id
stringlengths 9
10
| submitter
stringlengths 2
52
⌀ | authors
stringlengths 4
6.51k
| title
stringlengths 4
246
| comments
stringlengths 1
523
⌀ | journal-ref
stringlengths 4
345
⌀ | doi
stringlengths 11
120
⌀ | report-no
stringlengths 2
243
⌀ | categories
stringlengths 5
98
| license
stringclasses 9
values | abstract
stringlengths 33
3.33k
| versions
list | update_date
timestamp[s] | authors_parsed
list | prediction
stringclasses 1
value | probability
float64 0.95
1
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1603.02764
|
Qiaoni Han
|
Bo Yang, Jingwei Li, Qiaoni Han, Tian He, Cailian Chen, Xinping Guan
|
Distributed Control for Charging Multiple Electric Vehicles with
Overload Limitation
|
30 pages, 13 figures
| null |
10.1109/TPDS.2016.2533614
| null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Severe pollution induced by traditional fossil fuels arouses great attention
on the usage of plug-in electric vehicles (PEVs) and renewable energy. However,
large-scale penetration of PEVs combined with other kinds of appliances tends
to cause excessive or even disastrous burden on the power grid, especially
during peak hours. This paper focuses on the scheduling of PEVs charging
process among different charging stations and each station can be supplied by
both renewable energy generators and a distribution network. The distribution
network also powers some uncontrollable loads. In order to minimize the on-grid
energy cost with local renewable energy and non-ideal storage while avoiding
the overload risk of the distribution network, an online algorithm consisting
of scheduling the charging of PEVs and energy management of charging stations
is developed based on Lyapunov optimization and Lagrange dual decomposition
techniques. The algorithm can satisfy the random charging requests from PEVs
with provable performance. Simulation results with real data demonstrate that
the proposed algorithm can decrease the time-average cost of stations while
avoiding overload in the distribution network in the presence of random
uncontrollable loads.
|
[
{
"version": "v1",
"created": "Wed, 9 Mar 2016 02:16:32 GMT"
}
] | 2016-03-10T00:00:00 |
[
[
"Yang",
"Bo",
""
],
[
"Li",
"Jingwei",
""
],
[
"Han",
"Qiaoni",
""
],
[
"He",
"Tian",
""
],
[
"Chen",
"Cailian",
""
],
[
"Guan",
"Xinping",
""
]
] |
new_dataset
| 0.997278 |
1603.02767
|
Abedelaziz Mohaisen
|
Jeffrey Spaulding and Shambhu Upadhyaya and Aziz Mohaisen
|
The Landscape of Domain Name Typosquatting: Techniques and
Countermeasures
|
6 pages, 1 table, 0 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With more than 294 million registered domain names as of late 2015, the
domain name ecosystem has evolved to become a cornerstone for the operation of
the Internet. Domain names today serve everyone, from individuals for their
online presence to big brands for their business operations. Such ecosystem
that facilitated legitimate business and personal uses has also fostered
"creative" cases of misuse, including phishing, spam, hit and traffic stealing,
online scams, among others. As a first step towards this misuse, the
registration of a legitimately-looking domain is often required. For that,
domain typosquatting provides a great avenue to cybercriminals to conduct their
crimes.
In this paper, we review the landscape of domain name typosquatting,
highlighting models and advanced techniques for typosquatted domain names
generation, models for their monetization, and the existing literature on
countermeasures. We further highlight potential fruitful directions on
technical countermeasures that are lacking in the literature.
|
[
{
"version": "v1",
"created": "Wed, 9 Mar 2016 02:43:54 GMT"
}
] | 2016-03-10T00:00:00 |
[
[
"Spaulding",
"Jeffrey",
""
],
[
"Upadhyaya",
"Shambhu",
""
],
[
"Mohaisen",
"Aziz",
""
]
] |
new_dataset
| 0.992927 |
1602.01509
|
Tom Luan
|
Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Guiyi We, Limin Sun
|
A View of Fog Computing from Networking Perspective
|
The manuscript is an update version of arXiv:1502.01815 and has
substantial text overlap with arXiv:1502.01815. It is therefore requested to
be withdrawn to avoid duplication
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With smart devices, particular smartphones, becoming our everyday companions,
the ubiquitous mobile Internet and computing applications pervade people's
daily lives. With the surge demand on high-quality mobile services at anywhere,
how to address the ubiquitous user demand and accommodate the explosive growth
of mobile traffics is the key issue of the next generation mobile networks. The
Fog computing is a promising solution towards this goal. Fog computing extends
cloud computing by providing virtualized resources and engaged location-based
services to the edge of the mobile networks so as to better serve mobile
traffics. Therefore, Fog computing is a lubricant of the combination of cloud
computing and mobile applications. In this article, we outline the main
features of Fog computing and describe its concept, architecture and design
goals. Lastly, we discuss some of the future research issues from the
networking perspective.
|
[
{
"version": "v1",
"created": "Wed, 3 Feb 2016 23:49:56 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Feb 2016 23:08:20 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Mar 2016 01:08:43 GMT"
}
] | 2016-03-09T00:00:00 |
[
[
"Luan",
"Tom H.",
""
],
[
"Gao",
"Longxiang",
""
],
[
"Li",
"Zhi",
""
],
[
"Xiang",
"Yang",
""
],
[
"We",
"Guiyi",
""
],
[
"Sun",
"Limin",
""
]
] |
new_dataset
| 0.965048 |
1603.02262
|
Maria Csernoch
|
Maria Csernoch, Piroska Bir\'o
|
Problem Solving in Sprego
|
13 Pages, 8 Tables, 2 Figures. Proc. 16th EuSpRIG Conf. "Spreadsheet
Risk Management" (2015) pp1-13 ISBN: 978-1-905404-52-0
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sprego is a programming tool for novice and end-user programmers within
graphical spreadsheet environments. The main idea of Sprego is to use as few
general purpose functions as possible, and based on these functions we create
multilevel formulas to solve real world programmable spreadsheet problems.
Beyond providing the framework for the theoretic background and the tools which
support Sprego, in order to demonstrate the power which lies within it, we
present a converted authentic table and, based on this table, data retrieval
tasks, their algorithms, and coding in full details.
|
[
{
"version": "v1",
"created": "Sat, 5 Mar 2016 23:27:48 GMT"
}
] | 2016-03-09T00:00:00 |
[
[
"Csernoch",
"Maria",
""
],
[
"Biró",
"Piroska",
""
]
] |
new_dataset
| 0.998884 |
1603.02297
|
Paul Springer
|
Paul Springer and Jeff R. Hammond and Paolo Bientinesi
|
TTC: A high-performance Compiler for Tensor Transpositions
| null | null | null | null |
cs.MS cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present TTC, an open-source parallel compiler for multidimensional tensor
transpositions. In order to generate high-performance C++ code, TTC explores a
number of optimizations, including software prefetching, blocking,
loop-reordering, and explicit vectorization. To evaluate the performance of
multidimensional transpositions across a range of possible use-cases, we also
release a benchmark covering arbitrary transpositions of up to six dimensions.
Performance results show that the routines generated by TTC achieve close to
peak memory bandwidth on both the Intel Haswell and the AMD Steamroller
architectures, and yield significant performance gains over modern compilers.
By implementing a set of pruning heuristics, TTC allows users to limit the
number of potential solutions; this option is especially useful when dealing
with high-dimensional tensors, as the search space might become prohibitively
large. Experiments indicate that when only 100 potential solutions are
considered, the resulting performance is about 99% of that achieved with
exhaustive search.
|
[
{
"version": "v1",
"created": "Mon, 7 Mar 2016 21:13:00 GMT"
}
] | 2016-03-09T00:00:00 |
[
[
"Springer",
"Paul",
""
],
[
"Hammond",
"Jeff R.",
""
],
[
"Bientinesi",
"Paolo",
""
]
] |
new_dataset
| 0.996669 |
1603.02365
|
Rui Deng
|
Rui Deng, Liping Li, Yanjun Hu
|
On the Polar Code Encoding in Fading Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Besides the determined construction of polar codes in BEC channels, different
construction techniques have been proposed for AWGN channels. The current
state-of-the-art algorithm starts with a design-SNR (or an operating SNR) and
then processing is carried out to approximate each individual bit channel.
However, as found in this paper, for fading channels, an operating SNR can not
be directly used in approximating the bit channels. To achieve a better BER
performance, the input SNR for the polar code construction in fadding channels
is derived. A selection of the design-SNR for both the AWGN and the fading
channels from an information theoretical point of view is studied. Also
presented in this paper is the study of sacrificing a small data rate to gain
orders of magnitude increase in the BER performance.
|
[
{
"version": "v1",
"created": "Tue, 8 Mar 2016 03:04:38 GMT"
}
] | 2016-03-09T00:00:00 |
[
[
"Deng",
"Rui",
""
],
[
"Li",
"Liping",
""
],
[
"Hu",
"Yanjun",
""
]
] |
new_dataset
| 0.998907 |
1603.02467
|
Marc Hellmuth
|
Marc Hellmuth, Peter F. Stadler and Nicolas Wieseke
|
The Mathematics of Xenology: Di-cographs, Symbolic Ultrametrics,
2-structures and Tree-representable Systems of Binary Relations
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The concepts of orthology, paralogy, and xenology play a key role in
molecular evolution. Orthology and paralogy distinguish whether a pair of genes
originated by speciation or duplication. The corresponding binary relations on
a set of genes form complementary cographs. Allowing more than two types of
ancestral event types leads to symmetric symbolic ultrametrics. Horizontal gene
transfer, which leads to xenologous gene pairs, however, is inherent asymmetric
since one offspring copy "jumps" into another genome, while the other continues
to be inherited vertically. We therefore explore here the mathematical
structure of the non-symmetric generalization of symbolic ultrametrics. Our
main results tie non-symmetric ultrametrics together with di-cographs (the
directed generalization of cographs), so-called uniformly non-prime
2-structures, and hierarchical structures on the set of strong modules. This
yields a characterization of relation structures that can be explained in terms
of trees and types of ancestral events. This framework accommodates a
horizontal-transfer relation in terms of an ancestral event and thus, is
slightly different from the the most commonly used definition of xenology.
|
[
{
"version": "v1",
"created": "Tue, 8 Mar 2016 10:33:24 GMT"
}
] | 2016-03-09T00:00:00 |
[
[
"Hellmuth",
"Marc",
""
],
[
"Stadler",
"Peter F.",
""
],
[
"Wieseke",
"Nicolas",
""
]
] |
new_dataset
| 0.998996 |
1405.0521
|
Sina Lashgari
|
Sina Lashgari, Amir Salman Avestimehr
|
Blind MIMOME Wiretap Channel with Delayed CSIT
|
This work has been presented in part at the IEEE International
Symposium on Information Theory 2014 and IEEE Globecom 2014
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the Gaussian MIMOME wiretap channel where a transmitter wishes to
communicate a confidential message to a legitimate receiver in the presence of
eavesdroppers, while the eavesdroppers should not be able to decode the
confidential message. Each node in the network is equipped with arbitrary
number of antennas. Furthermore, channels are time varying, and there is no
channel state information available at the transmitter (CSIT) with respect to
eavesdroppers' channels; and transmitter only has access to delayed CSIT of the
channel to the legitimate receiver. The secure degrees of freedom (SDoF) for
such network has only been characterized for special cases, and is unknown in
general. We completely characterize the SDoF of this network for all antenna
configurations. In particular, we strictly improve the state-of-the-art
achievable scheme for this network by proposing more efficient artificial noise
alignment at the receivers. Furthermore, we develop a tight upper bound by
utilizing 4 important inequalities that provide lower bounds on the received
signal dimensions at receivers which supply delayed CSIT or no CSIT, or at a
collection of receivers where some supply no CSIT. These inequalities together
allow for analysis of signal dimensions in networks with asymmetric CSIT; and
as a result, we present a converse proof that leads to characterization of SDoF
for all possible antenna configurations.
|
[
{
"version": "v1",
"created": "Fri, 2 May 2014 21:46:39 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Mar 2016 18:28:45 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"Lashgari",
"Sina",
""
],
[
"Avestimehr",
"Amir Salman",
""
]
] |
new_dataset
| 0.996527 |
1411.0281
|
Remi Chou
|
Remi A. Chou and Matthieu R. Bloch
|
Polar Coding for the Broadcast Channel with Confidential Messages: A
Random Binning Analogy
|
20 pages, two-column, 6 figures, accepted to IEEE Transactions on
Information Theory; parts of the results were presented at the 2015 IEEE
Information Theory Workshop; minor change in title
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop a low-complexity polar coding scheme for the discrete memoryless
broadcast channel with confidential messages under strong secrecy and
randomness constraints. Our scheme extends previous work by using an optimal
rate of uniform randomness in the stochastic encoder, and avoiding assumptions
regarding the symmetry or degraded nature of the channels. The price paid for
these extensions is that the encoder and decoders are required to share a
secret seed of negligible size and to increase the block length through
chaining. We also highlight a close conceptual connection between the proposed
polar coding scheme and a random binning proof of the secrecy capacity region.
|
[
{
"version": "v1",
"created": "Sun, 2 Nov 2014 17:19:12 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Mar 2016 04:08:11 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"Chou",
"Remi A.",
""
],
[
"Bloch",
"Matthieu R.",
""
]
] |
new_dataset
| 0.98198 |
1507.06056
|
Subir Ghosh
|
Subir Kumar Ghosh and Sudebkumar Prasant Pal
|
A National Effort for Motivating Indian Students and Teachers towards
Algorithmic Research
| null | null | null | null |
cs.CY cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
During 2008-2015, twenty-two introductory workshops on graph and geometric
algorithms were organized for teachers and students (undergraduate,
post-graduate and doctoral) of engineering colleges and universities at
different states and union territories of India. The lectures were meant to
provide exposure to the field of graph and geometric algorithms and to motivate
the participants towards research. Fifty-eight professors from TIFR, IITs,
IISc, IMSc, CMI, ISI Kolkata, and other institutes and universities delivered
invited lectures on different topics in the design and analysis of algorithms,
discrete applied mathematics, computer graphics, computer vision, and robotics.
The first four workshops were funded by TIFR, BRNS and IIT Kharagpur, and the
remaining workshops were funded by the NBHM. In this paper, we present the
salient features of these workshops, and state our observations on the national
impact of these workshops.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2015 04:49:01 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Jul 2015 12:49:37 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Mar 2016 02:18:34 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"Ghosh",
"Subir Kumar",
""
],
[
"Pal",
"Sudebkumar Prasant",
""
]
] |
new_dataset
| 0.999112 |
1508.01843
|
Eric Clark Mr.
|
Eric M. Clark, Chris A. Jones, Jake Ryland Williams, Allison N. Kurti,
Michell Craig Nortotsky, Christopher M. Danforth, and Peter Sheridan Dodds
|
Vaporous Marketing: Uncovering Pervasive Electronic Cigarette
Advertisements on Twitter
| null | null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Background: Twitter has become the "wild-west" of marketing and promotional
strategies for advertisement agencies. Electronic cigarettes have been heavily
marketed across Twitter feeds, offering discounts, "kid-friendly" flavors,
algorithmically generated false testimonials, and free samples. Methods:All
electronic cigarette keyword related tweets from a 10% sample of Twitter
spanning January 2012 through December 2014 (approximately 850,000 total
tweets) were identified and categorized as Automated or Organic by combining a
keyword classification and a machine trained Human Detection algorithm. A
sentiment analysis using Hedonometrics was performed on Organic tweets to
quantify the change in consumer sentiments over time. Commercialized tweets
were topically categorized with key phrasal pattern matching. Results:The
overwhelming majority (80%) of tweets were classified as automated or
promotional in nature. The majority of these tweets were coded as
commercialized (83.65% in 2013), up to 33% of which offered discounts or free
samples and appeared on over a billion twitter feeds as impressions. The
positivity of Organic (human) classified tweets has decreased over time (5.84
in 2013 to 5.77 in 2014) due to a relative increase in the negative words
ban,tobacco,doesn't,drug,against,poison,tax and a relative decrease in the
positive words like haha,good,cool. Automated tweets are more positive than
organic (6.17 versus 5.84) due to a relative increase in the marketing words
best,win,buy,sale,health,discount and a relative decrease in negative words
like bad, hate, stupid, don't. Conclusions:Due to the youth presence on Twitter
and the clinical uncertainty of the long term health complications of
electronic cigarette consumption, the protection of public health warrants
scrutiny and potential regulation of social media marketing.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2015 00:09:02 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Mar 2016 19:01:49 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"Clark",
"Eric M.",
""
],
[
"Jones",
"Chris A.",
""
],
[
"Williams",
"Jake Ryland",
""
],
[
"Kurti",
"Allison N.",
""
],
[
"Nortotsky",
"Michell Craig",
""
],
[
"Danforth",
"Christopher M.",
""
],
[
"Dodds",
"Peter Sheridan",
""
]
] |
new_dataset
| 0.997278 |
1509.03611
|
Ella Rabinovich
|
Ella Rabinovich, Shuly Wintner, Ofek Luis Lewinsohn
|
A Parallel Corpus of Translationese
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe a set of bilingual English--French and English--German parallel
corpora in which the direction of translation is accurately and reliably
annotated. The corpora are diverse, consisting of parliamentary proceedings,
literary works, transcriptions of TED talks and political commentary. They will
be instrumental for research of translationese and its applications to (human
and machine) translation; specifically, they can be used for the task of
translationese identification, a research direction that enjoys a growing
interest in recent years. To validate the quality and reliability of the
corpora, we replicated previous results of supervised and unsupervised
identification of translationese, and further extended the experiments to
additional datasets and languages.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2015 19:07:49 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Mar 2016 13:41:11 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"Rabinovich",
"Ella",
""
],
[
"Wintner",
"Shuly",
""
],
[
"Lewinsohn",
"Ofek Luis",
""
]
] |
new_dataset
| 0.998672 |
1509.06503
|
Catalin Hritcu
|
Arthur Azevedo de Amorim, Nathan Collins, Andr\'e DeHon, Delphine
Demange, Catalin Hritcu, David Pichardie, Benjamin C. Pierce, Randy Pollack,
Andrew Tolmach
|
A Verified Information-Flow Architecture
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
SAFE is a clean-slate design for a highly secure computer system, with
pervasive mechanisms for tracking and limiting information flows. At the lowest
level, the SAFE hardware supports fine-grained programmable tags, with
efficient and flexible propagation and combination of tags as instructions are
executed. The operating system virtualizes these generic facilities to present
an information-flow abstract machine that allows user programs to label
sensitive data with rich confidentiality policies. We present a formal,
machine-checked model of the key hardware and software mechanisms used to
dynamically control information flow in SAFE and an end-to-end proof of
noninterference for this model.
We use a refinement proof methodology to propagate the noninterference
property of the abstract machine down to the concrete machine level. We use an
intermediate layer in the refinement chain that factors out the details of the
information-flow control policy and devise a code generator for compiling such
information-flow policies into low-level monitor code. Finally, we verify the
correctness of this generator using a dedicated Hoare logic that abstracts from
low-level machine instructions into a reusable set of verified structured code
generators.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2015 08:38:20 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Mar 2016 10:36:23 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"de Amorim",
"Arthur Azevedo",
""
],
[
"Collins",
"Nathan",
""
],
[
"DeHon",
"André",
""
],
[
"Demange",
"Delphine",
""
],
[
"Hritcu",
"Catalin",
""
],
[
"Pichardie",
"David",
""
],
[
"Pierce",
"Benjamin C.",
""
],
[
"Pollack",
"Randy",
""
],
[
"Tolmach",
"Andrew",
""
]
] |
new_dataset
| 0.998961 |
1603.01651
|
Yao Wang
|
Yao Wang and Mahesh K. Varanasi
|
Degrees of Freedom of the MIMO 2x2 Interference Network with General
Message Sets
|
submitted to T-IT on Mar 4th, 2016
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We establish the DoF region for the MIMO 2x2 interference network with a
general message set, consisting of nine messages, one for each pair of a subset
of transmitters at which that message is known and a subset of receivers where
that message is desired. An outer bound on the general nine-message network is
obtained and then it is shown to be tight, establishing the DoF region for the
most general antenna setting wherein all four nodes have an arbitrary number of
antennas each. The DoF-optimal scheme is applicable to the MIMO 2x2 network
with constant channel coefficients, and hence, a fortiori, to time/frequency
varying channel scenarios. In particular, a linear precoding scheme is proposed
that can achieve all the DoF tuples in the DoF region. In it, the precise roles
played by transmit zero-forcing, interference alignment, random beamforming,
symbol extensions and asymmetric complex signaling are delineated. For
instance, we identify a class of antenna settings in which ACS is required to
achieve the fractional-valued corner points. Evidently, the DoF regions of all
previously unknown cases of the 2x2 interference network with a subset of the
nine-messages are established as special cases of the general result of this
paper. In particular, the DoF region of the well-known four-message (and even
three-message) MIMO X channel is established. This problem had remained open
despite previous studies which had found inner and outer bounds that were not
tight in general. Hence, the DoF regions of all special cases obtained from the
general DoF region of the nine-message 2x2 interference network of this work
that include at least three of the four X channel messages are new, among many
others. Our work sheds light on how the same physical 2x2 network could be used
by a suitable choice of message sets to take most advantage of the channel
resource in a flexible and efficient manner.
|
[
{
"version": "v1",
"created": "Fri, 4 Mar 2016 22:58:36 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"Wang",
"Yao",
""
],
[
"Varanasi",
"Mahesh K.",
""
]
] |
new_dataset
| 0.980664 |
1603.01807
|
Bader AlBdaiwi
|
Bader F. AlBdaiwi
|
On the Number of Cycles in a Graph
|
Accepted for publication in Mathematica Slovaca
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is a sizable literature on investigating the minimum and maximum
numbers of cycles in a class of graphs. However, the answer is known only for
special classes. This paper presents a result on the smallest number of cycles
in hamiltonian 3-connected cubic graphs. Further, it describes a proof
technique that could improve an upper bound of the largest number of cycles in
a hamiltonian graph.
|
[
{
"version": "v1",
"created": "Sun, 6 Mar 2016 09:41:17 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"AlBdaiwi",
"Bader F.",
""
]
] |
new_dataset
| 0.964309 |
1603.01842
|
James Peters Ph.D.
|
Enoch A-iyeh, James F. Peters
|
Proximal groupoid patterns In digital images
|
9 pages, 6 figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The focus of this article is on the detection and classification of patterns
based on groupoids. The approach hinges on descriptive proximity of points in a
set based on the neighborliness property. This approach lends support to image
analysis and understanding and in studying nearness of image segments. A
practical application of the approach is in terms of the analysis of natural
images for pattern identification and classification.
|
[
{
"version": "v1",
"created": "Sun, 6 Mar 2016 16:39:34 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"A-iyeh",
"Enoch",
""
],
[
"Peters",
"James F.",
""
]
] |
new_dataset
| 0.988995 |
1603.01921
|
Mehrnaz Afshang
|
Mehrnaz Afshang and Harpreet S. Dhillon
|
Optimal Geographic Caching in Finite Wireless Networks
| null | null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cache-enabled device-to-device (D2D) networks turn memory of the devices at
the network edge, such as smart phones and tablets, into bandwidth by enabling
asynchronous content sharing directly between proximate devices. Limited
storage capacity of the mobile devices necessitates the determination of
optimal set of contents to be cached on each device. In order to study the
problem of optimal cache placement, we model the locations of devices in a
finite region (e.g., coffee shop, sports bar, library) as a uniform binomial
point process (BPP). For this setup, we first develop a generic framework to
analyze the coverage probability of the target receiver (target-Rx) when the
requested content is available at the $k^{th}$ closest device to it. Using this
coverage probability result, we evaluate optimal caching probability of the
popular content to maximize the total hit probability. Our analysis concretely
demonstrates that optimal caching probability strongly depends on the number of
simultaneously active devices in the network.
|
[
{
"version": "v1",
"created": "Mon, 7 Mar 2016 02:48:57 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"Afshang",
"Mehrnaz",
""
],
[
"Dhillon",
"Harpreet S.",
""
]
] |
new_dataset
| 0.997002 |
1603.01929
|
Junting Ye
|
Junting Ye, Santhosh Kumar, Leman Akoglu
|
Temporal Opinion Spam Detection by Multivariate Indicative Signals
|
10 pages, 29 figures
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Online consumer reviews reflect the testimonials of real people, unlike
advertisements. As such, they have critical impact on potential consumers, and
indirectly on businesses. According to a Harvard study (Luca 2011), +1 rise in
star-rating increases revenue by 5-9%. Problematically, such financial
incentives have created a market for spammers to fabricate reviews, to unjustly
promote or demote businesses, activities known as opinion spam (Jindal and Liu
2008). A vast majority of existing work on this problem have formulations based
on static review data, with respective techniques operating in an offline
fashion. Spam campaigns, however, are intended to make most impact during their
course. Abnormal events triggered by spammers' activities could be masked in
the load of future events, which static analysis would fail to identify. In
this work, we approach the opinion spam problem with a temporal formulation.
Specifically, we monitor a list of carefully selected indicative signals of
opinion spam over time and design efficient techniques to both detect and
characterize abnormal events in real-time. Experiments on datasets from two
different review sites show that our approach is fast, effective, and practical
to be deployed in real-world systems.
|
[
{
"version": "v1",
"created": "Mon, 7 Mar 2016 04:18:06 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"Ye",
"Junting",
""
],
[
"Kumar",
"Santhosh",
""
],
[
"Akoglu",
"Leman",
""
]
] |
new_dataset
| 0.986214 |
1603.01973
|
Jisun An
|
Jisun An, Ingmar Weber
|
#greysanatomy vs. #yankees: Demographics and Hashtag Use on Twitter
|
This is a preprint of an article appearing at ICWSM 2016
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Demographics, in particular, gender, age, and race, are a key predictor of
human behavior. Despite the significant effect that demographics plays, most
scientific studies using online social media do not consider this factor,
mainly due to the lack of such information. In this work, we use
state-of-the-art face analysis software to infer gender, age, and race from
profile images of 350K Twitter users from New York. For the period from
November 1, 2014 to October 31, 2015, we study which hashtags are used by
different demographic groups. Though we find considerable overlap for the most
popular hashtags, there are also many group-specific hashtags.
|
[
{
"version": "v1",
"created": "Mon, 7 Mar 2016 08:35:52 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"An",
"Jisun",
""
],
[
"Weber",
"Ingmar",
""
]
] |
new_dataset
| 0.985244 |
1603.02253
|
Wenbin Li
|
Wenbin Li and Yang Chen and JeeHang Lee and Gang Ren and Darren Cosker
|
Blur Robust Optical Flow using Motion Channel
|
Preprint of our paper accepted by Neurocomputing
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is hard to estimate optical flow given a realworld video sequence with
camera shake and other motion blur. In this paper, we first investigate the
blur parameterization for video footage using near linear motion elements. we
then combine a commercial 3D pose sensor with an RGB camera, in order to film
video footage of interest together with the camera motion. We illustrates that
this additional camera motion/trajectory channel can be embedded into a hybrid
framework by interleaving an iterative blind deconvolution and warping based
optical flow scheme. Our method yields improved accuracy within three other
state-of-the-art baselines given our proposed ground truth blurry sequences;
and several other realworld sequences filmed by our imaging system.
|
[
{
"version": "v1",
"created": "Mon, 7 Mar 2016 20:53:20 GMT"
}
] | 2016-03-08T00:00:00 |
[
[
"Li",
"Wenbin",
""
],
[
"Chen",
"Yang",
""
],
[
"Lee",
"JeeHang",
""
],
[
"Ren",
"Gang",
""
],
[
"Cosker",
"Darren",
""
]
] |
new_dataset
| 0.972735 |
1602.08325
|
Ahmad Hassanat
|
Ahmad B. A. Hassanat, Mahmoud B. Alhasanat, Mohammad Ali Abbadi, Eman
Btoush, Mouhammd Al-Awadi, Ahmad S. Tarawneh
|
Victory Sign Biometric for Terrorists Identification
|
7 pages, 5 figures, 4 tables, 26 references
| null | null | null |
cs.CV
|
http://creativecommons.org/licenses/by/4.0/
|
Covering the face and all body parts, sometimes the only evidence to identify
a person is their hand geometry, and not the whole hand- only two fingers (the
index and the middle fingers) while showing the victory sign, as seen in many
terrorists videos. This paper investigates for the first time a new way to
identify persons, particularly (terrorists) from their victory sign. We have
created a new database in this regard using a mobile phone camera, imaging the
victory signs of 50 different persons over two sessions. Simple measurements
for the fingers, in addition to the Hu Moments for the areas of the fingers
were used to extract the geometric features of the shown part of the hand shown
after segmentation. The experimental results using the KNN classifier were
encouraging for most of the recorded persons; with about 40% to 93% total
identification accuracy, depending on the features, distance metric and K used.
|
[
{
"version": "v1",
"created": "Fri, 26 Feb 2016 13:57:40 GMT"
}
] | 2016-03-07T00:00:00 |
[
[
"Hassanat",
"Ahmad B. A.",
""
],
[
"Alhasanat",
"Mahmoud B.",
""
],
[
"Abbadi",
"Mohammad Ali",
""
],
[
"Btoush",
"Eman",
""
],
[
"Al-Awadi",
"Mouhammd",
""
],
[
"Tarawneh",
"Ahmad S.",
""
]
] |
new_dataset
| 0.990273 |
1603.01324
|
Brayden Hollis
|
Brayden Hollis, Stacy Patterson, Jeff Trinkle
|
Compressed Sensing for Tactile Skins
|
8 pages, 4 figures, submitted to ICRA16
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Whole body tactile perception via tactile skins offers large benefits for
robots in unstructured environments. To fully realize this benefit, tactile
systems must support real-time data acquisition over a massive number of
tactile sensor elements. We present a novel approach for scalable tactile data
acquisition using compressed sensing. We first demonstrate that the tactile
data is amenable to compressed sensing techniques. We then develop a solution
for fast data sampling, compression, and reconstruction that is suited for
tactile system hardware and has potential for reducing the wiring complexity.
Finally, we evaluate the performance of our technique on simulated tactile
sensor networks. Our evaluations show that compressed sensing, with a
compression ratio of 3 to 1, can achieve higher signal acquisition accuracy
than full data acquisition of noisy sensor data.
|
[
{
"version": "v1",
"created": "Fri, 4 Mar 2016 01:30:52 GMT"
}
] | 2016-03-07T00:00:00 |
[
[
"Hollis",
"Brayden",
""
],
[
"Patterson",
"Stacy",
""
],
[
"Trinkle",
"Jeff",
""
]
] |
new_dataset
| 0.992364 |
1603.01412
|
Brijesh Dongol
|
Brijesh Dongol and Lindsay Groves
|
Contextual trace refinement for concurrent objects: Safety and progress
| null | null | null | null |
cs.DC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Correctness of concurrent objects is defined in terms of safety properties
such as linearizability, sequential consistency, and quiescent consistency, and
progress properties such as wait-, lock-, and obstruction-freedom. These
properties, however, only refer to the behaviours of the object in isolation,
which does not tell us what guarantees these correctness conditions on
concurrent objects provide to their client programs. This paper investigates
the links between safety and progress properties of concurrent objects and a
form of trace refinement for client programs, called contextual trace
refinement. In particular, we show that linearizability together with a minimal
notion of progress are sufficient properties of concurrent objects to ensure
contextual trace refinement, but sequential consistency and quiescent
consistency are both too weak. Our reasoning is carried out in the action
systems framework with procedure calls, which we extend to cope with non-atomic
operations.
|
[
{
"version": "v1",
"created": "Fri, 4 Mar 2016 10:20:23 GMT"
}
] | 2016-03-07T00:00:00 |
[
[
"Dongol",
"Brijesh",
""
],
[
"Groves",
"Lindsay",
""
]
] |
new_dataset
| 0.991622 |
1208.3942
|
Heiko Vogler
|
Manfred Droste, Heiko Vogler
|
The Chomsky-Sch\"utzenberger Theorem for Quantitative Context-Free
Languages
|
This new version combines a conference and a journal paper of the
authors on the same topic, see references [15,16], and supplements them by a
few additional examples and more detailed proofs. It also corrects a mistake
in Theorem 7.7 of the first arxiv version (the property sequential was
missing)
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Weighted automata model quantitative aspects of systems like the consumption
of resources during executions. Traditionally, the weights are assumed to form
the algebraic structure of a semiring, but recently also other weight
computations like average have been considered. Here, we investigate
quantitative context-free languages over very general weight structures
incorporating all semirings, average computations, lattices, and more. In our
main result, we derive the fundamental Chomsky-Sch\"utzenberger theorem for
such quantitative context-free languages, showing that each arises as the image
of a Dyck language and a regular language under a suitable morphism. Moreover,
we show that quantitative context-free language are expressively equivalent to
a model of weighted pushdown automata. This generalizes results previously
known only for semirings. We also investigate when quantitative context-free
languages assume only finitely many values.
|
[
{
"version": "v1",
"created": "Mon, 20 Aug 2012 08:47:56 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Mar 2016 13:05:06 GMT"
}
] | 2016-03-04T00:00:00 |
[
[
"Droste",
"Manfred",
""
],
[
"Vogler",
"Heiko",
""
]
] |
new_dataset
| 0.999589 |
1601.05962
|
Samuele Giraudo
|
Samuele Giraudo and St\'ephane Vialette
|
Unshuffling Permutations
|
13 pages
|
Latin American Theoretical Informatics Symposium, LNCS 9644,
509--521, 2016
| null | null |
cs.DS math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A permutation is said to be a square if it can be obtained by shuffling two
order-isomorphic patterns. The definition is intended to be the natural
counterpart to the ordinary shuffle of words and languages. In this paper, we
tackle the problem of recognizing square permutations from both the point of
view of algebra and algorithms. On the one hand, we present some algebraic and
combinatorial properties of the shuffle product of permutations. We follow an
unusual line consisting in defining the shuffle of permutations by means of an
unshuffling operator, known as a coproduct. This strategy allows to obtain easy
proofs for algebraic and combinatorial properties of our shuffle product. We
besides exhibit a bijection between square $(213,231)$-avoiding permutations
and square binary words. On the other hand, by using a pattern avoidance
criterion on oriented perfect matchings, we prove that recognizing square
permutations is $\mathbf{NP}$-complete.
|
[
{
"version": "v1",
"created": "Fri, 22 Jan 2016 11:24:54 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Mar 2016 09:12:02 GMT"
}
] | 2016-03-04T00:00:00 |
[
[
"Giraudo",
"Samuele",
""
],
[
"Vialette",
"Stéphane",
""
]
] |
new_dataset
| 0.990591 |
1603.00928
|
Stefano Leucci
|
Matteo Almanza, Stefano Leucci, Alessandro Panconesi
|
Trainyard is NP-Hard
| null | null | null | null |
cs.CC
|
http://creativecommons.org/licenses/by/4.0/
|
Recently, due to the widespread diffusion of smart-phones, mobile puzzle
games have experienced a huge increase in their popularity. A successful puzzle
has to be both captivating and challenging, and it has been suggested that this
features are somehow related to their computational complexity \cite{Eppstein}.
Indeed, many puzzle games --such as Mah-Jongg, Sokoban, Candy Crush, and 2048,
to name a few-- are known to be NP-hard \cite{CondonFLS97,
culberson1999sokoban, GualaLN14, Mehta14a}. In this paper we consider
Trainyard: a popular mobile puzzle game whose goal is to get colored trains
from their initial stations to suitable destination stations. We prove that the
problem of determining whether there exists a solution to a given Trainyard
level is NP-hard. We also \href{http://trainyard.isnphard.com}{provide} an
implementation of our hardness reduction.
|
[
{
"version": "v1",
"created": "Wed, 2 Mar 2016 23:32:33 GMT"
}
] | 2016-03-04T00:00:00 |
[
[
"Almanza",
"Matteo",
""
],
[
"Leucci",
"Stefano",
""
],
[
"Panconesi",
"Alessandro",
""
]
] |
new_dataset
| 0.998291 |
1603.00975
|
EPTCS
|
Mauricio Ayala-Rinc\'on (Universidade de Bras\'ilia)
|
Formalising Confluence in PVS
|
In Proceedings DCM 2015, arXiv:1603.00536
|
EPTCS 204, 2016, pp. 11-17
|
10.4204/EPTCS.204.2
| null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Confluence is a critical property of computational systems which is related
with determinism and non ambiguity and thus with other relevant computational
attributes of functional specifications and rewriting system as termination and
completion. Several criteria have been explored that guarantee confluence and
their formalisations provide further interesting information. This work
discusses topics and presents personal positions and views related with the
formalisation of confluence properties in the Prototype Verification System PVS
developed at our research group.
|
[
{
"version": "v1",
"created": "Thu, 3 Mar 2016 05:33:28 GMT"
}
] | 2016-03-04T00:00:00 |
[
[
"Ayala-Rincón",
"Mauricio",
"",
"Universidade de Brasília"
]
] |
new_dataset
| 0.977964 |
1603.00980
|
Kanji Tanaka
|
Tanaka Kanji
|
Local Map Descriptor for Compressive Change Retrieval
|
8 pages, 7 figures, Draft of a paper submitted to an International
Conference
| null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Change detection, i.e., anomaly detection from local maps built by a mobile
robot at multiple different times, is a challenging problem to solve in
practice. Most previous work either cannot be applied to scenarios where the
size of the map collection is large, or simply assumed that the robot
self-location is globally known. In this paper, we tackle the problem of
simultaneous self-localization and change detection, by reformulating the
problem as a map retrieval problem, and propose a local map descriptor with a
compressed bag-of-words (BoW) structure as a scalable solution. We make the
following contributions. (1) To enable a direct comparison of the spatial
layout of visual features between different local maps, the origin of the local
map coordinate (termed "viewpoint") is planned by scene parsing and determined
by our "viewpoint planner" to be invariant against small variations in
self-location and changes, aiming at providing similar viewpoints for similar
scenes (i.e., the relevant map pair). (2) We extend the BoW model to enable the
use of not only the appearance (e.g., polestar) but also the spatial layout
(e.g., spatial pyramid) of visual features with respect to the planned
viewpoint. The key observation is that the planned viewpoint (i.e., the origin
of local map coordinate) acts as a pseudo viewpoint that is usually required by
spatial BoW (e.g., SPM) and also by anomaly detection (e.g., NN-d, LOF). (3)
Experimental results on a challenging "loop-closing" scenario show that the
proposed method outperforms previous BoW methods in self-localization, and
furthermore, that the use of both appearance and pose information in change
detection produces better results than the use of either information alone.
|
[
{
"version": "v1",
"created": "Thu, 3 Mar 2016 05:35:39 GMT"
}
] | 2016-03-04T00:00:00 |
[
[
"Kanji",
"Tanaka",
""
]
] |
new_dataset
| 0.995516 |
1401.3556
|
Sergiy Vorobyov A.
|
Alex E. Geyer, Reza Nikjah, Sergiy A. Vorobyov, and Norman C. Beaulieu
|
Equivalent Codes, Optimality, and Performance Analysis of OSTBC:
Textbook Study
|
33 pages, 12 figures, 5 tables, full size journal paper, Finished in
Oct. 2009, Unpublished
|
IEEE Trans. Communications, vol. 63, no. 8, pp. 2912-2923, Aug.
2015
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An equivalent model for a multi-input multi-output (MIMO) communication
system with orthogonal space-time block codes (OSTBCs) is proposed based on a
newly revealed connection between OSTBCs and Euclidean codes. Examples of
distance spectra, signal constellations, and signal coordinate diagrams of
Euclidean codes equivalent to simplest OSTBCs are given. A new asymptotic upper
bound for the symbol error rate (SER) of OSTBCs, based on the distance spectra
of the introduced equivalent Euclidean codes is derived, and new general design
criteria for signal constellations of the optimal OSTBC are proposed. Some
bounds relating distance properties, dimensionality, and cardinality of OSTBCs
with constituent signals of equal energy are given, and new optimal signal
constellations with cardinalities M = 8 and M = 16 for Alamouti's code are
designed. Using the new model for MIMO communication systems with OSTBCs, a
general methodology for performance analysis of OSTBCs is developed. As an
example of the application of this methodology, an exact evaluation of the SER
of any OSTBC is given. Namely, a new expression for the SER of Alamouti's OSTBC
with binary phase shift keying (BPSK) signals is derived.
|
[
{
"version": "v1",
"created": "Wed, 15 Jan 2014 12:07:56 GMT"
}
] | 2016-03-03T00:00:00 |
[
[
"Geyer",
"Alex E.",
""
],
[
"Nikjah",
"Reza",
""
],
[
"Vorobyov",
"Sergiy A.",
""
],
[
"Beaulieu",
"Norman C.",
""
]
] |
new_dataset
| 0.969453 |
1508.01722
|
Jun-Cheng Chen
|
Jun-Cheng Chen and Vishal M. Patel and Rama Chellappa
|
Unconstrained Face Verification using Deep CNN Features
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present an algorithm for unconstrained face verification
based on deep convolutional features and evaluate it on the newly released
IARPA Janus Benchmark A (IJB-A) dataset. The IJB-A dataset includes real-world
unconstrained faces from 500 subjects with full pose and illumination
variations which are much harder than the traditional Labeled Face in the Wild
(LFW) and Youtube Face (YTF) datasets. The deep convolutional neural network
(DCNN) is trained using the CASIA-WebFace dataset. Extensive experiments on the
IJB-A dataset are provided.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2015 15:21:19 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Mar 2016 19:41:42 GMT"
}
] | 2016-03-03T00:00:00 |
[
[
"Chen",
"Jun-Cheng",
""
],
[
"Patel",
"Vishal M.",
""
],
[
"Chellappa",
"Rama",
""
]
] |
new_dataset
| 0.959839 |
1603.00532
|
Soroush Ghorashi
|
Soroush Ghorashi, Carlos Jensen
|
Jimbo: A Collaborative IDE with Live Preview
|
4 pages
| null |
10.1145/2897586.2897613
| null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Team collaboration plays a key role in the success of any multi-user
activity. Software engineering is a highly collaborative activity, where
multiple developers and designers work together to solve a common problem.
Meaningful and effective designer-developer collaboration improves the user
experience, which can improve the chances of success for the project. Learning
to program is another activity that can be implemented in a more collaborative
way, students can learn in an active style by working with others. The growth
of online classes, from small structured seminars to massive open online
courses (MOOCs), and the isolation and impoverished learning experience some
students report in these, points to an urgent need for tools that support
remote pair programming in a distributed educational setting. In this paper, we
describe Jimbo, a collaborative integrated development environment (IDE) that
we believe is beneficial and effective in both aforementioned activities. Jimbo
integrates many features that support better collaboration and communication
between designers and developers, to bridge communication gaps and develop
mutual understanding. These novel features can improve today's CS education by
bringing students closer to each other and their instructors as well as
training them to collaborate which is consistent with current practices in
software engineering.
|
[
{
"version": "v1",
"created": "Wed, 2 Mar 2016 00:34:34 GMT"
}
] | 2016-03-03T00:00:00 |
[
[
"Ghorashi",
"Soroush",
""
],
[
"Jensen",
"Carlos",
""
]
] |
new_dataset
| 0.999402 |
1603.00588
|
Shin-Ming Cheng
|
Pin-Yu Chen and Ching-Chao Lin and Shin-Ming Cheng and Hsu-Chun Hsiao
and Chun-Ying Huang
|
Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack
|
To appear in June 2016 IEEE Communications Magazine, feature topic on
"Bio-inspired Cyber Security for Communications and Networking"
| null | null | null |
cs.CR cs.NI cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The evolution of communication technology and the proliferation of electronic
devices have rendered adversaries powerful means for targeted attacks via all
sorts of accessible resources. In particular, owing to the intrinsic
interdependency and ubiquitous connectivity of modern communication systems,
adversaries can devise malware that propagates through intermediate hosts to
approach the target, which we refer to as transmissive attacks. Inspired by
biology, the transmission pattern of such an attack in the digital space much
resembles the spread of an epidemic in real life. This paper elaborates
transmissive attacks, summarizes the utility of epidemic models in
communication systems, and draws connections between transmissive attacks and
epidemic models. Simulations, experiments, and ongoing research challenges on
transmissive attacks are also addressed.
|
[
{
"version": "v1",
"created": "Wed, 2 Mar 2016 06:16:51 GMT"
}
] | 2016-03-03T00:00:00 |
[
[
"Chen",
"Pin-Yu",
""
],
[
"Lin",
"Ching-Chao",
""
],
[
"Cheng",
"Shin-Ming",
""
],
[
"Hsiao",
"Hsu-Chun",
""
],
[
"Huang",
"Chun-Ying",
""
]
] |
new_dataset
| 0.952643 |
1603.00619
|
Sayan Mitra
|
Yixiao Lin, Sayan Mitra and Shuting Li
|
Porting Code Across Simple Mobile Robots
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The StarL programming framework aims to simplify development of distributed
robotic applications by providing easy-to-use language constructs for
communication and control. It has been used to develop applications such as
formation control, distributed tracking, and collaborative search. In this
paper, we present a complete redesign of the StarL language and its runtime
system which enables us to achieve portability of robot programs across
platforms. Thus, the same application program, say, for distributed tracking,
can now be compiled and deployed on multiple, heterogeneous robotic platforms.
Towards portability, this we first define the semantics of StarL programs in a
way that is largely platform independent, except for a few key
platform-dependent parameters that capture the worst-case execution and sensing
delays and resolution of sensors. Next, we present a design of the StarL
runtime system, including a robot controller, that meets the above semantics.
The controller consists of a platform-independent path planner implemented
using RRTs and a platform-dependent way-point tracker that is implemented using
the control commands available for the platform. We demonstrate portability of
StarL applications using simulation results for two different robotic
platforms, and several applications.
|
[
{
"version": "v1",
"created": "Wed, 2 Mar 2016 08:48:15 GMT"
}
] | 2016-03-03T00:00:00 |
[
[
"Lin",
"Yixiao",
""
],
[
"Mitra",
"Sayan",
""
],
[
"Li",
"Shuting",
""
]
] |
new_dataset
| 0.967493 |
1603.00646
|
Yelena Mejova
|
Jisun An, Haewoon Kwak, Yelena Mejova, Sonia Alonso Saenz De Oger,
Braulio Gomez Fortes
|
Are you Charlie or Ahmed? Cultural pluralism in Charlie Hebdo response
on Twitter
|
International AAAI Conference on Web and Social Media (ICWSM), 2016
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the response to the Charlie Hebdo shootings of January 7, 2015 on
Twitter across the globe. We ask whether the stances on the issue of freedom of
speech can be modeled using established sociological theories, including
Huntington's culturalist Clash of Civilizations, and those taking into
consideration social context, including Density and Interdependence theories.
We find support for Huntington's culturalist explanation, in that the
established traditions and norms of one's "civilization" predetermine some of
one's opinion. However, at an individual level, we also find social context to
play a significant role, with non-Arabs living in Arab countries using
#JeSuisAhmed ("I am Ahmed") five times more often when they are embedded in a
mixed Arab/non-Arab (mention) network. Among Arabs living in the West, we find
a great variety of responses, not altogether associated with the size of their
expatriate community, suggesting other variables to be at play.
|
[
{
"version": "v1",
"created": "Wed, 2 Mar 2016 10:38:11 GMT"
}
] | 2016-03-03T00:00:00 |
[
[
"An",
"Jisun",
""
],
[
"Kwak",
"Haewoon",
""
],
[
"Mejova",
"Yelena",
""
],
[
"De Oger",
"Sonia Alonso Saenz",
""
],
[
"Fortes",
"Braulio Gomez",
""
]
] |
new_dataset
| 0.951924 |
1603.00747
|
Donghyuk Lee
|
Yoongu Kim, Ross Daly, Jeremie Kim, Chris Fallin, Ji Hye Lee, Donghyuk
Lee, Chris Wilkerson, Konrad Lai, Onur Mutlu
|
RowHammer: Reliability Analysis and Security Implications
|
This is the summary of the paper titled "Flipping Bits in Memory
Without Accessing Them: An Experimental Study of DRAM Disturbance Errors"
which appeared in ISCA in June 2014
| null | null | null |
cs.DC cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As process technology scales down to smaller dimensions, DRAM chips become
more vulnerable to disturbance, a phenomenon in which different DRAM cells
interfere with each other's operation. For the first time in academic
literature, our ISCA paper exposes the existence of disturbance errors in
commodity DRAM chips that are sold and used today. We show that repeatedly
reading from the same address could corrupt data in nearby addresses. More
specifically: When a DRAM row is opened (i.e., activated) and closed (i.e.,
precharged) repeatedly (i.e., hammered), it can induce disturbance errors in
adjacent DRAM rows. This failure mode is popularly called RowHammer. We tested
129 DRAM modules manufactured within the past six years (2008-2014) and found
110 of them to exhibit RowHammer disturbance errors, the earliest of which
dates back to 2010. In particular, all modules from the past two years
(2012-2013) were vulnerable, which implies that the errors are a recent
phenomenon affecting more advanced generations of process technology.
Importantly, disturbance errors pose an easily-exploitable security threat
since they are a breach of memory protection, wherein accesses to one page
(mapped to one row) modifies the data stored in another page (mapped to an
adjacent row).
|
[
{
"version": "v1",
"created": "Thu, 18 Feb 2016 17:19:04 GMT"
}
] | 2016-03-03T00:00:00 |
[
[
"Kim",
"Yoongu",
""
],
[
"Daly",
"Ross",
""
],
[
"Kim",
"Jeremie",
""
],
[
"Fallin",
"Chris",
""
],
[
"Lee",
"Ji Hye",
""
],
[
"Lee",
"Donghyuk",
""
],
[
"Wilkerson",
"Chris",
""
],
[
"Lai",
"Konrad",
""
],
[
"Mutlu",
"Onur",
""
]
] |
new_dataset
| 0.999225 |
1603.00762
|
Patrick Sol\'e
|
Adel Alahmadi, Funda \"Ozdemir, Patrick Sol\'e
|
On self-dual double circulant codes
|
8 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Self-dual double circulant codes of odd dimension are shown to be dihedral in
even characteristic and consta-dihedral in odd characteristic. Exact counting
formulae are derived for them and used to show they contain families of codes
with relative distance satisfying a modified Gilbert-Varshamov bound.
|
[
{
"version": "v1",
"created": "Wed, 2 Mar 2016 15:50:41 GMT"
}
] | 2016-03-03T00:00:00 |
[
[
"Alahmadi",
"Adel",
""
],
[
"Özdemir",
"Funda",
""
],
[
"Solé",
"Patrick",
""
]
] |
new_dataset
| 0.999295 |
1406.4710
|
Christian Retor\'e
|
Christian Retor\'e
|
Typed Hilbert Epsilon Operators and the Semantics of Determiner Phrases
(Invited Lecture)
| null | null |
10.1007/978-3-662-44121-3_2
| null |
cs.CL cs.AI cs.LO math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The semantics of determiner phrases, be they definite de- scriptions,
indefinite descriptions or quantified noun phrases, is often as- sumed to be a
fully solved question: common nouns are properties, and determiners are
generalised quantifiers that apply to two predicates: the property
corresponding to the common noun and the one corresponding to the verb phrase.
We first present a criticism of this standard view. Firstly, the semantics of
determiners does not follow the syntactical structure of the sentence. Secondly
the standard interpretation of the indefinite article cannot ac- count for
nominal sentences. Thirdly, the standard view misses the linguis- tic asymmetry
between the two properties of a generalised quantifier. In the sequel, we
propose a treatment of determiners and quantifiers as Hilbert terms in a richly
typed system that we initially developed for lexical semantics, using a many
sorted logic for semantical representations. We present this semantical
framework called the Montagovian generative lexicon and show how these terms
better match the syntactical structure and avoid the aforementioned problems of
the standard approach. Hilbert terms rather differ from choice functions in
that there is one polymorphic operator and not one operator per formula. They
also open an intriguing connection between the logic for meaning assembly, the
typed lambda calculus handling compositionality and the many-sorted logic for
semantical representations. Furthermore epsilon terms naturally introduce
type-judgements and confirm the claim that type judgment are a form of
presupposition.
|
[
{
"version": "v1",
"created": "Wed, 18 Jun 2014 13:32:55 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Retoré",
"Christian",
""
]
] |
new_dataset
| 0.99926 |
1510.05452
|
Sylvain Sen\'e
|
Aurore Alcolei, K\'evin Perrot and Sylvain Sen\'e
|
On the flora of asynchronous locally non-monotonic Boolean automata
networks
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Boolean automata networks (BANs) are a well established model for biological
regulation systems such as neural networks or genetic networks. Studies on the
dynamics of BANs, whether it is synchronous or asynchronous, have mainly
focused on monotonic networks, where fundamental questions on the links
relating their static and dynamical properties have been raised and addressed.
This paper explores analogous questions on asynchronous non-monotonic networks,
xor-BANs, that are BANs where all the local transition functions are
xor-functions. Using algorithmic tools, we give a general characterisation of
the asynchronous transition graphs for most of the cactus xor-BANs and strongly
connected xor-BANs. As an illustration of the results, we provide a complete
description of the asynchronous dynamics of two particular classes of xor-BAN,
namely xor-Flowers and xor-Cycle Chains. This work also leads to new
bisimulation equivalences specific to xor-BANs.
|
[
{
"version": "v1",
"created": "Mon, 19 Oct 2015 12:58:41 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Oct 2015 07:14:47 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Mar 2016 15:18:44 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Alcolei",
"Aurore",
""
],
[
"Perrot",
"Kévin",
""
],
[
"Sené",
"Sylvain",
""
]
] |
new_dataset
| 0.992849 |
1602.08127
|
Xiping Fu
|
Xiping Fu, Brendan McCane, Steven Mills, Michael Albert and Lech
Szymanski
|
Auto-JacoBin: Auto-encoder Jacobian Binary Hashing
|
Submitting to journal (TPAMI). 17 pages, 11 figures. The Matlab codes
for AutoJacoBin and NOKMeans are available:
https://bitbucket.org/fxpfxp/autojacobin
https://bitbucket.org/fxpfxp/nokmeans The SIFT10M dataset is available at:
http://archive.ics.uci.edu/ml/datasets/SIFT10M
| null | null | null |
cs.CV cs.LG
|
http://creativecommons.org/licenses/by/4.0/
|
Binary codes can be used to speed up nearest neighbor search tasks in large
scale data sets as they are efficient for both storage and retrieval. In this
paper, we propose a robust auto-encoder model that preserves the geometric
relationships of high-dimensional data sets in Hamming space. This is done by
considering a noise-removing function in a region surrounding the manifold
where the training data points lie. This function is defined with the property
that it projects the data points near the manifold into the manifold wisely,
and we approximate this function by its first order approximation. Experimental
results show that the proposed method achieves better than state-of-the-art
results on three large scale high dimensional data sets.
|
[
{
"version": "v1",
"created": "Thu, 25 Feb 2016 21:47:16 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Mar 2016 06:22:28 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Fu",
"Xiping",
""
],
[
"McCane",
"Brendan",
""
],
[
"Mills",
"Steven",
""
],
[
"Albert",
"Michael",
""
],
[
"Szymanski",
"Lech",
""
]
] |
new_dataset
| 0.995148 |
1602.08987
|
Tam Nguyen
|
Tam Nguyen and Emanuele Garone
|
Proof of Control of a UAV and a UGV Cooperating to Manipulate an Object
|
8 pages, 5 figures, American Control Conference (ACC) 2016
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper focuses on the control of a system composed of an Unmanned Aerial
Vehicle (UAV) and an Unmanned Ground Vehicle (UGV) which cooperate to
manipulate an object. The two units are subject to actuator saturations and
cooperate to move the object to a desired pose, characterized by its position
and inclination. The paper proposes a control strategy where the ground vehicle
is tasked to deploy the object to a certain position, whereas the aerial
vehicle adjusts its inclination. The ground vehicle is governed by a saturated
proportional-derivative control law. The aerial vehicle is regulated by means
of a cascade control specifically designed for this problem that is able to
exploit the mechanical interconnection. The stability of the overall system is
proved through Input-to-State Stability and Small Gain theorem arguments. To
solve the problem of constraints satisfaction, a nonlinear Reference Governor
scheme is implemented. Numerical simulations are provided to demonstrate the
effectiveness of the proposed method.
|
[
{
"version": "v1",
"created": "Mon, 29 Feb 2016 14:45:32 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Mar 2016 09:31:13 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Nguyen",
"Tam",
""
],
[
"Garone",
"Emanuele",
""
]
] |
new_dataset
| 0.996964 |
1603.00060
|
Adrian Dumitrescu
|
Kevin Balas, Adrian Dumitrescu, and Csaba D. T\'oth
|
Anchored Rectangle and Square Packings
|
33 pages, 20 figures
| null | null | null |
cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For points $p_1,\ldots , p_n$ in the unit square $[0,1]^2$, an \emph{anchored
rectangle packing} consists of interior-disjoint axis-aligned empty rectangles
$r_1,\ldots , r_n\subseteq [0,1]^2$ such that point $p_i$ is a corner of the
rectangle $r_i$ (that is, $r_i$ is \emph{anchored} at $p_i$) for $i=1,\ldots,
n$. We show that for every set of $n$ points in $[0,1]^2$, there is an anchored
rectangle packing of area at least $7/12-O(1/n)$, and for every $n\in
\mathbf{N}$, there are point sets for which the area of every anchored
rectangle packing is at most $2/3$. The maximum area of an anchored
\emph{square} packing is always at least $5/32$ and sometimes at most $7/27$.
The above constructive lower bounds immediately yield constant-factor
approximations, of $7/12 -\varepsilon$ for rectangles and $5/32$ for squares,
for computing anchored packings of maximum area in $O(n\log n)$ time. We prove
that a simple greedy strategy achieves a $9/47$-approximation for anchored
square packings, and $1/3$ for lower-left anchored square packings. Reductions
to maximum weight independent set (MWIS) yield a QPTAS and a PTAS for anchored
rectangle and square packings in $n^{O(1/\varepsilon)}$ and $\exp({\rm
poly}(\log (n/\varepsilon)))$ time, respectively.
|
[
{
"version": "v1",
"created": "Mon, 29 Feb 2016 21:44:01 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Balas",
"Kevin",
""
],
[
"Dumitrescu",
"Adrian",
""
],
[
"Tóth",
"Csaba D.",
""
]
] |
new_dataset
| 0.996234 |
1603.00091
|
Dimitri Van Assche
|
Toon Calders, Dimitri Van Assche
|
PROMETHEE is Not Quadratic: An O(qn log(n)) Algorithm
|
16 pages, 2 figures
| null | null | null |
cs.DS cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is generally believed that the preference ranking method PROMETHEE has a
quadratic time complexity. In this paper, however, we present an exact
algorithm that computes PROMETHEE's net flow scores in time O(qn log(n)), where
q represents the number of criteria and n the number of alternatives. The
method is based on first sorting the alternatives after which the unicriterion
flow scores of all alternatives can be computed in one scan over the sorted
list of alternatives while maintaining a sliding window. This method works with
the linear and level criterion preference functions. The algorithm we present
is exact and, due to the sub-quadratic time complexity, vastly extends the
applicability of the PROMETHEE method. Experiments show that with the new
algorithm, PROMETHEE can scale up to millions of tuples.
|
[
{
"version": "v1",
"created": "Mon, 29 Feb 2016 23:25:51 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Calders",
"Toon",
""
],
[
"Van Assche",
"Dimitri",
""
]
] |
new_dataset
| 0.985926 |
1603.00100
|
Masahiro Kaminaga
|
Masahiro Kaminaga, Hideki Yoshikawa, Arimitsu Shikoda, Toshinori
Suzuki
|
Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem
|
18 pages, 2 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Rabin cryptosystem has been proposed protect the unique ID (UID) in
radio-frequency identification tags. The Rabin cryptosystem is a type of
lightweight public key system that is theoretetically quite secure; however it
is vulnerable to several side-channel attacks. In this paper, a crashing
modulus attack is presented as a new fault attack on modular squaring during
Rabin encryption. This attack requires only one fault in the public key if its
perturbed public key can be factored. Our simulation results indicate that the
attack is more than 50\% successful with several faults in practical time. A
complicated situation arises when reconstrucing the message, including the UID,
from ciphertext, i.e., the message and the perturbed public key are not
relatively prime. We present a complete and mathematically rigorous message
reconstruction algorithm for such a case. Moreover, we propose an exact formula
to obtain a number of candidate messages. We show that the number is not
generally equal to a power of two.
|
[
{
"version": "v1",
"created": "Tue, 1 Mar 2016 00:00:54 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Kaminaga",
"Masahiro",
""
],
[
"Yoshikawa",
"Hideki",
""
],
[
"Shikoda",
"Arimitsu",
""
],
[
"Suzuki",
"Toshinori",
""
]
] |
new_dataset
| 0.999646 |
1603.00154
|
Ping Hu
|
Ping Hu, Chi Wan Sung, and Terence H. Chan
|
Broadcast Repair for Wireless Distributed Storage Systems
|
6 pages, 4 figures, in Proc. International Conference on Information,
Communications and Signal Processing (ICICS), Singapore, Dec. 2015
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In wireless distributed storage systems, storage nodes are connected by
wireless channels, which are broadcast in nature. This paper exploits this
unique feature to design an efficient repair mechanism, called broadcast
repair, for wireless distributed storage systems with multiple-node failures.
Since wireless channels are typically bandwidth limited, we advocate a new
measure on repair performance called repair-transmission bandwidth, which
measures the average number of packets transmitted by helper nodes per failed
node. The fundamental tradeoff between storage amount and repair-transmission
bandwidth is obtained. It is shown that broadcast repair outperforms
cooperative repair, which is the basic repair method for wired distributed
storage systems with multiple-node failures, in terms of storage efficiency and
repair-transmission bandwidth, thus yielding a better tradeoff curve.
|
[
{
"version": "v1",
"created": "Tue, 1 Mar 2016 05:58:32 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Hu",
"Ping",
""
],
[
"Sung",
"Chi Wan",
""
],
[
"Chan",
"Terence H.",
""
]
] |
new_dataset
| 0.999271 |
1603.00302
|
Zhiguo Ding
|
Z. Ding and L. Dai and H. V. Poor
|
MIMO-NOMA Design for Small Packet Transmission in the Internet of Things
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A feature of the Internet of Things (IoT) is that some users in the system
need to be served quickly for small packet transmission. To address this
requirement, a new multiple-input multiple-output non-orthogonal multiple
access (MIMO-NOMA) scheme is designed in this paper, where one user is served
with its quality of service (QoS) requirement strictly met, and the other user
is served opportunistically by using the NOMA concept. The novelty of this new
scheme is that it confronts the challenge that most existing MIMO-NOMA schemes
rely on the assumption that users' channel conditions are different, a strong
assumption which may not be valid in practice. The developed precoding and
detection strategies can effectively create a significant difference between
the users' effective channel gains, and therefore the potential of NOMA can be
realized even if the users' original channel conditions are similar. Analytical
and numerical results are provided to demonstrate the performance of the
proposed MIMO-NOMA scheme.
|
[
{
"version": "v1",
"created": "Tue, 1 Mar 2016 15:00:49 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Ding",
"Z.",
""
],
[
"Dai",
"L.",
""
],
[
"Poor",
"H. V.",
""
]
] |
new_dataset
| 0.996908 |
1603.00406
|
Abhishek Sinha
|
Abhishek Sinha, Pradeepkumar Mani, Jie Liu, Ashley Flavel, Dave Maltz
|
Distributed Load Management Algorithms in Anycast-based CDNs
|
Submitted to the journal : Computer Networks. Part of the paper
appeared in the 53rd Annual Allerton Conference on Communication, Control and
Computing 2015. arXiv admin note: substantial text overlap with
arXiv:1509.08194
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Anycast is an internet addressing protocol where multiple hosts share the
same IP-address. A popular architecture for modern Content Distribution
Networks (CDNs) for geo-replicated services consists of multiple layers of
proxy nodes for service and co-located DNS-servers for load-balancing among
different proxies. Both the proxies and the DNS-servers use anycast addressing,
which offers simplicity of design and high availability of service at the cost
of partial loss of routing control. Due to the very nature of anycast,
redirection actions by a DNS-server also affects loads at nearby proxies in the
network. This makes the problem of optimal distributed load management highly
challenging. In this paper, we propose and evaluate an analytical framework to
formulate and solve the load-management problem in this context. We consider
two distinct algorithms. In the first half of the paper, we pose the
load-management problem as a convex optimization problem. Following a
Kelly-type dual decomposition technique, we propose a fully-distributed
load-management algorithm by introducing FastControl packets. This algorithm
utilizes the underlying anycast mechanism itself to enable effective
coordination among the nodes, thus obviating the need for any external control
channel. In the second half of the paper, we consider an alternative greedy
load-management heuristic, currently in production in a major commercial CDN.
We study its dynamical characteristics and analytically identify its
operational and stability properties. Finally, we critically evaluate both the
algorithms and explore their optimality-vs-complexity trade-off using
trace-driven simulations.
|
[
{
"version": "v1",
"created": "Tue, 1 Mar 2016 19:05:47 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Sinha",
"Abhishek",
""
],
[
"Mani",
"Pradeepkumar",
""
],
[
"Liu",
"Jie",
""
],
[
"Flavel",
"Ashley",
""
],
[
"Maltz",
"Dave",
""
]
] |
new_dataset
| 0.99872 |
1603.00431
|
Amirali Sanatinia
|
Amirali Sanatinia, Guevara Noubir
|
On GitHub's Programming Languages
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
GitHub is the most widely used social, distributed version control system. It
has around 10 million registered users and hosts over 16 million public
repositories. Its user base is also very active as GitHub ranks in the top 100
Alexa most popular websites. In this study, we collect GitHub's state in its
entirety. Doing so, allows us to study new aspects of the ecosystem. Although
GitHub is the home to millions of users and repositories, the analysis of
users' activity time-series reveals that only around 10% of them can be
considered active. The collected dataset allows us to investigate the
popularity of programming languages and existence of pattens in the relations
between users, repositories, and programming languages.
By, applying a k-means clustering method to the users-repositories commits
matrix, we find that two clear clusters of programming languages separate from
the remaining. One cluster forms for "web programming" languages (Java Script,
Ruby, PHP, CSS), and a second for "system oriented programming" languages (C,
C++, Python). Further classification, allow us to build a phylogenetic tree of
the use of programming languages in GitHub. Additionally, we study the main and
the auxiliary programming languages of the top 1000 repositories in more
detail. We provide a ranking of these auxiliary programming languages using
various metrics, such as percentage of lines of code, and PageRank.
|
[
{
"version": "v1",
"created": "Tue, 1 Mar 2016 20:03:44 GMT"
}
] | 2016-03-02T00:00:00 |
[
[
"Sanatinia",
"Amirali",
""
],
[
"Noubir",
"Guevara",
""
]
] |
new_dataset
| 0.999512 |
1505.05576
|
Shudi Yang
|
Shudi Yang and Zheng-An Yao
|
The Complete Weight Enumerator of Several Cyclic Codes
|
18 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cyclic codes have attracted a lot of research interest for decades. In this
paper, for an odd prime $p$, we propose a general strategy to compute the
complete weight enumerator of cyclic codes via the value distribution of the
corresponding exponential sums. As applications of this general strategy, we
determine the complete weight enumerator of several $p$-ary cyclic codes and
give some examples to illustrate our results.
|
[
{
"version": "v1",
"created": "Thu, 21 May 2015 01:23:49 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Sep 2015 09:03:05 GMT"
},
{
"version": "v3",
"created": "Sat, 27 Feb 2016 00:50:13 GMT"
}
] | 2016-03-01T00:00:00 |
[
[
"Yang",
"Shudi",
""
],
[
"Yao",
"Zheng-An",
""
]
] |
new_dataset
| 0.999074 |
1511.02793
|
Elman Mansimov
|
Elman Mansimov, Emilio Parisotto, Jimmy Lei Ba, Ruslan Salakhutdinov
|
Generating Images from Captions with Attention
|
Published as a conference paper at ICLR 2016
| null | null | null |
cs.LG cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by the recent progress in generative models, we introduce a model
that generates images from natural language descriptions. The proposed model
iteratively draws patches on a canvas, while attending to the relevant words in
the description. After training on Microsoft COCO, we compare our model with
several baseline generative models on image generation and retrieval tasks. We
demonstrate that our model produces higher quality samples than other
approaches and generates images with novel scene compositions corresponding to
previously unseen captions in the dataset.
|
[
{
"version": "v1",
"created": "Mon, 9 Nov 2015 18:18:53 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Feb 2016 17:56:29 GMT"
}
] | 2016-03-01T00:00:00 |
[
[
"Mansimov",
"Elman",
""
],
[
"Parisotto",
"Emilio",
""
],
[
"Ba",
"Jimmy Lei",
""
],
[
"Salakhutdinov",
"Ruslan",
""
]
] |
new_dataset
| 0.990447 |
1602.02445
|
Armin Wei{\ss}
|
Armin Wei{\ss}
|
A Logspace Solution to the Word and Conjugacy problem of Generalized
Baumslag-Solitar Groups
| null | null | null | null |
cs.CC cs.DM math.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Baumslag-Solitar groups were introduced in 1962 by Baumslag and Solitar as
examples for finitely presented non-Hopfian two-generator groups. Since then,
they served as examples for a wide range of purposes. As Baumslag-Solitar
groups are HNN extensions, there is a natural generalization in terms of graph
of groups.
Concerning algorithmic aspects of generalized Baumslag-Solitar groups,
several decidability results are known. Indeed, a straightforward application
of standard algorithms leads to a polynomial time solution of the word problem
(the question whether some word over the generators represents the identity of
the group). The conjugacy problem (the question whether two given words
represent conjugate group elements) is more complicated; still decidability has
been established by Anshel and Stebe for ordinary Baumslag-Solitar groups and
for generalized Baumslag-Solitar groups independently by Lockhart and Beeker.
However, up to now no precise complexity estimates have been given.
In this work, we give a LOGSPACE algorithm for both problems. More precisely,
we describe a uniform TC^0 many-one reduction of the word problem to the word
problem of the free group. Then we refine the known techniques for the
conjugacy problem and show that it can be solved in LOGSPACE. Moreover, for
ordinary Baumslag-Solitar groups also conjugacy is AC^0-Turing-reducible to the
word problem of the free group.
Finally, we consider uniform versions (where also the graph of groups is part
of the input) of both word and conjugacy problem: while the word problem still
is solvable in LOGSPACE, the conjugacy problem becomes EXPSPACE-complete.
|
[
{
"version": "v1",
"created": "Mon, 8 Feb 2016 01:07:24 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Feb 2016 02:43:38 GMT"
}
] | 2016-03-01T00:00:00 |
[
[
"Weiß",
"Armin",
""
]
] |
new_dataset
| 0.994062 |
1602.08668
|
Jean-Marc Valin
|
Jean-Marc Valin
|
Speex: A Free Codec For Free Speech
|
Presented at linux.conf.au 2006, Dunedin. 8 pages
| null | null | null |
cs.SD
|
http://creativecommons.org/licenses/by/4.0/
|
The Speex project has been started in 2002 to address the need for a free,
open-source speech codec. Speex is based on the Code Excited Linear Prediction
(CELP) algorithm and, unlike the previously existing Vorbis codec, is optimised
for transmitting speech for low latency communication over an unreliable packet
network. This paper presents an overview of Speex, the technology involved in
it and how it can be used in applications. The most recent developments in
Speex, such as the fixed-point port, acoustic echo cancellation and noise
suppression are also addressed.
|
[
{
"version": "v1",
"created": "Sun, 28 Feb 2016 04:38:33 GMT"
}
] | 2016-03-01T00:00:00 |
[
[
"Valin",
"Jean-Marc",
""
]
] |
new_dataset
| 0.999312 |
1602.08791
|
Vijay Gadepally
|
Vijay Gadepally, Jennie Duggan, Aaron Elmore, Jeremy Kepner, Samuel
Madden, Tim Mattson, Michael Stonebraker
|
The BigDAWG Architecture
| null | null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
BigDAWG is a polystore system designed to work on complex problems that
naturally span across different processing or storage engines. BigDAWG provides
an architecture that supports diverse database systems working with different
data models, support for the competing notions of location transparency and
semantic completeness via islands of information and a middleware that provides
a uniform multi-island interface. In this article, we describe the current
architecture of BigDAWG, its application on the MIMIC II medical dataset, and
our plans for the mechanics of cross-system queries. During the presentation,
we will also deliver a brief demonstration of the current version of BigDAWG.
|
[
{
"version": "v1",
"created": "Mon, 29 Feb 2016 00:49:11 GMT"
}
] | 2016-03-01T00:00:00 |
[
[
"Gadepally",
"Vijay",
""
],
[
"Duggan",
"Jennie",
""
],
[
"Elmore",
"Aaron",
""
],
[
"Kepner",
"Jeremy",
""
],
[
"Madden",
"Samuel",
""
],
[
"Mattson",
"Tim",
""
],
[
"Stonebraker",
"Michael",
""
]
] |
new_dataset
| 0.999675 |
1602.08855
|
Corneliu Florea
|
Corneliu Florea, Razvan Condorovici, Constantin Vertan, Raluca Boia,
Laura Florea, Ruxandra Vranceanu
|
Pandora: Description of a Painting Database for Art Movement Recognition
with Baselines and Perspectives
|
11 pages, 1 figure, 6 tables
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To facilitate computer analysis of visual art, in the form of paintings, we
introduce Pandora (Paintings Dataset for Recognizing the Art movement)
database, a collection of digitized paintings labelled with respect to the
artistic movement. Noting that the set of databases available as benchmarks for
evaluation is highly reduced and most existing ones are limited in variability
and number of images, we propose a novel large scale dataset of digital
paintings. The database consists of more than 7700 images from 12 art
movements. Each genre is illustrated by a number of images varying from 250 to
nearly 1000. We investigate how local and global features and classification
systems are able to recognize the art movement. Our experimental results
suggest that accurate recognition is achievable by a combination of various
categories.To facilitate computer analysis of visual art, in the form of
paintings, we introduce Pandora (Paintings Dataset for Recognizing the Art
movement) database, a collection of digitized paintings labelled with respect
to the artistic movement. Noting that the set of databases available as
benchmarks for evaluation is highly reduced and most existing ones are limited
in variability and number of images, we propose a novel large scale dataset of
digital paintings. The database consists of more than 7700 images from 12 art
movements. Each genre is illustrated by a number of images varying from 250 to
nearly 1000. We investigate how local and global features and classification
systems are able to recognize the art movement. Our experimental results
suggest that accurate recognition is achievable by a combination of various
categories.
|
[
{
"version": "v1",
"created": "Mon, 29 Feb 2016 08:24:01 GMT"
}
] | 2016-03-01T00:00:00 |
[
[
"Florea",
"Corneliu",
""
],
[
"Condorovici",
"Razvan",
""
],
[
"Vertan",
"Constantin",
""
],
[
"Boia",
"Raluca",
""
],
[
"Florea",
"Laura",
""
],
[
"Vranceanu",
"Ruxandra",
""
]
] |
new_dataset
| 0.999832 |
1602.09067
|
Michael Madaio
|
Michael Madaio, Shang-Tse Chen, Oliver L. Haimson, Wenwen Zhang, Xiang
Cheng, Matthew Hinds-Aldrich, Duen Horng Chau, Bistra Dilkina
|
Firebird: Predicting Fire Risk and Prioritizing Fire Inspections in
Atlanta
|
10 pages, 4 figures, submitted to KDD 2016
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Atlanta Fire Rescue Department (AFRD), like many municipal fire
departments, actively works to reduce fire risk by inspecting commercial
properties for potential hazards and fire code violations. However, AFRD's fire
inspection practices relied on tradition and intuition, with no existing
data-driven process for prioritizing fire inspections or identifying new
properties requiring inspection. In collaboration with AFRD, we developed the
Firebird framework to help municipal fire departments identify and prioritize
commercial property fire inspections, using machine learning, geocoding, and
information visualization. Firebird computes fire risk scores for over 5,000
buildings in the city, with true positive rates of up to 71% in predicting
fires. It has identified 6,096 new potential commercial properties to inspect,
based on AFRD's criteria for inspection. Furthermore, through an interactive
map, Firebird integrates and visualizes fire incidents, property information
and risk scores to help AFRD make informed decisions about fire inspections.
Firebird has already begun to make positive impact at both local and national
levels. It is improving AFRD's inspection processes and Atlanta residents'
safety, and was highlighted by National Fire Protection Association (NFPA) as a
best practice for using data to inform fire inspections.
|
[
{
"version": "v1",
"created": "Mon, 29 Feb 2016 17:48:41 GMT"
}
] | 2016-03-01T00:00:00 |
[
[
"Madaio",
"Michael",
""
],
[
"Chen",
"Shang-Tse",
""
],
[
"Haimson",
"Oliver L.",
""
],
[
"Zhang",
"Wenwen",
""
],
[
"Cheng",
"Xiang",
""
],
[
"Hinds-Aldrich",
"Matthew",
""
],
[
"Chau",
"Duen Horng",
""
],
[
"Dilkina",
"Bistra",
""
]
] |
new_dataset
| 0.997969 |
1305.7383
|
Antonio Villani
|
Roberto Di Pietro, Flavio Lombardi, Antonio Villani
|
CUDA Leaks: Information Leakage in GPU Architectures
| null | null |
10.1145/2801153
| null |
cs.CR cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Graphics Processing Units (GPUs) are deployed on most present server,
desktop, and even mobile platforms. Nowadays, a growing number of applications
leverage the high parallelism offered by this architecture to speed-up general
purpose computation. This phenomenon is called GPGPU computing (General Purpose
GPU computing). The aim of this work is to discover and highlight security
issues related to CUDA, the most widespread platform for GPGPU computing. In
particular, we provide details and proofs-of-concept about a novel set of
vulnerabilities CUDA architectures are subject to, that could be exploited to
cause severe information leak. Following (detailed) intuitions rooted on sound
engineering security, we performed several experiments targeting the last two
generations of CUDA devices: Fermi and Kepler. We discovered that these two
families do suffer from information leakage vulnerabilities. In particular,
some vulnerabilities are shared between the two architectures, while others are
idiosyncratic of the Kepler architecture. As a case study, we report the impact
of one of these vulnerabilities on a GPU implementation of the AES encryption
algorithm. We also suggest software patches and alternative approaches to
tackle the presented vulnerabilities. To the best of our knowledge this is the
first work showing that information leakage in CUDA is possible using just
standard CUDA instructions. We expect our work to pave the way for further
research in the field.
|
[
{
"version": "v1",
"created": "Fri, 31 May 2013 12:57:56 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Jul 2013 14:55:46 GMT"
}
] | 2016-02-29T00:00:00 |
[
[
"Di Pietro",
"Roberto",
""
],
[
"Lombardi",
"Flavio",
""
],
[
"Villani",
"Antonio",
""
]
] |
new_dataset
| 0.977783 |
1602.07235
|
Manuel Wettstein
|
Manuel Wettstein
|
Trapezoidal Diagrams, Upward Triangulations, and Prime Catalan Numbers
|
Added affiliation. Fixed typos
| null | null | null |
cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The d-dimensional Catalan numbers form a well-known sequence of numbers which
count balanced bracket expressions over an alphabet of size d. In this paper,
we introduce and study what we call d-dimensional prime Catalan numbers, a
sequence of numbers which count only a very specific subset of indecomposable
balanced bracket expressions.
We further introduce the notion of a trapezoidal diagram of a crossing-free
geometric graph, such as a triangulation or a crossing-free perfect matching.
In essence, such a diagram is obtained by augmenting the geometric graph in
question with its trapezoidal decomposition, and then forgetting about the
precise coordinates of individual vertices while preserving the vertical
visibility relations between vertices and segments. We note that trapezoidal
diagrams of triangulations are closely related to abstract upward
triangulations.
We study the numbers of such diagrams in the cases of (i) perfect matchings
and (ii) triangulations. We give bijective proofs which establish relations
with 3-dimensional (prime) Catalan numbers. This allows us to determine the
corresponding exponential growth rates exactly as (i) 5.196^n and (ii) 23.459^n
(bases are rounded to 3 decimal places).
Finally, we give lower bounds for the maximum number of embeddings of a
trapezoidal diagram on any given point set.
|
[
{
"version": "v1",
"created": "Tue, 23 Feb 2016 17:02:53 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Feb 2016 12:02:35 GMT"
}
] | 2016-02-29T00:00:00 |
[
[
"Wettstein",
"Manuel",
""
]
] |
new_dataset
| 0.998736 |
1602.08141
|
Thomas Castelli
|
Thomas Castelli, Aidean Sharghi, Don Harper, Alain Tremeau and Mubarak
Shah
|
Autonomous navigation for low-altitude UAVs in urban areas
| null | null | null | null |
cs.RO cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years, consumer Unmanned Aerial Vehicles have become very popular,
everyone can buy and fly a drone without previous experience, which raises
concern in regards to regulations and public safety. In this paper, we present
a novel approach towards enabling safe operation of such vehicles in urban
areas. Our method uses geodetically accurate dataset images with Geographical
Information System (GIS) data of road networks and buildings provided by Google
Maps, to compute a weighted A* shortest path from start to end locations of a
mission. Weights represent the potential risk of injuries for individuals in
all categories of land-use, i.e. flying over buildings is considered safer than
above roads. We enable safe UAV operation in regards to 1- land-use by
computing a static global path dependent on environmental structures, and 2-
avoiding flying over moving objects such as cars and pedestrians by dynamically
optimizing the path locally during the flight. As all input sources are first
geo-registered, pixels and GPS coordinates are equivalent, it therefore allows
us to generate an automated and user-friendly mission with GPS waypoints
readable by consumer drones' autopilots. We simulated 54 missions and show
significant improvement in maximizing UAV's standoff distance to moving objects
with a quantified safety parameter over 40 times better than the naive straight
line navigation.
|
[
{
"version": "v1",
"created": "Thu, 25 Feb 2016 22:43:14 GMT"
}
] | 2016-02-29T00:00:00 |
[
[
"Castelli",
"Thomas",
""
],
[
"Sharghi",
"Aidean",
""
],
[
"Harper",
"Don",
""
],
[
"Tremeau",
"Alain",
""
],
[
"Shah",
"Mubarak",
""
]
] |
new_dataset
| 0.997194 |
1506.07577
|
Gilbert Bernstein
|
Gilbert Louis Bernstein, Chinmayee Shah, Crystal Lemire, Zachary
DeVito, Matthew Fisher, Philip Levis, Pat Hanrahan
|
Ebb: A DSL for Physical Simulation on CPUs and GPUs
| null | null | null | null |
cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Designing programming environments for physical simulation is challenging
because simulations rely on diverse algorithms and geometric domains. These
challenges are compounded when we try to run efficiently on heterogeneous
parallel architectures. We present Ebb, a domain-specific language (DSL) for
simulation, that runs efficiently on both CPUs and GPUs. Unlike previous DSLs,
Ebb uses a three-layer architecture to separate (1) simulation code, (2)
definition of data structures for geometric domains, and (3) runtimes
supporting parallel architectures. Different geometric domains are implemented
as libraries that use a common, unified, relational data model. By structuring
the simulation framework in this way, programmers implementing simulations can
focus on the physics and algorithms for each simulation without worrying about
their implementation on parallel computers. Because the geometric domain
libraries are all implemented using a common runtime based on relations, new
geometric domains can be added as needed, without specifying the details of
memory management, mapping to different parallel architectures, or having to
expand the runtime's interface.
We evaluate Ebb by comparing it to several widely used simulations,
demonstrating comparable performance to hand-written GPU code where available,
and surpassing existing CPU performance optimizations by up to 9$\times$ when
no GPU code exists.
|
[
{
"version": "v1",
"created": "Wed, 24 Jun 2015 22:32:41 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Jan 2016 02:25:31 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Feb 2016 23:42:30 GMT"
}
] | 2016-02-26T00:00:00 |
[
[
"Bernstein",
"Gilbert Louis",
""
],
[
"Shah",
"Chinmayee",
""
],
[
"Lemire",
"Crystal",
""
],
[
"DeVito",
"Zachary",
""
],
[
"Fisher",
"Matthew",
""
],
[
"Levis",
"Philip",
""
],
[
"Hanrahan",
"Pat",
""
]
] |
new_dataset
| 0.999231 |
1602.00377
|
Farhad Akhoundi
|
Farhad Akhoundi, Mohammad Vahid Jamali, Navid Banihassan, Hamzeh
Beyranvand, Amir Minoofar, Jawad A. Salehi
|
Cellular Underwater Wireless Optical CDMA Network: Potentials and
Challenges
|
11 pages, 10 figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Underwater wireless optical communications is an emerging solution to the
expanding demand for broadband links in oceans and seas. In this paper, a
cellular underwater wireless optical code division multiple-access (UW-OCDMA)
network is proposed to provide broadband links for commercial and military
applications. The optical orthogonal codes (OOC) are employed as signature
codes of underwater mobile users. Fundamental key aspects of the network such
as its backhaul architecture, its potential applications and its design
challenges are presented. In particular, the proposed network is used as
infrastructure of centralized, decentralized and relay-assisted underwater
sensor networks for high-speed real-time monitoring. Furthermore, a promising
underwater localization and positioning scheme based on this cellular network
is presented. Finally, probable design challenges such as cell edge coverage,
blockage avoidance, power control and increasing the network capacity are
addressed.
|
[
{
"version": "v1",
"created": "Mon, 1 Feb 2016 03:26:32 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Feb 2016 02:35:28 GMT"
}
] | 2016-02-26T00:00:00 |
[
[
"Akhoundi",
"Farhad",
""
],
[
"Jamali",
"Mohammad Vahid",
""
],
[
"Banihassan",
"Navid",
""
],
[
"Beyranvand",
"Hamzeh",
""
],
[
"Minoofar",
"Amir",
""
],
[
"Salehi",
"Jawad A.",
""
]
] |
new_dataset
| 0.998293 |
1602.06977
|
Ethan Fast
|
Ethan Fast, William McGrath, Pranav Rajpurkar, Michael Bernstein
|
Augur: Mining Human Behaviors from Fiction to Power Interactive Systems
|
CHI: ACM Conference on Human Factors in Computing Systems 2016
| null |
10.1145/2858036.2858528
| null |
cs.HC cs.AI cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
From smart homes that prepare coffee when we wake, to phones that know not to
interrupt us during important conversations, our collective visions of HCI
imagine a future in which computers understand a broad range of human
behaviors. Today our systems fall short of these visions, however, because this
range of behaviors is too large for designers or programmers to capture
manually. In this paper, we instead demonstrate it is possible to mine a broad
knowledge base of human behavior by analyzing more than one billion words of
modern fiction. Our resulting knowledge base, Augur, trains vector models that
can predict many thousands of user activities from surrounding objects in
modern contexts: for example, whether a user may be eating food, meeting with a
friend, or taking a selfie. Augur uses these predictions to identify actions
that people commonly take on objects in the world and estimate a user's future
activities given their current situation. We demonstrate Augur-powered,
activity-based systems such as a phone that silences itself when the odds of
you answering it are low, and a dynamic music player that adjusts to your
present activity. A field deployment of an Augur-powered wearable camera
resulted in 96% recall and 71% precision on its unsupervised predictions of
common daily activities. A second evaluation where human judges rated the
system's predictions over a broad set of input images found that 94% were rated
sensible.
|
[
{
"version": "v1",
"created": "Mon, 22 Feb 2016 21:44:05 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Feb 2016 20:54:28 GMT"
}
] | 2016-02-26T00:00:00 |
[
[
"Fast",
"Ethan",
""
],
[
"McGrath",
"William",
""
],
[
"Rajpurkar",
"Pranav",
""
],
[
"Bernstein",
"Michael",
""
]
] |
new_dataset
| 0.98893 |
1602.07736
|
Yiming Wan
|
Yiming Wan, Tamas Keviczky, Michel Verhaegen
|
Robust Air Data Sensor Fault Diagnosis With Enhanced Fault Sensitivity
Using Moving Horizon Estimation
| null | null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper investigates robust fault diagnosis of multiple air data sensor
faults in the presence of winds. The trade-off between robustness to winds and
sensitivity to faults is challenging due to simultaneous influence of winds and
latent faults on monitored sensors. Different from conventional residual
generators that do not consider any constraints, we propose a constrained
residual generator using moving horizon estimation. The main contribution is
improved fault sensitivity by exploiting known bounds on winds in residual
generation. By analyzing the Karush-Kuhn-Tucker conditions of the formulated
moving horizon estimation problem, it is shown that this improvement is
attributed to active inequality constraints caused by faults. When the
weighting matrices in the moving horizon estimation problem are tuned to
increase robustness to winds, its fault sensitivity does not simply decrease as
one would expect in conventional unconstrained residual generators. Instead,
its fault sensitivity increases when the fault is large enough to activate some
inequality constraints. This fault sensitivity improvement is not restricted to
this particular application, but can be achieved by any general moving horizon
estimation based residual generator. A high-fidelity Airbus simulator is used
to illustrate the advantage of our proposed approach in terms of fault
sensitivity.
|
[
{
"version": "v1",
"created": "Wed, 24 Feb 2016 22:27:53 GMT"
}
] | 2016-02-26T00:00:00 |
[
[
"Wan",
"Yiming",
""
],
[
"Keviczky",
"Tamas",
""
],
[
"Verhaegen",
"Michel",
""
]
] |
new_dataset
| 0.995347 |
1602.07767
|
Eric Hamke
|
Eric E. Hamke, Ramiro Jordan, Manel Ramon-Martinez
|
Breath Activity Detection Algorithm
| null | null | null | null |
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report describes the use of a support vector machines with a novel
kernel, to determine the breathing rate and inhalation duration of a fire
fighter wearing a Self-Contained Breathing Apparatus. With this information, an
incident commander can monitor the firemen in his command for exhaustion and
ensure timely rotation of personnel to ensure overall fire fighter safety
|
[
{
"version": "v1",
"created": "Thu, 25 Feb 2016 01:41:34 GMT"
}
] | 2016-02-26T00:00:00 |
[
[
"Hamke",
"Eric E.",
""
],
[
"Jordan",
"Ramiro",
""
],
[
"Ramon-Martinez",
"Manel",
""
]
] |
new_dataset
| 0.977877 |
1305.4508
|
Abidin Kaya
|
Abidin Kaya, Bahattin Yildiz, \.Irfan Siap
|
Quadratic Residue Codes over F_p+vF_p and their Gray Images
|
research article, under review since November 2012
|
Journal of Pure and Applied Algebra Volume 218 Issue 11 2014
|
10.1016/j.jpaa.2014.03.002
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper quadratic residue codes over the ring Fp + vFp are introduced
in terms of their idempotent generators. The structure of these codes is
studied and it is observed that these codes share similar properties with
quadratic residue codes over finite fields. For the case p = 2, Euclidean and
Hermitian self-dual families of codes as extended quadratic residue codes are
considered and two optimal Hermitian self-dual codes are obtained as examples.
Moreover, a substantial number of good p-ary codes are obtained as images of
quadratic residue codes over Fp +vFp in the cases where p is an odd prime.
These results are presented in tables.
|
[
{
"version": "v1",
"created": "Mon, 20 May 2013 12:00:40 GMT"
}
] | 2016-02-25T00:00:00 |
[
[
"Kaya",
"Abidin",
""
],
[
"Yildiz",
"Bahattin",
""
],
[
"Siap",
"İrfan",
""
]
] |
new_dataset
| 0.998725 |
1308.0580
|
Abidin Kaya
|
Abidin Kaya, Bahattin Yildiz, and Irfan Siap
|
New extremal binary self-dual codes of length 68 from quadratic residue
codes over f_2+uf_2+u^2f_2
|
Under review
|
Finite Fileds and Their Applications Volume 29 2014
|
10.1016/j.ffa.2014.04.009
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, quadratic reside codes over the ring F2 +uF2 +u^2F2 with u^3 =
u are considered. A duality and distance preserving Gray map from F2 + uF2 +
u^2F2 to (F_2)^3 is defined. By using quadratic double circulant, quadratic
bordered double circulant constructions and their extensions self- dual codes
of different lengths are obtained. As Gray images of these codes and their
extensions, a substantial number of new extremal self-dual binary codes are
found. More precisely, thirty two new extremal binary self-dual codes of length
68, 363 Type I codes of parameters [72; 36; 12], a Type II [72; 36; 12] code
and a Type II [96; 48; 16] code with new weight enumerators are obtained
through these constructions. The results are tabulated.
|
[
{
"version": "v1",
"created": "Fri, 2 Aug 2013 18:56:23 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Dec 2013 13:16:10 GMT"
}
] | 2016-02-25T00:00:00 |
[
[
"Kaya",
"Abidin",
""
],
[
"Yildiz",
"Bahattin",
""
],
[
"Siap",
"Irfan",
""
]
] |
new_dataset
| 0.989192 |
1511.00849
|
Sebastian van de Hoef
|
Sebastian van de Hoef, Karl H. Johansson, Dimos V. Dimarogonas
|
Computing Feasible Vehicle Platooning Opportunities for Transport
Assignments
|
6 pages, 2 figures, to appear in CTS 2016, 14-th IFAC Symposium on
Control in Transportation Systems
| null | null | null |
cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vehicle platooning facilitates the partial automation of vehicles and can
significantly reduce fuel consumption. Mobile communication infrastructure
makes it possible to dynamically coordinate the formation of platoons en route.
We consider a centralized system that provides trucks with routes and speed
profiles allowing them to dynamically form platoons during their journeys. For
this to work, all possible pairs of vehicles that can platoon based on their
location, destination, and other constraints have to be identified. The
presented approach scales well to large vehicle fleets and realistic road
networks by extracting features from the transport assignments of the vehicles
and rules out a majority of possible pairs based on these features only. Merely
a small number of remaining pairs are considered in depth by a complete and
computationally expensive algorithm. This algorithm conclusively decides if
platooning is possible for a pair based on the complete data associated with
the two vehicles. We derive appropriate features for the problem and
demonstrate the effectiveness of the approach in a simulation example.
|
[
{
"version": "v1",
"created": "Tue, 3 Nov 2015 10:37:49 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Feb 2016 09:13:32 GMT"
}
] | 2016-02-25T00:00:00 |
[
[
"van de Hoef",
"Sebastian",
""
],
[
"Johansson",
"Karl H.",
""
],
[
"Dimarogonas",
"Dimos V.",
""
]
] |
new_dataset
| 0.986995 |
1511.07345
|
Shu Sun Ms.
|
Shu Sun, George R. MacCartney Jr., Theodore S. Rappaport
|
Millimeter-Wave Distance-Dependent Large-Scale Propagation Measurements
and Path Loss Models for Outdoor and Indoor 5G Systems
|
in the 10th European Conference on Antennas and Propagation, Davos,
Switzerland, April 2016
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents millimeter-wave propagation measurements for urban
micro-cellular and indoor office scenarios at 28 GHz and 73 GHz, and
investigates the corresponding path loss using five types of path loss models,
the singlefrequency floating-intercept (FI) model, single-frequency closein
(CI) free space reference distance model, multi-frequency alpha-beta-gamma
(ABG) model, multi-frequency CI model, and multi-frequency CI model with a
frequency-weighted path loss exponent (CIF), in both line-of-sight and
non-line-of-sight environments. Results show that the CI and CIF models provide
good estimation and exhibit stable behavior over frequencies and distances,
with a solid physical basis and less computational complexity when compared
with the FI and ABG models. Furthermore, path loss in outdoor scenarios shows
little dependence on frequency beyond the first meter of free space
propagation, whereas path loss tends to increase with frequency in addition to
the increased free space path loss in indoor environments. Therefore, the CI
model is suitable for outdoor environments over multiple frequencies, while the
CIF model is more appropriate for indoor modeling. This work shows that both
the CI and CIF models use fewer parameters and offer more convenient closedform
expressions suitable for analysis, without compromising model accuracy when
compared to current 3GPP and WINNER path loss models.
|
[
{
"version": "v1",
"created": "Mon, 23 Nov 2015 18:14:07 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Nov 2015 20:57:44 GMT"
},
{
"version": "v3",
"created": "Sun, 31 Jan 2016 21:49:07 GMT"
},
{
"version": "v4",
"created": "Wed, 24 Feb 2016 00:31:44 GMT"
}
] | 2016-02-25T00:00:00 |
[
[
"Sun",
"Shu",
""
],
[
"MacCartney",
"George R.",
"Jr."
],
[
"Rappaport",
"Theodore S.",
""
]
] |
new_dataset
| 0.998189 |
1601.06923
|
Nevin L. Zhang
|
Chen Fu, Nevin L. Zhang, Bao Xin Chen, Zhou Rong Chen, Xiang Lan Jin,
Rong Juan Guo, Zhi Gang Chen, Yun Ling Zhang
|
Identification and classification of TCM syndrome types among patients
with vascular mild cognitive impairment using latent tree analysis
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Objective: To treat patients with vascular mild cognitive impairment (VMCI)
using TCM, it is necessary to classify the patients into TCM syndrome types and
to apply different treatments to different types. We investigate how to
properly carry out the classification using a novel data-driven method known as
latent tree analysis.
Method: A cross-sectional survey on VMCI was carried out in several regions
in northern China from 2008 to 2011, which resulted in a data set that involves
803 patients and 93 symptoms. Latent tree analysis was performed on the data to
reveal symptom co-occurrence patterns, and the patients were partitioned into
clusters in multiple ways based on the patterns. The patient clusters were
matched up with syndrome types, and population statistics of the clusters are
used to quantify the syndrome types and to establish classification rules.
Results: Eight syndrome types are identified: Qi Deficiency, Qi Stagnation,
Blood Deficiency, Blood Stasis, Phlegm-Dampness, Fire-Heat, Yang Deficiency,
and Yin Deficiency. The prevalence and symptom occurrence characteristics of
each syndrome type are determined. Quantitative classification rules are
established for determining whether a patient belongs to each of the syndrome
types.
Conclusions: A solution for the TCM syndrome classification problem
associated with VMCI is established based on the latent tree analysis of
unlabeled symptom survey data. The results can be used as a reference in clinic
practice to improve the quality of syndrome differentiation and to reduce
diagnosis variances across physicians. They can also be used for patient
selection in research projects aimed at finding biomarkers for the syndrome
types and in randomized control trials aimed at determining the efficacy of TCM
treatments of VMCI.
|
[
{
"version": "v1",
"created": "Tue, 26 Jan 2016 08:34:56 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Feb 2016 16:04:24 GMT"
}
] | 2016-02-25T00:00:00 |
[
[
"Fu",
"Chen",
""
],
[
"Zhang",
"Nevin L.",
""
],
[
"Chen",
"Bao Xin",
""
],
[
"Chen",
"Zhou Rong",
""
],
[
"Jin",
"Xiang Lan",
""
],
[
"Guo",
"Rong Juan",
""
],
[
"Chen",
"Zhi Gang",
""
],
[
"Zhang",
"Yun Ling",
""
]
] |
new_dataset
| 0.970952 |
1602.07340
|
Krispin Davies
|
Krispin Davies, Alejandro Ramirez-Serrano
|
A Reconfigurable USAR Robot Designed for Traversing Complex 3D Terrain
| null |
Proceedings of 22nd Canadian Congress of Applied Mechanics
(CANCAM2009), vol. 1, pp. 209-210
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of robotics in Urban Search and Rescue (USAR) is growing steadily
from their initial inception during the 2001 World Trade Centre incident.
Despite years of progress, the core design of robots currently in use for USAR
purposes has deviated little, favoring software and control development and
optimization of the basic robot template to improve performance instead.
Presented here is a novel design description of the Cricket, an advanced robot
with a broader range of physical capabilities than traditional USAR robots. By
incorporating the tracked structure of earlier robots, appreciated for energy
efficiency and robustness, into a multi-limbed walking design, the Cricket
enables the use of advanced locomotion techniques. The ability to climb over
obstacles many times the height of the robot, ascend vertical shafts without
the assistance of a tether, and traverse rough and near vertical terrain
improves the Cricket's capability to successfully locate victims in confined
spaces.
|
[
{
"version": "v1",
"created": "Thu, 16 Apr 2015 06:16:41 GMT"
}
] | 2016-02-25T00:00:00 |
[
[
"Davies",
"Krispin",
""
],
[
"Ramirez-Serrano",
"Alejandro",
""
]
] |
new_dataset
| 0.999861 |
1602.07383
|
Weiguang Ding
|
Weiguang Ding, Graham Taylor
|
Automatic Moth Detection from Trap Images for Pest Management
|
Preprints accepted by Computers and electronics in agriculture
| null | null | null |
cs.CV cs.LG cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Monitoring the number of insect pests is a crucial component in
pheromone-based pest management systems. In this paper, we propose an automatic
detection pipeline based on deep learning for identifying and counting pests in
images taken inside field traps. Applied to a commercial codling moth dataset,
our method shows promising performance both qualitatively and quantitatively.
Compared to previous attempts at pest detection, our approach uses no
pest-specific engineering which enables it to adapt to other species and
environments with minimal human effort. It is amenable to implementation on
parallel hardware and therefore capable of deployment in settings where
real-time performance is required.
|
[
{
"version": "v1",
"created": "Wed, 24 Feb 2016 03:35:42 GMT"
}
] | 2016-02-25T00:00:00 |
[
[
"Ding",
"Weiguang",
""
],
[
"Taylor",
"Graham",
""
]
] |
new_dataset
| 0.951072 |
1602.07407
|
Fatemeh Keshavarz-Kohjerdi
|
Fatemeh Keshavarz-Kohjerdi and Alireza Bagheri
|
Hamiltonian Paths in C-shaped Grid Graphs
|
28 pages, 31 figures, and 20 references
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the Hamiltonian path problem in C-shaped grid graphs, and present
the necessary and sufficient conditions for the existence of a Hamiltonian path
between two given vertices in these graphs. We also give a linear-time
algorithm for finding a Hamiltonian path between two given vertices of a
C-shaped grid graph, if it exists.
|
[
{
"version": "v1",
"created": "Wed, 24 Feb 2016 06:05:53 GMT"
}
] | 2016-02-25T00:00:00 |
[
[
"Keshavarz-Kohjerdi",
"Fatemeh",
""
],
[
"Bagheri",
"Alireza",
""
]
] |
new_dataset
| 0.992908 |
1602.07504
|
Petr Golovach
|
Petr A. Golovach, Pinar Heggernes and Dieter Kratsch
|
Enumeration and Maximum Number of Minimal Connected Vertex Covers in
Graphs
| null | null | null | null |
cs.DS cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Connected Vertex Cover is one of the classical problems of computer science,
already mentioned in the monograph of Garey and Johnson. Although the
optimization and decision variants of finding connected vertex covers of
minimum size or weight are well studied, surprisingly there is no work on the
enumeration or maximum number of minimal connected vertex covers of a graph. In
this paper we show that the maximum number of minimal connected vertex covers
of a graph is at most 1.8668^n, and these can be enumerated in time
O(1.8668^n). For graphs of chordality at most 5, we are able to give a better
upper bound, and for chordal graphs and distance-hereditary graphs we are able
to give tight bounds on the maximum number of minimal connected vertex covers.
|
[
{
"version": "v1",
"created": "Wed, 24 Feb 2016 13:50:01 GMT"
}
] | 2016-02-25T00:00:00 |
[
[
"Golovach",
"Petr A.",
""
],
[
"Heggernes",
"Pinar",
""
],
[
"Kratsch",
"Dieter",
""
]
] |
new_dataset
| 0.998965 |
1501.05387
|
Yangzihao Wang
|
Yangzihao Wang, Andrew Davidson, Yuechao Pan, Yuduo Wu, Andy Riffel,
and John D. Owens
|
Gunrock: A High-Performance Graph Processing Library on the GPU
|
14 pages, accepted by PPoPP'16 (removed the text repetition in the
previous version v5)
| null |
10.1145/2851141.2851145
| null |
cs.DC
|
http://creativecommons.org/licenses/by/4.0/
|
For large-scale graph analytics on the GPU, the irregularity of data access
and control flow, and the complexity of programming GPUs have been two
significant challenges for developing a programmable high-performance graph
library. "Gunrock", our graph-processing system designed specifically for the
GPU, uses a high-level, bulk-synchronous, data-centric abstraction focused on
operations on a vertex or edge frontier. Gunrock achieves a balance between
performance and expressiveness by coupling high performance GPU computing
primitives and optimization strategies with a high-level programming model that
allows programmers to quickly develop new graph primitives with small code size
and minimal GPU programming knowledge. We evaluate Gunrock on five key graph
primitives and show that Gunrock has on average at least an order of magnitude
speedup over Boost and PowerGraph, comparable performance to the fastest GPU
hardwired primitives, and better performance than any other GPU high-level
graph library.
|
[
{
"version": "v1",
"created": "Thu, 22 Jan 2015 04:21:53 GMT"
},
{
"version": "v2",
"created": "Fri, 27 Mar 2015 21:10:00 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Sep 2015 08:11:02 GMT"
},
{
"version": "v4",
"created": "Wed, 14 Oct 2015 03:50:54 GMT"
},
{
"version": "v5",
"created": "Sat, 23 Jan 2016 01:34:16 GMT"
},
{
"version": "v6",
"created": "Mon, 22 Feb 2016 22:40:09 GMT"
}
] | 2016-02-24T00:00:00 |
[
[
"Wang",
"Yangzihao",
""
],
[
"Davidson",
"Andrew",
""
],
[
"Pan",
"Yuechao",
""
],
[
"Wu",
"Yuduo",
""
],
[
"Riffel",
"Andy",
""
],
[
"Owens",
"John D.",
""
]
] |
new_dataset
| 0.973912 |
1507.01628
|
Abidin Kaya
|
Abidin Kaya, Bahattin Yildiz and Abdullah Pa\c{s}a
|
New extremal binary self-dual codes from a modified four circulant
construction
|
7 tables
|
Discrete Mathematics Vol 338 Issue 3 2016
|
10.1016/j.disc.2015.09.010
| null |
cs.IT math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we propose a modified four circulant construction for self-dual
codes and a bordered version of the construction using the properties of
\lambda-circulant and \lambda-reverse circulant matrices. By using the
constructions on $F_2$, we obtain new binary codes of lengths 64 and 68. We
also apply the constructions to the ring $R_2$ and considering the $F_2$ and
$R_1$-extensions, we obtain new singly-even extremal binary self-dual codes of
lengths 66 and 68. More precisely, we find 3 new codes of length 64, 15 new
codes of length 66 and 22 new codes of length 68. These codes all have weight
enumerators with parameters that were not known to exist in the literature.
|
[
{
"version": "v1",
"created": "Mon, 6 Jul 2015 21:34:56 GMT"
}
] | 2016-02-24T00:00:00 |
[
[
"Kaya",
"Abidin",
""
],
[
"Yildiz",
"Bahattin",
""
],
[
"Paşa",
"Abdullah",
""
]
] |
new_dataset
| 0.967388 |
1511.00394
|
Francis Bach
|
Francis Bach (LIENS, SIERRA)
|
Submodular Functions: from Discrete to Continous Domains
| null | null | null | null |
cs.LG math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Submodular set-functions have many applications in combinatorial
optimization, as they can be minimized and approximately maximized in
polynomial time. A key element in many of the algorithms and analyses is the
possibility of extending the submodular set-function to a convex function,
which opens up tools from convex optimization. Submodularity goes beyond
set-functions and has naturally been considered for problems with multiple
labels or for functions defined on continuous domains, where it corresponds
essentially to cross second-derivatives being nonpositive. In this paper, we
show that most results relating submodularity and convexity for set-functions
can be extended to all submodular functions. In particular, (a) we naturally
define a continuous extension in a set of probability measures, (b) show that
the extension is convex if and only if the original function is submodular, (c)
prove that the problem of minimizing a submodular function is equivalent to a
typically non-smooth convex optimization problem, and (d) propose another
convex optimization problem with better computational properties (e.g., a
smooth dual problem). Most of these extensions from the set-function situation
are obtained by drawing links with the theory of multi-marginal optimal
transport, which provides also a new interpretation of existing results for
set-functions. We then provide practical algorithms to minimize generic
submodular functions on discrete domains, with associated convergence rates.
|
[
{
"version": "v1",
"created": "Mon, 2 Nov 2015 06:33:59 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Feb 2016 19:46:11 GMT"
}
] | 2016-02-24T00:00:00 |
[
[
"Bach",
"Francis",
"",
"LIENS, SIERRA"
]
] |
new_dataset
| 0.992993 |
1601.08049
|
Juan Gorraiz
|
Juan Gorraiz, Martin Wieland and Christian Gumpenberger
|
Individual Bibliometric Assessment @ University of Vienna: From Numbers
to Multidimensional Profiles
|
Preprint
| null |
10.5281/zenodo.45402
| null |
cs.DL
|
http://creativecommons.org/licenses/by/4.0/
|
This paper shows how bibliometric assessment can be implemented at individual
level. This has been successfully done at the University of Vienna carried out
by the Bibliometrics and Publication Strategies Department of the Vienna
University Library. According to the department's philosophy, bibliometrics is
not only a helpful evaluation instrument in order to complement the peer review
system. It is also meant as a compass for researchers in the "publish or
perish" dilemma in order to increase general visibility and to optimize
publication strategies. The individual assessment comprises of an interview
with the researcher under evaluation, the elaboration of a bibliometric report
of the researcher's publication output, the discussion and validation of the
obtained results with the researcher under evaluation as well as further
optional analyses. The produced bibliometric reports are provided to the
researchers themselves and inform them about the quantitative aspects of their
research output. They also serve as a basis for further discussion concerning
their publication strategies. These reports are eventually intended for
informed peer review practices, and are therefore forwarded to the quality
assurance and the rector's office and finally sent to the peers. The most
important feature of the generated bibliometric report is its multidimensional
and individual character. It relies on a variety of basic indicators and
further control parameters in order to foster comprehensibility. Researchers,
administrative staff and peers alike have confirmed the usefulness of this
bibliometric approach. An increasing demand is noticeable. In total, 33
bibliometric reports have been delivered so far. Moreover, similar reports have
also been produced for the bibliometric assessment of two faculties with great
success.
|
[
{
"version": "v1",
"created": "Fri, 29 Jan 2016 10:54:56 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Feb 2016 12:45:12 GMT"
}
] | 2016-02-24T00:00:00 |
[
[
"Gorraiz",
"Juan",
""
],
[
"Wieland",
"Martin",
""
],
[
"Gumpenberger",
"Christian",
""
]
] |
new_dataset
| 0.987347 |
1602.06979
|
Ethan Fast
|
Ethan Fast, Binbin Chen, Michael Bernstein
|
Empath: Understanding Topic Signals in Large-Scale Text
|
CHI: ACM Conference on Human Factors in Computing Systems 2016
| null |
10.1145/2858036.2858535
| null |
cs.CL cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Human language is colored by a broad range of topics, but existing text
analysis tools only focus on a small number of them. We present Empath, a tool
that can generate and validate new lexical categories on demand from a small
set of seed terms (like "bleed" and "punch" to generate the category violence).
Empath draws connotations between words and phrases by deep learning a neural
embedding across more than 1.8 billion words of modern fiction. Given a small
set of seed words that characterize a category, Empath uses its neural
embedding to discover new related terms, then validates the category with a
crowd-powered filter. Empath also analyzes text across 200 built-in,
pre-validated categories we have generated from common topics in our web
dataset, like neglect, government, and social media. We show that Empath's
data-driven, human validated categories are highly correlated (r=0.906) with
similar categories in LIWC.
|
[
{
"version": "v1",
"created": "Mon, 22 Feb 2016 21:47:43 GMT"
}
] | 2016-02-24T00:00:00 |
[
[
"Fast",
"Ethan",
""
],
[
"Chen",
"Binbin",
""
],
[
"Bernstein",
"Michael",
""
]
] |
new_dataset
| 0.999688 |
1602.07165
|
Jeroen Keiren
|
Jeroen J.A. Keiren, Peter Fontana, Rance Cleaveland
|
Corrections to A Menagerie of Timed Automata
|
9 pages, corrects a technical error in the ACM Computing Surveys
paper mentioned in the title, that can be found at
http://dx.doi.org/10.1145/2518102
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This note corrects a technical error in the ACM Computing Surveys paper
mentioned in the title. The flaw involved constructions for showing that timed
automata with urgent locations have the same expressiveness as timed automata
that allow false location invariants. Corrected con- structions are presented
in this note, and the affected results are reproved.
|
[
{
"version": "v1",
"created": "Tue, 23 Feb 2016 14:25:41 GMT"
}
] | 2016-02-24T00:00:00 |
[
[
"Keiren",
"Jeroen J. A.",
""
],
[
"Fontana",
"Peter",
""
],
[
"Cleaveland",
"Rance",
""
]
] |
new_dataset
| 0.982616 |
1311.5904
|
J. C. D\'iaz-V\'elez
|
M. G. Aartsen, R. Abbasi, M. Ackermann, J. Adams, J. A. Aguilar, M.
Ahlers, D. Altmann, C. Arguelles, J. Auffenberg, X. Bai, M. Baker, S. W.
Barwick, V. Baum, R. Bay, J. J. Beatty, J. Becker Tjus, K.-H. Becker, S.
BenZvi, P. Berghaus, D. Berley, E. Bernardini, A. Bernhard, D. Z. Besson, G.
Binder, D. Bindig, M. Bissok, E. Blaufuss, J. Blumenthal, D. J. Boersma, C.
Bohm, D. Bose, S. B\"oser, O. Botner, L. Brayeur, H.-P. Bretz, A. M. Brown,
R. Bruijn, J. Casey, M. Casier, D. Chirkin, A. Christov, B. Christy, K.
Clark, L. Classen, F. Clevermann, S. Coenders, S. Cohen, D. F. Cowen, A. H.
Cruz Silva, M. Danninger, J. Daughhetee, J. C. Davis, M. Day, C. De Clercq,
S. De Ridder, P. Desiati, K. D. de Vries, M. de With, T. DeYoung, J. C.
D\'iaz-V\'elez, M. Dunkman, R. Eagan, B. Eberhardt, B. Eichmann, J. Eisch, S.
Euler, P. A. Evenson, O. Fadiran, A. R. Fazely, A. Fedynitch, J. Feintzeig,
T. Feusels, K. Filimonov, C. Finley, T. Fischer-Wasels, S. Flis, A.
Franckowiak, K. Frantzen, T. Fuchs, T. K. Gaisser, J. Gallagher, L. Gerhardt,
L. Gladstone, T. Gl\"usenkamp, A. Goldschmidt, G. Golup, J. G. Gonzalez, J.
A. Goodman, D. G\'ora, D. T. Grandmont, D. Grant, P. Gretskov, J. C. Groh, A.
Gro{\ss}, C. Ha, A. Haj Ismail, P. Hallen, A. Hallgren, F. Halzen, K. Hanson,
D. Hebecker, D. Heereman, D. Heinen, K. Helbing, R. Hellauer, S. Hickford, G.
C. Hill, K. D. Hoffman, R. Hoffmann, A. Homeier, K. Hoshina, F. Huang, W.
Huelsnitz, P. O. Hulth, K. Hultqvist, S. Hussain, A. Ishihara, E. Jacobi, J.
Jacobsen, K. Jagielski, G. S. Japaridze, K. Jero, O. Jlelati, B. Kaminsky, A.
Kappes, T. Karg, A. Karle, M. Kauer, J. L. Kelley, J. Kiryluk, J. Kl\"as, S.
R. Klein, J.-H. K\"ohne, G. Kohnen, H. Kolanoski, L. K\"opke, C. Kopper, S.
Kopper, D. J. Koskinen, M. Kowalski, M. Krasberg, A. Kriesten, K. Krings, G.
Kroll, J. Kunnen, N. Kurahashi, T. Kuwabara, M. Labare, H. Landsman, M. J.
Larson, M. Lesiak-Bzdak, M. Leuermann, J. Leute, J. L\"unemann, O. Mac\'ias,
J. Madsen, G. Maggi, R. Maruyama, K. Mase, H. S. Matis, F. McNally, K.
Meagher, M. Merck, G. Merino, T. Meures, S. Miarecki, E. Middell, N. Milke,
J. Miller, L. Mohrmann, T. Montaruli, R. Morse, R. Nahnhauer, U. Naumann, H.
Niederhausen, S. C. Nowicki, D. R. Nygren, A. Obertacke, S. Odrowski, A.
Olivas, A. Omairat, A. O'Murchadha, L. Paul, J. A. Pepper, C. P\'erez de los
Heros, C. Pfendner, D. Pieloth, E. Pinat, J. Posselt, P. B. Price, G. T.
Przybylski, M. Quinnan, L. R \"adel, I. Rae, M. Rameez, K. Rawlins, P. Redl,
R. Reimann, E. Resconi, W. Rhode, M. Ribordy, M. Richman, B. Riedel, J. P.
Rodrigues, C. Rott, T. Ruhe, B. Ruzybayev, D. Ryckbosch, S. M. Saba, H.-G.
Sander, M. Santander, S. Sarkar, K. Schatto, F. Scheriau, T. Schmidt, M.
Schmitz, S. Schoenen, S. Sch\"oneberg, A. Sch\"onwald, A. Schukraft, L.
Schulte, D. Schultz, O. Schulz, D. Seckel, Y. Sestayo, S. Seunarine, R.
Shanidze, C. Sheremata, M. W. E. Smith, D. Soldin, G. M. Spiczak, C.
Spiering, M. Stamatikos, T. Stanev, N. A. Stanisha, A. Stasik, T.
Stezelberger, R. G. Stokstad, A. St\"o{\ss}l, E. A. Strahler, R. Str\"om, N.
L. Strotjohann, G. W. Sullivan, H. Taavola, I. Taboada, A. Tamburro, A. Tepe,
S. Ter-Antonyan, G. Te\v{s}i\'c, S. Tilav, P. A. Toale, M. N. Tobin, S.
Toscano, M. Tselengidou, E. Unger, M. Usner, S. Vallecorsa, N. van
Eijndhoven, A. Van Overloop, J. van Santen, M. Vehring, M. Voge, M. Vraeghe,
C. Walck, T. Waldenmaier, M. Wallraff, Ch. Weaver, M. Wellons, C. Wendt, S.
Westerhoff, N. Whitehorn, K. Wiebe, C. H. Wiebusch, D. R. Williams, H.
Wissing, M. Wolf, T. R. Wood, K. Woschnagg, D. L. Xu, X. W. Xu, J. P. Yanez,
G. Yodh, S. Yoshida, P. Zarzhitsky, J. Ziemann, S. Zierke, M. Zoll
|
The IceProd Framework: Distributed Data Processing for the IceCube
Neutrino Observatory
| null |
Journal of Parallel & Distributed Computing 75:198,2015
|
10.1016/j.jpdc.2014.08.001
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
IceCube is a one-gigaton instrument located at the geographic South Pole,
designed to detect cosmic neutrinos, iden- tify the particle nature of dark
matter, and study high-energy neutrinos themselves. Simulation of the IceCube
detector and processing of data require a significant amount of computational
resources. IceProd is a distributed management system based on Python, XML-RPC
and GridFTP. It is driven by a central database in order to coordinate and
admin- ister production of simulations and processing of data produced by the
IceCube detector. IceProd runs as a separate layer on top of other middleware
and can take advantage of a variety of computing resources, including grids and
batch systems such as CREAM, Condor, and PBS. This is accomplished by a set of
dedicated daemons that process job submission in a coordinated fashion through
the use of middleware plugins that serve to abstract the details of job
submission and job management from the framework.
|
[
{
"version": "v1",
"created": "Fri, 22 Nov 2013 21:16:58 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Jul 2014 22:31:16 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Aug 2014 21:31:55 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Aartsen",
"M. G.",
""
],
[
"Abbasi",
"R.",
""
],
[
"Ackermann",
"M.",
""
],
[
"Adams",
"J.",
""
],
[
"Aguilar",
"J. A.",
""
],
[
"Ahlers",
"M.",
""
],
[
"Altmann",
"D.",
""
],
[
"Arguelles",
"C.",
""
],
[
"Auffenberg",
"J.",
""
],
[
"Bai",
"X.",
""
],
[
"Baker",
"M.",
""
],
[
"Barwick",
"S. W.",
""
],
[
"Baum",
"V.",
""
],
[
"Bay",
"R.",
""
],
[
"Beatty",
"J. J.",
""
],
[
"Tjus",
"J. Becker",
""
],
[
"Becker",
"K. -H.",
""
],
[
"BenZvi",
"S.",
""
],
[
"Berghaus",
"P.",
""
],
[
"Berley",
"D.",
""
],
[
"Bernardini",
"E.",
""
],
[
"Bernhard",
"A.",
""
],
[
"Besson",
"D. Z.",
""
],
[
"Binder",
"G.",
""
],
[
"Bindig",
"D.",
""
],
[
"Bissok",
"M.",
""
],
[
"Blaufuss",
"E.",
""
],
[
"Blumenthal",
"J.",
""
],
[
"Boersma",
"D. J.",
""
],
[
"Bohm",
"C.",
""
],
[
"Bose",
"D.",
""
],
[
"Böser",
"S.",
""
],
[
"Botner",
"O.",
""
],
[
"Brayeur",
"L.",
""
],
[
"Bretz",
"H. -P.",
""
],
[
"Brown",
"A. M.",
""
],
[
"Bruijn",
"R.",
""
],
[
"Casey",
"J.",
""
],
[
"Casier",
"M.",
""
],
[
"Chirkin",
"D.",
""
],
[
"Christov",
"A.",
""
],
[
"Christy",
"B.",
""
],
[
"Clark",
"K.",
""
],
[
"Classen",
"L.",
""
],
[
"Clevermann",
"F.",
""
],
[
"Coenders",
"S.",
""
],
[
"Cohen",
"S.",
""
],
[
"Cowen",
"D. F.",
""
],
[
"Silva",
"A. H. Cruz",
""
],
[
"Danninger",
"M.",
""
],
[
"Daughhetee",
"J.",
""
],
[
"Davis",
"J. C.",
""
],
[
"Day",
"M.",
""
],
[
"De Clercq",
"C.",
""
],
[
"De Ridder",
"S.",
""
],
[
"Desiati",
"P.",
""
],
[
"de Vries",
"K. D.",
""
],
[
"de With",
"M.",
""
],
[
"DeYoung",
"T.",
""
],
[
"Díaz-Vélez",
"J. C.",
""
],
[
"Dunkman",
"M.",
""
],
[
"Eagan",
"R.",
""
],
[
"Eberhardt",
"B.",
""
],
[
"Eichmann",
"B.",
""
],
[
"Eisch",
"J.",
""
],
[
"Euler",
"S.",
""
],
[
"Evenson",
"P. A.",
""
],
[
"Fadiran",
"O.",
""
],
[
"Fazely",
"A. R.",
""
],
[
"Fedynitch",
"A.",
""
],
[
"Feintzeig",
"J.",
""
],
[
"Feusels",
"T.",
""
],
[
"Filimonov",
"K.",
""
],
[
"Finley",
"C.",
""
],
[
"Fischer-Wasels",
"T.",
""
],
[
"Flis",
"S.",
""
],
[
"Franckowiak",
"A.",
""
],
[
"Frantzen",
"K.",
""
],
[
"Fuchs",
"T.",
""
],
[
"Gaisser",
"T. K.",
""
],
[
"Gallagher",
"J.",
""
],
[
"Gerhardt",
"L.",
""
],
[
"Gladstone",
"L.",
""
],
[
"Glüsenkamp",
"T.",
""
],
[
"Goldschmidt",
"A.",
""
],
[
"Golup",
"G.",
""
],
[
"Gonzalez",
"J. G.",
""
],
[
"Goodman",
"J. A.",
""
],
[
"Góra",
"D.",
""
],
[
"Grandmont",
"D. T.",
""
],
[
"Grant",
"D.",
""
],
[
"Gretskov",
"P.",
""
],
[
"Groh",
"J. C.",
""
],
[
"Groß",
"A.",
""
],
[
"Ha",
"C.",
""
],
[
"Ismail",
"A. Haj",
""
],
[
"Hallen",
"P.",
""
],
[
"Hallgren",
"A.",
""
],
[
"Halzen",
"F.",
""
],
[
"Hanson",
"K.",
""
],
[
"Hebecker",
"D.",
""
],
[
"Heereman",
"D.",
""
],
[
"Heinen",
"D.",
""
],
[
"Helbing",
"K.",
""
],
[
"Hellauer",
"R.",
""
],
[
"Hickford",
"S.",
""
],
[
"Hill",
"G. C.",
""
],
[
"Hoffman",
"K. D.",
""
],
[
"Hoffmann",
"R.",
""
],
[
"Homeier",
"A.",
""
],
[
"Hoshina",
"K.",
""
],
[
"Huang",
"F.",
""
],
[
"Huelsnitz",
"W.",
""
],
[
"Hulth",
"P. O.",
""
],
[
"Hultqvist",
"K.",
""
],
[
"Hussain",
"S.",
""
],
[
"Ishihara",
"A.",
""
],
[
"Jacobi",
"E.",
""
],
[
"Jacobsen",
"J.",
""
],
[
"Jagielski",
"K.",
""
],
[
"Japaridze",
"G. S.",
""
],
[
"Jero",
"K.",
""
],
[
"Jlelati",
"O.",
""
],
[
"Kaminsky",
"B.",
""
],
[
"Kappes",
"A.",
""
],
[
"Karg",
"T.",
""
],
[
"Karle",
"A.",
""
],
[
"Kauer",
"M.",
""
],
[
"Kelley",
"J. L.",
""
],
[
"Kiryluk",
"J.",
""
],
[
"Kläs",
"J.",
""
],
[
"Klein",
"S. R.",
""
],
[
"Köhne",
"J. -H.",
""
],
[
"Kohnen",
"G.",
""
],
[
"Kolanoski",
"H.",
""
],
[
"Köpke",
"L.",
""
],
[
"Kopper",
"C.",
""
],
[
"Kopper",
"S.",
""
],
[
"Koskinen",
"D. J.",
""
],
[
"Kowalski",
"M.",
""
],
[
"Krasberg",
"M.",
""
],
[
"Kriesten",
"A.",
""
],
[
"Krings",
"K.",
""
],
[
"Kroll",
"G.",
""
],
[
"Kunnen",
"J.",
""
],
[
"Kurahashi",
"N.",
""
],
[
"Kuwabara",
"T.",
""
],
[
"Labare",
"M.",
""
],
[
"Landsman",
"H.",
""
],
[
"Larson",
"M. J.",
""
],
[
"Lesiak-Bzdak",
"M.",
""
],
[
"Leuermann",
"M.",
""
],
[
"Leute",
"J.",
""
],
[
"Lünemann",
"J.",
""
],
[
"Macías",
"O.",
""
],
[
"Madsen",
"J.",
""
],
[
"Maggi",
"G.",
""
],
[
"Maruyama",
"R.",
""
],
[
"Mase",
"K.",
""
],
[
"Matis",
"H. S.",
""
],
[
"McNally",
"F.",
""
],
[
"Meagher",
"K.",
""
],
[
"Merck",
"M.",
""
],
[
"Merino",
"G.",
""
],
[
"Meures",
"T.",
""
],
[
"Miarecki",
"S.",
""
],
[
"Middell",
"E.",
""
],
[
"Milke",
"N.",
""
],
[
"Miller",
"J.",
""
],
[
"Mohrmann",
"L.",
""
],
[
"Montaruli",
"T.",
""
],
[
"Morse",
"R.",
""
],
[
"Nahnhauer",
"R.",
""
],
[
"Naumann",
"U.",
""
],
[
"Niederhausen",
"H.",
""
],
[
"Nowicki",
"S. C.",
""
],
[
"Nygren",
"D. R.",
""
],
[
"Obertacke",
"A.",
""
],
[
"Odrowski",
"S.",
""
],
[
"Olivas",
"A.",
""
],
[
"Omairat",
"A.",
""
],
[
"O'Murchadha",
"A.",
""
],
[
"Paul",
"L.",
""
],
[
"Pepper",
"J. A.",
""
],
[
"Heros",
"C. Pérez de los",
""
],
[
"Pfendner",
"C.",
""
],
[
"Pieloth",
"D.",
""
],
[
"Pinat",
"E.",
""
],
[
"Posselt",
"J.",
""
],
[
"Price",
"P. B.",
""
],
[
"Przybylski",
"G. T.",
""
],
[
"Quinnan",
"M.",
""
],
[
"ädel",
"L. R",
""
],
[
"Rae",
"I.",
""
],
[
"Rameez",
"M.",
""
],
[
"Rawlins",
"K.",
""
],
[
"Redl",
"P.",
""
],
[
"Reimann",
"R.",
""
],
[
"Resconi",
"E.",
""
],
[
"Rhode",
"W.",
""
],
[
"Ribordy",
"M.",
""
],
[
"Richman",
"M.",
""
],
[
"Riedel",
"B.",
""
],
[
"Rodrigues",
"J. P.",
""
],
[
"Rott",
"C.",
""
],
[
"Ruhe",
"T.",
""
],
[
"Ruzybayev",
"B.",
""
],
[
"Ryckbosch",
"D.",
""
],
[
"Saba",
"S. M.",
""
],
[
"Sander",
"H. -G.",
""
],
[
"Santander",
"M.",
""
],
[
"Sarkar",
"S.",
""
],
[
"Schatto",
"K.",
""
],
[
"Scheriau",
"F.",
""
],
[
"Schmidt",
"T.",
""
],
[
"Schmitz",
"M.",
""
],
[
"Schoenen",
"S.",
""
],
[
"Schöneberg",
"S.",
""
],
[
"Schönwald",
"A.",
""
],
[
"Schukraft",
"A.",
""
],
[
"Schulte",
"L.",
""
],
[
"Schultz",
"D.",
""
],
[
"Schulz",
"O.",
""
],
[
"Seckel",
"D.",
""
],
[
"Sestayo",
"Y.",
""
],
[
"Seunarine",
"S.",
""
],
[
"Shanidze",
"R.",
""
],
[
"Sheremata",
"C.",
""
],
[
"Smith",
"M. W. E.",
""
],
[
"Soldin",
"D.",
""
],
[
"Spiczak",
"G. M.",
""
],
[
"Spiering",
"C.",
""
],
[
"Stamatikos",
"M.",
""
],
[
"Stanev",
"T.",
""
],
[
"Stanisha",
"N. A.",
""
],
[
"Stasik",
"A.",
""
],
[
"Stezelberger",
"T.",
""
],
[
"Stokstad",
"R. G.",
""
],
[
"Stößl",
"A.",
""
],
[
"Strahler",
"E. A.",
""
],
[
"Ström",
"R.",
""
],
[
"Strotjohann",
"N. L.",
""
],
[
"Sullivan",
"G. W.",
""
],
[
"Taavola",
"H.",
""
],
[
"Taboada",
"I.",
""
],
[
"Tamburro",
"A.",
""
],
[
"Tepe",
"A.",
""
],
[
"Ter-Antonyan",
"S.",
""
],
[
"Tešić",
"G.",
""
],
[
"Tilav",
"S.",
""
],
[
"Toale",
"P. A.",
""
],
[
"Tobin",
"M. N.",
""
],
[
"Toscano",
"S.",
""
],
[
"Tselengidou",
"M.",
""
],
[
"Unger",
"E.",
""
],
[
"Usner",
"M.",
""
],
[
"Vallecorsa",
"S.",
""
],
[
"van Eijndhoven",
"N.",
""
],
[
"Van Overloop",
"A.",
""
],
[
"van Santen",
"J.",
""
],
[
"Vehring",
"M.",
""
],
[
"Voge",
"M.",
""
],
[
"Vraeghe",
"M.",
""
],
[
"Walck",
"C.",
""
],
[
"Waldenmaier",
"T.",
""
],
[
"Wallraff",
"M.",
""
],
[
"Weaver",
"Ch.",
""
],
[
"Wellons",
"M.",
""
],
[
"Wendt",
"C.",
""
],
[
"Westerhoff",
"S.",
""
],
[
"Whitehorn",
"N.",
""
],
[
"Wiebe",
"K.",
""
],
[
"Wiebusch",
"C. H.",
""
],
[
"Williams",
"D. R.",
""
],
[
"Wissing",
"H.",
""
],
[
"Wolf",
"M.",
""
],
[
"Wood",
"T. R.",
""
],
[
"Woschnagg",
"K.",
""
],
[
"Xu",
"D. L.",
""
],
[
"Xu",
"X. W.",
""
],
[
"Yanez",
"J. P.",
""
],
[
"Yodh",
"G.",
""
],
[
"Yoshida",
"S.",
""
],
[
"Zarzhitsky",
"P.",
""
],
[
"Ziemann",
"J.",
""
],
[
"Zierke",
"S.",
""
],
[
"Zoll",
"M.",
""
]
] |
new_dataset
| 0.950839 |
1312.4511
|
Abisheva Adiya
|
Adiya Abisheva, Venkata Rama Kiran Garimella, David Garcia and Ingmar
Weber
|
Who Watches (and Shares) What on YouTube? And When? Using Twitter to
Understand YouTube Viewership
|
12 pages, 8 figures and 10 tables
|
Proceedings of the 7th International ACM Conference on Web Science
and Data Mining, pp.593-602 (2014)
|
10.1145/2556195.2566588
|
Report-no: ETH-2013-YouTube-Twitter-ETH-QCRI
|
cs.SI physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We combine user-centric Twitter data with video-centric YouTube data to
analyze who watches and shares what on YouTube. Combination of two data sets,
with 87k Twitter users, 5.6mln YouTube videos and 15mln video sharing events,
allows rich analysis going beyond what could be obtained with either of the two
data sets individually. For Twitter, we generate user features relating to
activity, interests and demographics. For YouTube, we obtain video features for
topic, popularity and polarization. These two feature sets are combined through
sharing events for YouTube URLs on Twitter. This combination is done both in a
user-, a video- and a sharing-event-centric manner. For the user-centric
analysis, we show how Twitter user features correlate both with YouTube
features and with sharing-related features. As two examples, we show urban
users are quicker to share than rural users and for some notions of "influence"
influential users on Twitter share videos with a higher number of views. For
the video-centric analysis, we find a superlinear relation between initial
Twitter shares and the final amounts of views, showing the correlated behavior
of Twitter. On user impact, we find the total amount of followers of users that
shared the video in the first week does not affect its final popularity.
However, aggregated user retweet rates serve as a better predictor for YouTube
video popularity. For the sharing-centric analysis, we reveal existence of
correlated behavior concerning the time between video creation and sharing
within certain timescales, showing the time onset for a coherent response, and
the time limit after which collective responses are extremely unlikely. We show
that response times depend on video category, revealing that Twitter sharing of
a video is highly dependent on its content. To the best of our knowledge this
is the first large-scale study combining YouTube and Twitter data.
|
[
{
"version": "v1",
"created": "Mon, 16 Dec 2013 20:35:09 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Feb 2016 16:45:21 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Abisheva",
"Adiya",
""
],
[
"Garimella",
"Venkata Rama Kiran",
""
],
[
"Garcia",
"David",
""
],
[
"Weber",
"Ingmar",
""
]
] |
new_dataset
| 0.95196 |
1508.07845
|
Peng Peng
|
Peng Peng, Lei Zou, Lei Chen, Dongyan Zhao
|
Query Workload-based RDF Graph Fragmentation and Allocation
|
13 pages
| null | null | null |
cs.DC cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As the volume of the RDF data becomes increasingly large, it is essential for
us to design a distributed database system to manage it. For distributed RDF
data design, it is quite common to partition the RDF data into some parts,
called fragments, which are then distributed. Thus, the distribution design
consists of two steps: fragmentation and allocation. In this paper, we propose
a method to explore the intrinsic similarities among the structures of queries
in a workload for fragmentation and allocation, which aims to reduce the number
of crossing matches and the communication cost during SPARQL query processing.
Specifically, we mine and select some frequent access patterns to reflect the
characteristics of the workload. Here, although we prove that selecting the
optimal set of frequent access patterns is NP-hard, we propose a heuristic
algorithm which guarantees both the data integrity and the approximation ratio.
Based on the selected frequent access patterns, we propose two fragmentation
strategies, vertical and horizontal fragmentation strategies, to divide RDF
graphs while meeting different kinds of query processing objectives. Vertical
fragmentation is for better throughput and horizontal fragmentation is for
better performance. After fragmentation, we discuss how to allocate these
fragments to various sites. Finally, we discuss how to process a query based on
the results of fragmentation and allocation. Extensive experiments confirm the
superior performance of our proposed solutions.
|
[
{
"version": "v1",
"created": "Mon, 31 Aug 2015 14:23:38 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Sep 2015 02:29:51 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Dec 2015 16:10:04 GMT"
},
{
"version": "v4",
"created": "Sat, 20 Feb 2016 08:16:59 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Peng",
"Peng",
""
],
[
"Zou",
"Lei",
""
],
[
"Chen",
"Lei",
""
],
[
"Zhao",
"Dongyan",
""
]
] |
new_dataset
| 0.985019 |
1509.01277
|
Colin Rennie
|
Colin Rennie, Rahul Shome, Kostas E. Bekris, Alberto F. De Souza
|
A Dataset for Improved RGBD-based Object Detection and Pose Estimation
for Warehouse Pick-and-Place
|
To appear in RA-L
| null | null | null |
cs.CV cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An important logistics application of robotics involves manipulators that
pick-and-place objects placed in warehouse shelves. A critical aspect of this
task corre- sponds to detecting the pose of a known object in the shelf using
visual data. Solving this problem can be assisted by the use of an RGB-D
sensor, which also provides depth information beyond visual data. Nevertheless,
it remains a challenging problem since multiple issues need to be addressed,
such as low illumination inside shelves, clutter, texture-less and reflective
objects as well as the limitations of depth sensors. This paper provides a new
rich data set for advancing the state-of-the-art in RGBD- based 3D object pose
estimation, which is focused on the challenges that arise when solving
warehouse pick- and-place tasks. The publicly available data set includes
thousands of images and corresponding ground truth data for the objects used
during the first Amazon Picking Challenge at different poses and clutter
conditions. Each image is accompanied with ground truth information to assist
in the evaluation of algorithms for object detection. To show the utility of
the data set, a recent algorithm for RGBD-based pose estimation is evaluated in
this paper. Based on the measured performance of the algorithm on the data set,
various modifications and improvements are applied to increase the accuracy of
detection. These steps can be easily applied to a variety of different
methodologies for object pose detection and improve performance in the domain
of warehouse pick-and-place.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2015 20:53:06 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Feb 2016 20:05:18 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Rennie",
"Colin",
""
],
[
"Shome",
"Rahul",
""
],
[
"Bekris",
"Kostas E.",
""
],
[
"De Souza",
"Alberto F.",
""
]
] |
new_dataset
| 0.99833 |
1510.02658
|
J. Andres Montoya
|
Carolina Mejia, J. Andres Montoya
|
The almost-entropic regions are not semialgebraic
|
9 pages The paper has been withdrawn by the authors due to a flaw in
the proof of the main result
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that the almost-entropic region of order four is not semialgebraic,
we get as a corollary the well-known Theorem of Matus, which asserts that this
region is not polyhedral
|
[
{
"version": "v1",
"created": "Fri, 9 Oct 2015 12:58:49 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Oct 2015 14:24:20 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Feb 2016 13:22:08 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Mejia",
"Carolina",
""
],
[
"Montoya",
"J. Andres",
""
]
] |
new_dataset
| 0.993879 |
1511.07057
|
George MacCartney Jr
|
George R. MacCartney Jr., Sija Deng, and Theodore S. Rappaport
|
Indoor Office Plan Environment and Layout-Based MmWave Path Loss Models
for 28 GHz and 73 GHz
|
To be published in 2016 IEEE 83rd Vehicular Technology Conference
Spring (VTC 2016-Spring), Nanjing, China, May 2016
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents large-scale path loss models based on extensive
ultra-wideband millimeter-wave propagation measurements performed at 28 GHz and
73 GHz in three typical indoor office layouts -- namely: corridor, open-plan,
and closed-plan. A previous study combined all indoor layouts together, while
this study separates them for site-specific indoor large-scale path loss model
analysis. Measurements were conducted using a 400 megachips-per-second
broadband sliding correlator channel sounder with 800 MHz first null-to-null RF
bandwidth for 48 transmitter-receiver location combinations with distances
ranging 3.9 m to 45.9 m for both co- and cross-polarized antenna configurations
in line-of-sight and non-line-of-sight environments. Omnidirectional path loss
values were synthesized from over 14,000 directional power delay profiles and
were used to generate single-frequency and multi-frequency path loss models for
combined, co-, and cross-polarized antennas. Large-scale path loss models that
include a cross-polarization discrimination factor are provided for
cross-polarized antenna measurements. The results show the value of using the
close-in free space reference distance single and multi-frequency path loss
models, as they offer simplicity (less parameters) in path loss calculation and
prediction, without sacrificing accuracy. Moreover, the current 3GPP
floating-intercept path loss model only requires a simple and subtle
modification to convert to the close-in free space reference distance models.
|
[
{
"version": "v1",
"created": "Sun, 22 Nov 2015 19:34:55 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Feb 2016 15:02:19 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"MacCartney",
"George R.",
"Jr."
],
[
"Deng",
"Sija",
""
],
[
"Rappaport",
"Theodore S.",
""
]
] |
new_dataset
| 0.997929 |
1512.07831
|
Jiezhong Qiu
|
Jiezhong Qiu, Yixuan Li, Jie Tang, Zheng Lu, Hao Ye, Bo Chen, Qiang
Yang and John Hopcroft
|
The Lifecycle and Cascade of WeChat Social Messaging Groups
|
10 pages, 8 figures, to appear in proceedings of the 25th
International World Wide Web Conference (WWW 2016)
| null | null | null |
cs.SI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Social instant messaging services are emerging as a transformative form with
which people connect, communicate with friends in their daily life - they
catalyze the formation of social groups, and they bring people stronger sense
of community and connection. However, research community still knows little
about the formation and evolution of groups in the context of social messaging
- their lifecycles, the change in their underlying structures over time, and
the diffusion processes by which they develop new members. In this paper, we
analyze the daily usage logs from WeChat group messaging platform - the largest
standalone messaging communication service in China - with the goal of
understanding the processes by which social messaging groups come together,
grow new members, and evolve over time. Specifically, we discover a strong
dichotomy among groups in terms of their lifecycle, and develop a separability
model by taking into account a broad range of group-level features, showing
that long-term and short-term groups are inherently distinct. We also found
that the lifecycle of messaging groups is largely dependent on their social
roles and functions in users' daily social experiences and specific purposes.
Given the strong separability between the long-term and short-term groups, we
further address the problem concerning the early prediction of successful
communities. In addition to modeling the growth and evolution from group-level
perspective, we investigate the individual-level attributes of group members
and study the diffusion process by which groups gain new members. By
considering members' historical engagement behavior as well as the local social
network structure that they embedded in, we develop a membership cascade model
and demonstrate the effectiveness by achieving AUC of 95.31% in predicting
inviter, and an AUC of 98.66% in predicting invitee.
|
[
{
"version": "v1",
"created": "Thu, 24 Dec 2015 14:57:37 GMT"
},
{
"version": "v2",
"created": "Sat, 20 Feb 2016 14:46:39 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Qiu",
"Jiezhong",
""
],
[
"Li",
"Yixuan",
""
],
[
"Tang",
"Jie",
""
],
[
"Lu",
"Zheng",
""
],
[
"Ye",
"Hao",
""
],
[
"Chen",
"Bo",
""
],
[
"Yang",
"Qiang",
""
],
[
"Hopcroft",
"John",
""
]
] |
new_dataset
| 0.99629 |
1602.02343
|
Carlos Torres
|
Carlos Torres, Victor Fragoso, Scott D. Hammond, Jeffrey C. Fried, and
B.S. Manjunath
|
Eye-CU: Sleep Pose Classification for Healthcare using Multimodal
Multiview Data
|
Ten-page manuscript including references and ten figures
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Manual analysis of body poses of bed-ridden patients requires staff to
continuously track and record patient poses. Two limitations in the
dissemination of pose-related therapies are scarce human resources and
unreliable automated systems. This work addresses these issues by introducing a
new method and a new system for robust automated classification of sleep poses
in an Intensive Care Unit (ICU) environment. The new method,
coupled-constrained Least-Squares (cc-LS), uses multimodal and multiview (MM)
data and finds the set of modality trust values that minimizes the difference
between expected and estimated labels. The new system, Eye-CU, is an affordable
multi-sensor modular system for unobtrusive data collection and analysis in
healthcare. Experimental results indicate that the performance of cc-LS matches
the performance of existing methods in ideal scenarios. This method outperforms
the latest techniques in challenging scenarios by 13% for those with poor
illumination and by 70% for those with both poor illumination and occlusions.
Results also show that a reduced Eye-CU configuration can classify poses
without pressure information with only a slight drop in its performance.
|
[
{
"version": "v1",
"created": "Sun, 7 Feb 2016 06:33:08 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Feb 2016 06:15:37 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Torres",
"Carlos",
""
],
[
"Fragoso",
"Victor",
""
],
[
"Hammond",
"Scott D.",
""
],
[
"Fried",
"Jeffrey C.",
""
],
[
"Manjunath",
"B. S.",
""
]
] |
new_dataset
| 0.958689 |
1602.04693
|
Shahid Alam
|
Shahid Alam, Zhengyang Qu, Ryan Riley, Yan Chen, Vaibhav Rastogi
|
DroidNative: Semantic-Based Detection of Android Native Code Malware
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
According to the Symantec and F-Secure threat reports, mobile malware
development in 2013 and 2014 has continued to focus almost exclusively ~99% on
the Android platform. Malware writers are applying stealthy mutations
(obfuscations) to create malware variants, thwarting detection by signature
based detectors. In addition, the plethora of more sophisticated detectors
making use of static analysis techniques to detect such variants operate only
at the bytecode level, meaning that malware embedded in native code goes
undetected. A recent study shows that 86% of the most popular Android
applications contain native code, making this a plausible threat. This paper
proposes DroidNative, an Android malware detector that uses specific control
flow patterns to reduce the effect of obfuscations, provides automation and
platform independence, and as far as we know is the first system that operates
at the Android native code level, allowing it to detect malware embedded in
both native code and bytecode. When tested with traditional malware variants it
achieves a detection rate (DR) of 99.48%, compared to academic and commercial
tools' DRs that range from 8.33% -- 93.22%. When tested with a dataset of 2240
samples DroidNative achieves a DR of 99.16%, a false positive rate of 0.4% and
an average detection time of 26.87 sec/sample.
|
[
{
"version": "v1",
"created": "Mon, 15 Feb 2016 14:26:20 GMT"
},
{
"version": "v2",
"created": "Sun, 21 Feb 2016 07:37:51 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Alam",
"Shahid",
""
],
[
"Qu",
"Zhengyang",
""
],
[
"Riley",
"Ryan",
""
],
[
"Chen",
"Yan",
""
],
[
"Rastogi",
"Vaibhav",
""
]
] |
new_dataset
| 0.999549 |
1602.06462
|
Toby Walsh
|
Toby Walsh
|
The Singularity May Never Be Near
|
Under review
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is both much optimism and pessimism around artificial intelligence (AI)
today. The optimists are investing millions of dollars, and even in some cases
billions of dollars into AI. The pessimists, on the other hand, predict that AI
will end many things: jobs, warfare, and even the human race. Both the
optimists and the pessimists often appeal to the idea of a technological
singularity, a point in time where machine intelligence starts to run away, and
a new, more intelligent species starts to inhabit the earth. If the optimists
are right, this will be a moment that fundamentally changes our economy and our
society. If the pessimists are right, this will be a moment that also
fundamentally changes our economy and our society. It is therefore very
worthwhile spending some time deciding if either of them might be right.
|
[
{
"version": "v1",
"created": "Sat, 20 Feb 2016 21:09:07 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Walsh",
"Toby",
""
]
] |
new_dataset
| 0.987812 |
1602.06683
|
Yann Busnel
|
Yann Busnel and Ilir Gashi
|
EDCC 2015 - Fast Abstracts & Student Forum Proceedings
|
The Tenth European Dependable Computing Conference - EDCC 2015 -
Paris, France, September 7-11, 2015
| null | null | null |
cs.DC cs.SE
|
http://creativecommons.org/licenses/by-nc-sa/4.0/
|
Fast Abstracts are short presentations of work in progress or opinion pieces
and aim to serve as a rapid and flexible mechanism to (i) Report on current
work that may or may not be complete; (ii) Introduce new ideas to the
community; (iii) State positions on controversial issues or open problems.
On the other hand, the goal of the Student Forum is to encourage students to
attend EDCC and present their work, exchange ideas with researchers and
practitioners, and get early feedback on their research efforts.
|
[
{
"version": "v1",
"created": "Mon, 22 Feb 2016 08:45:20 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Busnel",
"Yann",
""
],
[
"Gashi",
"Ilir",
""
]
] |
new_dataset
| 0.999297 |
1602.06823
|
Manuel Mazzara
|
Alexander Tchitchigin, Larisa Safina, Manuel Mazzara, Mohamed Elwakil,
Fabrizio Montesi and Victor Rivera
|
Refinement types in Jolie
| null | null | null | null |
cs.SE cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Jolie is the first language for microservices and it is currently dynamically
type checked. This paper considers the opportunity to integrate dynamic and
static type checking with the introduction of refinement types, verified via
SMT solver. The integration of the two aspects allows a scenario where the
static verification of internal services and the dynamic verification of
(potentially malicious) external services cooperates in order to reduce testing
effort and enhancing security.
|
[
{
"version": "v1",
"created": "Mon, 22 Feb 2016 15:40:04 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Tchitchigin",
"Alexander",
""
],
[
"Safina",
"Larisa",
""
],
[
"Mazzara",
"Manuel",
""
],
[
"Elwakil",
"Mohamed",
""
],
[
"Montesi",
"Fabrizio",
""
],
[
"Rivera",
"Victor",
""
]
] |
new_dataset
| 0.97189 |
1602.06871
|
Leon Abdillah
|
Intan Okta Sari, Leon Andretti Abdillah, Kiky Rizky Nova Wardhani
|
Application Location Based Service (LBS) Location Search Palembang
Nature-Based Android
|
The 5th International Conference on Information Technology and
Engineering Application (ICIBA2016), Paper presented at the The 5th
ICIBA2016, Bina Darma University, Palembang
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the development of information systems to make the operating system more
diverse mobile devices, the emergence of the Android operating system that is
open allows users to search for and acquire various information easily and
quickly. Application Search Nature Places is an application that can help bring
information on nearby Places Nature is all around. Can be used in the Android
Operating System and Global Positioning System (GPS). To be able to use this
application, users must be connected to the Internet because it requires data
taken from Google Maps. The main facilities contained in this application is a
feature that makes it Map and Route users in finding the intended location.
With the LBS application is expected to provide information that is accurate,
clear and precise to determine location points Nature Palembang, and can
facilitate local and foreign tourists and the public, especially the city of
Palembang.
|
[
{
"version": "v1",
"created": "Fri, 19 Feb 2016 08:30:18 GMT"
}
] | 2016-02-23T00:00:00 |
[
[
"Sari",
"Intan Okta",
""
],
[
"Abdillah",
"Leon Andretti",
""
],
[
"Wardhani",
"Kiky Rizky Nova",
""
]
] |
new_dataset
| 0.995763 |
1501.03988
|
Ilkka T\"orm\"a
|
Ville Salo, Ilkka T\"orm\"a
|
A One-Dimensional Physically Universal Cellular Automaton
|
17 pages, 6 figures. Corrected an error in a figure
| null | null | null |
cs.FL math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Physical universality of a cellular automaton was defined by Janzing in 2010
as the ability to implement an arbitrary transformation of spatial patterns. In
2014, Schaeffer gave a construction of a two-dimensional physically universal
cellular automaton. We construct a one-dimensional version of the automaton.
|
[
{
"version": "v1",
"created": "Fri, 16 Jan 2015 14:31:18 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Jan 2015 15:47:46 GMT"
}
] | 2016-02-22T00:00:00 |
[
[
"Salo",
"Ville",
""
],
[
"Törmä",
"Ilkka",
""
]
] |
new_dataset
| 0.975874 |
1503.01386
|
G\"unter Rote
|
P\'eter Hajnal, Alexander Igamberdiev, G\"unter Rote, Andr\'e Schulz
|
Saturated simple and 2-simple topological graphs with few edges
|
18 pages, 22 figures
| null | null | null |
cs.CG math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A simple topological graph is a topological graph in which any two edges have
at most one common point, which is either their common endpoint or a proper
crossing. More generally, in a k-simple topological graph, every pair of edges
has at most k common points of this kind. We construct saturated simple and
2-simple graphs with few edges. These are k-simple graphs in which no further
edge can be added. We improve the previous upper bounds of Kyn\v{c}l, Pach,
Radoi\v{c}i\'c, and T\'oth and show that there are saturated simple graphs on n
vertices with only 7n edges and saturated 2-simple graphs on n vertices with
14.5n edges. As a consequence, 14.5n edges is also a new upper bound for
k-simple graphs (considering all values of k). We also construct saturated
simple and 2-simple graphs that have some vertices with low degree.
|
[
{
"version": "v1",
"created": "Wed, 4 Mar 2015 16:58:34 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Mar 2015 20:41:08 GMT"
}
] | 2016-02-22T00:00:00 |
[
[
"Hajnal",
"Péter",
""
],
[
"Igamberdiev",
"Alexander",
""
],
[
"Rote",
"Günter",
""
],
[
"Schulz",
"André",
""
]
] |
new_dataset
| 0.996556 |
1506.05865
|
Baotian Hu
|
Baotian Hu, Qingcai Chen, Fangze Zhu
|
LCSTS: A Large Scale Chinese Short Text Summarization Dataset
|
Recently, we received feedbacks from Yuya Taguchi from NAIST in Japan
and Qian Chen from USTC of China, that the results in the EMNLP2015 version
seem to be underrated. So we carefully checked our results and find out that
we made a mistake while using the standard ROUGE. Then we re-evaluate all
methods in the paper and get corrected results listed in Table 2 of this
version
| null | null | null |
cs.CL cs.IR cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Automatic text summarization is widely regarded as the highly difficult
problem, partially because of the lack of large text summarization data set.
Due to the great challenge of constructing the large scale summaries for full
text, in this paper, we introduce a large corpus of Chinese short text
summarization dataset constructed from the Chinese microblogging website Sina
Weibo, which is released to the public
{http://icrc.hitsz.edu.cn/Article/show/139.html}. This corpus consists of over
2 million real Chinese short texts with short summaries given by the author of
each text. We also manually tagged the relevance of 10,666 short summaries with
their corresponding short texts. Based on the corpus, we introduce recurrent
neural network for the summary generation and achieve promising results, which
not only shows the usefulness of the proposed corpus for short text
summarization research, but also provides a baseline for further research on
this topic.
|
[
{
"version": "v1",
"created": "Fri, 19 Jun 2015 02:40:42 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jun 2015 14:33:39 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Aug 2015 02:43:38 GMT"
},
{
"version": "v4",
"created": "Fri, 19 Feb 2016 16:35:35 GMT"
}
] | 2016-02-22T00:00:00 |
[
[
"Hu",
"Baotian",
""
],
[
"Chen",
"Qingcai",
""
],
[
"Zhu",
"Fangze",
""
]
] |
new_dataset
| 0.999793 |
1511.06830
|
Xuan Dong
|
Xuan Dong, Boyan Bonev, Weixin Li, Weichao Qiu, Xianjie Chen, Alan
Yuille
|
Ground-truth dataset and baseline evaluations for image base-detail
separation algorithms
|
This paper has been withdrawn by the author due to some un-proper
examples
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Base-detail separation is a fundamental computer vision problem consisting of
modeling a smooth base layer with the coarse structures, and a detail layer
containing the texture-like structures. One of the challenges of estimating the
base is to preserve sharp boundaries between objects or parts to avoid halo
artifacts. Many methods have been proposed to address this problem, but there
is no ground-truth dataset of real images for quantitative evaluation. We
proposed a procedure to construct such a dataset, and provide two datasets:
Pascal Base-Detail and Fashionista Base-Detail, containing 1000 and 250 images,
respectively. Our assumption is that the base is piecewise smooth and we label
the appearance of each piece by a polynomial model. The pieces are objects and
parts of objects, obtained from human annotations. Finally, we proposed a way
to evaluate methods with our base-detail ground-truth and we compared the
performances of seven state-of-the-art algorithms.
|
[
{
"version": "v1",
"created": "Sat, 21 Nov 2015 04:04:39 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Feb 2016 22:59:13 GMT"
}
] | 2016-02-22T00:00:00 |
[
[
"Dong",
"Xuan",
""
],
[
"Bonev",
"Boyan",
""
],
[
"Li",
"Weixin",
""
],
[
"Qiu",
"Weichao",
""
],
[
"Chen",
"Xianjie",
""
],
[
"Yuille",
"Alan",
""
]
] |
new_dataset
| 0.998113 |
1602.03031
|
Can Alkan
|
Atalay M. Ileri, Halil I. Ozercan, Alper Gundogdu, Ahmet K. Senol, M.
Yusuf Ozkaya, Can Alkan
|
Coinami: A Cryptocurrency with DNA Sequence Alignment as Proof-of-work
| null | null | null | null |
cs.CE cs.CR q-bio.GN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rate of growth of the amount of data generated using the high throughput
sequencing (HTS) platforms now exceeds the growth stipulated by Moore's Law.
The HTS data is expected to surpass those of other "big data" domains such as
astronomy, before the year 2025. In addition to sequencing genomes for research
purposes, genome and exome sequencing in clinical settings will be a routine
part of health care. The analysis of such large amounts of data, however, is
not without computational challenges. This burden is even more increased due to
the periodic updates to reference genomes, which typically require re-analysis
of existing data. Here we propose Coin-Application Mediator Interface (Coinami)
to distribute the workload for mapping reads to reference genomes using a
volunteer grid computer approach similar to Berkeley Open Infrastructure for
Network Computing (BOINC). However, since HTS read mapping requires substantial
computational resources and fast analysis turnout is desired, Coinami uses the
HTS read mapping as proof-of-work to generate valid blocks to main its own
cryptocurrency system, which may help motivate volunteers to dedicate more
resources. The Coinami protocol includes mechanisms to ensure that jobs
performed by volunteers are correct, and provides genomic data privacy. The
prototype implementation of Coinami is available at http://coinami.github.io/.
|
[
{
"version": "v1",
"created": "Tue, 9 Feb 2016 15:23:38 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Feb 2016 11:19:35 GMT"
}
] | 2016-02-22T00:00:00 |
[
[
"Ileri",
"Atalay M.",
""
],
[
"Ozercan",
"Halil I.",
""
],
[
"Gundogdu",
"Alper",
""
],
[
"Senol",
"Ahmet K.",
""
],
[
"Ozkaya",
"M. Yusuf",
""
],
[
"Alkan",
"Can",
""
]
] |
new_dataset
| 0.999392 |
1602.05990
|
Pedro Miraldo
|
Jo\~ao R. Cardoso, Pedro Miraldo, and Helder Araujo
|
Pl\"ucker Correction Problem: Analysis and Improvements in Efficiency
| null | null | null | null |
cs.CV cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A given six dimensional vector represents a 3D straight line in Plucker
coordinates if its coordinates satisfy the Klein quadric constraint. In many
problems aiming to find the Plucker coordinates of lines, noise in the data
and other type of errors contribute for obtaining 6D vectors that do not
correspond to lines, because of that constraint. A common procedure to overcome
this drawback is to find the Plucker coordinates of the lines that are closest
to those vectors. This is known as the Plucker correction problem. In this
article we propose a simple, closed-form, and global solution for this problem.
When compared with the state-of-the-art method, one can conclude that our
algorithm is easier and requires much less operations than previous techniques
(it does not require Singular Value Decomposition techniques).
|
[
{
"version": "v1",
"created": "Thu, 18 Feb 2016 22:22:18 GMT"
}
] | 2016-02-22T00:00:00 |
[
[
"Cardoso",
"João R.",
""
],
[
"Miraldo",
"Pedro",
""
],
[
"Araujo",
"Helder",
""
]
] |
new_dataset
| 0.982615 |
1602.06012
|
Kyle Burke
|
Kyle Burke, Bob Hearn
|
PSPACE-Complete Two-Color Placement Games
|
16 Pages, 16 figures
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that three placement games, Col, NoGo, and Fjords, are
PSPACE-complete on planar graphs. The hardness of Col and Fjords is shown via a
reduction from Bounded 2-Player Constraint Logic and NoGo is shown to be hard
directly from Col.
|
[
{
"version": "v1",
"created": "Fri, 19 Feb 2016 00:51:06 GMT"
}
] | 2016-02-22T00:00:00 |
[
[
"Burke",
"Kyle",
""
],
[
"Hearn",
"Bob",
""
]
] |
new_dataset
| 0.999272 |
1602.06045
|
Anirudh Sivaraman Kaushalram
|
Anirudh Sivaraman, Suvinay Subramanian, Anurag Agrawal, Sharad Chole,
Shang-Tse Chuang, Tom Edsall, Mohammad Alizadeh, Sachin Katti, Nick McKeown,
Hari Balakrishnan
|
Programmable Packet Scheduling
|
14 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Switches today provide a small set of scheduling algorithms. While we can
tweak scheduling parameters, we cannot modify algorithmic logic, or add a
completely new algorithm, after the switch has been designed. This paper
presents a design for a programmable packet scheduler, which allows scheduling
algorithms---potentially algorithms that are unknown today---to be programmed
into a switch without requiring hardware redesign.
Our design builds on the observation that scheduling algorithms make two
decisions: in what order to schedule packets and when to schedule them.
Further, in many scheduling algorithms these decisions can be made when packets
are enqueued. We leverage this observation to build a programmable scheduler
using a single abstraction: the push-in first-out queue (PIFO), a priority
queue that maintains the scheduling order and time for such algorithms.
We show that a programmable scheduler using PIFOs lets us program a wide
variety of scheduling algorithms. We present a detailed hardware design for
this scheduler for a 64-port 10 Gbit/s shared-memory switch with <4% chip area
overhead on a 16-nm standard-cell library. Our design lets us program many
sophisticated algorithms, such as a 5-level hierarchical scheduler with
programmable scheduling algorithms at each level.
|
[
{
"version": "v1",
"created": "Fri, 19 Feb 2016 04:55:00 GMT"
}
] | 2016-02-22T00:00:00 |
[
[
"Sivaraman",
"Anirudh",
""
],
[
"Subramanian",
"Suvinay",
""
],
[
"Agrawal",
"Anurag",
""
],
[
"Chole",
"Sharad",
""
],
[
"Chuang",
"Shang-Tse",
""
],
[
"Edsall",
"Tom",
""
],
[
"Alizadeh",
"Mohammad",
""
],
[
"Katti",
"Sachin",
""
],
[
"McKeown",
"Nick",
""
],
[
"Balakrishnan",
"Hari",
""
]
] |
new_dataset
| 0.999706 |
1602.06070
|
Raghavendra Singh
|
Raghavendra Singh
|
Vertex-disjoint Cycle Cover for graph signal processing
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Eigenvectors of the Laplacian of a cycle graph exhibit the sinusoidal
characteristics of the standard DFT basis, and signals defined on such graphs
are amenable to linear shift invariant (LSI) operations. In this paper we
propose to reduce a generic graph to its vertex-disjoint cycle cover, i.e., a
set of subgraphs that are cycles, that together contain all vertices of the
graph, and no two subgraphs have any vertices in common. Additionally if the
weight of an edge in the graph is a function of the variation in the signals on
its vertices, then maximally smooth cycles can be found, such that the
resulting DFT does not have high frequency components. We show that an image
graph can be reduced to such low-frequency cycles, and use that to propose a
simple image denoising algorithm.
|
[
{
"version": "v1",
"created": "Fri, 19 Feb 2016 07:39:05 GMT"
}
] | 2016-02-22T00:00:00 |
[
[
"Singh",
"Raghavendra",
""
]
] |
new_dataset
| 0.996846 |
1602.06149
|
Simone Bianco
|
Simone Bianco
|
Large age-gap face verification by feature injection in deep networks
|
Submitted
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a new method for face verification across large age
gaps and also a dataset containing variations of age in the wild, the Large
Age-Gap (LAG) dataset, with images ranging from child/young to adult/old. The
proposed method exploits a deep convolutional neural network (DCNN) pre-trained
for the face recognition task on a large dataset and then fine-tuned for the
large age-gap face verification task. Finetuning is performed in a Siamese
architecture using a contrastive loss function. A feature injection layer is
introduced to boost verification accuracy, showing the ability of the DCNN to
learn a similarity metric leveraging external features. Experimental results on
the LAG dataset show that our method is able to outperform the face
verification solutions in the state of the art considered.
|
[
{
"version": "v1",
"created": "Fri, 19 Feb 2016 13:39:22 GMT"
}
] | 2016-02-22T00:00:00 |
[
[
"Bianco",
"Simone",
""
]
] |
new_dataset
| 0.995372 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.