id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1604.04146
Xin-She Yang
E. Osaba, Xin-She Yang, F. Diaz, E. Onieva, A. D. Masegosa, A. Perallos
A Discrete Firefly Algorithm to Solve a Rich Vehicle Routing Problem Modelling a Newspaper Distribution System with Recycling Policy
7 tables and 4 figures
null
10.1007/s00500-016-2114-1
null
cs.NE cs.AI math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A real-world newspaper distribution problem with recycling policy is tackled in this work. In order to meet all the complex restrictions contained in such a problem, it has been modeled as a rich vehicle routing problem, which can be more specifically considered as an asymmetric and clustered vehicle routing problem with simultaneous pickup and deliveries, variable costs and forbidden paths (AC-VRP-SPDVCFP). This is the first study of such a problem in the literature. For this reason, a benchmark composed by 15 instances has been also proposed. In the design of this benchmark, real geographical positions have been used, located in the province of Bizkaia, Spain. For the proper treatment of this AC-VRP-SPDVCFP, a discrete firefly algorithm (DFA) has been developed. This application is the first application of the firefly algorithm to any rich vehicle routing problem. To prove that the proposed DFA is a promising technique, its performance has been compared with two other well-known techniques: an evolutionary algorithm and an evolutionary simulated annealing. Our results have shown that the DFA has outperformed these two classic meta-heuristics.
[ { "version": "v1", "created": "Thu, 14 Apr 2016 13:25:42 GMT" } ]
2016-04-15T00:00:00
[ [ "Osaba", "E.", "" ], [ "Yang", "Xin-She", "" ], [ "Diaz", "F.", "" ], [ "Onieva", "E.", "" ], [ "Masegosa", "A. D.", "" ], [ "Perallos", "A.", "" ] ]
new_dataset
0.998811
1604.04205
James Ross
James A. Ross, David A. Richie
Implementing OpenSHMEM for the Adapteva Epiphany RISC Array Processor
4 pages, 1 figure, accepted to ICCS'16 ALCHEMY workshop
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The energy-efficient Adapteva Epiphany architecture exhibits massive many-core scalability in a physically compact 2D array of RISC cores with a fast network-on-chip (NoC). With fully divergent cores capable of MIMD execution, the physical topology and memory-mapped capabilities of the core and network translate well to partitioned global address space (PGAS) parallel programming models. Following an investigation into the use of two-sided communication using threaded MPI, one-sided communication using SHMEM is being explored. Here we present work in progress on the development of an OpenSHMEM 1.2 implementation for the Epiphany architecture.
[ { "version": "v1", "created": "Thu, 14 Apr 2016 16:20:55 GMT" } ]
2016-04-15T00:00:00
[ [ "Ross", "James A.", "" ], [ "Richie", "David A.", "" ] ]
new_dataset
0.970642
1604.04217
Ioannis Lamprou
Ioannis Lamprou, Russell Martin, Sven Schewe
Fast Two-Robot Disk Evacuation with Wireless Communication
18 pages, 10 figures
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the fast evacuation problem, we study the path planning problem for two robots who want to minimize the worst-case evacuation time on the unit disk. The robots are initially placed at the center of the disk. In order to evacuate, they need to reach an unknown point, the exit, on the boundary of the disk. Once one of the robots finds the exit, it will instantaneously notify the other agent, who will make a beeline to it. The problem has been studied for robots with the same speed~\cite{s1}. We study a more general case where one robot has speed $1$ and the other has speed $s \geq 1$. We provide optimal evacuation strategies in the case that $s \geq c_{2.75} \approx 2.75$ by showing matching upper and lower bounds on the worst-case evacuation time. For $1\leq s < c_{2.75}$, we show (non-matching) upper and lower bounds on the evacuation time with a ratio less than $1.22$. Moreover, we demonstrate that a generalization of the two-robot search strategy from~\cite{s1} is outperformed by our proposed strategies for any $s \geq c_{1.71} \approx 1.71$.
[ { "version": "v1", "created": "Thu, 14 Apr 2016 16:58:07 GMT" } ]
2016-04-15T00:00:00
[ [ "Lamprou", "Ioannis", "" ], [ "Martin", "Russell", "" ], [ "Schewe", "Sven", "" ] ]
new_dataset
0.996773
1506.08726
Swen Jacobs
Swen Jacobs, Roderick Bloem, Romain Brenguier, R\"udiger Ehlers, Timotheus Hell, Robert K\"onighofer, Guillermo A. P\'erez, Jean-Fran\c{c}ois Raskin, Leonid Ryzhyk, Ocan Sankur, Martina Seidl, Leander Tentrup, Adam Walker
The First Reactive Synthesis Competition (SYNTCOMP 2014)
24 pages, published in STTT
International Journal on Software Tools for Technology Transfer, Online First, 2016, pp 1-24
10.1007/s10009-016-0416-3
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the reactive synthesis competition (SYNTCOMP), a long-term effort intended to stimulate and guide advances in the design and application of synthesis procedures for reactive systems. The first iteration of SYNTCOMP is based on the controller synthesis problem for finite-state systems and safety specifications. We provide an overview of this problem and existing approaches to solve it, and report on the design and results of the first SYNTCOMP. This includes the definition of the benchmark format, the collection of benchmarks, the rules of the competition, and the five synthesis tools that participated. We present and analyze the results of the competition and draw conclusions on the state of the art. Finally, we give an outlook on future directions of SYNTCOMP.
[ { "version": "v1", "created": "Mon, 29 Jun 2015 16:45:03 GMT" }, { "version": "v2", "created": "Mon, 22 Feb 2016 13:55:42 GMT" }, { "version": "v3", "created": "Wed, 13 Apr 2016 07:34:07 GMT" } ]
2016-04-14T00:00:00
[ [ "Jacobs", "Swen", "" ], [ "Bloem", "Roderick", "" ], [ "Brenguier", "Romain", "" ], [ "Ehlers", "Rüdiger", "" ], [ "Hell", "Timotheus", "" ], [ "Könighofer", "Robert", "" ], [ "Pérez", "Guillermo A.", "" ], [ "Raskin", "Jean-François", "" ], [ "Ryzhyk", "Leonid", "" ], [ "Sankur", "Ocan", "" ], [ "Seidl", "Martina", "" ], [ "Tentrup", "Leander", "" ], [ "Walker", "Adam", "" ] ]
new_dataset
0.999616
1604.03570
Weiqun Zhang
Weiqun Zhang and Ann Almgren and Marcus Day and Tan Nguyen and John Shalf and Didem Unat
BoxLib with Tiling: An AMR Software Framework
Accepted for publication in SIAM J. on Scientific Computing
null
null
null
cs.MS physics.comp-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a block-structured adaptive mesh refinement (AMR) software framework that incorporates tiling, a well-known loop transformation. Because the multiscale, multiphysics codes built in BoxLib are designed to solve complex systems at high resolution, performance on current and next generation architectures is essential. With the expectation of many more cores per node on next generation architectures, the ability to effectively utilize threads within a node is essential, and the current model for parallelization will not be sufficient. We describe a new version of BoxLib in which the tiling constructs are embedded so that BoxLib-based applications can easily realize expected performance gains without extra effort on the part of the application developer. We also discuss a path forward to enable future versions of BoxLib to take advantage of NUMA-aware optimizations using the TiDA portable library.
[ { "version": "v1", "created": "Tue, 12 Apr 2016 20:13:04 GMT" } ]
2016-04-14T00:00:00
[ [ "Zhang", "Weiqun", "" ], [ "Almgren", "Ann", "" ], [ "Day", "Marcus", "" ], [ "Nguyen", "Tan", "" ], [ "Shalf", "John", "" ], [ "Unat", "Didem", "" ] ]
new_dataset
0.980637
1604.03607
Dylan Hutchison
Dylan Hutchison, Bill Howe, Dan Suciu
Lara: A Key-Value Algebra underlying Arrays and Relations
Working draft
null
null
null
cs.DB cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data processing systems roughly group into families such as relational, array, graph, and key-value. Many data processing tasks exceed the capabilities of any one family, require data stored across families, or run faster when partitioned onto multiple families. Discovering ways to execute computation among multiple available systems, let alone discovering an optimal execution plan, is challenging given semantic differences between disparate families of systems. In this paper we introduce a new algebra, Lara, which underlies and unifies algebras representing the families above in order to facilitate translation between systems. We describe the operations and objects of Lara---union, join, and ext on associative tables---and show her properties and equivalences to other algebras. Multi-system optimization has a bright future, in which we proffer Lara for the role of universal connector.
[ { "version": "v1", "created": "Tue, 12 Apr 2016 22:22:16 GMT" } ]
2016-04-14T00:00:00
[ [ "Hutchison", "Dylan", "" ], [ "Howe", "Bill", "" ], [ "Suciu", "Dan", "" ] ]
new_dataset
0.990208
1604.03612
Mostafa El-Khamy
Mostafa El-Khamy, Hsien-Ping Lin, and Jungwon Lee
Binary Polar Codes are Optimized Codes for Bitwise Multistage Decoding
Accepted at Electronics Letters
null
10.1049/el.2016.0837
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes are considered the latest major breakthrough in coding theory. Polar codes were introduced by Ar{\i}kan in 2008. In this letter, we show that the binary polar codes are the same as the optimized codes for bitwise multistage decoding (OCBM), which have been discovered before by Stolte in 2002. The equivalence between the techniques used for the constructions and decodings of both codes is established.
[ { "version": "v1", "created": "Tue, 12 Apr 2016 23:05:23 GMT" } ]
2016-04-14T00:00:00
[ [ "El-Khamy", "Mostafa", "" ], [ "Lin", "Hsien-Ping", "" ], [ "Lee", "Jungwon", "" ] ]
new_dataset
0.999017
1604.03626
Norah Abokhodair
Norah Abokhodair, Sarah Vieweg
Privacy & Social Media in the Context of the Arab Gulf
12 pages, 1 figure
null
10.1145/2901790.2901873
null
cs.SI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Theories of privacy and how it relates to the use of Information Communication Technology (ICT) have been a topic of research for decades. However, little attention has been paid to the perception of privacy from the perspective of technology users in the Middle East. In this paper, we delve into interpretations of privacy from the approach of Arab Gulf citizens. We consider how privacy is practiced and understood in technology-mediated environments among this population, paying particular attention to the role of Islam and cultural traditions in constructing norms around privacy. We then offer culturally sensitive design principles and suggestions for future research that incorporates previously unexplored characteristics of privacy, which play a role in how users navigate social media.
[ { "version": "v1", "created": "Wed, 13 Apr 2016 01:00:13 GMT" } ]
2016-04-14T00:00:00
[ [ "Abokhodair", "Norah", "" ], [ "Vieweg", "Sarah", "" ] ]
new_dataset
0.989338
1604.03641
Brianna Ren
Brianna M. Ren, Jeffrey S. Foster
Just-in-Time Static Type Checking for Dynamic Languages
19 pages, 6 figures, 2 tables, 1 appendix, This is a preprint of a paper to appear in Programming Language Design and Implementation (PLDI 2016)
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamic languages such as Ruby, Python, and JavaScript have many compelling benefits, but the lack of static types means subtle errors can remain latent in code for a long time. While many researchers have developed various systems to bring some of the benefits of static types to dynamic languages, prior approaches have trouble dealing with metaprogramming, which generates code as the program executes. In this paper, we propose Hummingbird, a new system that uses a novel technique, just-in-time static type checking, to type check Ruby code even in the presence of metaprogramming. In Hummingbird, method type signatures are gathered dynamically at run-time, as those methods are created. When a method is called, Hummingbird statically type checks the method body against current type signatures. Thus, Hummingbird provides thorough static checks on a per-method basis, while also allowing arbitrarily complex metaprogramming. For performance, Hummingbird memoizes the static type checking pass, invalidating cached checks only if necessary. We formalize Hummingbird using a core, Ruby-like language and prove it sound. To evaluate Hummingbird, we applied it to six apps, including three that use Ruby on Rails, a powerful framework that relies heavily on metaprogramming. We found that all apps typecheck successfully using Hummingbird, and that Hummingbird's performance overhead is reasonable. We applied Hummingbird to earlier versions of one Rails app and found several type errors that had been introduced and then fixed. Lastly, we demonstrate using Hummingbird in Rails development mode to typecheck an app as live updates are applied to it.
[ { "version": "v1", "created": "Wed, 13 Apr 2016 03:04:17 GMT" } ]
2016-04-14T00:00:00
[ [ "Ren", "Brianna M.", "" ], [ "Foster", "Jeffrey S.", "" ] ]
new_dataset
0.998552
1604.03774
Hualu Liu
Xiusheng Liu and Hualu Liu
Matrix-Product Complementary dual Codes
17pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear complementary dual codes (LCD) are linear codes satisfying $C\cap C^{\perp}=\{0\}$. Under suitable conditions, matrix-product codes that are complementary dual codes are characterized. We construct LCD codes using quasi-orthogonal matrices. Some asymptotic results are derived.
[ { "version": "v1", "created": "Wed, 13 Apr 2016 13:55:40 GMT" } ]
2016-04-14T00:00:00
[ [ "Liu", "Xiusheng", "" ], [ "Liu", "Hualu", "" ] ]
new_dataset
0.999686
1604.03829
Tarun Choubisa
Raviteja Upadrashta, Tarun Choubisa, A. Praneeth, Tony G., Aswath V. S., P. Vijay Kumar, Sripad Kowshik, Hari Prasad Gokul R, T. V. Prabhakar
Animation and Chirplet-Based Development of a PIR Sensor Array for Intruder Classification in an Outdoor Environment
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the development of a passive infra-red sensor tower platform along with a classification algorithm to distinguish between human intrusion, animal intrusion and clutter arising from wind-blown vegetative movement in an outdoor environment. The research was aimed at exploring the potential use of wireless sensor networks as an early-warning system to help mitigate human-wildlife conflicts occurring at the edge of a forest. There are three important features to the development. Firstly, the sensor platform employs multiple sensors arranged in the form of a two-dimensional array to give it a key spatial-resolution capability that aids in classification. Secondly, given the challenges of collecting data involving animal intrusion, an Animation-based Simulation tool for Passive Infra-Red sEnsor (ASPIRE) was developed that simulates signals corresponding to human and animal intrusion and some limited models of vegetative clutter. This speeded up the process of algorithm development by allowing us to test different hypotheses in a time-efficient manner. Finally, a chirplet-based model for intruder signal was developed that significantly helped boost classification accuracy despite drawing data from a smaller number of sensors. An SVM-based classifier was used which made use of chirplet, energy and signal cross-correlation-based features. The average accuracy obtained for intruder detection and classification on real-world and simulated data sets was in excess of 97%.
[ { "version": "v1", "created": "Wed, 13 Apr 2016 15:26:32 GMT" } ]
2016-04-14T00:00:00
[ [ "Upadrashta", "Raviteja", "" ], [ "Choubisa", "Tarun", "" ], [ "Praneeth", "A.", "" ], [ "G.", "Tony", "" ], [ "S.", "Aswath V.", "" ], [ "Kumar", "P. Vijay", "" ], [ "Kowshik", "Sripad", "" ], [ "R", "Hari Prasad Gokul", "" ], [ "Prabhakar", "T. V.", "" ] ]
new_dataset
0.962812
1604.03848
Apala Ray
Apala Ray and Johan Akerberg and Mats Bjorkman and Mikael Gidlund
Employee Trust Based Industrial Device Deployment and Initial Key Establishment
Page 21-44, International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.1, January 2016
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An efficient key management system is required to support cryptography. Most key management systems use either pre-installed shared keys or install initial security parameters using out-of-band channels. These methods create an additional burden for engineers who manage the devices in industrial plants. Hence, device deployment in industrial plants becomes a challenging task in order to achieve security. In this work, we present a device deployment framework that can support key management using the existing trust towards employees in a plant. This approach reduces the access to initial security parameters by employees, rather it helps to bind the trust of the employee with device commissioning. Thus, this approach presents a unique solution to the device deployment problem. Further, through a proof-of-concept implementation and security analysis using the AVISPA tool, we present that our framework is feasible to implement and satisfies our security objectives.
[ { "version": "v1", "created": "Wed, 13 Apr 2016 16:03:09 GMT" } ]
2016-04-14T00:00:00
[ [ "Ray", "Apala", "" ], [ "Akerberg", "Johan", "" ], [ "Bjorkman", "Mats", "" ], [ "Gidlund", "Mikael", "" ] ]
new_dataset
0.997528
1604.03871
Maria Potop-Butucaru
Silvia Bonomi (DIAG), Antonella Del Pozzo (NPA, DIAG), Maria Potop-Butucaru (NPA), S\'ebastien Tixeuil (NPA)
Approximate Agreement under Mobile Byzantine Faults
null
null
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we address Approximate Agreement problem in the Mobile Byzantine faults model. Our contribution is threefold. First, we propose the the first mapping from the existing variants of Mobile Byzantine models to the Mixed-Mode faults model.This mapping further help us to prove the correctness of class MSR (Mean-Subsequence-Reduce) Approximate Agreement algorithms in the Mobile Byzantine fault model, and is of independent interest. Secondly, we prove lower bounds for solving Approximate Agreement under all existing Mobile Byzantine faults models. Interestingly, these lower bounds are different from the static bounds. Finally, we propose matching upper bounds. Our paper is the first to link the Mobile Byzantine Faults models and the Mixed-Mode Faults models, and we advocate that a similar approach can be adopted in order to prove the correctness of other classical distributed building blocks (e.g. agreement, clock synchronization, interactive consistency etc) under Mobile Byzantine Faults model.
[ { "version": "v1", "created": "Tue, 12 Apr 2016 14:50:55 GMT" } ]
2016-04-14T00:00:00
[ [ "Bonomi", "Silvia", "", "DIAG" ], [ "Del Pozzo", "Antonella", "", "NPA, DIAG" ], [ "Potop-Butucaru", "Maria", "", "NPA" ], [ "Tixeuil", "Sébastien", "", "NPA" ] ]
new_dataset
0.999575
1507.02558
Ilaria Gori
Ilaria Gori, J. K. Aggarwal, Larry Matthies, Michael S. Ryoo
Multi-Type Activity Recognition in Robot-Centric Scenarios
null
IEEE Robotics and Automation Letters (RA-L), 1(1):593-600, 2016
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Activity recognition is very useful in scenarios where robots interact with, monitor or assist humans. In the past years many types of activities -- single actions, two persons interactions or ego-centric activities, to name a few -- have been analyzed. Whereas traditional methods treat such types of activities separately, an autonomous robot should be able to detect and recognize multiple types of activities to effectively fulfill its tasks. We propose a method that is intrinsically able to detect and recognize activities of different types that happen in sequence or concurrently. We present a new unified descriptor, called Relation History Image (RHI), which can be extracted from all the activity types we are interested in. We then formulate an optimization procedure to detect and recognize activities of different types. We apply our approach to a new dataset recorded from a robot-centric perspective and systematically evaluate its quality compared to multiple baselines. Finally, we show the efficacy of the RHI descriptor on publicly available datasets performing extensive comparisons.
[ { "version": "v1", "created": "Thu, 9 Jul 2015 15:33:40 GMT" }, { "version": "v2", "created": "Tue, 12 Apr 2016 01:33:06 GMT" } ]
2016-04-13T00:00:00
[ [ "Gori", "Ilaria", "" ], [ "Aggarwal", "J. K.", "" ], [ "Matthies", "Larry", "" ], [ "Ryoo", "Michael S.", "" ] ]
new_dataset
0.979715
1511.06062
Yang Gao
Yang Gao, Oscar Beijbom, Ning Zhang, Trevor Darrell
Compact Bilinear Pooling
Camera ready version for CVPR
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bilinear models has been shown to achieve impressive performance on a wide range of visual tasks, such as semantic segmentation, fine grained recognition and face recognition. However, bilinear features are high dimensional, typically on the order of hundreds of thousands to a few million, which makes them impractical for subsequent analysis. We propose two compact bilinear representations with the same discriminative power as the full bilinear representation but with only a few thousand dimensions. Our compact representations allow back-propagation of classification errors enabling an end-to-end optimization of the visual recognition system. The compact bilinear representations are derived through a novel kernelized analysis of bilinear pooling which provide insights into the discriminative power of bilinear pooling, and a platform for further research in compact pooling methods. Experimentation illustrate the utility of the proposed representations for image classification and few-shot learning across several datasets.
[ { "version": "v1", "created": "Thu, 19 Nov 2015 05:34:35 GMT" }, { "version": "v2", "created": "Tue, 12 Apr 2016 01:59:15 GMT" } ]
2016-04-13T00:00:00
[ [ "Gao", "Yang", "" ], [ "Beijbom", "Oscar", "" ], [ "Zhang", "Ning", "" ], [ "Darrell", "Trevor", "" ] ]
new_dataset
0.997666
1512.06927
Jian Jin
Jian Jin
A C++ library for Multimodal Deep Learning
27 pages
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
MDL, Multimodal Deep Learning Library, is a deep learning framework that supports multiple models, and this document explains its philosophy and functionality. MDL runs on Linux, Mac, and Unix platforms. It depends on OpenCV.
[ { "version": "v1", "created": "Tue, 22 Dec 2015 01:27:23 GMT" }, { "version": "v2", "created": "Mon, 28 Dec 2015 20:00:20 GMT" }, { "version": "v3", "created": "Tue, 29 Dec 2015 13:39:52 GMT" }, { "version": "v4", "created": "Tue, 12 Apr 2016 17:34:29 GMT" } ]
2016-04-13T00:00:00
[ [ "Jin", "Jian", "" ] ]
new_dataset
0.998132
1603.08949
Cl\'audio Vasconcelos
Cl\'audio Vasconcelos and Ant\'onio Ravara
The While language
15 pages, 21 figures
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents a formalisation of a simple imperative programming language. The objective is to study and develop "hands-on" a formal specifcation of a programming language, namely its syntax, operational semantics and type system. To have an executable version of the language, we implemented in Racket its operational semantics and type system.
[ { "version": "v1", "created": "Tue, 29 Mar 2016 20:30:27 GMT" }, { "version": "v2", "created": "Tue, 12 Apr 2016 10:49:48 GMT" } ]
2016-04-13T00:00:00
[ [ "Vasconcelos", "Cláudio", "" ], [ "Ravara", "António", "" ] ]
new_dataset
0.997978
1604.02748
Yuncheng Li
Yuncheng Li, Yale Song, Liangliang Cao, Joel Tetreault, Larry Goldberg, Alejandro Jaimes, Jiebo Luo
TGIF: A New Dataset and Benchmark on Animated GIF Description
CVPR 2016 Camera Ready
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the recent popularity of animated GIFs on social media, there is need for ways to index them with rich metadata. To advance research on animated GIF understanding, we collected a new dataset, Tumblr GIF (TGIF), with 100K animated GIFs from Tumblr and 120K natural language descriptions obtained via crowdsourcing. The motivation for this work is to develop a testbed for image sequence description systems, where the task is to generate natural language descriptions for animated GIFs or video clips. To ensure a high quality dataset, we developed a series of novel quality controls to validate free-form text input from crowdworkers. We show that there is unambiguous association between visual content and natural language descriptions in our dataset, making it an ideal benchmark for the visual content captioning task. We perform extensive statistical analyses to compare our dataset to existing image and video description datasets. Next, we provide baseline results on the animated GIF description task, using three representative techniques: nearest neighbor, statistical machine translation, and recurrent neural networks. Finally, we show that models fine-tuned from our animated GIF description dataset can be helpful for automatic movie description.
[ { "version": "v1", "created": "Sun, 10 Apr 2016 22:15:14 GMT" }, { "version": "v2", "created": "Tue, 12 Apr 2016 01:47:19 GMT" } ]
2016-04-13T00:00:00
[ [ "Li", "Yuncheng", "" ], [ "Song", "Yale", "" ], [ "Cao", "Liangliang", "" ], [ "Tetreault", "Joel", "" ], [ "Goldberg", "Larry", "" ], [ "Jaimes", "Alejandro", "" ], [ "Luo", "Jiebo", "" ] ]
new_dataset
0.99987
1604.03217
Sabrina Nefti
Sabrina Nefti, Maamar Sedrati
PSNR and Jitter Analysis of Routing Protocols for Video Streaming in Sparse MANET Networks, using NS2 and the Evalvid Framework
International Journal of Computer Science and Information Security, published in Vol. 14 No. 3 MARCH 2016 International Journal of Computer Science and Information Security
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Advances in multimedia and ad-hoc networking have urged a wealth of research in multimedia delivery over ad-hoc networks. This comes as no surprise, as those networks are versatile and beneficial to a plethora of applications where the use of fully wired network has proved intricate if not impossible, such as prompt formation of networks during conferences, disaster relief in case of flood and earthquake, and also in war activities. It this paper, we aim to investigate the combined impact of network sparsity and network node density on the Peak Signal Noise to Ratio (PSNR) and jitter performance of proactive and reactive routing protocols in ad-hoc networks. We also shed light onto the combined effect of mobility and sparsity on the performance of these protocols. We validate our results through the use of an integrated Simulator-Evaluator environment consisting of the Network Simulator NS2, and the Video Evaluation Framework Evalvid.
[ { "version": "v1", "created": "Mon, 11 Apr 2016 09:07:01 GMT" } ]
2016-04-13T00:00:00
[ [ "Nefti", "Sabrina", "" ], [ "Sedrati", "Maamar", "" ] ]
new_dataset
0.971552
1604.03234
Jia Yu
Jia Yu, Mohamed Sarwat
Hippo: A Fast, yet Scalable, Database Indexing Approach
12 pages, 10 figures, conference
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Even though existing database indexes (e.g., B+-Tree) speed up the query execution, they suffer from two main drawbacks: (1) A database index usually yields 5% to 15% additional storage overhead which results in non-ignorable dollar cost in big data scenarios especially when deployed on modern storage devices like Solid State Disk (SSD) or Non-Volatile Memory (NVM). (2) Maintaining a database index incurs high latency because the DBMS has to find and update those index pages affected by the underlying table changes. This paper proposes Hippo a fast, yet scalable, database indexing approach. Hippo only stores the pointers of disk pages along with light weight histogram-based summaries. The proposed structure significantly shrinks index storage and maintenance overhead without compromising much on query execution performance. Experiments, based on real Hippo implementation inside PostgreSQL 9.5, using the TPC-H benchmark show that Hippo achieves up to two orders of magnitude less storage space and up to three orders of magnitude less maintenance overhead than traditional database indexes, i.e., B+-Tree. Furthermore, the experiments also show that Hippo achieves comparable query execution performance to that of the B+-Tree for various selectivity factors.
[ { "version": "v1", "created": "Tue, 12 Apr 2016 03:41:17 GMT" } ]
2016-04-13T00:00:00
[ [ "Yu", "Jia", "" ], [ "Sarwat", "Mohamed", "" ] ]
new_dataset
0.997507
1604.03356
Francois Taiani
Hicham Lakhlef (ASAP), Michel Raynal (ASAP), Fran\c{c}ois Ta\"iani (ASAP)
Vertex Coloring with Communication and Local Memory Constraints in Synchronous Broadcast Networks
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The vertex coloring problem has received a lot of attention in the context of synchronous round-based systems where, at each round, a process can send a message to all its neighbors, and receive a message from each of them. Hence, this communication model is particularly suited to point-to-point communication channels. Several vertex coloring algorithms suited to these systems have been proposed. They differ mainly in the number of rounds they require and the number of colors they use. This paper considers a broadcast/receive communication model in which message collisions and message conflicts can occur (a collision occurs when, during the same round, messages are sent to the same process by too many neighbors; a conflict occurs when a process and one of its neighbors broadcast during the same round). This communication model is suited to systems where processes share communication bandwidths. More precisely,the paper considers the case where, during a round, a process may either broadcast a message to its neighbors or receive a message from at most $m$ of them. This captures communication-related constraints or a local memory constraint stating that, whatever the number of neighbors of a process, its local memory allows it to receive and store at most $m$ messages during each round. The paper defines first the corresponding generic vertex multi-coloring problem (a vertex can have several colors). It focuses then on tree networks, for which it presents a lower bound on the number of colors $K$ that are necessary (namely, $K=\lceil\frac{\Delta}{m}\rceil+1$, where $\Delta$ is the maximal degree of the communication graph), and an ssociated coloring algorithm, which is optimal with respect to $K$.
[ { "version": "v1", "created": "Tue, 12 Apr 2016 11:56:07 GMT" } ]
2016-04-13T00:00:00
[ [ "Lakhlef", "Hicham", "", "ASAP" ], [ "Raynal", "Michel", "", "ASAP" ], [ "Taïani", "François", "", "ASAP" ] ]
new_dataset
0.995366
1604.03424
Belkacem Bekhiti
Belkacem Bekhiti, Abdelhakim Dahimene, Bachir Nail and Kamel Hariche
2-DOF block pole placement control application to: have-dash-II missile
submit 19 pages 1 figure 5 tables, Journal Indexing team, AIRCC 2016
null
null
null
cs.SY math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a multivariable servomechanism design, it is required that the output vector tracks a certain reference vector while satisfying some desired transient specifications, for this purpose a 2DOF control law consisting of state feedback gain and feedforward scaling gain is proposed. The control law is designed using block pole placement technique by assigning a set of desired Block poles in different canonical forms. The resulting control is simulated for linearized model of the HAVE DASH II BTT missile, numerical results are analyzed and compared in terms of transient response, gain magnitude, performance robustness, stability robustness and tracking. The suitable structure for this case study is then selected.
[ { "version": "v1", "created": "Fri, 8 Apr 2016 17:25:26 GMT" } ]
2016-04-13T00:00:00
[ [ "Bekhiti", "Belkacem", "" ], [ "Dahimene", "Abdelhakim", "" ], [ "Nail", "Bachir", "" ], [ "Hariche", "Kamel", "" ] ]
new_dataset
0.996605
1604.03427
Danica Greetham
Nathaniel Charlton, Colin Singleton, Danica Vukadinovi\'c Greetham
In the mood: the dynamics of collective sentiments on Twitter
null
null
null
null
cs.SI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the relationship between the sentiment levels of Twitter users and the evolving network structure that the users created by @-mentioning each other. We use a large dataset of tweets to which we apply three sentiment scoring algorithms, including the open source SentiStrength program. Specifically we make three contributions. Firstly we find that people who have potentially the largest communication reach (according to a dynamic centrality measure) use sentiment differently than the average user: for example they use positive sentiment more often and negative sentiment less often. Secondly we find that when we follow structurally stable Twitter communities over a period of months, their sentiment levels are also stable, and sudden changes in community sentiment from one day to the next can in most cases be traced to external events affecting the community. Thirdly, based on our findings, we create and calibrate a simple agent-based model that is capable of reproducing measures of emotive response comparable to those obtained from our empirical dataset.
[ { "version": "v1", "created": "Mon, 11 Apr 2016 16:24:22 GMT" } ]
2016-04-13T00:00:00
[ [ "Charlton", "Nathaniel", "" ], [ "Singleton", "Colin", "" ], [ "Greetham", "Danica Vukadinović", "" ] ]
new_dataset
0.965716
1604.03470
Nikolas Herbst
Nikolas Herbst, Rouven Krebs, Giorgos Oikonomou, George Kousiouris, Athanasia Evangelinou, Alexandru Iosup, and Samuel Kounev
Ready for Rain? A View from SPEC Research on the Future of Cloud Metrics
SPEC Research Group - Cloud Working Group, Standard Performance Evaluation Corporation (SPEC)
null
null
Technical Report SPEC-RG-2016-01
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the past decade, cloud computing has emerged from a pursuit for a service-driven information and communication technology (ICT), into a signifcant fraction of the ICT market. Responding to the growth of the market, many alternative cloud services and their underlying systems are currently vying for the attention of cloud users and providers. Thus, benchmarking them is needed, to enable cloud users to make an informed choice, and to enable system DevOps to tune, design, and evaluate their systems. This requires focusing on old and new system properties, possibly leading to the re-design of classic benchmarking metrics, such as expressing performance as throughput and latency (response time), and the design of new, cloud-specififc metrics. Addressing this requirement, in this work we focus on four system properties: (i) elasticity of the cloud service, to accommodate large variations in the amount of service requested, (ii) performance isolation between the tenants of shared cloud systems, (iii) availability of cloud services and systems, and the (iv) operational risk of running a production system in a cloud environment.Focusing on key metrics, for each of these properties we review the state-of-the-art, then select or propose new metrics together with measurement approaches. We see the presented metrics as a foundation towards upcoming, industry-standard, cloud benchmarks. Keywords: Cloud Computing; Metrics; Measurement; Benchmarking; Elasticity; Isolation; Performance; Service Level Objective; Availability; Operational Risk.
[ { "version": "v1", "created": "Tue, 12 Apr 2016 16:23:15 GMT" } ]
2016-04-13T00:00:00
[ [ "Herbst", "Nikolas", "" ], [ "Krebs", "Rouven", "" ], [ "Oikonomou", "Giorgos", "" ], [ "Kousiouris", "George", "" ], [ "Evangelinou", "Athanasia", "" ], [ "Iosup", "Alexandru", "" ], [ "Kounev", "Samuel", "" ] ]
new_dataset
0.994122
1604.03508
Andrew Eckford
Peter J. Thomas and Andrew W. Eckford
Shannon Capacity of Signal Transduction for Multiple Independent Receptors
Accepted for presentation at the 2016 IEEE International Symposium on Information Theory (ISIT)
null
null
null
cs.IT math.IT q-bio.MN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic adenosine monophosphate (cAMP) is considered a model system for signal transduction, the mechanism by which cells exchange chemical messages. Our previous work calculated the Shannon capacity of a single cAMP receptor; however, a typical cell may have thousands of receptors operating in parallel. In this paper, we calculate the capacity of a cAMP signal transduction system with an arbitrary number of independent, indistinguishable receptors. By leveraging prior results on feedback capacity for a single receptor, we show (somewhat unexpectedly) that the capacity is achieved by an IID input distribution, and that the capacity for n receptors is n times the capacity for a single receptor.
[ { "version": "v1", "created": "Tue, 12 Apr 2016 18:33:40 GMT" } ]
2016-04-13T00:00:00
[ [ "Thomas", "Peter J.", "" ], [ "Eckford", "Andrew W.", "" ] ]
new_dataset
0.994482
1604.03544
Michael B. Cohen
Michael B. Cohen
Ramanujan Graphs in Polynomial Time
null
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recent work by Marcus, Spielman and Srivastava proves the existence of bipartite Ramanujan (multi)graphs of all degrees and all sizes. However, that paper did not provide a polynomial time algorithm to actually compute such graphs. Here, we provide a polynomial time algorithm to compute certain expected characteristic polynomials related to this construction. This leads to a deterministic polynomial time algorithm to compute bipartite Ramanujan (multi)graphs of all degrees and all sizes.
[ { "version": "v1", "created": "Tue, 12 Apr 2016 19:59:18 GMT" } ]
2016-04-13T00:00:00
[ [ "Cohen", "Michael B.", "" ] ]
new_dataset
0.999125
1109.3524
L. A. Barba
Simon K Layton and Anush Krishnan and Lorena A. Barba
cuIBM -- A GPU-accelerated Immersed Boundary Method
Extended paper post-conference, presented at the 23rd International Conference on Parallel Computational Fluid Dynamics (http://www.parcfd.org), ParCFD 2011, Barcelona (unpublished)
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A projection-based immersed boundary method is dominated by sparse linear algebra routines. Using the open-source Cusp library, we observe a speedup (with respect to a single CPU core) which reflects the constraints of a bandwidth-dominated problem on the GPU. Nevertheless, GPUs offer the capacity to solve large problems on commodity hardware. This work includes validation and a convergence study of the GPU-accelerated IBM, and various optimizations.
[ { "version": "v1", "created": "Fri, 16 Sep 2011 04:02:15 GMT" }, { "version": "v2", "created": "Sat, 9 Apr 2016 00:39:08 GMT" } ]
2016-04-12T00:00:00
[ [ "Layton", "Simon K", "" ], [ "Krishnan", "Anush", "" ], [ "Barba", "Lorena A.", "" ] ]
new_dataset
0.998103
1402.6407
Daniel Lemire
Samy Chambi, Daniel Lemire, Owen Kaser, Robert Godin
Better bitmap performance with Roaring bitmaps
null
Software: Practice and Experience Volume 46, Issue 5, pages 709-719, May 2016
10.1002/spe.2325
null
cs.DB
http://creativecommons.org/licenses/by/4.0/
Bitmap indexes are commonly used in databases and search engines. By exploiting bit-level parallelism, they can significantly accelerate queries. However, they can use much memory, and thus we might prefer compressed bitmap indexes. Following Oracle's lead, bitmaps are often compressed using run-length encoding (RLE). Building on prior work, we introduce the Roaring compressed bitmap format: it uses packed arrays for compression instead of RLE. We compare it to two high-performance RLE-based bitmap encoding techniques: WAH (Word Aligned Hybrid compression scheme) and Concise (Compressed `n' Composable Integer Set). On synthetic and real data, we find that Roaring bitmaps (1) often compress significantly better (e.g., 2 times) and (2) are faster than the compressed alternatives (up to 900 times faster for intersections). Our results challenge the view that RLE-based bitmap compression is best.
[ { "version": "v1", "created": "Wed, 26 Feb 2014 04:38:22 GMT" }, { "version": "v10", "created": "Tue, 15 Mar 2016 19:31:53 GMT" }, { "version": "v2", "created": "Thu, 27 Feb 2014 23:34:18 GMT" }, { "version": "v3", "created": "Tue, 4 Mar 2014 22:45:23 GMT" }, { "version": "v4", "created": "Fri, 6 Jun 2014 17:55:23 GMT" }, { "version": "v5", "created": "Wed, 19 Nov 2014 18:25:55 GMT" }, { "version": "v6", "created": "Tue, 2 Dec 2014 19:17:31 GMT" }, { "version": "v7", "created": "Wed, 3 Dec 2014 15:36:12 GMT" }, { "version": "v8", "created": "Wed, 11 Mar 2015 17:50:04 GMT" }, { "version": "v9", "created": "Sat, 28 Mar 2015 14:45:00 GMT" } ]
2016-04-12T00:00:00
[ [ "Chambi", "Samy", "" ], [ "Lemire", "Daniel", "" ], [ "Kaser", "Owen", "" ], [ "Godin", "Robert", "" ] ]
new_dataset
0.992096
1511.04164
Ronghang Hu
Ronghang Hu, Huazhe Xu, Marcus Rohrbach, Jiashi Feng, Kate Saenko, Trevor Darrell
Natural Language Object Retrieval
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the task of natural language object retrieval, to localize a target object within a given image based on a natural language query of the object. Natural language object retrieval differs from text-based image retrieval task as it involves spatial information about objects within the scene and global scene context. To address this issue, we propose a novel Spatial Context Recurrent ConvNet (SCRC) model as scoring function on candidate boxes for object retrieval, integrating spatial configurations and global scene-level contextual information into the network. Our model processes query text, local image descriptors, spatial configurations and global context features through a recurrent network, outputs the probability of the query text conditioned on each candidate box as a score for the box, and can transfer visual-linguistic knowledge from image captioning domain to our task. Experimental results demonstrate that our method effectively utilizes both local and global information, outperforming previous baseline methods significantly on different datasets and scenarios, and can exploit large scale vision and language datasets for knowledge transfer.
[ { "version": "v1", "created": "Fri, 13 Nov 2015 05:53:37 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2016 20:12:44 GMT" }, { "version": "v3", "created": "Mon, 11 Apr 2016 03:36:58 GMT" } ]
2016-04-12T00:00:00
[ [ "Hu", "Ronghang", "" ], [ "Xu", "Huazhe", "" ], [ "Rohrbach", "Marcus", "" ], [ "Feng", "Jiashi", "" ], [ "Saenko", "Kate", "" ], [ "Darrell", "Trevor", "" ] ]
new_dataset
0.992486
1512.01815
Lior Wolf
David Gadot, Lior Wolf
PatchBatch: a Batch Augmented Loss for Optical Flow
CVPR 2016
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new pipeline for optical flow computation, based on Deep Learning techniques. We suggest using a Siamese CNN to independently, and in parallel, compute the descriptors of both images. The learned descriptors are then compared efficiently using the L2 norm and do not require network processing of patch pairs. The success of the method is based on an innovative loss function that computes higher moments of the loss distributions for each training batch. Combined with an Approximate Nearest Neighbor patch matching method and a flow interpolation technique, state of the art performance is obtained on the most challenging and competitive optical flow benchmarks.
[ { "version": "v1", "created": "Sun, 6 Dec 2015 18:30:28 GMT" }, { "version": "v2", "created": "Sun, 10 Apr 2016 14:17:18 GMT" } ]
2016-04-12T00:00:00
[ [ "Gadot", "David", "" ], [ "Wolf", "Lior", "" ] ]
new_dataset
0.972599
1604.02480
Panagiotis Vekris
Panagiotis Vekris, Benjamin Cosman, Ranjit Jhala
Refinement Types for TypeScript
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Refined TypeScript (RSC), a lightweight refinement type system for TypeScript, that enables static verification of higher-order, imperative programs. We develop a formal core of RSC that delineates the interaction between refinement types and mutability. Next, we extend the core to account for the imperative and dynamic features of TypeScript. Finally, we evaluate RSC on a set of real world benchmarks, including parts of the Octane benchmarks, D3, Transducers, and the TypeScript compiler.
[ { "version": "v1", "created": "Fri, 8 Apr 2016 20:50:15 GMT" } ]
2016-04-12T00:00:00
[ [ "Vekris", "Panagiotis", "" ], [ "Cosman", "Benjamin", "" ], [ "Jhala", "Ranjit", "" ] ]
new_dataset
0.997414
1604.02511
Liangtian Wan
Liangtian Wan and Guangjie Han and Jinfang Jiang and Lei Shu
Optimal Design of Compact Receive Array in Industrial Wireless Sensor Networks
5 page, 8 figures, accepted by VTC Spring 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the development of wireless communication, industrial wireless sensor networks (IWSNs) plays an important role in monitoring and control systems. In this paper, we extend the application of IWSNs into High Frequency Surface-Wave Radar (HFSWR) system. The traditional antenna is replaced by mobile IWSNs. In combination of the application precondition of super-directivity in HF band and circular topology of IWSNs, a super-directivity synthesis method is presented for designing super-directivity array. In this method, the dominance of external noise is ensured by constraining the Ratio of External to Internal Noise (REIN) of the array, and the desired side lobe level is achieved by implementing linear constraint. By using this method, the highest directivity will be achieved in certain conditions. Using the designed super directive circular array as sub-arrays, the compact receive antenna array is constructed, the purpose of miniaturization is achieved. Simulation verifies that the proposed method is correct and effective, the validity of the proposed method has been proved.
[ { "version": "v1", "created": "Sat, 9 Apr 2016 02:12:10 GMT" } ]
2016-04-12T00:00:00
[ [ "Wan", "Liangtian", "" ], [ "Han", "Guangjie", "" ], [ "Jiang", "Jinfang", "" ], [ "Shu", "Lei", "" ] ]
new_dataset
0.994696
1604.02518
Kaifeng Han
Kaifeng Han and Kaibin Huang
Wirelessly Powered Backscatter Communication Networks: Modeling, Coverage and Capacity
7 pages, 7 figures, submitted to IEEE GLOBECOM 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Future Internet-of-Things (IoT) will connect billions of small computing devices embedded in the environment and support their device-to-device (D2D) communication. Powering this massive number of embedded devices is a key challenge of designing IoT since batteries increase the devices' form factors and their recharging/replacement is difficult. To tackle this challenge, we propose a novel network architecture that integrates wireless power transfer and backscatter communication, called wirelessly powered backscatter communication (WP-BC) networks. In this architecture, power beacons (PBs) are deployed for wirelessly powering devices; their ad-hoc communication relies on backscattering and modulating incident continuous waves from PBs, which consumes orders-of-magnitude less power than traditional radios. Thereby, the dense deployment of low-complexity PBs with high transmission power can power a large-scale IoT. In this paper, a WP-BC network is modeled as a random Poisson cluster process in the horizontal plane where PBs are Poisson distributed and active ad-hoc pairs of backscatter communication nodes with fixed separation distances form random clusters centered at PBs. Furthermore, by harvesting energy from and backscattering radio frequency (RF) waves transmitted by PBs, the transmission power of each node depends on the distance from the associated PB. Applying stochastic geometry, the network coverage probability and transmission capacity are derived and optimized as functions of the backscatter duty cycle and reflection coefficient as well as the PB density. The effects of the parameters on network performance are characterized.
[ { "version": "v1", "created": "Sat, 9 Apr 2016 03:48:02 GMT" } ]
2016-04-12T00:00:00
[ [ "Han", "Kaifeng", "" ], [ "Huang", "Kaibin", "" ] ]
new_dataset
0.950893
1604.02605
Mohammed El-Kebir
Mohammed El-Kebir and Gryte Satas and Layla Oesper and Benjamin J. Raphael
Multi-State Perfect Phylogeny Mixture Deconvolution and Applications to Cancer Sequencing
RECOMB 2016
null
null
null
cs.DS q-bio.GN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The reconstruction of phylogenetic trees from mixed populations has become important in the study of cancer evolution, as sequencing is often performed on bulk tumor tissue containing mixed populations of cells. Recent work has shown how to reconstruct a perfect phylogeny tree from samples that contain mixtures of two-state characters, where each character/locus is either mutated or not. However, most cancers contain more complex mutations, such as copy-number aberrations, that exhibit more than two states. We formulate the Multi-State Perfect Phylogeny Mixture Deconvolution Problem of reconstructing a multi-state perfect phylogeny tree given mixtures of the leaves of the tree. We characterize the solutions of this problem as a restricted class of spanning trees in a graph constructed from the input data, and prove that the problem is NP-complete. We derive an algorithm to enumerate such trees in the important special case of cladisitic characters, where the ordering of the states of each character is given. We apply our algorithm to simulated data and to two cancer datasets. On simulated data, we find that for a small number of samples, the Multi-State Perfect Phylogeny Mixture Deconvolution Problem often has many solutions, but that this ambiguity declines quickly as the number of samples increases. On real data, we recover copy-neutral loss of heterozygosity, single-copy amplification and single-copy deletion events, as well as their interactions with single-nucleotide variants.
[ { "version": "v1", "created": "Sat, 9 Apr 2016 20:00:07 GMT" } ]
2016-04-12T00:00:00
[ [ "El-Kebir", "Mohammed", "" ], [ "Satas", "Gryte", "" ], [ "Oesper", "Layla", "" ], [ "Raphael", "Benjamin J.", "" ] ]
new_dataset
0.991035
1604.02660
Xiaohu Ge
Xiaohu Ge, Hui Cheng, Guoqiang Mao, Yang Yang, Song Tu
Vehicular Communications for 5G Cooperative Small Cell Networks
13 pages, 11 figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The cooperative transmission is an effective approach for vehicular communications to improve the wireless transmission capacity and reliability in the fifth generation (5G) small cell networks. Based on distances between the vehicle and cooperative small cell BSs, the cooperative probability and the coverage probability have been derived for 5G cooperative small cell networks where small cell base stations (BSs) follow Poisson point process distributions. Furthermore, the vehicular handoff rate and the vehicular overhead ratio have been proposed to evaluate the vehicular mobility performance in 5G cooperative small cell networks. To balance the vehicular communication capacity and the vehicular handoff ratio, an optimal vehicular overhead ratio can be achieved by adjusting the cooperative threshold of 5G cooperative small cell networks.
[ { "version": "v1", "created": "Sun, 10 Apr 2016 09:51:18 GMT" } ]
2016-04-12T00:00:00
[ [ "Ge", "Xiaohu", "" ], [ "Cheng", "Hui", "" ], [ "Mao", "Guoqiang", "" ], [ "Yang", "Yang", "" ], [ "Tu", "Song", "" ] ]
new_dataset
0.989242
1604.02723
Deborah Cohen
Shahar Stein, Or Yair, Deborah Cohen and Yonina C. Eldar
CaSCADE: Compressed Carrier and DOA Estimation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum sensing and direction of arrival (DOA) estimation have been thoroughly investigated, both separately and as a joint task. Estimating the support of a set of signals and their DOAs is crucial to many signal processing applications, such as Cognitive Radio (CR). A challenging scenario, faced by CRs, is that of multiband signals, composed of several narrowband transmissions spread over a wide spectrum each with unknown carrier frequencies and DOAs. The Nyquist rate of such signals is high and constitutes a bottleneck both in the analog and digital domains. To alleviate the sampling rate issue, several sub-Nyquist sampling methods, such as multicoset sampling or the modulated wideband converter (MWC), have been proposed in the context of spectrum sensing. In this work, we first suggest an alternative sub-Nyquist sampling and signal reconstruction method to the MWC, based on a uniform linear array (ULA). We then extend our approach to joint spectrum sensing and DOA estimation and propose the CompreSsed CArrier and DOA Estimation (CaSCADE) system, composed of an L-shaped array with two ULAs. In both cases, we derive perfect recovery conditions of the signal parameters (carrier frequencies and DOAs if relevant) and the signal itself and provide two reconstruction algorithms, one based on the ESPRIT method and the second on compressed sensing techniques. Both our joint carriers and DOAs recovery algorithms overcome the well-known pairing issue between the two parameters. Simulations demonstrate that our alternative spectrum sensing system outperforms the MWC in terms of recovery error and design complexity and show joint carrier frequencies and DOAs from our CaSCADE system's sub-Nyquist samples.
[ { "version": "v1", "created": "Sun, 10 Apr 2016 18:54:56 GMT" } ]
2016-04-12T00:00:00
[ [ "Stein", "Shahar", "" ], [ "Yair", "Or", "" ], [ "Cohen", "Deborah", "" ], [ "Eldar", "Yonina C.", "" ] ]
new_dataset
0.970524
1604.02801
Ruizhe Wang
Ruizhe Wang, Lingyu Wei, Etienne Vouga, Qixing Huang, Duygu Ceylan, Gerard Medioni and Hao Li
Capturing Dynamic Textured Surfaces of Moving Targets
22 pages, 12 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an end-to-end system for reconstructing complete watertight and textured models of moving subjects such as clothed humans and animals, using only three or four handheld sensors. The heart of our framework is a new pairwise registration algorithm that minimizes, using a particle swarm strategy, an alignment error metric based on mutual visibility and occlusion. We show that this algorithm reliably registers partial scans with as little as 15% overlap without requiring any initial correspondences, and outperforms alternative global registration algorithms. This registration algorithm allows us to reconstruct moving subjects from free-viewpoint video produced by consumer-grade sensors, without extensive sensor calibration, constrained capture volume, expensive arrays of cameras, or templates of the subject geometry.
[ { "version": "v1", "created": "Mon, 11 Apr 2016 06:03:09 GMT" } ]
2016-04-12T00:00:00
[ [ "Wang", "Ruizhe", "" ], [ "Wei", "Lingyu", "" ], [ "Vouga", "Etienne", "" ], [ "Huang", "Qixing", "" ], [ "Ceylan", "Duygu", "" ], [ "Medioni", "Gerard", "" ], [ "Li", "Hao", "" ] ]
new_dataset
0.972704
1604.02808
Amir Shahroudy
Amir Shahroudy, Jun Liu, Tian-Tsong Ng, Gang Wang
NTU RGB+D: A Large Scale Dataset for 3D Human Activity Analysis
10 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent approaches in depth-based human activity analysis achieved outstanding performance and proved the effectiveness of 3D representation for classification of action classes. Currently available depth-based and RGB+D-based action recognition benchmarks have a number of limitations, including the lack of training samples, distinct class labels, camera views and variety of subjects. In this paper we introduce a large-scale dataset for RGB+D human action recognition with more than 56 thousand video samples and 4 million frames, collected from 40 distinct subjects. Our dataset contains 60 different action classes including daily, mutual, and health-related actions. In addition, we propose a new recurrent neural network structure to model the long-term temporal correlation of the features for each body part, and utilize them for better action classification. Experimental results show the advantages of applying deep learning methods over state-of-the-art hand-crafted features on the suggested cross-subject and cross-view evaluation criteria for our dataset. The introduction of this large scale dataset will enable the community to apply, develop and adapt various data-hungry learning techniques for the task of depth-based and RGB+D-based human activity analysis.
[ { "version": "v1", "created": "Mon, 11 Apr 2016 06:44:53 GMT" } ]
2016-04-12T00:00:00
[ [ "Shahroudy", "Amir", "" ], [ "Liu", "Jun", "" ], [ "Ng", "Tian-Tsong", "" ], [ "Wang", "Gang", "" ] ]
new_dataset
0.999819
1604.02847
Costin Raiciu
Radu Stoenescu, Matei Popovici, Lorina Negreanu and Costin Raiciu
SymNet: scalable symbolic execution for modern networks
13 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present SymNet, a network static analysis tool based on symbolic execution. SymNet quickly analyzes networks by injecting symbolic packets and tracing their path through the network. Our key novelty is SEFL, a language we designed for network processing that is symbolic-execution friendly. SymNet is easy to use: we have developed parsers that automatically generate SEFL models from router and switch tables, firewall configurations and arbitrary Click modular router configurations. Most of our models are exact and have optimal branching factor. Finally, we built a testing tool that checks SEFL models conform to the real implementation. SymNet can check networks containing routers with hundreds of thousands of prefixes and NATs in seconds, while ensuring packet header memory-safety and capturing network functionality such as dynamic tunneling, stateful processing and encryption. We used SymNet to debug middlebox interactions documented in the literature, to check our department's network and the Stanford backbone network. Results show that symbolic execution is fast and more accurate than existing static analysis tools.
[ { "version": "v1", "created": "Mon, 11 Apr 2016 09:08:24 GMT" } ]
2016-04-12T00:00:00
[ [ "Stoenescu", "Radu", "" ], [ "Popovici", "Matei", "" ], [ "Negreanu", "Lorina", "" ], [ "Raiciu", "Costin", "" ] ]
new_dataset
0.992736
1604.02852
Rongpeng Li
Rongpeng Li, Yan Chen, Geoffrey Ye Li, Guangyi Liu
Full-Duplex Cellular Networks: It Works!
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/4.0/
Full-duplex (FD) communications with bidirectional transmitting and receiving at the same time and frequency radio resource have long been deemed a promising way to boost spectrum efficiency, but hindered by the techniques for self-interference cancellation (SIC). Recent breakthroughs in analog and digital signal processing yield the feasibility of beyond $100$ dB SIC capability and make it possible for FD communications to demonstrate nearly doubled spectrum efficiency for point-to-point links. Now it is time to shift at least partial of our focus to full duplex networking, such as in cellular networks, since it is not straightforward but demanding novel and more complicated interference management techniques. Before putting FD networking into practice, we need to understand that what scenarios FD communications should be applied in under the current technology maturity, how bad the performance will be if we do nothing to deal with the newly introduced interference, and most importantly, how much improvement could be achieved after applying advanced solutions. This article will shed light on these questions.
[ { "version": "v1", "created": "Mon, 11 Apr 2016 09:21:10 GMT" } ]
2016-04-12T00:00:00
[ [ "Li", "Rongpeng", "" ], [ "Chen", "Yan", "" ], [ "Li", "Geoffrey Ye", "" ], [ "Liu", "Guangyi", "" ] ]
new_dataset
0.985973
1604.02934
Racha El-Hajj
Racha El-Hajj (UL, Heudiasyc, Labex MS2T), Duc-Cuong Dang (Heudiasyc, Labex MS2T, UON), Aziz Moukrim (Labex MS2T, Heudiasyc)
Solving the Team Orienteering Problem with Cutting Planes
null
Computers and Operations Research, Elsevier, 2016, pp.27
10.1016/j.cor.2016.04.008
null
cs.RO cs.DS math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Team Orienteering Problem (TOP) is an attractive variant of the Vehicle Routing Problem (VRP). The aim is to select customers and at the same time organize the visits for a vehicle fleet so as to maximize the collected profits and subject to a travel time restriction on each vehicle. In this paper, we investigate the effective use of a linear formulation with polynomial number of variables to solve TOP. Cutting planes are the core components of our solving algorithm. It is first used to solve smaller and intermediate models of the original problem by considering fewer vehicles. Useful information are then retrieved to solve larger models, and eventually reaching the original problem. Relatively new and dedicated methods for TOP, such as identification of irrelevant arcs and mandatory customers, clique and independent-set cuts based on the incompatibilities, and profit/customer restriction on subsets of vehicles, are introduced. We evaluated our algorithm on the standard benchmark of TOP. The results show that the algorithm is competitive and is able to prove the optimality for 12 instances previously unsolved.
[ { "version": "v1", "created": "Mon, 11 Apr 2016 13:08:48 GMT" } ]
2016-04-12T00:00:00
[ [ "El-Hajj", "Racha", "", "UL, Heudiasyc, Labex MS2T" ], [ "Dang", "Duc-Cuong", "", "Heudiasyc,\n Labex MS2T, UON" ], [ "Moukrim", "Aziz", "", "Labex MS2T, Heudiasyc" ] ]
new_dataset
0.990035
1604.02949
Marin\^es Guerreiro
J. J. Bernal, M. Guerreiro, J. J. Sim\'on
Ds-bounds for cyclic codes: new bounds for abelian codes
Submitted
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we develop a technique to extend any bound for cyclic codes constructed from its defining sets (ds-bounds) to abelian (or multivariate) codes. We use this technique to improve the searching of new bounds for abelian codes.
[ { "version": "v1", "created": "Mon, 11 Apr 2016 13:40:24 GMT" } ]
2016-04-12T00:00:00
[ [ "Bernal", "J. J.", "" ], [ "Guerreiro", "M.", "" ], [ "Simón", "J. J.", "" ] ]
new_dataset
0.997842
1604.02967
Chunlei Li
Yongbo Xia and Chunlei Li
Three-Weight Ternary Linear Codes from a Family of Monomials
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Based on a generic construction, two classes of ternary three-weight linear codes are obtained from a family of power functions, including some APN power functions. The weight distributions of these linear codes are determined through studying the properties of some exponential sum related to the proposed power functions.
[ { "version": "v1", "created": "Mon, 11 Apr 2016 14:10:17 GMT" } ]
2016-04-12T00:00:00
[ [ "Xia", "Yongbo", "" ], [ "Li", "Chunlei", "" ] ]
new_dataset
0.998878
1404.0298
Shaofeng Zou
Shaofeng Zou, Yingbin Liang, H. Vincent Poor
A Kernel-Based Nonparametric Test for Anomaly Detection over Line Networks
This paper has been withdrawn because we have submitted a complete version. The complete version is arXiv:1604.01351
null
null
null
cs.IT math.IT stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The nonparametric problem of detecting existence of an anomalous interval over a one dimensional line network is studied. Nodes corresponding to an anomalous interval (if exists) receive samples generated by a distribution q, which is different from the distribution p that generates samples for other nodes. If anomalous interval does not exist, then all nodes receive samples generated by p. It is assumed that the distributions p and q are arbitrary, and are unknown. In order to detect whether an anomalous interval exists, a test is built based on mean embeddings of distributions into a reproducing kernel Hilbert space (RKHS) and the metric of maximummean discrepancy (MMD). It is shown that as the network size n goes to infinity, if the minimum length of candidate anomalous intervals is larger than a threshold which has the order O(log n), the proposed test is asymptotically successful, i.e., the probability of detection error approaches zero asymptotically. An efficient algorithm to perform the test with substantial computational complexity reduction is proposed, and is shown to be asymptotically successful if the condition on the minimum length of candidate anomalous interval is satisfied. Numerical results are provided, which are consistent with the theoretical results.
[ { "version": "v1", "created": "Tue, 1 Apr 2014 16:12:51 GMT" }, { "version": "v2", "created": "Thu, 7 Apr 2016 20:28:29 GMT" } ]
2016-04-11T00:00:00
[ [ "Zou", "Shaofeng", "" ], [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.9668
1501.00166
Yaser Sadra
Sodeif Ahadpour, Yaser Sadra
Chaotic trigonometric Haar wavelet with focus on image encryption
Accepted in Journal of Discrete Mathematical Sciences and Cryptography, 10pages, 9 figures,2 table
null
null
null
cs.CR nlin.CD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, after reviewing the main points of Haar wavelet transform and chaotic trigonometric maps, we introduce a new perspective of Haar wavelet transform. The essential idea of the paper is given linearity properties of the scaling function of the Haar wavelet. With regard to applications of Haar wavelet transform in image processing, we introduce chaotic trigonometric Haar wavelet transform to encrypt the plain images. In addition, the encrypted images based on a proposed algorithm were made. To evaluate the security of the encrypted images, the key space analysis, the correlation coefficient analysis and differential attack were performed. Here, the chaotic trigonometric Haar wavelet transform tries to improve the problem of failure of encryption such as small key space and level of security.
[ { "version": "v1", "created": "Wed, 31 Dec 2014 16:28:28 GMT" }, { "version": "v2", "created": "Fri, 3 Jul 2015 06:46:29 GMT" }, { "version": "v3", "created": "Fri, 8 Apr 2016 05:12:25 GMT" } ]
2016-04-11T00:00:00
[ [ "Ahadpour", "Sodeif", "" ], [ "Sadra", "Yaser", "" ] ]
new_dataset
0.99292
1501.06479
Prasant Misra
Sabarish Sridhar, Prasant Misra, Gurinder Singh Gill, Jay Warrior
CheepSync: A Time Synchronization Service for Resource Constrained Bluetooth Low Energy Advertisers
null
IEEE Communications Magazine, vol. 54, no. 1, pp. 136-143, January 2016
10.1109/MCOM.2016.7378439
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clock synchronization is highly desirable in distributed systems, including many applications in the Internet of Things and Humans (IoTH). It improves the efficiency, modularity and scalability of the system, and optimizes use of event triggers. For IoTH, Bluetooth Low Energy (BLE) - a subset of the recent Bluetooth v4.0 stack - provides a low-power and loosely coupled mechanism for sensor data collection with ubiquitous units (e.g., smartphones and tablets) carried by humans. This fundamental design paradigm of BLE is enabled by a range of broadcast advertising modes. While its operational benefits are numerous, the lack of a common time reference in the broadcast mode of BLE has been a fundamental limitation. This paper presents and describes CheepSync: a time synchronization service for BLE advertisers, especially tailored for applications requiring high time precision on resource constrained BLE platforms. Designed on top of the existing Bluetooth v4.0 standard, the CheepSync framework utilizes low-level timestamping and comprehensive error compensation mechanisms for overcoming uncertainties in message transmission, clock drift and other system specific constraints. CheepSync was implemented on custom designed nRF24Cheep beacon platforms (as broadcasters) and commercial off-the-shelf Android ported smartphones (as passive listeners). We demonstrate the efficacy of CheepSync by numerous empirical evaluations in a variety of experimental setups, and show that its average (single-hop) time synchronization accuracy is in the 10us range.
[ { "version": "v1", "created": "Mon, 26 Jan 2015 16:52:40 GMT" }, { "version": "v2", "created": "Fri, 8 Apr 2016 10:15:18 GMT" } ]
2016-04-11T00:00:00
[ [ "Sridhar", "Sabarish", "" ], [ "Misra", "Prasant", "" ], [ "Gill", "Gurinder Singh", "" ], [ "Warrior", "Jay", "" ] ]
new_dataset
0.998785
1506.05217
Mohsin Junaid
Mohsin Junaid, Donggang Liu and David Kung
Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models
null
Computers & Security, Volume 59,Pages 92-117, ISSN 0167-4048, June 2016
10.1016/j.cose.2016.01.008
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The amount of Android malware has increased greatly during the last few years. Static analysis is widely used in detecting such malware by analyzing the code without execution. The effectiveness of current tools relies on the app model as well as the malware detection algorithm which analyzes the app model. If the model and/or the algorithm is inadequate, then sophisticated attacks that are triggered by specific sequences of events will not be detected. This paper presents a static analysis framework called Dexteroid, which uses reverse-engineered life cycle models to accurately capture the behaviors of Android components. Dexteroid systematically derives event sequences from the models, and uses them to detect attacks launched by specific ordering of events. A prototype implementation of Dexteroid detects two types of attacks: (1) leakage of private information, and (2) sending SMS to premium-rate numbers. A series of experiments are conducted on 1526 Google Play apps, 1259 Genome Malware apps, and a suite of benchmark apps called DroidBench and the results are compared with a state-of-the-art static analysis tool called FlowDroid. The evaluation results show that the proposed framework is effective and efficient in terms of precision, recall, and execution time.
[ { "version": "v1", "created": "Wed, 17 Jun 2015 06:38:37 GMT" }, { "version": "v2", "created": "Fri, 8 Apr 2016 19:38:43 GMT" } ]
2016-04-11T00:00:00
[ [ "Junaid", "Mohsin", "" ], [ "Liu", "Donggang", "" ], [ "Kung", "David", "" ] ]
new_dataset
0.999442
1604.02005
Yaohua Xie
Yaohua Xie, Danli Wang, Li Hao
MPP3D: Multi-Precision Pointing using the 3rd Dimension
10 pages, 16 figures, 2 tables
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distant pointing is still not efficient, accurate or flexible enough for many applications, although many researchers have focused on it. To improve upon distant pointing, we propose MPP3D, which is especially suitable for high-resolution displays. MPP3D uses two dimensions of hand positioning to move a pointer, and it also uses the third dimension to adjust the precision of the movement. Based on the idea of MPP3D, we propose four techniques which combine two ways of mapping and two techniques for precision adjustment. We further provide three types of mapping scheme and visual feedback for each technique. The potential of the proposed techniques was investigated through experimentation. The results show that these techniques were competent for usual computer operations with a cursor, and the adjustment for pointing precision was beneficial for both pointing efficiency and accuracy.
[ { "version": "v1", "created": "Thu, 7 Apr 2016 14:06:18 GMT" }, { "version": "v2", "created": "Fri, 8 Apr 2016 05:16:05 GMT" } ]
2016-04-11T00:00:00
[ [ "Xie", "Yaohua", "" ], [ "Wang", "Danli", "" ], [ "Hao", "Li", "" ] ]
new_dataset
0.997334
1604.02253
Erlend Magnus Viggen
Tor Arne Reinen, Arne Lie, Finn Tore Knudsen
SensIs - Underwater acoustic network for ice-monitoring
10 pages, 5 figures, 2 tables; part of the Proceedings of the 39th Scandinavian Symposium on Physical Acoustics (arXiv:1604.01763)
null
null
null
cs.NI physics.ao-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Routing for low latency underwater acoustic network-communication is investigated. The application is monitoring of ice-threats to offshore operations in the Arctic - to provide warnings that enable operators to react to such threats. The scenario produces relatively high traffic load, and the network should favour low delay and adequate reliability rather than energy usage minimization. The ICRP (Information-Carrying based Routing Protocol), originally proposed by Wei Liang et al. in 2007, is chosen as basis. ICRP obtains unicast routing paths by sending data payload as broadcast packets when no route information is available. Thus, data can be delivered without the cost of reactive signalling latency. In this paper we explore the capabilities of a slightly enhanced/adapted ICRP, tailored to the ice monitoring application. By simulations and experiments at sea it is demonstrated that the protocol performs well and can manage the applications high traffic load - this provided that the point-to-point links provide sufficient bit rates and capacity headroom.
[ { "version": "v1", "created": "Fri, 8 Apr 2016 07:25:47 GMT" } ]
2016-04-11T00:00:00
[ [ "Reinen", "Tor Arne", "" ], [ "Lie", "Arne", "" ], [ "Knudsen", "Finn Tore", "" ] ]
new_dataset
0.9977
1604.02380
Mahdi Jafari Siavoshani
Mahdi Jafari Siavoshani, Shaunak Mishra, Christina Fragouli, Suhas N. Diggavi
Group secret key agreement over state-dependent wireless broadcast channels
27 pages, 6 figures, submitted for publication
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a group of $m$ trusted and authenticated nodes that aim to create a shared secret key $K$ over a wireless channel in the presence of an eavesdropper Eve. We assume that there exists a state dependent wireless broadcast channel from one of the honest nodes to the rest of them including Eve. All of the trusted nodes can also discuss over a cost-free, noiseless and unlimited rate public channel which is also overheard by Eve. For this setup, we develop an information-theoretically secure secret key agreement protocol. We show the optimality of this protocol for "linear deterministic" wireless broadcast channels. This model generalizes the packet erasure model studied in literature for wireless broadcast channels. For "state-dependent Gaussian" wireless broadcast channels, we propose an achievability scheme based on a multi-layer wiretap code. Finding the best achievable secret key generation rate leads to solving a non-convex power allocation problem. We show that using a dynamic programming algorithm, one can obtain the best power allocation for this problem. Moreover, we prove the optimality of the proposed achievability scheme for the regime of high-SNR and large-dynamic range over the channel states in the (generalized) degrees of freedom sense.
[ { "version": "v1", "created": "Fri, 8 Apr 2016 15:41:10 GMT" } ]
2016-04-11T00:00:00
[ [ "Siavoshani", "Mahdi Jafari", "" ], [ "Mishra", "Shaunak", "" ], [ "Fragouli", "Christina", "" ], [ "Diggavi", "Suhas N.", "" ] ]
new_dataset
0.983367
1601.06468
Lakshmi Natarajan Dr
Lakshmi Natarajan and Yi Hong and Emanuele Viterbo
New Error Correcting Codes for Informed Receivers
Accepted for publication in 2016 IEEE International Symposium on Information Theory (ISIT), Barcelona. Keywords: Cyclic codes, index coding, informed receivers, maximum distance separable codes, side information
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct error correcting codes for jointly transmitting a finite set of independent messages to an 'informed receiver' which has prior knowledge of the values of some subset of the messages as side information. The transmitter is oblivious to the message subset already known to the receiver and performs encoding in such a way that any possible side information can be used efficiently at the decoder. We construct and identify several families of algebraic error correcting codes for this problem using cyclic and maximum distance separable (MDS) codes. The proposed codes are of short block length, many of them provide optimum or near-optimum error correction capabilities and guarantee larger minimum distances than known codes of similar parameters for informed receivers. The constructed codes are also useful as error correcting codes for index coding when the transmitter does not know the side information available at the receivers.
[ { "version": "v1", "created": "Mon, 25 Jan 2016 02:44:09 GMT" }, { "version": "v2", "created": "Thu, 7 Apr 2016 10:11:55 GMT" } ]
2016-04-08T00:00:00
[ [ "Natarajan", "Lakshmi", "" ], [ "Hong", "Yi", "" ], [ "Viterbo", "Emanuele", "" ] ]
new_dataset
0.998222
1602.06627
Chengyu Lin
Chengyu Lin, Shengyu Zhang
Sensitivity Conjecture and Log-rank Conjecture for functions with small alternating numbers
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Sensitivity Conjecture and the Log-rank Conjecture are among the most important and challenging problems in concrete complexity. Incidentally, the Sensitivity Conjecture is known to hold for monotone functions, and so is the Log-rank Conjecture for $f(x \wedge y)$ and $f(x\oplus y)$ with monotone functions $f$, where $\wedge$ and $\oplus$ are bit-wise AND and XOR, respectively. In this paper, we extend these results to functions $f$ which alternate values for a relatively small number of times on any monotone path from $0^n$ to $1^n$. These deepen our understandings of the two conjectures, and contribute to the recent line of research on functions with small alternating numbers.
[ { "version": "v1", "created": "Mon, 22 Feb 2016 02:14:26 GMT" }, { "version": "v2", "created": "Thu, 7 Apr 2016 06:12:25 GMT" } ]
2016-04-08T00:00:00
[ [ "Lin", "Chengyu", "" ], [ "Zhang", "Shengyu", "" ] ]
new_dataset
0.970683
1604.01685
Marius Cordts
Marius Cordts, Mohamed Omran, Sebastian Ramos, Timo Rehfeld, Markus Enzweiler, Rodrigo Benenson, Uwe Franke, Stefan Roth, Bernt Schiele
The Cityscapes Dataset for Semantic Urban Scene Understanding
Includes supplemental material
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visual understanding of complex urban street scenes is an enabling factor for a wide range of applications. Object detection has benefited enormously from large-scale datasets, especially in the context of deep learning. For semantic urban scene understanding, however, no current dataset adequately captures the complexity of real-world urban scenes. To address this, we introduce Cityscapes, a benchmark suite and large-scale dataset to train and test approaches for pixel-level and instance-level semantic labeling. Cityscapes is comprised of a large, diverse set of stereo video sequences recorded in streets from 50 different cities. 5000 of these images have high quality pixel-level annotations; 20000 additional images have coarse annotations to enable methods that leverage large volumes of weakly-labeled data. Crucially, our effort exceeds previous attempts in terms of dataset size, annotation richness, scene variability, and complexity. Our accompanying empirical study provides an in-depth analysis of the dataset characteristics, as well as a performance evaluation of several state-of-the-art approaches based on our benchmark.
[ { "version": "v1", "created": "Wed, 6 Apr 2016 16:34:33 GMT" }, { "version": "v2", "created": "Thu, 7 Apr 2016 15:39:22 GMT" } ]
2016-04-08T00:00:00
[ [ "Cordts", "Marius", "" ], [ "Omran", "Mohamed", "" ], [ "Ramos", "Sebastian", "" ], [ "Rehfeld", "Timo", "" ], [ "Enzweiler", "Markus", "" ], [ "Benenson", "Rodrigo", "" ], [ "Franke", "Uwe", "" ], [ "Roth", "Stefan", "" ], [ "Schiele", "Bernt", "" ] ]
new_dataset
0.999882
1604.01787
Yanwei Cui
Yanwei Cui, Laetitia Chapel, S\'ebastien Lef\`evre
A Subpath Kernel for Learning Hierarchical Image Representations
10th IAPR-TC-15 International Workshop, GbRPR 2015, Beijing, China, May 13-15, 2015. Proceedings
null
10.1007/978-3-319-18224-7_4
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tree kernels have demonstrated their ability to deal with hierarchical data, as the intrinsic tree structure often plays a discriminative role. While such kernels have been successfully applied to various domains such as nature language processing and bioinformatics, they mostly concentrate on ordered trees and whose nodes are described by symbolic data. Meanwhile, hierarchical representations have gained increasing interest to describe image content. This is particularly true in remote sensing, where such representations allow for revealing different objects of interest at various scales through a tree structure. However, the induced trees are unordered and the nodes are equipped with numerical features. In this paper, we propose a new structured kernel for hierarchical image representations which is built on the concept of subpath kernel. Experimental results on both artificial and remote sensing datasets show that the proposed kernel manages to deal with the hierarchical nature of the data, leading to better classification rates.
[ { "version": "v1", "created": "Wed, 6 Apr 2016 20:04:17 GMT" } ]
2016-04-08T00:00:00
[ [ "Cui", "Yanwei", "" ], [ "Chapel", "Laetitia", "" ], [ "Lefèvre", "Sébastien", "" ] ]
new_dataset
0.988268
1604.01891
Xiaohang Ren
Xiaohang Ren, Kai Chen and Jun Sun
A CNN Based Scene Chinese Text Recognition Algorithm With Synthetic Data Engine
2 pages, DAS 2016 short paper
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scene text recognition plays an important role in many computer vision applications. The small size of available public available scene text datasets is the main challenge when training a text recognition CNN model. In this paper, we propose a CNN based Chinese text recognition algorithm. To enlarge the dataset for training the CNN model, we design a synthetic data engine for Chinese scene character generation, which generates representative character images according to the fonts use frequency of Chinese texts. As the Chinese text is more complex, the English text recognition CNN architecture is modified for Chinese text. To ensure the small size nature character dataset and the large size artificial character dataset are comparable in training, the CNN model are trained progressively. The proposed Chinese text recognition algorithm is evaluated with two Chinese text datasets. The algorithm achieves better recognize accuracy compared to the baseline methods.
[ { "version": "v1", "created": "Thu, 7 Apr 2016 07:08:25 GMT" } ]
2016-04-08T00:00:00
[ [ "Ren", "Xiaohang", "" ], [ "Chen", "Kai", "" ], [ "Sun", "Jun", "" ] ]
new_dataset
0.999525
1604.02028
Ann Drobnis
Klara Nahrstedt, Daniel Lopresti, Ben Zorn, Ann W. Drobnis, Beth Mynatt, Shwetak Patel, and Helen V. Wright
Smart Communities Internet of Things
A Computing Community Consortium (CCC) white paper, 9 pages
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today's cities face many challenges due to population growth, aging population, pedestrian and vehicular traffic congestion, water usage increase, increased electricity demands, crumbling physical infrastructure of buildings, roads, water sewage, power grid, and declining health care services. Moreover, major trends indicate the global urbanization of society, and the associated pressures it brings, will continue to accelerate. One of the approaches to assist in solving some of the challenges is to deploy extensive IT technology. It has been recognized that cyber-technology plays a key role in improving quality of people's lives, strengthening business and helping government agencies serve citizens better. In this white paper, we discuss the benefits and challenges of cyber-technologies within "Smart Cities", especially the IoT (Internet of Things) for smart communities, which means considering the benefits and challenges of IoT cyber-technologies on smart cities physical infrastructures and their human stakeholders. To point out the IoT challenges, we will first present the framework within which IoT lives, and then proceed with the challenges, conclusions and recommendations.
[ { "version": "v1", "created": "Thu, 7 Apr 2016 15:04:58 GMT" } ]
2016-04-08T00:00:00
[ [ "Nahrstedt", "Klara", "" ], [ "Lopresti", "Daniel", "" ], [ "Zorn", "Ben", "" ], [ "Drobnis", "Ann W.", "" ], [ "Mynatt", "Beth", "" ], [ "Patel", "Shwetak", "" ], [ "Wright", "Helen V.", "" ] ]
new_dataset
0.991283
1604.02128
Vivek Kumar
Vivek Kumar, Sandeep Sharma
Cryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack
Submitted for publication in IEEE Transaction on IT
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/4.0/
Cryptompress, a new 128-bit (initial) private-key cryptography algorithm is proposed. It uses a block size of at least 30 bits and increments prior key size to additional 32 bits on each unsuccessful attempt of any means, including bruteforcing, further changing a specific portion of the cyphertext using the reformed Feistel network. Encryption process results from a proposed compression sequence developed using lookup table and shift operations followed by key generation. Eventually, four matrixes named add-sub matrix, reduced matrix, sequence matrix and term matrix are obtained which ultimately forms a cyphertext.
[ { "version": "v1", "created": "Thu, 7 Apr 2016 19:31:53 GMT" } ]
2016-04-08T00:00:00
[ [ "Kumar", "Vivek", "" ], [ "Sharma", "Sandeep", "" ] ]
new_dataset
0.999804
1402.1530
Marco Compagnoni
Marco Compagnoni, Roberto Notari
TDOA--based localization in two dimensions: the bifurcation curve
11 pages, 3 figures, to appear in Fundamenta Informaticae
Fundamenta Informaticae XXI (2014) 1001-1012
10.3233/FI-2014-1118
null
cs.SD gr-qc math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we complete the study of the geometry of the TDOA map that encodes the noiseless model for the localization of a source from the range differences between three receivers in a plane, by computing the Cartesian equation of the bifurcation curve in terms of the positions of the receivers. From that equation, we can compute its real asymptotic lines. The present manuscript completes the analysis of [Inverse Problems, Vol. 30, Number 3, Pages 035004]. Our result is useful to check if a source belongs or is closed to the bifurcation curve, where the localization in a noisy scenario is ambiguous.
[ { "version": "v1", "created": "Thu, 6 Feb 2014 23:43:28 GMT" } ]
2016-04-07T00:00:00
[ [ "Compagnoni", "Marco", "" ], [ "Notari", "Roberto", "" ] ]
new_dataset
0.997891
1506.02465
Marius Lindauer
Bernd Bischl, Pascal Kerschke, Lars Kotthoff, Marius Lindauer, Yuri Malitsky, Alexandre Frechette, Holger Hoos, Frank Hutter, Kevin Leyton-Brown, Kevin Tierney, Joaquin Vanschoren
ASlib: A Benchmark Library for Algorithm Selection
Accepted to be published in Artificial Intelligence Journal
null
null
null
cs.AI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The task of algorithm selection involves choosing an algorithm from a set of algorithms on a per-instance basis in order to exploit the varying performance of algorithms over a set of instances. The algorithm selection problem is attracting increasing attention from researchers and practitioners in AI. Years of fruitful applications in a number of domains have resulted in a large amount of data, but the community lacks a standard format or repository for this data. This situation makes it difficult to share and compare different approaches effectively, as is done in other, more established fields. It also unnecessarily hinders new researchers who want to work in this area. To address this problem, we introduce a standardized format for representing algorithm selection scenarios and a repository that contains a growing number of data sets from the literature. Our format has been designed to be able to express a wide variety of different scenarios. Demonstrating the breadth and power of our platform, we describe a set of example experiments that build and evaluate algorithm selection models through a common interface. The results display the potential of algorithm selection to achieve significant performance improvements across a broad range of problems and algorithms.
[ { "version": "v1", "created": "Mon, 8 Jun 2015 12:35:04 GMT" }, { "version": "v2", "created": "Wed, 24 Feb 2016 14:38:52 GMT" }, { "version": "v3", "created": "Wed, 6 Apr 2016 13:20:23 GMT" } ]
2016-04-07T00:00:00
[ [ "Bischl", "Bernd", "" ], [ "Kerschke", "Pascal", "" ], [ "Kotthoff", "Lars", "" ], [ "Lindauer", "Marius", "" ], [ "Malitsky", "Yuri", "" ], [ "Frechette", "Alexandre", "" ], [ "Hoos", "Holger", "" ], [ "Hutter", "Frank", "" ], [ "Leyton-Brown", "Kevin", "" ], [ "Tierney", "Kevin", "" ], [ "Vanschoren", "Joaquin", "" ] ]
new_dataset
0.985403
1506.08248
Arvind Merwaday
Arvind Merwaday, Ismail Guvenc
Handover Count Based Velocity Estimation and Mobility State Detection in Dense HetNets
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In wireless cellular networks with densely deployed base stations, knowing the velocities of mobile devices is a key to avoid call drops and improve the quality of service to the user equipments (UEs). A simple and efficient way to estimate a UE's velocity is by counting the number of handovers made by the UE during a predefined time window. Indeed, handover-count based mobility state detection has been standardized since Long Term Evolution (LTE) Release-8 specifications. The increasing density of small cells in wireless networks can help in accurate estimation of velocity and mobility state of a UE. In this paper, we model densely deployed small cells using stochastic geometry, and then analyze the statistics of the number of handovers as a function of UE velocity, small-cell density, and handover count measurement time window. Using these statistics, we derive approximations to the Cramer-Rao lower bound (CRLB) for the velocity estimate of a UE. Also, we determine a minimum variance unbiased (MVU) velocity estimator whose variance tightly matches with the CRLB. Using this velocity estimator, we formulate the problem of detecting the mobility state of a UE as low, medium, or high-mobility, as in LTE specifications. Subsequently, we derive the probability of correctly detecting the mobility state of a UE. Finally, we evaluate the accuracy of the velocity estimator under more realistic scenarios such as clustered deployment of small cells, random way point (RWP) mobility model for UEs, and variable UE velocity. Our analysis shows that the accuracy of velocity estimation and mobility state detection increases with increasing small cell density and with increasing handover count measurement time window.
[ { "version": "v1", "created": "Sat, 27 Jun 2015 01:20:40 GMT" }, { "version": "v2", "created": "Mon, 28 Sep 2015 02:38:49 GMT" }, { "version": "v3", "created": "Tue, 5 Apr 2016 23:03:32 GMT" } ]
2016-04-07T00:00:00
[ [ "Merwaday", "Arvind", "" ], [ "Guvenc", "Ismail", "" ] ]
new_dataset
0.97758
1603.06830
Ajay Sharma Dr.
Sonam Chauhan and Ajay Sharma
Fuzzy Commitment Scheme based on Reed Solomon Codes
This paper requires a lot of improvements
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The conventional commitment scheme requires both commitment string and a valid key for the sender to verify his commitment. Differ from the conventional commitment scheme; fuzzy commitment scheme accepts the key that is similar to the original key. The new opening key, not identical to the original key, differs from the initial key in some suitable metrics. The fuzziness in the fuzzy commitment scheme tolerate small amount of corruptions. The fuzzy commitment scheme based on the cryptographic hash functions suffers security imperfections. Thus, this paper combines the fuzzy commitment scheme with the Reed Solomon error correction codes, which are capable of correcting certain number of errors. As a result, Reed Solomon code proves better alternative for fuzzy commitment scheme than hash functions, as the Reed Solomon codes are more secure than the hashing techniques. Moreover, the Fuzzy Commitment Scheme based on Reed Solomon codes provides security at two levels that making it suitable for securing data. This paper explore the efficiency of executing fuzzy commitment scheme in conjunction with Reed Solomon code as a novel better alternative to the conventional commitment scheme.
[ { "version": "v1", "created": "Tue, 22 Mar 2016 15:30:24 GMT" }, { "version": "v2", "created": "Wed, 6 Apr 2016 17:08:01 GMT" } ]
2016-04-07T00:00:00
[ [ "Chauhan", "Sonam", "" ], [ "Sharma", "Ajay", "" ] ]
new_dataset
0.995254
1603.09446
Wei Shen
Wei Shen, Kai Zhao, Yuan Jiang, Yan Wang, Zhijiang Zhang, Xiang Bai
Object Skeleton Extraction in Natural Images by Fusing Scale-associated Deep Side Outputs
Accepted by CVPR2016
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object skeleton is a useful cue for object detection, complementary to the object contour, as it provides a structural representation to describe the relationship among object parts. While object skeleton extraction in natural images is a very challenging problem, as it requires the extractor to be able to capture both local and global image context to determine the intrinsic scale of each skeleton pixel. Existing methods rely on per-pixel based multi-scale feature computation, which results in difficult modeling and high time consumption. In this paper, we present a fully convolutional network with multiple scale-associated side outputs to address this problem. By observing the relationship between the receptive field sizes of the sequential stages in the network and the skeleton scales they can capture, we introduce a scale-associated side output to each stage. We impose supervision to different stages by guiding the scale-associated side outputs toward groundtruth skeletons of different scales. The responses of the multiple scale-associated side outputs are then fused in a scale-specific way to localize skeleton pixels with multiple scales effectively. Our method achieves promising results on two skeleton extraction datasets, and significantly outperforms other competitors.
[ { "version": "v1", "created": "Thu, 31 Mar 2016 03:21:33 GMT" }, { "version": "v2", "created": "Wed, 6 Apr 2016 05:51:33 GMT" } ]
2016-04-07T00:00:00
[ [ "Shen", "Wei", "" ], [ "Zhao", "Kai", "" ], [ "Jiang", "Yuan", "" ], [ "Wang", "Yan", "" ], [ "Zhang", "Zhijiang", "" ], [ "Bai", "Xiang", "" ] ]
new_dataset
0.965279
1604.01303
Liang Wang
Liang Wang, Mario Almeida, Jeremy Blackburn, Jon Crowcroft
C3PO: Computation Congestion Control (PrOactive) - an algorithm for dynamic diffusion of ephemeral in-network services
null
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is an obvious trend that more and more data and computation are migrating into networks nowadays. Combining mature virtualization technologies with service-centric net- working, we are entering into an era where countless services reside in an ISP network to provide low-latency access. Such services are often computation intensive and are dynamically created and destroyed on demands everywhere in the network to perform various tasks. Consequently, these ephemeral in-network services introduce a new type of congestion in the network which we refer to as "computation congestion". The service load need to be effectively distributed on different nodes in order to maintain the funtionality and responsiveness of the network, which calls for a new design rather than reusing the centralised scheduler designed for cloud-based services. In this paper, we study both passive and proactive control strategies, based on the proactive control we further propose a fully distributed solution which is low complexity, adaptive, and responsive to network dynamics.
[ { "version": "v1", "created": "Tue, 5 Apr 2016 15:38:51 GMT" }, { "version": "v2", "created": "Wed, 6 Apr 2016 09:07:04 GMT" } ]
2016-04-07T00:00:00
[ [ "Wang", "Liang", "" ], [ "Almeida", "Mario", "" ], [ "Blackburn", "Jeremy", "" ], [ "Crowcroft", "Jon", "" ] ]
new_dataset
0.988028
1604.01434
Sergey Loyka
Sergey Loyka, Charalambos D. Charalambous
A General Formula for Compound Channel Capacity
accepted by IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A general formula for the capacity of arbitrary compound channels with the receiver channel state information is obtained using the information density approach. No assumptions of ergodicity, stationarity or information stability are made and the channel state set is arbitrary. A direct (constructive) proof is given. To prove achievability, we generalize Feinstein Lemma to the compound channel setting, and to prove converse, we generalize Verdu-Han Lemma to the same compound setting. A notion of a uniform compound channel is introduced and the general formula is shown to reduce to the familiar $\sup-\inf$ expression for such channels. As a by-product, the arbitrary varying channel capacity is established under maximum error probability and deterministic coding. Conditions are established under which the worst-case and compound channel capacities are equal so that the full channel state information at the transmitter brings in no advantage. The compound inf-information rate plays a prominent role in the general formula. Its properties are studied and a link between information-unstable and information-stable regimes of a compound channel is established. The results are extended to include $\varepsilon$-capacity of compound channels. Sufficient and necessary conditions for the strong converse to hold are given.
[ { "version": "v1", "created": "Tue, 5 Apr 2016 21:43:25 GMT" } ]
2016-04-07T00:00:00
[ [ "Loyka", "Sergey", "" ], [ "Charalambous", "Charalambos D.", "" ] ]
new_dataset
0.999245
1604.01537
Xiaoyuan Yi
Xiaoyuan Yi, Ruoyu Li, Maosong Sun
Generating Chinese Classical Poems with RNN Encoder-Decoder
12 pages, 8 figures, 4 tables
null
null
null
cs.CL cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We take the generation of Chinese classical poem lines as a sequence-to-sequence learning problem, and build a novel system based on the RNN Encoder-Decoder structure to generate quatrains (Jueju in Chinese), with a topic word as input. Our system can jointly learn semantic meaning within a single line, semantic relevance among lines in a poem, and the use of structural, rhythmical and tonal patterns, without utilizing any constraint templates. Experimental results show that our system outperforms other competitive systems. We also find that the attention mechanism can capture the word associations in Chinese classical poetry and inverting target lines in training can improve performance.
[ { "version": "v1", "created": "Wed, 6 Apr 2016 08:26:31 GMT" } ]
2016-04-07T00:00:00
[ [ "Yi", "Xiaoyuan", "" ], [ "Li", "Ruoyu", "" ], [ "Sun", "Maosong", "" ] ]
new_dataset
0.995867
1604.01574
Ramanathan Subramanian
Syed Omer Gilani, Ramanathan Subramanian, Yan Yan, David Melcher, Nicu Sebe, Stefan Winkler
PET: An Eye-tracking Dataset for Animal-centric PASCAL Object Classes
Int'l Conference on Multimedia and Expo 2015
null
null
null
cs.HC
http://creativecommons.org/licenses/by-nc-sa/4.0/
We present the Pascal animal classes Eye Tracking database. Our database comprises eye movement recordings compiled from forty users for the bird, cat, cow, dog, horse and sheep {trainval} sets from the VOC 2012 image set. Different from recent eye-tracking databases such as \cite{kiwon_cvpr13_gaze,PapadopoulosCKF14}, a salient aspect of PET is that it contains eye movements recorded for both the free-viewing and visual search task conditions. While some differences in terms of overall gaze behavior and scanning patterns are observed between the two conditions, a very similar number of fixations are observed on target objects for both conditions. As a utility application, we show how feature pooling around fixated locations enables enhanced (animal) object classification accuracy.
[ { "version": "v1", "created": "Wed, 6 Apr 2016 11:15:35 GMT" } ]
2016-04-07T00:00:00
[ [ "Gilani", "Syed Omer", "" ], [ "Subramanian", "Ramanathan", "" ], [ "Yan", "Yan", "" ], [ "Melcher", "David", "" ], [ "Sebe", "Nicu", "" ], [ "Winkler", "Stefan", "" ] ]
new_dataset
0.999717
1604.01594
Alberto Pittolo
Alberto Pittolo and Andrea M. Tonello
A Synthetic MIMO PLC Channel Model
This work has been presented at the 2016 IEEE 20th International Symposium on Power Line Communications and its Applications (ISPLC) -- Bottrop, Germany, 20-23 March 2016, in the recent results session. The paper consists of 4 pages, 2 figures, 1 table
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The huge and increasing demand of data connectivity motivates the development of new and effective power line communication (PLC) channel models, which are able to faithfully describe a real communication scenario. This is of fundamental importance since a good model represents a quick evaluation tool for new standards or devices, allowing a considerable saving in time and costs. The aim of this paper is to discuss a novel top-down MIMO PLC synthetic channel model, able to numerically emulate a real PLC environment. First, the most common channel modeling strategies are briefly described, highlighting strengths and weaknesses. Afterwards, the basic model approach is described considering the SISO scenario. The implementation strategy is then extended to the MIMO case. The validity of the proposed model is proved making a comparison between the simulated channels and channels obtained with measurements in terms of both performance and statistical metrics. The focus is on the broadband frequency spectrum.
[ { "version": "v1", "created": "Wed, 6 Apr 2016 12:47:17 GMT" } ]
2016-04-07T00:00:00
[ [ "Pittolo", "Alberto", "" ], [ "Tonello", "Andrea M.", "" ] ]
new_dataset
0.995184
1511.04594
Daniel Gruss
Daniel Gruss, Cl\'ementine Maurice, Klaus Wagner, Stefan Mangard
Flush+Flush: A Fast and Stealthy Cache Attack
This paper has been accepted at the 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) 2016. The final publication is available at link.springer.com
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research on cache attacks has shown that CPU caches leak significant information. Proposed detection mechanisms assume that all cache attacks cause more cache hits and cache misses than benign applications and use hardware performance counters for detection. In this article, we show that this assumption does not hold by developing a novel attack technique: the Flush+Flush attack. The Flush+Flush attack only relies on the execution time of the flush instruction, which depends on whether data is cached or not. Flush+Flush does not make any memory accesses, contrary to any other cache attack. Thus, it causes no cache misses at all and the number of cache hits is reduced to a minimum due to the constant cache flushes. Therefore, Flush+Flush attacks are stealthy, i.e., the spy process cannot be detected based on cache hits and misses, or state-of-the-art detection mechanisms. The Flush+Flush attack runs in a higher frequency and thus is faster than any existing cache attack. With 496 KB/s in a cross-core covert channel it is 6.7 times faster than any previously published cache covert channel.
[ { "version": "v1", "created": "Sat, 14 Nov 2015 18:40:20 GMT" }, { "version": "v2", "created": "Fri, 1 Apr 2016 11:32:03 GMT" }, { "version": "v3", "created": "Tue, 5 Apr 2016 09:23:47 GMT" } ]
2016-04-06T00:00:00
[ [ "Gruss", "Daniel", "" ], [ "Maurice", "Clémentine", "" ], [ "Wagner", "Klaus", "" ], [ "Mangard", "Stefan", "" ] ]
new_dataset
0.99819
1603.08079
Andrei Barbu
Yevgeni Berzak and Andrei Barbu and Daniel Harari and Boris Katz and Shimon Ullman
Do You See What I Mean? Visual Resolution of Linguistic Ambiguities
EMNLP 2015
Conference on Empirical Methods in Natural Language Processing (EMNLP), 2015, pages 1477--1487
null
null
cs.CV cs.AI cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding language goes hand in hand with the ability to integrate complex contextual information obtained via perception. In this work, we present a novel task for grounded language understanding: disambiguating a sentence given a visual scene which depicts one of the possible interpretations of that sentence. To this end, we introduce a new multimodal corpus containing ambiguous sentences, representing a wide range of syntactic, semantic and discourse ambiguities, coupled with videos that visualize the different interpretations for each sentence. We address this task by extending a vision model which determines if a sentence is depicted by a video. We demonstrate how such a model can be adjusted to recognize different interpretations of the same underlying sentence, allowing to disambiguate sentences in a unified fashion across the different ambiguity types.
[ { "version": "v1", "created": "Sat, 26 Mar 2016 06:49:33 GMT" } ]
2016-04-06T00:00:00
[ [ "Berzak", "Yevgeni", "" ], [ "Barbu", "Andrei", "" ], [ "Harari", "Daniel", "" ], [ "Katz", "Boris", "" ], [ "Ullman", "Shimon", "" ] ]
new_dataset
0.968319
1604.01162
Vishal P Venkata
Vishal P Venkata and Natarajan V
Control System Design for Tricopter using Filters and PID controller
5 pages, 9 figures, 3 tables
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The purpose of this paper is to present the control system design of Tricopter. We have presented the implementation of control system in software in this paper. Tricopter's control system mainly consists of two parts Complimentary filter and PID block. The angles along X, Y and Z axis are taken from the complementary filter which acts as a feedback block. We have used the combination of gyroscope and accelerometer for finding the angle. We have also shown the role of the complimentary filter in finding out the angle along X, Y, and Z axis instead of using gyroscope and accelerometer directly. The second main part is the PID Controller which calculates the error in angle along X, Y and Z axis and produces an output signal which reduces error. We have shown the importance of the constant parameters of PID Controller. The results of this paper are tested on an actual Tricopter and also plotted in the form of graph using Matlab and Processing software.
[ { "version": "v1", "created": "Tue, 5 Apr 2016 07:36:31 GMT" } ]
2016-04-06T00:00:00
[ [ "Venkata", "Vishal P", "" ], [ "V", "Natarajan", "" ] ]
new_dataset
0.996368
1604.01235
Vijay Krishna Menon Mr
Vijay Krishna Menon, S. Rajendran, M. Anand Kumar, K.P. Soman
A new TAG Formalism for Tamil and Parser Analytics
International Symposium for Dravidian Languages (iDravidian), co-located with ICON2014, Goa University, Dec 2014
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tree adjoining grammar (TAG) is specifically suited for morph rich and agglutinated languages like Tamil due to its psycho linguistic features and parse time dependency and morph resolution. Though TAG and LTAG formalisms have been known for about 3 decades, efforts on designing TAG Syntax for Tamil have not been entirely successful due to the complexity of its specification and the rich morphology of Tamil language. In this paper we present a minimalistic TAG for Tamil without much morphological considerations and also introduce a parser implementation with some obvious variations from the XTAG system
[ { "version": "v1", "created": "Tue, 5 Apr 2016 12:42:31 GMT" } ]
2016-04-06T00:00:00
[ [ "Menon", "Vijay Krishna", "" ], [ "Rajendran", "S.", "" ], [ "Kumar", "M. Anand", "" ], [ "Soman", "K. P.", "" ] ]
new_dataset
0.99898
1604.01376
Valentina Zantedeschi
Valentina Zantedeschi, R\'emi Emonet, Marc Sebban
Lipschitz Continuity of Mahalanobis Distances and Bilinear Forms
null
null
null
null
cs.NA cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many theoretical results in the machine learning domain stand only for functions that are Lipschitz continuous. Lipschitz continuity is a strong form of continuity that linearly bounds the variations of a function. In this paper, we derive tight Lipschitz constants for two families of metrics: Mahalanobis distances and bounded-space bilinear forms. To our knowledge, this is the first time the Mahalanobis distance is formally proved to be Lipschitz continuous and that such tight Lipschitz constants are derived.
[ { "version": "v1", "created": "Mon, 4 Apr 2016 12:39:26 GMT" } ]
2016-04-06T00:00:00
[ [ "Zantedeschi", "Valentina", "" ], [ "Emonet", "Rémi", "" ], [ "Sebban", "Marc", "" ] ]
new_dataset
0.995727
1512.00103
Daniel Gillick
Dan Gillick, Cliff Brunk, Oriol Vinyals, Amarnag Subramanya
Multilingual Language Processing From Bytes
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an LSTM-based model which we call Byte-to-Span (BTS) that reads text as bytes and outputs span annotations of the form [start, length, label] where start positions, lengths, and labels are separate entries in our vocabulary. Because we operate directly on unicode bytes rather than language-specific words or characters, we can analyze text in many languages with a single model. Due to the small vocabulary size, these multilingual models are very compact, but produce results similar to or better than the state-of- the-art in Part-of-Speech tagging and Named Entity Recognition that use only the provided training datasets (no external data sources). Our models are learning "from scratch" in that they do not rely on any elements of the standard pipeline in Natural Language Processing (including tokenization), and thus can run in standalone fashion on raw text.
[ { "version": "v1", "created": "Tue, 1 Dec 2015 00:23:44 GMT" }, { "version": "v2", "created": "Sat, 2 Apr 2016 16:26:23 GMT" } ]
2016-04-05T00:00:00
[ [ "Gillick", "Dan", "" ], [ "Brunk", "Cliff", "" ], [ "Vinyals", "Oriol", "" ], [ "Subramanya", "Amarnag", "" ] ]
new_dataset
0.999458
1602.04701
Henk Moed
Henk F. Moed
Iran's scientific dominance and the emergence of South-East Asian countries as scientific collaborators in the Persian Gulf Region
Version 31 March 2016 accepted for publication in Scientometrics
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A longitudinal bibliometric analysis of publications indexed in Thomson Reuters' Incites and Elsevier's Scopus, and published from Persian Gulf States and neighbouring Middle East countries, shows clear effects of major political events during the past 35 years. Predictions made in 2006 by the US diplomat Richard N. Haass on political changes in the Middle East have come true in the Gulf States' national scientific research systems, to the extent that Iran has become in 2015 by far the leading country in the Persian Gulf, and South-East Asian countries including China, Malaysia and South Korea have become major scientific collaborators, displacing the USA and other large Western countries. But collaborations patterns among Persian Gulf States show no apparent relationship with differences in Islam denominations.
[ { "version": "v1", "created": "Mon, 15 Feb 2016 15:04:32 GMT" }, { "version": "v2", "created": "Mon, 4 Apr 2016 08:42:48 GMT" } ]
2016-04-05T00:00:00
[ [ "Moed", "Henk F.", "" ] ]
new_dataset
0.994014
1602.06690
Rajai Nasser
Rajai Nasser
Erasure Schemes Using Generalized Polar Codes: Zero-Undetected-Error Capacity and Performance Trade-offs
Accepted to ISIT2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the performance of generalized polar (GP) codes when they are used for coding schemes involving erasure. GP codes are a family of codes which contains, among others, the standard polar codes of Ar{\i}kan and Reed-Muller codes. We derive a closed formula for the zero-undetected-error capacity $I_0^{GP}(W)$ of GP codes for a given binary memoryless symmetric (BMS) channel $W$ under the low complexity successive cancellation decoder with erasure. We show that for every $R<I_0^{GP}(W)$, there exists a generalized polar code of blocklength $N$ and of rate at least $R$ where the undetected-error probability is zero and the erasure probability is less than $2^{-N^{\frac{1}{2}-\epsilon}}$. On the other hand, for any GP code of rate $I_0^{GP}(W)<R<I(W)$ and blocklength $N$, the undetected error probability cannot be made less than $2^{-N^{\frac{1}{2}+\epsilon}}$ unless the erasure probability is close to $1$.
[ { "version": "v1", "created": "Mon, 22 Feb 2016 09:07:32 GMT" }, { "version": "v2", "created": "Fri, 4 Mar 2016 10:55:34 GMT" }, { "version": "v3", "created": "Mon, 4 Apr 2016 16:44:35 GMT" } ]
2016-04-05T00:00:00
[ [ "Nasser", "Rajai", "" ] ]
new_dataset
0.999695
1604.00449
Christopher B. Choy
Christopher B. Choy, Danfei Xu, JunYoung Gwak, Kevin Chen, Silvio Savarese
3D-R2N2: A Unified Approach for Single and Multi-view 3D Object Reconstruction
Appendix can be found at http://cvgl.stanford.edu/papers/choy_16_appendix.pdf
null
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by the recent success of methods that employ shape priors to achieve robust 3D reconstructions, we propose a novel recurrent neural network architecture that we call the 3D Recurrent Reconstruction Neural Network (3D-R2N2). The network learns a mapping from images of objects to their underlying 3D shapes from a large collection of synthetic data. Our network takes in one or more images of an object instance from arbitrary viewpoints and outputs a reconstruction of the object in the form of a 3D occupancy grid. Unlike most of the previous works, our network does not require any image annotations or object class labels for training or testing. Our extensive experimental analysis shows that our reconstruction framework i) outperforms the state-of-the-art methods for single view reconstruction, and ii) enables the 3D reconstruction of objects in situations when traditional SFM/SLAM methods fail (because of lack of texture and/or wide baseline).
[ { "version": "v1", "created": "Sat, 2 Apr 2016 01:28:27 GMT" } ]
2016-04-05T00:00:00
[ [ "Choy", "Christopher B.", "" ], [ "Xu", "Danfei", "" ], [ "Gwak", "JunYoung", "" ], [ "Chen", "Kevin", "" ], [ "Savarese", "Silvio", "" ] ]
new_dataset
0.971604
1604.00493
Minati Mishra Dr.
Sanjeeb Kumar Behera, Minati Mishra
Steganography -- A Game of Hide and Seek in Information Communication
5 pages, 4 figures, National Conference on Recent Innovations in Engineering and Management Sciences (RIEMS-2016)
null
null
null
cs.MM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the growth of communication over computer networks, how to maintain the confidentiality and security of transmitted information have become some of the important issues. In order to transfer data securely to the destination without unwanted disclosure or damage, nature inspired hide and seek tricks such as, cryptography and Steganography are heavily in use. Just like the Chameleon and many other bio-species those change their body color and hide themselves in the background in order to protect them from external attacks, Cryptography and Steganography are techniques those are used to encrypt and hide the secret data inside other media to ensure data security. This paper discusses the concept of a simple spatial domain LSB Steganography that encrypts the secrets using Fibonacci- Lucas transformation, before hiding, for better security.
[ { "version": "v1", "created": "Sat, 2 Apr 2016 12:21:52 GMT" } ]
2016-04-05T00:00:00
[ [ "Behera", "Sanjeeb Kumar", "" ], [ "Mishra", "Minati", "" ] ]
new_dataset
0.998591
1604.00498
Sruti Gan Chaudhuri
Subhash Bhagat, Sruti Gan Chaudhuri and Krishnendu Mukhopadhyaya
A Get-Together for Deaf and Dumb Robots in Three dimensional Space
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a strategy for a group of deaf and dumb robots, carrying clocks from different countries, to meet at a geographical location which is not fixed in advanced. The robots act independently. They can observe others, compute some locations and walk towards those locations. They can only get a snapshot of the locations of other robots but can not detect whether they are static or in motion. The robots are forgetful; once they have completed their motion they forget their previous locations and observations. Again they decide new destinations to move to. Eventually all the robots compute the same destination and meet there. There exists no global positioning system. As they stand, they agree on up and down directions. However, as they do not have any compass, the other directions are not agreed upon. They also do not agree on the clockwise direction. For determining a strategy, we imagine the robots to be points on a three dimensional plane where all the robots are mutually visible to each other always. The strategy we propose has to be obeyed by all the robots independently with respect to their own clock and compass. Initially the robots start from distinct locations. Some dead robots may be present in the system or some may die any time before or after the get together. However, the live robots are not aware of the presence of these dead robots.
[ { "version": "v1", "created": "Sat, 2 Apr 2016 13:08:42 GMT" } ]
2016-04-05T00:00:00
[ [ "Bhagat", "Subhash", "" ], [ "Chaudhuri", "Sruti Gan", "" ], [ "Mukhopadhyaya", "Krishnendu", "" ] ]
new_dataset
0.951425
1604.00557
Mukhtiar Ali Unar
Muhammad Saleh Shah, Asim Imdad Wagan, Mukhtiar Ali Unar
SAM: Support Vector Machine Based Active Queue Management
8 pages, Mehran University Research Journal of Engineering and Technology, Vol 33, No.1, January 2014
null
null
null
cs.NI cs.LG
http://creativecommons.org/licenses/by/4.0/
Recent years have seen an increasing interest in the design of AQM (Active Queue Management) controllers. The purpose of these controllers is to manage the network congestion under varying loads, link delays and bandwidth. In this paper, a new AQM controller is proposed which is trained by using the SVM (Support Vector Machine) with the RBF (Radial Basis Function) kernal. The proposed controller is called the support vector based AQM (SAM) controller. The performance of the proposed controller has been compared with three conventional AQM controllers, namely the Random Early Detection, Blue and Proportional Plus Integral Controller. The preliminary simulation studies show that the performance of the proposed controller is comparable to the conventional controllers. However, the proposed controller is more efficient in controlling the queue size than the conventional controllers.
[ { "version": "v1", "created": "Sat, 2 Apr 2016 20:47:51 GMT" } ]
2016-04-05T00:00:00
[ [ "Shah", "Muhammad Saleh", "" ], [ "Wagan", "Asim Imdad", "" ], [ "Unar", "Mukhtiar Ali", "" ] ]
new_dataset
0.999233
1604.00606
Yuzhuo Ren
Yuzhuo Ren, Chen Chen, Shangwen Li, and C.-C. Jay Kuo
GAL: A Global-Attributes Assisted Labeling System for Outdoor Scenes
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An approach that extracts global attributes from outdoor images to facilitate geometric layout labeling is investigated in this work. The proposed Global-attributes Assisted Labeling (GAL) system exploits both local features and global attributes. First, by following a classical method, we use local features to provide initial labels for all super-pixels. Then, we develop a set of techniques to extract global attributes from 2D outdoor images. They include sky lines, ground lines, vanishing lines, etc. Finally, we propose the GAL system that integrates global attributes in the conditional random field (CRF) framework to improve initial labels so as to offer a more robust labeling result. The performance of the proposed GAL system is demonstrated and benchmarked with several state-of-the-art algorithms against a popular outdoor scene layout dataset.
[ { "version": "v1", "created": "Sun, 3 Apr 2016 07:36:50 GMT" } ]
2016-04-05T00:00:00
[ [ "Ren", "Yuzhuo", "" ], [ "Chen", "Chen", "" ], [ "Li", "Shangwen", "" ], [ "Kuo", "C. -C. Jay", "" ] ]
new_dataset
0.998525
1604.00700
Rayan Saab
Rayan Saab, Rongrong Wang, and Ozgur Yilmaz
From compressed sensing to compressed bit-streams: practical encoders, tractable decoders
32 pages, 4 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed sensing is now established as an effective method for dimension reduction when the underlying signals are sparse or compressible with respect to some suitable basis or frame. One important, yet under-addressed problem regarding the compressive acquisition of analog signals is how to perform quantization. This is directly related to the important issues of how "compressed" compressed sensing is (in terms of the total number of bits one ends up using after acquiring the signal) and ultimately whether compressed sensing can be used to obtain compressed representations of suitable signals. Building on our recent work, we propose a concrete and practicable method for performing "analog-to-information conversion". Following a compressive signal acquisition stage, the proposed method consists of a quantization stage, based on $\Sigma\Delta$ (sigma-delta) quantization, and a subsequent encoding (compression) stage that fits within the framework of compressed sensing seamlessly. We prove that, using this method, we can convert analog compressive samples to compressed digital bitstreams and decode using tractable algorithms based on convex optimization. We prove that the proposed AIC provides a nearly optimal encoding of sparse and compressible signals. Finally, we present numerical experiments illustrating the effectiveness of the proposed analog-to-information converter.
[ { "version": "v1", "created": "Sun, 3 Apr 2016 23:13:02 GMT" } ]
2016-04-05T00:00:00
[ [ "Saab", "Rayan", "" ], [ "Wang", "Rongrong", "" ], [ "Yilmaz", "Ozgur", "" ] ]
new_dataset
0.984877
1604.00799
Alessandro Artale
Alessandro Artale and Enrico Franconi
Extending DLR with Labelled Tuples, Projections, Functional Dependencies and Objectification (full version)
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an extension of the n-ary description logic DLR to deal with attribute-labelled tuples (generalising the positional notation), with arbitrary projections of relations (inclusion dependencies), generic functional dependencies and with global and local objectification (reifying relations or their projections). We show how a simple syntactic condition on the appearance of projections and functional dependencies in a knowledge base makes the language decidable without increasing the computational complexity of the basic DLR language.
[ { "version": "v1", "created": "Mon, 4 Apr 2016 10:11:52 GMT" } ]
2016-04-05T00:00:00
[ [ "Artale", "Alessandro", "" ], [ "Franconi", "Enrico", "" ] ]
new_dataset
0.958061
1604.00895
Shuda Li
Shuda Li, Ankur Handa, Yang Zhang, Andrew Calway
HDRFusion: HDR SLAM using a low-cost auto-exposure RGB-D sensor
14 pages
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a new method for comparing frame appearance in a frame-to-model 3-D mapping and tracking system using an low dynamic range (LDR) RGB-D camera which is robust to brightness changes caused by auto exposure. It is based on a normalised radiance measure which is invariant to exposure changes and not only robustifies the tracking under changing lighting conditions, but also enables the following exposure compensation perform accurately to allow online building of high dynamic range (HDR) maps. The latter facilitates the frame-to-model tracking to minimise drift as well as better capturing light variation within the scene. Results from experiments with synthetic and real data demonstrate that the method provides both improved tracking and maps with far greater dynamic range of luminosity.
[ { "version": "v1", "created": "Mon, 4 Apr 2016 15:05:27 GMT" } ]
2016-04-05T00:00:00
[ [ "Li", "Shuda", "" ], [ "Handa", "Ankur", "" ], [ "Zhang", "Yang", "" ], [ "Calway", "Andrew", "" ] ]
new_dataset
0.997978
1604.00990
Hatem Alismail
Hatem Alismail, Brett Browning, Simon Lucey
Direct Visual Odometry using Bit-Planes
null
null
null
null
cs.RO cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Feature descriptors, such as SIFT and ORB, are well-known for their robustness to illumination changes, which has made them popular for feature-based VSLAM\@. However, in degraded imaging conditions such as low light, low texture, blur and specular reflections, feature extraction is often unreliable. In contrast, direct VSLAM methods which estimate the camera pose by minimizing the photometric error using raw pixel intensities are often more robust to low textured environments and blur. Nonetheless, at the core of direct VSLAM is the reliance on a consistent photometric appearance across images, otherwise known as the brightness constancy assumption. Unfortunately, brightness constancy seldom holds in real world applications. In this work, we overcome brightness constancy by incorporating feature descriptors into a direct visual odometry framework. This combination results in an efficient algorithm that combines the strength of both feature-based algorithms and direct methods. Namely, we achieve robustness to arbitrary photometric variations while operating in low-textured and poorly lit environments. Our approach utilizes an efficient binary descriptor, which we call Bit-Planes, and show how it can be used in the gradient-based optimization required by direct methods. Moreover, we show that the squared Euclidean distance between Bit-Planes is equivalent to the Hamming distance. Hence, the descriptor may be used in least squares optimization without sacrificing its photometric invariance. Finally, we present empirical results that demonstrate the robustness of the approach in poorly lit underground environments.
[ { "version": "v1", "created": "Mon, 4 Apr 2016 19:02:45 GMT" } ]
2016-04-05T00:00:00
[ [ "Alismail", "Hatem", "" ], [ "Browning", "Brett", "" ], [ "Lucey", "Simon", "" ] ]
new_dataset
0.997484
1410.3322
Paul Emmerich
Paul Emmerich, Sebastian Gallenm\"uller, Daniel Raumer, Florian Wohlfart, Georg Carle
MoonGen: A Scriptable High-Speed Packet Generator
Published at IMC 2015
null
10.1145/2815675.2815692
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present MoonGen, a flexible high-speed packet generator. It can saturate 10 GbE links with minimum sized packets using only a single CPU core by running on top of the packet processing framework DPDK. Linear multi-core scaling allows for even higher rates: We have tested MoonGen with up to 178.5 Mpps at 120 Gbit/s. We move the whole packet generation logic into user-controlled Lua scripts to achieve the highest possible flexibility. In addition, we utilize hardware features of Intel NICs that have not been used for packet generators previously. A key feature is the measurement of latency with sub-microsecond precision and accuracy by using hardware timestamping capabilities of modern commodity NICs. We address timing issues with software-based packet generators and apply methods to mitigate them with both hardware support on commodity NICs and with a novel method to control the inter-packet gap in software. Features that were previously only possible with hardware-based solutions are now provided by MoonGen on commodity hardware. MoonGen is available as free software under the MIT license at https://github.com/emmericp/MoonGen
[ { "version": "v1", "created": "Mon, 13 Oct 2014 14:19:18 GMT" }, { "version": "v2", "created": "Tue, 14 Oct 2014 08:29:00 GMT" }, { "version": "v3", "created": "Tue, 28 Apr 2015 20:41:52 GMT" }, { "version": "v4", "created": "Thu, 31 Mar 2016 21:31:38 GMT" } ]
2016-04-04T00:00:00
[ [ "Emmerich", "Paul", "" ], [ "Gallenmüller", "Sebastian", "" ], [ "Raumer", "Daniel", "" ], [ "Wohlfart", "Florian", "" ], [ "Carle", "Georg", "" ] ]
new_dataset
0.999544
1511.02301
Jason Weston
Felix Hill, Antoine Bordes, Sumit Chopra, Jason Weston
The Goldilocks Principle: Reading Children's Books with Explicit Memory Representations
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new test of how well language models capture meaning in children's books. Unlike standard language modelling benchmarks, it distinguishes the task of predicting syntactic function words from that of predicting lower-frequency words, which carry greater semantic content. We compare a range of state-of-the-art models, each with a different way of encoding what has been previously read. We show that models which store explicit representations of long-term contexts outperform state-of-the-art neural language models at predicting semantic content words, although this advantage is not observed for syntactic function words. Interestingly, we find that the amount of text encoded in a single memory representation is highly influential to the performance: there is a sweet-spot, not too big and not too small, between single words and full sentences that allows the most meaningful information in a text to be effectively retained and recalled. Further, the attention over such window-based memories can be trained effectively through self-supervision. We then assess the generality of this principle by applying it to the CNN QA benchmark, which involves identifying named entities in paraphrased summaries of news articles, and achieve state-of-the-art performance.
[ { "version": "v1", "created": "Sat, 7 Nov 2015 04:36:20 GMT" }, { "version": "v2", "created": "Wed, 30 Dec 2015 23:21:58 GMT" }, { "version": "v3", "created": "Tue, 5 Jan 2016 21:10:21 GMT" }, { "version": "v4", "created": "Fri, 1 Apr 2016 05:31:33 GMT" } ]
2016-04-04T00:00:00
[ [ "Hill", "Felix", "" ], [ "Bordes", "Antoine", "" ], [ "Chopra", "Sumit", "" ], [ "Weston", "Jason", "" ] ]
new_dataset
0.995293
1603.09439
Phuc Nguyen X
Phuc Xuan Nguyen, Gregory Rogez, Charless Fowlkes, Deva Ramanan
The Open World of Micro-Videos
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Micro-videos are six-second videos popular on social media networks with several unique properties. Firstly, because of the authoring process, they contain significantly more diversity and narrative structure than existing collections of video "snippets". Secondly, because they are often captured by hand-held mobile cameras, they contain specialized viewpoints including third-person, egocentric, and self-facing views seldom seen in traditional produced video. Thirdly, due to to their continuous production and publication on social networks, aggregate micro-video content contains interesting open-world dynamics that reflects the temporal evolution of tag topics. These aspects make micro-videos an appealing well of visual data for developing large-scale models for video understanding. We analyze a novel dataset of micro-videos labeled with 58 thousand tags. To analyze this data, we introduce viewpoint-specific and temporally-evolving models for video understanding, defined over state-of-the-art motion and deep visual features. We conclude that our dataset opens up new research opportunities for large-scale video analysis, novel viewpoints, and open-world dynamics.
[ { "version": "v1", "created": "Thu, 31 Mar 2016 02:19:53 GMT" }, { "version": "v2", "created": "Fri, 1 Apr 2016 01:53:32 GMT" } ]
2016-04-04T00:00:00
[ [ "Nguyen", "Phuc Xuan", "" ], [ "Rogez", "Gregory", "" ], [ "Fowlkes", "Charless", "" ], [ "Ramanan", "Deva", "" ] ]
new_dataset
0.967066
1604.00025
Serguei Mokhov
Serguei A. Mokhov and Lee Wei Huynh and Jian Li and Farid Rassai
A Java Data Security Framework (JDSF) and its Case Studies
a 2007 project report; parts appeared in various conferences; includes index
null
10.1109/NTMS.2009.5384673 10.1007/978-90-481-3662-9_77 10.1007/978-90-481-3662-9_73
null
cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the design of something we call Confidentiality, Integrity and Authentication Sub-Frameworks, which are a part of a more general Java Data Security Framework (JDSF) designed to support various aspects related to data security (confidentiality, origin authentication, integrity, and SQL randomization). The JDSF was originally designed in 2007 for use in the two use-cases, MARF and HSQLDB, to allow a plug-in-like implementation of and verification of various security aspects and their generalization. The JDSF project explores secure data storage related issues from the point of view of data security in the two projects. A variety of common security aspects and tasks were considered in order to extract a spectrum of possible parameters these aspects require for the design an extensible frameworked API and its implementation. A particular challenge being tackled is an aggregation of diverse approaches and algorithms into a common set of Java APIs to cover all or at least most common aspects, and, at the same time keeping the framework as simple as possible. As a part of the framework, we provide the mentioned sub-frameworks' APIs to allow for the common algorithm implementations of the confidentiality, integrity, and authentication aspects for MARF's and HSQLDB's database(s). At the same time we perform a detailed overview of the related work and literature on data and database security that we considered as a possible input to design the JDSF.
[ { "version": "v1", "created": "Thu, 31 Mar 2016 20:00:53 GMT" } ]
2016-04-04T00:00:00
[ [ "Mokhov", "Serguei A.", "" ], [ "Huynh", "Lee Wei", "" ], [ "Li", "Jian", "" ], [ "Rassai", "Farid", "" ] ]
new_dataset
0.99959
1604.00033
Sathappan Muthiah
Sathappan Muthiah, Patrick Butler, Rupinder Paul Khandpur, Parang Saraf, Nathan Self, Alla Rozovskaya, Liang Zhao, Jose Cadena, Chang-Tien Lu, Anil Vullikanti, Achla Marathe, Kristen Summers, Graham Katz, Andy Doyle, Jaime Arredondo, Dipak K. Gupta, David Mares, Naren Ramakrishnan
EMBERS at 4 years: Experiences operating an Open Source Indicators Forecasting System
Submitted to a conference
null
null
null
cs.CY cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
EMBERS is an anticipatory intelligence system forecasting population-level events in multiple countries of Latin America. A deployed system from 2012, EMBERS has been generating alerts 24x7 by ingesting a broad range of data sources including news, blogs, tweets, machine coded events, currency rates, and food prices. In this paper, we describe our experiences operating EMBERS continuously for nearly 4 years, with specific attention to the discoveries it has enabled, correct as well as missed forecasts, and lessons learnt from participating in a forecasting tournament including our perspectives on the limits of forecasting and ethical considerations.
[ { "version": "v1", "created": "Thu, 31 Mar 2016 20:06:40 GMT" } ]
2016-04-04T00:00:00
[ [ "Muthiah", "Sathappan", "" ], [ "Butler", "Patrick", "" ], [ "Khandpur", "Rupinder Paul", "" ], [ "Saraf", "Parang", "" ], [ "Self", "Nathan", "" ], [ "Rozovskaya", "Alla", "" ], [ "Zhao", "Liang", "" ], [ "Cadena", "Jose", "" ], [ "Lu", "Chang-Tien", "" ], [ "Vullikanti", "Anil", "" ], [ "Marathe", "Achla", "" ], [ "Summers", "Kristen", "" ], [ "Katz", "Graham", "" ], [ "Doyle", "Andy", "" ], [ "Arredondo", "Jaime", "" ], [ "Gupta", "Dipak K.", "" ], [ "Mares", "David", "" ], [ "Ramakrishnan", "Naren", "" ] ]
new_dataset
0.995017
1604.00061
Sina Parhizi
Sina Parhizi, Amin Khodaei and Shaghayegh Bahramirad
Distribution Market Clearing and Settlement
2016 IEEE Power & Energy Society General Meeting
null
null
null
cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are various undergoing efforts by system operators to set up an electricity market at the distribution level to enable a rapid and widespread deployment of distributed energy resources (DERs) and microgrids. This paper follows the previous work of the authors in implementing the distribution market operator (DMO) concept, and focuses on investigating the clearing and settlement processes performed by the DMO. The DMO clears the market to assign the awarded power from the wholesale market to customers within its service territory based on their associated demand bids. The DMO accordingly settles the market to identify the distribution locational marginal prices (DLMPs) and calculate payments from each customer and the total payment to the system operator. Numerical simulations exhibit the merits and effectiveness of the proposed DMO clearing and settlement processes.
[ { "version": "v1", "created": "Thu, 31 Mar 2016 21:41:52 GMT" } ]
2016-04-04T00:00:00
[ [ "Parhizi", "Sina", "" ], [ "Khodaei", "Amin", "" ], [ "Bahramirad", "Shaghayegh", "" ] ]
new_dataset
0.981435
1604.00300
Benjamin Negrevergne
R\'emi Coletta and Benjamin Negrevergne
A SAT model to mine flexible sequences in transactional datasets
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional pattern mining algorithms generally suffer from a lack of flexibility. In this paper, we propose a SAT formulation of the problem to successfully mine frequent flexible sequences occurring in transactional datasets. Our SAT-based approach can easily be extended with extra constraints to address a broad range of pattern mining applications. To demonstrate this claim, we formulate and add several constraints, such as gap and span constraints, to our model in order to extract more specific patterns. We also use interactive solving to perform important derived tasks, such as closed pattern mining or maximal pattern mining. Finally, we prove the practical feasibility of our SAT model by running experiments on two real datasets.
[ { "version": "v1", "created": "Fri, 1 Apr 2016 15:49:51 GMT" } ]
2016-04-04T00:00:00
[ [ "Coletta", "Rémi", "" ], [ "Negrevergne", "Benjamin", "" ] ]
new_dataset
0.954905
1604.00320
Giuseppe Petracca
Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli and Trent Jaeger
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices
2015 Annual Computer Security Applications Conference
null
null
null
cs.CR cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Voice control is a popular way to operate mobile devices, enabling users to communicate requests to their devices. However, adversaries can leverage voice control to trick mobile devices into executing commands to leak secrets or to modify critical information. Contemporary mobile operating systems fail to prevent such attacks because they do not control access to the speaker at all and fail to control when untrusted apps may use the microphone, enabling authorized apps to create exploitable communication channels. In this paper, we propose a security mechanism that tracks the creation of audio communication channels explicitly and controls the information flows over these channels to prevent several types of attacks.We design and implement AuDroid, an extension to the SELinux reference monitor integrated into the Android operating system for enforcing lattice security policies over the dynamically changing use of system audio resources. To enhance flexibility, when information flow errors are detected, the device owner, system apps and services are given the opportunity to resolve information flow errors using known methods, enabling AuDroid to run many configurations safely. We evaluate our approach on 17 widely-used apps that make extensive use of the microphone and speaker, finding that AuDroid prevents six types of attack scenarios on audio channels while permitting all 17 apps to run effectively. AuDroid shows that it is possible to prevent attacks using audio channels without compromising functionality or introducing significant performance overhead.
[ { "version": "v1", "created": "Fri, 1 Apr 2016 16:32:47 GMT" } ]
2016-04-04T00:00:00
[ [ "Petracca", "Giuseppe", "" ], [ "Sun", "Yuqiong", "" ], [ "Atamli", "Ahmad", "" ], [ "Jaeger", "Trent", "" ] ]
new_dataset
0.999066
1604.00360
Walter Hehl
Walter Hehl
A General World Model with Poiesis: Poppers Three Worlds updated with Software
9 pages. 1 Figure of a world model with physics, software and Geist, Book published 2016 (in German) by Springer, Heidelberg, with the general fundamentals of Software for philosophy
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the famous Three Worlds of Karl Popper as template, the paper rigorously introduces the concept of software to define the counterpart of the physical subworld. Digesting the scientific-technical view of biology and neurology on a high level, results in an updated Three Worlds scheme consistent with an information technical view. Chance and mathematics complete the world model. Some simple examples illustrate the move from Poppers view of the world with physics, psyche and World 3, to a new extended model with physics, extended software (which we call Poiesis), and Geist (the notion which embodies spirit, mind and soul).
[ { "version": "v1", "created": "Fri, 1 Apr 2016 19:07:40 GMT" } ]
2016-04-04T00:00:00
[ [ "Hehl", "Walter", "" ] ]
new_dataset
0.950076
1102.3882
Claudio Fontanari
Claudio Fontanari, Valentina Pulice, Anna Rimoldi, Massimiliano Sala
On weakly APN functions and 4-bit S-Boxes
null
Finite Fields and their Applications, 2012, vol. 18, p. 522-528
null
null
cs.CR math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
S-Boxes are important security components of block ciphers. We provide theoretical results on necessary or sufficient criteria for an (invertible) 4-bit S-Box to be weakly APN. Thanks to a classification of 4-bit invertible S-Boxes achieved independently by De Canni\'ere and Leander-Poschmann, we can strengthen our results with a computer-aided proof.
[ { "version": "v1", "created": "Thu, 17 Feb 2011 15:26:48 GMT" }, { "version": "v2", "created": "Wed, 2 Mar 2011 23:34:00 GMT" }, { "version": "v3", "created": "Tue, 2 Aug 2011 14:42:16 GMT" } ]
2016-04-01T00:00:00
[ [ "Fontanari", "Claudio", "" ], [ "Pulice", "Valentina", "" ], [ "Rimoldi", "Anna", "" ], [ "Sala", "Massimiliano", "" ] ]
new_dataset
0.997071
1412.4234
Riccardo Longo
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
Key-Policy Multi-Authority Attribute-Based Encryption
12 pages
Algebraic Informatics, Springer LNCS, 2015, vol. 9270, p. 152-164
10.1007/978-3-319-23021-4_14
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose a multi-authority key-policy ABE system. In our proposal, the authorities may be set up in any moment and without any coordination. A party can simply act as an ABE authority by creating its own public parameters and issuing private keys to the users. A user can thus encrypt data choosing both a set of attributes and a set of trusted authorities, maintaining full control unless all his chosen authorities collude against him. We prove our system secure under the bilinear Diffie-Hellman assumption.
[ { "version": "v1", "created": "Sat, 13 Dec 2014 13:05:53 GMT" }, { "version": "v2", "created": "Thu, 4 Feb 2016 11:17:25 GMT" } ]
2016-04-01T00:00:00
[ [ "Longo", "Riccardo", "" ], [ "Marcolla", "Chiara", "" ], [ "Sala", "Massimiliano", "" ] ]
new_dataset
0.998939
1508.02851
Hrant Khachatrian
Hrant Khachatrian, Tigran Mamikonyan
On interval edge-colorings of bipartite graphs of small order
Accepted for the CSIT 2015 conference
null
10.1109/CSITechnol.2015.7358253
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An edge-coloring of a graph $G$ with colors $1,\ldots,t$ is an interval $t$-coloring if all colors are used, and the colors of edges incident to each vertex of $G$ are distinct and form an interval of integers. A graph $G$ is interval colorable if it has an interval $t$-coloring for some positive integer $t$. The problem of deciding whether a bipartite graph is interval colorable is NP-complete. The smallest known examples of interval non-colorable bipartite graphs have $19$ vertices. On the other hand it is known that the bipartite graphs on at most $14$ vertices are interval colorable. In this work we observe that several classes of bipartite graphs of small order have an interval coloring. In particular, we show that all bipartite graphs on $15$ vertices are interval colorable.
[ { "version": "v1", "created": "Wed, 12 Aug 2015 08:48:24 GMT" } ]
2016-04-01T00:00:00
[ [ "Khachatrian", "Hrant", "" ], [ "Mamikonyan", "Tigran", "" ] ]
new_dataset
0.997902
1603.09420
Jianxin Wu
Guo-Bing Zhou and Jianxin Wu and Chen-Lin Zhang and Zhi-Hua Zhou
Minimal Gated Unit for Recurrent Neural Networks
null
null
null
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently recurrent neural networks (RNN) has been very successful in handling sequence data. However, understanding RNN and finding the best practices for RNN is a difficult task, partly because there are many competing and complex hidden units (such as LSTM and GRU). We propose a gated unit for RNN, named as Minimal Gated Unit (MGU), since it only contains one gate, which is a minimal design among all gated hidden units. The design of MGU benefits from evaluation results on LSTM and GRU in the literature. Experiments on various sequence data show that MGU has comparable accuracy with GRU, but has a simpler structure, fewer parameters, and faster training. Hence, MGU is suitable in RNN's applications. Its simple architecture also means that it is easier to evaluate and tune, and in principle it is easier to study MGU's properties theoretically and empirically.
[ { "version": "v1", "created": "Thu, 31 Mar 2016 00:01:10 GMT" } ]
2016-04-01T00:00:00
[ [ "Zhou", "Guo-Bing", "" ], [ "Wu", "Jianxin", "" ], [ "Zhang", "Chen-Lin", "" ], [ "Zhou", "Zhi-Hua", "" ] ]
new_dataset
0.982681
1603.09520
Karel B\v{r}inda
Petr \v{C}ervenka, Karel B\v{r}inda, Michaela Hanouskov\'a, Petr Hofman, Radek Seifert
Blind Friendly Maps: Tactile Maps for the Blind as a Part of the Public Map Portal (Mapy.cz)
null
null
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blind people can now use maps located at Mapy.cz, thanks to the long-standing joint efforts of the ELSA Center at the Czech Technical University in Prague, the Teiresias Center at Masaryk University, and the company Seznam.cz. Conventional map underlays are automatically adjusted so that they could be read through touch after being printed on microcapsule paper, which opens a whole new perspective in the use of tactile maps. Users may select an area of their choice in the Czech Republic (only within its boundaries, for the time being) and also the production of tactile maps, including the preparation of the map underlays, takes no more than several minutes.
[ { "version": "v1", "created": "Thu, 31 Mar 2016 10:44:01 GMT" } ]
2016-04-01T00:00:00
[ [ "Červenka", "Petr", "" ], [ "Břinda", "Karel", "" ], [ "Hanousková", "Michaela", "" ], [ "Hofman", "Petr", "" ], [ "Seifert", "Radek", "" ] ]
new_dataset
0.997826
1603.09570
Dibyayan Chakraborty
Sujoy Kumar Bhore, Dibyayan Chakraborty, Sandip Das, Sagnik Sen
On local structures of cubicity 2 graphs
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A 2-stab unit interval graph (2SUIG) is an axes-parallel unit square intersection graph where the unit squares intersect either of the two fixed lines parallel to the $X$-axis, distance $1 + \epsilon$ ($0 < \epsilon < 1$) apart. This family of graphs allow us to study local structures of unit square intersection graphs, that is, graphs with cubicity 2. The complexity of determining whether a tree has cubicity 2 is unknown while the graph recognition problem for unit square intersection graph is known to be NP-hard. We present a polynomial time algorithm for recognizing trees that admit a 2SUIG representation.
[ { "version": "v1", "created": "Thu, 31 Mar 2016 13:07:25 GMT" } ]
2016-04-01T00:00:00
[ [ "Bhore", "Sujoy Kumar", "" ], [ "Chakraborty", "Dibyayan", "" ], [ "Das", "Sandip", "" ], [ "Sen", "Sagnik", "" ] ]
new_dataset
0.999335
1603.09578
Prateek Kapadia
Prateek Kapadia
Wireless Coverage Area Computation and Optimization
Ph.D Thesis, Department of Computer Science and Engineering, IIT Bombay
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A wireless network's design must include the optimization of the area of coverage of its wireless transmitters - mobile and base stations in cellular networks, wireless access points in WLANs, or nodes on a transmit schedule in a wireless ad-hoc network. Typically, the coverage optimization for the common channels is solved by spatial multiplexing, i.e. keeping the access networks far apart. However, with increasing densities of wireless network deployments (including the Internet-of-Things) and paucity of spectrum, and new developments like whitespace devices and self-organizing, cognitive networks, there is a need to manage interference and optimize coverage by efficient algorithms that correctly set the transmit powers to ensure that transmissions only use the power necessary. In this work we study methods for computing and optimizing interference-limited coverage maps of a set of transmitters. We progress successively through increasingly realistic network scenarios. We begin with a disk model with a fixed set of transmitters and present an optimal algorithm for computing the coverage map. We then enhance the model to include updates to the network, in the form of addition or deletion of one transmitter. In this dynamic setting, we present an optimal algorithm to maintain updates to the coverage map. We then move to a more realistic interference model - the SINR model. For the SINR model we first show geometric bases for coverage maps. We then present a method to approximate the measure of the coverage area. Finally, we present an algorithm that uses this measure to optimize the coverage area with minimum total transmit power.
[ { "version": "v1", "created": "Fri, 14 Aug 2015 13:47:33 GMT" } ]
2016-04-01T00:00:00
[ [ "Kapadia", "Prateek", "" ] ]
new_dataset
0.980877