id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1702.05638
|
Martin Potthast
|
Martin Potthast, Johannes Kiesel, Kevin Reinartz, Janek Bevendorff,
Benno Stein
|
A Stylometric Inquiry into Hyperpartisan and Fake News
|
10 pages, 3 figures, 6 tables, submitted to ACL 2017
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper reports on a writing style analysis of hyperpartisan (i.e.,
extremely one-sided) news in connection to fake news. It presents a large
corpus of 1,627 articles that were manually fact-checked by professional
journalists from BuzzFeed. The articles originated from 9 well-known political
publishers, 3 each from the mainstream, the hyperpartisan left-wing, and the
hyperpartisan right-wing. In sum, the corpus contains 299 fake news, 97% of
which originated from hyperpartisan publishers.
We propose and demonstrate a new way of assessing style similarity between
text categories via Unmasking---a meta-learning approach originally devised for
authorship verification---, revealing that the style of left-wing and
right-wing news have a lot more in common than any of the two have with the
mainstream. Furthermore, we show that hyperpartisan news can be discriminated
well by its style from the mainstream (F1=0.78), as can be satire from both
(F1=0.81). Unsurprisingly, style-based fake news detection does not live up to
scratch (F1=0.46). Nevertheless, the former results are important to implement
pre-screening for fake news detectors.
|
[
{
"version": "v1",
"created": "Sat, 18 Feb 2017 18:10:04 GMT"
}
] | 2017-02-21T00:00:00 |
[
[
"Potthast",
"Martin",
""
],
[
"Kiesel",
"Johannes",
""
],
[
"Reinartz",
"Kevin",
""
],
[
"Bevendorff",
"Janek",
""
],
[
"Stein",
"Benno",
""
]
] |
new_dataset
| 0.987981 |
1702.05693
|
Shanshan Zhang
|
Shanshan Zhang, Rodrigo Benenson and Bernt Schiele
|
CityPersons: A Diverse Dataset for Pedestrian Detection
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Convnets have enabled significant progress in pedestrian detection recently,
but there are still open questions regarding suitable architectures and
training data. We revisit CNN design and point out key adaptations, enabling
plain FasterRCNN to obtain state-of-the-art results on the Caltech dataset.
To achieve further improvement from more and better data, we introduce
CityPersons, a new set of person annotations on top of the Cityscapes dataset.
The diversity of CityPersons allows us for the first time to train one single
CNN model that generalizes well over multiple benchmarks. Moreover, with
additional training with CityPersons, we obtain top results using FasterRCNN on
Caltech, improving especially for more difficult cases (heavy occlusion and
small scale) and providing higher localization quality.
|
[
{
"version": "v1",
"created": "Sun, 19 Feb 2017 03:01:55 GMT"
}
] | 2017-02-21T00:00:00 |
[
[
"Zhang",
"Shanshan",
""
],
[
"Benenson",
"Rodrigo",
""
],
[
"Schiele",
"Bernt",
""
]
] |
new_dataset
| 0.999395 |
1702.05699
|
ElMouatez Billah Karbab
|
ElMouatez Billah Karbab, Mourad Debbabi, Saed Alrabaee, Djedjiga
Mouheb
|
DySign: Dynamic Fingerprinting for the Automatic Detection of Android
Malware
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The astonishing spread of Android OS, not only in smartphones and tablets but
also in IoT devices, makes this operating system a very tempting target for
malware threats. Indeed, the latter are expanding at a similar rate. In this
respect, malware fingerprints, whether based on cryptographic or fuzzy-hashing,
are the first defense line against such attacks. Fuzzy-hashing fingerprints are
suitable for capturing malware static features. Moreover, they are more
resilient to small changes in the actual static content of malware files. On
the other hand, dynamic analysis is another technique for malware detection
that uses emulation environments to extract behavioral features of Android
malware. However, to the best of our knowledge, there is no such fingerprinting
technique that leverages dynamic analysis and would act as the first defense
against Android malware attacks. In this paper, we address the following
question: could we generate effective fingerprints for Android malware through
dynamic analysis? To this end, we propose DySign, a novel technique for
fingerprinting Android malware's dynamic behaviors. This is achieved through
the generation of a digest from the dynamic analysis of a malware sample on
existing known malware. It is important to mention that: (i) DySign
fingerprints are approximated of the observed behaviors during dynamic analysis
so as to achieve resiliency to small changes in the behaviors of future malware
variants; (ii) Fingerprint computation is agnostic to the analyzed malware
sample or family. DySign leverages state-of-the-art Natural Language Processing
(NLP) techniques to generate the aforementioned fingerprints, which are then
leveraged to build an enhanced Android malware detection system with family
attribution.
|
[
{
"version": "v1",
"created": "Sun, 19 Feb 2017 04:19:11 GMT"
}
] | 2017-02-21T00:00:00 |
[
[
"Karbab",
"ElMouatez Billah",
""
],
[
"Debbabi",
"Mourad",
""
],
[
"Alrabaee",
"Saed",
""
],
[
"Mouheb",
"Djedjiga",
""
]
] |
new_dataset
| 0.998745 |
1702.05723
|
Daniel M\'endez Fern\'andez
|
Marco Kuhrmann and Daniel M\'endez Fern\'andez
|
From Pragmatic to Systematic Software Process Improvement: An Evaluated
Approach
|
IET Software, 2015
| null |
10.1049/iet-sen.2014.0190
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Software processes improvement (SPI) is a challenging task, as many different
stakeholders, project settings, and contexts and goals need to be considered.
SPI projects are often operated in a complex and volatile environment and,
thus, require a sound management that is resource-intensive requiring many
stakeholders to contribute to the process assessment, analysis, design,
realisation, and deployment. Although there exist many valuable SPI approaches,
none address the needs of both process engineers and project managers. This
article presents an Artefact-based Software Process Improvement & Management
approach (ArSPI) that closes this gap. ArSPI was developed and tested across
several SPI projects in large organisations in Germany and Eastern Europe. The
approach further encompasses a template for initiating, performing, and
managing SPI projects by defining a set of 5 key artefacts and 24 support
artefacts. We present ArSPI and discus results of its validation indicating
ArSPI to be a helpful instrument to set up and steer SPI projects.
|
[
{
"version": "v1",
"created": "Sun, 19 Feb 2017 08:43:07 GMT"
}
] | 2017-02-21T00:00:00 |
[
[
"Kuhrmann",
"Marco",
""
],
[
"Fernández",
"Daniel Méndez",
""
]
] |
new_dataset
| 0.981187 |
1702.05833
|
Preeti Kumari
|
Preeti Kumari, Junil Choi, Nuria Gonzalez-Prelcic, and Robert W. Heath
Jr
|
IEEE 802.11ad-based Radar: An Approach to Joint Vehicular
Communication-Radar System
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Millimeter-wave (mmWave) radar is widely used in vehicles for applications
such as adaptive cruise control and collision avoidance. In this paper, we
propose an IEEE 802.11ad-based radar for long-range radar (LRR) applications at
the 60 GHz unlicensed band. We exploit the preamble of a single-carrier (SC)
physical layer (PHY) frame, which consists of Golay complementary sequences
with good correlation properties, as a radar waveform. This system enables a
joint waveform for automotive radar and a potential mmWave vehicular
communication system based on IEEE 802.11ad, allowing hardware reuse. To
formulate an integrated framework of vehicle-to-vehicle (V2V) communication and
LRR based on a mmWave consumer wireless local area network (WLAN) standard, we
make typical assumptions for LRR applications and incorporate the full duplex
radar assumption due to the possibility of sufficient isolation and
self-interference cancellation. We develop single- and multi-frame radar
receiver algorithms for target detection as well as range and velocity
estimation within a coherent processing interval. Our proposed radar processing
algorithms leverage channel estimation and time-frequency synchronization
techniques used in a conventional IEEE 802.11ad receiver with minimal
modifications. Analysis and simulations show that in a single target scenario,
a Gbps data rate is achieved simultaneously with cm-level range accuracy and
cm/s-level velocity accuracy. The target vehicle is detected with a high
probability of detection ($>$99.9$\%$) at a low false alarm of 10$^{-6}$ for an
equivalent isotropically radiated power (EIRP) of 43 dBm up to a vehicle
separation distance of 200 m.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2017 01:58:04 GMT"
}
] | 2017-02-21T00:00:00 |
[
[
"Kumari",
"Preeti",
""
],
[
"Choi",
"Junil",
""
],
[
"Gonzalez-Prelcic",
"Nuria",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] |
new_dataset
| 0.998858 |
1702.05983
|
Weiwei Hu
|
Weiwei Hu and Ying Tan
|
Generating Adversarial Malware Examples for Black-Box Attacks Based on
GAN
| null | null | null | null |
cs.LG cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Machine learning has been used to detect new malware in recent years, while
malware authors have strong motivation to attack such algorithms. Malware
authors usually have no access to the detailed structures and parameters of the
machine learning models used by malware detection systems, and therefore they
can only perform black-box attacks. This paper proposes a generative
adversarial network (GAN) based algorithm named MalGAN to generate adversarial
malware examples, which are able to bypass black-box machine learning based
detection models. MalGAN uses a substitute detector to fit the black-box
malware detection system. A generative network is trained to minimize the
generated adversarial examples' malicious probabilities predicted by the
substitute detector. The superiority of MalGAN over traditional gradient based
adversarial example generation algorithms is that MalGAN is able to decrease
the detection rate to nearly zero and make the retraining based defensive
method against adversarial examples hard to work.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2017 14:32:17 GMT"
}
] | 2017-02-21T00:00:00 |
[
[
"Hu",
"Weiwei",
""
],
[
"Tan",
"Ying",
""
]
] |
new_dataset
| 0.98626 |
1702.06025
|
Saravanan Thirumuruganathan
|
Rade Stanojevic, Sofiane Abbar, Saravanan Thirumuruganathan, Sanjay
Chawla, Fethi Filali, Ahid Aleimat
|
Kharita: Robust Map Inference using Graph Spanners
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The widespread availability of GPS information in everyday devices such as
cars, smartphones and smart watches make it possible to collect large amount of
geospatial trajectory information. A particularly important, yet technically
challenging, application of this data is to identify the underlying road
network and keep it updated under various changes. In this paper, we propose
efficient algorithms that can generate accurate maps in both batch and online
settings. Our algorithms utilize techniques from graph spanners so that they
produce maps can effectively handle a wide variety of road and intersection
shapes. We conduct a rigorous evaluation of our algorithms over two real-world
datasets and under a wide variety of performance metrics. Our experiments show
a significant improvement over prior work. In particular, we observe an
increase in Biagioni f-score of up to 20% when compared to the state of the art
while reducing the execution time by an order of magnitude. We also make our
source code open source for reproducibility and enable other researchers to
build on our work.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2017 15:51:07 GMT"
}
] | 2017-02-21T00:00:00 |
[
[
"Stanojevic",
"Rade",
""
],
[
"Abbar",
"Sofiane",
""
],
[
"Thirumuruganathan",
"Saravanan",
""
],
[
"Chawla",
"Sanjay",
""
],
[
"Filali",
"Fethi",
""
],
[
"Aleimat",
"Ahid",
""
]
] |
new_dataset
| 0.986139 |
1606.01655
|
Andrew Paverd
|
Sandeep Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny
Pinkas, N. Asokan
|
The Circle Game: Scalable Private Membership Test Using Trusted Hardware
|
Extended version of a paper published at ACM ASIACCS 2017
| null |
10.1145/3052973.3053006
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Malware checking is changing from being a local service to a cloud-assisted
one where users' devices query a cloud server, which hosts a dictionary of
malware signatures, to check if particular applications are potentially
malware. Whilst such an architecture gains all the benefits of cloud-based
services, it opens up a major privacy concern since the cloud service can infer
personal traits of the users based on the lists of applications queried by
their devices. Private membership test (PMT) schemes can remove this privacy
concern. However, known PMT schemes do not scale well to a large number of
simultaneous users and high query arrival rates. We propose a simple PMT
approach using a carousel: circling the entire dictionary through trusted
hardware on the cloud server. Users communicate with the trusted hardware via
secure channels. We show how the carousel approach, using different data
structures to represent the dictionary, can be realized on two different
commercial hardware security architectures (ARM TrustZone and Intel SGX). We
highlight subtle aspects of securely implementing seemingly simple PMT schemes
on these architectures. Through extensive experimental analysis, we show that
for the malware checking scenario our carousel approach surprisingly
outperforms Path ORAM on the same hardware by supporting a much higher query
arrival rate while guaranteeing acceptable response latency for individual
queries.
|
[
{
"version": "v1",
"created": "Mon, 6 Jun 2016 08:29:22 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Jun 2016 08:20:13 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Aug 2016 08:44:52 GMT"
},
{
"version": "v4",
"created": "Fri, 17 Feb 2017 15:32:40 GMT"
}
] | 2017-02-20T00:00:00 |
[
[
"Tamrakar",
"Sandeep",
""
],
[
"Liu",
"Jian",
""
],
[
"Paverd",
"Andrew",
""
],
[
"Ekberg",
"Jan-Erik",
""
],
[
"Pinkas",
"Benny",
""
],
[
"Asokan",
"N.",
""
]
] |
new_dataset
| 0.999472 |
1702.04940
|
Karl von Ellenrieder
|
Ivan R. Bertaska and Karl D. von Ellenrieder
|
Supervisory Switching Control of an Unmanned Surface Vehicle
| null |
MTS/IEEE Oceans 2015
| null | null |
cs.SY cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel method to determine the switching of controllers to increase the
performance of a system is presented. Three controllers are utilized to capture
three behaviors representative of unmanned surface vehicles (USVs). An
underactuated nonlinear controller is derived to transit the vehicle between
locations; a fully-actuated nonlinear controller is given to station-keep the
vehicle at a setpoint; and a linear anti-windup controller is presented for the
reversing mode of operation. Given a trajectory to follow, a performance-based
supervisory switching control system (PBSSC) dictates the switching between
controllers to improve system performance. Experimental results are shown that
indicate that the PBSSC system is able to mitigate errors in pose better than
any of the individual controllers.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 12:12:22 GMT"
}
] | 2017-02-20T00:00:00 |
[
[
"Bertaska",
"Ivan R.",
""
],
[
"von Ellenrieder",
"Karl D.",
""
]
] |
new_dataset
| 0.976947 |
1702.04941
|
Karl Von Ellenrieder
|
Edoardo I. Sarda, Huajin Qu, Ivan R. Bertaska and Karl D. von
Ellenrieder
|
Station-keeping control of an unmanned surface vehicle exposed to
current and wind disturbances
| null |
Journal of Ocean Engineering, Volume 127, Pages 305-324, 2016
|
10.1016/j.oceaneng.2016.09.037
| null |
cs.SY cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Field trials of a 4 meter long, 180 kilogram, unmanned surface vehicle (USV)
have been conducted to evaluate the performance of station-keeping heading and
position controllers in an outdoor marine environment disturbed by wind and
current. The USV has a twin hull configuration and a custom-designed propulsion
system, which consists of two azimuthing thrusters, one for each hull.
Nonlinear proportional derivative, backstepping and sliding mode feedback
controllers were tested in winds of about 4-5 knots, with and without wind
feedforward control. The controllers were tested when the longitudinal axis of
the USV was aligned with the mean wind direction and when the longitudinal axis
was perpendicular to the mean wind direction. It was found that the sliding
mode controller performed best overall and that the addition of wind
feedforward control did not significantly improve its effectiveness. However,
wind feedforward control did substantially improve the performance of the
proportional derivative and backstepping controllers when the mean wind
direction was perpendicular to the longitudinal axis of the USV. An analysis of
the length scales present in the power spectrum of the turbulent speed
fluctuations in the wind suggests that a single anemometer is sufficient to
characterize the speed and direction of the wind acting on the USV.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 12:15:36 GMT"
}
] | 2017-02-20T00:00:00 |
[
[
"Sarda",
"Edoardo I.",
""
],
[
"Qu",
"Huajin",
""
],
[
"Bertaska",
"Ivan R.",
""
],
[
"von Ellenrieder",
"Karl D.",
""
]
] |
new_dataset
| 0.999487 |
1702.05183
|
Vincent Jug\'e
|
Patricia Bouyer-Decitre, Vincent Jug\'e, Nicolas Markey
|
Courcelle's Theorem Made Dynamic
|
14 pages, 4 figures. arXiv admin note: text overlap with
arXiv:1610.00571
| null | null | null |
cs.CC cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dynamic complexity is concerned with updating the output of a problem when
the input is slightly changed. We study the dynamic complexity of model
checking a fixed monadic second-order formula over evolving subgraphs of a
fixed maximal graph having bounded tree-width; here the subgraph evolves by
losing or gaining edges (from the maximal graph). We show that this problem is
in DynFO (with LOGSPACE precomputation), via a reduction to a Dyck reachability
problem on an acyclic automaton.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 23:21:34 GMT"
}
] | 2017-02-20T00:00:00 |
[
[
"Bouyer-Decitre",
"Patricia",
""
],
[
"Jugé",
"Vincent",
""
],
[
"Markey",
"Nicolas",
""
]
] |
new_dataset
| 0.997413 |
1702.05241
|
Nils Ole Tippenhauer
|
Naman Govil and Anand Agrawal and Nils Ole Tippenhauer
|
On Ladder Logic Bombs in Industrial Control Systems
|
11 pages, 14 figures, 2 tables, 1 algorithm
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In industrial control systems, devices such as Programmable Logic Controllers
(PLCs) are commonly used to directly interact with sensors and actuators, and
perform local automatic control. PLCs run software on two different layers: a)
firmware (i.e. the OS) and b) control logic (processing sensor readings to
determine control actions). In this work, we discuss ladder logic bombs, i.e.
malware written in ladder logic (or one of the other IEC 61131-3-compatible
languages). Such malware would be inserted by an attacker into existing control
logic on a PLC, and either persistently change the behavior, or wait for
specific trigger signals to activate malicious behaviour. For example, the LLB
could replace legitimate sensor readings with manipulated values. We see the
concept of LLBs as a generalization of attacks such as the Stuxnet attack. We
introduce LLBs on an abstract level, and then demonstrate several designs based
on real PLC devices in our lab. In particular, we also focus on stealthy LLBs,
i.e. LLBs that are hard to detect by human operators manually validating the
program running in PLCs. In addition to introducing vulnerabilities on the
logic layer, we also discuss countermeasures and we propose two detection
techniques.
|
[
{
"version": "v1",
"created": "Fri, 17 Feb 2017 07:18:01 GMT"
}
] | 2017-02-20T00:00:00 |
[
[
"Govil",
"Naman",
""
],
[
"Agrawal",
"Anand",
""
],
[
"Tippenhauer",
"Nils Ole",
""
]
] |
new_dataset
| 0.999634 |
1312.1231
|
Ulrich Bauer
|
Ulrich Bauer, Herbert Edelsbrunner
|
The Morse theory of \v{C}ech and Delaunay complexes
|
21 pages, 2 figures, improved exposition
|
Trans. Amer. Math. Soc. 369 (2017), 3741-3762
|
10.1090/tran/6991
| null |
cs.CG math.AT math.GT math.MG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a finite set of points in $\mathbb R^n$ and a radius parameter, we
study the \v{C}ech, Delaunay-\v{C}ech, Delaunay (or Alpha), and Wrap complexes
in the light of generalized discrete Morse theory. Establishing the \v{C}ech
and Delaunay complexes as sublevel sets of generalized discrete Morse
functions, we prove that the four complexes are simple-homotopy equivalent by a
sequence of simplicial collapses, which are explicitly described by a single
discrete gradient field.
|
[
{
"version": "v1",
"created": "Wed, 4 Dec 2013 16:21:05 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Aug 2015 11:31:47 GMT"
},
{
"version": "v3",
"created": "Sat, 30 Apr 2016 10:00:26 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Bauer",
"Ulrich",
""
],
[
"Edelsbrunner",
"Herbert",
""
]
] |
new_dataset
| 0.976902 |
1412.0981
|
Sergey Vostokin
|
Sergey Vostokin
|
Templet: a Markup Language for Concurrent Programming
|
13 pages
| null |
10.18287/1613-0073-2016-1638-460-468
| null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose a new approach to the description of a network of
interacting processes in a traditional programming language. Special
programming languages or extensions to sequential languages are usually
designed to express the semantics of concurrent execution. Using libraries in
C++, Java, C#, and other languages is more practical way of concurrent
programming. However, this method leads to an increase in workload of a manual
coding. Besides, stock compilers can not detect semantic errors related to the
programming model in such libraries. The new markup language and a special
technique of automatic programming based on the marked code can solve these
problems. The article provides a detailed specification of the markup language
without discussing its implementation details. The language is used for
programming of current and prospective multi-core and many-core systems.
|
[
{
"version": "v1",
"created": "Tue, 2 Dec 2014 17:06:28 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Vostokin",
"Sergey",
""
]
] |
new_dataset
| 0.999422 |
1608.01889
|
Lorenzo Fagiano
|
Lorenzo Fagiano, Eric Nguyen-Van, Felix Rager, Stephan Schnez, and
Christian Ohler
|
Autonomous Take-Off and Flight of a Tethered Aircraft for Airborne Wind
Energy
|
This is the pre-print of a paper accepted for publication on the IEEE
Transactions on Control systems Technology and is subject to IEEE Copyright.
doi: 10.1109/TCST.2017.2661825
| null |
10.1109/TCST.2017.2661825
| null |
cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A control design approach to achieve fully autonomous take-off and flight
maneuvers with a tethered aircraft is presented and demonstrated in real-world
flight tests with a small-scale prototype. A ground station equipped with a
controlled winch and a linear motion system accelerates the aircraft to
take-off speed and controls the tether reeling in order to limit the pulling
force. This setup corresponds to airborne wind energy systems with ground-based
energy generation and rigid aircrafts. A simple model of the aircraft's
dynamics is introduced and its parameters are identified from experimental
data. A model-based, hierarchical feedback controller is then designed, whose
aim is to manipulate the elevator, aileron and propeller inputs in order to
stabilize the aircraft during the take-off and to achieve figure-of-eight
flight patterns parallel to the ground. The controller operates in a fully
decoupled mode with respect to the ground station. Parameter tuning and
stability/robustness aspect are discussed, too. The experimental results
indicate that the controller is able to achieve satisfactory performance and
robustness, notwithstanding its simplicity, and confirm that the considered
take-off approach is technically viable and solves the issue of launching this
kind of airborne wind energy systems in a compact space and at low additional
cost.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2016 14:07:04 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Feb 2017 09:33:05 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Fagiano",
"Lorenzo",
""
],
[
"Nguyen-Van",
"Eric",
""
],
[
"Rager",
"Felix",
""
],
[
"Schnez",
"Stephan",
""
],
[
"Ohler",
"Christian",
""
]
] |
new_dataset
| 0.999447 |
1701.08280
|
Kunal Narayan Chaudhury
|
Sanjay Ghosh, Amit K. Mandal, and Kunal N. Chaudhury
|
Pruned non-local means
|
Published in IET Image Processing
| null |
10.1049/iet-ipr.2016.0331
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Non-Local Means (NLM), each pixel is denoised by performing a weighted
averaging of its neighboring pixels, where the weights are computed using image
patches. We demonstrate that the denoising performance of NLM can be improved
by pruning the neighboring pixels, namely, by rejecting neighboring pixels
whose weights are below a certain threshold $\lambda$. While pruning can
potentially reduce pixel averaging in uniform-intensity regions, we demonstrate
that there is generally an overall improvement in the denoising performance. In
particular, the improvement comes from pixels situated close to edges and
corners. The success of the proposed method strongly depends on the choice of
the global threshold $\lambda$, which in turn depends on the noise level and
the image characteristics. We show how Stein's unbiased estimator of the
mean-squared error can be used to optimally tune $\lambda$, at a marginal
computational overhead. We present some representative denoising results to
demonstrate the superior performance of the proposed method over NLM and its
variants.
|
[
{
"version": "v1",
"created": "Sat, 28 Jan 2017 10:57:01 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Feb 2017 12:11:05 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Ghosh",
"Sanjay",
""
],
[
"Mandal",
"Amit K.",
""
],
[
"Chaudhury",
"Kunal N.",
""
]
] |
new_dataset
| 0.959778 |
1702.03880
|
Timo Kumberg
|
Timo Kumberg, Marc Schink, Leonhard Reindl, Christian Schindelhauer
|
T-ROME: A Simple and Energy Efficient Tree Routing Protocol for
Low-Power Wake-up Receivers
| null | null |
10.1016/j.adhoc.2017.02.003
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless sensor networks are deployed in many monitoring applications but
still suffer from short lifetimes originating from limited energy sources and
storages. Due to their low-power consumption and their on-demand communication
ability, wake-up receivers represent an energy efficient and simple enhancement
to wireless sensor nodes and wireless sensor network protocols. In this
context, wake-up receivers have the ability to increase the network lifetime.
In this article, we present T-ROME, a simple and energy efficient cross-layer
routing protocol for wireless sensor nodes containing wake-up receivers. The
protocol makes use of the different transmission ranges of wake-up and main
radios in order to save energy by skipping nodes during data transfer. With
respect to energy consumption and latency, T-ROME outperforms existing
protocols in many scenarios. Here, we describe and analyze the cross layer
multi-hop protocol by means of a Markov chain model that we verify using a
laboratory test setup.
|
[
{
"version": "v1",
"created": "Mon, 13 Feb 2017 17:11:17 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Kumberg",
"Timo",
""
],
[
"Schink",
"Marc",
""
],
[
"Reindl",
"Leonhard",
""
],
[
"Schindelhauer",
"Christian",
""
]
] |
new_dataset
| 0.998749 |
1702.03906
|
Annie Ying
|
Erik Wittern, Annie T. T. Ying, Yunhui Zheng, Julian Dolby, Jim A.
Laredo
|
Statically Checking Web API Requests in JavaScript
|
International Conference on Software Engineering, 2017
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many JavaScript applications perform HTTP requests to web APIs, relying on
the request URL, HTTP method, and request data to be constructed correctly by
string operations. Traditional compile-time error checking, such as calling a
non-existent method in Java, are not available for checking whether such
requests comply with the requirements of a web API. In this paper, we propose
an approach to statically check web API requests in JavaScript. Our approach
first extracts a request's URL string, HTTP method, and the corresponding
request data using an inter-procedural string analysis, and then checks whether
the request conforms to given web API specifications. We evaluated our approach
by checking whether web API requests in JavaScript files mined from GitHub are
consistent or inconsistent with publicly available API specifications. From the
6575 requests in scope, our approach determined whether the request's URL and
HTTP method was consistent or inconsistent with web API specifications with a
precision of 96.0%. Our approach also correctly determined whether extracted
request data was consistent or inconsistent with the data requirements with a
precision of 87.9% for payload data and 99.9% for query data. In a systematic
analysis of the inconsistent cases, we found that many of them were due to
errors in the client code. The here proposed checker can be integrated with
code editors or with continuous integration tools to warn programmers about
code containing potentially erroneous requests.
|
[
{
"version": "v1",
"created": "Mon, 13 Feb 2017 18:15:19 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Feb 2017 22:39:21 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Wittern",
"Erik",
""
],
[
"Ying",
"Annie T. T.",
""
],
[
"Zheng",
"Yunhui",
""
],
[
"Dolby",
"Julian",
""
],
[
"Laredo",
"Jim A.",
""
]
] |
new_dataset
| 0.989046 |
1702.04479
|
Sungeun Hong
|
Sungeun Hong, Jongbin Ryu, Woobin Im, Hyun S. Yang
|
Recognizing Dynamic Scenes with Deep Dual Descriptor based on Key Frames
and Key Segments
|
10 pages, 7 figures, 8 tables
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Recognizing dynamic scenes is one of the fundamental problems in scene
understanding, which categorizes moving scenes such as a forest fire,
landslide, or avalanche. While existing methods focus on reliable capturing of
static and dynamic information, few works have explored frame selection from a
dynamic scene sequence. In this paper, we propose dynamic scene recognition
using a deep dual descriptor based on `key frames' and `key segments.' Key
frames that reflect the feature distribution of the sequence with a small
number are used for capturing salient static appearances. Key segments, which
are captured from the area around each key frame, provide an additional
discriminative power by dynamic patterns within short time intervals. To this
end, two types of transferred convolutional neural network features are used in
our approach. A fully connected layer is used to select the key frames and key
segments, while the convolutional layer is used to describe them. We conducted
experiments using public datasets as well as a new dataset comprised of 23
dynamic scene classes with 10 videos per class. The evaluation results
demonstrated the state-of-the-art performance of the proposed method.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2017 06:59:01 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Feb 2017 07:14:19 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Hong",
"Sungeun",
""
],
[
"Ryu",
"Jongbin",
""
],
[
"Im",
"Woobin",
""
],
[
"Yang",
"Hyun S.",
""
]
] |
new_dataset
| 0.998641 |
1702.04843
|
Abdul Kawsar Tushar
|
Mohammad Asiful Hossain and Abdul Kawsar Tushar
|
Chord Angle Deviation using Tangent (CADT), an Efficient and Robust
Contour-based Corner Detector
|
Conference Name - 2017 IEEE International Conference on Imaging,
Vision & Pattern Recognition (icIVPR17); Conference Date - 13 Feb, 2017;
Conference Venue - University of Dhaka, Dhaka, Bangladesh
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Detection of corner is the most essential process in a large number of
computer vision and image processing applications. We have mentioned a number
of popular contour-based corner detectors in our paper. Among all these
detectors chord to triangular arm angle (CTAA) has been demonstrated as the
most dominant corner detector in terms of average repeatability. We introduce a
new effective method to calculate the value of curvature in this paper. By
demonstrating experimental results, our proposed technique outperforms CTAA and
other detectors mentioned in this paper. The results exhibit that our proposed
method is simple yet efficient at finding out corners more accurately and
reliably.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 02:52:36 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Hossain",
"Mohammad Asiful",
""
],
[
"Tushar",
"Abdul Kawsar",
""
]
] |
new_dataset
| 0.991055 |
1702.04863
|
Md Salman Nazir
|
Md Salman Nazir and Ian A. Hiskens
|
Load Synchronization and Sustained Oscillations Induced by Transactive
Control
|
5 pages, 8 figures, accepted version for presentation at the 2017
IEEE PES General Meeting, July 16-20, 2017
| null | null | null |
cs.SY cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Transactive or market-based coordination strategies have recently been
proposed for controlling the aggregate demand of a large number of electric
loads. Such schemes offer operational benefits such as enforcing distribution
feeder capacity limits and providing users with flexibility to consume energy
based on the price they are willing to pay. However, this paper demonstrates
that they are also prone to load synchronization and power oscillations. A
transactive energy framework has been adopted and applied to a population of
thermostatically controlled loads (TCLs). A modified TCL switching logic takes
into account market coordination signals, alongside the natural
hysteresis-based switching conditions. Studies of this market-based
coordination scheme suggest that several factors may contribute to load
synchronism, including sharp changes in the market prices that are broadcast to
loads, lack of diversity in user specified bid curves, low feeder limits that
are encountered periodically, and the form of user bid curves. Case studies
illustrate challenges associated with market-based coordination strategies and
provide insights into modifications that address those issues.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 05:40:48 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Nazir",
"Md Salman",
""
],
[
"Hiskens",
"Ian A.",
""
]
] |
new_dataset
| 0.95785 |
1702.04886
|
Ilya Dumer
|
Ilya Dumer
|
Polar codes with a stepped boundary
|
This article has been submitted to ISIT 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider explicit polar constructions of blocklength $n\rightarrow\infty$
for the two extreme cases of code rates $R\rightarrow1$ and $R\rightarrow0.$
For code rates $R\rightarrow1,$ we design codes with complexity order of $n\log
n$ in code construction, encoding, and decoding. These codes achieve the
vanishing output bit error rates on the binary symmetric channels with any
transition error probability $p\rightarrow 0$ and perform this task with a
substantially smaller redundancy $(1-R)n$ than do other known high-rate codes,
such as BCH codes or Reed-Muller (RM). We then extend our design to the
low-rate codes that achieve the vanishing output error rates with the same
complexity order of $n\log n$ and an asymptotically optimal code rate
$R\rightarrow0$ for the case of $p\rightarrow1/2.$
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 08:28:05 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Dumer",
"Ilya",
""
]
] |
new_dataset
| 0.989541 |
1702.04943
|
Pavlos Sermpezis
|
Pavlos Sermpezis, Thrasyvoulos Spyropoulos, Luigi Vigneri, Theodoros
Giannakas
|
Femto-Caching with Soft Cache Hits: Improving Performance through
Recommendation and Delivery of Related Content
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Pushing popular content to cheap "helper" nodes (e.g., small cells) during
off-peak hours has recently been proposed to cope with the increase in mobile
data traffic. User requests can be served locally from these helper nodes, if
the requested content is available in at least one of the nearby helpers.
Nevertheless, the collective storage of a few nearby helper nodes does not
usually suffice to achieve a high enough hit rate in practice. We propose to
depart from the assumption of hard cache hits, common in existing works, and
consider "soft" cache hits, where if the original content is not available,
some related contents that are locally cached can be recommended instead. Given
that Internet content consumption is entertainment-oriented, we argue that
there exist scenarios where a user might accept an alternative content (e.g.,
better download rate for alternative content, low rate plans, etc.), thus
avoiding to access expensive/congested links. We formulate the problem of
optimal edge caching with soft cache hits in a relatively generic setup,
propose efficient algorithms, and analyze the expected gains. We then show
using synthetic and real datasets of related video contents that promising
caching gains could be achieved in practice.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 12:41:25 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Sermpezis",
"Pavlos",
""
],
[
"Spyropoulos",
"Thrasyvoulos",
""
],
[
"Vigneri",
"Luigi",
""
],
[
"Giannakas",
"Theodoros",
""
]
] |
new_dataset
| 0.994886 |
1702.05042
|
Bhaskar Mitra
|
Bhaskar Mitra, Fernando Diaz and Nick Craswell
|
Luandri: a Clean Lua Interface to the Indri Search Engine
|
Under review for SIGIR'17
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years, the information retrieval (IR) community has witnessed the
first successful applications of deep neural network models to short-text
matching and ad-hoc retrieval. It is exciting to see the research on deep
neural networks and IR converge on these tasks of shared interest. However, the
two communities have less in common when it comes to the choice of programming
languages. Indri, an indexing framework popularly used by the IR community, is
written in C++, while Torch, a popular machine learning library for deep
learning, is written in the light-weight scripting language Lua. To bridge this
gap, we introduce Luandri (pronounced "laundry"), a simple interface for
exposing the search capabilities of Indri to Torch models implemented in Lua.
|
[
{
"version": "v1",
"created": "Thu, 16 Feb 2017 16:30:06 GMT"
}
] | 2017-02-17T00:00:00 |
[
[
"Mitra",
"Bhaskar",
""
],
[
"Diaz",
"Fernando",
""
],
[
"Craswell",
"Nick",
""
]
] |
new_dataset
| 0.997962 |
1506.00122
|
Mohammad Sabokrou
|
Mohammad Sabokrou, Mahmood Fathy and Mojtaba Hoseini
|
IDSA: Intelligent Distributed Sensor Activation Algorithm For Target
Tracking With Wireless Sensor Network
|
We have found several mistake in this our paper. (1) The English
writing of paper must improved (2) the experimental results especially Figure
9, 10 and 12 are wrong (3) Some references must revised. We are providing new
version of paper. We are concern about, this version make confusion for
readers
| null | null | null |
cs.NI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One important application of the Wireless Sensor Network(WSN) is target
tracking, the aim of this application is converging to an event or object in an
area. In this paper, we propose an energy-efficient distributed sensor
activation protocol based on predicted location technique, called Intelligent
Distributed Sensor Activation Algorithm (IDSA). The proposed algorithm predicts
the location of target in the next time interval, by analyzing current location
and movement history of the target, this prediction is done by computational
intelligence. The fewest essential number of sensor nodes within the predicted
location will be activated to cover the target. The results show that the
proposed method outperforms the existing methods such as Na\"ive and DSA in
terms of energy consumption and the number of nodes that was involved in
tracking the target.
|
[
{
"version": "v1",
"created": "Sat, 30 May 2015 14:32:19 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Mar 2016 09:15:40 GMT"
},
{
"version": "v3",
"created": "Mon, 25 Apr 2016 12:00:13 GMT"
},
{
"version": "v4",
"created": "Wed, 15 Feb 2017 08:28:32 GMT"
}
] | 2017-02-16T00:00:00 |
[
[
"Sabokrou",
"Mohammad",
""
],
[
"Fathy",
"Mahmood",
""
],
[
"Hoseini",
"Mojtaba",
""
]
] |
new_dataset
| 0.984352 |
1606.05975
|
Marcin Wrochna
|
Archontia C. Giannopoulou, Micha{\l} Pilipczuk, Jean-Florent Raymond,
Dimitrios M. Thilikos, Marcin Wrochna
|
Cutwidth: obstructions and algorithmic aspects
| null | null | null | null |
cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cutwidth is one of the classic layout parameters for graphs. It measures how
well one can order the vertices of a graph in a linear manner, so that the
maximum number of edges between any prefix and its complement suffix is
minimized. As graphs of cutwidth at most $k$ are closed under taking
immersions, the results of Robertson and Seymour imply that there is a finite
list of minimal immersion obstructions for admitting a cut layout of width at
most $k$. We prove that every minimal immersion obstruction for cutwidth at
most $k$ has size at most $2^{O(k^3\log k)}$.
As an interesting algorithmic byproduct, we design a new fixed-parameter
algorithm for computing the cutwidth of a graph that runs in time $2^{O(k^2\log
k)}\cdot n$, where $k$ is the optimum width and $n$ is the number of vertices.
While being slower by a $\log k$-factor in the exponent than the fastest known
algorithm, given by Thilikos, Bodlaender, and Serna in [Cutwidth I: A linear
time fixed parameter algorithm, J. Algorithms, 56(1):1--24, 2005] and [Cutwidth
II: Algorithms for partial $w$-trees of bounded degree, J. Algorithms,
56(1):25--49, 2005], our algorithm has the advantage of being simpler and
self-contained; arguably, it explains better the combinatorics of optimum-width
layouts.
|
[
{
"version": "v1",
"created": "Mon, 20 Jun 2016 05:31:39 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Feb 2017 13:07:23 GMT"
}
] | 2017-02-16T00:00:00 |
[
[
"Giannopoulou",
"Archontia C.",
""
],
[
"Pilipczuk",
"Michał",
""
],
[
"Raymond",
"Jean-Florent",
""
],
[
"Thilikos",
"Dimitrios M.",
""
],
[
"Wrochna",
"Marcin",
""
]
] |
new_dataset
| 0.99973 |
1609.05264
|
Jeffrey Peters
|
Jeffrey R. Peters, Sean J. Wang, Amit Surana, Francesco Bullo
|
Asynchronous and Dynamic Coverage Control Scheme for Persistent
Surveillance Missions
| null | null | null | null |
cs.MA cs.RO cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A decomposition-based coverage control scheme is proposed for multi-agent,
persistent surveillance missions operating in a communication-constrained,
dynamic environment. The proposed approach decouples high-level task assignment
from low-level motion planning in a modular framework. Coverage assignments and
surveillance parameters are managed by a central base station, and transmitted
to mobile agents via unplanned and asynchronous exchanges. Coverage updates
promote load balancing, while maintaining geometric and temporal
characteristics that allow effective pairing with generic path planners.
Namely, the proposed scheme guarantees that (i) coverage regions are connected
and collectively cover the environment, (ii) subregions may only go uncovered
for bounded periods of time, (iii) collisions (or sensing overlaps) are
inherently avoided, and (iv) under static event likelihoods, the collective
coverage regions converge to a Pareto-optimal configuration. This management
scheme is then paired with a generic path planner satisfying loose assumptions.
The scheme is illustrated through simulated surveillance missions.
|
[
{
"version": "v1",
"created": "Sat, 17 Sep 2016 01:15:22 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Feb 2017 00:46:48 GMT"
}
] | 2017-02-16T00:00:00 |
[
[
"Peters",
"Jeffrey R.",
""
],
[
"Wang",
"Sean J.",
""
],
[
"Surana",
"Amit",
""
],
[
"Bullo",
"Francesco",
""
]
] |
new_dataset
| 0.998648 |
1612.05416
|
Andrea Zanella
|
Federico Chiariotti, Massimo Condoluci, Toktam Mahmoodi, Andrea
Zanella
|
SymbioCity: Smart Cities for Smarter Networks
|
14 pages, submitted for publication to ETT Transactions on Emerging
Telecommunications Technologies
| null | null | null |
cs.NI cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The "Smart City" (SC) concept revolves around the idea of embodying
cutting-edge ICT solutions in the very fabric of future cities, in order to
offer new and better services to citizens while lowering the city management
costs, both in monetary, social, and environmental terms. In this framework,
communication technologies are perceived as subservient to the SC services,
providing the means to collect and process the data needed to make the services
function. In this paper, we propose a new vision in which technology and SC
services are designed to take advantage of each other in a symbiotic manner.
According to this new paradigm, which we call "SymbioCity", SC services can
indeed be exploited to improve the performance of the same communication
systems that provide them with data. Suggestive examples of this symbiotic
ecosystem are discussed in the paper. The dissertation is then substantiated in
a proof-of-concept case study, where we show how the traffic monitoring service
provided by the London Smart City initiative can be used to predict the density
of users in a certain zone and optimize the cellular service in that area.
|
[
{
"version": "v1",
"created": "Fri, 16 Dec 2016 10:18:32 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Feb 2017 13:12:53 GMT"
}
] | 2017-02-16T00:00:00 |
[
[
"Chiariotti",
"Federico",
""
],
[
"Condoluci",
"Massimo",
""
],
[
"Mahmoodi",
"Toktam",
""
],
[
"Zanella",
"Andrea",
""
]
] |
new_dataset
| 0.999525 |
1701.06204
|
Kedar Kulkarni
|
Kedar Kulkarni and Adrish Banerjee
|
On Optimal Spectrum Access of Cognitive Relay With Finite Packet Buffer
|
Accepted for publication in IEEE Transactions on Vehicular Technology
| null |
10.1109/TVT.2017.2664502
| null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate a cognitive radio system where secondary user (SU) relays
primary user (PU) packets using two-phase relaying. SU transmits its own
packets with some access probability in relaying phase using time sharing. PU
and SU have queues of finite capacity which results in packet loss when the
queues are full. Utilizing knowledge of relay queue state, SU aims to maximize
its packet throughput while keeping packet loss probability of PU below a
threshold. By exploiting structure of the problem, we formulate it as a linear
program and find optimal access policy of SU. We also propose low complexity
sub-optimal access policies, namely constant probability transmission and step
transmission. Numerical results are presented to compare performance of
proposed methods and study effect of queue sizes on packet throughput.
|
[
{
"version": "v1",
"created": "Sun, 22 Jan 2017 18:34:33 GMT"
}
] | 2017-02-16T00:00:00 |
[
[
"Kulkarni",
"Kedar",
""
],
[
"Banerjee",
"Adrish",
""
]
] |
new_dataset
| 0.954953 |
1701.08877
|
Fei Li
|
Yilei F. Li, Li Du
|
1.5 bit-per-stage 8-bit Pipelined CMOS A/D Converter for Neuromophic
Vision Processor
| null | null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Neuromorphic vision processor is an electronic implementation of vision
algorithm processor on semiconductor. To image the world, a low-power CMOS
image sensor array is required in the vision processor. The image sensor array
is typically formed through photo diodes and analog to digital converter (ADC).
To achieve low power acquisition, a low-power mid-resolution ADC is necessary.
In this paper, a 1.8V, 8-bit, 166MS/s pipelined ADC was proposed in a 0.18 um
CMOS technology. The ADC used operational amplifier sharing architecture to
reduce power consumption and achieved maximum DNL of 0.24 LSB, maximum INL of
0.35 LSB, at a power consumption of 38.9mW. When input frequency is 10.4MHz, it
achieved an SNDR 45.9dB, SFDR 50dB, and an ENOB of 7.33 bit.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2017 00:14:32 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Feb 2017 02:56:28 GMT"
}
] | 2017-02-16T00:00:00 |
[
[
"Li",
"Yilei F.",
""
],
[
"Du",
"Li",
""
]
] |
new_dataset
| 0.998804 |
1702.04434
|
Ruxandra F. Olimid
|
Stig F. Mj{\o}lsnes and Ruxandra F. Olimid
|
Easy 4G/LTE IMSI Catchers for Non-Programmers
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
IMSI Catchers are tracking devices that break the privacy of the subscribers
of mobile access networks, with disruptive effects to both the communication
services and the trust and credibility of mobile network operators. Recently,
we verified that IMSI Catcher attacks are really practical for the
state-of-the-art 4G/LTE mobile systems too. Our IMSI Catcher device acquires
subscription identities (IMSIs) within an area or location within a few seconds
of operation and then denies access of subscribers to the commercial network.
Moreover, we demonstrate that these attack devices can be easily built and
operated using readily available tools and equipment, and without any
programming. We describe our experiments and procedures that are based on
commercially available hardware and unmodified open source software.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2017 01:13:45 GMT"
}
] | 2017-02-16T00:00:00 |
[
[
"Mjølsnes",
"Stig F.",
""
],
[
"Olimid",
"Ruxandra F.",
""
]
] |
new_dataset
| 0.998366 |
1702.04467
|
Paul Gazzillo
|
Thomas Dickerson, Paul Gazzillo, Maurice Herlihy, Eric Koskinen
|
Adding Concurrency to Smart Contracts
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern cryptocurrency systems, such as Ethereum, permit complex financial
transactions through scripts called smart contracts. These smart contracts are
executed many, many times, always without real concurrency. First, all smart
contracts are serially executed by miners before appending them to the
blockchain. Later, those contracts are serially re-executed by validators to
verify that the smart contracts were executed correctly by miners.
Serial execution limits system throughput and fails to exploit today's
concurrent multicore and cluster architectures. Nevertheless, serial execution
appears to be required: contracts share state, and contract programming
languages have a serial semantics.
This paper presents a novel way to permit miners and validators to execute
smart contracts in parallel, based on techniques adapted from software
transactional memory. Miners execute smart contracts speculatively in parallel,
allowing non-conflicting contracts to proceed concurrently, and "discovering" a
serializable concurrent schedule for a block's transactions, This schedule is
captured and encoded as a deterministic fork-join program used by validators to
re-execute the miner's parallel schedule deterministically but concurrently.
Smart contract benchmarks run on a JVM with ScalaSTM show that a speedup of
of 1.33x can be obtained for miners and 1.69x for validators with just three
concurrent threads.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2017 05:38:37 GMT"
}
] | 2017-02-16T00:00:00 |
[
[
"Dickerson",
"Thomas",
""
],
[
"Gazzillo",
"Paul",
""
],
[
"Herlihy",
"Maurice",
""
],
[
"Koskinen",
"Eric",
""
]
] |
new_dataset
| 0.992709 |
1702.04663
|
Abdul Kawsar Tushar
|
Akm Ashiquzzaman and Abdul Kawsar Tushar
|
Handwritten Arabic Numeral Recognition using Deep Learning Neural
Networks
|
Conference Name - 2017 IEEE International Conference on Imaging,
Vision & Pattern Recognition (icIVPR17) 4 pages, 5 figures, 1 table
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Handwritten character recognition is an active area of research with
applications in numerous fields. Past and recent works in this field have
concentrated on various languages. Arabic is one language where the scope of
research is still widespread, with it being one of the most popular languages
in the world and being syntactically different from other major languages. Das
et al. \cite{DBLP:journals/corr/abs-1003-1891} has pioneered the research for
handwritten digit recognition in Arabic. In this paper, we propose a novel
algorithm based on deep learning neural networks using appropriate activation
function and regularization layer, which shows significantly improved accuracy
compared to the existing Arabic numeral recognition methods. The proposed model
gives 97.4 percent accuracy, which is the recorded highest accuracy of the
dataset used in the experiment. We also propose a modification of the method
described in \cite{DBLP:journals/corr/abs-1003-1891}, where our method scores
identical accuracy as that of \cite{DBLP:journals/corr/abs-1003-1891}, with the
value of 93.8 percent.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2017 16:06:15 GMT"
}
] | 2017-02-16T00:00:00 |
[
[
"Ashiquzzaman",
"Akm",
""
],
[
"Tushar",
"Abdul Kawsar",
""
]
] |
new_dataset
| 0.956021 |
1603.04660
|
Binqiang Chen
|
Binqiang Chen and Chenyang Yang
|
Energy Costs for Traffic Offloading by Cache-enabled D2D Communications
|
Accepted by IEEE WCNC 2016
| null |
10.1109/WCNC.2016.7564731
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Device-to-Device (D2D) communications can offload the traffic and boost the
throughput of cellular networks. By caching files at users, content delivery
traffic can be offloaded via D2D links, if a helper user are willing to send
the cached file to the user who requests the file. Yet it is unclear how much
energy needs to be consumed at a helper user to support the traffic offloading.
In this paper, we strive to find the minimal energy consumption required at a
helper user to maximize the amount of offloaded traffic. To this end, we
introduce a user-centric proactive caching policy that can control the energy
cost for a helper user to convey a file, and then optimize the caching policy
to maximize the offloaded traffic. To reduce the energy during transmission, we
optimize the transmit power to minimize the energy consumed by a helper to send
a file. We analyze the relationship between traffic offloading and energy cost
with the optimized caching policy and transmit power by numerical and
simulation results, which demonstrate that a significant amount of traffic can
be offloaded with affordable energy costs.
|
[
{
"version": "v1",
"created": "Tue, 15 Mar 2016 12:31:53 GMT"
}
] | 2017-02-15T00:00:00 |
[
[
"Chen",
"Binqiang",
""
],
[
"Yang",
"Chenyang",
""
]
] |
new_dataset
| 0.97321 |
1610.06495
|
Delaram Kahrobaei
|
Ram\'on Flores and Delaram Kahrobaei
|
Cryptography with right-angled Artin groups
| null | null | null | null |
cs.CR math.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose right-angled Artin groups as a platform for secret
sharing schemes based on the efficiency (linear time) of the word problem.
Inspired by previous work of Grigoriev-Shpilrain in the context of graphs, we
define two new problems: Subgroup Isomorphism Problem and Group Homomorphism
Problem. Based on them, we also propose two new authentication schemes. For
right-angled Artin groups, the Group Homomorphism and Graph Homomorphism
problems are equivalent, and the later is known to be NP-complete. In the case
of the Subgroup Isomorphism problem, we bring some results due to Bridson who
shows there are right-angled Artin groups in which this problem is unsolvable.
|
[
{
"version": "v1",
"created": "Thu, 20 Oct 2016 16:41:57 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Nov 2016 16:57:38 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Feb 2017 20:21:21 GMT"
}
] | 2017-02-15T00:00:00 |
[
[
"Flores",
"Ramón",
""
],
[
"Kahrobaei",
"Delaram",
""
]
] |
new_dataset
| 0.959793 |
1702.03970
|
Ray Smith
|
Raymond Smith, Chunhui Gu, Dar-Shyang Lee, Huiyi Hu, Ranjith
Unnikrishnan, Julian Ibarz, Sacha Arnoud, Sophia Lin
|
End-to-End Interpretation of the French Street Name Signs Dataset
|
Presented at the IWRR workshop at ECCV 2016
|
Computer Vision - ECCV 2016 Workshops Volume 9913 of the series
Lecture Notes in Computer Science pp 411-426
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the French Street Name Signs (FSNS) Dataset consisting of more
than a million images of street name signs cropped from Google Street View
images of France. Each image contains several views of the same street name
sign. Every image has normalized, title case folded ground-truth text as it
would appear on a map. We believe that the FSNS dataset is large and complex
enough to train a deep network of significant complexity to solve the street
name extraction problem "end-to-end" or to explore the design trade-offs
between a single complex engineered network and multiple sub-networks designed
and trained to solve sub-problems. We present such an "end-to-end"
network/graph for Tensor Flow and its results on the FSNS dataset.
|
[
{
"version": "v1",
"created": "Mon, 13 Feb 2017 20:18:18 GMT"
}
] | 2017-02-15T00:00:00 |
[
[
"Smith",
"Raymond",
""
],
[
"Gu",
"Chunhui",
""
],
[
"Lee",
"Dar-Shyang",
""
],
[
"Hu",
"Huiyi",
""
],
[
"Unnikrishnan",
"Ranjith",
""
],
[
"Ibarz",
"Julian",
""
],
[
"Arnoud",
"Sacha",
""
],
[
"Lin",
"Sophia",
""
]
] |
new_dataset
| 0.999876 |
1702.04066
|
Courtney Napoles
|
Courtney Napoles, Keisuke Sakaguchi, and Joel Tetreault
|
JFLEG: A Fluency Corpus and Benchmark for Grammatical Error Correction
|
To appear in EACL 2017 (short papers)
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new parallel corpus, JHU FLuency-Extended GUG corpus (JFLEG) for
developing and evaluating grammatical error correction (GEC). Unlike other
corpora, it represents a broad range of language proficiency levels and uses
holistic fluency edits to not only correct grammatical errors but also make the
original text more native sounding. We describe the types of corrections made
and benchmark four leading GEC systems on this corpus, identifying specific
areas in which they do well and how they can improve. JFLEG fulfills the need
for a new gold standard to properly assess the current state of GEC.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2017 03:47:34 GMT"
}
] | 2017-02-15T00:00:00 |
[
[
"Napoles",
"Courtney",
""
],
[
"Sakaguchi",
"Keisuke",
""
],
[
"Tetreault",
"Joel",
""
]
] |
new_dataset
| 0.999617 |
1702.04143
|
Nicolae Paladi
|
Nicolae Paladi and Christian Gehrmann
|
TruSDN: Bootstrapping Trust in Cloud Network Infrastructure
|
SecureComm 2016 12th EAI International Conference on Security and
Privacy in Communication Networks October 10-12, 2016 Guangzhou, People's
Republic of China
| null | null | null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Software-Defined Networking (SDN) is a novel architectural model for cloud
network infrastructure, improving resource utilization, scalability and
administration. SDN deployments increasingly rely on virtual switches executing
on commodity operating systems with large code bases, which are prime targets
for adversaries attacking the net- work infrastructure. We describe and
implement TruSDN, a framework for bootstrapping trust in SDN infrastructure
using Intel Software Guard Extensions (SGX), allowing to securely deploy SDN
components and protect communication between network endpoints. We introduce
ephemeral flow-specific pre-shared keys and propose a novel defense against
cuckoo attacks on SGX enclaves. TruSDN is secure under a powerful adversary
model, with a minor performance overhead.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2017 10:30:49 GMT"
}
] | 2017-02-15T00:00:00 |
[
[
"Paladi",
"Nicolae",
""
],
[
"Gehrmann",
"Christian",
""
]
] |
new_dataset
| 0.992538 |
1702.04174
|
Enrique S\'anchez Lozano
|
Michel F. Valstar, Enrique S\'anchez-Lozano, Jeffrey F. Cohn,
L\'aszl\'o A. Jeni, Jeffrey M. Girard, Zheng Zhang, Lijun Yin, and Maja
Pantic
|
FERA 2017 - Addressing Head Pose in the Third Facial Expression
Recognition and Analysis Challenge
|
FERA 2017 Baseline Paper
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The field of Automatic Facial Expression Analysis has grown rapidly in recent
years. However, despite progress in new approaches as well as benchmarking
efforts, most evaluations still focus on either posed expressions, near-frontal
recordings, or both. This makes it hard to tell how existing expression
recognition approaches perform under conditions where faces appear in a wide
range of poses (or camera views), displaying ecologically valid expressions.
The main obstacle for assessing this is the availability of suitable data, and
the challenge proposed here addresses this limitation. The FG 2017 Facial
Expression Recognition and Analysis challenge (FERA 2017) extends FERA 2015 to
the estimation of Action Units occurrence and intensity under different camera
views. In this paper we present the third challenge in automatic recognition of
facial expressions, to be held in conjunction with the 12th IEEE conference on
Face and Gesture Recognition, May 2017, in Washington, United States. Two
sub-challenges are defined: the detection of AU occurrence, and the estimation
of AU intensity. In this work we outline the evaluation protocol, the data
used, and the results of a baseline method for both sub-challenges.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2017 12:22:30 GMT"
}
] | 2017-02-15T00:00:00 |
[
[
"Valstar",
"Michel F.",
""
],
[
"Sánchez-Lozano",
"Enrique",
""
],
[
"Cohn",
"Jeffrey F.",
""
],
[
"Jeni",
"László A.",
""
],
[
"Girard",
"Jeffrey M.",
""
],
[
"Zhang",
"Zheng",
""
],
[
"Yin",
"Lijun",
""
],
[
"Pantic",
"Maja",
""
]
] |
new_dataset
| 0.986701 |
1702.04218
|
John Prpic
|
J. Prpic and P. Shukla
|
Crowd Capital in Governance Contexts
|
Oxford Internet Institute, University of Oxford - IPP 2014 -
Crowdsourcing for Politics and Policy
| null | null | null |
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To begin to understand the implications of the implementation of IT-mediated
Crowds for Politics and Policy purposes, this research builds the first-known
dataset of IT-mediated Crowd applications currently in use in the governance
context. Using Crowd Capital theory and governance theory as frameworks to
organize our data collection, we undertake an exploratory data analysis of some
fundamental factors defining this emerging field. Specific factors outlined and
discussed include the type of actors implementing IT-mediated Crowds in the
governance context, the global geographic distribution of the applications, and
the nature of the Crowd-derived resources being generated for governance
purposes. The findings from our dataset of 209 on-going endeavours indicates
that a wide-diversity of actors are engaging IT-mediated Crowds in the
governance context, both jointly and severally, that these endeavours can be
found to exist on all continents, and that said actors are generating
Crowd-derived resources in at least ten distinct governance sectors. We discuss
the ramifications of these and our other findings in comparison to the research
literature on the private-sector use of IT-mediated Crowds, while highlighting
some unique future research opportunities stemming from our work.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2017 09:45:57 GMT"
}
] | 2017-02-15T00:00:00 |
[
[
"Prpic",
"J.",
""
],
[
"Shukla",
"P.",
""
]
] |
new_dataset
| 0.994347 |
1702.04256
|
Gianluca Stringhini
|
Enrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas
Nikiforou, Manuel Egele, Nick Nikiforakis, and Gianluca Stringhini
|
What's in a Name? Understanding Profile Name Reuse on Twitter
|
International World Wide Web Conference 2017
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Users on Twitter are commonly identified by their profile names. These names
are used when directly addressing users on Twitter, are part of their profile
page URLs, and can become a trademark for popular accounts, with people
referring to celebrities by their real name and their profile name,
interchangeably. Twitter, however, has chosen to not permanently link profile
names to their corresponding user accounts. In fact, Twitter allows users to
change their profile name, and afterwards makes the old profile names available
for other users to take. In this paper, we provide a large-scale study of the
phenomenon of profile name reuse on Twitter. We show that this phenomenon is
not uncommon, investigate the dynamics of profile name reuse, and characterize
the accounts that are involved in it. We find that many of these accounts adopt
abandoned profile names for questionable purposes, such as spreading malicious
content, and using the profile name's popularity for search engine
optimization. Finally, we show that this problem is not unique to Twitter (as
other popular online social networks also release profile names) and argue that
the risks involved with profile-name reuse outnumber the advantages provided by
this feature.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2017 15:17:38 GMT"
}
] | 2017-02-15T00:00:00 |
[
[
"Mariconti",
"Enrico",
""
],
[
"Onaolapo",
"Jeremiah",
""
],
[
"Ahmad",
"Syed Sharique",
""
],
[
"Nikiforou",
"Nicolas",
""
],
[
"Egele",
"Manuel",
""
],
[
"Nikiforakis",
"Nick",
""
],
[
"Stringhini",
"Gianluca",
""
]
] |
new_dataset
| 0.999104 |
1702.04263
|
Diego Didona Dr
|
Diego Didona, Kristina Spirovska, Willy Zwaenepoel
|
Okapi: Causally Consistent Geo-Replication Made Faster, Cheaper and More
Available
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Okapi is a new causally consistent geo-replicated key- value store. Okapi
leverages two key design choices to achieve high performance. First, it relies
on hybrid logical/physical clocks to achieve low latency even in the presence
of clock skew. Second, Okapi achieves higher resource efficiency and better
availability, at the expense of a slight increase in update visibility latency.
To this end, Okapi implements a new stabilization protocol that uses a
combination of vector and scalar clocks and makes a remote update visible when
its delivery has been acknowledged by every data center. We evaluate Okapi with
different workloads on Amazon AWS, using three geographically distributed
regions and 96 nodes. We compare Okapi with two recent approaches to causal
consistency, Cure and GentleRain. We show that Okapi delivers up to two orders
of magnitude better performance than GentleRain and that Okapi achieves up to
3.5x lower latency and a 60% reduction of the meta-data overhead with respect
to Cure.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2017 15:34:56 GMT"
}
] | 2017-02-15T00:00:00 |
[
[
"Didona",
"Diego",
""
],
[
"Spirovska",
"Kristina",
""
],
[
"Zwaenepoel",
"Willy",
""
]
] |
new_dataset
| 0.99288 |
1702.04343
|
Manish Gupta
|
Amay Agrawal, Birva Patel, Dixita Limbachiya and Manish K. Gupta
|
3DNA Printer: A Tool for Automated DNA Origami
|
5 pages, 9 figures, 3DNAprinter software available at
http://www.guptalab.org/3dnaprinter
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the last two decades, DNA self-assembly has grown into a major area of
research attracting people from diverse background. It has numerous potential
applications such as targeted drug delivery, artificial photosynthesis etc. In
the last decade, another area received wide attention known as DNA origami,
where using M13 virus and carefully designed staple strands one can fold the
DNA into desired 2-D and 3-D shapes. In 2016, a group of researchers at MIT
have developed an automated DNA nanostructures strategy and an open source
software 'daedalus' based on MATLAB for developing the nanostructures. In this
work, we present a truly open source software '3dnaprinter' based on Java
(without MATLAB) that can do the same work.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2017 18:57:33 GMT"
}
] | 2017-02-15T00:00:00 |
[
[
"Agrawal",
"Amay",
""
],
[
"Patel",
"Birva",
""
],
[
"Limbachiya",
"Dixita",
""
],
[
"Gupta",
"Manish K.",
""
]
] |
new_dataset
| 0.999573 |
1411.5240
|
Leandro Montero
|
Raquel \'Agueda, Valentin Borozan, Raquel D\'iaz, Yannis Manoussakis,
Leandro Montero
|
Proper Hamiltonian Cycles in Edge-Colored Multigraphs
|
13 pages
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A $c$-edge-colored multigraph has each edge colored with one of the $c$
available colors and no two parallel edges have the same color. A proper
Hamiltonian cycle is a cycle containing all the vertices of the multigraph such
that no two adjacent edges have the same color. In this work we establish
sufficient conditions for a multigraph to have a proper Hamiltonian cycle,
depending on several parameters such as the number of edges and the rainbow
degree.
|
[
{
"version": "v1",
"created": "Wed, 19 Nov 2014 14:38:05 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Jun 2015 14:43:19 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Aug 2015 10:24:44 GMT"
},
{
"version": "v4",
"created": "Fri, 30 Oct 2015 14:23:58 GMT"
},
{
"version": "v5",
"created": "Wed, 27 Jul 2016 16:52:06 GMT"
},
{
"version": "v6",
"created": "Mon, 13 Feb 2017 13:17:39 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Águeda",
"Raquel",
""
],
[
"Borozan",
"Valentin",
""
],
[
"Díaz",
"Raquel",
""
],
[
"Manoussakis",
"Yannis",
""
],
[
"Montero",
"Leandro",
""
]
] |
new_dataset
| 0.99981 |
1506.04130
|
Harsh Agrawal
|
Harsh Agrawal, Clint Solomon Mathialagan, Yash Goyal, Neelima Chavali,
Prakriti Banik, Akrit Mohapatra, Ahmed Osman, Dhruv Batra
|
CloudCV: Large Scale Distributed Computer Vision as a Cloud Service
| null | null | null | null |
cs.CV cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We are witnessing a proliferation of massive visual data. Unfortunately
scaling existing computer vision algorithms to large datasets leaves
researchers repeatedly solving the same algorithmic, logistical, and
infrastructural problems. Our goal is to democratize computer vision; one
should not have to be a computer vision, big data and distributed computing
expert to have access to state-of-the-art distributed computer vision
algorithms. We present CloudCV, a comprehensive system to provide access to
state-of-the-art distributed computer vision algorithms as a cloud service
through a Web Interface and APIs.
|
[
{
"version": "v1",
"created": "Fri, 12 Jun 2015 19:50:07 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Jun 2016 22:01:51 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Feb 2017 07:30:56 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Agrawal",
"Harsh",
""
],
[
"Mathialagan",
"Clint Solomon",
""
],
[
"Goyal",
"Yash",
""
],
[
"Chavali",
"Neelima",
""
],
[
"Banik",
"Prakriti",
""
],
[
"Mohapatra",
"Akrit",
""
],
[
"Osman",
"Ahmed",
""
],
[
"Batra",
"Dhruv",
""
]
] |
new_dataset
| 0.997792 |
1507.03166
|
Jo\~ao Sousa Pinto
|
Jo\"el Ouaknine, Jo\~ao Sousa-Pinto, James Worrell
|
On the Polytope Escape Problem for Continuous Linear Dynamical Systems
|
Accepted to HSCC 2017
| null |
10.1145/3049797.3049798
| null |
cs.CC
|
http://creativecommons.org/licenses/by/4.0/
|
The Polyhedral Escape Problem for continuous linear dynamical systems
consists of deciding, given an affine function $f: \mathbb{R}^{d} \rightarrow
\mathbb{R}^{d}$ and a convex polyhedron $\mathcal{P} \subseteq \mathbb{R}^{d}$,
whether, for some initial point $\boldsymbol{x}_{0}$ in $\mathcal{P}$, the
trajectory of the unique solution to the differential equation
$\dot{\boldsymbol{x}}(t)=f(\boldsymbol{x}(t))$,
$\boldsymbol{x}(0)=\boldsymbol{x}_{0}$, is entirely contained in $\mathcal{P}$.
We show that this problem is decidable, by reducing it in polynomial time to
the decision version of linear programming with real algebraic coefficients,
thus placing it in $\exists \mathbb{R}$, which lies between NP and PSPACE. Our
algorithm makes use of spectral techniques and relies among others on tools
from Diophantine approximation.
|
[
{
"version": "v1",
"created": "Sat, 11 Jul 2015 22:56:01 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Feb 2017 19:11:42 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Ouaknine",
"Joël",
""
],
[
"Sousa-Pinto",
"João",
""
],
[
"Worrell",
"James",
""
]
] |
new_dataset
| 0.97466 |
1602.01600
|
David Doty
|
David Doty and Andrew Winslow
|
Design of Geometric Molecular Bonds
|
Accepted to appear in IEEE Transactions on Molecular, Biological, and
Multi-Scale Communications
| null | null | null |
cs.IT cs.CG cs.ET math.IT q-bio.MN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An example of a nonspecific molecular bond is the affinity of any positive
charge for any negative charge (like-unlike), or of nonpolar material for
itself when in aqueous solution (like-like). This contrasts specific bonds such
as the affinity of the DNA base A for T, but not for C, G, or another A. Recent
experimental breakthroughs in DNA nanotechnology demonstrate that a particular
nonspecific like-like bond ("blunt-end DNA stacking" that occurs between the
ends of any pair of DNA double-helices) can be used to create specific
"macrobonds" by careful geometric arrangement of many nonspecific blunt ends,
motivating the need for sets of macrobonds that are orthogonal: two macrobonds
not intended to bind should have relatively low binding strength, even when
misaligned.
To address this need, we introduce geometric orthogonal codes that abstractly
model the engineered DNA macrobonds as two-dimensional binary codewords. While
motivated by completely different applications, geometric orthogonal codes
share similar features to the optical orthogonal codes studied by Chung,
Salehi, and Wei. The main technical difference is the importance of 2D geometry
in defining codeword orthogonality.
|
[
{
"version": "v1",
"created": "Thu, 4 Feb 2016 09:07:20 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Apr 2016 19:55:33 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Aug 2016 16:40:47 GMT"
},
{
"version": "v4",
"created": "Sun, 12 Feb 2017 18:23:31 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Doty",
"David",
""
],
[
"Winslow",
"Andrew",
""
]
] |
new_dataset
| 0.962727 |
1612.05390
|
Iddo Bentov
|
Andrew Miller and Iddo Bentov
|
Zero-Collateral Lotteries in Bitcoin and Ethereum
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present cryptocurrency-based lottery protocols that do not require any
collateral from the players. Previous protocols for this task required a
security deposit that is $O(N^2)$ times larger than the bet amount, where $N$
is the number of players. Our protocols are based on a tournament bracket
construction, and require only $O(\log N)$ rounds. Our lottery protocols thus
represent a significant improvement, both because they allow players with
little money to participate, and because of the time value of money. The
Ethereum-based implementation of our lottery is highly efficient. The Bitcoin
implementation requires an $O(2^N)$ off-chain setup phase, which demonstrates
that the expressive power of the scripting language can have important
implications. We also describe a minimal modification to the Bitcoin protocol
that would eliminate the exponential blowup.
|
[
{
"version": "v1",
"created": "Fri, 16 Dec 2016 08:11:32 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Dec 2016 05:07:33 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Feb 2017 16:52:17 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Miller",
"Andrew",
""
],
[
"Bentov",
"Iddo",
""
]
] |
new_dataset
| 0.968403 |
1701.06726
|
Iddo Bentov
|
Iddo Bentov, Ranjit Kumaresan, Andrew Miller
|
Instantaneous Decentralized Poker
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present efficient protocols for amortized secure multiparty computation
with penalties and secure cash distribution, of which poker is a prime example.
Our protocols have an initial phase where the parties interact with a
cryptocurrency network, that then enables them to interact only among
themselves over the course of playing many poker games in which money changes
hands.
The high efficiency of our protocols is achieved by harnessing the power of
stateful contracts. Compared to the limited expressive power of Bitcoin
scripts, stateful contracts enable richer forms of interaction between standard
secure computation and a cryptocurrency.
We formalize the stateful contract model and the security notions that our
protocols accomplish, and provide proofs using the simulation paradigm.
Moreover, we provide a reference implementation in Ethereum/Solidity for the
stateful contracts that our protocols are based on.
We also adopt our off-chain cash distribution protocols to the special case
of stateful duplex micropayment channels, which are of independent interest. In
comparison to Bitcoin based payment channels, our duplex channel implementation
is more efficient and has additional features.
|
[
{
"version": "v1",
"created": "Tue, 24 Jan 2017 04:24:40 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Jan 2017 07:00:10 GMT"
},
{
"version": "v3",
"created": "Sat, 11 Feb 2017 05:26:58 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Bentov",
"Iddo",
""
],
[
"Kumaresan",
"Ranjit",
""
],
[
"Miller",
"Andrew",
""
]
] |
new_dataset
| 0.99626 |
1702.03467
|
Lei Yang
|
Lei Yang, Qingji Zheng, Xinxin Fan
|
RSPP: A Reliable, Searchable and Privacy-Preserving e-Healthcare System
for Cloud-Assisted Body Area Networks
|
to be published in IEEE INFOCOM 2017
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The integration of cloud computing and Internet of Things (IoT) is quickly
becoming the key enabler for the digital transformation of the healthcare
industry by offering comprehensive improvements in patient engagements,
productivity and risk mitigation. This paradigm shift, while bringing numerous
benefits and new opportunities to healthcare organizations, has raised a lot of
security and privacy concerns. In this paper, we present a reliable, searchable
and privacy-preserving e-healthcare system, which takes advantage of emerging
cloud storage and IoT infrastructure and enables healthcare service providers
(HSPs) to realize remote patient monitoring in a secure and regulatory
compliant manner. Our system is built upon a novel dynamic searchable symmetric
encryption scheme with forward privacy and delegated verifiability for
periodically generated healthcare data. While the forward privacy is achieved
by maintaining an increasing counter for each keyword at an IoT gateway, the
data owner delegated verifiability comes from the combination of the Bloom
filter and aggregate message authentication code. Moreover, our system is able
to support multiple HSPs through either data owner assistance or delegation.
The detailed security analysis as well as the extensive simulations on a large
data set with millions of records demonstrate the practical efficiency of the
proposed system for real world healthcare applications.
|
[
{
"version": "v1",
"created": "Sat, 11 Feb 2017 23:18:30 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Yang",
"Lei",
""
],
[
"Zheng",
"Qingji",
""
],
[
"Fan",
"Xinxin",
""
]
] |
new_dataset
| 0.999621 |
1702.03555
|
Iuliia Kotseruba
|
Amir Rasouli, Iuliia Kotseruba, John K. Tsotsos
|
Agreeing to Cross: How Drivers and Pedestrians Communicate
|
6 pages, 6 figures
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The contribution of this paper is twofold. The first is a novel dataset for
studying behaviors of traffic participants while crossing. Our dataset contains
more than 650 samples of pedestrian behaviors in various street configurations
and weather conditions. These examples were selected from approx. 240 hours of
driving in the city, suburban and urban roads. The second contribution is an
analysis of our data from the point of view of joint attention. We identify
what types of non-verbal communication cues road users use at the point of
crossing, their responses, and under what circumstances the crossing event
takes place. It was found that in more than 90% of the cases pedestrians gaze
at the approaching cars prior to crossing in non-signalized crosswalks. The
crossing action, however, depends on additional factors such as time to
collision (TTC), explicit driver's reaction or structure of the crosswalk.
|
[
{
"version": "v1",
"created": "Sun, 12 Feb 2017 18:41:06 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Rasouli",
"Amir",
""
],
[
"Kotseruba",
"Iuliia",
""
],
[
"Tsotsos",
"John K.",
""
]
] |
new_dataset
| 0.998966 |
1702.03587
|
Pedro Hecht
|
Pedro Hecht
|
Post-Quantum Cryptography(PQC): Generalized ElGamal Cipher over
GF(251^8)
|
6 pages, 6 Tables, 14 Figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Post-Quantum Cryptography (PQC) attempts to find cryptographic protocols
resistant to attacks by means of for instance Shor's polynomial time algorithm
for numerical field problems like integer factorization (IFP) or the discrete
logarithm (DLP). Other aspects are the backdoors discovered in deterministic
random generators or recent advances in solving some instances of DLP. The use
of alternative algebraic structures like non-commutative or non-associative
partial groupoids, magmas, monoids, semigroups, quasigroups or groups, are
valid choices for these new kinds of protocols. In this paper, we focus in an
asymmetric cipher based on a generalized ElGamal non-arbitrated protocol using
a non-commutative general linear group. The developed protocol forces a hard
subgroup membership search problem into a non-commutative structure. The
protocol involves at first a generalized Diffie-Hellman key interchange and
further on the private and public parameters are recursively updated each time
a new cipher session is launched. Security is based on a hard variation of the
Generalized Symmetric Decomposition Problem (GSDP). Working with GF(251^8) a
64-bits security is achieved, and if GF(251^16) is chosen, the security rises
to 127-bits. An appealing feature is that there is no need for big number
libraries as all arithmetic if performed in Z_251 and therefore the new
protocol is particularly useful for computational platforms with very limited
capabilities like smartphones or smartcards.
|
[
{
"version": "v1",
"created": "Sun, 12 Feb 2017 22:50:28 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Hecht",
"Pedro",
""
]
] |
new_dataset
| 0.996942 |
1702.03790
|
Ralph Ewerth
|
Markus M\"uhling, Manja Meister, Nikolaus Korfhage, J\"org Wehling,
Angelika H\"orth, Ralph Ewerth, Bernd Freisleben
|
Content-Based Video Retrieval in Historical Collections of the German
Broadcasting Archive
|
TPDL 2016, Hannover, Germany. Final version is available at Springer
via DOI
| null |
10.1007/978-3-319-43997-6_6
| null |
cs.DL cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The German Broadcasting Archive (DRA) maintains the cultural heritage of
radio and television broadcasts of the former German Democratic Republic (GDR).
The uniqueness and importance of the video material stimulates a large
scientific interest in the video content. In this paper, we present an
automatic video analysis and retrieval system for searching in historical
collections of GDR television recordings. It consists of video analysis
algorithms for shot boundary detection, concept classification, person
recognition, text recognition and similarity search. The performance of the
system is evaluated from a technical and an archival perspective on 2,500 hours
of GDR television recordings.
|
[
{
"version": "v1",
"created": "Mon, 13 Feb 2017 14:42:31 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Mühling",
"Markus",
""
],
[
"Meister",
"Manja",
""
],
[
"Korfhage",
"Nikolaus",
""
],
[
"Wehling",
"Jörg",
""
],
[
"Hörth",
"Angelika",
""
],
[
"Ewerth",
"Ralph",
""
],
[
"Freisleben",
"Bernd",
""
]
] |
new_dataset
| 0.965359 |
1702.03799
|
Mansi Peer Ms
|
Ankush Jolly, Mansi Peer, Vivek Ashok Bohara
|
Powering Future Mobile Phones Through RF Energy Harvesting
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present the preliminary measurement results of harvesting
radio frequency(RF) energy from the mobile phones. The aim is to revolutionize
the way mobile phones are being charged and paving a way of charging the future
mobile phones through RF energy harvesting. In order to measure the amount of
energy that can be harvested, mobile phones from two different manufactures
namely Asus and Samsung have been used. It was shown that depending on the
manufacturer it is possible to harvest 1.53 joules amount of energy per day.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2017 16:29:35 GMT"
}
] | 2017-02-14T00:00:00 |
[
[
"Jolly",
"Ankush",
""
],
[
"Peer",
"Mansi",
""
],
[
"Bohara",
"Vivek Ashok",
""
]
] |
new_dataset
| 0.979303 |
1610.08717
|
Kashyap Thimmaraju
|
Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas
Hetzelt, Jean-Pierre Seifert, Anja Feldmann, Stefan Schmid
|
Reins to the Cloud: Compromising Cloud Systems via the Data Plane
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Virtual switches have become popular among cloud operating systems to
interconnect virtual machines in a more flexible manner. However, this paper
demonstrates that virtual switches introduce new attack surfaces in cloud
setups, whose effects can be disastrous. Our analysis shows that these
vulnerabilities are caused by: (1) inappropriate security assumptions
(privileged virtual switch execution in kernel and user space), (2) the logical
centralization of such networks (e.g., OpenStack or SDN), (3) the presence of
bi-directional communication channels between data plane systems and the
centralized controller, and (4) non-standard protocol parsers.
Our work highlights the need to accommodate the data plane(s) in our threat
models. In particular, it forces us to revisit today's assumption that the data
plane can only be compromised by a sophisticated attacker: we show that
compromising the data plane of modern computer networks can actually be
performed by a very simple attacker with limited resources only and at low cost
(i.e., at the cost of renting a virtual machine in the Cloud). As a case study,
we fuzzed only 2\% of the code-base of a production quality virtual switch's
packet processor (namely OvS), identifying serious vulnerabilities leading to
unauthenticated remote code execution. In particular, we present the "rein
worm" which allows us to fully compromise test-setups in less than 100 seconds.
We also evaluate the performance overhead of existing mitigations such as ASLR,
PIEs, and unconditional stack canaries on OvS. We find that while applying
these countermeasures in kernel-space incurs a significant overhead, in
user-space the performance overhead is negligible.
|
[
{
"version": "v1",
"created": "Thu, 27 Oct 2016 11:39:47 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Feb 2017 16:24:25 GMT"
}
] | 2017-02-13T00:00:00 |
[
[
"Thimmaraju",
"Kashyap",
""
],
[
"Shastry",
"Bhargava",
""
],
[
"Fiebig",
"Tobias",
""
],
[
"Hetzelt",
"Felicitas",
""
],
[
"Seifert",
"Jean-Pierre",
""
],
[
"Feldmann",
"Anja",
""
],
[
"Schmid",
"Stefan",
""
]
] |
new_dataset
| 0.969882 |
1702.02907
|
Ahmed Fawaz
|
Ahmed M. Fawaz, Mohammad Noureddine, William H. Sanders
|
PowerAlert: An Integrity Checker using Power Measurement
| null | null | null | null |
cs.CR cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose PowerAlert, an efficient external integrity checker for untrusted
hosts. Current attestation systems suffer from shortcomings in requiring
complete checksum of the code segment, being static, use of timing information
sourced from the untrusted machine, or use of timing information with high
error (network round trip time). We address those shortcomings by (1) using
power measurements from the host to ensure that the checking code is executed
and (2) checking a subset of the kernel space over a long period of time. We
compare the power measurement against a learned power model of the execution of
the machine and validate that the execution was not tampered. Finally, power
diversifies the integrity checking program to prevent the attacker from
adapting. We implement a prototype of PowerAlert using Raspberry pi and
evaluate the performance of the integrity checking program generation. We model
the interaction between PowerAlert and an attacker as a game. We study the
effectiveness of the random initiation strategy in deterring the attacker. The
study shows that \power forces the attacker to trade-off stealthiness for the
risk of detection, while still maintaining an acceptable probability of
detection given the long lifespan of stealthy attacks.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2017 17:24:43 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Feb 2017 04:03:04 GMT"
}
] | 2017-02-13T00:00:00 |
[
[
"Fawaz",
"Ahmed M.",
""
],
[
"Noureddine",
"Mohammad",
""
],
[
"Sanders",
"William H.",
""
]
] |
new_dataset
| 0.995273 |
1702.02999
|
Jonas Weber
|
Jonas Weber
|
Idiomatic and Reproducible Software Builds using Containers for Reliable
Computing
|
77 pages, Master's Thesis
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Containers as the unit of application delivery are the 'next big thing' in
the software development world. They enable developers to create an executable
image containing an application bundled with all its dependencies which a user
can run inside a controlled environment with virtualized resources. Complex
workflows for business-critical applications and research environments require
a high degree of reproducibility which can be accomplished using uniquely
identified images as units of computation.
It will be shown in this thesis that the most widely used approaches to
create an image from pre-existing software or from source code lack the ability
to provide idiomaticity in their use of the technology as well as proper
reproducibility safe-guards. In the first part, existing approaches are
formalized and discussed and a new approach is introduced. The approaches are
then evaluated using a suite of three different examples.
This thesis provides a framework for formalizing operations involving a
layered file system, containers and images, and a novel approach to the
creation of images using utility containers and layer donning fulfilling the
idiomaticity and reproducibility criteria.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2017 21:59:17 GMT"
}
] | 2017-02-13T00:00:00 |
[
[
"Weber",
"Jonas",
""
]
] |
new_dataset
| 0.999272 |
1702.03128
|
Sha Hu
|
Sha Hu, Fredrik Rusek, and Ove Edfors
|
The Potential of Using Large Antenna Arrays on Intelligent Surfaces
|
6 pages, 10 figures,conference
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider capacities of single-antenna terminals
communicating to large antenna arrays that are deployed on surfaces. That is,
the entire surface is used as an intelligent receiving antenna array. Under the
condition that the surface area is sufficiently large, the received signal
after matched-filtering (MF) can be well approximated by an intersymbol
interference (ISI) channel where channel taps are closely related to a sinc
function. Based on such an approximation, we have derived the capacities for
both one-dimensional (terminals on a line) and high dimensional (terminals on a
plane or in a cube) terminal-deployments. In particular, we analyze the
normalized capacity $\bar{\mathcal{C}}$, measured in nats/s/Hz/m$^2$, under the
constraint that the transmit power per m$^2$, $\bar{P}$, is fixed. We show that
when the user-density increases, the limit of $\bar{\mathcal{C}}$, achieved as
the wavelength $\lambda$ approaches 0, is $\bar{P}/(2N_0)$ nats/s/Hz/m$^2$,
where $N_0$ is the spatial power spectral density (PSD) of noise. In addition,
we also show that the number of signal dimensions is $2/\lambda$ per meter
deployed surface for the one-dimensional case, and $\pi/\lambda^2$ per m$^2$
deployed surface for two and three dimensional terminal-deployments.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2017 11:08:09 GMT"
}
] | 2017-02-13T00:00:00 |
[
[
"Hu",
"Sha",
""
],
[
"Rusek",
"Fredrik",
""
],
[
"Edfors",
"Ove",
""
]
] |
new_dataset
| 0.979418 |
1702.03257
|
Sandip Chakraborty
|
Raja Karmakar and Sandip Chakraborty and Samiran Chattopadhyay
|
Impact of IEEE 802.11n/ac PHY/MAC High Throughput Enhancements over
Transport/Application Layer Protocols - A Survey
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Since the inception of Wireless Local Area Networks (WLANs) in the year 1997,
it has tremendously grown in the last few years. IEEE 802.11 is popularly known
as WLAN. To provide the last mile wireless broadband connectivity to users,
IEEE 802.11 is enriched with IEEE 802.11a, IEEE 802.11b and IEEE 802.11g. More
recently, IEEE 802.11n, IEEE 802.11ac and IEEE 802.11ad are introduced with
enhancements to the physical (PHY) layer and medium access control (MAC)
sublayer to provide much higher data rates and thus these amendments are called
High Throughput WLANs (HT-WLANs). For both standards, PHY is enhanced with
multiple-input multiple-output (MIMO) antenna technologies, channel bonding,
short guard intervals (SGI), enhanced modulation and coding schemes (MCS). At
the same time, MAC layer overhead is reduced by introducing frame aggregation
and block acknowledgement technologies. However, existing studies reveal that
although PHY and MAC enhancements promise to improve physical data rate
significantly, they yield negative impact over upper layer protocols -- mainly
for reliable end-to-end transport/application layer protocols. As a
consequence, a large number of schools have focused researches on HT-WLANs to
improve the coordination among PHY/MAC and upper layer protocols and thus,
boost up the performance benefit. In this survey, we discuss the impact of
enhancements of PHY/MAC layer in HT-WLANs over transport/application layer
protocols. list down different open challenges that can be explored for the
development of next generation HT-WLAN technologies.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2017 17:25:48 GMT"
}
] | 2017-02-13T00:00:00 |
[
[
"Karmakar",
"Raja",
""
],
[
"Chakraborty",
"Sandip",
""
],
[
"Chattopadhyay",
"Samiran",
""
]
] |
new_dataset
| 0.996693 |
1702.03288
|
Christopher Banks
|
Christopher J. Banks and Ian Stark
|
A More Sensitive Context
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Logic of Behaviour in Context (LBC) is a spatio-temporal logic for expressing
properties of continuous-state processes, such as biochemical reaction
networks. LBC builds on the existing Metric Interval Temporal Logic (MITL) and
adds a "context modality" that explores the behaviour of a system when composed
with an external process. LBC models are terms of the Continuous {\pi}-Calculus
(c{\pi}), a process algebra with continuous state space. Our previously
published LBC model-checking technique required examining many points along the
behavioural trajectory of a process; and potentially computing further
trajectories branching off at every such point. This raised two difficulties:
mixing temporal and spatial modalities could require computing a large number
of trajectories, with costly numerical solution of differential equations; and
might still fail to check intermediate values between discrete points on those
trajectories. In this paper we make progress against both of these problems
using techniques from signal temporal logic and from sensitivity analysis.
Boolean signals aggressively compress trace information, allowing more
efficient computation; and sensitivity analysis lets us reliably check formulae
over a region by calculating a smaller number of sample trajectories.
|
[
{
"version": "v1",
"created": "Fri, 10 Feb 2017 18:59:20 GMT"
}
] | 2017-02-13T00:00:00 |
[
[
"Banks",
"Christopher J.",
""
],
[
"Stark",
"Ian",
""
]
] |
new_dataset
| 0.997286 |
1409.8196
|
Blair Dowling Sullivan
|
Matthew Farrell, Timothy Goodrich, Nathan Lemons, Felix Reidl,
Fernando S\'anchez Villaamil, Blair D. Sullivan
|
Hyperbolicity, degeneracy, and expansion of random intersection graphs
|
Updating license to CC-BY
| null | null | null |
cs.SI cs.DM
|
http://creativecommons.org/licenses/by/4.0/
|
We establish the conditions under which several algorithmically exploitable
structural features hold for random intersection graphs, a natural model for
many real-world networks where edges correspond to shared attributes.
Specifically, we fully characterize the degeneracy of random intersection
graphs, and prove that the model asymptotically almost surely produces graphs
with hyperbolicity at least $\log{n}$. Further, we prove that in the parametric
regime where random intersection graphs are degenerate an even stronger notion
of sparseness, so called bounded expansion, holds with high probability. We
supplement our theoretical findings with experimental evaluations of the
relevant statistics.
|
[
{
"version": "v1",
"created": "Mon, 29 Sep 2014 17:16:32 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Sep 2014 13:42:29 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Oct 2014 09:00:46 GMT"
},
{
"version": "v4",
"created": "Mon, 9 Mar 2015 15:58:38 GMT"
},
{
"version": "v5",
"created": "Wed, 30 Sep 2015 17:45:21 GMT"
},
{
"version": "v6",
"created": "Wed, 8 Feb 2017 12:35:02 GMT"
},
{
"version": "v7",
"created": "Thu, 9 Feb 2017 16:49:26 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Farrell",
"Matthew",
""
],
[
"Goodrich",
"Timothy",
""
],
[
"Lemons",
"Nathan",
""
],
[
"Reidl",
"Felix",
""
],
[
"Villaamil",
"Fernando Sánchez",
""
],
[
"Sullivan",
"Blair D.",
""
]
] |
new_dataset
| 0.966823 |
1603.08878
|
Alexander Barg
|
Itzhak Tamo, Alexander Barg, Sreechakra Goparaju, and Robert
Calderbank
|
Cyclic LRC Codes, binary LRC codes, and upper bounds on the distance of
cyclic codes
|
12pp., submitted for publication. An extended abstract of this
submission was posted earlier as arXiv:1502.01414 and was published in
Proceedings of the 2015 IEEE International Symposium on Information Theory,
Hong Kong, China, June 14-19, 2015, pp. 1262--1266
|
International Journal of Information and Coding Theory, vol. 3,
no. 4, pp.345-364 (2016)
|
10.1504/IJICOT.2016.079496
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider linear cyclic codes with the locality property, or locally
recoverable codes (LRC codes). A family of LRC codes that generalize the
classical construction of Reed-Solomon codes was constructed in a recent paper
by I. Tamo and A. Barg (IEEE Trans. Inform. Theory, no. 8, 2014). In this paper
we focus on optimal cyclic codes that arise from this construction. We give a
characterization of these codes in terms of their zeros, and observe that there
are many equivalent ways of constructing optimal cyclic LRC codes over a given
field. We also study subfield subcodes of cyclic LRC codes (BCH-like LRC codes)
and establish several results about their locality and minimum distance. The
locality parameter of a cyclic code is related to the dual distance of this
code, and we phrase our results in terms of upper bounds on the dual distance.
|
[
{
"version": "v1",
"created": "Tue, 29 Mar 2016 18:41:24 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Tamo",
"Itzhak",
""
],
[
"Barg",
"Alexander",
""
],
[
"Goparaju",
"Sreechakra",
""
],
[
"Calderbank",
"Robert",
""
]
] |
new_dataset
| 0.998469 |
1606.06698
|
Amin Ghafouri
|
Amin Ghafouri, Waseem Abbas, Yevgeniy Vorobeychik, and Xenofon
Koutsoukos
|
Vulnerability of Fixed-Time Control of Signalized Intersections to
Cyber-Tampering
| null |
9th International Symposium on Resilient Control Systems (ISRCS),
Chicago, IL, pp. 130-135 (2016)
| null | null |
cs.SY cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent experimental studies have shown that traffic management systems are
vulnerable to cyber-attacks on sensor data. This paper studies the
vulnerability of fixed-time control of signalized intersections when sensors
measuring traffic flow information are compromised and perturbed by an
adversary. The problems are formulated by considering three malicious
objectives: 1) worst-case network accumulation, which aims to destabilize the
overall network as much as possible; 2) worst-case lane accumulation, which
aims to cause worst-case accumulation on some target lanes; and 3) risk-averse
target accumulation, which aims to reach a target accumulation by making the
minimum perturbation to sensor data. The problems are solved using bilevel
programming optimization methods. Finally, a case study of a real network is
used to illustrate the results.
|
[
{
"version": "v1",
"created": "Tue, 21 Jun 2016 18:41:46 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jul 2016 18:43:11 GMT"
},
{
"version": "v3",
"created": "Wed, 8 Feb 2017 22:15:31 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Ghafouri",
"Amin",
""
],
[
"Abbas",
"Waseem",
""
],
[
"Vorobeychik",
"Yevgeniy",
""
],
[
"Koutsoukos",
"Xenofon",
""
]
] |
new_dataset
| 0.980706 |
1608.08324
|
Jean Cardinal
|
Jean Cardinal and Stefan Felsner
|
Topological Drawings of Complete Bipartite Graphs
|
A preliminary version appeared in the Proceedings of the 24th
International Symposium on Graph Drawing and Network Visualization (GD 2016)
| null | null | null |
cs.CG cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Topological drawings are natural representations of graphs in the plane,
where vertices are represented by points, and edges by curves connecting the
points. Topological drawings of complete graphs and of complete bipartite
graphs have been studied extensively in the context of crossing number
problems. We consider a natural class of simple topological drawings of
complete bipartite graphs, in which we require that one side of the vertex set
bipartition lies on the outer boundary of the drawing.
We investigate the combinatorics of such drawings. For this purpose, we
define combinatorial encodings of the drawings by enumerating the distinct
drawings of subgraphs isomorphic to $K_{2,2}$ and $K_{3,2}$, and investigate
the constraints they must satisfy. We prove that a drawing of $K_{k,n}$ exists
if and only if some simple local conditions are satisfied by the encodings.
This directly yields a polynomial-time algorithm for deciding the existence of
such a drawing given the encoding. We show the encoding is equivalent to
specifying which pairs of edges cross, yielding a similar polynomial-time
algorithm for the realizability of abstract topological graphs.
We also completely characterize and enumerate such drawings of $K_{k,n}$ in
which the order of the edges around each vertex is the same for vertices on the
same side of the bipartition. Finally, we investigate drawings of $K_{k,n}$
using straight lines and pseudolines, and consider the complexity of the
corresponding realizability problems.
|
[
{
"version": "v1",
"created": "Tue, 30 Aug 2016 04:38:19 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Feb 2017 11:29:09 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Cardinal",
"Jean",
""
],
[
"Felsner",
"Stefan",
""
]
] |
new_dataset
| 0.998705 |
1701.07544
|
Jekan Thangavelautham
|
Laksh Raura, Andrew Warren and Jekan Thangavelautham
|
Spherical Planetary Robot for Rugged Terrain Traversal
|
10 pages, 16 figures in Proceedings of the IEEE Aerospace Conference
2017
| null | null | null |
cs.RO astro-ph.IM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wheeled planetary rovers such as the Mars Exploration Rovers (MERs) and Mars
Science Laboratory (MSL) have provided unprecedented, detailed images of the
Mars surface. However, these rovers are large and are of high-cost as they need
to carry sophisticated instruments and science laboratories. We propose the
development of low-cost planetary rovers that are the size and shape of
cantaloupes and that can be deployed from a larger rover. The rover named
SphereX is 2 kg in mass, is spherical, holonomic and contains a hopping
mechanism to jump over rugged terrain. A small low-cost rover complements a
larger rover, particularly to traverse rugged terrain or roll down a canyon,
cliff or crater to obtain images and science data. While it may be a one-way
journey for these small robots, they could be used tactically to obtain
high-reward science data. The robot is equipped with a pair of stereo cameras
to perform visual navigation and has room for a science payload. In this paper,
we analyze the design and development of a laboratory prototype. The results
show a promising pathway towards development of a field system.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2017 01:54:15 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Feb 2017 16:21:07 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Raura",
"Laksh",
""
],
[
"Warren",
"Andrew",
""
],
[
"Thangavelautham",
"Jekan",
""
]
] |
new_dataset
| 0.999824 |
1702.02363
|
Bahadir Sahin
|
H. Bahadir Sahin, Caglar Tirkaz, Eray Yildiz, Mustafa Tolga Eren, Ozan
Sonmez
|
Automatically Annotated Turkish Corpus for Named Entity Recognition and
Text Categorization using Large-Scale Gazetteers
|
10 page, 1 figure, white paper, update: added correct download link
for dataset
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Turkish Wikipedia Named-Entity Recognition and Text Categorization (TWNERTC)
dataset is a collection of automatically categorized and annotated sentences
obtained from Wikipedia. We constructed large-scale gazetteers by using a graph
crawler algorithm to extract relevant entity and domain information from a
semantic knowledge base, Freebase. The constructed gazetteers contains
approximately 300K entities with thousands of fine-grained entity types under
77 different domains. Since automated processes are prone to ambiguity, we also
introduce two new content specific noise reduction methodologies. Moreover, we
map fine-grained entity types to the equivalent four coarse-grained types:
person, loc, org, misc. Eventually, we construct six different dataset versions
and evaluate the quality of annotations by comparing ground truths from human
annotators. We make these datasets publicly available to support studies on
Turkish named-entity recognition (NER) and text categorization (TC).
|
[
{
"version": "v1",
"created": "Wed, 8 Feb 2017 10:45:23 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Feb 2017 08:35:12 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Sahin",
"H. Bahadir",
""
],
[
"Tirkaz",
"Caglar",
""
],
[
"Yildiz",
"Eray",
""
],
[
"Eren",
"Mustafa Tolga",
""
],
[
"Sonmez",
"Ozan",
""
]
] |
new_dataset
| 0.999715 |
1702.02588
|
Assaf Eisenman
|
Assaf Eisenman, Asaf Cidon, Evgenya Pergament, Or Haimovich, Ryan
Stutsman, Mohammad Alizadeh, and Sachin Katti
|
Flashield: a Key-value Cache that Minimizes Writes to Flash
| null | null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As its price per bit drops, SSD is increasingly becoming the default storage
medium for cloud application databases. However, it has not become the
preferred storage medium for key-value caches, even though SSD offers more than
10x lower price per bit and sufficient performance compared to DRAM. This is
because key-value caches need to frequently insert, update and evict small
objects. This causes excessive writes and erasures on flash storage, since
flash only supports writes and erasures of large chunks of data. These
excessive writes and erasures significantly shorten the lifetime of flash,
rendering it impractical to use for key-value caches. We present Flashield, a
hybrid key-value cache that uses DRAM as a "filter" to minimize writes to SSD.
Flashield performs light-weight machine learning profiling to predict which
objects are likely to be read frequently before getting updated; these objects,
which are prime candidates to be stored on SSD, are written to SSD in large
chunks sequentially. In order to efficiently utilize the cache's available
memory, we design a novel in-memory index for the variable-sized objects stored
on flash that requires only 4 bytes per object in DRAM. We describe Flashield's
design and implementation and, we evaluate it on a real-world cache trace.
Compared to state-of-the-art systems that suffer a write amplification of 2.5x
or more, Flashield maintains a median write amplification of 0.5x without any
loss of hit rate or throughput.
|
[
{
"version": "v1",
"created": "Wed, 8 Feb 2017 19:21:13 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Eisenman",
"Assaf",
""
],
[
"Cidon",
"Asaf",
""
],
[
"Pergament",
"Evgenya",
""
],
[
"Haimovich",
"Or",
""
],
[
"Stutsman",
"Ryan",
""
],
[
"Alizadeh",
"Mohammad",
""
],
[
"Katti",
"Sachin",
""
]
] |
new_dataset
| 0.998373 |
1702.02671
|
Sian-Jheng Lin
|
Sian-Jheng Lin
|
On the Local Correctabilities of Projective Reed-Muller Codes
| null | null | null | null |
cs.IT math.IT
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
In this paper, we show that the projective Reed-Muller~(PRM) codes form a
family of locally correctable codes~(LCC) in the regime of low query
complexities. A PRM code is specified by the alphabet size $q$, the number of
variables $m$, and the degree $d$. When $d\leq q-1$, we present a perfectly
smooth local decoder to recover a symbol by accessing $\gamma\leq q$ symbols to
the coordinates fall on a line. There are three major parameters considered in
LCCs, namely the query complexity, the message length and the code length. This
paper shows that PRM codes are shorter than generalized Reed-Muller~(GRM) codes
in LCCs. Precisely, given a GRM code over a field of size $q$, there exists a
class of shorter codes over a field of size $q-1$, while maintaining the same
values on the query complexities and the message lengths.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2017 01:32:26 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Lin",
"Sian-Jheng",
""
]
] |
new_dataset
| 0.997014 |
1702.02695
|
Mingming Cai
|
Mingming Cai and J. Nicholas Laneman
|
Wideband Distributed Spectrum Sharing with Multichannel Immediate
Multiple Access
|
16 pages, to be published in Analog Integrated Circuits and Signal
Processing
| null |
10.1007/s10470-017-0934-2
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes a radio architecture for distributed spectrum sharing of
multiple channels among secondary users (SUs) in a wide band of frequencies and
a localized area. A novel Multichannel Immediate Multiple Access (MIMA)
physical layer is developed such that each SU can monitor all the channels
simultaneously for incoming signals and achieve fast rendezvous within the
multiple channels. The spectrum utilized by an SU pair can be changed
dynamically based upon spectrum sensing at the transmitter and tracking
synchronization and control messages at the receiver. Although information
about the number of active SUs can be used to improve the spectrum sharing
efficiency, the improvement is small relative to the cost of obtaining such
information. Therefore, the architecture adopts Multichannel Carrier Sense
Multiple Access (CSMA) for medium access control regardless of the number of
active SUs. A prototype implementation of the architecture has been developed
using an advanced software defined radio (SDR) platform. System tests
demonstrate that the spectrum sharing efficiency of the prototype is close to
an upper bound if the signal-to-noise ratio (SNR) is sufficiently high. Among
other practical issues, imaged interference caused by hardware IQ imbalance
limits system performance. In the prototype, the MIMA is based on an LTE
waveform. Therefore, the spectrum sharing radio can be potentially applied to
the 3.5 GHz radar band for Citizens Broadband Radio Service (CBRS).
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2017 04:11:32 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Cai",
"Mingming",
""
],
[
"Laneman",
"J. Nicholas",
""
]
] |
new_dataset
| 0.973812 |
1702.02716
|
Shan Lu
|
Shan Lu, Horoshi Kamabe, Jun Cheng and Akira Yamawaki
|
Construction of Unrestricted Rate Parallel Random Input Output Code
| null | null | null | null |
cs.IT math.IT
|
http://creativecommons.org/publicdomain/zero/1.0/
|
A coding scheme for two-page unrestricted-rate PRIO code that each page may
have different code rates is proposed. In the second page, the code for each
messages consists of two complementary codewords with code length n. There are
a total of 2n-1 codes which are disjoint to guarantees uniquely decodable for
2n-1 messages. In the first page, the code for each message consists of all
weight-u vectors with their non-zero elements restricted to (2u-1) same
positions, where non-negative integer u is less than or equal to half of code
length. Finding codes to be disjoint in first page is equivalent to
construction of constant-weight codes, and the numbers of disjoint codes are
the best-known numbers of codewords in constant-weight codes. Our coding scheme
is constructive, and the code length is arbitrary.The sum rates of our proposed
codes are higher than those of previous work.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2017 06:11:30 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Lu",
"Shan",
""
],
[
"Kamabe",
"Horoshi",
""
],
[
"Cheng",
"Jun",
""
],
[
"Yamawaki",
"Akira",
""
]
] |
new_dataset
| 0.966718 |
1702.02722
|
Junlin Yu
|
Junlin Yu, Man Hon Cheung, Jianwei Huang, H. Vincent Poor
|
Mobile Data Trading: Behavioral Economics Analysis and Algorithm Design
|
21 pages, 12 figures
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by the recently launched mobile data trading markets (e.g., China
Mobile Hong Kong's 2nd exChange Market), in this paper we study the mobile data
trading problem under the future data demand uncertainty. We introduce a
brokerage-based market, where sellers and buyers propose their selling and
buying quantities, respectively, to the trading platform that matches the
market supply and demand. To understand the users' realistic trading behaviors,
a prospect theory (PT) model from behavioral economics is proposed, which
includes the widely adopted expected utility theory (EUT) as a special case.
Although the PT modeling leads to a challenging non-convex optimization
problem, the optimal solution can be characterized by exploiting the unimodal
structure of the objective function. Building upon our analysis, we design an
algorithm to help estimate the user's risk preference and provide trading
recommendations dynamically, considering the latest market and usage
information. It is shown in our simulation that the risk preferences have a
significant impact on the user's decision and outcome: a risk-averse dominant
user can guarantee a higher minimum profit in the trading, while a risk-seeking
dominant user can achieve a higher maximum profit. By comparing with the EUT
benchmark, it is shown that a PT user with a low reference point is more
willing to buy mobile data. Moreover, when the probability of high future data
demand is low, a PT user is more willing to buy mobile data due to the
probability distortion comparing with an EUT user.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2017 06:40:10 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Yu",
"Junlin",
""
],
[
"Cheung",
"Man Hon",
""
],
[
"Huang",
"Jianwei",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
new_dataset
| 0.998274 |
1702.02799
|
Sheng Wang
|
Anh Dinh, Ji Wang, Sheng Wang, Gang Chen, Wei-Ngan Chin, Qian Lin,
Beng Chin Ooi, Pingcheng Ruan, Kian-Lee Tan, Zhongle Xie, Hao Zhang, and
Meihui Zhang
|
UStore: A Distributed Storage With Rich Semantics
|
21 pages
| null | null | null |
cs.DB cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today's storage systems expose abstractions which are either too low-level
(e.g., key-value store, raw-block store) that they require developers to
re-invent the wheels, or too high-level (e.g., relational databases, Git) that
they lack generality to support many classes of applications. In this work, we
propose and implement a general distributed data storage system, called UStore,
which has rich semantics. UStore delivers three key properties, namely
immutability, sharing and security, which unify and add values to many classes
of today's applications, and which also open the door for new applications. By
keeping the core properties within the storage, UStore helps reduce application
development efforts while offering high performance at hand. The storage
embraces current hardware trends as key enablers. It is built around a
data-structure similar to that of Git, a popular source code versioning system,
but it also synthesizes many designs from distributed systems and databases.
Our current implementation of UStore has better performance than general
in-memory key-value storage systems, especially for version scan operations. We
port and evaluate four applications on top of UStore: a Git-like application, a
collaborative data science application, a transaction management application,
and a blockchain application. We demonstrate that UStore enables faster
development and the UStore-backed applications can have better performance than
the existing implementations.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2017 12:06:37 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Dinh",
"Anh",
""
],
[
"Wang",
"Ji",
""
],
[
"Wang",
"Sheng",
""
],
[
"Chen",
"Gang",
""
],
[
"Chin",
"Wei-Ngan",
""
],
[
"Lin",
"Qian",
""
],
[
"Ooi",
"Beng Chin",
""
],
[
"Ruan",
"Pingcheng",
""
],
[
"Tan",
"Kian-Lee",
""
],
[
"Xie",
"Zhongle",
""
],
[
"Zhang",
"Hao",
""
],
[
"Zhang",
"Meihui",
""
]
] |
new_dataset
| 0.999676 |
1702.02805
|
Qi Guo
|
Qi Guo, Ce Zhu, Zhiqiang Xia, Zhengtao Wang, Yipeng Liu
|
Attribute-controlled face photo synthesis from simple line drawing
|
5 pages, 5 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Face photo synthesis from simple line drawing is a one-to-many task as simple
line drawing merely contains the contour of human face. Previous exemplar-based
methods are over-dependent on the datasets and are hard to generalize to
complicated natural scenes. Recently, several works utilize deep neural
networks to increase the generalization, but they are still limited in the
controllability of the users. In this paper, we propose a deep generative model
to synthesize face photo from simple line drawing controlled by face attributes
such as hair color and complexion. In order to maximize the controllability of
face attributes, an attribute-disentangled variational auto-encoder (AD-VAE) is
firstly introduced to learn latent representations disentangled with respect to
specified attributes. Then we conduct photo synthesis from simple line drawing
based on AD-VAE. Experiments show that our model can well disentangle the
variations of attributes from other variations of face photos and synthesize
detailed photorealistic face images with desired attributes. Regarding
background and illumination as the style and human face as the content, we can
also synthesize face photos with the target style of a style photo.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2017 12:21:36 GMT"
}
] | 2017-02-10T00:00:00 |
[
[
"Guo",
"Qi",
""
],
[
"Zhu",
"Ce",
""
],
[
"Xia",
"Zhiqiang",
""
],
[
"Wang",
"Zhengtao",
""
],
[
"Liu",
"Yipeng",
""
]
] |
new_dataset
| 0.991264 |
1401.1448
|
Denis Kuperberg
|
Denis Kuperberg
|
Linear Temporal Logic for Regular Cost Functions
|
37 pages, 13 figures, accepted to LMCS, updated version 08/02/2017
|
Logical Methods in Computer Science, Volume 10, Issue 1 (February
4, 2014) lmcs:1222
|
10.2168/LMCS-10(1:4)2014
| null |
cs.LO cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Regular cost functions have been introduced recently as an extension to the
notion of regular languages with counting capabilities, which retains strong
closure, equivalence, and decidability properties. The specificity of cost
functions is that exact values are not considered, but only estimated. In this
paper, we define an extension of Linear Temporal Logic (LTL) over finite words
to describe cost functions. We give an explicit translation from this new logic
to two dual form of cost automata, and we show that the natural decision
problems for this logic are PSPACE-complete, as it is the case in the classical
setting. We then algebraically characterize the expressive power of this logic,
using a new syntactic congruence for cost functions introduced in this paper.
|
[
{
"version": "v1",
"created": "Tue, 7 Jan 2014 17:24:18 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Feb 2014 22:02:49 GMT"
},
{
"version": "v3",
"created": "Thu, 8 May 2014 16:06:09 GMT"
},
{
"version": "v4",
"created": "Tue, 7 Feb 2017 16:35:41 GMT"
},
{
"version": "v5",
"created": "Wed, 8 Feb 2017 12:52:42 GMT"
}
] | 2017-02-09T00:00:00 |
[
[
"Kuperberg",
"Denis",
""
]
] |
new_dataset
| 0.984433 |
1602.05314
|
Tobias Weyand
|
Tobias Weyand, Ilya Kostrikov, James Philbin
|
PlaNet - Photo Geolocation with Convolutional Neural Networks
| null | null |
10.1007/978-3-319-46484-8_3
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Is it possible to build a system to determine the location where a photo was
taken using just its pixels? In general, the problem seems exceptionally
difficult: it is trivial to construct situations where no location can be
inferred. Yet images often contain informative cues such as landmarks, weather
patterns, vegetation, road markings, and architectural details, which in
combination may allow one to determine an approximate location and occasionally
an exact location. Websites such as GeoGuessr and View from your Window suggest
that humans are relatively good at integrating these cues to geolocate images,
especially en-masse. In computer vision, the photo geolocation problem is
usually approached using image retrieval methods. In contrast, we pose the
problem as one of classification by subdividing the surface of the earth into
thousands of multi-scale geographic cells, and train a deep network using
millions of geotagged images. While previous approaches only recognize
landmarks or perform approximate matching using global image descriptors, our
model is able to use and integrate multiple visible cues. We show that the
resulting model, called PlaNet, outperforms previous approaches and even
attains superhuman levels of accuracy in some cases. Moreover, we extend our
model to photo albums by combining it with a long short-term memory (LSTM)
architecture. By learning to exploit temporal coherence to geolocate uncertain
photos, we demonstrate that this model achieves a 50% performance improvement
over the single-image model.
|
[
{
"version": "v1",
"created": "Wed, 17 Feb 2016 06:27:55 GMT"
}
] | 2017-02-09T00:00:00 |
[
[
"Weyand",
"Tobias",
""
],
[
"Kostrikov",
"Ilya",
""
],
[
"Philbin",
"James",
""
]
] |
new_dataset
| 0.999224 |
1608.07547
|
Caroline Trippel
|
Caroline Trippel, Yatin A. Manerkar, Daniel Lustig, Michael Pellauer,
Margaret Martonosi
|
TriCheck: Memory Model Verification at the Trisection of Software,
Hardware, and ISA
|
Proceedings of the Twenty-Second International Conference on
Architectural Support for Programming Languages and Operating Systems
| null |
10.1145/3037697.3037719
| null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Memory consistency models (MCMs) which govern inter-module interactions in a
shared memory system, are a significant, yet often under-appreciated, aspect of
system design. MCMs are defined at the various layers of the hardware-software
stack, requiring thoroughly verified specifications, compilers, and
implementations at the interfaces between layers. Current verification
techniques evaluate segments of the system stack in isolation, such as proving
compiler mappings from a high-level language (HLL) to an ISA or proving
validity of a microarchitectural implementation of an ISA.
This paper makes a case for full-stack MCM verification and provides a
toolflow, TriCheck, capable of verifying that the HLL, compiler, ISA, and
implementation collectively uphold MCM requirements. The work showcases
TriCheck's ability to evaluate a proposed ISA MCM in order to ensure that each
layer and each mapping is correct and complete. Specifically, we apply TriCheck
to the open source RISC-V ISA, seeking to verify accurate, efficient, and legal
compilations from C11. We uncover under-specifications and potential
inefficiencies in the current RISC-V ISA documentation and identify possible
solutions for each. As an example, we find that a RISC-V-compliant
microarchitecture allows 144 outcomes forbidden by C11 to be observed out of
1,701 litmus tests examined. Overall, this paper demonstrates the necessity of
full-stack verification for detecting MCM-related bugs in the hardware-software
stack.
|
[
{
"version": "v1",
"created": "Fri, 26 Aug 2016 18:13:57 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Feb 2017 17:45:52 GMT"
}
] | 2017-02-09T00:00:00 |
[
[
"Trippel",
"Caroline",
""
],
[
"Manerkar",
"Yatin A.",
""
],
[
"Lustig",
"Daniel",
""
],
[
"Pellauer",
"Michael",
""
],
[
"Martonosi",
"Margaret",
""
]
] |
new_dataset
| 0.968325 |
1611.07302
|
Rodolfo Reyes-B\'aez
|
Rodolfo Reyes-B\'aez, Arjan van der Schaft, Bayu Jayawardhana
|
Tracking Control of Fully-actuated Mechanical port-Hamiltonian Systems
using Sliding Manifolds and Contraction
|
7 pages, 3 figures
| null | null | null |
cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a novel trajectory tracking controller for
fully-actuated mechanical port-Hamiltonian (pH) systems, which is based on
recent advances in contraction-based control theory. Our proposed controller
renders a desired sliding manifold (where the reference trajectory lies)
attractive by making the corresponding error system partially contracting.
Finally, we present numerical simulation results where a SCARA robot is
commanded by our proposed tracking control law.
|
[
{
"version": "v1",
"created": "Tue, 22 Nov 2016 13:59:22 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Jan 2017 10:47:28 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Feb 2017 10:48:05 GMT"
},
{
"version": "v4",
"created": "Wed, 8 Feb 2017 01:40:00 GMT"
}
] | 2017-02-09T00:00:00 |
[
[
"Reyes-Báez",
"Rodolfo",
""
],
[
"van der Schaft",
"Arjan",
""
],
[
"Jayawardhana",
"Bayu",
""
]
] |
new_dataset
| 0.99358 |
1702.00483
|
Jason Y. Du
|
Chengkai Guo, Jason Y. Du
|
FPGA-based real-time 105-channel data acquisition platform for imaging
system
|
This paper has been withdrawn by the author due to a crucial sign
error in figure 1
| null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a real-time 105-channel data acquisition platform based on
FPGA for imaging will be implemented for mm-wave imaging systems. PC platform
is also realized for imaging results monitoring purpose. Mm-wave imaging
expands our vision by letting us see things under poor visibility conditions.
With this extended vision ability, a wide range of military imaging missions
would benefit, such as surveillance, precision targeting, navigation, and
rescue. Based on the previously designed imager modules, this project would go
on finishing the PCB design (both schematic and layout) of the following signal
processing systems consisting of Programmable Gain Amplifier(PGA) (4 PGA for
each ADC) and 16-channel Analog to Digital Converter (ADC) (7 ADC in total).
Then the system verification would be performed on the Artix-7 35T Arty FPGA
with the developing of proper controlling code to configure the ADC and realize
the communication between the FPGA and the PC (through both UART and Ethernet).
For the verification part, a simple test on a breadboard with a simple analog
input (generated from a resistor divider) would first be performed. After the
PCB design is finished, the whole system would be tested again with a precise
reference and analog input.
|
[
{
"version": "v1",
"created": "Wed, 18 Jan 2017 01:08:14 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Feb 2017 18:13:55 GMT"
}
] | 2017-02-09T00:00:00 |
[
[
"Guo",
"Chengkai",
""
],
[
"Du",
"Jason Y.",
""
]
] |
new_dataset
| 0.998754 |
1702.02497
|
Dalin Zhu
|
Dalin Zhu and Junil Choi and Robert W. Heath Jr
|
Two-Dimensional AoD and AoA Acquisition for Wideband mmWave Systems with
Cross-Polarized MIMO
|
Submitted to IEEE Transactions on Wireless Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a novel two-dimensional super-resolution angle-of-departure
(AoD) and angle-of-arrival (AoA) estimation technique is proposed for wideband
millimeter-wave multiple-input multiple-output systems with cross-polarized
antenna elements. The key ingredient of the proposed method is to form custom
designed beam pairs, and devise an invertible function of the AoD/AoA to be
estimated from the corresponding beam pairs. Further, a new multi-layer
reference signal structure is developed for the proposed method to facilitate
angle estimation for wideband channels with cross-polarized antenna elements.
To facilitate feedback in closed-loop frequency division duplexing systems, a
novel differential feedback strategy is proposed aiming at feedback reduction
for the two-dimensional angle estimation. Numerical results demonstrate that by
using the proposed method, good azimuth/elevation AoD and AoA estimation
performance can be achieved under different levels of signal-to-noise ratio,
channel conditions, and antenna array configurations.
|
[
{
"version": "v1",
"created": "Wed, 8 Feb 2017 16:28:41 GMT"
}
] | 2017-02-09T00:00:00 |
[
[
"Zhu",
"Dalin",
""
],
[
"Choi",
"Junil",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] |
new_dataset
| 0.998067 |
1506.04787
|
Olalekan Ogunmolu
|
Olalekan Ogunmolu, Xuejun Gu, Steve Jiang, Nicholas Gans
|
A Real-Time Soft Robotic Patient Positioning System for Maskless
Head-and-Neck Cancer Radiotherapy: An Initial Investigation
|
IEEE Conference on Automation Science and Engineering, Gothenburg,
Sweden. 2015. Life Sciences and Health Care; Mechatronics; Emerging Topics in
Automation
| null |
10.1118/1.4924100
| null |
cs.RO
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
We present an initial examination of a novel approach to accurately position
a patient during head and neck intensity modulated radiotherapy (IMRT).
Position-based visual-servoing of a radio-transparent soft robot is used to
control the flexion/extension cranial motion of a manikin head. A Kinect RGB-D
camera is used to measure head position and the error between the sensed and
desired position is used to control a pneumatic system which regulates pressure
within an inflatable air bladder (IAB). Results show that the system is capable
of controlling head motion to within 2mm with respect to a reference
trajectory. This establishes proof-of-concept that using multiple IABs and
actuators can improve cancer treatment.
|
[
{
"version": "v1",
"created": "Mon, 15 Jun 2015 22:08:49 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Sep 2015 22:29:03 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Ogunmolu",
"Olalekan",
""
],
[
"Gu",
"Xuejun",
""
],
[
"Jiang",
"Steve",
""
],
[
"Gans",
"Nicholas",
""
]
] |
new_dataset
| 0.992162 |
1611.02205
|
Nadav Bhonker
|
Nadav Bhonker, Shai Rozenberg and Itay Hubara
|
Playing SNES in the Retro Learning Environment
| null | null | null | null |
cs.LG cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mastering a video game requires skill, tactics and strategy. While these
attributes may be acquired naturally by human players, teaching them to a
computer program is a far more challenging task. In recent years, extensive
research was carried out in the field of reinforcement learning and numerous
algorithms were introduced, aiming to learn how to perform human tasks such as
playing video games. As a result, the Arcade Learning Environment (ALE)
(Bellemare et al., 2013) has become a commonly used benchmark environment
allowing algorithms to train on various Atari 2600 games. In many games the
state-of-the-art algorithms outperform humans. In this paper we introduce a new
learning environment, the Retro Learning Environment --- RLE, that can run
games on the Super Nintendo Entertainment System (SNES), Sega Genesis and
several other gaming consoles. The environment is expandable, allowing for more
video games and consoles to be easily added to the environment, while
maintaining the same interface as ALE. Moreover, RLE is compatible with Python
and Torch. SNES games pose a significant challenge to current algorithms due to
their higher level of complexity and versatility.
|
[
{
"version": "v1",
"created": "Mon, 7 Nov 2016 18:33:38 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Feb 2017 18:50:50 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Bhonker",
"Nadav",
""
],
[
"Rozenberg",
"Shai",
""
],
[
"Hubara",
"Itay",
""
]
] |
new_dataset
| 0.999518 |
1611.08481
|
Harm de Vries
|
Harm de Vries, Florian Strub, Sarath Chandar, Olivier Pietquin, Hugo
Larochelle, Aaron Courville
|
GuessWhat?! Visual object discovery through multi-modal dialogue
|
23 pages; CVPR 2017 submission; see https://guesswhat.ai
| null | null | null |
cs.AI cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce GuessWhat?!, a two-player guessing game as a testbed for
research on the interplay of computer vision and dialogue systems. The goal of
the game is to locate an unknown object in a rich image scene by asking a
sequence of questions. Higher-level image understanding, like spatial reasoning
and language grounding, is required to solve the proposed task. Our key
contribution is the collection of a large-scale dataset consisting of 150K
human-played games with a total of 800K visual question-answer pairs on 66K
images. We explain our design decisions in collecting the dataset and introduce
the oracle and questioner tasks that are associated with the two players of the
game. We prototyped deep learning models to establish initial baselines of the
introduced tasks.
|
[
{
"version": "v1",
"created": "Wed, 23 Nov 2016 20:56:13 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Feb 2017 12:52:53 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"de Vries",
"Harm",
""
],
[
"Strub",
"Florian",
""
],
[
"Chandar",
"Sarath",
""
],
[
"Pietquin",
"Olivier",
""
],
[
"Larochelle",
"Hugo",
""
],
[
"Courville",
"Aaron",
""
]
] |
new_dataset
| 0.995409 |
1611.09830
|
Tong Wang
|
Adam Trischler, Tong Wang, Xingdi Yuan, Justin Harris, Alessandro
Sordoni, Philip Bachman, Kaheer Suleman
|
NewsQA: A Machine Comprehension Dataset
| null | null | null | null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present NewsQA, a challenging machine comprehension dataset of over
100,000 human-generated question-answer pairs. Crowdworkers supply questions
and answers based on a set of over 10,000 news articles from CNN, with answers
consisting of spans of text from the corresponding articles. We collect this
dataset through a four-stage process designed to solicit exploratory questions
that require reasoning. A thorough analysis confirms that NewsQA demands
abilities beyond simple word matching and recognizing textual entailment. We
measure human performance on the dataset and compare it to several strong
neural models. The performance gap between humans and machines (0.198 in F1)
indicates that significant progress can be made on NewsQA through future
research. The dataset is freely available at
https://datasets.maluuba.com/NewsQA.
|
[
{
"version": "v1",
"created": "Tue, 29 Nov 2016 20:38:07 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Dec 2016 18:12:57 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Feb 2017 16:27:59 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Trischler",
"Adam",
""
],
[
"Wang",
"Tong",
""
],
[
"Yuan",
"Xingdi",
""
],
[
"Harris",
"Justin",
""
],
[
"Sordoni",
"Alessandro",
""
],
[
"Bachman",
"Philip",
""
],
[
"Suleman",
"Kaheer",
""
]
] |
new_dataset
| 0.999814 |
1612.02170
|
Odysseas Zografos
|
Odysseas Zografos, Sourav Dutta, Mauricio Manfrini, Adrien Vaysset,
Bart Sor\'ee, Azad Naeemi, Praveen Raghavan, Rudy Lauwereins, Iuliana P. Radu
|
Non-volatile spin wave majority gate at the nanoscale
| null |
AIP Advances, Volume 7, Issue 5, 2017
|
10.1063/1.4975693
| null |
cs.ET cond-mat.mes-hall
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A spin wave majority fork-like structure with feature size of 40\,nm, is
presented and investigated, through micromagnetic simulations. The structure
consists of three merging out-of-plane magnetization spin wave buses and four
magneto-electric cells serving as three inputs and an output. The information
of the logic signals is encoded in the phase of the transmitted spin waves and
subsequently stored as direction of magnetization of the magneto-electric cells
upon detection. The minimum dimensions of the structure that produce an
operational majority gate are identified. For all input combinations, the
detection scheme employed manages to capture the majority phase result of the
spin wave interference and ignore all reflection effects induced by the
geometry of the structure.
|
[
{
"version": "v1",
"created": "Wed, 7 Dec 2016 09:51:29 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Zografos",
"Odysseas",
""
],
[
"Dutta",
"Sourav",
""
],
[
"Manfrini",
"Mauricio",
""
],
[
"Vaysset",
"Adrien",
""
],
[
"Sorée",
"Bart",
""
],
[
"Naeemi",
"Azad",
""
],
[
"Raghavan",
"Praveen",
""
],
[
"Lauwereins",
"Rudy",
""
],
[
"Radu",
"Iuliana P.",
""
]
] |
new_dataset
| 0.999268 |
1701.04148
|
Dongsheng Yang
|
Tong Yang, Lingtong Liu, Yibo Yan, Muhammad Shahzad, Yulong Shen,
Xiaoming Li, Bin Cui, Gaogang Xie
|
SF-sketch: A Two-stage Sketch for Data Streams
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A sketch is a probabilistic data structure used to record frequencies of
items in a multi-set. Sketches are widely used in various fields, especially
those that involve processing and storing data streams. In streaming
applications with high data rates, a sketch "fills up" very quickly. Thus, its
contents are periodically transferred to the remote collector, which is
responsible for answering queries. In this paper, we propose a new sketch,
called Slim-Fat (SF) sketch, which has a significantly higher accuracy compared
to prior art, a much smaller memory footprint, and at the same time achieves
the same speed as the best prior sketch. The key idea behind our proposed
SF-sketch is to maintain two separate sketches: a small sketch called
Slim-subsketch and a large sketch called Fat-subsketch. The Slim-subsketch is
periodically transferred to the remote collector for answering queries quickly
and accurately. The Fat-subsketch, however, is not transferred to the remote
collector because it is used only to assist the Slim-subsketch during the
insertions and deletions and is not used to answer queries. We implemented and
extensively evaluated SF-sketch along with several prior sketches and compared
them side by side. Our experimental results show that SF-sketch outperforms the
most widely used CM-sketch by up to 33.1 times in terms of accuracy. We have
released the source codes of our proposed sketch as well as existing sketches
at Github. The short version of this paper will appear in ICDE 2017.
|
[
{
"version": "v1",
"created": "Mon, 16 Jan 2017 02:51:22 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Jan 2017 14:52:10 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Feb 2017 14:42:46 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Yang",
"Tong",
""
],
[
"Liu",
"Lingtong",
""
],
[
"Yan",
"Yibo",
""
],
[
"Shahzad",
"Muhammad",
""
],
[
"Shen",
"Yulong",
""
],
[
"Li",
"Xiaoming",
""
],
[
"Cui",
"Bin",
""
],
[
"Xie",
"Gaogang",
""
]
] |
new_dataset
| 0.996427 |
1702.01160
|
Hao Fu
|
Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra
|
LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in
Mobile Applications
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile applications (apps) often transmit sensitive data through network with
various intentions. Some transmissions are needed to fulfill the app's
functionalities. However, transmissions with malicious receivers may lead to
privacy leakage and tend to behave stealthily to evade detection. The problem
is twofold: how does one unveil sensitive transmissions in mobile apps, and
given a sensitive transmission, how does one determine if it is legitimate?
In this paper, we propose LeakSemantic, a framework that can automatically
locate abnormal sensitive network transmissions from mobile apps. LeakSemantic
consists of a hybrid program analysis component and a machine learning
component. Our program analysis component combines static analysis and dynamic
analysis to precisely identify sensitive transmissions. Compared to existing
taint analysis approaches, LeakSemantic achieves better accuracy with fewer
false positives and is able to collect runtime data such as network traffic for
each transmission. Based on features derived from the runtime data, machine
learning classifiers are built to further differentiate between the legal and
illegal disclosures. Experiments show that LeakSemantic achieves 91% accuracy
on 2279 sensitive connections from 1404 apps.
|
[
{
"version": "v1",
"created": "Fri, 3 Feb 2017 21:07:59 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Feb 2017 01:24:59 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Fu",
"Hao",
""
],
[
"Zheng",
"Zizhan",
""
],
[
"Bose",
"Somdutta",
""
],
[
"Bishop",
"Matt",
""
],
[
"Mohapatra",
"Prasant",
""
]
] |
new_dataset
| 0.998842 |
1702.01805
|
Renato J Cintra
|
F. M. Bayer, R. J. Cintra, A. Edirisuriya, A. Madanayake
|
A Digital Hardware Fast Algorithm and FPGA-based Prototype for a Novel
16-point Approximate DCT for Image Compression Applications
|
17 pages, 6 figures, 6 tables
|
Measurement Science and Technology, Volume 23, Number 11, 2012
|
10.1088/0957-0233/23/11/114010
| null |
cs.MM cs.AR cs.DS cs.IT math.IT stat.ME
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The discrete cosine transform (DCT) is the key step in many image and video
coding standards. The 8-point DCT is an important special case, possessing
several low-complexity approximations widely investigated. However, 16-point
DCT transform has energy compaction advantages. In this sense, this paper
presents a new 16-point DCT approximation with null multiplicative complexity.
The proposed transform matrix is orthogonal and contains only zeros and ones.
The proposed transform outperforms the well-know Walsh-Hadamard transform and
the current state-of-the-art 16-point approximation. A fast algorithm for the
proposed transform is also introduced. This fast algorithm is experimentally
validated using hardware implementations that are physically realized and
verified on a 40 nm CMOS Xilinx Virtex-6 XC6VLX240T FPGA chip for a maximum
clock rate of 342 MHz. Rapid prototypes on FPGA for 8-bit input word size shows
significant improvement in compressed image quality by up to 1-2 dB at the cost
of only eight adders compared to the state-of-art 16-point DCT approximation
algorithm in the literature [S. Bouguezel, M. O. Ahmad, and M. N. S. Swamy. A
novel transform for image compression. In {\em Proceedings of the 53rd IEEE
International Midwest Symposium on Circuits and Systems (MWSCAS)}, 2010].
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2017 22:00:34 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Bayer",
"F. M.",
""
],
[
"Cintra",
"R. J.",
""
],
[
"Edirisuriya",
"A.",
""
],
[
"Madanayake",
"A.",
""
]
] |
new_dataset
| 0.974115 |
1702.01870
|
Ameer Pasha Hosseinbor
|
A. Pasha Hosseinbor, Renat Zhdanov, Alexander Ushveridze
|
A New Point-set Registration Algorithm for Fingerprint Matching
|
Point pattern matching, point-set registration, fingerprint, minutia
matching, alignment
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel minutia-based fingerprint matching algorithm is proposed that employs
iterative global alignment on two minutia sets. The matcher considers all
possible minutia pairings and iteratively aligns the two sets until the number
of minutia pairs does not exceed the maximum number of allowable one-to-one
pairings. The optimal alignment parameters are derived analytically via linear
least squares. The first alignment establishes a region of overlap between the
two minutia sets, which is then (iteratively) refined by each successive
alignment. After each alignment, minutia pairs that exhibit weak correspondence
are discarded. The process is repeated until the number of remaining pairs no
longer exceeds the maximum number of allowable one-to-one pairings. The
proposed algorithm is tested on both the FVC2000 and FVC2002 databases, and the
results indicate that the proposed matcher is both effective and efficient for
fingerprint authentication; it is fast and does not utilize any computationally
expensive mathematical functions (e.g. trigonometric, exponential). In addition
to the proposed matcher, another contribution of the paper is the analytical
derivation of the least squares solution for the optimal alignment parameters
for two point-sets lacking exact correspondence.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2017 03:43:31 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Hosseinbor",
"A. Pasha",
""
],
[
"Zhdanov",
"Renat",
""
],
[
"Ushveridze",
"Alexander",
""
]
] |
new_dataset
| 0.989762 |
1702.01872
|
Jeremy Yallop
|
Jeremy Yallop (University of Cambridge) and Damien Doligez (INRIA)
|
Proceedings ML Family / OCaml Users and Developers workshops
| null |
EPTCS 241, 2017
|
10.4204/EPTCS.241
| null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This volume contains the joint post-proceedings of the 2015 edition of the ML
Family Workshop and OCaml Users and Developers Workshop, held in Vancouver,
British Columbia, Canada, in affiliation with ICFP 2015.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2017 03:55:07 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Yallop",
"Jeremy",
"",
"University of Cambridge"
],
[
"Doligez",
"Damien",
"",
"INRIA"
]
] |
new_dataset
| 0.981341 |
1702.01894
|
Shaoshan Liu
|
Shaoshan Liu, Jie Tang, Zhe Zhang, and Jean-Luc Gaudiot
|
CAAD: Computer Architecture for Autonomous Driving
|
7 pages, 4 figures, accepted by IEEE Computer Magazine
| null | null | null |
cs.AR cs.RO
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
We describe the computing tasks involved in autonomous driving, examine
existing autonomous driving computing platform implementations. To enable
autonomous driving, the computing stack needs to simultaneously provide high
performance, low power consumption, and low thermal dissipation, at low cost.
We discuss possible approaches to design computing platforms that will meet
these needs.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2017 06:55:03 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Liu",
"Shaoshan",
""
],
[
"Tang",
"Jie",
""
],
[
"Zhang",
"Zhe",
""
],
[
"Gaudiot",
"Jean-Luc",
""
]
] |
new_dataset
| 0.999548 |
1702.02063
|
Thanh Nho Do
|
Thanh Nho Do, Tegoeh Tjahjowidodo, Michael Wai Shing Lau, and Soo Jay
Phee
|
Performance Control of Tendon-Driven Endoscopic Surgical Robots With
Friction and Hysteresis
|
8 pages, 11 figures
| null | null | null |
cs.RO math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this study, a new position control scheme for the tendon-sheath mechanism
(TSM) which is used in flexible medical devices is presented. TSM is widely
used in dexterous robotic applications because it can flexibly work in limited
space, in constrained environments, and provides efficient power transmission
from the external actuator to the distal joint. However, nonlinearities from
friction and backlash hysteresis between the tendon and the sheath pose
challenges in achieving precise position controls of the end effector. Previous
studies on the TSM only address the control problem under the assumptions of
known tendon-sheath configuration and known model parameters of the backlash
hysteresis nonlinearity. These approaches can have adverse impact and
limitations on the overall system performances and practical implementation.
This paper presents a new approach to model and control the TSM-driven flexible
robotic systems. The designed controller does not require exact knowledge of
nonlinear friction and backlash hysteresis parameters, only their bounds are
online estimated. Simulation and experimental validation results show that the
proposed control scheme can significantly improve the tracking performances
without the presence of the exact knowledge of the model parameters and the
sheath configuration.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2017 18:23:15 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Do",
"Thanh Nho",
""
],
[
"Tjahjowidodo",
"Tegoeh",
""
],
[
"Lau",
"Michael Wai Shing",
""
],
[
"Phee",
"Soo Jay",
""
]
] |
new_dataset
| 0.997311 |
1702.02121
|
Xuhong Chen
|
Xuhong Chen, Jiaxun Lu and Pingyi Fan
|
Massive MIMO Beam-forming for High Speed Train Communication:
Directivity vs Beamwidth
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
High-mobility adaption and massive Multiple-input Multiple-output (MIMO)
application are two primary evolving objectives for the next generation high
speed train communication system. In this paper, we consider how to design a
location-aware beam-forming for the massive MIMO system.We first analyze the
tradeoff between beam directivity and beamwidth, based on which we present the
sensitivity analysis of positioning accuracy. Then, we derive the maximum beam
directivity and corresponding beamwidth under the restriction of diverse
positioning accuracies to guarantee a high efficient transmission. Finally, we
present a low-complexity beam-forming design with positioning robustness
utilizing location information, which requires neither eigen-decomposing (ED)
the uplink channel covariance matrix (CCM) nor ED the downlink CCM (DCCM).
Numerical simulation indicates that a massive MIMO system with less than a
certain positioning error can guarantee a required performance with satisfying
transmission efficiency in the high-mobility scenario.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2017 18:10:09 GMT"
}
] | 2017-02-08T00:00:00 |
[
[
"Chen",
"Xuhong",
""
],
[
"Lu",
"Jiaxun",
""
],
[
"Fan",
"Pingyi",
""
]
] |
new_dataset
| 0.982229 |
1406.2949
|
Rajai Nasser
|
Rajai Nasser
|
Ergodic Theory Meets Polarization. II: A Foundation of Polarization
Theory
|
33 pages. Accepted to IEEE Trans. Inform. Theory and presented in
part at ISIT'15
|
IEEE Transactions on Information Theory, vol. 63, no. 2, pp.
1063-1083, Feb. 2017
|
10.1109/TIT.2016.2617958
| null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An open problem in polarization theory is to determine the binary operations
that always lead to polarization (in the general multilevel sense) when they
are used in Ar{\i}kan style constructions. This paper, which is presented in
two parts, solves this problem by providing a necessary and sufficient
condition for a binary operation to be polarizing. This (second) part provides
a foundation of polarization theory based on the ergodic theory of binary
operations which we developed in the first part. We show that a binary
operation is polarizing if and only if it is uniformity preserving and its
right-inverse is strongly ergodic. The rate of polarization of single user
channels is studied. It is shown that the exponent of any polarizing operation
cannot exceed $\frac{1}{2}$, which is the exponent of quasigroup operations. We
also study the polarization of multiple access channels (MAC). In particular,
we show that a sequence of binary operations is MAC-polarizing if and only if
each binary operation in the sequence is polarizing. It is shown that the
exponent of any MAC-polarizing sequence cannot exceed $\frac{1}{2}$, which is
the exponent of sequences of quasigroup operations.
|
[
{
"version": "v1",
"created": "Wed, 11 Jun 2014 16:07:57 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Jun 2014 08:14:55 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Oct 2014 15:22:04 GMT"
},
{
"version": "v4",
"created": "Tue, 3 Feb 2015 18:46:28 GMT"
},
{
"version": "v5",
"created": "Fri, 30 Sep 2016 13:23:24 GMT"
},
{
"version": "v6",
"created": "Tue, 4 Oct 2016 23:52:59 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Nasser",
"Rajai",
""
]
] |
new_dataset
| 0.991198 |
1504.02863
|
Andreas Bulling
|
Xucong Zhang, Yusuke Sugano, Mario Fritz, Andreas Bulling
|
Appearance-Based Gaze Estimation in the Wild
| null | null |
10.1109/CVPR.2015.7299081
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Appearance-based gaze estimation is believed to work well in real-world
settings, but existing datasets have been collected under controlled laboratory
conditions and methods have been not evaluated across multiple datasets. In
this work we study appearance-based gaze estimation in the wild. We present the
MPIIGaze dataset that contains 213,659 images we collected from 15 participants
during natural everyday laptop use over more than three months. Our dataset is
significantly more variable than existing ones with respect to appearance and
illumination. We also present a method for in-the-wild appearance-based gaze
estimation using multimodal convolutional neural networks that significantly
outperforms state-of-the art methods in the most challenging cross-dataset
evaluation. We present an extensive evaluation of several state-of-the-art
image-based gaze estimation algorithms on three current datasets, including our
own. This evaluation provides clear insights and allows us to identify key
research challenges of gaze estimation in the wild.
|
[
{
"version": "v1",
"created": "Sat, 11 Apr 2015 11:52:33 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Zhang",
"Xucong",
""
],
[
"Sugano",
"Yusuke",
""
],
[
"Fritz",
"Mario",
""
],
[
"Bulling",
"Andreas",
""
]
] |
new_dataset
| 0.998416 |
1511.05768
|
Andreas Bulling
|
Marc Tonsen, Xucong Zhang, Yusuke Sugano, Andreas Bulling
|
Labeled pupils in the wild: A dataset for studying pupil detection in
unconstrained environments
| null | null |
10.1145/2857491.2857520
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present labelled pupils in the wild (LPW), a novel dataset of 66
high-quality, high-speed eye region videos for the development and evaluation
of pupil detection algorithms. The videos in our dataset were recorded from 22
participants in everyday locations at about 95 FPS using a state-of-the-art
dark-pupil head-mounted eye tracker. They cover people with different
ethnicities, a diverse set of everyday indoor and outdoor illumination
environments, as well as natural gaze direction distributions. The dataset also
includes participants wearing glasses, contact lenses, as well as make-up. We
benchmark five state-of-the-art pupil detection algorithms on our dataset with
respect to robustness and accuracy. We further study the influence of image
resolution, vision aids, as well as recording location (indoor, outdoor) on
pupil detection performance. Our evaluations provide valuable insights into the
general pupil detection problem and allow us to identify key challenges for
robust pupil detection on head-mounted eye trackers.
|
[
{
"version": "v1",
"created": "Wed, 18 Nov 2015 13:30:55 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Tonsen",
"Marc",
""
],
[
"Zhang",
"Xucong",
""
],
[
"Sugano",
"Yusuke",
""
],
[
"Bulling",
"Andreas",
""
]
] |
new_dataset
| 0.999748 |
1605.01627
|
Yuan Lu
|
Yuan Lu, Alexandra Duel-Hallen
|
A Sensing Contribution-based Two-layer Game for Channel Selection and
Spectrum Access in Cognitive Radio Ad-hoc Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In cognitive radio (CR) networks, the secondary users (SUs) sense the
spectrum licensed to the primary users (PUs) to identify and possibly transmit
over temporarily unoccupied channels. Cooperative sensing was proposed to
improve the sensing accuracy, but in heterogeneous scenarios SUs do not
contribute equally to the cooperative sensing result because they experience
different received PU signal quality at their sensors. In this paper, a
two-layer coalitional game is developed for distributed sensing and access in
multichannel CR ad hoc networks where the SUs' transmission opportunities are
commensurate with their sensing contributions, thus fostering cooperation and
eliminating free-riders. Numerical results show that the proposed two-layer
game is computationally efficient and outperforms previously investigated
collaborative sensing and spectrum access approaches for heterogeneous
multichannel CR networks in terms of energy efficiency, throughput, SU
fairness, and complexity. Moreover, it is demonstrated that this game is robust
to changes in the network topology and the number of SUs in low-mobility
scenarios. Finally, we propose a new physical-layer approach to distributing
the network-level miss-detection (MD) constraints fairly among the interfering
SUs for guaranteed PU protection and demonstrate the performance advantages of
the AND-rule combining of spectrum sensing results for heterogeneous SUs.
|
[
{
"version": "v1",
"created": "Thu, 5 May 2016 15:44:21 GMT"
},
{
"version": "v2",
"created": "Sun, 5 Feb 2017 19:30:49 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Lu",
"Yuan",
""
],
[
"Duel-Hallen",
"Alexandra",
""
]
] |
new_dataset
| 0.977858 |
1610.09526
|
Ying Cui
|
Dongdong Jiang and Ying Cui
|
Partition-based Caching in Large-Scale SIC-Enabled Wireless Networks
|
30 pages, 7 figures, submitted to Trans. on Wireless Commun
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Existing designs for content dissemination do not fully explore and exploit
potential caching and computation capabilities in advanced wireless networks.
In this paper, we propose two partition-based caching designs, i.e., a coded
caching design based on Random Linear Network Coding and an uncoded caching
design. We consider the analysis and optimization of the two caching designs in
a large-scale successive interference cancelation (SIC)-enabled wireless
network. First, under each caching design, by utilizing tools from stochastic
geometry and adopting appropriate approximations, we derive a tractable
expression for the successful transmission probability in the general file size
regime. To further obtain design insights, we also derive closed-form
expressions for the successful transmission probability in the small and large
file size regimes, respectively. Then, under each caching design, we consider
the successful transmission probability maximization in the general file size
regime, which is an NP-hard problem. By exploring structural properties, we
successfully transform the original optimization problem into a Multiple-Choice
Knapsack Problem (MCKP), and obtain a near optimal solution with 1/2
approximation guarantee and polynomial complexity. We also obtain closed-form
asymptotically optimal solutions. The analysis and optimization results show
the advantage of the coded caching design over the uncoded caching design, and
reveal the impact of caching and SIC capabilities. Finally, by numerical
results, we show that the two proposed caching designs achieve significant
performance gains over some baseline caching designs.
|
[
{
"version": "v1",
"created": "Sat, 29 Oct 2016 15:19:46 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Nov 2016 02:07:31 GMT"
},
{
"version": "v3",
"created": "Sat, 4 Feb 2017 13:37:53 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Jiang",
"Dongdong",
""
],
[
"Cui",
"Ying",
""
]
] |
new_dataset
| 0.997708 |
1611.07810
|
Tegan Maharaj
|
Tegan Maharaj and Nicolas Ballas and Anna Rohrbach and Aaron Courville
and Christopher Pal
|
A dataset and exploration of models for understanding video data through
fill-in-the-blank question-answering
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While deep convolutional neural networks frequently approach or exceed
human-level performance at benchmark tasks involving static images, extending
this success to moving images is not straightforward. Having models which can
learn to understand video is of interest for many applications, including
content recommendation, prediction, summarization, event/object detection and
understanding human visual perception, but many domains lack sufficient data to
explore and perfect video models. In order to address the need for a simple,
quantitative benchmark for developing and understanding video, we present
MovieFIB, a fill-in-the-blank question-answering dataset with over 300,000
examples, based on descriptive video annotations for the visually impaired. In
addition to presenting statistics and a description of the dataset, we perform
a detailed analysis of 5 different models' predictions, and compare these with
human performance. We investigate the relative importance of language, static
(2D) visual features, and moving (3D) visual features; the effects of
increasing dataset size, the number of frames sampled; and of vocabulary size.
We illustrate that: this task is not solvable by a language model alone; our
model combining 2D and 3D visual information indeed provides the best result;
all models perform significantly worse than human-level. We provide human
evaluations for responses given by different models and find that accuracy on
the MovieFIB evaluation corresponds well with human judgement. We suggest
avenues for improving video models, and hope that the proposed dataset can be
useful for measuring and encouraging progress in this very interesting field.
|
[
{
"version": "v1",
"created": "Wed, 23 Nov 2016 14:22:51 GMT"
},
{
"version": "v2",
"created": "Sun, 5 Feb 2017 17:51:19 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Maharaj",
"Tegan",
""
],
[
"Ballas",
"Nicolas",
""
],
[
"Rohrbach",
"Anna",
""
],
[
"Courville",
"Aaron",
""
],
[
"Pal",
"Christopher",
""
]
] |
new_dataset
| 0.999178 |
1701.07521
|
Nikita Polyanskii
|
Nikita Polyanskii, Vasiliy Usatyuk, and Ilya Vorobyev
|
Floor Scale Modulo Lifting for QC-LDPC codes
|
7 pages, 2 columns
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the given paper we present a novel approach for constructing a QC-LDPC
code of smaller length by lifting a given QC-LDPC code. The proposed method can
be considered as a generalization of floor lifting. Also we prove several
probabilistic statements concerning a theoretical improvement of the method
with respect to the number of small cycles. Making some offline calculation of
scale parameter it is possible to construct a sequence of QC-LDPC codes with
different circulant sizes generated from a single exponent matrix using only
floor and scale operations. The only parameter we store in memory is a constant
needed for scaling.
|
[
{
"version": "v1",
"created": "Wed, 25 Jan 2017 23:57:17 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Feb 2017 23:52:23 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Polyanskii",
"Nikita",
""
],
[
"Usatyuk",
"Vasiliy",
""
],
[
"Vorobyev",
"Ilya",
""
]
] |
new_dataset
| 0.998924 |
1702.00956
|
Suwon Shon
|
Suwon Shon, Hanseok Ko
|
KU-ISPL Speaker Recognition Systems under Language mismatch condition
for NIST 2016 Speaker Recognition Evaluation
|
SRE16, NIST SRE 2016 system description
| null | null | null |
cs.SD cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Korea University Intelligent Signal Processing Lab. (KU-ISPL) developed
speaker recognition system for SRE16 fixed training condition. Data for
evaluation trials are collected from outside North America, spoken in Tagalog
and Cantonese while training data only is spoken English. Thus, main issue for
SRE16 is compensating the discrepancy between different languages. As
development dataset which is spoken in Cebuano and Mandarin, we could prepare
the evaluation trials through preliminary experiments to compensate the
language mismatched condition. Our team developed 4 different approaches to
extract i-vectors and applied state-of-the-art techniques as backend. To
compensate language mismatch, we investigated and endeavored unique method such
as unsupervised language clustering, inter language variability compensation
and gender/language dependent score normalization.
|
[
{
"version": "v1",
"created": "Fri, 3 Feb 2017 10:15:29 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Feb 2017 03:37:28 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Shon",
"Suwon",
""
],
[
"Ko",
"Hanseok",
""
]
] |
new_dataset
| 0.999516 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.