id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1610.09609
|
Keyu Lu
|
Keyu Lu and Jian Li and Xiangjing An and Hangen He
|
Generalized Haar Filter based Deep Networks for Real-Time Object
Detection in Traffic Scene
| null | null | null | null |
cs.CV cs.AI cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vision-based object detection is one of the fundamental functions in numerous
traffic scene applications such as self-driving vehicle systems and advance
driver assistance systems (ADAS). However, it is also a challenging task due to
the diversity of traffic scene and the storage, power and computing source
limitations of the platforms for traffic scene applications. This paper
presents a generalized Haar filter based deep network which is suitable for the
object detection tasks in traffic scene. In this approach, we first decompose a
object detection task into several easier local regression tasks. Then, we
handle the local regression tasks by using several tiny deep networks which
simultaneously output the bounding boxes, categories and confidence scores of
detected objects. To reduce the consumption of storage and computing resources,
the weights of the deep networks are constrained to the form of generalized
Haar filter in training phase. Additionally, we introduce the strategy of
sparse windows generation to improve the efficiency of the algorithm. Finally,
we perform several experiments to validate the performance of our proposed
approach. Experimental results demonstrate that the proposed approach is both
efficient and effective in traffic scene compared with the state-of-the-art.
|
[
{
"version": "v1",
"created": "Sun, 30 Oct 2016 07:02:57 GMT"
}
] | 2016-11-01T00:00:00 |
[
[
"Lu",
"Keyu",
""
],
[
"Li",
"Jian",
""
],
[
"An",
"Xiangjing",
""
],
[
"He",
"Hangen",
""
]
] |
new_dataset
| 0.995375 |
1610.09626
|
Chuang Zhang
|
Chuang Zhang, Dongning Guo, Pingyi Fan
|
Mobile Millimeter Wave Channel Acquisition, Tracking, and Abrupt Change
Detection
|
This paper is submitted
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Millimeter wave provides a promising approach for meeting the ever-growing
traffic demand in next generation wireless networks. It is crucial to obtain
relatively accurate channel state information so that beamforming/combining can
be performed to compensate for severe path loss in this band. In contrast to
lower frequencies, a typical mobile millimeter wave channel consists of a few
dominant paths. It is generally sufficient to estimate the path gains, angles
of departure (AoD), and angles of arrival (AoA) of those paths. In this paper,
multiple transmit and receive antennas and beamforming with a single baseband
processing chain are assumed. We propose a framework for estimating millimeter
wave channels with intermittent abrupt changes (e.g., blockage or emergence of
dominant paths) and slow variations of AoDs and AoAs. The solution consists of
three components: tracking of the slow channel variations, detection of abrupt
changes, followed by (re-)acquisition of channel (and back to the tracking
stage). For acquisition, we formulate a least squares problem and find its
solution based on the Levenberg-Marquardt algorithm. To track slow variations
of AoDs and AoAs, we propose a new approach using Kalman filtering. Finally, an
algorithm based on a likelihood test is devised for detecting abrupt changes.
Simulation results show that, with moderate signal-to-noise ratios, the
proposed scheme can achieve more than 8 dB higher estimation accuracy than
several other methods using the same number of pilots.
|
[
{
"version": "v1",
"created": "Sun, 30 Oct 2016 10:30:40 GMT"
}
] | 2016-11-01T00:00:00 |
[
[
"Zhang",
"Chuang",
""
],
[
"Guo",
"Dongning",
""
],
[
"Fan",
"Pingyi",
""
]
] |
new_dataset
| 0.999667 |
1610.09786
|
Abhijnan Chakraborty
|
Abhijnan Chakraborty, Bhargavi Paranjape, Sourya Kakarla, Niloy
Ganguly
|
Stop Clickbait: Detecting and Preventing Clickbaits in Online News Media
|
2016 IEEE/ACM International Conference on Advances in Social Networks
Analysis and Mining (ASONAM)
| null | null | null |
cs.SI cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most of the online news media outlets rely heavily on the revenues generated
from the clicks made by their readers, and due to the presence of numerous such
outlets, they need to compete with each other for reader attention. To attract
the readers to click on an article and subsequently visit the media site, the
outlets often come up with catchy headlines accompanying the article links,
which lure the readers to click on the link. Such headlines are known as
Clickbaits. While these baits may trick the readers into clicking, in the long
run, clickbaits usually don't live up to the expectation of the readers, and
leave them disappointed.
In this work, we attempt to automatically detect clickbaits and then build a
browser extension which warns the readers of different media sites about the
possibility of being baited by such headlines. The extension also offers each
reader an option to block clickbaits she doesn't want to see. Then, using such
reader choices, the extension automatically blocks similar clickbaits during
her future visits. We run extensive offline and online experiments across
multiple media sites and find that the proposed clickbait detection and the
personalized blocking approaches perform very well achieving 93% accuracy in
detecting and 89% accuracy in blocking clickbaits.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2016 04:51:48 GMT"
}
] | 2016-11-01T00:00:00 |
[
[
"Chakraborty",
"Abhijnan",
""
],
[
"Paranjape",
"Bhargavi",
""
],
[
"Kakarla",
"Sourya",
""
],
[
"Ganguly",
"Niloy",
""
]
] |
new_dataset
| 0.995601 |
1610.09877
|
Shuai Wang
|
Zhigang Wen, Shuai Wang, Chunxiao Fan and Weidong Xiang
|
Joint Transceiver and Power Splitter Design Over Two-Way Relaying
Channel with Lattice Codes and Energy Harvesting
|
This version corrects some errors in the published letter
|
IEEE Communications Letters, vol. 18, no. 11, pp. 2039-2042
|
10.1109/LCOMM.2014.2358638
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This letter considers a compute-and-forward two-way relaying channel with
simultaneous wireless information and power transfer. Specifically, two
single-antenna users exchange information via a multi-antenna relay station
based on nested lattice codes. Meanwhile, wireless energies flow from the relay
to users for circuit consumption and uplink transmission. Based on this model,
an optimization problem is formulated to minimize the transmit power at relay,
while guaranteeing the minimal transmission rate at each user. To solve the
problem, we propose an efficient iterative algorithm to jointly optimize the
transmitter, receiver and power splitter, based on semi-definite relaxation and
semi-definite programming. Numerical results of relay transmission powers
validate our analysis.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2016 11:42:20 GMT"
}
] | 2016-11-01T00:00:00 |
[
[
"Wen",
"Zhigang",
""
],
[
"Wang",
"Shuai",
""
],
[
"Fan",
"Chunxiao",
""
],
[
"Xiang",
"Weidong",
""
]
] |
new_dataset
| 0.989847 |
1610.10008
|
Christina Vlachou
|
Christina Vlachou, Albert Banchs, Julien Herzen, Patrick Thiran
|
How CSMA/CA With Deferral Affects Performance and Dynamics in Power-Line
Communications
|
To appear, IEEE/ACM Transactions on Networking 2017
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Power-line communications (PLC) are becoming a key component in home
networking, because they provide easy and high-throughput connectivity. The
dominant MAC protocol for high data-rate PLC, the IEEE 1901, employs a CSMA/CA
mechanism similar to the backoff process of 802.11. Existing performance
evaluation studies of this protocol assume that the backoff processes of the
stations are independent (the so-called decoupling assumption). However, in
contrast to 802.11, 1901 stations can change their state after sensing the
medium busy, which is regulated by the so-called deferral counter. This
mechanism introduces strong coupling between the stations and, as a result,
makes existing analyses inaccurate. In this paper, we propose a performance
model for 1901, which does not rely on the decoupling assumption. We prove that
our model admits a unique solution for a wide range of configurations and
confirm the accuracy of the model using simulations. Our results show that we
outperform current models based on the decoupling assumption. In addition to
evaluating the performance in steady state, we further study the transient
dynamics of 1901, which is also affected by the deferral counter.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2016 16:45:20 GMT"
}
] | 2016-11-01T00:00:00 |
[
[
"Vlachou",
"Christina",
""
],
[
"Banchs",
"Albert",
""
],
[
"Herzen",
"Julien",
""
],
[
"Thiran",
"Patrick",
""
]
] |
new_dataset
| 0.956739 |
1610.10033
|
Pia Bideau
|
Pia Bideau and Erik Learned-Miller
|
A Detailed Rubric for Motion Segmentation
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motion segmentation is currently an active area of research in computer
Vision. The task of comparing different methods of motion segmentation is
complicated by the fact that researchers may use subtly different definitions
of the problem. Questions such as "Which objects are moving?", "What is
background?", and "How can we use motion of the camera to segment objects,
whether they are static or moving?" are clearly related to each other, but lead
to different algorithms, and imply different versions of the ground truth. This
report has two goals. The first is to offer a precise definition of motion
segmentation so that the intent of an algorithm is as well-defined as possible.
The second is to report on new versions of three previously existing data sets
that are compatible with this definition. We hope that this more detailed
definition, and the three data sets that go with it, will allow more meaningful
comparisons of certain motion segmentation methods.
|
[
{
"version": "v1",
"created": "Mon, 31 Oct 2016 17:57:23 GMT"
}
] | 2016-11-01T00:00:00 |
[
[
"Bideau",
"Pia",
""
],
[
"Learned-Miller",
"Erik",
""
]
] |
new_dataset
| 0.998544 |
1401.2732
|
Rourab Paul
|
Rourab Paul, Amlan Chakrabarti, Ranjan Ghosh
|
Fault Detection for RC4 Algorithm and its Implementation on FPGA
Platform
|
Published Book Title: Elsevier Science and Technology, ICCN 2013,
Bangalore, Page(s): 224 - 232, Volume 3, DOI-03.elsevierst.2013.3.ICCN25,
ISBN :9789351071044
| null | null | null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In hardware implementation of a cryptographic algorithm, one may achieve
leakage of secret information by creating scopes to introduce controlled faulty
bit(s) even though the algorithm is mathematically a secured one. The technique
is very effective in respect of crypto processors embedded in smart cards. In
this paper few fault detecting architectures for RC4 algorithm are designed and
implemented on Virtex5(ML505, LX110t) FPGA board. The results indicate that the
proposed architectures can handle most of the faults without loss of throughput
consuming marginally additional hardware and power.
|
[
{
"version": "v1",
"created": "Mon, 13 Jan 2014 07:19:52 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Paul",
"Rourab",
""
],
[
"Chakrabarti",
"Amlan",
""
],
[
"Ghosh",
"Ranjan",
""
]
] |
new_dataset
| 0.988919 |
1502.06945
|
Abidin Kaya
|
Abidin Kaya, Nesibe T\"ufek\c{c}\.i
|
New extremal binary self-dual codes of lengths 66 and 68 from codes over
r_k,m
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, four circulant and quadratic double circulant (QDC)
constructions are applied to the family of the rings R_k,m. Self-dual binary
codes are obtained as the Gray images of self-dual QDC codes over R_k,m.
Extremal binary self-dual codes of length 64 are obtained as Gray images of
?-four circulant codes over R_2,1 and R_2,2. Extremal binary self-dual codes of
lengths 66 and 68 are constructed by applying extension theorems to the F_2 and
R_2,1 images of these codes. More precisely, 11 new codes of length 66 and 39
new codes of length 68 are discovered. The codes with these weight enumerators
are constructed for the first time in literature. The results are tabulated.
|
[
{
"version": "v1",
"created": "Tue, 24 Feb 2015 20:36:26 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Kaya",
"Abidin",
""
],
[
"Tüfekçi",
"Nesibe",
""
]
] |
new_dataset
| 0.999457 |
1509.01822
|
Anatoly Khina
|
Anatoly Khina, Yuval Kochman, Ashish Khisti
|
The MIMO Wiretap Channel Decomposed
|
Submitted to IEEE Transactions on Information Theory Aug. 2015;
revised Oct. 2016
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of sending a secret message over the Gaussian multiple-input
multiple-output (MIMO) wiretap channel is studied. While the capacity of this
channel is known, it is not clear how to construct optimal coding schemes that
achieve this capacity. In this work, we use linear operations along with
successive interference cancellation to attain effective parallel
single-antenna wiretap channels. By using independent scalar Gaussian wiretap
codebooks over the resulting parallel channels, the capacity of the MIMO
wiretap channel is achieved. The derivation of the schemes is based upon joint
triangularization of the channel matrices. We find that the same technique can
be used to re-derive capacity expressions for the MIMO wiretap channel in a way
that is simple and closely connected to a transmission scheme. This technique
allows to extend the previously proven strong security for scalar Gaussian
channels to the MIMO case. We further consider the problem of transmitting
confidential messages over a two-user broadcast MIMO channel. For that problem,
we find that derivation of both the capacity and a transmission scheme is a
direct corollary of the proposed analysis for the MIMO wiretap channel.
|
[
{
"version": "v1",
"created": "Sun, 6 Sep 2015 15:45:29 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Oct 2016 23:30:19 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Khina",
"Anatoly",
""
],
[
"Kochman",
"Yuval",
""
],
[
"Khisti",
"Ashish",
""
]
] |
new_dataset
| 0.992381 |
1606.08513
|
Tomasz Jurczyk
|
Tomasz Jurczyk, Michael Zhai, Jinho D. Choi
|
SelQA: A New Benchmark for Selection-based Question Answering
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a new selection-based question answering dataset, SelQA.
The dataset consists of questions generated through crowdsourcing and sentence
length answers that are drawn from the ten most prevalent topics in the English
Wikipedia. We introduce a corpus annotation scheme that enhances the generation
of large, diverse, and challenging datasets by explicitly aiming to reduce word
co-occurrences between the question and answers. Our annotation scheme is
composed of a series of crowdsourcing tasks with a view to more effectively
utilize crowdsourcing in the creation of question answering datasets in various
domains. Several systems are compared on the tasks of answer sentence selection
and answer triggering, providing strong baseline results for future work to
improve upon.
|
[
{
"version": "v1",
"created": "Mon, 27 Jun 2016 23:48:16 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Oct 2016 16:36:02 GMT"
},
{
"version": "v3",
"created": "Fri, 28 Oct 2016 01:20:19 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Jurczyk",
"Tomasz",
""
],
[
"Zhai",
"Michael",
""
],
[
"Choi",
"Jinho D.",
""
]
] |
new_dataset
| 0.999208 |
1607.02046
|
Gr\'egory Rogez
|
Gr\'egory Rogez and Cordelia Schmid
|
MoCap-guided Data Augmentation for 3D Pose Estimation in the Wild
|
9 pages, accepted to appear in NIPS 2016
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses the problem of 3D human pose estimation in the wild. A
significant challenge is the lack of training data, i.e., 2D images of humans
annotated with 3D poses. Such data is necessary to train state-of-the-art CNN
architectures. Here, we propose a solution to generate a large set of
photorealistic synthetic images of humans with 3D pose annotations. We
introduce an image-based synthesis engine that artificially augments a dataset
of real images with 2D human pose annotations using 3D Motion Capture (MoCap)
data. Given a candidate 3D pose our algorithm selects for each joint an image
whose 2D pose locally matches the projected 3D pose. The selected images are
then combined to generate a new synthetic image by stitching local image
patches in a kinematically constrained manner. The resulting images are used to
train an end-to-end CNN for full-body 3D pose estimation. We cluster the
training data into a large number of pose classes and tackle pose estimation as
a K-way classification problem. Such an approach is viable only with large
training sets such as ours. Our method outperforms the state of the art in
terms of 3D pose estimation in controlled environments (Human3.6M) and shows
promising results for in-the-wild images (LSP). This demonstrates that CNNs
trained on artificial images generalize well to real images.
|
[
{
"version": "v1",
"created": "Thu, 7 Jul 2016 15:30:05 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Oct 2016 12:43:51 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Rogez",
"Grégory",
""
],
[
"Schmid",
"Cordelia",
""
]
] |
new_dataset
| 0.962776 |
1609.08777
|
Kazuya Kawakami
|
Kazuya Kawakami, Chris Dyer, Bryan R. Routledge, Noah A. Smith
|
Character Sequence Models for ColorfulWords
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a neural network architecture to predict a point in color space
from the sequence of characters in the color's name. Using large scale
color--name pairs obtained from an online color design forum, we evaluate our
model on a "color Turing test" and find that, given a name, the colors
predicted by our model are preferred by annotators to color names created by
humans. Our datasets and demo system are available online at colorlab.us.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2016 05:41:18 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Oct 2016 16:08:36 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Kawakami",
"Kazuya",
""
],
[
"Dyer",
"Chris",
""
],
[
"Routledge",
"Bryan R.",
""
],
[
"Smith",
"Noah A.",
""
]
] |
new_dataset
| 0.970963 |
1610.02085
|
Tim Althoff
|
Tim Althoff, Ryen W. White, Eric Horvitz
|
Influence of Pok\'emon Go on Physical Activity: Study and Implications
| null | null | null | null |
cs.CY cs.HC cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Physical activity helps people maintain a healthy weight and reduces the risk
for several chronic diseases. Although this knowledge is widely recognized,
adults and children in many countries around the world do not get recommended
amounts of physical activity. While many interventions are found to be
ineffective at increasing physical activity or reaching inactive populations,
there have been anecdotal reports of increased physical activity due to novel
mobile games that embed game play in the physical world. The most recent and
salient example of such a game is Pok\'emon Go, which has reportedly reached
tens of millions of users in the US and worldwide.
We study the effect of Pok\'emon Go on physical activity through a
combination of signals from large-scale corpora of wearable sensor data and
search engine logs for 32 thousand users over a period of three months.
Pok\'emon Go players are identified through search engine queries and activity
is measured through accelerometry. We find that Pok\'emon Go leads to
significant increases in physical activity over a period of 30 days, with
particularly engaged users (i.e., those making multiple search queries for
details about game usage) increasing their activity by 1473 steps a day on
average, a more than 25% increase compared to their prior activity level
($p<10^{-15}$). In the short time span of the study, we estimate that Pok\'emon
Go has added a total of 144 billion steps to US physical activity. Furthermore,
Pok\'emon Go has been able to increase physical activity across men and women
of all ages, weight status, and prior activity levels showing this form of game
leads to increases in physical activity with significant implications for
public health. We find that Pok\'emon Go is able to reach low activity
populations while all four leading mobile health apps studied in this work
largely draw from an already very active population.
|
[
{
"version": "v1",
"created": "Thu, 6 Oct 2016 21:58:00 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Oct 2016 00:50:50 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Althoff",
"Tim",
""
],
[
"White",
"Ryen W.",
""
],
[
"Horvitz",
"Eric",
""
]
] |
new_dataset
| 0.952194 |
1610.09054
|
Ahmed Abotabl
|
Ahmed Abotabl and Aria Nosratinia
|
Broadcast Coded Modulation: Multilevel and Bit-interleaved Construction
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The capacity of the AWGN broadcast channel is achieved by superposition
coding, but superposition of individual coded modulations expands the
modulation alphabet and distorts its configuration. Coded modulation over a
broadcast channel subject to a specific channel-input modulation constraint
remains an important open problem. Some progress has been made in the related
area of unequal-error protection modulations which can be considered
single-user broadcast transmission, but it does not approach all points on the
boundary of the capacity region. This paper studies broadcast coded modulation
using multilevel coding (MLC) subject to a specific channel input
constellation. The conditions under which multilevel codes can achieve the
constellation-constrained capacity of the AWGN broadcast channel are derived.
For any given constellation, we propose a pragmatic multilevel design technique
with near constellation-constrained-capacity performance where the coupling of
the superposition inner and outer codes are localized to each bit-level. It is
shown that this can be further relaxed to a code coupling on only one bit
level, with little or no penalty under natural labeling. The rate allocation
problem between the bit levels of the two users is studied and a pragmatic
method is proposed, again with near-capacity performance. In further pursuit of
lower complexity, a hybrid MLC-BICM is proposed, whose performance is shown to
be very close to the boundary of the constellation-constrained capacity region.
Simulation results show that good point-to-point LDPC codes produce excellent
performance in the proposed coded modulation framework.
|
[
{
"version": "v1",
"created": "Fri, 28 Oct 2016 01:35:09 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Abotabl",
"Ahmed",
""
],
[
"Nosratinia",
"Aria",
""
]
] |
new_dataset
| 0.976001 |
1610.09083
|
Steven C.H. Hoi
|
Yue Wu, Steven C.H. Hoi, Chenghao Liu, Jing Lu, Doyen Sahoo, Nenghai
Yu
|
SOL: A Library for Scalable Online Learning Algorithms
|
5 pages
| null | null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
SOL is an open-source library for scalable online learning algorithms, and is
particularly suitable for learning with high-dimensional data. The library
provides a family of regular and sparse online learning algorithms for
large-scale binary and multi-class classification tasks with high efficiency,
scalability, portability, and extensibility. SOL was implemented in C++, and
provided with a collection of easy-to-use command-line tools, python wrappers
and library calls for users and developers, as well as comprehensive documents
for both beginners and advanced users. SOL is not only a practical machine
learning toolbox, but also a comprehensive experimental platform for online
learning research. Experiments demonstrate that SOL is highly efficient and
scalable for large-scale machine learning with high-dimensional data.
|
[
{
"version": "v1",
"created": "Fri, 28 Oct 2016 05:47:51 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Wu",
"Yue",
""
],
[
"Hoi",
"Steven C. H.",
""
],
[
"Liu",
"Chenghao",
""
],
[
"Lu",
"Jing",
""
],
[
"Sahoo",
"Doyen",
""
],
[
"Yu",
"Nenghai",
""
]
] |
new_dataset
| 0.999223 |
1610.09248
|
Marco Zennaro
|
Marco Zennaro, Marco Rainone and Ermanno Pietrosemoli
|
Radio Link Planning made easy with a Telegram Bot
|
The final publication will be published in the GOODTECHS (2nd EAI
International Conference on Smart Objects and Technologies for Social Good)
Conference Proceedings and by Springer-Verlag in the Lecture Notes of ICST
(LNICST)
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Traditional radio planning tools present a steep learning curve. We present
BotRf, a Telegram Bot that facilitates the process by guiding non-experts in
assessing the feasibility of radio links. Built on open source tools, BotRf can
run on any smartphone or PC running Telegram. Using it on a smartphone has the
added value that the Bot can leverage the internal GPS to enter coordinates.
BotRf can be used in environments with low bandwidth as the generated data
traffic is quite limited. We present examples of its use in Venezuela.
|
[
{
"version": "v1",
"created": "Fri, 28 Oct 2016 14:50:33 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Zennaro",
"Marco",
""
],
[
"Rainone",
"Marco",
""
],
[
"Pietrosemoli",
"Ermanno",
""
]
] |
new_dataset
| 0.987157 |
1610.09345
|
Harishchandra Dubey
|
Prakash K. Ray, B. K. Panigrahi, P. K. Rout, Asit Mohanty,
Harishchandra Dubey
|
Fault Detection in IEEE 14-Bus Power System with DG Penetration Using
Wavelet Transform
|
5 pages, 4 figures, 1 table
|
In the Proceedings of First International Conference on
Advancement of Computer Communication & Electrical Technology, Oct. 2016,
Murshidabad, India
|
10.13140/RG.2.2.32899.09763
| null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wavelet transform is proposed in this paper for detection of islanding and
fault disturbances distributed generation (DG) based power system. An IEEE
14-bus system with DG penetration is considered for the detection of
disturbances under different operating conditions. The power system is a hybrid
combination of photovoltaic, and wind energy system connected to different
buses with different level of penetration. The voltage signal is retrieved at
the point of common coupling (PCC) and processed through wavelet transform to
detect the disturbances. Further, energy and standard deviation (STD) as
performance indices are evaluated and compared with a suitable threshold in
order to analyze a disturbance condition. Again, a comparative analysis between
the existing and proposed detection is studied to prove the better performance
of wavelet transform.
|
[
{
"version": "v1",
"created": "Wed, 28 Sep 2016 18:23:45 GMT"
}
] | 2016-10-31T00:00:00 |
[
[
"Ray",
"Prakash K.",
""
],
[
"Panigrahi",
"B. K.",
""
],
[
"Rout",
"P. K.",
""
],
[
"Mohanty",
"Asit",
""
],
[
"Dubey",
"Harishchandra",
""
]
] |
new_dataset
| 0.998585 |
1610.08461
|
Gang Hu
|
Gang Hu
|
A Proposed Algorithm for Minimum Vertex Cover Problem and its Testing
|
18 pages
| null | null | null |
cs.DM cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper presents an algorithm for minimum vertex cover problem, which is an
NP-Complete problem. The algorithm computes a minimum vertex cover of each
input simple graph. Tested by the attached MATLAB programs, Stage 1 of the
algorithm is applicable to, i.e., yields a proved minimum vertex cover for,
about 99.99% of the tested 610,000 graphs of order 16 and 99.67% of the tested
1,200 graphs of order 32, and Stage 2 of the algorithm is applicable to all of
the above tested graphs. All of the tested graphs are randomly generated graphs
of random "edge density" or in other words, random probability of each edge. It
is proved that Stage 1 and Stage 2 of the algorithm run in $O(n^{5+logn})$ and
$O(n^{3(5+logn)/2})$ time respectively, where $n$ is the order of input graph.
Because there is no theoretical proof yet that Stage 2 is applicable to all
graphs, further stages of the algorithm are proposed, which are in a general
form that is consistent with Stages 1 and 2.
|
[
{
"version": "v1",
"created": "Mon, 24 Oct 2016 14:36:20 GMT"
}
] | 2016-10-30T00:00:00 |
[
[
"Hu",
"Gang",
""
]
] |
new_dataset
| 0.990354 |
1505.00468
|
Aishwarya Agrawal
|
Aishwarya Agrawal, Jiasen Lu, Stanislaw Antol, Margaret Mitchell, C.
Lawrence Zitnick, Dhruv Batra, Devi Parikh
|
VQA: Visual Question Answering
|
The first three authors contributed equally. International Conference
on Computer Vision (ICCV) 2015
| null | null | null |
cs.CL cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose the task of free-form and open-ended Visual Question Answering
(VQA). Given an image and a natural language question about the image, the task
is to provide an accurate natural language answer. Mirroring real-world
scenarios, such as helping the visually impaired, both the questions and
answers are open-ended. Visual questions selectively target different areas of
an image, including background details and underlying context. As a result, a
system that succeeds at VQA typically needs a more detailed understanding of
the image and complex reasoning than a system producing generic image captions.
Moreover, VQA is amenable to automatic evaluation, since many open-ended
answers contain only a few words or a closed set of answers that can be
provided in a multiple-choice format. We provide a dataset containing ~0.25M
images, ~0.76M questions, and ~10M answers (www.visualqa.org), and discuss the
information it provides. Numerous baselines and methods for VQA are provided
and compared with human performance. Our VQA demo is available on CloudCV
(http://cloudcv.org/vqa).
|
[
{
"version": "v1",
"created": "Sun, 3 May 2015 20:07:39 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jun 2015 16:59:52 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Oct 2015 02:47:20 GMT"
},
{
"version": "v4",
"created": "Wed, 18 Nov 2015 16:43:33 GMT"
},
{
"version": "v5",
"created": "Mon, 7 Mar 2016 20:55:28 GMT"
},
{
"version": "v6",
"created": "Wed, 20 Apr 2016 03:09:33 GMT"
},
{
"version": "v7",
"created": "Thu, 27 Oct 2016 03:50:19 GMT"
}
] | 2016-10-28T00:00:00 |
[
[
"Agrawal",
"Aishwarya",
""
],
[
"Lu",
"Jiasen",
""
],
[
"Antol",
"Stanislaw",
""
],
[
"Mitchell",
"Margaret",
""
],
[
"Zitnick",
"C. Lawrence",
""
],
[
"Batra",
"Dhruv",
""
],
[
"Parikh",
"Devi",
""
]
] |
new_dataset
| 0.955018 |
1610.04673
|
Sheng Xu Sheng Xu
|
Sheng Xu, Ruisheng Wang, Han Zheng
|
Road Curb Extraction from Mobile LiDAR Point Clouds
| null |
IEEE Transactions on Geoscience and Remote Sensing, Volume:PP ,
Issue: 99, 2016
|
10.1109/TGRS.2016.2617819
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Automatic extraction of road curbs from uneven, unorganized, noisy and
massive 3D point clouds is a challenging task. Existing methods often project
3D point clouds onto 2D planes to extract curbs. However, the projection causes
loss of 3D information which degrades the performance of the detection. This
paper presents a robust, accurate and efficient method to extract road curbs
from 3D mobile LiDAR point clouds. Our method consists of two steps: 1)
extracting the candidate points of curbs based on the proposed novel energy
function and 2) refining the candidate points using the proposed least cost
path model. We evaluated our method on a large-scale of residential area
(16.7GB, 300 million points) and an urban area (1.07GB, 20 million points)
mobile LiDAR point clouds. Results indicate that the proposed method is
superior to the state-of-the-art methods in terms of robustness, accuracy and
efficiency. The proposed curb extraction method achieved a completeness of
78.62% and a correctness of 83.29%. These experiments demonstrate that the
proposed method is a promising solution to extract road curbs from mobile LiDAR
point clouds.
|
[
{
"version": "v1",
"created": "Sat, 15 Oct 2016 00:18:59 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Oct 2016 16:19:31 GMT"
}
] | 2016-10-28T00:00:00 |
[
[
"Xu",
"Sheng",
""
],
[
"Wang",
"Ruisheng",
""
],
[
"Zheng",
"Han",
""
]
] |
new_dataset
| 0.997417 |
1610.08570
|
Mark O'Neill
|
Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Scott Ruoti, Dan
Bunker, Kent Seamons, Daniel Zappala
|
TrustBase: An Architecture to Repair and Strengthen Certificate-based
Authentication
|
15 pages, 4 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe TrustBase, an architecture that provides certificate-based
authentication as an operating system service. TrustBase enforces best
practices for certificate validation for all applications and transparently
enables existing applications to be strengthened against failures of the CA
system. The TrustBase system allows simple deployment of authentication systems
that harden the CA system. This enables system administrators, for example, to
require certificate revocation checks on all TLS connections, or require
STARTTLS for email servers that support it. TrustBase is the first system that
is able to secure all TLS traffic, using an approach compatible with all
operating systems. We design and evaluate a prototype implementation of
TrustBase on Linux, evaluate its security, and demonstrate that it has
negligible overhead and universal compatibility with applications. To
demonstrate the utility of TrustBase, we have developed six authentication
services that strengthen certificate validation for all applications.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2016 23:20:56 GMT"
}
] | 2016-10-28T00:00:00 |
[
[
"O'Neill",
"Mark",
""
],
[
"Heidbrink",
"Scott",
""
],
[
"Whitehead",
"Jordan",
""
],
[
"Ruoti",
"Scott",
""
],
[
"Bunker",
"Dan",
""
],
[
"Seamons",
"Kent",
""
],
[
"Zappala",
"Daniel",
""
]
] |
new_dataset
| 0.967113 |
1610.08884
|
Franz J. Brandenburg
|
Franz J. Brandenburg
|
Recognizing IC-Planar and NIC-Planar Graphs
|
26 pages, 23 figures
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that triangulated IC-planar and NIC-planar graphs can be recognized
in cubic time.
A graph is 1-planar if it can be drawn in the plane with at most one crossing
per edge. A drawing is IC-planar if, in addition, each vertex is incident to at
most one crossing edge and NIC-planar if two pairs of crossing edges share at
most one vertex. In a triangulated drawing each face is a triangle. In
consequence, planar-maximal and maximal IC-planar and NIC-planar graphs can be
recognized in O(n^5) time and maximum and optimal ones in O(n^3) time. In
contrast, recognizing 3-connected IC-planar and NIC-planar graphs is
NP-complete, even if the graphs are given with a rotation system which
describes the cyclic ordering of the edges at each vertex. Our results
complement similar ones for 1-planar graphs.
|
[
{
"version": "v1",
"created": "Thu, 27 Oct 2016 17:01:18 GMT"
}
] | 2016-10-28T00:00:00 |
[
[
"Brandenburg",
"Franz J.",
""
]
] |
new_dataset
| 0.999296 |
1604.04634
|
Marcel Caria
|
Marcel Caria, Admela Jukan, Marco Hoffmann
|
SDN Partitioning: A Centralized Control Plane for Distributed Routing
Protocols
|
14 pages, 12 figures
| null |
10.1109/TNSM.2016.2585759
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hybrid IP networks that use both control paradigms - distributed and
centralized - promise the best of two worlds: programmability and agility of
SDN, and reliability and fault tolerance of distributed routing protocols like
OSPF. The common approaches follow a division of labor concept, where SDN
controls prioritized traffic and OSPF assures care-free operation of best
effort traffic. We propose SDN Partitioning, which establishes centralized
control over the distributed routing protocol by partitioning the topology into
sub-domains with SDN-enabled border nodes, such that OSPF's routing updates
have to traverse SDN border nodes to reach neighboring sub-domains. This allows
the central controller to modify how sub-domains view one another, which in
turn allows to steer inter-sub-domain traffic. The degree of dynamic control
against simplicity of OSPF can be trade off by adjusting the size of the
sub-domains. This paper explains the technical requirements, presents a novel
scheme for balanced topology partitioning, and provides the models for common
network management tasks. Our performance evaluation shows that - already in
its minimum configuration with two sub-domains - SDN Partitioning provides
significant improvements in all respects compared to legacy routing protocols,
whereas smaller sub-domains provide network control capabilities comparable to
full SDN deployment.
|
[
{
"version": "v1",
"created": "Fri, 15 Apr 2016 20:28:58 GMT"
}
] | 2016-10-27T00:00:00 |
[
[
"Caria",
"Marcel",
""
],
[
"Jukan",
"Admela",
""
],
[
"Hoffmann",
"Marco",
""
]
] |
new_dataset
| 0.999545 |
1610.08114
|
Kamyar Moshksar
|
Kamyar Moshksar
|
Asynchronous Transmission over Gaussian Interference Channels with
Stochastic Data Arrival
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses a Gaussian interference channel with two
transmitter-receiver~(Tx-Rx) pairs under stochastic data arrival~(GIC-SDA).
Information bits arrive at the transmitters according to independent and
asynchronous Bernoulli processes~(Tx-Tx~asynchrony). Each information source
turns off after generating a given total number of bits. The transmissions are
\textit{asynchronous} (Tx-Rx~asynchrony) in the sense that each Tx sends a
codeword to its Rx immediately after there are enough bits available in its
buffer. Such asynchronous style of transmission is shown to significantly
reduce the transmission delay in comparison with the existing Tx-Rx synchronous
transmission schemes. The receivers learn the activity frames of both
transmitters by employing sequential joint-typicality detection. As a
consequence, the GIC-SDA under Tx-Rx asynchrony is represented by a standard
GIC with state known at the receivers. The cardinality of the state space is
$\binom{2N_1+2N_2}{2N_2}$ in which $N_1, N_2$ are the numbers of transmitted
codewords by the two transmitters. Each realization of the state imposes two
sets of constraints on $N_1, N_2$ referred to as the geometric and reliability
constraints. In a scenario where the transmitters are only aware of the
statistics of Tx-Tx~asynchrony, it is shown how one designs $N_1,N_2$ to
achieve target transmission rates for both users and minimize the probability
of unsuccessful decoding.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2016 23:02:01 GMT"
}
] | 2016-10-27T00:00:00 |
[
[
"Moshksar",
"Kamyar",
""
]
] |
new_dataset
| 0.997659 |
1610.08129
|
Asaf Cidon
|
Asaf Cidon, Daniel Rushton, Stephen M. Rumble and Ryan Stutsman
|
Memshare: a Dynamic Multi-tenant Memory Key-value Cache
|
14 pages, 5 figures
| null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web application performance is heavily reliant on the hit rate of
memory-based caches. Current DRAM-based web caches statically partition their
memory across multiple applications sharing the cache. This causes under
utilization of memory which negatively impacts cache hit rates. We present
Memshare, a novel web memory cache that dynamically manages memory across
applications. Memshare provides a resource sharing model that guarantees
private memory to different applications while dynamically allocating the
remaining shared memory to optimize overall hit rate. Today's high cost of DRAM
storage and the availability of high performance CPU and memory bandwidth, make
web caches memory capacity bound. Memshare's log-structured design allows it to
provide significantly higher hit rates and dynamically partition memory among
applications at the expense of increased CPU and memory bandwidth consumption.
In addition, Memshare allows applications to use their own eviction policy for
their objects, independent of other applications. We implemented Memshare and
ran it on a week-long trace from a commercial memcached provider. We
demonstrate that Memshare increases the combined hit rate of the applications
in the trace by an 6.1% (from 84.7% hit rate to 90.8% hit rate) and reduces the
total number of misses by 39.7% without affecting system throughput or latency.
Even for single-tenant applications, Memshare increases the average hit rate of
the current state-of-the-art memory cache by an additional 2.7% on our
real-world trace.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2016 00:37:34 GMT"
}
] | 2016-10-27T00:00:00 |
[
[
"Cidon",
"Asaf",
""
],
[
"Rushton",
"Daniel",
""
],
[
"Rumble",
"Stephen M.",
""
],
[
"Stutsman",
"Ryan",
""
]
] |
new_dataset
| 0.99167 |
1610.08171
|
EPTCS
|
Ludovica Luisa Vissat, Jane Hillston, Glenn Marion, Matthew J. Smith
|
MELA: Modelling in Ecology with Location Attributes
|
In Proceedings QAPL'16, arXiv:1610.07696
|
EPTCS 227, 2016, pp. 82-97
|
10.4204/EPTCS.227.6
| null |
cs.LO q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ecology studies the interactions between individuals, species and the
environment. The ability to predict the dynamics of ecological systems would
support the design and monitoring of control strategies and would help to
address pressing global environmental issues. It is also important to plan for
efficient use of natural resources and maintenance of critical ecosystem
services. The mathematical modelling of ecological systems often includes
nontrivial specifications of processes that influence the birth, death,
development and movement of individuals in the environment, that take into
account both biotic and abiotic interactions. To assist in the specification of
such models, we introduce MELA, a process algebra for Modelling in Ecology with
Location Attributes. Process algebras allow the modeller to describe concurrent
systems in a high-level language. A key feature of concurrent systems is that
they are composed of agents that can progress simultaneously but also interact
- a good match to ecological systems. MELA aims to provide ecologists with a
straightforward yet flexible tool for modelling ecological systems, with
particular emphasis on the description of space and the environment. Here we
present four example MELA models, illustrating the different spatial
arrangements which can be accommodated and demonstrating the use of MELA in
epidemiological and predator-prey scenarios.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2016 05:00:42 GMT"
}
] | 2016-10-27T00:00:00 |
[
[
"Vissat",
"Ludovica Luisa",
""
],
[
"Hillston",
"Jane",
""
],
[
"Marion",
"Glenn",
""
],
[
"Smith",
"Matthew J.",
""
]
] |
new_dataset
| 0.992116 |
1610.08216
|
Niloufar Salehi
|
Niloufar Salehi, Andrew McCabe, Melissa Valentine, Michael Bernstein
|
Huddler: Convening Stable and Familiar Crowd Teams Despite Unpredictable
Availability
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed, parallel crowd workers can accomplish simple tasks through
workflows, but teams of collaborating crowd workers are necessary for complex
goals. Unfortunately, a fundamental condition for effective teams - familiarity
with other members - stands in contrast to crowd work's flexible, on-demand
nature. We enable effective crowd teams with Huddler, a system for workers to
assemble familiar teams even under unpredictable availability and strict time
constraints. Huddler utilizes a dynamic programming algorithm to optimize for
highly familiar teammates when individual availability is unknown. We first
present a field experiment that demonstrates the value of familiarity for crowd
teams: familiar crowd teams doubled the performance of ad-hoc (unfamiliar)
teams on a collaborative task. We then report a two-week field deployment
wherein Huddler enabled crowd workers to convene highly familiar teams in 18
minutes on average. This research advances the goal of supporting long-term,
team-based collaborations without sacrificing the flexibility of crowd work.
|
[
{
"version": "v1",
"created": "Wed, 26 Oct 2016 07:27:36 GMT"
}
] | 2016-10-27T00:00:00 |
[
[
"Salehi",
"Niloufar",
""
],
[
"McCabe",
"Andrew",
""
],
[
"Valentine",
"Melissa",
""
],
[
"Bernstein",
"Michael",
""
]
] |
new_dataset
| 0.994707 |
1610.08369
|
Israel Fianyi Mr
|
Israel Fianyi
|
Curbing cyber-crime and Enhancing e-commerce security with Digital
Forensics
| null |
IJCSI International Journal of Computer Science Issues, Volume 12,
Issue 6, November 2015 pg 78-85
| null | null |
cs.CR cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The explosion in the e-commerce industry which has been necessitated by the
growth and advance expansion of Information technology and its related
facilities in recent years have been met with adverse security issues
consequently affecting the industry and the entire online activities. This
paper exams the prevailing security threats e-commerce is facing which is
predominantly known as cyber-crime and how computer related technology and
facilities such as digital forensics tools can be adopted extensively to ensure
security in online related business activities. This paper investigated the
risk, damage and the cost cyber-crime poses to individuals and organizations
when they become victims. As it is obvious transacting business online as well
as all related online activities has become inherent in our everyday life. The
paper also comprehensively elucidate on some of the cyber-crime activities that
are posing serious threat to the security of E-commerce. Amazon and eBay were
used as the case of study in relation to respondents who patronizes these
renowned e-commerce sites for various transactions.
Keywords: E-commerce Security,Cyber-Crime,digital forensics, Network
forensics, Network security, Online transactions, Identity theft, hacking.
|
[
{
"version": "v1",
"created": "Mon, 18 Jan 2016 08:27:57 GMT"
}
] | 2016-10-27T00:00:00 |
[
[
"Fianyi",
"Israel",
""
]
] |
new_dataset
| 0.98817 |
1509.02584
|
Evan Saulpaugh
|
Evan Saulpaugh
|
XCRUSH: A Family of ARX Block Ciphers
|
14 pages, 2 figures. Includes test vectors and C99 reference
implementation
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The XCRUSH family of non-Feistel, ARX block ciphers is designed to make
efficient use of modern 64-bit general-purpose processors using a small number
of encryption rounds which are simple to implement in software. The avalanche
function, which applies one data-dependent, key-dependent rotation per 64-bit
word of plaintext per round, allows XCRUSH to achieve an almost totally diffuse
256-bit block after just the first two rounds. Designed for speed in software,
3-round XCRUSH is measured at ~7.3 cycles/byte single-threaded on an Intel
Haswell processor. A pseudorandom number generator, constructed using the
avalanche function, serves as a key scheduling algorithm. No security claims
are made in this paper.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2015 00:23:09 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Sep 2015 06:11:46 GMT"
},
{
"version": "v3",
"created": "Sat, 17 Oct 2015 07:40:35 GMT"
},
{
"version": "v4",
"created": "Tue, 25 Oct 2016 19:56:43 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Saulpaugh",
"Evan",
""
]
] |
new_dataset
| 0.999303 |
1603.05576
|
Jinwen Shi
|
Jinwen Shi, Ling Liu, Cong Ling
|
Extracting Wyner's Common Information Using Polar Codes and Polar
Lattices
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Explicit constructions of polar codes and polar lattices for both lossless
and lossy Gray-Wyner problems are studied. Polar codes are employed to extract
Wyner's common information of doubly symmetric binary source; polar lattices
are then extended to extract that of a pair of Gaussian sources or multiple
Gaussian sources. With regard to the discrete sources, the entire best-known
region of the lossless Gray-Wyner problem are achieved by specifying the test
channels to construct polar codes without time-sharing. As a result, we are
able to give an interpretation that the Wyner's common information remains the
same to the lossy case when the distortion is small [1]. Finally, the entire
best-known lossy Gray-Wyner region for discrete sources can also be achieved
using polar codes. With regard to the Gaussian sources, the best-known lossy
Gray-Wyner region for bivariate Gaussian sources with a specific covariance
matrix [1] can be achieved by using polar lattices. Moreover, we prove that
extracting Wyner's common information of a pair of Gaussian sources is
equivalent to implementing the lossy compression for a single Gaussian source,
which implies that the common information can be extracted by a polar lattice
for quantization. Furthermore, we extend this result to the case of multiple
Gaussian sources.
|
[
{
"version": "v1",
"created": "Thu, 17 Mar 2016 17:11:14 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Mar 2016 18:41:15 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Mar 2016 17:03:22 GMT"
},
{
"version": "v4",
"created": "Fri, 13 May 2016 16:49:23 GMT"
},
{
"version": "v5",
"created": "Tue, 25 Oct 2016 16:51:05 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Shi",
"Jinwen",
""
],
[
"Liu",
"Ling",
""
],
[
"Ling",
"Cong",
""
]
] |
new_dataset
| 0.999439 |
1610.02387
|
Wolfgang John
|
Guido Marchetto, Riccardo Sisto, Wolfgang John, Pontus Sk\"oldstr\"om,
Bertrand Pechenot, Felici\'an N\'emeth, Istv\'an Pelle, Juhoon Kim, Xuejun
Cai, Chunyan Fu, Catalin Meirosu, Kostas Pentikousis, Sachin Sharma, Ioanna
Papafili, Serena Spinoso, Matteo Virgilio, Rebecca Steinert, Per Kreuger,
Shaoteng Liu, Jan Ekman, Antonio Manzalini, Apoorv Shukla
|
Final Service Provider DevOps concept and evaluation
|
This is the public deliverable D4.3 of the EU FP7 UNIFY project
(ICT-619609) - "Updated concept and evaluation results for SP-DevOps".
Original Deliverable published at
https://www.fp7-unify.eu/index.php/results.html#Deliverables
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report presents the results of the UNIFY Service Provider DevOps
activities. First, we present the final definition and assessment of the
concept. SP-DevOps is realized by a combination of various functional
components facilitating integrated service verification, efficient and
programmable observability, and automated troubleshooting processes. Our
assessment shows that SP-DevOps can help providers to reach a medium level of
DevOps maturity and allows significant reduction in OPEX. Second, we focus on
the evaluation of the proposed SP-DevOps components. The set of tools proposed
supports ops and devs across all stages, with a focus on the deployment,
operation and debugging phases, and allows to activate automated processes for
operating NFV environments. Finally, we present use-cases and our demonstrators
for selected process implementions, which allowed the functional validation of
SP-DevOps.
|
[
{
"version": "v1",
"created": "Fri, 7 Oct 2016 19:38:28 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Oct 2016 09:07:47 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Marchetto",
"Guido",
""
],
[
"Sisto",
"Riccardo",
""
],
[
"John",
"Wolfgang",
""
],
[
"Sköldström",
"Pontus",
""
],
[
"Pechenot",
"Bertrand",
""
],
[
"Németh",
"Felicián",
""
],
[
"Pelle",
"István",
""
],
[
"Kim",
"Juhoon",
""
],
[
"Cai",
"Xuejun",
""
],
[
"Fu",
"Chunyan",
""
],
[
"Meirosu",
"Catalin",
""
],
[
"Pentikousis",
"Kostas",
""
],
[
"Sharma",
"Sachin",
""
],
[
"Papafili",
"Ioanna",
""
],
[
"Spinoso",
"Serena",
""
],
[
"Virgilio",
"Matteo",
""
],
[
"Steinert",
"Rebecca",
""
],
[
"Kreuger",
"Per",
""
],
[
"Liu",
"Shaoteng",
""
],
[
"Ekman",
"Jan",
""
],
[
"Manzalini",
"Antonio",
""
],
[
"Shukla",
"Apoorv",
""
]
] |
new_dataset
| 0.9939 |
1610.04273
|
Mario Blaum
|
Mario Blaum and Steve Hetzler
|
Generalized and Extended Product Codes
|
37 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Generalized Product (GPC) Codes, an unification of Product Codes and
Integrated Interleaved (II) Codes, are presented. Applications for approaches
requiring local and global parities are described. The more general problem of
extending product codes by adding global parities is studied and an upper bound
on the minimum distance of such codes is obtained. Codes with one, two and
three global parities whose minimum distances meet the bound are presented.
Tradeoffs between optimality and field size are discussed.
|
[
{
"version": "v1",
"created": "Thu, 13 Oct 2016 21:58:43 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Oct 2016 21:19:08 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Blaum",
"Mario",
""
],
[
"Hetzler",
"Steve",
""
]
] |
new_dataset
| 0.992465 |
1610.07651
|
Chunlei Zhang
|
Chunlei Zhang, Fahimeh Bahmaninezhad, Shivesh Ranjan, Chengzhu Yu,
Navid Shokouhi, John H.L. Hansen
|
UTD-CRSS Systems for 2016 NIST Speaker Recognition Evaluation
|
5 pages
| null | null | null |
cs.CL
|
http://creativecommons.org/licenses/by/4.0/
|
This document briefly describes the systems submitted by the Center for
Robust Speech Systems (CRSS) from The University of Texas at Dallas (UTD) to
the 2016 National Institute of Standards and Technology (NIST) Speaker
Recognition Evaluation (SRE). We developed several UBM and DNN i-Vector based
speaker recognition systems with different data sets and feature
representations. Given that the emphasis of the NIST SRE 2016 is on language
mismatch between training and enrollment/test data, so-called domain mismatch,
in our system development we focused on: (1) using unlabeled in-domain data for
centralizing data to alleviate the domain mismatch problem, (2) finding the
best data set for training LDA/PLDA, (3) using newly proposed dimension
reduction technique incorporating unlabeled in-domain data before PLDA
training, (4) unsupervised speaker clustering of unlabeled data and using them
alone or with previous SREs for PLDA training, (5) score calibration using only
unlabeled data and combination of unlabeled and development (Dev) data as
separate experiments.
|
[
{
"version": "v1",
"created": "Mon, 24 Oct 2016 21:05:05 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Zhang",
"Chunlei",
""
],
[
"Bahmaninezhad",
"Fahimeh",
""
],
[
"Ranjan",
"Shivesh",
""
],
[
"Yu",
"Chengzhu",
""
],
[
"Shokouhi",
"Navid",
""
],
[
"Hansen",
"John H. L.",
""
]
] |
new_dataset
| 0.995983 |
1610.07710
|
Amit Sheth
|
Sanjaya Wijeratne, Lakshika Balasuriya, Amit Sheth, Derek Doran
|
EmojiNet: Building a Machine Readable Sense Inventory for Emoji
|
15 pages, 4 figures, 3 tables, Accepted to publish at the 8th
International Conference on Social Informatics (SocInfo 2016) as a full
research track paper
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Emoji are a contemporary and extremely popular way to enhance electronic
communication. Without rigid semantics attached to them, emoji symbols take on
different meanings based on the context of a message. Thus, like the word sense
disambiguation task in natural language processing, machines also need to
disambiguate the meaning or sense of an emoji. In a first step toward achieving
this goal, this paper presents EmojiNet, the first machine readable sense
inventory for emoji. EmojiNet is a resource enabling systems to link emoji with
their context-specific meaning. It is automatically constructed by integrating
multiple emoji resources with BabelNet, which is the most comprehensive
multilingual sense inventory available to date. The paper discusses its
construction, evaluates the automatic resource creation process, and presents a
use case where EmojiNet disambiguates emoji usage in tweets. EmojiNet is
available online for use at http://emojinet.knoesis.org.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2016 02:36:52 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Wijeratne",
"Sanjaya",
""
],
[
"Balasuriya",
"Lakshika",
""
],
[
"Sheth",
"Amit",
""
],
[
"Doran",
"Derek",
""
]
] |
new_dataset
| 0.99917 |
1610.07728
|
Xiang Jiang
|
Xiang Jiang, Shikui Wei, Ruizhen Zhao, Yao Zhao, Xindong Wu
|
Camera Fingerprint: A New Perspective for Identifying User's Identity
|
12 pages, 7 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Identifying user's identity is a key problem in many data mining
applications, such as product recommendation, customized content delivery and
criminal identification. Given a set of accounts from the same or different
social network platforms, user identification attempts to identify all accounts
belonging to the same person. A commonly used solution is to build the
relationship among different accounts by exploring their collective patterns,
e.g., user profile, writing style, similar comments. However, this kind of
method doesn't work well in many practical scenarios, since the information
posted explicitly by users may be false due to various reasons. In this paper,
we re-inspect the user identification problem from a novel perspective, i.e.,
identifying user's identity by matching his/her cameras. The underlying
assumption is that multiple accounts belonging to the same person contain the
same or similar camera fingerprint information. The proposed framework, called
User Camera Identification (UCI), is based on camera fingerprints, which takes
fully into account the problems of multiple cameras and reposting behaviors.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2016 04:31:55 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Jiang",
"Xiang",
""
],
[
"Wei",
"Shikui",
""
],
[
"Zhao",
"Ruizhen",
""
],
[
"Zhao",
"Yao",
""
],
[
"Wu",
"Xindong",
""
]
] |
new_dataset
| 0.950164 |
1610.07772
|
Prateek Dewan
|
Prateek Dewan, Varun Bharadhwaj, Aditi Mithal, Anshuman Suri,
Ponnurangam Kumaraguru
|
Visual Themes and Sentiment on Social Networks To Aid First Responders
During Crisis Events
|
8+1 pages
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online Social Networks explode with activity whenever a crisis event takes
place. Most content generated as part of this activity is a mixture of text and
images, and is particularly useful for first responders to identify popular
topics of interest and gauge the pulse and sentiment of citizens. While
multiple researchers have used text to identify, analyze and measure themes and
public sentiment during such events, little work has explored visual themes
floating on networks in the form of images, and the sentiment inspired by them.
Given the potential of visual content for influencing users' thoughts and
emotions, we perform a large scale analysis to compare popular themes and
sentiment across images and textual content posted on Facebook during the
terror attacks that took place in Paris in 2015. Using state-of-the-art image
summarization techniques, we discovered multiple visual themes which were
popular in images, but were not identifiable through text. We uncovered
instances of misinformation and false flag (conspiracy) theories among popular
image themes, which were not prominent in user generated textual content, and
can be of particular inter- est to first responders. Our analysis also revealed
that while textual content posted after the attacks reflected negative
sentiment, images inspired positive sentiment. To the best of our knowledge,
this is the first large scale study of images posted on social networks during
a crisis event.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2016 07:56:43 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Dewan",
"Prateek",
""
],
[
"Bharadhwaj",
"Varun",
""
],
[
"Mithal",
"Aditi",
""
],
[
"Suri",
"Anshuman",
""
],
[
"Kumaraguru",
"Ponnurangam",
""
]
] |
new_dataset
| 0.997053 |
1610.07804
|
Steffen Urban
|
Steffen Urban and Stefan Hinz
|
mdBrief - A Fast Online Adaptable, Distorted Binary Descriptor for
Real-Time Applications Using Calibrated Wide-Angle Or Fisheye Cameras
|
18 pages, 3 tables, 14 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fast binary descriptors build the core for many vision based applications
with real-time demands like object detection, Visual Odometry or SLAM. Commonly
it is assumed, that the acquired images and thus the patches extracted around
keypoints originate from a perspective projection ignoring image distortion or
completely different types of projections such as omnidirectional or fisheye.
Usually the deviations from a perfect perspective projection are corrected by
undistortion. Latter, however, introduces severe artifacts if the cameras
field-of-view gets larger. In this paper, we propose a distorted and masked
version of the BRIEF descriptor for calibrated cameras. Instead of correcting
the distortion holistically, we distort the binary tests and thus adapt the
descriptor to different image regions.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2016 09:42:57 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Urban",
"Steffen",
""
],
[
"Hinz",
"Stefan",
""
]
] |
new_dataset
| 0.993639 |
1610.07931
|
Ayushi Sinha
|
Seth D. Billings, Ayushi Sinha, Austin Reiter, Simon Leonard, Masaru
Ishii, Gregory D. Hager, Russell H. Taylor
|
Anatomically Constrained Video-CT Registration via the V-IMLOP Algorithm
|
8 pages, 4 figures, MICCAI
|
Medical Image Computing and Computer-Assisted Intervention --
MICCAI 2016: 19th International Conference, Athens, Greece, October 17-21,
2016, Proceedings, Part III. Vol. 9902, pp. 133-141
|
10.1007/978-3-319-46726-9_16
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Functional endoscopic sinus surgery (FESS) is a surgical procedure used to
treat acute cases of sinusitis and other sinus diseases. FESS is fast becoming
the preferred choice of treatment due to its minimally invasive nature.
However, due to the limited field of view of the endoscope, surgeons rely on
navigation systems to guide them within the nasal cavity. State of the art
navigation systems report registration accuracy of over 1mm, which is large
compared to the size of the nasal airways. We present an anatomically
constrained video-CT registration algorithm that incorporates multiple video
features. Our algorithm is robust in the presence of outliers. We also test our
algorithm on simulated and in-vivo data, and test its accuracy against
degrading initializations.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2016 15:56:13 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Billings",
"Seth D.",
""
],
[
"Sinha",
"Ayushi",
""
],
[
"Reiter",
"Austin",
""
],
[
"Leonard",
"Simon",
""
],
[
"Ishii",
"Masaru",
""
],
[
"Hager",
"Gregory D.",
""
],
[
"Taylor",
"Russell H.",
""
]
] |
new_dataset
| 0.966292 |
1610.08000
|
Raj Nath Patel
|
Raj Nath Patel, Prakash B. Pimpale
|
Statistical Machine Translation for Indian Languages: Mission Hindi 2
|
4 pages, Published in the Proceedings of NLP Tools Contest:
Statistical Machine Translation in Indian Languages
|
In the Proceedings of the 12th International Conference on Natural
Language Processing (ICON 2015)
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents Centre for Development of Advanced Computing Mumbai's
(CDACM) submission to NLP Tools Contest on Statistical Machine Translation in
Indian Languages (ILSMT) 2015 (collocated with ICON 2015). The aim of the
contest was to collectively explore the effectiveness of Statistical Machine
Translation (SMT) while translating within Indian languages and between English
and Indian languages. In this paper, we report our work on all five language
pairs, namely Bengali-Hindi (\bnhi), Marathi-Hindi (\mrhi), Tamil-Hindi
(\tahi), Telugu-Hindi (\tehi), and English-Hindi (\enhi) for Health, Tourism,
and General domains. We have used suffix separation, compound splitting and
preordering prior to SMT training and testing.
|
[
{
"version": "v1",
"created": "Tue, 25 Oct 2016 18:20:08 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Patel",
"Raj Nath",
""
],
[
"Pimpale",
"Prakash B.",
""
]
] |
new_dataset
| 0.99616 |
1610.08015
|
Nicola Wadeson Dr
|
Nicola Wadeson, Mark Basham
|
Savu: A Python-based, MPI Framework for Simultaneous Processing of
Multiple, N-dimensional, Large Tomography Datasets
|
10 pages, 10 figures, 1 table
| null | null | null |
cs.DC cs.CV cs.DB
|
http://creativecommons.org/licenses/by/4.0/
|
Diamond Light Source (DLS), the UK synchrotron facility, attracts scientists
from across the world to perform ground-breaking x-ray experiments. With over
3000 scientific users per year, vast amounts of data are collected across the
experimental beamlines, with the highest volume of data collected during
tomographic imaging experiments. A growing interest in tomography as an imaging
technique, has led to an expansion in the range of experiments performed, in
addition to a growth in the size of the data per experiment.
Savu is a portable, flexible, scientific processing pipeline capable of
processing multiple, n-dimensional datasets in serial on a PC, or in parallel
across a cluster. Developed at DLS, and successfully deployed across the
beamlines, it uses a modular plugin format to enable experiment-specific
processing and utilises parallel HDF5 to remove RAM restrictions. The Savu
design, described throughout this paper, focuses on easy integration of
existing and new functionality, flexibility and ease of use for users and
developers alike.
|
[
{
"version": "v1",
"created": "Mon, 24 Oct 2016 13:22:09 GMT"
}
] | 2016-10-26T00:00:00 |
[
[
"Wadeson",
"Nicola",
""
],
[
"Basham",
"Mark",
""
]
] |
new_dataset
| 0.998574 |
1405.5590
|
Mukund Raghothaman
|
Mukund Raghothaman, Abhishek Udupa
|
Language to Specify Syntax-Guided Synthesis Problems
|
Fixed small typo in the SyGuS grammar specification pointed out by
Sergey Mechtaev
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a language to specify syntax guided synthesis (SyGuS) problems.
Syntax guidance is a prominent theme in contemporary program synthesis
approaches, and SyGuS was first described in [1]. This paper describes
concretely the input format of a SyGuS solver.
[1] Rajeev Alur, Rastislav Bodik, Garvit Juniwal, Milo M. K. Martin, Mukund
Raghothaman, Sanjit A. Seshia, Rishabh Singh, Armando Solar-Lezama, Emina
Torlak, and Abhishek Udupa. Syntax-guided synthesis. In FMCAD, pages 1--17,
2013.
|
[
{
"version": "v1",
"created": "Thu, 22 May 2014 01:50:47 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Oct 2016 19:45:46 GMT"
}
] | 2016-10-25T00:00:00 |
[
[
"Raghothaman",
"Mukund",
""
],
[
"Udupa",
"Abhishek",
""
]
] |
new_dataset
| 0.992795 |
1507.07267
|
Ahmed Abdelhadi
|
Ahmed Abdelhadi and T. Charles Clancy
|
Network MIMO with Partial Cooperation between Radar and Cellular Systems
|
(c) 2015 IEEE. Personal use of this material is permitted. Permission
from IEEE must be obtained for all other uses, in any current or future
media, including reprinting/republishing this material for advertising or
promotional purposes, creating new collective works, for resale or
redistribution to servers or lists, or reuse of any copyrighted component of
this work in other works
| null |
10.1109/ICCNC.2016.7440576
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To meet the growing spectrum demands, future cellular systems are expected to
share the spectrum of other services such as radar. In this paper, we consider
a network multiple-input multiple-output (MIMO) with partial cooperation model
where radar stations cooperate with cellular base stations (BS)s to deliver
messages to intended mobile users. So the radar stations act as BSs in the
cellular system. However, due to the high power transmitted by radar stations
for detection of far targets, the cellular receivers could burnout when
receiving these high radar powers. Therefore, we propose a new projection
method called small singular values space projection (SSVSP) to mitigate these
harmful high power and enable radar stations to collaborate with cellular base
stations. In addition, we formulate the problem into a MIMO interference
channel with general constraints (MIMO-IFC-GC). Finally, we provide a solution
to minimize the weighted sum mean square error minimization problem (WSMMSE)
with enforcing power constraints on both radar and cellular stations.
|
[
{
"version": "v1",
"created": "Sun, 26 Jul 2015 23:38:04 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jul 2015 14:53:23 GMT"
},
{
"version": "v3",
"created": "Sun, 18 Oct 2015 20:31:07 GMT"
}
] | 2016-10-25T00:00:00 |
[
[
"Abdelhadi",
"Ahmed",
""
],
[
"Clancy",
"T. Charles",
""
]
] |
new_dataset
| 0.998108 |
1601.05594
|
Ohad Elishco
|
Ohad Elishco, Tom Meyerovitch, Moshe Schwartz
|
Encoding Semiconstrained Systems
|
15 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Semiconstrained systems were recently suggested as a generalization of
constrained systems, commonly used in communication and data-storage
applications that require certain offending subsequences be avoided. In an
attempt to apply techniques from constrained systems, we study sequences of
constrained systems that are contained in, or contain, a given semiconstrained
system, while approaching its capacity. In the case of contained systems we
describe to such sequences resulting in constant-to-constant bit-rate block
encoders and sliding-block encoders. Surprisingly, in the case of containing
systems we show that a "generic" semiconstrained system is never contained in a
proper fully-constrained system.
|
[
{
"version": "v1",
"created": "Thu, 21 Jan 2016 11:48:08 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Oct 2016 08:09:12 GMT"
}
] | 2016-10-25T00:00:00 |
[
[
"Elishco",
"Ohad",
""
],
[
"Meyerovitch",
"Tom",
""
],
[
"Schwartz",
"Moshe",
""
]
] |
new_dataset
| 0.969516 |
1607.03085
|
Kamil Rocki
|
Kamil Rocki
|
Recurrent Memory Array Structures
|
Minor changes
| null | null | null |
cs.LG cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The following report introduces ideas augmenting standard Long Short Term
Memory (LSTM) architecture with multiple memory cells per hidden unit in order
to improve its generalization capabilities. It considers both deterministic and
stochastic variants of memory operation. It is shown that the nondeterministic
Array-LSTM approach improves state-of-the-art performance on character level
text prediction achieving 1.402 BPC on enwik8 dataset. Furthermore, this report
estabilishes baseline neural-based results of 1.12 BPC and 1.19 BPC for enwik9
and enwik10 datasets respectively.
|
[
{
"version": "v1",
"created": "Mon, 11 Jul 2016 19:29:44 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Jul 2016 16:46:33 GMT"
},
{
"version": "v3",
"created": "Sun, 23 Oct 2016 02:01:55 GMT"
}
] | 2016-10-25T00:00:00 |
[
[
"Rocki",
"Kamil",
""
]
] |
new_dataset
| 0.983963 |
1610.02841
|
Fabrizio Frati
|
Fabrizio Frati, Maurizio Patrignani, Vincenzo Roselli
|
LR-Drawings of Ordered Rooted Binary Trees and Near-Linear Area Drawings
of Outerplanar Graphs
|
A preliminary version appears at SODA 2017
| null | null | null |
cs.CG cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study a family of algorithms, introduced by Chan [SODA 1999]
and called LR-algorithms, for drawing ordered rooted binary trees. In
particular, we are interested in constructing LR-drawings (that are drawings
obtained via LR-algorithms) with small width. Chan showed three different
LR-algorithms that achieve, for an ordered rooted binary tree with $n$ nodes,
width $O(n^{0.695})$, width $O(n^{0.5})$, and width $O(n^{0.48})$.
We prove that, for every $n$-node ordered rooted binary tree, an LR-drawing
with minimum width can be constructed in $O(n^{1.48})$ time. Further, we show
an infinite family of $n$-node ordered rooted binary trees requiring
$\Omega(n^{0.418})$ width in any LR-drawing; no lower bound better than
$\Omega(\log n)$ was previously known. Finally, we present the results of an
experimental evaluation that allowed us to determine the minimum width of all
the ordered rooted binary trees with up to $451$ nodes.
Our interest in LR-drawings is mainly motivated by a result of Di Battista
and Frati [Algorithmica 2009], who proved that $n$-vertex outerplanar graphs
have outerplanar straight-line drawings in $O(n^{1.48})$ area by means of a
drawing algorithm which resembles an LR-algorithm.
We deepen the connection between LR-drawings and outerplanar straight-line
drawings by proving that, if $n$-node ordered rooted binary trees have
LR-drawings with $f(n)$ width, for any function $f(n)$, then $n$-vertex
outerplanar graphs have outerplanar straight-line drawings in $O(f(n))$ area.
Finally, we exploit a structural decomposition for ordered rooted binary
trees introduced by Chan in order to prove that every $n$-vertex outerplanar
graph has an outerplanar straight-line drawing in $O(n\cdot 2^{\sqrt{2 \log_2
n}} \sqrt{\log n})$ area.
|
[
{
"version": "v1",
"created": "Mon, 10 Oct 2016 10:41:08 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Oct 2016 06:44:27 GMT"
},
{
"version": "v3",
"created": "Sat, 22 Oct 2016 07:36:47 GMT"
}
] | 2016-10-25T00:00:00 |
[
[
"Frati",
"Fabrizio",
""
],
[
"Patrignani",
"Maurizio",
""
],
[
"Roselli",
"Vincenzo",
""
]
] |
new_dataset
| 0.974142 |
1610.07018
|
Hsiang-Hsuan Liu
|
Wing-Kai Hon, Ton Kloks, Fu-Hong Liu, Hsiang-Hsuan Liu, Tao-Ming Wang,
and Yue-Li Wang
|
P_3-Games on Chordal Bipartite Graphs
| null | null | null | null |
cs.DS cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let G=(V,E) be a connected graph. A set U subseteq V is convex if G[U] is
connected and all vertices of V\U have at most one neighbor in U. Let sigma(W)
denote the unique smallest convex set that contains W subseteq V. Two players
play the following game. Consider a convex set U and call it the `playground.'
Initially, U = emptyset. When U=V, the player to move loses the game.
Otherwise, that player chooses a vertex x in V\U which is at distance at most
two from U. The effect of the move is that the playground U changes into
sigma(U cup {x}) and the opponent is presented with this new playground.
A graph is chordal bipartite if it is bipartite and has no induced cycle of
length more than four. In this paper we show that, when G is chordal bipartite,
there is a polynomial-time algorithm that computes the Grundy number of the
P_3-game played on G. This implies that there is an efficient algorithm to
decide whether the first player has a winning strategy.
|
[
{
"version": "v1",
"created": "Sat, 22 Oct 2016 08:58:07 GMT"
}
] | 2016-10-25T00:00:00 |
[
[
"Hon",
"Wing-Kai",
""
],
[
"Kloks",
"Ton",
""
],
[
"Liu",
"Fu-Hong",
""
],
[
"Liu",
"Hsiang-Hsuan",
""
],
[
"Wang",
"Tao-Ming",
""
],
[
"Wang",
"Yue-Li",
""
]
] |
new_dataset
| 0.999797 |
1610.07214
|
Jiawei Zhang
|
Jiawei Zhang, Jianbo Jiao, Mingliang Chen, Liangqiong Qu, Xiaobin Xu,
and Qingxiong Yang
|
3D Hand Pose Tracking and Estimation Using Stereo Matching
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
3D hand pose tracking/estimation will be very important in the next
generation of human-computer interaction. Most of the currently available
algorithms rely on low-cost active depth sensors. However, these sensors can be
easily interfered by other active sources and require relatively high power
consumption. As a result, they are currently not suitable for outdoor
environments and mobile devices. This paper aims at tracking/estimating hand
poses using passive stereo which avoids these limitations. A benchmark with
18,000 stereo image pairs and 18,000 depth images captured from different
scenarios and the ground-truth 3D positions of palm and finger joints (obtained
from the manual label) is thus proposed. This paper demonstrates that the
performance of the state-of-the art tracking/estimation algorithms can be
maintained with most stereo matching algorithms on the proposed benchmark, as
long as the hand segmentation is correct. As a result, a novel stereo-based
hand segmentation algorithm specially designed for hand tracking/estimation is
proposed. The quantitative evaluation demonstrates that the proposed algorithm
is suitable for the state-of-the-art hand pose tracking/estimation algorithms
and the tracking quality is comparable to the use of active depth sensors under
different challenging scenarios.
|
[
{
"version": "v1",
"created": "Sun, 23 Oct 2016 18:39:53 GMT"
}
] | 2016-10-25T00:00:00 |
[
[
"Zhang",
"Jiawei",
""
],
[
"Jiao",
"Jianbo",
""
],
[
"Chen",
"Mingliang",
""
],
[
"Qu",
"Liangqiong",
""
],
[
"Xu",
"Xiaobin",
""
],
[
"Yang",
"Qingxiong",
""
]
] |
new_dataset
| 0.986904 |
1610.07238
|
Francois-Xavier Derue Fx
|
Fran\c{c}ois-Xavier Derue, Guillaume-Alexandre Bilodeau, Robert
Bergevin
|
SPiKeS: Superpixel-Keypoints Structure for Robust Visual Tracking
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In visual tracking, part-based trackers are attractive since they are robust
against occlusion and deformation. However, a part represented by a rectangular
patch does not account for the shape of the target, while a superpixel does
thanks to its boundary evidence. Nevertheless, tracking superpixels is
difficult due to their lack of discriminative power. Therefore, to enable
superpixels to be tracked discriminatively as object parts, we propose to
enhance them with keypoints. By combining properties of these two features, we
build a novel element designated as a Superpixel-Keypoints structure (SPiKeS).
Being discriminative, these new object parts can be located efficiently by a
simple nearest neighbor matching process. Then, in a tracking process, each
match votes for the target's center to give its location. In addition, the
interesting properties of our new feature allows the development of an
efficient model update for more robust tracking. According to experimental
results, our SPiKeS-based tracker proves to be robust in many challenging
scenarios by performing favorably against the state-of-the-art.
|
[
{
"version": "v1",
"created": "Sun, 23 Oct 2016 22:00:07 GMT"
}
] | 2016-10-25T00:00:00 |
[
[
"Derue",
"François-Xavier",
""
],
[
"Bilodeau",
"Guillaume-Alexandre",
""
],
[
"Bergevin",
"Robert",
""
]
] |
new_dataset
| 0.951435 |
1610.07324
|
Xiaoshui Huang
|
Xiaoshui Huang, Jian Zhang, Qiang Wu, Lixin Fan, Chun Yuan
|
A coarse-to-fine algorithm for registration in 3D street-view
cross-source point clouds
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the development of numerous 3D sensing technologies, object registration
on cross-source point cloud has aroused researchers' interests. When the point
clouds are captured from different kinds of sensors, there are large and
different kinds of variations. In this study, we address an even more
challenging case in which the differently-source point clouds are acquired from
a real street view. One is produced directly by the LiDAR system and the other
is generated by using VSFM software on image sequence captured from RGB
cameras. When it confronts to large scale point clouds, previous methods mostly
focus on point-to-point level registration, and the methods have many
limitations.The reason is that the least mean error strategy shows poor ability
in registering large variable cross-source point clouds. In this paper,
different from previous ICP-based methods, and from a statistic view, we
propose a effective coarse-to-fine algorithm to detect and register a small
scale SFM point cloud in a large scale Lidar point cloud. Seen from the
experimental results, the model can successfully run on LiDAR and SFM point
clouds, hence it can make a contribution to many applications, such as robotics
and smart city development.
|
[
{
"version": "v1",
"created": "Mon, 24 Oct 2016 08:22:32 GMT"
}
] | 2016-10-25T00:00:00 |
[
[
"Huang",
"Xiaoshui",
""
],
[
"Zhang",
"Jian",
""
],
[
"Wu",
"Qiang",
""
],
[
"Fan",
"Lixin",
""
],
[
"Yuan",
"Chun",
""
]
] |
new_dataset
| 0.997631 |
1410.4410
|
Andrea Del Prete Dr
|
Silvio Traversaro, Andrea Del Prete, Riccardo Muradore, Lorenzo Natale
and Francesco Nori
|
Inertial Parameter Identification Including Friction and Motor Dynamics
|
Pre-print of paper presented at Humanoid Robots, 13th IEEE-RAS
International Conference on, Atlanta, Georgia, 2013
| null |
10.1109/HUMANOIDS.2013.7029957
| null |
cs.RO
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Identification of inertial parameters is fundamental for the implementation
of torque-based control in humanoids. At the same time, good models of friction
and actuator dynamics are critical for the low-level control of joint torques.
We propose a novel method to identify inertial, friction and motor parameters
in a single procedure. The identification exploits the measurements of the PWM
of the DC motors and a 6-axis force/torque sensor mounted inside the kinematic
chain. The partial least-square (PLS) method is used to perform the regression.
We identified the inertial, friction and motor parameters of the right arm of
the iCub humanoid robot. We verified that the identified model can accurately
predict the force/torque sensor measurements and the motor voltages. Moreover,
we compared the identified parameters against the CAD parameters, in the
prediction of the force/torque sensor measurements. Finally, we showed that the
estimated model can effectively detect external contacts, comparing it against
a tactile-based contact detection. The presented approach offers some
advantages with respect to other state-of-the-art methods, because of its
completeness (i.e. it identifies inertial, friction and motor parameters) and
simplicity (only one data collection, with no particular requirements).
|
[
{
"version": "v1",
"created": "Thu, 16 Oct 2014 13:15:37 GMT"
}
] | 2016-10-24T00:00:00 |
[
[
"Traversaro",
"Silvio",
""
],
[
"Del Prete",
"Andrea",
""
],
[
"Muradore",
"Riccardo",
""
],
[
"Natale",
"Lorenzo",
""
],
[
"Nori",
"Francesco",
""
]
] |
new_dataset
| 0.996269 |
1610.06667
|
Soumyabrata Dev
|
Soumyabrata Dev, Shilpa Manandhar, Yee Hui Lee, Stefan Winkler
|
Detecting Rainfall Onset Using Sky Images
|
Accepted in Proc. TENCON 2016 - 2016 IEEE Region 10 Conference
| null | null | null |
cs.CV physics.ao-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ground-based sky cameras (popularly known as Whole Sky Imagers) are
increasingly used now-a-days for continuous monitoring of the atmosphere. These
imagers have higher temporal and spatial resolutions compared to conventional
satellite images. In this paper, we use ground-based sky cameras to detect the
onset of rainfall. These images contain additional information about cloud
coverage and movement and are therefore useful for accurate rainfall nowcast.
We validate our results using rain gauge measurement recordings and achieve an
accuracy of 89% for correct detection of rainfall onset.
|
[
{
"version": "v1",
"created": "Fri, 21 Oct 2016 04:31:03 GMT"
}
] | 2016-10-24T00:00:00 |
[
[
"Dev",
"Soumyabrata",
""
],
[
"Manandhar",
"Shilpa",
""
],
[
"Lee",
"Yee Hui",
""
],
[
"Winkler",
"Stefan",
""
]
] |
new_dataset
| 0.964949 |
1610.06672
|
William Schwartz
|
William K. Schwartz
|
The Broadcaster-Repacking Problem
|
18 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Federal Communications Commission's (FCC's) ongoing Incentive Auction
will, if successful, transfer billions of dollars of radio spectrum from
television broadcasters to mobile-network operators. Hundreds of broadcasters
may go off the air. Most of those remaining on the air, including hundreds of
Canadian broadcasters not bidding, will have to move to new channels to
continue broadcasting. The auction can only end if all these broadcasters will
fit into the spectrum remaining for television. Whether a given set of
broadcasters fits is the broadcaster-repacking problem. The FCC must calculate
its solutions thousands of times per round of bidding. Speed is essential.
By reducing the broadcaster-repacking problem to the maximum independent set
problem, we show that the former is $\mathcal{NP}$-complete. This reduction
also allows us to expand on sparsity-exploiting heuristics in the literature,
which have made the FCC's repacking-problem instances tractable. We conclude by
relating the heuristics to satisfiability and integer programming reductions.
These provide a basis for implementing algorithms in off-the-shelf software to
solve the broadcaster-repacking problem.
|
[
{
"version": "v1",
"created": "Fri, 21 Oct 2016 04:52:38 GMT"
}
] | 2016-10-24T00:00:00 |
[
[
"Schwartz",
"William K.",
""
]
] |
new_dataset
| 0.986936 |
1511.01436
|
Damien Fay
|
Damien Fay, Hamed Haddadi, Michael C. Seto, Han Wang, and Christoph
Carl Kling
|
An exploration of fetish social networks and communities
|
16 pages
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online Social Networks (OSNs) provide a venue for virtual interactions and
relationships between individuals. In some communities, OSNs also facilitate
arranging online meetings and relationships. FetLife, the worlds largest
anonymous social network for the BDSM, fetish and kink communities, provides a
unique example of an OSN that serves as an interaction space, community
organizing tool, and sexual market. In this paper, we present a first look at
the characteristics of European members of Fetlife, comprising 504,416
individual nodes with 1,912,196 connections. We looked at user characteristics
in terms of gender, sexual orientation, and preferred role. We further examined
the topological and structural properties of groups, as well as the type of
interactions and relations between their members. Our results suggest there are
important differences between the FetLife community and conventional OSNs. The
network can be characterised by complex gender based interactions both from a
sexual market and platonic viewpoint which point to a truly fascinating social
network.
|
[
{
"version": "v1",
"created": "Wed, 4 Nov 2015 19:06:22 GMT"
}
] | 2016-10-23T00:00:00 |
[
[
"Fay",
"Damien",
""
],
[
"Haddadi",
"Hamed",
""
],
[
"Seto",
"Michael C.",
""
],
[
"Wang",
"Han",
""
],
[
"Kling",
"Christoph Carl",
""
]
] |
new_dataset
| 0.998822 |
0803.4354
|
Moustapha Diaby
|
Moustapha Diaby
|
A O(n^8) X O(n^7) Linear Programming Model of the Traveling Salesman
Problem
|
Theorem 25 and Corollary 26 are incorrect. The modeling needs
9-dimensional variables instead of the 8-dimensional variables defined in
notations 10.2. For fully-detailed exposition of the correct model see the
book available at: The correct modeling is fully detailed in the book
available at: http://www.worldscientific.com/worldscibooks/10.1142/9725
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present a new linear programming (LP) formulation of the
Traveling Salesman Problem (TSP). The proposed model has O(n^8) variables and
O(n^7) constraints, where n is the number of cities. Our numerical
experimentation shows that computational times for the proposed linear program
are several orders of magnitude smaller than those for the existing model [3].
|
[
{
"version": "v1",
"created": "Sun, 30 Mar 2008 23:26:50 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Sep 2010 21:08:18 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Sep 2013 03:16:08 GMT"
},
{
"version": "v4",
"created": "Sun, 2 Mar 2014 15:12:27 GMT"
},
{
"version": "v5",
"created": "Tue, 18 Mar 2014 19:34:06 GMT"
},
{
"version": "v6",
"created": "Thu, 20 Oct 2016 16:58:38 GMT"
}
] | 2016-10-21T00:00:00 |
[
[
"Diaby",
"Moustapha",
""
]
] |
new_dataset
| 0.993115 |
1606.00127
|
Dennis Michaelis
|
Dennis Michaelis, Aydin Sezgin and Eduard Jorswieck
|
On the Capacity of an Elemental Two-Way Two-Tier Network
|
6 pages, 5 figures, conference
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A basic setup of a two-tier network, where two mobile users exchange messages
with a multi-antenna macrocell basestation, is studied from a rate perspective
subject to beamforming and power constraints. The communication is facilitated
by two femtocell basestations which act as relays as there is no direct link
between the macrocell basestation and the mobile users. We propose a scheme
based on physical-layer network coding and compute-and-forward combined with a
novel approach that solves the problem of beamformer design and power
allocation. We also show that the optimal beamformers are always a convex
combination of the channels between the macro- and femtocell basestations. We
then establish the cut-set bound of the setup to show that the presented scheme
almost achieves the capacity of the setup numerically.
|
[
{
"version": "v1",
"created": "Wed, 1 Jun 2016 06:17:50 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Oct 2016 12:37:52 GMT"
}
] | 2016-10-21T00:00:00 |
[
[
"Michaelis",
"Dennis",
""
],
[
"Sezgin",
"Aydin",
""
],
[
"Jorswieck",
"Eduard",
""
]
] |
new_dataset
| 0.990128 |
1610.06212
|
Nikolaus Kleber
|
Nikolaus Kleber and Jonathan Chisum and Aaron Striegel and Bertrand
Hochwald and Abbas Termos and J. Nicholas Laneman and Zuohui Fu and John
Merritt
|
RadioHound: A Pervasive Sensing Network for Sub-6 GHz Dynamic Spectrum
Monitoring
|
Submitted to DySPAN 2017
| null | null | null |
cs.NI cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We design a custom spectrum sensing network, called RadioHound, capable of
tuning from 25 MHz to 6 GHz, which covers nearly all widely-deployed wireless
activity. We describe the system hardware and network infrastructure in detail
with a view towards driving the cost, size, and power usage of the sensors as
low as possible. The system estimates the spatial variation of radio-frequency
power from an unknown random number of sources. System performance is measured
by computing the mean square error against a simulated radio-frequency
environment. We find that the system performance depends heavily on the
deployment density of the sensors. Consequently, we derive an expression for
the sensor density as a function of environmental characteristics and
confidence in measurement quality.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2016 20:55:28 GMT"
}
] | 2016-10-21T00:00:00 |
[
[
"Kleber",
"Nikolaus",
""
],
[
"Chisum",
"Jonathan",
""
],
[
"Striegel",
"Aaron",
""
],
[
"Hochwald",
"Bertrand",
""
],
[
"Termos",
"Abbas",
""
],
[
"Laneman",
"J. Nicholas",
""
],
[
"Fu",
"Zuohui",
""
],
[
"Merritt",
"John",
""
]
] |
new_dataset
| 0.998822 |
1610.06355
|
Can Xiang
|
Can Xiang
|
It is indeed a fundamental construction of all linear codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Linear codes are widely employed in communication systems, consumer
electronics, and storage devices. All linear codes over finite fields can be
generated by a generator matrix. Due to this, the generator matrix approach is
called a fundamental construction of linear codes. This is the only known
construction method that can produce all linear codes over finite fields.
Recently, a defining-set construction of linear codes over finite fields has
attracted a lot of attention, and have been employed to produce a huge number
of classes of linear codes over finite fields. It was claimed that this
approach can also generate all linear codes over finite fields. But so far, no
proof of this claim is given in the literature. The objective of this paper is
to prove this claim, and confirm that the defining-set approach is indeed a
fundamental approach to constructing all linear codes over finite fields. As a
byproduct, a trace representation of all linear codes over finite fields is
presented.
|
[
{
"version": "v1",
"created": "Thu, 20 Oct 2016 11:02:53 GMT"
}
] | 2016-10-21T00:00:00 |
[
[
"Xiang",
"Can",
""
]
] |
new_dataset
| 0.992803 |
1610.06426
|
Nikos Konofaos
|
D. Ntalaperas, N. Konofaos
|
A Quantum Cellular Automata architecture with nearest neighbor
interactions using one quantum gate type
|
The artcile contains 15 figures
| null | null | null |
cs.ET physics.comp-ph
|
http://creativecommons.org/publicdomain/zero/1.0/
|
We propose an architecture based on Quantum cellular Automata which allows
the use of only one type of quantum gates per computational step in order to
perform nearest neighbor interactions. The model is built in partial steps,
each one of them analyzed using nearest neighbor interactions, starting with
single qubit operations and continuing with two qubit ones. The effectiveness
of the model is tested and valuated by developing a quantum circuit
implementing the Quantum Fourier Transform. The important outcome of this
validation was that the operations are performed in a local and controlled
manner thus reducing the error rate of each computational step.
|
[
{
"version": "v1",
"created": "Thu, 20 Oct 2016 14:21:29 GMT"
}
] | 2016-10-21T00:00:00 |
[
[
"Ntalaperas",
"D.",
""
],
[
"Konofaos",
"N.",
""
]
] |
new_dataset
| 0.998309 |
1610.06458
|
Mansoor Yousefi
|
Mansoor I. Yousefi
|
The Asymptotic Capacity of the Optical Fiber
|
The abstract in the PDF file is longer. Arxiv limits the abstract
field to 1,920 characters
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is shown that signal energy is the only available degree-of-freedom (DOF)
for fiber-optic transmission as the input power tends to infinity. With $n$
signal DOFs at the input, $n-1$ DOFs are asymptotically lost to signal-noise
interactions. The main observation is that, nonlinearity introduces a
multiplicative noise in the channel, similar to fading in wireless channels.
The channel is viewed in the spherical coordinate system, where signal vector
$\underline{X}\in\mathbb{C}^n$ is represented in terms of its norm
$|\underline{X}|$ and direction $\underline{\hat{X}}$. The multiplicative noise
causes signal direction $\underline{\hat{X}}$ to vary randomly on the surface
of the unit $(2n-1)$-sphere in $\mathbb{C}^{n}$, in such a way that the
effective area of the support of $\underline{\hat{X}}$ does not vanish as
$|\underline{X}|\rightarrow\infty$. On the other hand, the surface area of the
sphere is finite, so that $\underline{\hat{X}}$ carries finite information.
This observation is used to show several results. Firstly, let $\mathcal
C(\mathcal P)$ be the capacity of a discrete-time periodic model of the optical
fiber with distributed noise and frequency-dependent loss, as a function of the
average input power $\mathcal P$. It is shown that asymptotically as $\mathcal
P\rightarrow\infty$, $\mathcal C=\frac{1}{n}\log\bigl(\log\mathcal P\bigr)+c$,
where $n$ is the dimension of the input signal space and $c$ is a bounded
number. In particular, $\lim_{\mathcal P\rightarrow\infty}\mathcal C(\mathcal
P)=\infty$ in finite-dimensional periodic models. Secondly, it is shown that
capacity saturates to a constant in infinite-dimensional models where
$n=\infty$.
|
[
{
"version": "v1",
"created": "Thu, 20 Oct 2016 15:32:53 GMT"
}
] | 2016-10-21T00:00:00 |
[
[
"Yousefi",
"Mansoor I.",
""
]
] |
new_dataset
| 0.999342 |
1610.06494
|
Ahmed Ibrahim
|
Ahmed Ibrahim, A. Lynn Abbott, Mohamed E. Hussein
|
An Image Dataset of Text Patches in Everyday Scenes
|
Accepted in the 12th International Symposium on Visual Computing
(ISVC'16)
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes a dataset containing small images of text from everyday
scenes. The purpose of the dataset is to support the development of new
automated systems that can detect and analyze text. Although much research has
been devoted to text detection and recognition in scanned documents, relatively
little attention has been given to text detection in other types of images,
such as photographs that are posted on social-media sites. This new dataset,
known as COCO-Text-Patch, contains approximately 354,000 small images that are
each labeled as "text" or "non-text". This dataset particularly addresses the
problem of text verification, which is an essential stage in the end-to-end
text detection and recognition pipeline. In order to evaluate the utility of
this dataset, it has been used to train two deep convolution neural networks to
distinguish text from non-text. One network is inspired by the GoogLeNet
architecture, and the second one is based on CaffeNet. Accuracy levels of 90.2%
and 90.9% were obtained using the two networks, respectively. All of the
images, source code, and deep-learning trained models described in this paper
will be publicly available
|
[
{
"version": "v1",
"created": "Thu, 20 Oct 2016 16:38:42 GMT"
}
] | 2016-10-21T00:00:00 |
[
[
"Ibrahim",
"Ahmed",
""
],
[
"Abbott",
"A. Lynn",
""
],
[
"Hussein",
"Mohamed E.",
""
]
] |
new_dataset
| 0.999903 |
1610.05971
|
Shachar Siboni
|
Shachar Siboni, Vinay Sachidananda, Asaf Shabtai and Yuval Elovici
|
Security Testbed for the Internet of Things
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Internet of Things (IoT) is a global ecosystem of information and
communication technologies aimed at connecting any type of object (thing), at
any time and in any place, to each other and to the Internet. One of the major
problems associated with the IoT is maintaining security; the heterogeneous
nature of such deployments poses a challenge to many aspects of security,
including security testing and analysis. In addition, there is no existing
mechanism that performs security testing for IoT devices in different contexts.
In this paper, we propose an innovative security testbed framework targeted at
IoT devices. The security testbed supports both standard and context-based
security testing, with a set of security tests conducted under the different
environmental conditions in which IoT devices operate. The requirements and
architectural design of the proposed testbed are discussed, and the testbed
operation is demonstrated in several testing scenarios.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2016 11:58:29 GMT"
}
] | 2016-10-20T00:00:00 |
[
[
"Siboni",
"Shachar",
""
],
[
"Sachidananda",
"Vinay",
""
],
[
"Shabtai",
"Asaf",
""
],
[
"Elovici",
"Yuval",
""
]
] |
new_dataset
| 0.996774 |
1610.06043
|
Seyed Amir Tafrishi
|
Seyed Amir Tafrishi
|
"RollRoller" Novel Spherical Mobile Robot Basic Dynamical Analysis and
Motion Simulations
|
M.Sc. Dissertation, Automation and Control Systems Department,
University of Sheffield, UK, Supervisor: Sandor M. Veres
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces novel air actuated spherical robot called "RollRoller".
The RollRoller robot consists of two essential parts: tubes covered with a
shell as a frame and mechanical controlling parts to correspond movements. The
RollRoller is proposed to be high potential alternative for exploration and
rescue missions robots because robot utilizing its locomotion via all possible
deriving methods (gravity, torque and angular momentum forces). In beginning ,
characteristic and role of each of component and features were explained. Next,
to determine the uniqueness of this robot, the known and other extra possible
motions are shown by proposing their own algorithmic movements. To illustrate
main motion of this robot was inherent to mathematical models, the forward
direction dynamical behavior on flat surface was derived. Additionally, Matlab
Simulink was used to plot the results to validate the behavior for both
fractional and non-fractional terrains. Lastly, after designing the model of
robot in Solidworks Program, Adams/View visualization software ( the robot
simulated form ) was utilized to proof the Matlab Simulink results and to show
the more detailed and complete form of locomotion including the forward
direction and circular locomotion in proposed robot.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2016 14:50:53 GMT"
}
] | 2016-10-20T00:00:00 |
[
[
"Tafrishi",
"Seyed Amir",
""
]
] |
new_dataset
| 0.995905 |
1610.06044
|
Carl Kesselman
|
Karl Czajkowski, Carl Kesselman, Robert Schuler, Hongsuda
Tangmunarunkit
|
ERMrest: an entity-relationship data storage service for web-based,
data-oriented collaboration
| null | null | null | null |
cs.DB cs.DC cs.DL cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Scientific discovery is increasingly dependent on a scientist's ability to
acquire, curate, integrate, analyze, and share large and diverse collections of
data. While the details vary from domain to domain, these data often consist of
diverse digital assets (e.g. image files, sequence data, or simulation outputs)
that are organized with complex relationships and context which may evolve over
the course of an investigation. In addition, discovery is often collaborative,
such that sharing of the data and its organizational context is highly
desirable. Common systems for managing file or asset metadata hide their
inherent relational structures, while traditional relational database systems
do not extend to the distributed collaborative environment often seen in
scientific investigations. To address these issues, we introduce ERMrest, a
collaborative data management service which allows general entity-relationship
modeling of metadata manipulated by RESTful access methods. We present the
design criteria, architecture, and service implementation, as well as describe
an ecosystem of tools and services that we have created to integrate metadata
into an end-to-end scientific data life cycle. ERMrest has been deployed to
hundreds of users across multiple scientific research communities and projects.
We present two representative use cases: an international consortium and an
early-phase, multidisciplinary research project.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2016 14:52:15 GMT"
}
] | 2016-10-20T00:00:00 |
[
[
"Czajkowski",
"Karl",
""
],
[
"Kesselman",
"Carl",
""
],
[
"Schuler",
"Robert",
""
],
[
"Tangmunarunkit",
"Hongsuda",
""
]
] |
new_dataset
| 0.989904 |
1610.06046
|
Adekunle Shonola Adekunle Shonola
|
Shaibu Adekunle Shonola and Mike Joy
|
Enhancing mobile learning security
| null | null |
10.5121/ijite.2016.5301
| null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile devices have been playing vital roles in modern day education delivery
as students can access or download learning materials on their smartphones and
tablets, they can also install educational apps and study anytime, anywhere.
The need to provide adequate security for portable devices being used for
learning cannot be underestimated. In this paper, we present a mobile security
enhancement app, designed and developed for Android smart mobile devices in
order to promote security awareness among students. The app can also identify
major and the most significant security weaknesses, scan or check for
vulnerabilities in m-learning devices and report any security threat.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2016 14:58:34 GMT"
}
] | 2016-10-20T00:00:00 |
[
[
"Shonola",
"Shaibu Adekunle",
""
],
[
"Joy",
"Mike",
""
]
] |
new_dataset
| 0.973922 |
1610.06136
|
Fengwei Yu
|
Fengwei Yu, Wenbo Li, Quanquan Li, Yu Liu, Xiaohua Shi, Junjie Yan
|
POI: Multiple Object Tracking with High Performance Detection and
Appearance Feature
|
ECCV workshop BMTT 2016
|
ECCV 2016 Workshops, Part II, LNCS 9914, paper approval (Chapter
3, 978-3-319-48880-6, 434776_1_En
| null | null |
cs.CV
|
http://creativecommons.org/publicdomain/zero/1.0/
|
Detection and learning based appearance feature play the central role in data
association based multiple object tracking (MOT), but most recent MOT works
usually ignore them and only focus on the hand-crafted feature and association
algorithms. In this paper, we explore the high-performance detection and deep
learning based appearance feature, and show that they lead to significantly
better MOT results in both online and offline setting. We make our detection
and appearance feature publicly available. In the following part, we first
summarize the detection and appearance feature, and then introduce our tracker
named Person of Interest (POI), which has both online and offline version.
|
[
{
"version": "v1",
"created": "Wed, 19 Oct 2016 18:10:21 GMT"
}
] | 2016-10-20T00:00:00 |
[
[
"Yu",
"Fengwei",
""
],
[
"Li",
"Wenbo",
""
],
[
"Li",
"Quanquan",
""
],
[
"Liu",
"Yu",
""
],
[
"Shi",
"Xiaohua",
""
],
[
"Yan",
"Junjie",
""
]
] |
new_dataset
| 0.964807 |
1312.1918
|
Silas Fong
|
Silas L. Fong and Raymond W. Yeung
|
Cut-Set Bounds for Networks with Zero-Delay Nodes
|
Submitted to IEEE Transactions on Information Theory in Aug, 2012
|
IEEE Transactions on Information Theory, vol. 61, pp. 3837-3850,
Jul, 2015
|
10.1109/TIT.2015.2432760
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a network, a node is said to incur a delay if its encoding of each
transmitted symbol involves only its received symbols obtained before the time
slot in which the transmitted symbol is sent (hence the transmitted symbol sent
in a time slot cannot depend on the received symbol obtained in the same time
slot). A node is said to incur no delay if its received symbol obtained in a
time slot is available for encoding its transmitted symbol sent in the same
time slot. Under the classical model, every node in a discrete memoryless
network (DMN) incurs a unit delay, and the capacity region of the DMN satisfies
the well-known cut-set outer bound. In this paper, we propose a generalized
model for the DMN where some nodes may incur no delay. Under our generalized
model, we obtain a new cut-set outer bound, which is proved to be tight for
some two-node DMN and is shown to subsume an existing cut-set bound for the
causal relay network. In addition, we establish under the generalized model
another cut-set outer bound on the positive-delay region -- the set of
achievable rate tuples under the constraint that every node incurs a delay. We
use the cut-set bound on the positive-delay region to show that for some
two-node DMN under the generalized model, the positive-delay region is strictly
smaller than the capacity region.
|
[
{
"version": "v1",
"created": "Fri, 6 Dec 2013 16:50:53 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Dec 2013 22:07:58 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Feb 2015 02:00:16 GMT"
}
] | 2016-10-19T00:00:00 |
[
[
"Fong",
"Silas L.",
""
],
[
"Yeung",
"Raymond W.",
""
]
] |
new_dataset
| 0.983403 |
1502.03204
|
Silas Fong
|
Silas L. Fong and Vincent Y. F. Tan
|
A Proof of the Strong Converse Theorem for Gaussian Multiple Access
Channels
|
Explanation of the proof is added. Typos are corrected
| null |
10.1109/TIT.2016.2570243
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove the strong converse for the $N$-source Gaussian multiple access
channel (MAC). In particular, we show that any rate tuple that can be supported
by a sequence of codes with asymptotic average error probability less than one
must lie in the Cover-Wyner capacity region. Our proof consists of the
following. First, we perform an expurgation step to convert any given sequence
of codes with asymptotic average error probability less than one to codes with
asymptotic maximal error probability less than one. Second, we quantize the
input alphabets with an appropriately chosen resolution. Upon quantization, we
apply the wringing technique (by Ahlswede) on the quantized inputs to obtain
further subcodes from the subcodes obtained in the expurgation step so that the
resultant correlations among the symbols transmitted by the different sources
vanish as the blocklength grows. Finally, we derive upper bounds on achievable
sum-rates of the subcodes in terms of the type-II error of a binary hypothesis
test. These upper bounds are then simplified through judicious choices of
auxiliary output distributions. Our strong converse result carries over to the
Gaussian interference channel under strong interference as long as the sum of
the two asymptotic average error probabilities less than one.
|
[
{
"version": "v1",
"created": "Wed, 11 Feb 2015 07:24:53 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Feb 2015 10:21:04 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Mar 2015 05:41:31 GMT"
},
{
"version": "v4",
"created": "Wed, 21 Oct 2015 03:39:01 GMT"
},
{
"version": "v5",
"created": "Tue, 26 Apr 2016 03:45:39 GMT"
}
] | 2016-10-19T00:00:00 |
[
[
"Fong",
"Silas L.",
""
],
[
"Tan",
"Vincent Y. F.",
""
]
] |
new_dataset
| 0.992995 |
1502.05623
|
Matteo Gallet
|
Matteo Gallet and Christoph Koutschan and Zijia Li and Georg
Regensburger and Josef Schicho and Nelly Villamizar
|
Planar Linkages Following a Prescribed Motion
|
33 pages, 12 figures
|
Mathematics of Computation 86 (2017), pages 473-506
|
10.1090/mcom/3120
| null |
cs.SC cs.CG cs.RO math.AG math.RA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Designing mechanical devices, called linkages, that draw a given plane curve
has been a topic that interested engineers and mathematicians for hundreds of
years, and recently also computer scientists. Already in 1876, Kempe proposed a
procedure for solving the problem in full generality, but his constructions
tend to be extremely complicated. We provide a novel algorithm that produces
much simpler linkages, but works only for parametric curves. Our approach is to
transform the problem into a factorization task over some noncommutative
algebra. We show how to compute such a factorization, and how to use it to
construct a linkage tracing a given curve.
|
[
{
"version": "v1",
"created": "Thu, 19 Feb 2015 16:52:41 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Apr 2016 12:48:05 GMT"
}
] | 2016-10-19T00:00:00 |
[
[
"Gallet",
"Matteo",
""
],
[
"Koutschan",
"Christoph",
""
],
[
"Li",
"Zijia",
""
],
[
"Regensburger",
"Georg",
""
],
[
"Schicho",
"Josef",
""
],
[
"Villamizar",
"Nelly",
""
]
] |
new_dataset
| 0.980696 |
1609.05649
|
Chunming Tang
|
Sihem Mesnager, Chunming Tang, Yanfeng Qi
|
Complementary Dual Algebraic Geometry Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Linear complementary dual (LCD) codes is a class of linear codes introduced
by Massey in 1964. LCD codes have been extensively studied in literature
recently. In addition to their applications in data storage, communications
systems, and consumer electronics, LCD codes have been employed in
cryptography. More specifically, it has been shown that LCD codes can also help
improve the security of the information processed by sensitive devices,
especially against so-called side-channel attacks (SCA) and fault non-invasive
attacks. In this paper, we are interested in the construction of particular
algebraic geometry (AG) LCD codes which could be good candidates to be
resistant against SCA. We firstly provide a construction scheme for obtaining
LCD codes from elliptic curves. Then, some explicit LCD codes from elliptic
curve are presented. MDS codes are of the most importance in coding theory due
to their theoretical significance and practical interests. In this paper, all
the constructed LCD codes from elliptic curves are MDS or almost MDS. Some
infinite classes of LCD codes from elliptic curves are optimal due to the
Griesmer bound. Finally, we introduce a construction mechanism for obtaining
LCD codes from any algebraic curve and derive some explicit LCD codes from
hyperelliptic curves and Hermitian curves.
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2016 09:42:15 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Oct 2016 12:47:38 GMT"
}
] | 2016-10-19T00:00:00 |
[
[
"Mesnager",
"Sihem",
""
],
[
"Tang",
"Chunming",
""
],
[
"Qi",
"Yanfeng",
""
]
] |
new_dataset
| 0.997677 |
1610.05270
|
Bas Spitters
|
Bas Spitters
|
Cubical sets and the topological topos
| null | null | null | null |
cs.LO math.CT math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Coquand's cubical set model for homotopy type theory provides the basis for a
computational interpretation of the univalence axiom and some higher inductive
types, as implemented in the cubical proof assistant. This paper contributes to
the understanding of this model. We make three contributions:
1. Johnstone's topological topos was created to present the geometric
realization of simplicial sets as a geometric morphism between toposes.
Johnstone shows that simplicial sets classify strict linear orders with
disjoint endpoints and that (classically) the unit interval is such an order.
Here we show that it can also be a target for cubical realization by showing
that Coquand's cubical sets classify the geometric theory of flat distributive
lattices. As a side result, we obtain a simplicial realization of a cubical
set.
2. Using the internal `interval' in the topos of cubical sets, we construct a
Moore path model of identity types.
3. We construct a premodel structure internally in the cubical type theory
and hence on the fibrant objects in cubical sets.
|
[
{
"version": "v1",
"created": "Mon, 17 Oct 2016 19:11:16 GMT"
}
] | 2016-10-19T00:00:00 |
[
[
"Spitters",
"Bas",
""
]
] |
new_dataset
| 0.979732 |
1610.05402
|
Luis Meira
|
Guilherme A. Zeni, Mauro Menzori, P. S. Martins, Luis A. A. Meira
|
VRPBench: A Vehicle Routing Benchmark Tool
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The number of optimization techniques in the combinatorial domain is large
and diversified. Nevertheless, there is still a lack of real benchmarks to
validate optimization algorithms. In this work we introduce VRPBench, a tool to
create instances and visualize solutions to the Vehicle Routing Problem (VRP)
in a planar graph embedded in the Euclidean 2D space. We use VRPBench to model
a real-world mail delivery case of the city of Artur Nogueira. Such scenarios
were characterized as a multi-objective optimization of the VRP. We extracted a
weighted graph from a digital map of the city to create a challenging benchmark
for the VRP. Each instance models one generic day of mail delivery with
hundreds to thousands of delivery points, thus allowing both the comparison and
validation of optimization algorithms for routing problems.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2016 02:01:16 GMT"
}
] | 2016-10-19T00:00:00 |
[
[
"Zeni",
"Guilherme A.",
""
],
[
"Menzori",
"Mauro",
""
],
[
"Martins",
"P. S.",
""
],
[
"Meira",
"Luis A. A.",
""
]
] |
new_dataset
| 0.996286 |
1610.05424
|
Ali Khalajmehrabadi
|
Ali Khalajmehrabadi, Nikolaos Gatsis, and David Akopian
|
Modern WLAN Fingerprinting Indoor Positioning Methods and Deployment
Challenges
| null | null | null | null |
cs.NI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless Local Area Network (WLAN) has become a promising choice for indoor
positioning as the only existing and established infrastructure, to localize
the mobile and stationary users indoors. However, since WLAN has been initially
designed for wireless networking and not positioning, the localization task
based on WLAN signals has several challenges. Amongst the WLAN positioning
methods, WLAN fingerprinting localization has recently achieved great attention
due to its promising results. WLAN fingerprinting faces several challenges and
hence, in this paper, our goal is to overview these challenges and the
state-of-the-art solutions. This paper consists of three main parts: 1)
Conventional localization schemes; 2) State-of-the-art approaches; 3) Practical
deployment challenges. Since all the proposed methods in WLAN literature have
been conducted and tested in different settings, the reported results are not
equally comparable. So, we compare some of the main localization schemes in a
single real environment and assess their localization accuracy, positioning
error statistics, and complexity. Our results depict illustrative evaluation of
WLAN localization systems and guide to future improvement opportunities.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2016 03:53:19 GMT"
}
] | 2016-10-19T00:00:00 |
[
[
"Khalajmehrabadi",
"Ali",
""
],
[
"Gatsis",
"Nikolaos",
""
],
[
"Akopian",
"David",
""
]
] |
new_dataset
| 0.999008 |
1610.05431
|
Xiaohu Ge
|
Xiaohu Ge, Yehong Qiu, Jiaqi Chen, Meidong Huang, Hui Xu, Jing Xu,
Wuxiong Zhang, Yang Yang, Cheng-Xiang Wang, John Thompson
|
Wireless Fractal Cellular Networks
|
16 pages, 4 figures
| null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by/4.0/
|
With the seamless coverage of wireless cellular networks in modern society,
it is interesting to consider the shape of wireless cellular coverage. Is the
shape a regular hexagon, an irregular polygon, or another complex geometrical
shape? Based on fractal theory, the statistical characteristic of the wireless
cellular coverage boundary is determined by the measured wireless cellular data
collected from Shanghai, China. The measured results indicate that the wireless
cellular coverage boundary presents an extremely irregular geometrical shape,
which is also called a statistical fractal shape. Moreover, the statistical
fractal characteristics of the wireless cellular coverage boundary have been
validated by values of the Hurst parameter estimated in angular scales. The
statistical fractal characteristics of the wireless cellular coverage boundary
can be used to evaluate and design the handoff scheme of mobile user terminals
in wireless cellular networks.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2016 04:33:10 GMT"
}
] | 2016-10-19T00:00:00 |
[
[
"Ge",
"Xiaohu",
""
],
[
"Qiu",
"Yehong",
""
],
[
"Chen",
"Jiaqi",
""
],
[
"Huang",
"Meidong",
""
],
[
"Xu",
"Hui",
""
],
[
"Xu",
"Jing",
""
],
[
"Zhang",
"Wuxiong",
""
],
[
"Yang",
"Yang",
""
],
[
"Wang",
"Cheng-Xiang",
""
],
[
"Thompson",
"John",
""
]
] |
new_dataset
| 0.99971 |
1610.05540
|
Josep Crego
|
Josep Crego, Jungi Kim, Guillaume Klein, Anabel Rebollo, Kathy Yang,
Jean Senellart, Egor Akhanov, Patrice Brunelle, Aurelien Coquard, Yongchao
Deng, Satoshi Enoue, Chiyo Geiss, Joshua Johanson, Ardas Khalsa, Raoum
Khiari, Byeongil Ko, Catherine Kobus, Jean Lorieux, Leidiana Martins,
Dang-Chuan Nguyen, Alexandra Priori, Thomas Riccardi, Natalia Segal,
Christophe Servan, Cyril Tiquet, Bo Wang, Jin Yang, Dakun Zhang, Jing Zhou,
Peter Zoldan
|
SYSTRAN's Pure Neural Machine Translation Systems
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Since the first online demonstration of Neural Machine Translation (NMT) by
LISA, NMT development has recently moved from laboratory to production systems
as demonstrated by several entities announcing roll-out of NMT engines to
replace their existing technologies. NMT systems have a large number of
training configurations and the training process of such systems is usually
very long, often a few weeks, so role of experimentation is critical and
important to share. In this work, we present our approach to production-ready
systems simultaneously with release of online demonstrators covering a large
variety of languages (12 languages, for 32 language pairs). We explore
different practical choices: an efficient and evolutive open-source framework;
data preparation; network architecture; additional implemented features; tuning
for production; etc. We discuss about evaluation methodology, present our first
findings and we finally outline further work.
Our ultimate goal is to share our expertise to build competitive production
systems for "generic" translation. We aim at contributing to set up a
collaborative framework to speed-up adoption of the technology, foster further
research efforts and enable the delivery and adoption to/by industry of
use-case specific engines integrated in real production workflows. Mastering of
the technology would allow us to build translation engines suited for
particular needs, outperforming current simplest/uniform systems.
|
[
{
"version": "v1",
"created": "Tue, 18 Oct 2016 11:32:42 GMT"
}
] | 2016-10-19T00:00:00 |
[
[
"Crego",
"Josep",
""
],
[
"Kim",
"Jungi",
""
],
[
"Klein",
"Guillaume",
""
],
[
"Rebollo",
"Anabel",
""
],
[
"Yang",
"Kathy",
""
],
[
"Senellart",
"Jean",
""
],
[
"Akhanov",
"Egor",
""
],
[
"Brunelle",
"Patrice",
""
],
[
"Coquard",
"Aurelien",
""
],
[
"Deng",
"Yongchao",
""
],
[
"Enoue",
"Satoshi",
""
],
[
"Geiss",
"Chiyo",
""
],
[
"Johanson",
"Joshua",
""
],
[
"Khalsa",
"Ardas",
""
],
[
"Khiari",
"Raoum",
""
],
[
"Ko",
"Byeongil",
""
],
[
"Kobus",
"Catherine",
""
],
[
"Lorieux",
"Jean",
""
],
[
"Martins",
"Leidiana",
""
],
[
"Nguyen",
"Dang-Chuan",
""
],
[
"Priori",
"Alexandra",
""
],
[
"Riccardi",
"Thomas",
""
],
[
"Segal",
"Natalia",
""
],
[
"Servan",
"Christophe",
""
],
[
"Tiquet",
"Cyril",
""
],
[
"Wang",
"Bo",
""
],
[
"Yang",
"Jin",
""
],
[
"Zhang",
"Dakun",
""
],
[
"Zhou",
"Jing",
""
],
[
"Zoldan",
"Peter",
""
]
] |
new_dataset
| 0.996893 |
1504.00513
|
Natali Ruchansky
|
Natali Ruchansky, Francesco Bonchi, David Garcia-Soriano, Francesco
Gullo, Nicolas Kourtellis
|
The Minimum Wiener Connector
|
Published in Proceedings of the 2015 ACM SIGMOD International
Conference on Management of Data
| null |
10.1145/2723372.2749449
| null |
cs.SI cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Wiener index of a graph is the sum of all pairwise shortest-path
distances between its vertices. In this paper we study the novel problem of
finding a minimum Wiener connector: given a connected graph $G=(V,E)$ and a set
$Q\subseteq V$ of query vertices, find a subgraph of $G$ that connects all
query vertices and has minimum Wiener index.
We show that The Minimum Wiener Connector admits a polynomial-time (albeit
impractical) exact algorithm for the special case where the number of query
vertices is bounded. We show that in general the problem is NP-hard, and has no
PTAS unless $\mathbf{P} = \mathbf{NP}$. Our main contribution is a
constant-factor approximation algorithm running in time
$\widetilde{O}(|Q||E|)$.
A thorough experimentation on a large variety of real-world graphs confirms
that our method returns smaller and denser solutions than other methods, and
does so by adding to the query set $Q$ a small number of important vertices
(i.e., vertices with high centrality).
|
[
{
"version": "v1",
"created": "Thu, 2 Apr 2015 11:36:56 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Oct 2016 04:40:23 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Ruchansky",
"Natali",
""
],
[
"Bonchi",
"Francesco",
""
],
[
"Garcia-Soriano",
"David",
""
],
[
"Gullo",
"Francesco",
""
],
[
"Kourtellis",
"Nicolas",
""
]
] |
new_dataset
| 0.996693 |
1603.04146
|
Shuhan Chen
|
Shuhan Chen, Jindong Li, Xuelong Hu, Ping Zhou
|
Saliency Detection for Improving Object Proposals
|
IEEE DSP 2016
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Object proposals greatly benefit object detection task in recent
state-of-the-art works. However, the existing object proposals usually have low
localization accuracy at high intersection over union threshold. To address it,
we apply saliency detection to each bounding box to improve their quality in
this paper. We first present a geodesic saliency detection method in contour,
which is designed to find closed contours. Then, we apply it to each candidate
box with multi-sizes, and refined boxes can be easily produced in the obtained
saliency maps which are further used to calculate saliency scores for proposal
ranking. Experiments on PASCAL VOC 2007 test dataset demonstrate the proposed
refinement approach can greatly improve existing models.
|
[
{
"version": "v1",
"created": "Mon, 14 Mar 2016 06:44:43 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Mar 2016 02:01:08 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Oct 2016 06:30:08 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Chen",
"Shuhan",
""
],
[
"Li",
"Jindong",
""
],
[
"Hu",
"Xuelong",
""
],
[
"Zhou",
"Ping",
""
]
] |
new_dataset
| 0.96095 |
1607.03848
|
Minghui Jiang
|
Minghui Jiang
|
Periodicity of identifying codes in strips
|
added two references [2,3] and updated introduction
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An identifying code in a graph is a subset of vertices having a nonempty and
distinct intersection with the closed neighborhood of every vertex. We prove
that the infimum density of any identifying code in $S_k$ (an infinite strip of
$k$ rows in the square grid) can always be achieved by a periodic identifying
code with pattern length at most $2^{4k}$. Assisted by a compute program
implementing Karp's algorithm for minimum cycle mean, we find a periodic
identifying code in $S_4$ with the minimum density $11/28$, and a periodic
identifying code in $S_5$ with the minimum density $19/50$.
|
[
{
"version": "v1",
"created": "Wed, 13 Jul 2016 18:14:32 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Oct 2016 18:37:32 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Jiang",
"Minghui",
""
]
] |
new_dataset
| 0.995961 |
1610.04688
|
Inho Cho
|
Inho Cho, Dongsu Han, Keon Jang
|
ExpressPass: End-to-End Credit-based Congestion Control for Datacenters
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As link speeds increase in datacenter networks, existing congestion control
algorithms become less effective in providing fast convergence. TCP-based
algorithms that probe for bandwidth take a long time to reach the fair-share
and lead to long flow completion times. An ideal congestion control algorithms
for datacenter must provide 1) zero data loss, 2) fast convergence, and 3) low
buffer occupancy. However, these requirements present conflicting goals. For
fast convergence,flows must ramp up quickly, but this risks packet losses and
large queues. Thus, even the state-of-the-art algorithms, such as TIMELY and
DCQCN, rely on link layer flow control (e.g.,Priority-based Flow Control) to
achieve zero loss. This paper presents a new approach, called ExpressPass, an
end-to-end credit-based congestion control algorithm for datacenters.
ExpressPass is inspired by credit-based flow control, but extends it to work
end-to-end. The switches control the amount of credit packets by rate limiting
and ensure data packets flow in the reverse direction without any loss.
ExpressPass leverages this to ramp up aggressively. ExpressPass converges up to
80 times faster than DCTCP at 10Gbps link, and the gap increases as link speeds
become faster. Our simulation with realistic workload shows that ExpressPass
significantly reduces the flow completion time especially for small and medium
size flows compared to DCTCP, HULL, and DX.
|
[
{
"version": "v1",
"created": "Sat, 15 Oct 2016 05:28:07 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Cho",
"Inho",
""
],
[
"Han",
"Dongsu",
""
],
[
"Jang",
"Keon",
""
]
] |
new_dataset
| 0.972039 |
1610.04705
|
Alex James Dr
|
Kamilya Smagulova, Aigerim Tankimanova, Alex Pappachen James
|
CMOS-Memristor Hybrid Integrated Pixel Sensors
|
to appear in Proceedings of IEEE International Symposium on
Nanoelectronic and Information Systems, December 19-21, Gwalior, India
| null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Increase in image resolution require the ability of image sensors to pack an
increased number of circuit components in a given area. On the the other hand a
high speed processing of signals from the sensors require the ability of pixel
to carry out pixel parallel operations. In the paper, we propose a modified 3T
and 4T CMOS wide dynamic range pixels, which we refer as 2T-M and 3T-M
configurations, comprising of MOSFETS and memristors. The low leakage currents
and low area of memristors helps to achieve the objective of reducing the area,
while the possibility to create arrays of memristors and MOSFETs across
different layers within the chip, ensure the possibility to scale the circuit
architecture.
|
[
{
"version": "v1",
"created": "Sat, 15 Oct 2016 09:33:05 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Smagulova",
"Kamilya",
""
],
[
"Tankimanova",
"Aigerim",
""
],
[
"James",
"Alex Pappachen",
""
]
] |
new_dataset
| 0.998634 |
1610.04730
|
Piotr Sapiezynski
|
Piotr Sapiezynski, Arkadiusz Stopczynski, David Kofoed Wind, Jure
Leskovec, Sune Lehmann
|
Inferring Person-to-person Proximity Using WiFi Signals
| null | null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today's societies are enveloped in an ever-growing telecommunication
infrastructure. This infrastructure offers important opportunities for sensing
and recording a multitude of human behaviors. Human mobility patterns are a
prominent example of such a behavior which has been studied based on cell phone
towers, Bluetooth beacons, and WiFi networks as proxies for location. However,
while mobility is an important aspect of human behavior, understanding complex
social systems requires studying not only the movement of individuals, but also
their interactions. Sensing social interactions on a large scale is a technical
challenge and many commonly used approaches---including RFID badges or
Bluetooth scanning---offer only limited scalability. Here we show that it is
possible, in a scalable and robust way, to accurately infer person-to-person
physical proximity from the lists of WiFi access points measured by smartphones
carried by the two individuals. Based on a longitudinal dataset of
approximately 800 participants with ground-truth interactions collected over a
year, we show that our model performs better than the current state-of-the-art.
Our results demonstrate the value of WiFi signals in social sensing as well as
potential threats to privacy that they imply.
|
[
{
"version": "v1",
"created": "Sat, 15 Oct 2016 13:02:46 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Sapiezynski",
"Piotr",
""
],
[
"Stopczynski",
"Arkadiusz",
""
],
[
"Wind",
"David Kofoed",
""
],
[
"Leskovec",
"Jure",
""
],
[
"Lehmann",
"Sune",
""
]
] |
new_dataset
| 0.969416 |
1610.04809
|
Zhe Feng
|
Xiaotie Deng, Zhe Feng, Christos H. Papadimitriou
|
Power-Law Distributions in a Two-sided Market and Net Neutrality
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
"Net neutrality" often refers to the policy dictating that an Internet
service provider (ISP) cannot charge content providers (CPs) for delivering
their content to consumers. Many past quantitative models designed to determine
whether net neutrality is a good idea have been rather equivocal in their
conclusions. Here we propose a very simple two-sided market model, in which the
types of the consumers and the CPs are {\em power-law distributed} --- a kind
of distribution known to often arise precisely in connection with
Internet-related phenomena. We derive mostly analytical, closed-form results
for several regimes: (a) Net neutrality, (b) social optimum, (c) maximum
revenue by the ISP, or (d) maximum ISP revenue under quality differentiation.
One unexpected conclusion is that (a) and (b) will differ significantly, unless
average CP productivity is very high.
|
[
{
"version": "v1",
"created": "Sun, 16 Oct 2016 01:51:01 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Deng",
"Xiaotie",
""
],
[
"Feng",
"Zhe",
""
],
[
"Papadimitriou",
"Christos H.",
""
]
] |
new_dataset
| 0.98852 |
1610.04830
|
Jiajun Li
|
Jiajun Li, Jianguo Tao, Liang Ding, Haibo Gao, Zongquan Deng, Yu Wu
|
RGBD-based Parameter Extraction for Door Opening Tasks with Human
Assists in Nuclear Rescue
|
6 pages, 8 figures
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The ability to open a door is essential for robots to perform home-serving
and rescuing tasks. A substantial problem is to obtain the necessary parameters
such as the width of the door and the length of the handle. Many researchers
utilize computer vision techniques to extract the parameters automatically
which lead to fine but not very stable results because of the complexity of the
environment. We propose a method that utilizes an RGBD sensor and a GUI for
users to 'point' at the target region with a mouse to acquire 3D information.
Algorithms that can extract important parameters from the selected points are
designed. To avoid large internal force induced by the misalignment of the
robot orientation and the normal of the door plane, we design a module that can
compute the normal of the plane by pointing at three non-collinear points and
then drive the robot to the desired orientation. We carried out experiments on
real robot. The result shows that the designed GUI and algorithms can help find
the necessary parameters stably and get the robot prepared for further
operations.
|
[
{
"version": "v1",
"created": "Sun, 16 Oct 2016 09:00:31 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Li",
"Jiajun",
""
],
[
"Tao",
"Jianguo",
""
],
[
"Ding",
"Liang",
""
],
[
"Gao",
"Haibo",
""
],
[
"Deng",
"Zongquan",
""
],
[
"Wu",
"Yu",
""
]
] |
new_dataset
| 0.972817 |
1610.04922
|
Eugene Cherny
|
Gleb G. Rogozinsky (1), Eugene Cherny (2 and 3) and Ivan Osipenko (4)
((1) The Bonch-Bruevich Saint-Petersburg State University of
Telecommunications, St. Petersburg, Russia, (2) \r{A}bo Akademi University,
Turku, Finland, (3) ITMO University, St. Petersburg, Russia, (4) Saber
Interactive, St. Petersburg, Russia)
|
Making Mainstream Synthesizers with Csound
|
Presented on the 3rd International Csound Conference, 2-4 October
2015, St. Petersburg, Russia
|
G. G. Rogozinsky, E. Cherny, and I. Osipenko, "Making Mainstream
Synthesizers with Csound," in Proceedings of the Third International Csound
Conference, 2016, pp. 132-140
|
10.5281/zenodo.50364
| null |
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For more than the past twenty years, Csound has been one of the leaders in
the world of the computer music research, implementing innovative synthesis
methods and making them available beyond the academic environments from which
they often arise, and into the hands of musicians and sound designers
throughout the world. In its present state, Csound offers an efficient
environment for sound experimentation, allowing the user to work with almost
any known sound synthesis or signal processing method through its vast
collection of ready-made opcodes. But despite all this potential, the shared
resource of Csound instruments still lacks quality reproductions of well-known
synthesizers; even with its ability to generate commercial standard user
interfaces and with the possibility to compile Csound instruments in such as
fashion so that they can be used with no knowledge of Csound code. To fill this
gap, the authors have implemented two commercial-style synthesizers as VST
plug-ins using the Csound front-end "Cabbage". This paper describes their
architecture and some of the Csound specific challenges involved in the
development of fully featured synthesizers.
|
[
{
"version": "v1",
"created": "Sun, 16 Oct 2016 22:27:33 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Rogozinsky",
"Gleb G.",
"",
"2 and 3"
],
[
"Cherny",
"Eugene",
"",
"2 and 3"
],
[
"Osipenko",
"Ivan",
""
]
] |
new_dataset
| 0.998542 |
1610.04974
|
Shuai Wang
|
Zhigang Wen, Shuai Wang, Xiaoqing Liu, and Junwei Zou
|
Joint Relay-User Beamforming Design in Full-Duplex Two-Way Relay Channel
|
To appear in IEEE Transactions on Vehicular Technology
| null |
10.1109/TVT.2016.2583261
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A full-duplex two-way relay channel with multiple antennas is considered. For
this three-node network, the beamforming design needs to suppress
self-interference. While a traditional way is to apply zero-forcing for
self-interference mitigation, it may harm the desired signals. In this paper, a
design which reserves a fraction of self-interference is proposed by solving a
quality-of-service constrained beamforming design problem. Since the problem is
challenging due to the loop self-interference, a convergence-guaranteed
alternating optimization algorithm is proposed to jointly design the relay-user
beamformers. Numerical results show that the proposed scheme outperforms
zero-forcing method, and achieves a transmit power close to the ideal case.
|
[
{
"version": "v1",
"created": "Mon, 17 Oct 2016 05:13:37 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Wen",
"Zhigang",
""
],
[
"Wang",
"Shuai",
""
],
[
"Liu",
"Xiaoqing",
""
],
[
"Zou",
"Junwei",
""
]
] |
new_dataset
| 0.979845 |
1610.05175
|
Florian T. Pokorny
|
Florian T. Pokorny, Yasemin Bekiroglu, Karl Pauwels, Judith
B\"utepage, Clara Scherer, Danica Kragic
|
CapriDB - Capture, Print, Innovate: A Low-Cost Pipeline and Database for
Reproducible Manipulation Research
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel approach and database which combines the inexpensive
generation of 3D object models via monocular or RGB-D camera images with 3D
printing and a state of the art object tracking algorithm. Unlike recent
efforts towards the creation of 3D object databases for robotics, our approach
does not require expensive and controlled 3D scanning setups and enables anyone
with a camera to scan, print and track complex objects for manipulation
research. The proposed approach results in highly detailed mesh models whose 3D
printed replicas are at times difficult to distinguish from the original. A key
motivation for utilizing 3D printed objects is the ability to precisely control
and vary object properties such as the mass distribution and size in the 3D
printing process to obtain reproducible conditions for robotic manipulation
research. We present CapriDB - an extensible database resulting from this
approach containing initially 40 textured and 3D printable mesh models together
with tracking features to facilitate the adoption of the proposed approach.
|
[
{
"version": "v1",
"created": "Mon, 17 Oct 2016 15:47:05 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Pokorny",
"Florian T.",
""
],
[
"Bekiroglu",
"Yasemin",
""
],
[
"Pauwels",
"Karl",
""
],
[
"Bütepage",
"Judith",
""
],
[
"Scherer",
"Clara",
""
],
[
"Kragic",
"Danica",
""
]
] |
new_dataset
| 0.999596 |
1610.05209
|
Julius Mboli Sechang
|
Mboli Sechang Julius
|
MIMO: State of the Art and the Future in Focus
|
This is a simple review on the state of the art of MIMO and the
future. It tries to address what Massive MIMO which is the MIMO that is
expected to work for 5G networks will look like. Another generation of
wireless networks is expected by 2020. It is simply written for educational
purpose and not any commercial use. It is intended to help those trying to
build knowledge in this area
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Antennas of transmitters and receivers have been manipulated to increase the
capacity of transmission and reception of signals. Using many elements in
antennas to shape beams and direct nulls in a particular point for optimum
signal transmission and reception has over decades, had tremendous positive
influence in received power and signal to noise ratio (SNR). However, since the
antenna elements manipulation can be done both at base station and device
terminal, it gives rise to an important method of using several antennas to put
and obtain signals to and from space with increased capacity. This principle is
termed Multiple-input and Multiple-output (MIMO). This paper discusses
application of MIMO in the state of the art and next generation of wireless
systems (5G). It also discusses four models of MIMO, SISO, SIMO, MISO and MIMO,
considering three method of combing the signals from multipath propagations,
Selection combining (SC), Equal gain combing (EGC) and maximum ratio combining
(MRC). Spatial diversity and spatial multiplexing are also discussed as form of
MIMO. Finally, Massive or Hyper MIMO which is a new method of increasing
transmission capacity by very large scale for fifth generation of wireless
system is discussed with its challenges and opportunities. Key terms-Diversity
combining techniques, spatial multiplexing, channel state information (CSI).
Massive MIMO
|
[
{
"version": "v1",
"created": "Mon, 19 Sep 2016 19:56:40 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Julius",
"Mboli Sechang",
""
]
] |
new_dataset
| 0.999593 |
1610.05212
|
Pascal Cotret
|
Guillaume Fournier, Pierre Matoussowsky, Pascal Cotret
|
Hit the KeyJack: stealing data from your daily wireless devices
incognito
|
Journ\'ees C&ESAR 2016 (https://www.cesar-conference.org/)
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Internet of Things (IoT) is one of the most fast-growing field in high
technologies nowadays. Therefore, lots of electronic devices include wireless
connections with several communication protocols (WiFi, ZigBee, Sigfox, LoRa
and so on). Nevertheless, designers of such components do not take care of
security features most of the time while focusing on communication reliability
(speed, throughput and low power consumption). As a consequence, several
wireless IoT devices transmit data in plaintext creating lots of security
breaches for both eavesdropping and data injection attacks. This work
introduces KeyJack, a preliminary proof-of-concept of a solution aiming to
eavesdrop wireless devices and hopefully perform injection attacks afterwards.
KeyJack operates on widely-used devices: our keyboards! This solution is based
on low-cost embedded electronics and gives an attacker or a white hat hacker
the possibility to retrieve data from John Doe's computer. This work also shows
that this approach could be used to any wireless device using 2.4GHz radio
chips like the NRF24L01 from Nordic Semiconductor.
|
[
{
"version": "v1",
"created": "Mon, 17 Oct 2016 17:13:57 GMT"
}
] | 2016-10-18T00:00:00 |
[
[
"Fournier",
"Guillaume",
""
],
[
"Matoussowsky",
"Pierre",
""
],
[
"Cotret",
"Pascal",
""
]
] |
new_dataset
| 0.979201 |
1501.04272
|
Netanel Raviv
|
Netanel Raviv and Antonia Wachter-Zeh
|
Some Gabidulin Codes cannot be List Decoded Efficiently at any Radius
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Gabidulin codes can be seen as the rank-metric equivalent of Reed-Solomon
codes. It was recently proven, using subspace polynomials, that Gabidulin codes
cannot be list decoded beyond the so-called Johnson radius. In another result,
cyclic subspace codes were constructed by inspecting the connection between
subspaces and their subspace polynomials. In this paper, these subspace codes
are used to prove two bounds on the list size in decoding certain Gabidulin
codes. The first bound is an existential one, showing that exponentially-sized
lists exist for codes with specific parameters. The second bound presents
exponentially-sized lists explicitly, for a different set of parameters. Both
bounds rule out the possibility of efficiently list decoding several families
of Gabidulin codes for any radius beyond half the minimum distance. Such a
result was known so far only for non-linear rank-metric codes, and not for
Gabidulin codes. Using a standard operation called lifting, identical results
also follow for an important class of constant dimension subspace codes.
|
[
{
"version": "v1",
"created": "Sun, 18 Jan 2015 08:21:13 GMT"
},
{
"version": "v2",
"created": "Wed, 20 May 2015 09:16:49 GMT"
},
{
"version": "v3",
"created": "Sun, 14 Feb 2016 10:28:09 GMT"
},
{
"version": "v4",
"created": "Fri, 14 Oct 2016 07:02:36 GMT"
}
] | 2016-10-17T00:00:00 |
[
[
"Raviv",
"Netanel",
""
],
[
"Wachter-Zeh",
"Antonia",
""
]
] |
new_dataset
| 0.99736 |
1610.04377
|
Diptesh Kanojia
|
Diptesh Kanojia, Vishwajeet Kumar, and Krithi Ramamritham
|
Civique: Using Social Media to Detect Urban Emergencies
|
This paper was presented at Workshop on Social Data Analytics and
Management (SoDAM 2016), at Very Large Databases (VLDB 2016), in September
2016
| null | null | null |
cs.CL cs.CY cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the Civique system for emergency detection in urban areas by
monitoring micro blogs like Tweets. The system detects emergency related
events, and classifies them into appropriate categories like "fire",
"accident", "earthquake", etc. We demonstrate our ideas by classifying Twitter
posts in real time, visualizing the ongoing event on a map interface and
alerting users with options to contact relevant authorities, both online and
offline. We evaluate our classifiers for both the steps, i.e., emergency
detection and categorization, and obtain F-scores exceeding 70% and 90%,
respectively. We demonstrate Civique using a web interface and on an Android
application, in realtime, and show its use for both tweet detection and
visualization.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2016 09:06:36 GMT"
}
] | 2016-10-17T00:00:00 |
[
[
"Kanojia",
"Diptesh",
""
],
[
"Kumar",
"Vishwajeet",
""
],
[
"Ramamritham",
"Krithi",
""
]
] |
new_dataset
| 0.978896 |
1610.04421
|
Frank D\"urr
|
Frank D\"urr and Thomas Kohler and Jonas Grunert and Andre Kutzleb
|
ZeroSDN: A Message Bus for Flexible and Light-weight Network Control
Distribution in SDN
| null | null | null |
TR-2016-06
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent years have seen an evolution of SDN control plane architectures,
starting from simple monolithic controllers, over modular monolithic
controllers, to distributed controllers. We observe, however, that today's
distributed controllers still exhibit inflexibility with respect to the
distribution of control logic. Therefore, we propose a novel architecture of a
distributed SDN controller in this paper, providing maximum flexibility with
respect to distribution.
Our architecture splits control logic into light-weight control modules,
called controllets, based on a micro-kernel approach, reducing common
controllet functionality to a bare minimum and factoring out all higher-level
functionality. Light-weight controllets also allow for pushing control logic
onto switches to minimize latency and communication overhead. Controllets are
interconnected through a message bus supporting the publish/subscribe
communication paradigm with specific extensions for content-based OpenFlow
message filtering. Publish/subscribe allows for complete decoupling of
controllets to further facilitate control plane distribution.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2016 12:00:13 GMT"
}
] | 2016-10-17T00:00:00 |
[
[
"Dürr",
"Frank",
""
],
[
"Kohler",
"Thomas",
""
],
[
"Grunert",
"Jonas",
""
],
[
"Kutzleb",
"Andre",
""
]
] |
new_dataset
| 0.999679 |
1610.04441
|
Nian Li
|
Nian Li
|
On Two Conjectures about Permutation Trinomials over
$\mathbb{F}_{3^{2k}}$
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Permutation polynomials with few terms attracts researchers' interest in
recent years due to their simple algebraic form and some additional
extraordinary properties. In this paper, by analyzing the quadratic factors of
a fifth-degree polynomial and a seventh-degree polynomial over the finite field
$\mathbb{F}_{3^{2k}}$, two conjectures on permutation trinomials over
$\mathbb{F}_{3^{2k}}$ proposed recently by Li, Qu, Li and Fu are settled, where
$k$ is a positive integer.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2016 12:59:02 GMT"
}
] | 2016-10-17T00:00:00 |
[
[
"Li",
"Nian",
""
]
] |
new_dataset
| 0.978231 |
1610.04459
|
Siddharth Prakash Rao
|
Siddharth Prakash Rao and Kiran Mohan Kumar
|
Studying the Indian mobile Internet networks: Chota recharge and the
chota Internet
| null | null | null | null |
cs.CY cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Uniform and affordable Internet is emerging as one of the fundamental civil
rights in developing countries. However in India, the connectivity is far from
uniform across the regions, where the disparity is evident in the
infrastructure, the cost of access and telecommunication services to provide
Internet facilities among different economic classes. In spite of having a
large mobile user base, the mobile Internet are still remarkably slower in some
of the developing countries. Especially in India, it falls below 50% even in
comparison with the performance of its developing counterparts!
This essay presents a study of connectivity and performance trends based on
an exploratory analysis of mobile Internet measurement data from India. In
order to assess the state of mobile networks and its readiness in adopting the
different mobile standards (2G, 3G, and 4G) for commercial use, we discuss the
spread, penetration, interoperability and the congestion trends. Based on our
analysis, we argue that the network operators have taken negligible measures to
scale the mobile Internet. Affordable Internet is definitely for everyone. But,
the affordability of the Internet in terms of cost does not necessarily imply
the rightful access to Internet services.
Chota recharge is possibly leading us to chota (shrunken) Internet!
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2016 13:42:46 GMT"
}
] | 2016-10-17T00:00:00 |
[
[
"Rao",
"Siddharth Prakash",
""
],
[
"Kumar",
"Kiran Mohan",
""
]
] |
new_dataset
| 0.999459 |
1610.04602
|
Andrew Adamatzky
|
Andrew Adamatzky, Georgios Sirakoulis, Genaro J. Martinez, Frantisek
Baluska, Stefano Mancuso
|
On plant roots logical gates
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Theoretical constructs of logical gates implemented with plant roots are
morphological computing asynchronous devices. Values of Boolean variables are
represented by plant roots. A presence of a plant root at a given site
symbolises the logical {\sc True}, an absence the logical {\sc False}. Logical
functions are calculated via interaction between roots. Two types of
two-inputs-two-outputs gates are proposed: a gate $\langle x, y \rangle
\rightarrow \langle xy, x+y \rangle$ where root apexes are guided by gravity
and a gate $\langle x, y \rangle \rightarrow \langle \overline{x}y, x \rangle$
where root apexes are guided by humidity. We propose a design of binary
half-adder based on the gates.
|
[
{
"version": "v1",
"created": "Fri, 14 Oct 2016 19:49:52 GMT"
}
] | 2016-10-17T00:00:00 |
[
[
"Adamatzky",
"Andrew",
""
],
[
"Sirakoulis",
"Georgios",
""
],
[
"Martinez",
"Genaro J.",
""
],
[
"Baluska",
"Frantisek",
""
],
[
"Mancuso",
"Stefano",
""
]
] |
new_dataset
| 0.958776 |
1301.4089
|
Chengqing Li
|
Chengqing Li, Tao Xie, Qi Liu, Ge Cheng
|
Cryptanalyzing image encryption using chaotic logistic map
|
6 pages
|
Nonlinear Dynamics, 78(2):1545-1551, 2014
|
10.1007/s11071-014-1533-8
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Chaotic behavior arises from very simple non-linear dynamical equation of
logistic map which makes it was used often in designing chaotic image
encryption schemes. However, some properties of chaotic maps can also
facilitate cryptanalysis especially when they are implemented in digital
domain. Utilizing stable distribution of the chaotic states generated by
iterating the logistic map, this paper presents a typical example to show
insecurity of an image encryption scheme using chaotic logistic map. This work
will push encryption and chaos be combined in a more effective way.
|
[
{
"version": "v1",
"created": "Thu, 17 Jan 2013 13:21:57 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Oct 2016 06:45:13 GMT"
}
] | 2016-10-14T00:00:00 |
[
[
"Li",
"Chengqing",
""
],
[
"Xie",
"Tao",
""
],
[
"Liu",
"Qi",
""
],
[
"Cheng",
"Ge",
""
]
] |
new_dataset
| 0.99287 |
1606.01700
|
Yasumasa Miyamoto
|
Yasumasa Miyamoto and Kyunghyun Cho
|
Gated Word-Character Recurrent Language Model
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a recurrent neural network language model (RNN-LM) with long
short-term memory (LSTM) units that utilizes both character-level and
word-level inputs. Our model has a gate that adaptively finds the optimal
mixture of the character-level and word-level inputs. The gate creates the
final vector representation of a word by combining two distinct representations
of the word. The character-level inputs are converted into vector
representations of words using a bidirectional LSTM. The word-level inputs are
projected into another high-dimensional space by a word lookup table. The final
vector representations of words are used in the LSTM language model which
predicts the next word given all the preceding words. Our model with the gating
mechanism effectively utilizes the character-level inputs for rare and
out-of-vocabulary words and outperforms word-level language models on several
English corpora.
|
[
{
"version": "v1",
"created": "Mon, 6 Jun 2016 11:43:28 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Oct 2016 03:26:43 GMT"
}
] | 2016-10-14T00:00:00 |
[
[
"Miyamoto",
"Yasumasa",
""
],
[
"Cho",
"Kyunghyun",
""
]
] |
new_dataset
| 0.972547 |
1610.03892
|
Andreas Bollig
|
Andreas Bollig, Constantin Disch, Martijn Arts and Rudolf Mathar
|
SNR-Walls in Eigenvalue-based Spectrum Sensing
|
17 pages, 3 figures, submitted to EURASIP Journal on Wireless
Communications and Networking
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Various spectrum sensing approaches have been shown to suffer from a
so-called SNR-wall, an SNR value below which a detector cannot perform robustly
no matter how many observations are used. Up to now, the eigenvalue-based
maximum-minimum-eigenvalue (MME) detector has been a notable exception. For
instance, the model uncertainty of imperfect knowledge of the receiver noise
power, which is known to be responsible for the energy detector's fundamental
limits, does not adversely affect the MME detector's performance. While
additive white Gaussian noise (AWGN) is a standard assumption in wireless
communications, it is not a reasonable one for the MME detector. In fact, in
this work we prove that uncertainty in the amount of noise coloring does lead
to an SNR-wall for the MME detector. We derive a lower bound on this SNR-wall
and evaluate it for example scenarios. The findings are supported by numerical
simulations.
|
[
{
"version": "v1",
"created": "Wed, 12 Oct 2016 22:23:31 GMT"
}
] | 2016-10-14T00:00:00 |
[
[
"Bollig",
"Andreas",
""
],
[
"Disch",
"Constantin",
""
],
[
"Arts",
"Martijn",
""
],
[
"Mathar",
"Rudolf",
""
]
] |
new_dataset
| 0.995345 |
1610.04002
|
Richard McCreadie
|
Richard McCreadie, Craig Macdonald and Iadh Ounis
|
Emergency Identification and Analysis with EAIMS
| null | null | null | null |
cs.IR cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social media platforms are now a key source of information for a large
segment of the public. As such, these platforms have a great potential as a
means to provide real-time information to emergency management agencies.
Moreover, during an emergency, these agencies are very interested in social
media as a means to find public-driven response efforts, as well as to track
how their handling of that emergency is being perceived. However, there is
currently a lack advanced tools designed for monitoring social media during
emergencies. The Emergency Analysis Identification and Management System
(EAIMS) is a prototype service that aims to fill this technology gap by
providing richer analytic and exploration tools than current solutions. In
particular, EAIMS provides real-time detection of emergency events, related
information finding, information access and credibility analysis tools for use
over social media during emergencies.
|
[
{
"version": "v1",
"created": "Thu, 13 Oct 2016 10:02:01 GMT"
}
] | 2016-10-14T00:00:00 |
[
[
"McCreadie",
"Richard",
""
],
[
"Macdonald",
"Craig",
""
],
[
"Ounis",
"Iadh",
""
]
] |
new_dataset
| 0.992364 |
1610.04027
|
Andreas Bollig
|
Andreas Bollig, Martijn Arts, Anastasia Lavrenko, Rudolf Mathar
|
Compressive Cyclostationary Spectrum Sensing with a Constant False Alarm
Rate
|
19 pages, 5 figures, submitted to EURASIP Journal on Wireless
Communications and Networking
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spectrum sensing is a crucial component of opportunistic spectrum access
schemes, which aim at improving spectrum utilization by allowing for the reuse
of idle licensed spectrum. Sensing a spectral band before using it makes sure
the legitimate users are not disturbed. Since information about these users'
signals is not necessarily available, the sensor should be able to conduct
so-called blind spectrum sensing. Historically, this has not been a feature of
cyclostationarity-based algorithms. Indeed, in many application scenarios the
information required for traditional cyclostationarity detection might not be
available, hindering its practical applicability. In this work we propose two
new cyclostationary spectrum sensing algorithms that make use of the inherent
sparsity of the cyclic autocorrelation to make blind operation possible. Along
with utilizing sparse recovery methods for estimating the cyclic
autocorrelation, we take further advantage of its structure by introducing
joint sparsity as well as general structure dictionaries into the recovery
process. Furthermore, we extend a statistical test for cyclostationarity to
accommodate sparse cyclic spectra. Our numerical results demonstrate that the
new methods achieve a near constant false alarm rate behavior in contrast to
earlier approaches from the literature.
|
[
{
"version": "v1",
"created": "Thu, 13 Oct 2016 11:15:42 GMT"
}
] | 2016-10-14T00:00:00 |
[
[
"Bollig",
"Andreas",
""
],
[
"Arts",
"Martijn",
""
],
[
"Lavrenko",
"Anastasia",
""
],
[
"Mathar",
"Rudolf",
""
]
] |
new_dataset
| 0.998727 |
1610.04065
|
Rainer Plaga
|
Alexander Spenke, Ralph Breithaupt, and Rainer Plaga
|
An arbiter PUF secured by remote random reconfigurations of an FPGA
| null |
Franz, Papadimitratos (Eds.): Trust and Trustworthy Computing. 9th
International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016,
Proceedings. Lecture Notes in Computer Science, Vol. 9824, p. 140 - 158
|
10.1007/978-3-319-45572-3_8
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a practical and highly secure method for the authentication of
chips based on a new concept for implementing strong Physical Unclonable
Function (PUF) on field programmable gate arrays (FPGA). Its qualitatively
novel feature is a remote reconfiguration in which the delay stages of the PUF
are arranged to a random pattern within a subset of the FPGA's gates. Before
the reconfiguration is performed during authentication the PUF simply does not
exist. Hence even if an attacker has the chip under control previously she can
gain no useful information about the PUF. This feature, together with a strict
renunciation of any error correction and challenge selection criteria that
depend on individual properties of the PUF that goes into the field make our
strong PUF construction immune to all machine learning attacks presented in the
literature. More sophisticated attacks on our strong-PUF construction will be
difficult, because they require the attacker to learn or directly measure the
properties of the complete FPGA. A fully functional reference implementation
for a secure "chip biometrics" is presented. We remotely configure ten 64-stage
arbiter PUFs out of 1428 lookup tables within a time of 25 seconds and then
receive one "fingerprint" from each PUF within 1 msec.
|
[
{
"version": "v1",
"created": "Wed, 12 Oct 2016 11:50:08 GMT"
}
] | 2016-10-14T00:00:00 |
[
[
"Spenke",
"Alexander",
""
],
[
"Breithaupt",
"Ralph",
""
],
[
"Plaga",
"Rainer",
""
]
] |
new_dataset
| 0.999458 |
1610.04076
|
Mohammad Gorji Sefidmazgi
|
Mina Moradi Kordmahalleh, Mohammad Gorji Sefidmazgi, Jafar Ghaisari,
Javad Askari
|
A Fault-Tolerant Distributed Detection of Two Simultaneous Events in
Wireless Sensor Networks
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless Sensor Networks (WSNs) consist of many low cost and light sensors
dispersed in an area to monitor the physical environment. Event detection in
WSN area, especially detection of multi-events at the same time, is an
important problem. This article is a new attempt for detection of two
simultaneous events based on distributed data processing structure and Bayesian
criteria. For accurate detection of two simultaneous events, we proposed new
decision rules based on likelihood ratio test and also derived probability of
detection error based on Bayesian criteria. In addition to multi-event
detection, the proposed method is expanded to a fault-tolerant procedure if
there are faults in decision making of sensors. Performance of the proposed
approach is demonstrated for detection of events in different circumstances.
Results show the effectiveness of the algorithm for fault-tolerant multi-event
detection.
|
[
{
"version": "v1",
"created": "Thu, 13 Oct 2016 13:54:36 GMT"
}
] | 2016-10-14T00:00:00 |
[
[
"Kordmahalleh",
"Mina Moradi",
""
],
[
"Sefidmazgi",
"Mohammad Gorji",
""
],
[
"Ghaisari",
"Jafar",
""
],
[
"Askari",
"Javad",
""
]
] |
new_dataset
| 0.987899 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.