id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1701.05083
Mohammad Amin Khorsandi
M. A. Khorsandi, N. Karimi, S. Samavi
A Novel Architecture for Computing Approximate Radon Transform
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Radon transform is a type of transform which is used in image processing to transfer the image into intercept-slope coordinate. Its diagonal properties made it appropriate for some applications which need processes in different degrees. Radon transform computation needs a lot of arithmetic operations which makes it a compute-intensive algorithm. In literature an approximate algorithm for computing Radon transform is introduces which reduces the complexity of computations. But this algorithm is complex and need arbitrary accesses to memory. In this paper we proposed an algorithm which accesses to memory sequentially. In the following an architecture is introduced which uses pipeline to reduce the time complexity of algorithm.
[ { "version": "v1", "created": "Fri, 18 Nov 2016 11:48:08 GMT" } ]
2017-01-19T00:00:00
[ [ "Khorsandi", "M. A.", "" ], [ "Karimi", "N.", "" ], [ "Samavi", "S.", "" ] ]
new_dataset
0.995055
1701.05121
Keyan Ghazi-Zahedi
Keyan Ghazi-Zahedi
NMODE --- Neuro-MODule Evolution
null
null
null
null
cs.NE cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modularisation, repetition, and symmetry are structural features shared by almost all biological neural networks. These features are very unlikely to be found by the means of structural evolution of artificial neural networks. This paper introduces NMODE, which is specifically designed to operate on neuro-modules. NMODE addresses a second problem in the context of evolutionary robotics, which is incremental evolution of complex behaviours for complex machines, by offering a way to interface neuro-modules. The scenario in mind is a complex walking machine, for which a locomotion module is evolved first, that is then extended by other modules in later stages. We show that NMODE is able to evolve a locomotion behaviour for a standard six-legged walking machine in approximately 10 generations and show how it can be used for incremental evolution of a complex walking machine. The entire source code used in this paper is publicly available through GitHub.
[ { "version": "v1", "created": "Wed, 18 Jan 2017 15:51:32 GMT" } ]
2017-01-19T00:00:00
[ [ "Ghazi-Zahedi", "Keyan", "" ] ]
new_dataset
0.994941
1602.08232
Hien Ngo Quoc
Hien Quoc Ngo, Alexei Ashikhmin, Hong Yang, Erik G. Larsson, Thomas L. Marzetta
Cell-Free Massive MIMO versus Small Cells
EEE Transactions on Wireless Communications, accepted for publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Cell-Free Massive MIMO (multiple-input multiple-output) system comprises a very large number of distributed access points (APs)which simultaneously serve a much smaller number of users over the same time/frequency resources based on directly measured channel characteristics. The APs and users have only one antenna each. The APs acquire channel state information through time-division duplex operation and the reception of uplink pilot signals transmitted by the users. The APs perform multiplexing/de-multiplexing through conjugate beamforming on the downlink and matched filtering on the uplink. Closed-form expressions for individual user uplink and downlink throughputs lead to max-min power control algorithms. Max-min power control ensures uniformly good service throughout the area of coverage. A pilot assignment algorithm helps to mitigate the effects of pilot contamination, but power control is far more important in that regard. Cell-Free Massive MIMO has considerably improved performance with respect to a conventional small-cell scheme, whereby each user is served by a dedicated AP, in terms of both 95%-likely per-user throughput and immunity to shadow fading spatial correlation. Under uncorrelated shadow fading conditions, the cell-free scheme provides nearly 5-fold improvement in 95%-likely per-user throughput over the small-cell scheme, and 10-fold improvement when shadow fading is correlated.
[ { "version": "v1", "created": "Fri, 26 Feb 2016 08:29:18 GMT" }, { "version": "v2", "created": "Tue, 17 Jan 2017 14:52:27 GMT" } ]
2017-01-18T00:00:00
[ [ "Ngo", "Hien Quoc", "" ], [ "Ashikhmin", "Alexei", "" ], [ "Yang", "Hong", "" ], [ "Larsson", "Erik G.", "" ], [ "Marzetta", "Thomas L.", "" ] ]
new_dataset
0.976186
1608.03549
James Ross
David Richie and James Ross
OpenCL + OpenSHMEM Hybrid Programming Model for the Adapteva Epiphany Architecture
12 pages, 5 figures, OpenSHMEM 2016: Third workshop on OpenSHMEM and Related Technologies
null
10.1007/978-3-319-50995-2_12
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is interest in exploring hybrid OpenSHMEM + X programming models to extend the applicability of the OpenSHMEM interface to more hardware architectures. We present a hybrid OpenCL + OpenSHMEM programming model for device-level programming for architectures like the Adapteva Epiphany many-core RISC array processor. The Epiphany architecture comprises a 2D array of low-power RISC cores with minimal uncore functionality connected by a 2D mesh Network-on-Chip (NoC). The Epiphany architecture offers high computational energy efficiency for integer and floating point calculations as well as parallel scalability. The Epiphany-III is available as a coprocessor in platforms that also utilize an ARM CPU host. OpenCL provides good functionality for supporting a co-design programming model in which the host CPU offloads parallel work to a coprocessor. However, the OpenCL memory model is inconsistent with the Epiphany memory architecture and lacks support for inter-core communication. We propose a hybrid programming model in which OpenSHMEM provides a better solution by replacing the non-standard OpenCL extensions introduced to achieve high performance with the Epiphany architecture. We demonstrate the proposed programming model for matrix-matrix multiplication based on Cannon's algorithm showing that the hybrid model addresses the deficiencies of using OpenCL alone to achieve good benchmark performance.
[ { "version": "v1", "created": "Thu, 11 Aug 2016 17:50:49 GMT" } ]
2017-01-18T00:00:00
[ [ "Richie", "David", "" ], [ "Ross", "James", "" ] ]
new_dataset
0.962908
1701.04507
Huan Feng
Huan Feng, Kassem Fawaz, and Kang G. Shin
Continuous Authentication for Voice Assistants
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Voice has become an increasingly popular User Interaction (UI) channel, mainly contributing to the ongoing trend of wearables, smart vehicles, and home automation systems. Voice assistants such as Siri, Google Now and Cortana, have become our everyday fixtures, especially in scenarios where touch interfaces are inconvenient or even dangerous to use, such as driving or exercising. Nevertheless, the open nature of the voice channel makes voice assistants difficult to secure and exposed to various attacks as demonstrated by security researchers. In this paper, we present VAuth, the first system that provides continuous and usable authentication for voice assistants. We design VAuth to fit in various widely-adopted wearable devices, such as eyeglasses, earphones/buds and necklaces, where it collects the body-surface vibrations of the user and matches it with the speech signal received by the voice assistant's microphone. VAuth guarantees that the voice assistant executes only the commands that originate from the voice of the owner. We have evaluated VAuth with 18 users and 30 voice commands and find it to achieve an almost perfect matching accuracy with less than 0.1% false positive rate, regardless of VAuth's position on the body and the user's language, accent or mobility. VAuth successfully thwarts different practical attacks, such as replayed attacks, mangled voice attacks, or impersonation attacks. It also has low energy and latency overheads and is compatible with most existing voice assistants.
[ { "version": "v1", "created": "Tue, 17 Jan 2017 01:39:49 GMT" } ]
2017-01-18T00:00:00
[ [ "Feng", "Huan", "" ], [ "Fawaz", "Kassem", "" ], [ "Shin", "Kang G.", "" ] ]
new_dataset
0.998512
1701.04612
Rafael Pereira Pires
Rafael Pires, Marcelo Pasin, Pascal Felber, Christof Fetzer
Secure Content-Based Routing Using Intel Software Guard Extensions
Middleware '16 Trento, Italy - 10 pages
null
10.1145/2988336.2988346
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Content-based routing (CBR) is a powerful model that supports scalable asynchronous communication among large sets of geographically distributed nodes. Yet, preserving privacy represents a major limitation for the wide adoption of CBR, notably when the routers are located in public clouds. Indeed, a CBR router must see the content of the messages sent by data producers, as well as the filters (or subscriptions) registered by data consumers. This represents a major deterrent for companies for which data is a key asset, as for instance in the case of financial markets or to conduct sensitive business-to-business transactions. While there exists some techniques for privacy-preserving computation, they are either prohibitively slow or too limited to be usable in real systems. In this paper, we follow a different strategy by taking advantage of trusted hardware extensions that have just been introduced in off-the-shelf processors and provide a trusted execution environment. We exploit Intel's new software guard extensions (SGX) to implement a CBR engine in a secure enclave. Thanks to the hardware-based trusted execution environment (TEE), the compute-intensive CBR operations can operate on decrypted data shielded by the enclave and leverage efficient matching algorithms. Extensive experimental evaluation shows that SGX adds only limited overhead to insecure plaintext matching outside secure enclaves while providing much better performance and more powerful filtering capabilities than alternative software-only solutions. To the best of our knowledge, this work is the first to demonstrate the practical benefits of SGX for privacy-preserving CBR.
[ { "version": "v1", "created": "Tue, 17 Jan 2017 10:48:57 GMT" } ]
2017-01-18T00:00:00
[ [ "Pires", "Rafael", "" ], [ "Pasin", "Marcelo", "" ], [ "Felber", "Pascal", "" ], [ "Fetzer", "Christof", "" ] ]
new_dataset
0.973809
1701.04617
Carlos Vega
Carlos Vega, Paula Roquero, Javier Aracil
Multi-Gbps HTTP Traffic Analysis in Commodity Hardware Based on Local Knowledge of TCP Streams
19 pages, 10 figures. This manuscript version is made available under the CC-BY-NC-ND 4.0 license
Computer Networks Volume 113; 11 February 2017; Pages 258-268
10.1016/j.comnet.2017.01.001
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose and implement novel techniques for performance evaluation of web traffic (response time, response code, etc.), with no reassembly of the underlying TCP connection, which severely restricts the traffic analysis throughput. Furthermore, our proposed software for HTTP traffic analysis runs in standard hardware, which is very cost-effective. Besides, we present sub-TCP connection load balancing techniques that significantly increase throughput at the expense of losing very few HTTP transactions. Such techniques provide performance evaluation statistics which are indistinguishable from the single-threaded alternative with full TCP connection reassembly.
[ { "version": "v1", "created": "Tue, 17 Jan 2017 11:03:28 GMT" } ]
2017-01-18T00:00:00
[ [ "Vega", "Carlos", "" ], [ "Roquero", "Paula", "" ], [ "Aracil", "Javier", "" ] ]
new_dataset
0.984294
1501.02917
Martin Kasparick
Gerhard Wunder, Martin Kasparick, Peter Jung
Spline Waveforms and Interference Analysis for 5G Random Access with Short Message Support
Updated version with publication information on front page
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the main drivers for new waveforms in future 5G wireless communication systems is to handle efficiently the variety of traffic types and requirements. In this paper, we introduce a new random access within the standard acquisition procedures to support sporadic traffic as an enabler of the Internet of Things (IoT). The major challenge hereby is to cope with the highly asynchronous access of different devices and to allow transmission of control signaling and payload "in one shot". We address this challenge by using a waveform design approach based on bi-orthogonal frequency division multiplexing where transmit orthogonality is replaced in favor of better temporal and spectral properties. We show that this approach allows data transmission in frequencies that otherwise have to remain unused. More precisely, we utilize frequencies previously used as guard bands, located towards the standard synchronous communication pipes as well as in between the typically small amount of resources used by each IoT device. We demonstrate the superiority of this waveform approach over the conventional random access using a novel mathematical approach and numerical experiments.
[ { "version": "v1", "created": "Tue, 13 Jan 2015 08:49:09 GMT" }, { "version": "v2", "created": "Thu, 15 Jan 2015 08:24:40 GMT" }, { "version": "v3", "created": "Mon, 16 Jan 2017 08:34:41 GMT" } ]
2017-01-17T00:00:00
[ [ "Wunder", "Gerhard", "" ], [ "Kasparick", "Martin", "" ], [ "Jung", "Peter", "" ] ]
new_dataset
0.983664
1609.03876
Katrin Sj\"oberg
Katrin Sj\"oberg, Peter Andres, Teodor Buburuzan, Achim Brakemeier
C-ITS Deployment in Europe - Current Status and Outlook
7 pages, 2 figures, Accepted for publication in IEEE Vechicular Technology Magazine during 2017
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperative Intelligent Transport Systems (C-ITS) refers to applications using vehicle-to-vehicle and vehicle-to-infrastructure communications at a carrier frequency of 5.9 GHz to increase road traffic safety and road traffic efficiency in Europe (a.k.a. connected vehicle technology in the US). This article will shed some light on the current status of C-ITS in Europe and what is left before deployment can commence in 2019 as announced by C2C-CC. Even though there is an immense activity for the launch of C-ITS in Europe, the automotive industry is also planning for the future.
[ { "version": "v1", "created": "Tue, 13 Sep 2016 14:51:53 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2017 08:32:46 GMT" } ]
2017-01-17T00:00:00
[ [ "Sjöberg", "Katrin", "" ], [ "Andres", "Peter", "" ], [ "Buburuzan", "Teodor", "" ], [ "Brakemeier", "Achim", "" ] ]
new_dataset
0.999799
1611.08069
Bo Li
Bo Li
3D Fully Convolutional Network for Vehicle Detection in Point Cloud
null
null
null
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
2D fully convolutional network has been recently successfully applied to object detection from images. In this paper, we extend the fully convolutional network based detection techniques to 3D and apply it to point cloud data. The proposed approach is verified on the task of vehicle detection from lidar point cloud for autonomous driving. Experiments on the KITTI dataset shows a significant performance improvement over the previous point cloud based detection approaches.
[ { "version": "v1", "created": "Thu, 24 Nov 2016 05:06:05 GMT" }, { "version": "v2", "created": "Mon, 16 Jan 2017 05:56:01 GMT" } ]
2017-01-17T00:00:00
[ [ "Li", "Bo", "" ] ]
new_dataset
0.993543
1612.05923
Mahmoud Fayed
Mahmoud Samir Fayed
SNKnock: A free security tool for Facebook users
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Facebook Social network is very famous and widely used by millions of users all over the world. Facebook comes with high level of usability so users can easily find their friends and connect to them, but there are security issues related to this process where the attacker can make same-site or cross-site profile cloning attacks to get other users data. In this paper we will identify advanced same-site or cross-site profile cloning attacks then we will propose a security solution to these attacks where the user must record a voice message and answer some questions when he sends a friend request to another user, and then the other user will listen to this message before deciding to accept or reject the request. We implemented this solution by developing new web application called SNKnock which is available as free service.
[ { "version": "v1", "created": "Sun, 18 Dec 2016 14:59:10 GMT" }, { "version": "v2", "created": "Sat, 14 Jan 2017 12:12:18 GMT" } ]
2017-01-17T00:00:00
[ [ "Fayed", "Mahmoud Samir", "" ] ]
new_dataset
0.990684
1701.01500
Haiqiang Wang
Haiqiang Wang, Ioannis Katsavounidis, Jiantong Zhou, Jeonghoon Park, Shawmin Lei, Xin Zhou, Man-On Pun, Xin Jin, Ronggang Wang, Xu Wang, Yun Zhang, Jiwu Huang, Sam Kwong and C.-C. Jay Kuo
VideoSet: A Large-Scale Compressed Video Quality Dataset Based on JND Measurement
null
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new methodology to measure coded image/video quality using the just-noticeable-difference (JND) idea was proposed. Several small JND-based image/video quality datasets were released by the Media Communications Lab at the University of Southern California. In this work, we present an effort to build a large-scale JND-based coded video quality dataset. The dataset consists of 220 5-second sequences in four resolutions (i.e., $1920 \times 1080$, $1280 \times 720$, $960 \times 540$ and $640 \times 360$). For each of the 880 video clips, we encode it using the H.264 codec with $QP=1, \cdots, 51$ and measure the first three JND points with 30+ subjects. The dataset is called the "VideoSet", which is an acronym for "Video Subject Evaluation Test (SET)". This work describes the subjective test procedure, detection and removal of outlying measured data, and the properties of collected JND data. Finally, the significance and implications of the VideoSet to future video coding research and standardization efforts are pointed out. All source/coded video clips as well as measured JND data included in the VideoSet are available to the public in the IEEE DataPort.
[ { "version": "v1", "created": "Thu, 5 Jan 2017 23:14:01 GMT" }, { "version": "v2", "created": "Sun, 15 Jan 2017 04:30:59 GMT" } ]
2017-01-17T00:00:00
[ [ "Wang", "Haiqiang", "" ], [ "Katsavounidis", "Ioannis", "" ], [ "Zhou", "Jiantong", "" ], [ "Park", "Jeonghoon", "" ], [ "Lei", "Shawmin", "" ], [ "Zhou", "Xin", "" ], [ "Pun", "Man-On", "" ], [ "Jin", "Xin", "" ], [ "Wang", "Ronggang", "" ], [ "Wang", "Xu", "" ], [ "Zhang", "Yun", "" ], [ "Huang", "Jiwu", "" ], [ "Kwong", "Sam", "" ], [ "Kuo", "C. -C. Jay", "" ] ]
new_dataset
0.999864
1701.03854
Xiaowang Zhang
Qiong Li and Xiaowang Zhang and Zhiyong Feng
PRSP: A Plugin-based Framework for RDF Stream Processing
2 pages and 1 figure
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a plugin-based framework for RDF stream processing named PRSP. Within this framework, we can employ SPARQL query engines to process C-SPARQL queries with maintaining the high performance of those engines in a simple way. Taking advantage of PRSP, we can process large-scale RDF streams in a distributed context via distributed SPARQL engines. Besides, we can evaluate the performance and correctness of existing SPARQL query engines in handling RDF streams in a united way, which amends the evaluation of them ranging from static RDF (i.e., RDF graph) to dynamic RDF (i.e., RDF stream). Finally, within PRSP, we experimently evaluate the correctness and the performance on YABench. The experiments show that PRSP can still maintain the high performance of those engines in RDF stream processing although there are some slight differences among them.
[ { "version": "v1", "created": "Sat, 14 Jan 2017 00:17:53 GMT" } ]
2017-01-17T00:00:00
[ [ "Li", "Qiong", "" ], [ "Zhang", "Xiaowang", "" ], [ "Feng", "Zhiyong", "" ] ]
new_dataset
0.954829
1701.03878
Yatish Turakhia
Yatish Turakhia, Subhasis Das, Tor M. Aamodt, William J. Dally
HoLiSwap: Reducing Wire Energy in L1 Caches
null
null
null
null
cs.AR
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper describes HoLiSwap a method to reduce L1 cache wire energy, a significant fraction of total cache energy, by swapping hot lines to the cache way nearest to the processor. We observe that (i) a small fraction (<3%) of cache lines (hot lines) serve over 60% of the L1 cache accesses and (ii) the difference in wire energy between the nearest and farthest cache subarray can be over 6$\times$. Our method exploits this difference in wire energy to dynamically identify hot lines and swap them to the nearest physical way in a set-associative L1 cache. This provides up to 44% improvement in the wire energy (1.82% saving in overall system energy) with no impact on the cache miss rate and 0.13% performance drop. We also show that HoLiSwap can simplify way-prediction.
[ { "version": "v1", "created": "Sat, 14 Jan 2017 04:03:50 GMT" } ]
2017-01-17T00:00:00
[ [ "Turakhia", "Yatish", "" ], [ "Das", "Subhasis", "" ], [ "Aamodt", "Tor M.", "" ], [ "Dally", "William J.", "" ] ]
new_dataset
0.98246
1701.03908
Guodong Shi
Yang Liu, Christian Lageman, Brian D. O. Anderson, and Guodong Shi
An Arrow-Hurwicz-Uzawa Type Flow as Least Squares Solver for Network Linear Equations
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the approach to obtaining least squares solutions to systems of linear algebraic equations over networks by using distributed algorithms. Each node has access to one of the linear equations and holds a dynamic state. The aim for the node states is to reach a consensus as a least squares solution of the linear equations by exchanging their states with neighbors over an underlying interaction graph. A continuous-time distributed least squares solver over networks is developed in the form of the famous Arrow-Hurwicz-Uzawa flow. A necessary and sufficient condition is established on the graph Laplacian for the continuous-time distributed algorithm to give the least squares solution in the limit, with an exponentially fast convergence rate. The feasibility of different fundamental graphs is discussed including path graph, star graph, etc. Moreover, a discrete-time distributed algorithm is developed by Euler's method, converging exponentially to the least squares solution at the node states with suitable step size and graph conditions. The exponential convergence rate for both the continuous-time and discrete-time algorithms under the established conditions is confirmed by numerical examples. Finally, we investigate the performance of the proposed flow under switching networks, and surprisingly, switching networks at high switching frequencies can lead to approximate least square solvers even if all graphs in the switching signal fail to do so in the absence of structure switching.
[ { "version": "v1", "created": "Sat, 14 Jan 2017 12:11:20 GMT" } ]
2017-01-17T00:00:00
[ [ "Liu", "Yang", "" ], [ "Lageman", "Christian", "" ], [ "Anderson", "Brian D. O.", "" ], [ "Shi", "Guodong", "" ] ]
new_dataset
0.999544
1701.03924
Nadir Durrani Dr
Nadir Durrani and Fahim Dalvi and Hassan Sajjad, Stephan Vogel
QCRI Machine Translation Systems for IWSLT 16
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes QCRI's machine translation systems for the IWSLT 2016 evaluation campaign. We participated in the Arabic->English and English->Arabic tracks. We built both Phrase-based and Neural machine translation models, in an effort to probe whether the newly emerged NMT framework surpasses the traditional phrase-based systems in Arabic-English language pairs. We trained a very strong phrase-based system including, a big language model, the Operation Sequence Model, Neural Network Joint Model and Class-based models along with different domain adaptation techniques such as MML filtering, mixture modeling and using fine tuning over NNJM model. However, a Neural MT system, trained by stacking data from different genres through fine-tuning, and applying ensemble over 8 models, beat our very strong phrase-based system by a significant 2 BLEU points margin in Arabic->English direction. We did not obtain similar gains in the other direction but were still able to outperform the phrase-based system. We also applied system combination on phrase-based and NMT outputs.
[ { "version": "v1", "created": "Sat, 14 Jan 2017 14:18:54 GMT" } ]
2017-01-17T00:00:00
[ [ "Durrani", "Nadir", "" ], [ "Dalvi", "Fahim", "" ], [ "Sajjad", "Hassan", "" ], [ "Vogel", "Stephan", "" ] ]
new_dataset
0.990253
1701.03937
Tuan Tran
Tuan Tran, Tu Ngoc Nguyen
Hedera: Scalable Indexing and Exploring Entities in Wikipedia Revision History
Pubished via CEUR-WS.org/Vol-1272
null
null
null
cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Much of work in semantic web relying on Wikipedia as the main source of knowledge often work on static snapshots of the dataset. The full history of Wikipedia revisions, while contains much more useful information, is still difficult to access due to its exceptional volume. To enable further research on this collection, we developed a tool, named Hedera, that efficiently extracts semantic information from Wikipedia revision history datasets. Hedera exploits Map-Reduce paradigm to achieve rapid extraction, it is able to handle one entire Wikipedia articles revision history within a day in a medium-scale cluster, and supports flexible data structures for various kinds of semantic web study.
[ { "version": "v1", "created": "Sat, 14 Jan 2017 15:47:06 GMT" } ]
2017-01-17T00:00:00
[ [ "Tran", "Tuan", "" ], [ "Nguyen", "Tu Ngoc", "" ] ]
new_dataset
0.965537
1701.03986
Chengju Li
Chengju Li
On Hermitian LCD codes from cyclic codes and their applications to orthogonal direct sum masking
16 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems due to their efficient encoding and decoding algorithms. It was proved that asymptotically good Hermitian LCD codes exist. The objective of this paper is to construct some cyclic Hermitian LCD codes over finite fields and analyse their parameters. The dimensions of these codes are settled and the lower bounds on their minimum distances are presented. Most Hermitian LCD codes presented in this paper are not BCH codes. In addition, we employ Hermitian LCD codes to propose a Hermitian orthogonal direct sum masking scheme that achieves protection against fault injection attacks. It is shown that the codes with great minimum distances are desired to improve the resistance.
[ { "version": "v1", "created": "Sun, 15 Jan 2017 02:47:05 GMT" } ]
2017-01-17T00:00:00
[ [ "Li", "Chengju", "" ] ]
new_dataset
0.999707
1701.04013
Florian Otterbein
Florian Otterbein, Tim Ohlendorf, Marian Margraf
The German eID as an Authentication Token on Android Devices
International Journal of Computer Science and Information Security, December 2016, Vol. 14 No.12
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/4.0/
Due to the rapid increase of digitization within our society, digital identities gain more and more importance. Provided by the German eID solution, every citizen has the ability to identify himself against various governmental and private organizations with the help of his personal electronic ID card and a corresponding card reader. While there are several solutions available for desktop use of the eID infrastructure, mobile approaches have to be payed more attention. In this paper we present a new approach for using the German eID concept on an Android device without the need of the actual identity card and card reader. A security evaluation of our approach reveals that two non-critical vulnerabilities on the architecture can't be avoided. Nevertheless, no sensitive information are compromised. A proof of concept shows that an actual implementation faces some technical issues which have to be solved in the future.
[ { "version": "v1", "created": "Sun, 15 Jan 2017 09:45:52 GMT" } ]
2017-01-17T00:00:00
[ [ "Otterbein", "Florian", "" ], [ "Ohlendorf", "Tim", "" ], [ "Margraf", "Marian", "" ] ]
new_dataset
0.99723
1701.04126
Li-Yi Lin
Li-Yi Lin
Taxi-based Emergency Medical System
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In case of a severe accident, the key to saving lives is the time between the incident and when the victim receives treatment from the first-responders. In areas with well designed emergency medical systems, the time for an ambulance to arrive at the accident location is often not too long. However, in many low and middle income countries, it usually takes much longer for an ambulance to arrive at the accident location due to lack of proper services. On the other hand, with ubiquitous wireless connectivity, and emergence of radio based taxis, it seems feasible to build a low-cost emergency response system based on taxi service. In this report, we explore one such solution for deployment of a taxi-based emergency response systems using reinforcement learning.
[ { "version": "v1", "created": "Sun, 15 Jan 2017 23:02:34 GMT" } ]
2017-01-17T00:00:00
[ [ "Lin", "Li-Yi", "" ] ]
new_dataset
0.999496
1701.04165
Nari Lee
Lucky Galvez, Jon-Lark Kim, Nari Lee, Young Gun Roe, Byung-Sun Won
Some Bounds on Binary LCD Codes
9 pages, 2 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A linear code with a complementary dual (or LCD code) is defined to be a linear code $C$ whose dual code $C^{\perp}$ satisfies $C \cap C^{\perp}$= $\left\{ \mathbf{0}\right\} $. Let $LCD{[}n,k{]}$ denote the maximum of possible values of $d$ among $[n,k,d]$ binary LCD codes. We give exact values of $LCD{[}n,k{]}$ for $1 \le k \le n \le 12$. We also show that $LCD[n,n-i]=2$ for any $i\geq2$ and $n\geq2^{i}$. Furthermore, we show that $LCD[n,k]\leq LCD[n,k-1]$ for $k$ odd and $LCD[n,k]\leq LCD[n,k-2]$ for $k$ even.
[ { "version": "v1", "created": "Mon, 16 Jan 2017 04:49:33 GMT" } ]
2017-01-17T00:00:00
[ [ "Galvez", "Lucky", "" ], [ "Kim", "Jon-Lark", "" ], [ "Lee", "Nari", "" ], [ "Roe", "Young Gun", "" ], [ "Won", "Byung-Sun", "" ] ]
new_dataset
0.994772
1701.04208
Anastasios Noulas Anastasios Noulas
Anastasios Noulas, Vsevolod Salnikov, Desislava Hristova, Cecilia Mascolo, Renaud Lambiotte
Developing and Deploying a Taxi Price Comparison Mobile App in the Wild: Insights and Challenges
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As modern transportation systems become more complex, there is need for mobile applications that allow travelers to navigate efficiently in cities. In taxi transport the recent proliferation of Uber has introduced new norms including a flexible pricing scheme where journey costs can change rapidly depending on passenger demand and driver supply. To make informed choices on the most appropriate provider for their journeys, travelers need access to knowledge about provider pricing in real time. To this end, we developed OpenStreetcab a mobile application that offers advice on taxi transport comparing provider prices. We describe its development and deployment in two cities, London and New York, and analyse thousands of user journey queries to compare the price patterns of Uber against major local taxi providers. We have observed large heterogeneity across the taxi transport markets in the two cities. This motivated us to perform a price validation and measurement experiment on the ground comparing Uber and Black Cabs in London. The experimental results reveal interesting insights: not only they confirm feedback on pricing and service quality received by professional drivers users, but also they reveal the tradeoffs between prices and journey times between taxi providers. With respect to journey times in particular, we show how experienced taxi drivers, in the majority of the cases, are able to navigate faster to a destination compared to drivers who rely on modern navigation systems. We provide evidence that this advantage becomes stronger in the centre of a city where urban density is high.
[ { "version": "v1", "created": "Mon, 16 Jan 2017 09:15:38 GMT" } ]
2017-01-17T00:00:00
[ [ "Noulas", "Anastasios", "" ], [ "Salnikov", "Vsevolod", "" ], [ "Hristova", "Desislava", "" ], [ "Mascolo", "Cecilia", "" ], [ "Lambiotte", "Renaud", "" ] ]
new_dataset
0.998714
1701.04256
Andrea Baraldi
Andrea Baraldi
Automatic Spatial Context-Sensitive Cloud/Cloud-Shadow Detection in Multi-Source Multi-Spectral Earth Observation Images: AutoCloud+
Invitation to tender ESA/AO/1 8373/15/I NB, VAE: Next Generation EO based Information Services
null
10.13140/RG.2.2.34162.71363
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proposed Earth observation (EO) based value adding system (EO VAS), hereafter identified as AutoCloud+, consists of an innovative EO image understanding system (EO IUS) design and implementation capable of automatic spatial context sensitive cloud/cloud shadow detection in multi source multi spectral (MS) EO imagery, whether or not radiometrically calibrated, acquired by multiple platforms, either spaceborne or airborne, including unmanned aerial vehicles (UAVs). It is worth mentioning that the same EO IUS architecture is suitable for a large variety of EO based value adding products and services, including: (i) low level image enhancement applications, such as automatic MS image topographic correction, co registration, mosaicking and compositing, (ii) high level MS image land cover (LC) and LC change (LCC) classification and (iii) content based image storage/retrieval in massive multi source EO image databases (big data mining).
[ { "version": "v1", "created": "Mon, 16 Jan 2017 11:58:40 GMT" } ]
2017-01-17T00:00:00
[ [ "Baraldi", "Andrea", "" ] ]
new_dataset
0.982853
1701.04303
Fei Hou
Fei Hou, Qian Sun, Zheng Fang, Yong-Jin Liu, Shi-Min Hu, Hong Qin, Aimin Hao, Ying He
Poisson Vector Graphics (PVG) and Its Closed-Form Solver
null
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents Poisson vector graphics, an extension of the popular first-order diffusion curves, for generating smooth-shaded images. Armed with two new types of primitives, namely Poisson curves and Poisson regions, PVG can easily produce photorealistic effects such as specular highlights, core shadows, translucency and halos. Within the PVG framework, users specify color as the Dirichlet boundary condition of diffusion curves and control tone by offsetting the Laplacian, where both controls are simply done by mouse click and slider dragging. The separation of color and tone not only follows the basic drawing principle that is widely adopted by professional artists, but also brings three unique features to PVG, i.e., local hue change, ease of extrema control, and permit of intersection among geometric primitives, making PVG an ideal authoring tool. To render PVG, we develop an efficient method to solve 2D Poisson's equations with piecewise constant Laplacians. In contrast to the conventional finite element method that computes numerical solutions only, our method expresses the solution using harmonic B-spline, whose basis functions can be constructed locally and the control coefficients are obtained by solving a small sparse linear system. Our closed-form solver is numerically stable and it supports random access evaluation, zooming-in of arbitrary resolution and anti-aliasing. Although the harmonic B-spline based solutions are approximate, computational results show that the relative mean error is less than 0.3%, which cannot be distinguished by naked eyes.
[ { "version": "v1", "created": "Mon, 16 Jan 2017 14:33:15 GMT" } ]
2017-01-17T00:00:00
[ [ "Hou", "Fei", "" ], [ "Sun", "Qian", "" ], [ "Fang", "Zheng", "" ], [ "Liu", "Yong-Jin", "" ], [ "Hu", "Shi-Min", "" ], [ "Qin", "Hong", "" ], [ "Hao", "Aimin", "" ], [ "He", "Ying", "" ] ]
new_dataset
0.988372
1701.03515
Fariborz Salehi
Fariborz Salehi, Kishore Jaganathan, Babak Hassibi
Multiple Illumination Phaseless Super-Resolution (MIPS) with Applications To Phaseless DOA Estimation and Diffraction Imaging
To appear in ICASSP 2017
null
null
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Phaseless super-resolution is the problem of recovering an unknown signal from measurements of the magnitudes of the low frequency Fourier transform of the signal. This problem arises in applications where measuring the phase, and making high-frequency measurements, are either too costly or altogether infeasible. The problem is especially challenging because it combines the difficult problems of phase retrieval and classical super-resolution
[ { "version": "v1", "created": "Thu, 12 Jan 2017 21:44:12 GMT" } ]
2017-01-16T00:00:00
[ [ "Salehi", "Fariborz", "" ], [ "Jaganathan", "Kishore", "" ], [ "Hassibi", "Babak", "" ] ]
new_dataset
0.958237
1701.01530
Lan Truong
Lan V. Truong, Vincent Y. F. Tan
On the Reliability Function of the Common-Message Broadcast Channel with Variable-Length Feedback
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive upper and lower bounds on the reliability function for the common-message discrete memoryless broadcast channel with variable-length feedback. We show that the bounds are tight when the broadcast channel is stochastically degraded. For the achievability part, we adapt Yamamoto and Itoh's coding scheme by controlling the expectation of the maximum of a set of stopping times. For the converse part, we adapt Burnashev's proof techniques for establishing the reliability functions for (point-to-point) discrete memoryless channels with variable-length feedback and sequential hypothesis testing.
[ { "version": "v1", "created": "Fri, 6 Jan 2017 03:01:08 GMT" }, { "version": "v2", "created": "Thu, 12 Jan 2017 05:01:54 GMT" } ]
2017-01-13T00:00:00
[ [ "Truong", "Lan V.", "" ], [ "Tan", "Vincent Y. F.", "" ] ]
new_dataset
0.995208
1701.02673
Micha\"el Cadilhac
Micha\"el Cadilhac, Charles Paperman
A Crevice on the Crane Beach: Finite-Degree Predicates
Submitted
null
null
null
cs.LO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
First-order logic (FO) over words is shown to be equiexpressive with FO equipped with a restricted set of numerical predicates, namely the order, a binary predicate MSB$_0$, and the finite-degree predicates: FO[Arb] = FO[<, MSB$_0$, Fin]. The Crane Beach Property (CBP), introduced more than a decade ago, is true of a logic if all the expressible languages admitting a neutral letter are regular. Although it is known that FO[Arb] does not have the CBP, it is shown here that the (strong form of the) CBP holds for both FO[<, Fin] and FO[<, MSB$_0$]. Thus FO[<, Fin] exhibits a form of locality and the CBP, and can still express a wide variety of languages, while being one simple predicate away from the expressive power of FO[Arb]. The counting ability of FO[<, Fin] is studied as an application.
[ { "version": "v1", "created": "Tue, 10 Jan 2017 16:40:19 GMT" }, { "version": "v2", "created": "Wed, 11 Jan 2017 15:42:44 GMT" }, { "version": "v3", "created": "Thu, 12 Jan 2017 10:29:16 GMT" } ]
2017-01-13T00:00:00
[ [ "Cadilhac", "Michaël", "" ], [ "Paperman", "Charles", "" ] ]
new_dataset
0.994985
1701.03237
Shanyun Liu
Shanyun Liu, Rui She, Jiaxun Lu, Pingyi Fan
Shannon Shakes Hands with Chernoff: Big Data Viewpoint On Channel Information Measures
6 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Shannon entropy is the most crucial foundation of Information Theory, which has been proven to be effective in many fields such as communications. Renyi entropy and Chernoff information are other two popular measures of information with wide applications. The mutual information is effective to measure the channel information for the fact that it reflects the relation between output variables and input variables. In this paper, we reexamine these channel information measures in big data viewpoint by means of ACE algorithm. The simulated results show us that decomposition results of Shannon and Chernoff mutual information with respect to channel parametersare almost the same. In this sense, Shannon shakes hands with Chernoff since they are different measures of the same information quantity. We also propose a conjecture that there is nature of channel information which is only decided by the channel parameters.
[ { "version": "v1", "created": "Thu, 12 Jan 2017 05:26:55 GMT" } ]
2017-01-13T00:00:00
[ [ "Liu", "Shanyun", "" ], [ "She", "Rui", "" ], [ "Lu", "Jiaxun", "" ], [ "Fan", "Pingyi", "" ] ]
new_dataset
0.974778
1701.03277
Miroslav Shaltev
Miroslav Shaltev, Jan-Hendrik Zab, Philipp Kemkes, Stefan Siersdorfer, Sergej Zerr
Cobwebs from the Past and Present: Extracting Large Social Networks using Internet Archive Data
5 pages, 5 figures, SIGIR '16, July 17-21, 2016, Pisa, Italy
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, Pisa, Italy, July 17 - 21, 2016
10.1145/2911451.2911467
null
cs.SI cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social graph construction from various sources has been of interest to researchers due to its application potential and the broad range of technical challenges involved. The World Wide Web provides a huge amount of continuously updated data and information on a wide range of topics created by a variety of content providers, and makes the study of extracted people networks and their temporal evolution valuable for social as well as computer scientists. In this paper we present SocGraph - an extraction and exploration system for social relations from the content of around 2 billion web pages collected by the Internet Archive over the 17 years time period between 1996 and 2013. We describe methods for constructing large social graphs from extracted relations and introduce an interface to study their temporal evolution.
[ { "version": "v1", "created": "Thu, 12 Jan 2017 09:40:09 GMT" } ]
2017-01-13T00:00:00
[ [ "Shaltev", "Miroslav", "" ], [ "Zab", "Jan-Hendrik", "" ], [ "Kemkes", "Philipp", "" ], [ "Siersdorfer", "Stefan", "" ], [ "Zerr", "Sergej", "" ] ]
new_dataset
0.999396
1701.03415
Christopher Anderson Christopher Anderson
Christopher R. Anderson, Theodore S. Rappaort
In-Building Wideband Partition Loss Measurements at 2.5 GHz and 60 GHz
http://ieeexplore.ieee.org/document/1296643/
IEEE Transactions on Wireless Communications, vol. 3, no. 3, pp. 922-928, May 2004
10.1109/TWC.2004.826328
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper contains measured data and empirical models for 2.5 & 60 GHz in-building propagation path loss and multipath delay spread. Path loss measurements were recorded using a broadband sliding correlator channel sounder which recorded over 39,000 Power Delay Profiles (PDPs) in 22 separate locations in a modern office building. Transmitters and receivers were separated by distances ranging from 3.5 to 27.4 meters, and were separated by a variety of obstructions, in order to create realistic environments for future single-cell-per-room wireless networks. Path loss data is coupled with site-specific information to provide insight into channel characteristics. These measurements and models may aid in the development of future in-building wireless networks in the unlicensed 2.4 GHz and 60 GHz bands.
[ { "version": "v1", "created": "Tue, 13 Dec 2016 05:55:17 GMT" } ]
2017-01-13T00:00:00
[ [ "Anderson", "Christopher R.", "" ], [ "Rappaort", "Theodore S.", "" ] ]
new_dataset
0.992919
1701.03452
Fathi Salem
Joel Heck and Fathi M. Salem
Simplified Minimal Gated Unit Variations for Recurrent Neural Networks
5 pages, 3 Figures, 5 Tables
null
null
null
cs.NE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recurrent neural networks with various types of hidden units have been used to solve a diverse range of problems involving sequence data. Two of the most recent proposals, gated recurrent units (GRU) and minimal gated units (MGU), have shown comparable promising results on example public datasets. In this paper, we introduce three model variants of the minimal gated unit (MGU) which further simplify that design by reducing the number of parameters in the forget-gate dynamic equation. These three model variants, referred to simply as MGU1, MGU2, and MGU3, were tested on sequences generated from the MNIST dataset and from the Reuters Newswire Topics (RNT) dataset. The new models have shown similar accuracy to the MGU model while using fewer parameters and thus lowering training expense. One model variant, namely MGU2, performed better than MGU on the datasets considered, and thus may be used as an alternate to MGU or GRU in recurrent neural networks.
[ { "version": "v1", "created": "Thu, 12 Jan 2017 18:52:31 GMT" } ]
2017-01-13T00:00:00
[ [ "Heck", "Joel", "" ], [ "Salem", "Fathi M.", "" ] ]
new_dataset
0.998212
1106.4403
Simone Severini
Daniel Burgarth, Vittorio Giovannetti, Leslie Hogben, Simone Severini, Michael Young
Logic circuits from zero forcing
5 pages, 10 EPS figures
Nat Comput 14, 485 (2015)
10.1007/s11047-014-9438-5
null
cs.DM cs.ET math.CO quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We design logic circuits based on the notion of zero forcing on graphs; each gate of the circuits is a gadget in which zero forcing is performed. We show that such circuits can evaluate every monotone Boolean function. By using two vertices to encode each logical bit, we obtain universal computation. We also highlight a phenomenon of "back forcing" as a property of each function. Such a phenomenon occurs in a circuit when the input of gates which have been already used at a given time step is further modified by a computation actually performed at a later stage. Finally, we point out that zero forcing can be also used to implement reversible computation. The model introduced here provides a potentially new tool in the analysis of Boolean functions, with particular attention to monotonicity.
[ { "version": "v1", "created": "Wed, 22 Jun 2011 09:28:41 GMT" }, { "version": "v2", "created": "Sat, 3 Sep 2011 19:55:35 GMT" }, { "version": "v3", "created": "Mon, 19 Sep 2011 18:39:51 GMT" }, { "version": "v4", "created": "Thu, 1 Dec 2011 19:42:21 GMT" } ]
2017-01-12T00:00:00
[ [ "Burgarth", "Daniel", "" ], [ "Giovannetti", "Vittorio", "" ], [ "Hogben", "Leslie", "" ], [ "Severini", "Simone", "" ], [ "Young", "Michael", "" ] ]
new_dataset
0.96769
1510.00832
Young-Han Kim
Sung Hoon Lim, Kwang Taik Kim, Young-Han Kim
Distributed Decode-Forward for Relay Networks
32 pages, 5 figures, submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new coding scheme for general N-node relay networks is presented for unicast, multicast, and broadcast. The proposed distributed decode-forward scheme combines and generalizes Marton coding for single-hop broadcast channels and the Cover-El Gamal partial decode-forward coding scheme for 3-node relay channels. The key idea of the scheme is to precode all the codewords of the entire network at the source by multicoding over multiple blocks. This encoding step allows these codewords to carry partial information of the messages implicitly without complicated rate splitting and routing. This partial information is then recovered at the relay nodes and forwarded further. For N-node Gaussian unicast, multicast, and broadcast relay networks, the scheme achieves within 0.5N bits from the cutset bound and thus from the capacity (region), regardless of the network topology, channel gains, or power constraints. Roughly speaking, distributed decode-forward is dual to noisy network coding, which generalized compress-forward to unicast, multicast, and multiple access relay networks.
[ { "version": "v1", "created": "Sat, 3 Oct 2015 14:43:03 GMT" }, { "version": "v2", "created": "Wed, 11 Jan 2017 06:22:49 GMT" } ]
2017-01-12T00:00:00
[ [ "Lim", "Sung Hoon", "" ], [ "Kim", "Kwang Taik", "" ], [ "Kim", "Young-Han", "" ] ]
new_dataset
0.99367
1701.02729
Massimiliano Dal Mas
Massimiliano Dal Mas
Digital Advertising Traffic Operation: Flow Management Analysis
18 pages, 8 figures, 1 table, for details see: http://www.maxdalmas.com/
null
null
null
cs.SI math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a Web Advertising Traffic Operation the Trafficking Routing Problem (TRP) consists in scheduling the management of Web Advertising (Adv) campaign between Trafficking campaigns in the most efficient way to oversee and manage relationship with partners and internal teams, managing expectations through integration and post-launch in order to ensure success for every stakeholders involved. For our own interest we did that independent research projects also through specific innovative tasks validate towards average working time declared on "specification required" by the main worldwide industry leading Advertising Agency. We present a Mixed Integer Linear Programming (MILP) formulation for end-to-end management of campaign workflow along a predetermined path and generalize it to include alternative path to oversee and manage detail-oriented relationship with partners and internal teams to achieve the goals above mentioned. To meet clients' KPIs, we consider an objective function that includes the punctuality indicators (the average waiting time and completion times) but also the main punctuality indicators (the average delay and the on time performance). Then we investigate their analytical relationships in the advertising domain through experiments based on real data from a Traffic Office. We show that the classic punctuality indicators are in contradiction with the task of reducing waiting times. We propose new indicators used for a synthesize analysis on projects or process changes for the wider team that are more sustainable, but also more relevant for stakeholders. We also show that the flow of a campaign (adv-ways) is the main bottleneck of a Traffic Office and that alternate paths cannot improve the performance indicators.
[ { "version": "v1", "created": "Wed, 11 Jan 2017 18:44:05 GMT" } ]
2017-01-12T00:00:00
[ [ "Mas", "Massimiliano Dal", "" ] ]
new_dataset
0.99835
1701.02829
Chenglong Li
Chenglong Li, Guizhao Wang, Yunpeng Ma, Aihua Zheng, Bin Luo, and Jin Tang
A Unified RGB-T Saliency Detection Benchmark: Dataset, Baselines, Analysis and A Novel Approach
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite significant progress, image saliency detection still remains a challenging task in complex scenes and environments. Integrating multiple different but complementary cues, like RGB and Thermal (RGB-T), may be an effective way for boosting saliency detection performance. The current research in this direction, however, is limited by the lack of a comprehensive benchmark. This work contributes such a RGB-T image dataset, which includes 821 spatially aligned RGB-T image pairs and their ground truth annotations for saliency detection purpose. The image pairs are with high diversity recorded under different scenes and environmental conditions, and we annotate 11 challenges on these image pairs for performing the challenge-sensitive analysis for different saliency detection algorithms. We also implement 3 kinds of baseline methods with different modality inputs to provide a comprehensive comparison platform. With this benchmark, we propose a novel approach, multi-task manifold ranking with cross-modality consistency, for RGB-T saliency detection. In particular, we introduce a weight for each modality to describe the reliability, and integrate them into the graph-based manifold ranking algorithm to achieve adaptive fusion of different source data. Moreover, we incorporate the cross-modality consistent constraints to integrate different modalities collaboratively. For the optimization, we design an efficient algorithm to iteratively solve several subproblems with closed-form solutions. Extensive experiments against other baseline methods on the newly created benchmark demonstrate the effectiveness of the proposed approach, and we also provide basic insights and potential future research directions for RGB-T saliency detection.
[ { "version": "v1", "created": "Wed, 11 Jan 2017 02:38:23 GMT" } ]
2017-01-12T00:00:00
[ [ "Li", "Chenglong", "" ], [ "Wang", "Guizhao", "" ], [ "Ma", "Yunpeng", "" ], [ "Zheng", "Aihua", "" ], [ "Luo", "Bin", "" ], [ "Tang", "Jin", "" ] ]
new_dataset
0.999842
1701.02896
Mohammed Alsaedi Dr
Mohammed Alsaedi
Colored Image Encryption and Decryption Using Chaotic Lorenz System and DCT2
22 pages, 15 Figures, IJCSIS
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a scheme for the encryption and decryption of colored images by using the Lorenz system and the discrete cosine transform in two dimensions (DCT2) is proposed. Although chaos is random, it has deterministic features that can be used for encryption; further, the same sequences can be produced at the transmitter and receiver under the same initial conditions. Another property of DCT2 is that the energy is concentrated in some elements of the coefficients. These two properties are used to efficiently encrypt and recover the image at the receiver by using three different keys with three different predefined number of shifts for each instance of key usage. Simulation results and statistical analysis show that the scheme high performance in weakening the correlation between the pixels of the image that resulted from the inverse of highest energy values of DCT2 that form 99.9 % of the energy as well as those of the difference image.
[ { "version": "v1", "created": "Wed, 11 Jan 2017 09:11:57 GMT" } ]
2017-01-12T00:00:00
[ [ "Alsaedi", "Mohammed", "" ] ]
new_dataset
0.989375
1701.02946
Chlo\'e Braud
Chlo\'e Braud and Maximin Coavoux and Anders S{\o}gaard
Cross-lingual RST Discourse Parsing
To be published in EACL 2017, 13 pages
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discourse parsing is an integral part of understanding information flow and argumentative structure in documents. Most previous research has focused on inducing and evaluating models from the English RST Discourse Treebank. However, discourse treebanks for other languages exist, including Spanish, German, Basque, Dutch and Brazilian Portuguese. The treebanks share the same underlying linguistic theory, but differ slightly in the way documents are annotated. In this paper, we present (a) a new discourse parser which is simpler, yet competitive (significantly better on 2/3 metrics) to state of the art for English, (b) a harmonization of discourse treebanks across languages, enabling us to present (c) what to the best of our knowledge are the first experiments on cross-lingual discourse parsing.
[ { "version": "v1", "created": "Wed, 11 Jan 2017 12:16:25 GMT" } ]
2017-01-12T00:00:00
[ [ "Braud", "Chloé", "" ], [ "Coavoux", "Maximin", "" ], [ "Søgaard", "Anders", "" ] ]
new_dataset
0.993587
1701.03069
EPTCS
Alicia Villanueva (Universitat Polit\`ecnica de Val\`encia, Spain)
Proceedings XVI Jornadas sobre Programaci\'on y Lenguajes
null
EPTCS 237, 2017
10.4204/EPTCS.237
null
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This volume contains a selection of the papers presented at the XVI Jornadas sobre Programaci\'on y Lenguajes (PROLE 2016), held at Salamanca, Spain, during September 14th-15th, 2016. Previous editions of the workshop were held in Santander (2015), C\'adiz (2014), Madrid (2013), Almer\'ia (2012), A Coru\~na (2011), Val\`encia (2010), San Sebasti\'an (2009), Gij\'on (2008), Zaragoza (2007), Sitges (2006), Granada (2005), M\'alaga (2004), Alicante (2003), El Escorial (2002), and Almagro (2001). Programming languages provide a conceptual framework which is necessary for the development, analysis, optimization and understanding of programs and programming tasks. The aim of the PROLE series of conferences (PROLE stems from PROgramaci\'on y LEnguajes) is to serve as a meeting point for Spanish research groups which develop their work in the area of programming and programming languages. The organization of this series of events aims at fostering the exchange of ideas, experiences and results among these groups. Promoting further collaboration is also one of its main goals.
[ { "version": "v1", "created": "Wed, 11 Jan 2017 17:26:09 GMT" } ]
2017-01-12T00:00:00
[ [ "Villanueva", "Alicia", "", "Universitat Politècnica de València, Spain" ] ]
new_dataset
0.981179
1410.2022
Gabriele Puppis
Gabriele Puppis (LaBRI - CNRS), Thomas Colcombet (LIAFA - CNRS), Clemens Ley (Independent researcher)
Logics with rigidly guarded data tests
null
Logical Methods in Computer Science, Volume 11, Issue 3 (September 17, 2015) lmcs:1586
10.2168/LMCS-11(3:10)2015
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The notion of orbit finite data monoid was recently introduced by Bojanczyk as an algebraic object for defining recognizable languages of data words. Following Buchi's approach, we introduce a variant of monadic second-order logic with data equality tests that captures precisely the data languages recognizable by orbit finite data monoids. We also establish, following this time the approach of Schutzenberger, McNaughton and Papert, that the first-order fragment of this logic defines exactly the data languages recognizable by aperiodic orbit finite data monoids. Finally, we consider another variant of the logic that can be interpreted over generic structures with data. The data languages defined in this variant are also recognized by unambiguous finite memory automata.
[ { "version": "v1", "created": "Wed, 8 Oct 2014 08:39:41 GMT" }, { "version": "v2", "created": "Fri, 19 Jun 2015 15:58:23 GMT" }, { "version": "v3", "created": "Wed, 16 Sep 2015 07:53:12 GMT" } ]
2017-01-11T00:00:00
[ [ "Puppis", "Gabriele", "", "LaBRI - CNRS" ], [ "Colcombet", "Thomas", "", "LIAFA - CNRS" ], [ "Ley", "Clemens", "", "Independent researcher" ] ]
new_dataset
0.972186
1504.04662
David Parker
Klaus Drager (Queen Mary, University of London), Vojtech Forejt (University of Oxford), Marta Kwiatkowska (University of Oxford), David Parker (University of Birmingham), Mateusz Ujma (University of Oxford)
Permissive Controller Synthesis for Probabilistic Systems
null
Logical Methods in Computer Science, Volume 11, Issue 2 (June 30, 2015) lmcs:1576
10.2168/LMCS-11(2:16)2015
null
cs.LO cs.SY math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose novel controller synthesis techniques for probabilistic systems modelled using stochastic two-player games: one player acts as a controller, the second represents its environment, and probability is used to capture uncertainty arising due to, for example, unreliable sensors or faulty system components. Our aim is to generate robust controllers that are resilient to unexpected system changes at runtime, and flexible enough to be adapted if additional constraints need to be imposed. We develop a permissive controller synthesis framework, which generates multi-strategies for the controller, offering a choice of control actions to take at each time step. We formalise the notion of permissivity using penalties, which are incurred each time a possible control action is disallowed by a multi-strategy. Permissive controller synthesis aims to generate a multi-strategy that minimises these penalties, whilst guaranteeing the satisfaction of a specified system property. We establish several key results about the optimality of multi-strategies and the complexity of synthesising them. Then, we develop methods to perform permissive controller synthesis using mixed integer linear programming and illustrate their effectiveness on a selection of case studies.
[ { "version": "v1", "created": "Sat, 18 Apr 2015 00:04:03 GMT" }, { "version": "v2", "created": "Mon, 29 Jun 2015 17:02:48 GMT" } ]
2017-01-11T00:00:00
[ [ "Drager", "Klaus", "", "Queen Mary, University of London" ], [ "Forejt", "Vojtech", "", "University of Oxford" ], [ "Kwiatkowska", "Marta", "", "University of Oxford" ], [ "Parker", "David", "", "University of Birmingham" ], [ "Ujma", "Mateusz", "", "University of Oxford" ] ]
new_dataset
0.978419
1507.07697
Bart Jacobs
Bart Jacobs (Katholieke Universiteit Leuven), Fr\'ed\'eric Vogels (Katholieke Universiteit Leuven), Frank Piessens (Katholieke Universiteit Leuven)
Featherweight VeriFast
null
Logical Methods in Computer Science, Volume 11, Issue 3 (September 22, 2015) lmcs:1595
10.2168/LMCS-11(3:19)2015
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
VeriFast is a leading research prototype tool for the sound modular verification of safety and correctness properties of single-threaded and multithreaded C and Java programs. It has been used as a vehicle for exploration and validation of novel program verification techniques and for industrial case studies; it has served well at a number of program verification competitions; and it has been used for teaching by multiple teachers independent of the authors. However, until now, while VeriFast's operation has been described informally in a number of publications, and specific verification techniques have been formalized, a clear and precise exposition of how VeriFast works has not yet appeared. In this article we present for the first time a formal definition and soundness proof of a core subset of the VeriFast program verification approach. The exposition aims to be both accessible and rigorous: the text is based on lecture notes for a graduate course on program verification, and it is backed by an executable machine-readable definition and machine-checked soundness proof in Coq.
[ { "version": "v1", "created": "Tue, 28 Jul 2015 09:36:52 GMT" }, { "version": "v2", "created": "Mon, 21 Sep 2015 19:24:01 GMT" } ]
2017-01-11T00:00:00
[ [ "Jacobs", "Bart", "", "Katholieke Universiteit Leuven" ], [ "Vogels", "Frédéric", "", "Katholieke Universiteit Leuven" ], [ "Piessens", "Frank", "", "Katholieke Universiteit\n Leuven" ] ]
new_dataset
0.998868
1603.09263
Antonio Campello
Antonio Campello and Cong Ling and Jean-Claude Belfiore
Universal Lattice Codes for MIMO Channels
26 pages, 2 figures, extended journal version of the previous arXiv submission. Several details and some corrections were added with respect to the previous version
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a coding scheme that achieves the capacity of the compound MIMO channel with algebraic lattices. Our lattice construction exploits the multiplicative structure of number fields and their group of units to absorb ill-conditioned channel realizations. To shape the constellation, a discrete Gaussian distribution over the lattice points is applied. These techniques, along with algebraic properties of the proposed lattices, are then used to construct a sub-optimal de-coupled coding schemes that achieves a gap to compound capacity by decoding in a lattice that does not depend of the channel realization. The gap is characterized in terms of algebraic invariants of the codes, and shown to be significantly smaller than previous schemes in the literature. We also exhibit alternative algebraic constructions that achieve the capacity of ergodic fading channels.
[ { "version": "v1", "created": "Wed, 30 Mar 2016 16:19:53 GMT" }, { "version": "v2", "created": "Tue, 10 Jan 2017 16:23:20 GMT" } ]
2017-01-11T00:00:00
[ [ "Campello", "Antonio", "" ], [ "Ling", "Cong", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
new_dataset
0.990086
1701.02421
Xiaonan Su
Xiaonan Su, Changle Li, Xiaoming Yuan
IEEE 802.15.6-based Prototype System for WBAN: Design and Implementation
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Various current trends such as ever growing population and accelerated aging effects have effectively promoted the growth of Wireless Body Area Network (WBAN). Being the specialized standard of WBAN, the burgeoning IEEE 802.15.6 is on its way to refinement and perfection. Since experiments are the foundation of research in WBAN that reproduce system operating patterns, yet existing platforms in WBAN are mainly simulations that could not highly conform to reality with strict requirements to some degree. Thus, a reliable and efficient system based on the IEEE 802.15.6, named WBAN prototype system, is proposed and implemented in this paper. The prototype system is ascertained to be valid, authentic and efficient via analyses of scenario tests. Running in circumstances much closer to reality, the system obtains experimental results that meet rigid requirements preferably. Furthermore, based on the valid platform we created, optimizations of two parameters in the IEEE 802.15.6 by actual measurements are derived. We obtain an optimum number of transmission retries and relationship of payload length within 30 with FER, making a trade-off between waste of resource and high packet loss rate.
[ { "version": "v1", "created": "Tue, 10 Jan 2017 02:42:38 GMT" } ]
2017-01-11T00:00:00
[ [ "Su", "Xiaonan", "" ], [ "Li", "Changle", "" ], [ "Yuan", "Xiaoming", "" ] ]
new_dataset
0.966619
1701.02524
Peng Sun
Yang Li, Tao Lin, Hui Tang, Peng Sun
A Chunk Caching Location and Searching Scheme in Content Centric Networking
null
Communications (ICC), 2012 IEEE International Conference on
10.1109/ICC.2012.6363958
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Content Centric Networking (CCN) is a new network infrastructure around content dissemination and retrieval, shift from host addresses to named data. Each CCN router has a cache to store the chunks passed by it. Therefore the caching strategy about chunk placement can greatly affect the whole CCN performance. This paper proposes an implicit coordinate chunk caching location and searching scheme (CLS) in CCN hierarchical infrastructure. In CLS, there is at most one copy of a chunk cached on the path between a server and a leaf router. This copy is pulled down one level towards the leaf router by a request or pushed up one level towards the server by the cache eviction. Thus, it is possible to store more diverse contents in the whole CCN and improve the network performance. Plus, in order to reduce the server workload and file download time, a caching trail of chunk is created to direct the following request where to find the chunk. Extensive test-bed experiments have been performed to evaluate the proposed scheme in terms of a wide range of performance metrics. The results show that the proposed scheme outperforms existing algorithms.
[ { "version": "v1", "created": "Tue, 10 Jan 2017 11:44:39 GMT" } ]
2017-01-11T00:00:00
[ [ "Li", "Yang", "" ], [ "Lin", "Tao", "" ], [ "Tang", "Hui", "" ], [ "Sun", "Peng", "" ] ]
new_dataset
0.998689
1701.02545
Daniel Meana-Llori\'an
Daniel Meana-Llori\'an, Cristian Gonz\'alez Garc\'ia, B. Cristina Pelayo G-Bustelo, Juan Manuel Cueva Lovelle, Nestor Garcia-Fernandez
IoFClime: The fuzzy logic and the Internet of Things to control indoor temperature regarding the outdoor ambient conditions
null
null
10.1016/j.future.2016.11.020
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Internet of Things is arriving to our homes or cities through fields already known like Smart Homes, Smart Cities, or Smart Towns. The monitoring of environmental conditions of cities can help to adapt the indoor locations of the cities in order to be more comfortable for people who stay there. A way to improve the indoor conditions is an efficient temperature control, however, it depends on many factors like the different combinations of outdoor temperature and humidity. Therefore, adjusting the indoor temperature is not setting a value according to other value. There are many more factors to take into consideration, hence the traditional logic based in binary states cannot be used. Many problems cannot be solved with a set of binary solutions and we need a new way of development. Fuzzy logic is able to interpret many states, more than two states, giving to computers the capacity to react in a similar way to people. In this paper we will propose a new approach to control the temperature using the Internet of Things together its platforms and fuzzy logic regarding not only the indoor temperature but also the outdoor temperature and humidity in order to save energy and to set a more comfortable environment for their users. Finally, we will conclude that the fuzzy approach allows us to achieve an energy saving around 40% and thus, save money.
[ { "version": "v1", "created": "Tue, 10 Jan 2017 12:15:59 GMT" } ]
2017-01-11T00:00:00
[ [ "Meana-Llorián", "Daniel", "" ], [ "García", "Cristian González", "" ], [ "G-Bustelo", "B. Cristina Pelayo", "" ], [ "Lovelle", "Juan Manuel Cueva", "" ], [ "Garcia-Fernandez", "Nestor", "" ] ]
new_dataset
0.999547
1701.02555
Amos Korman
Ofer Feinerman, Amos Korman (IRIF, GANG)
The ANTS problem
arXiv admin note: text overlap with arXiv:1205.4545
Distributed Computing, Springer Verlag, 2016
10.1007/s00446-016-0285-8
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the Ants Nearby Treasure Search (ANTS) problem, which models natural cooperative foraging behavior such as that performed by ants around their nest. In this problem, k probabilistic agents, initially placed at a central location, collectively search for a treasure on the two-dimensional grid. The treasure is placed at a target location by an adversary and the agents' goal is to find it as fast as possible as a function of both k and D, where D is the (unknown) distance between the central location and the target. We concentrate on the case in which agents cannot communicate while searching. It is straightforward to see that the time until at least one agent finds the target is at least $\Omega$(D + D 2 /k), even for very sophisticated agents, with unrestricted memory. Our algorithmic analysis aims at establishing connections between the time complexity and the initial knowledge held by agents (e.g., regarding their total number k), as they commence the search. We provide a range of both upper and lower bounds for the initial knowledge required for obtaining fast running time. For example, we prove that log log k + $\Theta$(1) bits of initial information are both necessary and sufficient to obtain asymptotically optimal running time, i.e., O(D +D 2 /k). We also we prove that for every 0 \textless{} \textless{} 1, running in time O(log 1-- k $\times$(D +D 2 /k)) requires that agents have the capacity for storing $\Omega$(log k) different states as they leave the nest to start the search. To the best of our knowledge, the lower bounds presented in this paper provide the first non-trivial lower bounds on the memory complexity of probabilistic agents in the context of search problems. We view this paper as a "proof of concept" for a new type of interdisciplinary methodology. To fully demonstrate this methodology, the theoretical tradeoff presented here (or a similar one) should be combined with measurements of the time performance of searching ants.
[ { "version": "v1", "created": "Tue, 10 Jan 2017 12:38:44 GMT" } ]
2017-01-11T00:00:00
[ [ "Feinerman", "Ofer", "", "IRIF, GANG" ], [ "Korman", "Amos", "", "IRIF, GANG" ] ]
new_dataset
0.996143
1701.02669
Rajeev Kumar
Rajeev Kumar, Robert S Margolies, Rittwik Jana, Yong Liu and Shivendra Panwar
WiLiTV: A Low-Cost Wireless Framework for Live TV Services
null
null
null
null
cs.MM cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the evolution of HDTV and Ultra HDTV, the bandwidth requirement for IP-based TV content is rapidly increasing. Consumers demand uninterrupted service with a high Quality of Experience (QoE). Service providers are constantly trying to differentiate themselves by innovating new ways of distributing content more efficiently with lower cost and higher penetration. In this work, we propose a cost-efficient wireless framework (WiLiTV) for delivering live TV services, consisting of a mix of wireless access technologies (e.g. Satellite, WiFi and LTE overlay links). In the proposed architecture, live TV content is injected into the network at a few residential locations using satellite dishes. The content is then further distributed to other homes using a house-to-house WiFi network or via an overlay LTE network. Our problem is to construct an optimal TV distribution network with the minimum number of satellite injection points, while preserving the highest QoE, for different neighborhood densities. We evaluate the framework using realistic time-varying demand patterns and a diverse set of home location data. Our study demonstrates that the architecture requires 75 - 90% fewer satellite injection points, compared to traditional architectures. Furthermore, we show that most cost savings can be obtained using simple and practical relay routing solutions.
[ { "version": "v1", "created": "Tue, 10 Jan 2017 16:31:37 GMT" } ]
2017-01-11T00:00:00
[ [ "Kumar", "Rajeev", "" ], [ "Margolies", "Robert S", "" ], [ "Jana", "Rittwik", "" ], [ "Liu", "Yong", "" ], [ "Panwar", "Shivendra", "" ] ]
new_dataset
0.998106
1701.02708
Hui Zhang
Hui Zhang, Eitan Yaakobi and Natalia Silberstein
Multiset Combinatorial Batch Codes
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Batch codes, first introduced by Ishai, Kushilevitz, Ostrovsky, and Sahai, mimic a distributed storage of a set of $n$ data items on $m$ servers, in such a way that any batch of $k$ data items can be retrieved by reading at most some $t$ symbols from each server. Combinatorial batch codes, are replication-based batch codes in which each server stores a subset of the data items. In this paper, we propose a generalization of combinatorial batch codes, called multiset combinatorial batch codes (MCBC), in which $n$ data items are stored in $m$ servers, such that any multiset request of $k$ items, where any item is requested at most $r$ times, can be retrieved by reading at most $t$ items from each server. The setup of this new family of codes is motivated by recent work on codes which enable high availability and parallel reads in distributed storage systems. The main problem under this paradigm is to minimize the number of items stored in the servers, given the values of $n,m,k,r,t$, which is denoted by $N(n,k,m,t;r)$. We first give a necessary and sufficient condition for the existence of MCBCs. Then, we present several bounds on $N(n,k,m,t;r)$ and constructions of MCBCs. In particular, we determine the value of $N(n,k,m,1;r)$ for any $n\geq \left\lfloor\frac{k-1}{r}\right\rfloor{m\choose k-1}-(m-k+1)A(m,4,k-2)$, where $A(m,4,k-2)$ is the maximum size of a binary constant weight code of length $m$, distance four and weight $k-2$. We also determine the exact value of $N(n,k,m,1;r)$ when $r\in\{k,k-1\}$ or $k=m$.
[ { "version": "v1", "created": "Tue, 10 Jan 2017 18:03:09 GMT" } ]
2017-01-11T00:00:00
[ [ "Zhang", "Hui", "" ], [ "Yaakobi", "Eitan", "" ], [ "Silberstein", "Natalia", "" ] ]
new_dataset
0.999783
1701.02711
Saed Alrabaee
Saed Alrabaee, Paria Shirani, Mourad Debbabi, and Lingyu Wang
On the Feasibility of Malware Authorship Attribution
FPS 2016
Foundations and Practice of Security 2016 Volume 10128 of the series Lecture Notes in Computer Science pp 256-272
10.1007/978-3-319-51966-1_17
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are many occasions in which the security community is interested to discover the authorship of malware binaries, either for digital forensics analysis of malware corpora or for thwarting live threats of malware invasion. Such a discovery of authorship might be possible due to stylistic features inherent to software codes written by human programmers. Existing studies of authorship attribution of general purpose software mainly focus on source code, which is typically based on the style of programs and environment. However, those features critically depend on the availability of the program source code, which is usually not the case when dealing with malware binaries. Such program binaries often do not retain many semantic or stylistic features due to the compilation process. Therefore, authorship attribution in the domain of malware binaries based on features and styles that will survive the compilation process is challenging. This paper provides the state of the art in this literature. Further, we analyze the features involved in those techniques. By using a case study, we identify features that can survive the compilation process. Finally, we analyze existing works on binary authorship attribution and study their applicability to real malware binaries.
[ { "version": "v1", "created": "Tue, 10 Jan 2017 18:09:31 GMT" } ]
2017-01-11T00:00:00
[ [ "Alrabaee", "Saed", "" ], [ "Shirani", "Paria", "" ], [ "Debbabi", "Mourad", "" ], [ "Wang", "Lingyu", "" ] ]
new_dataset
0.972717
1701.02714
Zhaojian Li
Zhaojian Li, Ilya Kolmanovsky, Ella Atkins, Jianbo Lu, Dimitar Filev
H-infinity Filtering for Cloud-Aided Semi-active Suspension with Delayed Information
null
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This chapter presents an H-infinity filtering framework for cloud-aided semiactive suspension system with time-varying delays. In this system, road profile information is downloaded from a cloud database to facilitate onboard estimation of suspension states. Time-varying data transmission delays are considered and assumed to be bounded. A quarter-car linear suspension model is used and an H-infinity filter is designed with both onboard sensor measurements and delayed road profile information from the cloud. The filter design procedure is designed based on linear matrix inequalities (LMIs). Numerical simulation results are reported that illustrates the fusion of cloud-based and on-board information that can be achieved in Vehicleto- Cloud-to-Vehicle (V2C2V) implementation.
[ { "version": "v1", "created": "Tue, 10 Jan 2017 18:18:19 GMT" } ]
2017-01-11T00:00:00
[ [ "Li", "Zhaojian", "" ], [ "Kolmanovsky", "Ilya", "" ], [ "Atkins", "Ella", "" ], [ "Lu", "Jianbo", "" ], [ "Filev", "Dimitar", "" ] ]
new_dataset
0.955969
cs/0505013
Phuong Nguyen
Phuong Nguyen and Stephen Cook
Theories for TC0 and Other Small Complexity Classes
40 pages, Logical Methods in Computer Science
Logical Methods in Computer Science, Volume 2, Issue 1 (March 7, 2006) lmcs:2257
10.2168/LMCS-2(1:3)2006
null
cs.LO cs.CC
null
We present a general method for introducing finitely axiomatizable "minimal" two-sorted theories for various subclasses of P (problems solvable in polynomial time). The two sorts are natural numbers and finite sets of natural numbers. The latter are essentially the finite binary strings, which provide a natural domain for defining the functions and sets in small complexity classes. We concentrate on the complexity class TC^0, whose problems are defined by uniform polynomial-size families of bounded-depth Boolean circuits with majority gates. We present an elegant theory VTC^0 in which the provably-total functions are those associated with TC^0, and then prove that VTC^0 is "isomorphic" to a different-looking single-sorted theory introduced by Johannsen and Pollet. The most technical part of the isomorphism proof is defining binary number multiplication in terms a bit-counting function, and showing how to formalize the proofs of its algebraic properties.
[ { "version": "v1", "created": "Thu, 5 May 2005 22:17:01 GMT" }, { "version": "v2", "created": "Thu, 4 Aug 2005 19:37:05 GMT" }, { "version": "v3", "created": "Mon, 6 Mar 2006 13:53:59 GMT" }, { "version": "v4", "created": "Wed, 8 Mar 2006 15:27:48 GMT" } ]
2017-01-11T00:00:00
[ [ "Nguyen", "Phuong", "" ], [ "Cook", "Stephen", "" ] ]
new_dataset
0.986701
cs/0506061
Daniele Gorla
Daniele Gorla, Matthew Hennessy and Vladimiro Sassone
Security Policies as Membranes in Systems for Global Computing
23 pages; to appear in Logical Methods in Computer Science
Logical Methods in Computer Science, Volume 1, Issue 3 (December 20, 2005) lmcs:2262
10.2168/LMCS-1(3:2)2005
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a simple global computing framework, whose main concern is code migration. Systems are structured in sites, and each site is divided into two parts: a computing body, and a membrane, which regulates the interactions between the computing body and the external environment. More precisely, membranes are filters which control access to the associated site, and they also rely on the well-established notion of trust between sites. We develop a basic theory to express and enforce security policies via membranes. Initially, these only control the actions incoming agents intend to perform locally. We then adapt the basic theory to encompass more sophisticated policies, where the number of actions an agent wants to perform, and also their order, are considered.
[ { "version": "v1", "created": "Tue, 14 Jun 2005 18:08:10 GMT" }, { "version": "v2", "created": "Tue, 20 Dec 2005 15:09:21 GMT" }, { "version": "v3", "created": "Wed, 26 Jul 2006 17:15:10 GMT" }, { "version": "v4", "created": "Thu, 27 Jul 2006 07:25:51 GMT" }, { "version": "v5", "created": "Tue, 7 Oct 2008 09:58:55 GMT" } ]
2017-01-11T00:00:00
[ [ "Gorla", "Daniele", "" ], [ "Hennessy", "Matthew", "" ], [ "Sassone", "Vladimiro", "" ] ]
new_dataset
0.99651
cs/0510066
Bruno Courcelle
Bruno Courcelle
The monadic second-order logic of graphs XVI : Canonical graph<br> decompositions
null
Logical Methods in Computer Science, Volume 2, Issue 2 (March 23, 2006) lmcs:2250
10.2168/LMCS-2(2:2)2006
null
cs.LO
null
This article establishes that the split decomposition of graphs introduced by Cunnigham, is definable in Monadic Second-Order Logic.This result is actually an instance of a more general result covering canonical graph decompositions like the modular decomposition and the Tutte decomposition of 2-connected graphs into 3-connected components. As an application, we prove that the set of graphs having the same cycle matroid as a given 2-connected graph can be defined from this graph by Monadic Second-Order formulas.
[ { "version": "v1", "created": "Sat, 22 Oct 2005 13:09:38 GMT" }, { "version": "v2", "created": "Thu, 3 Nov 2005 09:20:09 GMT" }, { "version": "v3", "created": "Thu, 23 Mar 2006 13:04:11 GMT" } ]
2017-01-11T00:00:00
[ [ "Courcelle", "Bruno", "" ] ]
new_dataset
0.996428
cs/0512009
Bas Spitters
Bas Spitters
Almost periodic functions, constructively
null
Logical Methods in Computer Science, Volume 1, Issue 3 (December 20, 2005) lmcs:2263
10.2168/LMCS-1(3:3)2005
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The almost periodic functions form a natural example of a non-separable normed space. As such, it has been a challenge for constructive mathematicians to find a natural treatment of them. Here we present a simple proof of Bohr's fundamental theorem for almost periodic functions which we then generalize to almost periodic functions on general topological groups.
[ { "version": "v1", "created": "Fri, 2 Dec 2005 11:30:12 GMT" }, { "version": "v2", "created": "Tue, 20 Dec 2005 15:54:25 GMT" }, { "version": "v3", "created": "Tue, 7 Oct 2008 10:01:28 GMT" } ]
2017-01-11T00:00:00
[ [ "Spitters", "Bas", "" ] ]
new_dataset
0.997351
cs/0605064
Carsten Lutz
Carsten Lutz and Frank Wolter
Modal Logics of Topological Relations
null
Logical Methods in Computer Science, Volume 2, Issue 2 (June 22, 2006) lmcs:2253
10.2168/LMCS-2(2:5)2006
null
cs.LO cs.AI cs.CC
null
Logical formalisms for reasoning about relations between spatial regions play a fundamental role in geographical information systems, spatial and constraint databases, and spatial reasoning in AI. In analogy with Halpern and Shoham's modal logic of time intervals based on the Allen relations, we introduce a family of modal logics equipped with eight modal operators that are interpreted by the Egenhofer-Franzosa (or RCC8) relations between regions in topological spaces such as the real plane. We investigate the expressive power and computational complexity of logics obtained in this way. It turns out that our modal logics have the same expressive power as the two-variable fragment of first-order logic, but are exponentially less succinct. The complexity ranges from (undecidable and) recursively enumerable to highly undecidable, where the recursively enumerable logics are obtained by considering substructures of structures induced by topological spaces. As our undecidability results also capture logics based on the real line, they improve upon undecidability results for interval temporal logics by Halpern and Shoham. We also analyze modal logics based on the five RCC5 relations, with similar results regarding the expressive power, but weaker results regarding the complexity.
[ { "version": "v1", "created": "Mon, 15 May 2006 14:42:36 GMT" }, { "version": "v2", "created": "Thu, 22 Jun 2006 11:54:31 GMT" } ]
2017-01-11T00:00:00
[ [ "Lutz", "Carsten", "" ], [ "Wolter", "Frank", "" ] ]
new_dataset
0.954618
cs/0606053
Antoine Meyer
Arnaud Carayol and Antoine Meyer
Context-Sensitive Languages, Rational Graphs and Determinism
null
Logical Methods in Computer Science, Volume 2, Issue 2 (July 19, 2006) lmcs:2254
10.2168/LMCS-2(2:6)2006
null
cs.LO
null
We investigate families of infinite automata for context-sensitive languages. An infinite automaton is an infinite labeled graph with two sets of initial and final vertices. Its language is the set of all words labelling a path from an initial vertex to a final vertex. In 2001, Morvan and Stirling proved that rational graphs accept the context-sensitive languages between rational sets of initial and final vertices. This result was later extended to sub-families of rational graphs defined by more restricted classes of transducers. languages.<br><br> Our contribution is to provide syntactical and self-contained proofs of the above results, when earlier constructions relied on a non-trivial normal form of context-sensitive grammars defined by Penttonen in the 1970's. These new proof techniques enable us to summarize and refine these results by considering several sub-families defined by restrictions on the type of transducers, the degree of the graph or the size of the set of initial vertices.
[ { "version": "v1", "created": "Mon, 12 Jun 2006 09:35:18 GMT" }, { "version": "v2", "created": "Wed, 19 Jul 2006 11:45:45 GMT" } ]
2017-01-11T00:00:00
[ [ "Carayol", "Arnaud", "" ], [ "Meyer", "Antoine", "" ] ]
new_dataset
0.999769
cs/0703079
Hendrik Jan Hoogeboom
Joost Engelfriet, Hendrik Jan Hoogeboom
Automata with Nested Pebbles Capture First-Order Logic with Transitive Closure
Paper for Logical Methods in Computer Science, 27 pages, 1 figure
Logical Methods in Computer Science, Volume 3, Issue 2 (April 26, 2007) lmcs:2220
10.2168/LMCS-3(2:3)2007
null
cs.LO
null
String languages recognizable in (deterministic) log-space are characterized either by two-way (deterministic) multi-head automata, or following Immerman, by first-order logic with (deterministic) transitive closure. Here we elaborate this result, and match the number of heads to the arity of the transitive closure. More precisely, first-order logic with k-ary deterministic transitive closure has the same power as deterministic automata walking on their input with k heads, additionally using a finite set of nested pebbles. This result is valid for strings, ordered trees, and in general for families of graphs having a fixed automaton that can be used to traverse the nodes of each of the graphs in the family. Other examples of such families are grids, toruses, and rectangular mazes. For nondeterministic automata, the logic is restricted to positive occurrences of transitive closure. The special case of k=1 for trees, shows that single-head deterministic tree-walking automata with nested pebbles are characterized by first-order logic with unary deterministic transitive closure. This refines our earlier result that placed these automata between first-order and monadic second-order logic on trees.
[ { "version": "v1", "created": "Thu, 15 Mar 2007 10:27:05 GMT" }, { "version": "v2", "created": "Thu, 26 Apr 2007 12:07:25 GMT" } ]
2017-01-11T00:00:00
[ [ "Engelfriet", "Joost", "" ], [ "Hoogeboom", "Hendrik Jan", "" ] ]
new_dataset
0.999319
1604.00589
Fabr\'icio Barros Gon\c{c}alves
F. B. Gon\c{c}alves and F. M. G. Fran\c{c}a and C. L. Amorim
RAdNet-VE: An Interest-Centric Mobile Ad Hoc Network for Vehicular Environments
24 pages, 12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2016)
null
null
null
cs.NI cs.SY
http://creativecommons.org/licenses/by-nc-sa/4.0/
In this study, we propose a variation of the RAdNet for vehicular environments (RAdNet-VE). The proposed scheme extends the message header, mechanism for registering interest, and message forwarding mechanism of RAdNet. To obtain results, we performed simulation experiments involving two use scenarios and communication protocols developed from the Veins framework. Based on results obtained from these experiments, we compare the performance of RAdNet-VE against that of RAdNet, a basic content-centric network (CCN) using reactive data routing, (CCN$_R$), and a basic CCN using proactive data routing, CCN$_P$. These CCNs provide non-cacheable data services. Moreover, the communication radio standards adopted in the scenarios 1 and 2 were respectively IEEE 802.11n and IEEE 802.11p. The results shown that the performance of the RAdNet-VE was superior to than those of RAdNet, CCN$_R$ and CCN$_P$. In this sense, RAdNet-VE protocol (RVEP) presented low communication latencies among nodes of just 20.4ms (scenario 1) and 2.87 ms (scenario 2). Our protocol also presented high data delivery rates, i.e, 83.05\% (scenario 1) and 88.05\% (scenario 2). Based on these and other results presented in this study, we argue that RAdNet-VE is a feasible alternative to CCNs as information-centric network (ICN) model for VANET, because the RVEP satisfies all of the necessary communication requirements.
[ { "version": "v1", "created": "Sun, 3 Apr 2016 03:32:55 GMT" }, { "version": "v10", "created": "Fri, 6 Jan 2017 19:29:20 GMT" }, { "version": "v2", "created": "Tue, 5 Apr 2016 21:06:16 GMT" }, { "version": "v3", "created": "Sat, 9 Apr 2016 23:54:20 GMT" }, { "version": "v4", "created": "Wed, 13 Apr 2016 15:12:14 GMT" }, { "version": "v5", "created": "Fri, 15 Apr 2016 20:29:49 GMT" }, { "version": "v6", "created": "Sat, 7 May 2016 16:19:34 GMT" }, { "version": "v7", "created": "Wed, 3 Aug 2016 16:50:40 GMT" }, { "version": "v8", "created": "Mon, 24 Oct 2016 22:16:13 GMT" }, { "version": "v9", "created": "Wed, 9 Nov 2016 04:08:34 GMT" } ]
2017-01-10T00:00:00
[ [ "Gonçalves", "F. B.", "" ], [ "França", "F. M. G.", "" ], [ "Amorim", "C. L.", "" ] ]
new_dataset
0.997819
1604.04848
Gil Ben-Artzi
Gil Ben-Artzi, Tavi Halperin, Michael Werman, Shmuel Peleg
Epipolar Geometry Based On Line Similarity
ICPR 2016, Cancun, Dec 2016
ICPR'16, Cancun, Dec. 2016, pp. 1865-1870
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that epipolar geometry can be computed from three epipolar line correspondences but this computation is rarely used in practice since there are no simple methods to find corresponding lines. Instead, methods for finding corresponding points are widely used. This paper proposes a similarity measure between lines that indicates whether two lines are corresponding epipolar lines and enables finding epipolar line correspondences as needed for the computation of epipolar geometry. A similarity measure between two lines, suitable for video sequences of a dynamic scene, has been previously described. This paper suggests a stereo matching similarity measure suitable for images. It is based on the quality of stereo matching between the two lines, as corresponding epipolar lines yield a good stereo correspondence. Instead of an exhaustive search over all possible pairs of lines, the search space is substantially reduced when two corresponding point pairs are given. We validate the proposed method using real-world images and compare it to state-of-the-art methods. We found this method to be more accurate by a factor of five compared to the standard method using seven corresponding points and comparable to the 8-points algorithm.
[ { "version": "v1", "created": "Sun, 17 Apr 2016 09:14:22 GMT" }, { "version": "v2", "created": "Tue, 26 Jul 2016 14:39:32 GMT" }, { "version": "v3", "created": "Mon, 22 Aug 2016 08:07:36 GMT" }, { "version": "v4", "created": "Sun, 8 Jan 2017 00:11:14 GMT" } ]
2017-01-10T00:00:00
[ [ "Ben-Artzi", "Gil", "" ], [ "Halperin", "Tavi", "" ], [ "Werman", "Michael", "" ], [ "Peleg", "Shmuel", "" ] ]
new_dataset
0.978979
1610.07252
Masahito Hayashi
Angeles Vazquez-Castro, Masahito Hayashi
Information-theoretic Physical Layer Security for Satellite Channels
null
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Shannon introduced the classic model of a cryptosystem in 1949, where Eve has access to an identical copy of the cyphertext that Alice sends to Bob. Shannon defined perfect secrecy to be the case when the mutual information between the plaintext and the cyphertext is zero. Perfect secrecy is motivated by error-free transmission and requires that Bob and Alice share a secret key. Wyner in 1975 and later I.~Csisz\'ar and J.~K\"orner in 1978 modified the Shannon model assuming that the channels are noisy and proved that secrecy can be achieved without sharing a secret key. This model is called wiretap channel model and secrecy capacity is known when Eve's channel is noisier than Bob's channel. In this paper we review the concept of wiretap coding from the satellite channel viewpoint. We also review subsequently introduced stronger secrecy levels which can be numerically quantified and are keyless unconditionally secure under certain assumptions. We introduce the general construction of wiretap coding and analyse its applicability for a typical satellite channel. From our analysis we discuss the potential of keyless information theoretic physical layer security for satellite channels based on wiretap coding. We also identify system design implications for enabling simultaneous operation with additional information theoretic security protocols.
[ { "version": "v1", "created": "Mon, 24 Oct 2016 00:17:59 GMT" }, { "version": "v2", "created": "Thu, 5 Jan 2017 09:46:49 GMT" }, { "version": "v3", "created": "Sat, 7 Jan 2017 10:22:56 GMT" } ]
2017-01-10T00:00:00
[ [ "Vazquez-Castro", "Angeles", "" ], [ "Hayashi", "Masahito", "" ] ]
new_dataset
0.995065
1701.00495
Ariel Ephrat
Ariel Ephrat and Shmuel Peleg
Vid2speech: Speech Reconstruction from Silent Video
Accepted for publication at ICASSP 2017
null
null
null
cs.CV cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Speechreading is a notoriously difficult task for humans to perform. In this paper we present an end-to-end model based on a convolutional neural network (CNN) for generating an intelligible acoustic speech signal from silent video frames of a speaking person. The proposed CNN generates sound features for each frame based on its neighboring frames. Waveforms are then synthesized from the learned speech features to produce intelligible speech. We show that by leveraging the automatic feature learning capabilities of a CNN, we can obtain state-of-the-art word intelligibility on the GRID dataset, and show promising results for learning out-of-vocabulary (OOV) words.
[ { "version": "v1", "created": "Mon, 2 Jan 2017 19:00:22 GMT" }, { "version": "v2", "created": "Mon, 9 Jan 2017 17:35:17 GMT" } ]
2017-01-10T00:00:00
[ [ "Ephrat", "Ariel", "" ], [ "Peleg", "Shmuel", "" ] ]
new_dataset
0.999224
1701.01793
Rajan Vaish
Rajan Vaish, Andr\'es Monroy-Hern\'andez
CrowdTone: Crowd-powered tone feedback and improvement system for emails
10 pages, 14 figures
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present CrowdTone, a system designed to help people set the appropriate tone in their email communication. CrowdTone utilizes the context and content of an email message to identify and set the appropriate tone through a consensus-building process executed by crowd workers. We evaluated CrowdTone with 22 participants, who provided a total of 29 emails that they had received in the past, and ran them through CrowdTone. Participants and professional writers assessed the quality of improvements finding a substantial increase in the percentage of emails deemed "appropriate" or "very appropriate" - from 25% to more than 90% by recipients, and from 45% to 90% by professional writers. Additionally, the recipients' feedback indicated that more than 90% of the CrowdTone processed emails showed improvement.
[ { "version": "v1", "created": "Sat, 7 Jan 2017 05:35:10 GMT" } ]
2017-01-10T00:00:00
[ [ "Vaish", "Rajan", "" ], [ "Monroy-Hernández", "Andrés", "" ] ]
new_dataset
0.99086
1701.01875
Zeshan Hussain
Hardie Cate, Fahim Dalvi, and Zeshan Hussain
Sign Language Recognition Using Temporal Classification
5 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Devices like the Myo armband available in the market today enable us to collect data about the position of a user's hands and fingers over time. We can use these technologies for sign language translation since each sign is roughly a combination of gestures across time. In this work, we utilize a dataset collected by a group at the University of South Wales, which contains parameters, such as hand position, hand rotation, and finger bend, for 95 unique signs. For each input stream representing a sign, we predict which sign class this stream falls into. We begin by implementing baseline SVM and logistic regression models, which perform reasonably well on high quality data. Lower quality data requires a more sophisticated approach, so we explore different methods in temporal classification, including long short term memory architectures and sequential pattern mining methods.
[ { "version": "v1", "created": "Sat, 7 Jan 2017 20:09:52 GMT" } ]
2017-01-10T00:00:00
[ [ "Cate", "Hardie", "" ], [ "Dalvi", "Fahim", "" ], [ "Hussain", "Zeshan", "" ] ]
new_dataset
0.997134
1701.01931
Quyuan Luo
Quyuan Luo, Changle Li, Qiang Ye, Tom H. Luan, Lina Zhu and Xiaolei Han
CFT: A Cluster-based File Transfer Scheme for Highway
7 pages, 14figures, IEEE International Conference on Communications
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Effective file transfer between vehicles is fundamental to many emerging vehicular infotainment applications in the highway Vehicular Ad Hoc Networks (VANETs), such as content distribution and social networking. However, due to fast mobility, the connection between vehicles tends to be short-lived and lossy, which makes intact file transfer extremely challenging. To tackle this problem, we presents a novel Cluster-based File Transfer (CFT) scheme for highway VANETs in this paper. With CFT, when a vehicle requests a file, the transmission capacity between the resource vehicle and the destination vehicle is evaluated. If the requested file can be successfully transferred over the direct Vehicular-to-Vehicular (V2V) connection, the file transfer will be completed by the resource and the destination themselves. Otherwise, a cluster will be formed to help the file transfer. As a fully-distributed scheme that relies on the collaboration of cluster members, CFT does not require any assistance from roadside units or access points. Our experimental results indicate that CFT outperforms the existing file transfer schemes for highway VANETs.
[ { "version": "v1", "created": "Sun, 8 Jan 2017 09:28:08 GMT" } ]
2017-01-10T00:00:00
[ [ "Luo", "Quyuan", "" ], [ "Li", "Changle", "" ], [ "Ye", "Qiang", "" ], [ "Luan", "Tom H.", "" ], [ "Zhu", "Lina", "" ], [ "Han", "Xiaolei", "" ] ]
new_dataset
0.961229
1701.01938
Vincent Tan
Eldho K. Thomas and Vincent Y. F. Tan and Alexander Vardy and Mehul Motani
Polar Coding for the Binary Erasure Channel with Deletions
4 pages; 1 figure; To appear in the IEEE Communication Letters
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the application of polar codes in deletion channels by analyzing the cascade of a binary erasure channel (BEC) and a deletion channel. We show how polar codes can be used effectively on a BEC with a single deletion, and propose a list decoding algorithm with a cyclic redundancy check for this case. The decoding complexity is $O(N^2\log N)$, where $N$ is the blocklength of the code. An important contribution is an optimization of the amount of redundancy added to minimize the overall error probability. Our theoretical results are corroborated by numerical simulations which show that the list size can be reduced to one and the original message can be recovered with high probability as the length of the code grows.
[ { "version": "v1", "created": "Sun, 8 Jan 2017 10:37:07 GMT" } ]
2017-01-10T00:00:00
[ [ "Thomas", "Eldho K.", "" ], [ "Tan", "Vincent Y. F.", "" ], [ "Vardy", "Alexander", "" ], [ "Motani", "Mehul", "" ] ]
new_dataset
0.986443
1701.02044
Abhishek Gupta
Abhishek K. Gupta, Jeffrey G. Andrews, Robert W. Heath Jr
Macro diversity in Cellular Networks with Random Blockages
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blocking objects (blockages) between a transmitter and receiver cause wireless communication links to transition from line-of-sight (LOS) to non-line-of-sight (NLOS) propagation, which can greatly reduce the received power, particularly at higher frequencies such as millimeter wave (mmWave). We consider a cellular network in which a mobile user attempts to connect to two or more base stations (BSs) simultaneously, to increase the probability of at least one LOS link, which is a form of macrodiversity. We develop a framework for determining the LOS probability as a function of the number of BSs, when taking into account the correlation between blockages: for example, a single blockage close to the device -- including the user's own body -- could block multiple BSs. We consider the impact of the size of blocking objects on the system reliability probability and show that macrodiversity gains are higher when the blocking objects are small. We also show that the BS density must scale as the square of the blockage density to maintain a given level of reliability.
[ { "version": "v1", "created": "Mon, 9 Jan 2017 01:17:51 GMT" } ]
2017-01-10T00:00:00
[ [ "Gupta", "Abhishek K.", "" ], [ "Andrews", "Jeffrey G.", "" ], [ "Heath", "Robert W.", "Jr" ] ]
new_dataset
0.988369
1701.02093
K. Viswanathan Iyer
K. Viswanathan Iyer
A dynamic intranet-based online-portal support for Computer Science teaching
Article available at the following links: 1. link.springer.com/10.1007/s10639-015-9459-4 2. http://rdcu.be/mGz7 available courtesy Springer Nature SharedIt initiative. in Education and Information Technologies, Springer, 2015 - see: www.springer.com/computer/general+issues/journal/10639 The official journal of IFIP Technical Committee on Education. arXiv admin note: text overlap with arXiv:1408.1032
null
10.1007/s10639-015-9459-4
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper is a suggested experiment in effectively teaching subjects in Computer Science. The paper addresses effective content-delivery with the help of a university intranet. The proposal described herein is for teaching a subject like Combinatorics and Graph Theory - the main idea is to supplement lectures with a teacher-moderated online forum against an associated intranet portal. Keywords and phrases -computer-assisted learning; learning portal; active learning; OEIS; intranet portal; undergraduate teaching; Combinatorics and Graph theory
[ { "version": "v1", "created": "Mon, 9 Jan 2017 08:43:05 GMT" } ]
2017-01-10T00:00:00
[ [ "Iyer", "K. Viswanathan", "" ] ]
new_dataset
0.966822
1701.02160
Reza Malekian Ph.D.
Reza Malekian, Ntefeng Ruth Moloisane, Lakshmi Nair, BT Maharaj, Uche A.K. Chude-Okonkwo
Design and Implementation of a Wireless OBD II Fleet Management System
in IEEE Sensors 2016
null
10.1109/JSEN.2016.2631542
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the work that has been done in the design and development of a wireless OBD II fleet management system. The system aims to measure speed, distance and fuel consumption of vehicles for tracking and analysis purposes. An OBD II reader is designed to measure speed and mass air flow, from which distance and fuel consumption are also computed. This data is then transmitted via WiFi to a remote server. The system also implements GPS tracking to determine the location of the vehicle. A database management system is implemented at the remote server for the storage and management of transmitted data and a graphical user interface (GUI) is developed for analysing the transmitted data . Various qualification tests are conducted to verify the functionality of the system. The results demonstrate that the system is capable of reading the various parameters, and can successfully process, transmit and display the readings.
[ { "version": "v1", "created": "Mon, 9 Jan 2017 12:29:20 GMT" } ]
2017-01-10T00:00:00
[ [ "Malekian", "Reza", "" ], [ "Moloisane", "Ntefeng Ruth", "" ], [ "Nair", "Lakshmi", "" ], [ "Maharaj", "BT", "" ], [ "Chude-Okonkwo", "Uche A. K.", "" ] ]
new_dataset
0.983182
1701.02162
Amaury Pouly
Nathana\"el Fijalkow, Pierre Ohlmann, Jo\"el Ouaknine, Amaury Pouly, James Worrell
Semialgebraic Invariant Synthesis for the Kannan-Lipton Orbit Problem
null
null
null
null
cs.CC cs.LO cs.SC math.AG math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The \emph{Orbit Problem} consists of determining, given a linear transformation $A$ on $\mathbb{Q}^d$, together with vectors $x$ and $y$, whether the orbit of $x$ under repeated applications of $A$ can ever reach $y$. This problem was famously shown to be decidable by Kannan and Lipton in the 1980s. In this paper, we are concerned with the problem of synthesising suitable \emph{invariants} $\mathcal{P} \subseteq \mathbb{R}^d$, \emph{i.e.}, sets that are stable under $A$ and contain $x$ and not $y$, thereby providing compact and versatile certificates of non-reachability. We show that whether a given instance of the Orbit Problem admits a semialgebraic invariant is decidable, and moreover in positive instances we provide an algorithm to synthesise suitable invariants of polynomial size. It is worth noting that the existence of \emph{semilinear} invariants, on the other hand, is (to the best of our knowledge) not known to be decidable.
[ { "version": "v1", "created": "Mon, 9 Jan 2017 13:00:53 GMT" } ]
2017-01-10T00:00:00
[ [ "Fijalkow", "Nathanaël", "" ], [ "Ohlmann", "Pierre", "" ], [ "Ouaknine", "Joël", "" ], [ "Pouly", "Amaury", "" ], [ "Worrell", "James", "" ] ]
new_dataset
0.958284
1701.02220
Artur Yakimovich Artur Yakimovich
Vardan Andriasyan, Yauhen Yakimovich, Artur Yakimovich
MatlabCompat.jl: helping Julia understand Your Matlab/Octave Code
20 pages, 3 figures, 1 table; *correspondence: [email protected], [email protected]
null
null
null
cs.SE q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scientific legacy code in MATLAB/Octave not compatible with modernization of research workflows is vastly abundant throughout academic community. Performance of non-vectorized code written in MATLAB/Octave represents a major burden. A new programming language for technical computing Julia, promises to address these issues. Although Julia syntax is similar to MATLAB/Octave, porting code to Julia may be cumbersome for researchers. Here we present MatlabCompat.jl - a library aimed at simplifying the conversion of your MATLAB/Octave code to Julia. We show using a simplistic image analysis use case that MATLAB/Octave code can be easily ported to high performant Julia using MatlabCompat.jl.
[ { "version": "v1", "created": "Fri, 6 Jan 2017 13:38:07 GMT" } ]
2017-01-10T00:00:00
[ [ "Andriasyan", "Vardan", "" ], [ "Yakimovich", "Yauhen", "" ], [ "Yakimovich", "Artur", "" ] ]
new_dataset
0.998558
1701.02221
Domagoj Vrgo\v{c}
Pierre Bourhis and Juan L. Reutter and Fernando Su\'arez and Domagoj Vrgo\v{c}
JSON: data model, query languages and schema specification
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite the fact that JSON is currently one of the most popular formats for exchanging data on the Web, there are very few studies on this topic and there are no agreement upon theoretical framework for dealing with JSON. There- fore in this paper we propose a formal data model for JSON documents and, based on the common features present in available systems using JSON, we define a lightweight query language allowing us to navigate through JSON documents. We also introduce a logic capturing the schema proposal for JSON and study the complexity of basic computational tasks associated with these two formalisms.
[ { "version": "v1", "created": "Mon, 9 Jan 2017 15:53:41 GMT" } ]
2017-01-10T00:00:00
[ [ "Bourhis", "Pierre", "" ], [ "Reutter", "Juan L.", "" ], [ "Suárez", "Fernando", "" ], [ "Vrgoč", "Domagoj", "" ] ]
new_dataset
0.99853
1106.2414
Athanasios Kehagias
Athanasios Kehagias and Pawel Pralat
Some remarks on cops and drunk robbers
null
null
null
null
cs.DM cs.GT cs.RO math.CO math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The cops and robbers game has been extensively studied under the assumption of optimal play by both the cops and the robbers. In this paper we study the problem in which cops are chasing a drunk robber (that is, a robber who performs a random walk) on a graph. Our main goal is to characterize the "cost of drunkenness." Specifically, we study the ratio of expected capture times for the optimal version and the drunk robber one. We also examine the algorithmic side of the problem; that is, how to compute near-optimal search schedules for the cops. Finally, we present a preliminary investigation of the invisible robber game and point out differences between this game and graph search.
[ { "version": "v1", "created": "Mon, 13 Jun 2011 10:52:17 GMT" } ]
2017-01-09T00:00:00
[ [ "Kehagias", "Athanasios", "" ], [ "Pralat", "Pawel", "" ] ]
new_dataset
0.950683
1408.1312
Albert Y.S. Lam
Albert Y.S. Lam, Ka-Cheong Leung, Victor O.K. Li
Vehicular Energy Network
12 pages, accepted for publication in IEEE Transactions on Transportation Electrification
null
10.1109/TTE.2017.2649887
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The smart grid spawns many innovative ideas, but many of them cannot be easily integrated into the existing power system due to power system constraints, such as the lack of capacity to transport renewable energy in remote areas to the urban centers. An energy delivery system can be built upon the traffic network and electric vehicles (EVs) utilized as energy carriers to transport energy over a large geographical region. A generalized architecture called the vehicular energy network (VEN) is constructed and a mathematically tractable framework is developed. Dynamic wireless (dis)charging allows electric energy, as an energy packet, to be added and subtracted from EV batteries seamlessly. With proper routing, energy can be transported from the sources to destinations through EVs along appropriate vehicular routes. This paper gives a preliminary study of VEN. Models are developed to study its operational and economic feasibilities with real traffic data in the United Kingdom. Our study shows that a substantial amount of renewable energy can be transported from some remote wind farms to London under some reasonable settings and VEN is likely to be profitable in the near future. VEN can complement the power network and enhance its power delivery capability.
[ { "version": "v1", "created": "Wed, 6 Aug 2014 15:07:22 GMT" }, { "version": "v2", "created": "Wed, 19 Aug 2015 06:07:58 GMT" }, { "version": "v3", "created": "Wed, 5 Oct 2016 02:40:02 GMT" }, { "version": "v4", "created": "Thu, 5 Jan 2017 04:58:07 GMT" } ]
2017-01-09T00:00:00
[ [ "Lam", "Albert Y. S.", "" ], [ "Leung", "Ka-Cheong", "" ], [ "Li", "Victor O. K.", "" ] ]
new_dataset
0.99792
1512.04362
Qing Wang
Qing Wang, Marco Zuniga, Domenico Giustiniano
Passive Communication with Ambient Light
8 pages, 17 figures in ACM CoNEXT 2016 (Best Paper Runner-Up)
null
10.1145/2999572.2999584
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose a new communication system for illuminated areas, indoors and outdoors. Light sources in our environments -such as light bulbs or even the sun- are our signal emitters, but we do not modulate data at the light source. We instead propose that the environment itself modulates the ambient light signals: if mobile elements 'wear' patterns consisting of distinctive reflecting surfaces, single photodiode could decode the disturbed light signals to read passive information. Achieving this vision requires a deep understanding of a new type of communication channel. Many parameters can affect the performance of passive communication based on visible light: the size of reflective surfaces, the surrounding light intensity, the speed of mobile objects, the field-of-view of the receiver, to name a few. In this paper, we present our vision for a passive communication channel with visible light, the design challenges and the evaluation of an outdoor application where our receiver decodes information from a car moving at 18 km/h.
[ { "version": "v1", "created": "Mon, 14 Dec 2015 15:25:04 GMT" }, { "version": "v2", "created": "Tue, 26 Jan 2016 17:11:53 GMT" }, { "version": "v3", "created": "Fri, 6 Jan 2017 09:25:46 GMT" } ]
2017-01-09T00:00:00
[ [ "Wang", "Qing", "" ], [ "Zuniga", "Marco", "" ], [ "Giustiniano", "Domenico", "" ] ]
new_dataset
0.997195
1612.07574
Pichai Vanchinathan
P. Vanchinathan
Symmetric Key Encryption for Arbitrary Block Sizes from Affine Spaces
11 pages, 1 commutative diagram; In Version 2, besides correcting typos, a table has been added as Lemma 3
null
null
null
cs.CR math.AG math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A symmetric key encryption scheme is described for blocks of general size N that is a product of powers of many prime numbers. This is accomplished by realising each number (representing a message unit) as a point in a product of affine spaces over various finite fields. Then algebro-geometric transformations on those affine spaces is transported back to provide encryption. For a specific block size${}<2^{128}$ we get more than $2^{5478}$ keys.
[ { "version": "v1", "created": "Thu, 22 Dec 2016 12:28:07 GMT" }, { "version": "v2", "created": "Fri, 6 Jan 2017 07:16:26 GMT" } ]
2017-01-09T00:00:00
[ [ "Vanchinathan", "P.", "" ] ]
new_dataset
0.984701
1701.01491
Amina Piemontese Ph.D
Amina Piemontese, and Alexandre Graell i Amat
MDS-Coded Distributed Caching for Low Delay Wireless Content Delivery
submitted to IEEE Transactions on Communications. arXiv admin note: text overlap with arXiv:1607.00880
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the use of maximum distance separable (MDS) codes to cache popular content to reduce the download delay of wireless content delivery. In particular, we consider a cellular system where devices roam in an out of a cell according to a Poisson random process. Popular content is cached in a limited number of the mobile devices using an MDS code and can be downloaded from the mobile devices using device-to-device communication. We derive an analytical expression for the delay incurred in downloading content from the wireless network and show that distributed caching using MDS codes can dramatically reduce the download delay with respect to the scenario where content is always downloaded from the base station and to the case of uncoded distributed caching.
[ { "version": "v1", "created": "Thu, 5 Jan 2017 21:59:20 GMT" } ]
2017-01-09T00:00:00
[ [ "Piemontese", "Amina", "" ], [ "Amat", "Alexandre Graell i", "" ] ]
new_dataset
0.992469
1701.01575
Bo Xu
Bo Xu, Changlong Li, Hang Zhuang, Jiali Wang, Qingfeng Wang, Jinhong Zhou, Xuehai Zhou
DSA: Scalable Distributed Sequence Alignment System Using SIMD Instructions
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sequence alignment algorithms are a basic and critical component of many bioinformatics fields. With rapid development of sequencing technology, the fast growing reference database volumes and longer length of query sequence become new challenges for sequence alignment. However, the algorithm is prohibitively high in terms of time and space complexity. In this paper, we present DSA, a scalable distributed sequence alignment system that employs Spark to process sequences data in a horizontally scalable distributed environment, and leverages data parallel strategy based on Single Instruction Multiple Data (SIMD) instruction to parallelize the algorithm in each core of worker node. The experimental results demonstrate that 1) DSA has outstanding performance and achieves up to 201x speedup over SparkSW. 2) DSA has excellent scalability and achieves near linear speedup when increasing the number of nodes in cluster.
[ { "version": "v1", "created": "Fri, 6 Jan 2017 09:03:32 GMT" } ]
2017-01-09T00:00:00
[ [ "Xu", "Bo", "" ], [ "Li", "Changlong", "" ], [ "Zhuang", "Hang", "" ], [ "Wang", "Jiali", "" ], [ "Wang", "Qingfeng", "" ], [ "Zhou", "Jinhong", "" ], [ "Zhou", "Xuehai", "" ] ]
new_dataset
0.953574
1701.01644
Lennart Br\"uggemann
Lennart Br\"uggemann
Interaktion mit 3D-Objekten in Augmented Reality Anwendungen auf mobilen Android Ger\"aten
88 Pages, 14 figures, Bachelor's Thesis, in German
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This bachelor's thesis describes the conception and implementation of an augmented reality application for the Android platform. The intention is to demonstrate some possibilities of interaction within an augmented reality environment on mobile devices. For that purpose, a 3D-model is displayed on the devices' touchscreen using marker-based tracking. This enables the user to translate, rotate or scale the model as he wishes. He can additionally select and highlight preassigned parts of the model to display specific information for that element. To assist developers in modifying the application for changing requirements without re-writing large portions of the source code, the information for each part have been encapsulated into its own data type. After an introduction to augmented reality, its underlying technology and the Android platform, some possible usage scenarios and the resulting functionalities are outlined. Finally, the design as well as the developed implementation are described.
[ { "version": "v1", "created": "Tue, 27 Dec 2016 21:08:55 GMT" } ]
2017-01-09T00:00:00
[ [ "Brüggemann", "Lennart", "" ] ]
new_dataset
0.997665
1701.01648
Mohamed Khafagy Helmy
Ahmed H.Abase, Mohamed H. Khafagy, Fatma A. Omara
Locality Sim: Cloud Simulator with Data Locality
15 Pages, 10 Figures
International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 6, No. 6, December 2016
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud Computing (CC) is a model for enabling on-demand access to a shared pool of configurable computing resources. Testing and evaluating the performance of the cloud environment for allocating, provisioning, scheduling, and data allocation policy have great attention to be achieved. Therefore, using cloud simulator would save time and money, and provide a flexible environment to evaluate new research work. Unfortunately, the current simulators (e.g., CloudSim, NetworkCloudSim, GreenCloud, etc..) deal with the data as for size only without any consideration about the data allocation policy and locality. On the other hand, the NetworkCloudSim simulator is considered one of the most common used simulators because it includes different modules which support needed functions to a simulated cloud environment, and it could be extended to include new extra modules. According to work in this paper, the NetworkCloudSim simulator has been extended and modified to support data locality. The modified simulator is called LocalitySim. The accuracy of the proposed LocalitySim simulator has been proved by building a mathematical model. Also, the proposed simulator has been used to test the performance of the three-tire data center as a case study with considering the data locality feature.
[ { "version": "v1", "created": "Fri, 6 Jan 2017 14:40:51 GMT" } ]
2017-01-09T00:00:00
[ [ "Abase", "Ahmed H.", "" ], [ "Khafagy", "Mohamed H.", "" ], [ "Omara", "Fatma A.", "" ] ]
new_dataset
0.989064
1701.01658
Cicero Carvalho
C\'icero Carvalho and Victor G.L. Neumann
The next-to-minimal weights of binary projective Reed-Muller codes
10 pages, Published in IEEE Transactions on Information Theory, vol. 62, issue 11, Nov. 2016
null
10.1109/TIT.2016.2611527
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Projective Reed-Muller codes were introduced by Lachaud, in 1988 and their dimension and minimum distance were determined by Serre and S{\o}rensen in 1991. In coding theory one is also interested in the higher Hamming weights, to study the code performance. Yet, not many values of the higher Hamming weights are known for these codes, not even the second lowest weight (also known as next-to-minimal weight) is completely determined. In this paper we determine all the values of the next-to-minimal weight for the binary projective Reed-Muller codes, which we show to be equal to the next-to-minimal weight of Reed-Muller codes in most, but not all, cases.
[ { "version": "v1", "created": "Fri, 6 Jan 2017 15:17:21 GMT" } ]
2017-01-09T00:00:00
[ [ "Carvalho", "Cícero", "" ], [ "Neumann", "Victor G. L.", "" ] ]
new_dataset
0.968468
1207.0425
Angela Amphawan Dr.
Angela Amphawan, Mohd Amirol Md Khair, Hassanuddin Hasan
Multimedia Traffic Routing in Multilayer WDM Networks
10 pages, 8 figures
Multimedia Traffic Routing in Multilayer WDM Networks", Network and Complex Systems, Vol. 2, No. 3, pp. 1 - 9, 2012, ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
null
null
cs.NI physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advent of real-time multimedia services over the Internet has stimulated new technologies for expanding the information carrying capacity of optical network backbones. Multilayer wavelength division multiplexing (WDM) packet switching is an emerging technology for increasing the bandwidth of optical networks. Two algorithms for the routing of the multimedia traffic flows were applied: (i) Capacitated Shortest Path First (CSPF) routing, which minimizes the distance of each flow linking the given source and destination nodes and satisfying capacity constraints; and (ii) Flow Deviation Algorithm (FDA) routing, which minimizes the network-wide average packet delay.
[ { "version": "v1", "created": "Mon, 2 Jul 2012 15:41:12 GMT" } ]
2017-01-08T00:00:00
[ [ "Amphawan", "Angela", "" ], [ "Khair", "Mohd Amirol Md", "" ], [ "Hasan", "Hassanuddin", "" ] ]
new_dataset
0.99909
1407.3189
Lukas Einkemmer
Lukas Einkemmer
A modern resistive magnetohydrodynamics solver using C++ and the Boost library
null
Computer Physics Communications, Volume 206, September 2016, Pages 69-77
10.1016/j.cpc.2016.04.015
null
cs.NA cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe the implementation of our C++ resistive magnetohydrodynamics solver. The framework developed facilitates the separation of the code implementing the specific numerical method and the physical model, on the one hand, from the handling of boundary conditions and the management of the computational domain, on the other hand. In particular, this will allow us to use finite difference stencils which are only defined in the interior of the domain (the boundary conditions are handled automatically). We will discuss this and other design considerations and their impact on performance in some detail. In addition, we provide a documentation of the code developed and demonstrate that a performance comparable to Fortran can be achieved, while still maintaining a maximum of code readability and extensibility.
[ { "version": "v1", "created": "Fri, 11 Jul 2014 15:05:33 GMT" } ]
2017-01-06T00:00:00
[ [ "Einkemmer", "Lukas", "" ] ]
new_dataset
0.992231
1504.07469
Ariel Ephrat
Yair Poleg, Ariel Ephrat, Shmuel Peleg, Chetan Arora
Compact CNN for Indexing Egocentric Videos
null
IEEE WACV'16, March 2016, pp. 1-9
10.1109/WACV.2016.7477708
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While egocentric video is becoming increasingly popular, browsing it is very difficult. In this paper we present a compact 3D Convolutional Neural Network (CNN) architecture for long-term activity recognition in egocentric videos. Recognizing long-term activities enables us to temporally segment (index) long and unstructured egocentric videos. Existing methods for this task are based on hand tuned features derived from visible objects, location of hands, as well as optical flow. Given a sparse optical flow volume as input, our CNN classifies the camera wearer's activity. We obtain classification accuracy of 89%, which outperforms the current state-of-the-art by 19%. Additional evaluation is performed on an extended egocentric video dataset, classifying twice the amount of categories than current state-of-the-art. Furthermore, our CNN is able to recognize whether a video is egocentric or not with 99.2% accuracy, up by 24% from current state-of-the-art. To better understand what the network actually learns, we propose a novel visualization of CNN kernels as flow fields.
[ { "version": "v1", "created": "Tue, 28 Apr 2015 13:41:16 GMT" }, { "version": "v2", "created": "Tue, 24 Nov 2015 21:13:18 GMT" } ]
2017-01-06T00:00:00
[ [ "Poleg", "Yair", "" ], [ "Ephrat", "Ariel", "" ], [ "Peleg", "Shmuel", "" ], [ "Arora", "Chetan", "" ] ]
new_dataset
0.989983
1606.06418
Bin Dai
Bin Dai, Zheng Ma and Yuan Luo
Finite State Markov Wiretap Channel with Delayed Feedback
Accepted by IEEE transactions on Information Forensics and Security
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The finite state Markov channel (FSMC), where the channel transition probability is controlled by a state undergoing a Markov process, is a useful model for the mobile wireless communication channel. In this paper, we investigate the security issue in the mobile wireless communication systems by considering the FSMC with an eavesdropper, which we call the finite state Markov wiretap channel (FSM-WC). We assume that the state is perfectly known by the legitimate receiver and the eavesdropper, and through a noiseless feedback channel, the legitimate receiver sends his received channel output and the state back to the transmitter after some time delay. Inner and outer bounds on the capacity-equivocation regions of the FSM-WC with delayed state feedback and with or without delayed channel output feedback are provided in this paper, and we show that these bounds meet if the eavesdropper's received symbol is a degraded version of the legitimate receiver's. The above results are further explained via degraded Gaussian and Gaussian fading examples.
[ { "version": "v1", "created": "Tue, 21 Jun 2016 04:26:19 GMT" }, { "version": "v2", "created": "Thu, 5 Jan 2017 09:52:11 GMT" } ]
2017-01-06T00:00:00
[ [ "Dai", "Bin", "" ], [ "Ma", "Zheng", "" ], [ "Luo", "Yuan", "" ] ]
new_dataset
0.99491
1607.04315
Tsendsuren Munkhdalai
Tsendsuren Munkhdalai and Hong Yu
Neural Semantic Encoders
Accepted in EACL 2017, added: comparison with NTM, qualitative analysis and memory visualization
null
null
null
cs.LG cs.CL stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a memory augmented neural network for natural language understanding: Neural Semantic Encoders. NSE is equipped with a novel memory update rule and has a variable sized encoding memory that evolves over time and maintains the understanding of input sequences through read}, compose and write operations. NSE can also access multiple and shared memories. In this paper, we demonstrated the effectiveness and the flexibility of NSE on five different natural language tasks: natural language inference, question answering, sentence classification, document sentiment analysis and machine translation where NSE achieved state-of-the-art performance when evaluated on publically available benchmarks. For example, our shared-memory model showed an encouraging result on neural machine translation, improving an attention-based baseline by approximately 1.0 BLEU.
[ { "version": "v1", "created": "Thu, 14 Jul 2016 20:58:26 GMT" }, { "version": "v2", "created": "Wed, 20 Jul 2016 14:01:11 GMT" }, { "version": "v3", "created": "Thu, 5 Jan 2017 15:41:13 GMT" } ]
2017-01-06T00:00:00
[ [ "Munkhdalai", "Tsendsuren", "" ], [ "Yu", "Hong", "" ] ]
new_dataset
0.996988
1612.02900
Tarik Kazaz
Tarik Kazaz, Xianjun Jiao, Merima Kulin, Ingrid Moerman
Demo: WiSCoP - Wireless Sensor Communication Prototyping Platform
2 pages, 2 figures, to be published in the EWSN'17 Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, Uppsala, Sweden - February 20-22, 2017
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To enhance system performance of future heterogeneous wireless networks the co-design of PHY, MAC, and higher layer protocols is inevitable. In this work, we present WiSCoP - a novel embedded platform for experimentation, prototyping and implementation of integrated cross-layer network design approaches. WiSCoP is built on top of a Zynq hardware platform integrated with FMCOMMS1/2/4 RF front ends. We demonstrate the flexibility of WiSCoP by using it to prototype a fully standard compliant IEEE 802.15.4 stack with real-time performance and cross-layer integration.
[ { "version": "v1", "created": "Fri, 9 Dec 2016 03:44:14 GMT" }, { "version": "v2", "created": "Thu, 5 Jan 2017 15:27:58 GMT" } ]
2017-01-06T00:00:00
[ [ "Kazaz", "Tarik", "" ], [ "Jiao", "Xianjun", "" ], [ "Kulin", "Merima", "" ], [ "Moerman", "Ingrid", "" ] ]
new_dataset
0.998497
1701.01154
Samuel Blake T
Sam Blake
Perfect Sequences and Arrays over the Unit Quaternions
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce several new constructions for perfect periodic autocorrelation sequences and arrays over the unit quaternions. This paper uses both mathematical proofs and com- puter experiments to prove the (bounded) array constructions have perfect periodic auto- correlation. Furthermore, the first sequence construction generates odd-perfect sequences of unbounded lengths, with good ZCZ.
[ { "version": "v1", "created": "Thu, 8 Dec 2016 06:12:46 GMT" } ]
2017-01-06T00:00:00
[ [ "Blake", "Sam", "" ] ]
new_dataset
0.984246
1701.01170
Yangzihao Wang
Yangzihao Wang, Yuechao Pan, Andrew Davidson, Yuduo Wu, Carl Yang, Leyuan Wang, Muhammad Osama, Chenshan Yuan, Weitang Liu, Andy T. Riffel and John D. Owens
Gunrock: GPU Graph Analytics
52 pages, invited paper to ACM Transactions on Parallel Computing (TOPC), an extended version of PPoPP'16 paper "Gunrock: A High-Performance Graph Processing Library on the GPU"
null
null
null
cs.DC
http://creativecommons.org/licenses/by/4.0/
For large-scale graph analytics on the GPU, the irregularity of data access and control flow, and the complexity of programming GPUs, have presented two significant challenges to developing a programmable high-performance graph library. "Gunrock", our graph-processing system designed specifically for the GPU, uses a high-level, bulk-synchronous, data-centric abstraction focused on operations on a vertex or edge frontier. Gunrock achieves a balance between performance and expressiveness by coupling high performance GPU computing primitives and optimization strategies with a high-level programming model that allows programmers to quickly develop new graph primitives with small code size and minimal GPU programming knowledge. We characterize the performance of various optimization strategies and evaluate Gunrock's overall performance on different GPU architectures on a wide range of graph primitives that span from traversal-based algorithms and ranking algorithms, to triangle counting and bipartite-graph-based algorithms. The results show that on a single GPU, Gunrock has on average at least an order of magnitude speedup over Boost and PowerGraph, comparable performance to the fastest GPU hardwired primitives and CPU shared-memory graph libraries such as Ligra and Galois, and better performance than any other GPU high-level graph library.
[ { "version": "v1", "created": "Wed, 4 Jan 2017 22:16:07 GMT" } ]
2017-01-06T00:00:00
[ [ "Wang", "Yangzihao", "" ], [ "Pan", "Yuechao", "" ], [ "Davidson", "Andrew", "" ], [ "Wu", "Yuduo", "" ], [ "Yang", "Carl", "" ], [ "Wang", "Leyuan", "" ], [ "Osama", "Muhammad", "" ], [ "Yuan", "Chenshan", "" ], [ "Liu", "Weitang", "" ], [ "Riffel", "Andy T.", "" ], [ "Owens", "John D.", "" ] ]
new_dataset
0.958725
1701.01190
Roman Kolpakov
Roman Kolpakov
On the number of gapped repeats with arbitrary gap
17 pages, 2 figures. arXiv admin note: text overlap with arXiv:1309.4055, arXiv:1509.01221
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For any functions $f(x)$, $g(x)$ from $\mathbb {N}$ to $\mathbb {R}$ we call repeats $uvu$ such that $g(|u|)\le |v|\le f(|u|)$ as {\it $f,g$-gapped repeats}. We study the possible number of $f,g$-gapped repeats in words of fixed length~$n$. For quite weak conditions on $f(x)$, $g(x)$ we obtain an upper bound on this number which is linear to~$n$.
[ { "version": "v1", "created": "Thu, 5 Jan 2017 01:01:05 GMT" } ]
2017-01-06T00:00:00
[ [ "Kolpakov", "Roman", "" ] ]
new_dataset
0.991468
1411.7591
Yedid Hoshen
Yedid Hoshen and Shmuel Peleg
An Egocentric Look at Video Photographer Identity
null
Proc. CVPR'16, Las Vegas, June 2016, pp. 4284-4292
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Egocentric cameras are being worn by an increasing number of users, among them many security forces worldwide. GoPro cameras already penetrated the mass market, reporting substantial increase in sales every year. As head-worn cameras do not capture the photographer, it may seem that the anonymity of the photographer is preserved even when the video is publicly distributed. We show that camera motion, as can be computed from the egocentric video, provides unique identity information. The photographer can be reliably recognized from a few seconds of video captured when walking. The proposed method achieves more than 90% recognition accuracy in cases where the random success rate is only 3%. Applications can include theft prevention by locking the camera when not worn by its rightful owner. Searching video sharing services (e.g. YouTube) for egocentric videos shot by a specific photographer may also become possible. An important message in this paper is that photographers should be aware that sharing egocentric video will compromise their anonymity, even when their face is not visible.
[ { "version": "v1", "created": "Thu, 27 Nov 2014 13:30:53 GMT" }, { "version": "v2", "created": "Sat, 25 Apr 2015 21:06:52 GMT" }, { "version": "v3", "created": "Sun, 8 Nov 2015 16:37:31 GMT" } ]
2017-01-05T00:00:00
[ [ "Hoshen", "Yedid", "" ], [ "Peleg", "Shmuel", "" ] ]
new_dataset
0.977879
1504.07860
Minjia Shi
Minjia Shi, Ting Yao and Adel Alahmadi, Patrick Sol\'e
Skew cyclic codes over $\mathbb{F}_{q}+v\mathbb{F}_{q}+v^{2}\mathbb{F}_{q}$
This manuscript has been accepted by a magazine. arXiv admin note: text overlap with arXiv:1504.07831
null
10.1587/transfun.E98.A.1845
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we study skew cyclic codes over ring $R=\mathbb{F}_{q}+v\mathbb{F}_{q}+v^{2}\mathbb{F}_{q}$, where $q=p^{m}$, $p$ is an odd prime and $v^{3}=v$. We describe generator polynomials of skew cyclic codes over this ring and investigate the structural properties of skew cyclic codes over $R$ by a decomposition theorem. We also describe the generator polynomials of the duals of skew cyclic codes. Moreover, the idempotent generators of skew cyclic codes over $\mathbb{F}_{q}$ and $R$ are considered.
[ { "version": "v1", "created": "Wed, 29 Apr 2015 13:54:44 GMT" } ]
2017-01-05T00:00:00
[ [ "Shi", "Minjia", "" ], [ "Yao", "Ting", "" ], [ "Alahmadi", "Adel", "" ], [ "Solé", "Patrick", "" ] ]
new_dataset
0.998343
1611.07114
Manh Duong Phung
T. T. Hoang, P. M. Duong, N. T. T. Van, D. A. Viet, T. Q. Vinh
Multi-sensor perceptual system for mobile robot and sensor fusion-based localization
In 2012 International Conference on Control, Automation and Information Sciences (ICCAIS). arXiv admin note: substantial text overlap with arXiv:1611.07112
null
10.1109/ICCAIS.2012.6466599
null
cs.RO cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an Extended Kalman Filter (EKF) approach to localize a mobile robot with two quadrature encoders, a compass sensor, a laser range finder (LRF) and an omni-directional camera. The prediction step is performed by employing the kinematic model of the robot as well as estimating the input noise covariance matrix as being proportional to the wheel's angular speed. At the correction step, the measurements from all sensors including incremental pulses of the encoders, line segments of the LRF, robot orientation of the compass and deflection angular of the omni-directional camera are fused. Experiments in an indoor structured environment were implemented and the good localization results prove the effectiveness and applicability of the algorithm.
[ { "version": "v1", "created": "Tue, 22 Nov 2016 00:46:50 GMT" } ]
2017-01-05T00:00:00
[ [ "Hoang", "T. T.", "" ], [ "Duong", "P. M.", "" ], [ "Van", "N. T. T.", "" ], [ "Viet", "D. A.", "" ], [ "Vinh", "T. Q.", "" ] ]
new_dataset
0.957291
1612.00126
Minjia Shi
Yan Liu, Minjia Shi, Patrick Sol\'e
Three-weight codes and the quintic construction
15 pages, submitted on 21 November, 2016. arXiv admin note: text overlap with arXiv:1612.00118
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct a class of three-Lee-weight and two infinite families of five-Lee-weight codes over the ring $R=\mathbb{F}_2 +v\mathbb{F}_2 +v^2\mathbb{F}_2 +v^3\mathbb{F}_2 +v^4\mathbb{F}_2,$ where $v^5=1.$ The same ring occurs in the quintic construction of binary quasi-cyclic codes. %The length of these codes depends on the degree $m$ of ring extension. They have the algebraic structure of abelian codes. Their Lee weight distribution is computed by using character sums. Given a linear Gray map, we obtain three families of binary abelian codes with few weights. In particular, we obtain a class of three-weight codes which are optimal. Finally, an application to secret sharing schemes is given.
[ { "version": "v1", "created": "Thu, 1 Dec 2016 03:26:09 GMT" } ]
2017-01-05T00:00:00
[ [ "Liu", "Yan", "" ], [ "Shi", "Minjia", "" ], [ "Solé", "Patrick", "" ] ]
new_dataset
0.998782
1612.00128
Minjia Shi
Minjia Shi, Yan Liu, Patrick Sol\'e
Trace Codes with Few Weights over $\mathbb{F}_p+u\mathbb{F}_p$
12 pages, submitted on 27 October, 2016. arXiv admin note: text overlap with arXiv:1612.00126, arXiv:1612.00118
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct an infinite family of two-Lee-weight and three-Lee-weight codes over the chain ring $\mathbb{F}_p+u\mathbb{F}_p.$ They have the algebraic structure of abelian codes. Their Lee weight distribution is computed by using Gauss sums. Then by using a linear Gray map, we obtain an infinite family of abelian codes with few weights over $\mathbb{F}_p$. In particular, we obtain an infinite family of two-weight codes which meets the Griesmer bound with equality. Finally, an application to secret sharing schemes is given.
[ { "version": "v1", "created": "Thu, 1 Dec 2016 03:31:01 GMT" } ]
2017-01-05T00:00:00
[ [ "Shi", "Minjia", "" ], [ "Liu", "Yan", "" ], [ "Solé", "Patrick", "" ] ]
new_dataset
0.999701
1701.00935
Francesco Romano
Francesco Romano and Silvio Traversaro and Daniele Pucci and Jorhabib Eljaik and Andrea Del Prete and Francesco Nori
A Whole-Body Software Abstraction layer for Control Design of free-floating Mechanical Systems
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a software abstraction layer to simplify the design and synthesis of whole-body controllers without making any preliminary assumptions on the control law to be implemented. The main advantage of the proposed library is the decoupling of the control software from implementation details, which are related to the robotic platform. Furthermore, the resulting code is more clean and concise than ad-hoc code, as it focuses only on the implementation of the control law. In addition, we present a reference implementation of the abstraction layer together with a Simulink interface to provide support to Model-Driven based development. We also show the implementation of a simple proportional-derivative plus gravity compensation control together with a more complex momentum-based bipedal balance controller.
[ { "version": "v1", "created": "Wed, 4 Jan 2017 09:04:01 GMT" } ]
2017-01-05T00:00:00
[ [ "Romano", "Francesco", "" ], [ "Traversaro", "Silvio", "" ], [ "Pucci", "Daniele", "" ], [ "Eljaik", "Jorhabib", "" ], [ "Del Prete", "Andrea", "" ], [ "Nori", "Francesco", "" ] ]
new_dataset
0.972405
1701.00963
Songwei Fu
Songwei Fu, Chia-Yen Shih, Yuming Jiang, Matteo Ceriotti, Xintao Huan and Pedro Jos\'e Marr\'on
RADIUS: A System for Detecting Anomalous Link Quality Degradation in Wireless Sensor Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To ensure proper functioning of a Wireless Sensor Network (WSN), it is crucial that the network is able to detect anomalies in communication quality (e.g., RSSI), which may cause performance degradation, so that the network can react accordingly. In this paper, we introduce RADIUS, a lightweight system for the purpose. The design of RADIUS is aimed at minimizing the detection error (caused by normal randomness of RSSI) in discriminating good links from weak links and at reaching high detection accuracy under diverse link conditions and dynamic environment changes. Central to the design is a threshold-based decision approach that has its foundation on the Bayes decision theory. In RADIUS, various techniques are developed to address challenges inherent in applying this approach. In addition, through extensive experiments, proper configuration of the parameters involved in these techniques is identified for an indoor environment. In a prototype implementation of the RADIUS system deployed in an indoor testbed, the results show that RADIUS is accurate in detecting anomalous link quality degradation for all links across the network, maintaining a stable error rate of 6.13% on average.
[ { "version": "v1", "created": "Wed, 4 Jan 2017 10:56:31 GMT" } ]
2017-01-05T00:00:00
[ [ "Fu", "Songwei", "" ], [ "Shih", "Chia-Yen", "" ], [ "Jiang", "Yuming", "" ], [ "Ceriotti", "Matteo", "" ], [ "Huan", "Xintao", "" ], [ "Marrón", "Pedro José", "" ] ]
new_dataset
0.99325
1701.01061
Samuel Weiser
Samuel Weiser and Mario Werner
SGXIO: Generic Trusted I/O Path for Intel SGX
To appear in CODASPY'16
null
10.1145/3029806.3029822
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Application security traditionally strongly relies upon security of the underlying operating system. However, operating systems often fall victim to software attacks, compromising security of applications as well. To overcome this dependency, Intel introduced SGX, which allows to protect application code against a subverted or malicious OS by running it in a hardware-protected enclave. However, SGX lacks support for generic trusted I/O paths to protect user input and output between enclaves and I/O devices. This work presents SGXIO, a generic trusted path architecture for SGX, allowing user applications to run securely on top of an untrusted OS, while at the same time supporting trusted paths to generic I/O devices. To achieve this, SGXIO combines the benefits of SGX's easy programming model with traditional hypervisor-based trusted path architectures. Moreover, SGXIO can tweak insecure debug enclaves to behave like secure production enclaves. SGXIO surpasses traditional use cases in cloud computing and makes SGX technology usable for protecting user-centric, local applications against kernel-level keyloggers and likewise. It is compatible to unmodified operating systems and works on a modern commodity notebook out of the box. Hence, SGXIO is particularly promising for the broad x86 community to which SGX is readily available.
[ { "version": "v1", "created": "Wed, 4 Jan 2017 16:17:23 GMT" } ]
2017-01-05T00:00:00
[ [ "Weiser", "Samuel", "" ], [ "Werner", "Mario", "" ] ]
new_dataset
0.998689
1405.3057
Pinar Sen
Pinar Sen and Ali Ozgur Yilmaz
A Low-Complexity Graph-Based LMMSE Receiver for MIMO ISI Channels with M-QAM Modulation
28 pages, 6 figures, 2 tables, submitted to IEEE Transactions on Wireless Communications
IEEE Transactions on Wireless Communications , vol.PP, no.99, pp.1-1, Dec. 2016
10.1109/TWC.2016.2640962
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a low complexity graph-based linear minimum mean square error (LMMSE) equalizer in order to remove inter-symbol and inter-stream interference in multiple input multiple output (MIMO) communication. The proposed state space representation inflicted on the graph provides linearly increasing computational complexity with block length. Also, owing to the Gaussian assumption used in the presented cycle-free factor graph, the complexity of the suggested equalizer structure is not affected by the size of the signalling space. In addition, we introduce an efficient way of computing extrinsic bit log-likelihood ratio (LLR) values for LMMSE estimation compatible with higher order alphabets which is shown to perform better than the other methods in the literature. Overall, we provide an efficient receiver structure reaching high data rates in frequency selective MIMO systems whose performance is shown to be very close to a genie-aided matched filter bound through extensive simulations.
[ { "version": "v1", "created": "Tue, 13 May 2014 07:55:25 GMT" }, { "version": "v2", "created": "Fri, 1 May 2015 06:59:39 GMT" }, { "version": "v3", "created": "Mon, 2 Jan 2017 19:10:50 GMT" } ]
2017-01-04T00:00:00
[ [ "Sen", "Pinar", "" ], [ "Yilmaz", "Ali Ozgur", "" ] ]
new_dataset
0.977316
1601.03907
Thang Duong
Roger A. Sauer, Thang X. Duong, Kranthi K. Mandadapu, David J. Steigmann
A stabilized finite element formulation for liquid shells and its application to lipid bilayers
Corrected typo in axes of Fig.3, results unchanged
null
10.1016/j.jcp.2016.11.004
null
cs.CE cond-mat.soft
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new finite element (FE) formulation for liquid shells that is based on an explicit, 3D surface discretization using $C^1$-continuous finite elements constructed from NURBS interpolation. Both displacement-based and mixed FE formulations are proposed. The latter is needed for area-incompressible material behavior, where penalty-type regularizations can lead to misleading results. In order to obtain quasi-static solutions, several numerical stabilization schemes are proposed based on either stiffness, viscosity or projection. Several numerical examples are considered in order to illustrate the accuracy and the capabilities of the proposed formulation, and to compare the different stabilization schemes. The presented formulation is capable of simulating non-trivial surface shapes associated with tube formation and protein-induced budding of lipid bilayers. In the latter case, the presented formulation yields non-axisymmetric solutions, which have not been observed in previous simulations. It is shown that those non-axisymmetric shapes are preferred over axisymmetric ones.
[ { "version": "v1", "created": "Fri, 15 Jan 2016 13:24:53 GMT" }, { "version": "v2", "created": "Mon, 18 Jan 2016 02:51:49 GMT" } ]
2017-01-04T00:00:00
[ [ "Sauer", "Roger A.", "" ], [ "Duong", "Thang X.", "" ], [ "Mandadapu", "Kranthi K.", "" ], [ "Steigmann", "David J.", "" ] ]
new_dataset
0.993635
1609.03412
Young Sun
Jianxin Shen, Dashan Shang, Yisheng Chai, Yue Wang, Junzhuang Cong, Shipeng Shen, Liqin Yan, Wenhong Wang, and Young Sun
Nonvolatile Multi-level Memory and Boolean Logic Gates Based on a Single Memtranstor
8 pages, 5 figures
Phys. Rev. Applied 6, 064028 (2016)
10.1103/PhysRevApplied.6.064028
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Memtranstor that correlates charge and magnetic flux via nonlinear magnetoelectric effects has a great potential in developing next-generation nonvolatile devices. In addition to multi-level nonvolatile memory, we demonstrate here that nonvolatile logic gates such as NOR and NAND can be implemented in a single memtranstor made of the Ni/PMN-PT/Ni heterostructure. After applying two sequent voltage pulses (X1, X2) as the logic inputs on the memtranstor, the output magnetoelectric voltage can be positive high (logic "1"), positive low (logic "0"), or negative (logic "0"), depending on the levels of X1 and X2. The underlying physical mechanism is related to the complete or partial reversal of ferroelectric polarization controlled by inputting selective voltage pulses, which determines the magnitude and sign of the magnetoelectric voltage coefficient. The combined functions of both memory and logic could enable the memtranstor as a promising candidate for future computing systems beyond von Neumann architecture.
[ { "version": "v1", "created": "Wed, 7 Sep 2016 14:29:02 GMT" } ]
2017-01-04T00:00:00
[ [ "Shen", "Jianxin", "" ], [ "Shang", "Dashan", "" ], [ "Chai", "Yisheng", "" ], [ "Wang", "Yue", "" ], [ "Cong", "Junzhuang", "" ], [ "Shen", "Shipeng", "" ], [ "Yan", "Liqin", "" ], [ "Wang", "Wenhong", "" ], [ "Sun", "Young", "" ] ]
new_dataset
0.998882