id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1702.01184
|
Benjamin Mako Hill
|
Benjamin Mako Hill, Andr\'es Monroy-Hern\'andez
|
A longitudinal dataset of five years of public activity in the Scratch
online community
| null |
Scientific Data 4, Article number: 170002, 2017
|
10.1038/sdata.2017.2
| null |
cs.CY cs.HC cs.SI
|
http://creativecommons.org/licenses/by/4.0/
|
Scratch is a programming environment and an online community where young
people can create, share, learn, and communicate. In collaboration with the
Scratch Team at MIT, we created a longitudinal dataset of public activity in
the Scratch online community during its first five years (2007-2012). The
dataset comprises 32 tables with information on more than 1 million Scratch
users, nearly 2 million Scratch projects, more than 10 million comments, more
than 30 million visits to Scratch projects, and more. To help researchers
understand this dataset, and to establish the validity of the data, we also
include the source code of every version of the software that operated the
website, as well as the software used to generate this dataset. We believe this
is the largest and most comprehensive downloadable dataset of youth programming
artifacts and communication.
|
[
{
"version": "v1",
"created": "Fri, 3 Feb 2017 22:02:24 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Hill",
"Benjamin Mako",
""
],
[
"Monroy-Hernández",
"Andrés",
""
]
] |
new_dataset
| 0.999343 |
1702.01205
|
Shumeet Baluja
|
Shumeet Baluja, Michele Covell, Rahul Sukthankar
|
Traffic Lights with Auction-Based Controllers: Algorithms and Real-World
Data
| null | null | null | null |
cs.AI cs.LG cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Real-time optimization of traffic flow addresses important practical
problems: reducing a driver's wasted time, improving city-wide efficiency,
reducing gas emissions and improving air quality. Much of the current research
in traffic-light optimization relies on extending the capabilities of traffic
lights to either communicate with each other or communicate with vehicles.
However, before such capabilities become ubiquitous, opportunities exist to
improve traffic lights by being more responsive to current traffic situations
within the current, already deployed, infrastructure. In this paper, we
introduce a traffic light controller that employs bidding within micro-auctions
to efficiently incorporate traffic sensor information; no other outside sources
of information are assumed. We train and test traffic light controllers on
large-scale data collected from opted-in Android cell-phone users over a period
of several months in Mountain View, California and the River North neighborhood
of Chicago, Illinois. The learned auction-based controllers surpass (in both
the relevant metrics of road-capacity and mean travel time) the currently
deployed lights, optimized static-program lights, and longer-term planning
approaches, in both cities, measured using real user driving data.
|
[
{
"version": "v1",
"created": "Fri, 3 Feb 2017 23:44:02 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Baluja",
"Shumeet",
""
],
[
"Covell",
"Michele",
""
],
[
"Sukthankar",
"Rahul",
""
]
] |
new_dataset
| 0.989444 |
1702.01251
|
Vahid Behzadan
|
Vahid Behzadan
|
Cyber-Physical Attacks on UAS Networks- Challenges and Open Research
Problems
|
Submitted to IEEE Vehicular Technology Magazine
| null | null | null |
cs.CR cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Assignment of critical missions to unmanned aerial vehicles (UAV) is bound to
widen the grounds for adversarial intentions in the cyber domain, potentially
ranging from disruption of command and control links to capture and use of
airborne nodes for kinetic attacks. Ensuring the security of electronic and
communications in multi-UAV systems is of paramount importance for their safe
and reliable integration with military and civilian airspaces. Over the past
decade, this active field of research has produced many notable studies and
novel proposals for attacks and mitigation techniques in UAV networks. Yet, the
generic modeling of such networks as typical MANETs and isolated systems has
left various vulnerabilities out of the investigative focus of the research
community. This paper aims to emphasize on some of the critical challenges in
securing UAV networks against attacks targeting vulnerabilities specific to
such systems and their cyber-physical aspects.
|
[
{
"version": "v1",
"created": "Sat, 4 Feb 2017 08:04:39 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Behzadan",
"Vahid",
""
]
] |
new_dataset
| 0.993384 |
1702.01314
|
Stanislav Kruglik
|
Stanislav Kruglik and Alexey Frolov
|
Bounds and Constructions of Codes with All-Symbol Locality and
Availability
|
ISIT 2017 submission, 5 pages, 3 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the distance properties of linear locally recoverable codes
(LRC codes) with all-symbol locality and availability. New upper and lower
bounds on the minimum distance of such codes are derived. The upper bound is
based on the shortening method and improves existing shortening bounds. To
reduce the gap in between upper and lower bounds we do not restrict the
alphabet size and propose explicit constructions of codes with locality and
availability via rank-metric codes. The first construction relies on expander
graphs and is better in low rate region, the second construction utilizes LRC
codes developed by Wang et al. as inner codes and better in high rate region.
|
[
{
"version": "v1",
"created": "Sat, 4 Feb 2017 17:55:30 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Kruglik",
"Stanislav",
""
],
[
"Frolov",
"Alexey",
""
]
] |
new_dataset
| 0.997196 |
1702.01466
|
Hongyu Gong
|
Hongyu Gong, Jiaqi Mu, Suma Bhat, Pramod Viswanath
|
Prepositions in Context
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Prepositions are highly polysemous, and their variegated senses encode
significant semantic information. In this paper we match each preposition's
complement and attachment and their interplay crucially to the geometry of the
word vectors to the left and right of the preposition. Extracting such features
from the vast number of instances of each preposition and clustering them makes
for an efficient preposition sense disambigution (PSD) algorithm, which is
comparable to and better than state-of-the-art on two benchmark datasets. Our
reliance on no external linguistic resource allows us to scale the PSD
algorithm to a large WikiCorpus and learn sense-specific preposition
representations -- which we show to encode semantic relations and paraphrasing
of verb particle compounds, via simple vector operations.
|
[
{
"version": "v1",
"created": "Sun, 5 Feb 2017 23:16:01 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Gong",
"Hongyu",
""
],
[
"Mu",
"Jiaqi",
""
],
[
"Bhat",
"Suma",
""
],
[
"Viswanath",
"Pramod",
""
]
] |
new_dataset
| 0.988021 |
1702.01601
|
David Fern\'andez-Duque
|
Philippe Balbiani and David Fern\'andez-Duque and Emiliano Lorini
|
Exploring the bidimensional space: A dynamic logic point of view
| null | null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a family of logics for reasoning about agents' positions and
motion in the plane which have several potential applications in the area of
multi-agent systems (MAS), such as multi-agent planning and robotics. The most
general logic includes (i) atomic formulas for representing the truth of a
given fact or the presence of a given agent at a certain position of the plane,
(ii) atomic programs corresponding to the four basic orientations in the plane
(up, down, left, right) as well as the four program constructs of propositional
dynamic logic (sequential composition, nondeterministic composition, iteration
and test). As this logic is not computably enumerable, we study some
interesting decidable and axiomatizable fragments of it. We also present a
decidable extension of the iteration-free fragment of the logic by special
programs representing motion of agents in the plane.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2017 13:05:58 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Balbiani",
"Philippe",
""
],
[
"Fernández-Duque",
"David",
""
],
[
"Lorini",
"Emiliano",
""
]
] |
new_dataset
| 0.996767 |
1702.01638
|
Xinyu Li
|
Xinyu Li, Yanyi Zhang, Jianyu Zhang, Shuhong Chen, Ivan Marsic,
Richard A. Farneth, Randall S. Burd
|
Concurrent Activity Recognition with Multimodal CNN-LSTM Structure
|
14 pages, 12 figures, under review
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a system that recognizes concurrent activities from real-world
data captured by multiple sensors of different types. The recognition is
achieved in two steps. First, we extract spatial and temporal features from the
multimodal data. We feed each datatype into a convolutional neural network that
extracts spatial features, followed by a long-short term memory network that
extracts temporal information in the sensory data. The extracted features are
then fused for decision making in the second step. Second, we achieve
concurrent activity recognition with a single classifier that encodes a binary
output vector in which elements indicate whether the corresponding activity
types are currently in progress. We tested our system with three datasets from
different domains recorded using different sensors and achieved performance
comparable to existing systems designed specifically for those domains. Our
system is the first to address the concurrent activity recognition with
multisensory data using a single model, which is scalable, simple to train and
easy to deploy.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2017 15:01:45 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Li",
"Xinyu",
""
],
[
"Zhang",
"Yanyi",
""
],
[
"Zhang",
"Jianyu",
""
],
[
"Chen",
"Shuhong",
""
],
[
"Marsic",
"Ivan",
""
],
[
"Farneth",
"Richard A.",
""
],
[
"Burd",
"Randall S.",
""
]
] |
new_dataset
| 0.983963 |
1702.01721
|
Afshin Dehghan
|
Afshin Dehghan, Syed Zain Masood, Guang Shu, Enrique. G. Ortiz
|
View Independent Vehicle Make, Model and Color Recognition Using
Convolutional Neural Network
|
7 Pages
| null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes the details of Sighthound's fully automated vehicle
make, model and color recognition system. The backbone of our system is a deep
convolutional neural network that is not only computationally inexpensive, but
also provides state-of-the-art results on several competitive benchmarks.
Additionally, our deep network is trained on a large dataset of several million
images which are labeled through a semi-automated process. Finally we test our
system on several public datasets as well as our own internal test dataset. Our
results show that we outperform other methods on all benchmarks by significant
margins. Our model is available to developers through the Sighthound Cloud API
at https://www.sighthound.com/products/cloud
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2017 17:47:08 GMT"
}
] | 2017-02-07T00:00:00 |
[
[
"Dehghan",
"Afshin",
""
],
[
"Masood",
"Syed Zain",
""
],
[
"Shu",
"Guang",
""
],
[
"Ortiz",
"Enrique. G.",
""
]
] |
new_dataset
| 0.988221 |
1606.05634
|
Jiho Song
|
Jiho Song, Junil Choi, and David J. Love
|
Common Codebook Millimeter Wave Beam Design: Designing Beams for Both
Sounding and Communication with Uniform Planar Arrays
|
14 pages, 10 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fifth generation (5G) wireless networks are expected to utilize wide
bandwidths available at millimeter wave (mmWave) frequencies for enhancing
system throughput. However, the unfavorable channel conditions of mmWave links,
e.g., higher path loss and attenuation due to atmospheric gases or water vapor,
hinder reliable communications. To compensate for these severe losses, it is
essential to have a multitude of antennas to generate sharp and strong beams
for directional transmission. In this paper, we consider mmWave systems using
uniform planar array (UPA) antennas, which effectively place more antennas on a
two-dimensional grid. A hybrid beamforming setup is also considered to generate
beams by combining a multitude of antennas using only a few radio frequency
chains. We focus on designing a set of transmit beamformers generating beams
adapted to the directional characteristics of mmWave links assuming a UPA and
hybrid beamforming. We first define ideal beam patterns for UPA structures.
Each beamformer is constructed to minimize the mean squared error from the
corresponding ideal beam pattern. Simulation results verify that the proposed
codebooks enhance beamforming reliability and data rate in mmWave systems.
|
[
{
"version": "v1",
"created": "Fri, 17 Jun 2016 19:45:09 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Oct 2016 18:13:01 GMT"
},
{
"version": "v3",
"created": "Sat, 21 Jan 2017 03:04:37 GMT"
},
{
"version": "v4",
"created": "Fri, 3 Feb 2017 03:05:46 GMT"
}
] | 2017-02-06T00:00:00 |
[
[
"Song",
"Jiho",
""
],
[
"Choi",
"Junil",
""
],
[
"Love",
"David J.",
""
]
] |
new_dataset
| 0.999593 |
1701.08500
|
Boris Brimkov
|
Boris Brimkov, Caleb C. Fast, Illya V. Hicks
|
Graphs with Extremal Connected Forcing Numbers
|
24 pages, 9 figures
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Zero forcing is an iterative graph coloring process where at each discrete
time step, a colored vertex with a single uncolored neighbor forces that
neighbor to become colored. The zero forcing number of a graph is the
cardinality of the smallest set of initially colored vertices which forces the
entire graph to eventually become colored. Connected forcing is a variant of
zero forcing in which the initially colored set of vertices induces a connected
subgraph; the analogous parameter of interest is the connected forcing number.
In this paper, we characterize the graphs with connected forcing numbers 2 and
$n-2$. Our results extend existing characterizations of graphs with zero
forcing numbers 2 and $n-2$; we use combinatorial and graph theoretic
techniques, in contrast to the linear algebraic approach used to obtain the
latter. We also present several other structural results about the connected
forcing sets of a graph.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2017 07:13:09 GMT"
}
] | 2017-02-06T00:00:00 |
[
[
"Brimkov",
"Boris",
""
],
[
"Fast",
"Caleb C.",
""
],
[
"Hicks",
"Illya V.",
""
]
] |
new_dataset
| 0.969951 |
1701.08736
|
Alexandre Fotue Tabue
|
Alexandre Fotue Tabue and Christophe Mouaha
|
Contraction of Cyclic Codes Over Finite Chain Rings
| null | null | null | null |
cs.IT math.IT math.RA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $\texttt{R}$ be a commutative finite chain ring of invariants $(q,s)$ and
$\Gamma(\texttt{R})$ the Teichm\"uller's set of $\texttt{R}.$ In this paper,
the trace representation cyclic $\texttt{R}$-linear codes of length $\ell,$ is
presented, when $\texttt{gcd}(\ell, q) = 1.$ We will show that the contractions
of some cyclic $\texttt{R}$-linear codes of length $u\ell$ are
$\gamma$-constacyclic $\texttt{R}$-linear codes of length $\ell,$ where
$\gamma\in\Gamma(\texttt{R})$ and the multiplicative order of is $u.$
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2017 18:11:10 GMT"
}
] | 2017-02-06T00:00:00 |
[
[
"Tabue",
"Alexandre Fotue",
""
],
[
"Mouaha",
"Christophe",
""
]
] |
new_dataset
| 0.954483 |
1702.00820
|
Theodoros Rekatsinas
|
Theodoros Rekatsinas, Xu Chu, Ihab F. Ilyas, Christopher R\'e
|
HoloClean: Holistic Data Repairs with Probabilistic Inference
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce HoloClean, a framework for holistic data repairing driven by
probabilistic inference. HoloClean unifies existing qualitative data repairing
approaches, which rely on integrity constraints or external data sources, with
quantitative data repairing methods, which leverage statistical properties of
the input data. Given an inconsistent dataset as input, HoloClean automatically
generates a probabilistic program that performs data repairing. Inspired by
recent theoretical advances in probabilistic inference, we introduce a series
of optimizations which ensure that inference over HoloClean's probabilistic
model scales to instances with millions of tuples. We show that HoloClean
scales to instances with millions of tuples and find data repairs with an
average precision of ~90% and an average recall of above ~76% across a diverse
array of datasets exhibiting different types of errors. This yields an average
F1 improvement of more than 2x against state-of-the-art methods.
|
[
{
"version": "v1",
"created": "Thu, 2 Feb 2017 20:25:41 GMT"
}
] | 2017-02-06T00:00:00 |
[
[
"Rekatsinas",
"Theodoros",
""
],
[
"Chu",
"Xu",
""
],
[
"Ilyas",
"Ihab F.",
""
],
[
"Ré",
"Christopher",
""
]
] |
new_dataset
| 0.980612 |
1702.01031
|
Bart Besselink
|
Bart Besselink and Karl H. Johansson
|
String stability and a delay-based spacing policy for vehicle platoons
subject to disturbances
|
15 pages, 10 figures
| null | null | null |
cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel delay-based spacing policy for the control of vehicle platoons is
introduced together with a notion of disturbance string stability. The
delay-based spacing policy specifies the desired inter-vehicular distance
between vehicles and guarantees that all vehicles track the same spatially
varying reference velocity profile, as is for example required for heavy-duty
vehicles driving over hilly terrain. Disturbance string stability is a notion
of string stability of vehicle platoons subject to external disturbances on all
vehicles that guarantees that perturbations do not grow unbounded as they
propagate through the platoon. Specifically, a control design approach in the
spatial domain is presented that achieves tracking of the desired spacing
policy and guarantees disturbance string stability with respect to a spatially
varying reference velocity. The results are illustrated by means of
simulations.
|
[
{
"version": "v1",
"created": "Fri, 3 Feb 2017 14:47:48 GMT"
}
] | 2017-02-06T00:00:00 |
[
[
"Besselink",
"Bart",
""
],
[
"Johansson",
"Karl H.",
""
]
] |
new_dataset
| 0.99907 |
1405.0472
|
Ambedkar Dukkipati
|
Ambedkar Dukkipati, Nithish Pai, Maria Francis
|
Border Bases for Polynomial Rings over Noetherian Rings
| null | null | null | null |
cs.SC math.AC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The theory of border bases for zero-dimensional ideals has attracted several
researchers in symbolic computation due to their numerical stability and
mathematical elegance. As shown in (Francis & Dukkipati, J. Symb. Comp., 2014),
one can extend the concept of border bases over Noetherian rings whenever the
corresponding residue class ring is finitely generated and free. In this paper
we address the following problem: Can the concept of border basis over
Noetherian rings exists for ideals when the corresponding residue class rings
are finitely generated but need not necessarily be free modules? We present a
border division algorithm and prove the termination of the algorithm for a
special class of border bases. We show the existence of such border bases over
Noetherian rings and present some characterizations in this regard. We also
show that certain reduced Gr\"{o}bner bases over Noetherian rings are contained
in this class of border bases.
|
[
{
"version": "v1",
"created": "Fri, 2 May 2014 18:49:07 GMT"
},
{
"version": "v2",
"created": "Sun, 15 Jun 2014 15:15:53 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Mar 2016 13:44:33 GMT"
},
{
"version": "v4",
"created": "Sat, 18 Jun 2016 14:13:29 GMT"
},
{
"version": "v5",
"created": "Thu, 2 Feb 2017 16:04:01 GMT"
}
] | 2017-02-03T00:00:00 |
[
[
"Dukkipati",
"Ambedkar",
""
],
[
"Pai",
"Nithish",
""
],
[
"Francis",
"Maria",
""
]
] |
new_dataset
| 0.99581 |
1412.8338
|
Sanjeev Saxena
|
Neethi K.S. and Sanjeev Saxena
|
Maximum Cardinality Neighbourly Sets in Quadrilateral Free Graphs
| null |
J Comb Optim 33(2): 422-444 (2017)
|
10.1007/s10878-015-9972-9
| null |
cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Neighbourly set of a graph is a subset of edges which either share an end
point or are joined by an edge of that graph. The maximum cardinality
neighbourly set problem is known to be NP-complete for general graphs. Mahdian
(M.Mahdian, On the computational complexity of strong edge coloring, Discrete
Applied Mathematics, 118:239-248, 2002) proved that it is in polynomial time
for quadrilateral-free graphs and proposed an O(n^{11}) algorithm for the same
(along with a note that by a straightforward but lengthy argument it can be
proved to be solvable in O(n^5) running time). In this paper we propose an
O(n^2) time algorithm for finding a maximum cardinality neighbourly set in a
quadrilateral-free graph.
|
[
{
"version": "v1",
"created": "Mon, 29 Dec 2014 13:43:22 GMT"
}
] | 2017-02-03T00:00:00 |
[
[
"S.",
"Neethi K.",
""
],
[
"Saxena",
"Sanjeev",
""
]
] |
new_dataset
| 0.952791 |
1608.03828
|
Amey Karkare
|
Rajdeep Das, Umair Z. Ahmed, Amey Karkare, Sumit Gulwani
|
Prutor: A System for Tutoring CS1 and Collecting Student Programs for
Analysis
| null | null | null | null |
cs.CY cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An introductory programming course (CS1) is an integral part of any
undergraduate curriculum. Due to large number and diverse programming
background of students, providing timely and personalised feedback to
individual students is a challenging task for any CS1 instructor. The help
provided by teaching assistants (typically senior students) is not sufficient
as it suffers from unintentional bias and, most of the time, not quick enough.
In this paper, we present Prutor, a tutoring system platform to conduct
introductory programming courses. Prutor is a cloud-based web application that
provides instant and useful feedback to students while solving programming
problems. Prutor stores, at regular intervals, the snapshots of students'
attempts to solve programming problems. These intermediate versions of the
student programs provide the instructors (and data analysts) a view of the
students' approach to solving programming problems. Since Prutor is accessible
through any standard web browser, students do not need to worry about
dependencies external to the programming course, viz. Operating Systems,
Editors, Compilers, Compiler Options, etc.. This enables the students to focus
on solving only the programming problems. Apart from the code snapshots at
regular intervals, Prutor also collects other valuable data such as the time
taken by the students to solve the problems, the number of compile and
execution events, and the errors made. We have used this data in developing
intelligent tools for giving feedback to students, some of which are described
briefly in this paper. This system thus serves as a platform for tutoring as
well as data collection for researchers.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2016 15:33:54 GMT"
}
] | 2017-02-03T00:00:00 |
[
[
"Das",
"Rajdeep",
""
],
[
"Ahmed",
"Umair Z.",
""
],
[
"Karkare",
"Amey",
""
],
[
"Gulwani",
"Sumit",
""
]
] |
new_dataset
| 0.971256 |
1701.01941
|
Andrea Baraldi
|
Andrea Baraldi and Jo\~ao V. B. Soares
|
Multi-Objective Software Suite of Two-Dimensional Shape Descriptors for
Object-Based Image Analysis
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years two sets of planar (2D) shape attributes, provided with an
intuitive physical meaning, were proposed to the remote sensing community by,
respectively, Nagao & Matsuyama and Shackelford & Davis in their seminal works
on the increasingly popular geographic object based image analysis (GEOBIA)
paradigm. These two published sets of intuitive geometric features were
selected as initial conditions by the present R&D software project, whose
multi-objective goal was to accomplish: (i) a minimally dependent and maximally
informative design (knowledge/information representation) of a general purpose,
user and application independent dictionary of 2D shape terms provided with a
physical meaning intuitive to understand by human end users and (ii) an
effective (accurate, scale invariant, easy to use) and efficient implementation
of 2D shape descriptors. To comply with the Quality Assurance Framework for
Earth Observation guidelines, the proposed suite of geometric functions is
validated by means of a novel quantitative quality assurance policy, centered
on inter feature dependence (causality) assessment. This innovative
multivariate feature validation strategy is alternative to traditional feature
selection procedures based on either inductive data learning classification
accuracy estimation, which is inherently case specific, or cross correlation
estimation, because statistical cross correlation does not imply causation. The
project deliverable is an original general purpose software suite of seven
validated off the shelf 2D shape descriptors intuitive to use. Alternative to
existing commercial or open source software libraries of tens of planar shape
functions whose informativeness remains unknown, it is eligible for use in
(GE)OBIA systems in operating mode, expected to mimic human reasoning based on
a convergence of evidence approach.
|
[
{
"version": "v1",
"created": "Sun, 8 Jan 2017 11:16:43 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Feb 2017 08:12:20 GMT"
}
] | 2017-02-03T00:00:00 |
[
[
"Baraldi",
"Andrea",
""
],
[
"Soares",
"João V. B.",
""
]
] |
new_dataset
| 0.99938 |
1702.00167
|
Shubham Tripathi
|
Deepak Gupta, Shubham Tripathi, Asif Ekbal, Pushpak Bhattacharyya
|
SMPOST: Parts of Speech Tagger for Code-Mixed Indic Social Media Text
|
5 pages, ICON 2016
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Use of social media has grown dramatically during the last few years. Users
follow informal languages in communicating through social media. The language
of communication is often mixed in nature, where people transcribe their
regional language with English and this technique is found to be extremely
popular. Natural language processing (NLP) aims to infer the information from
these text where Part-of-Speech (PoS) tagging plays an important role in
getting the prosody of the written text. For the task of PoS tagging on
Code-Mixed Indian Social Media Text, we develop a supervised system based on
Conditional Random Field classifier. In order to tackle the problem
effectively, we have focused on extracting rich linguistic features. We
participate in three different language pairs, ie. English-Hindi,
English-Bengali and English-Telugu on three different social media platforms,
Twitter, Facebook & WhatsApp. The proposed system is able to successfully
assign coarse as well as fine-grained PoS tag labels for a given a code-mixed
sentence. Experiments show that our system is quite generic that shows
encouraging performance levels on all the three language pairs in all the
domains.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2017 09:04:54 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Feb 2017 08:12:13 GMT"
}
] | 2017-02-03T00:00:00 |
[
[
"Gupta",
"Deepak",
""
],
[
"Tripathi",
"Shubham",
""
],
[
"Ekbal",
"Asif",
""
],
[
"Bhattacharyya",
"Pushpak",
""
]
] |
new_dataset
| 0.997363 |
1702.00524
|
Songnam Hong Dr.
|
Seonho Kim, Namyoon Lee, Songnam Hong
|
Uplink Multiuser Massive MIMO Systems with One-Bit ADCs: A
Coding-Theoretic Viewpoint
|
to be published in IEEE WCNC 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper investigates an uplink multiuser massive multiple-input
multiple-output (MIMO) system with one-bit analog-to-digital converters (ADCs),
in which $K$ users with a single-antenna communicate with one base station (BS)
with $n_r$ antennas. In this system, we propose a novel MIMO detection
framework, which is inspired by coding theory. The key idea of the proposed
framework is to create a non-linear code $\Cc$ of length $n_r$ and rate $K/n_r$
using the encoding function that is completely characterized by a non-linear
MIMO channel matrix. From this, a multiuser MIMO detection problem is converted
into an equivalent channel coding problem, in which a codeword of the $\Cc$ is
sent over $n_r$ parallel binary symmetric channels, each with different
crossover probabilities. Levereging this framework, we develop a maximum
likelihood decoding method, and show that the minimum distance of the $\Cc$ is
strongly related to a diversity order. Furthermore, we propose a practical
implementation method of the proposed framework when the channel state
information is not known to the BS. The proposed method is to estimate the code
$\Cc$ at the BS using a training sequence. Then, the proposed {\em weighted}
minimum distance decoding is applied. Simulations results show that the
proposed method almost achieves an ideal performance with a reasonable training
overhead.
|
[
{
"version": "v1",
"created": "Thu, 2 Feb 2017 02:01:29 GMT"
}
] | 2017-02-03T00:00:00 |
[
[
"Kim",
"Seonho",
""
],
[
"Lee",
"Namyoon",
""
],
[
"Hong",
"Songnam",
""
]
] |
new_dataset
| 0.967527 |
1702.00057
|
Hernan Haimovich
|
H. Haimovich and J.L. Mancilla-Aguilar
|
A Characterization of Integral ISS for Switched and Time-varying Systems
|
Submitted to IEEE Transactions on Automatic Control on Nov 2016
| null | null | null |
cs.SY math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most of the existing characterizations of the integral input-to-state
stability (iISS) property are not valid for time-varying or switched systems in
cases where converse Lyapunov theorems for stability are not available. This
note provides a characterization that is valid for switched and time-varying
systems, and shows that natural extensions of some of the existing
characterizations result in only sufficient but not necessary conditions. The
results provided also pinpoint suitable iISS gains and relate these to supply
functions and bounds on the function defining the system dynamics.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2017 21:17:06 GMT"
}
] | 2017-02-02T00:00:00 |
[
[
"Haimovich",
"H.",
""
],
[
"Mancilla-Aguilar",
"J. L.",
""
]
] |
new_dataset
| 0.985874 |
1702.00127
|
Ahmed Mateen Mr.
|
Ahmed Mateen, Zulafiqar Ali, Tasleem Mustafa
|
WLAN Performance Analysis Ibrahim Group of industries Faisalabad
Pakistan
| null |
International Journal of Management, IT & Engineering Vol. 7 Issue
2, February 2017, ISSN: 2249-0558
| null | null |
cs.NI
|
http://creativecommons.org/licenses/by/4.0/
|
Now a days several organizations are moving their LAN foundation towards
remote LAN frame work. The purpose for this is extremely straight forward
multinational organizations needs their clients surprise about their office
surroundings and they additionally need to make wire free environment in their
workplaces. Much IT equipment moved on Wireless for instance all in one Pc
portable workstations Wireless IP telephones. Another thing is that step by
step WLAN innovation moving towards extraordinary effectiveness. In this
exploration work Wireless LAN innovation running in Ibrahim Group gathering of
commercial enterprises Faisalabad has been investigated in term of their
equipment, Wireless signal quality, data transmission, auto channel moving, and
security in WLAN system. This examination work required physical proving
ground, some WLAN system analyzer (TamoSof throughput) software, hardware point
of interest, security testing programming. The investigation displayed in this
examination has fill two key needs. One determination is to accept this kind of
system interconnection could be broke down utilizing the exploratory models of
the two system bits (wired and remote pieces. Second key factor is to determine
the security issue in WLAN.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2017 04:38:09 GMT"
}
] | 2017-02-02T00:00:00 |
[
[
"Mateen",
"Ahmed",
""
],
[
"Ali",
"Zulafiqar",
""
],
[
"Mustafa",
"Tasleem",
""
]
] |
new_dataset
| 0.999091 |
1702.00146
|
Hsien-Chih Chang
|
Hsien-Chih Chang and Jeff Erickson
|
Untangling Planar Curves
|
29 pages, 26 figures. This paper improves and extends over some of
the results from our earlier preprint "Electrical Reduction, Homotopy Moves,
and Defect" (arXiv:1510.00571), as well as the preliminary version appeared
in SoCG 2016
| null | null | null |
cs.CG math.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Any generic closed curve in the plane can be transformed into a simple closed
curve by a finite sequence of local transformations called homotopy moves. We
prove that simplifying a planar closed curve with $n$ self-crossings requires
$\Theta(n^{3/2})$ homotopy moves in the worst case. Our algorithm improves the
best previous upper bound $O(n^2)$, which is already implicit in the classical
work of Steinitz; the matching lower bound follows from the construction of
closed curves with large defect, a topological invariant of generic closed
curves introduced by Aicardi and Arnold. Our lower bound also implies that
$\Omega(n^{3/2})$ facial electrical transformations are required to reduce any
plane graph with treewidth $\Omega(\sqrt{n})$ to a single vertex, matching
known upper bounds for rectangular and cylindrical grid graphs. More generally,
we prove that transforming one immersion of $k$ circles with at most $n$
self-crossings into another requires $\Theta(n^{3/2} + nk + k^2)$ homotopy
moves in the worst case. Finally, we prove that transforming one
noncontractible closed curve to another on any orientable surface requires
$\Omega(n^2)$ homotopy moves in the worst case; this lower bound is tight if
the curve is homotopic to a simple closed curve.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2017 06:45:40 GMT"
}
] | 2017-02-02T00:00:00 |
[
[
"Chang",
"Hsien-Chih",
""
],
[
"Erickson",
"Jeff",
""
]
] |
new_dataset
| 0.970152 |
1702.00160
|
Philipp Walk Dr.rer.nat.
|
Philipp Walk, Peter Jung, Babak Hassibi
|
Short-Message Communication and FIR System Identification using Huffman
Sequences
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Providing short-message communication and simultaneous channel estimation for
sporadic and fast fading scenarios is a challenge for future wireless networks.
In this work we propose a novel blind communication and deconvolution scheme by
using Huffman sequences, which allows to solve three important tasks in one
step: (i) determination of the transmit power (ii) identification of the
discrete-time FIR channel by providing a maximum delay of less than $L/2$ and
(iii) simultaneously communicating $L-1$ bits of information. Our signal
reconstruction uses a recent semi-definite program that can recover two unknown
signals from their auto-correlations and cross-correlations. This convex
algorithm is stable and operates fully deterministic without any further
channel assumptions.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2017 08:36:20 GMT"
}
] | 2017-02-02T00:00:00 |
[
[
"Walk",
"Philipp",
""
],
[
"Jung",
"Peter",
""
],
[
"Hassibi",
"Babak",
""
]
] |
new_dataset
| 0.998886 |
1702.00182
|
Ryuji Hirayama
|
Ryuji Hirayama, Tomotaka Suzuki, Tomoyoshi Shimobaba, Atsushi Shiraki,
Makoto Naruse, Hirotaka Nakayama, Takashi Kakue and Tomoyoshi Ito
|
Inkjet printing-based volumetric display projecting multiple full-colour
2D patterns
| null | null | null | null |
cs.MM cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this study, a method to construct a full-colour volumetric display is
presented using a commercially available inkjet printer. Photoreactive
luminescence materials are minutely and automatically printed as the volume
elements, and volumetric displays are constructed with high resolution using
easy-to-fabricate means that exploit inkjet printing technologies. The results
experimentally demonstrate the first prototype of an inkjet printing-based
volumetric display composed of multiple layers of transparent films that yield
a full-colour three-dimensional (3D) image. Moreover, we propose a design
algorithm with 3D structures that provide multiple different 2D full-colour
patterns when viewed from different directions and experimentally demonstrates
prototypes. It is considered that these types of 3D volumetric structures and
their fabrication methods based on widely deployed existing printing
technologies can be utilised as novel information display devices and systems,
including digital signage, media art, entertainment and security.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2017 10:01:44 GMT"
}
] | 2017-02-02T00:00:00 |
[
[
"Hirayama",
"Ryuji",
""
],
[
"Suzuki",
"Tomotaka",
""
],
[
"Shimobaba",
"Tomoyoshi",
""
],
[
"Shiraki",
"Atsushi",
""
],
[
"Naruse",
"Makoto",
""
],
[
"Nakayama",
"Hirotaka",
""
],
[
"Kakue",
"Takashi",
""
],
[
"Ito",
"Tomoyoshi",
""
]
] |
new_dataset
| 0.999769 |
1702.00187
|
Fr\'ed\'eric Rayar
|
Fr\'ed\'eric Rayar
|
ImageNet MPEG-7 Visual Descriptors - Technical Report
| null | null | null | null |
cs.CV cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
ImageNet is a large scale and publicly available image database. It currently
offers more than 14 millions of images, organised according to the WordNet
hierarchy. One of the main objective of the creators is to provide to the
research community a relevant database for visual recognition applications such
as object recognition, image classification or object localisation. However,
only a few visual descriptors of the images are available to be used by the
researchers. Only SIFT-based features have been extracted from a subset of the
collection. This technical report presents the extraction of some MPEG-7 visual
descriptors from the ImageNet database. These descriptors are made publicly
available in an effort towards open research.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2017 10:15:13 GMT"
}
] | 2017-02-02T00:00:00 |
[
[
"Rayar",
"Frédéric",
""
]
] |
new_dataset
| 0.99968 |
1702.00210
|
Scott A. Hale
|
Scott A. Hale and Irene Eleta
|
Foreign-language Reviews: Help or Hindrance?
| null |
Proceedings of the SIGCHI Conference on Human Factors in Computing
Systems, CHI 2017
|
10.1145/3025453.3025575
| null |
cs.HC cs.CL cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The number and quality of user reviews greatly affects consumer purchasing
decisions. While reviews in all languages are increasing, it is still often the
case (especially for non-English speakers) that there are only a few reviews in
a person's first language. Using an online experiment, we examine the value
that potential purchasers receive from interfaces showing additional reviews in
a second language. The results paint a complicated picture with both positive
and negative reactions to the inclusion of foreign-language reviews. Roughly
26-28% of subjects clicked to see translations of the foreign-language content
when given the opportunity, and those who did so were more likely to select the
product with foreign-language reviews than those who did not.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2017 11:18:47 GMT"
}
] | 2017-02-02T00:00:00 |
[
[
"Hale",
"Scott A.",
""
],
[
"Eleta",
"Irene",
""
]
] |
new_dataset
| 0.988913 |
1702.00325
|
Jekan Thangavelautham
|
Jekan Thangavelautham, Danielle Gallardo, Daniel Strawser, Steven
Dubowsky
|
Hybrid Fuel Cells Power for Long Duration Robot Missions in Field
Environments
|
8 pages, 5 figures in Field Robotics - 14th International Conference
on Climbing and Walking Robots and the Support Technologies for Mobile
Machines
| null | null | null |
cs.RO cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile robots are often needed for long duration missions. These include
search and rescue, sentry, repair, surveillance and entertainment. Current
power supply technology limit walking and climbing robots from many such
missions. Internal combustion engines have high noise and emit toxic exhaust
while rechargeable batteries have low energy densities and high rates of
self-discharge. In theory, fuel cells do not have such limitations. In
particular Proton Exchange Membrane (PEMs) can provide very high energy
densities, are clean and quiet. However, PEM fuel cells are found to be
unreliable due to performance degradation. This can be mitigated by protecting
the fuel cell in a fuel-cell battery hybrid configuration using filtering
electronics that ensure the fuel cell is isolated from electrical noise and a
battery to isolate it from power surges. Simulation results are presented for a
HOAP 2 humanoid robot that suggests a fuel cell powered hybrid power supply
superior to conventional batteries.
|
[
{
"version": "v1",
"created": "Wed, 1 Feb 2017 15:57:12 GMT"
}
] | 2017-02-02T00:00:00 |
[
[
"Thangavelautham",
"Jekan",
""
],
[
"Gallardo",
"Danielle",
""
],
[
"Strawser",
"Daniel",
""
],
[
"Dubowsky",
"Steven",
""
]
] |
new_dataset
| 0.998119 |
1502.04514
|
Sanjeev Saxena
|
Neethi K.S. and Sanjeev Saxena
|
Maximal Independent Sets in Generalised Caterpillar Graphs
| null |
J. Comb. Optim. 33(1): 326-332 (2017)
|
10.1007/s10878-015-9960-0
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A caterpillar graph is a tree which on removal of all its pendant vertices
leaves a chordless path. The chordless path is called the backbone of the
graph. The edges from the backbone to the pendant vertices are called the hairs
of the caterpillar graph. Ortiz and Villanueva (C.Ortiz and M.Villanueva,
Discrete Applied Mathematics, 160(3): 259-266, 2012) describe an algorithm,
linear in the size of the output, for finding a family of maximal independent
sets in a caterpillar graph.
In this paper, we propose an algorithm, again linear in the output size, for
a generalised caterpillar graph, where at each vertex of the backbone, there
can be any number of hairs of length one and at most one hair of length two.
|
[
{
"version": "v1",
"created": "Mon, 16 Feb 2015 12:41:07 GMT"
}
] | 2017-02-01T00:00:00 |
[
[
"S.",
"Neethi K.",
""
],
[
"Saxena",
"Sanjeev",
""
]
] |
new_dataset
| 0.995063 |
1701.04217
|
Maher Fakih
|
Maher Fakih and Sebastian Warsitz
|
Automatic SDF-based Code Generation from Simulink Models for Embedded
Software Development
|
10 pages, 9 figures, Presented at HIP3ES, 2017
| null | null |
HIP3ES/2017/2
|
cs.DC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Matlab/Simulink is a wide-spread tool for model-based design of embedded
systems. Supporting hierarchy, domain specific building blocks, functional
simulation and automatic code-generation, makes it well-suited for the design
of control and signal processing systems. In this work, we propose an automated
translation methodology for a subset of Simulink models to Synchronous dataflow
Graphs (SDFGs) including the automatic code-generation of SDF-compatible
embedded code. A translation of Simulink models to SDFGs, is very suitable due
to Simulink actor-oriented modeling nature, allowing the application of several
optimization techniques from the SDFG domain. Because of their well-defined
semantics, SDFGs can be analyzed at compiling phase to obtain deadlock-free and
memory-efficient schedules. In addition, several real-time analysis methods
exist which allow throughput-optimal mappings of SDFGs to Multiprocessor on
Chip (MPSoC) while guaranteeing upper-bounded latencies. The correctness of our
translation is justified by integrating the SDF generated code as a
software-in-the-loop (SIL) and comparing its results with the results of the
model-in-the-loop (MIL) simulation of reference Simulink models. The
translation is demonstrated with the help of two case studies: a Transmission
Controller Unit (TCU) and an Automatic Climate Control.
|
[
{
"version": "v1",
"created": "Mon, 16 Jan 2017 09:54:12 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2017 10:13:30 GMT"
}
] | 2017-02-01T00:00:00 |
[
[
"Fakih",
"Maher",
""
],
[
"Warsitz",
"Sebastian",
""
]
] |
new_dataset
| 0.98819 |
1701.07550
|
Jekan Thangavelautham
|
Himangshu Kalita, Ravi Teja Nallapu, Andrew Warren and Jekan
Thangavelautham
|
GNC of the SphereX Robot for Extreme Environment Exploration on Mars
|
12 pages, 10 figures in Proceedings of the 40th Annual AAS Guidance,
Navigation and Control Conference, 2017
| null | null | null |
cs.RO astro-ph.IM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wheeled ground robots are limited from exploring extreme environments such as
caves, lava tubes and skylights. Small robots that can utilize unconventional
mobility through hopping, flying or rolling can overcome these limitations.
Mul-tiple robots operating as a team offer significant benefits over a single
large ro-bot, as they are not prone to single-point failure, enable distributed
command and control and enable execution of tasks in parallel. These robots can
complement large rovers and landers, helping to explore inaccessible sites,
obtaining samples and for planning future exploration missions. Our robots, the
SphereX, are 3-kg in mass, spherical and contain computers equivalent to
current smartphones. They contain an array of guidance, navigation and control
sensors and electronics. SphereX contains room for a 1-kg science payload,
including for sample return. Our work in this field has recognized the need for
miniaturized chemical mobility systems that provide power and propulsion. Our
research explored the use of miniature rockets, including solid rockets,
bi-propellants including RP1/hydrogen-peroxide and
polyurethane/ammonium-perchlorate. These propulsion options provide maximum
flight times of 10 minutes on Mars. Flying, especially hovering consumes
significant fuel; hence, we have been developing our robots to perform
ballistic hops that enable the robots to travel efficiently over long
distances. Techniques are being developed to enable mid-course correction
during a ballistic hop. Using multiple cameras, it is possible to reconstitute
an image scene from motion blur. Hence our approach is to enable photo mapping
as the robots travel on a ballistic hop. The same images would also be used for
navigation and path planning. Using our proposed design approach, we are
developing low-cost methods for surface exploration of planetary bodies using a
network of small robots.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2017 02:32:07 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jan 2017 16:20:58 GMT"
}
] | 2017-02-01T00:00:00 |
[
[
"Kalita",
"Himangshu",
""
],
[
"Nallapu",
"Ravi Teja",
""
],
[
"Warren",
"Andrew",
""
],
[
"Thangavelautham",
"Jekan",
""
]
] |
new_dataset
| 0.999726 |
1701.08761
|
Rupam Bhattacharyya
|
Rupam Bhattacharyya, Adity Saikia and Shyamanta M. Hazarika
|
C3A: A Cognitive Collaborative Control Architecture For an Intelligent
Wheelchair
| null | null | null | null |
cs.RO cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Retention of residual skills for persons who partially lose their cognitive
or physical ability is of utmost importance. Research is focused on developing
systems that provide need-based assistance for retention of such residual
skills. This paper describes a novel cognitive collaborative control
architecture C3A, designed to address the challenges of developing need- based
assistance for wheelchair navigation. Organization of C3A is detailed and
results from simulation of the proposed architecture is presented. For
simulation of our proposed architecture, we have used ROS (Robot Operating
System) as a control framework and a 3D robotic simulator called USARSim
(Unified System for Automation and Robot Simulation).
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2017 11:53:59 GMT"
}
] | 2017-02-01T00:00:00 |
[
[
"Bhattacharyya",
"Rupam",
""
],
[
"Saikia",
"Adity",
""
],
[
"Hazarika",
"Shyamanta M.",
""
]
] |
new_dataset
| 0.999504 |
1701.08786
|
Nargis Bibi
|
Shafaq Malik, Nargis Bibi, Sehrish Khan, Razia Sultana, Sadaf Abdul
Rauf
|
Mr. Doc: A Doctor Appointment Application System
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Life is becoming too busy to get medical appointments in person and to
maintain a proper health care. The main idea of this work is to provide ease
and comfort to patients while taking appointment from doctors and it also
resolves the problems that the patients has to face while making an
appointment. The android application Mr.Doc acts as a client whereas the
database containing the doctor's details, patient's details and appointment
details is maintained by a website that acts as a server.
|
[
{
"version": "v1",
"created": "Tue, 17 Jan 2017 04:48:25 GMT"
}
] | 2017-02-01T00:00:00 |
[
[
"Malik",
"Shafaq",
""
],
[
"Bibi",
"Nargis",
""
],
[
"Khan",
"Sehrish",
""
],
[
"Sultana",
"Razia",
""
],
[
"Rauf",
"Sadaf Abdul",
""
]
] |
new_dataset
| 0.99953 |
1701.09011
|
Lorenzo Maggi
|
Paolo Medagliani, Stefano Paris, J\'er\'emie Leguay, Lorenzo Maggi,
Xue Chuangsong, Haojun Zhou
|
Overlay Routing for Fast Video Transfers in CDN
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Content Delivery Networks (CDN) are witnessing the outburst of video
streaming (e.g., personal live streaming or Video-on-Demand) where the video
content, produced or accessed by mobile phones, must be quickly transferred
from a point to another of the network. Whenever a user requests a video not
directly available at the edge server, the CDN network must 1) identify the
best location in the network where the content is stored, 2) set up a
connection and 3) deliver the video as quickly as possible. For this reason,
existing CDNs are adopting an overlay structure to reduce latency, leveraging
the flexibility introduced by the Software Defined Networking (SDN) paradigm.
In order to guarantee a satisfactory Quality of Experience (QoE) to users, the
connection must respect several Quality of Service (QoS) constraints. In this
paper, we focus on the sub-problem 2), by presenting an approach to efficiently
compute and maintain paths in the overlay network. Our approach allows to speed
up the transfer of video segments by finding minimum delay overlay paths under
constraints on hop count, jitter, packet loss and relay processing capacity.
The proposed algorithm provides a near-optimal solution, while drastically
reducing the execution time. We show on traces collected in a real CDN that our
solution allows to maximize the number of fast video transfers.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2017 12:31:29 GMT"
}
] | 2017-02-01T00:00:00 |
[
[
"Medagliani",
"Paolo",
""
],
[
"Paris",
"Stefano",
""
],
[
"Leguay",
"Jérémie",
""
],
[
"Maggi",
"Lorenzo",
""
],
[
"Chuangsong",
"Xue",
""
],
[
"Zhou",
"Haojun",
""
]
] |
new_dataset
| 0.997297 |
1701.09076
|
Jekan Thangavelautham
|
Salil Rabade and Jekan Thangavelautham
|
Combined Thermal Control and GNC: An Enabling Technology for CubeSat
Surface Probes and Small Robots
|
12 pages, 15 figures in Proceedings of the 40th Annual AAS Guidance,
Navigation and Control Conference 2017
| null | null | null |
cs.SY astro-ph.IM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Advances in GNC, particularly from miniaturized control electronics,
reaction-wheels and attitude determination sensors make it possible to design
surface probes and small robots to perform surface exploration and science on
low-gravity environments. These robots would use their reaction wheels to roll,
hop and tumble over rugged surfaces. These robots could provide 'Google
Streetview' quality images of off-world surfaces and perform some unique
science using penetrometers. These systems can be powered by high-efficiency
fuel cells that operate at 60-65 % and utilize hydrogen and oxygen electrolyzed
from water. However, one of the major challenges that prevent these probes and
robots from performing long duration surface exploration and science is thermal
design and control. In the inner solar system, during the day time, there is
often enough solar-insolation to keep these robots warm and power these
devices, but during eclipse the temperatures falls well below storage
temperature. We have developed a thermal control system that utilizes chemicals
to store and dispense heat when needed. The system takes waste products, such
as water from these robots and transfers them to a thermochemical storage
system. These thermochemical storage systems when mixed with water (a waste
product from a PEM fuel cell) releases heat. Under eclipse, the heat from the
thermochemical storage system is released to keep the probe warm enough to
survive. In sunlight, solar photovoltaics are used to electrolyze the water and
reheat the thermochemical storage system to release the water. Our research has
showed thermochemical storage systems are a feasible solution for use on
surface probes and robots for applications on the Moon, Mars and asteroids.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2017 03:03:49 GMT"
}
] | 2017-02-01T00:00:00 |
[
[
"Rabade",
"Salil",
""
],
[
"Thangavelautham",
"Jekan",
""
]
] |
new_dataset
| 0.999511 |
1503.03462
|
Gabriel Nivasch
|
Gabriel Nivasch
|
On the zone of a circle in an arrangement of lines
|
More small fixes. 27 pages, 9 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $\mathcal L$ be a set of $n$ lines in the plane, and let $C$ be a convex
curve in the plane, like a circle or a parabola. The "zone" of $C$ in $\mathcal
L$, denoted $\mathcal Z(C,\mathcal L)$, is defined as the set of all cells in
the arrangement $\mathcal A(\mathcal L)$ that are intersected by $C$.
Edelsbrunner et al. (1992) showed that the complexity (total number of edges or
vertices) of $\mathcal Z(C,\mathcal L)$ is at most $O(n\alpha(n))$, where
$\alpha$ is the inverse Ackermann function. They did this by translating the
sequence of edges of $\mathcal Z(C,\mathcal L)$ into a sequence $S$ that avoids
the subsequence $ababa$. Whether the worst-case complexity of $\mathcal
Z(C,\mathcal L)$ is only linear is a longstanding open problem.
Since the relaxation of the problem to pseudolines does have a
$\Theta(n\alpha(n))$ bound, any proof of $O(n)$ for the case of straight lines
must necessarily use geometric arguments.
In this paper we present some such geometric arguments. We show that, if $C$
is a circle, then certain configurations of straight-line segments with
endpoints on $C$ are impossible. In particular, we show that there exists a
Hart-Sharir sequence that cannot appear as a subsequence of $S$.
The Hart-Sharir sequences are essentially the only known way to construct
$ababa$-free sequences of superlinear length. Hence, if it could be shown that
every family of $ababa$-free sequences of superlinear-length eventually
contains all Hart-Sharir sequences, it would follow that the complexity of
$\mathcal Z(C,\mathcal L)$ is $O(n)$ whenever $C$ is a circle.
|
[
{
"version": "v1",
"created": "Wed, 11 Mar 2015 19:36:59 GMT"
},
{
"version": "v2",
"created": "Wed, 20 May 2015 08:23:44 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Dec 2015 08:36:29 GMT"
},
{
"version": "v4",
"created": "Sun, 3 Apr 2016 07:13:48 GMT"
},
{
"version": "v5",
"created": "Mon, 7 Nov 2016 05:59:58 GMT"
},
{
"version": "v6",
"created": "Sun, 29 Jan 2017 18:51:41 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"Nivasch",
"Gabriel",
""
]
] |
new_dataset
| 0.99458 |
1612.05079
|
Ankur Handa
|
John McCormac, Ankur Handa, Stefan Leutenegger, Andrew J. Davison
|
SceneNet RGB-D: 5M Photorealistic Images of Synthetic Indoor
Trajectories with Ground Truth
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce SceneNet RGB-D, expanding the previous work of SceneNet to
enable large scale photorealistic rendering of indoor scene trajectories. It
provides pixel-perfect ground truth for scene understanding problems such as
semantic segmentation, instance segmentation, and object detection, and also
for geometric computer vision problems such as optical flow, depth estimation,
camera pose estimation, and 3D reconstruction. Random sampling permits
virtually unlimited scene configurations, and here we provide a set of 5M
rendered RGB-D images from over 15K trajectories in synthetic layouts with
random but physically simulated object poses. Each layout also has random
lighting, camera trajectories, and textures. The scale of this dataset is well
suited for pre-training data-driven computer vision techniques from scratch
with RGB-D inputs, which previously has been limited by relatively small
labelled datasets in NYUv2 and SUN RGB-D. It also provides a basis for
investigating 3D scene labelling tasks by providing perfect camera poses and
depth data as proxy for a SLAM system. We host the dataset at
http://robotvault.bitbucket.io/scenenet-rgbd.html
|
[
{
"version": "v1",
"created": "Thu, 15 Dec 2016 14:22:38 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Dec 2016 01:37:54 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Jan 2017 11:06:14 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"McCormac",
"John",
""
],
[
"Handa",
"Ankur",
""
],
[
"Leutenegger",
"Stefan",
""
],
[
"Davison",
"Andrew J.",
""
]
] |
new_dataset
| 0.999136 |
1701.08212
|
Biplav Srivastava
|
Sandeep S Sandha, Biplav Srivastava, Sukanya Randhawa
|
The GangaWatch Mobile App to Enable Usage of Water Data in Every Day
Decisions Integrating Historical and Real-time Sensing Data
|
2 pages, water data, mobile app
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We demonstrate a novel mobile application called GangaWatch that makes water
pollution data usable and accessible focusing on one of the most polluted river
basins in the world. It is intended to engage common public who want to see
water condition and safe limits, and their relevance based on different
purposes. The data is a combination of old data determined from lab tests on
physical samples and new data from real time sensors collected from Ganga
basin. The platform is open for contribution from others, the data is also
available for reuse via public APIs, and it has already been used to derive new
insights.
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2017 22:32:18 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"Sandha",
"Sandeep S",
""
],
[
"Srivastava",
"Biplav",
""
],
[
"Randhawa",
"Sukanya",
""
]
] |
new_dataset
| 0.999509 |
1701.08380
|
Martin Thoma
|
Martin Thoma
|
The HASYv2 dataset
| null | null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
This paper describes the HASYv2 dataset. HASY is a publicly available, free
of charge dataset of single symbols similar to MNIST. It contains 168233
instances of 369 classes. HASY contains two challenges: A classification
challenge with 10 pre-defined folds for 10-fold cross-validation and a
verification challenge.
|
[
{
"version": "v1",
"created": "Sun, 29 Jan 2017 13:42:14 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"Thoma",
"Martin",
""
]
] |
new_dataset
| 0.999874 |
1701.08449
|
Junaed Sattar
|
Junaed Sattar and Jiawei Mo
|
SafeDrive: A Robust Lane Tracking System for Autonomous and Assisted
Driving Under Limited Visibility
| null | null | null | null |
cs.RO cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an approach towards robust lane tracking for assisted and
autonomous driving, particularly under poor visibility. Autonomous detection of
lane markers improves road safety, and purely visual tracking is desirable for
widespread vehicle compatibility and reducing sensor intrusion, cost, and
energy consumption. However, visual approaches are often ineffective because of
a number of factors, including but not limited to occlusion, poor weather
conditions, and paint wear-off. Our method, named SafeDrive, attempts to
improve visual lane detection approaches in drastically degraded visual
conditions without relying on additional active sensors. In scenarios where
visual lane detection algorithms are unable to detect lane markers, the
proposed approach uses location information of the vehicle to locate and access
alternate imagery of the road and attempts detection on this secondary image.
Subsequently, by using a combination of feature-based and pixel-based
alignment, an estimated location of the lane marker is found in the current
scene. We demonstrate the effectiveness of our system on actual driving data
from locations in the United States with Google Street View as the source of
alternate imagery.
|
[
{
"version": "v1",
"created": "Sun, 29 Jan 2017 23:17:21 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"Sattar",
"Junaed",
""
],
[
"Mo",
"Jiawei",
""
]
] |
new_dataset
| 0.99894 |
1701.08469
|
EPTCS
|
Stefan Mitsch (Computer Science Department, Carnegie Mellon
University), Andr\'e Platzer (Computer Science Department, Carnegie Mellon
University)
|
The KeYmaera X Proof IDE - Concepts on Usability in Hybrid Systems
Theorem Proving
|
In Proceedings F-IDE 2016, arXiv:1701.07925
|
EPTCS 240, 2017, pp. 67-81
|
10.4204/EPTCS.240.5
| null |
cs.LO cs.HC cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hybrid systems verification is quite important for developing correct
controllers for physical systems, but is also challenging. Verification
engineers, thus, need to be empowered with ways of guiding hybrid systems
verification while receiving as much help from automation as possible. Due to
undecidability, verification tools need sufficient means for intervening during
the verification and need to allow verification engineers to provide system
design insights.
This paper presents the design ideas behind the user interface for the hybrid
systems theorem prover KeYmaera X. We discuss how they make it easier to prove
hybrid systems as well as help learn how to conduct proofs in the first place.
Unsurprisingly, the most difficult user interface challenges come from the
desire to integrate automation and human guidance. We also share thoughts how
the success of such a user interface design could be evaluated and anecdotal
observations about it.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2017 03:33:24 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"Mitsch",
"Stefan",
"",
"Computer Science Department, Carnegie Mellon\n University"
],
[
"Platzer",
"André",
"",
"Computer Science Department, Carnegie Mellon\n University"
]
] |
new_dataset
| 0.969724 |
1701.08517
|
Pieter Leyman
|
Pieter Leyman, San Tu Pham, Patrick De Causmaecker
|
The Intermittent Traveling Salesman Problem with Different Temperature
Profiles: Greedy or not?
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this research, we discuss the intermittent traveling salesman problem
(ITSP), which extends the traditional traveling salesman problem (TSP) by
imposing temperature restrictions on each node. These additional constraints
limit the maximum allowable visit time per node, and result in multiple visits
for each node which cannot be serviced in a single visit. We discuss three
different temperature increase and decrease functions, namely a linear, a
quadratic and an exponential function. To solve the problem, we consider three
different solution representations as part of a metaheuristic approach. We
argue that in case of similar temperature increase and decrease profiles, it is
always beneficial to apply a greedy approach, i.e. to process as much as
possible given the current node temperature.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2017 09:22:08 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"Leyman",
"Pieter",
""
],
[
"Pham",
"San Tu",
""
],
[
"De Causmaecker",
"Patrick",
""
]
] |
new_dataset
| 0.950728 |
1701.08608
|
Inkyu Sa
|
Inkyu Sa, Chris Lehnert, Andrew English, Chris McCool, Feras Dayoub,
Ben Upcroft, Tristan Perez
|
Peduncle Detection of Sweet Pepper for Autonomous Crop Harvesting -
Combined Colour and 3D Information
|
8 pages, 14 figures, Robotics and Automation Letters
| null |
10.1109/LRA.2017.2651952
| null |
cs.RO cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a 3D visual detection method for the challenging task of
detecting peduncles of sweet peppers (Capsicum annuum) in the field. Cutting
the peduncle cleanly is one of the most difficult stages of the harvesting
process, where the peduncle is the part of the crop that attaches it to the
main stem of the plant. Accurate peduncle detection in 3D space is therefore a
vital step in reliable autonomous harvesting of sweet peppers, as this can lead
to precise cutting while avoiding damage to the surrounding plant. This paper
makes use of both colour and geometry information acquired from an RGB-D sensor
and utilises a supervised-learning approach for the peduncle detection task.
The performance of the proposed method is demonstrated and evaluated using
qualitative and quantitative results (the Area-Under-the-Curve (AUC) of the
detection precision-recall curve). We are able to achieve an AUC of 0.71 for
peduncle detection on field-grown sweet peppers. We release a set of manually
annotated 3D sweet pepper and peduncle images to assist the research community
in performing further research on this topic.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2017 14:17:59 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"Sa",
"Inkyu",
""
],
[
"Lehnert",
"Chris",
""
],
[
"English",
"Andrew",
""
],
[
"McCool",
"Chris",
""
],
[
"Dayoub",
"Feras",
""
],
[
"Upcroft",
"Ben",
""
],
[
"Perez",
"Tristan",
""
]
] |
new_dataset
| 0.999608 |
1701.08612
|
Jerome Darmont
|
Hadj Mahboubi (ERIC), Marouane Hachicha (ERIC), J\'er\^ome Darmont
(ERIC)
|
XML Warehousing and OLAP
|
arXiv admin note: substantial text overlap with arXiv:1701.08033
|
Encyclopedia of Data Warehousing and Mining, Second Edition, IV,
IGI Publishing, pp.2109-2116, 2009
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aim of this article is to present an overview of the major XML
warehousing approaches from the literature, as well as the existing approaches
for performing OLAP analyses over XML data (which is termed XML-OLAP or XOLAP;
Wang et al., 2005). We also discuss the issues and future trends in this area
and illustrate this topic by presenting the design of a unified, XML data
warehouse architecture and a set of XOLAP operators expressed in an XML
algebra.
|
[
{
"version": "v1",
"created": "Mon, 30 Jan 2017 14:27:07 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"Mahboubi",
"Hadj",
"",
"ERIC"
],
[
"Hachicha",
"Marouane",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
] |
new_dataset
| 0.995865 |
1701.08625
|
Thai Son Hoang
|
T.S. Hoang, L. Voisin, A. Salehi, M. Butler, T. Wilkinson, N. Beauger
|
Theory Plug-in for Rodin 3.x
|
Event-B day 2016, Tokyo
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Theory plug-in enables modellers to extend the mathematical modelling
notation for Event-B, with accompanying support for reasoning about the
extended language. Previous version of the Theory plug-in has been implemented
based on Rodin 2.x. This presentation outline the main improvements to the The-
ory plug-in, to be compatible with Rodin 3.x, in terms of both reliability and
us- ability. We will also present the changes that were needed in the Rodin
core to accommodate the Theory plug-in. Finally, we identify future
enhancements and research directions for the Theory plug-in.
|
[
{
"version": "v1",
"created": "Wed, 4 Jan 2017 15:56:14 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"Hoang",
"T. S.",
""
],
[
"Voisin",
"L.",
""
],
[
"Salehi",
"A.",
""
],
[
"Butler",
"M.",
""
],
[
"Wilkinson",
"T.",
""
],
[
"Beauger",
"N.",
""
]
] |
new_dataset
| 0.995306 |
1701.08680
|
Harishchandra Dubey
|
Nicholas Constant, Debanjan Borthakur, Mohammadreza Abtahi,
Harishchandra Dubey, Kunal Mankodiya
|
Fog-Assisted wIoT: A Smart Fog Gateway for End-to-End Analytics in
Wearable Internet of Things
|
5 pages, 4 figures, The 23rd IEEE Symposium on High Performance
Computer Architecture HPCA 2017, (Feb. 4, 2017 - Feb. 8, 2017), Austin,
Texas, USA
| null | null | null |
cs.DC cs.CY cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today, wearable internet-of-things (wIoT) devices continuously flood the
cloud data centers at an enormous rate. This increases a demand to deploy an
edge infrastructure for computing, intelligence, and storage close to the
users. The emerging paradigm of fog computing could play an important role to
make wIoT more efficient and affordable. Fog computing is known as the cloud on
the ground. This paper presents an end-to-end architecture that performs data
conditioning and intelligent filtering for generating smart analytics from
wearable data. In wIoT, wearable sensor devices serve on one end while the
cloud backend offers services on the other end. We developed a prototype of
smart fog gateway (a middle layer) using Intel Edison and Raspberry Pi. We
discussed the role of the smart fog gateway in orchestrating the process of
data conditioning, intelligent filtering, smart analytics, and selective
transfer to the cloud for long-term storage and temporal variability
monitoring. We benchmarked the performance of developed prototypes on
real-world data from smart e-textile gloves. Results demonstrated the usability
and potential of proposed architecture for converting the real-world data into
useful analytics while making use of knowledge-based models. In this way, the
smart fog gateway enhances the end-to-end interaction between wearables (sensor
devices) and the cloud.
|
[
{
"version": "v1",
"created": "Wed, 25 Jan 2017 02:52:12 GMT"
}
] | 2017-01-31T00:00:00 |
[
[
"Constant",
"Nicholas",
""
],
[
"Borthakur",
"Debanjan",
""
],
[
"Abtahi",
"Mohammadreza",
""
],
[
"Dubey",
"Harishchandra",
""
],
[
"Mankodiya",
"Kunal",
""
]
] |
new_dataset
| 0.961096 |
1701.07860
|
Xunchao Hu
|
Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, Heng Yin
|
JSForce: A Forced Execution Engine for Malicious JavaScript Detection
|
15 pages,conference
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The drastic increase of JavaScript exploitation attacks has led to a strong
interest in developing techniques to enable malicious JavaScript analysis.
Existing analysis tech- niques fall into two general categories: static
analysis and dynamic analysis. Static analysis tends to produce inaccurate
results (both false positive and false negative) and is vulnerable to a wide
series of obfuscation techniques. Thus, dynamic analysis is constantly gaining
popularity for exposing the typical features of malicious JavaScript. However,
existing dynamic analysis techniques possess limitations such as limited code
coverage and incomplete environment setup, leaving a broad attack surface for
evading the detection. To overcome these limitations, we present the design and
implementation of a novel JavaScript forced execution engine named JSForce
which drives an arbitrary JavaScript snippet to execute along different paths
without any input or environment setup. We evaluate JSForce using 220,587 HTML
and 23,509 PDF real- world samples. Experimental results show that by adopting
our forced execution engine, the malicious JavaScript detection rate can be
substantially boosted by 206.29% using same detection policy without any
noticeable false positive increase. We also make JSForce publicly available as
an online service and will release the source code to the security community
upon the acceptance for publication.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2017 19:59:32 GMT"
}
] | 2017-01-30T00:00:00 |
[
[
"Hu",
"Xunchao",
""
],
[
"Cheng",
"Yao",
""
],
[
"Duan",
"Yue",
""
],
[
"Henderson",
"Andrew",
""
],
[
"Yin",
"Heng",
""
]
] |
new_dataset
| 0.989586 |
1701.07880
|
D\'aivd M\'ark Nemeskey
|
D\'avid M\'ark Nemeskey
|
emLam -- a Hungarian Language Modeling baseline
|
Additional resources: - the emLam repository:
https://github.com/DavidNemeskey/emLam - the emLam corpus:
http://hlt.bme.hu/en/resources/emLam
|
In Proceedings of the 13th Conference on Hungarian Computational
Linguistics (MSZNY), pp. 91-102. Szeged, 2017
| null | null |
cs.CL
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
This paper aims to make up for the lack of documented baselines for Hungarian
language modeling. Various approaches are evaluated on three publicly available
Hungarian corpora. Perplexity values comparable to models of similar-sized
English corpora are reported. A new, freely downloadable Hungar- ian benchmark
corpus is introduced.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2017 21:18:32 GMT"
}
] | 2017-01-30T00:00:00 |
[
[
"Nemeskey",
"Dávid Márk",
""
]
] |
new_dataset
| 0.983858 |
1701.07914
|
Takeshi Koshiba
|
Ryota Iwamoto, Takeshi Koshiba
|
Non-Malleable Codes Against Affine Errors
|
5 pages
| null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Non-malleable code is a relaxed version of error-correction codes and the
decoding of modified codewords results in the original message or a completely
unrelated value. Thus, if an adversary corrupts a codeword then he cannot get
any information from the codeword. This means that non-malleable codes are
useful to provide a security guarantee in such situations that the adversary
can overwrite the encoded message. In 2010, Dziembowski et al. showed a
construction for non-malleable codes against the adversary who can falsify
codewords bitwise independently. In this paper, we consider an extended
adversarial model (affine error model) where the adversary can falsify
codewords bitwise independently or replace some bit with the value obtained by
applying an affine map over a limited number of bits. We prove that the
non-malleable codes (for the bitwise error model) provided by Dziembowski et
al. are still non-malleable against the adversary in the affine error model.
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2017 00:47:35 GMT"
}
] | 2017-01-30T00:00:00 |
[
[
"Iwamoto",
"Ryota",
""
],
[
"Koshiba",
"Takeshi",
""
]
] |
new_dataset
| 0.965059 |
1701.08033
|
Jerome Darmont
|
Hadj Mahboubi (ERIC), Jean-Christian Ralaivao (ERIC), Sabine Loudcher
(ERIC), Omar Boussa\"id (ERIC), Fadila Bentayeb (ERIC), J\'er\^ome Darmont
(ERIC)
|
X-WACoDa: An XML-based approach for Warehousing and Analyzing Complex
Data
| null |
Advances in Data Warehousing and Mining, 3, IGI Publishing,
pp.38-54, 2009, Data Warehousing Design and Advanced Engineering
Applications: Methods for Complex Construction
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Data warehousing and OLAP applications must nowadays handle complex data that
are not only numerical or symbolic. The XML language is well-suited to
logically and physically represent complex data. However, its usage induces new
theoretical and practical challenges at the modeling, storage and analysis
levels, and a new trend toward XML warehousing has been emerging for a couple
of years. Unfortunately, no standard XML data warehouse architecture emerges.
In this paper, we propose a unified XML warehouse reference model that
synthesizes and enhances related work, and fits into a global XML warehousing
and analysis approach we have developed. We also present a software platform
that is based on this model, as well as a case study that illustrates its
usage.
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2017 12:39:39 GMT"
}
] | 2017-01-30T00:00:00 |
[
[
"Mahboubi",
"Hadj",
"",
"ERIC"
],
[
"Ralaivao",
"Jean-Christian",
"",
"ERIC"
],
[
"Loudcher",
"Sabine",
"",
"ERIC"
],
[
"Boussaïd",
"Omar",
"",
"ERIC"
],
[
"Bentayeb",
"Fadila",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
] |
new_dataset
| 0.997441 |
1701.08052
|
Jerome Darmont
|
J\'er\^ome Darmont (ERIC)
|
Database Benchmarks
| null |
Encyclopedia of Information Science and Technology, Second
Edition, IGI Publishing, pp.950-954, 2009
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aim of this article is to present an overview of the major families of
state-of-the-art data-base benchmarks, namely: relational benchmarks, object
and object-relational benchmarks, XML benchmarks, and decision-support
benchmarks, and to discuss the issues, tradeoffs and future trends in database
benchmarking. We particularly focus on XML and decision-support benchmarks,
which are currently the most innovative tools that are developed in this area.
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2017 13:42:54 GMT"
}
] | 2017-01-30T00:00:00 |
[
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
] |
new_dataset
| 0.98306 |
1701.08125
|
Sven Tomforde
|
Sven Tomforde and Bernhard Sick and Christian M\"uller-Schloer
|
Organic Computing in the Spotlight
|
10 pages, one figure, article
| null | null | null |
cs.MA cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Organic Computing is an initiative in the field of systems engineering that
proposed to make use of concepts such as self-adaptation and self-organisation
to increase the robustness of technical systems. Based on the observation that
traditional design and operation concepts reach their limits, transferring more
autonomy to the systems themselves should result in a reduction of complexity
for users, administrators, and developers. However, there seems to be a need
for an updated definition of the term "Organic Computing", of desired
properties of technical, organic systems, and the objectives of the Organic
Computing initiative. With this article, we will address these points.
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2017 17:35:56 GMT"
}
] | 2017-01-30T00:00:00 |
[
[
"Tomforde",
"Sven",
""
],
[
"Sick",
"Bernhard",
""
],
[
"Müller-Schloer",
"Christian",
""
]
] |
new_dataset
| 0.96989 |
1701.08126
|
Seyyed Ali Hashemi
|
Seyyed Ali Hashemi, Carlo Condo, Warren J. Gross
|
Fast Simplified Successive-Cancellation List Decoding of Polar Codes
|
WCNC 2017 Polar Coding Workshop
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Polar codes are capacity achieving error correcting codes that can be decoded
through the successive-cancellation algorithm. To improve its error-correction
performance, a list-based version called successive-cancellation list (SCL) has
been proposed in the past, that however substantially increases the number of
time-steps in the decoding process. The simplified SCL (SSCL) decoding
algorithm exploits constituent codes within the polar code structure to greatly
reduce the required number of time-steps without introducing any
error-correction performance loss. In this paper, we propose a faster decoding
approach to decode one of these constituent codes, the Rate-1 node. We use this
Rate-1 node decoder to develop Fast-SSCL. We demonstrate that only a
list-size-bound number of bits needs to be estimated in Rate-1 nodes and
Fast-SSCL exactly matches the error-correction performance of SCL and SSCL.
This technique can potentially greatly reduce the total number of time-steps
needed for polar codes decoding: analysis on a set of case studies show that
Fast-SSCL has a number of time-steps requirement that is up to 66.6% lower than
SSCL and 88.1% lower than SCL.
|
[
{
"version": "v1",
"created": "Fri, 27 Jan 2017 17:39:53 GMT"
}
] | 2017-01-30T00:00:00 |
[
[
"Hashemi",
"Seyyed Ali",
""
],
[
"Condo",
"Carlo",
""
],
[
"Gross",
"Warren J.",
""
]
] |
new_dataset
| 0.998422 |
1701.01657
|
Jekan Thangavelautham
|
Jekanthan Thangavelautham and Kenneth Law and Terence Fu and Nader Abu
El Samid and Alexander D.S. Smith and Gabriele M.T. D'Eleuterio
|
Autonomous Multirobot Excavation for Lunar Applications
|
38 pages, 32 figures, archive of journal article, in Robotica, 2017
| null | null | null |
cs.RO astro-ph.IM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a control approach called Artificial Neural Tissue (ANT) is
applied to multirobot excavation for lunar base preparation tasks including
clearing landing pads and burying of habitat modules. We show for the first
time, a team of autonomous robots excavating a terrain to match a given 3D
blueprint. Constructing mounds around landing pads will provide physical
shielding from debris during launch/landing. Burying a human habitat modules
under 0.5 m of lunar regolith is expected to provide both radiation shielding
and maintain temperatures of -25 $^{o}$C. This minimizes base life-support
complexity and reduces launch mass. ANT is compelling for a lunar mission
because it doesn't require a team of astronauts for excavation and it requires
minimal supervision. The robot teams are shown to autonomously interpret
blueprints, excavate and prepare sites for a lunar base. Because little
pre-programmed knowledge is provided, the controllers discover creative
techniques. ANT evolves techniques such as slot-dozing that would otherwise
require excavation experts. This is critical in making an excavation mission
feasible when it is prohibitively expensive to send astronauts. The controllers
evolve elaborate negotiation behaviors to work in close quarters. These and
other techniques such as concurrent evolution of the controller and team size
are shown to tackle problem of antagonism, when too many robots interfere
reducing the overall efficiency or worse, resulting in gridlock. While many
challenges remain with this technology our work shows a compelling pathway for
field testing this approach.
|
[
{
"version": "v1",
"created": "Fri, 6 Jan 2017 15:17:13 GMT"
}
] | 2017-01-27T00:00:00 |
[
[
"Thangavelautham",
"Jekanthan",
""
],
[
"Law",
"Kenneth",
""
],
[
"Fu",
"Terence",
""
],
[
"Samid",
"Nader Abu El",
""
],
[
"Smith",
"Alexander D. S.",
""
],
[
"D'Eleuterio",
"Gabriele M. T.",
""
]
] |
new_dataset
| 0.998232 |
1701.04137
|
Yansong Gao
|
Yansong Gao and Damith C. Ranasinghe
|
PUF-FSM: A Controlled Strong PUF
|
5 pages, 5 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the PUF finite state machine (PUF-FSM) that is served as
a practical {\it controlled} strong PUF. Previous controlled PUF designs have
the difficulties of stabilizing the noisy PUF responses where the error
correction logic is required. In addition, the computed helper data to assist
error correcting, however, leaks information, which poses the controlled PUF
under the threatens of fault attacks or reliability-based attacks. The PUF-FSM
eschews the error correction logic and the computation, storage and loading of
the helper data on-chip by only employing error-free responses judiciously
determined on demand in the absence of an Arbiter PUF with a large CRP space.
In addition, the access to the PUF-FSM is controlled by the trusted entity.
Control in means of i) restricting challenges presented to the PUF and ii)
further preventing repeated response evaluations to gain unreliability
side-channel information are foundations of defensing the most powerful
modeling attacks. The PUF-FSM goes beyond authentications/identifications to
such as key generations and advanced cryptographic applications built upon a
shared key.
|
[
{
"version": "v1",
"created": "Mon, 16 Jan 2017 01:42:26 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Jan 2017 21:51:18 GMT"
}
] | 2017-01-27T00:00:00 |
[
[
"Gao",
"Yansong",
""
],
[
"Ranasinghe",
"Damith C.",
""
]
] |
new_dataset
| 0.993439 |
1701.07498
|
Guohui Lin
|
Wenchang Luo, Taibo Luo, Randy Goebel, and Guohui Lin
|
On rescheduling due to machine disruption while to minimize the total
weighted completion time
|
17 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate a single machine rescheduling problem that arises from an
unexpected machine unavailability, after the given set of jobs has already been
scheduled to minimize the total weighted completion time. Such a disruption is
represented as an unavailable time interval and is revealed to the production
planner before any job is processed; the production planner wishes to
reschedule the jobs to minimize the alteration to the originally planned
schedule, which is measured as the maximum time deviation between the original
and the new schedules for all the jobs. The objective function in this
rescheduling problem is to minimize the sum of the total weighted completion
time and the weighted maximum time deviation, under the constraint that the
maximum time deviation is bounded above by a given value. That is, the maximum
time deviation is taken both as a constraint and as part of the objective
function. We present a pseudo-polynomial time exact algorithm and a fully
polynomial time approximation scheme, the latter of which is the best possible
given that the general problem is NP-hard.
|
[
{
"version": "v1",
"created": "Wed, 25 Jan 2017 21:44:24 GMT"
}
] | 2017-01-27T00:00:00 |
[
[
"Luo",
"Wenchang",
""
],
[
"Luo",
"Taibo",
""
],
[
"Goebel",
"Randy",
""
],
[
"Lin",
"Guohui",
""
]
] |
new_dataset
| 0.983575 |
1701.07543
|
Jekan Thangavelautham
|
Pranay Gankidi and Jekan Thangavelautham
|
FPGA Architecture for Deep Learning and its application to Planetary
Robotics
|
8 pages, 10 figures in Proceedings of the IEEE Aerospace Conference
2017
| null | null | null |
cs.LG astro-ph.IM cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Autonomous control systems onboard planetary rovers and spacecraft benefit
from having cognitive capabilities like learning so that they can adapt to
unexpected situations in-situ. Q-learning is a form of reinforcement learning
and it has been efficient in solving certain class of learning problems.
However, embedded systems onboard planetary rovers and spacecraft rarely
implement learning algorithms due to the constraints faced in the field, like
processing power, chip size, convergence rate and costs due to the need for
radiation hardening. These challenges present a compelling need for a portable,
low-power, area efficient hardware accelerator to make learning algorithms
practical onboard space hardware. This paper presents a FPGA implementation of
Q-learning with Artificial Neural Networks (ANN). This method matches the
massive parallelism inherent in neural network software with the fine-grain
parallelism of an FPGA hardware thereby dramatically reducing processing time.
Mars Science Laboratory currently uses Xilinx-Space-grade Virtex FPGA devices
for image processing, pyrotechnic operation control and obstacle avoidance. We
simulate and program our architecture on a Xilinx Virtex 7 FPGA. The
architectural implementation for a single neuron Q-learning and a more complex
Multilayer Perception (MLP) Q-learning accelerator has been demonstrated. The
results show up to a 43-fold speed up by Virtex 7 FPGAs compared to a
conventional Intel i5 2.3 GHz CPU. Finally, we simulate the proposed
architecture using the Symphony simulator and compiler from Xilinx, and
evaluate the performance and power consumption.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2017 01:52:11 GMT"
}
] | 2017-01-27T00:00:00 |
[
[
"Gankidi",
"Pranay",
""
],
[
"Thangavelautham",
"Jekan",
""
]
] |
new_dataset
| 0.999342 |
1701.07730
|
Apostolos Destounis
|
Apostolos Destounis, Mari Kobayashi, Georgios Paschos and Asma Ghorbel
|
Alpha Fair Coded Caching
| null | null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The performance of existing \emph{coded caching} schemes is sensitive to
worst channel quality, a problem which is exacerbated when communicating over
fading channels. In this paper we address this limitation in the following
manner: \emph{in short-term}, we allow transmissions to subsets of users with
good channel quality, avoiding users with fades, while \emph{in long-term} we
ensure fairness across the different users.Our online scheme combines (i) joint
scheduling and power control for the broadcast channel with fading, and (ii)
congestion control for ensuring the optimal long-term average performance. We
restrict the caching operations to the decentralized scheme of
\cite{maddah2013decentralized}, and subject to this restriction we prove that
our scheme has near-optimal overall performance with respect to the convex
alpha-fairness coded caching optimization. By tuning the coefficient alpha, the
operator can differentiate user performance with respect to video delivery
rates achievable by coded caching.
We demonstrate via simulations our scheme's superiority over legacy coded
caching and unicast opportunistic scheduling, which are identified as special
cases of our general framework.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2017 14:55:31 GMT"
}
] | 2017-01-27T00:00:00 |
[
[
"Destounis",
"Apostolos",
""
],
[
"Kobayashi",
"Mari",
""
],
[
"Paschos",
"Georgios",
""
],
[
"Ghorbel",
"Asma",
""
]
] |
new_dataset
| 0.968281 |
1701.07732
|
Liang Zheng
|
Liang Zheng, Yujia Huang, Huchuan Lu, Yi Yang
|
Pose Invariant Embedding for Deep Person Re-identification
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Pedestrian misalignment, which mainly arises from detector errors and pose
variations, is a critical problem for a robust person re-identification (re-ID)
system. With bad alignment, the background noise will significantly compromise
the feature learning and matching process. To address this problem, this paper
introduces the pose invariant embedding (PIE) as a pedestrian descriptor.
First, in order to align pedestrians to a standard pose, the PoseBox structure
is introduced, which is generated through pose estimation followed by affine
transformations. Second, to reduce the impact of pose estimation errors and
information loss during PoseBox construction, we design a PoseBox fusion (PBF)
CNN architecture that takes the original image, the PoseBox, and the pose
estimation confidence as input. The proposed PIE descriptor is thus defined as
the fully connected layer of the PBF network for the retrieval task.
Experiments are conducted on the Market-1501, CUHK03, and VIPeR datasets. We
show that PoseBox alone yields decent re-ID accuracy and that when integrated
in the PBF network, the learned PIE descriptor produces competitive performance
compared with the state-of-the-art approaches.
|
[
{
"version": "v1",
"created": "Thu, 26 Jan 2017 14:59:19 GMT"
}
] | 2017-01-27T00:00:00 |
[
[
"Zheng",
"Liang",
""
],
[
"Huang",
"Yujia",
""
],
[
"Lu",
"Huchuan",
""
],
[
"Yang",
"Yi",
""
]
] |
new_dataset
| 0.986989 |
1701.07096
|
Piotr Fr\k{a}ckiewicz
|
Piotr Fr\k{a}ckiewicz
|
A new quantum scheme for normal-form games
| null |
Quantum Information Processing 14, 1809 (2015)
|
10.1007/s11128-015-0979-z
| null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a strict mathematical description for a refinement of the
Marinatto-Weber quantum game scheme. The model allows the players to choose
projector operators that determine the state on which they perform their local
operators. The game induced by the scheme generalizes finite strategic form
game. In particular, it covers normal representations of extensive games, i.e.,
strategic games generated by extensive ones. We illustrate our idea with an
example of extensive game and prove that rational choices in the classical game
and its quantum counterpart may lead to significantly different outcomes.
|
[
{
"version": "v1",
"created": "Tue, 24 Jan 2017 22:28:19 GMT"
}
] | 2017-01-26T00:00:00 |
[
[
"Frąckiewicz",
"Piotr",
""
]
] |
new_dataset
| 0.973662 |
1701.07127
|
EPTCS
|
Martin Ring (DFKI), Christoph L\"uth (DFKI and Universit\"at Bremen)
|
Interactive Proof Presentations with Cobra
|
In Proceedings UITP 2016, arXiv:1701.06745
|
EPTCS 239, 2017, pp. 43-52
|
10.4204/EPTCS.239.4
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present Cobra, a modern proof presentation framework, leveraging
cutting-edge presentation technology together with a state of the art
interactive theorem prover to present formalized mathematics as active
documents. Cobra provides both an easy way to present proofs and a novel
approach to auditorium interaction. The presentation is checked live by the
theorem prover, and moreover allows for live changes both by the presenter and
the audience.
|
[
{
"version": "v1",
"created": "Wed, 25 Jan 2017 01:21:43 GMT"
}
] | 2017-01-26T00:00:00 |
[
[
"Ring",
"Martin",
"",
"DFKI"
],
[
"Lüth",
"Christoph",
"",
"DFKI and Universität Bremen"
]
] |
new_dataset
| 0.998781 |
1701.07168
|
Shuai Li
|
Shuai Li, Mingxin Zhou, Jianjun Wu, Lingyang Song, Yonghui Li, and
Hongbin Li
|
X-duplex Relaying: Adaptive Antenna Configuration
|
letter
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this letter, we propose a joint transmission mode and transmit/receive
(Tx/Rx) antenna configuration scheme referred to as X-duplex in the relay
network with one source, one amplify-and-forward (AF) relay and one
destination. The relay is equipped with two antennas, each of which is capable
of reception and transmission. In the proposed scheme, the relay adaptively
selects its Tx and Rx antenna, operating in either full-duplex (FD) or
half-duplex (HD) mode. The proposed scheme is based on minimizing the symbol
error rate (SER) of the relay system. The asymptotic expressions of the
cumulative distribution function (CDF) for the end-to-end signal to
interference plus noise ratio (SINR), average SER and diversity order are
derived and validated by simulations. Results show that the X-duplex scheme
achieves additional spatial diversity, significantly reduces the performance
floor at high SNR and improves the system performance.
|
[
{
"version": "v1",
"created": "Wed, 25 Jan 2017 05:38:21 GMT"
}
] | 2017-01-26T00:00:00 |
[
[
"Li",
"Shuai",
""
],
[
"Zhou",
"Mingxin",
""
],
[
"Wu",
"Jianjun",
""
],
[
"Song",
"Lingyang",
""
],
[
"Li",
"Yonghui",
""
],
[
"Li",
"Hongbin",
""
]
] |
new_dataset
| 0.99938 |
1701.07184
|
Yuval Cassuto
|
Yuval Cassuto, Evyatar Hemo, Sven Puchinger, Martin Bossert
|
Multi-Block Interleaved Codes for Local and Global Read Access
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define multi-block interleaved codes as codes that allow reading
information from either a small sub-block or from a larger full block. The
former offers faster access, while the latter provides better reliability. We
specify the correction capability of the sub-block code through its gap $t$
from optimal minimum distance, and look to have full-block minimum distance
that grows with the parameter $t$. We construct two families of such codes when
the number of sub-blocks is $3$. The codes match the distance properties of
known integrated-interleaving codes, but with the added feature of mapping the
same number of information symbols to each sub-block. As such, they are the
first codes that provide read access in multiple size granularities and
correction capabilities.
|
[
{
"version": "v1",
"created": "Wed, 25 Jan 2017 07:00:23 GMT"
}
] | 2017-01-26T00:00:00 |
[
[
"Cassuto",
"Yuval",
""
],
[
"Hemo",
"Evyatar",
""
],
[
"Puchinger",
"Sven",
""
],
[
"Bossert",
"Martin",
""
]
] |
new_dataset
| 0.999797 |
1701.07294
|
Manuel Lafond
|
Stefan Dobrev, Evangelos Kranakis, Danny Krizanc, Manuel Lafond, Jan
Manuch, Lata Narayanan, Jaroslav Opatrny and Ladislav Stacho
|
Weak Coverage of a Rectangular Barrier
| null | null | null | null |
cs.DC math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Assume n wireless mobile sensors are initially dispersed in an ad hoc manner
in a rectangular region. They are required to move to final locations so that
they can detect any intruder crossing the region in a direction parallel to the
sides of the rectangle, and thus provide weak barrier coverage of the region.
We study three optimization problems related to the movement of sensors to
achieve weak barrier coverage: minimizing the number of sensors moved (MinNum),
minimizing the average distance moved by the sensors (MinSum), and minimizing
the maximum distance moved by the sensors (MinMax). We give an O(n^{3/2}) time
algorithm for the MinNum problem for sensors of diameter 1 that are initially
placed at integer positions; in contrast we show that the problem is NP-hard
even for sensors of diameter 2 that are initially placed at integer positions.
We show that the MinSum problem is solvable in O(n log n) time for homogeneous
range sensors in arbitrary initial positions, while it is NP-hard for
heterogeneous sensor ranges. Finally, we prove that even very restricted
homogeneous versions of the MinMax problem are NP-hard.
|
[
{
"version": "v1",
"created": "Wed, 25 Jan 2017 13:06:16 GMT"
}
] | 2017-01-26T00:00:00 |
[
[
"Dobrev",
"Stefan",
""
],
[
"Kranakis",
"Evangelos",
""
],
[
"Krizanc",
"Danny",
""
],
[
"Lafond",
"Manuel",
""
],
[
"Manuch",
"Jan",
""
],
[
"Narayanan",
"Lata",
""
],
[
"Opatrny",
"Jaroslav",
""
],
[
"Stacho",
"Ladislav",
""
]
] |
new_dataset
| 0.982088 |
1701.07354
|
David Villacis
|
David Villacis, Santeri Kaupinm\"aki, Samuli Siltanen, Teemu Helenius
|
Photographic dataset: playing cards
|
9 pages, 12 figures
| null | null | null |
cs.CV physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is a photographic dataset collected for testing image processing
algorithms. The idea is to have images that can exploit the properties of total
variation, therefore a set of playing cards was distributed on the scene. The
dataset is made available at www.fips.fi/photographic_dataset2.php
|
[
{
"version": "v1",
"created": "Wed, 25 Jan 2017 15:35:09 GMT"
}
] | 2017-01-26T00:00:00 |
[
[
"Villacis",
"David",
""
],
[
"Kaupinmäki",
"Santeri",
""
],
[
"Siltanen",
"Samuli",
""
],
[
"Helenius",
"Teemu",
""
]
] |
new_dataset
| 0.999708 |
1701.07396
|
Christian Reul
|
Christian Reul, Uwe Springmann, and Frank Puppe
|
LAREX - A semi-automatic open-source Tool for Layout Analysis and Region
Extraction on Early Printed Books
| null | null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A semi-automatic open-source tool for layout analysis on early printed books
is presented. LAREX uses a rule based connected components approach which is
very fast, easily comprehensible for the user and allows an intuitive manual
correction if necessary. The PageXML format is used to support integration into
existing OCR workflows. Evaluations showed that LAREX provides an efficient and
flexible way to segment pages of early printed books.
|
[
{
"version": "v1",
"created": "Fri, 20 Jan 2017 09:48:59 GMT"
}
] | 2017-01-26T00:00:00 |
[
[
"Reul",
"Christian",
""
],
[
"Springmann",
"Uwe",
""
],
[
"Puppe",
"Frank",
""
]
] |
new_dataset
| 0.994832 |
1508.07371
|
Vijay Gadepally
|
Vijay Gadepally, Jeremy Kepner, William Arcand, David Bestor, Bill
Bergeron, Chansup Byun, Lauren Edwards, Matthew Hubbell, Peter Michaleas,
Julie Mullen, Andrew Prout, Antonio Rosa, Charles Yee, Albert Reuther
|
D4M: Bringing Associative Arrays to Database Engines
| null | null |
10.1109/HPEC.2015.7322472
| null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The ability to collect and analyze large amounts of data is a growing problem
within the scientific community. The growing gap between data and users calls
for innovative tools that address the challenges faced by big data volume,
velocity and variety. Numerous tools exist that allow users to store, query and
index these massive quantities of data. Each storage or database engine comes
with the promise of dealing with complex data. Scientists and engineers who
wish to use these systems often quickly find that there is no single technology
that offers a panacea to the complexity of information. When using multiple
technologies, however, there is significant trouble in designing the movement
of information between storage and database engines to support an end-to-end
application along with a steep learning curve associated with learning the
nuances of each underlying technology. In this article, we present the Dynamic
Distributed Dimensional Data Model (D4M) as a potential tool to unify database
and storage engine operations. Previous articles on D4M have showcased the
ability of D4M to interact with the popular NoSQL Accumulo database. Recently
however, D4M now operates on a variety of backend storage or database engines
while providing a federated look to the end user through the use of associative
arrays. In order to showcase how new databases may be supported by D4M, we
describe the process of building the D4M-SciDB connector and present
performance of this connection.
|
[
{
"version": "v1",
"created": "Fri, 28 Aug 2015 22:46:56 GMT"
}
] | 2017-01-25T00:00:00 |
[
[
"Gadepally",
"Vijay",
""
],
[
"Kepner",
"Jeremy",
""
],
[
"Arcand",
"William",
""
],
[
"Bestor",
"David",
""
],
[
"Bergeron",
"Bill",
""
],
[
"Byun",
"Chansup",
""
],
[
"Edwards",
"Lauren",
""
],
[
"Hubbell",
"Matthew",
""
],
[
"Michaleas",
"Peter",
""
],
[
"Mullen",
"Julie",
""
],
[
"Prout",
"Andrew",
""
],
[
"Rosa",
"Antonio",
""
],
[
"Yee",
"Charles",
""
],
[
"Reuther",
"Albert",
""
]
] |
new_dataset
| 0.959462 |
1607.00117
|
Gianluca Stringhini
|
Andreas Haslebacher, Jeremiah Onaolapo, Gianluca Stringhini
|
All Your Cards Are Belong To Us: Understanding Online Carding Forums
| null | null | null | null |
cs.CR cs.CY cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Underground online forums are platforms that enable trades of illicit
services and stolen goods. Carding forums, in particular, are known for being
focused on trading financial information. However, little evidence exists about
the sellers that are present on carding forums, the precise types of products
they advertise, and the prices buyers pay. Existing literature mainly focuses
on the organisation and structure of the forums. Furthermore, studies on
carding forums are usually based on literature review, expert interviews, or
data from forums that have already been shut down. This paper provides
first-of-its-kind empirical evidence on active forums where stolen financial
data is traded. We monitored 5 out of 25 discovered forums, collected posts
from the forums over a three-month period, and analysed them quantitatively and
qualitatively. We focused our analyses on products, prices, seller prolificacy,
seller specialisation, and seller reputation.
|
[
{
"version": "v1",
"created": "Fri, 1 Jul 2016 06:18:05 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Jan 2017 12:25:13 GMT"
}
] | 2017-01-25T00:00:00 |
[
[
"Haslebacher",
"Andreas",
""
],
[
"Onaolapo",
"Jeremiah",
""
],
[
"Stringhini",
"Gianluca",
""
]
] |
new_dataset
| 0.999514 |
1701.01527
|
Albert Y.S. Lam
|
Albert Y.S. Lam, James J.Q. Yu, Yunhe Hou, and Victor O.K. Li
|
Coordinated Autonomous Vehicle Parking for Vehicle-to-Grid Services:
Formulation and Distributed Algorithm
|
10 pages, submitted for publication
| null |
10.1109/TSG.2017.2655299
| null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Autonomous vehicles (AVs) will revolutionarize ground transport and take a
substantial role in the future transportation system. Most AVs are likely to be
electric vehicles (EVs) and they can participate in the vehicle-to-grid (V2G)
system to support various V2G services. Although it is generally infeasible for
EVs to dictate their routes, we can design AV travel plans to fulfill certain
system-wide objectives. In this paper, we focus on the AVs looking for parking
and study how they can be led to appropriate parking facilities to support V2G
services. We formulate the Coordinated Parking Problem (CPP), which can be
solved by a standard integer linear program solver but requires long
computational time. To make it more practical, we develop a distributed
algorithm to address CPP based on dual decomposition. We carry out a series of
simulations to evaluate the proposed solution methods. Our results show that
the distributed algorithm can produce nearly optimal solutions with
substantially less computational time. A coarser time scale can improve
computational time but degrade the solution quality resulting in possible
infeasible solution. Even with communication loss, the distributed algorithm
can still perform well and converge with only little degradation in speed.
|
[
{
"version": "v1",
"created": "Fri, 6 Jan 2017 02:19:30 GMT"
}
] | 2017-01-25T00:00:00 |
[
[
"Lam",
"Albert Y. S.",
""
],
[
"Yu",
"James J. Q.",
""
],
[
"Hou",
"Yunhe",
""
],
[
"Li",
"Victor O. K.",
""
]
] |
new_dataset
| 0.988958 |
1701.04895
|
Samuel Albanie
|
Samuel Albanie, Hillary Shakespeare and Tom Gunter
|
Unknowable Manipulators: Social Network Curator Algorithms
|
NIPS Symposium 2016: Machine Learning and the Law
| null | null | null |
cs.AI cs.SI stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For a social networking service to acquire and retain users, it must find
ways to keep them engaged. By accurately gauging their preferences, it is able
to serve them with the subset of available content that maximises revenue for
the site. Without the constraints of an appropriate regulatory framework, we
argue that a sufficiently sophisticated curator algorithm tasked with
performing this process may choose to explore curation strategies that are
detrimental to users. In particular, we suggest that such an algorithm is
capable of learning to manipulate its users, for several qualitative reasons:
1. Access to vast quantities of user data combined with ongoing breakthroughs
in the field of machine learning are leading to powerful but uninterpretable
strategies for decision making at scale. 2. The availability of an effective
feedback mechanism for assessing the short and long term user responses to
curation strategies. 3. Techniques from reinforcement learning have allowed
machines to learn automated and highly successful strategies at an abstract
level, often resulting in non-intuitive yet nonetheless highly appropriate
action selection. In this work, we consider the form that these strategies for
user manipulation might take and scrutinise the role that regulation should
play in the design of such systems.
|
[
{
"version": "v1",
"created": "Tue, 17 Jan 2017 22:52:24 GMT"
}
] | 2017-01-25T00:00:00 |
[
[
"Albanie",
"Samuel",
""
],
[
"Shakespeare",
"Hillary",
""
],
[
"Gunter",
"Tom",
""
]
] |
new_dataset
| 0.959987 |
1701.06687
|
Mostafa Shahabinejad
|
Mostafa Shahabinejad, Majid Khabbazian, and Masoud Ardakani
|
On the Average Locality of Locally Repairable Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A linear block code with dimension $k$, length $n$, and minimum distance $d$
is called a locally repairable code (LRC) with locality $r$ if it can retrieve
any coded symbol by at most $r$ other coded symbols. LRCs have been recently
proposed and used in practice in distributed storage systems (DSSs) such as
Windows Azure storage and Facebook HDFS-RAID. Theoretical bounds on the maximum
locality of LRCs ($r$) have been established. The \textit{average} locality of
an LRC ($\overline{r}$) directly affects the costly repair bandwidth, disk I/O,
and number of nodes involved in the repair process of a missing data block.
There is a gap in the literature studying $\overline{r}$. In this paper, we
establish a lower bound on $\overline{r}$ of arbitrary $(n,k,d)$ LRCs.
Furthermore, we obtain a tight lower bound on $\overline{r}$ for a practical
case where the code rate $(R=\frac{k}{n})$ is greater than
$(1-\frac{1}{\sqrt{n}})^2$. Finally, we design three classes of LRCs that
achieve the obtained bounds on $\overline{r}$. Comparing with the existing
LRCs, our proposed codes improve the average locality without sacrificing such
crucial parameters as the code rate or minimum distance.
|
[
{
"version": "v1",
"created": "Mon, 23 Jan 2017 23:58:57 GMT"
}
] | 2017-01-25T00:00:00 |
[
[
"Shahabinejad",
"Mostafa",
""
],
[
"Khabbazian",
"Majid",
""
],
[
"Ardakani",
"Masoud",
""
]
] |
new_dataset
| 0.980844 |
1701.06817
|
Nidhi Rastogi
|
Nidhi Rastogi, James Hendler
|
WhatsApp security and role of metadata in preserving privacy
|
8 pages, 2 figures
| null | null | null |
cs.CR cs.NI cs.SI
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
WhatsApp messenger is arguably the most popular mobile app available on all
smart-phones. Over one billion people worldwide for free messaging, calling,
and media sharing use it. In April 2016, WhatsApp switched to a default
end-to-end encrypted service. This means that all messages (SMS), phone calls,
videos, audios, and any other form of information exchanged cannot be read by
any unauthorized entity since WhatsApp. In this paper we analyze the WhatsApp
messaging platform and critique its security architecture along with a focus on
its privacy preservation mechanisms. We report that the Signal Protocol, which
forms the basis of WhatsApp end-to-end encryption, does offer protection
against forward secrecy, and MITM to a large extent. Finally, we argue that
simply encrypting the end-to-end channel cannot preserve privacy. The metadata
can reveal just enough information to show connections between people, their
patterns, and personal information. This paper elaborates on the security
architecture of WhatsApp and performs an analysis on the various protocols
used. This enlightens us on the status quo of the app security and what further
measures can be used to fill existing gaps without compromising the usability.
We start by describing the following (i) important concepts that need to be
understood to properly understand security, (ii) the security architecture,
(iii) security evaluation, (iv) followed by a summary of our work. Some of the
important concepts that we cover in this paper before evaluating the
architecture are - end-to-end encryption (E2EE), signal protocol, and
curve25519. The description of the security architecture covers key management,
end-to-end encryption in WhatsApp, Authentication Mechanism, Message Exchange,
and finally the security evaluation. We then cover importance of metadata and
role it plays in conserving privacy with respect to whatsapp.
|
[
{
"version": "v1",
"created": "Tue, 24 Jan 2017 11:21:33 GMT"
}
] | 2017-01-25T00:00:00 |
[
[
"Rastogi",
"Nidhi",
""
],
[
"Hendler",
"James",
""
]
] |
new_dataset
| 0.999538 |
1701.06874
|
Eitan Yaakobi
|
Yeow Meng Chee, Han Mao Kiah, Alexander Vardy, Van Khu Vu, and Eitan
Yaakobi
|
Coding for Racetrack Memories
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Racetrack memory is a new technology which utilizes magnetic domains along a
nanoscopic wire in order to obtain extremely high storage density. In racetrack
memory, each magnetic domain can store a single bit of information, which can
be sensed by a reading port (head). The memory has a tape-like structure which
supports a shift operation that moves the domains to be read sequentially by
the head. In order to increase the memory's speed, prior work studied how to
minimize the latency of the shift operation, while the no less important
reliability of this operation has received only a little attention.
In this work we design codes which combat shift errors in racetrack memory,
called position errors. Namely, shifting the domains is not an error-free
operation and the domains may be over-shifted or are not shifted, which can be
modeled as deletions and sticky insertions. While it is possible to use
conventional deletion and insertion-correcting codes, we tackle this problem
with the special structure of racetrack memory, where the domains can be read
by multiple heads. Each head outputs a noisy version of the stored data and the
multiple outputs are combined in order to reconstruct the data. Under this
paradigm, we will show that it is possible to correct, with at most a single
bit of redundancy, $d$ deletions with $d+1$ heads if the heads are
well-separated. Similar results are provided for burst of deletions, sticky
insertions and combinations of both deletions and sticky insertions.
|
[
{
"version": "v1",
"created": "Tue, 24 Jan 2017 13:58:39 GMT"
}
] | 2017-01-25T00:00:00 |
[
[
"Chee",
"Yeow Meng",
""
],
[
"Kiah",
"Han Mao",
""
],
[
"Vardy",
"Alexander",
""
],
[
"Vu",
"Van Khu",
""
],
[
"Yaakobi",
"Eitan",
""
]
] |
new_dataset
| 0.979406 |
1701.07007
|
Mohamed Nafea Mr
|
Mohamed Nafea, Aylin Yener
|
A New Wiretap Channel Model and its Strong Secrecy Capacity
|
35 pages, 4 figures; Submitted to IEEE Transactions on Information
Theory, October 2016
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a new wiretap channel model is proposed, where the legitimate
transmitter and receiver communicate over a discrete memoryless channel. The
wiretapper has perfect access to a fixed-length subset of the transmitted
codeword symbols of her choosing. Additionally, she observes the remainder of
the transmitted symbols through a discrete memoryless channel. This new model
subsumes the classical wiretap channel and wiretap channel II with noisy main
channel as its special cases. The strong secrecy capacity of the proposed
channel model is identified. Achievability is established by solving a dual
secret key agreement problem in the source model, and converting the solution
to the original channel model using probability distribution approximation
arguments. In the dual problem, a source encoder and decoder, who observe
random sequences independent and identically distributed according to the input
and output distributions of the legitimate channel in the original problem,
communicate a confidential key over a public error-free channel using a single
forward transmission, in the presence of a compound wiretapping source who has
perfect access to the public discussion. The security of the key is guaranteed
for the exponentially many possibilities of the subset chosen at wiretapper by
deriving a lemma which provides a doubly-exponential convergence rate for the
probability that, for a fixed choice of the subset, the key is uniform and
independent from the public discussion and the wiretapping source's
observation. The converse is derived by using Sanov's theorem to upper bound
the secrecy capacity of the new wiretap channel model by the secrecy capacity
when the tapped subset is randomly chosen by nature.
|
[
{
"version": "v1",
"created": "Tue, 24 Jan 2017 18:45:32 GMT"
}
] | 2017-01-25T00:00:00 |
[
[
"Nafea",
"Mohamed",
""
],
[
"Yener",
"Aylin",
""
]
] |
new_dataset
| 0.998408 |
1503.02831
|
Kostas Peppas P
|
Kostas P. Peppas, and P. Takis Mathiopoulos
|
Free Space Optical Communication with Spatial Modulation and Coherent
Detection over H-K Atmospheric Turbulence Channels
| null |
Journal of Lightwave Technology ( Volume: 33, Issue: 20, Oct.15,
15 2015 )
|
10.1109/JLT.2015.2465385
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of optical spatial modulation (OSM), which has been recently emerged
as a power and bandwidth efficient pulsed modulation technique for indoor
optical wireless communication, is proposed as a simple, low-complexity means
of achieving spatial diversity in coherent free space optical (FSO)
communication systems. In doing so, this paper makes several novel
contributions as follows. It presents a generic analytical framework for
obtaining the Average Bit Error Probability (ABEP) of uncoded OSM with coherent
detection in the presence of turbulence-induced fading.
Although the framework is general enough to accommodate any type of models
based on turbulence scattering, the focus in this paper is the H-K
distribution. Although this distribution represents a very general scattering
model valid over a wide range of atmospheric conditions, it is has not been
considered in the past in conjunction with FSO systems possibly because of its
mathematical complexity. The proposed analytical framework yields exact
performance evaluation results for MIMO systems with two transmit- and an
arbitrary number of receive apertures. In addition, tight upper bounds are
derived for the error probability for OSM systems with an arbitrary number of
transmit apertures as well as for convolutionally encoded signals. The
performance of OSM is compared to that of well established coherent FSO
schemes, employing spatial diversity at the transmitter or the receiver only.
Specifically, it is shown that OSM can offer comparable performance with
conventional coherent FSO schemes while outperforming the latter in terms of
spectral efficiency and hardware complexity. Various numerical performance
evaluation results are also presented and compared with equivalent results
obtained by Monte Carlo simulations which verify the accuracy of the derived
analytical expressions.
|
[
{
"version": "v1",
"created": "Tue, 10 Mar 2015 09:44:05 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Mar 2015 00:45:38 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Peppas",
"Kostas P.",
""
],
[
"Mathiopoulos",
"P. Takis",
""
]
] |
new_dataset
| 0.985673 |
1611.01199
|
Marco Mondelli
|
Marco Mondelli, S. Hamed Hassani, Ivana Mari\'c, Dennis Hui, and
Song-Nam Hong
|
Capacity-Achieving Rate-Compatible Polar Codes for General Channels
|
7 pages, 2 figures, accepted at WCNC'17 workshop on polar coding
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a rate-compatible polar coding scheme that achieves the capacity
of any family of channels. Our solution generalizes the previous results [1],
[2] that provide capacity-achieving rate-compatible polar codes for a degraded
family of channels. The motivation for our extension comes from the fact that
in many practical scenarios, e.g., MIMO systems and non-Gaussian interference,
the channels cannot be ordered by degradation. The main technical contribution
of this paper consists in removing the degradation condition. To do so, we
exploit the ideas coming from the construction of universal polar codes.
Our scheme possesses the usual attractive features of polar codes: low
complexity code construction, encoding, and decoding; super-polynomial scaling
of the error probability with the block length; and absence of error floors. On
the negative side, the scaling of the gap to capacity with the block length is
slower than in standard polar codes, and we prove an upper bound on the scaling
exponent.
|
[
{
"version": "v1",
"created": "Thu, 3 Nov 2016 21:25:26 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Jan 2017 20:03:50 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Mondelli",
"Marco",
""
],
[
"Hassani",
"S. Hamed",
""
],
[
"Marić",
"Ivana",
""
],
[
"Hui",
"Dennis",
""
],
[
"Hong",
"Song-Nam",
""
]
] |
new_dataset
| 0.993232 |
1701.06033
|
Parastoo Sadeghi
|
Yucheng Liu, Parastoo Sadeghi, Fatemeh Arbabjolfaei, Young-Han Kim
|
On the Capacity for Distributed Index Coding
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The distributed index coding problem is studied, whereby multiple messages
are stored at different servers to be broadcast to receivers with side
information. First, the existing composite coding scheme is enhanced for the
centralized (single-server) index coding problem, which is then merged with
fractional partitioning of servers to yield a new coding scheme for distributed
index coding. New outer bounds on the capacity region are also established. For
213 out of 218 non-isomorphic distributed index coding problems with four
messages the achievable sum-rate of the proposed distributed composite coding
scheme matches the outer bound, thus establishing the sum-capacity for these
problems.
|
[
{
"version": "v1",
"created": "Sat, 21 Jan 2017 14:28:30 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Liu",
"Yucheng",
""
],
[
"Sadeghi",
"Parastoo",
""
],
[
"Arbabjolfaei",
"Fatemeh",
""
],
[
"Kim",
"Young-Han",
""
]
] |
new_dataset
| 0.953709 |
1701.06109
|
Hunter Elliott
|
David Richmond, Anna Payne-Tobin Jost, Talley Lambert, Jennifer
Waters, Hunter Elliott
|
DeadNet: Identifying Phototoxicity from Label-free Microscopy Images of
Cells using Deep ConvNets
| null | null | null | null |
cs.CV q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Exposure to intense illumination light is an unavoidable consequence of
fluorescence microscopy, and poses a risk to the health of the sample in every
live-cell fluorescence microscopy experiment. Furthermore, the possible
side-effects of phototoxicity on the scientific conclusions that are drawn from
an imaging experiment are often unaccounted for. Previously, controlling for
phototoxicity in imaging experiments required additional labels and
experiments, limiting its widespread application. Here we provide a
proof-of-principle demonstration that the phototoxic effects of an imaging
experiment can be identified directly from a single phase-contrast image using
deep convolutional neural networks (ConvNets). This lays the groundwork for an
automated tool for assessing cell health in a wide range of imaging
experiments. Interpretability of such a method is crucial for its adoption. We
take steps towards interpreting the classification mechanism of the trained
ConvNet by visualizing salient features of images that contribute to accurate
classification.
|
[
{
"version": "v1",
"created": "Sun, 22 Jan 2017 01:43:05 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Richmond",
"David",
""
],
[
"Jost",
"Anna Payne-Tobin",
""
],
[
"Lambert",
"Talley",
""
],
[
"Waters",
"Jennifer",
""
],
[
"Elliott",
"Hunter",
""
]
] |
new_dataset
| 0.983505 |
1701.06110
|
Pengfei Huang
|
Pengfei Huang, Eitan Yaakobi, Paul H. Siegel
|
Multi-Erasure Locally Recoverable Codes Over Small Fields For Flash
Memory Array
|
Submitted to ISIT 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Erasure codes play an important role in storage systems to prevent data loss.
In this work, we study a class of erasure codes called Multi-Erasure Locally
Recoverable Codes (ME-LRCs) for flash memory array. Compared to previous
related works, we focus on the construction of ME-LRCs over small fields. We
first develop upper and lower bounds on the minimum distance of ME-LRCs. These
bounds explicitly take the field size into account. Our main contribution is to
propose a general construction of ME-LRCs based on generalized tensor product
codes, and study their erasure-correcting property. A decoding algorithm
tailored for erasure recovery is given. We then prove that our construction
yields optimal ME-LRCs with a wide range of code parameters. Finally, we
present several families of ME-LRCs over different fields.
|
[
{
"version": "v1",
"created": "Sun, 22 Jan 2017 01:51:22 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Huang",
"Pengfei",
""
],
[
"Yaakobi",
"Eitan",
""
],
[
"Siegel",
"Paul H.",
""
]
] |
new_dataset
| 0.990856 |
1701.06233
|
Tianran Hu
|
Tianran Hu, Haoyuan Xiao, Thuy-vy Thi Nguyen, Jiebo Luo
|
What the Language You Tweet Says About Your Occupation
|
Published at the 10th International AAAI Conference on Web and Social
Media (ICWSM-16)
| null | null | null |
cs.CY cs.AI cs.CL cs.LG
|
http://creativecommons.org/licenses/by/4.0/
|
Many aspects of people's lives are proven to be deeply connected to their
jobs. In this paper, we first investigate the distinct characteristics of major
occupation categories based on tweets. From multiple social media platforms, we
gather several types of user information. From users' LinkedIn webpages, we
learn their proficiencies. To overcome the ambiguity of self-reported
information, a soft clustering approach is applied to extract occupations from
crowd-sourced data. Eight job categories are extracted, including Marketing,
Administrator, Start-up, Editor, Software Engineer, Public Relation, Office
Clerk, and Designer. Meanwhile, users' posts on Twitter provide cues for
understanding their linguistic styles, interests, and personalities. Our
results suggest that people of different jobs have unique tendencies in certain
language styles and interests. Our results also clearly reveal distinctive
levels in terms of Big Five Traits for different jobs. Finally, a classifier is
built to predict job types based on the features extracted from tweets. A high
accuracy indicates a strong discrimination power of language features for job
prediction task.
|
[
{
"version": "v1",
"created": "Sun, 22 Jan 2017 23:03:11 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Hu",
"Tianran",
""
],
[
"Xiao",
"Haoyuan",
""
],
[
"Nguyen",
"Thuy-vy Thi",
""
],
[
"Luo",
"Jiebo",
""
]
] |
new_dataset
| 0.995534 |
1701.06236
|
Tianran Hu
|
Tianran Hu, Eric Bigelow, Jiebo Luo, Henry Kautz
|
Tales of Two Cities: Using Social Media to Understand Idiosyncratic
Lifestyles in Distinctive Metropolitan Areas
|
Published at IEEE transactions on Big Data
| null | null | null |
cs.SI cs.CY
|
http://creativecommons.org/licenses/by/4.0/
|
Lifestyles are a valuable model for understanding individuals' physical and
mental lives, comparing social groups, and making recommendations for improving
people's lives. In this paper, we examine and compare lifestyle behaviors of
people living in cities of different sizes, utilizing freely available social
media data as a large-scale, low-cost alternative to traditional survey
methods. We use the Greater New York City area as a representative for large
cities, and the Greater Rochester area as a representative for smaller cities
in the United States. We employed matrix factor analysis as an unsupervised
method to extract salient mobility and work-rest patterns for a large
population of users within each metropolitan area. We discovered interesting
human behavior patterns at both a larger scale and a finer granularity than is
present in previous literature, some of which allow us to quantitatively
compare the behaviors of individuals of living in big cities to those living in
small cities. We believe that our social media-based approach to lifestyle
analysis represents a powerful tool for social computing in the big data age.
|
[
{
"version": "v1",
"created": "Sun, 22 Jan 2017 23:44:44 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Hu",
"Tianran",
""
],
[
"Bigelow",
"Eric",
""
],
[
"Luo",
"Jiebo",
""
],
[
"Kautz",
"Henry",
""
]
] |
new_dataset
| 0.999597 |
1701.06247
|
Hongjie Shi
|
Hongjie Shi, Takashi Ushio, Mitsuru Endo, Katsuyoshi Yamagami, Noriaki
Horii
|
A Multichannel Convolutional Neural Network For Cross-language Dialog
State Tracking
|
Copyright 2016 IEEE. Published in the 2016 IEEE Workshop on Spoken
Language Technology (SLT 2016)
| null | null | null |
cs.CL cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The fifth Dialog State Tracking Challenge (DSTC5) introduces a new
cross-language dialog state tracking scenario, where the participants are asked
to build their trackers based on the English training corpus, while evaluating
them with the unlabeled Chinese corpus. Although the computer-generated
translations for both English and Chinese corpus are provided in the dataset,
these translations contain errors and careless use of them can easily hurt the
performance of the built trackers. To address this problem, we propose a
multichannel Convolutional Neural Networks (CNN) architecture, in which we
treat English and Chinese language as different input channels of one single
CNN model. In the evaluation of DSTC5, we found that such multichannel
architecture can effectively improve the robustness against translation errors.
Additionally, our method for DSTC5 is purely machine learning based and
requires no prior knowledge about the target language. We consider this a
desirable property for building a tracker in the cross-language context, as not
every developer will be familiar with both languages.
|
[
{
"version": "v1",
"created": "Mon, 23 Jan 2017 01:36:10 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Shi",
"Hongjie",
""
],
[
"Ushio",
"Takashi",
""
],
[
"Endo",
"Mitsuru",
""
],
[
"Yamagami",
"Katsuyoshi",
""
],
[
"Horii",
"Noriaki",
""
]
] |
new_dataset
| 0.999019 |
1701.06325
|
Lebsework Lemma
|
Lebsework Negash, Sang-Hyeon Kim and Han-Lim Choi
|
Distributed Unknown-Input-Observers for Cyber Attack Detection and
Isolation in Formation Flying UAVs
|
Submitted to Journal of Aerospace Information Systems (JAIS)
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, cyber attack detection and isolation is studied on a network
of UAVs in a formation flying setup. As the UAVs communicate to reach consensus
on their states while making the formation, the communication network among the
UAVs makes them vulnerable to a potential attack from malicious adversaries.
Two types of attacks pertinent to a network of UAVs have been considered: a
node attack on the UAVs and a deception attack on the communication between the
UAVs. UAVs formation control presented using a consensus algorithm to reach a
pre-specified formation. A node and a communication path deception cyber
attacks on the UAV's network are considered with their respective models in the
formation setup. For these cyber attacks detection, a bank of Unknown Input
Observer (UIO) based distributed fault detection scheme proposed to detect and
identify the compromised UAV in the formation. A rule based on the residuals
generated using the bank of UIOs are used to detect attacks and identify the
compromised UAV in the formation. Further, an algorithm developed to remove the
faulty UAV from the network once an attack detected and the compromised UAV
isolated while maintaining the formation flight with a missing UAV node.
|
[
{
"version": "v1",
"created": "Mon, 23 Jan 2017 10:38:41 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Negash",
"Lebsework",
""
],
[
"Kim",
"Sang-Hyeon",
""
],
[
"Choi",
"Han-Lim",
""
]
] |
new_dataset
| 0.983417 |
1701.06382
|
Daniel Sanz Ausin
|
Daniel Sanz Ausin and Fabian Goerge
|
Design of an Audio Interface for Patmos
| null | null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes the design and implementation of an audio interface for
the Patmos processor, which runs on an Altera DE2-115 FPGA board. This board
has an audio codec included, the WM8731. The interface described in this work
allows to receive and send audio from and to the WM8731, and to synthesize,
store or manipulate audio signals writing C programs for Patmos. The audio
interface described in this paper is intended to be used with the Patmos
processor. Patmos is an open source RISC ISAs with a load-store architecture,
that is optimized for Real-Time Systems. Patmos is part of a project founded by
the European Union called T-CREST (Time-predictable Multi-Core Architecture for
Embedded Systems).[5] The structure of this project is integrated with the
Patmos project: new hardware modules have been added as IOs, which allow the
communication between the processor and the audio codec. These modules include
a clock generator for the audio chip, ADC and DAC modules for the audio
conversion from analog to digital and vice versa, and an I2C module which
allows setting configuration parameters on the audio codec. Moreover, a top
module has been created, which connects all the modules previously mentioned
between them, to Patmos and to the WM8731, using the external pins of the FPGA.
|
[
{
"version": "v1",
"created": "Mon, 23 Jan 2017 13:40:16 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Ausin",
"Daniel Sanz",
""
],
[
"Goerge",
"Fabian",
""
]
] |
new_dataset
| 0.991851 |
1701.06415
|
Eduardo M. Vasconcelos
|
Eduardo M. Vasconcelos
|
Steady state availability general equations of decision and sequential
processes in Continuous Time Markov Chain models
|
2 pages, 3 Figures
| null | null | null |
cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Continuous Time Markov Chain (CMTC) is widely used to describe and analyze
systems in several knowledge areas. Steady state availability is one important
analysis that can be made through Markov chain formalism that allows
researchers generate equations for several purposes, such as channel capacity
estimation in wireless networks as well as system performance estimations. The
problem with this kind of analysis is the complex process to generating these
equations. In this letter, we have developed general equations for decision and
sequential processes of CMTC Models, aiming to help researchers to develop
steady state availability equations. We also have developed the general
equation here termed as Closed Decision Process.
|
[
{
"version": "v1",
"created": "Fri, 20 Jan 2017 16:21:41 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Vasconcelos",
"Eduardo M.",
""
]
] |
new_dataset
| 0.993167 |
1701.06428
|
Leon Abdillah
|
Leon Andretti Abdillah
|
Ujian Online Mahasiswa Ilmu Komputer Berbasis Smartphone
|
8 pages, in Indonesian. Paper presented at the Seminar Nasional Riset
Ilmu Komputer Ke-2 (SNRIK2016), Makassar. http://snrik.fikom.umi.ac.id/
(2016)
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Information technology influence higher education in various aspects,
including education sector. This article discusses how smartphones facilitate
online examination in computer science and information systems students. The
research objective to be achieved by the researchers through the research, are
as follows: 1) Utilizing smartphone as a media test online exam, 2) How to make
use of social technologies in online test, and 3) Identify the features or
facilities that could be used for the implementation of an online exam.
Observations was conducted with 87 early year students as respondents. Author
develop the online questions by using google forms, and facebook to disseminate
online examination questions. Research findings show that Android are
dominantly gadgets used by students for their online examination. Smartphone
based online exam help students concentration in online exam. Social
information technology like facebook and google forms have rich features in
supporting online examination for computer science students. The use of
smartphones, google forms, and facebook can create an atmosphere of exams
modern, efficient, and environmentally friendly.
|
[
{
"version": "v1",
"created": "Sat, 17 Dec 2016 02:41:14 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Abdillah",
"Leon Andretti",
""
]
] |
new_dataset
| 0.997823 |
1701.06434
|
Yahia Ahmed Eldemerdash
|
Walid A. Jerjawi, Yahia A. Eldemerdash, and Octavia A. Dobre
|
Second-order Cyclostationarity-based Detection of LTE SC-FDMA Signals
for Cognitive Radio Systems
| null | null |
10.1109/TIM.2014.2357592
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we investigate the detection of long term evolution (LTE)
single carrier-frequency division multiple access (SC-FDMA) signals, with
application to cognitive radio systems. We explore the second-order
cyclostationarity of the LTE SC-FDMA signals, and apply results obtained for
the cyclic autocorrelation function to signal detection. The proposed detection
algorithm provides a very good performance under various channel conditions,
with a short observation time and at low signal-to-noise ratios, with reduced
complexity. The validity of the proposed algorithm is verified using signals
generated and acquired by laboratory instrumentation, and the experimental
results show a good match with computer simulation results.
|
[
{
"version": "v1",
"created": "Mon, 12 Dec 2016 22:12:30 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Jerjawi",
"Walid A.",
""
],
[
"Eldemerdash",
"Yahia A.",
""
],
[
"Dobre",
"Octavia A.",
""
]
] |
new_dataset
| 0.964195 |
1701.06509
|
Mohammad Hosseini
|
Mohammad Hosseini and Viswanathan Swaminathan
|
Adaptive 360 VR Video Streaming based on MPEG-DASH SRD
|
IEEE International Symposium on Multimedia 2016 (ISM '16), December
4-7, San Jose, California, USA. arXiv admin note: substantial text overlap
with arXiv:1609.08729
| null | null | null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We demonstrate an adaptive bandwidth-efficient 360 VR video streaming system
based on MPEG-DASH SRD. We extend MPEG-DASH SRD to the 3D space of 360 VR
videos, and showcase a dynamic view-aware adaptation technique to tackle the
high bandwidth demands of streaming 360 VR videos to wireless VR headsets. We
spatially partition the underlying 3D mesh into multiple 3D sub-meshes, and
construct an efficient 3D geometry mesh called hexaface sphere to optimally
represent tiled 360 VR videos in the 3D space. We then spatially divide the 360
videos into multiple tiles while encoding and packaging, use MPEG-DASH SRD to
describe the spatial relationship of tiles in the 3D space, and prioritize the
tiles in the Field of View (FoV) for view-aware adaptation. Our initial
evaluation results show that we can save up to 72% of the required bandwidth on
360 VR video streaming with minor negative quality impacts compared to the
baseline scenario when no adaptations is applied.
|
[
{
"version": "v1",
"created": "Mon, 23 Jan 2017 17:11:32 GMT"
}
] | 2017-01-24T00:00:00 |
[
[
"Hosseini",
"Mohammad",
""
],
[
"Swaminathan",
"Viswanathan",
""
]
] |
new_dataset
| 0.995537 |
1506.02799
|
Stefano D'Aronco
|
Stefano D'Aronco, Laura Toni, Sergio Mena, Xiaoqing Zhu and Pascal
Frossard
|
Improved Utility-based Congestion Control for Delay-Constrained
Communication
| null | null |
10.1109/TNET.2016.2587579
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Due to the presence of buffers in the inner network nodes, each congestion
event leads to buffer queueing and thus to an increasing end-to-end delay. In
the case of delay sensitive applications, a large delay might not be acceptable
and a solution to properly manage congestion events while maintaining a low
end-to-end delay is required. Delay-based congestion algorithms are a viable
solution as they target to limit the experienced end-to-end delay.
Unfortunately, they do not perform well when sharing the bandwidth with
congestion control algorithms not regulated by delay constraints (e.g.,
loss-based algorithms). Our target is to fill this gap, proposing a novel
congestion control algorithm for delay-constrained communication over best
effort packet switched networks. The proposed algorithm is able to maintain a
bounded queueing delay when competing with other delay-based flows, and avoid
starvation when competing with loss-based flows. We adopt the well-known
price-based distributed mechanism as congestion control, but: 1) we introduce a
novel non-linear mapping between the experienced delay and the price function
and 2) we combine both delay and loss information into a single price term
based on packet interarrival measurements. We then provide a stability analysis
for our novel algorithm and we show its performance in the simulation results
carried out in the NS3 framework. Simulation results demonstrate that the
proposed algorithm is able to: achieve good intra-protocol fairness properties,
control efficiently the end-to-end delay, and finally, protect the flow from
starvation when other flows cause the queuing delay to grow excessively.
|
[
{
"version": "v1",
"created": "Tue, 9 Jun 2015 07:02:31 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Sep 2015 12:55:22 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Jan 2017 11:36:58 GMT"
}
] | 2017-01-23T00:00:00 |
[
[
"D'Aronco",
"Stefano",
""
],
[
"Toni",
"Laura",
""
],
[
"Mena",
"Sergio",
""
],
[
"Zhu",
"Xiaoqing",
""
],
[
"Frossard",
"Pascal",
""
]
] |
new_dataset
| 0.99802 |
1612.08157
|
Mauro Coletto
|
Mauro Coletto, Luca Maria Aiello, Claudio Lucchese, Fabrizio Silvestri
|
Pornography consumption in Social Media
|
arXiv admin note: text overlap with arXiv:1610.08372
| null | null | null |
cs.CY cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The structure of a social network is fundamentally related to the interests
of its members. People assort spontaneously based on the topics that are
relevant to them, forming social groups that revolve around different subjects.
Online social media are also favorable ecosystems for the formation of topical
communities centered on matters that are not commonly taken up by the general
public because of the embarrassment, discomfort, or shock they may cause. Those
are communities that depict or discuss what are usually referred to as deviant
behaviors, conducts that are commonly considered inappropriate because they are
somehow violative of society's norms or moral standards that are shared among
the majority of the members of society. Pornography consumption, drug use,
excessive drinking, illegal hunting, eating disorders, or any self-harming or
addictive practice are all examples of deviant behaviors.
|
[
{
"version": "v1",
"created": "Sat, 24 Dec 2016 09:45:32 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Jan 2017 08:54:30 GMT"
}
] | 2017-01-23T00:00:00 |
[
[
"Coletto",
"Mauro",
""
],
[
"Aiello",
"Luca Maria",
""
],
[
"Lucchese",
"Claudio",
""
],
[
"Silvestri",
"Fabrizio",
""
]
] |
new_dataset
| 0.991733 |
1612.09572
|
Massimiliano Dal Mas
|
Massimiliano Dal Mas
|
FolksoDrivenCloud: an annotation and process application for social
collaborative networking
|
9 pages, 3 figures; for details see: http://www.maxdalmas.com
| null | null | null |
cs.CY cs.IR cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present the FolksoDriven Cloud (FDC) built on Cloud and on
Semantic technologies. Cloud computing has emerged in these recent years as the
new paradigm for the provision of on-demand distributed computing resources.
Semantic Web can be used for relationship between different data and
descriptions of services to annotate provenance of repositories on ontologies.
The FDC service is composed of a back-end which submits and monitors the
documents, and a user front-end which allows users to schedule on-demand
operations and to watch the progress of running processes. The impact of the
proposed method is illustrated on a user since its inception.
|
[
{
"version": "v1",
"created": "Fri, 30 Dec 2016 19:47:38 GMT"
}
] | 2017-01-23T00:00:00 |
[
[
"Mas",
"Massimiliano Dal",
""
]
] |
new_dataset
| 0.999503 |
1701.05754
|
Daniel Beale Dr
|
Daniel Beale
|
User-guided free-form asset modelling
| null | null | null | null |
cs.GR
|
http://creativecommons.org/publicdomain/zero/1.0/
|
In this paper a new system for piecewise primitive surface recovery on point
clouds is presented, which allows a novice user to sketch areas of interest in
order to guide the fitting process. The algorithm is demonstrated against a
benchmark technique for autonomous surface fitting, and, contrasted against
existing literature in user guided surface recovery, with empirical evidence.
It is concluded that the system is an improvement to the current documented
literature for its visual quality when modelling objects which are composed of
piecewise primitive shapes, and, in its ability to fill large holes on occluded
surfaces using free-form input.
|
[
{
"version": "v1",
"created": "Fri, 20 Jan 2017 10:58:20 GMT"
}
] | 2017-01-23T00:00:00 |
[
[
"Beale",
"Daniel",
""
]
] |
new_dataset
| 0.955738 |
1701.05888
|
Joseph Tassarotti
|
Joseph Tassarotti, Ralf Jung, Robert Harper
|
A Higher-Order Logic for Concurrent Termination-Preserving Refinement
|
78 pages, extended version of a conference paper for ESOP 2017
| null | null | null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compiler correctness proofs for higher-order concurrent languages are
difficult: they involve establishing a termination-preserving refinement
between a concurrent high-level source language and an implementation that uses
low-level shared memory primitives. However, existing logics for proving
concurrent refinement either neglect properties such as termination, or only
handle first-order state. In this paper, we address these limitations by
extending Iris, a recent higher-order concurrent separation logic, with support
for reasoning about termination-preserving refinements. To demonstrate the
power of these extensions, we prove the correctness of an efficient
implementation of a higher-order, session-typed language. To our knowledge,
this is the first program logic capable of giving a compiler correctness proof
for such a language. The soundness of our extensions and our compiler
correctness proof have been mechanized in Coq.
|
[
{
"version": "v1",
"created": "Fri, 20 Jan 2017 18:42:43 GMT"
}
] | 2017-01-23T00:00:00 |
[
[
"Tassarotti",
"Joseph",
""
],
[
"Jung",
"Ralf",
""
],
[
"Harper",
"Robert",
""
]
] |
new_dataset
| 0.95022 |
1701.05360
|
James Booth
|
James Booth, Epameinondas Antonakos, Stylianos Ploumpis, George
Trigeorgis, Yannis Panagakis, and Stefanos Zafeiriou
|
3D Face Morphable Models "In-the-Wild"
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
3D Morphable Models (3DMMs) are powerful statistical models of 3D facial
shape and texture, and among the state-of-the-art methods for reconstructing
facial shape from single images. With the advent of new 3D sensors, many 3D
facial datasets have been collected containing both neutral as well as
expressive faces. However, all datasets are captured under controlled
conditions. Thus, even though powerful 3D facial shape models can be learnt
from such data, it is difficult to build statistical texture models that are
sufficient to reconstruct faces captured in unconstrained conditions
("in-the-wild"). In this paper, we propose the first, to the best of our
knowledge, "in-the-wild" 3DMM by combining a powerful statistical model of
facial shape, which describes both identity and expression, with an
"in-the-wild" texture model. We show that the employment of such an
"in-the-wild" texture model greatly simplifies the fitting procedure, because
there is no need to optimize with regards to the illumination parameters.
Furthermore, we propose a new fast algorithm for fitting the 3DMM in arbitrary
images. Finally, we have captured the first 3D facial database with relatively
unconstrained conditions and report quantitative evaluations with
state-of-the-art performance. Complementary qualitative reconstruction results
are demonstrated on standard "in-the-wild" facial databases. An open source
implementation of our technique is released as part of the Menpo Project.
|
[
{
"version": "v1",
"created": "Thu, 19 Jan 2017 10:27:38 GMT"
}
] | 2017-01-20T00:00:00 |
[
[
"Booth",
"James",
""
],
[
"Antonakos",
"Epameinondas",
""
],
[
"Ploumpis",
"Stylianos",
""
],
[
"Trigeorgis",
"George",
""
],
[
"Panagakis",
"Yannis",
""
],
[
"Zafeiriou",
"Stefanos",
""
]
] |
new_dataset
| 0.989656 |
1701.05467
|
Oliviero Riganelli
|
Oliviero Riganelli and Daniela Micucci and Leonardo Mariani
|
Healing Data Loss Problems in Android Apps
|
IEEE International Symposium on Software Reliability Engineering
Workshops (ISSREW), 2016
| null |
10.1109/ISSREW.2016.50
| null |
cs.SE
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Android apps should be designed to cope with stop-start events, which are the
events that require stopping and restoring the execution of an app while
leaving its state unaltered. These events can be caused by run-time
configuration changes, such as a screen rotation, and by context-switches, such
as a switch from one app to another. When a stop-start event occurs, Android
saves the state of the app, handles the event, and finally restores the saved
state. To let Android save and restore the state correctly, apps must provide
the appropriate support. Unfortunately, Android developers often implement this
support incorrectly, or do not implement it at all. This bad practice makes
apps to incorrectly react to stop-start events, thus generating what we defined
data loss problems, that is Android apps that lose user data, behave
unexpectedly, and crash due to program variables that lost their values. Data
loss problems are difficult to detect because they might be observed only when
apps are in specific states and with specific inputs. Covering all the possible
cases with testing may require a large number of test cases whose execution
must be checked manually to discover whether the app under test has been
correctly restored after each stop-start event. It is thus important to
complement traditional in-house testing activities with mechanisms that can
protect apps as soon as a data loss problem occurs in the field. In this paper
we present DataLossHealer, a technique for automatically identifying and
healing data loss problems in the field as soon as they occur. DataLossHealer
is a technique that checks at run-time whether states are recovered correctly,
and heals the app when needed. DataLossHealer can learn from experience,
incrementally reducing the overhead that is introduced avoiding to monitor
interactions that have been managed correctly by the app in the past.
|
[
{
"version": "v1",
"created": "Thu, 19 Jan 2017 15:15:55 GMT"
}
] | 2017-01-20T00:00:00 |
[
[
"Riganelli",
"Oliviero",
""
],
[
"Micucci",
"Daniela",
""
],
[
"Mariani",
"Leonardo",
""
]
] |
new_dataset
| 0.978888 |
1701.05475
|
Tillmann Miltzow
|
Mikkel Abrahamsen, Anna Adamaszek, Tillmann Miltzow
|
Irrational Guards are Sometimes Needed
|
18 pages 10 Figures
| null | null | null |
cs.CG cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study the art gallery problem, which is one of the
fundamental problems in computational geometry. The objective is to place a
minimum number of guards inside a simple polygon such that the guards together
can see the whole polygon. We say that a guard at position $x$ sees a point $y$
if the line segment $xy$ is fully contained in the polygon.
Despite an extensive study of the art gallery problem, it remained an open
question whether there are polygons given by integer coordinates that require
guard positions with irrational coordinates in any optimal solution. We give a
positive answer to this question by constructing a monotone polygon with
integer coordinates that can be guarded by three guards only when we allow to
place the guards at points with irrational coordinates. Otherwise, four guards
are needed. By extending this example, we show that for every $n$, there is
polygon which can be guarded by $3n$ guards with irrational coordinates but
need $4n$ guards if the coordinates have to be rational. Subsequently, we show
that there are rectilinear polygons given by integer coordinates that require
guards with irrational coordinates in any optimal solution.
|
[
{
"version": "v1",
"created": "Thu, 19 Jan 2017 15:33:50 GMT"
}
] | 2017-01-20T00:00:00 |
[
[
"Abrahamsen",
"Mikkel",
""
],
[
"Adamaszek",
"Anna",
""
],
[
"Miltzow",
"Tillmann",
""
]
] |
new_dataset
| 0.989798 |
1701.05498
|
Tomas Hodan
|
Tomas Hodan, Pavel Haluza, Stepan Obdrzalek, Jiri Matas, Manolis
Lourakis, Xenophon Zabulis
|
T-LESS: An RGB-D Dataset for 6D Pose Estimation of Texture-less Objects
|
WACV 2017
| null | null | null |
cs.CV cs.AI cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce T-LESS, a new public dataset for estimating the 6D pose, i.e.
translation and rotation, of texture-less rigid objects. The dataset features
thirty industry-relevant objects with no significant texture and no
discriminative color or reflectance properties. The objects exhibit symmetries
and mutual similarities in shape and/or size. Compared to other datasets, a
unique property is that some of the objects are parts of others. The dataset
includes training and test images that were captured with three synchronized
sensors, specifically a structured-light and a time-of-flight RGB-D sensor and
a high-resolution RGB camera. There are approximately 39K training and 10K test
images from each sensor. Additionally, two types of 3D models are provided for
each object, i.e. a manually created CAD model and a semi-automatically
reconstructed one. Training images depict individual objects against a black
background. Test images originate from twenty test scenes having varying
complexity, which increases from simple scenes with several isolated objects to
very challenging ones with multiple instances of several objects and with a
high amount of clutter and occlusion. The images were captured from a
systematically sampled view sphere around the object/scene, and are annotated
with accurate ground truth 6D poses of all modeled objects. Initial evaluation
results indicate that the state of the art in 6D object pose estimation has
ample room for improvement, especially in difficult cases with significant
occlusion. The T-LESS dataset is available online at cmp.felk.cvut.cz/t-less.
|
[
{
"version": "v1",
"created": "Thu, 19 Jan 2017 16:16:36 GMT"
}
] | 2017-01-20T00:00:00 |
[
[
"Hodan",
"Tomas",
""
],
[
"Haluza",
"Pavel",
""
],
[
"Obdrzalek",
"Stepan",
""
],
[
"Matas",
"Jiri",
""
],
[
"Lourakis",
"Manolis",
""
],
[
"Zabulis",
"Xenophon",
""
]
] |
new_dataset
| 0.999754 |
1309.7367
|
M. Sadegh Talebi
|
M. Sadegh Talebi, Zhenhua Zou, Richard Combes, Alexandre Proutiere,
Mikael Johansson
|
Stochastic Online Shortest Path Routing: The Value of Feedback
|
18 pages
| null | null | null |
cs.NI cs.LG math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies online shortest path routing over multi-hop networks. Link
costs or delays are time-varying and modeled by independent and identically
distributed random processes, whose parameters are initially unknown. The
parameters, and hence the optimal path, can only be estimated by routing
packets through the network and observing the realized delays. Our aim is to
find a routing policy that minimizes the regret (the cumulative difference of
expected delay) between the path chosen by the policy and the unknown optimal
path. We formulate the problem as a combinatorial bandit optimization problem
and consider several scenarios that differ in where routing decisions are made
and in the information available when making the decisions. For each scenario,
we derive a tight asymptotic lower bound on the regret that has to be satisfied
by any online routing policy. These bounds help us to understand the
performance improvements we can expect when (i) taking routing decisions at
each hop rather than at the source only, and (ii) observing per-link delays
rather than end-to-end path delays. In particular, we show that (i) is of no
use while (ii) can have a spectacular impact. Three algorithms, with a
trade-off between computational complexity and performance, are proposed. The
regret upper bounds of these algorithms improve over those of the existing
algorithms, and they significantly outperform state-of-the-art algorithms in
numerical experiments.
|
[
{
"version": "v1",
"created": "Fri, 27 Sep 2013 20:56:41 GMT"
},
{
"version": "v2",
"created": "Thu, 28 May 2015 11:41:51 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Oct 2015 16:32:53 GMT"
},
{
"version": "v4",
"created": "Mon, 25 Jul 2016 16:30:00 GMT"
},
{
"version": "v5",
"created": "Wed, 18 Jan 2017 10:47:41 GMT"
}
] | 2017-01-19T00:00:00 |
[
[
"Talebi",
"M. Sadegh",
""
],
[
"Zou",
"Zhenhua",
""
],
[
"Combes",
"Richard",
""
],
[
"Proutiere",
"Alexandre",
""
],
[
"Johansson",
"Mikael",
""
]
] |
new_dataset
| 0.971875 |
1701.04596
|
Binqiang Chen
|
Binqiang Chen, Chenyang Yang, Zixiang Xiong
|
Optimal Caching and Scheduling for Cache-enabled D2D Communications
|
To appear in IEEE Communications Letters
| null |
10.1109/LCOMM.2017.2652440
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To maximize offloading gain of cache-enabled device-to-device (D2D)
communications, content placement and delivery should be jointly designed. In
this letter, we jointly optimize caching and scheduling policies to maximize
successful offloading probability, defined as the probability that a user can
obtain desired file in local cache or via D2D link with data rate larger than a
given threshold. We obtain the optimal scheduling factor for a random
scheduling policy that can control interference in a distributed manner, and a
low complexity solution to compute caching distribution. We show that the
offloading gain can be remarkably improved by the joint optimization.
|
[
{
"version": "v1",
"created": "Tue, 17 Jan 2017 09:49:00 GMT"
}
] | 2017-01-19T00:00:00 |
[
[
"Chen",
"Binqiang",
""
],
[
"Yang",
"Chenyang",
""
],
[
"Xiong",
"Zixiang",
""
]
] |
new_dataset
| 0.983373 |
1701.04920
|
EPTCS
|
Miguel Silva, M\'ario Florido, Frank Pfenning
|
Non-Blocking Concurrent Imperative Programming with Session Types
|
In Proceedings LINEARITY 2016, arXiv:1701.04522
|
EPTCS 238, 2017, pp. 64-72
|
10.4204/EPTCS.238.7
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Concurrent C0 is an imperative programming language in the C family with
session-typed message-passing concurrency. The previously proposed semantics
implements asynchronous (non-blocking) output; we extend it here with
non-blocking input. A key idea is to postpone message reception as much as
possible by interpreting receive commands as a request for a message. We
implemented our ideas as a translation from a blocking intermediate language to
a non-blocking language. Finally, we evaluated our techniques with several
benchmark programs and show the results obtained. While the abstract measure of
span always decreases (or remains unchanged), only a few of the examples reap a
practical benefit.
|
[
{
"version": "v1",
"created": "Wed, 18 Jan 2017 01:31:58 GMT"
}
] | 2017-01-19T00:00:00 |
[
[
"Silva",
"Miguel",
""
],
[
"Florido",
"Mário",
""
],
[
"Pfenning",
"Frank",
""
]
] |
new_dataset
| 0.99836 |
1701.04954
|
Anshoo Tandon
|
Anshoo Tandon, Han Mao Kiah, and Mehul Motani
|
Bounds on the Size and Asymptotic Rate of Subblock-Constrained Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The study of subblock-constrained codes has recently gained attention due to
their application in diverse fields. We present bounds on the size and
asymptotic rate for two classes of subblock-constrained codes. The first class
is binary constant subblock-composition codes (CSCCs), where each codeword is
partitioned into equal sized subblocks, and every subblock has the same fixed
weight. The second class is binary subblock energy-constrained codes (SECCs),
where the weight of every subblock exceeds a given threshold. We present novel
upper and lower bounds on the code sizes and asymptotic rates for binary CSCCs
and SECCs. For a fixed subblock length and small relative distance, we show
that the asymptotic rate for CSCCs (resp. SECCs) is strictly lower than the
corresponding rate for constant weight codes (CWCs) (resp. heavy weight codes
(HWCs)). Further, for codes with high weight and low relative distance, we show
that the asymptotic rates for CSCCs is strictly lower than that of SECCs, which
contrasts that the asymptotic rate for CWCs is equal to that of HWCs. We also
provide a correction to an earlier result by Chee et al. (2014) on the
asymptotic CSCC rate. Additionally, we present several numerical examples
comparing the rates for CSCCs and SECCs with those for constant weight codes
and heavy weight codes.
|
[
{
"version": "v1",
"created": "Wed, 18 Jan 2017 05:41:58 GMT"
}
] | 2017-01-19T00:00:00 |
[
[
"Tandon",
"Anshoo",
""
],
[
"Kiah",
"Han Mao",
""
],
[
"Motani",
"Mehul",
""
]
] |
new_dataset
| 0.989591 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.