id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1605.00684
|
Maria Mera Collantes
|
Maria I. Mera Collantes, Mohamed El Massad, Siddharth Garg
|
Threshold-Dependent Camouflaged Cells to Secure Circuits Against Reverse
Engineering Attacks
| null | null | null | null |
cs.CR cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With current tools and technology, someone who has physical access to a chip
can extract the detailed layout of the integrated circuit (IC). By using
advanced visual imaging techniques, reverse engineering can reveal details that
are meant to be kept secret, such as a secure protocol or novel implementation
that offers a competitive advantage. A promising solution to defend against
reverse engineering attacks is IC camouflaging. In this work, we propose a new
camouflaging technique based on the threshold voltage of the transistors. We
refer to these cells as threshold dependent camouflaged cells. Our work differs
from current commercial solutions in that the latter use look-alike cells, with
the assumption that it is difficult for the reverse engineer to identify the
cell's functionality. Yet, if a structural distinction between cells exists,
then these are still vulnerable, especially as reverse engineers use more
advanced and precise techniques. On the other hand, the proposed threshold
dependent standard cells are structurally identical regardless of the cells'
functionality. Detailed circuit simulations of our proposed threshold dependent
camouflaged cells demonstrate that they can be used to cost-effectively and
robustly camouflage large netlists. Corner analysis of process, temperature,
and supply voltage (PVT) variations show that our cells operate as expected
over all PVT corners simulated.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2016 20:46:04 GMT"
}
] | 2016-05-04T00:00:00 |
[
[
"Collantes",
"Maria I. Mera",
""
],
[
"Massad",
"Mohamed El",
""
],
[
"Garg",
"Siddharth",
""
]
] |
new_dataset
| 0.985391 |
1605.00695
|
Sven K\"ohler
|
Christian Schindelhauer, Andreas Jakoby, Sven K\"ohler
|
Cyclone Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce Cyclone codes which are rateless erasure resilient codes. They
combine Pair codes with Luby Transform (LT) codes by computing a code symbol
from a random set of data symbols using bitwise XOR and cyclic shift
operations. The number of data symbols is chosen according to the Robust
Soliton distribution. XOR and cyclic shift operations establish a unitary
commutative ring if data symbols have a length of $p-1$ bits, for some prime
number $p$. We consider the graph given by code symbols combining two data
symbols. If $n/2$ such random pairs are given for $n$ data symbols, then a
giant component appears, which can be resolved in linear time. We can extend
Cyclone codes to data symbols of arbitrary even length, provided the Goldbach
conjecture holds.
Applying results for this giant component, it follows that Cyclone codes have
the same encoding and decoding time complexity as LT codes, while the overhead
is upper-bounded by those of LT codes. Simulations indicate that Cyclone codes
significantly decreases the overhead of extra coding symbols.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2016 21:42:17 GMT"
}
] | 2016-05-04T00:00:00 |
[
[
"Schindelhauer",
"Christian",
""
],
[
"Jakoby",
"Andreas",
""
],
[
"Köhler",
"Sven",
""
]
] |
new_dataset
| 0.995129 |
1605.00918
|
More Swamidas Mr
|
M Swamidas, A Govardhan, D Vijayalakshmi
|
QoS Web Service Security Dynamic Intruder Detection System for HTTP SSL
services
|
6 Pages, Indexed in SCOPUS, ISI. Published in Special issue on
Computing Applications and Data Mining International Journal of Computer
Science and Information Security, Vol. 14 S1, February 2016
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web services are expected to play significant role for message communications
over internet applications. Most of the future work is web security. Online
shopping and web services are increasing at rapid rate. In this paper we
presented the fundamental concepts related to Network security, web security
threats. QoS web service security intrusion detection is important concern in
network communications and firewalls security; we discussed various issues and
challenges related to web security. The fundamental concepts network security
XML firewall, XML networks. We proposed a novel Dynamic Intruder Detection
System (DIDA) is safe guard against SSL secured transactions over message
communications in intermediate routers that enable services to sender and
receiver use Secured Session Layer protocol messages. This can be into three
stages 1. Sensor 2. Analyzer and 3.User Interface.
|
[
{
"version": "v1",
"created": "Tue, 3 May 2016 14:13:15 GMT"
}
] | 2016-05-04T00:00:00 |
[
[
"Swamidas",
"M",
""
],
[
"Govardhan",
"A",
""
],
[
"Vijayalakshmi",
"D",
""
]
] |
new_dataset
| 0.999442 |
1105.0103
|
Sariel Har-Peled
|
Sariel Har-Peled
|
A Simple Proof of the Existence of a Planar Separator
|
Now slightly simpler than previous versions
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We provide a simple proof of the existence of a planar separator by showing
that it is an easy consequence of the circle packing theorem. We also reprove
other results on separators, including:
(A) There is a simple cycle separator if the planar graph is triangulated.
Furthermore, if each face has at most $d$ edges on its boundary, then there is
a cycle separator of size O(sqrt{d n}).
(B) For a set of n balls in R^d, that are k-ply, there is a separator, in the
intersection graph of the balls, of size O(k^{1/d}n^{1-1/d}).
(C) The k nearest neighbor graph of a set of n points in R^d contains a
separator of size O(k^{1/d} n^{1-1/d}).
The new proofs are (arguably) significantly simpler than previous proofs.
|
[
{
"version": "v1",
"created": "Sat, 30 Apr 2011 17:47:56 GMT"
},
{
"version": "v2",
"created": "Tue, 31 May 2011 17:14:44 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Jun 2011 01:30:51 GMT"
},
{
"version": "v4",
"created": "Mon, 11 Jul 2011 01:02:35 GMT"
},
{
"version": "v5",
"created": "Wed, 21 Aug 2013 20:50:43 GMT"
},
{
"version": "v6",
"created": "Mon, 2 May 2016 18:07:54 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Har-Peled",
"Sariel",
""
]
] |
new_dataset
| 0.998683 |
1507.03084
|
Joel Kabor\'e
|
Jo\"el Kabor\'e and Mohammed E. Charkani
|
Constacyclic codes over F_q + u F_q + v F_q + u v F_q
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let q be a prime power and F_q be a finite field. In this paper, we study
constacyclic codes over the ring F_q+ u F_q +v F_q+ u v F_q, where u^2=u, v^2=v
and uv=vu. We characterized the generator polynomials of constacyclic codes and
their duals using some decomposition of this ring. We also define a gray map
and characterize the Gray images of self-dual cyclic codes over
F_q+uF_q+vF_q+uvF_q.
|
[
{
"version": "v1",
"created": "Sat, 11 Jul 2015 10:01:22 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Jul 2015 21:06:29 GMT"
},
{
"version": "v3",
"created": "Mon, 2 May 2016 12:57:20 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Kaboré",
"Joël",
""
],
[
"Charkani",
"Mohammed E.",
""
]
] |
new_dataset
| 0.998612 |
1512.08512
|
Andrew Owens
|
Andrew Owens, Phillip Isola, Josh McDermott, Antonio Torralba, Edward
H. Adelson, William T. Freeman
|
Visually Indicated Sounds
| null | null | null | null |
cs.CV cs.LG cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Objects make distinctive sounds when they are hit or scratched. These sounds
reveal aspects of an object's material properties, as well as the actions that
produced them. In this paper, we propose the task of predicting what sound an
object makes when struck as a way of studying physical interactions within a
visual scene. We present an algorithm that synthesizes sound from silent videos
of people hitting and scratching objects with a drumstick. This algorithm uses
a recurrent neural network to predict sound features from videos and then
produces a waveform from these features with an example-based synthesis
procedure. We show that the sounds predicted by our model are realistic enough
to fool participants in a "real or fake" psychophysical experiment, and that
they convey significant information about material properties and physical
interactions.
|
[
{
"version": "v1",
"created": "Mon, 28 Dec 2015 20:56:50 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Apr 2016 03:03:04 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Owens",
"Andrew",
""
],
[
"Isola",
"Phillip",
""
],
[
"McDermott",
"Josh",
""
],
[
"Torralba",
"Antonio",
""
],
[
"Adelson",
"Edward H.",
""
],
[
"Freeman",
"William T.",
""
]
] |
new_dataset
| 0.991595 |
1603.07545
|
Pedro Roque
|
Pedro Roque and Rodrigo Ventura
|
Space CoBot: modular design of an holonomic aerial robot for indoor
microgravity environments
|
Submitted to IROS 2016. Submission was moved to an update of a
previous article. Now, it can be found at arXiv:1602.03573v2
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the design of a small aerial robot for inhabited
microgravity environments, such as orbiting space stations (e.g., ISS). In
particular, we target a fleet of robots, called Space CoBots, for collaborative
tasks with humans, such as telepresence and cooperative mobile manipulation.
The design is modular, comprising an hexrotor based propulsion system, and a
stack of modules including batteries, cameras for navigation, a screen for
telepresence, a robotic arm, space for extension modules, and a pair of docking
ports. These ports can be used for docking and for mechanically attaching two
Space CoBots together. The kinematics is holonomic, and thus the translational
and the rotational components can be fully decoupled. We employ a
multi-criteria optimization approach to determine the best geometric
configuration for maximum thrust and torque across all directions. We also
tackle the problem of motion control: we use separate converging controllers
for position and attitude control. Finally, we present simulation results using
a realistic physics simulator. These experiments include a sensitivity
evaluation to sensor noise and to unmodeled dynamics, namely a load
transportation.
|
[
{
"version": "v1",
"created": "Thu, 24 Mar 2016 12:27:07 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Apr 2016 20:45:47 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Roque",
"Pedro",
""
],
[
"Ventura",
"Rodrigo",
""
]
] |
new_dataset
| 0.99867 |
1605.00284
|
Heba Abdelnasser
|
Heba Abdelnasser, Moustafa Youssef, Khaled A. Harras
|
MagBoard: Magnetic-based Ubiquitous Homomorphic Off-the-shelf Keyboard
|
Accepted for publication in SECON 2016
| null | null | null |
cs.HC cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the main methods for interacting with mobile devices today is the
error-prone and inflexible touch-screen keyboard. This paper proposes MagBoard:
a homomorphic ubiquitous keyboard for mobile devices. MagBoard allows
application developers and users to design and print different custom keyboards
for the same applications to fit different user's needs. The core idea is to
leverage the triaxial magnetometer embedded in standard mobile phones to
accurately localize the location of a magnet on a virtual grid superimposed on
the printed keyboard. This is achieved through a once in a lifetime
fingerprint. MagBoard also provides a number of modules that allow it to cope
with background magnetic noise, heterogeneous devices, different magnet shapes,
sizes, and strengths, as well as changes in magnet polarity. Our implementation
of MagBoard on Android phones with extensive evaluation in different scenarios
demonstrates that it can achieve a key detection accuracy of more than 91% for
keys as small as 2cm*2cm, reaching 100% for 4cm*4cm keys. This accuracy is
robust with different phones and magnets, highlighting MagBoard promise as a
homomorphic ubiquitous keyboard for mobile devices.
|
[
{
"version": "v1",
"created": "Sun, 1 May 2016 18:06:28 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Abdelnasser",
"Heba",
""
],
[
"Youssef",
"Moustafa",
""
],
[
"Harras",
"Khaled A.",
""
]
] |
new_dataset
| 0.973854 |
1605.00354
|
Nikolaus Correll
|
Nicholas Farrow and Yang Li and Nikolaus Correll
|
Morphological and Embedded Computation in a Self-contained Soft Robotic
Hand
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a self-contained, soft robotic hand composed of soft pneumatic
actuator modules that are equipped with strain and pressure sensing. We show
how this data can be used to discern whether a grasp was successful.
Co-locating sensing and embedded computation with the actuators greatly
simplifies control and system integration. Equipped with a small pump, the hand
is self-contained and needs only power and data supplied by a single USB
connection to a PC. We demonstrate its function by grasping a variety of
objects ranging from very small to large and heavy objects weighing more than
the hand itself. The presented system nicely illustrates the advantages of soft
robotics: low cost, low weight, and intrinsic compliance. We exploit
morphological computation to simplify control, which allows successful grasping
via underactuation. Grasping indeed relies on morphological computation at
multiple levels, ranging from the geometry of the actuator which determines the
actuator's kinematics, embedded strain sensors to measure curvature, to
maximizing contact area and applied force during grasping. Morphological
computation reaches its limitations, however, when objects are too bulky to
self-align with the gripper or when the state of grasping is of interest. We
therefore argue that efficient and reliable grasping also requires not only
intrinsic compliance, but also embedded sensing and computation. In particular,
we show how embedded sensing can be used to detect successful grasps and vary
the force exerted onto an object based on local feedback, which is not possible
using morphological computation alone.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2016 05:04:20 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Farrow",
"Nicholas",
""
],
[
"Li",
"Yang",
""
],
[
"Correll",
"Nikolaus",
""
]
] |
new_dataset
| 0.988248 |
1605.00362
|
Amar Ranjan Dash
|
Amar Ranjan Dash, Sandipta kumar Sahu, Sanjay Kumar Samantra
|
An optimized round robin cpu scheduling algorithm with dynamic time
quantum
|
20 pages, 7 figures, 16 Tables. arXiv admin note: text overlap with
arXiv:1511.02498
|
International Journal of Computer Science, Engineering and
Information Technology (IJCSEIT), Vol. 5,No.1, February 2015
|
10.5121/ijcseit.2015.5102
| null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
CPU scheduling is one of the most crucial operations performed by operating
system. Different algorithms are available for CPU scheduling amongst them RR
(Round Robin) is considered as optimal in time shared environment. The
effectiveness of Round Robin completely depends on the choice of time quantum.
In this paper a new CPU scheduling algorithm has been proposed, named as DABRR
(Dynamic Average Burst Round Robin). That uses dynamic time quantum instead of
static time quantum used in RR. The performance of the proposed algorithm is
experimentally compared with traditional RR and some existing variants of RR.
The results of our approach presented in this paper demonstrate improved
performance in terms of average waiting time, average turnaround time, and
context switching.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2016 06:24:43 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Dash",
"Amar Ranjan",
""
],
[
"Sahu",
"Sandipta kumar",
""
],
[
"Samantra",
"Sanjay Kumar",
""
]
] |
new_dataset
| 0.967198 |
1605.00398
|
Akshay Khatri
|
Akshay Khatri, Sankalp Kolhe, Nupur Giri
|
Dynamic Address Allocation Algorithm for Mobile Ad hoc Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A Mobile Ad hoc network (MANET) consists of nodes which use multi-hop
communication to establish connection between nodes. Traditional infrastructure
based systems use a centralized architecture for address allocation. However,
this is not possible in Ad hoc networks due to their dynamic structure. Many
schemes have been proposed to solve this problem, but most of them use
network-wide broadcasts to ensure the availability of a new address. This
becomes extremely difficult as network size grows. In this paper, we propose an
address allocation algorithm which avoids network-wide broadcasts to allocate
address to a new node. Moreover, the algorithm allocates addresses dynamically
such that the network maintains an "IP resembles topology" state. In such a
state, routing becomes easier and the overall overhead in communication is
reduced. This algorithm is particularly useful for routing protocols which use
topology information to route messages in the network. Our solution is designed
with scalability in mind such that the cost of address assignment to a new node
is independent of the number of nodes in the network.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2016 09:10:44 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Khatri",
"Akshay",
""
],
[
"Kolhe",
"Sankalp",
""
],
[
"Giri",
"Nupur",
""
]
] |
new_dataset
| 0.989273 |
1605.00442
|
Marthe Bonamy
|
Marthe Bonamy and Nicolas Bousquet
|
Token Sliding on Chordal Graphs
|
21 pages
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let I be an independent set of a graph G. Imagine that a token is located on
any vertex of I. We can now move the tokens of I along the edges of the graph
as long as the set of tokens still defines an independent set of G. Given two
independent sets I and J, the Token Sliding problem consists in deciding
whether there exists a sequence of independent sets which transforms I into J
so that every pair of consecutive independent sets of the sequence can be
obtained via a token move. This problem is known to be PSPACE-complete even on
planar graphs.
In 2014, Demaine et al. asked whether the Token Sliding reconfiguration
problem is polynomial time solvable on interval graphs and more generally in
chordal graphs. Yamada and Uehara showed in 2016 that a polynomial time
transformation can be found in proper interval graphs.
In this paper, we answer the first question of Demaine et al. and generalize
the result of Yamada and Uehara by showing that we can decide in polynomial
time whether two independent sets of an interval graph are in the same
connected component. Moveover, we answer similar questions by showing that: (i)
determining if there exists a token sliding transformation between every pair
of k-independent sets in an interval graph can be decided in polynomial time;
(ii) deciding this problem becomes co-NP-hard and even co-W[2]-hard
(parameterized by the size of the independent set) on split graphs, a sub-class
of chordal graphs.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2016 11:42:54 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Bonamy",
"Marthe",
""
],
[
"Bousquet",
"Nicolas",
""
]
] |
new_dataset
| 0.952757 |
1605.00459
|
Desmond Elliott
|
Desmond Elliott, Stella Frank, Khalil Sima'an, Lucia Specia
|
Multi30K: Multilingual English-German Image Descriptions
| null | null | null | null |
cs.CL cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the Multi30K dataset to stimulate multilingual multimodal
research. Recent advances in image description have been demonstrated on
English-language datasets almost exclusively, but image description should not
be limited to English. This dataset extends the Flickr30K dataset with i)
German translations created by professional translators over a subset of the
English descriptions, and ii) descriptions crowdsourced independently of the
original English descriptions. We outline how the data can be used for
multilingual image description and multimodal machine translation, but we
anticipate the data will be useful for a broader range of tasks.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2016 12:38:03 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Elliott",
"Desmond",
""
],
[
"Frank",
"Stella",
""
],
[
"Sima'an",
"Khalil",
""
],
[
"Specia",
"Lucia",
""
]
] |
new_dataset
| 0.999847 |
1605.00475
|
Yuchao Dai Dr.
|
Yuchao Dai, Hongdong Li and Laurent Kneip
|
Rolling Shutter Camera Relative Pose: Generalized Epipolar Geometry
|
Accepted by CVPR 2016, this is an extended version
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The vast majority of modern consumer-grade cameras employ a rolling shutter
mechanism. In dynamic geometric computer vision applications such as visual
SLAM, the so-called rolling shutter effect therefore needs to be properly taken
into account. A dedicated relative pose solver appears to be the first problem
to solve, as it is of eminent importance to bootstrap any derivation of
multi-view geometry. However, despite its significance, it has received
inadequate attention to date.
This paper presents a detailed investigation of the geometry of the rolling
shutter relative pose problem. We introduce the rolling shutter essential
matrix, and establish its link to existing models such as the push-broom
cameras, summarized in a clean hierarchy of multi-perspective cameras. The
generalization of well-established concepts from epipolar geometry is completed
by a definition of the Sampson distance in the rolling shutter case. The work
is concluded with a careful investigation of the introduced epipolar geometry
for rolling shutter cameras on several dedicated benchmarks.
|
[
{
"version": "v1",
"created": "Mon, 2 May 2016 13:31:02 GMT"
}
] | 2016-05-03T00:00:00 |
[
[
"Dai",
"Yuchao",
""
],
[
"Li",
"Hongdong",
""
],
[
"Kneip",
"Laurent",
""
]
] |
new_dataset
| 0.967821 |
1604.08693
|
Nurassyl Kerimbayev
|
N. Kerimbayev, J. Kultan, S. Abdykarimova and A. Akramova
|
LMS Moodle: Distance international education in cooperation of higher
education institutions of different countries
|
9 pages, 9 figures
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The development of international cooperation requires cooperation in the
sphere of education. An enhanced sharing of experience in the sphere of
practical teaching activities implies the increase of the quality of teaching
process and of scientific cooperation. Sharing of experience in educational
activities implies understanding among representatives of different nations
anywhere in the world. It means that through LSM teaching the principle of
social constructivism is realized, when participants together create a narrow
culture of common objects and senses. The article presents an example of
practical application of electronic media to the process of a real lesson. The
article describes the process of teaching students from different countries
using the system of LMS MOODLE, beginning with preparing study materials,
giving lectures by foreign lecturers, practical tasks and ending with passing
an examination. Training has included some full-time students from the Slovak
Republic, the Republic of Dagestan and the Republic of Kazakhstan, and has been
realized by applying the method of distance learning (LMS).
|
[
{
"version": "v1",
"created": "Fri, 29 Apr 2016 05:32:44 GMT"
}
] | 2016-05-02T00:00:00 |
[
[
"Kerimbayev",
"N.",
""
],
[
"Kultan",
"J.",
""
],
[
"Abdykarimova",
"S.",
""
],
[
"Akramova",
"A.",
""
]
] |
new_dataset
| 0.995512 |
1604.08866
|
Jean-Paul Laumond
|
Jean-Paul Laumond (CNRS, LAAS-GEPETTO)
|
Grasping versus Knitting: a Geometric Perspective
|
in Physics of Life Reviews, Elsevier, 2016
| null |
10.1016/j.plrev.2016.04.003
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Grasping an object is a matter of first moving a prehensile organ at some
position in the world, and then managing the contact relationship between the
prehensile organ and the object. Once the contact relationship has been
established and made stable, the object is part of the body and it can move in
the world. As any action, the action of grasping is ontologically anchored in
the physical space while the correlative movement originates in the space of
the body. Evolution has found amazing solutions that allow organisms to rapidly
and efficiently manage the relationship between their body and the world. It is
then natural that roboticists consider taking inspiration of these natural
solutions, while contributing to better understand their origin.
|
[
{
"version": "v1",
"created": "Thu, 28 Apr 2016 12:17:45 GMT"
}
] | 2016-05-02T00:00:00 |
[
[
"Laumond",
"Jean-Paul",
"",
"CNRS, LAAS-GEPETTO"
]
] |
new_dataset
| 0.977817 |
1604.08926
|
Mingyu Li
|
Mingyu Li, Jiajun Shi, Mostafizur Rahman, Santosh Khasanvis, Sachin
Bhat, Csaba Andras Moritz
|
Skybridge-3D-CMOS: A Vertically-Composed Fine-Grained 3D CMOS Integrated
Circuit Technology
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Parallel and monolithic 3D integration directions offer pathways to realize
3D integrated circuits (ICs) but still lead to layer-by-layer implementations,
each functional layer being composed in 2D first. This mindset causes
challenging connectivity, routing and layer alignment between layers when
connected in 3D, with a routing access that can be even worse than 2D CMOS,
which fundamentally limits their potential. To fully exploit the opportunities
in the third dimension, we propose Skybridge-3D-CMOS (S3DC), a fine-grained 3D
integration approach that is directly composed in 3D, utilizing the vertical
dimension vs. using a layer-by-layer assembly mindset. S3DC uses a novel wafer
fabric creation with direct 3D design and connectivity in the vertical
dimension. It builds on a uniform vertical nanowire template that is processed
as a single wafer; it incorporates specifically architected structures for
realizing devices, circuits, and heat management directly in 3D. Novel 3D
interconnect concepts, including within the silicon layers, enable
significantly improved routing flexibility in all three dimensions and a
high-density 3D design paradigm overall. Intrinsic components for fabric-level
3D heat management are introduced. Extensive bottom-up simulations and
experiments have been presented to validate the key fabric-enabling concepts.
Evaluation results indicate up to 40x density and 10x performance-per-watt
benefits against conventional 16-nm CMOS for the circuits studied; benefits are
also at least an order of magnitude beyond what was shown to be possible with
other 3D directions.
|
[
{
"version": "v1",
"created": "Fri, 29 Apr 2016 18:08:47 GMT"
}
] | 2016-05-02T00:00:00 |
[
[
"Li",
"Mingyu",
""
],
[
"Shi",
"Jiajun",
""
],
[
"Rahman",
"Mostafizur",
""
],
[
"Khasanvis",
"Santosh",
""
],
[
"Bhat",
"Sachin",
""
],
[
"Moritz",
"Csaba Andras",
""
]
] |
new_dataset
| 0.999804 |
1511.06783
|
Katsunori Ohnishi
|
Katsunori Ohnishi, Atsushi Kanehira, Asako Kanezaki, Tatsuya Harada
|
Recognizing Activities of Daily Living with a Wrist-mounted Camera
|
CVPR2016 spotlight presentation
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel dataset and a novel algorithm for recognizing activities
of daily living (ADL) from a first-person wearable camera. Handled objects are
crucially important for egocentric ADL recognition. For specific examination of
objects related to users' actions separately from other objects in an
environment, many previous works have addressed the detection of handled
objects in images captured from head-mounted and chest-mounted cameras.
Nevertheless, detecting handled objects is not always easy because they tend to
appear small in images. They can be occluded by a user's body. As described
herein, we mount a camera on a user's wrist. A wrist-mounted camera can capture
handled objects at a large scale, and thus it enables us to skip object
detection process. To compare a wrist-mounted camera and a head-mounted camera,
we also develop a novel and publicly available dataset that includes videos and
annotations of daily activities captured simultaneously by both cameras.
Additionally, we propose a discriminative video representation that retains
spatial and temporal information after encoding frame descriptors extracted by
Convolutional Neural Networks (CNN).
|
[
{
"version": "v1",
"created": "Fri, 20 Nov 2015 22:02:09 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Apr 2016 04:39:03 GMT"
}
] | 2016-04-29T00:00:00 |
[
[
"Ohnishi",
"Katsunori",
""
],
[
"Kanehira",
"Atsushi",
""
],
[
"Kanezaki",
"Asako",
""
],
[
"Harada",
"Tatsuya",
""
]
] |
new_dataset
| 0.999416 |
1604.05557
|
Pascal Faudemay
|
Pascal Faudemay
|
AGI and Reflexivity
|
submitted to ECAI-2016
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define a property of intelligent systems, which we call Reflexivity. In
human beings, it is one aspect of consciousness, and an element of
deliberation. We propose a conjecture, that this property is conditioned by a
topological property of the processes which implement this reflexivity. These
processes may be symbolic, or non symbolic e.g. connexionnist. An architecture
which implements reflexivity may be based on the interaction of one or several
modules of deep learning, which may be specialized or not, and interconnected
in a relevant way. A necessary condition of reflexivity is the existence of
recurrence in its processes, we will examine in which cases this condition may
be sufficient. We will then examine how this topology and this property make
possible the expression of a second property, the deliberation. In a final
paragraph, we propose an evaluation of intelligent systems, based on the
fulfillment of all or some of these properties.
|
[
{
"version": "v1",
"created": "Fri, 15 Apr 2016 19:39:54 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Apr 2016 18:48:02 GMT"
},
{
"version": "v3",
"created": "Thu, 28 Apr 2016 18:49:12 GMT"
}
] | 2016-04-29T00:00:00 |
[
[
"Faudemay",
"Pascal",
""
]
] |
new_dataset
| 0.969899 |
1604.08235
|
Nguyen Phong Hoang
|
Nguyen Phong Hoang, Yasuhito Asano, Masatoshi Yoshikawa
|
Your Neighbors Are My Spies: Location and other Privacy Concerns in
GLBT-focused Location-based Dating Applications
|
This work is a follow-up to arXiv:1604.07850, and is being submitted
to the ICACT Transactions on Advanced Communications Technology, thus not a
final version of this study
| null |
10.13140/RG.2.1.3584.8081
| null |
cs.CY cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Trilateration is one of the well-known threat models to the user's location
privacy in location-based apps, especially those contain highly sensitive
information such as dating apps. The threat model mainly bases on the publicly
shown distance from a targeted victim to the adversary to pinpoint the victim's
location. As a countermeasure, most of location-based apps have already
implemented the 'hide distance' function, or added noise to the publicly shown
distance in order to protect their user's location privacy. The effectiveness
of such approaches however is still questionable.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2016 04:31:16 GMT"
}
] | 2016-04-29T00:00:00 |
[
[
"Hoang",
"Nguyen Phong",
""
],
[
"Asano",
"Yasuhito",
""
],
[
"Yoshikawa",
"Masatoshi",
""
]
] |
new_dataset
| 0.998467 |
1604.08245
|
Muhammad Fahad Khan
|
Saira Beg, M. Fahad Khan, Faisal Baig
|
Text writing in the air
|
19 pages, 19 figures,2 tables. see
http://www.tandfonline.com/doi/abs/10.1080/15980316.2013.860928?journalCode=tjid20
| null |
10.1080/15980316.2013.860928
| null |
cs.MM
|
http://creativecommons.org/licenses/by/4.0/
|
This paper presents a real time video based pointing method which allows
sketching and writing of English text over air in front of mobile camera.
Proposed method have two main tasks: first it track the colored finger tip in
the video frames and then apply English OCR over plotted images in order to
recognize the written characters. Moreover, proposed method provides a natural
human-system interaction in such way that it do not require keypad, stylus, pen
or glove etc for character input. For the experiments, we have developed an
application using OpenCv with JAVA language. We tested the proposed method on
Samsung Galaxy3 android mobile. Results show that proposed algorithm gains the
average accuracy of 92.083% when tested for different shaped alphabets. Here,
more than 3000 different Magnetic 3D shaped characters were used [Ref:
http://learnrnd.com/news.php?id=Magnetic_3D_Bio_Printing]. Our proposed system
is the software based approach and relevantly very simple, fast and easy. It
does not require sensors or any hardware rather than camera and red tape.
Moreover, proposed methodology can be applicable for all disconnected languages
but having one issue that it is color sensitive in such a way that existence of
any red color in the background before starting the character writing can lead
to false results.
|
[
{
"version": "v1",
"created": "Wed, 27 Apr 2016 21:11:22 GMT"
}
] | 2016-04-29T00:00:00 |
[
[
"Beg",
"Saira",
""
],
[
"Khan",
"M. Fahad",
""
],
[
"Baig",
"Faisal",
""
]
] |
new_dataset
| 0.995722 |
1603.07054
|
Dangwei Li
|
Dangwei Li, Zhang Zhang, Xiaotang Chen, Haibin Ling, Kaiqi Huang
|
A Richly Annotated Dataset for Pedestrian Attribute Recognition
|
16 pages, 8 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we aim to improve the dataset foundation for pedestrian
attribute recognition in real surveillance scenarios. Recognition of human
attributes, such as gender, and clothes types, has great prospects in real
applications. However, the development of suitable benchmark datasets for
attribute recognition remains lagged behind. Existing human attribute datasets
are collected from various sources or an integration of pedestrian
re-identification datasets. Such heterogeneous collection poses a big challenge
on developing high quality fine-grained attribute recognition algorithms.
Furthermore, human attribute recognition are generally severely affected by
environmental or contextual factors, such as viewpoints, occlusions and body
parts, while existing attribute datasets barely care about them. To tackle
these problems, we build a Richly Annotated Pedestrian (RAP) dataset from real
multi-camera surveillance scenarios with long term collection, where data
samples are annotated with not only fine-grained human attributes but also
environmental and contextual factors. RAP has in total 41,585 pedestrian
samples, each of which is annotated with 72 attributes as well as viewpoints,
occlusions, body parts information. To our knowledge, the RAP dataset is the
largest pedestrian attribute dataset, which is expected to greatly promote the
study of large-scale attribute recognition systems. Furthermore, we empirically
analyze the effects of different environmental and contextual factors on
pedestrian attribute recognition. Experimental results demonstrate that
viewpoints, occlusions and body parts information could assist attribute
recognition a lot in real applications.
|
[
{
"version": "v1",
"created": "Wed, 23 Mar 2016 02:41:59 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Mar 2016 02:54:02 GMT"
},
{
"version": "v3",
"created": "Wed, 27 Apr 2016 06:42:25 GMT"
}
] | 2016-04-28T00:00:00 |
[
[
"Li",
"Dangwei",
""
],
[
"Zhang",
"Zhang",
""
],
[
"Chen",
"Xiaotang",
""
],
[
"Ling",
"Haibin",
""
],
[
"Huang",
"Kaiqi",
""
]
] |
new_dataset
| 0.999415 |
1604.07850
|
Nguyen Phong Hoang
|
Nguyen Phong Hoang, Yasuhito Asano, Masatoshi Yoshikawa
|
Your Neighbors Are My Spies: Location and other Privacy Concerns in
Dating Apps
|
The 18th IEEE International Conference on Advanced Communication
Technology (ICACT 2016)
| null |
10.1109/ICACT.2016.7423532
| null |
cs.CY cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Trilateration has recently become one of the well-known threat models to the
user's location privacy in location-based applications (aka: location-based
services or LBS), especially those containing highly sensitive information such
as dating applications. The threat model mainly depends on the distance shown
from the targeted victim to the adversary to pinpoint the victim's position. As
a countermeasure, most of location-based applications have already implemented
the "hide distance" function to protect their user's location privacy. The
effectiveness of such approaches however is still questionable. Therefore, in
this paper, we first investigate how popular location-based dating applications
are currently protecting their user's privacy by testing the two most popular
GLBT-focused applications: Jack'd and Grindr.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2016 05:00:49 GMT"
}
] | 2016-04-28T00:00:00 |
[
[
"Hoang",
"Nguyen Phong",
""
],
[
"Asano",
"Yasuhito",
""
],
[
"Yoshikawa",
"Masatoshi",
""
]
] |
new_dataset
| 0.994594 |
1604.07863
|
Joe Gildea
|
Steven T. Dougherty, Joe Gildea, Rhian Taylor and Alexander Tylyshchak
|
Constructions of Self-Dual and Formally Self-Dual Codes from Group Rings
| null | null | null | null |
cs.IT math.IT math.RA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give constructions of self-dual and formally self-dual codes from group
rings where the ring is a finite commutative Frobenius ring. We improve the
existing construction given in \cite{Hurley1} by showing that one of the
conditions given in the theorem is unnecessary and moreover it restricts the
number of self-dual codes obtained by the construction. We show that several of
the standard constructions of self-dual codes are found within our general
framework. We prove that our constructed codes correspond to ideals in the
group ring $RG$ and as such must have an automorphism group that contains $G$
as a subgroup. We also prove that a common construction technique for producing
self-dual codes cannot produce the putative $[72,36,16]$ Type~II code.
Additionally, we show precisely which groups can be used to construct the
extremal Type II codes over length 24 and 48.
|
[
{
"version": "v1",
"created": "Tue, 26 Apr 2016 21:35:24 GMT"
}
] | 2016-04-28T00:00:00 |
[
[
"Dougherty",
"Steven T.",
""
],
[
"Gildea",
"Joe",
""
],
[
"Taylor",
"Rhian",
""
],
[
"Tylyshchak",
"Alexander",
""
]
] |
new_dataset
| 0.998314 |
1604.08058
|
Martin Suda
|
Olaf Beyersdorff, Leroy Chew, Renate Schmidt, Martin Suda
|
Lifting QBF Resolution Calculi to DQBF
|
SAT 2016
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We examine the existing Resolution systems for quantified Boolean formulas
(QBF) and answer the question which of these calculi can be lifted to the more
powerful Dependency QBFs (DQBF). An interesting picture emerges: While for QBF
we have the strict chain of proof systems Q-Resolution < IR-calc < IRM-calc,
the situation is quite different in DQBF. Q-Resolution and likewise universal
Resolution are too weak: they are not complete. IR-calc has the right strength:
it is sound and complete. IRM-calc is too strong: it is not sound any more, and
the same applies to long-distance Resolution. Conceptually, we use the relation
of DQBF to EPR and explain our new DQBF calculus based on IR-calc as a
subsystem of FO-Resolution.
|
[
{
"version": "v1",
"created": "Wed, 27 Apr 2016 13:27:53 GMT"
}
] | 2016-04-28T00:00:00 |
[
[
"Beyersdorff",
"Olaf",
""
],
[
"Chew",
"Leroy",
""
],
[
"Schmidt",
"Renate",
""
],
[
"Suda",
"Martin",
""
]
] |
new_dataset
| 0.997479 |
1604.08161
|
Michel Raynal
|
Achour Mosteafoui, Matoula Petrolia, Michel Raynal, and Claude Jard
|
Atomic Read/Write Memory in Signature-free Byzantine Asynchronous
Message-passing Systems
|
12 pages
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article presents a signature-free distributed algorithm which builds an
atomic read/write shared memory on top of an $n$-process asynchronous
message-passing system in which up to $t<n/3$ processes may commit Byzantine
failures. From a conceptual point of view, this algorithm is designed to be as
close as possible to the algorithm proposed by Attiya, Bar-Noy and Dolev (JACM
1995), which builds an atomic register in an $n$-process asynchronous
message-passing system where up to $t<n/2$ processes may crash. The proposed
algorithm is particularly simple. It does not use cryptography to cope with
Byzantine processes, and is optimal from a $t$-resilience point of view
($t<n/3$). A read operation requires $O(n)$ messages, and a write operation
requires $O(n^2)$ messages.
|
[
{
"version": "v1",
"created": "Mon, 7 Dec 2015 08:53:28 GMT"
}
] | 2016-04-28T00:00:00 |
[
[
"Mosteafoui",
"Achour",
""
],
[
"Petrolia",
"Matoula",
""
],
[
"Raynal",
"Michel",
""
],
[
"Jard",
"Claude",
""
]
] |
new_dataset
| 0.999443 |
1604.08164
|
Edgar Simo-Serra
|
Edgar Simo-Serra
|
Understanding Human-Centric Images: From Geometry to Fashion
|
PhD Thesis, May 2015. BarcelonaTech. 169 pages
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Understanding humans from photographs has always been a fundamental goal of
computer vision. In this thesis we have developed a hierarchy of tools that
cover a wide range of topics with the objective of understanding humans from
monocular RGB image: from low level feature point descriptors to high level
fashion-aware conditional random fields models. In order to build these high
level models it is paramount to have a battery of robust and reliable low and
mid level cues. Along these lines, we have proposed two low-level keypoint
descriptors: one based on the theory of the heat diffusion on images, and the
other that uses a convolutional neural network to learn discriminative image
patch representations. We also introduce distinct low-level generative models
for representing human pose: in particular we present a discrete model based on
a directed acyclic graph and a continuous model that consists of poses
clustered on a Riemannian manifold. As mid level cues we propose two 3D human
pose estimation algorithms: one that estimates the 3D pose given a noisy 2D
estimation, and an approach that simultaneously estimates both the 2D and 3D
pose. Finally, we formulate higher level models built upon low and mid level
cues for understanding humans from single images. Concretely, we focus on two
different tasks in the context of fashion: semantic segmentation of clothing,
and predicting the fashionability from images with metadata to ultimately
provide fashion advice to the user. For all presented approaches we present
extensive results and comparisons against the state-of-the-art and show
significant improvements on the entire variety of tasks we tackle.
|
[
{
"version": "v1",
"created": "Mon, 14 Dec 2015 03:15:14 GMT"
}
] | 2016-04-28T00:00:00 |
[
[
"Simo-Serra",
"Edgar",
""
]
] |
new_dataset
| 0.99666 |
1402.0599
|
Duo Han
|
Duo Han, Yilin Mo, Junfeng Wu, Sean Weerakkody, Bruno Sinopoli, Ling
Shi
|
Stochastic Event-triggered Sensor Schedule for Remote State Estimation
| null |
IEEE Trans. Autom. Control, pp. 2661 - 2675, vol 60, issue 10,
2015
|
10.1109/TAC.2015.2406975
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose an open-loop and a closed-loop stochastic event-triggered sensor
schedule for remote state estimation. Both schedules overcome the essential
difficulties of existing schedules in recent literature works where, through
introducing a deterministic event-triggering mechanism, the Gaussian property
of the innovation process is destroyed which produces a challenging nonlinear
filtering problem that cannot be solved unless approximation techniques are
adopted. The proposed stochastic event-triggered sensor schedules eliminate
such approximations. Under these two schedules, the MMSE estimator and its
estimation error covariance matrix at the remote estimator are given in a
closed-form. Simulation studies demonstrate that the proposed schedules have
better performance than periodic ones with the same sensor-to-estimator
communication rate.
|
[
{
"version": "v1",
"created": "Tue, 4 Feb 2014 02:54:23 GMT"
}
] | 2016-04-27T00:00:00 |
[
[
"Han",
"Duo",
""
],
[
"Mo",
"Yilin",
""
],
[
"Wu",
"Junfeng",
""
],
[
"Weerakkody",
"Sean",
""
],
[
"Sinopoli",
"Bruno",
""
],
[
"Shi",
"Ling",
""
]
] |
new_dataset
| 0.963904 |
1404.5813
|
Dmitry N. Kozlov
|
Dmitry N. Kozlov
|
Topology of the immediate snapshot complexes
|
final version as it appears in Topology and it Applications, Article
number 5275. note: this paper is a full version of the second half of the
previous research announcement, which was posted as arXiv:1402.4707
|
Topology Appl. 178 (2014), 160-184
| null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The immediate snapshot complexes were introduced as combinatorial models for
the protocol complexes in the context of theoretical distributed computing. In
the previous work we have developed a formal language of witness structures in
order to define and to analyze these complexes.
In this paper, we study topology of immediate snapshot complexes. It was
known that these complexes are always pure and that they are pseudomanifolds.
Here we prove two further independent topological properties. First, we show
that immediate snapshot complexes are collapsible. Second, we show that these
complexes are homeomorphic to closed balls. Specifically, given any immediate
snapshot complex $P(\tr)$, we show that there exists a homeomorphism
$\varphi:\da^{|\supp\tr|-1}\ra P(\tr)$, such that $\varphi(\sigma)$ is a
subcomplex of $P(\tr)$, whenever $\sigma$ is a simplex in the simplicial
complex $\da^{|\supp\tr|-1}$.
|
[
{
"version": "v1",
"created": "Wed, 23 Apr 2014 13:05:14 GMT"
},
{
"version": "v2",
"created": "Mon, 12 May 2014 12:52:28 GMT"
},
{
"version": "v3",
"created": "Mon, 24 Nov 2014 10:01:10 GMT"
},
{
"version": "v4",
"created": "Tue, 26 Apr 2016 11:53:44 GMT"
}
] | 2016-04-27T00:00:00 |
[
[
"Kozlov",
"Dmitry N.",
""
]
] |
new_dataset
| 0.987452 |
1503.01817
|
Bart Thomee
|
Bart Thomee and David A. Shamma and Gerald Friedland and Benjamin
Elizalde and Karl Ni and Douglas Poland and Damian Borth and Li-Jia Li
|
YFCC100M: The New Data in Multimedia Research
| null |
Communications of the ACM, 59(2), pp. 64-73, 2016
|
10.1145/2812802
| null |
cs.MM cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the Yahoo Flickr Creative Commons 100 Million Dataset (YFCC100M),
the largest public multimedia collection that has ever been released. The
dataset contains a total of 100 million media objects, of which approximately
99.2 million are photos and 0.8 million are videos, all of which carry a
Creative Commons license. Each media object in the dataset is represented by
several pieces of metadata, e.g. Flickr identifier, owner name, camera, title,
tags, geo, media source. The collection provides a comprehensive snapshot of
how photos and videos were taken, described, and shared over the years, from
the inception of Flickr in 2004 until early 2014. In this article we explain
the rationale behind its creation, as well as the implications the dataset has
for science, research, engineering, and development. We further present several
new challenges in multimedia research that can now be expanded upon with our
dataset.
|
[
{
"version": "v1",
"created": "Thu, 5 Mar 2015 23:43:42 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Apr 2016 20:10:14 GMT"
}
] | 2016-04-27T00:00:00 |
[
[
"Thomee",
"Bart",
""
],
[
"Shamma",
"David A.",
""
],
[
"Friedland",
"Gerald",
""
],
[
"Elizalde",
"Benjamin",
""
],
[
"Ni",
"Karl",
""
],
[
"Poland",
"Douglas",
""
],
[
"Borth",
"Damian",
""
],
[
"Li",
"Li-Jia",
""
]
] |
new_dataset
| 0.999871 |
1504.04263
|
David Benton Dr
|
David M. Benton
|
Concurrent codes: A holographic-type encoding robust against noise and
loss
| null | null |
10.1371/journal.pone.0150280
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Concurrent coding is an encoding scheme with "holographic" type properties
that are shown here to be robust against a significant amount of noise and
signal loss. This single encoding scheme is able to correct for random errors
and burst errors simultaneously, but does not rely on cyclic codes. A simple
and practical scheme has been tested that displays perfect decoding when the
signal to noise ratio is of order -18dB. The same scheme also displays perfect
reconstruction when a contiguous block of 40% of the transmission is missing.
In addition this scheme is 50% more efficient in terms of transmitted power
requirements than equivalent cyclic codes. A simple model is presented that
describes the process of decoding and can determine the computational load that
would be expected, as well as describing the critical levels of noise and
missing data at which false messages begin to be generated.
|
[
{
"version": "v1",
"created": "Thu, 16 Apr 2015 15:04:27 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Sep 2015 15:42:22 GMT"
}
] | 2016-04-27T00:00:00 |
[
[
"Benton",
"David M.",
""
]
] |
new_dataset
| 0.99967 |
1505.07909
|
Bin Gao
|
Huazheng Wang, Fei Tian, Bin Gao, Jiang Bian, Tie-Yan Liu
|
Solving Verbal Comprehension Questions in IQ Test by Knowledge-Powered
Word Embedding
| null | null | null | null |
cs.CL cs.IR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Intelligence Quotient (IQ) Test is a set of standardized questions designed
to evaluate human intelligence. Verbal comprehension questions appear very
frequently in IQ tests, which measure human's verbal ability including the
understanding of the words with multiple senses, the synonyms and antonyms, and
the analogies among words. In this work, we explore whether such tests can be
solved automatically by artificial intelligence technologies, especially the
deep learning technologies that are recently developed and successfully applied
in a number of fields. However, we found that the task was quite challenging,
and simply applying existing technologies (e.g., word embedding) could not
achieve a good performance, mainly due to the multiple senses of words and the
complex relations among words. To tackle these challenges, we propose a novel
framework consisting of three components. First, we build a classifier to
recognize the specific type of a verbal question (e.g., analogy,
classification, synonym, or antonym). Second, we obtain distributed
representations of words and relations by leveraging a novel word embedding
method that considers the multi-sense nature of words and the relational
knowledge among words (or their senses) contained in dictionaries. Third, for
each type of questions, we propose a specific solver based on the obtained
distributed word representations and relation representations. Experimental
results have shown that the proposed framework can not only outperform existing
methods for solving verbal comprehension questions but also exceed the average
performance of the Amazon Mechanical Turk workers involved in the study. The
results indicate that with appropriate uses of the deep learning technologies
we might be a further step closer to the human intelligence.
|
[
{
"version": "v1",
"created": "Fri, 29 May 2015 02:46:44 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jun 2015 13:29:41 GMT"
},
{
"version": "v3",
"created": "Mon, 6 Jul 2015 08:42:22 GMT"
},
{
"version": "v4",
"created": "Tue, 26 Apr 2016 11:37:32 GMT"
}
] | 2016-04-27T00:00:00 |
[
[
"Wang",
"Huazheng",
""
],
[
"Tian",
"Fei",
""
],
[
"Gao",
"Bin",
""
],
[
"Bian",
"Jiang",
""
],
[
"Liu",
"Tie-Yan",
""
]
] |
new_dataset
| 0.985393 |
1603.07236
|
Dan Stowell
|
Dan Stowell, Veronica Morfi, Lisa F. Gill
|
Individual identity in songbirds: signal representations and metric
learning for locating the information in complex corvid calls
| null | null | null | null |
cs.SD
|
http://creativecommons.org/licenses/by/4.0/
|
Bird calls range from simple tones to rich dynamic multi-harmonic structures.
The more complex calls are very poorly understood at present, such as those of
the scientifically important corvid family (jackdaws, crows, ravens, etc.).
Individual birds can recognise familiar individuals from calls, but where in
the signal is this identity encoded? We studied the question by applying a
combination of feature representations to a dataset of jackdaw calls, including
linear predictive coding (LPC) and adaptive discrete Fourier transform (aDFT).
We demonstrate through a classification paradigm that we can strongly
outperform a standard spectrogram representation for identifying individuals,
and we apply metric learning to determine which time-frequency regions
contribute most strongly to robust individual identification. Computational
methods can help to direct our search for understanding of these complex
biological signals.
|
[
{
"version": "v1",
"created": "Wed, 23 Mar 2016 15:29:39 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Apr 2016 16:32:24 GMT"
}
] | 2016-04-27T00:00:00 |
[
[
"Stowell",
"Dan",
""
],
[
"Morfi",
"Veronica",
""
],
[
"Gill",
"Lisa F.",
""
]
] |
new_dataset
| 0.998998 |
1604.07103
|
Yu Wang
|
Yu Wang, Yuncheng Li, Quanzeng You, Xiyang Zhang, Richard Niemi, Jiebo
Luo
|
Voting with Feet: Who are Leaving Hillary Clinton and Donald Trump?
|
4 pages, 8 figures, under review
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
From a crowded field with 17 candidates, Hillary Clinton and Donald Trump
have emerged as the two front-runners in the 2016 U.S. presidential campaign.
The two candidates each boast more than 5 million followers on Twitter, and at
the same time both have witnessed hundreds of thousands of people leave their
camps. In this paper we attempt to characterize individuals who have left
Hillary Clinton and Donald Trump between September 2015 and March 2016.
Our study focuses on three dimensions of social demographics: social capital,
gender, and age. Within each camp, we compare the characteristics of the
current followers with former followers, i.e., individuals who have left since
September 2015. We use the number of followers to measure social capital, and
profile images to infer gender and age. For classifying gender, we train a
convolutional neural network (CNN). For age, we use the Face++ API.
Our study shows that for both candidates followers with more social capital
are more likely to leave (or switch camps). For both candidates females make up
a larger presence among unfollowers than among current followers. Somewhat
surprisingly, the effect is particularly pronounced for Clinton. Lastly,
middle-aged individuals are more likely to leave Trump, and the young are more
likely to leave Hillary Clinton.
|
[
{
"version": "v1",
"created": "Mon, 25 Apr 2016 01:06:22 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Apr 2016 03:58:22 GMT"
}
] | 2016-04-27T00:00:00 |
[
[
"Wang",
"Yu",
""
],
[
"Li",
"Yuncheng",
""
],
[
"You",
"Quanzeng",
""
],
[
"Zhang",
"Xiyang",
""
],
[
"Niemi",
"Richard",
""
],
[
"Luo",
"Jiebo",
""
]
] |
new_dataset
| 0.994428 |
1604.07660
|
Haluk O. Bingol
|
Dogukan Erenel and Haluk O. Bingol
|
An Accelerometer Based Calculator for Visually Impaired People Using
Mobile Devices
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent trend of touch-screen devices produces an accessibility barrier for
visually impaired people. On the other hand, these devices come with sensors
such as accelerometer. This calls for new approaches to human computer
interface (HCI). In this study, our aim is to find an alternative approach to
classify 20 different hand gestures captured by iPhone 3GS's built-in
accelerometer and make high accuracy on user-independent classifications using
Dynamic Time Warping (DTW) with dynamic warping window sizes. 20 gestures with
1,100 gesture data are collected from 15 normal-visioned people. This data set
is used for training. Experiment-1 based on this data set produced an accuracy
rate of 96.7~\%. In order for visually impaired people to use the system, a
gesture recognition based "talking" calculator is implemented. In Experiment-2,
4 visually impaired end-users used the calculator and obtained 95.5~\% accuracy
rate among 17 gestures with 720 gesture data totally. Contributions of the
techniques to the end result is also investigated. Dynamic warping window size
is found to be the most effective one. The data and the code is available.
|
[
{
"version": "v1",
"created": "Tue, 26 Apr 2016 12:55:28 GMT"
}
] | 2016-04-27T00:00:00 |
[
[
"Erenel",
"Dogukan",
""
],
[
"Bingol",
"Haluk O.",
""
]
] |
new_dataset
| 0.981955 |
1604.07803
|
Orestis Liolis
|
Vicky S. Kalogeiton, Dim P. Papadopoulos, Orestis Liolis, Vassilios A.
Mardiris, Georgios Ch. Sirakoulis and Ioannis G. Karafyllidis
|
Programmable Crossbar Quantum-dot Cellular Automata Circuits
| null | null | null | null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Quantum-dot fabrication and characterization is a well-established
technology, which is used in photonics, quantum optics and nanoelectronics.
Four quantum-dots placed at the corners of a square form a unit cell, which can
hold a bit of information and serve as a basis for Quantum-dot Cellular
Automata (QCA) nanoelectronic circuits. Although several basic QCA circuits
have been designed, fabricated and tested, proving that quantum-dots can form
functional, fast and low-power nanoelectornic circuits, QCA nanoelectronics
still remain at its infancy. One of the reasons for this is the lack of design
automation tools, which will facilitate the systematic design of large QCA
circuits that contemporary applications demand. Here we present novel,
programmable QCA circuits, which are based on crossbar architecture. These
circuits can be programmed to implement any Boolean function in analogy to CMOS
FPGAs and open the road that will lead to full design automation of QCA
nanoelectronic circuits. Using this architecture we designed and simulated QCA
circuits that proved to be area efficient, stable and reliable.
|
[
{
"version": "v1",
"created": "Tue, 26 Apr 2016 19:17:37 GMT"
}
] | 2016-04-27T00:00:00 |
[
[
"Kalogeiton",
"Vicky S.",
""
],
[
"Papadopoulos",
"Dim P.",
""
],
[
"Liolis",
"Orestis",
""
],
[
"Mardiris",
"Vassilios A.",
""
],
[
"Sirakoulis",
"Georgios Ch.",
""
],
[
"Karafyllidis",
"Ioannis G.",
""
]
] |
new_dataset
| 0.999713 |
1505.01410
|
Philipp Kindermann
|
Philipp Kindermann and Andr\'e Schulz and Joachim Spoerhase and
Alexander Wolff
|
On Monotone Drawings of Trees
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A crossing-free straight-line drawing of a graph is monotone if there is a
monotone path between any pair of vertices with respect to some direction. We
show how to construct a monotone drawing of a tree with $n$ vertices on an
$O(n^{1.5}) \times O(n^{1.5})$ grid whose angles are close to the best possible
angular resolution. Our drawings are convex, that is, if every edge to a leaf
is substituted by a ray, the (unbounded) faces form convex regions. It is known
that convex drawings are monotone and, in the case of trees, also
crossing-free.
A monotone drawing is strongly monotone if, for every pair of vertices, the
direction that witnesses the monotonicity comes from the vector that connects
the two vertices. We show that every tree admits a strongly monotone drawing.
For biconnected outerplanar graphs, this is easy to see. On the other hand, we
present a simply-connected graph that does not have a strongly monotone drawing
in any embedding.
|
[
{
"version": "v1",
"created": "Wed, 6 May 2015 15:54:32 GMT"
},
{
"version": "v2",
"created": "Sun, 24 Apr 2016 12:54:01 GMT"
}
] | 2016-04-26T00:00:00 |
[
[
"Kindermann",
"Philipp",
""
],
[
"Schulz",
"André",
""
],
[
"Spoerhase",
"Joachim",
""
],
[
"Wolff",
"Alexander",
""
]
] |
new_dataset
| 0.998335 |
1602.06832
|
Mehmet Bask{\i}n
|
Mehmet Bask{\i}n and Kemal Leblebicio\u{g}lu
|
Robust stabilization loop design for gimbaled electro-optical imaging
system
|
13 pages, 9 figures
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For electro-optical imaging systems, line-of-sight stabilization against
different disturbances created by mobile platforms is crucial property. The
development of high resolution sensors and the demand in increased operating
distances have recently increased the expectations from stabilization loops.
For that reason, higher gains and larger bandwidths become necessary. As the
stabilization loop satisfies these requirements for good disturbance
attenuation, it must also satisfy sufficient loop stability. In gimbaled
imaging systems, the main difficulties in satisfying sufficient loop stability
are structural resonances and model uncertainties. Therefore, satisfying high
stabilization performance in the presence of model uncertainties or modeling
errors requires utilization of robust control methods. In this paper, robust
LQG/LTR controller design is described for a two-axis gimbal. First, the
classical LQG/LTR method is modified such that it becomes very powerful loop
shaping method. Next, using this method, controller is synthesized. Robust
stability and robust performance of stabilization loop is investigated by using
singular value tests. The report is concluded with the experimental validation
of the designed robust controller.
|
[
{
"version": "v1",
"created": "Mon, 22 Feb 2016 15:49:18 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Mar 2016 13:24:13 GMT"
},
{
"version": "v3",
"created": "Mon, 25 Apr 2016 17:44:16 GMT"
}
] | 2016-04-26T00:00:00 |
[
[
"Baskın",
"Mehmet",
""
],
[
"Leblebicioğlu",
"Kemal",
""
]
] |
new_dataset
| 0.982809 |
1604.06996
|
Thomas Westerb\"ack
|
Thomas Westerb\"ack
|
Parity check systems of nonlinear codes over finite commutative
Frobenius rings
|
Submitted for publication
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The concept of parity check matrices of linear binary codes has been extended
by Heden [9] to parity check systems of nonlinear binary codes. In the present
paper we extend this concept to parity check systems of nonlinear codes over
finite commutative Frobenius rings. Using parity check systems, results on how
to get some fundamental properties of the codes are given. Moreover, parity
check systems and its connection to characters is investigated and a
MacWilliams type theorem on the distance distribution is given.
|
[
{
"version": "v1",
"created": "Sun, 24 Apr 2016 08:45:08 GMT"
}
] | 2016-04-26T00:00:00 |
[
[
"Westerbäck",
"Thomas",
""
]
] |
new_dataset
| 0.98231 |
1604.07048
|
David Karpuk
|
David A. Karpuk, Amaro Barreal, Oliver W. Gnilke, and Camilla Hollanti
|
Nested Lattice Codes for Vector Perturbation Systems
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vector perturbation is an encoding method for broadcast channels in which the
transmitter solves a shortest vector problem in a lattice to create a
perturbation vector, which is then added to the data before transmission. In
this work, we introduce nested lattice codes into vector perturbation systems,
resulting in a strategy which we deem matrix perturbation. We propose design
criteria for the nested lattice codes, and show empirically that lattices
satisfying these design criteria can improve the performance of vector
perturbation systems. The resulting design criteria are the same as those
recently proposed for the Compute-and-Forward protocol.
|
[
{
"version": "v1",
"created": "Sun, 24 Apr 2016 16:27:28 GMT"
}
] | 2016-04-26T00:00:00 |
[
[
"Karpuk",
"David A.",
""
],
[
"Barreal",
"Amaro",
""
],
[
"Gnilke",
"Oliver W.",
""
],
[
"Hollanti",
"Camilla",
""
]
] |
new_dataset
| 0.998799 |
1604.07102
|
Wei Wang
|
Si Liu, Xinyu Ou, Ruihe Qian, Wei Wang, Xiaochun Cao
|
Makeup like a superstar: Deep Localized Makeup Transfer Network
|
7pages, 11 figures, to appear in IJCAI 2016
| null | null | null |
cs.CV cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a novel Deep Localized Makeup Transfer Network to
automatically recommend the most suitable makeup for a female and synthesis the
makeup on her face. Given a before-makeup face, her most suitable makeup is
determined automatically. Then, both the beforemakeup and the reference faces
are fed into the proposed Deep Transfer Network to generate the after-makeup
face. Our end-to-end makeup transfer network have several nice properties
including: (1) with complete functions: including foundation, lip gloss, and
eye shadow transfer; (2) cosmetic specific: different cosmetics are transferred
in different manners; (3) localized: different cosmetics are applied on
different facial regions; (4) producing naturally looking results without
obvious artifacts; (5) controllable makeup lightness: various results from
light makeup to heavy makeup can be generated. Qualitative and quantitative
experiments show that our network performs much better than the methods of [Guo
and Sim, 2009] and two variants of NerualStyle [Gatys et al., 2015a].
|
[
{
"version": "v1",
"created": "Mon, 25 Apr 2016 01:01:51 GMT"
}
] | 2016-04-26T00:00:00 |
[
[
"Liu",
"Si",
""
],
[
"Ou",
"Xinyu",
""
],
[
"Qian",
"Ruihe",
""
],
[
"Wang",
"Wei",
""
],
[
"Cao",
"Xiaochun",
""
]
] |
new_dataset
| 0.965786 |
1604.07339
|
Ivan Bajic
|
Sayed Hossein Khatoonabadi, Ivan V. Bajic, Yufeng Shan
|
Compressed-domain visual saliency models: A comparative study
| null | null | null | null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Computational modeling of visual saliency has become an important research
problem in recent years, with applications in video quality estimation, video
compression, object tracking, retargeting, summarization, and so on. While most
visual saliency models for dynamic scenes operate on raw video, several models
have been developed for use with compressed-domain information such as motion
vectors and transform coefficients. This paper presents a comparative study of
eleven such models as well as two high-performing pixel-domain saliency models
on two eye-tracking datasets using several comparison metrics. The results
indicate that highly accurate saliency estimation is possible based only on a
partially decoded video bitstream. The strategies that have shown success in
compressed-domain saliency modeling are highlighted, and certain challenges are
identified as potential avenues for further improvement.
|
[
{
"version": "v1",
"created": "Mon, 25 Apr 2016 17:39:25 GMT"
}
] | 2016-04-26T00:00:00 |
[
[
"Khatoonabadi",
"Sayed Hossein",
""
],
[
"Bajic",
"Ivan V.",
""
],
[
"Shan",
"Yufeng",
""
]
] |
new_dataset
| 0.952116 |
1309.5314
|
Armin Wei{\ss}
|
Volker Diekert, Alexei Miasnikov, Armin Wei{\ss}
|
Conjugacy in Baumslag's group, generic case complexity, and division in
power circuits
|
Section 5 added: We show that an HNN extension G = < H, b | bab^-1 =
{\phi}(a), a \in A > has a non-amenable Schreier graph with respect to the
base group H if and only if A \neq H \neq B
| null | null | null |
cs.DM cs.CC math.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The conjugacy problem belongs to algorithmic group theory. It is the
following question: given two words x, y over generators of a fixed group G,
decide whether x and y are conjugated, i.e., whether there exists some z such
that zxz^{-1} = y in G. The conjugacy problem is more difficult than the word
problem, in general. We investigate the complexity of the conjugacy problem for
two prominent groups: the Baumslag-Solitar group BS(1,2) and the
Baumslag(-Gersten) group G(1,2). The conjugacy problem in BS(1,2) is
TC^0-complete. To the best of our knowledge BS(1,2) is the first natural
infinite non-commutative group where such a precise and low complexity is
shown. The Baumslag group G(1,2) is an HNN-extension of BS(1,2). We show that
the conjugacy problem is decidable (which has been known before); but our
results go far beyond decidability. In particular, we are able to show that
conjugacy in G(1,2) can be solved in polynomial time in a strongly generic
setting. This means that essentially for all inputs conjugacy in G(1,2) can be
decided efficiently. In contrast, we show that under a plausible assumption the
average case complexity of the same problem is non-elementary. Moreover, we
provide a lower bound for the conjugacy problem in G(1,2) by reducing the
division problem in power circuits to the conjugacy problem in G(1,2). The
complexity of the division problem in power circuits is an open and interesting
problem in integer arithmetic.
|
[
{
"version": "v1",
"created": "Fri, 20 Sep 2013 16:34:42 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Nov 2013 16:14:28 GMT"
}
] | 2016-04-25T00:00:00 |
[
[
"Diekert",
"Volker",
""
],
[
"Miasnikov",
"Alexei",
""
],
[
"Weiß",
"Armin",
""
]
] |
new_dataset
| 0.997485 |
1603.09536
|
Isabel Campos Dr.
|
D. Salomoni, I. Campos, L. Gaido, G. Donvito, M. Antonacci, P.
Fuhrman, J. Marco, A. Lopez-Garcia, P. Orviz, I. Blanquer, M. Caballer, G.
Molto, M. Plociennik, M. Owsiak, M. Urbaniak, M. Hardt, A. Ceccanti, B. Wegh,
J. Gomes, M. David, C. Aiftimiei, L. Dutka, B. Kryza, T. Szepieniec, S.
Fiore, G. Aloisio, R. Barbera, R. Bruno, M. Fargetta, E. Giorgio, S. Reynaud,
L. Schwarz, A. Dorigo, T. Bell and R. Rocha
|
INDIGO-Datacloud: foundations and architectural description of a
Platform as a Service oriented to scientific computing
|
31 pages, 12 Figures
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we describe the architecture of a Platform as a Service (PaaS)
oriented to computing and data analysis. In order to clarify the choices we
made, we explain the features using practical examples, applied to several
known usage patterns in the area of HEP computing. The proposed architecture is
devised to provide researchers with a unified view of distributed computing
infrastructures, focusing in facilitating seamless access. In this respect the
Platform is able to profit from the most recent developments for computing and
processing large amounts of data, and to exploit current storage and
preservation technologies, with the appropriate mechanisms to ensure security
and privacy.
|
[
{
"version": "v1",
"created": "Thu, 31 Mar 2016 11:41:34 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Apr 2016 14:36:51 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Apr 2016 09:25:09 GMT"
}
] | 2016-04-25T00:00:00 |
[
[
"Salomoni",
"D.",
""
],
[
"Campos",
"I.",
""
],
[
"Gaido",
"L.",
""
],
[
"Donvito",
"G.",
""
],
[
"Antonacci",
"M.",
""
],
[
"Fuhrman",
"P.",
""
],
[
"Marco",
"J.",
""
],
[
"Lopez-Garcia",
"A.",
""
],
[
"Orviz",
"P.",
""
],
[
"Blanquer",
"I.",
""
],
[
"Caballer",
"M.",
""
],
[
"Molto",
"G.",
""
],
[
"Plociennik",
"M.",
""
],
[
"Owsiak",
"M.",
""
],
[
"Urbaniak",
"M.",
""
],
[
"Hardt",
"M.",
""
],
[
"Ceccanti",
"A.",
""
],
[
"Wegh",
"B.",
""
],
[
"Gomes",
"J.",
""
],
[
"David",
"M.",
""
],
[
"Aiftimiei",
"C.",
""
],
[
"Dutka",
"L.",
""
],
[
"Kryza",
"B.",
""
],
[
"Szepieniec",
"T.",
""
],
[
"Fiore",
"S.",
""
],
[
"Aloisio",
"G.",
""
],
[
"Barbera",
"R.",
""
],
[
"Bruno",
"R.",
""
],
[
"Fargetta",
"M.",
""
],
[
"Giorgio",
"E.",
""
],
[
"Reynaud",
"S.",
""
],
[
"Schwarz",
"L.",
""
],
[
"Dorigo",
"A.",
""
],
[
"Bell",
"T.",
""
],
[
"Rocha",
"R.",
""
]
] |
new_dataset
| 0.974976 |
1604.03195
|
Carlos Leandro
|
Carlos Leandro and Jorge Ambr\'osio
|
Multibody minimum-energy trajectory with applications to protein folding
|
41 pages, 17 figures
| null | null | null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work addresses the optimal control of multibody systems being actuated
with control forces in order to find a dynamically feasible minimum-energy
trajectory of the system. The optimal control problem and its constraints are
integrated in a discrete version of the equation of motion allowing the
minimization of system energy with respect to a discrete state and control
trajectory. The work is centred on a specific type of open-chain multibody
system, with strong local propensity, where the overall system kinematics is
described essentially by the torsion around the links that connect rigid
bodies. The coupling between the rigid body motion, and the optimal
conformation is described as an elastic band of replicas of the original system
with different conformations. The band forces are used to control system's
motion directly, reflecting the influence of the system energy field on its
conformation, using for that the Nudged-Elastic Band method. Here the equation
of motion of the multibody grid are solved by using the augmented Lagrangean
method. In this context, if a feasible minimum-energy trajectory of the
original system exists it is a stationary state of the extended system. This
approach is applied to the folding of a single chain protein.
|
[
{
"version": "v1",
"created": "Tue, 12 Apr 2016 01:26:44 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Apr 2016 11:17:28 GMT"
}
] | 2016-04-25T00:00:00 |
[
[
"Leandro",
"Carlos",
""
],
[
"Ambrósio",
"Jorge",
""
]
] |
new_dataset
| 0.996624 |
1604.06452
|
Tina Novak
|
Tina Novak, Janez Zerovnik
|
Weighted domination number of cactus graphs
|
17 pages, figures, submitted to Discussiones Mathematicae Graph
Theory
| null | null | null |
cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the paper, we write a linear algorithm for calculating the weighted
domination number of a vertex-weighted cactus. The algorithm is based on the
well known depth first search (DFS) structure. Our algorithm needs less than
$12n+5b$ additions and $9n+2b$ $\min$-operations where $n$ is the number of
vertices and $b$ is the number of blocks in the cactus.
|
[
{
"version": "v1",
"created": "Thu, 21 Apr 2016 08:18:01 GMT"
}
] | 2016-04-25T00:00:00 |
[
[
"Novak",
"Tina",
""
],
[
"Zerovnik",
"Janez",
""
]
] |
new_dataset
| 0.969104 |
1604.06583
|
Ildik\'o Pil\'an
|
Elena Volodina and Ildik\'o Pil\'an and Ingegerd Enstr\"om and Lorena
Llozhi and Peter Lundkvist and Gunl\"og Sundberg and Monica Sandell
|
SweLL on the rise: Swedish Learner Language corpus for European
Reference Level studies
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new resource for Swedish, SweLL, a corpus of Swedish Learner
essays linked to learners' performance according to the Common European
Framework of Reference (CEFR). SweLL consists of three subcorpora - SpIn,
SW1203 and Tisus, collected from three different educational establishments.
The common metadata for all subcorpora includes age, gender, native languages,
time of residence in Sweden, type of written task. Depending on the subcorpus,
learner texts may contain additional information, such as text genres, topics,
grades. Five of the six CEFR levels are represented in the corpus: A1, A2, B1,
B2 and C1 comprising in total 339 essays. C2 level is not included since
courses at C2 level are not offered. The work flow consists of collection of
essays and permits, essay digitization and registration, meta-data annotation,
automatic linguistic annotation. Inter-rater agreement is presented on the
basis of SW1203 subcorpus. The work on SweLL is still ongoing with more than
100 essays waiting in the pipeline. This article both describes the resource
and the "how-to" behind the compilation of SweLL.
|
[
{
"version": "v1",
"created": "Fri, 22 Apr 2016 09:19:07 GMT"
}
] | 2016-04-25T00:00:00 |
[
[
"Volodina",
"Elena",
""
],
[
"Pilán",
"Ildikó",
""
],
[
"Enström",
"Ingegerd",
""
],
[
"Llozhi",
"Lorena",
""
],
[
"Lundkvist",
"Peter",
""
],
[
"Sundberg",
"Gunlög",
""
],
[
"Sandell",
"Monica",
""
]
] |
new_dataset
| 0.999626 |
1604.06747
|
Jonathan Hoyland
|
Jonathan Hoyland, Matthew Hague
|
Generating Concurrency Checks Automatically
|
15 pages, 9 figures
| null | null | null |
cs.LO cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article introduces ATAB, a tool that automatically generates pairwise
reachability checks for action trees. Action trees can be used to study the
behaviour of real-world concurrent programs. ATAB encodes pairwise reachability
checks into alternating tree automata that determine whether an action tree has
a schedule where any pair of given points in the program are simultaneously
reachable. Because the pairwise reachability problem is undecidable in general
ATAB operates under a restricted form of lock-based concurrency. ATAB produces
alternating tree automata that are more compact and more efficiently checkable
than those that have been previously used. The process is entirely automated,
which simplifies the process of encoding checks for more complex action trees.
The alternating tree automata produced are easier to scale to large numbers of
locks than previous constructions.
|
[
{
"version": "v1",
"created": "Fri, 22 Apr 2016 16:52:58 GMT"
}
] | 2016-04-25T00:00:00 |
[
[
"Hoyland",
"Jonathan",
""
],
[
"Hague",
"Matthew",
""
]
] |
new_dataset
| 0.953749 |
1604.06751
|
Mazdak Fatahi
|
Mazdak Fatahi, Mahmood Ahmadi, Mahyar Shahsavari, Arash Ahmadi and
Philippe Devienne
|
evt_MNIST: A spike based version of traditional MNIST
| null | null | null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Benchmarks and datasets have important role in evaluation of machine learning
algorithms and neural network implementations. Traditional dataset for images
such as MNIST is applied to evaluate efficiency of different training
algorithms in neural networks. This demand is different in Spiking Neural
Networks (SNN) as they require spiking inputs. It is widely believed, in the
biological cortex the timing of spikes is irregular. Poisson distributions
provide adequate descriptions of the irregularity in generating appropriate
spikes. Here, we introduce a spike-based version of MNSIT (handwritten digits
dataset),using Poisson distribution and show the Poissonian property of the
generated streams. We introduce a new version of evt_MNIST which can be used
for neural network evaluation.
|
[
{
"version": "v1",
"created": "Fri, 22 Apr 2016 17:06:31 GMT"
}
] | 2016-04-25T00:00:00 |
[
[
"Fatahi",
"Mazdak",
""
],
[
"Ahmadi",
"Mahmood",
""
],
[
"Shahsavari",
"Mahyar",
""
],
[
"Ahmadi",
"Arash",
""
],
[
"Devienne",
"Philippe",
""
]
] |
new_dataset
| 0.999025 |
1603.02481
|
Jakob Lykke Andersen
|
Jakob L. Andersen, Christoph Flamm, Daniel Merkle, Peter F. Stadler
|
A Software Package for Chemically Inspired Graph Transformation
| null | null | null | null |
cs.FL q-bio.BM q-bio.MN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Chemical reaction networks can be automatically generated from graph grammar
descriptions, where rewrite rules model reaction patterns. Because a molecule
graph is connected and reactions in general involve multiple molecules, the
rewriting must be performed on multisets of graphs. We present a general
software package for this type of graph rewriting system, which can be used for
modelling chemical systems. The package contains a C++ library with algorithms
for working with transformation rules in the Double Pushout formalism, e.g.,
composition of rules and a domain specific language for programming graph
language generation. A Python interface makes these features easily accessible.
The package also has extensive procedures for automatically visualising not
only graphs and rewrite rules, but also Double Pushout diagrams and graph
languages in form of directed hypergraphs. The software is available as an open
source package, and interactive examples can be found on the accompanying
webpage.
|
[
{
"version": "v1",
"created": "Tue, 8 Mar 2016 11:20:02 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Apr 2016 06:03:44 GMT"
}
] | 2016-04-22T00:00:00 |
[
[
"Andersen",
"Jakob L.",
""
],
[
"Flamm",
"Christoph",
""
],
[
"Merkle",
"Daniel",
""
],
[
"Stadler",
"Peter F.",
""
]
] |
new_dataset
| 0.998516 |
1604.06157
|
Andrew Connor
|
Jacques Foottit, Dave Brown, Stefan Marks and Andy M. Connor
|
An Intuitive Tangible Game Controller
|
in Proceedings of the 2014 Conference on Interactive Entertainment
| null |
10.1145/2677758.2677774
| null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper outlines the development of a sensory feedback device providing a
tangible interface for controlling digital environments, in this example a
flight simulator, where the intention for the device is that it is relatively
low cost, versatile and intuitive. Gesture based input allows for a more
immersive experience, so rather than making the user feel like they are
controlling an aircraft the intuitive interface allows the user to become the
aircraft that is controlled by the movements of the user's hand. The movements
are designed to allow a sense of immersion that would be difficult to achieve
with an alternative interface. A vibrotactile based haptic feedback is
incorporated in the device to further enhance the connection between the user
and the game environment by providing immediate confirmation of game events.
When used for navigating an aircraft simulator, this device invites playful
action and thrill. It bridges new territory on portable, low cost solutions for
haptic devices in gaming contexts.
|
[
{
"version": "v1",
"created": "Thu, 21 Apr 2016 01:57:18 GMT"
}
] | 2016-04-22T00:00:00 |
[
[
"Foottit",
"Jacques",
""
],
[
"Brown",
"Dave",
""
],
[
"Marks",
"Stefan",
""
],
[
"Connor",
"Andy M.",
""
]
] |
new_dataset
| 0.996171 |
1508.01045
|
Florian Lonsing
|
Florian Lonsing, Martina Seidl, and Allen Van Gelder
|
The QBF Gallery: Behind the Scenes
|
preprint of an article to appear in Artificial Intelligence,
Elsevier, 2016
| null |
10.1016/j.artint.2016.04.002
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Over the last few years, much progress has been made in the theory and
practice of solving quantified Boolean formulas (QBF). Novel solvers have been
presented that either successfully enhance established techniques or implement
novel solving paradigms. Powerful preprocessors have been realized that tune
the encoding of a formula to make it easier to solve. Frameworks for
certification and solution extraction emerged that allow for a detailed
interpretation of a QBF solver's results, and new types of QBF encodings were
presented for various application problems.
To capture these developments the QBF Gallery was established in 2013. The
QBF Gallery aims at providing a forum to assess QBF tools and to collect new,
expressive benchmarks that allow for documenting the status quo and that
indicate promising research directions. These benchmarks became the basis for
the experiments conducted in the context of the QBF Gallery 2013 and follow-up
evaluations. In this paper, we report on the setup of the QBF Gallery. To this
end, we conducted numerous experiments which allowed us not only to assess the
quality of the tools, but also the quality of the benchmarks.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2015 12:17:07 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Apr 2016 11:49:17 GMT"
}
] | 2016-04-21T00:00:00 |
[
[
"Lonsing",
"Florian",
""
],
[
"Seidl",
"Martina",
""
],
[
"Van Gelder",
"Allen",
""
]
] |
new_dataset
| 0.990454 |
1604.05791
|
Andrew Connor
|
Jan Kruse, Ricardo Sosa and Andy M. Connor
|
Procedural urban environments for FPS games
| null | null |
10.1145/2843043.2843479
| null |
cs.AI cs.HC cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a novel approach to procedural generation of urban maps
for First Person Shooter (FPS) games. A multi-agent evolutionary system is
employed to place streets, buildings and other items inside the Unity3D game
engine, resulting in playable video game levels. A computational agent is
trained using machine learning techniques to capture the intent of the game
designer as part of the multi-agent system, and to enable a semi-automated
aesthetic selection for the underlying genetic algorithm.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2016 02:39:04 GMT"
}
] | 2016-04-21T00:00:00 |
[
[
"Kruse",
"Jan",
""
],
[
"Sosa",
"Ricardo",
""
],
[
"Connor",
"Andy M.",
""
]
] |
new_dataset
| 0.966144 |
1604.05933
|
Jochen Gast
|
Jochen Gast and Anita Sellent and Stefan Roth
|
Parametric Object Motion from Blur
|
Accepted to IEEE Conference on Computer Vision and Pattern
Recognition 2016. Includes supplemental material
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motion blur can adversely affect a number of vision tasks, hence it is
generally considered a nuisance. We instead treat motion blur as a useful
signal that allows to compute the motion of objects from a single image.
Drawing on the success of joint segmentation and parametric motion models in
the context of optical flow estimation, we propose a parametric object motion
model combined with a segmentation mask to exploit localized, non-uniform
motion blur. Our parametric image formation model is differentiable w.r.t. the
motion parameters, which enables us to generalize marginal-likelihood
techniques from uniform blind deblurring to localized, non-uniform blur. A
two-stage pipeline, first in derivative space and then in image space, allows
to estimate both parametric object motion as well as a motion segmentation from
a single image alone. Our experiments demonstrate its ability to cope with very
challenging cases of object motion blur.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2016 13:00:30 GMT"
}
] | 2016-04-21T00:00:00 |
[
[
"Gast",
"Jochen",
""
],
[
"Sellent",
"Anita",
""
],
[
"Roth",
"Stefan",
""
]
] |
new_dataset
| 0.998863 |
1604.05957
|
Efthimios Bothos
|
Evangelia Anagnostopoulou, Efthimios Bothos, Babis Magoutas, Johann
Schrammel, Gregoris Mentzas
|
Persuasive Technologies for Sustainable Urban Mobility
|
Presented at the Persuasive 2016 Workshop "Where are we bound for?
Persuasion in Transport Applications"
| null | null | null |
cs.HC cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years, the persuasive interventions for inducing sustainable urban
mobility behaviours has become a very active research field. This review paper
systematically analyses existing approaches and prototype systems and describes
and classifies the persuasive strategies used for changing behaviour in the
domain of transport. It also studies the results and recommendations derived
from pilot studies, and as a result of this analysis highlights the need for
personalizing and tailoring persuasive technology to various user
characteristics. We also discuss the possible role of context-aware persuasive
systems for increasing the number of sustainable choices. Finally,
recommendations for future investigations on scholarly persuasive systems are
proposed.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2016 13:45:55 GMT"
}
] | 2016-04-21T00:00:00 |
[
[
"Anagnostopoulou",
"Evangelia",
""
],
[
"Bothos",
"Efthimios",
""
],
[
"Magoutas",
"Babis",
""
],
[
"Schrammel",
"Johann",
""
],
[
"Mentzas",
"Gregoris",
""
]
] |
new_dataset
| 0.9758 |
1604.06030
|
Paul Attie
|
Paul C. Attie and Nancy A. Lynch
|
Dynamic Input/Output Automata: a Formal and Compositional Model for
Dynamic Systems
|
65 pages, 11 figures, Information and Computation, Available online
21 March 2016
| null |
10.1016/j.ic.2016.03.008
| null |
cs.DC cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present dynamic I/O automata (DIOA), a compositional model of dynamic
systems. In DIOA, automata can be created and destroyed dynamically, as
computation proceeds, and an automaton can dynamically change its signature,
i.e., the set of actions in which it can participate.
DIOA features operators for parallel composition, action hiding, action
renaming, a notion of automaton creation, and a notion of behavioral subtyping
by means of trace inclusion. DIOA can model mobility, using signature
modification, and is hierarchical: a dynamically changing system of interacting
automata is itself modeled as a single automaton.
We also show that parallel composition, action hiding, action renaming, and
(subject to some technical conditions) automaton creation are all monotonic
with respect to trace inclusion: if one component is replaced by another whose
traces are a subset of the former, then the set of traces of the system as a
whole can only be reduced.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2016 16:49:32 GMT"
}
] | 2016-04-21T00:00:00 |
[
[
"Attie",
"Paul C.",
""
],
[
"Lynch",
"Nancy A.",
""
]
] |
new_dataset
| 0.959565 |
1604.06061
|
Viktor Winschel
|
Jules Hedges, Evguenia Shprits, Viktor Winschel, Philipp Zahn
|
Compositionality and String Diagrams for Game Theory
| null | null | null | null |
cs.GT cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce string diagrams as a formal mathematical, graphical language to
represent, compose, program and reason about games. The language is well
established in quantum physics, quantum computing and quantum linguistic with
the semantics given by category theory. We apply this language to the game
theoretical setting and show examples how to use it for some economic games
where we highlight the compositional nature of our higher-order game theory.
|
[
{
"version": "v1",
"created": "Wed, 20 Apr 2016 19:03:10 GMT"
}
] | 2016-04-21T00:00:00 |
[
[
"Hedges",
"Jules",
""
],
[
"Shprits",
"Evguenia",
""
],
[
"Winschel",
"Viktor",
""
],
[
"Zahn",
"Philipp",
""
]
] |
new_dataset
| 0.999498 |
0811.2113
|
J\"urgen Koslowski
|
Chris Heunen
|
Compactly accessible categories and quantum key distribution
|
26 pages in Logical Methods in Computer Science, Volume 4, Issue 4
(November 17, 2008) lmcs:1129
|
Logical Methods in Computer Science, Volume 4, Issue 4 (November
17, 2008) lmcs:1129
|
10.2168/LMCS-4(4:9)2008
| null |
cs.LO cs.PL quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compact categories have lately seen renewed interest via applications to
quantum physics. Being essentially finite-dimensional, they cannot accomodate
(co)limit-based constructions. For example, they cannot capture protocols such
as quantum key distribution, that rely on the law of large numbers. To overcome
this limitation, we introduce the notion of a compactly accessible category,
relying on the extra structure of a factorisation system. This notion allows
for infinite dimension while retaining key properties of compact categories:
the main technical result is that the choice-of-duals functor on the compact
part extends canonically to the whole compactly accessible category. As an
example, we model a quantum key distribution protocol and prove its correctness
categorically.
|
[
{
"version": "v1",
"created": "Thu, 13 Nov 2008 13:58:48 GMT"
},
{
"version": "v2",
"created": "Mon, 17 Nov 2008 13:17:09 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Apr 2016 12:29:44 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Heunen",
"Chris",
""
]
] |
new_dataset
| 0.989815 |
1501.01352
|
Yun Fan
|
Yun Fan, Liang Zhang
|
Iso-Orthogonality and Type II Duadic Constacyclic Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Generalizing even-like duadic cyclic codes and Type-II duadic negacyclic
codes, we introduce even-like (i.e.,Type-II) and odd-like duadic constacyclic
codes, and study their properties and existence. We show that even-like duadic
constacyclic codes are isometrically orthogonal, and the duals of even-like
duadic constacyclic codes are odd-like duadic constacyclic codes. We exhibit
necessary and sufficient conditions for the existence of even-like duadic
constacyclic codes. A class of even-like duadic constacyclic codes which are
alternant MDS-codes is constructed.
|
[
{
"version": "v1",
"created": "Wed, 7 Jan 2015 02:40:21 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jan 2015 15:03:07 GMT"
},
{
"version": "v3",
"created": "Sun, 1 Feb 2015 06:43:42 GMT"
},
{
"version": "v4",
"created": "Tue, 19 Apr 2016 03:02:37 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Fan",
"Yun",
""
],
[
"Zhang",
"Liang",
""
]
] |
new_dataset
| 0.998213 |
1505.02534
|
Tianyu Song
|
Tianyu Song, Pooi-Yuen Kam
|
Robust Data Detection for the Photon-Counting Free-Space Optical System
with Implicit CSI Acquisition and Background Radiation Compensation
|
11pages
| null |
10.1109/JLT.2015.2505360
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Since atmospheric turbulence and pointing errors cause signal intensity
fluctuations and the background radiation surrounding the free-space optical
(FSO) receiver contributes an undesired noisy component, the receiver requires
accurate channel state information (CSI) and background information to adjust
the detection threshold. In most previous studies, for CSI acquisition, pilot
symbols were employed, which leads to a reduction of spectral and energy
efficiency; and an impractical assumption that the background radiation
component is perfectly known was made. In this paper, we develop an efficient
and robust sequence receiver, which acquires the CSI and the background
information implicitly and requires no knowledge about the channel model
information. It is robust since it can automatically estimate the CSI and
background component and detect the data sequence accordingly. Its decision
metric has a simple form and involves no integrals, and thus can be easily
evaluated. A Viterbi-type trellis-search algorithm is adopted to improve the
search efficiency, and a selective-store strategy is adopted to overcome a
potential error floor problem as well as to increase the memory efficiency. To
further simplify the receiver, a decision-feedback symbol-by-symbol receiver is
proposed as an approximation of the sequence receiver. By simulations and
theoretical analysis, we show that the performance of both the sequence
receiver and the symbol-by-symbol receiver, approach that of detection with
perfect knowledge of the CSI and background radiation, as the length of the
window for forming the decision metric increases.
|
[
{
"version": "v1",
"created": "Mon, 11 May 2015 09:23:48 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Song",
"Tianyu",
""
],
[
"Kam",
"Pooi-Yuen",
""
]
] |
new_dataset
| 0.954423 |
1510.07410
|
Hamidreza Arjmandi
|
Hamidreza Arjmandi, Arman Ahmadzadeh, Robert Schober and Masoumeh
Nasiri Kenari
|
A Bio-Synthetic Modulator Model for Diffusion-based Molecular
Communications
|
This paper is an extended version of a paper submitted to IEEE
Globecom 2016
| null | null | null |
cs.ET cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In diffusion-based molecular communication (DMC), one important functionality
of a transmitter nano-machine is signal modulation. In particular, the
transmitter has to be able to control the release of signaling molecules for
modulation of the information bits. An important class of control mechanisms in
natural cells for releasing molecules is based on ion channels which are
pore-forming proteins across the cell membrane whose opening and closing may be
controlled by a gating parameter. In this paper, a modulator for DMC based on
ion channels is proposed which controls the rate at which molecules are
released from the transmitter by modulating a gating parameter signal.
Exploiting the capabilities of the proposed modulator, an on-off keying
modulation scheme is introduced and the corresponding average modulated signal,
i.e., the average release rate of the molecules from the transmitter, is
derived in the Laplace domain. By making a simplifying assumption, a
closed-form expression for the average modulated signal in the time domain is
obtained which constitutes an upper bound on the total number of released
molecules regardless of this assumption. The derived average modulated signal
is compared to results obtained with a particle based simulator. The numerical
results show that the derived upper bound is tight if the number of ion
channels distributed across the transmitter (cell) membrane is small.
|
[
{
"version": "v1",
"created": "Mon, 26 Oct 2015 09:13:20 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Nov 2015 12:49:29 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Apr 2016 04:42:14 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Arjmandi",
"Hamidreza",
""
],
[
"Ahmadzadeh",
"Arman",
""
],
[
"Schober",
"Robert",
""
],
[
"Kenari",
"Masoumeh Nasiri",
""
]
] |
new_dataset
| 0.99794 |
1510.08917
|
Chia-Hsiang Lin
|
Chia-Hsiang Lin, Chong-Yung Chi, Yu-Hsiang Wang, and Tsung-Han Chan
|
A Fast Hyperplane-Based Minimum-Volume Enclosing Simplex Algorithm for
Blind Hyperspectral Unmixing
|
36 pages, 8 figures, IEEE Transactions on Signal Processing
| null |
10.1109/TSP.2015.2508778
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Hyperspectral unmixing (HU) is a crucial signal processing procedure to
identify the underlying materials (or endmembers) and their corresponding
proportions (or abundances) from an observed hyperspectral scene. A well-known
blind HU criterion, advocated by Craig in early 1990's, considers the vertices
of the minimum-volume enclosing simplex of the data cloud as good endmember
estimates, and it has been empirically and theoretically found effective even
in the scenario of no pure pixels. However, such kind of algorithms may suffer
from heavy simplex volume computations in numerical optimization, etc. In this
work, without involving any simplex volume computations, by exploiting a convex
geometry fact that a simplest simplex of N vertices can be defined by N
associated hyperplanes, we propose a fast blind HU algorithm, for which each of
the N hyperplanes associated with the Craig's simplex of N vertices is
constructed from N-1 affinely independent data pixels, together with an
endmember identifiability analysis for its performance support. Without
resorting to numerical optimization, the devised algorithm searches for the
N(N-1) active data pixels via simple linear algebraic computations, accounting
for its computational efficiency. Monte Carlo simulations and real data
experiments are provided to demonstrate its superior efficacy over some
benchmark Craig-criterion-based algorithms in both computational efficiency and
estimation accuracy.
|
[
{
"version": "v1",
"created": "Thu, 29 Oct 2015 21:41:26 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Lin",
"Chia-Hsiang",
""
],
[
"Chi",
"Chong-Yung",
""
],
[
"Wang",
"Yu-Hsiang",
""
],
[
"Chan",
"Tsung-Han",
""
]
] |
new_dataset
| 0.989122 |
1512.00762
|
Zubair Azim
|
Zubair Al Azim, Abhronil Sengupta, Syed Shakib Sarwar, Kaushik Roy
|
Spin-Torque Sensors for Energy Efficient High Speed Long Interconnects
|
To appear in IEEE Transactions on Electron Devices
| null |
10.1109/TED.2015.2507126
| null |
cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a Spin-Torque (ST) based sensing scheme that can
enable energy efficient multi-bit long distance interconnect architectures.
Current-mode interconnects have recently been proposed to overcome the
performance degradations associated with conventional voltage mode Copper (Cu)
interconnects. However, the performance of current mode interconnects are
limited by analog current sensing transceivers and equalization circuits. As a
solution, we propose the use of ST based receivers that use Magnetic Tunnel
Junctions (MTJ) and simple digital components for current-to-voltage conversion
and do not require analog transceivers. We incorporate Spin-Hall Metal (SHM) in
our design to achieve high speed sensing. We show both single and multi-bit
operations that reveal major benefits at higher speeds. Our simulation results
show that the proposed technique consumes only 3.93-4.72 fJ/bit/mm energy while
operating at 1-2 Gbits/sec; which is considerably better than existing charge
based interconnects. In addition, Voltage Controlled Magnetic Anisotropy (VCMA)
can reduce the required current at the sensor. With the inclusion of VCMA, the
energy consumption can be further reduced to 2.02-4.02 fJ/bit/mm
|
[
{
"version": "v1",
"created": "Wed, 2 Dec 2015 16:29:26 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Azim",
"Zubair Al",
""
],
[
"Sengupta",
"Abhronil",
""
],
[
"Sarwar",
"Syed Shakib",
""
],
[
"Roy",
"Kaushik",
""
]
] |
new_dataset
| 0.991483 |
1601.05254
|
Ricardo P\'erez Marco
|
Ricardo Perez-Marco
|
Bitcoin and Decentralized Trust Protocols
|
This is a general survey article to appear on the June 2016 issue of
the Newsletter of the EMS. 8 pages, 5 figures
| null | null | null |
cs.CY math.HO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Bitcoin is the first decentralized peer-to-peer (P2P) electronic currency. It
was created in November 2008 by Satoshi Nakamoto. Nakamoto released the first
implementation of the protocol in an open source client software and the
genesis of bitcoins began on January 9th 2009. The Bitcoin protocol is based on
clever ideas which solve a form of the Byzantine Generals Problem and sets the
foundation for Decentralized Trust Protocols. Still in its infancy, the
currency and the protocol have the potential to disrupt the international
financial system and other sectors where business is based on trusted third
parties. The security of the bitcoin protocol relies on strong cryptography and
one way hashing algorithms.
|
[
{
"version": "v1",
"created": "Wed, 20 Jan 2016 12:40:16 GMT"
},
{
"version": "v2",
"created": "Tue, 19 Apr 2016 17:13:44 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Perez-Marco",
"Ricardo",
""
]
] |
new_dataset
| 0.999619 |
1602.01890
|
Archith Bency
|
Archith J. Bency, S. Karthikeyan, Carter De Leo, Santhoshkumar
Sunderrajan and B. S. Manjunath
|
Search Tracker: Human-derived object tracking in-the-wild through
large-scale search and retrieval
|
Under review with the IEEE Transactions on Circuits and Systems for
Video Technology
| null |
10.1109/TCSVT.2016.2555718
| null |
cs.CV cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Humans use context and scene knowledge to easily localize moving objects in
conditions of complex illumination changes, scene clutter and occlusions. In
this paper, we present a method to leverage human knowledge in the form of
annotated video libraries in a novel search and retrieval based setting to
track objects in unseen video sequences. For every video sequence, a document
that represents motion information is generated. Documents of the unseen video
are queried against the library at multiple scales to find videos with similar
motion characteristics. This provides us with coarse localization of objects in
the unseen video. We further adapt these retrieved object locations to the new
video using an efficient warping scheme. The proposed method is validated on
in-the-wild video surveillance datasets where we outperform state-of-the-art
appearance-based trackers. We also introduce a new challenging dataset with
complex object appearance changes.
|
[
{
"version": "v1",
"created": "Fri, 5 Feb 2016 00:01:13 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Bency",
"Archith J.",
""
],
[
"Karthikeyan",
"S.",
""
],
[
"De Leo",
"Carter",
""
],
[
"Sunderrajan",
"Santhoshkumar",
""
],
[
"Manjunath",
"B. S.",
""
]
] |
new_dataset
| 0.99721 |
1604.05430
|
Anatoliy Zinovyev
|
Anatoliy Zinovyev, Brian L. Mark
|
Binary Multi-Level Routing Protocol for Mobile Ad Hoc Networks
| null | null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Routing in mobile ad hoc networks (MANETs) presents a big challenge,
especially when support for a large number of nodes is needed. This paper
extends the local visibility concept of the recent DHT-based URBAN_XOR routing
protocol, which aims to reduce routing table sizes while keeping efficiency
high. Our main contribution is providing a guarantee that if any two nodes are
connected through other nodes, they are able to communicate with each other. We
propose a new route acquisition method that aims to reduce the total amount of
overhead traffic and improve convergence rate. In addition, we introduce an
abstraction for describing the network structure that makes it easy to
understand and analyze. Compared to existing approaches in ad hoc routing, the
new protocol supports the following features: scalability, guaranteed
connectivity assuming network convergence, absence of single points of failure,
low path-stretch, and mobility.
|
[
{
"version": "v1",
"created": "Tue, 19 Apr 2016 04:38:06 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Zinovyev",
"Anatoliy",
""
],
[
"Mark",
"Brian L.",
""
]
] |
new_dataset
| 0.998462 |
1604.05479
|
Andrew Connor
|
Jacques Foottit, Dave Brown, Stefan Marks and Andy M. Connor
|
A wearable haptic game controller
| null |
International Journal of Game Theory & Technology, 2(1), 1-19
(2016)
|
10.5121/ijgtt.2016.2101
| null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper outlines the development of a wearable game controller
incorporating vibrotacticle haptic feedback that provides a low cost, versatile
and intuitive interface for controlling digital games. The device differs from
many traditional haptic feedback implementation in that it combines
vibrotactile based haptic feedback with gesture based input, thus becoming a
two way conduit between the user and the virtual environment. The device is
intended to challenge what is considered an "interface" and draws on work in
the area of Actor-Network theory to purposefully blur the boundary between man
and machine. This allows for a more immersive experience, so rather than making
the user feel like they are controlling an aircraft the intuitive interface
allows the user to become the aircraft that is controlled by the movements of
the user's hand. This device invites playful action and thrill. It bridges new
territory on portable and low cost solutions for haptic controllers in a gaming
context.
|
[
{
"version": "v1",
"created": "Tue, 19 Apr 2016 09:04:34 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Foottit",
"Jacques",
""
],
[
"Brown",
"Dave",
""
],
[
"Marks",
"Stefan",
""
],
[
"Connor",
"Andy M.",
""
]
] |
new_dataset
| 0.99918 |
1604.05487
|
Jan Van Rijn
|
Hendrik Jan Hoogeboom, Walter A. Kosters, Jan N. van Rijn, Jonathan K.
Vis
|
Acyclic Constraint Logic and Games
|
14 pages, originally published at: ICGA Journal Vol. 37, pp. 3-16,
2014
|
ICGA Journal, Vol. 37, pp. 3-16, 2014
| null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Non-deterministic Constraint Logic is a family of graph games introduced by
Demaine and Hearn that facilitates the construction of complexity proofs. It is
convenient for the analysis of games, providing a uniform view. We focus on the
acyclic version, apply this to Klondike, Mahjong Solitaire and Nonogram (that
requires planarity), and discuss the more complicated game of Dou Shou Qi.
While for the first three games we reobtain known characterizations in a simple
and uniform manner, the result for Dou Shou Qi is new.
|
[
{
"version": "v1",
"created": "Tue, 19 Apr 2016 09:27:32 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Hoogeboom",
"Hendrik Jan",
""
],
[
"Kosters",
"Walter A.",
""
],
[
"van Rijn",
"Jan N.",
""
],
[
"Vis",
"Jonathan K.",
""
]
] |
new_dataset
| 0.998492 |
1604.05510
|
Balagopal Komarath
|
Balagopal Komarath and Jayalal Sarma and Saurabh Sawlani
|
Pebbling Meets Coloring: Reversible Pebble Game On Trees
|
15 pages, 3 figures, Preliminary version appeared in COCOON 2015
| null | null | null |
cs.CC cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The reversible pebble game is a combinatorial game played on rooted DAGs.
This game was introduced by Bennett (1989) motivated by applications in
designing space efficient reversible algorithms. Recently, Chan (2013) showed
that the reversible pebble game number of any DAG is the same as its
Dymond-Tompa pebble number and Raz-Mckenzie pebble number.
We show, as our main result, that for any rooted directed tree T, its
reversible pebble game number is always just one more than the edge rank
coloring number of the underlying undirected tree U of T. It is known that
given a DAG G as input, determining its reversible pebble game number is
PSPACE-hard. Our result implies that the reversible pebble game number of trees
can be computed in polynomial time.
We also address the question of finding the number of steps required to
optimally pebble various families of trees. It is known that trees can be
pebbled in $n^{O(\log(n))}$ steps where $n$ is the number of nodes in the tree.
Using the equivalence between reversible pebble game and the Dymond-Tompa
pebble game (Chan, 2013), we show that complete binary trees can be pebbled in
$n^{O(\log\log(n))}$ steps, a substantial improvement over the naive upper
bound of $n^{O(\log(n))}$. It remains open whether complete binary trees can be
pebbled in polynomial (in $n$) number of steps. Towards this end, we show that
almost optimal (i.e., within a factor of $(1 + \epsilon)$ for any constant
$\epsilon > 0$) pebblings of complete binary trees can be done in polynomial
number of steps.
We also show a time-space trade-off for reversible pebbling for families of
bounded degree trees by a divide-and-conquer approach: for any constant
$\epsilon > 0$, such families can be pebbled using $O(n^\epsilon)$ pebbles in
$O(n)$ steps. This generalizes an analogous result of Kralovic (2001) for
chains.
|
[
{
"version": "v1",
"created": "Tue, 19 Apr 2016 10:42:29 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Komarath",
"Balagopal",
""
],
[
"Sarma",
"Jayalal",
""
],
[
"Sawlani",
"Saurabh",
""
]
] |
new_dataset
| 0.995923 |
1604.05562
|
Veronika Loitzenbauer
|
Oren Ben-Zwi and Monika Henzinger and Veronika Loitzenbauer
|
Ad Exchange: Envy-Free Auctions with Mediators
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ad exchanges are an emerging platform for trading advertisement slots on the
web with billions of dollars revenue per year. Every time a user visits a web
page, the publisher of that web page can ask an ad exchange to auction off the
ad slots on this page to determine which advertisements are shown at which
price. Due to the high volume of traffic, ad networks typically act as
mediators for individual advertisers at ad exchanges. If multiple advertisers
in an ad network are interested in the ad slots of the same auction, the ad
network might use a "local" auction to resell the obtained ad slots among its
advertisers.
In this work we want to deepen the theoretical understanding of these new
markets by analyzing them from the viewpoint of combinatorial auctions. Prior
work studied mostly single-item auctions, while we allow the advertisers to
express richer preferences over multiple items. We develop a game-theoretic
model for the entanglement of the central auction at the ad exchange with the
local auctions at the ad networks. We consider the incentives of all three
involved parties and suggest a three-party competitive equilibrium, an
extension of the Walrasian equilibrium that ensures envy-freeness for all
participants. We show the existence of a three-party competitive equilibrium
and a polynomial-time algorithm to find one for gross-substitute bidder
valuations.
|
[
{
"version": "v1",
"created": "Tue, 19 Apr 2016 13:34:08 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Ben-Zwi",
"Oren",
""
],
[
"Henzinger",
"Monika",
""
],
[
"Loitzenbauer",
"Veronika",
""
]
] |
new_dataset
| 0.978004 |
1604.05603
|
Wolfgang Dvo\v{r}\'ak
|
Wolfgang Dvo\v{r}\'ak and Monika Henzinger
|
Online Ad Assignment with an Ad Exchange
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ad exchanges are becoming an increasingly popular way to sell advertisement
slots on the internet. An ad exchange is basically a spot market for ad
impressions. A publisher who has already signed contracts reserving
advertisement impressions on his pages can choose between assigning a new ad
impression for a new page view to a contracted advertiser or to sell it at an
ad exchange. This leads to an online revenue maximization problem for the
publisher. Given a new impression to sell decide whether (a) to assign it to a
contracted advertiser and if so to which one or (b) to sell it at the ad
exchange and if so at which reserve price. We make no assumptions about the
distribution of the advertiser valuations that participate in the ad exchange
and show that there exists a simple primal-dual based online algorithm, whose
lower bound for the revenue converges to $R_{ADX} + R_A (1 - 1/e)$, where
$R_{ADX}$ is the revenue that the optimum algorithm achieves from the ad
exchange and $R_A$ is the revenue that the optimum algorithm achieves from the
contracted advertisers.
|
[
{
"version": "v1",
"created": "Tue, 19 Apr 2016 14:44:55 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Dvořák",
"Wolfgang",
""
],
[
"Henzinger",
"Monika",
""
]
] |
new_dataset
| 0.990564 |
1604.05623
|
Marco Giordani
|
Marco Giordani, Marco Mezzavilla, Aditya Dhananjay, Sundeep Rangan,
Michele Zorzi
|
Channel Dynamics and SNR Tracking in Millimeter Wave Cellular Systems
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The millimeter wave (mmWave) frequencies are likely to play a significant
role in fifth-generation (5G) cellular systems. A key challenge in developing
systems in these bands is the potential for rapid channel dynamics: since
mmWave signals are blocked by many materials, small changes in the position or
orientation of the handset relative to objects in the environment can cause
large swings in the channel quality. This paper addresses the issue of tracking
the signal to noise ratio (SNR), which is an essential procedure for rate
prediction, handover and radio link failure detection. A simple method for
estimating the SNR from periodic synchronization signals is considered. The
method is then evaluated using real experiments in common blockage scenarios
combined with outdoor statistical models.
|
[
{
"version": "v1",
"created": "Tue, 19 Apr 2016 15:22:57 GMT"
}
] | 2016-04-20T00:00:00 |
[
[
"Giordani",
"Marco",
""
],
[
"Mezzavilla",
"Marco",
""
],
[
"Dhananjay",
"Aditya",
""
],
[
"Rangan",
"Sundeep",
""
],
[
"Zorzi",
"Michele",
""
]
] |
new_dataset
| 0.999329 |
1410.5626
|
Marcel Caria
|
Marcel Caria, Tamal Das, Admela Jukan, Marco Hoffmann
|
Divide and Conquer: Partitioning OSPF networks with SDN
|
8 pages, 7 figures
| null |
10.1109/INM.2015.7140324
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Software Defined Networking (SDN) is an emerging network control paradigm
focused on logical centralization and programmability. At the same time,
distributed routing protocols, most notably OSPF and IS-IS, are still prevalent
in IP networks, as they provide shortest path routing, fast topological
convergence after network failures, and, perhaps most importantly, the
confidence based on decades of reliable operation. Therefore, a hybrid SDN/OSPF
operation remains a desirable proposition. In this paper, we propose a new
method of hybrid SDN/OSPF operation. Our method is different from other hybrid
approaches, as it uses SDN nodes to partition an OSPF domain into sub-domains
thereby achieving the traffic engineering capabilities comparable to full SDN
operation. We place SDN-enabled routers as sub-domain border nodes, while the
operation of the OSPF protocol continues unaffected. In this way, the SDN
controller can tune routing protocol updates for traffic engineering purposes
before they are flooded into sub-domains. While local routing inside
sub-domains remains stable at all times, inter-sub-domain routes can be
optimized by determining the routes in each traversed sub-domain. As the
majority of traffic in non-trivial topologies has to traverse multiple
sub-domains, our simulation results confirm that a few SDN nodes allow traffic
engineering up to a degree that renders full SDN deployment unnecessary.
|
[
{
"version": "v1",
"created": "Tue, 21 Oct 2014 12:03:26 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Caria",
"Marcel",
""
],
[
"Das",
"Tamal",
""
],
[
"Jukan",
"Admela",
""
],
[
"Hoffmann",
"Marco",
""
]
] |
new_dataset
| 0.971784 |
1511.00363
|
Matthieu Courbariaux
|
Matthieu Courbariaux, Yoshua Bengio and Jean-Pierre David
|
BinaryConnect: Training Deep Neural Networks with binary weights during
propagations
|
Accepted at NIPS 2015, 9 pages, 3 figures
| null | null | null |
cs.LG cs.CV cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Deep Neural Networks (DNN) have achieved state-of-the-art results in a wide
range of tasks, with the best results obtained with large training sets and
large models. In the past, GPUs enabled these breakthroughs because of their
greater computational speed. In the future, faster computation at both training
and test time is likely to be crucial for further progress and for consumer
applications on low-power devices. As a result, there is much interest in
research and development of dedicated hardware for Deep Learning (DL). Binary
weights, i.e., weights which are constrained to only two possible values (e.g.
-1 or 1), would bring great benefits to specialized DL hardware by replacing
many multiply-accumulate operations by simple accumulations, as multipliers are
the most space and power-hungry components of the digital implementation of
neural networks. We introduce BinaryConnect, a method which consists in
training a DNN with binary weights during the forward and backward
propagations, while retaining precision of the stored weights in which
gradients are accumulated. Like other dropout schemes, we show that
BinaryConnect acts as regularizer and we obtain near state-of-the-art results
with BinaryConnect on the permutation-invariant MNIST, CIFAR-10 and SVHN.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2015 02:50:05 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Nov 2015 23:31:09 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Apr 2016 13:11:45 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Courbariaux",
"Matthieu",
""
],
[
"Bengio",
"Yoshua",
""
],
[
"David",
"Jean-Pierre",
""
]
] |
new_dataset
| 0.964823 |
1604.04659
|
Ioannis Raptis
|
Martin Sinclair and Ioannis Raptis
|
Dynamic Endpoint Object Conveyance Using a Large-Scale Actuator Network
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large-Scale Actuator Networks (LSAN) are a rapidly growing class of
electromechanical systems. A prime application of LSANs in the industrial
sector is distributed manipulation. LSAN's are typically implemented using:
vibrating plates, air jets, and mobile multi-robot teams. This paper
investigates a surface capable of morphing its shape using an array of linear
actuators to impose two dimensional translational movement on a set of objects.
The collective nature of the actuator network overcomes the limitations of the
single Degree of Freedom (DOF) manipulators, and forms a complex topography to
convey multiple objects to a reference location. A derivation of the kinematic
constraints and limitations of an arbitrary multi-cell surface is provided.
These limitations determine the allowable actuator alignments when configuring
the surface. A fusion of simulation and practical results demonstrate the
advantages of using this technology over static feeders.
|
[
{
"version": "v1",
"created": "Fri, 15 Apr 2016 22:44:18 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Sinclair",
"Martin",
""
],
[
"Raptis",
"Ioannis",
""
]
] |
new_dataset
| 0.999261 |
1604.04667
|
Varun Chandrasekaran
|
Varun Chandrasekaran, Fareeha Amjad, Ashlesh Sharma, Lakshminarayanan
Subramanian
|
Secure Mobile Identities
| null | null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The unique identities of every mobile user (phone number,IMSI) and device
(IMEI) are far from secure and are increasingly vulnerable to a variety of
network-level threats. The exceedingly high reliance on the weak SIM
authentication layer does not present any notion of end-to-end security for
mobile users. We propose the design and implementation of Secure Mobile
Identities (SMI), a repetitive key-exchange protocol that uses this weak SIM
authentication as a foundation to enable mobile users to establish stronger
identity authenticity. The security guarantees of SMI are directly reliant on
the mobility of users and are further enhanced by external trusted entities
providing trusted location signatures (e.g. trusted GPS, NFC synchronization
points). In this paper, we demonstrate the efficacy of our protocol using an
implementation and analysis across standard mobility models.
|
[
{
"version": "v1",
"created": "Sat, 16 Apr 2016 00:21:05 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Chandrasekaran",
"Varun",
""
],
[
"Amjad",
"Fareeha",
""
],
[
"Sharma",
"Ashlesh",
""
],
[
"Subramanian",
"Lakshminarayanan",
""
]
] |
new_dataset
| 0.996684 |
1604.04675
|
Hamid Tizhoosh
|
Shujin Zhu, H.R.Tizhoosh
|
Radon Features and Barcodes for Medical Image Retrieval via SVM
|
To appear in proceedings of The 2016 IEEE International Joint
Conference on Neural Networks (IJCNN 2016), July 24-29, 2016, Vancouver,
Canada
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For more than two decades, research has been performed on content-based image
retrieval (CBIR). By combining Radon projections and the support vector
machines (SVM), a content-based medical image retrieval method is presented in
this work. The proposed approach employs the normalized Radon projections with
corresponding image category labels to build an SVM classifier, and the Radon
barcode database which encodes every image in a binary format is also generated
simultaneously to tag all images. To retrieve similar images when a query image
is given, Radon projections and the barcode of the query image are generated.
Subsequently, the k-nearest neighbor search method is applied to find the
images with minimum Hamming distance of the Radon barcode within the same class
predicted by the trained SVM classifier that uses Radon features. The
performance of the proposed method is validated by using the IRMA 2009 dataset
with 14,410 x-ray images in 57 categories. The results demonstrate that our
method has the capacity to retrieve similar responses for the correctly
identified query image and even for those mistakenly classified by SVM. The
approach further is very fast and has low memory requirement.
|
[
{
"version": "v1",
"created": "Sat, 16 Apr 2016 01:13:23 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Zhu",
"Shujin",
""
],
[
"Tizhoosh",
"H. R.",
""
]
] |
new_dataset
| 0.997588 |
1604.04676
|
Hamid Tizhoosh
|
Xinran Liu, Hamid R. Tizhoosh, Jonathan Kofman
|
Generating Binary Tags for Fast Medical Image Retrieval Based on
Convolutional Nets and Radon Transform
|
To appear in proceedings of The 2016 IEEE International Joint
Conference on Neural Networks (IJCNN 2016), July 24-29, 2016, Vancouver,
Canada
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Content-based image retrieval (CBIR) in large medical image archives is a
challenging and necessary task. Generally, different feature extraction methods
are used to assign expressive and invariant features to each image such that
the search for similar images comes down to feature classification and/or
matching. The present work introduces a new image retrieval method for medical
applications that employs a convolutional neural network (CNN) with recently
introduced Radon barcodes. We combine neural codes for global classification
with Radon barcodes for the final retrieval. We also examine image search based
on regions of interest (ROI) matching after image retrieval. The IRMA dataset
with more than 14,000 x-rays images is used to evaluate the performance of our
method. Experimental results show that our approach is superior to many
published works.
|
[
{
"version": "v1",
"created": "Sat, 16 Apr 2016 01:30:01 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Liu",
"Xinran",
""
],
[
"Tizhoosh",
"Hamid R.",
""
],
[
"Kofman",
"Jonathan",
""
]
] |
new_dataset
| 0.954982 |
1604.04723
|
Luka Malisa
|
Luka Malisa and Kari Kostiainen and Thomas Knell and David Sommer and
Srdjan Capkun
|
Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on
Safety-Critical Terminals
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many terminals are used in safety-critical operations in which humans,
through terminal user interfaces, become a part of the system control loop
(e.g., medical and industrial systems). These terminals are typically embedded,
single-purpose devices with restricted functionality, sometimes air-gapped and
increasingly hardened.
We describe a new way of attacking such terminals in which an adversary has
only temporary, non-invasive, physical access to the terminal. In this attack,
the adversary attaches a small device to the interface that connects user input
peripherals to the terminal. The device executes the attack when the authorized
user is performing safety-critical operations, by modifying or blocking user
input, or injecting new input events.
Given that the attacker has access to user input, the execution of this
attack might seem trivial. However, to succeed, the attacker needs to overcome
a number of challenges including the inability to directly observe the user
interface and avoid being detected by the users. We present techniques that
allow user interface state and input tracking. We evaluate these techniques and
show that they can be implemented efficiently. We further evaluate the
effectiveness of our attack through an online user study and find input
modification attacks that are hard for the users to detect and would therefore
lead to serious violations of the input integrity.
|
[
{
"version": "v1",
"created": "Sat, 16 Apr 2016 10:57:06 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Malisa",
"Luka",
""
],
[
"Kostiainen",
"Kari",
""
],
[
"Knell",
"Thomas",
""
],
[
"Sommer",
"David",
""
],
[
"Capkun",
"Srdjan",
""
]
] |
new_dataset
| 0.992489 |
1604.04725
|
Victor Sanchez-Anguix Dr.
|
Victor Sanchez-Anguix, Reyhan Aydogan, Vicente Julian and Catholijn
Jonker
|
Unanimously acceptable agreements for negotiation teams in unpredictable
domains
|
Electronic Commerce Research and Applications, 2014
| null |
10.1016/j.elerap.2014.05.002
| null |
cs.MA cs.AI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A negotiation team is a set of agents with common and possibly also
conflicting preferences that forms one of the parties of a negotiation. A
negotiation team is involved in two decision making processes simultaneously, a
negotiation with the opponents, and an intra-team process to decide on the
moves to make in the negotiation. This article focuses on negotiation team
decision making for circumstances that require unanimity of team decisions.
Existing agent-based approaches only guarantee unanimity in teams negotiating
in domains exclusively composed of predictable and compatible issues. This
article presents a model for negotiation teams that guarantees unanimous team
decisions in domains consisting of predictable and compatible, and also
unpredictable issues. Moreover, the article explores the influence of using
opponent, and team member models in the proposing strategies that team members
use. Experimental results show that the team benefits if team members employ
Bayesian learning to model their teammates' preferences.
|
[
{
"version": "v1",
"created": "Sat, 16 Apr 2016 11:01:44 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Sanchez-Anguix",
"Victor",
""
],
[
"Aydogan",
"Reyhan",
""
],
[
"Julian",
"Vicente",
""
],
[
"Jonker",
"Catholijn",
""
]
] |
new_dataset
| 0.992085 |
1604.04815
|
Yongchao Liu
|
Yongchao Liu, Srinivas Aluru
|
LightScan: Faster Scan Primitive on CUDA Compatible Manycore Processors
|
21 pages, 6 figures, submitted to Journal of Parallel and Distributed
Computing on Jan 09, 2016
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Scan (or prefix sum) is a fundamental and widely used primitive in parallel
computing. In this paper, we present LightScan, a faster parallel scan
primitive for CUDA-enabled GPUs, which investigates a hybrid model combining
intra-block computation and inter-block communication to perform a scan. Our
algorithm employs warp shuffle functions to implement fast intra-block
computation and takes advantage of globally coherent L2 cache and the
associated parallel thread execution (PTX) assembly instructions to realize
lightweight inter-block communication. Performance evaluation using a single
Tesla K40c GPU shows that LightScan outperforms existing GPU algorithms and
implementations, and yields a speedup of up to 2.1, 2.4, 1.5 and 1.2 over the
leading CUDPP, Thrust, ModernGPU and CUB implementations running on the same
GPU, respectively. Furthermore, LightScan runs up to 8.9 and 257.3 times faster
than Intel TBB running on 16 CPU cores and an Intel Xeon Phi 5110P coprocessor,
respectively. Source code of LightScan is available at
http://cupbb.sourceforge.net.
|
[
{
"version": "v1",
"created": "Sun, 17 Apr 2016 01:22:58 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Liu",
"Yongchao",
""
],
[
"Aluru",
"Srinivas",
""
]
] |
new_dataset
| 0.997437 |
1604.04953
|
Lianwen Jin
|
Zecheng Xie, Zenghui Sun, Lianwen Jin, Ziyong Feng, Shuye Zhang
|
Fully Convolutional Recurrent Network for Handwritten Chinese Text
Recognition
|
6 pages, 3 figures, 5 tables
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes an end-to-end framework, namely fully convolutional
recurrent network (FCRN) for handwritten Chinese text recognition (HCTR).
Unlike traditional methods that rely heavily on segmentation, our FCRN is
trained with online text data directly and learns to associate the pen-tip
trajectory with a sequence of characters. FCRN consists of four parts: a
path-signature layer to extract signature features from the input pen-tip
trajectory, a fully convolutional network to learn informative representation,
a sequence modeling layer to make per-frame predictions on the input sequence
and a transcription layer to translate the predictions into a label sequence.
The FCRN is end-to-end trainable in contrast to conventional methods whose
components are separately trained and tuned. We also present a refined beam
search method that efficiently integrates the language model to decode the FCRN
and significantly improve the recognition results.
We evaluate the performance of the proposed method on the test sets from the
databases CASIA-OLHWDB and ICDAR 2013 Chinese handwriting recognition
competition, and both achieve state-of-the-art performance with correct rates
of 96.40% and 95.00%, respectively.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2016 01:28:28 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Xie",
"Zecheng",
""
],
[
"Sun",
"Zenghui",
""
],
[
"Jin",
"Lianwen",
""
],
[
"Feng",
"Ziyong",
""
],
[
"Zhang",
"Shuye",
""
]
] |
new_dataset
| 0.971478 |
1604.04961
|
Changho Suh
|
Sunghyun Kim, Soheil Mohajer, Changho Suh
|
Role of a Relay in Bursty Multiple Access Channels
|
26 pages, 13 figures, submitted to the IEEE Transactions on
Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the role of a relay in multiple access channels (MACs) with
bursty user traffic, where intermittent data traffic restricts the users to
bursty transmissions. As our main result, we characterize the degrees of
freedom (DoF) region of a $K$-user bursty multi-input multi-output (MIMO)
Gaussian MAC with a relay, where Bernoulli random states are introduced to
govern bursty user transmissions. To that end, we extend the noisy network
coding scheme to achieve the cut-set bound. Our main contribution is in
exploring the role of a relay from various perspectives. First, we show that a
relay can provide a DoF gain in bursty channels, unlike in conventional
non-bursty channels. Interestingly, we find that the relaying gain can scale
with additional antennas at the relay to some extent. Moreover, observing that
a relay can help achieve collision-free performances, we establish the
necessary and sufficient condition for attaining collision-free DoF. Lastly, we
consider scenarios in which some physical perturbation shared around the users
may generate data traffic simultaneously, causing transmission patterns across
them to be correlated. We demonstrate that for most cases in such scenarios,
the relaying gain is greater when the users' transmission patterns are more
correlated, hence when more severe collisions take place. Our results have
practical implications in various scenarios of wireless networks such as
device-to-device systems and random media access control protocols.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2016 02:14:44 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Kim",
"Sunghyun",
""
],
[
"Mohajer",
"Soheil",
""
],
[
"Suh",
"Changho",
""
]
] |
new_dataset
| 0.988198 |
1604.04968
|
Xiaohu Ge
|
Xiaohu Ge, Ran Zi, Haichao Wang, Jing Zhang, Minho Jo
|
Multi-user Massive MIMO Communication Systems Based on Irregular Antenna
Arrays
|
15 pages, 8 figures
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In practical mobile communication engineering applications, surfaces of
antenna array deployment regions are usually uneven. Therefore, massive
multi-input-multi-output (MIMO) communication systems usually transmit wireless
signals by irregular antenna arrays. To evaluate the performance of irregular
antenna arrays, the matrix correlation coefficient and ergodic received gain
are defined for massive MIMO communication systems with mutual coupling
effects. Furthermore, the lower bound of the ergodic achievable rate, symbol
error rate (SER) and average outage probability are firstly derived for
multi-user massive MIMO communication systems using irregular antenna arrays.
Asymptotic results are also derived when the number of antennas approaches
infinity. Numerical results indicate that there exists a maximum achievable
rate when the number of antennas keeps increasing in massive MIMO communication
systems using irregular antenna arrays. Moreover, the irregular antenna array
outperforms the regular antenna array in the achievable rate of massive MIMO
communication systems when the number of antennas is larger than or equal to a
given threshold.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2016 03:07:26 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Ge",
"Xiaohu",
""
],
[
"Zi",
"Ran",
""
],
[
"Wang",
"Haichao",
""
],
[
"Zhang",
"Jing",
""
],
[
"Jo",
"Minho",
""
]
] |
new_dataset
| 0.988289 |
1604.05058
|
Anna Engelmann
|
Anna Engelmann and Admela Jukan
|
Optical Onion Routing
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As more and more data is transmitted in the configurable optical layer,
whereby all optical switches forward packets without electronic layers
involved, we envision privacy as the intrinsic property of future optical
networks. In this paper, we propose Optical Onion Routing (OOR) routing and
forwarding techniques, inspired by the onion routing in the Internet layer, the
best known realization of anonymous communication today, but designed with
specific features innate to optical networks. We propose to design the optical
anonymization network system with a new optical anonymization node
architecture, including the optical components and their electronic
counterparts to realize layered encryption. We propose modification to the
secret key generation using Linear Feedback Shift Register (LFSR), able to
utilize different primitive irreducible polynomials, and the usage optical XOR
operation as encryption, an important optical technology coming of age. We
prove formally that, for the proposed encryption techniques and distribution of
secret information, the optical onion network is perfectly private and secure.
The paper aims at providing practical foundations for privacy-enhancing optical
network technologies.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2016 09:44:51 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Engelmann",
"Anna",
""
],
[
"Jukan",
"Admela",
""
]
] |
new_dataset
| 0.998128 |
1604.05103
|
Ond\v{r}ej Such\'y
|
Ond\v{r}ej Such\'y
|
On Directed Steiner Trees with Multiple Roots
|
28 pages, 3 figures
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new Steiner-type problem for directed graphs named
\textsc{$q$-Root Steiner Tree}. Here one is given a directed graph $G=(V,A)$
and two subsets of its vertices, $R$ of size $q$ and $T$, and the task is to
find a minimum size subgraph of $G$ that contains a path from each vertex of
$R$ to each vertex of $T$. The special case of this problem with $q=1$ is the
well known \textsc{Directed Steiner Tree} problem, while the special case with
$T=R$ is the \textsc{Strongly Connected Steiner Subgraph} problem.
We first show that the problem is W[1]-hard with respect to $|T|$ for any $q
\ge 2$. Then we restrict ourselves to instances with $R \subseteq T$.
Generalizing the methods of Feldman and Ruhl [SIAM J. Comput. 2006], we present
an algorithm for this restriction with running time $O(2^{2q+4|T|}\cdot
n^{2q+O(1)})$, i.e., this restriction is FPT with respect to $|T|$ for any
constant $q$. We further show that we can, without significantly affecting the
achievable running time, loosen the restriction to only requiring that in the
solution there are a vertex $v$ and a path from each vertex of $R$ to $v$ and
from $v$ to each vertex of~$T$.
Finally, we use the methods of Chitnis et al. [SODA 2014] to show that the
restricted version can be solved in planar graphs in $O(2^{O(q \log q+|T|\log
q)}\cdot n^{O(\sqrt{q})})$ time.
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2016 11:49:34 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Suchý",
"Ondřej",
""
]
] |
new_dataset
| 0.997809 |
1604.05144
|
Jifeng Dai
|
Di Lin, Jifeng Dai, Jiaya Jia, Kaiming He, Jian Sun
|
ScribbleSup: Scribble-Supervised Convolutional Networks for Semantic
Segmentation
|
accepted by CVPR 2016
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large-scale data is of crucial importance for learning semantic segmentation
models, but annotating per-pixel masks is a tedious and inefficient procedure.
We note that for the topic of interactive image segmentation, scribbles are
very widely used in academic research and commercial software, and are
recognized as one of the most user-friendly ways of interacting. In this paper,
we propose to use scribbles to annotate images, and develop an algorithm to
train convolutional networks for semantic segmentation supervised by scribbles.
Our algorithm is based on a graphical model that jointly propagates information
from scribbles to unmarked pixels and learns network parameters. We present
competitive object semantic segmentation results on the PASCAL VOC dataset by
using scribbles as annotations. Scribbles are also favored for annotating stuff
(e.g., water, sky, grass) that has no well-defined shape, and our method shows
excellent results on the PASCAL-CONTEXT dataset thanks to extra inexpensive
scribble annotations. Our scribble annotations on PASCAL VOC are available at
http://research.microsoft.com/en-us/um/people/jifdai/downloads/scribble_sup
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2016 13:46:23 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Lin",
"Di",
""
],
[
"Dai",
"Jifeng",
""
],
[
"Jia",
"Jiaya",
""
],
[
"He",
"Kaiming",
""
],
[
"Sun",
"Jian",
""
]
] |
new_dataset
| 0.997965 |
1604.05210
|
Benjamin Irving
|
Benjamin Irving, James M Franklin, Bartlomiej W Papiez, Ewan M
Anderson, Ricky A Sharma, Fergus V Gleeson, Sir Michael Brady and Julia A
Schnabel
|
Pieces-of-parts for supervoxel segmentation with global context:
Application to DCE-MRI tumour delineation
|
accepted for publication in the Journal of Medical Image Analysis
| null |
10.1016/j.media.2016.03.002
| null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Rectal tumour segmentation in dynamic contrast-enhanced MRI (DCE-MRI) is a
challenging task, and an automated and consistent method would be highly
desirable to improve the modelling and prediction of patient outcomes from
tissue contrast enhancement characteristics - particularly in routine clinical
practice. A framework is developed to automate DCE-MRI tumour segmentation, by
introducing: perfusion-supervoxels to over-segment and classify DCE-MRI volumes
using the dynamic contrast enhancement characteristics; and the pieces-of-parts
graphical model, which adds global (anatomic) constraints that further refine
the supervoxel components that comprise the tumour. The framework was evaluated
on 23 DCE-MRI scans of patients with rectal adenocarcinomas, and achieved a
voxelwise area-under the receiver operating characteristic curve (AUC) of 0.97
compared to expert delineations. Creating a binary tumour segmentation, 21 of
the 23 cases were segmented correctly with a median Dice similarity coefficient
(DSC) of 0.63, which is close to the inter-rater variability of this
challenging task. A sec- ond study is also included to demonstrate the method's
generalisability and achieved a DSC of 0.71. The framework achieves promising
results for the underexplored area of rectal tumour segmentation in DCE-MRI,
and the methods have potential to be applied to other DCE-MRI and supervoxel
segmentation problems
|
[
{
"version": "v1",
"created": "Mon, 18 Apr 2016 15:31:22 GMT"
}
] | 2016-04-19T00:00:00 |
[
[
"Irving",
"Benjamin",
""
],
[
"Franklin",
"James M",
""
],
[
"Papiez",
"Bartlomiej W",
""
],
[
"Anderson",
"Ewan M",
""
],
[
"Sharma",
"Ricky A",
""
],
[
"Gleeson",
"Fergus V",
""
],
[
"Brady",
"Sir Michael",
""
],
[
"Schnabel",
"Julia A",
""
]
] |
new_dataset
| 0.999094 |
1307.4532
|
Martianus Frederic Ezerman
|
Martianus Frederic Ezerman, Somphong Jitman, and Patrick Sol\'e
|
Xing-Ling Codes, Duals of their Subcodes, and Good Asymmetric Quantum
Codes
|
To appear in Designs, Codes and Cryptography (accepted Sep. 27, 2013)
|
Designs, Codes and Cryptography. April 2015, Volume 75, Issue 1,
pp 21-42
|
10.1007/s10623-013-9885-5
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A class of powerful $q$-ary linear polynomial codes originally proposed by
Xing and Ling is deployed to construct good asymmetric quantum codes via the
standard CSS construction. Our quantum codes are $q$-ary block codes that
encode $k$ qudits of quantum information into $n$ qudits and correct up to
$\flr{(d_{x}-1)/2}$ bit-flip errors and up to $\flr{(d_{z}-1)/2}$ phase-flip
errors.. In many cases where the length $(q^{2}-q)/2 \leq n \leq (q^{2}+q)/2$
and the field size $q$ are fixed and for chosen values of $d_{x} \in
\{2,3,4,5\}$ and $d_{z} \ge \delta$, where $\delta$ is the designed distance of
the Xing-Ling (XL) codes, the derived pure $q$-ary asymmetric quantum CSS codes
possess the best possible size given the current state of the art knowledge on
the best classical linear block codes.
|
[
{
"version": "v1",
"created": "Wed, 17 Jul 2013 08:29:12 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Sep 2013 09:48:25 GMT"
}
] | 2016-04-18T00:00:00 |
[
[
"Ezerman",
"Martianus Frederic",
""
],
[
"Jitman",
"Somphong",
""
],
[
"Solé",
"Patrick",
""
]
] |
new_dataset
| 0.99919 |
1412.6065
|
Elmar Langetepe
|
Rolf Klein (1), Elmar Langetepe (1), Christos Levcopoulos (2) ((1)
University of Bonn, Germany, Institute of Computer Science I, (2) University
of Lund, Sweden, Department of Computer Science)
|
A Fire Fighter's Problem
|
A preliminary version of the paper was presented at SoCG 2015
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Suppose that a circular fire spreads in the plane at unit speed. A single
fire fighter can build a barrier at speed $v>1$. How large must $v$ be to
ensure that the fire can be contained, and how should the fire fighter proceed?
We contribute two results.
First, we analyze the natural curve $\mbox{FF}_v$ that develops when the
fighter keeps building, at speed $v$, a barrier along the boundary of the
expanding fire. We prove that the behavior of this spiralling curve is governed
by a complex function $(e^{w Z} - s \, Z)^{-1}$, where $w$ and $s$ are real
functions of $v$. For $v>v_c=2.6144 \ldots$ all zeroes are complex conjugate
pairs. If $\phi$ denotes the complex argument of the conjugate pair nearest to
the origin then, by residue calculus, the fire fighter needs $\Theta( 1/\phi)$
rounds before the fire is contained. As $v$ decreases towards $v_c$ these two
zeroes merge into a real one, so that argument $\phi$ goes to~0. Thus, curve
$\mbox{FF}_v$ does not contain the fire if the fighter moves at speed $v=v_c$.
(That speed $v>v_c$ is sufficient for containing the fire has been proposed
before by Bressan et al. [7], who constructed a sequence of logarithmic spiral
segments that stay strictly away from the fire.)
Second, we show that any curve that visits the four coordinate half-axes in
cyclic order, and in inreasing distances from the origin, needs speed
$v>1.618\ldots$, the golden ratio, in order to contain the fire.
Keywords: Motion Planning, Dynamic Environments, Spiralling strategies, Lower
and upper bounds
|
[
{
"version": "v1",
"created": "Tue, 2 Dec 2014 10:46:13 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Apr 2016 13:14:03 GMT"
}
] | 2016-04-18T00:00:00 |
[
[
"Klein",
"Rolf",
""
],
[
"Langetepe",
"Elmar",
""
],
[
"Levcopoulos",
"Christos",
""
]
] |
new_dataset
| 0.994007 |
1501.05432
|
Xingyu Wu
|
Xingyu Wu and Xia Mao and Lijiang Chen and Yuli Xue and Angelo Compare
|
Point Context: An Effective Shape Descriptor for RST-invariant
Trajectory Recognition
|
11 pages, 10 figures
|
Journal of Mathematical Imaging and Vision, 2016
|
10.1007/s10851-016-0648-6
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motion trajectory recognition is important for characterizing the moving
property of an object. The speed and accuracy of trajectory recognition rely on
a compact and discriminative feature representation, and the situations of
varying rotation, scaling and translation has to be specially considered. In
this paper we propose a novel feature extraction method for trajectories.
Firstly a trajectory is represented by a proposed point context, which is a
rotation-scale-translation (RST) invariant shape descriptor with a flexible
tradeoff between computational complexity and discrimination, yet we prove that
it is a complete shape descriptor. Secondly, the shape context is nonlinearly
mapped to a subspace by kernel nonparametric discriminant analysis (KNDA) to
get a compact feature representation, and thus a trajectory is projected to a
single point in a low-dimensional feature space. Experimental results show
that, the proposed trajectory feature shows encouraging improvement than
state-of-art methods.
|
[
{
"version": "v1",
"created": "Thu, 22 Jan 2015 09:10:28 GMT"
}
] | 2016-04-18T00:00:00 |
[
[
"Wu",
"Xingyu",
""
],
[
"Mao",
"Xia",
""
],
[
"Chen",
"Lijiang",
""
],
[
"Xue",
"Yuli",
""
],
[
"Compare",
"Angelo",
""
]
] |
new_dataset
| 0.996957 |
1509.01531
|
Sean Meyn
|
Joel Mathias, Rim Kaddah, Ana Bu\v{s}i\'c, Sean Meyn
|
Smart Fridge / Dumb Grid? Demand Dispatch for the Power Grid of 2020
| null |
Proc. 49th Annual Hawaii International Conference on System
Sciences (HICSS), 2016
|
10.1109/HICSS.2016.312
| null |
cs.SY math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In discussions at the 2015 HICSS meeting, it was argued that loads can
provide most of the ancillary services required today and in the future.
Through load-level and grid-level control design, high-quality ancillary
service for the grid is obtained without impacting quality of service delivered
to the consumer. This approach to grid regulation is called demand dispatch:
loads are providing service continuously and automatically, without consumer
interference.
In this paper we ask, what intelligence is required at the grid-level? In
particular, does the grid-operator require more than one-way communication to
the loads? Our main conclusion: risk is not great in lower frequency ranges,
e.g., PJM's RegA or BPA's balancing reserves. In particular, ancillary services
from refrigerators and pool-pumps can be obtained successfully with only
one-way communication. This requires intelligence at the loads, and much less
intelligence at the grid level.
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2015 17:12:44 GMT"
}
] | 2016-04-18T00:00:00 |
[
[
"Mathias",
"Joel",
""
],
[
"Kaddah",
"Rim",
""
],
[
"Bušić",
"Ana",
""
],
[
"Meyn",
"Sean",
""
]
] |
new_dataset
| 0.974325 |
1604.04291
|
Xia Li
|
Xia Li, Zhen Hu, Robert C. Qiu
|
MIMO UWB Radar System with Compressive Sensing
|
4 pages
| null | null | null |
cs.IT cs.SY math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A multiple input multiple output ultra-wideband cognitive radar based on
compressive sensing is presented in this letter. For traditional UWB radar,
high sampling rate analog to digital converter at the receiver is required to
meet Shannon theorem, which increases hardware complexity. In order to bypass
the bottleneck of ADC or further increase the radar bandwidth using the latest
wideband ADC, we propose to exploit CS for signal reconstruction at the
receiver of UWB radar for the sparse targets in the surveillance area. Besides,
the function of narrowband interference cancellation is integrated into the
proposed MIMO UWB radar. The field demonstration proves the feasibility and
reliability of the proposed algorithm.
|
[
{
"version": "v1",
"created": "Thu, 14 Apr 2016 23:58:13 GMT"
}
] | 2016-04-18T00:00:00 |
[
[
"Li",
"Xia",
""
],
[
"Hu",
"Zhen",
""
],
[
"Qiu",
"Robert C.",
""
]
] |
new_dataset
| 0.999485 |
1604.04427
|
Petr Vabishchevich N.
|
Petr N. Vabishchevich
|
A Singularly Perturbed Boundary Value Problems with Fractional Powers of
Elliptic Operators
|
12 pages, 1 figure. arXiv admin note: text overlap with
arXiv:1510.08297, arXiv:1412.5706
| null | null | null |
cs.NA math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A boundary value problem for a fractional power $0 < \varepsilon < 1$ of the
second-order elliptic operator is considered. The boundary value problem is
singularly perturbed when $\varepsilon \rightarrow 0$. It is solved numerically
using a time-dependent problem for a pseudo-parabolic equation. For the
auxiliary Cauchy problem, the standard two-level schemes with weights are
applied. The numerical results are presented for a model two-dimen\-sional
boundary value problem with a fractional power of an elliptic operator. Our
work focuses on the solution of the boundary value problem with $0 <
\varepsilon \ll 1$.
|
[
{
"version": "v1",
"created": "Fri, 15 Apr 2016 10:55:47 GMT"
}
] | 2016-04-18T00:00:00 |
[
[
"Vabishchevich",
"Petr N.",
""
]
] |
new_dataset
| 0.999033 |
1604.04465
|
Stefan Schmid
|
Liron Schiff and Stefan Schmid
|
PRI: Privacy Preserving Inspection of Encrypted Network Traffic
| null | null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Traffic inspection is a fundamental building block of many security solutions
today. For example, to prevent the leakage or exfiltration of confidential
insider information, as well as to block malicious traffic from entering the
network, most enterprises today operate intrusion detection and prevention
systems that inspect traffic. However, the state-of-the-art inspection systems
do not reflect well the interests of the different involved autonomous roles.
For example, employees in an enterprise, or a company outsourcing its network
management to a specialized third party, may require that their traffic remains
confidential, even from the system administrator. Moreover, the rules used by
the intrusion detection system, or more generally the configuration of an
online or offline anomaly detection engine, may be provided by a third party,
e.g., a security research firm, and can hence constitute a critical business
asset which should be kept confidential. Today, it is often believed that
accounting for these additional requirements is impossible, as they contradict
efficiency and effectiveness. We in this paper explore a novel approach, called
Privacy Preserving Inspection (PRI), which provides a solution to this problem,
by preserving privacy of traffic inspection and confidentiality of inspection
rules and configurations, and e.g., also supports the flexible installation of
additional Data Leak Prevention (DLP) rules specific to the company.
|
[
{
"version": "v1",
"created": "Fri, 15 Apr 2016 12:48:05 GMT"
}
] | 2016-04-18T00:00:00 |
[
[
"Schiff",
"Liron",
""
],
[
"Schmid",
"Stefan",
""
]
] |
new_dataset
| 0.999088 |
1602.01412
|
Hang Qu
|
Hang Qu, Omid Mashayekhi, David Terei, Philip Levis
|
Canary: A Scheduling Architecture for High Performance Cloud Computing
|
We have some presentation issues with the paper
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present Canary, a scheduling architecture that allows high performance
analytics workloads to scale out to run on thousands of cores. Canary is
motivated by the observation that a central scheduler is a bottleneck for high
performance codes: a handful of multicore workers can execute tasks faster than
a controller can schedule them.
The key insight in Canary is to reverse the responsibilities between
controllers and workers. Rather than dispatch tasks to workers, which then
fetch data as necessary, in Canary the controller assigns data partitions to
workers, which then spawn and schedule tasks locally.
We evaluate three benchmark applications in Canary on up to 64 servers and
1,152 cores on Amazon EC2. Canary achieves up to 9-90X speedup over Spark and
up to 4X speedup over GraphX, a highly optimized graph analytics engine. While
current centralized schedulers can schedule 2,500 tasks/second, each Canary
worker can schedule 136,000 tasks/second per core and experiments show this
scales out linearly, with 64 workers scheduling over 120 million tasks per
second, allowing Canary to support optimized jobs running on thousands of
cores.
|
[
{
"version": "v1",
"created": "Wed, 3 Feb 2016 18:58:25 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Apr 2016 17:28:06 GMT"
}
] | 2016-04-15T00:00:00 |
[
[
"Qu",
"Hang",
""
],
[
"Mashayekhi",
"Omid",
""
],
[
"Terei",
"David",
""
],
[
"Levis",
"Philip",
""
]
] |
new_dataset
| 0.999757 |
1604.02706
|
Ashkan Kalantari
|
Ashkan Kalantari, Mojtaba Soltanalian, Sina Maleki, Symeon
Chatzinotas, and Bj\"orn Ottersten
|
Secure M-PSK Communication via Directional Modulation
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, a directional modulation-based technique is devised to enhance
the security of a multi-antenna wireless communication system employing M-PSK
modulation to convey information. The directional modulation method operates by
steering the array beam in such a way that the phase of the received signal at
the receiver matches that of the intended M-PSK symbol. Due to the difference
between the channels of the legitimate receiver and the eavesdropper, the
signals received by the eavesdropper generally encompass a phase component
different than the actual symbols. As a result, the transceiver which employs
directional modulation can impose a high symbol error rate on the eavesdropper
without requiring to know the eavesdropper's channel. The optimal directional
modulation beamformer is designed to minimize the consumed power subject to
satisfying a specific resulting phase and minimal signal amplitude at each
antenna of the legitimate receiver. The simulation results show that the
directional modulation results in a much higher symbol error rate at the
eavesdropper compared to the conventional benchmark scheme, i.e., zero-forcing
precoding at the transmitter.
|
[
{
"version": "v1",
"created": "Sun, 10 Apr 2016 15:39:07 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Apr 2016 09:43:35 GMT"
}
] | 2016-04-15T00:00:00 |
[
[
"Kalantari",
"Ashkan",
""
],
[
"Soltanalian",
"Mojtaba",
""
],
[
"Maleki",
"Sina",
""
],
[
"Chatzinotas",
"Symeon",
""
],
[
"Ottersten",
"Björn",
""
]
] |
new_dataset
| 0.995064 |
1604.03962
|
Mark Reynolds
|
Mark Reynolds
|
A traditional tree-style tableau for LTL
|
33 pages
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Propositional linear time temporal logic (LTL) is the standard temporal logic
for computing applications and many reasoning techniques and tools have been
developed for it. Tableaux for deciding satisfiability have existed since the
1980s. However, the tableaux for this logic do not look like traditional
tree-shaped tableau systems and their processing is often quite complicated. We
present a new simple traditional-style tree-shaped tableau for LTL and prove
that it is sound and complete. As well as being simple to understand, to
introduce to students and to use manually, it also seems simple to implement
and promises to be competitive in its automation. It is particularly suitable
for parallel implementations.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2016 20:18:29 GMT"
}
] | 2016-04-15T00:00:00 |
[
[
"Reynolds",
"Mark",
""
]
] |
new_dataset
| 0.999284 |
1604.03968
|
Francis Ferraro
|
Ting-Hao (Kenneth) Huang, Francis Ferraro, Nasrin Mostafazadeh, Ishan
Misra, Aishwarya Agrawal, Jacob Devlin, Ross Girshick, Xiaodong He, Pushmeet
Kohli, Dhruv Batra, C. Lawrence Zitnick, Devi Parikh, Lucy Vanderwende,
Michel Galley, Margaret Mitchell
|
Visual Storytelling
|
to appear in NAACL 2016
| null | null | null |
cs.CL cs.AI cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the first dataset for sequential vision-to-language, and explore
how this data may be used for the task of visual storytelling. The first
release of this dataset, SIND v.1, includes 81,743 unique photos in 20,211
sequences, aligned to both descriptive (caption) and story language. We
establish several strong baselines for the storytelling task, and motivate an
automatic metric to benchmark progress. Modelling concrete description as well
as figurative and social language, as provided in this dataset and the
storytelling task, has the potential to move artificial intelligence from basic
understandings of typical visual scenes towards more and more human-like
understanding of grounded event structure and subjective expression.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2016 20:27:43 GMT"
}
] | 2016-04-15T00:00:00 |
[
[
"Ting-Hao",
"",
"",
"Kenneth"
],
[
"Huang",
"",
""
],
[
"Ferraro",
"Francis",
""
],
[
"Mostafazadeh",
"Nasrin",
""
],
[
"Misra",
"Ishan",
""
],
[
"Agrawal",
"Aishwarya",
""
],
[
"Devlin",
"Jacob",
""
],
[
"Girshick",
"Ross",
""
],
[
"He",
"Xiaodong",
""
],
[
"Kohli",
"Pushmeet",
""
],
[
"Batra",
"Dhruv",
""
],
[
"Zitnick",
"C. Lawrence",
""
],
[
"Parikh",
"Devi",
""
],
[
"Vanderwende",
"Lucy",
""
],
[
"Galley",
"Michel",
""
],
[
"Mitchell",
"Margaret",
""
]
] |
new_dataset
| 0.999811 |
1604.04139
|
Yassine Hachaichi
|
Yassine Hacha\"ichi (LAMSIN)
|
Logic for Unambiguous Context-Free Languages
| null |
International Journal of Computer Science Theory and Application,
ORB Academic Publisher, 2016, 5 (1), pp.12-19
| null | null |
cs.FL cs.CC cs.DM cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give in this paper a logical characterization for unambiguous Context Free
Languages, in the vein of descriptive complexity. A fragment of the logic
characterizing context free languages given by Lautemann, Schwentick and
Th\'erien [18] based on implicit definability is used for this aim. We obtain a
new connection between two undecidable problems, a logical one and a language
theoretical one.
|
[
{
"version": "v1",
"created": "Wed, 13 Apr 2016 09:40:14 GMT"
}
] | 2016-04-15T00:00:00 |
[
[
"Hachaïchi",
"Yassine",
"",
"LAMSIN"
]
] |
new_dataset
| 0.971855 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.