id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1503.06465
Joao Carreira
Joao Carreira, Sara Vicente, Lourdes Agapito and Jorge Batista
Lifting Object Detection Datasets into 3D
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While data has certainly taken the center stage in computer vision in recent years, it can still be difficult to obtain in certain scenarios. In particular, acquiring ground truth 3D shapes of objects pictured in 2D images remains a challenging feat and this has hampered progress in recognition-based object reconstruction from a single image. Here we propose to bypass previous solutions such as 3D scanning or manual design, that scale poorly, and instead populate object category detection datasets semi-automatically with dense, per-object 3D reconstructions, bootstrapped from:(i) class labels, (ii) ground truth figure-ground segmentations and (iii) a small set of keypoint annotations. Our proposed algorithm first estimates camera viewpoint using rigid structure-from-motion and then reconstructs object shapes by optimizing over visual hull proposals guided by loose within-class shape similarity assumptions. The visual hull sampling process attempts to intersect an object's projection cone with the cones of minimal subsets of other similar objects among those pictured from certain vantage points. We show that our method is able to produce convincing per-object 3D reconstructions and to accurately estimate cameras viewpoints on one of the most challenging existing object-category detection datasets, PASCAL VOC. We hope that our results will re-stimulate interest on joint object recognition and 3D reconstruction from a single image.
[ { "version": "v1", "created": "Sun, 22 Mar 2015 19:26:57 GMT" }, { "version": "v2", "created": "Sun, 31 Jul 2016 09:49:19 GMT" } ]
2016-08-02T00:00:00
[ [ "Carreira", "Joao", "" ], [ "Vicente", "Sara", "" ], [ "Agapito", "Lourdes", "" ], [ "Batista", "Jorge", "" ] ]
new_dataset
0.997726
1504.02367
Changchuan Yin Dr.
Changchuan Yin, Jiasong Wang
Periodic power spectrum with applications in detection of latent periodicities in DNA sequences
null
null
10.1007/s00285-016-0982-8
null
cs.DM cs.CE q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Latent periodic elements in genomes play important roles in genomic functions. Many complex periodic elements in genomes are difficult to be detected by commonly used digital signal processing (DSP). We present a novel method to compute the periodic power spectrum of a DNA sequence based on the nucleotide distributions on periodic positions of the sequence. The method directly calculates full periodic spectrum of a DNA sequence rather than frequency spectrum by Fourier transform. The magnitude of the periodic power spectrum reflects the strength of the periodicity signals, thus, the algorithm can capture all the latent periodicities in DNA sequences. We apply this method on detection of latent periodicities in different genome elements, including exons and microsatellite DNA sequences. The results show that the method minimizes the impact of spectral leakage, captures a much broader latent periodicities in genomes, and outperforms the conventional Fourier transform.
[ { "version": "v1", "created": "Thu, 9 Apr 2015 16:32:11 GMT" }, { "version": "v2", "created": "Thu, 30 Apr 2015 17:07:51 GMT" } ]
2016-08-02T00:00:00
[ [ "Yin", "Changchuan", "" ], [ "Wang", "Jiasong", "" ] ]
new_dataset
0.998804
1504.04715
Nelma Moreira
Stavros Konstantinidis, Casey Meijer, Nelma Moreira, Rog\'erio Reis
Symbolic Manipulation of Code Properties
Extended version of the CIAA 2016 paper, "Implementation of Code Properties via Transducers", LNCS 9705, pp. 189-201, Springer, 2016
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The FAdo system is a symbolic manipulator of formal languages objects, implemented in Python. In this work, we extend its capabilities by implementing methods to manipulate transducers and we go one level higher than existing formal language systems and implement methods to manipulate objects representing classes of independent languages (widely known as code properties). Our methods allow users to define their own code properties and combine them between themselves or with fixed properties such as prefix codes, suffix codes, error detecting codes, etc. The satisfaction and maximality decision questions are solvable for any of the definable properties. The new online system LaSer allows to query about code properties and obtain the answer in a batch mode. Our work is founded on independence theory as well as the theory of rational relations and transducers and contributes with improveded algorithms on these objects.
[ { "version": "v1", "created": "Sat, 18 Apr 2015 13:19:49 GMT" }, { "version": "v2", "created": "Mon, 1 Aug 2016 10:16:26 GMT" } ]
2016-08-02T00:00:00
[ [ "Konstantinidis", "Stavros", "" ], [ "Meijer", "Casey", "" ], [ "Moreira", "Nelma", "" ], [ "Reis", "Rogério", "" ] ]
new_dataset
0.990463
1607.00597
Ehab Salahat Mr
Ehab Salahat
On the Performance of DCSK MIMO Relay Cooperative Diversity in Nakagami-m and Generalized Gaussian Noise Scenarios
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Chaotic Communications have drawn a great deal of attention to the wireless communication industry and research due to its limitless meritorious features, including excellent anti-fading and anti-intercept capabilities and jamming resistance exempli gratia. Differential Chaos Shift Keying (DCSK) is of particular interest due to its low-complexity and low-power and many attractive properties. However, most of the DCSK studies reported in the literature considered the additive white Gaussian noise environment in non-cooperative scenarios. Moreover, the analytical derivations and evaluation of the error rates and other performance metrics are generally left in an integral form and evaluated using numerical techniques. To circumvent on these issues, this work is dedicated to present a new approximate error rates analysis of multi-access multiple-input multiple-output dual-hop relaying DCSK cooperative diversity (DCSK-CD) in Nakagami-m fading channels (enclosing the Rayleigh fading as a particular case). Based on this approximation, closed-form expressions for the average error rates are derived for multiple relaying protocols, namely the error-free and the decode-and-forward relaying. Testing results validate the accuracy of the derived analytical expressions.
[ { "version": "v1", "created": "Sun, 3 Jul 2016 05:54:56 GMT" }, { "version": "v2", "created": "Sun, 31 Jul 2016 09:48:30 GMT" } ]
2016-08-02T00:00:00
[ [ "Salahat", "Ehab", "" ] ]
new_dataset
0.954548
1607.08583
Eric Nunes
Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian
Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence
6 page paper accepted to be presented at IEEE Intelligence and Security Informatics 2016 Tucson, Arizona USA September 27-30, 2016
null
null
null
cs.CR cs.AI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present an operational system for cyber threat intelligence gathering from various social platforms on the Internet particularly sites on the darknet and deepnet. We focus our attention to collecting information from hacker forum discussions and marketplaces offering products and services focusing on malicious hacking. We have developed an operational system for obtaining information from these sites for the purposes of identifying emerging cyber threats. Currently, this system collects on average 305 high-quality cyber threat warnings each week. These threat warnings include information on newly developed malware and exploits that have not yet been deployed in a cyber-attack. This provides a significant service to cyber-defenders. The system is significantly augmented through the use of various data mining and machine learning techniques. With the use of machine learning models, we are able to recall 92% of products in marketplaces and 80% of discussions on forums relating to malicious hacking with high precision. We perform preliminary analysis on the data collected, demonstrating its application to aid a security expert for better threat analysis.
[ { "version": "v1", "created": "Thu, 28 Jul 2016 19:30:04 GMT" } ]
2016-08-02T00:00:00
[ [ "Nunes", "Eric", "" ], [ "Diab", "Ahmad", "" ], [ "Gunn", "Andrew", "" ], [ "Marin", "Ericsson", "" ], [ "Mishra", "Vineet", "" ], [ "Paliath", "Vivin", "" ], [ "Robertson", "John", "" ], [ "Shakarian", "Jana", "" ], [ "Thart", "Amanda", "" ], [ "Shakarian", "Paulo", "" ] ]
new_dataset
0.991074
1608.00092
Truyen Tran
Hoa Khanh Dam, Truyen Tran, John Grundy, Aditya Ghose
DeepSoft: A vision for a deep model of software
FSE 2016
null
null
null
cs.SE stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although software analytics has experienced rapid growth as a research area, it has not yet reached its full potential for wide industrial adoption. Most of the existing work in software analytics still relies heavily on costly manual feature engineering processes, and they mainly address the traditional classification problems, as opposed to predicting future events. We present a vision for \emph{DeepSoft}, an \emph{end-to-end} generic framework for modeling software and its development process to predict future risks and recommend interventions. DeepSoft, partly inspired by human memory, is built upon the powerful deep learning-based Long Short Term Memory architecture that is capable of learning long-term temporal dependencies that occur in software evolution. Such deep learned patterns of software can be used to address a range of challenging problems such as code and task recommendation and prediction. DeepSoft provides a new approach for research into modeling of source code, risk prediction and mitigation, developer modeling, and automatically generating code patches from bug reports.
[ { "version": "v1", "created": "Sat, 30 Jul 2016 08:38:15 GMT" } ]
2016-08-02T00:00:00
[ [ "Dam", "Hoa Khanh", "" ], [ "Tran", "Truyen", "" ], [ "Grundy", "John", "" ], [ "Ghose", "Aditya", "" ] ]
new_dataset
0.979946
1608.00191
Ankit Singh Rawat
Venkatesan Guruswami, Ankit Singh Rawat
New MDS codes with small sub-packetization and near-optimal repair bandwidth
null
null
null
null
cs.IT cs.DS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An $(n, M)$ vector code $\mathcal{C} \subseteq \mathbb{F}^n$ is a collection of $M$ codewords where $n$ elements (from the field $\mathbb{F}$) in each of the codewords are referred to as code blocks. Assuming that $\mathbb{F} \cong \mathbb{B}^{\ell}$, the code blocks are treated as $\ell$-length vectors over the base field $\mathbb{B}$. Equivalently, the code is said to have the sub-packetization level $\ell$. This paper addresses the problem of constructing MDS vector codes which enable exact reconstruction of each code block by downloading small amount of information from the remaining code blocks. The repair bandwidth of a code measures the information flow from the remaining code blocks during the reconstruction of a single code block. This problem naturally arises in the context of distributed storage systems as the node repair problem [4]. Assuming that $M = |\mathbb{B}|^{k\ell}$, the repair bandwidth of an MDS vector code is lower bounded by $\big(\frac{n - 1}{n - k}\big)\cdot \ell$ symbols (over the base field $\mathbb{B}$) which is also referred to as the cut-set bound [4]. For all values of $n$ and $k$, the MDS vector codes that attain the cut-set bound with the sub-packetization level $\ell = (n-k)^{\lceil{{n}/{(n-k)}}\rceil}$ are known in the literature [23, 35]. This paper presents a construction for MDS vector codes which simultaneously ensures both small repair bandwidth and small sub-packetization level. The obtained codes have the smallest possible sub-packetization level $\ell = O(n - k)$ for an MDS vector code and the repair bandwidth which is at most twice the cut-set bound. The paper then generalizes this code construction so that the repair bandwidth of the obtained codes approach the cut-set bound at the cost of increased sub-packetization level. The constructions presented in this paper give MDS vector codes which are linear over the base field $\mathbb{B}$.
[ { "version": "v1", "created": "Sun, 31 Jul 2016 06:30:54 GMT" } ]
2016-08-02T00:00:00
[ [ "Guruswami", "Venkatesan", "" ], [ "Rawat", "Ankit Singh", "" ] ]
new_dataset
0.959159
1608.00203
Balint Antal
Balint Antal
Automatic 3D Point Set Reconstruction from Stereo Laparoscopic Images using Deep Neural Networks
In Proceedings of the 6th International Joint Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2016), pages 116-121 ISBN: 978-989-758-195-3
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, an automatic approach to predict 3D coordinates from stereo laparoscopic images is presented. The approach maps a vector of pixel intensities to 3D coordinates through training a six layer deep neural network. The architectural aspects of the approach is presented and in detail and the method is evaluated on a publicly available dataset with promising results.
[ { "version": "v1", "created": "Sun, 31 Jul 2016 09:28:28 GMT" } ]
2016-08-02T00:00:00
[ [ "Antal", "Balint", "" ] ]
new_dataset
0.966268
1608.00209
Adel Elmahdy
Adel M. Elmahdy, Amr El-Keyi, Yahya Mohasseb, Tamer ElBatt, Mohammed Nafie, Karim G. Seddik, Tamer Khattab
Asymmetric Degrees of Freedom of the Full-Duplex MIMO 3-Way Channel with Unicast and Broadcast Messages
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is when each node has two unicast messages to be delivered to the two other nodes, while the second configuration is when each node has two unicast messages as well as one broadcast message to be delivered to the two other nodes. For each configuration, we first derive upper bounds on the total DoF of the system. Cut-set bounds in conjunction with genie-aided bounds are derived to characterize the achievable total DoF. Afterwards, we analytically derive the optimal number of transmit and receive antennas at each node to maximize the total DoF of the system, subject to the total number of antennas at each node. Finally, the achievable schemes for each configuration are constructed. The proposed schemes are mainly based on zero-forcing and null-space transmit beamforming.
[ { "version": "v1", "created": "Sun, 31 Jul 2016 11:32:14 GMT" } ]
2016-08-02T00:00:00
[ [ "Elmahdy", "Adel M.", "" ], [ "El-Keyi", "Amr", "" ], [ "Mohasseb", "Yahya", "" ], [ "ElBatt", "Tamer", "" ], [ "Nafie", "Mohammed", "" ], [ "Seddik", "Karim G.", "" ], [ "Khattab", "Tamer", "" ] ]
new_dataset
0.977052
1608.00417
Abuzer Yakaryilmaz
Maksims Dimitrijevs and Abuzer Yakary{\i}lmaz
Uncountable classical and quantum complexity classes
19 pages. Accepted to NCMA2016
null
null
null
cs.CC cs.FL quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polynomial--time constant--space quantum Turing machines (QTMs) and logarithmic--space probabilistic Turing machines (PTMs) recognize uncountably many languages with bounded error (Say and Yakary\i lmaz 2014, arXiv:1411.7647). In this paper, we investigate more restricted cases for both models to recognize uncountably many languages with bounded error. We show that double logarithmic space is enough for PTMs on unary languages in sweeping reading mode or logarithmic space for one-way head. On unary languages, for quantum models, we obtain middle logarithmic space for counter machines. For binary languages, arbitrary small non-constant space is enough for PTMs even using only counter as memory. For counter machines, when restricted to polynomial time, we can obtain the same result for linear space. For constant--space QTMs, we follow the result for a restricted sweeping head, known as restarting realtime.
[ { "version": "v1", "created": "Mon, 1 Aug 2016 13:20:16 GMT" } ]
2016-08-02T00:00:00
[ [ "Dimitrijevs", "Maksims", "" ], [ "Yakaryılmaz", "Abuzer", "" ] ]
new_dataset
0.977179
1608.00462
Marco De Nadai
Marco De Nadai, Radu L. Vieriu, Gloria Zen, Stefan Dragicevic, Nikhil Naik, Michele Caraviello, Cesar A. Hidalgo, Nicu Sebe, Bruno Lepri
Are Safer Looking Neighborhoods More Lively? A Multimodal Investigation into Urban Life
To appear in the Proceedings of ACM Multimedia Conference (MM), 2016. October 15 - 19, 2016, Amsterdam, Netherlands
null
null
null
cs.CY cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Policy makers, urban planners, architects, sociologists, and economists are interested in creating urban areas that are both lively and safe. But are the safety and liveliness of neighborhoods independent characteristics? Or are they just two sides of the same coin? In a world where people avoid unsafe looking places, neighborhoods that look unsafe will be less lively, and will fail to harness the natural surveillance of human activity. But in a world where the preference for safe looking neighborhoods is small, the connection between the perception of safety and liveliness will be either weak or nonexistent. In this paper we explore the connection between the levels of activity and the perception of safety of neighborhoods in two major Italian cities by combining mobile phone data (as a proxy for activity or liveliness) with scores of perceived safety estimated using a Convolutional Neural Network trained on a dataset of Google Street View images scored using a crowdsourced visual perception survey. We find that: (i) safer looking neighborhoods are more active than what is expected from their population density, employee density, and distance to the city centre; and (ii) that the correlation between appearance of safety and activity is positive, strong, and significant, for females and people over 50, but negative for people under 30, suggesting that the behavioral impact of perception depends on the demographic of the population. Finally, we use occlusion techniques to identify the urban features that contribute to the appearance of safety, finding that greenery and street facing windows contribute to a positive appearance of safety (in agreement with Oscar Newman's defensible space theory). These results suggest that urban appearance modulates levels of human activity and, consequently, a neighborhood's rate of natural surveillance.
[ { "version": "v1", "created": "Mon, 1 Aug 2016 15:06:40 GMT" } ]
2016-08-02T00:00:00
[ [ "De Nadai", "Marco", "" ], [ "Vieriu", "Radu L.", "" ], [ "Zen", "Gloria", "" ], [ "Dragicevic", "Stefan", "" ], [ "Naik", "Nikhil", "" ], [ "Caraviello", "Michele", "" ], [ "Hidalgo", "Cesar A.", "" ], [ "Sebe", "Nicu", "" ], [ "Lepri", "Bruno", "" ] ]
new_dataset
0.997271
1608.00509
Mahdi Zamani
Mahdi Zamani, Jared Saia, Jedidiah Crandall
TorBricks: Blocking-Resistant Tor Bridge Distribution
11 pages
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tor is currently the most popular network for anonymous Internet access. It critically relies on volunteer nodes called bridges for relaying Internet traffic when a user's ISP blocks connections to Tor. Unfortunately, current methods for distributing bridges are vulnerable to malicious users who obtain and block bridge addresses. In this paper, we propose TorBricks, a protocol for distributing Tor bridges to n users, even when an unknown number t < n of these users are controlled by a malicious adversary. TorBricks distributes O(tlog(n)) bridges and guarantees that all honest users can connect to Tor with high probability after O(log(t)) rounds of communication with the distributor. We also extend our algorithm to perform privacy-preserving bridge distribution when run among multiple untrusted distributors. This not only prevents the distributors from learning bridge addresses and bridge assignment information, but also provides resistance against malicious attacks from a m/3 fraction of the distributors, where m is the number of distributors.
[ { "version": "v1", "created": "Mon, 1 Aug 2016 17:58:37 GMT" } ]
2016-08-02T00:00:00
[ [ "Zamani", "Mahdi", "" ], [ "Saia", "Jared", "" ], [ "Crandall", "Jedidiah", "" ] ]
new_dataset
0.99536
1607.07403
Sebastian Schelter
Sebastian Schelter, J\'er\^ome Kunegis
On the Ubiquity of Web Tracking: Insights from a Billion-Page Web Crawl
null
null
null
null
cs.SI
http://creativecommons.org/licenses/by-nc-sa/4.0/
We perform a large-scale analysis of third-party trackers on the World Wide Web from more than 3.5 billion web pages of the CommonCrawl 2012 corpus. We extract a dataset containing more than 140 million third-party embeddings in over 41 million domains. To the best of our knowledge, this constitutes the largest web tracking dataset collected so far, and exceeds related studies by more than an order of magnitude in the number of domains and web pages analyzed. We perform a large-scale study of online tracking, on three levels: (1) On a global level, we give a precise figure for the extent of tracking, give insights into the structure of the `online tracking sphere' and analyse which trackers are used by how many websites. (2) On a country-specific level, we analyse which trackers are used by websites in different countries, and identify the countries in which websites choose significantly different trackers than in the rest of the world. (3) We answer the question whether the content of websites influences the choice of trackers they use, leveraging more than 90 thousand categorized domains. In particular, we analyse whether highly privacy-critical websites make different choices of trackers than other websites. Based on the performed analyses, we confirm that trackers are widespread (as expected), and that a small number of trackers dominates the web (Google, Facebook and Twitter). In particular, the three tracking domains with the highest PageRank are all owned by Google. The only exception to this pattern are a few countries such as China and Russia. Our results suggest that this dominance is strongly associated with country-specific political factors such as freedom of the press. We also confirm that websites with highly privacy-critical content are less likely to contain trackers (60% vs 90% for other websites), even though the majority of them still do contain trackers.
[ { "version": "v1", "created": "Mon, 25 Jul 2016 18:49:20 GMT" }, { "version": "v2", "created": "Fri, 29 Jul 2016 06:29:26 GMT" } ]
2016-08-01T00:00:00
[ [ "Schelter", "Sebastian", "" ], [ "Kunegis", "Jérôme", "" ] ]
new_dataset
0.998543
1607.08414
Michael Wray
Michael Wray, Davide Moltisanti, Walterio Mayol-Cuevas and Dima Damen
SEMBED: Semantic Embedding of Egocentric Action Videos
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present SEMBED, an approach for embedding an egocentric object interaction video in a semantic-visual graph to estimate the probability distribution over its potential semantic labels. When object interactions are annotated using unbounded choice of verbs, we embrace the wealth and ambiguity of these labels by capturing the semantic relationships as well as the visual similarities over motion and appearance features. We show how SEMBED can interpret a challenging dataset of 1225 freely annotated egocentric videos, outperforming SVM classification by more than 5%.
[ { "version": "v1", "created": "Thu, 28 Jul 2016 11:55:38 GMT" }, { "version": "v2", "created": "Fri, 29 Jul 2016 09:40:37 GMT" } ]
2016-08-01T00:00:00
[ [ "Wray", "Michael", "" ], [ "Moltisanti", "Davide", "" ], [ "Mayol-Cuevas", "Walterio", "" ], [ "Damen", "Dima", "" ] ]
new_dataset
0.996774
1607.08635
Zhengdong Zhang
Amr Suleiman, Zhengdong Zhang, Vivienne Sze
A 58.6mW Real-Time Programmable Object Detector with Multi-Scale Multi-Object Support Using Deformable Parts Model on 1920x1080 Video at 30fps
null
null
null
null
cs.CV cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a programmable, energy-efficient and real-time object detection accelerator using deformable parts models (DPM), with 2x higher accuracy than traditional rigid body models. With 8 deformable parts detection, three methods are used to address the high computational complexity: classification pruning for 33x fewer parts classification, vector quantization for 15x memory size reduction, and feature basis projection for 2x reduction of the cost of each classification. The chip is implemented in 65nm CMOS technology, and can process HD (1920x1080) images at 30fps without any off-chip storage while consuming only 58.6mW (0.94nJ/pixel, 1168 GOPS/W). The chip has two classification engines to simultaneously detect two different classes of objects. With a tested high throughput of 60fps, the classification engines can be time multiplexed to detect even more than two object classes. It is energy scalable by changing the pruning factor or disabling the parts classification.
[ { "version": "v1", "created": "Wed, 27 Jul 2016 19:20:33 GMT" } ]
2016-08-01T00:00:00
[ [ "Suleiman", "Amr", "" ], [ "Zhang", "Zhengdong", "" ], [ "Sze", "Vivienne", "" ] ]
new_dataset
0.996983
1511.02784
Carla Michini
Alberto Del Pia, Michael Ferris and Carla Michini
Totally Unimodular Congestion Games
null
null
null
null
cs.GT cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate a new class of congestion games, called Totally Unimodular (TU) Congestion Games, where the players' strategies are binary vectors inside polyhedra defined by totally unimodular constraint matrices. Network congestion games belong to this class. In the symmetric case, when all players have the same strategy set, we design an algorithm that finds an optimal aggregated strategy and then decomposes it into the single players' strategies. This approach yields strongly polynomial-time algorithms to (i) find a pure Nash equilibrium, and (ii) compute a socially optimal state, if the delay functions are weakly convex. We also show how this technique can be extended to matroid congestion games. We introduce some combinatorial TU congestion games, where the players' strategies are matchings, vertex covers, edge covers, and stable sets of a given bipartite graph. In the asymmetric case, we show that for these games (i) it is PLS-complete to find a pure Nash equilibrium even in case of linear delay functions, and (ii) it is NP-hard to compute a socially optimal state, even in case of weakly convex delay functions.
[ { "version": "v1", "created": "Mon, 9 Nov 2015 17:49:42 GMT" }, { "version": "v2", "created": "Wed, 27 Jul 2016 21:59:28 GMT" } ]
2016-07-29T00:00:00
[ [ "Del Pia", "Alberto", "" ], [ "Ferris", "Michael", "" ], [ "Michini", "Carla", "" ] ]
new_dataset
0.970941
1511.07209
Chao Wang Mr.
Chao Wang, Somchaya Liemhetcharat, Kian Hsiang Low
Multi-Agent Continuous Transportation with Online Balanced Partitioning
2 pages, published in the proceedings of the 15th AAMAS conference
null
null
null
cs.MA cs.AI cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the concept of continuous transportation task to the context of multi-agent systems. A continuous transportation task is one in which a multi-agent team visits a number of fixed locations, picks up objects, and delivers them to a final destination. The goal is to maximize the rate of transportation while the objects are replenished over time. Examples of problems that need continuous transportation are foraging, area sweeping, and first/last mile problem. Previous approaches typically neglect the interference and are highly dependent on communications among agents. Some also incorporate an additional reconnaissance agent to gather information. In this paper, we present a hybrid of centralized and distributed approaches that minimize the interference and communications in the multi-agent team without the need for a reconnaissance agent. We contribute two partitioning-transportation algorithms inspired by existing algorithms, and contribute one novel online partitioning-transportation algorithm with information gathering in the multi-agent team. Our algorithms have been implemented and tested extensively in the simulation. The results presented in this paper demonstrate the effectiveness of our algorithms that outperform the existing algorithms, even without any communications between the agents and without the presence of a reconnaissance agent.
[ { "version": "v1", "created": "Mon, 23 Nov 2015 13:04:47 GMT" }, { "version": "v2", "created": "Thu, 28 Jul 2016 09:11:40 GMT" } ]
2016-07-29T00:00:00
[ [ "Wang", "Chao", "" ], [ "Liemhetcharat", "Somchaya", "" ], [ "Low", "Kian Hsiang", "" ] ]
new_dataset
0.969926
1607.06830
Yiming Yang
Yiming Yang, Vladimir Ivan, Zhibin Li, Maurice Fallon, Sethu Vijayakumar
iDRM: Humanoid Motion Planning with Real-Time End-Pose Selection in Complex Environments
8 pages, 9 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a novel inverse Dynamic Reachability Map (iDRM) that allows a floating base system to find valid end-poses in complex and dynamically changing environments in real-time. End-pose planning for valid stance pose and collision-free configuration is an essential problem for humanoid applications, such as providing goal states for walking and motion planners. However, this is non-trivial in complex environments, where standing locations and reaching postures are restricted by obstacles. Our proposed iDRM customizes the robot-to-workspace occupation list and uses an online update algorithm to enable efficient reconstruction of the reachability map to guarantee that the selected end-poses are always collision-free. The iDRM was evaluated in a variety of reaching tasks using the 38 degree-of-freedom (DoF) humanoid robot Valkyrie. Our results show that the approach is capable of finding valid end-poses in a fraction of a second. Significantly, we also demonstrate that motion planning algorithms integrating our end-pose planning method are more efficient than those not utilizing this technique.
[ { "version": "v1", "created": "Fri, 22 Jul 2016 20:15:31 GMT" }, { "version": "v2", "created": "Thu, 28 Jul 2016 19:45:27 GMT" } ]
2016-07-29T00:00:00
[ [ "Yang", "Yiming", "" ], [ "Ivan", "Vladimir", "" ], [ "Li", "Zhibin", "" ], [ "Fallon", "Maurice", "" ], [ "Vijayakumar", "Sethu", "" ] ]
new_dataset
0.99962
1607.08401
Federico Pintore
Riccardo Longo, Federico Pintore, Giancarlo Rinaldo, Massimiliano Sala
On the security of the Blockchain Bix Protocol and Certificates
16 pages, 1 figure
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The BIX protocol is a blockchain-based protocol that allows distribution of certificates linking a subject with his public key, hence providing a service similar to that of a PKI but without the need of a CA. In this paper we analyze the security of the BIX protocol in a formal way, in four steps. First, we identify formal security assumptions which are well-suited to this protocol. Second, we present some attack scenarios against the BIX protocol. Third, we provide a formal security proof that some of these attacks are not feasible under our previously established assumptions. Finally, we show how another attack may be carried on.
[ { "version": "v1", "created": "Thu, 28 Jul 2016 11:07:54 GMT" } ]
2016-07-29T00:00:00
[ [ "Longo", "Riccardo", "" ], [ "Pintore", "Federico", "" ], [ "Rinaldo", "Giancarlo", "" ], [ "Sala", "Massimiliano", "" ] ]
new_dataset
0.992179
1604.01753
Gunnar Sigurdsson
Gunnar A. Sigurdsson, G\"ul Varol, Xiaolong Wang, Ali Farhadi, Ivan Laptev, Abhinav Gupta
Hollywood in Homes: Crowdsourcing Data Collection for Activity Understanding
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computer vision has a great potential to help our daily lives by searching for lost keys, watering flowers or reminding us to take a pill. To succeed with such tasks, computer vision methods need to be trained from real and diverse examples of our daily dynamic scenes. While most of such scenes are not particularly exciting, they typically do not appear on YouTube, in movies or TV broadcasts. So how do we collect sufficiently many diverse but boring samples representing our lives? We propose a novel Hollywood in Homes approach to collect such data. Instead of shooting videos in the lab, we ensure diversity by distributing and crowdsourcing the whole process of video creation from script writing to video recording and annotation. Following this procedure we collect a new dataset, Charades, with hundreds of people recording videos in their own homes, acting out casual everyday activities. The dataset is composed of 9,848 annotated videos with an average length of 30 seconds, showing activities of 267 people from three continents. Each video is annotated by multiple free-text descriptions, action labels, action intervals and classes of interacted objects. In total, Charades provides 27,847 video descriptions, 66,500 temporally localized intervals for 157 action classes and 41,104 labels for 46 object classes. Using this rich data, we evaluate and provide baseline results for several tasks including action recognition and automatic description generation. We believe that the realism, diversity, and casual nature of this dataset will present unique challenges and new opportunities for computer vision community.
[ { "version": "v1", "created": "Wed, 6 Apr 2016 19:56:04 GMT" }, { "version": "v2", "created": "Fri, 8 Jul 2016 19:57:24 GMT" }, { "version": "v3", "created": "Tue, 26 Jul 2016 22:49:22 GMT" } ]
2016-07-28T00:00:00
[ [ "Sigurdsson", "Gunnar A.", "" ], [ "Varol", "Gül", "" ], [ "Wang", "Xiaolong", "" ], [ "Farhadi", "Ali", "" ], [ "Laptev", "Ivan", "" ], [ "Gupta", "Abhinav", "" ] ]
new_dataset
0.992974
1605.03449
Atsushi Iwasaki
Atsushi Iwasaki, Ken Umeno
One-stroke polynomials over a ring of modulo $2^w$
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Permutation polynomials over a ring of modulo $2^w$ are compatible with digital computers and digital signal processors, and so they are in particular expected to be useful for cryptography and pseudo random number generator. In general, the period of the polynomial should be long in such fields. In this paper, we derive the necessary and sufficient condition which specify one-stroke polynomials which are permutation polynomials whose periods are maximized.
[ { "version": "v1", "created": "Wed, 11 May 2016 14:08:50 GMT" }, { "version": "v2", "created": "Wed, 27 Jul 2016 11:26:26 GMT" } ]
2016-07-28T00:00:00
[ [ "Iwasaki", "Atsushi", "" ], [ "Umeno", "Ken", "" ] ]
new_dataset
0.998931
1607.07920
Li Tang
Li Tang and Aditya Ramamoorthy
Coded Caching with Low Subpacketization Levels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Caching is popular technique in content delivery networks that allows for reductions in transmission rates from the content-hosting server to the end users. Coded caching is a generalization of conventional caching that considers the possibility of coding in the caches and transmitting coded signals from the server. Prior results in this area demonstrate that huge reductions in transmission rates are possible and this makes coded caching an attractive option for the next generation of content-delivery networks. However, these results require that each file hosted in the server be partitioned into a large number (i.e., the subpacketization level) of non-overlapping subfiles. From a practical perspective, this is problematic as it means that prior schemes are only applicable when the size of the files is extremely large. In this work, we propose a novel coded caching scheme that enjoys a significantly lower subpacketization level than prior schemes, while only suffering a marginal increase in the transmission rate. In particular, for a fixed cache size, the scaling with the number of users is such that the increase in transmission rate is negligible, but the decrease in subpacketization level is exponential.
[ { "version": "v1", "created": "Wed, 27 Jul 2016 00:30:21 GMT" } ]
2016-07-28T00:00:00
[ [ "Tang", "Li", "" ], [ "Ramamoorthy", "Aditya", "" ] ]
new_dataset
0.992998
1607.07980
James Hennessey
James W. Hennessey, Han Liu, Holger Winnem\"oller, Mira Dontcheva, Niloy J. Mitra
How2Sketch: Generating Easy-To-Follow Tutorials for Sketching 3D Objects
null
null
null
null
cs.GR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Accurately drawing 3D objects is difficult for untrained individuals, as it requires an understanding of perspective and its effects on geometry and proportions. Step-by-step tutorials break the complex task of sketching an entire object down into easy-to-follow steps that even a novice can follow. However, creating such tutorials requires expert knowledge and is a time-consuming task. As a result, the availability of tutorials for a given object or viewpoint is limited. How2Sketch addresses this problem by automatically generating easy-to-follow tutorials for arbitrary 3D objects. Given a segmented 3D model and a camera viewpoint,it computes a sequence of steps for constructing a drawing scaffold comprised of geometric primitives, which helps the user draw the final contours in correct perspective and proportion. To make the drawing scaffold easy to construct, the algorithm solves for an ordering among the scaffolding primitives and explicitly makes small geometric modifications to the size and location of the object parts to simplify relative positioning. Technically, we formulate this scaffold construction as a single selection problem that simultaneously solves for the ordering and geometric changes of the primitives. We demonstrate our algorithm for generating tutorials on a variety of man-made objects and evaluate how easily the tutorials can be followed with a user study.
[ { "version": "v1", "created": "Wed, 27 Jul 2016 06:55:22 GMT" } ]
2016-07-28T00:00:00
[ [ "Hennessey", "James W.", "" ], [ "Liu", "Han", "" ], [ "Winnemöller", "Holger", "" ], [ "Dontcheva", "Mira", "" ], [ "Mitra", "Niloy J.", "" ] ]
new_dataset
0.999292
1607.08041
Di Chen
Di Chen, Mordecai Golin
Minmax Tree Facility Location and Sink Evacuation with Dynamic Confluent Flows
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $G=(V,E)$ be a graph modelling a building or road network in which edges have-both travel times (lengths) and capacities associated with them. An edge's capacity is the number of people that can enter that edge in a unit of time. In emergencies, people evacuate towards the exits. If too many people try to evacuate through the same edge, congestion builds up and slows down the evacuation. Graphs with both lengths and capacities are known as Dynamic Flow networks. An evacuation plan for $G$ consists of a choice of exit locations and a partition of the people at the vertices into groups, with each group evacuating to the same exit. The evacuation time of a plan is the time it takes until the last person evacuates. The $k$-sink evacuation problem is to provide an evacuation plan with $k$ exit locations that minimizes the evacuation time. It is known that this problem is NP-Hard for general graphs but no polynomial time algorithm was previously known even for the case of $G$ a tree. This paper presents an $O(n k^2 \log^5 n)$ algorithm for the $k$-sink evacuation problem on trees. Our algorithms also apply to a more general class of problems, which we call minmax tree facility location.
[ { "version": "v1", "created": "Wed, 27 Jul 2016 11:24:30 GMT" } ]
2016-07-28T00:00:00
[ [ "Chen", "Di", "" ], [ "Golin", "Mordecai", "" ] ]
new_dataset
0.999542
1607.08176
Szymon Grabowski
Tomasz Kowalski, Szymon Grabowski, Kimmo Fredriksson, Marcin Raniszewski
Suffix arrays with a twist
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The suffix array is a classic full-text index, combining effectiveness with simplicity. We discuss three approaches aiming to improve its efficiency even more: changes to the navigation, data layout and adding extra data. In short, we show that $(i)$ how we search for the right interval boundary impacts significantly the overall search speed, $(ii)$ a B-tree data layout easily wins over the standard one, $(iii)$ the well-known idea of a lookup table for the prefixes of the suffixes can be refined with using compression, $(iv)$ caching prefixes of the suffixes in a helper array can pose a(nother) practical space-time tradeoff.
[ { "version": "v1", "created": "Wed, 27 Jul 2016 16:50:05 GMT" } ]
2016-07-28T00:00:00
[ [ "Kowalski", "Tomasz", "" ], [ "Grabowski", "Szymon", "" ], [ "Fredriksson", "Kimmo", "" ], [ "Raniszewski", "Marcin", "" ] ]
new_dataset
0.988044
1607.08196
Lili Tao
Lili Tao, Tilo Burghardt, Majid Mirmehdi, Dima Damen, Ashley Cooper, Sion Hannuna, Massimo Camplani, Adeline Paiement, Ian Craddock
Calorie Counter: RGB-Depth Visual Estimation of Energy Expenditure at Home
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new framework for vision-based estimation of calorific expenditure from RGB-D data - the first that is validated on physical gas exchange measurements and applied to daily living scenarios. Deriving a person's energy expenditure from sensors is an important tool in tracking physical activity levels for health and lifestyle monitoring. Most existing methods use metabolic lookup tables (METs) for a manual estimate or systems with inertial sensors which ultimately require users to wear devices. In contrast, the proposed pose-invariant and individual-independent vision framework allows for a remote estimation of calorific expenditure. We introduce, and evaluate our approach on, a new dataset called SPHERE-calorie, for which visual estimates can be compared against simultaneously obtained, indirect calorimetry measures based on gas exchange. % based on per breath gas exchange. We conclude from our experiments that the proposed vision pipeline is suitable for home monitoring in a controlled environment, with calorific expenditure estimates above accuracy levels of commonly used manual estimations via METs. With the dataset released, our work establishes a baseline for future research for this little-explored area of computer vision.
[ { "version": "v1", "created": "Wed, 27 Jul 2016 17:47:44 GMT" } ]
2016-07-28T00:00:00
[ [ "Tao", "Lili", "" ], [ "Burghardt", "Tilo", "" ], [ "Mirmehdi", "Majid", "" ], [ "Damen", "Dima", "" ], [ "Cooper", "Ashley", "" ], [ "Hannuna", "Sion", "" ], [ "Camplani", "Massimo", "" ], [ "Paiement", "Adeline", "" ], [ "Craddock", "Ian", "" ] ]
new_dataset
0.999329
1607.08212
Gail Steinhart
Oya Y. Rieger, Gail Steinhart, Deborah Cooper
arXiv@25: Key findings of a user survey
23 pages, 6 figures
null
null
null
cs.DL
http://creativecommons.org/licenses/by/4.0/
As part of its 25th anniversary vision-setting process, the arXiv team at Cornell University Library conducted a user survey in April 2016 to seek input from the global user community about arXiv's current services and future directions. We were heartened to receive 36,000 responses from 127 countries, representing arXiv's diverse, global community. The prevailing message is that users are happy with the service as it currently stands, with 95 percent of survey respondents indicating they are very satisfied or satisfied with arXiv. Furthermore, 72 percent of respondents indicated that arXiv should continue to focus on its main purpose, which is to quickly make available scientific papers, and this will be enough to sustain the value of arXiv in the future. This theme was pervasively reflected in the open text comments; a significant number of respondents suggested remaining focused on the core mission and enabling arXiv's partners and related service providers to continue to build new services and innovations on top of arXiv.
[ { "version": "v1", "created": "Wed, 27 Jul 2016 18:43:57 GMT" } ]
2016-07-28T00:00:00
[ [ "Rieger", "Oya Y.", "" ], [ "Steinhart", "Gail", "" ], [ "Cooper", "Deborah", "" ] ]
new_dataset
0.987787
1607.08221
Yandong Guo
Yandong Guo, Lei Zhang, Yuxiao Hu, Xiaodong He, Jianfeng Gao
MS-Celeb-1M: A Dataset and Benchmark for Large-Scale Face Recognition
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we design a benchmark task and provide the associated datasets for recognizing face images and link them to corresponding entity keys in a knowledge base. More specifically, we propose a benchmark task to recognize one million celebrities from their face images, by using all the possibly collected face images of this individual on the web as training data. The rich information provided by the knowledge base helps to conduct disambiguation and improve the recognition accuracy, and contributes to various real-world applications, such as image captioning and news video analysis. Associated with this task, we design and provide concrete measurement set, evaluation protocol, as well as training data. We also present in details our experiment setup and report promising baseline results. Our benchmark task could lead to one of the largest classification problems in computer vision. To the best of our knowledge, our training dataset, which contains 10M images in version 1, is the largest publicly available one in the world.
[ { "version": "v1", "created": "Wed, 27 Jul 2016 19:18:16 GMT" } ]
2016-07-28T00:00:00
[ [ "Guo", "Yandong", "" ], [ "Zhang", "Lei", "" ], [ "Hu", "Yuxiao", "" ], [ "He", "Xiaodong", "" ], [ "Gao", "Jianfeng", "" ] ]
new_dataset
0.999891
1607.08227
Andres Arcia Moret
Andr\'es Arcia-Moret and Arjuna Sathiaseelan and Marco Zennaro and Freddy Rond\'on and Ermanno Pietrosemoli and David Johnson
Open and Regionalised Spectrum Repositories for Emerging Countries
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
TV White Spaces have recently been proposed as an alternative to alleviate the spectrum crunch, characterised by the need to reallocate frequency bands to accommodate the ever-growing demand for wireless communications. In this paper, we discuss the motivations and challenges for collecting spectrum measurements in developing regions and discuss a scalable system for communities to gather and provide access to White Spaces information through open and regionalised repositories. We further discuss two relevant aspects. First, we propose a cooperative mechanism for sensing spectrum availability using a detector approach. Second, we propose a strategy (and an architecture) on the database side to implement spectrum governance. Other aspects of the work include discussion of an extensive measurement campaign showing a number of white spaces in developing regions, an overview of our experience on low-cost spectrum analysers, and the architecture of zebra-rfo, an application for processing crowd-sourced spectrum data.
[ { "version": "v1", "created": "Sun, 17 Jul 2016 10:22:41 GMT" } ]
2016-07-28T00:00:00
[ [ "Arcia-Moret", "Andrés", "" ], [ "Sathiaseelan", "Arjuna", "" ], [ "Zennaro", "Marco", "" ], [ "Rondón", "Freddy", "" ], [ "Pietrosemoli", "Ermanno", "" ], [ "Johnson", "David", "" ] ]
new_dataset
0.985431
1510.08805
Ananthanarayanan Chockalingam
T. Lakshmi Narasimhan, R. Tejaswi, and A. Chockalingam
Quad-LED and Dual-LED Complex Modulation for Visible Light Communication
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose simple and novel complex modulation techniques that exploit the spatial domain to transmit complex-valued modulation symbols in visible light wireless communication. The idea is to use multiple light emitting diodes (LEDs) to convey the real and imaginary parts of a complex modulation symbol and their sign information, or, alternately, to convey the magnitude and phase of a complex symbol. The proposed techniques are termed as {\em quad-LED complex modulation (QCM)} and {\em dual-LED complex modulation (DCM)}. The proposed QCM scheme uses four LEDs (hence the name `quad-LED'); while the magnitudes of the real and imaginary parts are conveyed through intensity modulation of LEDs, the sign information is conveyed through spatial indexing of LEDs. The proposed DCM scheme, on the other hand, exploits the polar representation of a complex symbol; it uses only two LEDs (hence the name `dual-LED'), one LED to map the magnitude and another LED to map the phase of a complex modulation symbol. These techniques do not need Hermitian symmetry operation to generate LED compatible positive real transmit signals. We present zero-forcing and minimum distance detectors and their performance for QCM-OFDM and DCM-OFDM. We further propose another modulation scheme, termed as SM-DCM {\em (spatial modulation-DCM)} scheme, which brings in the advantage of spatial modulation (SM) to DCM. The proposed SM-DCM scheme uses two DCM BLOCKs with two LEDs in each BLOCK, and an index bit decides which among the two BLOCKs will be used in a given channel use. We study the bit error rate (BER) performance of the proposed schemes through analysis and simulations. Using tight analytical BER upper bounds and spatial distribution of the received signal-to-noise ratios, we compute and plot the achievable rate contours for a given target BER in QCM, DCM, and SM-DCM.
[ { "version": "v1", "created": "Thu, 29 Oct 2015 18:13:13 GMT" }, { "version": "v2", "created": "Mon, 2 May 2016 15:12:49 GMT" }, { "version": "v3", "created": "Sun, 24 Jul 2016 07:38:30 GMT" } ]
2016-07-27T00:00:00
[ [ "Narasimhan", "T. Lakshmi", "" ], [ "Tejaswi", "R.", "" ], [ "Chockalingam", "A.", "" ] ]
new_dataset
0.996784
1604.01360
Lerrel Pinto Mr
Lerrel Pinto, Dhiraj Gandhi, Yuanfeng Han, Yong-Lae Park, Abhinav Gupta
The Curious Robot: Learning Visual Representations via Physical Interactions
null
null
null
null
cs.CV cs.AI cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
What is the right supervisory signal to train visual representations? Current approaches in computer vision use category labels from datasets such as ImageNet to train ConvNets. However, in case of biological agents, visual representation learning does not require millions of semantic labels. We argue that biological agents use physical interactions with the world to learn visual representations unlike current vision systems which just use passive observations (images and videos downloaded from web). For example, babies push objects, poke them, put them in their mouth and throw them to learn representations. Towards this goal, we build one of the first systems on a Baxter platform that pushes, pokes, grasps and observes objects in a tabletop environment. It uses four different types of physical interactions to collect more than 130K datapoints, with each datapoint providing supervision to a shared ConvNet architecture allowing us to learn visual representations. We show the quality of learned representations by observing neuron activations and performing nearest neighbor retrieval on this learned representation. Quantitatively, we evaluate our learned ConvNet on image classification tasks and show improvements compared to learning without external data. Finally, on the task of instance retrieval, our network outperforms the ImageNet network on recall@1 by 3%
[ { "version": "v1", "created": "Tue, 5 Apr 2016 18:47:15 GMT" }, { "version": "v2", "created": "Tue, 26 Jul 2016 03:30:44 GMT" } ]
2016-07-27T00:00:00
[ [ "Pinto", "Lerrel", "" ], [ "Gandhi", "Dhiraj", "" ], [ "Han", "Yuanfeng", "" ], [ "Park", "Yong-Lae", "" ], [ "Gupta", "Abhinav", "" ] ]
new_dataset
0.975826
1607.07656
Karim Emara
Karim Emara, Wolfgang Woerndl, Johann Schlichter
Context-based Pseudonym Changing Scheme for Vehicular Adhoc Networks
Extended version of a previous paper "K. Emara, W. Woerndl, and J. Schlichter, "Poster: Context-Adaptive User-Centric Privacy Scheme for VANET," in Proceedings of the 11th EAI International Conference on Security and Privacy in Communication Networks, SecureComm'15. Dallas, TX, USA: Springer, June 2015."
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vehicular adhoc networks allow vehicles to share their information for safety and traffic efficiency. However, sharing information may threaten the driver privacy because it includes spatiotemporal information and is broadcast publicly and periodically. In this paper, we propose a context-adaptive pseudonym changing scheme which lets a vehicle decide autonomously when to change its pseudonym and how long it should remain silent to ensure unlinkability. This scheme adapts dynamically based on the density of the surrounding traffic and the user privacy preferences. We employ a multi-target tracking algorithm to measure privacy in terms of traceability in realistic vehicle traces. We use Monte Carlo analysis to estimate the quality of service (QoS) of a forward collision warning application when vehicles apply this scheme. According to the experimental results, the proposed scheme provides a better compromise between traceability and QoS than a random silent period scheme.
[ { "version": "v1", "created": "Tue, 26 Jul 2016 12:03:31 GMT" } ]
2016-07-27T00:00:00
[ [ "Emara", "Karim", "" ], [ "Woerndl", "Wolfgang", "" ], [ "Schlichter", "Johann", "" ] ]
new_dataset
0.96901
1607.07719
Mohammad Hadi
Mohammad Hadi, Mohammad Reza Pakravan
Spectrum-Convertible BVWXC Placement in OFDM-based Elastic Optical Networks
15 pages, 7 figures, 1 table
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum conversion can improve the performance of OFDM-based Elastic Optical Networks (EONs) by relaxing the continuity constraint and consequently reducing connection request blocking probability during Routing and Spectrum Assignment (RSA) process. We propose three different architectures for including spectrum conversion capability in Bandwidth-Variable Wavelength Cross-Connects (BVWXCs). To compare the capability of the introduced architectures, we develop an analytical method for computing average connection request blocking probability in a spectrum-convertible OFDM-based EON in which all, part or none of the BVWXCs can convert the spectrum. An algorithm for distributing a limited number of Spectrum-Convertible Bandwidth-Variable Wavelength Cross-Connects (SCBVWXCs) in an OFDM-based EON is also proposed. Finally, we use simulation results to evaluate the accuracy of the proposed method for calculating connection request blocking probability and the capability of the introduced algorithm for SCBVWXC placement.
[ { "version": "v1", "created": "Tue, 26 Jul 2016 14:29:00 GMT" } ]
2016-07-27T00:00:00
[ [ "Hadi", "Mohammad", "" ], [ "Pakravan", "Mohammad Reza", "" ] ]
new_dataset
0.976035
1607.07799
Hiroyuki Endo
Hiroyuki Endo, Mikio Fujiwara, Mitsuo Kitamura, Toshiyuki Ito, Morio Toyoshima, Yoshihisa Takayama, Hideki Takenaka, Ryosuke Shimizu, Nicola Laurenti, Giuseppe Vallone, Paolo Villoresi, Takao Aoki and Masahide Sasaki
Free-space optical channel estimation for physical layer security
16 pages, 8 figures
Optics Express Vol. 24, Issue 8, pp. 8940-8955 (2016)
10.1364/OE.24.008940
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present experimental data on message transmission in a free-space optical (FSO) link at an eye-safe wavelength, using a testbed consisting of one sender and two receiver terminals, where the latter two are a legitimate receiver and an eavesdropper. The testbed allows us to emulate a typical scenario of physical-layer (PHY) security such as satellite-to-ground laser communications. We estimate information-theoretic metrics including secrecy rate, secrecy outage probability, and expected code lengths for given secrecy criteria based on observed channel statistics. We then discuss operation principles of secure message transmission under realistic fading conditions, and provide a guideline on a multi-layer security architecture by combining PHY security and upper-layer (algorithmic) security.
[ { "version": "v1", "created": "Sun, 10 Jul 2016 11:47:57 GMT" } ]
2016-07-27T00:00:00
[ [ "Endo", "Hiroyuki", "" ], [ "Fujiwara", "Mikio", "" ], [ "Kitamura", "Mitsuo", "" ], [ "Ito", "Toshiyuki", "" ], [ "Toyoshima", "Morio", "" ], [ "Takayama", "Yoshihisa", "" ], [ "Takenaka", "Hideki", "" ], [ "Shimizu", "Ryosuke", "" ], [ "Laurenti", "Nicola", "" ], [ "Vallone", "Giuseppe", "" ], [ "Villoresi", "Paolo", "" ], [ "Aoki", "Takao", "" ], [ "Sasaki", "Masahide", "" ] ]
new_dataset
0.988707
1506.08909
Ryan Lowe T.
Ryan Lowe, Nissan Pow, Iulian Serban, Joelle Pineau
The Ubuntu Dialogue Corpus: A Large Dataset for Research in Unstructured Multi-Turn Dialogue Systems
SIGDIAL 2015. 10 pages, 5 figures. Update includes link to new version of the dataset, with some added features and bug fixes. See: https://github.com/rkadlec/ubuntu-ranking-dataset-creator
null
null
Proc. SIGDIAL 16 (2015) pp. 285-294
cs.CL cs.AI cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces the Ubuntu Dialogue Corpus, a dataset containing almost 1 million multi-turn dialogues, with a total of over 7 million utterances and 100 million words. This provides a unique resource for research into building dialogue managers based on neural language models that can make use of large amounts of unlabeled data. The dataset has both the multi-turn property of conversations in the Dialog State Tracking Challenge datasets, and the unstructured nature of interactions from microblog services such as Twitter. We also describe two neural learning architectures suitable for analyzing this dataset, and provide benchmark performance on the task of selecting the best next response.
[ { "version": "v1", "created": "Tue, 30 Jun 2015 00:37:09 GMT" }, { "version": "v2", "created": "Tue, 21 Jul 2015 16:11:29 GMT" }, { "version": "v3", "created": "Thu, 4 Feb 2016 01:21:35 GMT" } ]
2016-07-26T00:00:00
[ [ "Lowe", "Ryan", "" ], [ "Pow", "Nissan", "" ], [ "Serban", "Iulian", "" ], [ "Pineau", "Joelle", "" ] ]
new_dataset
0.999349
1607.06852
Adam Summerville
Adam James Summerville, James Ryan, Michael Mateas, Noah Wardrip-Fruin
CFGs-2-NLU: Sequence-to-Sequence Learning for Mapping Utterances to Semantics and Pragmatics
null
null
null
UCSC-SOE-16-11
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a novel approach to natural language understanding that utilizes context-free grammars (CFGs) in conjunction with sequence-to-sequence (seq2seq) deep learning. Specifically, we take a CFG authored to generate dialogue for our target application for NLU, a videogame, and train a long short-term memory (LSTM) recurrent neural network (RNN) to map the surface utterances that it produces to traces of the grammatical expansions that yielded them. Critically, this CFG was authored using a tool we have developed that supports arbitrary annotation of the nonterminal symbols in the grammar. Because we already annotated the symbols in this grammar for the semantic and pragmatic considerations that our game's dialogue manager operates over, we can use the grammatical trace associated with any surface utterance to infer such information. During gameplay, we translate player utterances into grammatical traces (using our RNN), collect the mark-up attributed to the symbols included in that trace, and pass this information to the dialogue manager, which updates the conversation state accordingly. From an offline evaluation task, we demonstrate that our trained RNN translates surface utterances to grammatical traces with great accuracy. To our knowledge, this is the first usage of seq2seq learning for conversational agents (our game's characters) who explicitly reason over semantic and pragmatic considerations.
[ { "version": "v1", "created": "Fri, 22 Jul 2016 22:05:20 GMT" } ]
2016-07-26T00:00:00
[ [ "Summerville", "Adam James", "" ], [ "Ryan", "James", "" ], [ "Mateas", "Michael", "" ], [ "Wardrip-Fruin", "Noah", "" ] ]
new_dataset
0.995722
1607.06914
Junya Honda
Junya Honda, Hirosuke Yamamoto
Variable-to-Fixed Length Homophonic Coding with a Modified Shannon-Fano-Elias Code
5 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Homophonic coding is a framework to reversibly convert a message into a sequence with some target distribution. This is a promising tool to generate a codeword with a biased code-symbol distribution, which is required for capacity-achieving communication by asymmetric channels. It is known that asymptotically optimal homophonic coding can be realized by a Fixed-to-Variable (FV) length code using an interval algorithm similar to a random number generator. However, FV codes are not preferable as a component of channel codes since a decoding error propagates to all subsequent codewords. As a solution for this problem an asymptotically optimal Variable-to-Fixed (VF) length homophonic code, dual Shannon-Fano-Elias-Gray (dual SFEG) code, is proposed in this paper. This code can be interpreted as a dual of a modified Shannon-Fano-Elias (SFE) code based on Gray code. It is also shown as a by-product that the modified SFE code, named SFEG code, achieves a better coding rate than the original SFE code in lossless source coding.
[ { "version": "v1", "created": "Sat, 23 Jul 2016 10:46:05 GMT" } ]
2016-07-26T00:00:00
[ [ "Honda", "Junya", "" ], [ "Yamamoto", "Hirosuke", "" ] ]
new_dataset
0.998495
1607.07015
Haijun Zhang
Haijun Zhang, Yanjie Dong, Julian Cheng, Md. Jahangir Hossain, Victor C. M. Leung
Fronthauling for 5G LTE-U Ultra Dense Cloud Small Cell Networks
17 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ultra dense cloud small cell network (UDCSNet), which combines cloud computing and massive deployment of small cells, is a promising technology for the fifth-generation (5G) LTE-U mobile communications because it can accommodate the anticipated explosive growth of mobile users' data traffic. As a result, fronthauling becomes a challenging problem in 5G LTE-U UDCSNet. In this article, we present an overview of the challenges and requirements of the fronthaul technology in 5G \mbox{LTE-U} UDCSNets. We survey the advantages and challenges for various candidate fronthaul technologies such as optical fiber, millimeter-wave based unlicensed spectrum, Wi-Fi based unlicensed spectrum, sub 6GHz based licensed spectrum, and free-space optical based unlicensed spectrum.
[ { "version": "v1", "created": "Sun, 24 Jul 2016 09:07:00 GMT" } ]
2016-07-26T00:00:00
[ [ "Zhang", "Haijun", "" ], [ "Dong", "Yanjie", "" ], [ "Cheng", "Julian", "" ], [ "Hossain", "Md. Jahangir", "" ], [ "Leung", "Victor C. M.", "" ] ]
new_dataset
0.995751
1607.07158
Mohamed Fadel
Mohamed Fadel and Aria Nosratinia
Coherence Disparity in Broadcast and Multiple Access Channels
45 pages, 13 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Individual links in a wireless network may experience unequal fading coherence times due to differences in mobility or scattering environment, a practical scenario where the fundamental limits of communication have been mostly unknown. This paper studies broadcast and multiple access channels where multiple receivers experience unequal fading block lengths, and channel state information (CSI) is not available at the transmitter(s), or for free at any receiver. In other words, the cost of acquiring CSI at the receiver is fully accounted for in the degrees of freedom. In the broadcast channel, the method of product superposition is employed to find the achievable degrees of freedom. We start with unequal coherence intervals with integer ratios. As long as the coherence time is at least twice the number of transmit and receive antennas, these degrees of freedom meet the upper bound in four cases: when the transmitter has fewer antennas than the receivers, when all receivers have the same number of antennas, when the coherence time of one receiver is much shorter than all others, or when all receivers have identical block fading intervals. The degrees of freedom region of the broadcast under identical coherence times was also previously unknown and is settled by the results of this paper. The disparity of coherence times leads to gains that are distinct from those arising from other techniques such as spatial multiplexing or multi-user diversity; this class of gains is denoted coherence diversity. The inner bounds are further extended to the case of multiple receivers experiencing fading block lengths of arbitrary ratio or alignment. Also, in the multiple access channel with unequal coherence times, achievable and outer bounds on the degrees of freedom are obtained.
[ { "version": "v1", "created": "Mon, 25 Jul 2016 05:51:48 GMT" } ]
2016-07-26T00:00:00
[ [ "Fadel", "Mohamed", "" ], [ "Nosratinia", "Aria", "" ] ]
new_dataset
0.983108
1607.07187
F. J. Lobillo
Jos\'e G\'omez-Torrecillas and F. J. Lobillo and Gabriel Navarro
A Sugiyama-like decoding algorithm for convolutional codes
null
null
null
null
cs.IT math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a decoding algorithm for a class of convolutional codes called skew BCH convolutional codes. These are convolutional codes of designed Hamming distance endowed with a cyclic structure yielding a left ideal of a non-commutative ring (a quotient of a skew polynomial ring). In this setting, right and left division algorithms exist, so our algorithm follows the guidelines of the Sugiyama's procedure for finding the error locator and error evaluator polynomials for BCH block codes.
[ { "version": "v1", "created": "Mon, 25 Jul 2016 09:30:05 GMT" } ]
2016-07-26T00:00:00
[ [ "Gómez-Torrecillas", "José", "" ], [ "Lobillo", "F. J.", "" ], [ "Navarro", "Gabriel", "" ] ]
new_dataset
0.990833
1607.07234
Stefano Buzzi
Stefano Buzzi and Carmen D'Andrea
Doubly Massive mmWave MIMO Systems: Using Very Large Antenna Arrays at Both Transmitter and Receiver
Accepted for presentation at 2016 IEEE GLOBECOM, Washington (DC), USA, December 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the key features of next generation wireless communication systems will be the use of frequencies in the range 10-100GHz (aka mmWave band) in densely populated indoor and outdoor scenarios. Due to the reduced wavelength, antenna arrays with a large number of antennas can be packed in very small volumes, making thus it possible to consider, at least in principle, communication links wherein not only the base-station, but also the user device, are equipped with very large antenna arrays. We denote this configuration as a "doubly-massive" MIMO wireless link. This paper introduces the concept of doubly massive MIMO systems at mmWave, showing that at mmWave the fundamentals of the massive MIMO regime are completely different from what happens at conventional sub-6 GHz cellular frequencies. It is shown for instance that the multiplexing capabilities of the channel and its rank are no longer ruled by the number of transmit and receive antennas, but rather by the number of scattering clusters in the surrounding environment. The implications of the doubly massive MIMO regime on the transceiver processing, on the system energy efficiency and on the system throughput are also discussed.
[ { "version": "v1", "created": "Mon, 25 Jul 2016 12:22:22 GMT" } ]
2016-07-26T00:00:00
[ [ "Buzzi", "Stefano", "" ], [ "D'Andrea", "Carmen", "" ] ]
new_dataset
0.999604
1511.09329
Umberto Mart\'inez-Pe\~nas
Umberto Mart\'inez-Pe\~nas
On the roots and minimum rank distance of skew cyclic codes
null
null
10.1007/s10623-016-0262-z
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Skew cyclic codes play the same role as cyclic codes in the theory of error-correcting codes for the rank metric. In this paper, we give descriptions of these codes by root spaces, cyclotomic spaces and idempotent generators. We prove that the lattice of skew cyclic codes is anti-isomorphic to the lattice of root spaces, study these two lattices and extend the rank-BCH bound on their minimum rank distance to rank-metric versions of the van Lint-Wilson's shift and Hartmann-Tzeng bounds. Finally, we study skew cyclic codes which are linear over the base field, proving that these codes include all Hamming-metric cyclic codes, giving then a new relation between these codes and rank-metric skew cyclic codes.
[ { "version": "v1", "created": "Mon, 30 Nov 2015 14:41:17 GMT" }, { "version": "v2", "created": "Fri, 22 Jul 2016 16:16:42 GMT" } ]
2016-07-25T00:00:00
[ [ "Martínez-Peñas", "Umberto", "" ] ]
new_dataset
0.998068
1607.06620
Stefano Carpin
Stefano Carpin, Shuo Liu, Joe Falco and Karl Van Wyk
Multi-Fingered Robotic Grasping: A Primer
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This technical report presents an introduction to different aspects of multi-fingered robot grasping. After having introduced relevant mathematical background for modeling, form and force closure are discussed. Next, we present an overview of various grasp planning algorithms with the objective of illustrating different approaches to solve this problem. Finally, we discuss grasp performance benchmarking.
[ { "version": "v1", "created": "Fri, 22 Jul 2016 09:53:26 GMT" } ]
2016-07-25T00:00:00
[ [ "Carpin", "Stefano", "" ], [ "Liu", "Shuo", "" ], [ "Falco", "Joe", "" ], [ "Van Wyk", "Karl", "" ] ]
new_dataset
0.999637
1607.06676
Grasha Jacob Mrs
Grasha Jacob, R. Shenbagavalli, S. Karthika
Detection of surface defects on ceramic tiles based on morphological techniques
9 pages, 11 figures
null
null
null
cs.CV
http://creativecommons.org/publicdomain/zero/1.0/
Ceramic tiles have become very popular and are used in the flooring of offices and shopping malls. As testing the quality of tiles manually in a highly polluted environment in the manufacturing industry is a labor-intensive and time consuming process, analysis is carried out on the tile images. This paper discusses an automated system to detect the defects on the surface of ceramic tiles based on dilation, erosion, SMEE and boundary detection techniques.
[ { "version": "v1", "created": "Thu, 21 Jul 2016 08:25:41 GMT" } ]
2016-07-25T00:00:00
[ [ "Jacob", "Grasha", "" ], [ "Shenbagavalli", "R.", "" ], [ "Karthika", "S.", "" ] ]
new_dataset
0.998164
1607.06721
Daniele Vilone
Andrea Guazzini, Ay\c{c}a Sara\c{c}, Camillo Donati, Annalisa Nardi, Daniele Vilone, Patrizia Meringolo
Participation and Privacy perception in virtual environments: the role of sense of community, culture and sex between Italian and Turkish
Submitted to Complexity
null
null
null
cs.CY cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advancements in information and communication technologies have enhanced our possibilities to communicate worldwide, eliminating borders and making it possible to interact with people coming from other cultures like never happened before. Such powerful tools have brought us to reconsider our concept of privacy and social involvement in order to make them fit into this wider environment. It is possible to claim that the ICT revolution is changing our world and is having a core role as a mediating factor for social movements (e.g., Arab spring) and political decisions (e.g., Brexit), shaping the world in a faster and shared brand new way. It is then interesting to explore how the perception of this brand new environment (in terms of social engagement, privacy perception and sense of belonging to a community) differs even in similar cultures separated by recent historical reasons, as for example in Italian and Turkish cultures.
[ { "version": "v1", "created": "Fri, 22 Jul 2016 15:59:35 GMT" } ]
2016-07-25T00:00:00
[ [ "Guazzini", "Andrea", "" ], [ "Saraç", "Ayça", "" ], [ "Donati", "Camillo", "" ], [ "Nardi", "Annalisa", "" ], [ "Vilone", "Daniele", "" ], [ "Meringolo", "Patrizia", "" ] ]
new_dataset
0.987265
1607.06751
Mordechai Shalom
Didem G\"oz\"upek and Mordechai Shalom
Edge Coloring with Minimum Reload/Changeover Costs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an edge-colored graph, a traversal cost occurs at a vertex along a path when consecutive edges with different colors are traversed. The value of the traversal cost depends only on the colors of the traversed edges. This concept leads to two global cost measures, namely the \emph{reload cost} and the \emph{changeover cost}, that have been studied in the literature and have various applications in telecommunications, transportation networks, and energy distribution networks. Previous work focused on problems with an edge-colored graph being part of the input. In this paper, we formulate and focus on two pairs of problems that aim to find an edge coloring of a graph so as to minimize the reload and changeover costs. The first pair of problems aims to find a proper edge coloring so that the reload/changeover cost of a set of paths is minimized. The second pair of problems aim to find a proper edge coloring and a spanning tree so that the reload/changeover cost is minimized. We present several hardness results as well as polynomial-time solvable special cases.
[ { "version": "v1", "created": "Fri, 22 Jul 2016 17:17:59 GMT" } ]
2016-07-25T00:00:00
[ [ "Gözüpek", "Didem", "" ], [ "Shalom", "Mordechai", "" ] ]
new_dataset
0.988973
1607.06765
Stefano Leucci
Davide Bil\`o, Luciano Gual\`a, Stefano Leucci, Guido Proietti
Locality-based Network Creation Games
26 pages, 10 figures, ACM Transactions on parallel Computing. A preliminary version appeared in the proceedings of SPAA 2014
ACM Transactions on Parallel Computing, Vol. 3(1), ACM, 6:1-6:26, 2016. ISSN: 2329-4949
10.1145/2938426
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network creation games have been extensively studied, both from economists and computer scientists, due to their versatility in modeling individual-based community formation processes, which in turn are the theoretical counterpart of several economics, social, and computational applications on the Internet. In their several variants, these games model the tension of a player between her two antagonistic goals: to be as close as possible to the other players, and to activate a cheapest possible set of links. However, the generally adopted assumption is that players have a \emph{common and complete} information about the ongoing network, which is quite unrealistic in practice. In this paper, we consider a more compelling scenario in which players have only limited information about the network they are embedded in. More precisely, we explore the game-theoretic and computational implications of assuming that players have a complete knowledge of the network structure only up to a given radius $k$, which is one of the most qualified \emph{local-knowledge models} used in distributed computing. To this respect, we define a suitable equilibrium concept, and we provide a comprehensive set of upper and lower bounds to the price of anarchy for the entire range of values of $k$, and for the two classic variants of the game, namely those in which a player's cost --- besides the activation cost of the owned links --- depends on the maximum/sum of all the distances to the other nodes in the network, respectively. These bounds are finally assessed through an extensive set of experiments.
[ { "version": "v1", "created": "Fri, 22 Jul 2016 17:57:46 GMT" } ]
2016-07-25T00:00:00
[ [ "Bilò", "Davide", "" ], [ "Gualà", "Luciano", "" ], [ "Leucci", "Stefano", "" ], [ "Proietti", "Guido", "" ] ]
new_dataset
0.984903
1505.03718
Maria Serna
Carme \`Alvarez and Maria Blesa and Amalia Duch and Arnau Messegu\'e and Maria Serna
Stars and Celebrities: A Network Creation Game
26 pages, 2 figures
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Celebrity games, a new model of network creation games is introduced. The specific features of this model are that players have different celebrity weights and that a critical distance is taken into consideration. The aim of any player is to be close (at distance less than critical) to the others, mainly to those with high celebrity weights. The cost of each player depends on the cost of establishing direct links to other players and on the sum of the weights of those players at a distance greater than the critical distance. We show that celebrity games always have pure Nash equilibria and we characterize the family of subgames having connected Nash equilibria, the so called star celebrity games. We provide exact bounds for the PoA of celebrity games. The PoA can be tightened when restricted to particular classes of Nash equilibria graphs, in particular for trees.
[ { "version": "v1", "created": "Thu, 14 May 2015 13:34:31 GMT" }, { "version": "v2", "created": "Mon, 14 Sep 2015 16:02:15 GMT" }, { "version": "v3", "created": "Thu, 21 Jul 2016 10:34:44 GMT" } ]
2016-07-22T00:00:00
[ [ "Àlvarez", "Carme", "" ], [ "Blesa", "Maria", "" ], [ "Duch", "Amalia", "" ], [ "Messegué", "Arnau", "" ], [ "Serna", "Maria", "" ] ]
new_dataset
0.984478
1605.05588
Sayed Pouria Talebi
Sayed Pouria Talebi
A Distributed Quaternion Kalman Filter With Applications to Fly-by-Wire Systems
It had to be noted that the assumption was made that all sensors have access to all observations and state estimate vectors. In addition, the summations in the DAQKF Algorithm are on all sensors, not just the neighbouring sensors
null
null
null
cs.SY stat.AP stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The introduction of automated flight control and management systems have made possible aircraft designs that sacrifice arodynamic stability in order to incorporate stealth technology intro their shape, operate more efficiently, and are highly maneuverable. Therefore, modern flight management systems are reliant on multiple redundant sensors to monitor and control the rotations of the aircraft. To this end, a novel distributed quaternion Kalman filtering algorithm is developed for tracking the rotation and orientation of an aircraft in the three-dimensional space. The algorithm is developed to distribute computation among the sensors in a manner that forces them to consent to a unique solution while being robust to sensor and link failure, a desirable characteristic for flight management systems. In addition, the underlying quaternion-valued state space model allows to avoid problems associated with gimbal lock. The performance of the developed algorithm is verified through simulations.
[ { "version": "v1", "created": "Sun, 15 May 2016 19:48:53 GMT" }, { "version": "v2", "created": "Thu, 21 Jul 2016 08:06:46 GMT" } ]
2016-07-22T00:00:00
[ [ "Talebi", "Sayed Pouria", "" ] ]
new_dataset
0.998857
1607.06146
Leonardo Banchi
Leonardo Banchi, Nicola Pancotti, Sougato Bose
Supervised quantum gate "teaching" for quantum hardware design
6 pages, 1 figure, based on arXiv:1509.04298
Proceedings of the European Symposium on Artificial Neural Networks 2016
null
null
cs.LG quant-ph stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how to train a quantum network of pairwise interacting qubits such that its evolution implements a target quantum algorithm into a given network subset. Our strategy is inspired by supervised learning and is designed to help the physical construction of a quantum computer which operates with minimal external classical control.
[ { "version": "v1", "created": "Wed, 20 Jul 2016 22:46:32 GMT" } ]
2016-07-22T00:00:00
[ [ "Banchi", "Leonardo", "" ], [ "Pancotti", "Nicola", "" ], [ "Bose", "Sougato", "" ] ]
new_dataset
0.999317
1607.06178
Alessandro Pieropan
Alessandro Pieropan, M{\aa}rten Bj\"orkman, Niklas Bergstr\"om and Danica Kragic
Feature Descriptors for Tracking by Detection: a Benchmark
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we provide an extensive evaluation of the performance of local descriptors for tracking applications. Many different descriptors have been proposed in the literature for a wide range of application in computer vision such as object recognition and 3D reconstruction. More recently, due to fast key-point detectors, local image features can be used in online tracking frameworks. However, while much effort has been spent on evaluating their performance in terms of distinctiveness and robustness to image transformations, very little has been done in the contest of tracking. Our evaluation is performed in terms of distinctiveness, tracking precision and tracking speed. Our results show that binary descriptors like ORB or BRISK have comparable results to SIFT or AKAZE due to a higher number of key-points.
[ { "version": "v1", "created": "Thu, 21 Jul 2016 03:06:43 GMT" } ]
2016-07-22T00:00:00
[ [ "Pieropan", "Alessandro", "" ], [ "Björkman", "Mårten", "" ], [ "Bergström", "Niklas", "" ], [ "Kragic", "Danica", "" ] ]
new_dataset
0.994576
1607.06232
James Lockwood
James Lockwood, Susan Bergin
A neurofeedback system to promote learner engagement
null
null
null
null
cs.HC
http://creativecommons.org/licenses/by-nc-sa/4.0/
This report describes a series of experiments that track novice programmer's engagement during two attention based tasks. The tasks required participants to watch a tutorial video on introductory programming and to attend to a simple maze game whilst wearing an electroencephalogram (EEG)device called the Emotiv EPOC. The EPOC's proprietary software includes a system which tracks emotional state (specifically: engagement, excitement, meditation, frustration, valence and long-term excitement). Using this data, a software application written in the Processing language was developed to track user's engagement levels and implement a neurofeedback based intervention when engagement fell below an acceptable level. The aim of the intervention was to prompt learners who disengaged with the task to re-engage. The intervention used during the video tutorial was to pause the video if a participant disengaged significantly. However other interventions such as slowing the video down, playing a noise or darkening/brightening the screen could also be used. For the maze game, the caterpillar moving through the maze slowed in line with disengagement and moved more quickly once the learner re-engaged. The approach worked very well and successfully re-engaged participants, although a number of improvements could be made. A number of interesting findings on the comparative engagement levels of different groups e.g. by gender and by age etc. were identified and provide useful pointers for future research studies.
[ { "version": "v1", "created": "Thu, 21 Jul 2016 08:35:27 GMT" } ]
2016-07-22T00:00:00
[ [ "Lockwood", "James", "" ], [ "Bergin", "Susan", "" ] ]
new_dataset
0.998852
1607.06255
Nima Namvar
Nima Namvar, Walid Saad, Niloofar Bahadori, Brian Kelley
Jamming in the Internet of Things: A Game-Theoretic Perspective
2016 IEEE Global Communications Conference
null
null
null
cs.IT cs.CR cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Due to its scale and largely interconnected nature, the Internet of Things (IoT) will be vulnerable to a number of security threats that range from physical layer attacks to network layer attacks. In this paper, a novel anti-jamming strategy for OFDM-based IoT systems is proposed which enables an IoT controller to protect the IoT devices against a malicious radio jammer. The interaction between the controller node and the jammer is modeled as a Colonel Blotto game with continuous and asymmetric resources in which the IoT controller, acting as defender, seeks to thwart the jamming attack by distributing its power among the subcarries in a smart way to decrease the aggregate bit error rate (BER) caused by the jammer. The jammer, on the other hand, aims at disrupting the system performance by allocating jamming power to different frequency bands. To solve the game, an evolutionary algorithm is proposed which can find a mixed-strategy Nash equilibrium of the Blotto game. Simulation results show that the proposed algorithm enables the IoT controller to maintain the BER above an acceptable threshold, thereby preserving the IoT network performance in the presence of malicious jamming.
[ { "version": "v1", "created": "Thu, 21 Jul 2016 10:41:28 GMT" } ]
2016-07-22T00:00:00
[ [ "Namvar", "Nima", "" ], [ "Saad", "Walid", "" ], [ "Bahadori", "Niloofar", "" ], [ "Kelley", "Brian", "" ] ]
new_dataset
0.971739
1607.06330
Antonio San Mart\'in
Antonio San Mart\'in
La representaci\'on de la variaci\'on contextual mediante definiciones terminol\'ogicas flexibles
PhD Thesis. in Spanish. University of Granada. 2016
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this doctoral thesis, we apply premises of cognitive linguistics to terminological definitions and present a proposal called the flexible terminological definition. This consists of a set of definitions of the same concept made up of a general definition (in this case, one encompassing the entire environmental domain) along with additional definitions describing the concept from the perspective of the subdomains in which it is relevant. Since context is a determining factor in the construction of the meaning of lexical units (including terms), we assume that terminological definitions can, and should, reflect the effects of context, even though definitions have traditionally been treated as the expression of meaning void of any contextual effect. The main objective of this thesis is to analyze the effects of contextual variation on specialized environmental concepts with a view to their representation in terminological definitions. Specifically, we focused on contextual variation based on thematic restrictions. To accomplish the objectives of this doctoral thesis, we conducted an empirical study consisting of the analysis of a set of contextually variable concepts and the creation of a flexible definition for two of them. As a result of the first part of our empirical study, we divided our notion of domain-dependent contextual variation into three different phenomena: modulation, perspectivization and subconceptualization. These phenomena are additive in that all concepts experience modulation, some concepts also undergo perspectivization, and finally, a small number of concepts are additionally subjected to subconceptualization. In the second part, we applied these notions to terminological definitions and we presented we presented guidelines on how to build flexible definitions, from the extraction of knowledge to the actual writing of the definition.
[ { "version": "v1", "created": "Wed, 1 Jun 2016 09:39:12 GMT" } ]
2016-07-22T00:00:00
[ [ "Martín", "Antonio San", "" ] ]
new_dataset
0.999656
1607.06429
Moustafa Elhamshary
Moustafa Elhamshary, Anas Basalamah and Moustafa Youssef
A Fine-grained Indoor Location-based Social Network
15 pages, 18 figures
null
null
null
cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing Location-based social networks (LBSNs), e.g., Foursquare, depend mainly on GPS or cellular-based localization to infer users' locations. However, GPS is unavailable indoors and cellular-based localization provides coarse-grained accuracy. This limits the accuracy of current LBSNs in indoor environments, where people spend 89% of their time. This in turn affects the user experience, in terms of the accuracy of the ranked list of venues, especially for the small screens of mobile devices; misses business opportunities; and leads to reduced venues coverage. In this paper, we present CheckInside: a system that can provide a fine-grained indoor location-based social network. CheckInside leverages the crowd-sensed data collected from users' mobile devices during the check-in operation and knowledge extracted from current LBSNs to associate a place with a logical name and a semantic fingerprint. This semantic fingerprint is used to obtain a more accurate list of nearby places as well as to automatically detect new places with similar signature. A novel algorithm for detecting fake check-ins and inferring a semantically-enriched floorplan is proposed as well as an algorithm for enhancing the system performance based on the user implicit feedback. Furthermore, CheckInside encompasses a coverage extender module to automatically predict names of new venues increasing the coverage of current LBSNs. Experimental evaluation of CheckInside in four malls over the course of six weeks with 20 participants shows that it can infer the actual user place within the top five venues 99% of the time. This is compared to 17% only in the case of current LBSNs. In addition, it increases the coverage of existing LBSNs by more than 37%.
[ { "version": "v1", "created": "Wed, 20 Jul 2016 13:16:53 GMT" } ]
2016-07-22T00:00:00
[ [ "Elhamshary", "Moustafa", "" ], [ "Basalamah", "Anas", "" ], [ "Youssef", "Moustafa", "" ] ]
new_dataset
0.998641
1507.06240
Przemys{\l}aw Uzna\'nski
Pawe{\l} Gawrychowski, Adrian Kosowski, Przemys{\l}aw Uzna\'nski
Sublinear-Space Distance Labeling using Hubs
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distance labeling scheme is an assignment of bit-labels to the vertices of an undirected, unweighted graph such that the distance between any pair of vertices can be decoded solely from their labels. We propose a series of new labeling schemes within the framework of so-called hub labeling (HL, also known as landmark labeling or 2-hop-cover labeling), in which each node $u$ stores its distance to all nodes from an appropriately chosen set of hubs $S(u) \subseteq V$. For a queried pair of nodes $(u,v)$, the length of a shortest $u-v$-path passing through a hub node from $S(u)\cap S(v)$ is then used as an upper bound on the distance between $u$ and $v$. We present a hub labeling which allows us to decode exact distances in sparse graphs using labels of size sublinear in the number of nodes. For graphs with at most $n$ nodes and average degree $\Delta$, the tradeoff between label bit size $L$ and query decoding time $T$ for our approach is given by $L = O(n \log \log_\Delta T / \log_\Delta T)$, for any $T \leq n$. Our simple approach is thus the first sublinear-space distance labeling for sparse graphs that simultaneously admits small decoding time (for constant $\Delta$, we can achieve any $T=\omega(1)$ while maintaining $L=o(n)$), and it also provides an improvement in terms of label size with respect to previous slower approaches. By using similar techniques, we then present a $2$-additive labeling scheme for general graphs, i.e., one in which the decoder provides a 2-additive-approximation of the distance between any pair of nodes. We achieve almost the same label size-time tradeoff $L = O(n \log^2 \log T / \log T)$, for any $T \leq n$. To our knowledge, this is the first additive scheme with constant absolute error to use labels of sublinear size. The corresponding decoding time is then small (any $T=\omega(1)$ is sufficient).
[ { "version": "v1", "created": "Wed, 22 Jul 2015 16:24:02 GMT" }, { "version": "v2", "created": "Tue, 16 Feb 2016 23:14:43 GMT" }, { "version": "v3", "created": "Wed, 20 Jul 2016 11:48:16 GMT" } ]
2016-07-21T00:00:00
[ [ "Gawrychowski", "Paweł", "" ], [ "Kosowski", "Adrian", "" ], [ "Uznański", "Przemysław", "" ] ]
new_dataset
0.986501
1605.02355
Laszlo Kish
Laszlo Bela Kish, Kamran Entesari, Claes-Goran Granqvist, Chiman Kwan
Unconditionally secure credit/debit card chip scheme and physical unclonable function
This version is accepted for publication in Fluctuation and Noise Letters
null
null
null
cs.ET cs.CR
http://creativecommons.org/licenses/by/4.0/
The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions.
[ { "version": "v1", "created": "Sun, 8 May 2016 19:44:50 GMT" }, { "version": "v2", "created": "Wed, 20 Jul 2016 16:13:11 GMT" } ]
2016-07-21T00:00:00
[ [ "Kish", "Laszlo Bela", "" ], [ "Entesari", "Kamran", "" ], [ "Granqvist", "Claes-Goran", "" ], [ "Kwan", "Chiman", "" ] ]
new_dataset
0.991663
1607.05806
Siwei Qiang
Siwei Qiang and Yongkun Wang and Yaohui Jin
A Local-Global LDA Model for Discovering Geographical Topics from Social Media
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Micro-blogging services can track users' geo-locations when users check-in their places or use geo-tagging which implicitly reveals locations. This "geo tracking" can help to find topics triggered by some events in certain regions. However, discovering such topics is very challenging because of the large amount of noisy messages (e.g. daily conversations). This paper proposes a method to model geographical topics, which can filter out irrelevant words by different weights in the local and global contexts. Our method is based on the Latent Dirichlet Allocation (LDA) model but each word is generated from either a local or a global topic distribution by its generation probabilities. We evaluated our model with data collected from Weibo, which is currently the most popular micro-blogging service for Chinese. The evaluation results demonstrate that our method outperforms other baseline methods in several metrics such as model perplexity, two kinds of entropies and KL-divergence of discovered topics.
[ { "version": "v1", "created": "Wed, 20 Jul 2016 02:48:15 GMT" } ]
2016-07-21T00:00:00
[ [ "Qiang", "Siwei", "" ], [ "Wang", "Yongkun", "" ], [ "Jin", "Yaohui", "" ] ]
new_dataset
0.975588
1607.05922
Erich Schikuta
Rene Felder, Erich Schikuta
A XML Based Datagrid Description Language
accepted at 1st Workshop on Hardware/Software Support for Parallel and Distributed Scientific and Engineering Computing (SPDSEC-02) in conjunction with The 11th International Conference on Parallel Architectures and Compilation Techniques (PACT-02)
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present xDGDL, an approach towards a concise but comprehensive Datagrid description language. Our framework is based on the portable XML language and allows to store syntactical and semantical information together with arbitrary files. This information can be used to administer, locate, search and process the stored data on the Grid. As an application of the xDGDL approach we present ViPFS, a novel distributed file system targeting the Grid.
[ { "version": "v1", "created": "Wed, 20 Jul 2016 11:33:46 GMT" } ]
2016-07-21T00:00:00
[ [ "Felder", "Rene", "" ], [ "Schikuta", "Erich", "" ] ]
new_dataset
0.965339
1607.05944
Matej Hoffmann
Matej Hoffmann and Nada Bednarova
The encoding of proprioceptive inputs in the brain: knowns and unknowns from a robotic perspective
in Proceedings of Kognice a um\v{e}l\'y \v{z}ivot XVI [Cognition and Artificial Life XVI] 2016, ISBN 978-80-01-05915-9
null
null
null
cs.NE cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Somatosensory inputs can be grossly divided into tactile (or cutaneous) and proprioceptive -- the former conveying information about skin stimulation, the latter about limb position and movement. The principal proprioceptors are constituted by muscle spindles, which deliver information about muscle length and speed. In primates, this information is relayed to the primary somatosensory cortex and eventually the posterior parietal cortex, where integrated information about body posture (postural schema) is presumably available. However, coming from robotics and seeking a biologically motivated model that could be used in a humanoid robot, we faced a number of difficulties. First, it is not clear what neurons in the ascending pathway and primary somatosensory cortex code. To an engineer, joint angles would seem the most useful variables. However, the lengths of individual muscles have nonlinear relationships with the angles at joints. Kim et al. (Neuron, 2015) found different types of proprioceptive neurons in the primary somatosensory cortex -- sensitive to movement of single or multiple joints or to static postures. Second, there are indications that the somatotopic arrangement ("the homunculus") of these brain areas is to a significant extent learned. However, the mechanisms behind this developmental process are unclear. We will report first results from modeling of this process using data obtained from body babbling in the iCub humanoid robot and feeding them into a Self-Organizing Map (SOM). Our results reveal that the SOM algorithm is only suited to develop receptive fields of the posture-selective type. Furthermore, the SOM algorithm has intrinsic difficulties when combined with population code on its input and in particular with nonlinear tuning curves (sigmoids or Gaussians).
[ { "version": "v1", "created": "Wed, 20 Jul 2016 13:23:04 GMT" } ]
2016-07-21T00:00:00
[ [ "Hoffmann", "Matej", "" ], [ "Bednarova", "Nada", "" ] ]
new_dataset
0.998137
1502.02753
Therese Biedl
Therese Biedl
Ideal Tree-drawings of Approximately Optimal Width (And Small Height)
16 pages. Re-organized, and removed overlap with 1506.02096. Added lower bound for the height of width-optimal drawings
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For rooted trees, an ideal drawing is one that is planar, straight-line, strictly-upward, and order-preserving. This paper considers ideal drawings of rooted trees with the objective of keeping the width of such drawings small. It is not known whether finding the minimum-possible width is NP-hard or polynomial. This paper gives a 2-approximation for this problem, and a $2\Delta$-approximation (for $\Delta$-ary trees) where additionally the height is $O(n)$. For trees with $\Delta\leq 3$, the former algorithm finds ideal drawings with minimum-possible width.
[ { "version": "v1", "created": "Tue, 10 Feb 2015 01:29:52 GMT" }, { "version": "v2", "created": "Thu, 12 Feb 2015 00:00:55 GMT" }, { "version": "v3", "created": "Fri, 20 Feb 2015 00:55:42 GMT" }, { "version": "v4", "created": "Mon, 18 Jul 2016 21:04:33 GMT" } ]
2016-07-20T00:00:00
[ [ "Biedl", "Therese", "" ] ]
new_dataset
0.967644
1607.05402
Luis Sentis
Chien Liang Fok, Fei Sun, Matt Mangum, Al Mok, Binghan He, and Luis Sentis
Web Based Teleoperation of a Humanoid Robot
17 pages, 6 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Cloud-based Advanced Robotics Laboratory (CARL) integrates a whole body controller and web-based teleoperation to enable any device with a web browser to access and control a humanoid robot. By integrating humanoid robots with the cloud, they are accessible from any Internet-connected device. Increased accessibility is important because few people have access to state-of-the-art humanoid robots limiting their rate of development. CARL's implementation is based on modern software libraries, frameworks, and middleware including Node.js, Socket.IO, ZMQ, ROS, Robot Web Tools, and ControlIt! Feasibility is demonstrated by having inexperienced human operators use a smartphone's web-browser to control Dreamer, a torque-controlled humanoid robot based on series elastic actuators, and make it perform a dual-arm manipulation task. The implementation serves as a proof-of-concept and foundation upon which many advanced humanoid robot technologies can be researched and developed.
[ { "version": "v1", "created": "Tue, 19 Jul 2016 04:59:46 GMT" } ]
2016-07-20T00:00:00
[ [ "Fok", "Chien Liang", "" ], [ "Sun", "Fei", "" ], [ "Mangum", "Matt", "" ], [ "Mok", "Al", "" ], [ "He", "Binghan", "" ], [ "Sentis", "Luis", "" ] ]
new_dataset
0.999262
1607.05523
Muhammad Usman Ghani
Muhammad Usman Ghani, Ertunc Erdil, Sumeyra Demir Kanik, Ali Ozgur Argunsah, Anna Felicity Hobbiss, Inbal Israely, Devrim Unay, Tolga Tasdizen, Mujdat Cetin
Dendritic Spine Shape Analysis: A Clustering Perspective
Accepted for BioImageComputing workshop at ECCV 2016
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Functional properties of neurons are strongly coupled with their morphology. Changes in neuronal activity alter morphological characteristics of dendritic spines. First step towards understanding the structure-function relationship is to group spines into main spine classes reported in the literature. Shape analysis of dendritic spines can help neuroscientists understand the underlying relationships. Due to unavailability of reliable automated tools, this analysis is currently performed manually which is a time-intensive and subjective task. Several studies on spine shape classification have been reported in the literature, however, there is an on-going debate on whether distinct spine shape classes exist or whether spines should be modeled through a continuum of shape variations. Another challenge is the subjectivity and bias that is introduced due to the supervised nature of classification approaches. In this paper, we aim to address these issues by presenting a clustering perspective. In this context, clustering may serve both confirmation of known patterns and discovery of new ones. We perform cluster analysis on two-photon microscopic images of spines using morphological, shape, and appearance based features and gain insights into the spine shape analysis problem. We use histogram of oriented gradients (HOG), disjunctive normal shape models (DNSM), morphological features, and intensity profile based features for cluster analysis. We use x-means to perform cluster analysis that selects the number of clusters automatically using the Bayesian information criterion (BIC). For all features, this analysis produces 4 clusters and we observe the formation of at least one cluster consisting of spines which are difficult to be assigned to a known class. This observation supports the argument of intermediate shape types.
[ { "version": "v1", "created": "Tue, 19 Jul 2016 11:18:52 GMT" } ]
2016-07-20T00:00:00
[ [ "Ghani", "Muhammad Usman", "" ], [ "Erdil", "Ertunc", "" ], [ "Kanik", "Sumeyra Demir", "" ], [ "Argunsah", "Ali Ozgur", "" ], [ "Hobbiss", "Anna Felicity", "" ], [ "Israely", "Inbal", "" ], [ "Unay", "Devrim", "" ], [ "Tasdizen", "Tolga", "" ], [ "Cetin", "Mujdat", "" ] ]
new_dataset
0.991635
1410.4885
Ilya Safro
William W. Hager and James T. Hungerford and Ilya Safro
A Multilevel Bilinear Programming Algorithm For the Vertex Separator Problem
null
null
null
null
cs.DS cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Vertex Separator Problem for a graph is to find the smallest collection of vertices whose removal breaks the graph into two disconnected subsets that satisfy specified size constraints. In the paper 10.1016/j.ejor.2014.05.042, the Vertex Separator Problem was formulated as a continuous (non-concave/non-convex) bilinear quadratic program. In this paper, we develop a more general continuous bilinear program which incorporates vertex weights, and which applies to the coarse graphs that are generated in a multilevel compression of the original Vertex Separator Problem. A Mountain Climbing Algorithm is used to find a stationary point of the continuous bilinear quadratic program, while second-order optimality conditions and perturbation techniques are used to escape from either a stationary point or a local maximizer. The algorithms for solving the continuous bilinear program are employed during the solution and refinement phases in a multilevel scheme. Computational results and comparisons demonstrate the advantage of the proposed algorithm.
[ { "version": "v1", "created": "Fri, 17 Oct 2014 23:07:50 GMT" }, { "version": "v2", "created": "Sun, 17 Jul 2016 20:21:07 GMT" } ]
2016-07-19T00:00:00
[ [ "Hager", "William W.", "" ], [ "Hungerford", "James T.", "" ], [ "Safro", "Ilya", "" ] ]
new_dataset
0.990815
1508.01244
Qiong Huang
Qiong Huang, Ashok Veeraraghavan and Ashutosh Sabharwal
TabletGaze: Unconstrained Appearance-based Gaze Estimation in Mobile Tablets
18 pages, 17 figures, submitted to journal, website hosting the dataset: http://sh.rice.edu/tablet_gaze.html
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study gaze estimation on tablets, our key design goal is uncalibrated gaze estimation using the front-facing camera during natural use of tablets, where the posture and method of holding the tablet is not constrained. We collected the first large unconstrained gaze dataset of tablet users, labeled Rice TabletGaze dataset. The dataset consists of 51 subjects, each with 4 different postures and 35 gaze locations. Subjects vary in race, gender and in their need for prescription glasses, all of which might impact gaze estimation accuracy. Driven by our observations on the collected data, we present a TabletGaze algorithm for automatic gaze estimation using multi-level HoG feature and Random Forests regressor. The TabletGaze algorithm achieves a mean error of 3.17 cm. We perform extensive evaluation on the impact of various factors such as dataset size, race, wearing glasses and user posture on the gaze estimation accuracy and make important observations about the impact of these factors.
[ { "version": "v1", "created": "Wed, 5 Aug 2015 22:38:53 GMT" }, { "version": "v2", "created": "Sat, 5 Sep 2015 16:44:14 GMT" }, { "version": "v3", "created": "Sat, 16 Jul 2016 09:06:23 GMT" } ]
2016-07-19T00:00:00
[ [ "Huang", "Qiong", "" ], [ "Veeraraghavan", "Ashok", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
new_dataset
0.999761
1509.00388
Philipp Kindermann
Franz J. Brandenburg, Walter Didimo, William S. Evans, Philipp Kindermann, Giuseppe Liotta, Fabrizio Montecchiani
Recognizing and Drawing IC-planar Graphs
null
Theor. Comput. Sci. 636: 1-16 (2016)
10.1016/j.tcs.2016.04.026
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
IC-planar graphs are those graphs that admit a drawing where no two crossed edges share an end-vertex and each edge is crossed at most once. They are a proper subfamily of the 1-planar graphs. Given an embedded IC-planar graph $G$ with $n$ vertices, we present an $O(n)$-time algorithm that computes a straight-line drawing of $G$ in quadratic area, and an $O(n^3)$-time algorithm that computes a straight-line drawing of $G$ with right-angle crossings in exponential area. Both these area requirements are worst-case optimal. We also show that it is NP-complete to test IC-planarity both in the general case and in the case in which a rotation system is fixed for the input graph. Furthermore, we describe a polynomial-time algorithm to test whether a set of matching edges can be added to a triangulated planar graph such that the resulting graph is IC-planar.
[ { "version": "v1", "created": "Tue, 1 Sep 2015 16:54:16 GMT" }, { "version": "v2", "created": "Mon, 18 Jul 2016 17:06:34 GMT" } ]
2016-07-19T00:00:00
[ [ "Brandenburg", "Franz J.", "" ], [ "Didimo", "Walter", "" ], [ "Evans", "William S.", "" ], [ "Kindermann", "Philipp", "" ], [ "Liotta", "Giuseppe", "" ], [ "Montecchiani", "Fabrizio", "" ] ]
new_dataset
0.999409
1511.04412
Mazen Melibari
Mazen Melibari, Pascal Poupart, Prashant Doshi and George Trimponias
Dynamic Sum Product Networks for Tractable Inference on Sequence Data (Extended Version)
Published in the Proceedings of the International Conference on Probabilistic Graphical Models (PGM), 2016
null
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sum-Product Networks (SPN) have recently emerged as a new class of tractable probabilistic graphical models. Unlike Bayesian networks and Markov networks where inference may be exponential in the size of the network, inference in SPNs is in time linear in the size of the network. Since SPNs represent distributions over a fixed set of variables only, we propose dynamic sum product networks (DSPNs) as a generalization of SPNs for sequence data of varying length. A DSPN consists of a template network that is repeated as many times as needed to model data sequences of any length. We present a local search technique to learn the structure of the template network. In contrast to dynamic Bayesian networks for which inference is generally exponential in the number of variables per time slice, DSPNs inherit the linear inference complexity of SPNs. We demonstrate the advantages of DSPNs over DBNs and other models on several datasets of sequence data.
[ { "version": "v1", "created": "Fri, 13 Nov 2015 19:56:15 GMT" }, { "version": "v2", "created": "Sat, 16 Jul 2016 03:37:01 GMT" } ]
2016-07-19T00:00:00
[ [ "Melibari", "Mazen", "" ], [ "Poupart", "Pascal", "" ], [ "Doshi", "Prashant", "" ], [ "Trimponias", "George", "" ] ]
new_dataset
0.956319
1606.06794
Akshay Kumar
Akshay Kumar, Ahmed Abdelhadi, Charles Clancy
A Delay-Optimal Packet Scheduler for M2M Uplink
Accepted for publication in IEEE MILCOM 2016 (6 pages, 7 figures)
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a delay-optimal packet scheduler for processing the M2M uplink traffic at the M2M application server (AS). Due to the delay-heterogeneity in uplink traffic, we classify it broadly into delay-tolerant and delay-sensitive traffic. We then map the diverse delay requirements of each class to sigmoidal functions of packet delay and formulate a utility-maximization problem that results in a proportionally fair delay-optimal scheduler. We note that solving this optimization problem is equivalent to solving for the optimal fraction of time each class is served with (preemptive) priority such that it maximizes the system utility. Using Monte-Carlo simulations for the queuing process at AS, we verify the correctness of the analytical result for optimal scheduler and show that it outperforms other state-of-the-art packet schedulers such as weighted round robin, max-weight scheduler, fair scheduler and priority scheduling. We also note that at higher traffic arrival rate, the proposed scheduler results in a near-minimal delay variance for the delay-sensitive traffic which is highly desirable. This comes at the expense of somewhat higher delay variance for delay-tolerant traffic which is usually acceptable due to its delay-tolerant nature.
[ { "version": "v1", "created": "Wed, 22 Jun 2016 01:00:15 GMT" }, { "version": "v2", "created": "Sun, 17 Jul 2016 02:22:27 GMT" } ]
2016-07-19T00:00:00
[ [ "Kumar", "Akshay", "" ], [ "Abdelhadi", "Ahmed", "" ], [ "Clancy", "Charles", "" ] ]
new_dataset
0.981223
1607.04721
Marcel Ern\'e Dr.
Marcel Ern\'e
Core spaces, sector spaces and fan spaces: a topological approach to domain theory
30 pages, 1 figure, 10 diagrams, conference on domain theory
null
null
null
cs.LO math.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present old and new characterizations of core spaces, alias worldwide web spaces, originally defined by the existence of supercompact neighborhood bases. The patch spaces of core spaces, obtained by joining the original topology with a second topology having the dual specialization order, are the so-called sector spaces, which have good convexity and separation properties and determine the original space. The category of core spaces is shown to be concretely isomorphic to the category of fan spaces; these are certain quasi-ordered spaces having neighborhood bases of so-called fans, obtained by deleting a finite number of principal filters from a principal filter. This approach has useful consequences for domain theory. In fact, endowed with the Scott topology, the continuous domains are nothing but the sober core spaces, and endowed with the Lawson topology, they are the corresponding fan spaces. We generalize the characterization of continuous lattices as meet-continuous lattices with T$_2$ Lawson topology and extend the Fundamental Theorem of Compact Semilattices to non-complete structures. Finally, we investigate cardinal invariants like density and weight of the involved objects.
[ { "version": "v1", "created": "Sat, 16 Jul 2016 09:18:50 GMT" } ]
2016-07-19T00:00:00
[ [ "Erné", "Marcel", "" ] ]
new_dataset
0.975573
1607.04770
Ary Setijadi Prihatmanto
Andrien Ivander Wijaya, Ary Setijadi Prihatmanto, Rifki Wijaya
Shesop Healthcare: Stress and influenza classification using support vector machine kernel
Keywords: Heart Rate, RRI, Stress, Influenza, SVM, Classification
null
10.13140/RG.2.1.2449.0486
null
cs.CY cs.LG
http://creativecommons.org/licenses/by/4.0/
Shesop is an integrated system to make human lives more easily and to help people in terms of healthcare. Stress and influenza classification is a part of Shesop's application for a healthcare devices such as smartwatch, polar and fitbit. The main objective of this paper is to classify a new data and inform whether you are stress, depressed, caught by influenza or not. We will use the heart rate data taken for months in Bandung, analyze the data and find the Heart rate variance that constantly related with the stress and flu level. After we found the variable, we will use the variable as an input to the support vector machine learning. We will use the lagrangian and kernel technique to transform 2D data into 3D data so we can use the linear classification in 3D space. In the end, we could use the machine learning's result to classify new data and get the final result immediately: stress or not, influenza or not.
[ { "version": "v1", "created": "Sat, 16 Jul 2016 17:22:00 GMT" } ]
2016-07-19T00:00:00
[ [ "Wijaya", "Andrien Ivander", "" ], [ "Prihatmanto", "Ary Setijadi", "" ], [ "Wijaya", "Rifki", "" ] ]
new_dataset
0.998894
1607.04771
Ary Setijadi Prihatmanto
Andrien Ivander Wijaya, Ary Setijadi Prihatmanto, Rifki Wijaya
Shesop Healthcare: Android application to monitor heart rate variance, display influenza and stress condition using Polar H7
Keywords: Healthcare, Android Application, Stress, Influenza, Heart Rate, Classification
null
10.13140/RG.2.1.1400.4729
null
cs.CY
http://creativecommons.org/licenses/by/4.0/
Shesop is an integrated system to make human lives more easily and to help people in terms of healthcare. Stress and influenza classification is a part of Shesop's application for a healthcare devices such as smartwatch, polar and fitbit. The main objective of this paper is to create a proper application to implement the stress and influenza classification. The application use Android studio, XML and Java. Also, while creating this application, all design and program is considered to be available for future updates. The application needs an android smartphone with Bluetooth Low Energy technology (bluetooth v4.0 or above). SheSop application will accommodate data entry, device picker, data gathering process, result and saving the result. In the end, we could use the polar H7 and this application to get a real-time heart rate, Heart rate variability and diagnose our stress and influenza condition.
[ { "version": "v1", "created": "Sat, 16 Jul 2016 17:22:25 GMT" } ]
2016-07-19T00:00:00
[ [ "Wijaya", "Andrien Ivander", "" ], [ "Prihatmanto", "Ary Setijadi", "" ], [ "Wijaya", "Rifki", "" ] ]
new_dataset
0.997831
1607.04881
Ilana Segall
Ilana Segall and Alfred Bruckstein
Stochastic Broadcast Control of Multi-Agent Swarms
null
null
null
CIS-2016-2
cs.RO cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a model for controlling swarms of mobile agents via broadcast control, assumed to be detected by a random set of agents in the swarm. The agents that detect the control signal become ad-hoc leaders of the swarm. The agents are assumed to be velocity controlled, identical, anonymous, memory-less units with limited capabilities of sensing their neighborhood. Each agent is programmed to behave according to a linear local gathering process, based on the relative position of all its neighbors. The detected exogenous control, which is a desired velocity vector, is added by the leaders to the local gathering control. The graph induced by the agents adjacency is referred to as the visibility graph. We show that for piece-wise constant system parameters and a connected visibility graph, the swarm asymptotically aligns in each time-interval on a line in the direction of the exogenous control signal, and all the agents move with identical speed. These results hold for two models of pairwise influence in the gathering process, uniform and scaled. The impact of the influence model is mostly evident when the visibility graph is incomplete. These results are conditioned by the preservation of the connectedness of the visibility graph. In the second part of the report we analyze sufficient conditions for preserving the connectedness of the visibility graph. We show that if the visibility graph is complete then certain bounds on the control signal suffice to preserve the completeness of the graph. However, when the graph is incomplete, general conditions, independent of the leaders topology, could not be found.
[ { "version": "v1", "created": "Sun, 17 Jul 2016 15:32:29 GMT" } ]
2016-07-19T00:00:00
[ [ "Segall", "Ilana", "" ], [ "Bruckstein", "Alfred", "" ] ]
new_dataset
0.998149
1607.04894
Zhiwen Hu
Zhiwen Hu, Zijie Zheng, Tao Wang, Lingyang Song and Xiaoming Li
Caching as a Service: Small-cell Caching Mechanism Design for Service Providers
null
null
null
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless network virtualization has been well recognized as a way to improve the flexibility of wireless networks by decoupling the functionality of the system and implementing infrastructure and spectrum as services. Recent studies have shown that caching provides a better performance to serve the content requests from mobile users. In this paper, we propose that \emph{caching can be applied as a service} in mobile networks, i.e., different service providers (SPs) cache their contents in the storages of wireless facilities that owned by mobile network operators (MNOs). Specifically, we focus on the scenario of \emph{small-cell networks}, where cache-enabled small-cell base stations (SBSs) are the facilities to cache contents. To deal with the competition for storages among multiple SPs, we design a mechanism based on multi-object auctions, where the time-dependent feature of system parameters and the frequency of content replacement are both taken into account. Simulation results show that our solution leads to a satisfactory outcome.
[ { "version": "v1", "created": "Sun, 17 Jul 2016 17:09:45 GMT" } ]
2016-07-19T00:00:00
[ [ "Hu", "Zhiwen", "" ], [ "Zheng", "Zijie", "" ], [ "Wang", "Tao", "" ], [ "Song", "Lingyang", "" ], [ "Li", "Xiaoming", "" ] ]
new_dataset
0.998888
1607.05024
Musheer Ahmad
Musheer Ahmad and Hamed D AlSharari
Rotation-k Affine-Power-Affine-like Multiple Substitution-Boxes for Secure Communication
6 pages, IJARCS Journal paper
International Journal of Advanced Research in Computer Science 7 (3), 44-49, 2016
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Substitution boxes with thorough cryptographic strengths are essential for the development of strong encryption systems. They are the only portions capable of inducing nonlinearity in symmetric encryption systems. Bijective substitution boxes having both high nonlinearities and high algebraic complexities are the most desirable to thwart linear, differential and algebraic attacks. In this paper, a method of constructing algebraically complex and cryptographically potent multiple substitution boxes is proposed. The multiple substitution boxes are synthesized by applying the concept of rotation-k approach on the affine-power-affine structure. It is shown that the rotation-k approach inherits all the features of affine-power-affine structure. Performance assessment of all the proposed substitution boxes is done against nonlinearity, strict avalanche criteria, bits independent criteria, differential probability, linear approximation probability and algebraic complexity. It has been found that the proposed substitution boxes have outstanding cryptographic characteristics and outperform the various recent substitution boxes.
[ { "version": "v1", "created": "Mon, 18 Jul 2016 11:30:51 GMT" } ]
2016-07-19T00:00:00
[ [ "Ahmad", "Musheer", "" ], [ "AlSharari", "Hamed D", "" ] ]
new_dataset
0.990758
1607.05064
Marco Dalai
Marco Dalai, Yury Polyanskiy
Bounds on the Reliability of a Typewriter Channel
Presented atISIT 2016
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give new bounds on the reliability function of a typewriter channel with 5 inputs and crossover probability $1/2$. The lower bound is more of theoretical than practical importance; it improves very marginally the expurgated bound, providing a counterexample to a conjecture on its tightness by Shannon, Gallager and Berlekamp which does not need the construction of algebraic-geometric codes previously used by Katsman, Tsfasman and Vl\u{a}du\c{t}. The upper bound is derived by using an adaptation of the linear programming bound and it is essentially useful as a low-rate anchor for the straight line bound.
[ { "version": "v1", "created": "Mon, 18 Jul 2016 13:39:05 GMT" } ]
2016-07-19T00:00:00
[ [ "Dalai", "Marco", "" ], [ "Polyanskiy", "Yury", "" ] ]
new_dataset
0.972037
1607.05077
Ionel Hosu
Ionel-Alexandru Hosu, Traian Rebedea
Playing Atari Games with Deep Reinforcement Learning and Human Checkpoint Replay
6 pages, 2 figures, EGPAI 2016 - Evaluating General Purpose AI, workshop held in conjunction with ECAI 2016
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a novel method for learning how to play the most difficult Atari 2600 games from the Arcade Learning Environment using deep reinforcement learning. The proposed method, human checkpoint replay, consists in using checkpoints sampled from human gameplay as starting points for the learning process. This is meant to compensate for the difficulties of current exploration strategies, such as epsilon-greedy, to find successful control policies in games with sparse rewards. Like other deep reinforcement learning architectures, our model uses a convolutional neural network that receives only raw pixel inputs to estimate the state value function. We tested our method on Montezuma's Revenge and Private Eye, two of the most challenging games from the Atari platform. The results we obtained show a substantial improvement compared to previous learning approaches, as well as over a random player. We also propose a method for training deep reinforcement learning agents using human gameplay experience, which we call human experience replay.
[ { "version": "v1", "created": "Mon, 18 Jul 2016 13:55:54 GMT" } ]
2016-07-19T00:00:00
[ [ "Hosu", "Ionel-Alexandru", "" ], [ "Rebedea", "Traian", "" ] ]
new_dataset
0.99729
1607.05112
Kyle Fox
Glencora Borradaile and Erin Wolf Chambers and Kyle Fox and Amir Nayyeri
Minimum cycle and homology bases of surface embedded graphs
A preliminary version of this work was presented at the 32nd Annual International Symposium on Computational Geometry
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problems of finding a minimum cycle basis (a minimum weight set of cycles that form a basis for the cycle space) and a minimum homology basis (a minimum weight set of cycles that generates the $1$-dimensional ($\mathbb{Z}_2$)-homology classes) of an undirected graph embedded on a surface. The problems are closely related, because the minimum cycle basis of a graph contains its minimum homology basis, and the minimum homology basis of the $1$-skeleton of any graph is exactly its minimum cycle basis. For the minimum cycle basis problem, we give a deterministic $O(n^\omega+2^{2g}n^2+m)$-time algorithm for graphs embedded on an orientable surface of genus $g$. The best known existing algorithms for surface embedded graphs are those for general graphs: an $O(m^\omega)$ time Monte Carlo algorithm and a deterministic $O(nm^2/\log n + n^2 m)$ time algorithm. For the minimum homology basis problem, we give a deterministic $O((g+b)^3 n \log n + m)$-time algorithm for graphs embedded on an orientable or non-orientable surface of genus $g$ with $b$ boundary components, assuming shortest paths are unique, improving on existing algorithms for many values of $g$ and $n$. The assumption of unique shortest paths can be avoided with high probability using randomization or deterministically by increasing the running time of the homology basis algorithm by a factor of $O(\log n)$.
[ { "version": "v1", "created": "Mon, 18 Jul 2016 14:58:06 GMT" } ]
2016-07-19T00:00:00
[ [ "Borradaile", "Glencora", "" ], [ "Chambers", "Erin Wolf", "" ], [ "Fox", "Kyle", "" ], [ "Nayyeri", "Amir", "" ] ]
new_dataset
0.990117
1607.05171
Roger Piqueras Jover
Roger Piqueras Jover
LTE security, protocol exploits and location tracking experimentation with low-cost software radio
Extended reports, analysis and results from "LTE protocol exploits" presentation at ShmooCon 2016
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/4.0/
The Long Term Evolution (LTE) is the latest mobile standard being implemented globally to provide connectivity and access to advanced services for personal mobile devices. Moreover, LTE networks are considered to be one of the main pillars for the deployment of Machine to Machine (M2M) communication systems and the spread of the Internet of Things (IoT). As an enabler for advanced communications services with a subscription count in the billions, security is of capital importance in LTE. Although legacy GSM (Global System for Mobile Communications) networks are known for being insecure and vulnerable to rogue base stations, LTE is assumed to guarantee confidentiality and strong authentication. However, LTE networks are vulnerable to security threats that tamper availability, privacy and authentication. This manuscript, which summarizes and expands the results presented by the author at ShmooCon 2016 \cite{jover2016lte}, investigates the insecurity rationale behind LTE protocol exploits and LTE rogue base stations based on the analysis of real LTE radio link captures from the production network. Implementation results are discussed from the actual deployment of LTE rogue base stations, IMSI catchers and exploits that can potentially block a mobile device. A previously unknown technique to potentially track the location of mobile devices as they move from cell to cell is also discussed, with mitigations being proposed.
[ { "version": "v1", "created": "Mon, 18 Jul 2016 16:37:14 GMT" } ]
2016-07-19T00:00:00
[ [ "Jover", "Roger Piqueras", "" ] ]
new_dataset
0.987442
1607.05183
Stephen Strowes
Stephen D. Strowes
Diurnal and Weekly Cycles in IPv6 Traffic
3 pages, 6 figures, short workshop paper, ACM, IRTF & ISOC Applied Networking Research Workshop (ANRW) 2016
null
10.1145/2959424.2959438
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
IPv6 activity is commonly reported as a fraction of network traffic per day. Within this traffic, however, are daily and weekly characteristics, driven by non-uniform IPv6 deployment across ISPs and regions. This paper discusses some of the more apparent patterns we observe today.
[ { "version": "v1", "created": "Mon, 18 Jul 2016 16:56:51 GMT" } ]
2016-07-19T00:00:00
[ [ "Strowes", "Stephen D.", "" ] ]
new_dataset
0.997652
1603.08120
Wenbin Li
Wenbin Li and Darren Cosker and Zhihan Lv and Matthew Brown
Nonrigid Optical Flow Ground Truth for Real-World Scenes with Time-Varying Shading Effects
preprint of our paper accepted by RA-L'16
null
10.1109/LRA.2016.2592513
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
In this paper we present a dense ground truth dataset of nonrigidly deforming real-world scenes. Our dataset contains both long and short video sequences, and enables the quantitatively evaluation for RGB based tracking and registration methods. To construct ground truth for the RGB sequences, we simultaneously capture Near-Infrared (NIR) image sequences where dense markers - visible only in NIR - represent ground truth positions. This allows for comparison with automatically tracked RGB positions and the formation of error metrics. Most previous datasets containing nonrigidly deforming sequences are based on synthetic data. Our capture protocol enables us to acquire real-world deforming objects with realistic photometric effects - such as blur and illumination change - as well as occlusion and complex deformations. A public evaluation website is constructed to allow for ranking of RGB image based optical flow and other dense tracking algorithms, with various statistical measures. Furthermore, we present an RGB-NIR multispectral optical flow model allowing for energy optimization by adoptively combining featured information from both the RGB and the complementary NIR channels. In our experiments we evaluate eight existing RGB based optical flow methods on our new dataset. We also evaluate our hybrid optical flow algorithm by comparing to two existing multispectral approaches, as well as varying our input channels across RGB, NIR and RGB-NIR.
[ { "version": "v1", "created": "Sat, 26 Mar 2016 16:08:13 GMT" }, { "version": "v2", "created": "Sat, 25 Jun 2016 14:57:38 GMT" }, { "version": "v3", "created": "Fri, 15 Jul 2016 12:39:03 GMT" } ]
2016-07-18T00:00:00
[ [ "Li", "Wenbin", "" ], [ "Cosker", "Darren", "" ], [ "Lv", "Zhihan", "" ], [ "Brown", "Matthew", "" ] ]
new_dataset
0.999682
1606.07700
Julie Grollier
Julie Grollier, Damien Querlioz and Mark D. Stiles
Spintronic nano-devices for bio-inspired computing
null
null
null
null
cs.ET cond-mat.mes-hall
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bio-inspired hardware holds the promise of low-energy, intelligent and highly adaptable computing systems. Applications span from automatic classification for big data management, through unmanned vehicle control, to control for bio-medical prosthesis. However, one of the major challenges of fabricating bio-inspired hardware is building ultra-high density networks out of complex processing units interlinked by tunable connections. Nanometer-scale devices exploiting spin electronics (or spintronics) can be a key technology in this context. In particular, magnetic tunnel junctions are well suited for this purpose because of their multiple tunable functionalities. One such functionality, non-volatile memory, can provide massive embedded memory in unconventional circuits, thus escaping the von-Neumann bottleneck arising when memory and processors are located separately. Other features of spintronic devices that could be beneficial for bio-inspired computing include tunable fast non-linear dynamics, controlled stochasticity, and the ability of single devices to change functions in different operating conditions. Large networks of interacting spintronic nano-devices can have their interactions tuned to induce complex dynamics such as synchronization, chaos, soliton diffusion, phase transitions, criticality, and convergence to multiple metastable states. A number of groups have recently proposed bio-inspired architectures that include one or several types of spintronic nanodevices. In this article we show how spintronics can be used for bio-inspired computing. We review the different approaches that have been proposed, the recent advances in this direction, and the challenges towards fully integrated spintronics-CMOS (Complementary metal - oxide - semiconductor) bio-inspired hardware.
[ { "version": "v1", "created": "Fri, 24 Jun 2016 14:28:15 GMT" }, { "version": "v2", "created": "Fri, 15 Jul 2016 13:45:39 GMT" } ]
2016-07-18T00:00:00
[ [ "Grollier", "Julie", "" ], [ "Querlioz", "Damien", "" ], [ "Stiles", "Mark D.", "" ] ]
new_dataset
0.999694
1606.09463
Mehrtash Mehrabi
Mehrtash Mehrabi, Mostafa Shahabinejad, Masoud Ardakani and Majid Khabbazian
Optimal Locally Repairable Codes with Improved Update Complexity
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a systematic erasure code, update complexity (UC) is defined as the maximum number of parity blocks needed to be changed when some information blocks are updated. Locally repairable codes (LRCs) have been recently proposed and used in real-world distributed storage systems. In this paper, update complexity for optimal LRC is studied and both lower and upper bounds on UC are established in terms of length (n), dimension (k), minimum distance (d), and locality (r) of the code, when (r+1)|n. Furthermore, a class of optimal LRCs with small UC is proposed. Our proposed LRCs could be of interest as they improve UC without sacrificing optimality of the code.
[ { "version": "v1", "created": "Thu, 30 Jun 2016 12:41:06 GMT" }, { "version": "v2", "created": "Fri, 1 Jul 2016 00:48:08 GMT" }, { "version": "v3", "created": "Thu, 14 Jul 2016 22:43:19 GMT" } ]
2016-07-18T00:00:00
[ [ "Mehrabi", "Mehrtash", "" ], [ "Shahabinejad", "Mostafa", "" ], [ "Ardakani", "Masoud", "" ], [ "Khabbazian", "Majid", "" ] ]
new_dataset
0.952183
1607.02281
Stavros Nikolopoulos D.
Anna Mpanti and Stavros D. Nikolopoulos
Two RPG Flow-graphs for Software Watermarking using Bitonic Sequences of Self-inverting Permutations
10 pages, 2 figures
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software watermarking has received considerable attention and was adopted by the software development community as a technique to prevent or discourage software piracy and copyright infringement. A wide range of software watermarking techniques has been proposed among which the graph-based methods that encode watermarks as graph structures. Following up on our recently proposed methods for encoding watermark numbers $w$ as reducible permutation flow-graphs $F[\pi^*]$ through the use of self-inverting permutations $\pi^*$, in this paper, we extend the types of flow-graphs available for software watermarking by proposing two different reducible permutation flow-graphs $F_1[\pi^*]$ and $F_2[\pi^*]$ incorporating important properties which are derived from the bitonic subsequences composing the self-inverting permutation $\pi^*$. We show that a self-inverting permutation $\pi^*$ can be efficiently encoded into either $F_1[\pi^*]$ or $F_2[\pi^*]$ and also efficiently decoded from theses graph structures. The proposed flow-graphs $F_1[\pi^*]$ and $F_2[\pi^*]$ enrich the repository of graphs which can encode the same watermark number $w$ and, thus, enable us to embed multiple copies of the same watermark $w$ into an application program $P$. Moreover, the enrichment of that repository with new flow-graphs increases our ability to select a graph structure more similar to the structure of a given application program $P$ thereby enhancing the resilience of our codec system to attacks.
[ { "version": "v1", "created": "Fri, 8 Jul 2016 09:12:07 GMT" }, { "version": "v2", "created": "Fri, 15 Jul 2016 08:57:56 GMT" } ]
2016-07-18T00:00:00
[ [ "Mpanti", "Anna", "" ], [ "Nikolopoulos", "Stavros D.", "" ] ]
new_dataset
0.975442
1607.04360
Zelalem Yalew Jembre
Yalew Zelalem Jembre and Young-June Choi
Grid-Based Multichannel Access in Vehicular Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In vehicular networks, vehicles exchange messages with each other as well as infrastructure to prevent accidents or enhance driver's and passenger's experience. In this paper, we propose a grid-based multichannel access scheme to enhance the performance of a vehicular network. To determine the feasibility of our scheme, we obtained preliminary results using the OPNET simulation tool.
[ { "version": "v1", "created": "Fri, 15 Jul 2016 01:50:48 GMT" } ]
2016-07-18T00:00:00
[ [ "Jembre", "Yalew Zelalem", "" ], [ "Choi", "Young-June", "" ] ]
new_dataset
0.951152
1607.04366
Wayes Tushar
Wayes Tushar, Jian Andrew Zhang, Chau Yuen, David Smith and Naveed Ul Hassan
Management of Renewable Energy for A Shared Facility Controller in Smart Grid
Journal paper
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes an energy management scheme to maximize the use of solar energy in the smart grid. In this context, a shared facility controller (SFC) with a number of solar photovoltaic (PV) panels in a smart community is considered that has the capability to schedule the generated energy for consumption and trade to other entities. Particularly, a mechanism is designed for the SFC to decide on the energy surplus, if there is any, that it can use to charge its battery and sell to the households and the grid based on the offered prices. In this regard, a hierarchical energy management scheme is proposed with a view to reduce the total operational cost to the SFC. The concept of a virtual cost (VC) is introduced that aids the SFC to estimate its future operational cost based on some available current information. The energy management is conducted for three different cases and the optimal cost to the SFC is determined for each case via the theory of maxima and minima. A real-time algorithm is proposed to reach the optimal cost for all cases and some numerical examples are provided to demonstrate the beneficial properties of the proposed scheme.
[ { "version": "v1", "created": "Fri, 15 Jul 2016 03:07:34 GMT" } ]
2016-07-18T00:00:00
[ [ "Tushar", "Wayes", "" ], [ "Zhang", "Jian Andrew", "" ], [ "Yuen", "Chau", "" ], [ "Smith", "David", "" ], [ "Hassan", "Naveed Ul", "" ] ]
new_dataset
0.975744
1607.04378
Liping Jing Dr.
Liping Jing, Bo Liu, Jaeyoung Choi, Adam Janin, Julia Bernd, Michael W. Mahoney, and Gerald Friedland
DCAR: A Discriminative and Compact Audio Representation to Improve Event Detection
An abbreviated version of this paper will be published in ACM Multimedia 2016
null
null
null
cs.SD cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel two-phase method for audio representation, Discriminative and Compact Audio Representation (DCAR), and evaluates its performance at detecting events in consumer-produced videos. In the first phase of DCAR, each audio track is modeled using a Gaussian mixture model (GMM) that includes several components to capture the variability within that track. The second phase takes into account both global structure and local structure. In this phase, the components are rendered more discriminative and compact by formulating an optimization problem on Grassmannian manifolds, which we found represents the structure of audio effectively. Our experiments used the YLI-MED dataset (an open TRECVID-style video corpus based on YFCC100M), which includes ten events. The results show that the proposed DCAR representation consistently outperforms state-of-the-art audio representations. DCAR's advantage over i-vector, mv-vector, and GMM representations is significant for both easier and harder discrimination tasks. We discuss how these performance differences across easy and hard cases follow from how each type of model leverages (or doesn't leverage) the intrinsic structure of the data. Furthermore, DCAR shows a particularly notable accuracy advantage on events where humans have more difficulty classifying the videos, i.e., events with lower mean annotator confidence.
[ { "version": "v1", "created": "Fri, 15 Jul 2016 04:28:14 GMT" } ]
2016-07-18T00:00:00
[ [ "Jing", "Liping", "" ], [ "Liu", "Bo", "" ], [ "Choi", "Jaeyoung", "" ], [ "Janin", "Adam", "" ], [ "Bernd", "Julia", "" ], [ "Mahoney", "Michael W.", "" ], [ "Friedland", "Gerald", "" ] ]
new_dataset
0.997211
1607.04452
Dimitar Asenov
Dimitar Asenov, Peter M\"uller, Lukas Vogel
The IDE as a Scriptable Information System (extended version)
A video demonstrating our system can be seen at https://youtu.be/kYaRKuUy9rA
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software engineering is extremely information-intensive. Every day developers work with source code, version repositories, issue trackers, documentation, web-based and other information resources. However, three key aspects of information work lack good support: (i) combining information from different sources; (ii) flexibly presenting collected information to enable easier comprehension; and (iii) automatically acting on collected information, for example to perform a refactoring. Poor support for these activities makes many common development tasks time-consuming and error-prone. We propose an approach that directly addresses these three issues by integrating a flexible query mechanism into the development environment. Our approach enables diverse ways to process and visualize information and can be extended via scripts. We demonstrate how an implementation of the approach can be used to rapidly write queries that meet a wide range of information needs.
[ { "version": "v1", "created": "Fri, 15 Jul 2016 10:49:48 GMT" } ]
2016-07-18T00:00:00
[ [ "Asenov", "Dimitar", "" ], [ "Müller", "Peter", "" ], [ "Vogel", "Lukas", "" ] ]
new_dataset
0.999326
1607.04515
Yuchao Dai Dr.
Suryansh Kumar, Yuchao Dai, and Hongdong Li
Multi-body Non-rigid Structure-from-Motion
21 pages, 16 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional structure-from-motion (SFM) research is primarily concerned with the 3D reconstruction of a single, rigidly moving object seen by a static camera, or a static and rigid scene observed by a moving camera --in both cases there are only one relative rigid motion involved. Recent progress have extended SFM to the areas of {multi-body SFM} (where there are {multiple rigid} relative motions in the scene), as well as {non-rigid SFM} (where there is a single non-rigid, deformable object or scene). Along this line of thinking, there is apparently a missing gap of "multi-body non-rigid SFM", in which the task would be to jointly reconstruct and segment multiple 3D structures of the multiple, non-rigid objects or deformable scenes from images. Such a multi-body non-rigid scenario is common in reality (e.g. two persons shaking hands, multi-person social event), and how to solve it represents a natural {next-step} in SFM research. By leveraging recent results of subspace clustering, this paper proposes, for the first time, an effective framework for multi-body NRSFM, which simultaneously reconstructs and segments each 3D trajectory into their respective low-dimensional subspace. Under our formulation, 3D trajectories for each non-rigid structure can be well approximated with a sparse affine combination of other 3D trajectories from the same structure (self-expressiveness). We solve the resultant optimization with the alternating direction method of multipliers (ADMM). We demonstrate the efficacy of the proposed framework through extensive experiments on both synthetic and real data sequences. Our method clearly outperforms other alternative methods, such as first clustering the 2D feature tracks to groups and then doing non-rigid reconstruction in each group or first conducting 3D reconstruction by using single subspace assumption and then clustering the 3D trajectories into groups.
[ { "version": "v1", "created": "Fri, 15 Jul 2016 14:04:30 GMT" } ]
2016-07-18T00:00:00
[ [ "Kumar", "Suryansh", "" ], [ "Dai", "Yuchao", "" ], [ "Li", "Hongdong", "" ] ]
new_dataset
0.998743
1607.04629
Aronee Dasgupta Mr
Aronee Dasgupta, Sahil Chakraborty, Astha Nachrani and Pritam Gajkumar Shah
Lightweight Security Protocol for WiSense based Wireless Sensor Network
5 pages, 4 figures, 2 tables. Published with International Journal of Computer Applications (IJCA)
International Journal of Computer Applications 145(3):6-10, July 2016
10.5120/ijca2016910172
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Sensor Networks have emerged as one of the leading technologies. These networks are designed to monitor crucial environmental parameters of humidity, temperature, wind speed, soil moisture content, UV index, sound, etc. and then transfer the required information to the base station. However, security remains the key challenge of such networks as critical data is being transferred. Most sensor nodes currently deployed have constraints on memory and processing power and hence operate without an efficient security protocol. Hereby a protocol which is lightweight and is secure for wireless sensor applications is proposed.
[ { "version": "v1", "created": "Fri, 15 Jul 2016 19:46:36 GMT" } ]
2016-07-18T00:00:00
[ [ "Dasgupta", "Aronee", "" ], [ "Chakraborty", "Sahil", "" ], [ "Nachrani", "Astha", "" ], [ "Shah", "Pritam Gajkumar", "" ] ]
new_dataset
0.990732
1604.07128
Hsiang-Hsuan Liu
Wing-Kai Hon, Ton Kloks, Fu-Hong Liu, Hsiang-Hsuan Liu and Tao-Ming Wang
On the Grundy number of Cameron graphs
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Grundy number of a graph is the maximal number of colors attained by a first-fit coloring of the graph. The class of Cameron graphs is the Seidel switching class of cographs. In this paper we show that the Grundy number is computable in polynomial time for Cameron graphs.
[ { "version": "v1", "created": "Mon, 25 Apr 2016 04:41:43 GMT" }, { "version": "v2", "created": "Thu, 14 Jul 2016 02:13:05 GMT" } ]
2016-07-15T00:00:00
[ [ "Hon", "Wing-Kai", "" ], [ "Kloks", "Ton", "" ], [ "Liu", "Fu-Hong", "" ], [ "Liu", "Hsiang-Hsuan", "" ], [ "Wang", "Tao-Ming", "" ] ]
new_dataset
0.975185
1605.08994
Yongsheng Tang
Yongsheng Tang, Shixin Zhu, Xiaoshan Kai
MacWilliams type identities on the Lee and Euclidean weights for linear codes over $\mathbb{Z}_{\ell}$
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
Motivated by the works of Shiromoto [3] and Shi et al. [4], we study the existence of MacWilliams type identities with respect to Lee and Euclidean weight enumerators for linear codes over $\mathbb{Z}_{\ell}.$ Necessary and sufficient conditions for the existence of MacWilliams type identities with respect to Lee and Euclidean weight enumerators for linear codes over $\mathbb{Z}_{\ell}$ are given. Some examples about such MacWilliams type identities are also presented.
[ { "version": "v1", "created": "Sun, 29 May 2016 12:01:44 GMT" }, { "version": "v2", "created": "Mon, 6 Jun 2016 09:59:50 GMT" }, { "version": "v3", "created": "Mon, 4 Jul 2016 04:49:13 GMT" }, { "version": "v4", "created": "Thu, 14 Jul 2016 02:07:12 GMT" } ]
2016-07-15T00:00:00
[ [ "Tang", "Yongsheng", "" ], [ "Zhu", "Shixin", "" ], [ "Kai", "Xiaoshan", "" ] ]
new_dataset
0.959622
1607.03479
Necmiye Ozay
Yunus Emre Sahin and Necmiye Ozay
SAT-based Distributed Reactive Control Protocol Synthesis for Boolean Networks
This is an extended version of the paper with the same title that will appear in IEEE MSC 2016
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the synthesis of distributed reactive control protocols for a Boolean network in a distributed manner. We start with a directed acyclic graph representing a network of Boolean subsystems and a global contract, given as an assumption-guarantee pair. Assumption captures the environment behavior, and guarantee is the requirements to be satisfied by the system. Local assumption-guarantee contracts, together with local control protocols ensuring these local contracts, are computed recursively for each subsystem based on the partial order structure induced by the directed acyclic graph. By construction, implementing these local control protocols together guarantees the satisfaction of the global assumption-guarantee contract. Moreover, local control protocol synthesis reduces to quantified satisfiability (QSAT) problems in this setting. We also discuss structural properties of the network that affect the completeness of the proposed algorithm. As an application, we show how an aircraft electric power system can be represented as a Boolean network, and we synthesize distributed control protocols from a global assumption-guarantee contract. The assumptions capture possible failures of the system components, and the guarantees capture safety requirements related to power distribution.
[ { "version": "v1", "created": "Tue, 12 Jul 2016 19:49:26 GMT" }, { "version": "v2", "created": "Thu, 14 Jul 2016 01:08:23 GMT" } ]
2016-07-15T00:00:00
[ [ "Sahin", "Yunus Emre", "" ], [ "Ozay", "Necmiye", "" ] ]
new_dataset
0.997945
1607.03971
Nelle Varoquaux
Nelle Varoquaux
8th European Conference on Python in Science (EuroSciPy 2015)
euroscipy-proceedings2015-01
null
null
null
cs.OH
http://creativecommons.org/licenses/by/4.0/
The 8th edition of the European Conference on Python in Science, EuroSciPy was held for the second time in the beautiful city of Cambridge, UK from August, 26th to 29th, 2014. More than 200 participants, both from academia and industry, attended the conference. As usual, the conference kicked off with two days of tutorials, divided into an introductory and an advanced track. The introductory track, presented by Joris Vankerschaver, Valerio Maggio Joris Van den Bossche, Stijn Van Hoey and Nicolas Rougier, gave a quick but thorough overview of the SciPy stack, while the experience track focused on different advanced topics. This second track began with an introduction to Bokeh, by Bryan Van den Ven, followed by an image processing tutorial with scikit-image by Emmanuelle Gouillart and Juan Nunez-Iglesias. The afternoon continued with two tutorials on data analysis: the first, intitulated "How 'good' is your model, and how can you make it better?" (by Chih-Chun Chen, Dimitry Foures, Elena Chatzimichali, Giuseppe Vettigli) focused on the challenges face while attempting model selections, and the first day concluded with a statistics in python tutorial by Gael Varoquaux. During the second day, the attendees tackled an in depth 4 hour tutorial on Cython, presented by Stefan Behnel, and a crash course on "Evidence-Based Teaching: What We Know and How to Use It", by Greg Wilson.
[ { "version": "v1", "created": "Thu, 14 Jul 2016 00:53:02 GMT" } ]
2016-07-15T00:00:00
[ [ "Varoquaux", "Nelle", "" ] ]
new_dataset
0.99875
1607.03979
Arshia Khaffaf
Mona Khaffaf and Arshia Khaffaf
Resource Planning For Rescue Operations
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After an earthquake, disaster sites pose a multitude of health and safety concerns. A rescue operation of people trapped in the ruins after an earthquake disaster requires a series of intelligent behavior, including planning. For a successful rescue operation, given a limited number of available actions and regulations, the role of planning in rescue operations is crucial. Fortunately, recent developments in automated planning by artificial intelligence community can help different organization in this crucial task. Due to the number of rules and regulations, we believe that a rule based system for planning can be helpful for this specific planning problem. In this research work, we use logic rules to represent rescue and related regular regulations, together with a logic based planner to solve this complicated problem. Although this research is still in the prototyping and modeling stage, it clearly shows that rule based languages can be a good infrastructure for this computational task. The results of this research can be used by different organizations, such as Iranian Red Crescent Society and International Institute of Seismology and Earthquake Engineering (IISEE).
[ { "version": "v1", "created": "Thu, 14 Jul 2016 02:21:14 GMT" } ]
2016-07-15T00:00:00
[ [ "Khaffaf", "Mona", "" ], [ "Khaffaf", "Arshia", "" ] ]
new_dataset
0.998845
1607.04186
Mathieu Acher
Mathieu Acher (DiverSe), Fran\c{c}ois Esnault (DiverSe)
Large-scale Analysis of Chess Games with Chess Engines: A Preliminary Report
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The strength of chess engines together with the availability of numerous chess games have attracted the attention of chess players, data scientists, and researchers during the last decades. State-of-the-art engines now provide an authoritative judgement that can be used in many applications like cheating detection, intrinsic ratings computation, skill assessment, or the study of human decision-making. A key issue for the research community is to gather a large dataset of chess games together with the judgement of chess engines. Unfortunately the analysis of each move takes lots of times. In this paper, we report our effort to analyse almost 5 millions chess games with a computing grid. During summer 2015, we processed 270 millions unique played positions using the Stockfish engine with a quite high depth (20). We populated a database of 1+ tera-octets of chess evaluations, representing an estimated time of 50 years of computation on a single machine. Our effort is a first step towards the replication of research results, the supply of open data and procedures for exploring new directions, and the investigation of software engineering/scalability issues when computing billions of moves.
[ { "version": "v1", "created": "Thu, 28 Apr 2016 08:37:43 GMT" } ]
2016-07-15T00:00:00
[ [ "Acher", "Mathieu", "", "DiverSe" ], [ "Esnault", "François", "", "DiverSe" ] ]
new_dataset
0.999484
1607.04206
Yan-yu Zhang
Yan-Yu Zhang, Hong-Yi Yu, Jian-Kang Zhang and Jin-Long Wang
Reliable MIMO Optical Wireless Communications Through Super-Rectangular Cover
Submitted to IEEE Transactions on Informaiton Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider an intensity modulated direct detection MIMO optical wireless communication (OWC) system. For such a system, a novel super-rectangular cover theory is developed to characterize both the unique identifiability and full reliability. This theory states that a transmitted matrix signal can be uniquely identified if and only if the cover order is equal to the transmitter aperture number, i.e., full cover. In addition, we prove that full reliability is guaranteed for space-time block coded MIMO-OWC over commonly used log-normal fading channels with an ML detector if and only if the STBC enables full cover. In addition, the diversity gain can be geometrically interpreted as the cover order of the super-rectangle, which should be maximized, and the volume of this super-rectangle, as the diversity loss, should be minimized. Using this established error performance criterion, the optimal linear STBC for block fading channels is proved to be spatial repetition code with an optimal power allocation. The design of the optimal non-linear STBC is shown to be equivalent to constructing the optimal multi-dimensional constellation. Specifically, a multi-dimensional constellation from Diophantine equations is proposed and then, shown to be more energy-efficient than the commonly used nonnegative pulse amplitude modulation constellation.
[ { "version": "v1", "created": "Thu, 14 Jul 2016 16:53:51 GMT" } ]
2016-07-15T00:00:00
[ [ "Zhang", "Yan-Yu", "" ], [ "Yu", "Hong-Yi", "" ], [ "Zhang", "Jian-Kang", "" ], [ "Wang", "Jin-Long", "" ] ]
new_dataset
0.989973
1601.07392
Hans Fangohr
Hans Fangohr, Maximilian Albert, Matteo Franchin
Nmag micromagnetic simulation tool - software engineering lessons learned
7 pages, 5 figures, Software Engineering for Science, ICSE2016
Proceedings of the International Workshop on Software Engineering for Science, Pages 1-7, (2016)
10.1145/2897676.2897677
null
cs.SE physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We review design and development decisions and their impact for the open source code Nmag from a software engineering in computational science point of view. We summarise lessons learned and recommendations for future computational science projects. Key lessons include that encapsulating the simulation functionality in a library of a general purpose language, here Python, provides great flexibility in using the software. The choice of Python for the top-level user interface was very well received by users from the science and engineering community. The from-source installation in which required external libraries and dependencies are compiled from a tarball was remarkably robust. In places, the code is a lot more ambitious than necessary, which introduces unnecessary complexity and reduces main- tainability. Tests distributed with the package are useful, although more unit tests and continuous integration would have been desirable. The detailed documentation, together with a tutorial for the usage of the system, was perceived as one of its main strengths by the community.
[ { "version": "v1", "created": "Wed, 27 Jan 2016 14:46:56 GMT" }, { "version": "v2", "created": "Sun, 28 Feb 2016 17:46:27 GMT" } ]
2016-07-14T00:00:00
[ [ "Fangohr", "Hans", "" ], [ "Albert", "Maximilian", "" ], [ "Franchin", "Matteo", "" ] ]
new_dataset
0.959427
1606.04705
Davut Deniz Yavuz
Kemal Bicakci, Davut Deniz Yavuz, Sezin Gurkan
TwinCloud: Secure Cloud Sharing Without Explicit Key Management
9 pages, 9 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the advent of cloud technologies, there is a growing number of easy-to-use services to store files and share them with other cloud users. By providing security features, cloud service providers try to encourage users to store personal files or corporate documents on their servers. However, their server-side encryption solutions are not satisfactory when the server itself is not trusted. Although, there are several client-side solutions to provide security for cloud sharing, they are not used extensively because of usability issues in key management. In this paper, we propose TwinCloud which is an innovative solution with the goal of providing a secure system to users without compromising the usability of cloud sharing. TwinCloud achieves this by bringing a novel solution to the complex key exchange problem and by providing a simple and practical approach to store and share files by hiding all the cryptographic and key-distribution operations from users. Serving as a gateway, TwinCloud uses two or more cloud providers to store the encryption keys and encrypted files in separate clouds which ease the secure sharing without a need for trust to either of the cloud service providers with the assumption that they do not collude with each other. We implemented TwinCloud as a lightweight application and make it available as open-source. The results of our usability study show the prospect of the secure sharing solution of TwinCloud.
[ { "version": "v1", "created": "Wed, 15 Jun 2016 10:11:54 GMT" }, { "version": "v2", "created": "Wed, 13 Jul 2016 05:40:31 GMT" } ]
2016-07-14T00:00:00
[ [ "Bicakci", "Kemal", "" ], [ "Yavuz", "Davut Deniz", "" ], [ "Gurkan", "Sezin", "" ] ]
new_dataset
0.999654
1607.03434
Manish Gupta
Dixita Limbachiya and Dhaval Trivedi and Manish K Gupta
DNA Image Pro -- A Tool for Generating Pixel Patterns using DNA Tile Assembly
14 pages, draft
null
null
null
cs.ET cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Self-assembly is a process found everywhere in the Nature. In particular, it is known that DNA self-assembly is Turing universal. Thus one can do arbitrary computations or build nano-structures using DNA self-assembly. In order to understand the DNA self-assembly process, many mathematical models have been proposed in the literature. In particular, abstract Tile Assembly Model (aTAM) received much attention. In this work, we investigate pixel pattern generation using aTAM. For a given image, a tile assembly system is given which can generate the image by self-assembly process. We also consider image blocks with specific cyclic pixel patterns (uniform shift and non uniform shift) self assembly. A software, DNA Image Pro, for generating pixel patterns using DNA tile assembly is also given.
[ { "version": "v1", "created": "Tue, 12 Jul 2016 16:46:25 GMT" } ]
2016-07-14T00:00:00
[ [ "Limbachiya", "Dixita", "" ], [ "Trivedi", "Dhaval", "" ], [ "Gupta", "Manish K", "" ] ]
new_dataset
0.997105
1607.03575
Cuiyun Gao
Cuiyun Gao, Hui Xu, Yichuan Man, Yangfan Zhou, Michael R. Lyu
IntelliAd Understanding In-APP Ad Costs From Users Perspective
12 pages
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ads are an important revenue source for mobile app development, especially for free apps, whose expense can be compensated by ad revenue. The ad benefits also carry with costs. For example, too many ads can interfere the user experience, leading to less user retention and reduced earnings ultimately. In the paper, we aim at understanding the ad costs from users perspective. We utilize app reviews, which are widely recognized as expressions of user perceptions, to identify the ad costs concerned by users. Four types of ad costs, i.e., number of ads, memory/CPU overhead, traffic usage, and bettery consumption, have been discovered from user reviews. To verify whether different ad integration schemes generate different ad costs, we first obtain the commonly used ad schemes from 104 popular apps, and then design a framework named IntelliAd to automatically measure the ad costs of each scheme. To demonstrate whether these costs indeed influence users reactions, we finally observe the correlations between the measured ad costs and the user perceptions. We discover that the costs related to memory/CPU overhead and battery consumption are more concerned by users, while the traffic usage is less concerned by users in spite of its obvious variations among different schemes in the experiments. Our experimental results provide the developers with suggestions on better incorporating ads into apps and, meanwhile, ensuring the user experience.
[ { "version": "v1", "created": "Wed, 13 Jul 2016 02:43:51 GMT" } ]
2016-07-14T00:00:00
[ [ "Gao", "Cuiyun", "" ], [ "Xu", "Hui", "" ], [ "Man", "Yichuan", "" ], [ "Zhou", "Yangfan", "" ], [ "Lyu", "Michael R.", "" ] ]
new_dataset
0.981386