id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1609.03540
Babak Salimi
Babak Salimi, Dan Suciu
ZaliQL: A SQL-Based Framework for Drawing Causal Inference from Big Data
null
null
null
null
cs.DB cs.AI cs.LG cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Causal inference from observational data is a subject of active research and development in statistics and computer science. Many toolkits have been developed for this purpose that depends on statistical software. However, these toolkits do not scale to large datasets. In this paper we describe a suite of techniques for expressing causal inference tasks from observational data in SQL. This suite supports the state-of-the-art methods for causal inference and run at scale within a database engine. In addition, we introduce several optimization techniques that significantly speedup causal inference, both in the online and offline setting. We evaluate the quality and performance of our techniques by experiments of real datasets.
[ { "version": "v1", "created": "Mon, 12 Sep 2016 19:24:14 GMT" }, { "version": "v2", "created": "Tue, 13 Sep 2016 01:59:05 GMT" } ]
2016-09-14T00:00:00
[ [ "Salimi", "Babak", "" ], [ "Suciu", "Dan", "" ] ]
new_dataset
0.995376
1609.03732
Omar Richardson
Omar Richardson
Large-scale multiscale particle models in inhomogeneous domains: modelling and implementation
This thesis was written as part of a graduation project for the master Industrial and Applied Mathematics on the Eindhoven University of Technology
null
null
null
cs.CE math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this thesis, we develop multiscale models for particle simulations in population dynamics. These models are characterised by prescribing particle motion on two spatial scales: microscopic and macroscopic. At the microscopic level, each particle has its own mass, position and velocity, while at the macroscopic level the particles are interpolated to a continuum quantity whose evolution is governed by a system of transport equations. This way, one can prescribe various types of interactions on a global scale, whilst still maintaining high simulation speed for a large number of particles. In addition, the interplay between particle motion and interaction is well tuned in both regions of low and high densities. We analyse links between models on these two scales and prove that under certain conditions, a system of interacting particles converges to a nonlinear coupled system of transport equations. We use this as a motivation to derive a model defined on both modelling scales and prescribe the intercommunication between them. Simulation takes place in inhomogeneous domains with arbitrary conditions at inflow and outflow boundaries. We realise this by modelling obstacles, sources and sinks. Integrating these aspects into the simulation requires a route planning algorithm for the particles. Several algorithms are considered and evaluated on accuracy, robustness and efficiency. All aspects mentioned above are combined in a novel open source prototyping simulation framework called Mercurial. This computational framework allows the design of geometries and is built for high performance when large numbers of particles are involved. Mercurial supports various types of inhomogeneities and global systems of equations. We apply our framework to simulate scenarios in crowd dynamics. We compare our results with test cases from literature to assess the quality of the simulations.
[ { "version": "v1", "created": "Tue, 13 Sep 2016 09:04:27 GMT" } ]
2016-09-14T00:00:00
[ [ "Richardson", "Omar", "" ] ]
new_dataset
0.995403
1609.03773
Li Cheng
Chi Xu, Lakshmi Narasimhan Govindarajan, Yu Zhang, Li Cheng
Lie-X: Depth Image Based Articulated Object Pose Estimation, Tracking, and Action Recognition on Lie Groups
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pose estimation, tracking, and action recognition of articulated objects from depth images are important and challenging problems, which are normally considered separately. In this paper, a unified paradigm based on Lie group theory is proposed, which enables us to collectively address these related problems. Our approach is also applicable to a wide range of articulated objects. Empirically it is evaluated on lab animals including mouse and fish, as well as on human hand. On these applications, it is shown to deliver competitive results compared to the state-of-the-arts, and non-trivial baselines including convolutional neural networks and regression forest methods.
[ { "version": "v1", "created": "Tue, 13 Sep 2016 11:36:26 GMT" } ]
2016-09-14T00:00:00
[ [ "Xu", "Chi", "" ], [ "Govindarajan", "Lakshmi Narasimhan", "" ], [ "Zhang", "Yu", "" ], [ "Cheng", "Li", "" ] ]
new_dataset
0.998806
1609.03971
Fergal Byrne
Eric Laukien, Richard Crowder and Fergal Byrne
Feynman Machine: The Universal Dynamical Systems Computer
null
null
null
null
cs.NE cs.AI cs.ET math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Efforts at understanding the computational processes in the brain have met with limited success, despite their importance and potential uses in building intelligent machines. We propose a simple new model which draws on recent findings in Neuroscience and the Applied Mathematics of interacting Dynamical Systems. The Feynman Machine is a Universal Computer for Dynamical Systems, analogous to the Turing Machine for symbolic computing, but with several important differences. We demonstrate that networks and hierarchies of simple interacting Dynamical Systems, each adaptively learning to forecast its evolution, are capable of automatically building sensorimotor models of the external and internal world. We identify such networks in mammalian neocortex, and show how existing theories of cortical computation combine with our model to explain the power and flexibility of mammalian intelligence. These findings lead directly to new architectures for machine intelligence. A suite of software implementations has been built based on these principles, and applied to a number of spatiotemporal learning tasks.
[ { "version": "v1", "created": "Tue, 13 Sep 2016 18:34:59 GMT" } ]
2016-09-14T00:00:00
[ [ "Laukien", "Eric", "" ], [ "Crowder", "Richard", "" ], [ "Byrne", "Fergal", "" ] ]
new_dataset
0.996965
1609.03976
Ozan \c{C}a\u{g}layan
Ozan Caglayan, Lo\"ic Barrault, Fethi Bougares
Multimodal Attention for Neural Machine Translation
10 pages, under review COLING 2016
null
null
null
cs.CL cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The attention mechanism is an important part of the neural machine translation (NMT) where it was reported to produce richer source representation compared to fixed-length encoding sequence-to-sequence models. Recently, the effectiveness of attention has also been explored in the context of image captioning. In this work, we assess the feasibility of a multimodal attention mechanism that simultaneously focus over an image and its natural language description for generating a description in another language. We train several variants of our proposed attention mechanism on the Multi30k multilingual image captioning dataset. We show that a dedicated attention for each modality achieves up to 1.6 points in BLEU and METEOR compared to a textual NMT baseline.
[ { "version": "v1", "created": "Tue, 13 Sep 2016 18:46:03 GMT" } ]
2016-09-14T00:00:00
[ [ "Caglayan", "Ozan", "" ], [ "Barrault", "Loïc", "" ], [ "Bougares", "Fethi", "" ] ]
new_dataset
0.98508
1512.06283
Gregory Gutin
Gregory Gutin, Mark Jones, Bin Sheng, Magnus Wahlstr\"om, Anders Yeo
Chinese Postman Problem on Edge-Colored Multigraphs
null
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well-known that the Chinese postman problem on undirected and directed graphs is polynomial-time solvable. We extend this result to edge-colored multigraphs. Our result is in sharp contrast to the Chinese postman problem on mixed graphs, i.e., graphs with directed and undirected edges, for which the problem is NP-hard.
[ { "version": "v1", "created": "Sat, 19 Dec 2015 20:17:33 GMT" }, { "version": "v2", "created": "Mon, 12 Sep 2016 12:23:35 GMT" } ]
2016-09-13T00:00:00
[ [ "Gutin", "Gregory", "" ], [ "Jones", "Mark", "" ], [ "Sheng", "Bin", "" ], [ "Wahlström", "Magnus", "" ], [ "Yeo", "Anders", "" ] ]
new_dataset
0.996298
1601.01824
Gregory Gutin
Gregory Gutin, Mark Jones, Bin Sheng, Magnus Wahlstrom, Anders Yeo
Acyclicity in Edge-Colored Graphs
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A walk $W$ in edge-colored graphs is called properly colored (PC) if every pair of consecutive edges in $W$ is of different color. We introduce and study five types of PC acyclicity in edge-colored graphs such that graphs of PC acyclicity of type $i$ is a proper superset of graphs of acyclicity of type $i+1$, $i=1,2,3,4.$ The first three types are equivalent to the absence of PC cycles, PC trails, and PC walks, respectively. While graphs of types 1, 2 and 3 can be recognized in polynomial time, the problem of recognizing graphs of type 4 is, somewhat surprisingly, NP-hard even for 2-edge-colored graphs (i.e., when only two colors are used). The same problem with respect to type 5 is polynomial-time solvable for all edge-colored graphs. Using the five types, we investigate the border between intractability and tractability for the problems of finding the maximum number of internally vertex disjoint PC paths between two vertices and the minimum number of vertices to meet all PC paths between two vertices.
[ { "version": "v1", "created": "Fri, 8 Jan 2016 10:50:14 GMT" }, { "version": "v2", "created": "Mon, 18 Jan 2016 15:56:26 GMT" }, { "version": "v3", "created": "Mon, 12 Sep 2016 12:20:38 GMT" } ]
2016-09-13T00:00:00
[ [ "Gutin", "Gregory", "" ], [ "Jones", "Mark", "" ], [ "Sheng", "Bin", "" ], [ "Wahlstrom", "Magnus", "" ], [ "Yeo", "Anders", "" ] ]
new_dataset
0.999856
1604.03755
Mario Fritz
Abhishek Sharma, Oliver Grau, Mario Fritz
VConv-DAE: Deep Volumetric Shape Learning Without Object Labels
null
null
null
null
cs.CV cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advent of affordable depth sensors, 3D capture becomes more and more ubiquitous and already has made its way into commercial products. Yet, capturing the geometry or complete shapes of everyday objects using scanning devices (e.g. Kinect) still comes with several challenges that result in noise or even incomplete shapes. Recent success in deep learning has shown how to learn complex shape distributions in a data-driven way from large scale 3D CAD Model collections and to utilize them for 3D processing on volumetric representations and thereby circumventing problems of topology and tessellation. Prior work has shown encouraging results on problems ranging from shape completion to recognition. We provide an analysis of such approaches and discover that training as well as the resulting representation are strongly and unnecessarily tied to the notion of object labels. Thus, we propose a full convolutional volumetric auto encoder that learns volumetric representation from noisy data by estimating the voxel occupancy grids. The proposed method outperforms prior work on challenging tasks like denoising and shape completion. We also show that the obtained deep embedding gives competitive performance when used for classification and promising results for shape interpolation.
[ { "version": "v1", "created": "Wed, 13 Apr 2016 13:14:53 GMT" }, { "version": "v2", "created": "Thu, 18 Aug 2016 10:16:33 GMT" }, { "version": "v3", "created": "Fri, 9 Sep 2016 20:36:36 GMT" } ]
2016-09-13T00:00:00
[ [ "Sharma", "Abhishek", "" ], [ "Grau", "Oliver", "" ], [ "Fritz", "Mario", "" ] ]
new_dataset
0.997763
1604.04684
Adam Noel
Adam Noel, Dimitrios Makrakis, Abdelhakim Hafid
Channel Impulse Responses in Diffusive Molecular Communication with Spherical Transmitters
6 pages, 2 tables, 4 figures. Presented at the 28th Biennial Symposium on Communications (BSC 2016) in June 2016
null
null
null
cs.ET cs.IT math.IT physics.chem-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Molecular communication is an emerging paradigm for systems that rely on the release of molecules as information carriers. Communication via molecular diffusion is a popular strategy that is ubiquitous in nature and very fast over distances on the order of a micron or less. Existing closed-form analysis of the diffusion channel impulse response generally assumes that the transmitter is a point source. In this paper, channel impulse responses are derived for spherical transmitters with either a passive or absorbing receiver. The derived channel impulse responses are in closed-form for a one-dimensional environment and can be found via numerical integration for a three-dimensional environment. The point transmitter assumption (PTA) is formally defined so that its accuracy can be measured in comparison to the derived spherical transmitter impulse responses. The spherical transmitter model is much more accurate than the PTA when the distance between a transmitter and its receiver is small relative to the size of the transmitter. The derived results are verified via microscopic particle-based simulations using the molecular communication simulation platform AcCoRD (Actor-based Communication via Reaction-Diffusion). A spherical transmitter variation where molecules are released from the surface of a solid sphere is also considered via simulation.
[ { "version": "v1", "created": "Sat, 16 Apr 2016 03:32:06 GMT" }, { "version": "v2", "created": "Sat, 10 Sep 2016 18:13:51 GMT" } ]
2016-09-13T00:00:00
[ [ "Noel", "Adam", "" ], [ "Makrakis", "Dimitrios", "" ], [ "Hafid", "Abdelhakim", "" ] ]
new_dataset
0.998709
1605.07289
Zheng Shou
Dongang Wang, Zheng Shou, Hongyi Liu, Shih-Fu Chang
EventNet Version 1.1 Technical Report
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
EventNet is a large-scale video corpus and event ontology consisting of 500 events associated with event-specific concepts. In order to improve the quality of the current EventNet, we conduct the following steps and introduce EventNet version 1.1: (1) manually verify the correctness of event labels for all videos; (2) remove the YouTube user bias by limiting the maximum number of videos in each event from the same YouTube user as 3; (3) remove the videos which are currently not accessible online; (4) remove the video belonging to multiple event categories. After the above procedure, some events may contain only a small number of videos, and therefore we crawl more videos for those events to ensure every event will contain more than 50 videos. Finally, EventNet version 1.1 contains 67,641 videos, 500 events, and 5,028 event-specific concepts. In addition, we train a Convolutional Neural Network (CNN) model for event classification via fine-tuning AlexNet using EventNet version 1.1. Then we use the trained CNN model to extract FC7 layer feature and train binary classifiers using linear SVM for each event-specific concept. We believe this new version of EventNet will significantly facilitate research in computer vision and multimedia, and will put it online for public downloading in the future.
[ { "version": "v1", "created": "Tue, 24 May 2016 05:06:29 GMT" }, { "version": "v2", "created": "Sun, 11 Sep 2016 19:10:33 GMT" } ]
2016-09-13T00:00:00
[ [ "Wang", "Dongang", "" ], [ "Shou", "Zheng", "" ], [ "Liu", "Hongyi", "" ], [ "Chang", "Shih-Fu", "" ] ]
new_dataset
0.999758
1607.01845
Agustin Indaco
Agustin Indaco and Lev Manovich
Urban Social Media Inequality: Definition, Measurements, and Application
53 pages, 11 figures, 3 tables
null
null
null
cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social media content shared today in cities, such as Instagram images, their tags and descriptions, is the key form of contemporary city life. It tells people where activities and locations that interest them are and it allows them to share their urban experiences and self-representations. Therefore, any analysis of urban structures and cultures needs to consider social media activity. In our paper, we introduce the novel concept of social media inequality. This concept allows us to quantitatively compare patterns in social media activities between parts of a city, a number of cities, or any other spatial areas. We define this concept using an analogy with the concept of economic inequality. Economic inequality indicates how some economic characteristics or material resources, such as income, wealth or consumption are distributed in a city, country or between countries. Accordingly, we can define social media inequality as the measure of the distribution of characteristics from social media content shared in a particular geographic area or between areas. An example of such characteristics is the number of photos shared by all users of a social network such as Instagram in a given city or city area, or the content of these photos. We propose that the standard inequality measures used in other disciplines, such as the Gini coefficient, can also be used to characterize social media inequality. To test our ideas, we use a dataset of 7,442,454 public geo-coded Instagram images shared in Manhattan during five months (March-July) in 2014, and also selected data for 287 Census tracts in Manhattan. We compare patterns in Instagram sharing for locals and for visitors for all tracts, and also for hours in a 24-hour cycle. We also look at relations between social media inequality and socio-economic inequality using selected indicators for Census tracts.
[ { "version": "v1", "created": "Thu, 7 Jul 2016 00:43:25 GMT" }, { "version": "v2", "created": "Sun, 11 Sep 2016 20:45:35 GMT" } ]
2016-09-13T00:00:00
[ [ "Indaco", "Agustin", "" ], [ "Manovich", "Lev", "" ] ]
new_dataset
0.985906
1608.06338
Pichao Wang
Pichao Wang, Wanqing Li, Song Liu, Yuyao Zhang, Zhimin Gao and Philip Ogunbona
Large-scale Continuous Gesture Recognition Using Convolutional Neural Networks
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of continuous gesture recognition from sequences of depth maps using convolutional neutral networks (ConvNets). The proposed method first segments individual gestures from a depth sequence based on quantity of movement (QOM). For each segmented gesture, an Improved Depth Motion Map (IDMM), which converts the depth sequence into one image, is constructed and fed to a ConvNet for recognition. The IDMM effectively encodes both spatial and temporal information and allows the fine-tuning with existing ConvNet models for classification without introducing millions of parameters to learn. The proposed method is evaluated on the Large-scale Continuous Gesture Recognition of the ChaLearn Looking at People (LAP) challenge 2016. It achieved the performance of 0.2655 (Mean Jaccard Index) and ranked $3^{rd}$ place in this challenge.
[ { "version": "v1", "created": "Mon, 22 Aug 2016 23:44:34 GMT" }, { "version": "v2", "created": "Mon, 12 Sep 2016 11:11:52 GMT" } ]
2016-09-13T00:00:00
[ [ "Wang", "Pichao", "" ], [ "Li", "Wanqing", "" ], [ "Liu", "Song", "" ], [ "Zhang", "Yuyao", "" ], [ "Gao", "Zhimin", "" ], [ "Ogunbona", "Philip", "" ] ]
new_dataset
0.994652
1609.01329
Saad Nadeem
Saad Nadeem and Arie Kaufman
Depth Reconstruction and Computer-Aided Polyp Detection in Optical Colonoscopy Video Frames
**The title has been modified to highlight the contributions more clearly. The original title is: "Computer-Aided Detection of Polyps in Optical Colonoscopy Images". Keywords: Machine learning, computer-aided detection, segmentation, endoscopy, colonoscopy, videos, polyp, detection, medical imaging, depth maps, 3D, reconstruction, computed tomography, virtual colonoscopy, colorectal cancer, SPIE Medical Imaging, 2016
null
10.1117/12.2216996
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a computer-aided detection algorithm for polyps in optical colonoscopy images. Polyps are the precursors to colon cancer. In the US alone, more than 14 million optical colonoscopies are performed every year, mostly to screen for polyps. Optical colonoscopy has been shown to have an approximately 25% polyp miss rate due to the convoluted folds and bends present in the colon. In this work, we present an automatic detection algorithm to detect these polyps in the optical colonoscopy images. We use a machine learning algorithm to infer a depth map for a given optical colonoscopy image and then use a detailed pre-built polyp profile to detect and delineate the boundaries of polyps in this given image. We have achieved the best recall of 84.0% and the best specificity value of 83.4%.
[ { "version": "v1", "created": "Mon, 5 Sep 2016 21:12:34 GMT" }, { "version": "v2", "created": "Sat, 10 Sep 2016 16:06:39 GMT" } ]
2016-09-13T00:00:00
[ [ "Nadeem", "Saad", "" ], [ "Kaufman", "Arie", "" ] ]
new_dataset
0.994325
1609.02960
Nizar Habash
Salam Khalifa, Nizar Habash, Dana Abdulrahim, Sara Hassan
A Large Scale Corpus of Gulf Arabic
Language Resources and Evaluation Conference 2016
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most Arabic natural language processing tools and resources are developed to serve Modern Standard Arabic (MSA), which is the official written language in the Arab World. Some Dialectal Arabic varieties, notably Egyptian Arabic, have received some attention lately and have a growing collection of resources that include annotated corpora and morphological analyzers and taggers. Gulf Arabic, however, lags behind in that respect. In this paper, we present the Gumar Corpus, a large-scale corpus of Gulf Arabic consisting of 110 million words from 1,200 forum novels. We annotate the corpus for sub-dialect information at the document level. We also present results of a preliminary study in the morphological annotation of Gulf Arabic which includes developing guidelines for a conventional orthography. The text of the corpus is publicly browsable through a web interface we developed for it.
[ { "version": "v1", "created": "Fri, 9 Sep 2016 22:22:53 GMT" } ]
2016-09-13T00:00:00
[ [ "Khalifa", "Salam", "" ], [ "Habash", "Nizar", "" ], [ "Abdulrahim", "Dana", "" ], [ "Hassan", "Sara", "" ] ]
new_dataset
0.999803
1609.03047
Ken Ivanov
Ken Ivanov
Autonomous collision attack on OCSP services
16 pages, 4 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper describes two important design flaws in Online Certificate Status Protocol (OCSP), a protocol widely used in PKI environments for managing digital certificates' credibility in real time. The flaws significantly reduce the security capabilities of the protocol, and can be exploited by a malicious third party to generate forged signed certificate statuses and, in the worst scenario, forged certificates. Description of the flaws, along with expected exploitation routes, consequences for consuming application layer protocols, and proposed countermeasures, is given.
[ { "version": "v1", "created": "Sat, 10 Sep 2016 13:13:19 GMT" } ]
2016-09-13T00:00:00
[ [ "Ivanov", "Ken", "" ] ]
new_dataset
0.989767
1609.03109
Amr Abdelaziz
Amr Abdelaziz, Ron Burton and C. Emre Koksal
Message Authentication and Secret Key Agreement in VANETs via Angle of Arrival
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the scope of VANETs, nature of exchanged safety/warning messages renders itself highly location dependent as it is usually for incident reporting. Thus, vehicles are required to periodically exchange beacon messages that include speed, time and GPS location information. In this paper paper, we present a physical layer assisted message authentication scheme that uses Angle of Arrival (AoA) estimation to verify the message originator location based on the claimed location information. Within the considered vehicular communication settings, fundamental limits of AoA estimation are developed in terms of its Cramer Rao Bound (CRB) and existence of efficient estimator. The problem of deciding whether the received signal is originated from the claimed GPS location is formulated as a two sided hypotheses testing problem whose solution is given by Wald test statics. Moreover, we use correct decision, $P_D$, and false alarm, $P_F$, probabilities as a quantitative performance measure. The observation posterior likelihood function is shown to satisfy regularity conditions necessary for asymptotic normality of the ML-AoA estimator. Thus, we give $P_D$ and $P_F$ in a closed form. We extend the potential of physical layer contribution in security to provide physical layer assisted secret key agreement (SKA) protocol. A public key (PK) based SKA in which communicating vehicles are required to validate their respective physical location. We show that the risk of the Man in the Middle attack, which is common in PK-SKA protocols without a trusted third party, is waived up to the literal meaning of the word "middle".
[ { "version": "v1", "created": "Sun, 11 Sep 2016 02:23:47 GMT" } ]
2016-09-13T00:00:00
[ [ "Abdelaziz", "Amr", "" ], [ "Burton", "Ron", "" ], [ "Koksal", "C. Emre", "" ] ]
new_dataset
0.999478
1609.03110
Prasanth G Narasimha-Shenoi
Manoj Changat, Prasanth G.Narasimha-Shenoi, Mary Shallet T.J, Ram Kumar
Directed graphs and its Boundary Vertices
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Suppose that $D=(V,E)$ is a strongly connected digraph. Let $u,v\in V(D)$. The maximum distance $md (u,v)$ is defined as $md(u,v)$=max\{$\overrightarrow{d}(u,v), \overrightarrow{d}(v,u)$\} where $\overrightarrow{d}(u,v)$ denote the length of a shortest directed $u-v$ path in $D$. This is a metric. The boundary, contour, eccentric and peripheral sets of a strong digraph $D$ are defined with respect to this metric. The main aim of this paper is to identify the above said metrically defined sets of a large strong digraph $D$ in terms of its prime factor decomposition with respect to cartesian product.
[ { "version": "v1", "created": "Sun, 11 Sep 2016 02:48:14 GMT" } ]
2016-09-13T00:00:00
[ [ "Changat", "Manoj", "" ], [ "Narasimha-Shenoi", "Prasanth G.", "" ], [ "J", "Mary Shallet T.", "" ], [ "Kumar", "Ram", "" ] ]
new_dataset
0.992676
1609.03498
Ljiljana Simi\'c
Ljiljana Simi\'c, Andra M. Voicu, Petri M\"ah\"onen, Marina Petrova and J. Pierre de Vries
LTE in Unlicensed Bands is neither Friend nor Foe to Wi-Fi
accepted for publication in IEEE Access
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Proponents of deploying LTE in the 5 GHz band for providing additional cellular network capacity have claimed that LTE would be a better neighbour to Wi-Fi in the unlicensed band, than Wi-Fi is to itself. On the other side of the debate, the Wi-Fi community has objected that LTE would be highly detrimental to Wi-Fi network performance. However, there is a lack of transparent and systematic engineering evidence supporting the contradicting claims of the two camps, which is essential for ascertaining whether regulatory intervention is in fact required to protect the Wi-Fi incumbent from the new LTE entrant. To this end, we present a comprehensive coexistence study of Wi-Fi and LTE-in-unlicensed, surveying a large parameter space of coexistence mechanisms and a range of representative network densities and deployment scenarios. Our results show that, typically, harmonious coexistence between Wi-Fi and LTE is ensured by the large number of 5 GHz channels. For the worst-case scenario of forced co-channel operation, LTE is sometimes a better neighbour to Wi-Fi - when effective node density is low - but sometimes worse - when density is high. We find that distributed interference coordination is only necessary to prevent a "tragedy of the commons" in regimes where interference is very likely. We also show that in practice it does not make a difference to the incumbent what kind of coexistence mechanism is added to LTE-in-unlicensed, as long as one is in place. We therefore conclude that LTE is neither friend nor foe to Wi-Fi in the unlicensed bands in general. We submit that the systematic engineering analysis exemplified by our case study is a best-practice approach for supporting evidence-based rulemaking by the regulator.
[ { "version": "v1", "created": "Mon, 12 Sep 2016 17:27:23 GMT" } ]
2016-09-13T00:00:00
[ [ "Simić", "Ljiljana", "" ], [ "Voicu", "Andra M.", "" ], [ "Mähönen", "Petri", "" ], [ "Petrova", "Marina", "" ], [ "de Vries", "J. Pierre", "" ] ]
new_dataset
0.982244
1609.03536
Zhenheng Yang
Zhenheng Yang and Ram Nevatia
A Multi-Scale Cascade Fully Convolutional Network Face Detector
Accepted to ICPR 16'
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Face detection is challenging as faces in images could be present at arbitrary locations and in different scales. We propose a three-stage cascade structure based on fully convolutional neural networks (FCNs). It first proposes the approximate locations where the faces may be, then aims to find the accurate location by zooming on to the faces. Each level of the FCN cascade is a multi-scale fully-convolutional network, which generates scores at different locations and in different scales. A score map is generated after each FCN stage. Probable regions of face are selected and fed to the next stage. The number of proposals is decreased after each level, and the areas of regions are decreased to more precisely fit the face. Compared to passing proposals directly between stages, passing probable regions can decrease the number of proposals and reduce the cases where first stage doesn't propose good bounding boxes. We show that by using FCN and score map, the FCN cascade face detector can achieve strong performance on public datasets.
[ { "version": "v1", "created": "Mon, 12 Sep 2016 19:13:46 GMT" } ]
2016-09-13T00:00:00
[ [ "Yang", "Zhenheng", "" ], [ "Nevatia", "Ram", "" ] ]
new_dataset
0.988728
1404.4275
Qian Xiaochao
Xiaochao Qian
A Bitcoin system with no mining and no history transactions: Build a compact Bitcoin system
Call for collaborators
null
null
null
cs.CE cs.CR q-fin.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an explicit definition of decentralization and show you that decentralization is almost impossible for the current stage and Bitcoin is the first truly noncentralized currency in the currency history. We propose a new framework of noncentralized cryptocurrency system with an assumption of the existence of a weak adversary for a bank alliance. It abandons the mining process and blockchain, and removes history transactions from data synchronization. We propose a consensus algorithm named Converged Consensus for a noncentralized cryptocurrency system.
[ { "version": "v1", "created": "Tue, 15 Apr 2014 04:13:37 GMT" }, { "version": "v2", "created": "Tue, 29 Apr 2014 05:24:00 GMT" }, { "version": "v3", "created": "Sat, 3 May 2014 09:04:25 GMT" }, { "version": "v4", "created": "Sun, 11 May 2014 10:59:36 GMT" }, { "version": "v5", "created": "Sat, 17 May 2014 08:04:23 GMT" }, { "version": "v6", "created": "Mon, 2 Jun 2014 05:28:23 GMT" }, { "version": "v7", "created": "Fri, 20 Jun 2014 09:21:53 GMT" }, { "version": "v8", "created": "Wed, 27 Apr 2016 03:03:11 GMT" }, { "version": "v9", "created": "Fri, 9 Sep 2016 00:09:25 GMT" } ]
2016-09-12T00:00:00
[ [ "Qian", "Xiaochao", "" ] ]
new_dataset
0.996481
1608.06368
Mustafa Hajij
Mustafa Hajij and Tamal Dey and Xin Li
Segmenting a Surface Mesh into Pants Using Morse Theory
null
null
null
null
cs.GR math.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A pair of pants is a genus zero orientable surface with three boundary components. A pants decomposition of a surface is a finite collection of unordered pairwise disjoint simple closed curves embedded in the surface that decompose the surface into pants. In this paper we present two Morse theory based algorithms for pants decomposition of a surface mesh. Both algorithms operates on a choice of an appropriate Morse function on the surface. The first algorithm uses this Morse function to identify handles that are glued systematically to obtain a pant decomposition. The second algorithm uses the Reeb graph of the Morse function to obtain a pant decomposition. Both algorithms work for surfaces with or without boundaries. Our preliminary implementation of the two algorithms shows that both algorithms run in much less time than an existing state-of-the-art method, and the Reeb graph based algorithm achieves the best time efficiency. Finally, we demonstrate the robustness of our algorithms against noise.
[ { "version": "v1", "created": "Tue, 23 Aug 2016 03:14:13 GMT" }, { "version": "v2", "created": "Wed, 24 Aug 2016 03:18:25 GMT" }, { "version": "v3", "created": "Fri, 9 Sep 2016 14:10:41 GMT" } ]
2016-09-12T00:00:00
[ [ "Hajij", "Mustafa", "" ], [ "Dey", "Tamal", "" ], [ "Li", "Xin", "" ] ]
new_dataset
0.997441
1609.02596
Ejder Ba\c{s}tu\u{g}
Fei Shen, Kenza Hamidouche, Ejder Ba\c{s}tu\u{g}, and M\'erouane Debbah
A Stackelberg Game for Incentive Proactive Caching Mechanisms in Wireless Networks
to be presented at IEEE Global Communications Conference (GLOBECOM'2016), Washington DC, USA, December 2016
null
null
null
cs.IT cs.GT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, an incentive proactive cache mechanism in cache-enabled small cell networks (SCNs) is proposed, in order to motivate the content providers (CPs) to participate in the caching procedure. A network composed of a single mobile network operator (MNO) and multiple CPs is considered. The MNO aims to define the price it charges the CPs to maximize its revenue while the CPs compete to determine the number of files they cache at the MNO's small base stations (SBSs) to improve the quality of service (QoS) of their users. This problem is formulated as a Stackelberg game where a single MNO is considered as the leader and the multiple CPs willing to cache files are the followers. The followers game is modeled as a non-cooperative game and both the existence and uniqueness of a Nash equilibrium (NE) are proved. The closed-form expression of the NE which corresponds to the amount of storage each CP requests from the MNO is derived. An optimization problem is formulated at the MNO side to determine the optimal price that the MNO should charge the CPs. Simulation results show that at the equilibrium, the MNO and CPs can all achieve a utility that is up to 50% higher than the cases in which the prices and storage quantities are requested arbitrarily.
[ { "version": "v1", "created": "Thu, 8 Sep 2016 21:20:45 GMT" } ]
2016-09-12T00:00:00
[ [ "Shen", "Fei", "" ], [ "Hamidouche", "Kenza", "" ], [ "Baştuğ", "Ejder", "" ], [ "Debbah", "Mérouane", "" ] ]
new_dataset
0.999145
1609.02657
Fu-Hong Liu
Wing-Kai Hon, Ton Kloks, Fu-Hong Liu and Hsiang-Hsuan Liu
Convex Independence in Permutation Graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A set C of vertices of a graph is P_3-convex if every vertex outside C has at most one neighbor in C. The convex hull \sigma(A) of a set A is the smallest P_3-convex set that contains A. A set M is convexly independent if for every vertex x \in M, x \notin \sigma(M-x). We show that the maximal number of vertices that a convexly independent set in a permutation graph can have, can be computed in polynomial time.
[ { "version": "v1", "created": "Fri, 9 Sep 2016 04:57:33 GMT" } ]
2016-09-12T00:00:00
[ [ "Hon", "Wing-Kai", "" ], [ "Kloks", "Ton", "" ], [ "Liu", "Fu-Hong", "" ], [ "Liu", "Hsiang-Hsuan", "" ] ]
new_dataset
0.999428
1609.02667
Xueyang Wang
Xueyang Wang and Jerry Backer
SIGDROP: Signature-based ROP Detection using Hardware Performance Counters
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/4.0/
Return-Oriented Programming (ROP) is a software exploit for system compromise. By chaining short instruction sequences from existing code pieces, ROP can bypass static code-integrity checking approaches and non-executable page protections. Existing defenses either require access to source code or binary, a customized compiler or hardware modifications, or suffer from high performance and storage overhead. In this work, we propose SIGDROP, a low-cost approach for ROP detection which uses low-level properties inherent to ROP attacks. Specifically, we observe special patterns of certain hardware events when a ROP attack occurs during program execution. Such hardware event-based patterns form signatures to flag ROP attacks at runtime. SIGDROP leverages Hardware Performance Counters, which are already present in commodity processors, to efficiently capture and extract the signatures. Our evaluation demonstrates that SIGDROP can effectively detect ROP attacks with acceptable performance overhead and negligible storage overhead.
[ { "version": "v1", "created": "Fri, 9 Sep 2016 06:28:45 GMT" } ]
2016-09-12T00:00:00
[ [ "Wang", "Xueyang", "" ], [ "Backer", "Jerry", "" ] ]
new_dataset
0.999019
1609.02750
Riccardo Spolaor
Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices
10 pages, 14 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
More and more people are regularly using mobile and battery-powered handsets, such as smartphones and tablets. At the same time, thanks to the technological innovation and to the high user demands, those devices are integrating extensive functionalities and developers are writing battery-draining apps, which results in a surge of energy consumption of these devices. This scenario leads many people to often look for opportunities to charge their devices at public charging stations: the presence of such stations is already prominent around public areas such as hotels, shopping malls, airports, gyms and museums, and is expected to significantly grow in the future. While most of the time the power comes for free, there is no guarantee that the charging station is not maliciously controlled by an adversary, with the intention to exfiltrate data from the devices that are connected to it. In this paper, we illustrate for the first time how an adversary could leverage a maliciously controlled charging station to exfiltrate data from the smartphone via a USB charging cable (i.e., without using the data transfer functionality), controlling a simple app running on the device, and without requiring any permission to be granted by the user to send data out of the device. We show the feasibility of the proposed attack through a prototype implementation in Android, which is able to send out potentially sensitive information, such as IMEI, contacts' phone number, and pictures.
[ { "version": "v1", "created": "Fri, 9 Sep 2016 11:48:21 GMT" } ]
2016-09-12T00:00:00
[ [ "Spolaor", "Riccardo", "" ], [ "Abudahi", "Laila", "" ], [ "Moonsamy", "Veelasha", "" ], [ "Conti", "Mauro", "" ], [ "Poovendran", "Radha", "" ] ]
new_dataset
0.997085
1609.02769
Riccardo Spolaor
Mauro Conti, Elia Dal Santo and Riccardo Spolaor
DELTA: Data Extraction and Logging Tool for Android
11 pages, 7 figures
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the past few years, the use of smartphones has increased exponentially, and so have the capabilities of such devices. Together with an increase in raw processing power, modern smartphones are equipped with a wide variety of sensors and expose an extensive set of API (Accessible Programming Interface). These capabilities allow us to extract a wide spectrum of data that ranges from information about the environment (e.g., position, orientation) to user habits (e.g., which apps she uses and when), as well as about the status of the operating system itself (e.g., memory, network adapters). This data can be extremely valuable in many research fields such as user authentication, intrusion detection and detection of information leaks. For these reasons, researchers need to use a solid and reliable logging tool to collect data from mobile devices. In this paper, we first survey the existing logging tools available on the Android platform, comparing the features offered by different tools and their impact on the system, and highlighting some of their shortcomings. Then, we present DELTA - Data Extraction and Logging Tool for Android, which improves the existing Android logging solutions in terms of flexibility, fine-grained tuning capabilities, extensibility, and available set of logging features. We performed a full implementation of DELTA and we run a thorough evaluation on its performance. The results show that our tool has low impact on the performance of the system, on battery consumption, and on user experience. Finally, we make the DELTA source code and toolset available to the research community.
[ { "version": "v1", "created": "Fri, 9 Sep 2016 12:47:02 GMT" } ]
2016-09-12T00:00:00
[ [ "Conti", "Mauro", "" ], [ "Santo", "Elia Dal", "" ], [ "Spolaor", "Riccardo", "" ] ]
new_dataset
0.99226
1609.02809
Edward Dixon Mr
Alexei Bastidas, Edward Dixon, Chris Loo, John Ryan
Harassment detection: a benchmark on the #HackHarassment dataset
Accepted to the Collaborative European Research Conference 2016
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Online harassment has been a problem to a greater or lesser extent since the early days of the internet. Previous work has applied anti-spam techniques like machine-learning based text classification (Reynolds, 2011) to detecting harassing messages. However, existing public datasets are limited in size, with labels of varying quality. The #HackHarassment initiative (an alliance of 1 tech companies and NGOs devoted to fighting bullying on the internet) has begun to address this issue by creating a new dataset superior to its predecssors in terms of both size and quality. As we (#HackHarassment) complete further rounds of labelling, later iterations of this dataset will increase the available samples by at least an order of magnitude, enabling corresponding improvements in the quality of machine learning models for harassment detection. In this paper, we introduce the first models built on the #HackHarassment dataset v1.0 (a new open dataset, which we are delighted to share with any interested researcherss) as a benchmark for future research.
[ { "version": "v1", "created": "Fri, 9 Sep 2016 14:23:02 GMT" } ]
2016-09-12T00:00:00
[ [ "Bastidas", "Alexei", "" ], [ "Dixon", "Edward", "" ], [ "Loo", "Chris", "" ], [ "Ryan", "John", "" ] ]
new_dataset
0.999627
1102.5739
Armin Banaei
Armin Banaei, Daren B.H. Cline, Costas N. Georghiades, and Shuguang Cui
On the Random 1/2-Disk Routing Scheme in Wireless Ad Hoc Networks
This paper has been withdrawn by the author and is replaced by an updated version under a new title: "On Asymptotic Statistics for Geometric Routing Schemes in Wireless Ad-Hoc Networks" [arXiv:1211.2496]
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Random 1/2-disk routing in wireless ad-hoc networks is a localized geometric routing scheme in which each node chooses the next relay randomly among the nodes within its transmission range and in the general direction of the destination. We introduce a notion of convergence for geometric routing schemes that not only considers the feasibility of packet delivery through possibly multi-hop relaying, but also requires the packet delivery to occur in a finite number of hops. We derive sufficient conditions that ensure the asymptotic \emph{convergence} of the random 1/2-disk routing scheme based on this convergence notion, and by modeling the packet distance evolution to the destination as a Markov process, we derive bounds on the expected number of hops that each packet traverses to reach its destination.
[ { "version": "v1", "created": "Mon, 28 Feb 2011 18:54:33 GMT" }, { "version": "v2", "created": "Mon, 3 Jun 2013 23:51:03 GMT" } ]
2016-09-09T00:00:00
[ [ "Banaei", "Armin", "" ], [ "Cline", "Daren B. H.", "" ], [ "Georghiades", "Costas N.", "" ], [ "Cui", "Shuguang", "" ] ]
new_dataset
0.999321
1112.0699
Lee-Ad Gottlieb
Yair Bartal, Lee-Ad Gottlieb, Robert Krauthgamer
The Traveling Salesman Problem: Low-Dimensionality Implies a Polynomial Time Approximation Scheme
null
null
10.1137/130913328
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Traveling Salesman Problem (TSP) is among the most famous NP-hard optimization problems. We design for this problem a randomized polynomial-time algorithm that computes a (1+eps)-approximation to the optimal tour, for any fixed eps>0, in TSP instances that form an arbitrary metric space with bounded intrinsic dimension. The celebrated results of Arora (A-98) and Mitchell (M-99) prove that the above result holds in the special case of TSP in a fixed-dimensional Euclidean space. Thus, our algorithm demonstrates that the algorithmic tractability of metric TSP depends on the dimensionality of the space and not on its specific geometry. This result resolves a problem that has been open since the quasi-polynomial time algorithm of Talwar (T-04).
[ { "version": "v1", "created": "Sat, 3 Dec 2011 22:58:13 GMT" }, { "version": "v2", "created": "Thu, 9 Apr 2015 12:56:30 GMT" } ]
2016-09-09T00:00:00
[ [ "Bartal", "Yair", "" ], [ "Gottlieb", "Lee-Ad", "" ], [ "Krauthgamer", "Robert", "" ] ]
new_dataset
0.964966
1609.02197
Stefano Tomasin
Stefano Tomasin, Ingmar Land and Fr\'ed\'eric Gabry
Pilot Contamination Attack Detection by Key-Confirmation in Secure MIMO Systems
accepted, appears in IEEE GLOBECOM 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many security techniques working at the physical layer need a correct channel state information (CSI) at the transmitter, especially when devices are equipped with multiple antennas. Therefore such techniques are vulnerable to pilot contamination attacks (PCAs) by which an attacker aims at inducing false CSI. In this paper we provide a solution to some PCA methods, by letting two legitimate parties to compare their channel estimates. The comparison is made in order to minimize the information leakage on the channel to a possible attacker. By reasonable assumptions on both the channel knowledge by the attacker and the correlation properties of the attacker and legitimate channels we show the validity of our solution. An accurate analysis of possible attacks and countermeasures is provided, together with a numerical evaluation of the attainable secrecy outage probability when our solution is used in conjunction with beamforming for secret communications.
[ { "version": "v1", "created": "Wed, 7 Sep 2016 21:28:02 GMT" } ]
2016-09-09T00:00:00
[ [ "Tomasin", "Stefano", "" ], [ "Land", "Ingmar", "" ], [ "Gabry", "Frédéric", "" ] ]
new_dataset
0.998
1609.02353
Yuval Elovici
Mordechai Guri, Yisroel Mirsky, Yuval Elovici
9-1-1 DDoS: Threat, Analysis and Mitigation
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The 911 emergency service belongs to one of the 16 critical infrastructure sectors in the United States. Distributed denial of service (DDoS) attacks launched from a mobile phone botnet pose a significant threat to the availability of this vital service. In this paper we show how attackers can exploit the cellular network protocols in order to launch an anonymized DDoS attack on 911. The current FCC regulations require that all emergency calls be immediately routed regardless of the caller's identifiers (e.g., IMSI and IMEI). A rootkit placed within the baseband firmware of a mobile phone can mask and randomize all cellular identifiers, causing the device to have no genuine identification within the cellular network. Such anonymized phones can issue repeated emergency calls that cannot be blocked by the network or the emergency call centers, technically or legally. We explore the 911 infrastructure and discuss why it is susceptible to this kind of attack. We then implement different forms of the attack and test our implementation on a small cellular network. Finally, we simulate and analyze anonymous attacks on a model of current 911 infrastructure in order to measure the severity of their impact. We found that with less than 6K bots (or $100K hardware), attackers can block emergency services in an entire state (e.g., North Carolina) for days. We believe that this paper will assist the respective organizations, lawmakers, and security professionals in understanding the scope of this issue in order to prevent possible 911-DDoS attacks in the future.
[ { "version": "v1", "created": "Thu, 8 Sep 2016 09:40:21 GMT" } ]
2016-09-09T00:00:00
[ [ "Guri", "Mordechai", "" ], [ "Mirsky", "Yisroel", "" ], [ "Elovici", "Yuval", "" ] ]
new_dataset
0.998869
1609.02554
Fengqiu Wang
Shuchao Qin, Fengqiu Wang, Yujie Liu, Qing Wan, Xinran Wang, Yongbing Xu, Yi Shi, Xiaomu Wang, Rong Zhang
A light-stimulated neuromorphic device based on graphene hybrid phototransistor
20 pages, 4 figures
null
null
null
cs.ET physics.bio-ph physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neuromorphic chip refers to an unconventional computing architecture that is modelled on biological brains. It is ideally suited for processing sensory data for intelligence computing, decision-making or context cognition. Despite rapid development, conventional artificial synapses exhibit poor connection flexibility and require separate data acquisition circuitry, resulting in limited functionalities and significant hardware redundancy. Here we report a novel light-stimulated artificial synapse based on a graphene-nanotube hybrid phototransistor that can directly convert optical stimuli into a "neural image" for further neuronal analysis. Our optically-driven synapses involve multiple steps of plasticity mechanisms and importantly exhibit flexible tuning of both short- and long-term plasticity. Furthermore, our neuromorphic phototransistor can take multiple pre-synaptic light stimuli via wavelength-division multiplexing and allows advanced optical processing through charge-trap-mediated optical coupling. The capability of complex neuromorphic functionalities in a simple silicon-compatible device paves the way for novel neuromorphic computing architectures involving photonics.
[ { "version": "v1", "created": "Wed, 7 Sep 2016 07:10:22 GMT" } ]
2016-09-09T00:00:00
[ [ "Qin", "Shuchao", "" ], [ "Wang", "Fengqiu", "" ], [ "Liu", "Yujie", "" ], [ "Wan", "Qing", "" ], [ "Wang", "Xinran", "" ], [ "Xu", "Yongbing", "" ], [ "Shi", "Yi", "" ], [ "Wang", "Xiaomu", "" ], [ "Zhang", "Rong", "" ] ]
new_dataset
0.997799
0802.0834
Jaap-Henk Hoepman
Jaap-Henk Hoepman
The Ephemeral Pairing Problem
null
In 8th Int. Conf. Financial Cryptography, LNCS 3110, pages 212-226, Key West, FL, USA, February 9-12 2004. Springer
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not yet know each other. We focus on the ephemeral version of this problem. Ephemeral pairings occur, for example, when electronic business cards are exchanged between two people that meet, or when one pays at a check-out using a wireless wallet. This problem can, in more abstract terms, be phrased as an ephemeral key exchange problem: given a low bandwidth authentic (or private) communication channel between two nodes, and a high bandwidth broadcast channel, can we establish a high-entropy shared secret session key between the two nodes without relying on any a priori shared secret information. Apart from introducing this new problem, we present several ephemeral key exchange protocols, both for the case of authentic channels as well as for the case of private channels.
[ { "version": "v1", "created": "Wed, 6 Feb 2008 16:14:11 GMT" } ]
2016-09-08T00:00:00
[ [ "Hoepman", "Jaap-Henk", "" ] ]
new_dataset
0.986689
0912.1178
Michel Fliess
Michel Fliess (LIX, INRIA Saclay - Ile de France), C\'edric Join (INRIA Saclay - Ile de France, CRAN), Mamadou Mboup (INRIA Saclay - Ile de France)
Algebraic Change-Point Detection
null
Applicable Algebra in Engineering, Communication and Computing (2010)
null
null
cs.NA math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Elementary techniques from operational calculus, differential algebra, and noncommutative algebra lead to a new approach for change-point detection, which is an important field of investigation in various areas of applied sciences and engineering. Several successful numerical experiments are presented.
[ { "version": "v1", "created": "Mon, 7 Dec 2009 07:57:08 GMT" } ]
2016-09-08T00:00:00
[ [ "Fliess", "Michel", "", "LIX, INRIA Saclay - Ile de France" ], [ "Join", "Cédric", "", "INRIA Saclay - Ile de France, CRAN" ], [ "Mboup", "Mamadou", "", "INRIA Saclay - Ile de\n France" ] ]
new_dataset
0.974959
1001.3716
T.R. Gopalakrishnan Nair
Vaidehi. M., T.R. Gopalakrishnan Nair
A Multicore Processor based Real-Time System for Automobile management application
9 pages, 4 figures
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose an Intelligent Management System which is capable of managing the automobile functions using the rigorous real-time principles and a multicore processor in order to realize higher efficiency and safety for the vehicle. It depicts how various automobile functionalities can be fine grained and treated to fit in real time concepts. It also shows how the modern multicore processors can be of good use in organizing vast amounts of correlated functions to be executed in real-time with excellent time commitments. The modeling of the automobile tasks with real time commitments, organizing appropriate scheduling for various real time tasks and the usage of a multicore processor enables the system to realize higher efficiency and offer better safety levels to the vehicle. The industry available real time operating system is used for scheduling various tasks and jobs on the multicore processor.
[ { "version": "v1", "created": "Thu, 21 Jan 2010 04:34:07 GMT" } ]
2016-09-08T00:00:00
[ [ "M.", "Vaidehi.", "" ], [ "Nair", "T. R. Gopalakrishnan", "" ] ]
new_dataset
0.987895
1001.3756
T.R. Gopalakrishnan Nair
A. Christy Persya, T.R.Gopalakrishnan Nair
Fault Tolerant Real Time Systems
4 pages, 4 figures
International Conference on Next Generation Software Application, pp 177-180, 2008
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Real time systems are systems in which there is a commitment for timely response by the computer to external stimuli. Real time applications have to function correctly even in presence of faults. Fault tolerance can be achieved by either hardware or software or time redundancy. Safety-critical applications have strict time and cost constraints, which means that not only faults have to be tolerated but also the constraints should be satisfied. Deadline scheduling means that the taskwith the earliest required response time is processed. The most common scheduling algorithms are :Rate Monotonic(RM) and Earliest deadline first(EDF).This paper deals with the interaction between the fault tolerant strategy and the EDF real time scheduling strategy.
[ { "version": "v1", "created": "Thu, 21 Jan 2010 10:18:43 GMT" } ]
2016-09-08T00:00:00
[ [ "Persya", "A. Christy", "" ], [ "Nair", "T. R. Gopalakrishnan", "" ] ]
new_dataset
0.996776
1001.4459
Jaap-Henk Hoepman
Gerben Broenink, Jaap-Henk Hoepman, Christian van 't Hof, Rob van Kranenburg, David Smits, Tijmen Wisman
The Privacy Coach: Supporting customer privacy in the Internet of Things
10 pages
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing technologies on the RFID tags themselves. Instead the Privacy Coach functions as a mediator between customer privacy preferences and corporate privacy policies, trying to find a match between the two, and informing the user of the outcome. In this paper we report on the architecture of the Privacy Coach, and show how it enables users to make informed privacy decisions in a user-friendly manner. We also spend considerable time to discuss lessons learnt and to describe future plans to further improve on the Privacy Coach concept.
[ { "version": "v1", "created": "Mon, 25 Jan 2010 15:25:29 GMT" } ]
2016-09-08T00:00:00
[ [ "Broenink", "Gerben", "" ], [ "Hoepman", "Jaap-Henk", "" ], [ "Hof", "Christian van 't", "" ], [ "van Kranenburg", "Rob", "" ], [ "Smits", "David", "" ], [ "Wisman", "Tijmen", "" ] ]
new_dataset
0.982129
1002.3015
Selva Rani R
Shashi Kumar N.R., R. Selvarani, Pushpavathi T.P
GPRS Based Intranet Remote Administration GIRA
4 pages, 2 figures
Journal of Research and Industry, Volume 1, pp 36-39, 2008
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a world of increasing mobility, there is a growing need for people to communicate with each other and have timely access to information regardless of the location of the individuals or the information. With the advent of moblle technology, the way of communication has changed. The gira system is basically a mobile phone technology service. In this paper we discuss about a novel local area network control system called gprs based Intranet Remote Administration gira. This system finds application in a mobile handset. With this system, a network administrator will have an effective remote control over the network. gira system is developed using gprs, gcf Generic Connection Framework of j2me, sockets and rmi technologies
[ { "version": "v1", "created": "Tue, 16 Feb 2010 06:53:21 GMT" } ]
2016-09-08T00:00:00
[ [ "R.", "Shashi Kumar N.", "" ], [ "Selvarani", "R.", "" ], [ "P", "Pushpavathi T.", "" ] ]
new_dataset
0.998933
1002.3074
Stevan Harnad
Arthur Sale, Marc Couture, Eloy Rodrigues, Leslie Carr, Stevan Harnad
Open Access Mandates and the "Fair Dealing" Button
12 pages, 5 figures, 32 references. To appear in "Dynamic Fair Dealing: Creating Canadian Culture Online" (Rosemary J. Coombe & Darren Wershler, Eds.)
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the "Fair Dealing Button," a feature designed for authors who have deposited their papers in an Open Access Institutional Repository but have deposited them as "Closed Access" (meaning only the metadata are visible and retrievable, not the full eprint) rather than Open Access. The Button allows individual users to request and authors to provide a single eprint via semi-automated email. The purpose of the Button is to tide over research usage needs during any publisher embargo on Open Access and, more importantly, to make it possible for institutions to adopt the "Immediate-Deposit/Optional-Access" Mandate, without exceptions or opt-outs, instead of a mandate that allows delayed deposit or deposit waivers, depending on publisher permissions or embargoes (or no mandate at all). This is only "Almost-Open Access," but in facilitating exception-free immediate-deposit mandates it will accelerate the advent of universal Open Access.
[ { "version": "v1", "created": "Tue, 16 Feb 2010 12:52:46 GMT" } ]
2016-09-08T00:00:00
[ [ "Sale", "Arthur", "" ], [ "Couture", "Marc", "" ], [ "Rodrigues", "Eloy", "" ], [ "Carr", "Leslie", "" ], [ "Harnad", "Stevan", "" ] ]
new_dataset
0.99158
1003.0445
Kamyar Moshksar
Kamyar Moshksar, Amir K. Khandani
On The Design of Signature Codes in Decentralized Wireless Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses a unified approach towards communication in decentralized wireless networks of separate transmitter-receiver pairs. In general, users are unaware of each other's codebooks and there is no central controller to assign the resources in the network to the users. A randomized signaling scheme is introduced in which each user locally spreads its Gaussian signal along a randomly generated spreading code comprised of a sequence of nonzero elements over a certain alphabet. Along with spreading, each transmitter also masks its output independently from transmission to transmission. Using a conditional version of entropy power inequality and a key lemma on the differential entropy of mixed Gaussian random vectors, achievable rates are developed for the users. It is seen that as the number of users increases, the achievable Sum Multiplexing Gain of the network approaches that of a centralized orthogonal scheme where multiuser interference is completely avoided. An interesting observation is that in general the elements of a spreading code are not equiprobable over the underlying alphabet. Finally, using the recently developed extremal inequality of Liu-Viswanath, we present an optimality result showing that transmission of Gaussian signals via spreading and masking yields higher achievable rates than the maximum achievable rate attained by applying masking only.
[ { "version": "v1", "created": "Mon, 1 Mar 2010 21:54:20 GMT" } ]
2016-09-08T00:00:00
[ [ "Moshksar", "Kamyar", "" ], [ "Khandani", "Amir K.", "" ] ]
new_dataset
0.99734
1609.01755
Ulf R\"uegg
Adalat Jabrayilov, Sven Mallach, Petra Mutzel, Ulf R\"uegg, and Reinhard von Hanxleden
Compact Layered Drawings of General Directed Graphs
Appears in the Proceedings of the 24th International Symposium on Graph Drawing and Network Visualization (GD 2016)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of layering general directed graphs under height and possibly also width constraints. Given a directed graph G = (V,A) and a maximal height, we propose a layering approach that minimizes a weighted sum of the number of reversed arcs, the arc lengths, and the width of the drawing. We call this the Compact Generalized Layering Problem (CGLP). Here, the width of a drawing is defined as the maximum sum of the number of vertices placed on a layer and the number of dummy vertices caused by arcs traversing the layer. The CGLP is NP-hard. We present two MIP models for this problem. The first one (EXT) is our extension of a natural formulation for directed acyclic graphs as suggested by Healy and Nikolov. The second one (CGL) is a new formulation based on partial orderings. Our computational experiments on two benchmark sets show that the CGL formulation can be solved much faster than EXT using standard commercial MIP solvers. Moreover, we suggest a variant of CGL, called MML, that can be seen as a heuristic approach. In our experiments, MML clearly improves on CGL in terms of running time while it does not considerably increase the average arc lengths and widths of the layouts although it solves a slightly different problem where the dummy vertices are not taken into account.
[ { "version": "v1", "created": "Mon, 29 Aug 2016 22:09:37 GMT" } ]
2016-09-08T00:00:00
[ [ "Jabrayilov", "Adalat", "" ], [ "Mallach", "Sven", "" ], [ "Mutzel", "Petra", "" ], [ "Rüegg", "Ulf", "" ], [ "von Hanxleden", "Reinhard", "" ] ]
new_dataset
0.982277
1609.01860
Venkatesh Venkatesh Venkatesh
Venkatesh, C S Sengar, K R Venugopal, S S Iyengar, L M Patnaik
RRDVCR: Real-Time Reliable Data Delivery Based on Virtual Coordinating Routing for Wireless Sensor Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Real-time industrial application requires routing protocol that guarantees data delivery with reliable, efficient and low end-to-end delay. Existing Routing(THVR) [13] is based velocity of Two-Hop Velocity and protocol relates two-hop velocity to delay to select the next forwarding node, that has overhead of exchanging control packets, and depleting the available energy in nodes. We propose a Real-Time Reliable Data delivery based on Virtual Coordinates Routing (RRDVCR) algorithm, based on the number of hops to the destination rather than geographic distance. Selection of forwarding node is based on packet progress offered by two-hops, link quality and available energy at the forwarding nodes. All these metric are co-related by dynamic co-relation factor. The proposed protocol uses selective acknowledgment scheme that results in lower overhead and energy consumption. Simulation results shows that there is about 22% and 9.5% decrease in energy consumption compared to SPEED [8] and THVR [13] respectively, 16% and 38% increase in packet delivery compared to THVR [13] and SPEED[8] respectively, and overhead is reduced by 50%.
[ { "version": "v1", "created": "Wed, 7 Sep 2016 07:26:34 GMT" } ]
2016-09-08T00:00:00
[ [ "Venkatesh", "", "" ], [ "Sengar", "C S", "" ], [ "Venugopal", "K R", "" ], [ "Iyengar", "S S", "" ], [ "Patnaik", "L M", "" ] ]
new_dataset
0.999756
1609.01985
Roly Perera
Roly Perera, Simon J. Gay
Behavioural Prototypes
Extended abstract; presented at 0th Workshop on New Object-Oriented Languages (NOOL) 2015
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We sketch a simple language of concurrent objects which explores the design space between type systems and continuous testing. In our language, programs are collections of communicating automata checked automatically for multiparty compatibility. This property, taken from the session types literature but here applied to terms rather than types, guarantees that no state-related errors arise during execution: no object gets stuck because it was sent the wrong message, and every message is processed.
[ { "version": "v1", "created": "Sat, 3 Sep 2016 11:14:51 GMT" } ]
2016-09-08T00:00:00
[ [ "Perera", "Roly", "" ], [ "Gay", "Simon J.", "" ] ]
new_dataset
0.996776
1609.01987
Jason T. L. Wang
Lei Hua, Yang Song, Namhee Kim, Christian Laing, Jason T. L. Wang, Tamar Schlick
CHSalign: A Web Server That Builds upon Junction-Explorer and RNAJAG for Pairwise Alignment of RNA Secondary Structures with Coaxial Helical Stacking
45 pages, 5 figures
null
null
null
cs.CE q-bio.BM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
RNA junctions are important structural elements of RNA molecules. They are formed when three or more helices come together in three-dimensional space. Recent studies have focused on the annotation and prediction of coaxial helical stacking (CHS) motifs within junctions. Here we exploit such predictions to develop an efficient alignment tool to handle RNA secondary structures with CHS motifs. Specifically, we build upon our Junction-Explorer software for predicting coaxial stacking and RNAJAG for modelling junction topologies as tree graphs to incorporate constrained tree matching and dynamic programming algorithms into a new method, called CHSalign, for aligning the secondary structures of RNA molecules containing CHS motifs. Thus, CHSalign is intended to be an efficient alignment tool for RNAs containing similar junctions. Experimental results based on thousands of alignments demonstrate that CHSalign can align two RNA secondary structures containing CHS motifs more accurately than other RNA secondary structure alignment tools. CHSalign yields a high score when aligning two RNA secondary structures with similar CHS motifs or helical arrangement patterns, and a low score otherwise. This new method has been implemented in a web server, and the program is also made freely available, at http://bioinformatics.njit.edu/CHSalign/.
[ { "version": "v1", "created": "Mon, 5 Sep 2016 22:31:02 GMT" } ]
2016-09-08T00:00:00
[ [ "Hua", "Lei", "" ], [ "Song", "Yang", "" ], [ "Kim", "Namhee", "" ], [ "Laing", "Christian", "" ], [ "Wang", "Jason T. L.", "" ], [ "Schlick", "Tamar", "" ] ]
new_dataset
0.999618
1603.00361
Tom\'a\v{s} Masopust
Tom\'a\v{s} Masopust
Piecewise Testable Languages and Nondeterministic Automata
Corrections in section 4.1
null
10.4230/LIPIcs.MFCS.2016.67
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A regular language is $k$-piecewise testable if it is a finite boolean combination of languages of the form $\Sigma^* a_1 \Sigma^* \cdots \Sigma^* a_n \Sigma^*$, where $a_i\in\Sigma$ and $0\le n \le k$. Given a DFA $A$ and $k\ge 0$, it is an NL-complete problem to decide whether the language $L(A)$ is piecewise testable and, for $k\ge 4$, it is coNP-complete to decide whether the language $L(A)$ is $k$-piecewise testable. It is known that the depth of the minimal DFA serves as an upper bound on $k$. Namely, if $L(A)$ is piecewise testable, then it is $k$-piecewise testable for $k$ equal to the depth of $A$. In this paper, we show that some form of nondeterminism does not violate this upper bound result. Specifically, we define a class of NFAs, called ptNFAs, that recognize piecewise testable languages and show that the depth of a ptNFA provides an (up to exponentially better) upper bound on $k$ than the minimal DFA. We provide an application of our result, discuss the relationship between $k$-piecewise testability and the depth of NFAs, and study the complexity of $k$-piecewise testability for ptNFAs.
[ { "version": "v1", "created": "Tue, 1 Mar 2016 17:11:05 GMT" }, { "version": "v2", "created": "Thu, 10 Mar 2016 06:54:39 GMT" } ]
2016-09-07T00:00:00
[ [ "Masopust", "Tomáš", "" ] ]
new_dataset
0.965266
1607.05139
Erel Segal-Halevi
Erel Segal-Halevi and Avinatan Hassidim and Yonatan Aumann
SBBA: a Strongly-Budget-Balanced Double-Auction Mechanism
Accepted to SAGT 2016. This full version (14 pages) includes an additional example
null
10.1007/978-3-662-53354-3_21
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a seminal paper, McAfee (1992) presented the first dominant strategy truthful mechanism for double auction. His mechanism attains nearly optimal gain-from-trade when the market is sufficiently large. However, his mechanism may leave money on the table, since the price paid by the buyers may be higher than the price paid to the sellers. This money is included in the gain-from-trade and in some cases it accounts for almost all the gain-from-trade, leaving almost no gain-from-trade to the traders. We present SBBA: a variant of McAfee's mechanism which is strongly budget-balanced. There is a single price, all money is exchanged between buyers and sellers and no money is left on the table. This means that all gain-from-trade is enjoyed by the traders. We generalize this variant to spatially-distributed markets with transit costs.
[ { "version": "v1", "created": "Mon, 18 Jul 2016 15:48:27 GMT" } ]
2016-09-07T00:00:00
[ [ "Segal-Halevi", "Erel", "" ], [ "Hassidim", "Avinatan", "" ], [ "Aumann", "Yonatan", "" ] ]
new_dataset
0.998957
1608.06990
Dileep Kalathil
Dileep Kalathil, Chenye Wu, Kameshwar Poolla, Pravin Varaiya
The Sharing Economy for the Smart Grid
11 pages, 11 figures
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sharing economy has disrupted housing and transportation sectors. Homeowners can rent out their property when they are away on vacation, car owners can offer ride sharing services. These sharing economy business models are based on monetizing under-utilized infrastructure. They are enabled by peer-to-peer platforms that match eager sellers with willing buyers. Are there compelling sharing economy opportunities in the electricity sector? What products or services can be shared in tomorrow's Smart Grid? We begin by exploring sharing economy opportunities in the electricity sector, and discuss regulatory and technical obstacles to these opportunities. We then study the specific problem of a collection of firms sharing their electricity storage. We characterize equilibrium prices for shared storage in a spot market. We formulate storage investment decisions of the firms as a non-convex non-cooperative game. We show that under a mild alignment condition, a Nash equilibrium exists, it is unique, and it supports the social welfare. We discuss technology platforms necessary for the physical exchange of power, and market platforms necessary to trade electricity storage. We close with synthetic examples to illustrate our ideas.
[ { "version": "v1", "created": "Thu, 25 Aug 2016 00:04:23 GMT" }, { "version": "v2", "created": "Tue, 6 Sep 2016 03:45:06 GMT" } ]
2016-09-07T00:00:00
[ [ "Kalathil", "Dileep", "" ], [ "Wu", "Chenye", "" ], [ "Poolla", "Kameshwar", "" ], [ "Varaiya", "Pravin", "" ] ]
new_dataset
0.962999
1609.01317
Nils Kopal <
Nils Kopal
Volume Raycasting mit OpenCL
11 pages, 15 figures, a German paper written for a 3D modeling masters course in applied computer science at the University of Duisburg-Essen in 2011
null
null
null
cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This German paper was written entirely at the University of Duisburg-Essen in 2011 for a 3D modeling masters course in applied computer science. We publish this paper, thus, interested people can acquire a first impression of the topic "volume raycasting". In addition to writing this paper, we developed a functioning open-source OpenCL raycaster. A video of this raycaster is available: http://www.youtube.com/watch?v=VMMsQnf4zEY. Additionally, we archived and published the complete source code of the raycaster in the Google Code Archive: http://code.google.com/p/gputracer/. If this is no longer the case, those who are interested can also write an email to the author, hence, we can provide the source code. This paper provides an introduction and overview of the topic "volume ray casting with OpenCL". We show how volume data can be loaded, manipulated, and visualized by modern GPUs in real time. In addition, we present basic algorithms and data structures that are necessary for building such a raycaster. Then, we describe how we built a rudimentary raycaster using OpenCL and .NET C#. Furthermore, we analyze different gradient operators (CentralDifference, Sobel3D and Zucker-Hummel) for surface detection and show an evaluation of these with respect to their performance. Finally, we present optimization techniques (hitpoint refinement, adaptive sampling, octrees, and empty-space-skipping) for improving a raycaster.
[ { "version": "v1", "created": "Mon, 5 Sep 2016 20:26:24 GMT" } ]
2016-09-07T00:00:00
[ [ "Kopal", "Nils", "" ] ]
new_dataset
0.969411
1609.01322
Tugcan Aktas
Tugcan Aktas, Giorgio Quer, Tara Javidi, Ramesh R. Rao
Mobile Relays for Smart Cities: Mathematical Proofs
Technical Report of detailed mathematical proofs for supporting "From Connected Vehicles to Mobile Relays: Enhanced Wireless Infrastructure for Smarter Cities", which is to appear in IEEE Global Communications Conference, Dec. 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing number of connected vehicles in densely populated urban areas provides an interesting opportunity to counteract the high wireless data demands in high density and highly mobile scenarios. The idea is to support the macro base station (BS) with a secondary communication tier composed of a set of smart and connected vehicles that are in movement in the urban area. As a first step towards a comprehensive cost-benefit analysis of this architecture, this paper considers the case where these vehicles are equipped with femto-mobile Access Points (fmAPs) and constitute a mobile out-of-band relay infrastructure. In particular, three techniques to select an fmAP (if more than one is available) are proposed and the maximal feasible gain in the packet delivery rate and data rate as a function of the vehicle density, average vehicle speeds, handoff overhead cost, as well as physical layer parameters is characterized. The analytical and simulation results provide a first benchmark characterizing this architecture and the definition of guidelines for its future realistic study and implementation.
[ { "version": "v1", "created": "Mon, 5 Sep 2016 20:49:43 GMT" } ]
2016-09-07T00:00:00
[ [ "Aktas", "Tugcan", "" ], [ "Quer", "Giorgio", "" ], [ "Javidi", "Tara", "" ], [ "Rao", "Ramesh R.", "" ] ]
new_dataset
0.989975
1609.01437
Alonso Silva
Albert Y.S. Lam, Longbo Huang, Alonso Silva, Walid Saad
A multi-layer market for vehicle-to-grid energy trading in the smart grid
null
IEEE INFOCOM Workshop on Green Networking and Smart Grids (CCSES), Mar 2012, Orlando, Florida, United States. pp.85 - 90
10.1109/INFCOMW.2012.6193525
null
cs.GT cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we propose a multi-layer market for vehicle-to-grid energy trading. In the macro layer, we consider a double auction mechanism, under which the utility company act as an auctioneer and energy buyers and sellers interact. This double auction mechanism is strategy-proof and converges asymptotically. In the micro layer, the aggregators, which are the sellers in the macro layer, are paid with commissions to sell the energy of plug-in hybrid electric vehicles (PHEVs) and to maximize their utilities. We analyze the interaction between the macro and micro layers and study some simplified cases. Depending on the elasticity of supply and demand, the utility is analyzed under different scenarios. Simulation results show that our approach can significantly increase the utility of PHEVs.
[ { "version": "v1", "created": "Tue, 6 Sep 2016 08:47:19 GMT" } ]
2016-09-07T00:00:00
[ [ "Lam", "Albert Y. S.", "" ], [ "Huang", "Longbo", "" ], [ "Silva", "Alonso", "" ], [ "Saad", "Walid", "" ] ]
new_dataset
0.997513
1609.01472
Kardi Teknomo
Chelcie Narboneta and Kardi Teknomo
OpenTripPlanner, OpenStreetMap, General Transit Feed Specification: Tools for Disaster Relief and Recovery
6 pages, Narboneta, C. G. and Teknomo, K. (2014) OpenTripPlanner, OpenStreetMap, General Transit Feed Specification: Tools for Disaster Relief and Recovery, Proceeding of the 7th IEEE International Conference Humanoid, Nanotechnology, Information Technology Communication and Control, Environment and Management (HNICEM) 12-16 November 2014 Hotel Centro, Puerto Princesa, Palawan, Philippines
null
null
null
cs.CY cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Open Trip Planner was identified as the most promising open source multi-modal trip planning software. Open Street Map, which provides mapping data to Open Trip Planner, is one of the most well-known open source international repository of geographic data. General Transit Feed Specification, which provides transportation data to Open Trip Planner, has been the standard for describing transit systems and platform for numerous applications. Together, when used to implement an instance of Open Trip Planner, these software has been helping in traffic decongestion all over the world by assisting commuters to shift from using private transportation modes to public ones. Their potential however goes beyond providing multi-modal public transportation routes. This paper aims to first discuss the researchers' experience in implementing a public transportation route planner for the purpose of traffic decongestion.The researchers would examine the prospective of using the system for disaster preparedness and recovery and concrete ways on how to realize them.
[ { "version": "v1", "created": "Tue, 6 Sep 2016 10:11:27 GMT" } ]
2016-09-07T00:00:00
[ [ "Narboneta", "Chelcie", "" ], [ "Teknomo", "Kardi", "" ] ]
new_dataset
0.999783
1609.01592
Siddhartha Jonnalagadda
Ravi P Garg, Kalpana Raja, Siddhartha R Jonnalagadda
CRTS: A type system for representing clinical recommendations
null
null
null
null
cs.CL cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background: Clinical guidelines and recommendations are the driving wheels of the evidence-based medicine (EBM) paradigm, but these are available primarily as unstructured text and are generally highly heterogeneous in nature. This significantly reduces the dissemination and automatic application of these recommendations at the point of care. A comprehensive structured representation of these recommendations is highly beneficial in this regard. Objective: The objective of this paper to present Clinical Recommendation Type System (CRTS), a common type system that can effectively represent a clinical recommendation in a structured form. Methods: CRTS is built by analyzing 125 recommendations and 195 research articles corresponding to 6 different diseases available from UpToDate, a publicly available clinical knowledge system, and from the National Guideline Clearinghouse, a public resource for evidence-based clinical practice guidelines. Results: We show that CRTS not only covers the recommendations but also is flexible to be extended to represent information from primary literature. We also describe how our developed type system can be applied for clinical decision support, medical knowledge summarization, and citation retrieval. Conclusion: We showed that our proposed type system is precise and comprehensive in representing a large sample of recommendations available for various disorders. CRTS can now be used to build interoperable information extraction systems that automatically extract clinical recommendations and related data elements from clinical evidence resources, guidelines, systematic reviews and primary publications. Keywords: guidelines and recommendations, type system, clinical decision support, evidence-based medicine, information storage and retrieval
[ { "version": "v1", "created": "Tue, 6 Sep 2016 15:02:03 GMT" } ]
2016-09-07T00:00:00
[ [ "Garg", "Ravi P", "" ], [ "Raja", "Kalpana", "" ], [ "Jonnalagadda", "Siddhartha R", "" ] ]
new_dataset
0.987128
1609.01622
Ripudaman Singh
Ripudaman Singh, Brijesh Kumar Rai, and Sanjay Kumar Bose
A Cross-layer Contention Based Synchronous MAC Protocol for Transmission Delay Reduction in Multi-Hop WSNs
Accepted to TENCON 2016
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently designed cross-layer contention based synchronous MAC protocols like the PRMAC protocol, for wireless sensor networks (WSNs) enable a node to schedule multi-hop transmission of multiple data packets in a cycle. However, these systems accommodate both the request-to-send data process and the confirmation-to-send data process in the same data transmission scheduling window (i.e. data window). This reduces the length of the multi-hop flow setup in the data window. In a multi-hop scenario, this degrades both the packet delivery ratio (PDR) and the end-to-end transmission delay (E2ETD). In this paper, we propose a cross-layer contention based synchronous MAC protocol, which accommodates the request-to-send data process in the data window and the confirmation-to-send data process in the sleep window for increased efficiency. We evaluate our proposed protocol through ns-2.35 simulations and compare its performance with the PRMAC protocol. Results suggest that in multi-hop scenario, proposed protocol outperforms PRMAC both in terms of the E2ETD and the packet delivery ratio (PDR).
[ { "version": "v1", "created": "Tue, 6 Sep 2016 15:51:59 GMT" } ]
2016-09-07T00:00:00
[ [ "Singh", "Ripudaman", "" ], [ "Rai", "Brijesh Kumar", "" ], [ "Bose", "Sanjay Kumar", "" ] ]
new_dataset
0.971168
cs/0508114
Xiangyong Zeng
Xiangyong Zeng, Lei Hu, Qingchong Liu
A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span
21 pages
null
10.1093/ietfec/e89-a.7.2029
null
cs.CR cs.IT math.IT
null
A family of binary sequences is presented and proved to have optimal correlation property and large linear span. It includes the small set of Kasami sequences, No sequence set and TN sequence set as special cases. An explicit lower bound expression on the linear span of sequences in the family is given. With suitable choices of parameters, it is proved that the family has exponentially larger linear spans than both No sequences and TN sequences. A class of ideal autocorrelation sequences is also constructed and proved to have large linear span.
[ { "version": "v1", "created": "Thu, 25 Aug 2005 14:16:36 GMT" }, { "version": "v2", "created": "Mon, 26 Sep 2005 14:40:51 GMT" } ]
2016-09-07T00:00:00
[ [ "Zeng", "Xiangyong", "" ], [ "Hu", "Lei", "" ], [ "Liu", "Qingchong", "" ] ]
new_dataset
0.997462
1512.07849
Konrad Dabrowski
Konrad K. Dabrowski, Fran\c{c}ois Dross, Dani\"el Paulusma
Colouring Diamond-free Graphs
30 pages, 3 figures. An extended abstract of this paper was published in the proceedings of SWAT 2016 (DOI:10.4230/LIPIcs.SWAT.2016.16)
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Colouring problem is that of deciding, given a graph $G$ and an integer $k$, whether $G$ admits a (proper) $k$-colouring. For all graphs $H$ up to five vertices, we classify the computational complexity of Colouring for $(\mbox{diamond},H)$-free graphs. Our proof is based on combining known results together with proving that the clique-width is bounded for $(\mbox{diamond}, P_1+2P_2)$-free graphs. Our technique for handling this case is to reduce the graph under consideration to a $k$-partite graph that has a very specific decomposition. As a by-product of this general technique we are also able to prove boundedness of clique-width for four other new classes of $(H_1,H_2)$-free graphs. As such, our work also continues a recent systematic study into the (un)boundedness of clique-width of $(H_1,H_2)$-free graphs, and our five new classes of bounded clique-width reduce the number of open cases from 13 to 8.
[ { "version": "v1", "created": "Thu, 24 Dec 2015 16:23:35 GMT" }, { "version": "v2", "created": "Mon, 5 Sep 2016 09:22:03 GMT" } ]
2016-09-06T00:00:00
[ [ "Dabrowski", "Konrad K.", "" ], [ "Dross", "François", "" ], [ "Paulusma", "Daniël", "" ] ]
new_dataset
0.990104
1601.04485
Jose Velasco
Jose Velasco, Daniel Pizarro, Javier Macias-Guarasa and Afsaneh Asaei
TDOA Matrices: Algebraic Properties and their Application to Robust Denoising with Missing Data
null
IEEE Transactions on Signal Processing ( Volume: 64, Issue: 20, Oct.15, 15 2016 )
10.1109/TSP.2016.2593690
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Measuring the Time delay of Arrival (TDOA) between a set of sensors is the basic setup for many applications, such as localization or signal beamforming. This paper presents the set of TDOA matrices, which are built from noise-free TDOA measurements, not requiring knowledge of the sensor array geometry. We prove that TDOA matrices are rank-two and have a special SVD decomposition that leads to a compact linear parametric representation. Properties of TDOA matrices are applied in this paper to perform denoising, by finding the TDOA matrix closest to the matrix composed with noisy measurements. The paper shows that this problem admits a closed-form solution for TDOA measurements contaminated with Gaussian noise which extends to the case of having missing data. The paper also proposes a novel robust denoising method resistant to outliers, missing data and inspired in recent advances in robust low-rank estimation. Experiments in synthetic and real datasets show TDOA-based localization, both in terms of TDOA accuracy estimation and localization error.
[ { "version": "v1", "created": "Mon, 18 Jan 2016 12:01:45 GMT" }, { "version": "v2", "created": "Tue, 24 May 2016 14:00:01 GMT" } ]
2016-09-06T00:00:00
[ [ "Velasco", "Jose", "" ], [ "Pizarro", "Daniel", "" ], [ "Macias-Guarasa", "Javier", "" ], [ "Asaei", "Afsaneh", "" ] ]
new_dataset
0.988752
1608.02183
Dapeng Tao
Yanan Guo, Lei Li, Weifeng Liu, Jun Cheng, and Dapeng Tao
Multiview Cauchy Estimator Feature Embedding for Depth and Inertial Sensor-Based Human Action Recognition
This paper has been withdrawn by the author due to a crucial error
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ever-growing popularity of Kinect and inertial sensors has prompted intensive research efforts on human action recognition. Since human actions can be characterized by multiple feature representations extracted from Kinect and inertial sensors, multiview features must be encoded into a unified space optimal for human action recognition. In this paper, we propose a new unsupervised feature fusion method termed Multiview Cauchy Estimator Feature Embedding (MCEFE) for human action recognition. By minimizing empirical risk, MCEFE integrates the encoded complementary information in multiple views to find the unified data representation and the projection matrices. To enhance robustness to outliers, the Cauchy estimator is imposed on the reconstruction error. Furthermore, ensemble manifold regularization is enforced on the projection matrices to encode the correlations between different views and avoid overfitting. Experiments are conducted on the new Chinese Academy of Sciences - Yunnan University - Multimodal Human Action Database (CAS-YNU-MHAD) to demonstrate the effectiveness and robustness of MCEFE for human action recognition.
[ { "version": "v1", "created": "Sun, 7 Aug 2016 05:50:10 GMT" }, { "version": "v2", "created": "Sun, 4 Sep 2016 08:37:23 GMT" } ]
2016-09-06T00:00:00
[ [ "Guo", "Yanan", "" ], [ "Li", "Lei", "" ], [ "Liu", "Weifeng", "" ], [ "Cheng", "Jun", "" ], [ "Tao", "Dapeng", "" ] ]
new_dataset
0.950777
1608.07568
Daniel Kral
Zdenek Dvorak, Daniel Kral, Bojan Mohar
Graphic TSP in cubic graphs
null
null
null
null
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a polynomial-time 9/7-approximation algorithm for the graphic TSP for cubic graphs, which improves the previously best approximation factor of 1.3 for 2-connected cubic graphs and drops the requirement of 2-connectivity at the same time. To design our algorithm, we prove that every simple 2-connected cubic n-vertex graph contains a spanning closed walk of length at most 9n/7-1, and that such a walk can be found in polynomial time.
[ { "version": "v1", "created": "Fri, 26 Aug 2016 19:39:42 GMT" }, { "version": "v2", "created": "Tue, 30 Aug 2016 13:23:23 GMT" }, { "version": "v3", "created": "Mon, 5 Sep 2016 15:42:17 GMT" } ]
2016-09-06T00:00:00
[ [ "Dvorak", "Zdenek", "" ], [ "Kral", "Daniel", "" ], [ "Mohar", "Bojan", "" ] ]
new_dataset
0.989364
1609.00435
David Jurgens
David Jurgens, Srijan Kumar, Raine Hoover, Dan McFarland, Dan Jurafsky
Citation Classification for Behavioral Analysis of a Scientific Field
null
null
null
null
cs.CL cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Citations are an important indicator of the state of a scientific field, reflecting how authors frame their work, and influencing uptake by future scholars. However, our understanding of citation behavior has been limited to small-scale manual citation analysis. We perform the largest behavioral study of citations to date, analyzing how citations are both framed and taken up by scholars in one entire field: natural language processing. We introduce a new dataset of nearly 2,000 citations annotated for function and centrality, and use it to develop a state-of-the-art classifier and label the entire ACL Reference Corpus. We then study how citations are framed by authors and use both papers and online traces to track how citations are followed by readers. We demonstrate that authors are sensitive to discourse structure and publication venue when citing, that online readers follow temporal links to previous and future work rather than methodological links, and that how a paper cites related work is predictive of its citation count. Finally, we use changes in citation roles to show that the field of NLP is undergoing a significant increase in consensus.
[ { "version": "v1", "created": "Fri, 2 Sep 2016 00:40:15 GMT" } ]
2016-09-06T00:00:00
[ [ "Jurgens", "David", "" ], [ "Kumar", "Srijan", "" ], [ "Hoover", "Raine", "" ], [ "McFarland", "Dan", "" ], [ "Jurafsky", "Dan", "" ] ]
new_dataset
0.998519
1609.01055
Gilles Tredan
Gilles Tredan and Hans Peter Schwefel
Fast Abstracts and Student Forum Proceedings - EDCC 2016 - 12th European Dependable Computing Conference
12th European Dependable Computing Conference, Gothenburg, Sweden, September 5-9, 2016
null
null
null
cs.DC
http://creativecommons.org/licenses/by-nc-sa/4.0/
Fast Abstracts are short presentations of work in progress or opinion pieces and aim to serve as a rapid and flexible mechanism to (i) Report on current work that may or may not be complete; (ii) Introduce new ideas to the community; (iii) State positions on controversial issues or open problems. On the other hand, the goal of the Student Forum is to encourage students to attend EDCC and present their work, exchange ideas with researchers and practitioners, and get early feedback on their research efforts.
[ { "version": "v1", "created": "Mon, 5 Sep 2016 08:27:10 GMT" } ]
2016-09-06T00:00:00
[ [ "Tredan", "Gilles", "" ], [ "Schwefel", "Hans Peter", "" ] ]
new_dataset
0.996579
1609.01088
Evgeny Burnaev
Mikhail Belyaev, Evgeny Burnaev, Ermek Kapushev, Maxim Panov, Pavel Prikhodko, Dmitry Vetrov, Dmitry Yarotsky
GTApprox: surrogate modeling for industrial design
31 pages, 11 figures
null
null
null
cs.MS cs.CE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe GTApprox - a new tool for medium-scale surrogate modeling in industrial design. Compared to existing software, GTApprox brings several innovations: a few novel approximation algorithms, several advanced methods of automated model selection, novel options in the form of hints. We demonstrate the efficiency of GTApprox on a large collection of test problems. In addition, we describe several applications of GTApprox to real engineering problems.
[ { "version": "v1", "created": "Mon, 5 Sep 2016 10:41:14 GMT" } ]
2016-09-06T00:00:00
[ [ "Belyaev", "Mikhail", "" ], [ "Burnaev", "Evgeny", "" ], [ "Kapushev", "Ermek", "" ], [ "Panov", "Maxim", "" ], [ "Prikhodko", "Pavel", "" ], [ "Vetrov", "Dmitry", "" ], [ "Yarotsky", "Dmitry", "" ] ]
new_dataset
0.997747
1609.01186
Joaquin Torr\'e Zaffaroni
Camilo Melani, Juan V. Echag\"ue, Joaqu\'in Torre Zaffaroni, Daniel Yankelevich
Un caso de big data punta a punta: an\'alisis de datos de transporte y su uso en el negocio
3 pages, in Spanish, 1 figure in Proceedings de AGRANDA 2015, Rosario, 2015
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we present the results of a data analysis project for a public-transport company. This project encompassed data preparation, analysis and visualization of three years of historical data. The data consisted in ticket purchases and GPS location of the vehicles. This work describes the project from start to end, including the incorporation of the results in the business process.
[ { "version": "v1", "created": "Mon, 5 Sep 2016 14:55:03 GMT" } ]
2016-09-06T00:00:00
[ [ "Melani", "Camilo", "" ], [ "Echagüe", "Juan V.", "" ], [ "Zaffaroni", "Joaquín Torre", "" ], [ "Yankelevich", "Daniel", "" ] ]
new_dataset
0.995313
1609.01190
Harshit Gupta
Harshit Gupta, Shubha Brata Nath, Sandip Chakraborty, Soumya K. Ghosh
SDFog: A Software Defined Computing Architecture for QoS Aware Service Orchestration over Edge Devices
This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud computing revolutionized the information technology (IT) industry by offering dynamic and infinite scaling, on-demand resources and utility-oriented usage. However, recent changes in user traffic and requirements have exposed the shortcomings of cloud computing, particularly the inability to deliver real-time responses and handle massive surge in data volumes. Fog computing, that brings back partial computation load from the cloud to the edge devices, is envisioned to be the next big change in computing, and has the potential to address these challenges. Being a highly distributed, loosely coupled and still in the emerging phase, standardization, quality-of-service management and dynamic adaptability are the key challenges faced by fog computing research fraternity today. This article aims to address these issues by proposing a service-oriented middleware that leverages the convergence of cloud and fog computing along with software defined networking (SDN) and network function virtualization (NFV) to achieve the aforementioned goals. The proposed system, called "Software Defined Fog" (SDFog), abstracts connected entities as services and allows applications to orchestrate these services with end-to-end QoS requirements. A use-case showing the necessity of such a middleware has been presented to show the efficacy of the SDN-based QoS control over the Fog. This article aims at developing an integrated system to realize the software-defined control over fog infrastructure.
[ { "version": "v1", "created": "Mon, 5 Sep 2016 15:02:07 GMT" } ]
2016-09-06T00:00:00
[ [ "Gupta", "Harshit", "" ], [ "Nath", "Shubha Brata", "" ], [ "Chakraborty", "Sandip", "" ], [ "Ghosh", "Soumya K.", "" ] ]
new_dataset
0.996232
0801.1927
Paul M. Aoki
Rowena Luk, Melissa Ho, Paul M. Aoki
Asynchronous Remote Medical Consultation for Ghana
10 pages
null
10.1145/1357054.1357173
null
cs.HC
null
Computer-mediated communication systems can be used to bridge the gap between doctors in underserved regions with local shortages of medical expertise and medical specialists worldwide. To this end, we describe the design of a prototype remote consultation system intended to provide the social, institutional and infrastructural context for sustained, self-organizing growth of a globally-distributed Ghanaian medical community. The design is grounded in an iterative design process that included two rounds of extended design fieldwork throughout Ghana and draws on three key design principles (social networks as a framework on which to build incentives within a self-organizing network; optional and incremental integration with existing referral mechanisms; and a weakly-connected, distributed architecture that allows for a highly interactive, responsive system despite failures in connectivity). We discuss initial experiences from an ongoing trial deployment in southern Ghana.
[ { "version": "v1", "created": "Sat, 12 Jan 2008 23:43:18 GMT" } ]
2016-09-05T00:00:00
[ [ "Luk", "Rowena", "" ], [ "Ho", "Melissa", "" ], [ "Aoki", "Paul M.", "" ] ]
new_dataset
0.999021
0905.0200
Paul M. Aoki
Paul M. Aoki, R.J. Honicky, Alan Mainwaring, Chris Myers, Eric Paulos, Sushmita Subramanian, Allison Woodruff
A Vehicle for Research: Using Street Sweepers to Explore the Landscape of Environmental Community Action
10 pages
Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems, Boston, MA, Apr. 2009, 375-384. ACM Press
10.1145/1518701.1518762
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Researchers are developing mobile sensing platforms to facilitate public awareness of environmental conditions. However, turning such awareness into practical community action and political change requires more than just collecting and presenting data. To inform research on mobile environmental sensing, we conducted design fieldwork with government, private, and public interest stakeholders. In parallel, we built an environmental air quality sensing system and deployed it on street sweeping vehicles in a major U.S. city; this served as a "research vehicle" by grounding our interviews and affording us status as environmental action researchers. In this paper, we present a qualitative analysis of the landscape of environmental action, focusing on insights that will help researchers frame meaningful technological interventions.
[ { "version": "v1", "created": "Sat, 2 May 2009 11:42:50 GMT" } ]
2016-09-05T00:00:00
[ [ "Aoki", "Paul M.", "" ], [ "Honicky", "R. J.", "" ], [ "Mainwaring", "Alan", "" ], [ "Myers", "Chris", "" ], [ "Paulos", "Eric", "" ], [ "Subramanian", "Sushmita", "" ], [ "Woodruff", "Allison", "" ] ]
new_dataset
0.998009
1603.03758
Dane Bell
Dane Bell and Gus Hahn-Powell and Marco A. Valenzuela-Esc\'arcega and Mihai Surdeanu
Sieve-based Coreference Resolution in the Biomedical Domain
This paper appears in LREC 2016
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe challenges and advantages unique to coreference resolution in the biomedical domain, and a sieve-based architecture that leverages domain knowledge for both entity and event coreference resolution. Domain-general coreference resolution algorithms perform poorly on biomedical documents, because the cues they rely on such as gender are largely absent in this domain, and because they do not encode domain-specific knowledge such as the number and type of participants required in chemical reactions. Moreover, it is difficult to directly encode this knowledge into most coreference resolution algorithms because they are not rule-based. Our rule-based architecture uses sequentially applied hand-designed "sieves", with the output of each sieve informing and constraining subsequent sieves. This architecture provides a 3.2% increase in throughput to our Reach event extraction system with precision parallel to that of the stricter system that relies solely on syntactic patterns for extraction.
[ { "version": "v1", "created": "Fri, 11 Mar 2016 20:48:49 GMT" }, { "version": "v2", "created": "Fri, 2 Sep 2016 18:32:35 GMT" } ]
2016-09-05T00:00:00
[ [ "Bell", "Dane", "" ], [ "Hahn-Powell", "Gus", "" ], [ "Valenzuela-Escárcega", "Marco A.", "" ], [ "Surdeanu", "Mihai", "" ] ]
new_dataset
0.998716
1608.05971
Mohsen Fayyaz
Mohsen Fayyaz, Mohammad Hajizadeh Saffar, Mohammad Sabokrou, Mahmood Fathy, Reinhard Klette, Fay Huang
STFCN: Spatio-Temporal FCN for Semantic Video Segmentation
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
This paper presents a novel method to involve both spatial and temporal features for semantic video segmentation. Current work on convolutional neural networks(CNNs) has shown that CNNs provide advanced spatial features supporting a very good performance of solutions for both image and video analysis, especially for the semantic segmentation task. We investigate how involving temporal features also has a good effect on segmenting video data. We propose a module based on a long short-term memory (LSTM) architecture of a recurrent neural network for interpreting the temporal characteristics of video frames over time. Our system takes as input frames of a video and produces a correspondingly-sized output; for segmenting the video our method combines the use of three components: First, the regional spatial features of frames are extracted using a CNN; then, using LSTM the temporal features are added; finally, by deconvolving the spatio-temporal features we produce pixel-wise predictions. Our key insight is to build spatio-temporal convolutional networks (spatio-temporal CNNs) that have an end-to-end architecture for semantic video segmentation. We adapted fully some known convolutional network architectures (such as FCN-AlexNet and FCN-VGG16), and dilated convolution into our spatio-temporal CNNs. Our spatio-temporal CNNs achieve state-of-the-art semantic segmentation, as demonstrated for the Camvid and NYUDv2 datasets.
[ { "version": "v1", "created": "Sun, 21 Aug 2016 17:34:08 GMT" }, { "version": "v2", "created": "Fri, 2 Sep 2016 15:51:49 GMT" } ]
2016-09-05T00:00:00
[ [ "Fayyaz", "Mohsen", "" ], [ "Saffar", "Mohammad Hajizadeh", "" ], [ "Sabokrou", "Mohammad", "" ], [ "Fathy", "Mahmood", "" ], [ "Klette", "Reinhard", "" ], [ "Huang", "Fay", "" ] ]
new_dataset
0.950226
1608.07662
Seok-Hee Hong
Seok-Hee Hong, Hiroshi Nagamochi
Re-embedding a 1-Plane Graph into a Straight-line Drawing in Linear Time
Appears in the Proceedings of the 24th International Symposium on Graph Drawing and Network Visualization (GD 2016). This is an extended abstract. For a full version of this paper, see Hong S-H, Nagamochi H.: Re-embedding a 1-Plane Graph into a Straight-line Drawing in Linear Time, Technical Report TR 2016-002, Department of Applied Mathematics and Physics, Kyoto University (2016)
null
null
Technical Report TR 2016-002, Department of Applied Mathematics and Physics, Kyoto University (2016)
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Thomassen characterized some 1-plane embedding as the forbidden configuration such that a given 1-plane embedding of a graph is drawable in straight-lines if and only if it does not contain the configuration [C. Thomassen, Rectilinear drawings of graphs, J. Graph Theory, 10(3), 335-341, 1988]. In this paper, we characterize some 1-plane embedding as the forbidden configuration such that a given 1-plane embedding of a graph can be re-embedded into a straight-line drawable 1-plane embedding of the same graph if and only if it does not contain the configuration. Re-embedding of a 1-plane embedding preserves the same set of pairs of crossing edges. We give a linear-time algorithm for finding a straight-line drawable 1-plane re-embedding or the forbidden configuration.
[ { "version": "v1", "created": "Sat, 27 Aug 2016 05:29:29 GMT" }, { "version": "v2", "created": "Fri, 2 Sep 2016 14:47:27 GMT" } ]
2016-09-05T00:00:00
[ [ "Hong", "Seok-Hee", "" ], [ "Nagamochi", "Hiroshi", "" ] ]
new_dataset
0.998089
1609.00653
Markus Fidler
Ralf L\"ubben, Markus Fidler
A Benchmark for the Performance of Time-varying Closed-loop Flow Control with Application to TCP
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Closed-loop flow control protocols, such as the prominent implementation TCP, are prevalent in the Internet, today. TCP has continuously been improved for greedy traffic sources to achieve high throughput over networks with large bandwidth delay products. Recently, the increasing use for streaming and interactive applications, such as voice and video, has shifted the focus towards its delay performance. Given the need for real-time communication of non-greedy sources via TCP, we present an estimation method for performance evaluation of closed-loop flow control protocols. We characterize an end-to-end connection by a transfer function that provides statistical service guarantees for arbitrary traffic. The estimation is based on end-to-end measurements at the application level that include all effects induced by the network and by the protocol stacks of the end systems. From our measurements, we identify different causes for delays. We show that significant delays are due to queueing in protocol stacks. Notably, this occurs even if the utilization is moderate. Using our estimation method, we compare the impact of fundamental mechanisms of TCP on delays at the application level: In detail, we analyze parameters relevant for network dimensioning, including buffer provisioning and active queue management, and parameters for server configuration, such as the congestion control algorithm. By applying our method as a benchmark, we find that a good selection can largely improve the delay performance of TCP.
[ { "version": "v1", "created": "Fri, 2 Sep 2016 16:20:22 GMT" } ]
2016-09-05T00:00:00
[ [ "Lübben", "Ralf", "" ], [ "Fidler", "Markus", "" ] ]
new_dataset
0.999124
0905.0203
Paul M. Aoki
Rowena Luk, Matei Zaharia, Melissa Ho, Brian Levine, Paul M. Aoki
ICTD for Healthcare in Ghana: Two Parallel Case Studies
11 pages
Proc. IEEE/ACM Conf. on Information and Communication Technologies and Development, Doha, Qatar, Apr. 2009, 118-128. IEEE CS Press
10.1109/ICTD.2009.5426714
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper examines two parallel case studies to promote remote medical consultation in Ghana. These projects, initiated independently by different researchers in different organizations, both deployed ICT solutions in the same medical community in the same year. The Ghana Consultation Network currently has over 125 users running a Web-based application over a delay-tolerant network of servers. OneTouch MedicareLine is currently providing 1700 doctors in Ghana with free mobile phone calls and text messages to other members of the medical community. We present the consequences of (1) the institutional context and identity of the investigators, as well as specific decisions made with respect to (2) partnerships formed, (3) perceptions of technological infrastructure, and (4) high-level design decisions. In concluding, we discuss lessons learned and high-level implications for future ICTD research agendas.
[ { "version": "v1", "created": "Sat, 2 May 2009 11:54:52 GMT" } ]
2016-09-02T00:00:00
[ [ "Luk", "Rowena", "" ], [ "Zaharia", "Matei", "" ], [ "Ho", "Melissa", "" ], [ "Levine", "Brian", "" ], [ "Aoki", "Paul M.", "" ] ]
new_dataset
0.995854
1607.01196
Fabian Lipp
Steven Chaplick, Krzysztof Fleszar, Fabian Lipp, Alexander Ravsky, Oleg Verbitsky, Alexander Wolff
Drawing Graphs on Few Lines and Few Planes
Appears in the Proceedings of the 24th International Symposium on Graph Drawing and Network Visualization (GD 2016)
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the problem of drawing graphs in 2D and 3D such that their edges (or only their vertices) can be covered by few lines or planes. We insist on straight-line edges and crossing-free drawings. This problem has many connections to other challenging graph-drawing problems such as small-area or small-volume drawings, layered or track drawings, and drawing graphs with low visual complexity. While some facts about our problem are implicit in previous work, this is the first treatment of the problem in its full generality. Our contribution is as follows. We show lower and upper bounds for the numbers of lines and planes needed for covering drawings of graphs in certain graph classes. In some cases our bounds are asymptotically tight; in some cases we are able to determine exact values. We relate our parameters to standard combinatorial characteristics of graphs (such as the chromatic number, treewidth, maximum degree, or arboricity) and to parameters that have been studied in graph drawing (such as the track number or the number of segments appearing in a drawing). We pay special attention to planar graphs. For example, we show that there are planar graphs that can be drawn in 3-space on a lot fewer lines than in the plane.
[ { "version": "v1", "created": "Tue, 5 Jul 2016 11:23:46 GMT" }, { "version": "v2", "created": "Thu, 1 Sep 2016 17:32:39 GMT" } ]
2016-09-02T00:00:00
[ [ "Chaplick", "Steven", "" ], [ "Fleszar", "Krzysztof", "" ], [ "Lipp", "Fabian", "" ], [ "Ravsky", "Alexander", "" ], [ "Verbitsky", "Oleg", "" ], [ "Wolff", "Alexander", "" ] ]
new_dataset
0.972402
1607.06275
Peng Li
Peng Li, Wei Li, Zhengyan He, Xuguang Wang, Ying Cao, Jie Zhou, Wei Xu
Dataset and Neural Recurrent Sequence Labeling Model for Open-Domain Factoid Question Answering
10 pages, 3 figures, withdraw experimental results on CNN/Daily Mail datasets
null
null
null
cs.CL cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While question answering (QA) with neural network, i.e. neural QA, has achieved promising results in recent years, lacking of large scale real-word QA dataset is still a challenge for developing and evaluating neural QA system. To alleviate this problem, we propose a large scale human annotated real-world QA dataset WebQA with more than 42k questions and 556k evidences. As existing neural QA methods resolve QA either as sequence generation or classification/ranking problem, they face challenges of expensive softmax computation, unseen answers handling or separate candidate answer generation component. In this work, we cast neural QA as a sequence labeling problem and propose an end-to-end sequence labeling model, which overcomes all the above challenges. Experimental results on WebQA show that our model outperforms the baselines significantly with an F1 score of 74.69% with word-based input, and the performance drops only 3.72 F1 points with more challenging character-based input.
[ { "version": "v1", "created": "Thu, 21 Jul 2016 11:40:50 GMT" }, { "version": "v2", "created": "Thu, 1 Sep 2016 10:56:45 GMT" } ]
2016-09-02T00:00:00
[ [ "Li", "Peng", "" ], [ "Li", "Wei", "" ], [ "He", "Zhengyan", "" ], [ "Wang", "Xuguang", "" ], [ "Cao", "Ying", "" ], [ "Zhou", "Jie", "" ], [ "Xu", "Wei", "" ] ]
new_dataset
0.998786
1608.00936
Saad Nadeem
Saad Nadeem and Arie Kaufman
Multimodal Brain Visualization
SPIE Medical Imaging 2016, Proc. SPIE Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging, 2016
SPIE Medical Imaging, pp. 97881Y-97881Y. 2016
10.1117/12.2217003
null
cs.GR q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current connectivity diagrams of human brain image data are either overly complex or overly simplistic. In this work we introduce simple yet accurate interactive visual representations of multiple brain image structures and the connectivity among them. We map cortical surfaces extracted from human brain magnetic resonance imaging (MRI) data onto 2D surfaces that preserve shape (angle), extent (area), and spatial (neighborhood) information for 2D (circular disk) and 3D (spherical) mapping, split these surfaces into separate patches, and cluster functional and diffusion tractography MRI connections between pairs of these patches. The resulting visualizations are easier to compute on and more visually intuitive to interact with than the original data, and facilitate simultaneous exploration of multiple data sets, modalities, and statistical maps.
[ { "version": "v1", "created": "Tue, 2 Aug 2016 19:02:40 GMT" }, { "version": "v2", "created": "Sat, 6 Aug 2016 17:01:31 GMT" }, { "version": "v3", "created": "Tue, 9 Aug 2016 19:55:31 GMT" }, { "version": "v4", "created": "Thu, 1 Sep 2016 14:51:28 GMT" } ]
2016-09-02T00:00:00
[ [ "Nadeem", "Saad", "" ], [ "Kaufman", "Arie", "" ] ]
new_dataset
0.959756
1609.00070
Arun Tejasvi Chaganty
Arun Tejasvi Chaganty and Percy Liang
How Much is 131 Million Dollars? Putting Numbers in Perspective with Compositional Descriptions
null
ACL (2016), 578-587
10.18653/v1/P16-1055
null
cs.CL
http://creativecommons.org/licenses/by-sa/4.0/
How much is 131 million US dollars? To help readers put such numbers in context, we propose a new task of automatically generating short descriptions known as perspectives, e.g. "$131 million is about the cost to employ everyone in Texas over a lunch period". First, we collect a dataset of numeric mentions in news articles, where each mention is labeled with a set of rated perspectives. We then propose a system to generate these descriptions consisting of two steps: formula construction and description generation. In construction, we compose formulae from numeric facts in a knowledge base and rank the resulting formulas based on familiarity, numeric proximity and semantic compatibility. In generation, we convert a formula into natural language using a sequence-to-sequence recurrent neural network. Our system obtains a 15.2% F1 improvement over a non-compositional baseline at formula construction and a 12.5 BLEU point improvement over a baseline description generation.
[ { "version": "v1", "created": "Thu, 1 Sep 2016 00:20:41 GMT" } ]
2016-09-02T00:00:00
[ [ "Chaganty", "Arun Tejasvi", "" ], [ "Liang", "Percy", "" ] ]
new_dataset
0.993243
1609.00081
Tanmoy Chakraborty
Tanmoy Chakraborty and Ramasuri Narayanam
All Fingers are not Equal: Intensity of References in Scientific Articles
11 pages, 4 figures, 4 tables, Conference on Empirical Methods in Natural Language Processing (EMNLP 2016)
null
null
null
cs.CL cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research accomplishment is usually measured by considering all citations with equal importance, thus ignoring the wide variety of purposes an article is being cited for. Here, we posit that measuring the intensity of a reference is crucial not only to perceive better understanding of research endeavor, but also to improve the quality of citation-based applications. To this end, we collect a rich annotated dataset with references labeled by the intensity, and propose a novel graph-based semi-supervised model, GraLap to label the intensity of references. Experiments with AAN datasets show a significant improvement compared to the baselines to achieve the true labels of the references (46% better correlation). Finally, we provide four applications to demonstrate how the knowledge of reference intensity leads to design better real-world applications.
[ { "version": "v1", "created": "Thu, 1 Sep 2016 01:34:56 GMT" } ]
2016-09-02T00:00:00
[ [ "Chakraborty", "Tanmoy", "" ], [ "Narayanam", "Ramasuri", "" ] ]
new_dataset
0.999144
1609.00126
Radhika Sukapuram
Radhika Sukapuram and Gautam Barua
PPCU: Proportional Per-packet Consistent Updates for Software Defined Networks - A Technical Report
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Software Defined Networks, where the network control plane can be programmed by updating switch rules, consistently updating switches is a challenging problem. In a per-packet consistent update (PPC), a packet either matches the new rules added or the old rules to be deleted, throughout the network, but not a combination of both. PPC must be preserved during an update to prevent packet drops and loops, provide waypoint invariance and to apply policies consistently. No algorithm exists today that confines changes required during an update to only the affected switches, yet preserves PPC and does not restrict applicable scenarios. We propose a general update algorithm called PPCU that preserves PPC, is concurrent and provides an all-or-nothing semantics for an update, irrespective of the execution speeds of switches and links, while confining changes to only the affected switches and affected rules. We use data plane time stamps to identify when the switches must move from the old rules to the new rules. For this, we use the powerful programming features provided to the data plane by the emerging programmable switches, which also guarantee line rate. We prove the algorithm, identify its significant parameters and analyze the parameters with respect to other algorithms in the literature.
[ { "version": "v1", "created": "Thu, 1 Sep 2016 07:01:36 GMT" } ]
2016-09-02T00:00:00
[ [ "Sukapuram", "Radhika", "" ], [ "Barua", "Gautam", "" ] ]
new_dataset
0.991036
1609.00133
Yuval Elovici
Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Yuval Elovici
dr0wned - Cyber-Physical Attack with Additive Manufacturing
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Additive manufacturing (AM), or 3D printing, is an emerging manufacturing technology that is expected to have far-reaching socioeconomic, environmental, and geopolitical implications. As use of this technology increases, it will become more common to produce functional parts, including components for safety-critical systems. AM's dependence on computerization raises the concern that the manufactured part's quality can be compromised by sabotage. This paper demonstrates the validity of this concern, as we present the very first full chain of attack involving AM, beginning with a cyber attack aimed at compromising a benign AM component, continuing with malicious modification of a manufactured object's blueprint, leading to the sabotage of the manufactured functional part, and resulting in the physical destruction of a cyber-physical system that employs this part. The contributions of this paper are as follows. We propose a systematic approach to identify opportunities for an attack involving AM that enables an adversary to achieve his/her goals. Then we propose a methodology to assess the level of difficulty of an attack, thus enabling differentiation between possible attack chains. Finally, to demonstrate the experimental proof for the entire attack chain, we sabotage the 3D printed propeller of a quadcopter UAV, causing the quadcopter to literally fall from the sky.
[ { "version": "v1", "created": "Thu, 1 Sep 2016 07:36:09 GMT" } ]
2016-09-02T00:00:00
[ [ "Belikovetsky", "Sofia", "" ], [ "Yampolskiy", "Mark", "" ], [ "Toh", "Jinghui", "" ], [ "Elovici", "Yuval", "" ] ]
new_dataset
0.999156
1606.03890
Fabrizio Frati
Giordano Da Lozzo, Vida Dujmovic, Fabrizio Frati, Tamara Mchedlidze, Vincenzo Roselli
Drawing Planar Graphs with Many Collinear Vertices
Appears in the Proceedings of the 24th International Symposium on Graph Drawing and Network Visualization (GD 2016)
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider the following problem: Given a planar graph $G$, what is the maximum number $p$ such that $G$ has a planar straight-line drawing with $p$ collinear vertices? This problem resides at the core of several graph drawing problems, including universal point subsets, untangling, and column planarity. The following results are known for it: Every $n$-vertex planar graph has a planar straight-line drawing with $\Omega(\sqrt{n})$ collinear vertices; for every $n$, there is an $n$-vertex planar graph whose every planar straight-line drawing has $O(n^\sigma)$ collinear vertices, where $\sigma<0.986$; every $n$-vertex planar graph of treewidth at most two has a planar straight-line drawing with $\Theta(n)$ collinear vertices. We extend the linear bound to planar graphs of treewidth at most three and to triconnected cubic planar graphs. This (partially) answers two open problems posed by Ravsky and Verbitsky [WG 2011:295--306]. Similar results are not possible for all bounded treewidth planar graphs or for all bounded degree planar graphs. For planar graphs of treewidth at most three, our results also imply asymptotically tight bounds for all of the other above mentioned graph drawing problems.
[ { "version": "v1", "created": "Mon, 13 Jun 2016 10:46:24 GMT" }, { "version": "v2", "created": "Tue, 14 Jun 2016 11:19:02 GMT" }, { "version": "v3", "created": "Tue, 30 Aug 2016 14:03:38 GMT" }, { "version": "v4", "created": "Wed, 31 Aug 2016 14:02:59 GMT" } ]
2016-09-01T00:00:00
[ [ "Da Lozzo", "Giordano", "" ], [ "Dujmovic", "Vida", "" ], [ "Frati", "Fabrizio", "" ], [ "Mchedlidze", "Tamara", "" ], [ "Roselli", "Vincenzo", "" ] ]
new_dataset
0.98249
1608.08381
Adam Woryna
Adam Woryna
On the set of uniquely decodable codes with a given sequence of code word lengths
null
Discrete Mathematics 340 (2017), pp. 51-57
10.1016/j.disc.2016.08.013
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For every natural number $n\geq 2$ and every finite sequence $L$ of natural numbers, we consider the set $UD_n(L)$ of all uniquely decodable codes over an $n$-letter alphabet with the sequence $L$ as the sequence of code word lengths, as well as its subsets $PR_n(L)$ and $FD_n(L)$ consisting of, respectively, the prefix codes and the codes with finite delay. We derive the estimation for the quotient $|UD_n(L)|/|PR_n(L)|$, which allows to characterize those sequences $L$ for which the equality $PR_n(L)=UD_n(L)$ holds. We also characterize those sequences $L$ for which the equality $FD_n(L)=UD_n(L)$ holds.
[ { "version": "v1", "created": "Tue, 30 Aug 2016 09:29:08 GMT" } ]
2016-09-01T00:00:00
[ [ "Woryna", "Adam", "" ] ]
new_dataset
0.999062
1608.08662
Marcus Schaefer
Radoslav Fulek, Michael Pelsmajer, Marcus Schaefer
Hanani-Tutte for Radial Planarity II
Appears in the Proceedings of the 24th International Symposium on Graph Drawing and Network Visualization (GD 2016)
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A drawing of a graph $G$ is radial if the vertices of $G$ are placed on concentric circles $C_1, \ldots, C_k$ with common center $c$, and edges are drawn radially: every edge intersects every circle centered at $c$ at most once. $G$ is radial planar if it has a radial embedding, that is, a crossing-free radial drawing. If the vertices of $G$ are ordered or partitioned into ordered levels (as they are for leveled graphs), we require that the assignment of vertices to circles corresponds to the given ordering or leveling. A pair of edges $e$ and $f$ in a graph is independent if $e$ and $f$ do not share a vertex. We show that a graph $G$ is radial planar if $G$ has a radial drawing in which every two independent edges cross an even number of times; the radial embedding has the same leveling as the radial drawing. In other words, we establish the strong Hanani-Tutte theorem for radial planarity. This characterization yields a very simple algorithm for radial planarity testing.
[ { "version": "v1", "created": "Tue, 30 Aug 2016 21:41:16 GMT" } ]
2016-09-01T00:00:00
[ [ "Fulek", "Radoslav", "" ], [ "Pelsmajer", "Michael", "" ], [ "Schaefer", "Marcus", "" ] ]
new_dataset
0.998226
1608.08740
Nachum Dershowitz
Nachum Dershowitz
1700 Forests
For OEIS entry
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since ordered trees and Dyck paths are equinumerous, so are ordered forests and grand-Dyck paths that start with an upwards step.
[ { "version": "v1", "created": "Wed, 31 Aug 2016 06:34:20 GMT" } ]
2016-09-01T00:00:00
[ [ "Dershowitz", "Nachum", "" ] ]
new_dataset
0.995624
1608.08970
Md. Jawaherul Alam
Md. Jawaherul Alam, Michael T. Goodrich, and Timothy Johnson
J-Viz: Sibling-First Recursive Graph Drawing for Visualizing Java Bytecode
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a graph visualization tool for visualizing Java bytecode. Our tool, which we call J-Viz, visualizes connected directed graphs according to a canonical node ordering, which we call the sibling-first recursive (SFR) numbering. The particular graphs we consider are derived from applying Shiver's k-CFA framework to Java bytecode, and our visualizer includes helpful links between the nodes of an input graph and the Java bytecode that produced it, as well as a decompiled version of that Java bytecode. We show through several case studies that the canonical drawing paradigm used in J-Viz is effective for identifying potential security vulnerabilities and repeated use of the same code in Java applications.
[ { "version": "v1", "created": "Wed, 31 Aug 2016 18:03:18 GMT" } ]
2016-09-01T00:00:00
[ [ "Alam", "Md. Jawaherul", "" ], [ "Goodrich", "Michael T.", "" ], [ "Johnson", "Timothy", "" ] ]
new_dataset
0.975749
1608.08251
Igor Polk
Igor Polkovnikov
Construction of Convex Sets on Quadrilateral Ordered Tiles or Graphs with Propagation Neighborhood Operations. Dales, Concavity Structures. Application to Gray Image Analysis of Human-Readable Shapes
58 pages, more than 50 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An effort has been made to show mathematicians some new ideas applied to image analysis. Gray images are presented as tilings. Based on topological properties of the tiling, a number of gray convex hulls: maximal, minimal, and oriented ones are constructed and some are proved. They are constructed with only one operation. Two tilings are used in the Constraint and Allowance types of operations. New type of concavity described: a dale. All operations are parallel, possible to realize clock-less. Convexities define what is the background. They are treated as separate gray objects. There are multiple relations among them and their descendants. Via that, topological size of concavities is proposed. Constructed with the same type of operations, Rays and Angles in a tiling define possible spatial relations. Notions like "strokes" are defined through concavities. Unusual effects on levelized gray objects are shown. It is illustrated how alphabet and complex hieroglyphs can be described through concavities and their relations. A hypothesis of living organisms image analysis is proposed. A number of examples with symbols and a human face are calculated with new Asynchwave C++ software library.
[ { "version": "v1", "created": "Mon, 29 Aug 2016 21:12:49 GMT" } ]
2016-08-31T00:00:00
[ [ "Polkovnikov", "Igor", "" ] ]
new_dataset
0.959675
1608.08339
Taehwan Kim
Taehwan Kim
American Sign Language fingerspelling recognition from video: Methods for unrestricted recognition and signer-independence
PhD Thesis
null
null
null
cs.CL cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this thesis, we study the problem of recognizing video sequences of fingerspelled letters in American Sign Language (ASL). Fingerspelling comprises a significant but relatively understudied part of ASL, and recognizing it is challenging for a number of reasons: It involves quick, small motions that are often highly coarticulated; it exhibits significant variation between signers; and there has been a dearth of continuous fingerspelling data collected. In this work, we propose several types of recognition approaches, and explore the signer variation problem. Our best-performing models are segmental (semi-Markov) conditional random fields using deep neural network-based features. In the signer-dependent setting, our recognizers achieve up to about 8% letter error rates. The signer-independent setting is much more challenging, but with neural network adaptation we achieve up to 17% letter error rates.
[ { "version": "v1", "created": "Tue, 30 Aug 2016 06:12:22 GMT" } ]
2016-08-31T00:00:00
[ [ "Kim", "Taehwan", "" ] ]
new_dataset
0.99912
1608.08397
Yuval Elovici
Mordechai Guri, Matan Monitz, Yuval Elovici
USBee: Air-Gap Covert-Channel via Electromagnetic Emission from USB
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years researchers have demonstrated how attackers could use USB connectors implanted with RF transmitters to exfiltrate data from secure, and even air-gapped, computers (e.g., COTTONMOUTH in the leaked NSA ANT catalog). Such methods require a hardware modification of the USB plug or device, in which a dedicated RF transmitter is embedded. In this paper we present USBee, a software that can utilize an unmodified USB device connected to a computer as a RF transmitter. We demonstrate how a software can intentionally generate controlled electromagnetic emissions from the data bus of a USB connector. We also show that the emitted RF signals can be controlled and modulated with arbitrary binary data. We implement a prototype of USBee, and discuss its design and implementation details including signal generation and modulation. We evaluate the transmitter by building a receiver and demodulator using GNU Radio. Our evaluation shows that USBee can be used for transmitting binary data to a nearby receiver at a bandwidth of 20 to 80 BPS (bytes per second).
[ { "version": "v1", "created": "Tue, 30 Aug 2016 10:38:54 GMT" } ]
2016-08-31T00:00:00
[ [ "Guri", "Mordechai", "" ], [ "Monitz", "Matan", "" ], [ "Elovici", "Yuval", "" ] ]
new_dataset
0.985833
1608.08418
Fabrizio Montecchiani
Walter Didimo, Giuseppe Liotta, Saeed Mehrabi, Fabrizio Montecchiani
1-Bend RAC Drawings of 1-Planar Graphs
Appears in the Proceedings of the 24th International Symposium on Graph Drawing and Network Visualization (GD 2016)
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph is 1-planar if it has a drawing where each edge is crossed at most once. A drawing is RAC (Right Angle Crossing) if the edges cross only at right angles. The relationships between 1-planar graphs and RAC drawings have been partially studied in the literature. It is known that there are both 1-planar graphs that are not straight-line RAC drawable and graphs that have a straight-line RAC drawing but that are not 1-planar. Also, straight-line RAC drawings always exist for IC-planar graphs, a subclass of 1-planar graphs. One of the main questions still open is whether every 1-planar graph has a RAC drawing with at most one bend per edge. We positively answer this question.
[ { "version": "v1", "created": "Tue, 30 Aug 2016 12:28:28 GMT" } ]
2016-08-31T00:00:00
[ [ "Didimo", "Walter", "" ], [ "Liotta", "Giuseppe", "" ], [ "Mehrabi", "Saeed", "" ], [ "Montecchiani", "Fabrizio", "" ] ]
new_dataset
0.999821
1608.08425
Fabrizio Montecchiani
Emilio Di Giacomo, Giuseppe Liotta, Fabrizio Montecchiani
1-bend Upward Planar Drawings of SP-digraphs
Appears in the Proceedings of the 24th International Symposium on Graph Drawing and Network Visualization (GD 2016)
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is proved that every series-parallel digraph whose maximum vertex-degree is $\Delta$ admits an upward planar drawing with at most one bend per edge such that each edge segment has one of $\Delta$ distinct slopes. This is shown to be worst-case optimal in terms of the number of slopes. Furthermore, our construction gives rise to drawings with optimal angular resolution $\frac{\pi}{\Delta}$. A variant of the proof technique is used to show that (non-directed) reduced series-parallel graphs and flat series-parallel graphs have a (non-upward) one-bend planar drawing with $\lceil\frac{\Delta}{2}\rceil$ distinct slopes if biconnected, and with $\lceil\frac{\Delta}{2}\rceil+1$ distinct slopes if connected.
[ { "version": "v1", "created": "Tue, 30 Aug 2016 12:40:40 GMT" } ]
2016-08-31T00:00:00
[ [ "Di Giacomo", "Emilio", "" ], [ "Liotta", "Giuseppe", "" ], [ "Montecchiani", "Fabrizio", "" ] ]
new_dataset
0.952985
cs/0105018
David M. Kristol
David M. Kristol
HTTP Cookies: Standards, Privacy, and Politics
null
ACM Transactions on Internet Technology, Vol. 1, #2, November 2001
null
null
cs.SE cs.CY
null
How did we get from a world where cookies were something you ate and where "non-techies" were unaware of "Netscape cookies" to a world where cookies are a hot-button privacy issue for many computer users? This paper will describe how HTTP "cookies" work, and how Netscape's original specification evolved into an IETF Proposed Standard. I will also offer a personal perspective on how what began as a straightforward technical specification turned into a political flashpoint when it tried to address non-technical issues such as privacy.
[ { "version": "v1", "created": "Wed, 9 May 2001 16:12:44 GMT" } ]
2016-08-31T00:00:00
[ [ "Kristol", "David M.", "" ] ]
new_dataset
0.975811
cs/0304046
Laura Semini
Carlo Montangero and Laura Semini (Dipartimento di Informatica, Universita' di Pisa, Italy)
Distributed States Temporal Logic
25 pages, uses xypic
null
null
null
cs.LO
null
We introduce a temporal logic to reason on global applications in an asynchronous setting. First, we define the Distributed States Logic (DSL), a modal logic for localities that embeds the local theories of each component into a theory of the distributed states of the system. We provide the logic with a sound and complete axiomatization. The contribution is that it is possible to reason about properties that involve several components, even in the absence of a global clock. Then, we define the Distributed States Temporal Logic (DSTL) by introducing temporal operators a' la Unity. We support our proposal by working out a pair of examples: a simple secure communication system, and an algorithm for distributed leader election. The motivation for this work is that the existing logics for distributed systems do not have the right expressive power to reason on the systems behaviour, when the communication is based on asynchronous message passing. On the other side, asynchronous communication is the most used abstraction when modelling global applications.
[ { "version": "v1", "created": "Wed, 30 Apr 2003 18:54:59 GMT" } ]
2016-08-31T00:00:00
[ [ "Montangero", "Carlo", "", "Dipartimento di Informatica,\n Universita' di Pisa, Italy" ], [ "Semini", "Laura", "", "Dipartimento di Informatica,\n Universita' di Pisa, Italy" ] ]
new_dataset
0.999339
cs/0306096
Iosif Legrand
H.B. Newman, I.C.Legrand, P. Galvez, R. Voicu, C. Cirstoiu
MonALISA : A Distributed Monitoring Service Architecture
Talk from the 2003 Computing in High Energy and Nuclear Physics (CHEP03), La Jolla, Ca, USA, March 2003, 8 pages, pdf. PSN MOET001
null
null
null
cs.DC
null
The MonALISA (Monitoring Agents in A Large Integrated Services Architecture) system provides a distributed monitoring service. MonALISA is based on a scalable Dynamic Distributed Services Architecture which is designed to meet the needs of physics collaborations for monitoring global Grid systems, and is implemented using JINI/JAVA and WSDL/SOAP technologies. The scalability of the system derives from the use of multithreaded Station Servers to host a variety of loosely coupled self-describing dynamic services, the ability of each service to register itself and then to be discovered and used by any other services, or clients that require such information, and the ability of all services and clients subscribing to a set of events (state changes) in the system to be notified automatically. The framework integrates several existing monitoring tools and procedures to collect parameters describing computational nodes, applications and network performance. It has built-in SNMP support and network-performance monitoring algorithms that enable it to monitor end-to-end network performance as well as the performance and state of site facilities in a Grid. MonALISA is currently running around the clock on the US CMS test Grid as well as an increasing number of other sites. It is also being used to monitor the performance and optimize the interconnections among the reflectors in the VRVS system.
[ { "version": "v1", "created": "Mon, 16 Jun 2003 08:33:44 GMT" } ]
2016-08-31T00:00:00
[ [ "Newman", "H. B.", "" ], [ "Legrand", "I. C.", "" ], [ "Galvez", "P.", "" ], [ "Voicu", "R.", "" ], [ "Cirstoiu", "C.", "" ] ]
new_dataset
0.997957
cs/0307059
Scott Guthery Dr.
Scott B. Guthery
Group Authentication Using The Naccache-Stern Public-Key Cryptosystem
7 pages, no figures
null
null
null
cs.CR
null
A group authentication protocol authenticates pre-defined groups of individuals such that: - No individual is identified - No knowledge of which groups can be successfully authenticated is known to the verifier - No sensitive data is exposed The paper presents a group authentication protocol based on splitting the private keys of the Naccache-Stern public-key cryptosystem in such a way that the Boolean expression defining the authenticable groups is implicit in the split.
[ { "version": "v1", "created": "Sat, 26 Jul 2003 13:51:13 GMT" } ]
2016-08-31T00:00:00
[ [ "Guthery", "Scott B.", "" ] ]
new_dataset
0.991471
cs/0409047
Amar Isli
Amar Isli
An ALC(D)-based combination of temporal constraints and spatial constraints suitable for continuous (spatial) change
in Proceedings of the ECAI Workshop on Spatial and Temporal Reasoning, pp. 129-133, Valencia, Spain, 2004
null
null
null
cs.AI cs.LO
null
We present a family of spatio-temporal theories suitable for continuous spatial change in general, and for continuous motion of spatial scenes in particular. The family is obtained by spatio-temporalising the well-known ALC(D) family of Description Logics (DLs) with a concrete domain D, as follows, where TCSPs denotes "Temporal Constraint Satisfaction Problems", a well-known constraint-based framework: (1) temporalisation of the roles, so that they consist of TCSP constraints (specifically, of an adaptation of TCSP constraints to interval variables); and (2) spatialisation of the concrete domain D: the concrete domain is now $D_x$, and is generated by a spatial Relation Algebra (RA) $x$, in the style of the Region-Connection Calculus RCC8. We assume durative truth (i.e., holding during a durative interval). We also assume the homogeneity property (if a truth holds during a given interval, it holds during all of its subintervals). Among other things, these assumptions raise the "conflicting" problem of overlapping truths, which the work solves with the use of a specific partition of the 13 atomic relations of Allen's interval algebra.
[ { "version": "v1", "created": "Fri, 24 Sep 2004 15:22:52 GMT" } ]
2016-08-31T00:00:00
[ [ "Isli", "Amar", "" ] ]
new_dataset
0.975645
cs/0503052
Xiaoyang Gu
David Doty, Xiaoyang Gu, Jack H. Lutz, Elvira Mayordomo, Philippe Moser
Zeta-Dimension
21 pages
null
null
null
cs.CC cs.IT math.IT
null
The zeta-dimension of a set A of positive integers is the infimum s such that the sum of the reciprocals of the s-th powers of the elements of A is finite. Zeta-dimension serves as a fractal dimension on the positive integers that extends naturally usefully to discrete lattices such as the set of all integer lattice points in d-dimensional space. This paper reviews the origins of zeta-dimension (which date to the eighteenth and nineteenth centuries) and develops its basic theory, with particular attention to its relationship with algorithmic information theory. New results presented include extended connections between zeta-dimension and classical fractal dimensions, a gale characterization of zeta-dimension, and a theorem on the zeta-dimensions of pointwise sums and products of sets of positive integers.
[ { "version": "v1", "created": "Tue, 22 Mar 2005 05:58:43 GMT" } ]
2016-08-31T00:00:00
[ [ "Doty", "David", "" ], [ "Gu", "Xiaoyang", "" ], [ "Lutz", "Jack H.", "" ], [ "Mayordomo", "Elvira", "" ], [ "Moser", "Philippe", "" ] ]
new_dataset
0.998834
cs/0505033
Agathe Merceron
Ahmed Bouajjani, Agathe Merceron
Parametric Verification of a Group Membership Algorithm
34 pages. To appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.LO
null
We address the problem of verifying clique avoidance in the TTP protocol. TTP allows several stations embedded in a car to communicate. It has many mechanisms to ensure robustness to faults. In particular, it has an algorithm that allows a station to recognize itself as faulty and leave the communication. This algorithm must satisfy the crucial 'non-clique' property: it is impossible to have two or more disjoint groups of stations communicating exclusively with stations in their own group. In this paper, we propose an automatic verification method for an arbitrary number of stations $N$ and a given number of faults $k$. We give an abstraction that allows to model the algorithm by means of unbounded (parametric) counter automata. We have checked the non-clique property on this model in the case of one fault, using the ALV tool as well as the LASH tool.
[ { "version": "v1", "created": "Thu, 12 May 2005 07:52:36 GMT" } ]
2016-08-31T00:00:00
[ [ "Bouajjani", "Ahmed", "" ], [ "Merceron", "Agathe", "" ] ]
new_dataset
0.973619
cs/0505058
Patrick C. McGuire
Patrick C. McGuire, Enrique Diaz-Martinez, Jens Ormo, Javier Gomez-Elvira, Jose A. Rodriguez-Manfredi, Eduardo Sebastian-Martinez, Helge Ritter, Robert Haschke, Markus Oesker, Joerg Ontrup
The Cyborg Astrobiologist: Scouting Red Beds for Uncommon Features with Geological Significance
to appear in Int'l J. Astrobiology, vol.4, iss.2 (June 2005); 19 pages, 7 figs
Int.J.Astrobiol.4:101-113,2005
10.1017/S1473550405002533
null
cs.CV astro-ph cs.AI cs.CE cs.HC cs.RO cs.SE physics.ins-det q-bio.NC
null
The `Cyborg Astrobiologist' (CA) has undergone a second geological field trial, at a red sandstone site in northern Guadalajara, Spain, near Riba de Santiuste. The Cyborg Astrobiologist is a wearable computer and video camera system that has demonstrated a capability to find uncommon interest points in geological imagery in real-time in the field. The first (of three) geological structures that we studied was an outcrop of nearly homogeneous sandstone, which exhibits oxidized-iron impurities in red and and an absence of these iron impurities in white. The white areas in these ``red beds'' have turned white because the iron has been removed by chemical reduction, perhaps by a biological agent. The computer vision system found in one instance several (iron-free) white spots to be uncommon and therefore interesting, as well as several small and dark nodules. The second geological structure contained white, textured mineral deposits on the surface of the sandstone, which were found by the CA to be interesting. The third geological structure was a 50 cm thick paleosol layer, with fossilized root structures of some plants, which were found by the CA to be interesting. A quasi-blind comparison of the Cyborg Astrobiologist's interest points for these images with the interest points determined afterwards by a human geologist shows that the Cyborg Astrobiologist concurred with the human geologist 68% of the time (true positive rate), with a 32% false positive rate and a 32% false negative rate. (abstract has been abridged).
[ { "version": "v1", "created": "Mon, 23 May 2005 09:55:37 GMT" } ]
2016-08-31T00:00:00
[ [ "McGuire", "Patrick C.", "" ], [ "Diaz-Martinez", "Enrique", "" ], [ "Ormo", "Jens", "" ], [ "Gomez-Elvira", "Javier", "" ], [ "Rodriguez-Manfredi", "Jose A.", "" ], [ "Sebastian-Martinez", "Eduardo", "" ], [ "Ritter", "Helge", "" ], [ "Haschke", "Robert", "" ], [ "Oesker", "Markus", "" ], [ "Ontrup", "Joerg", "" ] ]
new_dataset
0.998932
cs/0506089
Patrick C. McGuire
Patrick C. McGuire, Javier Gomez-Elvira, Jose Antonio Rodriguez-Manfredi, Eduardo Sebastian-Martinez, Jens Ormo, Enrique Diaz-Martinez, Markus Oesker, Robert Haschke, Joerg Ontrup, Helge Ritter
Field geology with a wearable computer: 1st results of the Cyborg Astrobiologist System
accepted by ICINCO 2005, 2nd International Conference on Informatics in Control, Automation and Robotics, 14-17 September 2005, Barcelona, Spain. 9 pages, 7 figures
"Proceedings of the <a href="http://www.icinco.org">ICINCO</a>'2005 (International Conference on Informatics in Control, Automation and Robotics)", September 14-17, Barcelona, Spain, vol. 3, pp. 283-291 (2005).
null
null
cs.CV astro-ph cs.AI cs.CE cs.HC cs.RO
null
We present results from the first geological field tests of the `Cyborg Astrobiologist', which is a wearable computer and video camcorder system that we are using to test and train a computer-vision system towards having some of the autonomous decision-making capabilities of a field-geologist. The Cyborg Astrobiologist platform has thus far been used for testing and development of these algorithms and systems: robotic acquisition of quasi-mosaics of images, real-time image segmentation, and real-time determination of interesting points in the image mosaics. This work is more of a test of the whole system, rather than of any one part of the system. However, beyond the concept of the system itself, the uncommon map (despite its simplicity) is the main innovative part of the system. The uncommon map helps to determine interest-points in a context-free manner. Overall, the hardware and software systems function reliably, and the computer-vision algorithms are adequate for the first field tests. In addition to the proof-of-concept aspect of these field tests, the main result of these field tests is the enumeration of those issues that we can improve in the future, including: dealing with structural shadow and microtexture, and also, controlling the camera's zoom lens in an intelligent manner. Nonetheless, despite these and other technical inadequacies, this Cyborg Astrobiologist system, consisting of a camera-equipped wearable-computer and its computer-vision algorithms, has demonstrated its ability of finding genuinely interesting points in real-time in the geological scenery, and then gathering more information about these interest points in an automated manner. We use these capabilities for autonomous guidance towards geological points-of-interest.
[ { "version": "v1", "created": "Fri, 24 Jun 2005 10:25:22 GMT" } ]
2016-08-31T00:00:00
[ [ "McGuire", "Patrick C.", "" ], [ "Gomez-Elvira", "Javier", "" ], [ "Rodriguez-Manfredi", "Jose Antonio", "" ], [ "Sebastian-Martinez", "Eduardo", "" ], [ "Ormo", "Jens", "" ], [ "Diaz-Martinez", "Enrique", "" ], [ "Oesker", "Markus", "" ], [ "Haschke", "Robert", "" ], [ "Ontrup", "Joerg", "" ], [ "Ritter", "Helge", "" ] ]
new_dataset
0.998774
cs/0509062
Chun-Hao Hsu
Chun-Hao Hsu and Achilleas Anastasopoulos
Capacity-Achieving Codes with Bounded Graphical Complexity on Noisy Channels
17 pages, 2 figures. This paper is to be presented in the 43rd Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, Sept. 28-30, 2005
null
null
null
cs.IT math.IT
null
We introduce a new family of concatenated codes with an outer low-density parity-check (LDPC) code and an inner low-density generator matrix (LDGM) code, and prove that these codes can achieve capacity under any memoryless binary-input output-symmetric (MBIOS) channel using maximum-likelihood (ML) decoding with bounded graphical complexity, i.e., the number of edges per information bit in their graphical representation is bounded. In particular, we also show that these codes can achieve capacity on the binary erasure channel (BEC) under belief propagation (BP) decoding with bounded decoding complexity per information bit per iteration for all erasure probabilities in (0, 1). By deriving and analyzing the average weight distribution (AWD) and the corresponding asymptotic growth rate of these codes with a rate-1 inner LDGM code, we also show that these codes achieve the Gilbert-Varshamov bound with asymptotically high probability. This result can be attributed to the presence of the inner rate-1 LDGM code, which is demonstrated to help eliminate high weight codewords in the LDPC code while maintaining a vanishingly small amount of low weight codewords.
[ { "version": "v1", "created": "Mon, 19 Sep 2005 23:22:34 GMT" }, { "version": "v2", "created": "Wed, 21 Sep 2005 05:26:35 GMT" }, { "version": "v3", "created": "Sat, 24 Sep 2005 18:58:56 GMT" } ]
2016-08-31T00:00:00
[ [ "Hsu", "Chun-Hao", "" ], [ "Anastasopoulos", "Achilleas", "" ] ]
new_dataset
0.979664
cs/0511094
Ignatios Souvatzis
Ignatios Souvatzis
A Machine-Independent port of the MPD language run time system to NetBSD
6 pages
Christian Tschudin et al. (Eds.): Proceedings of the Fourth European BSD Conference, 2005 Basel, Switzerland
null
null
cs.DC cs.PL
null
SR (synchronizing resources) is a PASCAL - style language enhanced with constructs for concurrent programming developed at the University of Arizona in the late 1980s. MPD (presented in Gregory Andrews' book about Foundations of Multithreaded, Parallel, and Distributed Programming) is its successor, providing the same language primitives with a different, more C-style, syntax. The run-time system (in theory, identical, but not designed for sharing) of those languages provides the illusion of a multiprocessor machine on a single Unix-like system or a (local area) network of Unix-like machines. Chair V of the Computer Science Department of the University of Bonn is operating a laboratory for a practical course in parallel programming consisting of computing nodes running NetBSD/arm, normally used via PVM, MPI etc. We are considering to offer SR and MPD for this, too. As the original language distributions were only targeted at a few commercial Unix systems, some porting effort is needed. However, some of the porting effort of our earlier SR port should be reusable. The integrated POSIX threads support of NetBSD-2.0 and later allows us to use library primitives provided for NetBSD's phtread system to implement the primitives needed by the SR run-time system, thus implementing 13 target CPUs at once and automatically making use of SMP on VAX, Alpha, PowerPC, Sparc, 32-bit Intel and 64 bit AMD CPUs. We'll present some methods used for the impementation and compare some performance values to the traditional implementation.
[ { "version": "v1", "created": "Mon, 28 Nov 2005 13:33:14 GMT" } ]
2016-08-31T00:00:00
[ [ "Souvatzis", "Ignatios", "" ] ]
new_dataset
0.999146
cs/9511103
null
Lawrence C. Paulson
A Concrete Final Coalgebra Theorem for ZF Set Theory
a greatly revised version has appeared in Mathematical Structures in Computer Science 9 (1999), 545-567. This version uses different methods and therefore retains some value
published in P. Dybjer, B. Nordstrm and J. Smith (editors), Types for Proofs and Programs '94 (Springer LNCS 996, published 1995), 120-139
null
null
cs.LO
null
A special final coalgebra theorem, in the style of Aczel's, is proved within standard Zermelo-Fraenkel set theory. Aczel's Anti-Foundation Axiom is replaced by a variant definition of function that admits non-well-founded constructions. Variant ordered pairs and tuples, of possibly infinite length, are special cases of variant functions. Analogues of Aczel's Solution and Substitution Lemmas are proved in the style of Rutten and Turi. The approach is less general than Aczel's, but the treatment of non-well-founded objects is simple and concrete. The final coalgebra of a functor is its greatest fixedpoint. The theory is intended for machine implementation and a simple case of it is already implemented using the theorem prover Isabelle.
[ { "version": "v1", "created": "Thu, 29 Mar 2001 00:00:00 GMT" } ]
2016-08-31T00:00:00
[ [ "Paulson", "Lawrence C.", "" ] ]
new_dataset
0.986436
cs/9902007
Craig Nevill-Manning
Ian H. Witten, Gordon W. Paynter, Eibe Frank, Carl Gutwin and Craig G. Nevill-Manning
KEA: Practical Automatic Keyphrase Extraction
9 pages
null
null
null
cs.DL
null
Keyphrases provide semantic metadata that summarize and characterize documents. This paper describes Kea, an algorithm for automatically extracting keyphrases from text. Kea identifies candidate keyphrases using lexical methods, calculates feature values for each candidate, and uses a machine-learning algorithm to predict which candidates are good keyphrases. The machine learning scheme first builds a prediction model using training documents with known keyphrases, and then uses the model to find keyphrases in new documents. We use a large test corpus to evaluate Kea's effectiveness in terms of how many author-assigned keyphrases are correctly identified. The system is simple, robust, and publicly available.
[ { "version": "v1", "created": "Fri, 5 Feb 1999 03:15:45 GMT" } ]
2016-08-31T00:00:00
[ [ "Witten", "Ian H.", "" ], [ "Paynter", "Gordon W.", "" ], [ "Frank", "Eibe", "" ], [ "Gutwin", "Carl", "" ], [ "Nevill-Manning", "Craig G.", "" ] ]
new_dataset
0.970118