id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0610071
|
Frederic Blanqui
|
Fr\'ed\'eric Blanqui (LIX)
|
Rewriting modulo in Deduction modulo
| null |
Dans Rewriting Techniques and Applications, 14th International
Conference, RTA 2003 2706 (2003)
| null | null |
cs.LO
| null |
We study the termination of rewriting modulo a set of equations in the
Calculus of Algebraic Constructions, an extension of the Calculus of
Constructions with functions and predicates defined by higher-order rewrite
rules. In a previous work, we defined general syntactic conditions based on the
notion of computable closure for ensuring the termination of the combination of
rewriting and beta-reduction. Here, we show that this result is preserved when
considering rewriting modulo a set of equations if the equivalence classes
generated by these equations are finite, the equations are linear and satisfy
general syntactic conditions also based on the notion of computable closure.
This includes equations like associativity and commutativity, and provides an
original treatment of termination modulo equations.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2006 15:21:50 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Blanqui",
"Frédéric",
"",
"LIX"
]
] |
new_dataset
| 0.962843 |
cs/0611016
|
Damien Martin-Guillerez
|
Damien Martin-Guillerez (IRISA / INRIA Rennes), Michel Ban\^atre
(IRISA / INRIA Rennes), Paul Couderc (IRISA / INRIA Rennes)
|
Increasing Data Resilience of Mobile Devices with a Collaborative Backup
Service
| null | null | null | null |
cs.NI
| null |
Whoever has had his cell phone stolen knows how frustrating it is to be
unable to get his contact list back. To avoid data loss when losing or
destroying a mobile device like a PDA or a cell phone, data is usually
backed-up to a fixed station. However, in the time between the last backup and
the failure, important data can have been produced and then lost. To handle
this issue, we propose a transparent collaborative backup system. Indeed, by
saving data on other mobile devices between two connections to a global
infrastructure, we can resist to such scenarios. In this paper, after a general
description of such a system, we present a way to replicate data on mobile
devices to attain a prerequired resilience for the backup.
|
[
{
"version": "v1",
"created": "Fri, 3 Nov 2006 17:16:26 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Martin-Guillerez",
"Damien",
"",
"IRISA / INRIA Rennes"
],
[
"Banâtre",
"Michel",
"",
"IRISA / INRIA Rennes"
],
[
"Couderc",
"Paul",
"",
"IRISA / INRIA Rennes"
]
] |
new_dataset
| 0.967115 |
cs/0611139
|
Pierre-Loic Garoche
|
Pierre-Lo\"ic Garoche (IRIT), Marc Pantel (IRIT), Xavier Thirioux
(IRIT)
|
Static Safety for an Actor Dedicated Process Calculus by Abstract
Interpretation
| null |
Formal Methods for Open Object-Based Distributed Systems
(26/05/2006) 78-92
|
10.1007/11768869_8
| null |
cs.DC
| null |
The actor model eases the definition of concurrent programs with non uniform
behaviors. Static analysis of such a model was previously done in a data-flow
oriented way, with type systems. This approach was based on constraint set
resolution and was not able to deal with precise properties for communications
of behaviors. We present here a new approach, control-flow oriented, based on
the abstract interpretation framework, able to deal with communication of
behaviors. Within our new analyses, we are able to verify most of the previous
properties we observed as well as new ones, principally based on occurrence
counting.
|
[
{
"version": "v1",
"created": "Tue, 28 Nov 2006 07:48:18 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Garoche",
"Pierre-Loïc",
"",
"IRIT"
],
[
"Pantel",
"Marc",
"",
"IRIT"
],
[
"Thirioux",
"Xavier",
"",
"IRIT"
]
] |
new_dataset
| 0.987646 |
1603.03235
|
Amir Soleimani
|
Amir Soleimani, Kazim Fouladi, Babak N. Araabi
|
UTSig: A Persian Offline Signature Dataset
|
15 pages, 6 figures
| null |
10.1049/iet-bmt.2015.0058
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The pivotal role of datasets in signature verification systems motivates
researchers to collect signature samples. Distinct characteristics of Persian
signature demands for richer and culture-dependent offline signature datasets.
This paper introduces a new and public Persian offline signature dataset,
UTSig, that consists of 8280 images from 115 classes. Each class has 27 genuine
signatures, 3 opposite-hand signatures, and 42 skilled forgeries made by 6
forgers. Compared with the other public datasets, UTSig has more samples, more
classes, and more forgers. We considered various variables including signing
period, writing instrument, signature box size, and number of observable
samples for forgers in the data collection procedure. By careful examination of
main characteristics of offline signature datasets, we observe that Persian
signatures have fewer numbers of branch points and end points. We propose and
evaluate four different training and test setups for UTSig. Results of our
experiments show that training genuine samples along with opposite-hand samples
and random forgeries can improve the performance in terms of equal error rate
and minimum cost of log likelihood ratio.
|
[
{
"version": "v1",
"created": "Thu, 10 Mar 2016 12:23:03 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Apr 2016 12:55:39 GMT"
},
{
"version": "v3",
"created": "Fri, 8 Apr 2016 04:21:25 GMT"
},
{
"version": "v4",
"created": "Fri, 12 Aug 2016 06:58:59 GMT"
}
] | 2016-08-15T00:00:00 |
[
[
"Soleimani",
"Amir",
""
],
[
"Fouladi",
"Kazim",
""
],
[
"Araabi",
"Babak N.",
""
]
] |
new_dataset
| 0.999836 |
1607.07405
|
Ankur Handa
|
Ankur Handa, Michael Bloesch, Viorica Patraucean, Simon Stent, John
McCormac, Andrew Davison
|
gvnn: Neural Network Library for Geometric Computer Vision
|
Submitted to ECCV Workshop on Deep Geometry
| null | null | null |
cs.CV cs.LG
|
http://creativecommons.org/licenses/by/4.0/
|
We introduce gvnn, a neural network library in Torch aimed towards bridging
the gap between classic geometric computer vision and deep learning. Inspired
by the recent success of Spatial Transformer Networks, we propose several new
layers which are often used as parametric transformations on the data in
geometric computer vision. These layers can be inserted within a neural network
much in the spirit of the original spatial transformers and allow
backpropagation to enable end-to-end learning of a network involving any domain
knowledge in geometric computer vision. This opens up applications in learning
invariance to 3D geometric transformation for place recognition, end-to-end
visual odometry, depth estimation and unsupervised learning through warping
with a parametric transformation for image reconstruction error.
|
[
{
"version": "v1",
"created": "Mon, 25 Jul 2016 18:57:17 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Aug 2016 22:49:32 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Aug 2016 17:28:24 GMT"
}
] | 2016-08-15T00:00:00 |
[
[
"Handa",
"Ankur",
""
],
[
"Bloesch",
"Michael",
""
],
[
"Patraucean",
"Viorica",
""
],
[
"Stent",
"Simon",
""
],
[
"McCormac",
"John",
""
],
[
"Davison",
"Andrew",
""
]
] |
new_dataset
| 0.997165 |
1608.02082
|
Daniela Inclezan
|
Daniela Inclezan
|
COREALMLIB: An ALM Library Translated from the Component Library
|
Paper presented at the 32nd International Conference on Logic
Programming (ICLP 2016), New York City, USA, 16-21 October 2016, 15 pages,
LaTeX, 3 figures (2 of which in PDF format)
| null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents COREALMLIB, an ALM library of commonsense knowledge about
dynamic domains. The library was obtained by translating part of the COMPONENT
LIBRARY (CLIB) into the modular action language ALM. CLIB consists of general
reusable and composable commonsense concepts, selected based on a thorough
study of ontological and lexical resources. Our translation targets CLIB states
(i.e., fluents) and actions. The resulting ALM library contains the
descriptions of 123 action classes grouped into 43 reusable modules that are
organized into a hierarchy. It is made available online and of interest to
researchers in the action language, answer-set programming, and natural
language understanding communities. We believe that our translation has two
main advantages over its CLIB counterpart: (i) it specifies axioms about
actions in a more elaboration tolerant and readable way, and (ii) it can be
seamlessly integrated with ASP reasoning algorithms (e.g., for planning and
postdiction). In contrast, axioms are described in CLIB using STRIPS-like
operators, and CLIB's inference engine cannot handle planning nor postdiction.
Under consideration for publication in TPLP.
|
[
{
"version": "v1",
"created": "Sat, 6 Aug 2016 08:59:21 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Aug 2016 16:56:18 GMT"
}
] | 2016-08-15T00:00:00 |
[
[
"Inclezan",
"Daniela",
""
]
] |
new_dataset
| 0.999332 |
1608.03624
|
Mattia Fazzini
|
Mattia Fazzini, Eduardo Noronha de A. Freitas, Shauvik Roy Choudhary,
Alessandro Orso
|
From Manual Android Tests to Automated and Platform Independent Test
Scripts
| null | null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Because Mobile apps are extremely popular and often mission critical
nowadays, companies invest a great deal of resources in testing the apps they
provide to their customers. Testing is particularly important for Android apps,
which must run on a multitude of devices and operating system versions.
Unfortunately, as we confirmed in many interviews with quality assurance
professionals, app testing is today a very human intensive, and therefore
tedious and error prone, activity. To address this problem, and better support
testing of Android apps, we propose a new technique that allows testers to
easily create platform independent test scripts for an app and automatically
run the generated test scripts on multiple devices and operating system
versions. The technique does so without modifying the app under test or the
runtime system, by (1) intercepting the interactions of the tester with the app
and (2) providing the tester with an intuitive way to specify expected results
that it then encode as test oracles. We implemented our technique in a tool
named Barista and used the tool to evaluate the practical usefulness and
applicability of our approach. Our results show that Barista can faithfully
encode user defined test cases as test scripts with built-in oracles, generates
test scripts that can run on multiple platforms, and can outperform a
state-of-the-art tool with similar functionality. Barista and our experimental
infrastructure are publicly available.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2016 22:16:52 GMT"
}
] | 2016-08-15T00:00:00 |
[
[
"Fazzini",
"Mattia",
""
],
[
"Freitas",
"Eduardo Noronha de A.",
""
],
[
"Choudhary",
"Shauvik Roy",
""
],
[
"Orso",
"Alessandro",
""
]
] |
new_dataset
| 0.999455 |
1608.03650
|
Roberto Amadini
|
Roberto Amadini, Pierre Flener, Justin Pearson, Joseph D. Scott, Peter
J. Stuckey, Guido Tack
|
MiniZinc with Strings
|
Pre-proceedings paper presented at the 26th International Symposium
on Logic-Based Program Synthesis and Transformation (LOPSTR 2016), Edinburgh,
Scotland UK, 6-8 September 2016 (arXiv:1608.02534)
| null | null |
LOPSTR/2016/7
|
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Strings are extensively used in modern programming languages and constraints
over strings of unknown length occur in a wide range of real-world applications
such as software analysis and verification, testing, model checking, and web
security. Nevertheless, practically no CP solver natively supports string
constraints. We introduce string variables and a suitable set of string
constraints as builtin features of the MiniZinc modelling language.
Furthermore, we define an interpreter for converting a MiniZinc model with
strings into a FlatZinc instance relying on only integer variables. This
provides a user-friendly interface for modelling combinatorial problems with
strings, and enables both string and non-string solvers to actually solve such
problems.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2016 01:17:09 GMT"
}
] | 2016-08-15T00:00:00 |
[
[
"Amadini",
"Roberto",
""
],
[
"Flener",
"Pierre",
""
],
[
"Pearson",
"Justin",
""
],
[
"Scott",
"Joseph D.",
""
],
[
"Stuckey",
"Peter J.",
""
],
[
"Tack",
"Guido",
""
]
] |
new_dataset
| 0.977914 |
1608.03680
|
Hung-I Yu
|
Hung-I Yu and Tien-Ching Lin and D. T. Lee
|
The $(1|1)_R$-Centroid Problem on the Plane
|
27 pages, 6 figures. A preliminary version of this paper has been
submitted to ISAAC 2016
| null | null | null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In 1982, Drezner proposed the (1|1)-centroid problem on the plane, in which
two players, called the leader and the follower, open facilities to provide
service to customers in a competitive manner. The leader opens the first
facility, and then the follower opens the second. Each customer will patronize
the facility closest to him (ties broken in favor of the leader's one), thereby
decides the market share of the two players. The goal is to find the best
position for the leader's facility so that his market share is maximized. The
best algorithm for this problem is an $O(n^2 \log n)$-time parametric search
approach, which searches over the space of possible market share values.
In the same paper, Drezner also proposed a general version of (1|1)-centroid
problem by introducing a minimal distance constraint $R$, such that the
follower's facility is not allowed to be located within a distance $R$ from the
leader's. He proposed an $O(n^5 \log n)$-time algorithm for this general
version by identifying $O(n^4)$ points as the candidates of the optimal
solution and checking the market share for each of them. In this paper, we
develop a new parametric search approach searching over the $O(n^4)$ candidate
points, and present an $O(n^2 \log n)$-time algorithm for the general version,
thereby close the $O(n^3)$ gap between the two bounds.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2016 05:09:05 GMT"
}
] | 2016-08-15T00:00:00 |
[
[
"Yu",
"Hung-I",
""
],
[
"Lin",
"Tien-Ching",
""
],
[
"Lee",
"D. T.",
""
]
] |
new_dataset
| 0.966061 |
1608.03684
|
Cristina Flaut
|
A. Borumand Saeid, Cristina Flaut, Sarka Hoskova-Mayerova,
Roxana-Lavinia Cristea, M. Afshar, M. Kuchaki Rafsanjani
|
Some connections between BCK algebras and n ary block codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the last time some papers were devoted to the study of the con- nections
between binary block codes and BCK-algebras. In this paper, we try to
generalize these results to n-ary block codes, providing an algorithm which
allows us to construct a BCK-algebra from a given n-ary block code.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2016 06:14:24 GMT"
}
] | 2016-08-15T00:00:00 |
[
[
"Saeid",
"A. Borumand",
""
],
[
"Flaut",
"Cristina",
""
],
[
"Hoskova-Mayerova",
"Sarka",
""
],
[
"Cristea",
"Roxana-Lavinia",
""
],
[
"Afshar",
"M.",
""
],
[
"Rafsanjani",
"M. Kuchaki",
""
]
] |
new_dataset
| 0.999229 |
1608.03724
|
Alex James Dr
|
Yerlan Berdaliyev, Alex Pappachen James
|
RFID-Cloud Smart Cart System
|
to appear as a poster paper in International Conference on Advances
in Computing, Communications and Informatics, 2016
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
The main purpose of this work is in reducing the queuing delays in major
supermarkets or other shopping centers by means of an Electronic Smart Cart
System which will introduce an intellectual approach to billing process through
RFID technology. Smart Cart System is a cooperative performance of three
separate systems: a website developed for the shopping market, electronic smart
cart device and anti-theft RFID gates. This project focuses on developing the
electronic smart cart device itself. It involves an embedded electronic
hardware that consists of an OLED display, Arduino Mega 2560 board, a
specifically designed PCB, a Wi-Fi module, 13.56 MHz HF RFID reader, a power
supply and a shopping cart.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2016 08:57:41 GMT"
}
] | 2016-08-15T00:00:00 |
[
[
"Berdaliyev",
"Yerlan",
""
],
[
"James",
"Alex Pappachen",
""
]
] |
new_dataset
| 0.999269 |
1608.03824
|
Ashley Edwards
|
Ashley Edwards, Charles Isbell, Atsuo Takanishi
|
Perceptual Reward Functions
|
Deep Reinforcement Learning: Frontiers and Challenges Workshop, IJCAI
2016
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reinforcement learning problems are often described through rewards that
indicate if an agent has completed some task. This specification can yield
desirable behavior, however many problems are difficult to specify in this
manner, as one often needs to know the proper configuration for the agent. When
humans are learning to solve tasks, we often learn from visual instructions
composed of images or videos. Such representations motivate our development of
Perceptual Reward Functions, which provide a mechanism for creating visual task
descriptions. We show that this approach allows an agent to learn from rewards
that are based on raw pixels rather than internal parameters.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2016 15:29:05 GMT"
}
] | 2016-08-15T00:00:00 |
[
[
"Edwards",
"Ashley",
""
],
[
"Isbell",
"Charles",
""
],
[
"Takanishi",
"Atsuo",
""
]
] |
new_dataset
| 0.988913 |
1608.03874
|
Hassan Khodaiemehr
|
Hassan Khodaiemehr and Dariush Kiani and Mohammad-Reza Sadeghi
|
LDPC Lattice Codes for Full-Duplex Relay Channels
|
30 pages, 2 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Low density parity check (LDPC) lattices are obtained from Construction D'
and a family of nested binary LDPC codes. We consider an special case of these
lattices with one binary LDPC code as underlying code. This special case of
LDPC lattices can be obtained by lifting binary LDPC codes using Construction A
lattices. The LDPC lattices were the first family of lattices which have
efficient decoding in high dimensions. We employ the encoding and decoding of
the LDPC lattices in a cooperative transmission framework. We establish two
efficient shaping methods based on hypercube shaping and Voronoi shaping, to
obtain LDPC lattice codes. Then, we propose the implementation of block Markov
encoding for one-way and two-way relay networks using LDPC lattice codes. This
entails owning an efficient method for decomposing full-rate codebook into
lower rate codebooks. We apply different decomposition schemes for one-way and
two-way relay channels which are the altered versions of the decomposition
methods of low density lattice codes (LDLCs). Due to the lower complexity of
the decoding for LDPC lattices comparing to LDLCs, the complexity of our
schemes are significantly lower than the ones proposed for LDLCs. The
efficiency of the proposed schemes are presented using simulation results.
|
[
{
"version": "v1",
"created": "Fri, 12 Aug 2016 18:57:06 GMT"
}
] | 2016-08-15T00:00:00 |
[
[
"Khodaiemehr",
"Hassan",
""
],
[
"Kiani",
"Dariush",
""
],
[
"Sadeghi",
"Mohammad-Reza",
""
]
] |
new_dataset
| 0.976645 |
0705.3677
|
Cemal Akcaba
|
Cemal Ak\c{c}aba, Patrick Kuppinger and Helmut B\"olcskei
|
Distributed Transmit Diversity in Relay Networks
|
5 pages, 1 figure
| null | null | null |
cs.IT math.IT
| null |
We analyze fading relay networks, where a single-antenna source-destination
terminal pair communicates through a set of half-duplex single-antenna relays
using a two-hop protocol with linear processing at the relay level. A family of
relaying schemes is presented which achieves the entire optimal
diversity-multiplexing (DM) tradeoff curve. As a byproduct of our analysis, it
follows that delay diversity and phase-rolling at the relay level are optimal
with respect to the entire DM-tradeoff curve, provided the delays and the
modulation frequencies, respectively, are chosen appropriately.
|
[
{
"version": "v1",
"created": "Thu, 24 May 2007 23:07:56 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Akçaba",
"Cemal",
""
],
[
"Kuppinger",
"Patrick",
""
],
[
"Bölcskei",
"Helmut",
""
]
] |
new_dataset
| 0.981024 |
1005.4115
|
G\'abor Erd\'elyi
|
G\'abor Erd\'elyi, Lena Piras, and J\"org Rothe
|
Bucklin Voting is Broadly Resistant to Control
|
20 pages
| null | null | null |
cs.CC cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Electoral control models ways of changing the outcome of an election via such
actions as adding/deleting/partitioning either candidates or voters. These
actions modify an election's participation structure and aim at either making a
favorite candidate win ("constructive control") or prevent a despised candidate
from winning ("destructive control"), which yields a total of 22 standard
control scenarios. To protect elections from such control attempts,
computational complexity has been used to show that electoral control, though
not impossible, is computationally prohibitive. Among natural voting systems
with a polynomial-time winner problem, the two systems with the highest number
of proven resistances to control types (namely 19 out of 22) are
"sincere-strategy preference-based approval voting" (SP-AV, a modification of a
system proposed by Brams and Sanver) and fallback voting. Both are hybrid
systems; e.g., fallback voting combines approval with Bucklin voting. In this
paper, we study the control complexity of Bucklin voting itself and show that
it behaves equally well in terms of control resistance for the 20 cases
investigated so far. As Bucklin voting is a special case of fallback voting,
all resistances shown for Bucklin voting in this paper strengthen the
corresponding resistance for fallback voting.
|
[
{
"version": "v1",
"created": "Sat, 22 May 2010 09:12:04 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Erdélyi",
"Gábor",
""
],
[
"Piras",
"Lena",
""
],
[
"Rothe",
"Jörg",
""
]
] |
new_dataset
| 0.999065 |
1104.4890
|
Jakub {\L}{\ka}cki
|
Jakub \L\k{a}cki and Piotr Sankowski
|
Min-cuts and Shortest Cycles in Planar Graphs in O(n log log n) Time
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a deterministic O(n log log n) time algorithm for finding shortest
cycles and minimum cuts in planar graphs. The algorithm improves the previously
known fastest algorithm by Italiano et al. in STOC'11 by a factor of log n.
This speedup is obtained through the use of dense distance graphs combined with
a divide-and-conquer approach.
|
[
{
"version": "v1",
"created": "Tue, 26 Apr 2011 11:29:22 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Łącki",
"Jakub",
""
],
[
"Sankowski",
"Piotr",
""
]
] |
new_dataset
| 0.998281 |
1208.0227
|
Danica Porobic
|
Danica Porobic, Ippokratis Pandis, Miguel Branco, P{\i}nar T\"oz\"un,
Anastasia Ailamaki
|
OLTP on Hardware Islands
|
VLDB2012
|
Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 11, pp.
1447-1458 (2012)
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern hardware is abundantly parallel and increasingly heterogeneous. The
numerous processing cores have non-uniform access latencies to the main memory
and to the processor caches, which causes variability in the communication
costs. Unfortunately, database systems mostly assume that all processing cores
are the same and that microarchitecture differences are not significant enough
to appear in critical database execution paths. As we demonstrate in this
paper, however, hardware heterogeneity does appear in the critical path and
conventional database architectures achieve suboptimal and even worse,
unpredictable performance. We perform a detailed performance analysis of OLTP
deployments in servers with multiple cores per CPU (multicore) and multiple
CPUs per server (multisocket). We compare different database deployment
strategies where we vary the number and size of independent database instances
running on a single server, from a single shared-everything instance to
fine-grained shared-nothing configurations. We quantify the impact of
non-uniform hardware on various deployments by (a) examining how efficiently
each deployment uses the available hardware resources and (b) measuring the
impact of distributed transactions and skewed requests on different workloads.
Finally, we argue in favor of shared-nothing deployments that are topology- and
workload-aware and take advantage of fast on-chip communication between islands
of cores on the same socket.
|
[
{
"version": "v1",
"created": "Wed, 1 Aug 2012 14:13:33 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Porobic",
"Danica",
""
],
[
"Pandis",
"Ippokratis",
""
],
[
"Branco",
"Miguel",
""
],
[
"Tözün",
"Pınar",
""
],
[
"Ailamaki",
"Anastasia",
""
]
] |
new_dataset
| 0.980208 |
cs/0701193
|
David Monniaux
|
Bruno Blanchet (LIENS), Patrick Cousot (LIENS), Radhia Cousot (STIX),
Jer\^ome Feret (LIENS), Laurent Mauborgne (LIENS), Antoine Min\'e (LIENS),
David Monniaux (LIENS), Xavier Rival (LIENS)
|
A Static Analyzer for Large Safety-Critical Software
| null |
PLDI: Conference on Programming Language Design and Implementation
(2003) 196 - 207
|
10.1145/781131.781153
| null |
cs.PL cs.PF
| null |
We show that abstract interpretation-based static program analysis can be
made efficient and precise enough to formally verify a class of properties for
a family of large programs with few or no false alarms. This is achieved by
refinement of a general purpose static analyzer and later adaptation to
particular programs of the family by the end-user through parametrization. This
is applied to the proof of soundness of data manipulation operations at the
machine level for periodic synchronous safety critical embedded software. The
main novelties are the design principle of static analyzers by refinement and
adaptation through parametrization, the symbolic manipulation of expressions to
improve the precision of abstract transfer functions, the octagon, ellipsoid,
and decision tree abstract domains, all with sound handling of rounding errors
in floating point computations, widening strategies (with thresholds, delayed)
and the automatic determination of the parameters (parametrized packing).
|
[
{
"version": "v1",
"created": "Tue, 30 Jan 2007 16:57:14 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Blanchet",
"Bruno",
"",
"LIENS"
],
[
"Cousot",
"Patrick",
"",
"LIENS"
],
[
"Cousot",
"Radhia",
"",
"STIX"
],
[
"Feret",
"Jerôme",
"",
"LIENS"
],
[
"Mauborgne",
"Laurent",
"",
"LIENS"
],
[
"Miné",
"Antoine",
"",
"LIENS"
],
[
"Monniaux",
"David",
"",
"LIENS"
],
[
"Rival",
"Xavier",
"",
"LIENS"
]
] |
new_dataset
| 0.973731 |
cs/0702061
|
Gwenael Richomme
|
Gw\'ena\"el Richomme (LaRIA)
|
Sudo-Lyndon
| null | null | null |
LaRIA-LRR-2007-03
|
cs.DM
| null |
Based on Lyndon words, a new Sudoku-like puzzle is presented and some
relative theoretical questions are proposed.
|
[
{
"version": "v1",
"created": "Sat, 10 Feb 2007 09:49:34 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Richomme",
"Gwénaël",
"",
"LaRIA"
]
] |
new_dataset
| 0.979234 |
cs/0703084
|
Mine Antoine
|
Antoine Min\'e (LIENS)
|
The Octagon Abstract Domain
|
(update: reversed author first and last names)
|
Analysis, Slicing and Transformation (AST) (10/2001) 310-319
| null | null |
cs.PL
| null |
This article presents a new numerical abstract domain for static analysis by
abstract interpretation. It extends a former numerical abstract domain based on
Difference-Bound Matrices and allows us to represent invariants of the form
(+/-x+/-y<=c), where x and y are program variables and c is a real constant. We
focus on giving an efficient representation based on Difference-Bound Matrices
- O(n2) memory cost, where n is the number of variables - and graph-based
algorithms for all common abstract operators - O(n3) time cost. This includes a
normal form algorithm to test equivalence of representation and a widening
operator to compute least fixpoint approximations.
|
[
{
"version": "v1",
"created": "Thu, 15 Mar 2007 18:16:32 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Mar 2007 08:47:24 GMT"
}
] | 2016-08-14T00:00:00 |
[
[
"Miné",
"Antoine",
"",
"LIENS"
]
] |
new_dataset
| 0.999624 |
0912.0537
|
David Eppstein
|
David Eppstein and Elena Mumford
|
Steinitz Theorems for Orthogonal Polyhedra
|
48 pages, 31 figures
|
J. Computational Geometry 5 (1): 179-244, 2014
|
10.20382/jocg.v5i1a10
| null |
cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define a simple orthogonal polyhedron to be a three-dimensional polyhedron
with the topology of a sphere in which three mutually-perpendicular edges meet
at each vertex. By analogy to Steinitz's theorem characterizing the graphs of
convex polyhedra, we find graph-theoretic characterizations of three classes of
simple orthogonal polyhedra: corner polyhedra, which can be drawn by isometric
projection in the plane with only one hidden vertex, xyz polyhedra, in which
each axis-parallel line through a vertex contains exactly one other vertex, and
arbitrary simple orthogonal polyhedra. In particular, the graphs of xyz
polyhedra are exactly the bipartite cubic polyhedral graphs, and every
bipartite cubic polyhedral graph with a 4-connected dual graph is the graph of
a corner polyhedron. Based on our characterizations we find efficient
algorithms for constructing orthogonal polyhedra from their graphs.
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2009 21:53:22 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Eppstein",
"David",
""
],
[
"Mumford",
"Elena",
""
]
] |
new_dataset
| 0.990992 |
1105.0398
|
Maarten L\"offler
|
Kevin Buchin and David Eppstein and Maarten L\"offler and Martin
N\"ollenburg and Rodrigo I. Silveira
|
Adjacency-Preserving Spatial Treemaps
| null |
J. Computation Geometry 7 (1): 100-122, 2016
|
10.20382/jocg.v7i1a6
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rectangular layouts, subdivisions of an outer rectangle into smaller
rectangles, have many applications in visualizing spatial information, for
instance in rectangular cartograms in which the rectangles represent geographic
or political regions. A spatial treemap is a rectangular layout with a
hierarchical structure: the outer rectangle is subdivided into rectangles that
are in turn subdivided into smaller rectangles. We describe algorithms for
transforming a rectangular layout that does not have this hierarchical
structure, together with a clustering of the rectangles of the layout, into a
spatial treemap that respects the clustering and also respects to the extent
possible the adjacencies of the input layout.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2011 18:18:22 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Buchin",
"Kevin",
""
],
[
"Eppstein",
"David",
""
],
[
"Löffler",
"Maarten",
""
],
[
"Nöllenburg",
"Martin",
""
],
[
"Silveira",
"Rodrigo I.",
""
]
] |
new_dataset
| 0.997991 |
1307.8007
|
Minglai Cai
|
Holger Boche, Minglai Cai, Christian Deppe, Janis N\"otzel
|
Classical-Quantum Arbitrarily Varying Wiretap Channel: Ahlswede
dichotomy, Positivity, Resources, Super Activation
| null |
Quantum Information Processing, August 2016, pp. 1-43
|
10.1007/s11128-016-1384-y
| null |
cs.IT math.IT quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We establish Ahlswede dichotomy for arbitrarily varying classical-quantum
wiretap channels. This means that either the deterministic secrecy capacity of
an arbitrarily varying classical-quantum wiretap channel is zero or it equals
its randomness-assisted secrecy capacity. We analyze the secrecy capacity of
arbitrarily varying classical-quantum wiretap channels when the sender and the
receiver use various resources. It turns out that having randomness, common
randomness, and correlation as resources are very helpful for achieving a
positive deterministic secrecy capacity of arbitrarily varying
classical-quantum wiretap channels. We prove the phenomenon super-activation
for arbitrarily varying classical-quantum wiretap channels, i.e., if we use two
arbitrarily varying classical-quantum wiretap channels, both with zero
deterministic secrecy capacity together, they allow perfect secure
transmission.
|
[
{
"version": "v1",
"created": "Tue, 30 Jul 2013 15:00:47 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Aug 2016 15:58:01 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Boche",
"Holger",
""
],
[
"Cai",
"Minglai",
""
],
[
"Deppe",
"Christian",
""
],
[
"Nötzel",
"Janis",
""
]
] |
new_dataset
| 0.976874 |
1308.6824
|
Martin N\"ollenburg
|
David Eppstein, Danny Holten, Maarten L\"offler, Martin N\"ollenburg,
Bettina Speckmann, Kevin Verbeek
|
Strict Confluent Drawing
|
20 pages, 14 figures, Extended version of a paper to appear at Graph
Drawing 2013
|
J. Computation Geometry 7 (1): 22-46, 2016
|
10.20382/jocg.v7i1a2
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define strict confluent drawing, a form of confluent drawing in which the
existence of an edge is indicated by the presence of a smooth path through a
system of arcs and junctions (without crossings), and in which such a path, if
it exists, must be unique. We prove that it is NP-complete to determine whether
a given graph has a strict confluent drawing but polynomial to determine
whether it has an outerplanar strict confluent drawing with a fixed vertex
ordering (a drawing within a disk, with the vertices placed in a given order on
the boundary).
|
[
{
"version": "v1",
"created": "Fri, 30 Aug 2013 19:32:07 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Eppstein",
"David",
""
],
[
"Holten",
"Danny",
""
],
[
"Löffler",
"Maarten",
""
],
[
"Nöllenburg",
"Martin",
""
],
[
"Speckmann",
"Bettina",
""
],
[
"Verbeek",
"Kevin",
""
]
] |
new_dataset
| 0.998505 |
1509.04853
|
Anirban Dasgupta
|
Anirban Dasgupta, Shubhobrata Bhattacharya and Aurobinda Routray
|
SPECFACE - A Dataset of Human Faces Wearing Spectacles
|
5 pages, 9 figures, 1 Table. arXiv admin note: text overlap with
arXiv:1505.04055
|
2016 IEEE Students' Technology Symposium (IEEE TechSym 2016)
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a database of human faces for persons wearing spectacles.
The database consists of images of faces having significant variations with
respect to illumination, head pose, skin color, facial expressions and sizes,
and nature of spectacles. The database contains data of 60 subjects. This
database is expected to be a precious resource for the development and
evaluation of algorithms for face detection, eye detection, head tracking, eye
gaze tracking, etc., for subjects wearing spectacles. As such, this can be a
valuable contribution to the computer vision community.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2015 08:43:53 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Aug 2016 05:15:48 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Dasgupta",
"Anirban",
""
],
[
"Bhattacharya",
"Shubhobrata",
""
],
[
"Routray",
"Aurobinda",
""
]
] |
new_dataset
| 0.999836 |
1604.06574
|
Laurent Schmalen
|
Lei M. Zhang and Laurent Schmalen
|
Feed-Forward Staircase Codes
|
Extended version of paper submitted to ITG SCC 2017
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose two variants of staircase codes that resolve the issue of
parity-propagation in their encoding process. The proposed codes provide a
systematic way of terminating a staircase code after an arbitrary number of
blocks. The class of feed-forward staircase codes are introduced, which uses a
self-protection technique to avoid parity-propagation. We also introduce the
class of partial feed-forward staircase codes, which allows parity-propagation
to occur over a given number of blocks. By amortizing the complexity of
self-protection over several standard staircase blocks, the encoding complexity
of these codes is made comparable to staircase codes. Partial feed-forward
staircase codes have the same error-floor as staircase codes. Simulations
confirm that the performance of the proposed codes in both the waterfall and
error-floor regions is similar to the original staircase codes. The proposed
codes help extend the domain of application of staircase codes to systems in
which parity-propagation is undesirable or termination is necessary.
|
[
{
"version": "v1",
"created": "Fri, 22 Apr 2016 08:52:22 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Aug 2016 13:17:56 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Zhang",
"Lei M.",
""
],
[
"Schmalen",
"Laurent",
""
]
] |
new_dataset
| 0.998756 |
1607.02537
|
Heng Fan
|
Heng Fan, Xue Mei, Danil Prokhorov and Haibin Ling
|
Multi-level Contextual RNNs with Attention Model for Scene Labeling
|
8 pages, 8 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Context in image is crucial for scene labeling while existing methods only
exploit local context generated from a small surrounding area of an image patch
or a pixel, by contrast long-range and global contextual information is
ignored. To handle this issue, we in this work propose a novel approach for
scene labeling by exploring multi-level contextual recurrent neural networks
(ML-CRNNs). Specifically, we encode three kinds of contextual cues, i.e., local
context, global context and image topic context in structural recurrent neural
networks (RNNs) to model long-range local and global dependencies in image. In
this way, our method is able to `see' the image in terms of both long-range
local and holistic views, and make a more reliable inference for image
labeling. Besides, we integrate the proposed contextual RNNs into hierarchical
convolutional neural networks (CNNs), and exploit dependence relationships in
multiple levels to provide rich spatial and semantic information. Moreover, we
novelly adopt an attention model to effectively merge multiple levels and show
that it outperforms average- or max-pooling fusion strategies. Extensive
experiments demonstrate that the proposed approach achieves new
state-of-the-art results on the CamVid, SiftFlow and Stanford-background
datasets.
|
[
{
"version": "v1",
"created": "Fri, 8 Jul 2016 21:51:53 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Aug 2016 21:15:51 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Fan",
"Heng",
""
],
[
"Mei",
"Xue",
""
],
[
"Prokhorov",
"Danil",
""
],
[
"Ling",
"Haibin",
""
]
] |
new_dataset
| 0.997449 |
1608.03322
|
EPTCS
|
Keyvan Azadbakht (Centrum Wiskunde en Informatica), Frank S. de Boer
(Centrum Wiskunde en Informatica), Vlad Serbanescu (Centrum Wiskunde en
Informatica)
|
Multi-Threaded Actors
|
In Proceedings ICE 2016, arXiv:1608.03131
|
EPTCS 223, 2016, pp. 51-66
|
10.4204/EPTCS.223.4
| null |
cs.DC cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce a new programming model of multi-threaded actors
which feature the parallel processing of their messages. In this model an actor
consists of a group of active objects which share a message queue. We provide a
formal operational semantics, and a description of a Java-based implementation
for the basic programming abstractions describing multi-threaded actors.
Finally, we evaluate our proposal by means of an example application.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2016 00:25:56 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Azadbakht",
"Keyvan",
"",
"Centrum Wiskunde en Informatica"
],
[
"de Boer",
"Frank S.",
"",
"Centrum Wiskunde en Informatica"
],
[
"Serbanescu",
"Vlad",
"",
"Centrum Wiskunde en\n Informatica"
]
] |
new_dataset
| 0.995731 |
1608.03377
|
Behzad Asadi
|
Behzad Asadi, Lawrence Ong, and Sarah J. Johnson
|
The DoF Region of the Three-Receiver MIMO Broadcast Channel with Side
Information and Its Relation to Index Coding Capacity
|
Submitted for Journal Publication
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the three-receiver Gaussian multiple-input multiple-output (MIMO)
broadcast channel with an arbitrary number of antennas at each of the
transmitter and the receivers. We investigate the degrees-of-freedom (DoF)
region of the channel when each receiver requests a private message, and may
know some of the messages requested by the other receivers as receiver message
side information (RMSI). We establish the DoF region of the channel for all 16
possible non-isomorphic RMSI configurations by deriving tight inner and outer
bounds on the region. To derive the inner bounds, we first propose a scheme for
each RMSI configuration which exploits both the null space and the side
information of the receivers. We then use these schemes in conjunction with
time sharing for 15 RMSI configurations, and with time sharing and two-symbol
extension for the remaining one. To derive the outer bounds, we construct
enhanced versions of the channel for each RMSI configuration, and upper bound
their DoF region. After establishing the DoF region, in the case where all the
nodes have the same number of antennas, we introduce some common properties of
the DoF region, and the capacity region of the index coding problem.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2016 06:11:40 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Asadi",
"Behzad",
""
],
[
"Ong",
"Lawrence",
""
],
[
"Johnson",
"Sarah J.",
""
]
] |
new_dataset
| 0.996661 |
1608.03397
|
Yunpeng Li
|
Yunpeng Li, Costas Courcoubetis, and Lingjie Duan
|
Dynamic routing for social information sharing
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today mobile users are intensively interconnected thanks to the emerging
mobile social networks, where they share location-based information with each
other when traveling on different routes and visit different areas of the city.
In our model the information collected is aggregated over all users' trips and
made publicly available as a public good. Due to information overlap, the total
useful content amount increases with the diversity in path choices made by the
users, and it is crucial to motivate selfish users to choose different paths
despite the potentially higher costs associated with their trips. In this paper
we combine the benefits from social information sharing with the fundamental
routing problem where a unit mass of non-atomic selfish users decide their
trips in a non-cooperative game by choosing between a high-cost and a low-cost
path. To remedy the inefficient low-content equilibrium where all users choose
to explore a single path (the low-cost path), we propose and analyse two new
incentive mechanisms that can be used by the social network application, one
based on side payments and the other on restricting access to content for users
that choose the low cost path. We also obtain interesting price of anarchy
results that show some fundamental tradeoffs between achieving path diversity
and maintaining greater user participation, motivating a combined mechanism to
further increase the social welfare. Our model extends classical dynamic
routing in the case of externalities caused from traffic on different paths of
the network.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2016 08:29:19 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Li",
"Yunpeng",
""
],
[
"Courcoubetis",
"Costas",
""
],
[
"Duan",
"Lingjie",
""
]
] |
new_dataset
| 0.976394 |
1608.03410
|
Tatiana Tommasi
|
Tatiana Tommasi, Arun Mallya, Bryan Plummer, Svetlana Lazebnik,
Alexander C. Berg, Tamara L. Berg
|
Solving Visual Madlibs with Multiple Cues
|
accepted at BMVC 2016
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper focuses on answering fill-in-the-blank style multiple choice
questions from the Visual Madlibs dataset. Previous approaches to Visual
Question Answering (VQA) have mainly used generic image features from networks
trained on the ImageNet dataset, despite the wide scope of questions. In
contrast, our approach employs features derived from networks trained for
specialized tasks of scene classification, person activity prediction, and
person and object attribute prediction. We also present a method for selecting
sub-regions of an image that are relevant for evaluating the appropriateness of
a putative answer. Visual features are computed both from the whole image and
from local regions, while sentences are mapped to a common space using a simple
normalized canonical correlation analysis (CCA) model. Our results show a
significant improvement over the previous state of the art, and indicate that
answering different question types benefits from examining a variety of image
cues and carefully choosing informative image sub-regions.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2016 09:51:21 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Tommasi",
"Tatiana",
""
],
[
"Mallya",
"Arun",
""
],
[
"Plummer",
"Bryan",
""
],
[
"Lazebnik",
"Svetlana",
""
],
[
"Berg",
"Alexander C.",
""
],
[
"Berg",
"Tamara L.",
""
]
] |
new_dataset
| 0.96901 |
1608.03430
|
Bin Guo
|
Tong Xin, Bin Guo, Zhu Wang, Mingyang Li, Zhiwen Yu
|
FreeSense:Indoor Human Identification with WiFi Signals
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human identification plays an important role in human-computer interaction.
There have been numerous methods proposed for human identification (e.g., face
recognition, gait recognition, fingerprint identification, etc.). While these
methods could be very useful under different conditions, they also suffer from
certain shortcomings (e.g., user privacy, sensing coverage range). In this
paper, we propose a novel approach for human identification, which leverages
WIFI signals to enable non-intrusive human identification in domestic
environments. It is based on the observation that each person has specific
influence patterns to the surrounding WIFI signal while moving indoors,
regarding their body shape characteristics and motion patterns. The influence
can be captured by the Channel State Information (CSI) time series of WIFI.
Specifically, a combination of Principal Component Analysis (PCA), Discrete
Wavelet Transform (DWT) and Dynamic Time Warping (DTW) techniques is used for
CSI waveform-based human identification. We implemented the system in a 6m*5m
smart home environment and recruited 9 users for data collection and
evaluation. Experimental results indicate that the identification accuracy is
about 88.9% to 94.5% when the candidate user set changes from 6 to 2, showing
that the proposed human identification method is effective in domestic
environments.
|
[
{
"version": "v1",
"created": "Thu, 11 Aug 2016 12:05:07 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Xin",
"Tong",
""
],
[
"Guo",
"Bin",
""
],
[
"Wang",
"Zhu",
""
],
[
"Li",
"Mingyang",
""
],
[
"Yu",
"Zhiwen",
""
]
] |
new_dataset
| 0.991457 |
1301.6190
|
Kasper Fl{\o}e Trillingsgaard
|
Kasper Fl{\o}e Trillingsgaard, Osvaldo Simeone, Petar Popovski, Torben
Larsen
|
Blahut-Arimoto Algorithm and Code Design for Action-Dependent Source
Coding Problems
|
Extended version of a paper submitted to ISIT
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The source coding problem with action-dependent side information at the
decoder has recently been introduced to model data acquisition in
resource-constrained systems. In this paper, an efficient algorithm for
numerical computation of the rate-distortion-cost function for this problem is
proposed, and a convergence proof is provided. Moreover, a two-stage code
design based on multiplexing is put forth, whereby the first stage encodes the
actions and the second stage is composed of an array of classical Wyner-Ziv
codes, one for each action. Specific coding/decoding strategies are designed
based on LDGM codes and message passing. Through numerical examples, the
proposed code design is shown to achieve performance close to the lower bound
dictated by the rate-distortion-cost function.
|
[
{
"version": "v1",
"created": "Fri, 25 Jan 2013 23:02:15 GMT"
}
] | 2016-08-11T00:00:00 |
[
[
"Trillingsgaard",
"Kasper Fløe",
""
],
[
"Simeone",
"Osvaldo",
""
],
[
"Popovski",
"Petar",
""
],
[
"Larsen",
"Torben",
""
]
] |
new_dataset
| 0.998769 |
1306.1036
|
Sebastian B\"onisch
|
Sebastian B\"onisch, Michael Brickenstein, Hagen Chrapary, Gert-Martin
Greuel, Wolfram Sperber
|
swMATH - a new information service for mathematical software
|
see also: http://www.swmath.org
| null | null | null |
cs.DL cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An information service for mathematical software is presented. Publications
and software are two closely connected facets of mathematical knowledge. This
relation can be used to identify mathematical software and find relevant
information about it. The approach and the state of the art of the information
service are described here.
|
[
{
"version": "v1",
"created": "Wed, 5 Jun 2013 09:53:29 GMT"
}
] | 2016-08-11T00:00:00 |
[
[
"Bönisch",
"Sebastian",
""
],
[
"Brickenstein",
"Michael",
""
],
[
"Chrapary",
"Hagen",
""
],
[
"Greuel",
"Gert-Martin",
""
],
[
"Sperber",
"Wolfram",
""
]
] |
new_dataset
| 0.999444 |
1403.5912
|
Lucas Paletta
|
Bj\"orn Schuller, Erik Marchi, Simon Baron-Cohen, Helen O'Reilly,
Delia Pigat, Peter Robinson, Ian Daves
|
The state of play of ASC-Inclusion: An Integrated Internet-Based
Environment for Social Inclusion of Children with Autism Spectrum Conditions
| null | null | null |
IDGEI/2014/05
|
cs.HC cs.CV cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Individuals with Autism Spectrum Conditions (ASC) have marked difficulties
using verbal and non-verbal communication for social interaction. The running
ASC-Inclusion project aims to help children with ASC by allowing them to learn
how emotions can be expressed and recognised via playing games in a virtual
world. The platform includes analysis of users' gestures, facial, and vocal
expressions using standard microphone and web-cam or a depth sensor, training
through games, text communication with peers, animation, video and audio clips.
We present the state of play in realising such a serious game platform and
provide results for the different modalities.
|
[
{
"version": "v1",
"created": "Mon, 24 Mar 2014 11:09:27 GMT"
}
] | 2016-08-11T00:00:00 |
[
[
"Schuller",
"Björn",
""
],
[
"Marchi",
"Erik",
""
],
[
"Baron-Cohen",
"Simon",
""
],
[
"O'Reilly",
"Helen",
""
],
[
"Pigat",
"Delia",
""
],
[
"Robinson",
"Peter",
""
],
[
"Daves",
"Ian",
""
]
] |
new_dataset
| 0.998338 |
1603.03081
|
Jeffrey Pawlick
|
Jeffrey Pawlick and Quanyan Zhu
|
Two-Party Privacy Games: How Users Perturb When Learners Preempt
|
This conference paper was not accepted. It has been withdrawn because
it was subsequently revised and appears here arXiv:1608.02546
| null | null | null |
cs.CR cs.GT cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Internet tracking technologies and wearable electronics provide a vast amount
of data to machine learning algorithms. This stock of data stands to increase
with the developments of the internet of things and cyber-physical systems.
Clearly, these technologies promise benefits. But they also raise the risk of
sensitive information disclosure. To mitigate this risk, machine learning
algorithms can add noise to outputs according to the formulations provided by
differential privacy. At the same time, users can fight for privacy by
injecting noise into the data that they report. In this paper, we conceptualize
the interactions between privacy and accuracy and between user (input)
perturbation and learner (output) perturbation in machine learning, using the
frameworks of empirical risk minimization, differential privacy, and
Stackelberg games. In particular, we solve for the Stackelberg equilibrium for
the case of an averaging query. We find that, in equilibrium, either the users
perturb their data before submission or the learner perturbs the machine
learning output, but never both. Specifically, the learner perturbs if and only
if the number of users is greater than a threshold which increases with the
degree to which incentives are misaligned. Provoked by these conclusions - and
by some observations from privacy ethics - we also suggest future directions.
While other work in this area has studied privacy markets and mechanism design
for truthful reporting of user information, we take a different viewpoint by
considering both user and learner perturbation. We hope that this effort will
open the door to future work in the area of differential privacy games.
|
[
{
"version": "v1",
"created": "Wed, 9 Mar 2016 22:09:56 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Aug 2016 17:10:28 GMT"
}
] | 2016-08-11T00:00:00 |
[
[
"Pawlick",
"Jeffrey",
""
],
[
"Zhu",
"Quanyan",
""
]
] |
new_dataset
| 0.998109 |
1608.02644
|
Daniel Whalen
|
Daniel Whalen
|
Holophrasm: a neural Automated Theorem Prover for higher-order logic
|
9 pages, 1 figure
| null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
I propose a system for Automated Theorem Proving in higher order logic using
deep learning and eschewing hand-constructed features. Holophrasm exploits the
formalism of the Metamath language and explores partial proof trees using a
neural-network-augmented bandit algorithm and a sequence-to-sequence model for
action enumeration. The system proves 14% of its test theorems from Metamath's
set.mm module.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2016 22:33:13 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Aug 2016 03:22:11 GMT"
}
] | 2016-08-11T00:00:00 |
[
[
"Whalen",
"Daniel",
""
]
] |
new_dataset
| 0.998925 |
1608.02991
|
Eriglen Gani
|
Eriglen Gani, Alda Kika
|
Albanian Sign Language (AlbSL) Number Recognition from Both Hand's
Gestures Acquired by Kinect Sensors
| null | null |
10.14569/IJACSA.2016.070729
| null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Albanian Sign Language (AlbSL) is relatively new and until now there doesn't
exist a system that is able to recognize Albanian signs by using natural user
interfaces (NUI). The aim of this paper is to present a real-time gesture
recognition system that is able to automatically recognize number signs for
Albanian Sign Language, captured from signer's both hands. Kinect device is
used to obtain data streams. Every pixel generated from Kinect device contains
depth data information which is used to construct a depth map. Hands
segmentation process is performed by applying a threshold constant to depth
map. In order to differentiate signer's hands a K-means clustering algorithm is
applied to partition pixels into two groups corresponding to each signer's
hands. Centroid distance function is calculated in each hand after extracting
hand's contour pixels. Fourier descriptors, derived form centroid distance is
used as a hand shape representation. For each number gesture there are 15
Fourier descriptors coefficients generated which represent uniquely that
gesture. Every input data is compared against training data set by calculating
Euclidean distance, using Fourier coefficients. Sign with the lowest Euclidean
distance is considered as a match. The system is able to recognize number signs
captured from one hand or both hands. When both signer's hands are used, some
of the methodology processes are executed in parallel in order to improve the
overall performance. The proposed system achieves an accuracy of 91% and is
able to process 55 frames per second.
|
[
{
"version": "v1",
"created": "Tue, 9 Aug 2016 22:14:23 GMT"
}
] | 2016-08-11T00:00:00 |
[
[
"Gani",
"Eriglen",
""
],
[
"Kika",
"Alda",
""
]
] |
new_dataset
| 0.999675 |
1608.02993
|
Anton Monk
|
Anton Monk, Ronny Hadani, Michail Tsatsanis, Shlomo Rakib
|
OTFS - Orthogonal Time Frequency Space
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce a new 2D modulation technique called OTFS
(Orthogonal Time Frequency & Space) that transforms information carried in the
Delay-Doppler coordinate system to the familiar time-frequency domain utilized
by traditional modulation schemes such as OFDM, CDMA and TDMA. OTFS converts
the fading, time-varying wireless channel into a non-fading, time-independent
interaction revealing the underlying geometry of the wireless channel. In this
new formulation, all QAM symbols experience the same channel and all
Delay-Doppler diversity branches of the channel are coherently combined.
Reference signal multiplexing is done in the time-independent Delay-Doppler
domain, achieving high density pilot packing, which is a crucial requirement
for Massive MIMO. Regardless of the Doppler scenario, OTFS enables approaching
channel capacity through linear scaling of throughput with MIMO order, thus
realizing the full promise of Massive MIMO throughput gains even in challenging
5G deployment settings.
|
[
{
"version": "v1",
"created": "Tue, 9 Aug 2016 22:18:00 GMT"
}
] | 2016-08-11T00:00:00 |
[
[
"Monk",
"Anton",
""
],
[
"Hadani",
"Ronny",
""
],
[
"Tsatsanis",
"Michail",
""
],
[
"Rakib",
"Shlomo",
""
]
] |
new_dataset
| 0.999357 |
1608.03027
|
Cunsheng Ding
|
Hao Liu, Cunsheng Ding, Chengju Li
|
Dimensions of three types of BCH codes over GF(q)
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
BCH codes have been studied for over fifty years and widely employed in
consumer devices, communication systems, and data storage systems. However, the
dimension of BCH codes is settled only for a very small number of cases. In
this paper, we study the dimensions of BCH codes over finite fields with three
types of lengths $n$, namely $n=q^m-1$, $n=(q^m-1)/(q-1)$ and $n=q^m+1$. For
narrow-sense primitive BCH codes with designed distance $\delta$, we
investigate their dimensions for $\delta$ in the range $1\le \delta \le
q^{\lceil\frac{m}{2}\rceil+1}$. For non-narrow sense primitive BCH codes, we
provide two general formulas on their dimensions and give the dimensions
explicitly in some cases. Furthermore, we settle the minimum distances of some
primitive BCH codes. We also explore the dimensions of the BCH codes of lengths
$n=(q^m-1)/(q-1)$ and $n=q^m+1$ over finite fields.
|
[
{
"version": "v1",
"created": "Wed, 10 Aug 2016 02:10:44 GMT"
}
] | 2016-08-11T00:00:00 |
[
[
"Liu",
"Hao",
""
],
[
"Ding",
"Cunsheng",
""
],
[
"Li",
"Chengju",
""
]
] |
new_dataset
| 0.986073 |
1608.03049
|
Ziwei Liu
|
Ziwei Liu, Sijie Yan, Ping Luo, Xiaogang Wang, Xiaoou Tang
|
Fashion Landmark Detection in the Wild
|
To appear in European Conference on Computer Vision (ECCV) 2016
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Visual fashion analysis has attracted many attentions in the recent years.
Previous work represented clothing regions by either bounding boxes or human
joints. This work presents fashion landmark detection or fashion alignment,
which is to predict the positions of functional key points defined on the
fashion items, such as the corners of neckline, hemline, and cuff. To encourage
future studies, we introduce a fashion landmark dataset with over 120K images,
where each image is labeled with eight landmarks. With this dataset, we study
fashion alignment by cascading multiple convolutional neural networks in three
stages. These stages gradually improve the accuracies of landmark predictions.
Extensive experiments demonstrate the effectiveness of the proposed method, as
well as its generalization ability to pose estimation. Fashion landmark is also
compared to clothing bounding boxes and human joints in two applications,
fashion attribute prediction and clothes retrieval, showing that fashion
landmark is a more discriminative representation to understand fashion images.
|
[
{
"version": "v1",
"created": "Wed, 10 Aug 2016 05:07:10 GMT"
}
] | 2016-08-11T00:00:00 |
[
[
"Liu",
"Ziwei",
""
],
[
"Yan",
"Sijie",
""
],
[
"Luo",
"Ping",
""
],
[
"Wang",
"Xiaogang",
""
],
[
"Tang",
"Xiaoou",
""
]
] |
new_dataset
| 0.999267 |
1608.03140
|
Weiwei Wan
|
Weiwei Wan, Hisashi Igawa, Kensuke Harada, Zepei Wu, Hiromu Onda,
Kazuyuki Nagata, Natsuki Yamanobe
|
A Mid-level Planning System for Object Reorientation
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a mid-level planning system for object reorientation. It
includes a grasp planner, a placement planner, and a regrasp sequence solver.
Given the initial and goal poses of an object, the mid-level planning system
finds a sequence of hand configurations that reorient the object from the
initial to the goal. This mid-level planning system is open to low-level motion
planning algorithm by providing two end-effector poses as the input. It is also
open to high-level symbolic planners by providing interface functions like
placing an object to a given position at a given rotation. The planning system
is demonstrated with several simulation examples and real-robot executions
using a Kawada Hiro robot and Robotiq 85 grippers.
|
[
{
"version": "v1",
"created": "Wed, 10 Aug 2016 11:44:49 GMT"
}
] | 2016-08-11T00:00:00 |
[
[
"Wan",
"Weiwei",
""
],
[
"Igawa",
"Hisashi",
""
],
[
"Harada",
"Kensuke",
""
],
[
"Wu",
"Zepei",
""
],
[
"Onda",
"Hiromu",
""
],
[
"Nagata",
"Kazuyuki",
""
],
[
"Yamanobe",
"Natsuki",
""
]
] |
new_dataset
| 0.997718 |
1503.08413
|
Michal Yemini
|
Michal Yemini, Anelia Somekh-Baruch and Amir Leshem
|
On the Multiple Access Channel with Asynchronous Cognition
|
arXiv admin note: substantial text overlap with arXiv:1402.1617
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce the two-user asynchronous cognitive multiple
access channel (ACMAC). This channel model includes two transmitters, an
uninformed one, and an informed one which knows prior to the beginning of a
transmission the message which the uninformed transmitter is about to send. We
assume that the channel from the uninformed transmitter to the receiver suffers
a fixed but unknown delay. We further introduce a modified model, referred to
as the asynchronous codeword cognitive multiple access channel (ACC-MAC), which
differs from the ACMAC in that the informed user knows the signal that is to be
transmitted by the other user, rather than the message that it is about to
transmit. We state inner and outer bounds on the ACMAC and the ACC-MAC capacity
regions, and we specialize the results to the Gaussian case. Further, we
characterize the capacity regions of these channels in terms of multi-letter
expressions. Finally, we provide an example which instantiates the difference
between message side-information and codeword side-information.
|
[
{
"version": "v1",
"created": "Sun, 29 Mar 2015 09:56:45 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Aug 2016 11:03:49 GMT"
}
] | 2016-08-10T00:00:00 |
[
[
"Yemini",
"Michal",
""
],
[
"Somekh-Baruch",
"Anelia",
""
],
[
"Leshem",
"Amir",
""
]
] |
new_dataset
| 0.976602 |
1603.09672
|
P\'eter V\'arkonyi
|
P\'eter L. V\'arkonyi and Yizhar Or
|
Lyapunov stability of a rigid body with two frictional contacts
| null | null | null | null |
cs.SY cs.RO math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Lyapunov stability of a mechanical system means that the dynamic response
stays bounded in an arbitrarily small neighborhood of a static equilibrium
configuration under small perturbations in positions and velocities. This type
of stability is highly desired in robotic applications that involve multiple
unilateral contacts. Nevertheless, Lyapunov stability analysis of such systems
is extremely difficult, because even small perturbations may result in hybrid
dynamics where the solution involves many nonsmooth transitions between
different contact states. This paper concerns with Lyapunov stability analysis
of a planar rigid body with two frictional unilateral contacts under inelastic
impacts, for a general class of equilibrium configurations under a constant
external load. The hybrid dynamics of the system under contact transitions and
impacts is formulated, and a \Poincare map at two-contact states is introduced.
Using invariance relations, this \Poincare map is reduced into two
semi-analytic scalar functions that entirely encode the dynamic behavior of
solutions under any small initial perturbation. These two functions enable
determination of Lyapunov stability or instability for almost any equilibrium
state. The results are demonstrated via simulation examples and by plotting
stability and instability regions in two-dimensional parameter spaces that
describe the contact geometry and external load.
|
[
{
"version": "v1",
"created": "Wed, 30 Mar 2016 15:39:51 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Aug 2016 11:29:23 GMT"
}
] | 2016-08-10T00:00:00 |
[
[
"Várkonyi",
"Péter L.",
""
],
[
"Or",
"Yizhar",
""
]
] |
new_dataset
| 0.988665 |
1608.02687
|
Li Shuxing
|
Shuxing Li and Gennian Ge
|
Constructions of Maximum Distance Separable Symbol-Pair Codes Using
Cyclic and Constacyclic Codes
|
16 pages, Designs, Codes, and Cryptography, Accepted
| null | null | null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Symbol-pair code is a new coding framework which is proposed to correct
errors in the symbol-pair read channel. In particular, maximum distance
separable (MDS) symbol-pair codes are a kind of symbol-pair codes with the best
possible error-correction capability. Employing cyclic and constacyclic codes,
we construct three new classes of MDS symbol-pair codes with minimum
pair-distance five or six. Moreover, we find a necessary and sufficient
condition which ensures a class of cyclic codes to be MDS symbol-pair codes.
This condition is related to certain property of a special kind of linear
fractional transformations. A detailed analysis on these linear fractional
transformations leads to an algorithm, which produces many MDS symbol-pair
codes with minimum pair-distance seven.
|
[
{
"version": "v1",
"created": "Tue, 9 Aug 2016 04:11:42 GMT"
}
] | 2016-08-10T00:00:00 |
[
[
"Li",
"Shuxing",
""
],
[
"Ge",
"Gennian",
""
]
] |
new_dataset
| 0.99898 |
1608.02800
|
Harsh Thakkar
|
Harsh Thakkar, Mohnish Dubey, Gezim Sejdiu, Axel-Cyrille Ngonga Ngomo,
Jeremy Debattista, Christoph Lange, Jens Lehmann, S\"oren Auer, Maria-Esther
Vidal
|
LITMUS: An Open Extensible Framework for Benchmarking RDF Data
Management Solutions
|
8 pages, 1 figure, position paper
| null | null | null |
cs.PF cs.DB
|
http://creativecommons.org/licenses/by/4.0/
|
Developments in the context of Open, Big, and Linked Data have led to an
enormous growth of structured data on the Web. To keep up with the pace of
efficient consumption and management of the data at this rate, many data
Management solutions have been developed for specific tasks and applications.
We present LITMUS, a framework for benchmarking data management solutions.
LITMUS goes beyond classical storage benchmarking frameworks by allowing for
analysing the performance of frameworks across query languages. In this
position paper we present the conceptual architecture of LITMUS as well as the
considerations that led to this architecture.
|
[
{
"version": "v1",
"created": "Tue, 9 Aug 2016 13:40:59 GMT"
}
] | 2016-08-10T00:00:00 |
[
[
"Thakkar",
"Harsh",
""
],
[
"Dubey",
"Mohnish",
""
],
[
"Sejdiu",
"Gezim",
""
],
[
"Ngomo",
"Axel-Cyrille Ngonga",
""
],
[
"Debattista",
"Jeremy",
""
],
[
"Lange",
"Christoph",
""
],
[
"Lehmann",
"Jens",
""
],
[
"Auer",
"Sören",
""
],
[
"Vidal",
"Maria-Esther",
""
]
] |
new_dataset
| 0.998875 |
1608.02858
|
Jan Drchal
|
Jan Mrkos, Jan Drchal, Malcolm Egan, Michal Jakob
|
Liftago On-Demand Transport Dataset and Market Formation Algorithm Based
on Machine Learning
|
9 pages, 2 figures, supplemental information for a journal paper
| null | null | null |
cs.AI cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This document serves as a technical report for the analysis of on-demand
transport dataset. Moreover we show how the dataset can be used to develop a
market formation algorithm based on machine learning. Data used in this work
comes from Liftago, a Prague based company which connects taxi drivers and
customers through a smartphone app. The dataset is analysed from the
machine-learning perspective: we give an overview of features available as well
as results of feature ranking. Later we propose the SImple Data-driven MArket
Formation (SIDMAF) algorithm which aims to improve a relevance while connecting
customers with relevant drivers. We compare the heuristics currently used by
Liftago with SIDMAF using two key performance indicators.
|
[
{
"version": "v1",
"created": "Tue, 9 Aug 2016 16:33:03 GMT"
}
] | 2016-08-10T00:00:00 |
[
[
"Mrkos",
"Jan",
""
],
[
"Drchal",
"Jan",
""
],
[
"Egan",
"Malcolm",
""
],
[
"Jakob",
"Michal",
""
]
] |
new_dataset
| 0.999794 |
1503.04706
|
Tilen Marc
|
Tilen Marc
|
There are no finite partial cubes of girth more than 6 and minimum
degree at least 3
| null | null |
10.1016/j.ejc.2016.01.005
| null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Partial cubes are graphs isometrically embeddable into hypercubes. We analyze
how isometric cycles in partial cubes behave and derive that every partial cube
of girth more than 6 must have vertices of degree less than 3. As a direct
corollary we get that every regular partial cube of girth more than 6 is an
even cycle. Along the way we prove that every partial cube $G$ with girth more
than 6 is a tree-zone graph and therefore $2n(G)-m(G)-i(G)+ce(G)=2$ holds,
where $i(G)$ is the isometric dimension of $G$ and $ce(G)$ its convex excess.
|
[
{
"version": "v1",
"created": "Mon, 16 Mar 2015 16:09:45 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jul 2016 13:43:06 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Marc",
"Tilen",
""
]
] |
new_dataset
| 0.991248 |
1511.06739
|
Varun Jampani
|
Raghudeep Gadde and Varun Jampani and Martin Kiefel and Daniel Kappler
and Peter V. Gehler
|
Superpixel Convolutional Networks using Bilateral Inceptions
|
European Conference on Computer Vision (ECCV), 2016
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose a CNN architecture for semantic image segmentation.
We introduce a new 'bilateral inception' module that can be inserted in
existing CNN architectures and performs bilateral filtering, at multiple
feature-scales, between superpixels in an image. The feature spaces for
bilateral filtering and other parameters of the module are learned end-to-end
using standard backpropagation techniques. The bilateral inception module
addresses two issues that arise with general CNN segmentation architectures.
First, this module propagates information between (super) pixels while
respecting image edges, thus using the structured information of the problem
for improved results. Second, the layer recovers a full resolution segmentation
result from the lower resolution solution of a CNN. In the experiments, we
modify several existing CNN architectures by inserting our inception module
between the last CNN (1x1 convolution) layers. Empirical results on three
different datasets show reliable improvements not only in comparison to the
baseline networks, but also in comparison to several dense-pixel prediction
techniques such as CRFs, while being competitive in time.
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2015 19:58:38 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Dec 2015 10:43:52 GMT"
},
{
"version": "v3",
"created": "Fri, 8 Jan 2016 09:10:31 GMT"
},
{
"version": "v4",
"created": "Fri, 5 Aug 2016 09:14:18 GMT"
},
{
"version": "v5",
"created": "Mon, 8 Aug 2016 15:31:14 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Gadde",
"Raghudeep",
""
],
[
"Jampani",
"Varun",
""
],
[
"Kiefel",
"Martin",
""
],
[
"Kappler",
"Daniel",
""
],
[
"Gehler",
"Peter V.",
""
]
] |
new_dataset
| 0.997548 |
1604.02135
|
Sergey Zagoruyko
|
Sergey Zagoruyko, Adam Lerer, Tsung-Yi Lin, Pedro O. Pinheiro, Sam
Gross, Soumith Chintala, Piotr Doll\'ar
|
A MultiPath Network for Object Detection
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The recent COCO object detection dataset presents several new challenges for
object detection. In particular, it contains objects at a broad range of
scales, less prototypical images, and requires more precise localization. To
address these challenges, we test three modifications to the standard Fast
R-CNN object detector: (1) skip connections that give the detector access to
features at multiple network layers, (2) a foveal structure to exploit object
context at multiple object resolutions, and (3) an integral loss function and
corresponding network adjustment that improve localization. The result of these
modifications is that information can flow along multiple paths in our network,
including through features from multiple network layers and from multiple
object views. We refer to our modified classifier as a "MultiPath" network. We
couple our MultiPath network with DeepMask object proposals, which are well
suited for localization and small objects, and adapt our pipeline to predict
segmentation masks in addition to bounding boxes. The combined system improves
results over the baseline Fast R-CNN detector with Selective Search by 66%
overall and by 4x on small objects. It placed second in both the COCO 2015
detection and segmentation challenges.
|
[
{
"version": "v1",
"created": "Thu, 7 Apr 2016 19:43:47 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Aug 2016 13:29:02 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Zagoruyko",
"Sergey",
""
],
[
"Lerer",
"Adam",
""
],
[
"Lin",
"Tsung-Yi",
""
],
[
"Pinheiro",
"Pedro O.",
""
],
[
"Gross",
"Sam",
""
],
[
"Chintala",
"Soumith",
""
],
[
"Dollár",
"Piotr",
""
]
] |
new_dataset
| 0.999634 |
1607.08086
|
Navid Khoshavi
|
Navid Khoshavi, Xunchao Chen, Jun Wang, and Ronald F. DeMara
|
Read-Tuned STT-RAM and eDRAM Cache Hierarchies for Throughput and Energy
Enhancement
| null | null | null | null |
cs.AR cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As capacity and complexity of on-chip cache memory hierarchy increases, the
service cost to the critical loads from Last Level Cache (LLC), which are
frequently repeated, has become a major concern. The processor may stall for a
considerable interval while waiting to access the data stored in the cache
blocks in LLC, if there are no independent instructions to execute. To provide
accelerated service to the critical loads requests from LLC, this work
concentrates on leveraging the additional capacity offered by replacing
SRAM-based L2 with Spin-Transfer Torque Random Access Memory (STT-RAM) to
accommodate frequently accessed cache blocks in exclusive read mode in favor of
reducing the overall read service time. Our proposed technique partitions L2
cache into two STT-RAM arrangements with different write performance and data
retention time. The retention-relaxed STT-RAM arrays are utilized to
effectively deal with the regular L2 cache requests while the high retention
STT-RAM arrays in L2 are selected for maintaining repeatedly read accessed
cache blocks from LLC by incurring negligible energy consumption for data
retention. Our experimental results show that the proposed technique can reduce
the mean L2 read miss ratio by 51.4% and increase the IPC by 11.7% on average
across PARSEC benchmark suite while significantly decreasing the total L2
energy consumption compared to conventional SRAM-based L2 design.
|
[
{
"version": "v1",
"created": "Wed, 27 Jul 2016 13:37:30 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Aug 2016 23:30:40 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Khoshavi",
"Navid",
""
],
[
"Chen",
"Xunchao",
""
],
[
"Wang",
"Jun",
""
],
[
"DeMara",
"Ronald F.",
""
]
] |
new_dataset
| 0.995817 |
1608.02094
|
Leon Derczynski
|
Leon Derczynski
|
Desiderata for Vector-Space Word Representations
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A plethora of vector-space representations for words is currently available,
which is growing. These consist of fixed-length vectors containing real values,
which represent a word. The result is a representation upon which the power of
many conventional information processing and data mining techniques can be
brought to bear, as long as the representations are designed with some
forethought and fit certain constraints. This paper details desiderata for the
design of vector space representations of words.
|
[
{
"version": "v1",
"created": "Sat, 6 Aug 2016 10:47:05 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Derczynski",
"Leon",
""
]
] |
new_dataset
| 0.999385 |
1608.02165
|
Vladislav Voroninski
|
Thomas Goldstein, Paul Hand, Choongbum Lee, Vladislav Voroninski,
Stefano Soatto
|
ShapeFit and ShapeKick for Robust, Scalable Structure from Motion
| null | null | null | null |
cs.CV cs.AI math.NA math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new method for location recovery from pair-wise directions
that leverages an efficient convex program that comes with exact recovery
guarantees, even in the presence of adversarial outliers. When pairwise
directions represent scaled relative positions between pairs of views
(estimated for instance with epipolar geometry) our method can be used for
location recovery, that is the determination of relative pose up to a single
unknown scale. For this task, our method yields performance comparable to the
state-of-the-art with an order of magnitude speed-up. Our proposed numerical
framework is flexible in that it accommodates other approaches to location
recovery and can be used to speed up other methods. These properties are
demonstrated by extensively testing against state-of-the-art methods for
location recovery on 13 large, irregular collections of images of real scenes
in addition to simulated data with ground truth.
|
[
{
"version": "v1",
"created": "Sun, 7 Aug 2016 00:29:53 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Goldstein",
"Thomas",
""
],
[
"Hand",
"Paul",
""
],
[
"Lee",
"Choongbum",
""
],
[
"Voroninski",
"Vladislav",
""
],
[
"Soatto",
"Stefano",
""
]
] |
new_dataset
| 0.981517 |
1608.02169
|
Cunsheng Ding
|
Shuxing Li, Cunsheng Ding, and Hao Liu
|
A Family of Reversible BCH Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cyclic codes are an interesting class of linear codes due to their efficient
encoding and decoding algorithms as well as their theoretical importance. BCH
codes form a subclass of cyclic codes and are very important in both theory and
practice as they have good error-correcting capability and are widely used in
communication systems, storage devices and consumer electronics. However, the
dimension and minimum distance of BCH codes are not known in general. The
objective of this paper is to study the dimension and minimum distance of a
family of BCH codes over finite fields, i.e., a class of reversible BCH codes.
|
[
{
"version": "v1",
"created": "Sun, 7 Aug 2016 01:43:30 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Li",
"Shuxing",
""
],
[
"Ding",
"Cunsheng",
""
],
[
"Liu",
"Hao",
""
]
] |
new_dataset
| 0.99881 |
1608.02287
|
David Cox
|
David Cox
|
Delta Epsilon Alpha Star: A PAC-Admissible Search Algorithm
|
8 pages, 0 figures
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Delta Epsilon Alpha Star is a minimal coverage, real-time robotic search
algorithm that yields a moderately aggressive search path with minimal
backtracking. Search performance is bounded by a placing a combinatorial bound,
epsilon and delta, on the maximum deviation from the theoretical shortest path
and the probability at which further deviations can occur. Additionally, we
formally define the notion of PAC-admissibility -- a relaxed admissibility
criteria for algorithms, and show that PAC-admissible algorithms are better
suited to robotic search situations than epsilon-admissible or strict
algorithms.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2016 00:14:50 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Cox",
"David",
""
]
] |
new_dataset
| 0.998225 |
1608.02289
|
Rossano Schifanella
|
Rossano Schifanella, Paloma de Juan, Joel Tetreault, Liangliang Cao
|
Detecting Sarcasm in Multimodal Social Platforms
|
10 pages, 3 figures, final version published in the Proceedings of
ACM Multimedia 2016
| null |
10.1145/2964284.2964321
| null |
cs.CV cs.CL cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sarcasm is a peculiar form of sentiment expression, where the surface
sentiment differs from the implied sentiment. The detection of sarcasm in
social media platforms has been applied in the past mainly to textual
utterances where lexical indicators (such as interjections and intensifiers),
linguistic markers, and contextual information (such as user profiles, or past
conversations) were used to detect the sarcastic tone. However, modern social
media platforms allow to create multimodal messages where audiovisual content
is integrated with the text, making the analysis of a mode in isolation
partial. In our work, we first study the relationship between the textual and
visual aspects in multimodal posts from three major social media platforms,
i.e., Instagram, Tumblr and Twitter, and we run a crowdsourcing task to
quantify the extent to which images are perceived as necessary by human
annotators. Moreover, we propose two different computational frameworks to
detect sarcasm that integrate the textual and visual modalities. The first
approach exploits visual semantics trained on an external dataset, and
concatenates the semantics features with state-of-the-art textual features. The
second method adapts a visual neural network initialized with parameters
trained on ImageNet to multimodal sarcastic posts. Results show the positive
effect of combining modalities for the detection of sarcasm across platforms
and methods.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2016 00:59:03 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Schifanella",
"Rossano",
""
],
[
"de Juan",
"Paloma",
""
],
[
"Tetreault",
"Joel",
""
],
[
"Cao",
"Liangliang",
""
]
] |
new_dataset
| 0.997887 |
1608.02291
|
Guillermo Morales-Luna
|
Aleksey Zhuvikin and Valery Korzhik and Guillermo Morales-Luna
|
Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization
| null | null | null | null |
cs.MM cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is a great adventure of watermarking usage in the context of
conventional authentication since it does not require additional storage space
for supplementary metadata. However JPEG compression, being a conventional
method to compress images, leads to exact authentication breaking. We discuss a
semi-fragile watermarking system for digital images tolerant to JPEG/JPEG2000
compression. Recently we have published a selective authentication method based
on Zernike moments. But unfortunately it has large computational complexity and
not sufficiently good detection of small image modifications. In the current
paper it is proposed (in contrast to Zernike moments approach) the usage of
image finite differences and 3-bit quantization as the main technique. In order
to embed a watermark (WM) into the image, some areas of the Haar wavelet
transform coefficients are used. Simulation results show a good resistance of
this method to JPEG compression with $\mbox{\rm CR}\leq 30\%$ (Compression
Ratio), high probability of small image modification recognition, image quality
assessments $\mbox{\rm PSNR}\geq 40$ (Peak signal-to-noise ratio) dB and
$\mbox{\rm SSIM}\geq 0.98$ (Structural Similarity Index Measure) after
embedding and lower computation complexity of WM embedding and extraction. All
these properties qualify this approach as effective.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2016 01:10:11 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Zhuvikin",
"Aleksey",
""
],
[
"Korzhik",
"Valery",
""
],
[
"Morales-Luna",
"Guillermo",
""
]
] |
new_dataset
| 0.968305 |
1608.02337
|
Kyung Jun Choi
|
Kyung Jun Choi, Kwang Soon Kim
|
Large-Scale Cloud Radio Access Networks with Practical Constraints:
Asymptotic Analysis and Its Implications
|
submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large-scale cloud radio access network (LS-CRAN) is a highly promising
next-generation cellular network architecture whereby lots of base stations
(BSs) equipped with a massive antenna array are connected to a cloud-computing
based central processor unit via digital front/backhaul links. This paper
studies an asymptotic behavior of downlink (DL) performance of a LS-CRAN with
three practical constraints: 1) limited transmit power, 2) limited
front/backhaul capacity, and 3) limited pilot resource. As an asymptotic
performance measure, the scaling exponent of the
signal-to-interference-plus-noise-ratio (SINR) is derived for interference-free
(IF), maximum-ratio transmission (MRT), and zero-forcing (ZF) operations. Our
asymptotic analysis reveals four fundamental operating regimes and the
performances of both MRT and ZF operations are fundamentally limited by the UL
transmit power for estimating user's channel state information, not the DL
transmit power. We obtain the conditions that MRT or ZF operation becomes
interference-free, i.e., order-optimal with three practical constraints.
Specifically, as higher UL transmit power is provided, more users can be
associated and the data rate per user can be increased simultaneously while
keeping the order-optimality as long as the total front/backhaul overhead is
$\Omega(N^{\eta_{\rm{bs}}+\eta_{\rm{ant}}+\eta_{\rm{user}}+\frac{2}{\alpha}\rho^{\rm{ul}}})$
and $\Omega(N^{\eta_{\rm{user}}-\eta_{\rm{bs}}})$ pilot resources are
available. It is also shown that how the target quality-of-service (QoS) in
terms of SINR and the number of users satisfying the target QoS can
simultaneously grow as the network size increases and the way how the network
size increases under the practical constraints, which can provide meaningful
insights for future cellular systems.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2016 07:11:11 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Choi",
"Kyung Jun",
""
],
[
"Kim",
"Kwang Soon",
""
]
] |
new_dataset
| 0.996902 |
1608.02388
|
Mohamed Ali Mahjoub
|
Ibtissem Hadj Ali, Mohammed Ali Mahjoub
|
Database of handwritten Arabic mathematical formulas images
|
CGIV 2016
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Although publicly available, ground-truthed database have proven useful for
training, evaluating, and comparing recognition systems in many domains, the
availability of such database for handwritten Arabic mathematical formula
recognition in particular, is currently quite poor. In this paper, we present a
new public database that contains mathematical expressions available in their
off-line handwritten form. Here, we describe the different steps that allowed
us to acquire this database, from the creation of the mathematical expression
corpora to the transcription of the collected data. Currently, the dataset
contains 4 238 off-line handwritten mathematical expressions written by 66
writers and 20 300 handwritten isolated symbol images. The ground truth is also
provided for the handwritten expressions as XML files with the number of
symbols, and the MATHML structure.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2016 11:30:35 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Ali",
"Ibtissem Hadj",
""
],
[
"Mahjoub",
"Mohammed Ali",
""
]
] |
new_dataset
| 0.999846 |
1608.02450
|
Daniele Theseider Dupr\'e
|
Laura Giordano and Daniele Theseider Dupr\'e
|
ASP for Minimal Entailment in a Rational Extension of SROEL
|
Paper presented at the 32nd International Conference on Logic
Programming (ICLP 2016), New York City, USA, 16-21 October 2016
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we exploit Answer Set Programming (ASP) for reasoning in a
rational extension SROEL-R-T of the low complexity description logic SROEL,
which underlies the OWL EL ontology language. In the extended language, a
typicality operator T is allowed to define concepts T(C) (typical C's) under a
rational semantics. It has been proven that instance checking under rational
entailment has a polynomial complexity. To strengthen rational entailment, in
this paper we consider a minimal model semantics. We show that, for arbitrary
SROEL-R-T knowledge bases, instance checking under minimal entailment is
\Pi^P_2-complete. Relying on a Small Model result, where models correspond to
answer sets of a suitable ASP encoding, we exploit Answer Set Preferences (and,
in particular, the asprin framework) for reasoning under minimal entailment.
The paper is under consideration for acceptance in Theory and Practice of Logic
Programming.
|
[
{
"version": "v1",
"created": "Mon, 8 Aug 2016 14:26:46 GMT"
}
] | 2016-08-09T00:00:00 |
[
[
"Giordano",
"Laura",
""
],
[
"Dupré",
"Daniele Theseider",
""
]
] |
new_dataset
| 0.972703 |
1307.4215
|
Lorenzo Fagiano
|
Lorenzo Fagiano and Trevor Marks
|
Design of a small-scale prototype for research in airborne wind energy
|
This manuscript is a preprint of a paper submitted for possible
publication on the IEEE/ASME Transactions on Mechatronics and is subject to
IEEE Copyright. If accepted, the copy of record will be available at
IEEEXplore library: http://ieeexplore.ieee.org/
|
IEEE/ASME Transactions on Mechatronics, Volume:20 , Issue: 1,
Pages 166 - 177, 2015
|
10.1109/TMECH.2014.2322761
| null |
cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Airborne wind energy is a new renewable technology that promises to deliver
electricity at low costs and in large quantities. Despite the steadily growing
interest in this field, very limited results with real-world data have been
reported so far, due to the difficulty faced by researchers when realizing an
experimental setup. Indeed airborne wind energy prototypes are mechatronic
devices involving many multidisciplinary aspects, for which there are currently
no established design guidelines. With the aim of making research in airborne
wind energy accessible to a larger number of researchers, this work provides
such guidelines for a small-scale prototype. The considered system has no
energy generation capabilities, but it can be realized at low costs, used with
little restrictions and it allows one to test many aspects of the technology,
from sensors to actuators to wing design and materials. In addition to the
guidelines, the paper provides the details of the design and costs of an
experimental setup realized at the University of California, Santa Barbara, and
successfully used to develop and test sensor fusion and automatic control
solutions.
|
[
{
"version": "v1",
"created": "Tue, 16 Jul 2013 09:31:31 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Fagiano",
"Lorenzo",
""
],
[
"Marks",
"Trevor",
""
]
] |
new_dataset
| 0.999632 |
1312.0984
|
Matthias W\"ahlisch
|
Heiner Perrey, Martin Landsmann, Osman Ugus, Thomas C. Schmidt,
Matthias W\"ahlisch
|
TRAIL: Topology Authentication in RPL
| null | null | null | null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) was recently
introduced as the new routing standard for the Internet of Things. Although RPL
defines basic security modes, it remains vulnerable to topological attacks
which facilitate blackholing, interception, and resource exhaustion. We are
concerned with analyzing the corresponding threats and protecting future RPL
deployments from such attacks.
Our contributions are twofold. First, we analyze the state of the art, in
particular the protective scheme VeRA and present two new rank order attacks as
well as extensions to mitigate them. Second, we derive and evaluate TRAIL, a
generic scheme for topology authentication in RPL. TRAIL solely relies on the
basic assumptions of RPL that (1) the root node serves as a trust anchor and
(2) each node interconnects to the root as part of a hierarchy. Using proper
reachability tests, TRAIL scalably and reliably identifies any topological
attacker without strong cryptographic efforts.
|
[
{
"version": "v1",
"created": "Tue, 3 Dec 2013 23:46:08 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Dec 2015 21:42:07 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Perrey",
"Heiner",
""
],
[
"Landsmann",
"Martin",
""
],
[
"Ugus",
"Osman",
""
],
[
"Schmidt",
"Thomas C.",
""
],
[
"Wählisch",
"Matthias",
""
]
] |
new_dataset
| 0.983483 |
1503.00336
|
Temur Kutsia
|
Besik Dundua, M\'ario Florido, Temur Kutsia, and Mircea Marin
|
CLP(H): Constraint Logic Programming for Hedges
|
To appear in Theory and Practice of Logic Programming (TPLP)
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
CLP(H) is an instantiation of the general constraint logic programming scheme
with the constraint domain of hedges. Hedges are finite sequences of unranked
terms, built over variadic function symbols and three kinds of variables: for
terms, for hedges, and for function symbols. Constraints involve equations
between unranked terms and atoms for regular hedge language membership. We
study algebraic semantics of CLP(H) programs, define a sound, terminating, and
incomplete constraint solver, investigate two fragments of constraints for
which the solver returns a complete set of solutions, and describe classes of
programs that generate such constraints.
|
[
{
"version": "v1",
"created": "Sun, 1 Mar 2015 19:16:53 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Dundua",
"Besik",
""
],
[
"Florido",
"Mário",
""
],
[
"Kutsia",
"Temur",
""
],
[
"Marin",
"Mircea",
""
]
] |
new_dataset
| 0.99971 |
1504.07838
|
Peter Bezd\u{e}k
|
Nikola Bene\v{s}, Peter Bezd\v{e}k, Kim G. Larsen, Ji\v{r}\'i Srba
|
Language Emptiness of Continuous-Time Parametric Timed Automata
| null | null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Parametric timed automata extend the standard timed automata with the
possibility to use parameters in the clock guards. In general, if the
parameters are real-valued, the problem of language emptiness of such automata
is undecidable even for various restricted subclasses. We thus focus on the
case where parameters are assumed to be integer-valued, while the time still
remains continuous. On the one hand, we show that the problem remains
undecidable for parametric timed automata with three clocks and one parameter.
On the other hand, for the case with arbitrary many clocks where only one of
these clocks is compared with (an arbitrary number of) parameters, we show that
the parametric language emptiness is decidable. The undecidability result
tightens the bounds of a previous result which assumed six parameters, while
the decidability result extends the existing approaches that deal with
discrete-time semantics only. To the best of our knowledge, this is the first
positive result in the case of continuous-time and unbounded integer
parameters, except for the rather simple case of single-clock automata.
|
[
{
"version": "v1",
"created": "Wed, 29 Apr 2015 12:51:03 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Beneš",
"Nikola",
""
],
[
"Bezděk",
"Peter",
""
],
[
"Larsen",
"Kim G.",
""
],
[
"Srba",
"Jiří",
""
]
] |
new_dataset
| 0.998458 |
1506.01971
|
Patrick Sol\'e
|
Cem G\"uner\.i, Buket \"Ozkaya and Patrick Sol\'e
|
Quasi-Cyclic Complementary Dual Code
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
LCD codes are linear codes that intersect with their dual trivially. Quasi
cyclic codes that are LCD are characterized and studied by using their
concatenated structure. Some asymptotic results are derived. Hermitian LCD
codes are introduced to that end and their cyclic subclass is characterized.
Constructions of QCCD codes from codes over larger alphabets are given.
|
[
{
"version": "v1",
"created": "Fri, 5 Jun 2015 17:00:17 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Güneri",
"Cem",
""
],
[
"Özkaya",
"Buket",
""
],
[
"Solé",
"Patrick",
""
]
] |
new_dataset
| 0.9987 |
1510.01088
|
Lorenzo Fagiano
|
Eric Nguyen Van, Lorenzo Fagiano and Stephan Schnez
|
Autonomous take-off and landing of a tethered aircraft: a simulation
study
|
This is the longer version of a paper submitted to the 2016 American
Control Conference 2016, with more details on the simulation parameters
| null |
10.1109/ACC.2016.7525562
| null |
cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of autonomous launch and landing of a tethered rigid aircraft for
airborne wind energy generation is addressed. The system operates with
ground-based power conversion and pumping cycles, where the tether is
repeatedly reeled in and out of a winch installed on the ground and linked to
an electric motor/generator. In order to accelerate the aircraft to take-off
speed, the ground station is augmented with a linear motion system composed by
a slide translating on rails and controlled by a second motor. An onboard
propeller is used to sustain the forward velocity during the ascend of the
aircraft. During landing, a slight tension on the line is kept, while the
onboard control surfaces are used to align the aircraft with the rails and to
land again on them. A model-based, decentralized control approach is proposed,
capable to carry out a full cycle of launch, low-tension flight, and landing
again on the rails. The derived controller is tested via numerical simulations
with a realistic dynamical model of the system, in presence of different wind
speeds and turbulence, and its performance in terms of landing accuracy is
assessed. This study is part of a project aimed to experimentally verify the
launch and landing approach on a small-scale prototype.
|
[
{
"version": "v1",
"created": "Mon, 5 Oct 2015 10:23:19 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Van",
"Eric Nguyen",
""
],
[
"Fagiano",
"Lorenzo",
""
],
[
"Schnez",
"Stephan",
""
]
] |
new_dataset
| 0.998817 |
1604.08848
|
Markus H\"oll
|
Markus H\"oll, Nikolaus Heran, Vincent Lepetit
|
Augmented Reality Oculus Rift
| null | null | null |
ICG-CVARLab-TR-002
|
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper covers the whole process of developing an Augmented Reality
Stereoscopig Render Engine for the Oculus Rift. To capture the real world in
form of a camera stream, two cameras with fish-eye lenses had to be installed
on the Oculus Rift DK1 hardware. The idea was inspired by Steptoe
\cite{steptoe2014presence}. After the introduction, a theoretical part covers
all the most neccessary elements to achieve an AR System for the Oculus Rift,
following the implementation part where the code from the AR Stereo Engine is
explained in more detail. A short conclusion section shows some results,
reflects some experiences and in the final chapter some future works will be
discussed. The project can be accessed via the git repository
https://github.com/MaXvanHeLL/ARift.git.
|
[
{
"version": "v1",
"created": "Fri, 29 Apr 2016 14:26:55 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Höll",
"Markus",
""
],
[
"Heran",
"Nikolaus",
""
],
[
"Lepetit",
"Vincent",
""
]
] |
new_dataset
| 0.977414 |
1606.00202
|
Nicola Bui
|
Nicola Bui and Joerg Widmer
|
OWL: a Reliable Online Watcher for LTE Control Channel Measurements
|
6 pages, 4 figures, to appear in all things cellular 2016
| null | null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reliable network measurements are a fundamental component of networking
research as they enable network analysis, system debugging, performance
evaluation and optimization. In particular, decoding the LTE control channel
would give access to the full base station traffic at a 1 ms granularity, thus
allowing for traffic profiling and accurate measurements. Although a few
open-source implementations of LTE are available, they do not provide tools to
reliably decoding the LTE control channel and, thus, accessing the scheduling
information. In this paper, we present OWL, an Online Watcher for LTE that is
able to decode all the resource blocks in more than 99% of the system frames,
significantly outperforming existing non-commercial prior decoders. Compared to
previous attempts, OWL grounds the decoding procedure on information obtained
from the LTE random access mechanism. This makes it possible to run our
software on inexpensive hardware coupled with almost any software defined radio
capable of sampling the LTE signal with sufficient accuracy.
|
[
{
"version": "v1",
"created": "Wed, 1 Jun 2016 10:03:13 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Aug 2016 09:05:34 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Bui",
"Nicola",
""
],
[
"Widmer",
"Joerg",
""
]
] |
new_dataset
| 0.995522 |
1608.01338
|
Tiantian Gao
|
Tiantian Gao, Paul Fodor and Michael Kifer
|
Paraconsistency and Word Puzzles
| null | null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Word puzzles and the problem of their representations in logic languages have
received considerable attention in the last decade (Ponnuru et al. 2004;
Shapiro 2011; Baral and Dzifcak 2012; Schwitter 2013). Of special interest is
the problem of generating such representations directly from natural language
(NL) or controlled natural language (CNL). An interesting variation of this
problem, and to the best of our knowledge, scarcely explored variation in this
context, is when the input information is inconsistent. In such situations, the
existing encodings of word puzzles produce inconsistent representations and
break down. In this paper, we bring the well-known type of paraconsistent
logics, called Annotated Predicate Calculus (APC) (Kifer and Lozinskii 1992),
to bear on the problem. We introduce a new kind of non-monotonic semantics for
APC, called consistency preferred stable models and argue that it makes APC
into a suitable platform for dealing with inconsistency in word puzzles and,
more generally, in NL sentences. We also devise a number of general principles
to help the user choose among the different representations of NL sentences,
which might seem equivalent but, in fact, behave differently when inconsistent
information is taken into account. These principles can be incorporated into
existing CNL translators, such as Attempto Controlled English (ACE) (Fuchs et
al. 2008) and PENG Light (White and Schwitter 2009). Finally, we show that APC
with the consistency preferred stable model semantics can be equivalently
embedded in ASP with preferences over stable models, and we use this embedding
to implement this version of APC in Clingo (Gebser et al. 2011) and its Asprin
add-on (Brewka et al. 2015).
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2016 20:26:20 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Aug 2016 19:21:19 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Gao",
"Tiantian",
""
],
[
"Fodor",
"Paul",
""
],
[
"Kifer",
"Michael",
""
]
] |
new_dataset
| 0.999802 |
1608.01552
|
Juan C. Correa
|
Juan C. Correa (1) and Jorge Camargo (2) ((1) Facultad de
Psicolog\'ia. Fundaci\'on Universitaria Konrad Lorenz. Bogot\'a - Colombia,
(2) Facultad de Matem\'aticas e Ingenier\'ias. Fundaci\'on Universitaria
Konrad Lorenz. Bogot\'a - Colombia)
|
Ideological Consumerism in Colombian Elections, 2015: Links between
Political Ideology, Twitter Activity and Electoral Results
|
2 figures, 1 table
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Propagation of political ideologies in social networks has shown a notorious
impact on voting behavior. Both the contents of the messages (the ideology) and
the politicians' influence on their online audiences (their followers) have
been associated with such an impact. Here we evaluate which of these factors
exerted a major role in deciding electoral results of the 2015 Colombian
regional elections by evaluating the linguistic similarity of political
ideologies and their influence on the Twitter sphere. The electoral results
proved to be strongly associated with tweets and retweets and not with the
linguistic content of their ideologies or their Twitter followers. Suggestions
on new ways to analyze electoral processes are finally discussed.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2016 14:35:02 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Aug 2016 09:08:49 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Correa",
"Juan C.",
""
],
[
"Camargo",
"Jorge",
""
]
] |
new_dataset
| 0.999 |
1608.01856
|
Michael Morak
|
Manuel Bichler, Michael Morak and Stefan Woltran
|
The Power of Non-Ground Rules in Answer Set Programming
|
Paper presented at the 32nd International Conference on Logic
Programming (ICLP 2016), New York City, USA, 16-21 October 2016, 15 pages,
LaTeX, 2 figures
| null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Answer set programming (ASP) is a well-established logic programming language
that offers an intuitive, declarative syntax for problem solving. In its
traditional application, a fixed ASP program for a given problem is designed
and the actual instance of the problem is fed into the program as a set of
facts. This approach typically results in programs with comparably short and
simple rules. However, as is known from complexity analysis, such an approach
limits the expressive power of ASP; in fact, an entire NP-check can be encoded
into a single large rule body of bounded arity that performs both a guess and a
check within the same rule.
Here, we propose a novel paradigm for encoding hard problems in ASP by making
explicit use of large rules which depend on the actual instance of the problem.
We illustrate how this new encoding paradigm can be used, providing examples of
problems from the first, second, and even third level of the polynomial
hierarchy. As state-of-the-art solvers are tuned towards short rules, rule
decomposition is a key technique in the practical realization of our approach.
We also provide some preliminary benchmarks which indicate that giving up the
convenient way of specifying a fixed program can lead to a significant
speed-up.
This paper is under consideration for acceptance into TPLP.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2016 12:26:22 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Bichler",
"Manuel",
""
],
[
"Morak",
"Michael",
""
],
[
"Woltran",
"Stefan",
""
]
] |
new_dataset
| 0.962097 |
1608.01909
|
Gabriele Spini
|
Gabriele Spini, Gilles Z\'emor
|
Perfectly Secure Message Transmission in Two Rounds
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the model that has become known as "Perfectly Secure Message
Transmission"(PSMT), a sender Alice is connected to a receiver Bob through n
parallel two-way channels. A computationally unbounded adversary Eve controls t
of these channels, meaning she can acquire and alter any data that is
transmitted over these channels. The sender Alice wishes to communicate a
secret message to Bob privately and reliably, i.e. in such a way that Eve will
not get any information about the message while Bob will be able to recover it
completely.
In this paper, we focus on protocols that work in two transmission rounds for
n= 2t+1. We break from previous work by following a conceptually simpler
blueprint for achieving a PSMT protocol. We reduce the previously best-known
communication complexity, i.e. the number of transmitted bits necessary to
communicate a 1-bit secret, from O(n^3 log n) to O(n^2 log n). Our protocol
also answers a question raised by Kurosawa and Suzuki and hitherto left open:
their protocol reaches optimal transmission rate for a secret of size O(n^2 log
n) bits, and the authors raised the problem of lowering this threshold. The
present solution does this for a secret of O(n log n) bits. Additionally, we
show how our protocol can be adapted to a Network Coding context.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2016 15:11:53 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Spini",
"Gabriele",
""
],
[
"Zémor",
"Gilles",
""
]
] |
new_dataset
| 0.991949 |
1608.01921
|
Yannik Stein
|
Fr\'ed\'eric Meunier, Wolfgang Mulzer, Pauline Sarrabezolles, Yannik
Stein
|
The Rainbow at the End of the Line --- A PPAD Formulation of the
Colorful Carath\'eodory Theorem with Applications
|
38 pages, 2 figures
| null | null | null |
cs.CG cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $C_1,...,C_{d+1}$ be $d+1$ point sets in $\mathbb{R}^d$, each containing
the origin in its convex hull. A subset $C$ of $\bigcup_{i=1}^{d+1} C_i$ is
called a colorful choice (or rainbow) for $C_1, \dots, C_{d+1}$, if it contains
exactly one point from each set $C_i$. The colorful Carath\'eodory theorem
states that there always exists a colorful choice for $C_1,\dots,C_{d+1}$ that
has the origin in its convex hull. This theorem is very general and can be used
to prove several other existence theorems in high-dimensional discrete
geometry, such as the centerpoint theorem or Tverberg's theorem. The colorful
Carath\'eodory problem (CCP) is the computational problem of finding such a
colorful choice. Despite several efforts in the past, the computational
complexity of CCP in arbitrary dimension is still open.
We show that CCP lies in the intersection of the complexity classes PPAD and
PLS. This makes it one of the few geometric problems in PPAD and PLS that are
not known to be solvable in polynomial time. Moreover, it implies that the
problem of computing centerpoints, computing Tverberg partitions, and computing
points with large simplicial depth is contained in $\text{PPAD} \cap
\text{PLS}$. This is the first nontrivial upper bound on the complexity of
these problems. Finally, we show that our PPAD formulation leads to a
polynomial-time algorithm for a special case of CCP in which we have only two
color classes $C_1$ and $C_2$ in $d$ dimensions, each with the origin in its
convex hull, and we would like to find a set with half the points from each
color class that contains the origin in its convex hull.
|
[
{
"version": "v1",
"created": "Fri, 5 Aug 2016 15:45:28 GMT"
}
] | 2016-08-08T00:00:00 |
[
[
"Meunier",
"Frédéric",
""
],
[
"Mulzer",
"Wolfgang",
""
],
[
"Sarrabezolles",
"Pauline",
""
],
[
"Stein",
"Yannik",
""
]
] |
new_dataset
| 0.998501 |
1501.04782
|
Nenad Marku\v{s}
|
Nenad Marku\v{s} and Igor S. Pand\v{z}i\'c and J\"orgen Ahlberg
|
Constructing Binary Descriptors with a Stochastic Hill Climbing Search
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Binary descriptors of image patches provide processing speed advantages and
require less storage than methods that encode the patch appearance with a
vector of real numbers. We provide evidence that, despite its simplicity, a
stochastic hill climbing bit selection procedure for descriptor construction
defeats recently proposed alternatives on a standard discriminative power
benchmark. The method is easy to implement and understand, has no free
parameters that need fine tuning, and runs fast.
|
[
{
"version": "v1",
"created": "Tue, 20 Jan 2015 12:38:08 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Jul 2015 14:57:47 GMT"
}
] | 2016-08-07T00:00:00 |
[
[
"Markuš",
"Nenad",
""
],
[
"Pandžić",
"Igor S.",
""
],
[
"Ahlberg",
"Jörgen",
""
]
] |
new_dataset
| 0.993553 |
1511.00915
|
Jan Wielemaker
|
Jan Wielemaker and Torbj\"orn Lager and Fabrizio Riguzzi
|
SWISH: SWI-Prolog for Sharing
|
International Workshop on User-Oriented Logic Programming (IULP
2015), co-located with the 31st International Conference on Logic Programming
(ICLP 2015), Proceedings of the International Workshop on User-Oriented Logic
Programming (IULP 2015), Editors: Stefan Ellmauthaler and Claudia Schulz,
pages 99-113, August 2015
| null | null | null |
cs.PL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, we see a new type of interfaces for programmers based on web
technology. For example, JSFiddle, IPython Notebook and R-studio. Web
technology enables cloud-based solutions, embedding in tutorial web pages,
atractive rendering of results, web-scale cooperative development, etc. This
article describes SWISH, a web front-end for Prolog. A public website exposes
SWI-Prolog using SWISH, which is used to run small Prolog programs for
demonstration, experimentation and education. We connected SWISH to the
ClioPatria semantic web toolkit, where it allows for collaborative development
of programs and queries related to a dataset as well as performing maintenance
tasks on the running server and we embedded SWISH in the Learn Prolog Now!
online Prolog book.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2015 14:16:31 GMT"
}
] | 2016-08-06T00:00:00 |
[
[
"Wielemaker",
"Jan",
""
],
[
"Lager",
"Torbjörn",
""
],
[
"Riguzzi",
"Fabrizio",
""
]
] |
new_dataset
| 0.998829 |
1512.05568
|
Mickael Randour
|
Romain Brenguier, Lorenzo Clemente, Paul Hunter, Guillermo A. P\'erez,
Mickael Randour, Jean-Fran\c{c}ois Raskin, Ocan Sankur, Mathieu Sassolas
|
Non-Zero Sum Games for Reactive Synthesis
|
LATA'16 invited paper
| null | null | null |
cs.LO cs.FL cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this invited contribution, we summarize new solution concepts useful for
the synthesis of reactive systems that we have introduced in several recent
publications. These solution concepts are developed in the context of non-zero
sum games played on graphs. They are part of the contributions obtained in the
inVEST project funded by the European Research Council.
|
[
{
"version": "v1",
"created": "Thu, 17 Dec 2015 13:02:03 GMT"
}
] | 2016-08-06T00:00:00 |
[
[
"Brenguier",
"Romain",
""
],
[
"Clemente",
"Lorenzo",
""
],
[
"Hunter",
"Paul",
""
],
[
"Pérez",
"Guillermo A.",
""
],
[
"Randour",
"Mickael",
""
],
[
"Raskin",
"Jean-François",
""
],
[
"Sankur",
"Ocan",
""
],
[
"Sassolas",
"Mathieu",
""
]
] |
new_dataset
| 0.974964 |
1605.04013
|
EPTCS
|
Stefano Gogioso (University of Oxford)
|
A Corpus-based Toy Model for DisCoCat
|
In Proceedings SLPCS 2016, arXiv:1608.01018
|
EPTCS 221, 2016, pp. 20-28
|
10.4204/EPTCS.221.3
| null |
cs.CL cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The categorical compositional distributional (DisCoCat) model of meaning
rigorously connects distributional semantics and pregroup grammars, and has
found a variety of applications in computational linguistics. From a more
abstract standpoint, the DisCoCat paradigm predicates the construction of a
mapping from syntax to categorical semantics. In this work we present a
concrete construction of one such mapping, from a toy model of syntax for
corpora annotated with constituent structure trees, to categorical semantics
taking place in a category of free R-semimodules over an involutive commutative
semiring R.
|
[
{
"version": "v1",
"created": "Fri, 13 May 2016 00:32:01 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Aug 2016 00:40:51 GMT"
}
] | 2016-08-05T00:00:00 |
[
[
"Gogioso",
"Stefano",
"",
"University of Oxford"
]
] |
new_dataset
| 0.993612 |
1607.03077
|
Sri Harsha Turlapati
|
Ajinkya Bhole, Sri Harsha Turlapati, Rajashekhar V. S, Jay Dixit,
Suril V. Shah, K Madhava Krishna
|
Design of a Robust Stair Climbing Compliant Modular Robot to Tackle
Overhang on Stairs
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper discusses the concept and parameter design of a Robust Stair
Climbing Compliant Modular Robot, capable of tackling stairs with overhangs.
Modifying the geometry of the periphery of the wheels of our robot helps in
tackling overhangs. Along with establishing a concept design, robust design
parameters are set to minimize performance variation. The Grey-based Taguchi
Method is adopted for providing an optimal setting for the design parameters of
the robot. The robot prototype is shown to have successfully scaled stairs of
varying dimensions, with overhang, thus corroborating the analysis performed.
|
[
{
"version": "v1",
"created": "Mon, 11 Jul 2016 18:58:16 GMT"
}
] | 2016-08-05T00:00:00 |
[
[
"Bhole",
"Ajinkya",
""
],
[
"Turlapati",
"Sri Harsha",
""
],
[
"S",
"Rajashekhar V.",
""
],
[
"Dixit",
"Jay",
""
],
[
"Shah",
"Suril V.",
""
],
[
"Krishna",
"K Madhava",
""
]
] |
new_dataset
| 0.987788 |
1608.01339
|
Martin Brooks
|
Martin Brooks
|
Retinal Vessel Segmentation Using A New Topological Method
| null | null | null | null |
cs.CG cs.CV physics.med-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel topological segmentation of retinal images represents blood vessels
as connected regions in the continuous image plane, having shape-related
analytic and geometric properties. This paper presents topological segmentation
results from the DRIVE retinal image database.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2016 20:26:22 GMT"
}
] | 2016-08-05T00:00:00 |
[
[
"Brooks",
"Martin",
""
]
] |
new_dataset
| 0.973913 |
1608.01401
|
EPTCS
|
Daniela Ashoush (Univesity of Oxford), Bob Coecke (Univesity of
Oxford)
|
Dual Density Operators and Natural Language Meaning
|
In Proceedings SLPCS 2016, arXiv:1608.01018
|
EPTCS 221, 2016, pp. 1-10
|
10.4204/EPTCS.221.1
| null |
cs.CL cs.LO quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Density operators allow for representing ambiguity about a vector
representation, both in quantum theory and in distributional natural language
meaning. Formally equivalently, they allow for discarding part of the
description of a composite system, where we consider the discarded part to be
the context. We introduce dual density operators, which allow for two
independent notions of context. We demonstrate the use of dual density
operators within a grammatical-compositional distributional framework for
natural language meaning. We show that dual density operators can be used to
simultaneously represent: (i) ambiguity about word meanings (e.g. queen as a
person vs. queen as a band), and (ii) lexical entailment (e.g. tiger ->
mammal). We provide a proof-of-concept example.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2016 00:36:12 GMT"
}
] | 2016-08-05T00:00:00 |
[
[
"Ashoush",
"Daniela",
"",
"Univesity of Oxford"
],
[
"Coecke",
"Bob",
"",
"Univesity of\n Oxford"
]
] |
new_dataset
| 0.98377 |
1608.01426
|
Francois Le Gall
|
Fran\c{c}ois Le Gall
|
Solving Laplacian Systems in Logarithmic Space
|
17 pages
| null | null | null |
cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the space complexity of solving linear systems of equations.
While all known deterministic or randomized algorithms solving a square system
of $n$ linear equations in $n$ variables require $\Omega(\log^2 n)$ space,
Ta-Shma (STOC 2013) recently showed that on a quantum computer an approximate
solution can be computed in logarithmic space, giving the first explicit
computational task for which quantum computation seems to outperform classical
computation with respect to space complexity. In this paper we show that for
systems of linear equations in the Laplacian matrix of graphs, the same
logarithmic space complexity can actually be achieved by a classical (i.e.,
non-quantum) algorithm. More precisely, given a system of linear equations
$Lx=b$, where $L$ is the (normalized) Laplacian matrix of a graph on $n$
vertices and $b$ is a unit-norm vector, our algorithm outputs a vector $\tilde
x$ such that $\left\lVert\tilde x -x\right\rVert\le 1/\mathrm{poly}(n)$ and
uses only $O(\log n)$ space if the underlying graph has polynomially bounded
weights. We also show how to estimate, again in logarithmic space, the smallest
non-zero eigenvalue of $L$.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2016 04:41:48 GMT"
}
] | 2016-08-05T00:00:00 |
[
[
"Gall",
"François Le",
""
]
] |
new_dataset
| 0.996989 |
1608.01446
|
Peng Liu
|
Peng Liu, Wangdong Qi, Li Wei, En Yuan and Bing Xu
|
Full Duplex Joint Sensing for Opportunistic Access in
Spectrum-Heterogeneous Cognitive Radio Networks
|
4 pages, 3 figures, submitted to IEEE Communications Letters
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In cognitive radio networks (CRN), secondary users (SUs) can share spectrum
with licensed primary users (PUs). Because an SU receiver (SU-Rx) does not
always share the same view of spectrum availability as the corresponding SU
transmitter (SU-Tx), spectrum sensing conducted only by an SU transmitter tends
to be overly sensitive to guarantee safe spectrum access at the price of SU
inefficiency. In this letter, we propose a joint spectrum sensing mechanism,
named Full-Duplex Joint Sensing (FJDS), to relax sensitivity of SU detection
and improve SU throughput. FDJS employs instantaneous feedback enabled by
in-band full duplex communication to facilitate the sharing of spectral
information from SU-Rx to SU-Tx. The joint detection problem in FDJS is modeled
as non-linear optimization and solved by a binary searching algorithm.
Simulation results show that FDJS could improve SU throughput as well as
meeting PU interruption constraints in a wide range of parameter settings.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2016 07:36:52 GMT"
}
] | 2016-08-05T00:00:00 |
[
[
"Liu",
"Peng",
""
],
[
"Qi",
"Wangdong",
""
],
[
"Wei",
"Li",
""
],
[
"Yuan",
"En",
""
],
[
"Xu",
"Bing",
""
]
] |
new_dataset
| 0.969362 |
1608.01524
|
Kumar Vijay Mishra
|
Kumar Vijay Mishra, Eli Shoshan, Moshe Namer, Maxim Meltsin, David
Cohen, Ron Madmoni, Shahar Dror, Robert Ifraimov and Yonina C. Eldar
|
Cognitive Sub-Nyquist Hardware Prototype of a Collocated MIMO Radar
|
5 pages, Compressed Sensing Theory and its Applications to Radar,
Sonar and Remote Sensing (CoSeRa) 2016
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the design and hardware implementation of a radar prototype that
demonstrates the principle of a sub-Nyquist collocated multiple-input
multiple-output (MIMO) radar. The setup allows sampling in both spatial and
spectral domains at rates much lower than dictated by the Nyquist sampling
theorem. Our prototype realizes an X-band MIMO radar that can be configured to
have a maximum of 8 transmit and 10 receive antenna elements. We use frequency
division multiplexing (FDM) to achieve the orthogonality of MIMO waveforms and
apply the Xampling framework for signal recovery. The prototype also implements
a cognitive transmission scheme where each transmit waveform is restricted to
those pre-determined subbands of the full signal bandwidth that the receiver
samples and processes. Real-time experiments show reasonable recovery
performance while operating as a 4x5 thinned random array wherein the combined
spatial and spectral sampling factor reduction is 87.5% of that of a filled
8x10 array.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2016 13:13:55 GMT"
}
] | 2016-08-05T00:00:00 |
[
[
"Mishra",
"Kumar Vijay",
""
],
[
"Shoshan",
"Eli",
""
],
[
"Namer",
"Moshe",
""
],
[
"Meltsin",
"Maxim",
""
],
[
"Cohen",
"David",
""
],
[
"Madmoni",
"Ron",
""
],
[
"Dror",
"Shahar",
""
],
[
"Ifraimov",
"Robert",
""
],
[
"Eldar",
"Yonina C.",
""
]
] |
new_dataset
| 0.992458 |
1608.01632
|
Arsany Guirguis
|
Arsany Guirguis, Mohammed Karmoose, Karim Habak, Mustafa El-Nainay,
Moustafa Youssef
|
Cooperation-based Routing in Cognitive Radio Networks
|
To be submitted to Journal of Network and Computer Applications
(JNCA)
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Primary user activity is a major bottleneck for existing routing protocols in
cognitive radio networks. Typical routing protocols avoid areas that are highly
congested with primary users, leaving only a small fragment of available links
for secondary route construction. In addition, wireless links are prone to
channel impairments such as multipath fading; which renders the quality of the
available links highly fluctuating. In this paper, we investigate using
cooperative communication mechanisms to reveal new routing opportunities,
enhance route qualities, and enable true coexistence of primary and secondary
networks. As a result, we propose Undercover: a cooperative routing protocol
that utilizes the available location information to assist in the routing
process. Specifically, our protocol revisits a fundamental assumption taken by
the state of the art routing protocols designed for cognitive radio networks.
Using Undercover, secondary users can transmit in the regions of primary users
activity through utilizing cooperative communication techniques to null out
transmission at primary receivers via beamforming. In addition, the secondary
links qualities are enhanced using cooperative diversity. To account for the
excessive levels of interference typically incurred due to cooperative
transmissions, we allow our protocol to be interference-aware. Thus,
cooperative transmissions are penalized in accordance to the amount of
negatively affected secondary flows. We evaluate the performance of our
proposed protocol via NS2 simulations which show that our protocol can enhance
the network goodput by a ratio reaches up to 250% compared to other popular
cognitive routing protocols with minimal added overhead.
|
[
{
"version": "v1",
"created": "Thu, 4 Aug 2016 18:12:15 GMT"
}
] | 2016-08-05T00:00:00 |
[
[
"Guirguis",
"Arsany",
""
],
[
"Karmoose",
"Mohammed",
""
],
[
"Habak",
"Karim",
""
],
[
"El-Nainay",
"Mustafa",
""
],
[
"Youssef",
"Moustafa",
""
]
] |
new_dataset
| 0.997398 |
1302.4475
|
Emil Kotomin
|
Emil Kotomin
|
In Love With a Robot: the Dawn of Machine-To-Machine Marketing
| null | null | null | null |
cs.AI cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The article looks at mass market artificial intelligence tools in the context
of their ever-growing sophistication, availability and market penetration. The
subject is especially relevant today for these exact reasons - if a few years
ago AI was the subject of high tech research and science fiction novels, today,
we increasingly rely on cloud robotics to cater to our daily needs - to trade
stock, predict weather, manage diaries, find friends and buy presents online.
|
[
{
"version": "v1",
"created": "Mon, 18 Feb 2013 22:40:28 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Feb 2013 21:57:35 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Aug 2016 08:39:55 GMT"
}
] | 2016-08-04T00:00:00 |
[
[
"Kotomin",
"Emil",
""
]
] |
new_dataset
| 0.999164 |
1604.02879
|
Marek Szyku{\l}a
|
Marek Szyku{\l}a and Vojt\v{e}ch Vorel
|
An Extremal Series of Eulerian Synchronizing Automata
|
The final publication is available at Springer via
http://dx.doi.org/10.1007/978-3-662-53132-7_31
|
Developments in Language Theory (DLT 2016), volume 9840 of LNCS,
pages 380--392, 2016
|
10.1007/978-3-662-53132-7_31
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an infinite series of $n$-state Eulerian automata whose reset
words have length at least $(n^2-3)/2$. This improves the current lower bound
on the length of shortest reset words in Eulerian automata. We conjecture that
$(n^2-3)/2$ also forms an upper bound for this class and we experimentally
verify it for small automata by an exhaustive computation.
|
[
{
"version": "v1",
"created": "Mon, 11 Apr 2016 10:50:46 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Aug 2016 17:45:38 GMT"
}
] | 2016-08-04T00:00:00 |
[
[
"Szykuła",
"Marek",
""
],
[
"Vorel",
"Vojtěch",
""
]
] |
new_dataset
| 0.996011 |
1608.00989
|
Jan Wielemaker
|
Jan Wielemaker and Keri Harris
|
Lock-free atom garbage collection for multithreaded Prolog
|
Paper presented at the 32nd International Conference on Logic
Programming (ICLP 2016), New York City, USA, 16-21 October 2016, 14 pages,
LaTeX, 4 PDF figures
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The runtime system of dynamic languages such as Prolog or Lisp and their
derivatives contain a symbol table, in Prolog often called the atom table. A
simple dynamically resizing hash-table used to be an adequate way to implement
this table. As Prolog becomes fashionable for 24x7 server processes we need to
deal with atom garbage collection and concurrent access to the atom table.
Classical lock-based implementations to ensure consistency of the atom table
scale poorly and a stop-the-world approach to implement atom garbage collection
quickly becomes a bottle-neck, making Prolog unsuitable for soft real-time
applications. In this article we describe a novel implementation for the atom
table using lock-free techniques where the atom-table remains accessible even
during atom garbage collection. Relying only on CAS (Compare And Swap) and not
on external libraries, the implementation is straightforward and portable.
Under consideration for acceptance in TPLP.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2016 20:11:56 GMT"
}
] | 2016-08-04T00:00:00 |
[
[
"Wielemaker",
"Jan",
""
],
[
"Harris",
"Keri",
""
]
] |
new_dataset
| 0.959746 |
1608.01009
|
Sergey Bastrakov
|
Igor Surmin, Sergey Bastrakov, Zakhar Matveev, Evgeny Efimenko, Arkady
Gonoskov, Iosif Meyerov
|
Co-design of a particle-in-cell plasma simulation code for Intel Xeon
Phi: a first look at Knights Landing
| null | null | null | null |
cs.DC physics.comp-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Three dimensional particle-in-cell laser-plasma simulation is an important
area of computational physics. Solving state-of-the-art problems requires
large-scale simulation on a supercomputer using specialized codes. A growing
demand in computational resources inspires research in improving efficiency and
co-design for supercomputers based on many-core architectures. This paper
presents first performance results of the particle-in-cell plasma simulation
code PICADOR on the recently introduced Knights Landing generation of Intel
Xeon Phi. A straightforward rebuilding of the code yields a 2.43 x speedup
compared to the previous Knights Corner generation. Further code optimization
results in an additional 1.89 x speedup. The optimization performed is
beneficial not only for Knights Landing, but also for high-end CPUs and Knights
Corner. The optimized version achieves 100 GFLOPS double precision performance
on a Knights Landing device with the speedups of 2.35 x compared to a 14-core
Haswell CPU and 3.47 x compared to a 61-core Knights Corner Xeon Phi.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2016 21:24:55 GMT"
}
] | 2016-08-04T00:00:00 |
[
[
"Surmin",
"Igor",
""
],
[
"Bastrakov",
"Sergey",
""
],
[
"Matveev",
"Zakhar",
""
],
[
"Efimenko",
"Evgeny",
""
],
[
"Gonoskov",
"Arkady",
""
],
[
"Meyerov",
"Iosif",
""
]
] |
new_dataset
| 0.992493 |
1608.01023
|
Suleiman Yerima
|
Suleiman Y. Yerima and Khalid Al-Begain
|
End-to-End QoS Improvement of HSDPA End-User Multi-flow Traffic Using
RAN Buffer Management
|
In 2008 New Technologies, Mobility and Security (pp. 1-5). IEEE
| null | null | null |
cs.PF cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
High Speed Downlink Packet Access (HSDPA) was introduced to UMTS radio access
segment to provide higher capacity for new packet switched services. As a
result, packet switched sessions with multiple diverse traffic flows such as
concurrentvoice and data, or video and data being transmitted to the same user
are a likely commonplace cellular packet data scenario. In HSDPA, Radio Access
Network (RAN) buffer management schemes are essential to support the end-to-end
QoS of such sessions. Hence in this paper we present the end-to-end performance
study of a proposed RAN buffer management scheme for multi-flow sessions via
dynamic system-level HSDPA simulations. The scheme is an enhancement of a
Time-Space Priority (TSP)queuing strategy applied to the Node B MAC-hs buffer
allocated to an end user with concurrent real-time (RT) and non-real-time (NRT)
flows during a multi-flow session. The experimental multiflow scenario is a
packet voice call with concurrent TCP-based file download to the same user.
Results show that with the proposed enhancements to the TSP-based RAN buffer
management, end-to-end QoS performance gains accrue to the NRT flow without
compromising RT flow QoS of the same end user session.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2016 22:53:13 GMT"
}
] | 2016-08-04T00:00:00 |
[
[
"Yerima",
"Suleiman Y.",
""
],
[
"Al-Begain",
"Khalid",
""
]
] |
new_dataset
| 0.993225 |
1608.01036
|
Michael J. Steindorfer
|
Michael J. Steindorfer and Jurgen J. Vinju
|
Fast and Lean Immutable Multi-Maps on the JVM based on Heterogeneous
Hash-Array Mapped Tries
| null | null | null | null |
cs.DS cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An immutable multi-map is a many-to-many thread-friendly map data structure
with expected fast insert and lookup operations. This data structure is used
for applications processing graphs or many-to-many relations as applied in
static analysis of object-oriented systems. When processing such big data sets
the memory overhead of the data structure encoding itself is a memory usage
bottleneck. Motivated by reuse and type-safety, libraries for Java, Scala and
Clojure typically implement immutable multi-maps by nesting sets as the values
with the keys of a trie map. Like this, based on our measurements the expected
byte overhead for a sparse multi-map per stored entry adds up to around 65B,
which renders it unfeasible to compute with effectively on the JVM.
In this paper we propose a general framework for Hash-Array Mapped Tries on
the JVM which can store type-heterogeneous keys and values: a Heterogeneous
Hash-Array Mapped Trie (HHAMT). Among other applications, this allows for a
highly efficient multi-map encoding by (a) not reserving space for empty value
sets and (b) inlining the values of singleton sets while maintaining a (c)
type-safe API.
We detail the necessary encoding and optimizations to mitigate the overhead
of storing and retrieving heterogeneous data in a hash-trie. Furthermore, we
evaluate HHAMT specifically for the application to multi-maps, comparing them
to state-of-the-art encodings of multi-maps in Java, Scala and Clojure. We
isolate key differences using microbenchmarks and validate the resulting
conclusions on a real world case in static analysis. The new encoding brings
the per key-value storage overhead down to 30B: a 2x improvement. With
additional inlining of primitive values it reaches a 4x improvement.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2016 00:35:42 GMT"
}
] | 2016-08-04T00:00:00 |
[
[
"Steindorfer",
"Michael J.",
""
],
[
"Vinju",
"Jurgen J.",
""
]
] |
new_dataset
| 0.990071 |
1608.01074
|
Tal Remez
|
Tal Remez, Or Litany, Shachar Yoseff, Harel Haim and Alex Bronstein
|
FPGA system for real-time computational extended depth of field imaging
using phase aperture coding
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a proof-of-concept end-to-end system for computational extended
depth of field (EDOF) imaging. The acquisition is performed through a
phase-coded aperture implemented by placing a thin wavelength-dependent optical
mask inside the pupil of a conventional camera lens, as a result of which, each
color channel is focused at a different depth. The reconstruction process
receives the raw Bayer image as the input, and performs blind estimation of the
output color image in focus at an extended range of depths using a patch-wise
sparse prior. We present a fast non-iterative reconstruction algorithm
operating with constant latency in fixed-point arithmetics and achieving
real-time performance in a prototype FPGA implementation. The output of the
system, on simulated and real-life scenes, is qualitatively and quantitatively
better than the result of clear-aperture imaging followed by state-of-the-art
blind deblurring.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2016 05:28:18 GMT"
}
] | 2016-08-04T00:00:00 |
[
[
"Remez",
"Tal",
""
],
[
"Litany",
"Or",
""
],
[
"Yoseff",
"Shachar",
""
],
[
"Haim",
"Harel",
""
],
[
"Bronstein",
"Alex",
""
]
] |
new_dataset
| 0.998547 |
1608.01268
|
Marek Szyku{\l}a
|
Andrzej Kisielewicz and Marek Szyku{\l}a
|
Synchronizing Automata with Extremal Properties
|
The final publication is available at Springer via doi below. arXiv
admin note: text overlap with arXiv:1404.3311
|
Mathematical Foundations of Computer Science (MFCS 2015), volume
9234 of LNCS, pages 331--343, 2015
|
10.1007/978-3-662-48057-1_26
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a few classes of synchronizing automata exhibiting certain
extremal properties with regard to synchronization. The first is a series of
automata with subsets whose shortest extending words are of length
$\varTheta(n^2)$, where $n$ is the number of states of the automaton. This
disproves a conjecture that every subset in a strongly connected synchronizing
automaton is $cn$-extendable, for some constant $c$, and in particular, shows
that the cubic upper bound on the length of the shortest reset words cannot be
improved generally by means of the extension method. A detailed analysis shows
that the automata in the series have subsets that require words as long as
$n^2/4+O(n)$ in order to be extended by at least one element.
We also discuss possible relaxations of the conjecture, and propose the
image-extension conjecture, which would lead to a quadratic upper bound on the
length of the shortest reset words. In this regard we present another class of
automata, which turn out to be counterexamples to a key claim in a recent
attempt to improve the Pin-Frankl bound for reset words.
Finally, we present two new series of slowly irreducibly synchronizing
automata over a ternary alphabet, whose lengths of the shortest reset words are
$n^2-3n+3$ and $n^2-3n+2$, respectively. These are the first examples of such
series of automata for alphabets of size larger than two.
|
[
{
"version": "v1",
"created": "Wed, 3 Aug 2016 17:59:19 GMT"
}
] | 2016-08-04T00:00:00 |
[
[
"Kisielewicz",
"Andrzej",
""
],
[
"Szykuła",
"Marek",
""
]
] |
new_dataset
| 0.99802 |
1505.01221
|
Marius Lindauer
|
Frank Hutter and Marius Lindauer and Adrian Balint and Sam Bayless and
Holger Hoos and Kevin Leyton-Brown
|
The Configurable SAT Solver Challenge (CSSC)
| null | null | null | null |
cs.AI cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is well known that different solution strategies work well for different
types of instances of hard combinatorial problems. As a consequence, most
solvers for the propositional satisfiability problem (SAT) expose parameters
that allow them to be customized to a particular family of instances. In the
international SAT competition series, these parameters are ignored: solvers are
run using a single default parameter setting (supplied by the authors) for all
benchmark instances in a given track. While this competition format rewards
solvers with robust default settings, it does not reflect the situation faced
by a practitioner who only cares about performance on one particular
application and can invest some time into tuning solver parameters for this
application. The new Configurable SAT Solver Competition (CSSC) compares
solvers in this latter setting, scoring each solver by the performance it
achieved after a fully automated configuration step. This article describes the
CSSC in more detail, and reports the results obtained in its two instantiations
so far, CSSC 2013 and 2014.
|
[
{
"version": "v1",
"created": "Tue, 5 May 2015 23:39:24 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Aug 2016 08:48:53 GMT"
}
] | 2016-08-03T00:00:00 |
[
[
"Hutter",
"Frank",
""
],
[
"Lindauer",
"Marius",
""
],
[
"Balint",
"Adrian",
""
],
[
"Bayless",
"Sam",
""
],
[
"Hoos",
"Holger",
""
],
[
"Leyton-Brown",
"Kevin",
""
]
] |
new_dataset
| 0.999047 |
1608.00268
|
Mario Mastriani
|
Mario Mastriani
|
Union is strength in lossy image compression
|
18 pages, 21 figures, 4 tables. arXiv admin note: substantial text
overlap with arXiv:1607.03164, arXiv:1405.0632, arXiv:1608.00265
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we present a comparison between different techniques of image
compression. First, the image is divided in blocks which are organized
according to a certain scan. Later, several compression techniques are applied,
combined or alone. Such techniques are: wavelets (Haar's basis), Karhunen-Loeve
Transform, etc. Simulations show that the combined versions are the best, with
minor Mean Squared Error (MSE), and higher Peak Signal to Noise Ratio (PSNR)
and better image quality, even in the presence of noise.
|
[
{
"version": "v1",
"created": "Sun, 31 Jul 2016 21:57:54 GMT"
}
] | 2016-08-03T00:00:00 |
[
[
"Mastriani",
"Mario",
""
]
] |
new_dataset
| 0.970084 |
1608.00571
|
Daniel Sorin
|
Blake A. Hechtman, Andrew D. Hilton, and Daniel J. Sorin
|
TREES: A CPU/GPU Task-Parallel Runtime with Explicit Epoch
Synchronization
| null | null | null | null |
cs.DC cs.OS cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have developed a task-parallel runtime system, called TREES, that is
designed for high performance on CPU/GPU platforms. On platforms with multiple
CPUs, Cilk's "work-first" principle underlies how task-parallel applications
can achieve performance, but work-first is a poor fit for GPUs. We build upon
work-first to create the "work-together" principle that addresses the specific
strengths and weaknesses of GPUs. The work-together principle extends
work-first by stating that (a) the overhead on the critical path should be paid
by the entire system at once and (b) work overheads should be paid
co-operatively. We have implemented the TREES runtime in OpenCL, and we
experimentally evaluate TREES applications on a CPU/GPU platform.
|
[
{
"version": "v1",
"created": "Mon, 1 Aug 2016 15:33:14 GMT"
}
] | 2016-08-03T00:00:00 |
[
[
"Hechtman",
"Blake A.",
""
],
[
"Hilton",
"Andrew D.",
""
],
[
"Sorin",
"Daniel J.",
""
]
] |
new_dataset
| 0.995857 |
1608.00653
|
EPTCS
|
Benedikt Br\"utsch (RWTH Aachen University), Wolfgang Thomas (RWTH
Aachen University)
|
Playing Games in the Baire Space
|
In Proceedings Cassting'16/SynCoP'16, arXiv:1608.00177
|
EPTCS 220, 2016, pp. 13-25
|
10.4204/EPTCS.220.2
| null |
cs.GT cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We solve a generalized version of Church's Synthesis Problem where a play is
given by a sequence of natural numbers rather than a sequence of bits; so a
play is an element of the Baire space rather than of the Cantor space. Two
players Input and Output choose natural numbers in alternation to generate a
play. We present a natural model of automata ("N-memory automata") equipped
with the parity acceptance condition, and we introduce also the corresponding
model of "N-memory transducers". We show that solvability of games specified by
N-memory automata (i.e., existence of a winning strategy for player Output) is
decidable, and that in this case an N-memory transducer can be constructed that
implements a winning strategy for player Output.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2016 00:36:20 GMT"
}
] | 2016-08-03T00:00:00 |
[
[
"Brütsch",
"Benedikt",
"",
"RWTH Aachen University"
],
[
"Thomas",
"Wolfgang",
"",
"RWTH\n Aachen University"
]
] |
new_dataset
| 0.99176 |
1608.00697
|
Thomas Wolf
|
Thomas Wolf and Chimaobi Amadi
|
Rational Solutions of Underdetermined Polynomial Equations
|
11 pages
| null | null | null |
cs.SC math.AC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we report on an application of computer algebra in which
mathematical puzzles are generated of a type that had been widely used in
mathematics contests by a large number of participants worldwide.
The algorithmic aspect of our work provides a method to compute rational
solutions of single polynomial equations that are typically large with $10^2
\ldots 10^5$ terms and that are heavily underdetermined. This functionality was
obtained by adding modules for a new type of splitting of equations to the
existing package CRACK that is normally used to solve polynomial algebraic and
differential systems.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2016 05:13:54 GMT"
}
] | 2016-08-03T00:00:00 |
[
[
"Wolf",
"Thomas",
""
],
[
"Amadi",
"Chimaobi",
""
]
] |
new_dataset
| 0.998215 |
1608.00749
|
Akim Demaille
|
Akim Demaille
|
Derived-Term Automata of Multitape Rational Expressions (Long version)
|
arXiv admin note: text overlap with arXiv:1605.01530
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce (weighted) rational expressions to denote series over Cartesian
products of monoids. To this end, we propose the operator $|$ to build
multitape expressions such as $(a^+|x + b^+|y)^*$. We define expansions, which
generalize the concept of derivative of a rational expression, but relieved
from the need of a free monoid. We propose an algorithm based on expansions to
build multitape automata from multitape expressions.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2016 09:40:45 GMT"
}
] | 2016-08-03T00:00:00 |
[
[
"Demaille",
"Akim",
""
]
] |
new_dataset
| 0.994473 |
1608.00855
|
Suleiman Yerima
|
Suleiman Y. Yerima and Khalid Al-Begain
|
An Enhanced Buffer Management Scheme for Multimedia Traffic in HSDPA
|
The 2007 International Conference on Next Generation Mobile
Applications, Services and Technologies (NGMAST 2007) pages 292-297
| null |
10.1109/NGMAST.2007.4343435
| null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
High Speed Downlink Packet Access (HSDPA) was introduced to UMTS radio access
segment to provide higher capacity for new packet switched services. As a
result, packet switched sessions with multiple diverse traffic flows such as
concurrent voice and data, or video and data being transmitted to the same user
are a likely commonplace cellular packet data scenario. In HSDPA, Radio Access
Network (RAN) buffer management schemes are essential to support the end-to-end
QoS of such sessions. Hence in this paper we present the end-to-end performance
study of a proposed RAN buffer management scheme for multi-flow sessions via
dynamic system-level HSDPA simulations. The scheme is an enhancement of a
Time-Space Priority (TSP)queuing strategy applied to the Node B MAC-hs buffer
allocated to an end user with concurrent real-time (RT) and non-real-time (NRT)
flows during a multi-flow session. The experimental multiflow scenario is a
packet voice call with concurrent TCP-based file download to the same user.
Results show that with the proposed enhancements to the TSP-based RAN buffer
management,end-to-end QoS performance gains accrue to the NRT flow without
compromising RT flow QoS of the same end user session.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2016 15:00:01 GMT"
}
] | 2016-08-03T00:00:00 |
[
[
"Yerima",
"Suleiman Y.",
""
],
[
"Al-Begain",
"Khalid",
""
]
] |
new_dataset
| 0.996763 |
1608.00921
|
Saad Nadeem
|
Saad Nadeem, Rui Shi, Joseph Marino, Wei Zeng, Xianfeng Gu, and Arie
Kaufman
|
Registration of Volumetric Prostate Scans using Curvature Flow
|
Technical Report Manuscript prepared: July 2014 --> (Keywords: Shape
registration, geometry-based techniques, medical visualization, mathematical
foundations for visualization)
| null | null | null |
cs.GR math.DG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Radiological imaging of the prostate is becoming more popular among
researchers and clinicians in searching for diseases, primarily cancer. Scans
might be acquired with different equipment or at different times for prognosis
monitoring, with patient movement between scans, resulting in multiple datasets
that need to be registered. For these cases, we introduce a method for
volumetric registration using curvature flow. Multiple prostate datasets are
mapped to canonical solid spheres, which are in turn aligned and registered
through the use of identified landmarks on or within the gland. Theoretical
proof and experimental results show that our method produces homeomorphisms
with feature constraints. We provide thorough validation of our method by
registering prostate scans of the same patient in different orientations, from
different days and using different modes of MRI. Our method also provides the
foundation for a general group-wise registration using a standard reference,
defined on the complex plane, for any input. In the present context, this can
be used for registering as many scans as needed for a single patient or
different patients on the basis of age, weight or even malignant and
non-malignant attributes to study the differences in general population. Though
we present this technique with a specific application to the prostate, it is
generally applicable for volumetric registration problems.
|
[
{
"version": "v1",
"created": "Tue, 2 Aug 2016 18:15:34 GMT"
}
] | 2016-08-03T00:00:00 |
[
[
"Nadeem",
"Saad",
""
],
[
"Shi",
"Rui",
""
],
[
"Marino",
"Joseph",
""
],
[
"Zeng",
"Wei",
""
],
[
"Gu",
"Xianfeng",
""
],
[
"Kaufman",
"Arie",
""
]
] |
new_dataset
| 0.99714 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.