id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1611.09496
Ruiming Tang
Huifeng Guo, Ruiming Tang, Yunming Ye, Zhenguo Li, Xiuqiang He
A Graph-based Push Service Platform
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that learning customers' preference and making recommendations to them from today's information-exploded environment is critical and non-trivial in an on-line system. There are two different modes of recommendation systems, namely pull-mode and push-mode. The majority of the recommendation systems are pull-mode, which recommend items to users only when and after users enter Application Market. While push-mode works more actively to enhance or re-build connection between Application Market and users. As one of the most successful phone manufactures,both the number of users and apps increase dramatically in Huawei Application Store (also named Hispace Store), which has approximately 0.3 billion registered users and 1.2 million apps until 2016 and whose number of users is growing with high-speed. For the needs of real scenario, we establish a Push Service Platform (shortly, PSP) to discover the target user group automatically from web-scale user operation log data with an additional small set of labelled apps (usually around 10 apps),in Hispace Store. As presented in this work,PSP includes distributed storage layer, application layer and evaluation layer. In the application layer, we design a practical graph-based algorithm (named A-PARW) for user group discovery, which is an approximate version of partially absorbing random walk. Based on I mode of A-PARW, the effectiveness of our system is significantly improved, compared to the predecessor to presented system, which uses Personalized Pagerank in its application layer.
[ { "version": "v1", "created": "Tue, 29 Nov 2016 05:36:41 GMT" } ]
2016-11-30T00:00:00
[ [ "Guo", "Huifeng", "" ], [ "Tang", "Ruiming", "" ], [ "Ye", "Yunming", "" ], [ "Li", "Zhenguo", "" ], [ "He", "Xiuqiang", "" ] ]
new_dataset
0.992282
1611.09567
Walter Mascarenhas
Walter F. Mascarenhas
Moore: Interval Arithmetic in Modern C++
null
null
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the library Moore, which implements Interval Arithmetic in modern C++. This library is based on a new feature in the C++ language called concepts, which reduces the problems caused by template meta programming, and leads to a new approach for implementing interval arithmetic libraries in C++.
[ { "version": "v1", "created": "Tue, 29 Nov 2016 11:12:06 GMT" } ]
2016-11-30T00:00:00
[ [ "Mascarenhas", "Walter F.", "" ] ]
new_dataset
0.999631
1611.09671
Isha Gupta Ms.
Isha Gupta, Alexantrou Serb, Ali Khiat, Ralf Zeitler, Stefano Vassanelli, Themistoklis Prodromakis
Sub 100nW volatile nano-metal-oxide memristor as synaptic-like encoder of neuronal spikes
15 pages main article, 15 pages supplementary information, 2 pages supplementary notes
null
null
null
cs.ET
http://creativecommons.org/licenses/by/4.0/
Advanced neural interfaces mediate a bio-electronic link between the nervous system and microelectronic devices, bearing great potential as innovative therapy for various diseases. Spikes from a large number of neurons are recorded leading to creation of big data that require on-line processing under most stringent conditions, such as minimal power dissipation and on-chip space occupancy. Here, we present a new concept where the inherent volatile properties of a nano-scale memristive device are used to detect and compress information on neural spikes as recorded by a multi-electrode array. Simultaneously, and similarly to a biological synapse, information on spike amplitude and frequency is transduced in metastable resistive state transitions of the device, which is inherently capable of self-resetting and of continuous encoding of spiking activity. Furthermore, operating the memristor in a very high resistive state range reduces its average in-operando power dissipation to less than 100 nW, demonstrating the potential to build highly scalable, yet energy-efficient on-node processors for advanced neural interfaces.
[ { "version": "v1", "created": "Tue, 29 Nov 2016 15:04:45 GMT" } ]
2016-11-30T00:00:00
[ [ "Gupta", "Isha", "" ], [ "Serb", "Alexantrou", "" ], [ "Khiat", "Ali", "" ], [ "Zeitler", "Ralf", "" ], [ "Vassanelli", "Stefano", "" ], [ "Prodromakis", "Themistoklis", "" ] ]
new_dataset
0.999228
1611.09769
Shaikat Galib
Shaikat Galib, Fahima Islam, Muhammad Abir, and Hyoung-Koo Lee
Computer Aided Detection of Oral Lesions on CT Images
null
null
10.1088/1748-0221-10-12-C12030
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Oral lesions are important findings on computed tomography (CT) images. In this study, a fully automatic method to detect oral lesions in mandibular region from dental CT images is proposed. Two methods were developed to recognize two types of lesions namely (1) Close border (CB) lesions and (2) Open border (OB) lesions, which cover most of the lesion types that can be found on CT images. For the detection of CB lesions, fifteen features were extracted from each initial lesion candidates and multi layer perceptron (MLP) neural network was used to classify suspicious regions. Moreover, OB lesions were detected using a rule based image processing method, where no feature extraction or classification algorithm were used. The results were validated using a CT dataset of 52 patients, where 22 patients had abnormalities and 30 patients were normal. Using non-training dataset, CB detection algorithm yielded 71% sensitivity with 0.31 false positives per patient. Furthermore, OB detection algorithm achieved 100% sensitivity with 0.13 false positives per patient. Results suggest that, the proposed framework, which consists of two methods, has the potential to be used in clinical context, and assist radiologists for better diagnosis.
[ { "version": "v1", "created": "Tue, 29 Nov 2016 18:24:23 GMT" } ]
2016-11-30T00:00:00
[ [ "Galib", "Shaikat", "" ], [ "Islam", "Fahima", "" ], [ "Abir", "Muhammad", "" ], [ "Lee", "Hyoung-Koo", "" ] ]
new_dataset
0.983949
1611.09799
Hongyu Gong
Hongyu Gong, Suma Bhat, Pramod Viswanath
Geometry of Compositionality
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a simple test for compositionality (i.e., literal usage) of a word or phrase in a context-specific way. The test is computationally simple, relying on no external resources and only uses a set of trained word vectors. Experiments show that the proposed method is competitive with state of the art and displays high accuracy in context-specific compositionality detection of a variety of natural language phenomena (idiomaticity, sarcasm, metaphor) for different datasets in multiple languages. The key insight is to connect compositionality to a curious geometric property of word embeddings, which is of independent interest.
[ { "version": "v1", "created": "Tue, 29 Nov 2016 19:23:41 GMT" } ]
2016-11-30T00:00:00
[ [ "Gong", "Hongyu", "" ], [ "Bhat", "Suma", "" ], [ "Viswanath", "Pramod", "" ] ]
new_dataset
0.99655
1208.1476
Renate Schmidt
Renate A. Schmidt and Dmitry Tishkovsky
Using Tableau to Decide Description Logics with Full Role Negation and Identity
null
ACM Transactions on Computational Logic 15 (1), Article 7 (February 2014)
10.1145/2559947
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a tableau approach for deciding expressive description logics with full role negation and role identity. We consider the description logic ALBOid, which is the extension of ALC with the Boolean role operators, inverse of roles, the identity role, and includes full support for individuals and singleton concepts. ALBOid is expressively equivalent to the two-variable fragment of first-order logic with equality and subsumes Boolean modal logic. In this paper we define a sound and complete tableau calculus for the ALBOid that provides a basis for decision procedures for this logic and all its sublogics. An important novelty of our approach is the use of a generic unrestricted blocking mechanism. Being based on a conceptually simple rule, unrestricted blocking performs case distinctions over whether two individuals are equal or not and equality reasoning to find finite models. The blocking mechanism ties the proof of termination of tableau derivations to the finite model property of ALBOid.
[ { "version": "v1", "created": "Tue, 7 Aug 2012 17:41:37 GMT" }, { "version": "v2", "created": "Mon, 28 Nov 2016 08:06:05 GMT" } ]
2016-11-29T00:00:00
[ [ "Schmidt", "Renate A.", "" ], [ "Tishkovsky", "Dmitry", "" ] ]
new_dataset
0.994605
1511.04376
Martin Reisslein
Akhilesh Thyagaturu, Anu Mercian, Michael P. McGarry, Martin Reisslein, Wolfgang Kellerer
Software Defined Optical Networks (SDONs): A Comprehensive Survey
null
IEEE Communications Surveys & Tutorials, vol. 18, no. 4, pp. 2738-2786, 4th Qu. 2016
10.1109/COMST.2016.2586999
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The emerging Software Defined Networking (SDN) paradigm separates the data plane from the control plane and centralizes network control in an SDN controller. Applications interact with controllers to implement network services, such as network transport with Quality of Service (QoS). SDN facilitates the virtualization of network functions so that multiple virtual networks can operate over a given installed physical network infrastructure. Due to the specific characteristics of optical (photonic) communication components and the high optical transmission capacities, SDN based optical networking poses particular challenges, but holds also great potential. In this article, we comprehensively survey studies that examine the SDN paradigm in optical networks; in brief, we survey the area of Software Defined Optical Networks (SDONs). We mainly organize the SDON studies into studies focused on the infrastructure layer, the control layer, and the application layer. Moreover, we cover SDON studies focused on network virtualization, as well as SDON studies focused on the orchestration of multilayer and multidomain networking. Based on the survey, we identify open challenges for SDONs and outline future directions.
[ { "version": "v1", "created": "Fri, 13 Nov 2015 17:31:10 GMT" }, { "version": "v2", "created": "Thu, 26 May 2016 10:19:58 GMT" }, { "version": "v3", "created": "Sun, 17 Jul 2016 07:46:47 GMT" } ]
2016-11-29T00:00:00
[ [ "Thyagaturu", "Akhilesh", "" ], [ "Mercian", "Anu", "" ], [ "McGarry", "Michael P.", "" ], [ "Reisslein", "Martin", "" ], [ "Kellerer", "Wolfgang", "" ] ]
new_dataset
0.993611
1603.07442
Donggeun Yoo
Donggeun Yoo, Namil Kim, Sunggyun Park, Anthony S. Paek, In So Kweon
Pixel-Level Domain Transfer
Published in ECCV 2016. Code and dataset available at dgyoo.github.io
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an image-conditional image generation model. The model transfers an input domain to a target domain in semantic level, and generates the target image in pixel level. To generate realistic target images, we employ the real/fake-discriminator as in Generative Adversarial Nets, but also introduce a novel domain-discriminator to make the generated image relevant to the input image. We verify our model through a challenging task of generating a piece of clothing from an input image of a dressed person. We present a high quality clothing dataset containing the two domains, and succeed in demonstrating decent results.
[ { "version": "v1", "created": "Thu, 24 Mar 2016 05:20:59 GMT" }, { "version": "v2", "created": "Mon, 29 Aug 2016 01:20:33 GMT" }, { "version": "v3", "created": "Mon, 28 Nov 2016 13:17:40 GMT" } ]
2016-11-29T00:00:00
[ [ "Yoo", "Donggeun", "" ], [ "Kim", "Namil", "" ], [ "Park", "Sunggyun", "" ], [ "Paek", "Anthony S.", "" ], [ "Kweon", "In So", "" ] ]
new_dataset
0.996974
1606.02220
Therese Biedl
Therese Biedl and Claire Pennarun
Non-aligned drawings of planar graphs
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A non-aligned drawing of a graph is a drawing where no two vertices are in the same row or column. Auber et al. showed that not all planar graphs have non-aligned drawings that are straight-line, planar, and in the minimal-possible $n\times n$-grid. They also showed that such drawings exist if up to $n-3$ edges may have a bend. In this paper, we give algorithms for non-aligned planar drawings that improve on the results by Auber et al. In particular, we give such drawings in an $n\times n$-grid with significantly fewer bends, and we study what grid-size can be achieved if we insist on having straight-line drawings.
[ { "version": "v1", "created": "Tue, 7 Jun 2016 17:09:56 GMT" }, { "version": "v2", "created": "Fri, 10 Jun 2016 20:35:15 GMT" }, { "version": "v3", "created": "Wed, 31 Aug 2016 09:24:37 GMT" }, { "version": "v4", "created": "Mon, 28 Nov 2016 16:12:48 GMT" } ]
2016-11-29T00:00:00
[ [ "Biedl", "Therese", "" ], [ "Pennarun", "Claire", "" ] ]
new_dataset
0.997954
1606.03982
Tobias Denkinger
Tobias Denkinger
A Chomsky-Sch\"utzenberger representation for weighted multiple context-free languages
This is an extended and corrected version of a paper with the same title presented at the 12th International Conference on Finite-State Methods and Natural Language Processing (FSMNLP 2015)
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove a Chomsky-Sch\"utzenberger representation theorem for multiple context-free languages weighted over complete commutative strong bimonoids.
[ { "version": "v1", "created": "Mon, 13 Jun 2016 14:55:53 GMT" }, { "version": "v2", "created": "Mon, 28 Nov 2016 14:02:00 GMT" } ]
2016-11-29T00:00:00
[ [ "Denkinger", "Tobias", "" ] ]
new_dataset
0.999333
1611.06615
Minsoo Jung
Minsoo Jung, Sunmin Lee, Yongsub Lim, and U Kang
FURL: Fixed-memory and Uncertainty Reducing Local Triangle Counting for Graph Streams
24 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
How can we accurately estimate local triangles for all nodes in simple and multigraph streams? Local triangle counting in a graph stream is one of the most fundamental tasks in graph mining with important applications including anomaly detection and social network analysis. Although there have been several local triangle counting methods in a graph stream, their estimation has a large variance which results in low accuracy, and they do not consider multigraph streams which have duplicate edges. In this paper, we propose FURL, an accurate local triangle counting method for simple and multigraph streams. FURL improves the accuracy by reducing a variance through biased estimation and handles duplicate edges for multigraph streams. Also, FURL handles a stream of any size by using a fixed amount of memory. Experimental results show that FURL outperforms the state-of-the-art method in accuracy and performs well in multigraph streams. In addition, we report interesting patterns discovered from real graphs by FURL, which include unusual local structures in a user communication network and a core-periphery structure in the Web.
[ { "version": "v1", "created": "Mon, 21 Nov 2016 00:04:11 GMT" }, { "version": "v2", "created": "Sat, 26 Nov 2016 20:34:59 GMT" } ]
2016-11-29T00:00:00
[ [ "Jung", "Minsoo", "" ], [ "Lee", "Sunmin", "" ], [ "Lim", "Yongsub", "" ], [ "Kang", "U", "" ] ]
new_dataset
0.996122
1611.08419
Dirk Oliver Theis
Abdullah Makkeh and Mozhgan Pourmoradnasseri and Dirk Oliver Theis
The Graph of the Pedigree Polytope is Asymptotically Almost Complete (Extended Abstract)
CALDAM 2017
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graphs (1-skeletons) of Traveling-Salesman-related polytopes have attracted a lot of attention. Pedigree polytopes are extensions of the classical Symmetric Traveling Salesman Problem polytopes (Arthanari 2000) whose graphs contain the TSP polytope graphs as spanning subgraphs (Arthanari 2013). Unlike TSP polytopes, Pedigree polytopes are not "symmetric", e.g., their graphs are not vertex transitive, not even regular. We show that in the graph of the pedigree polytope, the quotient minimum degree over number of vertices tends to 1 as the number of cities tends to infinity.
[ { "version": "v1", "created": "Fri, 25 Nov 2016 11:07:34 GMT" }, { "version": "v2", "created": "Mon, 28 Nov 2016 05:43:34 GMT" } ]
2016-11-29T00:00:00
[ [ "Makkeh", "Abdullah", "" ], [ "Pourmoradnasseri", "Mozhgan", "" ], [ "Theis", "Dirk Oliver", "" ] ]
new_dataset
0.999606
1611.08431
Dirk Oliver Theis
Abdullah Makkeh and Mozhgan Pourmoradnasseri and Dirk Oliver Theis
On the Graph of the Pedigree Polytope
An extended abstract [arXiv:1611.08419] will appear in CALDAM 2017
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pedigree polytopes are extensions of the classical Symmetric Traveling Salesman Problem polytopes whose graphs (1-skeletons) contain the TSP polytope graphs as spanning subgraphs. While deciding adjacency of vertices in TSP polytopes is coNP-complete, Arthanari has given a combinatorial (polynomially decidable) characterization of adjacency in Pedigree polytopes. Based on this characterization, we study the graphs of Pedigree polytopes asymptotically, for large numbers of cities. Unlike TSP polytope graphs, which are vertex transitive, Pedigree graphs are not even regular. Using an "adjacency game" to handle Arthanari's intricate inductive characterization of adjacency, we prove that the minimum degree is asymptotically equal to the number of vertices, i.e., the graph is "asymptotically almost complete".
[ { "version": "v1", "created": "Fri, 25 Nov 2016 11:59:01 GMT" } ]
2016-11-29T00:00:00
[ [ "Makkeh", "Abdullah", "" ], [ "Pourmoradnasseri", "Mozhgan", "" ], [ "Theis", "Dirk Oliver", "" ] ]
new_dataset
0.998732
1611.08624
Odemir Bruno PhD
Lucas Correia Ribas, Odemir Martinez Bruno
Fast deterministic tourist walk for texture analysis
7 page, 7 figure
WVC 2016 proceedings p45-50
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deterministic tourist walk (DTW) has attracted increasing interest in computer vision. In the last years, different methods for analysis of dynamic and static textures were proposed. So far, all works based on the DTW for texture analysis use all image pixels as initial point of a walk. However, this requires much runtime. In this paper, we conducted a study to verify the performance of the DTW method according to the number of initial points to start a walk. The proposed method assigns a unique code to each image pixel, then, the pixels whose code is not divisible by a given $k$ value are ignored as initial points of walks. Feature vectors were extracted and a classification process was performed for different percentages of initial points. Experimental results on the Brodatz and Vistex datasets indicate that to use fewer pixels as initial points significantly improves the runtime compared to use all image pixels. In addition, the correct classification rate decreases very little.
[ { "version": "v1", "created": "Fri, 25 Nov 2016 22:21:05 GMT" } ]
2016-11-29T00:00:00
[ [ "Ribas", "Lucas Correia", "" ], [ "Bruno", "Odemir Martinez", "" ] ]
new_dataset
0.954265
1611.08690
Weidong Mei
Weidong Mei, Zhi Chen, Jun Fang
GSVD-Based Precoding in MIMO Systems With Integrated Services
IEEE Signal Processing Letters (Volume: 23, Issue: 11, Nov. 2016)
null
10.1109/LSP.2016.2606349
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter considers a two-receiver multiple-input multiple-output (MIMO) Gaussian broadcast channel model with integrated services. Specifically, we combine two sorts of service messages, and serve them simultaneously: one multicast message intended for both receivers and one confidential message intended for only one receiver. The confidential message is kept perfectly secure from the unauthorized receiver. Due to the coupling of service messages, it is intractable to seek capacity-achieving transmit covariance matrices. Accordingly, we propose a suboptimal precoding scheme based on the generalized singular value decomposition (GSVD). The GSVD produces several virtual orthogonal subchannels between the transmitter and the receivers. Subchannel allocation and power allocation between multicast message and confidential message are jointly optimized to maximize the secrecy rate in this letter, subject to the quality of multicast service (QoMS) constraints. Since this problem is inherently complex, a difference-of-concave (DC) algorithm, together with an exhaustive search, is exploited to handle the power allocation and subchannel allocation, respectively. Numerical results are presented to illustrate the efficacy of our proposed strategies.
[ { "version": "v1", "created": "Sat, 26 Nov 2016 09:43:44 GMT" } ]
2016-11-29T00:00:00
[ [ "Mei", "Weidong", "" ], [ "Chen", "Zhi", "" ], [ "Fang", "Jun", "" ] ]
new_dataset
0.99298
1611.08780
Yale Song
Yale Song
Real-Time Video Highlights for Yahoo Esports
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Esports has gained global popularity in recent years and several companies have started offering live streaming videos of esports games and events. This creates opportunities to develop large scale video understanding systems for new product features and services. We present a technique for detecting highlights from live streaming videos of esports game matches. Most video games use pronounced visual effects to emphasize highlight moments; we use CNNs to learn convolution filters of those visual effects for detecting highlights. We propose a cascaded prediction approach that allows us to deal with several challenges arise in a production environment. We demonstrate our technique on our new dataset of three popular game titles, Heroes of the Storm, League of Legends, and Dota 2. Our technique achieves 18 FPS on a single CPU with an average precision of up to 83.18%. Part of our technique is currently deployed in production on Yahoo Esports.
[ { "version": "v1", "created": "Sun, 27 Nov 2016 03:58:41 GMT" } ]
2016-11-29T00:00:00
[ [ "Song", "Yale", "" ] ]
new_dataset
0.997129
1611.08905
Stanislaw Gorlow
Stanislaw Gorlow and Mathieu Ramona and Fran\c{c}ois Pachet
SISO and SIMO Accompaniment Cancellation for Live Solo Recordings Based on Short-Time ERB-Band Wiener Filtering and Spectral Subtraction
null
null
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research in collaborative music learning is subject to unresolved problems demanding new technological solutions. One such problem poses the suppression of the accompaniment in a live recording of a performance during practice, which can be for the purposes of self-assessment or further machine-aided analysis. Being able to separate a solo from the accompaniment allows to create learning agents that may act as personal tutors and help the apprentice improve his or her technique. First, we start from the classical adaptive noise cancelling approach, and adjust it to the problem at hand. In a second step, we compare some adaptive and Wiener filtering approaches and assess their performances on the task. Our findings underpin that adaptive filtering is inapt of dealing with music signals and that Wiener filtering in the short-time Fourier transform domain is a much more effective approach. In addition, it is very cheap if carried out in the frequency bands of auditory filters. A double-output extension based on maximal-ratio combining is also proposed.
[ { "version": "v1", "created": "Sun, 27 Nov 2016 20:29:53 GMT" } ]
2016-11-29T00:00:00
[ [ "Gorlow", "Stanislaw", "" ], [ "Ramona", "Mathieu", "" ], [ "Pachet", "François", "" ] ]
new_dataset
0.991642
1611.08995
Manuel Mazzara
Kamill Gusmanov, Kevin Khanda, Dilshat Salikhov, Manuel Mazzara, Nikolaos Mavridis
Jolie Good Buildings: Internet of things for smart building infrastructure supporting concurrent apps utilizing distributed microservices
In proceedings of the 1st International conference on Convergent Cognitive Information Technologies, 2016. arXiv admin note: substantial text overlap with arXiv:1610.09480
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A large percentage of buildings, domestic or special-purpose, is expected to become increasingly "smarter" in the future, due to the immense benefits in terms of energy saving, safety, flexibility, and comfort, that relevant new technologies offer. However, concerning the hardware, software, or platform levels, no clearly dominant standard frameworks currently exist. Here, we will present a prototype platform for supporting multiple concurrent applications for smart buildings, which is utilizing an advanced sensor network as well as a distributed micro services architecture, centrally featuring the Jolie language. The architecture and benefits of our system are discussed, as well as a prototype containing a number of nodes and a user interface, deployed in a real-world academic building environment. Our results illustrate the promising nature of our approach, as well as open avenues for future work towards it wider and larger scale applicability.
[ { "version": "v1", "created": "Mon, 28 Nov 2016 06:24:34 GMT" } ]
2016-11-29T00:00:00
[ [ "Gusmanov", "Kamill", "" ], [ "Khanda", "Kevin", "" ], [ "Salikhov", "Dilshat", "" ], [ "Mazzara", "Manuel", "" ], [ "Mavridis", "Nikolaos", "" ] ]
new_dataset
0.998059
1611.09003
Asahi Takaoka
Asahi Takaoka
A vertex ordering characterization of simple-triangle graphs
6 pages, 14 figures, Keywords: Alternatly orientable graphs, Linear-interval orders, PI graphs, PI orders, Simple-triangle graphs, Vertex ordering characterization
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider two horizontal lines in the plane. A pair of a point on the top line and an interval on the bottom line defines a triangle between two lines. The intersection graph of such triangles is called a simple-triangle graph. This paper shows a vertex ordering characterization of simple-triangle graphs as follows: a graph is a simple-triangle graph if and only if there is a linear ordering of the vertices that contains both an alternating orientation of the graph and a transitive orientation of the complement of the graph.
[ { "version": "v1", "created": "Mon, 28 Nov 2016 07:04:39 GMT" } ]
2016-11-29T00:00:00
[ [ "Takaoka", "Asahi", "" ] ]
new_dataset
0.99925
1611.09012
Rahul Vaze
Rahul Vaze
Online Knapsack Problem and Budgeted Truthful Bipartite Matching
To appear in IEEE INFOCOM 2017, May 1-4, 2017
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two related online problems: knapsack and truthful bipartite matching are considered. For these two problems, the common theme is how to `match' an arriving left vertex in an online fashion with any of the available right vertices, if at all, so as to maximize the sum of the value of the matched edges, subject to satisfying a sum-weight constraint on the matched left vertices. Assuming that the left vertices arrive in an uniformly random order (secretary model), two almost similar algorithms are proposed for the two problems, that are $2e$ competitive and $24$ competitive, respectively. The proposed online bipartite matching algorithm is also shown to be truthful: there is no incentive for any left vertex to misreport its bid/weight. Direct applications of these problems include job allocation with load balancing, generalized adwords, crowdsourcing auctions, and matching wireless users to cooperative relays in device-to-device communication enabled cellular network.
[ { "version": "v1", "created": "Mon, 28 Nov 2016 07:48:13 GMT" } ]
2016-11-29T00:00:00
[ [ "Vaze", "Rahul", "" ] ]
new_dataset
0.999001
1611.09058
Yongsheng Tang
Yongsheng Tang, Heqian Xu, Zhonghua Sun
A note on the Singleton bounds for codes over finite rings
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
In this paper, we give a notation on the Singleton bounds for linear codes over a finite commutative quasi-Frobenius ring in the work of Shiromoto [5]. We show that there exists a class of finite commutative quasi-Frobenius rings. The Singleton bounds for linear codes over such rings satisfy \[ \frac{d(C)-1}{A}\leq n-\log_{|R|}|C|. \]
[ { "version": "v1", "created": "Mon, 28 Nov 2016 10:43:00 GMT" } ]
2016-11-29T00:00:00
[ [ "Tang", "Yongsheng", "" ], [ "Xu", "Heqian", "" ], [ "Sun", "Zhonghua", "" ] ]
new_dataset
0.964842
1611.09065
Javier E. Meseguer
Javier E. Meseguer, C. K. Toh, Carlos T. Calafate, Juan Carlos Cano, Pietro Manzoni
DrivingStyles: A mobile platform for driving styles and fuel consumption characterization
Journal of Communications and Networks
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intelligent Transportation Systems (ITS) rely on connected vehicle applications to address real-world problems. Research is currently being conducted to support safety, mobility and environmental applications. This paper presents the DrivingStyles architecture, which adopts data mining techniques and neural networks to analyze and generate a classification of driving styles and fuel consumption based on driver characterization. In particular, we have implemented an algorithm that is able to characterize the degree of aggressiveness of each driver. We have also developed a methodology to calculate, in real-time, the consumption and environmental impact of spark ignition and diesel vehicles from a set of variables obtained from the vehicle's Electronic Control Unit (ECU). In this paper, we demonstrate the impact of the driving style on fuel consumption, as well as its correlation with the greenhouse gas emissions generated by each vehicle. Overall, our platform is able to assist drivers in correcting their bad driving habits, while offering helpful tips to improve fuel economy and driving safety.
[ { "version": "v1", "created": "Mon, 28 Nov 2016 11:00:56 GMT" } ]
2016-11-29T00:00:00
[ [ "Meseguer", "Javier E.", "" ], [ "Toh", "C. K.", "" ], [ "Calafate", "Carlos T.", "" ], [ "Cano", "Juan Carlos", "" ], [ "Manzoni", "Pietro", "" ] ]
new_dataset
0.995852
1611.09162
Rahaf Aljundi
Rahaf Aljundi, Punarjay Chakravarty and Tinne Tuytelaars
Who's that Actor? Automatic Labelling of Actors in TV series starting from IMDB Images
ACCV 2016 accepted paper
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we aim at automatically labeling actors in a TV series. Rather than relying on transcripts and subtitles, as has been demonstrated in the past, we show how to achieve this goal starting from a set of example images of each of the main actors involved, collected from the Internet Movie Database (IMDB). The problem then becomes one of domain adaptation: actors' IMDB photos are typically taken at awards ceremonies and are quite different from their appearances in TV series. In each series as well, there is considerable change in actor appearance due to makeup, lighting, ageing, etc. To bridge this gap, we propose a graph-matching based self-labelling algorithm, which we coin HSL (Hungarian Self Labeling). Further, we propose a new edge cost to be used in this context, as well as an extension that is more robust to outliers, where prototypical faces for each of the actors are selected based on a hierarchical clustering procedure. We conduct experiments with 15 episodes from 3 different TV series and demonstrate automatic annotation with an accuracy of 90% and up.
[ { "version": "v1", "created": "Mon, 28 Nov 2016 15:09:26 GMT" } ]
2016-11-29T00:00:00
[ [ "Aljundi", "Rahaf", "" ], [ "Chakravarty", "Punarjay", "" ], [ "Tuytelaars", "Tinne", "" ] ]
new_dataset
0.950355
1611.09170
Jerome Darmont
J\'er\^ome Darmont (LIMOS)
DESP-C++: A Discrete-Event Simulation Package for C++
null
Software: Practice and Experience, Wiley, 2000, 30 (1), pp.37-60
null
null
cs.DB cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
DESP-C++ is a C++ discrete-event random simulation engine that has been designed to be fast, very easy to use and expand, and valid. DESP-C++ is based on the resource view. Its complete architecture is presented in detail, as well as a short " user manual ". The validity of DESP-C++ is demonstrated by the simulation of three significant models. In each case, the simulation results obtained with DESP-C++ match those obtained with a validated simulation software: QNAP2. The versatility of DESP-C++ is also illustrated this way, since the modelled systems are very different from each other: a simple production system, the dining philosopher classical deadlock problem, and a complex object-oriented database management system.
[ { "version": "v1", "created": "Mon, 28 Nov 2016 15:16:42 GMT" } ]
2016-11-29T00:00:00
[ [ "Darmont", "Jérôme", "", "LIMOS" ] ]
new_dataset
0.999547
1611.09172
Jerome Darmont
J\'er\^ome Darmont (LIMOS), Michel Schneider (LIMOS)
Benchmarking OODBs with a Generic Tool
null
Journal of Database Management, IGI Global, 2000, 11 (3), pp.16-27
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present in this paper a generic object-oriented benchmark (OCB: the Object Clustering Benchmark) that has been designed to evaluate the performances of Object-Oriented Data-bases (OODBs), and more specifically the performances of clustering policies within OODBs. OCB is generic because its sample database may be customized to fit any of the databases in-troduced by the main existing benchmarks, e.g., OO1 (Object Operation 1) or OO7. The first version of OCB was purposely clustering-oriented due to a clustering-oriented workload, but OCB has been thoroughly extended to be able to suit other purposes. Eventually, OCB's code is compact and easily portable. OCB has been validated through two implementations: one within the O2 OODB and another one within the Texas persistent object store. The perfor-mances of a specific clustering policy called DSTC (Dynamic, Statistical, Tunable Clustering) have also been evaluated with OCB.
[ { "version": "v1", "created": "Mon, 28 Nov 2016 15:17:18 GMT" } ]
2016-11-29T00:00:00
[ [ "Darmont", "Jérôme", "", "LIMOS" ], [ "Schneider", "Michel", "", "LIMOS" ] ]
new_dataset
0.992867
1611.09193
Eva Mar\'in Tordera
Eva Marin Tordera, Xavi Masip-Bruin, Jordi Garcia-Alminana, Admela Jukan, Guang-Jie Ren, Jiafeng Zhu, Josep Farre
What is a Fog Node A Tutorial on Current Concepts towards a Common Definition
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fog computing has emerged as a promising technology that can bring the cloud applications closer to the physical IoT devices at the network edge. While it is widely known what cloud computing is, and how data centers can build the cloud infrastructure and how applications can make use of this infrastructure, there is no common picture on what fog computing and a fog node, as its main building block, really is. One of the first attempts to define a fog node was made by Cisco, qualifying a fog computing system as a mini-cloud, located at the edge of the network and implemented through a variety of edge devices, interconnected by a variety, mostly wireless, communication technologies. Thus, a fog node would be the infrastructure implementing the said mini-cloud. Other proposals have their own definition of what a fog node is, usually in relation to a specific edge device, a specific use case or an application. In this paper, we first survey the state of the art in technologies for fog computing nodes as building blocks of fog computing, paying special attention to the contributions that analyze the role edge devices play in the fog node definition. We summarize and compare the concepts, lessons learned from their implementation, and show how a conceptual framework is emerging towards a unifying fog node definition. We focus on core functionalities of a fog node as well as in the accompanying opportunities and challenges towards their practical realization in the near future.
[ { "version": "v1", "created": "Mon, 28 Nov 2016 15:32:48 GMT" } ]
2016-11-29T00:00:00
[ [ "Tordera", "Eva Marin", "" ], [ "Masip-Bruin", "Xavi", "" ], [ "Garcia-Alminana", "Jordi", "" ], [ "Jukan", "Admela", "" ], [ "Ren", "Guang-Jie", "" ], [ "Zhu", "Jiafeng", "" ], [ "Farre", "Josep", "" ] ]
new_dataset
0.974107
1605.07746
Aurore Guillevic
Aurore Guillevic (PIMS), Fran\c{c}ois Morain (GRACE, LIX), Emmanuel Thom\'e (CARAMBA)
Solving discrete logarithms on a 170-bit MNT curve by pairing reduction
to appear in the Lecture Notes in Computer Science (LNCS)
Roberto Avanzi and Howard Heys. Selected Areas in Cryptography 2016, Aug 2016, St. John's, Canada. Springer, Selected Areas in Cryptography 2016
null
null
cs.CR math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pairing based cryptography is in a dangerous position following the breakthroughs on discrete logarithms computations in finite fields of small characteristic. Remaining instances are built over finite fields of large characteristic and their security relies on the fact that the embedding field of the underlying curve is relatively large. How large is debatable. The aim of our work is to sustain the claim that the combination of degree 3 embedding and too small finite fields obviously does not provide enough security. As a computational example, we solve the DLP on a 170-bit MNT curve, by exploiting the pairing embedding to a 508-bit, degree-3 extension of the base field.
[ { "version": "v1", "created": "Wed, 25 May 2016 06:42:19 GMT" }, { "version": "v2", "created": "Thu, 24 Nov 2016 13:15:38 GMT" } ]
2016-11-28T00:00:00
[ [ "Guillevic", "Aurore", "", "PIMS" ], [ "Morain", "François", "", "GRACE, LIX" ], [ "Thomé", "Emmanuel", "", "CARAMBA" ] ]
new_dataset
0.959209
1605.07874
Biao Zhang
Biao Zhang, Deyi Xiong and Jinsong Su
BattRAE: Bidimensional Attention-Based Recursive Autoencoders for Learning Bilingual Phrase Embeddings
7 pages, accepted by AAAI 2017
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a bidimensional attention based recursive autoencoder (BattRAE) to integrate clues and sourcetarget interactions at multiple levels of granularity into bilingual phrase representations. We employ recursive autoencoders to generate tree structures of phrases with embeddings at different levels of granularity (e.g., words, sub-phrases and phrases). Over these embeddings on the source and target side, we introduce a bidimensional attention network to learn their interactions encoded in a bidimensional attention matrix, from which we extract two soft attention weight distributions simultaneously. These weight distributions enable BattRAE to generate compositive phrase representations via convolution. Based on the learned phrase representations, we further use a bilinear neural model, trained via a max-margin method, to measure bilingual semantic similarity. To evaluate the effectiveness of BattRAE, we incorporate this semantic similarity as an additional feature into a state-of-the-art SMT system. Extensive experiments on NIST Chinese-English test sets show that our model achieves a substantial improvement of up to 1.63 BLEU points on average over the baseline.
[ { "version": "v1", "created": "Wed, 25 May 2016 13:29:07 GMT" }, { "version": "v2", "created": "Fri, 25 Nov 2016 03:26:45 GMT" } ]
2016-11-28T00:00:00
[ [ "Zhang", "Biao", "" ], [ "Xiong", "Deyi", "" ], [ "Su", "Jinsong", "" ] ]
new_dataset
0.994346
1609.00507
EPTCS
Swen Jacobs (Saarland University), Roderick Bloem (Graz University of Technology), Romain Brenguier (University of Oxford), Ayrat Khalimov (Graz University of Technology), Felix Klein (Saarland University), Robert K\"onighofer (Graz University of Technology), Jens Kreber (Saarland University), Alexander Legg (Data 61, CSIRO (formerly NICTA) and UNSW), Nina Narodytska (Samsung Research America), Guillermo A. P\'erez (Universit\'e Libre de Bruxelles), Jean-Fran\c{c}ois Raskin (Universit\'e Libre de Bruxelles), Leonid Ryzhyk (Samsung Research America), Ocan Sankur (CNRS, Irisa), Martina Seidl (Johannes-Kepler-University Linz), Leander Tentrup (Saarland University), Adam Walker (Independent Researcher)
The 3rd Reactive Synthesis Competition (SYNTCOMP 2016): Benchmarks, Participants & Results
In Proceedings SYNT 2016, arXiv:1611.07178
EPTCS 229, 2016, pp. 149-177
10.4204/EPTCS.229.12
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report on the benchmarks, participants and results of the third reactive synthesis competition(SYNTCOMP 2016). The benchmark library of SYNTCOMP 2016 has been extended to benchmarks in the new LTL-based temporal logic synthesis format (TLSF), and 2 new sets of benchmarks for the existing AIGER-based format for safety specifications. The participants of SYNTCOMP 2016 can be separated according to these two classes of specifications, and we give an overview of the 6 tools that entered the competition in the AIGER-based track, and the 3 participants that entered the TLSF-based track. We briefly describe the benchmark selection, evaluation scheme and the experimental setup of SYNTCOMP 2016. Finally, we present and analyze the results of our experimental evaluation, including a comparison to participants of previous competitions and a legacy tool.
[ { "version": "v1", "created": "Fri, 2 Sep 2016 09:01:36 GMT" }, { "version": "v2", "created": "Wed, 23 Nov 2016 22:04:18 GMT" } ]
2016-11-28T00:00:00
[ [ "Jacobs", "Swen", "", "Saarland University" ], [ "Bloem", "Roderick", "", "Graz University of\n Technology" ], [ "Brenguier", "Romain", "", "University of Oxford" ], [ "Khalimov", "Ayrat", "", "Graz\n University of Technology" ], [ "Klein", "Felix", "", "Saarland University" ], [ "Könighofer", "Robert", "", "Graz University of Technology" ], [ "Kreber", "Jens", "", "Saarland\n University" ], [ "Legg", "Alexander", "", "Data 61, CSIRO" ], [ "Narodytska", "Nina", "", "Samsung Research America" ], [ "Pérez", "Guillermo A.", "", "Université\n Libre de Bruxelles" ], [ "Raskin", "Jean-François", "", "Université Libre de\n Bruxelles" ], [ "Ryzhyk", "Leonid", "", "Samsung Research America" ], [ "Sankur", "Ocan", "", "CNRS,\n Irisa" ], [ "Seidl", "Martina", "", "Johannes-Kepler-University Linz" ], [ "Tentrup", "Leander", "", "Saarland University" ], [ "Walker", "Adam", "", "Independent Researcher" ] ]
new_dataset
0.997625
1611.07289
Bernhard Kainz
Amir Alansary, Bernhard Kainz, Martin Rajchl, Maria Murgasova, Mellisa Damodaram, David F.A. Lloyd, Alice Davidson, Steven G. McDonagh, Mary Rutherford, Joseph V. Hajnal and Daniel Rueckert
PVR: Patch-to-Volume Reconstruction for Large Area Motion Correction of Fetal MRI
10 pages, 13 figures, submitted to IEEE Transactions on Medical Imaging. v2: wadded funders acknowledgements to preprint
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a novel method for the correction of motion artifacts that are present in fetal Magnetic Resonance Imaging (MRI) scans of the whole uterus. Contrary to current slice-to-volume registration (SVR) methods, requiring an inflexible anatomical enclosure of a single investigated organ, the proposed patch-to-volume reconstruction (PVR) approach is able to reconstruct a large field of view of non-rigidly deforming structures. It relaxes rigid motion assumptions by introducing a specific amount of redundant information that is exploited with parallelized patch-wise optimization, super-resolution, and automatic outlier rejection. We further describe and provide an efficient parallel implementation of PVR allowing its execution within reasonable time on commercially available graphics processing units (GPU), enabling its use in the clinical practice. We evaluate PVR's computational overhead compared to standard methods and observe improved reconstruction accuracy in presence of affine motion artifacts of approximately 30% compared to conventional SVR in synthetic experiments. Furthermore, we have evaluated our method qualitatively and quantitatively on real fetal MRI data subject to maternal breathing and sudden fetal movements. We evaluate peak-signal-to-noise ratio (PSNR), structural similarity index (SSIM), and cross correlation (CC) with respect to the originally acquired data and provide a method for visual inspection of reconstruction uncertainty. With these experiments we demonstrate successful application of PVR motion compensation to the whole uterus, the human fetus, and the human placenta.
[ { "version": "v1", "created": "Tue, 22 Nov 2016 13:21:14 GMT" }, { "version": "v2", "created": "Fri, 25 Nov 2016 17:54:39 GMT" } ]
2016-11-28T00:00:00
[ [ "Alansary", "Amir", "" ], [ "Kainz", "Bernhard", "" ], [ "Rajchl", "Martin", "" ], [ "Murgasova", "Maria", "" ], [ "Damodaram", "Mellisa", "" ], [ "Lloyd", "David F. A.", "" ], [ "Davidson", "Alice", "" ], [ "McDonagh", "Steven G.", "" ], [ "Rutherford", "Mary", "" ], [ "Hajnal", "Joseph V.", "" ], [ "Rueckert", "Daniel", "" ] ]
new_dataset
0.999373
1611.08079
Yepang Liu
Yepang Liu, Lili Wei, Chang Xu and Shing-Chi Cheung
DroidLeaks: Benchmarking Resource Leak Bugs for Android Applications
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Resource leak bugs in Android apps are pervasive and can cause serious performance degradation and system crashes. In recent years, several resource leak detection techniques have been proposed to assist Android developers in correctly managing system resources. Yet, there exist no common bug benchmarks for effectively and reliably comparing such techniques and quantitatively evaluating their strengths and weaknesses. This paper describes our initial contribution towards constructing such a benchmark. To locate real resource leak bugs, we mined 124,215 code revisions of 34 large-scale open-source Android apps. We successfully found 298 fixed resource leaks, which cover a diverse set of resource classes, from 32 out of the 34 apps. To understand the characteristics of these bugs, we conducted an empirical study, which revealed the root causes of frequent resource leaks in Android apps and common patterns of faults made by developers. With our findings, we further implemented a static checker to detect a common pattern of resource leaks in Android apps. Experiments showed that the checker can effectively locate real resource leaks in popular Android apps, confirming the usefulness of our work.
[ { "version": "v1", "created": "Thu, 24 Nov 2016 06:34:48 GMT" } ]
2016-11-28T00:00:00
[ [ "Liu", "Yepang", "" ], [ "Wei", "Lili", "" ], [ "Xu", "Chang", "" ], [ "Cheung", "Shing-Chi", "" ] ]
new_dataset
0.999238
1611.08268
Francois Robert Hogan
Francois Robert Hogan and Alberto Rodriguez
Feedback Control of the Pusher-Slider System: A Story of Hybrid and Underactuated Contact Dynamics
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates real-time control strategies for dynamical systems that involve frictional contact interactions. Hybridness and underactuation are key characteristics of these systems that complicate the design of feedback controllers. In this research, we examine and test a novel feedback controller design on a planar pushing system, where the purpose is to control the motion of a sliding object on a flat surface using a point robotic pusher. The pusher-slider is a simple dynamical system that retains many of the challenges that are typical of robotic manipulation tasks. Our results show that a model predictive control approach used in tandem with integer programming offers a powerful solution to capture the dynamic constraints associated with the friction cone as well as the hybrid nature of the contact. In order to achieve real-time control, simplifications are proposed to speed up the integer program. The concept of Family of Modes (FOM) is introduced to solve an online convex optimization problem by selecting a set of contact mode schedules that spans a large set of dynamic behaviors that can occur during the prediction horizon. The controller design is applied to stabilize the motion of a sliding object about a nominal trajectory, and to re-plan its trajectory in real-time to follow a moving target. We validate the controller design through numerical simulations and experimental results on an industrial ABB IRB 120 robotic arm.
[ { "version": "v1", "created": "Thu, 24 Nov 2016 17:35:42 GMT" } ]
2016-11-28T00:00:00
[ [ "Hogan", "Francois Robert", "" ], [ "Rodriguez", "Alberto", "" ] ]
new_dataset
0.996795
1611.08321
Junhua Mao
Junhua Mao, Jiajing Xu, Yushi Jing, Alan Yuille
Training and Evaluating Multimodal Word Embeddings with Large-scale Web Annotated Images
Appears in NIPS 2016. The datasets introduced in this work will be gradually released on the project page
null
null
null
cs.LG cs.CL cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we focus on training and evaluating effective word embeddings with both text and visual information. More specifically, we introduce a large-scale dataset with 300 million sentences describing over 40 million images crawled and downloaded from publicly available Pins (i.e. an image with sentence descriptions uploaded by users) on Pinterest. This dataset is more than 200 times larger than MS COCO, the standard large-scale image dataset with sentence descriptions. In addition, we construct an evaluation dataset to directly assess the effectiveness of word embeddings in terms of finding semantically similar or related words and phrases. The word/phrase pairs in this evaluation dataset are collected from the click data with millions of users in an image search system, thus contain rich semantic relationships. Based on these datasets, we propose and compare several Recurrent Neural Networks (RNNs) based multimodal (text and image) models. Experiments show that our model benefits from incorporating the visual information into the word embeddings, and a weight sharing strategy is crucial for learning such multimodal embeddings. The project page is: http://www.stat.ucla.edu/~junhua.mao/multimodal_embedding.html
[ { "version": "v1", "created": "Thu, 24 Nov 2016 23:15:56 GMT" } ]
2016-11-28T00:00:00
[ [ "Mao", "Junhua", "" ], [ "Xu", "Jiajing", "" ], [ "Jing", "Yushi", "" ], [ "Yuille", "Alan", "" ] ]
new_dataset
0.997484
1611.08358
Rajashekara Murthy S
A N Akshatha, Chandana G Upadhyaya, Rajashekara S Murthy
Kannada Spell Checker with Sandhi Splitter
7 pages, 10 figures
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spelling errors are introduced in text either during typing, or when the user does not know the correct phoneme or grapheme. If a language contains complex words like sandhi where two or more morphemes join based on some rules, spell checking becomes very tedious. In such situations, having a spell checker with sandhi splitter which alerts the user by flagging the errors and providing suggestions is very useful. A novel algorithm of sandhi splitting is proposed in this paper. The sandhi splitter can split about 7000 most common sandhi words in Kannada language used as test samples. The sandhi splitter was integrated with a Kannada spell checker and a mechanism for generating suggestions was added. A comprehensive, platform independent, standalone spell checker with sandhi splitter application software was thus developed and tested extensively for its efficiency and correctness. A comparative analysis of this spell checker with sandhi splitter was made and results concluded that the Kannada spell checker with sandhi splitter has an improved performance. It is twice as fast, 200 times more space efficient, and it is 90% accurate in case of complex nouns and 50% accurate for complex verbs. Such a spell checker with sandhi splitter will be of foremost significance in machine translation systems, voice processing, etc. This is the first sandhi splitter in Kannada and the advantage of the novel algorithm is that, it can be extended to all Indian languages.
[ { "version": "v1", "created": "Fri, 25 Nov 2016 06:18:29 GMT" } ]
2016-11-28T00:00:00
[ [ "Akshatha", "A N", "" ], [ "Upadhyaya", "Chandana G", "" ], [ "Murthy", "Rajashekara S", "" ] ]
new_dataset
0.961989
1005.2004
Secretary Aircc Journal
Hamidreza Mahini(1), Reza Berangi(1) and Alireza Mahini(2), ((1) Iran University of Science and Technology, Iran, (2) Islamic Azad University, Iran)
MLET: A Power Efficient Approach for TCAM Based, IP Lookup Engines in Internet Routers
14 Pages, IJCNC 2010
International Journal of Computer Networks & Communications 2.3 (2010) 13-26
10.5121/ijcnc.2010.2302
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
Routers are one of the important entities in computer networks specially the Internet. Forwarding IP packets is a valuable and vital function in Internet routers. Routers extract destination IP address from packets and lookup those addresses in their own routing table. This task is called IP lookup. Internet address lookup is a challenging problem due to the increasing routing table sizes. Ternary Content-Addressable Memories (TCAMs) are becoming very popular for designing high-throughput address lookup-engines on routers: they are fast, cost-effective and simple to manage. Despite the TCAMs speed, their high power consumption is their major drawback. In this paper, Multilevel Enabling Technique (MLET), a power efficient TCAM based hardware architecture has been proposed. This scheme is employed after an Espresso-II minimization algorithm to achieve lower power consumption. The performance evaluation of the proposed approach shows that it can save considerable amount of routing table's power consumption.
[ { "version": "v1", "created": "Wed, 12 May 2010 06:57:27 GMT" } ]
2016-11-27T00:00:00
[ [ "Mahini", "Hamidreza", "" ], [ "Berangi", "Reza", "" ], [ "Mahini", "Alireza", "" ] ]
new_dataset
0.996294
1202.2571
Ciprian Dobre
Radu Ciobanu, Ciprian Dobre
Data Dissemination in Opportunistic Networks
Please cite this as "Radu Ciobanu, Ciprian Dobre, Data Dissemination in Opportunistic Networks, in Proc. of 18th International Conference on Control Systems and Computer Science (CSCS-18), Bucharest, Romania, 2011, pp. 529-536, ISSN: 2066-4451, Politehnica Press"
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile devices integrating wireless short-range communication technologies make possible new applications for spontaneous communication, interaction and collaboration. An interesting approach is to use collaboration to facilitate communication when mobile devices are not able to establish direct communication paths. Opportunistic networks, formed when mobile devices communicate with each other while users are in close proximity, can help applications still exchange data in such cases. In opportunistic networks routes are built dynamically, as each mobile device acts according to the store-carry-and-forward paradigm. Thus, contacts between mobile devices are seen as opportunities to move data towards destination. In such networks data dissemination is done using forwarding and is usually based on a publish/subscribe model. Opportunistic data dissemination also raises questions concerning user privacy and incentives. Such problems are addressed differently by various opportunistic data dissemination techniques. In this paper we analyze existing relevant work in the area of data dissemination in opportunistic networks. We present the categories of a proposed taxonomy that captures the capabilities of data dissemination techniques used in such networks. Moreover, we survey relevant data dissemination techniques and analyze them using the proposed taxonomy.
[ { "version": "v1", "created": "Sun, 12 Feb 2012 21:02:56 GMT" } ]
2016-11-26T00:00:00
[ [ "Ciobanu", "Radu", "" ], [ "Dobre", "Ciprian", "" ] ]
new_dataset
0.999415
1307.3158
Tinku Rasheed
Alvaro Valcarce, Tinku Rasheed, Karina Gomez, Sithamparanathan Kandeepan, Laurent Reynaud, Romain Hermenier, Andrea Munari, Mihael Mohorcic, Miha Smolnikar, and Isabelle Bucaille
Airborne Base Stations for Emergency and Temporary Events
Accepted at 5th EAI PSATS Conference, June 27-28, 2013
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a rapidly deployable wireless network based on Low Altitude Platforms and portable land units to support disaster-relief activities, and to extend capacity during temporary mass events. The system integrates an amalgam of radio technologies such as LTE, WLAN and TETRA to provide heterogeneous communications in the deployment location. Cognitive radio is used for autonomous network configuration. Sensor networks monitor the environment in real-time during relief activities and provide distributed spectrum sensing capacities. Finally, remote communications are supported via S-band satellite links.
[ { "version": "v1", "created": "Thu, 11 Jul 2013 16:10:03 GMT" } ]
2016-11-26T00:00:00
[ [ "Valcarce", "Alvaro", "" ], [ "Rasheed", "Tinku", "" ], [ "Gomez", "Karina", "" ], [ "Kandeepan", "Sithamparanathan", "" ], [ "Reynaud", "Laurent", "" ], [ "Hermenier", "Romain", "" ], [ "Munari", "Andrea", "" ], [ "Mohorcic", "Mihael", "" ], [ "Smolnikar", "Miha", "" ], [ "Bucaille", "Isabelle", "" ] ]
new_dataset
0.998922
1404.0195
Abidin Kaya
Abidin Kaya, Bahattin Yildiz
Extension theorems for self-dual codes over rings and new binary self-dual codes
under review since April 2014, 14 pages, 12 tables
Discrete Mathematics Vol 338 Issue 2 2016
10.1016/j.disc.2015.09.010
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, extension theorems are generalized to self-dual codes over rings and as applications many new binary self-dual extremal codes are found from self-dual codes over F_2^m+uF_2^m for m = 1, 2. The duality and distance preserving Gray maps from F4 +uF4 to (F_2 +uF_2)^2 and (F_4)^2 are used to obtain self-dual codes whose binary Gray images are [64,32,12]-extremal self-dual. An F_2+uF_2-extension is used and as binary images, 178 extremal binary self-dual codes of length 68 with new weight enumerators are obtained. Especially the first examples of codes with gamma=3 and many codes with the rare gamma= 4, 6 parameters are obtained. In addition to these, two hundred fifty doubly even self dual [96,48,16]-codes with new weight enumerators are obtained from four-circulant codes over F_4 + uF_4. New extremal doubly even binary codes of lengths 80 and 88 are also found by the F_2+uF_2-lifts of binary four circulant codes and a corresponding result about 3-designs is stated.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 10:50:55 GMT" } ]
2016-11-26T00:00:00
[ [ "Kaya", "Abidin", "" ], [ "Yildiz", "Bahattin", "" ] ]
new_dataset
0.995203
1001.0890
Arnaud Labourel
Jurek Czyzowicz, Arnaud Labourel (LaBRI), Andrzej Pelc
How to meet asynchronously (almost) everywhere
null
null
null
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two mobile agents (robots) with distinct labels have to meet in an arbitrary, possibly infinite, unknown connected graph or in an unknown connected terrain in the plane. Agents are modeled as points, and the route of each of them only depends on its label and on the unknown environment. The actual walk of each agent also depends on an asynchronous adversary that may arbitrarily vary the speed of the agent, stop it, or even move it back and forth, as long as the walk of the agent in each segment of its route is continuous, does not leave it and covers all of it. Meeting in a graph means that both agents must be at the same time in some node or in some point inside an edge of the graph, while meeting in a terrain means that both agents must be at the same time in some point of the terrain. Does there exist a deterministic algorithm that allows any two agents to meet in any unknown environment in spite of this very powerfull adversary? We give deterministic rendezvous algorithms for agents starting at arbitrary nodes of any anonymous connected graph (finite or infinite) and for agents starting at any interior points with rational coordinates in any closed region of the plane with path-connected interior. While our algorithms work in a very general setting ? agents can, indeed, meet almost everywhere ? we show that none of the above few limitations imposed on the environment can be removed. On the other hand, our algorithm also guarantees the following approximate rendezvous for agents starting at arbitrary interior points of a terrain as above: agents will eventually get at an arbitrarily small positive distance from each other.
[ { "version": "v1", "created": "Wed, 6 Jan 2010 13:27:31 GMT" } ]
2016-11-25T00:00:00
[ [ "Czyzowicz", "Jurek", "", "LaBRI" ], [ "Labourel", "Arnaud", "", "LaBRI" ], [ "Pelc", "Andrzej", "" ] ]
new_dataset
0.998416
1012.1623
Adrian Paschke
Theodore Dalamagas, Tryfon Farmakakis, Manolis Maragkakis, Artemis Hatzigeorgiou
FreePub: Collecting and Organizing Scientific Material Using Mindmaps
in Adrian Paschke, Albert Burger, Andrea Splendiani, M. Scott Marshall, Paolo Romano: Proceedings of the 3rd International Workshop on Semantic Web Applications and Tools for the Life Sciences, Berlin,Germany, December 8-10, 2010
null
null
SWAT4LS 2010
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a creativity support tool, called FreePub, to collect and organize scientific material using mindmaps. Mindmaps are visual, graph-based represenations of concepts, ideas, notes, tasks, etc. They generally take a hierarchical or tree branch format, with ideas branching into their subsections. FreePub supports creativity cycles. A user starts such a cycle by setting up her domain of interest using mindmaps. Then, she can browse mindmaps and launch search tasks to gather relevant publications from several data sources. FreePub, besides publications, identifies helpful supporting material (e.g., blog posts, presentations). All retrieved information from FreePub can be imported and organized in mindmaps. FreePub has been fully implemented on top of FreeMind, a popular open-source, mindmapping tool.
[ { "version": "v1", "created": "Tue, 7 Dec 2010 21:58:25 GMT" } ]
2016-11-25T00:00:00
[ [ "Dalamagas", "Theodore", "" ], [ "Farmakakis", "Tryfon", "" ], [ "Maragkakis", "Manolis", "" ], [ "Hatzigeorgiou", "Artemis", "" ] ]
new_dataset
0.994087
1103.0045
Pan Hui
Ranjan Pal and Pan Hui
On the Economics of Cloud Markets
7 pages, 2 figures
null
null
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud computing is a paradigm that has the potential to transform and revolutionalize the next generation IT industry by making software available to end-users as a service. A cloud, also commonly known as a cloud network, typically comprises of hardware (network of servers) and a collection of softwares that is made available to end-users in a pay-as-you-go manner. Multiple public cloud providers (ex., Amazon) co-existing in a cloud computing market provide similar services (software as a service) to its clients, both in terms of the nature of an application, as well as in quality of service (QoS) provision. The decision of whether a cloud hosts (or finds it profitable to host) a service in the long-term would depend jointly on the price it sets, the QoS guarantees it provides to its customers, and the satisfaction of the advertised guarantees. In this paper, we devise and analyze three inter-organizational economic models relevant to cloud networks. We formulate our problems as non co-operative price and QoS games between multiple cloud providers existing in a cloud market. We prove that a unique pure strategy Nash equilibrium (NE) exists in two of the three models. Our analysis paves the path for each cloud provider to 1) know what prices and QoS level to set for end-users of a given service type, such that the provider could exist in the cloud market, and 2) practically and dynamically provision appropriate capacity for satisfying advertised QoS guarantees.
[ { "version": "v1", "created": "Mon, 28 Feb 2011 22:43:47 GMT" } ]
2016-11-25T00:00:00
[ [ "Pal", "Ranjan", "" ], [ "Hui", "Pan", "" ] ]
new_dataset
0.997578
1310.5476
Rolando Trujillo-Rasua
Rolando Trujillo-Rasua
Privacy in RFID and mobile objects
PhD Thesis
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Radio Frequency Identification (RFID) is a technology aimed at eficiently identifying and tracking goods and assets. Such identification may be performed without requiring line-of-sight alignment or physical contact between the RFID tag and the RFID reader, whilst tracking is naturally achieved due to the short interrogation field of RFID readers. That is why the reduction in price of the RFID tags has been accompanied with an increasing attention paid to this technology. However, since tags are resource-constrained devices sending identification data wirelessly, designing secure and private RFID identification protocols is a challenging task. This scenario is even more complex when scalability must be met by those protocols. Assuming the existence of a lightweight, secure, private and scalable RFID identification protocol, there exist other concerns surrounding the RFID technology. Some of them arise from the technology itself, such as distance checking, but others are related to the potential of RFID systems to gather huge amount of tracking data. Publishing and mining such moving objects data is essential to improve efficiency of supervisory control, assets management and localisation, transportation, etc. However, obvious privacy threats arise if an individual can be linked with some of those published trajectories. The present dissertation contributes to the design of algorithms and protocols aimed at dealing with the issues explained above. First, we propose a set of protocols and heuristics based on a distributed architecture that improve the efficiency of the identification process without compromising privacy or security. Moreover, we present a novel distance-bounding protocol based on graphs that is extremely low-resource consuming. Finally, we present two trajectory anonymisation methods aimed at preserving the individuals' privacy when their trajectories are released.
[ { "version": "v1", "created": "Mon, 21 Oct 2013 09:33:33 GMT" } ]
2016-11-25T00:00:00
[ [ "Trujillo-Rasua", "Rolando", "" ] ]
new_dataset
0.99364
1312.5109
E. T. Tchao
E. Affum, E.T. Tchao, K. Diawuo, K. Agyekum
Wideband Parameters Analysis and Validation for Indoor radio Channel at 60/70/80GHz for Gigabit Wireless Communication employing Isotropic, Horn and Omni directional Antenna
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 4 Issue 6, 2013
null
10.14569/IJACSA.2013.040638
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, applications of millimeter (mm) waves for high-speed broadband wireless local area network communication systems in indoor environment are increasingly gaining recognition as it provides gigabit-speed wireless communications with carrier-class performances over distances of a mile or more due to spectrum availability and wider bandwidth requirements. Collectively referred to as E-Band, the millimeter wave wireless technology present the potential to offer bandwidth delivery comparable to that of fiber optic, but without the financial and logistic challenges of deploying fiber. This paper investigates the wideband parameters using the ray tracing technique for indoor propagation systems with rms delay spread for Omnidirectional and Horn Antennas for Bent Tunnel at 80GHz. The results obtained were 2.03 and 1.95 respectively, besides, the normalized received power with 0:55fix10^8 excess delay at 70GHz for Isotropic Antenna was at 0.97.
[ { "version": "v1", "created": "Wed, 18 Dec 2013 12:30:18 GMT" } ]
2016-11-25T00:00:00
[ [ "Affum", "E.", "" ], [ "Tchao", "E. T.", "" ], [ "Diawuo", "K.", "" ], [ "Agyekum", "K.", "" ] ]
new_dataset
0.955975
1402.1614
Mehdi Samadieh
Mehdi samadieh and Mohammad Gholami
New LDPC Codes Using Permutation Matrices with Higher Girth than QC-LDPC Codes Constructed by Fossorier
This paper has been withdrawn by the authors. Some conclusions in the submitted paper are wrong and the authors decided to withdraw the paper
null
null
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the literatures, it is well-known that Fossorier code has the girth among LDPC codes. In this paper, we introduce a new class of low-density parity-check (LDPC) codes, with higher girth than other previous constructed codes. Especially we proposed a new method to construct LDPC codes using non fixed shift permutation matrices and full based matrices with higher girth than codes constructed by Fossorier.
[ { "version": "v1", "created": "Fri, 7 Feb 2014 12:20:31 GMT" }, { "version": "v2", "created": "Fri, 21 Feb 2014 05:58:16 GMT" }, { "version": "v3", "created": "Wed, 26 Feb 2014 16:52:03 GMT" } ]
2016-11-25T00:00:00
[ [ "samadieh", "Mehdi", "" ], [ "Gholami", "Mohammad", "" ] ]
new_dataset
0.9997
1410.7560
Rourab Paul
Rourab Paul, Amlan Chakrabarti, and Ranjan Ghosh
Multi Core SSL/TLS Security Processor Architecture Prototype Design with automated Preferential Algorithm in FPGA
This is Manuscript
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a pipelined architecture of a high speed network security processor (NSP) for SSL,TLS protocol is implemented on a system on chip (SOC) where hardware information of all encryption, hashing and key exchange algorithms are stored in flash memory in terms of bit files, in contrary to related works where all are actually implemented in hardware. The NSP finds applications in e-commerce, virtual private network (VPN) and in other fields that require data confidentiality. The motivation of the present work is to dynamically execute applications with stipulated throughput within budgeted hardware resource and power. A preferential algorithm choosing an appropriate cipher suite is proposed, which is based on Efficient System Index (ESI) budget comprising of power, throughput and resource given by the user. The bit files of the chosen security algorithms are downloaded from the flash memory to the partial region of field programmable gate array (FPGA). The proposed SOC controls data communication between an application running in a system through a PCI and the Ethernet interface of a network. Partial configuration feature is used in ISE14.4 suite with ZYNQ 7z020-clg484 FPGA platform. The performances
[ { "version": "v1", "created": "Tue, 28 Oct 2014 09:11:21 GMT" } ]
2016-11-25T00:00:00
[ [ "Paul", "Rourab", "" ], [ "Chakrabarti", "Amlan", "" ], [ "Ghosh", "Ranjan", "" ] ]
new_dataset
0.999285
1502.00911
\'Eric Colin de Verdi\`ere
\'Eric Colin de Verdi\`ere
Multicuts in Planar and Bounded-Genus Graphs with Bounded Number of Terminals
removed erroneous refinement of main theorem; minor corrections
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an undirected, edge-weighted graph G together with pairs of vertices, called pairs of terminals, the minimum multicut problem asks for a minimum-weight set of edges such that, after deleting these edges, the two terminals of each pair belong to different connected components of the graph. Relying on topological techniques, we provide a polynomial-time algorithm for this problem in the case where G is embedded on a fixed surface of genus g (e.g., when G is planar) and has a fixed number t of terminals. The running time is a polynomial of degree O(sqrt{g^2+gt}) in the input size. In the planar case, our result corrects an error in an extended abstract by Bentz [Int. Workshop on Parameterized and Exact Computation, 109-119, 2012]. The minimum multicut problem is also a generalization of the multiway cut problem, a.k.a. multiterminal cut problem; even for this special case, no dedicated algorithm was known for graphs embedded on surfaces.
[ { "version": "v1", "created": "Tue, 3 Feb 2015 16:23:50 GMT" }, { "version": "v2", "created": "Sat, 15 Oct 2016 07:31:34 GMT" }, { "version": "v3", "created": "Wed, 23 Nov 2016 11:20:47 GMT" } ]
2016-11-24T00:00:00
[ [ "de Verdière", "Éric Colin", "" ] ]
new_dataset
0.972819
1604.02284
EPTCS
Swen Jacobs (Saarland University), Felix Klein (Saarland University), Sebastian Schirmer (Saarland University)
A High-Level LTL Synthesis Format: TLSF v1.1
In Proceedings SYNT 2016, arXiv:1611.07178. arXiv admin note: substantial text overlap with arXiv:1601.05228
EPTCS 229, 2016, pp. 112-132
10.4204/EPTCS.229.10
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the Temporal Logic Synthesis Format (TLSF), a high-level format to describe synthesis problems via Linear Temporal Logic (LTL). The format builds upon standard LTL, but additionally allows to use high-level constructs, such as sets and functions, to provide a compact and human-readable representation. Furthermore, the format allows to identify parameters of a specification such that a single description can be used to define a family of problems. Additionally, we present a tool to automatically translate the format into plain LTL, which then can be used for synthesis by a solver. The tool also allows to adjust parameters of the specification and to apply standard transformations on the resulting formula.
[ { "version": "v1", "created": "Fri, 8 Apr 2016 09:27:43 GMT" }, { "version": "v2", "created": "Wed, 31 Aug 2016 12:00:20 GMT" }, { "version": "v3", "created": "Wed, 23 Nov 2016 03:38:08 GMT" } ]
2016-11-24T00:00:00
[ [ "Jacobs", "Swen", "", "Saarland University" ], [ "Klein", "Felix", "", "Saarland University" ], [ "Schirmer", "Sebastian", "", "Saarland University" ] ]
new_dataset
0.999676
1607.08539
Maciej Halber
Maciej Halber and Thomas Funkhouser
Fine-To-Coarse Global Registration of RGB-D Scans
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
RGB-D scanning of indoor environments is important for many applications, including real estate, interior design, and virtual reality. However, it is still challenging to register RGB-D images from a hand-held camera over a long video sequence into a globally consistent 3D model. Current methods often can lose tracking or drift and thus fail to reconstruct salient structures in large environments (e.g., parallel walls in different rooms). To address this problem, we propose a "fine-to-coarse" global registration algorithm that leverages robust registrations at finer scales to seed detection and enforcement of new correspondence and structural constraints at coarser scales. To test global registration algorithms, we provide a benchmark with 10,401 manually-clicked point correspondences in 25 scenes from the SUN3D dataset. During experiments with this benchmark, we find that our fine-to-coarse algorithm registers long RGB-D sequences better than previous methods.
[ { "version": "v1", "created": "Thu, 28 Jul 2016 17:19:46 GMT" }, { "version": "v2", "created": "Mon, 1 Aug 2016 15:59:00 GMT" }, { "version": "v3", "created": "Wed, 23 Nov 2016 04:55:29 GMT" } ]
2016-11-24T00:00:00
[ [ "Halber", "Maciej", "" ], [ "Funkhouser", "Thomas", "" ] ]
new_dataset
0.997436
1611.02360
Rui Zhang
Dragomir Radev, Rui Zhang, Steve Wilson, Derek Van Assche, Henrique Spyra Gubert, Alisa Krivokapic, MeiXing Dong, Chongruo Wu, Spruce Bondera, Luke Brandl, Jeremy Dohmann
Cruciform: Solving Crosswords with Natural Language Processing
based on feedback, we have determined that the paper needs more work
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Crossword puzzles are popular word games that require not only a large vocabulary, but also a broad knowledge of topics. Answering each clue is a natural language task on its own as many clues contain nuances, puns, or counter-intuitive word definitions. Additionally, it can be extremely difficult to ascertain definitive answers without the constraints of the crossword grid itself. This task is challenging for both humans and computers. We describe here a new crossword solving system, Cruciform. We employ a group of natural language components, each of which returns a list of candidate words with scores when given a clue. These lists are used in conjunction with the fill intersections in the puzzle grid to formulate a constraint satisfaction problem, in a manner similar to the one used in the Dr. Fill system. We describe the results of several of our experiments with the system.
[ { "version": "v1", "created": "Tue, 8 Nov 2016 01:47:41 GMT" }, { "version": "v2", "created": "Wed, 23 Nov 2016 16:14:23 GMT" } ]
2016-11-24T00:00:00
[ [ "Radev", "Dragomir", "" ], [ "Zhang", "Rui", "" ], [ "Wilson", "Steve", "" ], [ "Van Assche", "Derek", "" ], [ "Gubert", "Henrique Spyra", "" ], [ "Krivokapic", "Alisa", "" ], [ "Dong", "MeiXing", "" ], [ "Wu", "Chongruo", "" ], [ "Bondera", "Spruce", "" ], [ "Brandl", "Luke", "" ], [ "Dohmann", "Jeremy", "" ] ]
new_dataset
0.999164
1611.07601
Hang Zhang Dr.
Hang Zhang
Future Wireless Network: MyNET Platform and End-to-End Network Slicing
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Future wireless networks are facing new challenges. These new challenges require new solutions and strategies of the network deployment, management, and operation. Many driving factors are decisive in the re-definition and re-design of the future wireless network architecture. In the previously published paper "5G Wireless Network - MyNET and SONAC", MyNET and SONAC, a future network architecture, are described. This paper elaborates MyNET platform with more details. The design principles of MyNET architecture, the development of MyNET platform, the functions of MyNET platform, the automation of the creation and the management of end-to-end slices by MyNET, and the new capabilities enabled by MyNET are described in details.
[ { "version": "v1", "created": "Wed, 23 Nov 2016 02:12:37 GMT" } ]
2016-11-24T00:00:00
[ [ "Zhang", "Hang", "" ] ]
new_dataset
0.990582
1611.07610
Marianna Rapoport
Marianna Rapoport and Ond\v{r}ej Lhot\'ak
Mutable WadlerFest DOT
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Dependent Object Types (DOT) calculus aims to model the essence of Scala, with a focus on abstract type members, path-dependent types, and subtyping. Other Scala features could be defined by translation to DOT. Mutation is a fundamental feature of Scala currently missing in DOT. Mutation in DOT is needed not only to model effectful computation and mutation in Scala programs, but even to precisely specify how Scala initializes immutable variables and fields (vals). We present an extension to DOT that adds typed mutable reference cells. We have proven the extension sound with a mechanized proof in Coq. We present the key features of our extended calculus and its soundness proof, and discuss the challenges that we encountered in our search for a sound design and the alternative solutions that we considered.
[ { "version": "v1", "created": "Wed, 23 Nov 2016 02:37:51 GMT" } ]
2016-11-24T00:00:00
[ [ "Rapoport", "Marianna", "" ], [ "Lhoták", "Ondřej", "" ] ]
new_dataset
0.952935
1611.07622
EPTCS
Shahar Maoz (Tel Aviv University), Or Pistiner (Tel Aviv University), Jan Oliver Ringert (Tel Aviv University)
Symbolic BDD and ADD Algorithms for Energy Games
In Proceedings SYNT 2016, arXiv:1611.07178
EPTCS 229, 2016, pp. 35-54
10.4204/EPTCS.229.5
null
cs.LO cs.DS cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy games, which model quantitative consumption of a limited resource, e.g., time or energy, play a central role in quantitative models for reactive systems. Reactive synthesis constructs a controller which satisfies a given specification, if one exists. For energy games a synthesized controller ensures to satisfy not only the safety constraints of the specification but also the quantitative constraints expressed in the energy game. A symbolic algorithm for energy games, recently presented by Chatterjee et al., is symbolic in its representation of quantitative values but concrete in the representation of game states and transitions. In this paper we present an algorithm that is symbolic both in the quantitative values and in the underlying game representation. We have implemented our algorithm using two different symbolic representations for reactive games, Binary Decision Diagrams (BDD) and Algebraic Decision Diagrams (ADD). We investigate the commonalities and differences of the two implementations and compare their running times on specifications of energy games.
[ { "version": "v1", "created": "Wed, 23 Nov 2016 03:16:27 GMT" } ]
2016-11-24T00:00:00
[ [ "Maoz", "Shahar", "", "Tel Aviv University" ], [ "Pistiner", "Or", "", "Tel Aviv University" ], [ "Ringert", "Jan Oliver", "", "Tel Aviv University" ] ]
new_dataset
0.999454
1611.07627
EPTCS
Rajeev Alur (University of Pennsylvania), Dana Fisman (Ben-Gurion University), Rishabh Singh (Microsoft Research, Redmond), Armando Solar-Lezama (Massachusetts Institute of Technology)
SyGuS-Comp 2016: Results and Analysis
In Proceedings SYNT 2016, arXiv:1611.07178. arXiv admin note: text overlap with arXiv:1602.01170
EPTCS 229, 2016, pp. 178-202
10.4204/EPTCS.229.13
null
cs.SE cs.LG cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Syntax-Guided Synthesis (SyGuS) is the computational problem of finding an implementation f that meets both a semantic constraint given by a logical formula $\varphi$ in a background theory T, and a syntactic constraint given by a grammar G, which specifies the allowed set of candidate implementations. Such a synthesis problem can be formally defined in SyGuS-IF, a language that is built on top of SMT-LIB. The Syntax-Guided Synthesis Competition (SyGuS-Comp) is an effort to facilitate, bring together and accelerate research and development of efficient solvers for SyGuS by providing a platform for evaluating different synthesis techniques on a comprehensive set of benchmarks. In this year's competition we added a new track devoted to programming by examples. This track consisted of two categories, one using the theory of bit-vectors and one using the theory of strings. This paper presents and analyses the results of SyGuS-Comp'16.
[ { "version": "v1", "created": "Wed, 23 Nov 2016 03:17:40 GMT" } ]
2016-11-24T00:00:00
[ [ "Alur", "Rajeev", "", "University of Pennsylvania" ], [ "Fisman", "Dana", "", "Ben-Gurion\n University" ], [ "Singh", "Rishabh", "", "Microsoft Research, Redmond" ], [ "Solar-Lezama", "Armando", "", "Massachusetts Institute of Technology" ] ]
new_dataset
0.997983
1611.07791
Fares Jalled
Fares Jalled, Ilia Voronkov
Object Detection using Image Processing
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An Unmanned Ariel vehicle (UAV) has greater importance in the army for border security. The main objective of this article is to develop an OpenCV-Python code using Haar Cascade algorithm for object and face detection. Currently, UAVs are used for detecting and attacking the infiltrated ground targets. The main drawback for this type of UAVs is that sometimes the object are not properly detected, which thereby causes the object to hit the UAV. This project aims to avoid such unwanted collisions and damages of UAV. UAV is also used for surveillance that uses Voila-jones algorithm to detect and track humans. This algorithm uses cascade object detector function and vision. train function to train the algorithm. The main advantage of this code is the reduced processing time. The Python code was tested with the help of available database of video and image, the output was verified.
[ { "version": "v1", "created": "Wed, 23 Nov 2016 13:48:07 GMT" } ]
2016-11-24T00:00:00
[ [ "Jalled", "Fares", "" ], [ "Voronkov", "Ilia", "" ] ]
new_dataset
0.97508
1611.07819
Steven Eliuk
Steven Eliuk, Cameron Upright, Hars Vardhan, Stephen Walsh, Trevor Gale
dMath: Distributed Linear Algebra for DL
5 pages. arXiv admin note: text overlap with arXiv:1604.01416
null
null
null
cs.DC cs.MS cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a parallel math library, dMath, that demonstrates leading scaling when using intranode, internode, and hybrid-parallelism for deep learning (DL). dMath provides easy-to-use distributed primitives and a variety of domain-specific algorithms including matrix multiplication, convolutions, and others allowing for rapid development of scalable applications like deep neural networks (DNNs). Persistent data stored in GPU memory and advanced memory management techniques avoid costly transfers between host and device. dMath delivers performance, portability, and productivity to its specific domain of support.
[ { "version": "v1", "created": "Sat, 19 Nov 2016 00:24:12 GMT" } ]
2016-11-24T00:00:00
[ [ "Eliuk", "Steven", "" ], [ "Upright", "Cameron", "" ], [ "Vardhan", "Hars", "" ], [ "Walsh", "Stephen", "" ], [ "Gale", "Trevor", "" ] ]
new_dataset
0.988596
1611.07824
Dimitris Ballas
Anastasia Panori, Dimitris Ballas, Yannis Psycharis
SimAthens: A spatial microsimulation approach to the estimation and analysis of small-area income distributions and poverty rates in Athens, Greece
Preprint submitted to Computers, Environment and Urban Systems (accepted 2 August 2016). Published paper version available from: http://www.sciencedirect.com/science/article/pii/S0198971516301685
2016, Computers, Environment and Urban Systems, dx.doi.org/10.1016/j.compenvurbsys.2016.08.001
10.1016/j.compenvurbsys.2016.08.001
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Published during a severe economic crisis, this study presents the first spatial microsimulation model for the analysis of income inequalities and poverty in Greece. First, we present a brief overview of the method and discuss its potential for the analysis of multidimensional poverty and income inequality in Greece. We then present the SimAthens model, based on a combination of small-area demographic and socioeconomic information available from the Greek census of population with data from the European Union Statistics on Income and Living Conditions (EU-SILC). The model is based on an iterative proportional fitting (IPF) algorithm, and is used to reweigh EU-SILC records to fit in small-area descriptions for Athens based on 2001 and 2011 censuses. This is achieved by using demographic and socioeconomic characteristics as constraint variables. Finally, synthesis of the labor market and occupations are chosen as the main variables for externally validating our results, in order to verify the integrity of the model. Results of this external validation process are found to be extremely satisfactory, indicating a high goodness of fit between simulated and real values. Finally, the study presents a number of model outputs, illustrating changes in social and economic geography, during a severe economic crisis, offering a great opportunity for discussing further potential of this model in policy analysis.
[ { "version": "v1", "created": "Mon, 31 Oct 2016 13:37:08 GMT" } ]
2016-11-24T00:00:00
[ [ "Panori", "Anastasia", "" ], [ "Ballas", "Dimitris", "" ], [ "Psycharis", "Yannis", "" ] ]
new_dataset
0.997506
1408.3325
Philipp Kindermann
Michael A. Bekos and Thomas C. van Dijk and Philipp Kindermann and Alexander Wolff
Simultaneous Drawing of Planar Graphs with Right-Angle Crossings and Few Bends
null
J. Graph Algorithms Appl. 20(1): 133-158 (2016)
10.7155/jgaa.00388
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given two planar graphs that are defined on the same set of vertices, a RAC simultaneous drawing is one in which each graph is drawn planar, there are no edge overlaps and the crossings between the two graphs form right angles. The geometric version restricts the problem to straight-line drawings. It is known, however, that there exists a wheel and a matching which do not admit a geometric RAC simultaneous drawing. In order to enlarge the class of graphs that admit RAC simultaneous drawings, we allow bends in the resulting drawings. We prove that two planar graphs always admit a RAC simultaneous drawing with six bends per edge each, in quadratic area. For more restricted classes of planar graphs (i.e., matchings, paths, cycles, outerplanar graphs and subhamiltonian graphs), we manage to significantly reduce the required number of bends per edge, while keeping the area quadratic.
[ { "version": "v1", "created": "Thu, 14 Aug 2014 16:02:49 GMT" }, { "version": "v2", "created": "Tue, 22 Nov 2016 17:11:01 GMT" } ]
2016-11-23T00:00:00
[ [ "Bekos", "Michael A.", "" ], [ "van Dijk", "Thomas C.", "" ], [ "Kindermann", "Philipp", "" ], [ "Wolff", "Alexander", "" ] ]
new_dataset
0.999208
1605.01600
Fabien Ringeval
Michel Valstar, Jonathan Gratch, Bjorn Schuller, Fabien Ringeval, Denis Lalanne, Mercedes Torres Torres, Stefan Scherer, Guiota Stratou, Roddy Cowie and Maja Pantic
AVEC 2016 - Depression, Mood, and Emotion Recognition Workshop and Challenge
Proceedings of the 6th International Workshop on Audio/Visual Emotion Challenge, AVEC'16, co-located with the 24th ACM International Conference on Multimedia, MM 2016, pages 3-10, Amsterdam, The Netherlands, October 2016. ACM
null
null
null
cs.CV cs.HC cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Audio/Visual Emotion Challenge and Workshop (AVEC 2016) "Depression, Mood and Emotion" will be the sixth competition event aimed at comparison of multimedia processing and machine learning methods for automatic audio, visual and physiological depression and emotion analysis, with all participants competing under strictly the same conditions. The goal of the Challenge is to provide a common benchmark test set for multi-modal information processing and to bring together the depression and emotion recognition communities, as well as the audio, video and physiological processing communities, to compare the relative merits of the various approaches to depression and emotion recognition under well-defined and strictly comparable conditions and establish to what extent fusion of the approaches is possible and beneficial. This paper presents the challenge guidelines, the common data used, and the performance of the baseline system on the two tasks.
[ { "version": "v1", "created": "Thu, 5 May 2016 14:04:50 GMT" }, { "version": "v2", "created": "Fri, 6 May 2016 12:34:51 GMT" }, { "version": "v3", "created": "Fri, 27 May 2016 08:02:32 GMT" }, { "version": "v4", "created": "Tue, 22 Nov 2016 15:19:24 GMT" } ]
2016-11-23T00:00:00
[ [ "Valstar", "Michel", "" ], [ "Gratch", "Jonathan", "" ], [ "Schuller", "Bjorn", "" ], [ "Ringeval", "Fabien", "" ], [ "Lalanne", "Denis", "" ], [ "Torres", "Mercedes Torres", "" ], [ "Scherer", "Stefan", "" ], [ "Stratou", "Guiota", "" ], [ "Cowie", "Roddy", "" ], [ "Pantic", "Maja", "" ] ]
new_dataset
0.999417
1611.03273
Heping Jiang
Heping Jiang
Solutions of Grinberg equation and removable cycles in a cycle basis
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let G (V, E) be a simple graph with vertex set V and edge set E. A generalized cycle is a subgraph such that any vertex degree is even. A simple cycle (briefly in a cycle) is a connected subgraph such that every vertex has degree 2. A basis of the cycle space is called a cycle basis of G (V, E). A cycle basis where the sum of the weights of the cycles is minimal is called a minimum cycle basis of G. Grinberg theorem is a necessary condition to have a Hamilton cycle in planar graphs. In this paper, we use the cycles of a cycle basis to replace the faces and obtain an equality of inner faces in Grinberg theorem, called Grinberg equation. We explain why Grinberg theorem can only be a necessary condition of Hamilton graphs and apply the theorem, to be a necessary and sufficient condition, to simple graphs.
[ { "version": "v1", "created": "Thu, 10 Nov 2016 12:09:48 GMT" }, { "version": "v2", "created": "Tue, 22 Nov 2016 09:38:58 GMT" } ]
2016-11-23T00:00:00
[ [ "Jiang", "Heping", "" ] ]
new_dataset
0.999452
1611.07020
Morteza Mehrnoush
Morteza Mehrnoush, V. T. Vakili
Proactive SRV spectrum handoff protocol based on GCS scheme in cognitive radio adhoc network
null
International Journal of Power Control Signal and Computation (IJPCSC), Vol. 5, No.1, pp.1-08, Jan-March 2013
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive radio technology allows the secondary users to utilize the spectrum, when it is not occupied by the primary users. Whenever a primary user wants to utilize a channel which is occupied by a secondary user, the secondary user should perform a proactive spectrum handoff to another channel and vacate the selected channel before the primary user utilizes it. This scheme avoids collision between the primary users and secondary users; moreover, increases the throughput of the primary and secondary users. In this paper, a novel proactive spectrum hand protocol based on the Greedy Channel Selection (GCS) is proposed which avoids collision between secondary users, as well as, collision between primary and secondary users. In the proposed scheme, proactive spectrum handoff is based on the SRV (Single Rendezvous) coordination scheme; therefore, the secondary users perform proactive spectrum handoff without using the common control channel. Moreover, the channel selection is distributed which leads to the higher throughput, and lower average service time. The proposed proactive spectrum handoff protocol is compared with the other proactive spectrum handoff protocols. Simulation results illustrate that the proposed protocol outperforms the other protocols regarding higher average throughput and lower average service time.
[ { "version": "v1", "created": "Mon, 21 Nov 2016 20:44:55 GMT" } ]
2016-11-23T00:00:00
[ [ "Mehrnoush", "Morteza", "" ], [ "Vakili", "V. T.", "" ] ]
new_dataset
0.998207
1611.07083
Erik Schnetter
Pekka J\"a\"askel\"ainen, Carlos S\'anchez de La Lama, Erik Schnetter, Kalle Raiskila, Jarmo Takala, Heikki Berg
pocl: A Performance-Portable OpenCL Implementation
This article was published in 2015; it is now openly accessible via arxiv
Int J Parallel Prog (2015) 43: 752
10.1007/s10766-014-0320-y
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
OpenCL is a standard for parallel programming of heterogeneous systems. The benefits of a common programming standard are clear; multiple vendors can provide support for application descriptions written according to the standard, thus reducing the program porting effort. While the standard brings the obvious benefits of platform portability, the performance portability aspects are largely left to the programmer. The situation is made worse due to multiple proprietary vendor implementations with different characteristics, and, thus, required optimization strategies. In this paper, we propose an OpenCL implementation that is both portable and performance portable. At its core is a kernel compiler that can be used to exploit the data parallelism of OpenCL programs on multiple platforms with different parallel hardware styles. The kernel compiler is modularized to perform target-independent parallel region formation separately from the target-specific parallel mapping of the regions to enable support for various styles of fine-grained parallel resources such as subword SIMD extensions, SIMD datapaths and static multi-issue. Unlike previous similar techniques that work on the source level, the parallel region formation retains the information of the data parallelism using the LLVM IR and its metadata infrastructure. This data can be exploited by the later generic compiler passes for efficient parallelization. The proposed open source implementation of OpenCL is also platform portable, enabling OpenCL on a wide range of architectures, both already commercialized and on those that are still under research. The paper describes how the portability of the implementation is achieved. Our results show that most of the benchmarked applications when compiled using pocl were faster or close to as fast as the best proprietary OpenCL implementation for the platform at hand.
[ { "version": "v1", "created": "Mon, 21 Nov 2016 22:24:58 GMT" } ]
2016-11-23T00:00:00
[ [ "Jääskeläinen", "Pekka", "" ], [ "de La Lama", "Carlos Sánchez", "" ], [ "Schnetter", "Erik", "" ], [ "Raiskila", "Kalle", "" ], [ "Takala", "Jarmo", "" ], [ "Berg", "Heikki", "" ] ]
new_dataset
0.999635
1611.07329
Andre Phu-Van Nguyen
Alexandre Borowczyk, Duc-Tien Nguyen, Andr\'e Phu-Van Nguyen, Dang Quang Nguyen, David Saussi\'e, Jerome Le Ny
Autonomous Landing of a Multirotor Micro Air Vehicle on a High Velocity Ground Vehicle
Submitted to IFAC WC 2016
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While autonomous multirotor micro aerial vehicles (MAVs) are uniquely well suited for certain types of missions benefiting from stationary flight capabilities, their more widespread usage still faces many hurdles, due in particular to their limited range and the difficulty of fully automating their deployment and retrieval. In this paper we address these issues by solving the problem of the automated landing of a quadcopter on a ground vehicle moving at relatively high speed. We present our system architecture, including the structure of our Kalman filter for the estimation of the relative position and velocity between the quadcopter and the landing pad, as well as our controller design for the full rendezvous and landing maneuvers. The system is experimentally validated by successfully landing in multiple trials a commercial quadcopter on the roof of a car moving at speeds of up to 50 km/h.
[ { "version": "v1", "created": "Tue, 22 Nov 2016 14:45:35 GMT" } ]
2016-11-23T00:00:00
[ [ "Borowczyk", "Alexandre", "" ], [ "Nguyen", "Duc-Tien", "" ], [ "Nguyen", "André Phu-Van", "" ], [ "Nguyen", "Dang Quang", "" ], [ "Saussié", "David", "" ], [ "Ny", "Jerome Le", "" ] ]
new_dataset
0.997623
1611.07343
Jean-Baptiste Mouret
Antoine Cully, Konstantinos Chatzilygeroudis, Federico Allocati, Jean-Baptiste Mouret
Limbo: A Fast and Flexible Library for Bayesian Optimization
null
null
null
null
cs.LG cs.AI cs.RO stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Limbo is an open-source C++11 library for Bayesian optimization which is designed to be both highly flexible and very fast. It can be used to optimize functions for which the gradient is unknown, evaluations are expensive, and runtime cost matters (e.g., on embedded systems or robots). Benchmarks on standard functions show that Limbo is about 2 times faster than BayesOpt (another C++ library) for a similar accuracy.
[ { "version": "v1", "created": "Tue, 22 Nov 2016 15:00:08 GMT" } ]
2016-11-23T00:00:00
[ [ "Cully", "Antoine", "" ], [ "Chatzilygeroudis", "Konstantinos", "" ], [ "Allocati", "Federico", "" ], [ "Mouret", "Jean-Baptiste", "" ] ]
new_dataset
0.997904
1611.07350
Mordechai Guri
Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is possible to manipulate the headphones (or earphones) connected to a computer, silently turning them into a pair of eavesdropping microphones - with software alone. The same is also true for some types of loudspeakers. This paper focuses on this threat in a cyber-security context. We present SPEAKE(a)R, a software that can covertly turn the headphones connected to a PC into a microphone. We present technical background and explain why most of PCs and laptops are susceptible to this type of attack. We examine an attack scenario in which malware can use a computer as an eavesdropping device, even when a microphone is not present, muted, taped, or turned off. We measure the signal quality and the effective distance, and survey the defensive countermeasures.
[ { "version": "v1", "created": "Tue, 22 Nov 2016 15:18:07 GMT" } ]
2016-11-23T00:00:00
[ [ "Guri", "Mordechai", "" ], [ "Solewicz", "Yosef", "" ], [ "Daidakulov", "Andrey", "" ], [ "Elovici", "Yuval", "" ] ]
new_dataset
0.996249
1611.07351
Manuel Mazzara
Munir Makhmutov, Joseph Alexander Brown, Manuel Mazzara, Leonard Johard
MOMOS-MT: Mobile Monophonic System for Music Transcription
null
null
null
null
cs.SD cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Music holds a significant cultural role in social identity and in the encouragement of socialization. Technology, by the destruction of physical and cultural distance, has lead to many changes in musical themes and the complete loss of forms. Yet, it also allows for the preservation and distribution of music from societies without a history of written sheet music. This paper presents early work on a tool for musicians and ethnomusicologists to transcribe sheet music from monophonic voiced pieces for preservation and distribution. Using FFT, the system detects the pitch frequencies, also other methods detect note durations, tempo, time signatures and generates sheet music. The final system is able to be used in mobile platforms allowing the user to take recordings and produce sheet music in situ to a performance.
[ { "version": "v1", "created": "Tue, 22 Nov 2016 15:18:31 GMT" } ]
2016-11-23T00:00:00
[ [ "Makhmutov", "Munir", "" ], [ "Brown", "Joseph Alexander", "" ], [ "Mazzara", "Manuel", "" ], [ "Johard", "Leonard", "" ] ]
new_dataset
0.99977
1611.07397
Ashutosh Baheti
Ashutosh Baheti, Arobinda Gupta
Non-linear Barrier Coverage using Mobile Wireless Sensors
6 pages
null
null
null
cs.NI cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A belt region is said to be k-barrier covered by a set of sensors if all paths crossing the width of the belt region intersect the sensing regions of at least k sensors. Barrier coverage can be achieved from a random initial deployment of mobile sensors by suitably relocating the sensors to form a barrier. Reducing the movement of the sensors is important in such scenarios due to the energy constraints of sensor devices. In this paper, we propose a centralized algorithm which achieves 1-barrier coverage by forming a non-linear barrier from a random initial deployment of sensors in a belt. The algorithm uses a novel idea of physical behavior of chains along with the concept of virtual force. Formation of non-linear barrier reduces the movement of the sensors needed as compared to linear barriers. Detailed simulation results are presented to show that the proposed algorithm achieves barrier coverage with less movement of sensors compared to other existing algorithms in the literature.
[ { "version": "v1", "created": "Tue, 22 Nov 2016 16:34:05 GMT" } ]
2016-11-23T00:00:00
[ [ "Baheti", "Ashutosh", "" ], [ "Gupta", "Arobinda", "" ] ]
new_dataset
0.996023
1506.06378
Nate Foster
Steffen Smolka, Spiridon Eliopoulos, Nate Foster, Arjun Guha
A Fast Compiler for NetKAT
null
ACM SIGPLAN Notices - ICFP '15, Volume 50 Issue 9, September 2015, Pages 328-341
10.1145/2784731.2784761
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-level programming languages play a key role in a growing number of networking platforms, streamlining application development and enabling precise formal reasoning about network behavior. Unfortunately, current compilers only handle "local" programs that specify behavior in terms of hop-by-hop forwarding behavior, or modest extensions such as simple paths. To encode richer "global" behaviors, programmers must add extra state -- something that is tricky to get right and makes programs harder to write and maintain. Making matters worse, existing compilers can take tens of minutes to generate the forwarding state for the network, even on relatively small inputs. This forces programmers to waste time working around performance issues or even revert to using hardware-level APIs. This paper presents a new compiler for the NetKAT language that handles rich features including regular paths and virtual networks, and yet is several orders of magnitude faster than previous compilers. The compiler uses symbolic automata to calculate the extra state needed to implement "global" programs, and an intermediate representation based on binary decision diagrams to dramatically improve performance. We describe the design and implementation of three essential compiler stages: from virtual programs (which specify behavior in terms of virtual topologies) to global programs (which specify network-wide behavior in terms of physical topologies), from global programs to local programs (which specify behavior in terms of single-switch behavior), and from local programs to hardware-level forwarding tables. We present results from experiments on real-world benchmarks that quantify performance in terms of compilation time and forwarding table size.
[ { "version": "v1", "created": "Sun, 21 Jun 2015 15:37:27 GMT" }, { "version": "v2", "created": "Wed, 24 Jun 2015 15:52:52 GMT" } ]
2016-11-22T00:00:00
[ [ "Smolka", "Steffen", "" ], [ "Eliopoulos", "Spiridon", "" ], [ "Foster", "Nate", "" ], [ "Guha", "Arjun", "" ] ]
new_dataset
0.981125
1603.05846
Toni Ernvall
Toni Ernvall, Thomas Westerb\"ack, Ragnar Freij-Hollanti, Camilla Hollanti
A Connection Between Locally Repairable Codes and Exact Regenerating Codes
Conference, submitted
2016 IEEE International Symposium on Information Theory
10.1109/ISIT.2016.7541379
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Typically, locally repairable codes (LRCs) and regenerating codes have been studied independently of each other, and it has not been clear how the parameters of one relate to those of the other. In this paper, a novel connection between locally repairable codes and exact regenerating codes is established. Via this connection, locally repairable codes are interpreted as exact regenerating codes. Further, some of these codes are shown to perform better than time-sharing codes between minimum bandwidth regenerating and minimum storage regenerating codes.
[ { "version": "v1", "created": "Fri, 18 Mar 2016 11:30:50 GMT" } ]
2016-11-22T00:00:00
[ [ "Ernvall", "Toni", "" ], [ "Westerbäck", "Thomas", "" ], [ "Freij-Hollanti", "Ragnar", "" ], [ "Hollanti", "Camilla", "" ] ]
new_dataset
0.99808
1604.07379
Deepak Pathak
Deepak Pathak, Philipp Krahenbuhl, Jeff Donahue, Trevor Darrell, Alexei A. Efros
Context Encoders: Feature Learning by Inpainting
New results on ImageNet Generation
CVPR 2016
null
null
cs.CV cs.AI cs.GR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an unsupervised visual feature learning algorithm driven by context-based pixel prediction. By analogy with auto-encoders, we propose Context Encoders -- a convolutional neural network trained to generate the contents of an arbitrary image region conditioned on its surroundings. In order to succeed at this task, context encoders need to both understand the content of the entire image, as well as produce a plausible hypothesis for the missing part(s). When training context encoders, we have experimented with both a standard pixel-wise reconstruction loss, as well as a reconstruction plus an adversarial loss. The latter produces much sharper results because it can better handle multiple modes in the output. We found that a context encoder learns a representation that captures not just appearance but also the semantics of visual structures. We quantitatively demonstrate the effectiveness of our learned features for CNN pre-training on classification, detection, and segmentation tasks. Furthermore, context encoders can be used for semantic inpainting tasks, either stand-alone or as initialization for non-parametric methods.
[ { "version": "v1", "created": "Mon, 25 Apr 2016 19:42:46 GMT" }, { "version": "v2", "created": "Mon, 21 Nov 2016 20:56:42 GMT" } ]
2016-11-22T00:00:00
[ [ "Pathak", "Deepak", "" ], [ "Krahenbuhl", "Philipp", "" ], [ "Donahue", "Jeff", "" ], [ "Darrell", "Trevor", "" ], [ "Efros", "Alexei A.", "" ] ]
new_dataset
0.970059
1605.05717
Narayana Moorthy Prakash
Kishori M. Konwar, N. Prakash, Nancy Lynch and Muriel Medard
RADON: Repairable Atomic Data Object in Networks
To be presented at OPODIS 2016
null
null
null
cs.DC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Erasure codes offer an efficient way to decrease storage and communication costs while implementing atomic memory service in asynchronous distributed storage systems. In this paper, we provide erasure-code-based algorithms having the additional ability to perform background repair of crashed nodes. A repair operation of a node in the crashed state is triggered externally, and is carried out by the concerned node via message exchanges with other active nodes in the system. Upon completion of repair, the node re-enters active state, and resumes participation in ongoing and future read, write, and repair operations. To guarantee liveness and atomicity simultaneously, existing works assume either the presence of nodes with stable storage, or presence of nodes that never crash during the execution. We demand neither of these; instead we consider a natural, yet practical network stability condition $N1$ that only restricts the number of nodes in the crashed/repair state during broadcast of any message. We present an erasure-code based algorithm $RADON_C$ that is always live, and guarantees atomicity as long as condition $N1$ holds. In situations when the number of concurrent writes is limited, $RADON_C$ has significantly improved storage and communication cost over a replication-based algorithm $RADON_R$, which also works under $N1$. We further show how a slightly stronger network stability condition $N2$ can be used to construct algorithms that never violate atomicity. The guarantee of atomicity comes at the expense of having an additional phase during the read and write operations.
[ { "version": "v1", "created": "Wed, 18 May 2016 19:39:14 GMT" }, { "version": "v2", "created": "Mon, 21 Nov 2016 16:22:35 GMT" } ]
2016-11-22T00:00:00
[ [ "Konwar", "Kishori M.", "" ], [ "Prakash", "N.", "" ], [ "Lynch", "Nancy", "" ], [ "Medard", "Muriel", "" ] ]
new_dataset
0.999872
1607.02974
Saeid Kadkhodaei
Saeid Kadkhodaei, Fatemeh Barantalab, Sima Taheri, Majid Foroughi, Farahnaz Golestan Hashemi, Mahmood Reza Shabanimofrad, Hossein Hosseinimonfared, Morvarid Akhavan Rezaei, Ali Ranjbarfard, Mahbod Sahebi, Parisa Azizi, Maryam Dadar, Rambod Abiri, Mohammad Fazel Harighi, Nahid Kalhori, Mohammad Reza Etemadi, Ali Baradaran, Mahmoud Danaee, Iman Zare, Ahmad Ghafarpour, Zahra Azhdari, Hamid Rajabi Memari, Vajiheh Safavi, Naser Tajabadi, Faruku Bande
BioInfoBase : A Bioinformatics Resourceome
16 pages, 5 figures, International Association for Plant Biotechnology, IAPB Congress, Melbourne, Australia
null
null
null
cs.DL cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the past decade there has been a significant growth in bioinformatics databases, tools and resources. Although, bioinformatics is becoming more specific, increasing the number of bioinformatics-wares has made it difficult for researchers to find the most appropriate databases, tools or methods which match their needs. Our coordinated effort has been planned to establish a reference website in Bioinformatics as a public repository of tools, databases, directories and resources annotated with contextual information and organized by functional relevance. Within the first phase of BioInfoBase development, 22 experts in different fields of molecular biology contributed and more than 2500 records were registered, which are increasing daily. For each record submitted to the database of website almost all related data (40 features) has been extracted. These include information from the biological category and subcategory to the scientific article and developer information. Searching the query keyword(s) returns links containing the entered keyword(s) found within the different features of the records with more weights on the title, abstract and application fields. The search results simply provide the users with the most informative features of the records to select the most suitable ones. The usefulness of the returned results is ranked according to the matching score based on the Term Frequency-Inverse Document Frequency (TF-IDF) methods. Therefore, this search engine will screen a comprehensive index of bioinformatics tools, databases and resources and provide the best suited records (links) to the researchers need. The BioInfoBase resource is available at www.bioinfobase.info.
[ { "version": "v1", "created": "Mon, 11 Jul 2016 14:28:42 GMT" }, { "version": "v2", "created": "Sun, 20 Nov 2016 16:17:05 GMT" } ]
2016-11-22T00:00:00
[ [ "Kadkhodaei", "Saeid", "" ], [ "Barantalab", "Fatemeh", "" ], [ "Taheri", "Sima", "" ], [ "Foroughi", "Majid", "" ], [ "Hashemi", "Farahnaz Golestan", "" ], [ "Shabanimofrad", "Mahmood Reza", "" ], [ "Hosseinimonfared", "Hossein", "" ], [ "Rezaei", "Morvarid Akhavan", "" ], [ "Ranjbarfard", "Ali", "" ], [ "Sahebi", "Mahbod", "" ], [ "Azizi", "Parisa", "" ], [ "Dadar", "Maryam", "" ], [ "Abiri", "Rambod", "" ], [ "Harighi", "Mohammad Fazel", "" ], [ "Kalhori", "Nahid", "" ], [ "Etemadi", "Mohammad Reza", "" ], [ "Baradaran", "Ali", "" ], [ "Danaee", "Mahmoud", "" ], [ "Zare", "Iman", "" ], [ "Ghafarpour", "Ahmad", "" ], [ "Azhdari", "Zahra", "" ], [ "Memari", "Hamid Rajabi", "" ], [ "Safavi", "Vajiheh", "" ], [ "Tajabadi", "Naser", "" ], [ "Bande", "Faruku", "" ] ]
new_dataset
0.992607
1607.05434
Athanasios Kehagias
Athanasios Kehagias, Georgios Konstantinidis
Selfish Cops and Passive Robber: Qualitative Games
null
null
null
null
cs.DM cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several variants of the cops and robbers (CR) game have been studied in the past. In this paper we examine a novel variant, which is played between two cops, each one independently trying to catch a "passive robber". We will call this the Selfish Cops and Passive Robber {SCPR} game. In short, SCPR is a stochastic two-player, zero-sum game where the opponents are the two cop players. We study sequential and concurrent versions of the SCPR game. For both cases we prove the existence of value and optimal strategies and present algorithms for the computation of these.
[ { "version": "v1", "created": "Tue, 19 Jul 2016 07:32:20 GMT" }, { "version": "v2", "created": "Sat, 19 Nov 2016 20:39:16 GMT" } ]
2016-11-22T00:00:00
[ [ "Kehagias", "Athanasios", "" ], [ "Konstantinidis", "Georgios", "" ] ]
new_dataset
0.999239
1609.00523
Kaustav Bose
Kaustav Bose, Ranendu Adhikary, Sruti Gan Chaudhuri, Buddhadeb Sau
Euclidean 1-center of a set of static and mobile points
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the problem of computing the algebraic parametric equation of the Euclidean 1-center function in $\mathbb{R}^d$, $d \geq 2$, for a system of $n$ static points and $m$ mobile points having motion defined by rational parametric functions. We have shown that the corresponding Euclidean 1-center function is a piecewise differentiable function and have derived its exact parametric algebraic equation. If the positions of the static points and the rational parametric equations of the motion of the mobile points are given, we have proposed an algorithm that computes the parametric equation of the Euclidean 1-center function.
[ { "version": "v1", "created": "Fri, 2 Sep 2016 09:58:10 GMT" }, { "version": "v2", "created": "Mon, 21 Nov 2016 12:47:07 GMT" } ]
2016-11-22T00:00:00
[ [ "Bose", "Kaustav", "" ], [ "Adhikary", "Ranendu", "" ], [ "Chaudhuri", "Sruti Gan", "" ], [ "Sau", "Buddhadeb", "" ] ]
new_dataset
0.96548
1609.08359
Isabelle Augenstein
Ben Eisner, Tim Rockt\"aschel, Isabelle Augenstein, Matko Bo\v{s}njak, Sebastian Riedel
emoji2vec: Learning Emoji Representations from their Description
7 pages, 4 figures, 1 table, In Proceedings of the 4th International Workshop on Natural Language Processing for Social Media at EMNLP 2016 (SocialNLP at EMNLP 2016)
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many current natural language processing applications for social media rely on representation learning and utilize pre-trained word embeddings. There currently exist several publicly-available, pre-trained sets of word embeddings, but they contain few or no emoji representations even as emoji usage in social media has increased. In this paper we release emoji2vec, pre-trained embeddings for all Unicode emoji which are learned from their description in the Unicode emoji standard. The resulting emoji embeddings can be readily used in downstream social natural language processing applications alongside word2vec. We demonstrate, for the downstream task of sentiment analysis, that emoji embeddings learned from short descriptions outperforms a skip-gram model trained on a large collection of tweets, while avoiding the need for contexts in which emoji need to appear frequently in order to estimate a representation.
[ { "version": "v1", "created": "Tue, 27 Sep 2016 11:32:25 GMT" }, { "version": "v2", "created": "Sun, 20 Nov 2016 22:43:46 GMT" } ]
2016-11-22T00:00:00
[ [ "Eisner", "Ben", "" ], [ "Rocktäschel", "Tim", "" ], [ "Augenstein", "Isabelle", "" ], [ "Bošnjak", "Matko", "" ], [ "Riedel", "Sebastian", "" ] ]
new_dataset
0.998813
1610.10042
Serge Dmitrieff
Serge Dmitrieff, Fran\c{c}ois N\'ed\'elec
ConfocalGN : a minimalistic confocal image simulator
null
null
null
null
cs.CV q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SUMMARY : We developed a user-friendly software to generate synthetic confocal microscopy images from a ground truth specified as a 3D bitmap with pixels of arbitrary size. The software can analyze a real confocal stack to derivate noise parameters and will use them directly to generate new images with similar noise characteristics. Such synthetic images can then be used to assert the quality and robustness of an image analysis pipeline, as well as be used to train machine-learning image analysis procedures. We illustrate the approach with closed curves corresponding to the microtubule ring present in blood platelet. AVAILABILITY AND IMPLEMENTATION: ConfocalGN is written in Matlab but does not require any toolbox. The source code is distributed under the GPL 3.0 licence on https://github.com/SergeDmi/ConfocalGN.
[ { "version": "v1", "created": "Mon, 31 Oct 2016 18:08:54 GMT" }, { "version": "v2", "created": "Mon, 21 Nov 2016 13:50:11 GMT" } ]
2016-11-22T00:00:00
[ [ "Dmitrieff", "Serge", "" ], [ "Nédélec", "François", "" ] ]
new_dataset
0.989696
1611.06468
Rui Liu
Rui Liu, Xiaoli Zhang
Generating machine-executable plans from end-user's natural-language instructions
16 pages, 10 figures, article submitted to Robotics and Computer-Integrated Manufacturing, 2016 Aug
null
null
null
cs.AI cs.CL cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is critical for advanced manufacturing machines to autonomously execute a task by following an end-user's natural language (NL) instructions. However, NL instructions are usually ambiguous and abstract so that the machines may misunderstand and incorrectly execute the task. To address this NL-based human-machine communication problem and enable the machines to appropriately execute tasks by following the end-user's NL instructions, we developed a Machine-Executable-Plan-Generation (exePlan) method. The exePlan method conducts task-centered semantic analysis to extract task-related information from ambiguous NL instructions. In addition, the method specifies machine execution parameters to generate a machine-executable plan by interpreting abstract NL instructions. To evaluate the exePlan method, an industrial robot Baxter was instructed by NL to perform three types of industrial tasks {'drill a hole', 'clean a spot', 'install a screw'}. The experiment results proved that the exePlan method was effective in generating machine-executable plans from the end-user's NL instructions. Such a method has the promise to endow a machine with the ability of NL-instructed task execution.
[ { "version": "v1", "created": "Sun, 20 Nov 2016 04:06:47 GMT" } ]
2016-11-22T00:00:00
[ [ "Liu", "Rui", "" ], [ "Zhang", "Xiaoli", "" ] ]
new_dataset
0.999407
1611.06544
Franco Bagnoli
Elisa Guidi, Patrizia Meringolo, Andrea Guazzini, Franco Bagnoli
Stochastic Agent-Based Models of Intimate Partner Violence
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Intimate partner violence (IPV) is a significant public health problem and social issue that involves couples from all socioeconomic and cultural contexts. IPV may affect women and men, but these latter are the most common perpetrators of IPV. We developed stochastic Agent-Based models of IPV focused on the couple dynamics, determined by the parallel, individual behaviour of partners. Based on the psychological theory of the Cycle of Violence, we have developed a model based on four discrete states: passivity, normal situation, upset and physical assault. The individual transition probability depends on the previous state of the subject and that of the partner, and on a control parameter, the aggressiveness. We then let this parameter evolve depending on the perceived violence from past experiences (polarisation) or from the support received from the environment (social influence). From the analysis of the phase diagrams we observe the emergence of characteristic patterns, in agreement with the observations of IPV in the literature.
[ { "version": "v1", "created": "Sun, 20 Nov 2016 16:53:18 GMT" } ]
2016-11-22T00:00:00
[ [ "Guidi", "Elisa", "" ], [ "Meringolo", "Patrizia", "" ], [ "Guazzini", "Andrea", "" ], [ "Bagnoli", "Franco", "" ] ]
new_dataset
0.995702
1611.06591
Tianqiong Luo
Tianqiong Luo, Vaneet Aggarwal, and Borja Peleato
Coded Caching with Distributed Storage
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Content delivery networks store information distributed across multiple servers, so as to balance the load and avoid unrecoverable losses in case of node or disk failures. Coded caching has been shown to be a useful technique which can reduce peak traffic rates by pre-fetching popular content at the end users and encoding transmissions so that different users can extract different information from the same packet. On one hand, distributed storage limits the capability of combining content from different servers into a single message, causing performance losses in coded caching schemes. But, on the other hand, the inherent redundancy existing in distributed storage systems can be used to improve the performance of those schemes through parallelism. This paper designs a scheme combining distributed storage of the content in multiple servers and an efficient coded caching algorithm for delivery to the users. This scheme is shown to reduce the peak transmission rate below that of state-of-the-art algorithms.
[ { "version": "v1", "created": "Sun, 20 Nov 2016 21:05:16 GMT" } ]
2016-11-22T00:00:00
[ [ "Luo", "Tianqiong", "" ], [ "Aggarwal", "Vaneet", "" ], [ "Peleato", "Borja", "" ] ]
new_dataset
0.997306
1611.06609
Rafael Araujo Da Silva
Rafael Araujo da Silva and Michele Nogueira
MAC Protocols for IEEE 802.11ax: Avoiding Collisions on Dense Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless networks have become the main form of Internet access. Statistics show that the global mobile Internet penetration should exceed 70\% until 2019. Wi-Fi is an important player in this change. Founded on IEEE 802.11, this technology has a crucial impact in how we share broadband access both in domestic and corporate networks. However, recent works have indicated performance issues in Wi-Fi networks, mainly when they have been deployed without planning and under high user density. Hence, different collision avoidance techniques and Medium Access Control protocols have been designed in order to improve Wi-Fi performance. Analyzing the collision problem, this work strengthens the claims found in the literature about the low Wi-Fi performance under dense scenarios. Then, in particular, this article overviews the MAC protocols used in the IEEE 802.11 standard and discusses solutions to mitigate collisions. Finally, it contributes presenting future trends in MAC protocols. This assists in foreseeing expected improvements for the next generation of Wi-Fi devices.
[ { "version": "v1", "created": "Sun, 20 Nov 2016 23:11:11 GMT" } ]
2016-11-22T00:00:00
[ [ "da Silva", "Rafael Araujo", "" ], [ "Nogueira", "Michele", "" ] ]
new_dataset
0.995284
1611.06620
Richard Oentaryo
Jovian Lin, Richard J. Oentaryo, Ee-Peng Lim, Casey Vu, Adrian Vu, Agus T. Kwee, Philips K. Prasetyo
A Business Zone Recommender System Based on Facebook and Urban Planning Data
null
Proceedings of the European Conference on Information Retrieval, 2016, pp. 641-647
10.1007/978-3-319-30671-1_47
null
cs.SI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present ZoneRec---a zone recommendation system for physical businesses in an urban city, which uses both public business data from Facebook and urban planning data. The system consists of machine learning algorithms that take in a business' metadata and outputs a list of recommended zones to establish the business in. We evaluate our system using data of food businesses in Singapore and assess the contribution of different feature groups to the recommendation quality.
[ { "version": "v1", "created": "Mon, 21 Nov 2016 00:47:44 GMT" } ]
2016-11-22T00:00:00
[ [ "Lin", "Jovian", "" ], [ "Oentaryo", "Richard J.", "" ], [ "Lim", "Ee-Peng", "" ], [ "Vu", "Casey", "" ], [ "Vu", "Adrian", "" ], [ "Kwee", "Agus T.", "" ], [ "Prasetyo", "Philips K.", "" ] ]
new_dataset
0.973949
1611.06703
Jad Hamza
Mika\"el Mayer, Jad Hamza
Optimal Test Sets for Context-Free Languages
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A test set for a formal language (set of strings) L is a subset T of L such that for any two string homomorphisms f and g defined on L, if the restrictions of f and g on T are identical functions, then f and g are identical on the entire L. Previously, it was shown that there are context-free grammars for which smallest test sets are cubic in the size of the grammar, which gives a lower bound on tests set size. Existing upper bounds were higher degree polynomials; we here give the first algorithm to compute test sets of cubic size for all context-free grammars, settling the gap between the upper and lower bound.
[ { "version": "v1", "created": "Mon, 21 Nov 2016 10:02:02 GMT" } ]
2016-11-22T00:00:00
[ [ "Mayer", "Mikaël", "" ], [ "Hamza", "Jad", "" ] ]
new_dataset
0.994511
1611.06822
Yong Zeng
Yong Zeng, Bruno Clerckx, and Rui Zhang
Communications and Signals Design for Wireless Power Transmission
Invited tutorial paper, submitted for publication, 26 pages, 11 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Radiative wireless power transfer (WPT) is a promising technology to provide cost-effective and real-time power supplies to wireless devices. Although radiative WPT shares many similar characteristics with the extensively studied wireless information transfer or communication, they also differ significantly in terms of design objectives, transmitter/receiver architectures and hardware constraints, etc. In this article, we first give an overview on the various WPT technologies, the historical development of the radiative WPT technology and the main challenges in designing contemporary radiative WPT systems. Then, we focus on discussing the new communication and signal processing techniques that can be applied to tackle these challenges. Topics discussed include energy harvester modeling, energy beamforming for WPT, channel acquisition, power region characterization in multi-user WPT, waveform design with linear and non-linear energy receiver model, safety and health issues of WPT, massive MIMO (multiple-input multiple-output) and millimeter wave (mmWave) enabled WPT, wireless charging control, and wireless power and communication systems co-design. We also point out directions that are promising for future research.
[ { "version": "v1", "created": "Mon, 21 Nov 2016 15:03:24 GMT" } ]
2016-11-22T00:00:00
[ [ "Zeng", "Yong", "" ], [ "Clerckx", "Bruno", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.998259
1611.06925
Antonio Graells
Antonio Graells, Francisco Carrabina
Robust Design of H-infinity Controller for a Launch Vehicle Autopilot against Disturbances
6 pages, 6 figures
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), Volume 11, Issue 5, PP 135-140, 2016
10.9790/1676-110502135140
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Atmospheric flight phase of a launch vehicle is utilized to evaluate the performance of an H-infinity controller in the presence of disturbances. Dynamics of the vehicle is linearly modeled using time-varying parameters. An operating point was found to design a robust command tracker using H-infinity control theory that guarantees a stable maneuver. At the end, the controller was employed on the launch vehicle to assess the capability of control design on the linearized aerospace vehicle. Experimental results illustrate the excellent performance of the H-infinity controller and accurate tracking implemented by the autopilot. Also the robustness of the entire system against disturbances is demonstrated to be acceptable.
[ { "version": "v1", "created": "Mon, 21 Nov 2016 18:13:27 GMT" } ]
2016-11-22T00:00:00
[ [ "Graells", "Antonio", "" ], [ "Carrabina", "Francisco", "" ] ]
new_dataset
0.973846
1611.06986
Ramon Sanabria
Ramon Sanabria, Florian Metze and Fernando De La Torre
Robust end-to-end deep audiovisual speech recognition
null
null
null
null
cs.CL cs.LG cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Speech is one of the most effective ways of communication among humans. Even though audio is the most common way of transmitting speech, very important information can be found in other modalities, such as vision. Vision is particularly useful when the acoustic signal is corrupted. Multi-modal speech recognition however has not yet found wide-spread use, mostly because the temporal alignment and fusion of the different information sources is challenging. This paper presents an end-to-end audiovisual speech recognizer (AVSR), based on recurrent neural networks (RNN) with a connectionist temporal classification (CTC) loss function. CTC creates sparse "peaky" output activations, and we analyze the differences in the alignments of output targets (phonemes or visemes) between audio-only, video-only, and audio-visual feature representations. We present the first such experiments on the large vocabulary IBM ViaVoice database, which outperform previously published approaches on phone accuracy in clean and noisy conditions.
[ { "version": "v1", "created": "Mon, 21 Nov 2016 20:08:51 GMT" } ]
2016-11-22T00:00:00
[ [ "Sanabria", "Ramon", "" ], [ "Metze", "Florian", "" ], [ "De La Torre", "Fernando", "" ] ]
new_dataset
0.957765
1611.06997
Hongyuan Mei
Hongyuan Mei and Mohit Bansal and Matthew R. Walter
Coherent Dialogue with Attention-based Language Models
To appear at AAAI 2017
null
null
null
cs.CL cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We model coherent conversation continuation via RNN-based dialogue models equipped with a dynamic attention mechanism. Our attention-RNN language model dynamically increases the scope of attention on the history as the conversation continues, as opposed to standard attention (or alignment) models with a fixed input scope in a sequence-to-sequence model. This allows each generated word to be associated with the most relevant words in its corresponding conversation history. We evaluate the model on two popular dialogue datasets, the open-domain MovieTriples dataset and the closed-domain Ubuntu Troubleshoot dataset, and achieve significant improvements over the state-of-the-art and baselines on several metrics, including complementary diversity-based metrics, human evaluation, and qualitative visualizations. We also show that a vanilla RNN with dynamic attention outperforms more complex memory models (e.g., LSTM and GRU) by allowing for flexible, long-distance memory. We promote further coherence via topic modeling-based reranking.
[ { "version": "v1", "created": "Mon, 21 Nov 2016 20:25:19 GMT" } ]
2016-11-22T00:00:00
[ [ "Mei", "Hongyuan", "" ], [ "Bansal", "Mohit", "" ], [ "Walter", "Matthew R.", "" ] ]
new_dataset
0.999079
1602.08777
Martin Strohmeier
Martin Strohmeier, Matthias Sch\"afer, Rui Pinheiro, Vincent Lenders, Ivan Martinovic
On Perception and Reality in Wireless Air Traffic Communications Security
20 pages, 5 figures, 7 tables
null
10.1109/TITS.2016.2612584
null
cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
More than a dozen wireless technologies are used by air traffic communication systems during different flight phases. From a conceptual perspective, all of them are insecure as security was never part of their design. Recent contributions from academic and hacking communities have exploited this inherent vulnerability to demonstrate attacks on some of these technologies. However, not all of these contributions have resonated widely within aviation circles. At the same time, the security community lacks certain aviation domain knowledge, preventing aviation authorities from giving credence to their findings. In this paper, we aim to reconcile the view of the security community and the perspective of aviation professionals concerning the safety of air traffic communication technologies. To achieve this, we first provide a systematization of the applications of wireless technologies upon which civil aviation relies. Based on these applications, we comprehensively analyze vulnerabilities, attacks, and countermeasures. We categorize the existing research on countermeasures into approaches that are applicable in the short term and research of secure new technologies deployable in the long term. Since not all of the required aviation knowledge is codified in academic publications, we additionally examine existing aviation standards and survey 242 international aviation experts. Besides their domain knowledge, we also analyze the awareness of members of the aviation community concerning the security of wireless systems and collect their expert opinions on the potential impact of concrete attack scenarios using these technologies.
[ { "version": "v1", "created": "Sun, 28 Feb 2016 22:25:20 GMT" }, { "version": "v2", "created": "Tue, 1 Mar 2016 15:26:03 GMT" }, { "version": "v3", "created": "Mon, 24 Oct 2016 17:00:40 GMT" } ]
2016-11-21T00:00:00
[ [ "Strohmeier", "Martin", "" ], [ "Schäfer", "Matthias", "" ], [ "Pinheiro", "Rui", "" ], [ "Lenders", "Vincent", "" ], [ "Martinovic", "Ivan", "" ] ]
new_dataset
0.992623
1607.01993
Nikos Gorogiannis
James Brotherston, Nikos Gorogiannis and Max Kanovich
Biabduction (and Related Problems) in Array Separation Logic
null
null
null
null
cs.LO cs.DS cs.PL math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate array separation logic (ASL), a variant of symbolic-heap separation logic in which the data structures are either pointers or arrays, i.e., contiguous blocks of allocated memory. This logic provides a language for compositional memory safety proofs of imperative array programs. We focus on the biabduction problem for this logic, which has been established as the key to automatic specification inference at the industrial scale. We present an NP decision procedure for biabduction in ASL that produces solutions of reasonable quality, and we also show that the problem of finding a consistent solution is NP-hard. Along the way, we study satisfiability and entailment in our logic, giving decision procedures and complexity bounds for both problems. We show satisfiability to be NP-complete, and entailment to be decidable with high complexity. The somewhat surprising fact that biabduction is much simpler than entailment is explained by the fact that, as we show, the element of choice over biabduction solutions enables us to dramatically reduce the search space.
[ { "version": "v1", "created": "Thu, 7 Jul 2016 12:49:04 GMT" }, { "version": "v2", "created": "Wed, 16 Nov 2016 21:44:27 GMT" }, { "version": "v3", "created": "Fri, 18 Nov 2016 11:20:20 GMT" } ]
2016-11-21T00:00:00
[ [ "Brotherston", "James", "" ], [ "Gorogiannis", "Nikos", "" ], [ "Kanovich", "Max", "" ] ]
new_dataset
0.999685
1611.05896
Somak Aditya
Somak Aditya, Yezhou Yang, Chitta Baral, Yiannis Aloimonos
Answering Image Riddles using Vision and Reasoning through Probabilistic Soft Logic
14 pages, 10 figures
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we explore a genre of puzzles ("image riddles") which involves a set of images and a question. Answering these puzzles require both capabilities involving visual detection (including object, activity recognition) and, knowledge-based or commonsense reasoning. We compile a dataset of over 3k riddles where each riddle consists of 4 images and a groundtruth answer. The annotations are validated using crowd-sourced evaluation. We also define an automatic evaluation metric to track future progress. Our task bears similarity with the commonly known IQ tasks such as analogy solving, sequence filling that are often used to test intelligence. We develop a Probabilistic Reasoning-based approach that utilizes probabilistic commonsense knowledge to answer these riddles with a reasonable accuracy. We demonstrate the results of our approach using both automatic and human evaluations. Our approach achieves some promising results for these riddles and provides a strong baseline for future attempts. We make the entire dataset and related materials publicly available to the community in ImageRiddle Website (http://bit.ly/22f9Ala).
[ { "version": "v1", "created": "Thu, 17 Nov 2016 21:10:33 GMT" } ]
2016-11-21T00:00:00
[ [ "Aditya", "Somak", "" ], [ "Yang", "Yezhou", "" ], [ "Baral", "Chitta", "" ], [ "Aloimonos", "Yiannis", "" ] ]
new_dataset
0.999477
1611.06008
Yong Zeng
Yong Zeng, Lu Yang, and Rui Zhang
Multi-User Millimeter Wave MIMO with Full-Dimensional Lens Antenna Array
14 pages, 9 figures, submitted for possible journal publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Millimeter wave (mmWave) communication by utilizing lens antenna arrays is a promising technique for realizing cost-effective 5G wireless systems with large MIMO (multiple-input multiple-output) but only limited radio frequency (RF) chains. This paper studies an uplink multi-user mmWave single-sided lens MIMO system, where only the base station (BS) is equipped with a full-dimensional (FD) lens antenna array with both elevation and azimuth angle resolution capabilities, and each mobile station (MS) employs the conventional uniform planar array (UPA) without the lens. By exploiting the angle-dependent energy focusing property of the lens antenna array at the BS as well as the multi-path sparsity of mmWave channels, we propose a low-complexity path division multiple access (PDMA) scheme, which enables virtually interference-free multi-user communications when the angle of arrivals (AoAs) of all MS multi-path signals are sufficiently separable at the BS. To this end, a new technique called path delay compensation is proposed at the BS to effectively transform the multi-user frequency-selective MIMO channels to parallel frequency-flat small-size MIMO channels for different MSs, for each of which the low-complexity single-carrier(SC) transmission is applied. For general scenarios with insufficient AoA separations, analog beamforming at the MSs and digital combining at the BS are jointly designed to maximize the achievable sum-rate of the MSs based on their effective MIMO channels resulting from path delay compensation. In addition, we propose a new and efficient channel estimation scheme tailored for PDMA, which requires negligible training overhead in practical mmWave systems and yet leads to comparable performance as that based on perfect channel state information (CSI).
[ { "version": "v1", "created": "Fri, 18 Nov 2016 08:45:40 GMT" } ]
2016-11-21T00:00:00
[ [ "Zeng", "Yong", "" ], [ "Yang", "Lu", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.999751
1611.06078
Arief Wicaksana
Arief Wicaksana (ITB), Arif Sasongko (ITB)
Fast and reconfigurable packet classification engine in FPGA-based firewall
in 2011 International Conference on Electrical Engineering and Informatics (ICEEI), Jul 2011, Bandung, Indonesia
null
10.1109/ICEEI.2011.6021782
null
cs.AR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In data communication via internet, security is becoming one of the most influential aspects. One way to support it is by classifying and filtering ethernet packets within network devices. Packet classification is a fundamental task for network devices such as routers, firewalls, and intrusion detection systems. In this paper we present architecture of fast and reconfigurable Packet Classification Engine (PCE). This engine is used in FPGA-based firewall. Our PCE inspects multi-dimensional field of packet header sequentially based on tree-based algorithm. This algorithm simplifies overall system to a lower scale and leads to a more secure system. The PCE works with an adaptation of single cycle processor architecture in the system. Ethernet packet is examined with PCE based on Source IP Address, Destination IP Address, Source Port, Destination Port, and Protocol fields of the packet header. These are basic fields to know whether it is a dangerous or normal packet before inspecting the content. Using implementation of tree-based algorithm in the architecture, firewall rules are rebuilt into 24-bit sub-rules which are read as processor instruction in the inspection process. The inspection process is comparing one sub-rule with input field of header every clock cycle. The proposed PCE shows 91 MHz clock frequency in Cyclone II EP2C70F896C6 with 13 clocks throughput average from input to output generation. The use of tree-based algorithm simplifies the multidimensional packet inspection and gives us reconfigurable as well as scalable system. The architecture is fast, reliable, and adaptable and also can maximize the advantages of the algorithm very well. Although the PCE has high frequency and little amount of clock, filtering speed of a firewall also depends on the other components, such as packet FIFO buffer. Fast and reliable FIFO buffer is needed to support the PCE. This PCE also is not completed with rule update mechanism yet. This proposed PCE is tested as a component of FPGA-based firewall to filter Ethernet packet with FPGA DE2 Board using NIOS II platform.
[ { "version": "v1", "created": "Fri, 18 Nov 2016 13:59:39 GMT" } ]
2016-11-21T00:00:00
[ [ "Wicaksana", "Arief", "", "ITB" ], [ "Sasongko", "Arif", "", "ITB" ] ]
new_dataset
0.99844
0704.2259
Lifeng Lai
Lifeng Lai, Hesham El Gamal and H. Vincent Poor
The Wiretap Channel with Feedback: Encryption over the Channel
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2008.929914
null
cs.IT cs.CR math.IT
null
In this work, the critical role of noisy feedback in enhancing the secrecy capacity of the wiretap channel is established. Unlike previous works, where a noiseless public discussion channel is used for feedback, the feed-forward and feedback signals share the same noisy channel in the present model. Quite interestingly, this noisy feedback model is shown to be more advantageous in the current setting. More specifically, the discrete memoryless modulo-additive channel with a full-duplex destination node is considered first, and it is shown that the judicious use of feedback increases the perfect secrecy capacity to the capacity of the source-destination channel in the absence of the wiretapper. In the achievability scheme, the feedback signal corresponds to a private key, known only to the destination. In the half-duplex scheme, a novel feedback technique that always achieves a positive perfect secrecy rate (even when the source-wiretapper channel is less noisy than the source-destination channel) is proposed. These results hinge on the modulo-additive property of the channel, which is exploited by the destination to perform encryption over the channel without revealing its key to the source. Finally, this scheme is extended to the continuous real valued modulo-$\Lambda$ channel where it is shown that the perfect secrecy capacity with feedback is also equal to the capacity in the absence of the wiretapper.
[ { "version": "v1", "created": "Wed, 18 Apr 2007 02:43:40 GMT" } ]
2016-11-18T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.998697
0705.0999
Oren Somekh
Oren Somekh, Osvaldo Simeone, H. Vincent Poor, and Shlomo Shamai (Shitz)
Cellular Systems with Full-Duplex Amplify-and-Forward Relaying and Cooperative Base-Stations
To appear in the Proc. of the 2007 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2007.4557197
null
cs.IT math.IT
null
In this paper the benefits provided by multi-cell processing of signals transmitted by mobile terminals which are received via dedicated relay terminals (RTs) are assessed. Unlike previous works, each RT is assumed here to be capable of full-duplex operation and receives the transmission of adjacent relay terminals. Focusing on intra-cell TDMA and non-fading channels, a simplified uplink cellular model introduced by Wyner is considered. This framework facilitates analytical derivation of the per-cell sum-rate of multi-cell and conventional single-cell receivers. In particular, the analysis is based on the observation that the signal received at the base stations can be interpreted as the outcome of a two-dimensional linear time invariant system. Numerical results are provided as well in order to provide further insight into the performance benefits of multi-cell processing with relaying.
[ { "version": "v1", "created": "Mon, 7 May 2007 20:47:37 GMT" } ]
2016-11-18T00:00:00
[ [ "Somekh", "Oren", "", "Shitz" ], [ "Simeone", "Osvaldo", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
new_dataset
0.996481
0706.3752
Ruoheng Liu
Ruoheng Liu, Yingbin Liang, H. Vincent Poor, and Predrag Spasojevic
Secure Nested Codes for Type II Wiretap Channels
To appear in the Proceedings of the 2007 IEEE Information Theory Workshop on Frontiers in Coding Theory, Lake Tahoe, CA, September 2-6, 2007
null
10.1109/ITW.2007.4313097
null
cs.IT cs.CR math.IT
null
This paper considers the problem of secure coding design for a type II wiretap channel, where the main channel is noiseless and the eavesdropper channel is a general binary-input symmetric-output memoryless channel. The proposed secure error-correcting code has a nested code structure. Two secure nested coding schemes are studied for a type II Gaussian wiretap channel. The nesting is based on cosets of a good code sequence for the first scheme and on cosets of the dual of a good code sequence for the second scheme. In each case, the corresponding achievable rate-equivocation pair is derived based on the threshold behavior of good code sequences. The two secure coding schemes together establish an achievable rate-equivocation region, which almost covers the secrecy capacity-equivocation region in this case study. The proposed secure coding scheme is extended to a type II binary symmetric wiretap channel. A new achievable perfect secrecy rate, which improves upon the previously reported result by Thangaraj et al., is derived for this channel.
[ { "version": "v1", "created": "Tue, 26 Jun 2007 03:57:34 GMT" } ]
2016-11-18T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ], [ "Spasojevic", "Predrag", "" ] ]
new_dataset
0.999624
0707.4311
Sanket Dusad
S. Dusad, S. N. Diggavi and A. R. Calderbank
Embedded Rank Distance Codes for ISI channels
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2008.929960
null
cs.IT math.IT
null
Designs for transmit alphabet constrained space-time codes naturally lead to questions about the design of rank distance codes. Recently, diversity embedded multi-level space-time codes for flat fading channels have been designed from sets of binary matrices with rank distance guarantees over the binary field by mapping them onto QAM and PSK constellations. In this paper we demonstrate that diversity embedded space-time codes for fading Inter-Symbol Interference (ISI) channels can be designed with provable rank distance guarantees. As a corollary we obtain an asymptotic characterization of the fixed transmit alphabet rate-diversity trade-off for multiple antenna fading ISI channels. The key idea is to construct and analyze properties of binary matrices with a particular structure induced by ISI channels.
[ { "version": "v1", "created": "Sun, 29 Jul 2007 20:47:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Dusad", "S.", "" ], [ "Diggavi", "S. N.", "" ], [ "Calderbank", "A. R.", "" ] ]
new_dataset
0.998181
0711.3152
Tobias Koch
Tobias Koch, Amos Lapidoth
Multipath Channels of Bounded Capacity
To be presented at the 2008 IEEE Information Theory Workshop (ITW) in Porto, Portugal; replaced with the version that appears in the proceedings
null
10.1109/ITW.2008.4578611
null
cs.IT math.IT
null
The capacity of discrete-time, non-coherent, multipath fading channels is considered. It is shown that if the delay spread is large in the sense that the variances of the path gains do not decay faster than geometrically, then capacity is bounded in the signal-to-noise ratio.
[ { "version": "v1", "created": "Tue, 20 Nov 2007 15:00:39 GMT" }, { "version": "v2", "created": "Mon, 14 Apr 2008 12:19:10 GMT" } ]
2016-11-18T00:00:00
[ [ "Koch", "Tobias", "" ], [ "Lapidoth", "Amos", "" ] ]
new_dataset
0.997104
0712.0744
Vitorino Ramos Dr.
Vitorino Ramos, C. M. Fernandes, A. C. Rosa, A. Abraham
Computational Chemotaxis in Ants and Bacteria over Dynamic Environments
8 pages, 6 figures, in CEC 07 - IEEE Congress on Evolutionary Computation, ISBN 1-4244-1340-0, pp. 1009-1017, Sep. 2007
null
10.1109/CEC.2007.4424594
null
cs.MA cs.AI q-bio.PE q-bio.QM
null
Chemotaxis can be defined as an innate behavioural response by an organism to a directional stimulus, in which bacteria, and other single-cell or multicellular organisms direct their movements according to certain chemicals in their environment. This is important for bacteria to find food (e.g., glucose) by swimming towards the highest concentration of food molecules, or to flee from poisons. Based on self-organized computational approaches and similar stigmergic concepts we derive a novel swarm intelligent algorithm. What strikes from these observations is that both eusocial insects as ant colonies and bacteria have similar natural mechanisms based on stigmergy in order to emerge coherent and sophisticated patterns of global collective behaviour. Keeping in mind the above characteristics we will present a simple model to tackle the collective adaptation of a social swarm based on real ant colony behaviors (SSA algorithm) for tracking extrema in dynamic environments and highly multimodal complex functions described in the well-know De Jong test suite. Later, for the purpose of comparison, a recent model of artificial bacterial foraging (BFOA algorithm) based on similar stigmergic features is described and analyzed. Final results indicate that the SSA collective intelligence is able to cope and quickly adapt to unforeseen situations even when over the same cooperative foraging period, the community is requested to deal with two different and contradictory purposes, while outperforming BFOA in adaptive speed. Results indicate that the present approach deals well in severe Dynamic Optimization problems.
[ { "version": "v1", "created": "Wed, 5 Dec 2007 15:02:19 GMT" } ]
2016-11-18T00:00:00
[ [ "Ramos", "Vitorino", "" ], [ "Fernandes", "C. M.", "" ], [ "Rosa", "A. C.", "" ], [ "Abraham", "A.", "" ] ]
new_dataset
0.998808
0712.2113
Andreas U. Schmidt
Andreas U. Schmidt, Nicolai Kuntze and Michael Kasper
On the deployment of Mobile Trusted Modules
To appear in: Proceedings of the Wireless Communications and Networking Conference, IEEE WCNC 2008, Las Vegas, USA, 31 March - 2 April 2008
null
10.1109/WCNC.2008.553
null
cs.CR
null
In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a trustworthy operating platform. In particular we propose a method for the take-ownership of a device by the user and the migration (i.e., portability) of user credentials between devices.
[ { "version": "v1", "created": "Thu, 13 Dec 2007 20:53:32 GMT" } ]
2016-11-18T00:00:00
[ [ "Schmidt", "Andreas U.", "" ], [ "Kuntze", "Nicolai", "" ], [ "Kasper", "Michael", "" ] ]
new_dataset
0.997194
0712.2235
Manik Lal Das
Manik Lal Das, Ashutosh Saxena, and Ved P. Gulati
A Dynamic ID-based Remote User Authentication Scheme
Published in IEEE Transactions On Consumer Electronics
IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, 2004, pp. 629-631
10.1109/TCE.2004.1309441
null
cs.CR
null
Password-based authentication schemes are the most widely used techniques for remote user authentication. Many static ID-based remote user authentication schemes both with and without smart cards have been proposed. Most of the schemes do not allow the users to choose and change their passwords, and maintain a verifier table to verify the validity of the user login. In this paper we present a dynamic ID-based remote user authentication scheme using smart cards. Our scheme allows the users to choose and change their passwords freely, and do not maintain any verifier table. The scheme is secure against ID-theft, and can resist the reply attacks, forgery attacks, guessing attacks, insider attacks and stolen verifier attacks.
[ { "version": "v1", "created": "Thu, 13 Dec 2007 21:18:46 GMT" } ]
2016-11-18T00:00:00
[ [ "Das", "Manik Lal", "" ], [ "Saxena", "Ashutosh", "" ], [ "Gulati", "Ved P.", "" ] ]
new_dataset
0.999845
0712.4169
Al-Sakib Khan Pathan
Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong
Security in Wireless Sensor Networks: Issues and Challenges
6 pages
Proceedings of 8th IEEE ICACT 2006, Volume II, February 20-22, Phoenix Park, Korea, 2006, pp. 1043-1048
10.1109/ICACT.2006.206151
null
cs.NI
null
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.
[ { "version": "v1", "created": "Thu, 27 Dec 2007 01:22:39 GMT" } ]
2016-11-18T00:00:00
[ [ "Pathan", "Al-Sakib Khan", "" ], [ "Lee", "Hyung-Woo", "" ], [ "Hong", "Choong Seon", "" ] ]
new_dataset
0.955204
0803.2365
Ganesh Narayan
V Sriram, Ganesh Narayan, K Gopinath
SAFIUS - A secure and accountable filesystem over untrusted storage
11pt, 12 pages, 16 figures
Fourth International IEEE Security in Storage Workshop, 2007 - SISW '07. Publication Date: 27-27 Sept. 2007 On page(s): 34-45
10.1109/SISW.2007.7
null
cs.OS cs.CR cs.DC cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe SAFIUS, a secure accountable file system that resides over an untrusted storage. SAFIUS provides strong security guarantees like confidentiality, integrity, prevention from rollback attacks, and accountability. SAFIUS also enables read/write sharing of data and provides the standard UNIX-like interface for applications. To achieve accountability with good performance, it uses asynchronous signatures; to reduce the space required for storing these signatures, a novel signature pruning mechanism is used. SAFIUS has been implemented on a GNU/Linux based system modifying OpenGFS. Preliminary performance studies show that SAFIUS has a tolerable overhead for providing secure storage: while it has an overhead of about 50% of OpenGFS in data intensive workloads (due to the overhead of performing encryption/decryption in software), it is comparable (or better in some cases) to OpenGFS in metadata intensive workloads.
[ { "version": "v1", "created": "Sun, 16 Mar 2008 18:24:13 GMT" } ]
2016-11-18T00:00:00
[ [ "Sriram", "V", "" ], [ "Narayan", "Ganesh", "" ], [ "Gopinath", "K", "" ] ]
new_dataset
0.978396