id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1701.00632
|
EPTCS
|
Mar\'ia-del-Mar Gallardo (Universidad de M\'alaga), Leticia Lavado
(Universidad de M\'alaga), Laura Panizo (Universidad de M\'alaga)
|
A Simulation Tool for tccp Programs
|
In Proceedings WLP'15/'16/WFLP'16, arXiv:1701.00148
|
EPTCS 234, 2017, pp. 120-134
|
10.4204/EPTCS.234.9
| null |
cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Timed Concurrent Constraint Language tccp is a declarative synchronous
concurrent language, particularly suitable for modelling reactive systems. In
tccp, agents communicate and synchronise through a global constraint store. It
supports a notion of discrete time that allows all non-blocked agents to
proceed with their execution simultaneously.
In this paper, we present a modular architecture for the simulation of tccp
programs. The tool comprises three main components. First, a set of basic
abstract instructions able to model the tccp agent behaviour, the memory model
needed to manage the active agents and the state of the store during the
execution. Second, the agent interpreter that executes the instructions of the
current agent iteratively and calculates the new agents to be executed at the
next time instant. Finally, the constraint solver components which are the
modules that deal with constraints.
In this paper, we describe the implementation of these components and present
an example of a real system modelled in tccp.
|
[
{
"version": "v1",
"created": "Tue, 3 Jan 2017 10:32:47 GMT"
}
] | 2017-01-04T00:00:00 |
[
[
"Gallardo",
"María-del-Mar",
"",
"Universidad de Málaga"
],
[
"Lavado",
"Leticia",
"",
"Universidad de Málaga"
],
[
"Panizo",
"Laura",
"",
"Universidad de Málaga"
]
] |
new_dataset
| 0.996386 |
1701.00691
|
Christopher Anderson
|
Christopher R. Anderson, Richard K. Martin, T. Owens Walker, Ryan W.
Thomas
|
Radio Tomography for Roadside Surveillance
|
http://ieeexplore.ieee.org/document/6644288/
|
C. R. Anderson, R. K. Martin, T. O. Walker and R. W. Thomas,
"Radio Tomography for Roadside Surveillance," in IEEE Journal of Selected
Topics in Signal Processing, vol. 8, no. 1, pp. 66-79, Feb. 2014
|
10.1109/JSTSP.2013.2286774
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Radio tomographic imaging (RTI) has recently been proposed for tracking
object location via radio waves without requiring the objects to transmit or
receive radio signals. The position is extracted by inferring which voxels are
obstructing a subset of radio links in a dense wireless sensor network. This
paper proposes a variety of modeling and algorithmic improvements to RTI for
the scenario of roadside surveillance. These include the use of a more
physically motivated weight matrix, a method for mitigating negative
(aphysical) data due to noisy observations, and a method for combining frames
of a moving vehicle into a single image. The proposed approaches are used to
show improvement in both imaging (useful for human-in-the-loop target
recognition) and automatic target recognition in a measured data set.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2016 16:38:49 GMT"
}
] | 2017-01-04T00:00:00 |
[
[
"Anderson",
"Christopher R.",
""
],
[
"Martin",
"Richard K.",
""
],
[
"Walker",
"T. Owens",
""
],
[
"Thomas",
"Ryan W.",
""
]
] |
new_dataset
| 0.9966 |
1701.00722
|
Laslo Hunhold
|
Laslo Hunhold
|
The Unum Number Format: Mathematical Foundations, Implementation and
Comparison to IEEE 754 Floating-Point Numbers
|
95 pages, 7 figures, 14 code listings
| null | null | null |
cs.NA cs.MS
|
http://creativecommons.org/licenses/by/4.0/
|
This thesis examines a modern concept for machine numbers based on interval
arithmetic called 'Unums' and compares it to IEEE 754 floating-point
arithmetic, evaluating possible uses of this format where floating-point
numbers are inadequate. In the course of this examination, this thesis builds
theoretical foundations for IEEE 754 floating-point numbers, interval
arithmetic based on the projectively extended real numbers and Unums.
|
[
{
"version": "v1",
"created": "Mon, 2 Jan 2017 23:21:43 GMT"
}
] | 2017-01-04T00:00:00 |
[
[
"Hunhold",
"Laslo",
""
]
] |
new_dataset
| 0.991557 |
1701.00749
|
Christophe Van Gysel
|
Christophe Van Gysel and Evangelos Kanoulas and Maarten de Rijke
|
Pyndri: a Python Interface to the Indri Search Engine
|
ECIR2017. Proceedings of the 39th European Conference on Information
Retrieval. 2017. The final publication will be available at Springer
| null | null | null |
cs.IR cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce pyndri, a Python interface to the Indri search engine. Pyndri
allows to access Indri indexes from Python at two levels: (1) dictionary and
tokenized document collection, (2) evaluating queries on the index. We hope
that with the release of pyndri, we will stimulate reproducible, open and
fast-paced IR research.
|
[
{
"version": "v1",
"created": "Tue, 3 Jan 2017 17:17:34 GMT"
}
] | 2017-01-04T00:00:00 |
[
[
"Van Gysel",
"Christophe",
""
],
[
"Kanoulas",
"Evangelos",
""
],
[
"de Rijke",
"Maarten",
""
]
] |
new_dataset
| 0.999102 |
1403.5665
|
Sandor P. Fekete
|
S\'andor P. Fekete and Hella-Franziska Hoffmann
|
Online Square-into-Square Packing
|
33 pages, 13 figures; full version of a preliminary extended abstract
that appeared in APPROX 2013
| null | null | null |
cs.DM cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In 1967, Moon and Moser proved a tight bound on the critical density of
squares in squares: any set of squares with a total area of at most 1/2 can be
packed into a unit square, which is tight. The proof requires full knowledge of
the set, as the algorithmic solution consists in sorting the objects by
decreasing size, and packing them greedily into shelves. Since then, the online
version of the problem has remained open; the best upper bound is still 1/2,
while the currently best lower bound is 1/3, due to Han et al. (2008). In this
paper, we present a new lower bound of 11/32, based on a dynamic shelf
allocation scheme, which may be interesting in itself. We also give results for
the closely related problem in which the size of the square container is not
fixed, but must be dynamically increased in order to ac- commodate online
sequences of objects. For this variant, we establish an upper bound of 3/7 for
the critical density, and a lower bound of 1/8. When aiming for accommodating
an online sequence of squares, this corresponds to a 2.82...- competitive
method for minimizing the required container size, and a lower bound of 1.33 .
. . for the achievable factor.
|
[
{
"version": "v1",
"created": "Sat, 22 Mar 2014 14:18:18 GMT"
},
{
"version": "v2",
"created": "Sat, 31 Dec 2016 19:38:28 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Fekete",
"Sándor P.",
""
],
[
"Hoffmann",
"Hella-Franziska",
""
]
] |
new_dataset
| 0.980714 |
1608.02170
|
Cunsheng Ding
|
Chengju Li, Cunsheng Ding, and Shuxing Li
|
LCD Cyclic Codes over Finite Fields
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In addition to their applications in data storage, communications systems,
and consumer electronics, LCD codes -- a class of linear codes -- have been
employed in cryptography recently. LCD cyclic codes were referred to as
reversible cyclic codes in the literature. The objective of this paper is to
construct several families of reversible cyclic codes over finite fields and
analyse their parameters. The LCD cyclic codes presented in this paper have
very good parameters in general, and contain many optimal codes. A well rounded
treatment of reversible cyclic codes is also given in this paper.
|
[
{
"version": "v1",
"created": "Sun, 7 Aug 2016 01:53:02 GMT"
},
{
"version": "v2",
"created": "Sat, 31 Dec 2016 23:07:56 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Li",
"Chengju",
""
],
[
"Ding",
"Cunsheng",
""
],
[
"Li",
"Shuxing",
""
]
] |
new_dataset
| 0.998692 |
1609.01915
|
Surya Prasath
|
V. B. Surya Prasath
|
Polyp Detection and Segmentation from Video Capsule Endoscopy: A Review
|
Project webpage: http://goo.gl/eAUWKJ - Complete Bibliography -
Compiled and Continuously Updated
|
Journal of Imaging, 3(1), 1, 2017
|
10.3390/jimaging3010001
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Video capsule endoscopy (VCE) is used widely nowadays for visualizing the
gastrointestinal (GI) tract. Capsule endoscopy exams are prescribed usually as
an additional monitoring mechanism and can help in identifying polyps,
bleeding, etc. To analyze the large scale video data produced by VCE exams
automatic image processing, computer vision, and learning algorithms are
required. Recently, automatic polyp detection algorithms have been proposed
with various degrees of success. Though polyp detection in colonoscopy and
other traditional endoscopy procedure based images is becoming a mature field,
due to its unique imaging characteristics detecting polyps automatically in VCE
is a hard problem. We review different polyp detection approaches for VCE
imagery and provide systematic analysis with challenges faced by standard image
processing and computer vision methods.
|
[
{
"version": "v1",
"created": "Wed, 7 Sep 2016 10:09:06 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Prasath",
"V. B. Surya",
""
]
] |
new_dataset
| 0.995207 |
1612.09277
|
Fabrizio Frati
|
Giordano Da Lozzo and Anthony D'Angelo and Fabrizio Frati
|
On Planar Greedy Drawings of 3-Connected Planar Graphs
|
36 pages, 24 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A graph drawing is $\textit{greedy}$ if, for every ordered pair of vertices
$(x,y)$, there is a path from $x$ to $y$ such that the Euclidean distance to
$y$ decreases monotonically at every vertex of the path. Greedy drawings
support a simple geometric routing scheme, in which any node that has to send a
packet to a destination "greedily" forwards the packet to any neighbor that is
closer to the destination than itself, according to the Euclidean distance in
the drawing. In a greedy drawing such a neighbor always exists and hence this
routing scheme is guaranteed to succeed.
In 2004 Papadimitriou and Ratajczak stated two conjectures related to greedy
drawings. The $\textit{greedy embedding conjecture}$ states that every
$3$-connected planar graph admits a greedy drawing. The $\textit{convex greedy
embedding conjecture}$ asserts that every $3$-connected planar graph admits a
planar greedy drawing in which the faces are delimited by convex polygons. In
2008 the greedy embedding conjecture was settled in the positive by Leighton
and Moitra.
In this paper we prove that every $3$-connected planar graph admits a
$\textit{planar}$ greedy drawing. Apart from being a strengthening of Leighton
and Moitra's result, this theorem constitutes a natural intermediate step
towards a proof of the convex greedy embedding conjecture.
|
[
{
"version": "v1",
"created": "Thu, 29 Dec 2016 20:22:16 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Jan 2017 14:15:21 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Da Lozzo",
"Giordano",
""
],
[
"D'Angelo",
"Anthony",
""
],
[
"Frati",
"Fabrizio",
""
]
] |
new_dataset
| 0.983237 |
1701.00040
|
Emmanuel Osegi
|
E.N. Osegi
|
p-DLA: A Predictive System Model for Onshore Oil and Gas Pipeline
Dataset Classification and Monitoring - Part 1
|
Working Paper
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
With the rise in militant activity and rogue behaviour in oil and gas regions
around the world, oil pipeline disturbances is on the increase leading to huge
losses to multinational operators and the countries where such facilities
exist. However, this situation can be averted if adequate predictive monitoring
schemes are put in place. We propose in the first part of this paper, an
artificial intelligence predictive monitoring system capable of predictive
classification and pattern recognition of pipeline datasets. The predictive
system is based on a highly sparse predictive Deviant Learning Algorithm
(p-DLA) designed to synthesize a sequence of memory predictive clusters for
eventual monitoring, control and decision making. The DLA (p-DLA) is compared
with a popular machine learning algorithm, the Long Short-Term Memory (LSTM)
which is based on a temporal version of the standard feed-forward
back-propagation trained artificial neural networks (ANNs). The results of
simulations study show impressive results and validates the sparse memory
predictive approach which favours the sub-synthesis of a highly compressed and
low dimensional knowledge discovery and information prediction scheme. It also
shows that the proposed new approach is competitive with a well-known and
proven AI approach such as the LSTM.
|
[
{
"version": "v1",
"created": "Sat, 31 Dec 2016 00:40:17 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Osegi",
"E. N.",
""
]
] |
new_dataset
| 0.999091 |
1701.00108
|
Ashish Sureka
|
Ashish Sureka
|
Parichayana: An Eclipse Plugin for Detecting Exception Handling
Anti-Patterns and Code Smells in Java Programs
|
Tools Demo Paper (paper provides links to the video demo and source
code)
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Anti-patterns and code-smells are signs in the source code which are not
defects (does not prevent the program from functioning and does not cause
compile errors) and are rather indicators of deeper and bigger problems.
Exception handling is a programming construct de- signed to handle the
occurrence of anomalous or exceptional conditions (that changes the normal flow
of program execution). In this paper, we present an Eclipse plug-in (called as
Parichayana) for detecting exception handling anti-patterns and code smells in
Java programs. Parichayana is capable of automatically detecting several
commonly occurring excep- tion handling programming mistakes. We extend the
Eclipse IDE and create new menu entries and associated action via the
Parichayana plug- in (free and open-source hosted on GitHub). We compare and
contrast Parichayana with several code smell detection tools and demonstrate
that our tool provides unique capabilities in context to existing tools. We
have created an update site and developers can use the Eclipse up- date manager
to install Parichayana from our site. We used Parichyana on several large
open-source Java based projects and detected presence of exception handling
anti-patterns
|
[
{
"version": "v1",
"created": "Sat, 31 Dec 2016 14:04:29 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Sureka",
"Ashish",
""
]
] |
new_dataset
| 0.999802 |
1701.00142
|
Helge Rhodin
|
Helge Rhodin, Christian Richardt, Dan Casas, Eldar Insafutdinov,
Mohammad Shafiei, Hans-Peter Seidel, Bernt Schiele, Christian Theobalt
|
EgoCap: Egocentric Marker-less Motion Capture with Two Fisheye Cameras
(Extended Abstract)
|
Short version of a SIGGRAPH Asia 2016 paper arXiv:1609.07306,
presented at EPIC@ECCV16
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Marker-based and marker-less optical skeletal motion-capture methods use an
outside-in arrangement of cameras placed around a scene, with viewpoints
converging on the center. They often create discomfort by possibly needed
marker suits, and their recording volume is severely restricted and often
constrained to indoor scenes with controlled backgrounds. We therefore propose
a new method for real-time, marker-less and egocentric motion capture which
estimates the full-body skeleton pose from a lightweight stereo pair of fisheye
cameras that are attached to a helmet or virtual-reality headset. It combines
the strength of a new generative pose estimation framework for fisheye views
with a ConvNet-based body-part detector trained on a new automatically
annotated and augmented dataset. Our inside-in method captures full-body motion
in general indoor and outdoor scenes, and also crowded scenes.
|
[
{
"version": "v1",
"created": "Sat, 31 Dec 2016 16:49:39 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Rhodin",
"Helge",
""
],
[
"Richardt",
"Christian",
""
],
[
"Casas",
"Dan",
""
],
[
"Insafutdinov",
"Eldar",
""
],
[
"Shafiei",
"Mohammad",
""
],
[
"Seidel",
"Hans-Peter",
""
],
[
"Schiele",
"Bernt",
""
],
[
"Theobalt",
"Christian",
""
]
] |
new_dataset
| 0.995281 |
1701.00210
|
Hassan Khodaiemehr
|
Hassan Khodaiemehr and Dariush Kiani
|
Construction and Encoding of QC-LDPC Codes Using Group Rings
|
56 pages, 9 figures. arXiv admin note: text overlap with
arXiv:cs/0611112 by other authors
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quasi-cyclic (QC) low-density parity-check (LDPC) codes which are known as
QC-LDPC codes, have many applications due to their simple encoding
implementation by means of cyclic shift registers. In this paper, we construct
QC-LDPC codes from group rings. A group ring is a free module (at the same time
a ring) constructed in a natural way from any given ring and any given group.
We present a structure based on the elements of a group ring for constructing
QC-LDPC codes. Some of the previously addressed methods for constructing
QC-LDPC codes based on finite fields are special cases of the proposed
construction method. The constructed QC-LDPC codes perform very well over the
additive white Gaussian noise (AWGN) channel with iterative decoding in terms
of bit-error probability and block-error probability. Simulation results
demonstrate that the proposed codes have competitive performance in comparison
with the similar existing LDPC codes. Finally, we propose a new encoding method
for the proposed group ring based QC-LDPC codes that can be implemented faster
than the current encoding methods. The encoding complexity of the proposed
method is analyzed mathematically, and indicates a significate reduction in the
required number of operations, even when compared to the available efficient
encoding methods that have linear time and space complexities.
|
[
{
"version": "v1",
"created": "Sun, 1 Jan 2017 06:01:29 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Khodaiemehr",
"Hassan",
""
],
[
"Kiani",
"Dariush",
""
]
] |
new_dataset
| 0.999835 |
1701.00307
|
Fazel Sharifi
|
Fazel Sharifi, Atiyeh Panahi, Mohammad Hossein Moaiyeri and Keivan
Navi
|
High Performance CNFET-based Ternary Full Adders
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper investigates the use of carbon nanotube field effect transistors
(CNFETs) for the design of ternary full adder cells. The proposed circuits have
been designed based on the unique properties of CNFETs such as having desired
threshold voltages by adjusting diameter of the CNFETs gate nanotubes. The
proposed circuits are examined using HSPICE simulator with the standard 32 nm
CNFET technology. The proposed methods are simulated at different conditions
such as different supply voltages, different temperature and operational
frequencies. Simulation results show that the proposed designs are faster than
the state of the art CNFET based ternary full adders.
|
[
{
"version": "v1",
"created": "Mon, 2 Jan 2017 02:37:37 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Sharifi",
"Fazel",
""
],
[
"Panahi",
"Atiyeh",
""
],
[
"Moaiyeri",
"Mohammad Hossein",
""
],
[
"Navi",
"Keivan",
""
]
] |
new_dataset
| 0.99296 |
1701.00399
|
Jerome Darmont
|
J\'er\^ome Darmont (ERIC), Fadila Bentayeb (ERIC), Omar Boussa\"id
(ERIC)
|
Benchmarking data warehouses
|
arXiv admin note: text overlap with arXiv:0705.1453
|
International Journal of Business Intelligence and Data Mining,
Inderscience, 2007, 2 (1), pp.79-104
|
10.1504/IJBIDM.2007.012947
| null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Data warehouse architectural choices and optimization techniques are critical
to decision support query performance. To facilitate these choices, the
performance of the designed data warehouse must be assessed, usually with
benchmarks. These tools can either help system users comparing the performances
of different systems, or help system engineers testing the effect of various
design choices. While the Transaction Processing Performance Council's standard
benchmarks address the first point, they are not tunable enough to address the
second one and fail to model different data warehouse schemas. By contrast, our
Data Warehouse Engineering Benchmark (DWEB) allows generating various ad-hoc
synthetic data warehouses and workloads. DWEB is implemented as a Java free
software that can be interfaced with most existing relational database
management systems. The full specifications of DWEB, as well as experiments we
performed to illustrate how our benchmark may be used, are provided in this
paper.
|
[
{
"version": "v1",
"created": "Mon, 2 Jan 2017 14:19:24 GMT"
}
] | 2017-01-03T00:00:00 |
[
[
"Darmont",
"Jérôme",
"",
"ERIC"
],
[
"Bentayeb",
"Fadila",
"",
"ERIC"
],
[
"Boussaïd",
"Omar",
"",
"ERIC"
]
] |
new_dataset
| 0.95091 |
1607.03914
|
Mostafa Salehi
|
Zahra Fatemi, Mostafa Salehi, Matteo Magnani
|
A simple multiforce layout for multiplex networks
|
9 pages
| null | null | null |
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce multiforce, a force-directed layout for multiplex networks,
where the nodes of the network are organized into multiple layers and both
in-layer and inter-layer relationships among nodes are used to compute node
coordinates. The proposed approach generalizes existing work, providing a range
of intermediate layouts in-between the ones produced by known methods. Our
experiments on real data show that multiforce can keep nodes well aligned
across different layers without significantly affecting their internal layouts
when the layers have similar or compatible topologies. As a consequence,
multiforce enriches the benefits of force-directed layouts by also supporting
the identification of topological correspondences between layers.
|
[
{
"version": "v1",
"created": "Wed, 13 Jul 2016 20:14:24 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Dec 2016 12:45:37 GMT"
}
] | 2017-01-02T00:00:00 |
[
[
"Fatemi",
"Zahra",
""
],
[
"Salehi",
"Mostafa",
""
],
[
"Magnani",
"Matteo",
""
]
] |
new_dataset
| 0.993805 |
1611.09017
|
Gabriele Fici
|
P\'eter Burcsi, Gabriele Fici, Zsuzsanna Lipt\'ak, Frank Ruskey, Joe
Sawada
|
On Prefix Normal Words and Prefix Normal Forms
|
To appear in Theoretical Computer Science
|
Theoretical Computer Science, 659: 1-13, 2017
|
10.1016/j.tcs.2016.10.015
| null |
cs.DM cs.FL math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A $1$-prefix normal word is a binary word with the property that no factor
has more $1$s than the prefix of the same length; a $0$-prefix normal word is
defined analogously. These words arise in the context of indexed binary jumbled
pattern matching, where the aim is to decide whether a word has a factor with a
given number of $1$s and $0$s (a given Parikh vector). Each binary word has an
associated set of Parikh vectors of the factors of the word. Using prefix
normal words, we provide a characterization of the equivalence class of binary
words having the same set of Parikh vectors of their factors.
We prove that the language of prefix normal words is not context-free and is
strictly contained in the language of pre-necklaces, which are prefixes of
powers of Lyndon words. We give enumeration results on $\textit{pnw}(n)$, the
number of prefix normal words of length $n$, showing that, for sufficiently
large $n$, \[ 2^{n-4 \sqrt{n \lg n}} \le \textit{pnw}(n) \le 2^{n - \lg n + 1}.
\]
For fixed density (number of $1$s), we show that the ordinary generating
function of the number of prefix normal words of length $n$ and density $d$ is
a rational function. Finally, we give experimental results on
$\textit{pnw}(n)$, discuss further properties, and state open problems.
|
[
{
"version": "v1",
"created": "Mon, 28 Nov 2016 08:18:50 GMT"
}
] | 2017-01-02T00:00:00 |
[
[
"Burcsi",
"Péter",
""
],
[
"Fici",
"Gabriele",
""
],
[
"Lipták",
"Zsuzsanna",
""
],
[
"Ruskey",
"Frank",
""
],
[
"Sawada",
"Joe",
""
]
] |
new_dataset
| 0.999483 |
1612.01313
|
Hossein Esmaeili
|
Hossein Esmaeili, Jawad Salehi
|
On the Capacity of Discrete-Time Laguerre Channel
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, new upper and lower bounds are proposed for the capacity of
discrete-time Laguerre channel. Laguerre behavior is used to model various
types of optical systems and networks such as optical amplifiers, short
distance visible light communication systems with direct detection and coherent
code division multiple access (CDMA) networks. Bounds are derived for short
distance visible light communication systems and coherent CDMA networks. These
bounds are separated in three main cases: when both average and peak power
constraints are imposed, when peak power constraint is inactive and when only
peak power constraint is active.
|
[
{
"version": "v1",
"created": "Mon, 5 Dec 2016 11:37:25 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Dec 2016 11:26:09 GMT"
}
] | 2017-01-02T00:00:00 |
[
[
"Esmaeili",
"Hossein",
""
],
[
"Salehi",
"Jawad",
""
]
] |
new_dataset
| 0.999175 |
1612.03449
|
Yunpeng Zang
|
Yunpeng Zang and Bernhard Walke and Guido Hiertz and Christian
Wietfeld
|
IEEE 802.11p-based Packet Broadcast in Radio Channels with Hidden
Stations and Congestion Control
|
30 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Decentralized Congestion Control (DCC) algorithms specified in ETSI ITS
standards [1] address the IEEE 802.11p MAC and provide reliability of periodic
broadcast messages at high density of vehicles. However, the deterministic
relation between controllable parameters, e.g. transmit power, frame duration,
frame transmit rate and channel clear assessment threshold, and the effects of
DCC algorithms, e.g. channel busy duration, frame interference-free reception
probability and frame channel access delay, is still unknown since a correct
mathematical analysis of the hidden station problem in CSMA networks is
lacking. In this work, the hidden station problem in a linear IEEE 802.11p
broadcast network is analyzed based on analytical results developed in [18]
employing a modified MAC protocol model based on [3]. Simulation results
validate the new analytical model for linear IEEE 802.11p networks w.r.t
reliability and latency performances of Cooperative Awareness Message
broadcast. Evidence is given that the model not only is valid for single-lane
highways but also provides good approximate results for multi-lane highway
scenarios. Our MAC layer analytical model of IEEE 802.11p broadcast reveals the
quantitative relation between DCC parameters and congestion control effects in
closed-form solution for linear vehicular networks.
|
[
{
"version": "v1",
"created": "Sun, 11 Dec 2016 18:30:43 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Dec 2016 19:43:27 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Dec 2016 18:22:27 GMT"
}
] | 2017-01-02T00:00:00 |
[
[
"Zang",
"Yunpeng",
""
],
[
"Walke",
"Bernhard",
""
],
[
"Hiertz",
"Guido",
""
],
[
"Wietfeld",
"Christian",
""
]
] |
new_dataset
| 0.999222 |
1612.09534
|
Yu Liu Yu Liu
|
Yu Liu, Ammar Ghazal, Cheng-Xiang Wang, Xiaohu Ge, Yang Yang, Yapei
Zhang
|
Channel Measurements and Models for High-Speed Train Wireless
Communication Systems in Tunnel Scenarios: A Survey
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The rapid developments of high-speed trains (HSTs) introduce new challenges
to HST wireless communication systems. Realistic HST channel models play a
critical role in designing and evaluating HST communication systems. Due to the
length limitation, bounding of tunnel itself, and waveguide effect, channel
characteristics in tunnel scenarios are very different from those in other HST
scenarios. Therefore, accurate tunnel channel models considering both
large-scale and small-scale fading characteristics are essential for HST
communication systems. Moreover, certain characteristics of tunnel channels
have not been investigated sufficiently. This article provides a comprehensive
review of the measurement campaigns in tunnels and presents some tunnel channel
models using various modeling methods. Finally, future directions in HST tunnel
channel measurements and modeling are discussed.
|
[
{
"version": "v1",
"created": "Fri, 30 Dec 2016 17:03:51 GMT"
}
] | 2017-01-02T00:00:00 |
[
[
"Liu",
"Yu",
""
],
[
"Ghazal",
"Ammar",
""
],
[
"Wang",
"Cheng-Xiang",
""
],
[
"Ge",
"Xiaohu",
""
],
[
"Yang",
"Yang",
""
],
[
"Zhang",
"Yapei",
""
]
] |
new_dataset
| 0.998557 |
1612.06025
|
Bharathan Balaji
|
Bharathan Balaji, Nadir Weibel, Yuvraj Agarwal
|
Managing Commercial HVAC Systems: What do Building Operators Really
Need?
|
5 pages, Paper rejected from CHI 2015
| null | null | null |
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Buildings form an essential part of modern life; people spend a significant
amount of their time in them, and they consume large amounts of energy. A
variety of systems provide services such as lighting, air conditioning and
security which are managed using Building Management Systems (BMS) by building
operators. To better understand the capability of current BMS and characterize
common practices of building operators, we investigated their use across five
institutions in the US. We interviewed ten operators and discovered that BMS do
not address a number of key concerns for the management of buildings. Our
analysis is rooted in the everyday work of building operators and highlights a
number of design suggestions to help improve the user experience and management
of BMS, ultimately leading to improvements in productivity, as well as
buildings comfort and energy efficiency.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2016 02:12:21 GMT"
}
] | 2016-12-31T00:00:00 |
[
[
"Balaji",
"Bharathan",
""
],
[
"Weibel",
"Nadir",
""
],
[
"Agarwal",
"Yuvraj",
""
]
] |
new_dataset
| 0.964721 |
1505.03346
|
Paschalis Sofotasios
|
Paschalis C. Sofotasios, Mikko Valkama, Theodoros A. Tsiftsis, Yury A.
Brychkov, Steven Freear and George K. Karagiannidis
|
Analytic solutions to a Marcum Q-function-based integral and application
in energy detection of unknown signals over multipath fading channels
|
Latest/Preprint Version
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work presents analytic solutions for a useful integral in wireless
communications, which involves the Marcum $Q{-}$function in combination with an
exponential function and arbitrary power terms. The derived expressions have a
rather simple algebraic representation which renders them convenient both
analytically and computationally. Furthermore, they can be useful in wireless
communications and particularly in the context of cognitive radio
communications and radar systems, where this integral is often encountered. To
this end, we derive novel expressions for the probability of detection in
energy detection based spectrum sensing over $\eta{-}\mu$ fading channels.
These expressions are given in closed-form and are subsequently employed in
analyzing the effects of generalised multipath fading conditions in cognitive
radio systems. As expected, it is shown that the detector is highly dependent
upon the severity of fading conditions as even slight variation of the fading
parameters affect the corresponding performance significantly.
|
[
{
"version": "v1",
"created": "Wed, 13 May 2015 12:03:20 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Dec 2016 00:09:43 GMT"
}
] | 2016-12-30T00:00:00 |
[
[
"Sofotasios",
"Paschalis C.",
""
],
[
"Valkama",
"Mikko",
""
],
[
"Tsiftsis",
"Theodoros A.",
""
],
[
"Brychkov",
"Yury A.",
""
],
[
"Freear",
"Steven",
""
],
[
"Karagiannidis",
"George K.",
""
]
] |
new_dataset
| 0.992344 |
1511.02119
|
Andrew Paverd
|
Andrew Paverd, Sandeep Tamrakar, Hoang Long Nguyen, Praveen Kumar
Pendyala, Thien Duc Nguyen, Elizabeth Stobert, Tommi Gr\"ondahl, N. Asokan,
Ahmad-Reza Sadeghi
|
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple
Authorized Devices
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cloud storage services like Dropbox and Google Drive are widely used by
individuals and businesses. Two attractive features of these services are 1)
the automatic synchronization of files between multiple client devices and 2)
the possibility to share files with other users. However, privacy of cloud data
is a growing concern for both individuals and businesses. Encrypting data on
the client-side before uploading it is an effective privacy safeguard, but it
requires all client devices to have the decryption key. Current solutions
derive these keys solely from user-chosen passwords, which have low entropy and
are easily guessed.
We present OmniShare, the first scheme to allow client-side encryption with
high-entropy keys whilst providing an intuitive key distribution mechanism to
enable access from multiple client devices. Instead of passwords, we use low
bandwidth uni-directional out-of-band (OOB) channels, such as QR codes, to
authenticate new devices. To complement these OOB channels, the cloud storage
itself is used as a communication channel between devices in our protocols. We
rely on a directory-based key hierarchy with individual file keys to limit the
consequences of key compromise and allow efficient sharing of files without
requiring re-encryption. OmniShare is open source software and currently
available for Android and Windows with other platforms in development. We
describe the design and implementation of OmniShare, and explain how we
evaluated its security using formal methods, its performance via real-world
benchmarks, and its usability through a cognitive walkthrough.
|
[
{
"version": "v1",
"created": "Fri, 6 Nov 2015 15:37:27 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Sep 2016 15:35:10 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Dec 2016 12:18:01 GMT"
}
] | 2016-12-30T00:00:00 |
[
[
"Paverd",
"Andrew",
""
],
[
"Tamrakar",
"Sandeep",
""
],
[
"Nguyen",
"Hoang Long",
""
],
[
"Pendyala",
"Praveen Kumar",
""
],
[
"Nguyen",
"Thien Duc",
""
],
[
"Stobert",
"Elizabeth",
""
],
[
"Gröndahl",
"Tommi",
""
],
[
"Asokan",
"N.",
""
],
[
"Sadeghi",
"Ahmad-Reza",
""
]
] |
new_dataset
| 0.97577 |
1512.02325
|
Wei Liu
|
Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott
Reed, Cheng-Yang Fu, Alexander C. Berg
|
SSD: Single Shot MultiBox Detector
|
ECCV 2016
| null |
10.1007/978-3-319-46448-0_2
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a method for detecting objects in images using a single deep
neural network. Our approach, named SSD, discretizes the output space of
bounding boxes into a set of default boxes over different aspect ratios and
scales per feature map location. At prediction time, the network generates
scores for the presence of each object category in each default box and
produces adjustments to the box to better match the object shape. Additionally,
the network combines predictions from multiple feature maps with different
resolutions to naturally handle objects of various sizes. Our SSD model is
simple relative to methods that require object proposals because it completely
eliminates proposal generation and subsequent pixel or feature resampling stage
and encapsulates all computation in a single network. This makes SSD easy to
train and straightforward to integrate into systems that require a detection
component. Experimental results on the PASCAL VOC, MS COCO, and ILSVRC datasets
confirm that SSD has comparable accuracy to methods that utilize an additional
object proposal step and is much faster, while providing a unified framework
for both training and inference. Compared to other single stage methods, SSD
has much better accuracy, even with a smaller input image size. For $300\times
300$ input, SSD achieves 72.1% mAP on VOC2007 test at 58 FPS on a Nvidia Titan
X and for $500\times 500$ input, SSD achieves 75.1% mAP, outperforming a
comparable state of the art Faster R-CNN model. Code is available at
https://github.com/weiliu89/caffe/tree/ssd .
|
[
{
"version": "v1",
"created": "Tue, 8 Dec 2015 04:46:38 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Mar 2016 21:17:34 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Nov 2016 18:31:25 GMT"
},
{
"version": "v4",
"created": "Wed, 30 Nov 2016 09:54:02 GMT"
},
{
"version": "v5",
"created": "Thu, 29 Dec 2016 19:05:11 GMT"
}
] | 2016-12-30T00:00:00 |
[
[
"Liu",
"Wei",
""
],
[
"Anguelov",
"Dragomir",
""
],
[
"Erhan",
"Dumitru",
""
],
[
"Szegedy",
"Christian",
""
],
[
"Reed",
"Scott",
""
],
[
"Fu",
"Cheng-Yang",
""
],
[
"Berg",
"Alexander C.",
""
]
] |
new_dataset
| 0.989547 |
1612.00338
|
Zohre Kohan
|
Zohreh Kohan, Hamidreza Farhidzadeh, Reza Azmi, Behrouz Gholizadeh
|
Hippocampus Temporal Lobe Epilepsy Detection using a Combination of
Shape-based Features and Spherical Harmonics Representation
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most of the temporal lobe epilepsy detection approaches are based on
hippocampus deformation and use complicated features, resulting, detection is
done with complicated features extraction and pre-processing task. In this
paper, a new detection method based on shape-based features and spherical
harmonics is proposed which can analysis the hippocampus shape anomaly and
detection asymmetry. This method consisted of two main parts; (1) shape feature
extraction, and (2) image classification. For evaluation, HFH database is used
which is publicly available in this field. Nine different geometry and 256
spherical harmonic features are introduced then selected Eighteen of them that
detect the asymmetry in hippocampus significantly in a randomly selected subset
of the dataset. Then a support vector machine (SVM) classifier was employed to
classify the remaining images of the dataset to normal and epileptic images
using our selected features. On a dataset of 25 images, 12 images were used for
feature extraction and the rest 13 for classification. The results show that
the proposed method has accuracy, specificity and sensitivity of, respectively,
84%, 100%, and 80%. Therefore, the proposed approach shows acceptable result
and is straightforward also; complicated pre-processing steps were omitted
compared to other methods.
|
[
{
"version": "v1",
"created": "Thu, 1 Dec 2016 16:27:59 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Dec 2016 00:18:26 GMT"
}
] | 2016-12-30T00:00:00 |
[
[
"Kohan",
"Zohreh",
""
],
[
"Farhidzadeh",
"Hamidreza",
""
],
[
"Azmi",
"Reza",
""
],
[
"Gholizadeh",
"Behrouz",
""
]
] |
new_dataset
| 0.990748 |
1612.07630
|
Anh Nguyen
|
Anh Nguyen, Long Nguyen, Dong Nguyen, Uyen Le and Tuan Tran
|
"420 Friendly": Revealing Marijuana Use via Craigslist Rental Ads
| null | null | null | null |
cs.CY cs.SI
|
http://creativecommons.org/publicdomain/zero/1.0/
|
Recent studies have shown that information mined from Craigslist can be used
for informing public health policy or monitoring risk behavior. This paper
presents a text-mining method for conducting public health surveillance of
marijuana use concerns in the U.S. using online classified ads in Craigslist.
We collected more than 200 thousands of rental ads in the housing categories in
Craigslist and devised text-mining methods for efficiently and accurately
extract rental ads associated with concerns about the uses of marijuana in
different states across the U.S. We linked the extracted ads to their
geographic locations and computed summary statistics of the ads having
marijuana use concerns. Our data is then compared with the State Marijuana Laws
Map published by the U.S. government and marijuana related keywords search in
Google to verify our collected data with respect to the demographics of
marijuana use concerns. Our data not only indicates strong correlations between
Craigslist ads, Google search and the State Marijuana Laws Map in states where
marijuana uses are legal, but also reveals some hidden world of marijuana use
concerns in other states where marijuana use is illegal. Our approach can be
utilized as a marijuana surveillance tool for policy makers to develop public
health policy and regulations.
|
[
{
"version": "v1",
"created": "Thu, 22 Dec 2016 15:00:16 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Dec 2016 16:13:48 GMT"
}
] | 2016-12-30T00:00:00 |
[
[
"Nguyen",
"Anh",
""
],
[
"Nguyen",
"Long",
""
],
[
"Nguyen",
"Dong",
""
],
[
"Le",
"Uyen",
""
],
[
"Tran",
"Tuan",
""
]
] |
new_dataset
| 0.996932 |
1612.07976
|
Kuniaki Saito Saito Kuniaki
|
Kuniaki Saito, Yusuke Mukuta, Yoshitaka Ushiku, Tatsuya Harada
|
DeMIAN: Deep Modality Invariant Adversarial Network
| null | null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Obtaining common representations from different modalities is important in
that they are interchangeable with each other in a classification problem. For
example, we can train a classifier on image features in the common
representations and apply it to the testing of the text features in the
representations. Existing multi-modal representation learning methods mainly
aim to extract rich information from paired samples and train a classifier by
the corresponding labels; however, collecting paired samples and their labels
simultaneously involves high labor costs. Addressing paired modal samples
without their labels and single modal data with their labels independently is
much easier than addressing labeled multi-modal data. To obtain the common
representations under such a situation, we propose to make the distributions
over different modalities similar in the learned representations, namely
modality-invariant representations. In particular, we propose a novel algorithm
for modality-invariant representation learning, named Deep Modality Invariant
Adversarial Network (DeMIAN), which utilizes the idea of Domain Adaptation
(DA). Using the modality-invariant representations learned by DeMIAN, we
achieved better classification accuracy than with the state-of-the-art methods,
especially for some benchmark datasets of zero-shot learning.
|
[
{
"version": "v1",
"created": "Fri, 23 Dec 2016 14:07:01 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Dec 2016 02:29:15 GMT"
}
] | 2016-12-30T00:00:00 |
[
[
"Saito",
"Kuniaki",
""
],
[
"Mukuta",
"Yusuke",
""
],
[
"Ushiku",
"Yoshitaka",
""
],
[
"Harada",
"Tatsuya",
""
]
] |
new_dataset
| 0.999083 |
1612.08989
|
Yonatan Belinkov
|
Yonatan Belinkov, Alexander Magidow, Maxim Romanov, Avi Shmidman,
Moshe Koppel
|
Shamela: A Large-Scale Historical Arabic Corpus
|
Slightly expanded version of Coling LT4DH workshop paper
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Arabic is a widely-spoken language with a rich and long history spanning more
than fourteen centuries. Yet existing Arabic corpora largely focus on the
modern period or lack sufficient diachronic information. We develop a
large-scale, historical corpus of Arabic of about 1 billion words from diverse
periods of time. We clean this corpus, process it with a morphological
analyzer, and enhance it by detecting parallel passages and automatically
dating undated texts. We demonstrate its utility with selected case-studies in
which we show its application to the digital humanities.
|
[
{
"version": "v1",
"created": "Wed, 28 Dec 2016 21:10:28 GMT"
}
] | 2016-12-30T00:00:00 |
[
[
"Belinkov",
"Yonatan",
""
],
[
"Magidow",
"Alexander",
""
],
[
"Romanov",
"Maxim",
""
],
[
"Shmidman",
"Avi",
""
],
[
"Koppel",
"Moshe",
""
]
] |
new_dataset
| 0.99989 |
1612.09001
|
Kaipeng Li
|
Kaipeng Li, Amanullah Ghazi, Chance Tarver, Jani Boutellier, Mahmoud
Abdelaziz, Lauri Anttila, Markku Juntti, Mikko Valkama, and Joseph R.
Cavallaro
|
Parallel Digital Predistortion Design on Mobile GPU and Embedded
Multicore CPU for Mobile Transmitters
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Digital predistortion (DPD) is a widely adopted baseband processing technique
in current radio transmitters. While DPD can effectively suppress unwanted
spurious spectrum emissions stemming from imperfections of analog RF and
baseband electronics, it also introduces extra processing complexity and poses
challenges on efficient and flexible implementations, especially for mobile
cellular transmitters, considering their limited computing power compared to
basestations. In this paper, we present high data rate implementations of
broadband DPD on modern embedded processors, such as mobile GPU and multicore
CPU, by taking advantage of emerging parallel computing techniques for
exploiting their computing resources. We further verify the suppression effect
of DPD experimentally on real radio hardware platforms. Performance evaluation
results of our DPD design demonstrate the high efficacy of modern general
purpose mobile processors on accelerating DPD processing for a mobile
transmitter.
|
[
{
"version": "v1",
"created": "Wed, 28 Dec 2016 22:51:34 GMT"
}
] | 2016-12-30T00:00:00 |
[
[
"Li",
"Kaipeng",
""
],
[
"Ghazi",
"Amanullah",
""
],
[
"Tarver",
"Chance",
""
],
[
"Boutellier",
"Jani",
""
],
[
"Abdelaziz",
"Mahmoud",
""
],
[
"Anttila",
"Lauri",
""
],
[
"Juntti",
"Markku",
""
],
[
"Valkama",
"Mikko",
""
],
[
"Cavallaro",
"Joseph R.",
""
]
] |
new_dataset
| 0.989202 |
1607.02861
|
Delgado Lopez-Cozar emilio
|
Alberto Martin-Martin, Enrique Orduna-Malea, Juan M. Ayllon, Emilio
Delgado Lopez-Cozar
|
A two-sided academic landscape: portrait of highly-cited documents in
Google Scholar (1950-2013)
|
26 pages, 5 tables, 10 figures
|
Revista espa\~nola de Documentaci\'on Cient\'ifica, v. 39, n. 4,
p. e149, dec. 2016. ISSN 1988-4621
|
10.3989/redc.2016.4.1405
| null |
cs.DL
|
http://creativecommons.org/licenses/by/4.0/
|
The main objective of this paper is to identify the set of highly-cited
documents in Google Scholar and to define their core characteristics (document
types, language, free availability, source providers, and number of versions),
under the hypothesis that the wide coverage of this search engine may provide a
different portrait about this document set respect to that offered by the
traditional bibliographic databases. To do this, a query per year was carried
out from 1950 to 2013 identifying the top 1,000 documents retrieved from Google
Scholar and obtaining a final sample of 64,000 documents, of which 40% provided
a free full-text link. The results obtained show that the average highly-cited
document is a journal article or a book (62% of the top 1% most cited documents
of the sample), written in English (92.5% of all documents) and available
online in PDF format (86.0% of all documents). Yet, the existence of errors
especially when detecting duplicates and linking cites properly must be pointed
out. The fact of managing with highly cited papers, however, minimizes the
effects of these limitations. Given the high presence of books, and to a lesser
extend of other document types (such as proceedings or reports), the research
concludes that Google Scholar data offer an original and different vision of
the most influential academic documents (measured from the perspective of their
citation count), a set composed not only by strictly scientific material
(journal articles) but academic in its broad sense
|
[
{
"version": "v1",
"created": "Mon, 11 Jul 2016 08:47:41 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Martin-Martin",
"Alberto",
""
],
[
"Orduna-Malea",
"Enrique",
""
],
[
"Ayllon",
"Juan M.",
""
],
[
"Lopez-Cozar",
"Emilio Delgado",
""
]
] |
new_dataset
| 0.996024 |
1608.00820
|
Minjia Shi
|
Minjia Shi, Liqing Qian, Lin Sok, Nuh Aydin and Patrick Sol\'e
|
On constacyclic codes over $\mathbb{Z}_4[u]/\langle u^2-1\rangle$ and
their Gray images
|
10 pages
|
Finite Fields and Their Applications 45(2017)86-95
|
10.1016/j.ffa.2016.11.016
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We first define a new Gray map from $R=\mathbb{Z}_4+u\mathbb{Z}_4$ to
$\mathbb{Z}^{2}_{4}$, where $u^2=1$ and study $(1+2u)$-constacyclic codes over
$R$. Also of interest are some properties of $(1+2u)$-constacyclic codes over
$R$. Considering their $\mathbb{Z}_4$ images, we prove that the Gray images of
$(1+2u)$-constacyclic codes of length $n$ over $R$ are cyclic codes of length
$2n$ over $\mathbb{Z}_4$. In many cases the latter codes have better parameters
than those in the online database of Aydin and Asamov. We also give a corrected
version of a table of new cyclic $R$-codes published by \"Ozen et al. in Finite
Fields and Their Applications, {\bf 38}, (2016) 27-39.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2016 13:46:08 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Dec 2016 07:13:00 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Shi",
"Minjia",
""
],
[
"Qian",
"Liqing",
""
],
[
"Sok",
"Lin",
""
],
[
"Aydin",
"Nuh",
""
],
[
"Solé",
"Patrick",
""
]
] |
new_dataset
| 0.999765 |
1610.07740
|
Xiang Zhao
|
Xiang Zhao, Jianwen Zhang, Yingjun Zhang, Xiaojun Yuan
|
MIMO Multiway Distributed-Relay Channel with Full Data Exchange: An
Achievable Rate Perspective
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider efficient communications over the multiple-input multiple-output
(MIMO) multiway distributed relay channel (MDRC) with full data exchange, where
each user, equipped with multiple antennas, broadcasts its message to all the
other users via the help of a number of distributive relays. We propose a
physical-layer network coding (PNC) based scheme involving linear precoding for
channel alignment nested lattice coding for PNC, and lattice-based precoding
for interference mitigation, We show that, with the proposed scheme,
distributed relaying achieves the same sum-rate as cooperative relaying in the
high SNR regime. We also show that the proposed scheme achieve the asymptotic
sum capacity of the MIMO MDRC within a constant gap at high SNR. Numerical
results demonstrate that the proposed scheme considerably outperforms the
existing schemes including decode-and-forward and amplify-and-forward.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2016 06:16:00 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Dec 2016 03:51:05 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Dec 2016 12:16:54 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Zhao",
"Xiang",
""
],
[
"Zhang",
"Jianwen",
""
],
[
"Zhang",
"Yingjun",
""
],
[
"Yuan",
"Xiaojun",
""
]
] |
new_dataset
| 0.998988 |
1612.01188
|
Rebekah Mercer
|
Rebekah Mercer
|
Privacy on the Blockchain: Unique Ring Signatures
|
42 pages, 8 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ring signatures are cryptographic protocols designed to allow any member of a
group to produce a signature on behalf of the group, without revealing the
individual signer's identity. This offers group members a level of anonymity
not attainable through generic digital signature schemes. We call this property
'plausible deniability', or anonymity with respect to an anonymity set. We
concentrate in particular on implementing privacy on the blockchain,
introducing a unique ring signature scheme that works with existing blockchain
systems. We implement a unique ring signature (URS) scheme using secp256k1,
creating the first implementation compatible with blockchain libraries in this
way, so as for easy implementation as an Ethereum smart contract. We review the
privacy and security properties offered by the scheme we have constructed, and
compare its efficiency with other commonly suggested approaches to privacy on
the blockchain.
|
[
{
"version": "v1",
"created": "Sun, 4 Dec 2016 21:41:02 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Dec 2016 13:40:46 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Mercer",
"Rebekah",
""
]
] |
new_dataset
| 0.999577 |
1612.08057
|
Van Bang Le
|
Van Bang Le, Sheng-Lung Peng
|
On the complete width and edge clique cover problems
|
Extended version of COCOON 2015 paper. Accepted by Journal of
Combinatorial Optimization
| null | null | null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A complete graph is the graph in which every two vertices are adjacent. For a
graph $G=(V,E)$, the complete width of $G$ is the minimum $k$ such that there
exist $k$ independent sets $\mathtt{N}_i\subseteq V$, $1\le i\le k$, such that
the graph $G'$ obtained from $G$ by adding some new edges between certain
vertices inside the sets $\mathtt{N}_i$, $1\le i\le k$, is a complete graph.
The complete width problem is to decide whether the complete width of a given
graph is at most $k$ or not. In this paper we study the complete width problem.
We show that the complete width problem is NP-complete on $3K_2$-free bipartite
graphs and polynomially solvable on $2K_2$-free bipartite graphs and on
$(2K_2,C_4)$-free graphs. As a by-product, we obtain the following new results:
the edge clique cover problem is NP-complete on $\overline{3K_2}$-free
co-bipartite graphs and polynomially solvable on $C_4$-free co-bipartite graphs
and on $(2K_2, C_4)$-free graphs. We also give a characterization for $k$-probe
complete graphs which implies that the complete width problem admits a kernel
of at most $2^k$ vertices. This provides another proof for the known fact that
the edge clique cover problem admits a kernel of at most $2^k$ vertices.
Finally we determine all graphs of small complete width $k\le 3$.
|
[
{
"version": "v1",
"created": "Fri, 23 Dec 2016 18:06:06 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Le",
"Van Bang",
""
],
[
"Peng",
"Sheng-Lung",
""
]
] |
new_dataset
| 0.996893 |
1612.08153
|
Shervin Ardeshir
|
Shervin Ardeshir, Sandesh Sharma, Ali Broji
|
EgoReID: Cross-view Self-Identification and Human Re-identification in
Egocentric and Surveillance Videos
| null | null | null | null |
cs.CV cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human identification remains to be one of the challenging tasks in computer
vision community due to drastic changes in visual features across different
viewpoints, lighting conditions, occlusion, etc. Most of the literature has
been focused on exploring human re-identification across viewpoints that are
not too drastically different in nature. Cameras usually capture oblique or
side views of humans, leaving room for a lot of geometric and visual reasoning.
Given the recent popularity of egocentric and top-view vision,
re-identification across these two drastically different views can now be
explored. Having an egocentric and a top view video, our goal is to identify
the cameraman in the content of the top-view video, and also re-identify the
people visible in the egocentric video, by matching them to the identities
present in the top-view video. We propose a CRF-based method to address the two
problems. Our experimental results demonstrates the efficiency of the proposed
approach over a variety of video recorded from two views.
|
[
{
"version": "v1",
"created": "Sat, 24 Dec 2016 09:00:37 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Ardeshir",
"Shervin",
""
],
[
"Sharma",
"Sandesh",
""
],
[
"Broji",
"Ali",
""
]
] |
new_dataset
| 0.994275 |
1612.08171
|
Kamal Sarkar
|
Kamal Sarkar
|
KS_JU@DPIL-FIRE2016:Detecting Paraphrases in Indian Languages Using
Multinomial Logistic Regression Model
|
This work is awarded SPRINGER BEST PAPER AWARD, DPIL track @ 8th
meeting of Forum for Information Retrieval Evaluation 2016, 2016
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we describe a system that detects paraphrases in Indian
Languages as part of our participation in the shared Task on detecting
paraphrases in Indian Languages (DPIL) organized by Forum for Information
Retrieval Evaluation (FIRE) in 2016. Our paraphrase detection method uses a
multinomial logistic regression model trained with a variety of features which
are basically lexical and semantic level similarities between two sentences in
a pair. The performance of the system has been evaluated against the test set
released for the FIRE 2016 shared task on DPIL. Our system achieves the highest
f-measure of 0.95 on task1 in Punjabi language.The performance of our system on
task1 in Hindi language is f-measure of 0.90. Out of 11 teams participated in
the shared task, only four teams participated in all four languages, Hindi,
Punjabi, Malayalam and Tamil, but the remaining 7 teams participated in one of
the four languages. We also participated in task1 and task2 both for all four
Indian Languages. The overall average performance of our system including task1
and task2 overall four languages is F1-score of 0.81 which is the second
highest score among the four systems that participated in all four languages.
|
[
{
"version": "v1",
"created": "Sat, 24 Dec 2016 12:37:19 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Sarkar",
"Kamal",
""
]
] |
new_dataset
| 0.994713 |
1612.08178
|
Kamal Sarkar
|
Kamal Sarkar, Debanjan Das, Indra Banerjee, Mamta Kumari and Prasenjit
Biswas
|
JU_KS_Group@FIRE 2016: Consumer Health Information Search
|
8th meeting of Forum for Information Retrieval Evaluation 2016, 2016
| null | null | null |
cs.IR cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe the methodology used and the results obtained by
us for completing the tasks given under the shared task on Consumer Health
Information Search (CHIS) collocated with the Forum for Information Retrieval
Evaluation (FIRE) 2016, ISI Kolkata. The shared task consists of two sub-tasks
- (1) task1: given a query and a document/set of documents associated with that
query, the task is to classify the sentences in the document as relevant to the
query or not and (2) task 2: the relevant sentences need to be further
classified as supporting the claim made in the query, or opposing the claim
made in the query. We have participated in both the sub-tasks. The percentage
accuracy obtained by our developed system for task1 was 73.39 which is third
highest among the 9 teams participated in the shared task.
|
[
{
"version": "v1",
"created": "Sat, 24 Dec 2016 13:30:23 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Sarkar",
"Kamal",
""
],
[
"Das",
"Debanjan",
""
],
[
"Banerjee",
"Indra",
""
],
[
"Kumari",
"Mamta",
""
],
[
"Biswas",
"Prasenjit",
""
]
] |
new_dataset
| 0.994865 |
1612.08245
|
Kostas Alexis PhD
|
Kostas Alexis, Christos Papachristos, Roland Siegwart, Anthony Tzes
|
Distributed Infrastructure Inspection Path Planning subject to Time
Constraints
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Within this paper, the problem of 3D structural inspection path planning for
distributed infrastructure using aerial robots that are subject to time
constraints is addressed. The proposed algorithm handles varying spatial
properties of the infrastructure facilities, accounts for their different
importance and exploration function and computes an overall inspection path of
high inspection reward while respecting the robot endurance or mission time
constraints as well as the vehicle dynamics and sensor limitations. To achieve
its goal, it employs an iterative, 3-step optimization strategy at each
iteration of which it first randomly samples a set of possible structures to
visit, subsequently solves the derived traveling salesman problem and computes
the travel costs, while finally it samples and assigns inspection times to each
structure and evaluates the total inspection reward. For the derivation of the
inspection paths per each independent facility, it interfaces a path planner
dedicated to the 3D coverage of single structures. The resulting algorithm
properties, computational performance and path quality are evaluated using
simulation studies as well as experimental test-cases employing a multirotor
micro aerial vehicle.
|
[
{
"version": "v1",
"created": "Sun, 25 Dec 2016 07:46:47 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Alexis",
"Kostas",
""
],
[
"Papachristos",
"Christos",
""
],
[
"Siegwart",
"Roland",
""
],
[
"Tzes",
"Anthony",
""
]
] |
new_dataset
| 0.961687 |
1612.08328
|
Yongpeng Wu
|
Yongpeng Wu, Jun-Bo Wang, Jue Wang, Robert Schober, and Chengshan Xiao
|
Large-Scale MIMO Secure Transmission with Finite Alphabet Inputs
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we investigate secure transmission over the large-scale
multiple-antenna wiretap channel with finite alphabet inputs. First, we show
analytically that a generalized singular value decomposition (GSVD) based
design, which is optimal for Gaussian inputs, may exhibit a severe performance
loss for finite alphabet inputs in the high signal-to-noise ratio (SNR) regime.
In light of this, we propose a novel Per-Group-GSVD (PG-GSVD) design which can
effectively compensate the performance loss caused by the GSVD design. More
importantly, the computational complexity of the PG-GSVD design is by orders of
magnitude lower than that of the existing design for finite alphabet inputs in
[1] while the resulting performance loss is minimal. Numerical results indicate
that the proposed PG-GSVD design can be efficiently implemented in large-scale
multiple-antenna systems and achieves significant performance gains compared to
the GSVD design.
|
[
{
"version": "v1",
"created": "Mon, 26 Dec 2016 05:41:00 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Wu",
"Yongpeng",
""
],
[
"Wang",
"Jun-Bo",
""
],
[
"Wang",
"Jue",
""
],
[
"Schober",
"Robert",
""
],
[
"Xiao",
"Chengshan",
""
]
] |
new_dataset
| 0.99205 |
1612.08408
|
Keke Tang
|
Keke Tang, Peng Song and Xiaoping Chen
|
Signature of Geometric Centroids for 3D Local Shape Description and
Partial Shape Matching
|
to be published in the Proceedings of the Asian Conference on
Computer Vision (ACCV'2016)
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Depth scans acquired from different views may contain nuisances such as
noise, occlusion, and varying point density. We propose a novel Signature of
Geometric Centroids descriptor, supporting direct shape matching on the scans,
without requiring any preprocessing such as scan denoising or converting into a
mesh. First, we construct the descriptor by voxelizing the local shape within a
uniquely defined local reference frame and concatenating geometric centroid and
point density features extracted from each voxel. Second, we compare two
descriptors by employing only corresponding voxels that are both non-empty,
thus supporting matching incomplete local shape such as those close to scan
boundary. Third, we propose a descriptor saliency measure and compute it from a
descriptor-graph to improve shape matching performance. We demonstrate the
descriptor's robustness and effectiveness for shape matching by comparing it
with three state-of-the-art descriptors, and applying it to object/scene
reconstruction and 3D object recognition.
|
[
{
"version": "v1",
"created": "Mon, 26 Dec 2016 15:44:17 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Tang",
"Keke",
""
],
[
"Song",
"Peng",
""
],
[
"Chen",
"Xiaoping",
""
]
] |
new_dataset
| 0.960305 |
1612.08701
|
Ahmed Mateen Mr.
|
Ahmed Mateen and Lareab Chaudhary
|
A Peta-Scale Data Movement and Analysis in Data Warehouse (APSDMADW)
|
5 pages
|
International Journal of Computer Applications Foundation of
Computer Science (FCS), NY, USA Volume 151 - Number 7 Year of Publication:
2016
|
10.5120/ijca2016911702
| null |
cs.DC
|
http://creativecommons.org/licenses/by/4.0/
|
In this research paper so as to handle Information warehousing as well as
online synthetic dispensation OLAP are necessary aspects of conclusion support
which takes more and more turn into a focal point of the data source
business.This paper offers an outline of information warehousing also OLAP
systems with a highlighting on their latest necessities.All of us explain
backside end tackle for extract clean-up and load information into an Data
warehouse multi dimensional data model usual of OLAP frontend user tools for
query and facts evaluation server extension for useful query dispensation and
apparatus for metadata managing and for supervision the stockroom. Insights
centered on complete data on customer actions manufactured goods act and souk
performance are powerful advance and opposition in the internet gap .In this
research conclude the company inspiration and the program and efficiency of
servers working in a data warehouse through use of some new techniques and get
better and efficient results. Data in petabyte scale. This test shows the data
dropping rate in data warehouse. The locomotive is in creation at Yahoo! since
2007 and presently manages more than half a dozen peta bytes of data.
|
[
{
"version": "v1",
"created": "Tue, 27 Dec 2016 18:37:46 GMT"
}
] | 2016-12-28T00:00:00 |
[
[
"Mateen",
"Ahmed",
""
],
[
"Chaudhary",
"Lareab",
""
]
] |
new_dataset
| 0.991007 |
1601.04467
|
Lingfei Jin
|
Lingfei Jin and Chaoping Xing
|
New MDS Self-Dual Codes from Generalized Reed-Solomon Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Both MDS and Euclidean self-dual codes have theoretical and practical
importance and the study of MDS self-dual codes has attracted lots of attention
in recent years. In particular, determining existence of $q$-ary MDS self-dual
codes for various lengths has been investigated extensively. The problem is
completely solved for the case where $q$ is even. The current paper focuses on
the case where $q$ is odd. We construct a few classes of new MDS self-dual code
through generalized Reed-Solomon codes. More precisely, we show that for any
given even length $n$ we have a $q$-ary MDS code as long as $q\equiv1\bmod{4}$
and $q$ is sufficiently large (say $q\ge 2^n\times n^2)$. Furthermore, we prove
that there exists a $q$-ary MDS self-dual code of length $n$ if $q=r^2$ and $n$
satisfies one of the three conditions: (i) $n\le r$ and $n$ is even; (ii) $q$
is odd and $n-1$ is an odd divisor of $q-1$; (iii) $r\equiv3\mod{4}$ and
$n=2tr$ for any $t\le (r-1)/2$.
|
[
{
"version": "v1",
"created": "Mon, 18 Jan 2016 11:01:53 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Dec 2016 03:27:45 GMT"
}
] | 2016-12-26T00:00:00 |
[
[
"Jin",
"Lingfei",
""
],
[
"Xing",
"Chaoping",
""
]
] |
new_dataset
| 0.969025 |
1610.05587
|
Dalin Zhu
|
Dalin Zhu, Junil Choi and Robert W. Heath Jr
|
Auxiliary Beam Pair Enabled AoD and AoA Estimation in Closed-Loop
Large-Scale mmWave MIMO Systems
|
Submitted to IEEE Transactions on Wireless Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Channel estimation is of critical importance in millimeter-wave (mmWave)
multiple-input multiple-output (MIMO) systems. Due to the use of large antenna
arrays, low-complexity mmWave specific channel estimation algorithms are
required. In this paper, an auxiliary beam pair design is proposed to provide
high-resolution estimates of the channel's angle-of-departure (AoD) and
angle-of-arrival (AoA) for mmWave MIMO systems. By performing an amplitude
comparison with respect to each auxiliary beam pair, a set of ratio measures
that characterize the channel's AoD and AoA are obtained by the receiver.
Either the best ratio measure or the estimated AoD is quantized and fed back to
the transmitter via a feedback channel. The proposed technique can be
incorporated into control channel design to minimize initial access delay.
Though the design principles are derived assuming a high-power regime,
evaluation under more realistic assumption shows that by employing the proposed
method, good angle estimation performance is achieved under various
signal-to-noise ratio levels and channel conditions.
|
[
{
"version": "v1",
"created": "Sat, 15 Oct 2016 21:13:34 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Dec 2016 22:53:02 GMT"
}
] | 2016-12-26T00:00:00 |
[
[
"Zhu",
"Dalin",
""
],
[
"Choi",
"Junil",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] |
new_dataset
| 0.999265 |
1612.07833
|
Radu Soricut
|
Nan Ding and Sebastian Goodman and Fei Sha and Radu Soricut
|
Understanding Image and Text Simultaneously: a Dual Vision-Language
Machine Comprehension Task
|
11 pages
| null | null | null |
cs.CL cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new multi-modal task for computer systems, posed as a combined
vision-language comprehension challenge: identifying the most suitable text
describing a scene, given several similar options. Accomplishing the task
entails demonstrating comprehension beyond just recognizing "keywords" (or
key-phrases) and their corresponding visual concepts. Instead, it requires an
alignment between the representations of the two modalities that achieves a
visually-grounded "understanding" of various linguistic elements and their
dependencies. This new task also admits an easy-to-compute and well-studied
metric: the accuracy in detecting the true target among the decoys.
The paper makes several contributions: an effective and extensible mechanism
for generating decoys from (human-created) image captions; an instance of
applying this mechanism, yielding a large-scale machine comprehension dataset
(based on the COCO images and captions) that we make publicly available; human
evaluation results on this dataset, informing a performance upper-bound; and
several baseline and competitive learning approaches that illustrate the
utility of the proposed task and dataset in advancing both image and language
comprehension. We also show that, in a multi-task learning setting, the
performance on the proposed task is positively correlated with the end-to-end
task of image captioning.
|
[
{
"version": "v1",
"created": "Thu, 22 Dec 2016 22:44:17 GMT"
}
] | 2016-12-26T00:00:00 |
[
[
"Ding",
"Nan",
""
],
[
"Goodman",
"Sebastian",
""
],
[
"Sha",
"Fei",
""
],
[
"Soricut",
"Radu",
""
]
] |
new_dataset
| 0.986423 |
1612.07848
|
Meiyue Shao
|
Meiyue Shao and Chao Yang
|
BSEPACK User's Guide
|
The software is available at
https://sites.google.com/a/lbl.gov/bsepack/
| null | null | null |
cs.MS math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is the user manual for the software package BSEPACK (Bethe--Salpeter
Eigenvalue Solver Package).
|
[
{
"version": "v1",
"created": "Fri, 23 Dec 2016 01:16:54 GMT"
}
] | 2016-12-26T00:00:00 |
[
[
"Shao",
"Meiyue",
""
],
[
"Yang",
"Chao",
""
]
] |
new_dataset
| 0.955403 |
1612.07882
|
Jing Qian
|
Jing Qian, Feifei Gao, Gongpu Wang, Shi Jin, and Hongbo Zhu
|
Semi-coherent Detection and Performance Analysis for Ambient Backscatter
System
|
30 pages, 11 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a novel communication mechanism, ambient backscatter, that utilizes
radio frequency (RF) signals transmitted from an ambient source as both energy
supply and information carrier to enable communications between low-power
devices. Different from existing non-coherent schemes, we here design the
semi-coherent detection, where channel parameters can be obtained from unknown
data symbols and a few pilot symbols. We first derive the optimal detector for
the complex Gaussian ambient RF signal from likelihood ratio test and compute
the corresponding closed-form bit error rate (BER). To release the requirement
for prior knowledge of the ambient RF signal, we next design a suboptimal
energy detector with ambient RF signals being either the complex Gaussian or
the phase shift keying (PSK). The corresponding detection thresholds, the
analytical BER, and the outage probability are also obtained in closed-form.
Interestingly, the complex Gaussian source would cause an error floor while the
PSK source does not, which brings nontrivial indication of constellation design
as opposed to the popular Gaussian-embedded literatures. Simulations are
provided to corroborate the theoretical studies.
|
[
{
"version": "v1",
"created": "Fri, 23 Dec 2016 06:05:05 GMT"
}
] | 2016-12-26T00:00:00 |
[
[
"Qian",
"Jing",
""
],
[
"Gao",
"Feifei",
""
],
[
"Wang",
"Gongpu",
""
],
[
"Jin",
"Shi",
""
],
[
"Zhu",
"Hongbo",
""
]
] |
new_dataset
| 0.992433 |
1612.07889
|
Kan Wang
|
Kan Wang, F. Richard Yu, Hongyan Li, and Zhengquan Li
|
Information-Centric Wireless Networks with Virtualization and D2D
Communications
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless network virtualization and information-centric networking (ICN) are
two promising technologies for next generation wireless networks. Although some
excellent works have focused on these two technologies, device-to-device (D2D)
communications have not beeen investigated in information-centric virtualized
cellular networks. Meanwhile, content caching in mobile devices has attracted
great attentions due to the saved backhaul consumption or reduced transmission
latency in D2D-assisted cellular networks. However, when it comes to the
multi-operator scenario, the direct content sharing between different operators
via D2D communications is typically infeasible. In this article, we propose a
novel information-centric virtualized cellular network framework with D2D
communications, enabling not only content caching in the air, but also
inter-operator content sharing between mobile devices. Moreover, we describe
the key components in the proposed framework, and present the interactions
among them. In addition, we incorporate and formulate the content caching
strategies in resource allocation optimization, to maximize the total utility
of mobile virtual network operators (MVNOs) through caching popular contents in
mobile devices. Simulations results demonstrate the effectiveness of the
proposed framework and scheme with different system parameters.
|
[
{
"version": "v1",
"created": "Fri, 23 Dec 2016 07:15:08 GMT"
}
] | 2016-12-26T00:00:00 |
[
[
"Wang",
"Kan",
""
],
[
"Yu",
"F. Richard",
""
],
[
"Li",
"Hongyan",
""
],
[
"Li",
"Zhengquan",
""
]
] |
new_dataset
| 0.967426 |
1612.07947
|
Mirja K\"uhlewind
|
Mirja Kuehlewind
|
TCP SIAD: Congestion Control supporting High Speed and Low Latency
| null | null | null |
ETH TIK Technial Report 367
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Congestion control has been an open research issue for more than two decades.
More and more applications with narrow latency requirements are emerging which
are not well addressed by existing proposals. In this paper we present TCP
Scalable Increase Adaptive Decrease (SIAD), a new congestion control scheme
supporting both high speed and low latency. More precisely, our algorithm aims
to provide high utilization under various networking conditions, and therefore
would allow operators to configure small buffers for low latency support. To
provide full scalability with high speed networks, we designed TCP SIAD based
on a new approach that aims for a fixed feedback rate independent of the
available bandwidth. Further, our approach provides a configuration knob for
the feedback rate. This can be used by a higher layer control loop to impact
the capacity share, potentially at the cost of higher congestion, e.g. for
applications that need a minimum rate.
We evaluated TCP SIAD against well-known high-speed congestion control
schemes, such as Scalable TCP and High Speed TCP, as well as H-TCP that among
other goals targets small buffers. We show that only SIAD is able to utilize
the bottleneck with arbitrary buffer sizes while avoiding a standing queue.
Moreover, we demonstrate the capacity sharing of SIAD depending on the
configured feedback rate and a high robustness of TCP SIAD to non-congestion
related loss.
|
[
{
"version": "v1",
"created": "Fri, 23 Dec 2016 12:03:29 GMT"
}
] | 2016-12-26T00:00:00 |
[
[
"Kuehlewind",
"Mirja",
""
]
] |
new_dataset
| 0.999146 |
1612.07956
|
Kamal Sarkar
|
Kamal Sarkar
|
A CRF Based POS Tagger for Code-mixed Indian Social Media Text
|
This work is awarded the first prize in the NLP tool contest on "POS
Tagging for Code-Mixed Indian Social Media Text", held in conjunction with
the 13th International Conference on Natural Language Processing 2016(ICON
2016), Indian Institute of Technology (BHU), India
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we describe a conditional random fields (CRF) based system for
Part-Of- Speech (POS) tagging of code-mixed Indian social media text as part of
our participation in the tool contest on POS tagging for codemixed Indian
social media text, held in conjunction with the 2016 International Conference
on Natural Language Processing, IIT(BHU), India. We participated only in
constrained mode contest for all three language pairs, Bengali-English,
Hindi-English and Telegu-English. Our system achieves the overall average F1
score of 79.99, which is the highest overall average F1 score among all 16
systems participated in constrained mode contest.
|
[
{
"version": "v1",
"created": "Fri, 23 Dec 2016 12:58:58 GMT"
}
] | 2016-12-26T00:00:00 |
[
[
"Sarkar",
"Kamal",
""
]
] |
new_dataset
| 0.998664 |
1612.07999
|
Francisco J. Martin-Vega
|
Francisco J. Martin-Vega and Beatriz Soret and Mari Carmen
Aguayo-Torres and Istvan Z. Kovacs and Gerardo Gomez
|
Geo-Location Based Access for Vehicular Communications: Analysis and
Optimization via Stochastic Geometry
|
15 pages and 16 figures. This paper have been submitted for possible
publication in IEEE Transactions on Vehicular Technology
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Delivery of broadcast messages among vehicles for safety purposes, which is
known as one of the key ingredients of Intelligent Transportation Systems
(ITS), requires an efficient Medium Access Control (MAC) that provides low
average delay and high reliability. To this end, a Geo-Location Based Access
(GLOC) for vehicles has been proposed for Vehicle-to-Vehicle (V2V)
communications, aiming at maximizing the distance of co-channel transmitters
while preserving a low latency when accessing the resources. In this paper we
analyze, with the aid of stochastic geometry, the delivery of periodic and
non-periodic broadcast messages with GLOC, taking into account path loss and
fading as well as the random locations of transmitting vehicles. Analytical
results include the average interference, average Binary Rate (BR), capture
probability, i.e., the probability of successful message transmission, and
Energy Efficiency (EE). Mathematical analysis reveals interesting insights
about the system performance, which are validated thought extensive Monte Carlo
simulations. In particular, it is shown that the capture probability is an
increasing function with exponential dependence with respect to the transmit
power and it is demonstrated that an arbitrary high capture probability can be
achieved, as long as the number of access resources is high enough. Finally, to
facilitate the system-level design of GLOC, the optimum transmit power is
derived, which leads to a maximal EE subject to a given constraint in the
capture probability.
|
[
{
"version": "v1",
"created": "Fri, 23 Dec 2016 15:14:17 GMT"
}
] | 2016-12-26T00:00:00 |
[
[
"Martin-Vega",
"Francisco J.",
""
],
[
"Soret",
"Beatriz",
""
],
[
"Aguayo-Torres",
"Mari Carmen",
""
],
[
"Kovacs",
"Istvan Z.",
""
],
[
"Gomez",
"Gerardo",
""
]
] |
new_dataset
| 0.986421 |
1612.08067
|
Ahmed El Shafie
|
Ahmed El Shafie and Naofal Al-Dhahir
|
A Secure Multiple-Access Scheme for Rechargeable Wireless Sensors in the
Presence of an Eavesdropper
|
Published in IEEE Communications Letters
http://ieeexplore.ieee.org/document/7073605/
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a simple yet efficient scheme for a set of energy-harvesting
sensors to establish secure communication with a common destination (a master
node). An eavesdropper attempts to decode the data sent from the sensors to
their common destination. We assume a single modulation scheme that can be
implemented efficiently for energy-limited applications. We design a
multiple-access scheme for the sensors under secrecy and limited-energy
constraints. In a given time slot, each energy-harvesting sensor chooses
between sending its packet or remaining idle. The destination assigns a set of
data time slots to each sensor. The optimization problem is formulated to
maximize the secrecy sum-throughput.
|
[
{
"version": "v1",
"created": "Fri, 23 Dec 2016 19:24:02 GMT"
}
] | 2016-12-26T00:00:00 |
[
[
"Shafie",
"Ahmed El",
""
],
[
"Al-Dhahir",
"Naofal",
""
]
] |
new_dataset
| 0.972206 |
1607.03179
|
Sta\v{s}a Milojevi\'c
|
Sta\v{s}a Milojevi\'c, Filippo Radicchi, Judit Bar-Ilan
|
Citation success index - An intuitive pair-wise journal comparison
metric
| null | null | null | null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present "citation success index", a metric for comparing the
citation capacity of pairs of journals. Citation success index is the
probability that a random paper in one journal has more citations than a random
paper in another journal (50% means the two journals do equally well). Unlike
the journal impact factor (IF), the citation success index depends on the
broadness and the shape of citation distributions. Also, it is insensitive to
sporadic highly-cited papers that skew the IF. Nevertheless, we show, based on
16,000 journals containing ~2.4 million articles, that the citation success
index is a relatively tight function of the ratio of IFs of journals being
compared, due to the fact that journals with same IF have quite similar
citation distributions. The citation success index grows slowly as a function
of IF ratio. It is substantial (>90%) only when the ratio of IFs exceeds ~6,
whereas a factor of two difference in IF values translates into a modest
advantage for the journal with higher IF (index of ~70%). We facilitate the
wider adoption of this metric by providing an online calculator that takes as
input parameters only the IFs of the pair of journals.
|
[
{
"version": "v1",
"created": "Mon, 11 Jul 2016 21:59:22 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Nov 2016 16:21:56 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Dec 2016 23:56:02 GMT"
}
] | 2016-12-23T00:00:00 |
[
[
"Milojević",
"Staša",
""
],
[
"Radicchi",
"Filippo",
""
],
[
"Bar-Ilan",
"Judit",
""
]
] |
new_dataset
| 0.997446 |
1612.07213
|
Pietro Danzi
|
Marko Angjelichinoski, Pietro Danzi, \v{C}edomir Stefanovi\'c, Petar
Popovski
|
Secure and Robust Authentication for DC MicroGrids based on Power Talk
Communication
|
Paper submitted to IEEE ICC 2017 Conference Symposium Communications
for the Smart Grid
| null | null | null |
cs.SY cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel framework for secure and reliable authentication of
Distributed Energy Resources to the centralized secondary/tertiary control
system of a DC MicroGrid (MG), networked using the IEEE 802.11 wireless
interface. The key idea is to perform the authentication using power talk,
which is a powerline communication technique executed by the primary control
loops of the power electronic converters, without the use of a dedicated
hardware for its modem. In addition, the scheme also promotes direct and active
participation of the control system in the authentication process, a feature
not commonly encountered in current networked control systems for MicroGrids.
The PLECS-based simulations verifies the viability of our scheme.
|
[
{
"version": "v1",
"created": "Wed, 21 Dec 2016 16:11:06 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Dec 2016 10:53:33 GMT"
}
] | 2016-12-23T00:00:00 |
[
[
"Angjelichinoski",
"Marko",
""
],
[
"Danzi",
"Pietro",
""
],
[
"Stefanović",
"Čedomir",
""
],
[
"Popovski",
"Petar",
""
]
] |
new_dataset
| 0.997611 |
1612.07491
|
Irit Dinur
|
Amey Bhangale, Irit Dinur, Inbal Livni Navon
|
Cube vs. Cube Low Degree Test
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We revisit the Raz-Safra plane-vs.-plane test and study the closely related
cube vs. cube test. In this test the tester has access to a "cubes table" which
assigns to every cube a low degree polynomial. The tester randomly selects two
cubes (affine sub-spaces of dimension $3$) that intersect on a point $x\in
\mathbf{F}^m$, and checks that the assignments to the cubes agree with each
other on the point $x$.
Our main result is a new combinatorial proof for a low degree test that comes
closer to the soundness limit, as it works for all $\epsilon \ge
poly(d)/{\mathbf{F}}^{1/2}$, where $d$ is the degree. This should be compared
to the previously best soundness value of $\epsilon \ge poly(m,
d)/\mathbf{F}^{1/8}$. Our soundness limit improves upon the dependence on the
field size and does not depend on the dimension of the ambient space.
Our proof is combinatorial and direct: unlike the Raz-Safra proof, it
proceeds in one shot and does not require induction on the dimension of the
ambient space. The ideas in our proof come from works on direct product testing
which are even simpler in the current setting thanks to the low degree.
Along the way we also prove a somewhat surprising fact about connection
between different agreement tests: it does not matter if the tester chooses the
cubes to intersect on points or on lines: for every given table, its success
probability in either test is nearly the same.
|
[
{
"version": "v1",
"created": "Thu, 22 Dec 2016 08:54:49 GMT"
}
] | 2016-12-23T00:00:00 |
[
[
"Bhangale",
"Amey",
""
],
[
"Dinur",
"Irit",
""
],
[
"Navon",
"Inbal Livni",
""
]
] |
new_dataset
| 0.994216 |
1612.07514
|
Gaetan de Rassenfosse
|
Gaetan de Rassenfosse, Martin Kracker, Gianluca Tarasconi
|
Getting Started with PATSTAT Register
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper provides a technical introduction to the PATSTAT Register
database, which contains bibliographical, procedural and legal status data on
patent applications handled by the European Patent Office. It presents eight
MySQL queries that cover some of the most relevant aspects of the database for
research purposes. It targets academic researchers and practitioners who are
familiar with the PATSTAT database and the MySQL language.
|
[
{
"version": "v1",
"created": "Thu, 22 Dec 2016 10:05:45 GMT"
}
] | 2016-12-23T00:00:00 |
[
[
"de Rassenfosse",
"Gaetan",
""
],
[
"Kracker",
"Martin",
""
],
[
"Tarasconi",
"Gianluca",
""
]
] |
new_dataset
| 0.974278 |
1612.07586
|
Nassim Seghir
|
Mohamed Nassim Seghir, David Aspinall
|
DroidGen: Constraint-based and Data-Driven Policy Generation for Android
| null | null | null | null |
cs.CR cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present DroidGen a tool for automatic anti-malware policy inference.
DroidGen employs a data-driven approach: it uses a training set of malware and
benign applications and makes call to a constraint solver to generate a policy
under which a maximum of malware is excluded and a maximum of benign
applications is allowed. Preliminary results are encouraging. We are able to
automatically generate a policy which filters out 91% of the tested Android
malware. Moreover, compared to black-box machine learning classifiers, our
method has the advantage of generating policies in a declarative readable
format. We illustrate our approach, describe its implementation and report on
the preliminary results.
|
[
{
"version": "v1",
"created": "Thu, 22 Dec 2016 13:07:20 GMT"
}
] | 2016-12-23T00:00:00 |
[
[
"Seghir",
"Mohamed Nassim",
""
],
[
"Aspinall",
"David",
""
]
] |
new_dataset
| 0.989179 |
1612.07608
|
Harishchandra Dubey
|
Harishchandra Dubey, Jon C. Goldberg, Mohammadreza Abtahi, Leslie
Mahler, Kunal Mankodiya
|
EchoWear: Smartwatch Technology for Voice and Speech Treatments of
Patients with Parkinson's Disease
|
8 pages, 8 figures, 1 table, 1 equation in Proceedings of the
conference on ACM Wireless Health (WH 2015), National Institute of Health,
Bethesda, Maryland, USA
| null | null | null |
cs.CY cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
About 90 percent of people with Parkinson's disease (PD) experience decreased
functional communication due to the presence of voice and speech disorders
associated with dysarthria that can be characterized by monotony of pitch (or
fundamental frequency), reduced loudness, irregular rate of speech, imprecise
consonants, and changes in voice quality. Speech-language pathologists (SLPs)
work with patients with PD to improve speech intelligibility using various
intensive in-clinic speech treatments. SLPs also prescribe home exercises to
enhance generalization of speech strategies outside of the treatment room. Even
though speech therapies are found to be highly effective in improving vocal
loudness and speech quality, patients with PD find it difficult to follow the
prescribed exercise regimes outside the clinic and to continue exercises once
the treatment is completed. SLPs need techniques to monitor compliance and
accuracy of their patients exercises at home and in ecologically valid
communication situations. We have designed EchoWear, a smartwatch-based system,
to remotely monitor speech and voice exercises as prescribed by SLPs. We
conducted a study of 6 individuals; three with PD and three healthy controls.
To assess the performance of EchoWear technology compared with high quality
audio equipment obtained in a speech laboratory. Our preliminary analysis shows
promising outcomes for using EchoWear in speech therapies for people with PD.
Keywords: Dysarthria; knowledge-based speech processing; Parkinson's disease;
smartwatch; speech therapy; wearable system.
|
[
{
"version": "v1",
"created": "Wed, 21 Dec 2016 00:02:08 GMT"
}
] | 2016-12-23T00:00:00 |
[
[
"Dubey",
"Harishchandra",
""
],
[
"Goldberg",
"Jon C.",
""
],
[
"Abtahi",
"Mohammadreza",
""
],
[
"Mahler",
"Leslie",
""
],
[
"Mankodiya",
"Kunal",
""
]
] |
new_dataset
| 0.997706 |
1612.07778
|
Rajib Rana
|
Rajib Rana
|
Gated Recurrent Unit (GRU) for Emotion Classification from Noisy Speech
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Despite the enormous interest in emotion classification from speech, the
impact of noise on emotion classification is not well understood. This is
important because, due to the tremendous advancement of the smartphone
technology, it can be a powerful medium for speech emotion recognition in the
outside laboratory natural environment, which is likely to incorporate
background noise in the speech. We capitalize on the current breakthrough of
Recurrent Neural Network (RNN) and seek to investigate its performance for
emotion classification from noisy speech. We particularly focus on the recently
proposed Gated Recurrent Unit (GRU), which is yet to be explored for emotion
recognition from speech. Experiments conducted with speech compounded with
eight different types of noises reveal that GRU incurs an 18.16% smaller
run-time while performing quite comparably to the Long Short-Term Memory
(LSTM), which is the most popular Recurrent Neural Network proposed to date.
This result is promising for any embedded platform in general and will initiate
further studies to utilize GRU to its full potential for emotion recognition on
smartphones.
|
[
{
"version": "v1",
"created": "Tue, 13 Dec 2016 03:32:47 GMT"
}
] | 2016-12-23T00:00:00 |
[
[
"Rana",
"Rajib",
""
]
] |
new_dataset
| 0.998071 |
1612.04277
|
Juyong Shin
|
Juyong Shin, Jongbo Bae, Ansu Na, Sang Lyul Min
|
Copycat: A High Precision Real Time NAND Simulator
| null | null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe the design and implementation of a high precision
real time NAND simulator called Copycat that runs on a commodity multi-core
desktop environment. This NAND simulator facilitates the development of
embedded flash memory management software such as the flash translation layer
(FTL). The simulator also allows a comprehensive fault injection for testing
the reliability of the FTL. Compared against a real FPGA implementation, the
simulator's response time deviation is under 0.28% on average, with a maximum
of 10.12%.
|
[
{
"version": "v1",
"created": "Mon, 12 Dec 2016 01:43:11 GMT"
}
] | 2016-12-22T00:00:00 |
[
[
"Shin",
"Juyong",
""
],
[
"Bae",
"Jongbo",
""
],
[
"Na",
"Ansu",
""
],
[
"Min",
"Sang Lyul",
""
]
] |
new_dataset
| 0.984096 |
1612.06890
|
Justin Johnson
|
Justin Johnson and Bharath Hariharan and Laurens van der Maaten and Li
Fei-Fei and C. Lawrence Zitnick and Ross Girshick
|
CLEVR: A Diagnostic Dataset for Compositional Language and Elementary
Visual Reasoning
| null | null | null | null |
cs.CV cs.CL cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When building artificial intelligence systems that can reason and answer
questions about visual data, we need diagnostic tests to analyze our progress
and discover shortcomings. Existing benchmarks for visual question answering
can help, but have strong biases that models can exploit to correctly answer
questions without reasoning. They also conflate multiple sources of error,
making it hard to pinpoint model weaknesses. We present a diagnostic dataset
that tests a range of visual reasoning abilities. It contains minimal biases
and has detailed annotations describing the kind of reasoning each question
requires. We use this dataset to analyze a variety of modern visual reasoning
systems, providing novel insights into their abilities and limitations.
|
[
{
"version": "v1",
"created": "Tue, 20 Dec 2016 21:40:40 GMT"
}
] | 2016-12-22T00:00:00 |
[
[
"Johnson",
"Justin",
""
],
[
"Hariharan",
"Bharath",
""
],
[
"van der Maaten",
"Laurens",
""
],
[
"Fei-Fei",
"Li",
""
],
[
"Zitnick",
"C. Lawrence",
""
],
[
"Girshick",
"Ross",
""
]
] |
new_dataset
| 0.999709 |
1612.06953
|
Brent Kievit-Kylar Brent Kievit-Kylar
|
Brent Kievit-Kylar, Chris Horlacher, Marc Godard, Christian Saucier
|
Equibit: A Peer-to-Peer Electronic Equity System
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The registration, transfer, clearing and settlement of equities represents a
significant part of economic activity currently underserved by modern
technological innovation. In addition, recent events have revealed problems of
transparency, inviting public criticism and scrutiny from regulatory
authorities. A peer-to-peer platform facilitating the creation and exchange of
directly registered shares represents a shift in equity markets towards more
efficient, transparent operations as well as greater accessibility to the
investing public and issuing companies. Blockchain technology solves the
problem of transaction processing and clearing but the fungibility of their
units pose a challenge in identifying the issuers and holders of specific
equities. Furthermore, as the issuers are in a constant state of flux the
benefits of a decentralized network are lost if a central manager is required
to cancel equities from companies that no longer exist. We propose a solution
to these problems using digital signatures, based on blockchain technology.
|
[
{
"version": "v1",
"created": "Wed, 21 Dec 2016 02:41:05 GMT"
}
] | 2016-12-22T00:00:00 |
[
[
"Kievit-Kylar",
"Brent",
""
],
[
"Horlacher",
"Chris",
""
],
[
"Godard",
"Marc",
""
],
[
"Saucier",
"Christian",
""
]
] |
new_dataset
| 0.995926 |
1612.07162
|
Jakob Nordstr\"om
|
Christoph Berkholz, Jakob Nordstr\"om
|
Supercritical Space-Width Trade-offs for Resolution
| null | null | null | null |
cs.CC cs.DM cs.LO math.CO math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that there are CNF formulas which can be refuted in resolution in
both small space and small width, but for which any small-width proof must have
space exceeding by far the linear worst-case upper bound. This significantly
strengthens the space-width trade-offs in [Ben-Sasson '09]}, and provides one
more example of trade-offs in the "supercritical" regime above worst case
recently identified by [Razborov '16]. We obtain our results by using
Razborov's new hardness condensation technique and combining it with the space
lower bounds in [Ben-Sasson and Nordstrom '08].
|
[
{
"version": "v1",
"created": "Wed, 21 Dec 2016 15:02:45 GMT"
}
] | 2016-12-22T00:00:00 |
[
[
"Berkholz",
"Christoph",
""
],
[
"Nordström",
"Jakob",
""
]
] |
new_dataset
| 0.990067 |
1511.07338
|
Bho Matthiesen
|
Bho Matthiesen, Eduard A. Jorswieck
|
Instantaneous Relaying for the 3-Way Relay Channel with Circular Message
Exchanges
|
In Proceedings of the Forty-Ninth Asilomar Conference on Signals,
Systems, and Computers, Nov. 2015, Pacific Grove, CA
| null |
10.1109/ACSSC.2015.7421173
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The 3-user discrete memoryless multi-way relay channel with circular message
exchange and instantaneous relaying is investigated. We first show that this
channel is effectively a 3-user interference channel with receiver message side
information for every fixed (and instantaneous) relay mapping. Then, we extend
the Han-Kobayashi coding scheme to this channel. Finally, we apply these
results to Gaussian channels with amplify-and-forward relaying and present
numerical results showing the gain of the proposed scheme compared to the state
of the art.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2015 17:47:48 GMT"
}
] | 2016-12-21T00:00:00 |
[
[
"Matthiesen",
"Bho",
""
],
[
"Jorswieck",
"Eduard A.",
""
]
] |
new_dataset
| 0.9967 |
1604.08001
|
Amin Zheng
|
Amin Zheng, Gene Cheung and Dinei Florencio
|
Context Tree based Image Contour Coding using A Geometric Prior
| null | null |
10.1109/TIP.2016.2627813
| null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
If object contours in images are coded efficiently as side information, then
they can facilitate advanced image / video coding techniques, such as graph
Fourier transform coding or motion prediction of arbitrarily shaped pixel
blocks. In this paper, we study the problem of lossless and lossy compression
of detected contours in images. Specifically, we first convert a detected
object contour composed of contiguous between-pixel edges to a sequence of
directional symbols drawn from a small alphabet. To encode the symbol sequence
using arithmetic coding, we compute an optimal variable-length context tree
(VCT) $\mathcal{T}$ via a maximum a posterior (MAP) formulation to estimate
symbols' conditional probabilities. MAP prevents us from overfitting given a
small training set $\mathcal{X}$ of past symbol sequences by identifying a VCT
$\mathcal{T}$ that achieves a high likelihood $P(\mathcal{X}|\mathcal{T})$ of
observing $\mathcal{X}$ given $\mathcal{T}$, and a large geometric prior
$P(\mathcal{T})$ stating that image contours are more often straight than
curvy. For the lossy case, we design efficient dynamic programming (DP)
algorithms that optimally trade off coding rate of an approximate contour
$\hat{\mathbf{x}}$ given a VCT $\mathcal{T}$ with two notions of distortion of
$\hat{\mathbf{x}}$ with respect to the original contour $\mathbf{x}$. To reduce
the size of the DP tables, a total suffix tree is derived from a given VCT
$\mathcal{T}$ for compact table entry indexing, reducing complexity.
Experimental results show that for lossless contour coding, our proposed
algorithm outperforms state-of-the-art context-based schemes consistently for
both small and large training datasets. For lossy contour coding, our
algorithms outperform comparable schemes in the literature in rate-distortion
performance.
|
[
{
"version": "v1",
"created": "Wed, 27 Apr 2016 10:00:41 GMT"
}
] | 2016-12-21T00:00:00 |
[
[
"Zheng",
"Amin",
""
],
[
"Cheung",
"Gene",
""
],
[
"Florencio",
"Dinei",
""
]
] |
new_dataset
| 0.995904 |
1609.02107
|
Jian-Kang Zhang
|
Zheng Dong and Yan-Yu Zhang and Jian-Kang Zhang and Xiang-Chuan Gao
|
Quadrature Amplitude Modulation Division for Multiuser MISO Broadcast
Channels
| null | null |
10.1109/JSTSP.2016.2607684
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers a discrete-time multiuser multiple-input single-output
(MISO) Gaussian broadcast channel~(BC), in which channel state information
(CSI) is available at both the transmitter and the receivers. The flexible and
explicit design of a uniquely decomposable constellation group (UDCG) is
provided based on pulse amplitude modulation (PAM) and rectangular quadrature
amplitude modulation (QAM) constellations. With this, a modulation division
(MD) transmission scheme is developed for the MISO BC. The proposed MD scheme
enables each receiver to uniquely and efficiently detect their desired signals
from the superposition of mutually interfering cochannel signals in the absence
of noise. In our design, the optimal transmitter beamforming problem is solved
in a closed-form for two-user MISO BC using max-min fairness as a design
criterion. Then, for a general case with more than two receivers, we develop a
user-grouping-based beamforming scheme, where the grouping method, beamforming
vector design and power allocation problems are addressed by using weighted
max-min fairness. It is shown that our proposed approach has a lower
probability of error compared with the zero-forcing (ZF) method when the
Hermitian angle between the two channel vectors is small in a two-user case. In
addition, simulation results also reveal that for the general channel model
with more than two users, our user-grouping-based scheme significantly
outperforms the ZF, time division (TD), minimum mean-square error (MMSE) and
signal-to-leakage-and-noise ratio (SLNR) based techniques in moderate and high
SNR regimes when the number of users approaches to the number of base station
(BS) antennas and it degrades into the ZF scheme when the number of users is
far less than the number of BS antennas in Rayleigh fading channels.
|
[
{
"version": "v1",
"created": "Wed, 7 Sep 2016 18:45:47 GMT"
}
] | 2016-12-21T00:00:00 |
[
[
"Dong",
"Zheng",
""
],
[
"Zhang",
"Yan-Yu",
""
],
[
"Zhang",
"Jian-Kang",
""
],
[
"Gao",
"Xiang-Chuan",
""
]
] |
new_dataset
| 0.958184 |
1612.06435
|
Odemir Bruno PhD
|
Jo\~ao B. Florindo, Odemir M. Bruno
|
Fractal Descriptors of Texture Images Based on the Triangular Prism
Dimension
|
21 pages, 14 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work presents a novel descriptor for texture images based on fractal
geometry and its application to image analysis. The descriptors are provided by
estimating the triangular prism fractal dimension under different scales with a
weight exponential parameter, followed by dimensionality reduction using
Karhunen-Lo\`{e}ve transform. The efficiency of the proposed descriptors is
tested on two well-known texture data sets, that is, Brodatz and Vistex, both
for classification and image retrieval. The novel method is also tested
concerning invariances in situations when the textures are rotated or affected
by Gaussian noise. The obtained results outperform other classical and
state-of-the-art descriptors in the literature and demonstrate the power of the
triangular descriptors in these tasks, suggesting their use in practical
applications of image analysis based on texture features.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2016 22:01:59 GMT"
}
] | 2016-12-21T00:00:00 |
[
[
"Florindo",
"João B.",
""
],
[
"Bruno",
"Odemir M.",
""
]
] |
new_dataset
| 0.99961 |
1612.06448
|
Nematollah Iri
|
Nematollah Iri and Oliver Kosut
|
Fine Asymptotics for Universal One-to-One Compression of Parametric
Sources
|
The paper has been submitted to IEEE Transactions on Information
Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Universal source coding at short blocklengths is considered for an
exponential family of distributions. The \emph{Type Size} code has previously
been shown to be optimal up to the third-order rate for universal compression
of all memoryless sources over finite alphabets. The Type Size code assigns
sequences ordered based on their type class sizes to binary strings ordered
lexicographically. To generalize this type class approach for parametric
sources, a natural scheme is to define two sequences to be in the same type
class if and only if they are equiprobable under any model in the parametric
class. This natural approach, however, is shown to be suboptimal. A variation
of the Type Size code is introduced, where type classes are defined based on
neighborhoods of minimal sufficient statistics. Asymptotics of the overflow
rate of this variation are derived and a converse result establishes its
optimality up to the third-order term. These results are derived for parametric
families of $i.i.d.$ sources as well as Markov sources.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2016 22:35:28 GMT"
}
] | 2016-12-21T00:00:00 |
[
[
"Iri",
"Nematollah",
""
],
[
"Kosut",
"Oliver",
""
]
] |
new_dataset
| 0.991905 |
1612.06451
|
Chiara Perillo
|
Chiara Perillo (1), Angelos Antonopoulos (2) and Christos Verikoukis
(2) ((1) University of Zurich, Department of Banking and Finance, Zurich,
Switzerland, (2) Telecommunications Technological Centre of Catalonia (CTTC),
Castelldefels, Barcelona, Spain)
|
Panel dataset description for econometric analysis of the ISP-OTT
relationship in the years 2008-2013
|
34 pages
| null | null | null |
cs.NI cs.CY q-fin.EC stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The latest technological advancements in the telecommunications domain (e.g.,
widespread adoption of mobile devices, introduction of 5G wireless
communications, etc.) have brought new stakeholders into the spotlight. More
specifically, Over-the-Top (OTT) providers have recently appeared, offering
their services over the existing deployed telecommunication networks. The entry
of the new players has changed the dynamics in the domain, as it creates
conflicting situations with the Internet Service Providers (ISPs), who
traditionally dominate the area, motivating the necessity for novel analytical
studies for this relationship. However, despite the importance of accessing
real observational data, there is no database with the aggregate information
that can serve as a solid base for this research. To that end, this document
provides a detailed summary report for financial and statistic data for the
period 2008-2013 that can be exploited for realistic econometric models that
will provide useful insights on this topic. The document summarizes data from
various sources with regard to the ISP revenues and Capital Expenditures
(CAPEX), the OTT revenues, the Internet penetration and the Gross Domestic
Product (GDP), taking into account three big OTT providers (i.e., Facebook,
Skype, WhatsApp) and ten major ISPs that operate in seven different countries.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2016 23:05:35 GMT"
}
] | 2016-12-21T00:00:00 |
[
[
"Perillo",
"Chiara",
""
],
[
"Antonopoulos",
"Angelos",
""
],
[
"Verikoukis",
"Christos",
""
]
] |
new_dataset
| 0.998035 |
1612.06685
|
Konstantinos Pappas
|
Konstantinos Pappas, Steven Wilson, and Rada Mihalcea
|
Stateology: State-Level Interactive Charting of Language, Feelings, and
Values
|
5 pages, 5 figures
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
People's personality and motivations are manifest in their everyday language
usage. With the emergence of social media, ample examples of such usage are
procurable. In this paper, we aim to analyze the vocabulary used by close to
200,000 Blogger users in the U.S. with the purpose of geographically portraying
various demographic, linguistic, and psychological dimensions at the state
level. We give a description of a web-based tool for viewing maps that depict
various characteristics of the social media users as derived from this large
blog dataset of over two billion words.
|
[
{
"version": "v1",
"created": "Tue, 20 Dec 2016 14:44:19 GMT"
}
] | 2016-12-21T00:00:00 |
[
[
"Pappas",
"Konstantinos",
""
],
[
"Wilson",
"Steven",
""
],
[
"Mihalcea",
"Rada",
""
]
] |
new_dataset
| 0.99799 |
1612.06703
|
Harish Karunakaran
|
Adhavan Jayabalan, Harish Karunakaran, Shravan Murlidharan, Tesia
Shizume
|
Dynamic Action Recognition: A convolutional neural network model for
temporally organized joint location data
|
11 pages
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivation: Recognizing human actions in a video is a challenging task which
has applications in various fields. Previous works in this area have either
used images from a 2D or 3D camera. Few have used the idea that human actions
can be easily identified by the movement of the joints in the 3D space and
instead used a Recurrent Neural Network (RNN) for modeling. Convolutional
neural networks (CNN) have the ability to recognise even the complex patterns
in data which makes it suitable for detecting human actions. Thus, we modeled a
CNN which can predict the human activity using the joint data. Furthermore,
using the joint data representation has the benefit of lower dimensionality
than image or video representations. This makes our model simpler and faster
than the RNN models. In this study, we have developed a six layer convolutional
network, which reduces each input feature vector of the form 15x1961x4 to an
one dimensional binary vector which gives us the predicted activity. Results:
Our model is able to recognise an activity correctly upto 87% accuracy. Joint
data is taken from the Cornell Activity Datasets which have day to day
activities like talking, relaxing, eating, cooking etc.
|
[
{
"version": "v1",
"created": "Tue, 20 Dec 2016 15:20:28 GMT"
}
] | 2016-12-21T00:00:00 |
[
[
"Jayabalan",
"Adhavan",
""
],
[
"Karunakaran",
"Harish",
""
],
[
"Murlidharan",
"Shravan",
""
],
[
"Shizume",
"Tesia",
""
]
] |
new_dataset
| 0.98406 |
1503.03013
|
MinKeun Chung
|
MinKeun Chung, Min Soo Sim, Jaeweon Kim, Dong Ku Kim, Chan-Byoung Chae
|
Prototyping Real-Time Full Duplex Radios
|
To appear in IEEE Communications Magazine
|
IEEE Communications Magazine, vol. 53, no. 9, pp. 56-63, Sep. 2015
| null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article, we present a real-time full duplex radio system for 5G
wireless networks. Full duplex radios are capable of opening new possibilities
in contexts of high traffic demand where there are limited radio resources. A
critical issue, however, to implementing full duplex radios, in real wireless
environments, is being able to cancel self-interference. To overcome the
self-interference challenge, we prototype our design on a software-defined
radio (SDR) platform. This design combines a dual-polarization antenna-based
analog part with a digital self-interference canceller that operates in
real-time. Prototype test results confirm that the proposed full-duplex system
achieves about 1.9 times higher throughput than a half-duplex system. This
article concludes with a discussion of implementationchallenges that remain for
researchers seeking the most viable solution for full duplex communications.
|
[
{
"version": "v1",
"created": "Tue, 10 Mar 2015 17:51:36 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Mar 2015 00:32:05 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Dec 2016 03:35:36 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Chung",
"MinKeun",
""
],
[
"Sim",
"Min Soo",
""
],
[
"Kim",
"Jaeweon",
""
],
[
"Kim",
"Dong Ku",
""
],
[
"Chae",
"Chan-Byoung",
""
]
] |
new_dataset
| 0.995779 |
1503.03465
|
Daniel Lemire
|
Daniel Lemire and Owen Kaser
|
Faster 64-bit universal hashing using carry-less multiplications
| null |
Journal of Cryptographic Engineering, Volume 6, Issue 3, pp
171-185, 2016
|
10.1007/s13389-015-0110-5
| null |
cs.DS cs.PF
|
http://creativecommons.org/licenses/by/4.0/
|
Intel and AMD support the Carry-less Multiplication (CLMUL) instruction set
in their x64 processors. We use CLMUL to implement an almost universal 64-bit
hash family (CLHASH). We compare this new family with what might be the fastest
almost universal family on x64 processors (VHASH). We find that CLHASH is at
least 60% faster. We also compare CLHASH with a popular hash function designed
for speed (Google's CityHash). We find that CLHASH is 40% faster than CityHash
on inputs larger than 64 bytes and just as fast otherwise.
|
[
{
"version": "v1",
"created": "Wed, 11 Mar 2015 19:47:09 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Mar 2015 15:32:20 GMT"
},
{
"version": "v3",
"created": "Mon, 16 Mar 2015 20:26:26 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Mar 2015 18:31:47 GMT"
},
{
"version": "v5",
"created": "Fri, 27 Mar 2015 20:45:29 GMT"
},
{
"version": "v6",
"created": "Fri, 26 Jun 2015 01:45:13 GMT"
},
{
"version": "v7",
"created": "Fri, 18 Sep 2015 00:10:17 GMT"
},
{
"version": "v8",
"created": "Wed, 4 Nov 2015 16:34:39 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Lemire",
"Daniel",
""
],
[
"Kaser",
"Owen",
""
]
] |
new_dataset
| 0.97684 |
1612.03448
|
Yunpeng Zang
|
Yunpeng Zang and Bernhard Walke and Guido Hiertz and Christian
Wietfeld
|
CSMA-based Packet Broadcast in Radio Channels with Hidden Stations
|
66 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Carrier Sense Multiple Access (CSMA) MAC protocols are known to suffer from
the hidden station (HS) problem. The complete mathematical analysis of CSMA
networks with HSs is still an open problem, even for broadcast communication
with a simple linear network topology. In this paper we address this challenge
by introducing a MAC layer modeling methodology based on time- and space-domain
Markov processes. Using this methodology we derive the closed-form solution for
the steady-state performance in infinite one-dimensional (1-D) CSMA networks
with HSs. The analytical results are validated by simulation and establish
that: 1) under the assumption of fixed frame duration, if the conditional
channel access probability at each station exceeds a certain threshold, the
CSMA system enters the status of "synchronized transmissions", where a large
number of adjacent stations transmit in overlap and interfere each other
resulting in null system goodput. 2) The maximum system goodput of CSMA
broadcast communication increases with increased station density but becomes
increasingly sensitive to the conditional channel access probability. In [25]
we validate the analytical results gained in this paper by simulation of a
multi-lane highway scenario, and provide quantitative guidance for congestion
control algorithms in vehicular networks.
|
[
{
"version": "v1",
"created": "Sun, 11 Dec 2016 18:26:17 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Dec 2016 19:31:54 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Zang",
"Yunpeng",
""
],
[
"Walke",
"Bernhard",
""
],
[
"Hiertz",
"Guido",
""
],
[
"Wietfeld",
"Christian",
""
]
] |
new_dataset
| 0.983177 |
1612.05702
|
Rongfei Fan
|
Rongfei Fan, Wen Chen, Hai Jiang, Jianping An, Kai Yang, Chengwen Xing
|
Dynamic Spectrum Leasing with Two Sellers
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies dynamic spectrum leasing in a cognitive radio network.
There are two spectrum sellers, who are two primary networks, each with an
amount of licensed spectrum bandwidth. When a seller has some unused spectrum,
it would like to lease the unused spectrum to secondary users. A coordinator
helps to perform the spectrum leasing stage-by-stage. As the two sellers may
have different leasing period, there are three epochs, in which seller 1 has
spectrum to lease in Epochs II and III, while seller 2 has spectrum to lease in
Epochs I and II. Each seller needs to decide how much spectrum it should lease
to secondary users in each stage of its leasing period, with a target at
revenue maximization. It is shown that, when the two sellers both have spectrum
to lease (i.e., in Epoch II), the spectrum leasing can be formulated as a
non-cooperative game. Nash equilibria of the game are found in closed form.
Solutions of the two users in the three epochs are derived.
|
[
{
"version": "v1",
"created": "Sat, 17 Dec 2016 03:29:27 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Fan",
"Rongfei",
""
],
[
"Chen",
"Wen",
""
],
[
"Jiang",
"Hai",
""
],
[
"An",
"Jianping",
""
],
[
"Yang",
"Kai",
""
],
[
"Xing",
"Chengwen",
""
]
] |
new_dataset
| 0.983202 |
1612.05887
|
Ahmed El Shafie
|
Ahmed El Shafie and Naofal Al-Dhahir
|
Secure Communications in the Presence of a Buffer-Aided Wireless-Powered
Relay With Self-Energy Recycling
|
Published in IEEE Wireless Communications Letters in October 2015,
http://ieeexplore.ieee.org/document/7296606/
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a relay-assisted wireless network, where the energy-harvesting
buffer-aided relay node is powered by radio-frequency signals from a source
node wishing to communicate with its destination. We propose two secure
cooperative protocols for a network composed of a source node equipped with a
data buffer communicating with its destination in the presence of a
buffer-aided relay node and an eavesdropper. Our proposed protocols are
designed based on the channel state information and the buffer state
information at the source and relay nodes. The burstiness of data at the source
node queue (buffer) and the energy recycling process at the relay are taken
into account in our analysis. In addition, we take the decoding and signal
processing circuit power consumption constraints into consideration. For the
limiting case of an infinite-size battery at the relay, we derive a sufficient
condition for the energy queue to saturate. Our numerical results demonstrate
the throughput gains of our proposed protocols.
|
[
{
"version": "v1",
"created": "Sun, 18 Dec 2016 10:18:10 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Shafie",
"Ahmed El",
""
],
[
"Al-Dhahir",
"Naofal",
""
]
] |
new_dataset
| 0.99651 |
1612.05975
|
Sylvain Cherrier
|
Sylvain Cherrier, Yacine M. Ghamri-Doudane, St\'ephane Lohier, Gilles
Roussel
|
D-LITe: Building Internet of Things Choreographies
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we present a complete architecture for designing Internet of
Things applications. While a main issue in this domain is the heterogeneity of
Objects hardware, networks and protocols, we propose D-LITe, a solution to hide
this wide range of low layer technologies. By abstracting the hardware, we
focus on object's features and not on its real characteristics. D-LITe aims to
give a universal access to object's internal processing and computational
power. A small virtual machine embedded in each object gives a universal view
of its functionalities. Each object's features are discovered and programmed
through the network, without any physical access. D-LITe comes with the SALT
language that describes the logical behaviour needed to include user's Objects
into an IoT application. This communication is based on REST architecture.
Gathering all these logical units into a global composition is our way to build
a services Choreography, in which each Object has its own task to achieve. This
paper presents also an analysis of the gain obtained when a Choreography is
used instead of the most common services.
|
[
{
"version": "v1",
"created": "Sun, 18 Dec 2016 19:21:19 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Cherrier",
"Sylvain",
""
],
[
"Ghamri-Doudane",
"Yacine M.",
""
],
[
"Lohier",
"Stéphane",
""
],
[
"Roussel",
"Gilles",
""
]
] |
new_dataset
| 0.998261 |
1612.06008
|
Dae-Sung Jang
|
Dae-Sung Jang, Hyeok-Joo Chae, and Han-Lim Choi
|
Optimal Control-Based UAV Path Planning with Dynamically-Constrained TSP
with Neighborhoods
|
17 pages, 7 figures
| null | null | null |
cs.RO cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses path planning of an unmanned aerial vehicle (UAV) with
remote sensing capabilities (or wireless communication capabilities). The goal
of the path planning is to find a minimum-flight-time closed tour of the UAV
visiting all executable areas of given remote sensing and communication tasks;
in order to incorporate the nonlinear vehicle dynamics, this problem is
regarded as a dynamically-constrained traveling salesman problem with
neighborhoods. To obtain a close-to-optimal solution for the path planning in a
tractable manner, a sampling-based roadmap algorithm that embeds an optimal
control-based path generation process is proposed. The algorithm improves the
computational efficiency by reducing numerical computations required for
optimizing inefficient local paths, and by extracting additional information
from a roadmap of a fixed number of samples. Comparative numerical simulations
validate the efficiency of the presented algorithm in reducing computation time
and improving the solution quality compared to previous roadmap-based planning
methods.
|
[
{
"version": "v1",
"created": "Sun, 18 Dec 2016 23:02:51 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Jang",
"Dae-Sung",
""
],
[
"Chae",
"Hyeok-Joo",
""
],
[
"Choi",
"Han-Lim",
""
]
] |
new_dataset
| 0.99818 |
1612.06056
|
Ahmed El Shafie
|
Ahmed El Shafie and Kamel Tourki and Naofal Al-Dhahir
|
An Artificial-Noise-Aided Hybrid TS/PS Scheme for OFDM-Based SWIPT
Systems
|
Accepted for publication in IEEE Communications Letters Dec 2016
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new artificial-noise aided hybrid time-switching/power-splitting
scheme for orthogonal frequency-division multiplexing (OFDM) systems to
securely transmit data and transfer energy to a legitimate receiving node. In
our proposed scheme, the cyclic prefix has two more benefits in addition to the
cancellation of the inter-symbol interference between the OFDM blocks. Firstly,
it enables the legitimate transmitter to send artificial-noise (AN) vectors in
a way such that the interference can be canceled at the legitimate receiver
prior to information decoding. Secondly, its power is used to energize the
legitimate receiver. We optimize the cyclic prefix length, the time-switching
and power-splitting parameters, and the power allocation ratio between the data
and AN signals at the legitimate transmitter to maximize the average secrecy
rate subject to a constraint on the average energy transfer rate at the
legitimate receiver. Our numerical results demonstrate that our proposed scheme
can achieve up to 23% average secrecy rate gain relative to a pure
power-splitting scheme.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2016 06:23:44 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Shafie",
"Ahmed El",
""
],
[
"Tourki",
"Kamel",
""
],
[
"Al-Dhahir",
"Naofal",
""
]
] |
new_dataset
| 0.992455 |
1612.06162
|
Gerhard Gossen
|
Gerhard Gossen, Elena Demidova and Thomas Risse
|
The iCrawl Wizard -- Supporting Interactive Focused Crawl Specification
|
Published in the Proceedings of the European Conference on
Information Retrieval (ECIR) 2015
| null |
10.1007/978-3-319-16354-3_88
| null |
cs.DL cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Collections of Web documents about specific topics are needed for many areas
of current research. Focused crawling enables the creation of such collections
on demand. Current focused crawlers require the user to manually specify
starting points for the crawl (seed URLs). These are also used to describe the
expected topic of the collection. The choice of seed URLs influences the
quality of the resulting collection and requires a lot of expertise. In this
demonstration we present the iCrawl Wizard, a tool that assists users in
defining focused crawls efficiently and semi-automatically. Our tool uses major
search engines and Social Media APIs as well as information extraction
techniques to find seed URLs and a semantic description of the crawl intent.
Using the iCrawl Wizard even non-expert users can create semantic
specifications for focused crawlers interactively and efficiently.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2016 13:09:15 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Gossen",
"Gerhard",
""
],
[
"Demidova",
"Elena",
""
],
[
"Risse",
"Thomas",
""
]
] |
new_dataset
| 0.953844 |
1612.06164
|
Dimitrios Kanoulas
|
Dimitrios Kanoulas
|
Curved Surface Patches for Rough Terrain Perception
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Attaining animal-like legged locomotion on rough outdoor terrain with sparse
foothold affordances -a primary use-case for legs vs other forms of locomotion-
is a largely open problem. New advancements in control and perception have
enabled bipeds to walk on flat and uneven indoor environments. But tasks that
require reliable contact with unstructured world surfaces, for example walking
on natural rocky terrain, need new perception and control algorithms.
This thesis introduces 3D perception algorithms for contact tasks such as
foot placement in rough terrain environments. We introduce a new method to
identify and model potential contact areas between the robot's foot and a
surface using a set of bounded curved patches. We present a patch
parameterization model and an algorithm to fit and perceptually validate
patches to 3D point samples. Having defined the environment representation
using the patch model, we introduce a way to assemble patches into a spatial
map. This map represents a sparse set of local areas potentially appropriate
for contact between the robot and the surface. The process of creating such a
map includes sparse seed point sampling, neighborhood searching, as well as
patch fitting and validation. Various ways of sampling are introduced including
a real time bio-inspired system for finding patches statistically similar to
those that humans select while traversing rocky trails. These sparse patch
algorithms are integrated with a dense volumetric fusion of range data from a
moving depth camera, maintaining a dynamic patch map of relevant contact
surfaces around a robot in real time. We integrate and test the algorithms as
part of a real-time foothold perception system on a mini-biped robot,
performing foot placements on rocks.
|
[
{
"version": "v1",
"created": "Mon, 19 Dec 2016 13:13:28 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Kanoulas",
"Dimitrios",
""
]
] |
new_dataset
| 0.999791 |
1612.06287
|
Antoine Deleforge
|
Cl\'ement Gaultier (PANAMA), Saurabh Kataria (PANAMA, IIT Kanpur),
Antoine Deleforge (PANAMA)
|
VAST : The Virtual Acoustic Space Traveler Dataset
|
International Conference on Latent Variable Analysis and Signal
Separation (LVA/ICA), Feb 2017, Grenoble, France. International Conference on
Latent Variable Analysis and Signal Separation
| null | null | null |
cs.SD cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a new paradigm for sound source lo-calization referred
to as virtual acoustic space traveling (VAST) and presents a first dataset
designed for this purpose. Existing sound source localization methods are
either based on an approximate physical model (physics-driven) or on a
specific-purpose calibration set (data-driven). With VAST, the idea is to learn
a mapping from audio features to desired audio properties using a massive
dataset of simulated room impulse responses. This virtual dataset is designed
to be maximally representative of the potential audio scenes that the
considered system may be evolving in, while remaining reasonably compact. We
show that virtually-learned mappings on this dataset generalize to real data,
overcoming some intrinsic limitations of traditional binaural sound
localization methods based on time differences of arrival.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2016 15:40:44 GMT"
}
] | 2016-12-20T00:00:00 |
[
[
"Gaultier",
"Clément",
"",
"PANAMA"
],
[
"Kataria",
"Saurabh",
"",
"PANAMA, IIT Kanpur"
],
[
"Deleforge",
"Antoine",
"",
"PANAMA"
]
] |
new_dataset
| 0.999804 |
1612.00985
|
Fabian Fl\"ock
|
Martin K\"orner, Tatiana Sennikova, Florian Windh\"auser, Claudia
Wagner and Fabian Fl\"ock
|
Wikiwhere: An interactive tool for studying the geographical provenance
of Wikipedia references
|
4 pages, 2 tables, 1 figure
| null | null | null |
cs.HC cs.CY
|
http://creativecommons.org/licenses/by/4.0/
|
Wikipedia articles about the same topic in different language editions are
built around different sources of information. For example, one can find very
different news articles linked as references in the English Wikipedia article
titled "Annexation of Crimea by the Russian Federation" than in its German
counterpart (determined via Wikipedia's language links). Some of this
difference can of course be attributed to the different language proficiencies
of readers and editors in separate language editions, yet, although including
English-language news sources seems to be no issue in the German edition,
English references that are listed do not overlap highly with the ones in the
article's English version. Such patterns could be an indicator of bias towards
certain national contexts when referencing facts and statements in Wikipedia.
However, determining for each reference which national context it can be traced
back to, and comparing the link distributions to each other is infeasible for
casual readers or scientists with non-technical backgrounds. Wikiwhere answers
the question where Web references stem from by analyzing and visualizing the
geographic location of external reference links that are included in a given
Wikipedia article. Instead of relying solely on the IP location of a given URL
our machine learning models consider several features.
|
[
{
"version": "v1",
"created": "Sat, 3 Dec 2016 16:45:26 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Dec 2016 10:44:56 GMT"
}
] | 2016-12-19T00:00:00 |
[
[
"Körner",
"Martin",
""
],
[
"Sennikova",
"Tatiana",
""
],
[
"Windhäuser",
"Florian",
""
],
[
"Wagner",
"Claudia",
""
],
[
"Flöck",
"Fabian",
""
]
] |
new_dataset
| 0.998559 |
1612.04457
|
Xiaohu Ge
|
Xiaohu Ge, Ran Zi, Xusheng Xiong, Qiang Li, Liang Wang
|
Millimeter Wave Communications with OAM-SM Scheme for Future Mobile
Networks
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://creativecommons.org/licenses/by/4.0/
|
The orbital angular momentum (OAM) technique provides a new degree of freedom
for information transmissions in millimeter wave communications. Considering
the spatial distribution characteristics of OAM beams, a new OAM spatial
modulation (OAM-SM) millimeter wave communication system is first proposed for
future mobile networks. Furthermore, the capacity, average bit error
probability and energy efficiency of OAM-SM millimeter wave communication
systems are analytically derived for performance analysis. Compared with the
conventional multi-input multi-output (MIMO) millimeter wave communication
systems, the maximum capacity and energy efficiency of OAM-SM millimeter wave
communication systems are improved by 36% and 472.3%, respectively. Moreover,
numerical results indicate that the proposed OAM-SM millimeter wave
communication systems are more robust to path-loss attenuations than the
conventional MIMO millimeter wave communication systems, which makes it
suitable for long-range transmissions. Therefore, OAM-SM millimeter wave
communication systems provide a great growth space for future mobile networks.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2016 02:10:42 GMT"
}
] | 2016-12-19T00:00:00 |
[
[
"Ge",
"Xiaohu",
""
],
[
"Zi",
"Ran",
""
],
[
"Xiong",
"Xusheng",
""
],
[
"Li",
"Qiang",
""
],
[
"Wang",
"Liang",
""
]
] |
new_dataset
| 0.999587 |
1612.04463
|
Xiaohu Ge
|
Jiaqi Chen, Fen Bin, Xiaohu Ge, Qiang Li, Cheng-Xiang Wang
|
A Dual-Directional Path-loss Model in 5G Wireless Fractal Small Cell
Networks
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://creativecommons.org/licenses/by/4.0/
|
With the anticipated increase in the number of low power base stations (BSs)
deployed in small cell networks, blockage effects becoming more sensitive on
wireless transmissions over high spectrums, variable propagation fading
scenarios make it hard to describe coverage of small cell networks. In this
paper, we propose a dual-directional path loss model cooperating with
Line-of-Sight (LoS) and Non-Line-of-Sight (NLoS) transmissions for the fifth
generation (5G) fractal small cell networks. Based on the proposed path loss
model, a LoS transmission probability is derived as a function of the
coordinate azimuth of the BS and the distance between the mobile user (MU) and
the BS. Moreover, the coverage probability and the average achievable rate are
analyzed for 5G fractal small cell networks. Numerical results imply that the
minimum intensity of blockages and the maximum intensity of BSs can not
guarantee the maximum average achievable rate in 5G fractal small cell
networks. Our results explore the relationship between the anisotropic path
loss fading and the small cell coverage in 5G fractal small cell networks.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2016 02:42:12 GMT"
}
] | 2016-12-19T00:00:00 |
[
[
"Chen",
"Jiaqi",
""
],
[
"Bin",
"Fen",
""
],
[
"Ge",
"Xiaohu",
""
],
[
"Li",
"Qiang",
""
],
[
"Wang",
"Cheng-Xiang",
""
]
] |
new_dataset
| 0.982975 |
1612.05306
|
Kang Gao
|
Kang Gao, Mingming Cai, Ding Nie, Bertrand Hochwald, J. Nicholas
Laneman, Huang Huang, Kunpeng Liu
|
Beampattern-Based Tracking for Millimeter Wave Communication Systems
|
6 pages, to be published in Proc. IEEE GLOBECOM 2016, Washington,
D.C., USA
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a tracking algorithm to maintain the communication link between a
base station (BS) and a mobile station (MS) in a millimeter wave (mmWave)
communication system, where antenna arrays are used for beamforming in both the
BS and MS. Downlink transmission is considered, and the tracking is performed
at the MS as it moves relative to the BS. Specifically, we consider the case
that the MS rotates quickly due to hand movement. The algorithm estimates the
angle of arrival (AoA) by using variations in the radiation pattern of the beam
as a function of this angle. Numerical results show that the algorithm achieves
accurate beam alignment when the MS rotates in a wide range of angular speeds.
For example, the algorithm can support angular speeds up to 800 degrees per
second when tracking updates are available every 10 ms.
|
[
{
"version": "v1",
"created": "Thu, 15 Dec 2016 23:30:30 GMT"
}
] | 2016-12-19T00:00:00 |
[
[
"Gao",
"Kang",
""
],
[
"Cai",
"Mingming",
""
],
[
"Nie",
"Ding",
""
],
[
"Hochwald",
"Bertrand",
""
],
[
"Laneman",
"J. Nicholas",
""
],
[
"Huang",
"Huang",
""
],
[
"Liu",
"Kunpeng",
""
]
] |
new_dataset
| 0.994095 |
1612.05523
|
Minjia Shi
|
Minjia Shi, Yue Guan
|
Two-weight codes from trace codes over $R_k$
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We construct a family of two-Lee-weight codes over the ring $R_k,$ which is
defined as trace codes with algebraic structure of abelian codes. The Lee
weight distribution of the two-weight codes is given. Taking the Gray map, we
obtain optimal abelian binary two-weight codes by using the Griesmer bound. An
application to secret sharing schemes is also given.
|
[
{
"version": "v1",
"created": "Fri, 16 Dec 2016 16:00:25 GMT"
}
] | 2016-12-19T00:00:00 |
[
[
"Shi",
"Minjia",
""
],
[
"Guan",
"Yue",
""
]
] |
new_dataset
| 0.999837 |
1612.05626
|
Biplav Srivastava
|
Biplav Srivastava, Sandeep Sandha, Vaskar Raychoudhury, Sukanya
Randhawa, Viral Kapoor, Anmol Agrawal
|
An Open, Multi-Sensor, Dataset of Water Pollution of Ganga Basin and its
Application to Understand Impact of Large Religious Gathering
|
7 pages
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Water is a crucial pre-requisite for all human activities. Due to growing
demand from population and shrinking supply of potable water, there is an
urgent need to use computational methods to manage available water
intelligently, and especially in developing countries like India where even
basic data to track water availability or physical infrastructure to process
water are inadequate. In this context, we present a dataset of water pollution
containing quantitative and qualitative data from a combination for modalities
- real-time sensors, lab results, and estimates from people using mobile apps.
The data on our API-accessible cloud platform covers more than 60 locations and
consists of both what we have ourselves collected from multiple location
following a novel process, and from others (lab-results) which were open but
hither-to difficult to access. Further, we discuss an application of released
data to understand spatio-temporal pollution impact of a large event with
hundreds of millions of people converging on a river during a religious
gathering (Ardh Khumbh 2016) spread over months. Such unprecedented details can
help authorities manage an ongoing event or plan for future ones. The community
can use the data for any application and also contribute new data to the
platform.
|
[
{
"version": "v1",
"created": "Sun, 20 Nov 2016 01:45:36 GMT"
}
] | 2016-12-19T00:00:00 |
[
[
"Srivastava",
"Biplav",
""
],
[
"Sandha",
"Sandeep",
""
],
[
"Raychoudhury",
"Vaskar",
""
],
[
"Randhawa",
"Sukanya",
""
],
[
"Kapoor",
"Viral",
""
],
[
"Agrawal",
"Anmol",
""
]
] |
new_dataset
| 0.999714 |
1506.00740
|
Ryan Gabrys
|
Ryan Gabrys, Han Mao Kiah, and Olgica Milenkovic
|
Asymmetric Lee Distance Codes for DNA-Based Storage
| null | null | null | null |
cs.IT math.IT
|
http://creativecommons.org/publicdomain/zero/1.0/
|
We consider a new family of codes, termed asymmetric Lee distance codes, that
arise in the design and implementation of DNA-based storage systems and systems
with parallel string transmission protocols. The codewords are defined over a
quaternary alphabet, although the results carry over to other alphabet sizes;
furthermore, symbol confusability is dictated by their underlying binary
representation. Our contributions are two-fold. First, we demonstrate that the
new distance represents a linear combination of the Lee and Hamming distance
and derive upper bounds on the size of the codes under this metric based on
linear programming techniques. Second, we propose a number of code
constructions which imply lower bounds.
|
[
{
"version": "v1",
"created": "Tue, 2 Jun 2015 03:22:39 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Dec 2015 14:23:58 GMT"
},
{
"version": "v3",
"created": "Tue, 26 Jan 2016 04:09:14 GMT"
},
{
"version": "v4",
"created": "Thu, 8 Dec 2016 18:25:04 GMT"
},
{
"version": "v5",
"created": "Wed, 14 Dec 2016 23:14:00 GMT"
}
] | 2016-12-16T00:00:00 |
[
[
"Gabrys",
"Ryan",
""
],
[
"Kiah",
"Han Mao",
""
],
[
"Milenkovic",
"Olgica",
""
]
] |
new_dataset
| 0.998365 |
1612.04854
|
Michal Yarom
|
Michal Yarom and Michal Irani
|
Temporal-Needle: A view and appearance invariant video descriptor
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The ability to detect similar actions across videos can be very useful for
real-world applications in many fields. However, this task is still challenging
for existing systems, since videos that present the same action, can be taken
from significantly different viewing directions, performed by different actors
and backgrounds and under various video qualities. Video descriptors play a
significant role in these systems. In this work we propose the
"temporal-needle" descriptor which captures the dynamic behavior, while being
invariant to viewpoint and appearance. The descriptor is computed using multi
temporal scales of the video and by computing self-similarity for every patch
through time in every temporal scale. The descriptor is computed for every
pixel in the video. However, to find similar actions across videos, we consider
only a small subset of the descriptors - the statistical significant
descriptors. This allow us to find good correspondences across videos more
efficiently. Using the descriptor, we were able to detect the same behavior
across videos in a variety of scenarios. We demonstrate the use of the
descriptor in tasks such as temporal and spatial alignment, action detection
and even show its potential in unsupervised video clustering into categories.
In this work we handled only videos taken with stationary cameras, but the
descriptor can be extended to handle moving camera as well.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2016 21:46:09 GMT"
}
] | 2016-12-16T00:00:00 |
[
[
"Yarom",
"Michal",
""
],
[
"Irani",
"Michal",
""
]
] |
new_dataset
| 0.996925 |
1612.04855
|
Bayan Nasri
|
Bayan Nasri, Sunit P. Sebastian, Kae-Dyi You, RamKumar RanjithKumar,
Davood Shahrjerdi
|
A 700uW 1GS/s 4-bit Folding-Flash ADC in 65nm CMOS for Wideband Wireless
Communications
|
submitted to the the IEEE International Symposium of Circuits and
Systems (ISCAS), 2017
| null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the design of a low-power 4-bit 1GS/s folding-flash ADC with a
folding factor of two. The design of a new unbalanced double-tail dynamic
comparator affords an ultra-low power operation and a high dynamic range.
Unlike the conventional approaches, this design uses a fully matched input
stage, an unbalanced latch stage, and a two-clock operation scheme. A
combination of these features yields significant reduction of the kick-back
noise, while allowing the design flexibility for adjusting the trip points of
the comparators. As a result, the ADC achieves SNDR of 22.3 dB at 100MHz and
21.8 dB at 500MHz (i.e. the Nyquist frequency). The maximum INL and DNL are
about 0.2 LSB. The converter consumes about 700uW from a 1-V supply yielding a
figure of merit of 65fJ/conversion step. These attributes make the proposed
folding-flash ADC attractive for the next-generation wireless applications.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2016 21:52:33 GMT"
}
] | 2016-12-16T00:00:00 |
[
[
"Nasri",
"Bayan",
""
],
[
"Sebastian",
"Sunit P.",
""
],
[
"You",
"Kae-Dyi",
""
],
[
"RanjithKumar",
"RamKumar",
""
],
[
"Shahrjerdi",
"Davood",
""
]
] |
new_dataset
| 0.99678 |
1612.05166
|
Tobias Strauch
|
Tobias Strauch
|
A Novel RTL ATPG Model Based on Gate Inherent Faults (GIF-PO) of Complex
Gates
| null | null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper starts with a comprehensive survey on RTL ATPG. It then proposes a
novel RTL ATPG model based on "Gate Inherent Faults" (GIF). These GIF are
extracted from each complex gate (adder, case-statement, etc.) of the RTL
source code individually. They are related to the internal logic paths of a
complex gate. They are not related to any net/signal in the RTL design. It is
observed, that when all GIF on RTL are covered (100%) and the same stimulus is
applied, then all gate level stuck-at faults of the netlist are covered (100%)
as well. The proposed RTL ATPG model is therefore synthesis independent. This
is shown on ITC'99 testcases. The applied semi-automatic test pattern
generation process is based on functional simulation.
|
[
{
"version": "v1",
"created": "Thu, 15 Dec 2016 17:55:06 GMT"
}
] | 2016-12-16T00:00:00 |
[
[
"Strauch",
"Tobias",
""
]
] |
new_dataset
| 0.997885 |
1612.05205
|
Mohammad Roohitavaf
|
Mohammad Roohitavaf and Sandeep Kulkarni
|
GentleRain+: Making GentleRain Robust on Clock Anomalies
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Causal consistency is in an intermediate consistency model that can be
achieved together with high availability and high performance requirements even
in presence of network partitions. There are several proposals in the
literature for causally consistent data stores. Thanks to the use of single
scalar physical clocks, GentleRain has a throughput higher than other proposals
such as COPS or Orbe. However, both of its correctness and performance relay on
monotonic synchronized physical clocks. Specifically, if physical clocks go
backward its correctness is violated. In addition, GentleRain is sensitive on
the clock synchronization, and clock skew may slow write operations in
GenlteRain. In this paper, we want to solve this issue in GenlteRain by using
Hybrid Logical Clock (HLC) instead of physical clocks. Using HLC, GentleRain
protocl is not sensitive on the clock skew anymore. In addition, even if clocks
go backward, the correctness of the system is not violated. Furthermore, by
HLC, we timestamp versions with a clock very close to the physical clocks.
Thus, we can take causally consistency snapshot of the system at any give
physical time. We call GentleRain protocol with HLCs GentleRain+. We have
implemented GentleRain+ protocol, and have evaluated it experimentally.
GentleRain+ provides faster write operations compare to GentleRain that rely
solely on physical clocks to achieve causal consistency. We have also shown
that using HLC instead of physical clock does not have any overhead. Thus, it
makes GentleRain more robust on clock anomalies at no cost.
|
[
{
"version": "v1",
"created": "Wed, 16 Nov 2016 05:10:09 GMT"
}
] | 2016-12-16T00:00:00 |
[
[
"Roohitavaf",
"Mohammad",
""
],
[
"Kulkarni",
"Sandeep",
""
]
] |
new_dataset
| 0.98923 |
1606.07399
|
Eran Treister
|
Lars Ruthotto, Eran Treister and Eldad Haber
|
jInv -- a flexible Julia package for PDE parameter estimation
| null | null | null | null |
cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Estimating parameters of Partial Differential Equations (PDEs) from noisy and
indirect measurements often requires solving ill-posed inverse problems. These
so called parameter estimation or inverse medium problems arise in a variety of
applications such as geophysical, medical imaging, and nondestructive testing.
Their solution is computationally intense since the underlying PDEs need to be
solved numerous times until the reconstruction of the parameters is
sufficiently accurate. Typically, the computational demand grows significantly
when more measurements are available, which poses severe challenges to
inversion algorithms as measurement devices become more powerful.
In this paper we present jInv, a flexible framework and open source software
that provides parallel algorithms for solving parameter estimation problems
with many measurements. Being written in the expressive programming language
Julia, jInv is portable, easy to understand and extend, cross-platform tested,
and well-documented. It provides novel parallelization schemes that exploit the
inherent structure of many parameter estimation problems and can be used to
solve multiphysics inversion problems as is demonstrated using numerical
experiments motivated by geophysical imaging.
|
[
{
"version": "v1",
"created": "Thu, 23 Jun 2016 18:37:41 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Dec 2016 07:58:27 GMT"
}
] | 2016-12-15T00:00:00 |
[
[
"Ruthotto",
"Lars",
""
],
[
"Treister",
"Eran",
""
],
[
"Haber",
"Eldad",
""
]
] |
new_dataset
| 0.977062 |
1609.05258
|
J\"urgen Leitner
|
J\"urgen Leitner, Adam W. Tow, Jake E. Dean, Niko Suenderhauf, Joseph
W. Durham, Matthew Cooper, Markus Eich, Christopher Lehnert, Ruben Mangels,
Christopher McCool, Peter Kujala, Lachlan Nicholson, Trung Pham, James
Sergeant, Liao Wu, Fangyi Zhang, Ben Upcroft, and Peter Corke
|
The ACRV Picking Benchmark (APB): A Robotic Shelf Picking Benchmark to
Foster Reproducible Research
|
8 pages, submitted to RA:Letters
| null | null | null |
cs.RO cs.AI cs.CV cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Robotic challenges like the Amazon Picking Challenge (APC) or the DARPA
Challenges are an established and important way to drive scientific progress.
They make research comparable on a well-defined benchmark with equal test
conditions for all participants. However, such challenge events occur only
occasionally, are limited to a small number of contestants, and the test
conditions are very difficult to replicate after the main event. We present a
new physical benchmark challenge for robotic picking: the ACRV Picking
Benchmark (APB). Designed to be reproducible, it consists of a set of 42 common
objects, a widely available shelf, and exact guidelines for object arrangement
using stencils. A well-defined evaluation protocol enables the comparison of
\emph{complete} robotic systems -- including perception and manipulation --
instead of sub-systems only. Our paper also describes and reports results
achieved by an open baseline system based on a Baxter robot.
|
[
{
"version": "v1",
"created": "Sat, 17 Sep 2016 00:07:54 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Dec 2016 09:06:49 GMT"
}
] | 2016-12-15T00:00:00 |
[
[
"Leitner",
"Jürgen",
""
],
[
"Tow",
"Adam W.",
""
],
[
"Dean",
"Jake E.",
""
],
[
"Suenderhauf",
"Niko",
""
],
[
"Durham",
"Joseph W.",
""
],
[
"Cooper",
"Matthew",
""
],
[
"Eich",
"Markus",
""
],
[
"Lehnert",
"Christopher",
""
],
[
"Mangels",
"Ruben",
""
],
[
"McCool",
"Christopher",
""
],
[
"Kujala",
"Peter",
""
],
[
"Nicholson",
"Lachlan",
""
],
[
"Pham",
"Trung",
""
],
[
"Sergeant",
"James",
""
],
[
"Wu",
"Liao",
""
],
[
"Zhang",
"Fangyi",
""
],
[
"Upcroft",
"Ben",
""
],
[
"Corke",
"Peter",
""
]
] |
new_dataset
| 0.999303 |
1612.04391
|
Mason Bretan
|
Mason Bretan, Deepak Gopinath, Philip Mullins, Gil Weinberg
|
A Robotic Prosthesis for an Amputee Drummer
| null | null | null | null |
cs.RO cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The design and evaluation of a robotic prosthesis for a drummer with a
transradial amputation is presented. The principal objective of the prosthesis
is to simulate the role fingers play in drumming. This primarily includes
controlling the manner in which the drum stick rebounds after initial impact.
This is achieved using a DC motor driven by a variable impedance control
framework in a shared control system. The user's ability to perform with and
control the prosthesis is evaluated using a musical synchronization study. A
secondary objective of the prosthesis is to explore the implications of musical
expression and human-robotic interaction when a second, completely autonomous,
stick is added to the prosthesis. This wearable robotic musician interacts with
the user by listening to the music and responding with different rhythms and
behaviors. We recount some empirical findings based on the user's experience of
performing under such a paradigm.
|
[
{
"version": "v1",
"created": "Tue, 13 Dec 2016 21:03:34 GMT"
}
] | 2016-12-15T00:00:00 |
[
[
"Bretan",
"Mason",
""
],
[
"Gopinath",
"Deepak",
""
],
[
"Mullins",
"Philip",
""
],
[
"Weinberg",
"Gil",
""
]
] |
new_dataset
| 0.999653 |
1612.04430
|
Marc Mosko
|
Marc Mosko and Glenn Scott and Dave Oran
|
Aesop Fable for Network Loops
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Detecting loops in data networks usually involves counting down a hop limit
or caching data at each hop to detect a cycle. Using a hop limit means that the
origin of a packet must know the maximum distance a packet could travel without
loops. It also means a loop is not detected until it travels that maximum
distance, even if that is many loops. Caching a packet signature at each hop,
such as a hash or nonce, could require large amounts of memory at every hop
because that cached information must persist for as long as a loop could
forward packets. This paper presents a new distributed loop detection mechanism
based on a Tortoise and Hare algorithm that can quickly detect loops without
caching per-packet data at each hop with a modest amount of additional state in
each packet.
|
[
{
"version": "v1",
"created": "Tue, 13 Dec 2016 23:33:44 GMT"
}
] | 2016-12-15T00:00:00 |
[
[
"Mosko",
"Marc",
""
],
[
"Scott",
"Glenn",
""
],
[
"Oran",
"Dave",
""
]
] |
new_dataset
| 0.999274 |
1612.04456
|
Deng Tang
|
Deng Tang, Claude Carlet and Zhengchun Zhou
|
Binary Linear Codes From Vectorial Boolean Functions and Their Weight
Distribution
|
30 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Binary linear codes with good parameters have important applications in
secret sharing schemes, authentication codes, association schemes, and consumer
electronics and communications. In this paper, we construct several classes of
binary linear codes from vectorial Boolean functions and determine their
parameters, by further studying a generic construction developed by Ding
\emph{et al.} recently. First, by employing perfect nonlinear functions and
almost bent functions, we obtain several classes of six-weight linear codes
which contains the all-one codeword. Second, we investigate a subcode of any
linear code mentioned above and consider its parameters. When the vectorial
Boolean function is a perfect nonlinear function or a Gold function in odd
dimension, we can completely determine the weight distribution of this subcode.
Besides, our linear codes have larger dimensions than the ones by Ding et al.'s
generic construction.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2016 02:09:52 GMT"
}
] | 2016-12-15T00:00:00 |
[
[
"Tang",
"Deng",
""
],
[
"Carlet",
"Claude",
""
],
[
"Zhou",
"Zhengchun",
""
]
] |
new_dataset
| 0.999208 |
1612.04515
|
Minjia Shi
|
Shi Minjia, Qian Liqin, Sole Patrick
|
New few weight codes from trace codes over a local Ring
|
19 pages. arXiv admin note: text overlap with arXiv:1612.00128
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, new few weights linear codes over the local ring
$R=\mathbb{F}_p+u\mathbb{F}_p+v\mathbb{F}_p+uv\mathbb{F}_p,$ with $u^2=v^2=0,
uv=vu,$ are constructed by using the trace function defined over an extension
ring of degree $m.$ %In fact, These codes are punctured from the linear code is
defined in \cite{SWLP} up to coordinate permutations. These trace codes have
the algebraic structure of abelian codes. Their weight distributions are
evaluated explicitly by means of Gaussian sums over finite fields. Two
different defining sets are explored.
Using a linear Gray map from $R$ to $\mathbb{F}_p^4,$ we obtain several
families of new $p$-ary codes from trace codes of dimension $4m$. For the first
defining set: when $m$ is even, or $m$ is odd and $p\equiv3 ~({\rm mod} ~4),$
we obtain a new family of two-weight codes, which are shown to be optimal by
the application of the Griesmer bound; when $m$ is even and under some special
conditions, we obtain two new classes of three-weight codes. For the second
defining set: we obtain a new class of two-weight codes and prove that it meets
the Griesmer bound. In addition, we give the minimum distance of the dual code.
Finally, applications of the $p$-ary image codes in secret sharing schemes are
presented.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2016 07:31:24 GMT"
}
] | 2016-12-15T00:00:00 |
[
[
"Minjia",
"Shi",
""
],
[
"Liqin",
"Qian",
""
],
[
"Patrick",
"Sole",
""
]
] |
new_dataset
| 0.999835 |
1612.04609
|
Ruobing Xie
|
Ruobing Xie, Zhiyuan Liu, Rui Yan, Maosong Sun
|
Neural Emoji Recommendation in Dialogue Systems
|
7 pages
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Emoji is an essential component in dialogues which has been broadly utilized
on almost all social platforms. It could express more delicate feelings beyond
plain texts and thus smooth the communications between users, making dialogue
systems more anthropomorphic and vivid. In this paper, we focus on
automatically recommending appropriate emojis given the contextual information
in multi-turn dialogue systems, where the challenges locate in understanding
the whole conversations. More specifically, we propose the hierarchical long
short-term memory model (H-LSTM) to construct dialogue representations,
followed by a softmax classifier for emoji classification. We evaluate our
models on the task of emoji classification in a real-world dataset, with some
further explorations on parameter sensitivity and case study. Experimental
results demonstrate that our method achieves the best performances on all
evaluation metrics. It indicates that our method could well capture the
contextual information and emotion flow in dialogues, which is significant for
emoji recommendation.
|
[
{
"version": "v1",
"created": "Wed, 14 Dec 2016 12:46:18 GMT"
}
] | 2016-12-15T00:00:00 |
[
[
"Xie",
"Ruobing",
""
],
[
"Liu",
"Zhiyuan",
""
],
[
"Yan",
"Rui",
""
],
[
"Sun",
"Maosong",
""
]
] |
new_dataset
| 0.989453 |
1612.04692
|
Dr. Zubair Asghar
|
Muhammad Zubair Asghar, Ulfat Batool, Farheen Bibi, Sadia Ismail,
Syeda Rabail Zahra
|
Financial Studio: Android Based Application for Computing Tax, Pension,
Zakat and Loan
|
22 pages, International Journal of Academic Research [ISSN:
2075-4124] Vol.4 Issue. 2 & pp. 96-117
|
International Journal of Academic Research [ISSN: 2075-4124],
Vol.4 Issue. 2 & pp. 96-117
| null | null |
cs.CY
|
http://creativecommons.org/licenses/by/4.0/
|
This work deals with the development of android-based financial studio, an
integrated application for calculating tax, pension, zakat, and loan. Financial
studio can facilitate employers of any department and other individuals. The
application is developed using MIT app inventor-based android platform. The
financial studio has four computational modules, namely: (i) tax, (ii) pension,
(iii) zakat, and (iv) loan. The system provides an integrated environment for
performing aforementioned distinct calculations by integrating different
financial modules into a single application in a user-friendly way. The
statistical analysis shows that the application is effective to deal with
different financial calculations
|
[
{
"version": "v1",
"created": "Thu, 12 May 2016 04:35:57 GMT"
}
] | 2016-12-15T00:00:00 |
[
[
"Asghar",
"Muhammad Zubair",
""
],
[
"Batool",
"Ulfat",
""
],
[
"Bibi",
"Farheen",
""
],
[
"Ismail",
"Sadia",
""
],
[
"Zahra",
"Syeda Rabail",
""
]
] |
new_dataset
| 0.991004 |
1510.00432
|
Abhronil Sengupta
|
Abhronil Sengupta, Aparajita Banerjee, Kaushik Roy
|
Hybrid Spintronic-CMOS Spiking Neural Network With On-Chip Learning:
Devices, Circuits and Systems
|
The article will appear in a future issue of Physical Review Applied
|
Phys. Rev. Applied 6, 064003 (2016)
|
10.1103/PhysRevApplied.6.064003
| null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Over the past decade Spiking Neural Networks (SNN) have emerged as one of the
popular architectures to emulate the brain. In SNN, information is temporally
encoded and communication between neurons is accomplished by means of spikes.
In such networks, spike-timing dependent plasticity mechanisms require the
online programming of synapses based on the temporal information of spikes
transmitted by spiking neurons. In this work, we propose a spintronic synapse
with decoupled spike transmission and programming current paths. The spintronic
synapse consists of a ferromagnet-heavy metal heterostructure where programming
current through the heavy metal generates spin-orbit torque to modulate the
device conductance. Low programming energy and fast programming times
demonstrate the efficacy of the proposed device as a nanoelectronic synapse. We
perform a simulation study based on an experimentally benchmarked
device-simulation framework to demonstrate the interfacing of such spintronic
synapses with CMOS neurons and learning circuits operating in transistor
sub-threshold region to form a network of spiking neurons that can be utilized
for pattern recognition problems.
|
[
{
"version": "v1",
"created": "Thu, 1 Oct 2015 22:01:20 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Nov 2015 18:02:36 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Nov 2016 19:58:35 GMT"
},
{
"version": "v4",
"created": "Fri, 4 Nov 2016 00:25:28 GMT"
}
] | 2016-12-14T00:00:00 |
[
[
"Sengupta",
"Abhronil",
""
],
[
"Banerjee",
"Aparajita",
""
],
[
"Roy",
"Kaushik",
""
]
] |
new_dataset
| 0.97334 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.