id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1509.00436
Sijia Deng
Theodore S. Rappaport, Sijia Deng
73 GHz Wideband Millimeter-Wave Foliage and Ground Reflection Measurements and Models
6 pages, 4 figures, 2015 IEEE International Conference on Communications (ICC), ICC Workshops
null
10.1109/ICCW.2015.7247347
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents 73 GHz wideband outdoor foliage and ground reflection measurements. Propagation measurements were made with a 400 Megachip-per-second sliding correlator channel sounder, with rotatable 27 dBi (7 degrees half- power beamwidth) horn antennas at both the transmitter and receiver, to study foliage-induced scattering and de-polarization effects, to assist in developing future wireless systems that will use adaptive array antennas. Signal attenuation through foliage was measured to be 0.4 dB/m for both co- and cross-polarized antenna configurations. Measured ground reflection coefficients for dirt and gravel ranged from 0.02 to 0.34, for incident angles ranging from 60 degrees to 81 degrees (with respect to the normal incidence of the surface). These data are useful for link budget design and site-specific (ray-tracing) models for future millimeter-wave communication systems.
[ { "version": "v1", "created": "Tue, 1 Sep 2015 18:47:19 GMT" } ]
2016-11-15T00:00:00
[ [ "Rappaport", "Theodore S.", "" ], [ "Deng", "Sijia", "" ] ]
new_dataset
0.999206
1509.00940
Xiao Lu
Xiao Lu, Ping Wang, Dusit Niyato, Dong In Kim, and Zhu Han
Wireless Charging Technologies: Fundamentals, Standards, and Network Applications
to appear in IEEE Communications Surveys and Tutorial
null
10.1109/COMST.2015.2499783
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless charging is a technology of transmitting power through an air gap to electrical devices for the purpose of energy replenishment. The recent progress in wireless charging techniques and development of commercial products have provided a promising alternative way to address the energy bottleneck of conventionally portable battery-powered devices. However, the incorporation of wireless charging into the existing wireless communication systems also brings along a series of challenging issues with regard to implementation, scheduling, and power management. In this article, we present a comprehensive overview of wireless charging techniques, the developments in technical standards, and their recent advances in network applications. In particular, with regard to network applications, we review the mobile charger dispatch strategies, static charger scheduling strategies and wireless charger deployment strategies. Additionally, we discuss open issues and challenges in implementing wireless charging technologies. Finally, we envision some practical future network applications of wireless charging.
[ { "version": "v1", "created": "Thu, 3 Sep 2015 04:08:24 GMT" }, { "version": "v2", "created": "Sat, 14 Nov 2015 01:02:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Lu", "Xiao", "" ], [ "Wang", "Ping", "" ], [ "Niyato", "Dusit", "" ], [ "Kim", "Dong In", "" ], [ "Han", "Zhu", "" ] ]
new_dataset
0.998053
1510.00359
Mohamed Salah
Mohamed Salah, Amr El-Keyi, Yahya Mohasseb and Mohammed Nafie
Achievable Degrees of Freedom on K-user MIMO Multi-way Relay Channel with Common and Private Messages
5 double-column pages, 2 figures, 1 table, the paper will be presented at the IEEE Asilomar Conference Nov. 2015
null
10.1109/ACSSC.2015.7421283
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the achievable total degrees of freedom (DoF) of the MIMO multi-way relay channel that consists of K users, where each user is equipped with M antennas, and a decode-and-forward relay equipped with N antennas. In this channel, each user wants to convey K-1 private messages to the other users in addition to a common message to all of them. Due to the absence of direct links between the users, communication occurs through the relay in two phases; a multiple access channel phase (MAC) and a broadcast (BC) phase. We drive cut-set bounds on the total DoF of the network, and show that the network has DoF less than or equal to K min(N,M). Achievability of the upper bound is shown by using signal space alignment for network coding in the MAC phase, and zero-forcing precoding in the BC phase. We show that introducing the common messages besides the private messages leads to achieving higher total DoF than using the private messages only.
[ { "version": "v1", "created": "Thu, 1 Oct 2015 18:25:11 GMT" }, { "version": "v2", "created": "Wed, 14 Oct 2015 12:29:54 GMT" }, { "version": "v3", "created": "Thu, 15 Oct 2015 19:26:54 GMT" } ]
2016-11-15T00:00:00
[ [ "Salah", "Mohamed", "" ], [ "El-Keyi", "Amr", "" ], [ "Mohasseb", "Yahya", "" ], [ "Nafie", "Mohammed", "" ] ]
new_dataset
0.971342
1510.01989
Malcolm Atkinson
Malcolm Atkinson, Michele Carpen\'e, Emanuele Casarotti, Steffen Claus, Rosa Filgueira, Anton Frank, Michelle Galea, Tom Garth, Andr\'e Gem\"und, Heiner Igel, Iraklis Klampanos, Amrey Krause, Lion Krischer, Siew Hoon Leong, Federica Magnoni, Jonas Matser, Alberto Michelini, Andreas Rietbrock, Horst Schwichtenberg, Alessandro Spinuso and Jean-Pierre Vilotte
VERCE delivers a productive e-Science environment for seismology research
14 pages, 3 figures. Pre-publication version of paper accepted and published at the IEEE eScience 2015 conference in Munich with substantial additions, particularly in the analysis of issues
null
10.1109/eScience.2015.38
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The VERCE project has pioneered an e-Infrastructure to support researchers using established simulation codes on high-performance computers in conjunction with multiple sources of observational data. This is accessed and organised via the VERCE science gateway that makes it convenient for seismologists to use these resources from any location via the Internet. Their data handling is made flexible and scalable by two Python libraries, ObsPy and dispel4py and by data services delivered by ORFEUS and EUDAT. Provenance driven tools enable rapid exploration of results and of the relationships between data, which accelerates understanding and method improvement. These powerful facilities are integrated and draw on many other e-Infrastructures. This paper presents the motivation for building such systems, it reviews how solid-Earth scientists can make significant research progress using them and explains the architecture and mechanisms that make their construction and operation achievable. We conclude with a summary of the achievements to date and identify the crucial steps needed to extend the capabilities for seismologists, for solid-Earth scientists and for similar disciplines.
[ { "version": "v1", "created": "Wed, 7 Oct 2015 15:37:48 GMT" } ]
2016-11-15T00:00:00
[ [ "Atkinson", "Malcolm", "" ], [ "Carpené", "Michele", "" ], [ "Casarotti", "Emanuele", "" ], [ "Claus", "Steffen", "" ], [ "Filgueira", "Rosa", "" ], [ "Frank", "Anton", "" ], [ "Galea", "Michelle", "" ], [ "Garth", "Tom", "" ], [ "Gemünd", "André", "" ], [ "Igel", "Heiner", "" ], [ "Klampanos", "Iraklis", "" ], [ "Krause", "Amrey", "" ], [ "Krischer", "Lion", "" ], [ "Leong", "Siew Hoon", "" ], [ "Magnoni", "Federica", "" ], [ "Matser", "Jonas", "" ], [ "Michelini", "Alberto", "" ], [ "Rietbrock", "Andreas", "" ], [ "Schwichtenberg", "Horst", "" ], [ "Spinuso", "Alessandro", "" ], [ "Vilotte", "Jean-Pierre", "" ] ]
new_dataset
0.993399
1510.02826
Adnan Aijaz
Adnan Aijaz, Mischa Dohler, A. Hamid Aghvami, Vasilis Friderikos, Magnus Frodigh
Realizing the Tactile Internet: Haptic Communications over Next Generation 5G Cellular Networks
IEEE Wireless Communications - Accepted for Publication
null
10.1109/MWC.2016.1500157RP
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Prior Internet designs encompassed the fixed, mobile and lately the things Internet. In a natural evolution to these, the notion of the Tactile Internet is emerging which allows one to transmit touch and actuation in real-time. With voice and data communications driving the designs of the current Internets, the Tactile Internet will enable haptic communications, which in turn will be a paradigm shift in how skills and labor are digitally delivered globally. Design efforts for both the Tactile Internet and the underlying haptic communications are in its infancy. The aim of this article is thus to review some of the most stringent design challenges, as well as proposing first avenues for specific solutions to enable the Tactile Internet revolution.
[ { "version": "v1", "created": "Fri, 9 Oct 2015 21:11:47 GMT" }, { "version": "v2", "created": "Wed, 30 Dec 2015 23:17:38 GMT" } ]
2016-11-15T00:00:00
[ [ "Aijaz", "Adnan", "" ], [ "Dohler", "Mischa", "" ], [ "Aghvami", "A. Hamid", "" ], [ "Friderikos", "Vasilis", "" ], [ "Frodigh", "Magnus", "" ] ]
new_dataset
0.990325
1510.05338
Kamal Rahimi Malekshan
Kamal Rahimi Malekshan, Weihua Zhuang and Yves Lostanlen
Coordination-based Medium Access Control with Space-reservation for Wireless Ad Hoc Networks
12 pages, 12 figures, IEEE Transactions on Wireless Communications
null
10.1109/TWC.2015.2493544
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Efficient radio spectrum utilization and low energy consumption in mobile devices are essential in developing next generation wireless networks. This paper presents a new medium access control (MAC) mechanism to enhance spectrum efficiency and reduce energy consumption in a wireless ad hoc network. A set of coordinator nodes, distributed in the network area, periodically schedule contention-free time slots for all data transmissions/receptions in the network, based on transmission requests from source nodes. Adjacent coordinators exchange scheduling information to effectively increase spatial spectrum reuse and avoid transmission collisions. Moreover, the proposed MAC scheme allows a node to put its radio interface into a sleep mode when it is not transmitting/receiving a packet, in order to reduce energy consumption. Simulation results demonstrate that the proposed scheme achieves substantially higher throughput and has significantly lower energy consumption in comparison with existing schemes.
[ { "version": "v1", "created": "Mon, 19 Oct 2015 02:46:35 GMT" } ]
2016-11-15T00:00:00
[ [ "Malekshan", "Kamal Rahimi", "" ], [ "Zhuang", "Weihua", "" ], [ "Lostanlen", "Yves", "" ] ]
new_dataset
0.997611
1510.07728
Mahyar Shirvanimoghaddam
Mahyar Shirvanimoghaddam, Sarah J. Johnson, Andrew M. Lance
Design of Raptor Codes in the Low SNR Regime with Applications in Quantum Key Distribution
The paper has been submitted to IEEE International Communications Conference (ICC), Kuala Lumpur, Malaysia, May 2016
null
10.1109/ICC.2016.7510800
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The focus of this work is on the design of Raptor codes for continuous variable Quantum key distribution (CV-QKD) systems. We design a highly efficient Raptor code for very low signal to noise ratios (SNRs), which enables CV-QKD systems to operate over long distances with a significantly higher secret key rate compared to conventional fixed rate codes. The degree distribution design of Raptor codes in the low SNR regime is formulated as a linear program, where a set of optimized degree distributions are also obtained through linear programming. Simulation results show that the designed code achieves efficiencies higher than 94\% for SNRs as low as -20 dB and -30 dB. We further propose a new error reconciliation protocol for CV-QKD systems by using Raptor codes and show that it can achieve higher secret key rates over long distances compared to existing protocols.
[ { "version": "v1", "created": "Tue, 27 Oct 2015 00:03:50 GMT" } ]
2016-11-15T00:00:00
[ [ "Shirvanimoghaddam", "Mahyar", "" ], [ "Johnson", "Sarah J.", "" ], [ "Lance", "Andrew M.", "" ] ]
new_dataset
0.99878
1511.07556
Ke Xiong
Xiaofei Di, Ke Xiong, Pingyi Fan, and Hongchuan Yang
Simultaneous Wireless Information and Power Transfer in Cooperative Relay Networks with Rateless Codes
31 pages,15 figures, submitted to IEEE Journal
null
10.1109/TVT.2016.2588441
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the simultaneous wireless information and power transfer (SWIPT) in cooperative relay networks, where a relay harvests energy from the radio frequency (RF) signals transmitted by a source and then uses the harvested energy to assist the information transmission from the source to its destination. Both source and relay transmissions use rateless code, which allows the destination to employ any of the two information receiving strategies, i.e., the mutual information accumulation (IA) and the energy accumulation (EA). The SWIPT-enabled relay employs three different SWIPT receiver architectures, the ideal receiver and two practical receivers (i.e., the power splitting (PS) and the time switch (TS) receivers). Accordingly, three relaying protocols, namely, ideal protocol, PS protocol and TS protocol, are presented. In order to explore the system performance limits with these three protocols, optimization problems are formulated to maximize their achievable information rates. For the ideal protocol, explicit expressions of the optimal solutions are derived. For the PS protocol, a linear-search algorithm is designed to solve the non-convex problems. For the TS protocol, two solving methods are presented. Numerical experiments are carried out to validate our analysis and algorithms, which also show that, with the same SWIPT receiver, the IA-based system outperforms the EA-based system, while with the same information receiving strategy, PS protocol outperforms TS protocol. Moreover, compared with conventional non-SWIPT and non-rateless-coded systems, the proposed protocols exhibit considerable performance gains, especially in relatively low signal-to-noise ratio (SNR) regime. Besides, the effects of the source-destination direct link and the relay position on system performance are also discussed, which provides insights on SWIPT-enabled relay systems.
[ { "version": "v1", "created": "Tue, 24 Nov 2015 03:45:42 GMT" } ]
2016-11-15T00:00:00
[ [ "Di", "Xiaofei", "" ], [ "Xiong", "Ke", "" ], [ "Fan", "Pingyi", "" ], [ "Yang", "Hongchuan", "" ] ]
new_dataset
0.993206
1601.01089
Silas Fong
Silas L. Fong and Vincent Y. F. Tan
On the Scaling Exponent of Polar Codes for Binary-Input Energy-Harvesting Channels
References updated, typos corrected, to appear in IEEE Journal on Selected Areas in Communications
null
10.1109/JSAC.2016.2611949
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the scaling exponent of polar codes for binary-input energy-harvesting (EH) channels with infinite-capacity batteries. The EH process is characterized by a sequence of i.i.d. random variables with finite variances. The scaling exponent $\mu$ of polar codes for a binary-input memoryless channel (BMC) characterizes the closest gap between the capacity and non-asymptotic rates achieved by polar codes with error probabilities no larger than some non-vanishing $\varepsilon\in(0,1)$. It has been shown that for any $\varepsilon\in(0,1)$, the scaling exponent $\mu$ for any binary-input memoryless symmetric channel (BMSC) with $I(q_{Y|X})\in(0,1)$ lies between 3.579 and 4.714 , where the upper bound $4.714$ was shown by an explicit construction of polar codes. Our main result shows that $4.714$ remains to be a valid upper bound on the scaling exponent for any binary-input EH channel, i.e., a BMC subject to additional EH constraints. Our result thus implies that the EH constraints do not worsen the rate of convergence to capacity if polar codes are employed. The main result is proved by leveraging the following three existing results: scaling exponent analyses for BMSCs, construction of polar codes designed for binary-input memoryless asymmetric channels, and the save-and-transmit strategy for EH channels.
[ { "version": "v1", "created": "Wed, 6 Jan 2016 06:27:01 GMT" }, { "version": "v2", "created": "Tue, 26 Apr 2016 03:47:09 GMT" }, { "version": "v3", "created": "Mon, 14 Nov 2016 05:17:21 GMT" } ]
2016-11-15T00:00:00
[ [ "Fong", "Silas L.", "" ], [ "Tan", "Vincent Y. F.", "" ] ]
new_dataset
0.956708
1601.03872
Blesson Varghese
Blesson Varghese, Lawan Thamsuhang Subba, Long Thai, Adam Barker
Container-Based Cloud Virtual Machine Benchmarking
Accepted to the IEEE International Conference on Cloud Engineering (IEEE IC2E), Berlin, Germany, 2016 - 10 pages
null
10.1109/IC2E.2016.28
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the availability of a wide range of cloud Virtual Machines (VMs) it is difficult to determine which VMs can maximise the performance of an application. Benchmarking is commonly used to this end for capturing the performance of VMs. Most cloud benchmarking techniques are typically heavyweight - time consuming processes which have to benchmark the entire VM in order to obtain accurate benchmark data. Such benchmarks cannot be used in real-time on the cloud and incur extra costs even before an application is deployed. In this paper, we present lightweight cloud benchmarking techniques that execute quickly and can be used in near real-time on the cloud. The exploration of lightweight benchmarking techniques are facilitated by the development of DocLite - Docker Container-based Lightweight Benchmarking. DocLite is built on the Docker container technology which allows a user-defined portion (such as memory size and the number of CPU cores) of the VM to be benchmarked. DocLite operates in two modes, in the first mode, containers are used to benchmark a small portion of the VM to generate performance ranks. In the second mode, historic benchmark data is used along with the first mode as a hybrid to generate VM ranks. The generated ranks are evaluated against three scientific high-performance computing applications. The proposed techniques are up to 91 times faster than a heavyweight technique which benchmarks the entire VM. It is observed that the first mode can generate ranks with over 90% and 86% accuracy for sequential and parallel execution of an application. The hybrid mode improves the correlation slightly but the first mode is sufficient for benchmarking cloud VMs.
[ { "version": "v1", "created": "Fri, 15 Jan 2016 10:57:02 GMT" } ]
2016-11-15T00:00:00
[ [ "Varghese", "Blesson", "" ], [ "Subba", "Lawan Thamsuhang", "" ], [ "Thai", "Long", "" ], [ "Barker", "Adam", "" ] ]
new_dataset
0.997925
1601.07533
Yinong Wang
Yinong Wang, Jianhua Yao, Joseph E. Burns, Ronald M. Summers
Osteoporotic and Neoplastic Compression Fracture Classification on Longitudinal CT
Contributed 4-Page Paper to be presented at the 2016 IEEE International Symposium on Biomedical Imaging (ISBI), April 13-16, 2016, Prague, Czech Republic
null
10.1109/ISBI.2016.7493477
null
cs.CV q-bio.TO
http://creativecommons.org/publicdomain/zero/1.0/
Classification of vertebral compression fractures (VCF) having osteoporotic or neoplastic origin is fundamental to the planning of treatment. We developed a fracture classification system by acquiring quantitative morphologic and bone density determinants of fracture progression through the use of automated measurements from longitudinal studies. A total of 250 CT studies were acquired for the task, each having previously identified VCFs with osteoporosis or neoplasm. Thirty-six features or each identified VCF were computed and classified using a committee of support vector machines. Ten-fold cross validation on 695 identified fractured vertebrae showed classification accuracies of 0.812, 0.665, and 0.820 for the measured, longitudinal, and combined feature sets respectively.
[ { "version": "v1", "created": "Wed, 27 Jan 2016 20:20:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Wang", "Yinong", "" ], [ "Yao", "Jianhua", "" ], [ "Burns", "Joseph E.", "" ], [ "Summers", "Ronald M.", "" ] ]
new_dataset
0.999777
1602.02864
Da Zheng
Da Zheng, Disa Mhembere, Vince Lyzinski, Joshua Vogelstein, Carey E. Priebe, and Randal Burns
Semi-External Memory Sparse Matrix Multiplication for Billion-Node Graphs
published in IEEE Transactions on Parallel and Distributed Systems
null
10.1109/TPDS.2016.2618791
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sparse matrix multiplication is traditionally performed in memory and scales to large matrices using the distributed memory of multiple nodes. In contrast, we scale sparse matrix multiplication beyond memory capacity by implementing sparse matrix dense matrix multiplication (SpMM) in a semi-external memory (SEM) fashion; i.e., we keep the sparse matrix on commodity SSDs and dense matrices in memory. Our SEM-SpMM incorporates many in-memory optimizations for large power-law graphs. It outperforms the in-memory implementations of Trilinos and Intel MKL and scales to billion-node graphs, far beyond the limitations of memory. Furthermore, on a single large parallel machine, our SEM-SpMM operates as fast as the distributed implementations of Trilinos using five times as much processing power. We also run our implementation in memory (IM-SpMM) to quantify the overhead of keeping data on SSDs. SEM-SpMM achieves almost 100% performance of IM-SpMM on graphs when the dense matrix has more than four columns; it achieves at least 65% performance of IM-SpMM on all inputs. We apply our SpMM to three important data analysis tasks--PageRank, eigensolving, and non-negative matrix factorization--and show that our SEM implementations significantly advance the state of the art.
[ { "version": "v1", "created": "Tue, 9 Feb 2016 05:30:30 GMT" }, { "version": "v2", "created": "Wed, 10 Feb 2016 01:14:13 GMT" }, { "version": "v3", "created": "Fri, 14 Oct 2016 14:46:57 GMT" } ]
2016-11-15T00:00:00
[ [ "Zheng", "Da", "" ], [ "Mhembere", "Disa", "" ], [ "Lyzinski", "Vince", "" ], [ "Vogelstein", "Joshua", "" ], [ "Priebe", "Carey E.", "" ], [ "Burns", "Randal", "" ] ]
new_dataset
0.976307
1605.00760
Ming Li Prof.
Xiaowen Tian, Ming Li, Guangyu Ti, and Wenfei Liu
Fast Detection of Orthogonal Space-Time Block Codes with Unknown Channel
Submitted to IEEE Wireless Communications Letters
null
10.1109/LCOMM.2016.2591548
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter investigates the problem of blind detection of orthogonal space-time block codes (OSTBC) over a quasi-static flat multiple-input multiple-output (MIMO) Rayleigh fading channel. We first introduce a core iterative least-squares (ILS) algorithm to blindly detect OSTBC signals without the knowledge of channel state information (SCI) at the receiver. This ILS algorithm has low computational complexity but may converge to local optimum which offers unreliable detection result. Then, in order to improve the detection performance, we propose an enhanced ILS (E-ILS) approach which is based on statistical analysis of repeated independent ILS procedures on received data. Extensive simulation studies prove the efficiency of the proposed E-ILS algorithm with blind detection performance approaching the optimal maximum-likelihood detector with known CSI.
[ { "version": "v1", "created": "Tue, 3 May 2016 06:50:10 GMT" } ]
2016-11-15T00:00:00
[ [ "Tian", "Xiaowen", "" ], [ "Li", "Ming", "" ], [ "Ti", "Guangyu", "" ], [ "Liu", "Wenfei", "" ] ]
new_dataset
0.9972
1605.03230
Reinhard Heckel
Reinhard Heckel
Super-Resolution MIMO Radar
To appear in Proc. of IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, July 2016. Slightly extended version
null
10.1109/ISIT.2016.7541532
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multiple input, multiple output (MIMO) radar emits probings signals with multiple transmit antennas and records the reflections from targets with multiple receive antennas. Estimating the relative angles, delays, and Doppler shifts from the received signals allows to determine the locations and velocities of the targets. Standard approaches to MIMO radar based on digital matched filtering or compressed sensing only resolve the angle-delay-Doppler triplets on a $(1/(N_T N_R), 1/B,1/T)$ grid, where $N_T$ and $N_R$ are the number of transmit and receive antennas, $B$ is the bandwidth of the probing signals, and $T$ is the length of the time interval over which the reflections are observed. In this work, we show that the \emph{continuous} angle-delay-Doppler triplets and the corresponding attenuation factors can be recovered perfectly by solving a convex optimization problem. This result holds provided that the angle-delay-Doppler triplets are separated either by $10/(N_T N_R-1)$ in angle, $10.01/B$ in delay, or $10.01/T$ in Doppler direction. Furthermore, this result is optimal (up to log factors) in the number of angle-delay-Doppler triplets that can be recovered.
[ { "version": "v1", "created": "Tue, 10 May 2016 22:23:52 GMT" } ]
2016-11-15T00:00:00
[ [ "Heckel", "Reinhard", "" ] ]
new_dataset
0.999792
1605.03709
Rui Wang
Rui Wang, Xi Peng, Jun Zhang, K. B. Letaief
Mobility-Aware Caching for Content-Centric Wireless Networks: Modeling and Methodology
16 pages, 5 figures, to appear in IEEE Communications Magazine
null
10.1109/MCOM.2016.7537180
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As mobile services are shifting from "connection-centric" communications to "content-centric" communications, content-centric wireless networking emerges as a promising paradigm to evolve the current network architecture. Caching popular content at the wireless edge, including base stations (BSs) and user terminals (UTs), provides an effective approach to alleviate the heavy burden on backhaul links, as well as lowering delays and deployment costs. In contrast to wired networks, a unique characteristic of content-centric wireless networks (CCWNs) is the mobility of mobile users. While it has rarely been considered by existing works in caching design, user mobility contains various helpful side information that can be exploited to improve caching efficiency at both BSs and UTs. In this paper, we present a general framework on mobility-aware caching in CCWNs. Key properties of user mobility patterns that are useful for content caching will be firstly identified, and then different design methodologies for mobility-aware caching will be proposed. Moreover, two design examples will be provided to illustrate the proposed framework in details, and interesting future research directions will be identified.
[ { "version": "v1", "created": "Thu, 12 May 2016 07:43:16 GMT" } ]
2016-11-15T00:00:00
[ [ "Wang", "Rui", "" ], [ "Peng", "Xi", "" ], [ "Zhang", "Jun", "" ], [ "Letaief", "K. B.", "" ] ]
new_dataset
0.979435
1607.03341
Tao Jiang
Tao Jiang, Chunxing Ni, Yuance Xu
Novel 16-QAM and 64-QAM Near-Complementary Sequences with Low PMEPR in OFDM Systems
27 pages, 2 figures, submitted to IEEE Transactions on Communications
null
10.1109/TCOMM.2016.2591949
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/4.0/
In this paper, we firstly propose a novel construction of $16$-quadrature amplitude modulation (QAM) near-complementary sequences with low peak-to-mean envelope power ratio (PMEPR) in orthogonal frequency division multiplexing (OFDM) systems. The proposed $16$-QAM near-complementary sequences can be constructed by utilizing novel nonlinear offsets, where the length of the sequences is $n=2^m$. The family size of the newly constructed $16$-QAM near-complementary sequences is $8\times (\frac{m!}{2})\times 4^{m+1}$, and the PMEPR of these sequences is proven to satisfy ${\textrm{PMEPR}}\leq 2.4$. Thus, the proposed construction can generate a number of $16$-QAM near-complementary sequences with low PMEPR, resulting in the improvement of the code rate in OFDM systems. Furthermore, we also propose a novel construction of $64$-QAM near-complementary sequences with low PMEPR, which is the first proven construction of $64$-QAM near-complementary sequences. The PMEPRs of two types of the proposed $64$-QAM near-complementary sequences are proven to satisfy that ${\textrm{PMEPR}}\leq 3.62$ or ${\textrm{PMEPR}}\leq 2.48$, respectively. The family size of the newly constructed $64$-QAM near-complementary sequences is $64\times (\frac{m!}{2})\times 4^{m+1}$.
[ { "version": "v1", "created": "Tue, 12 Jul 2016 13:06:15 GMT" } ]
2016-11-15T00:00:00
[ [ "Jiang", "Tao", "" ], [ "Ni", "Chunxing", "" ], [ "Xu", "Yuance", "" ] ]
new_dataset
0.989869
1610.09447
Bin Gu
Bin Gu, Zhouyuan Huo, Heng Huang
Asynchronous Stochastic Block Coordinate Descent with Variance Reduction
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Asynchronous parallel implementations for stochastic optimization have received huge successes in theory and practice recently. Asynchronous implementations with lock-free are more efficient than the one with writing or reading lock. In this paper, we focus on a composite objective function consisting of a smooth convex function $f$ and a block separable convex function, which widely exists in machine learning and computer vision. We propose an asynchronous stochastic block coordinate descent algorithm with the accelerated technology of variance reduction (AsySBCDVR), which are with lock-free in the implementation and analysis. AsySBCDVR is particularly important because it can scale well with the sample size and dimension simultaneously. We prove that AsySBCDVR achieves a linear convergence rate when the function $f$ is with the optimal strong convexity property, and a sublinear rate when $f$ is with the general convexity. More importantly, a near-linear speedup on a parallel system with shared memory can be obtained.
[ { "version": "v1", "created": "Sat, 29 Oct 2016 03:39:16 GMT" }, { "version": "v2", "created": "Mon, 7 Nov 2016 20:05:31 GMT" }, { "version": "v3", "created": "Mon, 14 Nov 2016 02:14:36 GMT" } ]
2016-11-15T00:00:00
[ [ "Gu", "Bin", "" ], [ "Huo", "Zhouyuan", "" ], [ "Huang", "Heng", "" ] ]
new_dataset
0.995167
1611.03970
Gabriel Nallathambi
Gabriel Nallathambi, Jose Principe
Signal Processing with Pulse Trains: An Algebraic Approach- Part II
null
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The integrate and fire converter (IFC) enables an alternative to digital signal processing. IFC converts analog signal voltages into time between pulses and it is possible to reconstruct the analog signal from the IFC pulses with an error as small as required. In this paper, we present the definition of multiplication in pulse trains created by the IFC based on time domain operations and prove that it constitutes an Abelian group in the space of IFC pulse trains. We also show that pulse domain multiplication corresponds to pointwise multiplication of analog signals. It is further proved that pulse domain multiplication is distributive over pulse domain addition and hence it forms a field in the space of IFC pulse trains, which is an important property for linear signal processing.
[ { "version": "v1", "created": "Sat, 12 Nov 2016 08:27:55 GMT" } ]
2016-11-15T00:00:00
[ [ "Nallathambi", "Gabriel", "" ], [ "Principe", "Jose", "" ] ]
new_dataset
0.970024
1611.04012
F. Richard Yu
Dajun Zhang, F. Richard Yu, Zhexiong Wei, Azzedine Boukerche
Trust-based Secure Routing in Software-defined Vehicular Ad Hoc Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the rising interest of expedient, safe, and high-efficient transportation, vehicular ad hoc networks (VANETs) have turned into a critical technology in smart transportation systems. Because of the high mobility of nodes, VANETs are vulnerable to security attacks. In this paper, we propose a novel framework of software-defined VANETs with trust management. Specifically, we separate the forwarding plane in VANETs from the control plane, which is responsible for the control functionality, such as routing protocols and trust management in VANETs. Using the on-demand distance vector routing (TAODV) protocol as an example, we present a routing protocol named software-defined trust based ad hoc on-demand distance vector routing (SD-TAODV). Simulation results are presented to show the effectiveness of the proposed software-defined VANETs with trust management.
[ { "version": "v1", "created": "Sat, 12 Nov 2016 16:14:32 GMT" } ]
2016-11-15T00:00:00
[ [ "Zhang", "Dajun", "" ], [ "Yu", "F. Richard", "" ], [ "Wei", "Zhexiong", "" ], [ "Boukerche", "Azzedine", "" ] ]
new_dataset
0.992916
1611.04033
Ibrahim Abu El-Khair
Ibrahim Abu El-khair
1.5 billion words Arabic Corpus
null
null
null
null
cs.CL cs.DL cs.IR
http://creativecommons.org/licenses/by-nc-sa/4.0/
This study is an attempt to build a contemporary linguistic corpus for Arabic language. The corpus produced, is a text corpus includes more than five million newspaper articles. It contains over a billion and a half words in total, out of which, there is about three million unique words. The data were collected from newspaper articles in ten major news sources from eight Arabic countries, over a period of fourteen years. The corpus was encoded with two types of encoding, namely: UTF-8, and Windows CP-1256. Also it was marked with two mark-up languages, namely: SGML, and XML.
[ { "version": "v1", "created": "Sat, 12 Nov 2016 18:41:58 GMT" } ]
2016-11-15T00:00:00
[ [ "El-khair", "Ibrahim Abu", "" ] ]
new_dataset
0.991269
1611.04279
Ngoc Khang Le
Ngoc Khang Le
Chromatic number of ISK4-free graphs
15 pages
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph $G$ is said to be ISK4-free if it does not contain any subdivision of $K_4$ as an induced subgraph. In this paper, we propose new upper bounds for chromatic number of ISK4-free graphs and $\{$ISK4, triangle$\}$-free graphs.
[ { "version": "v1", "created": "Mon, 14 Nov 2016 08:11:12 GMT" } ]
2016-11-15T00:00:00
[ [ "Le", "Ngoc Khang", "" ] ]
new_dataset
0.999352
1611.04341
Krishna Kaipa
Peter Beelen, David Glynn, Tom H{\o}holdt, and Krishna Kaipa
Counting generalized Reed-Solomon codes
null
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we count the number of generalized Reed-Solomon (GRS) codes of dimension k and length n, including the codes coming from a non-degenerate conic plus nucleus. We compare our results with known formulae for the number of 3-dimensional MDS codes of length n=6,7,8,9.
[ { "version": "v1", "created": "Mon, 14 Nov 2016 11:24:49 GMT" } ]
2016-11-15T00:00:00
[ [ "Beelen", "Peter", "" ], [ "Glynn", "David", "" ], [ "Høholdt", "Tom", "" ], [ "Kaipa", "Krishna", "" ] ]
new_dataset
0.954773
1611.04433
Stefan Wagner
Stefan Wagner, Klaus Lochmann, Lars Heinemann, Michael Kl\"as, Adam Trendowicz, Reinhold Pl\"osch, Andreas Seidl, Andreas Goeb, Jonathan Streit
The Quamoco Product Quality Modelling and Assessment Approach
10 pages, 2 figures, Proc. 34th International Conference on Software Engineering (ICSE'12). IEEE, 2012
null
10.1109/ICSE.2012.6227106
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Published software quality models either provide abstract quality attributes or concrete quality assessments. There are no models that seamlessly integrate both aspects. In the project Quamoco, we built a comprehensive approach with the aim to close this gap. For this, we developed in several iterations a meta quality model specifying general concepts, a quality base model covering the most important quality factors and a quality assessment approach. The meta model introduces the new concept of a product factor, which bridges the gap between concrete measurements and abstract quality aspects. Product factors have measures and instruments to operationalise quality by measurements from manual inspection and tool analysis. The base model uses the ISO 25010 quality attributes, which we refine by 200 factors and 600 measures for Java and C# systems. We found in several empirical validations that the assessment results fit to the expectations of experts for the corresponding systems. The empirical analyses also showed that several of the correlations are statistically significant and that the maintainability part of the base model has the highest correlation, which fits to the fact that this part is the most comprehensive. Although we still see room for extending and improving the base model, it shows a high correspondence with expert opinions and hence is able to form the basis for repeatable and understandable quality assessments in practice.
[ { "version": "v1", "created": "Mon, 14 Nov 2016 16:08:53 GMT" } ]
2016-11-15T00:00:00
[ [ "Wagner", "Stefan", "" ], [ "Lochmann", "Klaus", "" ], [ "Heinemann", "Lars", "" ], [ "Kläs", "Michael", "" ], [ "Trendowicz", "Adam", "" ], [ "Plösch", "Reinhold", "" ], [ "Seidl", "Andreas", "" ], [ "Goeb", "Andreas", "" ], [ "Streit", "Jonathan", "" ] ]
new_dataset
0.999087
1611.04455
Hongyi Liu
Vaidehi Dalmia, Hongyi Liu, Shih-Fu Chang
Columbia MVSO Image Sentiment Dataset
null
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Multilingual Visual Sentiment Ontology (MVSO) consists of 15,600 concepts in 12 different languages that are strongly related to emotions and sentiments expressed in images. These concepts are defined in the form of Adjective-Noun Pair (ANP), which are crawled and discovered from online image forum Flickr. In this work, we used Amazon Mechanical Turk as a crowd-sourcing platform to collect human judgments on sentiments expressed in images that are uniformly sampled over 3,911 English ANPs extracted from a tag-restricted subset of MVSO. Our goal is to use the dataset as a benchmark for the evaluation of systems that automatically predict sentiments in images or ANPs.
[ { "version": "v1", "created": "Mon, 14 Nov 2016 16:48:12 GMT" } ]
2016-11-15T00:00:00
[ [ "Dalmia", "Vaidehi", "" ], [ "Liu", "Hongyi", "" ], [ "Chang", "Shih-Fu", "" ] ]
new_dataset
0.999903
1611.04491
Jinying Chen
Jinying Chen, Abhyuday N. Jagannatha, Samah J. Jarad, Hong Yu
Ranking medical jargon in electronic health record notes by adapted distant supervision
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Objective: Allowing patients to access their own electronic health record (EHR) notes through online patient portals has the potential to improve patient-centered care. However, medical jargon, which abounds in EHR notes, has been shown to be a barrier for patient EHR comprehension. Existing knowledge bases that link medical jargon to lay terms or definitions play an important role in alleviating this problem but have low coverage of medical jargon in EHRs. We developed a data-driven approach that mines EHRs to identify and rank medical jargon based on its importance to patients, to support the building of EHR-centric lay language resources. Methods: We developed an innovative adapted distant supervision (ADS) model based on support vector machines to rank medical jargon from EHRs. For distant supervision, we utilized the open-access, collaborative consumer health vocabulary, a large, publicly available resource that links lay terms to medical jargon. We explored both knowledge-based features from the Unified Medical Language System and distributed word representations learned from unlabeled large corpora. We evaluated the ADS model using physician-identified important medical terms. Results: Our ADS model significantly surpassed two state-of-the-art automatic term recognition methods, TF*IDF and C-Value, yielding 0.810 ROC-AUC versus 0.710 and 0.667, respectively. Our model identified 10K important medical jargon terms after ranking over 100K candidate terms mined from over 7,500 EHR narratives. Conclusion: Our work is an important step towards enriching lexical resources that link medical jargon to lay terms/definitions to support patient EHR comprehension. The identified medical jargon terms and their rankings are available upon request.
[ { "version": "v1", "created": "Mon, 14 Nov 2016 17:36:05 GMT" } ]
2016-11-15T00:00:00
[ [ "Chen", "Jinying", "" ], [ "Jagannatha", "Abhyuday N.", "" ], [ "Jarad", "Samah J.", "" ], [ "Yu", "Hong", "" ] ]
new_dataset
0.95856
1611.04580
Clelia De Felice
Clelia De Felice
Some conjectures on codes
null
null
null
null
cs.FL cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Variable-length codes are the bases of the free submonoids of a free monoid. There are some important longstanding open questions about the structure of finite maximal codes. In this paper we discuss this conjectures and their relations with factorizations of cyclic groups.
[ { "version": "v1", "created": "Mon, 14 Nov 2016 20:59:04 GMT" } ]
2016-11-15T00:00:00
[ [ "De Felice", "Clelia", "" ] ]
new_dataset
0.999491
cs/0405080
Riccardo Pucella
Riccardo Pucella
Reactive Programming in Standard ML
11 pages; appeared in Proceedings of the IEEE International Conference on Computer Languages (ICCL'98), pp. 48-57, 1998
null
10.1109/ICCL.1998.674156
null
cs.PL
null
Reactive systems are systems that maintain an ongoing interaction with their environment, activated by receiving input events from the environment and producing output events in response. Modern programming languages designed to program such systems use a paradigm based on the notions of instants and activations. We describe a library for Standard ML that provides basic primitives for programming reactive systems. The library is a low-level system upon which more sophisticated reactive behaviors can be built, which provides a convenient framework for prototyping extensions to existing reactive languages.
[ { "version": "v1", "created": "Sun, 23 May 2004 19:09:11 GMT" } ]
2016-11-15T00:00:00
[ [ "Pucella", "Riccardo", "" ] ]
new_dataset
0.992856
cs/0609090
Xiaofei Huang
Xiaofei Huang
Single-Scan Min-Sum Algorithms for Fast Decoding of LDPC Codes
Accepted by IEEE Information Theory Workshop, Chengdu, China, 2006
null
10.1109/ITW2.2006.323774
null
cs.IT math.IT
null
Many implementations for decoding LDPC codes are based on the (normalized/offset) min-sum algorithm due to its satisfactory performance and simplicity in operations. Usually, each iteration of the min-sum algorithm contains two scans, the horizontal scan and the vertical scan. This paper presents a single-scan version of the min-sum algorithm to speed up the decoding process. It can also reduce memory usage or wiring because it only needs the addressing from check nodes to variable nodes while the original min-sum algorithm requires that addressing plus the addressing from variable nodes to check nodes. To cut down memory usage or wiring further, another version of the single-scan min-sum algorithm is presented where the messages of the algorithm are represented by single bit values instead of using fixed point ones. The software implementation has shown that the single-scan min-sum algorithm is more than twice as fast as the original min-sum algorithm.
[ { "version": "v1", "created": "Sat, 16 Sep 2006 00:08:09 GMT" } ]
2016-11-15T00:00:00
[ [ "Huang", "Xiaofei", "" ] ]
new_dataset
0.985064
cs/0702099
Ruoheng Liu
Ruoheng Liu, Ivana Maric, Predrag Spasojevic, and Roy D. Yates
Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions
to appear Special Issue of IEEE Transactions on Information Theory on Information Theoretic Security
null
10.1109/TIT.2008.921879
null
cs.IT math.IT
null
We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers with information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is measured by the equivocation rate at the eavesdropping receiver. In this paper, we present inner and outer bounds on secrecy capacity regions for these two communication systems. The derived outer bounds have an identical mutual information expression that applies to both channel models. The difference is in the input distributions over which the expression is optimized. The inner bound rate regions are achieved by random binning techniques. For the broadcast channel, a double-binning coding scheme allows for both joint encoding and preserving of confidentiality. Furthermore, we show that, for a special case of the interference channel, referred to as the switch channel, the two bound bounds meet. Finally, we describe several transmission schemes for Gaussian interference channels and derive their achievable rate regions while ensuring mutual information-theoretic secrecy. An encoding scheme in which transmitters dedicate some of their power to create artificial noise is proposed and shown to outperform both time-sharing and simple multiplexed transmission of the confidential messages.
[ { "version": "v1", "created": "Sat, 17 Feb 2007 21:02:37 GMT" }, { "version": "v2", "created": "Tue, 11 Dec 2007 23:12:34 GMT" } ]
2016-11-15T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Maric", "Ivana", "" ], [ "Spasojevic", "Predrag", "" ], [ "Yates", "Roy D.", "" ] ]
new_dataset
0.957499
cs/9809039
Chunlei Liu
Sonia Fahmy, Raj Jain
ABR Flow Control for Multipoint Connections
5 pages, 2 figures submitted to IEEE Network Magazine, ATM Forum Perspectives column
null
10.1109/MNET.1998.730745
null
cs.NI
null
Multipoint capabilities are essential for ATM networks to efficiently support many applications, including IP multicasting and overlay applications. The current signaling and routing specifications for ATM define point-to-multipoint capabilities. Multipoint-to-point connection support is also being discussed by the signaling and PNNI groups, and will be defined in the near future for the unspecified bit rate (UBR) service. We examine point-to-multipoint and multipoint-to-point flow control for the available bit rate (ABR) service, as discussed in the traffic management working group.
[ { "version": "v1", "created": "Tue, 22 Sep 1998 16:34:07 GMT" } ]
2016-11-15T00:00:00
[ [ "Fahmy", "Sonia", "" ], [ "Jain", "Raj", "" ] ]
new_dataset
0.997467
cs/9809091
Chunlei Liu
R. Jain
Congestion Control in Computer Networks: Trends and Issues
null
IEEE Network, May 1990, pp. 24-30
10.1109/65.56532
null
cs.NI
null
Popular myths that cheaper memory, high-speed links and high-speed processors will solve the problem of congestion in computer networks are shown to be false. A simple definition for congestion based on supply and demand of resources is proposed and is then used to classify various congestion schemes. The issues that make the congestion problem a difficult one are discussed, and then the architectural decisions that affect the design of a congestion scheme are presented. It is argued that long-, medium- and short-term congestion problems require different solutions. Some of the recent schemes are brifly surveyed, and areas for further research are discussed.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 04:56:33 GMT" } ]
2016-11-15T00:00:00
[ [ "Jain", "R.", "" ] ]
new_dataset
0.956411
cs/9809096
Chunlei Liu
R. Jain
A Timeout Based Congestion Control Scheme for Window Flow- Controlled Networks
also reprinted in C. Partridge, Ed., "Innovations in Internetworking," Artech House, Norwood, MA 1988
IEEE Journal of Selected Areas in Communications, Vol. SAC-4, No. 7, October 1986, pp. 1162-1167
10.1109/JSAC.1986.1146431
null
cs.NI
null
During overload, most networks drop packets due to buffer unavailability. The resulting timeouts at the source provide an implicit mechanism to convey congestion signals from the network to the source. On a timeout, a source should not only retransmit the lost packet, but it should also reduce its load on the network. Based on this realization, we have developed a simple congestion control scheme using the acknowledgment timeouts as indications of packet loss and congestion. This scheme does not require any new message formats, therefore, it can be used in any network with window flow control, e.g., ARPAnet or ISO.
[ { "version": "v1", "created": "Thu, 24 Sep 1998 05:12:55 GMT" } ]
2016-11-15T00:00:00
[ [ "Jain", "R.", "" ] ]
new_dataset
0.999342
1609.05228
Abdorrahman Haeri
Abdorrahman Haeri
Continuous occurrence theory
This paper is not for public publication in this current form. It needs major revision
null
null
null
cs.AI math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Usually gradual and continuous changes in entities will lead to appear events. But usually it is supposed that an event is occurred at once. In this research an integrated framework called continuous occurrence theory (COT) is presented to investigate respective path leading to occurrence of the events in the real world. For this purpose initially fundamental concepts are defined. Afterwards, the appropriate tools such as occurrence variables computations, occurrence dependency function and occurrence model are introduced and explained in a systematic manner. Indeed, COT provides the possibility to: (a) monitor occurrence of events during time; (b) study background of the events; (c) recognize the relevant issues of each event; and (d) understand how these issues affect on the considered event. The developed framework (COT) provides the necessary context to analyze accurately continual changes of the issues and the relevant events in the various branches of science and business. Finally, typical applications of COT and an applied modeling example of it have been explained and a mathematical programming example is modeled in the occurrence based environment.
[ { "version": "v1", "created": "Sat, 6 Aug 2016 10:30:09 GMT" }, { "version": "v2", "created": "Fri, 11 Nov 2016 06:43:07 GMT" } ]
2016-11-14T00:00:00
[ [ "Haeri", "Abdorrahman", "" ] ]
new_dataset
0.986548
1611.03477
Hang Chu
Hang Chu, Raquel Urtasun, Sanja Fidler
Song From PI: A Musically Plausible Network for Pop Music Generation
under review at ICLR 2017
null
null
null
cs.SD cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel framework for generating pop music. Our model is a hierarchical Recurrent Neural Network, where the layers and the structure of the hierarchy encode our prior knowledge about how pop music is composed. In particular, the bottom layers generate the melody, while the higher levels produce the drums and chords. We conduct several human studies that show strong preference of our generated music over that produced by the recent method by Google. We additionally show two applications of our framework: neural dancing and karaoke, as well as neural story singing.
[ { "version": "v1", "created": "Thu, 10 Nov 2016 20:35:47 GMT" } ]
2016-11-14T00:00:00
[ [ "Chu", "Hang", "" ], [ "Urtasun", "Raquel", "" ], [ "Fidler", "Sanja", "" ] ]
new_dataset
0.967803
1611.03616
Radoslaw Nielek
Balcerzak Bartlomiej, Nielek Radoslaw
Of Hags and bitches. Ageist attitudes in 2016 presidential debate on twitter
null
null
null
null
cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we present our exploratory research into the occurrence of ageist attitudes within the discussion related to the US 2016 presidential election. We use natural processing techniques to analyze the content tweets related to Hillary Clinton and Donald Trump. Content analysis shows that although ageist attitudes are scarce in the discussion, they are mostly focused on Hillary Clinton rather than Donald Trump. Also, ageist arguments against Donald Trump appear mostly as a reply to controversies connected with the health of Hillary Clinton.
[ { "version": "v1", "created": "Fri, 11 Nov 2016 08:38:07 GMT" } ]
2016-11-14T00:00:00
[ [ "Bartlomiej", "Balcerzak", "" ], [ "Radoslaw", "Nielek", "" ] ]
new_dataset
0.996346
1611.03618
Isaac Skog
Johan Wahlstr\"om, Isaac Skog, Peter H\"andel
Smartphone-based Vehicle Telematics - A Ten-Year Anniversary
null
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Just like it has irrevocably reshaped social life, the fast growth of smartphone ownership is now beginning to revolutionize the driving experience and change how we think about automotive insurance, vehicle safety systems, and traffic research. This paper summarizes the first ten years of research in smartphone-based vehicle telematics, with a focus on user-friendly implementations and the challenges that arise due to the mobility of the smartphone. Notable academic and industrial projects are reviewed, and system aspects related to sensors, energy consumption, cloud computing, vehicular ad hoc networks, and human-machine interfaces are examined. Moreover, we highlight the differences between traditional and smartphonebased automotive navigation, and survey the state-of-the-art in smartphone-based transportation mode classification, driver classification, and road condition monitoring. Future advances are expected to be driven by improvements in sensor technology, evidence of the societal benefits of current implementations, and the establishment of industry standards for sensor fusion and driver assessment
[ { "version": "v1", "created": "Fri, 11 Nov 2016 08:55:27 GMT" } ]
2016-11-14T00:00:00
[ [ "Wahlström", "Johan", "" ], [ "Skog", "Isaac", "" ], [ "Händel", "Peter", "" ] ]
new_dataset
0.99672
1611.03379
Dmitri Strukov B
X. Guo, F. Merrikh Bayat, M. Prezioso, Y. Chen, B. Nguyen, N. Do, and D. B. Strukov
Temperature-Insensitive Analog Vector-by-Matrix Multiplier Based on 55 nm NOR Flash Memory Cells
4 pages, 11 pages
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have fabricated and successfully tested an analog vector-by-matrix multiplier, based on redesigned 10x12 arrays of 55 nm commercial NOR flash memory cells. The modified arrays enable high-precision individual analog tuning of each cell, with sub-1% accuracy, while keeping the highly optimized cells, with their long-term state retention, intact. The array has an area of 0.33 um^2 per cell, and is at least one order of magnitude more dense than the reported prior implementations of nonvolatile analog memories. The demonstrated vector-by-vector multiplier, using gate coupling to additional periphery cells, has ~2% precision, limited by the aggregate effect of cell noise, retention, mismatch, process variations, tuning precision, and capacitive crosstalk. A differential version of the multiplier has allowed us to demonstrate sub-3% temperature drift of the output signal in the range between 25C and 85C.
[ { "version": "v1", "created": "Thu, 10 Nov 2016 16:16:33 GMT" } ]
2016-11-12T00:00:00
[ [ "Guo", "X.", "" ], [ "Bayat", "F. Merrikh", "" ], [ "Prezioso", "M.", "" ], [ "Chen", "Y.", "" ], [ "Nguyen", "B.", "" ], [ "Do", "N.", "" ], [ "Strukov", "D. B.", "" ] ]
new_dataset
0.977147
1611.02546
Piotr Gawlowicz
Piotr Gaw{\l}owicz and Anatolij Zubow and Mikolaj Chwalisz and Adam Wolisz
UniFlex: Accelerating Networking Research and Experimentation through Software-Defined Wireless Networking
null
null
null
TKN-16-003
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classical control and management plane for computer networks is addressing individual parameters of protocol layers within an individual wireless network device. We argue that this is not sufficient in phase of increasing deployment of highly re-configurable systems, as well as heterogeneous wireless systems co-existing in the same radio spectrum which demand harmonized, frequently even coordinated adaptation of multiple parameters in different protocol layers (cross-layer) in multiple network devices (cross-node). We propose UniFlex, a framework enabling unified and flexible radio and network control. It provides an API enabling coordinated cross-layer control and management operation over multiple network nodes. The controller logic may be implemented either in a centralized or distributed manner. This allows to place time-sensitive control functions close to the controlled device (i.e., local control application), off-load more resource hungry network application to compute servers and make them work together to control entire network. The UniFlex framework was prototypically implemented and provided to the research community as open-source. We evaluated the the framework in a number of use-cases, what proved its usability.
[ { "version": "v1", "created": "Tue, 8 Nov 2016 15:05:00 GMT" }, { "version": "v2", "created": "Thu, 10 Nov 2016 16:27:14 GMT" } ]
2016-11-11T00:00:00
[ [ "Gawłowicz", "Piotr", "" ], [ "Zubow", "Anatolij", "" ], [ "Chwalisz", "Mikolaj", "" ], [ "Wolisz", "Adam", "" ] ]
new_dataset
0.9975
1611.03081
Burak Ulas
Benedict Carey and Burak Ulas
VR 'SPACE OPERA': Mimetic Spectralism in an Immersive Starlight Audification System
7 pages, 4 figures, 1 table
Proceedings of 13. Sound and Music Computing Conference (2016): 104-108
null
null
cs.SD physics.pop-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes a system designed as part of an interactive VR opera, which immerses a real-time composer and an audience (via a network) in the historical location of Gobeklitepe, in southern Turkey during an imaginary scenario set in the Pre-Pottery Neolithic period (8500-5500 BCE), viewed by some to be the earliest example of a temple, or observatory. In this scene music is generated, where the harmonic material is determined based on observations of light variation from pulsating stars, that would have theoretically been overhead on the 1st of October 8000 BC at 23:00 and animal calls based on the reliefs in the temple. Based on the observations of the stars V465 Per, HD 217860, 16 Lac, BG CVn and KIC 6382916, frequency collections were derived and applied to the generation of musical sound and notation sequences within a custom VR environment using a novel method incorporating spectralist techniques. Parameters controlling this 'resynthesis' can be manipulated by the performer using a Leap Motion controller and Oculus Rift HMD, yielding both sonic and visual results in the environment. The final opera is to be viewed via Google Cardboard and delivered over the Internet. This entire process aims to pose questions about real-time composition through time distortion and invoke a sense of wonder and meaningfulness through a ritualistic experience.
[ { "version": "v1", "created": "Wed, 9 Nov 2016 09:54:45 GMT" } ]
2016-11-11T00:00:00
[ [ "Carey", "Benedict", "" ], [ "Ulas", "Burak", "" ] ]
new_dataset
0.999622
1611.03343
Suleiman Yerima
Feng Yao, Suleiman Y. Yerima, BooJoong Kang, Sakir Sezer
Fuzzy Logic-based Implicit Authentication for Mobile Access Control
8 pages, SAI Computing Conference (SAI),13-15 July 2016, London, UK. arXiv admin note: text overlap with arXiv:1607.08101
null
10.1109/SAI.2016.7556097
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and a threshold in real-time based on current and historic data depicting user routine. The tuned fuzzy system is then applied to the aggregated score and the threshold to determine the trust level of the current user. The proposed fuzzy-integrated implicit authentication scheme is designed to: operate adaptively and completely in the background, require minimal training period, enable high system accuracy while provide timely detection of abnormal activity. In this paper, we explore Fuzzy Logic based authentication in depth. Gaussian and triangle-based membership functions are investigated and compared using real data over several weeks from different Android phone users. The presented results show that our proposed Fuzzy Logic approach is a highly effective, and viable scheme for lightweight real-time implicit authentication on mobile devices.
[ { "version": "v1", "created": "Mon, 12 Sep 2016 10:15:32 GMT" } ]
2016-11-11T00:00:00
[ [ "Yao", "Feng", "" ], [ "Yerima", "Suleiman Y.", "" ], [ "Kang", "BooJoong", "" ], [ "Sezer", "Sakir", "" ] ]
new_dataset
0.956252
1611.03372
Hongyang Qu
Paolo Izzo, Hongyang Qu and Sandor M. Veres
A stochastically verifiable autonomous control architecture with reasoning
Accepted at IEEE Conf. Decision and Control, 2016
null
null
null
cs.RO cs.AI cs.SE cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new agent architecture called Limited Instruction Set Agent (LISA) is introduced for autonomous control. The new architecture is based on previous implementations of AgentSpeak and it is structurally simpler than its predecessors with the aim of facilitating design-time and run-time verification methods. The process of abstracting the LISA system to two different types of discrete probabilistic models (DTMC and MDP) is investigated and illustrated. The LISA system provides a tool for complete modelling of the agent and the environment for probabilistic verification. The agent program can be automatically compiled into a DTMC or a MDP model for verification with Prism. The automatically generated Prism model can be used for both design-time and run-time verification. The run-time verification is investigated and illustrated in the LISA system as an internal modelling mechanism for prediction of future outcomes.
[ { "version": "v1", "created": "Thu, 10 Nov 2016 16:06:31 GMT" } ]
2016-11-11T00:00:00
[ [ "Izzo", "Paolo", "" ], [ "Qu", "Hongyang", "" ], [ "Veres", "Sandor M.", "" ] ]
new_dataset
0.962632
1611.03404
Jeffrey Regier
Jeffrey Regier, Kiran Pamnany, Ryan Giordano, Rollin Thomas, David Schlegel, Jon McAuliffe and Prabhat
Learning an Astronomical Catalog of the Visible Universe through Scalable Bayesian Inference
submitting to IPDPS'17
null
null
null
cs.DC astro-ph.IM cs.LG stat.AP stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Celeste is a procedure for inferring astronomical catalogs that attains state-of-the-art scientific results. To date, Celeste has been scaled to at most hundreds of megabytes of astronomical images: Bayesian posterior inference is notoriously demanding computationally. In this paper, we report on a scalable, parallel version of Celeste, suitable for learning catalogs from modern large-scale astronomical datasets. Our algorithmic innovations include a fast numerical optimization routine for Bayesian posterior inference and a statistically efficient scheme for decomposing astronomical optimization problems into subproblems. Our scalable implementation is written entirely in Julia, a new high-level dynamic programming language designed for scientific and numerical computing. We use Julia's high-level constructs for shared and distributed memory parallelism, and demonstrate effective load balancing and efficient scaling on up to 8192 Xeon cores on the NERSC Cori supercomputer.
[ { "version": "v1", "created": "Thu, 10 Nov 2016 17:16:04 GMT" } ]
2016-11-11T00:00:00
[ [ "Regier", "Jeffrey", "" ], [ "Pamnany", "Kiran", "" ], [ "Giordano", "Ryan", "" ], [ "Thomas", "Rollin", "" ], [ "Schlegel", "David", "" ], [ "McAuliffe", "Jon", "" ], [ "Prabhat", "", "" ] ]
new_dataset
0.969172
1611.03420
Muhammad Farooq-i-Azam
Muhammad Farooq-i-Azam, Muhammad Naeem Ayyaz
Location and Position Estimation in Wireless Sensor Networks
null
null
null
null
cs.NI
http://creativecommons.org/publicdomain/zero/1.0/
A wireless sensor network comprises of small sensor nodes each of which consists of a processing device, small amount of memory, battery and radio transceiver for communication. The sensor nodes are autonomous and spatially distributed in an area of investigation. Certain applications and protocols of wireless sensor networks require that the sensor nodes should be aware of their position relative to the sensor network. For it to be significant and to be of value, the data such as temperature, humidity and pressure, gathered by sensor nodes must be ascribed to the relative position from where it was collected. For this to happen, the sensor nodes must be aware of their relative positions. Traditional location finding solutions, such as Global Positioning System, are not feasible for wireless sensor nodes due to multiple reasons. Therefore, new methods, techniques and algorithms need to be developed to solve the problem of location and position estimation of wireless sensor nodes. A number of algorithms and techniques based upon different characteristics and properties of sensor nodes have already been proposed for this purpose. This chapter discusses the basic principles and techniques used in the localization algorithms, categories of these algorithms and also takes a more closer look at a few of the representative localization schemes.
[ { "version": "v1", "created": "Mon, 3 Oct 2016 17:10:27 GMT" } ]
2016-11-11T00:00:00
[ [ "Farooq-i-Azam", "Muhammad", "" ], [ "Ayyaz", "Muhammad Naeem", "" ] ]
new_dataset
0.990498
1611.03423
Barak Pearlmutter
At{\i}l{\i}m G\"une\c{s} Baydin and Barak A. Pearlmutter and Jeffrey Mark Siskind
DiffSharp: An AD Library for .NET Languages
Extended abstract presented at the AD 2016 Conference, Sep 2016, Oxford UK
null
null
null
cs.MS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
DiffSharp is an algorithmic differentiation or automatic differentiation (AD) library for the .NET ecosystem, which is targeted by the C# and F# languages, among others. The library has been designed with machine learning applications in mind, allowing very succinct implementations of models and optimization routines. DiffSharp is implemented in F# and exposes forward and reverse AD operators as general nestable higher-order functions, usable by any .NET language. It provides high-performance linear algebra primitives---scalars, vectors, and matrices, with a generalization to tensors underway---that are fully supported by all the AD operators, and which use a BLAS/LAPACK backend via the highly optimized OpenBLAS library. DiffSharp currently uses operator overloading, but we are developing a transformation-based version of the library using F#'s "code quotation" metaprogramming facility. Work on a CUDA-based GPU backend is also underway.
[ { "version": "v1", "created": "Thu, 10 Nov 2016 17:50:06 GMT" } ]
2016-11-11T00:00:00
[ [ "Baydin", "Atılım Güneş", "" ], [ "Pearlmutter", "Barak A.", "" ], [ "Siskind", "Jeffrey Mark", "" ] ]
new_dataset
0.99859
1611.03482
Abdullah Zubair Mohammed
Mohammed Abdullah Zubair, P. Rajalakshmi
Reconfigurable Dual Mode IEEE 802.15.4 Digital Baseband Receiver for Diverse IoT Applications
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
IEEE 802.15.4 takes a center stage in IoT as Low- Rate Wireless Personal Area Networks(LR-WPANs). The standard specifies Offset Quadrature Phase Shift Keying Physical Layer (O-QPSK PHY) with half-sine pulse shaping which can be either analyzed under the class of M-ary PSK signals (QPSK signal with offset) or as Minimum Shift Keying (MSK) signal. M-ary PSK demodulation is requires perfect carrier and has minimal error. MSK signals which falls under Continuous Phase Frequency Shift Keying can be demodulated non-coherently but error performance is not as good. In our paper, this dual nature of IEEE 802.15.4 PHY is exploited to propose a dual mode receiver comprising of QPSK demodulator chain and MSK demodulator chain as a single system on chip. The mode can be configured manually depending on the type of application or based on the feedback from a Signal to Noise (SNR) indicator employed in the proposed receiver. M-ary PSK chain is selected for lower SNRs and MSK for higher SNRs. Each of these properties are analyzed in detail for both demodulator chains and we go on to prove that MSK detection can be used for low power, low complex and low latency while QPSK detection is employed for minimal error.
[ { "version": "v1", "created": "Thu, 27 Oct 2016 07:36:57 GMT" } ]
2016-11-11T00:00:00
[ [ "Zubair", "Mohammed Abdullah", "" ], [ "Rajalakshmi", "P.", "" ] ]
new_dataset
0.992825
1608.05327
Igor Konnov
Igor Konnov, Marijana Lazic, Helmut Veith and Josef Widder
A Short Counterexample Property for Safety and Liveness Verification of Fault-tolerant Distributed Algorithms
16 pages, 11 pages appendix
null
10.1145/3009837.3009860
null
cs.LO cs.DC
http://creativecommons.org/licenses/by/4.0/
Distributed algorithms have many mission-critical applications ranging from embedded systems and replicated databases to cloud computing. Due to asynchronous communication, process faults, or network failures, these algorithms are difficult to design and verify. Many algorithms achieve fault tolerance by using threshold guards that, for instance, ensure that a process waits until it has received an acknowledgment from a majority of its peers. Consequently, domain-specific languages for fault-tolerant distributed systems offer language support for threshold guards. We introduce an automated method for model checking of safety and liveness of threshold-guarded distributed algorithms in systems where the number of processes and the fraction of faulty processes are parameters. Our method is based on a short counterexample property: if a distributed algorithm violates a temporal specification (in a fragment of LTL), then there is a counterexample whose length is bounded and independent of the parameters. We prove this property by (i) characterizing executions depending on the structure of the temporal formula, and (ii) using commutativity of transitions to accelerate and shorten executions. We extended the ByMC toolset (Byzantine Model Checker) with our technique, and verified liveness and safety of 10 prominent fault-tolerant distributed algorithms, most of which were out of reach for existing techniques.
[ { "version": "v1", "created": "Thu, 18 Aug 2016 16:43:03 GMT" }, { "version": "v2", "created": "Wed, 9 Nov 2016 10:37:16 GMT" } ]
2016-11-10T00:00:00
[ [ "Konnov", "Igor", "" ], [ "Lazic", "Marijana", "" ], [ "Veith", "Helmut", "" ], [ "Widder", "Josef", "" ] ]
new_dataset
0.984619
1611.02831
Fredrik Johansson
Fredrik Johansson
Arb: Efficient Arbitrary-Precision Midpoint-Radius Interval Arithmetic
12 pages, 1 figure
null
null
null
cs.MS cs.NA cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Arb is a C library for arbitrary-precision interval arithmetic using the midpoint-radius representation, also known as ball arithmetic. It supports real and complex numbers, polynomials, power series, matrices, and evaluation of many special functions. The core number types are designed for versatility and speed in a range of scenarios, allowing performance that is competitive with non-interval arbitrary-precision types such as MPFR and MPC floating-point numbers. We discuss the low-level number representation, strategies for precision and error bounds, and the implementation of efficient polynomial arithmetic with interval coefficients.
[ { "version": "v1", "created": "Wed, 9 Nov 2016 06:23:37 GMT" } ]
2016-11-10T00:00:00
[ [ "Johansson", "Fredrik", "" ] ]
new_dataset
0.97655
1611.02839
Kimmo Kettunen
Kimmo Kettunen, Eetu M\"akel\"a, Teemu Ruokolainen, Juha Kuokkala and Laura L\"ofberg
Old Content and Modern Tools - Searching Named Entities in a Finnish OCRed Historical Newspaper Collection 1771-1910
24 pages, 13 tables
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Named Entity Recognition (NER), search, classification and tagging of names and name like frequent informational elements in texts, has become a standard information extraction procedure for textual data. NER has been applied to many types of texts and different types of entities: newspapers, fiction, historical records, persons, locations, chemical compounds, protein families, animals etc. In general a NER system's performance is genre and domain dependent and also used entity categories vary (Nadeau and Sekine, 2007). The most general set of named entities is usually some version of three partite categorization of locations, persons and organizations. In this paper we report first large scale trials and evaluation of NER with data out of a digitized Finnish historical newspaper collection Digi. Experiments, results and discussion of this research serve development of the Web collection of historical Finnish newspapers. Digi collection contains 1,960,921 pages of newspaper material from years 1771-1910 both in Finnish and Swedish. We use only material of Finnish documents in our evaluation. The OCRed newspaper collection has lots of OCR errors; its estimated word level correctness is about 70-75 % (Kettunen and P\"a\"akk\"onen, 2016). Our principal NER tagger is a rule-based tagger of Finnish, FiNER, provided by the FIN-CLARIN consortium. We show also results of limited category semantic tagging with tools of the Semantic Computing Research Group (SeCo) of the Aalto University. Three other tools are also evaluated briefly. This research reports first published large scale results of NER in a historical Finnish OCRed newspaper collection. Results of the research supplement NER results of other languages with similar noisy data.
[ { "version": "v1", "created": "Wed, 9 Nov 2016 07:37:28 GMT" } ]
2016-11-10T00:00:00
[ [ "Kettunen", "Kimmo", "" ], [ "Mäkelä", "Eetu", "" ], [ "Ruokolainen", "Teemu", "" ], [ "Kuokkala", "Juha", "" ], [ "Löfberg", "Laura", "" ] ]
new_dataset
0.971816
1611.03014
Muhammad Majid Butt Muhammad Majid Butt
M. Majid Butt, Eduard A. Jorswieck and Amr Mohamed
Energy and Bursty Packet Loss Tradeoff over Fading Channels: A System Level Model
null
IEEE Systems Journal, 2016
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy efficiency and quality of service (QoS) guarantees are the key design goals for the 5G wireless communication systems. In this context, we discuss a multiuser scheduling scheme over fading channels for loss tolerant applications. The loss tolerance of the application is characterized in terms of different parameters that contribute to quality of experience for the application. The mobile users are scheduled opportunistically such that a minimum QoS is guaranteed. We propose an opportunistic scheduling scheme and address the cross layer design framework when channel state information is not perfectly available at the transmitter and the receiver. We characterize the system energy as a function of different QoS and channel state estimation error parameters. The optimization problem is formulated using Markov chain framework and solved using stochastic optimization techniques. The results demonstrate that the parameters characterizing the packet loss are tightly coupled and relaxation of one parameter does not benefit the system much if the other constraints are tight. We evaluate the energy-performance trade-off numerically and show the effect of channel uncertainty on the packet scheduler design.
[ { "version": "v1", "created": "Wed, 9 Nov 2016 17:08:59 GMT" } ]
2016-11-10T00:00:00
[ [ "Butt", "M. Majid", "" ], [ "Jorswieck", "Eduard A.", "" ], [ "Mohamed", "Amr", "" ] ]
new_dataset
0.999219
1404.0417
Miltiadis Allamanis
Miltiadis Allamanis and Charles Sutton
Mining Idioms from Source Code
null
null
10.1145/2635868.2635901
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the first method for automatically mining code idioms from a corpus of previously written, idiomatic software projects. We take the view that a code idiom is a syntactic fragment that recurs across projects and has a single semantic role. Idioms may have metavariables, such as the body of a for loop. Modern IDEs commonly provide facilities for manually defining idioms and inserting them on demand, but this does not help programmers to write idiomatic code in languages or using libraries with which they are unfamiliar. We present HAGGIS, a system for mining code idioms that builds on recent advanced techniques from statistical natural language processing, namely, nonparametric Bayesian probabilistic tree substitution grammars. We apply HAGGIS to several of the most popular open source projects from GitHub. We present a wide range of evidence that the resulting idioms are semantically meaningful, demonstrating that they do indeed recur across software projects and that they occur more frequently in illustrative code examples collected from a Q&A site. Manual examination of the most common idioms indicate that they describe important program concepts, including object creation, exception handling, and resource management.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 23:04:12 GMT" }, { "version": "v2", "created": "Tue, 20 May 2014 13:24:57 GMT" }, { "version": "v3", "created": "Mon, 2 Jun 2014 11:13:13 GMT" } ]
2016-11-09T00:00:00
[ [ "Allamanis", "Miltiadis", "" ], [ "Sutton", "Charles", "" ] ]
new_dataset
0.981886
1502.05831
Shengyun Liu
Shengyun Liu, Paolo Viotti, Christian Cachin, Vivien Qu\'ema and Marko Vukoli\'c
XFT: Practical Fault Tolerance Beyond Crashes
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite years of intensive research, Byzantine fault-tolerant (BFT) systems have not yet been adopted in practice. This is due to additional cost of BFT in terms of resources, protocol complexity and performance, compared with crash fault-tolerance (CFT). This overhead of BFT comes from the assumption of a powerful adversary that can fully control not only the Byzantine faulty machines, but at the same time also the message delivery schedule across the entire network, effectively inducing communication asynchrony and partitioning otherwise correct machines at will. To many practitioners, however, such strong attacks appear irrelevant. In this paper, we introduce cross fault tolerance or XFT, a novel approach to building reliable and secure distributed systems and apply it to the classical state-machine replication (SMR) problem. In short, an XFT SMR protocol provides the reliability guarantees of widely used asynchronous CFT SMR protocols such as Paxos and Raft, but also tolerates Byzantine faults in combination with network asynchrony, as long as a majority of replicas are correct and communicate synchronously. This allows the development of XFT systems at the price of CFT (already paid for in practice), yet with strictly stronger resilience than CFT --- sometimes even stronger than BFT itself. As a showcase for XFT, we present XPaxos, the first XFT SMR protocol, and deploy it in a geo-replicated setting. Although it offers much stronger resilience than CFT SMR at no extra resource cost, the performance of XPaxos matches that of the state-of-the-art CFT protocols.
[ { "version": "v1", "created": "Fri, 20 Feb 2015 11:15:45 GMT" }, { "version": "v2", "created": "Sat, 12 Dec 2015 07:40:58 GMT" }, { "version": "v3", "created": "Tue, 8 Nov 2016 17:27:20 GMT" } ]
2016-11-09T00:00:00
[ [ "Liu", "Shengyun", "" ], [ "Viotti", "Paolo", "" ], [ "Cachin", "Christian", "" ], [ "Quéma", "Vivien", "" ], [ "Vukolić", "Marko", "" ] ]
new_dataset
0.998349
1611.01667
Christian Schuessler
Christian Schuessler and Roland Gruber
A Traversable Fixed Size Small Object Allocator in C++
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At the allocation and deallocation of small objects with fixed size, the standard allocator of the runtime system has commonly a worse time performance compared to allocators adapted for a special application field. We propose a memory allocator, originally developed for mesh primitives but also usable for any other small equally sized objects. For a large amount of objects it leads to better results than allocating data with the C ++new instruction and behaves nowhere worse. The proposed synchronization approach for this allocator behaves lock-free in practical scenarios without using machine instructions, such as compare-and-swap. A traversal structure is integrated requiring less memory than using containers such as STL-vectors or lists, but with comparable time performance.
[ { "version": "v1", "created": "Sat, 5 Nov 2016 16:33:02 GMT" }, { "version": "v2", "created": "Tue, 8 Nov 2016 20:10:27 GMT" } ]
2016-11-09T00:00:00
[ [ "Schuessler", "Christian", "" ], [ "Gruber", "Roland", "" ] ]
new_dataset
0.997605
1611.01960
Sven M\"uelich
Sven M\"uelich, Martin Bossert
A New Error Correction Scheme for Physical Unclonable Functions
6 pages
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Error correction is an indispensable component when Physical Unclonable Functions (PUFs) are used in cryptographic applications. So far, there exist schemes that obtain helper data, which they need within the error correction process. We introduce a new scheme, which only uses an error correcting code without any further helper data. The main idea is to construct for each PUF instance an individual code which contains the initial PUF response as codeword. In this work we use LDPC codes, however other code classes are also possible. Our scheme allows a trade-off between code rate and cryptographic security. In addition, decoding with linear complexity is possible.
[ { "version": "v1", "created": "Mon, 7 Nov 2016 09:59:44 GMT" }, { "version": "v2", "created": "Tue, 8 Nov 2016 08:49:05 GMT" } ]
2016-11-09T00:00:00
[ [ "Müelich", "Sven", "" ], [ "Bossert", "Martin", "" ] ]
new_dataset
0.998501
1611.01974
Balint Daroczy
B\'alint Dar\'oczy and Frederick Ayala-G\'omez and Andr\'as Bencz\'ur
Item-to-item recommendation based on Contextual Fisher Information
9 pages, 8 figures, 4 tables
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web recommendation services bear great importance in e-commerce, as they aid the user in navigating through the items that are most relevant to her needs. In a typical Web site, long history of previous activities or purchases by the user is rarely available. Hence in most cases, recommenders propose items that are similar to the most recent ones viewed in the current user session. The corresponding task is called session based item-to-item recommendation. For frequent items, it is easy to present item-to-item recommendations by "people who viewed this, also viewed" lists. However, most of the items belong to the long tail, where previous actions are sparsely available. Another difficulty is the so-called cold start problem, when the item has recently appeared and had no time yet to accumulate sufficient number of transactions. In order to recommend a next item in a session in sparse or cold start situations, we also have to incorporate item similarity models. In this paper we describe a probabilistic similarity model based on Random Fields to approximate item-to-item transition probabilities. We give a generative model for the item interactions based on arbitrary distance measures over the items including explicit, implicit ratings and external metadata. The model may change in time to fit better recent events and recommend the next item based on the updated Fisher Information. Our new model outperforms both simple similarity baseline methods and recent item-to-item recommenders, under several different performance metrics and publicly available data sets. We reach significant gains in particular for recommending a new item following a rare item.
[ { "version": "v1", "created": "Mon, 7 Nov 2016 10:28:06 GMT" }, { "version": "v2", "created": "Tue, 8 Nov 2016 09:31:56 GMT" } ]
2016-11-09T00:00:00
[ [ "Daróczy", "Bálint", "" ], [ "Ayala-Gómez", "Frederick", "" ], [ "Benczúr", "András", "" ] ]
new_dataset
0.99937
1410.6572
Mason A. Porter
Mihai Cucuringu, Puck Rombach, Sang Hoon Lee, Mason A. Porter
Detection of Core-Periphery Structure in Networks Using Spectral Methods and Geodesic Paths
This article is part of EJAM's December 2016 special issue on "Network Analysis and Modelling" (available at https://www.cambridge.org/core/journals/european-journal-of-applied-mathematics/issue/journal-ejm-volume-27-issue-6/D245C89CABF55DBF573BB412F7651ADB)
European Journal of Applied Mathematics, Volume 27, Issue 6 (Network Analysis and Modelling) December 2016, pp. 846-887
10.1017/S095679251600022X
null
cs.DM cond-mat.dis-nn cs.SI math.CO physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce several novel and computationally efficient methods for detecting "core--periphery structure" in networks. Core--periphery structure is a type of mesoscale structure that includes densely-connected core vertices and sparsely-connected peripheral vertices. Core vertices tend to be well-connected both among themselves and to peripheral vertices, which tend not to be well-connected to other vertices. Our first method, which is based on transportation in networks, aggregates information from many geodesic paths in a network and yields a score for each vertex that reflects the likelihood that a vertex is a core vertex. Our second method is based on a low-rank approximation of a network's adjacency matrix, which can often be expressed as a tensor-product matrix. Our third approach uses the bottom eigenvector of the random-walk Laplacian to infer a coreness score and a classification into core and peripheral vertices. We also design an objective function to (1) help classify vertices into core or peripheral vertices and (2) provide a goodness-of-fit criterion for classifications into core versus peripheral vertices. To examine the performance of our methods, we apply our algorithms to both synthetically-generated networks and a variety of networks constructed from real-world data sets.
[ { "version": "v1", "created": "Fri, 24 Oct 2014 04:45:42 GMT" }, { "version": "v2", "created": "Wed, 9 Dec 2015 22:08:53 GMT" }, { "version": "v3", "created": "Sun, 6 Nov 2016 20:09:33 GMT" } ]
2016-11-08T00:00:00
[ [ "Cucuringu", "Mihai", "" ], [ "Rombach", "Puck", "" ], [ "Lee", "Sang Hoon", "" ], [ "Porter", "Mason A.", "" ] ]
new_dataset
0.994895
1509.07109
Sayed Kamaledin Ghiasi-Shirazi
Sayed Kamaledin Ghiasi-Shirazi, Mahdi Mohseni, Majid Darvishan, and Reza Yousefzadeh
RSCM Technology for Developing Runtime-Reconfigurable Telecommunication Applications
null
null
10.1016/j.csi.2016.10.015
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Runtime reconfiguration is a fundamental requirement of many telecommunication applications which also has been addressed by management standards like CMIP, 3GPP TS 32.602, and NETCONF. Two basic commands considered by these standards are CREATE and DELETE which operate on managed objects inside an application. The available configuration management technologies, like JMX, OSGi, and Fractal, do not support the CREATE and DELETE reconfiguration commands of the telecommunication standards. In this paper, we introduce a novel technology, called RSCM, for development of runtime reconfigurable applications complying with the telecommunication standards. The RSCM subagent takes the responsibility of loading the application from the configuration file, executing the runtime reconfiguration commands (including CREATE and DELETE), enforcing validity of the configuration state, and updating the configuration file according to the latest reconfiguration commands. We exploit the modular and object oriented features of the XML technology for storing the configuration state of a program in a configuration file. The software development process is tailored such that the design of XML schemas of managed classes is performed parallel to the design of software classes. In addition, a novel programming approach based on indirect referencing is proposed which allows safe and almost immediate deletion of managed objects at runtime. This indirect referencing mechanism affects the implementation of associations in class diagrams and prevents methods of a class to use the this pointer freely. The RSCM technology has been successfully used in several commercial telecommunication applications; including an SMS service center, an SMS gateway, and an SMS hub.
[ { "version": "v1", "created": "Wed, 23 Sep 2015 19:48:41 GMT" }, { "version": "v2", "created": "Sun, 6 Nov 2016 03:34:26 GMT" } ]
2016-11-08T00:00:00
[ [ "Ghiasi-Shirazi", "Sayed Kamaledin", "" ], [ "Mohseni", "Mahdi", "" ], [ "Darvishan", "Majid", "" ], [ "Yousefzadeh", "Reza", "" ] ]
new_dataset
0.998126
1602.07360
Forrest Iandola
Forrest N. Iandola, Song Han, Matthew W. Moskewicz, Khalid Ashraf, William J. Dally, Kurt Keutzer
SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <0.5MB model size
In ICLR Format
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent research on deep neural networks has focused primarily on improving accuracy. For a given accuracy level, it is typically possible to identify multiple DNN architectures that achieve that accuracy level. With equivalent accuracy, smaller DNN architectures offer at least three advantages: (1) Smaller DNNs require less communication across servers during distributed training. (2) Smaller DNNs require less bandwidth to export a new model from the cloud to an autonomous car. (3) Smaller DNNs are more feasible to deploy on FPGAs and other hardware with limited memory. To provide all of these advantages, we propose a small DNN architecture called SqueezeNet. SqueezeNet achieves AlexNet-level accuracy on ImageNet with 50x fewer parameters. Additionally, with model compression techniques we are able to compress SqueezeNet to less than 0.5MB (510x smaller than AlexNet). The SqueezeNet architecture is available for download here: https://github.com/DeepScale/SqueezeNet
[ { "version": "v1", "created": "Wed, 24 Feb 2016 00:09:45 GMT" }, { "version": "v2", "created": "Sat, 27 Feb 2016 20:24:20 GMT" }, { "version": "v3", "created": "Wed, 6 Apr 2016 07:21:49 GMT" }, { "version": "v4", "created": "Fri, 4 Nov 2016 21:26:08 GMT" } ]
2016-11-08T00:00:00
[ [ "Iandola", "Forrest N.", "" ], [ "Han", "Song", "" ], [ "Moskewicz", "Matthew W.", "" ], [ "Ashraf", "Khalid", "" ], [ "Dally", "William J.", "" ], [ "Keutzer", "Kurt", "" ] ]
new_dataset
0.980483
1610.08173
Salvatore Talarico
Salvatore Talarico, Matthew C. Valenti, and Thomas R. Halford
Controlled Barrage Regions: Stochastic Modeling, Analysis, and Optimization
7 pages, 3 images, in Military Communication Conference (MILCOM). arXiv admin note: substantial text overlap with arXiv:1408.5928
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A barrage relay network (BRN) is a broadcast oriented ad hoc network involving autonomous cooperative communication, a slotted time-division frame format, and a coarse slot-level synchronization. While inherently a broadcast protocol, BRNs can support unicast transmission by superimposing a plurality of controlled barrage regions (CBRs) onto the network. Within each CBRs, a new packet is injected by the unicast source during the first time slot of each new radio frame. When a CBRs is sufficiently long that a packet might not be able to reach the other end within a radio frame, multiple packets can be active at the same time via spatial pipelining, resulting in interference within the CBRs. In this paper, the dynamics of packet transmission within a CBRs is described as a Markov process, and the outage probability of each link within the CBRs is evaluated in closed form, thereby accounting for fading and co-channel interference. In order to account for the linkage between simultaneous active packets and their temporal correlation, a Viterbi-like algorithm is used. Using this accurate analytical framework, a line network is optimized, which identifies the code rate, the number of relays, and the length of a radio frame that maximizes the transport capacity.
[ { "version": "v1", "created": "Wed, 26 Oct 2016 05:33:27 GMT" }, { "version": "v2", "created": "Mon, 7 Nov 2016 04:08:01 GMT" } ]
2016-11-08T00:00:00
[ [ "Talarico", "Salvatore", "" ], [ "Valenti", "Matthew C.", "" ], [ "Halford", "Thomas R.", "" ] ]
new_dataset
0.98201
1611.01642
Victor Campmany
Victor Campmany, Sergio Silva, Antonio Espinosa, Juan Carlos Moure, David V\'azquez, Antonio M. L\'opez
GPU-based Pedestrian Detection for Autonomous Driving
10 pages
International Conference on Computational Science 2016 Volume 80 Pages 2377 to 2381
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a real-time pedestrian detection system for the embedded Nvidia Tegra X1 GPU-CPU hybrid platform. The pipeline is composed by the following state-of-the-art algorithms: Histogram of Local Binary Patterns (LBP) and Histograms of Oriented Gradients (HOG) features extracted from the input image; Pyramidal Sliding Window technique for candidate generation; and Support Vector Machine (SVM) for classification. Results show a 8x speedup in the target Tegra X1 platform and a better performance/watt ratio than desktop CUDA platforms in study.
[ { "version": "v1", "created": "Sat, 5 Nov 2016 12:47:32 GMT" } ]
2016-11-08T00:00:00
[ [ "Campmany", "Victor", "" ], [ "Silva", "Sergio", "" ], [ "Espinosa", "Antonio", "" ], [ "Moure", "Juan Carlos", "" ], [ "Vázquez", "David", "" ], [ "López", "Antonio M.", "" ] ]
new_dataset
0.993052
1611.01801
Qingchao Chen
Qingchao Chen, Bo Tan, Kevin Chetty, Karl Woodbridge
Activity Recognition Based on Micro-Doppler Signature with In-Home Wi-Fi
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Device free activity recognition and monitoring has become a promising research area with increasing public interest in pattern of life monitoring and chronic health conditions. This paper proposes a novel framework for in-home Wi-Fi signal-based activity recognition in e-healthcare applications using passive micro-Doppler (m-D) signature classification. The framework includes signal modeling, Doppler extraction and m-D classification. A data collection campaign was designed to verify the framework where six m-D signatures corresponding to typical daily activities are sucessfully detected and classified using our software defined radio (SDR) demo system. Analysis of the data focussed on potential discriminative characteristics, such as maximum Doppler frequency and time duration of activity. Finally, a sparsity induced classifier is applied for adaptting the method in healthcare application scenarios and the results are compared with those from the well-known Support Vector Machine (SVM) method.
[ { "version": "v1", "created": "Sun, 6 Nov 2016 16:06:30 GMT" } ]
2016-11-08T00:00:00
[ [ "Chen", "Qingchao", "" ], [ "Tan", "Bo", "" ], [ "Chetty", "Kevin", "" ], [ "Woodbridge", "Karl", "" ] ]
new_dataset
0.994942
1611.01866
Giacomo Marciani
Giacomo Marciani
Marciani Normal Form of context-free grammars
preprint, 4 pages
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we prove the semidecidability of the problem of saying whether or not a context-free grammar generates a regular language. We introduce the notion of context-free grammar in Marciani Normal Form. We prove that a context-free grammar in Marciani Normal Form always generates a regular language.
[ { "version": "v1", "created": "Mon, 7 Nov 2016 00:47:19 GMT" } ]
2016-11-08T00:00:00
[ [ "Marciani", "Giacomo", "" ] ]
new_dataset
0.960732
1611.02025
Xavier Holt
Xavier Holt, Will Radford, Ben Hachey
Presenting a New Dataset for the Timeline Generation Problem
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The timeline generation task summarises an entity's biography by selecting stories representing key events from a large pool of relevant documents. This paper addresses the lack of a standard dataset and evaluative methodology for the problem. We present and make publicly available a new dataset of 18,793 news articles covering 39 entities. For each entity, we provide a gold standard timeline and a set of entity-related articles. We propose ROUGE as an evaluation metric and validate our dataset by showing that top Google results outperform straw-man baselines.
[ { "version": "v1", "created": "Mon, 7 Nov 2016 12:47:25 GMT" } ]
2016-11-08T00:00:00
[ [ "Holt", "Xavier", "" ], [ "Radford", "Will", "" ], [ "Hachey", "Ben", "" ] ]
new_dataset
0.99951
1611.02027
Will Radford
Will Radford and Andrew Chisholm and Ben Hachey and Bo Han
:telephone::person::sailboat::whale::okhand:; or "Call me Ishmael" - How do you translate emoji?
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report on an exploratory analysis of Emoji Dick, a project that leverages crowdsourcing to translate Melville's Moby Dick into emoji. This distinctive use of emoji removes textual context, and leads to a varying translation quality. In this paper, we use statistical word alignment and part-of-speech tagging to explore how people use emoji. Despite these simple methods, we observed differences in token and part-of-speech distributions. Experiments also suggest that semantics are preserved in the translation, and repetition is more common in emoji.
[ { "version": "v1", "created": "Mon, 7 Nov 2016 12:51:22 GMT" } ]
2016-11-08T00:00:00
[ [ "Radford", "Will", "" ], [ "Chisholm", "Andrew", "" ], [ "Hachey", "Ben", "" ], [ "Han", "Bo", "" ] ]
new_dataset
0.998435
1512.01416
Richard Bornat
Richard Bornat (1), Jade Alglave (2 and 3) and Matthew Parkinson (3) ((1) Middlesex University, London, (2) University College, London, (3) Microsoft Research)
New Lace and Arsenic: adventures in weak memory with a program logic
This paper reports the joint work of its authors. But the words in the paper were written by Richard Bornat. Any opprobrium, bug reports, complaints, and observations about sins of com- mission or omission should be directed at him. [email protected]
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a program logic for weak memory (also known as relaxed memory). The logic is based on Hoare logic within a thread, and rely/guarantee between threads. It is presented via examples, giving proofs of many weak-memory litmus tests. It extends to coherence but not yet to synchronised assignment (compare-and-swap, load-logical/store-conditional). It deals with conditionals and loops but not yet arrays or heap. The logic uses a version of Hoare logic within threads, and a version of rely/guarantee between threads, with five stability rules to handle various kinds of parallelism (external, internal, propagation-free and two kinds of in-flight parallelism). There are $\mathbb{B}$ and $\mathbb{U}$ modalities to regulate propagation, and temporal modalities $\mathsf{since}$, $\mathbb{S}\mathsf{ofar}$ and $\mathbb{O}\mathsf{uat}$ to deal with global coherence (SC per location). The logic is presented by example. Proofs and unproofs of about thirty weak-memory examples, including many litmus tests in various guises, are dealt with in detail. There is a proof of a version of the token ring. In version 2: The correspondence with Herding Cats has been clarified. The stability rules have been simplified: in particular the sat and x= x tests have been eliminated from external stability checks. The embedding is simplified and has a more transparent relation to the mechanisms of the logic. Definitions of U, Sofar and Ouat have been considerably altered. The description of modalities and the treatment of termination has been reworked. Many proofs are reconstructed. A comprehensive summary of the logic is an appendix.
[ { "version": "v1", "created": "Fri, 4 Dec 2015 14:19:01 GMT" }, { "version": "v2", "created": "Fri, 4 Nov 2016 16:18:44 GMT" } ]
2016-11-07T00:00:00
[ [ "Bornat", "Richard", "", "2 and 3" ], [ "Alglave", "Jade", "", "2 and 3" ], [ "Parkinson", "Matthew", "" ] ]
new_dataset
0.994863
1611.00625
Gabriel Synnaeve
Gabriel Synnaeve, Nantas Nardelli, Alex Auvolat, Soumith Chintala, Timoth\'ee Lacroix, Zeming Lin, Florian Richoux, Nicolas Usunier
TorchCraft: a Library for Machine Learning Research on Real-Time Strategy Games
null
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present TorchCraft, a library that enables deep learning research on Real-Time Strategy (RTS) games such as StarCraft: Brood War, by making it easier to control these games from a machine learning framework, here Torch. This white paper argues for using RTS games as a benchmark for AI research, and describes the design and components of TorchCraft.
[ { "version": "v1", "created": "Tue, 1 Nov 2016 05:01:24 GMT" }, { "version": "v2", "created": "Thu, 3 Nov 2016 21:54:28 GMT" } ]
2016-11-07T00:00:00
[ [ "Synnaeve", "Gabriel", "" ], [ "Nardelli", "Nantas", "" ], [ "Auvolat", "Alex", "" ], [ "Chintala", "Soumith", "" ], [ "Lacroix", "Timothée", "" ], [ "Lin", "Zeming", "" ], [ "Richoux", "Florian", "" ], [ "Usunier", "Nicolas", "" ] ]
new_dataset
0.999166
1611.01235
Tiffany Hwu
Tiffany Hwu, Jacob Isbell, Nicolas Oros, and Jeffrey Krichmar
A Self-Driving Robot Using Deep Convolutional Neural Networks on Neuromorphic Hardware
6 pages, 8 figures
null
null
null
cs.NE cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neuromorphic computing is a promising solution for reducing the size, weight and power of mobile embedded systems. In this paper, we introduce a realization of such a system by creating the first closed-loop battery-powered communication system between an IBM TrueNorth NS1e and an autonomous Android-Based Robotics platform. Using this system, we constructed a dataset of path following behavior by manually driving the Android-Based robot along steep mountain trails and recording video frames from the camera mounted on the robot along with the corresponding motor commands. We used this dataset to train a deep convolutional neural network implemented on the TrueNorth NS1e. The NS1e, which was mounted on the robot and powered by the robot's battery, resulted in a self-driving robot that could successfully traverse a steep mountain path in real time. To our knowledge, this represents the first time the TrueNorth NS1e neuromorphic chip has been embedded on a mobile platform under closed-loop control.
[ { "version": "v1", "created": "Fri, 4 Nov 2016 01:10:07 GMT" } ]
2016-11-07T00:00:00
[ [ "Hwu", "Tiffany", "" ], [ "Isbell", "Jacob", "" ], [ "Oros", "Nicolas", "" ], [ "Krichmar", "Jeffrey", "" ] ]
new_dataset
0.999502
1611.01257
Brian Keegan
Marlon Twyman and Brian C. Keegan and Aaron Shaw
Black Lives Matter in Wikipedia: Collaboration and Collective Memory around Online Social Movements
14 pages
null
10.1145/2998181.2998232
null
cs.SI cs.CY cs.HC physics.soc-ph
http://creativecommons.org/licenses/by-sa/4.0/
Social movements use social computing systems to complement offline mobilizations, but prior literature has focused almost exclusively on movement actors' use of social media. In this paper, we analyze participation and attention to topics connected with the Black Lives Matter movement in the English language version of Wikipedia between 2014 and 2016. Our results point to the use of Wikipedia to (1) intensively document and connect historical and contemporary events, (2) collaboratively migrate activity to support coverage of new events, and (3) dynamically re-appraise pre-existing knowledge in the aftermath of new events. These findings reveal patterns of behavior that complement theories of collective memory and collective action and help explain how social computing systems can encode and retrieve knowledge about social movements as they unfold.
[ { "version": "v1", "created": "Fri, 4 Nov 2016 03:35:58 GMT" } ]
2016-11-07T00:00:00
[ [ "Twyman", "Marlon", "" ], [ "Keegan", "Brian C.", "" ], [ "Shaw", "Aaron", "" ] ]
new_dataset
0.998112
1611.01344
Shaull Almagor
Shaull Almagor, Jo\"el Ouaknine, James Worrell
The Polytope-Collision Problem
20 pages, 1 figure. Submitted to STOC 2017
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Orbit Problem consists of determining, given a matrix $A\in \mathbb{R}^{d\times d}$ and vectors $x,y\in \mathbb{R}^d$, whether there exists $n\in \mathbb{N}$ such that $A^n=y$. This problem was shown to be decidable in a seminal work of Kannan and Lipton in the 1980s. Subsequently, Kannan and Lipton noted that the Orbit Problem becomes considerably harder when the target $y$ is replaced with a subspace of $\mathbb{R}^d$. Recently, it was shown that the problem is decidable for vector-space targets of dimension at most three, followed by another development showing that the problem is in PSPACE for polytope targets of dimension at most three. In this work, we take a dual look at the problem, and consider the case where the initial vector $x$ is replaced with a polytope $P_1$, and the target is a polytope $P_2$. Then, the question is whether there exists $n\in \mathbb{N}$ such that $A^n P_1\cap P_2\neq \emptyset$. We show that the problem can be decided in PSPACE for dimension at most three. As in previous works, decidability in the case of higher dimensions is left open, as the problem is known to be hard for long-standing number-theoretic open problems. Our proof begins by formulating the problem as the satisfiability of a parametrized family of sentences in the existential first-order theory of real-closed fields. Then, after removing quantifiers, we are left with instances of simultaneous positivity of sums of exponentials. Using techniques from transcendental number theory, and separation bounds on algebraic numbers, we are able to solve such instances in PSPACE.
[ { "version": "v1", "created": "Fri, 4 Nov 2016 12:00:41 GMT" } ]
2016-11-07T00:00:00
[ [ "Almagor", "Shaull", "" ], [ "Ouaknine", "Joël", "" ], [ "Worrell", "James", "" ] ]
new_dataset
0.997715
1607.02817
Prasanth K. P.
S. B. Balaji, K. P. Prasanth and P. Vijay Kumar
Binary Codes with Locality for Four Erasures
5 pages, 2 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, codes with locality for four erasures are considered. An upper bound on the rate of codes with locality with sequential recovery from four erasures is derived. The rate bound derived here is field independent. An optimal construction for binary codes meeting this rate bound is also provided. The construction is based on regular graphs of girth $6$ and employs the sequential approach of locally recovering from multiple erasures. An extension of this construction that generates codes which can sequentially recover from five erasures is also presented.
[ { "version": "v1", "created": "Mon, 11 Jul 2016 04:32:55 GMT" }, { "version": "v2", "created": "Sun, 30 Oct 2016 17:51:17 GMT" }, { "version": "v3", "created": "Thu, 3 Nov 2016 06:38:44 GMT" } ]
2016-11-04T00:00:00
[ [ "Balaji", "S. B.", "" ], [ "Prasanth", "K. P.", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.998985
1611.01042
Chung Ho
Chung Duc Ho, Hien Quoc Ngo, Michail Matthaiou, and Trung Q. Duong
Multi-Way Massive MIMO with Maximum-Ratio Processing and Imperfect CSI
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers a multi-way massive multiple-input multiple-output relaying system, where single-antenna users exchange their information-bearing signals with the help of one relay station equipped with unconventionally many antennas. The relay first estimates the channels to all users through the pilot signals transmitted from them. Then, the relay uses maximum-ratio processing (i.e. maximum-ratio combining in the multiple-access phase and maximum-ratio transmission in the broadcast phase) to process the signals. A rigorous closed-form expression for the spectral efficiency is derived. The effects of the channel estimation error, the channel estimation overhead, the length of the training duration, and the randomness of the user locations are analyzed. We show that by deploying massive antenna arrays at the relay and simple maximum-ratio processing, we can serve many users in the same time-frequency resource, while maintaining a given quality-of-service for each user.
[ { "version": "v1", "created": "Thu, 3 Nov 2016 14:33:13 GMT" } ]
2016-11-04T00:00:00
[ [ "Ho", "Chung Duc", "" ], [ "Ngo", "Hien Quoc", "" ], [ "Matthaiou", "Michail", "" ], [ "Duong", "Trung Q.", "" ] ]
new_dataset
0.955916
1502.02803
Hailong Shi
Hailong Shi, Hao Zhang, and Xiqin Wang
A TDOA technique with Super-Resolution based on the Volume Cross-Correlation Function
13 pages, submitted and revised to IEEE Trans on Signal Processing
null
10.1109/TSP.2016.2548988
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time Difference of Arrival (TDOA) is widely used in wireless localization systems. Among the enormous approaches of TDOA, high resolution TDOA algorithms have drawn much attention for its ability to resolve closely spaced signal delays in multipath environment. However, the state-of-art high resolution TDOA algorithms still have performance weakness on resolving time delays in a wireless channel with dense multipath effect, as well as difficulties in implementation for their high computation complexity. In this paper, we propose a novel TDOA algorithm with super resolution based on a multi-dimensional cross-correlation function: the Volume Cross-Correlation Function (VCC). The proposed TDOA algorithm has excellent time resolution capability in multipath environment, and it also has a much lower computational complexity. Because our algorithm does not require priori knowledge about the waveform or power spectrum of transmitted signals, it has great potential of usage in various passive wireless localization systems. Numerical simulations is also provided to demonstrate the validity of our conclusion.
[ { "version": "v1", "created": "Tue, 10 Feb 2015 07:36:41 GMT" }, { "version": "v2", "created": "Tue, 25 Aug 2015 21:00:15 GMT" }, { "version": "v3", "created": "Mon, 9 Nov 2015 14:53:21 GMT" } ]
2016-11-03T00:00:00
[ [ "Shi", "Hailong", "" ], [ "Zhang", "Hao", "" ], [ "Wang", "Xiqin", "" ] ]
new_dataset
0.987999
1601.07661
Bolun Cai
Bolun Cai, Xiangmin Xu, Kui Jia, Chunmei Qing and Dacheng Tao
DehazeNet: An End-to-End System for Single Image Haze Removal
null
null
10.1109/TIP.2016.2598681
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Single image haze removal is a challenging ill-posed problem. Existing methods use various constraints/priors to get plausible dehazing solutions. The key to achieve haze removal is to estimate a medium transmission map for an input hazy image. In this paper, we propose a trainable end-to-end system called DehazeNet, for medium transmission estimation. DehazeNet takes a hazy image as input, and outputs its medium transmission map that is subsequently used to recover a haze-free image via atmospheric scattering model. DehazeNet adopts Convolutional Neural Networks (CNN) based deep architecture, whose layers are specially designed to embody the established assumptions/priors in image dehazing. Specifically, layers of Maxout units are used for feature extraction, which can generate almost all haze-relevant features. We also propose a novel nonlinear activation function in DehazeNet, called Bilateral Rectified Linear Unit (BReLU), which is able to improve the quality of recovered haze-free image. We establish connections between components of the proposed DehazeNet and those used in existing methods. Experiments on benchmark images show that DehazeNet achieves superior performance over existing methods, yet keeps efficient and easy to use.
[ { "version": "v1", "created": "Thu, 28 Jan 2016 06:32:22 GMT" }, { "version": "v2", "created": "Tue, 17 May 2016 08:03:18 GMT" } ]
2016-11-03T00:00:00
[ [ "Cai", "Bolun", "" ], [ "Xu", "Xiangmin", "" ], [ "Jia", "Kui", "" ], [ "Qing", "Chunmei", "" ], [ "Tao", "Dacheng", "" ] ]
new_dataset
0.999627
1602.02720
Mykhail Uss Ph.D.
M.L. Uss, B. Vozel, V.V. Lukin, K. Chehdi
Multimodal Remote Sensing Image Registration with Accuracy Estimation at Local and Global Scales
48 pages, 8 figures, 5 tables, 51 references Revised arguments in sections 2 and 3. Additional test cases added in Section 4; comparison with the state-of-the-art improved. References added. Conclusions unchanged. Proofread
null
10.1109/TGRS.2016.2587321
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper focuses on potential accuracy of remote sensing images registration. We investigate how this accuracy can be estimated without ground truth available and used to improve registration quality of mono- and multi-modal pair of images. At the local scale of image fragments, the Cramer-Rao lower bound (CRLB) on registration error is estimated for each local correspondence between coarsely registered pair of images. This CRLB is defined by local image texture and noise properties. Opposite to the standard approach, where registration accuracy is only evaluated at the output of the registration process, such valuable information is used by us as an additional input knowledge. It greatly helps detecting and discarding outliers and refining the estimation of geometrical transformation model parameters. Based on these ideas, a new area-based registration method called RAE (Registration with Accuracy Estimation) is proposed. In addition to its ability to automatically register very complex multimodal image pairs with high accuracy, the RAE method provides registration accuracy at the global scale as covariance matrix of estimation error of geometrical transformation model parameters or as point-wise registration Standard Deviation. This accuracy does not depend on any ground truth availability and characterizes each pair of registered images individually. Thus, the RAE method can identify image areas for which a predefined registration accuracy is guaranteed. The RAE method is proved successful with reaching subpixel accuracy while registering eight complex mono/multimodal and multitemporal image pairs including optical to optical, optical to radar, optical to Digital Elevation Model (DEM) images and DEM to radar cases. Other methods employed in comparisons fail to provide in a stable manner accurate results on the same test cases.
[ { "version": "v1", "created": "Mon, 8 Feb 2016 20:05:42 GMT" }, { "version": "v2", "created": "Wed, 25 May 2016 20:16:54 GMT" } ]
2016-11-03T00:00:00
[ [ "Uss", "M. L.", "" ], [ "Vozel", "B.", "" ], [ "Lukin", "V. V.", "" ], [ "Chehdi", "K.", "" ] ]
new_dataset
0.997951
1607.00494
Mehdi Korki
Hadi Zayyani, Farzan Haddadi, and Mehdi Korki
Double-detector for Sparse Signal Detection from One Bit Compressed Sensing Measurements
5 pages, 4 figures
null
10.1109/LSP.2016.2613898
null
cs.IT math.IT stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter presents the sparse vector signal detection from one bit compressed sensing measurements, in contrast to the previous works which deal with scalar signal detection. In this letter, available results are extended to the vector case and the GLRT detector and the optimal quantizer design are obtained. Also, a double-detector scheme is introduced in which a sensor level threshold detector is integrated into network level GLRT to improve the performance. The detection criteria of oracle and clairvoyant detectors are also derived. Simulation results show that with careful design of the threshold detector, the overall detection performance of double-detector scheme would be better than the sign-GLRT proposed in [1] and close to oracle and clairvoyant detectors. Also, the proposed detector is applied to spectrum sensing and the results are near the well known energy detector which uses the real valued data while the proposed detector only uses the sign of the data.
[ { "version": "v1", "created": "Sat, 2 Jul 2016 11:51:25 GMT" } ]
2016-11-03T00:00:00
[ [ "Zayyani", "Hadi", "" ], [ "Haddadi", "Farzan", "" ], [ "Korki", "Mehdi", "" ] ]
new_dataset
0.973202
1609.02077
Guanbin Li
Guanbin Li and Yizhou Yu
Visual Saliency Detection Based on Multiscale Deep CNN Features
Accepted for publication in IEEE Transactions on Image Processing
null
10.1109/TIP.2016.2602079
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visual saliency is a fundamental problem in both cognitive and computational sciences, including computer vision. In this paper, we discover that a high-quality visual saliency model can be learned from multiscale features extracted using deep convolutional neural networks (CNNs), which have had many successes in visual recognition tasks. For learning such saliency models, we introduce a neural network architecture, which has fully connected layers on top of CNNs responsible for feature extraction at three different scales. The penultimate layer of our neural network has been confirmed to be a discriminative high-level feature vector for saliency detection, which we call deep contrast feature. To generate a more robust feature, we integrate handcrafted low-level features with our deep contrast feature. To promote further research and evaluation of visual saliency models, we also construct a new large database of 4447 challenging images and their pixelwise saliency annotations. Experimental results demonstrate that our proposed method is capable of achieving state-of-the-art performance on all public benchmarks, improving the F- measure by 6.12% and 10.0% respectively on the DUT-OMRON dataset and our new dataset (HKU-IS), and lowering the mean absolute error by 9% and 35.3% respectively on these two datasets.
[ { "version": "v1", "created": "Wed, 7 Sep 2016 17:13:16 GMT" } ]
2016-11-03T00:00:00
[ [ "Li", "Guanbin", "" ], [ "Yu", "Yizhou", "" ] ]
new_dataset
0.996474
1610.07184
Soumitra Pal
Soumitra Pal, Tingyang Xu, Tianbao Yang, Sanguthevar Rajasekaran, Jinbo Bi
Hybrid-DCA: A Double Asynchronous Approach for Stochastic Dual Coordinate Ascent
null
null
null
null
cs.DC math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In prior works, stochastic dual coordinate ascent (SDCA) has been parallelized in a multi-core environment where the cores communicate through shared memory, or in a multi-processor distributed memory environment where the processors communicate through message passing. In this paper, we propose a hybrid SDCA framework for multi-core clusters, the most common high performance computing environment that consists of multiple nodes each having multiple cores and its own shared memory. We distribute data across nodes where each node solves a local problem in an asynchronous parallel fashion on its cores, and then the local updates are aggregated via an asynchronous across-node update scheme. The proposed double asynchronous method converges to a global solution for $L$-Lipschitz continuous loss functions, and at a linear convergence rate if a smooth convex loss function is used. Extensive empirical comparison has shown that our algorithm scales better than the best known shared-memory methods and runs faster than previous distributed-memory methods. Big datasets, such as one of 280 GB from the LIBSVM repository, cannot be accommodated on a single node and hence cannot be solved by a parallel algorithm. For such a dataset, our hybrid algorithm takes 30 seconds to achieve a duality gap of $10^{-6}$ on 16 nodes each using 8 cores, which is significantly faster than the best known distributed algorithms, such as CoCoA+, that take more than 300 seconds on 16 nodes.
[ { "version": "v1", "created": "Sun, 23 Oct 2016 15:17:43 GMT" }, { "version": "v2", "created": "Wed, 2 Nov 2016 17:50:50 GMT" } ]
2016-11-03T00:00:00
[ [ "Pal", "Soumitra", "" ], [ "Xu", "Tingyang", "" ], [ "Yang", "Tianbao", "" ], [ "Rajasekaran", "Sanguthevar", "" ], [ "Bi", "Jinbo", "" ] ]
new_dataset
0.998621
1611.00377
Pascal Budner
Pascal Budner, Joern Grahl
Collaboration Networks in the Music Industry
12 pages, 5 figures, 6 tables
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recording an album brings singers, producers, musicians, audio engineers, and many other professions together. We know from the press that a few "super"-producers work with many artists. But how does the large-scale social structure of the music industry look like? What is the social network behind the finest albums of all time? In this paper we studied the large-scale structure of music collaborations using the tools of network science. We considered all albums in Rolling Stone Magazine's list of '500 Greatest Albums of All Time' and the '1001 Albums You Must Hear Before You Die' by Robert Dimery. We found that the existing research on collaboration networks is corroborated by the particular collaboration network in the music industry. Furthermore, it has been found that the most important professions of the music industry in terms of connectivity were main artists and engineers.
[ { "version": "v1", "created": "Tue, 1 Nov 2016 20:17:56 GMT" } ]
2016-11-03T00:00:00
[ [ "Budner", "Pascal", "" ], [ "Grahl", "Joern", "" ] ]
new_dataset
0.983365
1611.00576
Florentin Smarandache
W. B. Vasantha Kandasamy, Ilanthenral K, Florentin Smarandache
Strong Neutrosophic Graphs and Subgraph Topological Subspaces
226 pages, many graphs, Europa Belgique, 2016
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this book authors for the first time introduce the notion of strong neutrosophic graphs. They are very different from the usual graphs and neutrosophic graphs. Using these new structures special subgraph topological spaces are defined. Further special lattice graph of subgraphs of these graphs are defined and described. Several interesting properties using subgraphs of a strong neutrosophic graph are obtained. Several open conjectures are proposed. These new class of strong neutrosophic graphs will certainly find applications in Neutrosophic Cognitive Maps (NCM), Neutrosophic Relational Maps (NRM) and Neutrosophic Relational Equations (NRE) with appropriate modifications.
[ { "version": "v1", "created": "Sun, 30 Oct 2016 15:10:55 GMT" } ]
2016-11-03T00:00:00
[ [ "Kandasamy", "W. B. Vasantha", "" ], [ "K", "Ilanthenral", "" ], [ "Smarandache", "Florentin", "" ] ]
new_dataset
0.96745
1611.00578
Miikka Kuutila M.Sc.
Miikka Kuutila, Mika M\"antyl\"a, P\"aivi Raulamo-Jurvanen
Benchmarking Web-testing - Selenium versus Watir and the Choice of Programming Language and Browser
40 pages, 3 figures, 26 tables
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Context: Selenium is claimed to be the most popular software test automation tool. Past academic works have mainly neglected testing tools in favor of more methodological topics. Objective: We investigated the performance of web-testing tools, to provide empirical evidence supporting choices in software test tool selection and configuration. Method: We used 4*5 factorial design to study 20 different configurations for testing a web-store. We studied 5 programming language bindings (C#, Java, Python, and Ruby for Selenium, while Watir supports Ruby only) and 4 browsers (Google Chrome, Internet Explorer, Mozilla Firefox and Opera). Performance was measured with execution time, memory usage, length of the test scripts and stability of the tests. Results: Considering all measures the best configuration was Selenium with Python language binding for Chrome. Selenium with Python bindings was the best option for all browsers. The effect size of the difference between the slowest and fastest configuration was very high (Cohens d=41.5, 91% increase in execution time). Overall Internet Explorer was the fastest browser while having the worst results in the stability. Conclusions: We recommend benchmarking tools before adopting them. Weighting of factors, e.g. how much test stability is one willing to sacrifice for faster performance, affects the decision.
[ { "version": "v1", "created": "Wed, 2 Nov 2016 13:00:08 GMT" } ]
2016-11-03T00:00:00
[ [ "Kuutila", "Miikka", "" ], [ "Mäntylä", "Mika", "" ], [ "Raulamo-Jurvanen", "Päivi", "" ] ]
new_dataset
0.994958
1611.00617
Carlos Lopez
C.F. Lopez, C.-X. Wang and R. Feng
A novel 2D non-stationary wideband massive MIMO channel model
6 pages, 5 figures, conference
IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), Toronto, Canada, Oct. 2016
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a novel two-dimensional (2D) non-stationary wideband geometry-based stochastic model (GBSM) for massive multiple-input multiple-output (MIMO) communication systems is proposed. Key characteristics of massive MIMO channels such as near field effects and cluster evolution along the array are addressed in this model. Near field effects are modelled by a second-order approximation to spherical wavefronts, i.e., parabolic wavefronts, leading to linear drifts of the angles of multipath components (MPCs) and non-stationarity along the array. Cluster evolution along the array involving cluster (dis)appearance and smooth average power variations is considered. Cluster (dis)appearance is modeled by a two-state Markov process and smooth average power variations are modelled by a spatial lognormal process. Statistical properties of the channel model such as time autocorrelation function (ACF), spatial cross-correlation function (CCF), and cluster average power and Rician factor variations over the array are derived. Finally, simulation results are presented and analyzed, demonstrating that parabolic wavefronts and cluster soft evolution are good candidates to model important massive MIMO channel characteristics.
[ { "version": "v1", "created": "Wed, 2 Nov 2016 14:03:28 GMT" } ]
2016-11-03T00:00:00
[ [ "Lopez", "C. F.", "" ], [ "Wang", "C. -X.", "" ], [ "Feng", "R.", "" ] ]
new_dataset
0.986568
1611.00684
Mina Nouredanesh
Mina Nouredanesh, Andrew McCormick, Sunil L. Kukreja and James Tung
Wearable Vision Detection of Environmental Fall Risks using Convolutional Neural Networks
Accepted paper-The 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2016)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a method to detect environmental hazards related to a fall risk using a mobile vision system is proposed. First-person perspective videos are proposed to provide objective evidence on cause and circumstances of perturbed balance during activities of daily living, targeted to seniors. A classification problem was defined with 12 total classes of potential fall risks, including slope changes (e.g., stairs, curbs, ramps) and surfaces (e.g., gravel, grass, concrete). Data was collected using a chest-mounted GoPro camera. We developed a convolutional neural network for automatic feature extraction, reduction, and classification of frames. Initial results, with a mean square error of 8%, are promising.
[ { "version": "v1", "created": "Wed, 2 Nov 2016 16:54:39 GMT" } ]
2016-11-03T00:00:00
[ [ "Nouredanesh", "Mina", "" ], [ "McCormick", "Andrew", "" ], [ "Kukreja", "Sunil L.", "" ], [ "Tung", "James", "" ] ]
new_dataset
0.994049
1611.00708
Mohamad Ali
Mohamad Ali, Hassine Moungla, Mohamed Younis, Ahmed Mehaoua
Inter-WBANs Interference Mitigation Using Orthogonal Walsh Hadamard Codes
2016 27th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Valencia, Spain
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Wireless Body Area Network (WBAN) provides health care services. The performance and utility of WBANs can be degraded due to interference. In this paper, our contribution for co-channel interference mitigation among coexisting WBANs is threefold. First, we propose a distributed orthogonal code allocation scheme, namely, OCAIM, where, each WBAN generates sensor interference lists (SILs), and then all sensors belonging to these lists are allocated orthogonal codes. Secondly, we propose a distributed time reference correlation scheme, namely, DTRC, that is used as a building block of OCAIM. DTRC enables eachWBAN to generate a virtual time-based pattern to relate the different superframes. Accordingly, DTRC provides each WBAN with the knowledge about, 1) which superframes and, 2) which time-slots of those superframes interfere with the time-slots within its superframe. Thirdly, we further analyze the success and collision probabilities of frames transmissions when the number of coexisting WBANs grows. The simulation results demonstrate that OCAIM outperforms other competing schemes in terms of interference mitigation and power savings.
[ { "version": "v1", "created": "Wed, 2 Nov 2016 18:15:19 GMT" } ]
2016-11-03T00:00:00
[ [ "Ali", "Mohamad", "" ], [ "Moungla", "Hassine", "" ], [ "Younis", "Mohamed", "" ], [ "Mehaoua", "Ahmed", "" ] ]
new_dataset
0.994259
1603.07009
Cunsheng Ding
Shuxing Li, Cunsheng Ding, Maosheng Xiong, Gennian Ge
Narrow-Sense BCH Codes over $\gf(q)$ with Length $n=\frac{q^m-1}{q-1}$
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic codes over finite fields are widely employed in communication systems, storage devices and consumer electronics, as they have efficient encoding and decoding algorithms. BCH codes, as a special subclass of cyclic codes, are in most cases among the best cyclic codes. A subclass of good BCH codes are the narrow-sense BCH codes over $\gf(q)$ with length $n=(q^m-1)/(q-1)$. Little is known about this class of BCH codes when $q>2$. The objective of this paper is to study some of the codes within this class. In particular, the dimension, the minimum distance, and the weight distribution of some ternary BCH codes with length $n=(3^m-1)/2$ are determined in this paper. A class of ternary BCH codes meeting the Griesmer bound is identified. An application of some of the BCH codes in secret sharing is also investigated.
[ { "version": "v1", "created": "Tue, 22 Mar 2016 22:12:37 GMT" }, { "version": "v2", "created": "Tue, 1 Nov 2016 15:05:00 GMT" } ]
2016-11-02T00:00:00
[ [ "Li", "Shuxing", "" ], [ "Ding", "Cunsheng", "" ], [ "Xiong", "Maosheng", "" ], [ "Ge", "Gennian", "" ] ]
new_dataset
0.999732
1606.05385
Theo Steininger
T. Steininger, M. Greiner, F. Beaujean, T. En{\ss}lin
D2O - a distributed data object for parallel high-performance computing in Python
null
null
10.1186/s40537-016-0052-5
null
cs.MS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce D2O, a Python module for cluster-distributed multi-dimensional numerical arrays. It acts as a layer of abstraction between the algorithm code and the data-distribution logic. The main goal is to achieve usability without losing numerical performance and scalability. D2O's global interface is similar to the one of a numpy.ndarray, whereas the cluster node's local data is directly accessible for use in customized high-performance modules. D2O is written in pure Python which makes it portable and easy to use and modify. Expensive operations are carried out by dedicated external libraries like numpy and mpi4py. The performance of D2O is on a par with numpy for serial applications and scales well when moving to an MPI cluster. D2O is open-source software available under the GNU General Public License v3 (GPL-3) at https://gitlab.mpcdf.mpg.de/ift/D2O
[ { "version": "v1", "created": "Thu, 16 Jun 2016 23:19:58 GMT" }, { "version": "v2", "created": "Sat, 13 Aug 2016 08:28:59 GMT" } ]
2016-11-02T00:00:00
[ [ "Steininger", "T.", "" ], [ "Greiner", "M.", "" ], [ "Beaujean", "F.", "" ], [ "Enßlin", "T.", "" ] ]
new_dataset
0.996788
1610.08694
Vered Shwartz
Vered Shwartz and Ido Dagan
CogALex-V Shared Task: LexNET - Integrated Path-based and Distributional Method for the Identification of Semantic Relations
5 pages, accepted to the 5th Workshop on Cognitive Aspects of the Lexicon (CogALex-V), in COLING 2016
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a submission to the CogALex 2016 shared task on the corpus-based identification of semantic relations, using LexNET (Shwartz and Dagan, 2016), an integrated path-based and distributional method for semantic relation classification. The reported results in the shared task bring this submission to the third place on subtask 1 (word relatedness), and the first place on subtask 2 (semantic relation classification), demonstrating the utility of integrating the complementary path-based and distributional information sources in recognizing concrete semantic relations. Combined with a common similarity measure, LexNET performs fairly good on the word relatedness task (subtask 1). The relatively low performance of LexNET and all other systems on subtask 2, however, confirms the difficulty of the semantic relation classification task, and stresses the need to develop additional methods for this task.
[ { "version": "v1", "created": "Thu, 27 Oct 2016 10:49:00 GMT" }, { "version": "v2", "created": "Sun, 30 Oct 2016 09:42:41 GMT" }, { "version": "v3", "created": "Tue, 1 Nov 2016 10:10:01 GMT" } ]
2016-11-02T00:00:00
[ [ "Shwartz", "Vered", "" ], [ "Dagan", "Ido", "" ] ]
new_dataset
0.96539
1611.00027
Yasser El-Sonbaty
Mahmoud El-Defrawy, Yasser El-Sonbaty and Nahla A. Belal
CBAS: context based arabic stemmer
null
International Journal on Natural Language Computing (IJNLC) Vol. 4, No.3, June 2015
10.5121/ijnlc.2015.4301
null
cs.CL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Arabic morphology encapsulates many valuable features such as word root. Arabic roots are being utilized for many tasks; the process of extracting a word root is referred to as stemming. Stemming is an essential part of most Natural Language Processing tasks, especially for derivative languages such as Arabic. However, stemming is faced with the problem of ambiguity, where two or more roots could be extracted from the same word. On the other hand, distributional semantics is a powerful co-occurrence model. It captures the meaning of a word based on its context. In this paper, a distributional semantics model utilizing Smoothed Pointwise Mutual Information (SPMI) is constructed to investigate its effectiveness on the stemming analysis task. It showed an accuracy of 81.5%, with a at least 9.4% improvement over other stemmers.
[ { "version": "v1", "created": "Wed, 28 Oct 2015 10:10:51 GMT" } ]
2016-11-02T00:00:00
[ [ "El-Defrawy", "Mahmoud", "" ], [ "El-Sonbaty", "Yasser", "" ], [ "Belal", "Nahla A.", "" ] ]
new_dataset
0.999676
1611.00106
Mirela Damian
Mirela Damian, Erik Demaine, Robin Flatland and Joseph O'Rourke
Unfolding Genus-2 Orthogonal Polyhedra with Linear Refinement
22 pages, 10 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that every orthogonal polyhedron of genus at most 2 can be unfolded without overlap while using only a linear number of orthogonal cuts (parallel to the polyhedron edges). This is the first result on unfolding general orthogonal polyhedra beyond genus-0. Our unfolding algorithm relies on the existence of at most 2 special leaves in what we call the "unfolding tree" (which ties back to the genus), so unfolding polyhedra of genus 3 and beyond requires new techniques.
[ { "version": "v1", "created": "Tue, 1 Nov 2016 02:09:38 GMT" } ]
2016-11-02T00:00:00
[ [ "Damian", "Mirela", "" ], [ "Demaine", "Erik", "" ], [ "Flatland", "Robin", "" ], [ "O'Rourke", "Joseph", "" ] ]
new_dataset
0.985604
1611.00289
Geoffrey Messier
Mohamed Gaafar, and Geoffrey G Messier
Petroleum Refinery Multi-Antenna Propagation Measurements
null
null
10.1109/LAWP.2015.2509641
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the results of the first multi- antenna propagation measurement campaign to be conducted at an operating petroleum refining facility. The measurement equipment transmits pseudo-random noise test signals from two antennas at a 2.47 GHz carrier with a signal bandwidth of approximately 25 MHz. The measurement data is analyzed to extract path loss exponent, shadowing distribution, fading distribution, coherence bandwidth and antenna correlation. The results reveal an environment where large scale attenuation is relatively mild, fading is severe and good performance is expected from both antenna and frequency diversity.
[ { "version": "v1", "created": "Tue, 1 Nov 2016 16:27:31 GMT" } ]
2016-11-02T00:00:00
[ [ "Gaafar", "Mohamed", "" ], [ "Messier", "Geoffrey G", "" ] ]
new_dataset
0.955207
1611.00291
Vikram Krishnamurthy
Vikram Krishnamurthy and Anup Aprem and Sujay Bhatt
Opportunistic Advertisement Scheduling in Live Social Media: A Multiple Stopping Time POMDP Approach
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Live online social broadcasting services like YouTube Live and Twitch have steadily gained popularity due to improved bandwidth, ease of generating content and the ability to earn revenue on the generated content. In contrast to traditional cable television, revenue in online services is generated solely through advertisements, and depends on the number of clicks generated. Channel owners aim to opportunistically schedule advertisements so as to generate maximum revenue. This paper considers the problem of optimal scheduling of advertisements in live online social media. The problem is formulated as a multiple stopping problem and is addressed in a partially observed Markov decision process (POMDP) framework. Structural results are provided on the optimal advertisement scheduling policy. By exploiting the structure of the optimal policy, best linear thresholds are computed using stochastic approximation. The proposed model and framework are validated on real datasets, and the following observations are made: (i) The policy obtained by the multiple stopping problem can be used to detect changes in ground truth from online search data (ii) Numerical results show a significant improvement in the expected revenue by opportunistically scheduling the advertisements. The revenue can be improved by $20-30\%$ in comparison to currently employed periodic scheduling.
[ { "version": "v1", "created": "Tue, 1 Nov 2016 16:48:10 GMT" } ]
2016-11-02T00:00:00
[ [ "Krishnamurthy", "Vikram", "" ], [ "Aprem", "Anup", "" ], [ "Bhatt", "Sujay", "" ] ]
new_dataset
0.962678
1611.00331
Ayush Pandey
Ayush Pandey, Subhamoy Mahajan, Adarsh Kosta, Dhananjay Yadav, Vikas Pandey, Saurav Sahay, Siddharth Jha, Shubh Agarwal, Aashay Bhise, Raushan Kumar, Aniket Bhushan, Vraj Parikh, Ankit Lohani, Saurabh Dash, Himanshu Choudhary, Rahul Kumar, Anurag Sharma, Arnab Mondal, Chendika Karthik Sai, P N Vamshi
Low Cost Autonomous Navigation and Control of a Mechanically Balanced Bicycle with Dual Locomotion Mode
Published in the International Transportation Electrification Conference (ITEC) in 2015 organized by IEEE Industrial Application Society (IAS) and SAE India in Chennai, India
ITEC India, Publication Year : 2015. Pages 1 - 10
10.1109/ITEC-India.2015.7386938
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
On the lines of the huge and varied efforts in the field of automation with respect to technology development and innovation of vehicles to make them run autonomously, this paper presents an innovation to a bicycle. A normal daily use bicycle was modified at low cost such that it runs autonomously, while maintaining its original form i.e. the manual drive. Hence, a bicycle which could be normally driven by any human and with a press of switch could run autonomously according to the needs of the user has been developed.
[ { "version": "v1", "created": "Tue, 1 Nov 2016 18:51:27 GMT" } ]
2016-11-02T00:00:00
[ [ "Pandey", "Ayush", "" ], [ "Mahajan", "Subhamoy", "" ], [ "Kosta", "Adarsh", "" ], [ "Yadav", "Dhananjay", "" ], [ "Pandey", "Vikas", "" ], [ "Sahay", "Saurav", "" ], [ "Jha", "Siddharth", "" ], [ "Agarwal", "Shubh", "" ], [ "Bhise", "Aashay", "" ], [ "Kumar", "Raushan", "" ], [ "Bhushan", "Aniket", "" ], [ "Parikh", "Vraj", "" ], [ "Lohani", "Ankit", "" ], [ "Dash", "Saurabh", "" ], [ "Choudhary", "Himanshu", "" ], [ "Kumar", "Rahul", "" ], [ "Sharma", "Anurag", "" ], [ "Mondal", "Arnab", "" ], [ "Sai", "Chendika Karthik", "" ], [ "Vamshi", "P N", "" ] ]
new_dataset
0.99816
1510.01419
Abbas Razaghpanah
Abbas Razaghpanah, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Phillipa Gill, Mark Allman, Vern Paxson
Haystack: A Multi-Purpose Mobile Vantage Point in User Space
13 pages incl. figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite our growing reliance on mobile phones for a wide range of daily tasks, their operation remains largely opaque. A number of previous studies have addressed elements of this problem in a partial fashion, trading off analytic comprehensiveness and deployment scale. We overcome the barriers to large-scale deployment (e.g., requiring rooted devices) and comprehensiveness of previous efforts by taking a novel approach that leverages the VPN API on mobile devices to design Haystack, an in-situ mobile measurement platform that operates exclusively on the device, providing full access to the device's network traffic and local context without requiring root access. We present the design of Haystack and its implementation in an Android app that we deploy via standard distribution channels. Using data collected from 450 users of the app, we exemplify the advantages of Haystack over the state of the art and demonstrate its seamless experience even under demanding conditions. We also demonstrate its utility to users and researchers in characterizing mobile traffic and privacy risks.
[ { "version": "v1", "created": "Tue, 6 Oct 2015 03:34:04 GMT" }, { "version": "v2", "created": "Tue, 17 May 2016 14:46:40 GMT" }, { "version": "v3", "created": "Sat, 29 Oct 2016 15:45:30 GMT" } ]
2016-11-01T00:00:00
[ [ "Razaghpanah", "Abbas", "" ], [ "Vallina-Rodriguez", "Narseo", "" ], [ "Sundaresan", "Srikanth", "" ], [ "Kreibich", "Christian", "" ], [ "Gill", "Phillipa", "" ], [ "Allman", "Mark", "" ], [ "Paxson", "Vern", "" ] ]
new_dataset
0.998257
1601.07122
Prasanth K. P.
S. B. Balaji, K. P. Prasanth and P. Vijay Kumar
Binary Codes with Locality for Multiple Erasures Having Short Block Length
17 pages, submitted to ISIT 2016
null
10.1109/ISIT.2016.7541380
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The focus of this paper is on linear, binary codes with locality having locality parameter $r$, that are capable of recovering from $t\geq 2$ erasures and that moreover, have short block length. Both sequential and parallel (through orthogonal parity checks) recovery is considered here. In the case of parallel repair, minimum-block-length constructions for general $t$ are discussed. In the case of sequential repair, the results include (a) extending and characterizing minimum-block-length constructions for $t=2$, (b) providing improved bounds on block length for $t=3$ as well as a general construction for $t=3$ having short block length, (c) providing short-block-length constructions for general $r,t$ and (d) providing high-rate constructions for $r=2$ and $t$ in the range $4 \leq t \leq7$. Most of the constructions provided are of binary codes.
[ { "version": "v1", "created": "Tue, 26 Jan 2016 18:09:36 GMT" }, { "version": "v2", "created": "Wed, 27 Jan 2016 18:47:46 GMT" }, { "version": "v3", "created": "Tue, 2 Feb 2016 12:25:49 GMT" } ]
2016-11-01T00:00:00
[ [ "Balaji", "S. B.", "" ], [ "Prasanth", "K. P.", "" ], [ "Kumar", "P. Vijay", "" ] ]
new_dataset
0.960891
1603.03315
Dimitris Papamichail
Dimitris Papamichail, Angela Huang, Andrew Miller, Edward Kennedy, Jan-Lucas Ott, Georgios Papamichail
Most Compact Parsimonious Trees
7 pages, 4 figures, 1 table, submitted for peer review
null
null
null
cs.DS
http://creativecommons.org/licenses/by-nc-sa/4.0/
Construction of phylogenetic trees has traditionally focused on binary trees where all species appear on leaves, a problem for which numerous efficient solutions have been developed. Certain application domains though, such as viral evolution and transmission, paleontology, linguistics, and phylogenetic stemmatics, often require phylogeny inference that involves placing input species on ancestral tree nodes (live phylogeny), and polytomies. These requirements, despite their prevalence, lead to computationally harder algorithmic solutions and have been sparsely examined in the literature to date. In this article we prove some unique properties of most parsimonious live phylogenetic trees with polytomies, and describe novel algorithms to find the such trees without resorting to exhaustive enumeration of all possible tree topologies.
[ { "version": "v1", "created": "Thu, 10 Mar 2016 16:17:33 GMT" }, { "version": "v2", "created": "Sat, 29 Oct 2016 15:41:52 GMT" } ]
2016-11-01T00:00:00
[ [ "Papamichail", "Dimitris", "" ], [ "Huang", "Angela", "" ], [ "Miller", "Andrew", "" ], [ "Kennedy", "Edward", "" ], [ "Ott", "Jan-Lucas", "" ], [ "Papamichail", "Georgios", "" ] ]
new_dataset
0.998828
1605.05757
Menglong Ye
Menglong Ye, Edward Johns, Benjamin Walter, Alexander Meining, Guang-Zhong Yang
Robust Image Descriptors for Real-Time Inter-Examination Retargeting in Gastrointestinal Endoscopy
This paper was presented in MICCAI 2016 conference, and a DOI was linked to the publisher's version
null
10.1007/978-3-319-46720-7_52
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For early diagnosis of malignancies in the gastrointestinal tract, surveillance endoscopy is increasingly used to monitor abnormal tissue changes in serial examinations of the same patient. Despite successes with optical biopsy for in vivo and in situ tissue characterisation, biopsy retargeting for serial examinations is challenging because tissue may change in appearance between examinations. In this paper, we propose an inter-examination retargeting framework for optical biopsy, based on an image descriptor designed for matching between endoscopic scenes over significant time intervals. Each scene is described by a hierarchy of regional intensity comparisons at various scales, offering tolerance to long-term change in tissue appearance whilst remaining discriminative. Binary coding is then used to compress the descriptor via a novel random forests approach, providing fast comparisons in Hamming space and real-time retargeting. Extensive validation conducted on 13 in vivo gastrointestinal videos, collected from six patients, show that our approach outperforms state-of-the-art methods.
[ { "version": "v1", "created": "Wed, 18 May 2016 21:07:35 GMT" }, { "version": "v2", "created": "Sun, 30 Oct 2016 12:19:12 GMT" } ]
2016-11-01T00:00:00
[ [ "Ye", "Menglong", "" ], [ "Johns", "Edward", "" ], [ "Walter", "Benjamin", "" ], [ "Meining", "Alexander", "" ], [ "Yang", "Guang-Zhong", "" ] ]
new_dataset
0.964281
1607.02937
Gabriel Gon\c{c}alves
Gabriel Resende Gon\c{c}alves, Sirlene Pio Gomes da Silva, David Menotti, William Robson Schwartz
Benchmark for License Plate Character Segmentation
32 pages, single column
J. Electron. Imaging. 25(5), 053034 (Oct 24, 2016)
10.1117/1.JEI.25.5.053034
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Automatic License Plate Recognition (ALPR) has been the focus of many researches in the past years. In general, ALPR is divided into the following problems: detection of on-track vehicles, license plates detection, segmention of license plate characters and optical character recognition (OCR). Even though commercial solutions are available for controlled acquisition conditions, e.g., the entrance of a parking lot, ALPR is still an open problem when dealing with data acquired from uncontrolled environments, such as roads and highways when relying only on imaging sensors. Due to the multiple orientations and scales of the license plates captured by the camera, a very challenging task of the ALPR is the License Plate Character Segmentation (LPCS) step, which effectiveness is required to be (near) optimal to achieve a high recognition rate by the OCR. To tackle the LPCS problem, this work proposes a novel benchmark composed of a dataset designed to focus specifically on the character segmentation step of the ALPR within an evaluation protocol. Furthermore, we propose the Jaccard-Centroid coefficient, a new evaluation measure more suitable than the Jaccard coefficient regarding the location of the bounding box within the ground-truth annotation. The dataset is composed of 2,000 Brazilian license plates consisting of 14,000 alphanumeric symbols and their corresponding bounding box annotations. We also present a new straightforward approach to perform LPCS efficiently. Finally, we provide an experimental evaluation for the dataset based on four LPCS approaches and demonstrate the importance of character segmentation for achieving an accurate OCR.
[ { "version": "v1", "created": "Mon, 11 Jul 2016 13:32:19 GMT" }, { "version": "v2", "created": "Mon, 31 Oct 2016 16:11:21 GMT" } ]
2016-11-01T00:00:00
[ [ "Gonçalves", "Gabriel Resende", "" ], [ "da Silva", "Sirlene Pio Gomes", "" ], [ "Menotti", "David", "" ], [ "Schwartz", "William Robson", "" ] ]
new_dataset
0.999821
1610.09480
Manuel Mazzara
Dilshat Salikhov, Kevin Khanda, Kamill Gusmanov, Manuel Mazzara, Nikolaos Mavridis
Microservice-based IoT for Smart Buildings
null
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A large percentage of buildings in domestic or special-purpose is expected to become increasingly "smarter" in the future, due to the immense benefits in terms of energy saving, safety, flexibility, and comfort, that relevant new technologies offer. As concerns hardware, software, or platform level, however, no clearly dominant standards currently exist. Such standards, would ideally, fulfill a number of important desiderata, which are to be touched upon in this paper. Here, we will present a prototype platform for supporting multiple concurrent applications for smart buildings, which is utilizing an advanced sensor network as well as a distributed microservices architecture, centrally featuring the Jolie programming language. The architecture and benefits of our system are discussed, as well as a prototype containing a number of nodes and a user interface, deployed in a real-world academic building environment. Our results illustrate the promising nature of our approach, as well as open avenues for future work towards its wider and larger scale applicability.
[ { "version": "v1", "created": "Sat, 29 Oct 2016 09:51:50 GMT" } ]
2016-11-01T00:00:00
[ [ "Salikhov", "Dilshat", "" ], [ "Khanda", "Kevin", "" ], [ "Gusmanov", "Kamill", "" ], [ "Mazzara", "Manuel", "" ], [ "Mavridis", "Nikolaos", "" ] ]
new_dataset
0.998481
1610.09511
Nalin Asanka Gamagedara Arachchilage
Nalin Asanka Gamagedara Arachchilage
Serious Games for Cyber Security Education
244, LAP LAMBERT Academic Publishing, 2016
null
null
null
cs.CY cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Phishing is an online identity theft that aims to steal sensitive information such as username, passwords and online banking details from its victims. Phishing education needs to be considered as a means to combat this threat. This book focuses on a design and development of a mobile game prototype as an educational tool helping computer users to protect themselves against phishing attacks. The elements of a game design framework for avoiding phishing attacks were used to address the game design issues. The mobile game design aimed to enhance the user's avoidance behaviour through motivation to protect themselves against phishing threats. A think-aloud study was conducted, along with a pre- and post-test, to assess the game design framework through the developed mobile game prototype. The study results showed a significant improvement of participants' phishing avoidance behaviour in their post-test assessment. Furthermore, the study findings suggest that participants' threat perception, safeguard effectiveness, self-efficacy, perceived severity and perceived susceptibility elements positively impact threat avoidance behaviour, whereas safeguard cost had a negative impact on it.
[ { "version": "v1", "created": "Sat, 29 Oct 2016 13:56:16 GMT" } ]
2016-11-01T00:00:00
[ [ "Arachchilage", "Nalin Asanka Gamagedara", "" ] ]
new_dataset
0.995516
1610.09513
Daniel Neil
Daniel Neil, Michael Pfeiffer, and Shih-Chii Liu
Phased LSTM: Accelerating Recurrent Network Training for Long or Event-based Sequences
Selected for an oral presentation at NIPS, 2016
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recurrent Neural Networks (RNNs) have become the state-of-the-art choice for extracting patterns from temporal sequences. However, current RNN models are ill-suited to process irregularly sampled data triggered by events generated in continuous time by sensors or other neurons. Such data can occur, for example, when the input comes from novel event-driven artificial sensors that generate sparse, asynchronous streams of events or from multiple conventional sensors with different update intervals. In this work, we introduce the Phased LSTM model, which extends the LSTM unit by adding a new time gate. This gate is controlled by a parametrized oscillation with a frequency range that produces updates of the memory cell only during a small percentage of the cycle. Even with the sparse updates imposed by the oscillation, the Phased LSTM network achieves faster convergence than regular LSTMs on tasks which require learning of long sequences. The model naturally integrates inputs from sensors of arbitrary sampling rates, thereby opening new areas of investigation for processing asynchronous sensory events that carry timing information. It also greatly improves the performance of LSTMs in standard RNN applications, and does so with an order-of-magnitude fewer computes at runtime.
[ { "version": "v1", "created": "Sat, 29 Oct 2016 14:05:10 GMT" } ]
2016-11-01T00:00:00
[ [ "Neil", "Daniel", "" ], [ "Pfeiffer", "Michael", "" ], [ "Liu", "Shih-Chii", "" ] ]
new_dataset
0.998146
1610.09516
Sanjaya Wijeratne
Lakshika Balasuriya, Sanjaya Wijeratne, Derek Doran, Amit Sheth
Finding Street Gang Members on Twitter
8 pages, 9 figures, 2 tables, Published as a full paper at 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2016)
The 2016 IEEE/ACM Int. Conf. on Advances in Social Networks Analysis and Mining. vol. 8, pp. 685-692. San Francisco, CA, USA (2016)
null
null
cs.SI cs.CL cs.CY cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most street gang members use Twitter to intimidate others, to present outrageous images and statements to the world, and to share recent illegal activities. Their tweets may thus be useful to law enforcement agencies to discover clues about recent crimes or to anticipate ones that may occur. Finding these posts, however, requires a method to discover gang member Twitter profiles. This is a challenging task since gang members represent a very small population of the 320 million Twitter users. This paper studies the problem of automatically finding gang members on Twitter. It outlines a process to curate one of the largest sets of verifiable gang member profiles that have ever been studied. A review of these profiles establishes differences in the language, images, YouTube links, and emojis gang members use compared to the rest of the Twitter population. Features from this review are used to train a series of supervised classifiers. Our classifier achieves a promising F1 score with a low false positive rate.
[ { "version": "v1", "created": "Sat, 29 Oct 2016 14:30:57 GMT" } ]
2016-11-01T00:00:00
[ [ "Balasuriya", "Lakshika", "" ], [ "Wijeratne", "Sanjaya", "" ], [ "Doran", "Derek", "" ], [ "Sheth", "Amit", "" ] ]
new_dataset
0.964878
1610.09606
Wulin Zou
Wulin Zou, Zhuo Yang, Wen Tan, Meng Wang, Jingtai Liu, Ningbo Yu
Impedance control of a cable-driven series elastic actuator with the 2-DOF control structure
6 pages, IROS2016, Accepted
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Series elastic actuators (SEAs) are growingly important in physical human-robot interaction (HRI) due to their inherent safety and compliance. Cable-driven SEAs also allow flexible installation and remote torque transmission, etc. However, there are still challenges for the impedance control of cable-driven SEAs, such as the reduced bandwidth caused by the elastic component, and the performance balance between reference tracking and robustness. In this paper, a velocity sourced cable-driven SEA has been set up. Then, a stabilizing 2 degrees of freedom (2-DOF) control approach was designed to separately pursue the goals of robustness and torque tracking. Further, the impedance control structure for human-robot interaction was designed and implemented with a torque compensator. Both simulation and practical experiments have validated the efficacy of the 2-DOF method for the control of cable-driven SEAs.
[ { "version": "v1", "created": "Sun, 30 Oct 2016 05:38:39 GMT" } ]
2016-11-01T00:00:00
[ [ "Zou", "Wulin", "" ], [ "Yang", "Zhuo", "" ], [ "Tan", "Wen", "" ], [ "Wang", "Meng", "" ], [ "Liu", "Jingtai", "" ], [ "Yu", "Ningbo", "" ] ]
new_dataset
0.984514