id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1312.4805
Marco Baldi
Marco Baldi, Giovanni Cancellieri, Franco Chiaraluce
Array Convolutional Low-Density Parity-Check Codes
4 pages, 2 figures, accepted for publication in IEEE Communications Letters
null
10.1109/LCOMM.2013.120713.132177
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a design technique for obtaining regular time-invariant low-density parity-check convolutional (RTI-LDPCC) codes with low complexity and good performance. We start from previous approaches which unwrap a low-density parity-check (LDPC) block code into an RTI-LDPCC code, and we obtain a new method to design RTI-LDPCC codes with better performance and shorter constraint length. Differently from previous techniques, we start the design from an array LDPC block code. We show that, for codes with high rate, a performance gain and a reduction in the constraint length are achieved with respect to previous proposals. Additionally, an increase in the minimum distance is observed.
[ { "version": "v1", "created": "Tue, 17 Dec 2013 14:46:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Baldi", "Marco", "" ], [ "Cancellieri", "Giovanni", "" ], [ "Chiaraluce", "Franco", "" ] ]
new_dataset
0.998676
1401.1406
Jianfeng Zhan
Lei Wang, Jianfeng Zhan, Chunjie Luo, Yuqing Zhu, Qiang Yang, Yongqiang He, Wanling Gao, Zhen Jia, Yingjie Shi, Shujie Zhang, Chen Zheng, Gang Lu, Kent Zhan, Xiaona Li, and Bizhu Qiu
BigDataBench: a Big Data Benchmark Suite from Internet Services
12 pages, 6 figures, The 20th IEEE International Symposium On High Performance Computer Architecture (HPCA-2014), February 15-19, 2014, Orlando, Florida, USA
null
10.1109/HPCA.2014.6835958
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As architecture, systems, and data management communities pay greater attention to innovative big data systems and architectures, the pressure of benchmarking and evaluating these systems rises. Considering the broad use of big data systems, big data benchmarks must include diversity of data and workloads. Most of the state-of-the-art big data benchmarking efforts target evaluating specific types of applications or system software stacks, and hence they are not qualified for serving the purposes mentioned above. This paper presents our joint research efforts on this issue with several industrial partners. Our big data benchmark suite BigDataBench not only covers broad application scenarios, but also includes diverse and representative data sets. BigDataBench is publicly available from http://prof.ict.ac.cn/BigDataBench . Also, we comprehensively characterize 19 big data workloads included in BigDataBench with varying data inputs. On a typical state-of-practice processor, Intel Xeon E5645, we have the following observations: First, in comparison with the traditional benchmarks: including PARSEC, HPCC, and SPECCPU, big data applications have very low operation intensity; Second, the volume of data input has non-negligible impact on micro-architecture characteristics, which may impose challenges for simulation-based big data architecture research; Last but not least, corroborating the observations in CloudSuite and DCBench (which use smaller data inputs), we find that the numbers of L1 instruction cache misses per 1000 instructions of the big data applications are higher than in the traditional benchmarks; also, we find that L3 caches are effective for the big data applications, corroborating the observation in DCBench.
[ { "version": "v1", "created": "Mon, 6 Jan 2014 12:35:31 GMT" }, { "version": "v2", "created": "Sat, 22 Feb 2014 20:25:01 GMT" } ]
2016-11-17T00:00:00
[ [ "Wang", "Lei", "" ], [ "Zhan", "Jianfeng", "" ], [ "Luo", "Chunjie", "" ], [ "Zhu", "Yuqing", "" ], [ "Yang", "Qiang", "" ], [ "He", "Yongqiang", "" ], [ "Gao", "Wanling", "" ], [ "Jia", "Zhen", "" ], [ "Shi", "Yingjie", "" ], [ "Zhang", "Shujie", "" ], [ "Zheng", "Chen", "" ], [ "Lu", "Gang", "" ], [ "Zhan", "Kent", "" ], [ "Li", "Xiaona", "" ], [ "Qiu", "Bizhu", "" ] ]
new_dataset
0.995564
1401.5297
Gergeky Bicz\'ok
Gergely Biczok, Santiago Diez Martinez, Thomas Jelle, John Krogstie
Navigating MazeMap: indoor human mobility, spatio-logical ties and future potential
6 pages, accepted at PerMoby Workshop at IEEE PerCom 2014
null
10.1109/PerComW.2014.6815215
null
cs.SY cs.NI cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Global navigation systems and location-based services have found their way into our daily lives. Recently, indoor positioning techniques have also been proposed, and there are several live or trial systems already operating. In this paper, we present insights from MazeMap, the first live indoor/outdoor positioning and navigation system deployed at a large university campus in Norway. Our main contribution is a measurement case study; we show the spatial and temporal distribution of MazeMap geo-location and wayfinding requests, construct the aggregated human mobility map of the campus and find strong logical ties between different locations. On one hand, our findings are specific to the venue; on the other hand, the nature of available data and insights coupled with our discussion on potential usage scenarios for indoor positioning and location-based services predict a successful future for these systems and applications.
[ { "version": "v1", "created": "Tue, 21 Jan 2014 12:57:08 GMT" } ]
2016-11-17T00:00:00
[ [ "Biczok", "Gergely", "" ], [ "Martinez", "Santiago Diez", "" ], [ "Jelle", "Thomas", "" ], [ "Krogstie", "John", "" ] ]
new_dataset
0.999048
1403.5089
Ranga Prasad
Ranga Prasad, Srikrishna Bhashyam, and A. Chockalingam
On the Gaussian Many-to-One X Channel
Submitted to IEEE Transactions on Information Theory; Revised and updated version of the original draft
null
10.1109/TIT.2015.2499746
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the Gaussian many-to-one X channel, which is a special case of general multiuser X channel, is studied. In the Gaussian many-to-one X channel, communication links exist between all transmitters and one of the receivers, along with a communication link between each transmitter and its corresponding receiver. As per the X channel assumption, transmission of messages is allowed on all the links of the channel. This communication model is different from the corresponding many-to-one interference channel (IC). Transmission strategies which involve using Gaussian codebooks and treating interference from a subset of transmitters as noise are formulated for the above channel. Sum-rate is used as the criterion of optimality for evaluating the strategies. Initially, a $3 \times 3$ many-to-one X channel is considered and three transmission strategies are analyzed. The first two strategies are shown to achieve sum-rate capacity under certain channel conditions. For the third strategy, a sum-rate outer bound is derived and the gap between the outer bound and the achieved rate is characterized. These results are later extended to the $K \times K$ case. Next, a region in which the many-to-one X channel can be operated as a many-to-one IC without loss of sum-rate is identified. Further, in the above region, it is shown that using Gaussian codebooks and treating interference as noise achieves a rate point that is within $K/2 -1$ bits from the sum-rate capacity. Subsequently, some implications of the above results to the Gaussian many-to-one IC are discussed. Transmission strategies for the many-to-one IC are formulated and channel conditions under which the strategies achieve sum-rate capacity are obtained. A region where the sum-rate capacity can be characterized to within $K/2-1$ bits is also identified.
[ { "version": "v1", "created": "Thu, 20 Mar 2014 10:31:29 GMT" }, { "version": "v2", "created": "Mon, 22 Jun 2015 17:18:17 GMT" } ]
2016-11-17T00:00:00
[ [ "Prasad", "Ranga", "" ], [ "Bhashyam", "Srikrishna", "" ], [ "Chockalingam", "A.", "" ] ]
new_dataset
0.976082
1404.3075
Marco Baldi
Marco Baldi, Nicola Maturo, Giacomo Ricciutelli, Franco Chiaraluce
Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages
6 pages, 4 figures, to be presented at IEEE ICC'14 - Workshop on Wireless Physical Layer Security
null
10.1109/ICCW.2014.6881291
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The broadcast channel with confidential messages is a well studied scenario from the theoretical standpoint, but there is still lack of practical schemes able to achieve some fixed level of reliability and security over such a channel. In this paper, we consider a quasi-static fading channel in which both public and private messages must be sent from the transmitter to the receivers, and we aim at designing suitable coding and modulation schemes to achieve such a target. For this purpose, we adopt the error rate as a metric, by considering that reliability (security) is achieved when a sufficiently low (high) error rate is experienced at the receiving side. We show that some conditions exist on the system feasibility, and that some outage probability must be tolerated to cope with the fading nature of the channel. The proposed solution exploits low-density parity-check codes with unequal error protection, which are able to guarantee two different levels of protection against noise for the public and the private information, in conjunction with different modulation schemes for the public and the private message bits.
[ { "version": "v1", "created": "Fri, 11 Apr 2014 11:27:53 GMT" } ]
2016-11-17T00:00:00
[ [ "Baldi", "Marco", "" ], [ "Maturo", "Nicola", "" ], [ "Ricciutelli", "Giacomo", "" ], [ "Chiaraluce", "Franco", "" ] ]
new_dataset
0.987414
1404.6560
Jad Hachem
Jad Hachem, Nikhil Karamchandani, Suhas Diggavi
Content Caching and Delivery over Heterogeneous Wireless Networks
A shorter version is to appear in IEEE INFOCOM 2015
null
10.1109/INFOCOM.2015.7218445
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Emerging heterogeneous wireless architectures consist of a dense deployment of local-coverage wireless access points (APs) with high data rates, along with sparsely-distributed, large-coverage macro-cell base stations (BS). We design a coded caching-and-delivery scheme for such architectures that equips APs with storage, enabling content pre-fetching prior to knowing user demands. Users requesting content are served by connecting to local APs with cached content, as well as by listening to a BS broadcast transmission. For any given content popularity profile, the goal is to design the caching-and-delivery scheme so as to optimally trade off the transmission cost at the BS against the storage cost at the APs and the user cost of connecting to multiple APs. We design a coded caching scheme for non-uniform content popularity that dynamically allocates user access to APs based on requested content. We demonstrate the approximate optimality of our scheme with respect to information-theoretic bounds. We numerically evaluate it on a YouTube dataset and quantify the trade-off between transmission rate, storage, and access cost. Our numerical results also suggest the intriguing possibility that, to gain most of the benefits of coded caching, it suffices to divide the content into a small number of popularity classes.
[ { "version": "v1", "created": "Fri, 25 Apr 2014 21:22:55 GMT" }, { "version": "v2", "created": "Thu, 12 Mar 2015 08:48:08 GMT" } ]
2016-11-17T00:00:00
[ [ "Hachem", "Jad", "" ], [ "Karamchandani", "Nikhil", "" ], [ "Diggavi", "Suhas", "" ] ]
new_dataset
0.988535
1406.4259
Mauro Femminella
Luca Felicetti, Mauro Femminella, Gianluca Reali, Tadashi Nakano, Athanasios V. Vasilakos
TCP-like molecular communications
Accepted for publication, IEEE Journal on Selected Areas in Communications, 2014
null
10.1109/JSAC.2014.2367653
null
cs.ET cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a communication protocol between a pair of biological nanomachines, transmitter and receiver, built upon molecular communications in an aqueous environment. In our proposal, the receiver, acting as a control node, sends a connection setup signal to the transmitter, which stokes molecules, to start molecule transmission. The molecules transmitted by the transmitter propagate in the environment and are absorbed by the receiver through its receptors. When the receiver absorbs the desired quantity of molecules, it releases a tear-down signal to notify the transmitter to stop the transmission. The proposed protocol implements a bidirectional communication by using a number of techniques originally designed for the TCP. In fact, the proposed protocol is connection-oriented, and uses the TCP-like probing to find a suitable transmission rate between transmitter and receiver so as to avoid receiver congestion. Unlike the TCP, however, explicit acknowledgments are not used, since they would degrade the communication throughput due to the large delay, a characteristic feature of molecular communications. Thus, the proposed protocol uses implicit acknowledgments, and feedback signals are sent by the receiver to throttle the transmission rate at the transmitter, i.e., explicit negative feedbacks. We also present the results of an extensive simulation campaign, used to validate the proposed protocol and to properly dimension the main protocol parameters.
[ { "version": "v1", "created": "Tue, 17 Jun 2014 07:15:10 GMT" } ]
2016-11-17T00:00:00
[ [ "Felicetti", "Luca", "" ], [ "Femminella", "Mauro", "" ], [ "Reali", "Gianluca", "" ], [ "Nakano", "Tadashi", "" ], [ "Vasilakos", "Athanasios V.", "" ] ]
new_dataset
0.999855
1406.5765
Ming Jin
Ming Jin, Han Zou, Kevin Weekly, Ruoxi Jia, Alexandre M. Bayen, and Costas J. Spanos
Environmental Sensing by Wearable Device for Indoor Activity and Location Estimation
submitted to the 40th Annual Conference of the IEEE Industrial Electronics Society (IECON)
null
10.1109/IECON.2014.7049320
null
cs.HC stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present results from a set of experiments in this pilot study to investigate the causal influence of user activity on various environmental parameters monitored by occupant carried multi-purpose sensors. Hypotheses with respect to each type of measurements are verified, including temperature, humidity, and light level collected during eight typical activities: sitting in lab / cubicle, indoor walking / running, resting after physical activity, climbing stairs, taking elevators, and outdoor walking. Our main contribution is the development of features for activity and location recognition based on environmental measurements, which exploit location- and activity-specific characteristics and capture the trends resulted from the underlying physiological process. The features are statistically shown to have good separability and are also information-rich. Fusing environmental sensing together with acceleration is shown to achieve classification accuracy as high as 99.13%. For building applications, this study motivates a sensor fusion paradigm for learning individualized activity, location, and environmental preferences for energy management and user comfort.
[ { "version": "v1", "created": "Sun, 22 Jun 2014 21:13:58 GMT" } ]
2016-11-17T00:00:00
[ [ "Jin", "Ming", "" ], [ "Zou", "Han", "" ], [ "Weekly", "Kevin", "" ], [ "Jia", "Ruoxi", "" ], [ "Bayen", "Alexandre M.", "" ], [ "Spanos", "Costas J.", "" ] ]
new_dataset
0.999387
1406.7116
Jalaluddin Qureshi
Jalaluddin Qureshi, Chuan Heng Foh, Jianfei Cai
Maximum Multipath Routing Throughput in Multirate Wireless Mesh Networks
This paper has been accepted for publication in IEEE 80th Vehicular Technology Conference, VTC-Fall 2014
null
10.1109/VTCFall.2014.6966047
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper, we consider the problem of finding the maximum routing throughput between any pair of nodes in an arbitrary multirate wireless mesh network (WMN) using multiple paths. Multipath routing is an efficient technique to maximize routing throughput in WMN, however maximizing multipath routing throughput is a NP-complete problem due to the shared medium for electromagnetic wave transmission in wireless channel, inducing collision-free scheduling as part of the optimization problem. In this work, we first provide problem formulation that incorporates collision-free schedule, and then based on this formulation we design an algorithm with search pruning that jointly optimizes paths and transmission schedule. Though suboptimal, compared to the known optimal single path flow, we demonstrate that an efficient multipath routing scheme can increase the routing throughput by up to 100% for simple WMNs.
[ { "version": "v1", "created": "Fri, 27 Jun 2014 08:59:11 GMT" } ]
2016-11-17T00:00:00
[ [ "Qureshi", "Jalaluddin", "" ], [ "Foh", "Chuan Heng", "" ], [ "Cai", "Jianfei", "" ] ]
new_dataset
0.995358
1407.4017
Dyonisius Dony Ariananda
Dyonisius Dony Ariananda, Daniel Romero, and Geert Leus
Compressive Periodogram Reconstruction Using Uniform Binning
Submitted to IEEE Transactions on Signal Processing
null
10.1109/TSP.2015.2430838
null
cs.OH math.SP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, two problems that show great similarities are examined. The first problem is the reconstruction of the angular-domain periodogram from spatial-domain signals received at different time indices. The second one is the reconstruction of the frequency-domain periodogram from time-domain signals received at different wireless sensors. We split the entire angular or frequency band into uniform bins. The bin size is set such that the received spectra at two frequencies or angles, whose distance is equal to or larger than the size of a bin, are uncorrelated. These problems in the two different domains lead to a similar circulant structure in the so-called coset correlation matrix. This circulant structure allows for a strong compression and a simple least-squares reconstruction method. The latter is possible under the full column rank condition of the system matrix, which can be achieved by designing the spatial or temporal sampling patterns based on a circular sparse ruler. We analyze the statistical performance of the compressively reconstructed periodogram including bias and variance. We further consider the case when the bins are so small that the received spectra at two frequencies or angles, with a spacing between them larger than the size of the bin, can still be correlated. In this case, the resulting coset correlation matrix is generally not circulant and thus a special approach is required.
[ { "version": "v1", "created": "Wed, 9 Jul 2014 16:40:57 GMT" }, { "version": "v2", "created": "Fri, 19 Dec 2014 15:50:35 GMT" } ]
2016-11-17T00:00:00
[ [ "Ariananda", "Dyonisius Dony", "" ], [ "Romero", "Daniel", "" ], [ "Leus", "Geert", "" ] ]
new_dataset
0.996861
1408.2335
Suzhi Bi
Suzhi Bi, Chin Keong Ho, and Rui Zhang
Wireless Powered Communication: Opportunities and Challenges
Accepted for publication by IEEE Communications Magazine
null
10.1109/MCOM.2015.7081084
null
cs.NI cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
The performance of wireless communication is fundamentally constrained by the limited battery life of wireless devices, whose operations are frequently disrupted due to the need of manual battery replacement/recharging. The recent advance in radio frequency (RF) enabled wireless energy transfer (WET) technology provides an attractive solution named wireless powered communication (WPC), where the wireless devices are powered by dedicated wireless power transmitters to provide continuous and stable microwave energy over the air. As a key enabling technology for truly perpetual communications, WPC opens up the potential to build a network with larger throughput, higher robustness, and increased flexibility compared to its battery-powered counterpart. However, the combination of wireless energy and information transmissions also raises many new research problems and implementation issues to be addressed. In this article, we provide an overview of state-of-the-art RF-enabled WET technologies and their applications to wireless communications, with highlights on the key design challenges, solutions, and opportunities ahead.
[ { "version": "v1", "created": "Mon, 11 Aug 2014 07:40:48 GMT" }, { "version": "v2", "created": "Mon, 29 Dec 2014 12:50:12 GMT" } ]
2016-11-17T00:00:00
[ [ "Bi", "Suzhi", "" ], [ "Ho", "Chin Keong", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.99826
1409.3940
Arpan Chattopadhyay
Arpan Chattopadhyay, Avishek Ghosh, Akhila S. Rao, Bharat Dwivedi, S.V.R. Anand, Marceau Coupechoux, and Anurag Kumar
Impromptu Deployment of Wireless Relay Networks: Experiences Along a Forest Trail
7 pages, accepted in IEEE MASS 2014
null
10.1109/MASS.2014.33
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are motivated by the problem of impromptu or as- you-go deployment of wireless sensor networks. As an application example, a person, starting from a sink node, walks along a forest trail, makes link quality measurements (with the previously placed nodes) at equally spaced locations, and deploys relays at some of these locations, so as to connect a sensor placed at some a priori unknown point on the trail with the sink node. In this paper, we report our experimental experiences with some as-you-go deployment algorithms. Two algorithms are based on Markov decision process (MDP) formulations; these require a radio propagation model. We also study purely measurement based strategies: one heuristic that is motivated by our MDP formulations, one asymptotically optimal learning algorithm, and one inspired by a popular heuristic. We extract a statistical model of the propagation along a forest trail from raw measurement data, implement the algorithms experimentally in the forest, and compare them. The results provide useful insights regarding the choice of the deployment algorithm and its parameters, and also demonstrate the necessity of a proper theoretical formulation.
[ { "version": "v1", "created": "Sat, 13 Sep 2014 12:28:01 GMT" } ]
2016-11-17T00:00:00
[ [ "Chattopadhyay", "Arpan", "" ], [ "Ghosh", "Avishek", "" ], [ "Rao", "Akhila S.", "" ], [ "Dwivedi", "Bharat", "" ], [ "Anand", "S. V. R.", "" ], [ "Coupechoux", "Marceau", "" ], [ "Kumar", "Anurag", "" ] ]
new_dataset
0.997132
1409.6624
Bernhard Rumpe
Holger Krahn, Bernhard Rumpe, Steven V\"olkel
Integrated Definition of Abstract and Concrete Syntax for Textual Languages
15 pages, 12 figures. arXiv admin note: text overlap with arXiv:1409.2367
Proceedings of the ACM/IEEE 10th International Conference on Model Driven Engineering Languages and Systems (MODELS 2007), Nashville, TN, USA, LNCS 4735
10.1007/978-3-540-75209-7_20
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An understandable concrete syntax and a comprehensible abstract syntax are two central aspects of defining a modeling language. Both representations of a language significantly overlap in their structure and also information, but may also differ in parts of the information. To avoid discrepancies and problems while handling the language, concrete and abstract syntax need to be consistently defined. This will become an even bigger problem, when domain specific languages will become used to a larger extent. In this paper we present an extended grammar format that avoids redundancy between concrete and abstract syntax by allowing an integrated definition of both for textual modeling languages. For an amendment of the usability of the abstract syntax it furthermore integrates meta-modeling concepts like associations and inheritance into a well-understood grammar-based approach. This forms a sound foundation for an extensible grammar and therefore language definition.
[ { "version": "v1", "created": "Mon, 22 Sep 2014 12:39:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Krahn", "Holger", "" ], [ "Rumpe", "Bernhard", "" ], [ "Völkel", "Steven", "" ] ]
new_dataset
0.988143
1410.0213
Iqbal Hussain
Iqbal Hussain, Ming Xiao, and Lars K. Rasmussen
Buffer-Based Distributed LT Codes
14 pages, 17 figures, submitted
IEEE Transactions on Communications 2014
10.1109/TCOMM.2014.2362111
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We focus on the design of distributed Luby transform (DLT) codes for erasure networks with multiple sources and multiple relays, communicating to a single destination. The erasure-floor performance of DLT codes improves with the maximum degree of the relay-degree distribution. However, for conventional DLT codes, the maximum degree is upper-bounded by the number of sources. An additional constraint is that the sources are required to have the same information block length. We introduce a $D$-bit buffer for each source-relay link, which allows the relay to select multiple encoded bits from the same source for the relay-encoding process; thus, the number of sources no longer limits the maximum degree at the relay. Furthermore, the introduction of buffers facilitates the use of different information block sizes across sources. Based on density evolution we develop an asymptotic analytical framework for optimization of the relay-degree distribution. We further integrate techniques for unequal erasure protection into the optimization framework. The proposed codes are considered for both lossless and lossy source-relay links. Numerical examples show that there is no loss in erasure performance for transmission over lossy source-relay links as compared to lossless links. Additional delays, however, may occur. The design framework and our contributions are demonstrated by a number of illustrative examples, showing the improvements obtained by the proposed buffer-based DLT codes.
[ { "version": "v1", "created": "Wed, 1 Oct 2014 13:28:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Hussain", "Iqbal", "" ], [ "Xiao", "Ming", "" ], [ "Rasmussen", "Lars K.", "" ] ]
new_dataset
0.999824
1410.6831
Benjamin Larrousse
Benjamin Larrousse, Olivier Beaude and Samson Lasaulce
Crawford-Sobel meet Lloyd-Max on the grid
ICASSP 2014, 5 pages
IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, Italy, May 2014
10.1109/ICASSP.2014.6854781
null
cs.OH cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main contribution of this work is twofold. First, we apply, for the first time, a framework borrowed from economics to a problem in the smart grid namely, the design of signaling schemes between a consumer and an electricity aggregator when these have non-aligned objectives. The consumer's objective is to meet its need in terms of power and send a request (a message) to the aggregator which does not correspond, in general, to its actual need. The aggregator, which receives this request, not only wants to satisfy it but also wants to manage the cost induced by the residential electricity distribution network. Second, we establish connections between the exploited framework and the quantization problem. Although the model assumed for the payoff functions for the consumer and aggregator is quite simple, it allows one to extract insights of practical interest from the analysis conducted. This allows us to establish a direct connection with quantization, and more importantly, to open a much more general challenge for source and channel coding.
[ { "version": "v1", "created": "Fri, 5 Sep 2014 12:45:14 GMT" } ]
2016-11-17T00:00:00
[ [ "Larrousse", "Benjamin", "" ], [ "Beaude", "Olivier", "" ], [ "Lasaulce", "Samson", "" ] ]
new_dataset
0.99888
1410.8797
Seyed Mohammad Azimi-Abarghouyi
Seyed Mohammad Azimi-Abarghouyi, Masoumeh Nasiri-Kenari, Behrouz Maham
Integer Forcing-and-Forward Transceiver Design for MIMO Multi-Pair Two-Way Relaying
30 pages, 7 figures, Submitted to a IEEE journal
null
10.1109/TVT.2016.2518667
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a new transmission scheme, named as Integer Forcing-and-Forward (IFF), for communications among multi-pair multiple-antenna users in which each pair exchanges their messages with the help of a single multi antennas relay in the multiple-access and broadcast phases. The proposed scheme utilizes Integer Forcing Linear Receiver (IFLR) at relay, which uses equations, i.e., linear integer-combinations of messages, to harness the intra-pair interference. Accordingly, we propose the design of mean squared error (MSE) based transceiver, including precoder and projection matrices for the relay and users, assuming that the perfect channel state information (CSI) is available. In this regards, in the multiple-access phase, we introduce two new MSE criteria for the related precoding and filter designs, i.e., the sum of the equations MSE (Sum-Equation MSE) and the maximum of the equations MSE (Max-Equation MSE), to exploit the equations in the relay. In addition, the convergence of the proposed criteria is proven as well. Moreover, in the broadcast phase, we use the two traditional MSE criteria, i.e. the sum of the users' mean squred errors (Sum MSE) and the maximum of the users' mean squared errors (Max MSE), to design the related precoding and filters for recovering relay's equations by the users. Then, we consider a more practical scenario with imperfect CSI. For this case, IFLR receiver is modified, and another transceiver design is proposed, which take into account the effect of channels estimation error. We evaluate the performance of our proposed strategy and compare the results with the conventional amplify-and-forward (AF) and denoise-and-forward (DF) strategies for the same scenario. The results indicate the substantial superiority of the proposed strategy in terms of the outage probability and the sum rate.
[ { "version": "v1", "created": "Fri, 31 Oct 2014 16:39:08 GMT" }, { "version": "v2", "created": "Sat, 17 Jan 2015 20:43:02 GMT" }, { "version": "v3", "created": "Mon, 9 Feb 2015 13:56:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Azimi-Abarghouyi", "Seyed Mohammad", "" ], [ "Nasiri-Kenari", "Masoumeh", "" ], [ "Maham", "Behrouz", "" ] ]
new_dataset
0.972579
1411.1215
Blesson Varghese
Muhammed Asif Saleem, Blesson Varghese and Adam Barker
BigExcel: A Web-Based Framework for Exploring Big Data in Social Sciences
8 pages
Workshop of Big Humanities Data at the IEEE International Conference on Big Data (IEEE BigData) 2014, Washington D. C., USA
10.1109/BigData.2014.7004458
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper argues that there are three fundamental challenges that need to be overcome in order to foster the adoption of big data technologies in non-computer science related disciplines: addressing issues of accessibility of such technologies for non-computer scientists, supporting the ad hoc exploration of large data sets with minimal effort and the availability of lightweight web-based frameworks for quick and easy analytics. In this paper, we address the above three challenges through the development of 'BigExcel', a three tier web-based framework for exploring big data to facilitate the management of user interactions with large data sets, the construction of queries to explore the data set and the management of the infrastructure. The feasibility of BigExcel is demonstrated through two Yahoo Sandbox datasets. The first dataset is the Yahoo Buzz Score data set we use for quantitatively predicting trending technologies and the second is the Yahoo n-gram corpus we use for qualitatively inferring the coverage of important events. A demonstration of the BigExcel framework and source code is available at http://bigdata.cs.st-andrews.ac.uk/projects/bigexcel-exploring-big-data-for-social-sciences/.
[ { "version": "v1", "created": "Wed, 5 Nov 2014 10:22:27 GMT" } ]
2016-11-17T00:00:00
[ [ "Saleem", "Muhammed Asif", "" ], [ "Varghese", "Blesson", "" ], [ "Barker", "Adam", "" ] ]
new_dataset
0.964689
1412.5867
Lidia Dobrescu
Lidia Dobrescu
Replacing ANSI C with other modern programming languages
IEEE International Symposium on Fundamentals of Electrical Engineering 2014, ISFEE 2014, Bucharest
null
10.1109/ISFEE.2014.7050621
null
cs.CY cs.PL
http://creativecommons.org/licenses/by/3.0/
Replacing ANSI C language with other modern programming languages such as Python or Java may be an actual debate topic in technical universities. Researchers whose primary interests are not in programming area seem to prefer modern and higher level languages. Keeping standard language ANSI C as a primary tool for engineers and for microcontrollers programming, robotics and data acquisition courses is another strong different opinion trend. Function oriented versus object oriented languages may be another highlighted topic in actual debates.
[ { "version": "v1", "created": "Thu, 18 Dec 2014 14:21:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Dobrescu", "Lidia", "" ] ]
new_dataset
0.998209
1412.7512
Giuseppe Durisi
Giuseppe Durisi, Tobias Koch, Johan \"Ostman, Yury Polyanskiy, Wei Yang
Short-Packet Communications over Multiple-Antenna Rayleigh-Fading Channels
11 pages, 4 figures; to appear in IEEE Transactions on Communications; the numerical routines used for the simulation results are part of SPECTRE (short-packet communication toolbox) and can be downloaded at https://github.com/yp-mit/spectre
null
10.1109/TCOMM.2015.2511087
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the current interest in ultra-reliable, low-latency, machine-type communication systems, we investigate the tradeoff between reliability, throughput, and latency in the transmission of information over multiple-antenna Rayleigh block-fading channels. Specifically, we obtain finite-blocklength, finite-SNR upper and lower bounds on the maximum coding rate achievable over such channels for a given constraint on the packet error probability. Numerical evidence suggests that our bounds delimit tightly the maximum coding rate already for short blocklengths (packets of about 100 symbols). Furthermore, our bounds reveal the existence of a tradeoff between the rate gain obtainable by spreading each codeword over all available time-frequency-spatial degrees of freedom, and the rate loss caused by the need of estimating the fading coefficients over these degrees of freedom. In particular, our bounds allow us to determine the optimal number of transmit antennas and the optimal number of time-frequency diversity branches that maximize the rate. Finally, we show that infinite-blocklength performance metrics such as the ergodic capacity and the outage capacity yield inaccurate throughput estimates.
[ { "version": "v1", "created": "Tue, 23 Dec 2014 20:41:36 GMT" }, { "version": "v2", "created": "Tue, 25 Aug 2015 15:57:31 GMT" }, { "version": "v3", "created": "Wed, 16 Dec 2015 21:12:58 GMT" } ]
2016-11-17T00:00:00
[ [ "Durisi", "Giuseppe", "" ], [ "Koch", "Tobias", "" ], [ "Östman", "Johan", "" ], [ "Polyanskiy", "Yury", "" ], [ "Yang", "Wei", "" ] ]
new_dataset
0.970934
1501.00029
Liane Gabora
Liane Gabora
LIVEIA: A Light-based Immersive Visualization Environment for Imaginative Actualization
6 pages in Gabora, L. (2015). Proc 12th International Conf on Information Technology: New Generations (pp. 686-691). Washington DC: IEEE Conf Publishing Services. arXiv admin note: substantial text overlap with arXiv:1409.1064
null
10.1109/ITNG.2015.115
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes an immersive and interactive visualization environment that uses light as a metaphor for psychological phenomena. Creative life force is portrayed as ambient light, and peoples' psyches are represented by spheres that amplify and transform light. Personality characteristics, situations, and relationships are systematically depicted using a systematic visual language based on the properties of light and how it interacts with physical objects. The technology enables users to visualize and creatively experiment with light-based representations of themselves and others, including patterns of interaction and how they have come about, and how they could change and unfold in the future.
[ { "version": "v1", "created": "Tue, 30 Dec 2014 21:57:18 GMT" }, { "version": "v2", "created": "Wed, 15 Apr 2015 18:00:48 GMT" } ]
2016-11-17T00:00:00
[ [ "Gabora", "Liane", "" ] ]
new_dataset
0.978887
1501.01563
Borzoo Rassouli
Borzoo Rassouli, Chenxi Hao and Bruno Clerckx
A New Proof for the DoF Region of the MIMO Networks with No CSIT
Accepted to IEEE Communications Letters. arXiv admin note: substantial text overlap with arXiv:1401.5676
null
10.1109/LCOMM.2014.2382584
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new proof for the degrees of freedom (DoF) region of the K-user multiple-input multiple-output (MIMO) broadcast channel (BC) with no channel state information at the transmitter (CSIT) and perfect channel state information at the receivers (CSIR) is provided. Based on this proof, the capacity region of a certain class of MIMO BC with channel distribution information at the transmitter (CDIT) and perfect CSIR is derived. Finally, an outer bound for the DoF region of the K-user MIMO interference channel (IC) with no CSIT is provided.
[ { "version": "v1", "created": "Wed, 7 Jan 2015 17:14:16 GMT" } ]
2016-11-17T00:00:00
[ [ "Rassouli", "Borzoo", "" ], [ "Hao", "Chenxi", "" ], [ "Clerckx", "Bruno", "" ] ]
new_dataset
0.996605
1501.02317
Xiaoxiong Zhong
Xiaoxiong Zhong, Yang Qin, Yuanyuan Yang and Li Li
CROR: Coding-Aware Opportunistic Routing in Multi-Channel Cognitive Radio Networks
6 pages, 8 figures, to appear in Proc. of IEEE GlobeCom 2014
null
10.1109/GLOCOM.2014.7036791
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive radio (CR) is a promising technology to improve spectrum utilization. However, spectrum availability is uncertain which mainly depends on primary user's (PU's) behaviors. This makes it more difficult for most existing CR routing protocols to achieve high throughput in multi-channel cognitive radio networks (CRNs). Inter-session network coding and opportunistic routing can leverage the broadcast nature of the wireless channel to improve the performance for CRNs. In this paper we present a coding aware opportunistic routing protocol for multi-channel CRNs, cognitive radio opportunistic routing (CROR) protocol, which jointly considers the probability of successful spectrum utilization, packet loss rate, and coding opportunities. We evaluate and compare the proposed scheme against three other opportunistic routing protocols with multichannel. It is shown that the CROR, by integrating opportunistic routing with network coding, can obtain much better results, with respect to throughput, the probability of PU-SU packet collision and spectrum utilization efficiency.
[ { "version": "v1", "created": "Sat, 10 Jan 2015 07:51:15 GMT" }, { "version": "v2", "created": "Sun, 1 Feb 2015 03:29:17 GMT" } ]
2016-11-17T00:00:00
[ [ "Zhong", "Xiaoxiong", "" ], [ "Qin", "Yang", "" ], [ "Yang", "Yuanyuan", "" ], [ "Li", "Li", "" ] ]
new_dataset
0.996394
1501.02478
Lin Gao
Yuan Luo, Lin Gao, and Jianwei Huang
HySIM: A Hybrid Spectrum and Information Market for TV White Space Networks
This manuscript serves as the online technical report of the article published in IEEE International Conference on Computer Communications (INFOCOM), 2015
null
10.1109/INFOCOM.2015.7218461
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a hybrid spectrum and information market for a database-assisted TV white space network, where the geo-location database serves as both a spectrum market platform and an information market platform. We study the inter- actions among the database operator, the spectrum licensee, and unlicensed users systematically, using a three-layer hierarchical model. In Layer I, the database and the licensee negotiate the commission fee that the licensee pays for using the spectrum market platform. In Layer II, the database and the licensee compete for selling information or channels to unlicensed users. In Layer III, unlicensed users determine whether they should buy the exclusive usage right of licensed channels from the licensee, or the information regarding unlicensed channels from the database. Analyzing such a three-layer model is challenging due to the co-existence of both positive and negative network externalities in the information market. We characterize how the network externalities affect the equilibrium behaviours of all parties involved. Our numerical results show that the proposed hybrid market can improve the network profit up to 87%, compared with a pure information market. Meanwhile, the achieved network profit is very close to the coordinated benchmark solution (the gap is less than 4% in our simulation).
[ { "version": "v1", "created": "Sun, 11 Jan 2015 18:13:05 GMT" }, { "version": "v2", "created": "Wed, 24 Feb 2016 02:20:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Luo", "Yuan", "" ], [ "Gao", "Lin", "" ], [ "Huang", "Jianwei", "" ] ]
new_dataset
0.996527
1501.06647
Guoqiang Mao Dr
Zijie Zhang, Guoqiang Mao, Brian Anderson
Energy Efficient Broadcast in Mobile Networks Subject to Channel Randomness
accepted to appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2015.2398430
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless communication in a network of mobile devices is a challenging and resource demanding task, due to the highly dynamic network topology and the wireless channel randomness. This paper investigates information broadcast schemes in 2D mobile ad-hoc networks where nodes are initially randomly distributed and then move following a random direction mobility model. Based on an in-depth analysis of the popular Susceptible-Infectious-Recovered epidemic broadcast scheme, this paper proposes a novel energy and bandwidth efficient broadcast scheme, named the energy-efficient broadcast scheme, which is able to adapt to fast-changing network topology and channel randomness. Analytical results are provided to characterize the performance of the proposed scheme, including the fraction of nodes that can receive the information and the delay of the information dissemination process. The accuracy of analytical results is verified using simulations driven by both the random direction mobility model and a real world trace.
[ { "version": "v1", "created": "Tue, 27 Jan 2015 03:45:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Zhang", "Zijie", "" ], [ "Mao", "Guoqiang", "" ], [ "Anderson", "Brian", "" ] ]
new_dataset
0.992901
1502.00206
Rajiv Ranjan Dr.
Khalid Alhamazani, Rajiv Ranjan, Prem Prakash Jayaraman, Karan Mitra, Chang Liu, Fethi Rabhi, Dimitrios Georgakopoulos, Lizhe Wang
Cross-Layer Multi-Cloud Real-Time Application QoS Monitoring and Benchmarking As-a-Service Framework
A revised version of this technical report has been accepted for publication by IEEE Transactions on Cloud Computing on April 29, 2015
null
10.1109/TCC.2015.2441715
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud computing provides on-demand access to affordable hardware (multi-core CPUs, GPUs, disks, and networking equipment) and software (databases, application servers and data processing frameworks) platforms with features such as elasticity, pay-per-use, low upfront investment and low time to market. This has led to the proliferation of business critical applications that leverage various cloud platforms. Such applications hosted on single or multiple cloud provider platforms have diverse characteristics requiring extensive monitoring and benchmarking mechanisms to ensure run-time Quality of Service (QoS) (e.g., latency and throughput). This paper proposes, develops and validates CLAMBS:Cross-Layer Multi-Cloud Application Monitoring and Benchmarking as-a-Service for efficient QoS monitoring and benchmarking of cloud applications hosted on multi-clouds environments. The major highlight of CLAMBS is its capability of monitoring and benchmarking individual application components such as databases and web servers, distributed across cloud layers, spread among multiple cloud providers. We validate CLAMBS using prototype implementation and extensive experimentation and show that CLAMBS efficiently monitors and benchmarks application components on multi-cloud platforms including Amazon EC2 and Microsoft Azure.
[ { "version": "v1", "created": "Sun, 1 Feb 2015 06:57:47 GMT" }, { "version": "v2", "created": "Wed, 29 Apr 2015 05:28:14 GMT" } ]
2016-11-17T00:00:00
[ [ "Alhamazani", "Khalid", "" ], [ "Ranjan", "Rajiv", "" ], [ "Jayaraman", "Prem Prakash", "" ], [ "Mitra", "Karan", "" ], [ "Liu", "Chang", "" ], [ "Rabhi", "Fethi", "" ], [ "Georgakopoulos", "Dimitrios", "" ], [ "Wang", "Lizhe", "" ] ]
new_dataset
0.982577
1502.03493
Jiun-Ren Lin
Jiun-Ren Lin, Timothy Talty, Ozan K. Tonguz
On the Potential of Bluetooth Low Energy Technology for Vehicular Applications
8 pages, 5 figures
IEEE Communications Magazine, vol. 53, no. 1, January 2015
10.1109/MCOM.2015.7010544
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the increasing number of sensors in modern vehicles, using an Intra-Vehicular Wireless Sensor Network (IVWSN) is a possible solution for the automotive industry to address the potential issues that arise from additional wiring harness. Such a solution could help car manufacturers develop vehicles that have better fuel economy and performance, in addition to supporting new applications. However, which wireless technology for IVWSNs should be used for maximizing the aforementioned benefits is still an open issue. In this paper, we propose to use a new wireless technology known as Bluetooth Low Energy (BLE) and highlight a new architecture for IVWSN. Based on a comprehensive study which encompasses an example application, it is shown that BLE is an excellent option that can be used in IVWSNs for certain applications mainly due to its good performance and low-power, low-complexity, and low-cost attributes.
[ { "version": "v1", "created": "Wed, 11 Feb 2015 23:54:37 GMT" } ]
2016-11-17T00:00:00
[ [ "Lin", "Jiun-Ren", "" ], [ "Talty", "Timothy", "" ], [ "Tonguz", "Ozan K.", "" ] ]
new_dataset
0.97773
1502.06809
Alexander Zeh
Alexander Zeh, Eitan Yaakobi
Optimal Linear and Cyclic Locally Repairable Codes over Small Fields
IEEE Information Theory Workshop (ITW) 2015, Apr 2015, Jerusalem, Israel
null
10.1109/ITW.2015.7133123
null
cs.IT cs.NI math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider locally repairable codes over small fields and propose constructions of optimal cyclic and linear codes in terms of the dimension for a given distance and length. Four new constructions of optimal linear codes over small fields with locality properties are developed. The first two approaches give binary cyclic codes with locality two. While the first construction has availability one, the second binary code is characterized by multiple available repair sets based on a binary Simplex code. The third approach extends the first one to q-ary cyclic codes including (binary) extension fields, where the locality property is determined by the properties of a shortened first-order Reed-Muller code. Non-cyclic optimal binary linear codes with locality greater than two are obtained by the fourth construction.
[ { "version": "v1", "created": "Tue, 24 Feb 2015 13:43:42 GMT" } ]
2016-11-17T00:00:00
[ [ "Zeh", "Alexander", "" ], [ "Yaakobi", "Eitan", "" ] ]
new_dataset
0.969911
1503.00085
Weiyao Lin
Weiyao Lin, Krit Panusopone, David M. Baylon, Ming-Ting Sun, Zhenzhong Chen, Hongxiang Li
A Fast Sub-Pixel Motion Estimation Algorithm for H.264/AVC Video Coding
This manuscript is the accepted version for TCSVT (IEEE Transactions on Circuits and Systems for Video Technology)
IEEE Trans. Circuits and Systems for Video Technology, vol. 21, no. 2, pp. 237-242, 2011
10.1109/TCSVT.2011.2106290
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motion Estimation (ME) is one of the most time-consuming parts in video coding. The use of multiple partition sizes in H.264/AVC makes it even more complicated when compared to ME in conventional video coding standards. It is important to develop fast and effective sub-pixel ME algorithms since (a) The computation overhead by sub-pixel ME has become relatively significant while the complexity of integer-pixel search has been greatly reduced by fast algorithms, and (b) Reducing sub-pixel search points can greatly save the computation for sub-pixel interpolation. In this paper, a novel fast sub-pixel ME algorithm is proposed which performs a 'rough' sub-pixel search before the partition selection, and performs a 'precise' sub-pixel search for the best partition. By reducing the searching load for the large number of non-best partitions, the computation complexity for sub-pixel search can be greatly decreased. Experimental results show that our method can reduce the sub-pixel search points by more than 50% compared to existing fast sub-pixel ME methods with negligible quality degradation.
[ { "version": "v1", "created": "Sat, 28 Feb 2015 07:08:03 GMT" } ]
2016-11-17T00:00:00
[ [ "Lin", "Weiyao", "" ], [ "Panusopone", "Krit", "" ], [ "Baylon", "David M.", "" ], [ "Sun", "Ming-Ting", "" ], [ "Chen", "Zhenzhong", "" ], [ "Li", "Hongxiang", "" ] ]
new_dataset
0.975202
1503.01440
Jiun-Ren Lin
Jiun-Ren Lin, Timothy Talty, Ozan K. Tonguz
A Blind Zone Alert System based on Intra-vehicular Wireless Sensor Networks
9 pages, 8 figures, 1 table, IEEE Transactions on Industrial Informatics, 2015
null
10.1109/TII.2015.2404800
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to the increasing number of sensors deployed in modern vehicles, Intra-Vehicular Wireless Sensor Networks (IVWSNs) have recently received a lot of attention in the automotive industry as they can reduce the amount of wiring harness inside a vehicle. By removing the wires, car manufacturers can reduce the weight of a vehicle and improve engine performance, fuel economy, and reliability. In addition to these direct benefits, an IVWSN is a versatile platform that can support other vehicular applications as well. An example application, known as a Side Blind Zone Alert (SBZA) system, which monitors the blind zone of the vehicle and alerts the driver in a timely manner to prevent collisions, is discussed in this paper. The performance of the IVWSN-based SBZA system is evaluated via real experiments conducted on two test vehicles. Our results show that the proposed system can achieve approximately 95% to 99% detection rate with less than 15% false alarm rate. Compared to commercial systems using radars or cameras, the main benefit of the IVWSN-based SBZA is substantially lower cost.
[ { "version": "v1", "created": "Wed, 4 Mar 2015 20:08:57 GMT" } ]
2016-11-17T00:00:00
[ [ "Lin", "Jiun-Ren", "" ], [ "Talty", "Timothy", "" ], [ "Tonguz", "Ozan K.", "" ] ]
new_dataset
0.998678
1503.02877
Dani Korpi
Timo Huusari, Yang-Seok Choi, Petteri Liikkanen, Dani Korpi, Shilpa Talwar, Mikko Valkama
Wideband Self-Adaptive RF Cancellation Circuit for Full-Duplex Radio: Operating Principle and Measurements
7 pages, to be presented in 2015 IEEE 81st Vehicular Technology Conference
null
10.1109/VTCSpring.2015.7146163
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel RF circuit architecture for self-interference cancellation in inband full-duplex radio transceivers. The developed canceller is able to provide wideband cancellation with waveform bandwidths in the order of 100 MHz or beyond and contains also self-adaptive or self-healing features enabling automatic tracking of time-varying self-interference channel characteristics. In addition to architecture and operating principle descriptions, we also provide actual RF measurements at 2.4 GHz ISM band demonstrating the achievable cancellation levels with different bandwidths and when operating in different antenna configurations and under low-cost highly nonlinear power amplifier. In a very challenging example with a 100 MHz waveform bandwidth, around 41 dB total cancellation is obtained while the corresponding cancellation figure is close to 60 dB with the more conventional 20 MHz carrier bandwidth. Also, efficient tracking in time-varying reflection scenarios is demonstrated.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 12:02:01 GMT" } ]
2016-11-17T00:00:00
[ [ "Huusari", "Timo", "" ], [ "Choi", "Yang-Seok", "" ], [ "Liikkanen", "Petteri", "" ], [ "Korpi", "Dani", "" ], [ "Talwar", "Shilpa", "" ], [ "Valkama", "Mikko", "" ] ]
new_dataset
0.996306
1503.09039
Stelios Stefanatos
Stelios Stefanatos, Antonis G. Gotsis and Angeliki Alexiou
Operational Region of D2D Communications for Enhancing Cellular Network Performance
to appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2015.2446974
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important enabler towards the successful deployment of any new element/feature to the cellular network is the investigation and characterization of the operational conditions where its introduction will enhance performance. Even though there has been significant research activity on the potential of device-to-device (D2D) communications, there are currently no clear indications of whether D2D communications are actually able to provide benefits for a wide range of operational conditions, thus justifying their introduction to the system. This paper attempts to fill this gap by taking a stochastic geometry approach on characterizing the set (region) of operational conditions for which D2D communications enhance performance in terms of average user rate. For the practically interesting case of a heavy loaded network, the operational region is provided in closed form as a function of a variety of parameters such as maximum D2D link distances and user densities, reflecting a wide range of operational conditions (points). It is shown that under the appropriate deployment scheme, D2D communications can indeed be beneficial not only for the usually considered regime of "proximal communications" but to a wide range of operational conditions that include D2D link distances comparable to the distance to the cellular access point and considerably large user densities.
[ { "version": "v1", "created": "Tue, 31 Mar 2015 13:37:02 GMT" }, { "version": "v2", "created": "Thu, 4 Jun 2015 15:34:57 GMT" } ]
2016-11-17T00:00:00
[ [ "Stefanatos", "Stelios", "" ], [ "Gotsis", "Antonis G.", "" ], [ "Alexiou", "Angeliki", "" ] ]
new_dataset
0.969975
1503.09178
Shuowen Zhang
Shuowen Zhang, Rui Zhang, Teng Joon Lim
Constant Envelope Precoding with Adaptive Receiver Constellation in MISO Fading Channel
This is a longer version of a paper to appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2016.2592899
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constant envelope (CE) precoding is an appealing transmission technique which enables the realization of high power amplifier (PA) efficiency. For CE precoding in a single-user multiple-input single-output (MISO) channel, a desired constellation is feasible at the receiver if and only if it can be scaled to lie in an annulus, whose boundaries are characterized by the instantaneous channel realization. Therefore, if a fixed receiver constellation is used for CE precoding in a fading channel, where the annulus is time-varying, there is in general a non-zero probability of encountering a channel that makes CE precoding infeasible, thereby causing a high probability of error. To tackle this problem, this paper studies the adaptive receiver constellation design for CE precoding in a single-user MISO flat-fading channel with an arbitrary number of antennas at the transmitter. We first investigate the fixed-rate adaptive receiver constellation design to minimize the symbol error rate (SER). Specifically, an efficient algorithm is proposed to find the optimal amplitude-and-phase shift keying (APSK) constellation with two rings that is both feasible and of the maximum minimum Euclidean distance (MED), for any given constellation size and instantaneous channel realization. Numerical results show that by using the optimized fixed-rate adaptive receiver constellation, our proposed scheme achieves significantly improved SER performance over CE precoding with a fixed receiver constellation. Furthermore, based on the family of optimal fixed-rate adaptive two-ring APSK constellation sets, a variable-rate CE transmission scheme is proposed and numerically examined.
[ { "version": "v1", "created": "Tue, 31 Mar 2015 19:38:35 GMT" }, { "version": "v2", "created": "Wed, 1 Apr 2015 19:52:48 GMT" }, { "version": "v3", "created": "Wed, 15 Apr 2015 19:58:34 GMT" }, { "version": "v4", "created": "Thu, 3 Sep 2015 18:31:39 GMT" }, { "version": "v5", "created": "Fri, 15 Jul 2016 08:29:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Zhang", "Shuowen", "" ], [ "Zhang", "Rui", "" ], [ "Lim", "Teng Joon", "" ] ]
new_dataset
0.984258
1504.04663
Jinxue Zhang
Jinxue Zhang, Rui Zhang, Jingchao Sun, Yanchao Zhang, Chi Zhang
TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter
Accepted by IEEE/ACM Transactions on Networking. This is the Final version
null
10.1109/TNET.2015.2494059
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Influential users have great potential for accelerating information dissemination and acquisition on Twitter. How to measure the influence of Twitter users has attracted significant academic and industrial attention. Existing influential measurement techniques, however, are vulnerable to sybil users that are thriving on Twitter. Although sybil defenses for online social networks have been extensively investigated, they commonly assume unique mappings from human-established trust relationships to online social associations and thus do not apply to Twitter where users can freely follow each other. This paper presents TrueTop, the first sybil-resilient system to measure the influence of Twitter users. TrueTop is firmly rooted in two observations from real Twitter datasets. First, although non-sybil users may incautiously follow strangers, they tend to be more careful and selective in retweeting, replying to, and mentioning other Twitter users. Second, influential users usually get much more retweets, replies, and mentions than non-influential users. Detailed theoretical studies and synthetic simulations show that TrueTop can generate very accurate influence measurement results and also have strong resilience to sybil attacks.
[ { "version": "v1", "created": "Sat, 18 Apr 2015 00:07:10 GMT" }, { "version": "v2", "created": "Thu, 18 Jun 2015 00:35:04 GMT" }, { "version": "v3", "created": "Tue, 20 Oct 2015 22:49:34 GMT" } ]
2016-11-17T00:00:00
[ [ "Zhang", "Jinxue", "" ], [ "Zhang", "Rui", "" ], [ "Sun", "Jingchao", "" ], [ "Zhang", "Yanchao", "" ], [ "Zhang", "Chi", "" ] ]
new_dataset
0.997857
1504.04975
Sudarsan Vasista Srinivasan Ranganathan
Sudarsan V. S. Ranganathan, Dariush Divsalar, and Richard D. Wesel
On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs
6 pages, 2 figures, 5-page version to appear in the Proceedings of 2015 IEEE International Symposium on Information Theory. Update 1 - 05/29/2015 - Minor changes and added a reference
null
10.1109/ISIT.2015.7282491
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of constructing $(3,L)$ quasi-cyclic low-density parity-check (LDPC) codes from complete protographs. A complete protograph is a small bipartite graph with two disjoint vertex sets such that every vertex in the variable-node set is connected to every vertex in the check-node set by a unique edge. This paper analyzes the required lifting factor for achieving girths of six or eight in the resulting quasi-cyclic codes with constraints on lifting. The required lifting factors provide lower bounds on the block-length of such codes.
[ { "version": "v1", "created": "Mon, 20 Apr 2015 08:58:06 GMT" }, { "version": "v2", "created": "Sat, 30 May 2015 00:32:55 GMT" } ]
2016-11-17T00:00:00
[ [ "Ranganathan", "Sudarsan V. S.", "" ], [ "Divsalar", "Dariush", "" ], [ "Wesel", "Richard D.", "" ] ]
new_dataset
0.999245
1505.00181
Siyi Wang
Weisi Guo, Bin Li, Siyi Wang, Wei Liu
Molecular Communications with Longitudinal Carrier Waves: Baseband to Passband Modulation
submitted to IEEE Communications Letters
null
10.1109/LCOMM.2015.2448098
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional molecular communications via diffusion (MCvD) systems have used baseband modulation techniques by varying properties of molecular pulses such as the amplitude, the frequency of the transversal wave of the pulse, and the time delay between subsequent pulses. In this letter, we propose and implement passband modulation with molecules that exhibit longitudinal carrier wave properties. This is achieved through the oscillation of the transmitter. Frequency division multiplexing is employed to allow different molecular information streams to co-exist in the same space and time channel, creating an effective bandwidth for MCvD.
[ { "version": "v1", "created": "Fri, 1 May 2015 14:10:26 GMT" } ]
2016-11-17T00:00:00
[ [ "Guo", "Weisi", "" ], [ "Li", "Bin", "" ], [ "Wang", "Siyi", "" ], [ "Liu", "Wei", "" ] ]
new_dataset
0.996379
1505.00511
Rodrigo de Lamare
Andr\'e Uchoa, Cornelius T. Healy and Rodrigo C. de Lamare
Iterative Detection and Decoding Algorithms using LDPC Codes for MIMO Systems in Block-Fading Channels
17 pages, 4 figures, IEEE Transactions on Vehicular Technology, 2015
null
10.1109/TVT.2015.2432099
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose iterative detection and decoding (IDD) algorithms with Low-Density Parity-Check (LDPC) codes for Multiple Input Multiple Output (MIMO) systems operating in block-fading and fast Rayleigh fading channels. Soft-input soft-output minimum mean-square error receivers with successive interference cancellation are considered. In particular, we devise a novel strategy to improve the bit error rate (BER) performance of IDD schemes, which takes into account the soft \textit{a posteriori} output of the decoder in a block-fading channel when Root-Check LDPC codes are used. A MIMO IDD receiver with soft information processing that exploits the code structure and the behavior of the log likelihood ratios is also developed. Moreover, we present a scheduling algorithm for decoding LDPC codes in block-fading channels. Simulations show that the proposed techniques result in significant gains in terms of BER for both block-fading and fast-fading channels.
[ { "version": "v1", "created": "Mon, 4 May 2015 02:03:58 GMT" } ]
2016-11-17T00:00:00
[ [ "Uchoa", "André", "" ], [ "Healy", "Cornelius T.", "" ], [ "de Lamare", "Rodrigo C.", "" ] ]
new_dataset
0.969166
1505.04679
Changho Suh
Sunghyun Kim, I-Hsiang Wang, Changho Suh
A Relay Can Increase Degrees of Freedom in Bursty Interference Networks
submitted to the IEEE Transactions on Information Theory
null
10.1109/ISIT.2015.7282617
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the benefits of relays in multi-user wireless networks with bursty user traffic, where intermittent data traffic restricts the users to bursty transmissions. To this end, we study a two-user bursty MIMO Gaussian interference channel with a relay, where two Bernoulli random states govern the bursty user traffic. We show that an in-band relay can provide a degrees of freedom (DoF) gain in this bursty channel. This beneficial role of in-band relays in the bursty channel is in direct contrast to their role in the non-bursty channel which is not as significant to provide a DoF gain. More importantly, we demonstrate that for certain antenna configurations, an in-band relay can help achieve interference-free performances with increased DoF. We find the benefits particularly substantial with low data traffic, as the DoF gain can grow linearly with the number of antennas at the relay. In this work, we first derive an outer bound from which we obtain a necessary condition for interference-free DoF performances. Then, we develop a novel scheme that exploits information of the bursty traffic states to achieve them.
[ { "version": "v1", "created": "Mon, 18 May 2015 15:18:26 GMT" } ]
2016-11-17T00:00:00
[ [ "Kim", "Sunghyun", "" ], [ "Wang", "I-Hsiang", "" ], [ "Suh", "Changho", "" ] ]
new_dataset
0.994913
1506.01394
Guoru Ding
Guoru Ding, Jinlong Wang, Qihui Wu, Yu-Dong Yao, Fei Song, and Theodoros A. Tsiftsis
Cellular-Base-Station Assisted Device-to-Device Communications in TV White Space
Accepted by IEEE Journal on Selected Areas in Communications, to appear, 2015
null
10.1109/JSAC.2015.2452532
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a systematic approach to exploit TV white space (TVWS) for device-to-device (D2D) communications with the aid of the existing cellular infrastructure. The goal is to build a location-specific TVWS database, which provides a look-up table service for any D2D link to determine its maximum permitted emission power (MPEP) in an unlicensed digital TV (DTV) band. To achieve this goal, the idea of mobile crowd sensing is firstly introduced to collect active spectrum measurements from massive personal mobile devices. Considering the incompleteness of crowd measurements, we formulate the problem of unknown measurements recovery as a matrix completion problem and apply a powerful fixed point continuation algorithm to reconstruct the unknown elements from the known elements. By joint exploitation of the big spectrum data in its vicinity, each cellular base station further implements a nonlinear support vector machine algorithm to perform irregular coverage boundary detection of a licensed DTV transmitter. With the knowledge of the detected coverage boundary, an opportunistic spatial reuse algorithm is developed for each D2D link to determine its MPEP. Simulation results show that the proposed approach can successfully enable D2D communications in TVWS while satisfying the interference constraint from the licensed DTV services. In addition, to our best knowledge, this is the first try to explore and exploit TVWS inside the DTV protection region resulted from the shadowing effect. Potential application scenarios include communications between internet of vehicles in the underground parking, D2D communications in hotspots such as subway, game stadiums, and airports, etc.
[ { "version": "v1", "created": "Mon, 1 Jun 2015 02:39:51 GMT" } ]
2016-11-17T00:00:00
[ [ "Ding", "Guoru", "" ], [ "Wang", "Jinlong", "" ], [ "Wu", "Qihui", "" ], [ "Yao", "Yu-Dong", "" ], [ "Song", "Fei", "" ], [ "Tsiftsis", "Theodoros A.", "" ] ]
new_dataset
0.999472
1506.03495
Jose Rodrigues Jr
Daniel Y. T. Chino, Letricia P. S. Avalhais, Jose F. Rodrigues Jr., Agma J. M. Traina
BoWFire: Detection of Fire in Still Images by Integrating Pixel Color and Texture Analysis
8 pages, Proceedings of the 28th SIBGRAPI Conference on Graphics, Patterns and Images, IEEE Press
null
10.1109/SIBGRAPI.2015.19
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Emergency events involving fire are potentially harmful, demanding a fast and precise decision making. The use of crowdsourcing image and videos on crisis management systems can aid in these situations by providing more information than verbal/textual descriptions. Due to the usual high volume of data, automatic solutions need to discard non-relevant content without losing relevant information. There are several methods for fire detection on video using color-based models. However, they are not adequate for still image processing, because they can suffer on high false-positive results. These methods also suffer from parameters with little physical meaning, which makes fine tuning a difficult task. In this context, we propose a novel fire detection method for still images that uses classification based on color features combined with texture classification on superpixel regions. Our method uses a reduced number of parameters if compared to previous works, easing the process of fine tuning the method. Results show the effectiveness of our method of reducing false-positives while its precision remains compatible with the state-of-the-art methods.
[ { "version": "v1", "created": "Wed, 10 Jun 2015 22:16:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Chino", "Daniel Y. T.", "" ], [ "Avalhais", "Letricia P. S.", "" ], [ "Rodrigues", "Jose F.", "Jr." ], [ "Traina", "Agma J. M.", "" ] ]
new_dataset
0.997521
1506.06691
Alex James Dr
Olga Krestinskaya, Irina Fedorova, Alex Pappachen James
Memristor Load Current Mirror Circuit
4th International Conference on Advances in Computing, Communications and Informaticst, IEEE, August, 2015
null
10.1109/ICACCI.2015.7275664
null
cs.ET
http://creativecommons.org/licenses/by-nc-sa/3.0/
Simple current mirrors with semiconductor resistive loads suffer from large on-chip area, leakage currents and thermal effects. In this paper, we report the feasibility of using memristive loads as a replacement of semiconductor resistors in simplistic current mirror configuration. We report power, area and total harmonic distribution, and report the corner conditions on resistance tolerances.
[ { "version": "v1", "created": "Mon, 22 Jun 2015 17:18:58 GMT" } ]
2016-11-17T00:00:00
[ [ "Krestinskaya", "Olga", "" ], [ "Fedorova", "Irina", "" ], [ "James", "Alex Pappachen", "" ] ]
new_dataset
0.999474
1506.07158
Kiran Venugopal
Kiran Venugopal, Matthew C. Valenti, and Robert W. Heath Jr
Device-to-Device Millimeter Wave Communications: Interference, Coverage, Rate, and Finite Topologies
32 pages, 17 figures, Submitted to IEEE Transactions on Wireless Communications
null
10.1109/TWC.2016.2580510
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Emerging applications involving device-to-device communication among wearable electronics require Gbps throughput, which can be achieved by utilizing millimeter wave (mmWave) frequency bands. When many such communicating devices are indoors in close proximity, like in a train car or airplane cabin, interference can be a serious impairment. This paper uses stochastic geometry to analyze the performance of mmWave networks with a finite number of interferers in a finite network region. Prior work considered either lower carrier frequencies with different antenna and channel assumptions, or a network with an infinite spatial extent. In this paper, human users not only carry potentially interfering devices, but also act to block interfering signals. Using a sequence of simplifying assumptions, accurate expressions for coverage and rate are developed that capture the effects of key antenna characteristics like directivity and gain, and are a function of the finite area and number of users. The assumptions are validated through a combination of analysis and simulation. The main conclusions are that mmWave frequencies can provide Gbps throughput even with omni-directional transceiver antennas, and larger, more directive antenna arrays give better system performance.
[ { "version": "v1", "created": "Tue, 23 Jun 2015 19:50:25 GMT" }, { "version": "v2", "created": "Thu, 9 Jun 2016 18:10:31 GMT" } ]
2016-11-17T00:00:00
[ [ "Venugopal", "Kiran", "" ], [ "Valenti", "Matthew C.", "" ], [ "Heath", "Robert W.", "Jr" ] ]
new_dataset
0.998092
1506.07367
Thomas Nyman
Brian McGillion, Tanel Dettenborn, Thomas Nyman, N. Asokan
Open-TEE - An Open Virtual Trusted Execution Environment
Author's version of article to appear in 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, Helsinki, Finland, August 20-22, 2015
null
10.1109/Trustcom.2015.400
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited primarily to applications developed by the device vendors. Recent standardization of TEE interfaces by GlobalPlatform (GP) promises to partially address this problem by enabling GP-compliant trusted applications to run on TEEs from different vendors. Nevertheless ordinary developers wishing to develop trusted applications face significant challenges. Access to hardware TEE interfaces are difficult to obtain without support from vendors. Tools and software needed to develop and debug trusted applications may be expensive or non-existent. In this paper, we describe Open-TEE, a virtual, hardware-independent TEE implemented in software. Open-TEE conforms to GP specifications. It allows developers to develop and debug trusted applications with the same tools they use for developing software in general. Once a trusted application is fully debugged, it can be compiled for any actual hardware TEE. Through performance measurements and a user study we demonstrate that Open-TEE is efficient and easy to use. We have made Open- TEE freely available as open source.
[ { "version": "v1", "created": "Wed, 24 Jun 2015 13:59:20 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2015 11:31:38 GMT" } ]
2016-11-17T00:00:00
[ [ "McGillion", "Brian", "" ], [ "Dettenborn", "Tanel", "" ], [ "Nyman", "Thomas", "" ], [ "Asokan", "N.", "" ] ]
new_dataset
0.996831
1507.00095
Sanghun Im
Sanghun Im, Hyoungsuk Jeon, Jinho Choi, and Jeongseok Ha
Secret Key Agreement with Large Antenna Arrays under the Pilot Contamination Attack
15 pages, 5 figures, and the paper is under minor revision for the publication in IEEE transactions on wireless communications
null
10.1109/TWC.2015.2456894
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a secret key agreement (SKA) protocol for a multi-user time-division duplex system where a base-station (BS) with a large antenna array (LAA) shares secret keys with users in the presence of non-colluding eavesdroppers. In the system, when the BS transmits random sequences to legitimate users for sharing common randomness, the eavesdroppers can attempt the pilot contamination attack (PCA) in which each of eavesdroppers transmits its target user's training sequence in hopes of acquiring possible information leak by steering beam towards the eavesdropper. We show that there exists a crucial complementary relation between the received signal strengths at the eavesdropper and its target user. This relation tells us that the eavesdropper inevitably leaves a trace that enables us to devise a way of measuring the amount of information leakage to the eavesdropper even if PCA parameters are unknown. To this end, we derive an estimator for the channel gain from the BS to the eavesdropper and propose a rate-adaptation scheme for adjusting the length of secret key under the PCA. Extensive analysis and evaluations are carried out under various setups, which show that the proposed scheme adequately takes advantage of the LAA to establish the secret keys under the PCA.
[ { "version": "v1", "created": "Wed, 1 Jul 2015 02:43:16 GMT" } ]
2016-11-17T00:00:00
[ [ "Im", "Sanghun", "" ], [ "Jeon", "Hyoungsuk", "" ], [ "Choi", "Jinho", "" ], [ "Ha", "Jeongseok", "" ] ]
new_dataset
0.998852
1507.02853
Patrick Hagge Cording
Philip Bille, Anders Roy Christiansen, Patrick Hagge Cording, Inge Li G{\o}rtz
Finger Search in Grammar-Compressed Strings
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Grammar-based compression, where one replaces a long string by a small context-free grammar that generates the string, is a simple and powerful paradigm that captures many popular compression schemes. Given a grammar, the random access problem is to compactly represent the grammar while supporting random access, that is, given a position in the original uncompressed string report the character at that position. In this paper we study the random access problem with the finger search property, that is, the time for a random access query should depend on the distance between a specified index $f$, called the \emph{finger}, and the query index $i$. We consider both a static variant, where we first place a finger and subsequently access indices near the finger efficiently, and a dynamic variant where also moving the finger such that the time depends on the distance moved is supported. Let $n$ be the size the grammar, and let $N$ be the size of the string. For the static variant we give a linear space representation that supports placing the finger in $O(\log N)$ time and subsequently accessing in $O(\log D)$ time, where $D$ is the distance between the finger and the accessed index. For the dynamic variant we give a linear space representation that supports placing the finger in $O(\log N)$ time and accessing and moving the finger in $O(\log D + \log \log N)$ time. Compared to the best linear space solution to random access, we improve a $O(\log N)$ query bound to $O(\log D)$ for the static variant and to $O(\log D + \log \log N)$ for the dynamic variant, while maintaining linear space. As an application of our results we obtain an improved solution to the longest common extension problem in grammar compressed strings. To obtain our results, we introduce several new techniques of independent interest, including a novel van Emde Boas style decomposition of grammars.
[ { "version": "v1", "created": "Fri, 10 Jul 2015 11:17:32 GMT" }, { "version": "v2", "created": "Thu, 28 Jan 2016 12:48:20 GMT" }, { "version": "v3", "created": "Fri, 24 Jun 2016 08:58:48 GMT" }, { "version": "v4", "created": "Wed, 16 Nov 2016 12:29:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Bille", "Philip", "" ], [ "Christiansen", "Anders Roy", "" ], [ "Cording", "Patrick Hagge", "" ], [ "Gørtz", "Inge Li", "" ] ]
new_dataset
0.996401
1508.03940
Zhen Gao
Zhen Gao, Linglong Dai, De Mi, Zhaocheng Wang, Muhammad Ali Imran, and Muhammad Zeeshan Shakir
MmWave Massive MIMO Based Wireless Backhaul for 5G Ultra-Dense Network
This paper has been accepted by IEEE Wireless Communications Magazine. This paper is related to 5G, ultra-dense network (UDN), millimeter waves (mmWave) fronthaul/backhaul, massive MIMO, sparsity/low-rank property of mmWave massive MIMO channels, sparse channel estimation, compressive sensing (CS), hybrid digital/analog precoding/combining, and hybrid beamforming. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7306533
IEEE Wireless Communications, vol. 22, no. 5, pp. 13-21, Oct. 2015
10.1109/MWC.2015.7306533
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ultra-dense network (UDN) has been considered as a promising candidate for future 5G network to meet the explosive data demand. To realize UDN, a reliable, Gigahertz bandwidth, and cost-effective backhaul connecting ultra-dense small-cell base stations (BSs) and macro-cell BS is prerequisite. Millimeter-wave (mmWave) can provide the potential Gbps traffic for wireless backhaul. Moreover, mmWave can be easily integrated with massive MIMO for the improved link reliability. In this article, we discuss the feasibility of mmWave massive MIMO based wireless backhaul for 5G UDN, and the benefits and challenges are also addressed. Especially, we propose a digitally-controlled phase-shifter network (DPSN) based hybrid precoding/combining scheme for mmWave massive MIMO, whereby the low-rank property of mmWave massive MIMO channel matrix is leveraged to reduce the required cost and complexity of transceiver with a negligible performance loss. One key feature of the proposed scheme is that the macro-cell BS can simultaneously support multiple small-cell BSs with multiple streams for each smallcell BS, which is essentially different from conventional hybrid precoding/combining schemes typically limited to single-user MIMO with multiple streams or multi-user MIMO with single stream for each user. Based on the proposed scheme, we further explore the fundamental issues of developing mmWave massive MIMO for wireless backhaul, and the associated challenges, insight, and prospect to enable the mmWave massive MIMO based wireless backhaul for 5G UDN are discussed.
[ { "version": "v1", "created": "Mon, 17 Aug 2015 07:20:01 GMT" }, { "version": "v2", "created": "Wed, 26 Aug 2015 16:07:49 GMT" }, { "version": "v3", "created": "Fri, 27 Nov 2015 15:38:19 GMT" } ]
2016-11-17T00:00:00
[ [ "Gao", "Zhen", "" ], [ "Dai", "Linglong", "" ], [ "Mi", "De", "" ], [ "Wang", "Zhaocheng", "" ], [ "Imran", "Muhammad Ali", "" ], [ "Shakir", "Muhammad Zeeshan", "" ] ]
new_dataset
0.988431
1508.06093
Jie Xu Dr.
Jie Xu, Lingjie Duan, Rui Zhang
Energy Group-Buying with Loading Sharing for Green Cellular Networks
This is a longer version of a paper to be appear in IEEE Journal on Selected Areas in Communications Special Issue on Energy-Efficient Techniques for 5G Wireless Communication Systems
null
10.1109/JSAC.2016.2544603
null
cs.IT cs.GT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the emerging hybrid electricity market, mobile network operators (MNOs) of cellular networks can make day-ahead energy purchase commitments at low prices and real-time flexible energy purchase at high prices. To minimize electricity bills, it is essential for MNOs to jointly optimize the day-ahead and real-time energy purchase based on their time-varying wireless traffic load. In this paper, we consider two different MNOs coexisting in the same area, and exploit their collaboration in both energy purchase and wireless load sharing for energy cost saving. Specifically, we propose a new approach named energy group buying with load sharing, in which the two MNOs are aggregated as a single group to make the day-ahead and real-time energy purchase, and their base stations (BSs) share the wireless traffic to maximally turn lightly-loaded BSs into sleep mode. When the two MNOs belong to the same entity and aim to minimize their total energy cost, we use the two-stage stochastic programming to obtain the optimal day-ahead and real-time energy group buying jointly with wireless load sharing. When the two MNOs belong to different entities and are self-interested in minimizing their individual energy costs, we propose a novel repeated Nash bargaining scheme for them to negotiate and share their energy costs under energy group buying and load sharing. Our proposed repeated Nash bargaining scheme is shown to achieve Pareto-optimal and fair energy cost reductions for both MNOs.
[ { "version": "v1", "created": "Tue, 25 Aug 2015 10:03:59 GMT" }, { "version": "v2", "created": "Thu, 17 Dec 2015 16:38:39 GMT" } ]
2016-11-17T00:00:00
[ [ "Xu", "Jie", "" ], [ "Duan", "Lingjie", "" ], [ "Zhang", "Rui", "" ] ]
new_dataset
0.961795
1509.00395
Sijia Deng
Sijia Deng, Mathew K. Samimi, Theodore S. Rappaport
28 GHz and 73 GHz Millimeter-Wave Indoor Propagation Measurements and Path Loss Models
7 pages, 9 figures, 2015 IEEE International Conference on Communications (ICC), ICC Workshops
null
10.1109/ICCW.2015.7247348
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents 28 GHz and 73 GHz millimeter- wave propagation measurements performed in a typical office environment using a 400 Megachip-per-second broadband sliding correlator channel sounder and highly directional steerable 15 dBi (30 degrees beamwidth) and 20 dBi (15 degrees beamwidth) horn antennas. Power delay profiles were acquired for 48 transmitter-receiver location combinations over distances ranging from 3.9 m to 45.9 m with maximum transmit powers of 24 dBm and 12.3 dBm at 28 GHz and 73 GHz, respectively. Directional and omnidirectional path loss models and RMS delay spread statistics are presented for line-of-sight and non-line-of-sight environments for both co- and cross-polarized antenna configurations. The LOS omnidirectional path loss exponents were 1.1 and 1.3 at 28 GHz and 73 GHz, and 2.7 and 3.2 in NLOS at 28 GHz and 73 GHz, respectively, for vertically-polarized antennas. The mean directional RMS delay spreads were 18.4 ns and 13.3 ns, with maximum values of 193 ns and 288 ns at 28 GHz and 73 GHz, respectively.
[ { "version": "v1", "created": "Tue, 1 Sep 2015 17:16:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Deng", "Sijia", "" ], [ "Samimi", "Mathew K.", "" ], [ "Rappaport", "Theodore S.", "" ] ]
new_dataset
0.998722
1509.01187
Mohammad Mozaffari
Mohammad Mozaffari, Walid Saad, Mehdi Bennis, Merouane Debbah
Unmanned Aerial Vehicle with Underlaid Device-to-Device Communications: Performance and Tradeoffs
accepted in the IEEE Transactions on Wireless Communications
null
10.1109/TWC.2016.2531652
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the deployment of an unmanned aerial vehicle (UAV) as a flying base station used to provide on the fly wireless communications to a given geographical area is analyzed. In particular, the co-existence between the UAV, that is transmitting data in the downlink, and an underlaid device-todevice (D2D) communication network is considered. For this model, a tractable analytical framework for the coverage and rate analysis is derived. Two scenarios are considered: a static UAV and a mobile UAV. In the first scenario, the average coverage probability and the system sum-rate for the users in the area are derived as a function of the UAV altitude and the number of D2D users. In the second scenario, using the disk covering problem, the minimum number of stop points that the UAV needs to visit in order to completely cover the area is computed. Furthermore, considering multiple retransmissions for the UAV and D2D users, the overall outage probability of the D2D users is derived. Simulation and analytical results show that, depending on the density of D2D users, optimal values for the UAV altitude exist for which the system sum-rate and the coverage probability are maximized. Moreover, our results also show that, by enabling the UAV to intelligently move over the target area, the total required transmit power of UAV while covering the entire area, is minimized. Finally, in order to provide a full coverage for the area of interest, the tradeoff between the coverage and delay, in terms of the number of stop points, is discussed.
[ { "version": "v1", "created": "Thu, 3 Sep 2015 18:06:04 GMT" }, { "version": "v2", "created": "Sat, 13 Feb 2016 09:17:32 GMT" } ]
2016-11-17T00:00:00
[ [ "Mozaffari", "Mohammad", "" ], [ "Saad", "Walid", "" ], [ "Bennis", "Mehdi", "" ], [ "Debbah", "Merouane", "" ] ]
new_dataset
0.958703
1509.07223
Chenxi Liu
Chenxi Liu, Nan Yang, Jinhong Yuan, and Robert Malaney
Secure Transmission for Relay Wiretap Channels in the Presence of Spatially Random Eavesdroppers
7 pages, 5 figures, accepted by IEEE Globecom 2015 Workshop on Trusted Communications with Physical Layer Security
null
10.1109/GLOCOMW.2015.7414069
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a secure transmission scheme for a relay wiretap channel, where a source communicates with a destination via a decode-and-forward relay in the presence of spatially random-distributed eavesdroppers. We assume that the source is equipped with multiple antennas, whereas the relay, the destination, and the eavesdroppers are equipped with a single antenna each. In the proposed scheme, in addition to information signals, the source transmits artificial noise signals in order to confuse the eavesdroppers. With the target of maximizing the secrecy throughput of the relay wiretap channel, we derive a closed-form expression for the transmission outage probability and an easy-to-compute expression for the secrecy outage probability. Using these expressions, we determine the optimal power allocation factor and wiretap code rates that guarantee the maximum secrecy throughput, while satisfying a secrecy outage probability constraint. Furthermore, we examine the impact of source antenna number on the secrecy throughput, showing that adding extra transmit antennas at the source brings about a significant increase in the secrecy throughput.
[ { "version": "v1", "created": "Thu, 24 Sep 2015 03:22:58 GMT" } ]
2016-11-17T00:00:00
[ [ "Liu", "Chenxi", "" ], [ "Yang", "Nan", "" ], [ "Yuan", "Jinhong", "" ], [ "Malaney", "Robert", "" ] ]
new_dataset
0.99144
1510.02574
Jun Lin
Jun Lin, Chenrong Xiong and Zhiyuan Yan
A High Throughput List Decoder Architecture for Polar Codes
submitted to IEEE TVLSI
null
10.1109/TVLSI.2015.2499777
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While long polar codes can achieve the capacity of arbitrary binary-input discrete memoryless channels when decoded by a low complexity successive cancelation (SC) algorithm, the error performance of the SC algorithm is inferior for polar codes with finite block lengths. The cyclic redundancy check (CRC) aided successive cancelation list (SCL) decoding algorithm has better error performance than the SC algorithm. However, current CRC aided SCL (CA-SCL) decoders still suffer from long decoding latency and limited throughput. In this paper, a reduced latency list decoding (RLLD) algorithm for polar codes is proposed. Our RLLD algorithm performs the list decoding on a binary tree, whose leaves correspond to the bits of a polar code. In existing SCL decoding algorithms, all the nodes in the tree are traversed and all possibilities of the information bits are considered. Instead, our RLLD algorithm visits much fewer nodes in the tree and considers fewer possibilities of the information bits. When configured properly, our RLLD algorithm significantly reduces the decoding latency and hence improves throughput, while introducing little performance degradation. Based on our RLLD algorithm, we also propose a high throughput list decoder architecture, which is suitable for larger block lengths due to its scalable partial sum computation unit. Our decoder architecture has been implemented for different block lengths and list sizes using the TSMC 90nm CMOS technology. The implementation results demonstrate that our decoders achieve significant latency reduction and area efficiency improvement compared with other list polar decoders in the literature.
[ { "version": "v1", "created": "Fri, 9 Oct 2015 06:11:34 GMT" } ]
2016-11-17T00:00:00
[ [ "Lin", "Jun", "" ], [ "Xiong", "Chenrong", "" ], [ "Yan", "Zhiyuan", "" ] ]
new_dataset
0.994681
1510.03125
Chunhua Shen
Qichang Hu, Sakrapee Paisitkriangkrai, Chunhua Shen, Anton van den Hengel, Fatih Porikli
Fast detection of multiple objects in traffic scenes with a common detection framework
Appearing in IEEE Transactions on Intelligent Transportation Systems
null
10.1109/TITS.2015.2496795
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traffic scene perception (TSP) aims to real-time extract accurate on-road environment information, which in- volves three phases: detection of objects of interest, recognition of detected objects, and tracking of objects in motion. Since recognition and tracking often rely on the results from detection, the ability to detect objects of interest effectively plays a crucial role in TSP. In this paper, we focus on three important classes of objects: traffic signs, cars, and cyclists. We propose to detect all the three important objects in a single learning based detection framework. The proposed framework consists of a dense feature extractor and detectors of three important classes. Once the dense features have been extracted, these features are shared with all detectors. The advantage of using one common framework is that the detection speed is much faster, since all dense features need only to be evaluated once in the testing phase. In contrast, most previous works have designed specific detectors using different features for each of these objects. To enhance the feature robustness to noises and image deformations, we introduce spatially pooled features as a part of aggregated channel features. In order to further improve the generalization performance, we propose an object subcategorization method as a means of capturing intra-class variation of objects. We experimentally demonstrate the effectiveness and efficiency of the proposed framework in three detection applications: traffic sign detection, car detection, and cyclist detection. The proposed framework achieves the competitive performance with state-of- the-art approaches on several benchmark datasets.
[ { "version": "v1", "created": "Mon, 12 Oct 2015 02:30:22 GMT" } ]
2016-11-17T00:00:00
[ [ "Hu", "Qichang", "" ], [ "Paisitkriangkrai", "Sakrapee", "" ], [ "Shen", "Chunhua", "" ], [ "Hengel", "Anton van den", "" ], [ "Porikli", "Fatih", "" ] ]
new_dataset
0.998254
1510.04039
Nadine Kroher
Nadine Kroher, Emilia G\'omez
Automatic Transcription of Flamenco Singing from Polyphonic Music Recordings
Submitted to the IEEE Transactions on Audio, Speech and Language Processing
null
10.1109/TASLP.2016.2531284
null
cs.SD cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic note-level transcription is considered one of the most challenging tasks in music information retrieval. The specific case of flamenco singing transcription poses a particular challenge due to its complex melodic progressions, intonation inaccuracies, the use of a high degree of ornamentation and the presence of guitar accompaniment. In this study, we explore the limitations of existing state of the art transcription systems for the case of flamenco singing and propose a specific solution for this genre: We first extract the predominant melody and apply a novel contour filtering process to eliminate segments of the pitch contour which originate from the guitar accompaniment. We formulate a set of onset detection functions based on volume and pitch characteristics to segment the resulting vocal pitch contour into discrete note events. A quantised pitch label is assigned to each note event by combining global pitch class probabilities with local pitch contour statistics. The proposed system outperforms state of the art singing transcription systems with respect to voicing accuracy, onset detection and overall performance when evaluated on flamenco singing datasets.
[ { "version": "v1", "created": "Wed, 14 Oct 2015 10:53:00 GMT" } ]
2016-11-17T00:00:00
[ [ "Kroher", "Nadine", "" ], [ "Gómez", "Emilia", "" ] ]
new_dataset
0.998762
1510.07320
S. Hussain Raza
S. Hussain Raza, Matthias Grundmann, Irfan Essa
Geometric Context from Videos
Computer Vision and Pattern Recognition (CVPR), 2013 IEEE Conference on
null
10.1109/CVPR.2013.396
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel algorithm for estimating the broad 3D geometric structure of outdoor video scenes. Leveraging spatio-temporal video segmentation, we decompose a dynamic scene captured by a video into geometric classes, based on predictions made by region-classifiers that are trained on appearance and motion features. By examining the homogeneity of the prediction, we combine predictions across multiple segmentation hierarchy levels alleviating the need to determine the granularity a priori. We built a novel, extensive dataset on geometric context of video to evaluate our method, consisting of over 100 ground-truth annotated outdoor videos with over 20,000 frames. To further scale beyond this dataset, we propose a semi-supervised learning framework to expand the pool of labeled data with high confidence predictions obtained from unlabeled data. Our system produces an accurate prediction of geometric context of video achieving 96% accuracy across main geometric classes.
[ { "version": "v1", "created": "Sun, 25 Oct 2015 22:58:30 GMT" } ]
2016-11-17T00:00:00
[ [ "Raza", "S. Hussain", "" ], [ "Grundmann", "Matthias", "" ], [ "Essa", "Irfan", "" ] ]
new_dataset
0.95746
1511.01646
Peter Trifonov
Peter Trifonov, Vera Miloslavskaya
Polar Subcodes
Accepted to IEEE JSAC special issue on Recent Advances In Capacity Approaching Codes
null
10.1109/JSAC.2015.2504269
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An extension of polar codes is proposed, which allows some of the frozen symbols, called dynamic frozen symbols, to be data-dependent. A construction of polar codes with dynamic frozen symbols, being subcodes of extended BCH codes, is proposed. The proposed codes have higher minimum distance than classical polar codes, but still can be efficiently decoded using the successive cancellation algorithm and its extensions. The codes with Arikan, extended BCH and Reed-Solomon kernel are considered. The proposed codes are shown to outperform LDPC and turbo codes, as well as polar codes with CRC.
[ { "version": "v1", "created": "Thu, 5 Nov 2015 08:06:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Trifonov", "Peter", "" ], [ "Miloslavskaya", "Vera", "" ] ]
new_dataset
0.999846
1511.07374
Shu Sun Ms.
Shu Sun, Timothy A. Thomas, Theodore S. Rappaport, Huan Nguyen, Istvan Z. Kovacs, and Ignacio Rodrigue
Path Loss, Shadow Fading, and Line-Of-Sight Probability Models for 5G Urban Macro-Cellular Scenarios
to appear in proceedings of IEEE Global Communications Conference Workshop, Dec. 2015
null
10.1109/GLOCOMW.2015.7414036
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents key parameters including the line-of-sight (LOS) probability, large-scale path loss, and shadow fading models for the design of future fifth generation (5G) wireless communication systems in urban macro-cellular (UMa) scenarios, using the data obtained from propagation measurements at 38 GHz in Austin, US, and at 2, 10, 18, and 28 GHz in Aalborg, Denmark. A comparison of different LOS probability models is performed for the Aalborg environment. Alpha-betagamma and close-in reference distance path loss models are studied in depth to show their value in channel modeling. Additionally, both single-slope and dual-slope omnidirectional path loss models are investigated to analyze and contrast their root-mean-square (RMS) errors on measured path loss values. While the results show that the dual-slope large-scale path loss model can slightly reduce RMS errors compared to its singleslope counterpart in non-line-of-sight (NLOS) conditions, the improvement is not significant enough to warrant adopting the dual-slope path loss model. Furthermore, the shadow fading magnitude versus distance is explored, showing a slight increasing trend in LOS and a decreasing trend in NLOS based on the Aalborg data, but more measurements are necessary to gain a better knowledge of the UMa channels at centimeter- and millimeter-wave frequency bands.
[ { "version": "v1", "created": "Mon, 23 Nov 2015 19:26:01 GMT" }, { "version": "v2", "created": "Tue, 24 Nov 2015 18:47:56 GMT" } ]
2016-11-17T00:00:00
[ [ "Sun", "Shu", "" ], [ "Thomas", "Timothy A.", "" ], [ "Rappaport", "Theodore S.", "" ], [ "Nguyen", "Huan", "" ], [ "Kovacs", "Istvan Z.", "" ], [ "Rodrigue", "Ignacio", "" ] ]
new_dataset
0.992036
1512.04116
Mordechai Guri
Mordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface
IEEE TrustCom 2015
null
10.1109/Trustcom.2015.358
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Smartphones and tablets have become prime targets for malware, due to the valuable private and corporate information they hold. While Anti-Virus (AV) program may successfully detect malicious applications (apps), they remain ineffective against low-level rootkits that evade detection mechanisms by masking their own presence. Furthermore, any detection mechanism run on the same physical device as the monitored OS can be compromised via application, kernel or boot-loader vulnerabilities. Consequentially, trusted detection of kernel rootkits in mobile devices is a challenging task in practice. In this paper we present JoKER - a system which aims at detecting rootkits in the Android kernel by utilizing the hardware's Joint Test Action Group (JTAG) interface for trusted memory forensics. Our framework consists of components that extract areas of a kernel's memory and reconstruct it for further analysis. We present the overall architecture along with its implementation, and demonstrate that the system can successfully detect the presence of stealthy rootkits in the kernel. The results show that although JTAG's main purpose is system testing, it can also be used for malware detection where traditional methods fail.
[ { "version": "v1", "created": "Sun, 13 Dec 2015 20:16:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Guri", "Mordechai", "" ], [ "Poliak", "Yuri", "" ], [ "Shapira", "Bracha", "" ], [ "Elovici", "Yuval", "" ] ]
new_dataset
0.998966
1512.04133
George Cushen
George Cushen
A Person Re-Identification System For Mobile Devices
Appearing in Proceedings of the 11th IEEE/ACM International Conference on Signal Image Technology & Internet Systems (SITIS 2015)
null
10.1109/SITIS.2015.96
null
cs.CV cs.CR cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Person re-identification is a critical security task for recognizing a person across spatially disjoint sensors. Previous work can be computationally intensive and is mainly based on low-level cues extracted from RGB data and implemented on a PC for a fixed sensor network (such as traditional CCTV). We present a practical and efficient framework for mobile devices (such as smart phones and robots) where high-level semantic soft biometrics are extracted from RGB and depth data. By combining these cues, our approach attempts to provide robustness to noise, illumination, and minor variations in clothing. This mobile approach may be particularly useful for the identification of persons in areas ill-served by fixed sensors or for tasks where the sensor position and direction need to dynamically adapt to a target. Results on the BIWI dataset are preliminary but encouraging. Further evaluation and demonstration of the system will be available on our website.
[ { "version": "v1", "created": "Sun, 13 Dec 2015 22:33:17 GMT" } ]
2016-11-17T00:00:00
[ [ "Cushen", "George", "" ] ]
new_dataset
0.986495
1601.02699
Juyeop Kim Dr.
Juyeop Kim, Sang Won Choi, Won-Yong Shin, Yong-Soo Song and Yong-Kyu Kim
Group Communication Over LTE : A Radio Access Perspective
will be published in IEEE Communications Magazine
null
10.1109/MCOM.2016.7452261
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Long Term Evolution (LTE), which has its root on commercial mobile communications, recently becomes an influential solution to future public safety communications. To verify the feasibility of LTE for public safety, it is essential to investigate whether an LTE system optimized for one-to-one communications is capable of providing group communication, which is one of the most important service concepts in public safety. In general, a number of first responders for public safety need to form a group for communicating with each other or sharing the common data for collaboration on their mission. In this article, we analyze how the current LTE system can support group communication in a radio access aspect. Based on the requirements for group communication, we validate whether each LTE-enabled radio access method can efficiently support group communication. In addition, we propose a new multicast transmission scheme, termed index-coded Hybrid Automatic Retransmission reQuest (HARQ). By applying the index coding concept to HARQ operations, we show that the LTE system can provide group communication more sophisticatedly in terms of radio resource efficiency and scalability. We finally evaluate the performance of LTE-enabled group communication using several radio access methods and show how the proposed transmission scheme brings the performance enhancement via system level simulations.
[ { "version": "v1", "created": "Tue, 12 Jan 2016 00:22:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Kim", "Juyeop", "" ], [ "Choi", "Sang Won", "" ], [ "Shin", "Won-Yong", "" ], [ "Song", "Yong-Soo", "" ], [ "Kim", "Yong-Kyu", "" ] ]
new_dataset
0.998274
1601.03121
Behzad Asadi
Behzad Asadi, Lawrence Ong, Sarah J. Johnson
A Unified Inner Bound for the Two-Receiver Memoryless Broadcast Channel with Channel State and Message Side Information
Extended version of the same-titled paper submitted to the 2016 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2016.7541284
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the two-receiver memoryless broadcast channel with states where each receiver requests both common and private messages, and may know part of the private message requested by the other receiver as receiver message side information (RMSI). We address two categories of the channel (i) channel with states known causally to the transmitter, and (ii) channel with states known non-causally to the transmitter. Starting with the channel without RMSI, we first propose a transmission scheme and derive an inner bound for the causal category. We then unify our inner bound for the causal category and the best-known inner bound for the non-causal category, although their transmission schemes are different. Moving on to the channel with RMSI, we first apply a pre-coding to the transmission schemes of the causal and non-causal categories without RMSI. We then derive a unified inner bound as a result of having a unified inner bound when there is no RMSI, and applying the same pre-coding to both categories. We show that our inner bound is tight for some new cases as well as the cases whose capacity region was known previously.
[ { "version": "v1", "created": "Wed, 13 Jan 2016 03:30:47 GMT" } ]
2016-11-17T00:00:00
[ [ "Asadi", "Behzad", "" ], [ "Ong", "Lawrence", "" ], [ "Johnson", "Sarah J.", "" ] ]
new_dataset
0.974021
1602.00066
Lin Chen
Lin Chen, Zhiping Xiao, Kaigui Bian, Shuyu Shi, Rui Li, Yusheng Ji
Skolem Sequence Based Self-adaptive Broadcast Protocol in Cognitive Radio Networks
A full version with technical proofs. Accepted by IEEE VTC 2016 Spring
null
10.1109/VTCSpring.2016.7504475
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The base station (BS) in a multi-channel cognitive radio (CR) network has to broadcast to secondary (or unlicensed) receivers/users on more than one broadcast channels via channel hopping (CH), because a single broadcast channel can be reclaimed by the primary (or licensed) user, leading to broadcast failures. Meanwhile, a secondary receiver needs to synchronize its clock with the BS's clock to avoid broadcast failures caused by the possible clock drift between the CH sequences of the secondary receiver and the BS. In this paper, we propose a CH-based broadcast protocol called SASS, which enables a BS to successfully broadcast to secondary receivers over multiple broadcast channels via channel hopping. Specifically, the CH sequences are constructed on basis of a mathematical construct---the Self-Adaptive Skolem sequence. Moreover, each secondary receiver under SASS is able to adaptively synchronize its clock with that of the BS without any information exchanges, regardless of any amount of clock drift.
[ { "version": "v1", "created": "Sat, 30 Jan 2016 03:04:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Chen", "Lin", "" ], [ "Xiao", "Zhiping", "" ], [ "Bian", "Kaigui", "" ], [ "Shi", "Shuyu", "" ], [ "Li", "Rui", "" ], [ "Ji", "Yusheng", "" ] ]
new_dataset
0.999684
1602.00173
Ejder Ba\c{s}tu\u{g}
Georgios Paschos, Ejder Ba\c{s}tu\u{g}, Ingmar Land, Giuseppe Caire, and M\'erouane Debbah
Wireless Caching: Technical Misconceptions and Business Barriers
a version of this paper has been accepted to IEEE Communications Magazine, Special Issue on Communications, Caching, and Computing for Content-Centric Mobile Networks
null
10.1109/MCOM.2016.7537172
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Caching is a hot research topic and poised to develop into a key technology for the upcoming 5G wireless networks. The successful implementation of caching techniques however, crucially depends on joint research developments in different scientific domains such as networking, information theory, machine learning, and wireless communications. Moreover, there exist business barriers related to the complex interactions between the involved stakeholders, the users, the cellular operators, and the Internet content providers. In this article we discuss several technical misconceptions with the aim to uncover enabling research directions for caching in wireless systems. Ultimately we make a speculative stakeholder analysis for wireless caching in 5G.
[ { "version": "v1", "created": "Sun, 31 Jan 2016 00:06:41 GMT" }, { "version": "v2", "created": "Fri, 3 Jun 2016 21:51:12 GMT" } ]
2016-11-17T00:00:00
[ [ "Paschos", "Georgios", "" ], [ "Baştuğ", "Ejder", "" ], [ "Land", "Ingmar", "" ], [ "Caire", "Giuseppe", "" ], [ "Debbah", "Mérouane", "" ] ]
new_dataset
0.995873
1602.03602
Yong Zeng
Yong Zeng, Rui Zhang, and Teng Joon Lim
Wireless Communications with Unmanned Aerial Vehicles: Opportunities and Challenges
To appear in IEEE Communications Magazine
null
10.1109/MCOM.2016.7470933
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless communication systems that include unmanned aerial vehicles (UAVs) promise to provide cost-effective wireless connectivity for devices without infrastructure coverage. Compared to terrestrial communications or those based on high-altitude platforms (HAPs), on-demand wireless systems with low-altitude UAVs are in general faster to deploy, more flexibly re-configured, and are likely to have better communication channels due to the presence of short-range line-of-sight (LoS) links. However, the utilization of highly mobile and energy-constrained UAVs for wireless communications also introduces many new challenges. In this article, we provide an overview of UAV-aided wireless communications, by introducing the basic networking architecture and main channel characteristics, highlighting the key design considerations as well as the new opportunities to be exploited.
[ { "version": "v1", "created": "Thu, 11 Feb 2016 02:00:58 GMT" } ]
2016-11-17T00:00:00
[ [ "Zeng", "Yong", "" ], [ "Zhang", "Rui", "" ], [ "Lim", "Teng Joon", "" ] ]
new_dataset
0.999276
1602.03617
Johann Bengua
Johann A. Bengua, Hoang D. Tuan, Ho N. Phien, Ha H. Kha
Two-hop Power-Relaying for Linear Wireless Sensor Networks
Submitted to IEEE ICCE 2016
null
10.1109/CCE.2016.7562622
null
cs.NI cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents two-hop relay gain-scheduling control in a Wireless Sensor Network to estimate a static target prior characterized by Gaussian probability distribution. The target is observed by a network of linear sensors, whose observations are transmitted to a fusion center for carrying out final estimation via a amplify-and-forward relay node. We are concerned with the joint transmission power allocation for sensors and relay to optimize the minimum mean square error (MMSE) estimator, which is deployed at the fusion center. Particularly, such highly nonlinear optimization problems are solved by an iterative procedure of very low computational complexity. Simulations are provided to support the efficiency of our proposed power allocation.
[ { "version": "v1", "created": "Thu, 11 Feb 2016 05:26:31 GMT" } ]
2016-11-17T00:00:00
[ [ "Bengua", "Johann A.", "" ], [ "Tuan", "Hoang D.", "" ], [ "Phien", "Ho N.", "" ], [ "Kha", "Ha H.", "" ] ]
new_dataset
0.970518
1603.01926
Matthew Kokshoorn
Matthew Kokshoorn, He Chen, Peng Wang, Yonghui Li, Branka Vucetic
Millimeter Wave MIMO Channel Estimation using Overlapped Beam Patterns and Rate Adaptation
This is an extended version of a paper accepted to appear in IEEE Transactions on Signal Processing
null
10.1109/TSP.2016.2614488
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is concerned with the channel estimation problem in Millimeter wave (mmWave) wireless systems with large antenna arrays. By exploiting the inherent sparse nature of the mmWave channel, we first propose a fast channel estimation (FCE) algorithm based on a novel overlapped beam pattern design, which can increase the amount of information carried by each channel measurement and thus reduce the required channel estimation time compared to the existing non-overlapped designs. We develop a maximum likelihood (ML) estimator to optimally extract the path information from the channel measurements. Then, we propose a novel rate-adaptive channel estimation (RACE) algorithm, which can dynamically adjust the number of channel measurements based on the expected probability of estimation error (PEE). The performance of both proposed algorithms is analyzed. For the FCE algorithm, an approximate closed-form expression for the PEE is derived. For the RACE algorithm, a lower bound for the minimum signal energy-to-noise ratio required for a given number of channel measurements is developed based on the Shannon-Hartley theorem. Simulation results show that the FCE algorithm significantly reduces the number of channel estimation measurements compared to the existing algorithms using non-overlapped beam patterns. By adopting the RACE algorithm, we can achieve up to a 6dB gain in signal energy-to-noise ratio for the same PEE compared to the existing algorithms.
[ { "version": "v1", "created": "Mon, 7 Mar 2016 03:54:02 GMT" }, { "version": "v2", "created": "Fri, 29 Jul 2016 04:21:34 GMT" }, { "version": "v3", "created": "Mon, 19 Sep 2016 07:22:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Kokshoorn", "Matthew", "" ], [ "Chen", "He", "" ], [ "Wang", "Peng", "" ], [ "Li", "Yonghui", "" ], [ "Vucetic", "Branka", "" ] ]
new_dataset
0.99808
1603.03551
Zhiyong Chen
Hui Liu, Zhiyong Chen, Liang Qian
The three primary colors of mobile systems
submitted to IEEE Communications Magazine -- Feature Topic: Mobile 3C Networks
null
10.1109/MCOM.2016.7565182
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the notion of "mobile 3C systems in which the "Communications", "Computing", and "Caching" (i.e., 3C) make up the three primary resources/funcationalties, akin to the three primary colors, for a mobile system. We argue that in future mobile networks, the roles of computing and caching are as intrinsic and essential as communications, and only the collective usage of these three primary resources can support the sustainable growth of mobile systems. By defining the 3C resources in their canonical forms, we reveal the important fact that "caching" affects the mobile system performance by introducing non-causality into the system, whereas "computing" achieves capacity gains by performing logical operations across mobile system entities. Many existing capacity-enhancing techniques such as coded multicast, collaborative transmissions, and proactive content pushing can be cast into the native 3C framework for analytical tractability. We further illustrate the mobile 3C concepts with practical examples, including a system on broadcast-unicast convergence for massive media content delivery. The mobile 3C design paradigm opens up new possibilities as well as key research problems bearing academic and practice significance.
[ { "version": "v1", "created": "Fri, 11 Mar 2016 07:41:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Liu", "Hui", "" ], [ "Chen", "Zhiyong", "" ], [ "Qian", "Liang", "" ] ]
new_dataset
0.960266
1603.04079
George MacCartney Jr
Katsuyuki Haneda, Lei Tian, Henrik Asplund, Jian Li, Yi Wang, David Steer, Clara Li, Tommaso Balercia, Sunguk Lee, YoungSuk Kim, Amitava Ghosh, Timothy Thomas, Takehiro Nakamura, Yuichi Kakishima, Tetsuro Imai, Haralabos Papadopoulas, Theodore S. Rappaport, George R. MacCartney Jr., Mathew K. Samimi, Shu Sun, Ozge Koymen, Sooyoung Hur, Jeongho Park, Charlie Zhang, Evangelos Mellios, Andreas F. Molisch, Saeed S. Ghassamzadah, Arun Ghosh
Indoor 5G 3GPP-like Channel Models for Office and Shopping Mall Environments
To be published in 2016 IEEE International Conference on Communications Workshops (ICCW), Kuala Lumpur, Malaysia, May, 2016
null
10.1109/ICCW.2016.7503868
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Future mobile communications systems are likely to be very different to those of today with new service innovations driven by increasing data traffic demand, increasing processing power of smart devices and new innovative applications. To meet these service demands the telecommunications industry is converging on a common set of 5G requirements which includes network speeds as high as 10 Gbps, cell edge rate greater than 100 Mbps, and latency of less than 1 msec. To reach these 5G requirements the industry is looking at new spectrum bands in the range up to 100 GHz where there is spectrum availability for wide bandwidth channels. For the development of new 5G systems to operate in bands up to 100 GHz there is a need for accurate radio propagation models which are not addressed by existing channel models developed for bands below 6 GHz. This paper presents a preliminary overview of the 5G channel models for bands up to 100 GHz in indoor offices and shopping malls, derived from extensive measurements across a multitude of bands. These studies have found some extensibility of the existing 3GPP models to the higher frequency bands up to 100 GHz. The measurements indicate that the smaller wavelengths introduce an increased sensitivity of the propagation models to the scale of the environment and show some frequency dependence of the path loss as well as increased occurrence of blockage. Further, the penetration loss is highly dependent on the material and tends to increase with frequency. The small-scale characteristics of the channel such as delay spread and angular spread and the multipath richness is somewhat similar over the frequency range, which is encouraging for extending the existing 3GPP models to the wider frequency range. Further work will be carried out to complete these models, but this paper presents the first steps for an initial basis for the model development.
[ { "version": "v1", "created": "Sun, 13 Mar 2016 21:38:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Haneda", "Katsuyuki", "" ], [ "Tian", "Lei", "" ], [ "Asplund", "Henrik", "" ], [ "Li", "Jian", "" ], [ "Wang", "Yi", "" ], [ "Steer", "David", "" ], [ "Li", "Clara", "" ], [ "Balercia", "Tommaso", "" ], [ "Lee", "Sunguk", "" ], [ "Kim", "YoungSuk", "" ], [ "Ghosh", "Amitava", "" ], [ "Thomas", "Timothy", "" ], [ "Nakamura", "Takehiro", "" ], [ "Kakishima", "Yuichi", "" ], [ "Imai", "Tetsuro", "" ], [ "Papadopoulas", "Haralabos", "" ], [ "Rappaport", "Theodore S.", "" ], [ "MacCartney", "George R.", "Jr." ], [ "Samimi", "Mathew K.", "" ], [ "Sun", "Shu", "" ], [ "Koymen", "Ozge", "" ], [ "Hur", "Sooyoung", "" ], [ "Park", "Jeongho", "" ], [ "Zhang", "Charlie", "" ], [ "Mellios", "Evangelos", "" ], [ "Molisch", "Andreas F.", "" ], [ "Ghassamzadah", "Saeed S.", "" ], [ "Ghosh", "Arun", "" ] ]
new_dataset
0.993909
1603.04341
Maria Gregori
Maria Gregori, Jes\'us G\'omez-Vilardeb\'o, Javier Matamoros and Deniz G\"und\"uz
Wireless Content Caching for Small Cell and D2D Networks
To appear in the IEEE Journal on Selected Areas - Series on Green Communications and Networking
null
10.1109/JSAC.2016.2545413
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The fifth generation wireless networks must provide fast and reliable connectivity while coping with the ongoing traffic growth. It is of paramount importance that the required resources, such as energy and bandwidth, do not scale with traffic. While the aggregate network traffic is growing at an unprecedented rate, users tend to request the same popular contents at different time instants. Therefore, caching the most popular contents at the network edge is a promising solution to reduce the traffic and the energy consumption over the backhaul links. In this paper, two scenarios are considered, where caching is performed either at a small base station, or directly at the user terminals, which communicate using \ac{D2D} communications. In both scenarios, joint design of the transmission and caching policies is studied when the user demands are known in advance. This joint design offers two different caching gains, namely, the \textit{pre-downloading} and \textit{local caching gains}. It is shown that the finite cache capacity limits the attainable gains, and creates an inherent tradeoff between the two types of gains. In this context, a continuous time optimization problem is formulated to determine the optimal transmission and caching policies that minimize a generic cost function, such as energy, bandwidth, or throughput. The jointly optimal solution is obtained by demonstrating that caching files at a constant rate is optimal, which allows to reformulate the problem as a finite-dimensional convex program. The numerical results show that the proposed joint transmission and caching policy dramatically reduces the total cost, which is particularised to the total energy consumption at the \ac{MBS}, as well as to the total economical cost for the service provider, when users demand economical incentives for delivering content to other users over the D2D links.
[ { "version": "v1", "created": "Mon, 14 Mar 2016 16:46:16 GMT" } ]
2016-11-17T00:00:00
[ [ "Gregori", "Maria", "" ], [ "Gómez-Vilardebó", "Jesús", "" ], [ "Matamoros", "Javier", "" ], [ "Gündüz", "Deniz", "" ] ]
new_dataset
0.98345
1603.04418
Fei Miao
Fei Miao, Shuo Han, Shan Lin, John A. Stankovic, Hua Huang, Desheng Zhang, Sirajum Munir, Tian He, George J. Pappas
Taxi Dispatch with Real-Time Sensing Data in Metropolitan Areas: A Receding Horizon Control Approach
Accepted. Key words--Intelligent Transportation System, Real-Time Taxi Dispatch, Receding Horizon Control, Mobility Pattern
IEEE Transactions on Automation Science and Engineering (TASE), 2016
10.1145/2735960.2735961
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional taxi systems in metropolitan areas often suffer from inefficiencies due to uncoordinated actions as system capacity and customer demand change. With the pervasive deployment of networked sensors in modern vehicles, large amounts of information regarding customer demand and system status can be collected in real time. This information provides opportunities to perform various types of control and coordination for large-scale intelligent transportation systems. In this paper, we present a receding horizon control (RHC) framework to dispatch taxis, which incorporates highly spatiotemporally correlated demand/supply models and real-time GPS location and occupancy information. The objectives include matching spatiotemporal ratio between demand and supply for service quality with minimum current and anticipated future taxi idle driving distance. Extensive trace-driven analysis with a data set containing taxi operational records in San Francisco shows that our solution reduces the average total idle distance by 52%, and reduces the supply demand ratio error across the city during one experimental time slot by 45%. Moreover, our RHC framework is compatible with a wide variety of predictive models and optimization problem formulations. This compatibility property allows us to solve robust optimization problems with corresponding demand uncertainty models that provide disruptive event information.
[ { "version": "v1", "created": "Mon, 14 Mar 2016 19:51:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Miao", "Fei", "" ], [ "Han", "Shuo", "" ], [ "Lin", "Shan", "" ], [ "Stankovic", "John A.", "" ], [ "Huang", "Hua", "" ], [ "Zhang", "Desheng", "" ], [ "Munir", "Sirajum", "" ], [ "He", "Tian", "" ], [ "Pappas", "George J.", "" ] ]
new_dataset
0.999705
1603.07357
Blesson Varghese
Blesson Varghese, Lawan Thamsuhang Subba, Long Thai, Adam Barker
DocLite: A Docker-Based Lightweight Cloud Benchmarking Tool
16th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), 2016, Cartagena, Colombia. arXiv admin note: substantial text overlap with arXiv:1601.03872
null
10.1109/CCGrid.2016.14
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing benchmarking methods are time consuming processes as they typically benchmark the entire Virtual Machine (VM) in order to generate accurate performance data, making them less suitable for real-time analytics. The research in this paper is aimed to surmount the above challenge by presenting DocLite - Docker Container-based Lightweight benchmarking tool. DocLite explores lightweight cloud benchmarking methods for rapidly executing benchmarks in near real-time. DocLite is built on the Docker container technology, which allows a user-defined memory size and number of CPU cores of the VM to be benchmarked. The tool incorporates two benchmarking methods - the first referred to as the native method employs containers to benchmark a small portion of the VM and generate performance ranks, and the second uses historic benchmark data along with the native method as a hybrid to generate VM ranks. The proposed methods are evaluated on three use-cases and are observed to be up to 91 times faster than benchmarking the entire VM. In both methods, small containers provide the same quality of rankings as a large container. The native method generates ranks with over 90% and 86% accuracy for sequential and parallel execution of an application compared against benchmarking the whole VM. The hybrid method did not improve the quality of the rankings significantly.
[ { "version": "v1", "created": "Wed, 23 Mar 2016 20:55:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Varghese", "Blesson", "" ], [ "Subba", "Lawan Thamsuhang", "" ], [ "Thai", "Long", "" ], [ "Barker", "Adam", "" ] ]
new_dataset
0.999749
1603.08876
Alexander Barg
Alexander Barg, Itzhak Tamo, and Serge Vladuts
Locally recoverable codes on algebraic curves
16pp. An extended abstract of this submission was posted earlier as arXiv:1501.04904 and was published in Proceedings of the 2015 IEEE International Symposium on Information Theory, Hong Kong, China, June 14-19, 2015, pp. 1252--1256
null
10.1109/ISIT.2015.7282656
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A code over a finite alphabet is called locally recoverable (LRC code) if every symbol in the encoding is a function of a small number (at most $r$) other symbols of the codeword. In this paper we introduce a construction of LRC codes on algebraic curves, extending a recent construction of Reed-Solomon like codes with locality. We treat the following situations: local recovery of a single erasure, local recovery of multiple erasures, and codes with several disjoint recovery sets for every coordinate (the {\em availability problem}). For each of these three problems we describe a general construction of codes on curves and construct several families of LRC codes. We also describe a construction of codes with availability that relies on automorphism groups of curves.
[ { "version": "v1", "created": "Tue, 29 Mar 2016 18:32:57 GMT" } ]
2016-11-17T00:00:00
[ [ "Barg", "Alexander", "" ], [ "Tamo", "Itzhak", "" ], [ "Vladuts", "Serge", "" ] ]
new_dataset
0.999834
1604.00861
Heikki Huttunen
Giambattista Parascandolo, Heikki Huttunen, Tuomas Virtanen
Recurrent Neural Networks for Polyphonic Sound Event Detection in Real Life Recordings
To appean in Proceedings of IEEE ICASSP 2016
null
10.1109/ICASSP.2016.7472917
null
cs.SD cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an approach to polyphonic sound event detection in real life recordings based on bi-directional long short term memory (BLSTM) recurrent neural networks (RNNs). A single multilabel BLSTM RNN is trained to map acoustic features of a mixture signal consisting of sounds from multiple classes, to binary activity indicators of each event class. Our method is tested on a large database of real-life recordings, with 61 classes (e.g. music, car, speech) from 10 different everyday contexts. The proposed method outperforms previous approaches by a large margin, and the results are further improved using data augmentation techniques. Overall, our system reports an average F1-score of 65.5% on 1 second blocks and 64.7% on single frames, a relative improvement over previous state-of-the-art approach of 6.8% and 15.1% respectively.
[ { "version": "v1", "created": "Mon, 4 Apr 2016 13:54:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Parascandolo", "Giambattista", "" ], [ "Huttunen", "Heikki", "" ], [ "Virtanen", "Tuomas", "" ] ]
new_dataset
0.987592
1604.02937
Eric Rondeau
Jari Porras, Ahmed Seffah, Eric Rondeau (CRAN), Karl Andersson, Klimova Alexandra (ITMO)
PERCCOM: A Master Program in Pervasive Computing and COMmunications for Sustainable Development
null
29th IEEE Conference on Software Engineering Education and Training, Apr 2016, Dallas, United States. 2016
10.1109/CSEET.2016.39
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the Erasmus Mundus Joint Master Degree in Pervasive Computing and Communications for Sustainable Development (PERCCOM). This program brings together 11 academic partners and 8 industry partners to combine advanced Information and Communication Technologies (ICT) with environmental awareness to enable world-class education and unique competences for ICT professionals who can build cleaner, greener, more resource and energy efficient cyber-physical systems. First, this paper describes the rationale and motivations for ICT education for sustainability challenges. It then details the structure and contents of the programs including the courses offered at the three teaching locations (Nancy France, Lappeenranta Finland, and Lulea Sweden). The ways that the program has been running as well as students selection, their thesis works, involvement of industry, are also discussed. The program was built and managed using a solid academic standards and strategies student-centered learning.
[ { "version": "v1", "created": "Mon, 11 Apr 2016 13:10:52 GMT" } ]
2016-11-17T00:00:00
[ [ "Porras", "Jari", "", "CRAN" ], [ "Seffah", "Ahmed", "", "CRAN" ], [ "Rondeau", "Eric", "", "CRAN" ], [ "Andersson", "Karl", "", "ITMO" ], [ "Alexandra", "Klimova", "", "ITMO" ] ]
new_dataset
0.992553
1604.04906
Johannes Stegmaier
Johannes Stegmaier, Julian Arz, Benjamin Schott, Jens C. Otte, Andrei Kobitski, G. Ulrich Nienhaus, Uwe Str\"ahle, Peter Sanders, Ralf Mikut
Generating Semi-Synthetic Validation Benchmarks for Embryomics
Accepted publication at IEEE International Symposium on Biomedical Imaging: From Nano to Macro (ISBI), 2016
null
10.1109/ISBI.2016.7493359
null
cs.CV q-bio.CB q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Systematic validation is an essential part of algorithm development. The enormous dataset sizes and the complexity observed in many recent time-resolved 3D fluorescence microscopy imaging experiments, however, prohibit a comprehensive manual ground truth generation. Moreover, existing simulated benchmarks in this field are often too simple or too specialized to sufficiently validate the observed image analysis problems. We present a new semi-synthetic approach to generate realistic 3D+t benchmarks that combines challenging cellular movement dynamics of real embryos with simulated fluorescent nuclei and artificial image distortions including various parametrizable options like cell numbers, acquisition deficiencies or multiview simulations. We successfully applied the approach to simulate the development of a zebrafish embryo with thousands of cells over 14 hours of its early existence.
[ { "version": "v1", "created": "Sun, 17 Apr 2016 18:29:48 GMT" } ]
2016-11-17T00:00:00
[ [ "Stegmaier", "Johannes", "" ], [ "Arz", "Julian", "" ], [ "Schott", "Benjamin", "" ], [ "Otte", "Jens C.", "" ], [ "Kobitski", "Andrei", "" ], [ "Nienhaus", "G. Ulrich", "" ], [ "Strähle", "Uwe", "" ], [ "Sanders", "Peter", "" ], [ "Mikut", "Ralf", "" ] ]
new_dataset
0.999698
1605.02410
Alexey Kovalev
Ilya Dumer, Alexey A. Kovalev, Leonid P. Pryadko
Distance verification for LDPC codes
5 pages, 1 figure, to appear in Proceedings of ISIT 2016 - IEEE International Symposium on Information Theory, Barcelona
null
10.1109/ISIT.2016.7541755
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of finding code distance has been long studied for the generic ensembles of linear codes and led to several algorithms that substantially reduce exponential complexity of this task. However, no asymptotic complexity bounds are known for distance verification in other ensembles of linear codes. Our goal is to re-design the existing generic algorithms of distance verification and derive their complexity for LDPC codes. We obtain new complexity bounds with provable performance expressed in terms of the erasure-correcting thresholds of long LDPC codes. These bounds exponentially reduce complexity estimates known for linear codes.
[ { "version": "v1", "created": "Mon, 9 May 2016 03:59:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Dumer", "Ilya", "" ], [ "Kovalev", "Alexey A.", "" ], [ "Pryadko", "Leonid P.", "" ] ]
new_dataset
0.961693
1606.00397
Siddharth Jain
Siddharth Jain, Farzad Farnoud, Moshe Schwartz, Jehoshua Bruck
Duplication-Correcting Codes for Data Storage in the DNA of Living Organisms
Submitted to IEEE Transactions on Information Theory
null
10.1109/ISIT.2016.7541455
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ability to store data in the DNA of a living organism has applications in a variety of areas including synthetic biology and watermarking of patented genetically-modified organisms. Data stored in this medium is subject to errors arising from various mutations, such as point mutations, indels, and tandem duplication, which need to be corrected to maintain data integrity. In this paper, we provide error-correcting codes for errors caused by tandem duplications, which create a copy of a block of the sequence and insert it in a tandem manner, i.e., next to the original. In particular, we present two families of codes for correcting errors due to tandem-duplications of a fixed length, the first family can correct any number of errors while the second corrects a bounded number of errors. We also study codes for correcting tandem duplications of length up to a given constant $k$, where we are primarily focused on the cases of $k=2,3$. Finally, we provide a full classification of the sets of lengths allowed in tandem duplication that result in a unique root for all sequences.
[ { "version": "v1", "created": "Wed, 1 Jun 2016 18:55:45 GMT" } ]
2016-11-17T00:00:00
[ [ "Jain", "Siddharth", "" ], [ "Farnoud", "Farzad", "" ], [ "Schwartz", "Moshe", "" ], [ "Bruck", "Jehoshua", "" ] ]
new_dataset
0.997961
1607.01383
Karim Banawan
Karim Banawan, Sennur Ulukus
MIMO Wiretap Channel under Receiver Side Power Constraints with Applications to Wireless Power Transfer and Cognitive Radio
Submitted to IEEE Transactions on Communications, September 2015. Accepted for publication, July 2016
null
10.1109/TCOMM.2016.2593739
null
cs.IT cs.CR cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the multiple-input multiple-output (MIMO) wiretap channel under a minimum receiver-side power constraint in addition to the usual maximum transmitter-side power constraint. This problem is motivated by energy harvesting communications with wireless energy transfer, where an added goal is to deliver a minimum amount of energy to a receiver in addition to delivering secure data to another receiver. In this paper, we characterize the exact secrecy capacity of the MIMO wiretap channel under transmitter and receiver-side power constraints. We first show that solving this problem is equivalent to solving the secrecy capacity of the wiretap channel under a double-sided correlation matrix constraint on the channel input. We show the converse by extending the channel enhancement technique to our case. We present two achievable schemes that achieve the secrecy capacity: the first achievable scheme uses a Gaussian codebook with a fixed mean, and the second achievable scheme uses artificial noise (or cooperative jamming) together with a Gaussian codebook. The role of the mean or the artificial noise is to enable energy transfer without sacrificing from the secure rate. This is the first instance of a channel model where either the use of a mean signal or the use of channel prefixing via artificial noise is strictly necessary for the MIMO wiretap channel. We then extend our work to consider a maximum receiver-side power constraint. This problem is motivated by cognitive radio applications, where an added goal is to decrease the received signal energy (interference temperature) at a receiver. We further extend our results to: requiring receiver-side power constraints at both receivers; considering secrecy constraints at both receivers to study broadcast channels with confidential messages; and removing the secrecy constraints to study the classical broadcast channel.
[ { "version": "v1", "created": "Tue, 5 Jul 2016 19:49:39 GMT" } ]
2016-11-17T00:00:00
[ [ "Banawan", "Karim", "" ], [ "Ulukus", "Sennur", "" ] ]
new_dataset
0.996562
1609.07589
Won-Yong Shin
Won-Yong Shin, Vien V. Mai, Bang Chul Jung, Hyun Jong Yang
Opportunistic Network Decoupling With Virtual Full-Duplex Operation in Multi-Source Interfering Relay Networks
22 pages, 5 figures, To appear in IEEE Transactions on Mobile Computing
null
10.1109/TMC.2016.2614979
null
cs.IT cs.DC cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new achievability scheme, termed opportunistic network decoupling (OND), operating in virtual full-duplex mode. In the scheme, a novel relay scheduling strategy is utilized in the $K\times N\times K$ channel with interfering relays, consisting of $K$ source--destination pairs and $N$ half-duplex relays in-between them. A subset of relays using alternate relaying is opportunistically selected in terms of producing the minimum total interference level, thereby resulting in network decoupling. As our main result, it is shown that under a certain relay scaling condition, the OND protocol achieves $K$ degrees of freedom even in the presence of interfering links among relays. Numerical evaluation is also shown to validate the performance of the proposed OND. Our protocol basically operates in a fully distributed fashion along with local channel state information, thereby resulting in a relatively easy implementation.
[ { "version": "v1", "created": "Sat, 24 Sep 2016 09:36:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Shin", "Won-Yong", "" ], [ "Mai", "Vien V.", "" ], [ "Jung", "Bang Chul", "" ], [ "Yang", "Hyun Jong", "" ] ]
new_dataset
0.987931
1610.00125
Yiannis Andreopoulos
Joseph Doyle, Vasileios Giotsas, Mohammad Ashraful Anam and Yiannis Andreopoulos
Dithen: A Computation-as-a-Service Cloud Platform For Large-Scale Multimedia Processing
to appear in IEEE Transactions on Cloud Computing. arXiv admin note: substantial text overlap with arXiv:1604.04804
null
10.1109/TCC.2016.2617363
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Dithen, a novel computation-as-a-service (CaaS) cloud platform specifically tailored to the parallel execution of large-scale multimedia tasks. Dithen handles the upload/download of both multimedia data and executable items, the assignment of compute units to multimedia workloads, and the reactive control of the available compute units to minimize the cloud infrastructure cost under deadline-abiding execution. Dithen combines three key properties: (i) the reactive assignment of individual multimedia tasks to available computing units according to availability and predetermined time-to-completion constraints; (ii) optimal resource estimation based on Kalman-filter estimates; (iii) the use of additive increase multiplicative decrease (AIMD) algorithms (famous for being the resource management in the transport control protocol) for the control of the number of units servicing workloads. The deployment of Dithen over Amazon EC2 spot instances is shown to be capable of processing more than 80,000 video transcoding, face detection and image processing tasks (equivalent to the processing of more than 116 GB of compressed data) for less than $1 in billing cost from EC2. Moreover, the proposed AIMD-based control mechanism, in conjunction with the Kalman estimates, is shown to provide for more than 27% reduction in EC2 spot instance cost against methods based on reactive resource estimation. Finally, Dithen is shown to offer a 38% to 500% reduction of the billing cost against the current state-of-the-art in CaaS platforms on Amazon EC2 (Amazon Lambda and Amazon Autoscale). A baseline version of Dithen is currently available at http://www.dithen.com under the "AutoScale" option.
[ { "version": "v1", "created": "Sat, 1 Oct 2016 12:33:35 GMT" } ]
2016-11-17T00:00:00
[ [ "Doyle", "Joseph", "" ], [ "Giotsas", "Vasileios", "" ], [ "Anam", "Mohammad Ashraful", "" ], [ "Andreopoulos", "Yiannis", "" ] ]
new_dataset
0.998416
1611.04989
Raj Nath Patel
Raj Nath Patel, Prakash B. Pimpale, M Sasikumar
Recurrent Neural Network based Part-of-Speech Tagger for Code-Mixed Social Media Text
7 pages, Published at the Tool Contest on POS tagging for Indian Social Media Text, ICON 2016
In Proceedings of the Tool Contest on POS tagging for Indian Social Media Text, ICON 2016
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes Centre for Development of Advanced Computing's (CDACM) submission to the shared task-'Tool Contest on POS tagging for Code-Mixed Indian Social Media (Facebook, Twitter, and Whatsapp) Text', collocated with ICON-2016. The shared task was to predict Part of Speech (POS) tag at word level for a given text. The code-mixed text is generated mostly on social media by multilingual users. The presence of the multilingual words, transliterations, and spelling variations make such content linguistically complex. In this paper, we propose an approach to POS tag code-mixed social media text using Recurrent Neural Network Language Model (RNN-LM) architecture. We submitted the results for Hindi-English (hi-en), Bengali-English (bn-en), and Telugu-English (te-en) code-mixed data.
[ { "version": "v1", "created": "Tue, 15 Nov 2016 19:02:35 GMT" }, { "version": "v2", "created": "Wed, 16 Nov 2016 04:28:06 GMT" } ]
2016-11-17T00:00:00
[ [ "Patel", "Raj Nath", "" ], [ "Pimpale", "Prakash B.", "" ], [ "Sasikumar", "M", "" ] ]
new_dataset
0.958025
1611.05105
Matteo Cimini
Matteo Cimini, Dale Miller, and Jeremy G. Siek
Well-Typed Languages are Sound
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Type soundness is an important property of modern programming languages. In this paper we explore the idea that "well-typed languages are sound": the idea that the appropriate typing discipline over language specifications guarantees that the language is type sound. We instantiate this idea for a certain class of languages defined using small step operational semantics by ensuring the progress and preservation theorems. Our first contribution is a syntactic discipline for organizing and restricting language specifications so that they automatically satisfy the progress theorem. This discipline is not novel but makes explicit the way expert language designers have been organizing a certain class of languages for long time. We give a formal account of this discipline by representing language specifications as (higher-order) logic programs and by giving a meta type system over that collection of formulas. Our second contribution is a methodology and meta type system for guaranteeing that languages satisfy the preservation theorem. Ultimately, we proved that language specifications that conform to our meta type systems are guaranteed to be type sound. We have implemented these ideas in the TypeSoundnessCertifier, a tool that takes language specifications in the form of logic programs and type checks them according to our meta type systems. For those languages that pass our type checker, our tool automatically produces a proof of type soundness that can be machine-checked by the Abella proof assistant. For those languages that fail our type checker, the tool pinpoints the design mistakes that hinder type soundness. We have applied the TypeSoundnessCertifier to a large number of programming languages, including those with recursive types, polymorphism, letrec, exceptions, lists and other common types and operators.
[ { "version": "v1", "created": "Wed, 16 Nov 2016 00:56:59 GMT" } ]
2016-11-17T00:00:00
[ [ "Cimini", "Matteo", "" ], [ "Miller", "Dale", "" ], [ "Siek", "Jeremy G.", "" ] ]
new_dataset
0.969273
1611.05205
Pierre Leone
Pierre Leone and Steve Alpern
Search-and-Rescue Rendezvous
null
null
null
null
cs.GT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a new type of asymmetric rendezvous search problem in which Agent II needs to give Agent I a `gift' which can be in the form of information or material. The gift can either be transfered upon meeting, as in traditional rendezvous, or it can be dropped o? by II at a location he passes, in the hope it will be found by I. The gift might be a water bottle for a traveller lost in the desert; a supply cache for Lieutenant Scott in the Antarctic; or important information (left as a gift). The common aim of the two agents is to minimize the time taken for I to either meet II or find the gift. We find optimal agent paths and droppo? times when the search region is a line, the initial distance between the players is known and one or both of the players can leave gifts. When there are no gifts this is the classical asymmetric rendezvous problem solved by Alpern and Gal in 1995 [10]. We exhibit strategies solving these various problems and use a `rendezvous algorithm' to establish their optimality.
[ { "version": "v1", "created": "Wed, 16 Nov 2016 10:13:18 GMT" } ]
2016-11-17T00:00:00
[ [ "Leone", "Pierre", "" ], [ "Alpern", "Steve", "" ] ]
new_dataset
0.997673
cs/0010010
P. J. Costa Branco
J.F. Martins, P. J. Costa Branco, A.J. Pires, J.A. Dente
Fault Detection using Immune-Based Systems and Formal Language Algorithms
To appear as an Invited paper in IEEE Conference on Decision and Control (CDC2000), 6 pages
null
10.1109/CDC.2000.914202
null
cs.CE cs.LG
null
This paper describes two approaches for fault detection: an immune-based mechanism and a formal language algorithm. The first one is based on the feature of immune systems in distinguish any foreign cell from the body own cell. The formal language approach assumes the system as a linguistic source capable of generating a certain language, characterised by a grammar. Each algorithm has particular characteristics, which are analysed in the paper, namely in what cases they can be used with advantage. To test their practicality, both approaches were applied on the problem of fault detection in an induction motor.
[ { "version": "v1", "created": "Tue, 3 Oct 2000 17:54:38 GMT" } ]
2016-11-17T00:00:00
[ [ "Martins", "J. F.", "" ], [ "Branco", "P. J. Costa", "" ], [ "Pires", "A. J.", "" ], [ "Dente", "J. A.", "" ] ]
new_dataset
0.979632
cs/0410012
Ioan Raicu
Catalin Dumitrescu, Ioan Raicu, Matei Ripeanu, Ian Foster
DiPerF: an automated DIstributed PERformance testing Framework
8 pages, 8 figures, will appear in IEEE/ACM Grid2004, November 2004
null
10.1109/GRID.2004.21
null
cs.PF cs.DC
null
We present DiPerF, a distributed performance testing framework, aimed at simplifying and automating service performance evaluation. DiPerF coordinates a pool of machines that test a target service, collects and aggregates performance metrics, and generates performance statistics. The aggregate data collected provide information on service throughput, on service "fairness" when serving multiple clients concurrently, and on the impact of network latency on service performance. Furthermore, using this data, it is possible to build predictive models that estimate a service performance given the service load. We have tested DiPerF on 100+ machines on two testbeds, Grid3 and PlanetLab, and explored the performance of job submission services (pre WS GRAM and WS GRAM) included with Globus Toolkit 3.2.
[ { "version": "v1", "created": "Tue, 5 Oct 2004 22:38:14 GMT" } ]
2016-11-17T00:00:00
[ [ "Dumitrescu", "Catalin", "" ], [ "Raicu", "Ioan", "" ], [ "Ripeanu", "Matei", "" ], [ "Foster", "Ian", "" ] ]
new_dataset
0.954466
cs/0412118
Chiranjeeb Buragohain
Chiranjeeb Buragohain, Divyakant Agrawal, Subhash Suri
Power Aware Routing for Sensor Databases
null
Proceedings of IEEE INFOCOM 2005, March 13-17, 2005 Miami
10.1109/INFCOM.2005.1498455
null
cs.NI cs.DC
null
Wireless sensor networks offer the potential to span and monitor large geographical areas inexpensively. Sensor network databases like TinyDB are the dominant architectures to extract and manage data in such networks. Since sensors have significant power constraints (battery life), and high communication costs, design of energy efficient communication algorithms is of great importance. The data flow in a sensor database is very different from data flow in an ordinary network and poses novel challenges in designing efficient routing algorithms. In this work we explore the problem of energy efficient routing for various different types of database queries and show that in general, this problem is NP-complete. We give a constant factor approximation algorithm for one class of query, and for other queries give heuristic algorithms. We evaluate the efficiency of the proposed algorithms by simulation and demonstrate their near optimal performance for various network sizes.
[ { "version": "v1", "created": "Thu, 30 Dec 2004 02:02:35 GMT" } ]
2016-11-17T00:00:00
[ [ "Buragohain", "Chiranjeeb", "" ], [ "Agrawal", "Divyakant", "" ], [ "Suri", "Subhash", "" ] ]
new_dataset
0.994809
cs/0501057
Kenjiro Yanagi
Jun Ichi Fujii, Ritsuo Nakamoto, Kenjiro Yanagi
Concavity of the auxiliary function appearing in quantum reliability function an classical-quantum channels
submitted in IEEE Trans. IT
null
10.1109/ISIT.2005.1523466
null
cs.IT math.IT
null
Concavity of the auxiliary function which appears in the random coding exponent as the lower bound of the quantum reliability function for general quantum states is proven for s between 0 and 1.
[ { "version": "v1", "created": "Sat, 22 Jan 2005 01:22:10 GMT" } ]
2016-11-17T00:00:00
[ [ "Fujii", "Jun Ichi", "" ], [ "Nakamoto", "Ritsuo", "" ], [ "Yanagi", "Kenjiro", "" ] ]
new_dataset
0.992586
cs/0501085
Oliver Henkel
Oliver Henkel
Space Frequency Codes from Spherical Codes
5 pages. Final version for the 2005 IEEE International Symposium on Information Theory
null
10.1109/ISIT.2005.1523553
null
cs.IT math.IT
null
A new design method for high rate, fully diverse ('spherical') space frequency codes for MIMO-OFDM systems is proposed, which works for arbitrary numbers of antennas and subcarriers. The construction exploits a differential geometric connection between spherical codes and space time codes. The former are well studied e.g. in the context of optimal sequence design in CDMA systems, while the latter serve as basic building blocks for space frequency codes. In addition a decoding algorithm with moderate complexity is presented. This is achieved by a lattice based construction of spherical codes, which permits lattice decoding algorithms and thus offers a substantial reduction of complexity.
[ { "version": "v1", "created": "Fri, 28 Jan 2005 21:37:37 GMT" }, { "version": "v2", "created": "Wed, 3 Aug 2005 13:24:07 GMT" } ]
2016-11-17T00:00:00
[ [ "Henkel", "Oliver", "" ] ]
new_dataset
0.999471
cs/0502091
Ricardo Corin
J.G. Cederquist, R. Corin, M.A.C. Dekker, S. Etalle and J.I. den Hartog
An Audit Logic for Accountability
To appear in Proceedings of IEEE Policy 2005
null
10.1109/POLICY.2005.5
null
cs.CR cs.LO
null
We describe and implement a policy language. In our system, agents can distribute data along with usage policies in a decentralized architecture. Our language supports the specification of conditions and obligations, and also the possibility to refine policies. In our framework, the compliance with usage policies is not actively enforced. However, agents are accountable for their actions, and may be audited by an authority requiring justifications.
[ { "version": "v1", "created": "Thu, 24 Feb 2005 15:16:03 GMT" }, { "version": "v2", "created": "Wed, 6 Apr 2005 21:08:53 GMT" }, { "version": "v3", "created": "Thu, 28 Apr 2005 20:08:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Cederquist", "J. G.", "" ], [ "Corin", "R.", "" ], [ "Dekker", "M. A. C.", "" ], [ "Etalle", "S.", "" ], [ "Hartog", "J. I. den", "" ] ]
new_dataset
0.952303
cs/0506012
Farhad Meshkati
Farhad Meshkati, H. Vincent Poor, Stuart C. Schwartz
A Non-Cooperative Power Control Game in Delay-Constrained Multiple-Access Networks
To apprear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523426
null
cs.IT math.IT
null
A game-theoretic approach for studying power control in multiple-access networks with transmission delay constraints is proposed. A non-cooperative power control game is considered in which each user seeks to choose a transmit power that maximizes its own utility while satisfying the user's delay requirements. The utility function measures the number of reliable bits transmitted per joule of energy and the user's delay constraint is modeled as an upper bound on the delay outage probability. The Nash equilibrium for the proposed game is derived, and its existence and uniqueness are proved. Using a large-system analysis, explicit expressions for the utilities achieved at equilibrium are obtained for the matched filter, decorrelating and minimum mean square error multiuser detectors. The effects of delay constraints on the users' utilities (in bits/Joule) and network capacity (i.e., the maximum number of users that can be supported) are quantified.
[ { "version": "v1", "created": "Sun, 5 Jun 2005 17:47:23 GMT" } ]
2016-11-17T00:00:00
[ [ "Meshkati", "Farhad", "" ], [ "Poor", "H. Vincent", "" ], [ "Schwartz", "Stuart C.", "" ] ]
new_dataset
0.974363
cs/0506042
Deepak Sridhara
Deepak Sridhara, Christine Kelley, and Joachim Rosenthal
Tree-Based Construction of LDPC Codes
5 pages, 12 figures. To appear in the Proceedings of IEEE International Symposium on Information Theory, Sept. 4-9, 2005, Adelaide, Australia
null
10.1109/ISIT.2005.1523456
null
cs.IT math.IT
null
We present a construction of LDPC codes that have minimum pseudocodeword weight equal to the minimum distance, and perform well with iterative decoding. The construction involves enumerating a d-regular tree for a fixed number of layers and employing a connection algorithm based on mutually orthogonal Latin squares to close the tree. Methods are presented for degrees d=p^s and d = p^s+1, for p a prime, -- one of which includes the well-known finite-geometry-based LDPC codes.
[ { "version": "v1", "created": "Sun, 12 Jun 2005 09:00:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Sridhara", "Deepak", "" ], [ "Kelley", "Christine", "" ], [ "Rosenthal", "Joachim", "" ] ]
new_dataset
0.99797
cs/0506093
Oscar Takeshita
Oscar Y. Takeshita
On Maximum Contention-Free Interleavers and Permutation Polynomials over Integer Rings
13 pages, 2 figures, submitted as a correspondence to the IEEE Transactions on Information Theory, revised version
null
10.1109/TIT.2005.864450
null
cs.IT math.IT
null
An interleaver is a critical component for the channel coding performance of turbo codes. Algebraic constructions are of particular interest because they admit analytical designs and simple, practical hardware implementation. Contention-free interleavers have been recently shown to be suitable for parallel decoding of turbo codes. In this correspondence, it is shown that permutation polynomials generate maximum contention-free interleavers, i.e., every factor of the interleaver length becomes a possible degree of parallel processing of the decoder. Further, it is shown by computer simulations that turbo codes using these interleavers perform very well for the 3rd Generation Partnership Project (3GPP) standard.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 20:30:06 GMT" }, { "version": "v2", "created": "Wed, 2 Nov 2005 00:06:31 GMT" } ]
2016-11-17T00:00:00
[ [ "Takeshita", "Oscar Y.", "" ] ]
new_dataset
0.994448
cs/0508011
Kazuto Ogawa
Kazuto Ogawa, Goichiro Hanaoka and Hideki Imai
A Secure Traitor Tracing Scheme against Key Exposure
5 pages, IEEE International Symposium on Information Theory 2005 (ISIT 2005)
null
10.1109/ISIT.2005.1523670
null
cs.CR
null
Copyright protection is a major issue in distributing digital content. On the other hand, improvements to usability are sought by content users. In this paper, we propose a secure {\it traitor tracing scheme against key exposure (TTaKE)} which contains the properties of both a traitor tracing scheme and a forward secure public key cryptosystem. Its structure fits current digital broadcasting systems and it may be useful in preventing traitors from making illegal decoders and in minimizing the damage from accidental key exposure. It can improve usability through these properties.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 07:36:51 GMT" } ]
2016-11-17T00:00:00
[ [ "Ogawa", "Kazuto", "" ], [ "Hanaoka", "Goichiro", "" ], [ "Imai", "Hideki", "" ] ]
new_dataset
0.989618
cs/0508019
Pascal Vontobel
Pascal O. Vontobel, Roxana Smarandache, Negar Kiyavash, Jason Teutsch, Dejan Vukobratovic
On the Minimal Pseudo-Codewords of Codes from Finite Geometries
To appear in Proc. 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523484
null
cs.IT cs.DM math.IT
null
In order to understand the performance of a code under maximum-likelihood (ML) decoding, it is crucial to know the minimal codewords. In the context of linear programming (LP) decoding, it turns out to be necessary to know the minimal pseudo-codewords. This paper studies the minimal codewords and minimal pseudo-codewords of some families of codes derived from projective and Euclidean planes. Although our numerical results are only for codes of very modest length, they suggest that these code families exhibit an interesting property. Namely, all minimal pseudo-codewords that are not multiples of a minimal codeword have an AWGNC pseudo-weight that is strictly larger than the minimum Hamming weight of the code. This observation has positive consequences not only for LP decoding but also for iterative decoding.
[ { "version": "v1", "created": "Tue, 2 Aug 2005 16:34:05 GMT" } ]
2016-11-17T00:00:00
[ [ "Vontobel", "Pascal O.", "" ], [ "Smarandache", "Roxana", "" ], [ "Kiyavash", "Negar", "" ], [ "Teutsch", "Jason", "" ], [ "Vukobratovic", "Dejan", "" ] ]
new_dataset
0.999296
cs/0508057
Miguel Rodrigues PhD
M. R. D. Rodrigues, I. Chatzigeorgiou, I. J. Wassell and R. Carrasco
On the Performance of Turbo Codes in Quasi-Static Fading Channels
To appear in the Proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005
null
10.1109/ISIT.2005.1523410
null
cs.IT math.IT
null
In this paper, we investigate in detail the performance of turbo codes in quasi-static fading channels both with and without antenna diversity. First, we develop a simple and accurate analytic technique to evaluate the performance of turbo codes in quasi-static fading channels. The proposed analytic technique relates the frame error rate of a turbo code to the iterative decoder convergence threshold, rather than to the turbo code distance spectrum. Subsequently, we compare the performance of various turbo codes in quasi-static fading channels. We show that, in contrast to the situation in the AWGN channel, turbo codes with different interleaver sizes or turbo codes based on RSC codes with different constraint lengths and generator polynomials exhibit identical performance. Moreover, we also compare the performance of turbo codes and convolutional codes in quasi-static fading channels under the condition of identical decoding complexity. In particular, we show that turbo codes do not outperform convolutional codes in quasi-static fading channels with no antenna diversity; and that turbo codes only outperform convolutional codes in quasi-static fading channels with antenna diversity.
[ { "version": "v1", "created": "Thu, 11 Aug 2005 10:14:52 GMT" } ]
2016-11-17T00:00:00
[ [ "Rodrigues", "M. R. D.", "" ], [ "Chatzigeorgiou", "I.", "" ], [ "Wassell", "I. J.", "" ], [ "Carrasco", "R.", "" ] ]
new_dataset
0.995328
cs/0605118
Deepak Sridhara
Christine A. Kelley, Deepak Sridhara, and Joachim Rosenthal
Pseudocodeword weights for non-binary LDPC codes
5 pages, 3 figures. To appear in Proceedings of the 2006 IEEE International Symposium on Information Theory, July 9-14, 2006, Seattle, USA
null
10.1109/ISIT.2006.262072
null
cs.IT math.IT
null
Pseudocodewords of q-ary LDPC codes are examined and the weight of a pseudocodeword on the q-ary symmetric channel is defined. The weight definition of a pseudocodeword on the AWGN channel is also extended to two-dimensional q-ary modulation such as q-PAM and q-PSK. The tree-based lower bounds on the minimum pseudocodeword weight are shown to also hold for q-ary LDPC codes on these channels.
[ { "version": "v1", "created": "Wed, 24 May 2006 22:03:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Kelley", "Christine A.", "" ], [ "Sridhara", "Deepak", "" ], [ "Rosenthal", "Joachim", "" ] ]
new_dataset
0.981485
cs/0608021
Eyal Lubetzky
Noga Alon, Eyal Lubetzky
The Shannon capacity of a graph and the independence numbers of its powers
null
IEEE Trans. on Information Theory 52 (2006), 2172-2176
10.1109/TIT.2006.872856
null
cs.IT cs.DM math.IT
null
The independence numbers of powers of graphs have been long studied, under several definitions of graph products, and in particular, under the strong graph product. We show that the series of independence numbers in strong powers of a fixed graph can exhibit a complex structure, implying that the Shannon Capacity of a graph cannot be approximated (up to a sub-polynomial factor of the number of vertices) by any arbitrarily large, yet fixed, prefix of the series. This is true even if this prefix shows a significant increase of the independence number at a given power, after which it stabilizes for a while.
[ { "version": "v1", "created": "Thu, 3 Aug 2006 14:46:36 GMT" } ]
2016-11-17T00:00:00
[ [ "Alon", "Noga", "" ], [ "Lubetzky", "Eyal", "" ] ]
new_dataset
0.99649
cs/0609018
Peyman Razaghi
Peyman Razaghi, Wei Yu
Bilayer Low-Density Parity-Check Codes for Decode-and-Forward in Relay Channels
Submitted to IEEE Trans. Info. Theory
null
10.1109/TIT.2007.904983
null
cs.IT math.IT
null
This paper describes an efficient implementation of binning for the relay channel using low-density parity-check (LDPC) codes. We devise bilayer LDPC codes to approach the theoretically promised rate of the decode-and-forward relaying strategy by incorporating relay-generated information bits in specially designed bilayer graphical code structures. While conventional LDPC codes are sensitively tuned to operate efficiently at a certain channel parameter, the proposed bilayer LDPC codes are capable of working at two different channel parameters and two different rates: that at the relay and at the destination. To analyze the performance of bilayer LDPC codes, bilayer density evolution is devised as an extension of the standard density evolution algorithm. Based on bilayer density evolution, a design methodology is developed for the bilayer codes in which the degree distribution is iteratively improved using linear programming. Further, in order to approach the theoretical decode-and-forward rate for a wide range of channel parameters, this paper proposes two different forms bilayer codes, the bilayer-expurgated and bilayer-lengthened codes. It is demonstrated that a properly designed bilayer LDPC code can achieve an asymptotic infinite-length threshold within 0.24 dB gap to the Shannon limits of two different channels simultaneously for a wide range of channel parameters. By practical code construction, finite-length bilayer codes are shown to be able to approach within a 0.6 dB gap to the theoretical decode-and-forward rate of the relay channel at a block length of $10^5$ and a bit-error probability (BER) of $10^{-4}$. Finally, it is demonstrated that a generalized version of the proposed bilayer code construction is applicable to relay networks with multiple relays.
[ { "version": "v1", "created": "Tue, 5 Sep 2006 19:34:55 GMT" } ]
2016-11-17T00:00:00
[ [ "Razaghi", "Peyman", "" ], [ "Yu", "Wei", "" ] ]
new_dataset
0.998449
cs/0609023
Himanshu Thapliyal
Himanshu Thapliyal, M. B. Srinivas
Novel Reversible TSG Gate and Its Application for Designing Components of Primitive Reversible/Quantum ALU
5 Pages; Published in Proceedings of the Fifth IEEE International Conference on Information, Communications and Signal Processing (ICICS 2005), Bangkok, Thailand, 6-9 December 2005,pp.1425-1429
null
10.1109/ICICS.2005.1689293
null
cs.AR
null
In recent years, reversible logic has emerged as a promising computing paradigm having application in low power CMOS, quantum computing, nanotechnology, and optical computing. The classical set of gates such as AND, OR, and EXOR are not reversible. This paper utilizes a new 4 * 4 reversible gate called TSG gate to build the components of a primitive reversible/quantum ALU. The most significant aspect of the TSG gate is that it can work singly as a reversible full adder, that is reversible full adder can now be implemented with a single gate only. A Novel reversible 4:2 compressor is also designed from the TSG gate which is later used to design a novel 8x8 reversible Wallace tree multiplier. It is proved that the adder, 4:2 compressor and multiplier architectures designed using the TSG gate are better than their counterparts available in literature, in terms of number of reversible gates and garbage outputs. This is perhaps, the first attempt to design a reversible 4:2 compressor and a reversible Wallace tree multiplier as far as existing literature and our knowledge is concerned. Thus, this paper provides an initial threshold to build more complex systems which can execute complicated operations using reversible logic.
[ { "version": "v1", "created": "Wed, 6 Sep 2006 16:09:04 GMT" } ]
2016-11-17T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Srinivas", "M. B.", "" ] ]
new_dataset
0.960462
cs/0610025
M Anand
M. Anand, P. Vijay Kumar
Low Correlation Sequences over the QAM Constellation
21 pages, 3 figures. To appear in IEEE Transactions on Information Theory in February 2008
null
10.1109/TIT.2007.913512
null
cs.IT math.IT
null
This paper presents the first concerted look at low correlation sequence families over QAM constellations of size M^2=4^m and their potential applicability as spreading sequences in a CDMA setting. Five constructions are presented, and it is shown how such sequence families have the ability to transport a larger amount of data as well as enable variable-rate signalling on the reverse link. Canonical family CQ has period N, normalized maximum-correlation parameter theta_max bounded above by A sqrt(N), where 'A' ranges from 1.8 in the 16-QAM case to 3.0 for large M. In a CDMA setting, each user is enabled to transfer 2m bits of data per period of the spreading sequence which can be increased to 3m bits of data by halving the size of the sequence family. The technique used to construct CQ is easily extended to produce larger sequence families and an example is provided. Selected family SQ has a lower value of theta_max but permits only (m+1)-bit data modulation. The interleaved 16-QAM sequence family IQ has theta_max <= sqrt(2) sqrt(N) and supports 3-bit data modulation. The remaining two families are over a quadrature-PAM (Q-PAM) subset of size 2M of the M^2-QAM constellation. Family P has a lower value of theta_max in comparison with Family SQ, while still permitting (m+1)-bit data modulation. Interleaved family IP, over the 8-ary Q-PAM constellation, permits 3-bit data modulation and interestingly, achieves the Welch lower bound on theta_max.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 14:27:46 GMT" }, { "version": "v2", "created": "Fri, 13 Jul 2007 11:58:25 GMT" }, { "version": "v3", "created": "Wed, 28 Nov 2007 17:53:06 GMT" } ]
2016-11-17T00:00:00
[ [ "Anand", "M.", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.976369
cs/0610090
Himanshu Thapliyal
Himanshu Thapliyal, Hamid R. Arabnia and A.P Vinod
Combined Integer and Floating Point Multiplication Architecture(CIFM) for FPGAs and Its Reversible Logic Implementation
Published in the proceedings of the The 49th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS 2006), Puerto Rico, August 2006. Nominated for the Student Paper Award(12 papers are nominated for Student paper Award among all submissions)
null
10.1109/MWSCAS.2006.382306
null
cs.AR
null
In this paper, the authors propose the idea of a combined integer and floating point multiplier(CIFM) for FPGAs. The authors propose the replacement of existing 18x18 dedicated multipliers in FPGAs with dedicated 24x24 multipliers designed with small 4x4 bit multipliers. It is also proposed that for every dedicated 24x24 bit multiplier block designed with 4x4 bit multipliers, four redundant 4x4 multiplier should be provided to enforce the feature of self repairability (to recover from the faults). In the proposed CIFM reconfigurability at run time is also provided resulting in low power. The major source of motivation for providing the dedicated 24x24 bit multiplier stems from the fact that single precision floating point multiplier requires 24x24 bit integer multiplier for mantissa multiplication. A reconfigurable, self-repairable 24x24 bit multiplier (implemented with 4x4 bit multiply modules) will ideally suit this purpose, making FPGAs more suitable for integer as well floating point operations. A dedicated 4x4 bit multiplier is also proposed in this paper. Moreover, in the recent years, reversible logic has emerged as a promising technology having its applications in low power CMOS, quantum computing, nanotechnology, and optical computing. It is not possible to realize quantum computing without reversible logic. Thus, this paper also paper provides the reversible logic implementation of the proposed CIFM. The reversible CIFM designed and proposed here will form the basis of the completely reversible FPGAs.
[ { "version": "v1", "created": "Sat, 14 Oct 2006 10:39:42 GMT" } ]
2016-11-17T00:00:00
[ [ "Thapliyal", "Himanshu", "" ], [ "Arabnia", "Hamid R.", "" ], [ "Vinod", "A. P", "" ] ]
new_dataset
0.993046
cs/0611118
Florentin Smarandache
Haibin Wang, Andre Rogatko, Florentin Smarandache, Rajshekhar Sunderraman
A Neutrosophic Description Logic
18 pages. Presented at the IEEE International Conference on Granular Computing, Georgia State University, Atlanta, USA, May 2006
Proceedings of 2006 IEEE International Conference on Granular Computing, edited by Yan-Qing Zhang and Tsau Young Lin, Georgia State University, Atlanta, pp. 305-308, 2006
10.1142/S1793005708001100
null
cs.AI
null
Description Logics (DLs) are appropriate, widely used, logics for managing structured knowledge. They allow reasoning about individuals and concepts, i.e. set of individuals with common properties. Typically, DLs are limited to dealing with crisp, well defined concepts. That is, concepts for which the problem whether an individual is an instance of it is yes/no question. More often than not, the concepts encountered in the real world do not have a precisely defined criteria of membership: we may say that an individual is an instance of a concept only to a certain degree, depending on the individual's properties. The DLs that deal with such fuzzy concepts are called fuzzy DLs. In order to deal with fuzzy, incomplete, indeterminate and inconsistent concepts, we need to extend the fuzzy DLs, combining the neutrosophic logic with a classical DL. In particular, concepts become neutrosophic (here neutrosophic means fuzzy, incomplete, indeterminate, and inconsistent), thus reasoning about neutrosophic concepts is supported. We'll define its syntax, its semantics, and describe its properties.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 20:04:21 GMT" }, { "version": "v2", "created": "Fri, 14 Mar 2008 00:49:49 GMT" } ]
2016-11-17T00:00:00
[ [ "Wang", "Haibin", "" ], [ "Rogatko", "Andre", "" ], [ "Smarandache", "Florentin", "" ], [ "Sunderraman", "Rajshekhar", "" ] ]
new_dataset
0.996797