilience to timing offsets than that of existing detectors.
[ { "version": "v1", "created": "Wed, 2 Nov 2016 03:13:42 GMT" }, { "version": "v2", "created": "Fri, 24 Feb 2017 17:45:09 GMT" } ]
2017-02-27T00:00:00
[ [ "Noel", "Adam", "" ], [ "Eckford", "Andrew W.", "" ] ]
new_dataset
0.961152
1701.00948
Gabriele Fici
Gabriele Fici, Filippo Mignosi, Jeffrey Shallit
Abelian-Square-Rich Words
To appear in Theoretical Computer Science. Corrected a flaw in the proof of Proposition 7
null
10.1016/j.tcs.2017.02.012
null
cs.DM cs.FL math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An abelian square is the concatenation of two words that are anagrams of one another. A word of length $n$ can contain at most $\Theta(n^2)$ distinct factors, and there exist words of length $n$ containing $\Theta(n^2)$ distinct abelian-square factors, that is, distinct factors that are abelian squares. This motivates us to study infinite words such that the number of distinct abelian-square factors of length $n$ grows quadratically with $n$. More precisely, we say that an infinite word $w$ is {\it abelian-square-rich} if, for every $n$, every factor of $w$ of length $n$ contains, on average, a number of distinct abelian-square factors that is quadratic in $n$; and {\it uniformly abelian-square-rich} if every factor of $w$ contains a number of distinct abelian-square factors that is proportional to the square of its length. Of course, if a word is uniformly abelian-square-rich, then it is abelian-square-rich, but we show that the converse is not true in general. We prove that the Thue-Morse word is uniformly abelian-square-rich and that the function counting the number of distinct abelian-square factors of length $2n$ of the Thue-Morse word is $2$-regular. As for Sturmian words, we prove that a Sturmian word $s_{\alpha}$ of angle $\alpha$ is uniformly abelian-square-rich if and only if the irrational $\alpha$ has bounded partial quotients, that is, if and only if $s_{\alpha}$ has bounded exponent.
[ { "version": "v1", "created": "Wed, 4 Jan 2017 10:16:30 GMT" }, { "version": "v2", "created": "Mon, 13 Feb 2017 16:02:50 GMT" }, { "version": "v3", "created": "Fri, 24 Feb 2017 17:14:54 GMT" } ]
2017-02-27T00:00:00
[ [ "Fici", "Gabriele", "" ], [ "Mignosi", "Filippo", "" ], [ "Shallit", "Jeffrey", "" ] ]
new_dataset
0.997568
1702.07470
Rajarshi Ray
Rajarshi Ray, Arup Deka, Kamalika Datta
Exact Synthesis of Reversible Logic Circuits using Model Checking
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Synthesis of reversible logic circuits has gained great atten- tion during the last decade. Various synthesis techniques have been pro- posed, some generate optimal solutions (in gate count) and are termed as exact, while others are scalable in the sense that they can handle larger functions but generate sub-optimal solutions. Although scalable synthe- sis is very much essential for circuit design, exact synthesis is also of great importance as it helps in building design library for the synthesis of larger functions. In this paper, we propose an exact synthesis technique for re- versible circuits using model checking. We frame the synthesis problem as a model checking instance and propose an iterative bounded model checking calls for an optimal synthesis. Experiments on reversible logic benchmarks shows successful synthesis of optimal circuits. We also illus- trate optimal synthesis of random functions with as many as 10 variables and up to 10 gates.
[ { "version": "v1", "created": "Fri, 24 Feb 2017 06:02:16 GMT" } ]
2017-02-27T00:00:00
[ [ "Ray", "Rajarshi", "" ], [ "Deka", "Arup", "" ], [ "Datta", "Kamalika", "" ] ]
new_dataset
0.998607
1702.07475
Fei Han
Fei Han, Xue Yang, Yu Zhang, Hao Zhang
Sequence-based Multimodal Apprenticeship Learning For Robot Perception and Decision Making
8 pages, 6 figures, accepted by ICRA'17
null
null
null
cs.RO cs.AI cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Apprenticeship learning has recently attracted a wide attention due to its capability of allowing robots to learn physical tasks directly from demonstrations provided by human experts. Most previous techniques assumed that the state space is known a priori or employed simple state representations that usually suffer from perceptual aliasing. Different from previous research, we propose a novel approach named Sequence-based Multimodal Apprenticeship Learning (SMAL), which is capable to simultaneously fusing temporal information and multimodal data, and to integrate robot perception with decision making. To evaluate the SMAL approach, experiments are performed using both simulations and real-world robots in the challenging search and rescue scenarios. The empirical study has validated that our SMAL approach can effectively learn plans for robots to make decisions using sequence of multimodal observations. Experimental results have also showed that SMAL outperforms the baseline methods using individual images.
[ { "version": "v1", "created": "Fri, 24 Feb 2017 06:37:06 GMT" } ]
2017-02-27T00:00:00
[ [ "Han", "Fei", "" ], [ "Yang", "Xue", "" ], [ "Zhang", "Yu", "" ], [ "Zhang", "Hao", "" ] ]
new_dataset
0.985889
1702.07589
Benjamin L\'ev\^eque
Benjamin L\'ev\^eque
Generalization of Schnyder woods to orientable surfaces and applications
200 pages, Habilitation manuscript
null
null
null
cs.DM cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Schnyder woods are particularly elegant combinatorial structures with numerous applications concerning planar triangulations and more generally 3-connected planar maps. We propose a simple generalization of Schnyder woods from the plane to maps on orientable surfaces of any genus with a special emphasis on the toroidal case. We provide a natural partition of the set of Schnyder woods of a given map into distributive lattices depending on the surface homology. In the toroidal case we show the existence of particular Schnyder woods with some global properties that are useful for optimal encoding or graph drawing purpose.
[ { "version": "v1", "created": "Fri, 24 Feb 2017 14:06:31 GMT" } ]
2017-02-27T00:00:00
[ [ "Lévêque", "Benjamin", "" ] ]
new_dataset
0.97205
1702.07657
Richard Barton
Richard J. Barton
Capacity of the Aperture-Constrained AWGN Free-Space Communication Channel
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we derive upper and lower bounds as well as a simple closed-form approximation for the capacity of the continuous-time, bandlimited, additive white Gaussian noise channel in a three-dimensional free-space electromagnetic propagation environment subject to constraints on the total effective antenna aperture area of the link and a total transmitter power constraint. We assume that the communication range is much larger than the radius of the sphere containing the antennas at both ends of the link, and we show that, in general, the capacity can only be achieved by transmitting multiple spatially-multiplexed data streams simultaneously over the channel. Furthermore, the lower bound on capacity can be approached asymptotically by transmitting the data streams between a pair of physically-realizable distributed antenna arrays at either end of the link. A consequence of this result is that, in general, communication at close to the maximum achievable data rate on a deep-space communication link can be achieved in practice if and only if the communication system utilizes spatial multiplexing over a distributed MIMO antenna array. Such an approach to deep-space communication does not appear to be envisioned currently by any of the international space agencies or any commercial space companies. A second consequence is that the capacity of a long-range free-space communication link, if properly utilized, grows asymptotically as a function of the square root of the received SNR rather than only logarithmically in the received SNR.
[ { "version": "v1", "created": "Fri, 24 Feb 2017 16:44:11 GMT" } ]
2017-02-27T00:00:00
[ [ "Barton", "Richard J.", "" ] ]
new_dataset
0.963939
1702.07670
Amirali Aghazadeh
Amirali Aghazadeh and Mohammad Golbabaee and Andrew S. Lan and Richard G. Baraniuk
Insense: Incoherent Sensor Selection for Sparse Signals
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sensor selection refers to the problem of intelligently selecting a small subset of a collection of available sensors to reduce the sensing cost while preserving signal acquisition performance. The majority of sensor selection algorithms find the subset of sensors that best recovers an arbitrary signal from a number of linear measurements that is larger than the dimension of the signal. In this paper, we develop a new sensor selection algorithm for sparse (or near sparse) signals that finds a subset of sensors that best recovers such signals from a number of measurements that is much smaller than the dimension of the signal. Existing sensor selection algorithms cannot be applied in such situations. Our proposed Incoherent Sensor Selection (Insense) algorithm minimizes a coherence-based cost function that is adapted from recent results in sparse recovery theory. Using six datasets, including two real-world datasets on microbial diagnostics and structural health monitoring, we demonstrate the superior performance of Insense for sparse-signal sensor selection.
[ { "version": "v1", "created": "Thu, 16 Feb 2017 16:42:23 GMT" } ]
2017-02-27T00:00:00
[ [ "Aghazadeh", "Amirali", "" ], [ "Golbabaee", "Mohammad", "" ], [ "Lan", "Andrew S.", "" ], [ "Baraniuk", "Richard G.", "" ] ]
new_dataset
0.993584
1702.06915
Ferdinando Fioretto Ferdinando Fioretto
Ferdinando Fioretto and Agostino Dovier and Enrico Pontelli and William Yeoh and Roie Zivan
Solving DCOPs with Distributed Large Neighborhood Search
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The field of Distributed Constraint Optimization has gained momentum in recent years, thanks to its ability to address various applications related to multi-agent cooperation. Nevertheless, solving Distributed Constraint Optimization Problems (DCOPs) optimally is NP-hard. Therefore, in large-scale, complex applications, incomplete DCOP algorithms are necessary. Current incomplete DCOP algorithms suffer of one or more of the following limitations: they (a) find local minima without providing quality guarantees; (b) provide loose quality assessment; or (c) are unable to benefit from the structure of the problem, such as domain-dependent knowledge and hard constraints. Therefore, capitalizing on strategies from the centralized constraint solving community, we propose a Distributed Large Neighborhood Search (D-LNS) framework to solve DCOPs. The proposed framework (with its novel repair phase) provides guarantees on solution quality, refining upper and lower bounds during the iterative process, and can exploit domain-dependent structures. Our experimental results show that D-LNS outperforms other incomplete DCOP algorithms on both structured and unstructured problem instances.
[ { "version": "v1", "created": "Wed, 22 Feb 2017 17:54:23 GMT" }, { "version": "v2", "created": "Thu, 23 Feb 2017 01:21:38 GMT" } ]
2017-02-24T00:00:00
[ [ "Fioretto", "Ferdinando", "" ], [ "Dovier", "Agostino", "" ], [ "Pontelli", "Enrico", "" ], [ "Yeoh", "William", "" ], [ "Zivan", "Roie", "" ] ]
new_dataset
0.994255
1702.06970
William Kluegel
William Kluegel, Muhammad Aamir Iqbal, Ferdinando Fioretto, William Yeoh, and Enrico Pontelli
A Realistic Dataset for the Smart Home Device Scheduling Problem for DCOPs
15 pages, OPTMAS17
null
null
null
cs.AI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The field of Distributed Constraint Optimization has gained momentum in recent years thanks to its ability to address various applications related to multi-agent cooperation. While techniques to solve Distributed Constraint Optimization Problems (DCOPs) are abundant and have matured substantially since the field inception, the number of DCOP realistic applications and benchmark used to asses the performance of DCOP algorithms is lagging behind. To contrast this background we (i) introduce the Smart Home Device Scheduling (SHDS) problem, which describe the problem of coordinating smart devices schedules across multiple homes as a multi-agent system, (ii) detail the physical models adopted to simulate smart sensors, smart actuators, and homes environments, and (iii) introduce a DCOP realistic benchmark for SHDS problems.
[ { "version": "v1", "created": "Wed, 22 Feb 2017 19:10:30 GMT" } ]
2017-02-24T00:00:00
[ [ "Kluegel", "William", "" ], [ "Iqbal", "Muhammad Aamir", "" ], [ "Fioretto", "Ferdinando", "" ], [ "Yeoh", "William", "" ], [ "Pontelli", "Enrico", "" ] ]
new_dataset
0.999727
1702.06973
Arthur-Jozsef Molnar
Arthur-Jozsef Molnar
jSET - The Java Software Evolution Tracker
null
Proceedings of the International Conference on Knowledge Engineering, Principles and Techniques (KEPT 2011), Cluj-Napoca, 2011, pages 25-35
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces the Java Software Evolution Tracker, a visualization and analysis tool that provides practitioners the means to examine the evolution of a software system from a top to bottom perspective, starting with changes in the graphical user interface all the way to source code modifications.
[ { "version": "v1", "created": "Wed, 22 Feb 2017 19:23:33 GMT" } ]
2017-02-24T00:00:00
[ [ "Molnar", "Arthur-Jozsef", "" ] ]
new_dataset
0.999735
1702.07071
Vladimir Vargas-Calder\'on
Keith Y. Patarroyo and Vladimir Vargas-Calder\'on
Pronunciation recognition of English phonemes /\textipa{@}/, /{\ae}/, /\textipa{A}:/ and /\textipa{2}/ using Formants and Mel Frequency Cepstral Coefficients
11 pages, pre-print version
null
null
null
cs.CL cs.SD
http://creativecommons.org/licenses/by/4.0/
The Vocal Joystick Vowel Corpus, by Washington University, was used to study monophthongs pronounced by native English speakers. The objective of this study was to quantitatively measure the extent at which speech recognition methods can distinguish between similar sounding vowels. In particular, the phonemes /\textipa{@}/, /{\ae}/, /\textipa{A}:/ and /\textipa{2}/ were analysed. 748 sound files from the corpus were used and subjected to Linear Predictive Coding (LPC) to compute their formants, and to Mel Frequency Cepstral Coefficients (MFCC) algorithm, to compute the cepstral coefficients. A Decision Tree Classifier was used to build a predictive model that learnt the patterns of the two first formants measured in the data set, as well as the patterns of the 13 cepstral coefficients. An accuracy of 70\% was achieved using formants for the mentioned phonemes. For the MFCC analysis an accuracy of 52 \% was achieved and an accuracy of 71\% when /\textipa{@}/ was ignored. The results obtained show that the studied algorithms are far from mimicking the ability of distinguishing subtle differences in sounds like human hearing does.
[ { "version": "v1", "created": "Thu, 23 Feb 2017 02:31:03 GMT" } ]
2017-02-24T00:00:00
[ [ "Patarroyo", "Keith Y.", "" ], [ "Vargas-Calderón", "Vladimir", "" ] ]
new_dataset
0.986017
1702.07124
Tatsuya Mori Dr.
Seita Maruyama, Satohiro Wakabayashi, Tatsuya Mori
Trojan of Things: Embedding Malicious NFC Tags into Common Objects
21 pages, 19 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel proof-of-concept attack named Trojan of Things (ToT), which aims to attack NFC- enabled mobile devices such as smartphones. The key idea of ToT attacks is to covertly embed maliciously programmed NFC tags into common objects routinely encountered in daily life such as banknotes, clothing, or furniture, which are not considered as NFC touchpoints. To fully explore the threat of ToT, we develop two striking techniques named ToT device and Phantom touch generator. These techniques enable an attacker to carry out various severe and sophisticated attacks unbeknownst to the device owner who unintentionally puts the device close to a ToT. We discuss the feasibility of the attack as well as the possible countermeasures against the threats of ToT attacks.
[ { "version": "v1", "created": "Thu, 23 Feb 2017 07:57:23 GMT" } ]
2017-02-24T00:00:00
[ [ "Maruyama", "Seita", "" ], [ "Wakabayashi", "Satohiro", "" ], [ "Mori", "Tatsuya", "" ] ]
new_dataset
0.999613
1702.07160
Ertugrul Basar
Ertugrul Basar, Ibrahim Altunbas
Space-Time Channel Modulation
Accepted for publication in IEEE Transactions on Vehicular Technology
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce the concept of space-time channel modulation (STCM), which extends the classical space-time block codes into a new third dimension: channel states (transmission media) dimension. Three novel STCM schemes, which provide interesting trade-offs among decoding complexity, error performance and data rate, are proposed. It is shown via computer simulations that the proposed STCM schemes achieve considerably better error performance than the existing media-based modulation (MBM) and classical systems.
[ { "version": "v1", "created": "Thu, 23 Feb 2017 10:15:12 GMT" } ]
2017-02-24T00:00:00
[ [ "Basar", "Ertugrul", "" ], [ "Altunbas", "Ibrahim", "" ] ]
new_dataset
0.996242
1702.07187
Stefano Buzzi
Stefano Buzzi and Carmen D'Andrea
Massive MIMO 5G Cellular Networks: mm-wave vs. \mu-wave Frequencies
Invited paper; to appear on the ZTE Communications special issue on 5G New Radio
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Enhanced mobile broadband (eMBB) is one of the key use-cases for the development of the new standard 5G New Radio for the next generation of mobile wireless networks. Large-scale antenna arrays, a.k.a. Massive MIMO, the usage of carrier frequencies in the range 10-100 GHz, the so-called millimeter wave (mm-wave) band, and the network densification with the introduction of small-sized cells are the three technologies that will permit implementing eMBB services and realizing the Gbit/s mobile wireless experience. This paper is focused on the massive MIMO technology; initially conceived for conventional cellular frequencies in the sub-6 GHz range (\mu-wave), the massive MIMO concept has been then progressively extended to the case in which mm-wave frequencies are used. However, due to different propagation mechanisms in urban scenarios, the resulting MIMO channel models at \mu-wave and mm-wave are radically different. Six key basic differences are pinpointed in this paper, along with the implications that they have on the architecture and algorithms of the communication transceivers and on the attainable performance in terms of reliability and multiplexing capabilities.
[ { "version": "v1", "created": "Thu, 23 Feb 2017 12:01:25 GMT" } ]
2017-02-24T00:00:00
[ [ "Buzzi", "Stefano", "" ], [ "D'Andrea", "Carmen", "" ] ]
new_dataset
0.995107
1702.07223
Prasanna Karthik Vairam
Gnanambikai Krishnakumar, Patanjali SLPSK, Prasanna Karthik Vairam, Chester Rebeiro
GANDALF: A fine-grained hardware-software co-design for preventing memory attacks
5 Pages, 2 figures, Winning entry of CSAW Embedded Security Challenge 2016, Not published elsewhere
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reading or writing outside the bounds of a buffer is a serious security vulnerability that has been exploited in numerous occasions. These attacks can be prevented by ensuring that every buffer is only accessed within its specified bounds. In this paper we present Gandalf, a compiler-assisted hardware extension for the OpenRISC processor that thwarts all forms of memory based attacks including buffer overflows and over-reads.The feature associates lightweight base and bound capabilities to all pointer variables, which are checked at run time by the hardware. Gandalf is transparent to the user and does not require significant OS modifications. Moreover, it achieves locality, thus resulting in small performance penalties.
[ { "version": "v1", "created": "Thu, 23 Feb 2017 14:24:49 GMT" } ]
2017-02-24T00:00:00
[ [ "Krishnakumar", "Gnanambikai", "" ], [ "SLPSK", "Patanjali", "" ], [ "Vairam", "Prasanna Karthik", "" ], [ "Rebeiro", "Chester", "" ] ]
new_dataset
0.999033
1702.07265
Kai Wan
Kai Wan, Daniela Tuninetti, Pablo Piantanida
A Novel Index Coding Scheme and its Application to Coded Caching
ITA 2017
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a novel achievable scheme for the index problem and applies it to the caching problem. Index coding and caching are noiseless broadcast channel problems where receivers have message side information.In the index coding problem the side information sets are fixed, while in the caching problem the side information sets correspond the cache contents, which are under the control of the system designer. The proposed index coding scheme, based on distributed source coding and non-unique decoding,is shown to strictly enlarge the rate region achievable by composite coding.The novel index coding scheme applied to the caching problem is then shown to match an outer bound (previously proposed by the authors and also based on known results for the index coding problem) under the assumption of uncoded cache placement/prefetching.
[ { "version": "v1", "created": "Thu, 23 Feb 2017 15:52:39 GMT" } ]
2017-02-24T00:00:00
[ [ "Wan", "Kai", "" ], [ "Tuninetti", "Daniela", "" ], [ "Piantanida", "Pablo", "" ] ]
new_dataset
0.997426
1702.04814
Zhezhi He
Zhezhi He, Shaahin Angizi and Deliang Fan
Current Induced Dynamics of Multiple Skyrmions with Domain Wall Pair and Skyrmion-based Majority Gate Design
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As an intriguing ultra-small particle-like magnetic texture, skyrmion has attracted lots of research interests in next-generation ultra-dense and low power magnetic memory/logic designs. Previous studies have demonstrated a single skyrmion-domain wall pair collision in a specially designed magnetic racetrack junction. In this work, we investigate the dynamics of multiple skyrmions with domain wall pair in a magnetic racetrack. The numerical micromagnetic simulation results indicate that the domain wall pair could be pinned or depinned by the rectangular notch pinning site depending on both the number of skyrmions in the racetrack and the magnitude of driving current density. Such emergent dynamical property could be used to implement a threshold-tunable step function, in which the inputs are skyrmions and threshold could be tuned by the driving current density. The threshold-tunable step function is widely used in logic and neural network applications. We also present a three-input skyrmion-based majority logic gate design to demonstrate the potential application of such dynamic interaction of multiple skyrmions and domain wall pair.
[ { "version": "v1", "created": "Wed, 15 Feb 2017 23:11:38 GMT" }, { "version": "v2", "created": "Wed, 22 Feb 2017 16:07:05 GMT" } ]
2017-02-23T00:00:00
[ [ "He", "Zhezhi", "" ], [ "Angizi", "Shaahin", "" ], [ "Fan", "Deliang", "" ] ]
new_dataset
0.999193
1702.06569
Johan P. Hansen
Johan P. Hansen
Toric Codes, Multiplicative Structure and Decoding
8 pages
null
null
null
cs.IT math.AG math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Long linear codes constructed from toric varieties over finite fields, their multiplicative structure and decoding. The main theme is the inherent multiplicative structure on toric codes. The multiplicative structure allows for \emph{decoding}, resembling the decoding of Reed-Solomon codes and aligns with decoding by error correcting pairs. We have used the multiplicative structure on toric codes to construct linear secret sharing schemes with \emph{strong multiplication} via Massey's construction generalizing the Shamir Linear secret sharing shemes constructed from Reed-Solomon codes. We have constructed quantum error correcting codes from toric surfaces by the Calderbank-Shor-Steane method.
[ { "version": "v1", "created": "Mon, 20 Feb 2017 10:31:28 GMT" } ]
2017-02-23T00:00:00
[ [ "Hansen", "Johan P.", "" ] ]
new_dataset
0.99296
1702.06875
Arman Cohan
Arman Cohan, Sydney Young, Andrew Yates, Nazli Goharian
Triaging Content Severity in Online Mental Health Forums
Accepted for publication in Journal of the Association for Information Science and Technology (2017)
null
10.1002/asi.23865
null
cs.CL cs.IR cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mental health forums are online communities where people express their issues and seek help from moderators and other users. In such forums, there are often posts with severe content indicating that the user is in acute distress and there is a risk of attempted self-harm. Moderators need to respond to these severe posts in a timely manner to prevent potential self-harm. However, the large volume of daily posted content makes it difficult for the moderators to locate and respond to these critical posts. We present a framework for triaging user content into four severity categories which are defined based on indications of self-harm ideation. Our models are based on a feature-rich classification framework which includes lexical, psycholinguistic, contextual and topic modeling features. Our approaches improve the state of the art in triaging the content severity in mental health forums by large margins (up to 17% improvement over the F-1 scores). Using the proposed model, we analyze the mental state of users and we show that overall, long-term users of the forum demonstrate a decreased severity of risk over time. Our analysis on the interaction of the moderators with the users further indicates that without an automatic way to identify critical content, it is indeed challenging for the moderators to provide timely response to the users in need.
[ { "version": "v1", "created": "Wed, 22 Feb 2017 16:14:12 GMT" } ]
2017-02-23T00:00:00
[ [ "Cohan", "Arman", "" ], [ "Young", "Sydney", "" ], [ "Yates", "Andrew", "" ], [ "Goharian", "Nazli", "" ] ]
new_dataset
0.98123
1702.06902
Chuchu Fan
Chuchu Fan, Bolun Qi, Sayan Mitra and Mahesh Viswanathan
DRYVR:Data-driven verification and compositional reasoning for automotive systems
25 pages, 3 figures
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the DRYVR framework for verifying hybrid control systems that are described by a combination of a black-box simulator for trajectories and a white-box transition graph specifying mode switches. The framework includes (a) a probabilistic algorithm for learning sensitivity of the continuous trajectories from simulation data, (b) a bounded reachability analysis algorithm that uses the learned sensitivity, and (c) reasoning techniques based on simulation relations and sequential composition, that enable verification of complex systems under long switching sequences, from the reachability analysis of a simpler system under shorter sequences. We demonstrate the utility of the framework by verifying a suite of automotive benchmarks that include powertrain control, automatic transmission, and several autonomous and ADAS features like automatic emergency braking, lane-merge, and auto-passing controllers.
[ { "version": "v1", "created": "Wed, 22 Feb 2017 17:26:24 GMT" } ]
2017-02-23T00:00:00
[ [ "Fan", "Chuchu", "" ], [ "Qi", "Bolun", "" ], [ "Mitra", "Sayan", "" ], [ "Viswanathan", "Mahesh", "" ] ]
new_dataset
0.998838
1509.06397
David Hallac
David Hallac, Christopher Wong, Steven Diamond, Abhijit Sharang, Rok Sosic, Stephen Boyd, Jure Leskovec
SnapVX: A Network-Based Convex Optimization Solver
null
null
null
null
cs.SI cs.MS math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SnapVX is a high-performance Python solver for convex optimization problems defined on networks. For these problems, it provides a fast and scalable solution with guaranteed global convergence. SnapVX combines the capabilities of two open source software packages: Snap.py and CVXPY. Snap.py is a large scale graph processing library, and CVXPY provides a general modeling framework for small-scale subproblems. SnapVX offers a customizable yet easy-to-use interface with out-of-the-box functionality. Based on the Alternating Direction Method of Multipliers (ADMM), it is able to efficiently store, analyze, and solve large optimization problems from a variety of different applications. Documentation, examples, and more can be found on the SnapVX website at http://snap.stanford.edu/snapvx.
[ { "version": "v1", "created": "Mon, 21 Sep 2015 20:44:12 GMT" }, { "version": "v2", "created": "Tue, 21 Feb 2017 05:50:05 GMT" } ]
2017-02-22T00:00:00
[ [ "Hallac", "David", "" ], [ "Wong", "Christopher", "" ], [ "Diamond", "Steven", "" ], [ "Sharang", "Abhijit", "" ], [ "Sosic", "Rok", "" ], [ "Boyd", "Stephen", "" ], [ "Leskovec", "Jure", "" ] ]
new_dataset
0.993747
1608.02670
Cunsheng Ding
Shuxing Li, Chengju Li, Cunsheng Ding, Hao Liu
Parameters of two classes of LCD BCH codes
This is a merged version of arXiv:1608.02169v1 [cs.IT] and arXiv:1608.02670v1 [cs.IT]
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Historically, LCD cyclic codes were referred to as reversible cyclic codes, which had application in data storage. Due to a newly discovered application in cryptography, there has been renewed interest on LCD codes. In this paper, we explore two special families of LCD cyclic codes, which are both BCH codes. The dimensions and the minimum distances of these LCD BCH codes are investigated. As a byproduct, the parameters of some primitive BCH codes are also obtained.
[ { "version": "v1", "created": "Tue, 9 Aug 2016 01:03:11 GMT" }, { "version": "v2", "created": "Tue, 21 Feb 2017 12:36:12 GMT" } ]
2017-02-22T00:00:00
[ [ "Li", "Shuxing", "" ], [ "Li", "Chengju", "" ], [ "Ding", "Cunsheng", "" ], [ "Liu", "Hao", "" ] ]
new_dataset
0.969394
1609.01951
Haoran Yu
Haoran Yu and Man Hon Cheung and Lin Gao and Jianwei Huang
Public Wi-Fi Monetization via Advertising
18 pages
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proliferation of public Wi-Fi hotspots has brought new business potentials for Wi-Fi networks, which carry a significant amount of global mobile data traffic today. In this paper, we propose a novel Wi-Fi monetization model for venue owners (VOs) deploying public Wi-Fi hotspots, where the VOs can generate revenue by providing two different Wi-Fi access schemes for mobile users (MUs): (i) the premium access, in which MUs directly pay VOs for their Wi-Fi usage, and (ii) the advertising sponsored access, in which MUs watch advertisements in exchange of the free usage of Wi-Fi. VOs sell their ad spaces to advertisers (ADs) via an ad platform, and share the ADs' payments with the ad platform. We formulate the economic interactions among the ad platform, VOs, MUs, and ADs as a three-stage Stackelberg game. In Stage I, the ad platform announces its advertising revenue sharing policy. In Stage II, VOs determine the Wi-Fi prices (for MUs) and advertising prices (for ADs). In Stage III, MUs make access choices and ADs purchase advertising spaces. We analyze the sub-game perfect equilibrium (SPE) of the proposed game systematically, and our analysis shows the following useful observations. First, the ad platform's advertising revenue sharing policy in Stage I will affect only the VOs' Wi-Fi prices but not the VOs' advertising prices in Stage II. Second, both the VOs' Wi-Fi prices and advertising prices are non-decreasing in the advertising concentration level and non-increasing in the MU visiting frequency. Numerical results further show that the VOs are capable of generating large revenues through mainly providing one type of Wi-Fi access (the premium access or advertising sponsored access), depending on their advertising concentration levels and MU visiting frequencies.
[ { "version": "v1", "created": "Wed, 7 Sep 2016 12:07:07 GMT" }, { "version": "v2", "created": "Tue, 3 Jan 2017 07:22:30 GMT" }, { "version": "v3", "created": "Tue, 21 Feb 2017 13:15:05 GMT" } ]
2017-02-22T00:00:00
[ [ "Yu", "Haoran", "" ], [ "Cheung", "Man Hon", "" ], [ "Gao", "Lin", "" ], [ "Huang", "Jianwei", "" ] ]
new_dataset
0.991117
1610.07229
O-Joung Kwon
Eun Jung Kim and O-joung Kwon
A Polynomial Kernel for Distance-Hereditary Vertex Deletion
37 pages, 6 figures; improved previous kernel size to O(k^{30} polylogk)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph is distance-hereditary if for any pair of vertices, their distance in every connected induced subgraph containing both vertices is the same as their distance in the original graph. The Distance-Hereditary Vertex Deletion problem asks, given a graph $G$ on $n$ vertices and an integer $k$, whether there is a set $S$ of at most $k$ vertices in $G$ such that $G-S$ is distance-hereditary. This problem is important due to its connection to the graph parameter rank-width that distance-hereditary graphs are exactly graphs of rank-width at most $1$. Eiben, Ganian, and Kwon (MFCS' 16) proved that Distance-Hereditary Vertex Deletion can be solved in time $2^{\mathcal{O}(k)}n^{\mathcal{O}(1)}$, and asked whether it admits a polynomial kernelization. We show that this problem admits a polynomial kernel, answering this question positively. For this, we use a similar idea for obtaining an approximate solution for Chordal Vertex Deletion due to Jansen and Pilipczuk (SODA' 17) to obtain an approximate solution with $\mathcal{O}(k^3\log n)$ vertices when the problem is a YES-instance, and we exploit the structure of split decompositions of distance-hereditary graphs to reduce the total size.
[ { "version": "v1", "created": "Sun, 23 Oct 2016 20:30:28 GMT" }, { "version": "v2", "created": "Wed, 26 Oct 2016 08:28:18 GMT" }, { "version": "v3", "created": "Mon, 20 Feb 2017 21:37:09 GMT" } ]
2017-02-22T00:00:00
[ [ "Kim", "Eun Jung", "" ], [ "Kwon", "O-joung", "" ] ]
new_dataset
0.968502
1701.07553
Jekan Thangavelautham
Himangshu Kalita, Ravi Teja Nallapu, Andrew Warren and Jekan Thangavelautham
Guidance, Navigation and Control of Multirobot Systems in Cooperative Cliff Climbing
14 pages, 13 figures in Proceedings of the 40th Annual AAS Guidance, Navigation and Control Conference, 2017
null
null
null
cs.RO astro-ph.IM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The application of GNC devices on small robots is a game-changer that enables these robots to be mobile on low-gravity planetary surfaces and small bodies. Use of reaction wheels enables these robots to roll, hop, summersault and rest on precarious/sloped surfaces that would otherwise not be possible with conven-tional wheeled robots. We are extending this technology to enable robots to climb off-world canyons, cliffs and caves. A single robot may slip and fall, however, a multirobot system can work cooperatively by being interlinked using spring-tethers and work much like a team of mountaineers to systematically climb a slope. A multirobot system as we will show in this paper can climb sur-faces not possible with a single robot alone. We consider a team of four robots that are interlinked with tethers in an 'x' configuration. Each robot secures itself to a slope using spiny gripping actuators, and one by one each robot moves up-wards by crawling, rolling or hopping up the slope. If any one of the robots loses grip, slips or falls, the remaining robots will be holding it up as they are anchored. This distributed controls approach to cliff climbing enables the system to reconfigure itself where possible and avoid getting stuck at one hard to reach location. Instead, the risk is distributed and through close cooperation, the robots can identify multiple trajectories to climb a cliff or rugged surface. The benefits can also be realized on milligravity surfaces such as asteroids. Too fast a jump can result in the robot flying off the surface into space. Having multiple robots anchored to the surface keeps the entire system secure. Our work combines dynamics and control simulation to evaluate the feasibility of our approach. The simulation results show a promising pathway towards advanced development of this technology on a team of real robots.
[ { "version": "v1", "created": "Thu, 26 Jan 2017 02:36:41 GMT" }, { "version": "v2", "created": "Tue, 31 Jan 2017 16:19:13 GMT" }, { "version": "v3", "created": "Tue, 21 Feb 2017 13:05:11 GMT" } ]
2017-02-22T00:00:00
[ [ "Kalita", "Himangshu", "" ], [ "Nallapu", "Ravi Teja", "" ], [ "Warren", "Andrew", "" ], [ "Thangavelautham", "Jekan", "" ] ]
new_dataset
0.977754
1702.00335
Jekan Thangavelautham
Ravi teja Nallapu, Erik Asphaug, Jekan Thangavelautham
Control of a Bucket-Wheel for Surface Mining of Asteroids and Small-Bodies
8 pages, 7 figures in 40th AAS Conference on Guidance, Navigation and Control
null
null
null
cs.SY astro-ph.IM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Near Earth Asteroids (NEAs) are thought to contain a wealth of resources, including water, iron, titanium, nickel, platinum and silicates. Future space missions that can exploit these resources by performing In-Situ Resource Utilization (ISRU) gain substantial benefit in terms of range, payload capacity and mission flexibility. Compared to the Moon or Mars, the milligravity on some asteroids demands a fraction of the energy for digging and accessing hydrated regolith just below the surface. However, asteroids and small-bodies, because of their low gravity present a major challenge in landing, surface excavation and resource capture. These challenges have resulted in adoption of a "touch and go techniques", like the upcoming Osiris-rex sample-return mission. Previous asteroid excavation efforts have focused on discrete capture events (an extension of sampling technology) or whole-asteroid capture and processing. This paper analyzes the control of a bucket-wheel design for asteroid or small-body excavation. Our study focuses on system design of two counter rotating bucket-wheels that are attached to a hovering spacecraft. Regolith is excavated and heated to 1000 C to extract water. The water in turn is electrolyzed to produce hydrogen and oxygen for rocket fuel. We analyze control techniques to maximize traction of the bucket-wheels on the asteroid surface and minimize lift-off the surface, together with methods to dig deeper into the asteroid surface. Our studies combine analytical models, with simulation and hardware testing. For initial evaluation of material-spacecraft dynamics and mechanics, we assume lunar-like regolith for bulk density, particle size and cohesion. Our early studies point towards a promising pathway towards refinement of this technology for demonstration aboard a future space mission.
[ { "version": "v1", "created": "Wed, 1 Feb 2017 16:14:51 GMT" }, { "version": "v2", "created": "Tue, 21 Feb 2017 13:05:20 GMT" } ]
2017-02-22T00:00:00
[ [ "Nallapu", "Ravi teja", "" ], [ "Asphaug", "Erik", "" ], [ "Thangavelautham", "Jekan", "" ] ]
new_dataset
0.999364
1702.06119
Ameya Patil
Ameya D. Patil, Sasikanth Manipatruni, Dmitri Nikonov, Ian A. Young, Naresh R. Shanbhag
Shannon-inspired Statistical Computing to Enable Spintronics
null
null
null
null
cs.ET
http://creativecommons.org/licenses/by/4.0/
Modern computing systems based on the von Neumann architecture are built from silicon complementary metal oxide semiconductor (CMOS) transistors that need to operate under practically error free conditions with 1 error in $10^{15}$ switching events. The physical dimensions of CMOS transistors have scaled down over the past five decades leading to exponential increases in functional density and energy consumption. Today, the energy and delay reductions from scaling have stagnated, motivating the search for a CMOS replacement. Of these, spintronics offers a path for enhancing the functional density and scaling the energy down to fundamental thermodynamic limits of 100kT to 1000kT. However, spintronic devices exhibit high error rates of 1 in 10 or more when operating at these limits, rendering them incompatible with deterministic nature of the von Neumann architecture. We show that a Shannon-inspired statistical computing framework can be leveraged to design a computer made from such stochastic spintronic logic gates to provide a computational accuracy close to that of a deterministic computer. This extraordinary result allowing a $10^{13}$ fold relaxation in acceptable error rates is obtained by engineering the error distribution coupled with statistical error compensation.
[ { "version": "v1", "created": "Mon, 20 Feb 2017 04:11:56 GMT" } ]
2017-02-22T00:00:00
[ [ "Patil", "Ameya D.", "" ], [ "Manipatruni", "Sasikanth", "" ], [ "Nikonov", "Dmitri", "" ], [ "Young", "Ian A.", "" ], [ "Shanbhag", "Naresh R.", "" ] ]
new_dataset
0.988153
1702.06318
Ferda Ofli
Ferda Ofli, Yusuf Aytar, Ingmar Weber, Raggi al Hammouri, Antonio Torralba
Is Saki #delicious? The Food Perception Gap on Instagram and Its Relation to Health
This is a pre-print of our paper accepted to appear in the Proceedings of 2017 International World Wide Web Conference (WWW'17)
null
null
null
cs.CY cs.CV cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Food is an integral part of our life and what and how much we eat crucially affects our health. Our food choices largely depend on how we perceive certain characteristics of food, such as whether it is healthy, delicious or if it qualifies as a salad. But these perceptions differ from person to person and one person's "single lettuce leaf" might be another person's "side salad". Studying how food is perceived in relation to what it actually is typically involves a laboratory setup. Here we propose to use recent advances in image recognition to tackle this problem. Concretely, we use data for 1.9 million images from Instagram from the US to look at systematic differences in how a machine would objectively label an image compared to how a human subjectively does. We show that this difference, which we call the "perception gap", relates to a number of health outcomes observed at the county level. To the best of our knowledge, this is the first time that image recognition is being used to study the "misalignment" of how people describe food images vs. what they actually depict.
[ { "version": "v1", "created": "Tue, 21 Feb 2017 10:36:28 GMT" } ]
2017-02-22T00:00:00
[ [ "Ofli", "Ferda", "" ], [ "Aytar", "Yusuf", "" ], [ "Weber", "Ingmar", "" ], [ "Hammouri", "Raggi al", "" ], [ "Torralba", "Antonio", "" ] ]
new_dataset
0.99281
1702.06384
Wolfgang John
Wolfgang John, Andr\'as Kern, Mario Kind, Pontus Sk\"oldstr\"om, Dimitri Staessens, Hagen Woesner
Splitarchitecture: SDN for the carrier domain
Pre-print of article published in IEEE Communications Magazine vol. 52, no. 10, pp. 146-152, October 2014
IEEE Communications Magazine (Volume: 52, Issue: 10, October 2014)
10.1109/MCOM.2014.6917416
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The concept of SDN has emerged as a way to address numerous challenges with traditional network architectures by decoupling network control and forwarding. So far, the use cases for SDN mainly targeted data-center applications. This article considers SDN for network carriers, facing operation of large-scale networks with millions of customers, multiple technologies, and high availability demands. With specific carrier-grade features such as scalability, reliability, flexibility, modularity, and virtualization in mind, the SPARC EU project has developed the SPARC SplitArchitecture concept. The SplitArchitecture control plane allows hierarchical layering of several control plane layers which can be flexibly mapped to data plane layers. Between control layers open interfaces are used. Furthermore, SplitArchitecture proposes an additional split of forwarding and processing functions in data path elements, enabling switch based OAM functionality and handling of tunneling techniques. The SplitArchitecture concept is evaluated in a prototype demonstrating an SDN version of BRAS: the floating BRAS. The floating BRAS allows creation of residential Internet access services with dynamically managed BRAS instances. The demo is based on a controller enabling protected MPLS transport connections spanning SDN-controlled aggregation and IP/MPLS-based core domains. The prototype showcases how SplitArchitecture enables virtualization of service nodes in an SDN-controlled network, leading to increased flexibility in configuration and placement of service creation functions. Overall, the results show that it is technically and economically beneficial to apply SDN, and specifically the SplitArchitecture concept, to the carrier domain.
[ { "version": "v1", "created": "Tue, 21 Feb 2017 13:56:01 GMT" } ]
2017-02-22T00:00:00
[ [ "John", "Wolfgang", "" ], [ "Kern", "András", "" ], [ "Kind", "Mario", "" ], [ "Sköldström", "Pontus", "" ], [ "Staessens", "Dimitri", "" ], [ "Woesner", "Hagen", "" ] ]
new_dataset
0.997581
1702.06387
Wolfgang John
Wolfgang John, Guido Marchetto, Felici\'an N\'emeth, Pontus Sk\"oldstr\"om, Rebecca Steinert, Catalin Meirosu, Ioanna Papafili, Kostas Pentikousis
Service Provider DevOps
Pre-print of article published in IEEE Communications Magazine, vol. 55, no. 1, pp. 204-211, January 2017
IEEE Communications Magazine (Volume: 55, Issue: 1, January 2017)
10.1109/MCOM.2017.1500803CM
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although there is consensus that software defined networking and network functions virtualization overhaul service provisioning and deployment, the community still lacks a definite answer on how carrier-grade operations praxis needs to evolve. This article presents what lies beyond the first evolutionary steps in network management, identifies the challenges in service verification, observability, and troubleshooting, and explains how to address them using our Service Provider DevOps (SP-DevOps) framework. We compendiously cover the entire process from design goals to tool realization and employ an elastic version of an industry-standard use case to show how on-the-fly verification, software-defined monitoring, and automated troubleshooting of services reduce the cost of fault management actions. We assess SP-DevOps with respect to key attributes of software-defined telecommunication infrastructures both qualitatively and quantitatively, and demonstrate that SP-DevOps paves the way toward carrier-grade operations and management in the network virtualization era.
[ { "version": "v1", "created": "Tue, 21 Feb 2017 13:59:48 GMT" } ]
2017-02-22T00:00:00
[ [ "John", "Wolfgang", "" ], [ "Marchetto", "Guido", "" ], [ "Németh", "Felicián", "" ], [ "Sköldström", "Pontus", "" ], [ "Steinert", "Rebecca", "" ], [ "Meirosu", "Catalin", "" ], [ "Papafili", "Ioanna", "" ], [ "Pentikousis", "Kostas", "" ] ]
new_dataset
0.966948
1604.08845
Li Wei Ph.D
Li Wei, Wangdong Qi
Closed-form, robust and accurate multi-frequency phase unwrapping: frequency design and algorithm
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A closed-form algorithm, named "concerto", is proposed for phase-based distance estimation in multi-frequency phase unwrapping (MFPU) system. The concerto method consists of three coherent estimation stages,i.e., initial modified BW estimation, residual error estimation and LS estimation , each of which has a closed-form expression and cooperates closely with each other like a concerto. Due to a specially designed frequency pattern, concerto is reliable, accurate, and computationally simple. Meanwhile, measurement frequency selection is an easier task. Performance comparisons with beat wavelength (BW), excess fractions (EF) and Chinese remainder theorem (CRT) method confirm that our method outperforms these methods both in accuracy and reliability and can asymptotically achieve the Cramer-Rao bound (CRB).
[ { "version": "v1", "created": "Fri, 29 Apr 2016 14:18:28 GMT" }, { "version": "v2", "created": "Sat, 18 Feb 2017 13:07:09 GMT" } ]
2017-02-21T00:00:00
[ [ "Wei", "Li", "" ], [ "Qi", "Wangdong", "" ] ]
new_dataset
0.99905
1608.07955
Yangqi Huang
Yangqi Huang, Wang Kang, Xichao Zhang, Yan Zhou and Weisheng Zhao
Magnetic skyrmion-based synaptic devices
null
Nanotechnology 28, 08LT02 (2017)
10.1088/1361-6528/aa5838
null
cs.ET cond-mat.str-el cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Magnetic skyrmions are promising candidates for next-generation information carriers, owing to their small size, topological stability, and ultralow depinning current density. A wide variety of skyrmionic device concepts and prototypes have been proposed, highlighting their potential applications. Here, we report on a bioinspired skyrmionic device with synaptic plasticity. The synaptic weight of the proposed device can be strengthened/weakened by positive/negative stimuli, mimicking the potentiation/depression process of a biological synapse. Both short-term plasticity(STP) and long-term potentiation(LTP) functionalities have been demonstrated for a spiking time-dependent plasticity(STDP) scheme. This proposal suggests new possibilities for synaptic devices for use in spiking neuromorphic computing applications.
[ { "version": "v1", "created": "Mon, 29 Aug 2016 09:05:28 GMT" } ]
2017-02-21T00:00:00
[ [ "Huang", "Yangqi", "" ], [ "Kang", "Wang", "" ], [ "Zhang", "Xichao", "" ], [ "Zhou", "Yan", "" ], [ "Zhao", "Weisheng", "" ] ]
new_dataset
0.999417
1702.05528
Osama A. Hanna
Osama A. Hanna, Amr El-Keyi and Mohammed Nafie
Degrees of Freedom in Cached MIMO Relay Networks With Multiple Base Stations
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability of physical layer relay caching to increase the degrees of freedom (DoF) of a single cell was recently illustrated. In this paper, we extend this result to the case of multiple cells in which a caching relay is shared among multiple non-cooperative base stations (BSs). In particular, we show that a large DoF gain can be achieved by exploiting the benefits of having a shared relay that cooperates with the BSs. We first propose a cache-assisted relaying protocol that improves the cooperation opportunity between the BSs and the relay. Next, we consider the cache content placement problem that aims to design the cache content at the relay such that the DoF gain is maximized. We propose an optimal algorithm and a near-optimal low-complexity algorithm for the cache content placement problem. Simulation results show significant improvement in the DoF gain using the proposed relay-caching protocol.
[ { "version": "v1", "created": "Fri, 17 Feb 2017 21:51:33 GMT" } ]
2017-02-21T00:00:00
[ [ "Hanna", "Osama A.", "" ], [ "El-Keyi", "Amr", "" ], [ "Nafie", "Mohammed", "" ] ]
new_dataset
0.95709
1702.05547
Benjamin Hellouin de Menibus
Diego Maldonado, Anah\'i Gajardo, Benjamin Hellouin de Menibus, Andr\'es Moreira
Nontrivial Turmites are Turing-universal
19 pages, submitted to Theoretical Computer Science
null
null
null
cs.CC nlin.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Turmit is a Turing machine that works over a two-dimensional grid, that is, an agent that moves, reads and writes symbols over the cells of the grid. Its state is an arrow and, depending on the symbol that it reads, it turns to the left or to the right, switching the symbol at the same time. Several symbols are admitted, and the rule is specified by the turning sense that the machine has over each symbol. Turmites are a generalization of Langtons ant, and they present very complex and diverse behaviors. We prove that any Turmite, except for those whose rule does not depend on the symbol, can simulate any Turing Machine. We also prove the P-completeness of prediction their future behavior by explicitly giving a log-space reduction from the Topological Circuit Value Problem. A similar result was already established for Langtons ant; here we use a similar technique but prove a stronger notion of simulation, and for a more general family.
[ { "version": "v1", "created": "Sat, 18 Feb 2017 00:19:02 GMT" } ]
2017-02-21T00:00:00
[ [ "Maldonado", "Diego", "" ], [ "Gajardo", "Anahí", "" ], [ "de Menibus", "Benjamin Hellouin", "" ], [ "Moreira", "Andrés", "" ] ]
new_dataset
0.999612
1702.05552
Tharindu Fernando
Tharindu Fernando, Simon Denman, Sridha Sridharan and Clinton Fookes
Soft + Hardwired Attention: An LSTM Framework for Human Trajectory Prediction and Abnormal Event Detection
null
null
null
null
cs.CV cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As humans we possess an intuitive ability for navigation which we master through years of practice; however existing approaches to model this trait for diverse tasks including monitoring pedestrian flow and detecting abnormal events have been limited by using a variety of hand-crafted features. Recent research in the area of deep-learning has demonstrated the power of learning features directly from the data; and related research in recurrent neural networks has shown exemplary results in sequence-to-sequence problems such as neural machine translation and neural image caption generation. Motivated by these approaches, we propose a novel method to predict the future motion of a pedestrian given a short history of their, and their neighbours, past behaviour. The novelty of the proposed method is the combined attention model which utilises both "soft attention" as well as "hard-wired" attention in order to map the trajectory information from the local neighbourhood to the future positions of the pedestrian of interest. We illustrate how a simple approximation of attention weights (i.e hard-wired) can be merged together with soft attention weights in order to make our model applicable for challenging real world scenarios with hundreds of neighbours. The navigational capability of the proposed method is tested on two challenging publicly available surveillance databases where our model outperforms the current-state-of-the-art methods. Additionally, we illustrate how the proposed architecture can be directly applied for the task of abnormal event detection without handcrafting the features.
[ { "version": "v1", "created": "Sat, 18 Feb 2017 01:08:18 GMT" } ]
2017-02-21T00:00:00
[ [ "Fernando", "Tharindu", "" ], [ "Denman", "Simon", "" ], [ "Sridharan", "Sridha", "" ], [ "Fookes", "Clinton", "" ] ]
new_dataset
0.988448
1702.05564
Angus Galloway
Angus Galloway, Graham W. Taylor, Aaron Ramsay, Medhat Moussa
The Ciona17 Dataset for Semantic Segmentation of Invasive Species in a Marine Aquaculture Environment
Submitted to the Conference on Computer and Robot Vision (CRV) 2017
null
10.5683/SP/NTUOK9
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An original dataset for semantic segmentation, Ciona17, is introduced, which to the best of the authors' knowledge, is the first dataset of its kind with pixel-level annotations pertaining to invasive species in a marine environment. Diverse outdoor illumination, a range of object shapes, colour, and severe occlusion provide a significant real world challenge for the computer vision community. An accompanying ground-truthing tool for superpixel labeling, Truth and Crop, is also introduced. Finally, we provide a baseline using a variant of Fully Convolutional Networks, and report results in terms of the standard mean intersection over union (mIoU) metric.
[ { "version": "v1", "created": "Sat, 18 Feb 2017 03:40:33 GMT" } ]
2017-02-21T00:00:00
[ [ "Galloway", "Angus", "" ], [ "Taylor", "Graham W.", "" ], [ "Ramsay", "Aaron", "" ], [ "Moussa", "Medhat", "" ] ]
new_dataset
0.999848
1702.05591
Lucas Carvalho Cordeiro
Lennon Chaves, Iury Bessa, Lucas Cordeiro, Daniel Kroening, Eddie Filho
Verifying Digital Systems with MATLAB
4 pages
null
null
null
cs.SY cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A MATLAB toolbox is presented, with the goal of checking occurrences of design errors typically found in fixed-point digital systems, considering finite word-length effects. In particular, the present toolbox works as a front-end to a recently introduced verification tool, known as Digital-System Verifier, and checks overflow, limit cycle, quantization, stability, and minimum phase errors, in digital systems represented by transfer-function and state-space equations. It provides a command-line version, with simplified access to specific functions, and a graphical-user interface, which was developed as a MATLAB application. The resulting toolbox is important for the verification community, since it shows the applicability of verification to real-world systems.
[ { "version": "v1", "created": "Sat, 18 Feb 2017 09:52:02 GMT" } ]
2017-02-21T00:00:00
[ [ "Chaves", "Lennon", "" ], [ "Bessa", "Iury", "" ], [ "Cordeiro", "Lucas", "" ], [ "Kroening", "Daniel", "" ], [ "Filho", "Eddie", "" ] ]
new_dataset
0.990754