id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
1603.09598
Sabri Pllana
Sabri Pllana, Florian Huber, Zdenek Hrdlicka, Christos Mettouris, Asja Veber, Zs\'ofia Ocsovszky, Chris Gary, Eleni Boulomyti, Phil Smith
SciChallenge: Using Student-Generated Content and Contests to Enhance the Interest for Science Education and Careers
New Perspectives in Science Education, 5th Edition, 17 - 18 March 2016, Florence, Italy
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Science education will play a vital role in shaping the present and future of modern societies. Thus, Europe needs all its talents to increase creativity and competitiveness. Young boys and girls especially have to be engaged to pursue careers in Science, Technology, Engineering and Mathematics (STEM). However, statistics still show that enrolment rates in STEM-based degree programs are decreasing. This will lead to a workforce problem in the industrial sector as well as in research and development, especially in many of the new member countries. This paper highlights a recently funded EU-research project SciChallenge (www.scichallenge.eu), which focuses on the development of novel concepts to get young people excited about science education. It uses a contest-based approach towards self-produced digital education materials from young people for young people. In cooperation with partner schools, teachers, and other youth-oriented institutions, the contest participants (individuals or groups) between the ages of 10 and 20 years generate creative digital materials (videos, slides, or infographics). The participants upload their content in social media channels and the submissions are aggregated on the SciChallenge Web Platform. The winners receive prizes funded by science-oriented industry and other stakeholders. Intelligent cross-sectoral positioning of various awareness modules on the SciChallenge Open Information Hub is expected to increase awareness on science careers. Through a strong involvement of related organizations and industries, we expect to open new opportunities for young people in regards to internships or taster days in STEM disciplines. Additionally, aggregated information on science events (such as, slams, nights, festivals) is shared. With this multi-level approach, SciChallenge may boost the attractiveness of science education and careers among young people.
[ { "version": "v1", "created": "Thu, 31 Mar 2016 14:06:54 GMT" } ]
2016-04-01T00:00:00
[ [ "Pllana", "Sabri", "" ], [ "Huber", "Florian", "" ], [ "Hrdlicka", "Zdenek", "" ], [ "Mettouris", "Christos", "" ], [ "Veber", "Asja", "" ], [ "Ocsovszky", "Zsófia", "" ], [ "Gary", "Chris", "" ], [ "Boulomyti", "Eleni", "" ], [ "Smith", "Phil", "" ] ]
new_dataset
0.978274
1406.0416
Anya Johnson
Anya Elaine Johnson, Eli Strauss, Rodney Pickett, Christoph Adami, Ian Dworkin, and Heather J. Goldsby
More Bang For Your Buck: Quorum-Sensing Capabilities Improve the Efficacy of Suicidal Altruism
8 pages, 8 figures, ALIFE '14 conference
ALIFE 14: The Fourteenth Conference on the Synthesis and Simulation of Living Systems. (2014) Vol. 14
null
null
cs.NE cs.CE q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within the context of evolution, an altruistic act that benefits the receiving individual at the expense of the acting individual is a puzzling phenomenon. An extreme form of altruism can be found in colicinogenic E. coli. These suicidal altruists explode, releasing colicins that kill unrelated individuals, which are not colicin resistant. By committing suicide, the altruist makes it more likely that its kin will have less competition. The benefits of this strategy rely on the number of competitors and kin nearby. If the organism explodes at an inopportune time, the suicidal act may not harm any competitors. Communication could enable organisms to act altruistically when environmental conditions suggest that that strategy would be most beneficial. Quorum sensing is a form of communication in which bacteria produce a protein and gauge the amount of that protein around them. Quorum sensing is one means by which bacteria sense the biotic factors around them and determine when to produce products, such as antibiotics, that influence competition. Suicidal altruists could use quorum sensing to determine when exploding is most beneficial, but it is challenging to study the selective forces at work in microbes. To address these challenges, we use digital evolution (a form of experimental evolution that uses self-replicating computer programs as organisms) to investigate the effects of enabling altruistic organisms to communicate via quorum sensing. We found that quorum-sensing altruists killed a greater number of competitors per explosion, winning competitions against non-communicative altruists. These findings indicate that quorum sensing could increase the beneficial effect of altruism and the suite of conditions under which it will evolve.
[ { "version": "v1", "created": "Mon, 2 Jun 2014 15:41:44 GMT" } ]
2016-03-31T00:00:00
[ [ "Johnson", "Anya Elaine", "" ], [ "Strauss", "Eli", "" ], [ "Pickett", "Rodney", "" ], [ "Adami", "Christoph", "" ], [ "Dworkin", "Ian", "" ], [ "Goldsby", "Heather J.", "" ] ]
new_dataset
0.985648
1603.07899
Konrad Siek
Jan Baranowski, Pawe{\l} Kobyli\'nski, Konrad Siek, Pawe{\l} T. Wojciechowski
Helenos: A Realistic Benchmark for Distributed Transactional Memory
null
null
null
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transactional Memory (TM) is an approach to concurrency control that aims to make writing parallel programs both effective and simple. The approach is started in non-distributed multiprocessor systems, but is gaining popularity in distributed systems to synchronize tasks at large scales. Efficiency and scalability are often the key issues in TM research, so performance benchmarks are an important part of it. However, while standard TM benchmarks like the STAMP suite and STMBench7 are available and widely accepted, they do not translate well into distributed systems. Hence, the set of benchmarks usable with distributed TM systems is very limited, and must be padded with microbenchmarks, whose simplicity and artificial nature often makes them uninformative or misleading. Therefore, this paper introduces Helenos, a realistic, complex, and comprehensive distributed TM benchmark based on the problem of the Facebook inbox, an application of the Cassandra distributed store.
[ { "version": "v1", "created": "Fri, 25 Mar 2016 13:14:23 GMT" }, { "version": "v2", "created": "Wed, 30 Mar 2016 12:00:49 GMT" } ]
2016-03-31T00:00:00
[ [ "Baranowski", "Jan", "" ], [ "Kobyliński", "Paweł", "" ], [ "Siek", "Konrad", "" ], [ "Wojciechowski", "Paweł T.", "" ] ]
new_dataset
0.999554
1603.09164
Swati Agarwal
Swati Agarwal, Ashish Sureka
Spider and the Flies : Focused Crawling on Tumblr to Detect Hate Promoting Communities
8 Pages, 7 Figures including 9 images, 2 Tables, 3 Algorithms, Extended version of our work Agarwal et. al., Micropost 2015
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tumblr is one of the largest and most popular microblogging website on the Internet. Studies shows that due to high reachability among viewers, low publication barriers and social networking connectivity, microblogging websites are being misused as a platform to post hateful speech and recruiting new members by existing extremist groups. Manual identification of such posts and communities is overwhelmingly impractical due to large amount of posts and blogs being published every day. We propose a topic based web crawler primarily consisting of multiple phases: training a text classifier model consisting examples of only hate promoting users, extracting posts of an unknown tumblr micro-blogger, classifying hate promoting bloggers based on their activity feeds, crawling through the external links to other bloggers and performing a social network analysis on connected extremist bloggers. To investigate the effectiveness of our approach, we conduct experiments on large real world dataset. Experimental results reveals that the proposed approach is an effective method and has an F-score of 0.80. We apply social network analysis based techniques and identify influential and core bloggers in a community.
[ { "version": "v1", "created": "Wed, 30 Mar 2016 13:00:15 GMT" } ]
2016-03-31T00:00:00
[ [ "Agarwal", "Swati", "" ], [ "Sureka", "Ashish", "" ] ]
new_dataset
0.981966
1603.09188
Spandana Gella
Spandana Gella, Mirella Lapata, Frank Keller
Unsupervised Visual Sense Disambiguation for Verbs using Multimodal Embeddings
11 pages, NAACL-HLT 2016
null
null
null
cs.CL cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new task, visual sense disambiguation for verbs: given an image and a verb, assign the correct sense of the verb, i.e., the one that describes the action depicted in the image. Just as textual word sense disambiguation is useful for a wide range of NLP tasks, visual sense disambiguation can be useful for multimodal tasks such as image retrieval, image description, and text illustration. We introduce VerSe, a new dataset that augments existing multimodal datasets (COCO and TUHOI) with sense labels. We propose an unsupervised algorithm based on Lesk which performs visual sense disambiguation using textual, visual, or multimodal embeddings. We find that textual embeddings perform well when gold-standard textual annotations (object labels and image descriptions) are available, while multimodal embeddings perform well on unannotated images. We also verify our findings by using the textual and multimodal embeddings as features in a supervised setting and analyse the performance of visual sense disambiguation task. VerSe is made publicly available and can be downloaded at: https://github.com/spandanagella/verse.
[ { "version": "v1", "created": "Wed, 30 Mar 2016 13:43:38 GMT" } ]
2016-03-31T00:00:00
[ [ "Gella", "Spandana", "" ], [ "Lapata", "Mirella", "" ], [ "Keller", "Frank", "" ] ]
new_dataset
0.999287
1506.01342
Aruni RoyChowdhury
Aruni RoyChowdhury, Tsung-Yu Lin, Subhransu Maji, Erik Learned-Miller
One-to-many face recognition with bilinear CNNs
Published version at WACV 2016
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recent explosive growth in convolutional neural network (CNN) research has produced a variety of new architectures for deep learning. One intriguing new architecture is the bilinear CNN (B-CNN), which has shown dramatic performance gains on certain fine-grained recognition problems [15]. We apply this new CNN to the challenging new face recognition benchmark, the IARPA Janus Benchmark A (IJB-A) [12]. It features faces from a large number of identities in challenging real-world conditions. Because the face images were not identified automatically using a computerized face detection system, it does not have the bias inherent in such a database. We demonstrate the performance of the B-CNN model beginning from an AlexNet-style network pre-trained on ImageNet. We then show results for fine-tuning using a moderate-sized and public external database, FaceScrub [17]. We also present results with additional fine-tuning on the limited training data provided by the protocol. In each case, the fine-tuned bilinear model shows substantial improvements over the standard CNN. Finally, we demonstrate how a standard CNN pre-trained on a large face database, the recently released VGG-Face model [20], can be converted into a B-CNN without any additional feature training. This B-CNN improves upon the CNN performance on the IJB-A benchmark, achieving 89.5% rank-1 recall.
[ { "version": "v1", "created": "Wed, 3 Jun 2015 18:34:41 GMT" }, { "version": "v2", "created": "Thu, 4 Jun 2015 00:41:33 GMT" }, { "version": "v3", "created": "Fri, 5 Jun 2015 21:27:50 GMT" }, { "version": "v4", "created": "Wed, 23 Sep 2015 20:05:39 GMT" }, { "version": "v5", "created": "Mon, 28 Mar 2016 21:32:33 GMT" } ]
2016-03-30T00:00:00
[ [ "RoyChowdhury", "Aruni", "" ], [ "Lin", "Tsung-Yu", "" ], [ "Maji", "Subhransu", "" ], [ "Learned-Miller", "Erik", "" ] ]
new_dataset
0.997255
1602.08238
Atsushi Iwasaki
Atsushi Iwasaki, Ken Umeno
Three Theorems on odd degree Chebyshev polynomials and more generalized permutation polynomials over a ring of module $2^w$
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Odd degree Chebyshev polynomials over a ring of modulo $2^w$ have two kinds of period. One is an "orbital period". Odd degree Chebyshev polynomials are bijection over the ring. Therefore, when an odd degree Chebyshev polynomial iterate affecting a factor of the ring, we can observe an orbit over the ring. The "orbital period" is a period of the orbit. The other is a "degree period". It is observed when changing the degree of Chebyshev polynomials with a fixed argument of polynomials. Both kinds of period have not been completely studied. In this paper, we clarify completely both of them. The knowledge about them enables us to efficiently solve degree decision problem of Chebyshev polynomial over the ring, and so a key-exchange protocol with Chebyshev polynomial over the ring is not secure. In addition, we generalize the discussion and show that a key-exchange protocol with more generalized permutation polynomials which belong to a certain class is not secure.
[ { "version": "v1", "created": "Fri, 26 Feb 2016 08:45:09 GMT" }, { "version": "v2", "created": "Tue, 29 Mar 2016 05:51:53 GMT" } ]
2016-03-30T00:00:00
[ [ "Iwasaki", "Atsushi", "" ], [ "Umeno", "Ken", "" ] ]
new_dataset
0.996138
1603.08868
Sowmya Vajjala
Ildik\'o Pil\'an, Sowmya Vajjala and Elena Volodina
A Readable Read: Automatic Assessment of Language Learning Materials based on Linguistic Complexity
Presented at CICLING 2015 and won the best poster award (16th International Conference on Intelligent Text Processing and Computational Linguistics). To appear in International Journal of Computational Linguistics and Applications (IJLCA), 2016
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Corpora and web texts can become a rich language learning resource if we have a means of assessing whether they are linguistically appropriate for learners at a given proficiency level. In this paper, we aim at addressing this issue by presenting the first approach for predicting linguistic complexity for Swedish second language learning material on a 5-point scale. After showing that the traditional Swedish readability measure, L\"asbarhetsindex (LIX), is not suitable for this task, we propose a supervised machine learning model, based on a range of linguistic features, that can reliably classify texts according to their difficulty level. Our model obtained an accuracy of 81.3% and an F-score of 0.8, which is comparable to the state of the art in English and is considerably higher than previously reported results for other languages. We further studied the utility of our features with single sentences instead of full texts since sentences are a common linguistic unit in language learning exercises. We trained a separate model on sentence-level data with five classes, which yielded 63.4% accuracy. Although this is lower than the document level performance, we achieved an adjacent accuracy of 92%. Furthermore, we found that using a combination of different features, compared to using lexical features alone, resulted in 7% improvement in classification accuracy at the sentence level, whereas at the document level, lexical features were more dominant. Our models are intended for use in a freely accessible web-based language learning platform for the automatic generation of exercises.
[ { "version": "v1", "created": "Tue, 29 Mar 2016 18:12:28 GMT" } ]
2016-03-30T00:00:00
[ [ "Pilán", "Ildikó", "" ], [ "Vajjala", "Sowmya", "" ], [ "Volodina", "Elena", "" ] ]
new_dataset
0.994657
1510.06578
Vasileios Kapinas
Dimitrios S. Karas, Alexandros-Apostolos A. Boulogeorgos, Sotirios K. Mihos, Vasileios M. Kapinas, and George K. Karagiannidis
Securing the MIMO Wiretap Channel with Polar Codes and Encryption
This paper has been withdrawn by the authors due to unrealistic system model assumptions and other gaps in the theoretical reasoning of the achieved security
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Polar codes have been proven to be capacity achieving for any binary-input discrete memoryless channel, while at the same time they can reassure secure and reliable transmission over the single-input single-output wireless channel. However, the use of polar codes to secure multiple-antenna transmission and reception has not yet been reported in the open literature. In this paper, we assume a multiple-input multiple-output wiretap channel, where the legitimate receiver and the eavesdropper are equipped with the same number of antennas. We introduce a protocol that exploits the properties of both physical and media access control layer security by employing polar coding and encryption techniques in a hybrid manner in order to guarantee secure transmission. A novel security technique is also proposed, where a cryptographic key is generated based on the information transmitted and renewed every transmission block without the need for a separate key exchange method. Finally, to illustrate the effectiveness of the proposed protocol, we prove the weak and strong security conditions, and we provide a practical method to achieve computational security for the cases where these conditions cannot be established.
[ { "version": "v1", "created": "Thu, 22 Oct 2015 11:18:02 GMT" }, { "version": "v2", "created": "Sun, 27 Mar 2016 16:58:13 GMT" } ]
2016-03-29T00:00:00
[ [ "Karas", "Dimitrios S.", "" ], [ "Boulogeorgos", "Alexandros-Apostolos A.", "" ], [ "Mihos", "Sotirios K.", "" ], [ "Kapinas", "Vasileios M.", "" ], [ "Karagiannidis", "George K.", "" ] ]
new_dataset
0.99955
1512.01980
Akashdeep Bhardwaj
Akashdeep Bhardwaj, G.V.B. Subrahmanyam, Vinay Avasthi, Hanumat Sastry
Ransomware: A Rising Threat of new age Digital Extortion
This paper has been withdrawn by the author due to a crucial sign error in the findings and paper
null
null
null
cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article attempts to discover the surreptitious features of ransomware and to address it in information systems security research. It intends to elicit attention with regard to ransomware, a newly emerged cyber threat using such encryption technology as RSA, and to help both academic researchers and IT practitioners understand the technological characteristics of ransomware, along with its severity analysis. As ransomware infections continue to rise and attacks employing refined algorithm become increasingly sophisticated, data protection faces serious challenges. The article discusses future trends and research directions related to ransomware, and provides prevention strategies for SMEs.
[ { "version": "v1", "created": "Mon, 7 Dec 2015 11:06:17 GMT" }, { "version": "v2", "created": "Sat, 26 Mar 2016 05:39:39 GMT" } ]
2016-03-29T00:00:00
[ [ "Bhardwaj", "Akashdeep", "" ], [ "Subrahmanyam", "G. V. B.", "" ], [ "Avasthi", "Vinay", "" ], [ "Sastry", "Hanumat", "" ] ]
new_dataset
0.999324
1603.08019
Raj Jain
Arjan Durresi, Sastri Kota, Mukul Goyal, Raj Jain, Venkata Bharani
Achieving QoS for TCP Traffic in Satellite Networks with Differentiated Services
null
Space Communications, Volume 17, Number 1-3, 2001, pp. 125-136
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Satellite networks play an indispensable role in providing global Internet access and electronic connectivity. To achieve such a global communications, provisioning of quality of service (QoS) within the advanced satellite systems is the main requirement. One of the key mechanisms of implementing the quality of service is traffic management. Traffic management becomes a crucial factor in the case of satellite network because of the limited availability of their resources. Currently, Internet Protocol (IP) only has minimal traffic management capabilities and provides best effort services. In this paper, we present broadband satellite network QoS model and simulated performance results. In particular, we discuss the TCP flow aggregates performance for their good behavior in the presence of competing UDP flow aggregates in the same assured forwarding. We identify several factors that affect the performance in the mixed environments and quantify their effects using a full factorial design of experiment methodology.
[ { "version": "v1", "created": "Fri, 25 Mar 2016 20:16:23 GMT" } ]
2016-03-29T00:00:00
[ [ "Durresi", "Arjan", "" ], [ "Kota", "Sastri", "" ], [ "Goyal", "Mukul", "" ], [ "Jain", "Raj", "" ], [ "Bharani", "Venkata", "" ] ]
new_dataset
0.990312
1603.08020
Raj Jain
Sastri Kota, Mukul Goyal, Rohit Goyal and Raj Jain
Multimedia Satellite Networks and TCP/IP Traffic Transport
null
International Journal of Computers and Applications, Vol. 23, No. 2, 2001, pp. 115-128
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To meet an increasing demand for multimedia services and electronic connectivity across the world, satellite networks will play an indispensable role in the deployment of global networks. The new services gaining momentum include mobile services, private intranets and high data rate internet access carried over integrated satellite-fiber networks. Several performance issues need to be addressed before a transport layer protocol, like TCP can satisfactorily work over satellite ATM for large delay-bandwidth networks. In this paper, we review the proposed satellite systems and discuss challenges such as, traffic management and QoS requirements for broadband satellite ATM networks. The performance results of TCP enhancements for Unspecified Bit Rate over ATM (ATM-UBR+) for large bandwidth-delay environments with various end system policies and drop policies for several buffer sizes are presented.
[ { "version": "v1", "created": "Fri, 25 Mar 2016 20:22:52 GMT" } ]
2016-03-29T00:00:00
[ [ "Kota", "Sastri", "" ], [ "Goyal", "Mukul", "" ], [ "Goyal", "Rohit", "" ], [ "Jain", "Raj", "" ] ]
new_dataset
0.999471
1603.08026
Raj Jain
Jianli Pan, Shan Zhi Chen, Raj Jain, Subharthi Paul
Energy Sensing and Monitoring Framework with an Integrated Communication Backbone in the Energy Efficient Intelligent Buildings
null
Applied Mechanics and Materials (Volumes 303 - 306), pp. 1460-1464, February, 2013
10.4028/www.scientific.net/AMM.303-306.1460
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Building environments are significant sources of global energy consumption. To create energy efficient buildings, the first step is to sense and monitor all the energy-consuming appliances in the buildings and record all the energy consumption information. After that, appropriate energy saving policies can be decided and the instructions can be sent to the control devices to apply the energy saving adjustments. To do that, in-building two-way communication networks are needed to connect all the sensors to collect information as well as to send control instructions. However, most of the current devices are provided by separate manufacturers and with separate network infrastructures and so there is not much integration and interaction among different subsystems. In this paper, we envision a new energy sensing and monitoring framework with integrated communication backbone in the intelligent building environments. Specifically, through comprehensive comparisons and investigations, we study different candidate communicating media and protocols like wireline, wireless, and power-line communications technologies that potentially can be used in the intelligent buildings to realize the goals of coordination, integration, and energy efficiency. Also, we propose an extension "smart box" for integration of the devices before the maturity of the standardization process. Cloud computing and smart phone technologies are also introduced to realize the goals of improving energy efficiency and promote global sustainability.
[ { "version": "v1", "created": "Fri, 25 Mar 2016 20:41:09 GMT" } ]
2016-03-29T00:00:00
[ [ "Pan", "Jianli", "" ], [ "Chen", "Shan Zhi", "" ], [ "Jain", "Raj", "" ], [ "Paul", "Subharthi", "" ] ]
new_dataset
0.989335
1505.01197
Georgia Gkioxari
Georgia Gkioxari, Ross Girshick, Jitendra Malik
Contextual Action Recognition with R*CNN
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are multiple cues in an image which reveal what action a person is performing. For example, a jogger has a pose that is characteristic for jogging, but the scene (e.g. road, trail) and the presence of other joggers can be an additional source of information. In this work, we exploit the simple observation that actions are accompanied by contextual cues to build a strong action recognition system. We adapt RCNN to use more than one region for classification while still maintaining the ability to localize the action. We call our system R*CNN. The action-specific models and the feature maps are trained jointly, allowing for action specific representations to emerge. R*CNN achieves 90.2% mean AP on the PASAL VOC Action dataset, outperforming all other approaches in the field by a significant margin. Last, we show that R*CNN is not limited to action recognition. In particular, R*CNN can also be used to tackle fine-grained tasks such as attribute classification. We validate this claim by reporting state-of-the-art performance on the Berkeley Attributes of People dataset.
[ { "version": "v1", "created": "Tue, 5 May 2015 21:56:10 GMT" }, { "version": "v2", "created": "Sat, 26 Sep 2015 20:29:26 GMT" }, { "version": "v3", "created": "Fri, 25 Mar 2016 01:06:01 GMT" } ]
2016-03-28T00:00:00
[ [ "Gkioxari", "Georgia", "" ], [ "Girshick", "Ross", "" ], [ "Malik", "Jitendra", "" ] ]
new_dataset
0.998703
1506.06275
Konrad Siek
Konrad Siek and Pawe{\l} T. Wojciechowski
Last-use Opacity: A Strong Safety Property for Transactional Memory with Early Release Support
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transaction Memory (TM) is a concurrency control abstraction that allows the programmer to specify blocks of code to be executed atomically as transactions. However, since transactional code can contain just about any operation attention must be paid to the state of shared variables at any given time. E.g., contrary to a database transaction, if a TM transaction reads a stale value it may execute dangerous operations, like attempt to divide by zero, access an illegal memory address, or enter an infinite loop. Thus serializability is insufficient, and stronger safety properties are required in TM, which regulate what values can be read, even by transactions that abort. Hence, a number of TM safety properties were developed, including opacity, and TMS1 and TMS2. However, such strong properties preclude using early release as a technique for optimizing TM, because they virtually forbid reading from live transactions. On the other hand, properties that do allow early release are either not strong enough to prevent any of the problems mentioned above (recoverability), or add additional conditions on transactions with early release that limit their applicability (elastic opacity, live opacity, virtual world consistency). This paper introduces last-use opacity, a new TM safety property that is meant to be a compromise between strong properties like opacity and serializability. The property eliminates all but a small class of inconsistent views and poses no stringent conditions on transactions. For illustration, we present a last-use opaque TM algorithm and show that it satisfies the new safety property.
[ { "version": "v1", "created": "Sat, 20 Jun 2015 18:09:09 GMT" }, { "version": "v2", "created": "Thu, 25 Jun 2015 09:13:28 GMT" }, { "version": "v3", "created": "Fri, 25 Mar 2016 13:18:39 GMT" } ]
2016-03-28T00:00:00
[ [ "Siek", "Konrad", "" ], [ "Wojciechowski", "Paweł T.", "" ] ]
new_dataset
0.957429
1603.07737
Michael Hoffmann
Markus Geyer, Michael Hoffmann, Michael Kaufmann, Vincent Kusters, Csaba D. T\'oth
The Planar Tree Packing Theorem
Full version of our SoCG 2016 paper
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Packing graphs is a combinatorial problem where several given graphs are being mapped into a common host graph such that every edge is used at most once. In the planar tree packing problem we are given two trees T1 and T2 on n vertices and have to find a planar graph on n vertices that is the edge-disjoint union of T1 and T2. A clear exception that must be made is the star which cannot be packed together with any other tree. But according to a conjecture of Garc\'ia et al. from 1997 this is the only exception, and all other pairs of trees admit a planar packing. Previous results addressed various special cases, such as a tree and a spider tree, a tree and a caterpillar, two trees of diameter four, two isomorphic trees, and trees of maximum degree three. Here we settle the conjecture in the affirmative and prove its general form, thus making it the planar tree packing theorem. The proof is constructive and provides a polynomial time algorithm to obtain a packing for two given nonstar trees.
[ { "version": "v1", "created": "Thu, 24 Mar 2016 20:08:38 GMT" } ]
2016-03-28T00:00:00
[ [ "Geyer", "Markus", "" ], [ "Hoffmann", "Michael", "" ], [ "Kaufmann", "Michael", "" ], [ "Kusters", "Vincent", "" ], [ "Tóth", "Csaba D.", "" ] ]
new_dataset
0.995412
1603.07813
Rossano Schifanella
Luca Maria Aiello, Rossano Schifanella, Daniele Quercia, Francesco Aletta
Chatty Maps: Constructing sound maps of urban areas from social media data
28 pages, 18 figures, final version published in Royal Society Open Science journal, Royal Society Open Science (published in 23rd March 2016)
null
null
null
cs.SI cs.CY cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Urban sound has a huge influence over how we perceive places. Yet, city planning is concerned mainly with noise, simply because annoying sounds come to the attention of city officials in the form of complaints, while general urban sounds do not come to the attention as they cannot be easily captured at city scale. To capture both unpleasant and pleasant sounds, we applied a new methodology that relies on tagging information of geo-referenced pictures to the cities of London and Barcelona. To begin with, we compiled the first urban sound dictionary and compared it to the one produced by collating insights from the literature: ours was experimentally more valid (if correlated with official noise pollution levels) and offered a wider geographic coverage. From picture tags, we then studied the relationship between soundscapes and emotions. We learned that streets with music sounds were associated with strong emotions of joy or sadness, while those with human sounds were associated with joy or surprise. Finally, we studied the relationship between soundscapes and people's perceptions and, in so doing, we were able to map which areas are chaotic, monotonous, calm, and exciting.Those insights promise to inform the creation of restorative experiences in our increasingly urbanized world.
[ { "version": "v1", "created": "Fri, 25 Mar 2016 03:33:46 GMT" } ]
2016-03-28T00:00:00
[ [ "Aiello", "Luca Maria", "" ], [ "Schifanella", "Rossano", "" ], [ "Quercia", "Daniele", "" ], [ "Aletta", "Francesco", "" ] ]
new_dataset
0.999108
1603.07881
Janosch D\"ocker
Andreas Darmann, Janosch D\"ocker
Monotone 3-Sat-4 is NP-complete
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Monotone 3-Sat-4 is a variant of the satisfiability problem for boolean formulae in conjunctive normal form. In this variant, each clause contains exactly three literals---either all or none of them are positive, i.e., no clause contains both a positive and a negative literal---and every variable appears at most four times in the formula. Moreover, every clause consists of three distinct literals. We show that Monotone 3-Sat-4 is NP-complete.
[ { "version": "v1", "created": "Fri, 25 Mar 2016 11:13:56 GMT" } ]
2016-03-28T00:00:00
[ [ "Darmann", "Andreas", "" ], [ "Döcker", "Janosch", "" ] ]
new_dataset
0.997396
1603.07933
Kiran Garimella
Kiran Garimella, Ingmar Weber, Munmun De Choudhury
Quote RTs on Twitter: Usage of the New Feature for Political Discourse
Accepted as short paper at ACM WebScience 2016
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Social media platforms provide several social interactional features. Due to the large scale reach of social media, these interactional features help enable various types of political discourse. Constructive and diversified discourse is important for sustaining healthy communities and reducing the impact of echo chambers. In this paper, we empirically examine the role of a newly introduced Twitter feature, 'quote retweets' (or 'quote RTs') in political discourse, specifically whether it has led to improved, civil, and balanced exchange. Quote RTs allow users to quote the tweet they retweet, while adding a short comment. Our analysis using content, network and crowd labeled data indicates that the feature has increased political discourse and its diffusion, compared to existing features. We discuss the implications of our findings in understanding and reducing online polarization.
[ { "version": "v1", "created": "Fri, 25 Mar 2016 15:22:12 GMT" } ]
2016-03-28T00:00:00
[ [ "Garimella", "Kiran", "" ], [ "Weber", "Ingmar", "" ], [ "De Choudhury", "Munmun", "" ] ]
new_dataset
0.969737
1603.07964
P Balasubramanian
P Balasubramanian, N E Mastorakis
Power, Delay and Area Comparisons of Majority Voters relevant to TMR Architectures
in the Book, Recent Advances in Circuits, Systems, Signal Processing and Communications, Included in ISI/SCI Web of Science and Web of Knowledge, Proceedings of 10th International Conference on Circuits, Systems, Signal and Telecommunications, pp. 110-117, 2016, Barcelona, Spain
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
N-modular redundancy (NMR) is commonly used to enhance the fault tolerance of a circuit/system, when subject to a fault-inducing environment such as in space or military systems, where upsets due to radiation phenomena, temperature and/or other environmental conditions are anticipated. Triple Modular Redundancy (TMR), which is a 3-tuple version of NMR, is widely preferred for mission-control space, military, and aerospace, and safety-critical nuclear, power, medical, and industrial control and automation systems. The TMR scheme involves the two-times duplication of a simplex system hardware, with a majority voter ensuring correctness provided at least two out of three copies of the hardware remain operational. Thus the majority voter plays a pivotal role in ensuring the correct operation of the TMR scheme. In this paper, a number of standard-cell based majority voter designs relevant to TMR architectures are presented, and their power, delay and area parameters are estimated based on physical realization using a 32/28nm CMOS process.
[ { "version": "v1", "created": "Fri, 25 Mar 2016 17:14:55 GMT" } ]
2016-03-28T00:00:00
[ [ "Balasubramanian", "P", "" ], [ "Mastorakis", "N E", "" ] ]
new_dataset
0.960957
1309.1841
Nicolas Trotignon
Pierre Aboulker, Marko Radovanovi\'c, Nicolas Trotignon, Kristina Vu\v{s}kovi\'c
Graphs that do not contain a cycle with a node that has at least two neighbors on it
null
P. Aboulker, M. Radovanovic, N. Trotignon and K. Vuskovic. Graphs that do not contain a cycle with a node that has at least two neighbors on it. SIAM Journal on Discrete Mathematics, 26(4):1510-1531, 2012
10.1137/11084933X
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We recall several known results about minimally 2-connected graphs, and show that they all follow from a decomposition theorem. Starting from an analogy with critically 2-connected graphs, we give structural characterizations of the classes of graphs that do not contain as a subgraph and as an induced subgraph, a cycle with a node that has at least two neighbors on the cycle. From these characterizations we get polynomial time recognition algorithms for these classes, as well as polynomial time algorithms for vertex-coloring and edge-coloring.
[ { "version": "v1", "created": "Sat, 7 Sep 2013 08:32:13 GMT" } ]
2016-03-27T00:00:00
[ [ "Aboulker", "Pierre", "" ], [ "Radovanović", "Marko", "" ], [ "Trotignon", "Nicolas", "" ], [ "Vušković", "Kristina", "" ] ]
new_dataset
0.999121
1503.06333
Zohaib Awan
Zohaib Hassan Awan, Abdellatif Zaidi, and Aydin Sezgin
On SDoF of Multi-Receiver Wiretap Channel With Alternating CSIT
To Appear in IEEE Transactions on Information Forensics and Security
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of secure transmission over a Gaussian multi-input single-output (MISO) two receiver channel with an external eavesdropper, under the assumption that the state of the channel which is available to each receiver is conveyed either perfectly ($P$) or with delay ($D$) to the transmitter. Denoting by $S_1$, $S_2$, and $S_3$ the channel state information at the transmitter (CSIT) of user 1, user 2, and eavesdropper, respectively, the overall CSIT can then alternate between eight possible states, i.e., $(S_1,S_2,S_3) \in \{P,D\}^3$. We denote by $\lambda_{S_1 S_2 S_3}$ the fraction of time during which the state $S_1S_2S_3$ occurs. Under these assumptions, we first consider the Gaussian MISO wiretap channel and characterize the secure degrees of freedom (SDoF). Next, we consider the general multi-receiver setup and characterize the SDoF region of fixed hybrid states $PPD$, $PDP$, and $DDP$. We then focus our attention on the symmetric case in which $\lambda_{PDD}=\lambda_{DPD}$. For this case, we establish bounds on SDoF region. The analysis reveals that alternating CSIT allows synergistic gains in terms of SDoF; and shows that, by opposition to encoding separately over different states, joint encoding across the states enables strictly better secure rates. Furthermore, we specialize our results for the two receivers channel with an external eavesdropper to the two-user broadcast channel. We show that, the synergistic gains in terms of SDoF by alternating CSIT is not restricted to multi-receiver wiretap channels; and, can also be harnessed under broadcast setting.
[ { "version": "v1", "created": "Sat, 21 Mar 2015 17:53:29 GMT" }, { "version": "v2", "created": "Tue, 27 Oct 2015 14:34:28 GMT" }, { "version": "v3", "created": "Thu, 24 Mar 2016 13:34:56 GMT" } ]
2016-03-25T00:00:00
[ [ "Awan", "Zohaib Hassan", "" ], [ "Zaidi", "Abdellatif", "" ], [ "Sezgin", "Aydin", "" ] ]
new_dataset
0.994209
1603.07475
Youngjin Yoon
Youngjin Yoon, Gyeongmin Choe, Namil Kim, Joon-Young Lee, In So Kweon
Fine-scale Surface Normal Estimation using a Single NIR Image
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present surface normal estimation using a single near infrared (NIR) image. We are focusing on fine-scale surface geometry captured with an uncalibrated light source. To tackle this ill-posed problem, we adopt a generative adversarial network which is effective in recovering a sharp output, which is also essential for fine-scale surface normal estimation. We incorporate angular error and integrability constraint into the objective function of the network to make estimated normals physically meaningful. We train and validate our network on a recent NIR dataset, and also evaluate the generality of our trained model by using new external datasets which are captured with a different camera under different environment.
[ { "version": "v1", "created": "Thu, 24 Mar 2016 08:43:14 GMT" } ]
2016-03-25T00:00:00
[ [ "Yoon", "Youngjin", "" ], [ "Choe", "Gyeongmin", "" ], [ "Kim", "Namil", "" ], [ "Lee", "Joon-Young", "" ], [ "Kweon", "In So", "" ] ]
new_dataset
0.966008
1603.07541
Tao Li
Tao Li, Xiaodong Wang, Pingyi Fan and Taneli Riihonen
Position-aided Large-scale MIMO Channel Estimation for High-Speed Railway Communication Systems
30 pages, 8 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider channel estimation for high-speed railway communication systems, where both the transmitter and the receiver are equipped with large-scale antenna arrays. It is known that the throughput of conventional training schemes monotonically decreases with the mobility. Assuming that the moving terminal employs a large linear antenna array, this paper proposes a position-aided channel estimation scheme whereby only a portion of the transmit antennas send pilot symbols and the full channel matrix can be well estimated by using these pilots together with the antenna position information based on the joint spatial-temporal correlation. The relationship between mobility and throughput/DoF is established. Furthermore, the optimal selections of transmit power and time interval partition between the training and data phases as well as the antenna size are presented accordingly. Both analytical and simulation results show that the system throughput with the position-aided channel estimator does not deteriorate appreciably as the mobility increases, which is sharply in contrast with the conventional one.
[ { "version": "v1", "created": "Thu, 24 Mar 2016 12:05:38 GMT" } ]
2016-03-25T00:00:00
[ [ "Li", "Tao", "" ], [ "Wang", "Xiaodong", "" ], [ "Fan", "Pingyi", "" ], [ "Riihonen", "Taneli", "" ] ]
new_dataset
0.982937
1603.07625
Mike Wu
Stephen Yu, Mike Wu
Position and Vector Detection of Blind Spot motion with the Horn-Schunck Optical Flow
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proposed method uses live image footage which, based on calculations of pixel motion, decides whether or not an object is in the blind-spot. If found, the driver is notified by a sensory light or noise built into the vehicle's CPU. The new technology incorporates optical vectors and flow fields rather than expensive radar-waves, creating cheaper detection systems that retain the needed accuracy while adapting to the current processor speeds.
[ { "version": "v1", "created": "Thu, 24 Mar 2016 15:28:26 GMT" } ]
2016-03-25T00:00:00
[ [ "Yu", "Stephen", "" ], [ "Wu", "Mike", "" ] ]
new_dataset
0.993812
1603.07631
Martin Monperrus
Thomas Durieux and Youssef Hamadi and Martin Monperrus
BanditRepair: Speculative Exploration of Runtime Patches
null
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose, BanditRepair, a system that systematically explores and assesses a set of possible runtime patches. The system is grounded on so-called bandit algorithms, that are online machine learning algorithms, designed for constantly balancing exploitation and exploration. BanditRepair's runtime patches are based on modifying the execution state for repairing null dereferences. BanditRepair constantly trades the ratio of automatically handled failures for searching for new runtime patches and vice versa. We evaluate the system with 16 null dereference field bugs, where BanditRepair identifies a total of 8460 different runtime patches, which are composed of 1 up to 8 decisions (execution modifications) taken in a row. We are the first to finely characterize the search space and the outcomes of runtime repair based on execution modification.
[ { "version": "v1", "created": "Thu, 24 Mar 2016 15:44:17 GMT" } ]
2016-03-25T00:00:00
[ [ "Durieux", "Thomas", "" ], [ "Hamadi", "Youssef", "" ], [ "Monperrus", "Martin", "" ] ]
new_dataset
0.9558
1603.07653
Sayed Pouria Talebi
Sayed Pouria Talebi and Professor Danilo P. Mandic
A Quaternion Frequency and Phasor Estimator for Three-Phase Power Distribution Networks
null
null
null
null
cs.SY stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the first time quaternions have been used for real-time frequency estimation, where the multi-dimensional nature of quaternions allows for the full characterization of three-phase power systems. This is achieved through the use of quaternions to provide a unified framework for incorporating voltage measurements from all the phases of a three-phase system and then employing the recently introduced HR-calculus to derive a state space estimator based on the quaternion extended Kalman filter (QEKF). The components of the state space vector are designed such that they can be deployed for adaptive estimation of the system phasors. Finally, the proposed algorithm is validated through simulations using both synthetic and real-world data, which indicate that the developed quaternion frequency estimator can outperform its complex-valued counterparts.
[ { "version": "v1", "created": "Mon, 7 Mar 2016 20:18:32 GMT" } ]
2016-03-25T00:00:00
[ [ "Talebi", "Sayed Pouria", "" ], [ "Mandic", "Professor Danilo P.", "" ] ]
new_dataset
0.998355
1512.02505
Michael Bekos
Patrizio Angelini, Michael A. Bekos, Michael Kaufmann and Vincenzo Roselli
Vertex-Coloring with Star-Defects
null
null
null
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Defective coloring is a variant of traditional vertex-coloring, according to which adjacent vertices are allowed to have the same color, as long as the monochromatic components induced by the corresponding edges have a certain structure. Due to its important applications, as for example in the bipartisation of graphs, this type of coloring has been extensively studied, mainly with respect to the size, degree, and acyclicity of the monochromatic components. In this paper we focus on defective colorings in which the monochromatic components are acyclic and have small diameter, namely, they form stars. For outerplanar graphs, we give a linear-time algorithm to decide if such a defective coloring exists with two colors and, in the positive case, to construct one. Also, we prove that an outerpath (i.e., an outerplanar graph whose weak-dual is a path) always admits such a two-coloring. Finally, we present NP-completeness results for non-planar and planar graphs of bounded degree for the cases of two and three colors.
[ { "version": "v1", "created": "Tue, 8 Dec 2015 15:21:20 GMT" }, { "version": "v2", "created": "Wed, 23 Mar 2016 12:58:40 GMT" } ]
2016-03-24T00:00:00
[ [ "Angelini", "Patrizio", "" ], [ "Bekos", "Michael A.", "" ], [ "Kaufmann", "Michael", "" ], [ "Roselli", "Vincenzo", "" ] ]
new_dataset
0.999691
1603.07007
Cunsheng Ding
Cunsheng Ding, Cuiling Fan, Zhengchun Zhou
The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reed-Solomon codes, a type of BCH codes, are widely employed in communication systems, storage devices and consumer electronics. This fact demonstrates the importance of BCH codes -- a family of cyclic codes -- in practice. In theory, BCH codes are among the best cyclic codes in terms of their error-correcting capability. A subclass of BCH codes are the narrow-sense primitive BCH codes. However, the dimension and minimum distance of these codes are not known in general. The objective of this paper is to determine the dimension and minimum distances of two classes of narrow-sense primitive BCH codes with design distances $\delta=(q-1)q^{m-1}-1-q^{\lfloor (m-1)/2\rfloor}$ and $\delta=(q-1)q^{m-1}-1-q^{\lfloor (m+1)/2\rfloor}$. The weight distributions of some of these BCH codes are also reported. As will be seen, the two classes of BCH codes are sometimes optimal and sometimes among the best linear codes known.
[ { "version": "v1", "created": "Tue, 22 Mar 2016 22:06:30 GMT" } ]
2016-03-24T00:00:00
[ [ "Ding", "Cunsheng", "" ], [ "Fan", "Cuiling", "" ], [ "Zhou", "Zhengchun", "" ] ]
new_dataset
0.999564
1603.07010
Amin Sakzad
Hassan Khodaiemehr, Mohammad-Reza Sadeghi, and Amin Sakzad
Practical Encoder and Decoder for Power Constrained QC-LDPC lattices
Submitted for possible publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LDPC lattices were the first family of lattices that equipped with iterative decoding algorithms under which they perform very well in high dimensions. In this paper, we introduce quasi cyclic low density parity check (QC-LDPC) lattices as a special case of LDPC lattices with one binary QC-LDPC code as their underlying code. These lattices are obtained from Construction A of lattices providing us to encode them efficiently using shift registers. To benefit from an encoder with linear complexity in dimension of the lattice, we obtain the generator matrix of these lattices in "quasi cyclic" form. We provide a low-complexity decoding algorithm of QC-LDPC lattices based on sum product algorithm. To design lattice codes, QC-LDPC lattices are combined with nested lattice shaping that uses the Voronoi region of a sublattice for code shaping. The shaping gain and shaping loss of our lattice codes with dimensions $40$, $50$ and $60$ using an optimal quantizer, are presented. Consequently, we establish a family of lattice codes that perform practically close to the sphere bound.
[ { "version": "v1", "created": "Tue, 22 Mar 2016 22:13:27 GMT" } ]
2016-03-24T00:00:00
[ [ "Khodaiemehr", "Hassan", "" ], [ "Sadeghi", "Mohammad-Reza", "" ], [ "Sakzad", "Amin", "" ] ]
new_dataset
0.975352
1603.07031
Kenza Hamidouche
Kenza Hamidouche and Walid Saad and M\'erouane Debbah and H. Vincent Poor
Mean-Field Games for Distributed Caching in Ultra-Dense Small Cell Networks
Accepted for publication at American Control Conference 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the problem of distributed caching in dense wireless small cell networks (SCNs) is studied using mean field games (MFGs). In the considered SCN, small base stations (SBSs) are equipped with data storage units and cooperate to serve users' requests either from files cached in the storage or directly from the capacity-limited backhaul. The aim of the SBSs is to define a caching policy that reduces the load on the capacity-limited backhaul links. This cache control problem is formulated as a stochastic differential game (SDG). In this game, each SBS takes into consideration the storage state of the other SBSs to decide on the fraction of content it should cache. To solve this problem, the formulated SDG is reduced to an MFG by considering an ultra-dense network of SBSs in which the existence and uniqueness of the mean-field equilibrium is shown to be guaranteed. Simulation results show that this framework allows an efficient use of the available storage space at the SBSs while properly tracking the files' popularity. The results also show that, compared to a baseline model in which SBSs are not aware of the instantaneous system state, the proposed framework increases the number of served files from the SBSs by more than 69%.
[ { "version": "v1", "created": "Tue, 22 Mar 2016 23:46:25 GMT" } ]
2016-03-24T00:00:00
[ [ "Hamidouche", "Kenza", "" ], [ "Saad", "Walid", "" ], [ "Debbah", "Mérouane", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.997404
1603.07077
Sandor P. Fekete
S\'andor P. Fekete, Andreas Haas, Michael Hemmer, Michael Hoffmann, Irina Kostitsyna, Dominik Krupke, Florian Maurer, Joseph S. B. Mitchell, Arne Schmidt, Christiane Schmidt, and Julian Troegel
Computing Nonsimple Polygons of Minimum Perimeter
24 pages, 21 figures, 1 table; full version of extended abstract that is to appear in SEA 2016
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide exact and approximation methods for solving a geometric relaxation of the Traveling Salesman Problem (TSP) that occurs in curve reconstruction: for a given set of vertices in the plane, the problem Minimum Perimeter Polygon (MPP) asks for a (not necessarily simply connected) polygon with shortest possible boundary length. Even though the closely related problem of finding a minimum cycle cover is polynomially solvable by matching techniques, we prove how the topological structure of a polygon leads to NP-hardness of the MPP. On the positive side, we show how to achieve a constant-factor approximation. When trying to solve MPP instances to provable optimality by means of integer programming, an additional difficulty compared to the TSP is the fact that only a subset of subtour constraints is valid, depending not on combinatorics, but on geometry. We overcome this difficulty by establishing and exploiting additional geometric properties. This allows us to reliably solve a wide range of benchmark instances with up to 600 vertices within reasonable time on a standard machine. We also show that using a natural geometry-based sparsification yields results that are on average within 0.5% of the optimum.
[ { "version": "v1", "created": "Wed, 23 Mar 2016 06:25:07 GMT" } ]
2016-03-24T00:00:00
[ [ "Fekete", "Sándor P.", "" ], [ "Haas", "Andreas", "" ], [ "Hemmer", "Michael", "" ], [ "Hoffmann", "Michael", "" ], [ "Kostitsyna", "Irina", "" ], [ "Krupke", "Dominik", "" ], [ "Maurer", "Florian", "" ], [ "Mitchell", "Joseph S. B.", "" ], [ "Schmidt", "Arne", "" ], [ "Schmidt", "Christiane", "" ], [ "Troegel", "Julian", "" ] ]
new_dataset
0.996027
1603.07292
Shayak Sen
Aleksandar Chakarov, Aditya Nori, Sriram Rajamani, Shayak Sen, and Deepak Vijaykeerthy
Debugging Machine Learning Tasks
null
null
null
null
cs.LG cs.AI cs.PL stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unlike traditional programs (such as operating systems or word processors) which have large amounts of code, machine learning tasks use programs with relatively small amounts of code (written in machine learning libraries), but voluminous amounts of data. Just like developers of traditional programs debug errors in their code, developers of machine learning tasks debug and fix errors in their data. However, algorithms and tools for debugging and fixing errors in data are less common, when compared to their counterparts for detecting and fixing errors in code. In this paper, we consider classification tasks where errors in training data lead to misclassifications in test points, and propose an automated method to find the root causes of such misclassifications. Our root cause analysis is based on Pearl's theory of causation, and uses Pearl's PS (Probability of Sufficiency) as a scoring metric. Our implementation, Psi, encodes the computation of PS as a probabilistic program, and uses recent work on probabilistic programs and transformations on probabilistic programs (along with gray-box models of machine learning algorithms) to efficiently compute PS. Psi is able to identify root causes of data errors in interesting data sets.
[ { "version": "v1", "created": "Wed, 23 Mar 2016 18:30:37 GMT" } ]
2016-03-24T00:00:00
[ [ "Chakarov", "Aleksandar", "" ], [ "Nori", "Aditya", "" ], [ "Rajamani", "Sriram", "" ], [ "Sen", "Shayak", "" ], [ "Vijaykeerthy", "Deepak", "" ] ]
new_dataset
0.951245
1601.00455
Andrew Adamatzky
Ramon Alonso-Sanz and Andrew Adamatzky
Actin automata with memory
Accepted for publication in "International Journal of Bifurcation and Chaos"
null
10.1142/S021812741650019X
null
cs.ET nlin.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Actin is a globular protein which forms long polar filaments in eukaryotic. The actin filaments play roles of cytoskeleton, motility units , information processing and learning. We model actin filament as a double chain of finite state machines, nodes, which take states `0' and `1'. The states are abstractions of absence and presence of a sub-threshold charge on an actin units corresponding to the nodes. All nodes update their state in parallel in discrete time. A node updates its current state depending on states of two closest neighbours in the node chain and two closest neighbours in the complementary chain. Previous models of actin automata considered momentary state transitions of nodes. We enrich the actin automata model by assuming that states of nodes depends not only on the current states of neighbouring node but also on their past states. Thus, we assess the effect of memory of past states on the dynamics of acting automata. We demonstrate in computational experiments that memory slows down propagation of perturbations, decrease entropy of space-time patterns generated, transforms travelling localisations to stationary oscillators, and stationary oscillations to still patterns.
[ { "version": "v1", "created": "Mon, 4 Jan 2016 11:24:53 GMT" } ]
2016-03-23T00:00:00
[ [ "Alonso-Sanz", "Ramon", "" ], [ "Adamatzky", "Andrew", "" ] ]
new_dataset
0.999812
1603.06675
Swaroop Ghosh
Nitin Rathi, Helia Naeimi and Swaroop Ghosh
Side Channel Attacks on STTRAM and Low-Overhead Countermeasures
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spin Transfer Torque RAM (STTRAM) is a promising candidate for Last Level Cache (LLC) due to high endurance, high density and low leakage. One of the major disadvantages of STTRAM is high write latency and write current. Additionally, the latency and current depends on the polarity of the data being written. These features introduce major security vulnerabilities and expose the cache memory to side channel attacks. In this paper we propose a novel side channel attack model where the adversary can monitor the supply current of the memory array to partially identify the sensitive cache data that is being read or written. We propose several low cost solutions such as short retention STTRAM, 1-bit parity, multi-bit random write and constant current write driver to mitigate the attack. 1-bit parity reduces the number of distinct write current states by 30% for 32-bit word and the current signature is further obfuscated by multi-bit random writes. The constant current write makes it more challenging for the attacker to extract the entire word using a single supply current signature.
[ { "version": "v1", "created": "Tue, 22 Mar 2016 04:44:49 GMT" } ]
2016-03-23T00:00:00
[ [ "Rathi", "Nitin", "" ], [ "Naeimi", "Helia", "" ], [ "Ghosh", "Swaroop", "" ] ]
new_dataset
0.950745
1603.06678
Masaki Satoh
Masaki Satoh
Stitching Stabilizer: Two-frame-stitching Video Stabilization for Embedded Systems
17 pages. For a supplemental video, see https://www.youtube.com/watch?v=LmyPXfGZRb0
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In conventional electronic video stabilization, the stabilized frame is obtained by cropping the input frame to cancel camera shake. While a small cropping size results in strong stabilization, it does not provide us satisfactory results from the viewpoint of image quality, because it narrows the angle of view. By fusing several frames, we can effectively expand the area of input frames, and achieve strong stabilization even with a large cropping size. Several methods for doing so have been studied. However, their computational costs are too high for embedded systems such as smartphones. We propose a simple, yet surprisingly effective algorithm, called the stitching stabilizer. It stitches only two frames together with a minimal computational cost. It can achieve real-time processes in embedded systems, for Full HD and 30 FPS videos. To clearly show the effect, we apply it to hyperlapse. Using several clips, we show it produces more strongly stabilized and natural results than the existing solutions from Microsoft and Instagram.
[ { "version": "v1", "created": "Tue, 22 Mar 2016 05:42:31 GMT" } ]
2016-03-23T00:00:00
[ [ "Satoh", "Masaki", "" ] ]
new_dataset
0.977895
1603.06780
Haishan Wu
Jingbo Zhou, Hongbin Pei and Haishan Wu
Early Warning of Human Crowds Based on Query Data from Baidu Map: Analysis Based on Shanghai Stampede
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Without sufficient preparation and on-site management, the mass scale unexpected huge human crowd is a serious threat to public safety. A recent impressive tragedy is the 2014 Shanghai Stampede, where 36 people were killed and 49 were injured in celebration of the New Year's Eve on December 31th 2014 in the Shanghai Bund. Due to the innately stochastic and complicated individual movement, it is not easy to predict collective gatherings, which potentially leads to crowd events. In this paper, with leveraging the big data generated on Baidu map, we propose a novel approach to early warning such potential crowd disasters, which has profound public benefits. An insightful observation is that, with the prevalence and convenience of mobile map service, users usually search on the Baidu map to plan a routine. Therefore, aggregating users' query data on Baidu map can obtain priori and indication information for estimating future human population in a specific area ahead of time. Our careful analysis and deep investigation on the Baidu map data on various events also demonstrates a strong correlation pattern between the number of map query and the number of positioning users in an area. Based on such observation, we propose a decision method utilizing query data on Baidu map to invoke warnings for potential crowd events about 1-3 hours in advance. Then we also construct a machine learning model with heterogeneous data (such as query data and mobile positioning data) to quantitatively measure the risk of the potential crowd disasters. We evaluate the effectiveness of our methods on the data of Baidu map.
[ { "version": "v1", "created": "Tue, 22 Mar 2016 13:26:58 GMT" } ]
2016-03-23T00:00:00
[ [ "Zhou", "Jingbo", "" ], [ "Pei", "Hongbin", "" ], [ "Wu", "Haishan", "" ] ]
new_dataset
0.978226
1411.6763
Peng Peng
Peng Peng, Lei Zou, M. Tamer \"Ozsu, Lei Chen, Dongyan Zhao
Processing SPARQL Queries Over Distributed RDF Graphs
30 pages
null
null
null
cs.DB cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose techniques for processing SPARQL queries over a large RDF graph in a distributed environment. We adopt a "partial evaluation and assembly" framework. Answering a SPARQL query Q is equivalent to finding subgraph matches of the query graph Q over RDF graph G. Based on properties of subgraph matching over a distributed graph, we introduce local partial match as partial answers in each fragment of RDF graph G. For assembly, we propose two methods: centralized and distributed assembly. We analyze our algorithms from both theoretically and experimentally. Extensive experiments over both real and benchmark RDF repositories of billions of triples confirm that our method is superior to the state-of-the-art methods in both the system's performance and scalability.
[ { "version": "v1", "created": "Tue, 25 Nov 2014 08:36:58 GMT" }, { "version": "v2", "created": "Wed, 9 Dec 2015 07:20:19 GMT" }, { "version": "v3", "created": "Sat, 27 Feb 2016 03:00:53 GMT" }, { "version": "v4", "created": "Mon, 21 Mar 2016 13:58:00 GMT" } ]
2016-03-22T00:00:00
[ [ "Peng", "Peng", "" ], [ "Zou", "Lei", "" ], [ "Özsu", "M. Tamer", "" ], [ "Chen", "Lei", "" ], [ "Zhao", "Dongyan", "" ] ]
new_dataset
0.957934
1509.05936
Yoshua Bengio
Yoshua Bengio, Thomas Mesnard, Asja Fischer, Saizheng Zhang and Yuhuai Wu
STDP as presynaptic activity times rate of change of postsynaptic activity
null
null
null
null
cs.NE cs.LG q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a weight update formula that is expressed only in terms of firing rates and their derivatives and that results in changes consistent with those associated with spike-timing dependent plasticity (STDP) rules and biological observations, even though the explicit timing of spikes is not needed. The new rule changes a synaptic weight in proportion to the product of the presynaptic firing rate and the temporal rate of change of activity on the postsynaptic side. These quantities are interesting for studying theoretical explanation for synaptic changes from a machine learning perspective. In particular, if neural dynamics moved neural activity towards reducing some objective function, then this STDP rule would correspond to stochastic gradient descent on that objective function.
[ { "version": "v1", "created": "Sat, 19 Sep 2015 21:05:18 GMT" }, { "version": "v2", "created": "Mon, 21 Mar 2016 10:54:18 GMT" } ]
2016-03-22T00:00:00
[ [ "Bengio", "Yoshua", "" ], [ "Mesnard", "Thomas", "" ], [ "Fischer", "Asja", "" ], [ "Zhang", "Saizheng", "" ], [ "Wu", "Yuhuai", "" ] ]
new_dataset
0.985064
1602.01205
Tariq Ahmad Mir
Tariq Ahmad Mir
Citations to articles citing Benford's law: a Benford analysis
12 pages, 2 figure, 7 tables, 37 references
null
null
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The occurrence of first significant digits of numbers in large data is often governed by a logarithmically decreasing distribution called Benford's law (BL), reported first by S. Newcomb (SN) and many decades later independently by F. Benford (FB). Due to its counter-intuitiveness the law was ignored for decades as a mere curious observation. However, an indication of its remarkable resurgence is the huge swell in the number of citations received by the papers of SN/FB. The law has come a long way, from obscurity to now being a regular subject of books, peer reviewed papers, patents, blogs and news. Here, we use Google Scholar (GS) to collect the data on the number of citations received by the articles citing the original paper of SN/FB and then investigate whether the leading digits of this citations data are distributed according to the law they discovered. We find that the citations data of literature on BL is in remarkable agreement with the predictions of the law.
[ { "version": "v1", "created": "Wed, 3 Feb 2016 06:48:33 GMT" }, { "version": "v2", "created": "Sat, 19 Mar 2016 06:55:41 GMT" } ]
2016-03-22T00:00:00
[ [ "Mir", "Tariq Ahmad", "" ] ]
new_dataset
0.993224
1602.05342
Ayumi Igarashi
Ayumi Igarashi and Edith Elkind
Hedonic Games with Graph-restricted Communication
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study hedonic coalition formation games in which cooperation among the players is restricted by a graph structure: a subset of players can form a coalition if and only if they are connected in the given graph. We investigate the complexity of finding stable outcomes in such games, for several notions of stability. In particular, we provide an efficient algorithm that finds an individually stable partition for an arbitrary hedonic game on an acyclic graph. We also introduce a new stability concept -in-neighbor stability- which is tailored for our setting. We show that the problem of finding an in-neighbor stable outcome admits a polynomial-time algorithm if the underlying graph is a path, but is NP-hard for arbitrary trees even for additively separable hedonic games; for symmetric additively separable games we obtain a PLS-hardness result.
[ { "version": "v1", "created": "Wed, 17 Feb 2016 09:18:30 GMT" }, { "version": "v2", "created": "Sun, 20 Mar 2016 10:02:45 GMT" } ]
2016-03-22T00:00:00
[ [ "Igarashi", "Ayumi", "" ], [ "Elkind", "Edith", "" ] ]
new_dataset
0.999497
1603.00644
Ya Meng
Ya Meng, Liping Li, Yanjun Hu
A Novel Interleaving Scheme for Polar Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It's known that the bit errors of polar codes with successive cancellation (SC) decoding are coupled. We call the coupled information bits the correlated bits. In this paper, concatenation schemes are studied for polar codes (as inner codes) and LDPC codes (as outer codes). In a conventional concatenation scheme, to achieve a better BER performance, one can divide all $N_l$ bits in a LDPC block into $N_l$ polar blocks to completely de-correlate the possible coupled errors. In this paper, we propose a novel interleaving scheme between a LDPC code and a polar code which breaks the correlation of the errors among the correlated bits. This interleaving scheme still keeps the simple SC decoding of polar codes while achieves a comparable BER performance at a much smaller delay compared with a $N_l$-block delay scheme.
[ { "version": "v1", "created": "Wed, 2 Mar 2016 10:14:08 GMT" }, { "version": "v2", "created": "Sun, 20 Mar 2016 08:16:31 GMT" } ]
2016-03-22T00:00:00
[ [ "Meng", "Ya", "" ], [ "Li", "Liping", "" ], [ "Hu", "Yanjun", "" ] ]
new_dataset
0.99815
1603.05073
Ognjen Arandjelovi\'c PhD
Warren Rieutort-Louis, Ognjen Arandjelovic
Descriptor transition tables for object retrieval using unconstrained cluttered video acquired using a consumer level handheld mobile device
2016
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Visual recognition and vision based retrieval of objects from large databases are tasks with a wide spectrum of potential applications. In this paper we propose a novel recognition method from video sequences suitable for retrieval from databases acquired in highly unconstrained conditions e.g. using a mobile consumer-level device such as a phone. On the lowest level, we represent each sequence as a 3D mesh of densely packed local appearance descriptors. While image plane geometry is captured implicitly by a large overlap of neighbouring regions from which the descriptors are extracted, 3D information is extracted by means of a descriptor transition table, learnt from a single sequence for each known gallery object. These allow us to connect local descriptors along the 3rd dimension (which corresponds to viewpoint changes), thus resulting in a set of variable length Markov chains for each video. The matching of two sets of such chains is formulated as a statistical hypothesis test, whereby a subset of each is chosen to maximize the likelihood that the corresponding video sequences show the same object. The effectiveness of the proposed algorithm is empirically evaluated on the Amsterdam Library of Object Images and a new highly challenging video data set acquired using a mobile phone. On both data sets our method is shown to be successful in recognition in the presence of background clutter and large viewpoint changes.
[ { "version": "v1", "created": "Wed, 16 Mar 2016 12:57:10 GMT" }, { "version": "v2", "created": "Mon, 21 Mar 2016 12:02:40 GMT" } ]
2016-03-22T00:00:00
[ [ "Rieutort-Louis", "Warren", "" ], [ "Arandjelovic", "Ognjen", "" ] ]
new_dataset
0.999103
1603.06044
Maziar Mirzazad Barijough
J.J. Garcia-Luna-Aceves, Maziar Mirzazad-Barijough
A Light-Weight Forwarding Plane for Content-Centric Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present CCN-DART, a more efficient forwarding approach for content-centric networking (CCN) than named data networking (NDN) that substitutes Pending Interest Tables (PIT) with Data Answer Routing Tables (DART) and uses a novel approach to eliminate forwarding loops. The forwarding state required at each router using CCN-DART consists of segments of the routes between consumers and content providers that traverse a content router, rather than the Interests that the router forwards towards content providers. Accordingly, the size of a DART is proportional to the number of routes used by Interests traversing a router, rather than the number of Interests traversing a router. We show that CCN-DART avoids forwarding loops by comparing distances to name prefixes reported by neighbors, even when routing loops exist. Results of simulation experiments comparing CCN-DART with NDN using the ndnSIM simulation tool show that CCN-DART incurs 10 to 20 times less storage overhead.
[ { "version": "v1", "created": "Sat, 19 Mar 2016 04:03:01 GMT" } ]
2016-03-22T00:00:00
[ [ "Garcia-Luna-Aceves", "J. J.", "" ], [ "Mirzazad-Barijough", "Maziar", "" ] ]
new_dataset
0.978402
1603.06286
Xu Chen
Xu Chen, Dongning Guo
A Generalized LDPC Framework for Robust and Sublinear Compressive Sensing
accepted to ICASSP 2016
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressive sensing aims to recover a high-dimensional sparse signal from a relatively small number of measurements. In this paper, a novel design of the measurement matrix is proposed. The design is inspired by the construction of generalized low-density parity-check codes, where the capacity-achieving point-to-point codes serve as subcodes to robustly estimate the signal support. In the case that each entry of the $n$-dimensional $k$-sparse signal lies in a known discrete alphabet, the proposed scheme requires only $O(k \log n)$ measurements and arithmetic operations. In the case of arbitrary, possibly continuous alphabet, an error propagation graph is proposed to characterize the residual estimation error. With $O(k \log^2 n)$ measurements and computational complexity, the reconstruction error can be made arbitrarily small with high probability.
[ { "version": "v1", "created": "Sun, 20 Mar 2016 22:53:23 GMT" } ]
2016-03-22T00:00:00
[ [ "Chen", "Xu", "" ], [ "Guo", "Dongning", "" ] ]
new_dataset
0.981345
1603.06317
Jia Pan
Hao Zhang, Pinxin Long, Dandan Zhou, Zhongfeng Qian, Zheng Wang, Weiwei Wan, Dinesh Manocha, Chonhyon Park, Tommy Hu, Chao Cao, Yibo Chen, Marco Chow, Jia Pan
DoraPicker: An Autonomous Picking System for General Objects
10 pages, 10 figures
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Robots that autonomously manipulate objects within warehouses have the potential to shorten the package delivery time and improve the efficiency of the e-commerce industry. In this paper, we present a robotic system that is capable of both picking and placing general objects in warehouse scenarios. Given a target object, the robot autonomously detects it from a shelf or a table and estimates its full 6D pose. With this pose information, the robot picks the object using its gripper, and then places it into a container or at a specified location. We describe our pick-and-place system in detail while highlighting our design principles for the warehouse settings, including the perception method that leverages knowledge about its workspace, three grippers designed to handle a large variety of different objects in terms of shape, weight and material, and grasp planning in cluttered scenarios. We also present extensive experiments to evaluate the performance of our picking system and demonstrate that the robot is competent to accomplish various tasks in warehouse settings, such as picking a target item from a tight space, grasping different objects from the shelf, and performing pick-and-place tasks on the table.
[ { "version": "v1", "created": "Mon, 21 Mar 2016 03:32:04 GMT" } ]
2016-03-22T00:00:00
[ [ "Zhang", "Hao", "" ], [ "Long", "Pinxin", "" ], [ "Zhou", "Dandan", "" ], [ "Qian", "Zhongfeng", "" ], [ "Wang", "Zheng", "" ], [ "Wan", "Weiwei", "" ], [ "Manocha", "Dinesh", "" ], [ "Park", "Chonhyon", "" ], [ "Hu", "Tommy", "" ], [ "Cao", "Chao", "" ], [ "Chen", "Yibo", "" ], [ "Chow", "Marco", "" ], [ "Pan", "Jia", "" ] ]
new_dataset
0.997185
1603.06351
Chong Qin
Chong Qin, Yi Gong, and Zhi Quan
A Diplexer-Based Receiver for Simultaneous Wireless Information and Power Transfer
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simultaneous wireless information and power transfer (SWIPT) is an appealing research area because both information and energy can be delivered to wireless devices simultaneously. In this paper, we propose a diplexer-based receiver architecture that can utilizes both the doubling frequency and baseband signals after the mixer. The baseband signals are used for information decoding and the doubling frequency signals are converted to direct current for energy harvesting. We analyze the signal in the receiver and find that the power of the energy harvested is equal to that of information decoded. Therefore, the diplexer can be used as a power splitter with a power splitting factor of 0.5. Specifically, we consider a multiuser multi-input single-output (MISO) system, in which each user is equipped with the newly proposed receiver. The problem is formulated as an optimization problem that minimizes the total transmitted power subject to some constraints on each user's quality of service and energy harvesting demand. We show that the problem thus formulated is a non-convex quadratically constrained quadratic program (QCQP), which can be solved by semi-definite relaxation.
[ { "version": "v1", "created": "Mon, 21 Mar 2016 08:24:34 GMT" } ]
2016-03-22T00:00:00
[ [ "Qin", "Chong", "" ], [ "Gong", "Yi", "" ], [ "Quan", "Zhi", "" ] ]
new_dataset
0.997723
1603.06390
Andras Gabor Kupcsik
Andras Kupcsik and David Hsu and Wee Sun Lee
Learning Dynamic Robot-to-Human Object Handover from Human Feedback
Appears in the Proceedings of the International Symposium on Robotics Research (ISRR) 2015
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Object handover is a basic, but essential capability for robots interacting with humans in many applications, e.g., caring for the elderly and assisting workers in manufacturing workshops. It appears deceptively simple, as humans perform object handover almost flawlessly. The success of humans, however, belies the complexity of object handover as collaborative physical interaction between two agents with limited communication. This paper presents a learning algorithm for dynamic object handover, for example, when a robot hands over water bottles to marathon runners passing by the water station. We formulate the problem as contextual policy search, in which the robot learns object handover by interacting with the human. A key challenge here is to learn the latent reward of the handover task under noisy human feedback. Preliminary experiments show that the robot learns to hand over a water bottle naturally and that it adapts to the dynamics of human motion. One challenge for the future is to combine the model-free learning algorithm with a model-based planning approach and enable the robot to adapt over human preferences and object characteristics, such as shape, weight, and surface texture.
[ { "version": "v1", "created": "Mon, 21 Mar 2016 11:30:04 GMT" } ]
2016-03-22T00:00:00
[ [ "Kupcsik", "Andras", "" ], [ "Hsu", "David", "" ], [ "Lee", "Wee Sun", "" ] ]
new_dataset
0.966763
1603.00797
Niall Twomey
Niall Twomey, Tom Diethe, Meelis Kull, Hao Song, Massimo Camplani, Sion Hannuna, Xenofon Fafoutis, Ni Zhu, Pete Woznowski, Peter Flach, and Ian Craddock
The SPHERE Challenge: Activity Recognition with Multimodal Sensor Data
Paper describing dataset. 11 pages; 4 figures
null
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper outlines the Sensor Platform for HEalthcare in Residential Environment (SPHERE) project and details the SPHERE challenge that will take place in conjunction with European Conference on Machine Learning and Principles and Practice of Knowledge Discovery (ECML-PKDD) between March and July 2016. The SPHERE challenge is an activity recognition competition where predictions are made from video, accelerometer and environmental sensors. Monetary prizes will be awarded to the top three entrants, with Euro 1,000 being awarded to the winner, Euro 600 being awarded to the first runner up, and Euro 400 being awarded to the second runner up.
[ { "version": "v1", "created": "Wed, 2 Mar 2016 17:14:43 GMT" }, { "version": "v2", "created": "Mon, 7 Mar 2016 17:00:16 GMT" }, { "version": "v3", "created": "Thu, 17 Mar 2016 22:17:51 GMT" } ]
2016-03-21T00:00:00
[ [ "Twomey", "Niall", "" ], [ "Diethe", "Tom", "" ], [ "Kull", "Meelis", "" ], [ "Song", "Hao", "" ], [ "Camplani", "Massimo", "" ], [ "Hannuna", "Sion", "" ], [ "Fafoutis", "Xenofon", "" ], [ "Zhu", "Ni", "" ], [ "Woznowski", "Pete", "" ], [ "Flach", "Peter", "" ], [ "Craddock", "Ian", "" ] ]
new_dataset
0.974774
1603.05701
Xueqing Huang
Xueqing Huang and Nirwan Ansari
Content Caching and Distribution in Smart Grid Enabled Wireless Networks
Submitted to IEEE IoT Journal SI on Multimedia Communications
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To facilitate wireless transmission of multimedia content to mobile users, we propose a content caching and distribution framework for smart grid enabled OFDM networks, where each popular multimedia file is coded and distributively stored in multiple energy harvesting enabled serving nodes (SNs), and the green energy distributively harvested by SNs can be shared with each other through the smart grid. The distributive caching, green energy sharing and the on-grid energy backup have improved the reliability and performance of the wireless multimedia downloading process. To minimize the total on-grid power consumption of the whole network, while guaranteeing that each user can retrieve the whole content, the user association scheme is jointly designed with consideration of resource allocation, including subchannel assignment, power allocation and power flow among nodes, where the user association scheme decides which SN serves which user. First, the optimal power allocated to each subchannel and the power flows among nodes are derived analytically. Then, the user association problem is decoupled from the subchannel assignment problem, and the proposed user association scheme has leveraged the multicasting nature of the content download process. To decide which subchannel is assigned to which node, the number of subchannels assigned to each node is first determined, according to the green energy generating rate and the associated traffic offload, and then the corresponding subchannels are selected from the total assigned system spectrum. Simulation results demonstrate that bringing content, green energy and serving node closer to the end user can notably reduce the on-grid energy consumption.
[ { "version": "v1", "created": "Thu, 17 Mar 2016 21:52:06 GMT" } ]
2016-03-21T00:00:00
[ [ "Huang", "Xueqing", "" ], [ "Ansari", "Nirwan", "" ] ]
new_dataset
0.997191
1603.05894
Hojjat Mostafanasab
Hojjat Mostafanasab and Ahmad Yousefian Darani
On cyclic DNA codes over $\mathbb{F}_2+u\mathbb{F}_2+u^2\mathbb{F}_2$
12 pages. arXiv admin note: text overlap with arXiv:1508.02015 by other authors
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the present paper we study the structure of cyclic DNA codes of even lenght over the ring $\mathbb{F}_2+u\mathbb{F}_2+u^2\mathbb{F}_2$ where $u^3=0$. We investigate two presentations of cyclic codes of even lenght over $\mathbb{F}_2+u\mathbb{F}_2+u^2\mathbb{F}_2$ satisfying the reverse constraint and reverse-complement constraint.
[ { "version": "v1", "created": "Fri, 18 Mar 2016 15:34:49 GMT" } ]
2016-03-21T00:00:00
[ [ "Mostafanasab", "Hojjat", "" ], [ "Darani", "Ahmad Yousefian", "" ] ]
new_dataset
0.989848
1603.05942
Michele Coscia
Michele Coscia, Frank Neffke and Eduardo Lora
Report on the Poblacion Flotante of Bogota (D.C.)
null
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this document we describe the size of the Poblacion Flotante of Bogota (D.C.). The Poblacion Flotante is composed by people who live outside Bogota (D.C.), but who rely on the city for performing their job. We estimate the Poblacion Flotante impact relying on a new data source provided by telecommunications operators in Colombia, which enables us to estimate how many people commute daily from every municipality of Colombia to a specific area of Bogota (D.C.). We estimate that the size of the Poblacion Flotante could represent a 5.4% increase of Bogota (D.C.)'s population. During weekdays, the commuters tend to visit the city center more.
[ { "version": "v1", "created": "Fri, 18 Mar 2016 18:00:16 GMT" } ]
2016-03-21T00:00:00
[ [ "Coscia", "Michele", "" ], [ "Neffke", "Frank", "" ], [ "Lora", "Eduardo", "" ] ]
new_dataset
0.999232
1603.05945
Nick Brettell
\'Edouard Bonnet and Nick Brettell and O-joung Kwon and D\'aniel Marx
Parameterized vertex deletion problems for hereditary graph classes with a block property
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a class of graphs $\mathcal{P}$, the Bounded $\mathcal{P}$-Block Vertex Deletion problem asks, given a graph $G$ on $n$ vertices and positive integers $k$ and $d$, whether there is a set $S$ of at most $k$ vertices such that each block of $G-S$ has at most $d$ vertices and is in $\mathcal{P}$. We show that when $\mathcal{P}$ satisfies a natural hereditary property and is recognizable in polynomial time, Bounded $\mathcal{P}$-Block Vertex Deletion can be solved in time $2^{O(k \log d)}n^{O(1)}$. When $\mathcal{P}$ contains all split graphs, we show that this running time is essentially optimal unless the Exponential Time Hypothesis fails. On the other hand, if $\mathcal{P}$ consists of only complete graphs, or only cycle graphs and $K_2$, then Bounded $\mathcal{P}$-Block Vertex Deletion admits a $c^{k}n^{O(1)}$-time algorithm for some constant $c$ independent of $d$. We also show that Bounded $\mathcal{P}$-Block Vertex Deletion admits a kernel with $O(k^2 d^7)$ vertices.
[ { "version": "v1", "created": "Fri, 18 Mar 2016 18:02:04 GMT" } ]
2016-03-21T00:00:00
[ [ "Bonnet", "Édouard", "" ], [ "Brettell", "Nick", "" ], [ "Kwon", "O-joung", "" ], [ "Marx", "Dániel", "" ] ]
new_dataset
0.959064
1603.05399
Somayeh Salimi
Somayeh Salimi, Matthieu Bloch, Frederic Gabry, Mikael Skoglund, Panos Papadimitratos
Strong Secrecy in Pairwise Key Agreement over a Generalized Multiple Access Channel
45 pages, 11 figures, Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the problem of pairwise key agreement without public communication between three users connected through a generalized multiple access channel (MAC). While two users control the channel inputs, all three users observe noisy outputs from the channel and each pair of users wishes to agree on a secret key hidden from the remaining user. We first develop a "pre-generated" key-agreement scheme based on secrecy codes for the generalized MAC, in which the channel is only used to distribute pre-generated secret keys. We then extend this scheme to include an additional layer of rate-limited secret-key generation by treating the observed channel outputs as induced sources. We characterize inner and outer bounds on the strong secret-key capacity region for both schemes. For a special case of the "pre-generated" scheme, we obtain an exact characterization. We also illustrate with some binary examples that exploiting the generalized nature of the generalized MAC may lead to significantly larger key-agreement rates.
[ { "version": "v1", "created": "Thu, 17 Mar 2016 09:24:10 GMT" } ]
2016-03-18T00:00:00
[ [ "Salimi", "Somayeh", "" ], [ "Bloch", "Matthieu", "" ], [ "Gabry", "Frederic", "" ], [ "Skoglund", "Mikael", "" ], [ "Papadimitratos", "Panos", "" ] ]
new_dataset
0.988395
1603.05462
Aanjhan Ranganathan
Aanjhan Ranganathan, Hildur \'Olafsd\'ottir, Srdjan Capkun
SPREE: Spoofing Resistant GPS Receiver
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Global Positioning System (GPS) is used ubiquitously in a wide variety of applications ranging from navigation and tracking to modern smart grids and communication networks. However, it has been demonstrated that modern GPS receivers are vulnerable to signal spoofing attacks. For example, today it is possible to change the course of a ship or force a drone to land in an hostile area by simply spoofing GPS signals. Several countermeasures have been proposed in the past to detect GPS spoofing attacks. These countermeasures offer protection only against naive attackers. They are incapable of detecting strong attackers such as those capable of seamlessly taking over a GPS receiver, which is currently receiving legitimate satellite signals, and spoofing them to an arbitrary location. Also, there is no hardware platform that can be used to compare and evaluate the effectiveness of existing countermeasures in real-world scenarios. In this work, we present SPREE, which is, to the best of our knowledge, the first GPS receiver capable of detecting all spoofing attacks described in literature. Our novel spoofing detection technique called auxiliary peak tracking enables detection of even a strong attacker capable of executing the seamless takeover attack. We implement and evaluate our receiver against three different sets of GPS signal traces and show that SPREE constrains even a strong attacker (capable of seamless takeover attack) from spoofing the receiver to a location not more than 1 km away from its true location. This is a significant improvement over modern GPS receivers that can be spoofed to any arbitrary location. Finally, we release our implementation and datasets to the community for further research and development.
[ { "version": "v1", "created": "Thu, 17 Mar 2016 13:00:41 GMT" } ]
2016-03-18T00:00:00
[ [ "Ranganathan", "Aanjhan", "" ], [ "Ólafsdóttir", "Hildur", "" ], [ "Capkun", "Srdjan", "" ] ]
new_dataset
0.999345
1603.05599
E.-F. Markus Henke
E.-F. Markus Henke, Samuel Schlatter, Iain A. Anderson
A Soft Electronics-Free robot
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Biomimetic entirely soft robots with animal-like behavior and integrated artificial nervous systems will open up totally new perspectives and applications. However, until now all presented studies on soft robots were limited to partly soft designs, since all designs at least needed conventional, stiff, electronics, to sense, process signals and activate actuators. We present the first soft robot with integrated artificial nervous system entirely made of dielectric elastomers - and without any conventional stiff electronic parts. Supplied with only one external DC voltage, the robot autonomously generates all signals necessary to drive its actuators, and translates an in-plane electromechanical oscillation into a crawling locomotion movement. Thereby, all functional parts are made of polymer materials and carbon. Besides the basic design of the world's first entirely soft robot we present prospects to control general behavior of such robots.
[ { "version": "v1", "created": "Wed, 16 Mar 2016 05:03:20 GMT" } ]
2016-03-18T00:00:00
[ [ "Henke", "E. -F. Markus", "" ], [ "Schlatter", "Samuel", "" ], [ "Anderson", "Iain A.", "" ] ]
new_dataset
0.999539
1603.05625
Andreas Krebs
Andreas Krebs, Kamal Lodaya, Paritosh Pandya, Howard Straubing
Two-variable Logic with a Between Predicate
null
null
null
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We study an extension of FO^2[<], first-order logic interpreted in finite words, in which formulas are restricted to use only two variables. We adjoin to this language two-variable atomic formulas that say, `the letter a appears between positions x and y'. This is, in a sense, the simplest property that is not expressible using only two variables. We present several logics, both first-order and temporal, that have the same expressive power, and find matching lower and upper bounds for the complexity of satisfiability for each of these formulations. We also give an effective necessary condition, in terms of the syntactic monoid of a regular language, for a property to be expressible in this logic. We show that this condition is also sufficient for words over a two-letter alphabet. This algebraic analysis allows us us to prove, among other things, that our new logic has strictly less expressive power than full first-order logic FO[<].
[ { "version": "v1", "created": "Thu, 17 Mar 2016 19:17:10 GMT" } ]
2016-03-18T00:00:00
[ [ "Krebs", "Andreas", "" ], [ "Lodaya", "Kamal", "" ], [ "Pandya", "Paritosh", "" ], [ "Straubing", "Howard", "" ] ]
new_dataset
0.986557
0710.2156
Daniel Lemire
Kamel Aouiche, Daniel Lemire and Robert Godin
Collaborative OLAP with Tag Clouds: Web 2.0 OLAP Formalism and Experimental Evaluation
Software at https://github.com/lemire/OLAPTagCloud
null
null
null
cs.DB
http://creativecommons.org/licenses/by/4.0/
Increasingly, business projects are ephemeral. New Business Intelligence tools must support ad-lib data sources and quick perusal. Meanwhile, tag clouds are a popular community-driven visualization technique. Hence, we investigate tag-cloud views with support for OLAP operations such as roll-ups, slices, dices, clustering, and drill-downs. As a case study, we implemented an application where users can upload data and immediately navigate through its ad hoc dimensions. To support social networking, views can be easily shared and embedded in other Web sites. Algorithmically, our tag-cloud views are approximate range top-k queries over spontaneous data cubes. We present experimental evidence that iceberg cuboids provide adequate online approximations. We benchmark several browser-oblivious tag-cloud layout optimizations.
[ { "version": "v1", "created": "Thu, 11 Oct 2007 19:48:10 GMT" }, { "version": "v2", "created": "Mon, 14 Jan 2008 21:23:11 GMT" }, { "version": "v3", "created": "Tue, 15 Mar 2016 21:52:12 GMT" } ]
2016-03-17T00:00:00
[ [ "Aouiche", "Kamel", "" ], [ "Lemire", "Daniel", "" ], [ "Godin", "Robert", "" ] ]
new_dataset
0.966743
1503.03394
Michael Kiermaier
Michael Kiermaier, Alfred Wassermann and Johannes Zwanzger
New upper bounds on binary linear codes and a $\mathbb Z_4$-code with a better-than-linear Gray image
null
null
null
null
cs.IT math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using integer linear programming and table-lookups we prove that there is no binary linear $[1988, 12, 992]$ code. As a by-product, the non-existence of binary linear codes with the parameters $[324, 10, 160]$, $[356, 10, 176]$, $[772,11,384]$, and $[836,11,416]$ is shown. Our work is motivated by the recent construction of the extended dualized Kerdock code $\hat{\mathcal{K}}^*_{6}$, which is a $\mathbb{Z}_4$-linear code having a non-linear binary Gray image with the parameters $(1988,2^{12},992)$. By our result, the code $\hat{\mathcal{K}}^*_{6}$ can be added to the small list of $\mathbb{Z}_4$-codes for which it is known that the Gray image is better than any binary linear code.
[ { "version": "v1", "created": "Tue, 10 Mar 2015 14:59:56 GMT" }, { "version": "v2", "created": "Wed, 16 Mar 2016 10:47:02 GMT" } ]
2016-03-17T00:00:00
[ [ "Kiermaier", "Michael", "" ], [ "Wassermann", "Alfred", "" ], [ "Zwanzger", "Johannes", "" ] ]
new_dataset
0.987364
1603.05047
Jakob Gruber
Jakob Gruber, Jesper Larsson Tr\"aff, Martin Wimmer
Benchmarking Concurrent Priority Queues: Performance of k-LSM and Related Data Structures
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A number of concurrent, relaxed priority queues have recently been proposed and implemented. Results are commonly reported for a throughput benchmark that uses a uniform distribution of keys drawn from a large integer range, and mostly for single systems. We have conducted more extensive benchmarking of three recent, relaxed priority queues on four different types of systems with different key ranges and distributions. While we can show superior throughput and scalability for our own k-LSM priority queue for the uniform key distribution, the picture changes drastically for other distributions, both with respect to achieved throughput and relative merit of the priority queues. The throughput benchmark alone is thus not sufficient to characterize the performance of concurrent priority queues. Our benchmark code and k-LSM priority queue are publicly available to foster future comparison.
[ { "version": "v1", "created": "Wed, 16 Mar 2016 11:46:06 GMT" } ]
2016-03-17T00:00:00
[ [ "Gruber", "Jakob", "" ], [ "Träff", "Jesper Larsson", "" ], [ "Wimmer", "Martin", "" ] ]
new_dataset
0.955791
1603.05063
Buket \"Ozkaya
Jean-Claude Belfiore, Cem G\"uneri and Buket \"Ozkaya
Quasi-cyclic subcodes of cyclic codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We completely characterize possible indices of quasi-cyclic subcodes in a cyclic code for a very broad class of cyclic codes. We present enumeration results for quasi-cyclic subcodes of a fixed index and show that the problem of enumeration is equivalent to enumeration of certain vector subspaces in finite fields. In particular, we present enumeration results for quasi-cyclic subcodes of the simplex code and duals of certain BCH codes. Our results are based on the trace representation of cyclic codes.
[ { "version": "v1", "created": "Wed, 16 Mar 2016 12:33:01 GMT" } ]
2016-03-17T00:00:00
[ [ "Belfiore", "Jean-Claude", "" ], [ "Güneri", "Cem", "" ], [ "Özkaya", "Buket", "" ] ]
new_dataset
0.99831
1408.5781
Nathanael Perraudin N. P.
Nathana\"el Perraudin, Johan Paratte, David Shuman, Lionel Martin, Vassilis Kalofolias, Pierre Vandergheynst, David K. Hammond
GSPBOX: A toolbox for signal processing on graphs
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document introduces the Graph Signal Processing Toolbox (GSPBox) a framework that can be used to tackle graph related problems with a signal processing approach. It explains the structure and the organization of this software. It also contains a general description of the important modules.
[ { "version": "v1", "created": "Mon, 25 Aug 2014 14:54:50 GMT" }, { "version": "v2", "created": "Tue, 15 Mar 2016 09:55:55 GMT" } ]
2016-03-16T00:00:00
[ [ "Perraudin", "Nathanaël", "" ], [ "Paratte", "Johan", "" ], [ "Shuman", "David", "" ], [ "Martin", "Lionel", "" ], [ "Kalofolias", "Vassilis", "" ], [ "Vandergheynst", "Pierre", "" ], [ "Hammond", "David K.", "" ] ]
new_dataset
0.991967
1510.08485
Wenhao Wang
Wenhao Wang, Zhi Sun, Kui Ren, Bocheng Zhu, Sixu Piao
Wireless Physical-Layer Identification: Modeling and Validation
null
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the physical waveforms of wireless signals to identify and classify authorized devices. As the inherent physical layer features are difficult to forge, WPLI is deemed as a promising technique for wireless security solutions. However, as of today it still remains unclear whether existing WPLI techniques can be applied under real-world requirements and constraints. In this paper, through both theoretical modeling and experiment validation, the reliability and differentiability of WPLI techniques are rigorously evaluated, especially under the constraints of state-of-art wireless devices, real operation environments, as well as wireless protocols and regulations. Specifically, a theoretical model is first established to systematically describe the complete procedure of WPLI. More importantly, the proposed model is then implemented to thoroughly characterize various WPLI techniques that utilize the spectrum features coming from the non-linear RF-front-end, under the influences from different transmitters, receivers, and wireless channels. Subsequently, the limitations of existing WPLI techniques are revealed and evaluated in details using both the developed theoretical model and in-lab experiments. The real-world requirements and constraints are characterized along each step in WPLI, including i) the signal processing at the transmitter (device to be identified), ii) the various physical layer features that originate from circuits, antenna, and environments, iii) the signal propagation in various wireless channels, iv) the signal reception and processing at the receiver (the identifier), and v) the fingerprint extraction and classification at the receiver.
[ { "version": "v1", "created": "Wed, 28 Oct 2015 20:59:48 GMT" }, { "version": "v2", "created": "Mon, 14 Mar 2016 21:37:04 GMT" } ]
2016-03-16T00:00:00
[ [ "Wang", "Wenhao", "" ], [ "Sun", "Zhi", "" ], [ "Ren", "Kui", "" ], [ "Zhu", "Bocheng", "" ], [ "Piao", "Sixu", "" ] ]
new_dataset
0.997056
1512.07780
Ruben Verborgh
Ruben Verborgh, D\"orthe Arndt, Sofie Van Hoecke, Jos De Roo, Giovanni Mels, Thomas Steiner, Joaquim Gabarro
The Pragmatic Proof: Hypermedia API Composition and Execution
Under consideration in Theory and Practice of Logic Programming (TPLP)
null
10.1017/S1471068416000016
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Machine clients are increasingly making use of the Web to perform tasks. While Web services traditionally mimic remote procedure calling interfaces, a new generation of so-called hypermedia APIs works through hyperlinks and forms, in a way similar to how people browse the Web. This means that existing composition techniques, which determine a procedural plan upfront, are not sufficient to consume hypermedia APIs, which need to be navigated at runtime. Clients instead need a more dynamic plan that allows them to follow hyperlinks and use forms with a preset goal. Therefore, in this article, we show how compositions of hypermedia APIs can be created by generic Semantic Web reasoners. This is achieved through the generation of a proof based on semantic descriptions of the APIs' functionality. To pragmatically verify the applicability of compositions, we introduce the notion of pre-execution and post-execution proofs. The runtime interaction between a client and a server is guided by proofs but driven by hypermedia, allowing the client to react to the application's actual state indicated by the server's response. We describe how to generate compositions from descriptions, discuss a computer-assisted process to generate descriptions, and verify reasoner performance on various composition tasks using a benchmark suite. The experimental results lead to the conclusion that proof-based consumption of hypermedia APIs is a feasible strategy at Web scale.
[ { "version": "v1", "created": "Thu, 24 Dec 2015 10:30:25 GMT" } ]
2016-03-16T00:00:00
[ [ "Verborgh", "Ruben", "" ], [ "Arndt", "Dörthe", "" ], [ "Van Hoecke", "Sofie", "" ], [ "De Roo", "Jos", "" ], [ "Mels", "Giovanni", "" ], [ "Steiner", "Thomas", "" ], [ "Gabarro", "Joaquim", "" ] ]
new_dataset
0.996309
1603.01684
Chenxing Xia
Hanling Zhang and Chenxing Xia
Saliency Detection combining Multi-layer Integration algorithm with background prior and energy function
25 pages, 8 figures. arXiv admin note: text overlap with arXiv:1505.07192 by other authors
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an improved mechanism for saliency detection. Firstly,based on a neoteric background prior selecting four corners of an image as background,we use color and spatial contrast with each superpixel to obtain a salinecy map(CBP). Inspired by reverse-measurement methods to improve the accuracy of measurement in Engineering,we employ the Objectness labels as foreground prior based on part of information of CBP to construct a map(OFP).Further,an original energy function is applied to optimize both of them respectively and a single-layer saliency map(SLP)is formed by merging the above twos.Finally,to deal with the scale problem,we obtain our multi-layer map(MLP) by presenting an integration algorithm to take advantage of multiple saliency maps. Quantitative and qualitative experiments on three datasets demonstrate that our method performs favorably against the state-of-the-art algorithm.
[ { "version": "v1", "created": "Sat, 5 Mar 2016 06:12:44 GMT" } ]
2016-03-16T00:00:00
[ [ "Zhang", "Hanling", "" ], [ "Xia", "Chenxing", "" ] ]
new_dataset
0.95397
1509.08037
Takahiro Kawabe
Takahiro Kawabe, Taiki Fukiage, Masataka Sawayama, Shin'ya Nishida
Deformation Lamps: A Projection Technique to Make a Static Object Dynamic
21 pages, 8 figures
ACM Transactions on Applied Perception 13, 2, Article 10, 2016
10.1145/2874358
null
cs.GR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Light projection is a powerful technique to edit appearances of objects in the real world. Based on pixel-wise modification of light transport, previous techniques have successfully modified static surface properties such as surface color, dynamic range, gloss and shading. Here, we propose an alternative light projection technique that adds a variety of illusory, yet realistic distortions to a wide range of static 2D and 3D projection targets. The key idea of our technique, named Deformation Lamps, is to project only dynamic luminance information, which effectively activates the motion (and shape) processing in the visual system, while preserving the color and texture of the original object. Although the projected dynamic luminance information is spatially inconsistent with the color and texture of the target object, the observer's brain automatically com- bines these sensory signals in such a way as to correct the inconsistency across visual attributes. We conducted a psychophysical experiment to investigate the characteristics of the inconsistency correction, and found that the correction was dependent critically on the retinal magnitude of inconsistency. Another experiment showed that perceived magnitude of image deformation by our techniques was underestimated. The results ruled out the possibility that the effect by our technique stemmed simply from the physical change of object appearance by light projection. Finally, we discuss how our techniques can make the observers perceive a vivid and natural movement, deformation, or oscillation of a variety of static objects, including drawn pictures, printed photographs, sculptures with 3D shading, objects with natural textures including human bodies.
[ { "version": "v1", "created": "Sun, 27 Sep 2015 00:07:07 GMT" } ]
2016-03-15T00:00:00
[ [ "Kawabe", "Takahiro", "" ], [ "Fukiage", "Taiki", "" ], [ "Sawayama", "Masataka", "" ], [ "Nishida", "Shin'ya", "" ] ]
new_dataset
0.96193
1512.07305
Sri Raj Paul
Sri Raj Paul, Karthik Murthy, Kuldeep S. Meel, John Mellor-Crummey
Distributed Phasers
2 page extended abstract presented at The International Conference on Parallel Architectures and Compilation Techniques (PACT) 2015
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A phaser is an expressive synchronization construct that unifies collective and point-to-point coordination with dynamic task parallelism. Each task can participate in a phaser as a signaler, a waiter, or both. The participants in a phaser may change over time as dynamic tasks are added and deleted. In this poster, we present a highly concurrent and scalable design of phasers for a distributed memory environment that is suitable for use with asynchronous partitioned global address space programming models. Our design for a distributed phaser employs a pair of skip lists augmented with the ability to collect and propagate synchronization signals. To enable a high degree of concurrency, addition and deletion of participant tasks are performed in two phases: a "fast single-link-modify" step followed by multiple hand-overhand "lazy multi-link-modify" steps. We show that the cost of synchronization and structural operations on a distributed phaser scales logarithmically, even in the presence of concurrent structural modifications. To verify the correctness of our design for distributed phasers, we employ the SPIN model checker. To address this issue of state space explosion, we describe how we decompose the state space to separately verify correct handling for different kinds of messages, which enables complete model checking of our phaser design.
[ { "version": "v1", "created": "Tue, 22 Dec 2015 23:55:38 GMT" }, { "version": "v2", "created": "Sat, 12 Mar 2016 22:39:14 GMT" } ]
2016-03-15T00:00:00
[ [ "Paul", "Sri Raj", "" ], [ "Murthy", "Karthik", "" ], [ "Meel", "Kuldeep S.", "" ], [ "Mellor-Crummey", "John", "" ] ]
new_dataset
0.999576
1602.03648
Erik G. Larsson
Erik G. Larsson and H. Vincent Poor
Joint Beamforming and Broadcasting in Massive MIMO
with minor correction
IEEE Trans. Wireless Communications, 2016
10.1109/TWC.2016.2515598
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The downlink of a massive MIMO system is considered for the case in which the base station must concurrently serve two categories of terminals: one group to which imperfect instantaneous channel state information (CSI) is available, and one group to which no CSI is available. Motivating applications include broadcasting of public channels and control information in wireless networks. A new technique is developed and analyzed: joint beamforming and broadcasting (JBB), by which the base station beamforms to the group of terminals to which CSI is available, and broadcasts to the other group of terminals, to which no CSI is available. The broadcast information does not interfere with the beamforming as it is placed in the nullspace of the channel matrix collectively seen by the terminals targeted by the beamforming. JBB is compared to orthogonal access (OA), by which the base station partitions the time-frequency resources into two disjunct parts, one for each group of terminals. It is shown that JBB can substantially outperform OA in terms of required total radiated power for given rate targets.
[ { "version": "v1", "created": "Thu, 11 Feb 2016 09:27:47 GMT" }, { "version": "v2", "created": "Mon, 14 Mar 2016 16:19:00 GMT" } ]
2016-03-15T00:00:00
[ [ "Larsson", "Erik G.", "" ], [ "Poor", "H. Vincent", "" ] ]
new_dataset
0.999039
1602.04211
Andr\'e Mantas
Andr\'e Mantas and Fernando M. V. Ramos
Consistent and fault-tolerant SDN with unmodified switches
2 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a reliable SDN environment, different controllers coordinate different switches and backup controllers can be set in place to tolerate faults. This approach increases the challenge to maintain a consistent network view. If this global view is not consistent with the actual network state, applications will operate on a stale state and potentially lead to incorrect behavior. Faced with this problem, we propose a fault-tolerant SDN controller that is able to maintain a consistent network view by using transactional semantics on both control and data plane state. Different from previous proposals, our solution does not require changes to OpenFlow or to switches, increasing the chances of quicker adoption.
[ { "version": "v1", "created": "Fri, 12 Feb 2016 10:56:56 GMT" }, { "version": "v2", "created": "Sun, 13 Mar 2016 17:14:50 GMT" } ]
2016-03-15T00:00:00
[ [ "Mantas", "André", "" ], [ "Ramos", "Fernando M. V.", "" ] ]
new_dataset
0.998815
1602.06924
Regivaldo Costa
Regivaldo Costa and Fernando M. V. Ramos
An SDN-based approach to enhance BGP security
null
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/4.0/
BGP is vulnerable to a series of attacks. Many solutions have been proposed in the past two decades, but the most effective remain largely undeployed. This is due to three fundamental reasons: the solutions are too computationally expensive for current routers, they require changes to BGP, and/or they do not give the right incentives to promote deployment. In this abstract we propose a Software-Defined Networking (SDN) architecture to secure BGP routing. Our solution, BGPSecX, targets an IXP and it includes techniques to allow different IXPs to collaborate. With SDN we remove the computational burden from routers and do not make changes to BGP. Targeting IXPs and promoting inter-IXP collaboration enables the creation of incentives to foster adoption of BGP security services.
[ { "version": "v1", "created": "Sun, 7 Feb 2016 20:34:21 GMT" }, { "version": "v2", "created": "Sat, 12 Mar 2016 19:57:18 GMT" } ]
2016-03-15T00:00:00
[ [ "Costa", "Regivaldo", "" ], [ "Ramos", "Fernando M. V.", "" ] ]
new_dataset
0.965204
1603.02504
Saeed Akhoondian Amiri
Saeed Akhoondian Amiri, Ken-Ichi Kawarabayashi, Stephan Kreutzer, Paul Wollan
The Erdos-Posa Property for Directed Graphs
null
null
null
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A classical result by Erdos and Posa states that there is a function $f: {\mathbb N} \rightarrow {\mathbb N}$ such that for every $k$, every graph $G$ contains $k$ pairwise vertex disjoint cycles or a set $T$ of at most $f(k)$ vertices such that $G-T$ is acyclic. The generalisation of this result to directed graphs is known as Younger's conjecture and was proved by Reed, Robertson, Seymour and Thomas in 1996. This so-called Erdos-Posa-property can naturally be generalised to arbitrary graphs and digraphs. Robertson and Seymour proved that a graph $H$ has the Erdos-Posa-property if, and only if, $H$ is planar. In this paper we study the corresponding problem for digraphs. We obtain a complete characterisation of the class of strongly connected digraphs which have the Erdos-Posa-property (both for topological and butterfly minors). We also generalise this result to classes of digraphs which are not strongly connected. In particular, we study the class of vertex-cyclic digraphs (digraphs without trivial strong components). For this natural class of digraphs we obtain a nearly complete characterisation of the digraphs within this class with the Erdos-Posa-property. In particular we give positive and algorithmic examples of digraphs with the Erdos-Posa-property by using directed tree decompositions in a novel way.
[ { "version": "v1", "created": "Tue, 8 Mar 2016 12:48:38 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2016 13:23:10 GMT" }, { "version": "v3", "created": "Mon, 14 Mar 2016 09:04:42 GMT" } ]
2016-03-15T00:00:00
[ [ "Amiri", "Saeed Akhoondian", "" ], [ "Kawarabayashi", "Ken-Ichi", "" ], [ "Kreutzer", "Stephan", "" ], [ "Wollan", "Paul", "" ] ]
new_dataset
0.984482
1603.03185
Ouais Alsharif
Ian McGraw, Rohit Prabhavalkar, Raziel Alvarez, Montse Gonzalez Arenas, Kanishka Rao, David Rybach, Ouais Alsharif, Hasim Sak, Alexander Gruenstein, Francoise Beaufays, Carolina Parada
Personalized Speech recognition on mobile devices
null
null
null
null
cs.CL cs.LG cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a large vocabulary speech recognition system that is accurate, has low latency, and yet has a small enough memory and computational footprint to run faster than real-time on a Nexus 5 Android smartphone. We employ a quantized Long Short-Term Memory (LSTM) acoustic model trained with connectionist temporal classification (CTC) to directly predict phoneme targets, and further reduce its memory footprint using an SVD-based compression scheme. Additionally, we minimize our memory footprint by using a single language model for both dictation and voice command domains, constructed using Bayesian interpolation. Finally, in order to properly handle device-specific information, such as proper names and other context-dependent information, we inject vocabulary items into the decoder graph and bias the language model on-the-fly. Our system achieves 13.5% word error rate on an open-ended dictation task, running with a median speed that is seven times faster than real-time.
[ { "version": "v1", "created": "Thu, 10 Mar 2016 08:51:51 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2016 22:25:39 GMT" } ]
2016-03-15T00:00:00
[ [ "McGraw", "Ian", "" ], [ "Prabhavalkar", "Rohit", "" ], [ "Alvarez", "Raziel", "" ], [ "Arenas", "Montse Gonzalez", "" ], [ "Rao", "Kanishka", "" ], [ "Rybach", "David", "" ], [ "Alsharif", "Ouais", "" ], [ "Sak", "Hasim", "" ], [ "Gruenstein", "Alexander", "" ], [ "Beaufays", "Francoise", "" ], [ "Parada", "Carolina", "" ] ]
new_dataset
0.950866
1603.03856
Mo'taz Al-Hami
Kristiyan Georgiev, Motaz Al-Hami, Rolf Lakaemper
Real-time 3D scene description using Spheres, Cones and Cylinders
8 Pages, 16th International Conference on Advanced Robotics (ICAR 2013). Montevideo, Uruguay, November 2013
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper describes a novel real-time algorithm for finding 3D geometric primitives (cylinders, cones and spheres) from 3D range data. In its core, it performs a fast model fitting with a model update in constant time (O(1)) for each new data point added to the model. We use a three stage approach.The first step inspects 1.5D sub spaces, to find ellipses. The next stage uses these ellipses as input by examining their neighborhood structure to form sets of candidates for the 3D geometric primitives. Finally, candidate ellipses are fitted to the geometric primitives. The complexity for point processing is O(n); additional time of lower order is needed for working on significantly smaller amount of mid-level objects. This allows the approach to process 30 frames per second on Kinect depth data, which suggests this approach as a pre-processing step for 3D real-time higher level tasks in robotics, like tracking or feature based mapping.
[ { "version": "v1", "created": "Sat, 12 Mar 2016 04:03:46 GMT" } ]
2016-03-15T00:00:00
[ [ "Georgiev", "Kristiyan", "" ], [ "Al-Hami", "Motaz", "" ], [ "Lakaemper", "Rolf", "" ] ]
new_dataset
0.958028
1603.03921
Huseyin Birkan Yilmaz
Bon-Hong Koo, Changmin Lee, H. Birkan Yilmaz, Nariman Farsad, Andrew Eckford, Chan-Byoung Chae
Molecular MIMO: From Theory to Prototype
null
IEEE Journal on Selected Areas in Communications, vol. 34, no. 3, pp. 600-614, March 2016
10.1109/JSAC.2016.2525538
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In diffusion-based molecular communication, information transport is governed by diffusion through a fluid medium. The achievable data rates for these channels are very low compared to the radio-based communication system, since diffusion can be a slow process. To improve the data rate, a novel multiple-input multiple-output (MIMO) design for molecular communication is proposed that utilizes multiple molecular emitters at the transmitter and multiple molecular detectors at the receiver (in RF communication these all correspond to antennas). Using particle-based simulators, the channel's impulse response is obtained and mathematically modeled. These models are then used to determine inter-link interference (ILI) and inter-symbol interference (ISI). It is assumed that when the receiver has incomplete information regarding the system and the channel state, low complexity symbol detection methods are preferred since the receiver is small and simple. Thus four detection algorithms are proposed---adaptive thresholding, practical zero forcing with channel models excluding/including the ILI and ISI, and Genie-aided zero forcing. The proposed algorithms are evaluated extensively using numerical and analytical evaluations.
[ { "version": "v1", "created": "Sat, 12 Mar 2016 14:36:30 GMT" } ]
2016-03-15T00:00:00
[ [ "Koo", "Bon-Hong", "" ], [ "Lee", "Changmin", "" ], [ "Yilmaz", "H. Birkan", "" ], [ "Farsad", "Nariman", "" ], [ "Eckford", "Andrew", "" ], [ "Chae", "Chan-Byoung", "" ] ]
new_dataset
0.999441
1603.04000
Shumeet Baluja
Shumeet Baluja
Learning Typographic Style
null
null
null
null
cs.CV cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Typography is a ubiquitous art form that affects our understanding, perception, and trust in what we read. Thousands of different font-faces have been created with enormous variations in the characters. In this paper, we learn the style of a font by analyzing a small subset of only four letters. From these four letters, we learn two tasks. The first is a discrimination task: given the four letters and a new candidate letter, does the new letter belong to the same font? Second, given the four basis letters, can we generate all of the other letters with the same characteristics as those in the basis set? We use deep neural networks to address both tasks, quantitatively and qualitatively measure the results in a variety of novel manners, and present a thorough investigation of the weaknesses and strengths of the approach.
[ { "version": "v1", "created": "Sun, 13 Mar 2016 05:44:57 GMT" } ]
2016-03-15T00:00:00
[ [ "Baluja", "Shumeet", "" ] ]
new_dataset
0.991611
1603.04012
Jacopo Staiano
Marco De Nadai, Jacopo Staiano, Roberto Larcher, Nicu Sebe, Daniele Quercia, Bruno Lepri
The Death and Life of Great Italian Cities: A Mobile Phone Data Perspective
In Proceedings of the 26th International ACM Conference on World Wide Web (WWW), 2016
null
10.1145/2872427.2883084
null
cs.CY cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Death and Life of Great American Cities was written in 1961 and is now one of the most influential book in city planning. In it, Jane Jacobs proposed four conditions that promote life in a city. However, these conditions have not been empirically tested until recently. This is mainly because it is hard to collect data about "city life". The city of Seoul recently collected pedestrian activity through surveys at an unprecedented scale, with an effort spanning more than a decade, allowing researchers to conduct the first study successfully testing Jacobs's conditions. In this paper, we identify a valuable alternative to the lengthy and costly collection of activity survey data: mobile phone data. We extract human activity from such data, collect land use and socio-demographic information from the Italian Census and Open Street Map, and test the four conditions in six Italian cities. Although these cities are very different from the places for which Jacobs's conditions were spelled out (i.e., great American cities) and from the places in which they were recently tested (i.e., the Asian city of Seoul), we find those conditions to be indeed associated with urban life in Italy as well. Our methodology promises to have a great impact on urban studies, not least because, if replicated, it will make it possible to test Jacobs's theories at scale.
[ { "version": "v1", "created": "Sun, 13 Mar 2016 09:32:00 GMT" } ]
2016-03-15T00:00:00
[ [ "De Nadai", "Marco", "" ], [ "Staiano", "Jacopo", "" ], [ "Larcher", "Roberto", "" ], [ "Sebe", "Nicu", "" ], [ "Quercia", "Daniele", "" ], [ "Lepri", "Bruno", "" ] ]
new_dataset
0.999027
1603.04031
Dmitry Namiot
Dmitry Namiot, Manfred Sneps-Sneppe
On Physical Web Browser
for FRUCT conference. arXiv admin note: text overlap with arXiv:1506.02263
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the Physical Web Browser project for web applications depending on the environment. At this moment, many of users all over the world visit websites using their mobile devices only. Any mobile device (e.g., smartphone) has sensors to capture the environmental information. This information (context) could be analyzed and used within the web applications. There are, at least, two models for using this information. Firstly, we can use context information for data gathering requests in a web application. In this case, the output depends on the context. It is the classical model for context-aware data retrieval. In the second model, we can use context-aware data for improving user experience (for changing and tuning user interfaces). In other words, we present a way for the adaptation of web applications depending on the environment.
[ { "version": "v1", "created": "Sun, 13 Mar 2016 14:29:53 GMT" } ]
2016-03-15T00:00:00
[ [ "Namiot", "Dmitry", "" ], [ "Sneps-Sneppe", "Manfred", "" ] ]
new_dataset
0.995786
1603.04055
Sukhamoy Pattanayak
Sukhamoy Pattanayak, Abhay Kumar Singh
Construction of cyclic DNA codes over the Ring $\Z_4[u]/\langle u^2-1 \rangle $ Based on the deletion distance
15 pages, 3 tables. arXiv admin note: substantial text overlap with arXiv:1508.02015, arXiv:1511.03937
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we develop the theory for constructing DNA cyclic codes of odd length over $R=\Z_4[u]/\langle u^2-1 \rangle$ based on the deletion distance. Firstly, we relate DNA pairs with a special 16 elements of ring $R$. Cyclic codes of odd length over $R$ satisfy the reverse constraint and the reverse-complement constraint are discussed in this paper. We also study the $GC$-content of these codes and their deletion distance. The paper concludes with some examples of cyclic DNA codes with $GC$-content and their respective deletion distance.
[ { "version": "v1", "created": "Sun, 13 Mar 2016 18:00:34 GMT" } ]
2016-03-15T00:00:00
[ [ "Pattanayak", "Sukhamoy", "" ], [ "Singh", "Abhay Kumar", "" ] ]
new_dataset
0.997802
1603.04234
Arnaud Labourel
Julian Anaya (DII), J\'er\'emie Chalopin (LIF), Jurek Czyzowicz (DII), Arnaud Labourel (LBI2M), Andrzej Pelc (DII), Yann Vax\`es (LIF)
Convergecast and Broadcast by Power-Aware Mobile Agents
null
null
10.1007/s00453-014-9939-8
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A set of identical, mobile agents is deployed in a weighted network. Each agent has a battery -- a power source allowing it to move along network edges. An agent uses its battery proportionally to the distance traveled. We consider two tasks : convergecast, in which at the beginning, each agent has some initial piece of information, and information of all agents has to be collected by some agent; and broadcast in which information of one specified agent has to be made available to all other agents. In both tasks, the agents exchange the currently possessed information when they meet. The objective of this paper is to investigate what is the minimal value of power, initially available to all agents, so that convergecast or broadcast can be achieved. We study this question in the centralized and the distributed settings. In the centralized setting, there is a central monitor that schedules the moves of all agents. In the distributed setting every agent has to perform an algorithm being unaware of the network. In the centralized setting, we give a linear-time algorithm to compute the optimal battery power and the strategy using it, both for convergecast and for broadcast, when agents are on the line. We also show that finding the optimal battery power for convergecast or for broadcast is NP-hard for the class of trees. On the other hand, we give a polynomial algorithm that finds a 2-approximation for convergecast and a 4-approximation for broadcast, for arbitrary graphs. In the distributed setting, we give a 2-competitive algorithm for convergecast in trees and a 4-competitive algorithm for broadcast in trees. The competitive ratio of 2 is proved to be the best for the problem of convergecast, even if we only consider line networks. Indeed, we show that there is no (2 -- $\epsilon$)-competitive algorithm for convergecast or for broadcast in the class of lines, for any $\epsilon$ \textgreater{} 0.
[ { "version": "v1", "created": "Mon, 14 Mar 2016 12:23:10 GMT" } ]
2016-03-15T00:00:00
[ [ "Anaya", "Julian", "", "DII" ], [ "Chalopin", "Jérémie", "", "LIF" ], [ "Czyzowicz", "Jurek", "", "DII" ], [ "Labourel", "Arnaud", "", "LBI2M" ], [ "Pelc", "Andrzej", "", "DII" ], [ "Vaxès", "Yann", "", "LIF" ] ]
new_dataset
0.989443
1603.04387
Hyeontaek Lim
Hyeontaek Lim, Vyas Sekar, Yoshihisa Abe, David G. Andersen
NetMemex: Providing Full-Fidelity Traffic Archival
A reformatted version of the ACM SIGCOMM 2013 submission
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
NetMemex explores efficient network traffic archival without any loss of information. Unlike NetFlow-like aggregation, NetMemex allows retrieving the entire packet data including full payload, which makes it useful in forensic analysis, networked and distributed system research, and network administration. Different from packet trace dumps, NetMemex performs sophisticated data compression for small storage space use and optimizes the data layout for fast query processing. NetMemex takes advantage of high-speed random access of flash drives and inexpensive storage space of hard disk drives. These efforts lead to a cost-effective yet high-performance full traffic archival system. We demonstrate that NetMemex can record full-fidelity traffic at near-Gbps rates using a single commodity machine, handling common queries at up to 90.1 K queries/second, at a low storage cost comparable to conventional hard disk-only traffic archival solutions.
[ { "version": "v1", "created": "Mon, 14 Mar 2016 18:49:53 GMT" } ]
2016-03-15T00:00:00
[ [ "Lim", "Hyeontaek", "" ], [ "Sekar", "Vyas", "" ], [ "Abe", "Yoshihisa", "" ], [ "Andersen", "David G.", "" ] ]
new_dataset
0.994616
1503.06854
Emil Bj\"ornson
Emil Bj\"ornson, Erik G. Larsson, Thomas L. Marzetta
Massive MIMO: Ten Myths and One Critical Question
To appear in IEEE Communications Magazine, 10 pages, 6 figures
IEEE Communications Magazine, vol. 54, no. 2, pp. 114-123, February 2016
10.1109/MCOM.2016.7402270
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless communications is one of the most successful technologies in modern years, given that an exponential growth rate in wireless traffic has been sustained for over a century (known as Cooper's law). This trend will certainly continue driven by new innovative applications; for example, augmented reality and internet-of-things. Massive MIMO (multiple-input multiple-output) has been identified as a key technology to handle orders of magnitude more data traffic. Despite the attention it is receiving from the communication community, we have personally witnessed that Massive MIMO is subject to several widespread misunderstandings, as epitomized by following (fictional) abstract: "The Massive MIMO technology uses a nearly infinite number of high-quality antennas at the base stations. By having at least an order of magnitude more antennas than active terminals, one can exploit asymptotic behaviors that some special kinds of wireless channels have. This technology looks great at first sight, but unfortunately the signal processing complexity is off the charts and the antenna arrays would be so huge that it can only be implemented in millimeter wave bands." The statements above are, in fact, completely false. In this overview article, we identify ten myths and explain why they are not true. We also ask a question that is critical for the practical adoption of the technology and which will require intense future research activities to answer properly. We provide references to key technical papers that support our claims, while a further list of related overview and technical papers can be found at the Massive MIMO Info Point: http://massivemimo.eu
[ { "version": "v1", "created": "Mon, 23 Mar 2015 21:57:46 GMT" }, { "version": "v2", "created": "Tue, 18 Aug 2015 20:11:12 GMT" } ]
2016-03-14T00:00:00
[ [ "Björnson", "Emil", "" ], [ "Larsson", "Erik G.", "" ], [ "Marzetta", "Thomas L.", "" ] ]
new_dataset
0.999575
1507.04094
Changsheng You
Changsheng You, Kaibin Huang and Hyukjin Chae
Energy Efficient Mobile Cloud Computing Powered by Wireless Energy Transfer (extended version)
double column
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Achieving long battery lives or even self sustainability has been a long standing challenge for designing mobile devices. This paper presents a novel solution that seamlessly integrates two technologies, mobile cloud computing and microwave power transfer (MPT), to enable computation in passive low-complexity devices such as sensors and wearable computing devices. Specifically, considering a single-user system, a base station (BS) either transfers power to or offloads computation from a mobile to the cloud; the mobile uses harvested energy to compute given data either locally or by offloading. A framework for energy efficient computing is proposed that comprises a set of policies for controlling CPU cycles for the mode of local computing, time division between MPT and offloading for the other mode of offloading, and mode selection. Given the CPU-cycle statistics information and channel state information (CSI), the policies aim at maximizing the probability of successfully computing given data, called computing probability, under the energy harvesting and deadline constraints. The policy optimization is translated into the equivalent problems of minimizing the mobile energy consumption for local computing and maximizing the mobile energy savings for offloading which are solved using convex optimization theory. The structures of the resultant policies are characterized in closed form. Furthermore, given non-causal CSI, the said analytical framework is further developed to support computation load allocation over multiple channel realizations, which further increases computing probability. Last, simulation demonstrates the feasibility of wirelessly powered mobile cloud computing and the gain of its optimal control.
[ { "version": "v1", "created": "Wed, 15 Jul 2015 06:15:27 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2016 08:23:04 GMT" } ]
2016-03-14T00:00:00
[ [ "You", "Changsheng", "" ], [ "Huang", "Kaibin", "" ], [ "Chae", "Hyukjin", "" ] ]
new_dataset
0.984381
1509.03604
Kathryn Huff
Kathryn D. Huff, Matthew J. Gidden, Robert W. Carlsen, Robert R. Flanagan, Meghan B. McGarry, Arrielle C. Opotowsky, Erich A. Schneider, Anthony M. Scopatz, Paul P.H. Wilson
Fundamental concepts in the Cyclus nuclear fuel cycle simulation framework
null
Advances in Engineering Software, Volume 94, April 2016, Pages 46-59
10.1016/j.advengsoft.2016.01.014
null
cs.SE cs.CE cs.MA cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As nuclear power expands, technical, economic, political, and environmental analyses of nuclear fuel cycles by simulators increase in importance. To date, however, current tools are often fleet-based rather than discrete and restrictively licensed rather than open source. Each of these choices presents a challenge to modeling fidelity, generality, efficiency, robustness, and scientific transparency. The Cyclus nuclear fuel cycle simulator framework and its modeling ecosystem incorporate modern insights from simulation science and software architecture to solve these problems so that challenges in nuclear fuel cycle analysis can be better addressed. A summary of the Cyclus fuel cycle simulator framework and its modeling ecosystem are presented. Additionally, the implementation of each is discussed in the context of motivating challenges in nuclear fuel cycle simulation. Finally, the current capabilities of Cyclus are demonstrated for both open and closed fuel cycles.
[ { "version": "v1", "created": "Fri, 11 Sep 2015 18:39:59 GMT" }, { "version": "v2", "created": "Fri, 11 Mar 2016 16:05:10 GMT" } ]
2016-03-14T00:00:00
[ [ "Huff", "Kathryn D.", "" ], [ "Gidden", "Matthew J.", "" ], [ "Carlsen", "Robert W.", "" ], [ "Flanagan", "Robert R.", "" ], [ "McGarry", "Meghan B.", "" ], [ "Opotowsky", "Arrielle C.", "" ], [ "Schneider", "Erich A.", "" ], [ "Scopatz", "Anthony M.", "" ], [ "Wilson", "Paul P. H.", "" ] ]
new_dataset
0.996633
1603.03482
Nathan Egge
Nathan E. Egge and Jean-Marc Valin
Predicting Chroma from Luma with Frequency Domain Intra Prediction
10 pages, 7 figures
Proceedings of SPIE 9410, Visual Information Processing and Communication VI, 941009 (March 4, 2015)
10.1117/12.2080837
null
cs.MM cs.GR
http://creativecommons.org/licenses/by/4.0/
This paper describes a technique for performing intra prediction of the chroma planes based on the reconstructed luma plane in the frequency domain. This prediction exploits the fact that while RGB to YUV color conversion has the property that it decorrelates the color planes globally across an image, there is still some correlation locally at the block level. Previous proposals compute a linear model of the spatial relationship between the luma plane (Y) and the two chroma planes (U and V). In codecs that use lapped transforms this is not possible since transform support extends across the block boundaries and thus neighboring blocks are unavailable during intra-prediction. We design a frequency domain intra predictor for chroma that exploits the same local correlation with lower complexity than the spatial predictor and which works with lapped transforms. We then describe a low-complexity algorithm that directly uses luma coefficients as a chroma predictor based on gain-shape quantization and band partitioning. An experiment is performed that compares these two techniques inside the experimental Daala video codec and shows the lower complexity algorithm to be a better chroma predictor.
[ { "version": "v1", "created": "Thu, 10 Mar 2016 22:55:36 GMT" } ]
2016-03-14T00:00:00
[ [ "Egge", "Nathan E.", "" ], [ "Valin", "Jean-Marc", "" ] ]
new_dataset
0.967055
1603.03495
Pengfei Lu
Pengfei Lu, Zhenqiang Wu
Continuous Molecular Communication in one dimensional situation
4pages, 6figures, this paper is acccepted by ISEEE 2016
null
null
null
cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Molecular Communication as the most potential methods to solve the communication in nano scale, for it's derived from nature, and it becomes more and more prevalent. Though molecular communication happens in three dimensional situation, there are also some situation that are in the one dimensional situation, especially when considering the transmitters and the receivers are in extremely short distance or in long slim pipe. In this paper, we introduce the one dimensional situation, and studied how the continuous information molecules transmitted in this situation, also introduced how to encode and decode the information molecules, and based on the molecular communication model, we studied some metrics of it, such as the distance between transmitter and receiver, the emitting frequency of transmitter. Through the research we know that the distance and frequency are important metrics to the successful communication, which can direct us how to place the nano transmitters and receivers in the future nano network environment.
[ { "version": "v1", "created": "Fri, 11 Mar 2016 00:40:01 GMT" } ]
2016-03-14T00:00:00
[ [ "Lu", "Pengfei", "" ], [ "Wu", "Zhenqiang", "" ] ]
new_dataset
0.967462
1603.03520
Odessa Consorte
Odessa D. Consorte, Lilibeth D. Valdez
On Euclidean and Hermitian Self-Dual Cyclic Codes over $\mathbb{F}_{2^r}$
null
null
null
null
cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyclic and self-dual codes are important classes of codes in coding theory. Jia, Ling and Xing \cite{Jia} as well as Kai and Zhu \cite{Kai} proved that Euclidean self-dual cyclic codes of length $n$ over $\mathbb{F}_q$ exist if and only if $n$ is even and $q=2^r$, where $r$ is any positive integer. For $n$ and $q$ even, there always exists an $[n, \frac{n}{2}]$ self-dual cyclic code with generator polynomial $x^{\frac{n}{2}}+1$ called the \textit{trivial self-dual cyclic code}. In this paper we prove the existence of nontrivial self-dual cyclic codes of length $n=2^\nu \cdot \bar{n}$, where $\bar{n}$ is odd, over $\mathbb{F}_{2^r}$ in terms of the existence of a nontrivial splitting $(Z, X_0, X_1)$ of $\mathbb{Z}_{\bar{n}}$ by $\mu_{-1}$, where $Z, X_0,X_1$ are unions of $2^r$-cyclotomic cosets mod $\bar{n}.$ We also express the formula for the number of cyclic self-dual codes over $\mathbb{F}_{2^r}$ for each $n$ and $r$ in terms of the number of $2^r$-cyclotomic cosets in $X_0$ (or in $X_1$). We also look at Hermitian self-dual cyclic codes and show properties which are analogous to those of Euclidean self-dual cyclic codes. That is, the existence of nontrivial Hermitian self-dual codes over $\mathbb{F}_{2^{2 \ell}}$ based on the existence of a nontrivial splitting $(Z, X_0, X_1)$ of $\mathbb{Z}_{\bar{n}}$ by $\mu_{-2^\ell}$, where $Z, X_0,X_1$ are unions of $2^{2 \ell}$-cyclotomic cosets mod $\bar{n}.$ We also determine the lengths at which nontrivial Hermitian self-dual cyclic codes exist and the formula for the number of Hermitian self-dual cyclic codes for each $n$.
[ { "version": "v1", "created": "Fri, 11 Mar 2016 05:04:14 GMT" } ]
2016-03-14T00:00:00
[ [ "Consorte", "Odessa D.", "" ], [ "Valdez", "Lilibeth D.", "" ] ]
new_dataset
0.999073
1603.03536
Mohammad Abdollahi Azgomi
Elaheh Ghassabani and Mohammad Abdollahi Azgomi
DSCMC: Distributed Stateless Code Model Checker
null
Trustworthy Computing Laboratory, School of Computer Engineering, Iran University of Science and Technology, Tehran, Iran, 2014
null
Technical Report No. TWcL-TR-1403
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stateless code model checking is an effective verification technique, which is more applicable than stateful model checking to the software world. Existing stateless model checkers support the verification of neither LTL formulae nor the information flow security properties. This paper proposes a distributed stateless code model checker (DSCMC) designed based on the Actor model, and has the capability of verifying code written in different programming languages. This tool is implemented using Erlang, which is an actor-based programming language. DSCMC is able to detect deadlocks, livelocks, and data races automatically. In addition, the tool can verify information flow security and the properties specified in LTL. Thanks to its actor-based architecture, DSCMC provides a wide range of capabilities. The parallel architecture of the tool exploiting the rich concurrency model of Erlang is suited to the time-intensive process of stateless code model checking.
[ { "version": "v1", "created": "Fri, 11 Mar 2016 06:49:43 GMT" } ]
2016-03-14T00:00:00
[ [ "Ghassabani", "Elaheh", "" ], [ "Azgomi", "Mohammad Abdollahi", "" ] ]
new_dataset
0.995777
1603.03541
Chenxia Wu
Chenxia Wu, Jiemi Zhang, Ozan Sener, Bart Selman, Silvio Savarese, Ashutosh Saxena
Watch-n-Patch: Unsupervised Learning of Actions and Relations
arXiv admin note: text overlap with arXiv:1512.04208
null
null
null
cs.CV cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is a large variation in the activities that humans perform in their everyday lives. We consider modeling these composite human activities which comprises multiple basic level actions in a completely unsupervised setting. Our model learns high-level co-occurrence and temporal relations between the actions. We consider the video as a sequence of short-term action clips, which contains human-words and object-words. An activity is about a set of action-topics and object-topics indicating which actions are present and which objects are interacting with. We then propose a new probabilistic model relating the words and the topics. It allows us to model long-range action relations that commonly exist in the composite activities, which is challenging in previous works. We apply our model to the unsupervised action segmentation and clustering, and to a novel application that detects forgotten actions, which we call action patching. For evaluation, we contribute a new challenging RGB-D activity video dataset recorded by the new Kinect v2, which contains several human daily activities as compositions of multiple actions interacting with different objects. Moreover, we develop a robotic system that watches people and reminds people by applying our action patching algorithm. Our robotic setup can be easily deployed on any assistive robot.
[ { "version": "v1", "created": "Fri, 11 Mar 2016 07:13:59 GMT" } ]
2016-03-14T00:00:00
[ [ "Wu", "Chenxia", "" ], [ "Zhang", "Jiemi", "" ], [ "Sener", "Ozan", "" ], [ "Selman", "Bart", "" ], [ "Savarese", "Silvio", "" ], [ "Saxena", "Ashutosh", "" ] ]
new_dataset
0.998999
1603.03725
Navid Tadayon
Navid Tadayon and Sonia Aissa
A Multi-Channel Spectrum Sensing Fusion Mechanism for Cognitive Radio Networks: Design and Application to IEEE 802.22 WRANs
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The IEEE 802.22 is a new cognitive radio standard that is aimed at extending wireless outreach to rural areas. Known as wireless regional area networks, and designed based on the not-to-interfere spectrum sharing model, WRANs are channelized and centrally-controlled networks working on the under-utilized UHF/VHF TV bands to establish communication with remote users, so-called customer premises equipment (CPEs). Despite the importance of reliable and interference-free operation in these frequencies, spectrum sensing fusion mechanisms suggested in IEEE 802.22 are rudimentary and fail to satisfy the stringent mandated sensing requirements. Other deep-rooted shortcomings are performance non-uniformity over different signal-to-noise-ratio regimes, unbalanced performance, instability and lack of flexibility. Inspired by these observations, in this paper we propose a distributed spectrum sensing technique for WRANs, named multi-channel learning-based distributed sensing fusion mechanism (MC-LDS). MC-LDS is demonstrated to be self-trained, stable and to compensate for fault reports through its inherent reward-penalty approach. Moreover, MC-LDS exhibits a better uniform performance in all traffic regimes, is fair (reduces the false-alarm/misdetection gap), adjustable (works with several degrees of freedom) and bandwidth efficient (opens transmission opportunities for more CPEs). Simulation results and comparisons unanimously corroborate that MC-LDS outperforms IEEE 802.22 recommended algorithms, i.e., the AND, OR and VOTING rules.
[ { "version": "v1", "created": "Fri, 11 Mar 2016 19:09:56 GMT" } ]
2016-03-14T00:00:00
[ [ "Tadayon", "Navid", "" ], [ "Aissa", "Sonia", "" ] ]
new_dataset
0.981124
1603.03729
Vasile Patrascu
Vasile Patrascu
Penta and Hexa Valued Representation of Neutrosophic Information
null
null
10.13140/RG.2.1.2667.1762
IT.1.3.2016
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Starting from the primary representation of neutrosophic information, namely the degree of truth, degree of indeterminacy and degree of falsity, we define a nuanced representation in a penta valued fuzzy space, described by the index of truth, index of falsity, index of ignorance, index of contradiction and index of hesitation. Also, it was constructed an associated penta valued logic and then using this logic, it was defined for the proposed penta valued structure the following operators: union, intersection, negation, complement and dual. Then, the penta valued representation is extended to a hexa valued one, adding the sixth component, namely the index of ambiguity.
[ { "version": "v1", "created": "Thu, 10 Mar 2016 04:18:38 GMT" } ]
2016-03-14T00:00:00
[ [ "Patrascu", "Vasile", "" ] ]
new_dataset
0.989425
1411.0735
Himanshu Tyagi
Masahito Hayashi and Himanshu Tyagi and Shun Watanabe
Secret Key Agreement: General Capacity and Second-Order Asymptotics
null
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revisit the problem of secret key agreement using interactive public communication for two parties and propose a new secret key agreement protocol. The protocol attains the secret key capacity for general observations and attains the second-order asymptotic term in the maximum length of a secret key for independent and identically distributed observations. In contrast to the previously suggested secret key agreement protocols, the proposed protocol uses interactive communication. In fact, the standard one-way communication protocol used prior to this work fails to attain the asymptotic results above. Our converse proofs rely on a recently established upper bound for secret key lengths. Both our lower and upper bounds are derived in a single-shot setup and the asymptotic results are obtained as corollaries.
[ { "version": "v1", "created": "Mon, 3 Nov 2014 23:28:56 GMT" }, { "version": "v2", "created": "Tue, 28 Apr 2015 09:01:46 GMT" }, { "version": "v3", "created": "Thu, 10 Mar 2016 08:38:45 GMT" } ]
2016-03-11T00:00:00
[ [ "Hayashi", "Masahito", "" ], [ "Tyagi", "Himanshu", "" ], [ "Watanabe", "Shun", "" ] ]
new_dataset
0.965079
1603.03097
Yu Wang
Yu Wang, Yuncheng Li, Jiebo Luo
Deciphering the 2016 U.S. Presidential Campaign in the Twitter Sphere: A Comparison of the Trumpists and Clintonists
4 pages, to appear in the 10th International AAAI Conference on Web and Social Media
null
null
null
cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study follower demographics of Donald Trump and Hillary Clinton, the two leading candidates in the 2016 U.S. presidential race. We build a unique dataset US2016, which includes the number of followers for each candidate from September 17, 2015 to December 22, 2015. US2016 also includes the geographical location of these followers, the number of their own followers and, very importantly, the profile image of each follower. We use individuals' number of followers and profile images to analyze four dimensions of follower demographics: social status, gender, race and age. Our study shows that in terms of social influence, the Trumpists are more polarized than the Clintonists: they tend to have either a lot of influence or little influence. We also find that compared with the Clintonists, the Trumpists are more likely to be either very young or very old. Our study finds no gender affinity effect for Clinton in the Twitter sphere, but we do find that the Clintonists are more racially diverse.
[ { "version": "v1", "created": "Wed, 9 Mar 2016 23:36:26 GMT" } ]
2016-03-11T00:00:00
[ [ "Wang", "Yu", "" ], [ "Li", "Yuncheng", "" ], [ "Luo", "Jiebo", "" ] ]
new_dataset
0.999118
1603.03129
Jean-Marc Valin
Thomas J. Daede, Nathan E. Egge, Jean-Marc Valin, Guillaume Martres, Timothy B. Terriberry
Daala: A Perceptually-Driven Next Generation Video Codec
10 pages
null
null
null
cs.MM
http://creativecommons.org/licenses/by/4.0/
The Daala project is a royalty-free video codec that attempts to compete with the best patent-encumbered codecs. Part of our strategy is to replace core tools of traditional video codecs with alternative approaches, many of them designed to take perceptual aspects into account, rather than optimizing for simple metrics like PSNR. This paper documents some of our experiences with these tools, which ones worked and which did not, and what we've learned from them. The result is a codec which compares favorably with HEVC on still images, and is on a path to do so for video as well.
[ { "version": "v1", "created": "Thu, 10 Mar 2016 02:40:05 GMT" } ]
2016-03-11T00:00:00
[ [ "Daede", "Thomas J.", "" ], [ "Egge", "Nathan E.", "" ], [ "Valin", "Jean-Marc", "" ], [ "Martres", "Guillaume", "" ], [ "Terriberry", "Timothy B.", "" ] ]
new_dataset
0.99834
1603.03152
B.Sundar Rajan
Anjana A. Mahesh and B. Sundar Rajan
Noisy Index Coding with PSK and QAM
A longer version of both our earlier arXiv submissions: arXiv:1509.05874 [cs.IT] and arXiv:1510.08803 [cs.IT] along with some additional results
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Noisy index coding problems over AWGN channel are considered. For a given index coding problem and a chosen scalar linear index code of length $N$, we propose to transmit the $N$ index coded bits as a single signal from a $2^N$- PSK constellation. By transmitting the index coded bits in this way, there is an $N/2$ - fold reduction in the bandwidth consumed. Also, receivers with side information satisfying certain conditions get coding gain relative to a receiver with no side information. This coding gain is due to proper utilization of their side information and hence is called "PSK side information coding gain (PSK-SICG)". A necessary and sufficient condition for a receiver to get PSK-SICG is presented. An algorithm to map the index coded bits to PSK signal set such that the PSK-SICG obtained is maximized for the receiver with maximum side information is given. We go on to show that instead of transmitting the $N$ index coded bits as a signal from $2^N$- PSK, we can as well transmit them as a signal from $2^N$- QAM and all the results including the necessary and sufficient condition to get coding gain holds. We prove that sending the index coded bits as a QAM signal is better than sending them as a PSK signal when the receivers see an effective signal set of eight points or more.
[ { "version": "v1", "created": "Thu, 10 Mar 2016 05:26:19 GMT" } ]
2016-03-11T00:00:00
[ [ "Mahesh", "Anjana A.", "" ], [ "Rajan", "B. Sundar", "" ] ]
new_dataset
0.995755
1603.03181
Nabil Hossain
Nabil Hossain, Tianran Hu, Roghayeh Feizi, Ann Marie White, Jiebo Luo and Henry Kautz
Inferring Fine-grained Details on User Activities and Home Location from Social Media: Detecting Drinking-While-Tweeting Patterns in Communities
12 pages, 7 figures, 4-page poster version accepted at ICWSM 2016, alcohol dataset and keywords available in: cs.rochester.edu/u/nhossain/icwsm-16-data.zip
null
null
null
cs.AI cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nearly all previous work on geo-locating latent states and activities from social media confounds general discussions about activities, self-reports of users participating in those activities at times in the past or future, and self-reports made at the immediate time and place the activity occurs. Activities, such as alcohol consumption, may occur at different places and types of places, and it is important not only to detect the local regions where these activities occur, but also to analyze the degree of participation in them by local residents. In this paper, we develop new machine learning based methods for fine-grained localization of activities and home locations from Twitter data. We apply these methods to discover and compare alcohol consumption patterns in a large urban area, New York City, and a more suburban and rural area, Monroe County. We find positive correlations between the rate of alcohol consumption reported among a community's Twitter users and the density of alcohol outlets, demonstrating that the degree of correlation varies significantly between urban and suburban areas. While our experiments are focused on alcohol use, our methods for locating homes and distinguishing temporally-specific self-reports are applicable to a broad range of behaviors and latent states.
[ { "version": "v1", "created": "Thu, 10 Mar 2016 08:32:34 GMT" } ]
2016-03-11T00:00:00
[ [ "Hossain", "Nabil", "" ], [ "Hu", "Tianran", "" ], [ "Feizi", "Roghayeh", "" ], [ "White", "Ann Marie", "" ], [ "Luo", "Jiebo", "" ], [ "Kautz", "Henry", "" ] ]
new_dataset
0.998131
1603.03357
Quentin Bodinier
Malek Naoues, Quentin Bodinier, Jacques Palicot
Cognitive Green Radio for Energy-Aware Communications
5 pages, URSI Scientific Days 2016
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 5G networks, the number of connected devices, data rate and data volume per area, as well as the variety of QoS requirements, will attain unprecedented scales. The achievement of these goals will rely on new technologies and disruptive changes in network architecture and node design. Energy efficiency is believed to play a key role in complementing the 5G technologies and optimizing their deployment, dynamic configuration and management [1]. Within the framework of green communications and networks, especially for next-generation green cellular radio access networks, the GREAT (Green Cognitive Radio for Energy-Aware wireless communication Technologies evolution) initiative, a CominLabs Excellence Center (Laboratoire d'Excellence) and Universit\'e Europ\'eenne de Bretagne (UEB)project, has mainly addressed the fundamental issues of energy efficiency from various perspectives and angles, leveraging on cognitive techniques, at networking level as well as at thephysical layer level.
[ { "version": "v1", "created": "Thu, 10 Mar 2016 18:07:40 GMT" } ]
2016-03-11T00:00:00
[ [ "Naoues", "Malek", "" ], [ "Bodinier", "Quentin", "" ], [ "Palicot", "Jacques", "" ] ]
new_dataset
0.976172
1506.07196
Itzhak Tamo
Itzhak Tamo and Alexander Barg and Alexey Frolov
Bounds on the Parameters of Locally Recoverable Codes
To appear in IEEE Transaction on Information Theory. A part of the results of this paper were presented at the 2014 IEEE International Symposium on Information Theory, July 2014, Honululu
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A locally recoverable code (LRC code) is a code over a finite alphabet such that every symbol in the encoding is a function of a small number of other symbols that form a recovering set. In this paper we derive new finite-length and asymptotic bounds on the parameters of LRC codes. For LRC codes with a single recovering set for every coordinate, we derive an asymptotic Gilbert-Varshamov type bound for LRC codes and find the maximum attainable relative distance of asymptotically good LRC codes. Similar results are established for LRC codes with two disjoint recovering sets for every coordinate. For the case of multiple recovering sets we derive a lower bound on the parameters using expander graph arguments. Finally, we also derive finite-length upper bounds on the rate and distance of LRC codes with multiple recovering sets.
[ { "version": "v1", "created": "Tue, 23 Jun 2015 20:42:27 GMT" }, { "version": "v2", "created": "Wed, 9 Mar 2016 20:31:36 GMT" } ]
2016-03-10T00:00:00
[ [ "Tamo", "Itzhak", "" ], [ "Barg", "Alexander", "" ], [ "Frolov", "Alexey", "" ] ]
new_dataset
0.962798
1511.02300
Shuran Song
Shuran Song, Jianxiong Xiao
Deep Sliding Shapes for Amodal 3D Object Detection in RGB-D Images
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We focus on the task of amodal 3D object detection in RGB-D images, which aims to produce a 3D bounding box of an object in metric form at its full extent. We introduce Deep Sliding Shapes, a 3D ConvNet formulation that takes a 3D volumetric scene from a RGB-D image as input and outputs 3D object bounding boxes. In our approach, we propose the first 3D Region Proposal Network (RPN) to learn objectness from geometric shapes and the first joint Object Recognition Network (ORN) to extract geometric features in 3D and color features in 2D. In particular, we handle objects of various sizes by training an amodal RPN at two different scales and an ORN to regress 3D bounding boxes. Experiments show that our algorithm outperforms the state-of-the-art by 13.8 in mAP and is 200x faster than the original Sliding Shapes. All source code and pre-trained models will be available at GitHub.
[ { "version": "v1", "created": "Sat, 7 Nov 2015 04:34:18 GMT" }, { "version": "v2", "created": "Wed, 9 Mar 2016 19:21:23 GMT" } ]
2016-03-10T00:00:00
[ [ "Song", "Shuran", "" ], [ "Xiao", "Jianxiong", "" ] ]
new_dataset
0.995755
1603.00930
Adam Summerville
Adam Summerville and Michael Mateas
Super Mario as a String: Platformer Level Generation Via LSTMs
null
null
null
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The procedural generation of video game levels has existed for at least 30 years, but only recently have machine learning approaches been used to generate levels without specifying the rules for generation. A number of these have looked at platformer levels as a sequence of characters and performed generation using Markov chains. In this paper we examine the use of Long Short-Term Memory recurrent neural networks (LSTMs) for the purpose of generating levels trained from a corpus of Super Mario Brothers levels. We analyze a number of different data representations and how the generated levels fit into the space of human authored Super Mario Brothers levels.
[ { "version": "v1", "created": "Wed, 2 Mar 2016 23:44:03 GMT" }, { "version": "v2", "created": "Tue, 8 Mar 2016 21:26:58 GMT" } ]
2016-03-10T00:00:00
[ [ "Summerville", "Adam", "" ], [ "Mateas", "Michael", "" ] ]
new_dataset
0.970969
1603.02701
Marco Mezzavilla Dr
Menglei Zhang, Marco Mezzavilla, Russell Ford, Sundeep Rangan, Shivendra Panwar, Evangelos Mellios, Di Kong, Andrew Nix, Michele Zorzi
Transport Layer Performance in 5G mmWave Cellular
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The millimeter wave (mmWave) bands are likely to play a significant role in next generation cellular systems due to the possibility of very high throughput thanks to the availability of massive bandwidth and high-dimensional antennas. Especially in Non-Line-of-Sight conditions, significant variations in the received RF power can occur as a result of the scattering from nearby building and terrain surfaces. Scattering objects come and go as the user moves through the local environment. At the higher end of the mmWave band, rough surface scatter generates cluster-based small-scale fading, where signal levels can vary by more than 20 dB over just a few wavelengths. This high level of channel variability may present significant challenges for congestion control. Using our recently developed end-to-end mmWave ns3-based framework, this paper presents the first performance evaluation of TCP congestion control in next-generation mmWave networks. Importantly, the framework can incorporate detailed models of the mmWave channel, beam- forming and tracking algorithms, and builds on statistical channel models derived from real measurements in New York City, as well as detailed ray traces.
[ { "version": "v1", "created": "Tue, 8 Mar 2016 21:08:23 GMT" } ]
2016-03-10T00:00:00
[ [ "Zhang", "Menglei", "" ], [ "Mezzavilla", "Marco", "" ], [ "Ford", "Russell", "" ], [ "Rangan", "Sundeep", "" ], [ "Panwar", "Shivendra", "" ], [ "Mellios", "Evangelos", "" ], [ "Kong", "Di", "" ], [ "Nix", "Andrew", "" ], [ "Zorzi", "Michele", "" ] ]
new_dataset
0.997114